- Table of Contents
- Related Documents
-
Title | Size | Download |
---|---|---|
01-Text | 1.64 MB |
Contents
View information about other components
View storage summary information
View storage controller information
Configure drive service life alarm settings
Power on or power off the server
View power consumption information
Configure power alarming and power capping
Configure processor power states
View status and readings of temperature sensors
General restrictions and guidelines for network configuration
View or close HDM user sessions
Operate the server from H5 KVM
About remote media redirection
Export HDM, BIOS, or RAID configuration
Manage the intelligent security bezel
Installation package management
Firmware update restrictions and guidelines
Prerequisites for firmware update
Update the REPO for firmware update
Update HDM installation package
Update drive backplane firmware
Update firmware for retimer on the BIREN GPU module
Update firmware for storage controllers, network adapters, and drives
Configure the password policy for local users
Configure privileges for custom users
User roles and privileges matrix
Types of firewall rules and their priority order
Upload an SSL certificate and key to HDM
Configure two-factor authentication
Configure the security tip for login
Security monitoring information
Login
The information in this document might differ from your product if it contains custom configuration options or features.
The available features vary by server model. You can obtain the available features from the Web interface.
Perform this feature to access HDM Web interface. HDM supports local users and domain users (including Lightweight Directory Access Protocol (LDAP) users, Active Directory (AD) users and Kerberos users).
Restrictions and guidelines
· With OTP authentication enabled, if the number of incorrect one-time passwords entered reaches the system limit, HDM does not ban the user account from login.
· If you enter LDAP, AD, or Kerberos user information, make sure the IP address of LDAP, AD, or Kerberos server can communicate with the IP address of HDM client server correctly.
Procedure
1. Enter a username and password for a local user or domain user. If One-Time Password (OTP) is enabled for HDM, you must also enter the one-time password received on your mobile phone or hardware device.
2. Click Login.
3. Change your password if it has expired.
If your password has expired, the page prompts Expired password.
a. Click the Change password link to open the dialog box.
b. Enter the username, old password, and new password, and then confirm the new password.
c. Click OK.
4. (Optional.) If the password is the initial password, a dialog box will open to prompt you to change the password. Change the password as needed.
5. If Kerberos authentication is enabled correctly, you can click Login to log in to the HDM Web interface directly without a username and password.
Dashboard
System status
Perform this task to view the server model, product pictures, system health, alarm information, power modes, heat dissipation modes, network modes, and HDM management module state. Support for configurations varies by server model.
Procedure
1. On the top navigation bar, click Dashboard.
2. In the System state section of the work pane, view system health state, alarm information, power modes, heat dissipation modes, network modes, and HDM management module state.
3. (Optional.) If the system health is in abnormal state, you can identify components with issues in the device health section.
4. (Optional.) Click the icons for the power mode, heat dissipation mode, and network mode to view respective detailed information or modify respective configurations.
5. (Optional.) View HDM management module health state, and perform the following tasks:
¡ If it is in normal state, hover the mouse pointer over the HDM management module icon and a floating window displays information about the HDM management module and iFIST module. If the iFIST module is absent, this area does not show the related information.
- Information about the HDM management module contains the PCB version number, CPLD firmware version, video memory, backup plan, and state of the SD card on the HDM management module.
- Information about the iFIST module contains the SD card state, SD card capacity, and iFIST version number.
¡ If it is in abnormal state, click the HDM management module icon to view information about the HDM management module, including the number of ECC CE and ECC UCE errors and state of the SD card on the HDM management module.
- If the SD card is in Access failed or Partition lost; Access failed state, click Reset SD card.
- If the SD card is in Partition lost state, restart HDM.
Parameters
· System state: Overall health status of the server.
¡ Normal: All server components are
operating correctly.
¡ Critical or
Major: A minimum
of one component is experiencing issues.
· Alarm information
¡ Major—The event might cause part of the system to fail and result in service interruption. Immediate action is required.
¡ Critical—The event might result in system outage or power failure. Immediate action is required.
· Power mode: Role of the power supply. Options include Active and Standby. The active power supplies provide power normally and the standby power supplies provide low power output.
· Heat dissipation
¡ Air cooling: When the server uses only air cooling, this area displays the corresponding fan mode.
¡ Air cooling+Liquid cooling: When the server uses both air cooling and liquid cooling, the area displays the corresponding fan mode when you hover over the icon.
· Fan mode
¡ Silent: Enables the fans to run at the lowest speed required by heat dissipation of the server. This mode is suitable for scenarios with high noise requirements.
¡ Balanced: Enables the fans to run at a higher speed to provide balanced noise control and cooling performance.
¡ Powerful: Enables the fans to run at the highest possible speed. This mode is suitable for scenarios where the server requires high cooling performance. For example, the server is busy and key components, such as processors, are heavily loaded, or the ambient temperature changes frequently.
¡ Custom: Specifies a customized fan speed level. A higher level represents a higher speed and larger noise.
· Network mode
¡ Normal mode—The HDM dedicated and shared network ports have separate IP addresses and operate in active/active mode. HDM is accessible at both ports.
¡ Active/standby mode—The HDM dedicated and shared network ports have separate IP addresses and operate in active/standby mode. In this mode, the dedicated port is the primary port and the shared network is the secondary port. HDM is accessible at the dedicated port as long as the dedicated port is up and has network connectivity. After the dedicated port fails, HDM is accessible at the shared port. In standby mode, the shared port cannot forward management traffic, but it can still forward data traffic.
· HDM management module
¡ PCB: Printed Circuit Board (PCB) version number for HDM.
¡ CPLD: Complex Programmable Logical Device (CPLD) version for HDM.
¡ Video memory: Video memory capacity for HDM.
¡ Backup plan: The system uses the Golden Image embedded in the server system as the backup image for HDM firmware.
¡ ECC CE errors: Number of ECC correctable errors detected by HDM.
¡ ECC UCE errors: Number of ECC uncorrectable errors detected by HDM.
¡ SD card state: State of the SD card on the HDM management module. Options include Normal, Partition lost, Access failed, and Absent.
· iFIST module
¡ SD card state: State of the SD card on the iFIST module. Options include Absent and Normal.
¡ SD card size: Capacity of the SD card on the iFIST module.
¡ Version: iFIST software version number.
Device information
Perform this feature to view device information of the server. Support for configurations varies by server model.
Procedure
1. On the top navigation bar, click Dashboard.
2. In the Device information section of the work pane, view the server information.
Parameters
· Product serial number: A unique product code assigned by the manufacturer.
· UUID: Universally unique identifier of the server.
· HDM firmware: Current firmware version of HDM, including external and internal version numbers.
· BIOS firmware: Current firmware version of the BIOS, including external and internal version numbers.
· Dedicated port: Processes management traffic only. The icon
represents a correct network connection, and the
icon
represents an incorrect network connection for the port.
· Shared port: Processes both management traffic and data traffic. The icon represents a correct network
connection, and the
icon represents an incorrect network
connection for the port.
· Active/standby mode: Port used by the active/standby network mode. This field is displayed only when the active/standby network mode is enabled.
· Hostname: By default, the server name is not configured. Support for this field depends on the server model.
· IPv4 address: IPv4 address of HDM management port.
· IPv6 address: IPv6 address of HDM management port.
· MAC address: MAC address of the HDM management port.
· Chip model: Chip model of HDM.
Device health
Perform this task to identify the health state of the server system and its components. Support for configurations varies by server model.
Procedure
1. On the top navigation bar, click Dashboard.
2. In the Device health section of the work pane, view the overall health state of the system and components with issues.
¡ If this section displays Normal, all
server components are operating correctly.
¡ If this section displays Major, the
performance of components has obviously degraded.
¡ If this section displays Critical, the server might be shut down automatically to avoid component
damages.
3. To view the failure reason of a component with issues, click the component link.
Parameters
The following is a summary of component health states:
Subsystem |
State |
Description |
Processors |
The processors are operating correctly. |
|
An overtemperature condition has occurred or a processor configuration error is present. |
||
One of the following conditions exists: · The temperature of the processor has exceeded the critical threshold. · An unrecoverable processor error has occurred. · The primary processor is absent. · The BIOS gets stuck at the POST phase because of a processor error. |
||
Memory |
The memory is operating correctly. |
|
One of the following conditions exists: · All memory modules are absent or isolated. · An unrecoverable memory error has occurred. · Incorrect DIMM installation or DIMM incompatibility. |
||
The BIOS gets stuck at the POST phase because of a memory error. |
||
Heat dissipation |
· The fans are operating correctly in redundancy. None of the fans at critical locations have failed. · The liquid cooling devices are in normal status. |
|
· Fan redundancy issue is present. Fans at critical locations in the same fan tray have failed. · Cables are disconnected for the liquid leakage detection module. |
||
· Fan redundancy issue is present. Fans at two or more critical locations in different fan trays have failed. · Liquid leakage occurs to a liquid cooling device. |
||
Power supplies |
The power supply is operating correctly. |
|
A severe power supply error has occurred. |
||
Storage |
All logical drives, physical drives, and storage controllers are operating correctly. |
|
· A logical drive error has occurred. · A physical drive error has occurred. · A storage controller error has occurred. |
||
PCIe modules (network adapters, GPUs, FC HBAs, QAT cards, and FPGA cards) |
All PCIe modules are operating correctly. |
|
· A bus uncorrectable error, bus fatal error, or PCIe err error has occurred. · An OCP network adapter that supports an OCP fan is installed but no OCP fan is connected. |
||
Temperature |
All component temperatures are below the major threshold. |
|
The temperature has crossed the major threshold, but it has not reached the critical threshold. |
||
The temperature has crossed the critical threshold. |
||
Others |
All components are operating correctly. |
|
A major component error has occurred. |
||
A critical component error has occurred. |
Quick access
Perform this task to use a shortcut to manage network settings, update firmware, download logs, manage configurations, or access a remote console.
Procedure
1. On the top navigation bar, click Dashboard.
2. Click the shortcut for a specific feature.
You will be redirected to the requested web page. For more information about the features, see the corresponding chapter in the online help.
To access a remote console, you must first click Start KVM or Start H5 KVM on the redirected page. The used KVM or H5 KVM launch mode is based on the remote console configuration.
Virtual buttons
The following is a summary of buttons on the Dashboard page:
Table 1 Button summary
Item |
Icon |
Description |
My tasks |
You can click this icon to view the ongoing tasks, including firmware update, log download, and virtual media mounting. If multiple tasks are in progress, the system displays only the four most recent tasks. To view more information, click View details to view the task ID, name, description, state, and creation time. |
|
Server UID LED |
The server is selected. |
|
· Firmware update is being performed or the remote console is open. · SDS log download through a service USB drive is in progress. |
||
The server is not selected. |
||
Server power LED |
The server is powered on. You can click the button to change the power status of the server. · Force system reset: Warm reboots the server without power cycling the server. · Force power-off: Shuts down the server immediately by force. This action is equivalent to pressing the power button on the server for five seconds. This action removes the power supply. · Graceful power-off: Shuts down the operating system first, and then removes power from the server. · Force power-cycle: Powers off and then powers on the server. |
|
The server is powered off. You can click the button to change the power status of the server. · Power on: Starts up the server. |
||
Language |
If the interface is in English, you can click the button to change the language to Chinese. |
|
If the interface is in Chinese, you can click the button to change the language to English. |
||
Theme |
If the interface is in light theme, you can click the button to change the interface theme to dark theme. If the interface is in dark theme, you can click the button to change the interface theme to light theme. |
|
Alarms |
You can click the button to view alarms. |
|
Security monitoring information |
Security monitoring is disabled. You can click the icon to access the Security Monitoring Information page. |
|
No risk exists for security settings. You can click the icon to access the Security Monitoring Information page. |
||
Risks are ignored for all security settings. You can click the icon to access the Security Monitoring Information page. |
||
Risks exist for security settings. You can click the icon to access the Security Monitoring Information page. |
||
Suggestion box |
You can click the button to jump to the feedback page. |
|
User |
You can click the button to view the session IDs, session types, user IDs, usernames, IP addresses, user roles, and user types of all online users, or exit the system. |
|
Refresh |
You can click the button to refresh the page. |
|
Online help |
You can click the button to access the online help. |
System
Summary
The Summary menu allows you to view information about the server, processors, memory, PCIe modules, sensors, and other components.
The supported configurations vary by server model.
|
NOTE: · HDM can display correct, complete processor, memory, and PCIe module information only after the server completes POST. · If the server is off, HDM displays the processor, memory, and PCIe module information obtained at the most recent POST. |
View device information
Procedure
1. On the top navigation bar, click System.
You are placed on the System Overview page.
2. Click the Product Information tab to view device and firmware information.
Parameters
· Device name: External server name.
· Server type: Server type.
· Product part number: Part number of the server, which corresponds to the server model. This field displays N/A if the system fails to obtain the server part number.
· Product serial number: Serial number of the server.
· Manufacturer: Manufacturer of the server.
· Asset tag: Asset tag of the server. This field is optional. The asset tag is a string of 1 to 48 characters and can contain only letters, digits, spaces, and the following special characters: ` ~ ! @ # $ % ^ & * ( ) _ + - = [ ] { } | ; ' : \ " , . / < > ?
· Primary HDM version: Firmware version of the primary HDM image. Hover the mouse pointer
over the icon, the system prompts that the current
HDM version is primary version. You can click the
icon to
access the installation package management page for detailed information.
· Primary HDM updated at: Time at which the primary HDM image was compiled.
· HDM Golden Image version: Firmware version of the backup image. Hover
the mouse pointer over the icon, the system prompts that
the current HDM version is backup version.
· HDM Golden Image updated at: Time at which the backup image version was compiled.
· BIOS version: Version of the Basic Input Output System (BIOS).
· BIOS version updated at: Time at which the BIOS version was updated.
· ME version: Version of the Intel Management Engine (ME). This field is available only for servers installed with an Intel processor.
· CPLD1 version: Version of the primary CPLD firmware.
· STBCPLD version: Version of the system board STBCPLD firmware. Support for this field depends on the device model.
· iFIST version: Current version of the integrated Fast Intelligent Scalable Toolkit (iFIST). The system displays N/A if HDM fails to obtain the iFIST version.
· PFRCPLD version: Version of the PFRCPLD firmware. Platform Firmware Resilience (PFR) protects a server against firmware attacks and recovery, and PFRCPLD is the firmware that supports this mechanism.
View processor information
Perform this task to view summary and detailed processor information and processor errors. Some Intel CPU models support the Intel On Demand feature, which allows users to upload license files to activate custom feature such as CSS4, AMS4, AMS1, CSS2, and SGX512. After activating the custom features, users can download reports to view custom information.
Restrictions and guidelines
· Only some Intel CPU models support the Intel On Demand feature.
· You can download a report only after the server starts up and enters the POST to setup or a later phase.
View processor information
1. On the top navigation bar, click System.
You are placed on the System Overview page.
2. Click the Processors tab to view processor information.
Upload Intel On Demand license files
1. On the top navigation bar, click System.
You are placed on the System Overview page.
2. Click the Processors tab, and select a processor that supports the Intel On Demand feature.
3. To upload an Intel On Demand license file, click to
select the Intel On Demand license
file to be uploaded, and then click Upload.
4. Restart the server to make the Intel On Demand license take effect. A highlighted information box indicates that the feature is activated.
View Intel On Demand information
1. On the top navigation bar, click System.
You are placed on the System Overview page.
2. Click the Processors tab, and select a processor that supports the Intel On Demand feature.
3. View the custom information. A highlighted information box indicates that the feature is activated. To download the Intel On Demand information of the CPU, click Download report.
Parameters
· Status: Operating status of the processor. If a processor is in abnormal state, view the fault description to locate the errors.
· Socket: Slot number of the processor.
· Vendor: Manufacturer of the processor.
· Model: Model of the processor.
¡ An Extreme Core Count (XCC) processor can be configured with a relatively large amount of cores, which belongs to an advanced configuration.
¡ A Medium Core Count (MCC) processor can be configured with a medium amount of cores, which belongs to a medium configuration.
· PPIN: Unique product code assigned by the manufacturer. This field displays N/A if HDM fails to obtain the PPIN.
· Max frequency: Maximum frequency of the processor.
· Frequency: Base frequency of the processor.
· Cores: Cores of the processor.
· Threads: Number of the threads supported by the processor.
· 64 bits: Indicates whether the processor supports 64-bit computing.
· Processor architecture: Framework of the processor. Only the x86 architecture is supported.
· Instruction set: Type of the processor instruction set for processing and computing, only X86-64 supported.
· L1 cache: L1 cache of the processor.
· L2 cache: L2 cache of the processor.
· L3 cache: L3 cache of the processor.
· Serial number: Unique serial number assigned by the manufacturer. This field displays N/A if HDM fails to obtain the serial number. Support for this field depends on the device model.
· Fault description: Alarms generated for processor errors.
· Other parameters: ChopType and Stepping fields of the processor.
· Custom information: Information about the Intel On Demand feature of the CPU. An unhighlighted information box indicates that the feature is supported but has not been activated. A highlighted information box indicates that the feature is supported and activated.
· Upload file: Uploads the license file corresponding to the Intel On Demand feature.
View memory information
Perform this task to identify summary, RAS, view, and detailed information.
Restrictions and guidelines
If a DIMM is disabled because of a memory training error, the other DIMM in the same channel will also be disabled.
Procedure
1. On the top navigation bar, click System.
You are placed on the System Overview page.
2. Click the Memory tab to view memory information.
3. (Optional.) Select the target compute module to view the corresponding memory information.
Parameters
The field for memory reliability, availability, and serviceability (RAS) configuration is displayed only when RAS mode is enabled.
· ECC: Support for error-correcting code (ECC). Available options include:
¡ 48-bit ECC.
¡ 96-bit ECC.
¡ 125-bit ECC.
¡ 128-bit ECC.
· Patrol Scrub: Patrol scrubbing settings. Patrol scrubbing allows a processor to automatically search for and correct correctable memory errors at regular intervals.
· SDDC: Enablement status of DRAM Single Device Data Correction (SDDC), which can correct multiple bit errors in x4 or x8 chips.
· ADDDC: Enablement status of Adaptive Double Device Data Correction Sparing (ADDDC), which can correct two-bit memory errors.
· Mirror Mode: Mirror mode. Available options include:
¡ Disabled—Disables memory mirroring.
¡ Full Mirror Mode—Sets the entire 1LM memory in the system to be mirrored.
¡ Partial Mirror Mode—Sets a part of the 1LM memory in the system to be mirrored.
Memory details (available for all DIMMs)
· Location: Processor ID, channel ID, and slot number of a DIMM.
· Status: Health status of a memory module. If a DIMM is in abnormal state, view the fault description to locate the errors.
· Size: Capacity of the DIMM.
· Max frequency: Main frequency of the memory module.
· Generation: Generation of the DIMM.
· Vendor: DIMM manufacturer.
· Type: DIMM type.
· Rank: Rank type of the DIMM. Options include SR DIMM, DR DIMM, and QR DIMM.
· ECC: Support for error-correcting code (ECC).
· Serial number: Unique product code assigned by the manufacturer. This field displays N/A if HDM fails to obtain the serial number.
· Part number: Part number of the DIMM. This field displays N/A if HDM fails to obtain the part number.
· Frequency: Frequency at which the memory operates.
· Voltage: Voltage for the memory.
· Bit width (bit): Physical width of the memory in bits.
View PCIe module information
Restrictions and guidelines
If a PCIe module is present and the present PCIe module does not support information obtaining, you can view the available empty physical slots and maximum bandwidth information. If a physical slot is a riser card slot, you can also view the corresponding riser card information.
If the system cannot obtain the current GPU power, verify that the GPU driver has been installed.
To enable the Management Component Transport Protocol (MCTP) feature, first update the system firmware to a version that supports MCTP. For servers installed with Intel processors, you must access the BIOS setup utility, navigate to the Advanced > Platform Configuration > Server ME Configuration menu, enable MCTP proxy, and then restart the server.
Procedure
1. On the top navigation bar, click System.
You are placed on the System Overview page.
2. Click the PCIe modules tab to view PCIe module information.
3. To view network adapter, GPU, FC HBA, and other information, click the corresponding tab.
Parameters
Device list
· Device information
¡ Slot: Slot of the PCIe module. For more information about slot locations, see the user guide for the server.
¡ Status: PCIe module status, including Normal and Abnormal.
¡ Device name: Model of the PCIe module.
¡ Device manufacturer: Manufacturer of the PCIe module.
¡ Type: Type of the PCIe module.
¡ Chip vendor: Chip manufacturer of the PCIe module.
¡ Part number: Part number of the PCIe module, which corresponds to the model of the PCIe module. This field displays N/A if HDM fails to obtain the part number.
¡ Serial number: Unique product code assigned by the manufacturer. This field displays N/A if HDM fails to obtain the serial number.
¡ Chip model: Chip model of the PCIe module.
¡ Max speed: Maximum PCIe link rate.
¡ Negotiated speed: Auto-negotiated PCIe link rate.
¡ Supported latest protocol: Supported latest generation of the PCIe standard.
¡ Negotiated protocol: Auto-negotiated generation of the PCIe standard.
¡ Max link width: Maximum link width supported by the PCIe module.
¡ Negotiated link width: Auto-negotiated link width of the PCIe module.
¡ DeviceBDF: Bus:Device:Function (BDF) information of the PCIe device. BUS indicates the PCIe device bus number, Device indicates the PCIe device number, and Function indicates the PCIe function number.
¡ RootPortBDF: Displays the BDF information of the device port. BUS indicates the device bus number of the PCIe port, Device indicates the device number of the PCIe port, and Function indicates the function number of the PCIe port.
¡ Description: Description of model and position the PCIe device. Models include PCIe and OCP.
¡ Mezzanine slot: Slot number of the mezzanine PCIe module. Support for this field depends on the device model.
· Slot information
¡ Processor: Processor to which the PCIe module is subordinate. Support for this field depends on the device model.
¡ Riser connector: Connector number of the riser card where the PCIe module is installed.
¡ Max link width: Maximum link width supported by the PCIe slot.
Network adapters
· Device name: Name of the network adapter.
· Port: Port quantity and port rate of the network adapter.
· Device manufacturer: Manufacturer of the network adapter.
· Chip vendor: Chip manufacturer of the network adapter.
· Firmware version: Firmware version of the network adapter.
· Status: Network adapter health status. If a network adapter is in abnormal state, review the event logs to locate the errors.
· Location: Physical location of the network adapter.
· OCP fan status: Status of OCP network adapter fans. Options include Absent, Normal, and Major.
· Part number: Part number of the PCIe module, which corresponds to the model of the PCIe module. This field displays N/A if HDM fails to obtain the part number.
· Serial number: Unique product code assigned by the manufacturer. This field displays N/A if HDM fails to obtain the serial number.
· Chip model: Chip model of the network adapter.
· Mode: Mode of the network adapter.
¡ Single: Normal mode.
¡ NPAR: Mode for network adapter partitioning. In this mode, a single physical network port can be virtualized.
¡ Multihost: Multi-CPU mode. In this mode, the two ports of the OCP network adapter will be assigned to two CPUs respectively.
· OCP fan fault description: Alarm log information about errors on failed OCP fans.
· Slot: Physical slot to which the network adapter belongs. Support for this field depends on the device model.
· Port: Network ports on the network adapter.
· Processor: Processor to which the OCP network adapter belongs. Support for this field depends on the device model.
· Subport: Virtual port of the network adapter.
· MAC address: MAC address of the network port.
· Root BDF: Segment, bus, device, and function information for the processor that manages the network adapter.
· BDF: BDF information that contains port numbers.
· Speed: Maximum speed supported by the network port. This filed displays N/A if HDM fails to obtain the max speed.
· Port connection: Connection speed of the network port. This field displays N/A if HDM fails to obtain the connection speed.
· Port type: Network port type. Options include Fiber and Copper.
· Port connection: Displays whether a cable is connected to the network port. Options include Connected and Disconnected. This field displays N/A if HDM fails to obtain the connection status.
· Fault description: Event log information about an error on the PCIe module.
· LLDP status: LLDP status of the current network port.
· LLDP configuration: Enables or disables LLDP for the network port. After changing the LLDP state, the method for the configuration to take effect depends on the vendor and firmware version.
GPUs
· Device name: Product name of the GPU.
· Device manufacturer: Manufacturer of the GPU.
· Firmware version: Firmware version of the GPU.
· Status: GPU health status. If a GPU is in abnormal state, review the event logs to locate the errors.
· Location: Number of the slot in which the GPU resides. For information about the slot location, see the user guide for the server.
· Part number: Part number of the GPU, which corresponds to the model of the GPU module. This field displays N/A if HDM fails to obtain the part number.
· Serial number: Unique product code assigned by the vendor. This field displays N/A if HDM fails to obtain the serial number.
· Power: Current power of the GPU.
· Chip model: Chip model of the GPU.
· Fault description: Event log information about an error on the PCIe module.
FC HBAs
· Device name: Model of the FC HBA.
· Device manufacturer: Manufacturer of the FC HBA.
· Chip vendor: Chip manufacture of the FC HBA.
· Firmware version: Firmware version of the FC HBA.
· Port: Port type of the FC HBA.
· Status: FC HBA health status. If an FC HBA is in abnormal state, review the event logs to locate the errors.
· Location: Number of the slot in which the FC HBA resides.
· WWPN: Worldwide port number (WWPN) for the network port.
· WWNN: Worldwide node name (WWNN) for the network port.
· Port connection: Displays whether a cable is connected to the network port. Options include Connected and Disconnected. This field displays N/A if HDM fails to obtain the connection state.
· Port connection: Connection speed of the network port. This field displays N/A if HDM fails to obtain the connection speed.
· Speed: Maximum speed of the network port. This field displays N/A if HDM fails to obtain the max speed.
· Port type: Type of the network connector. Options include fiber port and copper port.
· Fault description: Event log information about an error on the PCIe module.
Others (QAT and FPGA cards)
· Device name: Name of the PCIe module.
· Device manufacturer: Manufacturer of the PCIe module.
· Chip vendor: Chip manufacturer of the PCIe module.
· Status: PCIe module health status. If a PCIe module is in abnormal state, review the event logs to locate the errors.
· Location: Number of the slot in which the PCIe module resides. For information about the slot location, see the user guide for the server.
· Part number: Part number of the PCIe module, which corresponds to the model of the PCIe module. This field displays N/A if HDM fails to obtain the part number.
· Serial number: Unique product code assigned by the vendor. This field displays N/A if HDM fails to obtain the serial number.
· Fault description: Event log information about an error on the PCIe module.
View information about other components
Restrictions and guidelines
HDM displays component information only about present components.
The supported components vary by server model.
Procedure
1. On the top navigation bar, click System.
You are placed on the System Overview page.
2. Click the Others tab.
3. Select the target component type to view the corresponding component information.
Parameters
· Status: Component health status. If a component is in abnormal state, review the event logs to locate the errors.
· Manufacturer: Manufacturer of the component.
· Part number: Part number of the component, which corresponds to the component model.
· Serial number: Unique product code assigned by the manufacturer.
· CPLD1 version: Version of the primary CPLD firmware.
· CPLD2 version: Version of the secondary CPLD firmware.
· PCB version: Version of the PCB firmware.
· Number of ports: Number of ports on the drive backplane.
· Number of drives: Number of present drives attached to the drive backplane.
· Type: Type of the drive backplane.
· Chip vendor: Manufacturer of the BMC chip.
· Chip model: Model of the BMC chip.
· Module model: Model of the component.
· Current firmware version: Firmware version of the drive backplane.
· Current configuration file version: Configuration file version of the drive backplane.
· Bootloader version: Bootloader version of the drive backplane.
· EEPROM version (for firmware): Electrically erasable programmable read only memory (EEPROM) version of the drive backplane.
· Fault description: Event log information about errors on the components.
· DSDCard: The server is installed with a dual-SD component. The component supports OS installation and some serial port functions.
View the sensor reading chart
Perform this task to view the sensor readings in a line chart.
The system collects sensor readings at intervals of 5 minutes.
Restrictions and guidelines
HDM cannot obtain the sensor readings during restart.
Restoring HDM factory defaults clears the sensor reading statistics.
Only linear sensors support this feature.
Some servers support displaying only the average sensor readings.
Procedure
1. On the top navigation bar, click System.
You are placed on the System Overview page.
2. Click the Sensors tab to view the corresponding information.
3. To view sensor readings on the Sensors tab, select a sensor type and name. You can perform the following tasks in the work pane:
¡ To clear the history readings and start a new statistics collection period, click Restart.
¡ To view sensor readings for the past 24 hours or past 7 days, or last 30 days in the line chart, select Past 24 hours or Past 7 days, or Last 30 days. You can hover over the lines in the chart to view the minimum, average, and maximum readings during the statistics collection period.
¡ To
view only the maximum, average,
or minimum sensor readings,
click the Max,
Avg, or
Min icon, respectively.
Storage
The Storage menu allows you to perform the following tasks:
· View information about storage controllers, logical drives, physical drives, and storage errors.
· Modify storage controller information, including modifying RAID controller properties and clearing RAID configuration.
· Manage physical and logical drives controlled by the following storage controller in an out-of-band manner as shown in Table 2.
Chip type |
Storage controller model |
HDM management channel |
LSI chip |
RAID-LSI-9560-LP-16i-8GB |
· Management Component Transport Protocol (MCTP) · Inter-Integrated Circuit (I2C) |
RAID-LSI-9560-LP-8i-4GB |
· MCTP · I2C |
|
HBA-LSI-9540-LP-8i |
· MCTP · I2C |
|
HBA-LSI-9500-LP-16i |
· I2C |
|
HBA-LSI-9500-LP-8i |
· I2C |
|
HBA-LSI-9311-8i |
· I2C |
|
HBA-LSI-9300-8i |
· I2C |
|
PMC chip |
RAID-P460-B2 |
· MCTP · PMC HDM Services Interface (PBSI) |
RAID-P460-B4 |
· MCTP · PBSI (PMC BMC Services Interface) |
|
RAID-3254-8i |
· MCTP · PBSI (PMC BMC Services Interface) |
|
HBA-H460-B1 |
· MCTP · PBSI (PMC BMC Services Interface) |
|
RAID-P4408-Ma-8i-2GB |
· MCTP |
|
RAID-P4408-Mr-8i-2GB |
· MCTP · PBSI (PMC BMC Services Interface) |
|
RAID-P2404-Mf-4i-2GB |
· MCTP · PBSI (PMC BMC Services Interface) |
|
MARVELL chip |
RAID-MARVELL-M.2 |
· I2C |
RAID-MARVELL-SANTACRUZ-LP-2i |
· I2C |
View storage summary information
1. On the top navigation bar, click System.
2. In the left navigation pane, select Storage.
3. View storage summary information, including the health status of the storage system, the total numbers of storage controllers, logical drives, and physical drives, and fault descriptions.
If the health status is abnormal, check the fault descriptions and review the event logs to locate the errors. The fault description field can display a maximum of 1 to 511 characters. If a description exceeds 511 characters, access the event log page to view the complete information.
View storage controller information
Perform this task to view information about storage controllers, modify storage controller attributes, and clear RAID configuration.
Restrictions and guidelines
Refresh the Storage page to obtain the update-to-date storage information after the server OS starts up successfully.
If the storage controllers or drive backplanes are not installed as expected, the physical drive numbers might be incorrect.
After you change the RAID controller mode, the new mode takes effect after you restart BIOS.
The RAID-P460-B2, RAID-P460-B4, RAID-3254-8i, HBA-H460-B1, RAID-P4408-Mr-8i-2GB, RAID-P2404-Mf-4i-2GB storage controller supports obtaining information by using the MCTP or PBSI channel. You can switch the channel by configuring OOB Interface on the BIOS Setup utility.
· If you select MCTP channel, for HDM to obtain controller information, set SMBus Physical Channel to Disable for the channel.
· If you select PBSI channel for HDM to obtain controller information, set SMBus Clock Stretching to Enable for the channel.
Viewing storage controller information
1. On the top navigation bar, click System.
2. In the left navigation pane, select Storage.
3. On the Logical view tab, select a storage controller.
Modifying storage controller information
1. On the top navigation bar, click System.
2. In the left navigation pane, select Storage.
3. On the Logical view
tab, select a storage
controller, and click the icon next to RAID controller attributes. On the page that opens, you can perform the following
tasks:
¡ Enable or disable data copyback for the RAID controller.
¡ Enable or disable SMART error copyback for the RAID controller.
¡ Enable or disable JBOD for the RAID controller.
¡ Modify the RAID controller mode.
4. Click OK.
Clearing RAID configuration
1. On the top navigation bar, click System.
2. In the left navigation pane, select Storage.
3. On the Logical view
tab, select a RAID controller, and click the icon next to RAID controller
clearing. On the page
that opens, you can perform the following tasks:
¡ Click Clear logical drive. In the dialog box that opens, enter the login password and click OK.
The system clears all managed logical drives and related configuration information from the controller once the password verification succeeds.
¡ Click Clear foreign state to clear the remaining RAID information for all physical drives managed by the controller. This feature is supported only for LSI RAID controllers.
4. Click OK.
Parameters
Storage controller
· Device name: Model of the storage controller.
