Dell™ PowerConnect 5500 Series CLI Reference Guide
-> Accéder au site Dell
-> Accéder aux Codes Promo et Bons de réduction Dell
-> Voir d'autres manuels Dell
Revenir à l'accueil
ou juste avant la balise de fermeture -->
Accéder au Support :
http://supportapj.dell.com/support/edocs/network/pc5524p/en/CLI/PDF/en_cli.pdf
Commander sur Dell.com
Autres manuels :

Dell-Imprimantes-laser-Dell-2350d-et-Dell-2350dn
Dell-XPS-430-Guide-de-reference-rapide
Dell-PowerEdge-RAID-Controller-PERC-H700-et-H800-Guide-d-utilisation
Dell-Lifecycle-Controller-2-Version-1.00.00-User-s-Guide
Dell-OpenManage-Server-Administrator-Version-7.0-Guide-d-utilisation
Dell-Solutions-NAS-Dell-FluidFS-Manuel-du-proprietaire-Manue
Dell-Guide-de-l-utilisateur-Dell-V525w
Dell-XPS-13-Manuel-du-proprietaire
Dell-Adaptateurs-Brocade-Manuel-d-installation-et-de-reference
Dell-FluidFS-NAS-Solutions-NX3600-NX3610-Guide-de-deploiement
Dell-Systemes-Dell-PowerEdge-T410-Manuel-du-proprietaire
Dell-Latitude-ST-Manuel-du-proprietaire-Manuel
Dell-OptiPlex-360-Guide-de-configuration-et-de-reference-rapide
Dell-PowerEdge-R810-Manuel-du-proprietaire-du-materiel
Dell-Guide-d-installation-des-systemes-Dell-PowerVault-Modular-Disk-3000
Dell-Imprimante-laser-Dell-2230d-Guide-de-l-utilisateur
Dell-Systemes-Dell-PowerEdge-C6105-Manuel-du-proprietaire-du-materiel
Dell-Imprimante-personnelle-a-jet-d-encre-Dell-J740-Manuel-du-proprietaire
Dell-2130cn-IMPRIMANTE-LASER-COULEUR
Dell-Guide-d-utilisation-de-la-station-de-travail-Dell-Precision-T3400
Dell-1235cn-Imprimante-Multifonction-Mode-d-emploi
Dell-Vostro-1310-1510-1710-et-2510-Guide-de-configuration-et-de-reference-rapide
Dell-Guide-d-utilisation-APC-Smart-UPS-750VA-1000VA-1500VA-100-120-230-V-CA-2U-Montage-en-baie-Onduleur
Dell-Guide-d-utilisation-Modele-TL24iSCSIxSAS%201Gb-iSCSI-a-SAS
Dell-Imprimantes-laser-Dell-1130-et-Dell-1130n
Dell-Precision-M6400-Guide-de-configuration-et-de-reference-rapide
Dell-M770mm-Color-Monitor-Quick-Set-up
Dell-Carte-de-gestion-reseau-AP9617-AP9618-AP9619-Manuel-d-installation-et-de-demarrage-rapide
Dell-Projecteur-Dell-1410X-Guide-d-utilisation
Dell-Imprimante-couleur-Dell-1350cnw
Dell-Manuel-d-utilisation-Dell-Inspiron-M5040-15-N5040-15-N5050-Manuel
Dell-Manuel-de-maintenance-Dell-Inspiron-620
Dell-3D-VISION-MANUEL-D-UTILISATION
Dell-Inspiron-600m-Manuel-du-proprietaire
Dell-Systemes-Dell-PowerEdge-R805-Manuel-du-proprietaire
Dell-Systemes-Dell-PowerEdge-R900-Manuel-du-proprietaire
Dell-Systemes-Dell-PowerEdge-2970-Manuel-du-proprietaire
Dell-Systemes-Dell-PowerEdge-C6145-Manuel-du-proprietaire-du-materiel
Dell-Inspiron-660s-Manuel-du-proprietaire
Dell-P513w-User-s-Guide-Francais-manuel
Dell-Inspiron-660-manuels
Dell-Serveur-de-sauvegarde-sur-disque-Dell-PowerVault-DL-optimise-par-CommVault-Simpana-Guide-d-utilisation
Dell-P513w-User-s-Guide-Guide-de-l-utilisateur-manuel
Dell-Precision-Workstation-T1650-Manuel-du-proprietaire
Dell-ALIENWARE-M17x-MANUEL-DE-L-ORDINATEUR-PORTABLE
Dell-Manuel-du-proprietaire-de-Dell-PowerEdge-M905-M805-M600-et-M605
Dell-Inspiron-One-2330-Manuel-du-proprietaire
Dell-Dimension-1100-B110-Manuel-du-proprietaire
Dell-Vostro-270-Manuel-du-proprietaire
Dell-Systemes-Dell-PowerEdge-T320-Manuel-du-proprietaire
Dell-Station-de-travail-mobile-Dell-Precision-M4700-Manuel-du-proprietaire
Dell-XPS-8500-Manuel-du-proprietaire
Dell-1230c-Imprimante-laser-couleur-mode-d-emploi-Manuel
Dell-Client-Management-Manuel
Dell-Studio-XPS-Setup-Guide-Manue
Dell-Adaptateur-hote-Dell-PCIe-SCSI-Ultra320-monocanal-Guide-d-utilisation-Manuel
Dell-INSPIRON-DUO-SETUP-GUIDE-Manuel
Dell-INSPIRON-DUO-GUIDE-DE-CONFIGURATION-Manuel
Dell-Guide-de-l-utilisateur-Dell-Inspiron-M4040-14-N4050-Manuel
Dell-Guide-de-l-administrateur-de-Dell-PowerVault-705N-Manuel
Dell-Vostro-420-220-220s-Guide-de-Configuration-et-de-Reference-Rapide-Manuel
Dell-Matrices-de-stockage-Dell-PowerVault-MD3660f-Series-Guide-de-deploiement-Manuel
Dell-Systemes-Dell-PowerVault-Network-Attached-Storage-NAS-Guide-de-l-administrateur-Manuel
Dell-Latitude-D430-Guide-d-utilisation-Manuel
Dell-Studio-XPS-Guide-de-configuration-Manuel
Dell-PowerEdge-C410x-Manuel-du-proprietaire
Dell-Precision-Workstation-T1650-Manuel-du-proprietaire
Dell-Systemes-Dell-PowerEdge-R300-Manuel-du-proprietaire
Dell-Systemes%20-Dell%20PowerEdge-T110-II-Manuel-du-proprietaire
Dell-Vostro-200-Manuel-du-proprietaire-Mini-Tower
Dell-Inspiron-531-Manuel-du-proprietaire
Dell-ALIENWARE-MANUEL-DE-L-ORDINATEUR-DE-BUREAU-Francais
Dell-PowerEdge-R520-Manuel-du-proprietaire
Projecteur-Dell-1201MP-Manuel-d-utilisation
Dell-PowerEdge-R910-Manuel-du-proprietaire
Dell-Dimension-C521-Manuel-du-proprietaire
Dell-Systemes-Dell-PowerEdge-T605-Manuel-du-proprietaire
Dell-Mobile-Jamz
Dell-Inspiron-530-Series-Manuel-du-proprietaire
Dell-Vostro-3460-Manuels
Dell-OPENMANAGE-POWER-CENTER-1.1-Guide-d-utilisation
Dell-PowerVault-MD3660f-Storage-Arrays-Manuels
Dell™ Ekran Yöneticisi Kullanıcı Kılavuzu
Dell-PowerEdge-R620-Guide-de-mise-en-route
Dell-PowerEdge-R520-Guide-de-mise-en-route
DELL-POWERVAULT-MD1200-et-MD1220-TECHNICAL-GUIDEBOOK
Console-de-gestion-multi-onduleurs-Dell-Manuel-de-l-utilisateur-pour-l-installation-et-la-configuration
DELL-OPTIPLEX580-TECHNICAL-GUIDEBOOK-INSIDE-THE-OPTIPLEX-580
Dell-Inspiron-1720-manuels
Dell-PowerEdge-R720-et-R720xd-Guide-de-mise-en-route
Dell-Vostro-1540-1550-Manuel-du-proprietaire
Dell-Latitude-E5430-Manuel-du-proprietaire
Dell™ S2240L/S2340L Monitör Kullanıcı Kılavuzu
Dell PowerEdge Sistemleri İçin Microsoft Windows Server 2012 Önemli Bilgiler Kılavuzu
Dell-Guide-de-l-utilisateur-du-moniteur-Dell-S2240L-S2340L
Dell™ S320/S320wi Projektör Kullanım Kılavuzu
Dell-%20Vostro-270-Manuels
Dell-Vostro-3460-Manuel-du-proprietaire-Francais
Dell-Inspiron-9200-Manuel-de-l-utilisateur
Dell-Inspiron-2600-et-2650-Manuel-de-l-utilisateur
Dell-Axim-X30-Manuel-de-l-utilisateur
Dell-Vostro-2520-Manuel-du-proprietaire
Dell-Inspiron-1721-Manuel
Dell-Systemes-Dell-PowerEdge-T710-Manuel-du-proprietaire
Dell-Precision-Workstation-T5600-Manuel-du-proprietaire
Dell-Solutions-NAS-Dell-FluidFS-Manuel-du-proprietaire
Systemes-Dell-PowerEdge-C5220-Manuel-du-proprietaire-du-materiel
Dell-Dimension-3000-Manuel-du-proprietaire
Dell-PowerEdge-R210-Technical-Guide
Dell-Inspiron-Manuels
Dell-Manuel-du-proprietaire-du-Dell-Vostro-1700
Dell-Clavier-sans-fil-et-souris-Dell-KM713-Manuel-de-l'utilisateur
Dell-Systeme-de-navigation-GPS-Dell-Manuel-de-l'utilisateur
Dell-Logiciel-de-gestion-de-l-onduleur-Manuel-de-l-utilisateur-pour-l-installation-et-la-configuration
Dell-Demarrage-rapide-du-moniteur-couleur-M990
Dell-Manuel-de-l-utilisateur-de-la-station-de-travail-Dell-Precision-370
Dell-Systemes-Dell-PowerEdge-2800-Guide-d-installation-et-de-depannage
Dell-Manuel-de-l-utilisateur-du-systeme-Dell-OptiPlex-SX280
Dell-Vostro-1440-1450-Manuel-de-l-utilisateur
Dell-Photo-Printer-540-Guide-de-l-utilisateur
Dell-Streak-7-Francais-Manuel-de-l-utilisateur
Dell-Venue-Pro-Manuel-de-l-utilisateur
Dell-Imprimante-laser-personnelle-Dell-P1500-Manuel-du-proprietaire
Dell-PowerEdge-C5125-Manuel-du-proprietaire-du-materiel
Dell-Latitude-D630-Manuels
Dell-Vostro-400-Manuel-du-proprietaire-Mini-Tower
Dell-Systemes-Dell-PowerEdge-T100-Manuel-du-proprietaire
Dell-OptiPlex-9010-7010-compact-Manuel-du-proprietaire
Dell-PowerVault%20NX3200-Manuel-du-proprietaire
Dell-Inspiron-1200-et-2200-Manuel-de%20l-utilisateur
Dell-Vostro-1540-1550-Manuel-du-proprietaire
Dell-Inspiron-8600-Manuel-du-proprietaire
Dell-PowerVault-Baie-de-stockage-MD1120-Manuel-du-proprietaire
Dell-Dimension-E521-Manuel-du-proprietaire
Dell-Inspiron-9100-Manuel-du-proprietaire
Dell-Vostro-3360-Manuel-du-proprietaire
Dell-Systemes-Dell-PowerEdge-T300-Manuel-du-proprietaire
Dell-XPS-One-2710-manuel-d-utilisation
Dell-Inspiron-1150-Manuel-du-proprietaire
Dell-Latitude-E5530-Manuel-du-proprietaire
Dell-Inspiron-660-Manuel-du-proprietaire
Acceder-au-site-Dell
Dell-Manuel-du-proprietaire-des-Dell-Latitude-E6420-et-E6420-ATG-Francais
Dell-OptiPlex-9010-Tout-en-un-Manuel-du-proprietaire
Dell-Vostro-3560-Manuel-du-proprietaire
Dell-Systemes-Dell-PowerEdge-T110-Manuel-du-proprietaire
Dell-server-poweredge-m710-tech-guidebook_fr
Dell-Systemes-Dell-PowerEdge-R420-Manuel-du-proprietaire
Dell-Latitude-5420-E5420-E5420m-Manuel-de-l-utilisateur
Dell-Latitude-E6320-Manuel-de-l-utilisateur
Dell-Systemes-Dell-Inspiron-8200-Manuel-de-l-utilisateur-Francais
Dell-server-poweredge-r610-tech-guidebook_fr
Dell-server-poweredge-t710-technical-guide-book_fr
Dell-server-poweredge-m1000e-tech-guidebook_fr
Dell-server-poweredge-m610-tech-guidebook_fr
Dell-poweredge-r210-technical-guidebook-en_fr
Dell-MANUEL-ALIENWARE-M15x-MOBILE-Manuel-de-l-utilisateur
Dell-Axim-X51-X51v-Manuel-de-l-utilisateur
Dell-Beats-By-dr.dre-Manuel-et-Garantie
Dell-Dimension-3100C-Manuel-du-proprietaire
Dell-Precision-Workstation-T3600-Manuel-du-proprietaire
Dell-Vostro-200-Manuel-du-proprietaire-Slim-Tower
Dell-ALIENWARE-MANUEL-DE-L-ORDINATEUR-DE-BUREAU
Dell-OPENMANAGE-POWER-CENTER-1-1-Guide-d-utilisation
Dell-Vostro-360-Proprietaire-du-manuel
Dell-Dimension-3100C-Manuel-du-proprietaire
AlienwareArea-51Area-51ALX
Dell-Ordinateurs-de-Bureau-PC-Portables-Netbooks/AlienwareAurora-R3
AlienwareAurora-R4
lienwareAuroraAuroraALXAurora-R2
Chassis-RAID-Dell-PowerVault-MD3000i-Manuel-du-proprietaire
Dell-Axim-X50-Manuel-du-proprietaire
Dell-Axim-X51-X51v-Manuel-du-proprietaire
Dell-Baie-de-stockage-Dell-PowerVault-MD1000-Manuel-du-proprietaire
Dell-Boîtier-Dell-PowerEdge-M1000e-Manuel-du-proprietaire
Dell-Clavier-Axim-Manuel-du-proprietaire
Dell-Dimension-3100-E310-Manuel-du-proprietaire
Dell-Dimension-9200-Manuel-du-proprietaire
Dell-Dimension-E520-Manuel-du-proprietaire
Dell-Imprimante-laser-Dell-1100-Manuel-du-proprietaire
Dell-Imprimante-laser-de-groupe-de-travail-Dell-M5200-Manuel-du-proprietaire
Dell-Imprimante-laser-monochrome-Dell-5330dn-Mode-d-emploi
Dell-Imprimante-laser-multifonction-Dell-1600n-Manuel-du-proprietaire
Dell-Inspiron-13z-Manuel-du-proprietaire
Dell-Inspiron-17R-Manuel-du-proprietaire
Dell-Inspiron-530s-Manuel-d-utilisation
Dell-Inspiron-530s-Manuel-du-proprietaire
Dell-Inspiron-700m-Manuel-du-proprietaire
Dell-Inspiron-1100-Manuel-d-utilisation
Dell-Inspiron-1525-1526-Manuel-du-proprietaire
Dell-Inspiron-5100-et-5150-Manuel-d-utilisation
Dell-Inspiron-9300-Manuel-du-proprietaire
Dell-Inspiron-9400-E1705-Manuel-du-proprietaire
http://www.audentia-gestion.fr/Dell-Ordinateurs-de-Bureau-PC-Portables-Netbooks/Dell-Laser-Printer-1700-1700n-Manuel-du-proprietaire.htm
Dell-Laser-Printer-1710-1710n-Manuel-du-proprietaire
Dell-Laser-Printer-3100cn-manuel-du-proprietaire
Dell-Latitude-ST-Manuel-du-proprietaire
Dell-Latitude-XT3-Manuel-du-proprietaire
Dell-Liste-des-manuels-et-de-la-documentation-Dell
Dell-MANUEL-ALIENWARE-M11x-MOBILE-Manuel-du-proprietaire
Dell-MANUEL-ALIENWARE-M15x-MOBILE
Dell-MANUEL-D-ALIENWARE-M17x-MOBILE-francais
Dell-MANUEL-D-ALIENWARE-M17x-MOBILE
Dell-Manuel-d-utilisation-Dell-Inspiron-M5040-15-N5040-15-N5050
Dell-Manuel-d-utilisation-du-Dell-XPS-420
Dell-Manuel-de-l-Utilisateur-Dell-Latitude-E6220
Dell-Manuel-de-l-Utilisateur-Dell-Latitude-E6520
Dell-Manuel-de-l-utilisateur-Dell-Latitude-E6320
Dell-Manuel-de-maintenance-Dell-Inspiron-N5110
Dell-Manuel-du-proprietaire-Dell-Vostro-1500
Dell-Manuel-du-proprietaire-Dell-XPS-M1330
Dell-Manuel-du-proprietaire-des-Dell-Latitude-E6420-et-E6420-ATG
Dell-Manuel-du-proprietaire-du-Dell-Inspiron-1721
Dell-Manuel-du-proprietaire-du-Dell-XPS-M1730
Dell-Manuel-du-proprietaire-du-Dell-XPS-One
Dell-Matrices-de-stockage-Dell-PowerVault-MD3260i-Series-Guide-de-deploiement
Dell-Matrices-de-stockage-Dell-PowerVault-MD3660i-Series-Guide-de-deploiement
Dell-Photo-All-In-One-Printer-944-Manuel-du-proprietaire
Dell-Photo-All-In-One-Printer-964-Manuel-du-proprietaire
Dell-Photo-All-In-One-Printer%20942-Manuel-du-proprietaire
Dell-Photo-Printer-720-Manuel-du-proprietaire
Dell-PowerEdge-C8220-Manuel-du-proprietaire
Dell-PowerEdge-R620-Manuel-du-proprietaire
Dell-PowerVault-MD3260-3260i-3660i-3660f-3060e-Storage-Arrays-Guide-de-l-administrateur
Dell-PowerVault-MD3260-3260i-3660i-3660f-3060e-Storage-Arrays-Manuel-du-proprietaire
Dell-PowerVault-NX400-Guide-de-mise-en-route
Dell-Precision-Workstation-T7600-Manuel-du-proprietaire
Dell-Streak-7-Manuel-de-l-utilisateur
Dell-Streak-Manuel-d-utilisation
Dell-Systemes-Dell-Inspiron-4150-Manuel-de-l-utilisateur
Dell-Systemes-Dell-Inspiron-8200-Manuel-de-l-utilisateur
Dell-Systemes-Dell-PowerEdge-1950-Manuel-du-proprietaire
Dell-Systemes-Dell-PowerEdge-M420-Manuel-du-proprietaire
Dell-Systemes-Dell-PowerEdge-R210-II-Manuel-du-proprietaire
Dell-Systemes-Dell-PowerEdge-R410-Manuel-du-proprietaire
Dell-Systemes-Dell-PowerEdge-R710-Manuel-du-proprietaire%20-Manuel-d-utilisation
Dell-Systemes-Dell-PowerEdge-T310-Manuel-du-proprietaire
Dell-Systemes-Dell-PowerEdge-T420-Manuel-du-proprietaire
Dell-Systemes-Dell-PowerEdge-T620-Manuel-du-proprietaire
Dell-Systemes-Dell-PowerVault-NX400-Manuel-du-proprietaire
Dell-Tout-en-un-Dell-Photo-924-Manuel-du-proprietaire
Dell-Vostro-360-Proprietaire-du-manuel
Dell-Vostro-3750-Manuel-du-proprietaire
Dell-Vostro-V131-Manuel-du-proprietaire
Dell-XP-M1530-Manuel-du-proprietaire
Dell-XPS-630i-Manuel-du-proprietair
Dell-moniteur-D1920-Manuel-du-proprietaire
DellDimension1100Series
Imprimante-Dell-Photo-All-In-One-Printer-922-Manuel-du-proprietaire
Imprimante-laser-de-groupe-de-travail-Dell-S2500-Manuel-du-proprietaire
Imprimante-personnelle-Dell-AIO-A960-Manuel-du-proprietaire
alienwareX51
Dell-Manuel-de-l-Utilisateur-Dell-Latitude-E6220
Dell-Systemes-Dell-PowerEdge-T420-Manuel-du-proprietaire
Dell-Systemes-Dell-Inspiron-4150-Manuel-de-l-utilisateur
Dell-Streak-Manuel-d-utilisation
Dell-Manuel-du-proprietaire-du-Dell-XPS-M1730
Dell-Photo-All-In-One-Printer-944-Manuel-du-proprietaire
Dell-Manuel-du-proprietaire-du-Dell-XPS-One
Dell-Clavier-Axim-Manuel-du-proprietaire
Dell-Systemes-Dell-PowerEdge-R410-Manuel-du-proprietaire
Dell-Manuel-d-utilisation-Dell-Inspiron-M5040-15-N5040-15-N5050
Dell-Manuel-de-maintenance-Dell-Inspiron-N5110
Dell-Inspiron-1100-Manuel-d-utilisation
Dell-Imprimante-laser-de-groupe-de-travail-Dell-M5200-Manuel-du-proprietaire
Dell-Photo-Printer-720-Manuel-du-proprietaire
Dell-Imprimante-laser-Dell-1100-Manuel-du-proprietaire
Dell-Manuel-du-proprietaire-Dell-Vostro-1500
Dell-XP-M1530-Manuel-du-proprietaire
Dell-Inspiron-530s-Manuel-du-proprietaire
Dell-Systemes-Dell-PowerEdge-R710-Manuel-du-proprietaire-Manuel-d-utilisation
Dell-Inspiron-5100-et-5150-Manuel-d-utilisation
Dell-Manuel-de-l-Utilisateur-Dell-Latitude-E6520
Dell-MANUEL-D-ALIENWARE-M17x-MOBILE
Dell-Manuel-de-l-utilisateur-Dell-Latitude-E6320
Dell-Laser-Printer-3100cn-manuel-du-proprietaire
Dell-Inspiron-530s-Manuel-d-utilisation
Dell-Systemes-Dell-PowerEdge-1950-Manuel-du-proprietaire
Dell-Manuel-du-proprietaire-des-Dell-Latitude-E6420-et-E6420-ATG
Dell-Imprimante-laser-monochrome-Dell-5330dn-Mode-d-emploi
Dell-PowerVault-MD3260-3260i-3660i-3660f-3060e-Storage-Arrays-Guide-de-l-administrateur
Dell-PowerVault-NX400-Guide-de-mise-en-route
Dell-Matrices-de-stockage-Dell-PowerVault-MD3260i-Series-Guide-de-deploiement
Dell-PowerEdge-C8220-Manuel-du-proprietaire
Dell-MANUEL-ALIENWARE-M11x-MOBILE-Manuel-du-proprietaire
Dell-Systemes-Dell-PowerEdge-M420-Manuel-du-proprietaire
Dell-Systemes-Dell-PowerVault-NX400-Manuel-du-proprietaire
Dell-PowerVault-MD3260-3260i-3660i-3660f-3060e-Storage-Arrays-Manuel-du-proprietaire
Dell-Matrices-de-stockage-Dell-PowerVault-MD3660i-Series-Guide-de-deploiement
Dell-Laser-Printer-1700-1700n-Manuel-du-proprietaire
Dell-Inspiron-9400-E1705-Manuel-du-proprietaire
Dell-Tout-en-un-Dell-Photo-924-Manuel-du-proprietaire
Dell-Laser-Printer-1710-1710n-Manuel-du-proprietaire
Dell-Dimension-3100-E310-Manuel-du-proprietaire
Dell-Inspiron-1525-1526-Manuel-du-proprietaire
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\New
Cover_Dell_Contax.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 – F O R P R O O F O N LY
Template Last Updated -03/06/2010
Dell PowerConnect 5500
Series
CLI Reference Guide
Regulatory Model: PC5524, PC5524P,
PC5548 and PC5548PFILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\New
DELL CONFIDENTIAL – PRELIMINARY 9/12/12 – FOR PROOF ONLY
Notes, Cautions, and Warnings
NOTE: A NOTE indicates important information that helps you make better use of
your computer.
CAUTION: A CAUTION indicates potential damage to hardware or loss of data if
instructions are not followed.
WARNING: A WARNING indicates a potential for property damage, personal
injury, or death.
COMMENT
Remove paragraph if it does not apply to your publication.
____________________
Information in this publication is subject to change without notice.
© 2011-2012 Dell Inc. All rights reserved.
Reproduction of these materials in any manner whatsoever without the written permission of Dell Inc.
is strictly forbidden.
Trademarks used in this text: Dell™, the DELL logo, Dell Precision™, OptiPlex™, Latitude™,
PowerEdge™, PowerVault™, PowerConnect™, OpenManage™, EqualLogic™, KACE™,
FlexAddress™ and Vostro™ are trademarks of Dell Inc. Intel
®
, Pentium
®
, Xeon
®
, Core™ and
Celeron
®
are registered trademarks of Intel Corporation in the U.S. and other countries. AMD
®
is a
registered trademark and AMD Opteron™, AMD Phenom™, and AMD Sempron™ are trademarks
of Advanced Micro Devices, Inc. Microsoft
®
, Windows
®
, Windows Server
®
, MS-DOS
®
and
Windows Vista
®
are either trademarks or registered trademarks of Microsoft Corporation in the United
States and/or other countries. Red Hat Enterprise Linux
®
and Enterprise Linux
®
are registered
trademarks of Red Hat, Inc. in the United States and/or other countries. Novell
®
is a registered
trademark and SUSE ™ is a trademark of Novell Inc. in the United States and other countries. Oracle
®
is a registered trademark of Oracle Corporation and/or its affiliates. Citrix
®
, Xen
®
, XenServer
®
and
XenMotion
®
are either registered trademarks or trademarks of Citrix Systems, Inc. in the United States
and/or other countries. VMware
®
, Virtual SMP
®
, vMotion
®
, vCenter
®
, and vSphere
®
are registered
trademarks or trademarks of VMWare, Inc. in the United States or other countries.
Other trademarks and trade names may be used in this publication to refer to either the entities claiming
the marks and names or their products. Dell Inc. disclaims any proprietary interest in trademarks and
trade names other than its own.
Regulatory Models: PC5524, PC5524P, PC5548 and PC5548P
September 2012 Rev. A043
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\CLI_Dell_ContaxTOC.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY
Contents
1 Preface.................................................................... 33
2 User Interface Commands . . . . . . . . . . . . 41
enable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
disable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
login. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
configure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
exit (Configuration). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
exit (EXEC) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
end . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
history . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
history size . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
terminal history . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
terminal history size. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
terminal datadump . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
debug-mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
show history . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
show privilege. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
do . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
banner exec . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 534
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\CLI_Dell_ContaxTOC.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY
banner login . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
banner motd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
exec-banner . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
login-banner . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
motd-banner . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
show banner . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
3 Macro Commands . . . . . . . . . . . . . . . . . . 63
macro name. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
macro apply. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
macro description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
macro global . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
macro global description . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
show parser macro . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
4 System Management Commands . . . . . . 71
ping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
traceroute . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
telnet. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
resume . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
hostname . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
reload . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
stack master . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
system light . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
switch renumber . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
show switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 855
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\CLI_Dell_ContaxTOC.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY
service cpu-utilization. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
show cpu utilization. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
clear cpu counters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
service cpu-counters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
show cpu counters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
show users. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
show sessions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
show system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
show version . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
system resources routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
show system resources routings. . . . . . . . . . . . . . . . . . . . . . 95
show system tcam utilization. . . . . . . . . . . . . . . . . . . . . . . . . 96
show system defaults . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
show tech-support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
system fans always-on . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
show system fans . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
asset-tag. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
show system id . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
5 Clock Commands . . . . . . . . . . . . . . . . . . 107
clock set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
clock source . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
clock timezone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
clock summer-time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
sntp authentication-key. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
sntp authenticate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1126
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\CLI_Dell_ContaxTOC.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY
sntp trusted-key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
sntp client poll timer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114
sntp broadcast client enable . . . . . . . . . . . . . . . . . . . . . . . . 115
sntp anycast client enable . . . . . . . . . . . . . . . . . . . . . . . . . . 115
sntp client enable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
sntp client enable (Interface) . . . . . . . . . . . . . . . . . . . . . . . 117
sntp unicast client enable . . . . . . . . . . . . . . . . . . . . . . . . . . 118
sntp unicast client poll . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
sntp server. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
sntp port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
show clock . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122
show sntp configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
show sntp status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
6 Configuration/Image File Commands . . 127
copy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127
write memory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132
delete . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132
pwd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133
dir . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134
more . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
cd. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136
rename . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
boot system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138
show running-config . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139
show startup-config . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1407
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\CLI_Dell_ContaxTOC.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY
show bootvar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140
7 Auto-Update and Auto-Configuration . . 143
boot host auto-config . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143
boot host auto-update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143
boot host dhcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144
boot host auto-save . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
show boot. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
ip dhcp tftp-server ip addr. . . . . . . . . . . . . . . . . . . . . . . . . . . 148
ip dhcp tftp-server file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
show ip dhcp tftp-server . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
8 Management ACL Commands . . . . . . . . . 151
management access-list . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151
permit (Management). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152
deny (Management) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153
management access-class . . . . . . . . . . . . . . . . . . . . . . . . . . 155
show management access-list . . . . . . . . . . . . . . . . . . . . . . 155
show management access-class . . . . . . . . . . . . . . . . . . . . 156
9 SNMP Commands . . . . . . . . . . . . . . . . . . 159
snmp-server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159
snmp-server community . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159
snmp-server view . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162
snmp-server group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1638
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\CLI_Dell_ContaxTOC.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY
snmp-server user . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165
snmp-server filter. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167
snmp-server host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168
snmp-server engineID local. . . . . . . . . . . . . . . . . . . . . . . . . 171
snmp-server engineID remote . . . . . . . . . . . . . . . . . . . . . . 172
snmp-server enable traps. . . . . . . . . . . . . . . . . . . . . . . . . . . 173
snmp-server trap authentication. . . . . . . . . . . . . . . . . . . . . 174
snmp-server contact . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174
snmp-server location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175
snmp-server set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175
show snmp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176
show snmp engineID. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178
show snmp views . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179
show snmp groups. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179
show snmp filters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180
show snmp users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181
10 RSA and Certificate Commands . . . . . . 183
crypto key generate dsa . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183
crypto key generate rsa . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184
show crypto key mypubkey . . . . . . . . . . . . . . . . . . . . . . . . . 184
crypto certificate generate . . . . . . . . . . . . . . . . . . . . . . . . . 185
crypto certificate request. . . . . . . . . . . . . . . . . . . . . . . . . . . 187
crypto certificate import. . . . . . . . . . . . . . . . . . . . . . . . . . . . 188
crypto certificate export pkcs12 . . . . . . . . . . . . . . . . . . . . . 190
crypto certificate import pkcs12 . . . . . . . . . . . . . . . . . . . . . 1919
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\CLI_Dell_ContaxTOC.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY
show crypto certificate mycertificate . . . . . . . . . . . . . . . . 193
11 Web Server Commands . . . . . . . . . . . . . 195
ip http server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195
ip http port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196
ip http timeout-policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196
ip http secure-server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197
ip http secure-port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198
ip https certificate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199
show ip http . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200
show ip https . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200
12 Telnet, SSH and Slogin Commands . . . . 203
ip telnet server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203
ip ssh port. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204
ip ssh server. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204
ip ssh pubkey-auth . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
crypto key pubkey-chain ssh . . . . . . . . . . . . . . . . . . . . . . . . 206
user-key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207
key-string . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208
show ip ssh . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210
show crypto key pubkey-chain ssh. . . . . . . . . . . . . . . . . . . 211
13 Line Commands . . . . . . . . . . . . . . . . . . . . 213
line. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21310
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\CLI_Dell_ContaxTOC.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY
speed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214
autobaud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214
exec-timeout. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215
show line . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216
14 AAA Commands . . . . . . . . . . . . . . . . . . . 219
aaa authentication login. . . . . . . . . . . . . . . . . . . . . . . . . . . . 219
aaa authentication enable . . . . . . . . . . . . . . . . . . . . . . . . . . 221
login authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223
enable authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223
ip http authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224
show authentication methods. . . . . . . . . . . . . . . . . . . . . . . 225
password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 226
service password-recovery . . . . . . . . . . . . . . . . . . . . . . . . . 227
enable password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228
username . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229
show user accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230
aaa accounting login . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231
aaa accounting dot1x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233
show accounting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235
passwords min-length . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235
passwords strength-check enable. . . . . . . . . . . . . . . . . . . 236
passwords strength minimum character-classes . . . . . . 237
passwords strength max-limit repeated-characters . . . 238
passwords aging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239
passwords history . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24011
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\CLI_Dell_ContaxTOC.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY
passwords history hold-time . . . . . . . . . . . . . . . . . . . . . . . . 241
passwords lockout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242
aaa login-history file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243
set username active . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243
set line active . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 244
set enable-password active . . . . . . . . . . . . . . . . . . . . . . . . . 245
show passwords configuration . . . . . . . . . . . . . . . . . . . . . . 246
show users login-history. . . . . . . . . . . . . . . . . . . . . . . . . . . . 247
15 RADIUS Commands . . . . . . . . . . . . . . . . . 249
radius-server host. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249
radius-server key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251
radius-server retransmit . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252
radius-server source-ip. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253
radius-server source-ipv6. . . . . . . . . . . . . . . . . . . . . . . . . . . 254
radius-server timeout. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255
radius-server deadtime . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255
show radius-servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256
16 TACACS+ Commands . . . . . . . . . . . . . . . 259
tacacs-server host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259
tacacs-server key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 260
tacacs-server timeout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261
tacacs-server source-ip . . . . . . . . . . . . . . . . . . . . . . . . . . . . 262
show tacacs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26312
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\CLI_Dell_ContaxTOC.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY
17 Syslog Commands . . . . . . . . . . . . . . . . . 265
logging on . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265
Logging host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266
logging console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267
logging buffered . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 268
clear logging. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269
logging file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 270
clear logging file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 270
aaa logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271
file-system logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272
management logging. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273
show logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273
show logging file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 274
show syslog-servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 276
18 RMON Commands . . . . . . . . . . . . . . . . . 277
show rmon statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277
rmon collection stats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279
show rmon collection stats . . . . . . . . . . . . . . . . . . . . . . . . . 280
show rmon history . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281
rmon alarm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 284
show rmon alarm-table. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 286
show rmon alarm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 287
rmon event. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 289
show rmon events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 290
show rmon log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29113
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\CLI_Dell_ContaxTOC.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY
rmon table-size . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292
19 802.1x Commands . . . . . . . . . . . . . . . . . . 295
aaa authentication dot1x. . . . . . . . . . . . . . . . . . . . . . . . . . . . 295
dot1x system-auth-control . . . . . . . . . . . . . . . . . . . . . . . . . . 296
dot1x port-control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 296
dot1x re-authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . 298
dot1x timeout reauth-period . . . . . . . . . . . . . . . . . . . . . . . . 298
dot1x re-authenticate. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 299
dot1x timeout quiet-period . . . . . . . . . . . . . . . . . . . . . . . . . . 300
dot1x timeout tx-period . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301
dot1x max-req . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 302
dot1x timeout supp-timeout . . . . . . . . . . . . . . . . . . . . . . . . . 303
dot1x timeout server-timeout . . . . . . . . . . . . . . . . . . . . . . . . 304
show dot1x. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 305
show dot1x users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 308
show dot1x statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 310
clear dot1x statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 311
dot1x auth-not-req . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 312
dot1x host-mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 313
dot1x violation-mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 314
dot1x guest-vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 315
dot1x guest-vlan timeout. . . . . . . . . . . . . . . . . . . . . . . . . . . . 316
dot1x guest-vlan enable . . . . . . . . . . . . . . . . . . . . . . . . . . . . 317
dot1x mac-authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . 318
dot1x traps mac-authentication success. . . . . . . . . . . . . . 31914
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\CLI_Dell_ContaxTOC.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY
dot1x traps mac-authentication failure. . . . . . . . . . . . . . . 319
dot1x radius-attributes vlan. . . . . . . . . . . . . . . . . . . . . . . . . 320
dot1x radius-attributes filter-id. . . . . . . . . . . . . . . . . . . . . . 321
dot1x radius-attributes errors . . . . . . . . . . . . . . . . . . . . . . . 322
dot1x legacy-supp-mode . . . . . . . . . . . . . . . . . . . . . . . . . . . 322
show dot1x advanced . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 323
dot1x system-auth-control monitor . . . . . . . . . . . . . . . . . . 324
show dot1x monitoring result . . . . . . . . . . . . . . . . . . . . . . . 325
20 Ethernet Configuration Commands . . . . 329
interface. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 329
interface range . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 329
description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 330
speed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 330
duplex. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331
negotiation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 332
flowcontrol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333
flowcontrol (Global) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 334
show flowcontrol. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335
mdix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 336
back-pressure. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 337
port jumbo-frame . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 337
clear counters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 338
set interface active . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 339
show interfaces configuration . . . . . . . . . . . . . . . . . . . . . . 339
show interfaces status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34015
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\CLI_Dell_ContaxTOC.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY
show interfaces advertise . . . . . . . . . . . . . . . . . . . . . . . . . . 341
show interfaces description. . . . . . . . . . . . . . . . . . . . . . . . . 342
show interfaces counters . . . . . . . . . . . . . . . . . . . . . . . . . . . 343
show port jumbo-frame . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 346
show errdisable interfaces. . . . . . . . . . . . . . . . . . . . . . . . . . 346
storm-control broadcast enable . . . . . . . . . . . . . . . . . . . . . 347
storm-control broadcast level kbps . . . . . . . . . . . . . . . . . . 348
storm-control include-multicast . . . . . . . . . . . . . . . . . . . . . 349
show storm-control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 350
21 PHY Diagnostics Commands. . . . . . . . . . 351
test cable-diagnostics tdr . . . . . . . . . . . . . . . . . . . . . . . . . . . 351
show cable-diagnostics tdr . . . . . . . . . . . . . . . . . . . . . . . . . 352
show cable-diagnostics cable-length . . . . . . . . . . . . . . . . 353
show fiber-ports optical-transceiver . . . . . . . . . . . . . . . . . 353
22 Power over Ethernet (PoE) Commands . 357
power inline. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 357
power inline limit-mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . 358
power inline powered-device . . . . . . . . . . . . . . . . . . . . . . . 359
power inline priority . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 359
power inline usage-threshold . . . . . . . . . . . . . . . . . . . . . . . 360
power inline traps enable. . . . . . . . . . . . . . . . . . . . . . . . . . . 361
power inline limit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 361
show power inline . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 362
show power inline consumption . . . . . . . . . . . . . . . . . . . . . 36616
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\CLI_Dell_ContaxTOC.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY
show power inline version . . . . . . . . . . . . . . . . . . . . . . . . . 367
23 EEE Commands . . . . . . . . . . . . . . . . . . . 369
eee enable (global) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 369
eee enable (interface). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 369
eee lldp enable. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 370
show eee . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 370
24 Green Ethernet . . . . . . . . . . . . . . . . . . . 377
show green-ethernet. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 377
green-ethernet short-reach (global). . . . . . . . . . . . . . . . . . 379
green-ethernet short-reach (interface) . . . . . . . . . . . . . . . 379
green-ethernet short-reach force . . . . . . . . . . . . . . . . . . . . 380
green-ethernet short-reach threshold . . . . . . . . . . . . . . . . 381
green-ethernet power-meter reset. . . . . . . . . . . . . . . . . . . 382
25 Port Channel Commands . . . . . . . . . . . . 383
channel-group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 383
port-channel load-balance . . . . . . . . . . . . . . . . . . . . . . . . . 384
show interfaces port-channel . . . . . . . . . . . . . . . . . . . . . . . 385
26 Address Table Commands . . . . . . . . . . . 387
bridge multicast filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . 387
bridge multicast address . . . . . . . . . . . . . . . . . . . . . . . . . . . 388
bridge multicast forbidden address . . . . . . . . . . . . . . . . . . 38917
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\CLI_Dell_ContaxTOC.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY
bridge multicast unregistered . . . . . . . . . . . . . . . . . . . . . . . 390
bridge multicast forward-all . . . . . . . . . . . . . . . . . . . . . . . . 391
bridge multicast forbidden forward-all . . . . . . . . . . . . . . . 392
mac address-table static . . . . . . . . . . . . . . . . . . . . . . . . . . . 393
clear mac address-table . . . . . . . . . . . . . . . . . . . . . . . . . . . 394
mac address-table aging-time . . . . . . . . . . . . . . . . . . . . . . 395
port security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 396
port security mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 397
port security max . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 397
port security routed secure-address. . . . . . . . . . . . . . . . . . 398
show mac address-table . . . . . . . . . . . . . . . . . . . . . . . . . . . 399
show mac address-table count . . . . . . . . . . . . . . . . . . . . . . 401
show bridge multicast address-table. . . . . . . . . . . . . . . . . 401
show bridge multicast address-table static . . . . . . . . . . . 405
show bridge multicast filtering . . . . . . . . . . . . . . . . . . . . . . 408
show bridge multicast unregistered. . . . . . . . . . . . . . . . . . 409
show ports security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 410
show ports security addresses . . . . . . . . . . . . . . . . . . . . . . 411
27 Port Monitor Commands . . . . . . . . . . . . . 413
port monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 413
show ports monitor. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 415
28 sFlow Commands . . . . . . . . . . . . . . . . . . 417
sflow receiver . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 417
sflow flow-sampling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41818
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\CLI_Dell_ContaxTOC.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY
sflow counters-sampling . . . . . . . . . . . . . . . . . . . . . . . . . . . 419
clear sflow statistics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 419
show sflow configuration . . . . . . . . . . . . . . . . . . . . . . . . . . 420
show sflow statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 421
29 LLDP Commands . . . . . . . . . . . . . . . . . . 423
lldp run . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 423
lldp transmit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 423
lldp receive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 424
lldp timer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 425
lldp hold-multiplier . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 426
lldp reinit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 427
lldp tx-delay . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 428
lldp optional-tlv . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 428
lldp management-address . . . . . . . . . . . . . . . . . . . . . . . . . . 429
lldp notifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 430
lldp notifications interval . . . . . . . . . . . . . . . . . . . . . . . . . . . 431
lldp optional-tlv 802.1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 432
lldp med enable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 433
lldp med notifications topology-change . . . . . . . . . . . . . . 434
lldp med fast-start repeat-count . . . . . . . . . . . . . . . . . . . . . 435
lldp med network-policy (global) . . . . . . . . . . . . . . . . . . . . 435
lldp med network-policy (interface) . . . . . . . . . . . . . . . . . 436
clear lldp table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 437
lldp med location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 438
show lldp configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43919
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\CLI_Dell_ContaxTOC.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY
show lldp med configuration . . . . . . . . . . . . . . . . . . . . . . . . 441
show lldp local tlvs-overloading. . . . . . . . . . . . . . . . . . . . . 443
show lldp local . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 444
show lldp neighbors. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 446
show lldp statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 451
30 Spanning-Tree Commands . . . . . . . . . . . 453
spanning-tree . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 453
spanning-tree mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 453
spanning-tree forward-time . . . . . . . . . . . . . . . . . . . . . . . . . 454
spanning-tree hello-time. . . . . . . . . . . . . . . . . . . . . . . . . . . . 455
spanning-tree max-age . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 456
spanning-tree priority . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 457
spanning-tree disable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 458
spanning-tree cost . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 459
spanning-tree port-priority . . . . . . . . . . . . . . . . . . . . . . . . . . 460
spanning-tree portfast . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 460
spanning-tree link-type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 461
spanning-tree pathcost method . . . . . . . . . . . . . . . . . . . . . . 462
spanning-tree bpdu (Global). . . . . . . . . . . . . . . . . . . . . . . . . 463
spanning-tree bpdu (Interface) . . . . . . . . . . . . . . . . . . . . . . 464
spanning-tree guard root. . . . . . . . . . . . . . . . . . . . . . . . . . . . 465
spanning-tree bpduguard . . . . . . . . . . . . . . . . . . . . . . . . . . . 466
clear spanning-tree detected-protocols . . . . . . . . . . . . . . 467
spanning-tree mst priority. . . . . . . . . . . . . . . . . . . . . . . . . . . 467
spanning-tree mst max-hops . . . . . . . . . . . . . . . . . . . . . . . . 46820
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\CLI_Dell_ContaxTOC.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY
spanning-tree mst port-priority . . . . . . . . . . . . . . . . . . . . . . 469
spanning-tree mst cost . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 470
spanning-tree mst configuration. . . . . . . . . . . . . . . . . . . . . 471
instance (MST) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 472
name (MST) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 473
revision (MST) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 473
show (MST) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 474
exit (MST) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 475
abort (MST) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 476
show spanning-tree. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 476
show spanning-tree bpdu. . . . . . . . . . . . . . . . . . . . . . . . . . . 491
31 VLAN Commands . . . . . . . . . . . . . . . . . . 493
vlan database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 493
vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 493
interface vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 494
interface range vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 495
name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 496
switchport protected-port . . . . . . . . . . . . . . . . . . . . . . . . . . 497
switchport community . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 498
show interfaces protected-ports . . . . . . . . . . . . . . . . . . . . 498
switchport . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 499
switchport mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 500
switchport access vlan. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 501
switchport access multicast-tv vlan . . . . . . . . . . . . . . . . . 502
switchport trunk allowed vlan . . . . . . . . . . . . . . . . . . . . . . 50321
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\CLI_Dell_ContaxTOC.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY
switchport trunk native vlan. . . . . . . . . . . . . . . . . . . . . . . . . 504
switchport general allowed vlan . . . . . . . . . . . . . . . . . . . . 505
switchport general pvid . . . . . . . . . . . . . . . . . . . . . . . . . . . . 506
switchport general ingress-filtering disable . . . . . . . . . . 507
switchport general acceptable-frame-type . . . . . . . . . . . 508
switchport customer vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . 509
switchport general forbidden vlan . . . . . . . . . . . . . . . . . . . 509
map protocol protocols-group . . . . . . . . . . . . . . . . . . . . . . . 510
switchport general map protocols-group vlan . . . . . . . . . 511
private-vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 512
private-vlan association . . . . . . . . . . . . . . . . . . . . . . . . . . . . 513
switchport private-vlan mapping . . . . . . . . . . . . . . . . . . . . 514
switchport private-vlan host-association . . . . . . . . . . . . . 515
show vlan private-vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 516
ip internal-usage-vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 516
show vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 518
show vlan multicast-tv . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 519
show vlan protocols-groups. . . . . . . . . . . . . . . . . . . . . . . . . 519
show vlan internal usage . . . . . . . . . . . . . . . . . . . . . . . . . . . 520
show interfaces switchport . . . . . . . . . . . . . . . . . . . . . . . . . 521
32 IGMP Snooping Commands . . . . . . . . . . 523
ip igmp snooping (Global) . . . . . . . . . . . . . . . . . . . . . . . . . . . 523
ip igmp snooping vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 523
ip igmp snooping mrouter . . . . . . . . . . . . . . . . . . . . . . . . . . 524
ip igmp snooping mrouter interface . . . . . . . . . . . . . . . . . . 52522
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\CLI_Dell_ContaxTOC.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY
ip igmp snooping forbidden mrouter interface . . . . . . . . 526
ip igmp snooping static . . . . . . . . . . . . . . . . . . . . . . . . . . . . 527
ip igmp snooping multicast-tv . . . . . . . . . . . . . . . . . . . . . . . 528
ip igmp snooping querier . . . . . . . . . . . . . . . . . . . . . . . . . . . 529
ip igmp snooping querier address . . . . . . . . . . . . . . . . . . . 530
ip igmp robustness. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 531
ip igmp query-interval. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 531
ip igmp query-max-response-time . . . . . . . . . . . . . . . . . . . 532
ip igmp last-member-query-count . . . . . . . . . . . . . . . . . . . 533
ip igmp last-member-query-interval . . . . . . . . . . . . . . . . . 534
ip igmp snooping vlan immediate-leave . . . . . . . . . . . . . . 534
show ip igmp snooping mrouter . . . . . . . . . . . . . . . . . . . . . 535
show ip igmp snooping interface . . . . . . . . . . . . . . . . . . . . 536
show ip igmp snooping groups . . . . . . . . . . . . . . . . . . . . . . 537
show ip igmp snooping multicast-tv . . . . . . . . . . . . . . . . . 538
33 LACP Commands . . . . . . . . . . . . . . . . . . 541
lacp system-priority. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 541
lacp port-priority . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 542
lacp timeout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 542
show lacp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 543
show lacp port-channel . . . . . . . . . . . . . . . . . . . . . . . . . . . . 546
34 GVRP Commands . . . . . . . . . . . . . . . . . . 547
gvrp enable (Global) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 547
gvrp enable (Interface) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54723
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\CLI_Dell_ContaxTOC.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY
garp timer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 548
gvrp vlan-creation-forbid . . . . . . . . . . . . . . . . . . . . . . . . . . . 550
gvrp registration-forbid . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 550
clear gvrp statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 551
show gvrp configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . 552
show gvrp statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 553
show gvrp error-statistics. . . . . . . . . . . . . . . . . . . . . . . . . . . 554
35 Voice VLAN Commands . . . . . . . . . . . . . 557
voice vlan id. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 557
voice vlan oui-table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 558
voice vlan cos mode. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 559
voice vlan cos . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 560
voice vlan aging-timeout. . . . . . . . . . . . . . . . . . . . . . . . . . . . 561
voice vlan enable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 561
voice vlan secure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 562
show voice vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 563
36 DHCP Snooping and ARP Inspection Commands
567
ip dhcp snooping. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 567
ip dhcp snooping vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 568
ip dhcp snooping trust . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 568
ip dhcp snooping information option allowed-untrusted 569
ip dhcp snooping verify . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 570
ip dhcp snooping database. . . . . . . . . . . . . . . . . . . . . . . . . . 57124
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\CLI_Dell_ContaxTOC.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY
ip dhcp snooping database update-freq . . . . . . . . . . . . . . 572
ip dhcp snooping binding . . . . . . . . . . . . . . . . . . . . . . . . . . . 572
clear ip dhcp snooping database . . . . . . . . . . . . . . . . . . . . 574
show ip dhcp snooping. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 574
show ip dhcp snooping binding . . . . . . . . . . . . . . . . . . . . . 575
ip arp inspection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 576
ip arp inspection vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 577
ip arp inspection trust . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 578
ip arp inspection validate. . . . . . . . . . . . . . . . . . . . . . . . . . . 579
ip arp inspection list create. . . . . . . . . . . . . . . . . . . . . . . . . 580
ip mac. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 580
ip arp inspection list assign. . . . . . . . . . . . . . . . . . . . . . . . . 581
ip arp inspection logging interval. . . . . . . . . . . . . . . . . . . . 582
show ip arp inspection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 583
show ip arp inspection list. . . . . . . . . . . . . . . . . . . . . . . . . . 584
show ip arp inspection statistics . . . . . . . . . . . . . . . . . . . . 584
clear ip arp inspection statistics . . . . . . . . . . . . . . . . . . . . 585
ip dhcp information option . . . . . . . . . . . . . . . . . . . . . . . . . . 586
show ip dhcp information option . . . . . . . . . . . . . . . . . . . . 586
37 iSCSI Commands . . . . . . . . . . . . . . . . . . 589
iscsi enable. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 589
iscsi target port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 590
iscsi cos. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 591
iscsi aging-time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 593
iscsi max-tcp-connections . . . . . . . . . . . . . . . . . . . . . . . . . 59425
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\CLI_Dell_ContaxTOC.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY
show iscsi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 595
show iscsi sessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 596
38 IP Addressing Commands . . . . . . . . . . . . 599
address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 599
ip address dhcp. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 601
renew dhcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 602
ip default-gateway . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 603
show ip interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 603
arp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 604
arp timeout (Global) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 605
arp timeout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 606
ip arp proxy disable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 607
ip proxy-arp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 607
clear arp-cache. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 608
show arp. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 608
show arp configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 609
interface ip. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 610
directed-broadcast. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 611
broadcast-address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 612
ip helper-address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 612
show ip helper-address. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 614
source-precedence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 615
ip domain lookup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 616
ip domain name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 616
ip name-server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61726
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\CLI_Dell_ContaxTOC.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY
ip host. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 619
clear host. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 620
clear host dhcp. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 620
show hosts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 621
39 IPv6 Addressing Commands . . . . . . . . . 623
ipv6 enable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 623
ipv6 address autoconfig . . . . . . . . . . . . . . . . . . . . . . . . . . . . 624
ipv6 icmp error-interval . . . . . . . . . . . . . . . . . . . . . . . . . . . . 625
show ipv6 icmp error-interval . . . . . . . . . . . . . . . . . . . . . . . 626
ipv6 address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 627
ipv6 address link-local . . . . . . . . . . . . . . . . . . . . . . . . . . . . 628
ipv6 unreachables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 629
ipv6 default-gateway. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 630
show ipv6 interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 631
show IPv6 route . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 633
ipv6 nd dad attempts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 634
ipv6 host. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 635
ipv6 neighbor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 636
ipv6 set mtu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 637
ipv6 mld version . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 638
ipv6 mld join-group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 639
show ipv6 neighbors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 640
clear ipv6 neighbors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64127
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\CLI_Dell_ContaxTOC.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY
40 Tunnel Commands . . . . . . . . . . . . . . . . . . 643
interface tunnel. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 643
tunnel mode ipv6ip . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 643
tunnel isatap router . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 644
tunnel source . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 645
tunnel isatap query-interval . . . . . . . . . . . . . . . . . . . . . . . . . 646
tunnel isatap solicitation-interval. . . . . . . . . . . . . . . . . . . . 647
tunnel isatap robustness . . . . . . . . . . . . . . . . . . . . . . . . . . . . 648
show ipv6 tunnel. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 649
41 DHCP Relay Commands . . . . . . . . . . . . . 651
ip dhcp relay enable (Global) . . . . . . . . . . . . . . . . . . . . . . . . 651
ip dhcp relay enable (Interface). . . . . . . . . . . . . . . . . . . . . . 651
ip dhcp relay address (Global) . . . . . . . . . . . . . . . . . . . . . . . 652
ip dhcp relay address (Interface). . . . . . . . . . . . . . . . . . . . . 653
show ip dhcp relay . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 654
ip dhcp information option . . . . . . . . . . . . . . . . . . . . . . . . . . 655
show ip dhcp information option. . . . . . . . . . . . . . . . . . . . . 656
42 DHCP Server Commands . . . . . . . . . . . . 657
ip dhcp server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 657
ip dhcp pool host. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 657
ip dhcp pool network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 658
address (DHCP Host) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 659
address (DHCP Network) . . . . . . . . . . . . . . . . . . . . . . . . . . . 66028
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\CLI_Dell_ContaxTOC.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY
lease . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 661
client-name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 663
default-router . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 663
dns-server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 664
domain-name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 665
netbios-name-server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 666
netbios-node-type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 667
next-server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 667
next-server-name. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 668
bootfile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 669
time-server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 670
option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 671
ip dhcp excluded-address . . . . . . . . . . . . . . . . . . . . . . . . . . 672
ip dhcp ping enable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 673
ping enable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 674
ip dhcp ping count . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 675
ip dhcp ping timeout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 676
clear ip dhcp binding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 677
show ip dhcp. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 677
show ip dhcp excluded-addresses . . . . . . . . . . . . . . . . . . 678
show ip dhcp pool host. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 678
show ip dhcp pool network . . . . . . . . . . . . . . . . . . . . . . . . . 680
show ip dhcp binding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 681
show ip dhcp server statistics . . . . . . . . . . . . . . . . . . . . . . 683
show ip dhcp allocated . . . . . . . . . . . . . . . . . . . . . . . . . . . . 684
show ip dhcp declined . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68629
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\CLI_Dell_ContaxTOC.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY
show ip dhcp expired . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 687
show ip dhcp pre-allocated . . . . . . . . . . . . . . . . . . . . . . . . . 688
43 IP Routing Protocol-Independent Commands 691
ip route . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 691
ip routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 692
show ip route. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 692
44 ACL Commands . . . . . . . . . . . . . . . . . . . . 695
ip access-list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 695
permit ( IP ) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 696
deny ( IP ) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 698
ipv6 access-list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 702
permit ( IPv6 ) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 703
deny ( IPv6 ) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 705
mac access-list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 708
permit ( MAC ) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 709
service-acl input. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 710
service-acl output. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 711
service-acl input block . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 712
time-range . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 713
absolute . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 714
periodic. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 715
show time-range. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 717
show access-lists. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 717
show interfaces access-lists . . . . . . . . . . . . . . . . . . . . . . . . 71930
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\CLI_Dell_ContaxTOC.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY
clear access-lists counters . . . . . . . . . . . . . . . . . . . . . . . . . 719
show interfaces access-lists counters . . . . . . . . . . . . . . . 720
45 Quality of Service (QoS) Commands . . . 723
qos. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 723
show qos . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 724
class-map . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 725
show class-map . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 726
match . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 727
policy-map. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 727
class . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 729
show policy-map . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 730
trust. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 731
set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 732
police . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 733
service-policy. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 735
qos aggregate-policer. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 735
show qos aggregate-policer . . . . . . . . . . . . . . . . . . . . . . . . 737
police aggregate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 737
wrr-queue cos-map . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 738
wrr-queue bandwidth . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 740
priority-queue out num-of-queues . . . . . . . . . . . . . . . . . . . 741
traffic-shape . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 742
traffic-shape queue . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 743
rate-limit (Ethernet) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 744
qos wrr-queue wrtd. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74431
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\CLI_Dell_ContaxTOC.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY
show qos interface. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 745
qos wrr-queue threshold . . . . . . . . . . . . . . . . . . . . . . . . . . . . 748
qos map policed-dscp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 749
qos map dscp-queue . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 750
qos map dscp-dp. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 751
qos trust (Global). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 752
qos trust (Interface) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 753
qos cos . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 754
qos dscp-mutation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 755
qos map dscp-mutation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 756
show qos map . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 757
clear qos statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 759
qos statistics policer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 759
qos statistics aggregate-policer . . . . . . . . . . . . . . . . . . . . . 760
qos statistics queues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 760
show qos statistics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76132
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\CLI_Dell_ContaxTOC.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY33
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\CLI_Preface.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
1
Preface
About this Document
This CLI Reference Guide describes how to use the CLI and a list of the CLI
commands and their arguments.
The CLI commands described in this document are organized according to
feature groups in separate sections.
This section describes how to use the CLI. It contains the following topics:
• CLI Command Modes
• Starting the CLI
• CLI Command Conventions
• Entering Commands
CLI Command Modes
To configure devices, the CLI is divided into various command modes. Each
command mode has its own set of specific commands. Entering a question
mark "?" at the console prompt displays a list of commands available for that
particular command mode.
A specific command, which varies from mode to mode, is used to navigate
from one mode to another. The standard order to access the modes is as
follows: User EXEC mode, Privileged EXEC mode, Global Configuration
mode, and Interface Configuration modes.
When starting a session, the initial mode for non-privileged users is the User
EXEC mode. Only a limited subset of commands is available in the User
EXEC mode. This level is reserved for tasks that do not change the
configuration. 34
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\CLI_Preface.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Privileged users enter the Privileged EXEC mode directly using a password.
This mode provides access to the device Configuration modes.
The modes are described below.
User EXEC Mode
After logging into the device, the user is automatically in User EXEC
command mode unless the user is defined as a privileged user. In general, the
User EXEC commands enable the user to perform basic tests, and display
system information.
The user-level prompt consists of the device "host name" followed by the
angle bracket (>).
console>
The default host name is "console" unless it has been changed using the
hostname command in the Global Configuration mode.
Privileged EXEC Mode
Privileged access is password-protected to prevent unauthorized use, because
many of the privileged commands set operating system parameters: The
password is not displayed on the screen and is case sensitive.
Privileged users enter directly into the Privileged EXEC mode.
Use disable to return to the User EXEC mode.
Global Configuration Mode
Global Configuration mode commands apply to features that affect the
system as a whole, rather than just a specific interface.
To enter the Global Configuration mode, enter configure in the Privileged
EXEC mode, and press .
The Global Configuration mode prompt is displayed.
console(config)#
Use exit, end or ctrl/z to return to the Privileged EXEC mode.
Interface Configuration Modes
Commands in the following modes perform specific interface operations:35
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\CLI_Preface.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
• Line Interface — Contains commands to configure the management
connections. These include commands such as line speed, timeout
settings, etc. The Global Configuration mode command line is used to
enter the Line Configuration command mode.
• VLAN Database — Contains commands to create a VLAN as a whole.
The Global Configuration mode command vlan database is used to enter
the VLAN Database Interface Configuration mode.
• Management Access List — Contains commands to define management
access-lists. The Global Configuration mode command management
access-list is used to enter the Management Access List Configuration
mode.
• Port Channel — Contains commands to configure port-channels, for
example, assigning ports to a VLAN or port-channel. The Global
Configuration mode command interface port-channel is used to enter the
Port Channel Interface Configuration mode.
• SSH Public Key-Chain — Contains commands to manually specify other
device SSH public keys. The Global Configuration mode command crypto
key pubkey-chain ssh is used to enter the SSH Public Key-chain
Configuration mode.
• Interface — Contains commands that configure the interface. The Global
Configuration mode command interface is used to enter the Interface
Configuration mode.
Starting the CLI
The switch can be managed over a direct connection to the switch console
port, or via a Telnet connection. The switch is managed by entering
command keywords and parameters at the prompt. Using the switch CLI
commands is similar to entering commands on a UNIX system.
If access is via a Telnet connection, ensure the device has an IP address
defined, corresponding management access is granted, and the workstation
used to access the device is connected to the device prior to using CLI
commands.
Accessing the CLI from the Console Line
1. Start the device and wait until the startup procedure is complete. The User
Exec mode is entered, and the prompt "console>" is displayed. 36
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\CLI_Preface.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
2. Configure the device and enter the necessary commands to complete the
required tasks.
3. When finished, exit the session with the quit or exit command.
Accessing the CLI from Telnet
1. Enter telnet and the IP address of the device. A User Name prompt is
displayed.
2. Enter the User Name and Password. You are in the Privileged Exec mode.
3. Configure the device and enter the necessary commands to complete the
required tasks.
4. When finished, exit the session with the quit or exit command.
When another user is required to log onto the system, the login command is
entered in the Privileged EXEC command mode,. This effectively logs off the
current user and logs on the new user.
CLI Command Conventions
The following table describes the command syntax conventions.
Conventions Description
[ ] In a command line, square brackets indicates
an optional entry.
{ } In a command line, curly brackets indicate a
selection of compulsory parameters separated
by the | character. One option must be
selected. For example: flowcontrol
{auto|on|off} means that for the flowcontrol
command either auto, on or off must be
selected.
Italic font Indicates a parameter.
Any individual key on the keyboard. For
example click .
Ctrl+F4 Any combination keys pressed simultaneously
on the keyboard.37
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\CLI_Preface.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Entering Commands
A CLI command is a series of keywords and arguments. Keywords identify a
command, and arguments specify configuration parameters. For example, in
the command "show interfaces status gi1/0/5" show, interfaces and status are
keywords, gi is an argument that specifies the interface type, and 1/0/5 is an
argument that specifies the port.
To enter commands that require parameters, enter the required parameters
after the command keyword. For example, to set a password for the
administrator, enter:
console(config)# username admin password smith
Help information can be displayed in the following ways:
• Keyword Lookup — The character ? is entered in place of a command. A
list of all valid commands and corresponding help messages are displayed.
• Partial Keyword Lookup — A command is incomplete and the character ?
is entered in place of a parameter. The matched parameters for this
command are displayed.
The following describes features that assist in using the CLI:
Terminal Command Buffer
Every time a command is entered in the CLI, it is recorded on an internally
managed Command History buffer. Commands stored in the buffer are
maintained on a First In First Out (FIFO) basis.These commands can be
Screen Display Indicates system messages and prompts
appearing on the console.
all When a parameter is required to define a range
of ports or parameters and all is an option, the
default for the command is all when no
parameters are defined. For example, the
command interface range port-channel has
the option of either entering a range of
channels, or selecting all. When the command
is entered without a parameter, it automatically
defaults to all.
Conventions Description38
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\CLI_Preface.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
recalled, reviewed, modified, and reissued. This buffer is not preserved across
device resets. The keys that can be used to access the history buffer are
described in Table 1.
By default, the history buffer system is enabled, but it can be disabled at any
time. For information about the command syntax to enable or disable the
history buffer, see the history command.
There is a standard default number of commands that are stored in the buffer.
The standard number of 10 commands can be increased to 256. By
configuring 0, the effect is the same as disabling the history buffer system. For
information about the command syntax for configuring the command history
buffer, see the history size command.
To display the history buffer, see show history command.
Negating the Effect of Commands
For many configuration commands, the prefix keyword "no" can be entered to
cancel the effect of a command or reset the configuration to the default
value. This guide describes the negation effect for all applicable commands.
Command Completion
If the command entered is incomplete, invalid, or has missing or invalid
parameters, an appropriate error message is displayed.
To complete an incomplete command, press the button. If the
characters already entered are not enough for the system to identify a single
matching command, press "?" to display the available commands matching
the characters already entered.
Incorrect or incomplete commands are automatically re-entered next to the
cursor. If a parameter must be added, the parameter can be added to the basic
command already displayed next to the cursor. The following example
indicates that the command interface requires a missing parameter.
(config)#interface
%missing mandatory parameter
(config)#interface39
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\CLI_Preface.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Keyboard Shortcuts
The CLI has a range of keyboard shortcuts to assist in entering the CLI
commands.
The following table describes these shortcuts:
Table 1: Keyboard Keys
Keyboard Key Description
Up-arrow key Recalls commands from the history buffer,
beginning with the most recent command.
Repeat the key sequence to recall successively
older commands.
Down-arrow key Returns the most recent commands from the
history buffer after recalling commands with the
up arrow key. Repeating the key sequence will
recall successively more recent commands.
Ctrl+A Moves the cursor to the beginning of the
command line.
Ctrl+E Moves the cursor to the end of the command
line.
Ctrl+Z / End Returns back to the Privileged EXEC mode
from any mode.
Backspace key Moves the cursor back one space.
Up-arrow key Recalls commands from the history buffer,
beginning with the most recent command.
Repeat the key sequence to recall successively
older commands.40
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\CLI_Preface.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LYUser Interface Commands 41
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\User_Interface.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
2
User Interface Commands
enable
The enable EXEC mode command enters the Privileged EXEC mode.
Syntax
enable [privilege-level]
Parameters
privilege-level—Specifies the privilege level at which to enter the system.
(Range: 1–15)
Default Configuration
The default privilege level is 15.
Command Mode
EXEC mode
Example
The following example enters the Privileged EXEC mode.
Console> enable
enter password:
Console#42 User Interface Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\User_Interface.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
disable
The disable Privileged EXEC mode command leaves the Privileged EXEC
mode and returns to the User EXEC mode.
Syntax
disable [privilege-level]
Parameters
privilege-level—Specifies the privilege level at which to enter the system.
(Range: 1–15)
Default Configuration
The default privilege level is 1.
Command Mode
Privileged EXEC mode
Example
The following example returns to the User EXEC mode.
Console# disable
Console>
login
The login EXEC mode command changes a user’s login.
Syntax
login
Command Mode
EXEC modeUser Interface Commands 43
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\User_Interface.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
The following example enters Privileged EXEC mode and logs in with
username ‘admin’.
Console> login
User Name:admin
Password:*****
Console#
configure
The configure Privileged EXEC mode command enters the Global
Configuration mode.
Syntax
configure [terminal]
Parameters
terminal—Enter the Global Configuration mode with or without the
keyword terminal.
Command Mode
Privileged EXEC mode
Example
The following example enters Global Configuration mode.
Console# configure
Console(config)#
exit (Configuration)
The exit command exits any configuration mode to the next highest mode in
the CLI mode hierarchy.44 User Interface Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\User_Interface.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Syntax
exit
Command Mode
All commands in configuration modes.
Examples
The following examples change the configuration mode from Interface
Configuration mode to Privileged EXEC mode.
Console(config-if)# exit
Console(config)# exit
Console#
Router(config-if)# exit
Router(config)# exit
Router#
exit (EXEC)
The exit EXEC mode command closes an active terminal session by logging
off the device.
Syntax
exit
Command Mode
EXEC mode
Example
The following examples close an active terminal session.
Console> exit
Router> exitUser Interface Commands 45
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\User_Interface.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
end
The end command ends the current configuration session and returns to the
Privileged EXEC mode.
Syntax
end
Command Mode
All configuration modes
Example
The following examples end the Global Configuration mode session and
return to the Privileged EXEC mode.
Console(config)# end
Console#
Router(config-if)# end
Router#
help
The help command displays a brief description of the Help system.
Syntax
help
Command Mode
All command modes
Example
The following example describes the Help system.
Console# help46 User Interface Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\User_Interface.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Help may be requested at any point in a command by entering
a question mark '?'. If nothing matches the currently
entered incomplete command, the help list is empty. This
indicates that there is no command matching the input as it
currently appears. If the request is within a command, press
the Backspace key and erase the entered characters to a
point where the request results in a match.
Help is provided when:
1. There is a valid command and a help request is made for
entering a parameter or argument (e.g. 'show ?'). All
possible parameters or arguments for the entered command are
then displayed.
2. An abbreviated argument is entered and a help request is
made for arguments matching the input (e.g. 'show pr?').
history
The history Line Configuration mode command enables the command
history function. Use the no form of this command to disable the command
history function.
Syntax
history
no history
Default Configuration
The history command is enabled.
Command Mode
Line Configuration mode
User Guidelines
This command enables the command history function for a specified line.
Use the terminal history EXEC mode command to enable or disable the
command history function for the current terminal session.User Interface Commands 47
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\User_Interface.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
The following example enables the command history function for Telnet.
Console(config)# line telnet
Console(config-line)# history
history size
The history size Line Configuration mode command changes the command
history buffer size for a particular line. Use the no form of this command to
reset the command history buffer size to the default value.
Syntax
history size number-of-commands
no history size
Parameters
number-of-commands—Specifies the number of commands the system
records in its history buffer. (Range: 0–256)
Default Configuration
The default command history buffer size is 10 commands.
Command Mode
Line Configuration mode
User Guidelines
This command configures the command history buffer size for a particular
line. Use the terminal history size EXEC mode command to configure the
command history buffer size for the current terminal session.
The allocated command history buffer is per terminal user, and is taken from
a shared buffer. If there is not enough space available in the shared buffer, the
command history buffer size () cannot be increased above the default size.48 User Interface Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\User_Interface.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
The following example changes the command history buffer size to 100
entries for a particular line
Console(config)# line telnet
Console(config-line)# history size 100
terminal history
The terminal history EXEC mode command enables the command history
function for the current terminal session. Use the no form of this command
to disable the command history function.
Syntax
terminal history
terminal no history
Default Configuration
The default configuration for all terminal sessions is defined by the history
Line Configuration mode command.
Command Mode
EXEC mode
User Guidelines
The command enables the command history for the current session. The
default is determined by the history Line Configuration mode command.
Example
The following example disables the command history function for the current
terminal session.
Console> terminal no historyUser Interface Commands 49
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\User_Interface.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
terminal history size
The terminal history size EXEC mode command changes the command
history buffer size for the current terminal session. Use the no form of this
command to reset the command history buffer size to the default value.
Syntax
terminal history size number-of-commands
terminal no history size
Parameters
number-of-commands—Specifies the number of commands the system
maintains in its history buffer. (Range: 10–256)
Default Configuration
The default configuration for all terminal sessions is defined by the history
size Line Configuration mode command.
Command Mode
EXEC mode
User Guidelines
The terminal history size EXEC command changes the command history
buffer size for the current terminal session. Use the history Line
Configuration mode command to change the default command history
buffer size.
The maximum number of commands in all buffers is 256.
Example
The following example sets the command history buffer size to 20 commands
for the current terminal session.
Console> terminal history size 2050 User Interface Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\User_Interface.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
terminal datadump
The terminal datadump EXEC mode command enables dumping all the
output of a show command without prompting. Use the no form of this
command to disable dumping.
Syntax
terminal datadump
terminal no datadump
Default Configuration
Dumping is disabled.
Command Mode
EXEC mode
User Guidelines
By default, a More prompt is displayed when the output contains more lines
than can be displayed on the screen. Pressing the Enter key displays the next
line; pressing the Spacebar displays the next screen of output. The terminal
datadump command enables dumping all output immediately after entering
the show command.
This command is relevant only for the current session.
Example
The following example dumps all output immediately after entering a show
command.
Console> terminal datadump
debug-mode
The debug-mode Privileged EXEC mode command mode switches to debug
mode.User Interface Commands 51
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\User_Interface.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Syntax
debug-mode
Command Mode
Privileged EXEC mode
Example
The following example enters Debug mode.
Console# debug-mode
show history
The show history EXEC mode command lists commands entered in the
current session.
Syntax
show history
Command Mode
EXEC mode
User Guidelines
The buffer includes executed and unexecuted commands.
Commands are listed from the first to the most recent command.
The buffer remains unchanged when entering into and returning from
configuration modes.
Example
The following example displays all the commands entered while in the
current Privileged EXEC mode.
Console# show version
SW version 3.131 (date 23-Jul-2005 time 17:34:19)
HW version 1.0.0
Console# show clock52 User Interface Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\User_Interface.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
15:29:03 Jun 17 2005
Console# show history
show version
show clock
show history
3 commands were logged (buffer size is 10)
show privilege
The show privilege EXEC mode command displays the current privilege
level.
Syntax
show privilege
Command Mode
EXEC mode
Example
The following example displays the current privilege level for the Privileged
EXEC mode.
Console# show privilege
Current privilege level is 15
do
The do command executes an EXEC-level command from Global
Configuration mode or any configuration submode.
Syntax
do command
Parameters
command—Specifies the EXEC-level command to execute.User Interface Commands 53
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\User_Interface.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Command Mode
All configuration modes
Example
The following example executes the show vlan Privileged EXEC mode
command from Global Configuration mode.
Example
Console (Config)# do show vlan
Vlan Name Ports Type Authorization
---- ---- --------------------------- -------- -------------
1 1 gi1/0/1-39,Po1,Po2, other Required
Po3,Po4,Po5,Po6,Po7,Po8
2 2 gi1/0/1 dynamicGvrp Required
10 v0010 gi1/0/1 permanent Not Required
11 V0011 gi1/0/1,gi1/0/13 permanent Required
20 20 gi1/0/1 permanent Required
30 30 gi1/0/1,gi1/0/13 permanent Required
31 31 gi1/0/1 permanent Required
91 91 gi1/0/1,gi1/0/40 permanent Required
4093 guest-vlan gi1/0/1,gi1/0/13 permanent Guest
console(config)#s
banner exec
Use the banner exec command to specify and enable a message to be
displayed when an EXEC process is created (The user has successfully logged
in), use the banner exec command in Global Configuration mode. Use the no
form of this command to delete the existing EXEC banner.
Syntax
banner exec d message-text d
no banner exec54 User Interface Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\User_Interface.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Parameters
• d—Delimiting character of your choice—a pound sign (#), for example.
You cannot use the delimiting character in the banner message.
• message-text—The message must start in a new line. You can enter multiline messages. You can include tokens in the form of $(token) in the
message text. Tokens are replaced with the corresponding configuration
variable. Tokens are described in the User Guidelines. The message can
contain up to 2000 characters (after every 510 characters, you must press
to continue).
Default Configuration
Disabled (no EXEC banner is displayed).
Command Mode
Global Configuration mode
User Guidelines
Follow this command with one or more blank spaces and a delimiting
character of your choice. Then enter one or more lines of text, terminating
the message with the second occurrence of the delimiting character.
When a user connects to a device, the message-of-the-day (MOTD) banner
appears first, followed by the login banner and prompts. After the user logs in
to the device, the EXEC banner is displayed.
Use tokens in the form of $(token) in the message text to customize the
banner. The tokens are described in the table below:
Token Information displayed in the banner
$(hostname) Displays the host name for the device.
$(domain) Displays the domain name for the device.
$(bold) Indicates that the next text is a bold text. Using this token
again indicates the end of the bold text.
$(inverse) Indicates that the next text is an inverse text. Using this
token again indicates the end of the inverse text.
$(contact) Displays the system contact string.User Interface Commands 55
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\User_Interface.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Use the no exec-banner line configuration command to disable the EXEC
banner on a particular line or lines.
Example
The following example sets an EXEC banner that uses tokens. The percent
sign (%) is used as a delimiting character. Note that the $(token) syntax is
replaced by the corresponding configuration variable.
Device(config)# banner exec %
Enter TEXT message. End with the character '%'.
$(bold)Session activated.$(bold) Enter commands at the prompt.
%
When a user logs on to the system, the following output is displayed:
Session activated. Enter commands at the prompt.
banner login
Use the banner login command in Global Configuration mode to specify and
enable a message to be displayed before the username and password login
prompts. Use the no form of this command to delete the existing Login
banner.
Syntax
banner login d message-text d
no banner login
Parameters
• Delimiting character of your choice—A pound sign (#), for example. You
cannot use the delimiting character in the banner message.
$(location) Displays the system location string.
$(macaddress)
Displays the base MAC address of the device.56 User Interface Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\User_Interface.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
• message-text—Message text. The message must start on a new line. You
can enter multi-line messages. You can include tokens in the form of
$(token) in the message text. Tokens are replaced with the corresponding
configuration variable. Tokens are described in the User Guidelines. The
message can contain up to 2000 characters (after every 510 characters, you
must press to continue).
Default Configuration
Disabled (no Login banner is displayed).
Command Mode
Global Configuration mode
User Guidelines
Follow this command with one or more blank spaces and a delimiting
character of your choice. Then enter one or more lines of text, terminating
the message with the second occurrence of the delimiting character.
When a user connects to a device, the message-of-the-day (MOTD) banner
appears first, followed by the login banner and prompts. After the user logs in
to the device, the EXEC banner is displayed.
Use tokens in the form of $(token) in the message text to customize the
banner. The tokens are described in the table below:
Token Information displayed in the banner
$(hostname) Displays the host name for the device.
$(domain) Displays the domain name for the device.
$(bold) Indicates that the next text is a bold text. Using this
token again indicates the end of the bold text.
$(inverse) Indicates that the next text is an inverse text. Using this
token again indicates the end of the inverse text.
$(contact) Displays the system contact string.
$(location) Displays the system location string.
$(macaddress)
Displays the base MAC address of the device.User Interface Commands 57
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\User_Interface.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Use the no login-banner line configuration command to disable the Login
banner on a particular line or lines.
Example
The following example sets a Login banner that uses tokens. The percent sign
(%) is used as a delimiting character. Note that the $(token) syntax is
replaced by the corresponding configuration variable.
Device(config)# banner login %
Enter TEXT message. End with the character '%'.
You have entered $(hostname).$(domain)
%
When the login banner is executed, the user will see the following banner:
You have entered host123.ourdomain.com
banner motd
Use the banner motd command in Global Configuration mode to specify and
enable a message-of-the-day banner. Use the no form of this command to
delete the existing MOTD banner.
Syntax
banner motd d message-text d
no banner motd
Parameters
• d—Delimiting character of your choice—a pound sign (#), for example.
You cannot use the delimiting character in the banner message.
• message-text—The message must start on a new line. You can enter multiline messages. You can include tokens in the form of $(token) in the
message text. Tokens are replaced with the corresponding configuration
variable. Tokens are described in the User Guidelines. The message can
contain up to 2000 characters (after every 510 characters, you must press
to continue).58 User Interface Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\User_Interface.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Default Configuration
Disabled (no MOTD banner is displayed).
Command Mode
Global Configuration mode
User Guidelines
Follow this command with one or more blank spaces and a delimiting
character of your choice. Then enter one or more lines of text, terminating
the message with the second occurrence of the delimiting character.
When a user connects to a device, the message-of-the-day (MOTD) banner
appears first, followed by the login banner and prompts. After the user logs in
to the device, the EXEC banner is displayed.
Use tokens in the form of $(token) in the message text to customize the
banner. The tokens are described in the table below:
Use the no motd-banner line configuration command to disable the MOTD
banner on a particular line or lines.
Example
The following example sets an MOTD banner that uses tokens. The percent
sign (%) is used as a delimiting character. Note that the $(token) syntax is
replaced by the corresponding configuration variable.
Token Information displayed in the banner
$(hostname) Displays the host name for the device.
$(domain) Displays the domain name for the device.
$(bold) Indicates that the next text is a bold text. Using this token
again to indicates the end of the bold text.
$(inverse) Indicates that the next text is an inverse text. Using this
token again indicates the end of the inverse text.
$(contact) Displays the system contact string.
$(location) Displays the system location string.
$(mac-address) Displays the base MAC address of the device.User Interface Commands 59
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\User_Interface.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Device(config)# banner motd %
Enter TEXT message. End with the character '%'.
$(bold)Upgrade$(bold) to all devices begins at March 12
%
When the login banner is executed, the user will see the following banner:
Upgrade to all devices begins at March 12
exec-banner
Use the exec-banner command in Line Configuration mode to enable the
display of exec banners. Use the no form of this command to disable the
display of exec banners.
Syntax
exec-banner
no exec-banner
Parameters
This command has no arguments or keywords.
Default Configuration
Disabled
Command Mode
Line Configuration mode
Example
console# configure
console(config)# line console
console(config-line)# exec-banner
console(config-line)# exit
console(config)# line telnet
console(config-line)# exec-banner
console(config-line)# exit60 User Interface Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\User_Interface.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
console(config)# line ssh
console(config-line)# exec-banner
login-banner
Use the login-banner command in Line Configuration mode to enable the
display of login banners. Use the no form of this command to disable the
display of login banners.
Syntax
login-banner
no login-banner
Parameters
This command has no arguments or keywords.
Default Configuration
Enabled
Command Mode
Line Configuration mode
Example
console# configure
console(config)# line console
console(config-line)# login-banner
console(config-line)# exit
console(config)# line telnet
console(config-line)# login-banner
console(config-line)# exit
console(config)# line ssh
console(config-line)# login-bannerUser Interface Commands 61
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\User_Interface.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
motd-banner
Use the motd-banner command in Line Configuration mode to enable the
display of message-of-the-day banners. Use the no form of this command to
disable the display of MOTD banners.
Syntax
motd-banner
no motd-banner
Parameters
This command has no arguments or keywords.
Default Configuration
Enabled
Command Mode
Line Configuration mode
Example
console# configure
console(config)# line console
console(config-line)# motd-banner
console(config-line)# exit
console(config)# line telnet
console(config-line)# motd-banner
console(config-line)# exit
console(config)# line ssh
console(config-line)# motd-banner
show banner
Use the show banner command in EXEC mode to display the configuration
of banners.62 User Interface Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\User_Interface.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Syntax
show banner motd
show banner login
show banner exec
Parameters
This command has no arguments or keywords.
Command Mode
EXEC mode
Examples
Device> show banner motd
Banner: MOTD
Line SSH: Enabled
Line Telnet: Enabled
Line Console: Enabled
10000 giga ports switch
console#
console# show banner login
-------------------------------------------------------------
Banner: Login
Line SSH: Enabled
Line Telnet: Enabled
Line Console: Enabled
console#
console# show banner exec
Banner: EXEC
Line SSH: Enabled
Line Telnet: Enabled
Line Console: Enabled
console#Macro Commands 63
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\750_Macro.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
3
Macro Commands
macro name
Use the Macro Name Global Configuration mode command to create a user
defined macro.
Use the no form of this command to delete the macro definition.
Syntax
macro name [macro-name]
no macro name [macro-name]
Parameters
macro-name—Name of the macro. Macro names are case sensitive.
Default Configuration
The command has no default setting.
Command Mode
Global Configuration mode
User Guidelines
A macro can contain up to 3000 characters and up to 200 lines. Enter one
macro command per line. Use the @ character to end the macro. Use the #
character at the beginning of a line to enter comment text within the macro.
You can define mandatory keywords within a macro by using a help string to
specify the keywords. Enter #macro keywords word to define the keywords
that are available for use with the macro. The keyword name is case sensitive.
You can enter up to three keywords separated by a space. Only the first three 64 Macro Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\750_Macro.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
keywords are visible if you enter more than three macro keywords. The
command can be anywhere within the macro.
When creating a macro, do not use the exit or end commands or change the
command mode using interface interface-id. Doing so might cause
commands that follow exit, end or interface interface-id to be executed in a
different command mode.
You can modify a macro by creating a new macro with the same name as the
existing macro. The newer macro overwrites the existing macro.
Examples
The following example shows how to create a macro that defines the duplex
mode and speed:
Switch(config) # macro name dup
Enter macro commands one per line. End with the character ‘@’.
macro description dup
duplex full
speed auto
The following example shows how to create a macro with #macro keywords:
Switch(config) # macro name duplex
Enter macro commands one per line. End with the character ‘@’.
macro description duplex
duplex $DUPLEX
speed $SPEED
#macro keywords $ DUPLEX $ SPEED
@
The following example shows how to apply the macros to an interface:
Switch(config-if) # macro apply duplex $DUPLEX full $SPEED auto
Switch(config-if) # macro apply duplex ?
WORDkeyword to replace with value e.g. $DUPLEX, $SPEED
Macro Commands 65
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\750_Macro.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Switch(config-if) # macro apply duplex $DUPLEX ?
WORDValue of the first keyword to replace
Switch(config-if) # macro apply duplex $DUPLEX full $SPEED ?
WORDValue of the second keyword to replace
macro apply
Use the macro apply interface configuration command to apply a macro to an
interface or to apply and trace a macro configuration on an interface.
Syntax
macro {apply | trace} macro-name [parameter {value}] [parameter {value}]
[parameter {value}]
Parameters
• apply—Apply a macro to the specific interface.
• trace—Apply and trace a macro to the specific interface.
• macro-name—Specify the name of the macro.
• parameter—(Optional) Specify unique parameter values that are specific
to the interface. You can enter up to three keyword-value pairs. Parameter
keyword matching is case sensitive. All matching occurrences of the
keyword are replaced with the corresponding value.
Default Configuration
The command has no default setting.
Command Mode
Interface Configuration mode
User Guidelines
You can use the macro trace macro-name Interface Configuration command
to apply and show the macros running on an interface or to debug the macro
to find any syntax or configuration errors.
If a command fails because of a syntax error or a configuration error the
macro continues to apply t) in the interface. Use the parameter value 66 Macro Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\750_Macro.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
keywords to designate values specific to the interface when creating a macro
that requires the assignment of a unique value.
Keyword matching is case sensitive. All matching occurrences of the keyword
are replaced with the corresponding value. Any full match of a keyword, even
if it is part of a large string, is considered a match and replaced by the
corresponding value.
Some macros might contain keywords that require a parameter value. You can
use the macro apply macro-name command to display a list of any required
values in the macro. If you apply a macro without entering the keyword
values, the commands are invalid and are therefore not applied.
When you apply a macro to an interface, the macro name is automatically
added to the interface. You can display the applied commands and macro
names by using the show running-configuration interface interface-id user
EXEC mode command.
A macro applied to an interface range behaves the same way as a macro
applied to a single interface. When a macro is applied to an interface range, it
is applied sequentially to each interface within the range. If a macro
command fails on one interface, it is nonetheless applied to the remaining
interfaces.
Example
Switch(config) # interface gi1/0/2
Switch(config-if) # macro trace dup
Applying command… ‘duplex full’
Applying command… ‘speed auto’
Switch(config) # interface gi1/0/2
Switch(config-if) # macro apply duplex $DUPLEX full $SPEED auto
Switch(config-if) # exit
Switch(config) # interface gi1/0/3
Switch(config-if) # macro apply dup
Switch(config-if) # exitMacro Commands 67
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\750_Macro.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
macro description
Use the macro description Interface Configuration mode command to enter
a description about which macros are applied to an interface. Use the no form
of this command to remove the description.
Syntax
macro description text
no macro description
Parameters
text—Description text. The text can contain up to 160 characters.
Default Configuration
The command has no default setting.
Command Mode
Interface Configuration mode
User Guidelines
When multiple macros are applied on a single interface, the description text
is a concatenation of texts from a number of previously applied macros.
You can verify your setting by entering the show parser macro description
privileged EXEC modecommand.
Example
Switch(config) # interface gi1/0/2
Switch(config-if) # macro apply dup
Switch(config-if) # end
Switch(config) # interface gi1/0/3
Switch(config-if) # macro apply duplex $DUPLEX full $SPEED auto
Switch(config-if) # end
Switch # show parser macro description
InterfaceMacro Description
-----------------------------------------------------------------68 Macro Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\750_Macro.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
1/2 dup
1/3 duplex
-----------------------------------------------------------------
Switch(config) # interface gi1/0/2
Switch(config-if) # no macro description
Switch(config-if) # end
Switch # show parser macro description
InterfaceMacro Description
-----------------------------------------------------------------
1/3 duplex
-----------------------------------------------------------------
macro global
Use the macro global Global Configuration command to apply a macro to a
switch or to apply and trace a macro configuration on a switch.
Syntax
macro global {apply | trace} macro-name [parameter {value}] [parameter
{value}] [parameter {value}]
Parameters
• apply—Apply a macro to the switch.
• trace—Apply and trace a macro to the switch.
• macro-name—Specify the name of the macro.
• paramete—(Optional) Specify unique parameter values that are specific
to the switch. You can enter up to three keyword-value pairs. Parameter
keyword matching is case sensitive. All matching occurrences of the
keyword are replaced with the corresponding value.
Default Configuration
The command has no default setting.
Command Mode
Global Configuration modeMacro Commands 69
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\750_Macro.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
User Guidelines
You can use the macro global trace macro-name Global Configuration mode
command to apply and show the macros running on the switch or to debug
the macro in order to locate any syntax or configuration errors.
If a command fails because of a syntax error or a configuration error when you
apply a macro, the macro nonetheless continues to apply the remaining
commands to the interface.
Use the parameter value keywords to designate values specific to the switch
when creating a macro that requires the assignment of unique value.
Keyword matching is case sensitive. All matching occurrences of the keyword
are replaced with the corresponding value. Any full match of a keyword, even
if it is part of a large string, is considered a match and replaced by the
corresponding value.
Some macros might contain keywords that require a parameter value. You can
use the macro global apply macro-name command to display a list of any
required values in the macro. If you apply a macro without entering the
keyword values, the commands are considered invalid and are not applied.
When you apply a macro to the switch, the macro name is automatically
added to the switch. You can display the applied commands and macro names
by using the show running-configuration interface user EXEC mode
command.
macro global description
Use the macro global description Global Configuration command to enter a
description about which macros are applied to the switch. Use the no form of
this command to remove the description.
Syntax
macro global description text
no macro global description
Parameters
text—Description text. The text can contain up to 160 characters.70 Macro Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\750_Macro.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Default Configuration
The command has no default setting.
Command Mode
Global Configuration mode
User Guidelines
When multiple global macros are applied to a switch, the global description
text is a concatenation of texts from a number of previously applied macros.
You can verify your settings by entering the show parser macro description
privileged EXEC mode command.
show parser macro
Use the show parser macro User EXEC mode command to display the
parameters for all configured macros or for one macro on the switch.
Syntax
show parser macro [{brief | description [interface interface-id] | name
macro-name}]
Parameters
• brief—(Optional) Display the name of each macro.
• description [interface]—(Optional) Display all macro descriptions.
• interface-id—Or the description of a specific interface.
• name macro-name—(Optional) Display information about a single macro
identified by the macro name.
Command Mode
User EXEC modeSystem Management Commands 71
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\System_Management.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
4
System Management Commands
ping
Use the ping command to send ICMP echo request packets to another node
on the network.
Syntax
ping [ip] {ipv4-address | hostname} [size packet_size] [count packet_count]
[timeout time_out]
ping ipv6 {ipv6-address | hostname} [size packet_size] [count
packet_count] [timeout time_out]
Parameters
• ip—Use IPv4 to check the network connectivity.
• ipv6—Use IPv6 to check the network connectivity.
• ipv4-address—IPv4 address to ping.
• ipv6-address—Unicast or multicast IPv6 address to ping. When the IPv6
address is a Link Local address (IPv6Z address), the outgoing interface
name must be specified. Refer to the User Guidelines for the interface
name syntax.
• hostname—Hostname to ping (160 characters. Maximum label size: 63.)
• packet_size—Number of bytes in the packet not including the VLAN tag.
The default is 64 bytes. (IPv4:64-1518, IPv6: 68-1518)
• packet_count—Number of packets to send, from 1 to 65535 packets. The
default is 4 packets. If 0 is entered, it pings until stopped (0–65535).
• time-out—Timeout in milliseconds to wait for each reply, from 50 to
65535 milliseconds. The default is 2000 milliseconds (50–65535).72 System Management Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\System_Management.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Command Mode
EXEC mode
User Guidelines
Press Esc to stop pinging. Following are sample results of the ping command:
• Destination does not respond—If the host does not respond, a “no answer
from host” appears within 10 seconds.
• Destination unreachable—The gateway for this destination indicates that
the destination is unreachable.
• Network or host unreachable—The switch found no corresponding entry
in the route table.
The format of an IPv6Z address is: %
• interface-name = vlan | ch | isatap |
| 0
• integer = |
• decimal-number = 0 | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9
• physical-port-name = Designated port number, for example gi1/0/1
When using the ping ipv6 command to check network connectivity of a
directly attached host using its link local address, the egress interface may be
specified in the IPv6Z format. If the egress interface is not specified, the
default interface is selected. Specifying interface zone=0 is equivalent to not
defining an egress interface.
When using the ping ipv6 command with MC address, the information
displayed is taken from all received echo responses.
Examples
Console> ping ip 10.1.1.1
Pinging 10.1.1.1 with 64 bytes of data:
64 bytes from 10.1.1.1: icmp_seq=0. time=11 ms
64 bytes from 10.1.1.1: icmp_seq=1. time=8 ms
64 bytes from 10.1.1.1: icmp_seq=2. time=8 msSystem Management Commands 73
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\System_Management.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
64 bytes from 10.1.1.1: icmp_seq=3. time=7 ms
----10.1.1.1 PING Statistics----
4 packets transmitted, 4 packets received, 0% packet loss
round-trip (ms) min/avg/max = 7/8/11
Console> ping ip yahoo.com
Pinging yahoo.com [66.218.71.198] with 64 bytes of data:
64 bytes from 10.1.1.1: icmp_seq=0. time=11 ms
64 bytes from 10.1.1.1: icmp_seq=1. time=8 ms
64 bytes from 10.1.1.1: icmp_seq=2. time=8 ms
64 bytes from 10.1.1.1: icmp_seq=3. time=7 ms
----10.1.1.1 PING Statistics----
4 packets transmitted, 4 packets received, 0% packet loss
round-trip (ms) min/avg/max = 7/8/11
Console> ping ip oob/176.16.1.1
Pinging oob/176.16.1.1 with 64 bytes of data:
64 bytes from oob/176.16.1.1: icmp_seq=0. time=5 ms
64 bytes from oob/176.16.1.1: icmp_seq=1. time=5 ms
64 bytes from oob/176.16.1.1: icmp_seq=2. time=5 ms
64 bytes from oob/176.16.1.1: icmp_seq=3. time=5 ms
----10.1.1.1 PING Statistics----
4 packets transmitted, 4 packets received, 0% packet loss
round-trip (ms) min/avg/max = 5/5/5
console> ping ipv6 3003::11
Pinging 3003::11 with 64 bytes of data:
64 bytes from 3003::11: icmp_seq=1. time=0 ms
64 bytes from 3003::11: icmp_seq=2. time=50 ms
64 bytes from 3003::11: icmp_seq=3. time=0 ms74 System Management Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\System_Management.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
64 bytes from 3003::11: icmp_seq=4. time=0 ms
----3003::11 PING Statistics----
4 packets transmitted, 4 packets received, 0% packet loss
round-trip (ms) min/avg/max = 0/12/50
console> ping ipv6 FF02::1
Pinging FF02::1 with 64 bytes of data:
64 bytes from 3003::11: icmp_seq=1. time=0 ms
64 bytes from 3003::33: icmp_seq=1. time=70 ms
64 bytes from 3003::11: icmp_seq=2. time=0 ms
64 bytes from 3003::55: icmp_seq=1. time=1050 ms
64 bytes from 3003::33: icmp_seq=2. time=70 ms
64 bytes from 3003::55: icmp_seq=2. time=1050 ms
64 bytes from 3003::11: icmp_seq=3. time=0 ms
64 bytes from 3003::33: icmp_seq=3. time=70 ms
64 bytes from 3003::11: icmp_seq=4. time=0 ms
64 bytes from 3003::55: icmp_seq=3. time=1050 ms
64 bytes from 3003::33: icmp_seq=4. time=70 ms
64 bytes from 3003::55: icmp_sq=4. time=1050 ms
---- FF02::1 PING Statistics----
4 packets transmitted, 12 packets received
traceroute
To discover (?) the routes that packets will take when traveling to their
destination, use the traceroute EXEC command.
Syntax
traceroute ip {ipv4-address | hostname} [size packet_size] [ttl max-ttl]
[count packet_count] [timeout time_out] [source ip-address] [tos tos]
traceroute ipv6 {ipv6-address | hostname} [size packet_size] [ttl max-ttl]
[count packet_count] [timeout time_out] [source ip-address] [tos tos]System Management Commands 75
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\System_Management.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Parameters
• ip—Use IPv4 to discover the route.
• ipv6—Use IPv6 to discover the route.
• ipv4-address—IPv4 address of the destination host. (Range: Valid IP
address)
• ipv6-address—IPv6 address of the destination host.
• hostname—Hostname of the destination host. (Range: 1–160 characters.
Maximum label size: 63.)
• packet_size—Number of bytes in the packet not including the VLAN tag.
The default is 64 bytes. (IPv4:64-1518, IPv6: 68-1518)
• ttl max-ttl—The largest TTL value that can be used. The default is 30.
The traceroute command terminates when the destination is reached or
when this value is reached. (Range: 1–255)
• count packet_count—The number of probes to be sent at each TTL level.
The default count is 3. (Range: 1–10)
• timeout time_out—The number of seconds to wait for a response to a
probe packet. The default is 3 seconds. (Range: 1–60)
• source ip-address—One of the interface addresses of the device to use as a
source address for the probes. The device will normally pick what it feels is
the best source address to use. (Range: Valid IP address)
• tos tos—The Type-Of-Service byte in the IP Header of the packet.(Range:
0—255)
Command Mode
EXEC mode
User Guidelines
The traceroute command works by taking advantage of the error messages
generated by routers when a datagram exceeds its time-to-live (TTL) value.
The traceroute command starts by sending probe datagrams with a TTL
value of one. This causes the first router to discard the probe datagram and
send back an error message. The traceroute command sends several probes at
each TTL level and displays the round-trip time for each. 76 System Management Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\System_Management.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
The traceroute command sends out one probe at a time. Each outgoing
packet can result in one or two error messages. A "time exceeded” error
message indicates that an intermediate router has seen and discarded the
probe. A "destination unreachable" error message indicates that the
destination node has received the probe and discarded it because it could not
deliver the packet. If the timer goes off before a response comes in, the
traceroute command prints an asterisk (*).
The traceroute command terminates when the destination responds, when
the maximum TTL is exceeded, or when the user interrupts the trace with
Esc.
The traceroute command is not relevant to IPv6 link local addresses.
Example
Router> traceroute ip umaxp1.physics.lsa.umich.edu
Type Esc to abort.
Tracing the route to umaxp1.physics.lsa.umich.edu (141.211.101.64)
1 i2-gateway.stanford.edu (192.68.191.83) 0 msec 0 msec 0 msec
2 STAN.POS.calren2.NET (171.64.1.213) 0 msec 0 msec 0 msec
3 SUNV--STAN.POS.calren2.net (198.32.249.73) 1 msec 1 msec 1 msec
4 Abilene--QSV.POS.calren2.net (198.32.249.162) 1 msec 1 msec 1 msec
5 kscyng-snvang.abilene.ucaid.edu (198.32.8.103) 33 msec 35 msec 35
msec
6 iplsng-kscyng.abilene.ucaid.edu (198.32.8.80) 47 msec 45 msec 45
msec
7 so-0-2-0x1.aa1.mich.net (192.122.183.9) 56 msec 53 msec 54 msec
8 atm1-0x24.michnet8.mich.net (198.108.23.82) 56 msec 56 msec 57 msec
9 * * *
10 A-ARB3-LSA-NG.c-SEB.umnet.umich.edu (141.211.5.22) 58 msec 58 msec 58
msec
11 umaxp1.physics.lsa.umich.edu (141.211.101.64) 62 msec 63 msec 63 msec
Trace completedSystem Management Commands 77
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\System_Management.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
The following table describes the significant fields shown in the display:
The following are characters that can appear in the traceroute command
output:
telnet
The telnet EXEC mode command enables logging on to a host that supports
Telnet.
Syntax
telnet {ip-address | hostname} [port] [keyword ...]
Field Description
1 Indicates the sequence number of the router in the
path to the host.
i2-gateway.stanford.edu Host name of this router.
192.68.191.83 IP address of this router.
1 msec 1 msec 1 msec Round-trip time for each of the probes that are
sent.
Field Description
* The probe timed out.
? Unknown packet type.
A Administratively unreachable. Usually, this output indicates that
an access list is blocking traffic.
F Fragmentation required and DF is set.
H Host unreachable.
N Network unreachable.
P Protocol unreachable.
Q Source quench.
R Fragment reassembly time exceeded
S Source route failed.
U Port unreachable. 78 System Management Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\System_Management.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Parameters
• ip-address—Specifies the destination host IP address.
• hostname—Specifies the destination host name. (Length: 1-160
characters. Maximum label length: 63 characters.)
• port—Specifies the decimal TCP port number or one of the keywords
listed in the Ports table in the User Guidelines.
• keyword—Specifies the one or more keywords listed in the Keywords table
in the User Guidelines.
Default Configuration
The default port is the Telnet port (23) on the host.
By default, Telnet is enabled.
Command Mode
EXEC mode
User Guidelines
Telnet software supports special Telnet commands in the form of Telnet
sequences that map generic terminal control functions to operating systemspecific functions. To enter a Telnet sequence, press the escape sequence keys
(Ctrl-shift-6) followed by a Telnet command character.
Special Telnet Sequences
At any time during an active Telnet session, available Telnet commands can
be listed by pressing the Ctrl-shift-6-? keys at the system prompt.
Telnet Sequence Purpose
Ctrl-shift-6-b Break
Ctrl-shift-6-c Interrupt Process (IP)
Ctrl-shift-6-h Erase Character (EC)
Ctrl-shift-6-o Abort Output (AO)
Ctrl-shift-6-t Are You There? (AYT)
Ctrl-shift-6-u Erase Line (EL)System Management Commands 79
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\System_Management.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
A sample of this list follows. Note that the Ctrl-shift-6 sequence appears as
^^ on the screen.
Console> ‘Ctrl-shift-6’ ?
[Special telnet escape help]
^^ B sends telnet BREAK
^^ C sends telnet IP
^^ H sends telnet EC
^^ O sends telnet AO
^^ T sends telnet AYT
^^ U sends telnet EL
Ctrl-shift-6 x suspends the session (return to system
command prompt)
Several concurrent Telnet sessions can be opened, enabling switching
between the sessions. To open a subsequent session, the current connection
has to be suspended by pressing the escape sequence keys (Ctrl-shift-6) and x
to return to the system command prompt. Then open a new connection with
the telnet EXEC mode command.
This command lists concurrent Telnet connections to remote hosts that were
opened by the current Telnet session to the local device. It does not list Telnet
connections to remote hosts that were opened by other Telnet sessions.
Keywords Table
Options Description
/echo Enables local echo.
/quiet Prevents onscreen display of all messages from
the software.
/source-interface Specifies the source interface.80 System Management Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\System_Management.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Ports Table
/stream Turns on stream processing, which enables a raw
TCP stream with no Telnet control sequences. A
stream connection does not process Telnet options
and can be appropriate for connections to ports
running UNIX-to-UNIX Copy Program (UUCP) and
other non-Telnet protocols.
Ctrl-shift-6 x Returns to the System Command Prompt.
Keyword Description Port Number
BGP Border Gateway Protocol 179
chargen Character generator 19
cmd Remote commands 514
daytime Daytime 13
discard Discard 9
domain Domain Name Service 53
echo Echo 7
exec Exec 512
finger Finger 79
ftp File Transfer Protocol 21
ftp-data FTP data connections 20
gopher Gopher 70
hostname NIC hostname server 101
ident Ident Protocol 113
irc Internet Relay Chat 194
klogin Kerberos login 543
kshell Kerberos shell 544
login Login 513
lpd Printer service 515
nntp Network News Transport Protocol 119
Options DescriptionSystem Management Commands 81
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\System_Management.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
The following example displays logging in to IP address 176.213.10.50 via
Telnet.
Console> telnet 176.213.10.50
Esc U sends telnet EL
resume
The resume EXEC mode command enables switching to another open Telnet
session.
Syntax
resume [connection]
Parameters
connection—Specifies the connection number. (Range: 1-4 connections.)
pim-auto-rp PIM Auto-RP 496
pop2 Post Office Protocol v2 109
pop3 Post Office Protocol v3 110
smtp Simple Mail Transport Protocol 25
sunrpc Sun Remote Procedure Call 111
syslog Syslog 514
tacacs TAC Access Control System 49
talk Talk 517
telnet Telnet 23
time Time 37
uucp Unix-to-Unix Copy Program 540
whois Nickname 43
www World Wide Web 80
Keyword Description Port Number82 System Management Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\System_Management.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Default Configuration
The default connection number is that of the most recent connection.
Command Mode
EXEC mode
Example
The following command switches to open Telnet session number 1.
Console> resume 1
hostname
The hostname Global Configuration mode command specifies or modifies
the device host name. Use the no form of the command to remove the
existing host name.
Syntax
hostname name
no hostname
Parameters
Name—specifies The Device Host Name. (Length: 1-160 Characters.
Maximum label length: 63 characters.)
Default Configuration
No host name is defined.
Command Mode
Global Configuration mode
Example
The following example specifies the device host name as ‘enterprise’.
Console(config)# hostname enterprise
enterprise(config)#System Management Commands 83
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\System_Management.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
reload
The reload Privileged EXEC mode command reloads the operating system.
Syntax
reload [slot stack-member-number]
Command Mode
Privileged EXEC mode
Parameters
stack-member-number —Specifies the new master unit number. (Range:
1–8). If unspecified, reloads all the units.
Example
The following example reloads the operating system on all units.
Console# reload
This command will reset the whole system and disconnect your
current session. Do you want to continue? (y/n) [n]
stack master
The stack master Global Configuration mode command forces a stack master
selection. Use the no form of this command to restore the default
configuration.
Syntax
stack master unit unit
no stack master
Parameters
unit —Specifies the new master unit number. (Range: 1–2)
Default Configuration
The default is no forced master.84 System Management Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\System_Management.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Command Mode
Global Configuration mode
Example
The following example forces the stack master to be unit 2.
Console(config)# stack master unit 2
system light
Use the system light EXEC command to light LEDs on a specific unit.
Syntax
system light [unit unit-number] [duration seconds]
system light stop
Parameters
• unit-number—Specify unit number or all.
• seconds—The number of seconds to light the LEDs. If unspecified,
defaults to 5 seconds. (Range: 2–6)
• stop—Stop lighting the LEDs.
Command Mode
EXEC mode
switch renumber
Use the switch renumber Global Configuration command to change the unit
ID of a specific unit.
Syntax
switch current-unit-number renumber new-unit-number
Parameters
• current-unit-number—Specify Unit number. (Range: 1–8)System Management Commands 85
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\System_Management.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
• new-unit-number—The new unit number. (Range: 1–8)
Command Mode
Global Configuration mode
show switch
The show switch EXEC mode command displays stack status information for
the stack or stack member.
Syntax
show switch [stack-member-number]
Parameters
stack-member-number— Specifies the unit number. (Range: 1–6)
Command Mode
EXEC mode
Example
The following examples display the stack status information.
Console> show switch
Unit
----
1
3
4
5
6
7
8
2
MAC Address
-----------------
00:00:b0:87:12:11
00:00:b0:87:12:13
00:00:b0:87:12:14
00:00:b0:87:12:15
00:00:b0:87:12:16
00:00:b0:87:12:17
00:00:b0:87:12:18
00:00:b0:87:12:12
SW
------
3.30
3.30
3.30
3.30
3.30
3.30
3.30
3.30
Master
------
Enabled
Forced
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Uplink
-----
2
1
3
4
5
6
7
8
Down
link
-----
3
4
5
6
7
8
2
1
Status
------
Slave
Master
Slave
Slave
Slave
Slave
Slave
Slave86 System Management Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\System_Management.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
service cpu-utilization
The service cpu-utilization Global Configuration mode command enables
measuring CPU utilization. Use the no form of this command to restore the
default configuration.
Syntax
service cpu-utilization
no service cpu-utilization
Default Configuration
Measuring CPU utilization is disabled.
Command Mode
Global Configuration mode
User Guidelines
Use the show cpu utilization Privileged EXEC command to view
information on CPU utilization.
Configured order: Unit 1 at Top, Unit 2 at bottom
Console> show switch 1
Unit 1:
MAC address: 00:00:b0:87:12:11
Master: Forced.
Product: Fonseca 48. Software: 3.30
Uplink unit: 8. Downlink unit: 2.
Status: Master
Active image: image-1.
Selected for next boot: image-2.System Management Commands 87
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\System_Management.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
The following example enables measuring CPU utilization.
Console(config)# service cpu-utilization
show cpu utilization
The show cpu utilization Privileged EXEC mode command displays
information about CPU utilization.
Syntax
show cpu utilization
Command Mode
Privileged EXEC mode
User Guidelines
Use the service cpu-utilization Global Configuration mode command to
enable measuring CPU utilization.
Example
The following example displays CPU utilization information.
Console# show cpu utilization
CPU utilization service is on.
CPU utilization
--------------------------------------------------
five seconds: 5%; one minute: 3%; five minutes: 3%
clear cpu counters
The clear cpu counters EXEC mode command clears traffic counters to and
from the CPU.
Syntax
clear cpu counters88 System Management Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\System_Management.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Command Mode
EXEC mode
Example
The following example clears the CPU traffic counters.
Console# clear cpu counters
service cpu-counters
The service cpu-counters Global Configuration mode command enables
traffic counting to and from the CPU. To disable counting, use the no form of
this command.
Syntax
service cpu-counters
no service cpu-counters
Command Mode
Global Configuration mode
User Guidelines
Use the show cpu counters command to display the CPU traffic counters.
Example
The following example enables counting CPU traffic.
Console(config)# service cpu-counters
show cpu counters
The show cpu counters EXEC mode command displays traffic counter
information to and from the CPU.
Syntax
show cpu countersSystem Management Commands 89
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\System_Management.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Command Mode
EXEC mode
User Guidelines
Use the service cpu-counters command to enable traffic counting to and
from the CPU.
Example
The following example displays the CPU traffic counters.
Console# show cpu counters
CPU counters are active.
In Octets: 987891
In Unicast Packets: 3589
In Multicast Packets: 29
In Broadcast Packets: 8
Out Octets: 972181
Out Unicast Packets: 3322
Out Multicast Packets: 22
Out Broadcast Packets: 8
show users
The show users EXEC mode command displays information about the active
users.
Syntax
show users
Command Mode
EXEC mode90 System Management Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\System_Management.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
The following example displays information about the active users.
show sessions
The show sessions EXEC mode command displays open Telnet sessions.
Syntax
show sessions
Command Mode
EXEC mode
User Guidelines
The command displays Telnet sessions to remote hosts opened by the current
Telnet session to the local device. It does not display Telnet sessions to
remote hosts opened by other Telnet sessions to the local device.
Console# show users
Username
----------
Bob
John
Robert
Betty
Sam
Protocol
-----------
Serial
SSH
HTTP
Telnet
Location
------------
172.16.0.1
172.16.0.8
172.16.1.7
172.16.1.6System Management Commands 91
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\System_Management.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
The following example displays open Telnet sessions.
The following table describes significant fields shown above.
show system
The show system EXEC mode command displays system information.
Syntax
show system [unit unit]
Parameters
unit unit — Specifies the unit number. (Range: 1–8)
Command Mode
EXEC mode
Console# show sessions
Connection
----------
1
2
Host
-------------
Remote router
172.16.1.2
Address
----------
172.16.1.1
172.16.1.2
Port
-----
23
23
Byte
----
89
8
Field Description
Connection The connection number.
Host The remote host to which the device is connected through a
Telnet session.
Address The remote host IP address.
Port The Telnet TCP port number.
Byte The number of unread bytes for the user to see on the
connection.92 System Management Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\System_Management.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
The following example displays the system information.
console# show system
Unit Type
---- ----------------------
1 PowerConnect 5524
2 PowerConnect 5524
3 PowerConnect 5524
4 PowerConnect 5524
5 PowerConnect 5524
6 PowerConnect 5524
7 PowerConnect 5524
8 PowerConnect 5524
Unit Main Power Supply Redundant Power Supply
---- ----------------- ----------------------
1 OK
2 OK
3 OK
4 OK
5 OK
6 OK
7 OK
8 OK NOT OPERATIONAL
Unit Fans Status
---- -------------
1 OK
2 OK
3 OK
4 OK
5 IDLE
6 OK
7 OK
8 FAILURESystem Management Commands 93
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\System_Management.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Unit Temperature (Celsius) Temperature Sensor
Status
---- ------------------------- ---------------
1 47 OK
2 45 OK
3 49 OK
4 36 OK
5 35 OK
6 45 OK
7 40 OK
8 56 OK
Unit Up time
---- ---------------
1 00,00:31:24
2 00,00:31:19
3 00,00:31:24
4 00,00:31:24
5 00,00:31:24
6 00,00:31:24
7 00,00:31:25
8 00,00:31:25
console# show system unit 2
System Type: PowerConnect 5548
System Up Time (days,hour:min:sec): 08,23:03:46
System Contact:
System Name:
System Location:
System MAC Address: 00:99:88:66:33:33
System Object ID: 1.3.6.1.4.1.674.10895.3031
Type: PowerConnect 5548
Main Power Supply Status: OK94 System Management Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\System_Management.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Fans Status: OK
Unit Temperature (Celsius) Status
------------- ------------------- -------------
2 42 OK
show version
The show version EXEC mode command displays system version
information.
Syntax
show version [unit unit]
Parameters
unit unit — Specifies the unit number. (Range: 1–8)
Command Mode
EXEC mode
Example
The following example displays system version information.
console > show version
Unit SW Version Boot Version HW Version
------ ----------- ------------ ----------
1 3.131 2.178 1.0.0
2 3.131 2.178 1.0.0
system resources routing
The system resources routing Global Configuration mode command
configures the routing table maximum size. Use the no form of this
command to return to the default size.
Syntax
system resources routing routes hosts interfacesSystem Management Commands 95
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\System_Management.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
no system resources routing
Parameters
• routes—Specifies the maximum number of remote networks in the
routing table.
• hosts—Specifies the maximum number of directly attached hosts.
• interfaces—Specifies the maximum number of IP interfaces.
Default Configuration
Hosts: 200, Routes: 64, IP Interfaces: 32
Command Mode
Global Configuration mode
User Guidelines
The settings are effective after reboot.
Example
The following example configures the routing table maximum size.
Console# system resources routing 20 23 5
show system resources routings
The show system resources routings EXEC mode command displays system
routing resources information.
Syntax
show system resources routings
Command Mode
EXEC mode96 System Management Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\System_Management.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
The following example displays the system routing resources information.
Console> show system resources routings
Parameters Current value After reboot Value
-------------- ---------------- -------------------
Hosts: 100 100
Routes: 32 32
IP Interfaces: 32 32
show system tcam utilization
The show system tcam utilization EXEC mode command displays the
Ternary Content Addressable Memory (TCAM) utilization.
Syntax
show system tcam utilization [unit unit]
Parameters
unit unit—Specifies the unit number. (Range: 1–8)
Command Mode
EXEC mode
Example
The following example displays TCAM utilization information.
Console> show system tcam utilization
System: 75%
Unit
----
1
2
TCAM utilization [%]
--------------------
58
57System Management Commands 97
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\System_Management.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
show system defaults
Use the show system defaults command to display system defaults.
Syntax
show system defaults [section]
Parameters
section—Show information for specific session only. Available values are:
management, 802.1x, port, fdb, port-mirroring, spanning-tree, vlan, voicevlan, ip-addressing, network-security and qos-acl.
Command Mode
EXEC mode
Examples
console# show system defaults
System Mode: Router
Maximum units in stack: 8
# Management defaults
Telnet: Enabled (Maximum 4 sessions, shared with SSH)
SSH: Enabled (Maximum 4 sessions, shared with Telnet)
HTTP: Enabled, port 80 (Maximum 27 sessions)
HTTPS: Disabled
SNMP: Enabled.
User: first
SNMP version: V3
SNMP Local Engine ID: 0000000001
SNMP Notifications: Enabled
SNMP Authentication Notifications: Enabled
Console: Enabled.
Cryptographic keys are not generated
HTTPS certificate is not generated
Management ACL: No ACL is defined
AAA Telnet authentication login: Local user data base98 System Management Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\System_Management.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
AAA HTTP authentication login: Local data base
AAA HTTPS authentication login: Local data base
Radius accounting: Disabled
Radius: No server is defined
Tacacs: No server is defined
Syslog: No server is defined
Logging: Enabled
Logging to console: Informational messages
Logging to internal buffer: Informational messages
Logging to file: Error messages
Logging to remote server: Informational messages
Maximum no. of syslog messages: 200
SNTP: supported
SNTP Port No.: 123
SNTP Interface: Enabled
IP Domain Naming System: Enabled
DHCP Server: Enabled
DHCP Auto Configuration: Enabled
DHCP Option 67: Enabled
DHCP Option 82: Disabled
# IPv6 defaults
# 802.1x defaults
802.1X is disabled
Mode: Multiple host
Guest VLAN: Not defined
# Interface defaults in present unit
48 GE regular
2 10G fiberOptics
PoE: Enabled
POE mode: Port Limit
Duplex: Full
Negotiation: Enabled
Flow control: OffSystem Management Commands 99
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\System_Management.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Mdix mode: auto
LAGs: No LAG is defined
Storm control: Disabled
Storm control mode: unknown unicast, broadcast, multicast
Port security: Disabled
LLDP: Enabled
LLDPDU Handeling: Filtering
Jumbo frames: Disabled
Port-Channel Load Balancing: Layer 2
# Bridging defaults
Maximum 16K entries
Aging time: 5 minutes
iSCSI: Enabled
iSCSI cos: 5, with no remark
# Multicast defaults
Multicast filtering: Disabled
IGMP snooping: Disabled
IGMP Querier: Disabled
Multicast TV Vlan Interface: disabled
# Port monitoring defaults
Port monitor is not defined
Maximum source port: 4
Maximum destination ports for mirroring: 2
# Spanning tree defaults
Spanning tree is Enabled
Spanning tree mode is Classic
Spanning tree interface: Enabled
Port fast: Disabled
BPDU handling: Filtering
BPDU Guard: Disabled
# Vlan defaults100 System Management Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\System_Management.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Maximum Vlans: 4094
Default VLAN: Enabled
Default VLAN id: 1
GVRP: Disabled
Port mode: undefined
PVID: 1
VLAN membership: 1
# Voice vlan defaults
Voice VLAN: Disabled
Cos: 6 with no remark
OUI table:
00:E0:BB 3COM
00:03:6B Cisco
00:E0:75 Veritel
00:D0:1E Pingtel
00:01:E3 Simens
00:60:B9 NEC/Philips
00:0F:E2 Huawei-3COM
00:09:6E Avaya
# Network security defaults
DHCP snooping: Disabled
ARP inspection: Disabled
ARP inspection Validation: Disabled
# DOS attacks
# IP addressing defaults
No IP interface is defined
# QOS and ACLs defaults
QoS mode is basic
QoS Basic Trust Mode: CoS
QoS Advanced Trust Mode: CoS-DSCP
Queue default mapping:System Management Commands 101
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\System_Management.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
cos qid:
0 2
1 1
2 1
3 3
4 4
5 5
6 6
7 7
show tech-support
Use the show tech-support command to display system and configuration
information you can provide to the Technical Assistance Center when
reporting a problem.
Syntax
show tech-support [config] [memory]
Parameters
Memory—Displays memory and processor state data.
Config—Displays switch configuration within the CLI commands supported
on the device.
Default Configuration
By default, this command displays the output for technical-support-related
show commands. Use keywords to specify the type of information to be
displayed. If you do not specify any parameters, the system displays all
configuration and memory data.
Command Types
Switch command.
Command Mode
EXEC mode102 System Management Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\System_Management.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
User Guidelines
Caution: Avoid running multiple show tech-support commands on a switch
or multiple switches on the network segment. Doing so may cause starvation
of some time sensitive protocols, like STP.
The show tech-support command may timeout if the configuration file
output takes longer to display than the configured session timeout time. If
this happens, enter a set logout timeout value of 0 to disable automatic
disconnection of idle sessions or enter a longer timeout value.
The show tech-support command output is continuous, it does not display
one screen at a time. To interrupt the output, press Esc.
If you specify the config keyword, the show tech-support command displays a
list of the commands supported on the device.
If user specifies the memory keyword, the show tech-support command
displays the output:
flash info (dir if existed, or flash mapping)
show bootvar
buffers info (like print os buff)
memory info (like print os mem)
proc info (lie print os tasks)
versions of software components
show cpu utilization
system fans always-on
Use the system fans always-on Global Configuration command to set the
system fans to On regardless of device temperature. Use the no form of the
command to return to default.
Syntax
system fans always-on [unit unit]
no system fans always-on
Parameters
unit unit—Unit number or all. If unspecified, defaults to all. (Range: 1–8)System Management Commands 103
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\System_Management.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Default Configuration
Automatic mode; The system fan speed depends on the temperature of the
device.
Command Mode
Global Configuration mode
show system fans
Use the show system fans EXEC command to view the fans’ status
Syntax
show system fans
Command Mode
EXEC mode
Example
console>show system fans
Unit Temperature Speed Admin state Oper state
(Celsius) (RPM)
--- --------------- ---------- -------------- -----------
1 30 8000 auto on
2 40 8000 on on
asset-tag
The asset-tag Global Configuration mode command assigns an asset-tag to a
device. Use the no form of this command to restore the default setting.
Syntax
asset-tag [unit unit] tag
no asset-tag [unit unit]104 System Management Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\System_Management.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Parameters
• unit —Specifies the unit number. (Range: 1–8)
• tag—Specifies the device asset-tag.
Default Configuration
No asset tag is defined.
The default unit number is the master unit number.
Command Mode
Global Configuration mode
Example
The following example assigns the asset-tag 2365491870 to the device.
Console(config)# asset-tag 2365491870
show system id
The show system id EXEC mode command displays the system identity
information.
Syntax
show system id [unit unit]
Parameters
unit unit—Specifies the unit number. (Range: 1–8)
Command Mode
EXEC modeSystem Management Commands 105
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\System_Management.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
The following example displays the system identity information.
Console> show system id
Unit Service tag Serial number Asset tag
------ ------------- ------------- -----------
1 89788978 8936589782 7843678957
2 3216523877 5621987728106 System Management Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\System_Management.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LYClock Commands 107
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Clock.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
5
Clock Commands
clock set
The clock set Privileged EXEC mode command manually sets the system
clock.
Syntax
clock set hh:mm:ss {[day month] | [month day]} year
Parameters
• hh:mm:ss—Specifies the current time in hours (military format), minutes,
and seconds. (Range: hh: 0-23, mm: 0-59, ss: 0-59)
• day—Specifies the current day of the month. (Range: 1-31)
• month—Specifies the current month using the first three letters of the
month name. (Range: Jan–Dec)
• year—Specifies the current year. (Range: 2000–2037)
Command Mode
Privileged EXEC mode
User Guidelines
The user should enter the local clock time and date.
Example
The following example sets the system time to 13:32:00 on March 7th, 2005.
Console# clock set 13:32:00 7 Mar 2005108 Clock Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Clock.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
clock source
The clock source Global Configuration mode command configures an
external time source for the system clock. Use the no form of this command
to disable the external time source.
Syntax
clock source {sntp}
no clock source
Parameters
sntp—Specifies that an SNTP server is the external clock source.
Default Configuration
There is no external clock source.
Command Mode
Global Configuration mode
Example
The following example configures an SNTP server as an external time source
for the system clock.
Console(config)# clock source sntp
clock timezone
Use the clock timezone Global Configuration command to set the time zone
for display purposes. Use the no form of this command to set the time to
Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT),
which is the same.
Syntax
clock timezone zone hours-offset [minutes-offset]Clock Commands 109
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Clock.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
no clock timezone
Parameters
• zone—The acronym of the time zone.(Range: Up to 4 characters)
• hours-offset—Hours difference from UTC. (Range: (-12)–(+13))
• minutes-offset—Minutes difference from UTC. (Range: 0–59)
Default Configuration
Offset is 0.
Acronym is empty.
Command Mode
Global Configuration mode
User Guidelines
The system internally keeps time in UTC, so this command is used only for
display purposes and when the time is manually set.
Example
console(config)# clock timezone abc +2 minutes 32
clock summer-time
Use one of the formats of the clock summer-time Global Configuration
command to configure the system to automatically switch to summer time
(daylight saving time). Use the no form of this command to configure the
software not to automatically switch to summer time.
Syntax
clock summer-time zone recurring {usa | eu | {week day month hh:mm week
day month hh:mm}} [offset]
clock summer-time zone date date month year hh:mm date month year
hh:mm [offset]110 Clock Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Clock.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
clock summer-time zone date month date year hh:mm month date year
hh:mm [offset]
no clock summer-time
Parameters
• zone—The acronym of the time zone to be displayed when summer time
is in effect. (Range: Up to 4 characters)
• recurring—Indicates that summer time should start and end on the
corresponding specified days every year.
• date—Indicates that summer time should start on the first specific date
listed in the command and end on the second specific date in the
command.
• usa—The summer time rules are the United States rules.
• eu—The summer time rules are the European Union rules.
• week—Week of the month. Can be 1–4, first, last.
• day—Day of the week (first three letters by name, such as Sun).
(characters)
• date—Date of the month. (Range: 1–31)
• month—Month (first three letters by name, such as Feb). (characters)
• year—year (no abbreviation). (Range: 2000–2097)
• hh:mm—Time (military format) in hours and minutes. (Range:
hh:mmhh: 0-23, mm: 0-59)
• offset—Number of minutes to add during summer time (default is 60).
(Range: 1440)
Default Configuration
Summer time is disabled.
Command Mode
Global Configuration mode
User Guidelines
In both the date and recurring forms of the command, the first part of the
command specifies when summer time begins, and the second part specifies Clock Commands 111
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Clock.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
when it ends. All times are relative to the local time zone. The start time is
relative to standard time. The end time is relative to summer time. If the
starting month is chronologically after the ending month, the system assumes
that you are in the southern hemisphere.
USA rule for daylight saving time:
• From 2007:
• Start: Second Sunday in March
• End: First Sunday in November
• Time: 2 am local time
• Before 2007:
• Start: First Sunday in April
• End: Last Sunday in October
• Time: 2 am local time
Example
console(config)# clock summer-time abc date apr 1 2010 09:00 aug 2 2010
09:00
EU rule for daylight saving time:
• Start: Last Sunday in March
• End: Last Sunday in October
• Time: 1.00 am (01:00) Greenwich Mean Time (GMT)
sntp authentication-key
The sntp authentication-key Global Configuration mode command defines
an authentication key for Simple Network Time Protocol (SNTP). Use the no
form of this command to remove the authentication key for SNTP.
Syntax
sntp authentication-key key-number md5 key-value
no sntp authentication-key key-number112 Clock Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Clock.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Parameters
• key-number—Specifies the key number. (Range: 1–4294967295)
• key-value—Specifies the key value. (Length: 1–8 characters)
Default Configuration
No authentication key is defined.
Command Mode
Global Configuration mode
Examples
The following example defines the authentication key for SNTP.
Console(config)# sntp authentication-key 8 md5 ClkKey
Device(config)# sntp authentication-key 8 md5 ClkKey
Device(config)# sntp trusted-key 8
Device(config)# sntp authenticate
sntp authenticate
The sntp authenticate Global Configuration mode command enables
authentication for received Simple Network Time Protocol (SNTP) traffic
from servers. Use the no form of this command to disable the feature.
Syntax
sntp authenticate
no sntp authenticate
Default Configuration
Authentication is disabled.
Command Mode
Global Configuration modeClock Commands 113
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Clock.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
User Guidelines
The command is relevant for both unicast and broadcast.
Examples
The following example enables authentication for received SNTP traffic.
Console(config)# sntp authenticate
Device(config)# sntp authentication-key 8 md5 ClkKey
Device(config)# sntp trusted-key 8
Device(config)# sntp authenticate
sntp trusted-key
The sntp trusted-key Global Configuration mode command authenticates
the system identity with which Simple Network Time Protocol (SNTP)
synchronizes. Use the no form of this command to disable system identity
authentication.
Syntax
sntp trusted-key key-number
no sntp trusted-key key-number
Parameters
key-number—Specifies the key number of the authentication key to be
trusted. (Range: 1–4294967295)
Default Configuration
No keys are trusted.
Command Mode
Global Configuration mode
User Guidelines
The command is relevant for both received unicast and broadcast.114 Clock Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Clock.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Examples
The following example authenticates key 8.
Console(config)# sntp trusted-key 8
Device(config)# sntp authentication-key 8 md5 ClkKey
Device(config)# sntp trusted-key 8
Device(config)# sntp authenticate
sntp client poll timer
The sntp client poll timer Global Configuration mode command sets the
polling time for the Simple Network Time Protocol (SNTP) client. Use the no
form of this command to restore the default configuration.
Syntax
sntp client poll timer seconds
no sntp client poll timer
Parameters
seconds—Specifies the polling interval in seconds. (Range: 60–86400)
Default Configuration
The default polling interval is 1024 seconds.
Command Mode
Global Configuration mode
Example
The following example sets the polling time for the SNTP client to 120
seconds.
Console(config)# sntp client poll timer 120Clock Commands 115
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Clock.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
sntp broadcast client enable
The sntp broadcast client enable Global Configuration mode command
enables Simple Network Time Protocol (SNTP) broadcast clients. Use the no
form of this command to disable SNTP broadcast clients.
Syntax
sntp broadcast client enable
no sntp broadcast client enable
Default Configuration
The SNTP broadcast client is disabled.
Command Mode
Global Configuration mode
User Guidelines
Use the sntp client enable Interface Configuration mode command to enable
the SNTP client on a specific interface.
Example
The following example enables the SNTP broadcast clients.
s
Console(config)# sntp broadcast client enable
sntp anycast client enable
The sntp anycast client enable Global Configuration mode command
enables the SNTP anycast client. Use the no form of this command to disable
the SNTP anycast client.
Syntax
sntp anycast client enable
no sntp anycast client enable116 Clock Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Clock.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Default Configuration
The SNTP anycast client is disabled.
Command Mode
Global Configuration mode
User Guidelines
The polling time is configured with the sntp client poll timer Global
Configuration mode command.
Use the sntp client enable Interface Configuration mode command to enable
the SNTP client on a specific interface.
Example
The following example enables SNTP anycast clients.
Console(config)# sntp anycast client enable
sntp client enable
The sntp client enable Global Configuration mode command enables the
Simple Network Time Protocol (SNTP) broadcast and anycast client on an
interface. Use the no form of this command to disable the SNTP client.
Syntax
sntp client enable {interface-id}
no sntp client enable {interface-id}
Parameters
interface-id—Specifies an interface ID, which can be one of the following
types: Ethernet port, Port-channel or VLAN.
Default Configuration
The SNTP client is disabled on an interface.
Command Mode
Global Configuration modeClock Commands 117
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Clock.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
User Guidelines
The sntp broadcast client enable Global Configuration mode command
globally enables broadcast clients.
The sntp anycast client enable Global Configuration mode command
globally enables anycast clients.
Example
The following example enables the SNTP broadcast and anycast client on
gigabitethernet port gi1/0/3
Console(config)# sntp client enable gi1/0/3
sntp client enable (Interface)
To enable the Simple Network Time Protocol (SNTP) broadcast and anycast
client on an interface, use the sntp client enable Interface Configuration
command. Use the no form of this command to disable the SNTP client.
The sntp client enable Interface Configuration (Ethernet, Port-channel,
VLAN) mode command enables the Simple Network Time Protocol (SNTP)
broadcast and anycast client on an interface. Use the no form of this
command to disable the SNTP client.
Syntax
sntp client enable
no sntp client enable
Default Configuration
The SNTP client is disabled on an interface.
Command Mode
Interface Configuration (Ethernet, Port-channel, VLAN) mode
User Guidelines
The sntp broadcast client enable Global Configuration mode command
globally enables broadcast clients.118 Clock Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Clock.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
The sntp anycast client enable Global Configuration mode command
globally enables anycast clients.
Example
The following example enables the SNTP broadcast and anycast client on an
interface.
Console(config-if)# sntp client enable
sntp unicast client enable
The sntp unicast client enable Global Configuration mode command
enables the device to use Simple Network Time Protocol (SNTP) predefined
unicast clients. Use the no form of this command to disable the SNTP
unicast clients.
Syntax
sntp unicast client enable
no sntp unicast client enable
Default Configuration
The SNTP unicast client is disabled.
Command Mode
Global Configuration mode
User Guidelines
Use the sntp server Global Configuration mode command to define SNTP
servers.
Example
The following example enables the device to use Simple Network Time
Protocol (SNTP) unicast clients.
Console(config)# sntp unicast client enableClock Commands 119
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Clock.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
sntp unicast client poll
The sntp unicast client poll Global Configuration mode command enables
polling for the Simple Network Time Protocol (SNTP) predefined unicast
clients. Use the no form of this command to disable the polling for the SNTP
client.
Syntax
sntp unicast client poll
no sntp unicast client poll
Default Configuration
Polling is disabled.
Command Mode
Global Configuration mode
User Guidelines
Polling time is configured with the sntp client poll timer Global
Configuration mode command.
Example
The following example enables polling for SNTP predefined unicast clients.
Console(config)# sntp unicast client poll
sntp server
The sntp server Global Configuration mode command configures the device
to use the Simple Network Time Protocol (SNTP) to request and accept
Network Time Protocol (NTP) traffic from a specified server. Use the no form
of this command to remove a server from the list of SNTP servers.
Syntax
sntp server {ipv4-address | ipv6-address | ipv6z-address | hostname} [poll]
[key keyid]120 Clock Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Clock.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
no sntp server {ipv4-address | ipv6-address | ipv6z-address | hostname}
Parameters
• ipv4-address—Specifies the server IPv4 address.
• ipv6-address—Specifies the server IPv6 address. A Link Local address
(IPv6Z address) can be defined.
• pv6z-address—Specifies the IPv6Z address to ping. The IPv6Z address
format is: ipv6-link-local-address}%{interface-name}. The subparameters
are:
• ipv6-link-local-address—Specifies the IPv6 Link Local address.
• interface-name—Specifies the outgoing interface name. The interface
name has the format: vlan {integer} | ch {integer} | isatap {integer}
| {physical-port-name}. The subparameter integer has the format:
{decimal-digit} | {integer}{decimal-digit}. (Range for the decimaldigit: 0–9)
• hostname—Specifies the server hostname. Only translation to IPv4
addresses is supported. (Length: 1–158 characters. Maximum label length:
63 characters)
• poll—Enables polling.
• key keyid—Specifies the Authentication key to use when sending packets
to this peer. (Range:1–4294967295)
Default Configuration
No servers are defined.
Command Mode
Global Configuration mode
User Guidelines
Up to 8 SNTP servers can be defined.
The sntp unicast client enable Global Configuration mode command
enables predefined unicast clients.
The sntp unicast client poll Global Configuration mode command globally
enables polling.Clock Commands 121
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Clock.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Polling time is configured with the sntp client poll timer Global
Configuration mode command.
The format of an IPv6Z address is: %.
interface-name = vlan | ch | isatap |
| 0
integer = |
decimal-number = 0 | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9
physical-port-name = Designated port number, for example:gi1/0/16.
If the egress interface is not specified, the default interface is selected.
Specifying interface zone=0 is equal to not defining an egress interface.
Example
The following example configures the device to accept SNTP traffic from the
server on 192.1.1.1.
Console(config)# sntp server 192.1.1.1
sntp port
The sntp port Global Configuration mode command specifies a Simple
Network Time Protocol (SNTP) User Datagram Protocol (UDP) port. Use
the no form of this command to use the SNTP server default port.
Syntax
sntp port port-number
no sntp port
Parameters
port-number—Specifies the UDP port number used by an SNTP server.
(Range 1–65535)
Default Configuration
The default port number is 123.122 Clock Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Clock.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Command Mode
Global Configuration mode
Example
The following example specifies that port 321 of the SNTP server is the UDP
port.
Console(config)# sntp port 321
show clock
The show clock EXEC mode command displays the time and date from the
system clock.
Syntax
show clock [detail]
Parameters
detail—Displays the TimeZone and SummerTime configuration.
Command Mode
EXEC mode
Example
The following example displays the system time and date.
Console> show clock
15:29:03 PDT(UTC-7) Jun 17 2002
Time source is SNTP
Console> show clock detail
15:29:03 PDT(UTC-7) Jun 17 2002
Time source is SNTP
Time zone:Clock Commands 123
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Clock.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Acronym is PST
Offset is UTC-8
Summertime:
Acronym is PDT
Recurring every year.
Begins at first Sunday of April at 2:00.
Ends at last Sunday of October at 2:00.
Offset is 60 minutes.
DHCP timezone: Disabled
Device> show clock detail
15:29:03 PDT(UTC-7) Jun 17 2002
Time source is SNTP
Timezone (DHCP):
Acronym is PST
Offset is UTC-8
Timezone (static):
Acronym is PST
Offset is UTC-8
Summertime (Static):
Acronym is PDT
Recurring every year.
Begins at first Sunday of April at 2:00.
Ends at last Sunday of October at 2:00.
Offset is 60 minutes.
DHCP timezone: Enabled124 Clock Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Clock.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
show sntp configuration
The show sntp configuration Privileged EXEC mode command displays the
Simple Network Time Protocol (SNTP) configuration on the device.
Syntax
show sntp configuration
Command Mode
Privileged EXEC mode
Example
The following example displays the device’s current SNTP configuration.
console# show sntp configuration
SNTP port : 123 .
Polling interval: 1024 seconds.
No MD5 authentication keys.
Authentication is not required for synchronization.
No trusted keys.
Unicast Clients: Enabled
Unicast Clients Polling: Enabled
Server Polling Encryption Key
----------------------------- ---------- --------------
1.1.1.121 Disabled Disabled
Broadcast Clients: disabled
Anycast Clients: disabled
No Broadcast Interfaces.
console#
show sntp status
The show sntp status Privileged EXEC mode command displays the Simple
Network Time Protocol (SNTP) servers status.Clock Commands 125
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Clock.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Syntax
show sntp status
Command Mode
Privileged EXEC mode
Example
The following examples display the SNTP servers status.
Device# show sntp status
Clock is synchronized, stratum 4, reference is 176.1.1.8, unicast
Reference time is AFE2525E.70597B34 (00:10:22.438 PDT Jul 5 1993)
Console# show sntp status
Clock is synchronized, stratum 4, reference is 176.1.1.8, unicast
Reference time is AFE2525E.70597B34 (00:10:22.438 PDT Jul 5 1993)
Unicast servers:
Server
--------
176.1.1.8
Status
-------
Up
Last response
---------------------
19:58:22.289
PDT Feb 19 2005
Offset
[mSec]
-----
7.33
Delay
[mSec]
------
117.79
176.1.8.17 Unknown 12:17.17.987
PDT Feb 19 2005
8.98 189.19
Anycast server:
Server
--------
176.1.11.8
Interface
-------
VLAN 118
Status
-----
Up
Last response
-------------
9:53:21.789
PDT Feb 19
2005
Offset
[mSec]
-----
7.19
Delay
[mSec]
------
119.89
Broadcast:
Server
---------
176.9.1.1
Interface
---------
VLAN 119
Last response
----------------------------
19:17:59.792
PDT Feb 19 2002126 Clock Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Clock.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LYConfiguration/Image File Commands 127
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Configuration_Image.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
6
Configuration/Image File
Commands
copy
The copy Privileged EXEC mode command copies files from a source to a
destination.
Syntax
copy source-url destination-url [snmp]
Parameters
• source-url—Specifies the source file location URL or source file reserved
keyword to be copied. (Length: 1–160 characters)
• destination-url—Specifies the destination file URL or destination file
reserved keyword. (Length: 1–160 characters)
• snmp—Specifies that the destination/source file is in SNMP format. Used
only when copying from/to startup-config.
The following table displays URL options.
Keyword Source or Destination
flash:// Source or destination URL for flash memory. This is the default URL If
a URL is specified without a prefix.
running-config Currently running configuration file.
startup-config Startup configuration file.
image Image file. If specified as the source file, it is the active image file. If
specified as the destination file, it is the non-active image file.128 Configuration/Image File Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Configuration_Image.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Command Mode
Privileged EXEC mode
User Guidelines
The location of a file system dictates the format of the source or destination
URL.
The entire copying process may take several minutes and differs from
protocol to protocol and from network to network.
If the IPv6 address is a Link Local address (IPv6Z address), the outgoing
interface name must be specified. The format of an IPv6Z address is: {ipv6-
link-local-address}%{interface-name}. The subparameters are:
• ipv6-link-local-address—Specifies the IPv6 Link Local address.
boot Boot file.
tftp:// Source or destination URL for a TFTP network server. The syntax for
this alias is tftp://host/[directory]/filename. The host can be either an IP
address or a host name.
usb:// Copy to a file on the USB device. The syntax is:
usb://directory/filename
xmodem: Source for the file from a serial connection that uses the Xmodem
protocol.
unit://member/i
mage
Image file on one of the units. To copy from the master to all units,
specify * in the member field.
unit://member/
boot
Boot file on one of the units. To copy from the master to all units,
specify * in the member field
unit://member/
startup-config
Configuration file used during initialization (startup) on one of the units.
null: Null destination for copies or files. A remote file can be copied to null to
determine its size.
mirror-config Mirrored configuration file
WORD<1-128> Specify URL prefixes.
Keyword Source or DestinationConfiguration/Image File Commands 129
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Configuration_Image.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
• interface-name—Specifies the outgoing interface name. The interface
name has the format: vlan{integer} | ch{integer} | isatap{integer} |
{physical-port-name}.The subparameter integer has the format: {decimaldigit} | {integer}{decimal-digit}. decimal-digit has the range 0–9
If the egress interface is not specified, the default interface is selected.
Specifying interface zone=0 is equal to not defining an egress interface.
Understanding Invalid Combinations of Source and Destination
Some invalid combinations of source and destination exist. Specifically, if one
of the following conditions exists:
• The source file and destination file are the same file.
• xmodem: is the destination file. The source file can be copied to image,
boot and null: only.
• tftp:// is the source file and destination file on the same copy.
• *.prv files cannot be copied.
• The source or destination is a slave unit (except for image and boot files).
mirror-config cannot be used as a destination
The following table describes the copy characters:
Copying an Image File from a Server to Flash Memory
Use the copy source-url image command to copy an image file from a server
to flash memory.
Copying a Boot File from a Server to Flash Memory
Use the copy source-url boot command to copy a boot file from a server to
flash memory.
Copying a Configuration File from a Server to the Running Configuration
File
Character Description
! For network transfers, indicates that the copy process is taking place.
Each exclamation point indicates successful transfer of ten packets (512
bytes each).
. For network transfers, indicates that the copy process timed out.
Generally, several periods in a row means that the copy process may fail.s130 Configuration/Image File Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Configuration_Image.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Use the copy source-url running-config command to load a configuration file
from a network server to the running device configuration file. The
commands in the loaded configuration file are added to those in the running
configuration file as if the commands were typed in the command-line
interface (CLI). The resulting configuration file is a combination of the
previous running configuration and the loaded configuration files, with the
loaded configuration file taking precedence.
Copying a Configuration File from a Server to the Startup Configuration
Use the copy source-url startup-config command to copy a configuration file
from a network server to the device startup configuration file. The startup
configuration file is replaced by the copied configuration file.
Storing the Running or Startup Configuration on a Server
Use the copy running-config destination-url command to copy the current
configuration file to a network server using TFTP, .
Use the copy startup-config destination-url command to copy the startup
configuration file to a network server.
Saving The Running Configuration To The Startup Configuration
Use the copy running-config startup-config command to copy the running
configuration to the startup configuration file.
-Backing Up the Running Configuration or Startup Configuration to a
Backup Configuration file
Use the copy running-config file command to back up the running
configuration to a backup configuration file.
Use the copy startup-config file command to back up the startup
configuration to a backup configuration file.
Examples
The following example copies system image file1 from the TFTP server
172.16.101.101 to a non-active image file.
Console# copy tftp://172.16.101.101/file1 image
Accessing file 'file1' on 172.16.101.101...Configuration/Image File Commands 131
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Configuration_Image.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Loading file1 from 172.16.101.101:
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! [OK]
Copy took 0:01:11 [hh:mm:ss]
Copying an Image from a Server to Flash Memory
The following example copies a system image named file1 from the TFTP
server with an IP address of 172.16.101.101 to a non-active image file.
Router# copy tftp://172.16.101.101/file1 image
Accessing file 'file1' on 172.16.101.101...
Loading file1 from 172.16.101.101:
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!! [OK]
Copy took 0:01:11 [hh:mm:ss]132 Configuration/Image File Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Configuration_Image.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
write memory
Use the write memory Privileged EXEC mode command to save the running
configuration to the startup configuration file.
Syntax
write memory
Parameters
This command has no arguments or keywords.
Command Mode
Privileged EXEC mode
Examples
The following example copies system image file1 from the TFTP server
172.16.101.101 to a non-active image file.
Console# write memory
Overwrite file [startup-config] ?[Yes/press any key for no]....15-Sep-2010
11:27
:48 %COPY-I-FILECPY: Files Copy - source URL running-config destination
URL flas
h://startup-config
15-Sep-2010 11:27:50 %COPY-N-TRAP: The copy operation was completed
successfully
Copy succeeded
delete
The delete Privileged EXEC mode command deletes a file from a flash
memory device.
Syntax
delete urlConfiguration/Image File Commands 133
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Configuration_Image.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Parameters
url—Specifies the location URL or reserved keyword of the file to be deleted.
(Length: 1–160 characters)
The following table displays keywords and URL prefixes:
Command Mode
Privileged EXEC mode
User Guidelines
*.sys, *.prv, image-1 and image-2 files cannot be deleted.
Example
The following example deletes the file called ‘test’ from the flash memory.
Console# delete flash:test
Delete flash:test? [confirm]
pwd
Use the pwd Privileged EXECmode command to display a full, clarified path
to the current directory.
Parameters
This command has no arguments or keywords.
Command Mode
EXEC mode
Keyword Source or Destination
flash:// URL of the flash memory. This is the default URL if a
URL is specified without a prefix.
usb:// URL of the USB memory.
startup-config Startup configuration file.
WORD Specify URL prefixes.134 Configuration/Image File Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Configuration_Image.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
dir
The dir Privileged EXEC mode command displays the list of files on a flash
file system.
Syntax
dir
dir [directory-path]
Command Mode
Privileged EXEC mode
Example
The following example displays the list of files on a flash file system
Total size of flash: 33292288 bytes
Free size of flash: 20708893 bytes
console# dir
Directory of flash:
File Name Permission Size Data Size Modified
Flash
------------------- ---------- ---------- --------------------
tmp rw 524288 104 01-Jan-2010 05:35:04
image-1 rw 10485760 10485760 01-Jan-2010 06:10:23
image-2 rw 10485760 10485760 01-Jan-2010 05:43:54
dhcpsn.prv -- 262144 -- 01-Jan-2010 05:25:07
sshkeys.prv -- 262144 -- 04-Jan-2010 06:05:00
syslog1.sys r- 524288 -- 01-Jan-2010 05:57:00
syslog2.sys r- 524288 -- 01-Jan-2010 05:57:00
directry.prv -- 262144 -- 01-Jan-2010 05:25:07
startup-config rw 786432 1081 01-Jan-2010 10:05:34
Total size of flash: 66322432 bytes
Free size of flash: 42205184 bytesConfiguration/Image File Commands 135
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Configuration_Image.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
console#
more
The more Privileged EXEC mode command displays a file.
Syntax
more url
Parameters
url—Specifies the location URL or reserved keyword of the source file to be
displayed. (Length: 1–160 characters).
The following table displays options for the URL parameter:
Command Mode
Privileged EXEC mode
User Guidelines
Files are displayed in ASCII format, except for the images, which are
displayed in a hexadecimal format.
*.prv files cannot be displayed.
Example
The following example displays the running configuration file contents.
Keyword Source or Destination
flash:// Source or destination URL for flash memory. If a
URL is specified without a prefix, this is the default
URL.
running-config Current running configuration file.
startup-config Startup configuration file.
mirror-config Mirrored configuration file.
usb: Universal Serial Bus (USB) File System136 Configuration/Image File Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Configuration_Image.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
console# more running-config
no spanning-tree
interface range gi1/0/1-48
speed 1000
exit
no lldp run
line console
exec-timeout 0
exit
cd
Use the cd Privileged EXEC mode command to change the current directory.
cd new-directory
Parameters
new-directory—The new directory. The new directory path may be specificed as
either a Full Clarified Path or a Relative Path.
Command Mode
Privileged EXEC mode
User Guidelines
When command cd changes the current file system, the current directory of
the previous file system is saved and when the command specifying only the
file system (for example, cd usb:) sets the file system as current, the current
directory is restored.
Example
console cd usb://private/conf
console pwd
usb://private/conf
console cd ..
console pwd
usb://private
console# cd flash:Configuration/Image File Commands 137
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Configuration_Image.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
console pwd
flash://
console cd usb:
console pwd
usb://private
console# cd flash://
console pwd
flash:\\
console cd usb://
console pwd
usb://
rename
The rename Privileged EXEC mode command renames a file.
Syntax
rename url new-url
Parameters
• url—Specifies the file location URL. (Length: 1–160 characters)
• new-url—Specifies the file’s new URL. (Length: 1–160 characters)
The following table displays options for the URL parameter:
Command Mode
Privileged EXEC mode
User Guidelines
*.sys and *.prv files cannot be renamed.
Keyword Source or Destination
flash:// URL for flash memory. If a URL is specified without a
prefix, this is the default URL.
usb: Universal Serial Bus (USB) File System
WORD Specify URL prefixes.138 Configuration/Image File Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Configuration_Image.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
The following example renames the configuration file.
Console# rename configuration.bak m-config.bak
boot system
The boot system Privileged EXEC mode command specifies the active
system image file that is loaded by the device at startup.
Syntax
boot system { image-1 | image-2 } [switch number | all]
Parameters
• switch number—Specifies the unit number. If unspecified, defaults to the
master unit number.
• image-1—Specifies that image-1 is loaded as the system image during the
next device startup.
• image-2—Specifies that image-2 is loaded as the system image during the
next device startup.
Default Configuration
This command has no default configuration.
The default unit number is the master unit number.
Command Mode
Privileged EXEC mode
User Guidelines
Use the show bootvar command to determine which image is the active
image.Configuration/Image File Commands 139
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Configuration_Image.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
The following example specifies that image-1 is the active system image file
loaded by the device at startup.
Console# boot system image-1
show running-config
The show running-config Privileged EXEC mode command displays the
current running configuration file contents.
Syntax
show running-config
Parameters
This command has no arguments or keywords.
Command Mode
Privileged EXEC mode
Example
The following example displays the running configuration file contents.
Console# show running-config
no spanning-tree
interface range gi1/0/1-48
speed 1000
exit
no lldp run
interface vlan 1
ip address 1.1.1.1 255.0.0.0
exit
line console
exec-timeout 0
exit
console#140 Configuration/Image File Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Configuration_Image.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
show startup-config
The show startup-config Privileged EXEC mode command displays the
startup configuration file contents.
Syntax
show startup-config
Command Mode
Privileged EXEC mode
Example
The following example displays the startup configuration file contents.
Console# show startup-config
no spanning-tree
interface range gi1/0/1-48
speed 1000
exit
no lldp run
interface vlan 1
ip address 1.1.1.1 255.0.0.0
exit
line console
exec-timeout 0
exit
console#
show bootvar
The show bootvar EXEC mode command displays the active system image
file that is loaded by the device at startup.
Syntax
show bootvar [unit unit]Configuration/Image File Commands 141
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Configuration_Image.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Parameters
unit unit—Specifies the unit number.
Command Mode
EXEC mode
Example
The following example displays the active system image file that is loaded by
the device at startup.
Console# show bootvar
Unit
----
1
Image
-----
1
Filename
--------
file1
Version
-------
3.1.31
Date
--------------------
23-Jul-2002
17:34:19
Status
-----------
Active
1 2 file2 3.2.19 22-Jan-2003
19:22:32
Not
active*
2 1 file1 3.1.31 23-Jul-2002
17:34:19
Not active
2 2 file2 3.2.19 22-Jan-2003
19:22:32
Active
"*": Designates that the image was selected for the next boot.142 Configuration/Image File Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Configuration_Image.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LYAuto-Update and Auto-Configuration 143
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Auto-Update.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
7
Auto-Update and AutoConfiguration
boot host auto-config
Use the boot host auto-config Global Configuration mode command to
enable the support of auto configuration via DHCP. Use the no form of this
command to disable DHCP auto configuration.
Syntax
boot host auto-config
no boot host auto-config
Parameters
This command has no arguments or key words.
Command Mode
Global Configuration mode
Default Configuration
Enabled by default.
boot host auto-update
Use the boot host auto-update Global Configuration mode command to
enable the support of auto updated via DHCP. Use the no form of this
command to disable DHCP auto configuration.144 Auto-Update and Auto-Configuration
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Auto-Update.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Syntax
boot host auto-update
no boot host auto-update
Parameters
This command has no arguments or key words.
Command Mode
Global Configuration mode
Default Configuration
Enabled by default.
boot host dhcp
Use the boot host dhcp Global Configuration mode command to force the
mechanism used to download a configuration file at the next system startup.
Use the no form of this command to restore the host configuration file to the
default.
Syntax
boot host dhcp
no boot host dhcp
Parameters
This command has no arguments or key words.
Command Mode
Global Configuration mode
User Guidelines
Configuring boot host dhcp does not take effect until the next reboot.Auto-Update and Auto-Configuration 145
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Auto-Update.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
boot host auto-save
Use the boot host auto-save Global Configuration mode command to enable
automatic saving Running in Startup after download. Use the no form of this
command restore default behavior.
Syntax
boot host auto-save
no boot host auto-save
Parameters
This command has no arguments or key words.
Command Mode
Global Configuration mode
Default Configuration
Disable
show boot
Use the show boot Privilege EXEC mode command to show the status of the
IP DHCP Auto Config process.
Syntax
show boot
Parameters
This command has no keywords or arguments.
Command Mode
Privilege EXEC mode
Examples
console# show boot146 Auto-Update and Auto-Configuration
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Auto-Update.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Auto Config
-----------
Config Download via DHCP: enable
Next Boot Config Download via DHCP: force
Auto Config State: Finished
TFTP Server IP address: 1.2.20.2
Configuration filename: /config/configfile1.cfg
Auto Update
-----------
Image Download via DHCP: enabled
console# show boot
Auto Config
-----------
Config Download via DHCP: enable
Next Boot Config Download via DHCP: default
Auto Config State: Opening -config file
Auto Update
-------------
Image Download via DHCP: enabled
Example 3.
console# show boot
Auto Config
-----------
Config Download via DHCP: enable
Next Boot Config Download via DHCP: default
Auto Config State: Downloading configuration file
Auto Update
-----------Auto-Update and Auto-Configuration 147
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Auto-Update.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Image Download via DHCP: enabled
console# show boot
Auto Config
-----------
Config Download via DHCP: enable
Next Boot Config Download via DHCP: default
Auto Config State: Searching hostname in indirect configuration file
Auto Update
-----------
Image Download via DHCP: enabled
console# show boot
Auto Config
-----------
Config Download via DHCP: enable
Next Boot Config Download via DHCP: default
Auto Config State: Quit – failed all steps of finding existing
configuration file
Auto Update
-----------
Image Download via DHCP: enabled
console# show boot
Auto Config
-----------
Config Download via DHCP: enable
Next Boot Config Download via DHCP: default
Auto Update
-----------
Image Download via DHCP: enabled
Auto Update State: Downloaded indirect image file148 Auto-Update and Auto-Configuration
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Auto-Update.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
console# show boot
Auto Config
-----------
Config Download via DHCP: enable
Next Boot Config Download via DHCP: default
Auto Update
-----------
Image Download via DHCP: enabled
Auto Update State: Downloading image file
console# show boot
Auto Config
-----------
Config Download via DHCP: enable
Next Boot Config Download via DHCP: default
Auto Config State: Finished
TFTP Server IP address: 1.2.20.2
Configuration filename: /config/configfile1.cfg
Auto Update
-----------
Image Download via DHCP: enabled
Auto Update State: Downloading image file
ip dhcp tftp-server ip addr
Use the ip dhcp tftp-server ip addr Global Configuration mode command to
set the TFTP server’s IP address, used by a switch when it has not been
received from the DHCP server. Use the no form of this command to remove
the address.
Syntax
ip dhcp tftp-server ip addr ip-addr
no ip dhcp tftp-server ip-addrAuto-Update and Auto-Configuration 149
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Auto-Update.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Parameters
ip-addr IP—Address of TFTP server
Default Configuration
No IP address
Command Mode
Global Configuration mode
ip dhcp tftp-server file
Use the ip dhcp tftp-server file Global Configuration mode command to set
the full file name on the TFTP server by a switch when it has not been
received from the DHCP server. Use the no form of this command to remove
the name.
Syntax
ip dhcp tftp-server file file-path
no ip dhcp tftp-server file
Parameters
file-path—full file name on TFTP server
Default Configuration
No file name
Command Mode
Global Configuration mode
show ip dhcp tftp-server
Use the show ip dhcp tftp-server EXEC mode command to display
information about the TFTP server.
Syntax
show ip dhcp tftp-server150 Auto-Update and Auto-Configuration
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Auto-Update.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Command Mode
EXEC
Example
console# show ip dhcp tftp server
tftp server address
active 1.1.1.1 from sname
manual 2.2.2.2
file path on tftp server
active conf/conf-file from option 67Management ACL Commands 151
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Management_ACL.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
8
Management ACL Commands
management access-list
The management access-list Global Configuration mode command
configures a management access list and enters the Management Access-List
Configuration command mode. Use the no form of this command to delete
an access list.
Syntax
management access-list name
no management access-list name
Parameters
name—Specifies the access list name. (Length: 1–32 characters)
Command Mode
Global Configuration mode
User Guidelines
Use this command to configure a management access list. This command
enters the Management Access-List Configuration mode, where the denied
or permitted access conditions are defined with the deny and permit
commands.
If no match criteria are defined, the default value is deny.
When re-entering the access-list context, the new rules are entered at the end
of the access list.
Use the management access-class command to select the active access list.
The active management list cannot be updated or removed.152 Management ACL Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Management_ACL.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
For IPv6 management traffic that is tunneled in IPv4 packets, the
management ACL is applied first on the external IPv4 header (rules with
service field are ignored), and then again on the inner IPv6 header.
Example
The following example creates a management access list called mlist,
configures management gigabitethernet interfaces 1/0/1 and 1/0/9, and
makes the new access list the active list.
Console(config)# management access-list mlist
Console(config-macl)# permit gi1/0/1
Console(config-macl)# permit gi1/0/9
Console(config-macl)# exit
Console(config)# management access-class mlist
The following example creates a management access list called ‘mlist’,
configures all interfaces to be management interfaces except
gigabitethernet interfaces 1/0/1 and 1/0/9, and makes the new
access list the active list.
Console(config)# management access-list mlist
Console(config-macl)# deny gi1/0/1
Console(config-macl)# deny gi1/0/9
Console(config-macl)# permit
Console(config-macl)# exit
Console(config)# management access-class mlist
permit (Management)
The permit Management Access-List Configuration mode command sets
conditions for the management access list.
Syntax
permit [interface-id] [service service]
permit ip-source {ipv4-address | ipv6-address/ipv6-prefix-length} [mask
{mask | prefix-length}] [interface-id] [service service]Management ACL Commands 153
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Management_ACL.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Parameters
• interface-id:—Specify an interface ID. The interface ID can be one of the
following types: Ethernet port, Port-channel or VLAN
• service service — Specifies the service type. Possible values are: Telnet,
SSH, HTTP, HTTPS and SNMP.
• ipv4-address— Specifies the source IPv4 address.
• ipv6-address/ipv6-prefix-length— Specifies the source IPv6 address and
source IPv6 address prefix length. The prefix length must be preceded by a
forward slash (/). The parameter is optional.
• mask mask — Specifies the source IPv4 address network mask. This
parameter is relevant only to IPv4 addresses.
• mask prefix-length — Specifies the number of bits that comprise the
source IPv4 address prefix. The prefix length must be preceded by a
forward slash (/). This parameter is relevant only to IPv4 addresses. (Range:
0–32)
Command Mode
Management Access-List Configuration mode
User Guidelines
Rules with ethernet, VLAN, and port-channel parameters are valid only if an
IP address is defined on the appropriate interface.
Example
The following example permits all ports in the access list called mlist
Console(config)# management access-list mlist
Console(config-macl)# permit
deny (Management)
The deny Management Access-List Configuration mode command sets
conditions for the management access list.154 Management ACL Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Management_ACL.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Syntax
deny [interface-id] [service service]
deny ip-source {ipv4-address | ipv6-address/ipv6-prefix-length} [mask {mask
| prefix-length}] [interface-id] [service service]
Parameters
• interface-id—Specifies an interface ID. The interface ID can be one of the
following types: Ethernet port, Port-channel or VLAN
• service service—Specifies the service type. Possible values are: Telnet,
SSH, HTTP, HTTPS and SNMP.
• ipv4-address—Specifies the source IPv4 address.
• ipv6-address/ipv6-prefix-length—Specifies the source IPv6 address and
source IPv6 address prefix length. The prefix length must be preceded by a
forward slash (/). The parameter is optional.
• mask mask—Specifies the source IPv4 address network mask. The
parameter is relevant only to IPv4 addresses.
• mask prefix-length—Specifies the number of bits that comprise the source
IPv4 address prefix. The prefix length must be preceded by a forward slash
(/). The parameter is relevant only to IPv4 addresses. (Range: 0–32)
Command Mode
Management Access-List Configuration mode
User Guidelines
Rules with ethernet, VLAN, and port-channel parameters are valid only if an
IP address is defined on the appropriate interface.
Example
The following example denies all ports in the access list called mlist.
Console(config)# management access-list mlist
Console(config-macl)# denyManagement ACL Commands 155
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Management_ACL.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
management access-class
The management access-class Global Configuration mode command restricts
management connections by defining the active management access list. To
disable management connection restrictions, use the no form of this
command.
Syntax
management access-class {console-only | name}
no management access-class
Parameters
• console-only—Specifies that the device can be managed only from the
console.
• name—Specifies the access list name to be used. (Length: 1–32
characters)
Default Configuration
The default configuration is no management connection restrictions.
Command Mode
Global Configuration mode
Example
The following example defines an access list called mlist as the active
management access list.
Console(config)# management access-class mlist
show management access-list
The show management access-list Privileged EXEC mode command displays
management access lists.
Syntax
show management access-list [name]156 Management ACL Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Management_ACL.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Parameters
name—Specifies the name of a management access list to be displayed.
(Length: 1–32 characters)
Command Mode
Privileged EXEC mode
Example
The following example displays the mlist management access list.
Console# show management access-list mlist
console-only
------------
deny
! (Note: all other access implicitly denied)
mlist
-----
permit gi1/0/1
permit gi1/0/9
! (Note: all other access implicitly denied)
console#
show management access-class
The show management access-class Privileged EXEC mode command
displays information about the active management access list.
Syntax
show management access-class
Command Mode
Privileged EXEC modeManagement ACL Commands 157
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Management_ACL.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
The following example displays the active management access list
information.
Console# show management access-class
Management access-class is enabled, using access list mlist158 Management ACL Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Management_ACL.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LYSNMP Commands 159
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\SNMP.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
9
SNMP Commands
snmp-server
Use the snmp-server server Global Configuration mode command to enable
the device to be configured by SNMP. Use the no form of this command to
disable this function.
Syntax
snmp-server server
no snmp-server server
Parameters
This command has no arguments or keywords.
Default
Enabled
Command Mode
Global Configuration mode
Example
snmp-server server
======================
console(config)# snmp-server server
snmp-server community
Use the snmp-server community Global Configuration mode command to
set up the community access string to permit access to the Simple Network 160 SNMP Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\SNMP.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Management Protocol command. Use the no form of this command to
remove the specified community string.
Syntax
snmp-server community string [view view-name] [ro | rw | su] {ipv4-
address| ipv6-address} [mask | prefix-length] [type router | oob]
snmp-server community-group string group-name [ipv4-address| ipv6-
address] [mask | prefix-length] [type router | oob]
no snmp-server community string [ipv4-address| ipv6-address]
Parameters
• string—Community string that acts like a password and permits access to
the SNMP protocol. (Range: 1–20 characters)
• ro—Specifies read-only access (default)
• rw—Specifies read-write access
• su—Specifies SNMP administrator access
• view view-name—Specifies the name of a view to be configured using the
command snmp-server view (no specific order of the command
configurations is imposed on the user). The view defines the objects
available to the community. It is not relevant for su, which has access to
the whole MIB. If unspecified, all the objects, except the community-table
and SNMPv3 user and access tables, are available. (Range: 1–30
characters)
• ipv4-address—Management station IPv4 address. The default is all IP
addresses.
• ipv6-address—Management station IPv4 address. The default is all IP
addresses.
• mask—Specifies the mask of the IPv4 address. This is not a network mask,
but rather a mask that defines which bits of the packet’s source address are
compared to the configured IP address. If unspecified, it defaults to
255.255.255.255. The command returns an error if the mask is specified
without an IPv4 address.
• prefix-length—Specifies the number of bits that comprise the IPv4
address prefix. If unspecified, it defaults to 32. The command returns an
error if the prefix-length is specified without an IPv4 address.SNMP Commands 161
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\SNMP.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
• group-name—Specifies the name of a group that should be configured
using the command snmp-server group with v1 or v2 parameter (no
specific order of the two command configurations is imposed on the user).
The group defines the objects available to the community. (Range: 1–30
characters)
• type router—Specifies that SNMP requests for duplicate tables configure
the router tables. This is the default.
• type oob—Specifies that SNMP requests for duplicate tables configure the
oob tables.
Default
No community is defined
Command Mode
Global Configuration mode
User Guidelines
You can’t specify view-name for su, which has access to the whole MIB.
You can use the view-name to restrict the access rights of a community string.
The logical key of the command is the pair (community, ip-address). If ipaddress is omitted then the key is (community, All-Ips).
By specifying the view-name parameter, the software:
• Generates an internal security-name.
• Maps the internal security-name for SNMPv1 and SNMPv2 security
models to an internal group-name.
• Maps the internal group-name for SNMPv1 and SNMPv2 security models
to view-name (read-view and notify-view always, and for rw for write-view
also),
You can use the group-name to restrict the access rights of a community
string. By specifying the group-name parameter the software:
• Generates an internal security-name.
• Maps the internal security-name for SNMPv1 and SNMPv2 security
models to the group-name.162 SNMP Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\SNMP.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
The snmp-server community-group command and snmp-server user
command for v1 and v2 are equivalent. You should use the snmp-server
community-group command when you want to configure the ipv4-address|
ipv6-address management addresses.
The Type keyword is used for a different purpose. Therefore, when defining
an SNMP community, the administrator must indicate which tables are being
configured. If Type is router, it means that the device's tables are being
configured.
Example
snmp-server community
==========================
console(config)# snmp-server community abcd su 1.1.1.121 mask 255.0.0.0
console(config)# snmp-server community-group tom abcd 1.1.1.122 prefix 8
snmp-server view
The snmp-server view Global Configuration mode command creates or
updates a Simple Network Management Protocol (SNMP) server view entry.
Use the no form of this command to remove an SNMP server view entry.
Syntax
snmp-server view view-name oid-tree {included | excluded}
no snmp-server view view-name [oid-tree]
Parameters
• view-name—Specifies the label for the view record that is being created or
updated. The name is used to reference the record. (Length: 1–30
characters)
• oid-tree—Specifies the ASN.1 subtree object identifier to be included or
excluded from the view. To identify the subtree, specify a text string
consisting of numbers, such as 1.3.6.2.4, or a word, such as System.
Replace a single sub-identifier with the asterisk (*) wildcard to specify a
subtree family; for example 1.3.*.4.
• included—Specifies that the view type is included.SNMP Commands 163
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\SNMP.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
• excluded—Specifies that the view type is excluded.
Default Configuration
Default and DefaultSuper are the default view names.
Command Mode
Global Configuration mode
User Guidelines
This command can be entered multiple times for the same view record.
The command logical key is the pair (view-name, oid-tree).
The number of views is limited to 64.
Default and DefaultSuper views are reserved for internal software use and
cannot be deleted or modified.
Example
The following example creates a view that includes all objects in the MIB-II
system group except for sysServices (System 7) and all objects for interface 1
in the MIB-II interface group.
Console(config)# snmp-server view user-view system included
Console(config)# snmp-server view user-view system.7 excluded
Console(config)# snmp-server view user-view ifEntry.*.1
included
snmp-server group
The snmp-server group Global Configuration mode command configures a
new Simple Network Management Protocol (SNMP) group or a table that
maps SNMP users to SNMP views. Use the no form of this command, remove
a specified SNMP group.
Syntax
snmp-server group groupname {v1 | v2 | v3 {noauth | auth | priv} [notify
notifyview]} [read readview] [write writeview]164 SNMP Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\SNMP.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
no snmp-server group groupname {v1 | v2 | v3 [noauth | auth | priv]}
[context name]
Parameters
• groupname—Specifies the group name. (Length: 1–30 characters)
• v1—Specifies the SNMP Version 1 security model.
• v2—Specifies the SNMP Version 2 security model.
• v3—Specifies the SNMP Version 3 security model.
• noauth—Specifies no packet authentication. Applicable only to the SNMP
Version 3 security model.
• auth—Specifies packet authentication without encryption. Applicable
only to the SNMP Version 3 security model.
• priv—Specifies packet authentication with encryption. Applicable only to
the SNMP Version 3 security model.
• notify notifyview—Specifies the view name that enables specifying an
inform or a trap. Applicable only to the SNMP Version 3 security model.
(Length: 1–30 characters)
• read readview—Specifies the view name that enables viewing only the
agent contents. (Length: 1–30 characters)
• write writeview—Specifies the view name that enables entering data and
configuring the agent contents. (Length: 1–30 characters)
Default Configuration
No group entry exists.
If notifyview is not specified, nothing is defined for the notify view.
If readview is not specified, all objects except for the community-table and
SNMPv3 user and access tables are available.
If writeview is not specified, nothing is defined for the write view.
Command Mode
Global Configuration modeSNMP Commands 165
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\SNMP.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
User Guidelines
The command logical key is (groupname, snmp-version, security-level). For
snmp-version v1/v2 the security-level is always noauth.
The Router context is translated to "" context in the MIB.
Example
The following example attaches a group called user-group to SNMPv3 and
assigns to the group the privacy security level and read access rights to a view
called user-view.
Console(config)# snmp-server group user-group v3 priv read userview
snmp-server user
Use the snmp-server user Global Configuration mode command to configure
a new SNMP Version 3 user. Use the no form of the command to remove a
user.
Syntax
snmp-server user username groupname {v1 | v2c | [remote host] v3
[encrypted] [auth {md5 | sha} auth-password]}
no snmp-server user username [remote host]
Parameters
• username—The name of the user on the host that connects to the agent.
(Range: Up to 20 characters)
• groupname—The name of the group to which the user belongs. The group
should be configured using the command snmp-server group with v3
parameters (no specific order of the 2 command configurations is imposed
on the user). (Range: Up to 30 characters)
• remote host—IP address of the remote SNMP host.
• v1—Specifies that v1 is to be used.
• v2c—Specifies that v2c is to be used.166 SNMP Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\SNMP.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
• v3—Specifies that v3 is to be used.
• encrypted—Specifies whether the password appears in encrypted format.
• auth—Specifies which authentication level is to be used.
• md5—Specifies the HMAC-MD5-96 authentication level.
• Sha—Specifies the HMAC-SHA-96 authentication level.
• auth-password—Specifies the authentication password.
Parameters Range engineid-string5 - 32 characters.
auth-passwordUp to 32 characters.
Default
No group entry exists.
Command Mode
Global configuration
User Guidelines
If auth md5 or auth sha is specified, both authentication and privacy are
enabled for the user.
When you enter a show running-config command, you do not see a line for
this user. To see if this user has been added to the configuration, type the
show snmp user command.
An SNMP EngineID should be defined in order to add users to the device.
Changing or removing the value of snmpEngineID deletes the SNMPv3
users’ database.
The logical key of the command is Username.
Configuring a remote host is required in order to send informs to that host. A
configured remote host is also able to manage the device (besides getting the
informs)
To configure a remote user, specify the IP address for the remote SNMP agent
of the device where the user resides. Also, before you configure remote users
for a particular agent, configure the SNMP engine ID, using the snmp-server
engineID remote command. The remote agent's SNMP engine ID is needed
when computing the authentication and privacy digests from the password. If SNMP Commands 167
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\SNMP.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
the remote engine ID is not configured first, the configuration command
fails.
Example
snmp-server user
====================
console(config)# snmp-server user tom acbd v1
console(config)# snmp-server user tom acbd v2c
console(config)# snmp-server engineid local default
The engine-id must be unique within your administrative domain.
Do you wish to continue? [Y/N]
y
The SNMPv3 database will be erased. Do you wish to continue? [Y/N]
y
console(config)# snmp-server user tom acbd v3
snmp-server filter
The snmp-server filter Global Configuration mode command creates or
updates a Simple Network Management Protocol (SNMP) server filter entry.
Use the no form of this command to remove the specified SNMP server filter
entry.
Syntax
snmp-server filter filter-name oid-tree {included | excluded}
no snmp-server filter filter-name [oid-tree]
Parameters
• filter-name—Specifies the label for the filter record that is being updated
or created. The name is used to reference the record. (Length: 1–30
characters)168 SNMP Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\SNMP.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
• oid-tree—Specifies the ASN.1 subtree object identifier to be included or
excluded from the view. To identify the subtree, specify a text string
consisting of numbers, such as 1.3.6.2.4, or a word, such as System.
Replace a single sub-identifier with the asterisk (*) wildcard to specify a
subtree family; for example, 1.3.*.4.
• included—Specifies that the filter type is included.
• excluded—Specifies that the filter type is excluded.
Default Configuration
No view entry exists.
Command Mode
Global Configuration mode
User Guidelines
This command can be entered multiple times for the same filter record. If an
object identifier is included in two or more lines, later lines take precedence.
The command's logical key is the pair (filter-name, oid-tree).
Example
The following example creates a filter that includes all objects in the MIB-II
system group except for sysServices (System 7) and all objects for interface 1
in the MIB-II interfaces group.
Console(config)# snmp-server filter filter-name system included
Console(config)# snmp-server filter filter-name system.7 excluded
Console(config)# snmp-server filter filter-name ifEntry.*.1
included
snmp-server host
Use the snmp-server host Global Configuration mode command to specify
the recipient of a Simple Network Management Protocol notification
operation. Use the no form of this command to remove the specified host.SNMP Commands 169
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\SNMP.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Syntax
snmp-server host { ipv4-address | ipv6-address| hostname} [traps | informs]
[version {1 | 2c | 3 [auth | noauth | priv]}] community-string [udp-port
port] [filter filtername] [timeout seconds] [retries retries]
no snmp-server host { ipv4-address | ipv6-address| hostname} [traps |
informs] [version {1 | 2c | 3}]
Parameters
• pv4-address—IPv4 address of the host (the targeted recipient).
• ipv6-address—Pv6 address of the host (the targeted recipient). When the
IPv6 address is a Link Local address (IPv6Z address), the outgoing
interface name must be specified. Refer to the User Guidelines for the
interface name syntax.
• hostname—Hostname of the host. (Range: 1–158 characters. Maximum
label size: 63)
• trap—Sends SNMP traps to this host (default).
• informs—Sends SNMP informs to this host. Not applicable to SNMPv1.
• 1—SNMPv1 traps are used.
• 2c—SNMPv2 traps are used
• 3—SNMPv2 traps are used
• community-string—Password-like community string sent with the
notification operation. (Range: 1–20 characters)
• noauth—Specifies no authentication of a packet.
• auth—Specifies authentication of a packet without encrypting it.
• priv—Specifies authentication of a packet with encryption.
• udp-port port—UDP port of the host to use. The default is 162. (Range:
1–65535)
• filter filtername—A string that is the name of the filter that defines the
filter for this host. If unspecified, nothing is filtered. The filter should be
defined using the command snmp-server filter (no specific order of the
command configurations is imposed on the user). (Range: Up to 30
characters)170 SNMP Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\SNMP.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
• timeout seconds—Number of seconds to wait for an acknowledgment
before resending informs. The default is 15 seconds. The parameter is
relevant only for informs. (Range: 1–300)
• retries retries—Maximum number of times to resend an inform request,
when a response is not received for a generated message. The default is 3.
The parameter is relevant only for informs. (Range: 0–255)
Command Mode
Global Configuration mode
User Guidelines
The logical key of the command is the pair (ip-address/hostname,
traps/informs, version).
When configuring snmp v1 or v2 notifications recipient the software would
automatically generate a notification view for that recipient for all the MIB.
(.For SNMPv3 the software doesn’t automatically create a user nor a notify
view. Use the commands snmp-server user, snmp-server group and snmpserver view in Global Configuration mode to create a user, a group or a notify
group respectively.
The format of an IPv6Z address is: %
interface-name = vlan | ch | isatap |
| 0
integer = |
decimal-number = 0 | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9
physical-port-name = Designated port number, for example 1/0/16
If the egress interface is not specified, the default interface is selected.
Specifying interface zone=0 is equal to not defining an egress interface.
Example
The following defines a host at the IP address displayed.
console(config)# snmp-server host 1.1.1.121 abcSNMP Commands 171
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\SNMP.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
snmp-server engineID local
The snmp-server engineID local Global Configuration mode command
specifies the Simple Network Management Protocol (SNMP) engineID on
the local device. Use the no form of this command to remove the configured
engine ID.
Syntax
snmp-server engineID local {engineid-string | default}
no snmp-server engineID local
Parameters
• engineid-string—Specifies a concatenated hexadecimal character string
identifying the engine ID. Each byte in a hexadecimal character string is
two hexadecimal digits. Bytes are separated by a period or colon. If an odd
number of hexadecimal digits are entered, the system automatically
prefixes the digit 0 to the string. (Length: 5–32 characters, 9–64
hexadecimal digits)
• default—Specifies that the engine ID is created automatically based on
the device MAC address.
Default Configuration
The engine ID is not configured.
If SNMPv3 is enabled using this command, and the default is specified, the
default engine ID is defined per standard as:
• First 4 octets: First bit = 1, the rest is IANA Enterprise number = 674.
• Fifth octet: Set to 3 to indicate the MAC address that follows.
• Last 6 octets: The device MAC address.
Command Mode
Global Configuration mode
User Guidelines
To use SNMPv3, specify an engine ID for the device. Any ID can be specified
or use a default string, which is generated using the device MAC address.172 SNMP Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\SNMP.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
As the EngineID should be unique within an administrative domain, the
following guidelines are recommended:
• For standalone devices, use the default keyword to configure the Engine
ID.
• For stackable systems, configure an EngineID, and verify that it is unique
within the administrative domain.
Changing or removing the value of snmpEngineID deletes the SNMPv3
users database.
The SNMP EngineID cannot be all 0x0 or all 0xF or 0x000000001
Example
The following example enables SNMPv3 on the device and sets the device
local engine ID to the default value.
Console(config)# snmp-server engineID local default
snmp-server engineID remote
To specify the Simple Network Management Protocol (SNMP) engine ID of a
remote SNMP device, use the snmp-server engineID remote Global
Configuration mode command. Use the no form of this command to remove
the configured engine ID.
Syntax
snmp-server engineID remote {ipv4-ip-address | ipv6 address} engineidstring
no snmp-server engineID remote {ipv4-ip-address | ipv6 address}
Parameters
• ipv4-ip-address | ipv6 address—Pv4 or IPv6 address of the remote device
• engineid-string—The character string that identifies the engine ID. The
engine ID is a concatenated hexadecimal string. Each byte in hexadecimal
character strings is two hexadecimal digits. Each byte can be separated by SNMP Commands 173
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\SNMP.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
a period or colon. If the user enters an odd number of hexadecimal digits,
the system automatically prefixes the hexadecimal string with a zero.
(Range: engineid-string5–32 characters. 9–64 hexadecimal digits)
Default Configuration
The EngineID is not configured.
Command Mode
Global Configuration mode
User Guidelines
A remote engine ID is required when an SNMP version 3 inform is
configured. The remote engine ID is used to compute the security digest for
authenticating and encrypting packets sent to a user on the remote host.
snmp-server enable traps
Use the snmp-server enable traps Global Configuration mode command to
enable the device to send SNMP traps. Use the no form of the command to
disable SNMP traps.
Syntax
snmp-server enable traps
no snmp-server enable traps
Default Configuration
SNMP traps are enabled.
Command Mode
Global Configuration mode
Example
The following example enables SNMP traps.
Console(config)# snmp-server enable traps174 SNMP Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\SNMP.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
snmp-server trap authentication
Use the snmp-server trap authentication Global Configuration mode
command to enable the device to send SNMP traps when authentication
fails. Use the no form of this command to disable SNMP failed
authentication traps.
Syntax
snmp-server trap authentication
no snmp-server trap authentication
Default Configuration
SNMP failed authentication traps are enabled.
Command Mode
Global Configuration mode
Example
The following example enables SNMP failed authentication traps.
Console(config)# snmp-server trap authentication
snmp-server contact
Use the snmp-server contact Global Configuration mode command to
configure the system contact (sysContact) string. Use the no form of the
command to remove the system contact information.
Syntax
snmp-server contact text
no snmp-server contact
Parameters
text—Specifies the string describing system contact information. (Length:
1–160 characters)SNMP Commands 175
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\SNMP.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Command Mode
Global Configuration mode
Example
The following example configures the system contact point called
Technical_Support.
Console(config)# snmp-server contact Technical_Support
snmp-server location
Use the snmp-server location Global Configuration mode command to
configure the system location string. Use the no form of this command to
remove the location string.
Syntax
snmp-server location text
no snmp-server location
Parameters
text—Specifies a string describing system location information. (Length:
1–160 characters)
Command Mode
Global Configuration mode
Example
The following example defines the device location as New_York.
Console(config)# snmp-server location New_York
snmp-server set
Use the snmp-server set Global Configuration mode command to define the
SNMP MIB value.176 SNMP Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\SNMP.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Syntax
snmp-server set variable-name name value [name2 value2 ...]
Parameters
• variable-name—Specifies the SNMP MIB variable name, which must be a
valid string.
• name value—Specifies a list of name and value pairs. Each name and
value must be a valid string. In the case of scalar MIBs, there is only a
single name-value pair. In the case of an entry in a table, there is at least
one name-value pair, followed by one or more fields.
Command Mode
Global Configuration mode
User Guidelines
Although the CLI can set any required configuration, there might be a
situation where an SNMP user sets a MIB variable that does not have an
equivalent command. To generate configuration files that support those
situations, use the snmp-server set command.
Example
The following example configures the scalar MIB sysName with the value
TechSupp.
Console(config)# snmp-server set sysName sysname TechSupp
show snmp
Use the show snmp Privileged EXEC mode command to display the SNMP
status.
Syntax
show snmp
Command Mode
Privileged EXEC modeSNMP Commands 177
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\SNMP.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
The following example displays the SNMP communications status.
Console# show snmp
SNMP is enabled
CommunityString
--------------
public
private
private
Community-Access
----------------
read only
read write
su
View name
------------
user-view
Default
DefaultSuper
IP Address
----------
All
172.16.1.1/1
0
172.16.1.1
Type
----
Router
Router
Router
Communitystring
--------------
public
Group name
----------
user-group
IP address
----------
All
Type
------
Router
Traps are enabled.
Authentication trap is enabled.
Version 1,2 notifications
Target Address
--------------
192.122.173.42
192.122.173.42
Type
----
Trap
Info
rm
Community
---------
public
public
Version
------
2
2
UDP
Port
---
162
162
Filter
name
------
TO
Sec
---
15
15
Retries
-------
3
3
Version 3 notifications
Target Address
--------------
192.122.173.42
Type
----
Info
rm
Username
--------
Bob
Security
Level
------
Priv
UDP
Port
---
162
Filter
name
-----
TO
Sec
---
15
Retries
-------
3
System Contact: Robert
System Location: Marketing178 SNMP Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\SNMP.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
The following table describes the significant fields shown in the display.
show snmp engineID
Use the show snmp engineID Privileged EXEC mode command to display
the local Simple Network Management Protocol (SNMP) engine ID.
Syntax
show snmp engineID
Command Mode
Privileged EXEC mode
Example
The following example displays the SNMP engine ID.
Console # show snmp engineID
Local SNMP engineID: 08009009020C0B099C075878
#Editor: If snmp-server engineID remote command is supported
add the following line
IP address Remote SNMP engineID
----------- -------------------------------
172.16.1.1 08009009020C0B099C075879
Field Description
Community-string The community access string permitting access to
the SNMP protocol.
Community-access The access type—read-only, read-write, super
access.
IP Address The management station IP Address.
Trap-Rec-Address The targeted recipient.
Trap-Rec-Community The statistics sent with the notification operation.
Version The SNMP version (1 or 2) for the sent trap.SNMP Commands 179
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\SNMP.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
show snmp views
Use the show snmp views Privileged EXEC mode command to display the
configured SNMP views.
Syntax
show snmp views [viewname]
Parameters
viewname—Specifies the view name. (Length: 1–30 characters)
Command Mode
Privileged EXEC mode
Example
The following example displays the configured SNMP views.
show snmp groups
Use the show snmp groups Privileged EXEC mode command to display the
configured SNMP groups.
Syntax
show snmp groups [groupname]
Parameters
groupname—Specifies the group name. (Length: 1–30 characters)
Console# show snmp views
Name OID Tree Type
----------------
Default
Default
----------------------
iso
snmpNotificationMIB
----------
Included
Excluded180 SNMP Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\SNMP.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Command Mode
Privileged EXEC mode
Example
The following example displays the configured SNMP groups.
The following table describes significant fields shown above.
show snmp filters
Use the show snmp filters Privileged EXEC mode command to display the
configured SNMP filters.
Console# show snmp groups
Name Security Views
-------------
user-group
managers-group
Model
-----
V3
V3
Level
----
priv
priv
Read
-------
Default
Default
Write
-------
""
Default
Notify
-------
""
""
Field Description
Name Group name.
Security Model SNMP model in use (v1, v2 or v3).
Security Level Packet authentication with encryption.
Applicable to SNMP v3 security only.
Views Read View name enabling viewing the agent contents.
If unspecified, all objects except the communitytable and SNMPv3 user and access tables are
available.
Write View name enabling data entry and managing
the agent contents.
Notify View name enabling specifying an inform or a
trap.SNMP Commands 181
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\SNMP.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Syntax
show snmp filters [filtername]
Parameters
filtername—Specifies the filter name. (Length: 1–30 characters)
Command Mode
Privileged EXEC mode
Example
The following example displays the configured SNMP filters.
show snmp users
Use the show snmp users Privileged EXEC mode command to display the
configured SNMP users.
Syntax
show snmp users [username]
Parameters
username—Specifies the user name. (Length: 1–30 characters)
Command Mode
Privileged EXEC mode
Console# show snmp filters
Name OID Tree Type
------------
user-filter
user-filter
user-filter
---------------------
1.3.6.1.2.1.1
1.3.6.1.2.1.1.7
1.3.6.1.2.1.2.2.1.*.1
---------
Included
Excluded
Included182 SNMP Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\SNMP.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
The following example displays the configured SNMP users.
Console# show snmp users
Name
------
John
John
Group name
------------
user-group
user-group
Auth
Method
-------
md5
md5
Remote
------------------------
08009009020C0B099C075879RSA and Certificate Commands 183
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\RSA_and_Certificates.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
10
RSA and Certificate Commands
crypto key generate dsa
The crypto key generate dsa Global Configuration mode command generates
DSA key pairs.
Syntax
crypto key generate dsa
Default Configuration
DSA key pairs do not exist.
Command Mode
Global Configuration mode
User Guidelines
DSA keys are generated in pairs - one public DSA key and one private DSA
key.
If the device already has DSA keys, a warning is displayed with a prompt to
replace the existing keys with new keys.
This command is not saved in the router configuration. However, the keys
generated by this command are saved in the private configuration (which is
never displayed to the user or backed up to another device).
Example
The following example generates DSA key pairs.
Console(config)# crypto key generate dsa184 RSA and Certificate Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\RSA_and_Certificates.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
crypto key generate rsa
The crypto key generate rsa Global Configuration mode command generates
RSA key pairs.
Syntax
crypto key generate rsa
Default Configuration
RSA key paris do not exist.
Command Mode
Global Configuration mode
User Guidelines
RSA keys are generated in pairs - one public RSA key and one private RSA key.
If the device already has RSA keys, a warning is displayed with a prompt to
replace the existing keys with new keys.
This command is not saved in the router configuration; however, the keys
generated by this command are saved in the private configuration (which is
never displayed to the user or backed up to another device).
Example
The following example generates RSA key pairs.
Console(config)# crypto key generate rsa
show crypto key mypubkey
The show crypto key mypubkey Privileged EXEC mode command displays
the device SSH public keys.
Syntax
show crypto key mypubkey [rsa | dsa]RSA and Certificate Commands 185
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\RSA_and_Certificates.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Parameters
• rsa—Displays the RSA key.
• dsa—Displays the DSA key.
Command Mode
Privileged EXEC mode
Example
The following example displays the SSH public RSA keys on the device.
Console# show crypto key mypubkey rsa
RSA key data:
005C300D 06092A86 4886F70D 01010105 00034B00 30480241 00C5E23B 55D6AB22
04AEF1BA A54028A6 9ACC01C5 129D99E4 64CAB820 847EDAD9 DF0B4E4C 73A05DD2
BD62A8A9 FA603DD2 E2A8A6F8 98F76E28 D58AD221 B583D7A4 71020301 87685768
Fingerprint(Hex): 77:C7:19:85:98:19:27:96:C9:CC:83:C5:78:89:F8:86
Fingerprint(Bubble Babble): yteriuwt jgkljhglk yewiury hdskjfryt
gfhkjglk
crypto certificate generate
The crypto certificate generate Global Configuration mode command
generates a self-signed certificate for HTTPS.
Syntax
crypto certificate number generate [key-generate [length]] [passphrase
string] [cn common- name] [ou organization-unit] [or organization] [loc
location] [st state] [cu country] [duration days]
Parameters
• number—Specifies the certificate number. (Range: 1–2)
• key-generate—Regenerates SSL RSA key.
• length—Specifies the SSL's RSA key length. (Range: 512–2048)
• passphrase string—Specifies the passphrase used for exporting the
certificate in PKCS12 file format. (Length: 8–96 characters)186 RSA and Certificate Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\RSA_and_Certificates.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
• cn common-name—Specifies the fully qualified device URL or IP address.
(Length: 1–64 characters)
• ou organization-unit—Specifies the organization-unit or department
name. (Length: 1–64 characters)
• or organization—Specifies the organization name. (Length: 1–64
characters)
• loc location—Specifies the location or city name. (Length: 1–64
characters)
• st state—Specifies the state or province name. (Length: 1–64 characters)
• cu country—Specifies the country name. (Length: 2 characters)
• duration days—Specifies the number of days a certification is valid.
(Range: 30–3650)
Default Configuration
The default certificate number is 1.
The default SSL’s RSA key length is 1024.
If passphrase string is not specified, the certificate is not exportable.
If cn common-name is not specified, it defaults to the device’s lowest static
IPv6 address (when the certificate is generated), or to the device’s lowest
static IPv4 address if there is no static IPv6 address, or to 0.0.0.0 if there is no
static IP address.
If duration days is not specified, it defaults to 365 days.
Command Mode
Global Configuration mode
User Guidelines
This command is not saved in the router configuration. However, the
certificate and keys generated by this command are saved in the private
configuration (which is never displayed to the user or backed up to another
device).
When exporting a RSA key pair to a PKCS#12 file, the RSA key pair is as
secure as the passphrase. Keep the passphrase secure.
If the RSA key does not exist, you must use the parameter key-generate.RSA and Certificate Commands 187
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\RSA_and_Certificates.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
The following example generates a self-signed certificate for HTTPS.
Console# crypto certificate generate key-generate
crypto certificate request
The crypto certificate request Privileged EXEC mode command generates
and displays a certificate request for HTTPS.
Syntax
crypto certificate number request common-name [ou organization-unit] [or
organization] [loc location] [st state] [cu country]
Parameters
• number—Specifies the certificate number. (Range: 1–2)
• common-name—Specifies the device’s fully qualified URL or IP address.
(Length: 1–64 characters)
• ou organization-unit—Specifies the organization-unit or department
name. (Length: 1–64 characters)
• or organization—Specifies the organization name. (Length: 1–64
characters)
• loc location—Specifies the location or city name. (Length: 1–64
characters)
• st state—Specifies the state or province name. (Length: 1–64 characters)
• cu country—Specifies the country name. (Length: 2 characters)
Command Mode
Privileged EXEC mode
User Guidelines
Use this command to export a certificate request to a Certification Authority.
The certificate request is generated in Base64-encoded X.509 format.188 RSA and Certificate Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\RSA_and_Certificates.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Before generating a certificate request, first generate a self-signed certificate
using the crypto certificate generate Global Configuration mode command
to generate the keys. The certificate fields must be re-entered.
After receiving the certificate from the Certification Authority, use the crypto
certificate import Global Configuration mode command to import the
certificate into the device. This certificate replaces the self-signed certificate.
Example
The following example displays the certificate request for HTTPS.
Console# crypto certificate 1 request
-----BEGIN CERTIFICATE REQUEST-----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-----END CERTIFICATE REQUEST-----
CN= router.gm.com
0= General Motors
C= US
crypto certificate import
The crypto certificate import Global Configuration mode command imports
a certificate signed by a Certification Authority for HTTPS.
Syntax
crypto certificate number importRSA and Certificate Commands 189
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\RSA_and_Certificates.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Parameters
number—Specifies the certificate number. (Range: 1–2)
Command Mode
Global Configuration mode
User Guidelines
To end the session, use a blank line.
The imported certificate must be based on a certificate request created by the
crypto certificate request privileged EXEC command.
If the public key found in the certificate does not match the device's SSL RSA
key, the command fails.
This command is not saved in the router configuration. However, the
certificate imported by this command is saved in the private configuration
(which is never displayed to the user or backed up to another device).
Example
The following example imports a certificate signed by Certification Authority
for HTTPS.
Console(config)# crypto certificate 1 import
-----BEGIN CERTIFICATE-----
dHmUgUm9vdCBDZXJ0aWZpZXIwXDANBgkqhkiG9w0BAQEFAANLADBIAkEAp4HS
nnH/xQSGA2ffkRBwU2XIxb7n8VPsTm1xyJ1t11a1GaqchfMqqe0kmfhcoHSWr
yf1FpD0MWOTgDAwIDAQABo4IBojCCAZ4wEwYJKwYBBAGCNxQCBAYeBABDAEEw
CwR0PBAQDAgFGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFAf4MT9BRD47
ZvKBAEL9Ggp+6MIIBNgYDVR0fBIIBLTCCASkwgdKggc+ggcyGgclsZGFwOi8v
L0VByb3h5JTIwU29mdHdhcmUlMjBSb290JTIwQ2VydGlmaWVyLENOPXNlcnZl
-----END CERTIFICATE-----
Certificate imported successfully.
Issued to: router.gm.com
Issued by: www.verisign.com
Valid from: 8/9/2003 to 8/9/2004
Subject: CN= router.gm.com, 0= General Motors, C= US190 RSA and Certificate Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\RSA_and_Certificates.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Finger print: DC789788 DC88A988 127897BC BB789788
crypto certificate export pkcs12
The crypto certificate export pkcs12 Privileged EXEC mode command
exports the certificate and the RSA keys within a PKCS12 file.
Syntax
crypto certificate number export pkcs12
Parameters
number—Specifies the certificate number. (Range: 1–2)
Command Mode
Privileged EXEC mode
User Guidelines
The crypto certificate export pkcs12 command creates a PKCS 12 file that
contains the certificate and an RSA key pair.
The passphrase for the export is determined when the key is generated.
The certificate and key pair are exported in a standard PEM-format PKCS12
file. This format can be converted to and from the binary PFX file used by
Windows and Linux by using the openssl command-line tool. See an open
source OpenSSL user manual (man pkcs12) for more information.
Example
The following example exports the certificate and the RSA keys within a
PKCS12 file.
Console# crypto certificate 1 export pkcs12
Bag Attributes
localKeyID: 0C 75 81 77 5A 31 53 D1 FF 4E 26 BE 8D 4A FD 8B 22 9F 45 D4
subject=/C=us/ST= /L= /CN= /O= /OU=
issuer= /C=us/ST= /L= /CN= /O= /OU=
-----BEGIN CERTIFICATE-----
MIIBfDCCASYCAQAwDQYJKoZIhvcNAQEEBQAwSTELMAkGA1UEBhMCdXMxCjAIBgNVRSA and Certificate Commands 191
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\RSA_and_Certificates.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
BAgTASAxCjAIBgNVBAcTASAxCjAIBgNVBAMTASAxCjAIBgNVBAoTASAxCjAIBgNV
BAsTASAwHhcNMDQwMjA3MTU1NDQ4WhcNMDUwMjA2MTU1NDQ4WjBJMQswCQYDVQQG
EwJ1czEKMAgGA1UECBMBIDEKMAgGA1UEBxMBIDEKMAgGA1UEAxMBIDEKMAgGA1UE
ChMBIDEKMAgGA1UECxMBIDBcMA0GCSqGSIb3DQEBAQUAA0sAMEgCQQCZXP/tk3e/
jrulfZw8q8T2oS5ymrEIes/sRJE8uahTBJqKu1VHqRYJR3VYa/03HSJ741w5MzPI
iuWZzrbbuXAxAgMBAAEwDQYJKoZIhvcNAQEEBQADQQBQ+GTLeN1p1kARxI4C1fTU
efig3ffZ/tjW5q1t1r5F6zNv/GuXWw7rGzmRyoMXDcYp1TaA4gAIFQCpFGqiSbAx
-----END CERTIFICATE-----
Bag Attributes
localKeyID: 0C 75 81 77 5A 31 53 D1 FF 4E 26 BE 8D 4A FD 8B 22 9F 45 D4
Key Attributes:
-----BEGIN RSA PRIVATE KEY-----
Proc-Type: 4,ENCRYPTED
DEK-Info: DES-EDE3-CBC,085DCBF3A41D2669
dac0m9jqEp1DM50sIDb8Jq1jxW/1P0kqSxuMhc25OdBE/1fPBg9VSvV1ARaYt16W
bX67UyJ8t7HHF3AowjcWzElQ5GJgSQ0VemsqsRQzjpCTb090rx+cNwVfIvjoedgQ
Mtl5+fKIAcqsfEgEGJNXQ4jEzsXAkwfQLFfgt47O3IpkUn0AxrQzutJDOcC28Uxp
raMVTVSlSkJIvaPuXJxdZ279tDMwZffILBfKCJGACT5V5/4WEqDkrF+uuF9/oxm2
5SVL8TvUmXB/3hX4UoaXtxAhuyOdhh1kyyZSpw9BPPR/8bc/wUYERh7+7JXLKHpd
ueeu3znfIX4dDeti8B3xYvvE8kGZjxFN1cC3zc3JsD0IVu1LkyiAa93P4LPEvAwG
Fw1LqmGiiqw9JM/tzc6kYkZXylFzCrSVf2exP+/tEvM=
-----END RSA PRIVATE KEY-----
crypto certificate import pkcs12
The crypto certificate import pkcs12 Privileged EXEC mode command
imports the certificate and the RSA keys within a PKCS12 file.
Syntax
crypto certificate number import pkcs12 passphrase
Parameters
• number—Specifies the certificate number. (Range: 1–2)
• passphrase—Specifies the passphrase used to encrypt the PKCS12 file for
export. (Length: 8–96 characters)192 RSA and Certificate Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\RSA_and_Certificates.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Command Mode
Privileged EXEC mode
User Guidelines
Use the passphrase that was exported by the crypto certificate export pkcs12
command.
NOTE: This passphrase is saved for later exports.
Example
The following example imports the certificate and the RSA keys within a
PKCS12 file.
Console# crypto certificate 1 import pkcs12 passphrase
Bag Attributes
localKeyID: 0C 75 81 77 5A 31 53 D1 FF 4E 26 BE 8D 4A FD 8B 22 9F 45 D4
subject=/C=us/ST= /L= /CN= /O= /OU=
issuer= /C=us/ST= /L= /CN= /O= /OU=
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Bag Attributes
localKeyID: 0C 75 81 77 5A 31 53 D1 FF 4E 26 BE 8D 4A FD 8B 22 9F 45 D4
Key Attributes:
-----BEGIN RSA PRIVATE KEY-----
Proc-Type: 4,ENCRYPTED
DEK-Info: DES-EDE3-CBC,085DCBF3A41D2669
dac0m9jqEp1DM50sIDb8Jq1jxW/1P0kqSxuMhc25OdBE/1fPBg9VSvV1ARaYt16W
bX67UyJ8t7HHF3AowjcWzElQ5GJgSQ0VemsqsRQzjpCTb090rx+cNwVfIvjoedgQ
Mtl5+fKIAcqsfEgEGJNXQ4jEzsXAkwfQLFfgt47O3IpkUn0AxrQzutJDOcC28UxpRSA and Certificate Commands 193
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\RSA_and_Certificates.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
raMVTVSlSkJIvaPuXJxdZ279tDMwZffILBfKCJGACT5V5/4WEqDkrF+uuF9/oxm2
5SVL8TvUmXB/3hX4UoaXtxAhuyOdhh1kyyZSpw9BPPR/8bc/wUYERh7+7JXLKHpd
ueeu3znfIX4dDeti8B3xYvvE8kGZjxFN1cC3zc3JsD0IVu1LkyiAa93P4LPEvAwG
Fw1LqmGiiqw9JM/tzc6kYkZXylFzCrSVf2exP+/tEvM=
-----END RSA PRIVATE KEY-----
show crypto certificate mycertificate
The show crypto certificate mycertificate Privileged EXEC mode command
displays the device SSL certificates.
Syntax
show crypto certificate mycertificate [number]
Parameters
number—Specifies the certificate number. (Range: 1–2
Command Mode
Privileged EXEC mode
Example
The following example displays SSL certificate # 1 present on the device.
Console# show crypto certificate mycertificate 1
-----BEGIN CERTIFICATE-----
dHmUgUm9vdCBDZXJ0aWZpZXIwXDANBgkqhkiG9w0BAQEFAANLADBIAkEAp4HS
nnH/xQSGA2ffkRBwU2XIxb7n8VPsTm1xyJ1t11a1GaqchfMqqe0kmfhcoHSWr
yf1FpD0MWOTgDAwIDAQABo4IBojCCAZ4wEwYJKwYBBAGCNxQCBAYeBABDAEEw
CwR0PBAQDAgFGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFAf4MT9BRD47
ZvKBAEL9Ggp+6MIIBNgYDVR0fBIIBLTCCASkwgdKggc+ggcyGgclsZGFwOi8v
L0VByb3h5JTIwU29mdHdhcmUlMjBSb290JTIwQ2VydGlmaWVyLENOPXNlcnZl
-----END CERTIFICATE-----
Issued by: www.verisign.com
Valid from: 8/9/2003 to 8/9/2004
Subject: CN= router.gm.com, 0= General Motors, C= US194 RSA and Certificate Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\RSA_and_Certificates.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Finger print: DC789788 DC88A988 127897BC BB789788Web Server Commands 195
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Web_Server.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
11
Web Server Commands
ip http server
The ip http server Global Configuration mode command enables configuring
and monitoring the device from a web browser. Use the no form of this
command to disable this function.
Syntax
ip http server
no ip http server
Default Configuration
HTTP server is enabled.
Command Mode
Global Configuration mode196 Web Server Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Web_Server.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
The following example enables configuring the device from a web browser.
Console(config)# ip http server
ip http port
The ip http port Global Configuration mode command specifies the TCP
port used by the web browser interface. Use the no form of this command to
restore the default configuration.
Syntax
ip http port port-number
no ip http port
Parameters
port-numberPort number—For use by the HTTP server. (Range: 0–65534)
Default Configuration
The default port number is 80.
Command Mode
Global Configuration mode
Example
The following example configures the http port number as 100.
Console(config)# ip http port 100
ip http timeout-policy
Use the ip http timeout-policy Global Configuration mode command to set
the interval for the system to wait for user input in http sessions before
automatic logoff. Use the no form of this command to return to the default
value.Web Server Commands 197
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Web_Server.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Syntax
ip http timeout-policy idle seconds
no ip http timeout-policy
Parameters
seconds—Specifies the maximum number of seconds that a connection is
kept open if no data is received or response data cannot be sent out. (Range:
0–86400)
Default
600 seconds
Command Mode
Global Configuration mode
User Guidelines
This command also configures the timeout-policy for HTTPS.
To specify no timeout, enter the ip http timeout-policy 0 command.
Example
The following example configures the http port number as 100.
Console(config)# ip http timeout-policy 0
ip http secure-server
Use the ip http secure-server Global Configuration mode command to enable
the device to be configured securely from a browser, and to also enable the
device to be monitored or have its configuration modified securely from a
browser,. Use the no form of this command to disable this function.
Syntax
ip http secure-server
no ip http secure-server198 Web Server Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Web_Server.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Parameters
This command has no arguments or keywords.
Default
Disabled
Command Mode
Global Configuration mode
User Guidelines
Use the crypto certificate generate command to generate an HTTPS
certificate.
Example
console(config)# ip http secure-server
ip http secure-port
To specify the TCP port to be used by the secure web browser interface, use
the ip http secure-port Global Configuration mode command. To use the
default port, use the no form of this command.
Syntax
ip http secure-port port-number
no ip http secure-port
Parameters
port-number—Port number for use by the HTTPS server (Range: 0–65534)
Default
The default port number is 443.
Command Mode
Global Configuration modeWeb Server Commands 199
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Web_Server.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
console(config)# ip http secure-port 1234
ip https certificate
The ip https certificate Global Configuration mode command configures the
active certificate for HTTPS. Use the no form of this command to restore the
default configuration.
Syntax
ip https certificate number
no ip https certificate
Parameters
number—Specifies the certificate number. (Range: 1–2)
Default Configuration
The default certificate number is 1.
Command Mode
Global Configuration mode
User Guidelines
Use the crypto certificate generate command to generate a HTTPS
certificate.
Example
The following example configures the active certificate for HTTPS.
Console(config)# ip https certificate 2200 Web Server Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Web_Server.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
show ip http
The show ip http EXEC mode command displays the HTTP server
configuration.
Syntax
show ip http
Command Mode
EXEC mode
Example
The following example displays the HTTP server configuration.
Console# show ip http
HTTP server enabled
Port: 80
Interactive timeout: 10 minutes
show ip https
The show ip https Privileged EXEC mode command displays the HTTPS
server configuration.
Syntax
show ip https
Command Mode
Privileged EXEC mode
Example
The following example displays the HTTPS server configuration.
Console# show ip https
HTTPS server enabledWeb Server Commands 201
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Web_Server.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Port: 443
Interactive timeout: Follows the HTTP interactive timeout
(10 minutes)
Certificate 1 is active
Issued by: www.verisign.com
Valid from: 8/9/2003 to 8/9/2004
Subject: CN= router.gm.com, 0= General Motors, C= US
Finger print: DC789788 DC88A988 127897BC BB789788
Certificate 2 is inactive
Issued by: self-signed
Valid from: 8/9/2003 to 8/9/2004
Subject: CN= router.gm.com, 0= General Motors, C= US
Finger print: 1873B936 88DC3411 BC8932EF 782134BA202 Web Server Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Web_Server.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LYTelnet, SSH and Slogin Commands 203
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Telnet_SSH_and_Slogin.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
12
Telnet, SSH and Slogin Commands
ip telnet server
The ip telnet server Global Configuration mode command enables the device
to be configured from a Telnet server. Use the no form of this command to
disable the device configuration from a Telnet server.
Syntax
ip telnet server
no ip telnet server
Default Configuration
Device configuration from a Telnet server is enabled.
Command Mode
Global Configuration mode
User Guidelines
To control the device configuration by SSH, use the ip ssh server Global
Configuration mode command.
Example
The following example enables the device to be configured from a Telnet
server.
Console(config)# ip telnet server204 Telnet, SSH and Slogin Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Telnet_SSH_and_Slogin.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
ip ssh port
The ip ssh port Global Configuration mode command specifies the port used
by the SSH server. Use the no form of this command to restore the default
configuration.
Syntax
ip ssh port port-number
no ip ssh port
Parameters
port-number—Specifies the port number to be used by the SSH server.
(Range: 1–65535)
Default Configuration
The default port number is 22.
Command Mode
Global Configuration mode
Example
The following example specifies that port number 8080 is used by the SSH
server.
Console(config)# ip ssh port 8080
ip ssh server
The ip ssh server Global Configuration mode command enables the device to
be configured from an SSH server. Use the no form of this command to
disable the device configuration from a SSH server,.
Syntax
ip ssh server
no ip ssh serverTelnet, SSH and Slogin Commands 205
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Telnet_SSH_and_Slogin.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Default Configuration
Device configuration from an SSH server is enabled.
Command Mode
Global Configuration mode
User Guidelines
If encryption keys are not generated, the SSH server is in standby until the
keys are generated. To generate SSH server keys, use the crypto key generate
dsa and crypto key generate rsa Global Configuration mode commands.
Example
The following example enables configuring the device from a SSH server.
Console(config)# ip ssh server
ip ssh pubkey-auth
The ip ssh pubkey-auth Global Configuration mode command enables
public key authentication of incoming SSH sessions. Use the no form of this
command to disable this function.
Syntax
ip ssh pubkey-auth
no ip ssh pubkey-auth
Default Configuration
Public Key authentication of incoming SSH sessions is disabled.
Command Mode
Global Configuration mode
User Guidelines
AAA authentication is independent.206 Telnet, SSH and Slogin Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Telnet_SSH_and_Slogin.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
The following example enables public key authentication for incoming SSH
sessions.
Console(config)# ip ssh pubkey-auth
crypto key pubkey-chain ssh
The crypto key pubkey-chain ssh Global Configuration mode command
enters the SSH Public Key-chain Configuration mode. This mode is used to
manually specify other device public keys such as SSH client public keys.
Syntax
crypto key pubkey-chain ssh
Default Configuration
Keys do not exist.
Command Mode
Global Configuration mode
User Guidelines
Use this command when you want to manually specify SSH client’s public
keys.
Example
The following example enters the SSH Public Key-chain Configuration mode
and manually configures the RSA key pair for SSH public key-chain to ‘bob’.
Console(config)# crypto key pubkey-chain ssh
Console(config-pubkey-chain)# user-key bob
Console(config-pubkey-key)# key-string rsa
AAAAB3NzaC1yc2EAAAADAQABAAABAQCvTnRwPWl
Al4kpqIw9GBRonZQZxjHKcqKL6rMlQ+
ZNXfZSkvHG+QusIZ/76ILmFT34v7u7ChFAE+
Vu4GRfpSwoQUvV35LqJJk67IOU/zfwOl1gTelnet, SSH and Slogin Commands 207
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Telnet_SSH_and_Slogin.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
kTwml75QR9gHujS6KwGN2QWXgh3ub8gDjTSq
muSn/Wd05iDX2IExQWu08licglk02LYciz
+Z4TrEU/9FJxwPiVQOjc+KBXuR0juNg5nFYsY
0ZCk0N/W9a/tnkm1shRE7Di71+w3fNiOA
6w9o44t6+AINEICBCCA4YcF6zMzaT1wefWwX6f+
Rmt5nhhqdAtN/4oJfce166DqVX1gWmN
zNR4DYDvSzg0lDnwCAC8Qh
Fingerprint: a4:16:46:23:5a:8d:1d:b5:37:59:eb:44:13:b9:33:e9
user-key
The user-key SSH Public Key-string Configuration mode command specifies
which SSH public key is manually configured. Use the no form of this
command to remove an SSH public key.
Syntax
user-key username {rsa | dsa}
no user-key username
Parameters
• username—Specifies the remote SSH client username. (Length: 1–48
characters)
• rsa—Specifies that the RSA key pair is manually configured.
• dsa—Specifies that the DSA key pair is manually configured.
Default Configuration
No SSH public keys exist.
Command Mode
SSH Public Key-string Configuration mode
User Guidelines
Follow this command with the key-string SSH Public Key-String
Configuration mode command to specify the key.208 Telnet, SSH and Slogin Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Telnet_SSH_and_Slogin.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Please note that after entering this command, the existing key is deleted even
if no new key is defined by the key-string command
Exampe
The following example enables manually configuring an SSH public key for
SSH public key-chain bob.
Console(config)# crypto key pubkey-chain ssh
Console(config-pubkey-chain)# user-key bob rsa
Console(config-pubkey-key)# key-string row
AAAAB3NzaC1yc2EAAAADAQABAAABAQCvTnRwPWl
key-string
The key-string SSH Public Key-string Configuration mode command
manually specifies an SSH public key.
Syntax
key-string [row key-string]
Parameters
• row—Specifies the SSH public key row by row.
• key-string—Specifies the key in UU-encoded DER format. UU-encoded
DER format is the same format as in the authorized_keys file used by
OpenSSH. (Length:0–160)
Default Configuration
Keys do not exist.
Command Mode
SSH Public Key-string Configuration mode
User Guidelines
Use the key-string SSH Public Key-string Configuration mode command
without the row parameter to specify which SSH public key is to be Telnet, SSH and Slogin Commands 209
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Telnet_SSH_and_Slogin.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
interactively configured next. Enter a row with no characters to complete the
command.
Use the key-string row SSH Public Key-string Configuration mode command
to specify the SSH public key, row by row. Each row must begin with a keystring row command.
The UU-encoded DER format is the same format as in the authorized_keys
file used by OpenSSH.
Example
The following example enters public key strings for SSH public key client
‘bob’.
Console(config)# crypto key pubkey-chain ssh
Console(config-pubkey-chain)# user-key bob rsa
Console(config-pubkey-key)# key-string
AAAAB3NzaC1yc2EAAAADAQABAAABAQCvTnRwPWl
Al4kpqIw9GBRonZQZxjHKcqKL6rMlQ+
ZNXfZSkvHG+QusIZ/76ILmFT34v7u7ChFAE+
Vu4GRfpSwoQUvV35LqJJk67IOU/zfwOl1g
kTwml75QR9gHujS6KwGN2QWXgh3ub8gDjTSq
muSn/Wd05iDX2IExQWu08licglk02LYciz
+Z4TrEU/9FJxwPiVQOjc+KBXuR0juNg5nFYsY
0ZCk0N/W9a/tnkm1shRE7Di71+w3fNiOA
6w9o44t6+AINEICBCCA4YcF6zMzaT1wefWwX6f+
Rmt5nhhqdAtN/4oJfce166DqVX1gWmN
zNR4DYDvSzg0lDnwCAC8Qh
Fingerprint: a4:16:46:23:5a:8d:1d:b5:37:59:eb:44:13:b9:33:e9
Console(config)# crypto key pubkey-chain ssh
Console(config-pubkey-chain)# user-key bob rsa
Console(config-pubkey-key)# key-string row AAAAB3Nza
Console(config-pubkey-key)# key-string row C1yc2210 Telnet, SSH and Slogin Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Telnet_SSH_and_Slogin.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
show ip ssh
The show ip ssh Privileged EXEC mode command displays the SSH server
configuration.
Syntax
show ip ssh
Command Mode
Privileged EXEC mode
Example
The following example displays the SSH server configuration.
The following table describes the significant fields shown in the display.
Console# show ip ssh
SSH server enabled. Port: 22
RSA key was generated.
DSA (DSS) key was generated.
SSH Public Key Authentication is enabled.
Active incoming sessions:
IP address
---------
172.16.0.1
SSH
username
-----------
John Brown
Version
-------
1.5
Cipher
------
3DES
Auth code
----------
HMAC-SHA1
Field Description
IP address The client address
SSH username The user name
Version The SSH version numberTelnet, SSH and Slogin Commands 211
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Telnet_SSH_and_Slogin.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
show crypto key pubkey-chain ssh
The show crypto key pubkey-chain ssh Privileged EXEC mode command
displays SSH public keys stored on the device.
Syntax
show crypto key pubkey-chain ssh [username username] [fingerprint
{bubble-babble | hex}]
Parameters
• username username—Specifies the remote SSH client username. (Length:
1–48 characters)
• fingerprint {bubble-babble | hex}—Specifies the fingerprint display
format. The possible values are:
• bubble-babble—Specifies that the fingerprint is displayed in Bubble
Babble format.
• hex—Specifies that the fingerprint is displayed in hexadecimal format.
Default Configuration
The default fingerprint format is hexadecimal.
Command Mode
Privileged EXEC mode
Example
The following examples display SSH public keys stored on the device.
Console# show crypto key pubkey-chain ssh
Username
--------
Cipher The encryption type (3DES, Blowfish, RC4)
Auth Code The authentication Code (HMAC-MD5, HMAC-SHA1)
Field Description212 Telnet, SSH and Slogin Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Telnet_SSH_and_Slogin.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
bob
john
Fingerprint
-----------------------------------------------
9A:CC:01:C5:78:39:27:86:79:CC:23:C5:98:59:F1:86
98:F7:6E:28:F2:79:87:C8:18:F8:88:CC:F8:89:87:C8
Console# show crypto key pubkey-chain ssh username bob
Username: bob
Key: 005C300D 06092A86 4886F70D 01010105 00034B00 30480241
00C5E23B 55D6AB22 04AEF1BA A54028A6 9ACC01C5 129D99E4
Fingerprint:
9A:CC:01:C5:78:39:27:86:79:CC:23:C5:98:59:F1:86Line Commands 213
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Line.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
13
Line Commands
line
The line Global Configuration mode command identifies a specific line for
configuration and enters the Line Configuration command mode.
Syntax
line {console | telnet | ssh}
Parameters
• console—Enters the console terminal line mode.
• telnet—Configures the device as a virtual terminal for remote console
access (Telnet).
• ssh—Configures the device as a virtual terminal for secured remote
console access (SSH).
Command Mode
Global Configuration mode
Example
The following example configures the device as a virtual terminal for remote
(Telnet) console access.
Console(config)# line telnet
Console(config-line)#214 Line Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Line.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
speed
The speed Line Configuration mode command sets the line baud rate. Use
the no form of this command to restore the default configuration.
Syntax
speed bps
no speed
Parameters
bps—Specifies the baud rate in bits per second (bps). Possible values are
2400, 4800, 9600, 19200, 38400, 57600, and 115200.
Default Configuration
The default speed is 9600 bps.
Command Mode
Line Configuration (console) mode
User Guidelines
The configured speed is applied when Autobaud is disabled. This
configuration applies to the current session only.
Example
The following example configures the line baud rate as 9600 bits per second.
Console(config-line)# speed 9600
autobaud
The autobaud Line Configuration mode command sets the line for
automatic baud rate detection (autobaud). Use the no form of this command
to disable automatic baud rate detection.
Syntax
autobaudLine Commands 215
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Line.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
no autobaud
Default Configuration
Automatic baud rate detection is disabled.
Command Mode
Line Configuration mode
User Guidelines
To start communication using Autobaud, press the Enter key twice.
Example
The following example enables autobaud.
Console(config)# line console
Console(config-line)# autobaud
exec-timeout
The exec-timeout Line Configuration mode command sets the session idle
time interval, during which the system waits for user input before automatic
logoff. Use the no form of this command to restore the default configuration.
Syntax
exec-timeout minutes [seconds]
no exec-timeout
Parameters
• minutes—Specifies the number of minutes. (Range: 0-65535)
• seconds—Specifies the number of seconds. (Range: 0-59)
Default Configuration
The default idle time interval is 10 minutes.
Command Mode
Line Configuration mode216 Line Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Line.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
User Guidelines
To specify no timeout, enter the exec-timeout 0 0 command.
Example
The following example sets the HTTP session idle time interval before
automatic logoff to 20 minutes.
Console(config)# line console
Console(config-line)# exec-timeout 20
show line
The show line EXEC mode command displays line parameters.
Syntax
show line [console | telnet | ssh]
Parameters
• console—Displays the console configuration.
• telnet—Displays the Telnet configuration.
• ssh—Displays the SSH configuration.
Default Configuration
If the line is not specified, all line configuration parameters are displayed.
Command Mode
EXEC mode
Example
The following example displays the line configuration.
Console> show line
Console configuration:Line Commands 217
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Line.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Interactive timeout: Disabled
History: 10
Baudrate: 9600
Databits: 8
Parity: none
Stopbits: 1
Telnet configuration:
Telnet is enabled.
Interactive timeout: 10 minutes 10 seconds
History: 10
SSH configuration:
SSH is enabled.
Interactive timeout: 10 minutes 10 seconds
History: 10218 Line Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Line.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LYAAA Commands 219
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\AAA.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
14
AAA Commands
aaa authentication login
The aaa authentication login Global Configuration mode command sets an
authentication method applied during login. Use the no form of this
command to restore the default authentication method.
Syntax
aaa authentication login {default | list-name} method [method2 ...]
no aaa authentication login {default | list-name}
Parameters
• default—Uses the listed authentication methods that follow this
argument as the default method list when a user logs in.
• list-name—Specifies a name for a list of authentication methods activated
when a user logs in. (Length: 1–12 characters)
• method [method2 ...]—Specifies a list of methods that the authentication
algorithm tries, in the given sequence. The additional authentication
methods are used only if the previous method returns an error, not if it
fails. To ensure that the authentication succeeds even if all methods return
an error, specify none as the final method in the command line. Select one
or more methods from the following list:
Keyword Description
enable Uses the enable password for authentication.
line Uses the line password for authentication.
local Uses the local username database for authentication.220 AAA Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\AAA.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Default Configuration
The local user database is the default authentication method. This is the
same as entering the command aaa authentication login local.
NOTE: If an authentication method is not defined, console users can log in without any
authentication verification.
Command Mode
Global Configuration mode
User Guidelines
The default and additional list names created with the aaa authentication
login command are used with the login authentication command.
Create a list by entering the aaa authentication login list-name method
command for a particular protocol, where list-name is any character string
used to name ) this list. The method argument identifies the list of methods
that the authentication algorithm tries, in the given sequence.
The additional methods of authentication are used only if the previous
method returns an error, not if it fails. Specify none as the final method in the
command line to ensure that the authentication succeeds even if all methods
return an error.
Example
The following example sets the authentication login methods.
Console (config)# aaa authentication login default radius local
enable none
none Uses no authentication.
radius Uses the list of all RADIUS servers for authentication.
tacacs Uses the list of all TACACS+ servers for authentication.AAA Commands 221
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\AAA.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
aaa authentication enable
The aaa authentication enable Global Configuration mode command sets an
authentication method for accessing higher privilege levels. To restore the
default authentication method, use the no form of this command.
Syntax
aaa authentication enable {default | list-name} method [method2 ...]
no aaa authentication enable {default | list-name}
Parameters
• default—Uses the listed authentication methods that follow this
argument as the default method list, when accessing higher privilege
levels.
• list-name —Specifies a name for the list of authentication methods
activated when a user accesses higher privilege levels. (Length: 1–12
characters)
• method [method2 ...]—Specifies a list of methods that the authentication
algorithm tries, in the given sequence. The additional authentication
methods are used only if the previous method returns an error, not if it
fails. Specify none as the final method in the command line to ensure that
the authentication succeeds, even if all methods return an error. Select one
or more methods from the following list:
Keyword Description
enable Uses the enable password for authentication.
line Uses the line password for authentication.
none Uses no authentication.
radius Uses the list of all RADIUS servers for authentication. Uses
username "$enabx$." where x is the privilege level.
tacacs Uses the list of all TACACS servers for authentication. Uses
username "$enabx$." where x is the privilege level.222 AAA Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\AAA.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Default Configuration
The enable password command is the default authentication login method.
This is the same as entering the command aaa authentication enable default
enable.
On a console, the enable password is used if a password exists. If no password
is set, authentication still succeeds. This is the same as entering the
command aaa authentication enable default enable none.
Command Mode
Global Configuration mode
User Guidelines
The default and additional list names created with the aaa authentication
enable command are used with the enable authentication command.
All aaa authentication enable default requests sent by the device to a
RADIUS or TACACS+ server include the username $enabx$., where x is the
requested privilege level.
Create a list by entering the aaa authentication enable list-name method
command where list-name is any character string used to name this list. The
method argument identifies the list of methods that the authentication
algorithm tries, in the given sequence.
The additional methods of authentication are used only if the previous
method returns an error, not if it fails. Specify none as the final method in the
command line to ensure that the authentication succeeds even if all methods
return an error.
Example
The following example sets the enable password for authentication for
accessing higher privilege levels.
Console(config)# aaa authentication enable default enableAAA Commands 223
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\AAA.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
login authentication
The login authentication Line Configuration mode command specifies the
login authentication method list for a remote Telnet or console session. Use
the no form of this command to restore the default authentication method.
Syntax
login authentication {default | list-name}
no login authentication
Parameters
• default—Uses the default list created with the aaa authentication login
command.
• list-name—Uses the specified list created with the aaa authentication
login command. (Length: 1–12 characters).
Default Configuration
The default is the aaa authentication login command default.
Command Mode
Line Configuration mode
Example
The following example specifies the login authentication method for a
console session.
Console(config)# line console
Console(config-line)# login authentication default
enable authentication
The enable authentication Line Configuration mode command specifies the
authentication method for accessing a higher privilege level from a remote
Telnet or console. Use the no form of this command to restore the default
authentication method.224 AAA Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\AAA.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Syntax
enable authentication {default | list-name}
no enable authentication
Parameters
• default—Uses the default list created with the aaa authentication enable
command.
• list-name—Uses the specified list created with the aaa authentication
enable command. (Length: 1–12 characters).
Default Configuration
The default is the aaa authentication enable command default.
Command Mode
Line Configuration mode
Example
The following example specifies the authentication method when accessing a
higher privilege level from a console.
Console(config)# line console
Console(config-line)# enable authentication default
ip http authentication
The ip http authentication Global Configuration mode command specifies
authentication methods for HTTP server access. Use the no form of this
command to restore the default authentication method.
Syntax
ip http authentication aaa login-authentication method1 [method2...]
no ip http authentication aaa login-authentication
Parameters
method [method2 ...]—Specifies a list of methods that the authentication
algorithm tries, in the given sequence. The additional authentication AAA Commands 225
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\AAA.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
methods are used only if the previous method returns an error, not if it fails.
Specify none as the final method in the command line to ensure that the
authentication succeeds, even if all methods return an error. Select one or
more methods from the following list:
Default Configuration
The local user database is the default authentication login method. This is
the same as entering the ip http authentication local command.
Command Mode
Global Configuration mode
User Guidelines
The command is relevant for HTTP and HTTPS server users.
The additional methods of authentication are used only if the previous
method returns an error, not if it fails. Specify none as the final method in the
command line to ensure that the authentication succeeds, even if all methods
return an error.
Example
The following example specifies the HTTP access authentication methods.
Console(config)# ip http authentication aaa login-authentication
radius local
show authentication methods
The show authentication methods Privileged EXEC mode command displays
information about the authentication methods.
Keyword Description
local Uses the local username database for authentication.
none Uses no authentication.
radius Uses the list of all RADIUS servers for authentication.
tacacs Uses the list of all TACACS+ servers for authentication.226 AAA Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\AAA.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Syntax
show authentication methods
Command Mode
Privileged EXEC mode
Example
The following example displays the authentication configuration.
password
The password Line Configuration mode command specifies a password on a
line, also known as access method, such as a console or Telnet. Use the no
form of this command to return to the default password.
Console# show authentication methods
Login Authentication Method Lists
---------------------------------
Default: Radius, Local, Line
Console_Login: Line, None
Enable Authentication Method Lists
----------------------------------
Default: Radius, Enable
Console_Enable: Enable, None
Line
--------------
Console
Telnet
SSH
Login Method List
-----------------
Console_Login
Default
Default
Enable Method List
------------------
Console_Enable
Default
Default
HTTP: Radius, local
HTTPS: Radius, local
Dot1x: RadiusAAA Commands 227
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\AAA.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Syntax
password password [encrypted]
no password
Parameters
• password—Specifies the password for this line. (Length: 0–159 characters)
• encrypted—Specifies that the password is encrypted and copied from
another device configuration.
Default Configuration
No password is defined.
Command Mode
Line Configuration mode
Example
The following example specifies the password ‘secret’ on a console.
Console(config)# line console
Console(config-line)# password secret
service password-recovery
Use the service password-recovery global configuration mode command to
enable full functionality of the password-recovery mechanism. Use the no
service password-recovery command to allow password-recovery mechanism
without keeping the configuration and user files.
Syntax
service password-recovery
no service password-recovery
Parameters
N/A228 AAA Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\AAA.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Default Configuration
The full service password recovery is enabled by default.
Command Mode
Gobal Configuration mode
User Guidelines
This mechanism allows an end user, with physical access to the console port
of the device, to enter the boot menu and trigger the password recovery
process. The following functionality occurs:
• If password recovery is enabled, the user can access the boot menu and
trigger the password recovery in the boot menu. All configuration files and
user files are kept.
• If password recovery is disabled, the user still can access the boot menu
and trigger the password recovery in the boot menu. However, the
configuration files and user files are removed, and the following log
message is generated to the terminal: “All the configuration and user files
were removed”
Example
The following command disables password recovery:
console# no service password recovery
Note that choosing to use Password recovery option in the
Boot Menu during the boot process will remove the
configuration files and the user files. Would you like to
continue ? Y/N.
enable password
Use the enable password Global Configuration mode command to set a local
password to control access to normal and privilege levels. Use the no form of
this command to return to the default password.AAA Commands 229
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\AAA.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Syntax
enable password [ level privilege-level ] { password | encrypted encryptedpassword }
no enable password [ level level ]
Parameters
• level privilege-level—Level for which the password applies. If not specified
the level is 15. (Range: 1–15)
• password—Password for this level. (Range: 0–159 chars)
• encrypted-password—Encrypted password you enter, copied from another
device configuration.
Default
Default for level is 15.
Command Mode
Global Configuration mode
Example
console(config)# enable password level 15 let-me-in
username
Use the username Global Configuration mode command to establish a
username-based authentication system. Use the no form to remove a user
name.
Syntax
username name { nopassword | password password | privilege privilege-level
| password encrypted encrypted-password }
username name
no username name230 AAA Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\AAA.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Parameters
• name—The name of the user. (Range: 1–20 characters)
• nopassword—No password is required for this user to log in.
• password—The authentication password for the user. (Range: 1–159)
• password-encrypted—Encrypted password you enter, copied from another
device configuration.
• privilege privilege-level —Privilege level for which the password applies. If
not specified the level is 15. (Range: 1–15)
Default
No user is defined.
Command Mode
Global Configuration mode
Example
console(config)# username tom privilege 15 password 1234
show user accounts
The show user accounts Privileged EXEC mode command displays
information about the users local database.
Syntax
show user accounts
Command Mode
Privileged EXEC modeAAA Commands 231
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\AAA.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
The following example displays information about the users local database.
The following table describes the significant fields shown in the display:
aaa accounting login
Use the aaa accounting login command in Global Configuration mode to
enable accounting of device management sessions. Use the no form of this
command to disable accounting.
Syntax
aaa accounting login start-stop group radius
no aaa accounting login start-stop group radius
Parameters
This command has no arguments or keywords.
Default
Disabled
Command Mode
Global Configuration mode
Console# show user accounts
Username
--------
Bob
Robert
Smith
Privilege
---------
15
15
15
Field Description
Username The user name.
Privilege The user’s privilege level.232 AAA Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\AAA.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
User Guidelines
This command enables the recording of device management sessions (Telnet,
serial and WEB but not SNMP).
It records only users that were identified with a username (e.g. a user that was
logged in with a line password is not recorded).
If accounting is activated, the device sends a “start”/“stop” messages to a
Radius server when a user logs in / logs out respectively.
The device uses the configured priorities of the available Radius servers in
order to select the Radius server.
The following table describes the supported Radius accounting Attributes
Values, and when they are sent by the switch.
Example
console(config)# aaa accounting login start-stop group radius
Name Start Stop Description
User-Name (1) Yes Yes User’s identity.
NAS-IP-Address (4) Yes Yes The switch IP address that is
used for the session with the
Radius server.
Class (25) Yes Yes Arbitrary value is included in all
accounting packets for a specific
session.
Called-Station-ID (30) Yes Yes The switch IP address that is
used for the management
session.
Calling-Station-ID (31) Yes Yes The user IP address.
Acct-Session-ID (44) Yes Yes A unique accounting identifier.
Acct-Authentic (45) Yes Yes Indicates how the supplicant was
authenticated.
Acct-Session-Time (46) No Yes Indicates how long the user was
logged in.
Acct-Terminate-Cause (49) No Yes Reports why the session was
terminated.AAA Commands 233
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\AAA.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
aaa accounting dot1x
To enable accounting of 802.1x sessions, use the aaa accounting dot1x Global
Configuration mode command. Use the no form of this command to disable
accounting.
Syntax
aaa accounting dot1x start-stop group radius
no aaa accounting dot1x start-stop group radius
Parameters
This command has no arguments or keywords.
Default
Disabled
Command Mode
Global Configuration mode
User Guidelines
This command enables the recording of 802.1x sessions.
If accounting is activated, the device sends a “start”/“stop” messages to a
Radius server when a user logs in / logs out to the network, respectively.
The device uses the configured priorities of the available Radius servers in
order to select the Radius server.
If a new replaces an old supplicant (even if the port state remains authorized),
the software sends a “stop” message for the old supplicant and a “start”
message for the new supplicant.
In multiple sessions mode (dot1x multiple-hosts authentication), the
software sends “start”/“stop” messages for each authenticated supplicant.
In multiple hosts mode (dot1x multiple-hosts), the software sends
“start”/“stop” messages only for the supplicant that has been authenticated.234 AAA Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\AAA.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
The software does not send “start”/“stop” messages if the port is forceauthorized.
The software does not send “start”/“stop” messages for hosts that are sending
traffic on the guest VLAN or on the unauthenticated VLANs.
The following table describes the supported Radius accounting Attributes
Values and when they are sent by the switch.
Example
console(config)# aaa accounting dot1x start-stop group radius
Name Start Stop Description
User-Name (1) Yes Yes Supplicant’s identity.
NAS-IP-Address (4) Yes Yes The switch IP address that is used
for the session with the Radius
server.
NAS-Port (5) Yes Yes The switch port from where the
supplicant has logged in.
Class (25) Yes Yes Arbitrary value is included in all
accounting packets for a specific
session.
Called-Station-ID (30) Yes Yes The switch MAC address.
Calling-Station-ID (31) Yes Yes The supplicant MAC address.
Acct-Session-ID (44) Yes Yes A unique accounting identifier.
Acct-Authentic (45) Yes Yes Indicates how the supplicant was
authenticated.
Acct-Session-Time (46) No Yes Indicated how long the supplicant
was logged in.
Acct-Terminate-Cause (49) No Yes Reports why the session was
terminated.
Nas-Port-Type (61) Yes Yes Indicates the supplicant physical port
type.AAA Commands 235
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\AAA.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
show accounting
The show accounting EXEC mode command displays information about the
accounting status.
Syntax
show accounting
Command Mode
EXEC mode
Example
The following example displays information about the accounting status.
Console# show accounting
Login: Radius
802.1x: Disabled
passwords min-length
The passwords min-length Global Configuration mode command configures
the minimal password length in the local database. Use the no form of this
command to remove the restriction.
Syntax
passwords min-length length
no passwords min-length
Parameters
length—Specifies the minimal length required for passwords. (Range: 8-64)
Default Configuration
There is no minimal length requirement until this command is executed.236 AAA Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\AAA.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Command Mode
Global Configuration mode
User Guidelines
The setting is relevant to local user passwords, line passwords, and enable
passwords.
The software checks the minimum length requirement when defining a
password in an unencrypted format, or when a user tries to log in.
Note that if a password is inserted in encrypted format, the minimum length
requirement is checked during user login only.
Passwords that were defined before defining the minimum length
requirement are only checked during user login.
Example
The following example configures the minimal required password length to 8
characters.
Console (config)# passwords min-length 8
passwords strength-check enable
Use the passwords strength-check enable Global Configuration mode
command to enforce minimum password strength. The no form of this
command disables enforcing password strength.
Syntax
passwords strength-check enable
no passwords strength-check enable
Parameters
This command has no arguments or keywords
Default
DisabledAAA Commands 237
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\AAA.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Command Mode
Global Configuration mode
User Guidelines
If password strength is enabled, the user is forced to enter passwords that:
• Contain characters from user-defined several character classes (uppercase
letters, lowercase letters, numbers, and special characters available on a
standard keyboard).
• Contain no character that is repeated more than user-defined times
consecutively.
The user can control the above attributes of password strength with specific
commands.
Example
The following example enables password strength and configures the
character classes to 3.
Console (config)# passwords strength-check enable
Console (config)# passwords strength minimum character-classes 3
passwords strength minimum character-classes
Use the passwords strength minimum character-classes Global Configuration
mode command to configure the minimal classes required for passwords in
the local database. Use the no form to remove the requirement.
Syntax
passwords strength minimum character-classes number
no passwords strength minimum character-classes
Parameters
number—The minimal length required for passwords.(Range: 0–4)
Default
0238 AAA Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\AAA.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Command Mode
Global Configuration mode
User Guidelines
The setting is relevant to local users’ passwords, line passwords and enable
passwords.
The software checks the minimum length requirement when you define a
password in an unencrypted format.
The classes are: upper case letters, lower case letters, numbers and special
characters.
passwords strength max-limit repeatedcharacters
Use the passwords strength max-limit repeated-characters Global
Configuration mode command to configure the maximum number of
characters in the new password that can be repeated consecutively. Use the no
form to remove the requirement.
Syntax
passwords strength max-limit repeated-characters number
no passwords strength max-limit repeated-characters
Parameters
number—The maximum number of characters in the new password that can
be repeated consecutively. (Range: 1–16)
Default
1
Command Mode
Global Configuration modeAAA Commands 239
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\AAA.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
User Guidelines
The setting is relevant to local users’ passwords, line passwords and enable
passwords. The software checks the maximum number of characters in the
new password that can be repeated consecutively.
passwords aging
Use the passwords aging Global Configuration mode command to enforce
password aging. Use the no form of this command to return to default.
Syntax
passwords aging days
no passwords aging
Parameters
days—Specifies the number of days before a password change is forced. You
can use 0 to disable aging. (Range: 0–365)
Default
Disabled
Command Mode
Global Configuration mode
User Guidelines
Aging is relevant only to users of the local database with privilege level 15 and
to “enable” a password of privilege level 15.
Example
The following example configures the aging time to be 24.
Console (config)# passwords aging 24240 AAA Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\AAA.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
passwords history
The passwords history Global Configuration mode command configures the
number of password changes required before a password can be reused. Use
the no form of this command to remove the requirement.
Syntax
passwords history number
no passwords history
Parameters
number—Specifies the number of password changes required before a
password can be reused. (Range: 1–8)
Default Configuration
Password history is disabled.
Command Mode
Global Configuration mode
User Guidelines
The setting is relevant to local users’ passwords, line passwords and enable
passwords.
Password history is not checked during a configuration download.
The password history is kept even if the password history check is disabled.
The password history for a user is kept as long as the user is defined.
Example
The following example sets the number of password changes required before a
password can be reused to 10.
Console(config)# passwords history 10AAA Commands 241
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\AAA.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
passwords history hold-time
The passwords history hold-time Global Configuration mode command
configures the duration that a password is relevant for tracking passwords
history. Use the no form of this command to return to the default
configuration.
Syntax
passwords history hold-time days
no passwords history hold-time
Parameters
days—Specifies the number of days a password is relevant for tracking
passwords history. (Range: 1–365)
Default Configuration
Command Mode
Global Configuration mode
User Guidelines
The setting is relevant to local users’ passwords, line passwords and enable
passwords.
The passwords are not deleted from the history database when they are not
relevant for the password history tracking. Increasing the hold time might
"return back" passwords.
Example
The following example configures the duration that a password is relevant for
tracking passwords history.
Console(config)# passwords history hold-time 10242 AAA Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\AAA.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
passwords lockout
The passwords lockout Global Configuration mode command enables user
account lockout after a series of authentication failures. Use the no form of
this command to disable the lockout feature.
Syntax
passwords lockout number
no passwords lockout
Parameters
number—Specifies the number of authentication failures before the user
account is locked-out. (Range: 1–5)
Default Configuration
Lockout is disabled.
Command Mode
Global Configuration mode
User Guidelines
The setting is relevant to local users’ passwords, line passwords and enable
passwords.
The account is not locked out for access from the local console.
A user with privilege level 15 can release accounts that are locked out by using
the set username active, set enable-password active and set line active
Privileged EXEC mode commands.
Disabling lockout unlocks all users.
Re-enabling lockout resets the authentication failures counters.
Changing the authentication failures threshold does not reset the counters.AAA Commands 243
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\AAA.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
The following example enables user account lockout after 3 successive
authentication failures.
Console(config)# passwords lockout 3
aaa login-history file
The aaa login-history file Global Configuration mode command enables
writing to the login history file. Use the no form of this command to disable
writing to the login history file.
Syntax
aaa login-history file
no aaa login-history file
Default Configuration
Writing to the login history file is enabled.
Command Mode
Global Configuration mode
User Guidelines
The login history is stored in the device internal buffer.
Example
The following example enables writing to the login history file.
Console(config)# aaa login-history file
set username active
The set username active Privileged EXEC mode command reactivates a
locked out user account.244 AAA Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\AAA.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Syntax
set username name active
Parameters
name—Specifies the user name: (Length: 1–20 characters)
Default Configuration
There is no default configuration for this command.
Command Mode
Privileged EXEC mode
Example
The following example reactivates user ‘Bob’.
Console(config)# set username Bob active
set line active
The set line active Privileged EXEC mode command reactivates a locked out
line.
Syntax
set line {console | telnet | ssh} active
Parameters
• console—Reactivates the console terminal line.
• telnet—Reactivates the virtual terminal for remote (Telnet) console
access.
• ssh—Reactivates the virtual terminal for secured remote (SSH) console
access.
Default Configuration
There is no default configuration for this command.AAA Commands 245
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\AAA.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Command Mode
Privileged EXEC mode
Example
The following example reactivates the virtual terminal for remote (Telnet)
console access.
Console(config)# set line telnet active
set enable-password active
The set enable-password active Privileged EXEC mode command reactivates
a locked out local password.
Syntax
set enable-password level active
Parameters
level—Specifies the privilege level to which the password applies. (Range
1–15)
Default Configuration
There is no default configuration for this command.
Command Mode
Privileged EXEC mode
Example
The following example reactivates a local password that applies to privilege
level 1.
Console(config)# set enable-password 1 active246 AAA Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\AAA.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
show passwords configuration
The show passwords configuration Privileged EXEC mode command displays
information about the password management configuration.
Syntax
show passwords configuration
Parameters
Command Mode
Privileged EXEC mode
Example
Console# show passwords configuration
Passwords aging is enabled with aging time 180 days.
Minimal length: 8
Minimum character classes: 4
Maximal number of repeated characters: 2
History: 10
History hold time: 365 days
Lockout control: Disabled
Enable Passwords
Level Lockout
----- ---------
1 1
15 0
Line Passwords
Line Lockout
----- ------------
ConsoleTelnet LOCKOUT
SSH 0AAA Commands 247
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\AAA.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
The following table describes the significant fields shown in the display:
show users login-history
The show users login-history Privileged EXEC mode command displays
information about the user’s login history.
Syntax
show users login-history [username name]
Parameters
name—Name of the user. (Range: 1–20 characters)
Field Description
Minimal length The minimal length required for passwords in the local
database.
Minimal character
classes
The minimal number of different types of characters (special
characters, integers and so on) required to be part of the
password.
Maximum number
of repeated
characters
The maximum number of times a singe character can be
repeated in the password.
History The number of password changes required before a password
in the local database can be reused.
History hold time The duration that a password is relevant for tracking password
history.
Lockout control The user account lockout control status after a series of
authentication failures.
Level The applied password privilege level.
Aging The password aging time in days.
Expiry date The password expiration date.
Lockout If lockout control is enabled, the specific number of times a
user failed to enter the correct password since the last
successful login is displayed. If the user is locked out,
"LOCKOUT" is displayed.
Line The applied password line type.248 AAA Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\AAA.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Command Mode
Privileged EXEC mode
Example
The following example displays information about the users’ login history.
Console# show users login-history
File save: Enabled.
Login Time
--------------------
Jan 18 2004 23:58:17
Jan 19 2004 07:59:23
Jan 19 2004 08:23:48
Jan 19 2004 08:29:29
Jan 19 2004 08:42:31
Jan 19 2004 08:49:52
Username
----------
Robert
Robert
Bob
Robert
John
Betty
Protocol
----------
HTTP
HTTP
Serial
HTTP
SSH
Telnet
Location
------------
172.16.1.8
172.16.0.8
172.16.0.8
172.16.0.1
172.16.1.7RADIUS Commands 249
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Radius.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
15
RADIUS Commands
radius-server host
Use the radius-server host Global Configuration mode command to specify a
RADIUS server host. Use the no form of the command to delete the specified
RADIUS server host.
Syntax
radius-server host {ipv4-address | ipv6-address | ipv6z-address | hostname}
[auth-port auth-port-number] [timeout timeout] [retransmit retries]
[deadtime deadtime] [key key-string] [source {ipv4-address | ipv6-address}]
[priority priority] [usage {login | 802.1x | all}]
no radius-server host {ipv4-address | ipv6-address | hostname}
Parameters
• ipv4-address—Specifies the RADIUS server host IPv4 address.
• ipv6-address—Specifies the RADIUS server host IPv6 address.
• ipv6z-address—Specifies the RADIUS server host IPv6Z address. The
IPv6Z address format is: {ipv6-link-local-address}%{interface-name}.
The subparameters are:
• ipv6-link-local-address—Specifies the IPv6 Link Local address.
• interface-name—Specifies the outgoing interface name. The interface
name has the format:
vlan{integer} | ch{integer} | isatap{integer} | {physical-portname}.
• The subparameter integer has the format: {decimal-digit} |
{integer}{decimal-digit}. decimal-digit has the range 0–9.250 RADIUS Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Radius.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
• hostname—Specifies the RADIUS server host name. Translation to IPv4
addresses only is supported. (Length: 1–158 characters. Maximum label
length: 63 characters)
• auth-port auth-port-number—Specifies the port number for
authentication requests. If the port number is set to 0, the host is not used
for authentication. (Range: 0–65535)
• timeout timeout—Specifies the timeout value in seconds. (Range: 1–30)
• retransmit retries—Specifies the retransmit value. (Range: 1–10)
• deadtime deadtime—Specifies the length of time in minutes during
which a RADIUS server is skipped over by transaction requests. (Range:
0–2000)
• key key-string—Specifies the authentication and encryption key for all
RADIUS communications between the device and the RADIUS server.
This key must match the encryption used on the RADIUS daemon. To
specify an empty string, enter "". (Length: 0–128 characters)
• source {ipv4-address | ipv6-address}—Specifies the source IPv4 or IPv6
address to use for communication. 0.0.0.0 is interpreted as a request to use
the IP address of the outgoing IP interface.
• priority priority—Specifies the order in which servers are used, where 0
has the highest priority. (Range: 0–65535)
• usage {login | 802.1x | all}—Specifies the RADIUS server usage type.
The possible values are:
• login—Specifies that the RADIUS server is used for user login
parameters authentication.
• 802.1x—Specifies that the RADIUS server is used for 802.1x port
authentication.
• all—Specifies that the RADIUS server is used for user login
parameters authentication and 802.1x port authentication.
Default Configuration
No RADIUS host is specified; the global radius-server command values are
the default values.
The default authentication port number is 1812.
If timeout is not specified, the global value is used.RADIUS Commands 251
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Radius.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
If retransmit is not specified, the global value is used.
If key-string is not specified, the global value is used.
If the source value is not specified, the global value is used.
The default usage type is all.
Command Mode
Global Configuration mode
User Guidelines
To specify multiple hosts, multiple radius-server host commands can be used.
If no host-specific timeout, retries, deadtime or key-string values are
specified, the global values apply to each RADIUS server host.
The source parameter address type must be the same as that of the host
parameter.
Example
The following example specifies a RADIUS server host with IP address
192.168.10.1, authentication request port number 20, and a 20-second
timeout period.
Console(config)# radius-server host 192.168.10.1 auth-port 20
timeout 20
radius-server key
Use the radius-server key Global Configuration mode command to set the
authentication and encryption key for all RADIUS communications between
the device and the RADIUS daemon. Use the no form of this command to
restore the default configuration.
Syntax
radius-server key [key-string]
no radius-server key252 RADIUS Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Radius.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Parameters
key-string—Specifies the authentication and encryption key for all RADIUS
communications between the device and the RADIUS server. This key must
match the encryption used on the RADIUS daemon. (Range: 0–128
characters)
Default Configuration
The key-string is an empty string.
Command Mode
Global Configuration mode
Example
The following example defines the authentication and encryption key for all
RADIUS communications between the device and the RADIUS daemon.
Console(config)# radius-server key enterprise-server
radius-server retransmit
Use the radius-server retransmit Global Configuration mode command to
specify the number of times the software searches the list of RADIUS server
hosts. Use the no form of this command to restore the default configuration.
Syntax
radius-server retransmit retries
no radius-server retransmit
Parameters
retries—Specifies the retransmit value. (Range: 1–10)
Default Configuration
The software searches the list of RADIUS server hosts 3 times.
Command Mode
Global Configuration modeRADIUS Commands 253
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Radius.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
The following example configures the number of times the software searches
all RADIUS server hosts as 5.
console(config)# radius-server retransmit 5
radius-server source-ip
Use the radius-server source-ip Global Configuration mode command to
specify the source IP address used for communication with RADIUS servers.
Use the no form of this command to restore the default configuration.
Syntax
radius-server source-ip {source}
no radius-server source-ip {source}
Parameters
source—Specifies the source IP address.
Default Configuration
The source IP address is the IP address of the outgoing IP interface.
Command Mode
Global Configuration mode
User Guidelines
If there is no available IP interface of the configured IP source address, an
error message is issued when attempting to communicate with the IP address.
Example
The following example configures the source IP address used for
communication with all RADIUS servers to 10.1.1.1.
console(config)# radius-server source-ip 10.1.1.1254 RADIUS Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Radius.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
radius-server source-ipv6
Use the radius-server source-ipv6 Global Configuration mode command to
specify the source IPv6 address used for communication with RADIUS
servers. Use the no form of this command to restore the default
configuration.
Syntax
radius-server source-ipv6 {source}
no radius-server source-ipv6 {source}
Parameters
source—Specifies the source IPv6 address.
Default Configuration
The source IP address is the IP address of the outgoing IP interface.
Command Mode
Global Configuration mode
User Guidelines
If there is no available IP interface of the configured IP source address, an
error message is issued when attempting to communicate with the IP address.
Example
The following example configures the source IP address used for
communication with all RADIUS servers to
3ffe:1900:4545:3:200:f8ff:fe21:67cf.
console(config)# radius-server source-ipv6
3ffe:1900:4545:3:200:f8ff:fe21:67cfRADIUS Commands 255
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Radius.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
radius-server timeout
Use the radius-server timeout Global Configuration mode command to set
the time interval during which the device waits for a server host to reply. Use
the no form of this command to restore the default configuration.
Syntax
radius-server timeout timeout
no radius-server timeout
Parameters
timeout—Specifies the timeout value in seconds. (Range: 1–30)
Default Configuration
The default timeout value is 3 seconds.
Command Mode
Global Configuration mode
Example
The following example sets the timeout interval on all RADIUS servers to 5
seconds.
Console(config)# radius-server timeout 5
radius-server deadtime
Use the radius-server deadtime Global Configuration mode command to
configure the time interval during which unavailable RADIUS servers are
skipped over by transaction requests. This improves RADIUS response time
when servers are unavailable. Use the no form of this command to restore the
default configuration.
Syntax
radius-server deadtime deadtime
no radius-server deadtime256 RADIUS Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Radius.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Parameters
deadtime—Specifies the time interval in minutes during which a RADIUS
server is skipped over by transaction requests. (Range: 0–2000)
Default Configuration
The default deadtime interval is 0.
Command Mode
Global Configuration mode
Example
The following example sets all RADIUS server deadtimes to 10 minutes.
Console(config)# radius-server deadtime 10
show radius-servers
Use the show radius-servers Privileged EXEC mode command to display the
RADIUS server settings.
Syntax
show radius-servers
Command Mode
Privileged EXEC modeRADIUS Commands 257
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Radius.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
The following example displays RADIUS server settings.
Console# show radius-servers
IP address
----------
172.16.1.1
172.16.1.2
Port
Auth
----
1812
1812
Port
Acct
----
1813
1813
Time
Out
-----
Global
11
Retrans
mit
-------
Global
8
Dead
time
------
Global
Global
Source
IP
------
Global
Global
Priority
--------
1
2
Usage
-----
All
All
Global values
--------------
TimeOut: 3
Retransmit: 3
Deadtime: 0
Source IP: 172.16.8.1258 RADIUS Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Radius.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LYTACACS+ Commands 259
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\TACACS.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
16
TACACS+ Commands
tacacs-server host
Use the tacacs-server host Global Configuration mode command to specify a
TACACS+ host. Use the no form of this command to delete the specified
TACACS+ host.
Syntax
tacacs-server host {ip-address | hostname} [single-connection] [port portnumber] [timeout timeout] [key key-string] [source {source}] [priority
priority]
no tacacs-server host {ip-address | hostname}
Parameters
• ip-address—Specifies the TACACS+ server host IP address.
• hostname—Specifies the TACACS+ server host name. (Length: 1-158
characters. Maximum label length: 63 characters)
• single-connection—Specifies that a single open connection is maintained
between the device and the daemon, instead of the device opening and
closing a TCP connection to the daemon each time it communicates.
• port port-number—Specifies the server port number. If the port number is
0, the host is not used for authentication. (Range: 0–65535)
• timeout timeout—Specifies the timeout value in seconds. (Range: 1–30)
• key key-string—Specifies the authentication and encryption key for all
TACACS+ communications between the device and the TACACS+
server. This key must match the encryption used on the TACACS+
daemon. To specify an empty string, enter "". (Length: 0-128 characters)260 TACACS+ Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\TACACS.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
• source {source}—Specifies the source IP to use for the communication.
0.0.0.0 indicates a request to use the outgoing IP interface IP address.
• priority priority—Specifies the order in which the TACACS+ servers are
used, where 0 is the highest priority. (Range: 0–65535)
Default Configuration
No TACACS+ host is specified.
The default port-number is 49.
If timeout is not specified, the global value is used.
If key-string is not specified, the global value is used.
If source is not specified, the global value is used.
Command Mode
Global Configuration mode
User Guidelines
Multiple tacacs-server host commands can be used to specify multiple hosts.
If no host-specific timeout, key, or source values are specified, the global
values apply to each host. Example
The following example specifies a TACACS+ host.
Console(config)# tacacs-server host 172.16.1.1
tacacs-server key
Use the tacacs-server key Global Configuration mode command to ses the
authentication encryption key used for all TACACS+ communications
between the device and the TACACS+ daemon. Use the no form of this
command to disable the key.
Syntax
tacacs-server key key-string
no tacacs-server keyTACACS+ Commands 261
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\TACACS.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Parameters
key-string—Specifies the authentication and encryption key for all
TACACS+ communications between the device and the TACACS+ server.
This key must match the encryption used on the TACACS+ daemon.
(Length: 0–128 characters)
Default Configuration
The default key is an empty string.
Command Mode
Global Configuration mode
Example
The following example sets Enterprise as the authentication encryption key
for all TACACS+ servers.
Console(config)# tacacs-server key enterprise
tacacs-server timeout
Use the tacacs-server timeout Global Configuration mode command to set
the interval during which the device waits for a TACACS+ server to reply.
Use the no form of this command to restore the default configuration.
Syntax
tacacs-server timeout timeout
no tacacs-server timeout
Parameters
timeout—Specifies the timeout value in seconds. (Range: 1–30)
Default Configuration
The default timeout value is 5 seconds.
Command Mode
Global Configuration mode262 TACACS+ Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\TACACS.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
The following example sets the timeout value to 30 for all TACACS+ servers.
Console(config)# tacacs-server timeout 30
tacacs-server source-ip
Use the tacacs-server source-ip Global Configuration mode command to
configure the source IP address to be used for communication with
TACACS+ servers. Use the no form of this command to restore the default
configuration.
Syntax
tacacs-server source-ip {source}
no tacacs-server source-ip {source}
Parameters
source—Specifies the source IP address. (Range: Valid IP address)
Default Configuration
The default source IP address is the outgoing IP interface address.
Command Mode
Global Configuration mode
User Guidelines
If the configured IP source address has no available IP interface, an error
message is issued when attempting to communicate with the IP address.
Example
The following example specifies the source IP address for all TACACS+
servers.
Console(config)# tacacs-server source-ip 172.16.8.1TACACS+ Commands 263
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\TACACS.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
show tacacs
Use the show tacacs Privileged EXEC mode command to display
configuration and statistical information for a TACACS+ server.
Syntax
show tacacs [ip-address]
Parameters
ip-address—Specifies the TACACS+ server name or IP address.
Default Configuration
If ip-address is not specified, information for all TACACS+ servers is
displayed.
Command Mode
Privileged EXEC mode
Example
The following example displays configuration and statistical information for
all TACACS+ servers.
Console# show tacacs
IP address
--------
172.16.1.1
Status
--------
Connected
Port
---
49
Single
Connection
---------
No
Time
Out
-----
Global
Source
IP
-----
Global
Priority
------
1
Global values
-------------
TimeOut: 3
Source IP: 172.16.8.1264 TACACS+ Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\TACACS.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LYSyslog Commands 265
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Syslog.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
17
Syslog Commands
logging on
Use the logging on Global Configuration mode command to control error
message logging. This command sends debug or error messages to a logging
process, which logs messages asynchronously to designated locations for the
process that generated the messages. Use the no form of this command to
disable the logging process.
Syntax
logging on
no logging on
Default Configuration
Message logging is enabled.
Command Mode
Global Configuration mode
User Guidelines
The logging process controls the logging messages distribution at various
destinations, such as the logging buffer, logging file or syslog server. Logging
on and off at these destinations can be individually configured using the
logging buffered, logging file, and logging Global Configuration mode
commands. However, if the logging on command is disabled, no messages are
sent to these destinations. Only the console receives messages.266 Syslog Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Syslog.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
The following example enables logging error messages.
Console(config)# logging on
Logging host
Use the logging host global configuration command to log messages to a
syslog server. Use the no form of this command to delete the syslog server
with the specified address from the list of syslogs.
Syntax
logging host {ipv4-address | ipv6-address | hostname} [port port] [severity
level] [facility facility] [description text]
no logging host {ipv4-address | ipv6-address | hostname}
Parameters
• ipv4-address—IPv4 address of the host to be used as a syslog server.
• ipv6-address—Pv6 address of the host to be used as a syslog server. When
the IPv6 address is a Link Local address (IPv6Z address), the outgoing
interface name must be specified. Refer to the User Guidelines for the
interface name syntax.
• hostname—Hostname of the host to be used as a syslog server. Only
translation to IPv4 addresses is supported. (Range: 1–158 characters.
Maximum label size: 63)
• port—Port number for syslog messages. If unspecified, the port number
defaults to 514. (Range: 1–65535)
• level—Limits the logging of messages to the syslog servers to a specified
level: emergencies, alerts, critical, errors, warnings, notifications,
informational, debugging.
• facility—The facility that is indicated in the message. It can be one of the
following values: local0, local1 , local2 , local3 , local4 , local5 , local 6,
local7. If unspecified, the port number defaults to local7.
• text—Description of the syslog server. (Range: Up to 64 characters)Syslog Commands 267
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Syslog.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Default
No messages are logged to a syslog server host.
Command Mode
Global Configuration mode
User Guidelines
You can use multiple syslog servers.
The format of an IPv6Z address is: %
interface-name = vlan | ch | isatap |
| 0
integer = |
decimal-number = 0 | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9
physical-port-name = Designated port number, for example 1/0/16.
If the egress interface is not specified, the default interface is selected.
Specifying interface zone=0 is equal to not defining an egress interface.
Examples
console(config)# logging host 1.1.1.121
console(config)# logging host 3000::100
logging console
Use the logging console Global Configuration mode command to limit
messages logged to the console to messages with a specific severity level. Use
the no form of this command to disable logging limiting to the console.
Syntax
logging console level
no logging console268 Syslog Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Syslog.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Parameters
level—Specifies the severity level of logged messages displayed on the
console. The possible values are: emergencies, alerts, critical, errors, warnings,
notifications, informational and debugging.
Default Configuration
The default severity level is informational.
Command Mode
Global Configuration mode
Example
The following example limits logging messages displayed on the console to
messages with severity level errors.
Console(config)# logging console errors
logging buffered
Use the logging buffered Global Configuration mode command to limit the
syslog message display from an internal buffer to messages with a specific
severity leve, and to define the buffer sizel. Use the no form of this command
to cancel using the buffer and returning the buffer size to defult
Syntax
logging buffered [buffer-size] [severity-level]
no logging buffered
Parameters
buffer-size—Specifies the maximum number of messages stored in the
history table. (Range: 20–400)
severity-level—Specifies the severity level of messages logged in the buffer.
The possible values are: emergencies, alerts, critical, errors, warnings,
notifications, informational and debugging.Syslog Commands 269
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Syslog.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Default Configuration
The default severity level is informational.
Command Mode
Global Configuration mode
User Guidelines
All the syslog messages are logged to the internal buffer. This command limits
the messages displayed to the user.
Example
The following example limits the syslog message display from an internal
buffer to messages with severity level debugging.
Console(config)# logging buffered debugging
clear logging
Use the clear logging Privileged EXEC mode command to clear messages
from the internal logging buffer.
Syntax
clear logging
Command Mode
Privileged EXEC mode
Example
The following example clears messages from the internal logging buffer.
Console# clear logging
Clear logging buffer [confirm]270 Syslog Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Syslog.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
logging file
Use the logging file Global Configuration mode command to limit syslog
messages sent to the logging file to messages with a specific severity level. Use
the no form of this command to cancel using the buffer.
Syntax
logging file level
no logging file
Parameters
level—Specifies the severity level of syslog messages sent to the logging file.
The possible values are: emergencies, alerts, critical, errors, warnings,
notifications, informational and debugging.
Default Configuration
The default severity level is errors.
Command Mode
Global Configuration mode
Example
The following example limits syslog messages sent to the logging file to
messages with severity level alerts.
Console(config)# logging file alerts
clear logging file
Use the clear logging file Privileged EXEC mode command to clear messages
from the logging file.
Syntax
clear logging fileSyslog Commands 271
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Syslog.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Command Mode
Privileged EXEC mode
Example
The following example clears messages from the logging file.
Console# clear logging file
Clear Logging File [y/n]
aaa logging
Use the aaa logging Global Configuration mode command to enable logging
AAA login events. Use the no form of this command to disable logging AAA
login events.
Syntax
aaa logging {login}
no aaa logging {login}
Parameters
login—Enables logging messages related to successful AAA login events,
unsuccessful AAA login events and other AAA login-related events.
Default Configuration
Logging of AAA login events is enabled.
Command Mode
Global Configuration mode
User Guidelines
This command enables logging messages related to successful login events,
unsuccessful login events and other login-related events. Other types of AAA
events are not subject to this command.272 Syslog Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Syslog.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
The following example enables logging messages related to AAA login events.
Console(config)# aaa logging login
file-system logging
Use the file-system logging Global Configuration mode command to enable
the logging of file system events. Use the no form of this command to disable
logging file system events.
Syntax
file-system logging {copy | delete-rename}
no file-system logging {copy | delete-rename}
Parameters
• copy—Specifies logging messages related to file copy operations.
• delete-rename—Specifies logging messages related to file deletion and
renaming operations.
Default Configuration
Logging file system events is enabled.
Command Mode
Global Configuration mode
Example
The following example enables logging messages related to file copy
operations.
Console(config)# file-system logging copySyslog Commands 273
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Syslog.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
management logging
Use the management logging Global Configuration mode command to
enable logging Management Access List (ACL) deny events. Use the no form
of this command to disable logging management access list events.
Syntax
management logging {deny}
no management logging {deny}
Parameters
deny—Enables logging messages related to management ACL deny actions.
Default Configuration
Logging management ACL deny events is enabled.
Command Mode
Global Configuration mode
User Guidelines
Other management ACL events are not subject to this command.
Example
The following example enables logging messages related to management ACL
deny actions.
Console(config)# management logging deny
show logging
Use the show logging Privileged EXEC mode command to display the logging
status and the syslog messages stored in the internal buffer.
Syntax
show logging274 Syslog Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Syslog.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Command Mode
Privileged EXEC mode
Example
The following example displays the logging status and the syslog messages
stored in the internal buffer.
console# show logging
Logging is enabled.
Console Logging: Level info. Console Messages: 0 Dropped.
Buffer Logging: Level info. Buffer Messages: 61 Logged, 61 Displayed, 200
Max.
File Logging: Level error. File Messages: 898 Logged, 64 Dropped.
4 messages were not logged
Application filtering control
Application Event Status
-------------------- ---------------- ---------
AAA Login Enabled
File system Copy Enabled
File system Delete-Rename Enabled
Management ACL Deny Enabled
Aggregation: Disabled.
Aggregation aging time: 300 Sec
01-Jan-2010 05:29:46 :%INIT-I-Startup: Warm Startup
01-Jan-2010 05:29:02 :%LINK-I-Up: Vlan 1
01-Jan-2010 05:29:02 :%LINK-I-Up: gi1/0/48
01-Jan-2010 05:29:02 :%LINK-I-Up: gi1/0/47
01-Jan-2010 05:29:00 :%LINK-W-Down: gi1/0/48
show logging file
Use the show logging file Privileged EXEC mode command to display the
logging status and the syslog messages stored in the logging file.Syslog Commands 275
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Syslog.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Syntax
show logging file
Command Mode
Privileged EXEC mode
Example
The following example displays the logging status and the syslog messages
stored in the logging file.
Logging is enabled.
Console Logging: Level info. Console Messages: 0 Dropped.
Buffer Logging: Level info. Buffer Messages: 61 Logged, 61 Displayed, 200
Max.
File Logging: Level error. File Messages: 898 Logged, 64 Dropped.
4 messages were not logged
Application filtering control
Application Event Status
----------------- ---------------- ---------
AAA Login Enabled
File system Copy Enabled
File system Delete-Rename Enabled
Management ACL Deny Enabled
Aggregation: Disabled.
Aggregation aging time: 300 Sec
01-Jan-2010 05:57:00 :%SSHD-E-ERROR: SSH error: key_read: type mismatch:
encoding error
01-Jan-2010 05:56:36 :%SSHD-E-ERROR: SSH error: key_read: type mismatch:
encoding error
01-Jan-2010 05:55:37 :%SSHD-E-ERROR: SSH error: key_read: type mismatch:
encoding error276 Syslog Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Syslog.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
01-Jan-2010 05:55:03 :%SSHD-E-ERROR: SSH error: key_read: key_from_blob
bgEgGnt9
z6NHgZwKI5xKqF7cBtdl1xmFgSEWuDhho5UedydAjVkKS5XR2... failed
01-Jan-2010 05:55:03 :%SSHD-E-ERROR: SSH error: key_from_blob: invalid key
type.
01-Jan-2010 05:56:34 :%SSHD-E-ERROR: SSH error: bad sigbloblen 58 !=
SIGBLOB_LEN
console#
show syslog-servers
Use the show syslog-servers Privileged EXEC mode command to display the
syslog server settings.
Syntax
show syslog-servers
Command Mode
Privileged EXEC mode
Example
The following example displays the syslog server settings.
console# show syslog-servers
Device Configuration
-----------------------------
IP address Port Severity Facility Description
------------- ---- --------- -------- --------------
1.1.1.121 514 info local7
3000::100 514 info local7
console#RMON Commands 277
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\RMON.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
18
RMON Commands
show rmon statistics
Use the show rmon statistics EXEC mode command to display RMON
Ethernet statistics.
Syntax
show rmon statistics {interface-id}
Parameters
interface-id—Specifies an interface ID. The interface ID can be one of the
following types: Ethernet port or Port-channel.
Command Mode
EXEC mode
Example
The following example displays RMON Ethernet statistics for gigabitethernet
port 1/0/1.
console# show rmon statistics gi1/0/1
Port gi1/0/1
Dropped: 0
Octets: 0 Packets: 0
Broadcast: 0 Multicast: 0
CRC Align Errors: 0 Collisions: 0
Undersize Pkts: 0 Oversize Pkts: 0
Fragments: 0 Jabbers: 0
64 Octets: 0 65 to 127 Octets: 1278 RMON Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\RMON.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
128 to 255 Octets: 1 256 to 511 Octets: 1
512 to 1023 Octets: 0 1024 to max Octets: 0
The following table describes the significant fields displayed.
Field Description
Dropped The total number of events in which packets were
dropped by the probe due to lack of resources. Note that
this number is not necessarily the number of packets
dropped. It is the number of times this condition was
detected.
Octets The total number of octets of data (including those in bad
packets) received on the network (excluding framing bits
but including FCS octets).
Packets The total number of packets (including bad packets,
broadcast packets, and multicast packets) received.
Broadcast The total number of good packets received and directed
to the broadcast address. This does not include multicast
packets.
Multicast The total number of good packets received and directed
to a multicast address. This number does not include
packets directed to the broadcast address.
CRC Align Errors The total number of packets received with a length
(excluding framing bits, but including FCS octets) of
between 64 and 1518 octets, inclusive, but with either a
bad Frame Check Sequence (FCS) with an integral
number of octets (FCS Error) or a bad FCS with a nonintegral number of octets (Alignment Error).
Collisions The best estimate of the total number of collisions on this
Ethernet segment.
Undersize Pkts The total number of packets received, less than 64 octets
long (excluding framing bits, but including FCS octets)
and otherwise well formed.
Oversize Pkts The total number of packets received, longer than 1518
octets (excluding framing bits, but including FCS octets)
and otherwise well formed.RMON Commands 279
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\RMON.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
rmon collection stats
Use the rmon collection stats Interface Configuration mode command to
enable Remote Monitoring (RMON) MIB history group of statistics on an
Fragments The total number of packets received, less than 64 octets
in length (excluding framing bits but including FCS octets)
and either a bad Frame Check Sequence (FCS) with an
integral number of octets (FCS Error) or a bad FCS with a
non-integral number of octets (Alignment Error).
Jabbers The total number of packets received, longer than 1518
octets (excluding framing bits, but including FCS octets),
and either a bad Frame Check Sequence (FCS) with an
integral number of octets (FCS Error) or a bad FCS with a
non-integral number of octets (Alignment Error).
64 Octets The total number of packets (including bad packets)
received that are 64 octets in length (excluding framing
bits but including FCS octets).
65 to 127 Octets The total number of packets (including bad packets)
received that are between 65 and 127 octets in length
inclusive (excluding framing bits but including FCS
octets).
128 to 255 Octets The total number of packets (including bad packets)
received that are between 128 and 255 octets in length
inclusive (excluding framing bits but including FCS
octets).
256 to 511 Octets The total number of packets (including bad packets)
received that are between 256 and 511 octets in length
inclusive (excluding framing bits but including FCS
octets).
512 to 1023 Octets The total number of packets (including bad packets)
received that were between 512 and 1023 octets in length
inclusive (excluding framing bits but including FCS
octets).
1024 to max The total number of packets (including bad packets)
received that were between 1024 octets and the
maximum frame size in length inclusive (excluding
framing bits but including FCS octets).
Field Description 280 RMON Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\RMON.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
interface. Use the no form of this command to remove a specified RMON
history group of statistics.
Syntax
rmon collection stats index [owner ownername] [buckets bucket-number]
[interval seconds]
no rmon collection stats index
Parameters
• index—The requested group of statistics index.(Range: 1–65535)
• owner ownername—Records the name of the owner of the RMON group
of statistics. If unspecified, the name is an empty string. (Range: Valid
string)
• buckets bucket-number—A value associated with the number of buckets
specified for the RMON collection history group of statistics. If
unspecified, defaults to 50.(Range: 1–50)
• interval seconds—The number of seconds in each polling cycle. If
unspecified, defaults to 1800 (Range: 1–3600).
Command Mode
Interface Configuration (Ethernet, Port-channel) mode. Cannot be
configured for a range of interfaces (range context).
show rmon collection stats
Use the show rmon collection stats EXEC mode command to display the
requested RMON history group statistics.
Syntax
show rmon collection stats [interface-id]
Parameters
interface-id—Specifies an interface ID. The interface ID can be one of the
following types: Ethernet port or Port-channel.RMON Commands 281
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\RMON.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Command Mode
EXEC mode
Example
The following example displays all RMON history group statistics.
The following table describes the significant fields shown in the display.
show rmon history
Use the show rmon history EXEC mode command to display RMON
Ethernet history statistics.
Syntax
show rmon history index {throughput | errors | other} [period seconds]
Parameters
• index—Specifies the set of samples to display. (Range: 1–65535)
• throughput—Displays throughput counters.
Console# show rmon collection stats
Index
-----
1
2
Interface
---------
gi1/0/1
gi1/0/1
Interval
--------
30
1800
Requested
Samples
---------
50
50
Granted
Samples
--------
50
50
Owner
-------
CLI
Manager
Field Description
Index An index that uniquely identifies the entry.
Interface The sampled Ethernet interface.
Interval The interval in seconds between samples.
Requested Samples The requested number of samples to be saved.
Granted Samples The granted number of samples to be saved.
Owner The entity that configured this entry.282 RMON Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\RMON.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
• errors—Displays error counters.
• other—Displays drop and collision counters.
• period seconds—Specifies the period of time in seconds to display.
(Range: 1–2147483647)
Command Mode
EXEC mode
Example
The following examples display RMON Ethernet history statistics for index 1
Console# show rmon history 1 throughput
Sample Set: 1
Interface: gi1/0/1
Requested samples: 50
Owner: CLI
Interval: 1800
Granted samples: 50
Maximum table size: 500
Time
------------
Jan 18 2005
21:57:00
Jan 18 2005
21:57:30
Octets
-------
303595962
287696304
Packets
-------
357568
275686
Broadcast
--------
3289
2789
Multicast
---------
7287
5878
Util
----
19%
20%
Console# show rmon history 1 errors
Sample Set: 1
Interface:gi1/0/1
Requested samples: 50
Owner: Me
Interval: 1800
Granted samples: 50
Maximum table size: 500 (800 after reset)
Time
------------
Jan 18 2005
21:57:00
CRC Align
-------
1
Under
size
-----
1
Oversize
--------
0
Fragments
---------
49
Jabbers
----
0
Jan 18 2005
21:57:30
1 1 0 2 7 0RMON Commands 283
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\RMON.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
The following table describes significant fields shown in the display:
Console# show rmon history 1 other
Sample Set: 1
Interface: gi1/0/1
Requested samples: 50
Owner: Me
Interval: 1800
Granted samples: 50
Maximum table size: 500
Time
-------------------
Jan 18 2005 21:57:00
Jan 18 2005 21:57:30
Dropped
------
3
3
Collisions
----------
0
0
Field Description
Time Date and Time the entry is recorded.
Octets The total number of octets of data (including those in bad
packets and excluding framing bits but including FCS octets)
received on the network.
Packets The number of packets (including bad packets) received during
this sampling interval.
Broadcast The number of good packets received during this sampling
interval that were directed to the broadcast address.
Multicast The number of good packets received during this sampling
interval that were directed to a multicast address. This number
does not include packets addressed to the broadcast address.
Utilization The best estimate of the mean physical layer network
utilization on this interface during this sampling interval, in
hundredths of a percent.
CRC Align The number of packets received during this sampling interval
that had a length (excluding framing bits but including FCS
octets) between 64 and 1518 octets, inclusive, but had either a
bad Frame Check Sequence (FCS) with an integral number of
octets (FCS Error) or a bad FCS with a non-integral number of
octets (Alignment Error).
Undersize The number of packets received during this sampling interval
that were less than 64 octets long (excluding framing bits but
including FCS octets) and were otherwise well formed.284 RMON Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\RMON.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
rmon alarm
Use the rmon alarm Global Configuration mode command to configure
alarm conditions. Use the no form of this command to remove an alarm.
Syntax
rmon alarm index mib-object-id interval rthreshold fthreshold revent fevent
[type {absolute | delta}]
[startup {rising | rising-falling | falling}] [owner name]
no rmon alarm index
Parameters
• index—Specifies the alarm index. (Range: 1–65535)
Oversize The number of packets received during this sampling interval
that were longer than 1518 octets (excluding framing bits but
including FCS octets) but were otherwise well formed.
Fragments The total number of packets received during this sampling
interval that were less than 64 octets in length (excluding
framing bits but including FCS octets) and had either a bad
Frame Check Sequence (FCS) with an integral number of
octets (FCS Error), or a bad FCS with a non-integral number of
octets (Alignment Error). It is normal for etherHistoryFragments
to increment because it counts both runts (which are normal
occurrences due to collisions) and noise hits.
Jabbers The number of packets received during this sampling interval
that were longer than 1518 octets (excluding framing bits but
including FCS octets), and had either a bad Frame Check
Sequence (FCS) with an integral number of octets (FCS Error)
or a bad FCS with a non-integral number of octets (Alignment
Error).
Dropped The total number of events in which packets were dropped by
the probe due to lack of resources during this sampling interval.
This number is not necessarily the number of packets dropped,
it is the number of times this condition has been detected.
Collisions The best estimate of the total number of collisions on this
Ethernet segment during this sampling interval.
Field Description RMON Commands 285
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\RMON.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
• mib-object-id—Specifies the object identifier of the variable to be
sampled. (Valid OID)
• interval—Specifies the interval in seconds during which the data is
sampled and compared with rising and falling thresholds. (Range:
1–4294967295)
• rthreshold—Specifies the rising threshold value. (Range: 0–4294967295)
• fthreshold—Specifies the falling threshold value. (Range: 0–4294967295)
• revent—Specifies the index of the event triggered when a rising threshold
is crossed. (Range: 0–65535)
• fevent—Specifies the index of the event triggered when a falling threshold
is crossed. (Range: 0–65535)
• type {absolute | delta}—Specifies the method used for sampling the
selected variable and calculating the value to be compared against the
thresholds. The possible values are:
• absolute—Specifies that the selected variable value is compared
directly with the thresholds at the end of the sampling interval.
• delta—Specifies that the selected variable value of the last sample is
subtracted from the current value, and the difference is compared with
the thresholds.
• startup {rising | rising-falling | falling}—Specifies the alarm that may be
sent when this entry becomes valid. The possible values are:
• rising—Specifies that if the first sample (after this entry becomes
valid) is greater than or equal to rthreshold, a single rising alarm is
generated.
• rising-falling—Specifies that if the first sample (after this entry
becomes valid) is greater than or equal to rthreshold, a single rising
alarm is generated. If the first sample (after this entry becomes valid)
is less than or equal to fthreshold, a single falling alarm is generated.
• fallin —Specifies that if the first sample (after this entry becomes
valid) is less than or equal to fthreshold, a single falling alarm is
generated.
• owner name—Specifies the name of the person who configured this alarm.
(Valid string)286 RMON Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\RMON.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Default Configuration
The default method type is absolute.
The default startup direction is rising-falling.
If the owner name is not specified, it defaults to an empty string.
Command Mode
Global Configuration mode
Example
The following example configures an alarm with index 1000, MIB object ID
D-Link, sampling interval 360000 seconds (100 hours), rising threshold value
1000000, falling threshold value 1000000, rising threshold event index 10,
falling threshold event index 10, absolute method type and rising-falling
alarm.
console(config)# rmon alarm 1000 1.3.6.1.2.1.2.2.1.10.1 360000 1000000
1000000 10 20
show rmon alarm-table
Use the show rmon alarm-table EXEC mode command to display a summary
of the alarms table.
Syntax
show rmon alarm-table
Command Mode
EXEC modeRMON Commands 287
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\RMON.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
The following example displays the alarms table.
The following table describes the significant fields shown in the display:
show rmon alarm
Use the show rmon alarm EXEC mode command to display alarm
configuration.
Syntax
show rmon alarm number
Parameters
number—Specifies the alarm index. (Range: 1–65535)
Command Mode
EXEC mode
Example
The following example displays RMON 1 alarms.
Console# show rmon alarm-table
Index
-----
1
2
3
OID
----------------------
1.3.6.1.2.1.2.2.1.10.1
1.3.6.1.2.1.2.2.1.10.1
1.3.6.1.2.1.2.2.1.10.9
Owner
-------
CLI
Manager
CLI
Field Description
Index An index that uniquely identifies the entry.
OID Monitored variable OID.
Owner The entity that configured this entry.288 RMON Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\RMON.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Console# show rmon alarm 1
Alarm 1
-------
OID: 1.3.6.1.2.1.2.2.1.10.1
Last sample Value: 878128
Interval: 30
Sample Type: delta
Startup Alarm: rising
Rising Threshold: 8700000
Falling Threshold: 78
Rising Event: 1
Falling Event: 1
Owner: CLI
The following table describes the significant fields shown in the display:
Field Description
Alarm Alarm index.
OID Monitored variable OID.
Last Sample Value The value of the statistic during the last sampling period. For
example, if the sample type is delta, this value is the difference
between the samples at the beginning and end of the period. If
the sample type is absolute, this value is the sampled value at
the end of the period.
Interval The interval in seconds over which the data is sampled and
compared with the rising and falling thresholds.
Sample Type The method of sampling the variable and calculating the value
compared against the thresholds. If the value is absolute, the
variable value is compared directly with the thresholds at the
end of the sampling interval. If the value is delta, the variable
value at the last sample is subtracted from the current value,
and the difference is compared with the thresholds.RMON Commands 289
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\RMON.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
rmon event
Use the rmon event Global Configuration mode command to configure an
event. Use the no form of this command to remove an event.
Syntax
rmon event index {none | log | trap | log-trap} [community text]
[description text] [owner name]
no rmon event index
Parameters
• index—Specifies the event index. (Range: 1–65535)
• none— pecifies that no notification is generated by the device for this
event.
• log—Specifies that a notification entry is generated in the log table by the
device for this event.
Startup Alarm The alarm that may be sent when this entry is first set. If the
first sample is greater than or equal to the rising threshold, and
startup alarm is equal to rising or rising-falling, then a single
rising alarm is generated. If the first sample is less than or
equal to the falling threshold, and startup alarm is equal falling
or rising-falling, then a single falling alarm is generated.
Rising Threshold The sampled statistic rising threshold. When the current
sampled value is greater than or equal to this threshold, and
the value at the last sampling interval is less than this
threshold, a single event is generated.
Falling Threshold The sampled statistic falling threshold. When the current
sampled value is less than or equal to this threshold, and the
value at the last sampling interval is greater than this threshold,
a single event is generated.
Rising Event The event index used when a rising threshold is crossed.
Falling Event The event index used when a falling threshold is crossed.
Owner The entity that configured this entry.
Field Description 290 RMON Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\RMON.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
• trap—Specifies that an SNMP trap is sent to one or more management
stations by the device for this event.
• log-trap—Specifies that an entry is generated in the log table and an
SNMP trap is sent to one or more management stations by the device for
this event.
• community text—Specifies the SNMP community to which an SNMP
trap is sent. (Octet string;
length: 0–127 characters)
• description text—Specifies a comment describing this event. (Length:
0–127 characters)
• owner name—Specifies the name of the person who configured this event.
(Valid string)
Default Configuration
If the owner name is not specified, it defaults to an empty string.
Command Mode
Global Configuration mode
Example
The following example configures an event identified as index 10, for which
the device generates a notification in the log table.
Console(config)# rmon event 10 log
show rmon events
Use the show rmon events EXEC mode command to display the RMON
event table.
Syntax
show rmon events
Command Mode
EXEC modeRMON Commands 291
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\RMON.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
The following example displays the RMON event table.
The following table describes significant fields shown in the display:
show rmon log
Use the show rmon log EXEC mode command to display the RMON log
table.
Console# show rmon events
Index
-----
1
Descrip
tion
--------
Errors
Type
------
Log
Community
--------
Owner
------
CLI
Last time
sent
--------
Jan18 2006
23:58:17
2 High
Broadcast
LogTrap
Router Manager Jan18 2006
23:59:48
Field Description
Index A unique index that identifies this event.
Description A comment describing this event.
Type The type of notification that the device
generates about this event. Can have the
following values: none, log, trap, log-trap. In
the case of log, an entry is made in the log table
for each event. In the case of trap, an SNMP
trap is sent to one or more management
stations.
Community If an SNMP trap is to be sent, it is sent to the
SNMP community specified by this octet string.
Owner The entity that configured this event.
Last time sent The time this entry last generated an event. If
this entry has not generated any events, this
value is zero.292 RMON Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\RMON.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Syntax
show rmon log [event]
Parameters
event—Specifies the event index. (Range: 0–65535)
Command Mode
EXEC mode
Example
The following examples display the RMON log table.
rmon table-size
Use the rmon table-size Global Configuration mode command to configure
the maximum size of RMON tables. Use the no form of this command to
return to the default configuration.
Syntax
rmon table-size {history entries | log entries}
no rmon table-size {history | log}
Parameters
• history entries—Specifies the maximum number of history table entries.
(Range: 20–270)
Console# show rmon log
Maximum table size: 500 (800 after reset)
Event
-----
1
Description
--------------
MIB Var.:
1.3.6.1.2.1.2.2.1.10.53
, Delta, Rising, Actual
Val: 800, Thres.Set:
100, Interval (sec):1
Time
-------------------
Jan 18 2006 23:48:19
RMON Commands 293
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\RMON.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
• log entries—Specifies the maximum number of log table entries. (Range:
20–100)
Default Configuration
The default history table size is 270 entries.
The default log table size is 200 entries.
Command Mode
Global Configuration mode
User Guidelines
The configured table size takes effect after the device is rebooted.
Example
The following example configures the maximum size of RMON history tables
to 100 entries.
Console(config)# rmon table-size history 100294 RMON Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\RMON.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY802.1x Commands 295
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\802.1X.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
19
802.1x Commands
aaa authentication dot1x
Use the aaa authentication dot1x Global Configuration mode command to
specify one or more authentication, authorization, and accounting (AAA)
methods for use on interfaces running IEEE 802.1x. Use the no form of this
command to restore the default configuration.
Syntax
aaa authentication dot1x default method [method2 ...]
no aaa authentication dot1x default
Parameters
method [method2 ...]—Specify at least one method from the following list:
Default Configuration
The default method is Radius.
Command Mode
Global Configuration mode
User Guidelines
Additional methods of authentication are used only if the previous method
returns an error and not if the request for authentication is denied. Specify
Keyword Description
radius Uses the list of all RADIUS servers for authentication
none Uses no authentication296 802.1x Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\802.1X.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
none as the final method in the command line to ensure that authentication
succeeds even if all methods return an error.
Example
The following example uses the aaa authentication dot1x default command
with no authentication.
Console(config)# aaa authentication dot1x default none
dot1x system-auth-control
Use the dot1x system-auth-control Global Configuration mode command to
enable 802.1x globally. Use the no form of this command to restore the
default configuration.
Syntax
dot1x system-auth-control
no dot1x system-auth-control
Default Configuration
All the ports are in FORCE_AUTHORIZED state.
Command Mode
Global Configuration mode
Example
The following example enables 802.1x globally.
Console(config)# dot1x system-auth-control
dot1x port-control
Use the dot1x port-control Interface Configuration (Ethernet) mode
command to enable manual control of the port authorization state. Use the
no form of this command to restore the default configuration.802.1x Commands 297
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\802.1X.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Syntax
dot1x port-control {auto | force-authorized | force-unauthorized}
no dot1x port-control
Parameters
• auto—Enables 802.1x authentication on the interface and causes the port
to transition to the authorized or unauthorized state based on the 802.1x
authentication exchange between the device and the client.
• force-authorized—Disables 802.1x authentication on the interface and
causes the port to transition to the authorized state without any
authentication exchange required. The port resends and receives normal
traffic without 802.1x-based client authentication.
• force-unauthorized—Denies all access through this interface by forcing
the port to transition to the unauthorized state and ignoring all attempts
by the client to authenticate. The device cannot provide authentication
services to the client through the interface.
Default Configuration
The port is in the force-authorized state.
Command Mode
Interface Configuration (Ethernet) mode
User Guidelines
It is recommended to disable spanning tree or to enable spanning-tree
PortFast mode on 802.1x edge ports (ports in auto state that are connected to
end stations), in order to proceed to the forwarding state immediately after
successful authentication.
Example
The following example enables 802.1x authentication on gigabitethernet port
1/0/15.
Console(config)# interface gi1/0/15
Console(config-if)# dot1x port-control auto298 802.1x Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\802.1X.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
dot1x re-authentication
Use the dot1x reauthentication Interface Configuration mode command to
enable periodic re-authentication of the client. Use the no form of this
command to return to the default setting.
Syntax
dot1x reauthentication
no dot1x reauthentication
Parameters
This command has no arguments or keywords.
Default
Periodic re-authentication is disabled.
Command Mode
Interface configuration (Ethernet)
Example
console(config)# interface gi1/0/1
console(config-if)# dot1x reauthentication
dot1x timeout reauth-period
Use the dot1x timeout reauth-period Interface Configuration mode
command to set the number of seconds between re-authentication attempts.
Use the no form of this command to return to the default setting.
Syntax
dot1x timeout reauth-period seconds
no dot1x timeout reauth-period802.1x Commands 299
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\802.1X.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Parameters
seconds—Number of seconds between re-authentication attempts. (Range:
30–4294967295)
Default
3600
Command Mode
Interface Configuration (Ethernet) mode
Example
console(config)# interface gi1/0/1
console(config-if)# dot1x timeout reauth-period 5000
dot1x re-authenticate
The dot1x re-authenticate Privileged EXEC mode command manually
initiates re-authentication of all 802.1x-enabled ports or the specified 802.1xenabled port.
Syntax
dot1x re-authenticate [interface-id]
Parameters
interface-id—Specifies an interface ID. The interface ID must be an
Ethernet port.
Command Mode
Privileged EXEC mode
Example
The following command manually initiates re-authentication of 802.1xenabled gigabitethernet port 1/0/15.
Console# dot1x re-authenticate gi1/0/15300 802.1x Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\802.1X.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
dot1x timeout quiet-period
Use the dot1x timeout quiet-period Interface Configuration (Ethernet)
mode command to set the time interval that the device remains in a quiet
state following a failed authentication exchange (for example, the client
provided an invalid password). Use the no form of this command to restore
the default configuration.
Syntax
dot1x timeout quiet-period seconds
no dot1x timeout quiet-period
Parameters
seconds—Specifies the time interval in seconds that the device remains in a
quiet state following a failed authentication exchange with the client. (Range:
0–65535 seconds)
Default Configuration
The default quiet period is 60 seconds.
Command Mode
Interface Configuration (Ethernet) mode
User Guidelines
During the quiet period, the device does not accept or initiate authentication
requests.
The default value of this command should only be changed to adjust to
unusual circumstances, such as unreliable links or specific behavioral
problems with certain clients and authentication servers.
To provide faster response time to the user, a smaller number than the default
value should be entered.
Example
The following example sets the time interval that the device remains in the
quiet state following a failed authentication exchange to 3600 seconds.802.1x Commands 301
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\802.1X.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Console(config)# interface gi1/0/15
Console(config-if)# dot1x timeout quiet-period 3600
dot1x timeout tx-period
Use the dot1x timeout tx-period Interface Configuration (Ethernet) mode
command to set the time interval during which the device waits for a
response to an Extensible Authentication Protocol (EAP) request/identity
frame from the client before resending the request. Use the no form of this
command to restore the default configuration.
Syntax
dot1x timeout tx-period seconds
no dot1x timeout tx-period
Parameters
seconds—Specifies the time interval in seconds during which the device waits
for a response to an EAP-request/identity frame from the client before
resending the request. (Range: 1–65535 seconds)
Default Configuration
The default timeout period is 30 seconds.
Command Mode
Interface Configuration (Ethernet) mode
User Guidelines
The default value of this command should be changed only to adjust to
unusual circumstances, such as unreliable links or specific behavioral
problems with certain clients and authentication servers.
Example
The following command sets the time interval during which the device waits
for a response to an EAP request/identity frame to 3600 seconds.
Console(config)# interface gi1/0/15
Console(config-if)# dot1x timeout tx-period 3600302 802.1x Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\802.1X.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
dot1x max-req
Use the dot1x max-req Interface Configuration mode command to set the
maximum number of times that the device sends an Extensible
Authentication Protocol (EAP) request/identity frame (assuming that no
response is received) to the client before restarting the authentication
process. Use the no form of this command to restore the default
configuration.
Syntax
dot1x max-req count
no dot1x max-req
Parameters
count—Specifies the maximum number of times that the device sends an
EAP request/identity frame before restarting the authentication process.
(Range: 1–10)
Default Configuration
The default maximum number of attempts is 2.
Command Mode
Interface Configuration (Ethernet) mode
User Guidelines
The default value of this command should be changed only to adjust to
unusual circumstances, such as unreliable links or specific behavioral
problems with certain clients and authentication servers.
Example
The following example sets the maximum number of times that the device
sends an EAP request/identity frame to 6
Console(config)# interface gi1/0/15
Console(config-if)# dot1x max-req 6802.1x Commands 303
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\802.1X.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
dot1x timeout supp-timeout
Use the dot1x timeout supp-timeout Interface Configuration (Ethernet)
mode command to set the time interval during which the device waits for a
response to an Extensible Authentication Protocol (EAP) request frame from
the client before resending the request. Use the no form of this command to
restore the default configuration.
Syntax
dot1x timeout supp-timeout seconds
no dot1x timeout supp-timeout
Parameters
seconds—Specifies the time interval in seconds during which the device waits
for a response to an EAP request frame from the client before resending the
request. (Range: 1–65535 seconds)
Default Configuration
The default timeout period is 30 seconds.
Command Mode
Interface Configuration (Ethernet) mode
User Guidelines
The default value of this command should be changed only to adjust to
unusual circumstances, such as unreliable links or specific behavioral
problems with certain clients and authentication servers.
Example
The following example sets the time interval during which the device waits
for a response to an EAP request frame from the client before resending the
request to 3600 seconds.
Console(config)# interface gi1/0/15
Console(config-if)# dot1x timeout supp-timeout 3600304 802.1x Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\802.1X.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
dot1x timeout server-timeout
Use the dot1x timeout server-timeout Interface Configuration (Ethernet)
mode command to set the time interval during which the device waits for a
response from the authentication server. Use the no form of this command to
restore the default configuration.
Syntax
dot1x timeout server-timeout seconds
no dot1x timeout server-timeout
Parameters
seconds—Specifies the time interval in seconds during which the device waits
for a response from the authentication server. (Range: 1–65535 seconds)
Default Configuration
The default timeout period is 30 seconds.
Command Mode
Interface Configuration (Ethernet) mode
User Guidelines
The actual timeout period can be determined by comparing the value
specified by the dot1x timeout server-timeout command to the result of
multiplying the number of retries specified by the radius-server retransmit
command by the timeout period specified by the radius-server timeout
command, and selecting the lower of the two values.
Example
The following example sets the time interval between retransmission of
packets to the authentication server to 3600 seconds.
Console(config)# interface gi1/0/15
Console(config-if)# dot1x timeout server-timeout 3600802.1x Commands 305
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\802.1X.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
show dot1x
Use the show dot1x Privileged EXEC mode command to display the 802.1x
device or specified interface status.
Syntax
show dot1x [interface interface-id]
Parameters
interface-id—Specify an interface ID. The interface ID must be an Ethernet
port.
Command Mode
Privileged EXEC mode
Example
The following examples display the status of 802.1x-enabled Ethernet ports.
Console# show dot1x
802.1x is enabled
Port
----
gi1/0/1
gi1/0/2
gi1/0/3
gi1/0/4
gi1/0/5
Admin
Mode
----------
Auto
Auto
Auto
Force-auth
Force-auth
Oper
Mode
------------
Authorized
Authorized
Unauthorized
Authorized
Unauthorized
Reauth
Control
-------
Ena
Ena
Ena
Dis
Dis
Reauth
Period
------
3600
3600
3600
3600
3600
Username
--------
Bob
John
Clark
n/a
n/a
* Port is down or not present.
Console# show dot1x interface gi1/0/3
802.1x is enabled.306 802.1x Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\802.1X.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
The following table describes the significant fields shown in the display.
Port
----
gi1/0/3
Admin
Mode
----------
Auto
Oper
Mode
------------
Unauthorized
Reauth
Control
-------
Enable
Reauth
Period
------
3600
Username
--------
Clark
Quiet period:
Tx period:
Max req:
Supplicant timeout:
60 Seconds
30 Seconds
2
30 Seconds
Server timeout:
Session Time (HH:MM:SS):
MAC Address:
Authentication Method:
Termination Cause:
30 Seconds
08:19:17
00:08:78:32:98:78
Remote
Supplicant logoff
Authenticator State Machine
State: HELD
Backend State Machine
State:
Authentication success:
Authentication fails:
IDLE
9
1
Field Description
Port The port number.
Admin mode The port admin mode. Possible values: Force-auth,
Force-unauth, Auto.
Oper mode The port oper mode. Possible values: Authorized,
Unauthorized or Down.
Reauth Control Reauthentication control.
Reauth Period Reauthentication period.802.1x Commands 307
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\802.1X.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Username The username representing the supplicant identity.
This field shows the username if the port control is
auto. If the port is Authorized, it displays the
username of the current user. If the port is
Unauthorized, it displays the last user authenticated
successfully.
Quiet period The number of seconds that the device remains in
the quiet state following a failed authentication
exchange (for example, the client provided an invalid
password).
Tx period The number of seconds that the device waits for a
response to an Extensible Authentication Protocol
(EAP) request/identity frame from the client before
resending the request.
Max req The maximum number of times that the device
sends an EAP request frame (assuming that no
response is received) to the client before restarting
the authentication process.
Supplicant timeout The number of seconds that the device waits for a
response to an EAP-request frame from the client
before resending the request.
Server timeout The number of seconds that the device waits for a
response from the authentication server before
resending the request.
Session Time The amount of time (HH:MM:SS) that the user is
logged in.
MAC address The supplicant MAC address.
Authentication Method The authentication method used to establish the
session.
Termination Cause The reason for the session termination.
State The current value of the Authenticator PAE state
machine and of the Backend state machine.
Authentication success The number of times the state machine received a
Success message from the Authentication Server.
Authentication fails The number of times the state machine received a
Failure message from the Authentication Server.
Field Description308 802.1x Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\802.1X.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
show dot1x users
Use the show dot1x users Privileged EXEC mode command to display active
802.1x authenticated users for the device.
Syntax
show dot1x users [username username]
Parameters
username—Specifies the supplicant username (Length: 1–160 characters)
Command Mode
Privileged EXEC mode802.1x Commands 309
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\802.1X.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
The following example displays 802.1x users.
Switch# show dot1x users
Port Username Session Auth MAC VLAN
Filter
Time Method Address
------ ---------- ------------- -------- ------------- ---- ----
gi1/0/1 Bob 1d 03:08:58 Remote 0008.3b79.8787 3
gi1/0/2 John 08:19:17 None 0008.3b89.3127 2
OK
Port Username Session Auth MAC VLAN
Filter
Time Method Address
--------- ------------------------------ ----------- ---- ------
gi1/0/1 Bob 1d 09:07:38 Remote 0008.3b79.8787 3 OK
gi1/0/1 Bernie 03:08:58 Remote 0008.3b79.3232 9 OK
gi1/0/2 John 08:19:17 Remote 0008.3b89.3127 2
gi1/0/3 Paul 02:12:48 Remote 0008.3b89.8237 8
Warning
Switch# show dot1x users username Bob
Port Username Session Auth MAC VLAN
Filter
Time Method Address
--------- ------------------------------ ----------- ---- -----
gi1/0/1 Bob 1d 09:07:38 Remote 0008.3b79.8787 3 OK
Filter ID #1: Supplicant-IPv4
Filter ID #2: Supplicant-IPv6
Switch# show dot1x users username Bernie
Port Username Session Auth MAC VLAN
Filter
Time Method Address
--------- ------------------------------ ----------- ---- -----
gi1/0/1 Bernard 03:08:58 Remote 0008.3b79.3232 9 OK
Filter ID #1: Supplicant-IPv4310 802.1x Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\802.1X.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
show dot1x statistics
Use the show dot1x statistics Privileged EXEC mode command to display
802.1x statistics for the specified interface.
Syntax
show dot1x statistics interface interface-id
Parameters
interface-id—Specifies an interface ID. The interface ID must be an
Ethernet port.
Command Mode
Privileged EXEC mode
Example
The following example displays 802.1x statistics for gigabitethernet port
1/0/1.
Console# show dot1x statistics interface gi1/0/1
EapolFramesRx: 11
EapolFramesTx: 12
EapolStartFramesRx: 1
EapolLogoffFramesRx: 1
EapolRespIdFramesRx: 3
EapolRespFramesRx: 6
EapolReqIdFramesTx: 3
EapolReqFramesTx: 6
InvalidEapolFramesRx: 0
EapLengthErrorFramesRx: 0
LastEapolFrameVersion: 1
LastEapolFrameSource: 00:08:78:32:98:78802.1x Commands 311
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\802.1X.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
The following table describes the significant fields shown in the display:
clear dot1x statistics
Use the clear dot1x statistics Privileged EXEC mode command to clear
802.1x statistics.
Field Description
EapolFramesRx The number of valid EAPOL frames of any type
that have been received by this Authenticator.
EapolFramesTx The number of EAPOL frames of any type that
have been transmitted by this Authenticator.
EapolStartFramesRx The number of EAPOL Start frames that have been
received by this Authenticator.
EapolLogoffFramesRx The number of EAPOL Logoff frames that have
been received by this Authenticator.
EapolRespIdFramesRx The number of EAP Resp/Id frames that have been
received by this Authenticator.
EapolRespFramesRx The number of valid EAP Response frames (other
than Resp/Id frames) that have been received by
this Authenticator.
EapolReqIdFramesTx The number of EAP Req/Id frames that have been
transmitted by this Authenticator.
EapolReqFramesTx The number of EAP Request frames (other than
Req/Id frames) that have been transmitted by this
Authenticator.
InvalidEapolFramesRx The number of EAPOL frames that have been
received by this Authenticator for which the frame
type is not recognized.
EapLengthErrorFramesR
x
The number of EAPOL frames that have been
received by this Authenticator in which the Packet
Body Length field is invalid.
LastEapolFrameVersion The protocol version number carried in the most
recently received EAPOL frame.
LastEapolFrameSource The source MAC address carried in the most
recently received EAPOL frame.312 802.1x Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\802.1X.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Syntax
clear dot1x statistics [interface-id]
Parameters
interface-id—Specify an Ethernet port ID.
Default Configuration
Statistics on all ports are cleared.
Command Mode
Privileged EXEC mode
Example
The following example displays how to clear 802.1x statistics on all ports
Console# clear dot1x statistics
dot1x auth-not-req
Use the dot1x auth-not-req Interface Configuration (VLAN) mode command
to enable unauthorized devices access to the VLAN. Use the no form of this
command to disable access to the VLAN.
Syntax
dot1x auth-not-req
no dot1x auth-not-req
Default Configuration
Access is enabled.
Command Mode
Interface Configuration (VLAN) mode
User Guidelines
An access port cannot be a member in an unauthenticated VLAN.
The native VLAN of a trunk port cannot be an unauthenticated VLAN.802.1x Commands 313
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\802.1X.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
For a general port, the PVID can be an unauthenticated VLAN (although only
tagged packets are accepted in the unauthorized state).
Example
The following example enables unauthorized devices access to VLAN 5.
Console(config)# interface vlan 5
Console(config-if)# dot1x auth-not-req
dot1x host-mode
Use the dot1x host-mode Interface Configuration mode command to allow a
single host (client) or multiple hosts on an IEEE 802.1x-authorized port. Use
the no form of this command to return to the default setting.
Syntax
dot1x host-mode {multi-host | single-host | multi-sessions}
Parameters
• multi-host—Enable multiple-hosts mode.
• single-host—Enable single-hosts mode.
• multi-sessions—Enable multiple-sessions mode.
Default
Default mode is multi-host.
Command Mode
Interface Configuration (Ethernet) mode
User Guidelines
In multiple hosts mode only one of the attached hosts must be successfully
authorized for all hosts to be granted network access. If the port becomes
unauthorized, all attached clients are denied access to the network.
In multiple sessions mode each host must be successfully authorized in order
to grant network access. Please note that packets are NOT encrypted, and 314 802.1x Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\802.1X.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
after success full authentication filtering is based on the source MAC address
only.
Port security on a port can’t be enabled in single-host mode and in multiplesessions mode.
It is recommended to enable reauthentication when working in multiplesessions mode in order to detect User Logout for users that hadn’t sent
Logoff.
Example
console(config)# interface gi1/0/1
console(config-if)# dot1x host-mode multi-host
console(config-if)# dot1x host-mode single-host
console(config-if)# dot1x host-mode multi-sessions
dot1x violation-mode
Use the dot1x violation-mode Interface Configuration (Ethernet) mode
command to configure the action to be taken, when a station whose MAC
address is not the supplicant MAC address, attempts to access the interface.
Use the no form of this command to return to default.
Syntax
dot1x violation-mode {restrict | protect | shutdown}
no dot1x violation-mode
Parameters
• restrict—Generates a trap when a station whose MAC address is not the
supplicant MAC address, attempts to access the interface. The minimum
time between the traps is 1 second. Those frames are forwarded but their
source address are not learned.
• protect—Discard frames with source addresses not the supplicant address.
• shutdown—Discard frames with source addresses not the supplicant
address and shutdown the port802.1x Commands 315
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\802.1X.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Default Configuration
Protect
Command Mode
Interface Configuration (Ethernet) mode
User Guidelines
The command is relevant for single-host mode.
The command is not relevant for multiple-hosts mode.
The command is relevant for multiple-sessions mode, but you should note
that since PCs are sending traffic prior to successful 802.1X authentication,
this command might not be useful in this mode.
BPDU message whose MAC address is not the supplicant MAC address
wouldn’t be discarded in the protect mode.
BPDU message whose MAC address is not the supplicant MAC address
would cause a shutdown in the shutdown mode.
Example
console(config)# interface gigabitethernet gi1/0/1
console(config-if)# dot1x violation-mode protect
dot1x guest-vlan
Use the dot1x guest-vlan Interface Configuration (VLAN) mode command to
define a guest VLAN. Use the no form of this command to restore the default
configuration.
Syntax
dot1x guest-vlan
no dot1x guest-vlan
Default Configuration
No VLAN is defined as a guest VLAN.316 802.1x Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\802.1X.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Command Mode
Interface Configuration (VLAN) mode
User Guidelines
Use the dot1x guest-vlan enable Interface Configuration mode command to
enable unauthorized users on an interface to access the guest VLAN.
If the guest VLAN is defined and enabled, the port automatically joins the
guest VLAN when the port is unauthorized and leaves it when the port
becomes authorized. To be able to join or leave the guest VLAN, the port
should not be a static member of the guest VLAN.
Example
The following example defines VLAN 2 as a guest VLAN.
Console# configure
Console(config)# interface vlan 2
Console(config-if)# dot1x guest-vlan
dot1x guest-vlan timeout
Use the dot1x guest-vlan timeout Global Configuration mode command to
set the time delay between enabling 802.1x (or port up) and adding a port to
the guest VLAN. Use the no form of this command to restore the default
configuration.
Syntax
dot1x guest-vlan timeout timeout
no dot1x guest-vlan timeout
Parameters
timeout—Specifies the time delay in seconds between enabling 802.1x (or
port up) and adding the port to the guest VLAN. (Range: 30–180)
Default Configuration
The guest VLAN is applied immediately.802.1x Commands 317
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\802.1X.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Command Mode
Global Configuration mode
User Guidelines
This command is relevant if the guest VLAN is enabled on the port.
Configuring the timeout adds delay from enabling 802.1X (or port up) to the
time the device adds the port to the guest VLAN.
Example
The following example sets the delay between enabling 802.1x and adding a
port to a guest VLAN to 60 seconds.
Console(config)# dot1x guest-vlan timeout 60
dot1x guest-vlan enable
Use the dot1x guest-vlan enable Interface Configuration (Ethernet) mode
command to enable unauthorized users on the interface access to the guest
VLAN. Use the no form of this command to disable access.
Syntax
dot1x guest-vlan enable
no dot1x guest-vlan enable
Default Configuration
The default configuration is disabled.
Command Mode
Interface Configuration (Ethernet) mode
User Guidelines
A device can have only one global guest VLAN. The guest VLAN is defined
using the dot1x guest-vlan Interface Configuration mode command.318 802.1x Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\802.1X.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
The following example enables unauthorized users on gigabitethernet port
1/0/1 to access the guest VLAN.
Console(config)# interface gi1/0/15
Console(config-if)# dot1x guest-vlan enable
dot1x mac-authentication
Use the dot1x mac-authentication Interface Configuration (Ethernet) mode
command to enable authentication based on the station’s MAC address. Use
the no form of this command to disable access.
Syntax
dot1x mac-authentication {mac-only | mac-and-802.1x}
no dot1x mac-authentication
Parameters
• mac-only—Enables authentication based on the station's MAC address
only. 802.1X frames are ignored.
• mac-and-802.1x—Enables 802.1X authentication and MAC address
authentication on the interface.
Default Configuration
Authentication based on the station's MAC address is disabled.
Command Mode
Interface Configuration (Ethernet) mode
User Guidelines
The guest VLAN must be enabled when MAC authentication is enabled.
Static MAC addresses cannot be authorized. Do not change an authenticated
MAC address to a static address.
It is not recommended to delete authenticated MAC addresses.
Reauthentication must be enabled when working in this mode.802.1x Commands 319
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\802.1X.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
The following example enables authentication based on the station’s MAC
address on gigabitethernet port 1/0/1.
Console(config)# interface gi1/0/1
Console(config-if)# dot1x mac-authentication mac-only
dot1x traps mac-authentication success
Use the dot1x traps mac-authentication success Global Configuration mode
command to enable sending traps when a MAC address is successfully
authenticated by the 802.1X mac-authentication access control. Use the no
form of this command to disable the traps.
Syntax
dot1x traps mac-authentication success
no dot1x traps mac-authentication success
Parameters
This command has no arguments or keywords.
Default
Default is disabled.
Command Mode
Global Configuration mode
dot1x traps mac-authentication failure
Use the dot1x traps mac-authentication failure Global Configuration mode
command to enable sending traps when MAC address was failed in
authentication of the 802.1X MAC authentication access control. Use the no
form of this command to disable the traps.320 802.1x Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\802.1X.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Syntax
dot1x traps mac-authentication failure
no dot1x traps mac-authentication failure
Parameters
This command has no arguments or keywords.
Default
Default is disabled.
Command Mode
Global Configuration mode
dot1x radius-attributes vlan
Use the dot1x radius-attributes vlan Interface Configuration mode
command, to enable user-based VLAN assignment. Use the no form of this
command to disable user-based VLAN assignment.
Syntax
dot1x radius-attributes vlan
no dot1x radius-attributes vlan
Parameters
This command has no arguments or keywords.
Default
Disabled
Command Mode
Interface Configuration (Ethernet) mode
User Guidelines
The configuration of this command is allowed only when the port is Forced
Authorized.802.1x Commands 321
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\802.1X.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Radius attributes are supported only in the multiple sessions mode (multiple
hosts with authentication)
When Radius attributes are enabled and the Radius Accept message does not
contain the supplicant’s VLAN as an attribute, then the supplicant is
rejected.
Packets to the supplicant are sent untagged.
After successful authentication the port remains member in the
unauthenticated VLANs and in the Guest VLAN. Other static VLAN
configuration is not applied on the port. If the supplicant VLAN does not
exist on the switch, the supplicant is rejected.
Example
console(config)# interface gi1/0/1
console(config-if)# dot1x radius-attributes vlan
dot1x radius-attributes filter-id
Use the dot1x radius-attributes filter-id Interface Configuration mode
command to enable user-based ACL/Qos-Policy assignment. Use the no form
of this command to disable user-based ACL/Qos-Policy assignment.
Syntax
dot1x radius-attributes filter-id
no dot1x radius-attributes filter-id
Parameters
This command has no arguments or keywords.
Default
Disabled
Command Mode
Interface Configuration (Ethernet) mode322 802.1x Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\802.1X.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
User Guidelines
User based ACL/Qos-Policy assignment is supported only in 802.1x multiple
sessions.
The configuration of the parameter is allowed only when the port is Forced
Authorized or Forced Unauthorized.
dot1x radius-attributes errors
Use the dot1x radius-attributes errors Global Configuration mode command
to specify error handling for the Radius attributes feature. Use the no form of
this command to return to default.
Syntax
dot1x radius-attributes errors filter-id resources {accept | reject}
no dot1x radius-attributes errors filter-id resources
Parameters
accept—If the Filter-ID cannot be allocated for resource allocation reasons,
the user is accepted. If the Filter-ID canot be allocated for other reasons, the
user is rejected.
reject—If the Filter-ID cannot be assigned, the user is rejected.
Default
Reject
Command Mode
Global Configuration mode
dot1x legacy-supp-mode
Use the dot1x legacy-supp-mode Interface Configuration mode command in
multiple session mode to enable 802.1x switch to send a periodic EAPOL
request identity frame according to tx timeout period in order to verify
authentication in multiple session mode of clients that do not follow 802.1x
standard behavior. Use the no form of this command to return to the default
setting.802.1x Commands 323
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\802.1X.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Syntax
dot1x legacy-supp-mode
no dot1x legacy-supp-mode
Parameters
This command has no arguments or keywords.
Default
Legacy support is disabled.
Command Mode
Interface Configuration (Ethernet) mode
User Guidelines
The command causes 802.1x switch to send an Extensible Authentication
Protocol (EAP)-request/identity frame from the authenticator (switch) each
tx-period automatically, when in multiple session mode. The command
should be activated onlywhen all devices connected to that port do not follow
802.1x standard behavior to send EAPOL start packets when the client link
goes up (for example, some Windows OS with pre Service Pack 3).
show dot1x advanced
Use the show dot1x advanced Privileged EXEC mode command to display
802.1x advanced features for the device or specified interface.
Syntax
show dot1x advanced [interface-id]
Parameters
nterface-id—Specify an interface ID. The interface ID must be an Ethernet
port.
Command Mode
Privileged EXEC mode324 802.1x Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\802.1X.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
The following example displays 802.1x advanced features for the device.
dot1x system-auth-control monitor
Use the dot1x system-auth-control monitor Global Configuration command
to enable 802.1x globally the 802.1x Monitoring mode and define the
Monitor VLAN. Use the no format of the command to return to default.