· Firmware version: Firmware version of the storage controller.
· Vendor: Manufacturer of the storage controller.
· Flash: Status of the flash card of the power fail safeguard module.
¡ For an LSI storage controller, status options include:
- Normal—The flash card is operating correctly.
- Abnormal—The flash card is operating incorrectly.
- Absent—The flash card is not connected to the supercapacitor, not installed securely, or not installed at all.
¡ For a PMC storage controller, status options include:
- Normal—The flash card is operating correctly.
- Absent—The flash card of the power fail module is not securely installed or is not installed at all.
- Initializing—The flash card is initializing.
- Abnormal_status code—The flash card is operating incorrectly. You can check the status code to identify the exceptions that cause the flash card to enter the abnormal state.
- Warning_status code—A warning is present on the flash card. You can check the status code to identify the exceptions that cause the flash card to enter the warning state.
A status code is a hexadecimal number. To identify the exceptions, convert the hexadecimal status code into a 16-digit binary number (bit 0 to bit 15 from the right to the left). A set bit means that the exception indicated by the bit is present. For information about a set bit and its corresponding exception, see Table 3.
For example, if the status code is 0x500 (binary format 0000 0101 0000 0000), exceptions indicated by bit 8 and bit 10 are present on the flash card.
Table 3 Flash card exceptions and their set bits
Bit# |
Bit state |
Description |
0 |
1 |
GB subsystem is currently initializing. |
1 |
1 |
GB subsystem is in ready state. |
2 |
1 |
GB subsystem is executing a learning cycle. Learning cycles do not disrupt normal operation or the ability to protect data. |
3 |
1 |
GB subsystem has failed. |
4 |
1 |
The supercapacitor pack has exceeded the maximum temperature threshold. |
5 |
1 |
The supercapacitor pack has exceeded the warning temperature threshold. |
6 |
1 |
The supercapacitor pack is over voltage. |
7 |
1 |
The supercapacitor pack has exceeded the maximum charging current. |
8 |
1 |
GB subsystem learning cycle has passed. |
9 |
1 |
GB subsystem learning cycle has failed. |
10 |
1 |
The supercapacitor pack has failed. |
11 |
1 |
The supercapacitor pack is nearing the end of its life. Replacement is recommended. |
12 |
1 |
The supercapacitor pack has reached the end of its life. Replacement is required. |
13 |
1 |
One of the capacitors in the supercapacitor pack seems to be missing. |
14 |
N/A |
Reserved. |
15 |
N/A |
Reserved. |
|
NOTE: The Green backup (GB) system reports several types of operation status progress and health information. |
· Package version: Software package version of the storage controller. This field is available only for some LSI storage controllers.
· Configuration version: Configuration version of the storage controller. This option is available only for some LSI storage controllers.
· Serial number: Serial number of the storage controller.
· WWN: SAS address of the storage controller.
· Mode: Storage controller mode. The options include RAID and JBOD for LSI storage controllers, and include RAID, HBA, and Mixed for PMC storage controllers.
· Data rate: Data rate supported by the connectors of the storage controller.
· Connector type: Connector type supported by the storage controller.
· Built-in cache: Capacity of the read/write cache embedded in the storage controller.
· Supercapacitor: Status of the supercapacitor. Options include Absent, Charging, Charge completed, Calibrating, Overtemperature, Calibration failure, and Abnormal. The supercapacitor is faulty when it is in Overtemperature, Calibration failure, or Abnormal state.
· Charging status: The remaining amount of power available with the supercapacitor.
· RAID levels: RAID levels supported by the storage controller. On the HDM Web interface, RAID1(Triple) and RAID10(Triple) supported by PMC storage controllers are displayed as RAID1(ADM) and RAID10(ADM), respectively.
· Internal ports: Number of internal ports on a RAID controller.
· External ports:Number of external ports on a RAID controller.
· Clear foreign status: Clears remaining RAID information in physical drives. After you clear the information, the Foreign state disappears.
· Copyback: If a drive fails, the storage controller uses a hot spare drive to replace the failed drive and rebuilds data of the failed drive on the hot spare drive. When the storage controller detects that a new drive replaces the failed drive, it copies data on the hot spare drive back to the new drive and places the hot spare drive in standby status.
· SMART error copyback: When the storage controller detects that a Self Monitoring Analysis and Report Technology (SMART) error occurred to physical drives, it performs the copyback feature.
· JBOD: Enablement status of JBOD mode in the BIOS. This state enables data to be transmitted to physical drives without being processed by the transmission devices, and thus facilitates the upper-layer service software or management software in managing physical drives.
|
NOTE: The Charging status field is available only if a power fail safeguard module is installed. A power fail safeguard module contains a flash card and a supercapacitor. When a system power failure occurs, this supercapacitor can provide power for a minimum of 20 seconds. During this interval, the storage controller transfers data from memory to the flash card, where the data remains indefinitely or until the controller retrieves the data. |
Manage logical drives
Perform this task to view logical drive information and create logical drives.
Restrictions and guidelines
After you create or delete a logical drive, wait a few moments for the system to complete the operation and then refresh the page to verify the operation result.
A physical drive can be used to create only one logical drive.
The default maximum capacity of a logical drive might be slightly different from the maximum capacity you can set. If you do not specify a drive capacity when creating a logical drive, the drive capacity is the default maximum capacity calculated by the system.
You can view and set the enablement status of JBOD mode from the BIOS only for some LSI storage controllers in RAID mode.
The capacity unit of the logical drive is displayed as MIB or MB. Both units are converted using a factor of 1024. The difference in display does not affect the actual use.
A storage controller can manage a maximum of 256 logical drives from HDM. Support for this feature varies by storage controller specification.
Procedure
1. On the top navigation bar, click System.
2. In the left navigation pane, select Storage.
3. On the Logical view tab, select a logical drive to view its information.
4. To modify the default read policy, default write
policy, cache policy, and access policy for drives managed by LSI RAID
controller, click the icon.
5. To delete a logical drive, select the
logical drive, and then click the icon. In
the dialog box that opens, enter the user login password and click OK. HDM will
delete the logical drive once the password verification succeeds.
6. To create a logical drive, click Create a logical drive, specify drive parameters, and then click Save.
Parameters
· Name: Name of the logical drive. As a best practice, use letters and digits, and do not use special characters.
¡ For a PMC storage controller, this field is required and the name length is 1 to 31 characters.
¡ For an LSI storage controller, this field is optional and the name length is 0 to 15 characters.
· Status: Status of the logical drive. Options include:
¡ Optimal/Functional—The logical drive is operating correctly.
¡ Creating—The logical drive is being created.
¡ Degraded—Some RAID member drives have failed and require prompt replacement.
¡ Rebuilding—The RAID array is being rebuilt to reconstruct data and recover from the degraded state.
¡ Offline—The logical drive is corrupt and inaccessible.
¡ Zeroing—The logical drive is being formatted. All data will be deleted upon this action.
¡ Scrubbing—The member drives are being scanned to maintain data continuity in the logical drive. This field is available for logical drives with parity bits, such as RAID 5 and RAID 6 logical drives.
¡ Morphing—Data is being migrated between drives or the RAID array is changing to a new RAID level.
¡ Copying—Data is being copied from the hot spare disk back to the replacement drive of a failed drive. When this operation is complete, the hot spare returns to the hot standby state.
¡ Foreign—Indicates that the logical drive is in foreign status and has residual RAID information.
¡ Unsupported—Indicates that the memory card does not support the current type of logical drive.
¡ Erasing—Indicates that the logical drive is in the erasing state.
¡ Expanding—Indicates that the logical drive is in the expanding state.
¡ Verifying—Indicates a complete check and verification of the running data.
¡ Redbuilding Pause—Indicates that the logical drive is in the state of pausing RAID rebuilding.
· BootEnable: Indicates whether the logical drive is a boot drive. Support for this field depends on the storage controller model. Options include:
¡ True—The logical drive is a boot drive.
¡ False—The logical drive is not a boot drive.
· Stripe size: Stripe size of each physical drive. Support for this field depends on the storage controller model.
· Read policy: Read policy for the logical drive. Support for this field depends on the storage controller model. Options are:
¡ No read ahead—Disables read ahead capability.
¡ Read ahead—Enables read ahead capability. When this capability is enabled, the controller reads sequentially ahead of requested data and stores the additional data in cache memory.
· Write policy: Write policy for the logical drive. Support for this field depends on the storage controller model. Options are:
¡ Write through—Enables the controller to send a data transfer completion signal to the host when the drive subsystem has received all data in a transaction.
¡ Write back—Enables the controller to send a data transfer completion signal to the host when the controller cache receives all data in a transaction. If the storage controller is not installed with a supercapacitor or if the supercapacitor is faulty, the Write through policy is used.
¡ Always write back—Enables the controller to send a data transfer completion signal to the host when the controller cache receives all data in a transaction.
· Cache policy: I/O policy for the logical drive. Support for this field depends on the storage controller model. Options include:
¡ Direct—Enables the cache module to process all read and write operations of the storage controller.
¡ Cached—Disables the cache module from processing any read or write operations on the storage controller.
· Drive cache: Indicates whether drive cache is enabled for the logical drive. Support for this field depends on the storage controller model. Options include:
¡ Unchanged—The default drive cache policy is used.
¡ Enable—Drive cache is enabled.
¡ Disable—Drive cache is disabled.
· Access policy: Access policy for the logical drive. Support for this field depends on the storage controller model. Options include:
¡ Read/Write.
¡ Read only.
¡ Blocked.
· Acceleration method: Status of read/write cache. This field is available only for logical drives managed by a PMC storage controller that supports MCTP. Options include:
¡ Controller Cache—Enables read/write cache.
¡ None—Disables read/write cache.
¡ IO Bypass—Enables the storage controller to use I/O bypass paths to enhance read/write performance. This feature is available only on SSDs.
¡ MaxCache—Uses RAID created by SSDs to cache data to enhance read/write performance.
· Rebuilding progress: Progress of logical drive rebuilding after the logical drive is downgraded.
· Spans/Parity groups: Number of spans or parity groups for mixed-mode RAID (RAID 00, RAID 10, RAID 50, or RAID 60).
· Initialization type: Initialization type used upon logical drive creation. Options include:
¡ For a logical drive managed by an LSI storage controller:
- No—Does not initialize the logical drive.
- Fast—Initializes the first and last 10 MiB of the logical drive for data write upon drive creation, and then initializes the remaining space in background. The logical drive state changes to Optimal after initialization.
- Full—Initializes all space in the logical drive.
¡ For a logical drive managed by a PMC storage controller:
- Default—Does not initialize the logical drive.
- RapidParity—Initializes the first and last 10 MiB of the logical drive for data write upon drive creation, and then initializes the remaining space in background. The logical drive state changes to Optimal after initialization.
· Level: RAID level of the logical drive.
· Capacity: Drive capacity. For a logical drive managed by an LSI storage controller, the minimum capacity is 100 MiB. For a logical drive managed by a PMC storage controller, the minimum capacity is 1 GiB. If you do not specify a capacity, the maximum capacity is used.
· Dedicated hot spare: Dedicated hot spare disks for redundancy-capable logical drives. If a drive fails, the dedicated spare drive can replace the failed drive and rebuilds data of the failed drive on the hot spare drive. When the storage controller detects that a new drive replaces the failed drive, it copies data on the hot spare drive back to the new drive and places the hot spare drive in standby status.
· Roaming hot spare: Roaming hot spare disks for redundancy-capable logical drives managed by a PMC storage controller. If a drive fails, the roaming spare drive directly replaces the failed drive to become a member drive.
Manage physical drives
Perform this task to view information about physical drives, change drive status, create hot spare drives, and enable the drive UID LED.
Restrictions and guidelines
You cannot change the settings of physical drives in Unconfigured Good (Foreign) or Unconfigured Bad (Foreign), or the settings of physical drives in Online state due to RAID building.
If the drive status is Failed or Unconfigured Bad, the drive information (including the drive size, speed, and interface type) might be inaccurate and is provided only for reference.
The Predicted remaining life field displays the value calculated by the system under the premise that the drives are operating stably. If drives are frequently read and written, the actual life of drives might change rapidly, resulting in deviations in the predicted remaining life of drives.
When you create hot spare drives, follow these restrictions and guidelines:
· Only spare physical drives can be used as hot spare drives, and member drives of logical drive cannot be configured to provide the hot spare service.
· Make sure the physical drive to be used is an SATA or SAS drive and its capacity is not smaller than the minimum capacity of a member drive. The physical drive must have the same type (SATA/SAS) as the member drives of the logical drive.
· You can create hot spares for logical drives of any RAID level, except for RAID 0.
· If an LSI storage controller is used, make sure the physical drive to use is in Unconfigured Good state. If a PMC storage controller is used, make sure the physical drive to use is in Ready state.
· You can only set one hot spare state for a physical drive at a time. If you want to change the hot spare state, disable the current state and then switch to the other.
· For a logical drive managed by a PMC storage controller, make sure all the hot spares are of the same hot spare state, and each hot spare can operate only in one state.
· Support for the display of physical drive information varies by server model.
Procedure
1. On the top navigation bar, click System.
2. In the left navigation pane, select Storage.
3. To view information about a physical drive that has been used for creating logical drive:
a. On the Logical view tab, select a storage controller and a logical drive.
b. Select the physical drive.
c. To locate the drive, enable the drive UID LED. This feature is available only for some physical drives.
d. To change the
physical drive state, you can click the icon next to the physical drive name. If you set the drive state to dedicated
hot spare, you must select one or multiple target logical drives.
Support for hot spare states of physical drives vary by storage controller type.
- Physical drives managed by an LSI storage controller support global hot spare and dedicated hot spare.
- Physical drives managed by a PMC storage controller support roaming hot spare and dedicated hot spare.
e. Click OK.
4. To view information about a physical drive that is not used for creating logical drive:
a. Click the Physical view tab, and then select the physical drive.
b. To locate the drive, enable the drive UID LED. This feature is available only for some physical drives.
c. To change the physical drive state, click the
icon next to the physical drive name. If
you set the drive state to dedicated hot spare, you must select one or multiple
target logical drives.
Support for hot spare states of physical drives vary by storage controller type.
- Physical drives managed by an LSI storage controller support global hot spare and dedicated hot spare.
- Physical drives managed by a PMC storage controller support roaming hot spare and dedicated hot spare.
d. Click OK.
Parameters
HDD and SSD drives
· Slot: Slot number of the physical drive.
· Drive number in BIOS: Physical drive number.
· Device Manufacturer: Vendor of the physical drive.
· Model: Model of the physical drive.
· Firmware version: Firmware version of the physical drive.
· Serial number: Serial number of the physical drive.
· Status: Status of the physical drive. Options include:
¡ Ready/Unconfigured Good/Unconfigured—The physical drive has been initialized or has not been configured, and it is available for RAID configuration and hot spare setting. The status name depends on the storage controller model.
¡ Unconfigured Bad—The physical drive is in abnormal state. To use the physical drive, you must change the physical drive state to Unconfigured Good. If an error has occurred on the physical drive, you will fail to change the physical drive state. In this case, you need to replace the faulty drive.
¡ Unconfigured Good (Foreign)—The physical drive has residual RAID information. After you clear residual RAID information, the physical drive state changes to Unconfigured Good.
¡ Unconfigured Bad (Foreign)—The physical drive has residual RAID information. After you clear residual RAID information, the physical drive state changes to Unconfigured Bad.
¡ Optimal/ Configured—The physical drive is already used to create a RAID. The status name depends on the storage controller model.
¡ Online—The physical drive is already used to create a RAID or the physical drive is in JBOD mode.
¡ Offline—The physical drive is disabled.
¡ Rebuilding—The physical drive is being used in RAID rebuilding.
¡ Hot Spare—The physical drive is already used as a hot spare.
¡ JBOD/Raw—The physical drive is a passthrough drive, which can be used directly in the OS without RAID building. The status name depends on the storage controller model.
¡ Failed/Fail—The physical drive failed.
¡ Unsupported—The physical dirve does not support creation of logical drives.
¡ RebuildWait—Indicates that the physical drive is waiting for RAID rebuilding.
¡ Erasing—Indicates that the physical drive is in the erasing state.
¡ PFA—The physical drive is analyzing possible failures.
¡ Copyback—Data is being copied from the hot spare disk back to the replacement drive of a failed drive. When this operation is complete, the hot spare returns to the hot standby state. This field is available only for a physical drive attached to an LSI storage controller.
¡ Global hot spare—Acts as the spare for all qualified logical drives managed by an LSI storage controller. After the faulty drive recovers, data will be transmitted back to the drive from the hot spare, and the hot spare continues to operate in global hot spare state.
¡ Roaming hot spare—Acts as the spare for the specified logical drive managed by a PMC storage controller. After the faulty drive recovers, the new physical drive will act as the roaming hot spare.
¡ Dedicated hot spare—Acts as the spare for the specified logical drives. After the faulty drive recovers, data will be transmitted back to the drive from the hot spare, and the hot spare continues to operate in dedicated spare state.
· Accumulated power-on hours: Cumulative power-on time of the drive in the current slot.
· Drive temperature: Temperature of the drive in the selected drive slot.
· Rebuilding progress: Rebuilding progress of the physical drive in RAID rebuilding. This field is available only when the physical drive is in Rebuilding state.
· Max speed: Interface speed of the physical drive. This field displays the negotiated speed, instead of the interface speed, for some storage controllers.
· Protocol: Protocol type of the physical drive.
· Media type: Physical drive type.
· Capacity: Capacity of the physical drive.
· Remaining life: Remaining SSD drive life in percent. Support for this field depends on the drive model.
· UID LED: Drive UID LED status. You can click this field to manage the drive UID LED.
NVMe drives
· Product name: Product name of the NVMe drive.
· Slot: Slot number of the NVMe drive.
· Drive number in BIOS: Physical drive number.
· Device manufacturer: Vendor of the NVMe drive.
· Vendor: Manufacturer of the NVMe drive.
· Status: NVMe drive status:
¡ Normal—The NVMe drive is operating correctly.
¡ Abnormal—PCIe err errors or Drive Fault errors have occurred on the NVMe drive.
¡ Spare space below threshold—The available space in the NVMe drive has fallen below the threshold.
¡ Temperature anomaly—The NVMe drive temperature is above the upper threshold or below the lower threshold.
¡ Subsystem degraded—The NVMe subsystem reliability has been degraded because of storage media or internal errors.
¡ Read-only mode—The NVMe drive has been placed in read only mode.
¡ Cache failed—The volatile memory backup device has failed.
¡ Pre-alarm—The service life of the NVMe drive has reached the alarm threshold.
¡ Idle—The NVMe drive is in normal state, but is not a member drive of a logical drive.
¡ Assigned—The NVMe drive is in normal state and acts as a member drive of a logical drive.
¡ Failed—The NVMe drive is damaged.
¡ PFA—Drive failure pre-analysis is in progress.
· Firmware version: Firmware version of the NVMe drive. This field displays N/A if HDM does not support displaying the firmware version of the NVMe drive.
· Serial number: Serial number of the NVMe drive.
· Model: Model of the NVMe drive.
· Interface type: Interface type of the NVMe drive.
· Capacity: Capacity of the NVMe drive.
· Physical location—NVMe drive slot number.
· Protocol—Protocol of NVMe drive.
· Slot number—NVMe drive slot number or PCIe slot number assigned to the drive by the system.
· Max speed—Maximum speed supported by the NVMe drive.
· Drive temperature: Temperature of the drive in the selected drive slot.
· Remaining life: Predicted remaining life of the NVMe drive in percent.
· Predicted remaining life(in days): Predicted remaining life of the NVMe drive in days. The value for this field is calculated based on the change of the drive lifespan. This field displays N/A when the calculation is not completed.
· Media type: NVMe drive type.
· UID LED: Drive UID LED status. You can click this field to manage the drive UID LED. This field is available only when the drive is directly connected to the drive backplane.
Configure drive service life alarm settings
Perform this task to view drive service life alarm settings, set enabling status of the alarm feature and alarm thresholds. With this feature enabled, the system reports an alarm of the corresponding severity level when the drive service life reaches the configured alarm threshold. With this feature disabled, the system reports a major alarm when the drive service life reaches 100%.
Procedure
1. On the top navigation bar, click System.
2. In the left navigation pane, select Storage.
3. Click Advanced Settings. In the dialog box that opens, select whether to enable the alarm feature. This feature is enabled by default.
If the alarm feature is enabled, configure minor and major alarm thresholds.
¡ The value range for the alarm thresholds is 0 to 100%.
¡ Make sure the major alarm threshold is equal to or greater than the minor alarm threshold.
¡ If no alarm thresholds are set, the default minor alarm threshold is 90% and the default major alarm threshold is 95%.
4. Click OK.
Restrictions and guidelines
The drive service life alarm settings support displaying the remaining life of SATA SSDs and NVMe SSDs.
Power management
Power on or power off the server
CAUTION: · The force power-off, force system reset, and force power-cycle actions might cause corruption or loss of data. When you perform these actions, make sure you fully understand their impact on the services. · Liquid leakage might cause the host to shut down and shield the physical power button. In this case, you cannot change the power state by pressing the physical power button. To use the physical power button, wait for the leakage to be resolved or modify the leakage policy. |
Power on or power off the server
1. On the top navigation bar, click System.
2. In the left navigation pane, select Power Management.
3. View the current power status of the server.
4. To change the power status, click the desired action.
5. Select whether to enable or disable the physical power button on the server as needed.
Configure AC power recovery
1. On the top navigation bar, click System.
2. In the left navigation pane, select Power Management.
3. View the automatic power-on status.
4. Set the power-on delay time. If you select Random, you can customize the delay time range.
5. Click Save.
Parameters
· Force system reset: Warm reboots the server without power cycling the server.
· Force power-off: Shuts down the server immediately by force. This action is equivalent to pressing the power button on the server for five seconds.
· Graceful power-off: Shuts down the operating system first, and then removes power from the server.
· Power on: Starts up the server.
· Force power-cycle: Powers off and then powers on the server.
· Disable physical power button: Controls the physical power button. With the power button disabled, users cannot use the physical power button to manage the power status of the server.
· Power-on policy—Select whether to start the server when the server is connected to the power source. Options are Always power on, Always power off, and Restore last power state.
¡ To have the server always automatically start up when it is connected to the power source, select Always power on.
¡ To have the server stay off when it is connected to the power source, select Always power off.
¡ To have the server return to the power state on the previous power-off, select Restore last power state.
· Power-on delay—Set the power-on delay time. If you select Random, you can customize the delay time range.
Manage power supplies
This feature allows you to view the summary and detailed information for power supplies, configure the power mode (including active/standby mode and load balancing mode), and enable cold standby power supply monitor as needed.
Restrictions and guidelines
If you fail to set the operating mode for multiple power supplies in bulk, HDM generates a log message only for the power supply with the lowest slot number.
To avoid configuration failure, set the power supply operating mode after the server starts up.
If Power Settings is unavailable, access the Intelligent Power Saving page and verify whether the power saving mode is enabled. Make sure you disable the power saving mode before configuring power settings.
To enable cold standby power supply monitor, make sure no health alarm exists for the power group and the group has two or more power supplies.
Cold standby power supply monitor can be enabled in both load balancing mode and active/standby mode.
View power supply information
1. On the top navigation bar, click System.
2. In the left navigation pane, select Power Management.
3. Click the Power Supply Info tab.
4. View power supply summary and detailed information.
5. To view the input voltage history, click the
voltage icon .
Set the power supply operating mode
1. On the top navigation bar, click System.
2. In the left navigation pane, select Power Management.
3. In the work pane, click the Power Supply Info tab.
4. Click Power Settings.
5. Select the power supply operating mode and the cold standby power supply monitoring mode. Options include:
¡ Load balancing—Allows all power supplies to provide power in a balanced way.
¡ Active/standby—Allows active power supplies to mainly provide power. In this mode, you must specify a minimum of one active power supply and a minimum of one standby power supply. If an active power supply fails, a standby power supply becomes active to supply power.
6. Click OK.
Parameters
· Power supply group 1 or 2: Information about power supply members in each group. Power supplies in different groups are independent from each other. Support for power supply grouping depends on the server model and power supply configuration.
· Power mode: Role of the power supply. Options include Active and Standby. The active power supplies provide power normally and the standby power supplies provide low power output.
· Power input: Input power of the power supply.
· Current status: Current status of the power supply. If a power supply is in abnormal state, review the event logs to locate the errors.
· Slot number: Number of the slot in which the power supply resides.
· Vendor: Manufacturer of the power supply.
· Model: Model of the power supply.
· Serial number: Unique code assigned by the manufacturer.
· Firmware version: Firmware version of the power supply.
· Rated power (W): Rated power of the power supply.
· Input voltage: Input voltage of the power supply.
· Output voltage: Output voltage of the power supply.
· Output power: Output power of the power supply.
· Power input mode: Power input mode. Options include:
¡ No input: The power supply is not connected to the power source.
¡ AC: The power supply is connected to an AC power source.
¡ HVDC: The power supply is connected to a high-voltage DC power source. The voltage is in the range of 192 V to 400 V.
¡ LVDC: The power supply is connected to a low-voltage DC power source. The voltage is in the range of 12 V to 72 V.
· Supported power input modes: Power input modes supported by the power supply. Options include:
¡ AC: The power supply supports only the AC input mode.
¡ AC or DC: The power supply supports both the AC and DC input modes.
¡ DC: The power supply supports only the DC input mode.
¡ Unknown: HDM has failed to obtain the power supply information.
· Fault description: Event log information about power supply errors.
· Cold standby power supply monitor: Monitor whether all the present cold standby power supplies in a power group can act as active power supplies to output power correctly. During the monitor, the system switches the power mode to load balancing and verifies whether the power output of the power group is correct.
¡ If the power output is correct, the system restores to the previous user-configured power mode.
¡ If the power output is incorrect, the power supplies keep operating in load balancing mode.
View power consumption information
Perform this task to view power consumption summary, power information, and power consumption history. You can view the 5-minute server power consumption statistics for the past 24 hours or seven days, including the maximum, average, and minimum power consumption.
Restrictions and guidelines
Some servers support displaying only the average sensor readings.
Only some servers support displaying CPU node power capping and GPU node power capping information.
Restoring HDM factory defaults clears the power consumption statistics.
Procedure
1. On the top navigation bar, click System.
2. In the left navigation pane, select Power Management.
3. In the work pane, click the Power Consumption tab.
4. View the power consumption summary, power alarming, system board power capping, CPU node power capping, GPU node power capping, and history power information.
¡ To clear the history readings and start a new statistics collection period, click Restart.
¡ To view power consumption in a time range, select a start time and end time, and then click OK.
¡ To
view only the maximum, average, or minimum power consumption, click the Max,
Avg, or
Min icon, respectively.
Configure power alarming and power capping
Power alarming allows the system to generate an alarm log when the total power consumption of the server exceeds the alarm threshold.
Power capping limits the power consumption of the server to a power cap value that is lower or equal to the maximum rated power of the server.
When the power cap value of the system board or CPU node is exceeded, the server attempts to decrease power consumption by automatically decreasing the operating frequency of system components such as processors.
When the GPU node power cap value is exceeded, the server attempts to decrease power consumption by automatically decreasing the operating frequency of GPUs.
Power capping fails if the power consumption cannot drop below the power cap value in 30 seconds. If power capping fails for the system board or CPU node, you can configure the server to shut down or continue to run on a power capping failure.
Restrictions and guidelines
CAUTION: Server shutdown upon a power capping failure causes service interruption. To use this function, make sure you understand the impact. |
Only some servers support CPU node power capping and GPU node power capping configuration.
Power capping is at the expense of system performance. Select the power cap value carefully to avoid undesirable decrease in performance.
To avoid GPU node power capping configuration invalidity, make sure the GPU driver is installed in the OS before configuring GPU node power capping settings.
HDM cannot obtain the server power consumption statistics during restart.
Configuring power alarming settings
1. On the top navigation bar, click System.
2. In the left navigation pane, select Power Management.
3. In the work pane, click the Power Consumption tab.
4. Click the icon
in the Power alarming section.
5. In the dialog box that opens, enable power alarming and then specify the alarm threshold.
6. Click OK.
Configuring system board power capping settings
1. On the top navigation bar, click System.
2. In the left navigation pane, select Power Management.
3. In the work pane, click the Power Consumption tab.
4. Click the icon
in the System board power capping section.
5. In the dialog box that opens, enable power capping, set the power cap value, and then set the action to take upon a power capping failure.
6. Click OK.
Configuring CPU node power capping settings
1. On the top navigation bar, click System.
2. In the left navigation pane, select Power Management.
3. In the work pane, click the Power Consumption tab.
4. Click the icon in the CPU node section.
5. In the dialog box that opens, enable power capping, set the power cap value, and then set the action to take upon a power capping failure.
6. Click OK.
Configuring GPU node power capping settings
1. On the top navigation bar, click System.
2. In the left navigation pane, select Power Management.
3. In the work pane, click the Power Consumption tab.
4. Click the icon in the GPU node section.
5. In the dialog box that opens, enable power capping and set the power cap value.
6. Click OK.
Configure processor power states
Perform this task to configure the processor power states and the power supply operating mode.
You can adjust the power consumption of processors by changing the processor power states.
Prerequisites
For the power states to take effect, configure the following tasks on the Socket Configuration > Advanced Power Management Configuration screen from the BIOS:
1. Set SpeedStep (P-States) to Enabled.
2. Set Hardware P-States to Disable.
3. Set Power Performance Tuning to BIOS Controls EPB.
After the operation, you must save the configuration and restart the host.
Restrictions and guidelines
The adjusted P-state takes effect immediately after you save the configuration and the P-state restores to the default after the server performs a cold reboot.
After saving the CPU power-efficient configuration, you must restart the server for the configuration to take effect. If you configure CPU power-efficient settings when BIOS is starting up, the settings will not take effect. Do not configure CPU power-efficient settings at BIOS startup.
Procedure
1. On the top navigation bar, click System.
2. In the left navigation pane, select Power Management.
3. Click the Processor Power States tab.
4. Click Advanced Settings.
5. Adjust the preferred P-state value and then click OK.
The available state values vary by processor model.
6. Select the power supply operating mode, and then click Save. The operating mode options include:
¡ Performance—Indicates the performance first mode.
¡ Balanced—Indicates the balanced performance and power consumption mode.
¡ Power—Automatically adapts the speed and energy consumption of the processors according to processor usage. This mode reduces the total consumption and has little or no impact on the performance.
Parameters
· P-state: Defines the operating frequency of processors. A smaller P-state value represents a higher operating frequency, which translates to higher performance and higher power consumption.
Thermal management
View status and readings of temperature sensors
HDM presents temperature data in both heatmap and table formats to help you monitor the cooling performance of the server.
· The temperature heatmaps use colors between green and red to show the temperature distribution inside the server chassis in 2D and 3D views and use circles to represent sensors. Green indicates 0°C (32°F). As the temperature gets higher, the color gets warmer until it changes to red. With the temperature heatmaps, you can quickly identify the component that is in a poor cooling condition.
· The temperature sensor table displays the temperature reading, status, and coordinates of each sensor.
Procedure
1. On the top navigation bar, click System.
2. In the left navigation pane, select Thermal Management.
3. View the temperature heatmap and sensor list.
Parameters
· Status: Temperature status of a component:
¡ Normal—The temperature is normal, between the lower and upper minor thresholds (exclusive). No action is required.
¡ Minor—The temperature is between the lower major threshold (exclusive) and lower minor threshold (inclusive) or between the upper minor threshold (inclusive) and upper major threshold exclusive). Administrative attention is required.
¡ Major—The temperature is between the lower critical threshold (exclusive) and lower major threshold (inclusive) or between the upper major threshold (inclusive) and upper critical threshold (exclusive). Immediate action is required.
¡ Critical—The temperature is equal to or below the lower critical threshold, or it is equal to or above the upper critical threshold. Immediate action is required.
¡ N/A—The monitored component is not installed or the temperature sensor cannot be read.
· Reading: Current temperature. If HDM fails to read the sensor, this field displays N/A.
· Thresholds: Temperature thresholds:
¡ Critical—Lower and upper critical thresholds. When the temperature reaches either threshold, the server might automatically shut down to avoid damage to its components.
¡ Major—Lower and upper major thresholds. If the temperature reaches either threshold, server performance will significantly degrade.
¡ Minor—Lower and upper minor thresholds. If the temperature reaches either threshold, server performance will slightly degrade.
Manage fans
Perform this task to view fan information and fan errors and configure the fan speed mode.
You can adjust the fan speed mode to optimize the cooling, noise control, and energy efficiency performance.
Restrictions and guidelines
To replace fan modules of different models, you must first power off the server. After the replacement, to view the most recent fan information, you must power on the server and restart the host.
Set the preferred fan speed mode
1. On the top navigation bar, click System.
2. In the left navigation pane, select Thermal Management.
3. View fan information.
4. Click Fans.
5. Select a fan speed mode and then click OK.
Parameters
· Total modules: Total number of fan modules, including both present and absent fan modules.
· Present modules: Total number of present fan modules.
· Total rotors: Total number of rotors under each fan model, including both present and absent fans. A fan might have a single rotor or two rotors, depending on the fan model.
· Present rotors: Total number of rotors in the present fan modules.
· Group X: Displays fan information by fan group if multiple fan groups exist.
· Location: Displays location for each rotator or fan when a fan contains two rotators or a fan module contains two fans.
· Status: Operation status of the fan.
· Model: Fan model.
· Rotation speed (RPM): Current actual rotational speed of the fan.
· Rotation speed (%): Ideal RPM based on current temperature as a percentage of the rated RPM.
· Fault description: Alarms generated for fan errors.
· Silent: Enables the fans to run at the lowest speed required by heat dissipation of the server. This mode is suitable for scenarios with high noise requirements.
· Balanced: Enables the fans to run at a higher speed to provide balanced noise control and cooling performance.
· Powerful: Enables the fans to run at the highest possible speed. This mode is suitable for scenarios where the server requires high cooling performance. For example, the server is busy and key components, such as processors, are heavily loaded, or the ambient temperature changes frequently.
· Custom: Specifies a customized fan speed level. A higher level represents a higher speed and larger noise.
Manage liquid cooing modules
Perform this task to view the summary, detailed, and fault information of liquid cooling modules and configure the liquid leakage policy as needed.
Restrictions and guidelines
If the leakage policy action is set to power-off, the system powers off the host and shields the physical power button in case of liquid leakage. If the policy action is set to not power-off, the system does not perform any action in case of liquid leakage.
Procedure
1. On the top navigation bar, click System.
2. In the left navigation pane, select Thermal Management.
3. Click Liquid cooling module info.
4. View information about liquid cooling modules.
5. To specify the action to take upon liquid leakage, click Liquid leakage settings. In the dialog box that opens, configure the liquid leakage policy.
6. Click Save.
Parameters
· Liquid cooing device: Name and ID of the liquid cooling device.
· Status: Operation status of the liquid cooling device.
· Fault description: Log information generated when a liquid cooling device fails.
BIOS settings
Restrictions and guidelines
Items for the BIOS settings are only available in English.
If you configure the BIOS settings when BIOS is starting up, the settings will not take effect. Do not configure the BIOS settings at BIOS startup.
Procedure
1. On the top navigation bar, click System.
2. In the left navigation pane, select BIOS Settings.
3. Select a target tab, and configure the BIOS settings.
4. To view explanation for an item, hover the
mouse pointer over the icon.
5. Click Save. The new configuration takes effect at next startup.
6. To cancel the settings that have not been saved, click Cancel.
7. To clear the preset settings to be applied, click Remove all preprovisioned settings. After clearing, the preset settings do not take effect at next startup.
Parameters
· Options: The BIOS options to be configured.
· Option value: Value of an available option.
· Preset value: Settings to be applied by the user. The preset settings take effect at next startup.
· Current value: Option value at the most recent startup.
Boot option configuration
This feature allows you to configure the boot mode and boot option for the server.
Restrictions and guidelines
· This feature is available only for servers installed with Intel processors.
· If the boot option validity is set to Permanent, you cannot set the next boot mode and the next boot option as None at the same time.
· Some servers do not support configuring the validity period for boot options and only allow the boot options to take effect once at next startup.
· The displayed sub-boot option configuration parameters depend on the obtained boot information.
· If you select to boot the system from the hard disk in Legacy mode, make sure the hard disk supports the Legacy mode.
· The sub-boot option configuration is not supported in Legacy mode.
· The boot option configuration might not take effect if you configure it at the BIOS startup stage.
Procedures
Configure boot option settings
1. On the top navigation bar, click System.
2. In the left navigation pane, select Boot Option Configuration.
3. Set the validity period to One time or Permanent.
4. Select the next boot mode and next boot option.
5. Configure the boot order.
¡ To
increase the boot priority of an option, select the option and click the icon.
¡ To
lower the boot priority of an option, select the option and click the icon.
¡ To
reset the boot order settings, click the icon.
6. View the current boot mode and current first boot option.
7. Click Save.
Configure sub-boot option settings
1. On the top navigation bar, click System.
2. In the left navigation pane, select Boot Option Configuration.
3. In the Sub-boot option configuration area, select a boot option.
4. Adjust the sub-boot option order.
¡ To
increase the boot priority of a
sub-boot option, select the sub-boot
option and click the icon.
¡ To
lower the boot priority of a
sub-boot option, select the sub-boot
option and click the icon.
5. Click Save.
Parameters
Boot option configuration
· One time: The boot option configuration only takes effect once at next startup. After the next startup, the boot option configuration will be restored to the default.
· Permanent: The boot option configuration takes effect permanently.
· Next boot mode: Select the next boot mode for the server. Options include Legacy, UEFI, and None. The None configuration indicates that no modification is made to the server boot mode and the server will start with the boot mode configured in the BIOS.
· Next boot option: Configure the first boot option at next startup. The None configuration indicates that no modification is made to the server boot option and the server will start with the boot order configured in the BIOS.
· Boot order: Configure the boot order. Other Device indicates other boot options, including:
¡ Unidentified boot devices.
¡ Embedded UEFI shell. This option is available only when EFI Shell Boot is set to Enabled in the BIOS.
Sub-boot option configuration
· Boot option: Select the boot option to be configured.
· Sub-boot option order: Configure the sub-boot option order. The device will start from the first sub-boot option at next startup.
HDM Configuration
Network
You can log in to HDM from the HDM dedicated network port or the HDM shared network port.
The dedicated network port can process only HDM management traffic. By default, the dedicated network port uses IPv4 address 192.168.1.2/24 and obtains an IPv6 address from the DHCP server. HDM dedicated network port is unavailable for some servers.
The shared network port transmits HDM management traffic and server data traffic simultaneously. By default, the shared network port automatically obtains its IP address through DHCP.
General restrictions and guidelines for network configuration
To ensure the network connectivity of HDM, follow these restrictions and guidelines when you configure network settings:
· To avoid network errors, make sure the HDM dedicated network port, HDM shared network port, and the WLAN use different IP addresses from different subnets.
· Do not disable the HDM dedicated network port and the shared network port at the same time. HDM Web interface will be inaccessible if both network ports are disabled.
· Any change to network settings can cause HDM user sessions to disconnect and take a few minutes to take effect. After you change network settings, reconnect to the HDM Web interface at prompt.
After you change network settings, wait for the configuration to take effect before you restart the server.
General configuration
Restrictions and guidelines
Verify that the network interface to be used as the shared network port is in up state before manually changing the shared network port.
The change of the shared network port does not require reconfiguring port network settings. All the network settings except for the IP address obtained through DHCP continue to take effect after the change. If the IP address of the HDM shared port is obtained through DHCP, the DHCP server re-assigns an IP address to the shared network port after you change it.
If you disable automatic shared port selection and do not specify an interface as the shared port, the system uses the shared port specified before you enabled the feature. Make sure the port is in up state. If the port is in down state, HDM will be inaccessible.
Before importing a configuration file to edit network port selection and network port mode, make sure the file content is intact and correct.
Aggregate links are used once you enabled the automatic shared port selection.
If you use one NCSI cable to connect two network adapters to the server, HDM only displays information about the connected network adapter.
As a best practice, use Port 1 or Port 2 on a four-port shared network adapter. To use Port 3 or Port 4, first switch to Port 1 or Port 2 of the network adapter, and then switch to the desired port.
Configuring the host name
1. On the top navigation bar, click Configuration.
You are placed on the Network page.
2. In the Set hostname section, select Manual or Auto configuration for the host.
¡ If you select manual configuration, enter the host name manually.
¡ If you select automatic configuration, the host name is set to HDM+serial_number by default.
3. Click Save.
Connecting HDM to a network
1. On the top navigation bar, click Configuration.
You are placed on the Network page.
2. In the Connection config section, select the network mode from Normal mode and Active/Standby mode.
¡ If you select normal mode, you can select whether to enabled HDM shared network port. After enabling, you can view the status of the automatic network adapter selection, and configure the automatic shared port selection or specify the port manually.
¡ If you select active/standby mode, the shared network port is enabled automatically for accessing HDM once the dedicated port fails, and cannot be disabled. After enabling, you can view the status of the automatic network adapter selection, and configure the automatic shared port selection or specify the port manually.
3. Click Save.
Parameters
· Host name: Name of the HDM host, a string of 1 to 63 characters. For special characters, only hyphens (-) are allowed but the string cannot start or end with a hyphen (-).
· Normal mode—The HDM dedicated and shared network ports have separate IP addresses and operate in active/active mode. HDM is accessible at both ports. This is the default mode.
· Active/standby mode—The HDM dedicated and shared network ports have separate IP addresses and operate in active/standby mode. In this mode, the dedicated port is the primary port and the shared network is the secondary port. HDM is accessible at the dedicated port as long as the dedicated port is up and has network connectivity. After the dedicated port fails, HDM is accessible at the shared port. In standby mode, the shared port cannot forward management traffic, but it can still forward data traffic.
Dedicated network port
Perform this task to view and configure information about the dedicated network port, including MAC address, connection status, IPv4 and IPv6 addresses, VLAN settings, and self-negotiation settings.
Domain Name System (DNS) is a distributed database used by TCP/IP applications to translate domain names into IP addresses. You can configure DNS to enable access to HDM by using a domain name instead of the management IP address of HDM.
Access the HDM Web interface for the actual configuration.
Restrictions and guidelines
See "General restrictions and guidelines for network configuration."
If you cannot log in to HDM at its IPv6 address, disable proxy server in the browser and then try again.
If you are manually specifying IPv6 addresses of DNS servers, specify global IPv6 addresses.
If an invalid DNS server address is configured, the DNS registration might take a long time.
DNS is configurable only when the corresponding IPv4 or IPv6 network service is enabled.
The DNS configuration might change only when the following conditions are met:
· The obtaining method of an IPv4 or IPv6 address changes from DHCP server assignment to manual configuration.
· The Configure DNS service field is IPv4 (Auto)/IPv6 (Auto).
In this case, the Configure DNS service field will switch to Manual automatically and the system will continue to use the domain suffix and DNS server information before the switch.
After disabling IPv6 configuration, you can still use the IPv6 link-local address.
If the server is installed with the Delta Hopper module firmware, do not configure IP address 192.168.31.0, 192.168.31.1, or 192.168.31.2 for the server.
Prerequisites
Verify that the dedicated network port is physically connected to the network.
Viewing dedicated network port information
1. On the top navigation bar, click Configuration.
You are placed on the Network page.
2. On the Dedicated Port tab, view information about the dedicated network port.
3. (Optional.) To view the state of an address, hover over the icon before the link local address or IPv6 address. Available states include Pending, Failed, and Active.
Configuring IPv4 settings
1. On the top navigation bar, click Configuration.
You are placed on the Network page.
2. On the Dedicated Port tab, click Configure.
3. Select Enable for IPv4 to enable IPv4 network service.
4. Configure IPv4 address settings for the port:
¡ To use the IP address automatically assigned by a DHCP server, select Automatic IP obtaining.
¡ To manually configure static IP address settings, clear Automatic IP obtaining, and then enter an IPv4 address, subnet mask, and default gateway address.
5. In the Configure DNS service area, select Enable for DNS service.
6. Select Manual, or IPv4 (Auto) from the Configure DNS service field. To select IPv4 (Auto), you must enable Automatic IP Obtaining first.
¡ If you select IPv4 (Auto), the Domain suffix field will be automatically populated, and HDM will search for DNS servers automatically.
¡ If you select Manual, enter a domain suffix in the Domain suffix field, and enter the IP addresses of DNS servers. The DNS server information is optional. If you do not enter any information about DNS servers, the DNS configuration cannot take effect.
7. Configure the destination address, mask, and gateway in the Static route 1 configuration and Static route 2 configuration fields.
¡ The host number of the destination address must be all zero.
¡ The addresses cannot be on the same network segment as the IPv4 address used by the network interface, including static and dynamic addresses.
¡ Make sure any two routes are on different network segments.
8. Click Save.
Configuring IPv6 settings
1. On the top navigation bar, click Configuration.
You are placed on the Network page.
2. On the Dedicated Port tab, click Configure.
3. Select Enable for IPv6 to enable IPv6 network service.
4. Configure IPv6 address settings for the port:
¡ To use the IP address automatically assigned by a DHCP server, select Automatic IP obtaining.
¡ To manually configure static IP address settings, clear Automatic IP obtaining, and then enter an IPv6 address, the prefix length (in the range of 1 to 127), and a default gateway address.
5. In the Configure DNS service area, select Enable for DNS service.
6. Select Manual, or IPv6 (Auto) from the Configure DNS service field. To select IPv6 (Auto), you must enable Automatic IP Obtaining first.
¡ If you select IPv6 (Auto), the Domain suffix field will be automatically populated, and HDM will search for DNS servers automatically.
¡ If you select Manual, enter a domain suffix in the Domain suffix field, and enter the IP addresses of DNS servers. The DNS server information is optional. If you do not enter any information about DNS servers, the DNS configuration cannot take effect.
7. Configure the destination address, prefix length, and gateway in the Static route 1 configuration and Static route 2 configuration fields.
¡ The host number of the destination address must be all zero.
¡ The value range of the prefix is 4 to 128.
¡ The address cannot be on the same network segment as the IPv6 address used by the network interface, including static and dynamic addresses.
¡ Make sure any two routes are on different network segments.
8. Click Save.
Configuring VLAN settings
1. On the top navigation bar, click Configuration.
You are placed on the Network page.
2. On the Dedicated Port tab, click Configure.
3. Select Enable for VLAN to enable VLAN service.
4. Enter a VLAN ID in the range of 2 to 4094.
5. Enter an 802.1p priority in the range of 0 to 7.
The 802.1p priority determines the transmission priority of the traffic from the VLAN when congestion occurs. The higher the value, the higher the priority.
6. Click Save.
Configuring self-negotiation settings
1. On the top navigation bar, click Configuration.
You are placed on the Network page.
2. On the Dedicated Port tab, click Configure.
3. In the Auto-negotiation section, perform the following tasks:
¡ If you enable self-negotiation settings, the dedicated port will negotiate with the switch to set the duplex mode and speed automatically. No manual configuration is required.
¡ If you disable self-negotiation settings, you are required to configure the duplex mode and speed manually.
4. Click Save.
Parameters
· Port connection: Displays whether a cable is connected to the port. Options include:
¡ Disconnected—The port is disconnected.
¡ Active—The port is connected and is in active state.
· Domain suffix: Domain prefix registered in DNS server. This domain suffix will be automatically combined with the HDM host name to form a fully qualified domain name for HDM access.
· DNS server 1 to 3: Specifies DNS servers. You can specify a maximum of three DNS servers. The priorities of DNS servers 1, 2, and 3 are in descending order.
· Destination: Destination network address to which the packet will be sent.
· Mask: Subnet mask of the network address.
· Gateway: Address of the gateway connected to the interface of the adjacent router.
· Full-duplex: Data can be transmitted by using the dedicated network port in both directions at the same time.
· Half-duplex: Data can be transmitted by using the dedicated network port only in one direction at a time.
Shared network port
Perform this task to view and configure information about the shared network port, including MAC address, connection status, IPv4 and IPv6 addresses, and VLAN settings.
Domain Name System (DNS) is a distributed database used by TCP/IP applications to translate domain names into IP addresses. You can configure DNS to enable access to HDM by using a domain name instead of the management IP address of HDM.
Restrictions and guidelines
See "General restrictions and guidelines for network configuration."
If you cannot log in to HDM at its IPv6 address, disable proxy server in the browser and then try again.
If you are manually specifying IPv6 addresses of DNS servers, specify global IPv6 addresses.
If the network port mode is active/standby, any IP configuration on the shared network port will be synchronized to the other shared network ports and the dedicated network port.
If an invalid DNS server address is configured, the DNS registration might take a long time.
DNS is configurable only when the corresponding IPv4 or IPv6 network service is enabled.
The DNS configuration might change only when the following conditions are met:
· The obtaining method of an IPv4 or IPv6 address changes from DHCP server assignment to manual configuration.
· The Configure DNS service field is IPv4 (Auto)/ IPv6 (Auto).
In this case, the Configure DNS service field will switch to Manual automatically and the system will continue to use the domain suffix and DNS server information before the switch.
After disabling IPv6 configuration, you can still use the IPv6 link-local address.
If the server is installed with the Delta Hopper module firmware, do not configure IP address 192.168.31.0, 192.168.31.1, or 192.168.31.2 for the server.
Prerequisites
Verify that the dedicated network port is physically connected to the network.
Verify that the shared network port is in Active state if the network port mode is active/standby.
Viewing shared network port information
1. On the top navigation bar, click Configuration.
You are placed on the Network page.
2. On the Shared Port tab, view information about the shared network port.
3. (Optional.) To view the state of an address, hover over the icon before the link local address or IPv6 address. Available states include Pending, Failed, and Active.
Configuring IPv4 settings
1. On the top navigation bar, click Configuration.
You are placed on the Network page.
2. Click the Shared Port tab.
3. Click Configure.
4. Select Enable for IPv4 to enable IPv4 network service.
5. Configure IPv4 address settings for the port:
¡ To use the IP address automatically assigned by a DHCP server, select Automatic IP obtaining. This is the default setting.
¡ To manually configure static IP address settings, clear Automatic IP obtaining, and then enter an IPv4 address, subnet mask, and default gateway address.
6. In the Configure DNS service area, select Enable for DNS service.
7. Select Manual, or IPv4 (Auto) from the Configure DNS service field. To select IPv4 (Auto), you must enable Automatic IP Obtaining first.
¡ If you select IPv4 (Auto), the Domain suffix field will be automatically populated, and HDM will search for DNS servers automatically.
¡ If you select Manual, enter a domain suffix in the Domain suffix field, and enter the IP addresses of DNS servers. The DNS server information is optional. If you do not enter any information about DNS servers, the DNS configuration cannot take effect.
8. Configure the destination address, mask, and gateway in the Static route 1 configuration and Static route 2 configuration fields.
¡ The host number of the destination address must be all zero.
¡ The addresses cannot be on the same network segment as the IPv4 address used by the network interface, including static and dynamic addresses.
¡ Make sure any two routes are on different network segments.
9. Click Save.
Configuring IPv6 settings
1. On the top navigation bar, click Configuration.
You are placed on the Network page.
2. Click the Shared Port tab.
3. Click Configure.
4. Select Enable for IPv6 to enable IPv6 network service.
5. Configure IPv6 address settings for the port:
¡ To use the IP address automatically assigned by a DHCP server, select Automatic IP obtaining.
¡ To manually configure static IP address settings, clear Automatic IP obtaining, and then enter an IPv6 address, the prefix length (in the range of 1 to 127), and a default gateway address.
6. In the Configure DNS service area, select Enable for DNS service.
7. Select Manual, or IPv6 (Auto) from the Configure DNS service field. To select IPv6 (Auto), you must enable Automatic IP Obtaining first.
¡ If you select IPv6 (Auto), the Domain suffix field will be automatically populated, and HDM will search for DNS servers automatically.
¡ If you select Manual, enter a domain suffix in the Domain suffix field, and enter the IP addresses of DNS servers. The DNS server information is optional. If you do not enter any information about DNS servers, the DNS configuration cannot take effect.
8. Configure the destination address, prefix length, and gateway in the Static route 1 configuration and Static route 2 configuration fields.
¡ The host number of the destination address must be all zero.
¡ The value range of the prefix is 4 to 128.
¡ The addresses cannot be on the same network segment as the IPv6 address used by the network interface, including static and dynamic addresses.
¡ Make sure any two routes are on different network segments.
9. Click Save.
Configuring VLAN settings
1. On the top navigation bar, click Configuration.
You are placed on the Network page.
2. Click the Shared Port tab.
3. Click Configure.
4. Select Enable for VLAN to enable VLAN service.
5. Enter a VLAN ID in the range of 2 to 4094.
6. Enter an 802.1p priority in the range of 0 to 7.
The 802.1p priority determines the transmission priority of the traffic from the VLAN when congestion occurs. The higher the value, the higher the priority.
7. Click Save.
Parameters
· Connection Information: Displays connection information about shared network ports, including automatic shared port selection state, Ethernet adapter type, and whether a cable is connected to each port. This field is not available when no Ethernet adapter is installed or the installed Ethernet adapters do not support NCSI. Options include:
¡ Disconnected—The port is disconnected.
¡ Connected—The port is connected but is not in active state.
¡ Active—The port is connected and is in active state.
· Domain suffix: Domain prefix registered in DNS server. This domain suffix will be automatically combined with the HDM host name to form a fully qualified domain name for HDM access.
· DNS server 1 to 3: Specifies DNS servers. You can specify a maximum of three DNS servers. The priorities of DNS servers 1, 2, and 3 are in descending order.
· Destination: Destination network address to which the packet will be sent.
· Mask: Subnet mask of the network address.
· Gateway: Address of the gateway connected to the interface of the adjacent router.
Active/standby mode
With the active/standby mode enabled, you can perform this task to view and configure the ports, including the MAC address, connection status, IPv4 and IPv6 addresses, and VLAN settings.
Restrictions and guidelines
DNS is configurable only when the corresponding IPv4 or IPv6 network service is enabled.
The DNS configuration might change only when the following conditions are met:
· The obtaining method of an IPv4 or IPv6 address changes from DHCP server assignment to manual configuration.
· The Configure DNS service field is IPv4 (Auto)/ IPv6 (Auto).
In this case, the Configure DNS service field will switch to Manual automatically and the system will continue to use the domain suffix and DNS server information before the switch.
If an invalid DNS server address is configured, the DNS registration might take a long time.
VLAN settings take effect only when the active/standby mode is enabled and the shared network port is used.
After disabling IPv6 configuration, you can still use the IPv6 link-local address.
If the server is installed with the Delta Hopper module firmware, do not configure IP address 192.168.31.0, 192.168.31.1, or 192.168.31.2 for the server.
Viewing port information
1. On the top navigation bar, click Configuration.
You are placed on the Network page.
2. On the Active/Standby Mode Port tab, view the port information.
3. (Optional.) To view the state of an address, hover over the icon before the link local address or IPv6 address. Available states include Pending, Failed, and Active.
Configuring IPv4 settings
1. On the top navigation bar, click Configuration.
You are placed on the Network page.
2. Click the Active/Standby Mode tab.
3. Click Configure.
4. Select Enable for IPv4 to enable IPv4 network service.
5. Configure IPv4 address settings for the port:
¡ To use the IP address automatically assigned by a DHCP server, select Automatic IP obtaining. This is the default setting.
¡ To manually configure static IP address settings, clear Automatic IP obtaining, and then enter an IPv4 address, subnet mask, and default gateway address.
6. In the Configure DNS service area, select Enable for DNS service.
7. Select Manual, or IPv4 (Auto) from the Configure DNS service field. To select IPv4 (Auto), you must enable Automatic IP Obtaining first.
¡ If you select IPv4 (Auto), the Domain suffix field will be automatically populated, and HDM will search for DNS servers automatically.
¡ If you select Manual, enter a domain suffix in the Domain suffix field, and enter the IP addresses of DNS servers. The DNS server information is optional. If you do not enter any information about DNS servers, the DNS configuration cannot take effect.
8. Configure the destination address, mask, and gateway in the Static route 1 configuration and Static route 2 configuration fields.
¡ The host number of the destination address must be all zero.
¡ The addresses cannot be on the same network segment as the IPv4 address used by the network interface, including static and dynamic addresses.
¡ Make sure any two routes are on different network segments.
9. Click Save.
Configuring IPv6 settings
1. On the top navigation bar, click Configuration.
You are placed on the Network page.
2. Click the Active/Standby Mode tab.
3. Click Configure.
4. Select Enable for IPv6 to enable IPv6 network service.
5. Configure IPv6 address settings for the port:
¡ To use the IP address automatically assigned by a DHCP server, select Automatic IP obtaining.
¡ To manually configure static IP address settings, clear Automatic IP obtaining, and then enter an IPv6 address, the prefix length (in the range of 1 to 127), and a default gateway address.
6. In the Configure DNS service area, select Enable for DNS service.
7. Select Manual, or IPv6 (Auto) from the Configure DNS service field. To select IPv6 (Auto), you must enable Automatic IP Obtaining first.
¡ If you select IPv6 (Auto), the Domain suffix field will be automatically populated, and HDM will search for DNS servers automatically.
¡ If you select Manual, enter a domain suffix in the Domain suffix field, and enter the IP addresses of DNS servers. The DNS information filed field is optional. If you do not enter any information about DNS servers, the DNS configuration cannot take effect.
8. Configure the destination address, prefix length, and gateway in the Static route 1 configuration and Static route 2 configuration fields.
¡ The host number of the destination address must be all zero.
¡ The value range of the prefix is 4 to 128.
¡ The addresses cannot be on the same network segment as the IPv6 address used by the network interface, including static and dynamic addresses.
¡ Make sure any two routes are on different network segments.
9. Click Save.
Configuring VLAN settings
1. On the top navigation bar, click Configuration.
You are placed on the Network page.
2. Click the Active/Standby Mode tab.
3. Click Configure.
4. Select Enable for VLAN to enable VLAN service.
5. Enter a VLAN ID in the range of 2 to 4094.
6. Enter an 802.1p priority in the range of 0 to 7.
The 802.1p priority determines the transmission priority of the traffic from the VLAN when congestion occurs. The higher the value, the higher the priority.
7. Click Save.
Parameters
· Connection Information: Displays connection information about shared network ports, including automatic shared port selection state, Ethernet adapter type, and whether a cable is connected to each port. This field is not available when no Ethernet adapter is installed or the installed Ethernet adapters do not support NCSI. Options include:
¡ Disconnected—The port is disconnected.
¡ Connected—The port is connected but is not in active state.
¡ Active—The port is connected and is in active state.
· Domain suffix: Domain prefix registered in DNS server. This domain suffix will be automatically combined with the HDM host name to form a fully qualified domain name for HDM access.
· DNS server 1 to 3: Specifies DNS servers. You can specify a maximum of three DNS servers. The priorities of DNS servers 1, 2, and 3 are in descending order.
· Destination: Destination network address to which the packet will be sent.
· Mask: Subnet mask of the network address.
· Gateway: Address of the gateway connected to the interface of the adjacent router.
Configure LLDP
The Link Layer Discovery Protocol (LLDP) is a standard link layer protocol that allows network devices from different vendors to discover neighbors and exchange system and configuration information.
Perform this task to set the status and working mode of LLDP, and view related information about LLDP.
Procedure
1. On the top navigation bar, click Configuration.
2. In the left navigation pane, select LLDP.
3. Enable or disable LLDP as needed. By default, LLDP is disabled.
4. If you select to enable LLDP, select a working mode and then click Save. By default, the working mode is TxRx.
5. View information about the received LLDP frames.
The list displays information about all connected devices of the server. If a device is unreachable or does not support displaying or sending LLDP frames, the corresponding fields display N/A.
Parameters
· Working mode: Working mode of LLDP.
¡ Tx—Transmit mode. The device only sends but does not accept LLDP frames. This mode is suitable for scenarios that require information about the device itself, but do not require information about other devices.
¡ Rx—Receive mode. The device only accepts but does not send LLDP frames. This mode is suitable for scenarios that require other device information but do not require information about the device itself.
¡ TxRx—Transmit and receive mode. The device sends and receives LLDP frames. This mode is suitable for scenarios that require the exchange of device information.
· Network port: Network port of the server that receives LLDP frames.
· Switch MAC address: MAC address of the connected switch.
· Switch system name: System name of the connected switch.
· Port number: Number of the connected switch port.
· Port info: Information about the connected switch port, port name for example.
· VLAN ID: ID of the VLAN to which the server port belongs.
Configure Wi-Fi settings
Perform this task to configure Wi-Fi settings after you connect a USB Wi-Fi adapter to the server. This enables users to access the server through wireless connections and view information about online wireless clients.
Restrictions and guidelines
To restore the network shut down by idle timeout, you can reconnect the USB Wi-Fi adapter or log in to HDM to enable the network.
If the server is installed with the Delta Hopper module firmware, do not configure IP address 192.168.31.0, 192.168.31.1, or 192.168.31.2 for the server.
Procedure
1. On the top navigation bar, click Configuration.
2. In the left navigation pane, select Wi-Fi Management.
The page that opens displays current Wi-Fi settings and information about online wireless clients.
3. Select whether to enable the dedicated management port.
4. Configure Wi-Fi settings as needed:
¡ Enter the Wi-Fi name.
¡ Select the encryption method. If you select Encrypted, you must also specify a Wi-Fi password.
¡ Specify the idle timeout.
¡ Enter the IPv4 address of the wireless network.
¡ Specify the IPv4 address range for IP address assignment to clients.
5. Click Save.
Parameters
· Device status: Presence status of the USB Wi-Fi adapter.
· Wi-Fi name: Name of the wireless network, a case-sensitive string of 1 to 31 characters. Only letters, digits, dots (.), hyphens (-), and underscores (_) are allowed. This field is required. By default, the name is in the HDM_WIFI_xxxxxx format, where xxxxxx represents the last 6 characters of the MAC address of HDM dedicated management port.
· Encryption mode: Whether to enable network encryption. By default, the network is not encrypted.
· Wi-Fi password: Password of the wireless network, a case-sensitive string of 8 to 63 characters. Only letters, digits, spaces, and special characters `~!@#$%^&*()_+-=[]\{}|;':,./<>? are allowed. This field is required if the encryption mode is Encrypted.
· Idle timeout: Maximum idle period before the network is shut down, in the range of 0 to 200 hours. 0 indicates that wireless network will not be shut down. By default, the value is 1. A network is considered idle if no online clients exist.
· Wi-Fi IP address: IP address of the wireless network. By default, the IP address is 192.168.199.1. The subnet mask is fixed to 255.255.255.0. The IP address cannot belong to the same subnet as the IP address of the HDM dedicated or shared network port.
· IP range: IPv4 address range for IP address assignment to online clients. Make sure the IP address range is in the same subnet as the Wi-Fi IP address. The subnet mask is fixed to 255.255.255.0.
· No.: Number of an online client. The system allows a maximum of two clients to come online at the same time.
· Client MAC address: MAC address of an online client.
· Client IP address: IPv4 address of an online client.
· Host name: Host name of an online client.
NTP
Use this feature to obtain the correct system date and time from an NTP server.
You can manually specify one primary NTP server, one secondary NTP server, and one tertiary NTP server. When synchronizing time with NTP, HDM first uses the primary NTP server. If the primary NTP server is not available, HDM uses the secondary NTP server. If neither the primary nor secondary server is available, HDM uses the tertiary NTP server.
With HDM, you can also choose to obtain NTP server settings from the DHCP server when all manually specified NTP servers are unavailable. If the DHCP server is not available, HDM uses the system date and time obtained in the most recent successful NTP time synchronization or uses the local system date and time.
Configure NTP settings
Restrictions and guidelines
If time synchronization with the NTP server fails because the NTP server is not reachable, the Web interface displays an error message about the failure to obtain date and time from the NTP server. To synchronize with the NTP server after it becomes reachable or to start new time synchronization, you must click Save again. HDM does not perform time synchronization without being triggered by the Save action.
Procedure
1. On the top navigation bar, click Configuration.
2. In the left navigation pane, select NTP.
3. In the work pane, select the time zone of the server.
4. Select Enable or Disable for Time auto sync.
¡ With this feature enabled, HDM synchronizes time settings with a manually specified NTP server. If the manually specified NTP servers fail, HDM synchronizes settings with the NTP server obtained from the DHCP server. This is the default setting.
¡ With this feature disabled, HDM synchronizes time settings with ME. After the BIOS reboots, HDM starts to synchronize time settings based on the time in the BIOS (UTC time) and the specified time zone. For example, if the specified time zone is UTC+8, HDM uses a time eight hours earlier than the time in the BIOS.
5. If you select Enable for Time auto sync, set the NTP synchronization interval, and enter the addresses of the primary, secondary, and tertiary NTP servers.
The server addresses can be IPv4 addresses, IPv6 addresses, or domain names. The secondary and tertiary servers are optional. The HDM server uses the secondary NTP server only when the primary NTP server fails, and uses the tertiary NTP server only when both the primary and secondary NTP servers fail.
By default, the primary NTP server address is 1.cn.pool.ntp.org, the secondary NTP server address is 2.cn.pool.ntp.org, and the tertiary server address is not specified.
6. Click Save.
HDM attempts to synchronize time.
Parameters
NTP sync interval: Set the interval at which HDM synchronizes time from the NTP server. By default, the interval is 3600 seconds. The value range is 600 to 2592000 seconds. This setting takes effect only when NTP is configured.
License management
To use license-based features, you must purchase licenses from server manufacturers and install the licenses. For more information about license-based features of HDM, see the HDM license matrixes for HDM. For more information about obtaining licenses, see the license user guide.
After obtaining an activation file, you can use this feature to install the activation file and then use the license-based features. To transfer an activation file to another server, you must uninstall the activation file, export the uninstall file, and then use the uninstall file and the target server DID to apply for a new activation file from the license management platform.
Restrictions and guidelines
· Before installing the activation file of a formal license, make sure the server DID is the same as the DID used to apply for the activation file and the license state for the server meets any one of the following conditions:
¡ The server is not installed with any activation file of a formal license or trial license.