Syntax
dot1x system-auth-control monitor [vlan vlan-id]
no dot1x system-auth-control monitor
console# show dot1x advanced
Guest VLAN: 3978
Unauthenticated VLANs: 91, 92
Interface Multiple Guest MAC VLAN Legacy- Policy
Hosts VLAN Authentication Assignment supp
Mode Assignment
------------------ ---------------------- ----------- --------- ------
gi1/0/1 Disabled Enabled MAC-and-802.1X Enabled Enable Disabled
gi1/0/2 Enabled Disabled Disabled Enabled Enable Disabled
Switch# show dot1x advanced gi1/0/1
Interface Multiple Guest MAC VLAN Legacy- Policy
Hosts VLAN Authentication Assignment sup Mode Assignment
------------------ ----------------------- ----------- ------ -------
gi1/0/1 Disabled Enabled MAC-and-802.1X Enabled Enable
Legacy-Supp mode is disabled
Policy assignment resource err handling: Accept
Single host parameters
Violation action: Discard
Trap: Enabledx
Status: Single-host locked
Violations since last trap: 9802.1x Commands 325
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\802.1X.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Parameters
vlan vlan-id—Specifies the 802.1x Monitoring VLAN. If the parameter is
omitted, the Default VLAN is used as the 802.1x Monitoring VLAN.(Range:
Any manually created VLAN or the Default VLAN)
Default
Disabled
Command Mode
Global Configuration mode
User Guidelines
The 802.1x Monitoring VLAN cannot be deleted manually.
show dot1x monitoring result
Use the show dot1x monitoring result Privileged EXEC mode command to
display the captured information of each interface/host on the switch/stack.
Syntax
show dot1x monitoring result [username username]
Parameters
username username—Specifies supplicant username (Range: 1–80
characters)
Command Mode
Privileged EXEC mode
User Guidelines
The following table describes the significant fields shown in the display:
Field Description
Usernamr Supplicant Username
VLAN VLAN assigned to Supplicant
MAC address Supplicant MAC address326 802.1x Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\802.1X.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Port Ethernet port or port-channel
Reject reason Reason in the case of failure. The following table
describes the reasons.
Time Supplicant Session time
Table 1: Reject Reason Description
Abbreviation Description
ACL-DEL ACL was deleted by a user
ACL-NOTEXST ACL sent by radius Server does not exist on the device
ACL-OVRFL ACL sent by radius server can not be applied because of
TCAM overflow
AUTH-ERR Rejected by Radius due wrong user name or password in
Radius server
FLTR-ERR Radius accept message contains more than 2 filter-id
FRS-MTH-DENY First method is "deny"
IPv6WithMAC Radius accept message contains filter with IPv6 DIP and
MAC addresses
IPV6WithNotIP Radius accept message contains IPv6 and not IP
simultaneously
POL-BasicMode Policy Map is not supported in the QoS basic mode
POL-DEL Policy Map was deleted by a user
POL-OVRFL Policy Map sent by radius server can not be applied
because of TCAM overflow
RAD-APIERR RADIUS API returned error (e.g. No RADIUS server is
configured).
RAD_INVLRES RADIUS server returned invalid packet (e.g. EAP Attribute
is missing)
RAD-NORESP RADIUS server is not responding
VLAN-DFLT VLAN sent by radius server can not be applied because it
is the Default VLAN802.1x Commands 327
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\802.1X.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Examples
Example 1
Switch# show dot1x monitoring results
Monitoring VLAN: 100
Port VLAN UsernameMAC Reject Time
Address Reason
--------- --------------------------- ---------- ---------
gi1/0/1 100 Bob 0008.3b79.8787 VLAN-NOTEX08:19:17
gi1/0/2 15 John 0008.3b89.3128 SERV-ERR 09:20:11
gi1/0/2 5 John 0008.3b89.3129 SERV-ERR 09:20:11
Example 2
Switch# show dot1x monitoring Bob
Username: Bob
Port gi1/0/1
Quiet period: 60 Seconds
Tx period: 30 Seconds
Max req: 2
Supplicant timeout: 30 Seconds
Server timeout: 30 Seconds
Session Time (HH:MM:SS): 08:19:17
MAC Address: 00:08:78:32:98:78
Authentication Method: Remote
Assigned VLAN: 207
Reason for Failure: Radius server rejected authentication because
username/password mismatch
Example 3
VLAN-DYNAM VLAN sent by radius server can not be applied because it
is a Dynamic VLAN
VLAN-GUEST VLAN sent by radius server can not be applied because it
is the Guest VLAN
Table 1: Reject Reason Description328 802.1x Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\802.1X.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Switch# show dot1x monitoring Tom
Username: Tom
Port gi1/0/1
Quiet period: 60 Seconds
Tx period: 30 Seconds
Max req: 2
Supplicant timeout: 30 Seconds
Server timeout: 30 Seconds
Session Time (HH:MM:SS): 08:19:17
MAC Address: 00:08:78:32:98:78
Authentication Method: Remote
Assigned VLAN: 207
Reason for Failure:VLAN was not defined on SwitchEthernet Configuration Commands 329
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Ethernet.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
20
Ethernet Configuration Commands
interface
Use the interface Global Configuration mode command to configure an
interface and enter interface configuration mode.
Syntax
interface interface-id
Parameters
interface-id—Specifies an interface ID. The interface ID can be one of the
following types: Ethernet port or Port-channel.
interface range
Use the interface range command to execute a command on multiple ports at
the same time.
Syntax
interface range interface-id-list
Parameters
interface-id-list—Specify list of interface IDs. The interface ID can be one of
the following types: Ethernet port or Port-channel
User Guidelines
Commands under the interface range context are executed independently on
each interface in the range: If the command returns an error on one of the
interfaces, it does not stop the execution of the command on other interfaces.330 Ethernet Configuration Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Ethernet.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
console(config)# interface range gi1/0/1-20
description
Use the description Interface Configuration (Ethernet, Port-channel) mode
command to add a description to an interface. Use the no form of this
command to remove the description.
Syntax
description string
no description
Parameters
string—Specifies a comment or a description of the port to assist the user.
(Length: 1–64 characters)
Default Configuration
The interface does not have a description.
Command Mode
Interface Configuration (Ethernet, Port-channel) mode
Example
The following example adds the description ‘SW#3’ to gigabitethernet port
1/0/5.
Console(config)# interface gi1/0/5
Console(config-if)# description SW#3
speed
Use the speed Interface Configuration (Ethernet, Port-channel) mode
command to configure the speed of a given Ethernet interface when not Ethernet Configuration Commands 331
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Ethernet.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
using auto-negotiation. Use the no form of this command to restore the
default configuration.
Syntax
speed {10 | 100 | 1000 | 10000}
no speed
Parameters
• 10—Forces10 Mbps operation.
• 100—Forces 100 Mbps operation.
• 1000—Forces 1000 Mbps operation.
• 10000—Forces 10000 Mbps operation.
Default Configuration
The port operates at its maximum speed capability.
Command Mode
Interface Configuration (Ethernet, Port-channel) mode
User Guidelines
The no speed command in a Port-channel context returns each port in the
Port-channel to its maximum capability.
Example
The following example configures the speed of gigabitethernet port 1/0/5 to
100 Mbps operation.
Console(config)# interface gi1/0/5
Console(config-if)# speed 100
duplex
Use the duplex Interface Configuration (Ethernet, Port-channel) mode
command to configure the full/half duplex operation of a given Ethernet
interface when not using auto-negotiation. Use the no form of this command
to restore the default configuration.332 Ethernet Configuration Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Ethernet.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Syntax
duplex {half | full}
no duplex
Parameters
• half—Forces half-duplex operation.
• full—Forces full-duplex operation.
Default Configuration
The interface operates in full duplex mode.
Command Mode
Interface Configuration (Port-channel) mode
Example
The following example configures gigabitethernet port 1/0/5 to operate in
full duplex mode.
Console(config)# interface gi1/0/5
Console(config-if)# duplex full
Console(config-if)#
negotiation
Use the negotiation Interface Configuration (Ethernet, Port-channel) mode
command to enable auto-negotiation operation for the speed and duplex
parameters and master-slave mode of a given interface, where the preferred
default mode is master mode. Use the no form of this command to disable
auto-negotiation.
Syntax
negotiation [capability [capability2 ... capability5]] [preferred {master | slave}]
no negotiationEthernet Configuration Commands 333
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Ethernet.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Parameters
• capability—Specifies the capabilities to advertise. (Possible values: 10h,
10f, 100h,100f, 1000f). If unspecified, defaults to list of all the capabilities
of the port.
• Preferred—Specifies the master-slave preference:
• Master—Advertise master preference
• Slave—Advertise slave preference
Default Configuration
Auto-negotiation is enabled and preferred default mode is master mode.
Command Mode
Interface Configuration (Ethernet, Port-channel) mode
Example
The following example enables auto-negotiation on gigabitethernet port
1/0/5.
Console(config)# interface gi1/0/5
Console(config-if)# negotiation
Console(config-if)#
flowcontrol
Use the flowcontrol Interface Configuration (Ethernet, Port-channel) mode
command to configure the Flow Control on a given interface. Use the no
form of this command to disable Flow Control.
Syntax
flowcontrol {auto | on | off}
no flowcontrol
Parameters
• aut—Specifies auto-negotiation.
• on—Enables Flow Control.334 Ethernet Configuration Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Ethernet.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
• off—Disables Flow Control.
Default Configuration
Flow control is enabled.
Command Mode
Interface Configuration (Ethernet, Port-channel) mode
User Guidelines
Use the negotiation command to enable flow control auto.
Example
The following example enables Flow Control on port gi1/0/1
Console(config)# interface gi1/0/1
Console(config-if)# flowcontrol on
flowcontrol (Global)
Use the flowcontrol Global Configuration mode command to configure the Flow
Control global mode.
Syntax
flowcontrol {receive-only | send-receive}
Parameters
• receive-only—The interfaces with enabled Flow Control will receive pause
frames, but will not send Flow Control pause frames.
• send-receive—The interfaces with enabled Flow Control will receive and
send pause frames.
Default Configuration
receive-only.
Command Mode
Global Configuration modeEthernet Configuration Commands 335
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Ethernet.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
User Guidelines
This command only determines the global mode and does not enable/disable
Flow Control on any interface. Flowcontrol must also be enabled on the
specific interfaces required (they are enabled by default).
Example
The following example enables Flow Control in the mode of only receiving pause
frames and not sending them.
Console(config)# flowcontrol receive-only
show flowcontrol
Use the show flowcontrol Exec mode command to display the Flow Control
global mode.
Syntax
show flowcontrol
Parameters
N/A
Default Configuration
N/A
Command Mode
Exec mode
Example
The following example displays the global Flow Control mode when it is receiveonly.
Console# show flowcontrol
Global Flow Control mode is receive-only.336 Ethernet Configuration Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Ethernet.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
mdix
Use the mdix Interface Configuration (Ethernet) mode command to enable
cable crossover on a given interface. Use the no form of this command to
disable cable crossover.
Syntax
mdix {on | auto}
no mdix
Parameters
• on—Enables manual MDIX.
• auto—Enables automatic MDI/MDIX.
Default Configuration
The default setting is On.
Command Mode
Interface Configuration (Ethernet) mode
Example
The following example enables automatic crossover on port 1/5.
Console(config)# interface gi1/0/1/5
Console(config-if)# mdix auto.
The following example enables automatic crossover on port
gigabitethernet 1/0/1.
Console(config)# interface gi1/0/5
Console(config-if)# mdix autoEthernet Configuration Commands 337
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Ethernet.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
back-pressure
Use the back-pressure Interface Configuration (Ethernet) mode command to
enable back pressure on a specific interface. Use the no form of this
command to disable back pressure.
Syntax
back-pressure
no back-pressure
Default Configuration
Back pressure is enabled.
Command Mode
Interface Configuration (Ethernet) mode
Example
The following example enables back pressure on port gi1/0/5.
Console(config)# interface gi1/0/5
Console(config-if)# back-pressure
port jumbo-frame
Use the port jumbo-frame Global Configuration mode command to enable
jumbo frames on the device. Use the no form of this command to disable
jumbo frames.
Syntax
port jumbo-frame
no port jumbo-frame
Default Configuration
Jumbo frames are disabled on the device.338 Ethernet Configuration Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Ethernet.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Command Mode
Global Configuration mode
User Guidelines
This command takes effect only after resetting the device.
Example
The following example enables jumbo frames on the device.
Console(config)# port jumbo-frame
clear counters
Use the show interfaces counters EXEC mode command to display traffic
seen by all the physical interfaces or by a specific interface.
Syntax
show interfaces counters [interface-id] [detailed]
Parameters
interface-id—Specifies an interface ID. The interface ID can be one of the
following types: Ethernet port or Port-channel.
detailed—Displays information for non-present ports in addition to present
ports.
Command Mode
EXEC mode
Example
The following example clears the statistics counters for gigabitethernet port
1/0/5.
Console# clear counters gi1/0/5.Ethernet Configuration Commands 339
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Ethernet.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
set interface active
Use the set interface active EXEC mode command to reactivate an interface
that was shut down.
Syntax
set interface active { interface-id }
Parameters
interface-id—Specifies an interface ID. The interface ID can be one of the
following types: Ethernet port or Port-channel.
Command Mode
EXEC mode
User Guidelines
This command is used to activate interfaces that were configured to be active,
but were shut down by the system.
Example
The following example reactivates gigabitethernet port 1/0/1.
Console# set interface active gi1/0/1
show interfaces configuration
Use the show interfaces configuration EXEC mode command to display the
configuration for all configured interfaces or for a specific interface.
Syntax
show interfaces configuration [interface-id ]
Parameters
interface-id—Specifies an interface ID. The interface ID can be one of the
following types: Ethernet port or Port-channel.340 Ethernet Configuration Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Ethernet.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Command Mode
EXEC mode
Example
The following example displays the configuration of all configured interfaces:
console# show interfaces configuration
Flow Admin Back Mdix
Port Type Duplex Speed Neg control State Pressure Mode
------ --------- ------ ----- -------- ------- ----- -------- -
gi1/0/1 1G-Copper Full 10000 Disabled Off Up Disabled Off
gi1/0/2 1G-Copper Full 1000 Disabled Off Up Disabled Off
Flow Admin
Ch Type Speed Neg Control State
------ ------ ----- -------- ------- -----
Po1 Disabled Off Up
show interfaces status
Use the show interfaces status EXEC mode command to display the status of
all configured interfaces or of a specific interface.
Syntax
show interfaces status [interface-id][detailed]
Parameters
interface-id—Specifies an interface ID. The interface ID can be one of the
following types: Ethernet port or Port-channel.
detailed—Displays information for non-present ports in addition to present
ports.
Command Mode
EXEC modeEthernet Configuration Commands 341
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Ethernet.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
The following example displays the status of all configured interfaces.
console# show interfaces status
Flow Link Back Mdix
Port Type Duplex Speed Neg ctrl State Pressure Mode
------ --------- ------ ----- -------- ---- ------ -------- --
gi1/0/1 1G-Copper Full 1000 Disabled Off Up Disabled Off
gi1/0/2 1G-Copper -- -- -- -- Down -- --
Flow Link
Ch Type Duplex Speed Neg ctrl State
----- ------- ------ ----- ------- ---- ------
Po1 1G Full 10000 Disabled Off Up
show interfaces advertise
Use the show interfaces advertise EXEC mode command to display autonegotiation advertisement information for all configured interfaces or for a
specific interface.
Syntax
show interfaces advertise [interface-id |
Parameters
interface-id—Specifies an interface ID. The interface ID can be one of the
following types: Ethernet port or Port-channel.
Command Mode
EXEC mode342 Ethernet Configuration Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Ethernet.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Examples
The following examples display auto-negotiation information.
show interfaces description
Use the show interfaces description EXEC mode command to display the
description for all configured interfaces or for a specific interface.
Syntax
show interfaces description [interface-id]
Parameters
interface-id—Specifies an interface ID. The interface ID can be one of the
following types: Ethernet port or Port-channel.
Console# show interfaces advertise
Port
----
gi1/0/1
gi1/0/2
Type
----------
1G-Copper
1G-Copper
Neg
------
Enable
Enable
Operational Link Advertisement
------------------------------
1000f, 100f, 10f, 10h
1000f
Console# show interfaces advertise gi1/0/1
Port:gi1/0/1
Type: 1G-Copper
Link state: Up
Auto Negotiation: enabled
Admin Local link Advertisement
Oper Local link Advertisement
Remote Local link
Advertisement
Priority Resolution
10h
---
yes
yes
no
-
10f
---
yes
yes
no
-
100
h
---
-
yes
yes
yes
-
100f
----
yes
yes
yes
-
1000f
-----
yes
yes
yes
yes
Console# show interfaces advertise gi1/0/1
Port: gi1/0/1
Type: 1G-Copper
Link state: Up
Auto negotiation: disabled.Ethernet Configuration Commands 343
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Ethernet.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Command Mode
EXEC mode
Example
The following example displays the description of all configured interfaces.
show interfaces counters
Use the show interfaces counters EXEC mode command to display traffic
seen by all the physical interfaces or by a specific interface.
Syntax
show interfaces counters [interface-id]
Parameters
interface-id—Specifies an interface ID. The interface ID can be one of the
following types: Ethernet port or Port-channel.
Command Mode
EXEC mode
Console# show interfaces description
Port
gi1/0/1
gi1/0/1
gi1/0/2
gi1/0/1
gi1/0/1
gi1/0/2
Descriptions
---------------------------------------------
Port that should be used for management only
Ch
----
Po1
Description
-----------
Output344 Ethernet Configuration Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Ethernet.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
The following example displays traffic seen by all the physical interfaces.
console# show interfaces counters
Port InUcastPkts InMcastPkts InBcastPkts InOctets
---------- ------------ ------------ ------------ ------------
gi1/0/1 0 0 0 0
Port OutUcastPkts OutMcastPkts OutBcastPkts OutOctets
---------- ------------ ------------ ------------ ------------
gi1/0/1 0 1 35 7051
Alignment Errors: 0
FCS Errors: 0
Single Collision Frames: 0
Multiple Collision Frames: 0
SQE Test Errors: 0
Deferred Transmissions: 0
Late Collisions: 0
Excessive Collisions: 0
Carrier Sense Errors: 0
Oversize Packets: 0
Internal MAC Rx Errors: 0
Symbol Errors: 0
Received Pause Frames: 0
Transmitted Pause Frames: 0Ethernet Configuration Commands 345
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Ethernet.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
The following table describes the fields shown in the display.
Field Description
InOctets The number of received octets.
InUcastPkts The number of received unicast packets.
InMcastPkts The number of received multicast packets.
InBcastPkts The number of received broadcast packets.
OutOctets The number of transmitted octets.
OutUcastPkts The number of transmitted unicast packets.
OutMcastPkts The number of transmitted multicast packets.
OutBcastPkts The number of transmitted broadcast packets.
FCS Errors The number of frames received that are an
integral number of octets in length but do not
pass the FCS check.
Single Collision Frames The number of frames that are involved in a
single collision, and are subsequently
transmitted successfully.
Multiple Collision Frames The number of frames that are involved in more
than one collision and are subsequently
transmitted successfully.
SQE Test Errors The number of times that the SQE TEST
ERROR is received. The SQE TEST ERROR is
set in accordance with the rules for verification of
the SQE detection mechanism in the PLS
Carrier Sense Function as described in IEEE
Std. 802.3, 2000 Edition, section 7.2.4.6.
Deferred Transmissions The number of frames for which the first
transmission attempt is delayed because the
medium is busy.
Late Collisions The number of times that a collision is detected
later than one slotTime into the transmission of a
packet.
Excessive Collisions The number of frames for which transmission
fails due to excessive collisions.
Oversize Packets The number of frames received that exceed the
maximum permitted frame size.346 Ethernet Configuration Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Ethernet.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
show port jumbo-frame
Use the show port jumbo-frame EXEC mode command to display the
configuration of jumbo frames.
Syntax
show port jumbo-frame
Command Mode
EXEC mode
Example
The following example displays the configuration of jumbo frames on the
device.
Console# show port jumbo-frame
Jumbo frames are disabled
Jumbo frames will be enabled after reset
show errdisable interfaces
Use the show errdisable interfaces EXEC mode command to display the ErrDisable state of all interfaces or of a specific interface.
Internal MAC Rx Errors The number of frames for which reception fails
due to an internal MAC sublayer receive error.
Received Pause Frames The number of MAC Control frames received
with an opcode indicating the PAUSE operation.
Transmitted Pause Frames The number of MAC Control frames transmitted
on this interface with an opcode indicating the
PAUSE operation.
Field DescriptionEthernet Configuration Commands 347
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Ethernet.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Syntax
show errdisable interfaces
Parameters
• Interface - Interface number
• port-channel-number - Port channel index.
Command Mode
EXEC mode
Example
The following example displays the Err-Disable state of all interfaces.
Console# show errdisable interfaces
Interface Reason
--------- --------------
gi1/1/50 stp-bpdu-guard
storm-control broadcast enable
Use the storm-control broadcast enable Interface Configuration mode
command to enable storm control. Use the no form of this command to
disable storm control.
Syntax
storm-control broadcast enable
no storm-control broadcast enable
Parameters
This command has no arguments or keywords.
Default Configuration
Disabled348 Ethernet Configuration Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Ethernet.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Command Mode
Interface Configuration mode(Ethernet)
User Guidelines
• Use the storm-control broadcast level Interface Configuration command
to set the maximum rate.
• Use the storm-control include-multicast Interface Configuration
command to also count multicast packets and optionally unknown unicast
packets in the storm control calculation.
•
Example
console(config)# interface gi1/0/1
console(config-if)# storm-control broadcast enable
storm-control broadcast level kbps
Use the storm-control broadcast levelInterface Configuration mode
command to configure the maximum rate of broadcast. Use the no form of
this command to return to default.
Syntax
storm-control broadcast level kbps kbps
no storm-control broadcast level
Parameters
kbps—Maximum of kilo bits per second of broadcast traffic on a port.
(Range: GE: 3.5M–1G, 10GE: 8.5M–10G)
Default Configuration
1000
Command Mode
Interface Configuration mode (Ethernet)Ethernet Configuration Commands 349
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Ethernet.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
User Guidelines
Use the storm-control broadcast enable Interface Configuration command to
enable storm control.
The calculated rate includes the 20 bytes of Ethernet framing overhead
(preamble+SFD+IPG).
Example
console(config)# interface gi1/0/1
console(config-if)# storm-control broadcast level kbps 12345
storm-control include-multicast
Use the storm-control include-multicast Interface Configuration mode
command to count multicast packets in the broadcast storm control. Use the
no form of this command to disable counting of multicast packets in the
broadcast storm control.
Syntax
storm-control include-multicast
no storm-control include-multicast
Parameters
Default Configuration
Disabled
Command Mode
Interface Configuration mode (Ethernet)
User Guidelines
Example
console(config)# interface gi1/0/1
console(config-if)# storm-control include-multicast350 Ethernet Configuration Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Ethernet.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
show storm-control
Use the show storm-control EXEC mode command to display the
configuration of storm control.
Syntax
show storm-control [interface-id ]
Parameters
interface-id—Specifies the interface.
Command Mode
EXEC mode
Example
console# show storm-control
Port State Rate [Kbits/Sec] Included
------ -------- --------------- ------------------------
gi1/0/1 Enabled 12345 Broadcast, Multicast,
Unknown unicast
gi1/0/2 Disabled 100000 Broadcast
User Guidelines
Use the storm-control broadcast enable Interface Configuration command to
enable storm control.
The calculated rate includes the 20 bytes of Ethernet framing overhead
(preamble+SFD+IPG).
If the suppression level in percentage is translated (for the current port’s
speed) to a rate that is lower then the minimum rate, the minimum rate
would be set.
Example
console(config)# interface gi1/0/1
console(config-if)# storm-control broadcast level kbps 12345PHY Diagnostics Commands 351
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Phy_Diagnostics.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
21
PHY Diagnostics Commands
test cable-diagnostics tdr
Use the test cable-diagnostics tdr Privileged EXEC mode command to use
Time Domain Reflectometry (TDR) technology to diagnose the quality and
characteristics of a copper cable attached to a port.
Syntax
test cable-diagnostics tdr interface interface-id
Parameters
interface-id—Specifies an interface ID. The interface ID must be an
Ethernet port.
Command Mode
Privileged EXEC mode
User Guidelines
The port to be tested should be shut down during the test, unless it is a
combination port with fiber port active.
The maximum length of cable for the TDR test is 120 meters.
Example
The following examples test the copper cables attached to ports 7 and 8.
Console# test cable-diagnostics tdr interface gi1/0/7
Cable is open at 64 meters
Console# test cable-diagnostics tdr interface gi1/0/8352 PHY Diagnostics Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Phy_Diagnostics.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Can't perform the test on fiber ports
show cable-diagnostics tdr
Use the show cable-diagnostics tdr EXEC mode command to display
information on the last Time Domain Reflectometry (TDR) test performed
on all copper ports or on a specific copper port.
Syntax
show cable-diagnostics tdr [interface interface-id]
Parameters
interface-id—Specifies an interface ID. The interface ID must be an
Ethernet port.
Command Mode
EXEC mode
User Guidelines
The maximum length of cable for the TDR test is 120 meters.
Example
The following example displays information on the last TDR test performed
on all copper ports.
Console> show cable-diagnostics tdr
Port
----
Result
---------
Length [meters]
--------------
Date
---------------------
gi1/0/1 OK
gi1/0/2 Short 50 13:32:00 23 July 2010
gi1/0/3 Test has not been performed
gi1/0/4 Open 64 13:32:00 23 July 2010
gi1/0/5 Fiber - -PHY Diagnostics Commands 353
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Phy_Diagnostics.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
show cable-diagnostics cable-length
Use the show cable-diagnostics cable-length EXEC mode command to
display the estimated copper cable length attached to all ports or to a specific
port.
Syntax
show cable-diagnostics cable-length [interface interface-id]
Parameters
interface-id—Specify an interface ID. The interface ID must be an Ethernet
port.
Command Mode
EXEC mode
User Guidelines
The port must be active and working at 100 M or 1000 M.
Example
The following example displays the estimated copper cable length attached to
all ports.
show fiber-ports optical-transceiver
Use the show fiber-ports optical-transceiver EXEC mode command to
display the optical transceiver diagnostics.
Console> show cable-diagnostics cable-length
Port
----
gi1/0/1
gi1/0/2
gi1/0/3
gi1/0/4
Length [meters]
-----------------
< 50
Copper not active
110-140
Fiber354 PHY Diagnostics Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Phy_Diagnostics.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Syntax
show fiber-ports optical-transceiver [interface interface-id] [detailed]
Parameters
• interface-id—Specifies an interface ID. The interface ID must be an
Ethernet port.
• detailed—Displays detailed diagnostics.
Command Mode
EXEC mode
Example
The following examples display the optical transceiver diagnostics results.
console# show fiber-ports optical-transceiver
Port Temp Voltage Current Output Input LOS
Power Power
----------- ------ ------- ------- ------ ----- ---
gi1/0/1 W OK OK OK OK OK
gi1/0/2 OK OK OK E OK OK
Temp - Internally measured transceiver temperature
Voltage - Internally measured supply voltage
Current - Measured TX bias current
Output Power - Measured TX output power in milliWatts
Input Power - Measured RX received power in milliWatts
LOS - Loss of signal
N/A - Not Available, N/S - Not Supported,
W - Warning, E - ErrorPHY Diagnostics Commands 355
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Phy_Diagnostics.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
console# show fiber-ports optical-transceiver detailed
Port Temp Voltage Current Output Input LOS
[C] [Volt] [mA] Power Power
[mWatt] [mWatt]
----------- ------ ------- ------- ------- ------- ---
gi0/1 Copper
gi0/26 Copper
gi0/27 28 3.32 7.26 3.53 3.68 No
gi0/28 29 3.33 6.50 3.53 3.71 No
Temp - Internally measured transceiver temperature
Voltage - Internally measured supply voltage
Current - Measured TX bias current
Output Power - Measured TX output power in milliWatts
Input Power - Measured RX received power in milliWatts
LOS - Loss of signal
N/A - Not Available, N/S - Not Supported, W - Warning, E - Error356 PHY Diagnostics Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Phy_Diagnostics.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LYPower over Ethernet (PoE) Commands 357
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\PoE.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
22
Power over Ethernet (PoE)
Commands
power inline
Use the power inline Interface Configuration mode command to configure
the inline power administrative mode on an interface.
Syntax
power inline {auto | never}
Parameters
• auto—Turns on the device discovery protocol and applies power to the
device.
• never—Turns off the device discovery protocol and stops supplying power
to the device.
Default Configuration
The default configuration is set to auto.
Command Mode
Interface Configuration (Ethernet) mode
Example
The following example turns on the device discovery protocol on port 4.
Console(config)# interface gi1/0/4
Console(config-if)# power inline auto358 Power over Ethernet (PoE) Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\PoE.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
power inline limit-mode
Use the power inline limit-mode Global Configuration mode command to
set the power limit mode of the system. Use the no form of this command to
return to the default.
Syntax
power inline limit-mode { port | max-port-power }
no power inline limit-mode
Parameters
• port—The power limit of a port depends on port configuration
• max-port-power—In this mode, each port can get up to the maximum
power, which is 15.4W.
Command Mode
Global Configuration mode
Default
User Guidelines
Changing the PoE limit mode of the system turns the power OFF and ON for
all PoE ports.
Example
The following example sets the power limit to port.
switchxxxxxx(config)# power inline limit-mode portPower over Ethernet (PoE) Commands 359
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\PoE.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
power inline powered-device
Use the power inline powered-device Interface Configuration mode
command to add a description of the powered device type. Use the no form of
this command to remove the description.
Syntax
power inline powered-device pd-type
no power inline powered-device
Parameters
pd-type—Enters a comment or a description to assist in recognizing the type
of the powered device attached to this interface. (Length: 1–24 characters)
Default Configuration
There is no description.
Command Mode
Interface Configuration (Ethernet) mode
Example
The following example adds the description ‘ip phone’ of the device
connected to port 4.
Console(config)# interfacegi1/0/4
Console(config-if)# power inline powered-device ip phone
power inline priority
Use the power inline priority Interface Configuration (Ethernet) mode
command to configure the interface inline power management priority. Use
the no form of this command to restore the default configuration.
Syntax
power inline priority {critical | high | low}360 Power over Ethernet (PoE) Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\PoE.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
no power inline priority
Parameters
• critical—Specifies that the powered device operation is critical.
• high—Specifies that the powered device operation is high priority.
• low—Specifies that the powered device operation is low priority.
Default Configuration
The default configuration is set to low priority.
Command Mode
Interface Configuration (Ethernet) mode
Example
The following example sets the inline power management priority of
gigabitethernet port 4 to High.
Console(config)# interface gi1/0/4
Console(config-if)# power inline priority high
power inline usage-threshold
Use the power inline usage-threshold Global Configuration mode command
to configure the threshold for initiating inline power usage alarms. Use the no
form of this command to restore the default configuration.
Syntax
power inline usage-threshold percent
no power inline usage-threshold
Parameters
percent—Specifies the threshold in percent to compare to the measured
power. (Range: 1–99)
Default Configuration
The default threshold is 95 percent.Power over Ethernet (PoE) Commands 361
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\PoE.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Command Mode
Global Configuration mode
Example
The following example configures the threshold for initiating inline power
usage alarms to 90 percent.
Console(config)# power inline usage-threshold 90
power inline traps enable
Use the power inline traps enable Global Configuration mode command to
enable inline power traps. Use the no form of this command to disable traps.
Syntax
power inline traps enable
no power inline traps enable
Default Configuration
Inline power traps are disabled.
Command Mode
Global Configuration mode
Example
The following example enables inline power traps.
Console(config)# power inline traps enable
power inline limit
Use the power inline limit Interface Configuration mode command to
configure the power limit per port on an interface. Use the no form of the
command to return to default. 362 Power over Ethernet (PoE) Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\PoE.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Syntax
power inline limit power
no power inline limit
Parameters
power—States the port power consumption limit in Milliwatts (Range: 0-
15400
Default Configuration
The default value is the maximum power allowed in the specific working
mode:
• 15.4W
Command Mode
Interface Configuration (Ethernet) mode
Example
The following example sets inline power on a port.
console(config)# interface gi1/0/1
console(config-if)# power inline limit 2222
show power inline
Use the show power inline EXEC mode command to display information
about the inline power for all interfaces or for a specific interface.
Syntax
show power inline [interface-id | module stack-member-number]
Parameters
interface-id—Specifies an interface ID. The interface ID must be an
Ethernet port.
stack-member-number—Specifies the switch member in a stack.Power over Ethernet (PoE) Commands 363
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\PoE.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Default Configuration
There is no default configuration for this command.
Command Mode
EXEC mode
Example 1:
The following example displays information about the inline power.
console(config)# show power inline
Port based power-limit mode
Unit Power Nominal Consumed Usage Traps
Power Power Threshold
---- ------- ------- ------- ------ --------
1 On 500 Watts 100 Watts (20%) 95 Disable
2 Off 1 Watts 0 Watts (0%) 95 Disable
3 Off 1 Watts 0 Watts (0%) 95 Disable
4 Off 1 Watts 0 Watts (0%) 95 Disable
5 Off 1 Watts 0 Watts (0%) 95 Disable
6 Off 1 Watts 0 Watts (0%) 95 Disable
7 Off 1 Watts 0 Watts (0%) 95 Disable
8 Off 1 Watts 0 Watts (0%) 95 Disable
Port Powered Device State Status Priority Class
----- -------------- ----------- -------- -------- -------
gi1/0/1 IP Phone Model A Auto On High Class0
gi1/0/2 Wireless AP Model A Auto On Low Class1
gi1/0/3 Auto Off Low N/A
...
Example 2:
The following example displays information about the inline power for a
specific port.
console(config)# show power inline gi1/1/1
Port Powered Device State Status Priority Class 364 Power over Ethernet (PoE) Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\PoE.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
----- -------------- ------- ------ -------- -------
gi1/1/1 IP Phone Model A Auto On High Class0
Power limit (for port power-limit mode): 15.4W
Overload Counter: 0
Short Counter: 0
Denied Counter: 0
Absent Counter: 0
Invalid Signature Counter: 0
The following table describes the fields shown in the display:
Field Description
Power The inline power sourcing equipment operational status.
Nominal Power The inline power sourcing equipment nominal power in
Watts.
Consumed Power The measured usage power in Watts.
Usage Threshold The usage threshold expressed in percent for comparing
the measured power and initiating an alarm if threshold is
exceeded.
Traps Indicates if inline power traps are enabled.
Port The Ethernet port number.
Powered device A description of the powered device type.
Admin State Indicates if the port is enabled to provide power. The
possible values are Auto or Never.
Priority The port inline power management priority. The possible
values are Critical, High or Low.
Oper State Describes the port inline power operational state. The
possible values are On, Off, Test-Fail, Testing, Searching or
Fault.
Classification The power consumption classification of the powered
device.
Overload Counter Counts the number of overload conditions detected.
Short Counter Counts the number of short conditions detected.
Denied Counter Counts the number of times power was denied.Power over Ethernet (PoE) Commands 365
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\PoE.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
The following table describes the fields shown in the display:
Following is a list of port status values:
Port is on - valid capacitor detected
Port is on - valid resistor detected
Port is off - main supply voltage is high
Port is off - main supply voltage is low
Port is off -‘disable all ports’ pin is active
Port is off - non-existing port number Fewer ports are available than the
max.
Port is off - Port is yet undefined
Port is off - internal hardware fault
Port is off - user setting
Port is off - detection is in process
Port is off - non-802.3af powered device
Port is off - Overload & Underload states
Port is off – Underload state
Port is off – Overload state
Port is off - power budget exceeded
Port is off - internal hardware fault
Port is off – voltage injection into the port
Port is off - improper Capacitor Detection results
Port is off - discharged load Port fails Capacitor
Port is on – detection regardless (Force On)
Undefined error during Force On
Supply voltage higher than settings
Supply voltage lower than settings
Disable_PDU flag raised during Force On
Port is forced on, then disabled
Port is off – forced power error due to Overload
Absent Counter Counts the number of times power was removed because
powered device dropout was detected.
Invalid Signature
Counter
Counts the number of times an invalid signature of a
powered device was detected.
Field Description366 Power over Ethernet (PoE) Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\PoE.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Port is off - “out of power budget” during Force On
Communication error with PoE devices after Force On
Port is off – short condition
Port is off – over temperature at the port
Port is off – device is too hot
Unknown device port status
Force Power Error Short Circuit
Force Power Error Channel Over Temperature
Force Power Error Chip Over Temperature
Power Management-Static
Power Management-Static -ovl
Force Power Error Management Static
Force Power Error Management Static -ovl
High power port is ON
Chip Over Power
Force Power Error Chip Over Power
show power inline consumption
Use the show power inline consumption EXEC mode command to display
information about the inline power consumption for all interfaces or for a
specific interface.
Syntax
show power inline consumption [interface-id | module stack-membernumber]
Parameters
Interface-id—Specifies an interface ID. The interface ID must be an
Ethernet port.
stack-member-number—Specifies the switch member in a stack.
Default Configuration
There is no default configuration for this command.Power over Ethernet (PoE) Commands 367
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\PoE.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Command Mode
EXEC mode
Example
The following example displays information about the inline power
consumption.
show power inline version
Use the show power inline version EXEC mode command to display the
power inline microcontroller's software version for all the stacking units or for
a specific unit.
Syntax
show power inline version [unit unit]
Parameters
unit unit — Specifies the stacking unit number.
Default Configuration
There is no default configuration for this command.
Command Mode
EXEC mode
Console# show power inline consumption
Port
----
gi1/0/1
gi1/0/1
gi1/0/1
Power
Limit (W)
----------
15.4
15.4
15.4
Power (W)
----------
4.115
4.157
4.021
Voltage (V)
---------
50.8
50.7
50.9
Current
(mA)
---------
81
82
79368 Power over Ethernet (PoE) Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\PoE.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
The following example displays information about the inline power
consumption.
Console# show power inline version
Unit
----
1
2
Software version
----------------
1.12
1.12EEE Commands 369
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\750_EEE.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
23
EEE Commands
eee enable (global)
Use the eee enable Global Configuration command to enable the EEE mode
globally. Use the no format of the command to disable the mode.
Syntax
eee enable
no eee enable
Default Configuration
EEE is enabled.
Command Mode
Global Configuration mide
User Guidelines
Since EEE uses the Auto-Negotiation to negotiate the EEE support on both
sides of the link, if Auto-Negotiation is not enabled on the port, the EEE
Operational status is disabled.
eee enable (interface)
Use the eee enable Interface Configuration command to enable the EEE
mode on an Ethernet port. Use the no format of the command to disable the
mode.
Syntax
eee enable370 EEE Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\750_EEE.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
no eee enable
Default Configuration
EEE is enabled.
Command Mode
Interface Configuration mode (Ethernet)
User Guidelines
Since EEE uses the Auto-Negotiation to negotiate the EEE support on both
sides of the link, if Auto-Negotiation is not enabled on the port, the EEE
Operational status is disabled.
eee lldp enable
Use the eee lldp enable Interface Configuration command to enable EEE
support by LLDP on an Ethernet port. Use the no format of the command to
disable the support.
Syntax
eee lldp enable
no eee lldp enable
Default Configuration
Enabled
Command Mode
Interface Configuration mode (Ethernet)
User Guidelines
Enabling EEE LLDP advertisement allows devices to choose and change
system wake-up times in order to get the optimal energy saving mode.
show eee
Use the show eee EXEC command to display EEE information.EEE Commands 371
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\750_EEE.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Syntax
show eee [interface-id]
Parameters
interface-id—Specify an interface ID. The interface ID must be an Ethernet
port.
Command Mode
EXEC
Examples
Example 1. Brief Information about all ports
Switch>show eee
EEE globally enabled
EEE Administrate status is enabled on ports: gi1/0/1-6,gi1/0/12
EEE Operational status is enabled on ports: gi1/0/1,gi1/0/3-
6,gi1/0/12,gi1/0/15
EEE LLDP Administrate status is enabled on ports: gi1/0/1-10
EEE LLDP Operational status is enabled on ports: gi1/0/3-5
Example 2. Port in state notPresent, no information if port
supports EEE
Switch> show eee gi1/0/10
Port Status: notPresent
EEE Administrate status: enabled
EEE LLDP Administrate status: enabled
EEE LLDP Administrate status: enabled
Example 3. Port in status DOWN
Switch>show eee gi1/0/10
Port Status: DOWN
EEE capabilities:
Speed 10M: EEE not supported372 EEE Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\750_EEE.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Speed 100M: EEE supported
Speed 1G: EEE supported
Speed 10G: EEE not supported
EEE Administrate status: enabled
EEE LLDP Administrate status: enabled
Example 4. Port in status UP and does not support EEE
Switch>show eee gi1/0/20
Port Status: UP
EEE capabilities:
Speed 10M: EEE not supported
Speed 100M: EEE supported
Speed 1G: EEE supported
Speed 10G: EEE not supported
Current port speed: 1Gbps
EEE Administrate status: enabled
EEE LLDP Administrate status: enabled
Example 5. Neighbor does not support EEE
Switch>show eee gi1/0/15
Port Status: UP
EEE capabilities:
Speed 10M: EEE not supported
Speed 100M: EEE supported
Speed 1G: EEE supported
Speed 10G: EEE not supported
Current port speed: 1Gbps
EEE Remote status: disabled
EEE Administrate status: enabled
EEE Operational status: disabled (neighbor does not support)
EEE LLDP Administrate status: enabledEEE Commands 373
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\750_EEE.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
EEE LLDP Operational status: disabled
Example 6. EEE is disabled on the port
Switch>show eee gi1/0/10
Port Status: UP
EEE capabilities:
Speed 10M: EEE not supported
Speed 100M: EEE supported
Speed 1G: EEE supported
Speed 10G: EEE not supported
Current port speed: 1Gbps
EEE Administrate status: disabled
EEE Operational status: disabled
EEE LLDP Administrate status: enabled
EEE LLDP Operational status: disabled
Example 7. EEE is running on the port, EEE LLDP is disabled
Switch>show eee gi1/0/12
Port Status: UP
EEE capabilities:
Speed 10M: EEE not supported
Speed 100M: EEE supported
Speed 1G: EEE supported
Speed 10G: EEE not supported
Current port speed: 1Gbps
EEE Remote status: enabled
EEE Administrate status: enabled
EEE Operational status: enabled
EEE LLDP Administrate status: disabled
EEE LLDP Operational status: disabled
Resolved Tx Timer: 10usec374 EEE Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\750_EEE.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Local Tx Timer: 10 usec
Resolved Timer: 25 usec
Local Rx Timer: 20 usec
Example 8. EEE and EEE LLDP are running on the port
Switch>show eee gi1/0/3
Port Status: UP
EEE capabilities:
Speed 10M: EEE not supported
Speed 100M: EEE supported
Speed 1G: EEE supported
Speed 10G: EEE not supported
Current port speed: 1Gbps
EEE Remote status: enabled
EEE Administrate status: enabled
EEE Operational status: enabled
EEE LLDP Administrate status: enabled
EEE LLDP Operational status: enabled
Resolved Tx Timer: 10usec
Local Tx Timer: 10 usec
Remote Rx Timer: 5 usec
Resolved Timer: 25 usec
Local Rx Timer: 20 usec
Remote Tx Timer: 25 usec
Example 9. EEE is running on the port, EEE LLDP enabled but not
synchronized with remote link partner
Switch>show eee gi1/0/9
Port Status: up
EEE capabilities:
Speed 10M: EEE not supported
Speed 100M: EEE supportedEEE Commands 375
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\750_EEE.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Speed 1G: EEE supported
Speed 10G: EEE not supported
Current port speed: 1Gbps
EEE Remote status: enabled
EEE Administrate status: enabled
EEE Operational status: enabled
EEE LLDP Administrate status: enabled
EEE LLDP Operational status: disabled
Resolved Tx Timer: 64
Local Tx Timer: 64
Resolved Rx Timer: 16
Local Rx Timer: 16
Example 10. EEE and EEE LLDP are running on the port
Switch>show eee gi1/0/3
Port Status: UP
EEE capabilities:
Speed 10M: EEE not supported
Speed 100M: EEE supported
Speed 1G: EEE supported
Speed 10G: EEE not supported
Current port speed: 1Gbps
EEE Remote status: enabled
EEE Administrate status: enabled
EEE Operational status: enabled
EEE LLDP Administrate status: enabled
EEE LLDP Operational status: enabled
Resolved Tx Timer: 10usec
Local Tx Timer: 10 usec
Remote Rx Timer: 5 usec
Resolved Timer: 25 usec376 EEE Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\750_EEE.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Local Rx Timer: 20 usec
Remote Tx Timer: 25 usecGreen Ethernet 377
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\750_Green_Ethernet.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
24
Green Ethernet
show green-ethernet
Use the show green-ethernet Privileged EXEC mode command to show
green-ethernet configuration and information.
Syntax
show green-ethernet [interface-id]
Parameters
interface-id—Specifies an interface ID. The interface ID must be an
Ethernet port.
Parameters Range
Default. When no interface is specified, this command shows information for
all interfaces.
Command Mode
Privileged EXEC mode
User Guidelines
The following describes all possible reasons the show command displays, and
their descriptions.
If there are a several reasons for non-operation, then only the highest priority
reason is displayed.
Energy-detect Non-operational Reasons
priority Reason Description378 Green Ethernet
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\750_Green_Ethernet.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
console# show green-ethernet
Energy-Detect mode: Enabled
Short-Reach mode: Disabled
Power Consumption: 76% (3.31W out of maximum 4.33W)
Cumulative Energy Saved: 33 [Watt*Hour]
Short-Reach cable length threshold: 50m
Port Energy-Detect Short-Reach VCT Cable
Admin Oper Reason Admin Force Oper Reason Length
---- ----- ---- ------- ----- ----- ---- ------- ------
gi1/0/1 on on off off off
gi1/0/2 on off LU on off off < 50
gi1/0/3 on off LU off off off
1 NP Port is not present
2 LT Link Type is not supported (fiber, auto media select)
3 LU Port Link is up – NA
Short-Reach Non-operational Reasons
Priority Reason Description
1 NP Port is not present
2 LT Link Type is not supported (fiber)
3 LS Link Speed Is not Supported (100M,10M,10G)
4 LL Link Length received from VCT Test exceed threshold
6 LD Port Link is Down – NA Green Ethernet 379
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\750_Green_Ethernet.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
green-ethernet short-reach (global)
Use the green-ethernet short-reach Global Configuration mode command to
enable green-ethernet short-reach mode globally. Use the no form of this
command to disabled it.
Syntax
green-ethernet short-reach
no green-ethernet short-reach
Parameters
This command has no arguments or keywords.
Default Configuration
EEE is enabled.
Command Mode
Global Configuration mode
Example
console(config)# green-ethernet short-reach
green-ethernet short-reach (interface)
Use the green-ethernet short-reach Interface Configuration mode command
to enable green-ethernet short-reach mode on an interface. Use the no form
of this command to disable it on an interface.
Syntax
green-ethernet short-reach
no green-ethernet short-reach
Parameters
This command has no arguments or keywords.380 Green Ethernet
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\750_Green_Ethernet.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Default Configuration
EEE is enabled.
Command Mode
Interface Configuration mode (Ethernet)
User Guidelines
When short-reach Mode is enabled and is not forced, the VCT (Virtual
Cable Tester) length check must be performed. The VCT length check can be
performed only on a copper port operating at a speed of 1000 Mbps. If the
media is not copper or the link speed is not 1000 Mbps and short-reach mode
is not forced (by green-ethernet short-reach force), short-reach mode is not
applied.
When the interface is set to enhanced mode, after the VCT length check has
completed and set the power to low, an active monitoring for errors is done
continuously. In the case of errors crossing a certain threshold, the PHY will
be reverted to long reach.
Example
console(config)# interface gi1/0/1
console(config-if)# green-ethernet short-reach
green-ethernet short-reach force
Use the green-ethernet short-reach force Interface Configuration mode
command to force short-reach mode on an interface. Use the no form of this
command to return to default.
Syntax
green-ethernet short-reach force
no green-ethernet short-reach force
Parameters
This command has no arguments or keywords.Green Ethernet 381
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\750_Green_Ethernet.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Default Configuration
Short-reach mode is not forced.
Command Mode
Interface Configuration mode(Ethernet)
Example
console(config)# interface gi1/0/1
console(config-if)# green-ethernet short-reach force
green-ethernet short-reach threshold
Use the green-ethernet short-reach threshold Global Configuration mode
command to set the maximum cable length for applying short-reach. Use the
no form of this command to return to default.
Syntax
green-ethernet short-reach threshold cable-length
no green-ethernet short-reach threshold
Parameters
cable-length—Specifies the maximum cable length (in meters) measured by
VCT that allows applying short-reach mode (cable-length 0–70 meters)
Default Configuration
The default length is 40 meters.
Command Mode
Global Configuration mode
User Guidelines
Note that the automatic cable length measurement accuracy is +-10 meters.
i.e. a cable with a real length of 30 m may be evaluated in the range of
20m–40m. Length performance depends on the link partner signal quality,
cable quality and whether link partner also operates in short-reach mode.382 Green Ethernet
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\750_Green_Ethernet.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
The recommended default is 50m, as recommended by Marvell PHY team for
any cable type. see appendix
However, Marvell tests show that link partner can operate error free with an
up to 80 m cable (cat 5e).
The user may choose to change the threshold parameter under certain
circumstances.
Setting the threshold to 0 meters basically results in the short reach feature
always being disabled, because the threshold will always be exceeded.
green-ethernet power-meter reset
Use the green-ethernet power meter reset Privileged EXEC mode command
to reset the power save meter.
Syntax
green-ethernet power-meter reset
Command Mode
Privileged EXEC mode.Port Channel Commands 383
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Port_Channel.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
25
Port Channel Commands
channel-group
Use the channel-group Interface Configuration (Ethernet) mode command
to associate a port with a port-channel. Use the no form of this command to
remove a port from a port-channel.
Syntax
channel-group port-channel mode {on | auto}
no channel-group
Parameters
• port-channel—Specifies the port channel number for the current port to
join.
• mode {on | auto}—Specifies the mode of joining the port channel. The
possible values are:
• on—Forces the port to join a channel without an LACP operation.
• auto—Forces the port to join a channel as a result of an LACP
operation.
Default Configuration
The port is not assigned to a port-channel.
Command Mode
Interface Configuration (Ethernet) mode384 Port Channel Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Port_Channel.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
The following example forces port gi1/0/1 to join port-channel 1 without an
LACP operation.
Console(config)# interface gi1/0/1
Console(config-if)# channel-group 1 mode on
port-channel load-balance
Use the port-channel load-balance Global Configuration mode command to
configure the load balancing policy of the port channeling. Use the no form of
this command to reset to default.
Syntax
port-channel load-balance {src-dst-mac | src-dst-ip | src-dst-mac-ip | }
no port-channel load-balance
Parameters
• src-dst-mac—Port channel load balancing is based on the source and
destination MAC address.
• src-dst-ip—Port channel load balancing is based on the source and
destination IP address.
• src-dst-mac-ip—Port channel load balancing is based on the source and
destination of MAC and IP addresses.
Default Configuration
src-dst-mac is the default option.
Command Mode
Global Configuration mode
User Guidelines
In src-dst-mac-ip-port load balancing policy, fragmented packets might be
reordered.Port Channel Commands 385
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Port_Channel.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
console#
console# configure
console(config)# port-channel load-balance src-dst-mac
console(config)# port-channel load-balance src-dst-ip
console(config)# port-channel load-balance src-dst-mac-ip
console(config)# port-channel load-balance src-dst-mac-ip-port
console(config)#
show interfaces port-channel
Use the show interfaces port-channel EXEC mode command to display portchannel information for all port channels or for a specific port channel.
Syntax
show interfaces port-channel [interface-id]
Parameters
interface-id—Specify an interface ID. The interface ID must be a Port
Channel.
Command Mode
EXEC mode
Example
The following example displays information on all port-channels.
console#
console# show interfaces port-channel
Load balancing: src-dst-mac.
Gathering information...
Channel Ports
------- -----
Po1 Active: gi1/0/1,Inactive: gi1/0/2-3
Po2 Active: gi1/0/25 Inactive: gi1/0/24386 Port Channel Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Port_Channel.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Po3
console# show interfaces switchport gi1/0/10
Gathering information...
Name: gi1/0/10
Switchport: enable
Administrative Mode: access
Operational Mode: down
Access Mode VLAN: 1
Access Multicast TV VLAN: none
Trunking Native Mode VLAN: 1
Trunking VLANs Enabled: 1
2-4094 (Inactive)
General PVID: 1
General VLANs Enabled: none
General Egress Tagged VLANs Enabled: none
General Forbidden VLANs: none
General Ingress Filtering: enabled
General Acceptable Frame Type: all
General GVRP status: disabled
Customer Mode VLAN: none
Private-vlan promiscuous-association primary VLAN: none
Private-vlan promiscuous-association Secondary VLANs Enabled: none
Private-vlan host-association primary VLAN: none
Private-vlan host-association Secondary VLAN Enabled: none
DVA: disableAddress Table Commands 387
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Address_Table.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
26
Address Table Commands
bridge multicast filtering
Use the bridge multicast filtering Global Configuration mode command to
enable the filtering of multicast addresses. Use the no form of this command
to disable multicast address filtering.
Syntax
bridge multicast filtering
no bridge multicast filtering
Default Configuration
Multicast address filtering is disabled. All multicast addresses are flooded to
all ports.
Command Mode
Global Configuration mode
User Guidelines
If multicast devices exist on the VLAN, do not change the unregistered
multicast addresses’ states to drop on the device ports.
If multicast devices exist on the VLAN and IGMP-snooping is not enabled,
the bridge multicast forward-all command should be used to enable
forwarding all multicast packets to the multicast switches.
Example
The following example enables bridge multicast filtering.
Console(config)# bridge multicast filtering388 Address Table Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Address_Table.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
bridge multicast address
Use the bridge multicast address Interface Configuration (VLAN) mode
command to register a MAC-layer multicast address in the bridge table and
statically add or remove ports to or from the group. Use the no form of this
command to unregister the MAC address.
Syntax
bridge multicast address {mac-multicast-address} [[add | remove] {ethernet
interface-list |
port-channel port-channel-list}]
no bridge multicast address {mac-multicast-address}
Parameters
• mac-multicast-address—Specifies the group MAC multicast address.
• add—Adds ports to the group.
• remove—Removes ports from the group.
• ethernet interface-list—Specifies a list of Ethernet ports. Separate
nonconsecutive Ethernet ports with a comma and no spaces. Use a hyphen
to designate a range of ports.
• port-channel port-channel-list—Specifies a list of port channels. Separate
nonconsecutive port-channels with a comma and no spaces; use a hyphen
to designate a range of port channels.
Default Configuration
No multicast addresses are defined.
If ethernet interface-list or port-channel port-channel-list is specified
without specifying add or remove, the default option is add.
Command Mode
Interface Configuration (VLAN) mode
User Guidelines
To register the group in the bridge database without adding or removing ports
or port channels, specify the mac-multicast-address parameter only.Address Table Commands 389
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Address_Table.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Static multicast addresses can be defined on static VLANs only.
You can execute the command before the VLAN is created.
Example
The following example registers the MAC address to the bridge table:
Console(config)# interface vlan 8
Console(config-if)# bridge multicast address 01:00:5e:02:02:03
The following example registers the MAC address and adds ports statically.
Console(config)# interface vlan 8
Console(config-if)# bridge multicast address 01:00:5e:02:02:03
add gi1/0/1-2
bridge multicast forbidden address
Use the bridge multicast forbidden address Interface Configuration (VLAN)
mode command to forbid adding or removing a specific multicast address to
or from specific ports. Use the no form of this command to restore the default
configuration.
Syntax
bridge multicast forbidden address {mac-multicast-address} {add | remove}
{ethernet interface-list | port-channel port-channel-list}
no bridge multicast forbidden address {mac-multicast-address}
Parameters
• mac-multicast-address—Specifies the group MAC multicast address.
• add—Forbids adding ports to the group.
• remove—Forbids removing ports from the group.
• ethernet interface-list—Specifies a list of Ethernet ports. Separate
nonconsecutive Ethernet ports with a comma and no spaces. Use a hyphen
to designate a range of ports.390 Address Table Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Address_Table.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
• port-channel port-channel-list—Specifies a list of port channels. Separate
nonconsecutive port-channels with a comma and no spaces. Use a hyphen
to designate a range of port channels.
Default Configuration
No forbidden addresses are defined.
Command Mode
Interface Configuration (VLAN) mode
User Guidelines
Before defining forbidden ports, the multicast group should be registered.
You can execute the command before the VLAN is created.
Example
The following example forbids MAC address 0100.5e02.0203 on port 2/9
within VLAN 8.
Console(config)# interface vlan 8
Console(config-if)# bridge multicast address 0100.5e.02.0203
Console(config-if)# bridge multicast forbidden address
0100.5e02.0203 add gi1/0/9
bridge multicast unregistered
Use the bridge multicast unregistered Interface Configuration (Ethernet,
Port-Channel) mode command to configure the forwarding state of
unregistered multicast addresses. Use the no form of this command to restore
the default configuration.
Syntax
bridge multicast unregistered {forwarding | filtering}
no bridge multicast unregistered
Parameters
• forwarding—Forwards unregistered multicast packets.Address Table Commands 391
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Address_Table.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
• filtering—Filters unregistered multicast packets.
Default Configuration
Unregistered multicast addresses are forwarded.
Command Mode
Interface Configuration (Ethernet, Port-Channel) mode
User Guidelines
Do not enable unregistered multicast filtering on ports that are connected to
routers, because the 224.0.0.x address range should not be filtered. Note that
routers do not necessarily send IGMP reports for the 224.0.0.x range.
You can execute the command before the VLAN is created.
Example
The following example specifies that unregistered multicast packets are
filtered on gigabitethernet port 1/0/1:
Console(config)# interface gi1/0/1
Console(config-if)# bridge multicast unregistered filtering
bridge multicast forward-all
Use the bridge multicast forward-all Interface Configuration (VLAN) mode
command to enable forwarding all multicast packets for a range of ports or
port channels. Use the no form of this command to restore the default
configuration.
Syntax
bridge multicast forward-all {add | remove} {ethernet interface-list | portchannel port-channel-list}
no bridge multicast forward-all
Parameters
• add—Forces forwarding of all multicast packets.
• remove—Does not force forwarding of all multicast packets.392 Address Table Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Address_Table.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
• ethernet interface-list—Specifies a list of Ethernet ports. Separate
nonconsecutive Ethernet ports with a comma and no spaces. Use a hyphen
to designate a range of ports.
• port-channel port-channel-list—Specifies a list of port channels. Separate
nonconsecutive port-channels with a comma and no spaces. Use a hyphen
to designate a range of port channels.
Default Configuration
Forwarding of all multicast packets is disabled.
Command Mode
Interface Configuration (VLAN) mode
Example
The following example enables all multicast packets on port gi1/0/8 to be
forwarded.
Console(config)# interface vlan 2
Console(config-if)# bridge multicast forward-all add gi1/0/8
bridge multicast forbidden forward-all
Use the bridge multicast forbidden forward-all Interface Configuration
(VLAN) mode command to forbid a port to dynamically join multicast
groups. Use the no form of this command to restore the default
configuration.
Syntax
bridge multicast forbidden forward-all {add | remove} {ethernet interfacelist | port-channel port-channel-list}
no bridge multicast forbidden forward-all
Parameters
• add—Forbids forwarding of all multicast packets.
• remove—Does not forbid forwarding of all multicast packets.Address Table Commands 393
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Address_Table.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
• ethernet interface-list—Specifies a list of Ethernet ports. Separate
nonconsecutive Ethernet ports with a comma and no spaces. Use a hyphen
to designate a range of ports.
• port-channel port-channel-list—Specifies a list of port channels. Separate
nonconsecutive port-channels with a comma and no spaces; use a hyphen
to designate a range of port channels.
Default Configuration
Ports are not forbidden to dynamically join multicast groups.
Command Mode
Interface Configuration (VLAN) mode
User Guidelines
Use this command to forbid a port to dynamically join (by IGMP, for
example) a multicast group.
The port can still be a multicast router port.
Example
The following example forbids forwarding of all multicast packets to gi1/0/1
within VLAN 2.
Console(config)# interface vlan 2
Console(config-if)# bridge multicast forbidden forward-all add
ethernet gi1/0/1
mac address-table static
Use the mac address-table static Global Configuration mode command to
add MAC-layer station source address to the MAC address table. Use the no
form of this command to delete the MAC address.
Syntax
mac address-table static mac-address vlan vlan-id interface interface-id
[permanent | delete-on-reset | delete-on-timeout | secure ]
no mac address-table static [mac-address] vlan vlan-id394 Address Table Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Address_Table.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Parameters
mac-address—AC address (Range: Valid MAC address)
vlan-id—Specify the VLAN
interface-id—Specify an interface ID. The interface ID can be one of the
following types: Ethernet port or port-channel (Range: Valid Ethernet port,
Valid Port-channel number)
permanent—The address can only deleted by the no bridge address
command.
delete-on-reset—The address is deleted after reset.
delete-on-timeout—The address is deleted after aged out.
secure—The address is deleted after the port changes mode to unlock
learning (no port security command). Available only when the port is in
learning locked mode.
Default Configuration
No static addresses are defined. The default mode for an added address is
permanent.
Command Mode
Global Configuration mode
Example
console(config)# mac address-table static 00:3f:bd:45:5a:b1 vlan 1
gi1/0/1
clear mac address-table
Use the clear mac address-table Privileged EXEC command to remove
learned or secure entries from the forwarding database.
Syntax
clear mac address-table dynamic [ interface interface-id ]
clear mac address-table secure interface interface-idAddress Table Commands 395
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Address_Table.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Parameters
interface interface-id—Delete all dynamic address on the specified
interface.The interface ID can be one of the following types: Ethernet port or
port-channel.
Command Mode
Privileged EXEC mode
Example
console# clear mac address-table dynamic
mac address-table aging-time
Use the mac address-table aging-time global configuration command to set
the aging time of the address table. Use the no form of this command to
restore the default.
Syntax
mac address-table aging-time seconds
no mac address-table aging-time
Parameters
seconds—Time is number of seconds. (Range:10–300)
Default Configuration
300
Command Mode
Global Configuration mode
Example
console(config)# mac address-table aging-time 600396 Address Table Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Address_Table.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
port security
Use the port security Interface Configuration (Ethernet, Port-channel) mode
command to enable port security on an interface. Use the no form of this
command to disable port security on an interface.
Syntax
port security [forward | discard | discard-shutdown] [trap seconds]
no port security
Parameters
• forward—Forwards packets with unlearned source addresses, but does not
learn the address.
• discard—Discards packets with unlearned source addresses.
• discard-shutdown—Discards packets with unlearned source addresses and
shuts down the port.
• trap seconds—Sends SNMP traps and specifies the minimum time
interval in seconds between consecutive traps. (Range: 1–1000000)
Default Configuration
The feature is disabled
The default mode is discard.
Command Mode
Interface Configuration (Ethernet, port-channel) mode
Example
The following example forwards all packets to port gi1/0/1 without learning
addresses of packets from unknown sources and sends traps every 100 seconds
if a packet with an unknown source address is received.
console(config)# gi1/0/1
Console(config-if)# port security forward trap 100Address Table Commands 397
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Address_Table.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
port security mode
Use the port security mode Interface Configuration (Ethernet, port-channel)
mode command configures the port security learning mode. Use the no form
of this command to restore the default configuration.
Syntax
port security mode {lock | max-addresses }
no port security mode
Parameters
• lock—Saves the current dynamic MAC addresses associated with the port
and disables learning, relearning and aging.
• max-addresses—Deletes the current dynamic MAC addresses associated
with the port and learns up to the maximum number of addresses allowed
on the port. Relearning and aging are enabled.
Default Configuration
The default port security mode is lock.
Command Mode
Interface Configuration (Ethernet, port-channel) mode
Example
The following example sets the port security mode to dynamic for
gigabitethernet interface 1/0/7.
Console(config)# interface gi1/0/7
Console(config-if)# port security mode dynamic
port security max
Use the port security mode Interface Configuration (Ethernet, Port-channel)
mode command to configure the maximum number of addresses that can be
learned on the port while the port is in port security max-addresses mode. Use
the no form of this command to restore the default configuration.398 Address Table Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Address_Table.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Syntax
port security max {max-addr}
no port security max
Parameters
max-addr—Specifies the maximum number of addresses that can be learned
on the port. (Range: 0–128)
Default Configuration
This default maximum number of addresses is 1.
Command Mode
Interface Configuration (Ethernet, Port-channel) mode
User Guidelines
This command is relevant in port security max-addresses mode only.
Example
Console(config)# interface gi1/0/1
Console(config-if)# port security max 20
port security routed secure-address
Use the port security routed secure-address Interface Configuration
(Ethernet, Port-channel) mode command to add a MAC-layer secure address
to a routed port. Use the no form of this command to delete a MAC address
from a routed port.
Syntax
port security routed secure-address mac-address
no port security routed secure-address [mac-address]
Parameters
mac-address—Specifies the MAC address.Address Table Commands 399
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Address_Table.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Default Configuration
No addresses are defined.
Command Mode
Interface Configuration (Ethernet, port-channel) mode. It cannot be
configured for a range of interfaces (range context).
User Guidelines
This command enables adding secure MAC addresses to a routed port in port
security mode. The command is available when the port is a routed port and
in port security mode. The address is deleted if the port exits the security
mode or is not a routed port.
This command is required because the bridge address command cannot be
executed on internal VLANs.
Example
The following example adds the MAC-layer address 66:66:66:66:66:66 to
gigabitethernet port 1/0/1.
Console(config)# interface gi1/0/1
Console(config-if)# port security routed secure-address
66:66:66:66:66:66
show mac address-table
Use the show mac address-table EXEC command to view entries in the MAC
address table.
Syntax
show mac address-table [dynamic | static| secure] [vlan vlan] [interface
interface-id] [address mac-address]
Parameters
• dynamic—Displays only dynamic MAC address table entries.
• static—Displays only static MAC address table entries.
• secure—Displays only secure MAC address table entries.400 Address Table Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Address_Table.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
• vlan—Specifies VLAN, such as VLAN 1.
• interface-id—Specifies an interface ID. The interface ID can be one of the
following types: Ethernet port or port-channel.
• mac-address—MAC address.
Default
Command Mode
EXEC mode
User Guidelines
Internal usage VLANs (VLANs that are automatically allocated on routed
ports) are presented in the VLAN column by a port number and not by a
VLAN ID.
Example
Console# show mac address-table
Aging time is 300 sec
VLAN MAC Address Port Type
-------- --------------------- ---------- ----------
1 00:00:26:08:13:23 0 self
1 00:3f:bd:45:5a:b1 gi1/0/1 static
1 00:a1:b0:69:63:f3 gi1/0/24 dynamic
2 00:a1:b0:69:63:f3 gi1/0/24 dynamic
Console# show mac address-table 00:3f:bd:45:5a:b1
Aging time is 300 sec
VLAN MAC Address Port Type
-------- --------------------- ---------- ----------
1 00:3f:bd:45:5a:b1 static gi1/0/9Address Table Commands 401
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Address_Table.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
show mac address-table count
Use the show mac address-table count EXEC mode command to display the
number of addresses present in the Forwarding Database.
Syntax
show mac address-table count [vlan vlan | interface interface-id]
Parameters
• vlan—Specifies VLAN.
• interface-id—Specifies an interface ID. The interface ID can be one of the
following types: Ethernet port or port-channel.
Command Mode
EXEC mode
Example
Console# show mac address-table count
Capacity: 8192
Free: 8083
Used: 109
Static addresses: 2
Secure addresses: 1
Dynamic addresses: 97
Internal addresses: 9
show bridge multicast address-table
Use the show bridge multicast address-table EXEC mode command to
display multicast MAC address or IP address table information.402 Address Table Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Address_Table.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Syntax
show bridge multicast address-table [vlan vlan-id] [address {mac-multicastaddress | ipv4-multicast-address | ipv6-multicast-address}] [format {ip |
mac}]
Parameters
• vlan vlan-id—Specifies the VLAN ID.
• address {mac-multicast-address | ipv4-multicast-address | ipv6-
multicast-address}—Specifies the multicast address. The possible values
are:
• mac-multicast-address—Specifies the MAC multicast address.
• ipv4-multicast-address—Specifies the IPv4 multicast address.
• ipv6-multicast-address—Specifies the IPv6 multicast address.
• format {ip | mac}—Specifies the multicast address format. The possible
values are:
• ip—Specifies that the multicast address is an IP address.
• mac—Specifies that the multicast address is a MAC address.
Default Configuration
If the format is not specified, it defaults to mac.
Command Mode
EXEC mode
User Guidelines
A MAC address can be displayed in IP format only if it is within the range
0100.5e00.0000 through 0100.5e7f.ffff.
Multicast Router ports (defined statically or discovered dynamically) are
members in all MC groups.
Ports that were defined via bridge multicast forbidden forward-all command
are displayed in all forbidden MC entries.
Example
The following example displays bridge multicast address information.
Console# show bridge multicast address-tableAddress Table Commands 403
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Address_Table.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Multicast address table for VLANs in MAC-GROUP bridging mode:
Vlan MAC Address Type Ports
---- ----------------- -------------- -----
8 01:00:5e:02:02:03 Static 1-2
Forbidden ports for multicast addresses:
Vlan MAC Address Ports
---- ----------------- -----
8 01:00:5e:02:02:03 gi1/0/9
Multicast address table for VLANs in IPv4-GROUP bridging mode:
Vlan MAC Address Type Ports
---- ----------------- -------------- -----
1 224.0.0.251 Dynamic gi1/0/12
Forbidden ports for multicast addresses:
Vlan MAC Address Ports
---- ----------------- -----
1 232.5.6.5
1 233.22.2.6
Multicast address table for VLANs in IPv4-SRC-GROUP bridging mode:
Vlan Group Address Source address Type Ports
---- --------------- --------------- -------- -----
1 224.2.2.251 11.2.2.3 Dynamic gi1/0/11
Forbidden ports for multicast addresses:404 Address Table Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Address_Table.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Vlan Group Address Source Address Ports
---- --------------- --------------- -------
8 239.2.2.2 * gi1/0/9
8 239.2.2.2 1.1.1.11 gi1/0/9
Multicast address table for VLANs in IPv6-GROUP bridging mode:
VLAN IP/MAC Address Type Ports
---- ----------------- --------- ---------------------
8 ff02::4:4:4 Static gi1/0/1-2,gi1/0/7,Po1
Forbidden ports for multicast addresses:
VLAN IP/MAC Address Ports
---- ----------------- -----------
8 ff02::4:4:4 gi1/0/9
Multicast address table for VLANs in IPv6-SRC-GROUP bridging mode:
Vlan Group Address Source address Type Ports
---- --------------- --------------- -------- ------------------
8 ff02::4:4:4 * Static gi1/0/1-2,gi1/0/7,Po1
8 ff02::4:4:4 fe80::200:7ff: Static
fe00:200
Forbidden ports for multicast addresses:
Vlan Group Address Source address Ports
---- --------------- --------------- ----------
8 ff02::4:4:4 * gi1/0/9
8 ff02::4:4:4 fe80::200:7ff:f gi1/0/9
e00:200Address Table Commands 405
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Address_Table.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
show bridge multicast address-table static
Use the show bridge multicast address-table static EXEC mode command to
display the statically configured multicast addresses.
Syntax
show bridge multicast address-table static [vlan vlan-id] [address macmulticast-address | ipv4-multicast-address | ipv6-multicast-address] [source
ipv4-source-address | ipv6-source-address] [all | mac | ip]
Parameters
• vlan vlan-id—Specifies the VLAN ID.
• address {mac-multicast-address | ipv4-multicast-address | ipv6-
multicast-address}—Specifies the multicast address. The possible values
are:
• mac-multicast-address—Specifies the MAC multicast address.
• ipv4-multicast-address—Specifies the IPv4 multicast address.
• ipv6-multicast-address—Specifies the IPv6 multicast address.
• source {ipv4-source-address | ipv6-source-address}—Specifies the source
address. The possible values are:
• ipv4-address—Specifies the source IPv4 address.
• ipv6-address—Specifies the source IPv6 address.
Default Configuration
When all/mac/ip is not specified, all entries (mac and ip) will be displayed.
Command Mode
EXEC mode
User Guidelines
A MAC address can be displayed in IP format only if it is within the range
0100.5e00.0000–- 0100.5e7f.ffff.406 Address Table Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Address_Table.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
The following example displays the statically configured multicast addresses.
Console# show bridge multicast address-table static
MAC-GROUP table
Vlan
----
1
MAC Address
--------------
0100.9923.8787
Ports
--------
gi1/0/1, gi1/0/2
Forbidden ports for multicast addresses:
Vlan
----
MAC Address
--------------
Ports
--------
IPv4-GROUP Table
Vlan
----
1
19
19
IP Address
----------
231.2.2.3
231.2.2.8
231.2.2.8
Ports
--------
gi1/0/1, gi1/0/2
gi1/0/1-8
gi1/0/9-11
Forbidden ports for multicast addresses:
Vlan
----
1
19
IP Address
----------
231.2.2.3
231.2.2.8
Ports
--------
gi1/0/8
gi1/0/8
IPv4-SRC-GROUP Table:Address Table Commands 407
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Address_Table.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Vlan
----
Group Address
---------------
Source
address
---------------
Ports
------
Forbidden ports for multicast addresses:
Vlan
----
Group Address
---------------
Source
address
---------------
Ports
------
IPv6-GROUP Table
Vlan
----
191
IP Address
-----------------
FF12::8
Ports
---------
gi1/0/1-8
Forbidden ports for multicast addresses:
Vlan
----
11
191
IP Address
-----------------
FF12::3
FF12::8
Ports
---------
gi1/0/8
gi1/0/8
IPv6-SRC-GROUP Table:
Vlan
----
192
Group Address
---------------
FF12::8
Source
address
---------------
FE80::201:C9A9:FE40:8988
Ports
------
gi1/0/1-
8408 Address Table Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Address_Table.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
show bridge multicast filtering
Use the show bridge multicast filtering EXEC mode command to display the
multicast filtering configuration.
Syntax
show bridge multicast filtering vlan-id
Parameters
vlan-id—Specifies the VLAN ID. (Range: Valid VLAN)
Command Mode
EXEC mode
Forbidden ports for multicast addresses:
Vlan
----
192
Group Address
---------------
FF12::3
Source
address
---------------
FE80::201:C9A9:FE40
:8988
Ports
------
gi1/0/8Address Table Commands 409
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Address_Table.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
The following example displays the multicast configuration for VLAN 1.
show bridge multicast unregistered
Use the show bridge multicast unregistered EXEC mode command to
display the unregistered multicast filtering configuration.
Syntax
show bridge multicast unregistered [interface-id]
Parameters
interface-id—Specifies an interface ID. The interface ID can be one of the
following types: Ethernet port or Port-channel.
Command Mode
EXEC mode
Console# show bridge multicast filtering 1
Filtering: Enabled
VLAN: 1
Port
-----
gi1/0/1
gi1/0/2
gi1/0/3
Forward-All
Static
---------
Forbidden
Forward
-
Status
------
Filter
Forward(s)
Forward(d)410 Address Table Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Address_Table.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
The following example displays the unregistered multicast configuration.
show ports security
Use the show ports security Privileged EXEC mode command to display the
port-lock status.
Syntax
show ports security [interface-id]
Parameters
interface-id—Specifies an interface ID. The interface ID can be one of the
following types: Ethernet port or Port-channel.
Command Mode
Privileged EXEC mode
Example
The following example displays the port-lock status of all ports.
console# show ports security
Port Status Learning Action Max Trap Frequency
------- -------- --------- ------ --- ------- --------
gi1/0/1 Enabled Max- Discard 3 Enabled 100
Addresses
gi1/0/2 Disabled Max- - 28 - -
Console# show bridge multicast unregistered
Port
-------
gi1/0/1
gi1/0/2
gi1/0/3
Unregistered
-------------
Forward
Filter
FilterAddress Table Commands 411
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Address_Table.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Addresses
gi1/0/3 Enabled Lock Discard, 8 Disabled -
Shutdown
The following table describes the fields shown above.
show ports security addresses
Use the show ports security addresses Privileged EXEC mode command to
display the current dynamic addresses in locked ports.
Syntax
show ports security addresses [interface-id
Parameters
interface-id—Specifies an interface ID. The interface ID can be one of the
following types: Ethernet port or Port-channel.
Command Mode
Privileged EXEC mode
Field Description
Port The port number.
Status The port security status. The possible values are: Enabled or
Disabled.
Mode The port security mode.
Action The action taken on violation.
Maximum The maximum number of addresses that can be associated on
this port in the Max-Addresses mode.
Trap The status of SNMP traps. The possible values are: Enable or
Disable.
Frequency The minimum time interval between consecutive traps.412 Address Table Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Address_Table.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
The following example displays dynamic addresses in all currently locked
ports.
Console# show ports security addresses
Port
----
gi1/0/1
gi1/0/2
gi1/0/3
Status
--------
Enabled
Disabled
Enabled
Learning
-------------
Max-addresses
Max-addresses
Lock
Current
-------
2
-
NA
Maximum
-------
3
128
NAPort Monitor Commands 413
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Port_Monitor.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
27
Port Monitor Commands
port monitor
Use the port monitor Interface Configuration (Ethernet) mode command to
start a port monitoring session. Use the no form of this command to stop a
port monitoring session.
Syntax
port monitor src-interface-id [rx | tx]
no port monitor src-interface-id
Parameters
• rx—Monitors received packets only. If no option is specified, it monitors
both rx and tx.
• tx—Monitors transmitted packets only. If no option is specified, it
monitors both rx and tx.
• src-interface-id—Specifies an interface ID. The interface ID must be an
Ethernet port.
Default Configuration
Monitors both received and transmitted packets.
Command Mode
Interface Configuration (Ethernet) mode. It cannot be configured for a range
of interfaces (range context).414 Port Monitor Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Port_Monitor.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
User Guidelines
This command enables port copy between Source Port (src-interface) to a
Destination Port (The port in context).
The analyzer port for port ingress traffic mirroring should be the same port for
all mirrored ports.
The analyzer port for port egress traffic mirroring should be the same port for
all mirrored ports.
Following are restrictions apply for ports that are configured to be source
ports:
• The port cannot be a destination port.
The following restrictions apply to ports that are configured to be monitor
ports:
• The port can’t be source port.
• The port isn’t member in port-channel.
• IP interface is not configured on the port.
• GVRP is not enabled on the port.
• The port is not a member in any VLAN, except for the default VLAN (will
be automatically removed from the default VLAN).
• L2 protocols are not active on the copy dest. Port: LLDP, LBD, STP, LACP.
The following restrictions apply to ports that are configured to be monitor
ports:
• The port cannot be source port.
• The port is not a member in port-channel.
Notes:
• In this mode some traffic duplication on the analyzer port may be
observed. For example:
• Port 2 is being egress monitored by port 4.
• Port 2 & 4 are members in VLAN 3.
• Unknown Unicast packet sent to VLAN 3 will egress from port 4 twice,
one instance as normal forward and another instance as mirrored from
port 2.Port Monitor Commands 415
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Port_Monitor.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
• Moreover, if port 2 is an untagged member in VLAN 3 and port 4 is a
tagged member then both instances will look different (one tagged
and the other is not).
• When the port is configured to 802.1X auto mode it will forward any
mirrored traffic regardless of the .1X state. However, it will operate as a
normal network port (forward traffic) only after authorization is done.
• Mirrored traffic is exposed to STP state, i.e. if the port is in STP blocking,
it will not egress any mirrored traffic.
Example
The following example copies traffic for both directions (Tx and Rx) from the
source port gi1/0/8 to destination port gi1/0/1.
Console(config)# interface gi1/0/1
Console(config-if)# port monitor gi1/0/8
show ports monitor
Use the show ports monitor EXEC mode command to display the port
monitoring status.
Syntax
show ports monitor
Command Mode
EXEC mode
Example
The following example displays the port monitoring status.
Console# show ports monitor
Source port Destination Port Type Status
----------- ---------------- -------- --------
gi1/0/8 gi1/0/1 RX,TX Active
gi1/0/2 gi1/0/1 RX,TX Active
gi1/0/18 gi1/0/1 RX Active416 Port Monitor Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Port_Monitor.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LYsFlow Commands 417
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\750_sFlow.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
28
sFlow Commands
sflow receiver
Use the sflow receiver Global Configuration mode command to define sFlow
collector. Use the no form of this command to remove the definition of the
collector.
Syntax
sflow receiver index {ipv4-address | ipv6-address | hostname} [port port]
[max-datagram-size bytes]
no sflow receiver index
Parameters
• index—The index of the receiver. (Range: 1–8)
• ipv4-address—Pv4 address of the host to be used as an sFlow Collector.
• ipv6-address—IPv6 address of the host to be used as an sFlow Collector.
When the IPv6 address is a Link Local address (IPv6Z address), the
outgoing interface name must be specified. Refer to the User Guidelines
for the interface name syntax.
• hostname—Hostname of the host to be used as an sFlow Collector. Only
translation to IPv4 addresses is supported.
• port—Port number for syslog messages. If unspecified, the port number
defaults to 6343. The range is 1-65535.
• bytes—Specifies the maximum number of bytes that can be sent in a
single sample datagram. If unspecified, it defaults to 1400.
Default
No receiver is defined.418 sFlow Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\750_sFlow.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Command Mode
Global Configuration mode
User Guidelines
If the IP address of the sFlow receiver is set to 0.0.0.0, no sFlow datagrams are
sent.
sflow flow-sampling
Use the sflow flow-sampling Interface Configuration mode command to
enable sFlow Flow sampling and configure the average sampling rate of a
specific port. Use the no form of this command to disable Flow sampling.
Syntax
sflow flow-sampling rate receiver-index [max-header-size bytes]
no sflow flow-sampling
Parameters
rate—Specifies the average sampling rate (Range: 1, 1024–1073741823.)
receiver-index—Index of the receiver/collector (Range: 1–8.)
bytes—Specifies the maximum number of bytes that would be copied from
the sampled packet. If unspecified, defaults to 128. (Range: 20–256.)
Default
Disabled
Command Mode
Interface Configuration (Ethernet) mode
User Guidelines
A new sampling rate configuration is not immediately loaded to the hardware.
It will be loaded to the hardware only after the next packet is sampled (based
on the current sampling rate).sFlow Commands 419
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\750_sFlow.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
sflow counters-sampling
Use the sflow counters-sampling Interface Configuration mode command to
enable sFlow Counters sampling and to configure the maximum interval of a
specific port. Use the no form of this command to disable sFlow Counters
sampling.
Syntax
sflow counters-sampling interval receiver-index
no sflow counters-sampling
Parameters
interval—Specifies the maximum number of seconds between successive
samples of the interface counters. (Range: 1, 15–86400.)
receiver-index—Index of the receiver/collector. (Range: 1–8.)
Default
Disabled
Command Mode
Interface Configuration (Ethernet) mode
clear sflow statistics
Use the clear sFlow statistics EXEC mode command to clear sFlow statistics.
Syntax
clear sflow statistics [interface-id]
Parameters
interface-id—Specifies an interface ID. The interface ID must be an
Ethernet port.
Command Mode
EXEC mode420 sFlow Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\750_sFlow.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
User Guidelines
If no interface is specified by the user, the command clears all the sFlow
statistics counters (including datagrams sent). If an interface is specified by
the user, the command clears only the counter of the specific interface.
show sflow configuration
Use the show sflow configuration EXEC mode command to display the
sFlow configuration for ports that are enabled for Flow sampling or Counters
sampling.
Syntax
show sflow configuration [interface-id]
Parameters
interface-id—Specifies an interface ID. The interface ID must be an
Ethernet port.
Command Mode
EXEC mode
Example
Console # show sflow configuration
Receivers
Index IP Address Port Max Datagram Size
----- -------------------- -------- ----------------
1 0.0.0.0 6343 1400
2 172.16.1.2 6343 1400
3 0.0.0.0 6343 1400
4 0.0.0.0 6343 1400
5 0.0.0.0 6343 1400
6 0.0.0.0 6343 1400
7 0.0.0.0 6343 1400
8 0.0.0.0 6343 1400
InterfacessFlow Commands 421
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\750_sFlow.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Inter- Flow Counters Max Header Flow Counters Collector
face Sampling Sampling Size Collector Index Index
----- ----------- --------- --------- ---------- ----- ------------
gi1/0/1 1/2048 60 sec 128 1 1
gi1/0/2 1/4096 Disabled 128 0 2
show sflow statistics
Use the show sflow statistics EXEC mode command to display the sFlow
statistics for ports that are enabled for Flow sampling or Counters sampling.
Syntax
show sflow statistics [interface-id]
Parameters
interface-id—Specifies an interface ID. The interface ID must be an
Ethernet port.
Command Mode
EXEC mode
Example
Console # show sflow statistics
Total sFlow datagrams sent to collectors: 100
Interface
Packets
sampled
datagrams sent
to collector
---------- ----------- --------------
1/1 30 50
1/2 10 10422 sFlow Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\750_sFlow.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
1/1 0 10
1/2 0 0LLDP Commands 423
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\LLDP.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
29
LLDP Commands
lldp run
Use the lldp run Global Configuration mode command to enable Link Layer
Discovery Protocol (LLDP). To disable LLDP, use the no form of this
command.
Syntax
lldp run
no lldp run
Parameters
This command has no arguments or keywords.
Default
Enabled
Command Mode
Global Configuration mode
Example
console(config)# lldp run
lldp transmit
Use the lldp transmit Interface Configuration mode command to enable
transmitting Link Layer Discovery Protocol (LLDP) on an interface. Use the
no form of this command to stop transmitting LLDP on an interface.424 LLDP Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\LLDP.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Syntax
lldp transmit
no lldp transmit
Parameters
This command has no arguments or keywords.
Default
Enabled
Command Mode
Interface Configuration (Ethernet) mode
User Guidelines
LLDP manages LAG ports individually. LLDP sends separate advertisements
on each port in a LAG.
LLDP operation on a port is not dependent on the STP state of a port. I.e.
LLDP frames are sent on blocked ports.
If a port is controlled by 802.1X, LLDP would operate only if the port is
authorized.
Example
console(config)# interface gi1/0/1
console(config-if)# lldp transmit
lldp receive
Use the lldp receive Interface Configuration mode command to enable
receiving Link Layer Discovery Protocol (LLDP) on an interface. Use the no
form of this command to stop receiving LLDP on an interface.
Syntax
lldp receive
no lldp receiveLLDP Commands 425
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\LLDP.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Parameters
This command has no arguments or keywords.
Default
Enabled
Command Mode
Interface Configuration (Ethernet) mode
User Guidelines
LLDP manages LAG ports individually. LLDP data received through LAG
ports is stored individually per port.
LLDP operation on a port is not dependent on the STP state of a port. I.e.
LLDP frames are received on blocked ports.
If a port is controlled by 802.1X, LLDP would operate only if the port is
authorized.
Example
console(config)# interface gi1/0/1
console(config-if)# lldp receive
lldp timer
Use the lldp timer Global Configuration mode command to specify how
often the software sends Link Layer Discovery Protocol (LLDP) updates. Use
the no form of this command to restore the default configuration.
Syntax
lldp timer seconds
no lldp timer
Parameters
seconds—Specifies, in seconds, how often the software sends LLDP updates.
(Range: 5-32768 seconds)426 LLDP Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\LLDP.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Default Configuration
The default update interval is 30 seconds.
Command Mode
Global Configuration mode
Example
The following example sets the interval for sending LLDP updates to 60
seconds.
Console(config)# lldp timer 60
lldp hold-multiplier
Use the lldp hold-multiplier Global Configuration mode command to set
the time interval during which the receiving device holds a Link Layer
Discovery Protocol (LLDP) packet before discarding it. Use the no form of
this command to restore the default configuration.
Syntax
lldp hold-multiplier number
no lldp hold-multiplier
Parameters
number—Specifies the LLDP packet hold time interval as a multiple of the
LLDP timer value. (Range: 2use the no form of this command10)
Default Configuration
The default LLDP hold multiplier is 4.
Command Mode
Global Configuration mode
User Guidelines
The actual Time-To-Live (TTL) value of LLDP frames is expressed by the
following formula:LLDP Commands 427
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\LLDP.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
TTL = min(65535, LLDP-Timer * LLDP-HoldMultiplier)
For example, if the value of the LLDP timer is 30 seconds, and the value of
the LLDP hold multiplier is 4, then the value 120 is encoded in the TTL field
of the LLDP header.
Example
The following example sets the LLDP packet hold time interval to 90
seconds.
Console(config)# lldp timer 30
Console(config)# lldp hold-multiplier 3
lldp reinit
Use the lldp reinit Global Configuration mode command to specify the
minimum time an LLDP port waits before reinitializing LLDP transmission.
Use the no form of this command to revert to the default setting.
Syntax
lldp reinit seconds
no lldp reinit
Parameters
seconds—Specifies the minimum time in seconds an LLDP port waits before
reinitializing LLDP transmission.(Range: 1–10)
Default
2 seconds
Command Mode
Global Configuration mode
Example
console(config)# lldp reinit 4428 LLDP Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\LLDP.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
lldp tx-delay
Use the lldp tx-delay Global Configuration mode command to set the delay
between successive LLDP frame transmissions initiated by value/status
changes in the LLDP local systems MIB. Use the no form of this command to
restore the default configuration.
Syntax
lldp tx-delay seconds
no lldp tx-delay
Parameters
seconds—Specifies the delay in seconds between successive LLDP frame
transmissions initiated by value/status changes in the LLDP local systems
MIB. (Range: 1-8192 seconds)
Default Configuration
The default LLDP frame transmission delay is 2 seconds.
Command Mode
Global Configuration mode
User Guidelines
It is recommended that the tx-delay be less than 0.25 of the LLDP timer
interval.
Example
The following example sets the LLDP transmission delay to 10 seconds.
Console(config)# lldp tx-delay 10
lldp optional-tlv
Use the lldp optional-tlv Interface Configuration (Ethernet) mode
command to specify which optional TLVs from the basic set are transmitted.
Use the no form of this command to restore the default configuration.LLDP Commands 429
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\LLDP.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Syntax
lldp optional-tlv tlv [tlv2 … tlv5]
no lldp optional-tlv
Parameters
tlv—Specifies TLV that should be included. Available optional TLVs are:
port-desc, sys-name, sys-desc, sys-cap, 802.3-mac-phy, 802.3-lag, 802.3-maxframe-size.
Default Configuration
No optional TLV is transmitted.
Command Mode
Interface Configuration (Ethernet) mode
Example
The following example specifies that the port description TLV is transmitted
on gigabitethernet port 1/0/2.
Console(config)# interface gi1/0/2
Console(config-if)# lldp optional-tlv port-desc
lldp management-address
Use the lldp management-address Interface Configuration (Ethernet) mode
command to specify the management address advertised from an interface.
Use the no form of this command to stop advertising management address
information.
Syntax
lldp management-address {ip-address | none | automatic [interface-id] }
no lldp management-address
Parameters
• ip-address—Specifies the static management address to advertise.
• none—Specifies that no address is advertised.430 LLDP Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\LLDP.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
• automatic—Specifies that the software would automatically choose a
management address to advertise from all the IP addresses of the product.
In case of multiple IP addresses the software chooses the lowest IP address
among the dynamic IP addresses. If there are no dynamic addresses, the
software chooses the lowest IP address among the static IP addresses.
• automatic interface-id—Specifies that the software automatically chooses
a management address to advertise from the IP ddresses that are
configured (associated) for the interface ID. In case of multiple IP
addresses, the software chooses the lowest IP address among the dynamic
IP addresses of the interface. If there are no dynamic addresses, the
software chooses the lowest IP address among the static IP addresses of the
interface. The interface ID can be one of the following types: Ethernet
port, Port-channel or VLAN. Note that if the port or port- channel are
members in a VLAN that has an IP address, that address is not included
because the address is associated with the VLAN.
Default Configuration
No IP address is advertised.
The default advertisement is automatic.
Command Mode
Interface Configuration (Ethernet) mode
User Guidelines
Each port can advertise one IP address.
Example
The following example sets the LLDP management address advertisement
mode to automatic on gigabitethernet port 1/0/2.
Console(config)# interface gi1/0/2
Console(config)# lldp management-address automatic
lldp notifications
Use the lldp notifications Interface Configuration (Ethernet) mode
command to enable or disable sending Link Layer Discovery Protocol (LLDP) LLDP Commands 431
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\LLDP.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
notifications on an interface. Use the no form of this command to restore the
default configuration.
Syntax
lldp notifications {enable | disable}
no lldp notifications
Parameters
• enable—Enables sending LLDP notifications.
• disable—Disables sending LLDP notifications.
Default Configuration
Sending LLDP notifications is disabled.
Command Mode
Interface Configuration (Ethernet) mode
Example
The following example enables sending LLDP notifications on
gigabitethernet port 1/0/5.
Console(config)# interface gi1/0/5
Console(config)# lldp notifications 10
lldp notifications interval
Use the lldp notifications interval Global Configuration mode command to
configure the maximum transmission rate of LLDP notifications. Use the no
form of this command to return to the default.
Syntax
lldp notifications interval seconds
no lldp notifications interval432 LLDP Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\LLDP.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Parameters
seconds—The device should not send more than one notification in the
indicated period. (Range: 5–3600)
Default
5 seconds
Command Mode
Global Configuration mode
Example
console(config)# lldp notification interval 10
lldp optional-tlv 802.1
Use the lldp optional-tlv Interface Configuration mode command to specify
which optional TLVs from the basic set to transmit. Use the no form of this
command revert to the default setting.
Syntax
lldp optional-tlv 802.1 pvid
no lldp optional-tlv 802.1 pvid
lldp optional-tlv 802.1 ppvid add ppvid
lldp optional-tlv 802.1 ppvid remove ppvid
lldp optional-tlv 802.1 vlan-name add vlan-id
lldp optional-tlv 802.1 vlan-name remove vlan-id
lldp optional-tlv 802.1 protocol add {stp | rstp | mstp | pause | 802.1x |
lacp | gvrp}
lldp optional-tlv 802.1 protocol remove {stp | rstp | mstp | pause | 802.1x |
lacp | gvrp}
Parameters
• pvid—Advertises the PVID of the port.LLDP Commands 433
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\LLDP.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
• ppvid—Adds/removes PPVID for advertising. PPVID 0 can be used to
advertise the PPVIDs capabilities of the interface.(Range: 0–4094)
• vlan—Adds/removse VLAN ID for advertising. (Range: 1–4094)
Default
No optional TLV is transmitted.
Command Mode
Interface Configuration (Ethernet) mode
lldp med enable
Use the lldp med enable Interface Configuration (Ethernet) mode command
to enable Link Layer Discovery Protocol (LLDP) Media Endpoint Discovery
(MED) on an interface. Use the no form of this command to disable LLDP
MED on an interface.
Syntax
lldp med enable [tlv … tlv4]
no lldp med enable
Parameters
tlv—Specifies the TLV that should be included. Available TLVs are: networkpolicy, location, and poe-pse, inventory. The capabilities TLV is always
included if LLDP-MED is enabled.
Default Configuration
LLDP MED is disabled.
Command Mode
Interface Configuration (Ethernet) mode
Example
The following example enables LLDP MED with the location TLV on
gigabitethernet port 1/0/3.434 LLDP Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\LLDP.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Console(config)# interface gi1/0/3
Console(config)# lldp med enable location
lldp med notifications topology-change
Use the lldp med notifications topology-change Interface Configuration
(Ethernet) mode command to enable sending LLDP MED topology change
notifications. Use the no form of this command to restore the default
configuration.
Syntax
lldp med notifications topology-change {enable | disable}
no lldp med notifications topology-change
Parameters
• enable—Enables sending LLDP MED topology change notifications.
• disable—Disables sending LLDP MED topology change notifications.
Default Configuration
Disable is the default.
Command Mode
Interface Configuration (Ethernet) mode
Example
The following example enables sending LLDP MED topology change
notifications on gigabitethernet port 1/0/2.
Console(config)# interface gi1/0/2
Console(config)# lldp med notifications topology-change enableLLDP Commands 435
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\LLDP.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
lldp med fast-start repeat-count
Use the lldp med fast-start repeat-count Global Configuration mode
command to configure the number of times the fast start LLDPDU is being
sent during the activation of the fast start mechanism defined by LLDPMED. Use the no form of this command return to default.
Syntax
lldp med fast-start repeat-count number
no lldp med fast-start repeat-count
Parameters
number—Specifies the number of times the fast start LLDPDU is being sent
during the activation of the fast start mechanism.
Default
3
Command Mode
Global Configuration mode
Example
console(config)# lldp med fast-start repeat-count 4
lldp med network-policy (global)
Use the lldp med network-policy Global Configuration mode command to
define LLDP MED network policy. Use the no form of this command to
remove LLDP MED network policy.
Syntax
lldp med network-policy number application [vlan id] [vlan-type {tagged |
untagged}] [up priority] [dscp value]
no lldp med network-policy number436 LLDP Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\LLDP.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Parameters
• number—Network policy sequential number.
• application—The name or the number of the primary function of the
application defined for this network policy. Available application names
are: voice, voice-signaling, guest-voice, guest-voice-signaling, softphonevoice, video-conferencing, streaming-video, video-signaling.
• vlan id—VLAN identifier for the application.
• vlan-type—Specifies if the application is using a Tagged or an Untagged
VLAN.
• up priority—User Priority (Layer 2 priority) to be used for the specified
application.
• dscp value—DSCP value to be used for the specified application.
Default
No Network policy is defined.
Command Mode
Global Configuration mode
User Guidelines
Use the lldp med network-policy Interface Configuration command to
attach a network policy to a port.
Up to 32 network policies can be defined.
Example
console(config)# lldp med network-policy 1 voice-signaling vlan 1
lldp med network-policy (interface)
Use the lldp med network-policy Interface Configuration (Ethernet) mode
command to attach or remove an LLDP MED network policy on an interface.
Use the no form of this command to remove all the LLDP MED network
policies from the interface.LLDP Commands 437
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\LLDP.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Syntax
lldp med network-policy {add | remove} number
no lldp med network-policy number
Parameters
• number—Specifies the network policy sequential number.
• add—Attaches the specified network policy to the interface.
• remove—Removes the specified network policy from the interface.
Default Configuration
No network policy is attached to the interface.
Command Mode
Interface Configuration (Ethernet) mode
User Guidelines
For each port, only one network policy per application (voice, voice-signaling,
etc.) can be defined.
Example
The following example attaches LLDP MED network policy 1 to
gigabitethernet port 1/0/1.
Console(config)# interface gi1/0/1
Console(config-if)# lldp med network-policy add 1
clear lldp table
Use the clear lldp table command in Privileged EXEC mode to restart the
LLDP RX state machine and clear the neighbors table.
Syntax
clear lldp table [interface-id]438 LLDP Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\LLDP.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Parameters
interface-id—Specifies an interface ID. The interface ID must be an
Ethernet port.
Command Mode
Privileged EXEC mode
Example
console# clear lldp table gi1/0/1
lldp med location
Use the lldp med location Interface Configuration (Ethernet) mode
command to configure the location information for the Link Layer Discovery
Protocol (LLDP) Media Endpoint Discovery (MED) for an interface. Use the
no form of this command to delete location information for an interface.
Syntax
lldp med location {{coordinate data} | {civic-address data} | {ecs-elin
data}}
no lldp med location {coordinate | civic-address | ecs-elin}
Parameters
• coordinate—Specifies the location data as coordinates.
• civic-address—Specifies the location data as a civic address.
• ecs-elin—Specifies the location data as an Emergency Call Service
Emergency Location Identification Number (ECS ELIN).
• data—Specifies the location data in the format defined in ANSI/TIA 1057:
dotted hexadecimal data: Each byte in a hexadecimal character string is
two hexadecimal digits. Bytes are separated by a period or colon. (Length:
coordinate: 16 bytes. Civic-address: 6-160 bytes. Ecs-elin: 10-25 bytes)
Default Configuration
The location is not configured.LLDP Commands 439
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\LLDP.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Command Mode
Interface Configuration (Ethernet) mode
Example
The following example configures the LLDP MED location information on
gigabitethernet port 1/0/2 as a civic address.
console(config)# interface gi1/0/2
console(config-if)# lldp med location civic-address 616263646566
show lldp configuration
Use the show lldp configuration Privileged EXEC mode command to display
the Link Layer Discovery Protocol (LLDP) configuration for all interfaces or
for a specific interface.
Syntax
show lldp configuration [interface-id]
Parameters
interface-id—Specifies an interface ID. The interface ID must be an
Ethernet port.
Command Mode
Privileged EXEC mode
Example
The following example sets the LLDP re-initialization delay to 10 seconds.
Switch# show lldp configuration
State: Enabled
Timer: 30 Seconds
Hold multiplier: 4
Reinit delay: 2 Seconds
Tx delay: 2 Seconds
Notifications interval: 5 seconds440 LLDP Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\LLDP.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
LLDP packets handling: Filtering
Port State Optional TLVs Address Notifications
---- ----- -------------- ------- ------------
gi1/0/1 RX,TX PD, SN, SD, SC 172.16.1.1 Disabled
gi1/0/2 TX PD, SN 172.16.1.1 Disabled
gi1/0/3 RX,TX PD, SN, SD, SC None Disabled
gi1/0/5 RX,TX D, SN, SD, SC automatic Disabled
gi1/0/6 RX,TX PD, SN, SD, SC auto vlan 1 Disabled
gi1/0/7 RX,TX PD, SN, SD, SC auto g1 Disabled
gi1/0/8 RX,TX PD, SN, SD, SC auto ch1 Disabled
Switch# show lldp configuration gi1/0/1
State: Enabled
Timer: 30 Seconds
Hold multiplier: 4
Reinit delay: 2 Seconds
Tx delay: 2 Seconds
Notifications interval: 5 seconds
LLDP packets handling: Filtering
Port State Optional TLVs Address Notifications
-------------- -------------- ------------------------
gi1/0/1 RX, TX PD, SN, SD, SC 72.16.1.1 Disabled
802.3 optional TLVs: 802.3-mac-phy, 802.3-lag, 802.3-max-frame-size
802.1 optional TLVs
PVID: Enabled
PPVIDs: 0, 1, 92
VLANs: 1, 92
Protocols: 802.1xLLDP Commands 441
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\LLDP.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
The following table describes the significant fields shown in the display:
show lldp med configuration
Use the show lldp med configuration Privileged EXEC mode command to
display the Link Layer Discovery Protocol (LLDP) Media Endpoint Discovery
(MED) configuration for all interfaces or for a specific interface.
Syntax
show lldp med configuration [interface-id]
Parameters
interface-id—Specifies an interface ID. The interface ID must be an
Ethernet port.
Field Description
Timer The time interval between LLDP updates.
Hold multiplier The amount of time (as a multiple of the timer interval) that
the receiving device holds a Link Layer Discovery Protocol
(LLDP) packet before discarding it.
Reinit timer The minimum time interval an LLDP port waits before reinitializing an LLDP transmission.
Tx delay The delay between successive LLDP frame transmissions
initiated by value/status changes in the LLDP local systems
MIB.
Port The port number.
State The port’s LLDP state.
Optional TLVs Optional TLVs that are advertised. Possible values are:
PD - Port description
SN - System name
SD - System description
SC - System capabilities
Address The management address that is advertised.
Notifications Indicates whether LLDP notifications are enabled or disabled.442 LLDP Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\LLDP.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Command Mode
Privileged EXEC mode
Example
The following examples display the LLDP MED configuration for all
interfaces and for gigabitethernet port 1/0/1.
console# show lldp med configuration
Fast Start Repeat Count: 4.
Network policy 1
-------------------
Application type: voiceSignaling
VLAN ID: 1 untagged
Layer 2 priority: 0
DSCP: 0
Port Capabilities Network Location Notifications Inventory
policy
------ ----------- ---------- ---------- ------------ --------
gi1/0/1 Yes Yes Yes Enabled Yes
gi1/0/2 Yes Yes No Enabled No
gi1/0/3 No No No Enabled No
console# show lldp med configuration gi1/0/1
Port Capabilities Network policy Location Notifications Inventory
------------------- -------------- -------- ---------- --------
gi1/0/1 Yes Yes Yes Enabled Yes
Network policies:
Location:
Civic-address: 61:62:63:64:65:66LLDP Commands 443
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\LLDP.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
show lldp local tlvs-overloading
Use the show lldp local tlvs-overloading EXEC mode command to display
the status of TLVs overloading of the Link Layer Discovery Protocol (LLDP).
Syntax
show lldp local tlvs-overloading [interface-id]
Parameters
interface-id—Specifies an interface ID. The interface ID must be an
Ethernet port.
Command Mode
EXEC mode
User Guidelines
The command calculates the overloading status of the current LLDP
configuration, and not for the last LLDP packet that was sent.
Example
Switch# show lldp local tlvs-overloading
Ports with LLDP TLV overloading are: gi1/0/1, gi1/0/9
Switch# show lldp local tlvs-overloading
No LLDP TLV overloading.
Switch# show lldp local tlvs-overloading gi1/0/1
TLVs Group Bytes Status
------------ ------ --------------
Mandatory 31 Transmitted
LLDP-MED Capabilities 9 Transmitted
LLDP-MED Location 200 Transmitted
802.1 1360 Overloading
Total: 1600 bytes
Left: 100 bytes444 LLDP Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\LLDP.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
show lldp local
Use the show lldp local Privileged EXEC mode command to display the Link
Layer Discovery Protocol (LLDP) information that is advertised from a
specific port.
Syntax
show lldp local interface-id
Parameters
Interface-id—Specifies an interface ID. The interface ID must be an
Ethernet port.
Command Mode
Privileged EXEC mode
Example
The following examples display LLDP information that is advertised from
gigabitethernet ports 1/0/1 and 1/0/2.
Switch# show lldp local gi1/0/1
Device ID: 0060.704C.73FF
Port ID: gi1/0/1
Capabilities: Bridge
System Name: ts-7800-1
System description:
Port description:
Management address: 172.16.1.8
802.3 MAC/PHY Configuration/Status
Auto-negotiation support: Supported
Auto-negotiation status: Enabled
Auto-negotiation Advertised Capabilities: 100BASE-TX full duplex,
1000BASE-T full duplex
Operational MAU type: 1000BaseTFD
802.3 Link Aggregation
Aggregation capability: Capable of being aggregated
Aggregation status: Not currently in aggregationLLDP Commands 445
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\LLDP.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Aggregation port ID: 1
802.3 Maximum Frame Size: 1522
802.3 EEE
Local Tx: 30 usec
Local Rx: 25 usec
Remote Tx Echo: 30 usec
Remote Rx Echo: 25 usec
802.1 PVID: 1
802.1 PPVID: 2 supported, enabled
802.1 VLAN: 2 (VLAN2)
802.1 Protocol: 88 8E 01
LLDP-MED capabilities: Network Policy, Location Identification
LLDP-MED Device type: Network Connectivity
LLDP-MED Network policy
Application type: Voice
Flags: Tagged VLAN
VLAN ID: 2
Layer 2 priority: 0
DSCP: 0
LLDP-MED Power over Ethernet
Device Type: Power Sourcing Entity
Power source: Primary Power Source
Power priority: High
Power value: 9.6 Watts
LLDP-MED Location
Coordinates: 54:53:c1:f7:51:57:50:ba:5b:97:27:80:00:00:67:01
LLDP-MED Inventory
Hardware Revision: B1
Firmware Revision: A1446 LLDP Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\LLDP.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Software Revision: 3.8
Serial number: 7978399
Manufacturer name: Manufacturer
Model name: Model 1
Asset ID: Asset 123
Switch# show lldp local gi1/0/2
LLDP is disabled.
show lldp neighbors
Use the show lldp neighbors Privileged EXEC mode command to display
information about neighboring devices discovered using Link Layer Discovery
Protocol (LLDP). The information can be displayed for all interfaces or for a
specific interface.
Syntax
show lldp neighbors [interface-id]
Parameters
interface-id—Specifies an interface ID. The interface ID must be an
Ethernet port.
Command Mode
Privileged EXEC mode
User Guidelines
There are no guidelines for this command.
A TLV value that cannot be displayed as an ASCII string is displayed as an
hexadecimal string.
Example
The following examples display information about neighboring devices
discovered using LLDP.
Location information, if it exists, is also displayed.LLDP Commands 447
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\LLDP.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Switch# show lldp neighbors
Port Device ID Port ID System Name Capabilities TTL
----- ------------------ -------- ---------- ----------- ----
gi1/0/1 00:00:00:11:11:11 gi1/0/1 ts-7800-2 B 90
gi1/0/1 00:00:00:11:11:11 D gi1/0/1 ts-7800-2 B 90
gi1/0/2 00:00:26:08:13:24 gi1/0/3 ts-7900-1 B, R 90
gi1/0/3 00:00:26:08:13:24 gi1/0/2 ts-7900-2 W 90
Switch# show lldp neighbors gi1/0/1
Device ID: 00:00:00:11:11:11
Port ID: gi1/0/
System Name: ts-7800-2
Capabilities: B
System description:
Port description:
Management address: 172.16.1.1
Time To Live: 90 seconds
802.3 MAC/PHY Configuration/Status
Auto-negotiation support: Supported.
Auto-negotiation status: Enabled.
Auto-negotiation Advertised Capabilities: 100BASE-TX full duplex,
1000BASE-T full duplex.
Operational MAU type: 1000BaseTFD
802.3 Power via MDI
MDI Power support Port Class: PD
PSE MDI Power Support: Not Supported
PSE MDI Power State: Not Enabled
PSE power pair control ability: Not supported.
PSE Power Pair: Signal
PSE Power class: 1
802.3 Link Aggregation448 LLDP Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\LLDP.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Aggregation capability: Capable of being aggregated
Aggregation status: Not currently in aggregation
Aggregation port ID: 1
802.3 Maximum Frame Size: 1522
802.3 EEE
Remote Tx: 25 usec
Remote Rx: 30 usec
Local Tx Echo: 30 usec
Local Rx Echo: 25 usec
802.1 PVID: 1
802.1 PPVID: 2 supported, enabled
802.1 VLAN: 2(VLAN2)
802.1 Protocol: 88 8E 01
LLDP-MED capabilities: Network Policy.
LLDP-MED Device type: Endpoint class 2.
LLDP-MED Network policy
Application type: Voice
Flags: Unknown policy
VLAN ID: 0
Layer 2 priority: 0
DSCP: 0
LLDP-MED Power over Ethernet
Device Type: Power Device
Power source: Primary power
Power priority: High
Power value: 9.6 Watts
LLDP-MED Inventory
Hardware revision: 2.1
Firmware revision: 2.3LLDP Commands 449
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\LLDP.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Software revision: 2.7.1
Serial number: LM759846587
Manufacturer name: VP
Model name: TR12
Asset ID: 9
LLDP-MED Location
Coordinates: 54:53:c1:f7:51:57:50:ba:5b:97:27:80:00:00:67:01
The following table describes significant LLDP fields shown in the display:
Field Description
Port The port number.
Device ID The neighbor device’s configured ID (name) or MAC
address.
Port ID The neighbor device’s port ID.
System name The neighbor device’s administratively assigned
name.
Capabilities The capabilities discovered on the neighbor device.
Possible values are:
B - Bridge
R - Router
W - WLAN Access Point
T - Telephone
D - DOCSIS cable device
H - Host
r - Repeater
O - Other
System description The neighbor device’s system description.
Port description The neighbor device’s port description.
Management address The neighbor device’s management address.
Auto-negotiation
support
The auto-negotiation support status on the port.
(Supported or Not Supported)
Auto-negotiation
status
The active status of auto-negotiation on the port.
(Enabled or Disabled)450 LLDP Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\LLDP.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Auto-negotiation
Advertised
Capabilities
The port speed/duplex/flow-control capabilities
advertised by the auto-negotiation.
Operational MAU type The port MAU type.
LLDP MED
Capabilities The sender's LLDP-MED capabilities.
Device type The device type. Indicates whether the sender is a
Network Connectivity Device or Endpoint Device, and
if an Endpoint, to which Endpoint Class it belongs.
LLDP MED - Network Policy
Application type The primary function of the application defined for this
network policy.
Flags Flags. The possible values are:
Unknown policy: Policy is required by the device, but
is currently unknown.
Tagged VLAN: The specified application type is using
a Tagged VLAN.
Untagged VLAN: The specified application type is
using an Untagged VLAN.
VLAN ID The VLAN identifier for the application.
Layer 2 priority The Layer 2 priority used for the specified application.
DSCP The DSCP value used for the specified application.
LLDP MED - Power Over Ethernet
Power type The device power type. The possible values are:
Power Sourcing Entity (PSE) or Power Device (PD).
Power Source The power source utilized by a PSE or PD device. A
PSE device advertises its power capability. The
possible values are: Primary power source and
Backup power source. A PD device advertises its
power source. The possible values are: Primary
power, Local power, Primary and Local power.
Power priority The PD device priority. A PSE device advertises the
power priority configured for the port. A PD device
advertises the power priority configured for the device.
The possible values are: Critical, High and Low.LLDP Commands 451
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\LLDP.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
show lldp statistics
Use the show lldp statistics EXEC mode command to display the Link Layer
Discovery Protocol (LLDP) statistics.
Syntax
show lldp statistics [interface-id]
Parameters
interface-id—Specifies an interface ID. The interface ID must be an
Ethernet port.
Command Mode
EXEC mode
Example
Switch# show lldp statistics
Contax(config-if)# do show lldp statistics
Tables Last Change Time: 14-Oct-2010 32:08:18
Tables Inserts: 26
Tables Deletes: 2
Tables Dropped: 0
Tables Ageouts: 1
Power value The total power in watts required by a PD device from
a PSE device, or the total power a PSE device is
capable of sourcing over a maximum length cable
based on its current configuration.
LLDP MED - Location
Coordinates, Civic
address, ECS ELIN.
The location information raw data.452 LLDP Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\LLDP.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
TX Frames RX Frames RX TLVs RX Ageouts
Port Total Total Discarded Errors Discarded Unrecognized Total
--------- --------- --------- --------- ------ --------- ------------ ------------------ -----------
gi1/0/1 730 850 0 0 0 0 0
gi1/0/2 0 0 0 0 0 0 0
gi1/0/3 730 0 0 0 0 0 0
gi1/0/4 0 0 0 0 0 0 0
gi1/0/5 0 0 0 0 0 0 0
gi1/0/6 8 7 0 0 0 0 1
gi1/0//7 0 0 0 0 0 0 0
gi1/0/8 0 0 0 0 0 0 0
gi1/0/9 730 0 0 0 0 0 0
gi1/0/10 0 0 0 0 0 0 0Spanning-Tree Commands 453
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Spanning-Tree.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
30
Spanning-Tree Commands
spanning-tree
Use the spanning-tree Global Configuration mode command to enable
spanning-tree functionality. Use the no form of this command to disable the
spanning-tree functionality.
Syntax
spanning-tree
no spanning-tree
Default Configuration
Spanning-tree is enabled.
Command Mode
Global Configuration mode
Example
The following example enables spanning-tree functionality.
Console(config)# spanning-tree
spanning-tree mode
Use the spanning-tree mode Global Configuration mode command to
configure the spanning-tree protocol currently running. Use the no form of
this command to restore the default configuration.454 Spanning-Tree Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Spanning-Tree.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Syntax
spanning-tree mode {stp | rstp | mst}
no spanning-tree mode
Parameters
• stp—Specifies that the Spanning Tree Protocol (STP) is enabled.
• rstp—Specifies that the Rapid Spanning Tree Protocol (RSTP) is enabled.
• mst—Specifies that the Multiple Spanning Tree Protocol (MSTP) is
enabled.
Default Configuration
The default is RSTP.
Command Mode
Global Configuration mode
User Guidelines
In RSTP mode, the device uses STP when the neighbor device uses STP.
In MSTP mode, the device uses RSTP when the neighbor device uses RSTP,
and uses STP when the neighbor device uses STP.
Example
The following example configures the spanning-tree protocol as RSTP.
console(config)# spanning-tree mode mstp
spanning-tree forward-time
Use the spanning-tree forward-time Global Configuration mode command
to configure the spanning-tree bridge forward time, which is the amount of
time a port remains in the listening and learning states before entering the
forwarding state. Use the no form of this command to restore the default
configuration.Spanning-Tree Commands 455
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Spanning-Tree.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Syntax
spanning-tree forward-time seconds
no spanning-tree forward-time
Parameters
seconds—Specifies the spanning-tree forward time in seconds. (Range: 4–30)
Default Configuration
The default forwarding time for the IEEE Spanning Tree Protocol (STP) is 15
seconds.
Command Mode
Global Configuration mode
User Guidelines
When configuring the forwarding time, the following relationship should be
maintained:
2*(Forward-Time - 1) >= Max-Age
Example
The following example configures the spanning tree bridge forwarding time to
25 seconds.
Console(config)# spanning-tree forward-time 25
spanning-tree hello-time
Use the spanning-tree hello-time Global Configuration mode command to
configure the spanning tree bridge Hello time, which is how often the device
broadcasts Hello messages to other devices. Use the no form of this command
to restore the default configuration.
Syntax
spanning-tree hello-time seconds
no spanning-tree hello-time456 Spanning-Tree Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Spanning-Tree.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Parameters
seconds—Specifies the spanning-tree Hello time in seconds. (Range: 1–10)
Default Configuration
The default Hello time for IEEE Spanning Tree Protocol (STP) is 2 seconds.
Command Mode
Global Configuration mode
User Guidelines
When configuring the Hello time, the following relationship should be
maintained:
Max-Age >= 2*(Hello-Time + 1)
Example
The following example configures the spanning-tree bridge hello time to 5
seconds.
Console(config)# spanning-tree hello-time 5
spanning-tree max-age
Use the spanning-tree max-age Global Configuration mode command to
configure the spanning-tree bridge maximum age. Use the no form of this
command to restore the default configuration.
Syntax
spanning-tree max-age seconds
no spanning-tree max-age
Parameters
seconds—Specifies the spanning-tree bridge maximum age in seconds.
(Range: 6–40)Spanning-Tree Commands 457
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Spanning-Tree.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Default Configuration
The default maximum age for IEEE Spanning Tree Protocol (STP) is 20
seconds.
Command Mode
Global Configuration mode
User Guidelines
When configuring the maximum age, the following relationships should be
maintained:
2*(Forward-Time - 1) >= Max-Age
Max-Age >= 2*(Hello-Time + 1)
Example
The following example configures the spanning-tree bridge maximum age to
10 seconds.
Console(config)# spanning-tree max-age 10
spanning-tree priority
Use the spanning-tree priority Global Configuration mode command to
configure the device spanning-tree priority, which is used to determine which
bridge is selected as the root bridge. Use the no form of this command to
restore the default device spanning-tree priority.
Syntax
spanning-tree priority priority
no spanning-tree priority
Parameters
priority—Specifies the bridge priority. (Range: 0–61440)
Default Configuration
The default bridge priority for IEEE Spanning Tree Protocol (STP) is 32768.458 Spanning-Tree Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Spanning-Tree.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Command Mode
Global Configuration mode
User Guidelines
The priority value must be a multiple of 4096.
The switch with the lowest priority is the root of the spanning tree.
Example
The following example configures the spanning-tree priority to 12288.
Console(config)# spanning-tree priority 12288
spanning-tree disable
Use the spanning-tree disable Interface Configuration (Ethernet, portchannel) mode command to disable the spanning tree on a specific port. Use
the no form of this command to enable the spanning tree on a port.
Syntax
spanning-tree disable
no spanning-tree disable
Default Configuration
Spanning tree is enabled on all ports.
Command Mode
Interface Configuration (Ethernet, port-channel) mode
Example
The following example disables the spanning tree on gigabitethernet port
1/0/5
Console(config)# interface gi1/0/5
Console(config-if)# spanning-tree disableSpanning-Tree Commands 459
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Spanning-Tree.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
spanning-tree cost
Use the spanning-tree cost Interface Configuration (Ethernet, port-channel)
mode command to configure the spanning-tree path cost for a port. Use the
no form of this command to restore the default configuration.
Syntax
spanning-tree cost cost
no spanning-tree cost
Parameters
cost—Specifies the port path cost. (Range: 1–200000000)
Default Configuration
Default path cost is determined by port speed and path cost method (long or
short) as shown below:
Command Mode
Interface Configuration (Ethernet, port-channel) mode
Example
The following example configures the spanning-tree cost on gigabitethernet
port 1/0/15 to 35000.
Console(config)# interface gi1/0/15
Console(config-if)# spanning-tree cost 35000
Interface Long Short
Port-channel 20,000 4
TenGigabit Ethernet (10000
Mbps)
2000 2
Gigabit Ethernet (1000
Mbps)
20,000 4
Fast Ethernet (100 Mbps) 200,000 19
Ethernet (10 Mbps) 2,000,000 100460 Spanning-Tree Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Spanning-Tree.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
spanning-tree port-priority
Use the spanning-tree port-priority Interface Configuration (Ethernet, portchannel) mode command to configure the port priority. Use the no form of
this command to restore the default configuration.
Syntax
spanning-tree port-priority priority
no spanning-tree port-priority
Parameters
priority—Specifies the port priority. (Range: 0–240)
Default Configuration
The default port priority for IEEE Spanning Tree Protocol (STP) is 128.
Command Mode
Interface Configuration (Ethernet, port-channel) mode
User Guidelines
The priority value must be a multiple of 16.
Example
The following example configures the spanning priority on gigabitethernet
port 1/0/15 to 96
Console(config)# interface gi1/0/15
Console(config-if)# spanning-tree port-priority 96
spanning-tree portfast
Use the spanning-tree portfast Interface Configuration (Ethernet, portchannel) mode command to enable the PortFast mode. In PortFast mode, the
interface is immediately put into the forwarding state upon linkup, without
waiting for the standard forward time delay. Use the no form of this command
to disable the PortFast mode.Spanning-Tree Commands 461
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Spanning-Tree.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Syntax
spanning-tree portfast [auto]
no spanning-tree portfast
Parameters
auto—Specifies that the software waits for 3 seconds (with no BPDUs
received on the interface) before putting the interface into the PortFast
mode.
Default Configuration
PortFast mode is disabled.
Command Mode
Interface Configuration (Ethernet, port-channel) mode
Example
The following example enables the PortFast mode on gigabitethernet port
1/0/15.
Console(config)# interface gi1/0/15
Console(config-if)# spanning-tree portfast
spanning-tree link-type
Use the spanning-tree link-type Interface Configuration (Ethernet, portchannel) mode command to override the default link-type setting
determined by the port duplex mode, and enable Rapid Spanning Tree
Protocol (RSTP) transitions to the forwarding state. Use the no form of this
command to restore the default configuration.
Syntax
spanning-tree link-type {point-to-point | shared}
no spanning-tree spanning-tree link-type
Parameters
• point-to-point—Specifies that the port link type is point-to-point.462 Spanning-Tree Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Spanning-Tree.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
• shared—Specifies that the port link type is shared.
Default Configuration
The device derives the port link type from the duplex mode. A full-duplex
port is considered a point-to-point link and a half-duplex port is considered a
shared link.
Command Mode
Interface Configuration (Ethernet, port-channel) mode
Example
The following example enables shared spanning-tree on gigabitethernet port
1/0/15.
Console(config)# interface gi1/0/15
Console(config-if)# spanning-tree link-type shared
spanning-tree pathcost method
Use the spanning-tree pathcost method Global Configuration mode
command to set the default path cost method. Use the no form of this
command to return to the default configuration.
Syntax
spanning-tree pathcost method {long | short}
no spanning-tree pathcost method
Parameters
• long—Specifies that the default port path costs are within the range:
1–200,000,000.
• short—Specifies that the default port path costs are within the range:
1–65,535.
Default Configuration
Short path cost method.Spanning-Tree Commands 463
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Spanning-Tree.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Command Mode
Global Configuration mode
User Guidelines
This command applies to all the spanning tree instances on the switch.
• If the short method is chosen, the switch use for the default cost values in
the range 1 through 65,535.
• If the long method is chosen, the switch use for the default cost values in
the range 1 through 200,000,000.
Example
The following example sets the default path cost method to Long.
Console(config)# spanning-tree pathcost method long
spanning-tree bpdu (Global)
Use the spanning-tree bpdu Global Configuration mode command to define
BPDU handling when the spanning tree is disabled globally or on a single
interface. Use the no form of this command to restore the default
configuration.
Syntax
spanning-tree bpdu {filtering | flooding}
no spanning-tree bpdu
Parameters
• filtering—Specifies that BPDU packets are filtered when the spanning tree
is disabled on an interface.
• flooding—Specifies that untagged BPDU packets are flooded
unconditionally (without applying VLAN rules) to all ports with the
spanning tree disabled and BPDU handling mode of flooding. Tagged
BPDU packets are filtered.464 Spanning-Tree Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Spanning-Tree.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Default Configuration
The default setting is flooding.
Command Mode
Global Configuration mode
User Guidelines
The filtering and flooding modes are relevant when the spanning tree is
disabled globally or on a single interface.
Example
The following example defines the BPDU packet handling mode as flooding
when the spanning tree is disabled on an interface.
Console(config)# spanning-tree bpdu flooding
spanning-tree bpdu (Interface)
Use the spanning-tree bpdu Interface Configuration (Ethernet, Portchannel) mode command to define BPDU handling when the spanning tree
is disabled on a single interface. Use the no form of this command to restore
the default configuration.
Syntax
spanning-tree bpdu {filtering | flooding}
no spanning-tree bpdu
Parameters
• filtering—Specifies that BPDU packets are filtered when the spanning tree
is disabled on an interface.
• flooding—Specifies that untagged BPDU packets are flooded
unconditionally (without applying VLAN rules) to ports with the spanning
tree disabled and BPDU handling mode of flooding. Tagged BPDU packets
are filtered.Spanning-Tree Commands 465
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Spanning-Tree.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Default Configuration
The spanning-tree bpdu (Global) command determines the default
configuration.
Command Mode
Interface Configuration (Ethernet, Port-channel) mode
Example
The following example defines the BPDU packet as flooding when the
spanning tree is disabled on gigabitethernet port 1/0/3.
Console(config)# interface gi1/0/3
Console(config-if)# spanning-tree bpdu flooding
spanning-tree guard root
Use the spanning-tree guard root Interface Configuration (Ethernet, Portchannel) mode command to enable root guard on all spanning-tree instances
on the interface. Root guard prevents the interface from becoming the root
port of the device. Use the no form of this command to disable the root guard
on the interface.
Syntax
spanning-tree guard root
no spanning-tree guard root
Default Configuration
Root guard is disabled.
Command Mode
Interface Configuration (Ethernet, Port-channel) mode
User Guidelines
Root guard can be enabled when the device operates in STP, RSTP and MSTP
modes.466 Spanning-Tree Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Spanning-Tree.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
When root guard is enabled, the port changes to the alternate state if the
spanning-tree calculations select the port as the root port.
Example
The following example prevents gigabitethernet port 1/0/1 from being the
root port of the device.
Console(config)# interface gi1/0/1
Console(config-if)# spanning-tree guard root
spanning-tree bpduguard
Use the spanning-tree bpduguard Interface Configuration (Ethernet, portchannel) mode command to shut down an interface when it receives a bridge
protocol data unit (BPDU). Use the no form of this command to restore the
default configuration.
Syntax
spanning-tree bpduguard {enable | disable}
no spanning-tree bpduguard
Parameters
enable—Enables BPDU Guard.
disable—Disables BPDU Guard.
Default Configuration
BPDU Guard is disabled.
Command Mode
Interface Configuration (Ethernet, Port-channel) mode
User Guidelines
The command can be enabled when the spanning tree is enabled (useful
when the port is in the PortFast mode) or disabled.Spanning-Tree Commands 467
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Spanning-Tree.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
The following example shuts down Ethernet port 1/0/5 when it receives a
BPDU.
Console(config)# interface gi1/0/5
Console(config-if)# spanning-tree bpduguard enable
clear spanning-tree detected-protocols
Use the clear spanning-tree detected-protocols Privileged EXEC command
to restart the protocol migration process (force the renegotiation with
neighboring switches) on all interfaces or on the specified interface
Syntax
clear spanning-tree detected-protocols [interface interface-id]
Parameters
interface-id—Specifies an interface ID. The interface ID can be one of the
following types: Ethernet port or Port-channel.
Command Mode
Privileged EXEC mode
User Guidelines
This feature should be used only when working in RSTP or MSTP mode.
Example
console# clear spanning-tree detected-protocols
spanning-tree mst priority
Use the spanning-tree mst priority Global Configuration mode command to
configure the device priority for the specified spanning-tree instance. Use the
no form of this command to restore the default configuration.468 Spanning-Tree Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Spanning-Tree.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Syntax
spanning-tree mst instance-id priority priority
no spanning-tree mst instance-id priority
Parameters
• instance-id—Specifies the spanning-tree instance ID. (Range:1–15)
• priority—Specifies the device priority for the specified spanning-tree
instance. This setting affects the likelihood that the switch is selected as
the root switch. A lower value increases the probability that the switch is
selected as the root switch. (Range: 0–61440)
Default Configuration
The default bridge priority for IEEE Spanning Tree Protocol (STP) is 32768.
Command Mode
Global Configuration mode
User Guidelines
The priority value must be a multiple of 4096.
The switch with the lowest priority is the root of the spanning tree.
Example
The following example configures the spanning tree priority of instance 1 to
4096.
Console(config)# spanning-tree mst 1 priority 4096
spanning-tree mst max-hops
Use the spanning-tree mst max-hops Global Configuration mode command
to configure the number of hops in an MST region before the BDPU is
discarded and the port information is aged out. Use the no form of this
command to restore the default configuration.
Syntax
spanning-tree mst max-hops hop-countSpanning-Tree Commands 469
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Spanning-Tree.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
no spanning-tree mst max-hops
Parameters
hop-count—Specifies the number of hops in an MST region before the
BDPU is discarded. (Range: 1–40)
Default Configuration
The default number of hops is 20.
Command Mode
Global Configuration mode
Example
The following example configures the maximum number of hops that a
packet travels in an MST region before it is discarded to 10.
Console(config)# spanning-tree mst max-hops 10
spanning-tree mst port-priority
Use the spanning-tree mst port-priority Interface Configuration (Ethernet,
port-channel) mode command to configure the priority of a port. Use the no
form of this command to restore the default configuration.
Syntax
spanning-tree mst instance-id port-priority priority
no spanning-tree mst instance-id port-priority
Parameters
• instance-id—Specifies the spanning tree instance ID. (Range: 1–15)
• priority—Specifies the port priority. (Range: 0–240 in multiples of 16)
Default Configuration
The default port priority for IEEE Spanning Tree Protocol (STP) is 128.470 Spanning-Tree Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Spanning-Tree.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Command Mode
Interface Configuration (Ethernet, port-channel) mode
User Guidelines
The priority value must be a multiple of 16.
Example
The following example configures the port priority of port gi1/0/1 to 144.
Console(config)# interface gi1/0/1
Console(config-if)# spanning-tree mst 1 port-priority 144
spanning-tree mst cost
Use the spanning-tree mst cost Interface Configuration (Ethernet, Portchannel) mode command to configure the path cost for multiple spanningtree (MST) calculations. If a loop occurs, the spanning tree considers path
cost when selecting an interface to put in the forwarding state. Use the no
form of this command to restore the default configuration.
Syntax
spanning-tree mst instance-id cost cost
no spanning-tree mst instance-id cost
Parameters
• instance-id—Specifies the spanning-tree instance ID. (Range: 1–15)
• cost—Specifies the port path cost. (Range: 1–200000000)
Default Configuration
Default path cost is determined by the port speed and path cost method
(long or short) as shown below:
Interface Long Short
Port-channel 20,000 4
TenGigabit Ethernet (10000 Mbps) 2000 2Spanning-Tree Commands 471
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Spanning-Tree.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Command Mode
Interface Configuration (Ethernet, port-channel) mode
Example
The following example configures the MSTP instance 1 path cost for
gigabitethernet port 1/0/9 to 4.
Console(config)# interface gi1/0/9
Console(config-if)# spanning-tree mst 1 cost 4
spanning-tree mst configuration
Use the spanning-tree mst configuration Global Configuration mode
command to enable configuring an MST region by entering the Multiple
Spanning Tree (MST) mode.
Syntax
spanning-tree mst configuration
Command Mode
Global Configuration mode
User Guidelines
For two or more switches to be in the same MST region, they need to contain
the same VLAN mapping, the same configuration revision number, and the
same name.
Example
The following example configures an MST region.
Console(config)# spanning-tree mst configuration
Console(config-mst)# instance 1 vlan 10-20
Gigabit Ethernet (1000 Mbps) 20,000 4
Fast Ethernet (100 Mbps) 200,000 19
Ethernet (10 Mbps) 2,000,000 100472 Spanning-Tree Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Spanning-Tree.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Console(config-mst)# name region1
Console(config-mst)# revision 1
instance (MST)
Use instance MST Configuration mode command to map VLANs to an MST
instance. Use the no form of this command to restore default mapping.
Syntax
instance instance-id vlan vlan-range
no instance instance-id vlan vlan-range
Parameters
• instance-id—MST instance (Range: 1–15)
• vlan-range—The specified range of VLANs is added to the existing ones.
To specify a range, use a hyphen. To specify a series, use a comma. (Range:
1–4094)
Default Configuration
All VLANs are mapped to the common and internal spanning tree (CIST)
instance (instance 0).
Command Mode
MST Configuration mode
User Guidelines
All VLANs that are not explicitly mapped to an MST instance are mapped to
the common and internal spanning tree (CIST) instance (instance 0) and
cannot be unmapped from the CIST.
For two or more devices to be in the same MST region, they must have the
same VLAN mapping, the same configuration revision number, and the same
name.Spanning-Tree Commands 473
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Spanning-Tree.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
The following example maps VLANs 10-20 to MST instance 1.
Console(config)# spanning-tree mst configuration
Console(config-mst)# instance 1 vlan 10-20
name (MST)
Use the name MST Configuration mode command to define the MST
configuration name. Use the no form of this command to restore the default
setting.
Syntax
name string
no name
Parameters
string—Specifies the MST configuration name. (Length: 1–32 characters)
Default Configuration
The default name is the bridge address.
Command Mode
MST Configuration mode
Example
The following example defines the configuration name as Region1.
Console(config)# spanning-tree mst configuration
Console(config-mst)# name region1
revision (MST)
Use the revision MST Configuration mode command to define the MST
configuration revision number. Use the no form of this command to restore
the default configuration.474 Spanning-Tree Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Spanning-Tree.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Syntax
revision value
no revision
Parameters
value—Specifies the MST configuration revision number. (Range: 0–65535)
Default Configuration
The default configuration revision number is 0.
Command Mode
MST Configuration mode
Example
The following example sets the configuration revision to 1.
Console(config) # spanning-tree mst configuration
Console(config-mst) # revision 1
show (MST)
Use the show MST Configuration mode command to displays the current or
pending MST region configuration.
Syntax
show {current | pending}
Parameters
• current—Displays the current MST region configuration.
• pending—Displays the pending MST region configuration.
Command Mode
MST Configuration modeSpanning-Tree Commands 475
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Spanning-Tree.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
The following example displays a pending MST region configuration.
exit (MST)
Use the exit MST Configuration mode command to exit the MST region
Configuration mode and appy all configuration changes.
Syntax
exit
Command Mode
MST Configuration mode
Example
The following example exits the MST Configuration mode and saves
changes.
Console(config)# spanning-tree mst configuration
Console(config-mst)# exit
Console(config)#
Console(config-mst)# show pending
Pending MST configuration
Name: Region1
Revision: 1
Instance
--------
0
1
Vlans Mapped
------------
1-9,21-4094
10-20
State
-------
Enabled
Enabled476 Spanning-Tree Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Spanning-Tree.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
abort (MST)
Use the abort MST Configuration mode command to exit the MST
Configuration mode without applying the configuration changes.
Syntax
abort
Command Mode
MST Configuration mode
Example
The following example exits the MST Configuration mode without saving
changes.
Console(config)# spanning-tree mst configuration
Console(config-mst)# abort
show spanning-tree
Use the show spanning-tree Privileged EXEC mode command to display the
spanning-tree configuration.
Syntax
show spanning-tree [interface-id] [instance instance-id]
show spanning-tree [detail] [active | blockedports] [instance instance-id]
show spanning-tree mst-configuration
Parameters
• instance instance-id—Specifies the spanning tree instance ID. (Range:
0–15)
• detail—Displays detailed information.
• active—Displays active ports only.
• blockedports—Displays blocked ports only.Spanning-Tree Commands 477
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Spanning-Tree.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
• mst-configuration—Displays the MST configuration identifier.
• interface-id—Specifies an interface ID. The interface ID can be one of
the following types: Ethernet port or Port-channel.
Command Mode
Privileged EXEC mode
Example
The following examples display spanning-tree information.
Console# show spanning-tree
Spanning tree enabled mode RSTP
Default port cost method: long
Loopback guard: Disabled
Root ID Priority
Address
Path Cost
Root Port
32768
00:01:42:97:e0:00
20000
gi1/0/1
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Bridge ID Priority
Address
36864
00:02:4b:29:7a:00
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec478 Spanning-Tree Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Spanning-Tree.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Interfaces
Name
---------
gi1/0/1
gi1/0/2
gi1/0/3
gi1/0/4
gi1/0/5
State
------
Enabled
Enabled
Disabled
Enabled
Enabled
Prio.
Nbr
------
128.1
128.2
128.3
128.4
128.5
Cost
-----
20000
20000
20000
20000
20000
Sts
---
FWD
FWD
-
BLK
DIS
Role
----
Root
Desg
-
Altn
-
PortFast
---------
No
No
-
No
-
Type
----------
P2p (RSTP)
Shared (STP)
-
Shared (STP)
-
Console# show spanning-tree
Spanning tree enabled mode RSTP
Default port cost method: long
Root ID Priority
Address
36864
00:02:4b:29:7a:00
This switch is the Root.
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
InterfacesSpanning-Tree Commands 479
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Spanning-Tree.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Name
--------
gi1/0/1
gi1/0/2
gi1/0/3
gi1/0/4
gi1/0/5
State
--------
Enabled
Enabled
Disabled
Enabled
Enabled
Prio.Nbr
--------
128.1
128.2
128.3
128.4
128.5
Cost
-----
20000
20000
20000
20000
20000
Sts
---
FWD
FWD
-
FWD
DIS
Role
----
Desg
Desg
-
Desg
-
PortFast
---------
No
No
-
No
-
Type
----------
P2p (RSTP)
Shared (STP)
-
Shared (STP)
-
Console# show spanning-tree
Spanning tree disabled (BPDU filtering) mode RSTP
Default port cost method: long
Root ID Priority
Address
Path Cost
Root Port
Hello Time
N/A
N/A
N/A
N/A
N/A Max Age N/A Forward Delay N/A
Bridge ID Priority
Address
36864
00:02:4b:29:7a:00
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Interfaces480 Spanning-Tree Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Spanning-Tree.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Name
---------
gi1/0/1
gi1/0/2
gi1/0/3
gi1/0/4
gi1/0/5
State
--------
Enabled
Enabled
Disabled
Enabled
Enabled
Prio.Nbr
-------
128.1
128.2
128.3
128.4
128.5
Cost
-----
20000
20000
20000
20000
20000
Sts
---
-
-
-
-
-
Role
----
-
-
-
-
-
PortFast
---------
-
-
-
-
-
Type
-----
-
-
-
-
-
Console# show spanning-tree active
Spanning tree enabled mode RSTP
Default port cost method: long
Root ID Priority
Address
Path Cost
Root Port
32768
00:01:42:97:e0:00
20000
gi1/0/1
Hello Time 2 sec Max Age 20 secForward Delay 15 sec
Bridge ID Priority
Address
36864
00:02:4b:29:7a:00
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
InterfacesSpanning-Tree Commands 481
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Spanning-Tree.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Name
---------
gi1/0/1
gi1/0/2
gi1/0/4
State
--------
-
Enabled
Enabled
Enabled
Prio.Nbr
--------
-
128.1
128.2
128.4
Cost
-----
20000
20000
20000
Sts
---
FWD
FWD
BLK
Role
----
Root
Desg
Altn
PortFast
---------
No
No
No
Type
----------
P2p (RSTP)
Shared (STP)
Shared (STP)
Console# show spanning-tree blockedports
Spanning tree enabled mode RSTP
Default port cost method: long
Root ID Priority
Address
Path Cost
Root Port
32768
00:01:42:97:e0:00
20000
gi1/0/1
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Bridge ID Priority 36864
Address 00:02:4b:29:7a:00
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Interfaces482 Spanning-Tree Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Spanning-Tree.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Name
---------
gi1/0/4
State
--------
-
Enabled
Prio.Nbr
--------
-
128.4
Cost
-----
19
Sts
---
BLK
Role
----
Altn
PortFast
---------
No
Type
----------
Shared (STP)
Console# show spanning-tree detail
Spanning tree enabled mode RSTP
Default port cost method: long
Root ID Priority
Address
Path Cost
Root Port
32768
00:01:42:97:e0:00
20000
gi1/0/1
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Bridge ID Priority
Address
36864
00:02:4b:29:7a:00
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Number of topology changes 2 last change occurred 2d18h ago
Times: hold 1, topology change 35, notification 2
hello 2, max age 20, forward delay 15
Port 1 (gi1/0/1) enabled
State: Forwarding
Port id: 128.1
Type: P2p (configured: auto) RSTP
Designated bridge Priority: 32768
Designated port id: 128.25
Guard root: Disabled
Role: Root
Port cost: 20000
Port Fast: No (configured:no)
Address: 00:01:42:97:e0:00
Designated path cost: 0
BPDU guard: Disabled
Number of transitions to forwarding state: 1
BPDU: sent 2, received 120638Spanning-Tree Commands 483
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Spanning-Tree.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Port 2 (gi1/0/2) enabled
State: Forwarding
Port id: 128.2
Type: Shared (configured: auto) STP
Designated bridge Priority: 32768
Designated port id: 128.2
Guard root: Disabled
Role: Designated
Port cost: 20000
Port Fast: No (configured:no)
Address: 00:02:4b:29:7a:00
Designated path cost: 20000
BPDU guard: Disabled
Number of transitions to forwarding state: 1
BPDU: sent 2, received 170638
Port 3 (gi1/0/3) disabled
State: N/A
Port id: 128.3
Type: N/A (configured: auto)
Designated bridge Priority: N/A
Designated port id: N/A
Guard root: Disabled
Role: N/A
Port cost: 20000
Port Fast: N/A (configured:no)
Address: N/A
Designated path cost: N/A
BPDU guard: Disabled
Number of transitions to forwarding state: N/A
BPDU: sent N/A, received N/A
Port 4 (gi1/0/4) enabled
State: Blocking
Port id: 128.4
Type: Shared (configured:auto) STP
Designated bridge Priority: 28672
Designated port id: 128.25
Guard root: Disabled
Role: Alternate
Port cost: 20000
Port Fast: No (configured:no)
Address: 00:30:94:41:62:c8
Designated path cost: 20000
BPDU guard: Disabled
Number of transitions to forwarding state: 1
BPDU: sent 2, received 120638
Port 5 (gi1/0/5) enabled
State: Disabled
Port id: 128.5
Type: N/A (configured: auto)
Designated bridge Priority: N/A
Designated port id: N/A
Guard root: Disabled
Role: N/A
Port cost: 20000
Port Fast: N/A (configured:no)
Address: N/A
Designated path cost: N/A
BPDU guard: Disabled484 Spanning-Tree Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Spanning-Tree.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Number of transitions to forwarding state: N/A
BPDU: sent N/A, received N/A
Console# show spanning-tree ethernet gi1/0/1
Port 1 (gi1/0/1) enabled
State: Forwarding
Port id: 128.1
Type: P2p (configured: auto) RSTP
Designated bridge Priority: 32768
Designated port id: 128.25
Guard root: Disabled
Role: Root
Port cost: 20000
Port Fast: No (configured:no)
Address: 00:01:42:97:e0:00
Designated path cost: 0
BPDU guard: Disabled
Number of transitions to forwarding state: 1
BPDU: sent 2, received 120638
Console# show spanning-tree mst-configuration
Name: Region1
Revision: 1
Instance
--------
0
1
Vlans mapped
------------
1-9, 21-4094
10-20
State
---------
Enabled
EnabledSpanning-Tree Commands 485
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Spanning-Tree.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Console# show spanning-tree
Spanning tree enabled mode MSTP
Default port cost method: long
###### MST 0 Vlans Mapped: 1-9
CST Root ID Priority
Address
Path
Cost
Root
Port
32768
00:01:42:97:e0:00
20000
gi1/0/1
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
IST Master ID Priority
Address
32768
00:02:4b:29:7a:00
This switch is the IST master.
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Max hops 20
Interfaces
Name
----
gi1/0/1
gi1/0/2
gi1/0/3
gi1/0/4
State
-------
Enabled
Enabled
Enabled
Enabled
Prio.Nbr
--------
128.1
128.2
128.3
128.4
Cost
-----
20000
20000
20000
20000
Sts
---
FWD
FWD
FWD
FWD
Role
----
Root
Desg
Desg
Desg
PortFast
--------
No
No
No
No
Type
---------------
P2p Bound
(RSTP)
Shared Bound
(STP)
P2p
P2p486 Spanning-Tree Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Spanning-Tree.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
###### MST 1 Vlans Mapped: 10-20
Root ID Priority
Address
Path
Cost
Root
Port
Rem hops
24576
00:02:4b:29:89:76
20000
gi1/0/4
19
Bridge ID Priority
Address
32768
00:02:4b:29:7a:00
Interfaces
Name
----
gi1/0/1
gi1/0/2
gi1/0/3
gi1/0/4
State
-------
Enabled
Enabled
Enabled
Enabled
Prio.Nbr
--------
128.1
128.2
128.3
128.4
Cost
-----
20000
20000
20000
20000
Sts
---
FWD
FWD
BLK
FWD
Role
----
Boun
Boun
Altn
Root
PortFast
--------
No
No
No
No
Type
---------------
P2p Bound
(RSTP)
Shared Bound
(STP)
P2p
P2p
Console# show spanning-tree detail
Spanning tree enabled mode MSTP
Default port cost method: long
###### MST 0 Vlans Mapped: 1-9
CST Root ID Priority
Address
Path
Cost
Root
Port
32768
00:01:42:97:e0:00
20000
gi1/0/1
Hello Time 2 sec Max Age 20 sec Forward Delay 15 secSpanning-Tree Commands 487
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Spanning-Tree.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
IST Master ID Priority
Address
32768
00:02:4b:29:7a:00
This switch is the IST master.
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Max hops 20
Number of topology changes 2 last change occurred 2d18h
ago
Times: hold 1, topology change 35, notification 2
hello 2, max age 20, forward delay 15
Port 1 (gi1/0/1) enabled
State: Forwarding
Port id: 128.1
Type: P2p (configured: auto) Boundary RSTP
Designated bridge Priority: 32768
Designated port id: 128.25
Number of transitions to forwarding state: 1
BPDU: sent 2, received 120638
Role: Root
Port cost: 20000
Port Fast: No (configured:no)
Address: 00:01:42:97:e0:00
Designated path cost: 0
Port 2 (gi1/0/2) enabled
State: Forwarding
Port id: 128.2
Type: Shared (configured: auto) Boundary STP
Designated bridge Priority: 32768
Designated port id: 128.2
Number of transitions to forwarding state: 1
BPDU: sent 2, received 170638
Role: Designated
Port cost: 20000
Port Fast: No (configured:no)
Address: 00:02:4b:29:7a:00
Designated path cost: 20000488 Spanning-Tree Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Spanning-Tree.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Port 3 (gi1/0/3) enabled
State: Forwarding
Port id: 128.3
Type: Shared (configured: auto) Internal
Designated bridge Priority: 32768
Designated port id: 128.3
Number of transitions to forwarding state: 1
BPDU: sent 2, received 170638
Role: Designated
Port cost: 20000
Port Fast: No (configured:no)
Address: 00:02:4b:29:7a:00
Designated path cost: 20000
Port 4 (gi1/0/4) enabled
State: Forwarding
Port id: 128.4
Type: Shared (configured: auto) Internal
Designated bridge Priority: 32768
Designated port id: 128.2
Number of transitions to forwarding state: 1
BPDU: sent 2, received 170638
Role: Designated
Port cost: 20000
Port Fast: No (configured:no)
Address: 00:02:4b:29:7a:00
Designated path cost: 20000
###### MST 1 Vlans Mapped: 10-20
Root ID Priority
Address
Path Cost
Root Port
24576
00:02:4b:29:89:76
20000
gi1/0/4
Rem hops 19
Bridge ID Priority
Address
32768
00:02:4b:29:7a:00
Number of topology changes 2 last change occurred 1d9h
ago
Times: hold 1, topology change 2, notification 2
hello 2, max age 20, forward delay 15Spanning-Tree Commands 489
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Spanning-Tree.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Port 1 (gi1/0/1) enabled
State: Forwarding
Port id: 128.1
Type: P2p (configured: auto) Boundary RSTP
Designated bridge Priority: 32768
Designated port id: 128.1
Number of transitions to forwarding state: 1
BPDU: sent 2, received 120638
Role: Boundary
Port cost: 20000
Port Fast: No (configured:no)
Address: 00:02:4b:29:7a:00
Designated path cost: 20000
Port 2 (gi1/0/2) enabled
State: Forwarding
Port id: 128.2
Type: Shared (configured: auto) Boundary STP
Designated bridge Priority: 32768
Designated port id: 128.2
Number of transitions to forwarding state: 1
BPDU: sent 2, received 170638
Role: Designated
Port cost: 20000
Port Fast: No (configured:no)
Address: 00:02:4b:29:7a:00
Designated path cost: 20000
Port 3 (gi1/0/3) disabled
State: Blocking
Port id: 128.3
Type: Shared (configured: auto) Internal
Designated bridge Priority: 32768
Designated port id: 128.78
Number of transitions to forwarding state: 1
BPDU: sent 2, received 170638
Role: Alternate
Port cost: 20000
Port Fast: No (configured:no)
Address: 00:02:4b:29:1a:19
Designated path cost: 20000
Port 4 (gi1/0/4) enabled
State: Forwarding
Port id: 128.4
Type: Shared (configured: auto) Internal
Designated bridge Priority: 32768
Designated port id: 128.2
Number of transitions to forwarding state: 1
BPDU: sent 2, received 170638
Role: Designated
Port cost: 20000
Port Fast: No (configured:no)
Address: 00:02:4b:29:7a:00
Designated path cost: 20000490 Spanning-Tree Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Spanning-Tree.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Console# show spanning-tree
Spanning tree enabled mode MSTP
Default port cost method: long
###### MST 0 Vlans Mapped: 1-9
CST Root ID Priority
Address
Path Cost
Root
Port
32768
00:01:42:97:e0:00
20000
gi1/0/1
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
IST Master ID Priority
Address
Path Cost
Rem hops
32768
00:02:4b:19:7a:00
10000
19
Bridge ID Priority
Address
32768
00:02:4b:29:7a:00
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Max hops 20
Console# show spanning-tree
Spanning tree enabled mode MSTP
Default port cost method: long
###### MST 0 Vlans Mapped: 1-9
CST Root ID Priority
Address
32768
00:01:42:97:e0:00
This switch is root for CST and IST master.Spanning-Tree Commands 491
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Spanning-Tree.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
show spanning-tree bpdu
Use the show spanning-tree bpdu EXEC mode command to display the
BPDU handling when spanning-tree is disabled.
Syntax
show spanning-tree bpdu [interface-id]
Parameters
interface-id—Specifies an interface ID. The interface ID can be one of the
following types: Ethernet port or Port-channel.
Command Mode
EXEC mode
Example
The following examples display spanning-tree information.
Root
Port
gi1/0/1
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Max hops 20
Console# show spanning-tree bpdu
Global: Flooding
Interface
---------
gi1/0/1
gi1/0/2
gi1/0/3
Admin Mode
----------
Global
Global
Flooding
Oper Mode
---------
Flooding
STP
STP492 Spanning-Tree Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Spanning-Tree.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LYVLAN Commands 493
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\VLAN_ISCLI_Only.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
31
VLAN Commands
vlan database
Use the vlan database Global Configuration mode command to enter the
VLAN Configuration mode.
Syntax
vlan database
Command Mode
Global Configuration mode
Example
The following example enters the VLAN database mode.
Console(config)# vlan database
Console(config-vlan)#
vlan
Use the vlan VLAN Configuration mode command to create a VLAN. Use
the no form of this command to restore the default configuration or delete a
VLAN.
Syntax
vlan vlan-range [name vlan-name]
no vlan vlan-range
The device accepts also the following syntax:494 VLAN Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\VLAN_ISCLI_Only.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
vlan vlan-range [name vlan-name] [media ethernet] [state active]
no vlan vlan-range
Parameters
• vlan-range—Specifies a list of VLAN IDs to add. Separate nonconsecutive
VLAN IDs with a comma and no spaces. Use a hyphen to designate a range
of IDs.
• name—Specifies the VLAN name. The option is only valid in cass where
only one VLAN is configured by the command (Range: 1–32 characters)
Command Mode
VLAN Configuration mode
Example
The following example creates VLAN number 1972.
Console(config)# vlan database
Console(config-vlan)# vlan 1972
interface vlan
Use the interface vlan Global Configuration mode command to enter the
Interface Configuration (VLAN) mode and enable configuration of the
specified VLAN ID.
Syntax
interface vlan vlan-id
Parameters
vlan-id—Specifies an existing VLAN ID.
Command Mode
Global Configuration modeVLAN Commands 495
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\VLAN_ISCLI_Only.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
User Guidelines
If the VLAN does not exist (ghost VLAN), not all of the commands are
available under the interface VLAN context.
The commands that are supported for VLANs that do not exist are:
• IGMP snooping control commands
• Bridge multicast configuration commands
Example
The following example configures VLAN 1 with IP address 131.108.1.27 and
subnet mask 255.255.255.0.
Console (config)# interface vlan 1
Console (config-if)# ip address 131.108.1.27 255.255.255.0
interface range vlan
Use the interface range vlan Global Configuration mode command to enable
configuring multiple VLANs simultaneously.
Syntax
interface range vlan vlan-range
Parameters
vlan-range—Specifies a list of VLAN IDs. Separate nonconsecutive VLAN
IDs with a comma and no spaces. Use a hyphen to designate a range of IDs.
Command Mode
Global Configuration mode
User Guidelines
Commands under the interface range context are executed independently on
each interface in the range. If the command returns an error on one of the
interfaces, an error message is displayed and command execution continues
on the other interfaces.496 VLAN Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\VLAN_ISCLI_Only.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
The following example groups VLANs 221 through 228 and 889 to receive the
same command.
Console(config)# interface range vlan 221-228, vlan 889
Console(config-if)#
name
Use the name Interface Configuration (VLAN) mode command to add a
name to a VLAN. Use the no form of this command to remove the VLAN
name.
Syntax
name string
no name
Parameters
string—Specifies a unique name associated with this VLAN. (Length: 1–32
characters)
Default Configuration
No name is defined.
Command Mode
Interface Configuration (VLAN) mode. It cannot be configured for a range of
interfaces (range context).
User Guidelines
The VLAN name must be unique.
Example
The following example gives VLAN number 19 the name Marketing.
Console(config)# interface vlan 19
Console(config-if)# name MarketingVLAN Commands 497
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\VLAN_ISCLI_Only.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
switchport protected-port
Use the switchport protected-port Interface Configuration mode command
to isolate unicast, multicast, and broadcast traffic at Layer 2 from other
protected ports on the same switch. Use the no form of this command to
disable protection on the port.
Syntax
switchport protected-port
no switchport protected-port
Parameters
This command has no arguments or keywords.
Default Configuration
Unprotected
Command Mode
Interface configuration (Ethernet, port-channel)
User Guidelines
Use this command to isolate unicast, multicast, and broadcast traffic at Layer
2 from other protected ports (that are not associated with the same
community as the ingress interface) on the same switch. Please note that the
packet is still subject to FDB decision and to all filtering rules. Use the
switchport community Interface Configuration command to associate the
interface with a community.
Example
console(config)# interface gi1/0/1
console(config-if)# switchport protected-port498 VLAN Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\VLAN_ISCLI_Only.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
switchport community
Use the switchport community Interface Configuration mode command to
associate a protected port with a community. Use the no form of this
command to return to default.
Syntax
switchport community community
no switchport community
Parameters
community—Specifies the community number. (Range:1 - 30)
Default Configuration
The port is not associated with any community.
Command Mode
Interface Configuration (Ethernet, port-channel) mode
User Guidelines
The command is relevant only when the port is defined as a protected port.
Use the switchport protected-port Interface Configuration command to
define a port as a protected port.
Example
console(config)# interface gi1/0/1
console(config-if)# switchport community 1
show interfaces protected-ports
Use the show interfaces protected-ports EXEC mode command to show
protected ports configuration.
Syntax
show interfaces protected-ports [interface-id]VLAN Commands 499
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\VLAN_ISCLI_Only.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Parameters
interface-id—Specifies an interface ID. The interface ID can be one of the
following types: Ehernet port or Port-channel.
Command Mode
EXEC mode
Example
console# show interfaces protected-ports
Interface State Community
--------- ------------- ---------
gi1/0/1 Protected 1
gi1/0/2 Protected Isolated
gi1/0/3 Unprotected 20
gi1/0/4 Unprotected Isolated
Note: The Community column for unprotected ports is relevant only
when the port state is changed to Protected.
switchport
Use the switchport Interface Configuration mode command with no
keywords to put an interface that is in Layer 3 mode into Layer 2 mode for
Layer 2 configuration. Use the no form of this command to put an interface
in Layer 3 mode.
Syntax
switchport
no switchport
Default Configuration
Layer 2 mode500 VLAN Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\VLAN_ISCLI_Only.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Command Mode
Interface Configuration (Ethernet, port-channel) mode
switchport mode
Use the switchport mode Interface Configuration (Ethernet, port-channel)
mode command to configure the VLAN membership mode of a port. Use the
no form of this command to restore the default configuration.
Syntax
switchport mode { access | trunk | general | private-vlan {promiscuous |
host} | customer }
no switchport mode
Parameters
• access—Specifies an untagged layer 2 VLAN port.
• trunk—Specifies a trunking layer 2 VLAN port.
• general—Specifies a full 802-1q supported VLAN port.