¡ The activation files of other licenses are uninstalled and the corresponding uninstall files are exported.
¡ The activation file of the current trial license is expired.
¡ The activation file of the trial license is uninstalled.
· Before installing the activation file of a trial license, make sure the server DID is the same as the DID used to apply for the activation file and the activation file is still valid.
· Only administrator role users and custom users that have the configuration privileges can use the license management feature.
Procedure
1. On the top navigation bar, click Configuration.
2. In the left navigation pane, select License Management.
3. Click .
On the page that opens, select an activation file.
4. Click Activate to install the activation file.
5. After installation, perform the following tasks as needed:
¡ View the serial number, type, state, and validity period for the license.
¡ To
export the activation file for
backup purpose, click the icon in the Licensing State field.
¡ To uninstall the activation file, click License Management and select Uninstall. On the page that opens, enter the user login password and click OK. HDM will uninstall the activation file once the password verification succeeds.
¡ After uninstalling the activation file, to export the corresponding uninstall file, click Export Uninstall File.
Parameters
· DID Code: Device identification code.
· License SN: Serial number of the license.
· License Type:
¡ Formal: A formal license can be installed, uninstalled, and transferred and is valid permanently.
¡ Trial: A trial license can be installed, uninstalled, cannot be transferred, and is valid for 90 days. When a trial license expires, the license-based feature becomes unavailable. To continue to use the feature, you must purchase and install a formal license for it.
· License State: Status of the license. Options include In Use, Expired Soon, Expired, Uninstalled, and Unavailable. When the license status becomes unavailable, contact Technical Support.
· License Validity: Valid duration for the activation file.
Remote services
Access services
HDM provides access services including access to various storage devices (for example, CD/DVD and drives), remote control, and multiple access methods (for example, SNMP and SSH). With the administrator role, you can control which services HDM offers to users.
View or close HDM user sessions
Restrictions and guidelines
The available services vary by server model.
Procedure
1. On the top navigation bar, click Remote Services.
You are placed on the Services page.
2. In the work pane, click View in the Actions column for an access service entry.
3. On the page that opens, view detailed information about HDM user sessions.
4. To close a session, click the Delete link in that session entry.
5. To return to the previous page, click Close.
Parameters
· Name: Name of the service.
HDM provides the following services:
¡ CD-Media—Access to the virtual CDs and DVDs.
¡ FD-Media—Access to the virtual floppy disk drives.
¡ HD-Media—Access to the virtual drives and USB.
¡ HTTP—Connect to HDM by using Hyper Text Transfer Protocol (HTTP).
¡ HTTPS—Connect to HDM by using Hyper Text Transfer Protocol over SecureSocket Layer (HTTPS).
¡ iHDT—Access to the hardware debug tool (HDT) for client debugging.
¡ IPMI—Remote Management Control Protocol (RMCP) or RMCP+ connections to HDM.
¡ KVM—Access to the server from a remote console.
¡ ASD (Remote_XDP)—Remote debugging tool for Intel platform, supporting remote debugging and diagnosis through XDP. This option is available only for some servers installed with Intel processors.
¡ SNMP—SNMP access to HDM.
¡ SSDP—SSDP access to HDM.
¡ SSH—SSH access to HDM.
¡ Telnet—Telnet access to HDM.
¡ VNC—Access to the server from a VNC client.
· Status: Status of the service. Options include:
¡ Disabled.
¡ Port_type. This field is displayed when the service is enabled.
· Insecure service port: Port used for unencrypted communication of the service.
· Secure service port: Port used for encrypted communication of the service.
· Idle timeout: Idle timeout time of the user session, in minutes. A user session automatically disconnects when it times out.
· Maximum sessions: Maximum number of sessions supported for the service. The maximum number of sessions supported for HTTP or HTTPS is not fixed, but the total maximum number of the two types of sessions is 20.
· Session ID: ID that identifies the session among HDM user sessions. An asterisk (*) mark indicates that the session was established by using the IP address with which the client accesses the current Web interface.
· Session type: Protocol type or service type of the session.
· User ID: ID of the user account in the user list on the Users & Security > Users page. 0 indicates that the user is neither a local user nor a domain user.
· Username: Username of the user account.
· User type: Type of the user account.
· IP address: IP address of the user using the service.
· User role: User role of the user account, which represents a set of access privileges.
Edit an access service
Restrictions and guidelines
The available services vary by server model.
If you change the default secure or insecure service port of a service, follow these guidelines when you use that service:
· If you change the default IPMI service port number (623), you must use the -p parameter to explicitly specify the port number when you execute an IPMI command.
· The secure IPMI service port is enabled by default. You must specify the same port number for the secure and insecure ports.
· If you change the default secure or insecure HTTP or HTTPS service port number, you must explicitly specify the HTTP or HTTPS service port when you access HDM from a Web browser. The HDM URL address format is http://ip_address:port and https://ip_address:secure-port for insecure port and the secure port, respectively.
· You can disable the insecure HTTP service port for users to access HDM only from the secure HTTP service port, but you cannot disable the secure HTTPS service port. When the insecure HTTP service port is disabled, H5 KVM in an unencrypted mode is not accessible.
· If you change the port number of the ASD (Remote_XDP) service, you must also change the port settings of the OpenIPC client.
Changing the settings of a service restarts the service. During the restart, the service is unavailable.
Before enabling the iHDT service, make sure the server is powered on.
Before you enable iHDT scan dump, use the IPMI command to enter the scan dump mode. For more information about the IPMI command, see the IPMI manual provided by the manufacturer.
With the scan dump mode enabled, some functions of the BMC will be restricted. To avoid unnecessary risks, power off the device and disconnect all the power cords in time after using the scan dump function. If you do not restart the device, you can execute the IPMI command to exit the scan dump mode before using BMC functions. For more information about the IPMI command, see the IPMI manual provided by the manufacturer.
After you restart BMC, the device automatically exits scan dump mode.
The time required for enabling the scan dump mode depends on the number of CPU cores. Please be patient if it takes a long time.
Procedure
1. On the top navigation bar, click Remote Services.
You are placed on the Services page.
2. In the work pane, click Edit in the Actions column for the service entry you want to modify.
a. Enable or disable the service.
b. Set a secure or insecure port, and enter the port number.
c. Click OK.
Parameters
· Insecure service port: Set the service port number for unencrypted communication of the service. For access services except VNC, the value range is 1 to 65535. For VNC, the value range is 100 to 65535.
· Secure service port: Set the service port number for encrypted communication of the service. The value range is 1 to 65535.
Table 4 Default port numbers used by the supported access services
Service |
Default insecure port |
Default secure port |
CD-Media |
5120 |
5124 |
FD-Media |
5122 |
5126 |
HD-Media |
5123 |
5127 |
HTTP |
80 |
N/A |
HTTPS |
N/A |
443 |
iHDT |
6123 |
N/A |
IPMI |
623 |
623 |
KVM(remote console) |
7578 |
7582s |
ASD (Remote_XDP) |
6868 |
N/A |
SNMP |
161 |
N/A |
SSDP |
1900 (fixed and unchangeable) |
N/A |
SSH |
N/A |
22 |
Telnet |
23 |
N/A |
VNC |
5900 |
N/A |
· Idle timeout: Set the session idle timeout time for the service. You can set the timeout for Web, HTTP, HTTPS, KVM, SSH, Telnet, and VNC services. The SSH and Telnet services use the same idle timeout time. If you set an idle timeout for both SSH and Telnet, the most recent configuration takes effect. The HTTP and HTTPS services use the same idle timeout time. If you modify one of the two idle timeout time, the other one will update automatically and accordingly.
Table 5 Timeout value ranges and default timeout settings of services
Service name |
Timeout value range (in minutes) |
Default timeout (in minutes) |
HTTP |
5 to 120 |
30 |
HTTPS |
5 to 120 |
30 |
KVM (remote console) |
5 to 30 |
30 |
SSH |
1 to 30 |
10 |
Telnet |
1 to 30 |
10 |
VNC |
5 to 30 |
10 |
Remote console
You can configure and manage the server from a remote console, including:
· Access the BIOS and operating system of the server to configure the server.
· Power on or shut down the operating system of the server.
· Capture screenshots of the remote console.
· Record videos on the remote console and save the videos locally on the PC.
· Mount virtual media to install operating systems or transfer files.
HDM supports a maximum of four remote control sessions. If you establish the first session, you are the primary user. All subsequent remote console users are secondary users and must obtain access permissions from the primary user.
Launch a remote console
You can launch the KVM or H5 KVM remote console, and restart KVM.
Restrictions and guidelines
Follow these restrictions and guidelines when you use a remote console:
· Do not use KVM and H5 KVM at the same time or start the remote console in multiple browsers on one PC.
· For security purposes, grant full permission to a trustworthy secondary user when you close the remote console session as the primary user.
· It might take a long time to launch the H5 KVM in a browser.
Prerequisites
Before you can launch a remote control console, you must perform the following tasks:
· Make sure the KVM service has been enabled for your user account. If KVM is not enabled, contact the administrator.
· Make sure your user account has the remote control privilege. If you do not have the remote console privilege, contact the administrator.
Procedure
1. On the top navigation bar, click Remote Services.
2. In the left navigation pane, select Remote Console.
3. (Optional.) Click Configure, select a launch mode for KVM and H5 KVM, and then click OK.
Encrypted modes transmit encrypted data and provide better security performance. Unencrypted modes transmit unencrypted data and provide higher transmission speed.
4. Launch a remote console:
¡ To launch the KVM remote console, click Start KVM.
If no launch mode is specified for KVM, KVM will be launched in shared mode.
- If a secure port is specified for KVM, KVM supports the encrypted shared mode for data transmission.
- If an insecure port is specified for KVM, KVM supports the unencrypted shared mode for data transmission.
¡ To launch the H5 KVM remote console, click Start H5 KVM.
If no launch mode is specified for H5 KVM, H5 KVM will be launched shared mode.
- If an insecure port is specified for KVM and HTTP service is enabled, H5 KVM supports the unencrypted shared mode.
- If a secure port is specified for KVM and HTTPS service is enabled, H5 KVM supports the encrypted shared mode.
- If an insecure port is specified for KVM and HTTP service is disabled, you cannot start H5 KVM.
5. (Optional.) To restart KVM, click Restart KVM. If the KVM service is abnormal, you can perform this operation to restore KVM to normal.
Parameters
· Dedicated mode: Includes Encrypted dedicated mode and Unencrypted dedicated mode. A dedicated mode allows for only one remote console session and grants the user with the full access permission. You can launch the remote console successfully in dedicated mode only if no other user is using the remote console.
· Shared mode: Includes Encrypted shared mode and Unencrypted shared mode. A shared mode allows for a primary session and multiple secondary sessions. If you are the first access user, the system assigns you with the full access permission. If you are a secondary user, the granted permission is decided by the primary user.
¡ If you are granted full access permission, you can display information and configure the server. In this situation, the primary user will have read-only access.
¡ If you are granted read-only permission, you can only view videos and screenshots, and record videos. You cannot perform any configuration tasks.
¡ If you are denied access, the KVM window closes.
¡ If the primary user does not respond in 30 seconds, you are granted read-only permission.
Operate the server from KVM
Prerequisites
1. Launch a KVM remote console.
2. To perform any server tasks except for viewing videos and screenshots and recording videos, make sure you have full permission.
Block full permission requests
If you are the primary user (the user that established the first console session), you might receive full permission requests from remote console users who have only read-permission.
To block full permission requests, select Options > Block Privilege Request from the top menu bar.
Configure boot options for the next boot
To configure the boot option and boot mode for the server to use at the next reboot, select Options > Configure Boot Options from the top menu bar.
You can set the validity for the configuration to one-time or permanent.
· If the system boot order configured in permanent system boot options is inconsistent with the system boot order, the server will start based on the permanent settings.
· If the system boot order configured in one-time system boot options is inconsistent with the system boot order, the server will follow the one-time settings at next startup. The configured system boot options take effect after startup.
· If you configure boot options at the BIOS startup, the configuration might fail to take effect.
Access the server
You can use the keyboard, mouse, and monitor of the local PC to access the server.
Start up or shut down the server
WARNING! The Force Power-Off and Graceful Power-Off options only put the server in standby mode by removing power from most circuits. To maintain the server with all power removed, you must remove all power cords from the server. |
1. Select the Power menu from the top menu bar.
2. Select a menu option as needed.
Power menu option |
Purpose |
Force System Reset |
Warm reboots the server without power cycling the server. |
Shuts down the server immediately by force. This action is equivalent to pressing the power button on the server for five seconds to put the server in standby mode. |
|
Graceful Power-Off |
Shuts down the operating system first, and then removes power from the server to put it in standby mode. |
Starts up the server. |
|
Force Power-Cycle |
Powers off and then powers on the server. |
3. Use the power icon in the lower right corner of the console to verify the power state of the server.
¡ If
the server is up, the icon is in green ().
¡ If
the server is down, the icon is in red ().
Capture the screen
1. Select Options > Capture Screen from the top menu bar.
2. In the dialog box that opens, select the screenshot file storage path, enter the file name, and then click Save.
Record a video
1. Select Video Record > Settings from the top menu bar.
2. Set the video recording parameters:
¡ Recording time—Enter the maximum time length of the video. The value range is 1 to 1800 seconds.
¡ Video to be Saved—Click Browse to select the video file storage path.
¡ Normalized video resolution to 1024 × 768—To use the 1024 × 768 resolution, select this option. If you do not select this resolution, the screen resolution of the server monitor is used. Changing the resolution generates a new video file.
3. Select Video Record > Start Record to start video recording.
4. Select Video Record > Stop Record to stop video recording.
Mount virtual storage media
1. Select Media > Virtual Media Wizard from the top menu bar.
2. Mount a virtual storage medium:
¡ To mount a virtual CD/DVD, click the CD/DVD tab, click Browse next to a CD Image field to select a CD/DVD file or CD/DVD drive of the local PC, make sure the total length of the mounting path name and image name (including backslashes) does not exceed 255 characters, and then click Connect.
¡ To mount a virtual floppy disk, click the Floppy tab, click Browse next to the Floppy Image field, select a floppy disk file from the local PC, make sure the total length of the mounting path name and image name (including backslashes) does not exceed 255 characters, and then click Connect.
¡ To mount a virtual drive or USB, click the Hard Disk/USB tab, and perform one of the following tasks:
- If the image already exists in the hard drive or USB, select HD/USB Image, click Browse next to the HD/USB Image field, select a drive file or USB device of the local PC, make sure the total length of the mounting path name and image name (including backslashes) does not exceed 255 characters, and then click Connect.
- If the image does not exist in the hard drive or USB but the files to be mounted exist in the local PC, select Folder Path, click Browse next to the Folder Path field to select the folder from the local PC, make sure that the length of the image name or the driver source (backslashes (\) included) does not exceed 255 characters. Then, click Browse next to the Image Path field to select a path from the hard drive or USB for saving the image generated by using the selected folder, and then click Connect.
Make sure the folder is not larger than 600 M.
3. To unmount a virtual storage medium, access the tab appropriate to the type of that medium, and click Disconnect.
Change the language in the KVM console
1. Select Options > GUI Languages from the top menu bar.
2. Change the language to Chinese or English.
Configure the peripherals in the KVM console
· To configure keyboard settings, select the Keyboard menu from the top menu bar, and then select the desired menu option.
Keyboard menu option |
Task |
Ctrl+Alt+Del |
Perform an action equivalent to pressing the Ctrl, Alt, and Delete keys simultaneously on the keyboard. |
Hot Keys |
Define and use hot keys. You can define a maximum of 20 hot keys, each being a combination of up to six keys. |
SoftKeyboard |
Open the soft keyboard. Only American English soft keyboard is supported. |
· To configure the mouse settings, select the Mouse menu from the top menu bar, and then select the desired menu option.
Mouse menu option |
Task |
Show Cursor |
· Select this option to display mouse pointer trails. · Clear this option to hide mouse pointer trails. |
Mouse Calibration |
Calibrates the mouse location in relative mouse mode. |
Mouse Mode |
The mouse mode is used to calculate the current location of the mouse. Options include: · Absolute mouse mode—Calculates the mouse location according to the screen's absolute coordinates. · Relative mouse mode—Calculates the mouse location according to the offset of the mouse movement. · Other mouse mode—Calculates the mouse location according to the distance from the mouse to the screen center. Mouse mode recommendations for server operating systems: · Use absolute mouse mode in CentOS 6.5, CentOS 7.1, Redhat 6.5, Redhat 7.0, SLES 11, SLES 13, Ubuntu 12.04, Ubuntu 15.04, Windows 2008, and Windows 2012. · Use relative mouse mode for CentOS 6, Fedora 14, Redhat 6, or their lower versions. · Use other mouse mode in SLES 11 installation interface. · Use absolute mouse mode in any operating systems that are not mentioned above. · As a best practice, do not change the mouse mode frequently. · The Show Cursor feature will be enabled automatically if you change the mouse mode from relative or other to absolute. |
Obtain version and copyright information
To obtain version and copyright right information, select Help > About HDM KVM from the top menu bar.
Operate the server from H5 KVM
Prerequisites
1. Launch an H5 KVM remote console.
2. To perform any server tasks except viewing videos and screenshots and recording videos, make sure you have full permission.
Block full permission requests
If you are the primary user (the user that established the first console session), you might receive full permission requests from remote console users who have only read-permission.
To block full permission requests, select Options > Block Privilege Request from the top menu bar.
Configure boot options for the next boot
To configure the boot option and boot mode for the server to use at the next reboot, select Options > Boot Options from the top menu bar.
You can set the validity for the configuration to one-time or permanent.
· If the system boot order configured in permanent system boot options is inconsistent with the system boot order, the server will start based on the permanent settings.
· If the system boot order configured in one-time system boot options is inconsistent with the system boot order, the server will follow the one-time settings at next startup. The configured system boot options take effect after startup.
· If you configure boot options at the BIOS startup, the configuration might fail to take effect.
Configure the system boot order
To configure the system boot order, select Options > Configure Boot Order from the top menu bar.
The system boot order is effective as long as you do not change it.
If you configure this feature when BIOS is starting up, this feature will not take effect. Do not configure this feature at BIOS start up.
Access the server
You can use the keyboard, mouse, and monitor of the local PC to access the server.
Start up or shut down the server
WARNING! The Force Power Off and Graceful Power Off options only put the server in standby mode by removing power from most circuits. To maintain the server with all power removed, you must remove all power cords from the server. |
1. Select the Power menu from the top menu bar.
2. Select a menu option as needed.
Power menu option |
Purpose |
Immediate Reset |
Warm reboots the server without power cycling the server. |
Force Power Off |
Shuts down the server immediately by force. This action is equivalent to pressing the power button on the server for five seconds to put the server in standby mode. |
Graceful Power Off |
Shuts down the operating system first, and then removes power from the server to put it in standby mode. |
Power On |
Starts up the server. |
Power Cycle |
Powers off and then powers on the server. |
3. Use the power icon in the upper left corner of the console to verify the power state of the server.
¡ If
the server is up, the icon is in green ().
¡ If
the server is down, the icon is in red ().
Record a video
1. Select Video Record > Record Settings from the top menu bar.
2. Set the video recording parameters:
¡ Recording time—Enter the maximum time length of the video. The value range is 1 to 1800 seconds.
¡ Video Compression—Set the view compression ratio. The value range is 0.1 to 1.
¡ Normalized video resolution to 1024 × 768—To use the 1024 × 768 resolution, select this option. If you do not select this resolution, the screen resolution of the server monitor is used. Changing the resolution generates a new video file.
3. Select Video Record > Record Video to start video recording.
4. Select Video Record > Stop Record to stop video recording.
Play a video
1. Select the Video menu from the top menu bar.
2. Select a menu option as needed:
¡ To pause the video while it is playing, select Pause Video.
¡ To resume video playing, select Resume Video.
¡ To refresh the video displayed on the remote console, select Refresh Video.
Capture the screen
Select Video > Capture Screen from the top menu bar.
Open the soft keyboard
Select the SoftKeyboard menu from the top menu bar. Only American English soft keyboard is supported.
Configure the peripherals in the H5 KVM console
· To configure keyboard settings, select the Keyboard menu from the top menu bar, and then select the desired menu option.
Keyboard menu option |
Task |
Keyboard Layout |
Change the keyboard layout. |
English U.S |
Use the U.S. English keyboard layout. |
· To perform Send Keys operations, select the Send Keys menu from the top menu bar, and then select the desired menu option.
Send Keys menu option |
Description |
Hold Down section |
|
Right Ctrl Key |
Perform an action equivalent to pressing the right Ctrl key on the keyboard. |
Right Alt Key |
Perform an action equivalent to pressing the right Alt key on the keyboard. |
Right Windows Key |
Perform an action equivalent to pressing the right Windows key on the keyboard. |
Left Ctrl Key |
Perform an action equivalent to pressing the left Ctrl key on the keyboard. |
Left Alt Key |
Perform an action equivalent to pressing the left Alt key on the keyboard. |
Left Windows Key |
Perform an action equivalent to pressing the left Windows key on the keyboard. |
Press and Release section |
|
Ctrl+Alt+Del |
Perform an action equivalent to pressing and releasing the Ctrl, Alt, and Delete keys simultaneously on the keyboard. |
Left Windows Key |
Perform an action equivalent to pressing and releasing the left Windows key on the keyboard. |
Right Windows Key |
Perform an action equivalent to pressing and releasing the right Windows key on the keyboard. |
Context Menu Key |
Perform an action equivalent to pressing and releasing the context menu key on the keyboard. |
Print Screen Key |
Perform an action equivalent to pressing and releasing the PrScrn key on the keyboard. |
· To define and use hot keys, select the Hot Keys menu from the top menu bar, and then select Add Hot Keys.
· To configure the mouse settings, select the Mouse menu from the top menu bar, and then select the desired menu option.
Mouse menu option |
Task |
Show Client Cursor |
· Select this option to display mouse pointer trails. · Clear this option to hide mouse pointer trails. |
Mouse Mode |
The mouse mode is used to calculate the current location of the mouse. Options include: · Absolute Mouse Mode—Calculates the mouse location according to the screen's absolute coordinates. · Other Mouse Mode—Calculates the mouse location according to the distance from the mouse to the screen center. As a best practice, use KVM if you are using one of the following operating systems, with which the absolute mouse mode does not work well: · SLES 11 installation interface. · As a best practice, do not change the mouse mode frequently. · The Show Client Cursor feature will be enabled automatically if you change the mouse mode from other to absolute. |
Obtain version and copyright information
To obtain version and copyright right information, select Help > About H5Viewer from the top menu bar.
Mount virtual media
H5 KVM only supports mounting an .iso image.
1. Click Browse File in the upper right corner of the remote console.
2. Select an .iso image file.
To unmount the virtual media, click Stop Media.
Quit the remote console
To quit the remote console and disconnect from HDM, use one of the following methods:
· Click the close button of the
remote console window.
· As the best practice to quit the H5 KVM remote console, click Stop KVM in the upper left corner of the remote console.
· If virtual storage media have been mounted from the remote console, the configured KVM idle timeout time will not take effect.
Configure VNC
Use this feature to configure the settings of passwords for VNC client login.
Procedure
1. On the top navigation bar, click Remote Services.
2. In the left navigation pane, select Remote Console.
3. In the work pane, click the VNC tab.
4. Select Enable or Disable for Complexity check.
5. Enter a new password and confirm the new password.
6. Click Save.
Parameters
Complexity check: Disable or enable password complexity check.
· If this feature is disabled, passwords must meet the following basic complexity requirements:
¡ 1 to 8 characters in length.
¡ Case sensitive. Valid characters are letters, digits, spaces, and the following special characters: ` ~ ! @ # $ % ^ & * ( ) _ + - = [ ] \ { } | ; ' : " , . / < > ?
· If this feature is enabled, passwords must meet the following enhanced complexity requirements:
¡ 8 characters in length.
¡ Case sensitive. Valid characters are the same as those supported when complexity check is disabled.
¡ Must contain characters from at least two of the following categories: uppercase letters, lowercase letters, and digits.
¡ Must contain at least one space or special character.
Remote media mounting
You can mount virtual media by using the remote console (see "Remote console") or the image redirection feature. The following describes how to use image redirection to mount remote media images files.
About remote media redirection
Image redirection redirects image files from a remote device to the operating system of the server. With this feature, you do not need to copy image files to the server before you can mount them.
Redirect remote media
Perform this task to redirect remote media to the server's operating system.
You can use the image redirection feature to mount image files. The system supports mounting two CD/DVD and HD image files, and only one floppy disk image file.
Prerequisites
Before you configure remote media image redirection to enable support for remote media, perform the following tasks:
1. Verify that the image files to be mounted are in correct format.
A CD/DVD image file must use the .iso extension, and floppy and HD (drive) image files must use the .img or .ima extension.
A floppy disk image file cannot exceed 1.44 MB.
2. Make sure the number of CD/DVD image files does not exceed 400 and the total number of floppy image files and HD (drive) image files does not exceed 400 in the source directory on the NFS, HTTP, HTTPS, or CIFS server. The length of each image file name is less than 128 characters.
3. Make sure your user account has the VMedia extended privilege. If you do not have the VMedia privilege, contact the administrator.
4. Make sure the desired virtual media services have been enabled for your user account. If they are not enabled, contact the administrator.
5. Make sure the NFS, HTTP, HTTPS, or Samba server is correctly configured.
Restrictions and guidelines
· After enabling remote media redirection, when you modify advanced settings, make sure all remote media redirections stop, and images mounted to the remote console are disconnected.
· The server address supports both IPv4 and IPv6 addresses. IPv6 link-local addresses are not supported.
Procedure
1. On the top navigation bar, click Remote Services.
2. In the left navigation pane, select Virtual Media.
3. To open the operation wizard, click the icon on the upper right corner of the
page. Continue clicking Next to follow the guidance. After the operation is completed, click Finish in the
wizard. To close the wizard, click the cross on the upper right corner of the
wizard.
4. In the work pane, click Settings.
5. On the page that opens, enable remote media, select media types, and then click OK.
¡ If you select NFS, HTTP, or HTTPS as the shared file system, you must enter the server address and source path.
¡ If you select CIFS (Samba) as the shared file system, you must enter the server address, source path, username, password, and optionally, the domain name.
As a best practice to avoid image mounting failure, do not enter unnecessary special characters for media information including the image file name, such as pound signs (#), asterisks (*), and semi-colons (;).
IMPORTANT: If remote media redirection has already been enabled, the media settings cannot be modified unless you stop all remote media redirections and disconnect all mounted images on the remote console. |
6. Select an image file from the remote media list, and then click Start.
If you want to unmount the image file, click Stop.
Parameters
· Media type: Type of the remote media, including CD/DVD, floppy, and HD.
· Status: Remote media redirection status, including Started and Not started. Common reasons for the Not started status include the following:
¡ Not started-Connection lost—The virtual media service has failed.
¡ Not started-Access error—The virtual media service is not enabled or the image file is invalid.
¡ Not started-Session terminated—The virtual media session is terminated.
¡ Not started-Device ejected—The virtual media has been ejected.
· Session index: Index of the remote media redirection session.
Disable remote media
1. On the top navigation bar, click Remote Services.
2. In the left navigation pane, select Virtual Media.
3. In the work pane, click Settings.
4. In the dialog box that opens, select Disable for the remote media, and then click OK.
SNMP
You can configure and view SNMP settings.
Restrictions and guidelines
The SNMP SET operation is not supported if the read/write community string is empty.
The read/write community string cannot be the same as the read-only community string.
The read/write community string and read-only community string are displayed in ciphertext format from the Web interface.
Configure SNMP settings
1. On the top navigation bar, click Remote Services.
2. In the left navigation pane, select SNMP.
3. In the work pane, configure SNMP settings:
a. Select an SNMP version.
b. Select whether to enable the long community string feature.
c. Select Edit read-only community string or Edit read/write community string, and enter or delete the read-only or read/write community string.
4. Click Save.
Configure SNMPv3 user settings
1. On the top navigation bar, click Remote Services.
2. In the left navigation pane, select SNMP.
The SNMPv3 user section displays the local users that are enabled with the SNMPv3 privilege.
3. Click Edit in the Actions column for a user.
4. In the dialog box that opens, edit the SNMPv3 privilege of the user:
a. (Optional.) Enter the SNMPv3 independent password.
b. Select SNMPv3 read or write permission.
c. Select SNMPv3 authentication protocol and privacy protocol. Privacy protocols AES192 and AES256 can be used only in combination with authentication protocol SHA256, SHA384, or SHA512.
5. Click OK.
Parameters
· SNMP version: Select an SNMP version available for SNMP GET and SET operations. Options include v1, v2c, and v3.
· Long community string: Select whether to enable the long community string feature. This feature is disabled by default.
If you enable long community string, the value range for the community strings is 16 to 32 characters. If you disable the long community string feature, the value range for the community strings is 1 to 32 characters. You can leave the read/write community string empty, regardless of whether the long community string feature is enabled.
· Read-only community string: Enter the read-only community string for security authentication. The default read-only SNMP community string is rocommstr.
· Read/write community string: Enter the read/write community string for security authentication. The default read/write SNMP community string is empty.
· User engine ID: Uniquely identifies SNMP agent entity enabled with the current user.
· SNMPv3 independent password: Enter the password to enable the SNMPv3 privilege. By default, the independent password is the same as the local user password. Follow these guidelines when you configure an SNMPv3 independent password:
¡ The password is a string of 8 to 40 characters.
¡ The password must meet the advanced password policy requirements for local user passwords. For more information, see "Configure the password policy for local users."
· SNMPv3 authProtocol: Select the SNMPv3 authentication protocol. Options include SHA, MD5, SHA256, SHA384, and SHA512.
· SNMPv3 privProtocol: Select the SNMPv3 privacy protocol. Options include DES, AES, AES192, and AES256.
Remarks
The Read-only community string and Read/write community string fields can contain only letters, digits, and the following special characters:
` ~ ! @ $ % ^ & * ( ) _ + - = [ ] { } | : , . / ?
Fast system installation
This feature allows you to select a specified image file from Network File System (NFS) or SAMBA Common Internet File System (CIFS) to fast install the specified operating system.
Restrictions and guidelines
· This feature only completes specific image transfers in BMC. After the image transfer is completed, access the BIOS Setup Utility for subsequent system installation operations.
· Only administrators, operators, and users that have the remote media privilege can configure fast system installation.
· If you disable a fast system installation service that is progress, the current service will be terminated. If you enable the service again, you must re-configure the service settings.
· Fast system installation is not supported in Legacy mode.
· As a best practice, use this feature through the dedicated network port, because the transmission rate of the shared network port is slower, which might cause this feature to fail. To use the shared network port, you can improve the mirroring transmission rate by limiting the network connection speed to 100 Mbps.
Procedure
1. On the top navigation bar, click Remote Services.
2. In the left navigation pane, select Fast System Installation.
3. Enable or disable fast system installation and select the image type.
¡ If you select NFS, you must also the server address, file path, and image name.
¡ If you select CIFS, you must also specify the server address, file path, image name, username, and password.
4. Click Save.
5. Restart the BIOS for the configuration to take effect.
Parameters
· Fast system installation: Enable or disable the fast system installation feature.
· Transfer status: Displays the current status of image transfer.
¡ Disabled: Image transfer is not enabled or is terminated.
¡ Image transfer finished: The previous transfer has finished.
¡ Waiting for image transfer: Image transfer is enabled and the system is waiting for the BIOS to restart to trigger the transmission.
¡ Image transfer in progress: Image transfer is enabled and triggered.
· Image source: Select NFS or CIFS.
· Server address: Specify the image file server address. Both IPv4 and IPv6 addresses are supported.
· File path: Specify the image file path. The file path cannot exceed 256 characters and special characters {}()<>&*`|=?;[]$-#~!"%:+,'\ are not allowed.
· Image name: Specify the image file name. The file name cannot exceed 128 characters, must end with .iso, and cannot contain semicolons (;), pound signs (#), or asterisks (*).
· Username: Enter the username of the Samba account. The username cannot exceed 256 characters and only letters, digits, and underscores (_) are allowed. This field is available only for CIFS (SAMBA) servers.
· Password: Enter the password of the Samba account. The password cannot exceed 32 characters and special characters "`,$'\ are not allowed. The field is available only for CIFS (SAMBA) servers.
O&M diagnosis
Logs
This feature enables users to view the event log and operation log, and download SDS logs of the server.
Manage the event log
The event log records events reported by server sensors.
Restrictions and guidelines
When the event log reaches the maximum size (1500), logging action on new events depends on the event log policy.
After all event log entries are deleted, the system automatically generates a log entry that records the deletion.
Procedure
1. On the top navigation bar, click O&M Diagnosis.
You are placed on the Logs page.
2. On the Event Log tab, select an event log policy from the Log policy field.
3. In the work pane, use one of the following methods to filter events:
¡ Select a severity level of the events.
¡ Select a sensor type.
¡ Select or customize a period when the events generated.
¡ Enter your keywords.
4. To filter events based on keywords, enter
the keywords, and then click the query icon .
5. To clear all specified filter criteria,
click the reset icon .
6. To save event log entries to a .csv file, click Save.
7. To delete all event log entries, click Delete All.
The deleted event log entries cannot be restored.
Parameters
· Sensor name: Name of the sensor that reports the event.
· Sensor type: Type of the sensor that reports the event.
· Stop logging at full storage: The system stops logging on new events when the event log fills up.
· Overwrite oldest entries at full storage: The system overwrites oldest entries with new log entries when the event log fills up.
· ID: Event number. Events are numbered in chronological order. By default, the events in the event list are sorted by event number in ascending order.
· Timestamp: Date and time when the event was logged.
· Alert status: Alarm status of the event. Cleared means that the event alarm has been cleared. Triggered means that the event is to be resolved.
· Severity: Severity level of the event.
¡ Info—The event does not adversely affect the system. No action is required. Examples of informational events include expected state change events and alarm removed events.
¡ Minor—The event has minor impacts on the system. Prompt action is required to avoid an escalation in severity.
¡ Major—The event might cause part of the system to fail and result in service interruption. Immediate action is required.
¡ Critical—The event might result in system outage or power failure. Immediate action is required.
· Description: Detailed information of the event.
· Event code: Event code that identifies a system event in HDM.
· Recommended action: Actions recommended for a system event.
Manage the operation log
The operation log includes audit log entries, firmware update log entries, hardware update log entries, and configuration log entries.
· Audit log entries record HDM administrative events, including access to HDM and remote console startup.
· Firmware update log entries record HDM firmware updates as well as their results.
· Hardware update log entries record hardware updates as well as their results.
· Configuration log entries record user configuration operations as well as their results.
Procedure
1. On the top navigation bar, click O&M Diagnosis.
You are placed on the Logs page.
2. Click the Operation Log tab.
3. In the work pane, select a log type or a result to filter operation logs as follows:
¡ To display operation logs of a particular type, select that log type from the All types list.
¡ To display operation logs of succeeded or failed tasks, select a corresponding result from the All results list.
4. To save operation log entries to a .csv file, click Save.
5. To delete all operation log entries, click Delete All.
The deleted log entries cannot be restored. Please use this feature with caution.
After the deletion, the system generates a log deletion log message.
Parameters
· ID: Operation log entry number. Operations are numbered in chronological order. By default, the operations in the operation list are sorted by operation log entry number in ascending order. The system can display a maximum of 1000 operation log entries.
· Timestamp: Date and time when the operation was logged.
· Username: Enter a username for HDM login.
· Interface type: Type of the interface through which the operation was performed.
· IP address: User IP address.
· Host name: HDM host name.
· Description: Description of the log entry.
Download log
Perform this task to download Smart Diagnosis System (SDS) logs of the server. The SDS log includes HDM event log, HDM operation log, device information, operating parameters, and internal diagnostic information.
By decoding the collected SDS logs, users can comprehensively locate and analyze issues that occur to the server.
To decode SDS logs, contact Technical Support. As a best practice, add contact information at log downloading.
Restrictions and guidelines
Simultaneous log downloading by multiple users is not supported.
Procedure
1. On the top navigation bar, click O&M Diagnosis.
You are placed on the Logs page.
2. Click the Log Download tab.
3. Configure Default download or Download all as needed:
¡ To download
the log entries for a period, select Default download and click the icon to set a time range in days. By default, this feature downloads logs within the last 30 days.
¡ To download all logs during the server life cycle, select Download all. This process might take a long time.
4. (Optional.) Add contact information.
5. Save the displayed log entries to an .sds file on the local server.
6. (Optional.) Import the SDS log file to a log analysis tool.
SOL connection
Perform this task to select the serial port to connect to when the SOL feature is enabled.
Prerequisites
Before setting the SOL connection mode, make sure the SOL feature is disabled.
Procedure
1. On the top navigation bar, click O&M Diagnosis.
2. In the left navigation pane, select SOL Connection.
3. In the work pane, select a serial port from the SOL connection mode field.
4. Click Save.
Parameters
· BIOS/OS: Connects to the BIOS or OS serial port.
· Smart Ethernet adapter: Connects to the serial port of the smart Ethernet adapter. Only some smart Ethernet adapters support serial port connection.
Screenshots & videos
Enable video recording
This feature records the server status upon occurrence of severe operating system events, including crash, restart, and shutdown. You can replay these videos to analyze or troubleshoot the recorded events.
Prerequisites
Make sure the KVM service has been enabled for your user account. If KVM is not enabled, contact the administrator.
If the remote console is open when an event triggers video recording, video recording will fail.
Procedure
1. On the top navigation bar, click O&M Diagnosis.
2. In the left navigation pane, select Screenshots & Videos.
3. In the work pane, click Configure.
4. In the dialog box that opens, enable video recording.
5. Set the recording time. The value range is 15 to 255 seconds.
6. Select types of events to be recorded: crash, restart, or shutdown.
Crash event recording is available for Windows and Linux operating systems.
7. Click OK.
Play and manage videos
On the video replay page, you can play, download, and delete the recorded videos.
The system supports a maximum of three video files. If three video files already exist, a new video file overwrites the earliest one. The file creation time is recorded in the file properties.
Restrictions and guidelines
If the operating system was in sleep state when the event occurred, the video display shows a black screen.
Procedure
1. On the top navigation bar, click O&M Diagnosis.
2. In the left navigation pane, select Screenshots & Videos.
3. In the Video files section, click the video to be played.
4. To download a video, click Download after the video is loaded.
5. To close a video, click Cancel.
6. To delete a video, click the icon below the video.
View BSoD screenshots
Prerequisites
Make sure the KVM service has been enabled for your user account. If KVM is not enabled, contact the administrator.
Restrictions and guidelines
HDM takes screenshots upon MCA triggers when the server detects an MCA error.
HDM takes screenshots of the FRB2 timeout trigger when the server detects a BIOS watchdog timeout,
Procedure
1. On the top navigation bar, click O&M Diagnosis.
2. In the left navigation pane, select Screenshots & Videos.
3. View the BSoD screenshots listed on the page.
4. To delete a screenshot, click the icon below the target screenshot.
Alarm settings
Use this feature to perform the following operations:
· Configure alert policies on the server when an error occurs, including NMI control and MCA policy.
· Send emails, SNMP traps, or syslog messages to notify the concerned server administrative staff members of server events for prompt action.
Manage alert polices
Enable NMI debug
This feature enables the operating system debugger to help you debug software lock-up issues by generating non-maskable interrupts.
Restrictions and guidelines
The Non Maskable Interrupt (NMI) debug feature is intended for debugging only. Do not use this feature if the server is operating correctly.
Prerequisites
Verify that the operating system can handle NMIs. If the operating system cannot handle NMIs, using NMI debug might cause the operating system to crash.
Procedure
1. On the top navigation bar, click O&M Diagnosis.
2. In the left navigation pane, select Alarm Settings.
3. In the NMI debug section of the work pane, click Execute.
Set the MCA policy
Machine Check Architecture (MCA) is a mechanism that enables error reporting and error recovery. MCA policy defines whether a host requires a restart when HDM detects uncorrectable IERR errors (including CPU, memory, and PCIe errors) or fatal errors on the host.
Restrictions and guidelines
The MCA policy does not affect the OS restart policy.
Procedure
1. On the top navigation bar, click O&M Diagnosis.
2. In the left navigation pane, select Alarm Settings.
3. In the MCA policy section of the work pane, select Yes or No from the Restart upon IERR occurrence field.
¡ Yes: When HDM detects uncorrectable IERR errors or fatal errors, the system restarts the host automatically.
¡ No: When HDM detects uncorrectable IERR errors or fatal errors, the system does not restart the host.
4. Click Save.
Manage alert emails
HDM sends alert emails through Simple Mail Transfer Protocol (SMTP). To send an alert email to a user, you must configure SMTP, specify that user as an email recipient, and configure the alert policy for that user.
Prerequisites
Make sure you have specified an email address in the user account for the email recipient. For information about adding an email address for a user account, see "User management."
Set up SMTP for alert emails
1. On the top navigation bar, click O&M Diagnosis.
2. In the left navigation pane, select Alarm Settings.
3. Click the Email notification tab.
4. In the SMTP section, click Configure.
5. In the dialog box that opens, configure SMTP:
¡ Select Enable for SMTP.
¡ Enter the SMTP server address and port number.
¡ To send alert emails as anonymous emails, select Enable for Anonymous email. To send alert emails with sender identity information, clear Enable for Anonymous email and enter the username and password for connecting to the SMTP server. The username can contain only letters, digits, underscores (_), at signs (@), and dots (.).
¡ Enter the sender email address. Make sure the email service uses the SMTP mail server.
¡ Select severity levels. Options include Info and above, Minor and above, Major and above, and Critical and above.
¡ To ensure data confidentiality and integrity during transmission, enable Transport Layer Security (TLS) encrypted transmission.
TLS encrypted transmission uses port 465 by default. To use the feature, you must import SMTP certificate and SMTP private key files to the SMTP server.
¡ Add email subjects. You can select multiple subjects for an email.
6. Click OK.
Add an alert email recipient
1. To have a user receive alert emails, you must specify an email address for that user when you set up the user account on the Users & Security > User Accounts page.
2. On the top navigation bar, click O&M Diagnosis.
3. In the left navigation pane, select Alarm Settings.
4. Click the Email notification tab.
5. Click Add.
6. In the dialog box that opens, select the ID, enter the recipient email address and subject.
Only letters, digits, and underscores (_) are supported for the email subject.
With an email subject added in SMTP settings, if you configure a subject again for the recipient settings, HDM displays two subjects during sending.
7. Click Test to send a test email, and then click Result to view the test result.
8. To edit the recipient email address and subject, click Edit in the email recipient entry.
9. To delete a recipient, click Delete in email recipient entry.
Manage SNMP traps
You can send server events in SNMP traps to an SNMP management workstation.
Configure SNMP trap settings
1. On the top navigation bar, click O&M Diagnosis.
2. In the left navigation pane, select Alarm Settings.
3. Click the SNMP trap tab.
4. In the SNMP trap settings section, click Configure.
5. In the dialog box that opens, configure SNMP trap settings.
a. Select Enable for SNMP trap.
b. Select an SNMP trap mode. Options include Node mode, Event mode, or Event code mode.
c. Select an SNMP version. If SNMPv3 is selected, you must also specify an SNMPv3 user in the Choose trap v3 user field.
d. (Optional.) Enter the location of the server and contact information.
6. Click OK.
Configure SNMP trap server settings
1. On the top navigation bar, click O&M Diagnosis.
2. In the left navigation pane, select Alarm Settings.
3. Click the SNMP trap tab.
4. In the SNMP trap server settings section, click Edit in a server entry.
5. In the dialog box that opens, configure SNMP trap server parameters.
6. Click OK.
7. (Optional.) Click Test in a server entry to send a test email.
Parameters
· Node mode: Uses the OID of an SNMP node as the ID of a trap event. This is the default mode.
· Event mode: Uses the OID of the SNMP node that is in a mapping relationship with a trap event as the ID of the event.
· Event code mode: Uses the event code as the ID of the event. Information provided in this mode is more accurate.
· SNMP version: Select an SNMP version. Options include SNMPv1, SNMPv2c, and SNMPv3.
· Choose trap v3 user: Select the username used by the system to send SNMPv3 traps.
· System location: Enter the location of the server, a string of up to 31 characters.
· Contact: Enter contact information, a string of up to 31 characters.
· Trap community: Enter the trap community string for authentication on the manager. The trap community string can be empty. The value range is 1 to 31 characters. The default value is public.
· Severity levels: Select the severity levels. Options include Info and above, Minor and above, Major and above, and Critical and above.
· No.: Entry number. You can specify a maximum of eight servers, one server in each entry. This field cannot be edited.
· Status: Indicates whether trap notification is enabled for the specified server.
· Server address: IP or domain address of the destination host.
· Server port: Enter the port number at which the destination host receives SNMP traps. The value range is 1 to 65535. The default port number is 162.
Remarks
The System location, Contact, and Trap community fields can contain only letters, digits, and the following special characters:
` ~ ! @ $ % ^ & * ( ) _ + - = [ ] { } | : , . / ?
Manage syslog settings
Perform this task to use syslog messages to report operation logs, event logs, security logs, sensor logs, and serial port logs to destination hosts:
Restrictions and guidelines
After you disable Syslog, all tunnels for sending logs are disabled. When you enable Syslog again, the tunnels restore to the states before you first disable Syslog.
Prerequisites
Before enabling syslog, make sure a syslog server is available.
Configure alarm log notification settings
1. On the top navigation bar, click O&M Diagnosis.
2. In the left navigation pane, select Alarm Settings.
3. Click the Syslog Settings tab.
4. In the Alarm log notification section, click Configure, and then perform the following tasks:
a. Enable alarm log notification.
b. Select an alarm log server identifier.
c. Select a transmission protocol.
If you select TLS, you must select an authentication mode, and upload the CA certificate, local certificate, and private key file.
d. Specify the log sending interval. This item takes effect only for sensor logs.
e. Select the log format. You can select the RFC format (including RFC3164 and RFC5424) or a simplified format that supports customizing timestamp and host name. You can select multiple log formats.
f. Click OK.
Configure alarm log server settings
1. On the top navigation bar, click O&M Diagnosis.
2. In the left navigation pane, select Alarm Settings.
3. Click the Syslog Settings tab.
4. In the Alarm log server settings section, click Edit in a server entry, and then perform the following tasks:
a. Enable the tunnel for sending the current alarm logs.
b. Enter the server name.
c. Enter the server address, both IP address and domain name are supported.
d. Enter the port number.
e. Select one or multiple types of logs to be reported.
f. Select the log level. This item is supported only for event logs.
g. Click OK.
5. (Optional.) Click Test in the Actions column to send the testing information to the target server. You can view the testing logs in the target server.
Parameters
· Alarm log host ID: Select a syslog server identifier. Options include Host name, System board serial number, Asset tag, and Product serial number.
· Transmission protocol: Select the transmission protocol used for syslog message transmission. Options include:
¡ Transmission Control Protocol (TCP)—A connection-oriented protocol that requires establishing connection between the sender and the receiver before data transmission.
¡ User Datagram Protocol (UDP)—A message-oriented protocol that does not require establishing connection between the sender and the receiver before data transmission.
¡ TLS—A connection-oriented protocol and provides privacy and data integrity between the sender and the receiver.
· Authentication mode: Select an authentication mode. Options include:
¡ One-way authentication: Authenticates only the syslog server.
¡ Two-way authentication: Authenticates both the syslog server and the client used for HDM login.
· CA certificate: Upload a CA certificate to authenticate packets sent by the syslog server.
· Local certificate: Upload a local certificate whose information will be carried in packets sent to the syslog server by HDM for the server to authenticate the client used for HDM login.
· Private key: Upload a private key file to decrypt the local certificate.
· Interval: Specify the interval at which sensor information is reported, in the range of 10 to 2592000 seconds.
· No.: Entry number. You can specify a maximum of eight servers, one server in each entry.
· Server name: Name of the destination host that receives syslog messages, a case-sensitive string of 1 to 31 characters. Only letters, digits, dots (.), hyphens (-), underscores (_), and at signs (@) are allowed. This field is optional.
· Server address: Enter the IP address or domain name of the destination host. The default IP address is 0.0.0.0. A domain name cannot exceed 255 characters.
· Server port: Enter the port number at which the destination host receives syslog messages. The value range is 1 to 65535. The default port number is 514.
· Log type: Types of logs to be reported. Options include Operation log, Event log, Security log, Serial port log, and Sensor log.
· Log severity level: Severity levels of alarm logs. Options include Info and above, Minor and above, Major and above, and Critical and above.
Configure system diagnosis
Perform this task to perform minimum configuration startup or diagnosis isolation if the server gets stuck in POST phase because of hardware replacement errors.
Minimum configuration startup enables the system to start the UEFI SHELL or OS installed on the SATA M.2 SSDs with one single-core CPU and memory modules in one channel.
Diagnosis isolation enables the system to diagnose hardware components, isolate failed components, and then start up.
Restrictions and guidelines
This feature is available only for some servers installed with Intel processors. You can view the Web interface display to identify the support status.
Before performing this task, make sure the BIOS is not being updated.
System diagnosis is available only in UEFI mode, not in Legacy mode.
If you enable both minimum configuration startup and diagnose and isolate feature and the diagnose and isolate feature takes effect successfully, minimum configuration startup will not take effect.
Server restart in this section refers to power cycle triggered by clicking the Force power-cycle option on the Power Management page.
The diagnosis process takes a long time. To interrupt the process, first disable diagnosis isolation from the Web interface, and then restart the server. To change the diagnosis isolation mode, disable diagnosis isolation from the Web interface, restart the server to exit the current mode, set the new mode, and then restart the server.
Before the diagnosis, the system performs a pre-check on the server. If the server starts up successfully or UEFI SHELL minimum startup fails during the pre-check, the system terminates the diagnosis process.
In minimum configuration startup, devices that do not start up will be isolated by the BIOS and cannot be identified by HDM.
In minimum configuration startup or diagnosis isolation mode, USB connectors on the server will be disabled and HDM is wirelessly inaccessible. Before enabling minimum configuration startup or the diagnosis isolation mode, prepare a backup network access as needed.
In minimum configuration startup or diagnosis mode, the USB channels and PCIe channels between HDM and the server stay in normal communication state.
Before upgrading the BIOS, make sure minimum configuration startup is disabled. If minimum configuration startup is not disabled, enter the Diagnosis page to disable it after upgrading the BIOS and then restart the BIOS to exit shell mode.
If the diagnose and isolate feature takes effect, you can manually disable this feature as needed. To start a new round of diagnosis properly, disable the diagnose and isolate feature and restart the BIOS.
Procedure
1. On the top navigation bar, click Remote O&M.
2. In the left navigation pane, select Alarm Settings.
3. Click the Diagnosis tab.
The page that opens displays the current minimum configuration startup and diagnosis isolation configurations.
4. Click Configure.
5. In the dialog box that opens, enable minimum configuration startup or select the diagnosis isolation mode. Supported diagnosis isolations modes include Diagnose only and Diagnose and isolate.
6. Click OK.
7. Restart the server. The configured minimum configuration startup or diagnosis isolation mode will take effect immediately upon the restart.
Parameters
· MinCfg startup: Select whether to enable minimum configuration startup.
¡ Enable—Select this option to enable minimum configuration startup. Then, the system can start the UEFI SHELL or OS installed on the SATA M.2 SSDs with one single-core CPU and memory modules in one channel.
¡ Disable—Select this option to disable minimum configuration startup.
· Diagnosis isolation: Select the diagnosis isolation mode. Options include:
¡ Disable—Disables diagnosis isolation. For the disable operation to take effect, restart the BIOS.
¡ Diagnose only—Examines components for errors that cause the startup failure, and then displays the diagnosis result.
¡ Diagnose and isolate—Examines components for errors that cause the startup failure. If this feature takes effect, the system displays the diagnosis result and isolates the failed components. You can manually disable this feature as needed. For the disable action to take effect, restart the BIOS. If this feature fails to take effect, the system displays only the diagnosis result and automatically disables this feature.
· Device name: Hardware components that are diagnosed.
· Result: Diagnosis result for the hardware component.
· Description: Description of the diagnosis result.
Configuration
Manage configuration
Perform this task to import and export HDM, BIOS, or RAID configuration, restore and view HDM factory defaults.
Restrictions and guidelines
To avoid HDM and operating system anomalies, do not perform any power actions on the server during the import process.
Do not refresh the webpage when configuration is being imported or HDM settings are being restored. If you refresh the page, HDM might fail to be accessed.
If configuration import fails, troubleshoot the issue that leads to the failure as instructed and then import the configuration again.
Configuration import overwrites the existing configuration with the configuration in the imported file.
To avoid import failure, when you modify the configuration file, please be cautious and make sure the configurations are valid.
RAID configuration import and export do not import or export storage controller configurations such as the RAID mode setting.
Support for configuration that can be imported or exported varies by device model.
To avoid import failure, make sure no one except for the current user is performing operations.
If you import BIOS configuration when BIOS is staring up, the operation will not take effect. Do not import BIOS configuration at BIOS startup.
Export HDM, BIOS, or RAID configuration
Restrictions and guidelines
Make sure the storage controllers have been initialized before you export the RAID configuration.
Make sure the logical drives attached to the storage controllers are in normal state and no expansion, migration, rebuilding, or erasing task is being performed before you export the RAID configuration.
Before exporting RAID configuration, make sure the physical drives of a logical drive are the same media and a physical drive is used only by one logical drive.
Procedure
1. On the top navigation bar, click O&M Diagnosis.
2. In the left navigation pane, select Manage Configuration.
3. In the Export configuration section, select the target configuration type from the Select type field.
4. In the dialog box that opens, choose whether to export user password information as needed.
5. Click Export.
Import HDM configuration
Restrictions and guidelines
Make sure the server model in the configuration file to import is consistent with the actual server model.
Make sure you have deleted all the comment statements in the configuration file before the import.
Make sure the user passwords are stored in plain text in the configuration file.
The import operation does not affect HDM configurations that are not covered by the configuration file to import.
Procedure
1. On the top navigation bar, click O&M Diagnosis.
2. In the left navigation pane, select Manage Configuration.
3. In the Import configuration section, select HDM from the Select type field.
4. Select the target configuration file, and then click Import.
5. In the confirmation dialog box that opens, click OK.
The configuration takes effect directly after import. If you update network settings after importing HDM configuration successfully, the system will terminate the current browser connection. You are required to open a new browser and re-log in to HDM.
Import BIOS configuration
Restrictions and guidelines
Make sure the server model and hardware configuration (for example, storage controller model and mode, HDM, out-of-band management channel, and drive configuration) in the configuration file is consistent with the actual configuration.
Procedure
1. On the top navigation bar, click O&M Diagnosis.
2. In the left navigation pane, select Manage Configuration.
3. In the Import configuration section, select BIOS from the Select type field.
4. Select the target configuration file, and then click Import.
5. In the confirmation dialog box that opens, click OK.
6. Restart the server for the file to take effect after the import.
Import RAID configuration
Restrictions and guidelines
Make sure the server is powered on and the storage controller is in RAID mode before you import RAID configuration.
To avoid import failure, make sure BIOS is in Setup stage and out-of-band management is correct for the storage controller from the Storage page in.
Make sure the server model and hardware configuration (for example, storage controller model and mode, HDM, out-of-band management channel, and drive configuration) in the configuration file is consistent with the actual configuration.
To avoid import failure, clear existing RAID configuration from the Storage page before you import RAID configuration.
To avoid import failure, delete logical member drives whose slots are in the configuration file from the Storage page.
After a RAID configuration import, it takes about 40 seconds for the imported file to take effect.
Procedure
1. On the top navigation bar, click O&M Diagnosis.
2. In the left navigation pane, select Manage Configuration.
3. In the Import configuration section, select RAID from the Select type field.
4. Select the target configuration file, and then click Import.
5. In the confirmation dialog box that opens, click OK.
Restore HDM settings
CAUTION: After the HDM factory defaults are restored, you can access HDM only with the default username and password. Please use this function with caution. |
Restrictions and guidelines
After setting restoration, HDM restarts automatically to load the default settings.
Procedure
1. On the top navigation bar, click O&M Diagnosis.
2. In the left navigation pane, select Manage Configuration.
3. In the Restore HDM settings section, perform one of the following tasks:
¡ Identify the configuration model of the server.
¡ To restore HDM to the factory defaults, click Restore factory defaults.
¡ View the customized HDM factory defaults, if any.
4. In the confirmation dialog box that opens, click OK.
HDM restarts after the settings are restored.
POST codes
The system generates power-on self-test (POST) codes to record its state in each phase of server startup. For more information about POST codes, contact Technical Support.
View POST codes
Restrictions and guidelines
If the system generates more than 512 post codes during startup, the HDM web interface only displays the most recent 512 post codes.
Procedure
1. On the top navigation bar, click O&M Diagnosis.
2. In the left navigation pane, select POST Codes.
3. In the work pane, view the generated timestamp, name, and description of the system POST codes.
Parameters
· Timestamp—Time when the post code is generated.
· POST code of current phase—POST code for the current startup phase of the system.
Manage the intelligent security bezel
Perform this task to identify the presence status of the intelligent security bezel and configure security bezel settings.
Restrictions and guidelines
Support for the health status sync and the color setting of the decorative LEDs varies by device model.
Procedure
1. On the top navigation bar, click O&M Diagnosis.
2. In the left navigation pane, select Security Bezel.
3. Identify whether the intelligent security bezel is present.
4. If the intelligent security bezel is present, configure the security bezel settings as needed.
¡ If you set the decorative LED mode to Server status sync, the flashing mode and color of the decorative LEDs change as the server operation status changes.
¡ If you set the decorative LED mode to Custom, you can set the flashing mode and color of the decorative LEDs.
5. Click Save.
Parameters
· Decorative LEDs: Includes the following options: Bright, Soft, and Off. If you enable the decorative LEDs, select Soft as a best practice to decrease power consumption. Support for the Soft option varies by server model.
· Health status sync: Enables the decorative LEDs to flash based on the server health status. To use this feature, make sure the Server status sync option is selected. For more information, see the user guide for the server.
Manage service USB devices
A service USB device is a USB device burned with the image file of the UniTool. You can connect such a device by using the USB C-to-USB A adapter to the dedicated management port of the server to download SDS logs automatically and manage the service USB device from HDM as needed.
Restrictions and guidelines
· If a user is downloading SDS logs at the time you connect a service USB device, the system ejects the service USB device. You can wait for the ongoing downloading process to end and then reconnect the service USB device.
· Before connecting a service USB device, make sure the available space on the device is greater than 500 MB.
· During SDS log downloading, the server UID LED is in flashing blue and returns to the normal state when the downloading is complete.
· To avoid USB exceptions, do not forcibly remove an operating service USB device.
· To avoid USB exceptions, do not connect or remove a service USB device frequently.
· If you connect multiple service USB devices to the dedicated management port of the server, the server can identify only the first-connected one.
Procedure
1. On the top navigation bar, click O&M Diagnosis.
2. In the left navigation pane, select Service USB Device.
The page that opens displays the status of the service USB device.
3. Select whether to enable the dedicated management port.
4. Select whether to enable the service USB device.
5. Select whether to enable auto SDS log downloading.
6. Click Save.
7. If the service USB device is present, wait for the operation to end and then reconnect the service USB device for the settings to take effect.
Parameters
· Status: Status of the service USB device. Options include Present, Absent, and Operating.
· Auto SDS log downloading: With this feature enabled, the service USB device automatically downloads SDS logs to its ServiceUdisk directory when you connect the device to a server.
Secure erasure
Perform this task to erase HDM, the BIOS, and storage data for the server to avoid data leakage when the server service life terminates or the server operation is terminated.
Restrictions and guidelines
CAUTION: · To avoid data loss, backup data in advance or make sure the data to be erased are of no use and can be erased. · To avoid erasing data by mistake, make sure you remove all external storage devices (including but not limited to mobile HDDs) from the server. |
If the data volume to be erased is large, the operation might take more than one day.
To ensure a successful erase, make sure the server uses iFIST-1.38 or later version.
Do not restart HDM or the server or modify the OS configuration information during erase.
For the BIOS and storage data, the server restarts automatically and then uses iFIST for erase. When the erase is complete, the server automatically restarts again with boot options configured before the erase.
If the server is powered off, power on the server before you erase the BIOS and storage data.
Once the erase starts, all HDM functions except for secure erasure are unavailable.
Secure erasure only erases data of drives identified by the OS.
Restart the server before you perform secure erasure on other storage components.
If secure erasure fails for a drive, use other methods to erase the data.
If you select multiple erasing objects that include HDM, HDM will restart after data erase for all objects is complete. To download and view the erasing result, re-log in to HDM.
If you erase HDM data, the system also erases hardware information for HDM Web interface and the BIOS information in HDM. To obtain these information, you must power off and power on the server.
Support for objects of secure erasure varies by server model.
IMPORTANT: If a power-on password is set in the BIOS, and Storage is selected instead of BIOS for security erasure, to perform security erasure, you must enter the BIOS setup utility during the erase process and manually input the power-on password. |
Procedure
1. On the top navigation bar, click O&M Diagnosis.
2. In the left navigation pane, select Secure Erasure.
3. Select items from HDM, BIOS, and Storage to be erased.
4. Click Confirm erasure. In the dialog box that opens, enter the HDM login password, and then click OK.
5. View the erasure progress in Erasure progress.
6. When the erase is complete, click Download inventory to view the erase result. The available erase results and methods for the erase to take effect are shown in Table 6.
Item |
Erase result |
Method to take effect |
HDM |
Restore HDM factory defaults. SDS logs and flash card data are erased. |
HDM restarts automatically. |
BIOS |
· Restore to the BIOS default settings. · The administrator and user passwords for the BIOS are erased. The BIOS does not require a password for the user whose password is erased to enter the BIOS Setup utility at next restart. · The server power-on password is erased from the BIOS. |
Restart the server. |
No-volatile DRAM (NVDIMM) |
Data in NVDIMMs that are not in memory mode are erased. After erase, all NVDIMMs operate in memory mode. |
The server restarts automatically. |
Storage controller |
· All logical drives managed by the RSTe RAID controller and VROC module are deleted. · All logical drives managed by the following LSI storage controllers are deleted: ¡ HBA-LSI-9311-8i-A1 ¡ HBA-LSI-9500-LP-16i ¡ HBA –LSI-9500-LP-8i ¡ HBA-LSI-9540-LP-8i If the LSI storage controller is in RAID mode before the deletion, the JBOD attribute of the storage controller will change to ON after the deletion. · All logical drives managed by the following PMC storage controllers are deleted: ¡ HBA-H460-B1 ¡ RAID-P4408-Mf-8i-2GB ¡ RAID-P2404-Mf-4i ¡ RAID-P460-B2 ¡ RAID-P460-B4 · All logical drives managed by the following MARVELL storage controllers are deleted: ¡ RAID-MARVELL-SANTACRUZ-LP-2i |
The server restarts automatically. |
Drive |
All data in the drive are deleted. |
The server restarts automatically. |
SD card |
All data in the SD card are deleted. |
The server restarts automatically. |
Scheduled tasks
When upgrading firmware from the HDM Web interface, if you customize the upgrade time, HDM will establish a new timer task for firmware update.
Perform this task to view and modify all timer task information, including the type, state, last execution time, and description for the task.
Restrictions and guidelines
HDM deletes a scheduled task one hour after the task finished.
If the server cannot finish a scheduled task on time, the system keeps the task automatically unless you delete the task manually.
HDM supports a maximum of 20 scheduled tasks and a maximum of 10 scheduled upgrade tasks. When the number of scheduled tasks reaches the upper limit, a newly created task overwrites a task in Executed state. If the number of scheduled upgrade tasks already reaches 10, the creation of a new scheduled upgrade task fails. If all current tasks are in Waiting or Abnormal state, you must delete a current task to add a new one.
You can delete or modify only tasks in Waiting or Abnormal state, and cannot delete or modify tasks in Executed state.
Procedure
1. On the top navigation bar, click O&M Diagnosis.
2. In the left navigation pane, select Scheduled Tasks.
3. View all scheduled task information.
4. To modify a scheduled task, click Edit in the Actions column.
5. To delete a scheduled task, click Delete in the Actions column.
Parameters
· Type: Type of the scheduled task.
· State: State of the scheduled task. Options include Waiting, Executed, and Abnormal.
· Last execution: Last execution time for the scheduled task.
· Description: Detailed information for the scheduled task, including the firmware type and version.
Resource summary
Resource summary
Perform this task to set the alarm thresholds for processor, memory, and drive usage and view information about resource usage and performance monitoring.
Restrictions and guidelines
To use this feature, you must install and run FIST SMS in the operating system of the server. For more information, see the FIST SMS user guide for the server.
The system generates a log entry when an alarm occurs or is cleared. You can view the alarms in the event logs.
Restoring HDM factory defaults clears all chart statistics.
Procedure
1. On the top navigation bar, click O&M Diagnosis.
2. In the left navigation pane, select Resource Summary.
3. If FIST SMS is present, you can perform the following operations:
¡ Click Advanced Settings. Set the alarm thresholds for processor usage, memory usage, and drive usage and then click OK.
¡ View resource usage and resource information historical trends.
¡ (Optional.)
Click Read speed or
Write speed for
the system to display only the corresponding speed line.
¡ (Optional.)
Click Received rate or
Transmitted rate for the system to display only the corresponding
rate line.
¡ (Optional.)
Click Drive svctm info or
Low-performance drive reference value
for the system to display only the corresponding disk line.
¡ (Optional.)
Click Avg load in past 1 min,
Avg load in past 5 min, or
Avg load in past 15 min for the
system to display only the corresponding load balancing
line.
Parameters
Resource usage
· Drive usage threshold: Proportion of used drive space to the total size of the partition, drive partition directory, used space, and total partition space.
Drive performance info
· Low-performance drives (ms): Displays the drive load factor trend. If the load factor values of a drive exceed 1000 in five consecutive intervals, the drive is a low-performance drive.