• customer—Specifies that the port is connected to customer equipment.
Used when the switch is in a provider network.
• private-vlan promiscous—Private-VLAN promiscous port.
• private-vlan host—Private-VLAN host port.
Default Configuration
Command Mode
Interface Configuration (Ethernet, port-channel) mode
User Guidelines
• When the port mode is changed, it receives the configuration
corresponding to the mode.
• If the port mode is changed to access and the access VLAN does not exist,
then the port will not belongs to any VLAN.VLAN Commands 501
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\VLAN_ISCLI_Only.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
The following example configures gigabitethernet port 1/0/1 as an untagged
layer 2 VLAN port.
Console(config)# interface gi1/0/1
Console(config-if)# switchport mode access
switchport access vlan
Use the switchport access vlan Interface Configuration (Ethernet, portchannel) mode command to configure the VLAN ID when the interface is in
access mode. Use the no form of this command to restore the default
configuration.
Syntax
switchport access vlan { vlan-id | none }
no switchport access vlan
Parameters
vlan-id—Specifies the VLAN ID to which the port is configured.
none—Specifies the access port cannot belong to any VLAN.
Default Configuration
If the default VLAN is enabled, the VLAN ID is 1. Otherwise, it is not a
member of any VLAN.
Command Mode
Interface Configuration (Ethernet, port-channel) mode
User Guidelines
The command automatically removes the port from the previous VLAN and
adds it to the new VLAN.502 VLAN Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\VLAN_ISCLI_Only.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
The following example configures a VLAN ID of 23 to the untagged layer 2
VLAN gigabitethernet port 1/0/1.
Console(config)# interface gi1/0/1
Console(config-if)# switchport access vlan 23
switchport access multicast-tv vlan
Use the switchport access multicast-tv vlan Interface Configuration
(Ethernet, Port-channel) mode command to enable receiving multicast
transmissions from a VLAN that is not the Access port VLAN, while keeping
the L2 segregation with subscribers on different Access port VLANs. Use the
no form of this command to disable receiving multicast transmissions.
Syntax
switchport access multicast-tv vlan vlan-id
no switchport access multicast-tv vlan
Parameters
vlan-id—Specifies the Multicast TV VLAN ID.
Default Configuration
Receiving multicast transmissions is disabled.
Command Mode
Interface Configuration (Ethernet, Port-channel) mode
User Guidelines
The user cannot transmit multicast transmissions on the multicast TV
VLAN.
A multicast TV VLAN cannot be enabled if a Guest VLAN is enabled on the
interface.VLAN Commands 503
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\VLAN_ISCLI_Only.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
The following example enables gigabitethernet port 1/0/5 to receive multicast
transmissions from VLAN 11.
Console(config)# interface gi1/0/5
Console(config-if)# switchport access multicast-tv vlan 11
switchport trunk allowed vlan
Use the switchport trunk allowed vlan Interface Configuration mode
command to set the trunk characteristics when the interface is in trunking
mode. Use the no form of this command to reset a trunking characteristic to
the default.
Syntax
switchport trunk allowed vlan { all | none | add vlan-list | remove vlan-list |
except vlan-list }
no switchport trunk allowed vlan
Parameters
all—Specifies all VLANs from 1 to 4094. At any time, the port belongs to all
VLANs exiting at the time. (Range: 1–4094)
none—Specifies an empty VLAN list The port does not belong to any VLAN.
add vlan-list—List of VLAN IDs to add. Separate nonconsecutive VLAN IDs
with a comma and no spaces. Use a hyphen to designate a range of IDs.
remove vlan-list—List of VLAN IDs to remove. Separate nonconsecutive
VLAN IDs with a comma and no spaces. Use a hyphen to designate a range of
IDs.
except vlan-list—List of VLAN IDs is calculated by inverting the defined list
of VLANs (the calculated list will include all VLANs from interval 1..4094
except VLANs from the defined list.504 VLAN Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\VLAN_ISCLI_Only.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Default Configuration
The Default VLAN is its Native VLAN and the port belongs to either all
VLANs or only to the Default VLAN depending on a value of parameter
Trunk Port Default Configuration.
Command Mode
Interface Configuration (Ethernet, port-channel) mode
User Guidelines
The RS port model behavior allows only the following options: Add and
Remove.
Inside except vlan-list is saved as add ~ vlan-list, where ~ vlan-list is a list of
all VLANs from 1 to 4094 minus the VLANs from vlan-list. Command show
running/startup always uses the latter format.
The port must be in trunk mode before the command can take effect.
Example
console(config)# interface gi1/0/1
console(config-if)# switchport mode trunk
console(config-if)# switchport trunk allowed vlan all
switchport trunk native vlan
Use the switchport trunk native vlan Interface Configuration (Ethernet,
port-channel) mode command to define the native VLAN when the interface
is in trunk mode. Use the no form of this command to restore the default
configuration.
Syntax
switchport trunk native vlan { vlan-id | none }
no switchport trunk native vlan
Parameters
• vlan-id—Specifies the native VLAN ID.
• none—Specifies the access port cannot belong to any VLAN.VLAN Commands 505
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\VLAN_ISCLI_Only.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Default Configuration
If the default VLAN is enabled, the VLAN ID is 1. Otherwise, the VLAN ID is
4095.
Command Mode
Interface Configuration (Ethernet, port-channel) mode
User Guidelines
The command adds the port as a member of the VLAN. If the port is already
a member of the VLAN (not a native), it must first be removed from the
VLAN.
Example
The following example configures VLAN number 123 as the native VLAN
when the port is in trunk mode.
Console# interface gi1/0/1
Console(config-if)# switchport trunk native vlan 123
switchport general allowed vlan
Use the switchport general allowed vlan Interface Configuration mode
command to set the general characteristics when the interface is in general
mode. Use the no form of this command to reset a general characteristic to
the default.
Syntax
switchport general allowed vlan {add | remove} vlan-list [tagged|untagged]
no switchport general allowed vlan
Parameters
• add vlan-list—List of VLAN IDs to add. Separate nonconsecutive VLAN
IDs with a comma and no spaces. Use a hyphen to designate a range of
IDs. (Range: 1–4094)506 VLAN Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\VLAN_ISCLI_Only.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
• remove vlan-list—List of VLAN IDs to remove. Separate nonconsecutive
VLAN IDs with a comma and no spaces. Use a hyphen to designate a range
of IDs.
• tagged - Specify that packets would be transmitted tagged for the
configured VLANs
• untagged - Specify that packets would be transmitted untagged for the
configured VLANs (this is the default)
Default Configuration
The port’s PVID equals to the Default VLAN ID and belongs to the Default
VLAN as untagged one.
Command Mode
Interface Configuration mode
Example
console(config-if)# interface gi1/0/1
console(config-if)# switchport mode general
console(config-if)# switchport general allowed vlan add 2-3 tagged
switchport general pvid
Use the switchport general pvid Interface Configuration (Ethernet, Portchannel) mode command to configure the Port VLAN ID (PVID) when the
interface is in general mode. Use the no form of this command to restore the
default configuration.
Syntax
switchport general pvid vlan-id
no switchport general pvid
Parameters
vlan-id—Specifies the Port VLAN ID (PVID).VLAN Commands 507
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\VLAN_ISCLI_Only.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Default Configuration
If the default VLAN is enabled, PVID is 1. Otherwise, PVID is =4095.
Command Mode
Interface Configuration (Ethernet, Port-channel) mode
Example
The following example configures PVID 234 for gigabitethernet port 1/0/2,
when the interface is in general mode.
Console(config)# interface gi1/0/2
Console(config-if)# switchport mode general
Console(config-if)# switchport general pvid 234
switchport general ingress-filtering disable
Use the switchport general ingress-filtering disable Interface Configuration
(Ethernet, Port-channel) mode command to disable port ingress filtering. Use
the no form of this command to restore the default configuration.
Syntax
switchport general ingress-filtering disable
no switchport general ingress-filtering disable
Default Configuration
Ingress filtering is enabled.
Command Mode
Interface Configuration (Ethernet, port-channel) mode
Example
The following example disables port ingress filtering on gigabitethernet port
1/0/1.
Console(config)# interface gi1/0/1
Console(config-if)# switchport mode general508 VLAN Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\VLAN_ISCLI_Only.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Console(config-if)# switchport general ingress-filtering disable
switchport general acceptable-frame-type
Use the switchport general acceptable-frame-type Interface Configuration
mode command to configure ingress filtering based on packet type
tagged/untagged. Use the no form of this command to return to default.
Syntax
switchport general acceptable-frame-type {tagged-only | untagged-only |
all}
no switchport general acceptable-frame-type
Parameters
• tagged-only—Discard untagged packets and priority tagged packets.
• untagged-only—Discard VLAN tagged packets (not including Priority
tagged packets)
• all—Do not discard packets based on whether the packet is VLAN tagged
or not.
Default Configuration
All frame types are accepted at ingress.
Command Mode
Interface Configuration (Ethernet, port-channel) mode
Example
The following example configures gigabitethernet port 1/0/3 to discard
untagged frames at ingress.
Console(config)# interface gi1/0/3
Console(config-if)# switchport mode general
Console(config-if)# switchport general acceptable-frame-type
tagged-onlyVLAN Commands 509
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\VLAN_ISCLI_Only.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
switchport customer vlan
Use the switchport customer vlan Interface Configuration (Ethernet, Portchannel) mode command to set the port's VLAN when the interface is in
customer mode. Use the no form of this command to restore the default
configuration.
Syntax
switchport customer vlan vlan-id
no switchport customer vlan
Parameters
vlan-id—Specifies the customer VLAN ID.
Default Configuration
No VLAN is configured.
Command Mode
Interface Configuration (Ethernet, Port-channel) mode
Example
The following example defines gigabitethernet port 1/0/5 as a member of
customer VLAN 5.
Console(config)# interface gi1/0/5
Console(config-if)# switchport mode custmer
Console(config-if)# switchport customer vlan isolated 5
switchport general forbidden vlan
Use the switchport general forbidden vlan Interface Configuration
(Ethernet, Port-channel) mode command to forbid adding or removing
specific VLANs to or from a port. Use the no form of this command to restore
the default configuration.510 VLAN Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\VLAN_ISCLI_Only.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Syntax
switchport general forbidden vlan {add vlan-list | remove vlan-list}
no switchport general forbidden vlan {add vlan-list | remove vlan-list}
Parameters
• add vlan-list—Specifies a list of VLAN IDs to add. Separate
nonconsecutive VLAN IDs with a comma and no spaces. Use a hyphen to
designate a range of IDs.
• remove vlan-list—Specifies a list of VLAN IDs to remove. Separate
nonconsecutive VLAN IDs with a comma and no spaces. Use a hyphen
designate a range of IDs.
Default Configuration
All VLANs are allowed.
Command Mode
Interface Configuration (Ethernet, Port-channel) mode
Example
The following example forbids adding VLAN IDs 234 to 256 to
gigabitethernet port 1/0/7.
Console(config)# interface gi1/0/7
Console(config-if)# switchport mode general
Console(config-if)# switchport general forbidden vlan add 234-
256
map protocol protocols-group
Use the map protocol protocols-group VLAN Configuration mode command
to map a protocol to a group of protocols. Use the no form of this command
to delete a protocol from a group.
Syntax
map protocol protocol [encapsulation] protocols-group group
no map protocol protocol [encapsulation]VLAN Commands 511
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\VLAN_ISCLI_Only.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Parameters
• protocol—Specifies a 16-bit protocol number or one of the reserved names
listed in the User Guidelines. (Range: 0x0600–0xFFFF)
• encapsulation—Specifies one of the following values: Ethernet, rfc1042,
llcOther. If no option is indicated, the default is Ethernet.
• protocols-group group—Specifies the group number of the group of
protocols associated together. (Range: 1–2147483647)
Default Configuration
The default encapsulation is Ethernet.
Command Mode
VLAN Configuration mode
User Guidelines
The value 0x8100 is not valid as the protocol number for Ethernet
encapsulation.
The following protocol names are reserved for Ethernet Encapsulation:
• ip
• arp
• ipv6
• ipx
Example
The following example maps protocol ip to protocol group number 213.
Console(config)# vlan database
Console(config-vlan)# map protocol ip protocols-group 213
switchport general map protocols-group vlan
Use the switchport general map protocols-group vlan Interface
Configuration (Ethernet, Port-channel) mode command to set a protocolbased classification rule. Use the no form of this command to delete a
classification.512 VLAN Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\VLAN_ISCLI_Only.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Syntax
switchport general map protocols-group group vlan vlan-id
no switchport general map protocols-group group
Parameters
• group—Specifies the group number as defined in the map protocol
protocols-group command. (Range: 1–65535)
• vlan-id—Defines the VLAN ID in the classifying rule.
Command Mode
Interface Configuration (Ethernet, port-channel) mode
Default Configuration
No classification is defined.
User Guidelines
The VLAN classification rule priorities are:
1. MAC-based VLAN (Best match among the rules)
2. Subnet-based VLAN (Best match among the rules)
3. Protocol-based VLAN
4. PVID
Example
The following example sets a protocol-based classification rule.
Console(config-if)# switchport general map protocols-group 1
vlan 8
private-vlan
Use the private-vlan Interface VLAN Configuration mode command to
configure a private VLAN. Use the no form of this command to return the
VLAN to normal VLAN configuration.VLAN Commands 513
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\VLAN_ISCLI_Only.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Syntax
private-vlan {primary | isolated}
no private-vlan
Parameters
• Primary—Designate the VLAN as Primary VLAN.
• Isolated—Designate the VLAN as Isolated VLAN.
Default Configuration
No private VLANs are configured.
Command Mode
Interface Configuration (VLAN) mode
User Guidelines
• The VLAN type cannot be changed if there is a private-VLAN port that is a
member in the VLAN.
• The VLAN type cannot be changed if it is associated with other private
VLANs.
• The VLAN type is not kept as a property of the VLAN when it is deleted.
private-vlan association
Use the private-vlan association Interface VLAN Configuration mode
command to configure the association between the primary VLAN and the
secondary VLANs. Use the no form of this command to remove the
association.
Syntax
private-vlan association [add | remove] secondary-vlan-list
no private-vlan association
Parameters
• add—Associates a secondary VLAN to a primary VLAN. This is the default
action.514 VLAN Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\VLAN_ISCLI_Only.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
• remove—Clears the association between a secondary VLAN and a primary
VLAN.
• secondary-vlan-list—Specifies one or more secondary VLANs to be
associated with a primary VLAN in a private VLAN.
Default Configuration
No private VLANs are configured.
Command Mode
Interface Configuration (VLAN) mode
User Guidelines
• The command can only be executed in the context of the primary VLAN.
• Private VLAN cannot be removed or change its type if it is associated with
other private VLANs.
• Primary VLAN can be associated with only single isolated VLAN.
• A secondary VLAN can be associated with only one primary VLAN.
• The association of secondary VLANs with a primary VLAN cannot be
removed if there are private VLAN ports that are members in the
secondary VLAN.
• In MSTP mode, all the VLANs that are associated with a private VLAN
should be mapped to the same instance.
switchport private-vlan mapping
Use the switchport private-vlan mapping Interface Configuration mode
command to configure the VLANs of the private-vlan promiscuous port. Use
the no form of this command to reset to default.
Syntax
switchport private-vlan mapping primary-vlan-id [add | remove] secondaryvlan-list
no switchport private-vlan mappingVLAN Commands 515
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\VLAN_ISCLI_Only.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Parameters
• primary-vlan-id—The VLAN ID of the primary VLAN.
• secondary-vlan-list—Specifies one or more secondary VLANs.
Default Configuration
No VLAN is configured.
Command Mode
Interface Configuration (Ethernet, port-channel) mode
User Guidelines
The secondary VLANs should be associated with the primary VLANs,
otherwise the configuration is not accepted. See the command private-vlan
association.
switchport private-vlan host-association
Use the switchport private-vlan host-association Interface Configuration
mode command to configure the VLANs of the private-vlan host port. Use
the no form of this command to reset to default.
Syntax
switchport private-vlan host-association primary-vlan-id secondary-vlan-id
no switchport private-vlan host-association
Parameters
• primary-vlan-id—The VLAN ID of the primary VLAN.
• secondary-vlan-list—Specifies the secondary VLANs. The secondary
VLAN is an isolated port.
Default Configuration
No VLAN is configured.
Command Mode
Interface Configuration (Ethernet, port-channel) mode516 VLAN Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\VLAN_ISCLI_Only.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
User Guidelines
The secondary VLAN should be associated with the primary VLANs,
otherwise the configuration is not accepted. See the command private-vlan
association.
show vlan private-vlan
Use the show vlan private-vlan EXEC mode command to show the private
VLANs information.
Syntax
show vlan private-vlan [tag vlan-id ]
Parameters
vlan-id—VLAN ID
Command Mode
EXEC mode
User Guidelines
The show command does not include non-private-vlan ports that are
members in private VLANs.
Example
Console# show vlan private-vlan
Primary Secondary Type Ports
----------- ----------- ----------- ----------------------
150 primary gi1/0/15
150 151 isolated gi1/0/15
ip internal-usage-vlan
Use the ip internal-usage-vlan Interface Configuration (Ethernet, Portchannel) mode command to reserve a VLAN as the internal usage VLAN of VLAN Commands 517
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\VLAN_ISCLI_Only.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
an interface. Use the no form of this command to restore the default
configuration.
Syntax
ip internal-usage-vlan vlan-id
no ip internal-usage-vlan
Parameters
vlan-id—Specifies the internal usage VLAN ID.
Command Mode
Interface Configuration (Ethernet, Port-channel) mode. It cannot be
configured for a range of interfaces (range context).
User Guidelines
An internal usage VLAN is required when an IP interface is defined on an
Ethernet port or Port-channel.
Use this command to define the internal usage VLAN of a port.
If an internal usage VLAN is not defined for a port, the software chooses one
of the unused VLANs.
If a VLAN ID was chosen by the software for internal usage, but it is desired
to use that VLAN ID for a static or dynamic VLAN, do one of the following:
• Remove the IP interface, create the VLAN, and recreate the IP interface.
• Use this command to explicitly define the internal usage VLAN.
Example
The following example reserves unused VLAN 200 as the internal usage
VLAN of Ethernet port 1/3gigabitethernet port 1/0/3.
Console(config)# interface gi1/0/3
Console(config-if)# ip internal-usage-vlan 200518 VLAN Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\VLAN_ISCLI_Only.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
show vlan
Use the show vlan Privileged EXEC mode command to display VLAN
information for all VLANs or for a specific VLAN.
Syntax
show vlan [tag vlan-id | name vlan-name]
Parameters
• tag vlan-id—Specifies a VLAN ID.
• name vlan-name—Specifies a VLAN name string. (Length: 1–32
characters)
Command Mode
Privileged EXEC mode
Example
The following example displays information for all VLANs.
Console# show vlan
VLAN
----
1
10
11
20
21
30
31
91
3978
Name
----------
default
VLAN0010
VLAN0011
VLAN0020
VLAN0021
VLAN0030
VLAN0031
VLAN0091
Guest VLAN
Ports
--------
gi1/0/1-2
gi1/0/3-4
gi1/0/1-2
gi1/0/3-4
gi1/0/1-2
gi1/0/17
Type
-------
Other
dynamic
static
static
static
static
static
static
static
Authorization
--------------
Required
Required
Required
Required
Required
Required
Required
Not Required
GuestVLAN Commands 519
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\VLAN_ISCLI_Only.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
show vlan multicast-tv
Use the show vlan multicast-tv EXEC mode command to display information
on the source ports and receiver ports of multicast-TV VLAN.
Syntax
show vlan multicast-tv vlan vlan-id
Parameters
vlan-id—Specifies the VLAN ID.
Command Mode
EXEC mode
Example
The following example displays information on the source and receiver ports
of multicast-TV VLAN ID 1000.
The following table describes the significant fields shown in the display:
show vlan protocols-groups
Use the show vlan protocols-groups EXEC mode command to display
protocols-groups information.
Console # show vlan multicast-tv vlan 1000
Source ports
-------------
gi1/0/8,
gi1/0/9
Receiver Ports
----------------------
gi1/0/1-18, gi1/0/1-18, gi1/0/1-18
Field Description
Source ports Ports that can transmit and receive traffic to and from the VLAN.
Receiver ports Ports that can only receive traffic from the VLAN.520 VLAN Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\VLAN_ISCLI_Only.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Syntax
show vlan protocols-groups
Command Mode
EXEC mode
Example
The following example displays protocols-groups information.
show vlan internal usage
Use the show vlan internal usage Privileged EXEC mode command to display
a list of VLANs used internally by the device.
Syntax
show vlan internal usage
Command Mode
Privileged EXEC mode
Console> show vlan protocols-groups
Protocol
-------------
0x800 (IP)
0x806 (ARP)
0x86dd (IPv6)
0x8898
Encapsulation
--------------
Ethernet
Ethernet
Ethernet
Ethernet
Group
--------
1
1
2
3VLAN Commands 521
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\VLAN_ISCLI_Only.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
The following example displays VLANs used internally by the device.
show interfaces switchport
Use the show interfaces switchport Privileged EXEC command to display the
administrative and operational status of all interfaces or a specific interface.
Syntax
show interfaces switchport [interface-id]
Parameters
Interface-id—Specifies an interface ID. The interface ID can be one of the
following types: Ehernet port or Port-channel.
Example
console# show interfaces switchport gi2/0/1
Gathering information...
Name: gi1/0/1
Switchport: enable
Administrative Mode: access
Operational Mode: down
Access Mode VLAN: 1
Access Multicast TV VLAN: none
Console# show vlan internal usage
VLAN
--------
1007
1008
1009
Usage
--------
Eth 1/21
Eth 1/22
Eth 1/23
IP address
----------
Active
Inactive
Active
Reserved
----------
No
Yes
Yes522 VLAN Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\VLAN_ISCLI_Only.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Trunking Native Mode VLAN: 1
Trunking VLANs Enabled: 1
2-4094 (Inactive)
General PVID: 1
General VLANs Enabled: none
General Egress Tagged VLANs Enabled: none
General Forbidden VLANs: none
General Ingress Filtering: enabled
General Acceptable Frame Type: all
General GVRP status: disabled
General GVRP VLANs: none
Customer Mode VLAN: none
Private-vlan promiscuous-association primary VLAN: none
Private-vlan promiscuous-association Secondary VLANs Enabled: none
Private-vlan host-association primary VLAN: none
Private-vlan host-association Secondary VLAN Enabled: none
DVA: disable
Protected: Enabled, Uplink is gi1/0/1
Classification rules:
Classification type Group ID VLAN ID
------------------- -------- -------
Protocol 1 19
Protocol 1 20
Protocol 2 72
Subnet 1 15
MAC 6 11IGMP Snooping Commands 523
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\IGMP_Snooping.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
32
IGMP Snooping Commands
ip igmp snooping (Global)
Use the ip igmp snooping Global Configuration mode command to enable
Internet Group Management Protocol (IGMP) snooping. Use the no form of
this command to disable IGMP snooping.
Syntax
ip igmp snooping
no ip igmp snooping
Default Configuration
IGMP snooping is disabled.
Command Mode
Global Configuration mode
Example
The following example enables IGMP snooping.
Console(config)# ip igmp snooping
ip igmp snooping vlan
Use the ip igmp snooping vlan Global Configuration mode command to
enable Internet Group Management Protocol (IGMP) snooping on a specific
VLAN. Use the no form of this command to disable IGMP snooping on a
VLAN interface.524 IGMP Snooping Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\IGMP_Snooping.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Syntax
ip igmp snooping vlan vlan-id
no ip igmp snooping vlan vlan-id
Parameters
vlan-id—Specifies the VLAN.
Default
Disabled
Command Mode
Global Configuration mode
User Guidelines
IGMP snooping can be enabled only on static VLANs.
IGMPv1, IGMPv2 and IGMPv3 are supported.
To activate IGMP snooping, the bridge multicast filtering should be enabled.
The User Guidelines of the bridge multicast mode Interface VLAN
Configuration command describes the configuration that is written into the
FDB as a function of the FDB mode and the IGMP version that is used in the
network.
Example
console(config)# ip igmp snooping vlan 2
ip igmp snooping mrouter
Use the ip igmp snooping mrouter Global Configuration mode command to
enable automatic learning of multicast router ports. Use the no form of this
command to remove the configuration.
Syntax
ip igmp snooping vlan vlan-id mrouter learn pim-dvmrp
no ip igmp snooping vlan vlan-id mrouter learn pim-dvmrpIGMP Snooping Commands 525
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\IGMP_Snooping.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Parameters
vlan-id—Specifies the VLAN.
Default
Learning pim-dvmrp is enabled.
Command Mode
Global Configuration mode
User Guidelines
Multicast router ports are learned based on:
• Queries received on the port
• PIM/PIMv2 received on the port
• DVMRP received on the port
• MRDISC received on the port
MOSPF received on the port
You can execute the command before the VLAN is created.
Example
console(config)# ip igmp snooping vlan 1 mrouter learn pim-dvmrp
ip igmp snooping mrouter interface
Use the ip igmp snooping mrouter interface Global Configuration mode
command to define a port that is connected to a multicast router port. Use
the no form of this command to remove the configuration.
Syntax
ip igmp snooping vlan vlan-id mrouter interface interface-list
no ip igmp snooping vlan vlan-id mrouter interface interface-list
Parameters
• vlan-id—Specifies the VLAN.526 IGMP Snooping Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\IGMP_Snooping.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
• interface-list—Specifies the list of interfaces. The interfaces can be one of
the following types: Ethernet port or Port-channel.
Default
No ports defined
Command Mode
Global Configuration mode
User Guidelines
A port that is defined as a multicast router port receives all IGMP packets
(reports and queries) as well as all multicast data.
You can execute the command before the VLAN is created.
Example
console(config)# ip igmp snooping vlan 1 mrouter interface gi1/0/1
ip igmp snooping forbidden mrouter interface
Use the ip igmp snooping forbidden mrouter interface Global Configuration
mode command to forbid a port from being defined as a multicast router port
by static configuration or by automatic learning. Use the no form of this
command to remove the configuration.
Syntax
ip igmp snooping vlan vlan-id forbidden mrouter interface interface-list
no ip igmp snooping vlan vlan-id forbidden mrouter interface interface-list
Parameters
• vlan-id—Specifies the VLAN.
• interface-list—Specifies a list of interfaces. The interfaces can be from one
of the following types: Ethernet port or Port-channel.
Default
No ports definedIGMP Snooping Commands 527
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\IGMP_Snooping.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Command Mode
Global Configuration mode
User Guidelines
A port that is a forbidden mrouter port cannot be a multicast router port (i.e.
cannot be learned dynamically or assigned statically).
You can execute the command before the VLAN is created.
Example
console(config)# ip igmp snooping vlan 1 forbidden mrouter interface
gi1/0/1
ip igmp snooping static
Use the ip igmp snooping static Global Configuration mode command to
register an IP-layer multicast address to the bridge table, and to add statically
ports to the group. Use the no form of this command to remove ports
specified as members of a static multicast group.
Syntax
ip igmp snooping vlan vlan-id static ip-address [interface interface-list]
no ip igmp snooping vlan vlan-id static ip-address [interface interface-list]
Parameter
• vlan-id—Specifies the VLAN.
• ip-address—Specifies the IP multicast address.
• interface-list—Specifies a list of interfaces. The interfaces can be from one
of the following types: Ethernet port or Port-channel.
Default Configuration
No multicast addresses are defined.
Command Mode
Global Configuration mode528 IGMP Snooping Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\IGMP_Snooping.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
User Guidelines
Static multicast addresses can only be defined on static VLANs.
You can execute the command before the VLAN is created.
You can register an entry without specifying an interface.
Using the no. command without a port-list removes the entry.
Example
console(config)# ip igmp snooping vlan 1 static 239.2.2.2 gi1/0/
ip igmp snooping multicast-tv
Use the ip igmp snooping multicast-tv Global Configuration mode
command to define the multicast ip-addresses that are associated with a
multicast-tv VLAN. Use the no form of this command to remove all
associations.
Syntax
ip igmp snooping vlan vlan-id multicast-tv ip-multicast-address [count
number]
no ip igmp snooping vlan vlan-id multicast-tv ip-multicast-address [count
number]
Parameters
• vlan-id—Specifies the VLAN
• number—Configures multiple contiguous multicast IP addresses. If not
specified, the default is 1. (Range: 1–256)
Default
No multicast IP address is associated.
Command Mode
Global Configuration modeIGMP Snooping Commands 529
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\IGMP_Snooping.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
User Guidelines
Use this command to define the multicast transmissions on a multicast-TV
VLAN. The configuration is only relevant for an Access port that is a member
in the configured VLAN as a multicast-TV VLAN.
If an IGMP message is received on such an Access port, it is associated with
the multicast-TV VLAN only if it is for one of the multicast IP addresses that
are associated with the multicast-TV VLAN.
Up to 256 VLANs can be configured.
ip igmp snooping querier
Use the ip igmp snooping querier Global Configuration mode command to
enable the Internet Group Management Protocol (IGMP) querier on a
specific VLAN. Use the no form of this command to disable the IGMP
querier on a VLAN interface.
Syntax
ip igmp snooping vlan vlan-id querier
no ip igmp snooping vlan vlan-id querier
Parameters
vlan-id—Specifies the VLAN
Default
Disabled
Command Mode
Global Configuration mode
User Guidelines
The IGMP snooping querier can be enabled on a VLAN only if IGMP
snooping is enabled for that VLAN.
No more then one switch can be configured as an IGMP Querier for a VLAN.
When the IGMP snooping querier is enabled, it starts after a host-time-out/2
with no IGMP traffic detected from a multicast router.530 IGMP Snooping Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\IGMP_Snooping.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
The IGMP Snooping Querier disables itself if it detects IGMP traffic from a
multicast router. It restarts automatically after host-time-out/2.
Following are the IGMP snooping querier parameters as a function of the
IGMP snooping parameters:
• QueryMaxResponseTime: host-time-out/10.
• QueryInterval: host-time-out/ 3.
Example
console(config)# ip igmp snooping vlan 1 querier
ip igmp snooping querier address
Use the ip igmp snooping querier address Global Configuration mode
command to define the source IP address that the IGMP snooping querier
would use. Use the no form of this command to return to default.
Syntax
ip igmp snooping vlan vlan-id querier address ip-address
no ip igmp snooping vlan vlan-id querier address
Parameters
• vlan-id—Specifies the VLAN.
• ip-addres—Source IP address.
Default
If an IP address is configured for the VLAN, it is used as the source address of
the IGMP snooping querier.
Command Mode
Global Configuration mode
User Guidelines
If an IP address is not configured by this command, and no IP address is
configured for the querier’s VLAN, the querier is disabled.IGMP Snooping Commands 531
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\IGMP_Snooping.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
console(config)# ip igmp snooping vlan 1 querier address 1.2.3.4
ip igmp robustness
Use the ip igmp robustness Interface Configuration mode command to
change a value of the IGMP robustness variable. Use the no format of the
command to return to default.
Syntax
ip igmp robustness count
no ip igmp robustness
Parameters
count—The number of expected packet loss on a link. Parameter range.
(Range: 1–7)
Default
2
Command Mode
Interface Configuration (VLAN) mode
User Guidelines
You can execute the command before the VLAN is created.
console(config)# interface vlan 1
console(config-if)# ip igmp robustness 3
ip igmp query-interval
Use the ip igmp query-interval Interface Configuration mode command to
configure the Query interval. Use the no format of the command to return to
default.532 IGMP Snooping Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\IGMP_Snooping.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Syntax
ip igmp query-interval seconds
no ip igmp query-interval
Parameters
seconds—Frequency, in seconds, at which IGMP query messages are sent on
the interface. (Range: 30–18000)
Default
125
Command Mode
Interface Configuration (VLAN) mode
User Guidelines
You can execute the command before the VLAN is created.
Example
ip igmp query-max-response-time
Use the ip igmp query-max-response-time Interface Configuration mode
command to configure the Query Maximum Response time. Use the no
format of the command to return to default.
Syntax
ip igmp query-max-response-time seconds
no ip igmp query-max-response-time
Parameters
seconds—Maximum response time, in seconds, advertised in IGMP queries.
(Range: 5–20)
Default
10IGMP Snooping Commands 533
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\IGMP_Snooping.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Command Mode
Interface Configuration (VLAN) mode
User Guidelines
You can execute the command before the VLAN is created.
Example
ip igmp last-member-query-count
Use the ip igmp last-member-query-count Interface Configuration mode
command to configure the Last Member Query Counter. Use the no format
of the command to return to default.
Syntax
ip igmp last-member-query-count count
no ip igmp last-member-query-count
Parameter
count—The number of times that group- or group-source-specific queries are
sent upon receipt of a message indicating a leave. (Range: 1–7)
Default
A value of Robustness variable
Command Mode
Interface Configuration (VLAN) mode
User Guidelines
You can execute the command before the VLAN is created.
Example534 IGMP Snooping Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\IGMP_Snooping.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
ip igmp last-member-query-interval
Use the ip igmp last-member-query-interval Interface Configuration mode
command to configure the Last Member Query interval. Use the no format of
the command to return to default.
Syntax
ip igmp last-member-query-interval milliseconds
no ip igmp last-member-query-interval
Parameters
milliseconds—Interval, in milliseconds, at which IGMP group-specific host
query messages are sent on the interface. (Range: 100–25500)
Default
1000
Command Mode
Interface Configuration (VLAN) mode
User Guidelines
You can execute the command before the VLAN is created.
Example
ip igmp snooping vlan immediate-leave
Use the ip igmp snooping vlan immediate-leave Global Configuration mode
command to enable the IGMP Snooping Immediate-Leave processing on a
VLAN. Use the no format of the command to disable IGMP Snooping
Immediate-Leave processing.
Syntax
ip igmp snooping vlan vlan-id immediate-leave
no ip igmp snooping vlan vlan-id immediate-leaveIGMP Snooping Commands 535
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\IGMP_Snooping.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Parameters
vlan-id—Specifies the VLAN ID value. (Range: 1–4094)
Default
Disabled
Command Mode
Global Configuration mode
User Guidelines
You can execute the command before the VLAN is created.
Example
show ip igmp snooping mrouter
The show ip igmp snooping mrouter EXEC mode command displays
information on dynamically learned multicast router interfaces for all VLANs
or for a specific VLAN.
Syntax
show ip igmp snooping mrouter [interface vlan-id]
Parameters
interface vlan-id—Specifies the VLAN ID.
Command Mode
EXEC mode536 IGMP Snooping Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\IGMP_Snooping.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
The following example displays information on dynamically learned multicast
router interfaces for VLAN 1000.
show ip igmp snooping interface
The show ip igmp snooping interface EXEC mode command displays the
IGMP snooping configuration for a specific VLAN.
Syntax
show ip igmp snooping interface vlan-id
Parameters
vlan-id—Specifies the VLAN ID.
Command Mode
EXEC mode
Example
The following example displays the IGMP snooping configuration for VLAN
1000
Console # show ip igmp snooping interface 1000
IGMP Snooping is globally enabled
IGMP Snooping admin: Enabled
IGMP Snooping oper: Enabled
Routers IGMP version: 3
Groups that are in IGMP version 2 compatibility mode:
231.2.2.3, 231.2.2.3
Groups that are in IGMP version 1 compatibility mode:
Console# show ip igmp snooping mrouter interface 1000
VLAN
----
1000
Static
------
gi1/0/1
Dynamic
-------
gi1/0/2
Forbidden
---------
gi1/0/3-gi1/0/23IGMP Snooping Commands 537
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\IGMP_Snooping.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
IGMP snooping querier admin: Enabled
IGMP snooping querier oper: Enabled
IGMP snooping querier address admin:
IGMP snooping querier address oper: 172.16.1.1
IGMP snooping querier version admin: 3
IGMP snooping robustness: admin 2 oper 2
IGMP snooping query interval: admin 125 sec oper 125 sec
IGMP snooping query maximum response: admin 10 sec oper 10
sec
IGMP snooping last member query counter: admin 2 oper 2
IGMP snooping last member query interval: admin 1000 msec
oper 500 msec
IGMP snooping last immediate leave: enable
Automatic learning of multicast router ports is enabled
show ip igmp snooping groups
The show ip igmp snooping groups EXEC mode command displays the
multicast groups learned by the IGMP snooping.
Syntax
show ip igmp snooping groups [vlan vlan-id] [address ip-multicast-address]
[source ip-address]
Parameters
vlan vlan-id—Specifies the VLAN ID.
address ip-multicast-address—Specifies the IP multicast address.
source ip-address—Specifies the IP source address.
Command Mode
EXEC mode538 IGMP Snooping Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\IGMP_Snooping.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
User Guidelines
To see the full multicast address table (including static addresses), use the
show bridge multicast address-table command.
The Include list contains the ports which are in forwarding state for this
group according to the snooping database. In general, the Exclude list
contains the ports that have issued an explicit Exclude for that specific source
in a multicast group. The Reporters That Are Forbidden Statically list
contains the list of ports which have asked to receive a multicast flow but
were defined as forbidden for that multicast group in multicast bridge.
Note: under certain circumstances, the Exclude list may not contain accurate
information.For example, in the case when two Exclude reports were received
on the same port for the same group but for different sources, the port will
not be in the Exclude list but rather in the Include’ list.
Example
The following example shows the output for IGMP version 2.
show ip igmp snooping multicast-tv
The show ip igmp snooping multicast-tv EXEC mode command displays the
IP addresses associated with Multicast TV VLANs.
Syntax
show ip igmp snooping multicast-tv [vlan vlan-id]
Parameters
vlan vlan-id—Specifies the VLAN ID.
Console# show ip igmp snooping groups
Vlan
----
1
1
19
IP
Address
---------
231.2.2.2
231.2.2.3
231.2.2.4
Querier
---------
Yes
No
Yes
Ports
--------
gi1/0/1
gi1/0/2
gi1/0/9IGMP Snooping Commands 539
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\IGMP_Snooping.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Command Mode
EXEC mode
Example
The following example displays the IP addresses associated with all Multicast
TV VLANs.
Console# show ip igmp snooping multicast-tv
VLAN IP Address
---- -----------
1000 239.255.0.0
1000 239.255.0.1
1000 239.255.0.2
1000 239.255.0.3
1000 239.255.0.4
1000 239.255.0.5
1000 239.255.0.6
1000 239.255.0.7540 IGMP Snooping Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\IGMP_Snooping.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LYLACP Commands 541
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\LACP.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
33
LACP Commands
lacp system-priority
Use the lacp system-priority Global Configuration mode command to set the
system priority. Use the no form of this command to restore the default
configuration.
Syntax
lacp system-priority value
no lacp system-priority
Parameters
value—Specifies the system priority value. (Range: 1–65535)
Default Configuration
The default system priority is 1.
Command Mode
Global Configuration mode
Example
The following example sets the system priority to 120.
Console(config)# lacp system-priority 120542 LACP Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\LACP.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
lacp port-priority
Use the lacp port-priority Interface Configuration (Ethernet) mode
command to set the physical port priority. Use the no form of this command
to restore the default configuration.
Syntax
lacp port-priority value
no lacp port-priority
Parameters
value—Specifies the port priority. (Range: 1use the no form of this
command65535)
Default Configuration
The default port priority is 1.
Command Mode
Interface Configuration (Ethernet) mode
Example
The following example sets the priority of gigabitethernet port 1/0/6.
console(config)# interface gi1/0/6
console(config-if)# lacp port-priority 247
lacp timeout
Use the lacp timeout Interface Configuration (Ethernet) mode command to
assign an administrative LACP timeout to an interface. Use the no form of
this command to restore the default configuration.
Syntax
lacp timeout {long | short}
no lacp timeoutLACP Commands 543
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\LACP.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Parameters
• long—Specifies the long timeout value.
• short—Specifies the short timeout value.
Default Configuration
The default port timeout value is Long.
Command Mode
Interface Configuration (Ethernet) mode
Example
The following example assigns a long administrative LACP timeout to
gigabitethernet port 1/0/6.
Console(config)# interface gi1/0/6
Console(config-if)# lacp timeout long
show lacp
Use the show lacp EXEC mode command to display LACP information for
all Ethernet ports or for a specific Ethernet port.
Syntax
show lacp interface-id [ parameters | statistics | protocol-state ]
Parameters
• parameters—Displays parameters only.
• statistics—Displays statistics only.
• protocol-state—Displays protocol state only.
Command Mode
EXEC mode544 LACP Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\LACP.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
The following example displays LACP information for gigabitethernet port
1/0/1.
Console> show lacp gi1/0/1
Port gi1/0/1 LACP parameters:
Actor
system priority:
system mac addr:
port Admin key:
port Oper key:
port Oper number:
port Admin priority:
port Oper priority:
port Admin timeout:
port Oper timeout:
LACP Activity:
Aggregation:
synchronization:
collecting:
distributing:
expired:
1
00:00:12:34:56:78
30
30
21
1
1
LONG
LONG
ACTIVE
AGGREGATABLE
FALSE
FALSE
FALSE
FALSE
PartnerLACP Commands 545
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\LACP.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
system priority:
system mac addr:
port Admin key:
port Oper key:
port Oper number:
port Admin priority:
port Oper priority:
port Admin timeout:
port Oper timeout:
LACP Activity:
Aggregation:
synchronization:
collecting:
distributing:
expired:
0
00:00:00:00:00:00
0
0
0
0
0
LONG
LONG
PASSIVE
AGGREGATABLE
FALSE
FALSE
FALSE
FALSE
Port gi1/0/1 LACP Statistics:
LACP PDUs sent:
LACP PDUs received:
2
2
Port gi1/0/1 LACP Protocol State:
LACP State Machines:
Receive FSM:
Mux FSM:
Port Disabled State
Detached State
Control Variables:
BEGIN:
LACP_Enabled:
Ready_N:
Selected:
Port_moved:
NNT:
Port_enabled:
FALSE
TRUE
FALSE
UNSELECTED
FALSE
FALSE
FALSE
Timer counters:
periodic tx timer:
current while timer:
wait while timer:
0
0
0546 LACP Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\LACP.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
show lacp port-channel
Use the show lacp port-channel EXEC mode command to display LACP
information for a port-channel.
Syntax
show lacp port-channel [ port_channel_number ]
Parameters
port_channel_number—Specifies the port-channel number.
Command Mode
EXEC mode
Example
The following example displays LACP information about port-channel 1.
Console> show lacp port-channel 1
Port-Channel 1:Port Type 1000 Ethernet
Actor
System
Priority:
MAC Address:
Admin Key:
Oper Key:
1
000285:0E1C00
29
29
Partner
System
Priority:
MAC Address:
Oper Key:
0
00:00:00:00:00:00
14GVRP Commands 547
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\GVRP.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
34
GVRP Commands
gvrp enable (Global)
Use the gvrp enable Global Configuration mode command to enable the
Generic Attribute Registration Protocol (GARP) VLAN Registration Protocol
(GVRP) globally. Use the no form of this command to disable GVRP on the
device.
Syntax
gvrp enable
no gvrp enable
Default Configuration
GVRP is globally disabled.
Command Mode
Global Configuration mode
Example
The following example enables GVRP globally on the device.
Console(config)# gvrp enable
gvrp enable (Interface)
Use the gvrp enable Interface Configuration (Ethernet, Port-channel) mode
command to enable GVRP on an interface. Use the no form of this command
to disable GVRP on an interface.548 GVRP Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\GVRP.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Syntax
gvrp enable
no gvrp enable
Default Configuration
GVRP is disabled on all interfaces.
Command Mode
Interface Configuration (Ethernet, Port-channel) mode
User Guidelines
An access port does not dynamically join a VLAN because it is always a
member of one VLAN only. Membership in an untagged VLAN is propagated
in the same way as in a tagged VLAN. That is, the PVID must be manually
defined as the untagged VLAN VID.
Example
The following example enables GVRP on gigabitethernet port 1/0/6.
Console(config)# interface gi1/0/6
Console(config-if)# gvrp enable
garp timer
Use the garp timer Interface Configuration (Ethernet, port channel) mode
command to adjust the values of the join, leave and leaveall timers of GARP
applications, such as GVRP. Use the no form of this command to restore the
default configuration.
Syntax
garp timer {join | leave | leaveall} timer-value
no garp timer
Parameters
• join | leave | leaveall—Specifies the type of timer for which the timer
value is specified. The possible values are:GVRP Commands 549
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\GVRP.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
• join—Specifies the GARP join timer. The GARP join timer value
specifies the time interval between the two join messages sent by the
GARP application.
• leave—Specifies the GARP leave timer. The GARP leave timer value
specifies the time interval for a GARP application to wait for a join
message after receiving a leave message for a GARP attribute, before it
de-registers the GARP attribute.
• leaveall—Specifies the GARP leaveall timer. The GARP leaveall timer
value specifies the time interval between leaveall messages for a GARP
entity, which prompt other GARP entities to re-reregister all attribute
information on this entity.
• timer-value—Specifies the timer value in milliseconds in multiples of 10.
(Range: 10–2147483640)
Default Configuration
The following are the default timer values:
• Join timer—200 milliseconds
• Leave timer—600 milliseconds
• Leaveall timer—10000 milliseconds
Command Mode
Interface Configuration (Ethernet, Port-channel) mode
User Guidelines
The timer-value value must be a multiple of 10.
The following relationship must be maintained between the timers:
• The leave time must be greater than or equal to three times the join time.
• The leave-all time must be greater than the leave time.
Set the same GARP timer values on all Layer 2-connected devices to ensure
proper operation of the GARP application.550 GVRP Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\GVRP.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
The following example sets the leave timer for gigabitethernet port 1/0/6 to
900 milliseconds.
Console(config)# interface gi1/0/6
Console(config-if)# garp timer leave 900
gvrp vlan-creation-forbid
Use the gvrp vlan-creation-forbid Interface Configuration (Ethernet, Portchannel) mode command to disable dynamic VLAN creation or modification.
Use the no form of this command to enable dynamic VLAN creation or
modification.
Syntax
gvrp vlan-creation-forbid
no gvrp vlan-creation-forbid
Default Configuration
Dynamic VLAN creation or modification is enabled.
Command Mode
Interface Configuration (Ethernet, Port-channel) mode
Example
The following example disables dynamic VLAN creation on gigabitethernet
port 1/0/3.
Console(config)# interface gi1/0/3
Console(config-if)# gvrp vlan-creation-forbid
gvrp registration-forbid
Use the gvrp registration-forbid Interface Configuration (Ethernet, Portchannel) mode command to deregister all dynamic VLANs on a port and GVRP Commands 551
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\GVRP.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
prevent VLAN creation or registration on the port. Use the no form of this
command to allow dynamic registration of VLANs on a port.
Syntax
gvrp registration-forbid
no gvrp registration-forbid
Default Configuration
Dynamic registration of VLANs on the port is allowed.
Command Mode
Interface Configuration (Ethernet, Port-channel) mode
Example
The following example forbids dynamic registration of VLANs on
gigabitethernet port 1/0/2.
Console(config)# interface gi1/0/2
Console(config-if)# gvrp registration-forbid
clear gvrp statistics
Use the clear gvrp statistics Privileged EXEC mode command to clear GVRP
statistical information for all interfaces or for a specific interface.
Syntax
clear gvrp statistics [interface-id]
Parameters
Interface-id—Specifies an interface ID. The interface ID can be one of the
following types: Ethernet port or Port-channel.
Command Mode
Privileged EXEC mode552 GVRP Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\GVRP.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
The following example clears all GVRP statistical information on
gigabitethernet port 1/0/5.
Console# clear gvrp statistics gi1/0/5
show gvrp configuration
Use the show gvrp configuration EXEC mode command to display GVRP
configuration information, including timer values, whether GVRP and
dynamic VLAN creation are enabled, and which ports are running GVRP.
Syntax
show gvrp configuration [interface-id]
Parameters
interface-id—Specifies an interface ID. The interface ID can be one of the
following types: Ethernet port or Port-channel.
Command Mode
EXEC mode
Example
The following example displays GVRP configuration information.
console# show gvrp configuration
GVRP Feature is currently Enabled on the device.
Maximum VLANs: 4094
Port(s) GVRP-Status Regist- Dynamic Timers(ms)
ration VLAN Leave
Creation Join Leave All
------- ----------- -------- --------- ---- ----- ----
gi1/0/1 Enabled Forbidden Disabled 200 600 10000
gi1/0/2 Enabled Normal Enabled 400 1200 20000GVRP Commands 553
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\GVRP.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
show gvrp statistics
Use the show gvrp statistics EXEC mode command to display GVRP
statistics for all interfaces or for a specific interface.
Syntax
show gvrp statistics [interface-id]
Parameters
interface-id—Specifies an interface ID. The interface ID can be one of the
following types: Ethernet port or Port-channel.
Command Mode
EXEC mode
Example
The following example displays GVRP statistical information.
Console# show gvrp statistics
GVRP statistics:
----------------
Legend:
rJE :
rEmp:
rLE :
sJE :
sEmp:
sLE :
Join Empty
Received
Empty Received
Leave Empty
Received
Join Empty Sent
Empty Sent
Leave Empty Sent
rJIn: Join In Received
rLIn: Leave In Received
rLA : Leave All Received
sJIn: Join In Sent
sLIn: Leave In Sent
sLA : Leave All Sent554 GVRP Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\GVRP.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
show gvrp error-statistics
Use the show gvrp error-statistics EXEC mode command to display GVRP
error statistics for all interfaces or for a specific interface.
Syntax
show gvrp error-statistics [interface-id]
Parameters
interface-id—Specifies an interface ID. The interface ID can be one of the
following types: Ethernet port or Port-channel.
Command Mode
EXEC mode
Example
The following example displays GVRP error statistics.
console# show gvrp error-statistics
GVRP Error Statistics:
----------------------
Legend:
INVPROT : Invalid Protocol Id
INVATYP : Invalid Attribute Type INVALEN : Invalid Attribute Length
INVAVAL : Invalid Attribute Value INVEVENT: Invalid Event
Port
-----
1/1
1/2
1/3
1/4
1/5
1/6
1/7
1/8
rJE
----
0
0
0
0
0
0
0
0
rJIn
----
0
0
0
0
0
0
0
0
rEmp
----
0
0
0
0
0
0
0
0
rLIn
----
0
0
0
0
0
0
0
0
rLE
----
0
0
0
0
0
0
0
0
rLA
----
0
0
0
0
0
0
0
0
sJE
----
0
0
0
0
0
0
0
0
sJIn
----
0
0
0
0
0
0
0
0
sEmp
----
0
0
0
0
0
0
0
0
sLIn
----
0
0
0
0
0
0
0
0
sLE
----
0
0
0
0
0
0
0
0
sLA
---
0
0
0
0
0
0
0
0GVRP Commands 555
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\GVRP.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Port INVPROT INVATYP INVAVAL INVALEN INVEVENT
-------- ------- ------- ------- ------- --------
gi1/0/1 0 0 0 0 0
gi1/0/2 0 0 0 0 0
gi1/0/3 0 0 0 0 0
gi1/0/4 0 0 0 0 0
gi1/0/5 0 0 0 0 0
gi1/0/6 0 0 0 0 0
gi1/0/0/7 0 0 0 0 0
gi1/0/0/8 0 0 0 0 0556 GVRP Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\GVRP.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LYVoice VLAN Commands 557
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Voice_VLAN.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
35
Voice VLAN Commands
voice vlan id
The voice vlan id Global Configuration mode command specified the Voice
VLAN Identified. The no format of the command returns the value to
default.
Syntax
voice vlan id vlan-id
no voice vlan id
Parameters
vlan-id—Specifies the voice VLAN ID.
Parameters Range
vlan-id—1-4094.
Default Configuration
Default VLAN's Identifier.
Command Mode
Global Configuration mode
User Guidelines
If the Voice VLAN does not exist it is created automatically. It will not
removed automatically.558 Voice VLAN Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Voice_VLAN.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
The following example enables VLAN 35 as the voice VLAN on the device.
Console(config)# voice vlan id 35
voice vlan oui-table
Use the voice vlan oui-table Global Configuration mode command to
configure the voice OUI table. Use the no form of this command to restore
the default configuration.
Syntax
voice vlan oui-table {add mac-address-prefix | remove mac-address-prefix}
[text]
no voice vlan oui-table
Parameters
• add mac-address-prefix—Adds the specified MAC address to the voice
VLAN OUI table. (Length: 3 bytes)
• text—Adds the specified text as a description of the specified MAC
address to the voice VLAN OUI table. (Length: 1–32 characters)
• remove mac-address-prefix—Removes the specified MAC address from
the voice VLAN OUI table. (Length: 3 bytes)
Default Configuration
The default voice VLAN OUI table is:
OUI Description
00:e0:bb 3COM Phone
00:03:6b Cisco Phone
00:e0:75 Veritel Polycom Phone
00:d0:1e Pingtel Phone
00:01:e3 Siemens AG Phone
00:60:b9 NEC/Philips PhoneVoice VLAN Commands 559
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Voice_VLAN.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Command Mode
Global Configuration mode
User Guidelines
The classification of a packet to Packets from VoIP Equipment/Phones is
based on the packet’s OUI of the source Mac Address.
In MAC addresses, the first three bytes contain a manufacturer ID
(Organizationally Unique Identifiers - OUI) and the last three bytes contain a
unique station ID.
OUIs are globally assigned (administered) by the IEEE.
Since the number of IP phones manufacturers that dominates the market is
limited and well known, the known OUI values can be configured (as a
default and user configurable) to the switch.
Example
The following example adds an entry to the voice VLAN OUI table.
Console(config)# voice vlan oui-table add 00:AA:BB description
experimental
voice vlan cos mode
Use the voice vlan cos mode Interface Configuration mode command to
select the OUI Voice VLAN Class Of Service mode. Use the no form of this
command. to return to the default.
Syntax
voice vlan cos mode {src | all}
no voice vlan cos mode
00:0f:e2 Huawei-3COM Phone
00:09:6e Avaya Phone560 Voice VLAN Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Voice_VLAN.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Parameters
• src—QoS attributes are applied only on packets from IP phones. See the
User Guidelines.
• all—QoS attributes are applied only on all packets that are classified to the
Voice VLAN.
Command Mode
Interface Configuration (Ethernet, port-channel) mode
voice vlan cos
Use the voice vlan cos Global Configuration mode command to set the OUI
Voice VLAN Class of Service (CoS). Use the no form of this command to
restore the default configuration.
Syntax
voice vlan cos cos [remark]
no voice vlan cos
Parameters
• cos—Specifies the voice VLAN Class of Service. (Range: 0–7)
• remark—Specifies that the L2 User Priority is remarked.
Default Configuration
The default CoS value is 6.
The L2 User Priority is not remarked.
Command Mode
Global Configuration mode
User Guidelines
Example
The following example sets the OUI Voice VLAN CoS to 6.Voice VLAN Commands 561
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Voice_VLAN.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Console(config)# voice vlan cos 7
voice vlan aging-timeout
Use the voice vlan aging-timeout Global Configuration mode command to
set the OUI Voice VLAN aging timeout interval. Use the no form of this
command to restore the default configuation.
Syntax
voice vlan aging-timeout minutes
no voice vlan aging-timeout
Parameters
minutes—Specifies the voice VLAN aging timeout interval in minutes.
(Range: 1–43200)
Default Configuration
The default voice VLAN aging timeout interval is 1440 minutes.
Command Mode
Global Configuration mode
Example
The following example sets the OUI Voice VLAN aging timeout interval to 12
hours.
Console(config)# voice vlan aging-timeout 720
voice vlan enable
Use the voice vlan enable Interface Configuration (Ethernet, Port-channel)
mode command to enable OUI Voice VLAN configuration on a port. Use the
no form of this command to disable OUI Voice VLAN configuration on a
port.562 Voice VLAN Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Voice_VLAN.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Syntax
voice vlan enable
no voice vlan enable
Default Configuration
Automatic voice VLAN configuration of a port is disabled.
Command Mode
Interface Configuration (Ethernet, Port-channel) mode
User Guidelines
The port is added to the voice VLAN if a packet with a source MAC address
that is a telephony MAC address (defined by the voice vlan oui-table Global
Configuration mode command) is trapped on the port. Note: The packet
VLAN ID can be the voice VLAN ID or any other VLAN ID.
The port joins the voice VLAN as a tagged port.
If the time since the last MAC address with a telephony MAC address aged
out exceeds the timeout limit (configured by the voice vlan aging-timeout
Global Configuration mode command), the port is removed from the voice
VLAN.
Example
The following example enables OUI Voice VLAN configuration on
gigabitethernet port 1/0/2.
Console(config)# interface gi1/0/2
Console(config-if)# voice vlan enable
voice vlan secure
Use the voice vlan secure Interface Configuration (Ethernet, Port-channel)
mode command to enable the secure mode for the OUI Voice VLAN. Use the
no form of this command to disable the secure mode.
Syntax
voice vlan secureVoice VLAN Commands 563
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Voice_VLAN.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
no voice vlan secure
Default Configuration
The voice VLAN secure mode is disabled.
Command Mode
Interface Configuration (Ethernet, Port-channel) mode
User Guidelines
Use this command to specify that packets that are classified to the voice
VLAN with a source MAC address that is not a telephony MAC address
(defined by the voice vlan oui-table Global Configuration mode command)
are discarded.
This command is relevant only to ports that were added to the voice VLAN
automatically
Example
The following example enables the secure mode for the OUI Voice VLAN on
gigabitethernet port 1/0/8.
Console(config)# interface gi1/0/8
Console(config-if)# voice vlan secure
show voice vlan
Use the show voice vlan EXEC mode command to display the voice VLAN
status for all interfaces or for a specific interface.
Syntax
show voice vlan [type {oui | auto}] [interface-id]
Parameters
type {oui | auto}—Specifies which information is printed:
oui - common and the OUI Voice VLAN specific parameters are printed
auto - common and the Auto Voice VLAN specific parameters are printed564 Voice VLAN Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Voice_VLAN.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
If the parameter is omitted the current Voice VLAN type is applied.
interface-id—Specifies an interface ID. If the parameter is omitted than
information about all interfaces are printed. Applied only for the OUI VLAN
type.
Parameters Range
interface-id—Ethernet, Port-channel
Command Mode
EXEC mode
Example
Example 1.
switch>show voice vlan
Administrate Voice VLAN state is auto-triggered
Operational Voice VLAN state is auto-enabled
Best Local Voice VLAN-ID is 20
Best Local VPT is 4
Best Local DSCP is 1
Voice VLAN is received from switch 00:01:22:01:ab:87:45
Agreed Voice VLAN priority is 0 (active UC device)
Agreed Voice VLAN-ID is 100
Agreed VPT is 0
Agreed DSCP is 0
Agreed VLAN Last Change is 10-Apr-10 20:01:00
Example 2.
Administrate Voice VLAN state is auto-enabled
Operational Voice VLAN state is auto-enabled
Best Local Voice VLAN-ID is 1 (default)
Best Local VPT is 0 (default)
Best Local DSCP is 0 (default)
Agreed Voice VLAN is received from switch 00:01:22:01:ab:87:45
Agreed Voice VLAN priority is 2 (static)Voice VLAN Commands 565
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Voice_VLAN.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Agreed Voice VLAN-ID is 20
Agreed VPT is 7
Agreed DSCP is 20
Agreed VLAN Last Change is 10-Apr-10 20:01:00
Example 3.
Administrate Voice VLAN state is auto-triggered
Operational Voice VLAN state is disabled
Example 4.
Administrate Voice VLAN state is disabled
Operational Voice VLAN state is disabled
Best Local Voice VLAN-ID is 20
Best Local VPT is 0 (default)
Best Local DSCP is 0 (default)
Aging timeout: 1440 minutes
CoS: 6
Remark: Yes
Example 5.
Administrate Voice VLAN state is oui-enabled
Operational Voice VLAN state is oui-enabled
Best Local Voice VLAN-ID is 1 (default)
Best Local VPT is 4
Best Local DSCP is 1
Aging timeout: 1440 minutes
CoS: 6
Remark: Yes
OUI table
MAC Address - Prefix Description
-------------------- ------------------
00:E0:BB 3COM
00:03:6B Cisco566 Voice VLAN Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Voice_VLAN.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
00:E0:75 Veritel
00:D0:1E Pingtel
00:01:E3 Simens
00:60:B9 NEC/Philips
00:0F:E2 Huawei-3COM
00:09:6E Avaya
Interface Enabled Secure Activated cos Mode
------------- ------- ------- --------- --------
gi1/0/1 Yes Yes Yes all
gi1/0/2 Yes Yes No src
gi1/0/3 No No - srcDHCP Snooping and ARP Inspection Commands 567
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\DHCP_Snooping.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
36
DHCP Snooping and ARP Inspection
Commands
ip dhcp snooping
Use the ip dhcp snooping Global Configuration mode command to enable
Dynamic Host Configuration Protocol (DHCP) Snooping globally. Use the
no form of this command to restore the default configuration.
Syntax
ip dhcp snooping
no ip dhcp snooping
Default Configuration
DHCP snooping is disabled.
Command Mode
Global Configuration mode
User Guidelines
For any DHCP Snooping configuration to take effect, DHCP Snooping must
be enabled globally. DHCP Snooping on a VLAN is not active until DHCP
Snooping on a VLAN is enabled by using the ip dhcp snooping vlan Global
Configuration mode command.
Example
The following example enables DHCP Snooping on the device.
Console(config)# ip dhcp snooping568 DHCP Snooping and ARP Inspection Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\DHCP_Snooping.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
ip dhcp snooping vlan
Use the ip dhcp snooping vlan Global Configuration mode command to
enable DHCP Snooping on a VLAN. Use the no form of this command to
disable DHCP Snooping on a VLAN.
Syntax
ip dhcp snooping vlan vlan-id
no ip dhcp snooping vlan-id
Parameters
vlan-id—Specifies the VLAN ID.
Default Configuration
DHCP Snooping on a VLAN is disabled.
Command Mode
Global Configuration mode
User Guidelines
DHCP Snooping must be enabled globally before enabling DHCP Snooping
on a VLAN.
Example
The following example enables DHCP Snooping on VLAN 21.
Console(config)# ip dhcp snooping vlan 21
ip dhcp snooping trust
Use the ip dhcp snooping trust Interface Configuration (Ethernet, Portchannel) mode command to configure a port as trusted for DHCP snooping
purposes. Use the no form of this command to restore the default
configuration.DHCP Snooping and ARP Inspection Commands 569
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\DHCP_Snooping.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Syntax
ip dhcp snooping trust
no ip dhcp snooping trust
Default Configuration
The interface is untrusted.
Command Mode
Interface Configuration (Ethernet, Port-channel) mode
User Guidelines
Configure as trusted the ports that are connected to a DHCP server or to
other switches or routers. Configure the ports that are connected to DHCP
clients as untrusted.
Example
The following example configures gigabitethernet port 1/0/5 as trusted for
DHCP Snooping.
Console(config)# interface gi1/0/5
Console(config-if)# ip dhcp snooping trust
ip dhcp snooping information option alloweduntrusted
Use the ip dhcp snooping information option allowed-untrusted Global
Configuration mode command to allow a device to accept DHCP packets
with option-82 information from an untrusted port. Use the no form of this
command to drop these packets from an untrusted port.
Syntax
ip dhcp snooping information option allowed-untrusted
no ip dhcp snooping information option allowed-untrusted570 DHCP Snooping and ARP Inspection Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\DHCP_Snooping.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Default Configuration
DHCP packets with option-82 information from an untrusted port are
discarded.
Command Mode
Global Configuration mode
Example
The following example allows a device to accept DHCP packets with option-
82 information from an untrusted port.
Console(config)# ip dhcp snooping information option alloweduntrusted
ip dhcp snooping verify
Use the ip dhcp snooping verify Global Configuration mode command to
configure a device to verify that the source MAC address in a DHCP packet
received on an untrusted port matches the client hardware address. Use the
no form of this command to disable MAC address verification in a DHCP
packet received on an untrusted port.
Syntax
ip dhcp snooping verify
no ip dhcp snooping verify
Default Configuration
The switch verifies that the source MAC address in a DHCP packet received
on an untrusted port matches the client hardware address in the packet.
Command Mode
Global Configuration modeDHCP Snooping and ARP Inspection Commands 571
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\DHCP_Snooping.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
The following example configures a device to verify that the source MAC
address in a DHCP packet received on an untrusted port matches the client
hardware address.
Console(config)# ip dhcp snooping verify
ip dhcp snooping database
Use the ip dhcp snooping database Global Configuration mode command to
enable the DHCP Snooping binding database file. Use the no form of this
command to delete the DHCP Snooping binding database file.
Syntax
ip dhcp snooping database
no ip dhcp snooping database
Default Configuration
The DHCP Snooping binding database file is not defined.
Command Mode
Global Configuration mode
User Guidelines
The DHCP Snooping binding database file resides on Flash.
To ensure that the lease time in the database is accurate, the Simple Network
Time Protocol (SNTP) must be enabled and configured.
The device writes binding changes to the binding database file only if the
device system clock is synchronized with SNTP.
Example
The following example enables the DHCP Snooping binding database file.
Console(config)# ip dhcp snooping database572 DHCP Snooping and ARP Inspection Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\DHCP_Snooping.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
ip dhcp snooping database update-freq
Use the ip dhcp snooping database update-freq Global Configuration mode
command to set the update frequency of the DHCP Snooping binding
database file. Use the no form of this command to restore the default
configuration.
Syntax
ip dhcp snooping database update-freq seconds
no ip dhcp snooping database update-freq
Parameters
seconds—Specifies the update frequency in seconds. (Range: 600–86400)
Default Configuration
The default update frequency value is 1200 seconds.
Command Mode
Global Configuration mode
Example
The following example sets the DHCP Snooping binding database file update
frequency to 1 hour.
Console(config)# ip dhcp snooping database update-freq 3600
ip dhcp snooping binding
Use the ip dhcp snooping binding Privileged EXEC mode command to
configure the DHCP Snooping binding database and add binding entries to
the database. Use the no form of this command to delete entries from the
binding database.
Syntax
ip dhcp snooping binding mac-address vlan-id ip-address interface-id expiry
{seconds | infinite}DHCP Snooping and ARP Inspection Commands 573
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\DHCP_Snooping.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
no ip dhcp snooping binding mac-address vlan-id
Parameters
• mac-address— pecifies a MAC address.
• vlan-id—Specifies a VLAN number.
• ip-address—Specifies an IP address.
• interface-id—Specifies an interface ID. The interface ID can be one of
the following types: Ethernet port or Port-channel.
• expiry seconds—Specifies the time interval, in seconds, after which the
binding entry is no longer valid. (Range: 10–4294967295)
• expiry infinite—Specifies infinite lease time.
Default Configuration
No static binding exists.
Command Mode
Privileged EXEC mode
User Guidelines
After entering this command, an entry is added to the DHCP Snooping
database. If the DHCP Snooping binding file exists, the entry is also added to
that file.
The entry is displayed in the show commands as a DHCP Snooping entry.
The user cannot delete dynamic temporary entries for which the IP address is
0.0.0.0.
Example
The following example adds a binding entry to the DHCP Snooping binding
database.
Console# ip dhcp snooping binding 0060.704C.73FF 23 176.10.1.1
ethernet 1/5 expiry 900574 DHCP Snooping and ARP Inspection Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\DHCP_Snooping.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
clear ip dhcp snooping database
Use the clear ip dhcp snooping database Privileged EXEC mode command
to clear the DHCP Snooping binding database.
Syntax
clear ip dhcp snooping database
Command Mode
Privileged EXEC mode
Example
The following example clears the DHCP Snooping binding database.
Console# clear ip dhcp snooping database
show ip dhcp snooping
Use the show ip dhcp snooping EXEC mode command to display the DHCP
snooping configuration for all interfaces or for a specific interface.
Syntax
show ip dhcp snooping [interface-id]
Parameters
interface-id—Specifies an interface ID. The interface ID can be one of the
following types: Ethernet port or Port-channel.
Command Mode
EXEC mode
Example
The following example displays the DHCP snooping configuration.
console# show ip dhcp snooping
DHCP snooping is EnabledDHCP Snooping and ARP Inspection Commands 575
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\DHCP_Snooping.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
DHCP snooping is configured on following VLANs: 21
DHCP snooping database is Enabled
Relay agent Information option 82 is Enabled
Option 82 on untrusted port is allowed
Verification of hwaddr field is Enabled
DHCP snooping file update frequency is configured to: 6666 seconds
Interface Trusted
----------- ------------
gi1/0/1 Yes
gi1/0/2 Yes
show ip dhcp snooping binding
Use the show ip dhcp snooping binding User EXEC mode command to
display the DHCP Snooping binding database and configuration information
for all interfaces or for a specific interface.
Syntax
show ip dhcp snooping binding [mac-address mac-address] [ip-address ipaddress] [vlan vlan-id] [interface-id]
Parameters
• mac-address mac-address—Specifies a MAC address.
• ip-address ip-address—Specifies an IP address.
• vlan vlan-id—Specifies a VLAN ID.
• interface-id—Specifies an interface ID. The interface ID can be one of
the following types: Ethernet port or Port-channel.
Command Mode
User EXEC mode576 DHCP Snooping and ARP Inspection Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\DHCP_Snooping.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
The following examples displays the DHCP snooping binding database and
configuration information for all interfaces on a device.
ip arp inspection
Use the ip arp inspection Global Configuration mode command globally to
enable Address Resolution Protocol (ARP) inspection. Use the no form of this
command to disable ARP inspection.
Syntax
ip arp inspection
no ip arp inspection
Default Configuration
ARP inspection is disabled.
Command Mode
Global Configuration mode
User Guidelines
Note that if a port is configured as an untrusted port, then it should also be
configured as an untrusted port for DHCP Snooping, or the IP-address-MACaddress binding for this port should be configured statically. Otherwise, hosts
that are attached to this port cannot respond to ARPs.
Console# show ip dhcp snooping binding
Update frequency: 1200
Total number of binding: 2
Mac Address
------------
0060.704C.73
FF
0060.704C.7B
C1
IP Address
----------
10.1.8.1
10.1.8.2
Lease
(sec)
-------
7983
92332
Type
--------
snooping
snooping
(s)
VLAN
----
3
3
Interface
---------
1/21
1/22DHCP Snooping and ARP Inspection Commands 577
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\DHCP_Snooping.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
The following example enables ARP inspection on the device.
Console(config)# ip arp inspection
ip arp inspection vlan
Use the ip arp inspection vlan Global Configuration mode command to
enable ARP inspection on a VLAN, based on the DHCP Snooping database.
Use the no form of this command to disable ARP inspection on a VLAN.
Syntax
ip arp inspection vlan vlan-id
no ip arp inspection vlan vlan-id
Parameters
vlan-id—Specifies the VLAN ID.
Default Configuration
DHCP Snooping based ARP inspection on a VLAN is disabled.
Command Mode
Global Configuration mode
User Guidelines
This command enables ARP inspection on a VLAN based on the DHCP
snooping database. Use the ip arp inspection list assign Global
Configuration mode command to enable static ARP inspection.
Example
The following example enables DHCP Snooping based ARP inspection on
VLAN 23.
Console(config)# ip arp inspection vlan 23578 DHCP Snooping and ARP Inspection Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\DHCP_Snooping.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
ip arp inspection trust
Use the ip arp inspection trust Interface Configuration (Ethernet, Portchannel) mode command to configure an interface trust state that
determines if incoming Address Resolution Protocol (ARP) packets are
inspected. Use the no form of this command to restore the default
configuration.
Syntax
ip arp inspection trust
no ip arp inspection trust
Default Configuration
The interface is untrusted.
Command Mode
Interface Configuration (Ethernet, Port-channel) mode
User Guidelines
The device does not check ARP packets that are received on the trusted
interface; it only forwards the packets.
For untrusted interfaces, the device intercepts all ARP requests and
responses. It verifies that the intercepted packets have valid IP-to-MAC
address bindings before updating the local cache and before forwarding the
packet to the appropriate destination. The device drops invalid packets and
logs them in the log buffer according to the logging configuration specified
with the ip arp inspection log-buffer vlan Global Configuration mode
command.
Example
The following example configures gigabitethernet port 1/0/3 as a trusted
interface.
Console(config)# interface gi1/0/3
Console(config-if)# ip arp inspection trustDHCP Snooping and ARP Inspection Commands 579
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\DHCP_Snooping.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
ip arp inspection validate
Use the ip arp inspection validate Global Configuration mode command to
perform specific checks for dynamic Address Resolution Protocol (ARP)
inspection. Use the no form of this command to restore the default
configuration.
Syntax
ip arp inspection validate
no ip arp inspection validate
Default Configuration
ARP inspection validation is disabled.
Command Mode
Global Configuration mode
User Guidelines
The following checks are performed:
• Source MAC address: Compares the source MAC address in the Ethernet
header against the sender MAC address in the ARP body. This check is
performed on both ARP requests and responses.
• Destination MAC address: Compares the destination MAC address in the
Ethernet header against the target MAC address in the ARP body. This
check is performed for ARP responses.
• IP addresses: Compares the ARP body for invalid and unexpected IP
addresses. Addresses include 0.0.0.0, 255.255.255.255, and all IP multicast
addresses.
Example
The following example executes ARP inspection validation.
Console(config)# ip arp inspection validate580 DHCP Snooping and ARP Inspection Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\DHCP_Snooping.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
ip arp inspection list create
Use the ip arp inspection list create Global Configuration mode command to
create a static ARP binding list and enters the ARP list configuration mode.
Use the no form of this command to delete the list.
Syntax
ip arp inspection list create name
no ip arp inspection list create name
Parameters
name—Specifies the static ARP binding list name. (Length: 1–32 characters)
Default Configuration
No static ARP binding list exists.
Command Mode
Global Configuration mode
User Guidelines
Use the ip arp inspection list assign command to assign the list to a VLAN.
Example
The following example creates the static ARP binding list ‘servers’ and enters
the ARP list configuration mode.
Console(config)# ip arp inspection list create servers
Console(config-ARP-list)#
ip mac
Use the ip mac ARP-list Configuration mode command to create a static ARP
binding. Use the no form of this command to delete a static ARP binding.
Syntax
ip ip-address mac mac-addressDHCP Snooping and ARP Inspection Commands 581
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\DHCP_Snooping.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
no ip ip-address mac mac-address
Parameters
• ip-address—Specifies the IP address to be entered to the list.
• mac-address—Specifies the MAC address associated with the IP address.
Default Configuration
No static ARP binding is defined.
Command Mode
ARP-list Configuration mode
Example
The following example creates a static ARP binding.
Console(config)# ip arp inspection list create servers
Console(config-ARP-list)# ip 172.16.1.1 mac 0060.704C.7321
Console(config-ARP-list)# ip 172.16.1.2 mac 0060.704C.7322
ip arp inspection list assign
Use the ip arp inspection list assign Global Configuration mode command to
assign a static ARP binding list to a VLAN. Use the no form of this command
to delete the assignment.
Syntax
ip arp inspection list assign vlan-id name
no ip arp inspection list assign vlan
Parameters
• vlan-id—Specifies the VLAN ID.
• name—Specifies the static ARP binding list name.
Default Configuration
No static ARP binding list assignment exists.582 DHCP Snooping and ARP Inspection Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\DHCP_Snooping.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Command Mode
Global Configuration mode
Example
The following example assigns the static ARP binding list Servers to VLAN
37.
Console(config)# ip arp inspection list assign 37 servers
ip arp inspection logging interval
Use the ip arp inspection logging interval Global Configuration mode
command to set the minimum time interval between successive ARP
SYSLOG messages. Use the no form of this command to restore the default
configuration.
Syntax
ip arp inspection logging interval {seconds | infinite}
no ip arp inspection logging interval
Parameters
• seconds—Specifies the minimum time interval between successive ARP
SYSLOG messages. A 0 value means that a system message is immediately
generated. (Range: 0–86400)
• infinite—Specifies that SYSLOG messages are not generated.
Default Configuration
The default minimum ARP SYSLOG message logging time interval is 5
seconds.
Command Mode
Global Configuration modeDHCP Snooping and ARP Inspection Commands 583
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\DHCP_Snooping.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
The following example sets the minimum ARP SYSLOG message logging
time interval to 60 seconds.
Console(config)# ip arp inspection logging interval 60
show ip arp inspection
Use the show ip arp inspection EXEC mode command to display the ARP
inspection configuration for all interfaces or for a specific interface.
Syntax
show ip arp inspection [interface-id]
Parameters
interface-id—Specifies an interface ID. The interface ID can be one of the
following types:Ethernet port or Port-channel.
Command Mode
EXEC mode
Example
The following example displays the ARP inspection configuration.
console# show ip arp inspection
IP ARP inspection is Enabled
IP ARP inspection is configured on following VLANs: 1
Verification of packet header is Enabled
IP ARP inspection logging interval is: 222 seconds
Interface Trusted
----------- -----------
gi1/0/1 Yes
gi1/0/2 Yes584 DHCP Snooping and ARP Inspection Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\DHCP_Snooping.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
show ip arp inspection list
Use the show ip arp inspection list Privileged EXEC mode command to
display the static ARP binding list.
Syntax
show ip arp inspection list
Command Mode
Privileged EXEC mode
Example
The following example displays the static ARP binding list.
show ip arp inspection statistics
Use the show ip arp inspection statistics EXEC command to display
Statistics For The Following Types Of Packets That Have Been Processed By
This Feature: Forwarded, Dropped, IP/MAC Validation Failure.
Syntax
show ip arp inspection statistics [vlan vlan-id]
Parameters
vlan-id—Specifies VLAN ID.
Console# show ip arp inspection list
List name: servers
Assigned to VLANs: 1,2
IP
---------
172.16.1.1
172.16.1.2
ARP
--------------
0060.704C.7322
0060.704C.7322DHCP Snooping and ARP Inspection Commands 585
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\DHCP_Snooping.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Command Mode
EXEC mode
User Guidelines
To clear ARP Inspection counters use the clear ip arp inspection statistics
CLI command. Counters values are kept when disabling the ARP Inspection
feature.
Example
console# show ip arp inspection statistics
Vlan Forwarded Packets Dropped Packets IP/MAC Failures
---- -----------------------------------------------
2 1500100 80
clear ip arp inspection statistics
Use the clear ip arp inspection statistics Privileged EXEC mode command to
clear statistics ARP Inspection statistics globally.
Syntax
clear ip arp inspection statistics [vlan vlan-id]
Parameters
vlan-id—Specifies VLAN ID
Command Mode
Privileged EXEC mode
Example
console# clear ip arp inspection statistics586 DHCP Snooping and ARP Inspection Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\DHCP_Snooping.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
ip dhcp information option
Use the ip dhcp information option Global Configuration command to
enable DHCP option-82 data insertion. Use the no form of this command to
disable DHCP option-82 data insertion.
Syntax
ip dhcp information option
no ip dhcp information option
Parameters
This command has no arguments or keywords.
Default Configuration
DHCP option-82 data insertion is disabled.
Command Mode
Global Configuration mode
User Guidelines
DHCP option 82 would be enabled only if DHCP snooping or DHCP relay
are enabled.
Example
console(config)# ip dhcp information option
show ip dhcp information option
The show ip dhcp information option EXEC mode command displays the
DHCP Option 82 configuration.
Syntax
show ip dhcp information optionDHCP Snooping and ARP Inspection Commands 587
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\DHCP_Snooping.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Command Mode
EXEC mode
Example
The following example displays the DHCP Option 82 configuration.
console# show ip dhcp information option
Relay agent Information option is Enabled588 DHCP Snooping and ARP Inspection Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\DHCP_Snooping.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LYiSCSI Commands 589
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\iSCSI.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
37
iSCSI Commands
iscsi enable
Use the iscsi enable Global Configuration mode command to globally enable
Internet Small Computer System Interface (iSCSI) awareness. This
command changes the Flow Control global mode to receive-only, enables
Flow Control on all interfaces, and enables jumbo frames.
Use the no form of this command to globally disable iSCSI awareness. This
version of the command does not affect the Flow Control global mode, does
not disable Flow Control on all interfaces, and does not disable jumbo
frames.
Syntax
iscsi enable
no iscsi enable
Default Configuration
Disabled.
Command Mode
Global Configuration mode
User Guidelines
An iSCSI VLAN must be configured by using the iscsi vlan command before
the device can assign a specific VLAN to iSCSI flows.
When executing the no iscsi enable command, iSCSI resources (TCAM) are
released.590 iSCSI Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\iSCSI.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
The following example enables iSCSI awareness globally.
Console(config)# iscsi enable
iscsi target port
Use the iscsi target port Global Configuration mode command to configures
iSCSI target ports. Use the no form of this command to delete the iSCSI
target ports.
Syntax
iscsi target port tcp-port-1 [tcp-port-2.… tcp-port-8] [address ip-address]
[name targetname]
no iscsi target port tcp-port-1 [tcp-port-2.… tcp-port-8] [address ipaddress]
Parameters
• tcp-port—Specifies the TCP port number or list of TCP port numbers on
which iSCSI targets listen to requests. Up to 8 TCP ports can be defined in
the system, in one command or by using multiple commands. (Range:
1–65536)
• address ip-address—Specifies the iSCSI target IP address. If the no form is
used and the TCP port to be deleted is one that was bound to a specific IP
address, the IP address field must be present.
• name targetname—Specifies the iSCSI target name. The name can be
statically configured, but it can also be obtained from iSNS or from the
sendTargets response. The initiator must present both its iSCSI Initiator
Name and the iSCSI Target Name to which it wishes to connect in the first
login request of a new session or connection. The name must comprise
valid characters, as specified by RFC 3722. (Length: 1–223 characters)
Default Configuration
iSCSI well-known ports 3260 and 860 are configured as the default target
ports, but they can be removed just as any other configured target.iSCSI Commands 591
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\iSCSI.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Command Mode
Global Configuration mode
User Guidelines
When working with private iSCSI ports (not IANA assigned iSCSI ports 3260
and 860), it is recommended that the target IP address also be specified, so
that the device snoops only frames for which its TCP destination port is one
of the configured TCP ports and their destination IP is the target's IP address.
In this way, the CPU is not falsely loaded by non-iSCSI flows if other
applications choose to use these un-reserved ports.
It is the user’s responsibility to not define as iSCSI ports any ports that are
well-known or are configured on the product for other uses, such as Telnet,
SSH, HTTP, HTTPS, SNMP, or DHCP.
To bind a port to an IP address, and the port is already defined but not bound
to an IP address, first remove the port by using the no form of the command
and then add it again with the relevant IP address.
Target names are displayed only when using the show iscsi command. These
names are not used to match (or to perform any sanity check on) the iSCSI
session information acquired by snooping.
A maximum of 16 TCP ports can be configured either bound to IP or not.
This number can be changed by using the iscsi max target ports command.
However, the change takes effect only after reset.
Example
The following example configures an iSCSI target port.
Console(config)# iscsi target port 30001 address 176.16.1.1
name iqn.1993-11.com.diskvendor:diskarrays.sn.45678.tape:sys1.xyz
iscsi cos
Use the iscsi cos Global Configuration mode command to set the quality of
service profile to apply to iSCSI flows. Use the no form of this command to
restore the default configuration.592 iSCSI Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\iSCSI.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Syntax
iscsi cos enable
iscsi cos disable
iscsi cos {vpt vpt | dscp dscp} [remark]
Parameters
• enable – enables iSCSI CoS
• vpt —Specifies the VLAN Priority Tag (VPT) that iSCSI frames are
assigned. (Range: 0–7)
• dscp —Specifies the Differentiated Services Code Point (DSCP) that
iSCSI frames are assigned. (Range: 0–63)
• remark—Marks the iSCSI frames with the configured VPT or DSCP when
egressing the switch.
Default Configuration
iSCSI COS is disabled by default, the default profile is VPT 5.
Command Mode
Global Configuration mode
User Guidelines
The iscsi cos enable command is used to enable an iSCSI CoS profile
(whether the default profile or one configured by using the iscsi cos vpt/dscp
command).
When executing the iscsi cos disable command, iSCSI CoS configuration is
not deleted.
Use the Remark option to prioritize iSCSI traffic in the next hop switch,
which might be iSCSI-unaware.
iSCSI flows are assigned by default with a VPT/DSCP that is mapped to the
highest queue not used for stack management or voice VLAN (if the mapping
was not changed by the user). The user should also configure the relevant (vpt
to queue/dscp to queue) table to complete the setting.
Setting the VPT/DSCP sets the QoS profile that determines the egress queue
to which the frame is mapped. The switch default setting for egress queues iSCSI Commands 593
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\iSCSI.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
scheduling is strict priority. The downside of strict priority queuing is that in
certain circumstances (heavy high priority traffic), lower priority traffic may
become bandwidth-starved. In WRR, the queue to which the flow is assigned
can be set to get the required percentage. The user may want to complete the
QoS setting by configuring the relevant ports to work in WRR mode with
adequate weights.
Example
The following example sets the QoS profile to apply to iSCSI flows by
assigning iSCSI frames with DSCP 31.
Console(config)# iscsi cos enable
Console(config)# iscsi cos dscp 31
iscsi aging-time
Use the iscsi aging-time Global Configuration mode command to set the idle
time interval for iSCSI sessions. Use the no form of this command. to cancel
iSCSI session aging.
Syntax
iscsi aging-time minutes
no iscsi aging-time
Parameters
minutes—Specifies the iSCSI session idle time interval in minutes before the
session is terminated. (Minimum: 1 minute)
Default Configuration
The default idle time interval for iSCSI sessions is 120 minutes.
Command Mode
Global Configuration mode
User Guidelines
iSCSI session aging time may be longer than the defined aging time. This is
due to a lack of ASIC counters used by the application for aging.594 iSCSI Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\iSCSI.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
When changing the iSCSI session aging time, the following occurs:
• If the aging time is increased, the aging time for the current session is
recalculated and increased by the difference between the new aging time
and the current aging time.
• If the aging time is decreased, the aging time for the current session is
recalculated and decreased by the difference between the new aging time
and the current aging time. If, after recalculation, it is determined that the
current session idle time is greater than the new aging time, the session is
immediately terminated.
Example
The following example sets the aging time for iSCSI sessions to 10 minutes.
Console(config)# iscsi aging-time 10
iscsi max-tcp-connections
To set the maximum number of iSCSI sessions that can be supported use the
iscsi max-tcp-connections command in global configuration mode. To return
to default, use the no form of this command.
Syntax
iscsi max-tcp-connections max-connections
no iscsi max-tcp-connections
Parameters
max-connections—Specifies the maximum number of iSCSI connections
that can be supported. (5-1024 )
Default Configuration
256 TCP connections
Command Mode
Global Configuration modeiSCSI Commands 595
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\iSCSI.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
User Guidelines
The new setting will take affect only after reset.
This command enables the user to define the number of iSCSI connections
supported in the system.
The amount of iSCSI sessions has effect on the system memory
consumption. The memory consumption is ~500 bytes per session and 20
bytes per connection (256 sessions each with 4 connections consumes
~145KB). In the current implementation, if more than 1024 connections
exist, you will still get QoS, but only 1024 connections will be displayed
show iscsi
Use the show iscsi Privileged EXEC mode command to display the iSCSI
configuration.
Syntax
show iscsi
Command Mode
Privileged EXEC mode
User Guidelines
The iSCSI targets displayed are the statically configured targets only.
To display all iSCSI entities (targets and initiators), whether statically
configured or dynamically discovered, use the show iscsi sessions command.596 iSCSI Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\iSCSI.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
The following example display the iSCSI configuration.
show iscsi sessions
Use the show iscsi sessions Privileged EXEC mode command to display the
iSCSI sessions.
Syntax
show iscsi sessions [detailed]
Parameters
detailed—Specifies that the displayed list is detailed.
Command Mode
Privileged EXEC mode
Console# show iscsi
iSCSI disabled
iSCSI COS disabled
iSCSI vpt is 5, Remark
iSCSI aging time: 5 min.
Maximum number of connections: 256
iSCSI targets and TCP ports:
----------------------------
TCP Target IP Name
Port Address
--------- ------------------ --------------------
860 0.0.0.0
3260 0.0.0.0
9876 0.0.0.0
20002 0.0.0.0
20003 0.0.0.0
25555 0.0.0.0iSCSI Commands 597
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\iSCSI.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
User Guidelines
The target list is not sorted alphabetically.
The aging mechanism checks session activity in a group of N TCP iSCSI
connections. In the worst case, if all 256 sessions are monitored and are not
terminated gracefully, the existing mechanism causes inaccuracies; the last
group of monitored iSCSI sessions are aged out after (256/N)*aging-time.
In general, the higher the number of ungraceful terminated iSCSI TCP
connections, the higher the aging-time inaccuracy.
Example
The following example displays the iSCSI sessions
Console# show iscsi sessions
Target: iqn.1993-11.com.disk-vendor:diskarrays.sn.45678
--------------------------------------------------------
Initiator: iqn.1992-04.com.os-vendor.plan9:cdrom.12
ISID: 11
Initiator: iqn.1995-05.com.os-vendor.plan9:cdrom.10
ISID: 222
----------------------------------------------------------
Target: iqn.103-1.com.storagevendor:sn.43338.storage.tape:sys1.xyz
----------------------------------------------------------
Initiator: iqn.1992-04.com.os-vendor.plan9:cdrom.12
ISID: 44
Initiator: iqn.1995-05.com.os-vendor.plan9:cdrom.10
ISID: 65
----------------------------------------------------------
Console# show iscsi sessions detailed
Target: iqn.1993-11.com.disk-vendor:diskarrays.sn.45678
----------------------------------------------------------
Session 1:
---------598 iSCSI Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\iSCSI.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Initiator: iqn.1992-04.com.osvendor.plan9:cdrom.12.storage:sys1.xyz
UP Time: 02:10:45 (DD:HH:MM)
Time for aging out: 10 min
ISID: 11
Initiator
IP Address
----------
172.16.1.3
172.16.1.4
172.16.1.5
Initiator
TCP Port
---------
49154
49155
49156
Target
IP Address
-----------
172.16.1.20
172.16.1.21
172.16.1.22
Target
IP Port
-------
30001
30001
30001
Session 2:
---------
Initiator: iqn.1995-05.com.os-vendor.plan9:cdrom.10
Status: Active
UP Time: 00:04:50 (DD:HH:MM)
Time for aging out: 2 min
ISID: 22
Initiator
IP Address
----------
172.16.1.30
172.16.1.40
Initiator
TCP Port
---------
49200
49201
Target
IP Address
----------
172.16.1.20
172.16.1.21
Target
IP Port
-------
30001
30001IP Addressing Commands 599
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\IP_Addressing.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
38
IP Addressing Commands
address
Use the ip address Interface Configuration (Ethernet, VLAN, Port-channel)
mode command to define an IP address for an interface. Use the no form of
this command to remove an IP address definition.
Syntax
If the product is a switch router.
ip address ip-address {mask | prefix-length}
no ip address [ip-address]
If the product is a switch only.
ip address ip-address {mask | prefix-length} [default-gateway ip-address]
no ip address [ip-address]
If the product is switch only and supports a single IP address:
ip address ip-address {mask | prefix-length} [default-gateway ip-address]
no ip address
Parameters
• ip-address—Specifies the IP address.
• mask—Specifies the network mask of the IP address.
• prefix-length—Specifies the number of bits that comprise the IP address
prefix.The prefix length must be preceded by a forward slash (/). (Range:
8–30)
• default-gateway ip-address—Specifies the default gateway IP address.600 IP Addressing Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\IP_Addressing.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Default Configuration
No IP address is defined for interfaces.
Command Mode
Interface Configuration (Ethernet, VLAN, Port-channel) mode. It cannot be
configured for a range of interfaces (range context).
User Guidelines
Defining a static IP address on an interface implicitly removes the DHCP
client configuration on the interface.
If the product supports multiple IP addresses:
The product supports up to x IP addresses. The IP addresses should be
from different IP subnets. When adding an IP address from a subnet that
already exists in the list, the new IP address replaces the existing IP address
from that subnet.
If the product is switch only and supports a single IP address.
If the IP address configured in global context then it would be bound to the
currently defined management interface. If the management interface is
Default VLAN and the VID of the default VLAN is changed then when new
setting is applied, the IP address will be automatically redefined on the new
Default VLAN.
If the IP address is configured in Interface context then the IP address is
bound to the interface in context.
If a static IP address is already defined, the user must do no IP address in the
relevant interface context before changing the IP address.
If a dynamic IP address is already defined, the user must do no ip address in
the relevant interface context before configuring another dynamic IP address.
The Interface context could be a port, LAG or VLAN, depending on support
that is defined for the product.
Example
The following example configures VLAN 1 with IP address 131.108.1.27 and
subnet mask 255.255.255.0.
Console(config)# interface vlan 1IP Addressing Commands 601
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\IP_Addressing.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Console(config-if)# ip address 131.108.1.27 255.255.255.0
ip address dhcp
Use the ip address dhcp Interface Configuration (Ethernet, VLAN, Portchannel) mode command to acquire an IP address for an Ethernet interface
from the Dynamic Host Configuration Protocol (DHCP) server. Use the no
form of this command to release an acquired IP address.
Syntax
ip address dhcp
no ip address dhcp
Parameters
No parameters
Command Mode
Interface Configuration (Ethernet, VLAN, Port-channel) mode. It cannot be
configured for a range of interfaces (range context).
User Guidelines
The ip address dhcp command allows any interface to dynamically learn its
IP address by using the DHCP protocol.
DHCP client configuration on an interface implicitly removes the static IP
address configuration on the interface.
If the device is configured to obtain its IP address from a DHCP server, it
sends a DHCPDISCOVER message to provide information about itself to the
DHCP server on the network.
If the ip address dhcp command is used with or without the optional
keyword, the DHCP option 12 field (host name option) is included in the
DISCOVER message. By default, the host name specified in the option 12
field is the globally configured device host name.
The no ip address dhcp command releases any IP address that was acquired,
and sends a DHCPRELEASE message.602 IP Addressing Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\IP_Addressing.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
The following example acquires an IP address for gigabitethernet port
1/0/16 from DHCP.
Console(config)# interface gi1/0/16
Console(config-if)# ip address dhcp
renew dhcp
Use the renew dhcp Privileged EXEC mode command to renew an IP address
that was acquired from a DHCP server for a specific interface.
Syntax
renew dhcp { interface-id} [force-autoconfig]
Parameters
interface-id—Specifies an interface ID. The interface ID can be one of the
following types: Ethernet port, Port-channel or VLAN.
force-autoconfig - In the case the DHCP server holds a DHCP option 67
record for the assigned IP address, the file would overwrite the existing device
configuration
Command Mode
Privileged EXEC mode
User Guidelines
Note that this command does not enable DHCP on an interface. If DHCP is
not enabled on the requested interface, the command returns an error
message.
If DHCP is enabled on the interface and an IP address was already acquired,
the command tries to renew that IP address.
If DHCP is enabled on the interface and an IP address has not yet been
acquired, the command initiates a DHCP request.IP Addressing Commands 603
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\IP_Addressing.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
The following example renews an IP address that was acquired from a DHCP
server for VLAN 19.
Console# renew dhcp vlan 19
ip default-gateway
The ip default-gateway Global Configuration mode command defines a
default gateway (device). Use the no form of this command to restore the
default configuration.
Syntax
ip default-gateway ip-address
no ip default-gateway
Parameters
ip-address—Specifies the default gateway IP address.
Command Mode
Global Configuration mode
Default Configuration
No default gateway is defined.
Example
The following example defines default gateway 192.168.1.1.
Console(config)# ip default-gateway 192.168.1.1
show ip interface
Use the show ip interface EXEC mode command to display the usability
status of configured IP interfaces.604 IP Addressing Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\IP_Addressing.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Syntax
show ip interface [interface-id ]
Parameters
interface-id—Specifies an interface ID. The interface ID can be one of the
following types: Ethernet port, Port-channel or VLAN.
Command Mode
EXEC mode
Example
The following example displays the configured IP interfaces and their types.
console# show ip interface
IP Address I/F Type Directed Precedence Status
Broadcast
------------- ------ ------- -------- ---------- -------
10.5.234.232/24 vlan 1 Static disable No Valid
arp
Use the arp Global Configuration mode command to add a permanent entry
to the Address Resolution Protocol (ARP) cache. Use the no form of this
command to remove an entry from the ARP cache.
Syntax
arp ip-address mac-address [interface-id]]
no arp ip-address
Parameters
• ip-address—IP address or IP alias to map to the specified MAC address.
• mac-address—MAC address to map to the specified IP address or IP alias.
• interface-id—interface ID. Can be Ethernet port, Port-channel or VLAN.IP Addressing Commands 605
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\IP_Addressing.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Command Mode
Global Configuration mode
Default Configuration
No permanent entry is defined.
User Guidelines
The software uses ARP cache entries to translate 32-bit IP addresses into 48-
bit hardware (MAC) addresses. Because most hosts support dynamic address
resolution, static ARP cache entries generally do not need to be specified.
Example
The following example adds IP address 198.133.219.232 and MAC address
00:00:0c:40:0f:bc to the ARP table.
Console(config)# arp 198.133.219.232 00:00:0c:40:0f:bc
ethernet 1/6
arp timeout (Global)
Use the arp timeout Global Configuration mode command to set the time
interval during which an entry remains in the ARP cache. Use the no form of
this command to restore the default configuration.
Syntax
arp timeout seconds
no arp timeout
Parameters
seconds—Specifies the time interval (in seconds) during which an entry
remains in the ARP cache.
(Range: 1–40000000)
Default Configuration
The default ARP timeout is 60000 seconds in Router mode, and 300 seconds
in Switch mode.606 IP Addressing Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\IP_Addressing.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Command Mode
Global Configuration mode
Example
The following example configures the ARP timeout to 12000 seconds.
Console(config)# arp timeout 12000
arp timeout
Use the arp timeout inTerface Configuration command to configure how
long an entry remains in the ARP cache for specific interface. Use the no form
of this command restore the default value.
Syntax
arp timeout seconds
no arp timeout
Parameters
seconds—Time (in seconds) that an entry remains in the ARP cache. It is
recommended not to set it to less than 3600. (Range: 1–40000000)
Default
Defined by the arp timeout Global Configuration command
Command Mode
Interface Configuration (Ethernet, VLAN, Port-channel) mode. It cannot be
configured for a range of interfaces (range context).
User Guidelines
This configuration can be applied only if at least one IP address defined on
specific interface.
Example
Console (config)# interface vlan 1
Console(config-if)# arp timeout 12000IP Addressing Commands 607
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\IP_Addressing.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
ip arp proxy disable
Use the ip arp proxy disable Global Configuration mode command to
globally disable proxy Address Resolution Protocol (ARP). Use the no form of
this command reenable proxy ARP.
Syntax
ip arp proxy disable
no ip arp proxy disable
Parameters
This command has no arguments or key words.
Default
Enabled by default.
Command Mode
Global Configuration mode
User Guidelines
The ip arp proxy disable command overrides any proxy ARP interface
configuration.
ip proxy-arp
Use the ip proxy-arp Interface Configuration mode command to enable an
ARP proxy on specific interfaces. Use the no form of this command disable it.
Syntax
ip proxy-arp
no ip proxy-arp
Default Configuration
ARP Proxy is disabled.608 IP Addressing Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\IP_Addressing.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Command Mode
Interface Configuration (Ethernet, VLAN, Port-channel) mode. It cannot be
configured for a range of interfaces (range context).
User Guidelines
This configuration can be applied only if at least one IP address is defined on
a specific interface.
Example
The following example enables the ARP proxy.
Console(config-if)# ip proxy-arp
clear arp-cache
Use the clear arp-cache Privileged EXEC mode command to delete all
dynamic entries from the ARP cache.
Syntax
clear arp-cache
Command Mode
Privileged EXEC mode
Example
The following example deletes all dynamic entries from the ARP cache.
Console# clear arp-cache
show arp
Use the show arp Privileged EXEC mode command to display entries in the
ARP table.
Syntax
show arp [ip-address ip-address] [mac-address mac-address] [interface-id]IP Addressing Commands 609
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\IP_Addressing.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Parameters
• ip-address ip-address—Specifies the IP address.
• mac-address mac-address—Specifies the MAC address.
• interface-id_Specifies an interface ID. The interface ID can be one of the
following types: Ethernet port or Port-channel.
Command Mode
Privileged EXEC mode
User Guidelines
Since the associated interface of a MAC address can be aged out from the
FDB table, the Interface field can be empty.
If an ARP entry is associated with an IP interface that is defined on a port or
port-channel, the VLAN field is empty.
Example
The following example displays entries in the ARP table.
show arp configuration
Use the show arp configuration privileged EXEC command to display the
global and interface configuration of the ARP protocol.
Syntax
show arp configuration
Console# show arp
ARP timeout: 80000 Seconds
VLAN
-------
VLAN 1
VLAN 1
Interface
---------
gi1/0/1
gi1/0/2
IP Address
----------
10.7.1.102
10.7.1.135
HW Address
-------------
00:10:B5:04:DB:4B
00:50:22:00:2A:A4
Status
-------
Dynamic
Static610 IP Addressing Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\IP_Addressing.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Parameters
This command has no arguments or key words.
Command Mode
Privileged EXEC mode
Example
Console# show arp configuration
Global configuration:
ARP Proxy: enabled
ARP timeout: 80000 Seconds
Interface configuration:
g2:
ARP Proxy: disabled
ARP timeout:60000 Seconds
VLAN 1:
ARP Proxy: enabled
ARP timeout:70000 Seconds
VLAN 2:
ARP Proxy: enabled
ARP timeout:80000 Second (Global)
interface ip
Use the interface ip Global Configuration mode command to enter the IP
Interface Configuration mode.
Syntax
interface ip ip-address
Parameters
ip-address—Specifies one of the IP addresses of the device.IP Addressing Commands 611
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\IP_Addressing.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Command Mode
Global Configuration mode
Example
The following example enters the IP interface configuration mode.
Console (config)# interface ip 192.168.1.1
Console (config-ip)#
directed-broadcast
Use the directed-broadcast IP Interface Configuration mode command to
enable the translation of a directed broadcast to physical broadcasts. Use the
no form of this command to disable this function.
Syntax
directed-broadcast
no directed-broadcast
Default Configuration
Translation of a directed broadcast to physical broadcasts is disabled. All IP
directed broadcasts are dropped.
Command Mode
IP Interface Configuration mode
Example
The following example enables the translation of a directed broadcast to
physical broadcasts.
Console (config)# interface ip 192.168.1.1
Console (config-ip)# directed-broadcast612 IP Addressing Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\IP_Addressing.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
broadcast-address
Use the broadcast-address IP Interface Configuration mode command to
define a broadcast address for an interface. Use the no form of this command
to restore the default IP broadcast address.
Syntax
broadcast-address {255.255.255.255 | 0.0.0.0}
no broadcast-address
Parameters
• 255.255.255.255—Specifies 255.255.255.255 as the broadcast address.
• 0.0.0.0—Specifies 0.0.0.0 as the broadcast address.
Default Configuration
The default broadcast address is 255.255.255.255.
Command Mode
IP Interface Configuration mode
Example
The following example enables the translation of a directed broadcast to
physical broadcasts.
Console(config)# interface ip 192.168.1.1
Console(config-ip)# broadcast-address 255.255.255.255
ip helper-address
Use the ip helper-address Global Configuration mode command to enable
the forwarding of User Datagram Protocol (UDP) broadcast packets received
on an interface to a specific (helper) address. Use the no form of this
command to disable the forwarding of broadcast packets to a specific (helper)
address.IP Addressing Commands 613
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\IP_Addressing.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Syntax
ip helper-address {ip-interface | all} address [udp-port-list]
no ip helper-address {ip-interface | all} address
Parameters
• ip-interface—Specifies the IP interface.
• all—Specifies all IP interfaces.
• address—Specifies the destination broadcast or host address to which to
forward UDP broadcast packets. A value of 0.0.0.0 specifies that UDP
broadcast packets are not forwarded to any host.
• udp-port-list—Specifies the destination UDP port number to which to
forward broadcast packets. (Range: 1–65535)
Default Configuration
Forwarding of User Datagram Protocol (UDP) broadcast packets received on
an interface to a specific (helper) address is disabled.
If udp-port-list is not specified, packets for the default services are forwarded
to the helper address.
Command Mode
Global Configuration mode
User Guidelines
The ip helper-address command forwards specific UDP broadcast packets
from one interface to another.
Many helper addresses may be defined. However, the total number of addressport pairs is limited to 128 for the device.
The setting of a helper address for a specific interface has precedence over the
setting of a helper address for all the interfaces.
Forwarding of BOOTP/DHCP (ports 67, 68) cannot be enabled with this
command. Use the DHCP relay commands to relay BOOTP/DHCP packets.
The ip helper-address command specifies a UDP port number to which UDP
broadcast packets with that destination port number are forwarded. By 614 IP Addressing Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\IP_Addressing.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
default, if no UDP port number is specified, the device forwards UDP
broadcast packets for the following six services:
• IEN-116 Name Service (port 42)
• DNS (port 53)
• NetBIOS Name Server (port 137)
• NetBIOS Datagram Server (port 138)
• TACACS Server (port 49)
• Time Service (port 37)
Example
The following example enables the forwarding of User Datagram Protocol
(UDP) broadcasts received on all interfaces to specific UDP ports of a
destination IP address.
Console (config)# ip helper-address all 172.16.9.9 49 53
show ip helper-address
Use the show ip helper-address Privileged EXEC mode command to display
the IP helper addresses configuration on the system.
Syntax
show ip helper-address
Parameters
This command has no arguments or key words.
Command Mode
Privileged EXEC modeIP Addressing Commands 615
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\IP_Addressing.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
The following example displays the IP helper addresses configuration on the
system.
source-precedence
Use the source-precedence IP Interface Configuration mode command to
define a preference for an IP address as a source IP address for DHCP relayed
messages on an interface. Use the no form of this command to restore the
default configuration.
Syntax
source-precedence
no source-precedence
Default Configuration
Source precedence is not defined for the address.
Command Mode
IP Interface Configuration mode
User Guidelines
For relayed DHCP messages, the source IP address selected is:
1. The lowest of the IP addresses defined as source-precedence IP addresses.
2. The lowest of the IP addresses if there are no source-precedence IP
addresses.
Console# show ip helper-address
Interface
------------
192.168.1.1
192.168.2.1
Helper Address
--------------
172.16.8.8
172.16.9.9
Udp ports
------------------------
37, 42, 49, 53, 137, 138
37, 49616 IP Addressing Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\IP_Addressing.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
The following example defines a preference for an IP address as a source IP
address for DHCP relayed messages on an interface.
Console (config-ip)# source-precedence
ip domain lookup
Use the ip domain lookup Global Configuration mode command to enable
the IP Domain Name System (DNS)-based host name-to-address translation.
Use the no form of this command to disable DNS-based host name-toaddress translation.
Syntax
ip domain lookup
no ip domain lookup
Default Configuration
IP Domain Name System (DNS)-based host name-to-address translation is
enabled.
Command Mode
Global Configuration mode
Example
The following example enables IP Domain Name System (DNS)-based host
name-to-address translation.
Console(config)# ip domain lookup
ip domain name
Use the ip domain name Global Configuration mode command to define a
default domain name used by the software to complete unqualified host
names (names without a dotted-decimal domain name). Use the no form of
this command to remove the default domain name.IP Addressing Commands 617
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\IP_Addressing.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Syntax
ip domain name name
no ip domain name
Parameters
name—Specifies the default domain name used to complete unqualified host
names. Do not include the initial period that separates an unqualified name
from the domain name. (Length: 1–158 characters. Maximum label length:
63 characters)
Default Configuration
A default domain name is not defined.
Command Mode
Global Configuration mode
User Guidelines
Domain names and host names are restricted to the ASCII letters A through
Z (case-insensitive), the digits 0 through 9, the underscore and the hyphen. A
period (.) is used to separate labels.
The maximum size of a label is 63 characters. The maximum name size is 158
bytes.
Example
The following example defines the default domain name as
‘www.website.com’.
Console(config)# ip domain name www.website.com
ip name-server
Use the ip name-server Global Configuration mode command to define the
available name servers. Use the no form of this command to remove a name
server.618 IP Addressing Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\IP_Addressing.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Syntax
ip name-server { server1-ipv4-address | server1-ipv6-address} [serveraddress2 … server-address8]
no ip name-server [server-address … server-address8]
Parameters
server-address—IP addresses of the name server. Up to 8 servers can be
defined in one command or by using multiple commands. The IP address can
be IPv4 address or IPv6 address. When the IPv6 address is a Link Local
address (IPv6Z address), the outgoing interface name must be specified.
Refer to the User Guidelines for the interface name syntax.
Default Configuration
No name server IP addresses are defined.
Command Mode
Global Configuration mode
User Guidelines
The preference of the servers is determined by the order in which they were
entered.
Up to 8 servers can be defined using one command or using multiple
commands.
The format of an IPv6Z address is: %
interface-name = vlan | ch | isatap |
| 0
integer = |
decimal-number = 0 | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9
physical-port-name= Designated port number, for example 1/0/16.
If the egress interface is not specified, the default interface is selected.
Specifying interface zone=0 is equal to not defining an egress interface.IP Addressing Commands 619
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\IP_Addressing.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
The following example defines the available name server.
Console(config)# ip name-server 176.16.1.18
ip host
Use the ip host Global Configuration mode command to define the static
host name-to-address mapping in the host cache. Use the no form of this
command to remove the static host name-to-address mapping.
Syntax
ip host name address [address2 address3 address4]
no ip host name
Parameters
• name—Specifies the host name. (Length: 1–158 characters. Maximum
label length: 63 characters)
• address—Specifies the associated IP address. Up to 4 addresses can be
defined.
Default Configuration
No host is defined.
Command Mode
Global Configuration mode
User Guidelines
Host names are restricted to the ASCII letters A through Z (case-insensitive),
the digits 0 through 9, the underscore and the hyphen. A period (.) is used to
separate labels.
Example
The following example defines a static host name-to-address mapping in the
host cache. 620 IP Addressing Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\IP_Addressing.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Console(config)# ip host accounting.website.com 176.10.23.1
clear host
Use the clear host Privileged EXEC mode command to delete entries from
the host name-to-address cache.
Syntax
clear host {name | *}
Parameters
• name—Specifies the host entry to remove. (Length: 1–158 characters.
Maximum label length: 63 characters)
• * —Removes all entries.
Command Mode
Privileged EXEC mode
Example
The following example deletes all entries from the host name-to-address
cache.
Console# clear host *
clear host dhcp
Use the clear host dhcp Privileged EXEC mode command to delete entries
from the host name-to-address mapping received from Dynamic Host
Configuration Protocol (DHCP).
Syntax
clear host dhcp {name | *}
Parameters
• name —Specifies the host entry to remove. (Length: 1–158 characters.
Maximum label length: 63 characters)IP Addressing Commands 621
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\IP_Addressing.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
• *—Removes all entries.
Command Mode
Privileged EXEC mode
User Guidelines
This command deletes the host name-to-address mapping temporarily until
the next refresh of the IP addresses.
Example
The following example deletes all entries from the host name-to-address
mapping received from DHCP.
Console# clear host dhcp *
show hosts
Use the show hosts EXEC mode command to display the default domain
name, the list of name server hosts, the static and the cached list of host
names and addresses.
Syntax
show hosts [name]
Parameters
name—Specifies the host name. (Length: 1–158 characters. Maximum label
length: 63 characters)
Command Mode
EXEC mode622 IP Addressing Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\IP_Addressing.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
The following example displays host information.
Console> show hosts
System name: Device
Default domain is gm.com, sales.gm.com, usa.sales.gm.com(DHCP)
Name/address lookup is enabled
Name servers (Preference order): 176.16.1.18 176.16.1.19
Configured host name-to-address mapping:
Host
-----------------
accounting.gm.com
Addresses
----------------------------
176.16.8.8 176.16.8.9 (DHCP)
2002:0:130F::0A0:1504:0BB4
Host
----------------
www.stanford.edu
Tota
l
----
-
72
Elapse
d
------
-
3
Type
----
IP
Addresses
-------------
171.64.14.203IPv6 Addressing Commands 623
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\IPv6_Addressing.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
39
IPv6 Addressing Commands
ipv6 enable
Use the ipv6 enable Interface Configuration (Ethernet, VLAN, Port-channel)
mode command to enable the IPv6 addressing mode on an interface. Use the
no form of this command to disable the IPv6 addressing mode on an
interface.
Syntax
ipv6 enable [no-autoconfig]
no ipv6 enable
Parameters
no-autoconfig—EnableS processing of IPv6 on an interface without stateless
address autoconfiguration procedure
Default Configuration
IPv6 addressing is disabled.
Unless you are using the no-autoconfig parameter, when the interface is
enabled stateless address autoconfiguration procedure is enabled.
Command Mode
Interface Configuration (Ethernet, VLAN, Port-channel) mode. It cannot be
configured for a range of interfaces (range context).
User Guidelines
The ipv6 enable command automatically configures an IPv6 link-local
unicast address on the interface, while also enabling the interface for IPv6 624 IPv6 Addressing Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\IPv6_Addressing.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
processing. The no ipv6 enable command removes the entire IPv6 interface
configuration.
To enable stateless address autoconfiguration on an enabled IPv6 interface,
use the IPv6 address autoconfig command.
Example
The following example enables VLAN 1 for the IPv6 addressing mode.
Console(config)# interface vlan 1
Console(config-if)# ipv6 enable
ipv6 address autoconfig
Use the ipv6 address autoconfig Interface Configuration mode command to
enable automatic configuration of IPv6 addresses, using stateless
autoconfiguration on an interface. Addresses are configured depending on the
prefixes received in Router Advertisement messages. Use the no form of this
command to disable address autoconfiguration on the interface.
Syntax
ipv6 address autoconfig
no ipv6 address autoconfig
Parameters
Thiis command has no arguments or keywords.
Default Configuration
Address autoconfiguration is enabled on the interface, no addresses are
assigned by default.
Command Mode
Interface Configuration (Ethernet, VLAN, Port-channel) mode. IPv6 Addressing Commands 625
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\IPv6_Addressing.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
User Guidelines
When address autoconfig is enabled, router solicitation ND procedure is
initiated to discover a router and assign IP addresses to the interface, based
on the advertised on-link prefixes.
When disabling address autoconfig, automatically generated addresses that
are assigned to the interface are removed.
The default state of the address autoconfig is enabled. Use the enable ipv6
no-autoconfig command to enable an IPv6 interface without address
autoconfig.
Example
console(config)# interface vlan 1
console(config-if)# ipv6 address autoconfig
ipv6 icmp error-interval
Use the ipv6 icmp error-interval Global Configuration mode command to
configure the rate limit interval and bucket size parameters for IPv6 Internet
Control Message Protocol (ICMP) error messages. Use the no form of this
command to return the interval to its default setting.
Syntax
ipv6 icmp error-interval milliseconds [bucketsize]
no ipv6 icmp error-interval
Parameters
• milliseconds—The time interval between tokens being placed in the
bucket. Each token represents a single ICMP error message. The
acceptable range is from 0–2147483647 with a default of 100 milliseconds.
Setting milliseconds to 0 disables rate limiting. (Range: 0– 2147483647)
• bucketsize—(Optional) The maximum number of tokens stored in the
bucket. The acceptable range is from 1–200 with a default of 10 tokens.626 IPv6 Addressing Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\IPv6_Addressing.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Default Configuration
The default interval is 100ms and the default bucketsize is 10 i.e. 100 ICMP
error messages per second
Command Mode
Global Configuration mode
User Guidelines
To set the average ICMP error rate limit, calculate the interval with the
following formula:
Average Packets Per Second = (1/ interval) * bucket size
Example
console(config)# ipv6 icmp error-interval 123 45
show ipv6 icmp error-interval
Use the show ipv6 error-interval command in the EXEC mode to display the
IPv6 ICMP error interval.
Syntax
show ipv6 icmp error-interval
Command Mode
EXEC mode
Example
Console> show ipv6 icmp error-interval
Rate limit interval: 100 ms
Bucket size: 10 tokensIPv6 Addressing Commands 627
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\IPv6_Addressing.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
ipv6 address
Use the ipv6 address Interface Configuration mode command to configure an
IPv6 address for an interface. Use the no form of this command To remove
the address from the interface.
Syntax
ipv6 address ipv6-address/prefix-length [eui-64] [anycast]
no ipv6 address [ipv6-address/prefix-length] [eui-64]
Parameters
• ipv6-address—Specifies the IPv6 network assigned to the interface. This
argument must be in the form documented in RFC 2373 where the
address is specified in hexadecimal using 16-bit values between colons.
• prefix-length—Specifies the length of the IPv6 prefix. A decimal value
that indicates how many of the high-order contiguous bits of the address
comprise the prefix (the network portion of the address). A slash mark (/)
must precede the decimal.
• eui-64—(Optional) Builds an interface ID in the low order 64 bits of the
IPv6 address based on the interface MAC address.
• anycast—(Optional) Indicates that this address is an anycast address.
• prefix-length—3–128 (64 when the eui-64 parameter is used.
Default Configuration
No IP address is defined for the interface.
Command Mode
Interface configuration (Ethernet, VLAN, Port-channel) mode. It cannot be
configured for a range of interfaces (range context).
User Guidelines
If the value specified for the /prefix-length argument is greater than 64 bits,
the prefix bits have precedence over the interface ID.628 IPv6 Addressing Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\IPv6_Addressing.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Using the no IPv6 address command without arguments removes all manually
configured IPv6 addresses from an interface, including link local manually
configured addresses.
Example
console(config)# interface vlan 1
console(config-if)# ipv6 address 3000::123/64 eui-64 anycast
ipv6 address link-local
Use the ipv6 address link-local command to configure an IPv6 link-local
address for an interface. Use the no form of this command to return to the
default link local address on the interface.
Syntax
ipv6 address ipv6-address/prefix-length link-local
no ipv6 address [ipv6-address/prefix-length link-local]
Parameters
• ipv6-address—Specifies the IPv6 network assigned to the interface.This
argument must be in the form documented in RFC 2373 where the
address is specified in hexadecimals using 16-bit values between colons.
• prefix-length—Specifies the length of the IPv6 prefix. A decimal value
indicates how many of the high-order contiguous bits of the address
comprise the prefix (the network portion of the address). A slash mark (/)
must precede the decimal. Only 64-bit length is supported, according to
IPv6 over Ethernet’s well-known practice
Default Configuration
IPv6 is enabled on the interface, link local address of the interface is
FE80::EUI64 (interface MAC address).
Command Mode
Interface Configuration (Ethernet, VLAN, Port-channel) mode. It cannot be
configured for a range of interfaces (range context).IPv6 Addressing Commands 629
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\IPv6_Addressing.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
User Guidelines
Using the no ipv6 link-local address command removes the manually
configured link local IPv6 address from an interface. Multiple IPv6 addresses
can be configured per interface, but only one link-local address. When the no
ipv6 link-local address command is used, the interface is reconfigured with
the standard link local address (the same IPv6 link-local address that is set
automatically when the enable ipv6 command is used). The system
automatically generates a link-local address for an interface when IPv6
processing is enabled on the interface. To manually specify a link-local
address to be used by an interface, use the ipv6 link-local address command.
The system supports only 64 bits prefix length for link-local addresses.
Example
console(config)# interface vlan 1
console(config-if)# ipv6 address fe80::123/64 link-local
ipv6 unreachables
Use the ipv6 unreachables Interface Configuration mode command to enable
the generation of Internet Control Message Protocol for IPv6 (ICMPv6)
unreachable messages for any packets arriving on a specified interface. Use
the no form of this command To prevent the generation of unreachable
messages.
Syntax
ipv6 unreachables
no ipv6 unreachables
Parameters
This command has no arguments or keywords.
Default Configuration
ICMP unreachable messages are sent by default.
Command Mode
Interface Configuration (Ethernet, VLAN, Port-channel) mode.630 IPv6 Addressing Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\IPv6_Addressing.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
User Guidelines
When ICMP unreachable messages are enabled, when receiving a packet
addressed to one of the interface's IP address with TCP/UDP port not
assigned, the device sends ICMP unreachable messages. Use the no ipv6
unreachables command to disable sending ICMP unreachable messages on
the interface.
Example
console(config)# interface gi1/0/1
console(config-if)# ipv6 unreachables
ipv6 default-gateway
Use the ipv6 default-gateway Global Configuration mode command to
define an IPv6 default gateway. Use the no form of this command To remove
the default gateway.
Syntax
ipv6 default-gateway ipv6-address
no ipv6 default-gateway
Parameters
ipv6-address—Specifies the IPv6 address of the next hop that can be used to
reach that network. When the IPv6 address is a Link Local address (IPv6Z
address), the outgoing interface name must be specified. Refer to the user
guidelines for the interface name syntax.
Default Configuration
No default gateway is defined.
Command Mode
Global Configuration mode
User Guidelines
The format of an IPv6Z address is: %IPv6 Addressing Commands 631
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\IPv6_Addressing.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
interface-name = vlan | ch | |
0
integer = |
decimal-number = 0 | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9
physical-port-name = Designated port number, for example 1/0/16.
Configuring a new default GW without deleting the previous configured
information overwrites the previous configuration. A configured default GW
has a higher precedence over automatically advertised (via router
advertisement message). Precedence takes effect once the configured default
GW is reachable. Reachability state is not verified automatically by the
neighbor discovery protocol. Router reachability can be confirmed by either
receiving Router Advertisement message containing router's MAC address or
manually configured by user using the IPv6 neighbor CLI command. Another
option to force reachability confirmation is to ping the router link-local
address (this will initiate the neighbor discovery process).
If the egress interface is not specified, the default interface is selected.
Specifying interface zone=0 is equal to not defining an egress interface.
Example
console(config)# ipv6 default-gateway fe80::abcd
show ipv6 interface
Use the show ipv6 interface EXEC command mode to display the usability
status of interfaces configured for IPv6.
Syntax
show ipv6 interface [interface-id]
Parameters
interface-id—Specifies an interface ID. The interface ID can be one of the
following types: Ethernet port, Port-channel or VLAN.
Default Configuration
Displays all IPv6 interfaces.632 IPv6 Addressing Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\IPv6_Addressing.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Command Mode
EXEC mode
User Guidelines
Use the show ipv6 neighbors command in the privileged EXEC mode to
display IPv6 neighbor discovery cache information.
Example
Console# show ipv6 interface
Interface IP addresses Type
----------- -------------------------------------- ------------
VLAN 1 4004::55/64 [ANY] manual
VLAN 1 fe80::200:b0ff:fe00:0 linklayer
VLAN 1 ff02::1 linklayer
VLAN 1 ff02::77 manual
VLAN 1 ff02::1:ff00:0 manual
VLAN 1 ff02::1:ff00:1 manual
VLAN 1 ff02::1:ff00:55 manual
Default Gateway IP address Type Interface State
---------------------------- -------- --------- -----
fe80::77 Static VLAN 1 unreachable
fe80::200:cff:fe4a:dfa8 Dynamic VLAN 1 stale
Console# show ipv6 interface Vlan 15
IPv6 is disabled
Console# show ipv6 interface Vlan 1
Number of ND DAD attempts: 1
MTU size: 1500
Stateless Address Autoconfiguration state: enabled
ICMP unreachable message state: enabled
MLD version: 2
IP addresses Type DAD StateIPv6 Addressing Commands 633
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\IPv6_Addressing.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
------------------------------------- --------- -----------
4004::55/64 [ANY] manual Active
fe80::200:b0ff:fe00:0 linklayer Active
ff02::1 linklayer ------
ff02::77 manual ------
ff02::1:ff00:0 manual ------
ff02::1:ff00:1 manual ------
ff02::1:ff00:55 manual ------
show IPv6 route
Use the show ipv6 route command to display the current state of the IPv6
routing table.
Syntax
show ipv6 route
Command Mode
EXEC mode
Example
Console> show ipv6 route
Codes: L - Local, S - Static, I - ICMP, ND - Router Advertisment
The number in the brackets is the metric.
S ::/0 via fe80::77 [0] VLAN 1 Lifetime Infinite
ND ::/0 via fe80::200:cff:fe4a:dfa8 [0] VLAN 1 Lifetime 1784 sec
L 2001::/64 is directly connected, g2 Lifetime Infinite
L 2002:1:1:1::/64 is directly connected, VLAN 1 Lifetime 2147467 sec
L 3001::/64 is directly connected, VLAN 1 Lifetime Infinite
L 4004::/64 is directly connected, VLAN 1 Lifetime Infinite
L 6001::/64 is directly connected, g2 Lifetime Infinite634 IPv6 Addressing Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\IPv6_Addressing.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
ipv6 nd dad attempts
Use the ipv6 nd dad attempts Interface Configuration (Ethernet, VLAN,
Port-channel) mode command to configure the number of consecutive
neighbor solicitation messages that are sent on an interface while Duplicate
Address Detection (DAD) is performed on the unicast IPv6 addresses of the
interface. Use the no form of this command to restore the number of
messages to the default value.
Syntax
ipv6 nd dad attempts attempts
Parameters
attempts—Specifies the number of neighbor solicitation messages. A value of
0 disables DAD processing on the specified interface. A value of 1 configures
a single transmission without follow-up transmissions. (Range: 0–600)
Default Configuration
Duplicate Address Detection on unicast IPv6 addresses with the sending of
one neighbor solicitation message is enabled.
Command Mode
Interface Configuration (Ethernet, VLAN, Port-channel) mode. It cannot be
configured for a range of interfaces (range context).
User Guidelines
Duplicate Address Detection (DAD) verifies the uniqueness of new unicast
IPv6 addresses before the addresses are assigned to interfaces (the new
addresses remain in a tentative state while DAD is performed). DAD uses
neighbor solicitation messages to verify the uniqueness of unicast IPv6
addresses.
An interface returning to the administrative Up state restarts DAD for all of
the unicast IPv6 addresses on the interface. While DAD is performed on the
Link Local address of an interface, the state of the other IPv6 addresses is still
set to TENTATIVE. When DAD is completed on the Link Local address,
DAD is performed on the remaining IPv6 addresses.IPv6 Addressing Commands 635
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\IPv6_Addressing.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
When DAD identifies a duplicate address, the address state is set to
DUPLICATE and the address is not used. If the duplicate address is the Link
Local address of the interface, the processing of IPv6 packets is disabled on
the interface and an error message is displayed.
All configuration commands associated with the duplicate address remain as
configured while the address state is set to DUPLICATE.
If the Link Local address for an interface changes, DAD is performed on the
new Link Local address and all of the other IPv6 address associated with the
interface are regenerated (DAD is performed only on the new Link Local
address).
Configuring a value of 0 with the ipv6 nd dad attempts Interface
Configuration mode command disables duplicate address detection
processing on the specified interface. A value of 1 configures a single
transmission without follow-up transmissions. The default is 1 message.
Until the DAD process is completed, an IPv6 address is in the tentative state
and cannot be used for data transfer. It is recommended to limit the
configured value.
Example
The following example configures the number of consecutive neighbor
solicitation messages sent during DAD processing to 2 on gigabitethernet
port 1/0/9.
Console (config)# interface gi1/0/9
Console (config-if)# ipv6 nd dad attempts 2
ipv6 host
Use the ipv6 host Global Configuration mode command to define a static
host name-to-address mapping in the host name cache. Use the no form of
this command to remove the host name-to-address mapping.
Syntax
ipv6 host name ipv6-address1 [ipv6-address2...ipv6-address4]
no ipv6 host name636 IPv6 Addressing Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\IPv6_Addressing.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Parameters
nameName of the host. (Range: 1–158 characters)
• ipv6-address1—Associated IPv6 address. This argument must be in the
form documented in RFC 2373 where the address is specified in
hexadecimal using 16-bit values between colons. When the IPv6 address is
a Link Local address (IPv6Z address), the outgoing interface name must
be specified. Refer to the user guidelines for the interface name syntax.
• ipv6-address2-4—(Optional) Additional IPv6 addresses that may be
associated with the host’s name
Default Configuration
No host is defined.
Command Mode
Global Configuration mode
User Guidelines
The format of an IPv6Z address is: %
interface-name = vlan | ch | isatap |
integer = |
decimal-number = 0 | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9
physical-port-name = Designated port number, for example 1/0/16.
Example
console(config)# ipv6 host server 3000::a31b
ipv6 neighbor
Use the ipv6 neighbor command to configure a static entry in the IPv6
neighbor discovery cache. Use the no form of this command to remove a
static IPv6 entry from the IPv6 neighbor discovery cache.IPv6 Addressing Commands 637
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\IPv6_Addressing.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Syntax
ipv6 neighbor ipv6_addr interface-id hw_addr
no ipv6 neighbor ipv6_addr interface-id
Parameters
• Ipv6_addr—Specifies the Pv6 address to map to the specified MAC
address.
• interface-id—Specifies the interface that is associated with the IPv6
address
• hw_addr—Specifies the MAC address to map to the specified IPv6
address.
Command Mode
Global Configuration mode
User Guidelines
The IPv6 neighbor command is similar to the ARP (global) command.
If an entry for the specified IPv6 address already exists in the neighbor
discovery cache—learned through the IPv6 neighbor discovery process—the
entry is automatically converted to a static entry.
A new static neighbor entry with a global address can be configured only if a
manually configured subnet already exists in the device.
Use the show IPv6 neighbors command to view static entries in the IPv6
neighbor discovery cache.
Example
console(config)# ipv6 neighbor 3000::a31b vlan 1 001b.3f9c.84ea
ipv6 set mtu
Use the ipv6 mtu Interface Configuration mode command to set the
maximum transmission unit (MTU) size of IPv6 packets sent on an interface.
Use the default parameter to restore the default MTU size.638 IPv6 Addressing Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\IPv6_Addressing.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Syntax
ipv6 set mtu { interface-id } { bytes | default}
Parameters
• interface-id—Specifies an interface ID. The interface ID can be one of the
following types: Ethernet port or Port-channel.
• bytes—Specifies the MTU in bytes.
• default—Sets the default MTU size 1500 bytes. Minimum is 1280 bytes
Default Configuration
1500 bytes
Command Mode
Privileged EXEC mode
User Guidelines
This command is intended for debugging and testing purposes and should be
used only by technical support personnel.
Example
console# ipv6 set mtu gi1/0/1 default
ipv6 mld version
Use the ipv6 mld version Interface Configuration mode command to change
the version of the Multicast Listener Discovery Protocol (MLD). Use the no
form of this command to change to the default version.
Syntax
ipv6 mld version {1 | 2}
no ipv6 mld version
Parameters
1—Specifies MLD version 1.
2—Specifies MLD version 2.IPv6 Addressing Commands 639
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\IPv6_Addressing.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Default Configuration
MLD version 1.
Command Mode
Interface Configuration (Ethernet, VLAN, Port-channel) mode
console(config)# interface vlan 1
console(config-if)# ipv6 mld version 2
ipv6 mld join-group
Use the ipv6 mld join-group Interface Configuration mode command to
configure Multicast Listener Discovery (MLD) reporting for a specified
group. Use the no form of this command to cancel reporting and leave the
group.
Syntax
ipv6 mld join-group group-address
no ipv6 mld join-group group-address
Parameters
group-address—Specifies the IPv6 address of the multicast group.
Default Configuration
Command Mode
Interface Configuration (Ethernet, VLAN, Port-channel) mode
User Guidelines
The ipv6 mld join-group command configures MLD reporting for a specified
group. The packets that are addressed to a specified group address will be
passed up to the client process in the device. 640 IPv6 Addressing Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\IPv6_Addressing.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
The following example configures MLD reporting for specific groups:
ipv6 mld join-group ff02::10
show ipv6 neighbors
Use the show ipv6 neighbors Privileged EXEC mode command to display
IPv6 neighbor discovery cache information.
Syntax
show ipv6 neighbors {static | dynamic}[ipv6-address ipv6-address] [macaddress mac-address] [interface-id]
Parameters
• static—Shows static neighbor discovery cash entries.
• dynamic—Shows dynamic neighbor discovery cash entries.
• ipv6-address—Shows the neighbor discovery cache information entry of a
specific IPv6 address.
• mac-address—Shows the neighbor discovery cache information entry of a
specific MAC address.
• interface-id—Specifies an interface ID. The interface ID can be one of the
following types: Ethernet port, Port-channel or VLAN.
Command Mode
Privileged EXEC mode
User Guidelines
Since the associated interface of a MAC address can be aged out from the
FDB table, the Interface field can be empty.
When an ARP entry is associated with an IP interface that is defined on a
port or port-channel, the VLAN field is empty.
The possible neighbor cash states are:IPv6 Addressing Commands 641
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\IPv6_Addressing.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
• INCMP (Incomplete)—Address resolution is being performed on the
entry. Specifically, a Neighbor Solicitation has been sent to the solicitednode multicast address of the target, but the corresponding Neighbor
Advertisement has not yet been received.
• REACH (Reachable)—Positive confirmation was received within the last
ReachableTime milliseconds that the forward path to the neighbor was
functioning properly. While REACHABLE, no special action takes place as
packets are sent.
• STALE—More than ReachableTime milliseconds have elapsed since the
last positive confirmation was received that the forward path was
functioning properly. While stale, no action takes place until a packet is
sent.
• DELAY—More than ReachableTime milliseconds have elapsed since the
last positive confirmation was received that the forward path was
functioning properly, and a packet was sent within the last
DELAY_FIRST_PROBE_TIME seconds. If no reachability confirmation is
received within DELAY_FIRST_PROBE_TIME seconds of entering the
DELAY state, send a Neighbor Solicitation and change the state to
PROBE.
• PROBE—A reachability confirmation is actively sought by retransmitting
Neighbor Solicitations every RetransTimer milliseconds until a
reachability confirmation is received.
Example
Console# show ipv6 neighbors dynamic
Interface IPv6 address HW address State Router
---------- ----------------------- ---------------- ------ ------
VLAN 1 fe80::200:cff:fe4a:dfa8 00:00:0c:4a:df:a8 stale yes
VLAN 1 fe80::2d0:b7ff:fea1:264d 00:d0:b7:a1:26:4d stale no
clear ipv6 neighbors
Use the clear ipv6 neighbors Privileged EXEC mode command to delete all
entries in the IPv6 neighbor discovery cache, except for static entries.642 IPv6 Addressing Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\IPv6_Addressing.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Syntax
clear ipv6 neighbors
Parameters
This command has no keywords or arguments.
Command Mode
Privileged EXEC mode
Example
console# clear ipv6 neighborsTunnel Commands 643
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Tunnel.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
40
Tunnel Commands
interface tunnel
Use the interface tunnel Global Configuration mode command to enter the
Interface Configuration (Tunnel) mode.
Syntax
interface tunnel number
Parameters
number—Specifies the tunnel index.
Command Mode
Global Configuration mode
Example
The following example enters the Interface Configuration (Tunnel) mode.
Console(config)# interface tunnel 1
Console(config-tunnel)#
tunnel mode ipv6ip
Use the tunnel mode ipv6ip Interface Configuration (Tunnel) mode
command to configure an IPv6 transition-mechanism global support mode.
Use the no form of this command to remove an IPv6 transition mechanism.
Syntax
tunnel mode ipv6ip {isatap}644 Tunnel Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Tunnel.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
no tunnel mode ipv6ip
Parameters
isatap—Enables an automatic IPv6 over IPv4 Intra-Site Automatic Tunnel
Addressing Protocol (ISATAP) tunnel.
Default Configuration
The IPv6 transition-mechanism global support mode is disabled.
Command Mode
Interface Configuration (Tunnel) mode
User Guidelines
The system can be enabled to ISATAP tunnel. When enabled, an automatic
tunnel interface is created on each interface that is assigned an IPv4 address.
Note that on a specific interface (for example, port or VLAN), both native
IPV6 and transition-mechanisms can coexist. The host implementation
chooses the egress interface according to the scope of the destination IP
address (such as ISATAP or native IPv6).
Example
The following example configures an IPv6 transition mechanism global
support mode.
Console(config)# interface tunnel 1
Console(config-tunnel)# tunnel mode ipv6ip isatap
tunnel isatap router
Use the tunnel isatap router Interface Configuration (Tunnel) mode
command to configure a global string that represents a specific automatic
tunnel router domain name. Use the no form of this command to remove the
string associated with the router domain name and restore the default
configuration.
Syntax
tunnel isatap router router-nameTunnel Commands 645
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Tunnel.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
no tunnel isatap router
Parameters
router-name—Specifies the router’s domain name.
Default Configuration
The automatic tunnel router's default domain name is ISATAP.
Command Mode
Interface Configuration (Tunnel) mode
User Guidelines
The ipv6 tunnel routers-dns command determines the string that the host
uses for automatic tunnel router lookup in the IPv4 DNS procedure. By
default, the string ISATAP is used for the corresponding automatic tunnel
types.
Only one string can represent the automatic tunnel router name per tunnel.
Using this command, therefore, overwrites the existing entry.
Example
The following example configures the global string ISATAP2 as the automatic
tunnel router domain name.
Console(config)# tunnel 1
Console(config-tunnel)# tunnel isatap router ISATAP2
tunnel source
Use the tunnel source Interface Configuration (Tunnel) mode command to
set the local (source) IPv4 address of a tunnel interface. The no form deletes
the tunnel local address.
Syntax
tunnel source { auto | ipv4-address }
no tunnel source646 Tunnel Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Tunnel.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Parameters
• auto—The system minimum IPv4 address is used as the source address for
packets sent on the tunnel interface. If the IPv4 address is changed, then
the local address of the tunnel interface is changed too.
• ip4-address—Specifies the IPv4 address to use as the source address for
packets sent on the tunnel interface. The local address of the tunnel
interface is not changed when the IPv4 address is moved to another
interface (only if StackTable is changed).
Default
No source address is defined.
Command Mode
Interface Configuration (Tunnel) mode
User Guidelines
The configured source IPv4 address is used for forming the tunnel interface
identifier. The interface identifier is set to the 8 least significant bytes of the
SIP field of the encapsulated IPv6 tunneled packets.
Example
console(config)# interface tunnel 1
console(config-tunnel)# tunnel source auto
tunnel isatap query-interval
Use the tunnel isatap query-interval Global Configuration mode command
to set the time interval between Domain Name System (DNS) queries
(before the ISATAP router IP address is known) for the automatic tunnel
router domain name. Use the no form of this command to restore the default
configuration.
Syntax
tunnel isatap query-interval seconds
no tunnel isatap query-intervalTunnel Commands 647
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Tunnel.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Parameters
seconds—Specifies the time interval in seconds between DNS queries.
(Range: 10–3600)
Default Configuration
The default time interval between DNS queries is 10 seconds.
Command Mode
Global Configuration mode
User Guidelines
This command determines the time interval between DNS queries before the
ISATAP router IP address is known. If the IP address is known, the robustness
level that is set by the tunnel isatap robustness Global Configuration mode
command determines the refresh rate.
Example
The following example sets the time interval between DNS queries to 30
seconds.
Console(config)# tunnel isatap query-interval 30
tunnel isatap solicitation-interval
Use the tunnel isatap solicitation-interval Global Configuration mode
command to set the time interval between ISATAP router solicitation
messages. Use the no form of this command to restore the default
configuration.
Syntax
tunnel isatap solicitation-interval seconds
no tunnel isatap solicitation-interval
Parameters
seconds—Specifies the time interval in seconds between ISATAP router
solicitation messages. (Range: 10–3600)648 Tunnel Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Tunnel.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Default Configuration
The default time interval between ISATAP router solicitation messages is 10
seconds.
Command Mode
Global Configuration mode
User Guidelines
This command determines the interval between router solicitation messages
when there is no active ISATAP router. If there is an active ISATAP router, the
robustness level set by the tunnel isatap robustness Global Configuration
mode command determines the refresh rate.
Example
The following example sets the time interval between ISATAP router
solicitation messages to 30 seconds.
Console(config)# tunnel isatap solicitation-interval 30
tunnel isatap robustness
Use the tunnel isatap robustness Global Configuration mode command to
configure the number of DNS query/router solicitation refresh messages that
the device sends. Use the no form of this command to restore the default
configuration.
Syntax
tunnel isatap robustness number
no tunnel isatap robustness
Parameters
number—Specifies the number of DNS query/router solicitation refresh
messages that the device sends. (Range: 1–20)
Default Configuration
The default number of DNS query/router solicitation refresh messages that
the device sends is 3.Tunnel Commands 649
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Tunnel.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Command Mode
Global Configuration mode
User Guidelines
The DNS query interval (after the ISATAP router IP address is known) is the
Time-To-Live (TTL) that is received from the DNS, divided by (Robustness
+ 1).
The router solicitation interval (when there is an active ISATAP router) is the
minimum-router-lifetime that is received from the ISATAP router, divided by
(Robustness + 1).
Example
The following example sets the number of DNS query/router solicitation
refresh messages that the device sends to 5.
Console(config)# tunnel isatap robustness 5
show ipv6 tunnel
Use the show ïpv6 tunnel EXEC mode command to display information on
the ISATAP tunnel.
Syntax
show ïpv6 tunnel
Command Mode
EXEC mode
Example
The following example displays information on the ISATAP tunnel.
Console> show ipv6 tunnel
Tunnel 1
--------
Tunnel status : DOWN650 Tunnel Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\Tunnel.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Tunnel protocol : NONE
Tunnel Local address type : auto
Tunnel Local Ipv4 address : 0.0.0.0
Router DNS name : ISATAP
Router IPv4 address : 0.0.0.0
DNS Query interval : 300 seconds
Min DNS Query interval : 0 seconds
Router Solicitation interval : 10 seconds
Min Router Solicitation interval : 0 seconds
Robustness : 2DHCP Relay Commands 651
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\DCHP_Relay.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
41
DHCP Relay Commands
ip dhcp relay enable (Global)
Use the ip dhcp relay enable Global Configuration mode command to enable
Dynamic Host Configuration Protocol (DHCP) relay features on the device.
Use the no form of this command to disable the DHCP relay agent.
Syntax
ip dhcp relay enable
no ip dhcp relay enable
Default Configuration
DHCP relay features are disabled.
Command Mode
Global Configuration mode
Example
The following example enables DHCP features on the device.
Console(config)# ip dhcp relay enable
ip dhcp relay enable (Interface)
Use the ip dhcp relay enable Interface Configuration (VLAN, Ethernet, Portchannel) mode command to enable Dynamic Host Configuration Protocol
(DHCP) relay features on the router. Use the no form of this command To
disable the DHCP relay agent features.652 DHCP Relay Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\DCHP_Relay.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Syntax
ip dhcp relay enable
no ip dhcp relay enable
Default Configuration
Disabled
Command Mode
Interface Configuration (VLAN) mode
Interface Configuration (VLAN, Ethernet, Port-channel) mode
User Guidelines
Enable DHCP relay globally before enabling DHCP relay on an interface.
Example
The following example enables DHCP features on VLAN 21.
Console(config)# interface vlan 21
Console(config-if)# ip dhcp relay enable
ip dhcp relay address (Global)
Use the ip dhcp relay address Global Configuration mode command to
define the DHCP servers available for the DHCP relay. Use the no form of
this command to remove servers from the list.
Syntax
ip dhcp relay address ip-address
no ip dhcp relay address [ip-address]
Parameters
ip-address—Specifies the DHCP server IP address. Up to 8 servers can be
defined.
Default Configuration
No server is defined.DHCP Relay Commands 653
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\DCHP_Relay.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Command Mode
Global Configuration mode
Example
The following example defines the DHCP server on the device.
Console(config)# ip dhcp relay address 176.16.1.1
ip dhcp relay address (Interface)
Use the ip dhcp relay address Interface Configuration (VLAN, Ethernet,
Port-channel) command to define the DHCP servers available by the DHCP
relay for DHCP clients connected to the interface. Use the no form of this
command to remove the server from the list.
Syntax
ip dhcp relay address ip-address
no ip dhcp relay address [ip-address]
Parameters
ip-address—Specifies the DHCP server IP address. Up to 8 servers can be
defined.
Default Configuration
No server is defined.
Command Mode
Interface Configuration (VLAN, Ethernet, Port-channel) mode
User Guidelines
Use the ip dhcp relay address command to define a DHCP Server IP address
per the interface. To define a few DHCP Servers, use the command a few
times.
To remove a DHCP Server, use the no form of the command with the ipaddress argument. The no form of the command without the ip-address
argument deletes all DHCP servers defined per the interface.654 DHCP Relay Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\DCHP_Relay.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
You can use the command regardless if DHCP Relay is enabled on the
interface.
Example
The following example defines the DHCP server on VLAN 21.
Console(config)# interface vlan 21
Console(config-if)# ip dhcp relay address 176.16.1.1
show ip dhcp relay
Use the show ip dhcp relay EXEC mode command to display the server
addresses on the DHCP relay.
Syntax
show ip dhcp relay
Command Mode
EXEC mode
Example
The following example displays the server addresses on the DHCP relay.
Console> show ip dhcp relay
DHCP relay is globally enabled.
DHCP relay is enabled on VLANs: 1, 2
DHCP relay is enabled on ports: 1/1
DHCP relay is enabled on port-channels:
Servers: 172.16.1.11, 172.16.8.11
Console> show ip dhcp relayDHCP Relay Commands 655
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\DCHP_Relay.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
DHCP relay is globally enabled.
DHCP relay is enabled on VLANs: 1, 2
Servers: 172.16.1.11, 172.16.8.11
ip dhcp information option
Use the ip dhcp information option Global Configuration command to
enable DHCP option-82 data insertion. Use the no form of this command to
disable DHCP option-82 data insertion.
Syntax
ip dhcp information option
no ip dhcp information option
Parameters
N/A
Default Configuration
DHCP option-82 data insertion is disabled.
Command Mode
Global Configuration mode
User Guidelines
DHCP option 82 would be enabled only if DHCP snooping or DHCP relay
are enabled.
Example
The following example enable DHCP option-82 data insertion.
Console(config)# ip dhcp information option656 DHCP Relay Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\DCHP_Relay.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
show ip dhcp information option
The show ip dhcp information option EXEC mode command displays the
DHCP Option 82 configuration.
Syntax
show ip dhcp information option
Command Mode
EXEC mode
Example
The following example displays the DHCP Option 82 configuration.
Console> show ip dhcp information option
Relay agent Information option is EnabledDHCP Server Commands 657
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\DCHP_Server.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
42
DHCP Server Commands
ip dhcp server
Use the ip dhcp server Global Configuration mode command to enable the
Dynamic Host Configuration Protocol (DHCP) server features on the device.
Use the no form of this command to disable the DHCP server.
Syntax
ip dhcp server
no ip dhcp server
Default Configuration
The DHCP server is disabled.
Command Mode
Global Configuration mode
Example
The following example enables the DHCP server on the device:
Console(config)# ip dhcp server
ip dhcp pool host
Use the ip dhcp pool host Global Configuration mode command to
configure a Dynamic Host Configuration Protocol (DHCP) static address on
a DHCP Server and enter the DHCP Pool Host Configuration mode. Use the
no form of this command to remove the address pool.658 DHCP Server Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\DCHP_Server.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Syntax
ip dhcp pool host name
no ip dhcp pool host name
Parameters
name—Specifies the DHCP address pool name. It can be either a symbolic
string (such as Engineering) or an integer (such as 8). (Length: 1–32
characters)
Default Configuration
DHCP hosts are not configured.
Command Mode
Global Configuration mode
User Guidelines
During execution of this command, the configuration mode changes to the
DHCP Pool Configuration mode, which is identified by the (config-dhcp)#
prompt. In this mode, the administrator can configure host parameters, such
as the IP subnet number and default router list.
Example
The following example configures Station as the DHCP address pool:
Console(config)# ip dhcp pool host station
Console(config-dhcp)#
ip dhcp pool network
Use the ip dhcp pool network Global Configuration mode command to
configure a Dynamic Host Configuration Protocol (DHCP) address pool on a
DHCP Server and enter DHCP Pool Configuration mode. Use the no form of
this command to remove the address pool.
Syntax
ip dhcp pool network nameDHCP Server Commands 659
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\DCHP_Server.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
no ip dhcp pool network name
Parameters
name—Specifies the DHCP address pool name. It can be either a symbolic
string (such as ‘engineering’) or an integer (such as 8). (Length: 1–32
characters)
Default Configuration
DHCP address pools are not configured.
Command Mode
Global Configuration mode
User Guidelines
During execution of this command, the configuration mode changes to
DHCP Pool Network Configuration mode, which is identified by the (configdhcp)# prompt. In this mode, the administrator can configure pool
parameters, such as the IP subnet number and default router list.
Example
The following example configures Pool1 as the DHCP address pool.
Console(config)# ip dhcp pool network pool1
Console(config-dhcp)#
address (DHCP Host)
Use the address DHCP Pool Host Configuration mode command to
manually bind an IP address to a Dynamic Host Configuration Protocol
(DHCP) client. Use the no form of this command to remove the IP address
binding to the client.
Syntax
address ip-address {mask | prefix-length} {client-identifier unique-identifier
| hardware-address mac-address}
no address660 DHCP Server Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\DCHP_Server.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Parameters
• address—Specifies the client IP address.
• mask—Specifies the client network mask.
• prefix-length—Specifies the number of bits that comprise the address
prefix. The prefix is an alternative way of specifying the client network
mask. The prefix length must be preceded by a forward slash (/).
• unique-identifier—Specifies the distinct client identification in dotted
hexadecimal notation: Each byte in a hexadecimal character string is two
hexadecimal digits. Bytes are separated by a period or colon. For example,
01b7.0813.8811.66.
• hardware-address—Specifies the MAC address.
Default Configuration
DHCP hosts are not configured.
Command Mode
DHCP Pool Host Configuration mode
Example
The following example manually binds an IP address to a Dynamic Host
Configuration Protocol (DHCP) client.
Console(config-dhcp)# address 10.12.1.99 255.255.255.0
01b7.0813.8811.66
address (DHCP Network)
Use the address DHCP Pool Network Configuration mode command to
configure the subnet number and mask for a Dynamic Host Configuration
Protocol (DHCP) address pool on DHCP Server. Use the no form of this
command to remove the subnet number and mask.
Syntax
address {network-number | low low-address high high-address} {mask |
prefix-length}
no addressDHCP Server Commands 661
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\DCHP_Server.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Parameters
• network-number—Specifies the IP address of the DHCP address pool.
• mask—Specifies the pool network mask.
• prefix-length—Specifies the number of bits that comprise the address
prefix. The prefix is an alternative way of specifying the client network
mask. The prefix length must be preceded by a forward slash (/).
• low low-address—Specifies the first IP address to use in the address range.
• high high-address—Specifies the last IP address to use in the address
range.
Default Configuration
DHCP address pools are not configured.
If the low address is not specified, it defaults to the first IP address in the
network.
If the high address is not specified, it defaults to the last IP address in the
network.
Command Mode
DHCP Pool Network Configuration mode
Example
The following example configures the subnet number and mask for a
Dynamic Host Configuration Protocol (DHCP) address pool on DHCP
Server.
Console(config-dhcp)# address 10.12.1.0 255.255.255.0
lease
Use the lease DHCP Pool Network Configuration mode command to
configure the time duration of the lease for an IP address that is assigned
from a Dynamic Host Configuration Protocol (DHCP) Server to a DHCP
client. Use the no form of this command to restore the default value.662 DHCP Server Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\DCHP_Server.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Syntax
lease {days [{hours} [minutes]] | infinite}
no lease
Parameters
• days—Specifies the number of days in the lease.
• hours—Specifies the number of hours in the lease. A days value must be
supplied before configuring an hours value.
• minutes—Specifies the number of minutes in the lease. A days value and
an hours value must be supplied before configuring a minutes value.
• infinite—Specifies that the duration of the lease is unlimited.
Default Configuration
The default lease duration is 1 day.
Command Mode
DHCP Pool Network Configuration mode
Examples
The following example shows a 1-day lease.
Console(config-dhcp)# lease 1
The following example shows a one-hour lease.
Console(config-dhcp)# lease 0 1
The following example shows a one-minute lease.
Console(config-dhcp)# lease 0 0 1
The following example shows an infinite (unlimited) lease.
Console(config-dhcp)# lease infiniteDHCP Server Commands 663
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\DCHP_Server.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
client-name
Use the client-name DHCP Pool Host Configuration mode command to
define the name of a DHCP client. The client name should not include the
domain name. Use the no form of this command to remove the client name.
Syntax
client-name name
no client-name
Parameters
name—Specifies the client name, using standard ASCII characters. The
client name should not include the domain name. For example, the name
Mars should not be specified as mars.yahoo.com. (Length: 1–32 characters)
Command Mode
DHCP Pool Host Configuration mode
Default Coniguration
No client name is defined.
Example
The following example defines the string Client1 as the client name.
Console(config-dhcp)# client-name client1
default-router
Use the default-router DHCP Pool Configuration mode command to
configure the default router list for a Dynamic Host Configuration Protocol
(DHCP) client. Use the no form of this command to remove the default
router list.
Syntax
default-router ip-address [ip-address2 ... ip-address8]
no default-router664 DHCP Server Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\DCHP_Server.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Parameters
ip-address—Specifies the IP address of a router. One IP address is required,
although up to eight addresses can be specified in one command line.
Command Mode
DHCP Pool Host Configuration mode
DHCP Pool Network Configuration mode
Default Configuration
No default router is defined.
User Guidelines
The router IP address should be on the same subnet as the client subnet.
Example
The following example specifies 10.12.1.99 as the default router IP address.
Console(config-dhcp)# default-router 10.12.1.99
dns-server
Use the dns-server DHCP Pool Configuration mode command to configure
the Domain Name System (DNS) IP servers available to a Dynamic Host
Configuration Protocol (DHCP) client. Use the no form of this command to
remove the DNS server list.
Syntax
dns-server ip-address [ip-address2 ... ip-address8]
no dns-server
Parameters
ip-address—Specifies a DNS Server IP address. One IP address is required,
although up to eight addresses can be specified in one command line.
Command Mode
DHCP Pool Host Configuration modeDHCP Server Commands 665
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\DCHP_Server.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
DHCP Pool Network Configuration mode
Default Configuration
No DNS server is defined.
User Guidelines
If DNS IP servers are not configured for a DHCP client, the client cannot
correlate host names to IP addresses.
Example
The following example specifies 10.12.1.99 as the client domain name server
IP address.
Console(config-dhcp)# dns-server 10.12.1.99
domain-name
Use the domain-name DHCP Pool Configuration mode command to specify
the domain name for a Dynamic Host Configuration Protocol (DHCP)
client. Use the no form of this command to remove the domain name.
Syntax
domain-name domain
no domain-name
Parameters
domain—Specifies the DHCP client domain name string. (Length: 1–32
characters)
Command Mode
DHCP Pool Host Configuration mode
DHCP Pool Network Configuration mode
Default Configuration
No domain name is defined.666 DHCP Server Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\DCHP_Server.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
The following example specifies yahoo.com as the DHCP client domain
name string.
Console(config-dhcp)# domain-name yahoo.com
netbios-name-server
Use the netbios-name-server DHCP Pool Configuration mode command to
configure the NetBIOS Windows Internet Naming Service (WINS) servers
that are available to Microsoft Dynamic Host Configuration Protocol
(DHCP) clients. Use the no form of this command to remove the NetBIOS
name server list.
Syntax
netbios-name-server ip-address [ip-address2 ... ip-address8]
no netbios-name-server
Parameters
ip-address—Specifies the NetBIOS WINS name server IP address. One IP
address is required, although up to eight addresses can be specified in one
command line.
Command Mode
DHCP Pool Host Configuration mode
DHCP Pool Network Configuration mode
Default Configuration
No bios server is defined.
Example
The following example specifies the IP address of a NetBIOS name server
available to the DHCP client.
Console(config-dhcp)# netbios-name-server 10.12.1.90DHCP Server Commands 667
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\DCHP_Server.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
netbios-node-type
Use the netbios-node-type DHCP Pool Configuration mode command to
configure the NetBIOS node type for Microsoft Dynamic Host Configuration
Protocol (DHCP) clients. Use the no form of this command to remove the
NetBIOS node type.
Syntax
netbios-node-type {b-node | p-node | m-node | h-node}
no netbios-node-type
Parameters
• b-node—Specifies the Broadcast NetBIOS node type.
• p-node—Specifies the Peer-to-peer NetBIOS node type.
• m-node—Specifies the Mixed NetBIOS node type.
• h-node—Specifies the Hybrid NetBIOS node type.
Command Mode
DHCP Pool Host Configuration mode
DHCP Pool Network Configuration mode
Default Configuration
No bios node type is defined.
Example
The following example specifies the client's NetBIOS type as hybrid.
Console(config-dhcp)# netbios node-type h-node
next-server
Use the next-server DHCP Pool Configuration mode command to configure
the next server in the boot process of a Dynamic Host Configuration Protocol
(DHCP) client. Use the no form of this command to remove the boot server.668 DHCP Server Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\DCHP_Server.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Syntax
next-server ip-address
no next-server
Parameters
ip-address—Specifies the IP address of the next server in the boot process,
which is typically a Trivial File Transfer Protocol (TFTP) server.
Default Configuration
If the next-server command is not used to configure a boot server list, the
DHCP Server uses inbound interface helper addresses as boot servers.
Command Mode
DHCP Pool Host Configuration mode
DHCP Pool Network Configuration mode
Example
The following example specifies 10.12.1.99 as the IP address of the next server
in the boot process.
Console(config-dhcp)# next-server 10.12.1.99
next-server-name
Use the next-server-name DHCP Pool Configuration mode command to
configure the next server name in the boot process of a Dynamic Host
Configuration Protocol (DHCP) client. Use the no form of this command to
remove the boot server name.
Syntax
next-server-name name
no next-server-name
Parameters
name—Specifies the name of the next server in the boot process. (Length:
1–64 characters)DHCP Server Commands 669
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\DCHP_Server.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Command Mode
DHCP Pool Host Configuration mode
DHCP Pool Network Configuration mode
Default Configuration
No next server name is defined.
Example
The following example specifies www.bootserver.com as the name of the next
server in the boot process of a DHCP client.
Console(config-dhcp)# next-server www.bootserver.com
bootfile
Use the bootfile DHCP Pool Configuration mode command to specify the
default boot image file name for a Dynamic Host Configuration Protocol
(DHCP) client. Use the no form of this command to delete the boot image
file name.
Syntax
bootfile filename
no bootfile
Parameters
filename—Specifies the file name used as a boot image. (Length: 1–128
characters)
Command Mode
DHCP Pool Host Configuration mode
DHCP Pool Network Configuration mode670 DHCP Server Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\DCHP_Server.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
The following example specifies boot_image_file as the default boot image
file name for a DHCP client.