· Drive read and write frequency (operations/s): Displays the read and write frequency trend of drive partitions.
Monitored performance
· NFS client read/write speed (kB/s): Displays the trend of NFS client read/write speed.
· NFS server read/write speed (kB/s): Displays the trend of NFS server read/write speed.
· System load: Measures the calculation amount processed by the system over a time period.
· Network throughput (Mbps): Displays the receive/send rate trend of the network.
Host information
Perform this task to view host running information, host-related information, process of the previous host startup, and process of the current host startup.
Procedure
1. On the top navigation bar, click O&M Diagnosis.
2. In the left navigation pane, select Resource Summary.
3. Click the Host Info tab to view host information.
4. To view information about a startup stage, click the expand icon for the stage in the process chart. Information displayed includes time consumption, stage start and end time, and information changes.
Parameters
· Previous startup: Process of the previous startup.
· Power-on: Stage from host power-on to BIOS startup.
¡Reason: Reason that causes the host to restart.
· BIOS stage: BIOS startup stage.
¡BIOS version: Current BIOS version number.
¡Version change: Whether the BIOS version is changed.
¡Postcode: Postcode for the startup.
¡Postcode description: Description of a postcode, which can be used to identify the BIOS running state and error information.
¡Component isolation: Whether a host-related component is blocked.
¡Failures occurred: Number of BIOS failures of the major or a higher level.
· BIOS finished: BIOS finish stage.
· OS stage: Stage from BIOS finish to system operation.
¡UCEs: Number of uncorrectable errors occurred on CPUs, PCIe modules, and memory.
¡Failures occurred: Number of host failures of the major or a higher level.
· Power-off: Host cold restart or power-off stage.
¡Reason: Reason that causes the host to be powered off.
Restrictions and guidelines
· If the host is hot restarted through software, the host startup process will not be recorded as a previous startup process.
· The BIOS stage can display up to 10 failure log entries of the major or a higher level.
Intelligent monitoring
Memory intelligent repair
This feature allows users to view memory repair records. With memory intelligent repair enabled in the OS, the system can restrict OS access to faulty memory pages to avoid exceptions during access.
Restrictions and guidelines
Memory intelligent repair in the OS is available only for servers installed with Intel processors.
Memory intelligent repair is supported only the servers with BIOS of version 6.00.28 and later.
Memory intelligent repair must be used with Intel EGS (Sapphire Rapids and Emerald Rapids) and does not support SPR-HBM.
The following systems are typically compatible with the memory intelligent repair feature:
· Rocky Linux 9.0
· SLES 15 (64 bit) SP4 (includes XEN & KVM)
· Ubuntu Server 22.04.1 (64 bit) – LTS
· H3Linux 2.0.2-SP01
· Red Hat Enterprise Linux 9.0
· Red Hat Enterprise Linux 8.6
· Centos 8.1 Linux 5.15.10
· Centos7.4+5.10 kernal
· VMware ESXi 8.0 U2 (64 bit)
· Censos6.X + kernel 2.6.33
Procedure
1. On the top navigation bar, click O&M Diagnosis.
2. In the left navigation pane, select Intelligent Monitoring.
3. (Optional.) Enable memory intelligent repair. By default, intelligent memory repair is enabled.
4. (Optional.) Click the button to the right of the memory intelligent repair feature. In the dialog box that opens, perform the following tasks:
¡ Select a page size in the PageSize field. The default is 4KB/page.
¡ Set the upper limit of memory capacity that can be isolated in the Control level field.
5. (Optional.) To hide the repair record marks in the graph, click Repair record. By default, the repair record marks are displayed. The larger a mark, the more the repair times of the DIMM in the slot at the corresponding time.
6. To display repair records of DIMMs in
specific slots, select the slots from the Select DIMMs field. To select all
DIMMs in the repair records, click the reset icon .
7. To view the most recent repair records, click Displays the most recent 40 records. The system displays only the most recent 40 records. To view repair records during the memory lifetime, click Displays repair records during the life cycle.
Parameters
· Displays the most recent 40 records: Displays the most recent 40 repair records of the selected DIMMs.
¡ Timestamp: Time at which the DIMM was repaired.
¡ Memory location: DIMM slot.
¡ Status: Repairing status of the DIMM.
¡ Manufacturer SN: Unique product code assigned by the manufacturer. This field displays N/A if the system fails to obtain the serial number.
¡ Manufacturer: Manufacturers of the DIMM.
¡ Test channel: Memory repair method, which is Intel® Memory Resilience Technology. The repair operation is performed by the system automatically.
· Displays repair records during the life cycle: Displays all repair records of the selected DIMMs during its lifetime.
¡ Memory location: DIMM slot.
¡ Manufacturer SN: Unique product code assigned by the manufacturer. This field displays N/A if the system fails to obtain the serial number.
¡ Manufacturer: Manufacturers of the DIMM.
¡ History repairs: Total number of repairs of the DIMM.
¡ Last repaired at: Most recent time at which the DIMM was repaired.
Drive health
Perform this task to view health statistics of selected drives and make predictions on health indicators of some drives.
Procedure
1. On the top navigation bar, click O&M Diagnosis.
2. In the left navigation pane, select Intelligent Monitoring.
3. (Optional.) In the Select drive area, select a drive slot to view the drive information.
4. (Optional.) In the Select parameters area of the AI-predicted trend section, select health indicators to view the actual data and predicted data of the selected indicator.
Restrictions and guidelines
· The SMART information of SAS HDDs does not contain IDs and initial values.
· The AI-predicted trend section can display history statistics for a maximum of 90 days and predicted statistics for a maximum of one day.
· The system stops updating the AI-predicted trend once the server is powered off. The trend will be updated after the server is powered on.
Parameters
· Select drive: Select a drive slot.
· Drive temperature: Temperature of the drive in the selected drive slot.
· Drive reconnections: Number of starts and stops of the drive spindle motor in the selected drive slot.
· Damaged sectors: Number of drive sectors that cannot be accessed or written in the selected drive slot.
· Drive re-identifications: Number of loadings or unloadings of the drive magnetic head in the selected slot.
· Smart information: Information about drive status detection and alarming.
¡ ID: Attribute ID of the SATA HDD SMART information.
¡ Attribute name—Attribute name that corresponds to the ID of the SATA HDD or SAS HDD SMART information.
¡ Current value—Result calculated based on the initial value. If the current value is close to the threshold, the drive health status decreases.
¡ Threshold—Threshold used to identify whether the drive is healthy.
¡ Initial value—SMART information value detected in real time during SATA HDD operation.
Drive health prediction
Perform this task to view health states and repair records of drives.
Procedure
1. On the top navigation bar, click O&M Diagnosis.
2. In the left navigation pane, select Intelligent Monitoring.
3. Click Drive health prediction. The system displays health status and repair records for drives.
Restrictions and guidelines
· The Drive health prediction page can display a maximum of 1000 drive repair records.
· Drive health prediction supports only HDDs.
Parameters
· Drive repair records: Displays related records for drive predictive failures and failure repairs.
¡ Timestamp: Time at which the drive predictive failure occurs or the failure is repaired.
¡ Drive location: Drive slot information.
¡ Status: Drive health status.
- Early warning—A potential drive failure might exist or a drive failure has occurred.
- Repaired—Drive failures are repaired.
¡ Serial number: Unique identifier of the drive.
¡ Vendor: Vendor of the drive.
Drive life prediction
This feature provides drive life information and you can predict remaining life of drives based on the related information..
Restrictions and guidelines
Drive life prediction supports only SATA HDDs.
Procedure
1. On the top navigation bar, click O&M Diagnosis.
2. In the left navigation pane, select Intelligent Monitoring.
3. Click Drive life prediction. View read operation counts, write operation counts, and total uptime of drives.
Parameters
· Top 5 drives with longest uptime (in hours): Top 5 HDDs that have the longest uptime.
· Top 5 drives with most read operations: Top 5 HDDs that have the most read operations.
· Top 5 drives with most write operations: Top 5 HDDs that have the most write operations.
Drive capacity prediction
This feature allows you to monitor the capacity of drive partitions. With the intelligent alarm report function enabled, you will receive warnings for any risks associated with the capacity of your drive partitions. You can also set up the time for drive capacity prediction and the alarm threshold, and view corresponding predictive curves.
IMPORTANT: To use this feature, install and run FIST SMS in the operating system. For more information, see the FIST SMS user guide for servers. |
Procedure
1. On the top navigation bar, click O&M Diagnosis.
2. In the left navigation pane, select Intelligent Monitoring.
No data is displayed if FIST SMS is not running. Please install and run FIST SMS first.
3. Click Advanced Settings. Set the intelligent alarm state, intelligent alarm report state, prediction time, and alarm threshold.
4. Click OK to save the settings.
5. Select drive partitions and view the capacity prediction curves for the partitions.
Parameters
· Intelligent alarm report: Enable the system to report alarms or alarm clearing events based on the alarm threshold and the predicted partition capacity usage. This feature is disabled by default.
· Prediction time: Specify the prediction time in days. By default, the value is 7 after you enable intelligent alarm. The maximum value is 21.
· Alarm threshold: Specify the partition capacity usage that can trigger an alarm.
Firmware and software
Firmware inventory
Perform this task to view and download firmware information for the server, including firmware name, device model, version, and location.
Procedure
1. On the top navigation bar, click Firmware & Software.
2. In the left navigation pane, select Firmware Inventory.
3. To download the firmware inventory to the local server, click Download inventory.
Parameters
· Firmware name: Name of the firmware. Options include HDM, BIOS, CPLD, ME, power supplies,and LCD. Firmware names of a component vary by product.
· Device model: Firmware vendor and component model information.
· Firmware version: External version information of the firmware.
· Location: Component or slot to which the firmware belongs. For example, iFIST belongs to the HDM card and CPLD belongs to the system board.
Installation package management
Procedure
1. On the top navigation bar, click Firmware & Software.
2. In the left navigation pane, select Installation Package Management.
3. View the installation package information.
4. To remove an installation package, click Uninstall in the Actions column.
Parameters
· Name: Name of the installation package.
· Type: Type of the installation package.
¡ Patch package—Released for resolving issues for a specified HDM software version.
¡ Feature package—Released for adding new features to a specified HDM software version.
· External version: Version number of the installation package.
System software
Perform this task to view and download software information for the operating system, including position, name, version, update time.
Prerequisites
Before using this feature, install FIST SMS in the operating system. For more information, see FIST SMS user guide.
Procedure
1. On the top navigation bar, click Firmware & Software.
2. In the left navigation pane, select System Software.
You can view software inventory information for the OS, FIST SMS, and other software.
3. To download the software inventory to the local server, click Download inventory at the upper right corner.
Parameters
· System type: Type of the current operating system.
· Version info: Version information of the current operating system.
· FIST SMS status: Version information of FIST System Management Service (FIST SMS) installed in the operating system.
· Location: Installation directory for the software.
· Name: Name of the software.
· Updated at: Time at which the current software version updated.
· Version info: Version information of the software.
Firmware update
About firmware update
You can update the firmware of HDM, BIOS, CPLD, power supplies, REPO, HDM, server components including storage controllers, network adapters, and drives. The supported firmware varies by server model.
Firmware update restrictions and guidelines
To ensure a successful firmware update, follow these restrictions and guidelines during the update:
· To avoid HDM or operating system errors, do not perform power actions on the server during the update.
· Do not refresh the HDM webpage during the update unless you are instructed to do so. Doing so will reset the update process.
Only one user can update firmware at a time. If multiple users attempt to update firmware, only the one who first started the update can perform this operation. When you successfully start a firmware update, HDM automatically disables all other webpages and signs out all the other users. The signed-out users can sign in again only after the update is finished.
Firmware update might fail if the update image file does not contain a vendor signature or is corrupt. In this situation, obtain the desired firmware image file and try again.
During the firmware upgrade, do not refresh the upgrade page. Other login users cannot perform any operation except KVM access, SDS log downloading, event log saving, operation log saving, upgrade inventory downloading, KVM recorded video downloading, and information query.
If CPLD update fails, the server will become unavailable. If the server cannot be accessed, contact Technical Support.
The following remote console menus are not available during the update:
· Keyboard menu in the KVM console.
· Send Keys and Hot Keys menus in the H5 KVM console.
Because of a limited HDM storage space, the uploaded image size cannot exceed the specified upper limit. To upload an image file with a large size, first delete the backup image file from the firmware library manually.
Prerequisites for firmware update
Before a firmware update, perform the following tasks:
1. Obtain the up-to-date server firmware image by contacting Technical Support or from the official website of the server vendor.
2. To avoid configuration loss caused by inadvertent mistakes, back up the configuration. You can export the HDM configuration for backup.
3. Make sure no user is updating firmware. You cannot update firmware if there is an ongoing firmware update.
Update the REPO for firmware update
Perform this task to update the REPO for the firmware update of HDM, BIOS, CPLD, power supplies, server components including storage controllers, network adapters, and drives.
Restrictions and guidelines
For the new firmware to take effect after REPO update, iFIST of the server is required. Make sure the iFIST version is compatible with the current HDM version. For information about the compatibility between HDM and iFIST, see HDM release notes or iFIST release notes.
At the first restart after REPO update from HDM, the server will automatically enter iFIST to make the new firmware of server components take effect. After the new firmware takes effect, the server automatically restarts again with boot options configured before the update.
Make sure the REPO image file to be uploaded does not exceed the upper limit as prompted, and the MD5 file does not exceed 1024 bytes.
As a best practice, configure HDM to use the Local image upload method to upload the REPO firmware image.
During the process for the new firmware to take effect, do not restart the server or reconnect its power cords.
Methods for firmware to take effect after update vary by firmware type.
Table 7 Methods for firmware to take effect
Firmware type |
Method to take effect |
HDM |
Restart HDM. |
BIOS |
· If the image file specifications are the same as the specifications of the currently effective file, restart or power on the server. · If the image file specifications are different from the specifications of the currently effective file: ¡ If you select to retain the settings or restore the default configuration, power cycle the device. ¡ If you select to forcedly restore the default configuration, restart or power on the server. · After PFR is enabled on the device with PFRCPLD: ¡ If you select to retain the settings or restore the default configuration, power cycle the device. ¡ If you select to forcedly restore the default configuration, restart or power on the server. |
BPCPLD |
Shut down the server or perform no action. |
· BMC installation package · PSU · Drive firmware |
The firmware takes effect automatically. |
· CPLD1 · CPLD2 · BMCCPLD · PFRCPLD · SWCPLD · DBCPLD · GPU Hopper module · OCPCPLD · UBBCPLD · UBBKLCPLD · GPUCPLD |
Restart CPLD or power off and power on the server. |
· Storage controller firmware · Network adapter firmware |
Restart the server. |
For more restrictions and guidelines, see "Firmware update restrictions and guidelines."
Prerequisites
For information about how to download and use the REPO image file, see the REPO user guide for the server.
See "Prerequisites for firmware update."
Procedure
1. On the top navigation bar, click Firmware & Software.
2. In the left navigation pane, select Update Firmware.
3. In the Update Firmware section, click Update Firmware.
4. In the work pane, perform the following tasks:
a. Select an image upload method.
- If you select Local, select REPO as the firmware type. Click to select an
update image file in the dialog box that opens. Then, browse to upload the MD5 file for
the REPO as needed. HDM will
use the MD5 file to check the integrity of the REPO.
- If you select TFTP, enter the IP address of the interface used for image upload and enter the image name, which must include the suffix. Select REPO as the firmware type. Then, enter the name of the MD5 file for the REPO as needed, which must include the suffix. HDM will use the MD5 file to check the integrity of the REPO.
b. To view the firmware inventory that can be updated by using REPO, click Download inventory.
5. Click Next to enter the page for confirming firmware information.
6. Select one or multiple firmware to be updated.
7. Set the update time as needed. After configuring, the system will establish a new scheduled task that is displayed on the Scheduled Tasks page.
8. View the firmware type, current version, firmware version of the upgrade file, and method to take effect.
9. Enable firmware backup as needed. After enabling, the firmware will be backed up into the firmware library.
10. When updating firmware for HDM, BIOS, and power supplies, configure respective firmware update settings:
¡ Select Enabled for Restore factory default as needed after HDM firmware update.
CAUTION: The Restore factory default option removes all user configured settings and restore factory defaults of the firmware when HDM starts up with the new firmware. When you select this option, make sure you understand its impact on the services. |
¡ Select whether to restore default BIOS settings after the update. The Restore factory default option is unavailable if you update only the ME firmware.
- To retain the user-configured BIOS settings, select Retain.
- To remove the user-configured BIOS settings and restore factory defaults, select Restore. If no factory defaults exist, the system restores the default settings.
- To remove the user-configured BIOS settings and restore default settings, select Forcedly restore. This option enables HDM to rewrite the BIOS flash and can be used when the BIOS is operating incorrectly and cannot be updated in any other ways.
The Forcedly restore option is available for BIOS firmware update only when the server is powered off.
¡ Select target components for firmware update of power supplies.
11. Verify that the firmware update configuration is correct, and then click Next.
The firmware update starts and the system displays the update progress.
12. Access the Operation Log page from HDM to view the firmware update result.
Update HDM firmware
HDM supports one primary firmware image and one backup firmware image, and it always runs the primary image.
To minimize the impact on HDM services, HDM uses the following procedure to update HDM firmware:
1. When you update HDM firmware, HDM replaces the backup firmware image with the uploaded update image.
2. When you restart HDM or perform a primary/backup switchover, HDM changes the roles of primary and backup HDM images. Then, HDM restarts with the update image, which is now the primary image.
Restrictions and guidelines
If the Restore factory default option is selected, you must use the default user account settings at the first sign-in to HDM after its firmware is updated.
Both HDM primary and backup images support update for multiple types of firmware, including HDM, the BIOS, CPLD, and power supplies.
When updating HDM firmware from the Web interface, the system only updates the firmware for the primary image.
After updating the HDM firmware, clear browser cache before logging into the HDM Web interface. If you do not clear the browser cache, interface display may have issues.
After you enable the PFR function on the device installed with PFRCPLD, the updated HDM firmware will restart twice and the BIOS will also be restarted. The startup time of HDM and the BIOS will be slightly longer, which is normal. To avoid negative impact, make sure no running service operations are present.
For more restrictions and guidelines, see "Firmware update restrictions and guidelines."
Prerequisites
See "Prerequisites for firmware update."
Procedure
1. On the top navigation bar, click Firmware & Software.
2. In the left navigation pane, select Update Firmware.
3. In the work pane, perform the following tasks:
a. Select an image upload method.
- If you select Local, select HDM as the
firmware type. Then, click to select an update image file in the dialog box that
opens.
- If you select TFTP, enter the IP address of the interface used for file upload and enter the image name. Then, select HDM as the firmware type. The image name must include the suffix.
4. Click Next to access the page for confirming firmware information. Perform the following tasks:
a. Set the update time as needed. After setting, HDM will establish a new scheduled task that is displayed on the Schedule Tasks page.
b. Verify that the firmware type, current version of image in use, and image file version are correct.
c. Select Enabled for Restore factory default as needed after HDM firmware update.
CAUTION: The Restore factory default option removes all user configured settings and restore factory defaults of the firmware when HDM starts up with the new firmware. When you select this option, make sure you understand its impact on the services. |
d. Select the method to reboot the server after the update is complete.
You can have the server automatically restart immediately. Alternatively, you can choose Restart the Server Manually to manually restart the server.
e. Enable firmware backup as needed. After enabling, the firmware will be backed up into the firmware library.
6. After update, restart HDM for the firmware to take effect.
Update HDM installation package
Perform this task to update the HDM installation package.
· Patch package—Released for resolving issues for a specified HDM software version.
· Feature package—Released for adding new features to a specified HDM software version.
Procedure
1. On the top navigation bar, click Firmware & Software.
2. In the left navigation pane, select Update Firmware.
3. In the work pane, select an image upload method.
¡ If
you select Local, select HDM as the firmware type. Then,
click to select an update image file in the dialog box that
opens.
¡ If you select TFTP, enter the IP address of the interface used for file upload and enter the image name. Then, select HDM as the firmware type.
4. Click Next to confirm the installation page information.
5. Click Next. The installation package update starts.
The method for the new installation package to take effect varies by installation package type. For more information, see the guidance document for the installation package.
Update BIOS firmware
HDM Web interface supports uploading the BIOS firmware to update the BIOS firmware. The method can update the BIOS and ME firmware simultaneously. You can retain the user-configured BIOS settings, remove the user-configured BIOS settings and restore factory defaults, or remove the user-configured BIOS settings and restore the default settings. After the update, the method for the new firmware to take effect depends on the file specifications and configuration selection. For more information, see Table 7 in "Update the REPO for firmware update."
Restrictions and guidelines
For the update of the BIOS firmware on a server with Intel processors, if the update file specifications differ from the current active file specifications, you must update both the BIOS and ME firmware simultaneously to avoid BIOS anomaly.
To avoid update errors, make sure power supply redundancy is normal before the update.
If the Restore or Forcedly restore option is selected, the boot mode in the BIOS changes to the default after the update and the operating system might fail to start correctly.
After an update, during the operation for the new firmware to take effect, do not perform BIOS or HDM update again. If you do so, a BIOS error might occur.
To avoid BIOS errors, make sure the system has entered the boot options before you update the firmware if the server is up.
For a server installed with Intel processors, do not perform graceful power-off from HDM to restart the server after you update the BIOS with the Forcedly restore option specified. If you perform graceful power-off, ME exceptions might occur.
All user-configured BIOS settings will get lost if you downgrade the BIOS firmware.
After you enable the PFR function on the device installed with PFRCPLD, if you select Immediately for the firmware update, HDM will restart after the update. The startup time of HDM and the BIOS will be slightly longer, which is normal.
For more restrictions and guidelines, see "Firmware update restrictions and guidelines."
Prerequisites
See "Prerequisites for firmware update."
Procedure
1. On the top navigation bar, click Firmware & Software.
2. In the left navigation pane, select Update Firmware.
3. In the work pane, perform the following tasks:
a. Select an image upload method.
- If you select Local, select BIOS as the firmware type. Then, click to select an
update image file in the dialog box that opens.
- If you select TFTP, enter the IP address of the interface used for image upload and enter the image name. Then, select BIOS as the firmware type. The image name must include the suffix.
4. Uploading the BIOS firmware—Click Next to access the page for confirming firmware information. Perform the following tasks:
a. Set the update time as needed. After setting, HDM will establish a new scheduled task that is displayed on the Schedule Tasks page.
b. Verify that the firmware type, current version of image in use, and image file version are correct.
c. Select components to be updated. This task is available only for servers installed with Intel processors.
You cannot select only ME when the server is up.
d. Specify Immediately or Manually for the update configuration. This field is available only when the server is up.
e. Select whether to restore factory defaults after the update.
The Restore factory default option is available only when you update the BIOS firmware by uploading the BIOS firmware. When you update only the ME firmware, the Restore factory default option is not supported.
- To retain the user-configured BIOS settings, select Retain.
- To remove the user-configured BIOS settings and restore factory defaults, select Restore. If no factory defaults exist, the system restores the default settings.
- To remove the user-configured BIOS settings and restore default settings, select Forcedly restore. This option enables HDM to rewrite the BIOS flash and can be used when the BIOS is operating incorrectly and cannot be updated in any other ways.
The Forcedly restore option is available for BIOS firmware update only when the server is powered off.
f. Enable firmware backup as needed. After enabling, the firmware will be backed up into the firmware library.
5. Click Next.
6. After update, take the required action for the firmware to take effect.
Update CPLD firmware
Perform this task to update the following types of CPLD firmware:
· Main CPLD firmware of the system board, named CPLD1.
· Auxiliary CPLD firmware of the system board, named CPLD2.
· CPLD firmware of the PFR CPLD system board, named PFRCPLD.
· CPLD firmware on the BMC management board, named BMCCPLD.
· CPLD firmware on the Switch adapter board, named SWCPLD.
· CPLD firmware on the mezzanine board, named DBCPLD.
· CPLD firmware on OCP adapter board, named OCPCPLD.
· CPLD firmware on the Biren GPU module, named UBBCPLD.
· CPLD firmware on the bottom plate of the KUNLUNXIN GPU module, named UBBKLCPLD.
· CPLD firmware on the KUNLUNXIN GPU, named GPUCPLD.
Restrictions and guidelines
The supported CPLD firmware types vary by device model.
If CPLD firmware update fails, the server cannot operate correctly.
Update of the PFRCPLD firmware is supported only when the PFR function is enabled. The update also restarts HDM and the BIOS, which is normal. To avoid negative impact, make sure no running service operations are present.
See "Firmware update restrictions and guidelines."
Prerequisites
See "Prerequisites for firmware update."
Procedure
1. On the top navigation bar, click Firmware & Software.
2. In the left navigation pane, select Update Firmware.
3. In the work pane, perform the following tasks:
a. Select an image upload method.
- If you select Local, select CPLD as the firmware type. Then, click to select an
update image file in the dialog box that opens.
- If you select TFTP, enter the IP address of the interface used for image upload and enter the image name. Then, select CPLD as the firmware type. The image name must include the suffix.
4. Click Next to access the page for confirming firmware information. Perform the following tasks:
a. Set the update time as needed. After setting, HDM will establish a new scheduled task that is displayed on the Schedule Tasks page.
b. Verify that the firmware type, current version of image in use, and image file version are correct.
c. Enable firmware backup as needed. After enabling, the firmware will be backed up into the firmware library.
5. Click Next.
The firmware update starts and the system displays the update progress.
6. After the update is complete, access the Restart firmware page, and then click Restart CPLD for the firmware to take effect.
Update drive backplane firmware
Restrictions and guidelines
This feature is available only for some servers. You can view the Web interface display to identify the support status.
The system updates the firmware for drive backplanes one by one, and restarts automatically after the update finishes for all drive backplanes.
An update operation updates only drive backplanes supported by the uploaded BPCPLD image file.
You can update the BPCPLD firmware when the server is powered on or off. To avoid update failures, do not perform power actions or reconnect the power cords during the update.
If the update fails for a drive backplane, the system will try again. A maximum of three update attempts are allowed for each drive backplane.
For more restrictions and guidelines, see "Firmware update restrictions and guidelines."
Prerequisites
See "Prerequisites for firmware update."
Procedure
1. On the top navigation bar, click Firmware & Software.
2. In the left navigation pane, select Update Firmware.
3. In the work pane, perform the following tasks:
a. Select an image upload method.
- If you select Local, select BPCPLD as the firmware type. Then, click to select an
update image file in the dialog box that opens.
- If you select TFTP, enter the IP address of the interface used for image upload and enter the image name. Then, select BPCPLD as the firmware type. The image name must include the suffix.
4. Click Next to access the page for confirming firmware information. Perform the following tasks:
a. Set the update time as needed. After setting, HDM will establish a new scheduled task that is displayed on the Schedule Tasks page.
b. Verify that the firmware type, current version of image in use, and image file version are correct.
c. Enable firmware backup as needed. After enabling, the firmware will be backed up into the firmware library.
5. Click Next. The firmware update starts.
After the update finishes, if the server is powered on, the new firmware takes effect after you power off the server. If the server is powered off, the new firmware takes effect immediately.
Update power supply firmware
Restrictions and guidelines
The system updates the firmware only for power supplies using the same model defined in the image file and updates the power supplies one by one. The power supply that is being updated cannot supply power to the server. Make sure a minimum of one power supply is present and the power supply can provide power to the system board during the update process.
Before the update, make sure the present power supplies are operating correctly.
If the system supports power supply grouping, make sure power supplies in the same group have the same model.
Power supply firmware supports the following update methods:
· Immediate update—Start immediately once the new firmware image version is verified.
To avoid power supply errors, do not power on or power off the server or disconnect any power supply during the update.
· Update after server power-off—Start nine seconds after the server is powered off.
To avoid power supply errors, do not power on the server or disconnect any power supply during the update.
· Upgrade when the power supply module is abnormal—As a best practice to avoid power supply failures, resolve the power module issues before upgrade.
The firmware update method is determined by the image file. Before the update, contact Technical Support to identify the update method.
The update process might take a long time.
If the update fails for a power supply, the power supply might fail to operate.
For more restrictions and guidelines, see "Firmware update restrictions and guidelines."
Prerequisites
See "Prerequisites for firmware update."
Procedure
1. On the top navigation bar, click Firmware & Software.
2. In the left navigation pane, select Update Firmware.
3. In the work pane, perform the following tasks:
a. Select an image upload method.
- If you select Local, select PSU as the firmware type. Then, click to select an
update image file in the dialog box that opens.
- If you select TFTP, enter the IP address of the interface used for image upload and enter the image name. Then, select PSU as the firmware type. The image name must include the suffix.
4. Click Next to access the page for confirming firmware information. Perform the following tasks:
a. Set the update time as needed. After setting, HDM will establish a new scheduled task that is displayed on the Schedule Tasks page.
b. Verify that the target power supply module, current version of image in use, and image file version are correct.
c. Enable firmware backup as needed. After enabling, the firmware will be backed up into the firmware library.
5. Click Next.
The server starts the update immediately or after the server is powered off depending on the update method of the new firmware image.
To view the update result for each power supply, go to Operation Log.
The new firmware takes effect automatically after the update finishes.
Update GPU Hopper firmware
Perform this task to update firmware for components on the Delta Hopper module (firmware name GPUH800 or GPUH20), including GPU, HMC, FPGA, NVSwitch, PCIe switch, and PCIe retimer.
Restrictions and guidelines
After the server is powered on, wait for the BIOS to complete a full startup before you perform update tasks for the GPU Hopper firmware. If you fail to do so, the update might fail or components might fail to be identified.
This feature is available only when the server is powered on. During the update process, do not power off or remove power from the server. If you do so, the update might fail or components might fail to be identified.
For more restrictions and guidelines, see "Firmware update restrictions and guidelines."
Prerequisites
See "Prerequisites for firmware update."
Procedure
1. On the top navigation bar, click Firmware & Software.
2. In the left navigation pane, select Update Firmware.
3. In the work pane, select an image upload method.
¡ If
you select Local, click to
select an update image file in
the dialog box that opens.
¡ If you select TFTP, enter the IP address of the TFTP server and the image name. The image name must include the suffix. Make sure the address is the same as the value of the Server interfaces field in the tftpd tool.
4. Click Next to access the page for confirming firmware information. Perform the following tasks:
a. Set the update time as needed. After setting, HDM will establish a new scheduled task that is displayed on the Schedule Tasks page.
b. Verify the current image versions and update image versions for components. By default, all components of the module are selected for update.
c. Enable firmware backup as needed. After enabling, the firmware will be backed up into the firmware library.
5. Click Next.
6. After the update, for the new firmware to take effect, restart CPLD or power off and power on the server.
Update firmware for retimer on the BIREN GPU module
Perform this task to update firmware for PCIe retimer on the BIREN GPU module.
Restrictions and guidelines
After the server is powered on, wait for the BIOS to complete a full startup before you perform update tasks for the retimer firmware on the BIREN GPU module. If you fail to do so, the update might fail or components might fail to be identified.
This feature is available only when the server is powered on. During the update process, do not power off or remove power from the server. If you do so, the update might fail or components might fail to be identified.
Procedure
1. On the top navigation bar, click Firmware & Software.
2. In the left navigation pane, select Update Firmware.
3. In the work pane, select an image upload method.
¡ If
you select Local, click to
select an update image file in
the dialog box that opens.
¡ If you select TFTP, enter the IP address of the TFTP server and the image name. The image name must include the suffix. Make sure the address is the same as the value of the Server interfaces field in the tftpd tool.
4. Click Next to access the page for confirming firmware information. Perform the following tasks:
a. Set the update time as needed. After setting, HDM will establish a new scheduled task that is displayed on the Schedule Tasks page.
b. Verify the current image versions and update image versions for components. By default, all components of the module are selected for update.
c. Enable firmware backup as needed. After enabling, the firmware will be backed up into the firmware library.
5. Click Next.
6. After the update, the new firmware to take effect immediately.
Update firmware for storage controllers, network adapters, and drives
Restrictions and guidelines
When multiple components of different models are present, you can update firmware only for components whose firmware images are available for update.
You can update firmware for storage controllers, network adapters, and drives when the server is up and can update firmware for only network adapters when the server is down. To avoid update or component identification failures, do not power off the server or disconnect the power cord during firmware update for storage controllers, network adapters, and drives.
If the update fails for a GPU, the system retries. The system allows a maximum of two retries.
Prerequisites
Before updating, contact Technical Support to confirm the component information for firmware update.
Procedure
1. On the top navigation bar, click Firmware & Software.
2. In the left navigation pane, select Update Firmware.
3. In the work pane, perform the following tasks:
a. Select an image upload method.
- If you select Local, click to
select an update image file in
the dialog box that opens.
- If you select TFTP, enter the IP address of the interface used for image upload and enter the image name. The image name must include the suffix.
4. Click Next to access the page for confirming firmware information. Perform the following tasks:
a. Set the update time as needed. After setting, HDM will establish a new scheduled task that is displayed on the Schedule Tasks page.
b. Select the target components. Verify that the firmware information, current version of image in use, and image file version are correct.
c. Enable firmware backup as needed. After enabling, the firmware will be backed up into the firmware library.
5. Click Next.
6. After the update, for the new firmware for storage controllers and network adapters to take effect, restart the server. The new firmware for drives will take effect automatically.
Advanced options
Perform this task to configure BMC firmware anomaly recovery, BIOS firmware anomaly recovery, and update task recovery after an unexpected restart.
Restrictions and guidelines
· When the system is running with the backup firmware, you cannot configure BMC firmware anomaly recovery.
· Besides state changes of configuration items on the Advanced options page, default setting restoration, factory default restoration, and BMC configuration import might also change the states of configuration items for advanced options.
· The configuration item changes of advanced options do not affect recovery tasks once the tasks are deployed.
· Update task recovery after a BMC restart does not take effect on scheduled update tasks, BMC firmware anomaly recovery, and BIOS firmware anomaly recovery.
· Scheduled update tasks, BMC firmware anomaly recovery, and BIOS firmware anomaly recovery task resumes after the device restarts.
Procedure
1. On the top navigation bar, click Firmware & Software.
2. In the left navigation pane, select Update Firmware.
3. Click Advanced options. Enable BMC firmware anomaly recovery, BIOS firmware anomaly recovery, and Update task recovery after BMC restart as needed.
4. Click OK.
Parameters
· BMC firmware anomaly recovery: Enables BMC firmware to recover from anomalies automatically.
¡ When anomalies occur to the primary BMC firmware, the system uses the backup firmware. The backup firmware attempts to restore the primary firmware with user configuration retained and BMC will switch back to the primary firmware once the primary firmware recovers.
¡ If the recovery fails, BMC keeps using the backup firmware.
To view the running firmware, navigate to System > System Overview > Product Information.
· BIOS firmware anomaly recovery: Enables the BIOS firmware to recover from anomalies automatically.
¡ If BIOS firmware anomalies are detected, the system attempts to restore the BIOS firmware at next startup with user configuration retained.
¡ If the host cannot be powered on or the BIOS startup times out, BMC recovers the BIOS firmware with the default settings restored, and then attempts to power on the host. This operation might change the BIOS settings.
¡ If the recovery fails, the system no longer attempts to restore the BIOS firmware.
· Update task recovery after BMC restart: Enables update tasks to resume automatically after a restart when anomalies occur.
¡ If the restart occurs at the update preparation stage, the update task fails.
¡ If the restart occurs at update execution, the update task resumes after the restart.
¡ If the recovery fails, the system no longer attempts to resume the update task.
To view the progress of update tasks, click My tasks on the Dashboard page.
Firmware restart
Restart HDM
You can restart HDM to have the new firmware image take effect after a firmware update or when HDM is malfunctioning.
When HDM restarts, all HDM user sessions are closed. However, these sessions will be automatically re-established after HDM starts up.
HDM restart does not remove the HDM configuration.
Restrictions and guidelines
Do not power on, power off, or power cycle the server during an HDM restart operation. Doing so might cause malfunctioning of some HDM features or operating system errors.
Procedure
1. On the top navigation bar, click Firmware & Software.
2. In the left navigation pane, select Restart Firmware.
3. Click Restart HDM, and then click OK to confirm the operation.
Restart CPLD
You can restart CPLD to have the new CPLD1, CPLD2, PFRCPLD, HDMCPLD, SWCPLD, and BRCPLD firmware image take effect after a firmware update or when CPLD firmware is malfunctioning.
The CPLD firmware types supported by this feature are as follows:
· CPLD1: Main CPLD firmware of the system board.
· CPLD2: Auxiliary CPLD firmwareof the system board.
· PFRCPLD: CPLD firmware of the PFR CPLD system board.
· BMCCPLD: CPLD firmware on the BMC management board.
· SWCPLD: CPLD firmware on the Switch adapter board.
· DBCPLD: CPLD firmware on the mezzanine board.
· OCPCPLD: CPLD firmware on OCP adapter board.
· UBBCPLD: CPLD firmware on the Biren GPU module.
· UBBKLCPLD: CPLD firmware on the bottom plate of the KUNLUNXIN GPU module.
· GPUCPLD: CPLD firmware on the KUNLUNXIN GPU.
Restrictions and guidelines
Support of CPLD firmware types varies by device model.
You can restart CPLD only when the server is powered off.
Restarting CPLD will cause HDM to restart immediately.
Procedure
1. On the top navigation bar, click Firmware & Software.
2. In the left navigation pane, select Restart Firmware.
3. Click Restart CPLD and then click OK to confirm the operation.
Firmware library
During firmware update from HDM Web interface, if you enable firmware backup, HDM will back up the firmware image file to the firmware library automatically.
Perform this task to view information for the backup firmware image files.
Restrictions and guidelines
The maximum capacity of the firmware library is 500 MB. If the available capacity is less than the size of the new image to be backed up, the backup operation fails. To resolve the issue, delete firmware image files from the library manually.
The firmware library saves image files used for recovery by default in case of system exceptions. The files occupy some storage space and the occupied space cannot be released manually. Image files used for scheduled firmware upgrade also occupy some space of the firmware library and the occupied space is released when the scheduled task finishes or is manually cancelled.
Procedure
1. On the top navigation bar, click Firmware & Software.
2. In the left navigation pane, select Firmware library.
3. View the space size for the firmware library, including Used space and Available space.
4. View firmware image file information, including the firmware name, type, version, and size.
5. To start firmware update, click Activate in the Actions column for a firmware image file.
6. To delete a target firmware image file, click Delete in the Actions column.
Users & Security
User management
Configure user accounts, including local users, LDAP users, AD groups, and Kerberos groups to control access to HDM.
View local user information
Procedure
1. On the top navigation bar, click Users & Security.
2. In the left navigation pane, select Users.
3. In the work pane, view information about HDM users in the user list.
Parameters
· User ID: ID of the user.
· Username: Name of the user.
· Access to HDM: Whether the user can access HDM.
· User role: Role of the user, which determines the network access privileges of the user.
¡ Administrator—The user has read and write permissions to all features.
¡ Operator—The user has read permission to all features and has write permission to some features.
¡ User—The user has read-only permission.
¡ CustomRoleN—The user has the privileges specified for the custom role by an administrator user. The system supports a maximum of five custom user roles.
¡ None—The user does not have network access permissions. This role is for special use. Do not assign the role to any users.
Configure the password policy for local users
Perform this task to enhance HDM access security by setting rules that the passwords of user accounts must follow.
Restrictions and guidelines
If the length of the password exceeds 20 characters, you cannot access the IPMI interface by using IPMItool. If you modify the password from IPMItool, make sure the length does not exceed 20 characters.
To upload a weak password dictionary, make sure the file name does not exceed 255 characters in length, and contain only letters, digits, and the following special characters: @ ! $ ^ & ( ) _ + . ; [ ] { } - = ~ `
To upload a weak password dictionary, make sure the file size does not exceed 10K, and each weak password does not exceed 40 characters. The file content can include line breaks, lowercase and uppercase letters, digits, spaces, and the following special characters: ` ~ ! @ # $ % ^ & * ( ) _ + - = [ ] \ { } | ; ' : " , . / < > ?
Any characters in the weak password dictionary that do not comply with the rules or exceed the length limit will be deleted after the upload. The content of the uploaded weak password dictionary cannot be empty.
Procedure
1. On the top navigation bar, click Users & Security.
2. In the left navigation pane, select Users.
3. In the work pane, click Settings.
4. In the dialog box that opens, enter your login password, configure the password policy, and then click OK.
5. If the weak password check is enabled, click Weak password dictionary management, and you can perform the following operations in the drop-down list:
¡ Click Upload weak password dictionary. In the dialog box that opens, view the current weak password dictionary, or upload a new weak password dictionary and click OK.
¡ Click Export weak password dictionary to export the current weak password dictionary.
Parameters
· Password complexity check: Disable or enable password complexity check.
¡ If this feature is disabled, passwords must meet the following basic complexity requirements:
- 2 to 40 characters in length.
- Case sensitive. Valid characters are letters, digits, spaces, and the following special characters: ` ~ ! @ # $ % ^ & * ( ) _ + - = [ ] \ { } | ; ' : " , . / < > ?
¡ If this feature is enabled, passwords must meet the following enhanced complexity requirements:
- 8 to 40 characters in length.
- Case sensitive. Valid characters are the same as those supported when password complexity check is disabled.
- Must contain characters from at least two of the following categories: uppercase letters, lowercase letters, and digits.
- Must contain at least one space or special character.
- Must not be identical to the username or the reverse of the username.
· Password validity: Maximum number of days that a password can be used. When a password is about to expire, HDM prompts the user to change the password.
· Disable history passwords: Number of unique passwords that a user must create before an old password can be reused.
· Account lockout threshold: Number of consecutive login failures that will cause a user account to be locked.
· Account lockout duration: Amount of time before a locked account can be used again.
· Weak password check: Select whether to enable weak password check. This feature can identify whether a password is weak. After you enable this feature, a user-configured password cannot be in the weak password dictionary.
Configure privileges for custom users
Perform this task to configure privileges for custom users and change the names of custom user roles.
Restrictions and guidelines
Only users that have basic configuration privilege can upload or download files.
Procedure
1. On the top navigation bar, click Users & Security.
2. In the left navigation pane, select Users.
3. To edit the names of custom user roles,
click the icon to the left of the User roles field
of the table header.
4. In the Custom privileges section, select access privileges for custom users CustomRole1 to CustomRole5 as needed.
5. Click Save. In the dialog box that opens, enter the login password.
Parameters
· User roles: User role that represents a set of HDM access privileges.
· CustomRoleN: Name of the custom user role. The system supports a maximum of five custom user roles. By default, a custom user role has only the information query privilege. You can edit a custom user role name as needed. A name is a case-sensitive string of 1 to 16 characters, and supports only letters, digits, dots (.), hyphens (-), underscores (_), and at signs (@).
· User accounts: Specify the privilege to manage local users, LDAP users, and AD groups, Kerberos groups, configure OTP authentication, certificate authentication, SSH secret key, secure erasure, import and export configurations, system locks and perform unified control.
· Basic configuration: Specify the privilege to manage asset tags, network configuration, LLDP configuration, Wi-Fi settings, NTP configuration, SNMP configuration, alarm settings (SMTP settings, SNMP trap settings, and syslog settings), event log policy configuration, operation log clearing, video replay, intelligent security bezel, and intelligent monitoring (except view the drive information).
· Security: Specify the privilege to configure access services, firewall, SSL certificate, PFR, and security tip for login settings.
· Remote control: Specify the privilege to manage storage configuration (RAID configuration and physical drive management), system resource monitoring, BIOS configuration, KVM, H5 KVM, password settings for VNC client login, system boot options, UID LED, SOL connection mode, MCA policy, performance configuration, and performance consultant. The privilege for power control and mounting media images are not included.
· Remote media: Specify the privilege to configure virtual media configuration, virtual media operation wizard, media mounting from the KVM console, and media mounting from the H5 KVM console.
· Power control: Specify the privilege to manage power configuration, NMI control, physical power button control, fan settings, liquid leakage policy, and intelligent power saving.
· Maintenance: Specify the privilege to manage the event log clearing, installation packages, firmware update, firmware library, scheduled tasks, HDM settings restoration, HDM restart, service USB device settings, and CPLD restart.
· System audit: Specifies the privilege to view and save event logs and operation logs, and to manage SDS log downloading.
· Intelligent power efficiency: Specify the privilege to configure the power saving mode.
· Information query: Specify the privilege for a user to view HDM information (excluding event logs and operation logs displaying as well as SDS log downloading). Only an administrator user can view information about other users.
· Password modification: Specify the privilege to modify the local user's own password and the default password modification policy.
Manage local user accounts
Restrictions and guidelines
· You cannot delete a user in a session.
· The user with user ID 1 is an anonymous user reserved by IPMI. The user cannot log in to HDM or be modified from the HDM Web interface.
· Privacy protocols AES192 and AES256 can be used only in combination with authentication protocol SHA256, SHA384, or SHA512.
Prerequisites
Make sure you signed in with the administrator role.
Add a user account
1. On the top navigation bar, click Users & Security.
2. In the left navigation pane, select Users.
3. Click Add.
4. In the dialog box that opens, configure the user parameters.
5. Click OK.
Edit a user account
1. On the top navigation bar, click Users & Security.
2. In the left navigation pane, select Users.
3. Click Edit in the user account entry.
4. In the dialog box that opens, enter the login password and configure the user parameters.
5. Click OK.
Delete a user account
1. On the top navigation bar, click Users & Security.
2. In the left navigation pane, select Users.
3. Click Delete in the user account entry.
4. In the dialog box that opens, enter the login password and click OK.
Parameters
· User ID: ID of the user.
· Username: Specify a username for the user account. The username is a case-sensitive string of 1 to 32 characters. Valid characters are letters, digits, dots (.), hyphens (-), underscores (_), and at signs (@).
· Password: Specify a password for the user account, which must comply with the password policy described in "Configure the password policy for local users."
· Default password modification policy: Method for the system to process the default password when a user logs in to the BMC.
¡ Not modify: When the user log in to the BMC, access BMC directly.
¡ Forced modify: The user must change the default password when logging in to the BMC.
¡ Optional modify: A dialog box opens when the user logs in to the BMC, giving the option to immediately change the password, postpone the change, or not receive further prompts.
· Confirm: Enter the password again for confirmation.
· Access to HDM: Enable the user to access HDM as needed. If you do not enable user access, the user cannot access HDM.
· User role: Select a user role, which represents a set of HDM access privileges. Available user roles include:
¡ Administrator—The user has read and write permissions to all features.
¡ Operator—The user has read permission to all features and has write permission to some features.
¡ User—The user has read-only permission.
¡ CustomRoleN—The user has the privileges specified for the custom role by an administrator user. The system supports a maximum of five custom user roles.
¡ None—The user does not have network access permissions. This role is for special use. Do not assign the role to any users.
· Available interfaces: Select the Web and IPMI access privileges for the user as needed.
Web and IPMI access are authorized to administrators and operators by default and cannot be revoked.
· SNMP extended privileges: Select whether to grant the user with SNMP extended privileges. To grant the privileges, you must enable user access to HDM and the user password must contain a minimum of eight characters. If you select SNMP extended privileges, select a privilege from the SNMPv3 R/W permission field. Options include:
¡ Read: The user has read-only permission. This enables the user to perform GET operations and receive traps.
¡ Read/Write: The user has read-and-write permission. This enables the user to perform GET and SET operations and receive traps.
· SNMPv3 independent password: Enter the password to enable the SNMPv3 privilege. By default, the independent password is the same as the local user password. Follow these guidelines when you configure an SNMPv3 independent password:
¡ The password is a string of 8 to 40 characters.
¡ The password must meet the advanced password policy requirements for local user passwords. For more information, see "Configure the password policy for local users."
· SNMPv3 authProtocol: Select the SNMP v3 authentication protocol. Options include SHA, MD5, SHA256, SHA384, and SHA512. The default protocol is SHA.
· SNMPv3 privProtocol: Select the SNMP v3 privacy protocol. Options include DES, AES, AES192, and AES256. The default protocol is DES.
User roles and privileges matrix
The supported features or feature menus vary by server model.
The following information describes the privileges that a user role has. A feature or feature menu is inaccessible if your user role does not have the privileges to use that feature or feature menu.
Menu/Feature |
Administrator |
Operator |
User |
User accounts |
|||
Configure a local user account |
√ |
× |
× |
Configure LDAP settings |
√ |
× |
× |
Configure AD settings |
√ |
× |
× |
Configure Kerberos settings |
√ |
× |
× |
Configure OTP authentication |
√ |
× |
× |
Configure certificate authentication |
√ |
× |
× |
Upload SSH key |
√ |
× |
× |
Configure secure erasure |
√ |
× |
× |
Import and export configurations |
√ |
× |
× |
System locks |
√ |
× |
× |
Perform unified control |
√ |
× |
× |
Basic configuration |
|||
Set asset tags |
√ |
√ |
× |
Configure the HDM dedicated network port |
√ |
√ |
× |
Specify the HDM shared network port |
√ |
√ |
× |
Configure general settings |
√ |
√ |
× |
Configure LLDP |
√ |
√ |
× |
Configure Wi-Fi settings |
√ |
√ |
× |
Configure NTP servers |
√ |
√ |
× |
Configure SNMP settings |
√ |
√ |
× |
Manage alert emails |
√ |
√ |
× |
Configure SNMP trap settings |
√ |
√ |
× |
Configure syslog settings |
√ |
√ |
× |
View and manage event log policy |
√ |
√ |
× |
Delete operation log entries |
√ |
√ |
× |
Configure advanced settings for video replay (download and play videos) |
√ |
√ |
× |
Configure the intelligent security bezel |
√ |
√ |
× |
Intelligent monitoring (except view the drive information) |
√ |
√ |
× |
Security |
|||
Configure services |
√ |
√ |
× |
Configure the firewall |
√ |
√ |
× |
Configure SSL |
√ |
√ |
× |
PFR |
√ |
√ |
× |
Security tip for login |
√ |
√ |
× |
Remote console |
|||
Manage storage configuration |
√ |
√ |
× |
Configure the alarm thresholds for system resource monitoring |
√ |
√ |
× |
Use KVM remote console (except power control and media mounting) |
√ |
√ |
× |
Use H5 KVM remote console (except power control and media mounting) |
√ |
√ |
× |
Configure password settings for VNC client login |
√ |
√ |
× |
Configure BIOS settings |
√ |
√ |
× |
Switch SOL connection mode |
√ |
√ |
× |
Set the UID LED |
√ |
√ |
× |
Set the MCA policy |
√ |
√ |
× |
Performance configuration |
√ |
√ |
× |
Performance consultant |
√ |
√ |
× |
Remote media |
|||
Configure virtual media settings |
√ |
√ |
× |
Virtual media operation wizard |
√ |
√ |
× |
Mount media images from KVM |
√ |
√ |
× |
Mount media images from H5 KVM |
√ |
√ |
× |
Power control |
|||
Power on or power off the server |
√ |
√ |
× |
NMI control |
√ |
√ |
× |
Physical power button control |
√ |
√ |
× |
Meter power (operating mode and power-on policy) |
√ |
√ |
× |
Configure global power settings (alarm threshold for the global power consumption and power capping) |
√ |
√ |
× |
Configure fan settings |
√ |
√ |
× |
Configure the liquid leakage policy |
√ |
√ |
× |
Configure processor power states |
√ |
√ |
× |
Intelligent power saving |
√ |
√ |
× |
Maintenance |
|||
Clear event logs |
√ |
√ |
× |
Update firmware |
√ |
× |
× |
Manage installation package |
√ |
× |
× |
Manage firmware library |
√ |
× |
× |
Manage scheduled tasks |
√ |
× |
× |
Restore HDM settings |
√ |
× |
× |
Restart HDM |
√ |
× |
× |
Restart CPLD |
√ |
× |
× |
Manage service USB device settings |
√ |
× |
× |
System audit |
|||
View and save event logs |
√ |
√ |
× |
View and save operation logs |
√ |
√ |
× |
Manage SDS log downloading |
√ |
√ |
× |
View most recent event notifications |
√ |
√ |
× |
Information query |
|||
View basic server information |
√ |
√ |
√ |
View basic server status information |
√ |
√ |
√ |
View server health state |
√ |
√ |
√ |
View HDM user sessions |
√ |
√ |
√ |
View storage information |
√ |
√ |
√ |
View system information |
√ |
√ |
√ |
View power information |
√ |
√ |
√ |
Display power configuration (operating mode and power-on policy) |
√ |
√ |
√ |
Display global power settings (alarm threshold for the global power consumption and power capping) |
√ |
√ |
√ |
View history power consumption statistics |
√ |
√ |
√ |
View processor power states |
√ |
√ |
√ |
View temperature heatmaps |
√ |
√ |
√ |
View fan configuration |
√ |
√ |
√ |
View BIOS settings |
√ |
√ |
√ |
View system resource monitoring statistics |
√ |
√ |
√ |
View information about the HDM dedicated network port |
√ |
√ |
√ |
View information about the HDM shared network port |
√ |
√ |
√ |
View general settings |
√ |
√ |
√ |
View LLDP information |
√ |
√ |
√ |
View Wi-Fi information |
√ |
√ |
√ |
View NTP servers |
√ |
√ |
√ |
View service configuration information |
√ |
√ |
√ |
View remote console information |
√ |
√ |
√ |
View virtual media information |
√ |
√ |
√ |
View SNMP settings |
√ |
√ |
√ |
View SOL connection mode information |
√ |
√ |
√ |
View BSoD screenshots |
√ |
√ |
√ |
View alarm settings |
√ |
√ |
√ |
View configuration management information |
√ |
√ |
√ |
View POST codes |
√ |
√ |
√ |
View intelligent security bezel settings |
√ |
√ |
√ |
View service USB device settings |
√ |
√ |
√ |
View secure erasure information |
√ |
√ |
√ |
View task center |
√ |
√ |
√ |
View and download firmware inventory information |
√ |
√ |
√ |
View and download system software information |
√ |
√ |
√ |
View firmware library information |
√ |
√ |
√ |
View scheduled task information |
√ |
√ |
√ |
View information about the current local user |
√ |
√ |
√ |
View information about the other local users |
√ |
× |
× |
View LDAP settings |
√ |
√ |
√ |
View AD group settings |
√ |
√ |
√ |
View AD settings |
√ |
√ |
√ |
View firewall settings |
√ |
√ |
√ |
View the SSL certificate |
√ |
√ |
√ |
View OTP authentication settings |
√ |
√ |
√ |
View certificate authentication settings |
√ |
√ |
√ |
View PFR settings |
√ |
√ |
√ |
View the security tip for login |
√ |
√ |
√ |
View the security module status |
√ |
√ |
√ |
View fan module configuration |
√ |
√ |
√ |
View system locks configuration |
√ |
√ |
√ |
View unified control information |
√ |
√ |
√ |
View the power saving mode |
√ |
√ |
√ |
View intelligent power saving configuration |
√ |
√ |
√ |
View UID LED status |
√ |
√ |
√ |
Toggle between languages |
√ |
√ |
√ |
Access online help |
√ |
√ |
√ |
Refresh a page |
√ |
√ |
√ |
Sign out HDM |
√ |
√ |
√ |
Password modification |
|||
Modify the current user's password |
√ |
√ |
√ |
Modify the default password modification policy for the current user |
√ |
√ |
√ |
Configure LDAP settings
Lightweight Directory Access Protocol (LDAP) enables you to efficiently access and maintain distributed directory information services over an IP network.
You can enable LDAP authentication and access to HDM with the user accounts in LDAP role groups on the LDAP server.
Prerequisites
Before configuring LDAP settings, make sure an LDAP server is available.
Procedure
1. On the top navigation bar, click Users & Security.
2. In the left navigation pane, select Users.
3. Click the LDAP User tab.
4. In the LDAP settings section, click Settings.
5. In the dialog box that opens, enter the HDM login password.
6. Enable or disable LDAP authentication as needed. If you enable LDAP authentication, you must also configure the LDAP parameters.
7. Click OK.
Parameters
· Encryption type: Select the encryption type.
¡ No encryption—Establishes an unencrypted connection with the LDAP server.
¡ SSL—Establishes an SSL encrypted connection with the LDAP server.
· LDAP certificate verification: Enable or disable LDAP certificate verification. For this feature to take effect, you must also enable LDAP encryption.
· Certificate verification level: Select a verification level. Options include:
¡ Demand: Refuses a client to log in to HDM when a certificate error is detected for the client or the client does not have a certificate.
¡ Allows: Allows a client to log in to HDM even if a certificate error is detected for the client or the client does not have a certificate.
· LDAP certificate: Upload the LDAP CA certificate. Only the .cer, .pem, .cert, and .crt formats are supported. The certificate name cannot contain spaces and special characters such as back quote (`), ampersand signs (&), left parentheses ((), right parentheses ()), semi-colons (;), and apostrophes ('). The maximum length of the certificate name is 32 characters. The size of the certificate file cannot exceed 1 MB.
· Common name type: IP address or domain name.
· Server address: IPv4 address, IPv6 address, or domain name of the LDAP server.
· Port number: LDAP service port number, in the range of 1 to 65535. For an SSL connection, the port number is 636 by default. For the remaining types of connections, the port number is 389 by default.
· Bind DN: DN information of the LDAP user that is bound to the LDAP server and HDM. The maximum length is 255 bytes. The DN information includes the following:
¡ CN—User login name.
¡ UID—User ID.
¡ OU—Organizational units in ascending order of levels.
¡ DC—Name of the domain to which the user belongs.
· Password: Directory password of the LDAP user.
· Search base: Search base (directory) of the LDAP user in the bind DN on the LDAP server. The maximum length is 255 bytes.
· User identification method: User identification method used by the LDAP server. Supported methods are CN and UID. The user identification method must be consistent with LDAP user information in the bind DN.
· LDAP certificate verification: Enable or disable LDAP certificate verification. To enable this feature, you must first enable LDAP encryption.
· Certificate verification level: Select a verification level. Options include:
¡ Demand: Refuses a client to log in to HDM when a certificate error is detected for the client or the client does not have a certificate.
¡ Allow: Allows the client to log in to HDM even if a certificate error is detected for the client or the client does not have a certificate.
· Upload LDAP certificate: The certificate file cannot exceed 1 MB. The certificate name cannot exceed 32 characters and cannot contain special characters of `&();' or spaces.
Manage LDAP role groups
Add a role group
1. On the top navigation bar, click Users & Security.
2. In the left navigation pane, select Users.
3. Click the LDAP User tab.
4. In the LDAP settings section, click Add role groups.
5. Configure the role group parameters.
6. Click OK.
Edit a role group
1. On the top navigation bar, click Users & Security.
2. In the left navigation pane, select Users.
3. Click the LDAP User tab.
4. In the LDAP settings section, click the Edit link in the role group entry that you want to modify.
5. In the dialog box that opens, enter the HDM login password, and then modify the parameters.
6. Click OK.
Delete a role group
1. On the top navigation bar, click Users & Security.
2. In the left navigation pane, select Users.
3. Click the LDAP User tab.
4. In the LDAP settings section, click Delete in the role group entry that you want to delete. In the dialog box that opens, enter the HDM login password.
Parameters
· Group ID: ID of the role group.
· Group name: Name of an existing role group on the LDAP server. The name must meet the following requirements:
¡ Contains only digits, letters, underscores (_), and hyphens (-).
¡ Starts only with a digit or letter.
¡ Contains 1 to 255 characters.
· Search base: Search base (directory) of the role group on the LDAP server. The maximum length is 255 bytes.
· Group privileges: HDM access privileges of the group.
Configure AD settings
Perform this task to enable users to access HDM by using the username and password of user accounts in a valid Active Directory (AD) group configured on the AD server.
Prerequisites
Before configuring AD settings, make sure an AD server is available.
Procedure
1. On the top navigation bar, click Users & Security.
2. In the left navigation pane, select Users.
3. Click the AD User tab.
4. In the AD settings section, click Settings.
5. Select Enable or Disable for AD authentication. If you select Enable, configure AD authentication parameters as needed.
6. Click OK.
Parameters
· Secret username: Enter the username used for logging in to the AD servers, a string of up to 64 characters. The username can contain only digits, letters, or both and must start with a letter. The username is optional.
· Secret password: Enter the password used for logging in to the AD servers, a string of 6 to 96 bytes. The password is optional.
· User domain name: Enter the user domain name. The name must conform to the domain name requirements.
· Domain controller address: Enter the IP address or domain name of an AD server. Domain controller address 1 is required.
Manage AD groups
Perform this task to add, edit, or delete AD groups.
Add an AD group
1. On the top navigation bar, click Users & Security.
2. In the left navigation pane, select Users.
3. Click the AD User tab.
4. In the AD settings section, click Add role groups.
5. Configure AD group settings in the dialog box that opens.
6. Click OK.
Edit an AD group
1. On the top navigation bar, click Users & Security.
2. In the left navigation pane, select Users.
3. Click the AD User tab.
4. In the AD settings section, click Edit for the target AD group from the AD group list.
5. In the dialog box that opens, enter HDM login password, and then edit AD group settings.
6. Click OK.
Delete an AD group
1. On the top navigation bar, click Users & Security.
2. In the left navigation pane, select Users.
3. Click the AD User tab.
4. In the AD settings section, click Delete for the target AD group from the AD group list. In the dialog box that opens, enter HDM login password.
Parameters
· Group ID: ID of the AD group.
· Group name: Name of a group configured on the AD server, a string of 1 to 255 characters. Only digits, letters, underscores (_), and hyphens (-) are allowed.
· Group domain: Name of the group domain. The name must conform to the domain name requirements.
· Group privileges: HDM access privileges of the group.
Configure Kerberos settings
Perform this task to enable users to access HDM by using the username and password of a user account in a Kerberos role group configured on the Kerberos server. If the Kerberos server domain name is added to the PC as a local intranet zone, you can access HDM directly without entering a username or password. To add a domain name to the PC, access Internet Options > Security > Local intranet > Sites > Advanced, and then enter the domain name in the Add this Web site to the zone field.
Prerequisites
Before configuring Kerberos settings, make sure a Kerberos server is available.
Restrictions and guidelines
Direct HDM login without using a username and password is not available once two-factor authentication is enabled.
SSH, Telnet, IPMI, and SNMP are not available for Kerberos users.
Procedure
1. On the top navigation bar, click Users & Security.
2. In the left navigation pane, select Users.
3. Click the Kerberos User tab.
4. Enable or disable Kerberos authentication. In the dialog box that opens, enter your login password.
5. If you enabled Kerberos authentication, click Settings.
6. In the dialog box that opens, enter the login password. Then, configure Kerberos settings.
7. Click OK.
8. To access HDM
directly without a username and password, click in the Key table section, select the keytab
file, and click Upload. In the dialog box that opens, enter the login password.
After the keytab file is uploaded, you can access BMC by using the username and password or directly from the login page.
Parameters
· Domain name: Enter the Kerberos server domain name. The name must conform to domain name requirements:
¡ The domain name cannot exceed 255 characters
¡ Only uppercase letters are supported.
· Kerberos server address: Enter the IP address of the Kerberos server. The address can be an IPv4 address, IPv6 address, or domain name.
· Kerberos port: Enter the Kerberos port. The Kerberos port must conform to port verification rules. The default port is 88.
Manage Kerberos role groups
Perform this task to add, edit, or delete Kerberos role groups.
Add a Kerberos role group
1. On the top navigation bar, click Users & Security.
2. In the left navigation pane, select Users.
3. Click the Kerberos User tab.
4. In the Kerberos role group section, click Add role group.
5. Configure Kerberos role group settings in the dialog box that opens.
6. Click OK.
Edit a Kerberos role group
1. On the top navigation bar, click Users & Security.
2. In the left navigation pane, select Users.
3. Click the Kerberos User tab.
4. In the Kerberos role group section, click Edit for the target Kerberos role group in the list.
5. In the dialog box that opens, edit the Kerberos role group settings.
6. Click OK. In dialog box that opens, enter the login password. The operation is finished once the verification succeeds.
Delete a Kerberos role group
1. On the top navigation bar, click Users & Security.
2. In the left navigation pane, select Users.
3. Click the Kerberos User tab.
4. In the Kerberos role group section, click Delete for the target Kerberos role group in the list. In dialog box that opens, enter the login password. The operation is finished once the verification succeeds.
Parameters
· Group ID: ID of a Kerberos role group.
· Group name: Name of an existing role group on the Kerberos server. You can customize the group name based on group permissions for management convenience. The name must meet the following requirements:
¡ Contains only digits, letters, underscores (_), and hyphens (-).
¡ Contains 1 to 255 characters.
· SID: Security Identifier (SID) used for Kerberos role authorization. It is also the objectSID of the role group attribute in the Kerberos server.
· Group privileges: BMC access permission used by the user. Options include:
¡ Administrator: Has read and write permissions to all features.
¡ Operator: Has read permissions to all features and write permissions for specific features. The operator role allows users to perform basic daily operations.
¡ User: Has read-only permissions and cannot edit BMC settings.
¡ CustomRoleN: Custom user roles with administrator-specified permissions. The value of N is in the range of 1 to 5.
Configure firewall
The firewall protects HDM from attacks based on firewall rules that identify accesses to be permitted or blocked.
If HDM cannot be accessed due to improper firewall settings, you can restore the HDM factory defaults from the BIOS to clear the firewall rules. For more information, see the BIOS user guide for the server.
Types of firewall rules and their priority order
You can create the following firewall rules:
· Blacklist rules—Block accesses to the HDM server from specific IP addresses or MAC addresses. You can configure a blacklist rule to take effect in the specified time range.
· Whitelist rules—Permit accesses to the HDM server from specific IP addresses of MAC addresses. You can configure a whitelist rule to take effect in the specified time range.
The blacklist rules take precedence over the whitelist rules.
Manage blacklist rules
Use blacklist rules to block accesses from the specified IP addresses and MAC addresses.
Restrictions and guidelines
· You must specify an IP address/IP range, a MAC address, or both for a blacklist rule.
· The time range settings take effect based on the system time in the HDM server and use the same time zone as HDM.