Console(config-dhcp)# bootfile boot_image_file
time-server
Use the time-server DHCP Pool Configuration mode command to specify the
time servers list for a Dynamic Host Configuration Protocol (DHCP) client.
Use the no form of this command to remove the time servers list.
Syntax
time-server ip-address [ip-address2 ... ip-address8]
no time-server
Parameters
ip-address—Specifies the IP address of a time server. One IP address is
required, although up to eight addresses can be specified in one command
line.
Command Mode
DHCP Pool Host Configuration mode
DHCP Pool Network Configuration mode
Default Configuration
No time server name is defined.
User Guidelines
The router IP address should be on the same subnet as the client subnet.
Example
The following example specifies 10.12.1.99 as the time server IP address.
Console(config-dhcp)# time-server 10.12.1.99DHCP Server Commands 671
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\DCHP_Server.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
option
Use the option DHCP Pool Configuration mode command to configure the
Dynamic Host Configuration Protocol (DHCP) Server options. Use the no
form of this command to remove the options.
Syntax
option code {ascii ascii-string | hex hex-string | ip ip-address}
option ip-list code ip-address1 [ip-address2 …]
no option code
Parameters
• code—Specifies the DHCP option code.
• ascii ascii-string—Specifies an NVT ASCII character string. ASCII
character strings, which contain white space, must be delimited by
quotation marks.
• hex hex-string—Specifies dotted hexadecimal data: Each byte in
hexadecimal character strings is two hexadecimal digits. Bytes are
separated by a period or colon.
• ip ip-address—Specifies an IP address.
• ip-list—Specifies that a list of IP addresses immediately follows the option
code.
• ip-address1 [ip-address2 …]—Specifies a list of one or more IP addresses.
Command Mode
DHCP Pool Host Configuration mode
DHCP Pool Network Configuration mode
User Guidelines
DHCP provides a framework for passing configuration information to hosts
on a TCP/IP network. Configuration parameters and other control
information are carried in tagged data items that are stored in the DHCP
message options field. The data items themselves are also called options. The 672 DHCP Server Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\DCHP_Server.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
current set of DHCP options are documented in RFC 2131, Dynamic Host
Configuration Protocol.
For options in hexadecimal format, the string parameter should include all
the bytes in the option value, including leading zeros.
Examples
The following example configures DHCP option 19, which specifies whether
the client should configure its IP layer for packet forwarding. A value of 0
means disable Ip forwarding. A value of 1 means enable IP forwarding. IP
forwarding is enabled in the following example.
Console(config-dhcp)# option 19 hex 01
The following example configures DHCP option 2, which specifies the offset
of the client's subnet in seconds from Coordinated Universal Time (UTC). A
value of 0xE10 in the following example indicates a location 1 hour east of
the meridian.
Console(config-dhcp)# option 2 hex 00000E10
The following example configures DHCP option 72, which specifies the
World Wide Web servers for DHCP clients. World Wide Web servers
172.16.3.252 and 172.16.3.253 are configured in the following example.
Console(config-dhcp)# option ip-list 72 172.16.3.252
172.16.3.253
ip dhcp excluded-address
Use the ip dhcp excluded-address Global Configuration mode command to
specify the IP addresses that a Dynamic Host Configuration Protocol
(DHCP) Server should not assign to DHCP clients. Use the no form of this
command to remove the excluded IP addresses.
Syntax
ip dhcp excluded-address low-address [high-address]
no ip dhcp excluded-address low-address [high-address]DHCP Server Commands 673
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\DCHP_Server.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Parameters
• low-address—Specifies the excluded IP address, or first IP address in an
excluded address range.
• high-address—Specifies the last IP address in the excluded address range.
Default Configuration
All IP pool addresses are assignable.
Command Mode
Global Configuration mode
User Guidelines
The DHCP Server assumes that all pool addresses can be assigned to clients.
Use this command to exclude a single IP address or a range of IP addresses.
Example
The following example configures an excluded IP address range from
172.16.1.100 through 172.16.1.199.
Console(config)# ip dhcp excluded-address 172.16.1.100
172.16.1.199
ip dhcp ping enable
Use the ip dhcp ping enable Global Configuration mode command to enable
the Dynamic Host Configuration Protocol (DHCP) Server to send ping
packets before assigning the address to a requesting client. Use the no form of
this command to prevent the server from pinging pool addresses.
Syntax
ip dhcp ping enable
no ip dhcp ping enable
Default Configuration
DHCP pinging is disabled.674 DHCP Server Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\DCHP_Server.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Command Mode
Global Configuration mode
User Guidelines
The DHCP Server pings a pool address before assigning the address to a
requesting client. If the ping is unanswered, the DHCP Server assumes (with
a high probability) that the address is not in use and assigns the address to the
requesting client.
Example
The following example enables the DHCP Server to send ping packets before
assigning the address to a requesting client.
Console(config)# ip dhcp ping enable
ping enable
Use the ping enable DHCP Pool Network Configuration mode command to
enable the Dynamic Host Configuration Protocol (DHCP) Server to send
ping packets before assigning the address to a requesting client. Use the no
form of this command to prevent the server from pinging pool addresses.
Syntax
ping enable
no ping enable
Default Configuration
The default configuration is set to enable.
Command Mode
DHCP Pool Network Configuration mode
User Guidelines
The DHCP Server pings a pool address before assigning the address to a
requesting client. If the ping is unanswered, the DHCP Server assumes (with
a high probability) that the address is not in use and assigns the address to the
requesting client.DHCP Server Commands 675
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\DCHP_Server.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
The following example enables the DHCP Server to send ping packets before
assigning the address to a requesting client.
Console(config-dhcp)# ping enable
ip dhcp ping count
Use the ip dhcp ping count Global Configuration mode command to specify
the number of packets a Dynamic Host Configuration Protocol (DHCP)
Server sends to a pool address as part of a ping operation. Use the no form of
this command to restore the default configuration.
Syntax
ip dhcp ping count number
no ip dhcp ping count
Parameters
number—Specifies the number of ping packets that are sent before assigning
the address to a requesting client. (Range: 1-10)
Default Configuration
A Dynamic Host Configuration Protocol (DHCP) Server sends two packets to
a pool address as part of a ping operation.
Command Mode
Global Configuration mode
Example
The following example specifies that a DHCP Server sends five packets to a
pool address as part of a ping operation.
Console(config)# ip dhcp ping count 5676 DHCP Server Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\DCHP_Server.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
ip dhcp ping timeout
The ip dhcp ping timeout Global Configuration mode command specifies
the time interval during which a Dynamic Host Configuration Protocol
(DHCP) Server waits for a ping reply from an address pool. To restore the
default timeout, use the no form of this command.
Syntax
ip dhcp ping timeout milliseconds
no ip dhcp ping timeout
Parameters
milliseconds — Specifies the amount of time (in milliseconds) that the
DHCP server waits for a ping reply before it stops attempting to reach a pool
address for client assignment. The timeout range is 300-10000 milliseconds.
Default Configuration
The default timeout is 500 milliseconds.
Command Mode
Global Configuration mode
User Guidelines
This command specifies how long to wait for a ping reply (in milliseconds).
Example
The following example specifies that a DHCP Server waits 1 second for a ping
reply from an address pool before it stops attempting to reach a pool address
for client assignment.
Console(config)# ip dhcp ping timeout 1000DHCP Server Commands 677
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\DCHP_Server.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
clear ip dhcp binding
The clear ip dhcp binding Privileged EXEC mode command deletes the
dynamic address binding from the Dynamic Host Configuration Protocol
(DHCP) Server database.
Syntax
clear ip dhcp binding {address | *}
Parameters
• address — Specifies the binding address to delete from the DHCP
database.
• * — Clears all automatic bindings.
Command Mode
Privileged EXEC mode
User Guidelines
Typically, the address denotes the client IP address. If the asterisk (*)
character is specified as the address parameter, DHCP clears all dynamic
bindings.
Use the no ip dhcp pool Global Configuration mode command to delete a
manual binding.
Example
The following example deletes the address binding 10.12.1.99 from a DHCP
server database:
Console# clear ip dhcp binding 10.12.1.99
show ip dhcp
The show ip dhcp EXEC mode command displays the DHCP configuration.
Syntax
show ip dhcp678 DHCP Server Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\DCHP_Server.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Command Mode
EXEC mode
Example
The following example displays the DHCP configuration.
Console> show ip dhcp
DHCP server is enabled.
DHCP ping packets is enabled with 2 retries and 500
milliseconds.
show ip dhcp excluded-addresses
The show ip dhcp excluded-addresses EXEC mode command displays the
excluded addresses.
Syntax
show ip dhcp excluded-addresses
Command Mode
EXEC mode
Example
The following example displays the excluded addresses.
Console> show ip dhcp excluded-addresses
The number of excluded addresses ranges is 2
Excluded addresses:
10.1.1.212- 10.1.1.219, 10.1.2.212- 10.1.2.219
show ip dhcp pool host
The show ip dhcp pool host EXEC mode command displays the DHCP pool
host configuration.DHCP Server Commands 679
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\DCHP_Server.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Syntax
show ip dhcp pool host [address | name]
Parameters
• address — Specifies the client IP address.
• name — Specifies the DHCP pool name. (Length: 1-32 characters)
Command Mode
EXEC mode
Example
The following example displays the DHCP pool host configuration.
Console> show ip dhcp pool host
The number of host pools is 1
Name
---------
Station
IP Address
--------------
172.16.1.11
Hardware Address
-----------------
Client Identifier
-----------------
01b7.0813.8811.66
Console> show ip dhcp pool host station
Name
---------
Station
IP Address
--------------
172.16.1.11
Hardware Address
-----------------
Client Identifier
-----------------
01b7.0813.8811.66680 DHCP Server Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\DCHP_Server.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
show ip dhcp pool network
The show ip dhcp pool network EXEC mode command displays the DHCP
network configuration.
Syntax
show ip dhcp pool network [name]
Parameters
name — Specifies the DHCP pool name. (Length: 1-32 characters)
Command Mode
EXEC mode
Example
Router> show ip dhcp pool network
The number of network pools is 2
Name Address range mask Lease
----------------------------------------------------
Mask: 255.255.0.0
Default router: 172.16.1.1
Client name: client1
DNS server: 10.12.1.99
Domain name: yahoo.com
NetBIOS name server: 10.12.1.90
NetBIOS node type: h-node
Next server: 10.12.1.99
Next-server-name: 10.12.1.100
Bootfile: Bootfile
Time server 10.12.1.99
Options:
Code
----
19
Value
-----
Ox01DHCP Server Commands 681
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\DCHP_Server.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
marketing 10.1.1.17-10.1.1.178 255.255.255.0 0d:12h:0m
finance 10.1.2.8-10.1.2.178 255.255.255.0 0d:12h:0m
Router> show ip dhcp pool network marketing
Name Address range mask Lease
--------------------------------- ------------------------
marketing 10.1.1.17-10.1.1.178 255.255.255.0 0d:12h:0m
Statistics:
All-range Available Free Pre-allocated Allocated Expired Declined
---------- --------- ----- ------------- --------- --------- --------
162 150 68 50 20 3 9
Default router: 10.1.1.1
Ping packets: enabled
DNS server: 10.12.1.99
Domain name: yahoo.com
NetBIOS name server: 10.12.1.90
NetBIOS node type: h-node
Next server: 10.12.1.99
Next-server-name: 10.12.1.100
Bootfile: Bootfile
Time server 10.12.1.99
Options:
Code Value
------------------
19 Ox01
show ip dhcp binding
Use the show ip dhcp binding EXEC mode command to display the specific
one or all the address bindings on the Dynamic Host Configuration Protocol
(DHCP) Server.
Syntax
show ip dhcp binding [ip-address]
Parameters
ip-address — Specifies the IP address682 DHCP Server Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\DCHP_Server.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Command Mode
EXEC mode
Example
The following example displays the DHCP Server binding address
parameters.
Router> show ip dhcp binding
DHCP server enabled
The number of used (all types) entries is 5
The number of pre-allocated entries is 1
The number of allocated entries is 1
The number of expired entries is 1
The number of declined entries is 2
IP address Hardware Address Lease Expiration Type State
---------- ---------------- ------------- ------- ---------
1.16.1.11 00a0.9802.32de Feb 01 1998 dynamic allocated
1.16.3.23 02c7.f801.0422 12:00AM dynamic expired
1.16.3.24 02c7.f802.0422 dynamic declined
1.16.3.25 02c7.f803.0422 dynamic pre-allocated
1.16.3.26 02c7.f804.0422 dynamic declined
Router> show ip dhcp binding 1.16.1.11
DHCP server enabled
The number of used (all types) entries is 5
The number of pre-allocated entries is 1
The number of allocated entries is 1
The number of expired entries is 1
The number of declined entries is 2
IP address Hardware Address Lease Expiration Type State
---------- ---------------- ----------------- ------- ---------
1.16.1.11 00a0.9802.32de Feb 01 1998 dynamic allocated
12:00 AM
Router> show ip dhcp binding 1.16.3.24DHCP Server Commands 683
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\DCHP_Server.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
DHCP server enabled
The number of used (all types) entries is 5
The number of pre-allocated entries is 1
The number of allocated entries is 1
The number of expired entries is 1
The number of declined entries is 2
IP address Hardware Address Lease Expiration Type State
---------- ---------------- --------------- ------- ---------
1.16.3.24 02c7.f802.0422 dynamic declined
The following table describes the significant fields shown in the display.
show ip dhcp server statistics
Use the show ip dhcp server statistics EXEC command to display Dynamic
Host Configuration Protocol (DHCP) Server statistics.
Syntax
show ip dhcp server statistics
Command Mode
EXEC mode
Field Description
IP address The host IP address as recorded on the DHCP Server.
Hardware
address
The MAC address or client identifier of the host as recorded
on the DHCP Server.
Lease expiration The lease expiration date of the host IP address.
Type The manner in which the IP address was assigned to the
host.
State The IP Address state.684 DHCP Server Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\DCHP_Server.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
The following example displays DHCP Server statistics
DHCP server enabled
The number of network pools is 6
The number of excluded pools is 2
The number of used (all types) entries is 7
The number of pre-allocated entries is 1
The number of allocated entries is 3
The number of static entries is 1
The number of dynamic entries is 1
The number of automatic entries is 1
The number of expired entries is 1
The number of declined entries is 2
show ip dhcp allocated
Use the show ip dhcp allocated EXEC mode command to display the specific
one or all the allocated address on the Dynamic Host Configuration Protocol
(DHCP) Server.
Syntax
show ip dhcp allocated [ip-address]
Parameters
ip-address — Specifies the IP address
Command Mode
EXEC mode
Example
The following example displays the DHCP Server allocated IP addresses.
Router> show ip dhcp allocated
DHCP server enabledDHCP Server Commands 685
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\DCHP_Server.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
The number of allocated entries is 3
The number of static entries is 1
The number of dynamic entries is 1
The number of automatic entries is 1
IP address Hardware address Lease expiration Type
---------- ---------------- -------------------- ---------
172.16.1.11 00a0.9802.32de Feb 01 1998 12:00 AM Dynamic
172.16.3.253 02c7.f800.0422 Infinite Automatic
172.16.3.254 02c7.f800.0422 Infinite Static
Router> show ip dhcp allocated 172.16.1.11
DHCP server enabled
The number of allocated entries is 2
The number of static entries is 0
The number of dynamic entries is 2
IP address Hardware address Lease expiration Type
---------- ---------------- -------------------- --------
172.16.1.11 00a0.9802.32de Feb 01 1998 12:00 AM Dynamic
Router> show ip dhcp allocated 172.16.3.254
DHCP server enabled
The number of allocated entries is 2
The number of static entries is 0
The number of dynamic entries is 2
IP address Hardware address Lease expiration Type
---------- ---------------- -------------------- -------
172.16.3.254 02c7.f800.0422 Infinite Static686 DHCP Server Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\DCHP_Server.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
The following table describes the significant fields shown in the display.
show ip dhcp declined
Use the show ip dhcp declined EXEC command to display the specific one or
all the declined addresses on the Dynamic Host Configuration Protocol
(DHCP) server.
Syntax
show ip dhcp declined [ip-address]
Parameters
ip-address—Specifies the IP address.
Command Mode
EXEC mode
Example
Router> show ip dhcp declined
DHCP server enabled
IP address Hardware address
172.16.1.11 00a0.9802.32de
172.16.3.254 02c7.f800.0422
Router> show ip dhcp declined 172.16.1.11
DHCP server enabled
Field Description
IP address The host IP address as recorded on the DHCP Server.
Hardware
address
The MAC address or client identifier of the host as recorded
on the DHCP Server.
Lease expiration The lease expiration date of the host IP address.
Type The manner in which the IP address was assigned to the
host.DHCP Server Commands 687
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\DCHP_Server.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
IP address Hardware address
172.16.1.1100a0.9802.32de
172.16.1.12
show ip dhcp declined Field Descriptions
• IP address—The IP address of the host as recorded on the DHCP Server.
• Hardware address—The MAC address or client identifier of the host as
recorded on the DHCP Server.
show ip dhcp expired
Use the show ip dhcp expired EXEC command to display the specific one or
all the expired addresses on the Dynamic Host Configuration Protocol
(DHCP) server.
Syntax
show ip dhcp expired [ip-address]
Parameters
ip-address—Specifies the IP.
Command Mode
EXEC mode
Example
Router> show ip dhcp expired
DHCP server enabled
IP address Hardware address
172.16.1.11 00a0.9802.32de
172.16.3.254 02c7.f800.0422
Router> show ip dhcp expired 172.16.1.11
DHCP server enabled688 DHCP Server Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\DCHP_Server.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
IP address Hardware address
172.16.1.1300a0.9802.32de
172.16.1.14
show ip dhcp expired Field Descriptions
• IP address—The IP address of the host as recorded on the DHCP Server.
• Hardware address—The MAC address or client identifier of the host as
recorded on the DHCP Server.
show ip dhcp pre-allocated
Use the show ip dhcp pre-allocated EXEC command to display the specific
one or all the pre-allocated addresses on the Dynamic Host Configuration
Protocol (DHCP) server.
Syntax
show ip dhcp pre-allocated [ip-address]
Parameters
ip-address—Specifies the IP.
Command Mode
EXEC mode
Examples
Router> show ip dhcp pre-allocated
DHCP server enabled
IP address Hardware address
172.16.1.11 00a0.9802.32de
172.16.3.254 02c7.f800.0422
Router> show ip dhcp pre-allocated 172.16.1.11
DHCP server enabledDHCP Server Commands 689
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\DCHP_Server.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
IP address Hardware address
172.16.1.1500a0.9802.32de
172.16.1.16
show ip dhcp declined Field Descriptions
• IP address—The IP address of the host as recorded on the DHCP Server.
• Hardware address—The MAC address or client identifier of the host as
recorded on the DHCP Server.690 DHCP Server Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\DCHP_Server.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LYIP Routing Protocol-Independent Commands 691
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\IP_Routing.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
43
IP Routing Protocol-Independent
Commands
ip route
Use the ip route Global Configuration mode command to configure static
routes. Use the no form of this command to remove static routes.
Syntax
ip route prefix {mask | prefix-length} ip-address [metric distance] [rejectroute]
no ip route prefix {mask | prefix-length} [ip-address]
Parameters
• prefix—Specifies the IP address that is the IP route prefix for the
destination IP.
• mask—Specifies the network subnet mask of the IP address prefix.
• prefix-length—Specifies the number of bits that comprise the IP address
prefix. The prefix length must be preceded by a forward slash (/). (Range:
0–32)
• ip-address—Specifies the IP address or IP alias of the next hop that can be
used to reach the network.
• metric distance—Specifies an administrative distance. (Range: 1–255)
• reject-route—Stops routing to the destination network via all gateways.
Default Configuration
The default administrative distance is 1.692 IP Routing Protocol-Independent Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\IP_Routing.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Command Mode
Global Configuration mode
Example
The following example configures a static route with prefix 172.16.0.0, prefix
length 16, and gateway 131.16.1.1.
Console(config)# ip route 172.16.0.0 /16 131.16.1.1
ip routing
Use the ip routing Global Configuration mode command to enable IPv4
Routing. Use the no format of the command to disable IPv4 Routing.
Syntax
ip routing
no ip routing
Default Configuration
Enabled by default.
Command Mode
Global Configuration mode
Default Configuration
No routing is defined
show ip route
Use the show ip route EXEC mode command to display the current routing
table state.
Syntax
show ip route [connected | static | {address address [mask | prefix-length]
[longer-prefixes]}]IP Routing Protocol-Independent Commands 693
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\IP_Routing.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Parameters
• connected—Displays connected routing entries only.
• static—Displays static routing entries only.
• address address—Specifies the address for which routing information is
displayed.
• mask—Specifies the network subnet mask of the IP address.
• prefix-length—Specifies the number of bits that comprise the IP address
prefix. The prefix length must be preceded by a forward slash (/). (Range:
1–32)
• longer-prefixes—Specifies that the address and mask pair becomes a prefix
and any routes that match that prefix are displayed.
Command Mode
EXEC mode
Example
The following example displays the current routing table state.
Console> show ip route
console# show ip route
Maximum Parallel Paths: 1 (1 after reset)
IP Forwarding: enabled
Codes: C - connected, S - static, D - DHCP
S 0.0.0.0/0 [1/1] via 10.5.234.254 119:9:27 vlan 1
C 10.5.234.0/24 is directly connected vlan 1
Console> show ip route address 172.1.1.0 255.255.255.0
Codes: C - connected, S - static, E - OSPF external, * -
candidate default
S 172.1.1.0/24 [5/3] via 10.0.2.1, 17:12:19, Ethernet1694 IP Routing Protocol-Independent Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\IP_Routing.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Console> show ip route address 172.1.1.0 255.255.255.0 longerprefixes
Codes: C - connected, S - static, E - OSPF external
S 172.1.1.0/24 [5/3] via 10.0.2.1, 17:12:19, Ethernet1
S 172.1.1.1/32 [5/3] via 10.0.3.1, 19:51:18, Ethernet1
The following table describes the significant fields shown in the display:
Field Description
O The protocol that derived the route.
10.8.1.0/24 The remote network address.
[30/2000] The first number in the brackets is the administrative
distance of the information source; the second number is the
metric for the route.
via 10.0.1.2 The address of the next router to the remote network.
00:39:08 The last time the route was updated, in
hours:minutes:seconds.
Ethernet 1 The interface through which the specified network can be
reached.695
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\ACL.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY
44
ACL Commands
ip access-list
Use the ip access-list global configuration mode command to define an IPv4
access list and to place the device in IPv4 Access List Configuration mode.
Use the no form of this command to remove the access list.
Syntax
ip access-list extended access-list-name
no ip access-list extended access-list-name
Parameters
• access-list-name—Name of the IPv4 access list.
• access-list-name—0–32 characters. (Use "" for empty string)
Default
No IPv4 access list is defined.
Command Mode
Global Configuration mode
User Guidelines
IPv4 ACL is defined by a unique name. IPv4 ACLs, IPv6 ACLs, MAC ACLs
or policy maps cannot have the same name.
Example
console(config)# ip access-list extended server696
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\ACL.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY
permit ( IP )
Use the permit IP Access-list Configuration mode command to set permit
conditions for IPv4 access list.
Syntax
permit protocol {any | source source-wildcard} {any | destination
destination-wildcard} [dscp number | precedence number] [time-range
time-range-name]
permit icmp {any | source source-wildcard} {any | destination destinationwildcard} [any | icmp-type] [any | icmp-code]] [dscp number | precedence
number] [time-range time-range-name]
permit igmp {any | source source-wildcard} {any | destination destinationwildcard}[igmp-type] [dscp number | precedence number] [time-range
time-range-name]
permit tcp {any | source source-wildcard} {any|source-port/port-range}{any
| destination destination-wildcard} {any|destination-port/port-range } [dscp
number | precedence number] [match-all list-of-flags] [time-range timerange-name]
permit udp {any | source source-wildcard} {any|source-port/port-range}
{any | destination destination-wildcard} {any|destination-port/port-range }
[dscp number | precedence number] [match-all time-range-name] [timerange time-range-name]
Parameters
• protocol—The name or the number of an IP protocol. Available protocol
names icmp, igmp, ip, tcp, egp, igp, udp, hmp, rdp, idpr, ipv6, ipv6:rout,
ipv6:frag, idrp, rsvp, gre, esp, ah, ipv6:icmp, eigrp, ospf, ipinip, pim, l2tp,
isis. To match any protocol use the IP keyword.(Range: 0–255)
• source—Source IP address of the packet.
• source-wildcard—Wildcard bits to be applied to the source IP address.
Use ones in the bit position that you want to be ignored.
• destination—Destination IP address of the packet.
• destination-wildcard—Wildcard bits to be applied to the destination IP
address. Use ones in the bit position that you want to be ignored.697
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\ACL.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY
• dscp number—Specifies the DSCP value.
• precedence number—Specifies the IP precedence value.
• icmp-type—Specifies an ICMP message type for filtering ICMP packets.
Enter a number or one of the following values: echo-reply, destinationunreachable, source-quench, redirect, alternate-host-address, echorequest, router-advertisement, router-solicitation, time-exceeded,
parameter-problem, timestamp, timestamp-reply, information-request,
information-reply, address-mask-request, address-mask-reply, traceroute,
datagram-conversion-error, mobile-host-redirect, mobile-registrationrequest, mobile-registration-reply, domain-name-request, domain-namereply, skip, photuris. (Range: 0–255)
• icmp-code—Specifies an ICMP message code for filtering ICMP packets.
(Range: 0–255)
• igmp-type—IGMP packets can be filtered by IGMP message type. Enter a
number or one of the following values: host-query, host-report, dvmrp,
pim, cisco-trace, host-report-v2, host-leave-v2, host-report-v3. (Range:
0–255)
• destination-port—Specifies the UDP/TCP destination port. You can
enter range of ports by using hyphen. E.g. 20 - 21. For TCP enter a number
or one of the following values: bgp (179), chargen (19), daytime (13),
discard (9), domain (53), drip (3949), echo (7), finger (79), ftp (21), ftpdata (20), gopher (70), hostname (42), irc (194), klogin (543), kshell
(544), lpd (515), nntp (119), pop2 (109), pop3 (110), smtp (25), sunrpc
(1110, syslog (514), tacacs-ds (49), talk (517), telnet (23), time (37), uucp
(117), whois (43), www (80). For UDP enter a number or one of the
following values: biff (512), bootpc (68), bootps (67), discard (9), dnsix
(90), domain (53), echo (7 ), mobile-ip (434), nameserver (42), netbiosdgm (138), netbios-ns (137), on500-isakmp (4500), ntp (123), rip (520),
snmp (161), snmptrap (162), sunrpc (111), syslog (514), tacacs-ds (49),
talk (517), tftp (69), time (37), who (513), xdmcp (177).(Range: 0–65535).
• source-port—Specifies the UDP/TCP source port. Predefined port names
are defined in the destination-port parameter. (Range: 0–65535)698
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\ACL.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY
• match-all list-of-flags—List of TCP flags that should occur. If a flag
should be set, it is prefixed by “+”. If a flag should be unset, it is prefixed
by “-”. Available options are +urg, +ack, +psh, +rst, +syn, +fin, -urg, -
ack, -psh, -rst, -syn and -fin. The flags are concatenated to a one string. For
example: +fin-ack.
• time-range-name—Name of the time range that applies to this permit
statement. (Range: 1–32)
Default
No IPv4 access list is defined.
Command Mode
IP Access-list Configuration mode
User Guidelines
Enter IP-access list configuration mode by using the IP Access-list Global
Configuration command.
After an access control entry (ACE) is added to an access control list, an
implied deny any any condition exists at the end of the list. That is, if there
are no matches, the packets are denied. However, before the first ACE is
added, the list permits all packets.
The number of TCP/UDP ranges that can be defined in ACLs is limited. You
can define up to #ASIC-specific ranges for TCP and up to #ASIC-specific
ranges for UDP. If a range of ports is used for source port in ACE it would be
not be counted again if it is also used for source port in another ACE. If a
range of ports is used for destination port in ACE it would be not be counted
again if it is also used for destination port in another ACE.
If a range of ports is used for source port it would be counted again if it is also
used for destination port.
Example
console(config)# ip access-list extended server
console(config-ip-al)# permit ip 1.1.1.0 0.0.0.255 1.1.2.0 0.0.0.0699
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\ACL.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY
deny ( IP )
Use the deny IP Access-list Configuration mode command to set deny
conditions for IPv4 access list.
Syntax
deny protocol {any | source source-wildcard} {any | destination destinationwildcard} [dscp number | precedence number] [time-range time-rangename] [disable-port | log-input]
deny icmp {any | source source-wildcard} {any | destination destinationwildcard{any|icmp-type} {any|icmp-code} [dscp number | precedence
number] [time-range time-range-name] [disable-port | log-input]
deny igmp {any | source source-wildcard} {any | destination destinationwildcard}[igmp-type] [dscp number | precedence number] [time-range
time-range-name] [disable-port | log-input]
deny tcp {any | source source-wildcard} {any|source-port/port-range}{any |
destination destination-wildcard} {any|destination-port/port-range } [dscp
number | precedence number] [match-all list-of-flags] [time-range timerange-name] [disable-port | log-input]
deny udp {any | source source-wildcard} {any|source-port/port-range} {any
| destination destination-wildcard} {any|destination-port/port-range } [dscp
number | precedence number] [match-all time-range-name] [time-range
time-range-name] [disable-port | log-input]
Parameters
• protocol—The name or the number of an IP protocol. Available protocol
names: icmp, igmp, ip, tcp, egp, igp, udp, hmp, rdp, idpr, ipv6, ipv6:rout,
ipv6:frag, idrp, rsvp, gre, esp, ah, ipv6:icmp, eigrp, ospf, ipinip, pim, l2tp,
isis. To match any protocol use the IP keyword. (Range: 0–255)
• source—Source IP address of the packet.
• source-wildcard—Wildcard bits to be applied to the source IP address.
Use 1s in the bit position that you want to be ignored.
• destination—Destination IP address of the packet.
• destination-wildcard—Wildcard bits to be applied to the destination IP
address. Use 1s in the bit position that you want to be ignored.700
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\ACL.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY
• dscp number—Specifies the DSCP value.
• precedence number—Specifies the IP precedence value.
• icmp-type—Specifies an ICMP message type for filtering ICMP packets.
Enter a number or one of the following values: echo-reply, destinationunreachable, source-quench, redirect, alternate-host-address, echorequest, router-advertisement, router-solicitation, time-exceeded,
parameter-problem, timestamp, timestamp-reply, information-request,
information-reply, address-mask-request, address-mask-reply, traceroute,
datagram-conversion-error, mobile-host-redirect, mobile-registrationrequest, mobile-registration-reply, domain-name-request, domain-namereply, skip, photuris. (Range: 0–255)
• icmp-code—Specifies an ICMP message code for filtering ICMP packets.
(Range: 0–255)
• igmp-type—IGMP packets can be filtered by IGMP message type. Enter a
number or one of the following values: host-query, host-report, dvmrp,
pim, cisco-trace, host-report-v2, host-leave-v2, host-report-v3. (Range:
0–255)
• destination-port—Specifies the UDP/TCP destination port. You can
enter range of ports by using hyphen. E.g. 20 - 21. For TCP enter a number
or one of the following values: bgp (179), chargen (19), daytime (13),
discard (9), domain (53), drip (3949), echo (7), finger (79), ftp (21), ftpdata (20), gopher (70), hostname (42), irc (194), klogin (543), kshell (544),
lpd (515), nntp (119), pop2 (109), pop3 (110), smtp (25), sunrpc (1110,
syslog (514), tacacs-ds (49), talk (517), telnet (23), time (37), uucp (117),
whois (43), www (80). For UDP enter a number or one of the following
values: biff (512), bootpc (68), bootps (67), discard (9), dnsix (90), domain
(53), echo (7 ), mobile-ip (434), nameserver (42), netbios-dgm (138),
netbios-ns (137), non500-isakmp (4500), ntp (123), rip (520), snmp 161),
snmptrap (162), sunrpc (111), syslog (514), tacacs-ds (49), talk (517), tftp
(69), time (37), who (513), xdmcp (177). (Range: 0–65535)
• source-port—Specifies the UDP/TCP source port. Predefined port names
are defined in the destination-port parameter. (Range: 0–65535)701
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\ACL.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY
• match-all list-of-flags—List of TCP flags that should occur. If a flag
should be set it is prefixed by “+”.If a flag should be unset it is prefixed by
“-”. Available options are +urg, +ack, +psh, +rst, +syn, +fin, -urg, -ack, -
psh, -rst, -syn and -fin. The flags are concatenated to a one string. For
example: +fin-ack.
• time-range-name—Name of the time range that applies to this permit
statement. (Range: 1–32)
• disable-port—The Ethernet interface is disabled if the condition is
matched.
• log-input—Specifies sending an informational syslog message about the
packet that matches the entry. Because forwarding is done in hardware and
logging is done in software, if a large number of packets match a deny ACE
containing a log-input keyword, the software might not be able to match
the hardware processing rate, and not all packets will be logged.
Default
No IPv4 access list is defined.
Command Mode
IP Access-list Configuration mode
User Guidelines
Enter IP-access list configuration mode by using the IP Access-list Global
Configuration command.
After an access control entry (ACE) is added to an access control list, an
implied deny any any condition exists at the end of the list. That is, if there
are no matches, the packets are denied. However, before the first ACE is
added, the list permits all packets.
The number of TCP/UDP ranges that can be defined in ACLs is limited. You
can define up to #ASIC-specific ranges for TCP and up to #ASIC-specific
ranges for UDP. If a range of ports is used for source port in ACE it would be
not be counted again if it is also used for source port in another ACE. If a
range of ports is used for destination port in ACE it would be not be counted
again if it is also used for destination port in another ACE.
If a range of ports is used for source port, it would be counted again if it is also
used for destination port. 702
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\ACL.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY
Example
console(config)# ip access-list extended server
console(config-ip-al)# deny ip 1.1.1.0 0.0.0.255 1.1.2.0 0.0.0.0
ipv6 access-list
Use the ipv6 access-list global configuration mode command to define an
IPv6 access list and to place the device in IPv6 access list configuration mode.
Use the no form of this command to remove the access list.
Syntax
ipv6 access-list [access-list-name]
no ipv6 access-list [access-list-name]
Parameters
• access-list-name—Name of the IPv6 access list.
• access-list-name—0–32 characters (use "" for empty string)
Default
No IPv6 access list is defined.
Command Mode
Global Configuration mode
User Guidelines
IPv6 ACL is defined by a unique name. IPv4 ACLs, IPv6 ACLs, MAC ACLs
or policy maps cannot have the same name.
Every IPv6 ACL has implicit permit icmp any any nd-ns any, permit icmp
any any nd-na any, and deny ipv6 any any statements as its last match
conditions. (The former two match conditions allow for ICMPv6 neighbor
discovery.)
The IPv6 neighbor discovery process uses the IPv6 network layer service,
therefore, by default, IPv6 ACLs implicitly allow IPv6 neighbor discovery
packets to be sent and received on an interface. In IPv4, the Address
Resolution Protocol (ARP), which is equivalent to the IPv6 neighbor 703
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\ACL.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY
discovery process, uses a separate data link layer protocol; therefore, by
default, IPv4 ACLs implicitly allow ARP packets to be sent and received on an
interface.
Example
Switch (config)# ipv6 access-list acl1
Switch(config-ipv6-acl)# permit tcp 2001:0DB8:0300:0201::/64 any any 80
permit ( IPv6 )
Use the permit command in IPv6 Access-list Configuration mode to set
permit conditions for IPv6 access list.
Syntax
permit protocol {any |{source-prefix/length }{any | destination-
prefix/length } [dscp number | precedence number] [time-range time-rangename]
permit icmp {any | {source-prefix/length }{any | destination- prefix/length }
{any|icmp-type} {any|icmp-code} [dscp number | precedence number]
[time-range time-range-name]
permit tcp {any | {source-prefix/length } {any | source-port/port-range}
}{any | destination- prefix/length } {any| destination-port/port-range} [dscp
number | precedence number] [match-all list-of-flags] [time-range timerange-name]
permit udp {any | {source-prefix/length }} {any | source-port/port-range}
}{any | destination- prefix/length } {any| destination-port/port-range} [dscp
number | precedence number] [time-range time-range-name]
Parameters
• protocol—The name or the number of an IP protocol. Available protocol
names are: icmp (58), tcp (6) and udp (17). To match any protocol, use the
IPv6 keyword. (Range: 0–255)704
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\ACL.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY
• source-prefix/length—The source IPv6 network or class of networks about
which to set permit conditions. This argument must be in the form
documented in RFC 3513 where the address is specified in hexadecimal
using 16-bit values between colons.
• destination-prefix/length—The destination IPv6 network or class of
networks about which to set permit conditions. This argument must be in
the form documented in RFC 3513 where the address is specified in
hexadecimal using 16-bit values between colons.
• dscp number—Specifies the DSCP value. (Range: 0–63)
• precedence number—Specifies the IP precedence value.
• icmp-type—Specifies an ICMP message type for filtering ICMP packets.
Enter a number or one of the following values: destination-unreachable
(1), packet-too-big (2), time-exceeded (3), parameter-problem (4), echorequest (128), echo-reply (129), mld-query (130), mld-report (131),
mldv2-report (143), mld-done (132), router-solicitation (133), routeradvertisement (134), nd-ns (135), nd-na (136). (Range: 0–255)
• icmp-code—Specifies an ICMP message code for filtering ICMP packets.
(Range: 0–255)
• destination-port—Specifies the UDP/TCP destination port. You can
enter a range of ports by using a hyphen. E.g. 20 - 21. For TCP enter a
number or one of the following values: bgp (179), chargen (19), daytime
(13), discard (9), domain (53), drip (3949), echo (7), finger (79), ftp (21),
ftp-data (20), gopher (70), hostname (42), irc (194), klogin (543), kshell
(544), lpd (515), nntp (119), pop2 (109), pop3 (110), smtp (25), sunrpc
(1110, syslog (514), tacacs-ds (49), talk (517), telnet (23), time (37), uucp
(117), whois (43), www (80). For UDP enter a number or one of the
following values: biff (512), bootpc (68), bootps (67), discard (9), dnsix
(90), domain (53), echo (7 ), mobile-ip (434), nameserver (42), netbiosdgm (138), netbios-ns (137), non500-isakmp (4500), ntp (123), rip (520),
snmp (161), snmptrap (162), sunrpc (111), syslog (514), tacacs (49), talk
(517), tftp (69), time (37), who (513), xdmcp (177). (Range: 0–65535)
• source-port—Specifies the UDP/TCP source port. Predefined port names
are defined in the destination-port parameter. (Range: 0–65535)705
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\ACL.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY
• match-all list-of-flag—List of TCP flags that should occur. If a flag should
be set it is prefixed by “+”.If a flag should be unset it is prefixed by “-”.
Available options are +urg, +ack, +psh, +rst, +syn, +fin, -urg, -ack, -psh,
-rst, -syn and -fin. The flags are concatenated to a one string. For example:
+fin-ack.
• time-range-name—Name of the time range that applies to this permit
statement. (Range: 1–32)
Default
No IPv6 access list is defined.
Command Mode
Ipv6 Access-list Configuration mode
User Guidelines
The number of TCP/UDP ranges that can be defined in ACLs is limited. You
can define up to #ASIC-specific ranges for TCP and up to #ASIC-specific
ranges for UDP. If a range of ports is used for a source port in ACE it would be
not be counted again if it is also used for a source port in another ACE. If a
range of ports is used for destination port in ACE it would be not be counted
again if it is also used for destination port in another ACE.
If a range of ports is used for source port it would be counted again if it is also
used for destination port.
Example
console(config)# ipv6 access-list server
console(config-ipv6-al)# permit tcp 3001::2/64 any any 80
deny ( IPv6 )
Use the deny command in IPv6 access list configuration mode to set permit
conditions for IPv6 access list.706
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\ACL.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY
Syntax
deny protocol {any | {source-prefix/length }{any | destination- prefix/length
} [dscp number | precedence number] [time-range time-range-name]
[disable-port | log-input]
deny icmp {any | {source-prefix/length }{any | destination- prefix/length }
{any|icmp-type} {any|icmp-code} [dscp number | precedence number]
[time-range time-range-name] [disable-port | log-input]
deny tcp {any | {source-prefix/length } {any | source-port/port-range} }{any
| destination- prefix/length } {any| destination-port/port-range} [dscp
number | precedence number] [match-all list-of-flags] [time-range timerange-name] [disable-port | log-input]
deny udp {any | {source-prefix/length }} {any | source-port/port-range}
}{any | destination- prefix/length } {any| destination-port/port-range} [dscp
number | precedence number] [time-range time-range-name] [disable-port |
log-input]
Parameters
• protocol—The name or the number of an IP protocol. Available protocol
names are: icmp (58), tcp (6) and udp (17). To match any protocol use the
IPv6 keyword. (Range: 0–255)
• source-prefix/length—The source IPv6 network or class of networks about
which to set permit conditions. This argument must be in the form
documented in RFC 3513 where the address is specified in hexadecimal
using 16-bit values between colons.
• destination-prefix/length—The destination IPv6 network or class of
networks about which to set permit conditions. This argument must be in
the form documented in RFC 3513 where the address is specified in
hexadecimal using 16-bit values between colons.
• dscp number—Specifies the DSCP value. (Range: 0–63)
• precedence number—Specifies the IP precedence value.
• icmp-type—Specifies an ICMP message type for filtering ICMP packets.
Enter a number or one of the following values: destination-unreachable
(1), packet-too-big (2), time-exceeded (3), parameter-problem (4), echo-707
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\ACL.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY
request (128), echo-reply (129), mld-query (130), mld-report (131),
mldv2-report (143), mld-done (132), router-solicitation (133), routeradvertisement (134), nd-ns (135), nd-na (136). (Range: 0–255)
• icmp-code—Specifies an ICMP message code for filtering ICMP packets.
(Range: 0–255)
• destination-port—Specifies the UDP/TCP destination port. You can
enter a range of ports by using a hyphen. E.g. 20 - 21. For TCP enter a
number or one of the following values: bgp (179), chargen (19), daytime
(13), discard (9), domain (53), drip (3949), echo (7), finger (79), ftp (21),
ftp-data 20), gopher (70), hostname (42), irc (194), klogin (543), kshell
(544), lpd (515), nntp (119), pop2 (109), pop3 (110), smtp (25), sunrpc
(1110, syslog (514), tacacs-ds (49), talk (517), telnet (23), time (37), uucp
(117), whois (43), www (80). For UDP enter a number or one of the
following values: biff (512), bootpc (68), bootps (67), discard (9), dnsix
(90), domain (53), echo (7 ), mobile-ip (434), nameserver (42), netbiosdgm (138), netbios-ns (137), non500-isakmp (4500), ntp (123), rip (520),
snmp (161), snmptrap (162), sunrpc (111), syslog (514), tacacs (49), talk
(517), tftp (69), time (37), who (513), xdmcp (177). (Range: 0–65535)
• source-port—Specifies the UDP/TCP source port. Predefined port names
are defined in the destination-port parameter. (Range: 0–65535)
• match-all list-of-flags—List of TCP flags that should occur. If a flag
should be set it is prefixed by “+”.If a flag should be unset it is prefixed by
“-”. Available options are +urg, +ack, +psh, +rst, +syn, +fin, -urg, -ack, -
psh, -rst, -syn and -fin. The flags are concatenated to a one string. For
example: +fin-ack.
• time-range-name—Name of the time range that applies to this permit
statement. (Range: 1–32)
• disable-port—The Ethernet interface would be disabled if the condition
is matched.
• log-input—Specifies to send an informational syslog message about the
packet that matches the entry. Because forwarding is done in hardware and
logging is done in software, if a large number of packets match a deny ACE
containing a log-input keyword, the software might not be able to match
the hardware processing rate, and not all packets will be logged.708
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\ACL.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY
Default
No IPv6 access list is defined.
Command Mode
IPv6 Access-list Configuration mode
User Guidelines
The number of TCP/UDP ranges that can be defined in ACLs is limited. You
can define up to #ASIC-specific ranges for TCP and up to #ASIC-specific
ranges for UDP. If a range of ports is used for source port in ACE it would be
not be counted again if it is also used for source port in another ACE. If a
range of ports is used for a destination port in ACE it would be not be
counted again if it is also used for a destination port in another ACE.
If a range of ports is used for source port it would be counted again if it is also
used for destination port.
Example
console(config)# ipv6 access-list server
console(config-ipv6-al)# deny tcp 3001::2/64 any any 80
mac access-list
Use the mac access-list Global Configuration mode command to define a
Layer 2 access list and to place the device in MAC Access List Configuration
mode. Use the no form of this command to remove the access list.
Syntax
mac access-list extended access-list-name
no mac access-list extended access-list-name
Parameters
access-list-name—Specifies the name of the MAC access list. (Range: accesslist-name0–32 characters - use "" for empty string)
Default
No MAC access list is defined.709
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\ACL.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY
Command Mode
Global Configuration mode
User Guidelines
MAC ACLs are defined by a unique name. IPv4 ACLs, IPv6 ACLs, MAC
ACLs or policy maps cannot have the same name.
Example
console(config)# mac access-list extended server1
permit ( MAC )
Use the permit command in MAC Access List Configuration mode to set
permit conditions for an MAC access list,.
Syntax
permit {any | source source-wildcard} {any | destination destination-wildcard} [eth-type
0| aarp | amber | dec-spanning | decnet-iv | diagnostic | dsm | etype-6000] [vlan vlan-id]
[cos cos cos-wildcard] [time-range time-range-name]
Parameters
• source—Source MAC address of the packet.
• source-wildcard—Wildcard bits to be applied to the source MAC address.
Use 1s in the bit position that you want to be ignored.
• destination—Destination MAC address of the packet.
• destination-wildcard—Wildcard bits to be applied to the destination
MAC address. Use 1s in the bit position that you want to be ignored.
• eth-type—The Ethernet type in hexadecimal format of the packet.
• vlan-id—The VLAN ID of the packet. (Range: 1–4094)
• cos—The Class of Service of the packet. (Range: 0–7)
• cos-wildcard—Wildcard bits to be applied to the CoS.
• time-range-name—Name of the time range that applies to this permit
statement. (Range: 1–32)710
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\ACL.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY
Default
No MAC access list is defined.
Command Mode
MAC Access-list Configuration mode
User Guidelines
Enter MAC-access list configuration mode by using the MAC Access-list
Global Configuration command.
After an access control entry (ACE) is added to an access control list, an
implied deny any any condition exists at the end of the list. That is, if there
are no matches, the packets are denied. However, before the first ACE is
added, the list permits all packets.
Example
console(config)# mac access-list extended server1
console(config-mac-al)# permit 00:00:00:00:00:01 00:00:00:00:00:ff any
service-acl input
Use the service-acl input command in Interface Configuration mode to
control access to an interface. Use the no form of this command to remove
the access control.
Syntax
service-acl input acl-name1 [acl-name2]
no service-acl input
Parameters
acl-name—Specifies an ACL to apply to the interface. See the usage
guidelines. (Range: acl-name 0–32 characters. Use "" for empty string)
Default
No ACL is assigned.711
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\ACL.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY
Command Mode
Interface Configuration (Ethernet, Port-Channel) mode.
User Guidelines
IPv4 ACLs and IPv6 ACLs can be bound together to an interface.
MAC ACLs cannot be bound on an interface with an IPv4 ACL or IPv6 ACL.
Two ACLs of the same type cannot be added to a port.
An ACL cannot be added to a port that is already bounded to an ACL,
without first removing the current ACL and binding the two ACLs together.
Example
console(config)# mac access-list extended server
console(config-mac-al)# permit 00:00:00:00:00:01 00:00:00:00:00:ff any
console(config-mac-al)# exit
console(config)# interface gi1/0/1
console(config-if)# service-acl input server
service-acl output
Use the service-acl output command in Interface Configuration mode to
control access to an interface on the egress (transmit path). Use the no form
of this command to remove the access control.
Syntax
service-acl output acl-name1 [acl-name2]
no service-acl output
Parameters
acl-name—Specifies an ACL to apply to the interface. See the Usage
Guidelines. Range: acl-name –32 characters. Use "" for empty string
Default
No ACL is assigned.712
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\ACL.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY
Command Mode
Interface Configuration (Ethernet, Port-Channel) mode.
User Guidelines
The deny rule actions: log-input and disable-port are not supported. Using
these actions will result in an error.
IPv4 ACLs and IPv6 ACLs can be bound together on an interface.
A MAC ACL cannot be bound on an interface together with an IPv4 ACL or
IPv6 ACL.
Two ACLs of the same type cannot be added to a port.
An ACL cannot be added to a port that is already bound to an ACL, without
first removing the current ACL and binding the two ACLs together
Example
console(config)# mac access-list extended server
console(config-mac-al)# permit 00:00:00:00:00:01 00:00:00:00:00:ff any
console(config-mac-al)# exit
console(config)# interface gi1/0/1
console(config-if)# service-acl output server
service-acl input block
Use the service-acl input block Interface Configuration mode commands to
discard packets that are classified to specific protocols. Use the no form of
those commands to disable discarding of the packets.
Syntax
service-acl input protocol1 [protocol2 … protocol6]
no service-acl input
Parameters
protocol—Specifies a protocol to filter. Available values are: blockcdp,
blockvtp, blockdtp, blockudld, blockpagp, blocksstp, and blockall.713
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\ACL.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY
Default Configuration
No protocol is defined
Command Mode
Interface Configuration ((Ethernet, Port-Channel) mode
User Guidelines
To define multiple protocols on the same interface, define them in the same
command.
To change configuration of the protocol filtering for an interface, first remove
the current assignment of protocol filtering assignment, and then assign the
new configuration of the protocol filtering.
If Proprietary Protocol Filtering rules are assigned on an interface, you cannot
assign ACL or Policy Map or Security suite rules to that interface and enable
802.1X Dynamic Policy Assignment to that interface.
If ACL or Policy Map or Security suite rules are assigned to an interface or
802.1X Dynamic Policy Assignment is enabled for an interface, you cannot
assign Proprietary Protocol Filtering rules to that interface.
The following table defines the DA and protocol types of the packets that are
subject for discarding per each command:
Example
Console (Config-if)# service-acl input blockcdp blockvtp
Command Destination Address Protocol Type
blockcdp 0100.0ccc.cccc 0x2000
blockvtp 0100.0ccc.cccc 0x2003
blockdtp 0100.0ccc.cccc 0x2004
blockudld 0100.0ccc.cccc 0x0111
blockpagp 0100.0ccc.cccc 0x0104
blocksstp 0100.0ccc.cccd -
blockall 0100.0ccc.ccc0 - 0100.0ccc.cccf -714
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\ACL.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY
time-range
Use the time-range global configuration mode command to enable TimeRange Configuration mode and define time ranges for functions (such as
access lists). Use the no form of this command To remove the time range
configuration.
Syntax
time-range time-range-name
no time-range time-range-name
Parameters
time-range-name—Specifies the name for the time range. (Range: 1–32
characters)
Default
No time range is defined
Command Mode
Global Configuration mode
User Guidelines
After the time-range command, use the periodic time-range configuration
command and the absolute time-range configuration command. Multiple
periodic commands are allowed in a time range. Only one absolute command
is allowed.
If a time-range command has both absolute and periodic values specified, the
periodic items are evaluated only after the absolute start time is reached, and
are not further evaluated after the absolute end time is reached.
All time specifications are interpreted as local time.
To ensure that the time range entries take effect at the desired times, the
software clock should be set by the user or by SNTP. If the software clock is
not set by the user or by SNTP, time range ACEs are not activated.
The user cannot delete a time-range that is bounded to an ACE or to any
other feature.715
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\ACL.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY
Example
Console (config)# time-range http-allowed
Console (config-time-range)# absolute start 12:00 1 jan 2005 end 12:00 31
dec 2005 Console (config-time-range)# periodic monday 8:00 to friday 20:00
absolute
Use the absolute Time-range Configuration mode command to specify an
absolute time when a time range is in effect. Use the no form of this
command To remove the time limitation.
Syntax
absolute start hh:mm day month year
no absolute start
absolute end hh:mm day month year
no absolute end
Parameters
• start—Absolute time and date that the permit or deny statement of the
associated access list starts going into effect. If no start time and date are
specified, the permit or deny statement is in effect immediately.
• end—Absolute time and date that the permit or deny statement of the
associated access list is no longer in effect. If no end time and date are
specified, the permit or deny statement is in effect indefinitely.
• hh:mm—Time in hours (military format) and minutes (Range: 0–23, mm:
0–5)
• day—Day (by date) in the month. (Range: 1–31)
• month—Month (first three letters by name). (Range: Jan...Dec)
• year—Year (no abbreviation) (Range: 2000–2097)
Default
There is no absolute time when the time range is in effect. 716
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\ACL.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY
Command Mode
Time-Range Configuration mode
periodic
Use the periodic Time-Range Configuration mode command to specify a
recurring (weekly) time range for functions that support the time-range
feature. Use the no form of this command to remove the time limitation.
Syntax
periodic day-of-the-week hh:mm to day-of-the-week hh:mm
no periodic day-of-the-week hh:mm to day-of-the-week hh:mm
periodic list hh:mm to hh:mm day-of-the-week1 [day-of-the-week2… day-ofthe-week7]
no periodic list hh:mm to hh:mm day-of-the-week1 [day-of-the-week2… dayof-the-week7]
periodic list hh:mm to hh:mm all
no periodic list all hh:mm to hh:mm all
Parameters
• day-of-the-week—The starting day that the associated time range is in
effect. The second occurrence is the ending day the associated statement
is in effect. The second occurrence can be the following week (see
description in the User Guidelines). Possible values are: Monday, Tuesday,
Wednesday, Thursday, Friday, Saturday, and Sunday.
• hh:mm—The first occurrence of this argument is the starting
hours:minutes (military format) that the associated time range is in effect.
The second occurrence is the ending hours:minutes (military format) the
associated statement is in effect. The second occurrence can be at the
following day (see description in the User Guidelines). (Range: 0–23, mm:
0–59)
• list day-of-the-week1—Specifies a list of days that the time range is in
effect.717
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\ACL.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY
Default
There is no periodic time when the time range is in effect.
Command Mode
Time-range Configuration mode
User Guidelines
The second occurrence of the day can be at the following week. E.g.
Thursday–Monday means that the time range is effective on Thursday,
Friday, Saturday, Sunday, and Monday.
The second occurrence of the time can be at thefollowing day. E.g.
“22:00–2:00”.
show time-range
Use the show time-range EXEC command To display the time range
configuration.
Syntax
show time-range time-range-name
Parameters
time-range-name—Specifies the name of the time range. (Range: 1–32)
Command Mode
EXEC mode
Example
Console# show time-range
http-allowed
--------------
absolute start 12:00 1 jan 2005
absolute end 12:00 31 dec 2005
periodic monday 8:00 to friday 20:00718
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\ACL.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY
show access-lists
Use the show access-lists Privileged EXEC mode command to display access
control lists (ACLs) configured on the switch.
Syntax
show access-lists [name | access-list-number]
show access-lists time-range-active [name]
Parameters
• name—Specifies the name of the ACL.
• access-list-number—Specifies the number of the IP standard ACL list.
• time-range-active—Shows only the Access Control Entries (ACEs) that
their time-range is currently active (including those that are not associated
with time-range).
Command Mode
Privileged EXEC mode
Example
Switch# show access-lists
Router# show access-lists
Standard IP access list 1
deny any
Standard IP access list 2
deny 192.168.0.0, wildcard bits 0.0.0.255
permit any
Standard IP access list 3
deny 0.0.0.0
deny 192.168.0.1, wildcard bits 0.0.0.255
permit any
Standard IP access list 4
permit 0.0.0.0
permit 192.168.0.2, wildcard bits 0.0.0.255719
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\ACL.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY
Extended IP access list ACL1
permit 234 172.30.40.1 0.0.0.0 any
permit 234 172.30.8.8 0.0.0.0 any
Extended IP access list ACL2
permit 234 172.30.19.1 0.0.0.255 any time-range weekdays
permit 234 172.30.23.8 0.0.0.255 any time-range weekends
Switch# show access-lists time-range-active
Extended IP access list ACL1
permit 234 172.30.40.1 0.0.0.0 any
permit 234 172.30.8.8 0.0.0.0 any
Extended IP access list ACL2
permit 234 172.30.19.1 0.0.0.255 any time-range weekdays
Switch# show access-lists
show interfaces access-lists
Use the show interfaces access-lists Privileged EXEC mode command to
display access lists applied on interfaces.
Syntax
show interfaces access-lists [interface-id ]
Parameters
interface-id—Specifies an interface ID. The interface ID can be one of the
following types: Ethernet port, Port-channel or VLAN.
Command Mode
Privileged EXEC mode720
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\ACL.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY
Example
Console# show interfaces access-lists
Interface ACL
---------- ---------
gi1/0/1 Ingress: ip,ipv6
Egress : mac
gi1/0/4 Egress : mac
gi1/0/5 Ingress: ip
clear access-lists counters
Use the Clear Access-lists Counters Privileged EXEC mode command to
clear access-lists counters.
Syntax
clear access-lists counters [interface-id]
Parameters
interface-id—Specifies an interface ID. The interface ID can be one of the
following types: Ethernet port or Port-channel.
Command Mode
Privileged EXEC mode
Example
console# clear access-lists counters gi1/0/1
show interfaces access-lists counters
Use the show interfaces access-lists counters Privileged EXEC mode
command to display Access List counters.721
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\ACL.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY
Syntax
show interfaces access-lists counters [ ethernet interface | port-channel portchannel-number ]
Parameters
interface-id—Specifies an interface ID. The interface ID can be one of the
following types: Ethernet port or Port-channel.
Command Mode
Privileged EXEC mode
User Guidelines
The counter of deny ACE hits counts only ACEs with the log-input keyword.
Because forwarding is done in hardware and counting is done in software, if a
large number of packets match a deny ACE containing a log-input keyword,
the software might not be able to match the hardware processing rate, and
some packets might not be counted.
Example
console# show interfaces access-lists counters
Interface Deny ACE hits
--------- -------------
gi1/0/1 79
gi1/0/2 9
gi1/0/3 0
Number of hits that were counted in global counter (due to lack of
resources) =19722
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\ACL.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LYQuality of Service (QoS) Commands 723
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\QoS.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
45
Quality of Service (QoS) Commands
qos
Use the qos Global Configuration mode command to enable Quality of
Service (QoS) on the device. Use the no form of this command to disable
QoS on the device
Syntax
qos [basic | advanced ]
no qos
Parameters
• basic—QoS basic mode. If no option is specified, the QoS mode defaults
to the basic mode.
• advanced—Specifies the QoS advanced mode, which enables the full
range of QoS configuration.
Default Configuration
If the qos command is entered without any parameters, the QoS basic mode
is enabled.
Command Mode
Global Configuration mode
Example
The following example enables the QoS basic mode on the device.
Console(config)# qos basic724 Quality of Service (QoS) Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\QoS.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
show qos
Use the show qos EXEC mode command to display the Quality of Service
(QoS) mode for the device. The trust mode is displayed for the QoS basic
mode.
Syntax
show qos
Parameters
This command has no arguments or keywords.
Default Configuration
Disabled Command Mode
Command Mode
EXEC mode
User Guidelines
Trust mode is displayed if QoS is enabled in basic mode.
Example
The following example displays QoS attributes when QoS is enabled in basic
mode on the device and the advanced mode is supported.
Console> show qos
Qos: basic
Basic trust: dscp
The following example displays QoS attributes when QoS is enabled in basic
mode on the device and the advanced mode is not supported.
Console> show qosQuality of Service (QoS) Commands 725
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\QoS.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Qos: disable
Trust: dscp
class-map
Use the class-map Global Configuration mode command to create or modify
a class map and enters the Class-map Configuration mode. Use the no form
of this command todelete a class map.
Syntax
class-map class-map-name [match-all | match-any]
no class-map class-map-name
Parameters
• class-map-name—Specifies the class map name.
• match-all—Performs a logical AND of all the matching statements under
this class map. All match criteria in this class map must be matched.
• match-any—Performs a logical OR of all the matching statements under
this class map. One or more match criteria in this class map must be
matched.
Default Configuration
If neither match-all nor match-any is specified, the match-all parameter is
selected by default.
Command Mode
Global Configuration mode
User Guidelines
The class-map Global Configuration mode command specifies the name of
the class map for which class-map match criteria are to be created or modified
and enters class-map configuration mode. In this mode, up to two match
commands can be entered to configure the match criteria for this class. When
using two match commands, each has to point to a different type of ACL
(one IP and one MAC). The classification is by first match, therefore, the 726 Quality of Service (QoS) Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\QoS.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
order is important. The class-map command and its subcommands are used
to define packet classification, marking, and aggregate policing as part of a
globally named service policy applied on a per-interface basis. If there is more
than one match statement in a match-all class map and if there is a repetitive
classification field in the participating ACLs, an error message is generated.
After entering the Quality of Service (QoS) Class-map Configuration mode,
the following configuration commands are available:
exit: Exits the QoS Class-map Configuration mode.
match: Configures classification criteria.
no: Removes a match statement from a class map.
Example
The following example creates a class map called Class1 and configures it to
check that packets match all classification criteria in the class map match
statement.
Console(config)# class-map class1 match-all
Console(config-cmap)#
show class-map
The show class-map EXEC mode command displays all class maps.
Syntax
show class-map [class-map-name]
Parameters
class-map-name—Specifies the name of the class map to be displayed.
Command Mode
EXEC mode
Example
The following example displays the class map for Class1.Quality of Service (QoS) Commands 727
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\QoS.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Console> show class-map class1
Class Map match-any class1 (id4)
Match Ip dscp 11 21
match
Use the match Class-map Configuration mode command to define the
match criteria for classifying traffic. Use the no form of this command to
delete the match criteria.
Syntax
match access-group acl-name
no match access-group acl-name
Parameters
acl-name—Specifies the MAC or IP Access Control List (ACL) name.
Default Configuration
No match criterion is supported.
Command Mode
Class-map Configuration mode.
Example
The following example defines the match criterion for classifying traffic as an
access group called Enterprise in a class map called Class1.
Console(config)# class-map class1
Console(config-cmap)# match access-group enterprise
policy-map
Use the policy-map Global Configuration mode command to creates a policy
map and enter the Policy-map Configuration mode. Use the no form of this
command to delete a policy map.728 Quality of Service (QoS) Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\QoS.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Syntax
policy-map policy-map-name
no policy-map policy-map-name
Parameters
policy-map-name—Specifies the policy map name.
Default Configuration
The default behavior of the policy map is to set the DSCP value to 0 if the
packet is an IP packet, and to set the CoS value to 0 if the packet is tagged.
Command Mode
Global Configuration mode
User Guidelines
Use the policy-map Global Configuration mode command to specify the
name of the policy map to be created, added to, or modified before
configuring policies for classes whose match criteria are defined in a class
map.
Entering the policy-map Global Configuration mode command also enables
configuring or modifying the class policies for that policy map. Class policies
in a policy map can be configured only if the classes have match criteria
defined for them. Use the class-map Global Configuration mode and match
Class-map Configuration mode commands to configure the match criteria for
a class.
The match criteria is for a class. Only one policy map per interface per
direction is supported. The same policy map can be applied to multiple
interfaces and directions.
Example
The following example creates a policy map called Policy1 and enters the
Policy-map Configuration mode.
Console(config)# policy-map policy1
Console(config-pmap)#Quality of Service (QoS) Commands 729
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\QoS.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
class
The class Policy-map Configuration mode command defines a traffic
classification and enters the Policy-map Class Configuration mode. Use the
no form of this command to detach a class map from the policy map.
Syntax
class class-map-name [access-group acl-name]
no class class-map-name
Parameters
• class-map-name—Specifies the name of an existing class map. If the class
map does not exist, a new class map is created under the specified name.
• acl-name—Specifies the name of an IP or MAC Access Control List
(ACL).
Default Configuration
No class map is defined for the policy map.
Command Mode
Policy-map Configuration mode
User Guidelines
Use the policy-map Global Configuration mode command to identify the
policy map and to enter the Policy-map Configuration mode before using the
class command. After specifying a policy map, a policy for new classes can be
configured or a policy for any existing classes in that policy map can be
modified.
Use the service-policy Interface Configuration (Ethernet, Port-channel)
mode command to attach a policy map to an interface. Use an existing class
map to attach classification criteria to the specified policy map and use the
access-group parameter to modify the classification criteria of the class map.
If this command is used to create a new class map, the name of an IP or MAC
ACL must also be specified with the access-group parameter.730 Quality of Service (QoS) Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\QoS.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
The following example defines a traffic classification called Class1 with an
access-group called Enterprise. The class is in a policy map called policy1.
Console(config)# policy-map policy1
Console(config-pmap)# class class1 access-group enterprise
show policy-map
Use the show policy-map EXEC mode command to display all policy maps or
a specific policy map.
Syntax
show policy-map [policy-map-name]
Parameters
policy-map-name—Specifies the policy map name.
Command Mode
EXEC mode
Example
The following example displays all policy maps.
Console> show policy-map
Policy Map policy1
class class1
set Ip dscp 7
Policy Map policy2
class class 2
police 96000 4800 exceed-action drop
class class3
police 124000 96000 exceed-action policed-dscp-transmitQuality of Service (QoS) Commands 731
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\QoS.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
trust
Use the trust Policy-map Class Configuration mode command to configure
the trust state, which selects the value that QoS uses as the source of the
internal DSCP value. Use the no form of this command to return to the
default trust state.
Syntax
trust cos-dscp
no trust
Parameters
cos-dscp—Specifies that if the packet is IP, then QoS acts as for dscp;
otherwise QoS acts as for cos.
Default Configuration
The default state is untrusted.
If the trust command is specified with no parameters, the default mode is
dscp.
Command Mode
Policy-map Class Configuration mode
User Guidelines
Use this command to distinguish the Quality of Service (QoS) trust behavior
for certain traffic from others. For example, incoming traffic with certain
DSCP values can be trusted. A class map can be configured to match and
trust the DSCP values in the incoming traffic.
Trust values set with this command supersede trust values set on specific
interfaces with the qos trust Interface Configuration mode command.
The trust command and the set Policy-map Class Configuration mode
command are mutually exclusive within the same policy map.
Policy maps that contain set or trust Policy-map Class Configuration mode
commands cannot be attached, or that have Access Control List (ACL)
classification to an egress interface by using the service-policy Interface
Configuration mode command.732 Quality of Service (QoS) Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\QoS.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
If specifying trust cos, QoS maps a packet to a queue, the received or default
port CoS value, and the CoS-to-queue map.
If specifying trust dscp, QoS maps the packet using the DSCP value from the
ingress packet.
If specifying tcp-udp-port, QoS maps the packet to a queue using the
TCP\UDP port value from the ingress packet and the tcp-udp-port-to-queue
map.
Example
The following example creates an ACL, places it into a class map, places the
class map into a policy map and configures the trust state using the DSCP
value in the ingress packet.
console(config)# mac access-list extended m1
console(config-mac-al)# permit any any
console(config-mac-al)# exit
console(config)# class-map c1
console(config-cmap)# match access-group m1
console(config-cmap)# exit
console(config)# policy-map p1
console(config-pmap)# class c1
console(config-pmap-c)# trust cos-dscp
set
Use the set Policy-map Class Configuration mode command to set new
values in the IP packet.
Syntax
set {dscp new-dscp | queue queue-id | cos new-cos}
no set
Parameters
• dscp new-dscp—Specifies the new DSCP value for the classified traffic.
(Range: 0–63)Quality of Service (QoS) Commands 733
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\QoS.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
• queue queue-id—Specifies the explicit queue id to set the egress queue.
• cos new-cos—Specifies the new User priority to be marked in the packet.
(Range: 0–7)
Command Mode
Policy-map Class Configuration mode
User Guidelines
This command and the trust Policy-map Class Configuration mode
command are mutually exclusive within the same policy map.
Policy maps that contain set or trust Policy-map Class Configuration mode
commands or that have ACL classifications cannot be attached to an egress
interface using the Service-policy Interface Configuration mode command.
To return to the Policy-map Configuration mode, use the exit command. To
return to the Privileged EXEC mode, use the end command.
Example
The following example creates an ACL, places it into a class map, places the
class map into a policy map and sets the DSCP value in the packet to 56 for
classes in policy map called p1.
console(config)# mac access-list extended m1
console(config-mac-al)# permit any any
console(config-mac-al)# exit
console(config)# class-map c1
console(config-cmap)# match access-group m1
console(config-cmap)# exit
console(config)# policy-map p1
console(config-pmap)# class c1
Console(config-pmap-c)# set dscp 56
police
Use the police Policy-map Class Configuration mode command to define the
policer for classified traffic. Use the no form of this command to remove a
policer.734 Quality of Service (QoS) Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\QoS.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Syntax
police committed-rate-kbps committed-burst-byte [exceed-action {drop |
policed-dscp-transmit}]
no police
Parameters
• committed-rate-kbps—Specifies the average traffic rate (CIR) in kbits per
second (bps). (Range: 3–12582912)
• committed-burst-byte—Specifies the normal burst size (CBS) in bytes.
(Range: 3000–19173960)
• exceed-action {drop | policed-dscp-transmit}—Specifies the action taken
when the rate is exceeded. The possible values are:
• drop—Drops the packet.
• policed-dscp-transmit—Remarks the packet DSCP, according to the
policed-DSCP map as configured by the qos map policed-dscp Global
Configuration mode command.
Command Mode
Policy-map Class Configuration mode
User Guidelines
Policing uses a token bucket algorithm. CIR represents the speed with which
the token is removed from the bucket. CBS represents the depth of the
bucket.
Example
The following example defines a policer for classified traffic. When the traffic
rate exceeds 124,000 kbps or the normal burst size exceeds 9600 bytes, the
packet is dropped. The class is called Class1 and is in a policy map called
Policy1.
Console(config)# policy-map policy1
Console(config-pmap)# class class1
Console(config-pmap-c)# police 124000 9600 exceed-action dropQuality of Service (QoS) Commands 735
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\QoS.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
service-policy
Use the service-policy Interface Configuration (Ethernet, VLAN, Portchannel) mode command to apply a policy map to the input of a particular
interface. Use the no form of this command to detach a policy map from an
interface.
Syntax
service-policy input policy-map-name
no service-policy input
Parameters
policy-map-name—Specifies the policy map name to apply to the input
interface. (Length: 1–32 characters)
Command Mode
Interface Configuration (Ethernet, VLAN, Port-channel) mode
User Guidelines
Only one policy map per interface per direction is supported.
Example
The following example attaches a policy map called Policy1 to the input
interface.
Console(config-if)# service-policy input policy1
qos aggregate-policer
Use the qos aggregate-policer Global Configuration mode command to
define the policer parameters that can be applied to multiple traffic classes.
Use the no form of this command to remove an existing aggregate policer.
Syntax
qos aggregate-policer aggregate-policer-name committed-rate-kbps excessburst-byte [exceed-action {drop | policed-dscp-transmit}]736 Quality of Service (QoS) Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\QoS.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
no qos aggregate-policer aggregate-policer-name
Parameters
• aggregate-policer-name—Specifies the aggregate policer name.
• committed-rate-kbps—Specifies the average traffic rate (CIR) in kbits per
second (kbps). (Range: 3–57982058)
• excess-burst-byte—Specifies the normal burst size (CBS) in bytes. (Range:
3000–19173960)
• exceed-action {drop | policed-dscp-transmit}—Specifies the action taken
when the rate is exceeded. The possible values are:
• drop—Drops the packet.
• policed-dscp-transmit—Remarks the packet DSCP.
Default Configuration
No aggregate policer is defined.
Command Mode
Global Configuration mode
User Guidelines
Define an aggregate policer if the policer is shared with multiple classes.
Policers in one port cannot be shared with other policers in another device.
Traffic from two different ports can be aggregated for policing purposes.
An aggregate policer can be applied to multiple classes in the same policy
map. An aggregate policer cannot be applied across multiple policy maps.
An aggregate policer cannot be deleted if it is being used in a policy map. The
no police aggregate Policy-map Class Configuration mode command must
first be used to delete the aggregate policer from all policy maps before using
the no mls qos aggregate-policer command.
Policing uses a token bucket algorithm. CIR represents the speed with which
the token is removed from the bucket. CBS represents the depth of the
bucket.Quality of Service (QoS) Commands 737
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\QoS.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
The following example defines the parameters of a policer called Policer1 that
can be applied to multiple classes in the same policy map. When the average
traffic rate exceeds 124,000 kbps or the normal burst size exceeds 9600 bytes,
the packet is dropped.
Console(config)# qos aggregate-policer policer1 124000 9600
exceed-action drop
show qos aggregate-policer
Use the show qos aggregate-policer EXEC mode command to display the
aggregate policer parameter.
Syntax
show qos aggregate-policer [aggregate-policer-name]
Parameters
aggregate-policer-name—Specifies the aggregate policer name.
Command Mode
EXEC mode
Example
The following example displays the parameters of the aggregate policer called
Policer1.
Console> show qos aggregate-policer policer1
aggregate-policer policer1 96000 4800 exceed-action drop
not used by any policy map
police aggregate
Use the police aggregate Policy-map Class Configuration mode command to
apply an aggregate policer to multiple classes within the same policy map. Use 738 Quality of Service (QoS) Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\QoS.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
the no form of this command to remove an existing aggregate policer from a
policy map.
Syntax
police aggregate aggregate-policer-name
no police aggregate aggregate-policer-name
Parameters
aggregate-policer-name—Specifies the aggregate policer name.
Command Mode
Policy-map Class Configuration mode
User Guidelines
An aggregate policer can be applied to multiple classes in the same policy
map. An aggregate policer cannot be applied across multiple policy maps or
interfaces.
Use the exit command to return to the Policy-map Configuration mode. Use
the end command to return to the Privileged EXEC mode.
Example
The following example applies the aggregate policer called Policer1 to a class
called Class1 in a policy map called Policy1.
Console(config)# policy-map policy1
Console(config-pmap)# class class1
Console(config-pmap-c)# police aggregate policer1
wrr-queue cos-map
Use the wrr-queue cos-map Global Configuration mode command maps
Class of Service (CoS) values to a specific egress queue. Use the no form of
this command to restore the default configuration.
Syntax
wrr-queue cos-map queue-id cos0 ... cos7Quality of Service (QoS) Commands 739
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\QoS.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
no wrr-queue cos-map [queue-id]
Parameters
• queue-id—Specifies the queue number to which the CoS values are
mapped.
• cos0 ... cos7—Specifies up to 7 CoS values to map to the specified queue
number. (Range: 1–7)
Default Configuration
The default CoS value mapping to 8 queues is as follows:
CoS value 0 is mapped to queue 3.
CoS value 1 is mapped to queue 1.
CoS value 2 is mapped to queue 2.
CoS value 3 is mapped to queue 4.
CoS value 4 is mapped to queue 5.
CoS value 5 is mapped to queue 6.
CoS value 6 is mapped to queue 7.
CoS value 7 is mapped to queue 8.
Command Mode
Global Configuration mode
User Guidelines
Use this command to distribute traffic to different queues, where each queue
is configured with different weighted round robin (WRR) and Weighted
Random Early Detection (WRED) parameters.
The expedite queues are enabled using the priority-queue out Interface
Configuration mode commans
Example
The following example maps CoS value 7 to queue 2.
Console(config)# wrr-queue cos-map 2 7740 Quality of Service (QoS) Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\QoS.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
wrr-queue bandwidth
Use the wrr-queue bandwidth global Configuration command to assign
Weighted Round Robin (WRR) weights to egress queues. The weight ratio
determines the frequency at which the packet scheduler removes packets
from each queue. Use the no form of this command to restore the default
configuration.
Syntax
wrr-queue bandwidth weight1 weight2 ... weight_n
no wrr-queue bandwidth
Parameters
weight1 weight2 ... weight_n—Specifies the ratio of the bandwidth assigned
by the WRR packet scheduler to the packet queues. Separate values by a
space. (Range: 0–255)
Default Configuration
wrr is disabled by default. The default wrr weight is '1' for all queues.
Command Mode
Global Configuration mode
User Guidelines
The ratio for each queue is defined as the queue weight divided by the sum of
all queue weights (the normalized weight). This sets the bandwidth
allocation of each queue.
A weight of 0 indicates that no bandwidth is allocated for the same queue,
and the shared bandwidth is divided among the remaining queues. It is not
recommended to set the weight of a queue to a 0 as it might stop
transmission of control-protocols packets generated by the device.
All eight queues participate in the WRR, excluding the expedite queues, in
which case the corresponding weight is ignored (not used in the ratio
calculation). The expedite queue is a priority queue; it is serviced until empty
before the other queues are serviced. The expedite queues are enabled by
using the priority-queue out Interface Configuration mode command.Quality of Service (QoS) Commands 741
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\QoS.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
The followin 7 WRR queues.
Console(config)# wrr-queue bandwidth 6 6 6 6 6 6 6 6
priority-queue out num-of-queues
Use the priority-queue out num-of-queues Global Configuration mode
command to configure the number of expedite queues. Use the no form of
this command to restore the default configuration.
Syntax
priority-queue out num-of-queues number-of-queues
no priority-queue out num-of-queues
Parameters
number-of-queues—Specifies the number of expedite queues. Expedite
queues have higher indexes. (Range: 0–8). If number-of-queues = 0, all
queues are assured forwarding. If number-of-queues = 8, all queues are
expedited.
Default Configuration
All queues are expedite queues.
Command Mode
Global Configuration mode
User Guidelines
While configuring the priority-queue num-of-queues command, the
weighted round robin (WRR) weight ratios are affected because there are
fewer queues participating in WRR. This indicates that the corresponding
weight in the wrr-queue bandwidth Interface Configuration mode command
is ignored (not used in the ratio calculation).742 Quality of Service (QoS) Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\QoS.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
The following example configures the number of expedite queues as 2.
Console(config)# priority-queue out num-of-queues 2
traffic-shape
Use the traffic-shape Interface Configuration (Ethernet, Port-channel) mode
command to configure the egress port shaper. Use the no form of this
command to disable the shaper.
Syntax
traffic-shape committed-rate [committed-burst]
no traffic-shape
Parameters
• committed-rate—Specifies the average traffic rate (CIR) in kbits per
second (kbps). (Range: FE, GE: 64kbps–maximum port speed; 10GE:
64Kbps–maximum port speed)
• committed-burst—Specifies the excess burst size (CBS) in bytes. (Range:
4KB –16MB)
Default Configuration
The shaper is disabled.
Command Mode
Interface Configuration (Ethernet, Port-channel) mode
Example
The following example sets a shaper on gigabitethernet port 1/0/5 on queue
1 when the average traffic rate exceeds 124000 kbps or the normal burst size
exceeds 9600 bytes.
Console(config)# interface gi1/0/5
Console(config-if)# traffic-shape 1 124000 9600Quality of Service (QoS) Commands 743
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\QoS.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
traffic-shape queue
Use the traffic-shape queue Interface Configuration (Ethernet, Port-channel)
mode command to configure the egress queue shaper. Use the no form of this
command to disable the shaper.
Syntax
traffic-shape queue queue-id committed-rate [committed-burst]
no traffic-shape queue queue-id
Parameters
• queue-id—Specifies the queue number to which the shaper is assigned.
• committed-rate—Specifies the average traffic rate (CIR) in kbits per
second (kbps). (Range: 64 kbps–maximum port speed)
• committed-burst—Specifies the excess burst size (CBS) in bytes. (Range:
4 KB - 16 MB)
Default Configuration
The shaper is disabled.
Command Mode
Interface Configuration (Ethernet, Port-channel) mode
Example
The following example sets a shaper on gigabitethernet port 1/0/5 when the
average traffic rate exceeds 124000 kbps or the normal burst size exceeds 9600
bytes.
Console(config)# interface gi1/0/5
Console(config-if)# traffic-shape 124000 9600744 Quality of Service (QoS) Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\QoS.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
rate-limit (Ethernet)
Use the rate-limit Interface Configuration (Ethernet) mode command to
limit the incoming traffic rate on a port. Use the no form of this command to
disable the rate limit.
Syntax
rate-limit committed-rate-kbps [burst committed-burst-byte]
no rate-limit
Parameters
• rate—Specifies the maximum number of kilobits per second of ingress
traffic on a port. The range is 3–10000000.
• burst bytes—The burst size in bytes (3000–19173960). If unspecified,
defaults to 128K.
Default Configuration
Rate limiting is disabled.
Command Mode
Interface Configuration (Ethernet) mode
User Guidelines
Example
The following example limits the incoming traffic rate on gigabitethernet
port 1/0/5 to 150,000 kbps.
Console(config)# interface gi1/0/5
Console(config-if)# rate-limit 150000
qos wrr-queue wrtd
Use the qos wrr-queue wrtd Global Configuration mode command to enable
Weighted Random Tail Drop (WRTD). Use the no form of this command to
disable WRTD.Quality of Service (QoS) Commands 745
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\QoS.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Syntax
qos wrr-queue wrtd
no qos wrr-queue wrtd
Parameters
This command has no arguments or keywords.
Default
Disabled
Command Mode
Global Configuration mode
User Guidelines
The command is effective after reset.
show qos interface
Use the show qos interface EXEC mode command to display Quality of
Service (QoS) information on the interface.
Syntax
show qos interface [buffers | queueing | policers | shapers | rate-limit]
[interface-id]
Parameters
• buffers—Displays the buffer settings for the interface's queues. For GE
ports, displays the queue depth for each of the 8 queues. For FE ports,
displays the minimum reserved setting.
• queueing—Displays the queue's strategy (WRR or EF), the weight for
WRR queues, the CoS to queue map and the EF priority.
• policers—Displays all the policers configured for this interface, their
settings, and the number of policers currently unused.
• shapers—Displays the shaper of the specified interface and the shaper for
the queue on the specified interface.746 Quality of Service (QoS) Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\QoS.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
• rate-limit—Displays the rate-limit configuration.
• interface-id—Specifies an interface ID. The interface ID can be one of the
following types: Ethernet port, or Port-channel.
Default Configuration
There is no default configuration for this command.
Command Mode
EXEC mode
User Guidelines
The policers option is relevant for a VLAN interface only.
If no parameter is specified with the show qos interface command, the port
QoS mode (DSCP trusted, CoS trusted, untrusted, and so on), default CoS
value, DSCP-to-DSCP- map (if any) attached to the port, and policy map (if
any) attached to the interface are displayed. If a specific interface is not
specified, the information for all interfaces is displayed.
Example
This is an example of the output from the show qos interface buffers
command for 8 queues.
Console> show qos interface buffers gi1/0/1
gi1/0/1
Notify Q depth:
buffers gi2/0/1
Ethernet gi2/0/1
qid thresh0 thresh1 thresh2
1 100 100 80
2 100 100 80
3 100 100 80
4 100 100 80
5 100 100 80
6 100 100 80
7 100 100 80
8 100 100 80Quality of Service (QoS) Commands 747
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\QoS.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
This is an example of the output from the show qos interface shapers
command for 8 queues.
Console> show qos interface shapers gi1/0/1
gi1/0/1
Port shaper: enable
Committed rate: 192000 bps
Committed burst: 9600 bytes
QID
1
2
3
4
5
6
7
8
Status
Enable
Disable
Enable
Disable
Disable
Disable
Enable
Enable
Target
Committed
Rate [bps]
100000
N/A
200000
N/A
N/A
N/A
178000
23000
Target
Committed
Burst [bytes]
17000
N/A
19000
N/A
N/A
N/A
8000
1000748 Quality of Service (QoS) Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\QoS.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
This is an example of the output from the show qos interface policer
command.
This is an example of the output from the show qos interface rate-limit
command.
qos wrr-queue threshold
Use the qos wrr-queue threshold Global Configuration mode command to
assign queue thresholds globally. Use the no form of this command to restore
the default configuration.
Console> show qos interface policer gi1/0/1
Ethernet gi1/0/1
Class map: A
Policer type: aggregate
Commited rate: 192000 bps
Commited burst: 9600 bytes
Exceed-action: policed-dscp-transmit
Class map: B
Policer type: single
Commited rate: 192000 bps
Commited burst: 9600 bytes
Exceed-action: drop
Class map: C
Policer type: none
Commited rate: N/A
Commited burst: N/A
Exceed-action: N/A
Console> show qos interface rate-limit gi1/0/1
Port
-----
gi1/0/1
rate-limit [kbps]
-----------------
1000
Burst [KBytes]
--------------
512KQuality of Service (QoS) Commands 749
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\QoS.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Syntax
qos wrr-queue threshold {gigabitethernet | tengigabitethernet} queue-id
threshold-percentage
no qos wrr-queue threshold {gigabitethernet | tengigabitethernet} queue-id
Parameters
• gigabitethernet—Specifies that the thresholds are to be applied to Gigabit
Ethernet ports.
• tengigabitethernet—Specifies that the thresholds are to be applied to 10
Gigabit Ethernet ports.
• queue-id—Specifies the queue number to which the tail-drop threshold is
assigned.
• threshold-percentage—Specifies the queue threshold percentage value.
Default Configuration
The default threshold is 80 percent.
Command Mode
Global Configuration mode
User Guidelines
If the threshold is exceeded, packets with the corresponding DP are dropped
until the threshold is no longer exceeded.
Example
The following example assigns a threshold of 80 percent to WRR queue 1.
Console(config)# qos wrr-queue threshold gigabitethernet 1 80
qos map policed-dscp
Use the qos map policed-dscp Global Configuration mode command to
configure the policed-DSCP map for remarking purposes. Use the no form of
this command to restore the default configuration.750 Quality of Service (QoS) Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\QoS.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Syntax
qos map policed-dscp dscp-list to dscp-mark-down
no qos map policed-dscp [dscp-list]
Parameters
• dscp- list—Specifies up to 8 DSCP values, separated by spaces. (Range:
0–63)
• dscp-mark-down—Specifies the DSCP value to mark down. (Range: 0–63)
Default Configuration
The default map is the Null map, which means that each incoming DSCP
value is mapped to the same DSCP value.
Command Mode
Global Configuration mode.
Example
The following example marks incoming DSCP value 3 as DSCP value 43 on
the policed-DSCP map.
Console(config)# qos map policed-dscp 3 to 43
Reserved DSCP. DSCP 3 was not configured.
qos map dscp-queue
Use the qos map dscp-queue Global Configuration mode command to
configure the DSCP to CoS map. Use the no form of this command to restore
the default configuration.
Syntax
qos map dscp-queue dscp-list to queue-id
no qos map dscp-queue [dscp-list]Quality of Service (QoS) Commands 751
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\QoS.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Parameters
• dscp-list—Specifies up to 8 DSCP values, separated by spaces. (Range: 0–
63)
• queue-id—Specifies the queue number to which the DSCP values are
mapped.
Default Configuration
The default map for 8 queues is as follows.
Command Mode
Global Configuration mode
Example
The following example maps DSCP values 33, 40 and 41 to queue 1.
Console(config)# qos map dscp-queue 33 40 41 to 1
qos map dscp-dp
Use the qos map dscp-dp Global Configuration mode command to map the
DSCP to Drop Precedence. Use the no form of this command to restore the
default configuration.
Syntax
qos map dscp-dp dscp-list to dp
no qos map dscp-dp [dscp-list]
Parameters
• dscp-list—Specifies up to 8 DSCP values, with values separated by a
space. (Range: 0–63)
DSCP
value
0-7 8-15 16-23 24-31 32-39 40-47 48-56 57-63
QueueID
1 2 3 4 5 6 7 8752 Quality of Service (QoS) Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\QoS.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
• dp—Specifies the Drop Precedence value to which the DSCP values are
mapped. (values: 0,2) where 2 is the highest Drop Precedence)
Default Configuration
All the DSCPs are mapped to Drop Precedence 0.
Command Mode
Global Configuration mode.
Example
The following example maps DSCP values 25, 27 and 29 to Drop Precedence
2.
Console(config)# qos map dscp-dp 25 27 29 to 2
qos trust (Global)
Use the qos trust Global Configuration mode command to configure the
system to the basic mode and trust state. Use the no form of this command to
return to the default configuration.
Syntax
qos trust {cos | dscp }
no qos trust
Parameters
• cos— Specifies that ingress packets are classified with packet CoS values.
Untagged packets are classified with the default port CoS value.
• dscp—Specifies that ingress packets are classified with packet DSCP
values.
Default Configuration
CoS is the default trust mode.
Command Mode
Global Configuration modeQuality of Service (QoS) Commands 753
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\QoS.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
User Guidelines
This command can be used only in QoS basic mode.
Packets entering a quality of service (QoS) domain are classified at the edge
of the QoS domain. When the packets are classified at the edge, the switch
port within the QoS domain can be configured to one of the trusted states
because there is no need to classify the packets at every switch within the
domain.
Use this command to specify whether the port is trusted and which fields of
the packet to use to classify traffic.
When the system is configured with trust DSCP, the traffic is mapped to the
queue by the DSCP-queue map.
When the system is configured with trust CoS, the traffic is mapped to the
queue by the CoS-queue map.
Example
The following example configures the system to the DSCP trust state.
Console(config)# qos trust dscp
qos trust (Interface)
Use the qos trust Interface Configuration (Ethernet, Port-channel) mode
command to enable each port trust state while the system is in the basic QoS
mode. Use the no form of this command to disable the trust state on each
port.
Syntax
qos trust
no qos trust
Default Configuration
Each port is enabled while the system is in basic mode.
Command Mode
Interface Configuration (Ethernet, Port-channel) mode754 Quality of Service (QoS) Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\QoS.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
The following example configures gigabitethernet port 1/0/15 to the default
trust state.
Console(config)# interface gi1/0/15
Console(config-if)# qos trust
qos cos
Use the qos cos Interface Configuration (Ethernet, Port-channel) mode
command to define the default CoS value of a port. Use the no form of this
command to restore the default configuration.
Syntax
qos cos default-cos
no qos cos
Parameters
default-cos—Specifies the default CoS value of the port. If the port is trusted
and the packet is untagged, then the default CoS value become the CoS
value. (Range: 0–7)
Default Configuration
The default CoS value of a port is 0.
Command Mode
Interface Configuration (Ethernet, Port-channel) mode
User Guidelines
Use the default CoS value to assign a CoS value to all untagged packets
entering the port. Use the qos cos override command to assign this default
CoS value to tagged packets.
Example
The following example defines the port gi1/0/15 default CoS value as 3 .Quality of Service (QoS) Commands 755
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\QoS.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Console(config)# interface gi1/0/15
Console(config-if)# qos cos 3
qos dscp-mutation
Use the qos dscp-mutation Global Configuration mode command to apply
the DSCP Mutation map to system DSCP trusted ports. Use the no form of
this command to restore the trusted port with no DSCP mutation.
Syntax
qos dscp-mutation
no qos dscp-mutation
Command Mode
Global Configuration mode.
User Guidelines
Apply the DSCP-to-DSCP-mutation map to a port at the boundary of a
Quality of Service (QoS) administrative domain. If two QoS domains have
different DSCP definitions, use the DSCP-to-DSCP-mutation map to
translate a set of DSCP values to match the definition of another domain.
Apply the map to ingress and to DSCP-trusted ports only. Applying this map
to a port causes IP packets to be rewritten with newly mapped DSCP values at
the ingress ports. If applying the DSCP mutation map to an untrusted port,
to class of service (CoS), or to an IP-precedence trusted port, the command
has no immediate effect until the port becomes DSCP-trusted.
Example
The following example applies the DSCP Mutation map to system DSCP
trusted ports.
Console(config)# qos dscp-mutation756 Quality of Service (QoS) Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\QoS.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
qos map dscp-mutation
Use the qos map dscp-mutation Global Configuration mode command to
configure the DSCP to DSCP Mutation table. Use the no form of this
command to restore the default configuration.
Syntax
qos map dscp-mutation in-dscp to out-dscp
no qos map dscp-mutation [in-dscp]
Parameters
• in-dscp—Specifies up to 8 DSCP values to map, separated by spaces.
(Range: 0–63)
• out-dscp—Specifies up to 8 DSCP mapped values, separated by spaces.
(Range: 0–63)
Default Configuration
The default map is the Null map, which means that each incoming DSCP
value is mapped to the same DSCP value.
Command Mode
Global Configuration mode.
User Guidelines
This is the only map that is not globally configured. It is possible to have
several maps and assign each one to a different port.
Example
The following example changes DSCP values 1, 2, 4, 5 and 6 to DSCP
Mutation Map value 63.
Console(config)# qos map dscp-mutation 1 2 4 5 6 to 63Quality of Service (QoS) Commands 757
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\QoS.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
show qos map
Use the show qos map EXEC mode command to display the QoS mapping
information.
Syntax
show qos map [dscp-queue | dscp-dp | policed-dscp | dscp-mutation]
Parameters
• dscp-queue—Displays the DSCP to queue map.
• dscp-dp—Displays the DSCP to Drop Precedence map.
• policed-dscp—Displays the DSCP to DSCP remark table.
• dscp-mutation—Displays the DSCP-DSCP mutation table.
Command Mode
EXEC mode
Example
The following example displays the QoS mapping information.
Console> show qos map
Dscp-queue map:
d1
--
0
1
2
3
4
5
6
:
--
:
:
:
:
:
:
:
d2
--
0
--
01
02
03
04
06
07
08
1
--
01
02
03
04
06
07
08
2
--
01
02
03
05
06
07
08
3
--
01
02
03
05
06
07
08
4
--
01
02
04
05
06
07
5
--
01
02
04
05
06
07
6
--
01
03
04
05
06
08
7
--
01
03
04
05
06
08
8
--
02
03
04
05
07
08
9
--
02
03
04
05
07
08758 Quality of Service (QoS) Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\QoS.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
The following table appears:.
The following table appears:.
The following table appears:.
Dscp-DP map:
d1
--
0
1
2
3
4
5
6
:
--
:
:
:
:
:
:
:
d2
--
00
00
00
00
00
00
00
0
--
00
00
00
00
00
00
00
1
--
00
00
00
00
00
00
00
2
--
00
00
00
00
00
00
00
3
--
00
00
00
00
00
00
4
--
00
00
00
00
00
00
5
--
00
00
00
00
00
00
6
--
00
00
00
00
00
00
7
--
00
00
00
00
00
00
8
--
00
00
00
00
00
00
9
--
00
00
00
00
00
00
Policed-dscp map:
d1
--
0
1
2
3
4
5
6
:
--
:
:
:
:
:
:
:
d2
--
0
--
00
10
20
30
40
50
60
1
--
01
11
21
31
41
51
61
2
--
02
12
22
32
42
52
62
3
--
03
13
23
33
43
53
63
4
--
04
14
24
34
44
54
5
--
05
15
25
35
45
55
6
--
06
16
26
36
46
56
7
--
07
17
27
37
47
57
8
--
08
18
28
38
48
58
9
--
09
19
29
39
49
59
Dscp-dscp mutation map:
d1
--
0
1
2
3
4
5
6
:
--
:
:
:
:
:
:
:
d2
--
0
--
00
10
20
30
40
50
60
1
--
01
11
21
31
41
51
61
2
--
02
12
22
32
42
52
62
3
--
03
13
23
33
43
53
63
4
--
04
14
24
34
44
54
5
--
05
15
25
35
45
55
6
--
06
16
26
36
46
56
7
--
07
17
27
37
47
57
8
--
08
18
28
38
48
58
9
--
09
19
29
39
49
59Quality of Service (QoS) Commands 759
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\QoS.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
clear qos statistics
Use the clear qos statistics EXEC mode command to clear the QoS statistics
counters.
Syntax
clear qos statistics
Command Mode
EXEC mode
Example
The following example clears the QoS statistics counters.
Console# clear qos statistics
qos statistics policer
Use the qos statistics policer Interface Configuration (Ethernet, Portchannel) mode command to enable counting in-profile and out-of-profile.
Use the no form of this command to disable counting.
Syntax
qos statistics policer policy-map-name class-map-name
no qos statistics policer policy-map-name class-map-name
Parameters
• policy-map-name—Specifies the policy map name.
• class-map-name—Specifies the class map name.
Default Configuration
Counting in-profile and out-of-profile is disabled.
Command Mode
Interface Configuration (Ethernet, Port-channel) mode760 Quality of Service (QoS) Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\QoS.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Example
The following example enables counting in-profile and out-of-profile on the
interface.
Console(config-if)# qos statistics policer policy1 class1
qos statistics aggregate-policer
Use the qos statistics aggregate-policer Global Configuration mode
command to enable counting in-profile and out-of-profile. Use the no form of
this command to disable counting.
Syntax
qos statistics aggregate-policer aggregate-policer-name
no qos statistics aggregate-policer aggregate-policer-name
Parameters
aggregate-policer-name—Specifies the aggregate policer name.
Default Configuration
Counting in-profile and out-of-profile is disabled.
Command Mode
Global Configuration mode
Example
The following example enables counting in-profile and out-of-profile on the
interface.
Console(config)# qos statistics aggregate-policer policer1
qos statistics queues
Use the qos statistics queues Global Configuration mode command to enable
QoS statistics for output queues. Use the no form of this command to disable
QoS statistics for output queues.Quality of Service (QoS) Commands 761
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\QoS.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Syntax
qos statistics queues set {queue | all} {dp | all} {interface | all}
no qos statistics queues set
Parameters
• set—Specifies the counter set number.
• interface—Specifies the Ethernet port.
• queue—Specifies the output queue number.
• dp—Specifies the drop precedence. The available values are: high, low.
Default Configuration
Set 1: All interfaces, all queues, high DP.
Set 2: All interfaces, all queues, low DP.
Command Mode
Global Configuration mode
User Guidelines
There are no user guidelines for this command.
Example
The following example enables QoS statistics for output queues for counter
set 1.
Console(config)# qos statistics queues 1 all all all
show qos statistics
Use the show qos statistics EXEC mode command to display Quality of
Service statistical information.
Syntax
show qos statistics762 Quality of Service (QoS) Commands
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\QoS.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Command Mode
EXEC mode
User Guidelines
Up to 16 sets of counters can be enabled for policers. The counters can be
enabled in the creation of the policers.
Use the qos statistics queues Global Configuration mode command to enable
QoS statistics for output queues.
Example
The following example displays Quality of Service statistical information.
Console# show qos statistics
Policers
---------
Interface
----------
gi1/0/1
gi1/0/1
gi1/0/2
gi1/0/2
Policy map
----------
Policy1
Policy1
Policy1
Policy1
Class Map
---------
Class1
Class2
Class1
Class2
In-profile bytes
----------------
7564575
8759
746587458
5326
Out-of-profile
bytes
--------------
5433
52
3214
23
Aggregate Policers
------------------
Name
---------
Policer1
In-profile bytes
----------------
7985687
Out-of-profile bytes
--------------------
121322Quality of Service (QoS) Commands 763
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax
CLI\files\QoS.fm
D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY
Output Queues
-------------
Interface
---------
gi1/0/1
gi1/0/2
Queue
-----
2
All
DP
--
High
High
Total packets
-------------
799921
5387326
%TD packets
-----------
1.2%
0.2%
Micrologiciel Dell Chassis
Management Controller
Version 4.0
Guide d'utilisationRemarques et précautions
REMARQUE : une REMARQUE indique des informations importantes qui peuvent
vous aider à mieux utiliser votre ordinateur.
PRÉCAUTION : une PRÉCAUTION indique un risque d'endommagement du
matériel ou de perte de données en cas de non respect des instructions.
____________________
Les informations que contient cette publication sont sujettes à modification sans préavis.
© 2012 Dell Inc. Tous droits réservés.
La reproduction de ce document, de quelque manière que ce soit, sans l'autorisation écrite de Dell Inc.
est strictement interdite. Marques utilisées dans ce texte : Dell™, le logo DELL, FlexAddress™,
OpenManage™, PowerEdge™ et PowerConnect™ sont des marques de Dell Inc. Microsoft
®
,
Active Directory
®
, Internet Explorer
®
, Windows
®
, Windows Server
®
et Windows Vista
®
sont des
marques ou des marques déposées de Microsoft Corporation aux États-Unis et d'autres pays. Red Hat
®
et
Red Hat Enterprise Linux
®
sont des marques déposées de Red Hat, Inc. aux États-Unis et dans d'autres
pays. Novell
®
est une marque déposée et SUSE ™ est une marque de Novell Inc. aux États-Unis et/ou
dans d'autres pays. Intel
®
est une marque déposée d'Intel Corporation. UNIX
®
est une marque déposée
de The Open Group aux États-Unis et dans d'autres pays. Avocent
®
est une marque commerciale de
Avocent Corporation. OSCAR
®
est une marque déposée de Avocent Corporation ou ses filiales.
Copyright 1998-2006 The OpenLDAP Foundation. Tous droits réservés. La redistribution et l'utilisation
aux formats source et binaire, avec ou sans modification, ne sont permises que selon les termes de la licence
publique OpenLDAP. Vous trouverez une copie de cette licence dans le fichier LICENSE qui figure dans
le répertoire de haut niveau de la distribution ainsi qu'à l'adresse http://www.OpenLDAP.org/license.html.
OpenLDAP est une marque déposée de The OpenLDAP Foundation. Il se peut que certains fichiers
individuels et/ou progiciels fournis par des tiers soient sous copyright et qu'ils soient sujets à des
restrictions supplémentaires. Ce produit est dérivé de la distribution LDAP v3.3 de l'Université du Michigan.
Ce produit contient aussi des produits dérivés de sources publiques. Les informations sur OpenLDAP sont
disponibles sur http://www.openldap.org/. Parties de Copyright 1998-2004 Kurt D. Zeilenga. Parties de
Copyright 1998-2004 Net Boolean Incorporated. Parties de Copyright 2001-2004 IBM Corporation.
Tous droits réservés. La redistribution et l'utilisation aux formats source et binaire, avec ou sans modification,
ne sont permises que selon les termes de la licence publique OpenLDAP. Parties de Copyright 1999-2003
Howard Y.H. Chu. Parties de Copyright 1999-2003 Symas Corporation. Parties de Copyright 1998-2003
Hallvard B. Furuseth. Tous droits réservés. La redistribution et l'utilisation aux formats source et binaire,
avec ou sans modification, sont permises tant que cet avis est conservé. Les noms des détendeurs de copyright
ne peuvent pas être utilisés pour approuver ou promouvoir des produits dérivés de ce logiciel sans leur
autorisation préalable par écrit. Ce logiciel est fourni « tel quel » sans garantie explicite ou tacite.
Parties de Copyright (c) 1992-1996 Membres du conseil de l'Université du Michigan. Tous droits réservés.
La redistribution et l'utilisation aux formats source et binaire sont permises tant que cet avis est conservé
et que l'Université du Michigan à Ann Arbor reçoit les crédits qui lui sont dus. Le nom de l'université ne
peut pas être utilisé pour approuver ou promouvoir des produits dérivés de ce logiciel sans son autorisation
préalable par écrit. Ce logiciel est fourni « en l'état » sans garantie explicite ou tacite.
D'autres marques et noms commerciaux peuvent être utilisés dans cette publication pour faire référence aux
entités revendiquant la propriété de ces marques ou de ces noms de produits. Dell Inc. rejette tout intérêt
exclusif dans les marques et les noms commerciaux autres que les siens.
2012 - 03Table des matières 3
Table des matières
1 Présentation . . . . . . . . . . . . . . . . . . . . . . 21
Nouveautés de cette version . . . . . . . . . . . . . . 22
Fonctionnalités de gestion de CMC . . . . . . . . . . . 23
Fonctionnalités de sécurité . . . . . . . . . . . . . . . 25
Présentation du châssis . . . . . . . . . . . . . . . . . 26
Caractéristiques matérielles . . . . . . . . . . . . . . 27
Ports TCP/IP . . . . . . . . . . . . . . . . . . . . 27
Connexions d'accès à distance prises en charge . . . 28
Plate-formes prises en charge . . . . . . . . . . . . . 28
Navigateurs Web pris en charge . . . . . . . . . . . . 29
Applications de console de gestion prises
en charge . . . . . . . . . . . . . . . . . . . . . . . . 29
Prise en charge WS-Management . . . . . . . . . . . 29
Autres documents utiles. . . . . . . . . . . . . . . . . 31
2 Installation et configuration de CMC . . . 33
Avant de commencer . . . . . . . . . . . . . . . . . . 33
Installation du matériel CMC . . . . . . . . . . . . . . 33
Liste de contrôle pour l'intégration
d'un châssis . . . . . . . . . . . . . . . . . . . . 344 Table des matières
Connexion réseau CMC de base . . . . . . . . . . 35
Connexion réseau CMC en chaîne . . . . . . . . . 35
Installation de logiciel d'accès à distance sur une
station de gestion . . . . . . . . . . . . . . . . . . . . 39
Installation de l'utilitaire RACADM sur une
station de gestion Linux. . . . . . . . . . . . . . . 39
Désinstallation de l'utilitaire RACADM sur
une station de gestion Linux . . . . . . . . . . . . 40
Configuration d'un navigateur Web . . . . . . . . . . . 41
Serveur proxy . . . . . . . . . . . . . . . . . . . . 41
Filtre anti-hameçonnage de Microsoft . . . . . . . 42
Récupération de la liste de révocation
des certificats (CRL) . . . . . . . . . . . . . . . . 42
Téléchargement de fichiers à partir
de CMC dans Internet Explorer . . . . . . . . . . . 43
Autorisation des animations
dans Internet Explorer . . . . . . . . . . . . . . . 43
Configuration de l'accès initial à CMC . . . . . . . . . 44
Configuration du réseau CMC . . . . . . . . . . . 45
Configuration de la mise en réseau à l'aide
de l'Assistant Configuration de l'écran LCD . . . . 46
Accès à CMC via un réseau . . . . . . . . . . . . . . . 53
Installation ou mise à jour du micrologiciel
du module CMC . . . . . . . . . . . . . . . . . . . . . 54
Téléchargement du micrologiciel
du module CMC . . . . . . . . . . . . . . . . . . . 54
Mise à jour du micrologiciel CMC à l'aide
de l'interface Web . . . . . . . . . . . . . . . . . 55
Mise à jour du micrologiciel CMC via RACADM . . . 55
Configuration des propriétés de CMC . . . . . . . . . . 56
Configuration des bilans de puissance . . . . . . . 56
Configuration des paramètres réseau de CMC . . . . 56Table des matières 5
Ajout et configuration des utilisateurs . . . . . . . 57
Ajout d'alertes SNMP et par e-mail . . . . . . . . 57
Configuration de Syslog distant . . . . . . . . . . 57
Fonctionnement de l'environnement
CMC redondant . . . . . . . . . . . . . . . . . . . . . 58
À propos du contrôleur CMC de secours . . . . . 58
Mode de sécurité CMC . . . . . . . . . . . . . . . 59
Processus de sélection de CMC actif . . . . . . . 60
Obtention de la condition d'intégrité du
contrôleur CMC redondant . . . . . . . . . . . . . 60
3 Configuration de CMC pour utiliser des
consoles de ligne de commande . . . . . . 61
Fonctionnalités de la console de ligne
de commande de CMC. . . . . . . . . . . . . . . . . . 61
Utilisation d'une console série, Telnet ou SSH . . . . . 62
Utilisation d'une console Telnet avec CMC. . . . . . . 62
Utilisation de SSH avec CMC . . . . . . . . . . . . . . 63
Activation de SSH sur CMC . . . . . . . . . . . . 63
Changement de port SSH. . . . . . . . . . . . . . 64
Activation de la connexion du
panneau avant à iKVM . . . . . . . . . . . . . . . 65
Configuration du logiciel d'émulation de terminal . . . 65
Configuration de Linux Minicom . . . . . . . . . . 65
Connexion aux serveurs ou aux modules d'E/S
à l'aide de la commande Connect. . . . . . . . . . . . 67
Configuration du BIOS du serveur géré pour
la redirection de console série . . . . . . . . . . . 69
Configuration de Windows pour la redirection
de console série . . . . . . . . . . . . . . . . . . 706 Table des matières
Configuration de Linux pour la redirection de
console série du serveur pendant
le démarrage . . . . . . . . . . . . . . . . . . . . 70
Configuration de Linux pour la redirection de
console série du serveur après l'amorçage . . . . 72
4 Utilisation de l'interface de ligne
de commande RACADM . . . . . . . . . . . . . 75
Utilisation d'une console série, Telnet ou SSH . . . . . 75
Ouverture d'une session CMC . . . . . . . . . . . 76
Démarrage d'une console texte . . . . . . . . . . 76
Utilisation de la RACADM . . . . . . . . . . . . . . . . 76
Sous-commandes RACADM . . . . . . . . . . . . 77
Accès à distance à RACADM. . . . . . . . . . . . 81
Activation et désactivation de la
fonctionnalité distante de RACADM . . . . . . . . 82
Utilisation de RACADM à distance . . . . . . . . . 83
Messages d'erreur RACADM. . . . . . . . . . . . 84
Utilisation de RACADM pour la
configuration CMC . . . . . . . . . . . . . . . . . . . . 84
Configuration des propriétés du réseau CMC . . . . . . 84
Configuration de l'accès initial à CMC . . . . . . . 85
Affichage des paramètres réseau actuels . . . . . 86
Configuration des paramètres du réseau local . . . . 86
Configuration des paramètres de sécurité
réseau (IPv4 uniquement). . . . . . . . . . . . . . 93
Utilisation de RACADM pour la configuration
des utilisateurs. . . . . . . . . . . . . . . . . . . . . . 94
Ajout d'un utilisateur CMC . . . . . . . . . . . . . 95Table des matières 7
Utilisation de RACADM pour configurer
l'authentification par clé publique sur SSH. . . . . . . 96
Génération de clés publiques pour Windows . . . . . 97
Génération de clés publiques pour Linux . . . . . 98
Notes de syntaxe RACADM pour CMC. . . . . . . 98
Affichage des clés publiques. . . . . . . . . . . . 98
Ajout des clés publiques . . . . . . . . . . . . . . 99
Suppression des clés publiques . . . . . . . . . . 99
Ouverture de session avec l'authentification
par clé publique. . . . . . . . . . . . . . . . . . . 99
Activation d'un utilisateur CMC ayant
des droits . . . . . . . . . . . . . . . . . . . . . . 100
Désactivation d'un utilisateur CMC . . . . . . . . 100
Configuration de l'envoi de notifications par
e-mail ou d'alertes SNMP . . . . . . . . . . . . . . . . 101
Configuration de plusieurs CMC dans
plusieurs châssis . . . . . . . . . . . . . . . . . . . . 101
Création d'un fichier de configuration CMC . . . . 103
Règles d'analyse . . . . . . . . . . . . . . . . . . 104
Modification de l'adresse IP CMC . . . . . . . . . 106
Utilisation de RACADM pour configurer les
propriétés sur iDRAC . . . . . . . . . . . . . . . . . . 108
Dépannage . . . . . . . . . . . . . . . . . . . . . . . . 109
5 Utilisation de l'interface Web
de CMC . . . . . . . . . . . . . . . . . . . . . . . . . 111
Accès à l'interface Web CMC . . . . . . . . . . . . . . 111
Ouverture de session . . . . . . . . . . . . . . . . 113
Fermeture de session. . . . . . . . . . . . . . . . 114
Configuration des paramètres CMC de base . . . . . . 1148 Table des matières
Définir l'emplacement physique et le
nom du châssis . . . . . . . . . . . . . . . . . . 114
Définition de la date et de l'heure sur CMC . . . 115
Activation du support Flash amovible . . . . . . 115
Page Intégrité du châssis . . . . . . . . . . . . . . . 116
Utilisation d'un groupe de châssis . . . . . . . . . . 117
Fonctionnalités du groupe de châssis . . . . . . 117
Configuration d'un groupe de châssis . . . . . . 117
Retrait d'un membre du châssis chef. . . . . . . 119
Dissolution d'un groupe de châssis . . . . . . . 119
Désactivation d'un membre individuel sur
le châssis membre . . . . . . . . . . . . . . . . 120
Lancement d'une page Web du châssis
membre ou du serveur . . . . . . . . . . . . . . 120
Synchronisation des propriétés d'un nouveau
membre avec celles du châssis chef. . . . . . . 121
Inventaire de lames pour Groupe MCM . . . . . 122
Enregistrement du rapport
d'inventaire de lames . . . . . . . . . . . . . . . 122
Résumé des composants du châssis . . . . . . . . . 125
Graphiques du châssis . . . . . . . . . . . . . . 125
Intégrité du châssis . . . . . . . . . . . . . . . . 127
Informations sur le composant sélectionné. . . . . . 128
Surveillance de la condition
d'intégrité du système . . . . . . . . . . . . . . . . . 134
Affichage des résumés relatifs au châssis
et aux composants . . . . . . . . . . . . . . . . 134
Affichage de la condition du
bilan de puissance . . . . . . . . . . . . . . . . 135
Affichage du nom du modèle de serveur
et du numéro de service . . . . . . . . . . . . . 136Table des matières 9
Affichage de la condition d'intégrité de
l'ensemble des serveurs . . . . . . . . . . . . . . 136
Modification du nom d'un logement . . . . . . . . 140
Utilisation du nom d'hôte du serveur comme
nom de logement . . . . . . . . . . . . . . . . . . 142
Définition du premier périphérique d'amorçage
pour les serveurs . . . . . . . . . . . . . . . . . . 142
Affichage de la condition d'intégrité
d'un serveur spécifique . . . . . . . . . . . . . . 144
Affichage de la condition d'intégrité
des modules d'E/S . . . . . . . . . . . . . . . . . 151
Affichage de la condition d'intégrité
des ventilateurs. . . . . . . . . . . . . . . . . . . 152
Affichage de la condition d'iKVM . . . . . . . . . 154
Affichage de la condition d'intégrité
des unités d'alimentation. . . . . . . . . . . . . . 155
Affichage de la condition des capteurs
de température . . . . . . . . . . . . . . . . . . . 158
Affichage de l'état du panneau LCD. . . . . . . . . . . 160
Affichage des ID de nom mondial/Contrôle
de l'accès aux médias (WWN/MAC) . . . . . . . . . . 161
Configuration de la structure . . . . . . . . . . . . 161
Adresses WWN/MAC . . . . . . . . . . . . . . . 161
Configuration des propriétés du réseau CMC. . . . . . 162
Configuration de l'accès initial à CMC . . . . . . . 162
Configuration des paramètres du réseau local. . . . 163
Configuration des paramètres de
sécurité réseau CMC . . . . . . . . . . . . . . . . 171
Configuration des réseaux locaux virtuels (VLAN) . . . 173
Ajout et configuration d'utilisateurs CMC . . . . . . . 174
Types d'utilisateurs . . . . . . . . . . . . . . . . . 174
Ajout et gestion des utilisateurs . . . . . . . . . . 18310 Table des matières
Configuration et gestion des certificats
Microsoft Active Directory . . . . . . . . . . . . . . 186
Paramètres communs . . . . . . . . . . . . . . 186
Paramètres du schéma standard. . . . . . . . . 190
Paramètres du schéma étendu . . . . . . . . . . 191
Gestion des certificats Active Directory . . . . . . . 191
Fichier Keytab Kerberos . . . . . . . . . . . . . . . . 192
Configuration et gestion des services
LDAP génériques. . . . . . . . . . . . . . . . . . . . 193
Sélection de vos serveurs LDAP. . . . . . . . . . . . 195
Gestion des paramètres de groupe LDAP . . . . . . . 196
Gestion des certificats de sécurité LDAP . . . . . . . 196
Sécurisation des communications CMC à l'aide
de certificats SSL et numériques . . . . . . . . . . . 197
Secure Sockets Layer (SSL) . . . . . . . . . . . 197
Requête de signature de certificat (RSC). . . . . 198
Accès au menu principal SSL . . . . . . . . . . 199
Génération d'une nouvelle requête de
signature de certificat . . . . . . . . . . . . . . 199
Téléversement d'un certificat de serveur . . . . 203
Téléverser une clé de serveur Web
et un certificat . . . . . . . . . . . . . . . . . . 203
Affichage d'un certificat de serveur . . . . . . . 204
Gestion des sessions. . . . . . . . . . . . . . . . . . 204
Configuration des services . . . . . . . . . . . . . . 205
Configuration des bilans de puissance . . . . . . . . 214
Gestion des mises à jour du micrologiciel . . . . . . 215Table des matières 11
Affichage des versions actuelles
du micrologiciel. . . . . . . . . . . . . . . . . . . 216
Mise à jour du micrologiciel . . . . . . . . . . . . 217
Restauration du micrologiciel iDRAC
à l'aide de CMC . . . . . . . . . . . . . . . . . . . 223
Mise à jour du micrologiciel des composants du
serveur à l'aide du Lifecycle Controller . . . . . . 224
Gestion iDRAC . . . . . . . . . . . . . . . . . . . . . . 236
iDRAC QuickDeploy. . . . . . . . . . . . . . . . . 237
Paramètres réseau d'iDRAC . . . . . . . . . . . . 241
Lancement de la console à distance depuis
l'interface utilisateur de CMC . . . . . . . . . . . 244
Lancement d'iDRAC à l'aide d'une
signature unique . . . . . . . . . . . . . . . . . . 245
Clonage de serveur . . . . . . . . . . . . . . . . . . . 246
Capturer un profil . . . . . . . . . . . . . . . . . . 247
Appliquer un profil . . . . . . . . . . . . . . . . . 247
Affichage des paramètres BIOS sur un serveur . . . 248
Gestion des profils stockés. . . . . . . . . . . . . 248
Journal des profils récents . . . . . . . . . . . . . 248
État d'achèvement et dépannage . . . . . . . . . 249
FlexAddress . . . . . . . . . . . . . . . . . . . . . . . 249
Affichage de l'état de FlexAddress. . . . . . . . . 249
Configurer FlexAddress. . . . . . . . . . . . . . . 254
Configuration de FlexAddress pour
les logements et les structures au niveau
du châssis . . . . . . . . . . . . . . . . . . . . . 255
Configuration de FlexAddress pour les
logements au niveau du serveur . . . . . . . . . . 256
Partage de fichiers distants . . . . . . . . . . . . . . . 256
Questions les plus fréquentes . . . . . . . . . . . . . . 25912 Table des matières
Dépannage du CMC . . . . . . . . . . . . . . . . . . 261
6 Utilisation de FlexAddress . . . . . . . . . . . 263
Activation de FlexAddress. . . . . . . . . . . . . . . 264
Vérification de l'activation de FlexAddress . . . 266
Désactivation de FlexAddress . . . . . . . . . . . . . 268
Désactivation de FlexAddress . . . . . . . . . . 268
Configuration de FlexAddress à l'aide de la CLI . . . 269
Configuration complémentaire de
FlexAddress pour Linux . . . . . . . . . . . . . . 270
Consultation de l'état de FlexAddress
à l'aide de la CLI . . . . . . . . . . . . . . . . . . . . 270
Configuration de FlexAddress via
l'interface utilisateur . . . . . . . . . . . . . . . . . 271
Réveil sur LAN avec FlexAddress . . . . . . . . 271
Dépannage de FlexAddress . . . . . . . . . . . . . . 271
Messages des commandes . . . . . . . . . . . . . . 275
CONTRAT DE LICENCE DES LOGICIELS
DELL FlexAddress . . . . . . . . . . . . . . . . . . . 278
Questions les plus fréquentes . . . . . . . . . . . . . 282
7 Utilisation de FlexAddress Plus . . . . . . . 283
Activation de FlexAddress Plus . . . . . . . . . . . . 283
FlexAddress comparé à FlexAddress Plus . . . . . . 284Table des matières 13
8 Utilisation du service d'annuaire CMC . . 285
Utilisation de CMC avec Microsoft Active Directory . . . 285
Extensions de schéma Active Directory . . . . . . 285
Schéma standard comparé au schéma étendu . . . 285
Présentation d'Active Directory avec
le schéma standard . . . . . . . . . . . . . . . . . . . 286
Configuration du schéma standard d'Active
Directory pour accéder à CMC. . . . . . . . . . . 288
Configuration de CMC avec Active Directory
avec schéma standard et l'interface Web . . . . . 288
Configuration de CMC avec Active Directory
avec schéma standard et RACADM . . . . . . . . 291
Présentation du schéma étendu. . . . . . . . . . . . . 292
Extensions de schéma Active Directory . . . . . . 292
Présentation des extensions de
schéma du RAC. . . . . . . . . . . . . . . . . . . 293
Présentation des objets Active Directory . . . . . 293
Configuration du schéma étendu d'Active
Directory pour accéder à votre CMC. . . . . . . . 298
Extension du schéma Active Directory. . . . . . . 298
Installation de l'extension Dell sur le snap-in
Utilisateurs et ordinateurs Active Directory . . . . 305
Ajout d'utilisateurs CMC et de leurs privilèges
à Active Directory . . . . . . . . . . . . . . . . . 306
Configuration de CMC avec le schéma étendu
d'Active Directory et l'interface Web . . . . . . . 308
Configuration de CMC avec le schéma étendu
d'Active Directory et RACADM. . . . . . . . . . . 311
Questions les plus fréquentes . . . . . . . . . . . 313
Configuration de la connexion directe . . . . . . . . . 316
Configuration système requise . . . . . . . . . . . 316
Configuration des paramètres . . . . . . . . . . . 317
Configuration d'Active Directory . . . . . . . . . . 31714 Table des matières
Configuration de CMC . . . . . . . . . . . . . . 318
Téléversement du fichier keytab Kerberos . . . . 318
Activation de la connexion directe . . . . . . . . 319
Configuration du navigateur pour l'ouverture
de session par connexion directe . . . . . . . . 320
Ouverture d'une session sur CMC avec la
connexion directe. . . . . . . . . . . . . . . . . 321
Configuration de l'authentification bifactorielle
par carte à puce . . . . . . . . . . . . . . . . . . . . 322
Configuration système requise . . . . . . . . . . 322
Configuration des paramètres . . . . . . . . . . 322
Configuration d'Active Directory . . . . . . . . . 322
Configuration de CMC . . . . . . . . . . . . . . 323
Téléversement du fichier keytab Kerberos . . . . 323
Activation de l'authentification par
carte à puce. . . . . . . . . . . . . . . . . . . . 324
Configuration du navigateur pour l'ouverture
de session par carte à puce . . . . . . . . . . . 324
Ouverture de session sur CMC avec
la carte à puce . . . . . . . . . . . . . . . . . . 325
Résolution des problèmes liés à l'ouverture
de session par carte à puce . . . . . . . . . . . 325
Utilisation de CMC avec un LDAP générique . . . . . 326
Configuration de l'annuaire LDAP générique
pour accéder à CMC . . . . . . . . . . . . . . . 327
Configuration du service d'annuaire LDAP
générique à l'aide de l'interface Web
de CMC . . . . . . . . . . . . . . . . . . . . . . 328
Sélection de vos serveurs LDAP . . . . . . . . . 330
Gestion des paramètres de groupe LDAP . . . . 331
Gestion des certificats de sécurité LDAP . . . . 331
Configuration du service de répertoire LDAP
générique avec la RACADM . . . . . . . . . . . 332
Utilisation . . . . . . . . . . . . . . . . . . . . . 333Table des matières 15
Obtention d'aide . . . . . . . . . . . . . . . . . . 333
9 Gestion de l'alimentation . . . . . . . . . . . 335
Mode de redondance de
l'alimentation alternative . . . . . . . . . . . . . . 336
Mode de redondance des blocs
d'alimentation. . . . . . . . . . . . . . . . . . . . 338
Mode Sans redondance . . . . . . . . . . . . . . 339
Bilan de puissance pour les
modules matériels . . . . . . . . . . . . . . . . . 340
Paramètres de priorité de l'alimentation
des logements du serveur . . . . . . . . . . . . . 343
Enclenchement dynamique des
blocs d'alimentation . . . . . . . . . . . . . . . . 343
Règles de redondance . . . . . . . . . . . . . . . . . . 346
Redondance de l'alimentation alternative . . . . . 346
Redondance des blocs d'alimentation . . . . . . . 347
Sans redondance . . . . . . . . . . . . . . . . . . 347
Préservation de l'alimentation et modifications
du bilan de puissance . . . . . . . . . . . . . . . 347
Modifications d'alimentation et de la règle de
redondance dans le journal des
événements système . . . . . . . . . . . . . . . . 356
Condition de la redondance et intégrité
énergétique globale . . . . . . . . . . . . . . . . 358
Configuration et gestion de l'alimentation . . . . . . . 358
Affichage de la condition d'intégrité des
unités d'alimentation . . . . . . . . . . . . . . . . 358
Affichage de l'état de la consommation
de puissance . . . . . . . . . . . . . . . . . . . . 361
Affichage de la condition du bilan
de puissance . . . . . . . . . . . . . . . . . . . . 366
Configuration du bilan de puissance et
de la redondance . . . . . . . . . . . . . . . . . . 37116 Table des matières
Affectation de niveaux de priorité
aux serveurs . . . . . . . . . . . . . . . . . . . 376
Définition du bilan de puissance . . . . . . . . . 377
Diminution de l'alimentation des serveurs afin
de préserver le bilan d'alimentation . . . . . . . 378
Exécution de tâches de contrôle de
l'alimentation sur le châssis . . . . . . . . . . . 379
Exécution d'opérations de contrôle de
l'alimentation sur un module d'E/S . . . . . . . . 381
Exécution de tâches de contrôle de
l'alimentation sur un serveur . . . . . . . . . . . 382
Gestion de l'alimentation externe . . . . . . . . 384
Utilisation de la RACADM. . . . . . . . . . . . . 386
Dépannage . . . . . . . . . . . . . . . . . . . . 386
10 Utilisation du module iKVM . . . . . . . . . . 387
Présentation . . . . . . . . . . . . . . . . . . . . . . 387
Interface utilisateur d'iKVM . . . . . . . . . . . 387
Sécurité . . . . . . . . . . . . . . . . . . . . . . 387
Balayage . . . . . . . . . . . . . . . . . . . . . 387
Identification des serveurs . . . . . . . . . . . . 388
Vidéo . . . . . . . . . . . . . . . . . . . . . . . 388
Plug and Play . . . . . . . . . . . . . . . . . . . 388
Évolutif FLASH . . . . . . . . . . . . . . . . . . 388
Interfaces de connexion physique. . . . . . . . . . . 388
Priorités de connexion d'iKVM . . . . . . . . . . 389
Affectation de plusieurs couches via
la connexion de l'ACI . . . . . . . . . . . . . . . 389
Utilisation d'OSCAR . . . . . . . . . . . . . . . . . . 390
Notions de base sur la navigation . . . . . . . . 390
Configuration de l'OSCAR. . . . . . . . . . . . . 391Table des matières 17
Gestion de serveurs avec iKVM . . . . . . . . . . . . . 394
Compatibilité des périphériques
et prise en charge . . . . . . . . . . . . . . . . . 394
Affichage et sélection de serveurs. . . . . . . . . 395
Paramétrage de la sécurité de la console . . . . . 399
Balayage de votre système. . . . . . . . . . . . . 404
Diffusion aux serveurs . . . . . . . . . . . . . . . 405
Gestion d'iKVM depuis CMC . . . . . . . . . . . . . . 407
Activation ou désactivation du panneau avant. . . . 407
Activation de la console Dell CMC via iKVM. . . . 408
Affichage de la condition et des
propriétés d'iKVM . . . . . . . . . . . . . . . . . 408
Mise à jour du micrologiciel du module iKVM . . . 410
Dépannage . . . . . . . . . . . . . . . . . . . . . . . . 412
11 Gestion de la structure d'E/S . . . . . . . . 419
Gestion de la structure . . . . . . . . . . . . . . . . . 420
Configurations non valides . . . . . . . . . . . . . . . 421
Configuration de cartes porteuses non valides . . . 422
Configuration de carte porteuse de module
d'E/S non valide. . . . . . . . . . . . . . . . . . . 422
Configuration module d'E/S - module
d'E/S non valide. . . . . . . . . . . . . . . . . . . 422
Scénario de nouveau démarrage . . . . . . . . . . . . 422
Surveillance de l'intégrité des modules d'E/S . . . . . 423
Affichage de la condition d'intégrité
d'un module d'E/S spécifique . . . . . . . . . . . 426
Configuration des paramètres réseau pour
un module d'E/S spécifique. . . . . . . . . . . . . 42818 Table des matières
Dépannage des paramètres réseau
de module d'E/S. . . . . . . . . . . . . . . . . . 431
12 Dépannage et récupération . . . . . . . . . . 433
Présentation . . . . . . . . . . . . . . . . . . . . . . 433
Outils de surveillance du châssis . . . . . . . . . . . 434
Collecte des informations de configuration
et d'état et journaux du châssis . . . . . . . . . 434
Utilisation . . . . . . . . . . . . . . . . . . . . . 434
Interfaces prises en charge . . . . . . . . . . . 434
CLI RACDUMP . . . . . . . . . . . . . . . . . . 435
RACDUMP à distance. . . . . . . . . . . . . . . 436
Utilisation de RACDUMP à distance . . . . . . . 436
Telnet RACDUMP . . . . . . . . . . . . . . . . . 437
Configuration des LED pour l'identification
des composants du châssis . . . . . . . . . . . 437
Configuration des alertes SNMP . . . . . . . . . 438
Téléchargement du fichier MIB (base
d'information de gestion) SNMP . . . . . . . . . 445
Configuration des alertes par messagerie . . . . 445
Premières étapes de dépannage
d'un système distant . . . . . . . . . . . . . . . . . . 449
Surveillance de l'alimentation et exécution de
commandes de contrôle de l'alimentation
sur le châssis. . . . . . . . . . . . . . . . . . . . . . 449
Affichage de la condition du bilan
de puissance . . . . . . . . . . . . . . . . . . . 449
Exécution d'une opération de contrôle
de l'alimentation . . . . . . . . . . . . . . . . . 449
Dépannage de l'alimentation . . . . . . . . . . . . . 450Table des matières 19
Gestion des tâches Lifecycle Controller sur
un système distant . . . . . . . . . . . . . . . . . . . . 453
Affichage des résumés du châssis . . . . . . . . . . . 455
Affichage de la condition d'intégrité du châssis
et des composants . . . . . . . . . . . . . . . . . . . . 459
Affichage des journaux d'événements . . . . . . . . . 460
Affichage du journal du matériel . . . . . . . . . . 460
Affichage du journal CMC . . . . . . . . . . . . . 463
Utilisation de la console de diagnostic . . . . . . . . . 464
Réinitialisation des composants . . . . . . . . . . . . 465
Résolution des erreurs de protocole de temps
du réseau (NTP) . . . . . . . . . . . . . . . . . . . . . 469
Interprétation des couleurs des LED et séquences
de clignotement . . . . . . . . . . . . . . . . . . . . . 471
Dépannage d'un contrôleur CMC qui
ne répond pas . . . . . . . . . . . . . . . . . . . . . . 474
Observation des LED afin d'isoler
le problème . . . . . . . . . . . . . . . . . . . . . 474
Obtention des informations de récupération
à partir du port série DB-9 . . . . . . . . . . . . . 475
Récupération de l'image du micrologiciel . . . . . 475
Dépannage des problèmes de réseau. . . . . . . . . . 476
Réinitialisation de mot de passe
administrateur oublié . . . . . . . . . . . . . . . . . . 477
Enregistrement et restauration des certificats
et paramètres de configuration du châssis. . . . . . . 481
Dépannage des alertes . . . . . . . . . . . . . . . . . 48120 Table des matières
13 Diagnostics . . . . . . . . . . . . . . . . . . . . . . 483
Utilisation de l'interface de l'écran LCD . . . . . . . 483
Navigation sur l'écran LCD . . . . . . . . . . . . . . 483
Menu Main (Menu principal) . . . . . . . . . . . 484
Menu de configuration de l'écran LCD . . . . . . 485
Écran de configuration de la langue . . . . . . . 485
Écran par défaut . . . . . . . . . . . . . . . . . 485
Écran Condition du serveur graphique . . . . . . 486
Écran Condition du module graphique . . . . . . 487
Écran du menu Enceinte . . . . . . . . . . . . . 487
Écran Condition du module . . . . . . . . . . . . 488
Écran Condition de l'enceinte . . . . . . . . . . 488
Écran Résumé IP . . . . . . . . . . . . . . . . . 488
Diagnostics. . . . . . . . . . . . . . . . . . . . . . . 489
Dépannage du matériel du LCD . . . . . . . . . . . . 489
Messages du panneau avant de l'écran LCD . . . . . 492
Messages d'erreur de l'écran LCD . . . . . . . . . . 492
Informations sur la condition du serveur et du
module de l'écran LCD . . . . . . . . . . . . . . . . . 501
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 507Présentation 21
Présentation
Dell Chassis Management Controller (CMC) est une solution matérielle et
logicielle de gestion de systèmes enfichable à chaud, conçue pour fournir des
fonctionnalités de gestion à distance et de contrôle de l'alimentation pour les
systèmes de châssis Dell PowerEdge M1000e.
• Fonctionnalités de gestion à distance
• Contrôle de l'alimentation
• Contrôle du refroidissement
Le module CMC qui possède son propre microprocesseur et sa propre mémoire,
est alimenté par le châssis modulaire sur lequel il est branché. Pour démarrer
avec CMC, voir « Installation et configuration de CMC », à la page 33.
Le module CMC offre de multiples fonctions de gestion pour les serveurs
lames. Les fonctions premières du CMC sont la gestion de l'alimentation et la
gestion thermique.
• Gestion automatique des températures et de la consommation au niveau
du châssis et en temps réel.
– CMC surveille les exigences du système en matière de
consommation et prend en charge le mode de mise en place
facultative d'alimentation dynamique. Ceci permet au CMC
d'activer ou de définir dynamiquement l'alimentation électrique
de secours en fonction de la charge ou de la redondance des
exigences afin d'améliorer l'efficacité de l'alimentation.
– CMC donne des informations en temps réel sur la consommation,
avec une consignation des limites haute et basse accompagnée
d'un horodatage.
– CMC prend en charge la définition d'un seuil d'alimentation
(facultatif) qui permet de générer une alerte ou de déclencher
certaines actions visant à maintenir la consommation en dessous
d'un niveau donné : basculement des modules serveurs dans un
mode de consommation réduite et/ou désactivation de la mise
sous tension de nouveaux serveurs lames, etc.22 Présentation
– CMC surveille et contrôle automatiquement le fonctionnement des
ventilateurs en se basant sur la mesure en temps réel des températures
ambiantes et internes.
– CMC comporte des fonctions complètes d'inventaire et de
consignation des erreurs ou des états.
• CMC permet de centraliser la configuration des paramètres suivants :
– Paramètres réseau et de sécurité du châssis M1000e
– Redondance de l'alimentation et définition de seuils
– Paramètres réseau des commutateurs d'E/S et du module iDRAC
– Définition du premier périphérique d'amorçage sur les serveurs lames
– CMC vérifie la cohérence des infrastructures d'E/S entre les modules
d'E/S et les serveurs lames. Si nécessaire, il désactive des composants
afin de protéger le matériel du système.
– Sécurité des accès utilisateur
Vous pouvez configurer CMC pour envoyer des alertes par courrier
électronique ou des alertes d'interruption SNMP en cas d'avertissements ou
d'erreurs liés à la température, aux problèmes de configuration matérielle,
aux coupures de courant et aux vitesses de ventilateur.
Vous pouvez configurer le châssis M1000e soit avec un CMC unique soit avec
des CMC redondants. Dans le cadre de configurations de CMC redondants,
si le CMC principal perd la communication avec l'enceinte ou le réseau de
gestion, le CMC de secours prend le relais et gère le châssis.
Nouveautés de cette version
Cette version de CMC prend en charge les fonctionnalités suivantes :
• Enregistrement et restauration de la configuration du châssis.
• Journal SEL amélioré.
• Carte fille de réseau lame 10 GO 57810-k Double port Broadcom.
• Carte mezzanine lame 10 GO 57810-k double port Broadcom.
• Carte mezzanine lame 1Gb quatre ports Intel I350.
• Carte fille de réseau lame 10Gb double port Intel x520-k.
• Carte mezzanine lame 10Gb double port Intel x520-k.Présentation 23
• Carte fille de réseau lame 10Gb double port Qlogic QMD8262-k.
• Commutateur InfiniBand Mellanox M4001Q QDR/DDR.
• Commutateur InfiniBand Mellanox M4001F FDR.
• Carte mezzanine lame InfiniBand Mellanox ConnectX-3 QDR/DDR.
• Carte mezzanine lame InfiniBand Mellanox ConnectX-3 FDR.
• MIB CMC étendu pour contenir des OID pour emplacement
physique de châssis.
• MIB CMC étendu pour contenir des OID pour numéro de service et
nom d'emplacement de serveur lame.
• Permet la gestion d'alimentation externe via OMPC
(Open Manage Power Connect).
• Réplication d'un à plusieurs paramètres de serveur BIOS pour serveurs
iDRAC6 et iDRAC7 (clonage de serveur).
• Nouvelle fonctionnalité ajoutée à la fonction de gestion de plusieurs
châssis pour synchroniser les propriétés d'un nouveau membre avec
celles du leader.
• Prise en charge du serveur iDRAC7 PowerEdge M620 initial.
• Informations sur l'UC et la mémoire disponibles depuis l'interface
GUI dans le cas des serveurs qui prennent en charge le Lifecycle
Controller (LC).
• Prise en charge de l'inventaire des serveurs et des modules d'E/S et
génération de rapports pour un groupe MCM (gestion de plusieurs châssis).
Fonctionnalités de gestion de CMC
CMC offre les fonctionnalités de gestion suivantes :
• Environnement CMC redondant.
• Enregistrement DDNS (Système de noms de domaine dynamique)
pour IPv4 et IPv6.
• Gestion et surveillance à distance du système à l'aide de SNMP, d'une
interface Web, d'un module iKVM ou d'une connexion Telnet/SSH.
• Surveillance : permet d'accéder aux informations sur le système et à
l'état des composants.
• Accès aux journaux des événements système : accès au journal du matériel
et au journal CMC.24 Présentation
• Mises à jour du micrologiciel pour les différents composants du châssis :
permet de mettre à jour le micrologiciel de CMC, des serveurs, du module
iKVM, et les dispositifs d'infrastructure de module d'E/S.
• Mise à jour micrologicielle de composants de serveurs entre autres le
BIOS, les contrôleurs de réseau, les contrôleurs de stockage, sur plusieurs
serveurs dans le chassis à l'aide de Lifecycle Controller.
• Intégration du logiciel Dell OpenManage : vous permet de lancer
l'interface Web CMC à partir de Dell OpenManage Server Administrator
ou d'IT Assistant.
• Alertes CMC : vous avertit des problèmes potentiels du nœud géré au
moyen d'un message électronique ou d'une interruption SNMP.
• Gestion de l'alimentation à distance : offre des fonctionnalités de gestion
de l'alimentation à distance, comme l'arrêt et la réinitialisation de
n'importe quel composant du châssis à partir d'une console de gestion.
• Rapport sur l'alimentation.
• Cryptage SSL (Secure Sockets Layer) : permet une gestion sécurisée du
système distant via l'interface Web.
• Point de lancement de l'interface Web Integrated Dell Remote Access
Controller (iDRAC).
• Prise en charge de la gestion WS.
• Fonctionnalité FlexAddress : remplace les ID de nom mondial/Media
Access Control (WWN/MAC) d'usine par les ID WWN/MAC de châssis
pour un emplacement spécifique ou une mise à jour optionnelle. Pour
plus d'informations, voir « Utilisation de FlexAddress », à la page 263.
• Affichage graphique de l'état et de l'intégrité des composants de châssis.
• Prise en charge des serveurs à connecteur unique ou multiple.
• L'Assistant Configuration iDRAC LCD prend en charge la configuration
réseau iDRAC.
• Connexion unique iDRAC.
• Prise en charge du protocole NTP.
• Pages de résumé du serveur, de rapports de l'alimentation et de contrôle de
l'alimentation optimisées.
• Basculement CMC forcé et réattribution de sièges virtuelle de serveurs.
• Gestion de plusieurs châssis. Celle-ci permet à jusqu'à 8 autres châssis
d'être visibles depuis le châssis chef.Présentation 25
Fonctionnalités de sécurité
CMC dispose des fonctionnalités de sécurité suivantes :
• Gestion de la sécurité au niveau des mots de passe : empêche tout accès
non autorisé à un système distant.
• Authentification des utilisateurs via Active Directory (en option) ou via les
ID d'utilisateur et les mots de passe stockés sur le matériel.
• Autorité basée sur le rôle qui permet à un administrateur de configurer des
privilèges spécifiques pour chaque utilisateur.
• Configuration des ID utilisateur et des mots de passe via l'interface Web.
• L'interface Web prend en charge le cryptage SSL 128 bits et 40 bits 3.0
(pour les pays où le 128 bits n'est pas acceptable).
REMARQUE : Telnet ne prend pas en charge le cryptage SSL.
• Ports IP configurables (si applicable).
• Limites d'échecs d'ouverture de session par adresse IP, avec blocage de
l'ouverture de session à partir de l'adresse IP lorsque la limite est dépassée.
• Délai de session configurable, et plus d'une session simultanée.
• Plage d'adresses IP limitée pour les clients se connectant à CMC.
• Secure Shell (SSH) qui utilise une couche cryptée pour une sécurité
plus élevée.
• Connexion directe, authentification bifactorielle et authentification
par clé publique.26 Présentation
Présentation du châssis
La Figure 1-1 illustre la face avant d'une carte CMC (installée) et les
emplacements des logements CMC dans le châssis.
Figure 1-1. Châssis Dell M1000e et CMC
1 Port GB 2 Port STK
1
2Présentation 27
Caractéristiques matérielles
La section suivante fournit des informations sur les caractéristiques
matérielles pour CMC.
Ports TCP/IP
Vous devez fournir les informations du port lorsque vous ouvrez des pare-feu
pour l'accès à distance à un module CMC.
Tableau 1-1. Ports d'écoute des serveurs CMC
Numéro de port Fonction
22* SSH
23* Telnet
80* HTTP
161 Agent SNMP
443* HTTPS
* Port configurable
Tableau 1-2. Port client CMC
Numéro de port Fonction
25 SMTP
53 DNS
68 Adresse IP attribuée par DHCP
69 TFTP
162 Interruption SNMP
514* Syslog distant
636 LDAPS
3 269 LDAPS pour le catalogue global (CG)
* Port configurable28 Présentation
Connexions d'accès à distance prises en charge
La Figure 1-3 répertorie les contrôleurs d'accès à distance pris en charge.
Plate-formes prises en charge
CMC prend en charge les systèmes modulaires conçus pour la
plate-forme M1000e. Pour des informations concernant la compatibilité
avec CMC, consultez la documentation de votre périphérique.
Pour connaître les plate-formes prises en charge, consultez la Matrice de prise en
charge logicielle des systèmes Dell sur le site Web support.dell.com/manuals.
Tableau 1-3. Connexions d'accès à distance prises en charge
Connexion Fonctionnalités
Ports d'interface
réseau CMC
• Port GB : interface réseau dédiée pour l'interface Web CMC
Deux ports 10/100 Go, un pour la gestion et l'autre pour la
consolation câble châssis à châssis
• STK : port Uplink pour consolation câble réseau de gestion châssis
à châssis
• Ethernet 10 Mbits/100 Mbits/ 1 Mbits sur port GbE CMC
• Prise en charge de DHCP
• Interruptions SNMP et notifications d'événements par e-mail
• Interface réseau pour le micrologiciel iDRAC et les modules d'E/S
• Prise en charge de la console de commande Telnet/SSH et des
commandes de l'interface de ligne de commande RACADM,
y compris les commandes d'amorçage du système, de
réinitialisation, de mise sous tension et d'arrêt
Port série • Prise en charge de la console série et des commandes
CLI RACADM, y compris les commandes de démarrage du
système, de réinitialisation, de mise sous tension et d'arrêt
• Prise en charge des échanges binaires pour les applications
spécifiquement conçues pour communiquer avec un protocole
binaire avec un type particulier de module d'E/S
• Le port série peut être connecté à la console série d'un serveur
ou à un module d'E/S à l'aide de la commande connect
(or racadm connect)
Autres
connexions
• Accès à la console Dell CMC via le module de commutation KVM
intégré (iKVM) AvocentPrésentation 29
Navigateurs Web pris en charge
Les navigateurs Web suivants sont pris en charge pour CMC 4.0 :
• Microsoft Internet Explorer 8.0 pour Windows 7, Windows Vista,
Windows XP et Windows Server 2003.
• Microsoft Internet Explorer 7.0 pour Windows 7, Windows Vista,
Windows XP et Windows Server 2003.
• Mozilla Firefox 1.5 (32 bits) (fonctionnalité limitée).
Pour les dernières informations relatives aux navigateurs Web pris en charge
pour CMC 4.0, voir la Matrice de prise en charge des logiciels des systèmes
Dell sur le site Web support.dell.com/manuals.
Pour afficher les versions localisées de l'interface Web CMC :
1 Ouvrez le Panneau de configuration Windows.
2 Double-cliquez sur l'icône Options régionales.
3 Sélectionnez les paramètres régionaux souhaités dans le menu déroulant
Vos paramètres régionaux (emplacement).
Applications de console de gestion prises
en charge
CMC prend en charge l'intégration de Dell OpenManage IT Assistant.
Pour plus d'informations, reportez-vous au jeu de documentation d'IT
Assistant disponible sur le site Web du support de Dell à l'adresse
support.dell.com/manuals.
Prise en charge WS-Management
Web Services for Management (WS-MAN) est un protocole basé sur SOAP
(protocole simplifié d'accès aux objets) utilisé pour la gestion des systèmes.
WS-MAN fournit un protocole interopérable pour les périphériques afin de
partager et d'échanger des données sur les réseaux. CMC utilise WS-MAN
pour transmettre les informations de gestion CIM (Common Information
Model)-DMTF (Distributed Management Task Force). Les informations
CIM définissent la sémantique et les types d'informations qui peuvent être
manipulés dans un système géré. Les interfaces de gestion de plate-forme de
serveurs intégrées à Dell sont organisées en profils où chaque profil définit les
interfaces spécifiques d'un domaine de gestion particulier ou la zone de
fonctionnalité. En outre, Dell a défini plusieurs extensions de modèle et de
profil qui fournissent des interfaces pour des capacités supplémentaires.30 Présentation
L'accès à WS-Management exige l'ouverture d'une session à l'aide des
privilèges d'utilisateur local au moyen d'une authentification de base sur
le protocole SSH (Secured Socket Layer) au port 443. Pour des informations
sur la configuration de comptes utilisateurs, voir la section Propriétés de la
base de données de la gestion de sessions du RACADM Command Line
Reference Guide for iDRAC6 and CMC (Guide de référence de la ligne de
commande RACADM pour iDRAC6 et CMC).
Les données disponibles via WS-Management constituent un sous-ensemble
de données fournies par l'interface d'instrumentation CMC mise en
correspondance avec les profils DMTF suivants (version 1.0.0) :
• Profil d'allocations de fonctionnalités
• Profil des mesures de base
• Profil du serveur de base
• Profil du système informatique
• Profil du système modulaire
• Profil des actifs physiques
• Profil d'allocation de l'alimentation Dell
• Profil du bloc d'alimentation Dell
• Profil de la topologie d'alimentation Dell
• Profil de gestion de l'état de l'alimentation
• Profil d'enregistrement du profil
• Profil du journal des enregistrements
• Profil d'allocation des ressources
• Profil d'autorisation basée sur les rôles
• Profil des capteurs
• Profil des processeurs de services
• Profil de gestion simple de l'identité
• Profil de client Dell Active Directory
• Profil de contrôle de l'amorçage
• Profil de carte réseau simplifié de DellPrésentation 31
La mise en œuvre WS-MAN CMC utilise SSL sur le port 443 pour sécuriser
le transport et prend en charge l'authentification de base. Pour des
informations sur la configuration de comptes utilisateur, voir la section
Propriétés de la base de données de la gestion de sessions du RACADM
Command Line Reference Guide for iDRAC6 and CMC (Guide de référence
de la ligne de commande RACADM pour iDRAC6 et CMC). Les interfaces
des services Web peuvent être utilisées en exploitant l'infrastructure client,
comme Windows WinRM et l'interface de ligne de commande Powershell, les
utilitaires open source comme WSMANCLI et les environnements de
programmation d'application comme Microsoft .NET.
Pour la connexion client à l'aide de Microsoft WinRM, la version minimale
requise est 2.0. Pour plus d'informations, consultez l'article Microsoft
.
Le Centre technique de Dell contient des guides de mise en œuvre
supplémentaires, des livres blancs, des profils et des exemples de codes à
l'adresse www.delltechcenter.com. Pour plus d'informations, voir :
• Le site Web DTMF : www.dmtf.org/standards/profiles/
• Notes de mise à jour ou fichier « Lisez-moi » de WS-MAN.
• www.wbemsolutions.com/ws_management.html
• Spécifications DMTF WS-Management :
www.dmtf.org/standards/wbem/wsman
Autres documents utiles
En plus de ce manuel, les manuels suivants sont disponibles sur
support.dell.com/manuals. Sur la page Manuels, cliquez sur Logiciel→
Gestion de systèmes. Cliquez sur le lien du produit approprié sur le côté droit
pour accéder aux documents :
• L'aide en ligne de CMC fournit des informations sur l'utilisation de
l'interface Web.
• Les caractéristiques techniques de la carte Secure Digital de CMC
fournissent une version du micrologiciel et un BIOS minimum,
plus des informations sur son installation et son utilisation.
• Le Guide d'utilisation d'Integrated Dell Remote Access Controller 6
(iDRAC6) Enterprise pour les serveurs lames fournit des informations
concernant l'installation, la configuration et la maintenance d'iDRAC
sur les systèmes gérés.32 Présentation
• Le Guide d'utilisation de Dell OpenManage IT Assistant fournit des
informations relatives à IT Assistant.
• Documentation spécifique à votre application tierce de console de gestion.
• Le Guide d'utilisation de Dell OpenManage Server Administrator donne des
informations sur l'installation et l'utilisation de Server Administrator.
• Le Guide d'utilisation des progiciels Dell Update Package fournit des
informations sur l'obtention et l'utilisation des progiciels Dell Update
Package dans le cadre de la stratégie de mise à jour de votre système.
La documentation système suivante fournit des informations
supplémentaires sur le système sur lequel CMC est installé :
• Les instructions de sécurité fournies avec votre système contiennent
d'importantes informations se rapportant à la sécurité et à la
réglementation. Pour obtenir des informations supplémentaires sur la
réglementation, voir la page d'accueil Regulatory Compliance (Conformité
à la réglementation) à l'adresse www.dell.com/regulatory_compliance.
Les informations sur la garantie se trouvent dans ce document ou dans
un document distinct.
• Les documents Guide d'installation du rack et Instructions d'installation du
rack fournis avec la solution rack décrivent l'installation du système.
• Le Manuel du propriétaire du matériel, qui présente les fonctionnalités du
système, contient des informations de dépannage ainsi que des instructions
d'installation ou de remplacement des composants du système.
• La documentation relative aux logiciels de gestion de systèmes décrit les
fonctionnalités, la configuration requise, l'installation et l'utilisation de
base du logiciel.
• La documentation fournie avec les composants achetés séparément
indique comment configurer et installer ces options.
• Les notes de mise à jour ou les fichiers « Lisez-moi » éventuellement
fournis contiennent des mises à jour de dernière minute apportées au
système ou à la documentation ou bien des informations techniques
avancées destinées aux utilisateurs expérimentés ou aux techniciens.
• Pour plus d'informations sur les paramètres réseau de module d'E/S,
reportez-vous au document Dell PowerConnect M6220 Switch Important
Information et au livre blanc Dell PowerConnect 6220 Series Port Aggregator.
Des mises à jour sont parfois fournies avec le système pour décrire les
modifications apportées au système, au logiciel et/ou à la documentation.
lisez toujours les mises à jour en premier, car elles remplacent souvent les
informations contenues dans d'autres documents.Installation et configuration de CMC 33
Installation et configuration de CMC
Cette section contient des informations sur l'installation de votre matériel
CMC, l'accès à CMC et la configuration de votre environnement de gestion
en vue d'utiliser CMC, et vous guide dans les étapes suivantes de
configuration de CMC.
• Configuration de l'accès initial à CMC
• Accès à CMC via un réseau
• Ajout et configuration d'utilisateurs CMC
• Mise à jour du micrologiciel CMC
Pour des informations supplémentaires sur l'installation et la configuration
des environnements CMC redondants, voir « Fonctionnement de
l'environnement CMC redondant », à la page 58.
Avant de commencer
Préalablement à la configuration de votre environnement CMC, téléchargez
la dernière version du micrologiciel CMC depuis le site Web de support de
Dell à l'adresse support.dell.com.
En outre, assurez-vous que vous disposez du DVD Dell Systems Management
Tools and Documentation fourni avec votre système.
Installation du matériel CMC
CMC est pré-installé sur votre châssis, donc aucune installation n'est requise.
Vous pouvez installer un second contrôleur CMC qui servira de CMC de
secours. Pour plus d'informations sur l'utilisation d'un contrôleur de secours,
voir « Fonctionnement de l'environnement CMC redondant », à la page 58. 34 Installation et configuration de CMC
Liste de contrôle pour l'intégration d'un châssis
Les étapes suivantes vous permettent de configurer le châssis avec précision :
1 Votre contrôleur CMC et la station de gestion sur laquelle vous utilisez
votre navigateur doivent appartenir au même réseau appelé le réseau de
gestion. Connectez un câble de réseau Ethernet entre le port CMC
étiqueté GB et le réseau de gestion.
REMARQUE : ne placez pas de câble dans le port Ethernet CMC nommé STK.
Pour plus d'informations sur le câblage du port STK, voir « Fonctionnement de
l'environnement CMC redondant », à la page 58.
2 Installez les modules d'E/S dans le châssis et reliez-les.
3 Insérez les serveurs dans le châssis.
4 Connectez le châssis à la source d'alimentation.
5 Appuyez sur le bouton d'alimentation situé dans le coin inférieur
gauche du châssis ou mettez le châssis sous tension depuis l'interface
CMC après avoir terminé l'étape 7.
REMARQUE : n'allumez pas les serveurs.
6 À l'aide du panneau LCD sur l'avant du système, fournissez à CMC une
adresse IP statique ou DHCP.
7 Connectez-vous à l'adresse IP de CMC via le navigateur web en utilisant le
nom d'utilisateur (root) et le mot de passe (Calvin) par défaut.
8 À chaque iDRAC, donnez une adresse IP dans l'interface utilisateur
CMC et activez l'interface LAN et IPMI.
REMARQUE : l'interface LAN iDRAC sur certains serveurs est désactivée par
défaut.
9 À chaque module d'E/S, donnez une adresse IP dans l'interface
utilisateur CMC.
10 Connectez-vous à chaque iDRAC par l'intermédiaire du navigateur
Web et fournissez la configuration finale d'Idrac. Le nom d'utilisateur
par défaut est root et le mot de passe par défaut est calvin.
11 Connectez-vous à chaque module d'E/S par l'intermédiaire du navigateur
Web et fournissez la configuration finale du module d'E/S.
12 Allumez les serveurs et installez le système d'exploitation.Installation et configuration de CMC 35
Connexion réseau CMC de base
Pour une redondance maximale, connectez chaque contrôleur CMC
disponible à votre réseau de gestion.
Chaque CMC dispose de deux ports Ethernet RJ-45, nommés GB (port de
sortie des données) et STK (port d'extension ou de consolidation de câble).
Vous devez connecter le port GB au réseau de gestion à l'aide d'un câblage
élémentaire et laisser le port STK inutilisé.
PRÉCAUTION : la connexion du port STK au réseau de gestion peut provoquer
des résultats imprévisibles. Le câblage des ports GB et STK au même réseau
(domaine de diffusion) peut provoquer une perturbation importante de la diffusion.
Connexion réseau CMC en chaîne
Si vous disposez de plusieurs châssis dans un rack, vous pouvez réduire le
nombre de connexions au réseau de gestion en connectant jusqu'à quatre
châssis en chaîne. Si chacun des quatre châssis contient un contrôleur
CMC redondant, la connexion en chaîne permet de réduire le nombre
des connexions au réseau de gestion de huit à deux. Si chaque châssis ne
comporte un seul CMC, les connexions sont réduites de quatre à une seule.
Lors de la connexion en chaîne des châssis, GB est le port « de sortie des
données » et STK est le port d'« extension » (consolidation de câble).
Connectez les ports GB au réseau de gestion ou au port STK de CMC dans
un châssis qui est plus proche du réseau. Vous devez connecter le port STK à
un port GB plus éloigné de la chaîne ou du réseau seulement.
Créez des chaînes distinctes pour les contrôleurs CMC des logements
CMC principaux et secondaires.
La Figure 2-1 illustre l'agencement des câbles pour quatre châssis en
chaîne, chacun avec un contrôleur CMC actif et un contrôleur CMC
secondaire de secours.36 Installation et configuration de CMC
Figure 2-1. Connexion réseau CMC en chaîne
1 réseau de gestion 2 CMC de secours
3 CMC actif
1
3
2Installation et configuration de CMC 37
La Figure 2-2, laFigure 2-3 et la Figure 2-4 illustrent des exemples de mauvais
câblage de CMC.
Figure 2-2. Mauvais câblage pour la connexion réseau CMC - 2 CMC
Figure 2-3. Mauvais câblage pour la connexion réseau CMC - 1 CMC38 Installation et configuration de CMC
Figure 2-4. Mauvais câblage pour la connexion réseau CMC - 2 CMC
Pour mettre quatre châssis en chaîne :
1 Connectez le port GB de CMC actif du premier châssis au réseau
de gestion.
2 Connectez le port GB de CMC actif du second châssis au port STK de
CMC actif du premier châssis.
3 Si vous disposez d'un troisième châssis, connectez le port GB de
son contrôleur CMC actif au port STK du contrôleur CMC actif du
second châssis.
4 Si vous disposez d'un quatrième châssis, connectez le port GB de son
contrôleur CMC actif au port STK du troisième châssis.
5 Si vous disposez de CMC redondants dans le châssis, connectez-les selon
le même modèle.
PRÉCAUTION : le port STK de chacun des contrôleurs CMC ne doit jamais
être connecté au réseau de gestion. Il peut uniquement être connecté au port
GB d'un autre châssis. La connexion d'un port STK au réseau de gestion peut
perturber le réseau et entraîner une perte de données. Le câblage des ports
GB et STK au même réseau (domaine de diffusion) peut provoquer une perturbation
importante de la diffusion.