· You cannot create multiple blacklist rules with the same content or multiple blacklist rules that only differ in protocol (TCP, UDP, or TCP+UDP).
Add a blacklist rule
1. On the top navigation bar, click Users & Security.
2. In the left navigation pane, select Firewall.
3. In the Blacklist rules section, click Add.
4. In the dialog box that opens, enter at least one of an IP address/IP range, a MAC address, and a port/port range, select UDP, TCP, or both, and set the time range during which the rule takes effect. By default, no validity period is set and the rule is valid permanently.
5. Click OK.
Delete a blacklist rule
1. On the top navigation bar, click Users & Security.
2. In the left navigation pane, select Firewall.
3. In the Blacklist rules section, click Delete for the target rule.
Edit a blacklist rule
1. On the top navigation bar, click Users & Security.
2. In the left navigation pane, select Firewall.
3. In the Blacklist rules section, click Edit for the target rule.
4. In the dialog box that opens, edit the rule as needed.
5. Click OK.
Manage whitelist rules
Use whitelist rules to permit accesses from the specified IP addresses and MAC addresses.
Restrictions and guidelines
· First add the IP address and MAC address of the local device to the whitelist before adding any other whitelist rules. If you do not do so, HDM cannot be accessed from the local device.
· If whitelist rules exist, only devices whose addresses have been added to the whitelist can access HDM.
· When you delete a whitelist rule, make sure you fully understand the impact of the operation.
· You must specify an IP address/IP range, a MAC address, or both for a whitelist rule.
· The time range settings take effect based on the system time in the HDM server and use the same time zone as HDM.
· You cannot create multiple whitelist rules with the same content or multiple whitelist rules that only differ in protocol (TCP, UDP, TCP+UDP).
Add a whitelist rule
1. On the top navigation bar, click Users & Security.
2. In the left navigation pane, select Firewall.
3. In the Whitelist rules section, click Add.
4. In the dialog box that opens, enter at least one of an IP address/IP range, a MAC address, and a port/port range, select UDP, TCP, or both, and set the time range during which the rule takes effect. By default, no validity period is set and the rule is valid permanently.
5. Click OK.
Delete a whitelist rule
1. On the top navigation bar, click Users & Security.
2. In the left navigation pane, select Firewall.
3. In the Whitelist rules section, click Delete for the target rule.
Edit a whitelist rule
1. On the top navigation bar, click Users & Security.
2. In the left navigation pane, select Firewall.
3. In the Whitelist rules section, click Edit for the target rule.
4. In the dialog box that opens, edit the rule as needed.
5. Click OK.
Manage an SSL certificate
Secure Sockets Layer (SSL) is a protocol for securely transmitting private data over the Internet by using for TCP-based application layer protocols, such as HTTP. It uses keys to encrypt and decrypt data. Using SSL, the Web server and client can have secure data transmission, verify the identity of the data source, and ensure the integrity of the data.
SSL protects HDM accesses from eavesdropping and data tampering and enables HDM users to authenticate the HDM server through SSL certificate authentication.
View SSL certificate
1. On the top navigation bar, click Users & Security.
2. In the left navigation pane, select SSL Certificate.
3. View information about the current SSL certificate.
Upload an SSL certificate and key to HDM
As a best practice, upload an encryption algorithm certificate such as the RSA2048 certificate. You are not recommended to upload the DSA certificate.
Prerequisites
Before you upload an SSL certificate, perform the following tasks:
· Make sure you signed in with the administrator or operator role, or a user account that has the privilege to configure security settings.
· Identify the date and time in HDM on the Dashboard > Summary page, and verify that the HDM system time is in the validity period of the certificate. If the HDM system time is not in the validity period of the certificate, SSL authentication will fail.
· When configuring the common name, organization, organization unit, state or province, and country, the length for the value contains the space at the front or end. However, parameters configured successfully will be displayed with no space.
Procedure
1. On the top navigation bar, click Users & Security.
2. In the left navigation pane, select SSL Certificate.
3. Click the SSL Certificate tab.
4. Click Upload SSL.
5. Examine information about the current certificate and private key to decide whether a new set of certificate and private key is needed:
¡ Current certificate uploaded at—Date and time when the current certificate was uploaded.
¡ Current private key uploaded at—Date and time when the current private key was uploaded.
6. Click next to the New certificate field, and then select an SSL certificate file.
7. Click next to the New private key field, and then select a private key file.
8. Click OK.
After the certificate is uploaded, your user session will be disconnected. The HDM server will use the new SSL certificate for authentication during subsequent sign-ins.
Generate an SSL certificate
Prerequisites
To generate an SSL certificate, you must sign in with the administrator or operator role, or a user account that has the privilege to configure security settings.
Procedure
1. On the top navigation bar, click Users & Security.
2. In the left navigation pane, select SSL Certificate.
3. Click the SSL Certificate tab.
4. Click Generate SSL.
5. Configure the certificate parameters.
6. Click OK.
7. In the confirmation dialog box that opens, click OK.
If the certificate is generated, you receive a success result message.
The HDM server will use the new SSL certificate for authentication during subsequent sign-ins.
Parameters
· Basic information: Basic information about the current SSL certificate.
¡ Version—Version number of the certificate.
¡ Serial number—Serial number of the certificate. This number is assigned by the certificate authority (CA).
¡ Signature algorithm—Signature algorithm of the certificate.
¡ Public key—Public key information of the certificate.
· Issued by: Certificate authority that issued the certificate.
· Validity: Validity period of the certificate.
¡ Issued at—First valid day of the certificate.
¡ Expires at—Expiration day of the certificate.
· Issued to: Entity to whom the certificate is issued.
· Common name (CN): Full domain name of the HDM server, a string of 1 to 64 characters. Only letters, digits, spaces, underscores (_), hyphens (-), and dots (.) are allowed. The common name cannot be a digits-only string.
· Organization (O): Name of the organization that owns the HDM server, a string of 1 to 64 characters. Only letters, digits, spaces, underscores (_), hyphens (-), dots (.), and commas (,) are allowed. The organization name cannot be a digits-only string.
· Organizational Unit (OU): Name of the unit that owns the HDM server in the organization, a string of 1 to 64 characters. Only letters, digits, spaces, underscores (_), hyphens (-), and dots (.) are allowed. The organizational unit name cannot be a digits-only string.
· Locality (L): City or county where the HDM server resides, a string of 1 to 128 characters. Only letters, digits, spaces, underscores (_), hyphens (-), and dots (.) are allowed. The locality name cannot be a digits-only string.
· State or province (ST): State or province where the HDM server resides, a string of 1 to 128 characters. Only letters, digits, spaces, underscores (_), hyphens (-), and dots (.) are allowed. The state or province name cannot be a digits-only string.
· Country (C): Country or region where the HDM server resides. The country/region is represented as a two-letter code.
· Email address: Email address at which the HDM server owner can be contacted. The address can contain a maximum of 128 characters.
· Validity period: Validity period of the SSL certificate, in the range of 1 to 5475 days.
· Key length: Key length of the certificate.
Configure two-factor authentication
After you enable certificate or OTP authentication, you cannot add and manage the current server through the HDM management IP address by using management software or features that do not support the corresponding authentication, for example, UniSystem , HDM Mobile, and HDM unified control of other servers.
Certificate authentication
To improve HDM reliability for security and avoid user information leakage, HDM provides certificate authentication that requires a client certificate and client private key for each login.
Restrictions and guidelines
Before enabling certificate, perform the following tasks:
· Do not enable certificate authentication and OTP authentication at the same time.
· Apply for a root certificate, client certificate, and client private key from the certification authority.
· Upload the root certificate and client certificate. Following these restrictions when uploading:
¡ You must upload Base64 coded root certificate and client certificate in the format of .cer, .crt, or .pem. The browser only supports client private key in the . p12 format.
¡ Make sure the length of the certificate name does not exceed 32 characters, and the name cannot contain spaces or special characters, such as back quotes (`), ampersand signs (&), left parentheses ((), right parentheses ()), semi-colons (;), and apostrophes (').
¡ You can upload a maximum of 20 root certificates and 16 client certificates for each root certificate. HDM supports a maximum of 20 client certificates for uploading, and each client certificate can only bind to one HDM local user.
To avoid authentication failures, bind the HDM local user who has permissions to access HDM Web interface.
After you use a client private key to log in to HDM, the root certificate cannot be deleted.
If you want to switch the client private key, clear the browser cache and select another client private key.
Existing sessions might be terminated and new sessions might fail to be established, as shown in Table 8. However, the configuration of these interfaces is not modified. After you disable certificate authentication, these interfaces restore to the status before certificate authentication was enabled.
Table 8 Session consistency and establishment
Interface |
Disconnect existing sessions or connections |
Block new sessions or connections |
Web |
No |
No |
SSH |
No |
Yes |
Telnet |
Yes |
Yes |
VNC |
Yes |
Yes |
Redfish |
Yes |
Yes |
IPMI |
Yes |
Yes |
SNMPv3 |
No |
Yes |
SOL |
Yes |
Yes |
Upload certificates
1. On the top navigation bar, click Users & Security.
2. In the left navigation pane, select Two-Factor Authentication.
3. Select the Certificate Authentication tab.
4. Click to
browse to files, select the target root certificate, and click Upload certificate.
5. In the root certificate list, view the uploaded certificate information.
6. To upload a client certificate, click Upload client certificate in the Actions column. In the dialog box that opens, select and upload the client certificate.
7. To delete a root certificate or client certificate, click Delete in the Actions column.
Bind an HDM local user
1. On the top navigation bar, click Users & Security.
2. In the left navigation pane, select Two-Factor Authentication.
3. Select the Certificate Authentication tab.
4. Click User binding in the Actions column for the target client certificate. In the dialog box that opens, select a user.
5. To unbind the user from a certificate, click User unbinding in the Actions column.
Enable certificate authentication
1. On the top navigation bar, click Users & Security.
2. In the left navigation pane, select Two-Factor Authentication.
3. Select the Certificate Authentication tab.
4. Configure Enable certificate to the enabled state. In the dialog box that opens, enter the HDM login password, and select root certificate to enable.
5. Enable Certificate revocation check as needed. If enabling, in the dialog box that opens, enter the HDM login password.
Log in to HDM by using certificate
1. Open the dialog box for browser certificate management.
2. Click Import to import the client private key. Enter a certificate password if you set a password during the private key generation.
3. Close and open the browse again, access the HDM Web interface, and select the target client certificate as prompted.
4. You can log in to HDM successfully after the certificate passes its verification.
Parameters
Certificate revocation check: Verifies whether a client certificate is revoked by using the OCSP server for a successful HDM login.
OTP authentication
OTP authentication requires a static password and a dynamic password for each login attempt to provide enhanced network security.
HDM supports DKEY token and can collaborate with a one-time password (OTP) server to provide two-factor authentication for user login. With this feature configured, a user must enter the correct username, static password, and dynamic password obtained from a mobile phone or hardware token to log in to HDM.
Restrictions and guidelines
CAUTION: Use this feature with caution. Enabling OTP authentication might affect HDM login. |
Before enabling OTP authentication, make sure an OTP server is available and the related settings have been configured on the OTP server. Required settings include HDM management IP address, HDM user accounts (local users and domain users), authentication policy, and tokens.
HDM does not lock a user if the number of user login failures caused by incorrect dynamic passwords reaches the account lockout threshold.
Support for OTP authentication varies by server model.
Enabling OTP authentication affects server management as follows:
· Do not enable certificate authentication and OTP authentication at the same time.
· Existing sessions might be terminated and new sessions might fail to be established, as shown in Table 9. However, the configuration of these interfaces is not modified. After you disable OTP authentication, these interfaces restore to the status before OTP authentication was enabled.
Table 9 Session consistency and establishment
Interface |
Disconnect existing sessions or connections |
Block new sessions or connections |
Web |
No |
No |
SSH |
No |
Yes |
Telnet |
No |
No |
VNC |
Yes |
Yes |
Redfish |
Yes |
Yes |
IPMI |
Yes |
Yes |
SNMPv3 |
Yes |
Yes |
SOL |
Yes |
Yes |
Procedure
1. On the top navigation bar, click Users & Security.
2. In the navigation pane, select Two-Factor Authentication.
3. Click the OTP Authentication tab.
4. Enable OTP authentication.
5. Enter the OTP server address, service port, and shared key.
6. Click Save. In the dialog box that opens, enter the HDM login password.
Parameters
· OTP server address: Enter the IPv4 or domain address of the OTP server.
· Service port: Enter the service port number of the OTP server. The default is 1812.
· Shared key: Enter the shared key configured when you add the HDM management IP address to the OTP server. The shared key is a case-sensitive string of 1 to 64 characters. Only letters, digits, and special characters `~!@$%^&*()_+-=[]\{}|;':",./? are allowed.
Upload SSH secret key
Perform this task to upload an SSH secret key, and bind the SSH secret key to a local user for HDM login.
Restrictions and guidelines
At access attempts, the user must also enter the password for the key if a password was specified during key generation on the HDM CLI client. If no password was specified, the user can directly log in to the HDM CLI.
In the current software version, RSA, ECDSA, and ED25519 keys are supported. The length of an SSH key varies by key format.
· For RSA SSH keys, the length can be 1024, 2048, or 4096 bytes.
· For ECDSA SSH keys, the length can be 256, 384, or 521 bytes.
· For ED25519 SSH keys, the length can only be 256 bytes.
HDM supports a maximum of 20 SSH secret keys for uploading, and 1 to 16 users to be bond with each key. Each user can only be bond with one SSH secret key.
Make sure the file name does not exceed 32 characters for each SSH secret key file, and the name cannot contain spaces or special characters, such as back quotes (`), ampersand signs (&), left parentheses ((), right parentheses ()), semi-colons (;), and apostrophes (').
Procedure
1. On the top navigation bar, click Users & Security.
2. In the navigation pane, select SSH Secret Key.
3. Click to
browse to files and select the target file.
4. Click Upload key.
5. After uploading, view the SSH key name and public key hash.
6. To bind a user, click User binding in the Actions column. In the dialog box that opens, select the target user and click OK.
7. To unbind a user, click User unbinding in the Actions column.
8. To delete a key, click Delete in the Actions column.
Parameters
Publish hash: Hash of an SSH key.
Configure PFR
PFR is a technology used to protect HDM from attacks. If PFR is enabled, PFR will verify the HDM firmware image when HDM starts. The implementation of PFR requires support from the PFRCPLD firmware. PFRCPLD is responsible for protecting BMC and the BIOS firmware and providing checksum and recovery functionality. Servers equipped with the PFRCPLD firmware have this feature enabled by default, while only certain servers support the installation of PFRCPLD firmware.
· If the primary HDM firmware image passes the verification, HDM starts with the primary image.
· With Start with the backup image upon primary image damage enabled, if the primary HDM firmware image is damaged, PFR verifies the backup HDM firmware image. If the backup image passes the verification, HDM starts with the backup image.
· If both the primary and backup HDM firmware images are damaged, but the damage to the primary image does not affect HDM start, HDM starts with the primary image.
· If the primary HDM firmware image is damaged and Start with the backup image upon primary image damage is not enabled, HDM is unable to be started.
Restrictions and guidelines
· You can update a damaged firmware image to correct it.
· If the main partition of the BMC is damaged, PFRCPLD first attempts to fix the partition. If the partition cannot recover, the entire server system is unable to start up.
· If the BIOS firmware is damaged, PFRCPLD attempts to fix the BIOS firmware. If the firmware cannot recover, BMC still can start up normally.
· Enabling PFR extends the startup time of HDM.
· After PFR is enabled, you can only upgrade the BMC firmware that supports PFR. To use the PFR-incapable BMC firmware of an earlier version, disable PFR first.
Procedure
1. On the top navigation bar, click Users & Security.
2. In the navigation pane, select PFR.
3. Select whether to enable HDM to start with the backup image upon primary image damage. This feature is available only when PFR is enabled.
Parameters
· Enablement status: Enablement status of PFR. By default, PFR is enabled.
· Current firmware status: Result of the verification on HDM firmware images during this startup.
· Start with the backup image upon primary image damage: Select whether HDM can start with the backup firmware image. This feature is disabled by default. With this feature enabled, HDM can start with the backup firmware image if the primary image fails the verification but the backup image passes the verification.
Configure the security tip for login
Perform this task to configure the security tip displayed on the login page.
Restrictions and guidelines
The security tip can contain 0 to 1024 bytes. Valid characters include letters, digits, Chinese characters, and special characters except the left angle brackets (<) and right angle brackets (>).
Procedure
1. On the top navigation bar, click Users & Security.
2. In the navigation pane, select Security Tip for Login.
3. Enable Display security tip at login.
4. (Optional.) Configure the security tip.
5. Click Save.
If you configure a security tip, the tip will be displayed on the login page.
Security modules
Perform this task to view TPM/TCM status
Trusted Platform Module (TPM) is a microchip embedded in the system board. It stores encryption information (such as encryption keys) for authenticating server hardware and software. Trusted Cryptography Module (TCM) is a trusted computing platform-based hardware module with protected storage space, which enables the platform to implement password calculation. For information about the TPM/TCM module, see the user guide for the server.
Procedure
1. On the top navigation bar, click Users & Security.
2. In the navigation pane, select Security Modules.
3. On the tab that opens, you can view TPM or TCM status. This field displays N/A if both the TPM and TCM are not supported.
Security monitoring information
This feature allows you to view the status of important security settings and verify whether potential risks exist for HDM static security settings. When risks are detected, you can use this feature to view details and suggestions.
Procedure
1. On the top navigation bar, click Users & Security.
2. In the left navigation pane, select Security Monitoring Information.
3. Enable Security Monitoring.
After enabling the feature, you can view the status of important HDM security settings. The feature is disabled by default.
4. (Optional.) Ignore the risks of security settings in the Configuration details section.
5. (Optional.) When a security setting is in risk status, to view the warning for the setting, click Risk in the Status column.
Parameter
· Security settings do not have any risks: No security configuration risk is detected.
· Security settings have risks: One or more security configuration items are identified as risky.
· The overall security status has been ignored: All risky security configuration items are ignored.
· Security monitoring is disabled: Security monitoring is disabled.
· Risk configuration items: Number of security settings that have risks.
· Ignore risk items: Number of security settings of which the risks are ignored.
· Security setting: Names of security settings that are being monitored.
· Value: Current status of the security setting that is being monitored.
· Status: Current risk status of the security setting that is being monitored.
¡ Normal: No risk is detected.
¡ Risk: Potential risk is detected.
¡ Ignore: Risk warning for the security setting is ignored.
· Ignore: Select to ignore risk warning for the security setting. This feature is disabled by default.
Reasons and suggestions for security setting risks are as follows:
Table 10 Reasons and suggestions for security setting risks
Security setting |
Risk configuration status |
Reasons and suggestions |
|
Account authentication security |
Password complexity check |
Disabled |
Setting a simple password increases the security risk of brute-force attacks. Recommended action: Access Users & Security > Users > Local User >Settings to enable password complexity check. |
Account lockout threshold |
0 |
Disabling login failure lock might lower the system security performance. Recommended action: Access Users & Security > Users > Local User > Settings to set the account lockout threshold. |
|
Account lockout duration |
0 |
Disabling login failure lock might lower the system security performance. Recommended action: Access Users & Security > Users > Local User > Settings to set the account lockout duration. |
|
Password validity (day) |
0 |
If the password validity is not set, long term use of an unchanged password increases the risk of password compromise and might lead to unauthorized access attacks. Recommended action: Access Users & Security > Users > Local User > Settings to set a proper password validity period and change the password periodically. |
|
Disable history passwords |
0 |
If you do not disable history passwords, the system security performance might be lowered. Recommended action: Access Users & Security > Users > Local User > Settings to set the password history count. |
|
Weak password check |
Disabled |
Disabling weak password check might increase the security risk of brute-force attacks. Recommended action: Access Users & Security > Users > Local User > Settings to enable weak password check, or use an IPMI or Redfish command to enable weak password check. |
|
LDAP certificate verification |
Disabled |
Disabling LDAP certificate verification might lower the system security performance. Recommended action: Access Users & Security > Users > LDAP User > Settings and enable LDAP certificate verification. |
|
Application service security |
SNMP long community string |
Disabled |
Setting a simple community name increases the security risk of brute-force attacks. Recommended action: Access Remote Services > SNMP to enable the long community string feature. |
SNMP v1/v2c |
Enabled |
SNMPv3 provides higher security performance than SNMP v1/v2c. Recommended action: Access Remote Services > SNMP to disable SNMP v1/v2c. |
|
IPMI RMCP+ |
Disabled |
RMCP+ is more secure than RMCP. Recommended action: Access Remote Services > Services to enable the secure IPMI service port. |
|
VNC password complexity check |
Disabled |
Setting a simple password increases the security risk of brute-force attacks. Recommended action: Access Remote Services > Remote Console > VNC to enable complexity check. |
|
KVM encryption mode |
Disabled |
KVM is operating in the unencrypted mode. Recommended action: Access Remote Services > Services to enable the secure KVM service port. |
|
Certificate remaining validity (day) |
30 (30 included) |
The certificate is about to expire. Recommended action: Access Users & Security > SSL Certificate to replace it with a valid certificate. |
|
TLS version |
TLS version includes TLS v1.0 |
A low TLS version is risky. Recommended action: Use IPMI commands to enable a higher TLS version. |
|
Default certificate is in use |
Yes |
HDM is using the default self-signed certificate. Recommended action: Access Users & Security > SSL Certificate to import a certificate issued by a trusted authority. |
|
Syslog TLS |
Disabled |
Syslog notification is using an insecure transmission protocol. Recommended action: Access O&M Diagnosis > Alarm Settings > Syslog Settings to select the TLS transmission protocol. |
|
SMTP TLS encryption |
Disabled |
The system is sending alert emails through SMTP without using TLS encryption. Recommended action: Access O&M Diagnosis > Alarm Settings > Email Notification to enable TLS encryption. |
System locks
Perform this task to lock specific server features, configurations, and firmware version to avoid mistaken or malicious modification.
Procedure
1. On the top navigation bar, click Users & Security.
2. In the left navigation pane, select System Locks.
3. Enable the system locks feature.
By default, this feature is disabled.
4. Enable or disable specific system locks in Table 11.
5. Click Save. In the dialog box that opens, specify the user password.
6. Click OK. The system lock settings take effect immediately after the password passes verification.
Table 11 System lock parameters
Item |
Description |
Power control |
Controls system reset from HDM or by pressing the physical button. |
Firmware version |
Controls firmware version update from HDM. |
Hardware configuration |
Controls storage controller, GPU, and network configuration from HDM. Options include: · Configure storage controllers, GPUs, and network adapters. · Import RAID configuration files. · Perform storage secure erasing. |
BIOS configuration |
Controls BIOS configuration from HDM. Options include: · Configure the BIOS settings. · Import BIOS configuration files. · Update the BIOS with user-defined settings restored or forcibly restored. · Perform BIOS secure erasing. · Configure BIOS configuration profile. · Configure workload profile. · Configure advanced settings of performance adjustment. |
HDM configuration |
Controls remote modification of HDM configuration. Options include: · Configure user settings (except for export configuration and perform unified control) · Configure general settings (except for event log clearing and video play) · Configure security settings (except for configuring login security information) · Power control (except for power on or power off the server and NMI control) · Remote control (configure MCA policies) · Maintenance (restore the factory defaults of HDM and update HDM with the factory defaults restored) |
In-band access and out-of-band access |
Isolate internal tunnels for OS access to HDM, allowing HDM to operate in an independent environment. |
Restrictions and guidelines
· Only users with the administrator privileges can manage system locks.
· System locks take effect on users of all types.
· Enabling out-of-band access locks may cause functional abnormalities, such as affecting the interaction between the OS and BMC, and making it difficult to locate faults under the OS. Be careful when enabling this feature.
Unified control
Use unified control to manage devices in bulk. You can perform the following tasks:
· Launch an H5 KVM remote console
Add devices
Perform this task to add devices one by one or in bulk. You can add a maximum of 10 devices.
Restrictions and guidelines
The specified IP range can contain a maximum of 255 IP addresses.
If the number of IP addresses contained in the specified IP range exceeds the HDM-supported upper limit, the system adds the devices whose information is obtained first.
If you change a username or password specified for devices in unified control, and the session established for device adding has expired, these devices will become inaccessible from the unified control interface.
Only one user can add devices at a time.
Procedure
1. On the top navigation bar, click Unified Control.
2. Click Add devices.
3. In the dialog box that opens, enter the start and end IP addresses, username, and password.
4. Click OK.
Parameters
· Start IP: Enter the IP address of a device or the start IP address of an IP range. Only IPv4 addresses are supported. This field is required.
· End IP: Enter the end IP address of an IP range. Only IPv4 addresses are supported. This field is optional.
· Username: Enter a username for HDM login. As a best practice, enter the username of an administrator user. If you enter the username of a non-administrator user, some functions will be unavailable.
· Password: Enter the password for HDM login.
View device information
Perform this task to view the information about devices that have been added, including IP addresses, product names, serial numbers, health status, power status, and UID LED status.
Procedure
On the top navigation bar, click Unified Control.
Parameters
· IP: Management IP address of HDM.
· Health status: Displays health status of the server. Options include:
¡ Normal—All server components are
operating correctly.
¡ Critical,
Major—A minimum of one component is experiencing issues.
· Power status: Displays power status of the server. Options include:
¡ On—The server is powered on.
¡ Off—The server is powered off.
· UID LED: Displays the status of the UID LED. Options include:
¡ On—The UID LED
of the server is steady blue.
¡ Off—The UID LED
of the server is off.
¡ Flashing—The UID
LED of the server is flashing blue. The UID LED flashes
if a firmware update is being performed on the server
or if the remote console is open.
Access to HDM
Perform this task to access to the HDM interface of a specific server.
Prerequisites
Make sure the specified user account for the device has the privilege to access to HDM. The user privileges are determined by the user role.
Procedure
1. On the top navigation bar, click Unified Control.
2. Click the IP address link in a server entry.
Perform power actions
CAUTION: The force power-off, force system reset, and force power-cycle actions might cause corruption or loss of data. When you perform these actions, make sure you fully understand their impact on the services. |
Perform this task to manage power status of a server.
Prerequisites
Make sure the specified user account for the device has the administrator or operator role or has the power control privilege.
For the configuration to take effect, make sure only the current user is performing power actions.
Procedure
1. On the top navigation bar, click Unified Control.
2. In the Actions column, click Power actions, and then select the desired action in a server entry:
¡ To start up the server, select Power on.
¡ To power off the server gracefully, select Graceful power-off.
¡ To force a server power-off, select Force power-off.
¡ To reset the server, select Force system reset.
¡ To power cycle the server, select Force power-cycle.
Launch an H5 KVM remote console
Perform this task to operate a server from the H5 KVM remote console.
Prerequisites
Before you can launch an H5 KVM remote console, you must perform the following tasks:
· Make sure the specified user account for the device has the remote control privilege. If the user account does not have the privilege, edit the user account. For more information, see "Manage local user accounts."
· Make sure the user account specified for the device is enabled with the KVM service. If KVM is not enabled, enable the KVM service first. For more information, see "User management."
Procedure
1. On the top navigation bar, click Unified Control.
2. Click H5 KVM in the target server entry.
For more information about H5 KVM remote console, see "Operate the server from H5 KVM."
Delete devices
For the configuration to take effect, make sure only the current user is deleting devices.
1. On the top navigation bar, click Unified Control.
2. Select one or multiple target servers.
3. Click Delete devices.
4. In the confirmation dialog box that opens, click OK.
Intelligent power efficiency
Configure power saving mode
Perform this task to enable the power saving mode for the server. The power saving mode is available only for the power sub-system. After you enable this mode, the power sub-system exits the configured power operating mode and enters the power saving mode.
In power saving mode, HDM dynamically adjusts the power operating mode of the server based on the total power consumption to achieve the highest power efficiency. When the total power consumption is high, the power supplies switch to load balancing mode automatically. When the total power consumption is low, the power supplies switch to active/standby mode automatically.
Restrictions and guidelines
· Before you enable the power saving mode, for the configuration to take effect, make sure the current settings meet the following requirements:
¡ The server enters boot options successfully.
¡ All present power supplies are in normal state.
· After you enable the power saving mode, you cannot set the power operating mode manually.
· Enabling intelligent power saving disables cold standby power supply check if the check feature is enabled, and you cannot enable the check feature manually. When intelligent power saving is disabled, the system enables cold standby power supply check automatically.
· After you disable the power saving mode, the power operating mode will restore to the state before you configure the power saving mode.
Procedure
1. On the top navigation bar, click Intelligent Power Efficiency.
2. Select Intelligent power saving.
3. Enable the power saving mode as needed.
4. If you enable the power saving mode, select components to be power saved. Only power supplies are available.
Performance configuration
Perform this task to view the current BIOS configuration profile and set the BIOS configuration profile for next startup.
For more information about parameters that can be changed by performance configuration, see the user guide for the BIOS.
Restrictions and guidelines
· This feature is available only for servers installed with Intel processors.
· The configuration takes effect after you restart the BIOS.
· When the BIOS configuration is locked or the BIOS is starting up, you cannot modify the configuration profile.
· Only servers with BIOS version 6.00.22 and above support the advanced reliability mode, virtualization-performance, and fixed turbo frequency configuration templates. Only servers with a BIOS version lower than 6.00.22 support decision support and I/O throughput configuration templates. Only servers with BIOS version 6.00.33 and above support AI optimized template.
Procedure
1. On the top navigation bar, click Intelligent Power Efficiency.
2. In the left navigation pane, select Performance Configuration.
3. View the current configuration profile of the BIOS.
4. Select a profile and click Save. The page prompts whether the operation succeeds.
Parameters
· General power efficient compute: Applicable to most applications and focuses more on power-saving. This profile enables processors to operate in power-saving status and processor chips to enter sleep mode and disables virtualization configuration.
· General peak frequency compute: Applicable to scenarios that require processors or memory to support workloads and focuses more on performance. By disabling power-saving and virtualization configuration, this profile enables processors to operate in active status.
· Decision support: Applicable to scenarios that require operating or accessing databases.
· Advanced reliability mode: Applicable to scenarios that require high system stability and maintainability. In this profile, advanced RAS options are enabled, and power-saving options are disabled to reduce the response time of the system to errors.
· General throughput compute: Applicable to scenarios where sustained maximum throughput is required. This profile enables processors to operate at a high efficiency continuously to provide enhanced system performance and the optimal throughput.
· High performance compute: Applicable to scenarios that require high-performance configuration. This profile enables the system to operate at a high efficiency to meet large-scale workload requirements.
· Virtualization-power efficient: Applicable to virtualization scenarios that give priority to power saving. This profile enables all available virtual options and allows processor chips to enter sleep mode.
· Virtualization-performance: Applicable to virtualization scenarios that have high performance requirements. This profile enables all virtualization-related options to support virtualization, and allows the system to operate at a higher frequency by disabling power-saving options to obtain a higher speed.
· I/O throughput: Applicable to scenarios that require throughput improvement between I/O and memory.
· Graphic processing: Applicable to GPU servers. This profile forbids virtualization configuration.
· Low latency: Applicable to scenarios that require the minimal compute latency. This profile might disable management features that cause compute latency.
· Transactional application processing: Applicable to service application scenarios such as database systems.
· AI optimized: Applicable to service scenarios that require a large amount of computing resources for artificial intelligence reasoning or training with a focus on performance.
· Custom: Uses the BIOS default settings. Note that this option does not allow users to customize any settings.
· Fixed turbo frequency: Applicable to scenarios that require fixed turbo frequency. This profile is implemented through an out-of-band manner to exclude the operating system from frequency adjustment.
Performance consultant
Perform this task to view workload characteristics in different time ranges, and obtain the current workload matching configuration and recommended BIOS settings in real time. This feature is realized based on system resource monitoring and workload profiles of the BIOS.
|
NOTE: · This feature is available only for servers installed with Intel processors. · If the recommended configuration is the same as the existing configuration, no recommendation will be given and the page will display a hyphen (-). |
Restrictions and guidelines
· The recommended workload profile configuration takes effect after you restart the BIOS.
· When the BIOS configuration is locked or the BIOS is starting up, you cannot modify the configuration profile.
Procedure
1. On the top navigation bar, click Intelligent Power Efficiency.
2. In the left navigation pane, select Performance Consultant.
3. In the Workload characteristics area, you can view characteristics levels within different time ranges.
4. In the Workload profile configuration area, you can view the current workload profile configuration.
5. To change the current workload configuration to the recommended configuration, click the configure icon in the Recommended config column.
6. In the dialog box that opens, click OK.
Parameters
Workload characteristics:
· CPU utilization: Displays the CPU usage level calculated based on the average CPU usage of a specific period.
· Memory bus utilization: Displays the memory usage level calculated based on the average memory bus usage of a specific period.
· I/O bus utilization: Displays the I/O bus usage level based on the average I/O bus usage of a specific period.
· 10 minutes: Based on data collected at intervals of 10 minutes.
· 1 hour: Based on data collected at intervals of 1 hour.
· 1 day: Based on data collected at intervals of 1 day.