REMARQUE : ne branchez jamais un contrôleur CMC actif sur un contrôleur
CMC secondaire.
REMARQUE : la réinitialisation d'un contrôleur CMC dont le port STK est connecté
en chaîne à un autre contrôleur CMC peut perturber le réseau pour
les contrôleurs CMC situés plus loin dans la chaîne. Les contrôleurs CMC enfants
peuvent journaliser des messages qui indiquent que la liaison réseau a été perdue
et peuvent basculer sur leurs contrôleurs CMC redondants.
Pour démarrer avec CMC, voir « Installation de logiciel d'accès à distance sur
une station de gestion », à la page 39.Installation et configuration de CMC 39
Installation de logiciel d'accès à distance sur
une station de gestion
Vous pouvez accéder à CMC à partir d'une station de gestion à l'aide d'un
logiciel d'accès à distance, tel que les utilitaires de console Telnet, Secure
Shell (SSH) ou série qui se trouvent dans votre système d'exploitation ou
via l'interface Web.
Pour utiliser le RACADM distant à partir de votre station de gestion,
installez-le en utilisant le DVD de documentation et d'outils de Dell Systems
Management qui est disponible avec votre système. Ce DVD inclut les
composants Dell OpenManage suivants :
• Racine du DVD : contient l'utilitaire d'installation et de mise à jour des
systèmes Dell.
• SYSMGMT: contient les produits Systems Management Software, dont
Dell OpenManage Server Administrator.
• Docs : contient la documentation des systèmes, produits logiciels Systems
Management, périphériques et contrôleurs RAID.
• SERVICE : contient les outils dont vous avez besoin pour configurer
votre système ainsi que les derniers diagnostics et pilotes optimisés par
Dell pour votre système.
Pour plus d'informations sur l'installation des composants logiciels Dell
OpenManage, voir le Guide d'utilisation de Dell OpenManage Installation
and Security disponible sur le DVD ou à l'adresse support.dell.com/manuals.
Vous pouvez également télécharger la dernière version des outils DRAC Dell
depuis support.dell.com.
Installation de l'utilitaire RACADM sur une station de gestion Linux
1 Ouvrez une session en tant que « root » sur le système fonctionnant sous le
système d'exploitation Red Hat Enterprise Linux ou SUSE Linux
Enterprise Server sur lequel vous souhaitez installer les composants du
système géré.
2 Insérez le DVD Dell Systems Management Tools and Documentation dans
le lecteur de DVD. 40 Installation et configuration de CMC
3 Pour monter le DVD à l'emplacement requis, utilisez la commande
mount ou une commande similaire.
REMARQUE : sur le système d'exploitation Red Hat Enterprise Linux 5,
les DVD sont montés automatiquement avec l'option -noexec mount.
Cette option ne vous permet pas d'exécuter de fichiers exécutables à partir
du DVD. Vous devez monter manuellement le DVD-ROM, puis exécuter les
programmes exécutables.
4 Accédez au répertoire SYSMGMT/ManagementStation/linux/rac.
Pour installer le logiciel RAC, entrez la commande suivante :
rpm -ivh *.rpm
5 Si vous avez besoin d'aide avec la commande RACADM, tapez
racadm help après avoir émis les commandes précédentes. Pour plus
d'informations sur RACADM, voir « Utilisation de l'interface de ligne
de commande RACADM », à la page 75.
REMARQUE : lors de l'utilisation des fonctionnalités distantes de l'utilitaire
RACADM, vous devez disposer d'un accès en écriture sur les dossiers sur
lesquels vous utilisez les sous-commandes RACADM impliquant des
opérations sur des fichiers, comme par exemple :
racadm getconfig -f
Pour plus d'informations sur racadm à distance, voir « Accès à distance à
RACADM », à la page 81 et les sections suivantes.
Désinstallation de l'utilitaire RACADM sur une station de gestion Linux
1 Ouvrez une session en tant que root sur le système sur lequel vous
souhaitez désinstaller les fonctionnalités de Management Station.
2 Utilisez la commande de requête rpm pour déterminer la version installée
des outils DRAC :
rpm -qa | grep mgmtst-racadm
3 Vérifiez la version du progiciel à désinstaller et désinstallez
la fonctionnalité à l'aide de la commande
rpm -e `rpm -qa | grep mgmtst-racadm`.Installation et configuration de CMC 41
Configuration d'un navigateur Web
Vous pouvez configurer et gérer CMC ainsi que les serveurs et modules
installés sur le châssis via un navigateur Web. voir la section Navigateurs pris
en charge de la Matrice de prise en charge des logiciels des systèmes Dell sur le
site Web support.dell.com/manuals.
Votre CMC et la station de gestion sur laquelle vous utilisez votre navigateur
doivent appartenir au même réseau, que l'on appelle le réseau de gestion. En
fonction de vos besoins de sécurité, le réseau de gestion peut être un réseau
isolé hautement sécurisé.
REMARQUE : vous devez veiller à ce que les mesures de sécurité du réseau de
gestion, telles que les pare-feux et les serveurs proxy, n'empêchent pas votre
navigateur Web d'accéder à CMC.
Il convient également de garder à l'esprit que les fonctionnalités de certains
navigateurs peuvent interférer avec la connectivité et les performances, en
particulier si le réseau de gestion ne dispose pas d'un accès à Internet. Si votre
station de gestion exécute un système d'exploitation Windows, certains
paramètres d'Internet Explorer peuvent interférer avec la connectivité
même si vous utilisez une interface de ligne de commande pour accéder au
réseau de gestion.
Serveur proxy
Pour naviguer via un serveur proxy qui n'a pas accès au réseau de gestion, vous
pouvez ajouter les adresses de réseau de gestion à la liste d'exception du
navigateur. Cela indique au navigateur d'ignorer le serveur proxy lors de
l'accès au réseau de gestion.
Internet Explorer
Pour modifier la liste d'exception dans Internet Explorer :
1 Démarrez Internet Explorer.
2 Cliquez sur Outils→ Options Internet→ Connexions.
3 Dans la section Paramètres du réseau local, cliquez sur Paramètres LAN.
4 Dans la section Serveur proxy, cliquez sur Avancé.
5 Dans la section Exceptions, ajoutez les adresses des contrôleurs CMC et
iDRAC du réseau de gestion à la liste dont les éléments sont séparés par
des points-virgules. Vous pouvez utiliser des noms DNS et des caractères
génériques dans vos entrées. 42 Installation et configuration de CMC
Mozilla FireFox
Pour modifier la liste des exceptions dans Mozilla Firefox version 3.0 :
1 Lancez Mozilla Firefox.
2 Cliquez sur Outils→ Options (pour Windows) ou sur Modifier→
Préférences (pour Linux).
3 Cliquez sur Avancé, puis cliquez sur l'onglet Réseau.
4 Cliquez sur Paramètres.
5 Sélectionnez la Configuration manuelle de Proxy.
6 Dans le champ Pas de proxy pour, ajoutez les adresses des contrôleurs
CMC et iDRAC du réseau de gestion à la liste dont les éléments sont
séparés par des virgules. Vous pouvez utiliser des noms DNS et des
caractères génériques dans vos entrées.
Filtre anti-hameçonnage de Microsoft
Si le filtre anti-hameçonnage de Microsoft est activé dans Internet Explorer 7
sur votre système de gestion, et que votre CMC n'a pas accès à Internet, l'accès
à CMC peut être retardé de quelques secondes. Ce retard peut se produire si
vous utilisez le navigateur ou une autre interface, comme RACADM à distance
Suivez les étapes ci-dessous pour désactiver le filtre anti-hameçonnage :
1 Démarrez Internet Explorer.
2 Cliquez sur Outils→ Filtre anti-hameçonnage, puis sélectionnez
Paramètres du filtre anti-hameçonnage.
3 Cochez la case Désactiver le filtre d'hameçonnage, puis cliquez sur OK.
Récupération de la liste de révocation des certificats (CRL)
Si CMC ne dispose pas d'un accès à Internet, désactivez la fonctionnalité de
récupération de la liste de révocation des certificats dans Internet Explorer.
Cette fonctionnalité vérifie si un serveur comme le serveur Web de CMC utilise
un certificat figurant sur une liste de certificats révoqués, récupérée à partir
d'Internet. Si Internet est inaccessible, cette fonctionnalité peut provoquer des
retards de plusieurs secondes lorsque vous accédez à CMC à l'aide du navigateur
ou d'une interface de ligne de commande telle que RACADM à distance. Installation et configuration de CMC 43
Pour désactiver la récupération de la liste de révocation des certificats :
1 Démarrez Internet Explorer.
2 Cliquez sur Outils→ Options Internet, puis sur Avancé.
3 Faites défiler la liste jusqu'à la section Sécurité et décochez la case Vérifier
la révocation des certificats de l'éditeur, puis cliquez sur OK.
Téléchargement de fichiers à partir de CMC dans Internet Explorer
Lorsque vous utilisez Internet Explorer pour télécharger des fichiers à partir
de CMC, vous risquez de rencontrer des problèmes lorsque l'option Ne pas
enregistrer les pages cryptées sur le disque n'est pas activée.
Suivez les étapes suivantes pour activer l'option Ne pas enregistrer les pages
cryptées sur le disque :
1 Démarrez Internet Explorer.
2 Cliquez sur Outils→ Options Internet, puis sur Avancé.
3 Effectuez un défilement jusqu'à la section Sécurité et cochez Ne pas
enregistrer les pages cryptées sur le disque.
Autorisation des animations dans Internet Explorer
Lors du transfert de fichiers vers et à partir de l'interface Web, une icône de
transfert de fichiers tourne pour indiquer l'activité de transfert. Dans Internet
Explorer, cela exige la configuration du navigateur pour la lecture
d'animations. Il s'agit de la configuration par défaut.
Pour configurer Internet Explorer pour la lecture d'animations :
1 Démarrez Internet Explorer.
2 Cliquez sur Outils→ Options Internet, puis sur Avancé.
3 Faites défiler la liste des paramètres jusqu'à la section Multimédia, puis
cochez l'option Lire les animations dans les pages Web.44 Installation et configuration de CMC
Configuration de l'accès initial à CMC
Pour la gestion à distance de CMC, connectez CMC sur votre réseau de
gestion, puis configurez les paramètres réseau CMC.
REMARQUE : pour gérer la solution M1000e, elle doit être connectée à votre
réseau de gestion.
Pour plus d'informations sur la configuration des paramètres réseau de CMC,
voir « Configuration du réseau CMC », à la page 45. Cette configuration
initiale définit les paramètres réseau TCP/IP qui permettent l'accès à CMC.
CMC et iDRAC sur chaque serveur et les ports de gestion de réseau pour
tous les modules d'E/S sont connectés à un réseau commun interne dans le
châssis M1000e. Cela permet au réseau de gestion d'être isolé du réseau de
données du serveur. Il est important de séparer ce trafic pour un accès
ininterrompu à la gestion du châssis.
CMC est connecté au réseau de gestion. Tout accès externe à CMC et
aux micrologiciels iDRAC s'effectue via CMC. L'accès aux serveurs gérés
s'effectue, à l'inverse, via des connexions réseau aux modules d'E/S.
Cela permet d'isoler le réseau applicatif du réseau de gestion.
REMARQUE : il est recommandé d'isoler la gestion du châssis du réseau de
données. Dell ne peut pas prendre en charge ou garantir la disponibilité d'un châssis
qui est mal intégré à l'environnement. En raison du potentiel de trafic sur le réseau de
données, les interfaces de gestion sur le réseau de gestion interne peuvent être
saturées par le trafic destiné aux serveurs. Il en résulte des retards de communication
dans CMC et iDRAC. Les retards peuvent donner lieu à un comportement imprévisible
du châssis, par exemple, CMC peut afficher iDRAC comme étant hors ligne alors qu'il
est sous tension et en cours d'exécution, entraînant à son tour un autre comportement
indésirable. S'il s'avère peu pratique d'isoler physiquement le réseau de gestion,
l'autre option consiste à séparer le trafic CMC et iDRAC sur un VLAN séparé. Les
interfaces réseau CMC et iDRAC peuvent être configurées pour utiliser un VLAN avec
la commande racadm setniccfg. Pour des informations supplémentaires, voir
le Guide de référence de la ligne de commande RACADM pour iDRAC6 et CMC.
Si vous ne disposez que d'un seul châssis, connectez le contrôleur
CMC principal et le cas échéant le contrôleur CMC secondaire au réseau de
gestion. Si vous avez un contrôleur CMC redondant, utilisez un autre câble
réseau et connectez le port GB CMC à un second port du réseau de gestion.Installation et configuration de CMC 45
Si vous disposez de plusieurs châssis, vous pouvez choisir entre une connexion
de base où chaque CMC est connecté au réseau de gestion, et une connexion
en chaîne des châssis où les châssis sont connectés en série et où seul l'un
d'entre eux est connecté au réseau de gestion. La connexion de base utilise un
plus grand nombre de ports sur le réseau de gestion et offre une plus grande
redondance. La connexion en chaîne utilise un nombre moins important de
ports sur le réseau de gestion mais introduit des dépendances entre les
contrôleurs CMC, ce qui réduit la redondance du système.
Pour plus d'informations sur la connexion en chaîne, voir « Connexion réseau
CMC en chaîne », à la page 35.
REMARQUE : un câblage incorrect du contrôleur CMC dans une configuration
redondante peut entraîner la perte de la gestion et créer des perturbations
importantes de la diffusion.
Configuration du réseau CMC
REMARQUE : si vous modifiez les paramètres réseau de CMC, la
connexion réseau en cours risque d'être coupée.
Vous pouvez effectuer la configuration réseau initiale d'un contrôleur CMC
avant ou après l'obtention d'une adresse IP par CMC. Si vous configurez les
paramètres réseau initiaux de CMC avant d'avoir obtenu une adresse IP,
vous pouvez utiliser l'une des interfaces suivantes :
• L'écran LCD du panneau avant du châssis
• La console série CMC Dell
Si vous configurez les paramètres réseau initiaux de CMC après avoir obtenu
une adresse IP, vous pouvez utiliser l'une des interfaces suivantes :
• Interfaces de ligne de commande telles que la console série, Telnet,
SSH ou la console CMC Dell via iKVM
• RACADM à distance
• L'interface Web CMC46 Installation et configuration de CMC
Configuration de la mise en réseau à l'aide de l'Assistant Configuration
de l'écran LCD
REMARQUE : vous ne pouvez utiliser l'Assistant Configuration de l'écran LCD pour
configurer CMC qu'avant le déploiement de CMC ou la modification du mot
de passe par défaut. Si le mot de passe n'est pas modifié, il est toujours possible
d'utiliser l'écran LCD pour reconfigurer CMC, en créant un risque de sécurité.
L'écran LCD se situe dans le coin inférieur gauche à l'avant du châssis.
La Figure 2-5 présente l'écran LCD.
Figure 2-5. Affichage LCD
L'écran LCD affiche des menus, des icônes, des images et des messages.
1 écran LCD 2 bouton de sélection
3 boutons de défilement (4) 4 indicateur d'état LED
1
2
3
4Installation et configuration de CMC 47
Un indicateur d'état LED de l'écran LCD fournit une indication de l'intégrité
générale du châssis et de ses composants.
• Un voyant bleu continu indique une intégrité satisfaisante.
• Un voyant orange clignotant indique qu'au moins un composant
est défaillant.
• Un voyant bleu clignotant est un signal d'identification d'un châssis au
sein d'un groupe de châssis.
Navigation dans l'écran LCD
Le côté droit de l'écran LCD comporte cinq boutons : quatre boutons flèche
(haut, bas, gauche et droite) ainsi qu'un bouton central.
• Pour passer d'un écran à l'autre, utilisez les boutons flèche droite (suivant)
et gauche (précédent). Au cours de l'utilisation de l'Assistant
Configuration, vous pouvez à tout moment revenir à l'écran précédent.
• Pour faire défiler les options d'un écran, utilisez les boutons flèche
bas et haut.
• Pour sélectionner et enregistrer l'élément d'un écran et passer à l'écran
suivant, utilisez le bouton central.
Pour des informations supplémentaires sur l'utilisation de l'écran LCD,
voir la section portant sur l'écran LCD du Guide de référence de la ligne de
commande RACADM pour iDRAC6 et CMC.
Utilisation de l'Assistant Configuration de l'écran LCD
Pour configurer le réseau à l'aide de l'Assistant Configuration de l'écran LCD :
1 Si ce n'est déjà fait, appuyez sur le bouton d'alimentation du châssis pour
le mettre sous tension.
L'écran LCD affiche une série d'écrans d'initialisation lors de sa mise sous
tension. Lorsqu'il est prêt, l'écran Configuration de la langue s'affiche.
2 Sélectionnez votre langue à l'aide des boutons fléchés, puis appuyez sur le
bouton central pour sélectionner Accepter/Oui, puis appuyez à nouveau
sur le bouton central.
3 L'écran Enceinte s'affiche avec la question suivante :
Configurer l'enceinte ?.
a Appuyez sur le bouton central pour passer à l'écran Paramètres réseau
CMC. Voir l'étape 4.
b Pour quitter le menu Configurer l'enceinte, sélectionnez l'icône NON
et appuyez sur le bouton central. Voir l'étape 9. 48 Installation et configuration de CMC
4 Appuyez sur le bouton central pour passer à l'écran Paramètres
réseau CMC.
5 Sélectionnez la vitesse de votre réseau (10 Mbits/s, 100 Mbits/s, 1 Gbit/s
ou Automatique) à l'aide du bouton flèche bas.
REMARQUE : Le paramètre Vitesse réseau doit correspondre à votre
configuration réseau afin de garantir l'efficacité du débit du réseau. Si la
vitesse réseau que vous paramétrez est inférieure à la vitesse de votre
configuration réseau, la consommation de bande passante augmente et les
communications réseau ralentissent. Déterminez si votre réseau prend en
charge les vitesses réseau ci-dessus et paramétrez-le en conséquence. Si
votre configuration réseau ne correspond à aucune de ces valeurs, Dell vous
recommande d'utiliser la négociation automatique (option Automatique) ou de
contacter le fabricant de votre équipement réseau.
Appuyez sur le bouton central pour passer à l'écran Paramètres réseau
CMC suivant.
6 Sélectionnez le mode duplex (semi ou total) qui correspond à votre
environnement réseau.
REMARQUE : les paramètres de la vitesse réseau et du mode duplex ne sont
pas disponibles lorsque l'option de négociation automatique est activée ou
qu'une vitesse de 1 000 Mo (1 Gbit/s) est sélectionnée.
REMARQUE : si la négociation automatique est activée pour un périphérique
mais pas pour l'autre, alors le périphérique qui utilise la négociation
automatique peut déterminer la vitesse réseau de l'autre périphérique,
mais pas le mode duplex. Dans ce cas, le mode duplex adopte par défaut
le paramètre Semi-duplex lors de la négociation automatique. Une telle
différence de mode duplex entraîne un ralentissement des connexions réseau.
Appuyez sur le bouton central pour passer à l'écran Paramètres réseau
CMC suivant.
7 Sélectionnez le protocole Internet (IPv4, IPv6, ou les deux) que vous
souhaitez utiliser pour CMC.
Appuyez sur le bouton central pour passer à l'écran Paramètres réseau
CMC suivant.Installation et configuration de CMC 49
8 Sélectionnez le mode selon lequel vous souhaitez que CMC obtienne les
adresses IP de la carte réseau :
REMARQUE : si le mode DHCP (Protocole de configuration dynamique des
hôtes) est sélectionné pour la configuration IP CMC, l'enregistrement DNS est
alors également activé par défaut.
DHCP
(Dynamic Host
Configuration
Protocol -
Protocole de
configuration
dynamique
des hôtes)
CMC récupère automatiquement la configuration IP
(adresse IP, masque et passerelle) auprès d'un serveur DHCP
de votre réseau. CMC reçoit une adresse IP unique allouée
via votre réseau. Si vous avez sélectionné l'option DHCP,
appuyez sur le bouton central. L'écran Configurer iDRAC ?
s'affiche. Passez à l'étape 10.
Statique Vous devez entrer manuellement l'adresse IP, la passerelle et
le masque de sous-réseau dans les écrans qui suivent.
Si vous avez sélectionné l'option Statique, appuyez sur le
bouton central pour poursuivre avec l'écran Paramètres
réseau CMC suivant, puis :
a Définissez l'adresse IP statique en utilisant les touches
fléchées droite ou gauche pour vous déplacer et les
touches fléchées haut et bas pour sélectionner un nombre
pour chaque position. Une fois l'adresse IP statique
définie, appuyez sur le bouton central pour continuer.
b Définissez le masque de sous-réseau, puis appuyez sur le
bouton central.
c Définissez la passerelle, puis appuyez sur le bouton
central. L'écran Résumé réseau s'affiche.
L'écran Résumé réseau répertorie l'adresse IP statique, le
masque de sous-réseau et la passerelle que vous venez
d'entrer. Vérifiez l'exactitude de ces paramètres. Pour
corriger un paramètre, accédez au bouton flèche gauche,
puis appuyez sur le bouton central pour retourner à
l'écran de ce paramètre. Après avoir effectué une
correction, appuyez sur le bouton central.
d Après avoir vérifié l'exactitude des paramètres entrés,
appuyez sur le bouton central. L'écran Enregistrer le
DNS ? apparaît.50 Installation et configuration de CMC
9 Si vous avez sélectionné DHCP à l'étape précédente, passez à l'étape 10.
Pour enregistrer l'adresse IP de votre serveur DNS, appuyez sur le bouton
central. Si vous ne possédez pas de DNS, appuyez sur la touche fléchée
droite. L'écran Enregistrer le DNS ? apparaît ; passez à l'étape 10.
Définissez l'adresse IP du DNS en utilisant les touches fléchées droite ou
gauche pour vous déplacer et les touches fléchées haut et bas pour
sélectionner un nombre pour chaque position. Une fois l'adresse IP du
DNS définie, appuyez sur le bouton central pour continuer.
10 Indiquez si vous souhaitez configurer iDRAC :
– Non : passez à l'étape 13.
– Oui : appuyez sur le bouton central pour continuer.
Vous pouvez également configurer iDRAC depuis l'interface
utilisateur CMC.
11 Sélectionnez le protocole Internet (IPv4, IPv6, ou les deux) que vous
souhaitez utiliser pour les serveurs.
Dynamic Host
Configuration
Protocol
(Protocole de
configuration
dynamique
des hôtes)
iDRAC récupère automatiquement la configuration IP
(adresse IP, masque et passerelle) auprès d'un serveur DHCP
de votre réseau. Une adresse IP unique sera attribuée à
iDRAC via votre réseau. Appuyez sur le bouton central. Installation et configuration de CMC 51
a Sélectionnez Activer ou Désactiver pour activer ou désactiver le canal
IPMI LAN. Appuyez sur le bouton central pour continuer.
b Sur l'écran Configuration iDRAC, pour appliquer tous les paramètres
réseau iDRAC aux serveurs installés, mettez en surbrillance l'icône
Accepter/Oui, puis appuyez sur le bouton central. Pour ne pas
appliquer les paramètres réseau iDRAC aux serveurs installés,
mettez en surbrillance l'icône Non et appuyez sur le bouton central
pour passer à l'étape c.
c Sur l'écran Configuration iDRAC suivant, pour appliquer tous les
paramètres réseau iDRAC aux serveurs récemment installés, mettez
en surbrillance l'icône Accepter/Oui et appuyez sur le bouton central ;
lorsqu'un nouveau serveur est inséré dans le châssis, l'écran LCD invite
l'utilisateur à préciser s'il souhaite déployer automatiquement le
serveur à l'aide des paramètres/règles réseau précédemment configurés.
Pour ne pas appliquer les paramètres réseau iDRAC aux serveurs
récemment installés, mettez en surbrillance l'icône Non et appuyez sur
le bouton central ; lorsqu'un nouveau serveur est inséré dans le châssis,
les paramètres réseau iDRAC ne sont pas configurés.
Statique Vous devez entrer manuellement l'adresse IP, la passerelle et
le masque de sous-réseau dans les écrans qui suivent.
Si vous avez sélectionné l'option Statique, appuyez sur le
bouton central pour passer à l'écran Paramètres réseau
iDRAC suivant, puis :
a Définissez l'adresse IP statique en utilisant les touches
fléchées droite ou gauche pour vous déplacer et les
touches fléchées haut et bas pour sélectionner un
nombre pour chaque position. Cette adresse est
l'adresse IP statique de l'iDRAC qui se trouve dans
le premier logement. L'adresse IP statique de chaque
iDRAC suivant est calculée en tant qu'incrément du
numéro d'emplacement de cette adresse IP. Une fois
l'adresse IP statique définie, appuyez sur le bouton
central pour continuer.
b Définissez le masque de sous-réseau, puis appuyez sur
le bouton central.
c Définissez la passerelle, puis appuyez sur le
bouton central. 52 Installation et configuration de CMC
12 Sur l'écran Enceinte, mettez en surbrillance l'icône Accepter/Oui et
appuyez sur le bouton central pour appliquer tous les paramètres
d'enceinte. Pour ne pas appliquer les paramètres d'enceinte, mettez
en surbrillance l'icône Non et appuyez sur le bouton central.
13 Sur l'écran Résumé IP, vérifiez que les adresses IP que vous avez fournies
sont correctes. Pour corriger un paramètre, accédez au bouton flèche
gauche, puis appuyez sur le bouton central pour retourner à l'écran de
ce paramètre. Après avoir effectué votre correction, appuyez sur le bouton
central. Le cas échéant, accédez au bouton flèche droite, puis appuyez
sur le bouton central pour retourner à l'écran Résumé IP.
Lorsque vous avez confirmé l'exactitude des paramètres saisis, appuyez
sur le bouton central. L'Assistant Configuration se ferme et l'écran
Menu principal s'affiche.
REMARQUE : si vous avez sélectionné Oui/Accepter, l'écran Attente
apparaît avant l'affichage de l'écran Résumé IP.
Les modules CMC et iDRAC sont désormais disponibles sur le réseau. Vous
pouvez accéder à CMC sur l'adresse IP attribuée à l'aide de l'interface Web ou
des interfaces de ligne de commande telles que la console série, Telnet et SSH.
REMARQUE : une fois la configuration réseau à l'aide de l'Assistant Configuration
de l'écran LCD terminée, l'Assistant devient indisponible.Installation et configuration de CMC 53
Accès à CMC via un réseau
Après avoir configuré les paramètres réseau CMC, vous pouvez accéder à
distance à CMC à l'aide de l'une des interfaces suivantes : La Figure 2-1
répertorie les interfaces que vous pouvez utiliser pour accéder à distance à CMC.
REMARQUE : puisque telnet n'est pas aussi sécurisé que les autres interfaces, il
est désactivé par défaut. Activez Telnet via le Web, SSH ou RACADM à distance.
REMARQUE : le nom d'utilisateur par défaut de CMC est root et le mot de passe
par défaut est calvin.
Tableau 2-1. Interfaces CMC
Interface Description
Interface Web Fournit un accès à distance à CMC à l'aide d'une interface
utilisateur. L'interface Web est intégrée au micrologiciel CMC et
accessible via l'interface NIC d'un navigateur Web pris en charge
sur la station de gestion.
Pour obtenir la liste des navigateurs Web pris en charge,
consultez la section Navigateurs pris en charge de la Matrice de
prise en charge des logiciels des systèmes Dell sur le site Web
support.dell.com/manuals.
Interface de ligne
de commande
RACADM à
distance
Fournit un accès à distance à CMC à partir d'une station de
gestion qui utilise une interface de ligne de commande.
L'utilitaire RACADM distant utilise l'option racadm -r avec
l'adresse IP de CMC pour exécuter des commandes sur CMC.
Pour plus d'informations sur racadm à distance, voir « Accès à
distance à RACADM », à la page 81 et les sections suivantes.
Telnet Fournit un accès par ligne de commande à CMC via le réseau.
L'interface de ligne de commande RACADM et la commande
connect, utilisées pour se connecter à la console série d'un
serveur ou d'un module d'E/S, sont disponibles à partir de la ligne
de commande CMC.
REMARQUE : Telnet est un protocole non sécurisé qui transmet
toutes les données, y compris les mots de passe, en texte simple.
Pour transmettre des informations critiques, utilisez l'interface SSH.
SSH Fournit les mêmes fonctionnalités que la console Telnet
par l'utilisation d'une couche de transport cryptée pour
une sécurité accrue.54 Installation et configuration de CMC
Vous pouvez accéder aux interfaces Web CMC et iDRAC via la carte
d'interface réseau CMC à l'aide d'un navigateur Web pris en charge.
Vous pouvez également les lancer à partir de Dell Server Administrator ou
de Dell OpenManage IT Assistant.
Pour obtenir la liste des navigateurs Web pris en charge, consultez la section
Navigateurs pris en charge de la Matrice de prise en charge des logiciels des
systèmes Dell sur le site Web support.dell.com/manuals. Pour accéder à CMC
via un navigateur Web pris en charge, voir « Accès à l'interface Web CMC », à
la page 111.
Pour accéder à l'interface CMC à l'aide de Dell Server Administrator,
lancez Server Administrator sur votre station de gestion. Dans l'arborescence
du système située sur le panneau gauche de la page d'accueil de Server
Administrator, cliquez sur Système→ Châssis principal du système→
Remote Access Controller. Pour plus d'informations, consultez le Guide
d'utilisation de Dell Server Administrator.
Pour accéder à la ligne de commande de CMC à l'aide de Telnet ou de SSH,
voir « Configuration de CMC pour utiliser des consoles de ligne de
commande », à la page 61.
Pour plus d'informations sur l'utilisation de RACADM, voir « Utilisation
de l'interface de ligne de commande RACADM », à la page 75.
Pour plus d'informations sur l'utilisation de la commande connect, ou racadm
connect, pour se connecter aux serveurs et modules d'E/S, voir « Connexion aux
serveurs ou aux modules d'E/S à l'aide de la commande Connect », à la page 67.
Installation ou mise à jour du micrologiciel du
module CMC
La section suivante décrit l'installation et la mise à jour du micrologiciel CMC.
Téléchargement du micrologiciel du module CMC
Avant de procéder à la mise à jour du micrologiciel, téléchargez la dernière
version du micrologiciel à partir du site support.dell.com et enregistrez-la sur
le système local.
Le progiciel du micrologiciel CMC comprend les éléments suivants :
• Code et données compilés du micrologiciel du module CMC
• Fichiers de données de l'interface Web, JPEG et d'autres
interfaces utilisateur
• Fichiers de configuration par défautInstallation et configuration de CMC 55
REMARQUE : lors des mises à jour du micrologiciel CMC, une partie ou l'ensemble
des ventilateurs du châssis tourne à 100 %.
REMARQUE : par défaut, la mise à jour du micrologiciel conserve les paramètres
CMC définis. Au cours de la mise à jour, vous pouvez réinitialiser les paramètres de
configuration du module CMC afin de rétablir les valeurs par défaut définies en usine.
REMARQUE : si des contrôleurs CMC redondants sont installés dans le châssis, il
est primordial de les mettre tous les deux à jour avec la même version du
micrologiciel. Si les contrôleurs CMC utilisent des micrologiciels différents et qu'un
basculement se produit, des résultats inattendus peuvent se produire.
Vous pouvez utiliser la commande getsysinfo de RACADM (voir la section
relative à la commande getsysinfo du Guide de référence de la ligne de commande
RACADM pour iDRAC6 et CMC) ou la page Résumé du châssis (voir « Affichage
des versions actuelles du micrologiciel », à la page 216) pour afficher les versions
de micrologiciel actuelles des contrôleurs CMC installés dans votre châssis.
Si vous disposez d'un contrôleur CMC de secours, il est recommandé de mettre
les deux contrôleurs CMC à jour en même temps en une seule opération.
Une fois le contrôleur de secours mis à jour, permutez les rôles des modules
CMC de manière à ce que celui qui vient d'être mis à jour devienne le contrôleur
actif et que celui doté de l'ancien micrologiciel devienne le contrôleur de secours.
(voir la section relative à la commande cmcchangeover du Guide de référence de
la ligne de commande RACADM pour iDRAC6 et CMC pour obtenir de l'aide
concernant l'échange de rôles). Ceci vous permet de vérifier que la mise à jour
s'est bien déroulée et que le nouveau micrologiciel fonctionne correctement
avant de procéder à la mise à jour du micrologiciel au sein du deuxième
contrôleur CMC. Lorsque les deux contrôleurs CMC sont mis à jour, vous
pouvez utiliser la commande cmcchangeover pour rétablir leurs rôles précédents.
Le micrologiciel CMC révision 2.x met à jour le contrôleur principal et le
contrôleur redondant sans avoir recours à la commande cmcchangeover.
Mise à jour du micrologiciel CMC à l'aide de l'interface Web
Pour des instructions sur l'utilisation de l'interface Web pour la mise à jour du
micrologiciel CMC, voir « Mise à jour du micrologiciel du contrôleur CMC »,
à la page 218.
Mise à jour du micrologiciel CMC via RACADM
Pour obtenir des instructions relatives à l'utilisation de la sous-commande
fwupdate pour mettre à jour le micrologiciel CMC, consultez la section
relative à la commande fwupdate du Guide de référence de la ligne de
commande RACADM pour iDRAC6 et CMC.56 Installation et configuration de CMC
Configuration des propriétés de CMC
Vous pouvez configurer les propriétés de CMC telles que le bilan
d'alimentation, les paramètres réseau, les utilisateurs et les alertes
SNMP et par e-mail à l'aide de l'interface Web ou de RACADM.
Pour plus d'informations sur l'utilisation de l'interface Web, voir
« Accès à l'interface Web CMC », à la page 111. Pour plus d'informations
sur l'utilisation de RACADM, voir « Utilisation de l'interface de ligne
de commande RACADM », à la page 75.
PRÉCAUTION : l'utilisation simultanée de plusieurs outils de configuration CMC
peut provoquer des résultats inattendus.
Configuration des bilans de puissance
CMC offre un service d'établissement d'un bilan de puissance qui vous
permet de configurer le bilan de puissance, la redondance et l'alimentation
dynamique du châssis.
Le service de gestion de l'alimentation permet l'optimisation de la
consommation électrique et la réattribution de l'alimentation aux différents
modules en fonction de la demande.
Pour plus d'informations sur la gestion de l'alimentation de CMC, voir
« Gestion de l'alimentation », à la page 335.
Pour des instructions sur la configuration du bilan de puissance et des autres
paramètres d'alimentation à l'aide de l'interface Web, voir « Configuration
des bilans de puissance », à la page 214.
Configuration des paramètres réseau de CMC
REMARQUE : si vous modifiez les paramètres réseau de CMC, la
connexion réseau en cours risque d'être coupée.
Vous pouvez configurer les paramètres réseau de CMC à l'aide de l'un des
outils suivants :
• RACADM : pour plus d'informations, voir « Configuration de plusieurs
CMC dans plusieurs châssis », à la page 101.
REMARQUE : pour déployer CMC dans un environnement Linux, voir « Installation
de l'utilitaire RACADM sur une station de gestion Linux », à la page 39.
• Interface Web : pour plus d'informations, voir « Configuration des
propriétés du réseau CMC », à la page 162.Installation et configuration de CMC 57
Ajout et configuration des utilisateurs
Vous pouvez ajouter et configurer des utilisateurs CMC à l'aide de RACADM
ou de l'interface Web CMC. Vous pouvez également utiliser Microsoft Active
Directory pour gérer les utilisateurs.
Pour obtenir des instructions sur l'ajout et la configuration des utilisateurs de
clé publique pour CMC à l'aide de RACADM, voir « Utilisation de RACADM
pour configurer l'authentification par clé publique sur SSH », à la page 96.
Pour des instructions sur l'ajout et la configuration d'utilisateurs à l'aide de
l'interface Web, voir « Ajout et configuration d'utilisateurs CMC », à la page 174.
Pour des instructions sur l'utilisation d'Active Directory avec votre CMC, voir
« Utilisation du service d'annuaire CMC », à la page 285.
Ajout d'alertes SNMP et par e-mail
Vous pouvez configurer CMC pour qu'il génère des alertes SNMP et/ou
par e-mail lorsque certains événements se produisent au niveau du châssis.
Pour en savoir plus, voir « Configuration des alertes SNMP », à la page 438
et « Configuration des alertes par messagerie », à la page 445.
Configuration de Syslog distant
La fonctionnalité syslog distant est activée/configurée via
l'interface utilisateur de CMC ou la commande racadm. Les options de
configuration incluent le nom (ou l'adresse IP) du serveur syslog et le
port UDP utilisé par CMC lors du transfert des entrées du journal.
Vous pouvez spécifier jusqu'à 3 destinations de serveur syslog distinctes dans
la configuration. Syslog distant constitue une cible de journal supplémentaire
pour CMC. Lorsque vous avez configuré syslog distant, chaque nouvelle
entrée de journal générée par CMC est transférée aux destinations.
REMARQUE : comme le transport réseau pour les entrées de journal transférées
est UDP, il n'existe aucune garantie que les entrées de journal sont délivrées, pas
plus que CMC n'indique si les entrées de journal ont été correctement reçues.
Pour configurer les services CMC :
1 Ouvrez une session sur l'interface Web de CMC.
2 Cliquez sur l'onglet Réseau.
3 Cliquez sur le sous-onglet Services. La page Services s'affiche.
Pour plus d'informations sur la configuration de syslog distant, voir la Figure 5-58.58 Installation et configuration de CMC
Fonctionnement de l'environnement CMC redondant
Vous pouvez installer un contrôleur CMC de secours qui prend la relève en
cas de défaillance du contrôleur CMC actif. Le contrôleur CMC redondant
peut être pré-installé ou ajouté à une date ultérieure. Il est important que le
réseau de CMC soit correctement câblé pour assurer une redondance
complète ou des performances optimales.
Un basculement peut survenir lorsque vous :
• Exécutez la commande RACADM cmcchangeover. (Voir la section
relative à la commande cmcchangeover du Guide de référence de la ligne
de commande RACADM pour iDRAC et CMC.
• Exécutez la commande RACADM racreset sur le contrôleur CMC actif.
(Voir la section relative à la commande racreset du Guide de référence de la
ligne de commande RACADM pour iDRAC6 et CMC.
• Réinitialisez le contrôleur CMC actif à partir de l'interface Web.
(Reportez-vous à l'option Réinitialiser le contrôleur CMC des opérations
de contrôle de l'alimentation décrite dans « Exécution de tâches de
contrôle de l'alimentation sur le châssis », à la page 379.)
• Retirez le câble réseau du contrôleur CMC actif.
• Retirez le contrôleur CMC actif du châssis.
• Lancez un flash du micrologiciel CMC sur le contrôleur CMC actif.
• Disposez d'un contrôleur CMC actif qui n'est plus fonctionnel.
REMARQUE : en cas de basculement de CMC, toutes les connexions iDRAC et
toutes les sessions CMC actives sont perdues. Les utilisateurs dont la session est
perdue doivent se reconnecter au nouveau contrôleur CMC actif.
À propos du contrôleur CMC de secours
Le contrôleur CMC de secours est identique au contrôleur CMC actif et est
maintenu comme un miroir de celui-ci. Les contrôleurs CMC actif et de
secours doivent tous deux être installés avec la même révision du
micrologiciel. Si les révisions du micrologiciel diffèrent, le système signale
une dégradation de la redondance.
Le contrôleur CMC de secours prend en charge les mêmes paramètres et
propriétés que le contrôleur actif. Vous devez maintenir la même version du
micrologiciel sur les deux contrôleurs CMC mais vous n'avez pas à reproduire
les paramètres de configuration sur le contrôleur CMC de secours.
REMARQUE : pour des informations sur l'installation d'un contrôleur CMC de
secours, consultez le Manuel du propriétaire du matériel. pour des instructions sur
l'installation du micrologiciel CMC sur votre CMC de secours, voir « Installation ou
mise à jour du micrologiciel du module CMC », à la page 54.Installation et configuration de CMC 59
Mode de sécurité CMC
En mode de sécurité, semblable à la protection de basculement offerte par
le CMC redondant, l'enceinte M1000e active le mode de sécurité en vue de
protéger les lames et les modules E/S de toute défaillance. Le mode de
sécurité est activé lorsque aucun CMC ne contrôle le châssis. Au cours du
basculement du CMC ou lors de la perte de gestion d'un CMC unique :
• Vous ne pouvez pas mettre sous tension des lames nouvellement installées.
• Vous ne pouvez pas accéder à distance aux lames existantes.
• Les ventilateurs de refroidissement du châssis tournent à 100 % pour la
protection thermique des composants.
• Jusqu'à la restauration de la gestion du CMC, la performance des lames est
réduite afin de limiter la consommation d'énergie.
La perte de gestion de CMC peut entraîner les conditions suivantes :
• Suppression du CMC : la gestion du châssis reprend après le
remplacement du CMC ou après le basculement au CMC de secours.
• Suppression du câble réseau du CMC ou perte de connexion réseau du
CMC : la gestion du châssis reprend après le basculement du châssis vers le
CMC de secours. Le basculement du réseau est possible uniquement en
mode CMC redondant.
• Réinitialisation du CMC : la gestion du châssis est rétablie après le
redémarrage du CMC ou après le basculement du châssis vers le
CMC en attente.
• Commande de basculement du CMC émise : la gestion du châssis est
rétablie après le basculement du châssis vers le CMC de secours.
• Réinitialisation du micrologiciel du CMC : la gestion du châssis reprend
après le redémarrage du CMC ou après le basculement du châssis vers le
CMC de secours. Il vous est recommandé de mettre d'abord à jour le
CMC de secours afin qu'un seul événement de basculement se produise.
• Détection et correction d'erreurs du CMC : la gestion du châssis
reprend après la réinitialisation du CMC ou le basculement du châssis
vers le CMC de secours.
REMARQUE : vous pouvez configurer l'enceinte soit avec un CMC unique
soit à l'aide de CMC redondants. Dans le cadre de configurations de CMC
redondants, si le CMC principal perd la communication avec l'enceinte ou le
réseau de gestion, le CMC de secours assure la gestion du châssis. 60 Installation et configuration de CMC
Processus de sélection de CMC actif
Il n'existe aucune différence entre les deux logements CMC ; en d'autres
termes, l'un ne prévaut pas sur l'autre. En effet, le contrôleur CMC qui est
installé ou démarré le premier assume le rôle de contrôleur CMC actif. Si une
alimentation alternative est appliquée aux deux contrôleurs CMC installés, le
contrôleur CMC installé dans le logement CMC 1 du châssis (à gauche)
assume normalement le rôle de contrôleur CMC actif. Le contrôleur CMC
actif est signalé par une LED bleue.
Si deux contrôleurs CMC sont insérés dans un châssis qui est déjà sous
tension, la négociation automatique active/de secours peut prendre jusqu'à
deux minutes. Le fonctionnement normal du châssis est rétabli une fois la
négociation terminée.
Obtention de la condition d'intégrité du contrôleur CMC redondant
Vous pouvez afficher la condition d'intégrité du contrôleur CMC de secours
dans l'interface Web. Pour plus d'informations sur l'accès à la condition
d'intégrité de CMC dans l'interface Web,voir 130.Configuration de CMC pour utiliser des consoles de ligne de commande 61
Configuration de CMC pour utiliser
des consoles de ligne de commande
Cette section fournit des informations sur les fonctionnalités de la console de
ligne de commande CMC (ou console série/Telnet/Secure Shell) et explique
comment configurer votre système de manière à pouvoir effectuer des actions
de gestion de systèmes via la console. Pour plus d'informations sur l'utilisation
des commandes RACADM dans CMC via la console de ligne de commande,
voir « Utilisation de l'interface de ligne de commande RACADM », à la page 75.
Fonctionnalités de la console de ligne de
commande de CMC
CMC prend en charge les fonctions de console série, Telnet et SSH suivantes :
• Une connexion de client série et un maximum de quatre connexions de
clients Telnet simultanées.
• Un maximum de quatre connexions de clients Secure Shell
(SSH) simultanées.
• Prise en charge des commandes RACADM.
• Commande connect intégrée de connexion à la console série des serveurs et
des modules d'E/S ; également disponible sous la forme racadm connect.
• Modification et historique de la ligne de commande.
• Contrôle du délai d'expiration de la session sur toutes les interfaces
de console.62 Configuration de CMC pour utiliser des consoles de ligne de commande
Utilisation d'une console série, Telnet ou SSH
Lorsque vous vous connectez à la ligne de commande CMC, vous pouvez entrer
les commandes suivantes :
Utilisation d'une console Telnet avec CMC
Un maximum de quatre systèmes client Telnet et quatre clients SSH peuvent
se connecter à la fois.
Si votre station de gestion exécute Windows XP ou Windows 2003, un
problème peut surgir au niveau des caractères lors d'une session Telnet sur
CMC. Ce problème peut prendre la forme d'une ouverture de session figée, la
touche Retour ne répondant pas et l'invite de mot de passe n'apparaissant pas.
Pour résoudre ce problème, téléchargez le correctif 824810 à partir du
site Web du support de Microsoft à l'adresse support.microsoft.com.
Consultez l'article 824810 de la Base de connaissances de Microsoft pour
plus d'informations.
Tableau 3-1. Commandes de la ligne de commande CMC
Commande Description
racadm Les commandes RACADM commencent par le mot-clé racadm et
sont suivies d'une sous-commande, comme getconfig, serveraction ou
getsensorinfo. Voir « Utilisation de l'interface de ligne de commande
RACADM », à la page 75 plus de détails sur l'utilisation de RACADM.
connect Établit une connexion à la console série d'un serveur ou d'un module
d'E/S. Voir « Connexion aux serveurs ou aux modules d'E/S à l'aide de
la commande Connect », à la page 67 pour obtenir de l'aide sur
l'utilisation de la commande connect.
REMARQUE : la commande racadm connect peut également être utilisée.
exit, logout
et quit
Ces commandes exécutent toutes la même action : elles mettent fin à
la session en cours et retournent à une invite d'ouverture de session. Configuration de CMC pour utiliser des consoles de ligne de commande 63
Utilisation de SSH avec CMC
SSH est une session de ligne de commande qui intègre les mêmes
fonctions qu'une session Telnet, mais avec la négociation et le cryptage de
session afin d'améliorer la sécurité. CMC prend en charge la version 2 de
SSH avec authentification par mot de passe. Par défaut, SSH est activé sur
le contrôleur CMC.
REMARQUE : CMC ne prend pas en charge la version 1 de SSH.
Lorsqu'une erreur se produit lors de la procédure d'ouverture de session, le
client SSH publie un message d'erreur. Le texte du message dépend du client
et n'est pas contrôlé par le contrôleur CMC. Consultez les messages RACLog
pour déterminer la cause de la panne.
REMARQUE : OpenSSH doit être exécuté à partir d'un émulateur de terminal
VT100 ou ANSI sous Windows. Vous pouvez aussi exécuter OpenSSH à l'aide de
Putty.exe. L'exécution d'OpenSSH à partir d'une invite de commande Windows
n'offre pas une fonctionnalité complète (quelques touches ne répondent pas et
aucun graphique n'est affiché). Pour Linux, exécutez les services de clients SSH
pour vous connecter à CMC avec n'importe quel shell.
Quatre sessions SSH simultanées sont prises en charge à la fois.
Le délai d'expiration de la session est contrôlé par la propriété
cfgSsnMgtSshIdleTimeout. Pour des informations supplémentaires,
consultez le chapitre portant sur les propriétés de la base de données du
Guide de référence de la ligne de commande RACADM pour iDRAC6 et CMC,
la page Gestion des services dans l'interface Web, ou voir « Configuration des
services », à la page 205.
CMC prend également en charge l'authentification par clé publique (PKA) sur
SSH. Cette méthode d'authentification améliore l'automatisation des scripts
SSH en évitant d'intégrer ou de demander l'ID utilisateur/le mot de passe.
Pour plus d'informations, voir « Utilisation de RACADM pour configurer
l'authentification par clé publique sur SSH », à la page 96.
Activation de SSH sur CMC
SSH est activé par défaut. Si SSH est désactivé, vous pouvez l'activer avec
n'importe quelle autre interface prise en charge.
Pour des instructions sur l'activation des connexions SSH sur CMC à l'aide de
RACADM, consultez la section relative à la commande config et la section
Propriétés de la base de données cfgSerial du Guide de référence la ligne de
commande RACADM pour iDRAC6 et CMC. Pour des instructions sur
l'activation des connexions SSH sur CMC à l'aide de l'interface Web, voir
« Configuration des services », à la page 205.64 Configuration de CMC pour utiliser des consoles de ligne de commande
Changement de port SSH
Pour changer de port SSH, utilisez la commande suivante :
racadm config -g cfgRacTuning -o cfgRacTuneSshPort
Pour des informations supplémentaires sur les propriétés
cfgSerialSshEnable et cfgRacTuneSshPort, voir le chapitre
Propriétés de la base de données du Guide de référence de la ligne de
commande RACADM pour iDRAC6 et CMC.
La mise en œuvre SSH CMC prend en charge plusieurs schémas de
cryptographie, comme illustré dans la Figure 3-2.
Tableau 3-2. Schémas de cryptographie
Type de schéma Schéma
Cryptographie asymétrique Spécification de bits
(aléatoire) Diffie-Hellman
DSA/DSS 512-1024 par NIST
Cryptographie symétrique • AES256-CBC
• RIJNDAEL256-CBC
• AES192-CBC
• RIJNDAEL192-CBC
• AES128-CBC
• RIJNDAEL128-CBC
• BLOWFISH-128-CBC
• 3DES-192-CBC
• ARCFOUR-128
Intégrité du message • HMAC-SHA1-160
• HMAC-SHA1-96
• HMAC-MD5-128
• HMAC-MD5-96
Authentification Password (Mot de passe)Configuration de CMC pour utiliser des consoles de ligne de commande 65
Activation de la connexion du panneau avant à iKVM
Pour des informations et des instructions sur l'utilisation des ports du
panneau avant de l'iKVM, voir « Activation ou désactivation du panneau
avant », à la page 407.
Configuration du logiciel d'émulation de terminal
CMC prend en charge une console texte série d'une station de gestion
exécutant l'un des types de logiciel d'émulation de terminal suivants :
• Linux Minicom
• HyperTerminal Private Edition (version 6.3) de Hilgraeve
Effectuez les étapes des sous-sections suivantes pour configurer votre type de
logiciel de terminal.
Configuration de Linux Minicom
Minicom est un utilitaire d'accès au port série pour Linux. Les étapes
suivantes s'appliquent pour configurer Minicom version 2.0. Les autres
versions de Minicom peuvent être légèrement différentes, mais elles
requièrent les mêmes paramètres de base. Voir les informations de
« Paramètres de Minicom requis », à la page 66 pour configurer les autres
versions de Minicom.
Configuration de Minicom version 2.0
REMARQUE : Pour optimiser les résultats, définissez la propriété
cfgSerialConsoleColumns pour qu'elle corresponde au nombre de colonnes.
Rappel : l'invite utilise deux caractères. Par exemple, pour une fenêtre de terminal
de 80 colonnes, entrez :
racadm config –g cfgSerial –o
cfgSerialConsoleColumns 80.
1 Si vous n'avez pas de fichier de configuration Minicom, passez à
l'étape suivante.
Si vous avez un fichier de configuration Minicom, tapez minicom
et passez à l'étape 13.
2 À l'invite de commande Linux, tapez minicom -s.
3 Sélectionnez Configuration du port série et appuyez sur .
4 Appuyez sur et sélectionnez le périphérique série approprié
(par exemple, /dev/ttyS0).66 Configuration de CMC pour utiliser des consoles de ligne de commande
5 Appuyez sur et définissez l'option Bits par seconde/Parité/Bits
sur 115200 8N1.
6 Appuyez sur , définissez Contrôle du débit du matériel sur Oui et
définissez Contrôle du débit du logiciel sur Non.
Pour quitter le menu Configuration du port série, appuyez sur .
7 Sélectionnez Modem et numérotation et appuyez sur .
8 Dans le menu Configuration du modem et numérotation, appuyez sur
pour effacer les paramètres init, reset, connect et hangup de
sorte qu'ils soient vides, puis appuyez sur pour enregistrer
chaque valeur vide.
9 Lorsque tous les champs indiqués ont été effacés, appuyez sur
pour quitter le menu Configuration de la numérotation
du modem et des paramètres.
10 Sélectionnez Enregistrer la configuration sous config_name et appuyez
sur .
11 Sélectionnez Quitter Minicom et appuyez sur .
12 À l'invite shell de commande, tapez minicom .
13 Appuyez sur , , pour quitter Minicom.
Assurez-vous que la fenêtre Minicom affiche une invite de connexion.
Lorsque l'invite de connexion apparaît, votre connexion est établie. Vous êtes
maintenant prêt à vous connecter et à accéder à l'interface de ligne de
commande CMC.
Paramètres de Minicom requis
Utilisez la Figure 3-3 pour configurer toute version de Minicom.
Tableau 3-3. Paramètres de Minicom
Description du paramètre Paramètre requis
B/s/Par/Bits 115200 8N1
Contrôle du débit matériel Oui
Contrôle du débit logiciel Non
Émulation de terminal ANSI
Paramètres de la numérotation
du modem et des paramètres
Effacez les paramètres init, reset, connect
et hangup pour qu'ils soient videsConfiguration de CMC pour utiliser des consoles de ligne de commande 67
Connexion aux serveurs ou aux modules d'E/S à
l'aide de la commande Connect
CMC peut établir une connexion pour rediriger la console série du serveur
ou des modules d'E/S. Pour les serveurs, la redirection de la console série peut
être effectuée de plusieurs façons :
• À l'aide de la ligne de commande CMC et de la commande connect ou
racadm connect. Pour des informations supplémentaires sur le paramètre
connect, voir la commande racadm connect du Guide de référence de la
ligne de commande RACADM pour iDRAC6 et CMC.
• À l'aide de la fonctionnalité de redirection de la console série de l'interface
Web iDRAC.
• À l'aide de la fonctionnalité Serial Over LAN (SOL) iDRAC.
En revanche, pour les consoles série/Telnet/SSH, CMC prend en charge la
commande connect pour établir une connexion série vers le serveur ou les
modules d'E/S. La console série du serveur contient à la fois les écrans d'amorçage
et de configuration du BIOS et la console série du système d'exploitation.
Pour les modules d'E/S, la console série du commutateur est disponible.
PRÉCAUTION : lorsqu'elle est exécutée depuis la console série de CMC, l'option
connect -b reste connectée jusqu'à la réinitialisation de CMC. Cette connexion
constitue un risque potentiel de sécurité.
REMARQUE : la commande connect fournit l'option –b (binaire). L'option –b
transmet des données binaires brutes et cfgSerialConsoleQuitKey n'est pas utilisé.
De plus, lors de la connexion à un serveur avec la console série CMC, les
transitions dans le signal DTR (par exemple, si le câble série est retiré pour
connecter un débogueur) n'entraînent pas une fermeture de session.
REMARQUE : si un module d'E/S ne prend pas en charge la redirection de
console, la commande connect affiche une console vide. Dans ce cas, pour revenir
à la console CMC, tapez la séquence Échap. La séquence Échap de la console par
défaut est \.
Le système géré comprend jusqu'à six modules d'E/S. Pour vous connecter à un
module d'E/S, tapez :
connect switch-n
où n est un libellé de module d'E/S A1, A2, B1, B2, C1 et C2.68 Configuration de CMC pour utiliser des consoles de ligne de commande
(Voir la Figure 11-1 pour une illustration du placement des modules d'E/S dans
le châssis.) Lorsque vous référencez les modules d'E/S dans la commande
connect, ils sont adressés à des commutateurs, comme présenté dans la
Figure 3-4.
REMARQUE : il ne peut y avoir qu'une seule connexion de module d'E/S par
châssis à la fois.
REMARQUE : vous ne pouvez pas vous connecter aux fonctions
d'intercommunication depuis la console série.
Pour vous connecter à une console série du serveur géré, utilisez la commande
connect server-n, où -n est le numéro d'emplacement du serveur ; vous
pouvez également utiliser la commande racadm connect server-n. Lorsque
vous vous connectez à un serveur à l'aide de l'option -b, une communication
binaire est très probablement établie et le caractère d'échappement est
désactivé. Si iDRAC n'est pas disponible, le message d'erreur Pas de
route vers l'hôte apparaît.
La commande connect server-n permet à l'utilisateur d'accéder au port série
du serveur. Une fois cette connexion établie, l'utilisateur est en mesure de voir
la redirection de console du serveur via le port série de CMC qui inclut à la
fois la console série du BIOS et la console série du système d'exploitation.
REMARQUE : pour afficher les écrans d'amorçage du BIOS, la redirection série
doit être activée dans la configuration BIOS des serveurs. Vous devez également
définir la fenêtre d'émulateur de terminal sur 80x25. Sinon, l'écran est illisible.
Tableau 3-4. Adressage des modules d'E/S aux commutateurs
Nom de
modules d'E/S
Commutateur
A1 commutateur-a1 ou commutateur- 1
A2 commutateur-a2 ou commutateur- 2
B1 commutateur-a1 ou commutateur- 3
B2 commutateur-a2 ou commutateur- 4
C1 commutateur-a1 ou commutateur- 5
C2 commutateur-a2 ou commutateur- 6Configuration de CMC pour utiliser des consoles de ligne de commande 69
REMARQUE : certaines touches ne fonctionnent pas dans les écrans de
configuration du BIOS ; par conséquent, vous devez spécifier des séquences
d'échappement appropriées pour CTRL+ALT+SUPPR, ainsi que d'autres
séquences d'échappement. L'écran de redirection initial affiche les séquences
d'échappement nécessaires.
Configuration du BIOS du serveur géré pour la redirection de console série
Il est nécessaire de se connecter au serveur géré à l'aide d'iKVM
(voir « Gestion de serveurs avec iKVM », à la page 394) ou d'établir une
session VKVM depuis l'interface utilisateur Web iDRAC (voir le Guide
d'utilisation d'iDRAC à l'adresse support.dell.com/manuals).
La communication série dans le BIOS est désactivée par défaut. Pour rediriger
les données de la console texte hôte vers les communications série sur le
réseau local, vous devez activer la redirection de console via COM1. Pour
modifier le paramétrage du BIOS :
1 Démarrez le serveur géré.
2 Appuyez sur pour accéder à l'utilitaire de configuration du BIOS
pendant le POST.
3 Effectuez un défilement vers le bas jusqu'à Communication série et
appuyez sur . Dans la boîte de dialogue contextuelle, la liste des
communications série affiche les options suivantes :
• désactivé
• activé sans redirection de console
• activé avec redirection de console via COM1
Utilisez les touches fléchées pour naviguer entre ces options.
4 Assurez-vous qu'Activé avec redirection de console via COM1 est activé.
5 Activez la Redirection après démarrage (la valeur par défaut est
Désactivée). Cette option active la redirection de console du BIOS à
chaque redémarrage.
6 Enregistrez les modifications et quittez.
7 Le serveur géré redémarre.70 Configuration de CMC pour utiliser des consoles de ligne de commande
Configuration de Windows pour la redirection de console série
Aucune configuration n'est nécessaire pour les serveurs exécutant les versions
de Microsoft Windows Server à partir de Windows Server 2003. Windows
reçoit des informations du BIOS et active la console d'administration spéciale
(SAC) un COM1.
Configuration de Linux pour la redirection de console série du serveur
pendant le démarrage
Les étapes suivantes sont spécifiques au chargeur GRUB (GRand Unified
Bootloader) de Linux. Il faudra faire des modifications du même type si vous
utilisez un chargeur d'amorçage différent.
REMARQUE : lorsque vous configurez la fenêtre d'émulation VT100 du client,
définissez la fenêtre ou l'application qui affiche la console redirigée sur 25 lignes x
80 colonnes pour que le texte s'affiche correctement ; sinon, certains écrans de
texte risquent d'être illisibles.
Modifiez le fichier /etc/grub.conf de la manière suivante :
1 Localisez les sections relatives aux paramètres généraux dans le fichier et
ajoutez les deux lignes suivantes :
serial --unit=1 --speed=57600
terminal --timeout=10 serial
2 Ajoutez deux options à la ligne du noyau :
noyau de la console=ttyS1,57600
3 Si le fichier /etc/grub.conf contient une instruction splashimage,
transformez-la en commentaire.
L'exemple suivant illustre les modifications décrites dans cette procédure.
# grub.conf generated by anaconda
#
# Note that you do not have to rerun grub after making
changes
# to this file
# NOTICE: You do not have a /boot partition. This
means that
# all kernel and initrd paths are relative to
/, e.g.
# root (hd0,0)Configuration de CMC pour utiliser des consoles de ligne de commande 71
# kernel /boot/vmlinuz-version ro root=
/dev/sdal
# initrd /boot/initrd-version.img
#
#boot=/dev/sda
default=0
timeout=10
#splashimage=(hd0,2)/grub/splash.xpm.gz
serial --unit=1 --speed=57600
terminal --timeout=10 serial
title Red Hat Linux Advanced Server (2.4.9-e.3smp)
root (hd0,0)
kernel /boot/vmlinuz-2.4.9-e.3smp ro root=
/dev/sda1 hda=ide-scsi console=ttyS0 console=
ttyS1,57600
initrd /boot/initrd-2.4.9-e.3smp.img
title Red Hat Linux Advanced Server-up (2.4.9-e.3)
root (hd0,00)
kernel /boot/vmlinuz-2.4.9-e.3 ro root=/dev/sda1
initrd /boot/initrd-2.4.9-e.3.img
Lors de l'édition du fichier /etc/grub.conf, suivez les consignes suivantes :
• Désactivez l'interface graphique de GRUB et utilisez l'interface texte.
Dans le cas contraire, l'écran de GRUB ne s'affiche pas sur la redirection de
console. Pour désactiver l'interface utilisateur, commentez la ligne
commençant par splashimage.
• Pour activer plusieurs options GRUB afin de démarrer les sessions de
console via la connexion série, ajoutez la ligne suivante à toutes les options :
console=ttyS1,57600
Dans l'exemple, console=ttyS1,57600 est ajouté à
la première option uniquement.72 Configuration de CMC pour utiliser des consoles de ligne de commande
Configuration de Linux pour la redirection de console série du serveur
après l'amorçage
Modifiez le fichier /etc/inittab de la manière suivante :
• Ajoutez une nouvelle ligne pour configurer agetty sur le port
série COM2 :
co:2345:respawn:/sbin/agetty -h -L 57600 ttyS1
ansi
L'exemple suivant montre le fichier avec la nouvelle ligne.
#
# inittab This file describes how the INIT process
# should set up the system in a certain
# run-level.
#
# Author: Miquel van Smoorenburg
# Modified for RHS Linux by Marc Ewing and
# Donnie Barnes
#
# Default runlevel. The runlevels used by RHS are:
# 0 - halt (Do NOT set initdefault to this)
# 1 - Single user mode
# 2 - Multiuser, without NFS (The same as 3, if you
# do not have networking)
# 3 - Full multiuser mode
# 4 - unused
# 5 - X11
# 6 - reboot (Do NOT set initdefault to this)
#
id:3:initdefault:
# System initialization.
si::sysinit:/etc/rc.d/rc.sysinit
l0:0:wait:/etc/rc.d/rc 0
l1:1:wait:/etc/rc.d/rc 1
l2:2:wait:/etc/rc.d/rc 2
l3:3:wait:/etc/rc.d/rc 3Configuration de CMC pour utiliser des consoles de ligne de commande 73
l4:4:wait:/etc/rc.d/rc 4
l5:5:wait:/etc/rc.d/rc 5
l6:6:wait:/etc/rc.d/rc 6
# Things to run in every runlevel.
ud::once:/sbin/update
# Trap CTRL-ALT-DELETE
ca::ctrlaltdel:/sbin/shutdown -t3 -r now
# When our UPS tells us power has failed, assume we
have a few
# minutes of power left. Schedule a shutdown for 2
minutes from now.
# This does, of course, assume you have power
installed and your
# UPS is connected and working correctly.
pf::powerfail:/sbin/shutdown -f -h +2 "Power Failure;
System Shutting Down"
# If power was restored before the shutdown kicked in,
cancel it.
pr:12345:powerokwait:/sbin/shutdown -c "Power
Restored; Shutdown Cancelled"
# Run gettys in standard runlevels
co:2345:respawn:/sbin/agetty -h -L 57600 ttyS1 ansi
1:2345:respawn:/sbin/mingetty tty1
2:2345:respawn:/sbin/mingetty tty2
3:2345:respawn:/sbin/mingetty tty3
4:2345:respawn:/sbin/mingetty tty4
5:2345:respawn:/sbin/mingetty tty5
6:2345:respawn:/sbin/mingetty tty6
# Run xdm in runlevel 5
# xdm is now a separate service
x:5:respawn:/etc/X11/prefdm -nodaemon74 Configuration de CMC pour utiliser des consoles de ligne de commande
Modifiez le fichier /etc/securetty de la manière suivante :
Ajoutez une nouvelle ligne avec le nom du tty série de COM2 :
ttyS1
L'exemple suivant montre un fichier avec la nouvelle ligne.
vc/1
vc/2
vc/3
vc/4
vc/5
vc/6
vc/7
vc/8
vc/9
vc/10
vc/11
tty1
tty2
tty3
tty4
tty5
tty6
tty7
tty8
tty9
tty10
tty11
ttyS1Utilisation de l'interface de ligne de commande RACADM 75
Utilisation de l'interface de ligne
de commande RACADM
L'utilitaire RACADM fournit une série de commandes qui vous permet de
configurer de gérer CMC via une interface textuelle. L'utilitaire RACADM
est accessible grâce à une connexion Telnet/SSH ou série, à l'aide de la
console CMC Dell du module iKVM ou à distance à l'aide de l'interface de
ligne de commande RACADM installée sur la station de gestion.
L'interface RACADM est classée comme suit :
REMARQUE : RACADM distant est inclus sur le DVD Dell Systems Management
Tools and Documentation et est installé sur une station de gestion.
• RACADM distant : permet l'exécution de commandes RACADM sur une
station de gestion avec l'option -r et le nom DNS ou l'adresse IP de CMC.
• Micrologiciel RACADM : permet de se connecter à CMC à l'aide d'une
connexion Telnet, SSH, série ou du module iKVM. Le micrologiciel
RACADM permet la mise en œuvre de RACADM (qui fait partie du
micrologiciel CMC).
Vous pouvez utiliser des commandes de RACADM distant dans des scripts pour
configurer plusieurs contrôleurs CMC. CMC ne prend pas en charge les scripts
de sorte que vous ne pouvez pas exécuter directement des scripts sur CMC.
Pour plus d'informations sur la configuration de plusieurs contrôleurs CMC,
voir « Configuration de plusieurs CMC dans plusieurs châssis », à la page 101.
Utilisation d'une console série, Telnet ou SSH
Vous pouvez ouvrir une session CMC via une connexion série ou Telnet/SSH,
ou encore via la console Dell CMC du module iKVM. Pour la configuration
d'un accès à distance ou en série à CMC, voir « Configuration de CMC pour
utiliser des consoles de ligne de commande », à la page 61. Les options de
sous-commandes couramment utilisées sont répertoriées dans la Figure 4-2.
Une liste exhaustive des sous-commandes RACADM est répertoriée dans le
chapitre Sous-commandes RACADM du RACADM Command Line Reference
Guide for iDRAC6 and CMC (Guide de référence de la ligne de commande
RACADM pour iDRAC6 et CMC).76 Utilisation de l'interface de ligne de commande RACADM
Ouverture d'une session CMC
Une fois le logiciel d'émulation de terminal et le BIOS du nœud géré de votre
station de gestion configurés, effectuez les étapes suivantes pour ouvrir une
session sur CMC :
1 Connectez-vous à CMC à l'aide du logiciel d'émulation de terminal de
votre station de gestion.
2 Entrez votre nom d'utilisateur et votre mot de passe CMC, puis appuyez
sur .
Vous êtes connecté à CMC.
Démarrage d'une console texte
Vous pouvez ouvrir une session sur CMC via un réseau Telnet ou SSH, un
port série ou la console Dell CMC de l'iKVM. Ouvrez une session Telnet ou
SSH, connectez-vous et ouvrez une session sur CMC.
Pour plus d'informations sur la connexion à CMC via le module iKVM, voir
« Utilisation du module iKVM », à la page 387.
Utilisation de la RACADM
Les sous-commandes RACADM peuvent être exécutées à distance à partir de
l'invite de commande d'une console série, Telnet ou SSH , ou d'une invite de
commande normale.
Utilisez les sous-commandes RACADM pour configurer les propriétés CMC
et effectuer des tâches de gestion à distance. Pour afficher la liste des souscommandes RACADM, entrez :
racadm help
Utilisé sans option ou sous-commande, RACADM affiche des informations
de syntaxe et des instructions sur la manière d'accéder aux sous-commandes
et à l'aide. Pour obtenir la liste des options de syntaxe et de ligne de
commande des différentes sous-commandes, entrez :
racadm help Utilisation de l'interface de ligne de commande RACADM 77
Sous-commandes RACADM
La Figure 4-1 fournit une liste abrégée des sous-commandes les plus
courantes utilisées dans RACADM. Pour une liste exhaustive des souscommandes RACADM, comprenant la syntaxe et les entrées valides,
consultez le chapitre Sous-commandes RACADM du RACADM Command
Line Reference Guide for iDRAC6 and CMC (Guide de référence de la ligne
de commande RACADM pour iDRAC6 et CMC).
REMARQUE : la commande connect est disponible en tant que commande
RACADM et en tant que commande CMC intégrée. Les commandes exit, quit et
logout sont des commandes CMC intégrées, et non des commandes RACADM.
Aucune de ces commandes ne peut être utilisée avec RACADM distant. Pour plus
d'informations sur l'utilisation de ces commandes, voir « Connexion aux serveurs
ou aux modules d'E/S à l'aide de la commande Connect », à la page 67.
Tableau 4-1. Sous-commandes RACADM
Commande Description
help Répertorie les descriptions des sous-commandes CMC.
help Répertorie une synthèse de l'utilisation de la souscommande spécifiée.
? Répertorie les descriptions des sous-commandes CMC.
? Répertorie une synthèse de l'utilisation de la souscommande spécifiée.
arp Affiche le contenu de la table ARP. Les entrées de la table
ARP ne peuvent être ni ajoutées, ni supprimées.
chassisaction Exécute les opérations power-up, power-down, reset
et power-cycle sur le châssis, le commutateur et le
module KVM.
closessn Ferme une session.
clrraclog Efface le journal CMC et crée une entrée unique qui
indique l'utilisateur et l'heure d'effacement du journal.
clrsel Efface les entrées du journal des événements système.
cmcchangeover Modifie l'état de CMC d'actif à veille ou vice versa, dans
les environnements CMC redondants.
config Configure CMC.78 Utilisation de l'interface de ligne de commande RACADM
connect Se connecte à la console série d'un serveur ou d'un
module d'E/S. Voir « Connexion aux serveurs ou aux
modules d'E/S à l'aide de la commande Connect », à la
page 67 pour obtenir de l'aide pour l'utilisation de la
sous-commande connect.
deploy Déploie un serveur en spécifiant les propriétés requises.
feature Affiche les fonctionnalités actives et non actives.
featurecard Affiche des informations sur l'état de la carte de fonction.
fwupdate Effectue des mises à jour du micrologiciel de composant
du système et affiche l'état de la mise à jour.
getassettag Affiche le numéro d'inventaire du châssis.
getchassisname Affiche le nom du châssis.
getconfig Affiche les propriétés de configuration CMC actuelles.
getdcinfo Affiche les informations générales relatives aux défaillances
de configuration du module d'E/S et de la carte fille.
getfanreqinfo Affiche les requêtes du ventilateur pour les serveurs et les
commutateurs dans %.
getflexaddr Affiche l'état activé/désactivé de la fonctionnalité
FlexAddress en fonction de la relation
emplacement/structure. Si elle est utilisée avec l'option -i,
la commande affiche l'adresse WWN et MAC d'un
emplacement spécifique.
getioinfo Affiche des informations générales relatives au module d'E/S.
getkvminfo Affiche des informations concernant le module iKVM.
getled Affiche les paramètres des LED d'un module.
getmacaddress Affiche l'adresse MAC d'un serveur.
getmodinfo Affiche les informations de configuration et de condition
d'un module.
getniccfg Affiche la configuration IP actuelle du contrôleur.
getpbinfo Affiche des informations sur la condition du bilan
de puissance.
Tableau 4-1. Sous-commandes RACADM (suite)
Commande DescriptionUtilisation de l'interface de ligne de commande RACADM 79
getpminfo Affiche des informations sur la condition de la
gestion d'alimentation.
getraclog Affiche le journal CMC.
getractime Affiche l'heure CMC.
getredundancymode Affiche le mode de redondance CMC.
getsel Affiche le journal des événements système (journal
du matériel).
getsensorinfo Affiche des informations concernant les capteurs
du système.
getslotname Affiche le nom d'un logement du châssis.
getssninfo Affiche des informations sur les sessions actives.
getsvctag Affiche les numéros de service.
getsysinfo Affiche des informations générales concernant CMC et
le système.
gettracelog Affiche le journal CMCtrace. Si elle est utilisée avec
l'option -i, la commande affiche le nombre d'entrées du
journal de suivi CMC.
getversion Affiche la version actuelle du logiciel, les informations sur
le modèle et indique si le périphérique peut être mis à jour.
ifconfig Affiche la configuration IP CMC actuelle.
krbkeytabupload Téléverse un keytab Kerberos dans CMC.
netstat Affiche la table de routage et les connexions actuelles.
ping Vérifie que l'adresse IPv4 de destination est accessible à
partir de CMC avec le contenu actuel du tableau de routage.
ping6 Vérifie que l'adresse IPv6 de destination est accessible à
partir de CMC avec le contenu actuel du tableau de routage.
racdump Affiche l'état du châssis complet, des informations sur l'état
de configuration, ainsi que des journaux d'événements de
l'historique. Utilisée pour vérifier la configuration après le
déploiement et pendant les sessions de débogage.
racreset Réinitialise CMC.
Tableau 4-1. Sous-commandes RACADM (suite)
Commande Description80 Utilisation de l'interface de ligne de commande RACADM
racresetcfg Restaure la configuration CMC par défaut.
remoteimage Connecte, déconnecte ou déploie un fichier de média sur
un serveur distant.
serveraction Effectue des opérations de gestion de l'alimentation sur le
système géré.
setassettag Définit le numéro d'inventaire du châssis.
setchassisname Définit le nom du châssis.
setflexaddr Active/désactive FlexAddress sur un
emplacement/structure spécifique, lorsque la
fonctionnalité FlexAddress est activée sur le châssis.
setled Définit les paramètres des LED d'un module.
setniccfg Définit la configuration IP du contrôleur.
setractime Définit l'heure CMC.
setslotname Définit le nom d'un logement dans le châssis.
setsysinfo Définit le nom et l'emplacement du châssis.
sshpkauth Téléverse jusqu'à 6 différentes clés SSH publiques,
supprime des clés existantes et affiche les clés déjà
existantes dans CMC.
sslcertdownload Télécharge un certificat signé par une autorité
de certification.
sslcertupload Téléverse un certificat signé par une autorité de
certification ou un certificat de serveur vers CMC.
sslcertview Affiche un certificat signé par une autorité de certification
ou un certificat de serveur dans CMC.
sslcsrgen Génère et télécharge la RSC SSL.
sslresetcfg Restaure le certificat auto-signé utilisé par l'interface
utilisateur Web CMC.
testemail Force CMC à envoyer un e-mail en passant par le NIC
de CMC.
Tableau 4-1. Sous-commandes RACADM (suite)
Commande DescriptionUtilisation de l'interface de ligne de commande RACADM 81
Accès à distance à RACADM
testfeature Vous permet de vérifier les paramètres de configuration
d'une fonctionnalité donnée. Par exemple, il prend en
charge le test de la configuration Active Directory avec
l'authentification simple (nom d'utilisateur et mot de
passe) ou l'authentification Kerberos (connexion directe
ou ouverture de session par carte à puce).
testtrap Force CMC à envoyer une alerte SNMP via la carte
d'interface réseau CMC.
traceroute Imprime le trajet emprunté par les paquets IPv4 vers un
nœud réseau.
traceroute6 Imprime le trajet emprunté par les paquets IPv6 vers un
nœud réseau.
Tableau 4-2. Options des sous-commandes de RACADM distant
Option Description
-r
-r :
Spécifie l'adresse IP distante du contrôleur.
Utilisez lorsque le numéro
de port CMC n'est pas le port par défaut (443).
-i Indique à RACADM de demander le nom
d'utilisateur et le mot de passe à l'utilisateur
de manière interactive.
-u Spécifie le nom d'utilisateur qui est utilisé
pour authentifier la transaction de
commande. Lorsque l'option -u est utilisée,
l'option -p doit l'être également et l'option
-i (interactive) n'est pas autorisée.
-p Spécifie le mot de passe utilisé pour
authentifier la transaction de commande.
Si l'option -p est utilisée, l'option -i n'est
pas autorisée.
Tableau 4-1. Sous-commandes RACADM (suite)
Commande Description82 Utilisation de l'interface de ligne de commande RACADM
Pour accéder à distance à RACADM, entrez les commandes suivantes :
racadm -r -u -p
racadm -i -r
REMARQUE : l'option -i ordonne à RACADM de demander le nom d'utilisateur et le
mot de passe de manière interactive. Sans l'option -i, vous devez indiquer le nom
d'utilisateur et le mot de passe dans la commande à l'aide des options -u et -p.
Par exemple :
racadm -r 192.168.0.120 -u root -p calvin getsysinfo
racadm -i -r 192.168.0.120 getsysinfo
Si le numéro de port HTTPS CMC a été remplacé par un port personnalisé
autre que le port par défaut (443), la syntaxe suivante doit être utilisée :
racadm -r : -u -p
racadm -i -r :
Activation et désactivation de la fonctionnalité distante de RACADM
REMARQUE : Dell recommande l'exécution de ces commandes sur le châssis.
La fonctionnalité distante de RACADM est activée par défaut sur CMC.
Dans les commandes suivantes, l'option -g précise le groupe de configuration
auquel appartient l'objet et l'option -o précise l'objet de configuration à
configurer.
Pour désactiver la fonctionnalité distante de RACADM, entrez :
racadm config -g cfgRacTuning -o
cfgRacTuneRemoteRacadmEnable 0
Pour réactiver la fonctionnalité distante de RACADM\, entrez :
racadm config -g cfgRacTuning -o
cfgRacTuneRemoteRacadmEnable 1Utilisation de l'interface de ligne de commande RACADM 83
Utilisation de RACADM à distance
REMARQUE : configurez l'adresse IP de CMC avant d'utiliser la fonctionnalité
distante de RACADM. Pour plus d'informations sur la configuration de CMC, voir
« Installation et configuration de CMC », à la page 33.
L'option distante (-r) de la console RACADM vous permet de vous
connecter au système géré et d'exécuter des sous-commandes RACADM à
partir d'une console ou d'une station de gestion distante. Pour utiliser la
capacité distante, vous avez besoin d'un nom d'utilisateur (option -u) et d'un
mot de passe (option -p) valides, ainsi que de l'adresse IP de CMC.
Avant d'essayer d'accéder à distance à RACADM, vérifiez que vous disposez
des autorisations nécessaires. Pour afficher vos privilèges utilisateur, entrez :
racadm getconfig -g cfguseradmin -i n
où n est votre Réf. utilisateur (1 à 16).
Si vous ne connaissez pas votre Réf. utilisateur, essayez différentes valeurs
pour n.
REMARQUE : la fonctionnalité distante de RACADM est uniquement prise en
charge sur les stations de gestion via un navigateur pris en charge. Pour des
informations supplémentaires, consultez la section Navigateurs pris en charge de
la Matrice de prise en charge des logiciels des systèmes Dell sur le site Web du
support de Dell à l'adresse support.dell.com/manuals.
REMARQUE : pour utiliser la fonctionnalité distante de RACADM, vous devez
posséder un droit d'écriture pour les dossiers sur lesquels vous exécutez des souscommandes RACADM impliquant des opérations sur les fichiers. Par exemple :
racadm getconfig -f -r
or
racadm sslcertupload -t 1 -f c:\cert\cert.txt
Lorsque vous utilisez RACADM distant pour capturer les groupes de
configuration dans un fichier, si aucune propriété de clé n'est définie dans un
groupe, le groupe de configuration n'est pas enregistré en tant qu'élément du
fichier de configuration. Si ces groupes de configuration doivent être clonés
sur d'autres contrôleurs CMC, la propriété de clé doit être définie avant
l'exécution de la commande getconfig -f. Sinon, vous pouvez saisir
manuellement les propriétés manquantes dans le fichier de configuration
après avoir exécuté la commande getconfig -f. Ceci s'applique à tous les
groupes racadm indexés. 84 Utilisation de l'interface de ligne de commande RACADM
La liste suivante répertorie les groupes indexés qui présentent ce
comportement ainsi que leurs propriétés de clé correspondantes :
cfgUserAdmin - cfgUserAdminUserName
cfgEmailAlert - cfgEmailAlertAddress
cfgTraps - cfgTrapsAlertDestIPAddr
cfgStandardSchema - cfgSSADRoleGroupName
cfgServerInfo - cfgServerBmcMacAddress
Messages d'erreur RACADM
Pour des informations concernant les messages d'erreur de l'interface de ligne
de commande RACADM, voir « Dépannage », à la page 109.
Utilisation de RACADM pour la configuration CMC
REMARQUE : pour la configuration initiale du CMC, vous devez être connecté en
tant qu'utilisateur root pour exécuter des commandes RACADM sur un système
distant. Un autre utilisateur doté de privilèges permettant la configuration du CMC
peut être créé.
L'interface Web CMC permet de configurer rapidement CMC (voir
« Utilisation de l'interface Web de CMC », à la page 111). Toutefois, si vous
préférez la configuration par ligne de commande ou script, ou si vous devez
configurer plusieurs contrôleurs CMC, utilisez RACADM distant installé
avec les agents CMC sur la station de gestion.
Configuration des propriétés du réseau CMC
Avant de commencer à configurer CMC, vous devez configurer les
paramètres réseau CMC afin de permettre la gestion à distance de CMC.
Cette configuration initiale définit les paramètres de mise en réseau TCP/IP
qui permettent l'accès à CMC.Utilisation de l'interface de ligne de commande RACADM 85
Configuration de l'accès initial à CMC
Cette section explique comment exécuter la configuration réseau initiale
CMC à l'aide des commandes RACADM. Toutes les opérations de
configuration décrites dans cette section peuvent être effectuées à l'aide de
l'écran LCD du panneau avant. Voir « Configuration de la mise en réseau à
l'aide de l'Assistant Configuration de l'écran LCD », à la page 46.
PRÉCAUTION : la modification des paramètres sur l'écran Paramètres réseau
CMC peut entraîner la déconnexion de votre connexion réseau actuelle.
Pour des informations supplémentaires sur les sous-commandes réseau, voir
les sections Sous-commandes RACADM et Définitions des groupes et des
objets de la base de données des propriétés du Guide de référence de la ligne de
commande RACADM pour iDRAC et CMC.
REMARQUE : vous devez disposer de privilèges Administrateur de configuration
du châssis pour configurer les paramètres réseau CMC.
CMC prend en charge les modes d'adressage IPv4 et IPv6. Les paramètres de
configuration pour IPv4 et IPv6 sont indépendants les uns des autres.
Affichage des paramètres réseau IPv4 actuels
Pour afficher un résumé des paramètres du NIC, DHCP, de vitesse réseau et
du mode duplex, entrez :
racadm getniccfg
or
racadm getconfig -g cfgCurrentLanNetworking
Affichage des paramètres réseau IPv6 actuels
Pour afficher un résumé des paramètres réseau, entrez :
racadm getconfig -g cfgIpv6LanNetworking
Pour afficher les informations sur l'adressage IPv4 et IPv6 correspondant au
type de châssis :
racadm getsysinfo
Par défaut, CMC demande et obtient automatiquement une adresse IP
auprès du serveur DHCP (Protocole de configuration dynamique des hôtes).
Vous pouvez désactiver cette fonctionnalité et préciser l'adresse IP statique de
CMC, la passerelle et le masque de sous-réseau.86 Utilisation de l'interface de ligne de commande RACADM
Pour désactiver DHCP et préciser l'adresse IP statique de CMC, la passerelle
et le masque de sous-réseau, entrez :
racadm config -g cfgLanNetworking -o cfgNicUseDHCP 0
racadm config -g cfgLanNetworking -o cfgNicIpAddress
racadm config -g cfgLanNetworking -o cfgNicGateway
racadm config -g cfgLanNetworking -o cfgNicNetmask
Affichage des paramètres réseau actuels
Pour afficher un résumé des paramètres de NIC, DHCP, de vitesse réseau et
du mode duplex, entrez :
racadm getniccfg
or
racadm getconfig -g cfgCurrentLanNetworking
Pour afficher l'adresse IP et les informations DHCP, d'adresse MAC et du
DNS pour le châssis, entrez :
racadm getsysinfo
Configuration des paramètres du réseau local
REMARQUE : pour effectuer les étapes suivantes, vous devez disposer des
privilèges Administrateur de configuration du châssis.
REMARQUE : les paramètres du réseau local tels que, la chaîne de communauté et
l'adresse IP du serveur SMTP, affectent CMC et les paramètres externes du châssis.
REMARQUE : si vous avez deux contrôleurs CMC (actif et veille) sur le châssis, et
qu'ils sont connectés au réseau, le contrôleur CMC en veille acquiert automatiquement
les paramètres réseau du contrôleur CMC actif en cas de basculement.
REMARQUE : lorsque IPv6 est activé au moment du démarrage, trois demandes
de routeur sont envoyées toutes les quatre secondes. Si des commutateurs réseau
externes exécutent le protocole Spanning Tree (SPT), les ports du commutateur
externe peuvent être bloqués pendant plus de douze secondes pendant lesquelles
les demandes de routeur IPv6 sont envoyées. Dans de tels cas, la connectivité IPv6
peut être limitée jusqu'à ce que des annonces de routeur soient gratuitement
envoyées par les routeurs IPv6.Utilisation de l'interface de ligne de commande RACADM 87
Activation de l'interface réseau CMC
Pour activer / désactiver l'interface réseau CMC pour IPv4 et IPv6, entrez :
racadm config -g cfgLanNetworking -o cfgNicEnable 1
racadm config -g cfgLanNetworking -o cfgNicEnable 0
REMARQUE : le NIC de CMC est activé par défaut.
Pour activer/désactiver l'adressage IPv4 de CMC, entrez :
racadm config -g cfgLanNetworking -o
cfgNicIPv4Enable 1
racadm config -g cfgLanNetworking -o
cfgNicIPv4Enable 0
REMARQUE : l'adressageIPv4 de CMC est activé par défaut.
Pour activer/désactiver l'adressage IPv6 de CMC, entrez :
racadm config -g cfgIpv6LanNetworking -o
cfgIPv6Enable 1
racadm config -g cfgIpv6LanNetworking -o
cfgIPv6Enable 0
REMARQUE : l'adressage IPv6 de CMC est désactivé par défaut.
par défaut, pour IPv4, CMC demande et obtient automatiquement une
adresse IP CMC auprès du serveur DHCP (protocole de configuration
dynamique des hôtes). Vous pouvez désactiver la fonctionnalité DHCP et
préciser l'adresse IP CMC statique, la passerelle et le masque de sous-réseau.
Dans le cas d'un réseau iPv4, pour désactiver DHCP et préciser l'adresse IP
statique de CMC, la passerelle et le masque de sous-réseau, entrez :
racadm config -g cfgLanNetworking -o cfgNicUseDhcp 0
racadm config -g cfgLanNetworking -o cfgNicIpAddress
racadm config -g cfgLanNetworking -o cfgNicGateway
racadm config -g cfgLanNetworking -o cfgNicNetmask
Par défaut, pour IPv6, CMC demande et obtient automatiquement une
adresse IP CMC auprès du mécanisme de configuration automatique IPv6.88 Utilisation de l'interface de ligne de commande RACADM
Dans le cas d'un réseau IPv6, pour désactiver la fonctionnalité Configuration
automatique et spécifier une adresse IPv6 CMC statique, une passerelle et
une longueur de préfixe, entrez :
racadm config -g cfgIPv6LanNetworking -o
cfgIPv6AutoConfig 0
racadm config -g cfgIPv6LanNetworking -o
cfgIPv6Address
racadm config -g cfgIPv6LanNetworking -o
cfgIPv6PrefixLength 64
racadm config -g cfgIPv6LanNetworking -o
cfgIPv6Gateway
Activation ou désactivation de DHCP pour l'adresse d'interface réseau CMC
Lorsqu'elle est activée, la fonctionnalité du protocole DHCP pour l'adresse IP
du NIP de CMC demande et obtient automatiquement une adresse IP auprès
du serveur DHCP (protocole de configuration dynamique des hôtes). Cette
fonctionnalité est activée par défaut.
Vous pouvez désactiver la fonctionnalité DHCP pour l'adresse du NIC
et préciser une adresse IP statique, un masque de sous-réseau et une
passerelle. Pour plus d'informations, voir « Configuration de l'accès initial à
CMC », à la page 85.
Activation ou désactivation du protocole DHCP pour les adresses IP du DNS
La fonctionnalité d'utilisation du protocole DHCP pour l'adresse du DNS de
CMC est désactivée par défaut. Lorsqu'elle est activée, cette fonctionnalité
obtient les adresses principale et secondaire du serveur DNS auprès du
serveur DHCP. En utilisant cette fonctionnalité, vous n'avez pas à configurer
d'adresses IP statiques pour le serveur DNS.
Pour désactiver la fonctionnalité d'utilisation du protocole DHCP pour les
adresses de DNS et spécifier les adresses statiques préférées et alternatives du
serveur DNS, entrez :
racadm config -g cfgLanNetworking -o
cfgDNSServersFromDHCP 0
Pour désactiver la fonctionnalité d'utilisation du protocole DHCP pour les
adresses de DNS et spécifier les adresses statiques préférées et alternatives du
serveur DNS, entrez :
racadm config -g cfgIPv6LanNetworking -o
cfgIPv6DNSServersFromDHCP6 0 Utilisation de l'interface de ligne de commande RACADM 89
Définition des adresses IP statiques du DNS
REMARQUE : les paramètres des adresses IP de DNS statique ne sont pas valides
tant que la fonction adresse DNS pour DCHP est désactivée.
Pour IPv4, pour définir les adresses IP préférées principale et secondaire du
serveur DNS, entrez :
racadm config -g cfgLanNetworking -o cfgDNSServer1
racadm config -g cfgLanNetworking -o cfgDNSServer2
Pour IPv6, pour définir les adresses IP préférées principale et secondaire du
serveur DNS, entrez :
racadm config -g cfgIPv6LanNetworking -o
cfgIPv6DNSServer1
racadm config -g cfgIPv6LanNetworking -o
cfgIPv6DNSServer2
Configuration des paramètres DNS (IPv4 et IPv6)
• Enregistrement CMC : pour enregistrer CMC sur le serveur DNS, entrez :
racadm config -g cfgLanNetworking -o
cfgDNSRegisterRac 1
REMARQUE : certains serveurs DNS ne peuvent enregistrer que des noms
de 31 caractères maximum. Assurez-vous que le nom désigné se trouve dans
la limite DNS requise.
REMARQUE : les paramètres suivants ne sont valides que si vous avez
enregistré CMC sur le serveur DNS en définissant la variable
cfgDNSRegisterRac sur la valeur 1.
• Nom CMC : par défaut, le nom CMC sur le serveur DNS est cmc-
. Pour modifier le nom CMC sur le serveur DNS,
entrez :
racadm config -g cfgLanNetworking -o cfgDNSRacName
où (nom) est une chaîne de jusqu'à 63 caractères
alphanumériques et traits d'union. Par exemple, cmc-1 ou d-345.90 Utilisation de l'interface de ligne de commande RACADM
• Nom de domaine DNS : Le nom de domaine DNS par défaut contient un
espace unique. Pour définir un nom de domaine DNS, entrez :
racadm config -g cfgLanNetworking -o
cfgDNSDomainName
où (nom) est une chaîne de jusqu'à 254 caractères
alphanumériques et traits d'union. Par exemple : p45, a-tz-1 ou r-id-001.
Configuration de l'auto-négociation, du mode duplex et de la vitesse du réseau
(IPv4 et IPv6)
Lorsqu'elle est activée, la fonctionnalité Négociation automatique détermine
si CMC définit automatiquement le mode duplex et la vitesse réseau en
entrant en communication avec le routeur ou le commutateur le plus proche.
La négociation automatique est activée par défaut.
Vous pouvez désactiver la négociation automatique et préciser le mode
duplex et la vitesse réseau en tapant :
racadm config -g cfgNetTuning -o cfgNetTuningNicAutoneg 0
racadm config -g cfgNetTuning -o cfgNetTuningNicFullDuplex
or
est égal à 0 (semi duplex) ou 1 (duplex total, valeur par
défaut)
racadm config -g cfgNetTuning -o cfgNetTuningNicSpeed
où :
is 10 or 100(default).> correspond à 10 ou 100 (par défaut).Utilisation de l'interface de ligne de commande RACADM 91
Configuration du VLAN CMC (IPv4 et IPv6)
1 Activez les fonctions VLAN du réseau de gestion du châssis externe :
racadm config -g cfgLanNetworking -o
cfgNicVLanEnable 1
2 Spécifiez le N° VLAN pour le réseau de gestion du châssis externe :
racadm config -g cfgLanNetworking -o cfgNicVlanID
Les valeurs valides pour sont comprises entre 1– 4000 et
4021– 4094. La valeur par défaut est 1.
Par exemple :
racadm config -g cfgLanNetworking -o
cfgNicVlanID 1
3 Spécifiez ensuite la priorité VLAN pour le réseau de gestion du châssis
externe :
racadm config -g cfgLanNetworking -o
cfgNicVLanPriority
Les valeurs valides pour vont de 0 à 7. La valeur par
défaut est 0.
Par exemple :
racadm config -g cfgLanNetworking -o
cfgNicVLanPriority 7
Vous pouvez également spécifier l'ID du VLAN et la priorité VLAN avec
une seule commande :
racadm setniccfg -v
Par exemple :
racadm setniccfg -v 1 792 Utilisation de l'interface de ligne de commande RACADM
Suppression du VLAN de CMC
Pour supprimer le VLAN de CMC, désactivez les fonctions VLAN du réseau
de gestion du châssis externe :
racadm config -g cfgLanNetworking -o
cfgDNSServersFromDHCP
cfgNicVLanEnable 0
Vous pouvez également supprimer le VLAN de CMC en utilisant la
commande suivante :
racadm setniccfg -v
Configuration d'un VLAN de serveur
Spécifiez l'ID de VLAN et la priorité d'un serveur particulier avec la
commande suivante :
racadm setniccfg -m server- -v
Les valeurs valides pour sont comprises entre 1 et 16.
Les valeurs valides pour sont comprises entre 1– 4000 et 4021–
4094. La valeur par défaut est 1.
Les valeurs valides pour sont comprises entre 0 et 7.
La valeur par défaut est 0.
Par exemple :
racadm setniccfg -m server-1 -v 1 7
Suppression d'un VLAN de serveur
Pour supprimer un VLAN de serveur, désactivez les fonctions VLAN du
réseau du serveur spécifié :
racadm setniccfg -m server- -v
Les valeurs valides pour sont comprises entre 1 et 16.
Par exemple :
racadm setniccfg -m server-1 -vUtilisation de l'interface de ligne de commande RACADM 93
Configuration de l'unité de transmission maximale (MTU) (IPv4 et IPv6)
La propriété MTU permet la définition d'une limite de taille pour les paquets
pouvant être transmis via l'interface. Pour définir cette propriété MTU, entrez :
racadm config -g cfgNetTuning -o cfgNetTuningMtu
où est une valeur comprise entre 576 et 1 500 (inclus). La valeur par
défaut est 1 500.
REMARQUE : IPv6 requiert une MTU minimale de 1 280. Si IPv6 est activé et que
cfgNetTuningMtu est défini sur une valeur inférieure, CMC utilisera une MTU
de 1 280.
Configuration de l'adresse IP du serveur SMTP (IPv4 et IPv6)
Vous pouvez activer CMC pour l'envoi d'alertes par e-mail via le protocole
SMTP (Simple Mail Transfer Protocol) vers une adresse IP spécifiée. Pour
activer cette fonctionnalité, entrez :
racadm config -g cfgRemoteHosts -o
cfgRhostsSmtpServerIpAddr
où est l'adresse IP du serveur SMTP du réseau.
REMARQUE : si votre réseau dispose d'un serveur SMTP qui diffuse et renouvelle
périodiquement les baux d'adresses IP et si les adresses sont différentes, alors ce
paramètre de propriété ne fonctionne pas pendant un certain temps en raison des
modifications apportées à l'adresse IP spécifiée du serveur SMTP. Si c'est le cas,
utilisez le nom DNS.
Configuration des paramètres de sécurité réseau (IPv4 uniquement)
Pour effectuer les étapes suivantes, vous devez disposer des privilèges
Administrateur de configuration du châssis.
Activation de la vérification de plage d'adresses IP (IPv4 uniquement)
Le filtrage IP compare l'adresse IP d'une ouverture de session entrante à la plage
d'adresses IP qui est spécifiée dans les propriétés cfgRacTuning suivantes :
• cfgRacTuneIpRangeAddr
• cfgRacTuneIpRangeMask94 Utilisation de l'interface de ligne de commande RACADM
L'ouverture de session à partir de l'adresse IP entrante est autorisée
uniquement si les deux éléments suivants sont identiques :
• cfgRacTuneIpRangeMask au niveau du bit et avec une adresse IP entrante
• cfgRacTuneIpRangeMask au niveau du bit et avec
cfgRacTuneIpRangeAddr
Utilisation de RACADM pour la configuration
des utilisateurs
Vous pouvez configurer jusqu'à 16 utilisateurs dans la base de données de
propriétés CMC. Avant d'activer manuellement un utilisateur CMC, vérifiez
s'il existe des utilisateurs actuels. Si vous configurez un nouveau contrôleur
CMC ou avez exécuté la commande racresetcfgde de RACADM, le seul
utilisateur actuel est root, avec le mot de passe calvin. La sous-commande
racresetcfg restaure les paramètres CMC par défaut d'origine.
PRÉCAUTION : utilisez la commande racresetcfg avec précaution car elle
restaure les valeurs par défaut de tous les paramètres de configuration. Toute
modification précédente est perdue.
REMARQUE : les utilisateurs peuvent être activés et désactivés au fil du temps ; la
désactivation d'un utilisateur ne le supprime pas de la base de données.
Pour vérifier si un utilisateur existe, ouvrez une console textuelle Telnet / SSH
sur CMC, connectez-vous et entrez la commande suivante une fois pour
chaque indice compris entre 1 et 16 :
racadm getconfig -g cfgUserAdmin -i
Plusieurs paramètres et références d'objet sont affichés avec leurs valeurs
actuelles. Les deux objets d'intérêt sont :
# cfgUserAdminIndex=XX
cfgUserAdminUserName=
Si l'objet cfgUserAdminUserName n'a pas de valeur, ce numéro d'index,
indiqué par l'objet cfgUserAdminIndex, peut être utilisé. Si un nom suit
le signe « = », l'index est pris par ce nom d'utilisateur.Utilisation de l'interface de ligne de commande RACADM 95
REMARQUE : lorsque vous activez ou désactivez manuellement un utilisateur avec la
sous-commande racadm config, vous devez spécifier l'index via l'option -i. L'objet
cfgUserAdminIndex affiché dans l'exemple précédent contient un caractère
« # ». De même, si vous utilisez la commande racadm config -f racadm.cfg
pour spécifier un nombre quelconque de groupes/objets à écrire, l'index ne peut pas
être spécifié. Un nouvel utilisateur est ajouté au premier index disponible. Ce
comportement permet une plus grande flexibilité dans la configuration d'un second
contrôleur CMC possédant les mêmes paramètres que le contrôleur CMC principal.
Ajout d'un utilisateur CMC
Quelques commandes élémentaires sont disponibles pour ajouter un nouvel
utilisateur à la configuration CMC. Procédez comme suit :
1 Définissez le nom d'utilisateur.
2 Définissez le mot de passe.
3 Définissez les privilèges utilisateur. Pour des informations sur les privilèges
utilisateur, voir la Figure 5-42 et la Figure 5-43.
4 Activez l'utilisateur.
Exemple
L'exemple suivant décrit comment ajouter un nouvel utilisateur appelé
« Jean » avec un mot de passe « 123456 » et des privilèges d'ouverture de
session CMC.
REMARQUE : consultez le tableau 3-1 du chapitre Propriétés de la base de
données du Guide de référence de la ligne de commande RACADM pour iDRAC6 et
CMC pour une liste des valeurs de masque binaire valides correspondant à des
privilèges d'utilisateur spécifiques. La valeur de privilège par défaut est 0, indiquant
que l'utilisateur n'a aucun privilège activé.
racadm config -g cfgUserAdmin -o cfgUserAdminUserName -i 2
john
racadm config -g cfgUserAdmin -o cfgUserAdminPassword -i 2
123456
racadm config -g cfgUserAdmin -i 2 -o cfgUserAdminPrivilege
0x00000001
racadm config -g cfgUserAdmin -i 2 -o cfgUserAdminEnable 1
Pour vérifier qu'un utilisateur a bien été ajouté avec les privilèges corrects,
utilisez la commande suivante :
racadm getconfig -g cfgUserAdmin -i 296 Utilisation de l'interface de ligne de commande RACADM
Utilisation de RACADM pour configurer
l'authentification par clé publique sur SSH
Vous pouvez configurer jusqu'à 6 clés publiques pouvant être utilisées avec le
nom d'utilisateur du service sur l'interface SSH. Avant d'ajouter ou de supprimer
des clés publiques, veillez à utiliser la commande view pour voir les clés qui sont
déjà configurées afin de ne pas écraser ou supprimer une clé accidentellement.
Le nom d'utilisateur du service est un compte d'utilisateur spécial qui peut être
utilisé lors de l'accès à CMC via SSH. Lorsque le PKA sur SSH est installé et
utilisé correctement, vous ne devez pas entrer un nom d'utilisateur ou un mot
de passe pour vous connecter à CMC. Cela peut être très utile pour créer des
scripts automatisés afin d'exécuter des fonctions différentes.
Lorsque vous êtes prêt à configurer cette fonctionnalité, tenez compte des
points suivants :
• l'interface utilisateur n'est pas prise en charge pour la gestion de cette
fonctionnalité ; vous ne pouvez utiliser que RACADM.
• Lorsque vous ajoutez des clés publiques, vérifiez que les clés existantes ne
figurent pas déjà dans l'index dans lequel la nouvelle clé est ajoutée.
CMC n'effectue aucun contrôle pour vérifier que les clés précédentes sont
bien supprimées avant l'ajout d'une nouvelle clé. Dès qu'une nouvelle clé
est ajoutée, elle est automatiquement effective tant que l'interface SSH
est activée.
• Lorsque vous utilisez la section de commentaire de la clé publique,
n'oubliez pas que seuls les 16 premiers caractères sont utilisés par CMC.
Le commentaire de la clé publique est utilisé par CMC pour différencier
les utilisateurs SSH lors de l'utilisation de la commande getssninfo
RACADM car tous les utilisateurs PKA utilisent le nom d'utilisateur du
service pour ouvrir une session.
Par exemple, si deux clés publiques sont configurées, l'une avec le
commentaire PC1 et l'autre avec le commentaire PC2 :
racadm getssninfo
Type User IP Address Login
Date/Time
SSH PC1 x.x.x.x 06/16/2009
09:00:00
SSH PC2 x.x.x.x 06/16/2009
09:00:00
Pour des informations supplémentaires sur la commande sshpkauth, voir le
Guide de référence de la ligne de commande RACADM pour iDRAC6 et CMC.Utilisation de l'interface de ligne de commande RACADM 97
Génération de clés publiques pour Windows
Avant l'ajout d'un compte, le système qui accèdera à CMC sur SSH nécessite
une clé publique. Deux méthodes sont possibles pour générer la paire de clés
publique/privée : utiliser l'application PuTTY Key Generator pour les clients
exécutant Windows ou la CLI ssh-keygen pour les clients exécutant Linux.
Cette section donne des instructions simples pour générer une paire de clés
publique/privée pour les deux applications. Pour une utilisation
supplémentaire ou avancée de ces outils, consultez l'Aide de l'application.
Pour utiliser PuTTY Key Generator pour les clients Windows afin de créer la
clé de base :
1 Démarrez l'application et sélectionnez SSH-2 RSA ou SSH-2 DSA comme
type de clé à générer (SSH-1 n'est pas pris en charge).
2 Saisissez le nombre de bits de la clé. Ce nombre doit être compris entre
768 et 4 096.
REMARQUE : CMC peut ne pas afficher de message si vous ajoutez des clés
de moins de 768 bits ou de plus de 4 096 bits, mais lorsque vous essaierez
d'ouvrir une session avec ces clés, vous échouerez.
3 Cliquez sur Générer et déplacez la souris dans la fenêtre en suivant les
instructions.
Une fois la clé créée, vous pouvez modifier le champ Commentaire de la clé.
Vous pouvez également saisir une phrase de passe pour sécuriser la clé.
Veillez à bien enregistrer la clé privée.
4 Vous pouvez utiliser la clé publique de deux façons :
• enregistrer la clé publique dans un fichier à téléverser ultérieurement.
• copier/coller le texte de la fenêtre Clé publique à coller lorsque vous
ajoutez le compte à l'aide de l'option de texte98 Utilisation de l'interface de ligne de commande RACADM
Génération de clés publiques pour Linux
L'application ssh-keygen pour les clients Linux est un outil de ligne de
commande sans interface utilisateur graphique. Ouvrez une fenêtre de
terminal et entrez, à l'invite shell :
ssh-keygen –t rsa –b 1024 –C testing
où
L'option –t doit être dsa ou rsa.
l'option –b spécifie la taille du cryptage binaire entre 768 et 4 096.
l'option –C permet de modifier le commentaire de la clé publique et est
facultative.
la est facultative. Lorsque la commande s'est exécutée,
utilisez le fichier public pour passer à RACADM en vue du téléversement
du fichier.
Notes de syntaxe RACADM pour CMC
Lorsque vous utilisez la commande racadm sshpkauth, vérifiez les
points suivants :
• Pour l'option –i, le paramètre doit être svcacct. Tous les autres
paramètres pour -i échouent dans CMC. Le svcacct est un compte spécial
pour l'authentification à clé publique sur SSH dans CMC.
• Pour se connecter à CMC, l'utilisateur doit être service. Les utilisateurs
des autres catégories ont accès aux clés publiques entrées en utilisant la
commande sshpkauth.
Affichage des clés publiques
Pour afficher les clés publiques que vous avez ajoutées à CMC, entrez :
racadm sshpkauth –i svcacct –k all –v
Pour afficher une seule clé à la fois, remplacez all par un nombre compris
entre 1 et 6. Par exemple, pour afficher la clé 2, entrez :
racadm sshpkauth –i svcacct –k 2 –vUtilisation de l'interface de ligne de commande RACADM 99
Ajout des clés publiques
Pour ajouter une clé publique à CMC à l'aide des options de téléversement de
fichier -f, entrez :
racadm sshpkauth –i svcacct –k 1 –p 0xfff –f
REMARQUE : vous pouvez uniquement utiliser l'option de téléversement de fichier
avec RACADM distant. Pour plus d'informations, voir « Accès à distance à
RACADM », à la page 81 et les sections suivantes.
Pour obtenir des privilèges de clé publique, reportez-vous au Tableau 3-1 du
chapitre sur les propriétés de la base de données du Guide de référence de la
ligne de commande RACADM pour iDRAC6 et CMC.
Pour ajouter une clé publique à l'aide de l'option de téléversement de
texte, entrez :
racadm sshpkauth –i svcacct –k 1 –p 0xfff –t “”
Suppression des clés publiques
Pour supprimer une clé publique, entrez :
racadm sshpkauth –i svcacct –k 1 –d
Pour supprimer toutes les clés publiques, entrez :
racadm sshpkauth –i svcacct –k all –d
Ouverture de session avec l'authentification par clé publique
Une fois les clés publiques téléversées, vous pouvez ouvrir une session CMC
sur SSH sans avoir à saisir un mot de passe. Vous avez également la possibilité
d'envoyer une commande RACADM unique en tant qu'argument de ligne de
commande à l'application SSH. Les options de ligne de commande se
comportent comme RACADM distant car la session se termine une fois la
commande exécutée. Par exemple :
Ouverture de session :
ssh service@
où
ssh service@
où correspond à l'adresse IP de CMC.100 Utilisation de l'interface de ligne de commande RACADM
Envoi de commandes racadm :
ssh service@ racadm getversion
ssh service@ racadm getsel
Lorsque vous ouvrez une session avec le compte de service, si une phrase de
passe a été configurée lors de la création de la paire de clés publique/privée,
vous pouvez être invité à saisir à nouveau cette phrase de passe. Si une phrase
de passe est utilisée avec les clés, les clients Windows et Linux fournissent des
méthodes pour automatiser aussi cette procédure. Pour les clients Windows,
vous pouvez utiliser l'application Pageant. Elle s'exécute en arrière-plan et
rend la saisie de la phrase de passe transparente. Pour les clients Linux, vous
pouvez utiliser ssh-agent. Pour configurer et utiliser l'une de ces applications,
voir la documentation fournie depuis cette application.
Activation d'un utilisateur CMC ayant des droits
Pour accorder des droits d'administration spécifiques (autorisation basée sur
le rôle) à un utilisateur, commencez par rechercher un index utilisateur
disponible en suivant les étapes indiquées dans « Avant de commencer », à la
page 33. Ensuite, entrez les lignes de commande suivantes avec le nouveau
nom d'utilisateur et le nouveau mot de passe.
racadm config -g cfgUserAdmin -o
cfgUserAdminPrivilege -i
REMARQUE : consultez le Tableau 3-1 du chapitre Propriétés de la base de
données du Guide de référence de la ligne de commande RACADM pour iDRAC6 et
CMC pour une liste des valeurs de masque binaire valides correspondant à des
privilèges d'utilisateur spécifiques. La valeur de privilège par défaut est 0, indiquant
que l'utilisateur n'a aucun privilège activé.
Désactivation d'un utilisateur CMC
À l'aide de l'interface RACADM, vous pouvez uniquement désactiver
manuellement les utilisateurs CMC et de manière individuelle. Vous ne
pouvez pas supprimer les utilisateurs à l'aide d'un fichier de configuration.
L'exemple suivant illustre la syntaxe de commande qui peut être utilisée pour
supprimer un utilisateur CMC :
racadm config -g cfgUserAdmin -i 2
cfgUserAdminPrivilege 0x0Utilisation de l'interface de ligne de commande RACADM 101
Configuration de l'envoi de notifications par
e-mail ou d'alertes SNMP
Vous pouvez configurer CMC pour envoyer des interruptions d'événement
SNMP et/ou des alertes par e-mail lorsque certains événements se produisent
au niveau du châssis. Pour plus d'informations et d'instructions, voir
« Configuration des alertes SNMP », à la page 438 et « Configuration des
alertes par messagerie », à la page 445.
Vous pouvez spécifier les destinations d'interruptions sous la forme
d'adresses numériques au format approprié (IPv6 ou IPv4) ou de noms de
domaine pleinement qualifiés (FQDN). Choisissez un format compatible
avec votre technologie de mise en réseau/infrastructure.
REMARQUE : la fonctionnalité INTERRUPTION test ne détecte pas les choix
incorrects en fonction de la configuration réseau actuelle. Par exemple, l'utilisation
d'une destination IPv6 dans un environnement IPv4 uniquement.
Configuration de plusieurs CMC dans
plusieurs châssis
À l'aide de RACADM, vous pouvez configurer un ou plusieurs CMC avec des
propriétés identiques.
Lorsque vous effectuez une requête sur une carte CMC spécifique à l'aide de
son numéro de groupe et du numéro de l'objet, RACADM crée le fichier de
configuration racadm.cfg à partir des informations collectées. En exportant le
fichier vers un ou plusieurs CMC, vous pouvez configurer vos contrôleurs
avec des propriétés identiques en un minimum de temps.
REMARQUE : certains fichiers de configuration contiennent des informations CMC
uniques (comme l'adresse IP statique) qui doivent être modifiées avant d'exporter
le fichier vers d'autres CMC.
1 Utilisez RACADM pour effectuer une requête auprès de CMC cible
contenant la configuration appropriée.
REMARQUE : le fichier de configuration généré est monfichier.cfg. Vous
pouvez renommer ce fichier.
REMARQUE : le fichier .cfg ne contient aucun mot de passe utilisateur.
Lorsque le fichier .cfg est téléversé sur le nouveau CMC, tous les mots de
passe doivent être à nouveau ajoutés.102 Utilisation de l'interface de ligne de commande RACADM
2 Ouvrez une console texte Telnet/SSH sur CMC, ouvrez une session
et entrez :
racadm getconfig -f myfile.cfg
REMARQUE : la redirection d'une configuration CMC vers un fichier à l'aide
de getconfig -f est uniquement prise en charge par l'interface de RACADM
distant. Pour plus d'informations, voir « Accès à distance à RACADM », à la
page 81.
3 Modifiez le fichier de configuration à l'aide d'un éditeur de texte brut
(optionnel). Tout caractère de formatage spécial dans le fichier de
configuration peut corrompre la base de données RACADM.
4 Utilisez le fichier de configuration nouvellement créé pour modifier un
CMC cible.
À l'invite de commande, entrez :
racadm config –f myfile.cfg
5 Réinitialisez le contrôleur CMC cible qui a été configuré. À l'invite de
commande, entrez :
racadm reset
La sous-commande getconfig -f myfile.cfg (étape 1) demande la
configuration CMC pour le contrôleur CMC principal et génère le fichier
monfichier.cfg. Si nécessaire, vous pouvez renommer le fichier ou
l'enregistrer dans un emplacement différent.
Vous pouvez utiliser la commande getconfig pour effectuer les
actions suivantes :
• afficher toutes les propriétés de configuration dans un groupe (spécifié par
le nom de groupe et l'index),
• afficher toutes les propriétés de configuration pour un utilisateur par nom
d'utilisateur.
La sous-commande config charge les informations sur les autres CMC. Server
Administrator utilise la commande config pour synchroniser la base de
données des noms d'utilisateur et mots de passe.Utilisation de l'interface de ligne de commande RACADM 103
Création d'un fichier de configuration CMC
Le fichier de configuration CMC .cfg est utilisé avec la
commande racadm config -f .cfg pour créer un
fichier de texte brut. La commande vous permet de construire un fichier de
configuration (similaire à un fichier .ini) et de configurer CMC à partir de
ce fichier.
Vous pouvez utiliser n'importe quel nom de fichier, et le fichier ne nécessite
pas d'extension .cfg (même si on le désigne par cette extension dans cette
sous-section).
REMARQUE : pour des informations supplémentaires sur la sous-commande
getconfig, voir le Guide de référence de la ligne de commande RACADM pour
iDRAC6 et CMC.
RACADM analyse le fichier .cfg lors de son premier chargement sur CMC
afin de vérifier la présence de noms de groupes et d'objets valides et le respect
de quelques règles simples de syntaxe. Les erreurs sont indiquées avec le
numéro de ligne dans laquelle l'erreur a été détectée et un message explique
le problème. Tout le fichier est analysé et toutes les erreurs sont affichées. Les
commandes d'écriture ne sont pas transmises à CMC si une erreur est trouvée
dans le fichier .cfg. Vous devez corriger toutes les erreurs pour que la
configuration puisse avoir lieu.
Pour vérifier les erreurs avant de créer le fichier de configuration, utilisez
l'option -c avec la sous-commande config. Avec l'option -c, config vérifie
uniquement la syntaxe et n'écrit pas sur CMC.
Tenez compte des consignes suivantes lorsque vous créez un fichier .cfg :
• Si l'analyseur rencontre un groupe indexé, c'est la valeur de l'objet ancré
qui différencie les différents index.
L'analyseur lit tous les index CMC de ce groupe. Les objets de ce groupe
représentent des modifications lorsque CMC est configuré. Si un objet
modifié représente un nouvel index, l'index est créé sur CMC pendant
la configuration.104 Utilisation de l'interface de ligne de commande RACADM
• Vous ne pouvez pas choisir les index désirés dans un fichier .cfg.
Les index peuvent être créés et supprimés. Au fil du temps, le groupe peut
se fragmenter par suite des index utilisés et inutilisés. Si un index est
présent, il est modifié. Si un index n'est pas présent, le premier index
disponible est utilisé. Cette méthode permet une certaine flexibilité lors de
l'ajout d'entrées indexées où il est inutile d'établir des correspondances
d'index exactes entre tous les CMC gérés. Les nouveaux utilisateurs sont
ajoutés au premier index disponible. Un fichier .cfg qui analyse et s'exécute
correctement sur un CMC peut ne pas s'exécuter correctement sur un autre
si tous les index sont remplis et qu'un nouvel utilisateur doit être ajouté.
• Utilisez la sous-commande racresetcfg pour configurer les deux
CMC avec des propriétés identiques.
Utilisez la sous-commande racresetcfg pour réinitialiser CMC à ses
paramètres initiaux par défaut et exécutez ensuite la commande racadm
config -f .cfg. Le fichier .cfg doit inclure tous les
objets, utilisateurs, index et autres paramètres appropriés. Voir le chapitre
Propriétés de la base de données du Guide de référence de la ligne de
commande RACADM pour iDRAC6 et CMC pour une liste exhaustive
des objets et des groupes.
PRÉCAUTION : utilisez la sous-commande racresetcfg pour réinitialiser la
base de données et les paramètres de carte réseau CMC sur leurs paramètres par
défaut d'origine, et supprimer tous les utilisateurs et toutes les configurations
utilisateur. Pendant que l'utilisateur root est disponible, les paramètres par défaut
des autres utilisateurs sont également réinitialisés.
Règles d'analyse
• Les lignes qui commencent par le caractère de hachage « # » sont traitées
comme des commentaires.
Une ligne de commentaire doit commencer dans la première colonne. Un
caractère « # » dans toute autre colonne est traité comme un caractère #.
Certains paramètres de modem peuvent inclure les caractères # dans leurs
chaînes de caractères. Un caractère d'échappement n'est pas requis. Vous
pouvez générer un fichier .cfg à partir d'une commande racadm
getconfig -f (nom de fichier).cfg, puis exécuter
une commande racadm config -f .cfg (nom
de fichier.cfg) sur un autre CMC sans ajouter de caractères d'échappement.Utilisation de l'interface de ligne de commande RACADM 105
Par exemple :
#
# This is a comment
[cfgUserAdmin]
cfgUserAdminPageModemInitString=
• Toutes les entrées de groupe doivent être entourées de crochets
d'ouverture et de fermeture ([ et ]).
Le caractère « [ » du début indiquant un nom de groupe doit commencer
dans la colonne 1. Ce nom de groupe doit être spécifié avant n'importe
quel objet dans ce groupe. Les objets auxquels aucun nom de groupe n'est
associé génèrent une erreur. Les données de configuration s'organisent en
groupes tel que défini dans le chapitre Propriétés de la base de données du
Guide de référence de la ligne de commande RACADM pour iDRAC6 et
CMC. L'exemple suivant affiche un nom de groupe, un objet et la valeur
de propriété de l'objet :
[cfgLanNetworking] - {group name}
cfgNicIpAddress=143.154.133.121 {object name}
{object value}
• Tous les paramètres sont spécifiés en tant que paires « objet=valeur » sans
espace entre l'objet, le signe = et la valeur. Les espaces blancs qui sont
inclus après la valeur sont ignorés. Un espace blanc à l'intérieur d'une
chaîne de valeurs n'est pas modifié. Tout caractère à droite du symbole « =
» est pris tel quel (par exemple, un deuxième « = », un « # », « [ », « ] », et
ainsi de suite). Ces caractères sont des caractères de script de conversation
de modem valides.
[cfgLanNetworking] - {group name}
cfgNicIpAddress=143.154.133.121 {object value}
• L'analyseur .cfg ignore une entrée d'objet d'index.
Vous ne pouvez pas spécifier quel index est utilisé. Si l'index existe déjà,
il est utilisé ou la nouvelle entrée est créée dans le premier index
disponible pour ce groupe.
La commande racadm getconfig-f .cfg (nom de
fichier.cfg) insère un commentaire devant les objets d'index, ce qui vous
permet de visualiser les commentaires inclus.106 Utilisation de l'interface de ligne de commande RACADM
REMARQUE : vous pouvez créer un groupe indexé manuellement en utilisant
la commande suivante :
racadm config -g -o -i
• La ligne d'un groupe indexé ne peut pas être supprimée d'un fichier .cfg.
Si vous supprimez cette ligne à l'aide d'un éditeur de texte, RACADM
interrompra son analyse du fichier de configuration et vous avertira
de l'erreur.
Vous devez supprimer un objet indexé manuellement en utilisant la
commande suivante :
racadm config -g -o -i
""
REMARQUE : une chaîne de caractères nulle (identifiée par deux caractères
") demande à CMC de supprimer l'index du groupe spécifié.
Pour voir le contenu d'un groupe indexé, utilisez la commande suivante :
racadm getconfig -g -i
• Pour les groupes indexés, l'ancre d'objet doit être le premier objet après les
crochets « [ ] ». Voici des exemples de groupes indexés actuels :
[cfgUserAdmin]
cfgUserAdminUserName=
Si vous entrez racadm getconfig -f .cfg, (mon
exemple.cfg) la commande construit un fichier .cfg pour la configuration
CMC actuelle. Ce fichier de configuration peut être utilisé comme exemple
et comme point de départ de votre fichier .cfg unique.
Modification de l'adresse IP CMC
Lorsque vous modifiez l'adresse IP CMC dans le fichier de configuration,
supprimez toutes les entrées = (valeur) inutiles. Seul
le nom du groupe variable actuel avec « [ » et « ] » est conservé, avec les deux
entrées = (valeur) correspondant au changement
d'adresse IP.Utilisation de l'interface de ligne de commande RACADM 107
Exemple :
#
# object Group « cfgLanNetworking »
#
[cfgLanNetworking]
cfgNicIpAddress=10.35.10.110
cfgNicGateway=10.35.10.1
Ce fichier est mis à jour comme suit :
#
# Groupe d'objet « cfgLanNetworking »
#
[cfgLanNetworking]
cfgNicIpAddress=10.35.9.143
# comment, the rest of this line is ignored
cfgNicGateway=10.35.9.1
La commande racadm config -f .cfg (monfichier.cfg)
analyse le fichier et identifie toutes les erreurs par numéro de ligne. Un fichier
correct met à jour les bonnes entrées. En outre, vous pouvez utiliser la
commande getconfig utilisée dans l'exemple précédent pour confirmer la
mise à jour.
Utilisez ce fichier pour télécharger des modifications à l'échelle de l'entreprise
ou pour configurer de nouveaux systèmes sur le réseau à l'aide de la
commande racadm getconfig -f .cfg (monfichier.cfg).
REMARQUE : « Anchor » est un mot réservé qui ne doit pas être utilisé dans le
fichier .cfg. 108 Utilisation de l'interface de ligne de commande RACADM
Utilisation de RACADM pour configurer les
propriétés sur iDRAC
Les commandes config/getconfig RACADM prennent en charge l'option -m
pour les groupes de configuration suivants :
• cfgLanNetworking
• cfgIPv6LanNetworking
• cfgRacTuning
• cfgRemoteHosts
• cfgSerial
• cfgSessionManagement
REMARQUE : pour plus d'informations sur les valeurs et les plages de propriétés
par défaut, consultez le Guide d'utilisation d'Integrated Dell Remote Access
Controller 6 (iDRAC6) Enterprise pour les serveurs lames.
Si le micrologiciel sur le serveur ne prend pas une fonctionnalité en charge,
la configuration d'une propriété liée à cette fonctionnalité entraîne l'affichage
d'une erreur. Par exemple, l'utilisation de RACADM pour activer syslog distant
sur un iDRAC non pris en charge entraîne l'affichage d'un message d'erreur.
De même, lors de l'affichage des propriétés iDRAC à l'aide de la commande
getconfig de RACADM, les valeurs de propriétés sont affichées sous la
forme - pour une fonctionnalité non prise en charge sur le serveur.
Par exemple :
$ racadm getconfig -g cfgSessionManagement -m server-1
# cfgSsnMgtWebServerMaxSessions=-
# cfgSsnMgtWebServerActiveSessions=-
# cfgSsnMgtWebServerTimeout=-
# cfgSsnMgtSSHMaxSessions=-
# cfgSsnMgtSSHActiveSessions=-
# cfgSsnMgtSSHTimeout=-
# cfgSsnMgtTelnetMaxSessions=-
# cfgSsnMgtTelnetActiveSessions=-
# cfgSsnMgtTelnetTimeout=-Utilisation de l'interface de ligne de commande RACADM 109
Dépannage
La Figure 4-3 répertorie les problèmes courants liés à RACADM distant.
Tableau 4-3. Utilisation des commandes Serial/ RACADM : Questions les plus
fréquentes
Question Réponse
Après avoir réinitialisé CMC
(avec la sous-commande
racreset de RACADM),
j'entre une commande et le
message suivant s'affiche :
racadm
Transport: ERROR:
(RC=-1)
Qu'est-ce que ce message
signifie ?
Vous devez attendre que CMC soit complètement
réinitialisé avant d'envoyer une autre commande.
Lorsque j'utilise les souscommandes RACADM, je
reçois des erreurs que je ne
comprends pas.
Il se peut que vous rencontriez une ou plusieurs des
erreurs suivantes lors de l'utilisation de RACADM :
• Messages d'erreur locaux : problèmes de syntaxe,
d'erreurs typographiques et de noms incorrects .
Exemple :
ERREUR :
Utilisez la sous-commande help RACADM pour
afficher la syntaxe correcte et les informations
d'utilisation.
• Messages d'erreur liés à CMC : problèmes qui
empêchent CMC d'effectuer une opération. Le
message peut également indiquer « Échec d'une
commande RACADM ».
entrez racadm gettracelog pour obtenir
des informations de débogage.110 Utilisation de l'interface de ligne de commande RACADM
Pendant l'utilisation de
RACADM distant, l'invite
s'est modifiée pour afficher
« > » et je ne parviens pas à
récupérer l'invite « $ ».
Si vous entrez des guillemets doubles différents (") ou
une citation simple différente (') dans la commande,
l'interface utilisateur change vers l'invite « > » et met
en file d'attente toutes les commandes.
Pour revenir à l'invite « $ », entrez –d.
Les commandes suivantes
ont affiché le message
d'erreur « Introuvable » :
$ logout
$ quit
Les commandes « logout » et « quit » ne sont pas prises
en charge dans l'interface de ligne de commande CMC.
Tableau 4-3. Utilisation des commandes Serial/ RACADM : Questions les plus
fréquentes (suite)
Question RéponseUtilisation de l'interface Web de CMC 111
Utilisation de l'interface Web
de CMC
CMC intègre une interface Web qui vous permet de configurer les propriétés
et les utilisateurs CMC, d'effectuer les tâches de gestion à distance et de
dépanner un système (géré) distant en cas de problème. Pour la gestion
quotidienne du châssis, utilisez l'interface Web de CMC. Ce chapitre fournit
des informations sur la manière d'effectuer les tâches de gestion courantes du
châssis à l'aide de l'interface Web de CMC.
Vous pouvez également effectuer l'ensemble des tâches de configuration à
l'aide de commandes RACADM locales ou de consoles de ligne de commande
(console série, Telnet ou SSH). Pour plus d'informations sur l'utilisation de
RACADM en local, voir « Utilisation de l'interface de ligne de commande
RACADM », à la page 75. Pour des informations sur l'utilisation des consoles
de ligne de commande, voir « Configuration de CMC pour utiliser des
consoles de ligne de commande », à la page 61.
REMARQUE : si vous utilisez Microsoft Internet Explorer pour vous connecter via
un proxy et que l'erreur « La page XML ne peut être affichée » s'affiche, vous devez
désactiver le proxy pour continuer.
Accès à l'interface Web CMC
Pour accéder à l'interface Web CMC sur IPv4 :
1 Ouvrez une fenêtre d'un navigateur Web pris en charge.
Pour les dernières informations relatives aux navigateurs Web pris en
charge, consultez la Matrice de prise en charge des logiciels des systèmes
Dell sur le site Web support.dell.com/manuals.112 Utilisation de l'interface Web de CMC
2 Entrez l'adresse URL suivante dans le champ Adresse, puis appuyez sur
:
https://
Si le numéro de port HTTPS par défaut (port 443) a été modifié, entrez :
https://:
où est l'adresse IP CMC et le
numéro de port HTTPS.
La page Ouverture de session CMC s'affiche.
Pour accéder à l'interface Web CMC sur IPv6 :
1 Ouvrez une fenêtre d'un navigateur Web pris en charge.
Pour les dernières informations relatives aux navigateurs Web pris en
charge, consultez la Matrice de prise en charge des logiciels des systèmes
Dell sur le site Web support.dell.com/manuals.
2 Entrez l'adresse URL suivante dans le champ Adresse, puis appuyez sur
:
https://[]
REMARQUE : lorsque vous utilisez IPv6, vous devez mettre entre crochets ([ ]).
Le numéro de port HTTPS dans l'URL est facultatif si vous
utilisez toujours la valeur par défaut (443). Sinon, vous devez spécifier le
numéro de port. La syntaxe de l'URL CMC IPv6 avec le numéro de port
spécifié est la suivante :
https://[]:
où est l'adresse IP CMC et le
numéro de port HTTPS.
La page Ouverture de session CMC s'affiche.Utilisation de l'interface Web de CMC 113
Ouverture de session
REMARQUE : pour ouvrir une session CMC, vous devez posséder un compte CMC
doté du privilège Ouverture de session CMC.
REMARQUE : par défaut, le nom d'utilisateur est root et le mot de passe calvin.
Le compte root est le compte d'administration par défaut fourni avec le
contrôleur CMC. Pour plus de sécurité, Dell recommande vivement de modifier le
mot de passe par défaut du compte root lors de la procédure de configuration
initiale.
REMARQUE : le contrôleur CMC ne prend pas en charge les caractères ASCII
étendus (ß, å, é, ü, etc.), ni les caractères utilisés dans des langues autres que
l'anglais.
REMARQUE : vous ne pouvez pas vous connecter à l'interface Web avec
différents noms d'utilisateur dans plusieurs fenêtres du navigateur sur une seule
station de travail.
Vous pouvez ouvrir une session en tant qu'utilisateur CMC ou en tant
qu'utilisateur Active Directory.
Pour ouvrir une session :
1 Dans le champ Nom d'utilisateur, entrez votre nom d'utilisateur :
• Nom d'utilisateur du contrôleur CMC :
• Nom d'utilisateur Active Directory : <\,
/ or @.
• Nom d'utilisateur LDAP :
REMARQUE : ce champ est sensible à la casse.
2 Dans le champ Mot de passe, entrez votre mot de passe d'utilisateur pour
le contrôleur CMC ou pour Active Directory.
REMARQUE : ce champ est sensible à la casse.
3 Facultativement, sélectionnez un délai de session. C'est la durée pendant
laquelle vous pouvez rester connecté sans activité avant d'être
automatiquement déconnecté. La valeur par défaut est définie comme le
délai d'inactivité du service Web. Voir Configuration des services pour plus
de détails.
4 Cliquez sur OK ou appuyez sur .114 Utilisation de l'interface Web de CMC
Fermeture de session
Lorsqu'une session est ouverte dans l'interface Web, vous pouvez à tout
moment la fermer en cliquant sur Fermer la session dans le coin supérieur
droit de chaque page.
REMARQUE : veillez à appliquer (enregistrer) les paramètres ou les informations
entrés sur une page. Si vous fermez la session ou quittez cette page sans appliquer
vos modifications, celles-ci seront perdues.
Configuration des paramètres CMC de base
Les sections suivantes fournissent des informations sur la configuration des
paramètres CMC de base.
Définir l'emplacement physique et le nom du châssis
Vous pouvez définir l'emplacement du châssis dans un centre de données
ainsi que le nom de châssis permettant de l'identifier sur le réseau (le nom par
défaut est « Dell Rack System »). Par exemple, une requête SNMP sur le nom
de châssis retourne le nom que vous avez configuré.
Pour définir un emplacement et un nom de châssis :
1 Ouvrez une session sur l'interface Web de CMC.
La page Intégrité du châssis s'affiche.
2 Cliquez sur l'onglet Configuration.
La page Paramètres généraux du châssis s'affiche.
3 Entrez les propriétés d'emplacement dans les champs Data Center, Rayon,
Rack et Emplacement de rack.
REMARQUE : le champ d'emplacement de châssis est facultatif. Il vous est
recommandé d'utiliser les champs Data Center, Rayon, Rack et Emplacement
de rack pour indiquer l'emplacement physique du châssis.
4 Entrez le nouveau nom dans le champ Nom du châssis, puis cliquez sur
Appliquer.Utilisation de l'interface Web de CMC 115
Définition de la date et de l'heure sur CMC
Vous pouvez définir manuellement la date et l'heure, ou bien vous pouvez
synchroniser la date et l'heure avec un serveur NTP (Network Time Protocol).
Pour définir la date et l'heure sur CMC :
1 Ouvrez une session sur l'interface Web de CMC.
La page Intégrité du châssis s'affiche.
2 Cliquez sur l'onglet Configuration.
La page Paramètres généraux du châssis s'affiche.
3 Cliquez sur le sous-onglet Date/Heure.
La page Date/Heure s'affiche.
4 Pour synchroniser la date et l'heure avec un serveur NTP (Network Time
Protocol), cochez Activer NTP et spécifiez jusqu'à trois serveurs NTP.
5 Pour définir manuellement la date et l'heure, décochez Activer NTP et
modifiez les champs Date et Heure, sélectionnez le Fuseau horaire dans le
menu déroulant, puis cliquez ensuite sur Appliquer.
Pour définir la date et l'heure en utilisant l'interface de ligne de commande,
consultez les sections concernant les groupes de propriétés de la base de données
cfgRemoteHosts et la commande config dans le Guide de référence de la
ligne de commande RACADM pour 'iDRAC7 et le contrôleur CMC.
Activation du support Flash amovible
Vous pouvez activer ou réparer le média Flash amovible facultatif pour
l'utiliser en tant que stockage non volatil étendu. Le fonctionnement de
certaines fonctionnalités de CMC dépend du stockage non volatil.
Pour activer ou réparer le média Flash amovible :
1 Ouvrez une session sur l'interface Web de CMC.
La page Intégrité du châssis s'affiche.
2 Cliquez sur Contrôleur du châssis dans la liste d'arborescence.
La page Condition du contrôleur du châssis s'affiche.
3 Cliquez sur l'onglet Média Flash.
La page Média Flash amovible s'affiche.116 Utilisation de l'interface Web de CMC
4 Pour commencer à utiliser le média, sélectionnez Utiliser le média Flash
pour le stockage des données du châssis dans la liste déroulante.
5 Si le support d'un CMC semble avoir un problème, rendez CMC actif et
sélectionnez Préparer ou réparer le média contrôleur actif dans la liste
déroulante.
Si deux CMC sont présents dans le châssis, les deux CMC doivent contenir
un média Flash. Les fonctionnalités CMC qui dépendent du média Flash
(sauf pour Flexaddress) ne fonctionnent correctement qu'une fois le média
autorisé par Dell installé et activé sur cette page.
Page Intégrité du châssis
Quand vous vous connectez au contrôleur CMC, la page Intégrité du châssis
(Présentation du châssis→ Propriétés→ Intégrité) s'affiche. Les informations
et actions les plus souvent requises sont disponibles sur cette page. Si votre
châssis est configuré en tant que Chef de groupe, la page Intégrité du groupe
s'affiche après la connexion. Pour plus d'informations, voir « Utilisation d'un
groupe de châssis », à la page 117.
La page Intégrité du châssis affiche une vue graphique du châssis et de ses
composants, ainsi que les détails des composants. Selon le composant
sélectionné, différentes actions ou liens vers d'autres pages sont disponibles.
En outre, les derniers événements du journal du matériel de CMC sont
également affichés.
Toutes les informations sont mises à jour dynamiquement sur la page
Intégrité du châssis. Cette page contient deux sections : Résumé des
composants du châssis en haut, suivi de la liste Événements récents du
journal de matériel de CMC.
La section Résumé des composants du châssis (également intitulée
« Intégrité du châssis » lorsque les informations générales sur le châssis sont
affichées) affiche les graphiques et leurs informations associées. Vous pouvez
masquer cette section en cliquant sur l'icône Fermer.
La partie gauche de la section Résumé des composants du châssis affiche les
graphiques et les liens rapides du châssis. La moitié droite affiche des
informations, liens et actions liés à l'élément sélectionné. Cliquez sur la
représentation graphique d'un composant pour sélectionner le composant.
Une fois sélectionné, le graphique devient bleu.Utilisation de l'interface Web de CMC 117
La liste Événements récents du journal de matériel de CMC affiche les
10 derniers événements de ce journal. Le contenu de cette section est mis à
jour dynamiquement et présente les derniers événements en haut de la liste.
Pour plus d'informations sur les entrées de journal matériel de CMC, voir
« Affichage des journaux d'événements », à la page 460.
Utilisation d'un groupe de châssis
Le contrôleur CMC permet de contrôler plusieurs châssis depuis un seul
châssis chef. À l'activation d'un groupe de châssis, le contrôleur CMC du
châssis chef génère un affichage graphique de l'état du châssis chef et de tous
les châssis membres au sein du groupe du châssis.
Fonctionnalités du groupe de châssis
Les fonctions du groupe de châssis sont les suivantes :
• La page GUI des groupes du châssis affiche des images qui représentent
l'arrière et l'avant de chaque châssis, un ensemble pour le châssis chef et un
ensemble pour chaque châssis membre.
• Des problèmes liés à l'intégrité du chef et des membres d'un groupe sont
affichées en couleur rouge ou jaune accompagnés d'une croix X ou d'un !
sur le composant présentant des problèmes. Des détails sont visibles sous
l'image du châssis en cliquant sur cette dernière ou sur le bouton Détails.
• Des liens de lancement rapide sont disponibles pour ouvrir les pages Web
du châssis membre ou du serveur.
• Un inventaire de lames et d'E/S est disponible pour tout groupe.
• Une option sélectionnable est disponible pour synchroniser les propriétés
d'un nouveau membre avec celles du chef de groupe lorsqu'un nouveau
membre est ajouté à ce dernier.
Configuration d'un groupe de châssis
Un groupe de châssis peut contenir jusqu'à huit membres. De plus, un chef ou
un membre ne peut appartenir qu'à un seul groupe. Un châssis, chef ou
membre, faisant partie d'un groupe ne peut pas être ajouté à un autre groupe.
Il peut être supprimé d'un groupe, puis ajouté à un autre groupe ultérieurement.118 Utilisation de l'interface Web de CMC
Pour configurer le groupe de châssis via l'interface utilisateur :
1 Connnectez-vous au châssis chef à l'aide des privilèges administrateur
du châssis.
2 Cliquez sur Configuration→ Administration des groupes.
La page Groupe de châssis s'affiche.
3 Dans la page Groupe de châssis, sélectionnez Chef sous Rôle.
Un champ permettant d'ajouter le nom du groupe s'affiche.
4 Entrez le nom du groupe dans le champ Nom du groupe, puis cliquez sur
Appliquer.
REMARQUE : les mêmes règles qui s'appliquent pour un nom de domaine
s'appliquent au nom de groupe.
L'interface GUI devient automatiquement la page GUI du groupe de châssis
une fois le groupe de châssis créé. L'arborescence du système affiche le groupe
par son nom de groupe et le châssis chef ainsi que le châssis membre non
peuplé.
Une fois le groupe du châssis configuré, des membres peuvent être ajoutés à
celui-ci :
1 Connectez-vous au châssis chef à l'aide des privilèges administrateur.
2 Sélectionnez le châssis chef dans l'arborescence.
3 Cliquez sur Configuration→ Administration des groupes.
4 Sous Gestion des groupes, saisissez l'adresse IP ou le nom DNS du
membre dans le champ Nom d'hôte/Adresse IP.
5 Dans le champ Nom utilisateur du châssis membre, saisissez un nom
utilisateur à l'aide des privilèges administrateur du châssis.
6 Saisissez le mot de passe correspondant dans le champ Mot de passe.
7 Facultatif : sélectionnez Synchroniser le nouveau membre avec les
propriétés du leader/chef pour pousser les propriétés du chef vers le
membre. Pour plus d'informations, voir la sous-section « Synchronisation
des propriétés d'un nouveau membre avec celles du châssis chef », à la
page 121.
8 Sélectionnez le bouton Appliquer.Utilisation de l'interface Web de CMC 119
9 Répétez les étapes de l'étape 4 à l'étape 8 pour ajouter jusqu'à huit
membres.
Les noms de châssis des nouveaux membres s'affichent dans la boîte de
dialogue libellée Membres.
L'état du nouveau membre s'affiche lorsque le groupe est sélectionnée dans
l'arborescence. Des détails sont disponibles en cliquant sur l'image du châssis
ou sur le bouton Détails.
REMARQUE : lorsqu'elles sont saisies, les références d'un membres sont transmises
de manière sécuritaire au châssis membre afin d'établir une relation de confiance
entre le membre et le châssis chef. Les références ne restent sur aucun des châssis et
ne sont plus échangées après l'établissement initial de la relation de confiance.
Retrait d'un membre du châssis chef
Vous pouvez supprimer un membre du groupe du châssis chef. Pour
supprimer un membre :
1 Connectez-vous au châssis chef à l'aide des privilèges administrateur.
2 Sélectionnez le châssis chef dans l'arborescence.
3 Cliquez sur Configuration→ Administration des groupes.
4 Dans la liste Suppression de membres, sélectionnez le nom du membre ou
des membres à supprimer, puis cliquez sur Appliquer.
Le châssis chef communique au membre ou aux membres sélectionnés qu'ils
ont été supprimés du groupe. Le nom du membre est supprimé de la boîte de
dialogue. Le châssis membre ne pourra pas recevoir le message si un problème
de réseau empêche la communication entre le chef et le membre. Dans ce cas,
désactivez le membre depuis le châssis membre pour terminer le processus de
retrait. Pour plus d'informations, consultez la sous-section « Désactivation
d'un membre individuel sur le châssis membre », à la page 120.
Dissolution d'un groupe de châssis
Pour dissoudre un groupe de châssis depuis le châssis chef :
1 Connectez-vous au châssis chef à l'aide des privilèges administrateur.
2 Sélectionnez le châssis chef dans l'arborescence.
3 Cliquez sur Configuration→ Administration des groupes.
4 Dans la page du Groupe du châssis, sous Rôle, sélectionnez Aucun, puis
cliquez sur Appliquer.120 Utilisation de l'interface Web de CMC
Le châssis chef communique alors avec tous les membres qui ont été
supprimés pour leur faire savoir qu'ils ont été supprimés du groupe. Enfin, le
châssis chef ne tient plus ce rôle. Il peut maintenant être affecté en tant que
membre ou chef d'un autre groupe.
Le châssis membre ne pourra pas recevoir le message si un problème de
réseau empêche la communication entre le chef et le membre. Dans ce cas,
désactivez le membre depuis le châssis membre pour terminer le processus de
retrait. Pour plus d'informations, consultez la sous-section « Désactivation
d'un membre individuel sur le châssis membre », à la page 120.
Désactivation d'un membre individuel sur le châssis membre
Il arrive qu'un membre ne puisse pas être supprimé d'un groupe par le châssis
chef. Cela peut se produire si la connectivité réseau du membre est perdue.
Pour supprimer un membre d'un groupe dans le châssis membre :
1 Connectez-vous au châssis membre à l'aide des privilèges d'administrateur
de châssis.
2 Cliquez sur Configuration→ Administration des groupes.
3 Sélectionnez Aucun, puis cliquez sur Appliquer.
Lancement d'une page Web du châssis membre ou du serveur
Des liens vers une page Web du châssis membre, vers une console à distance
du serveur ou vers la page Web de l'iDRAC du serveur au sein du groupe sont
disponibles via la page de groupe du châssis chef. Pour vous connecter au
périphérique membre, utilisez les nom d'utilisateur et mot de passe utilisés
établir une connexion au châssis chef. Si le périphérique membre dispose des
mêmes coordonnées d'ouverture de session, aucune coordonnée
supplémentaire n'est nécessaire. Sinon, l'utilisateur est dirigé vers la page
d'ouverture de session du périphérique membre. Pour naviguer vers les
périphériques membres :
1 Ouvrez une session dans le châssis chef.
2 Sélectionnez Groupe : nom dans l'arborescence.
3 Si un membre CMC correspond à la destination requise, sélectionnez
Lancer CMC sous le châssis souhaité.Utilisation de l'interface Web de CMC 121
Si un serveur de châssis correspond à la destination requise, procédez
comme suit :
a Sélectionnez l'image du châssis de destination.
b Dans l'image du châssis qui apparaît sous le panneau Intégrité et
alertes, sélectionnez le serveur.
c Dans la boîte de dialogue libellée Liens rapides, sélectionnez le
périphérique de destination.
Une nouvelle fenêtre contenant la page de destination ou l'écran
d'ouverture de session s'affiche.
Synchronisation des propriétés d'un nouveau membre avec celles du
châssis chef
Vous pouvez appliquer les propriétés du chef à un membre nouvellement
ajouté à un groupe. Pour synchroniser un nouveau membre avec les propriétés
du chef :
1 Connectez-vous au châssis chef à l'aide des privilèges administrateur.
2 Sélectionnez le châssis chef dans l'arborescence.
3 Cliquez sur Configuration→ Administration des groupes.
4 Lorsque vous ajoutez un nouveau membre au groupe, sélectionnez
Synchroniser le nouveau membre avec les propriétés du leader/chef sur la
page Groupe de châssis.
5 Cliquez sur Appliquer.
Le membre prend les propriétés du leader.122 Utilisation de l'interface Web de CMC
Les propriétés du service de configuration suivantes de plusieurs systèmes
dans le châssis sont affectées après la synchronisation :
Inventaire de lames pour Groupe MCM
La page Intégrité de groupe de châssis affiche tous les châssis membres et
vous permet d'enregistrer le rapport d'inventaire de lames dans un fichier à
l'aide de la fonction de téléchargement de tout navigateur standard. Le
rapport contient des données pour :
• Toutes les lames actuellement présentes dans le groupe de châssis
(y compris le chef).
• Logements vides et les logements d'extension (y compris les lames de
pleine hauteur et de double largeur).
Enregistrement du rapport d'inventaire de lames
Pour enregistrer le rapport d'inventaire de lames :
1 Ouvrez une session dans l'interface Web du CMC, puis sélectionnez
Groupe dans l'arborescence système.
La page Intégrité du châssis s'affiche.
2 Cliquez sur le bouton Enregistrer le rapport d'inventaire.
La boîte de dialogue Téléchargement de fichier qui s'affiche vous invite à
ouvrir ou à enregistrer le fichier.
Tableau 5-1. Propriétés de service de configuration
Propriété Navigation
Configuration du protocole
SNMP
Cliquez sur Présentation du châssis→ Réseau→
Services→ SNMP pour plus de détails.
Connexion à distance à un châssis Cliquez sur Présentation du châssis→ Réseau→
Services→ SNMP pour plus de détails.
Authentification d'utilisateur à
l'aide de services LDAP et Active
Directory
Cliquez sur Présentation du châssis→
Authentification utilisateur→ Services
d'annuaire pour plus de détails.
Alertes de châssis Cliquez sur Présentation du châssis→ Alertes
pour plus de détails.Utilisation de l'interface Web de CMC 123
3 Cliquez sur Enregistrer et spécifiez le chemin et le nom de fichier du
rapport d'inventaire de lames.
REMARQUE : pour que le rapport d'inventaire de lames soit le plus précis
possible, le chef du groupe de châssis, le châssis membre du groupe de
châssis et les lames dans les châssis associés doivent être sous tension.
Données exportées
Le rapport d'inventaire de lames contient les données les plus récemment
renvoyées par chaque membre du groupe de châssis au cours de
l'interrogation régulière du chef de groupe de châssis (toutes les 30 secondes).
Pour obtenir le rapport d'inventaire de lames le plus précis :
• Le chef de groupe de châssis et tous les châssis membres du groupe de
châssis doivent être en état Alimentation de châssis activée
• Toutes les lames dans les châssis associés doivent être sous tension
Les données d'inventaire des châssis et lames associées peuvent ne pas
apparaître dans le rapport d'inventaire si un sous-ensemble de châssis
membres d'un groupe de châssis sont :
• en état de Alimentation de châssis désactivée
• Hors tension
La Figure 5-2 répertorie les champs de données spécifiques et les conditions
particulières requises pour les champs à inclure dans le rapport pour
chaque lame :
Tableau 5-2. Descriptions des champs d'inventaire de lames
Champ de données Exemple
Nom du châssis Chef de châssis de centre de données
Adresse IP du châssis 192.168.0.1
Emplacement de logement 1
Nom de logement SLOT-01
Nom d'hôte Serveur Web d'entreprise
REMARQUE : requiert un agent Server
Administrator exécuté sur le serveur ; autrement,
le champ sera vierge.124 Utilisation de l'interface Web de CMC
Format des données
Le rapport d'inventaire est généré dans un fichier au format .CSV de sorte à
pouvoir les importer vers divers outils, tel que Microsoft Excel. Le fichier de
rapport d'inventaire .CSV peut être importé vers des modèles en
sélectionnant Données→ De texte dans MS Excel. Après l'importation du
rapport d'inventaire dans MS Excel, si un message s'affiche vous invitant à
fournir des informations supplémentaires, sélectionnez le fichier séparé par
des virgules à importer vers MS Excel.
Système d'exploitation Windows Server 2008
REMARQUE : requiert un agent Server
Administrator exécuté sur le serveur ; autrement,
le champ sera vierge.
Modèle PowerEdgeM610
Numéro de service 1PB8VF1
Mémoire système totale 4 Go
REMARQUE : requiert un CMC 4.0 (ou ultérieur)
sur le membre ; autrement le champ sera vierge.
Nbr d'UC 2
REMARQUE : requiert un CMC 4.0 (ou ultérieur)
sur le membre ; autrement le champ sera vierge.
Infos sur l'UC UC Intel (R) Xeon (R) E5502 à 1,87GHzn
REMARQUE : requiert un CMC 4.0 (ou ultérieur)
sur le membre ; autrement le champ sera vierge.
Tableau 5-2. Descriptions des champs d'inventaire de lames (suite)
Champ de données ExempleUtilisation de l'interface Web de CMC 125
Résumé des composants du châssis
Les sections suivantes fournissent des informations sur le récapitulatif des
composant de châssis.
Graphiques du châssis
Le châssis est représenté par les vues avant et arrière (image supérieure et
image inférieure, respectivement). Les serveurs et l'écran LCD sont affichés
dans la vue avant et les autres composants sont affichés dans la vue arrière.
La sélection des composants est indiquée par une dominante bleue et est
contrôlée en cliquant sur l'image du composant requis. Quand un composant
est présent dans le châssis, une icône de ce type de composant est affichée
dans le graphique du logement où le composant a été installé. Les logements
vides sont affichés sur un fond gris anthracite. L'icône du composant indique
visuellement l'état du composant. L'icône de serveur est utilisée dans la
Figure 5-1 à titre d'exemple. D'autres composants affichent des icônes qui
représentent visuellement le composant physique. Les icônes des serveurs et
des modules d'E/S s'étendent sur plusieurs logements lorsqu'un élément de
taille double est installé. En survolant un composant, vous afficherez une
info-bulle avec plus d'informations sur ce composant.
Tableau 5-3. États des icônes de serveur
Icône Description
Le serveur est allumé et fonctionne
normalement.126 Utilisation de l'interface Web de CMC
La Figure 5-4 affiche les liens rapides de châssis.
Le serveur est éteint.
Le serveur signale une erreur non critique.
Le serveur signale une erreur critique.
Aucun serveur présent.
Tableau 5-3. États des icônes de serveur (suite)
Icône DescriptionUtilisation de l'interface Web de CMC 127
Intégrité du châssis
Dans la première page qui s'affiche, le côté droit de la page contient des
informations du niveau du châssis et des alertes. Toutes les alertes actives
critiques et non critiques sont affichées.
En cliquant sur un composant, vous remplacez les informations au niveau du
châssis par l'affichage des informations associées au composant sélectionné.
Pour restaurer les informations au niveau du châssis, cliquez sur Retourner à
l'intégrité du châssis dans le coin supérieur droit.
Tableau 5-4. Liens rapides de châssis
Champ Description
Configurer les
utilisateurs
Accédez à Présentation du châssis→ Authentification
utilisateur→ Utilisateurs locaux
Configuration
réseau
Accédez à Présentation du châssis→ Réseau→ Réseau
Configuration de
l'alimentation
Accédez à Présentation du châssis→ Alimentation→
Configuration
Mise à jour de
micrologiciel
Accédez à Présentation du châssis→ Mise à jour→ Mise à jour
du micrologiciel
Tableau 5-5. Informations de la page du châssis
Champ Description
Modèle Affiche le modèle du panneau LCD du châssis.
Micrologiciel Affiche la version du micrologiciel du contrôleur CMC actif.
Numéro de service Affiche le numéro de service du châssis. Le numéro de service est
un identifiant unique fourni par le fabricant pour le support et la
maintenance.
Numéro
d'inventaire
Affiche le numéro d'inventaire du châssis.
Alimentation
d'entrée
Alimentation que le châssis consomme actuellement.128 Utilisation de l'interface Web de CMC
Informations sur le composant sélectionné
Les informations pour le composant sélectionné sont affichées dans trois
sections indépendantes :
• Intégrité, Performances et Propriétés
Les événements actifs critiques et non critiques tels que ceux figurant
dans les journaux de matériel sont affichés ici, le cas échéant. Les données
de performances qui peuvent varier avec le temps sont également
présentées ici.
• Propriétés
Les propriétés des composants qui ne varient pas avec le temps ou qui
changent rarement sont affichées ici.
• Liens rapides
La section Liens rapides fournit un moyen commode de navigation des
pages les plus souvent consultées, ainsi que les actions les plus
fréquemment effectuées. Seuls les liens applicables à l'élément sélectionné
sont affichés dans cette section.
Seuil énergétique Puissance d'entrée maximale définie par l'utilisateur pour la
consommation. Lorsque le châssis atteint cette limite, les
serveurs ralentissent pour éviter une nouvelle augmentation dans
la puissance d'entrée requise.
Stratégie
d'alimentation
Préférence définie par l'utilisateur pour la coordination des
multiples unités d'alimentation.
Intégrité Affiche l'intégrité générale du sous-système d'alimentation du
châssis.
Tableau 5-5. Informations de la page du châssis (suite)
Champ DescriptionUtilisation de l'interface Web de CMC 129
Tableau 5-6. Informations sur l'intégrité et les performances - Serveurs
Élément Description
État de l'alimentation État Sous tension/Hors tension du serveur. Voir la
Figure 5-25 pour plus de détails sur les différents types
d'états d'alimentation.
Intégrité Affiche l'équivalent texte de l'icône d'intégrité.
Consommation
énergétique
Quantité d'énergie que consomme le serveur à l'heure
actuelle.
Alimentation allouée Quantité d'alimentation allouée au serveur.
Température Température lue par le capteur de température du serveur.
Tableau 5-7. Propriétés du serveur
Élément Description
Nom Nom de logement attribué par l'utilisateur.
Modèle Modèle du serveur, par exemple « PowerEdge M600 » ou
« PowerEdge M605 ».
Numéro de
service
Le numéro de service du serveur. Le numéro de service est un
identifiant unique fourni par le fabricant pour le support et la
maintenance. Si le serveur est absent, ce champ est vide.
SE Système d'exploitation du serveur.
Nom d'hôte Nom du serveur, tel qu'établi par le système d'exploitation.
iDRAC Version du micrologiciel iDRAC sur le serveur.
BIOS Version du BIOS du serveur.
CPLD Affiche le numéro de version du circuit logique programmable
complexe (CPLD) du serveur.
Informations
UC
Affiche le nombre et le type d'UC installées sur le serveur.
Mémoire
système
totale
Affiche la mémoire totale de système (en GO) installée sur le serveur.130 Utilisation de l'interface Web de CMC
Tableau 5-8. Liens rapides - Serveurs
Élément Description
Condition du
serveur
Accédez à Présentation des serveurs→ →
Propriétés→ Condition
Lancez la
console distante
Invoque une session clavier-écran-souris sur le serveur si le serveur
prend en charge cette opération.
Lancer
l'interface
utilisateur
iDRAC
Invoque une console de gestion iDRAC pour le serveur.
Mettre le serveur
sous tension
Appliquer la tension à un serveur qui est hors tension.
Mettre le serveur
hors tension
Couper l'alimentation d'un serveur qui est sous tension.
Partage de
fichiers à
distance
Accédez à Présentation des serveurs→ Configuration→ Partage
de fichiers à distance
Déployer le
réseau iDRAC
Accédez à Présentation des serveurs→ Configuration→ iDRAC
(Déployer iDRAC)
Lifecycle
Controller
Accédez à Présentation du serveur→ Mise à jour→ Mise à jour du
micrologiciel
Tableau 5-9. Intégrité et performances de module d'E/S
Élément Description
État de l'alimentation Affiche l'état de l'alimentation du module d'E/S : sous
tension, hors tension ou inconnu (absent).
Rôle Affiche l'adhésion à l'empilage du module d'E/S lorsque les
modules sont reliés. Membre : le module fait partie d'un
ensemble de piles. Maître : le module est un point d'accès
principal. Utilisation de l'interface Web de CMC 131
Tableau 5-10. Propriétés du module d'E/S
Élément Description
Modèle Affiche le nom de produit du module d'E/S.
Numéro de service Affiche le numéro de service du module d'E/S. Le numéro
de service est un identifiant unique fourni par Dell pour le
support et la maintenance.
Tableau 5-11. Liens rapides - Modules d'E/S
Élément Description
Condition du
module d'E/S
Accédez à Modules d'E/S→ →
Propriétés→ Condition
Lancer
l'interface
utilisateur du
module d'E/S
Si l'icône d'un module d'E/S spécifique est présente, un clic sur cette
icône lance la console de gestion de ce module d'E/S dans une
nouvelle fenêtre de navigateur ou sous un nouvel onglet.
Tableau 5-12. Intégrité et performances du contrôleur CMC actif
Élément Description
Mode de redondance Affiche le basculement disponible du contrôleur CMC de
secours. Si le micrologiciel CMC ne correspond pas ou si
CMC n'est pas câblé correctement au réseau de gestion, la
redondance apparaît comme non disponible.
Adresse MAC Affiche l'adresse MAC de l'interface réseau de CMC.
L'adresse MAC est un identificateur unique pour CMC sur
le réseau.
IPv4 Affiche l'adresse IPv4 de l'interface réseau de CMC.
IPv6 Affiche l'adresse IPv6 de l'interface réseau de CMC.132 Utilisation de l'interface Web de CMC
Tableau 5-13. Propriétés de CMC
Élément Description
Micrologiciel Affiche la version du micrologiciel du contrôleur CMC actif.
Micrologiciel Affiche la version du micrologiciel CMC installé sur le
contrôleur CMC de secours. Si vous n'avez pas installé un
deuxième contrôleur CMC, ce champ affiche N/A.
Dernière mise à jour Indique la date de la dernière mise à jour du micrologiciel. Si
aucune mise à jour ne s'est produite, ce champ affiche S/O (-).
Matériel Affiche la version matérielle du contrôleur CMC actif.
Tableau 5-14. Liens rapides - CMC
Élément Description
Condition CMC Accédez à Contrôleur du châssis→ Propriétés→ Condition
Mise en réseau Accédez à Présentation du châssis→ Réseau→ Réseau
Mise à jour de
micrologiciel
Accédez à Présentation du châssis→ Mise à jour→ Mise à jour
du micrologiciel
Tableau 5-15. Intégrité et performances du module iKVM
Élément Description
Console OSCAR Indique si le connecteur du panneau arrière VGA est activé
(Oui ou Non) pour l'accès à CMC.
Tableau 5-16. Propriétés du module iKVM
Élément Description
Nom Affiche le nom iKVM.
Numéro de pièce Affiche le numéro de pièce d'iKVM. Le numéro de pièce est
un identificateur unique fourni par le fournisseur. Les
conventions d'attribution des noms des numéros de pièce
diffèrent d'un fournisseur à l'autre.
Micrologiciel Indique la version du micrologiciel iKVM.
Matériel Indique la version du micrologiciel iKVM. Utilisation de l'interface Web de CMC 133
Tableau 5-17. Liens rapides - iKVM
Élément Description
Condition iKVM Accédez à iKVM→ Propriétés→ Condition
Mise à jour de
micrologiciel
Accédez à Présentation du châssis→ Mise à jour→ Mise à jour
du micrologiciel
Tableau 5-18. Intégrité et performances du ventilateur
Élément Description
Vitesse Indique la vitesse du ventilateur en tours par minute
(tr/min).
Tableau 5-19. Propriétés du ventilateur
Élément Description
Seuil critique inférieur Vitesse en dessous de laquelle le ventilateur est considéré
comme étant en panne.
Seuil critique supérieur Vitesse au-dessus de laquelle le ventilateur est considéré
comme étant en panne.
Tableau 5-20. Liens rapides - Ventilateur
Élément Description
Condition du
ventilateur
Accédez à Ventilateurs→ Propriétés→ Condition
Tableau 5-21. Intégrité et performances de l'unité d'alimentation
Élément Description
État de l'alimentation Indique l'état d'alimentation des blocs d'alimentation (un
seul à la fois) : En cours d'initialisation, En ligne, Veille, Test
de diagnostic, Échec, Mise à jour, Hors ligne ou Inconnu.134 Utilisation de l'interface Web de CMC
Il n'existe aucun lien rapide pour le panneau LCD.
Surveillance de la condition d'intégrité du système
Affichage des résumés relatifs au châssis et aux composants
La page de CMC Intégrité du châssis contient une représentation graphique
du châssis, fournissant une présentation visuelle des composants installés. La
page Intégrité du châssis est mise à jour de manière dynamique. Les couleurs
du sous-graphique des composants et les champs textuels sont
automatiquement modifiés.
Tableau 5-22. Propriétés de l'unité d'alimentation
Élément Description
Capacité Affiche la capacité de l'unité d'alimentation (en watts).
Tableau 5-23. Liens rapides - Unité d'alimentation
Élément Description
État du bloc
d'alimentation
Accédez à Blocs d'alimentation→ Propriétés→ Condition
Consommation
énergétique
Accédez à Présentation du châssis→ Alimentation→
Consommation électrique
Bilan de puissance
du système
Accédez à Présentation du châssis→ Alimentation→
Condition du bilan de puissance
Tableau 5-24. Intégrité et performances du panneau LCD
Élément Description
Condition du panneau LCD Affiche la présence et la condition du panneau LCD.
Intégrité du châssis Affiche la description texte de l'intégrité du châssis.Utilisation de l'interface Web de CMC 135
Figure 5-1. Exemple de graphiques du châssis dans l'interface Web
La page Intégrité du châssis fournit une condition générale de l'intégrité du
châssis, des modules CMC principal et de secours, des modules de serveur,
des modules d'E/S, des ventilateurs, du module iKVM, des blocs
d'alimentation et du panneau LCD. Des informations plus détaillées sur
chaque composant s'affichent en cliquant sur le composant. Pour des
instructions sur l'affichage des résumés du châssis et de ses composants, voir
« Affichage des résumés du châssis », à la page 455.
Affichage de la condition du bilan de puissance
La page Condition du bilan de puissance affiche la condition du bilan de
puissance pour le châssis, les serveurs et les unités d'alimentation du châssis.
Pour des instructions sur l'affichage de la condition du bilan de puissance,
voir « Affichage de l'état de la consommation de puissance », à la page 361.
Pour plus d'informations sur la gestion de l'alimentation de CMC, voir
« Gestion de l'alimentation », à la page 335.136 Utilisation de l'interface Web de CMC
Affichage du nom du modèle de serveur et du numéro de service
Le nom du modèle et le numéro de service de chaque serveur peuvent être
obtenus instantanément en procédant comme suit :
• Extension des serveurs dans l'arborescence du système. Tous les serveurs (1
à 16) s'affichent dans la liste développée Serveurs. Le nom de logement
sans serveur est grisé.
• Le passage du curseur sur le nom du logement ou du numéro de logement
d'un serveur fait apparaître une info-bulle avec le nom du modèle du
serveur et le numéro de service (si disponible).
Affichage de la condition d'intégrité de l'ensemble des serveurs
Vous pouvez consulter la condition d'intégrité de tous les serveurs depuis la
section Graphiques du châssis de la page Intégrité du châssis ou Condition
des serveurs.
La page Graphiques du châssis fournit un aperçu graphique de tous les
serveurs installés dans le châssis.
Pour consulter la condition d'intégrité des serveurs à l'aide des graphiques
du châssis :
1 Ouvrez une session sur l'interface Web de CMC.
La page Intégrité du châssis s'affiche. La section située au centre de la
page Graphiques du châssis représente une vue de face du châssis et
contient la condition d'intégrité de tous les serveurs. La condition
d'intégrité du serveur est indiquée par la couleur du sous-graphique
du serveur :
• Aucune couleur : le composant est présent, sous tension et
communique avec le contrôleur CMC. Il n'existe aucune indication
d'événement indésirable.
• Panneau orange : indique que seules des alertes sont émises et que des
mesures correctives doivent être prises.
• Croix rouge : indique qu'au moins une condition de panne est
présente. Cela signifie que CMC peut toujours communiquer avec le
composant et que la condition d'intégrité signalée est critique.
• Grisé : indique que le composant est présent et n'est pas sous tension.
Elle ne communique pas avec CMC et il n'y a aucune indication
d'événement indésirable.Utilisation de l'interface Web de CMC 137
La page Condition des serveurs fournit un aperçu des serveurs du châssis.
Pour afficher la condition d'intégrité de tous les serveurs en utilisant la page
Condition des serveurs :
1 Ouvrez une session sur l'interface Web de CMC.
2 Cliquez sur Présentation des serveurs dans l'arborescence.
La page Condition des serveurs s'affiche.
Tableau 5-25. Informations relatives à la condition de l'ensemble des serveurs
Élément Description
Logement Affiche l'emplacement du serveur. Le numéro de logement est un
numéro séquentiel qui identifie le serveur en fonction de son
emplacement dans le châssis.
Nom Indique le nom du serveur, qui est par défaut désigné par le nom de
son logement (SLOT01 à SLOT-16).
REMARQUE : vous pouvez changer le nom du serveur par défaut. Pour
des instructions, voir « Modification du nom d'un logement », à la
page 140.
Modèle Affiche le nom du modèle du serveur. Si ce champ est vide, le serveur
n'est pas présent. Si ce champ affiche Extension de n° (où la valeur de
n° est comprise entre 1 et 8), le n° correspond au logement principal
d'un serveur à plusieurs logements.138 Utilisation de l'interface Web de CMC
Intégrité OK Indique que le serveur est présent et qu'il
communique avec CMC. En cas de perte de
la communication entre CMC et le
serveur, CMC ne pourra pas obtenir ni
afficher la condition d'intégrité du serveur.
Informatif Affiche des informations sur les serveurs en
l'absence de modification de l'état de
l'intégrité (OK, Avertissement, Critique).
Avertissement Indique que des alertes d'avertissement
seules ont été émises et que des actions
correctives doivent être effectuées. Si aucune
action corrective n'est effectuée, des pannes
critiques susceptibles d'affecter l'intégrité
du serveur peuvent se produire.
Critique Indique qu'au moins une alerte de panne a
été générée. La condition Critique
représente une panne système du serveur et
des actions correctives doivent être effectuées
immédiatement.
Aucune valeur Lorsque le serveur est absent du logement,
les informations d'intégrité ne sont pas
fournies.
Tableau 5-25. Informations relatives à la condition de l'ensemble des serveurs (suite)
Élément DescriptionUtilisation de l'interface Web de CMC 139
Lancez la
console
distante
Cliquez ici pour lancer une session clavier-écran-souris sur le serveur
dans une nouvelle fenêtre ou un nouvel onglet. Cette icône n'est
affichée pour un serveur que si toutes les conditions suivantes sont
remplies :
• Serveurs prenant en charge iDRAC6 et iDRAC7.
• Le châssis est sous tension.
• L'interface de réseau local sur le serveur est activée.
• La version d'iDRAC est 2.20 ou ultérieure.
Cette fonctionnalité s'exécute correctement si les conditions
suivantes sont remplies :
• Le système hôte dispose du JRE (Java Runtime Environment)
6 Update 16 ou ultérieur.
• Le navigateur sur le système hôte autorise les fenêtres contextuelles
(le blocage des fenêtres contextuelles est désactivé).
Lancer
l'interface
utilisateur
iDRAC
Cliquez-gauche sur l'icône pour lancer la console de gestion
iDRAC pour un serveur dans une nouvelle fenêtre ou un nouvel
onglet du navigateur. Cette icône n'est affichée pour un serveur que si
toutes les conditions suivantes sont remplies :
• Le serveur est présent.
• Le châssis est sous tension.
• L'interface de réseau local sur le serveur est activée.
Cette fonctionnalité fonctionne correctement si la condition suivante
est remplie :
• Le navigateur sur le système hôte autorise les fenêtres contextuelles
(le blocage des fenêtres contextuelles est désactivé).
REMARQUE : si le serveur est retiré du châssis, l'adresse IP d'iDRAC
est modifiée ou s'il y a un problème de connexion de réseau sur iDRAC,
un clic sur l'icône Lancer l'interface utilisateur iDRAC risque d'afficher
une page d'erreur sur l'interface de réseau local d'iDRAC.
Tableau 5-25. Informations relatives à la condition de l'ensemble des serveurs (suite)
Élément Description140 Utilisation de l'interface Web de CMC
Pour des informations sur la procédure de lancement de la console de gestion
iDRAC et les stratégies de signature unique, consultez « Lancement d'iDRAC
à l'aide d'une signature unique », à la page 245.
Modification du nom d'un logement
La page Noms des logements vous permet de mettre à jour les noms des
logements du châssis. Les noms de logements sont utilisés pour identifier des
serveurs individuels. Pour le choix des noms de logements, les règles suivantes
s'appliquent :
• Les noms peuvent contenir un maximum de 15 caractères ASCII non
étendus (codes ASCII de 32 à 126).
• Les noms de logements doivent être uniques au sein d'un châssis. Le nom
de chaque logement doit être unique.
• Les chaînes de caractères ne sont pas sensibles à la casse. Serveur-1,
serveur-1 et SERVEUR-1 sont des noms équivalents.
État de
l'alimentation
Affiche l'état d'alimentation du serveur :
• - : CMC n'a pas encore déterminé l'état d'alimentation du serveur.
• Désactivé : le serveur ou le châssis est hors tension.
• Activé : le châssis et le serveur sont sous tension.
• Activation : état temporaire entre le mode Désactivé et Activé.
Lorsque l'action est terminée, l'État d'alimentation est activé.
• Mise hors tension : état temporaire entre le mode Activé et
Désactivé. Lorsque l'action est terminée, l'État d'alimentation est
désactivé.
Numéro de
service
Affiche le numéro de service du serveur. Le numéro de service est un
identifiant unique fourni par le fabricant pour le support et la
maintenance. Si le serveur est absent, ce champ est vide.
Tableau 5-25. Informations relatives à la condition de l'ensemble des serveurs (suite)
Élément DescriptionUtilisation de l'interface Web de CMC 141
• Les noms de logements ne doivent pas commencer par les chaînes de
caractères suivantes :
• Switch- (Commutateur-)
• Fan- (Ventilateur-)
• PS-
• KVM
• DRAC-
• MC-
• Chassis (Châssis)
• Housing-Left (Boîtier-Gauche)
• Housing-Right (Boîtier-Droite)
• Housing-Center (Boîtier-Centre)
• Les chaînes de caractères Server-1 à Server-16 peuvent être
utilisées, mais uniquement pour le logement correspondant. Par exemple,
Server-3 est un nom valide pour le logement 3 mais pas pour le
logement 4. Il convient de noter que Server-03 est un nom valide pour
n'importe quel logement.
REMARQUE : pour modifier le nom du logement, vous devez avoir le privilège
d'Administrateur de configuration du châssis.
REMARQUE : la configuration du nom du logement dans l'interface Web réside
uniquement sur CMC. Si un serveur est retiré du châssis, le paramètre du nom du
logement ne s'applique plus au serveur.
REMARQUE : le paramètre du nom du logement n'est pas étendu au module iKVM
optionnel. Les informations du nom du logement sont disponibles via l'unité
remplaçable sur site du module iKVM.
REMARQUE : la configuration du nom d'un logement dans l'interface Web CMC
supplante toujours les modifications apportées au nom d'affichage dans l'interface
iDRAC.
Pour modifier le nom d'un logement :
1 Ouvrez une session sur l'interface Web de CMC.
2 Sélectionnez Présentation des serveurs dans le menu Châssis de
l'arborescence du système.142 Utilisation de l'interface Web de CMC
3 Cliquez sur Configuration→ Noms des logements.
La page Noms des logements s'affiche.
4 Entrez le nom modifié ou le nouveau nom d'un logement dans le champ
Nom de logement. Répétez cette action pour chaque logement que vous
souhaitez renommer, puis cliquez sur Appliquer.
5 Pour restaurer le nom du logement par défaut (de SLOT-01 à SLOT-16,
basé sur la place du logement du serveur) sur le serveur, appuyez sur
Restaurer la valeur par défaut.
Utilisation du nom d'hôte du serveur comme nom de logement
La page Noms des logements permet de remplacer les noms de logements
statiques par le nom d'hôte du serveur (ou nom du système), si disponible.
Pour ce faire, l'agent OMSA doit être installé sur le serveur. Consultez le
Guide d'utilisation de Dell OpenManage Server Administrator pour plus de
détails sur l'agent OMSA.
Pour utiliser le nom d'hôte du serveur en tant que nom de logement :
1 Ouvrez une session sur l'interface Web de CMC.
2 Sélectionnez Présentation des serveurs dans le menu Châssis de
l'arborescence du système.
3 Cliquez sur Configuration→ Noms des logements.
La page Noms des logements s'affiche.
4 Sélectionnez Utiliser le nom d'hôte comme nom de logement, puis
cliquez sur Appliquer.
Définition du premier périphérique d'amorçage pour les serveurs
La page Périphérique de démarrage initial vous permet de spécifier le
périphérique d'amorçage de chaque serveur. Il est possible qu'il ne s'agisse pas
du périphérique d'amorçage initial réel du serveur ou même d'un
périphérique présent dans ce serveur, mais il est utilisé par CMC en tant que
périphérique d'amorçage initial associé à ce serveur.Utilisation de l'interface Web de CMC 143
Vous pouvez définir le périphérique d'amorçage par défaut, mais aussi
indiquer un périphérique d'amorçage qui ne sera utilisé qu'une seule fois pour
démarrer le système à partir d'une image spécifique. Cette image peut vous
permettre, par exemple, d'effectuer des tâches telles que l'exécution de
diagnostics, la réinstallation d'un système d'exploitation, etc.
Le périphérique d'amorçage spécifié doit exister et contenir un support
amorçable.
REMARQUE : pour définir le premier périphérique d'amorçage pour les serveurs,
vous devez avoir des privilèges d'administrateur du serveur ou des privilèges
d'administrateur de configuration du châssis et des privilèges de connexion iDRAC.
Tableau 5-26. Périphériques d'amorçage
Périphérique
d'amorçage
Description
PXE Permet de démarrer à partir d'un protocole PXE (environnement
d'exécution prédémarrage) sur la carte d'interface réseau.
Disque dur Permet de démarrer à partir du disque dur sur le serveur.
CD/DVD local Permet de démarrer à partir d'un lecteur de CD/DVD sur le serveur.
Disquette
virtuelle
Permet de démarrer à partir du lecteur de disquette virtuel. Le
lecteur de disquette (ou l'image d'une disquette) se trouve sur un
autre ordinateur du réseau de gestion et est connecté à l'aide du
visualiseur de console de l'interface utilisateur iDRAC.
CD/DVD virtuel Permet de démarrer à partir d'un lecteur de CD/DVD virtuel ou
d'une image ISO sur CD/DVD. Le lecteur optique ou le fichier de
l'image ISO se trouve sur un autre ordinateur ou un autre disque
disponible sur le réseau de gestion et est connecté à l'aide du
visualiseur de console de l'interface utilisateur d'iDRAC.
iSCSI Permet de démarrer à partir d'un périphérique Internet SCSI
(interface système pour micro-ordinateur).
Carte SD locale Démarrer à partir de la carte locale SD (Secure Digital) :
uniquement pour les serveurs prenant en charge les systèmes
iDRAC6 et iDRAC7.
Disquette Démarrage à partir d'une disquette insérée dans le lecteur local
de disquette.
RFS Démarrer à partir d'une image RFS (Remote File Share).
Le fichier d'image est relié à l'aide de l'affichage de la console
GUI d'iDRAC.144 Utilisation de l'interface Web de CMC
Pour définir le premier périphérique d'amorçage pour certains serveurs ou
pour tous les serveurs du châssis :
1 Ouvrez une session sur l'interface Web de CMC.
2 Cliquez sur Présentation des serveurs dans l'arborescence, puis sur
Configuration→ Périphérique de démarrage initial.
La liste des serveurs apparaît.
3 Sélectionnez le périphérique d'amorçage que vous souhaitez utiliser pour
chaque serveur.
4 Si vous souhaitez que le serveur s'amorce depuis le périphérique
sélectionné à chaque amorçage, décochez la case Démarrer une seule fois
correspondant à ce serveur.
Si vous souhaitez que le serveur s'amorce depuis le périphérique
sélectionné au prochain cycle d'amorçage uniquement, cochez la case
Démarrer une seule fois correspondant à ce serveur, puis cliquez sur
Appliquer.
Affichage de la condition d'intégrité d'un serveur spécifique
Vous pouvez consulter la condition d'intégrité d'un serveur de deux manières :
à partir de la section Graphiques du châssis sur la page Intégrité du châssis
ou sur la page Condition du serveur.
La page Intégrité du châssis fournit une représentation graphique d'un
serveur spécifique installé dans le châssis.
Pour consulter la condition d'intégrité des serveurs à l'aide des graphiques
du châssis :
1 Ouvrez une session sur l'interface Web de CMC.
La page Intégrité du châssis s'affiche. La section située au centre de la
page Graphiques du châssis représente une vue de face du châssis et
contient la condition d'intégrité de tous les serveurs. La condition
d'intégrité du serveur est indiquée par la couleur du sous-graphique
du serveur :
• Aucune couleur : le serveur est présent, sous tension et communique
avec CMC, aucune indication d'événement indésirable.
• Panneau orange : indique que seules des alertes sont émises et que des
mesures correctives doivent être prises. Utilisation de l'interface Web de CMC 145
• Croix rouge : indique qu'au moins une condition de panne est
présente. Cela signifie que CMC peut toujours communiquer avec le
composant et que la condition d'intégrité signalée est critique.
• Grisé : indique que le composant est présent et n'est pas sous tension.
Elle ne communique pas avec CMC et il n'y a aucune indication
d'événement indésirable.
2 Déplacez le curseur pour parcourir un sous-graphique de serveur
individuel.
Une astuce textuelle correspondante est affichée. Le champ textuel
fournit des informations complémentaires sur ce serveur.
3 Cliquez sur le sous-graphique du serveur pour sélectionner les
informations du serveur et afficher les Liens rapides sur la droite des
graphiques du châssis.
La page Condition du serveur (à ne pas confondre avec la page Condition
des serveurs) fournit un aperçu du serveur et un point de lancement d'iDRAC
(micrologiciel utilisé pour gérer le serveur) vers l'interface Web.
REMARQUE : vous devez posséder un nom d'utilisateur et un mot de passe iDRAC
pour utiliser l'interface utilisateur iDRAC. Pour plus d'informations sur iDRAC et
l'utilisation de l'interface Web iDRAC, consultez le Guide d'utilisation du
micrologiciel Integrated Dell Remote Access Controller.
Pour afficher la condition d'intégrité d'un serveur spécifique :
1 Ouvrez une session sur l'interface Web de CMC.
2 Développez Présentation des serveurs dans l'arborescence.
Tous les serveurs (1 à 16) s'affichent dans la liste développée Serveurs.
3 Cliquez sur le (logement de) serveur que vous souhaitez afficher.
La page Condition du serveur s'affiche.146 Utilisation de l'interface Web de CMC
Vous pouvez également consulter la page d'état du serveur en cliquant sur le
lien d'état dans les liens rapides du serveur sur le côté droit de la page.
Tableau 5-27. Condition d'un serveur spécifique : Propriétés
Élément Description
Logement Indique le logement occupé par le serveur sur le châssis. Les
numéros de logement sont des ID séquentiels, qui vont de 1 à 16
(16 logements sont disponibles dans le châssis) et qui permettent
d'identifier l'emplacement du serveur dans le châssis.
Nom du
logement
Indique le nom du logement où réside le serveur.
Présentation Indique si le serveur est présent dans le logement (Oui ou Non).
Lorsque le serveur est absent, l'intégrité, l'état de l'alimentation et le
numéro de service du serveur sont inconnus (ne s'affichent pas).
Intégrité OK Indique que le serveur est présent et qu'il
communique avec CMC. En cas de perte de la
communication entre CMC et le
serveur, CMC ne pourra pas obtenir ni afficher
la condition d'intégrité du serveur.
Informatif Affiche des informations sur les serveurs en
l'absence de modification de l'état de
l'intégrité (OK, Avertissement, Critique).
Avertissement Indique que des alertes d'avertissement seules
ont été émises et que des actions correctives
doivent être effectuées. Si aucune action
corrective n'est effectuée, des pannes critiques
susceptibles d'affecter l'intégrité du serveur
peuvent se produire.
Critique Indique qu'au moins une alerte de panne a été
générée. La condition Critique représente une
panne système du serveur et des actions
correctives doivent être effectuées
immédiatement.
Aucune valeur Lorsque le serveur est absent du logement, les
informations d'intégrité ne sont pas fournies.
Modèle du
serveur
Indique le modèle du serveur qui se trouve dans le châssis.
Exemples : PowerEdge M600, PowerEdge M605.Utilisation de l'interface Web de CMC 147
Numéro de
service
Affiche le numéro de service du serveur. Le numéro de service est
un identifiant unique fourni par le fabricant pour le support et la
maintenance. Si le serveur est absent, ce champ est vide.
Micrologiciel
iDRAC
Indique la version d'iDRAC actuellement installée sur le serveur.
Version du
CPLD
Affiche le numéro de version du circuit logique programmable
complexe (CPLD) du serveur.
Version du
BIOS
Indique la version du BIOS qui se trouve sur le serveur.
Système
d'exploitation
Indique le système d'exploitation installé sur le serveur.
CPU
Information
(Informations
UC)
Affiche le type et le nombre d'UC installées dans le serveur.
Mémoire
système totale
Affiche la mémoire système totale (en GO) installée sur le serveur.
Tableau 5-27. Condition d'un serveur spécifique : Propriétés (suite)
Élément Description148 Utilisation de l'interface Web de CMC
Tableau 5-28. Condition du serveur : journal des événements système iDRAC
Élément Description
Gravité OK Indique un événement
normal qui ne nécessite pas
d'actions correctives.
Informatif Indique une entrée
informative relative à un
événement pour lequel la
condition Gravité n'a pas été
modifiée.
Inconnu Indique un événement
inconnu/non classifié.
Avertissement Indique un événement non
critique pour lequel des
actions correctives doivent
être effectuées rapidement
pour éviter les pannes
système.
Critique Indique un événement
critique nécessitant des
actions correctives
immédiates pour éviter les
pannes système.
Date/Heure Indique la date et l'heure exactes auxquelles
l'événement s'est produit (par exemple, Wed May 02
16:26:55 2007).
Description Fournit une brève description de l'événement
Tableau 5-29. Condition du serveur spécifique : paramètres réseau d'iDRAC
Élément Description
Activé sur le
LAN
Indique si le canal de réseau local est activé (Oui) ou désactivé
(Non).Utilisation de l'interface Web de CMC 149
Tableau 5-30. Condition du serveur : paramètres réseau iDRAC IPv4
Élément Description
Activé Indique si le protocole IPv4 est utilisé sur le réseau local (Oui). Si le
serveur ne prend pas en charge IPv6, le protocole IPv4 est toujours
activé et ce paramètre n'est pas affiché.
DHCP activé Indique si le protocole DHCP (Dynamic Host Configuration
Protocol) est activé (Oui) ou désactivé (Non).
Si cette option est activée (Oui), le serveur récupère
automatiquement la configuration IP (adresse IP, masque de sousréseau et passerelle) auprès d'un serveur DHCP de votre réseau. Le
serveur utilise toujours une adresse IP unique allouée sur votre
réseau.
IPMI sur le
réseau local
activé
Indique si le canal réseau local IPMI est activé (Oui)
ou désactivé (Non).
Adresse IP Indique l'adresse IP de l'interface réseau d'iDRAC.
Masque de
sous-réseau
Indique le masque de sous-réseau de l'interface réseau d'iDRAC.
Passerelle Indique la passerelle de l'interface réseau d'iDRAC.
Tableau 5-31. Condition du serveur : paramètres réseau iDRAC IPv6
Élément Description
Activé Indique si le protocole IPv6 est utilisé sur le réseau local (Oui).
Configuration
automatique
activée
Indique si la configuration automatique pour IPv6 est
activée (Oui).
Si la configuration automatique est activée, le serveur récupère
automatiquement la configuration IPv6 (Adresse IPv6,
Longueur du préfixe et Passerelle IPv6) auprès d'un routeur IPv6
de votre réseau. Le serveur disposera toujours d'une adresse IPv6
unique sur votre réseau et pourra avoir jusqu'à 16 adresses IPv6.
Adresse locale de
liaison
Adresse IPv6 assignée à CMC d'après l'adresse MAC de CMC.
Passerelle Affiche la passerelle IPv6 de l'interface réseau d'iDRAC.150 Utilisation de l'interface Web de CMC
Adresse IPv6 Affiche une adresse IPv6 pour l'interface réseau iDRAC.
Ces adresses peuvent être au nombre de 16 au maximum. La
longueur du préfixe, si elle est différente de zéro, est indiquée
après une barre oblique (« / »).
Tableau 5-32. Condition d'un serveur spécifique : adresse WWN/MAC
Élément Description
Logement Indique le ou les logements occupés par le serveur du châssis.
Emplacement Affiche l'emplacement occupé par les modules d'entrée/sortie.
Les six emplacements sont identifiés par une combinaison du nom
du groupe (A, B ou C) et le numéro de logement (1 ou 2). Les noms
de logement sont les suivants : A1, A2, B1, B2, C1 et C2.
Structure Affiche le type de structure d'E/S.
Attribuée par le
serveur
Affiche les adresses WWN/MAC attribuées par le serveur qui sont
incorporées au matériel du contrôleur. Les adresses WWN/MAC
affichant « - » indiquent que l'interface d'une structure spécifique
n'a pas été installée.
Attribuée par le
châssis
Affiche les adresses WWN/MAC attribuées par le châssis qui sont
utilisées pour ce logement particulier. Les adresses WWN/MAC
affichant « - » indiquent que la fonctionnalité FlexAddress n'a pas
été installée.
REMARQUE : une coche verte dans la colonne Attribuée par le
serveur ou dans la colonne Attribuée par le châssis indique le type
des adresses actives.
REMARQUE : lorsque FlexAddress est activé, les logements sans
serveurs installés affichent l'attribution MAC/WWN attribuée par le
châssis pour les contrôleurs Ethernet incorporés (Structure A). Les
adresses attribuées par le châssis pour les structures B et C affichent
« - », à moins que ces structures soient en cours d'utilisation sur des
serveurs dans les logements occupés. On assume que les mêmes
types de structure seront déployés dans les logements inoccupés.
Tableau 5-31. Condition du serveur : paramètres réseau iDRAC IPv6 (suite)
Élément DescriptionUtilisation de l'interface Web de CMC 151
Pour des informations sur la procédure de lancement de la console de gestion
iDRAC et les stratégies de signature unique, consultez « Lancement d'iDRAC
à l'aide d'une signature unique », à la page 245.
Affichage de la condition d'intégrité des modules d'E/S
Vous pouvez consulter la condition d'intégrité des modules d'E/S de deux
manières : à partir de la section Résumé des composants du châssis sur la
page Intégrité du châssis ou sur la page Condition des modules d'E/S. La
page Intégrité du châssis fournit une représentation graphique des modules
d'E/S installés dans le châssis.
Pour consulter la condition d'intégrité des modules d'E/S à l'aide des
graphiques du châssis :
1 Ouvrez une session sur l'interface Web de CMC.
La page Intégrité du châssis s'affiche. La section située au centre de la
page Graphiques du châssis représente une vue de face du châssis et
contient la condition d'intégrité des modules d'E/S. La condition
d'intégrité des modules d'E/S est indiquée par la couleur du sousgraphique des modules d'E/S :
• Aucune couleur : le composant est présent, sous tension et
communique avec le contrôleur CMC. Il n'existe aucune indication
d'événement indésirable.
• Panneau orange : indique que seules des alertes sont émises et que des
mesures correctives doivent être prises.
• Croix rouge : indique qu'au moins une condition de panne est
présente. Cela signifie que CMC peut toujours communiquer avec le
composant et que la condition d'intégrité signalée est critique.
• Grisé : indique que le module est présent et n'est pas sous tension.
Elle ne communique pas avec CMC et il n'y a aucune indication
d'événement indésirable.
2 Déplacez le curseur pour parcourir un sous-graphique du module d'E/S
individuel.
Une astuce textuelle correspondante est affichée. Le champ textuel
fournit des informations complémentaires sur le module d'E/S.152 Utilisation de l'interface Web de CMC
3 En cliquant sur le sous-graphique du module d'E/S, vous sélectionnez les
informations du module d'E/S et ses Liens rapides pour les afficher à droite
des graphiques du châssis.
La page Condition des modules d'E/S présente l'ensemble des modules d'E/S
associés au châssis. Pour des instructions sur l'affichage de l'intégrité des
modules d'E/S via l'interface Web ou RACADM, voir « Surveillance de
l'intégrité des modules d'E/S », à la page 423.
Affichage de la condition d'intégrité des ventilateurs
REMARQUE : lorsqu'une mise à jour du micrologiciel d'un contrôleur CMC ou d'un
module iDRAC est en cours sur un serveur, une partie ou l'ensemble des unités de
ventilation du châssis fonctionne à 100 %. Ce comportement est normal.
Vous pouvez consulter la condition d'intégrité des modules d'E/S de deux
manières : à partir de la section Résumé des composants du châssis sur la
page Intégrité du châssis ou sur la page Condition des ventilateurs. La page
Intégrité du châssis fournit une représentation graphique de tous les
ventilateurs installés dans le châssis.
Pour consulter la condition d'intégrité des ventilateurs à l'aide des
Graphiques du châssis :
1 Ouvrez une session sur l'interface Web de CMC.
La page Intégrité du châssis s'affiche. La section située au centre de la
page Graphiques du châssis représente une vue arrière du châssis et
contient la condition d'intégrité de tous les ventilateurs. La condition
d'intégrité du ventilateur est indiquée par la couleur du sous-graphique
du ventilateur :
• Aucune couleur : le ventilateur est présent et en cours d'exécution ;
aucune indication d'événement indésirable.
• Panneau orange : indique que seules des alertes sont émises et que des
mesures correctives doivent être prises.
• Croix rouge : indique qu'au moins une condition de panne est
présente. Cela signifie que la condition d'intégrité est signalée comme
critique.
• Grisé : indique que le ventilateur est présent et n'est pas sous tension.
Aucune condition défavorable n'est indiquée.Utilisation de l'interface Web de CMC 153
2 Déplacez le curseur pour survoler un sous-graphique de ventilateur
individuel.
Une astuce textuelle correspondante est affichée. Le champ textuel
fournit des informations complémentaires sur le ventilateur.
3 En cliquant sur le sous-graphique du module d'E/S, vous sélectionnez les
informations du ventilateur et ses Liens rapides pour les afficher à droite
des graphiques du châssis.
La page Condition des ventilateurs fournit la condition et les mesures de
vitesse en tours par minute (tr/min) des ventilateurs du châssis. Celui-ci peut
comporter un ou plusieurs ventilateurs.
CMC, qui contrôle les vitesses des ventilateurs, augmente ou diminue
automatiquement ces dernières sur la base des événements qui surviennent à
l'échelle du système. CMC génère une alerte et augmente les vitesses des
ventilateurs lorsque les événements suivants se produisent :
• Le seuil de température ambiante de CMC est dépassé.
• Un ventilateur est défaillant.
• Un ventilateur est retiré du châssis.
Pour afficher la condition d'intégrité des ventilateurs :
1 Ouvrez une session sur l'interface Web de CMC.
2 Sélectionnez Ventilateurs dans l'arborescence du système.
La page Condition des ventilateurs s'affiche.
Vous pouvez également consulter la page Condition des ventilateurs en
cliquant sur le lien d'état dans les liens rapides des informations du
ventilateur sur le côté droit de la page.
Tableau 5-33. Informations relatives à la condition d'intégrité des ventilateurs
Élément Description
Nom Affiche le nom du ventilateur au format VENTILATEUR-n, où n
correspond au numéro du ventilateur.
Présentation Indique si le ventilateur est présent (Oui ou Non). 154 Utilisation de l'interface Web de CMC
Affichage de la condition d'iKVM
Le module KVM d'accès local destiné à votre châssis de serveur Dell M1000e
est appelé Avocent Integrated KVM Switch Module, soit iKVM. La
condition d'intégrité d'iKVM associé au châssis peut être consultée sur la page
Intégrité du châssis.
Pour consulter la condition d'intégrité d'iKVM à l'aide des graphiques du
châssis :
1 Ouvrez une session sur l'interface Web de CMC.
La page Intégrité du châssis s'affiche. La section inférieure de la page
Graphiques du châssis représente une vue arrière du châssis et contient la
condition d'intégrité d'iKVM. La condition d'intégrité d'iKVM est
indiquée par la couleur du sous-graphique d'iKVM :
• Aucune couleur : iKVM est présent, sous tension et communique avec
le contrôleur CMC. Il n'existe aucune indication d'événement
indésirable.
Intégrité OK Indique que l'unité de ventilateur est présente
et que le ventilateur communique avec CMC.
En cas de perte des communications entre
CMC et l'unité de ventilateur, CMC ne pourra
pas obtenir ni afficher l'état de l'intégrité du
ventilateur.
Critique Indique qu'au moins une alerte de panne a été
générée. La condition Critique indique une
panne du système au niveau du ventilateur
nécessitant une réparation immédiate afin
d'éviter toute surchauffe et/ou arrêt du système.
Inconnu Affiché lorsque le châssis est mis sous tension
pour la première fois. En cas de perte des
communications entre CMC et l'unité de
ventilateur, CMC ne pourra pas obtenir ni
afficher l'état de l'intégrité du ventilateur.
Vitesse Indique la vitesse du ventilateur en tr/min.
Tableau 5-33. Informations relatives à la condition d'intégrité des ventilateurs (suite)
Élément DescriptionUtilisation de l'interface Web de CMC 155
• Panneau orange : indique que seules des alertes sont émises et que des
mesures correctives doivent être prises.
• Croix rouge : indique qu'au moins une condition de panne est
présente. Cela signifie que CMC peut toujours communiquer avec
iKVM et que la condition d'intégrité signalée est critique.
• Grisé : indique que le module iKVM est présent et n'est pas sous
tension. Elle ne communique pas avec CMC et il n'y a aucune
indication d'événement indésirable.
2 Utilisez le curseur pour survoler le sous-graphique iKVM.
Une astuce textuelle correspondante est affichée. Le texte du champ
fournit des informations complémentaires sur cet iKVM.
3 En cliquant sur le sous-graphique d'iKVM, vous sélectionnez les
informations du ventilateur et ses Liens rapides pour les afficher à droite
des graphiques du châssis.
Vous pouvez également consulter la page Condition d'iKVM en cliquant sur
le lien d'état dans les liens rapides des informations du ventilateur sur le côté
droit de la page.
Pour des instructions sur l'affichage de la condition du module iKVM et la
définition de ses propriétés, voir :
• « Affichage de la condition et des propriétés d'iKVM », à la page 408
• « Activation ou désactivation du panneau avant », à la page 407
• « Activation de la console Dell CMC via iKVM », à la page 408
• « Mise à jour du micrologiciel du module iKVM », à la page 410
Pour plus d'informations sur iKVM, voir « Utilisation du module iKVM », à la
page 387.
Affichage de la condition d'intégrité des unités d'alimentation
Vous pouvez consulter la condition d'intégrité des unités d'alimentation de
deux manières : à partir de la section Résumé des composants du châssis de la
page Intégrité du châssis ou de la page Condition du bloc d'alimentation. La
page Intégrité du châssis fournit une représentation graphique de toutes les
unités d'alimentation installées dans le châssis. 156 Utilisation de l'interface Web de CMC
Pour consulter la condition d'intégrité des unités d'alimentation à l'aide des
graphiques du châssis :
1 Ouvrez une session sur l'interface Web de CMC.
La page Intégrité du châssis s'affiche. La section inférieure de la page
Graphiques du châssis représente une vue arrière du châssis et contient la
condition d'intégrité de toutes les unités d'alimentation. L'état d'intégrité
des unités d'alimentation est indiqué par la couleur du sous-graphique
des unités d'alimentation :
• Aucune couleur : unité d'alimentation présente et sous tension qui
communique avec le contrôleur CMC. Il n'existe aucune indication
d'événement indésirable.
• Panneau orange : indique que seules des alertes sont émises et que des
mesures correctives doivent être prises.
• Croix rouge : indique qu'au moins une condition de panne est
présente. Cela signifie que CMC peut toujours communiquer avec
l'unité d'alimentation et que la condition d'intégrité signalée est
critique.
• Grisé : indique que l'unité d'alimentation est présente et n'est pas sous
tension. Elle ne communique pas avec CMC et il n'y a aucune
indication d'événement indésirable.
2 Placez le curseur sur le sous-graphique d'une unité d'alimentation
spécifique pour afficher le champ textuel ou l'info bulle correspondant. Le
champ textuel fournit des informations complémentaires sur l'unité
d'alimentation.
3 En cliquant sur le sous-graphique de l'unité d'alimentation, vous
sélectionnez les informations de celle-ci et ses Liens rapides pour les
afficher à droite des graphiques du châssis.
La page Condition du bloc d'alimentation affiche la condition et les mesures
des unités d'alimentation associées au châssis. Pour plus d'informations sur la
gestion de l'alimentation de CMC, voir « Gestion de l'alimentation », à la
page 335.
Pour afficher la condition d'intégrité des unités d'alimentation :
1 Ouvrez une session sur l'interface Web de CMC.
2 Sélectionnez Blocs d'alimentation dans l'arborescence du système.
La page Condition du bloc d'alimentation s'affiche.Utilisation de l'interface Web de CMC 157
Vous pouvez également consulter la page Condition des unités
d'alimentation en cliquant sur le lien d'état dans les liens rapides des
informations du ventilateur sur le côté droit de la page.
Tableau 5-34. Informations relatives à la condition d'intégrité des blocs d'alimentation
Élément Description
Nom Affiche le nom de l'unité d'alimentation au
format PS-n, où n correspond au numéro du
bloc d'alimentation.
Présentation Indique si le bloc d'alimentation est présent
(oui ou non).
Intégrité OK Indique que l'unité d'alimentation est présente
et qu'elle communique avec CMC. Indique
que l'intégrité de l'unité d'alimentation est
OK. En cas de perte des communications entre
CMC et l'unité de ventilateur, CMC ne pourra
pas obtenir ni afficher l'état de l'intégrité de
l'unité d'alimentation.
Critique Indique que l'unité d'alimentation est en
panne et que l'intégrité est critique. Une
action corrective doit être effectuée
immédiatement. Le non respect de cette
consigne peut entraîner l'arrêt du composant
en raison d'une panne de courant.
Inconnu Affiché lorsque le châssis est mis sous tension
pour la première fois. En cas de perte des
communications entre CMC et l'unité
d'alimentation, CMC ne pourra pas obtenir ni
afficher l'état de l'intégrité de l'unité
d'alimentation.
État de
l'alimentation
Indique l'état de l'alimentation de l'unité
d'alimentation : Connecté, Éteint ou
Logement vide.
Capacité Affiche la capacité d'alimentation en watts.158 Utilisation de l'interface Web de CMC
Affichage de la condition des capteurs de température
La page Condition des capteurs de température affiche l'état et les lectures
des capteurs de température sur le châssis entier (châssis et serveurs).
REMARQUE : La valeur des capteurs de température ne peut pas être modifiée.
Toute modification au-delà du seuil génère une alerte qui affecte la vitesse du
ventilateur. Par exemple, si le capteur de température ambiante de CMC excède le
seuil, la vitesse des ventilateurs du châssis augmente.
Pour afficher la condition d'intégrité des capteurs de température :
1 Ouvrez une session sur l'interface Web de CMC.
2 Sélectionnez Capteurs de température dans l'arborescence du système.
La page Condition des capteurs de température s'affiche.
Tableau 5-35. Condition de la puissance système
Élément Description
Intégrité globale
énergétique
Indique la condition d'intégrité (OK, Non critique, Critique,
Non récupérable, Autre, Inconnu) de la gestion de
l'alimentation pour tout le châssis.
Condition de la
puissance système
Affiche la condition de l'alimentation (Activé, Désactivé,
Mis sous tension, Mis hors tension) du châssis.
Redondance Indique la condition de la redondance des blocs d'alimentation.
Les valeurs sont les suivantes :
Non : les blocs d'alimentation ne sont pas redondants.
Oui : une redondance totale est appliquée.
Tableau 5-36. Informations relatives à la condition d'intégrité des capteurs
de température
Élément Description
ID Affiche l'emplacement du capteur de température.
Name (Nom) Affiche le nom de chaque capteur de température pour le châssis et
les serveurs.
Présentation Indique si le module est présent (Oui) ou absent (Non) dans le
châssis.Utilisation de l'interface Web de CMC 159
Intégrité OK Indique que le module est présent et qu'il
communique avec CMC. En cas de perte de la
communication entre CMC et le
serveur, CMC ne pourra pas obtenir ni afficher
la condition d'intégrité du serveur.
Avertissement Indique que seules des alertes d'avertissement
ont été émises et que des actions correctives
doivent être effectuées. Si aucune action
corrective n'est effectuée, des pannes critiques
susceptibles d'affecter l'intégrité du serveur
peuvent se produire.
Grave Indique qu'au moins une alerte de panne a été
générée. La condition Critique représente une
panne système du module et des actions
correctives doivent être effectuées
immédiatement.
Inconnu Indique que la communication avec le module
n'a pas été établie. C'est généralement parce
que le châssis est éteint ou qu'il n'a pas
terminé l'initialisation.
Lecture Indique la température actuelle en degrés Celsius et Fahrenheit.
Seuil maximal Indique la température la plus élevée, en degrés Celsius et
Fahrenheit, à laquelle une alerte de panne est générée.
Tableau 5-36. Informations relatives à la condition d'intégrité des capteurs
de température (suite)
Élément Description160 Utilisation de l'interface Web de CMC
Affichage de l'état du panneau LCD
Vous pouvez consulter la condition d'intégrité du panneau LCD en utilisant
les graphiques du châssis associés avec le châssis sur la page Intégrité du
châssis.
Pour afficher la condition d'intégrité du panneau LCD :
1 Ouvrez une session sur l'interface Web de CMC.
La page Intégrité du châssis s'affiche. La partie supérieure des graphiques
du châssis représente la façade du châssis. La condition d'intégrité de
l'écran LCD est indiquée par la couleur du sous-graphique du LCD :
• Aucune couleur : le LCD est présent, sous tension, et communique
avec CMC. Aucune indication d'événement indésirable.
• Panneau orange : indique que seules des alertes sont émises et que des
mesures correctives doivent être prises.
• Croix rouge : indique qu'au moins une condition de panne est
présente. La condition d'intégrité est critique.
• Grisé : indique que le LCD est présent et n'est pas sous tension. Il ne
communique pas avec CMC et il n'y a aucune indication d'événement
indésirable.
2 Déplacez le curseur sur le sous-graphique du panneau LCD. L'astuce
textuelle ou à l'écran correspondante, qui fournit des informations
supplémentaires sur le panneau LCD, est affichée.
3 Cliquez sur le sous-graphique LCD pour sélectionner les informations sur
le LCD et les afficher sur le côté droit des graphiques du châssis.Utilisation de l'interface Web de CMC 161
Affichage des ID de nom mondial/Contrôle de
l'accès aux médias (WWN/MAC)
La page Résumé WWN/MAC affiche la configuration WWN et l'adresse
MAC d'un logement présent dans le châssis.
Configuration de la structure
La section Configuration de la structure affiche le type de structure
d'entrée/sortie installée dans les structures A, B et C. Une coche verte indique
que la structure est activée pour FlexAddress. La fonctionnalité FlexAddress
permet le déploiement des adresses WWN/MAC de logement persistantes et
attribuées par le châssis, dans plusieurs structures et plusieurs logements de
ce dernier. Cette fonctionnalité est activée sur une base par structure et par
logement.
REMARQUE : voir « Utilisation de FlexAddress », à la page 263 pour plus
d'informations sur la fonctionnalité FlexAddress.
Adresses WWN/MAC
La section Adresse WWN/MAC affiche les informations des adresses
WWN/MAC qui sont attribuées à tous les serveurs, même si les logements de
serveurs sont actuellement vides. Emplacement : affiche l'emplacement du
logement occupé par les modules d'E/S. Les six logements sont identifiés par
la combinaison d'un nom de groupe (A, B ou C) et d'un numéro de logement
(1 ou 2) : noms des logements A1, A2, B1, B2, C1 ou C2. iDRAC représente le
contrôleur de gestion intégré du serveur. Structure affiche le type de structure
d'E/S. Attribuée par le serveur affiche les adresses WWN/MAC attribuées par
le serveur et incorporées au matériel du contrôleur. Attribuée par le châssis
affiche les adresses WWN/MAC attribuées par le châssis à ce logement
spécifique. Une coche verte dans la colonne Attribuée par le serveur
ou Attribuée par le châssis indique le type des adresses actives. Les adresses
attribuées par le châssis sont attribuées lorsque FlexAddress est activée sur le
châssis et représente les adresses de logement persistantes. Lorsque les
adresses attribuées par le châssis sont cochées, ces adresses seront utilisées
même si un serveur est remplacé par un autre. 162 Utilisation de l'interface Web de CMC
Configuration des propriétés du réseau CMC
REMARQUE : les modifications apportées à la configuration réseau peuvent
entraîner la perte de connectivité pendant la session réseau actuelle.
Configuration de l'accès initial à CMC
Avant de configurer CMC, vous devez configurer les paramètres réseau CMC
afin de permettre la gestion à distance de CMC. Cette configuration initiale
définit les paramètres de mise en réseau TCP/IP qui permettent l'accès à
CMC.
REMARQUE : vous devez disposer de privilèges Administrateur de configuration
du châssis pour configurer les paramètres réseau CMC.
1 Connectez-vous à l'interface Web.
2 Cliquez sur Présentation du châssis dans l'arborescence.
3 Cliquez sur l'onglet Réseau.
La page Configuration réseau s'affiche.
4 Activez ou désactivez DHCP pour CMC en cochant ou en décochant la
case Utiliser DHCP (pour l'adresse IP de l'interface réseau CMC).
5 Si vous avez désactivé le protocole DHCP, entrez l'adresse IP, la passerelle
et le masque de sous-réseau.
6 Cliquez sur Appliquer les changements au bas de la page.Utilisation de l'interface Web de CMC 163
Configuration des paramètres du réseau local
REMARQUE : vous devez disposer de privilèges Administrateur de configuration
du châssis pour configurer les paramètres réseau CMC.
REMARQUE : les paramètres de la page Configuration réseau, tels que la chaîne
de communauté et l'adresse IP du serveur SMTP, affectent à la fois CMC et les
paramètres externes du châssis.
REMARQUE : si vous disposez de deux modules CMC (principal et de secours) sur
le châssis et qu'ils sont tous les deux connectés au réseau, le contrôleur CMC de
secours récupère automatiquement les paramètres réseau en cas de défaillance
du contrôleur CMC principal.
Pour configurer les paramètres LAN du réseau :
1 Connectez-vous à l'interface Web.
2 Cliquez sur l'onglet Réseau.
3 Configurez les paramètres de réseau CMC décrits dans la Figure 5-37 à
dans la Figure 5-39, puis cliquez sur Appliquer les modifications.
Pour configurer les paramètres de plage et de blocage IP, cliquez sur le bouton
Paramètres avancés (voir « Configuration des paramètres de sécurité réseau
CMC », à la page 171).
Pour actualiser le contenu de la page Configuration réseau, cliquez sur
Actualiser.
Pour imprimer le contenu de la page Configuration réseau, cliquez sur
Imprimer.164 Utilisation de l'interface Web de CMC
Tableau 5-37. Paramètres réseau
Paramètre Description
Adresse MAC de
CMC
Affiche l'adresse MAC du châssis, qui est un identificateur
unique du châssis sur le réseau.
Activer l'interface
réseau de CMC
Active l'interface réseau de CMC
Par défaut : activé. Si cette option est cochée :
• CMC est accessible via le réseau d'ordinateurs avec lequel il
communique.
• Les interfaces Web, de ligne de commande (RACADM
distant), WSMAN, Telnet et SSH associées à CMC
sont disponibles.
Si cette option n'est pas cochée :
• L'interface réseau de CMC ne peut pas communiquer sur le
réseau.
• La communication avec le châssis via CMC n'est
pas disponible.
• Les interfaces Web, de ligne de commande (RACADM à
distance), WSMAN, Telnet et SSH associées à CMC ne
sont pas disponibles.
• L'interface Web iDRAC du serveur, l'interface de ligne de
commande locale, les modules d'E/S et iKVM sont toujours
accessibles.
• Les adresses réseau d'iDRAC et de CMC peuvent être
obtenues dans ce cas à partir de l'écran LCD du châssis.
REMARQUE : l'accès aux autres composants du châssis
accessibles via le réseau n'est pas affecté en cas de
désactivation ou de perte du réseau sur le châssis.
Enregistrer CMC
sur DNS
Cette propriété enregistre le nom CMC sur le serveur DNS.
Par défaut : Décoché (désactivé).
REMARQUE : certains serveurs DNS ne peuvent enregistrer que
des noms de 31 caractères maximum. Assurez-vous que le nom
désigné se trouve dans la limite DNS requise. Utilisation de l'interface Web de CMC 165
Nom CMC DNS Affiche le nom CMC uniquement lorsque l'option Enregistrer
CMC sur DNS est sélectionnée. Le nom CMC par défaut est
CMC_numéro_de_service, où numéro de service est le numéro
de service du châssis, par exemple : CMC-00002. Il peut
comporter jusqu'à 63 caractères. Le premier caractère doit être
une lettre (a-z, A-Z) et doit être suivi de caractères
alphanumériques (a-z, A-Z, 0-9) ou de tirets (-).
Utiliser DHCP pour
le nom de domaine
DNS
Utilise le nom de domaine DNS par défaut. Cette case
est active uniquement lorsque l'option Utiliser DHCP (pour
l'adresse IP de l'interface réseau de CMC) est sélectionnée.
Par défaut : activé
Nom de domaine
DNS
Le nom de domaine DNS par défaut est un caractère vide.
Ce champ est modifiable uniquement lorsque la case Utiliser
DHCP pour le nom de domaine DNS est cochée.
Négociation
automatique (1 Go)
Détermine si CMC définit automatiquement le mode duplex
et la vitesse réseau en communicant avec le routeur ou le
commutateur le plus proche (activé) ou vous permet de définir
manuellement le mode duplex et la vitesse réseau (désactivé).
Par défaut : activé.
Si la négociation automatique est activée, CMC communique
automatiquement avec le routeur ou commutateur le plus
proche et fonctionne à une vitesse de 1 Go.
Lorsque l'option Négociation automatique est désactivée,
vous devez définir manuellement le mode duplex et la vitesse
réseau.
Tableau 5-37. Paramètres réseau (suite)
Paramètre Description166 Utilisation de l'interface Web de CMC
Vitesse du réseau Définissez la vitesse réseau sur 100 Mbits/s ou 10 Mbits/s en
fonction de votre environnement réseau.
REMARQUE : le paramètre Vitesse réseau doit correspondre à
votre configuration réseau afin de garantir l'efficacité du débit du
réseau. Si la vitesse réseau que vous paramétrez est inférieure à la
vitesse de votre configuration réseau, la consommation de bande
passante augmente et les communications réseau ralentissent.
Déterminez si votre réseau prend en charge les vitesses réseau
ci-dessus et paramétrez-le en conséquence. Si votre configuration
réseau ne correspond à aucune de ces valeurs, Dell vous
recommande d'utiliser la négociation automatique ou de contacter
le fabricant de votre équipement réseau.
REMARQUE : pour utiliser les vitesses de 1 000 Mo ou 1 Go,
sélectionnez Négociation automatique.
Mode duplex Définissez le mode duplex sur Total ou Semi en fonction de
votre environnement réseau.
Conséquences : si l'option Négociation automatique est
activée pour un périphérique mais non pour l'autre, alors le
périphérique qui utilise la négociation automatique peut
déterminer la vitesse réseau de l'autre périphérique, mais non
le mode duplex. Dans ce cas, le mode duplex utilisé par défaut
pendant la négociation automatique est le mode Semi duplex.
Cette différence de mode duplex entraîne un ralentissement
des connexions réseau.
REMARQUE : les paramètres Vitesse réseau et Mode duplex ne
sont pas disponibles si la négociation automatique est activée.
MTU Définit la taille de l'unité de transmission maximale (MTU) ou
le paquet le plus volumineux pouvant être transmis via l'interface.
Plage de configuration : 576 à 1 500.
Par défaut : 1 500.
REMARQUE : IPv6 requiert une MTU minimale de 1 280. Si IPv6
est activé et que cfgNetTuningMtu est défini sur une valeur
inférieure, CMC utilisera une MTU de 1 280.
Tableau 5-37. Paramètres réseau (suite)
Paramètre DescriptionUtilisation de l'interface Web de CMC 167
Tableau 5-38. Paramètres IPv4
Paramètre Description
Activer IPv4 Permet à CMC d'utiliser le protocole IPv4 pour
communiquer sur le réseau. Le fait de décocher cette case
n'empêche pas la mise en réseau IPv6.
Par défaut : coché (activé).
Activation DHCP Permet à CMC de demander et d'obtenir
automatiquement une adresse IP auprès du serveur DHCP
(protocole de configuration dynamique des hôtes) IPv4.
Par défaut : coché (activé).
Si cette option est cochée, CMC récupère
automatiquement la configuration IPv4 (adresse IP,
masque de sous-réseau et passerelle) auprès d'un serveur
DHCP de votre réseau. CMC utilise toujours une adresse
IP unique allouée sur votre réseau.
REMARQUE : lorsque cette fonctionnalité est activée, les
champs des propriétés Adresse IP statique, Masque de
sous-réseau statique et Passerelle statique (situés
immédiatement après cette option dans la page
Configuration réseau) sont désactivés et toutes les valeurs
précédemment saisies pour ces propriétés sont ignorées.
Si cette option n'est pas cochée, vous devez taper
manuellement l'adresse IP statique, le masque de sousréseau statique et la passerelle statique dans les champs de
texte qui suivent immédiatement cette option sur la page
Configuration réseau.
Adresse IP statique Affiche l'adresse IPv4 de l'interface réseau de CMC.
Masque de sous-réseau
statique
Spécifie le masque de sous-réseau IPv4 statique de
l'interface réseau de CMC. 168 Utilisation de l'interface Web de CMC
Passerelle statique Affiche la passerelle IPv4 de l'interface réseau de CMC.
REMARQUE : les champs Adresse IP statique, Masque de
sous-réseau statique et Passerelle statique sont actifs
uniquement si Activation DHCP (le champ de propriété
précédant ces champs) est désactivé (décoché).
Dans ce cas, vous devez taper manuellement l'adresse IP
statique, le masque de sous-réseau statique et la passerelle
statique pour que CMC puisse les utiliser sur le réseau.
REMARQUE : les champs Adresse IP statique, Masque de
sous-réseau statique et Passerelle statique s'appliquent
uniquement au périphérique du châssis. Ils n'affectent pas
les autres composants de la solution du châssis accessibles
sur le réseau tels que le réseau du serveur, l'accès local, les
modules d'E/S et iKVM.
Utiliser DHCP pour
obtenir des adresses de
serveur DNS
Obtient les adresses de serveur DNS principales et
secondaires du serveur de DHCP au lieu des paramètres
statiques.
Par défaut : coché (activé) par défaut
REMARQUE : si l'option Utiliser DHCP (pour l'adresse IP de
l'interface réseau de CMC) est activée, activez la propriété
Utiliser DHCP pour obtenir des adresses de serveur DNS.
Si cette option est cochée, CMC récupère
automatiquement son adresse IP DNS auprès d'un serveur
DHCP sur votre réseau.
REMARQUE : lorsque cette propriété est activée, les
champs de propriété Serveur DNS statique préféré et Autre
serveur DNS statique (situés immédiatement après cette
option dans la page Configuration réseau) sont désactivés et
toutes les valeurs précédemment entrées pour ces
propriétés sont ignorées.
Si cette option n'est pas sélectionnée, CMC récupère
l'adresse IP DNS auprès du serveur DNS statique préféré
et du serveur DNS statique alternatif. Les adresses de ces
serveurs sont spécifiées dans les champs de texte qui
suivent immédiatement cette option sur la page
Configuration réseau.
Tableau 5-38. Paramètres IPv4 (suite)
Paramètre DescriptionUtilisation de l'interface Web de CMC 169
Serveur DNS statique
préféré
Spécifie l'adresse IP statique du serveur DNS préféré. Le
serveur DNS statique préféré est uniquement mis en
œuvre lorsque l'option Utiliser DHCP pour obtenir des
adresses de serveur DNS est désactivée.
Autre serveur DNS
statique
Spécifie l'adresse IP statique du serveur DNS auxiliaire.
L'autre serveur DNS statique est uniquement mis en
œuvre lorsque l'option Utiliser DHCP pour obtenir des
adresses de serveur DNS est désactivée. Si vous ne
disposez pas d'un serveur DNS alternatif, entrez l'adresse
IP 0.0.0.0.
Tableau 5-39. Paramètres IPv6
Paramètre Description
Activer IPv6 Permet à CMC d'utiliser le protocole IPv6 pour
communiquer sur le réseau. Le fait de décocher cette
case n'empêche pas la mise en réseau IPv4. Par
défaut : coché (activé).
Activation de la
configuration
automatique
Permet à CMC d'utiliser le protocole IPv6 pour obtenir
l'adresse IPv6 et les paramètres de la passerelle auprès d'un
routeur IPv6 configuré pour fournir ces informations. CMC
dispose alors d'une adresse IPv6 unique sur votre réseau.
Par défaut : coché (activé).
REMARQUE : lorsque cette fonctionnalité est activée, les
champs des propriétés Adresse IPv6 statique, Longueur de
préfixe statique et Passerelle statique (situés immédiatement
après cette option dans la page Configuration réseau) sont
désactivés et toutes les valeurs précédemment saisies pour
ces propriétés sont ignorées.
Si cette option n'est pas cochée, vous devez taper
manuellement l'adresse IPv6 statique, la longueur de préfixe
statique et la passerelle statique dans les champs de texte qui
suivent immédiatement cette option sur la page
Configuration réseau.
Adresse IPv6 statique Spécifie l'adresse IPv6 de l'interface réseau de CMC lorsque
la configuration automatique n'est pas activée.
Tableau 5-38. Paramètres IPv4 (suite)
Paramètre Description170 Utilisation de l'interface Web de CMC
Longueur de préfixe
statique
Spécifie la longueur du préfixe IPv6 de l'interface réseau de
CMC lorsque la configuration automatique n'est pas activée.
Passerelle statique Spécifie la passerelle IPv6 statique de l'interface réseau de
CMC lorsque la configuration automatique n'est pas activée.
REMARQUE : les champs Adresse IPv6 statique, Longueur de
préfixe statique et Passerelle statique sont actifs uniquement
si Activer pour l'autoconfiguration (le champ de propriété
précédant ces champs) est désactivé (décoché). Dans ce cas,
vous devez taper manuellement l'adresse IPv6 statique, la
longueur de préfixe statique et la passerelle statique pour que
CMC puisse les utiliser sur le réseau IPv6.
REMARQUE : les champs Adresse IPv6 statique, longueur de
préfixe statique et Passerelle statique s'appliquent uniquement
au périphérique du châssis. Ils n'affectent pas les autres
composants de la solution du châssis accessibles sur le
réseau tels que le réseau du serveur, l'accès local, les modules
d'E/S et iKVM.
Serveur DNS statique
préféré
Spécifie l'adresse IPv6 statique du serveur DNS préféré. Le
serveur DNS statique préféré est uniquement mis en œuvre
lorsque l'option Utiliser DHCP pour obtenir des adresses de
serveur DNS est désactivée ou décochée. Les deux zones de
configuration IPv4 et IPv6 comportent une entrée pour ce
serveur.
Autre serveur DNS
statique
Spécifie l'adresse IPv6 statique du serveur DNS alternatif. Si
vous ne disposez pas d'un serveur DNS alternatif, saisissez
l'adresse IPv6 « :: ». L'entrée du serveur DNS statique
alternatif est uniquement prise en compte lorsque l'option
Utiliser DHCP pour obtenir des adresses de serveur DNS
est désactivée ou décochée. Les deux zones de configuration
IPv4 et IPv6 comportent une entrée pour ce serveur.
Tableau 5-39. Paramètres IPv6 (suite)
Paramètre DescriptionUtilisation de l'interface Web de CMC 171
Configuration des paramètres de sécurité réseau CMC
REMARQUE : pour effectuer les étapes suivantes, vous devez disposer des
privilèges Administrateur de configuration du châssis.
Pour configurer les paramètres de sécurité réseau CMC.
1 Connectez-vous à l'interface Web.
2 Cliquez sur l'onglet Réseau.
La page Configuration réseau s'affiche.
3 Cliquez sur le bouton Paramètres avancés.
La page Sécurité réseau s'affiche.
4 Configurez les paramètres de sécurité réseau CMC.
La Figure 5-40 décrit les paramètres de la page Sécurité réseau.
REMARQUE : les paramètres Plage IP et Blocage IP s'appliquent
uniquement à IPv4.
Tableau 5-40. Paramètres de la page Sécurité réseau
Paramètres Description
Plage IP activée Active la fonctionnalité de vérification de la plage IP, qui
définit une plage d'adresses IP spécifique pouvant accéder
à CMC.
Adresse de la plage IP Détermine l'adresse IP de base pour la vérification de la plage.172 Utilisation de l'interface Web de CMC
Masque de la plage IP Définit une plage d'adresses IP spécifique pouvant accéder
à CMC : ce processus est appelé vérification de la plage IP.
La vérification de la plage IP permet uniquement l'accès à
CMC à partir des clients ou des stations de gestion dont les
adresses IP appartiennent à la plage spécifiée par l'utilisateur.
Toutes les autres ouvertures de session sont refusées.
Par exemple :
Masque de plage IP : 255.255.255.0
(11111111.11111111.11111111.00000000)
Adresse de la plage IP : 192.168.0.255
(11000000.10101000.00000000.11111111)
La plage d'adresses IP résultante correspond à n'importe
quelle adresse contenant 192.168.0, c'est-à-dire toute adresse
comprise entre 192.168.0.0 et 192.168.0.255.
Blocage IP activé Active la fonctionnalité de blocage d'une adresse IP, qui
limite le nombre de tentatives de connexion ayant échoué à
partir d'une adresse IP spécifique pour une durée
présélectionnée.
Nombre d'échecs
avant blocage IP
Définit le nombre d'échecs de tentatives d'ouverture de
session à partir d'une adresse IP avant que les tentatives
d'ouverture de session ne soient rejetées à partir de cette
adresse.
Plage d'échecs avant
blocage IP
Détermine la période, en secondes, pendant laquelle doit se
produire le nombre d'échecs avant blocage IP pour
déclencher la période de pénalité du bloc IP.
Tableau 5-40. Paramètres de la page Sécurité réseau (suite)
Paramètres DescriptionUtilisation de l'interface Web de CMC 173
5 Cliquez sur Appliquer pour enregistrer vos paramètres.
Pour actualiser le contenu de la page Sécurité réseau, cliquez sur Actualiser.
Pour imprimer le contenu de la page Sécurité réseau, cliquez sur Imprimer.
Configuration des réseaux locaux virtuels (VLAN)
Les VLAN sont utilisés pour permettre à plusieurs VLAN de coexister sur le
même câble réseau physique et pour diviser le trafic réseau à des fins de
sécurité ou de gestion de la charge . Lorsque vous activez la fonctionnalité
VLAN, chaque paquet réseau reçoit un numéro VLAN. Pour configurer des
réseaux VLAN :
1 Connectez-vous à l'interface Web.
2 Cliquez sur l'onglet Réseau→ sous-onglet VLAN.
La page Paramètres des numéros VLAN apparaît. Les numéros VLAN
correspondent aux propriétés du châssis. Ils demeurent associés au châssis,
même en cas de retrait d'un composant.
3 Configurez les paramètres VLAN CMC/iDRAC.
Période de pénalité
avant blocage IP
Période en secondes pendant laquelle les tentatives
d'ouverture de session à partir d'une adresse IP avec un
nombre d'échecs excessif sont rejetées.
REMARQUE : les champs Nombre d'échecs avant blocage
d'adresse IP, Plage d'échecs avant blocage d'adresse IP et
Période de pénalité avant blocage d'adresse IP sont actifs
uniquement si la case Blocage d'adresse IP activé (le champ
de propriétés précédant ces champs) est cochée (activée).
Dans ce cas, vous devez saisir manuellement les propriétés
Nombre d'échecs avant blocage d'adresse IP, Plage d'échecs
avant blocage d'adresse IP et Période de pénalité avant
blocage d'adresse IP.
Tableau 5-40. Paramètres de la page Sécurité réseau (suite)
Paramètres Description174 Utilisation de l'interface Web de CMC
La Figure 5-41 décrit les paramètres de la page Sécurité réseau.
4 Cliquez sur Appliquer pour enregistrer les paramètres.
Vous pouvez également accéder à cette page depuis Présentation du
châssis→ Serveurs→ onglet Configuration→ sous-onglet VLAN.
Ajout et configuration d'utilisateurs CMC
Pour gérer votre système avec CMC et maintenir la sécurité du système, créez
des utilisateurs uniques et octroyez-leur des droits d'administration
spécifiques (ou autorité basée sur les rôles). Pour une sécurité supplémentaire,
vous pouvez aussi configurer des alertes qui sont envoyées par e-mail à des
utilisateurs spécifiques quand un événement système spécifique se produit.
Types d'utilisateurs
Il existe deux types d'utilisateurs : les utilisateurs CMC et les utilisateurs
iDRAC. Les utilisateurs CMC sont également appelés « utilisateurs châssis ».
Étant donné qu'iDRAC réside sur le serveur, les utilisateurs iDRAC sont
également appelés « utilisateurs du serveur ».
Tableau 5-41. Paramètres des numéros VLAN
Paramètre Description
Logement Indique le logement occupé par le serveur du châssis. Les
logements sont des ID séquentiels, qui vont de 1 à 16 (pour les
16 logements disponibles dans le châssis), qui permettent
d'identifier l'emplacement du serveur dans le châssis.
Nom Affiche le nom du serveur dans chaque logement.
Activer Active VLAN si la case est cochée. VLAN est désactivé par défaut.
Priorité Indique le niveau de priorité de la trame, qui peut être utilisé pour
établir la priorité des différents types de trafic (voix, vidéo et
données). Les priorités valides sont comprises entre 0 et 7, où 0
(priorité par défaut) correspond à la priorité inférieure et 7 à la
priorité supérieure.
ID Affiche l'ID VLAN (identification). Les ID VLAN valides sont les
suivants : 1 à 4 000 et 4 021 à 4 094. L'ID VLAN par défaut est 1. Utilisation de l'interface Web de CMC 175
Les utilisateurs CMC peuvent être des utilisateurs locaux ou des utilisateurs
Active Directory. Les utilisateurs iDRAC peuvent également être des
utilisateurs locaux ou de service d'annuaire.
Sauf si un utilisateur CMC possède des privilèges administrateur de serveur,
les privilèges octroyés à un utilisateur CMC ne sont pas automatiquement
transférés à ce même utilisateur sur un serveur car les utilisateurs du serveur
sont créés indépendamment des utilisateurs CMC. En d'autres termes, les
utilisateurs CMC Active Directory et les utilisateurs iDRAC Active Directory
résident sur deux branches différentes de l'arborescence Active Directory.
Pour créer un utilisateur local du serveur, l'administrateur de configuration
des utilisateurs doit directement ouvrir une session sur le serveur. Les
utilisateurs de configuration ne peuvent pas créer un utilisateur de serveur
depuis CMC, et vice versa. Cette règle protège la sécurité et l'intégrité
des serveurs.
Tableau 5-42. Types d'utilisateurs
Privilège Description
Ouverture de
session
utilisateur CMC
L'utilisateur peut se connecter à CMC et afficher toutes les
données de CMC, mais ne peut pas ajouter ou modifier des
données ou exécuter des commandes.
Un utilisateur peut posséder d'autres privilèges sans
nécessairement posséder le privilège d'ouverture de session sur
CMC. Cette fonctionnalité est utile lorsqu'un utilisateur n'a
temporairement plus le droit d'ouvrir une session. Lorsque le
privilège d'ouverture de session sur CMC de cet utilisateur est
rétabli, l'utilisateur conserve tous les autres privilèges
précédemment octroyés.176 Utilisation de l'interface Web de CMC
Administrateur
de configuration
du châssis
L'utilisateur peut ajouter ou modifier des données qui :
• Identifient le châssis, telles que le nom du châssis et son
emplacement.
• Sont attribuées spécifiquement au châssis, tel que le mode IP
(statique ou DHCP), l'adresse IP statique, la passerelle statique
et le masque de sous-réseau statique.
• Fournissent des services au châssis, tels que la date et heure, la
mise à jour de micrologiciel et la réinitialisation CMC.
• Sont associées au châssis, par exemple, le nom de logement et la
priorité du logement. Bien que ces propriétés s'appliquent aux
serveurs, ce sont strictement des propriétés du châssis qui
concernent les logements plutôt que les serveurs eux-mêmes.
C'est pourquoi, les noms de logement et les priorités de logement
peuvent être ajoutés ou modifiés, que les serveurs soient présents
dans les logements ou non.
Lorsqu'un serveur est déplacé vers un châssis différent, il hérite du
nom et de la priorité du logement affectés au logement qu'il
occupe dans le nouveau châssis. Le nom et la priorité du logement
précédent restent avec le châssis précédent.
REMARQUE : les utilisateurs de CMC disposant de privilèges
Chassis Configuration Administrator (administrateur de configuration
de châssis) peuvent configurer les paramètres d'alimentation.
Cependant, le privilège Chassis Control Administrator est nécessaire
pour effectuer des opérations d'alimentation de châssis, notamment
la mise sous et hors tension.
Administrateur
de configuration
des utilisateurs
L'utilisateur peut :
• Ajouter un nouvel utilisateur.
• Supprimer un utilisateur existant.
• Modifier le mot de passe d'un utilisateur.
• Modifier les privilèges d'un utilisateur.
• Activer ou désactiver les privilèges d'ouverture de session d'un
utilisateur tout en conservant le nom et les autres privilèges de
l'utilisateur dans la base de données.
Tableau 5-42. Types d'utilisateurs (suite)
Privilège DescriptionUtilisation de l'interface Web de CMC 177
Administrateur
d'effacement des
journaux
L'utilisateur peut effacer le journal matériel et le journal CMC.
Administrateur
et contrôle du
châssis
(Commandes
d'alimentation)
Les utilisateurs CMC qui disposent du privilège Administrateur
privilégié du châssis peuvent effectuer toutes les opérations liées à
l'alimentation : Contrôler les opérations d'alimentation du châssis,
y compris la mise sous tension, la mise hors tension et le cycle
d'alimentation.
REMARQUE : pour configurer des paramètres d'alimentation, le
privilège de Chassis Configuration Administrator est nécessaire.
Tableau 5-42. Types d'utilisateurs (suite)
Privilège Description178 Utilisation de l'interface Web de CMC
Server
Administrator
Ceci est un privilège général : les droits d'administrateur de
serveur sont des droits permanents qui autorisent l'utilisateur
CMC à effectuer des opérations sur n'importe quel serveur présent
dans le châssis.
Lorsqu'un utilisateur doté du privilège d'administrateur du
serveur émet une action à effectuer sur un serveur, le micrologiciel
CMC envoie la commande au serveur cible sans vérifier les
privilèges de cet utilisateur sur le serveur. Autrement dit, les droits
d'administrateur de serveur annulent toute absence de droits
d'administrateur sur le serveur.
Sans les droits d'administrateur de serveur, un utilisateur créé sur
le châssis ne peut exécuter une commande sur un serveur que
lorsque les conditions suivantes sont réunies :
• Le même nom d'utilisateur est utilisé sur le serveur.
• Le même nom d'utilisateur doit avoir exactement le même mot
de passe sur le serveur.
• L'utilisateur doit avoir le droit d'exécuter la commande.
Lorsqu'un utilisateur CMC qui ne dispose pas du privilège
Administrateur de serveur émet une action à effectuer sur un
serveur, CMC envoie une commande au serveur cible
accompagnée du nom de connexion et du mot de passe de
l'utilisateur. Si l'utilisateur n'existe pas sur le serveur ou si le mot
de passe ne correspond pas, l'utilisateur se voit dans l'impossibilité
d'effectuer l'action.
Si l'utilisateur existe sur le serveur cible et si le mot de passe
correspond, le serveur répond avec les privilèges accordés à
l'utilisateur sur le serveur. Selon les privilèges renvoyés par
le serveur, le micrologiciel CMC décide si l'utilisateur a le
droit d'effectuer l'action.
Vous trouverez ci-dessous la liste des privilèges et des actions
serveur auxquels l'administrateur du serveur a droit. Ces droits
sont appliqués uniquement lorsque l'utilisateur du châssis ne
dispose pas de droits d'administration serveur sur le châssis.
Tableau 5-42. Types d'utilisateurs (suite)
Privilège DescriptionUtilisation de l'interface Web de CMC 179
Administrateur
du serveur (suite)
Administrateur de configuration du serveur :
• Définir l'adresse IP
• Définir la passerelle
• Définir le masque de sous-réseau
• Définir le périphérique de démarrage initial
Configurer les utilisateurs :
• Définir le mot de passe racine iDRAC
• Réinitialiser iDRAC
Administrateur de contrôle du serveur :
• Sous tension
• Hors tension
• Cycle d'alimentation
• Arrêt normal
• Redémarrage du serveur
Utilisateur
d'alertes de test
L'utilisateur peut envoyer des messages d'alerte d'essai.
Administrateur
de commandes
de débogage
L'utilisateur peut exécuter des commandes de diagnostic système.
Administrateur
de structure A
L'utilisateur peut définir et configurer le module d'E/S de la
structure A, qui réside dans le logement A1 ou A2 des logements
d'E/S.
Administrateur
de structure B
L'utilisateur peut définir et configurer le module d'E/S de la
structure B, qui réside dans le logement B1 ou B2 des logements
d'E/S.
Administrateur
de structure C
L'utilisateur peut définir et configurer le module d'E/S de la
structure C, qui réside dans le logement C1 ou C2 des logements
d'E/S.
Tableau 5-42. Types d'utilisateurs (suite)
Privilège Description180 Utilisation de l'interface Web de CMC
Les groupes d'utilisateurs CMC fournissent une série de groupes
d'utilisateurs disposant de privilèges préattribués.
REMARQUE : si vous sélectionnez Administrateur, Utilisateur privilégié ou
Utilisateur invité, puis que vous ajoutez ou supprimez un privilège du jeu prédéfini,
le groupe CMC devient automatiquement Personnalisé.
Super utilisateur L'utilisateur a un accès racine à CMC et a des privilèges
d'administrateur de configuration des utilisateurs et de
connexion à l'utilisateur CMC. Seuls les utilisateurs avec des
privilèges Super utilisateur peuvent accorder aux utilisateurs
nouveaux ou existants des privilèges d'Administrateur des
commandes de débogage et de Super utilisateur.
Tableau 5-43. Privilèges de groupe CMC
Groupe d'utilisateurs Privilèges octroyés
Administrateur • Ouverture de session utilisateur CMC
• Administrateur de configuration du châssis
• Administrateur de configuration des utilisateurs
• Administrateur d'effacement des journaux
• Server Administrator
• Utilisateur d'alertes de test
• Administrateur de commandes de débogage
• Administrateur de structure A
• Administrateur de structure B
• Administrateur de structure C
Tableau 5-42. Types d'utilisateurs (suite)
Privilège DescriptionUtilisation de l'interface Web de CMC 181
Utilisateur
privilégié
• Connexion
• Administrateur d'effacement des journaux
• Administrateur et contrôle du châssis
• Server Administrator
• Utilisateur d'alertes de test
• Administrateur de structure A
• Administrateur de structure B
• Administrateur de structure C
Utilisateur invité Connexion
Personnalisé Sélectionnez n'importe quelle combinaison des autorisations
suivantes :
• Ouverture de session utilisateur CMC
• Administrateur de configuration du châssis
• Administrateur de configuration des utilisateurs
• Administrateur d'effacement des journaux
• Administrateur et contrôle du châssis
• Super utilisateur
• Server Administrator
• Utilisateur d'alertes de test
• Administrateur de commandes de débogage
• Administrateur de structure A
• Administrateur de structure B
• Administrateur de structure C
None (Aucune) Aucun droit attribué
Tableau 5-43. Privilèges de groupe CMC (suite)
Groupe d'utilisateurs Privilèges octroyés182 Utilisation de l'interface Web de CMC
Tableau 5-44. Comparaison des privilèges des administrateurs CMC, des utilisateurs
privilégiés et des utilisateurs invités
Privilège défini Droits
d'administrateur
Utilisateur
privilégié
Autorisations
Utilisateur
invité
Autorisations
Ouverture de session utilisateur
CMC
Administrateur de configuration
du châssis
Administrateur de configuration
des utilisateurs
Administrateur d'effacement des
journaux
Administrateur et contrôle du
châssis
Super utilisateur
Server Administrator
Utilisateur d'alertes de test
Administrateur de commandes de
débogage
Administrateur de structure A
Administrateur de structure B
Administrateur de structure CUtilisation de l'interface Web de CMC 183
Ajout et gestion des utilisateurs
À partir des pages Utilisateurs et Configuration utilisateur de l'interface
Web, vous pouvez afficher les informations relatives aux utilisateurs CMC,
ajouter un nouvel utilisateur et modifier les paramètres d'un utilisateur
existant.
Vous pouvez configurer jusqu'à 16 utilisateurs locaux. Si des utilisateurs
supplémentaires sont nécessaires et que votre entreprise utilise Microsoft
Active Directory ou les services LDAP, vous pouvez le configurer pour
permettre l'accès à CMC. La configuration d'Active Directory vous permet
d'ajouter des privilèges d'utilisateur CMC à vos utilisateurs existants dans
votre logiciel Active Directory et de les contrôler, en plus des 16 utilisateurs
locaux. Pour plus d'informations, voir « Utilisation du service d'annuaire
CMC », à la page 285. Pour plus d'informations sur LDAP, consultez la
section « Utilisation de CMC avec les services Lightweight Directory
Access Protocol »
La session de l'utilisateur peut être ouverte via l'interface Web, ou encore via
une session Telnet, série, SSH ou iKVM. Un maximum de 22 sessions actives
(interface Web, Telnet, série, SSH et iKVM, dans n'importe quelle
combinaison) peuvent être partagées par les utilisateurs.
REMARQUE : pour plus de sécurité, il est vivement recommandé de modifier le
mot de passe par défaut du compte root (User 1). Le compte root est le compte
d'administration par défaut fourni avec le contrôleur CMC. Pour modifier le mot de
passe par défaut de ce compte, cliquez sur ID utilisateur 1 afin d'ouvrir la page
Configuration des utilisateurs. L'aide relative à cette page est disponible via le lien
Aide en haut à droite de la page.
Pour ajouter et configurer des utilisateurs CMC :
REMARQUE : vous devez disposer du privilège de configuration des utilisateurs
pour effectuer les étapes suivantes.
1 Connectez-vous à l'interface Web.
2 Cliquez sur l'onglet Authentification utilisateur. La page Utilisateurs
locaux s'affiche, répertoriant l'ID, le nom d'utilisateur, les privilèges CMC
et l'état d'ouverture de session de chaque utilisateur, y compris ceux de
l'utilisateur racine. Aucune information utilisateur n'est affichée pour les
ID utilisateur disponibles pour la configuration.184 Utilisation de l'interface Web de CMC
3 Cliquez sur un numéro d'ID utilisateur disponible. La page Configuration
utilisateur s'affiche.
Pour actualiser le contenu de la page Utilisateurs, cliquez sur Actualiser.
Pour imprimer le contenu de la page Utilisateurs, cliquez sur Imprimer.
4 Sélectionnez les paramètres généraux de l'utilisateur.
Tableau 5-45. décrit les paramètres généraux de configuration d'un nom d'utilisateur
et d'un mot de passe CMC (nouveau ou existant).
Propriété Description
Réf. utilisateur
(lecture seule)
Identifie un utilisateur à l'aide de l'un des 16 nombres séquentiels
prédéfinis utilisés à des fins d'écriture de scripts de l'interface de
ligne de commande. La réf. utilisateur identifie un utilisateur donné
lors de la configuration de cet utilisateur à l'aide de l'outil de
l'interface de ligne de commande (RACADM). Vous ne pouvez pas
modifier la référence utilisateur.
Si vous modifiez des informations d'utilisateur root, ce champ est
statique. Vous ne pouvez pas modifier le nom d'utilisateur root.
Activer
l'utilisateur
Active ou désactive l'accès de l'utilisateur à CMC.
Nom
d'utilisateur
Définit ou affiche le nom d'utilisateur CMC unique correspondant à
l'utilisateur. Ce nom d'utilisateur peut contenir jusqu'à
16 caractères. Les noms d'utilisateur CMC ne peuvent pas contenir
de barres obliques (/) ni de points (.).
REMARQUE : si vous modifiez le nom d'utilisateur, le nouveau nom
apparaît dans l'interface utilisateur lors de la prochaine ouverture de
session. Tout utilisateur qui ouvre une session après l'application du
nouveau nom d'utilisateur pourra immédiatement observer la
modification.
Modifier le
mot de passe
Permet la modification du mot de passe d'un utilisateur existant.
Définissez le nouveau mot de passe dans le champ Nouveau mot
de passe.
La case Modifier le mot de passe ne peut pas être sélectionnée si vous
configurez un nouvel utilisateur. Vous ne pouvez la sélectionner que
lorsque vous modifiez un paramètre utilisateur existant. Utilisation de l'interface Web de CMC 185
5 Affectez l'utilisateur à un groupe d'utilisateurs du contrôleur CMC. La
Figure 5-42 décrit les privilèges utilisateur CMC.
Lorsque vous sélectionnez un privilège utilisateur dans le menu déroulant
CMC Group (Groupe CMC), les privilèges activés (cochés) correspondent
aux paramètres prédéfinis pour ce groupe.
Vous pouvez modifier les privilèges octroyés à un utilisateur en
sélectionnant ou en désélectionnant des cases à cocher. Après avoir
sélectionné un groupe CMC ou défini les privilèges d'un utilisateur,
cliquez sur Appliquer les changements pour que les changements
effectués soient conservés.
Pour actualiser le contenu de la page Configuration utilisateur, cliquez sur
Actualiser.
Pour imprimer le contenu de la page Configuration utilisateur, cliquez sur
Imprimer.
Mot de passe Définit un nouveau mot de passe pour un utilisateur existant.
Pour modifier le mot de passe, vous devez également cocher la
case Modifier le mot de passe. Le mot de passe peut contenir
jusqu'à 20 caractères, qui s'affichent sous forme de points à mesure
de leur saisie.
Confirmer le
mot de passe
Vérifie le mot de passe que vous avez entré dans le champ Nouveau
mot de passe.
REMARQUE : les champs Nouveau mot de passe et Confirmez le
nouveau mot de passe sont modifiables uniquement lorsque vous
(1) configurez un nouvel utilisateur ou que vous (2) modifiez les
paramètres d'un utilisateur existant, et que la case Modifier le mot de
passe est cochée.
Tableau 5-45. décrit les paramètres généraux de configuration d'un nom d'utilisateur
et d'un mot de passe CMC (nouveau ou existant). (suite)
Propriété Description186 Utilisation de l'interface Web de CMC
Configuration et gestion des certificats Microsoft
Active Directory
REMARQUE : vous devez disposer du privilège Administrateur de configuration du
châssis pour configurer les paramètres Active Directory pour CMC.
REMARQUE : pour plus d'informations sur la configuration d'Active Directory et
sur la manière de configurer Active Directory avec le schéma standard ou un
schéma étendu, voir « Utilisation du service d'annuaire CMC », à la page 285.
Vous pouvez utiliser le service Microsoft Active Directory pour configurer
votre logiciel afin de fournir l'accès à CMC. Le service Active Directory vous
permet d'ajouter et de contrôler les privilèges utilisateur CMC de vos
utilisateurs existants.
Pour accéder à la page Menu principal d'Active Directory :
1 Connectez-vous à l'interface Web.
2 Cliquez sur l'onglet Authentification utilisateur, puis cliquez sur le sousonglet Services d'annuaire.
3 Sélectionnez le bouton radio pour Microsoft Active Directory schéma
standard ou schéma étendu. Les tableaux Active Directory s'affichent.
Paramètres communs
Cette section vous permet de configurer et d'afficher les paramètres
communs d'Active Directory pour CMC.
Tableau 5-46. Paramètres communs
Champ Description
Activer Active
Directory
Active la connexion Active Directory sur CMC. Vous devez
installer des certificats SSL pour les serveurs Active Directory
qui sont signés par la même autorité de certificat et les charger
sur CMC. Utilisation de l'interface Web de CMC 187
Activer la
connexion par
carte à puce
Active l'inter-fonctionnement d'Active Directory basé sur
l'authentification Kerberos prise en charge par un plug-in de
navigateur auto-installé et fourni par Dell, et l'utilisation de
carte à puce. Pour activer la carte à puce, cochez la case. Pour
désactiver la carte à puce, décochez la case. Si vous activez la
carte à puce, vous devez également configurer votre poste de
travail client Microsoft Windows pour qu'il opère correctement
avec la fonctionnalité de lecteur de cartes à puce. Cela implique
d'installer les pilotes appropriés pour le lecteur de cartes à puce
et ceux pour la carte à puce actuellement utilisée. Les pilotes de
carte à puce varient selon les fournisseurs. La carte à puce doit
être correctement programmée avec les autorisations
nécessaires en utilisant les services d'inscription de carte à puce
fournis par le serveur Active Directory adéquat.
REMARQUE : la connexion par carte à puce et la connexion
directe s'excluent mutuellement. Vous ne pouvez en configurer
qu'une seule à la fois.
Activer la
connexion directe
Permet à CMC d'utiliser Active Directory. Pour activer la
connexion directe, cochez la case. Pour désactiver la connexion
directe, décochez la case. Si vous activez la connexion directe,
vous devez également définir les propriétés Active Directory et
sélectionner le schéma que vous souhaitez utiliser.
REMARQUE : la connexion par carte à puce et la connexion
directe s'excluent mutuellement. Vous ne pouvez en configurer
qu'une seule à la fois.
Tableau 5-46. Paramètres communs (suite)
Champ Description188 Utilisation de l'interface Web de CMC
Activer la
validation de
certificat SSL
Permet la validation de certificat SSL pour la connexion SSL
Active Directory de CMC. Pour désactiver la validation du
certificat SSL, décochez la case.
PRÉCAUTION : en désactivant cette fonctionnalité, vous
exposez l'authentification à une attaque de l'homme du milieu
(MITM).
Pour que le navigateur fonctionne correctement, il faut que
CMC soit accessible via une URL HTTP qui contient une
adresse de domaine pleinement qualifiée pour CMC, à savoir
http://cmc-6g2wxf1.dom.net. Une adresse IP simple pour CMC
n'entraîne pas un bon fonctionnement de la connexion directe.
Pour prendre en charge les adresses de domaine pleinement
qualifiées, il est nécessaire d'enregistrer CMC auprès du service
de nom de domaine du serveur Active Directory.
Si l'authentification de navigateur à connexion directe est
infructueuse, la méthode d'authentification locale et habituelle
du navigateur par nom d'utilisateur / mot de passe est
automatiquement présentée. De même, après une connexion
directe réussie la méthode nom d'utilisateur / mot de passe est
proposée lors d'une action de déconnexion. La connexion
directe est destinée à être pratique, et non pas restrictive.
REMARQUE : l'authentification du navigateur basée sur carte à
puce ne fonctionne que pour les clients Microsoft Windows et
Internet Explorer.
Le plug-in de navigateur auto-installé et fourni par Dell
(ActiveX control) est dépendant du système d'exploitation
Microsoft Windows ayant le composant d'exécution suivant pré-
installé : Microsoft Visual C++ 2005 Redistributable Package
(x86). Le lien suivant peut aider à trouver le composant :
microsoft.com/downloads/details.aspx?FamilyID=
32BC1BEE-A3F9-4C13-9C99-220B62A191EE&displaylang=
en. Le client Windows nécessite des privilèges élevés pour
installer avec succès le contrôle ActiveX. De même, la
configuration du navigateur doit pouvoir accepter l'installation
des contrôles ActiveX non signés.
Tableau 5-46. Paramètres communs (suite)
Champ DescriptionUtilisation de l'interface Web de CMC 189
L'activation de la carte à puce applique une politique
d'authentification du navigateur par carte à puce uniquement.
Les autres méthodes d'authentification du navigateur telles que
l'authentification locale ou Active Directory par nom
d'utilisateur / mot de passe sont limitées. Si la politique
d'application de l'authentification par carte à puce uniquement
est adoptée, il est important que l'opération de la carte à puce
soit entièrement validée avant que les autres méthodes d'accès
à CMC soient désactivées. Dans le cas contraire, l'accès à CMC
peut être verrouillé par inadvertance.
Nom de domaine
racine
Spécifie le nom de domaine utilisé par Active Directory. Le
nom de domaine racine est le nom de domaine racine
entièrement qualifié pour la forêt.
REMARQUE : le nom de domaine racine doit être un nom de
domaine valide qui respecte la convention d'attribution des noms
x.y, où x est une chaîne de 1 à 256 caractères ASCII non séparés
par des espaces, et où y est un type de domaine valide tel que
com, edu, gov, int, mil, net ou org.
Délai d'attente AD Définit le délai en secondes après lequel une session Active
Directory inactive est automatiquement fermée.
Valeurs valides : 15 300 secondes
Par défaut : 90 secondes
Spécifier le serveur
AD à rechercher
(facultatif)
Active (si coché) l'appel dirigé vers le contrôleur de domaine et
le catalogue global. Si vous activez cette option, vous devez
également spécifier les emplacements du contrôleur de
domaine et du catalogue global dans les paramètres suivants.
REMARQUE : le nom apparaissant sur le certificat d'autorité de
certification d'Active Directory n'est pas comparé au serveur
Active Directory ou au serveur du catalogue global spécifié.
Contrôleur de
domaine
Spécifie le serveur où votre service Active Directory est installé.
Cette option n'est valide que si Spécifier le serveur AD à
rechercher (facultatif) est activé.
Tableau 5-46. Paramètres communs (suite)
Champ Description190 Utilisation de l'interface Web de CMC
Paramètres du schéma standard
Les paramètres du schéma standard s'affichent lorsque l'option Microsoft
Active Directory (Standard Schema) est sélectionnée. Cette section décrit
tous les groupes de rôles déjà configurés et leurs noms, domaines et
droits associés.
Pour modifier les paramètres d'un groupe de rôles, cliquez sur son numéro
dans la liste Groupes de rôles.
REMARQUE : si vous cliquez sur le lien d'un groupe de rôles avant d'avoir
appliqué les nouveaux paramètres que vous avez définis, ces derniers seront
perdus. Afin d'éviter la perte de tout nouveau paramètre, cliquez sur Appliquer
avant de cliquer sur le bouton d'un groupe de rôles.
La page Configurer le groupe de rôles s'affiche.
• Nom du groupe : nom qui identifie le groupe de rôles dans l'Active
Directory associé à la carte CMC.
• Domaine du groupe : domaine où se situe le groupe.
• Privilèges de groupe : niveau de privilège du groupe.
Cliquez sur Appliquer pour enregistrer les paramètres.
Cliquez sur Retourner à la page Configuration pour retourner à la page
Services d'annuaire.
Pour actualiser le contenu de la page Services d'annuaire, cliquez sur Actualiser.
Pour imprimer le contenu de la page Services d'annuaire, cliquez sur Imprimer.
Catalogue global Spécifie l'emplacement du catalogue global sur le contrôleur de
domaine d'Active Directory. Le catalogue global fournit une
ressource pour rechercher une forêt Active Directory.
Cette option n'est valide que si Spécifier le serveur AD à
rechercher (facultatif) est activé.
Tableau 5-46. Paramètres communs (suite)
Champ DescriptionUtilisation de l'interface Web de CMC 191
Paramètres du schéma étendu
Ces paramètres du schéma étendu dotés des propriétés suivantes s'affichent
lorsque l'option Microsoft Active Directory (Extended Schema) est
sélectionnée :
• Nom du dispositif CMC : affiche le nom de l'objet de dispositif RAC que
vous avez créé pour CMC. Le nom du dispositif CMC identifie de
manière unique la carte CMC dans Active Directory. Le nom du dispositif
CMC doit être identique au nom courant du nouvel objet de dispositif
RAC que vous avez créé dans votre contrôleur de domaine. Le nom de
CMC doit être une chaîne de 1 à 256 caractères ASCII, sans espace entre
les caractères.
• Nom de domaine CMC : affiche le nom DNS (chaîne) du domaine où
l'objet de dispositif RAC d'Active Directory réside. Le nom de domaine de
CMC doit être un nom de domaine valide composé de x.y, où x est une
chaîne de 1 à 256 caractères ASCII sans espace entre les caractères et y est
un type de domaine valide comme com, edu, gov, int, mil ou org.
Gestion des certificats Active Directory
Cette section affiche les propriétés du certificat Active Directory récemment
transféré à CMC. Si vous avez téléversé un certificat, utilisez ces informations
pour vérifier que le certificat est valide et n'a pas expiré.
REMARQUE : par défaut, CMC ne dispose pas d'un certificat de serveur délivré
par une autorité de certification pour Active Directory. Vous devez téléverser un
certificat de serveur valide, signé par une autorité de certification.
Les propriétés suivantes sont affichées pour le certificat :
• Numéro de série : numéro de série du certificat.
• Informations sur le sujet : sujet du certificat (nom de la personne ou de
l'entreprise certifiée).
• Renseignements sur l'émetteur : émetteur du certificat (nom de l'autorité
de certification).
• Valide à partir de : la date de début du certificat.
• Valide jusqu'à : la date d'expiration du certificat.192 Utilisation de l'interface Web de CMC
Utilisez les commandes ci-dessous pour téléverser et télécharger ce certificat :
• Téléverser : lance le processus de téléversement du certificat. Ce certificat,
qui vous est délivré par Active Directory, permet d'accéder à CMC.
• Télécharger : lance le processus de téléchargement. Vous êtes invité à
choisir un emplacement où enregistrer le fichier. Lorsque vous
sélectionnez cette option et cliquez sur Suivant, la boîte de dialogue
Téléchargement de fichier apparaît. Utilisez cette boîte de dialogue pour
spécifier l'emplacement réservé au certificat de serveur sur votre station de
gestion ou réseau partagé.
REMARQUE : par défaut, CMC ne dispose pas d'un certificat de serveur délivré
par une autorité de certification pour Active Directory. Vous devez téléverser un
certificat de serveur valide, signé par une autorité de certification.
Fichier Keytab Kerberos
Vous pouvez téléverser un fichier keytab Kerberos généré sur le serveur Active
Directory associé. Vous pouvez générer le fichier keytab Kerberos depuis le
serveur Active Directory en exécutant l'utilitaire ktpass.exe. Ce fichier keytab
établit une relation de confiance entre le serveur Active Directory Server
et CMC.
REMARQUE : CMC ne dispose pas d'un fichier keytab Kerberos pour Active
Directory. Vous devez téléverser un fichier keytab Kerberos généré. Pour plus
d'informations, voir « Configuration de la connexion directe », à la page 316.
Les actions suivantes sont autorisées :
• Parcourir : ouvre une boîte de dialogue Parcourir, depuis laquelle vous
sélectionnez le certificat de serveur que vous souhaitez téléverser.
• Téléverser : lance le processus de téléchargement du certificat en utilisant
le chemin du fichier que vous spécifiez. Utilisation de l'interface Web de CMC 193
Configuration et gestion des services LDAP
génériques
Vous pouvez utiliser le service LDAP (Lightweight Directory Access Protocol)
générique pour configurer votre logiciel afin qu'il fournisse l'accès à CMC. Le
service LDAP vous permet d'ajouter et de contrôler les privilèges utilisateur
CMC de vos utilisateurs existants.
REMARQUE : vous devez disposer du privilège Administrateur de configuration du
châssis pour configurer les paramètres Active Directory pour CMC.
Pour afficher et configurer LDAP :
1 Connectez-vous à l'interface Web.
2 Cliquez sur l'onglet Authentification utilisateur, puis cliquez sur le sousonglet Services d'annuaire. La page Services d'annuaire s'affiche.
3 Cliquez sur le bouton radio associé au LDAP générique.
4 Configurez les options affichées et cliquez sur Appliquer.
La Figure 5-47 répertorie les options de configuration disponibles.
Tableau 5-47. Paramètres communs
Paramètre Description
LDAP générique
activé
Active le service LDAP générique sur CMC.
Utilisez le nom unique
(DN) pour rechercher
l'appartenance au
groupe.
Spécifie le nom unique (DN) de groupes LDAP dont les
membres sont autorisés à accéder au dispositif.
Activer la validation de
certificat SSL
Si activé, CMC utilise le certificat d'une autorité de
certification pour valider le certificat du serveur LDAP
pendant l'établissement de liaisons SSL.
Liaison de DN Le nom unique d'un utilisateur utilisé pour établir la liaison
au serveur lors de la recherche du nom unique de l'utilisateur
d'ouverture de session. S'il n'est pas fourni, une liaison
anonyme est utilisée.194 Utilisation de l'interface Web de CMC
Mot de passe Mot de passe de liaison à utiliser conjointement avec le nom
unique de liaison.
REMARQUE : le mot de passe de liaison contient des données
sensibles et doit être protégé de manière appropriée.
Nom unique de base à
rechercher
Nom unique de la branche du répertoire à partir duquel
toutes les recherches doivent débuter.
Attribut de
l'identifiant de
l'utilisateur
Spécifie l'attribut à rechercher. S'il n'est pas configuré, uid est
utilisé par défaut. Il est recommandé qu'il soit unique dans le
DN de base choisi, faute de quoi un filtre de recherche doit
être configuré pour assurer l'unicité de l'utilisateur
d'ouverture de session. Si le DN d'utilisateur ne peut pas être
identifié par la recherche de la combinaison de l'attribut et
du filtre de recherche, la connexion échoue avec une erreur.
Attribut de
l'appartenance au
groupe.
Spécifie l'attribut LDAP qui est utilisé pour vérifier
l'appartenance au groupe. Il doit s'agir d'un attribut de la
classe de groupe. S'il n'est pas spécifié, les attributs member
et unique member sont utilisés.
Filtre de recherche Indique un filtre de recherche LDAP valide. Ceci est utilisé si
l'attribut d'utilisateur ne parvient pas à identifier de manière
unique l'utilisateur d'ouverture de session dans le nom
unique de base choisi. S'il n'est pas spécifié, la valeur est
définie par défaut sur (objectClass=*), qui recherche tous les
objets de l'arborescence. La longueur maximale de cette
propriété est de 1 024 caractères.
Délai d'attente réseau
(secondes)
Définit le délai en secondes après lequel une session LDAP
inactive est automatiquement fermée.
Délai d'attente de
recherche (secondes)
Définit le délai en secondes après lequel une recherche est
automatiquement fermée.
Tableau 5-47. Paramètres communs (suite)
Paramètre DescriptionUtilisation de l'interface Web de CMC 195
Sélection de vos serveurs LDAP
Vous pouvez configurer le serveur pour une utilisation avec le LDAP
générique de deux façons. Les serveurs statiques permettent à
l'administrateur de mettre un nom de domaine pleinement qualifié ou une
adresse IP dans le champ. Par ailleurs, une liste de serveurs LDAP peut être
récupérée en recherchant leur enregistrement SRV dans le DNS. Les éléments
suivants sont les propriétés de la section Serveurs LDAP :
• Utiliser les serveurs LDAP statiques : lorsque vous sélectionnez cette
option, le service LDAP utilise les serveurs spécifiés avec le numéro de port
fourni (voir les détails ci-dessous).
REMARQUE : vous devez sélectionner Statique ou DNS.
• Adresse de serveur LDAP : préciser le nom de domaine pleinement qualifié
ou l'adresse IP du serveur LDAP. Pour spécifier plusieurs serveurs LDAP
redondants qui desservent le même domaine, fournissez la liste de tous les
serveurs séparés par des virgules. CMC tente de se connecter à chaque
serveur l'un après l'autre jusqu'à ce qu'une connexion soit établie.
• Port de serveur LDAP : port de LDAP sur SSL, par défaut 636 s'il n'est pas
configuré. Le port non SSL n'est pas pris en charge dans la version 3.0 de
CMC puisque le mot de passe ne peut être transporté sans SSL.
• Utiliser le DNS pour trouver des serveurs LDAP : lorsque vous
sélectionnez cette option, LDAP utilise le domaine de la recherche et le
nom du service via DNS. Vous devez sélectionner Statique ou DNS.
La requête DNS suivante est effectuée pour les enregistrements SRV :
_[Service Name]._tcp.[Search Domain]
où est le domaine racine à utiliser dans la requête et
est le nom du service à utiliser dans la requête. Par
exemple :
_ldap._tcp.dell.com
où ldap est le nom de service et dell.com est le domaine de recherche.196 Utilisation de l'interface Web de CMC
Gestion des paramètres de groupe LDAP
Le tableau qui figure dans la section Paramètres du groupe répertorie les
groupes de rôles et affiche les noms, domaines et privilèges associés des
groupes de rôles qui sont déjà configurés.
• Pour configurer un nouveau groupe de rôles, cliquez sur un nom de groupe
de rôles qui n'a pas de nom, de domaine et de privilège dans la liste.
• Pour modifier les paramètres d'un groupe de rôles existant, cliquez sur le
nom de groupe de rôles.
Lorsque vous cliquez sur un nom de groupe de rôles, la page Configurer le
groupe de rôles s'affiche. L'aide relative à cette page est disponible via le lien
Aide en haut à droite de la page.
Gestion des certificats de sécurité LDAP
Cette section affiche les propriétés du certificat LDAP récemment téléversé
sur CMC. Si vous avez téléversé un certificat, utilisez ces informations pour
vérifier que le certificat est valide et n'a pas expiré.
REMARQUE : par défaut, CMC ne dispose pas d'un certificat de serveur délivré
par une autorité de certification pour Active Directory. Vous devez téléverser un
certificat de serveur valide, signé par une autorité de certification.
Les propriétés suivantes sont affichées pour le certificat :
• Numéro de série : numéro de série du certificat.
• Informations sur le sujet : sujet du certificat (nom de la personne ou de
l'entreprise certifiée).
• Informations sur l'émetteur : émetteur du certificat (nom de l'autorité de
certification).
• Valide à partir de : la date de début du certificat.
• Valide jusqu'à : la date d'expiration du certificat.Utilisation de l'interface Web de CMC 197
Utilisez les commandes ci-dessous pour téléverser et télécharger ce certificat :
• Téléverser : lance le processus de téléversement du certificat. Ce certificat,
qui vous est délivré par votre serveur LDAP, permet d'accéder à CMC.
• Télécharger : lance le processus de téléchargement. Vous êtes invité à
choisir un emplacement où enregistrer le fichier. Lorsque vous
sélectionnez cette option et cliquez sur Suivant, la boîte de dialogue
Téléchargement de fichier apparaît. Utilisez cette boîte de dialogue pour
spécifier l'emplacement réservé au certificat de serveur sur votre station de
gestion ou réseau partagé.
Sécurisation des communications CMC à l'aide
de certificats SSL et numériques
Cette sous-section fournit des informations sur les fonctionnalités de sécurité
des données suivantes qui sont intégrées dans CMC :
• « Secure Sockets Layer (SSL) », à la page 197.
• « Requête de signature de certificat (RSC) », à la page 198.
• « Accès au menu principal SSL », à la page 199.
• « Génération d'une nouvelle requête de signature de certificat », à la
page 199.
• « Téléversement d'un certificat de serveur », à la page 203.
• « Téléverser une clé de serveur Web et un certificat », à la page 203.
• « Affichage d'un certificat de serveur », à la page 204.
Secure Sockets Layer (SSL)
CMC utilise Web Server, un serveur configuré pour utiliser le protocole de
sécurité SSL standard de l'industrie afin de transférer des données cryptées
sur Internet. Basé sur la technologie de cryptage à clé publique et à clé privée,
SSL est une technique très répandue permettant une communication
authentifiée et cryptée entre les clients et les serveurs afin d'empêcher toute
écoute indiscrète sur un réseau. 198 Utilisation de l'interface Web de CMC
Le protocole SSL permet à un système compatible SSL d'effectuer les tâches
suivantes :
• S'authentifier sur un client activé SSL.
• Permettre au client de s'authentifier sur le serveur.
• Permettre aux deux systèmes d'établir une connexion cryptée.
Ce processus de cryptage fournit un haut niveau de protection des données.
CMC applique la norme de cryptage SSL à 128 bits, qui est la forme la plus
fiable de cryptage généralement disponible pour les navigateurs Internet en
Amérique du Nord.
CMC Web Server inclut un certificat numérique SSL Dell auto-signé (la
référence serveur). Pour garantir un haut niveau de sécurité sur Internet,
remplacez le certificat SSL de serveur Web en envoyant une requête à CMC
pour générer une nouvelle requête de signature de certificat (RSC).
Requête de signature de certificat (RSC)
Une RSC est une requête numérique auprès d'une autorité de certification en
vue de l'obtention d'un certificat de sécurité serveur. Les certificats de serveur
sécurisé garantissent l'identité d'un système distant et assurent que les
informations échangées avec le système distant ne peuvent être ni affichées,
ni modifiées par d'autres. Pour garantir la sécurité de CMC, il est fortement
recommandé de générer une RSC, de l'envoyer à une autorité de certification
et de téléverser le certificat qu'elle vous renvoie.
Une autorité de certification est une entité commerciale reconnue dans
l'industrie de l'informatique pour ses critères élevés en matière de dépistage et
d'identification fiables et d'autres critères de sécurité importants. Thawte et
VeriSign sont des exemples d'AC. Une fois que l'autorité de certification
reçoit votre RSC, elle examine et vérifie les informations qu'elle contient. Si
le demandeur répond aux normes de sécurité de l'autorité de certification,
celle-ci émet un certificat qui identifie ce demandeur de manière unique
pour les transactions effectuées sur des réseaux et sur Internet.
Une fois que l'autorité de certification approuve la RSC et qu'elle vous envoie
un certificat, vous devez téléverser le certificat sur le micrologiciel CMC. Les
informations de la RSC stockées sur le micrologiciel CMC doivent
correspondre aux informations du certificat.Utilisation de l'interface Web de CMC 199
Accès au menu principal SSL
REMARQUE : vous devez disposer du privilège Administrateur de configuration du
châssis pour configurer les paramètres SSL pour CMC.
REMARQUE : les certificats de serveur que vous téléversez doivent être valides
(ils ne doivent pas avoir expiré) et signés par une autorité de certification.
Pour accéder au menu principal SSL :
1 Connectez-vous à l'interface Web.
2 Cliquez sur l'onglet Réseau, puis sur le sous-onglet SSL. La page Menu
principal SSL s'affiche.
Utilisez les options de la page Menu principal SSL pour générer une RSC à
envoyer à une autorité de certification. Les informations de la RSC sont
stockées dans le micrologiciel CMC.
Génération d'une nouvelle requête de signature de certificat
Pour des raisons de sécurité, Dell vous recommande vivement d'obtenir et de
téléverser un certificat de serveur sécurisé sur CMC. Les certificats de serveur
sécurisé vérifient l'identité d'un système distant et garantissent que les
informations échangées avec le système distant ne peuvent être ni affichées ni
modifiées par d'autres personnes. Sans certificat de serveur sécurisé, CMC est
vulnérable aux accès par les utilisateurs non autorisés.
Tableau 5-48. Options du menu principal SSL
Champ Description
Générer une nouvelle
requête de signature de
certificat (RSC)
Sélectionnez cette option, puis cliquez sur Suivant pour
ouvrir la page Générer la requête de signature de certificat
(RSC), sur laquelle vous pouvez générer une RSC à envoyer
à une autorité de certification afin de demander un
certificat Web sécurisé.
REMARQUE : chaque nouvelle SRC supplante la RSC
qui se trouve déjà sur le micrologiciel. Pour qu'une autorité
de certification accepte votre RSC, la RSC de CMC doit
correspondre au certificat renvoyé par l'autorité de
certification.200 Utilisation de l'interface Web de CMC
Pour obtenir un certificat de serveur sécurisé pour CMC, vous devez envoyer
une requête de signature de certificat (RSC) à l'autorité de certification de
votre choix. Une RSC est une requête numérique de certificat de serveur
sécurisé signé contenant des informations sur votre compagnie et une clé
d'identification unique.
Lorsqu'une RSC est générée depuis la page Générer une requête de signature
de certificat (RSC), vous êtes invité à en enregistrer une copie sur votre
station de gestion ou votre réseau partagé, et les informations uniques
utilisées pour générer la RSC sont stockées sur CMC. Ces informations sont
utilisées par la suite pour authentifier le certificat de serveur que vous recevez
de l'autorité de certification. Après avoir reçu le certificat de serveur de
l'autorité de certification, vous devez ensuite le téléverser sur CMC.
Téléverser le certificat
de serveur basé sur la
RSC générée
Sélectionnez cette option, puis cliquez sur Suivant pour
ouvrir la page Téléversement d'un certificat sur laquelle
vous pouvez téléverser un certificat existant auquel votre
société est autorisée à accéder et qu'elle utilise pour
contrôler l'accès à CMC.
REMARQUE : CMC accepte uniquement les certificats X509,
encodés en base 64. Les certificats encodés DER ne sont pas
acceptés. Si vous téléversez un nouveau certificat, il remplace
le certificat par défaut que vous avez reçu avec CMC.
Téléverser une clé de
serveur Web et un
certificat
Sélectionnez cette option, puis cliquez sur Suivant pour
ouvrir la page Téléversement d'une clé et d'un certificat de
serveur Web sur laquelle vous pouvez téléverser une clé de
serveur Web et un certificat de serveur existants auxquels
votre société est autorisée à accéder et qu'elle utilise pour
contrôler l'accès à CMC.
REMARQUE : CMC accepte uniquement les certificats X.509
encodés en base 64. Les certificats binaires encodés DER ne
sont pas acceptés. Si vous téléversez un nouveau certificat, il
remplace le certificat par défaut que vous avez reçu avec CMC.
Afficher le certificat de
serveur
Sélectionnez l'option, puis cliquez sur le bouton Suivant
pour ouvrir la page Afficher le certificat de serveur sur
laquelle vous pouvez visualiser le certificat du serveur actuel.
Tableau 5-48. Options du menu principal SSL (suite)
Champ DescriptionUtilisation de l'interface Web de CMC 201
REMARQUE : pour que CMC puisse accepter le certificat de serveur renvoyé par
l'autorité de certification, les informations d'authentification contenues dans le
nouveau certificat doivent correspondre aux informations stockées sur CMC lors
de la génération de la RSC.
PRÉCAUTION : lorsqu'une nouvelle RSC est générée, elle remplace les RSC
existant déjà sur CMC. Si une RSC en attente est écrasée avant la délivrance de
son certificat de serveur par une autorité de certification, CMC n'acceptera pas le
certificat de serveur car les informations qu'il utilise pour authentifier le certificat
auront été perdues. Soyez vigilant lorsque vous générez une RSC afin d'éviter de
remplacer les RSC en attente.
Pour générer une RSC :
1 Sur la page Menu principal SSL, sélectionnez Générer une nouvelle
requête de signature de certificat (RSC), puis cliquez sur Suivant. La
page Générer une requête de signature de certificat (RSC) s'affiche.
2 Entrez une valeur pour chaque attribut de la RSC.
3 Cliquez sur Générer. La boîte de dialogue Téléchargement de fichier
apparaît.
4 Enregistrez le fichier csr.txt sur votre station de gestion ou votre réseau
partagé. (Vous pouvez également ouvrir le fichier et l'enregistrer
ultérieurement). Vous soumettrez ensuite ce fichier à une autorité de
certification.
Tableau 5-49. Options de la page Générer une requête de signature de certificat (RSC)
Champ Description
Nom commun Nom exact à certifier (généralement le nom de domaine du
serveur Web, par exemple, www.compagniexyz.com).
Sont valides : les caractères alphanumériques (A-Z, a-z, 0-9), les
traits d'union, les traits de soulignement et les points.
Ne sont pas valides : les caractères non-alphanumériques non
repris ci-dessus (notamment @ # $ % & *) et les caractères
utilisés principalement dans d'autres langues que l'anglais tels
que ß, å, é, ü.202 Utilisation de l'interface Web de CMC
Nom de
l'organisation
Nom associé à votre entreprise (par exemple : entreprise XYZ).
Sont valides : les caractères alphanumériques (A-Z, a-z, 0-9), les
traits d'union, les traits de soulignement, les points et les
espaces.
Ne sont pas valides : les caractères non alphanumériques non
repris ci-dessus (notamment @ # $ % & *).
Unité
organisationnelle
Nom associé à une unité organisationnelle, comme un service
(par exemple : groupe de l'entreprise).
Sont valides : les caractères alphanumériques (A-Z, a-z, 0-9), les
traits d'union, les traits de soulignement, les points et les
espaces.
Ne sont pas valides : les caractères non alphanumériques non
repris ci-dessus (notamment @ # $ % & *).
Ville Ville ou autre emplacement de votre compagnie (par
exemple : Marseille, Montréal).
Sont valides : les caractères alphanumériques (A-Z, a-z, 0-9) et
les espaces.
Ne sont pas valides : les caractères non alphanumériques non
repris ci-dessus (notamment @ # $ % & *).
État État, province ou territoire où se trouve l'entité qui demande la
certification (par exemple : Texas, Québec, Bouches-duRhône).
REMARQUE : n'utilisez pas d'abréviations.
Sont valides : les caractères alphanumériques (lettres en
majuscules et en minuscules, 0-9) et les espaces.
Ne sont pas valides : les caractères non alphanumériques non
repris ci-dessus (notamment @ # $ % & *).
Pays Pays où se trouve la compagnie qui demande la certification.
E-mail Adresse de messagerie de votre compagnie. Entrez l'adresse de
messagerie que vous souhaitez associer à la RSC. L'adresse de
messagerie doit être valide et contenir le symbole @ (par
exemple, nom@compagniexyz.com).
REMARQUE : cette adresse de messagerie est facultative.
Tableau 5-49. Options de la page Générer une requête de signature de certificat (RSC)
Champ DescriptionUtilisation de l'interface Web de CMC 203
Téléversement d'un certificat de serveur
Pour téléverser un certificat de serveur :
1 Sur la page Menu principal SSL, sélectionnez Téléverser le certificat de
serveur basé sur RSC généré, puis cliquez sur Suivant. La page
Téléversement d'un certificat s'affiche.
2 Entrez le chemin du fichier dans le champ de texte ou cliquez sur
Parcourir pour sélectionner le fichier.
3 Cliquez sur Appliquer. Si le certificat n'est pas valide, un message d'erreur
s'affiche.
REMARQUE : la valeur Chemin du fichier affiche le chemin de fichier relatif du
certificat que vous téléversez. Vous devez taper le chemin de fichier absolu, y
compris le chemin et le nom de fichier complets et l'extension du fichier.
Pour actualiser le contenu de la page Téléversement d'un certificat, cliquez sur
Actualiser.
Pour imprimer le contenu de la page Téléversement d'un certificat, cliquez sur
Imprimer.
Téléverser une clé de serveur Web et un certificat
Pour téléverser une clé de serveur Web et un certificat :
1 Sélectionnez Téléverser une clé de serveur Web et un certificat, puis
cliquez sur Suivant.
2 Entrez le fichier de clé privée en utilisant le menu de navigation.
3 Sélectionnez un fichier de certificat en utilisant le menu de navigation.
4 Quand les deux fichiers sont téléchargés, cliquez sur Appliquer. Si la clé
du serveur Web et le certificat ne correspondent pas, un message d'erreur
s'affiche.
REMARQUE : CMC accepte uniquement les certificats X509, encodés en base 64.
Les certificats qui utilisent d'autres schémas de codage tels que DER ne sont pas
acceptés. Si vous téléversez un nouveau certificat, il remplace le certificat par
défaut que vous avez reçu avec CMC.
REMARQUE : pour téléverser une clé de serveur Web et un certificat de serveur,
vous devez avoir des privilèges d'administrateur de configuration du châssis.
REMARQUE : après le chargement du micrologiciel, CMC est réinitialisé et devient
temporairement indisponible. Pour éviter de déconnecter d'autres utilisateurs au
cours d'une réinitialisation, avertissez les utilisateurs autorisés susceptibles de se
connecter à CMC et recherchez les sessions actives affichées dans la page
Sessions sous l'onglet Réseau.204 Utilisation de l'interface Web de CMC
Affichage d'un certificat de serveur
Sur la page Menu principal SSL, sélectionnez Afficher le certificat de
serveur, puis cliquez sur Suivant. La page Afficher le certificat de serveur
s'affiche.
La Figure 5-50 décrit les champs et les descriptions associées énumérés dans
la fenêtre Certificat.
Pour actualiser le contenu de la page Afficher le certificat de serveur, cliquez
sur Actualiser.
Pour imprimer le contenu de la page Afficher le certificat de serveur, cliquez
sur Imprimer.
Gestion des sessions
La page Sessions affiche toutes les instances en cours des connexions au
châssis et vous permet de mettre fin à une session active.
REMARQUE : pour terminer une session, vous devez disposer du privilège
Administrateur de configuration du châssis.
Pour gérer ou fermer une session :
1 Ouvrez une session sur CMC via le Web.
2 Cliquez sur l'onglet Réseau, puis sur le sous-onglet Sessions.
3 Sur la page Sessions, localisez la session que vous souhaitez terminer,
puis cliquez sur le bouton approprié. La Figure 5-51 affiche les propriétés
des sessions.
Tableau 5-50. Informations relatives au certificat
Champ Description
Série Numéro de série du certificat.
Objet Attributs du certificat saisis par le sujet.
Émetteur Attributs du certificat renvoyés par l'émetteur.
Pas avant Date d'émission du certificat
Pas après Date d'expiration du certificatUtilisation de l'interface Web de CMC 205
Configuration des services
CMC se sert de Web Server, un serveur configuré pour utiliser le protocole de
sécurité SSL standard de l'industrie afin d'accepter et de transférer les
données cryptées depuis et vers des clients sur Internet. Web Server
comprend un certificat numérique SSL auto-signé Dell (référence serveur) et
est chargé d'accepter et de répondre aux requêtes HTTP sécurisées émanant
des clients. Ce service est requis par l'interface Web et l'outil CLI distant pour
communiquer avec CMC.
REMARQUE : l'outil CLI distant (RACADM) et l'interface Web utilisent Web Server.
Dans l'éventualité où Web Server n'est pas actif, RACADM distant et l'interface
Web ne sont pas utilisables.
REMARQUE : en cas de réinitialisation de Web Server, patientez au moins une
minute pour que les services soient de nouveau disponibles. La réinitialisation du
serveur Web se produit généralement suite à l'un des événements suivants : la
configuration réseau ou les propriétés de sécurité réseau ont été modifiées via
l'interface utilisateur Web CMC ou RACADM ; la configuration du port de serveur
Web a été modifiée via l'interface utilisateur Web ou RACADM ; CMC a
été réinitialisé ou un nouveau certificat de serveur SSL a été téléversé.
REMARQUE : pour modifier les paramètres des services, vous devez disposer du
privilège Administrateur de configuration du châssis.
Tableau 5-51. Propriétés des sessions
Propriété Description
Nº de session Affiche le numéro d'identification généré séquentiellement pour
chaque instance d'ouverture de session.
Nom
d'utilisateur
Affiche le nom d'ouverture de session de l'utilisateur (utilisateur
local ou utilisateur Active Directory). Des exemples de noms
d'utilisateur Active Directory sont nom@domaine.com,
domaine.com/nom, domaine.com\nom.
Adresse IP Affiche l'adresse IP de l'utilisateur.
Type de session Décrit le type de session : Telnet, série, SSH, RACADM distant,
SMASH CLP, WSMAN ou d'interface utilisateur graphique.
Fermer Vous permet de fermer les sessions répertoriées, à l'exception de la
vôtre. Pour mettre fin à la session associée, cliquez sur le bouton.
Cette colonne est affichée uniquement si vous disposez du
privilège Administrateur de configuration du châssis.206 Utilisation de l'interface Web de CMC
Pour configurer les services CMC :
1 Ouvrez une session sur l'interface Web de CMC.
2 Cliquez sur l'onglet Réseau.
3 Cliquez sur le sous-onglet Services. La page Services s'affiche.
4 Configurez les services suivants, si nécessaire :
• Console série CMC (Figure 5-52)
• Server Web (Figure 5-53)
• SSH (Figure 5-54)
• Telnet (Figure 5-55)
• RACADM distant (Figure 5-56)
• SNMP (Figure 5-57)
• Syslog distant (Figure 5-58)
5 Cliquez sur Appliquer pour mettre à jour l'ensemble des délais par défaut,
ainsi que les délais maximaux.
Tableau 5-52. Paramètres de la console série CMC
Paramètre Description
Activé Active l'interface de la console Telnet sur CMC.
Par défaut : décoché (désactivé)
Redirection activée Active la redirection de la console série/texte vers le serveur
via votre client série/Telnet/SSH à partir de CMC. CMC se
connecte à iDRAC qui, de façon interne, se connecte
au port COM2 du serveur.
Options de configuration : coché (activé),
décoché (désactivé)
Par défaut : coché (activé).Utilisation de l'interface Web de CMC 207
Délai d'attente en cas
d'inactivité
Indique le nombre de secondes s'écoulant avant la
déconnexion automatique d'une session série inactive. La
modification du paramètre Délai d'attente prend effet à la
prochaine ouverture de session. Elle n'affecte pas la session
en cours.
Plage du délai d'attente : de 0 ou 60 à 10 800 secondes. Pour
désactiver la fonctionnalité du délai d'attente, entrez 0.
Par défaut : 1 800 secondes.
Baud Rate
(Débit en bauds)
Indique la vitesse des données sur le port série externe
de CMC.
Options de configuration : 9 600, 19 200, 28 800, 38 400,
57 600 et 115 200 b/s.
Par défaut : 115 200 b/s
Authentification
désactivée
Permet l'authentification de l'ouverture de session de la
console série de CMC.
Par défaut : décoché (désactivé)
Tableau 5-52. Paramètres de la console série CMC (suite)
Paramètre Description208 Utilisation de l'interface Web de CMC
Touche Échap Vous permet de spécifier la séquence d'échappement qui
met fin à la redirection de la console série/texte lorsque
vous utilisez la commande connect ou racadm connect.
Par défaut : ^\
(maintenir la touche enfoncée et taper une barre
oblique inverse (\))
REMARQUE : l'accent circonflexe représente la touche
.
Options de configuration :
• valeur décimale (par exemple : 95)
• valeur hexadécimale (par exemple : 0x12)
• valeur octale (par exemple : 007)
• valeur ASCII (par exemple : ^a)
Les valeurs ASCII peuvent être représentées à l'aide des
codes suivants de touches d'échappement :
• Échap suivi par un caractère alphabétique (a-z, A-Z)
• Échap suivi par les caractères spéciaux suivants : [ ] \ ^ _
• Longueur maximale autorisée : 4
Taille de la mémoire
tampon de l'historique
Indique la taille maximale de l'historique du tampon, qui
contient les derniers caractères inscrits dans la console série.
Par défaut : 8 192 caractères
Commande d'ouverture
de session
Spécifie la commande série qui est exécutée
automatiquement lorsqu'un utilisateur ouvre une session
sur l'interface de la console série de CMC.
Exemple : connect server-1
Par défaut : [Null]
Tableau 5-52. Paramètres de la console série CMC (suite)
Paramètre DescriptionUtilisation de l'interface Web de CMC 209
Tableau 5-53. Paramètres du serveur Web
Paramètre Description
Activé Active les services de Web Server (accès via distante
RACADM distant et l'interface Web) pour CMC.
Par défaut : coché (activé)
Nombre maximal de
sessions
Indique le nombre maximal de sessions d'interface
utilisateur Web simultanées autorisées pour le châssis. La
modification de la propriété Nombre maximal de sessions
prend effet à l'ouverture de session suivante. Elle n'affecte
pas les sessions actives ouvertes (y compris la vôtre).
RACADM à distance n'est pas affecté par la propriété
Nombre maximal de sessions de Web Server.
Plage autorisée : 1 à 4
Par défaut : 4
REMARQUE : si vous définissez la propriété Nombre
maximal de sessions sur une valeur inférieure au nombre
actuel de sessions actives et que vous fermez ensuite la
session, vous ne pourrez pas ouvrir de session avant la
fermeture ou l'expiration des autres sessions.
Délai d'attente en cas
d'inactivité
Indique le nombre de secondes avant qu'une session
d'interface utilisateur Web inactive soit automatiquement
déconnectée. La modification du paramètre Délai d'attente
prend effet à la prochaine ouverture de session. Elle
n'affecte pas la session en cours.
Plage du délai d'attente : 60 à 10 800 secondes.
Par défaut : 1 800 secondes.210 Utilisation de l'interface Web de CMC
Numéro de port HTTP Indique le port par défaut utilisé par CMC pour écouter
une connexion de serveur.
REMARQUE : lorsque vous indiquez l'adresse HTTP dans le
navigateur, Web Server la redirige automatiquement et utilise
HTTPS.
Si le numéro de port HTTP par défaut (80) a été modifié,
vous devez inclure le numéro de port dans l'adresse du
champ d'adresse du navigateur, comme indiqué ci-dessous :
http://:
où adresse IP correspond à l'adresse IP du châssis et numéro
de port représente le numéro de port HTTP autre que le
numéro par défaut (80).
Plage de configuration : 10 à 65 535
Par défaut : 80
Numéro de port
HTTPS
Affiche le port par défaut utilisé par CMC pour écouter une
connexion de serveur sécurisée.
Si le numéro de port HTTPS par défaut (443) a été changé,
vous devez inclure le numéro de port dans l'adresse du
champ d'adresse du navigateur, comme indiqué ci-dessous :
https://:
où correspond à l'adresse IP du châssis et
numéro de port représente le numéro de port HTTP autre
que le numéro par défaut (80).
Plage de configuration : 10 à 65 535
Par défaut : 443
Tableau 5-53. Paramètres du serveur Web (suite)
Paramètre DescriptionUtilisation de l'interface Web de CMC 211
Tableau 5-54. Paramètres SSH
Paramètre Description
Activé Permet d'utiliser SSH sur CMC.
Par défaut : coché (activé)
Nombre maximal de
sessions
Le nombre maximal de sessions SSH simultanées autorisées
pour le châssis. La modification de cette propriété prend
effet à la prochaine ouverture de session. Elle n'affecte pas
les sessions actives ouvertes (y compris la vôtre).
Plage de configuration : 1 à 4
Par défaut : 4
REMARQUE : si vous définissez la propriété Nombre
maximal de sessions sur une valeur inférieure au nombre
actuel de sessions actives et que vous fermez ensuite la
session, vous ne pourrez pas ouvrir de session avant la
fermeture ou l'expiration des autres sessions.
Délai d'attente en cas
d'inactivité
Indique le nombre de secondes s'écoulant avant la
déconnexion automatique d'une session SSH inactive. La
modification du paramètre Délai d'attente prend effet à la
prochaine ouverture de session. Elle n'affecte pas la session
en cours.
Plage du délai d'attente : 0 ou 60 à 10 800 secondes. Pour
désactiver la fonctionnalité du délai d'attente, entrez 0.
Par défaut : 1 800 secondes.
Numéro de port Port utilisé par CMC pour écouter une connexion de
serveur.
Plage de configuration : 10 à 65 535
Par défaut : 22 212 Utilisation de l'interface Web de CMC
Tableau 5-55. Paramètres Telnet
Paramètre Description
Activé Active l'interface de la console Telnet sur CMC.
Par défaut : décoché (désactivé)
Nombre maximal de
sessions
Le nombre maximal de sessions Telnet simultanées
autorisées pour le châssis. La modification de cette propriété
prend effet à la prochaine ouverture de session. Elle n'affecte
pas les sessions actives ouvertes (y compris la vôtre).
Plage autorisée : 1 à 4
Par défaut : 4
REMARQUE : si vous définissez la propriété Nombre
maximal de sessions sur une valeur inférieure au nombre
actuel de sessions actives et que vous fermez ensuite la
session, vous ne pourrez pas ouvrir de session avant la
fermeture ou l'expiration des autres sessions.
Délai d'attente en cas
d'inactivité
Indique le nombre de secondes s'écoulant avant la
déconnexion automatique d'une session Telnet inactive. La
modification du paramètre Délai d'attente prend effet à la
prochaine ouverture de session. Elle n'affecte pas la session
en cours.
Plage du délai d'attente : 0 ou 60 à 10 800 secondes. Pour
désactiver la fonctionnalité du délai d'attente, entrez 0.
Par défaut : 1 800 secondes.
Numéro de port Indique le port par défaut utilisé par CMC pour écouter
une connexion de serveur.
Par défaut : 23Utilisation de l'interface Web de CMC 213
Tableau 5-56. Paramètres de RACADM distant
Paramètre Description
Activé Permet à l'utilitaire RACADM distant d'accéder à CMC.
Par défaut : coché (activé)
Nombre maximal de
sessions
Le nombre maximal de sessions RACADM simultanées
autorisées pour le châssis. La modification de cette
propriété prend effet à la prochaine ouverture de session.
Elle n'affecte pas les sessions actives ouvertes (y compris la
vôtre).
Plage autorisée : 1 à 4
Par défaut : 4
REMARQUE : si vous définissez la propriété Nombre
maximal de sessions sur une valeur inférieure au nombre
actuel de sessions actives et que vous fermez ensuite la
session, vous ne pourrez pas ouvrir de session avant la
fermeture ou l'expiration des autres sessions.
Délai d'attente en cas
d'inactivité
Indique le nombre de secondes s'écoulant avant la
déconnexion automatique d'une session racadm inactive.
Toute modification du paramètre Délai d'attente en cas
d'inactivité sera effective à la prochaine ouverture de
session ; elle n'aura aucune incidence sur la session actuelle.
Pour désactiver la fonctionnalité Délai d'attente en cas
d'inactivité, entrez 0.
Plage du délai d'attente : 0 ou 10 à 1 920 secondes. Pour
désactiver la fonctionnalité du délai d'attente, entrez 0.
Par défaut : 30 secondes
Tableau 5-57. Configuration SNMP
Paramètre Description
Activé Active SNMP sur CMC.
Valeurs valides : coché (activé), décoché (désactivé)
Par défaut : décoché (désactivé)
Nom de communauté Indique la chaîne de communauté utilisée pour obtenir des
données du démon SNMP de CMC.214 Utilisation de l'interface Web de CMC
Configuration des bilans de puissance
CMC vous permet d'établir un bilan de puissance et de gérer l'alimentation
du châssis. Le service de gestion de l'alimentation optimise la puissance
consommée et réaffecte l'alimentation aux différents modules en fonction de
la demande.
Pour des instructions sur la configuration de l'alimentation via CMC, voir
« Configuration et gestion de l'alimentation », à la page 358.
Pour plus d'informations sur le service de gestion de l'alimentation de CMC,
voir « Gestion de l'alimentation », à la page 335.
Tableau 5-58. Configuration de Syslog distant
Paramètre Description
Activé Permet la transmission et la capture à distance des entrées
du journal de CMC et du journal du matériel au(x)
serveur(s) spécifié(s).
Valeurs valides : coché (activé), décoché (désactivé)
Par défaut : décoché (désactivé)
Serveur Syslog 1 Le premier des trois serveurs possibles qui hébergera une
copie des entrées du journal de CMC et du journal du
matériel. Spécifié sous la forme d'un nom d'hôte, d'une
adresse IPv6 ou d'une adresse IPv4.
Serveur Syslog 2 Le deuxième des trois serveurs possibles qui hébergera une
copie des entrées du journal de CMC et du journal du
matériel. Spécifié sous la forme d'un nom d'hôte, d'une
adresse IPv6 ou d'une adresse IPv4.
Serveur Syslog 3 Le troisième des trois serveurs possibles qui hébergera une
copie des entrées du journal de CMC et du journal du
matériel. Spécifié sous la forme d'un nom d'hôte, d'une
adresse IPv6 ou d'une adresse IPv4.
Numéro de port Syslog Spécifie le numéro de port sur le serveur distant pour
recevoir une copie des entrées du journal de CMC et du
journal du matériel. Le même numéro de port est utilisé
pour les trois serveurs. Un numéro de port syslog valide est
compris entre 10 et 65 535.
Par défaut : 514Utilisation de l'interface Web de CMC 215
Gestion des mises à jour du micrologiciel
Cette section décrit la manière de mettre à jour un progiciel sur les
composants de châssis et de serveur à l'aide de l'interface GUI et de l'utilitaire
RACADM.
Vous pouvez mettre à jour les composants suivants à l'aide de l'interface GUI
et de RACADM. Dans l'interface GUI, vous pouvez effectuer la mise à jour en
utilisant les pages Présentation du châssis→ Mettre à jour ou Chassis
Controller→ Mettre à jour :
• CMC : principal et secondaire
• iKVM
• iDRAC : les iDRAC du progiciel iDRAC antérieurs à iDRAC6 doivent être
mis à jour à l'aide de l'interface de récupération. iDRAC6 FW peut
également être mis à jour avec l'interface de récupération, mais est
déprécié dans iDRAC6 et versions ultérieures.
• Périphériques d'infrastructure du module d'E/S
La page Présentation du serveur→ Mises à jour de l'interface GUI vous
permet de mettre à jour les composants suivants.
• iDRAC
• BIOS
• Unified Server Configurator
• Diagnostics 32 bits
• Paquet de pilotes du SE
• Contrôleurs d'interface réseau (NIC)
• Contrôleurs RAID
Les mises à jour de progiciel de composant de serveur sont effectuées à l'aide
du service Lifecycle Controller disponible sur iDRAC. Le Lifecycle Controller
prend en charge les images progicielles au format DUP (Dell Update
Package). La configuration CMC par défaut limite la taille du DUP à 48Mo.
Le DUP de composant du progiciel OS-Driver dépasse cette limite et doit
être mis à jour séparément à l'aide de la fonction Stockage étendu). Pour plus
d'informations, voir « Mise à jour du micrologiciel des composants du serveur
à l'aide du Lifecycle Controller », à la page 224.216 Utilisation de l'interface Web de CMC
Lors de la mise à jour du micrologiciel, il convient de suivre la procédure
recommandée, qui permet de prévenir une perte du service en cas d'échec de
la mise à jour. Pour les instructions à suivre, voir « Installation ou mise à jour
du micrologiciel du module CMC », à la page 54.
Affichage des versions actuelles du micrologiciel
La page Mise à jour affiche la version actuelle de tous les châssis de
composants actualisables. Peuvent être inclus : le micrologiciel iKVM, le
micrologiciel du contrôleur CMC principal et, le cas échéant, le micrologiciel
du contrôleur CMC de secours, le micrologiciel iDRAC et le micrologiciel de
périphérique d'infrastructure du module d'E/S. Pour plus d'informations, voir
« Mise à jour du micrologiciel du périphérique d'infrastructure du module
d'E/S », à la page 221.
Pour afficher les composants du châssis pouvant être mis à jour :
1 Connectez-vous à l'interface Web. Pour plus d'informations, voir « Accès à
l'interface Web CMC », à la page 111.
2 Cliquez sur Présentation du châssis dans l'arborescence.
REMARQUE : sinon, cliquez sur Contrôleur du châssis dans l'arborescence
du système.
3 Cliquez sur l'onglet Update (Mise à jour). La page Mise à jour du
micrologiciel s'affiche.
Pour afficher les composants de serveur actualisables :
1 Connectez-vous à l'interface Web. Pour plus d'informations, voir « Accès à
l'interface Web CMC », à la page 111.
2 Cliquez sur Présentation des serveurs dans l'arborescence.
3 Cliquez sur l'onglet Mettre à jour. La Mise à jour du composant du
serveur s'affiche.
Pour ouvrir une page de mise à jour pour certains dispositifs :
1 Cliquez sur le nom du périphérique ou sélectionnez l'option Sélectionner /
Désélectionner tout.
2 Cliquez sur Appliquer la mise à jour.
Une page de mise à jour des dispositifs sélectionnés s'affiche. Utilisation de l'interface Web de CMC 217
Si le châssis renferme un serveur de génération antérieure avec iDRAC en
mode de récupération ou si CMC détecte que le micrologiciel de l'iDRAC est
endommagé, alors le module iDRAC de génération antérieure est également
répertorié dans la page Mise à jour du micrologiciel. Voir « Restauration du
micrologiciel iDRAC à l'aide de CMC », à la page 223 pour les étapes à suivre
afin de récupérer le micrologiciel iDRAC à l'aide de CMC.
Mise à jour du micrologiciel
REMARQUE : pour mettre à jour le micrologiciel sur CMC, vous devez disposer du
privilège Administrateur de configuration du châssis.
REMARQUE : la mise à jour de micrologiciel conserve les paramètres CMC et
iKVM actuels.
REMARQUE : si une session de l'interface utilisateur Web est utilisée pour mettre
à jour le micrologiciel d'un composant système, le paramètre Délai d'attente en cas
d'inactivité doit être supérieur au délai de transfert du fichier. Dans certains cas, le
transfert du fichier du micrologiciel peut prendre jusqu'à 30 minutes. Pour définir la
valeur Délai d'attente en cas d'inactivité, voir « Configuration des services », à la
page 205.
La page Mise à jour du micrologiciel affiche la version actuelle du
micrologiciel pour chaque composant répertorié et vous permet de mettre à
jour le micrologiciel à la dernière révision.
Pour mettre à jour les micrologiciels des périphériques, procédez comme suit :
1 Sélectionnez les périphériques à mettre à jour.
2 Cliquez sur le bouton Appliquer sous le groupement.
3 Cliquez sur Parcourir pour sélectionner l'image du micrologiciel.
4 Cliquez sur Commencer la mise à jour de micrologiciel pour démarrer le
processus de mise à jour. Le message Transfert en cours de l'image de
fichier s'affiche, suivi d'une page d'état de l'avancement.
REMARQUE : vérifiez que vous disposez de la dernière version du micrologiciel.
Vous pouvez télécharger la dernière version du fichier image du micrologiciel sur le
site Web du support de Dell à l'adresse support.dell.com.218 Utilisation de l'interface Web de CMC
Mise à jour du micrologiciel du contrôleur CMC
REMARQUE : lorsqu'une mise à jour du micrologiciel d'un contrôleur CMC ou d'un
module iDRAC est en cours sur un serveur, une partie ou l'ensemble des unités de
ventilation du châssis fonctionne à 100 %. Ce comportement est normal.
REMARQUE : une fois le micrologiciel correctement téléversé, le CMC actif se
réinitialise et devient temporairement indisponible. Si un contrôleur CMC
secondaire est présent, les rôles de CMC principal et secondaire permutent. Le
contrôleur CMC secondaire devient le contrôleur CMC principal. Si une mise à jour
est appliquée uniquement au contrôleur CMC actif (principal), ce dernier n'exécute
pas l'image mise à jour après sa réinitialisation ; seul le contrôleur CMC de secours
(secondaire) dispose de cette image. En général, il est vivement recommandé de
maintenir des versions identiques du micrologiciel pour le contrôleur CMC
secondaire et le contrôleur CMC principal.
REMARQUE : pour éviter de déconnecter d'autres utilisateurs au cours d'une
réinitialisation, avertissez les utilisateurs autorisés susceptibles de se connecter à
CMC et recherchez les sessions actives affichées dans la page Sessions. Pour
ouvrir la page Sessions, sélectionnez Châssis dans l'arborescence, cliquez sur
l'onglet Réseau, puis sur le sous-onglet Sessions. L'aide relative à cette page est
disponible via le lien Aide en haut à droite de la page.
REMARQUE : lors du transfert de fichiers vers et à partir de CMC, l'icône de
transfert de fichiers tourne. Si votre icône est animée, vérifiez que votre navigateur
est configuré pour autoriser les animations. Voir « Autorisation des animations
dans Internet Explorer », à la page 43 pour des instructions.
REMARQUE : si vous rencontrez des problèmes lors du téléchargement de
fichiers à partir de CMC dans Internet Explorer, activez l'option Ne pas enregistrer
les pages cryptées sur le disque. Pour des instructions, voir « Téléchargement de
fichiers à partir de CMC dans Internet Explorer », à la page 43.
Pour mettre à jour le micrologiciel CMC :
1 Dans la page Mise à jour du micrologiciel, sélectionnez le ou les modules
CMC à mettre à jour en cochant la case Mettre à jour les cibles. Il est
possible de mettre à jour simultanément les deux modules CMC.
2 Cliquez sur le bouton Appliquer la mise à jour CMC sous la liste des
composants CMC.
REMARQUE : le nom par défaut de l'image du micrologiciel de CMC est
firmimg.cmc. Le micrologiciel de CMC doit être mis à jour en premier, avant le
périphérique d'infrastructure du module d'E/S. Utilisation de l'interface Web de CMC 219
3 Dans le champ Image de micrologiciel, entrez le chemin du fichier image
du micrologiciel sur votre station de gestion ou votre réseau partagé ou
cliquez sur Parcourir pour accéder à l'emplacement du fichier.
4 Cliquez sur Commencer la mise à jour de micrologiciel. La section
Avancement de la mise à jour du micrologiciel fournit des informations
sur l'état de la mise à jour du micrologiciel. Un indicateur d'état s'affiche
sur la page pendant le chargement du fichier image. La durée du transfert
de fichiers peut fortement varier en fonction de la vitesse de la connexion.
Lorsque le processus de mise à jour interne démarre, la page s'actualise
automatiquement et l'horloge de mise à jour du micrologiciel s'affiche.
Instructions supplémentaires à suivre :
• N'utilisez pas le bouton Actualiser et ne naviguez pas sur une autre
page pendant le transfert.
• Pour annuler le processus, cliquez sur Annuler le transfert du fichier
et la mise à jour. Cette option n'est disponible que pendant le
transfert du fichier.
• L'état de la mise à jour s'affiche dans le champ État de mise à jour. Ce
champ est mis à jour automatiquement pendant le transfert du fichier.
REMARQUE : la mise à jour de CMC peut prendre plusieurs minutes.
5 Pour un CMC de secours (secondaire), le champ État de la mise à jour
affiche « Terminé » lorsque la mise à jour est terminée. Pour un CMC actif
(principal), la session du navigateur et la connexion à CMC sont perdues
temporairement pendant la mise hors tension de CMC au cours des
dernières étapes de la mise à jour du micrologiciel. Vous devez rouvrir une
session quelques minutes plus tard, lorsque le contrôleur CMC actif a
redémarré.
Après la réinitialisation de CMC, le nouveau micrologiciel est affiché sur la
page Mise à jour du micrologiciel.
REMARQUE : après la mise à niveau du micrologiciel, videz la mémoire
cache du navigateur Web. Consultez l'aide en ligne de votre navigateur pour
des instructions sur le vidage de la mémoire cache.220 Utilisation de l'interface Web de CMC
Mise à jour du micrologiciel du module iKVM
REMARQUE : après le chargement du micrologiciel, le module iKVM est
réinitialisé et devient temporairement indisponible.
1 Ouvrez à nouveau une session dans l'interface Web CMC.
2 Cliquez sur Présentation du châssis dans l'arborescence.
3 Cliquez sur l'onglet Update (Mise à jour). La page Mise à jour du
micrologiciel s'affiche.
4 Sélectionnez le composant iKVM à mettre à jour en cochant la case
Mettre à jour les cibles pour ce composant iKVM.
5 Cliquez sur le bouton Appliquer la mise à jour iKVM sous la liste des
composants iKVM.
6 Dans le champ Image de micrologiciel, entrez le chemin du fichier image
du micrologiciel sur votre station de gestion ou votre réseau partagé ou
cliquez sur Parcourir pour accéder à l'emplacement du fichier.
REMARQUE : le nom de l'image par défaut du micrologiciel iKVM est
ikvm.bin. Cependant, vous pouvez modifier ce nom pour éviter toute confusion
avec les images précédentes.
7 Cliquez sur Commencer la mise à jour de micrologiciel.
8 Cliquez sur Oui pour continuer. La section Avancement de la mise à jour
du micrologiciel fournit des informations sur l'état de la mise à jour du
micrologiciel. Un indicateur d'état s'affiche sur la page pendant le
chargement du fichier image. La durée du transfert de fichiers peut
fortement varier en fonction de la vitesse de la connexion. Lorsque le
processus de mise à jour interne démarre, la page s'actualise
automatiquement et l'horloge de mise à jour du micrologiciel s'affiche.
Instructions supplémentaires à suivre :
• N'utilisez pas le bouton Actualiser et ne naviguez pas sur une autre
page pendant le transfert.
• Pour annuler le processus, cliquez sur Annuler le transfert du fichier
et la mise à jour. Cette option n'est disponible que pendant le
transfert du fichier.
• L'état de la mise à jour s'affiche dans le champ État de mise à jour. Ce
champ est mis à jour automatiquement pendant le transfert du fichier.
REMARQUE : la mise à jour d'iKVM peut prendre jusqu'à deux minutes.
À la fin de la mise à jour, iKVM est réinitialisé et le nouveau micrologiciel
apparaît sur la page Mise à jour du micrologiciel.Utilisation de l'interface Web de CMC 221
Mise à jour du micrologiciel du périphérique d'infrastructure du module d'E/S
En effectuant cette mise à jour, le micrologiciel pour un composant de
périphérique du module d'E/S est mis à jour, mais pas le micrologiciel du
périphérique du module d'E/S lui-même ; le composant est l'ensemble de
circuits d'interface entre le périphérique du module d'E/S et CMC. L'image de
mise à jour du composant réside dans le système de fichiers CMC ; quant au
composant, il est affiché comme périphérique actualisable sur l'interface
utilisateur Web de CMC uniquement si la révision actuelle du composant et
l'image du composant sur CMC ne correspondent pas. Pour mettre à jour le
micrologiciel du périphérique d'infrastructure du module d'ES :
1 Ouvrez à nouveau une session dans l'interface Web CMC.
2 Cliquez sur Présentation du châssis dans l'arborescence.
3 Cliquez sur l'onglet Update (Mise à jour). La page Mise à jour du
micrologiciel s'affiche.
4 Sélectionnez le périphérique du module d'E/S à mettre à jour en cochant
la case Mettre à jour les cibles pour ce périphérique du module d'E/S.
5 Cliquez sur le bouton Appliquer la mise à jour IOM sous la liste des
composants IOM.
REMARQUE : le champ Image de micrologiciel n'apparaît pas pour une cible
de périphérique d'infrastructure du module d'E/S (IOMINF) car l'image
requise se trouve sur CMC. Le micrologiciel CMC doit être mis à jour en
premier, avant le micrologiciel IOMINF.
Les mises à jour d'IOMINF sont autorisées par CMC s'il détecte que le
micrologiciel IOMINF est obsolète avec l'image contenue dans le système
de fichiers CMC. Si le micrologiciel IOMINF est récent, CMC empêche
les mises à jour d'IOMINF. Les périphériques IOMINF récents doivent
être répertoriés en tant que périphériques pouvant être mis à jour.222 Utilisation de l'interface Web de CMC
6 Cliquez sur Commencer la mise à jour de micrologiciel. La section
Avancement de la mise à jour du micrologiciel fournit des informations
sur l'état de la mise à jour du micrologiciel. Un indicateur d'état s'affiche
sur la page pendant le chargement du fichier image. La durée du transfert
de fichiers peut fortement varier en fonction de la vitesse de la connexion.
Lorsque le processus de mise à jour interne démarre, la page s'actualise
automatiquement et l'horloge de mise à jour du micrologiciel s'affiche.
Instructions supplémentaires à suivre :
• N'utilisez pas le bouton Actualiser et ne naviguez pas vers une autre
page pendant le transfert de fichiers.
• L'état de la mise à jour s'affiche dans le champ État de mise à jour. Ce
champ est mis à jour automatiquement pendant le transfert du fichier.
REMARQUE : aucun décompte du temps de transfert ne s'affiche lors de la mise à
jour du micrologiciel IOMINF. La mise à jour entraîne une courte perte de la
connectivité au périphérique du module d'E/S, car ce dernier redémarre à la fin du
processus. Lorsque la mise à jour est terminée, le nouveau micrologiciel est affiché
et le système mis à jour n'est plus présent sur la page Mise à jour du micrologiciel.
Mise à jour du micrologiciel iDRAC du serveur
REMARQUE : iDRAC (sur un serveur) se réinitialise et est temporairement
indisponible après le chargement des mises à jour du micrologiciel.
REMARQUE : la version du micrologiciel iDRAC doit être la version 1.4 ou une
version ultérieure pour les serveurs disposant d'iDRAC, ou la version 2.0 ou une
version ultérieure pour les serveurs sur lesquels iDRAC6 Enterprise est installé. Si
la mise à jour du progiciel iDRAC vers la version 3.0 ou une version ultérieure
depuis une version iDRAC antérieure à 2.3, le progiciel iDRAC doit d'abord être mis
à jour à la version 2.3 avant la mise à jour à la version 3.0 ou versions ultérieure.
1 Ouvrez à nouveau une session dans l'interface Web CMC.
2 Cliquez sur Présentation du châssis dans l'arborescence.
3 Cliquez sur l'onglet Mettre à jour. La page Mise à jour du micrologiciel
s'affiche.
4 Sélectionnez le ou les périphériques iDRAC à mettre à jour en cochant la
case Mettre à jour les cibles pour ces périphériques.
5 Cliquez sur le bouton Appliquer la mise à jour iDRAC sous la liste des
composants iDRAC.Utilisation de l'interface Web de CMC 223
6 Dans le champ Image de micrologiciel, entrez le chemin du fichier image
du micrologiciel sur votre station de gestion ou votre réseau partagé ou
cliquez sur Parcourir pour accéder à l'emplacement du fichier.
7 Cliquez sur Commencer la mise à jour de micrologiciel. La section
Avancement de la mise à jour du micrologiciel fournit des informations
sur l'état de la mise à jour du micrologiciel. Un indicateur d'état s'affiche
sur la page pendant le chargement du fichier image. La durée du transfert
de fichiers peut fortement varier en fonction de la vitesse de la connexion.
Lorsque la procédure de mise à jour interne démarre, la page s'actualise
automatiquement et l'horloge de mise à jour du micrologiciel s'affiche.
Instructions supplémentaires à suivre :
• N'utilisez pas le bouton Actualiser et ne naviguez pas vers une autre
page pendant le transfert de fichiers.
• Pour annuler le processus, cliquez sur Annuler le transfert du fichier
et la mise à jour. Cette option n'est disponible que pendant le
transfert du fichier.
• L'état de la mise à jour s'affiche dans le champ État de mise à jour.
Ce champ est mis à jour automatiquement pendant le transfert
du fichier.
REMARQUE : la mise à jour peut prendre plusieurs minutes pour CMC ou
le serveur.
Restauration du micrologiciel iDRAC à l'aide de CMC
Le micrologiciel iDRAC est généralement mis à jour à l'aide des
fonctionnalités iDRAC telles que l'interface Web iDRAC, l'interface de ligne
de commande SM-CLP ou les progiciels de mise à jour spécifiques aux
systèmes d'exploitation téléchargés sur le site support.dell.com. Consultez le
Guide d'utilisation du micrologiciel iDRAC pour des instructions de mise à
jour du micrologiciel iDRAC.
Les générations initiales de serveurs peuvent avoir des micrologiciels
corrompus récupérés par le nouveau processus de micrologiciel iDRAC de
mise à jour. Lorsque CMC détecte un micrologiciel iDRAC corrompu, il
répertorie le serveur dans la page Mise à jour du micrologiciel. 224 Utilisation de l'interface Web de CMC
Pour mettre à jour le micrologiciel iDRAC.
1 Téléchargez la dernière version du micrologiciel iDRAC sur votre
ordinateur de gestion depuis l'adresse support.dell.com.
2 Ouvrez une session sur l'interface Web (voir « Accès à l'interface Web
CMC », à la page 111).
3 Cliquez sur Présentation du châssis dans l'arborescence.
4 Cliquez sur l'onglet Update (Mise à jour). La page Mise à jour du
micrologiciel s'affiche.
5 Sélectionnez le ou les contrôleurs iDRAC à mettre à jour en cochant la
case Mettre à jour les cibles pour ces périphériques.
6 Cliquez sur le bouton Appliquer la mise à jour iDRAC sous la liste des
composants iDRAC.
7 Cliquez sur Parcourir, naviguez vers l'image du micrologiciel iDRAC que
vous avez téléchargée et cliquez sur Ouvrir.
REMARQUE : le nom par défaut de l'image du micrologiciel iDRAC est
firmimg.imc. Le micrologiciel de CMC doit être mis à jour en premier, avant le
périphérique d'infrastructure du module d'E/S.
8 Cliquez sur Commencer la mise à jour de micrologiciel. Instructions
supplémentaires à suivre :
• N'utilisez pas le bouton Actualiser et ne naviguez pas vers une autre
page pendant le transfert de fichiers.
• Pour annuler le processus, cliquez sur Annuler le transfert du fichier
et la mise à jour. Cette option n'est disponible que pendant le
transfert du fichier.
• L'état de la mise à jour s'affiche dans le champ État de mise à jour. Ce
champ est mis à jour automatiquement pendant le transfert du fichier.
REMARQUE : la mise à jour du micrologiciel iDRAC peut prendre jusqu'à
10 minutes.
Mise à jour du micrologiciel des composants du serveur à l'aide du
Lifecycle Controller
Le service Lifecycle Controller est disponible sur chaque serveur et facilité
par iDRAC. La page Mise à jour des composants du serveur permet de gérer
le micrologiciel des composants et périphériques des serveurs à l'aide du Utilisation de l'interface Web de CMC 225
service Lifecycle Controller. Le Lifecycle Controller utilise une optimisation
algorithmique pour mettre à jour le progiciel réduisant de manière efficace le
nombre de redémarrage.
Avant l'utilisation de la fonctionnalité de mise à jour basée sur Lifecycle
Controller, les versions du micrologiciel des serveurs doivent être mises à jour.
REMARQUE : vous devez mettre à jour le progiciel CMC avant de mettre à jour les
modules progiciels de composant de serveur.
Vous devez mettre à jour les modules progiciels de composant de serveur dans
l'ordre qui suit :
• BIOS
• Lifecycle Controller
• iDRAC
Voir la section « Versions de progiciel de module recommandées » dans la
section Lisez-moi de CMC sur le site support.dell.com/manuals. Le Lifecycle
Controller fournit la prise en charge de mise à jour de module pour les
serveurs iDRAC6 et versions ultérieures. Le progiciel iDRAC doit être à la
version 2.3 ou version ultérieure pour pouvoir mettre à jour le progiciel à l'aide
de contrôleur Lifecycle.
Lors de la mise à jour manuelle du progicielle à l'aide de DUP, vous devez
mettre à jour le progiciel dans l'ordre suivant :
• BIOS
• Lifecycle Controller
• iDRAC : si vous mettez à jour le progiciel iDRAC vers la version 3.0 ou
une version ultérieure depuis une version iDRAC antérieure à 2.3, le
progiciel iDRAC doit d'abord être mis à jour à la version 2.3 avant la
mise à jour à la version 3.0 ou version ultérieure.226 Utilisation de l'interface Web de CMC
Activation du Lifecycle Controller
Si le serveur ne prend pas en charge le service Lifecycle Controller, la section
Inventaire du micrologiciel affiche le message Non pris en charge.
Le service Lifecycle Controller peut être désactivé sur le serveur. Dans ce cas,
la section Inventaire du système affiche Lifecycle Controller peut
ne pas être activé.
Pour activer le service Lifecycle Controller sur la dernière génération des
serveurs, mettez à niveau les serveurs existants en installant le micrologiciel
Unified Server Configurator (USC) et en mettant à jour le micrologiciel
iDRAC6. Dans le cas d'une génération plus ancienne de serveurs, cette mise à
niveau peut ne pas être possible.
Normalement, le micrologiciel USC est installé via un progiciel d'installation
approprié à exécuter sur le SE. Un progiciel spécial de réparation ou
d'installation avec l'extension de fichier .usc est disponible sur l'interface de
navigateur Web iDRAC natif. Ce progiciel permet l'installation du
micrologiciel USC par la voie de transmission habituelle de la mise à jour
micrologicielle. Pour des informations supplémentaires, consultez le Guide
d'utilisation de Dell Lifecycle Controller pour USC/USC-LCE.
Le service de contrôleur Lifecycle peut être activé au cours du processus de
démarrage de serveur. Pour les serveurs iDRAC6 servers, sur la console de
démarrage, lorsque vous y êtes invité avec le message Appuyez sur
pour configurer l'accès à distance sous
5 sec., appuyez sur . Dans l'écran de configuration, activez
Services du système.
Pour annuler toutes les tâches planifiées en attente et les supprimer de la file
d'attente, sélectionnez Annuler les services du système.
La page Mise à jour des composants du serveur permet de mettre à jour les
micrologiciels de votre système. Pour utiliser les fonctionnalités et fonctions
de cette page, vous devez disposer des droits suivants :
• Pour CMC : Server Administrator.
• Pour iDRAC : Configurer iDRAC et Ouvrir une session dans iDRAC.
Si vous ne disposez pas des droits nécessaires, l'inventaire du micrologiciel des
composants et des périphériques ne peut être visualisé que depuis le serveur.
Aucun composant ou périphérique ne peut être sélectionné pour toute tâche
du Lifecycle Controller sur le serveur.Utilisation de l'interface Web de CMC 227
Pour des informations supplémentaires sur le Lifecycle Controller, les
composants du serveur, et la gestion du micrologiciel de périphériques, voir :
• Présentation des services distants du Dell Lifecycle Controller
• delltechcenter.com/page/Lifecycle+Controller.
Mécanismes de filtrage
Les informations sur les composants et périphériques répartis sur tous les
serveurs sont récupérées simultanément. Pour gérer tant d'informations, le
Lifecycle Controller fournit divers mécanismes de filtrage. Ces filtres vous
permettent de :
• sélectionner une ou plusieurs catégories de composants ou périphériques
pour une visualisation aisée,
• comparer les versions micrologicielles des composants et périphériques
répartis sur le serveur,
• filtrer automatiquement les composants et périphériques, pour réduire la
catégorie d'un composant ou périphérique selon les types ou modèles.
REMARQUE : la fonction de filtrage automatique est importante au cours de
l'utilisation du DUP (Dell Update Package). La programmation de la mise à jour
d'un DUP peut dépendre du type ou modèle du composant ou périphérique. Le
comportement du filtrage automatique est conçu pour réduire les décisions
de sélections ultérieures après la sélection initiale effectuée.
Exemples
Voici quelques exemples où les mécanismes de filtrage sont appliqués :
• Si le filtre du BIOS est sélectionné, seul l'inventaire du BIOS pour tous les
serveurs est introduit. Si l'ensemble des serveurs consiste en un nombre de
modèles présents sur le server, la logique de filtrage automatique supprime
automatiquement tous les autres serveurs ne correspondant pas au modèle
du serveur sélectionné. Ceci assure que l'image de mise à jour du
micrologiciel du BIOS (DUP) sélectionnée est compatible avec le modèle
correcte du serveur.
Parfois, l'image de mise à jour du micrologiciel du BIOS (DUP) peut être
compatible avec un certain nombre de modèles de serveur. De telles
optimisations sont ignorées au cas où la compatibilité cesse ultérieurement. 228 Utilisation de l'interface Web de CMC
• Le filtrage automatique est important pour les mises à jour
micrologicielles des NIC et des contrôleurs RAID. Ces catégories de
périphériques renferment différents types et modèles. De la même
manière, les images de mises à jour micrologicielles (DUP) peuvent être
disponibles sous formes optimisées où un DUP unique peut être
programmé pour mettre à jour plusieurs types ou modèles de
périphériques d'une catégorie donnée.
La page Mise à jour des composants du serveur fournit les sections suivantes :
• Filtre de mise à jour des composants/périphériques : cette section est
utilisée pour contrôler la visualisation des composants et/ou périphériques
de la section Inventaire du micrologiciel. Lorsque le filtre d'un type de
composant ou périphérique est activé, la section Inventaire du
micrologiciel est modifiée et affiche uniquement le composant ou
périphérique activé sur tous les serveurs.
Après avoir sélectionné un filtre et après l'affichage d'un ensemble de
composants et périphériques filtrés dans la section de l'inventaire, un
filtrage supplémentaire peut se produire lorsqu'un composant ou
périphérique est sélectionné pour être mis à jour. Par exemple, si le filtre
du BIOS est sélectionné, la section de l'inventaire affiche tous les serveurs
et leur composant BIOS uniquement. Si un composant BIOS d'un des
serveurs est sélectionné, l'inventaire est à nouveau filtré pour afficher les
serveurs correspondant au nom du modèle du serveur sélectionné.
Si aucun filtre n'est sélectionné et qu'une mise à jour d'un composant ou
périphérique est sélectionnée, le filtre associé à cette sélection est
automatiquement activé. Un filtrage supplémentaire peut se produire
lorsque la section de l'inventaire affiche tous les serveurs correspondant au
composant sélectionné en termes de modèle, type ou quelque forme
d'identité. Par exemple, si un composant BIOS d'un des serveurs est
sélectionné pour être mis à jour, le filtre est configuré sur le BIOS
automatiquement et la section de l'inventaire affiche les serveurs qui
correspondent au nom du modèle du serveur sélectionné.Utilisation de l'interface Web de CMC 229
Activer le filtre permet au composant ou périphérique associé d'être filtré
dans la section Inventaire du micrologiciel. Après l'activation d'un filtre,
seuls les composants ou périphériques associés répartis sur tous les serveurs
présents dans le châssis peuvent être affichés. Le filtre est un filtre en
dérivation. Cela signifie qu'il n'accepte que des composants ou
périphériques associés y étant associés et exclut tous les autres. Un ou
plusieurs filtres (ou tous) peuvent être sélectionnés, au besoin.
Les composants ou périphériques sont groupés sous les catégories
suivantes :
– BIOS
– iDRAC
– Unified Server Configurator (Lifecycle Controller)
– Diagnostics 32 bits
– Progiciel de pilotes du SE
– Network Interface Controllers (NIC) et contrôleurs RAID
• Inventaire du micrologiciel des composants/périphériques : cette section
récapitule la condition des versions micrologicielles de tous les composants
et périphériques répartis sur tous les serveurs actuellement présents dans le
châssis. Les options d'opérations du Lifecycle Controller telles que Mise à
jour, Restauration, Réinstallation et Suppression de tâche sont disponibles.
Seul un type d'opération peut être effectué simultanément. Les
composants et périphériques non pris en charge peuvent être répertoriés
dans le cadre de l'inventaire, mais n'autorisent pas les opérations Lifecycle
Controller.
Les serveurs ne prenant pas actuellement en charge le service Lifecycle
Controller sont répertoriés comme Non pris en charge. Un lien hypertexte est
fourni permettant de naviguer vers une page alternative d'où la mise à jour du
micrologiciel iDRAC uniquement peut être effectuée. Cette page ne prend
pas en charge la mise à jour de composants ou périphériques sur le serveur.
Seul le micrologiciel iDRAC peut être mis à jour sur la page alternative et ne
dépend pas de la voie de transmission du Lifecycle Controller. 230 Utilisation de l'interface Web de CMC
Si le serveur est répertorié comme Pas prêt, cela indique que lorsque
l'inventaire du micrologiciel était récupéré, l'iDRAC du serveur était encore
en cours d'initialisation. Patientez jusqu'à ce que l'iDRAC soient
complètement opérationnel, puis réinitialisez la page pour que l'inventaire du
micrologiciel soit à nouveau récupéré.
Si l'inventaire des composants ou périphériques n'affiche pas les éléments
physiquement installés sur le serveur, vous devez appeler l'USC (Unified
Server Configurator Console) lorsque le serveur est en cours d'amorçage. Ceci
aide à actualiser les composants internes et les informations sur les
périphériques et fournit d'autres moyens de vérifier les composants et
périphériques actuellement installés. Cette situation se produit lorsque :
• le micrologiciel iDRAC du serveur est mis à jour pour introduire la
fonctionnalité Lifecycle Controller à la gestion du serveur,
• les nouveaux périphériques ont été récemment insérés dans le serveur.
Pour rendre cette action automatique, l'utilitaire de configuration iDRAC
fournit une option accessible via la console d'amorçage.
Pour les serveurs iDRAC6 servers, sur la console de démarrage, lorsque vous y
êtes invité avec le message Appuyez sur pour
configurer l'accès à distance sous 5 sec., appuyez sur
. Ensuite, sur l'écran d'installation, activez Collecter l'inventaire
système au redémarrage.
Pour les serveurs iDRAC7, sur la console de démarrage, sélectionnez F2 pour
la configuration du système. Sur l'écran d'installation, sélectionnez les
paramètres iDRAC, puis sélectionnez les services de système (USC). Ensuite,
sur l'écran d'installation, activez Collecter l'inventaire système au
redémarrage. Utilisation de l'interface Web de CMC 231
La Figure 5-59 affiche les informations sur les composants et les
périphériques présents sur le serveur :
Tableau 5-59. Informations sur les composants et périphériques
Champ Description
Logement Indique le logement occupé par le serveur du châssis.
Les numéros de logement sont des ID séquentiels, qui vont de
1 à 16 (pour les 16 logements disponibles dans le châssis), qui
permettent d'identifier l'emplacement du serveur dans le
châssis. Lorsqu'il y a moins de 16 serveurs dans les logements,
seuls les logements avec serveur sont affichés.
Name (Nom) Affiche le nom du serveur dans chaque logement.
Modèle Affiche le nom du modèle du serveur.
Composant/Périphé
rique
Affiche une description du composant ou périphérique présent
sur le serveur. Si la colonne est trop étroite, l'outil « souris sur
image » offre une vue de la description.
Version actuelle Affiche la version actuelle du composant ou périphérique
présent sur le système. Si une case à cocher se trouve en regard
de la version actuelle, cela indique qu'une image micrologicielle
du micrologiciel actuellement installé pour le composant ou
périphérique est disponible dans le Lifecycle Controller pour
une opération de Réinstallation.
Version de
restauration
Affiche la version de restauration du composant ou
périphérique présent sur le serveur. Une case à cocher en regard
de la version de restauration indique qu'une image
micrologicielle du micrologiciel précédemment installé pour le
composant ou périphérique est disponible dans le Lifecycle
Controller pour une opération de Restauration. Sa disponibilité
dépend de la logique de compatibilité de version du Lifecycle
Controller. Cela suppose également que la mise à jour
précédente a été facilitée par le Lifecycle Controller.232 Utilisation de l'interface Web de CMC
Condition des
tâches
Affiche la condition des tâches de toute opération programmée
sur le serveur. La condition des tâches est mise à jour en continu
de manière dynamique. Si l'achèvement d'une tâche dont la
condition est terminée est détecté, les versions des
micrologiciels des composants et périphériques présents sur ce
serveur sont alors automatiquement réactualisées au cas où une
modification de la version du micrologiciel d'un composant ou
périphérique se serait produite. Si une case à cocher est
présente en regard de la condition des tâches, cela indique
qu'une tâche du Lifecycle Controller est en cours et se trouve
actuellement dans la condition indiquée. Elle peut être cochée
pour une opération de Suppression de tâches. Une icône
informative, qui se trouve également en regard de la condition
actuelle, fournit des informations supplémentaires sur la
condition actuelle des tâches. Pour consulter ces informations,
il suffit de cliquer sur l'icône ou de placer le curseur au-dessus.
Tableau 5-59. Informations sur les composants et périphériques (suite)
Champ DescriptionUtilisation de l'interface Web de CMC 233
Mise à jour Sélectionne le composant ou périphérique pour la mise à jour
du micrologiciel sur le serveur. Utilisez la touche de raccourci
CRTL pour sélectionner un type de composant ou périphérique
à mettre à jour sur tous les serveurs applicables. Appuyer sur la
touche CRTL et la maintenir enfoncée met tous les composants
en surbrillance jaune. Tout en appuyant sur la touche CRTL,
sélectionnez le composant ou périphérique requis en cochant la
cache associée dans la colonne Mettre à jour.
Les mises à jour du BIOS sont spécifiques au modèle du serveur.
La logique de sélection dépend de ce comportement. Il arrive
que même si un seul périphérique NIC est sélectionné pour la
mise à jour du micrologiciel sur un serveur, celle-ci peut
s'appliquer à tous les périphériques NIC du serveur. Ce
comportement est inhérent à la fonctionnalité du Lifecycle
Controller, tout particulièrement la programmation contenue
dans le DUP (Dell Update Package). La taille des DUP
actuellement prise en charge est inférieure à 48 Mo.
Si la taille de l'image du fichier de mise à jour est supérieure, la
condition des tâches indique que le téléchargement a échoué. Si
plusieurs tentatives de mise à jour de composants sont effectuées
sur un serveur, la taille combinée de tous les fichiers de mise à
jour du micrologiciel peut également dépasser 48 Mo. Dans un
tel cas, une des mises à jour de composant échoue car son fichier
de mise à jour est réduit. Une stratégie recommandée pour la
mise à jour de plusieurs composants est de mettre à jour l'USC et
des composants de diagnostics de 32 bits simultanément en
premier. Ces mises à jour ne nécessitent pas un redémarrage du
serveur et sont relativement rapides. Les autres composants
peuvent alors être mis à jour ensemble.
Toutes les mises à jour du Lifecycle Controller sont
normalement programmées pour être exécutées
immédiatement. Cependant, il arrive que les services du
système retardent cette exécution. Dans de telles situations, la
mise à jour échoue car le partage à distance hébergé par le CMC
n'est plus disponible.
Tableau 5-59. Informations sur les composants et périphériques (suite)
Champ Description234 Utilisation de l'interface Web de CMC
Lorsqu'un composant ou périphérique est sélectionné pour être mis à jour, le
DUP (Dell Update Package) doit être spécifié. Un tableau secondaire
identifiant le composant/périphérique et un sélectionneur pour le fichier
d'image du micrologiciel s'affichent. Ceci permet de spécifier le fichier
d'image du micrologiciel associé au composant ou périphérique. Un
sélectionneur spécifique s'affiche pour chaque type de
composant/périphérique sélectionné pour être mis à jour.
REMARQUE : seul un sélectionneur par catégorie de composant ou périphérique
s'affiche.
Ceci est plus apparent dans le cas de périphériques NIC et de périphériques
de contrôleur RAID. Ces périphériques peuvent inclure plusieurs types et
modèles. La logique de sélection de mise à jour filtre automatiquement le
type ou modèle de périphérique pertinent selon les périphériques
initialement sélectionnés. Ce comportement de filtrage automatique résulte
du fait que seul un fichier d'image du micrologiciel pour la catégorie peut être
spécifié à la fois. Le fichier d'image du micrologiciel doit être un DUP (Dell
Update Package) Microsoft Windows. Celui-ci est un fichier exécutable
Microsoft Windows.
REMARQUE : la taille limite de mise à jour d'un DUP unique ou de plusieurs DUP
combinés peut être ignorée si la fonctionnalité Stockage étendu est installée et
activée. Pour plus d'information sur l'activation de stockage étendu, voir
« Activation du support Flash amovible », à la page 115.
REMARQUE : Dell vous recommande d'effacer la file d'attente des tâches avant
d'initialiser une mise à jour micrologicielle des composants du serveur. La liste des
tâches s'exécutant sur le ou les serveur(s) est disponible sur la page Tâches du
Lifecycle Controller. Cette page permet la suppression d'une ou de plusieurs
tâche(s) ou l'élimination de toutes les tâches du serveur. Consultez la section
Dépannage du « Gestion des tâches Lifecycle Controller sur un système distant », à
la page 453.Utilisation de l'interface Web de CMC 235
La page Mise à jour des composants du serveur vous permet d'effectuer
différentes actions à l'aide des boutons disponibles. Chaque bouton permet
d'effectuer l'opération du Lifecycle Controller qui lui est associée. Pour
effectuer une opération, un composant ou périphérique au moins doit être
sélectionné pour celle-ci. Si une opération de Mise à jour est sélectionnée
pour un composant ou périphérique, le fichier d'image du micrologiciel de ce
composant ou périphérique doit alors être spécifié dans la section Mettre à
jour le filtre et la sélection du fichier d'image. Restez sur la page après avoir
planifié une opération. Si vous tentez de vous rendre sur une autre page, un
message contextuel de confirmation s'affiche permettant d'annuler cette
tentative. Sinon, l'opération est annulée. Une interruption, particulièrement
lorsqu'elle se produit au cours d'une opération de Mise à jour, peut entraîner
l'annulation du téléversement du fichier d'image du micrologiciel avant qu'il
puisse être achevé. Après avoir planifié une opération, veillez à ce que le
message contextuel de confirmation qui indique que la planification a réussi
soit acquitté. Une fois planifiée sur le serveur, l'exécution d'une opération du
Lifecycle Controller peut prendre 10 à 15 minutes. Le processus comprend
plusieurs redémarrages du serveur au cours desquels l'installation du
micrologiciel est exécutée. Celle-ci comprend également une étape de
vérification du micrologiciel. La progression de ce processus peut être suivie
en consultant la console du serveur. Si plusieurs composants ou périphériques
nécessitant une mise à jour se trouvent sur le serveur, consolidez toutes les
mises à jour en une opération planifiée. Ceci minimise ainsi le nombre de
redémarrages requis.
La Figure 5-60 décrit les boutons disponibles et les actions pouvant être
effectuées sur la page Mise à jour des composants du serveur :
Tableau 5-60. Actions de mise à jour des composants du serveur
Bouton Action
Mise à jour Effectue l'opération de Mise à jour pour planifier les mises à jour
du micrologiciel des composants et/ou périphériques sélectionnés
d'un ou plusieurs serveur(s).
Restauration Effectue l'opération de Restauration pour planifier les
restaurations du micrologiciel des composants et/ou périphériques
sélectionnés d'un ou plusieurs serveur(s). 236 Utilisation de l'interface Web de CMC
Pour certains composants, les actions de mise à jour, de retour en arrière et de
réinstallation peuvent exiger un redémarrage. Le redémarrage peut être
retardé en faisant la sélection dans la liste déroulante. Sélectionnez Reboot
Now (redémarrez maintenant) si le serveur a besoin d'être redémarré
immédiatement ou Reboot Later (redémarrer plus tard) pour redémarrer le
serveur manuellement ultérieurement.
Il arrive que, lorsqu'une opération est en cours de soumission pour une
planification via une autre session ou un autre contexte, une autre tentative
d'opération soit effectuée. Dans ce cas, un message contextuel de
confirmation s'affiche indiquant la situation et vous informant que
l'opération n'a pas été soumise. Laissez l'opération en cours se terminer, puis
soumettez à nouveau l'opération.
Gestion iDRAC
CMC fournit une page Déployer iDRAC pour permettre à l'utilisateur de
définir les paramètres de configuration de réseau iDRAC pour les serveurs,
qu'ils soient déjà installés ou nouvellement insérés. Un utilisateur peut
configurer un ou plusieurs périphériques iDRAC installés à partir de cette
page. L'utilisateur peut également définir les paramètres de configuration
réseau iDRAC par défaut et le mot de passe racine pour les serveurs qui
seront installés ultérieurement ; ces paramètres par défaut sont les paramètres
iDRAC QuickDeploy.
Pour des informations supplémentaires sur le comportement iDRAC,
consultez les Guides d'utilisation d'iDRAC sur le site Web
support.dell.com/manuals.
Réinstallation Effectue l'opération de Réinstallation pour planifier les
réinstallations du micrologiciel des composants et/ou
périphériques sélectionnés d'un ou plusieurs serveur(s).
Suppression de
tâches
Effectue l'opération de Suppression de tâches pour supprimer les
tâches associées aux composants et/ou périphériques sélectionnés
sur un ou plusieurs serveurs.
Tableau 5-60. Actions de mise à jour des composants du serveur
Bouton ActionUtilisation de l'interface Web de CMC 237
iDRAC QuickDeploy
La section iDRAC QuickDeploy de la page Déployer iDRAC contient les
paramètres de configuration de réseau qui sont appliqués aux serveurs
nouvellement insérés. Vous pouvez utiliser ces paramètres pour remplir
automatiquement le tableau Paramètres réseau iDRAC qui se trouve sous la
section QuickDeploy. Une fois que QuickDeploy est activé, les paramètres
QuickDeploy sont appliqués aux serveurs après avoir été installés. Pour plus
d'information sur les paramètres QuickDeploy d'iDRAC, voir l'étape 8 dans
« Configuration de la mise en réseau à l'aide de l'Assistant Configuration de
l'écran LCD », à la page 46.
Pour activer iDRAC QuickDeploy et configurer ses paramètres :
1 Ouvrez une session sur l'interface Web de CMC.
2 Cliquez sur Présentation des serveurs dans l'arborescence.
3 Cliquez sur l'onglet Configuration. La page Déployer iDRAC apparaît.
4 Définissez les paramètres QuickDeploy en conséquence.
Tableau 5-61. Paramètres QuickDeploy
Paramètre Description
QuickDeploy activé Active/désactive la fonctionnalité QuickDeploy qui
applique automatiquement les paramètres iDRAC
configurés sur cette page aux serveurs nouvellement
installés ; la configuration automatique doit être confirmée
localement sur l'écran LCD.
REMARQUE : cela inclut le mot de passe de l'utilisateur
racine si la case Définir le mot de passe racine d'iDRAC sur
l'insertion de serveur est cochée.
Par défaut : décoché (désactivé)
Définir le mot de passe
racine d'iDRAC sur
l'insertion de serveur
Spécifie si le mot de passe racine d'iDRAC du serveur doit
être remplacé par la valeur fournie dans la boîte de dialogue
Mot de passe racine iDRAC lorsque le serveur est inséré. 238 Utilisation de l'interface Web de CMC
Mot de passe racine
d'iDRAC
Lorsque les cases Définir le mot de passe racine d'iDRAC
lors de l'insertion de serveur et QuickDeploy activé sont
cochées, cette valeur de mot de passe est assignée au mot
de passe de l'utilisateur racine iDRAC d'un serveur dès que
ce dernier est inséré dans le châssis. Le mot de passe peut
contenir entre 1 et 20 caractères imprimables (y compris les
espaces).
Confirmer le mot de
passe racine d'iDRAC
Vérifie le mot de passe entré dans le champ Mot de passe
racine d'iDRAC.
Activer le réseau local
d'iDRAC
Active/désactive le canal de réseau local d'iDRAC.
Par défaut : décoché (désactivé)
Activer IPv4 pour
iDRAC
Active/Désactive IPv4 sur iDRAC. Le paramètre par défaut
est activé.
Activer IPMI sur le
réseau local d'iDRAC
Active/désactive le canal IPMI sur le réseau local pour
chaque iDRAC présent dans le châssis.
Par défaut : décoché (désactivé)
Activer DHCP pour
iDRAC
Active/désactive DHCP pour chaque iDRAC présent dans
le châssis. Si cette option est activée, les champs IP
QuickDeploy, Masque de sous-réseau QuickDeploy et
Passerelle QuickDeploy sont désactivés et ne peuvent pas
être modifiés étant donné que DHCP assigne
automatiquement ces paramètres pour chaque iDRAC.
Par défaut : décoché (désactivé)
Tableau 5-61. Paramètres QuickDeploy (suite)
Paramètre DescriptionUtilisation de l'interface Web de CMC 239
Première adresse IPv4
d'iDRAC (logement 1)
Spécifie l'adresse IP statique d'iDRAC du serveur dans le
logement 1 de l'enceinte. L'adresse IP de chaque iDRAC
suivant est incrémenté de un pour chaque logement à partir
de l'adresse IP statique du logement 1. Si la somme de
l'adresse IP et du numéro du logement est supérieure au
masque de sous-réseau, un message d'erreur s'affiche.
REMARQUE : le masque de sous-réseau et la passerelle ne
sont pas incrémentés comme l'adresse IP.
Par exemple, si la première adresse IP est 192.168.0.250
et que le masque de sous-réseau est 255.255.0.0, l'adresse IP
QuickDeploy pour le logement 15 est 192.168.0.265. Si le
masque de sous-réseau est 255.255.255.0, le message
d'erreur La plage de l'adresse IP
QuickDeploy n'est pas contenue dans le
sous-réseau QuickDeploy s'affiche lorsque vous
appuyez sur l'un des boutons Enregistrer les paramètres
QuickDeploy ou Remplir automatiquement avec les
paramètres QuickDeploy.
Masque de sous-réseau
IPv4 d'iDRAC
Spécifie le masque de sous-réseau QuickDeploy assigné à
tout serveur nouvellement inséré.
Passerelle IPv4
d'iDRAC
Spécifie la passerelle par défaut QuickDeploy assignée à
tout iDRAC présent dans le châssis.
Activer IPv6 pour
iDRAC
Active l'adressage IPv6 pour chaque iDRAC présent dans le
châssis qui possède la capacité IPv6.
Activer la configuration
automatique IPv6
d'iDRAC
Active iDRAC pour obtenir les paramètres IPv6 (adresse et
longueur de préfixe) auprès d'un serveur DHCPv6 et
autorise également la configuration automatique des
adresses statiques. Le paramètre par défaut est activé.
Passerelle IPv6
d'iDRAC
Spécifie la passerelle IPv6 par défaut à assigner aux iDRAC.
Le paramètre par défaut est « :: ».
Longueur de préfixe
IPv6 iDRAC
Spécifie la longueur de préfixe à assigner pour les
adresses IPv6 sur l'iDRAC. Le paramètre par défaut est 64.
Tableau 5-61. Paramètres QuickDeploy (suite)
Paramètre Description240 Utilisation de l'interface Web de CMC
5 Pour enregistrer les sélections, cliquez sur le bouton Enregistrer les
paramètres QuickDeploy. Si vous avez modifié les paramètres réseau
iDRAC, cliquez sur le bouton Appliquer les paramètres réseau d'iDRAC
pour déployer les paramètres sur iDRAC.
6 Pour mettre à jour le tableau avec les derniers paramètres QuickDeploy
enregistrés et restaurer les paramètres réseau iDRAC sur les valeurs
actuelles pour chaque serveur installé, cliquez sur Actualiser.
REMARQUE : si vous cliquez sur le bouton Actualiser, tous les paramètres de
configuration réseau d'iDRAC QuickDeploy et d'iDRAC qui n'ont pas été enregistrés
seront supprimés.
La fonctionnalité QuickDeploy est exécutée seulement si elle est activée et si
un serveur est inséré dans le châssis. Si les cases Définir le mot de passe de
root iDRAC lors de l'insertion du serveur et QuickDeploy activé sont
cochées, l'utilisateur est invité via l'interface LCD à autoriser ou non la
modification du mot de passe. Si certains paramètres de configuration réseau
diffèrent des paramètres iDRAC actuels, l'utilisateur peut accepter ou refuser
les modifications.
REMARQUE : s'il existe une différence de réseau local ou de réseau local sur
IPMI, l'utilisateur est invité à accepter le paramètre de l'adresse IP de
QuickDeploy. Si la différence est le paramètre DHCP, l'utilisateur est invité à
accepter le paramètre QuickDeploy DHCP.
Pour copier les paramètres QuickDeploy dans la section Paramètres réseau
d'iDRAC, cliquez sur Remplir automatiquement avec les paramètres
QuickDeploy. Les paramètres de configuration réseau QuickDeploy sont
copiés dans les champs correspondants du tableau Paramètres de
configuration réseau d'iDRAC.
REMARQUE : les modifications apportées aux champs de QuickDeploy sont
immédiates. Cependant, la propagation, de CMC à iDRAC, des modifications
apportées à un ou plusieurs paramètres de configuration réseau de serveur iDRAC
risquent de prendre quelques minutes. Si vous appuyez trop tôt sur le bouton
Actualiser, des données partiellement correctes pour un ou plusieurs serveurs
iDRAC seront affichées.Utilisation de l'interface Web de CMC 241
Paramètres réseau d'iDRAC
La section Paramètres réseau d'iDRAC de la page Déployer iDRAC contient
un tableau énumérant les paramètres de configuration réseau IPv4 et IPv6
d'iDRAC de tous les serveurs installés. À l'aide de ce tableau, vous pouvez
configurer les paramètres de configuration réseau d'iDRAC pour chaque
serveur installé. Les valeurs initiales affichées dans chaque champ
correspondent aux valeurs actuelles provenant d'iDRAC. Lorsque vous
modifiez un champ et que vous cliquez sur Appliquer les paramètres réseau
d'iDRAC, le champ modifié est enregistré sur iDRAC.
Pour activer le Réseau iDRAC et configurer ses paramètres :
1 Ouvrez une session sur l'interface Web de CMC.
2 Cliquez sur Présentation des serveurs dans l'arborescence.
3 Cliquez sur l'onglet Configuration.
La page Déployer iDRAC apparaît.
4 Cochez la case QuickDeploy activé pour activer les paramètres de
déploiement rapide.
5 Définissez les Paramètres réseau d'iDRAC en conséquence.
Tableau 5-62. Paramètres réseau d'iDRAC
Paramètre Description
Logement Indique le logement occupé par le serveur du châssis. Les
numéros de logement sont des numéros séquentiels, qui
vont de 1 à 16 (16 logements sont disponibles dans le
châssis), qui permettent d'identifier l'emplacement des
serveurs dans le châssis.
REMARQUE : lorsqu'il y a moins de 16 serveurs dans les
logements, seuls les logements avec serveur sont affichés.
Nom Affiche le nom du serveur présent dans chaque logement.
Par défaut, les logements sont nommés SLOT-01 à
SLOT-16.
REMARQUE : le nom d'un logement ne peut être vide ou NUL.242 Utilisation de l'interface Web de CMC
Activer le réseau local Active (coché) ou désactive (décoché) le canal de réseau
local .
REMARQUE : lorsque le réseau local n'est pas sélectionné
(désactivé), aucun autre paramètre de configuration réseau
(IPMI sur réseau local, DHCP, Masque de sous-réseau de
l'adresse IP et Passerelle) n'est utilisé. Ces champs ne sont
pas accessibles.
Modifier le mot de
passe racine
Permet (lorsque la case est cochée) de modifier le mot de
passe de l'utilisateur racine iDRAC. Les champs Mot de
passe root d'iDRAC et Confirmer le mot de passe root
d'iDRAC doivent être remplis pour que cette opération
réussisse.
DHCP S'il est sélectionné, le protocole DHCP est utilisé pour
acquérir l'adresse IP, le masque de sous-réseau et la
passerelle par défaut d'iDRAC ; sinon, les valeurs définies
dans les champs de configuration réseau d'iDRAC sont
utilisées. Le réseau local doit être activé pour définir
ce champ.
IPMI sur le LAN Active (case cochée) ou désactive (case décochée) le canal
réseau local d'IPMI. Le réseau local doit être activé pour
définir ce champ.
Adresse IP Adresse IPv4 ou IPv6 statique assignée à iDRAC situé dans
ce logement.
Masque de sous-réseau Spécifie le masque de sous-réseau assigné au module
iDRAC installé dans ce logement.
Passerelle Spécifie la passerelle par défaut assignée au module iDRAC
installé dans ce logement.
Activer IPv4 Active iDRAC dans le logement pour utiliser le protocole
IPv4 sur le réseau. Vous devez sélectionner l'option Activer
le réseau local pour que cette option soit active. Le
paramètre par défaut est activé.
Tableau 5-62. Paramètres réseau d'iDRAC (suite)
Paramètre DescriptionUtilisation de l'interface Web de CMC 243
6 Pour déployer le paramètre sur iDRAC, cliquez sur le bouton Appliquer les
paramètres réseau d'iDRAC. Si vous avez modifié les paramètres de
déploiement rapide, ceux-ci seront également enregistrés.
7 Pour restaurer les paramètres réseau d'iDRAC sur les valeurs actuelles de
chaque serveur installé et pour mettre à jour le tableau Déploiement
rapide avec les derniers paramètres de déploiement rapide enregistrés,
cliquez sur Actualiser.
REMARQUE : si vous cliquez sur le bouton Actualiser, tous les paramètres de
configuration de QuickDeploy d'iDRAC et réseau d'iDRAC qui n'ont pas été
enregistrés sont supprimés.
Le tableau Paramètres réseau d'iDRAC reflète les futurs paramètres de
configuration réseau ; les valeurs affichées pour les serveurs installés peuvent
ou non être identiques aux paramètres de configuration réseau de l'iDRAC
actuellement installé. Après avoir apporté des modifications, appuyez sur le
bouton Actualiser pour mettre à jour la page Déployer iDRAC avec les
paramètres de configuration réseau de chaque iDRAC installé.
Activer IPv6 Active iDRAC dans le logement pour utiliser le protocole
IPv6 sur le réseau. Vous devez sélectionner l'option Activer
le réseau local et désélectionner l'option Configuration
automatique pour que cette option soit active. Le
paramètre par défaut est désactivé.
REMARQUE : cette option est disponible uniquement si le
serveur est conforme iPv6.
Configuration
automatique
Active iDRAC pour obtenir les paramètres IPv6 (adresse et
longueur de préfixe) auprès d'un serveur DHCPv6 et
autorise également la configuration automatique des
adresses statiques.
REMARQUE : cette option est disponible uniquement si le
serveur est conforme iPv6.
Longueur du préfixe Spécifie la longueur, en bits, du sous-réseau IPv6 auquel
appartient cet iDRAC.
Tableau 5-62. Paramètres réseau d'iDRAC (suite)
Paramètre Description244 Utilisation de l'interface Web de CMC
REMARQUE : les modifications apportées aux champs de QuickDeploy sont
immédiates. Cependant, la propagation, de CMC à iDRAC, des modifications
apportées à un ou plusieurs paramètres de configuration réseau de serveur iDRAC
risquent de prendre quelques minutes. Si vous appuyez trop tôt sur le bouton
Actualiser, des données partiellement correctes pour un ou plusieurs serveurs
iDRAC seront affichées.
Lancement de la console à distance depuis l'interface utilisateur
de CMC
Cette fonctionnalité vous permet de lancer une session clavier-écran-souris
directement sur le serveur.
Pour lancer la console à distance depuis la page d'accueil de l'interface
utilisateur de CMC :
1 Cliquez sur le serveur spécifié dans le graphique du châssis.
2 Dans Liens rapides, cliquez sur le lien Lancer la console distante.
Pour lancer une console distante de serveur à partir de la page Condition des
serveurs :
1 Dans l'arborescence du système, sélectionnez Présentation des serveurs.
2 Cliquez sur Lancer la console distante dans le tableau pour le serveur
spécifié.
Pour lancer une console distante de serveur pour une personne :
1 Développez Présentation des serveurs dans l'arborescence. Tous les
serveurs (1 à 16) s'affichent dans la liste développée des serveurs.
2 Dans l'arborescence du système, cliquez sur le serveur que vous souhaitez
afficher. La page Condition du serveur s'affiche.
3 Cliquez sur Lancer la console distante.
La fonctionnalité de console distante est prise en charge uniquement lorsque
toutes les conditions suivantes sont remplies :
• Le châssis est sous tension.
• Serveurs prenant en charge iDRAC6 et iDRAC7.
• L'interface de réseau local sur le serveur est activée.
• La version d'iDRAC est 2.20 ou ultérieure.Utilisation de l'interface Web de CMC 245
• Le système hôte dispose du JRE (Java Runtime Environment)
6 Update 16 ou ultérieur.
• Le navigateur sur le système hôte autorise les fenêtres contextuelles
(le blocage de fenêtres contextuelles est désactivé).
REMARQUE : la console distante peut également être lancée depuis l'interface
graphique d'iDRAC. Voir l'interface graphique d'iDRAC pour plus de détails.
Lancement d'iDRAC à l'aide d'une signature unique
CMC fournit une gestion limitée des composants individuels du châssis, tels
que les serveurs. Pour une gestion complète de ces composants individuels,
CMC fournit un point de lancement de l'interface Web du contrôleur de
gestion (iDRAC) du serveur.
Pour lancer la console de gestion iDRAC depuis la page Serveurs :
1 Ouvrez une session sur l'interface Web de CMC.
2 Cliquez sur Présentation des serveurs dans l'arborescence. La page
Condition du serveur s'affiche.
3 Cliquez sur l'icône Lancer l'interface utilisateur iDRAC correspondant au
serveur que vous voulez gérer.
Pour lancer la console de gestion d'iDRAC pour un serveur individuel :
1 Ouvrez une session sur l'interface Web de CMC.
2 Développez Présentation des serveurs dans l'arborescence. Tous les
serveurs (1 à 16) s'affichent dans la liste développée Serveurs.
3 Cliquez sur le serveur dont vous souhaitez afficher les informations. La
page Condition du serveur s'affiche.
4 Cliquez sur l'icône Lancer l'interface utilisateur iDRAC.
Un utilisateur peut lancer l'interface utilisateur iDRAC sans avoir à ouvrir une
session une deuxième fois, étant donné que cette fonctionnalité utilise
l'authentification unique. Les stratégies de connexion directe sont décrites
ci-dessous.
• Un utilisateur CMC ayant un privilège administratif sur le serveur sera
automatiquement connecté à iDRAC à l'aide de l'authentification unique.
Une fois sur le site iDRAC, les privilèges administrateur sont
automatiquement accordés à cet utilisateur. Cela est vrai même si
l'utilisateur n'a pas de compte sur iDRAC ou si le compte n'a pas de
privilèges administrateur. 246 Utilisation de l'interface Web de CMC
• Un utilisateur CMC qui n'a PAS de privilège administratif sur le serveur
mais a le même compte sur iDRAC sera automatiquement connecté à
iDRAC à l'aide de l'authentification unique. Une fois sur le site iDRAC, les
privilèges qui ont été créés pour le compte iDRAC sont accordés à
l'utilisateur.
• Un utilisateur CMC qui n'a pas de privilège administratif sur le serveur ou
le même compte sur iDRAC, ne sera PAS automatiquement connecté à
iDRAC à l'aide de l'authentification unique. Cet utilisateur est dirigé vers
la page d'ouverture de session iDRAC quand il appuie sur le bouton
Lancer l'interface utilisateur d'iDRAC.
REMARQUE : le terme « même compte » dans ce contexte signifie que l'utilisateur
a le même nom d'ouverture de session avec un mot de passe correspondant pour
CMC et pour iDRAC. Tout utilisateur qui a le même nom d'ouverture de session mais
un mot de passe différent n'est pas considéré comme ayant le même compte.
REMARQUE : les utilisateurs peuvent être invités à ouvrir une session sur iDRAC
(voir la troisième puce de la stratégie d'authentification unique ci-dessus).
REMARQUE : si le réseau local de réseau iDRAC est désactivé (Réseau local =
non), l'authentification unique n'est pas disponible.
REMARQUE : si le serveur est retiré du châssis, que l'adresse IP iDRAC est
modifiée ou qu'un problème de connexion survient au niveau du réseau iDRAC, une
page d'erreur peut s'afficher lorsque l'utilisateur clique sur l'icône Lancer
l'interface utilisateur iDRAC.
Clonage de serveur
La fonction de clonage de serveur permet à l'utilisateur d'appliquer tous les
paramètres BIOS clonables depuis un serveur spécifié vers un serveur ou plus.
Des paramètres BIOS clonables sont des paramètres BIOS qui peuvent être
modifiés et sont conçus pour être répliqués sur les serveurs.
La fonction de clonage du serveur prend en charge les serveurs iDRAC6 et
iDRAC7. Des serveurs iDRAC de générations antérieures sont répertoriés,
mais sont grisés sur la page principale et ne sont pas habilités à utiliser cette
fonction. Utilisation de l'interface Web de CMC 247
Pour utiliser la fonction de clonage de serveur :
• iDRAC doit disposer de la version minimale requise. Les serveurs iDRAC6
requièrent au minimum une version 3.2 et les serveurs iDRAC7 requièrent
une version 1.0.0.
• Le serveur doit disposer d'une génération prise en charge d'iDRAC.
• Le serveur doit être sous tension.
Vous devez configurer les paramètres BIOS à l'aide de fonction de clonage de
serveur uniquement via l'interface web du CMC. La page Profils BIOS vous
permet d'effectuer cette opération.
Pour accéder à la page Profils Bios, cliquez sur Présentation du serveur→
Configuration→ Profils.
Les serveurs source et cible doivent être de la même génération. Seuls les
paramètres clonables disponibles seront appliqués d'un profil de serveur à un
autre.
Capturer un profil
Avant de cloner les propriétés BIOS d'un serveur, vous devez capturer les
propriétés dans un profil stocké.
Lors de la création d'un profil stocké, attribuez à chaque profil un nom et une
description. Vous pouvez enregistrer un maximum de 16 Profils stockés sur le
support de stockage étendu non volatile du CMC.
La suppression ou la désactivation de supports de stockage étendu non
volatile empêchent l'accès aux profils stockés et désactivent la fonction de
clonage de serveur.
Appliquer un profil
Lorsque des profils stockés sont disponibles dans le support de stockage
étendu non volatile du CMC, appliquez un profil stocké à un serveur ou plus,
pour lancer une opération de clonage de serveur.
Pour chaque serveur, l'état, le numéro de logement et le nom du type
d'opération sont affichés dans le tableau Appliquer un profil. Après
l'application d'un profil stocké, dans un serveur, celui-ci doit être redémarré
immédiatement. 248 Utilisation de l'interface Web de CMC
Affichage des paramètres BIOS sur un serveur
Pour afficher les paramètres BIOS d'un serveur dans le tableau Appliquer un
profil, cliquez sur Afficher dans la colonne des paramètres BIOS de l'entrée
sélectionnée.
La page Afficher les paramètres s'affiche.
Seuls s'affichent les paramètres BIOS sur le serveur pouvant être modifiés par
l'application d'un profil (paramètres clonables). Les paramètres sont divisés
en groupes de manière semblable à l'affichage sur l'écran d'installation BIOS
d'iDRAC.
REMARQUE : toute modification apportée dans la console aux paramètres BIOS
de lames s'affiche sur la page Afficher les paramètres seulement après l'exécution
d'un inventaire de système sur la lame. À cet effet, le CSIOR (Collect System
Inventory On Reboot) doit être activé dans BIOS.
Gestion des profils stockés
Pour gérer les profils stockés sur le CMC, cliquez sur Gérer des profils dans le
tableau Appliquer un profil. La page de gestion des profils BIOS s'affiche.
La page de gestion de profils BIOS vous permet de modifier le nom et la
description d'un profil stocké, afficher les paramètres BIOS qu'il contient ou
effacer un profil stocké.
Journal des profils récents
Le tableau de Journal de profils récents sur la page de clonage de lame
principale répertorie les entrées récentes du journal de profils directement à
partir des opérations de clonage de serveur. Chaque journal de profil affiche la
gravité de même que l'heure et la date de soumission de l'opération de
clonage ainsi que la description du message du journal de clonage.
Les messages qui se trouvent dans le Journal de profils récents sont
également inscrits dans le journal RAC. Le tableau de Journal de profils
récents contient les 10 entrées les plus récentes du journal de profil. Pour
afficher les entrées disponibles, cliquez sur Aller au journal de profils.Utilisation de l'interface Web de CMC 249
État d'achèvement et dépannage
Pour vérifier l'état d'achèvement de l'application d'un profil BIOS requis :
1 Capturez l'id de la tâche soumise depuis le tableau Journal de profils
récents sur la page principale de clonage de serveur.
2 Recherchez le même id de tâche dans le tableau des Tâches sur la page
Tâches Lifecycle Controller Présentation du serveur→ Dépannage→
Tâches Lifecycle Controller).
FlexAddress
Cette section décrit les écrans de l'interface Web de la fonctionnalité
FlexAddress. FlexAddress est une mise à niveau facultative qui permet aux
modules serveurs de remplacer l'ID WWN/MAC d'usine par un ID
WWN/MAC fourni par le châssis.
REMARQUE : vous devez acheter et installer la mise à niveau FlexAddress pour
avoir accès à ces écrans de configuration. Si la mise à niveau n'a pas été achetée
et installée, le texte suivant s'affiche sur l'interface Web :
Optional feature not installed. See the Dell
Chassis Management Controller Users Guide for
information on the chassis-based WWN and MAC
address administration feature.
To purchase this feature, please contact Dell at
www.dell.com.
Affichage de l'état de FlexAddress
Vous pouvez utiliser l'interface Web pour consulter des informations sur l'état
de FlexAddress. Vous pouvez consulter les informations relatives à l'ensemble
du châssis ou à un serveur particulier. Les informations affichées incluent :
• Configuration des structures
• Fonctionnalité FlexAddress activée/désactivée
• Numéro et nom du logement
• Adresses attribuées par le châssis et le serveur
• Adresses en cours d'utilisation250 Utilisation de l'interface Web de CMC
REMARQUE : vous pouvez également consulter l'état de FlexAddress à l'aide de
l'interface de ligne de commande. Pour plus d'informations sur les commandes,
voir « Utilisation de FlexAddress », à la page 263.
Consultation de l'état de FlexAddress pour le châssis
Les informations sur l'état de FlexAddress peuvent concerner l'ensemble du
châssis. Les informations de condition indiquent si la fonctionnalité est
active et fournissent un aperçu de la condition de FlexAddress pour chaque
serveur.
Pour savoir si FlexAddress est actif pour le châssis :
1 Ouvrez une session sur l'interface Web (voir « Accès à l'interface Web
CMC », à la page 111).
2 Cliquez sur Présentation du châssis dans l'arborescence.
3 Cliquez sur l'onglet Configuration. La page Configuration générale
apparaît. L'entrée FlexAddress est marquée comme Actif ou Non actif.
Actif indique que la fonctionnalité est installée sur le châssis. Non actif
indique que la fonctionnalité n'est pas installée et n'est pas utilisée par le
châssis.
Pour afficher une présentation des conditions FlexAddress pour chaque
module du serveur :
1 Connectez-vous à l'interface Web (« Accès à l'interface Web CMC », à la
page 111).
2 Cliquez sur Présentation des serveurs→ Propriétés→ WWN/MAC.
3 La page Résumé FlexAddress s'affiche. Cette page vous permet de
consulter la configuration WWN et les adresses MAC de tous les
logements du châssis.
La page d'état fournit les informations suivantes :
Configuration
de la structure
Structure A, Structure B, et Structure C affichent le type des
structures d'entrée/sortie installées.
iDRAC affiche l'adresse MAC de gestion du serveur.
REMARQUE : si la structure A est activée, les logements inoccupés
affichent les adresses MAC attribuées par le châssis pour la structure
A et MAC ou WWN pour les structures B et C s'ils sont utilisés par les
logements occupés.Utilisation de l'interface Web de CMC 251
4 Pour des informations supplémentaires, cliquez sur Aide.
Consulter l'état de FlexAddress pour le serveur
Il est également possible d'afficher des informations relatives à l'état de
FlexAddress pour chaque serveur. Les informations au niveau d'un serveur
comportent un résumé de l'état de FlexAddress pour ce serveur.
Pour afficher les informations FlexAddress des serveurs :
1 Ouvrez une session sur l'interface Web (voir « Accès à l'interface Web
CMC », à la page 111).
2 Développez Présentation des serveurs dans l'arborescence. Tous les
serveurs (1 à 16) s'affichent dans la liste développée Serveurs.
3 Cliquez sur le serveur dont vous souhaitez afficher les informations.
La page Condition du serveur s'affiche.
4 Cliquez sur l'onglet Configuration, puis sur le sous-onglet FlexAddress. La
page Déployer FlexAddress s'affiche. Cette page vous permet de consulter
la configuration WWN et les adresses MAC du serveur sélectionné.
Adresses WWN/
MAC
Affiche la configuration FlexAddress de chaque logement du
châssis. Les informations affichées comprennent :
• Le contrôleur de gestion d'iDRAC n'est pas une structure, mais son
adresse FlexAddress est traitée en tant que telle.
• L'emplacement et le nom des logements
• L'état de FlexAddress (actif/ non actif)
• Le type de structure
• Les adresses WWN/MAC en cours d'utilisation attribuées par le
châssis et attribuées par le serveur
Une coche verte indique le type de l'adresse active, soit attribuée
par le serveur, soit attribuée par le châssis.252 Utilisation de l'interface Web de CMC
La page d'état fournit les informations suivantes :
Tableau 5-63. Informations sur la page d'état
FlexAddress
activé
Indique si la fonctionnalité FlexAddress est activée ou non pour ce
logement particulier.
État actuel Affiche la configuration actuelle de FlexAddress :
• Attribuée par le châssis : l'adresse de logement sélectionnée est
attribuée par le châssis à l'aide de FlexAddress. Les adresses
WWN/MAC des logements restent identiques, même si un
nouveau serveur est installé.
• Attribuée par le serveur : le serveur utilise l'adresse attribuée par le
serveur ou l'adresse par défaut incorporée au matériel du
contrôleur.
État de
l'alimentation
Affiche la condition actuelle de l'alimentation des serveurs. Les
valeurs sont les suivantes : Allumé, Mise sous tension, Mise hors
tension, Éteint, et - (si aucun serveur n'est présent).Utilisation de l'interface Web de CMC 253
Intégrité OK Indique que la fonctionnalité FlexAddress
est présente et fournit son état à CMC.
En cas de perte des communications
entre CMC et FlexAddress, CMC ne
pourra pas obtenir ni afficher la condition
de l'intégrité de FlexAddress.
Informatif Affiche des informations sur FlexAddress
en l'absence de modification de la
condition de l'intégrité
(OK, Avertissement, Critique).
Avertissement Indique que seules des alertes
d'avertissement ont été émises et que des
actions correctives doivent être
effectuées. Si aucune action corrective
n'est effectuée, des pannes critiques
susceptibles d'affecter l'intégrité du
serveur peuvent se produire.
Critique Indique qu'au moins une alerte de panne
a été générée. La condition Critique
représente une panne système du serveur
et des actions correctives doivent être
effectuées immédiatement.
Aucune valeur Lorsque la fonctionnalité FlexAddress est
absente, les informations d'intégrité ne
sont pas fournies.
Micrologiciel
iDRAC
Indique la version d'iDRAC actuellement installée sur le serveur.
Version du BIOS Affiche la version actuelle du BIOS du module de serveur.
Logement Numéro de logement du serveur associé à l'emplacement de la
structure.
Emplacement Affiche l'emplacement du module d'entrée/sortie (E/S) dans le
châssis sous forme de numéro de groupe (A, B, ou C)/numéro de
logement (1 ou 2). Noms de logement : A1, A2, B1, B2, C1 ou C2.
Structure Affiche le type de structure.
Tableau 5-63. Informations sur la page d'état (suite)254 Utilisation de l'interface Web de CMC
5 Pour des informations supplémentaires, cliquez sur Aide.
Configurer FlexAddress
Si vous l'achetez en même temps que le châssis, il sera installé et activé à la
mise sous tension du système. Si vous achetez FlexAdress séparément,
vous devez installer la carte de fonctionnalité SD conformément aux
instructions fournies dans le document Spécifications techniques de la carte
Secure Digital (SD) de Chassis Management Controller (CMC). Vous
trouverez ce document sur le site web support.dell.com/manuals.
Vous devez mettre le serveur hors tension avant de commencer la
configuration. Vous pouvez activer ou désactiver FlexAddress structure par
structure. Vous pouvez également activer/désactiver cette fonctionnalité
logement par logement. Une fois que vous avez activé cette fonctionnalité par
structure, vous pouvez sélectionner les logements à activer. Par exemple, si la
structure A est activée, la fonctionnalité FlexAddress est activée uniquement
sur la structure A des logements activés. Toutes les autres structures utilisent
les identifiants WWN/MAC d'usine sur le serveur.
La fonctionnalité FlexAddress est activée sur tous les logements sélectionnés
pour les structures activées. Par exemple, il n'est pas possible d'activer les
structures A et B et d'activer FlexAddress pour le logement 1 de la structure A,
mais pas de la structure B.
REMARQUE : vous pouvez également configurer FlexAddress à l'aide de
l'interface de ligne de commande. Pour plus d'informations sur les commandes,
voir « Utilisation de FlexAddress », à la page 263.
REMARQUE : assurez-vous que les serveurs lames sont hors tension avant de
changer l'adresse flex de niveau de structure (A, B, C, or DRAC).
Attribuée par le
serveur
Affiche les adresses WWN/MAC attribuées par le serveur qui sont
incorporées au matériel du contrôleur.
Attribuée par le
châssis
Affiche les adresses WWN/MAC qui sont utilisées pour ce
logement particulier.
Tableau 5-63. Informations sur la page d'état (suite)Utilisation de l'interface Web de CMC 255
Configuration de FlexAddress pour les logements et les structures au
niveau du châssis
Vous pouvez activer ou désactiver la fonctionnalité FlexAddress pour des
structures et des logements au niveau du châssis. Cette fonctionnalité est
d'abord activée structure par structure ; c'est seulement ensuite qu'elle est
activée pour des logements. Les structures et les logements doivent être
activés pour configurer FlexAddress.
Effectuez les étapes suivantes pour activer ou désactiver des structures et des
logements afin d'utiliser la fonctionnalité FlexAddress :
1 Ouvrez une session sur l'interface Web (voir « Accès à l'interface Web
CMC », à la page 111).
2 Cliquez sur Présentation des serveurs dans l'arborescence.
3 Cliquez sur l'onglet Configuration→ sous-onglet FlexAddress. La page
Déployer FlexAddress s'affiche.
4 La section Sélectionner des structures pour WWN/MAC attribués par le
châssis comporte une case à cocher pour Structure A, Structure B,
Structure C et iDRAC.
5 Cliquez sur la case à cocher de chaque structure pour laquelle vous voulez
activer FlexAddress. Pour désactiver une structure, décochez la case située
en regard de celle-ci.
REMARQUE : si aucune structure n'est sélectionnée, FlexAddress n'est pas
activé pour les logements sélectionnés.
Dans la page Sélectionner des logements pour les WWN/MAC attribuées
par le châssis la case de chacun des logements (1à 16) est activée.
6 Cliquez sur la case Activée de chaque logement pour lequel vous souhaitez
activer FlexAddress. Si vous souhaitez sélectionner tous les logements,
cochez la case Sélectionner/Désélectionner tout. Pour désactiver un
logement, décochez la case Activée.
REMARQUE : si un serveur est présent dans le logement, mettez-le hors tension
pour pouvoir activer la fonctionnalité FlexAddress sur ce logement.
REMARQUE : si aucun logement n'est sélectionné, FlexAddress n'est pas activé
pour les structures sélectionnées.
7 Cliquez sur Appliquer pour enregistrer les modifications. Pour des
informations supplémentaires, cliquez sur Aide. 256 Utilisation de l'interface Web de CMC
Configuration de FlexAddress pour les logements au niveau du serveur
Vous pouvez activer ou désactiver la fonctionnalité FlexAddress pour
des logements au niveau du serveur.
Pour activer ou désactiver un logement individuel afin d'utiliser la
fonctionnalité FlexAddress :
1 Ouvrez une session sur l'interface Web (voir « Accès à l'interface Web
CMC », à la page 111).
2 Développez Présentation des serveurs dans l'arborescence. Tous les
serveurs (1 à 16) s'affichent dans la liste développée Serveurs.
3 Cliquez sur le serveur dont vous souhaitez afficher les informations. La
page Condition du serveur s'affiche.
4 Cliquez sur l'onglet Configuration, puis sur le sous-onglet FlexAddress. La
page État de FlexAddress s'affiche.
5 Utilisez le menu déroulant FlexAddress activé pour effectuer votre
sélection. Sélectionnez Oui pour activer FlexAddress et Non pour
désactiver la fonctionnalité.
6 Cliquez sur Appliquer pour enregistrer les modifications. Pour des
informations supplémentaires, cliquez sur Aide.
Partage de fichiers distants
L'option Partage de fichiers de média virtuel distants mappe un fichier depuis
un lecteur de partage sur le réseau à un ou plusieurs serveurs via CMC pour
déployer ou mettre à jour un système d'exploitation. Lorsque la connexion est
établie, le fichier distant est accessible comme s'il se trouvait sur le
système local. Deux types de média sont pris en charge : lecteurs de disquette
et lecteurs de CD/DVD.
1 Ouvrez une session sur l'interface Web (voir « Accès à l'interface Web
CMC », à la page 111).
2 Cliquez sur Présentation des serveurs dans l'arborescence.
3 Cliquez sur l'onglet Configuration, puis sur le sous-onglet Partage de
fichiers distants. La page Déployer le partage de fichiers distants apparaît.
4 Définissez les paramètres Partage de fichiers distants.Utilisation de l'interface Web de CMC 257
Tableau 5-64. Paramètres Partage de fichiers distants
Paramètre Description
Chemin d'accès
du fichier
image
Le chemin des fichiers image est requis uniquement pour les
opérations de connexion et de déploiement. Il ne s'applique pas aux
opérations de déconnexion. Le nom du chemin du lecteur réseau
est monté sur le serveur via un protocole SMB Windows ou NFS
Linux/Unix.
Par exemple, pour vous connecter au CIFS, tapez :
////
Pour vous connecter au NFS, tapez :
//://
Les noms de fichiers qui se terminent par .img sont connectés en
tant que disquettes virtuelles. Les noms de fichiers qui se terminent
par .iso sont connectés en tant que CD/DVD virtuels. Le nom peut
comporter jusqu'à 511 caractères.
Nom
d'utilisateur
Le nom d'utilisateur est requis uniquement pour les opérations de
connexion et de déploiement. Il ne s'applique pas aux opérations de
déconnexion. Le nombre maximum de caractères pouvant être
spécifiés dans ce champ est 40.
Mot de passe Le mot de passe est requis uniquement pour les opérations de
connexion et de déploiement. Il ne s'applique pas aux opérations de
déconnexion. Le nombre maximum de caractères pouvant être
spécifiés dans ce champ est 40.
Logement Identifie l'emplacement du logement. Les numéros de logement
sont séquentiels, de 1 à 16 (pour les 16 logements disponibles dans
le châssis).
Nom Indique le nom du logement. Les logements sont nommés selon
leur position dans le châssis.
Modèle Affiche le nom du modèle du serveur.258 Utilisation de l'interface Web de CMC
5 Cliquez sur Connecter pour vous connecter à un partage de fichiers
distant. Pour vous connecter à un partage de fichiers distants, vous devez
fournir le chemin, le nom d'utilisateur et le mot de passe. La réussite de
l'opération vous permet d'accéder au média.
Cliquez sur Déconnecter pour vous déconnecter d'un partage de fichiers
distant précédemment connecté.
Cliquez sur Déployer pour déployer le périphérique du média.
REMARQUE : enregistrez tous les fichiers de travail avant d'exécuter la
commande deploy car cette action entraîne le redémarrage du serveur.
Cette commande implique les actions suivantes :
– Le partage de fichiers distant est connecté.
– Le fichier est sélectionné comme premier périphérique d'amorçage
pour les serveurs.
– Le serveur est redémarré.
– Le serveur est mis sous tension s'il était hors tension.
État de
l'alimentation
Affiche l'état d'alimentation du serveur :
- : CMC n'a pas encore déterminé l'état d'alimentation du serveur.
Désactivé : le serveur ou le châssis est hors tension.
Activé : le châssis et le serveur sont sous tension.
Mise sous tension : état temporaire entre Désactivé et Activé. En
cas de réussite, l'état de l'alimentation est Activé.
Mise hors tension : état temporaire entre Activé et Désactivé. En
cas de réussite, l'état de l'alimentation est Désactivé.
Condition de la
connexion
Affiche la condition de la connexion du partage de fichiers distant.
Sélectionner/D
ésélectionner
tout
Sélectionnez cette option avant de lancer une opération de partage
de fichiers distant. Les opérations de partage de fichiers distants
sont les suivantes : Connecter, Déconnecter et Déployer.
Tableau 5-64. Paramètres Partage de fichiers distants (suite)
Paramètre DescriptionUtilisation de l'interface Web de CMC 259
Questions les plus fréquentes
La Figure 5-65répertorie les questions fréquemment posées concernant la
gestion et la récupération d'un système distant.
Tableau 5-65. Gestion et récupération d'un système distant
Question Réponse
Lorsque j'accède à l'interface
Web CMC, un avertissement de
sécurité s'affiche et indique que
le nom d'hôte du certificat SSL
ne correspond pas au nom d'hôte
CMC.
CMC est doté d'un certificat de serveur CMC par
défaut qui assure la sécurisation du réseau pour
l'interface Web et les fonctionnalités de RACADM
à distance. Lorsque ce certificat est utilisé, le
navigateur Web affiche un avertissement de
sécurité car le certificat par défaut est attribué au
certificat par défaut CMC, lequel ne correspond
pas au nom d'hôte CMC (l'adresse IP, par
exemple).
Pour corriger ce problème de sécurité, téléversez
un certificat de serveur CMC attribué à l'adresse
IP CMC. Lorsque vous générez la requête de
signature de certificat (RSC) qui servira à émettre
le certificat, assurez-vous que le nom commun
(CN) de la RSC correspond à l'adresse IP CMC
(192.168.0.120, par exemple) ou au nom de CMC
DNS enregistré.
Afin de vous assurer que la RSC correspond au
nom de DNS CMC enregistré :
1 Cliquez sur Présentation du châssis dans
l'arborescence système.
2 Cliquez sur l'onglet Réseau, puis sur Réseau. La
page Configuration du réseau apparaît.
3 Cochez la case Enregistrer CMC sur DNS.
4 Dans le champ Nom CMC DNS, saisissez le
nom CMC.
5 Cliquez sur Appliquer les modifications.
Voir « Sécurisation des communications CMC à
l'aide de certificats SSL et numériques », à la
page 197 pour plus d'informations sur la
génération de RSC et l'émission de certificats.260 Utilisation de l'interface Web de CMC
RACADM distante et les services
Web ne sont plus disponibles
lorsque les propriétés sont
modifiées. Pourquoi ?
Après la réinitialisation du Web Server CMC, il
peut s'écouler une minute avant que les services
RACADM à distance et l'interface Web ne
redeviennent disponibles.
Le Web Server CMC est réinitialisé dans les cas
suivants :
• quand la configuration réseau ou les propriétés
de sécurité réseau sont modifiées à l'aide de
l'interface utilisateur Web CMC.
• quand la propriété cfgRacTuneHttpsPort est
modifiée (y compris lorsqu'une commande
config -f la
modifie).
• quand la commande racresetcfg est utilisée ou
que la sauvegarde de la configuration du châssis
est restaurée.
• quand CMC est réinitialisé.
• quand un nouveau certificat de serveur SSL est
téléversé.
Mon serveur DNS n'enregistre
pas mon CMC. Pourquoi ?
Certains serveurs DNS ne peuvent enregistrer que
des noms de 31 caractères maximum.
Lorsque j'accède à l'interface
Web CMC, un avertissement de
sécurité s'affiche et indique que
le certificat SSL a été émis par
une autorité de certification qui
n'est pas fiable.
CMC est doté d'un certificat de serveur CMC par
défaut qui assure la sécurisation du réseau pour
l'interface Web et les fonctionnalités de RACADM
à distance. Ce certificat n'est pas émis par une
autorité de certification de confiance. Pour
résoudre ce problème de sécurité, téléversez un
certificat de serveur CMC émis par une autorité de
certification de confiance (Thawte ou Verisign, par
exemple). Pour plus d'informations sur l'émission
de certificats, voir « Sécurisation des
communications CMC à l'aide de certificats SSL
et numériques », à la page 197.
Tableau 5-65. Gestion et récupération d'un système distant (suite)
Question RéponseUtilisation de l'interface Web de CMC 261
Dépannage du CMC
L'interface Web CMC fournit des outils d'identification, de diagnostic et de
résolution des problèmes rencontrés avec votre châssis. Pour plus
d'informations sur la résolution des problèmes, voir « Dépannage et
récupération » à la page 433.
Le message suivant s'affiche pour
des raisons inconnues :
Remote Access: SNMP
Authentication Failure
Pourquoi ?
Pendant la découverte, IT Assistant essaie de
vérifier les noms de communauté get et set du
périphérique. Dans IT Assistant, le nom de
communauté get = public et le nom de
communauté set = private. Par défaut, le nom de
communauté de l'agent CMC est public. Lorsque
IT Assistant envoie une requête de définition,
l'agent CMC génère une erreur d'authentification
SNMP car il accepte uniquement les requêtes de la
communauté = public
Vous pouvez changer le nom de communauté
CMC à l'aide de RACADM.
Pour afficher le nom de communauté CMC,
utilisez la commande suivante :
racadm getconfig -g cfgOobSnmp
Pour définir le nom de communauté CMC,
utilisez la commande suivante :
racadm config -g cfgOobSnmp -o
cfgOobSnmpAgentCommunity
Pour ne pas générer d'interruption
d'authentification SNMP, vous devez entrer des
noms de communauté qui seront acceptés par
l'agent. Comme CMC n'accepte qu'un seul nom
de communauté, vous devez entrer le même nom
pour les communautés get et set lorsque vous
configurez les découvertes sous IT Assistant.
Tableau 5-65. Gestion et récupération d'un système distant (suite)
Question Réponse262 Utilisation de l'interface Web de CMCUtilisation de FlexAddress 263
Utilisation de FlexAddress
La fonctionnalité FlexAddress est une mise à niveau facultative qui permet
aux modules serveurs de remplacer les ID réseau World Wide Name et Media
Access Control (WWN/MAC) d'usine par des ID WWN/MAC fournis par le
châssis.
Chaque module serveur se voit attribuer des ID WWN et/ou MAC uniques
lors de la fabrication. Avant FlexAddress, si vous deviez remplacer un module
de serveur par un autre, les identifiants WWN/MAC changeaient et il fallait
alors reconfigurer les outils de gestion réseau Ethernet et les ressources du
SAN pour prendre en compte le nouveau module de serveur.
FlexAddress permet à CMC d'attribuer des identifiants WWN/MAC à un
logement particulier et de remplacer les identifiants définis en usine. Les
identifiants WWN/MAC des logements sont conservés lors du remplacement
du module de serveur. Grâce à cette fonctionnalité, il n'est plus nécessaire de
reconfigurer les outils de gestion réseau Ethernet et les ressources du SAN lors
de l'ajout d'un nouveau module de serveur.
De plus, le remplacement s'effectue uniquement lorsqu'un module de serveur
est inséré dans un châssis pour lequel la fonctionnalité FlexAddress est activée,
aucune modification permanente n'est apportée au module de serveur. Si vous
déplacez un module de serveur dans un châssis qui ne prend pas en charge
FlexAddress, les identifiants WWN/MAC définis en usine sont utilisés.
Avant d'installer FlexAddress, vous pouvez déterminer la plage d'adresses MAC
contenue dans une carte de fonctionnalité FlexAddress en insérant la carte SD
dans un lecteur de cartes mémoire USB et en consultant le fichier
pwwn_mac.xml. Ce fichier XML de la carte SD n'est pas crypté et contient une
balise XML mac_start qui représente la première adresse MAC hexadécimale
utilisée pour cette plage d'adresses MAC unique. Le marqueur mac_count
représente le nombre total d'adresses MAC allouées par la carte SD. La plage
totale d'adresses MAC allouées peut être déterminée par l'opération suivante :
+ 0xCF (208 - 1) = mac_end
où 208 correspond à mac_count et la formule est
+ - 1 = 264 Utilisation de FlexAddress
Par exemple : (starting_mac)00188BFFDCFA + 0xCF =
(ending_mac)00188BFFDDC9.
REMARQUE : verrouillez la carte SD avant de l'insérer dans le « lecteur de cartes
mémoire » USB pour éviter d'en modifier le contenu accidentellement. Vous devez
déverrouiller la carte SD avant de l'insérer dans le module CMC.
Activation de FlexAddress
FlexAddress est livré sur une carte Secure Digital (SD) qui doit être insérée
dans CMC pour activer la fonctionnalité. Pour activer la fonctionnalité
FlexAddress, des mises à jour logicielles peuvent être requises ; si vous
n'activez pas FlexAddress, ces mises à jour ne sont pas requises. Les mises à
jour, répertoriées dans le tableau ci-dessous, comprennent les BIOS des
modules de serveur, les BIOS ou micrologiciels des cartes porteuses d'E/S et
les micrologiciels CMC. Vous devez appliquer ces mises à jour avant d'activer
FlexAddress. Si ces mises à jour ne sont pas appliquées, la fonctionnalité
FlexAddress peut ne pas fonctionner comme prévu.
Composant Version minimale requise
Carte mezzanine Ethernet : Broadcom
M5708t, 5709, 5710
Micrologiciel du code de démarrage 4.4.1
ou ultérieur
Micrologiciel de démarrage iSCSI 2.7.11
ou ultérieur
Micrologiciel PXE 4.4.3 ou ultérieur
Carte mezzanine FC :
QLogic QME2472, FC8
BIOS 2.04 ou ultérieur
Carte mezzanine FC :
Emulex LPe1105-M4, FC8
BIOS 3.03a3 et micrologiciel 2.72A2
ou ultérieurUtilisation de FlexAddress 265
REMARQUE : tout système commandé après le mois de juin 2008 intègre les
versions de micrologiel adéquates.
Pour assurer un déploiement correct de la fonctionnalité FlexAddress, mettez
à jour le BIOS et le micrologiciel dans l'ordre suivant :
1 Mettez à jour le BIOS et tout le micrologiciel de la carte mezzanine.
2 Mettez à jour le BIOS du module serveur.
3 Mettez à jour le micrologiciel iDRAC sur le module serveur.
4 Mettez à jour tout le micrologiciel CMC dans le châssis ; s'il y a des
contrôleurs CMC redondants, assurez-vous que les deux soient mis à jour.
5 Insérez la carte SD dans le module passif pour un système à contrôleur
CMC redondant ou dans le contrôleur CMC unique pour un système
non-redondant.
REMARQUE : la fonctionnalité n'est pas activée si le micrologiciel CMC qui prend
en charge FlexAddress (version 1.10 ou ultérieure) n'est pas installé.
BIOS du module serveur PowerEdge M600 – BIOS 2.02
ou version ultérieure
PowerEdge M605 – BIOS 2.03
ou version ultérieure
PowerEdge M805
PowerEdge M905
PowerEdge M610
PowerEdge M710
PowerEdge M710hd
LAN sur carte mère (LOM) de
PowerEdge M600/M605
Micrologiciel du code de démarrage 4.4.1
ou ultérieur
Micrologiciel de démarrage iSCSI 2.7.11
ou ultérieur
iDRAC Version 1.50 ou ultérieure pour les systèmes
PowerEdge xx0x
Version 2.10 ou ultérieure pour les systèmes
PowerEdge xx1x
CMC Version 1.10 ou ultérieure
Composant Version minimale requise266 Utilisation de FlexAddress
Voir le document Spécifications techniques de la carte Secure Digital (SD) de
Chassis Management Controller (CMC) pour installer la carte SD.
REMARQUE : la carte SD dispose d'une fonctionnalité FlexAddress. Les données
contenues dans la carte SD sont cryptées et ne peuvent en aucune façon être
dupliquées ou modifiées afin de garantir que le système et ses fonctions restent
opérationnels.
REMARQUE : vous ne pouvez utiliser la carte SD que sur un seul châssis à la fois.
Si vous avez plusieurs châssis, vous devez acheter d'autres cartes SD.
L'activation de la fonctionnalité FlexAddress est automatique au redémarrage
de CMC une fois que la carte de fonctionnalité SD est installée ; cette
activation lie la fonctionnalité au châssis actuel. Si la carte SD est installée sur
le contrôleur CMC redondant, l'activation de la fonctionnalité FlexAddress
n'a lieu que lorsque le CMC redondant devient actif. Consultez le document
Spécifications techniques de la carte Secure Digital (SD) de Chassis
Management Controller (CMC) pour plus d'informations sur l'activation du
contrôleur CMC de secours.
Lorsque CMC a redémarré, vérifiez l'activation en suivant les instructions de la
section suivante, « Vérification de l'activation de FlexAddress », à la page 266.
Vérification de l'activation de FlexAddress
Vous pouvez utiliser des commandes de l'utilitaire RACADM pour vérifier
l'activation de la carte de fonctionnalité SD et l'activation FlexAddress.
Utilisez la commande de l'utilitaire RACADM suivante pour vérifier la carte
de fonctionnalité SD et son état :
racadm featurecard -sUtilisation de FlexAddress 267
Utilisez la commande RACADM suivante pour afficher toutes les
fonctionnalités activées sur le châssis :
racadm feature -s
La commande renvoie le message d'état suivant :
Feature = FlexAddress
Date Activated = 8 April 2008 - 10:39:40
Feature installed from SD-card SN = 01122334455
Tableau 6-1. Messages d'état renvoyés par la commande featurecard -s
Message d'état Actions
Aucune carte de fonction insérée. Vérifiez que la carte SD est correctement
insérée dans le contrôleur CMC. Dans une
configuration CMC redondante, assurez-vous
que le CMC sur lequel est installée la carte de
fonctionnalité SD est le contrôleur CMC
actif, et non celui de secours.
La carte de fonction insérée est
valide et contient la fonctionnalité
FlexAddress suivante : la carte de
fonction est liée à ce châssis.
Aucune action n'est requise.
La carte de fonction insérée est
valide et contient la ou les
fonction(s) suivante(s) FlexAddress :
La carte de fonction est liée à un
autre châssis,
svctag = ABC1234, SD card
SN = 01122334455
Retirez la carte SD, localisez et installez la
carte SD du châssis actuel.
La carte de fonction insérée est
valide et contient la fonctionnalité
FlexAddress suivante : la carte de
fonction n'est pas liée à ce châssis.
Cette carte de fonctionnalité SD peut être
déplacée dans un autre châssis ou réactivée dans
le châssis actuel. Pour la réactiver dans le châssis
actuel, entrez racadm racreset jusqu'à ce
que le module CMC dans lequel la carte de
fonctionnalité est installée devienne actif.268 Utilisation de FlexAddress
Si aucune fonctionnalité n'est active sur le châssis, la commande
renvoie le message :
racadm feature -s
No features active on the chassis.
Les cartes de fonction Dell peuvent contenir plusieurs fonctions. Une fois
toutes les fonctions figurant sur une carte de fonction Dell activées sur un
châssis, les autres fonctions pouvant être incluses sur cette carte Dell ne
peuvent pas être activées sur un châssis différent. Dans ce cas, la commande -s
de la fonction racadm affiche le message suivant pour les fonctions concernées :
ERROR: One or more features on the SD card are active
on another chassis.
Pour des informations supplémentaires sur les commandes RACADM, voir les
sections de commandes fonction et carte de fonction du Guide de référence
de ligne de commande RACADM pour iDRAC6 et CMC.
Désactivation de FlexAddress
Il est possible de désactiver la fonctionnalité FlexAddress et de rétablir la
carte SD à l'état précédant l'installation à l'aide d'une commande RACADM.
Il n'existe aucune fonctionnalité de désactivation dans l'interface Web. La
désactivation rétablit l'état d'origine de la carte SD : elle peut alors être
installée et activée sur un autre châssis.
REMARQUE : la carte SD doit être installée physiquement sur CMC et le châssis
doit être mis hors tension avant l'exécution de er la commande de désactivation.
Si vous exécutez la commande de désactivation alors qu'aucune carte n'est
installée ou lorsqu'une carte provenant d'un autre châssis est présente, la
fonctionnalité est alors désactivée et aucune modification n'est apportée à
la carte.
Désactivation de FlexAddress
Utilisez la commande RACADM suivante pour désactiver la fonctionnalité
FlexAddress et restaurer la carte SD :
racadm feature -d -c flexaddressUtilisation de FlexAddress 269
Si la désactivation réussit, la commande renvoie le message d'état suivant :
feature FlexAddress is deactivated on the chassis
successfully.
Si le châssis n'a pas été mis hors tension avant l'exécution, la commande
échoue et renvoie le message d'erreur suivant :
ERROR: Unable to deactivate the feature because the
chassis is powered ON
Pour des informations supplémentaires sur la commande, voir la section de
commande fonction du Guide de référence de ligne de commande RACADM
pour iDRAC6 et CMC.
Configuration de FlexAddress à l'aide de la CLI
REMARQUE : vous devez activer à la fois le logement et la structure pour que
l'adresse MAC assignée par le châssis soit poussée vers iDRAC.
. REMARQUE : vous pouvez également consulter la condition de FlexAddress à
l'aide de l'interface utilisateur graphique. Pour plus d'informations, voir
« FlexAddress », à la page 249.
Vous pouvez utiliser l'interface de ligne de commande pour activer ou
désactiver FlexAddress structure par structure. Vous pouvez également
activer/désactiver cette fonctionnalité logement par logement. Une fois que
vous avez activé cette fonctionnalité par structure, vous pouvez sélectionner
les logements à activer. Par exemple, si seule la structure A est activée,
FlexAddress est activée uniquement sur la structure A des logements activés.
Toutes les autres structures utilisent les identifiants WWN/MAC d'usine sur
le serveur. Pour que cette fonctionnalité fonctionne, la structure doit être
activée et le serveur doit être mis hors tension.
FlexAddress est activée sur les logements activés de toutes les structures qui
sont activées. Par exemple, il n'est pas possible d'activer les structures A et B
et d'activer FlexAddress pour le logement 1 de la structure A, mais pas de la
structure B.
Utilisez la commande de l'utilitaire RACADM suivante pour activer ou
désactiver les structures :
racadm setflexaddr [-f ]
= A, B, C or iDRAC
= 0 or 1270 Utilisation de FlexAddress
Où 0 est désactivé et 1 activé.
Utilisez la commande de l'utilitaire RACADM suivante pour activer ou
désactiver des logements :
racadm setflexaddr [-i ]
= 1 to 16
= 0 or 1
Où 0 est désactivé et 1 activé.
Pour des informations supplémentaires sur la commande, voir la section de
commande setflexaddr du Guide de référence de ligne de commande RACADM
pour iDRAC6 et CMC.
Configuration complémentaire de FlexAddress pour Linux
Lorsque vous passez d'un ID MAC attribué par le serveur à un ID MAC
attribué par le châssis sur un système d'exploitation basé sur Linux, il peut
être nécessaire d'effectuer des étapes de configuration supplémentaires :
• SUSE Linux Enterprise Server 9 et 10 : vous devez exécuter YAST
(Yet another Setup Tool) sur votre système Linux pour configurer vos
périphériques réseau, puis redémarrer les services réseau.
• Red Hat Enterprise Linux 4 (RHEL) et RHEL 5 : exécutez Kudzu, un utilitaire
permettant de détecter et de configurer le matériel ajouté/modifié sur le
système. Kudzu comprend le menu de découverte du matériel ; il détecte les
modifications des adresses MAC lors du retrait et de l'ajout de matériel.
Consultation de l'état de FlexAddress à l'aide de
la CLI
Vous pouvez utiliser l'interface de ligne de commande pour consulter les
informations d'état de FlexAddress. Vous pouvez consulter les informations
relatives à la condition pour l'ensemble du châssis ou un logement particulier.
Les informations affichées incluent :
• Configuration des structures
• FlexAddress activée/désactivée
• Numéro et nom du logement
• Adresses attribuées par le châssis et le serveur
• Adresses en cours d'utilisationUtilisation de FlexAddress 271
Utilisez la commande RACADM suivante pour afficher l'état de FlexAddress
sur l'ensemble du châssis :
racadm getflexaddr
Pour afficher l'état FlexAddress d'un logement particulier :
racadm getflexaddr [-i ]
= 1 to 16
Voir « Configuration de FlexAddress à l'aide de la CLI », à la page 269 pour
des détails supplémentaires sur la configuration de FlexAddress. Pour des
informations supplémentaires sur la commande, voir la section de commande
getflexaddr du Guide de référence de ligne de commande RACADM pour
iDRAC6 et CMC.
Configuration de FlexAddress via l'interface
utilisateur
Réveil sur LAN avec FlexAddress
Lorsque la fonctionnalité FlexAddress est déployée pour la première fois,
il est nécessaire de mettre le module serveur hors tension, puis de le remettre
sous tension pour que la fonctionnalité FlexAddress soit prise en compte.
FlexAddress est programmée par le BIOS du module serveur sur les
périphériques Ethernet. Pour que le BIOS du module serveur programme
l'adresse, il faut qu'il soit opérationnel, ce qui nécessite la mise sous tension
du module serveur. Une fois que les séquences de mise hors tension et de
mise sous tension ont été exécutées, les ID MAC attribués par le châssis sont
disponibles pour la fonction Réveil sur LAN (WOL).
Dépannage de FlexAddress
Cette section contient des informations de dépannage pour FlexAddress.
1 Que se passe-t-il si une carte de fonction est retirée ?
Rien. Les cartes de fonction peuvent être retirées et stockées ou laissées
en place.
2 Que se passe-t-il si une carte de fonction utilisée dans un châssis est retirée
et insérée dans un autre châssis ?272 Utilisation de FlexAddress
L'interface Web affiche une erreur qui indique :
This feature card was activated with a different
chassis. It must be removed before accessing the
FlexAddress feature.
Current Chassis Service Tag = XXXXXXXX
Feature Card Chassis Service Tag = YYYYYYYY
Une entrée sera ajoutée au journal CMC :
cmc : feature
'FlexAddress@YYYYYYYY' not activated; chassis
ID='XXXXXXXX'
3 Que se passe-t-il si la carte de fonction est retirée et qu'une carte non
FlexAddress est installée ?
Aucune activation ou modification de la carte n'a lieu. CMC ignore la
carte. Dans ce cas, la commande $racadm featurecard -s renvoie le
message suivant :
No feature card inserted
ERROR: can't open file
4 Que se passe-t-il si une carte de fonction est liée à un châssis dont le
numéro de service est reprogrammé ?
• Si la carte de fonction d'origine figure dans le contrôleur CMC actif
sur ce châssis ou sur un autre châssis, l'interface Web affiche une
erreur indiquant ce qui suit :
This feature card was activated with a
different chassis. It must be removed before
accessing the FlexAddress feature.
Current Chassis Service Tag = XXXXXXXX
Feature Card Chassis Service Tag = YYYYYYYYUtilisation de FlexAddress 273
La carte de fonction d'origine ne peut plus être désactivée sur ce
châssis ou sur un autre châssis, à moins que l'assistance Dell ne
reprogramme le numéro de service du châssis d'origine dans un châssis
et que le contrôleur CMC sur lequel est installée la carte de fonction
d'origine devienne actif sur ce châssis.
• La fonctionnalité FlexAddress reste activée sur le châssis initialement
lié. La fonctionnalité de liaison de ce châssis est mise à jour pour
refléter le nouveau numéro de service.
5 Vais-je recevoir un message d'erreur si deux cartes de fonction sont
installées sur mon système CMC redondant ?
La carte de fonction du contrôleur CMC actif est active et installée dans le
châssis. CMC ignore la deuxième carte.
6 Est-ce que la carte SD dispose d'un verrou de protection en écriture ?
Oui. Avant d'installer la carte SD dans le contrôleur CMC, vérifiez que
le loquet de protection en écriture est en position « déverrouillée ».
La fonctionnalité FlexAddress ne peut être activée si la carte SD est
protégée en écriture. Dans ce cas, la commande $racadm feature -s
renvoie le message suivant :
No features active on the chassis. ERROR: read
only file system
7 Que se passe-t-il si aucune carte SD n'est présente dans le contrôleur
CMC actif ?
La commande $racadm featurecard -s renvoie le message suivant :
No feature card inserted.
8 Qu'advient-il de la fonctionnalité FlexAddress si le BIOS du serveur est
mis à jour d'une version 1.xx à une version 2.xx ?
Le module de serveur doit être mis hors tension préalablement à toute
utilisation avec FlexAddress. Une fois la mise à jour du BIOS du serveur
terminée, le module de serveur n'obtient pas d’adresses attribuées par le
châssis avant la mise hors tension, puis la mise sous tension du serveur.274 Utilisation de FlexAddress
9 Que se passe-t-il si un châssis doté d'un seul contrôleur CMC est mis à
niveau vers une version du micrologiciel antérieure à la version 1.10 ?
• La fonctionnalité FlexAddress et sa configuration sont
supprimées du châssis.
• La carte de fonctionnalité utilisée pour activer la fonctionnalité sur ce
châssis est inchangée et reste liée au châssis. Lorsque le micrologiciel
CMC du châssis est mis à niveau par la suite à la version 1.10 ou
ultérieure, la fonctionnalité FlexAddress est réactivée par réinsertion
de la carte de fonction d'origine (le cas échéant), en réinitialisant
CMC (si la carte de fonction a été insérée à la fin de la mise à niveau
du micrologiciel) et en reconfigurant la fonctionnalité.
10 Que se passe-t-il si une unité CMC est remplacée par une autre dotée d'un
micrologiciel de version antérieure à 1.10 dans un châssis comportant des
modules CMC redondants ?
Dans un châssis comportant des modules CMC redondants, si vous
remplacez un contrôleur CMC par un autre dont la version de
micrologiciel est antérieure à la version 1.10, vous devez suivre la
procédure suivante pour que la fonctionnalité et la configuration
FlexAddress actuelles ne soient PAS supprimées.
a Assurez-vous que la version du micrologiciel CMC actif est toujours la
version 1.10 ou une version ultérieure.
b Retirez le contrôleur CMC de secours et insérez un nouveau
contrôleur CMC à son emplacement.
c À partir du CMC actif, mettez à niveau le micrologiciel CMC de
secours vers la version 1.10 ou une version ultérieure.
REMARQUE : si vous ne mettez pas à jour le micrologiciel CMC de secours vers la
version 1.10 ou une version ultérieure et qu'un basculement se produit, la
fonctionnalité FlexAddress n'est pas configurée et vous devez alors réactiver et
reconfigurer la fonctionnalité.
11 La carte SD ne se trouvait pas dans le châssis lorsque j'ai exécuté la
commande de désactivation sur FlexAddress. Comment puis-je récupérer
la carte SD maintenant ?
Le problème est que la carte SD ne peut pas être utilisée pour installer
FlexAddress sur un autre châssis si elle ne se trouvait pas dans CMC
lorsque FlexAddress a été désactivée. Pour restaurer l'usage de la carte,
réinsérez-la dans un contrôleur CMC dans le châssis à laquelle elle est liée,
réinstallez FlexAddress, puis désactivez à nouveau FlexAddress.Utilisation de FlexAddress 275
12 La carte SD est installée correctement et toutes les mises à jour de
micrologiciel/logiciel sont installées. FlexAddress semble active, mais
aucune option de l'écran de déploiement du serveur ne me permet de
déployer cette fonctionnalité. Quel est le problème ?
Il s'agit d'un problème de cache du navigateur. Fermez le navigateur, puis
relancez-le.
13 Qu'advient-il de FlexAddress si je dois réinitialiser la configuration de mon
châssis avec la commande RACADM racresetcfg ?
La fonctionnalité FlexAddress restera activée et prête à l'utilisation. Toutes
les structures et tous les logements seront sélectionnés comme structures
et logements par défaut.
REMARQUE : il est vivement recommandé de mettre le châssis hors tension
avant d'émettre la commande RACADM racresetcfg.
Messages des commandes
Le tableau suivant répertorie les commandes RACADM et leurs sorties pour
des problèmes FlexAddress courants.
Tableau 6-2. Sortie et commandes FlexAddress
Problème Commande Sortie
La carte SD du
contrôleur CMC
actif est liée à un
autre numéro
de service.
$racadm featurecard -s The feature card
inserted is valid
and contains the
following
feature(s)
FlexAddress: The
feature card is
bound to another
chassis, svctag =
SD card SN
=276 Utilisation de FlexAddress
La carte SD du
contrôleur CMC
actif est liée au
même numéro
de service.
$racadm featurecard -s The feature card
inserted is valid
and contains the
following
feature(s)
FlexAddress: The
feature card is
bound to this
chassis
La carte SD du
contrôleur CMC
actif n'est liée à
aucun numéro
de service.
$racadm featurecard -s The feature card
inserted is valid
and contains the
following
feature(s)
FlexAddress: The
feature card is not
bound to any
chassis
La fonctionnalité
FlexAddress n'est pas
active sur le châssis
pour une raison
inconnue (Pas de
carte SD insérée/carte
SD corrompue/
fonctionnalité
désactivée/carte SD
liée à un autre
châssis).
$racadm setflexaddr
[-f
] OR
$racadm setflexaddr
[-i ]
ERROR: Flexaddress
feature is not
active on the
chassis
L'utilisateur invité
tente de définir
FlexAddress sur des
logements/des
structures.
$racadm setflexaddr
[-f
]
$racadm setflexaddr
[-i ]
ERROR: Insufficient
user privileges to
perform operation
Tableau 6-2. Sortie et commandes FlexAddress (suite)
Problème Commande SortieUtilisation de FlexAddress 277
Désactivation de la
fonctionnalité
FlexAddress alors
que le châssis est
sous tension.
$racadm feature -d
-c flexaddress
ERROR: Unable to
deactivate the
feature because the
chassis is powered ON
L'utilisateur invité
essaie de désactiver
la fonctionnalité sur
le châssis.
$racadm feature -d
-c flexaddress
ERROR: Insufficient
user privileges to
perform operation
Modification des
paramètres
FlexAddress de
logement/structure
pendant que les
modules de serveur
sont sous tension.
$racadm setflexaddr
-i 1 1
ERROR: Unable to
perform the set
operation because
it affects a
powered ON server
Pourquoi, après la
désactivation de la
fonction
FlexAddressPlus
(bien que
FlexAddress soit
toujours activée), la
commande racadm
setflexaddr échoue telle sur le CMC
(encore actif) ?
Si le CMC est activé par la
suite, alors que la carte de
fonction FlexAddressPlus
est toujours dans son
logement, la fonction
FlexAddressPlus est
réactivée et les
modifications de
configuration de flexaddress
de logement/structure
peuvent se poursuivre.
Tableau 6-2. Sortie et commandes FlexAddress (suite)
Problème Commande Sortie278 Utilisation de FlexAddress
CONTRAT DE LICENCE DES LOGICIELS DELL
FlexAddress
Le présent document constitue un contrat liant l'utilisateur du Logiciel à
Dell Products, L.P. ou Dell Global B.V. (« Dell »). Ce contrat s'applique à tous
les logiciels distribués avec le produit Dell, pour lesquels il n'existe aucun
contrat de licence distinct vous liant avec l'éditeur ou le propriétaire du
logiciel (collectivement ci-après, le « Logiciel »). Ce contrat ne concerne pas
la vente du Logiciel ou de toute autre propriété intellectuelle. Tous les droits
concernant la propriété intellectuelle du Logiciel sont détenus par l'éditeur
ou le propriétaire du Logiciel. Tous les droits non expressément accordés dans
le présent contrat sont réservés par l'éditeur ou le propriétaire du Logiciel.
En ouvrant l'emballage contenant le Logiciel, en installant ou en
téléchargeant le Logiciel, ou en utilisant le Logiciel préchargé ou intégré à
votre produit, vous acceptez d'être lié par les termes du présent Contrat.
Si vous refusez ces conditions, retournez rapidement tous les éléments
composant le Logiciel (disques, documentations et emballage) et désinstallez
le Logiciel préchargé ou intégré au produit.
Vous ne pouvez utiliser le Logiciel que sur un ordinateur à la fois. Si vous
disposez de plusieurs licences pour le Logiciel, vous pouvez en utiliser autant
d'exemplaires que vous avez de licences. Le terme « Utiliser » désigne le
chargement dans la mémoire temporaire ou permanente de l'ordinateur.
L'installation sur un serveur de réseau à des fins de distribution sur d'autres
postes de travail n'est pas considérée comme une « Utilisation » si, et
seulement si, vous disposez d'une licence distincte pour chaque ordinateur
sur lequel le Logiciel est distribué. Vous devez vous assurer que le nombre de
personnes utilisant le Logiciel installé sur un serveur de réseau n'excède pas le
nombre de licences que vous possédez. Si le nombre d'utilisateurs du Logiciel
installé sur un serveur de réseau excède votre nombre de licences, vous devez
vous procurer une licence additionnelle pour chacun des utilisateurs en
surnombre avant d'autoriser ceux-ci à utiliser le Logiciel. Si vous êtes une
entreprise cliente de Dell ou une société affiliée de Dell, vous autorisez Dell,
ou tout agent sélectionné par Dell, à contrôler votre utilisation du Logiciel
aux heures normales de bureau, et vous acceptez de collaborer avec Dell dans
le cadre de cet audit. Vous acceptez de fournir à Dell toutes les données
pouvant raisonnablement être considérées comme ayant un rapport avec
votre utilisation du Logiciel. Le contrôle sera limité à la vérification de votre
respect des dispositions du présent contrat. Utilisation de FlexAddress 279
Ce Logiciel est protégé par la loi relative au droit d'auteur et par les
conventions internationales. Vous êtes autorisé à créer une seule copie du
Logiciel à des fins de sauvegarde ou d'archivage, ou à le transférer sur un seul
disque dur, à la condition que vous conserviez l'original uniquement à des fins
de sauvegarde ou d'archivage. Vous n'êtes pas autorisé à prêter ni à louer le
Logiciel ni à copier les documents imprimés fournis avec celui-ci. Vous êtes
autorisé à transférer à titre permanent le Logiciel et tous ses composants dans
le cadre de la vente ou du transfert du produit Dell, à condition que vous n'en
conserviez aucun exemplaire, que vous transfériez la totalité du Logiciel
(y compris tous ses composants, les médias et la documentation imprimée),
et que le bénéficiaire du transfert accepte les termes du présent contrat.
Tout transfert doit inclure la mise à jour la plus récente ainsi que toutes les
versions précédentes. Vous n'êtes pas autorisé à reconstituer la logique du
Logiciel, à le décompiler ou à le désassembler. Si le kit fourni avec l'ordinateur
contient des disques compacts et/ou des disquettes 3 pouces ½ ou
5 pouces ¼, vous ne pouvez utiliser que les disques du format approprié pour
l'ordinateur. Vous n'êtes pas autorisé à utiliser les disques sur un autre
ordinateur ou réseau ni à les louer, les prêter ou les transférer à un autre
utilisateur, sauf si l'opération s'effectue en conformité avec les dispositions du
présent contrat.
GARANTIE LIMITÉE
Dell garantit que les disques du Logiciel sont exempts de tout défaut matériel
et de fabrication dans des conditions normales d'utilisation, pour une période
de 90 (quatre-vingt dix) jours à compter de leur date de réception. Cette
garantie limitée ne s'applique qu'à vous et n'est pas transférable. Toute
garantie implicite est limitée à une période de 90 (quatre-vingt dix) jours à
compter de la date à laquelle vous avez reçu le Logiciel. Certaines législations
n'autorisent pas la limitation des garanties implicites, auquel cas, la limitation
ci-dessus ne vous sera pas applicable. La responsabilité totale de Dell et de ses
fournisseurs, et le seul recours dont vous disposez, sont limités soit (a) au
remboursement du montant payé pour le Logiciel ou (b) au remplacement de
tout disque non conforme aux dispositions de la présente garantie et ayant
été renvoyé à Dell accompagné d'un numéro d'autorisation de retour, les
coûts et risques afférents étant de votre responsabilité. Cette garantie ne
s'appliquera pas en cas de dommage au disque causé par une utilisation
incorrecte, un accident, un acte de vandalisme, ou en cas de modifications ou
d'opérations de maintenance non effectuées par Dell. Tout disque fourni en
remplacement du disque d'origine est garanti pour la durée la plus longue
entre (a) le nombre de jours restants par rapport à la garantie d'origine ou
(b) un délai de 30 (trente) jours. 280 Utilisation de FlexAddress
Dell ne garantit PAS le fonctionnement ininterrompu ou sans erreur du
Logiciel, NI son adéquation à vos besoins. Le fait d'avoir choisi ce Logiciel
pour obtenir les résultats attendus, son utilisation et les résultats obtenus
sont de votre seule et unique responsabilité.
EN SON PROPRE NOM ET CELUI DE SES FOURNISSEURS, DELL
DÉCLINE TOUTE AUTRE GARANTIE OU CONDITION EXPRESSE OU
IMPLICITE, INCLUANT SANS RESTRICTION LES GARANTIES ET
CONDITIONS IMPLICITES DE QUALITÉ OU D'ADAPTABILITÉ À UN
USAGE PARTICULIER, RELATIVES AU LOGICIEL ET AUX
DOCUMENTS FOURNIS AVEC CELUI-CI. Cette garantie limitée vous
donne des droits légaux spécifiques, auxquels peuvent s'ajouter d'autres
droits, qui varient selon la juridiction.
DELL ET SES FOURNISSEURS NE SONT EN AUCUN CAS
RESPONSABLES DES DOMMAGES QUELS QU'ILS SOIENT, Y COMPRIS,
MAIS SANS S'Y LIMITER, LA PERTE DE BÉNÉFICES, L'INTERRUPTION
D'ACTIVITÉ, LA PERTE D'INFORMATIONS COMMERCIALES, OU
TOUTE AUTRE PERTE FINANCIÈRE, DÉCOULANT DE L'UTILISATION
DU LOGICIEL OU DE L'INCAPACITÉ À UTILISER LE LOGICIEL, MÊME
SI DELL OU SON REVENDEUR ONT ÉTÉ INFORMÉS DE LA
POSSIBILITÉ DE TELS DOMMAGES. Certaines législations n'autorisent pas
la limitation ou l'exclusion de responsabilité pour des préjudices accessoires ou
indirects, auquel cas l'exclusion ou la limitation qui précède ne vous sera
pas applicable.
LOGICIEL LIBRE (Open Source)
Une partie de ce CD peut contenir des logiciels libres, que vous pouvez
utiliser conformément aux termes et conditions des licences spécifiques sous
lesquelles ils ont été distribués.
CE LOGICIEL LIBRE EST DISTRIBUÉ DANS L'ESPOIR QU'IL SERA
UTILISE, MAIS IL EST FOURNI « EN L'ÉTAT », SANS AUCUNE GARANTIE
DE QUELQUE NATURE QUE CE SOIT, EXPRESSE OU IMPLICITE, Y
COMPRIS, MAIS SANS S'Y LIMITER, LES GARANTIES IMPLICITES DE
COMMERCIABILITÉ ET DE LA CONFORMITÉ À UNE UTILISATION
PARTICULIÈRE. EN AUCUN CAS, DELL, LES TITULAIRES DES DROITS
D'AUTEUR OU TOUTE PARTIE AYANT CONTRIBUÉ À CE LOGICIEL NE
POURRONT ÊTRE TENUS POUR RESPONSABLES DES DOMMAGES
DIRECTS, INDIRECTS, ACCESSOIRES, SPÉCIAUX, EXEMPLAIRES OU
CONSÉCUTIFS (Y COMPRIS MAIS SANS S'Y LIMITER, LA MISE À Utilisation de FlexAddress 281
DISPOSITION DE BIENS OU DE SERVICES DE SUBSTITUTION, LA
PERTE DE BÉNÉFICES, REVENUS, DONNÉES OU UTILITÉ OU
L'INTERRUPTION D'UNE ACTIVITÉ), QUELLES QU'EN SOIENT LA
CAUSE ET LA RESPONSABILITÉ (CONTRACTUELLE, RESPONSABILITÉ
STRICTE OU DÉLIT CIVIL [Y COMPRIS LA NÉGLIGENCE OU TOUTE
AUTRE CAUSE]), RÉSULTANT DE L'UTILISATION DU LOGICIEL, ET CE
MÊME SI DELL, LES TITULAIRES DES DROITS D'AUTEUR OU TOUTE
PARTIE AYANT CONTRIBUÉ À CE LOGICIEL ONT ÉTÉ INFORMÉS DE LA
POSSIBILITÉ DE TELS DOMMAGES.
DROITS LIMITÉS DU GOUVERNEMENT DES ÉTATS-UNIS
Le Logiciel est un « article de commerce », tel que défini par l'article
48 C.F.R. 2.101 (Oct. 1995), consistant en un « logiciel d'ordinateur du
commerce » et une « documentation de logiciel d'ordinateur du commerce »,
termes devant être compris dans leur acception utilisée à l'article 48 C.F.R.
12.212. En accord avec les articles 48 C.F.R. 12.212 et 48 C.F.R. 227.7202-1
à 227.7202-4, tous U.S. Tous les utilisateurs finals du gouvernement
américain acquièrent le Logiciel et la documentation dans la limite des droits
énoncés par les présentes. Fournisseur/Éditeur du logiciel: Dell Products, L.P.,
One Dell Way, Round Rock, Texas 78682.
CONSIGNES GÉNÉRALES
Ce contrat est valide jusqu'à expiration. Il sera résilié uniquement
conformément aux conditions décrites ci-dessus, ou en cas de non-respect par
l'utilisateur de l'une quelconque des clauses décrites. Une fois ce contrat arrivé
à expiration, vous acceptez que le Logiciel et tout matériel l'accompagnant,
ainsi que toutes les copies de ces éléments, doivent être détruits. Ce contrat
est régi par les lois de l'état du Texas. Les dispositions du présent contrat sont
juridiquement indépendantes les unes des autres. Le fait que l'une de ces
dispositions se révèle non applicable n'altère en rien le caractère légal et
obligatoire des autres dispositions, termes ou conditions du présent contrat.
Le présent contrat lie également les successeurs et ayant-droits de l'utilisateur.
Les parties renoncent expressément à tout droit de jugement par un jury des
éventuels litiges liés au Logiciel ou au présent contrat. Cette dérogation
n'étant pas valide dans certaines juridictions, il est possible qu'elle ne
s'applique pas dans votre cas. Vous reconnaissez avoir lu et compris le présent
contrat et en accepter les termes, et confirmez qu'il constitue le seul accord
complet et exclusif entre vous et Dell concernant le Logiciel.282 Utilisation de FlexAddress
Questions les plus fréquentes
La Figure 6-3 répertorie les questions les plus fréquemment posées à propos
de la fonction FlexaddressPlus.
Tableau 6-3. FlexaddressPlus
Question Réponse
Pourquoi après la désactivation
de la fonction FlexAddressPlus
(bien que FlexAddress soit
toujours activé), la commande
racadm setflexaddr
échoue t-elle sur le CMC
(encore actif) ?
Si le CMC est activé par la suite, alors que la carte
de fonction FlexAddressPlus est toujours sans son
logement, la fonction FlexAddressPlus est
réactivée et les modifications de configuration de
logement/structure de flexaddress peuvent
se poursuivre. Utilisation de FlexAddress Plus 283
Utilisation de FlexAddress Plus
FlexAddress Plus est une nouvelle fonctionnalité ajoutée à la carte de
fonction version 2.0. Il s'agit d'une mise à niveau depuis la fonctionnalité
FlexAddress version 1.0. FlexAddress Plus contient davantage d'adresses
MAC que la fonctionnalité FlexAddress. Ces deux fonctionnalités
permettent au châssis d'attribuer les adresses WWN/MAC (World Wide
Name/Media Access Control) aux périphériques Fibre Channel et Ethernet.
Les adresses WWN/MAC attribuées par le châssis sont globalement uniques
et spécifiques à un logement de serveur.
Activation de FlexAddress Plus
La fonctionnalité FlexAddress Plus est fournie sur la carte Secure Digital
(SD), tout comme la fonctionnalité FlexAddress.
REMARQUE : la carte SD libellée FlexAddress ne contient que la fonctionnalité
FlexAddress, et la carte libellée FlexAddress Plus contient FlexAddress et
FlexAddress Plus. Pour activer la fonctionnalité, la carte doit être insérée dans le
module CMC.
Certains serveurs, tels que PowerEdge M710HD, peuvent avoir besoin de plus
d'adresses MAC que FA ne peut en procurer à CMC, selon leur configuration.
Pour ces serveurs, une mise à niveau vers FA+ permet d'optimiser pleinement
la configuration WWN/MAC. Veuillez contacter Dell pour obtenir de
l'assistance concernant la fonctionnalité FlexAddress Plus.
Les mises à jour logicielles suivantes sont requises pour activer la
fonctionnalité FlexAddress Plus : serveur BIOS, serveur iDRAC et
micrologiciel CMC. Si ces mises à jour ne sont pas appliquées, seule la
fonctionnalité FlexAddress est disponible. Pour des informations sur les
exigences minimales requises pour les versions de ces composants, voir la
section CMC 4.0 de Lisez-moi sur support/dell.com/manuals.284 Utilisation de FlexAddress Plus
FlexAddress comparé à FlexAddress Plus
FlexAddress a 208 adresses réparties dans 16 logements de serveur, chacun
étant alloué à 13 MAC. FlexAddress a 2 928 adresses réparties dans 16
logements de serveur, chacun étant alloué à 183 MAC. Le tableau ci-dessous
indique la disposition des adresses MAC dans les deux fonctionnalités.
Figure 7-1. Fonctionnalité FlexAdress (FA) comparée à la fonctionnalité
FlexPlusAddress (FA+)
Circuit A Circuit B Circuit C Gestion iDRAC Nbre total de MAC
FlexAddress 4 4 4 1 13
FlexAddress
Plus
60 60 60 3 183
FA+
Logement 16
FA
Logement 16
iDRAC
Circuit A
Circuit B
Circuit C
iDRAC
Circuit A
Circuit B
Circuit C
iDRAC
Circuit A
Circuit B
Circuit CUtilisation du service d'annuaire CMC 285
Utilisation du service d'annuaire CMC
Un service d'annuaire permet de maintenir une base de données commune
rassemblant toutes les informations nécessaires au contrôle des utilisateurs
réseau, des ordinateurs, des imprimantes, etc. Si votre entreprise utilise le
logiciel Microsoft Active Directory ou LDAP Directory, vous pouvez configurer
CMC pour utiliser l'authentification des utilisateurs basée sur répertoire.
Utilisation de CMC avec Microsoft Active Directory
REMARQUE : l'utilisation d'Active Directory pour reconnaître les utilisateurs CMC
est prise en charge par les systèmes d'exploitation Microsoft Windows 2000 et
Windows Server 2003. Active Directory sur IPv6 est pris en charge uniquement
sous Windows 2008.
Extensions de schéma Active Directory
Vous pouvez utiliser Active Directory pour définir l'accès utilisateur à CMC
selon deux méthodes :
• La solution de schéma standard qui utilise uniquement les objets de
groupe Active Directory standard.
• La solution de schéma étendu, qui utilise des objets Active Directory
définis par Dell.
Schéma standard comparé au schéma étendu
Lorsque vous utilisez Active Directory pour configurer l'accès à CMC, vous
devez choisir la solution de schéma étendu ou schéma standard.
Avec le schéma standard :
• Aucune extension de schéma n'est nécessaire car le schéma standard utilise
uniquement des objets Active Directory.
• La configuration d'Active Directory est simple.
Avec le schéma étendu :
• Tous les objets de contrôle d'accès sont maintenus dans Active Directory.
• La configuration de l'accès utilisateur sur des contrôleurs CMC différents
avec des niveaux de privilège différents permet une flexibilité maximale.286 Utilisation du service d'annuaire CMC
Présentation d'Active Directory avec le
schéma standard
L'utilisation du schéma étendu pour l'intégration d'Active Directory requiert
une configuration sur Active Directory et sur CMC.
Du côté d'Active Directory, un objet Groupe standard est utilisé comme groupe
de rôles. Un utilisateur ayant accès à CMC sera membre du groupe de rôles.
Pour donner à cet utilisateur accès à une carte CMC spécifique, le nom du
groupe de rôles et son nom de domaine doivent être configurés sur cette carte
CMC. Contrairement à la solution du schéma étendu, le niveau des rôles et
des privilèges est défini sur chaque carte CMC et non pas dans Active
Directory. Vous pouvez configurer et définir un maximum de cinq groupes de
rôles sur chaque contrôleur CMC. La Figure 8-1 illustre la configuration de
CMC avec Active Directory et le schéma standard. La Figure 5-43 présente le
niveau de privilège des groupes de rôles et la Figure 8-1 illustre les paramètres
par défaut des groupes de rôles.
Figure 8-1. Configuration de CMC avec Active Directory et le schéma standard
Rôle
Groupe
Rôle
Nom du groupe
et nom du
domaine
Rôle
Définition
Utilisateur
Configuration du côté
d'Active Directory
Configuration du
CMCUtilisation du service d'annuaire CMC 287
REMARQUE : les valeurs de masque binaire sont utilisées uniquement lors de la
définition du schéma standard avec RACADM.
Tableau 8-1. Privilèges par défaut des groupes de rôles
Groupe
de rôles
Privilège par
défaut
Niveau
Droits accordés Masque
binaire
1 None (Aucune) • Ouverture de session utilisateur CMC
• Administrateur de configuration
du châssis
• Administrateur de configuration
des utilisateurs
• Administrateur d'effacement
des journaux
• Administrateur et contrôle du châssis
• Super utilisateur
• Server Administrator
• Utilisateur d'alertes de test
• Administrateur de commandes
de débogage
• Administrateur de structure A
• Administrateur de structure B
• Administrateur de structure C
0x00000fff
2 None (Aucune) • Ouverture de session utilisateur CMC
• Administrateur d'effacement
des journaux
• Administrateur et contrôle du châssis
• Server Administrator
• Utilisateur d'alertes de test
• Administrateur de structure A
• Administrateur de structure B
• Administrateur de structure C
0x00000ed9
3 None (Aucune) Ouverture de session utilisateur CMC 0x00000001
4 None (Aucune) Aucun droit attribué 0x00000000
5 None (Aucune) Aucun droit attribué 0x00000000288 Utilisation du service d'annuaire CMC
REMARQUE : pour plus d'informations sur les privilèges utilisateur, voir « Types
d'utilisateurs », à la page 174.
Il existe deux méthodes pour activer Active Directory avec le schéma
standard :
• Avec l'interface Web de CMC. Voir « Configuration de CMC avec Active
Directory avec schéma standard et l'interface Web », à la page 288.
• Avec l'outil CLI?RACADM. Voir « Configuration de CMC avec Active
Directory avec schéma standard et RACADM », à la page 291.
Configuration du schéma standard d'Active Directory pour accéder à CMC
Vous devez suivre les étapes suivantes pour configurer Active Directory pour
qu'un utilisateur Active Directory puisse accéder à CMC :
1 Sur un serveur Active Directory (contrôleur de domaine), ouvrez le snap-in
Utilisateurs et ordinateurs Active Directory.
2 Créez un groupe ou sélectionnez un groupe existant. Le nom du groupe et
le nom de ce domaine doivent être configurés sur CMC soit avec
l'interface Web soit RACADM.
Pour en savoir plus, voir « Configuration de CMC avec Active Directory
avec schéma standard et l'interface Web », à la page 288 ou
« Configuration de CMC avec Active Directory avec schéma standard
et RACADM », à la page 291.
3 Ajoutez l'utilisateur Active Directory comme membre du groupe Active
Directory pour qu'il puisse accéder à iDRAC6.
Configuration de CMC avec Active Directory avec schéma standard et
l'interface Web
1 Ouvrez une session sur l'interface Web de CMC.
2 Sélectionnez Châssis dans l'arborescence du système.
3 Cliquez sur Authentification utilisateur→ Services d'annuaire. La page
Services d'annuaire s'affiche.
4 Sélectionnez le bouton radio en regard de Microsoft Active Directory
(Schéma standard). La page Configuration et gestion d'Active
Directory apparaît.Utilisation du service d'annuaire CMC 289
5 Dans la section Paramètres communs :
a Sélectionnez la case à cocher Activer Active Directory.
b entrez le nom de domaine racine.
REMARQUE : le nom de domaine racine doit être un nom de domaine valide
qui respecte la convention d'attribution des noms x.y, où x est une chaîne de
1 à 256 caractères ASCII non séparés par des espaces, et où y est un type de
domaine valide tel que com, edu, gov, int, mil, net ou org.
c entrez le Délai d'attente en secondes. Le Délai d'attente est compris
entre 15 et 300 secondes. Le Délai d'attente par défaut est 90 secondes.
6 Si vous voulez que l'appel dirigé recherche le contrôleur de domaine et le
catalogue global, cochez la case Chercher le serveur AD à rechercher
(facultatif), puis :
a Dans le champ de texte Contrôleur de domaine, entrez le nom du
serveur sur lequel est installé le service Active Directory.
b Dans le champ de texte Catalogue global, entrez l'emplacement du
catalogue global sur le contrôleur de domaine d'Active Directory. Le
catalogue global fournit une ressource pour rechercher une forêt
Active Directory.
7 Cliquez sur Appliquer pour enregistrer vos paramètres.
REMARQUE : vous devez appliquer vos paramètres avant de passer à
l'étape suivante. Si vous n'appliquez pas les paramètres, vous perdez les
paramètres entrés lorsque vous passez à la page suivante.
8 Dans la section Paramètres du schéma standard, cliquez sur un Groupe de
rôles. La page Configurer le groupe de rôles s'affiche.
9 Saisissez le Nom du groupe. Le nom du groupe identifie le groupe de rôles
dans l'Active Directory associé à la carte CMC.
10 Saisissez le Domaine du groupe. Le Domaine du groupe est le nom de
domaine racine pleinement qualifié de la forêt.
11 Sélectionnez les privilèges du groupe dans la page Privilèges de groupes
de rôles.
Si vous modifiez des privilèges, le privilège du groupe de rôles
(administrateur, utilisateur privilégié ou utilisateur invité) existant
deviendra celui du groupe personnalisé ou du groupe de rôles approprié.
Voir Figure 5-43.290 Utilisation du service d'annuaire CMC
12 Cliquez sur Appliquer pour enregistrer les paramètres Groupe de rôles.
13 Cliquez sur Retour à la page Configuration.
14 Téléversez votre certificat signé par une autorité de certification racine de
la forêt de domaines sur CMC. Dans la section Gestion des certificats,
entrez le chemin d'accès du fichier du certificat ou naviguez vers le fichier
du certificat. Cliquez sur le bouton Téléverser pour transférer le fichier
vers CMC.
REMARQUE : la valeur Chemin du fichier affiche le chemin de fichier relatif
du certificat que vous téléversez. Vous devez taper le chemin de fichier
absolu, y compris le chemin et le nom de fichier complets et l'extension du
fichier.
Les certificats SSL des contrôleurs de domaine doivent être signés par
le certificat signé par l'autorité de certification racine. Le certificat
signé par l'autorité de certification racine doit être disponible sur la
station de gestion accédant à CMC.
15 Cliquez sur Appliquer. Le serveur Web de CMC redémarre
automatiquement lorsque vous cliquez sur Appliquer.
16 Fermez, puis ouvrez une session sur CMC pour terminer la configuration
de la fonctionnalité Active Directory CMC.
17 Sélectionnez Châssis dans l'arborescence du système.
18 Cliquez sur l'onglet Réseau.
19 Cliquez sur le sous-onglet Réseau. La page Configuration réseau s'affiche.
20 Si Utiliser DHCP (pour l'adresse IP du NIC) est sélectionné sous
Paramètres réseau, sélectionnez Utiliser DHCP pour obtenir l'adresse du
serveur DNS.
Pour saisir manuellement l'adresse IP du serveur DNS, désélectionnez
Utiliser DHCP pour obtenir des adresses de serveur DNS et entrez les
adresses IP de serveur DNS principale et alternative.
21 Cliquez sur Appliquer les modifications.
La configuration de la fonctionnalité du schéma standard d'Active
Directory CMC est terminée.Utilisation du service d'annuaire CMC 291
Configuration de CMC avec Active Directory avec schéma standard
et RACADM
Pour configurer la fonctionnalité Active Directory CMC avec le schéma
standard à l'aide de l'interface de ligne de commande RACADM, utilisez les
commandes suivantes :
1 Ouvrez une console texte série/Telnet/SSH d'accès à CMC et entrez :
racadm config -g cfgActiveDirectory -o cfgADEnable 1
racadm config -g cfgActiveDirectory -o cfgADType 2
racadm config -g cfgActiveDirectory -o
cfgADRootDomain
racadm config -g cfgStandardSchema -i -o
cfgSSADRoleGroupName
racadm config -g cfgStandardSchema -i -o
cfgSSADRoleGroupDomain
racadm config -g cfgStandardSchema -i -o
cfgSSADRoleGroupPrivilege
racadm sslcertupload -t 0x2 -f
racadm sslcertdownload -t 0x1 -f
REMARQUE : pour les valeurs de nombre de masques binaires, consultez le
Tableau 3-1 dans le chapitre des propriétés de la base de données du Guide
de référence de la ligne de commande RACADM pour iDRAC6 et CMC.292 Utilisation du service d'annuaire CMC
2 Spécifiez un serveur DNS à l'aide de l'une des options suivantes :
• Si DHCP est activé sur CMC et que vous voulez utiliser l'adresse DNS
obtenue automatiquement par le serveur DHCP, entrez la commande
suivante :
racadm config -g cfgLanNetworking -o
cfgDNSServersFromDHCP 1
• Si le protocole DHCP est désactivé sur CMC ou que vous voulez
entrer manuellement l'adresse IP DNS, entrez les commandes
suivantes :
racadm config -g cfgLanNetworking -o
cfgDNSServersFromDHCP 0
racadm config -g cfgLanNetworking -o
cfgDNSServer1
racadm config -g cfgLanNetworking -o
cfgDNSServer2
Présentation du schéma étendu
Il existe deux méthodes pour activer Active Directory avec le schéma étendu :
• Utilisation de l'interface Web de CMC. Pour les instructions, voir
« Configuration de CMC avec le schéma étendu d'Active Directory et
l'interface Web », à la page 308.
• Utilisation de l'interface de ligne de commande RACADM. Pour les
instructions, voir « Configuration de CMC avec le schéma étendu d'Active
Directory et RACADM », à la page 311.
Extensions de schéma Active Directory
Les données d'Active Directory constituent une base de données distribuée
d'attributs et de classes. Le schéma Active Directory inclut les règles qui
déterminent le type de données pouvant être ajoutées ou incluses dans la base
de données.
La classe d'utilisateur est un exemple de classe qui est conservée dans la base
de données. Les attributs de classe d'utilisateur peuvent inclure le prénom de
l'utilisateur, son nom de famille, son numéro de téléphone, etc. Utilisation du service d'annuaire CMC 293
Vous pouvez étendre la base de données d'Active Directory en y ajoutant vos
propres attributs et classes pour répondre aux besoins de l'environnement de
votre entreprise. Dell a étendu ce schéma pour inclure les modifications
nécessaires à la prise en charge de l'authentification et de l'autorisation de la
gestion à distance.
Chaque attribut ou classe ajouté à un schéma Active Directory existant peut être
défini par une référence unique. Pour maintenir des numéros uniques dans
l'industrie, Microsoft conserve une base de données d'identifiants d'objets (OID)
d'Active Directory. Pour étendre le schéma dans Active Directory de Microsoft,
Dell a créé des OID uniques, des extensions de noms uniques et des numéros
d'attributs liés de façon unique pour des attributs et classes spécifiques à Dell :
Extension de Dell : dell
OID de base de Dell : 1.2.840.113556.1.8000.1280
Plage de N° d'association RAC : 12070–2079
Présentation des extensions de schéma du RAC
Dell fournit un groupe de propriétés que vous pouvez configurer. Le schéma
étendu par Dell inclut les propriétés Association, Périphérique et Privilège.
La propriété Association lie les utilisateurs ou les groupes à un ensemble
spécifique de privilèges pour un ou plusieurs périphériques RAC. Ce modèle
offre à l'administrateur un maximum de flexibilité sur les différentes
combinaisons d'utilisateurs, de privilèges du RAC et de périphériques RAC
sur le réseau, sans ajouter trop de complexité.
Présentation des objets Active Directory
Lorsque le réseau que vous voulez intégrer avec Active Directory pour
l'authentification et l'autorisation comprend deux CMC, vous devez créer au
moins un objet Association et un objet Périphérique RAC pour chaque
contrôleur CMC. Vous pouvez créer plusieurs objets Association et chaque objet
Association peut être lié à autant d'utilisateurs, groupes d'utilisateurs ou objets
Périphérique RAC que nécessaire. Les utilisateurs et les objets Périphérique RAC
peuvent être des membres de n'importe quel domaine dans l'entreprise.
Cependant, chaque objet Association ne peut être lié (ou ne peut lier les
utilisateurs, les groupes d'utilisateurs ou les objets Périphérique RAC) qu'à un
seul objet Privilège. Cet exemple permet à l'administrateur de contrôler les
privilèges de chaque utilisateur sur des CMC spécifiques. 294 Utilisation du service d'annuaire CMC
L'objet Périphérique RAC est le lien vers le micrologiciel du RAC permettant à
Active Directory d'effectuer une requête d'authentification et d'autorisation.
Lorsqu'un RAC est ajouté au réseau, l'administrateur doit configurer le RAC et
son objet de périphérique avec son nom Active Directory pour que les
utilisateurs puissent établir l'authentification et l'autorisation avec Active
Directory. En outre, l'administrateur doit ajouter le RAC à au moins un objet
Association pour que les utilisateurs puissent s'authentifier.
La Figure 8-2 illustre le fait que l'objet Association fournit la connexion
nécessaire pour toute authentification et autorisation.
REMARQUE : l'objet Privilège RAC s'applique à DRAC 4, DRAC 5 et à CMC.
Vous pouvez créer autant d'objets Association que vous le voulez. Vous devez
toutefois créer au moins un objet Association et avoir un objet
Périphérique RAC pour chaque RAC (CMC) présent sur le réseau que vous
voulez intégrer à Active Directory.
Figure 8-2. Configuration type pour les objets Active Directory
Objet Association
Groupe(s)
d'utilisateurs
Objet Privilège
Objet(s)
Périphérique RAC
Objet Privilège
du RACUtilisation du service d'annuaire CMC 295
L'objet Association inclut autant d'utilisateurs et/ou de groupes que d'objets
Périphérique RAC. Toutefois, l'objet Association ne peut inclure qu'un seul
objet Privilège par objet Association. L'objet Association connecte les
« Utilisateurs » qui ont des « Privilèges » sur les contrôleurs RAC (CMC).
En outre, vous pouvez configurer des objets Active Directory dans un
domaine unique ou dans des domaines multiples. Par exemple, supposons
que vous avez deux contrôleurs CMC (RAC1 et RAC2) et trois utilisateurs
Active Directory existants (utilisateur1, utilisateur2 et utilisateur3). Vous
voulez donner des privilèges d'administrateur à utilisateur1 et à utilisateur2
sur les deux CMC et des privilèges d'ouverture de session à utilisateur3 sur la
carte RAC2. La Figure 8-3 montre comment configurer les objets Active
Directory dans ce scénario.
Lorsque vous ajoutez des groupes universels à partir de domaines séparés,
créez un objet Association avec une étendue universelle. Les objets
Association par défaut créés par l'utilitaire Dell Schema Extender sont des
groupes locaux de domaines et ne fonctionnent pas avec les groupes
universels d'autres domaines.
Figure 8-3. Configuration d'objets Active Directory dans un domaine unique
AO1 AO2
Groupe1 Priv1 Priv2
Utilisateur1 Utilisateur2 Utilisateur3 RAC1 RAC2296 Utilisation du service d'annuaire CMC
Pour configurer les objets pour le scénario de domaine unique :
1 Créez deux objets Association.
2 Créez deux objets Périphérique RAC, RAC1 et RAC2, pour représenter les
deux CMC.
3 Créez deux objets Privilège, Priv1 et Priv2 ; Priv1 disposant de tous les
privilèges (administrateur) et Priv2 disposant des privilèges d'ouverture
de session.
4 Groupez Utilisateur1 et Utilisateur2 dans le Groupe1.
5 Ajoutez Groupe1 comme membre de l'objet Association 1 (A01), Priv1
comme objet Privilège dans A01, et RAC1 et RAC2 comme périphériques
RAC dans A01.
6 Ajoutez Utilisateur3 comme membre de l'objet Association 2 (A02), Priv2
comme objet Privilège dans A02 et RAC2 comme périphérique RAC
dans A02.
Pour des instructions détaillées, voir « Ajout d'utilisateurs CMC et de leurs
privilèges à Active Directory », à la page 306.
La Figure 8-4 fournit un exemple d'objets Active Directory dans de multiples
domaines. Dans ce scénario, vous avez deux CMC (RAC1 et RAC2) et trois
utilisateurs Active Directory existants (utilisateur1, utilisateur2 et
utilisateur3). Utilisateur1 est dans le Domaine1 ; Utilisateur2 et Utilisateur3
sont dans le Domaine2. Dans ce scénario, configurez utilisateur1 et
utilisateur2 avec les droits d'administrateur sur les deux CMC et configurez
utilisateur3 avec les privilèges d'ouverture de session sur la carte RAC2.Utilisation du service d'annuaire CMC 297
Figure 8-4. Configuration des objets Active Directory dans des domaines multiples
Pour configurer les objets pour le scénario de domaine multiple :
1 Assurez-vous que la fonction de forêt de domaines est en mode Natif ou
Windows 2003.
2 Créez deux objets Association, A01 (d'étendue universelle) et A02, dans
n'importe quel domaine.
La Figure 8-4 illustre les objets du Domaine2.
3 Créez deux objets Périphérique RAC, RAC1 et RAC2, pour représenter
les deux CMC.
4 Créez deux objets Privilège, Priv1 et Priv2 ; Priv1 disposant de tous les
privilèges (administrateur) et Priv2 disposant des privilèges d'ouverture de
session.
5 Groupez Utilisateur1 et Utilisateur2 dans le Groupe1. L'étendue de
groupe de Groupe1 doit être Universel.
6 Ajoutez Groupe1 comme membre de l'objet Association 1 (A01), Priv1
comme objet Privilège dans A01, et RAC1 et RAC2 comme périphériques
RAC dans A01.
7 Ajoutez Utilisateur3 comme membre de l'objet Association 2 (A02), Priv2
comme objet Privilège dans A02 et RAC2 comme périphérique RAC
dans A02.
AO1 AO2
Groupe1 Priv1 Priv2
Utilisateur1 Utilisateur2 Utilisateur3 RAC1 RAC2
Domaine1 Domaine2298 Utilisation du service d'annuaire CMC
Configuration du schéma étendu d'Active Directory pour accéder à
votre CMC
Avant d'utiliser Active Directory pour accéder à CMC, configurez le logiciel
Active Directory et CMC :
1 Étendez le schéma Active Directory (voir « Extension du schéma Active
Directory », à la page 298).
2 Étendez le snap-in Utilisateurs et ordinateurs Active Directory (voir
« Installation de l'extension Dell sur le snap-in Utilisateurs et ordinateurs
Active Directory », à la page 305).
3 Ajoutez des utilisateurs CMC et leurs privilèges à Active Directory (voir
« Ajout d'utilisateurs CMC et de leurs privilèges à Active Directory », à la
page 306).
4 Activez SSL sur chaque contrôleur de domaine.
5 Configurez les propriétés Active Directory de CMC via l'interface Web
CMC ou l'utilitaire RACADM (voir « Configuration de CMC avec le
schéma étendu d'Active Directory et l'interface Web », à la page 308 ou
« Configuration de CMC avec le schéma étendu d'Active Directory et
RACADM », à la page 311).
Extension du schéma Active Directory
En étendant votre schéma Active Directory, vous ajoutez une division
opérationnelle Dell, des classes et des attributs de schéma, et des exemples
d'objets Privilège et Association au schéma Active Directory. Pour étendre le
schéma, vous devez avoir des privilèges d'administrateur de schéma pour le
propriétaire de rôle FSMO contrôleur de schéma de la forêt de domaine.
Vous pouvez étendre votre schéma en utilisant une des méthodes suivantes :
• l'utilitaire Dell Schema Extender ;
• le fichier script LDIF.
Si vous utilisez le fichier script LDIF, la division opérationnelle Dell ne sera
pas ajoutée au schéma. Utilisation du service d'annuaire CMC 299
Les fichiers LDIF et Dell Schema Extender sont situés sur votre DVD Dell
Systems Management Tools and Documentation respectivement dans les
répertoires suivants :
• :\SYSMGMT\ManagementStation\support\
OMActiveDirectory_Tools\\LDIF Files
• :\SYSMGMT\ManagementStation\support\
OMActiveDirectory_ Tools\\Schema Extender
Pour utiliser les fichiers LDIF, consultez les instructions du fichier « Lisezmoi » qui se trouve dans le répertoire LDIF_Files. Pour obtenir des
instructions sur l'utilisation de Dell Schema Extender pour étendre le schéma
Active Directory, voir « Utilisation de Dell Schema Extender », à la page 299.
Vous pouvez copier et exécuter Schema Extender ou les fichiers LDIF depuis
n'importe quel emplacement.
Utilisation de Dell Schema Extender
PRÉCAUTION : l'utilitaire Dell Schema Extender utilise le fichier
SchemaExtenderOem.ini. Pour que l'utilitaire Dell Schema Extender fonctionne
normalement, ne changez pas le nom de ce fichier.
1 Dans l'écran Bienvenue, cliquez sur Suivant.
2 Lisez et comprenez l'avertissement, puis cliquez sur Suivant.
3 Sélectionnez Utiliser les références d'ouverture de session actuelles ou
saisissez un nom d'utilisateur et un mot de passe ayant des droits
d'administrateur de schéma.
4 Cliquez sur Suivant pour exécuter Dell Schema Extender.
5 Cliquez sur Terminer.
Le schéma est étendu. Pour vérifier l'extension de schéma, utilisez la
console de gestion de Microsoft (MMC) et le snap-in du schéma Active
Directory pour vérifier ce qui suit :
• Classes : voir Figure 8-2 à Figure 8-7
• Attributs : voir Figure 8-8
Consultez votre documentation Microsoft pour des informations
supplémentaires sur comment activer et utiliser le snap-in du schéma
Active Directory MMC.300 Utilisation du service d'annuaire CMC
Tableau 8-2. Définitions de classe pour les classes ajoutées au schéma
Active Directory
Nom de classe Numéro d'identification d'objet (OID) attribué
dellRacDevice 1.2.840.113556.1.8000.1280.1.1.1.1
dellAssociationObject 1.2.840.113556.1.8000.1280.1.1.1.2
dellRACPrivileges 1.2.840.113556.1.8000.1280.1.1.1.3
dellPrivileges 1.2.840.113556.1.8000.1280.1.1.1.4
dellProduct 1.2.840.113556.1.8000.1280.1.1.1.5
Tableau 8-3. Classe dellRacDevice
OID 1.2.840.113556.1.8000.1280.1.1.1.1
Description Représente le périphérique RAC de Dell. Le périphérique RAC doit
être configuré comme dellRacDevice dans Active Directory.
Cette configuration permet à CMC d'envoyer des requêtes
de protocole LDAP (Lightweight Directory Access Protocol) à
Active Directory.
Type de classe Classe structurelle
SuperClasses dellProduct
Attributs dellSchemaVersion
dellRacType
Tableau 8-4. dellAssociationObject Class
OID 1.2.840.113556.1.8000.1280.1.1.1.2
Description Représente l'objet Association de Dell. L'objet Association établit la
connexion entre les utilisateurs et les périphériques.
Type de classe Classe structurelle
SuperClasses Groupe
Attributs dellProductMembers
dellPrivilegeMemberUtilisation du service d'annuaire CMC 301
Tableau 8-5. Classe dellRAC4Privileges
OID 1.2.840.113556.1.8000.1280.1.1.1.3
Description Définit les droits (privilèges) d'autorisation pour le périphérique
CMC.
Type de classe Classe auxiliaire
SuperClasses None (Aucune)
Attributs dellIsLoginUser
dellIsCardConfigAdmin
dellIsUserConfigAdmin
dellIsLogClearAdmin
dellIsServerResetUser
dellIsTestAlertUser
dellIsDebugCommandAdmin
dellPermissionMask1
dellPermissionMask2
Tableau 8-6. Classe dellPrivileges
OID 1.2.840.113556.1.8000.1280.1.1.1.4
Description Classe de conteneur pour les privilèges (droits d'autorisation) de
Dell.
Type de classe Classe structurelle
SuperClasses Utilisateur
Attributs dellRAC4Privileges
Tableau 8-7. Classe dellProduct
OID 1.2.840.113556.1.8000.1280.1.1.1.5
Description Classe principale à partir de laquelle tous les produits Dell sont
dérivés.
Type de classe Classe structurelle
SuperClasses Ordinateur
Attributs dellAssociationMembers302 Utilisation du service d'annuaire CMC
Tableau 8-8. Liste des attributs ajoutés au schéma Active Directory
OID attribué/Identifiant d'objet de syntaxe Valeur unique
Attribut : dellPrivilegeMember
Description : Liste des objets dellPrivilege appartenant à
cet attribut.
OID : 1.2.840.113556.1.8000.1280.1.1.2.1
Nom unique : (LDAPTYPE_DN 1.3.6.1.4.1.1466.115.121.1.12)
FALSE
Attribut : dellProductMembers
Description : Liste des objets dellRacDevices appartenant à ce rôle.
Cet attribut est le lien vers l'avant vers le lien vers l'arrière
dellAssociationMembers.
Numéro de lien : 12070
OID : 1.2.840.113556.1.8000.1280.1.1.2.2
Nom unique : (LDAPTYPE_DN 1.3.6.1.4.1.1466.115.121.1.12)
FALSE
Attribut : dellIsCardConfigAdmin
Description : VRAI si l'utilisateur a des droits d'ouverture de session sur
le périphérique.
OID : 1.2.840.113556.1.8000.1280.1.1.2.4
Booléen (LDAPTYPE_BOOLEAN 1.3.6.1.4.1.1466.115.121.1.7)
TRUE
Attribut : dellIsLoginUser
Description : VRAI si l'utilisateur a des droits d'ouverture de session
sur le périphérique.
OID : 1.2.840.113556.1.8000.1280.1.1.2.3
Booléen (LDAPTYPE_BOOLEAN 1.3.6.1.4.1.1466.115.121.1.7)
TRUE
Attribut : dellIsCardConfigAdmin
Description : VRAI si l'utilisateur a des droits d'ouverture de session
sur le périphérique.
OID : 1.2.840.113556.1.8000.1280.1.1.2.4
Booléen (LDAPTYPE_BOOLEAN 1.3.6.1.4.1.1466.115.121.1.7)
TRUEUtilisation du service d'annuaire CMC 303
Attribut : dellIsUserConfigAdmin
Description : VRAI si l'utilisateur a des droits d'administrateur et
configuration des utilisateurs sur le périphérique.
OID : 1.2.840.113556.1.8000.1280.1.1.2.5
Booléen (LDAPTYPE_BOOLEAN 1.3.6.1.4.1.1466.115.121.1.7)
TRUE
Attribut : delIsLogClearAdmin
Description : VRAI si l'utilisateur a des droits d'administrateur et
d'effacement des journaux sur le périphérique.
OID : 1.2.840.113556.1.8000.1280.1.1.2.6
Booléen (LDAPTYPE_BOOLEAN 1.3.6.1.4.1.1466.115.121.1.7)
TRUE
Attribut : dellIsServerResetUser
Description : VRAI si l'utilisateur a des droits de réinitialisation de serveur sur
le périphérique.
OID : 1.2.840.113556.1.8000.1280.1.1.2.7
Booléen (LDAPTYPE_BOOLEAN 1.3.6.1.4.1.1466.115.121.1.7)
TRUE
Attribut : dellIsTestAlertUser
Description : VRAI si l'utilisateur a des droits d'utilisateur et de test d'alertes sur
le périphérique.
OID : 1.2.840.113556.1.8000.1280.1.1.2.10
Booléen (LDAPTYPE_BOOLEAN 1.3.6.1.4.1.1466.115.121.1.7)
TRUE
Attribut : dellIsDebugCommandAdmin
Description : VRAI si l'utilisateur a des droits d'administrateur pour
la commande de débogage sur le périphérique.
OID : 1.2.840.113556.1.8000.1280.1.1.2.11
Booléen (LDAPTYPE_BOOLEAN 1.3.6.1.4.1.1466.115.121.1.7)
TRUE
Attribut : dellSchemaVersion
Description : la version actuelle du schéma est utilisée pour mettre le schéma à jour.
OID : 1.2.840.113556.1.8000.1280.1.1.2.12
Case Ignore String (LDAPTYPE_CASEIGNORESTRING
1.2.840.113556.1.4.905)
TRUE
Tableau 8-8. Liste des attributs ajoutés au schéma Active Directory (suite)
OID attribué/Identifiant d'objet de syntaxe Valeur unique304 Utilisation du service d'annuaire CMC
Attribut : dellRacType
Description : Cet attribut est le type de RAC actuel pour l'objet
dellRacDevice et le lien vers l'arrière vers le lien vers l'avant
dellAssociationObjectMembers.
OID : 1.2.840.113556.1.8000.1280.1.1.2.13
Case Ignore String (LDAPTYPE_CASEIGNORESTRING
1.2.840.113556.1.4.905)
TRUE
Attribut : dellAssociationMembers
Description : Liste des dellAssociationObjectMembers appartenant
à ce produit. Cet attribut est le lien vers l'arrière vers l'attribut lié
dellProductMembers.
ID de lien : 12071
OID : 1.2.840.113556.1.8000.1280.1.1.2.14
Nom distingué (LDAPTYPE_DN 1.3.6.1.4.1.1466.115.121.1.12)
FALSE
Attribut : dellPermissionsMask1
OID : 1.2.840.113556.1.8000.1280.1.6.2.1 Integer (LDAPTYPE_INTEGER)
Attribut : dellPermissionsMask2
OID : 1.2.840.113556.1.8000.1280.1.6.2.2 Integer (LDAPTYPE_INTEGER)
Tableau 8-8. Liste des attributs ajoutés au schéma Active Directory (suite)
OID attribué/Identifiant d'objet de syntaxe Valeur uniqueUtilisation du service d'annuaire CMC 305
Installation de l'extension Dell sur le snap-in Utilisateurs et ordinateurs
Active Directory
Lorsque vous étendez le schéma dans Active Directory, vous devez également
développer le snap-in Utilisateurs et ordinateurs Active Directory pour que
l'administrateur puisse gérer les périphériques RAC (CMC), les utilisateurs et
les groupes d'utilisateurs, les associations RAC et les privilèges RAC.
Lorsque vous installez Systems Management Software à l'aide du DVD Dell
Systems Management Tools and Documentation, vous pouvez étendre le snap-in
en sélectionnant l'option Extension Dell sur le snap-in Utilisateurs et
ordinateurs Active Directory lors de la procédure d'installation. Voir le Guide
d'installation de Dell OpenManage Server Administrator et le Guide
d'installation du logiciel de la station de gestion de Dell OpenManage pour des
instructions supplémentaires sur l'installation du logiciel de gestion des
systèmes.
Pour plus d'informations sur le snap-in Utilisateurs et ordinateurs Active
Directory, voir la documentation Microsoft.
Installation du pack administrateur
Vous devez installer le pack administrateur sur tous les systèmes qui gèrent les
objets CMC d'Active Directory. Si vous n'installez pas le pack administrateur,
vous ne pouvez pas visualiser l'objet RAC Dell dans le conteneur.
Ouverture du snap-in Utilisateurs et ordinateurs Active Directory
Pour ouvrir le snap-in Utilisateurs et ordinateurs Active Directory :
1 Si vous avez ouvert une session sur le contrôleur de domaine, cliquez
sur Démarrer→ Outils d'administration→ Utilisateurs et ordinateurs
Active Directory.
Si vous n'avez pas ouvert une session sur le contrôleur de domaine, le pack
administrateur Microsoft approprié doit être installé sur votre système
local. Pour installer ce pack administrateur, cliquez sur Démarrer→
Exécuter, entrez MMC et appuyez sur . Ceci ouvre la console de
gestion Microsoft (MMC).
2 Dans la fenêtre Console 1, cliquez sur Fichier (ou sur Console sur les
systèmes exécutant Windows 2000).
3 Cliquez sur Ajouter/Supprimer un snap-in.306 Utilisation du service d'annuaire CMC
4 Sélectionnez le snap-in Utilisateurs et ordinateurs Active Directory, puis
cliquez sur Ajouter.
5 Cliquez sur Close (Fermer).
Ajout d'utilisateurs CMC et de leurs privilèges à Active Directory
Le snap-in Utilisateurs et ordinateurs Active Directory étendu par Dell vous
permet d'ajouter des utilisateurs CMC et des privilèges en créant des objets
RAC, Association et Privilège. Pour ajouter chaque type d'objet :
1 Créer un objet Périphérique RAC.
2 Créer un objet Privilège.
3 Créer un objet Association.
4 Ajouter des objets à un objet Association.
Création d'un objet Périphérique RAC
Pour créer un objet Périphérique RAC
1 Dans la fenêtre Racine de la console MMC, cliquez avec le bouton droit
de la souris sur un conteneur.
2 Sélectionnez Nouveau→ Objet RAC Dell.
La fenêtre Nouvel objet apparaît.
3 Entrez un nom pour le nouvel objet. Ce nom doit être identique au nom
CMC saisi à l'étape a de« Configuration de CMC avec le schéma étendu
d'Active Directory et l'interface Web », à la page 308.
4 Sélectionnez Objet du périphérique RAC, puis cliquez sur OK.
Création d'un objet Privilège
REMARQUE : un objet Privilège doit être créé dans le même domaine que l'objet
Association associé.
Pour créer un objet Privilège :
1 Dans la fenêtre Racine de la console (MMC), cliquez avec le bouton droit
de la souris sur un conteneur.
2 Sélectionnez Nouveau→ Objet RAC Dell.
La fenêtre Nouvel objet apparaît.
3 Entrez un nom pour le nouvel objet.
4 Sélectionnez Objet Privilège, puis cliquez sur OK.Utilisation du service d'annuaire CMC 307
5 Cliquez avec le bouton droit de la souris sur l'objet Privilège que vous avez
créé et sélectionnez Propriétés.
6 Cliquez sur l'onglet Privilèges RAC et sélectionnez les privilèges que vous
souhaitez attribuer à l'utilisateur. Pour plus d'informations sur les
privilèges utilisateur CMC, voir « Types d'utilisateurs », à la page 174.
Création d'un objet Association
L'objet Association est dérivé d'un groupe et doit contenir un type de groupe.
L'étendue de l'association spécifie le type de groupe de sécurité pour l'objet
Association. Quand vous créez un objet Association, vous devez choisir l'étendue
de l'association qui s'applique au type d'objet que vous avez l'intention d'ajouter.
Par exemple, si vous sélectionnez Universel, les objets Association sont
uniquement disponibles lorsque le domaine d'Active Directory fonctionne en
mode natif ou supérieur. Pour créer un objet Association :
1 Dans la fenêtre Racine de la console (MMC), cliquez avec le bouton droit
de la souris sur un conteneur.
2 Sélectionnez Nouveau→ Objet RAC Dell.
Cette action ouvre la fenêtre Nouvel objet.
3 Entrez un nom pour le nouvel objet.
4 Sélectionnez Objet Association.
5 Sélectionnez l'étendue de l'objet Association, puis cliquez sur OK.
Ajout d'objets à un objet Association
En utilisant la fenêtre Propriétés de l'objet Association, vous pouvez associer
des utilisateurs, des groupes d'utilisateurs, des objets Privilège et des
périphériques RAC ou des groupes de périphériques RAC. Si votre système
s'exécute sous Windows 2000 ou supérieur, utilisez les groupes universels
pour répartir sur des domaines vos utilisateurs ou vos objets RAC.
Vous pouvez ajouter des groupes d'utilisateurs et de périphériques RAC. La
procédure de création de groupes associés à Dell et de groupes non associés à
Dell est identique.
Ajout d'utilisateurs ou de groupes d'utilisateurs
Pour ajouter des utilisateurs ou des groupes d'utilisateurs :
1 Cliquez avec le bouton droit de la souris sur l'objet Association et
sélectionnez Propriétés.
2 Sélectionnez l'onglet Utilisateurs et cliquez sur Ajouter.
3 Entrez le nom de l'utilisateur ou du groupe d'utilisateurs et cliquez sur OK.308 Utilisation du service d'annuaire CMC
Cliquez sur l'onglet Objet Privilège pour ajouter l'objet Privilège à
l'association qui définit les privilèges de l'utilisateur ou du groupe
d'utilisateurs durant l'authentification auprès d'un périphérique RAC. Vous
ne pouvez ajouter qu'un seul objet Privilège à un objet Association.
Ajout de privilèges
Pour ajouter des privilèges :
1 Sélectionnez l'onglet Objet Privilège et cliquez sur Ajouter.
2 Entrez le nom de l'objet Privilège et cliquez sur OK.
Cliquez sur l'onglet Produits pour ajouter un ou plusieurs périphériques RAC à
l'association. Les périphériques associés spécifient les périphériques RAC
connectés au réseau qui sont disponibles pour les utilisateurs ou les groupes
d'utilisateurs définis. Vous pouvez ajouter plusieurs périphériques RAC à un
objet Association.
Ajout de périphériques RAC ou de groupes de périphériques RAC
Pour ajouter des périphériques RAC ou des groupes de périphériques RAC :
1 Sélectionnez l'onglet Produits et cliquez sur Ajouter.
2 Entrez le nom du périphérique RAC ou du groupe de périphériques RAC
et cliquez sur OK.
3 Dans la fenêtre Propriétés, cliquez sur Appliquer, puis sur OK.
Configuration de CMC avec le schéma étendu d'Active Directory et
l'interface Web
Pour configurer CMC avec le schéma étendu d'Active Directory et
l'interface Web :
1 Ouvrez une session sur l'interface Web de CMC.
2 Sélectionnez Châssis dans l'arborescence.
3 Cliquez sur Authentification utilisateurs→ Services d'annuaire.
La page Services d'annuaire s'affiche.
4 Sélectionnez Microsoft Active Directory (Schéma étendu).
5 Dans la section Paramètres communs :
a Assurez-vous d'avoir coché la case Active Directory activé.
b Entrez le nom de domaine racine.Utilisation du service d'annuaire CMC 309
REMARQUE : le nom de domaine racine doit être un nom de domaine valide
qui respecte la convention d'attribution des noms x.y, où x est une
chaîne ASCII de 1 à 256 caractères sans espace, et où y est un type de
domaine valide tel que com, edu, gov, int, mil, net ou org.
c Entrez le Délai d'attente en secondes. Plage de configuration :
15 à 300 secondes. Par défaut : 90 secondes
6 Facultatif : si vous voulez que l'appel dirigé recherche le contrôleur de
domaine et le catalogue global, cochez la case Chercher le serveur AD à
rechercher (facultatif), puis :
a Dans le champ de texte Contrôleur de domaine, entrez le nom du
serveur sur lequel est installé le service Active Directory.
b Dans le champ de texte Catalogue global, entrez l'emplacement du
catalogue global sur le contrôleur de domaine d'Active Directory. Le
catalogue global fournit une ressource pour rechercher une forêt
Active Directory.
REMARQUE : la définition de l'adresse IP 0.0.0.0 désactive la recherche
d'un serveur par CMC.
REMARQUE : vous pouvez spécifier une liste de serveurs de contrôleur de
domaine ou de catalogue global séparés par des virgules. CMC vous permet
de spécifier jusqu'à trois adresses IP ou noms d'hôte.
REMARQUE : les serveurs de contrôleur de domaine ou de catalogue global
qui ne sont pas correctement configurés pour tous les domaines et
applications peuvent produire des résultats inattendus au cours du
fonctionnement des applications/domaines existants.
7 Dans la section Paramètres du schéma étendu :
a Entrez le nom du dispositif CMC. Le nom CMC identifie de
manière unique la carte CMC dans Active Directory. Le nom CMC
doit être identique au nom de domaine du nouvel objet CMC que
vous avez créé dans votre contrôleur de domaine. Le nom CMC doit
être une chaîne ASCII de 1 à 256 caractères sans espace.
b Entrez le nom de domaine CMC (exemple : cmc.com). Le nom de
domaine CMC est le nom DNS (chaîne) du domaine sur lequel
réside l'objet CMC d'Active Directory. Le nom doit être un nom de
domaine valide sous la forme x.y, où x est une chaîne ASCII de
1 à 256 caractères sans espace entre les caractères, et où y est un type
de domaine valide comme com, edu, gov, int, mil, net ou org.310 Utilisation du service d'annuaire CMC
8 Cliquez sur Appliquer pour enregistrer vos paramètres.
REMARQUE : vous devez appliquer vos paramètres avant de passer à
l'étape suivante, au cours de laquelle vous allez accéder à une autre page. Si
vous n'appliquez pas les paramètres, vous perdrez les paramètres que vous
avez saisis lorsque vous naviguerez vers la page suivante.
9 Dans la section Gérer les certificats, entrez le chemin du fichier du
certificat dans le champ de texte, ou cliquez sur Parcourir pour
sélectionner le fichier de certificat. Cliquez sur le bouton Téléverser pour
transférer le fichier vers CMC.
REMARQUE : la valeur Chemin du fichier affiche le chemin de fichier relatif du
certificat que vous téléversez. Vous devez taper le chemin de fichier absolu, y
compris le chemin et le nom de fichier complets et l'extension du fichier.
La validation du certificat SSL est requise par défaut. Il y a un nouveau
paramètre dans le groupe RACADM cfgActiveDirectory et dans l'interface
graphique pour désactiver la vérification du certificat.
PRÉCAUTION : la désactivation de ce certificat est dangereuse.
Pour activer la validation du certificat SSL (par défaut) :
racadm config -g cfgActiveDirectory -o
cfgADCertValidationEnable 1
Pour désactiver la validation du certificat SSL :
racadm config -g cfgActiveDirectory -o
cfgADCertValidationEnable 0
Les certificats SSL du contrôleur de domaine doivent être signés par
l'autorité de certification racine. Le certificat signé par l'autorité de
certification racine doit être disponible sur la station de gestion accédant
à CMC.
10 Cliquez sur Appliquer. Le serveur Web CMC redémarre
automatiquement lorsque vous cliquez sur Appliquer.
11 Ouvrez à nouveau une session dans l'interface Web CMC.
12 Sélectionnez Châssis dans l'arborescence du système, cliquez sur l'onglet
Réseau, puis cliquez sur le sous-onglet Réseau. La page Configuration
réseau s'affiche.Utilisation du service d'annuaire CMC 311
13 Si Utiliser DHCP pour l'adresse IP de l'interface réseau CMC est activé,
effectuez l'une des opérations suivantes :
• Sélectionnez Utiliser DHCP pour obtenir des adresses de serveur
DNS pour que le serveur DHCP puisse obtenir automatiquement les
adresses du serveur DNS.
• Configurez manuellement une adresse IP de serveur DNS en laissant
la case Utiliser DHCP pour obtenir des adresses de serveur DNS
décochée puis en tapant vos adresses IP de serveur DNS principal et
d'autre serveur DNS dans les champs fournis à cet effet.
14 Cliquez sur Appliquer les modifications.
La configuration de la fonctionnalité Active Directory CMC avec schéma
étendu est terminée.
Configuration de CMC avec le schéma étendu d'Active Directory et
RACADM
Utilisez les commandes suivantes pour configurer la fonctionnalité Active
Directory CMC avec le schéma étendu via l'outil d'interface de ligne de
commande RACADM plutôt que via l'interface Web.
1 Ouvrez une console texte série/Telnet/SSH d'accès à CMC et entrez :
racadm config -g cfgActiveDirectory -o cfgADEnable 1
racadm config -g cfgActiveDirectory -o cfgADType 1
racadm config -g cfgActiveDirectory -o
cfgADRacDomain
racadm config -g cfgActiveDirectory -o
cfgADRootDomain
racadm config -g cfgActiveDirectory -o
cfgADRacName
racadm sslcertupload -t 0x2 -f -r
racadm sslcertdownload -t 0x1 -f
REMARQUE : vous pouvez utiliser cette commande via la RACADM distante
uniquement. Pour plus d'informations sur la RACADM distante, voir « Accès à
distance à RACADM », à la page 81.312 Utilisation du service d'annuaire CMC
Facultatif : si vous voulez spécifier un serveur LDAP ou de catalogue
global au lieu d'utiliser les serveurs renvoyés par le serveur DNS pour
rechercher un nom d'utilisateur, entrez la commande suivante pour activer
l'option Spécifier un serveur :
racadm config -g cfgActiveDirectory -o
cfgADSpecifyServerEnable 1
REMARQUE : lorsque vous utilisez l'option Spécifier un serveur, le nom
d'hôte figurant dans le certificat signé par l'autorité de certification ne
correspond pas au nom du serveur spécifié. Ceci est particulièrement utile si
vous êtes un administrateur CMC car cela vous permet de saisir un nom
d'hôte et une adresse IP.
Après avoir activé l'option Spécifier un serveur, vous pouvez spécifier un
serveur LDAP et un catalogue global avec les adresses IP ou les noms de
domaine complets (FQDN) des serveurs. Les FQDN se composent des
noms d'hôte et des noms de domaine des serveurs.
Pour spécifier un serveur LDAP, entrez :
racadm config -g cfgActiveDirectory -o
cfgADDomainController
Pour spécifier un serveur de catalogue global, entrez :
racadm config -g cfgActiveDirectory -o
cfgADGlobalCatalog
REMARQUE : la définition de l'adresse IP 0.0.0.0 désactive la recherche
d'un serveur par CMC.
REMARQUE : vous pouvez spécifier une liste de serveurs LDAP ou de catalogue
global séparés par des virgules. CMC vous permet de spécifier jusqu'à trois
adresses IP ou noms d'hôte.
REMARQUE : les LDAP qui ne sont pas correctement configurés pour tous
les domaines et applications peuvent produire des résultats inattendus au
cours du fonctionnement des applications/domaines existants.
2 Spécifiez un serveur DNS à l'aide de l'une des options suivantes :
• Si DHCP est activé sur CMC et que vous voulez utiliser l'adresse DNS
obtenue automatiquement par le serveur DHCP, entrez la commande
suivante :
racadm config -g cfgLanNetworking -o
cfgDNSServersFromDHCP 1Utilisation du service d'annuaire CMC 313
• Si le protocole DHCP est désactivé sur CMC ou s'il est activé mais
que vous voulez spécifier manuellement l'adresse IP DNS, entrez les
commandes suivantes :
racadm config -g cfgLanNetworking -o
cfgDNSServersFromDHCP 0
racadm config -g cfgLanNetworking -o
cfgDNSServer1
racadm config -g cfgLanNetworking -o
cfgDNSServer2
La configuration de la fonctionnalité de schéma étendu est terminée.
Questions les plus fréquentes
Tableau 8-9. Utilisation de CMC avec Active Directory : questions les
plus fréquentes
Question Réponse
Puis-je ouvrir une session sur CMC
en utilisant Active Directory sur
plusieurs arborescences ?
Oui. L'algorithme de requête Active Directory
de CMC prend en charge plusieurs
arborescences d'une seule forêt.
L'ouverture d'une session sur CMC
avec Active Directory est-elle
possible en mode mixte (c'est-à-dire,
avec les contrôleurs de domaine de la
forêt s'exécutant sur des systèmes
d'exploitation différents,
comme Microsoft Windows 2000 ou
Windows Server 2003) ?
Oui. En mode mixte, tous les objets utilisés
par la procédure de requête CMC
(notamment, l'utilisateur, l'objet
Périphérique RAC et l'objet Association)
doivent figurer dans le même domaine.
Le snap-in Utilisateurs et ordinateurs Active
Directory étendu par Dell vérifie le mode et
limite les utilisateurs pour créer des objets à
travers les domaines en mode mixte.
L'utilisation de CMC avec
Active Directory permet-elle de
prendre en charge plusieurs
environnements de domaine ?
Oui. Le niveau de la fonction de forêt de
domaine doit être en mode natif ou
Windows 2003. En outre, les groupes parmi
l'objet Association, les objets Utilisateur RAC et
les objets Périphérique RAC (y compris l'objet
Association) doivent être des groupes universels.314 Utilisation du service d'annuaire CMC
Ces objets étendus par Dell (objets
Association Dell, Périphérique RAC
Dell et Privilège Dell) peuvent-ils
appartenir à différents domaines ?
L'objet Association et l'objet Privilège doivent
appartenir au même domaine. Le snap-in
Utilisateurs et ordinateurs Active Directory
étendu par Dell vous force à créer ces deux
objets dans le même domaine. D'autres objets
peuvent appartenir à différents domaines.
Y a-t-il des restrictions concernant
la configuration SSL du contrôleur
de domaine ?
Oui. Tous les certificats SSL pour les serveurs
Active Directory de la forêt doivent être signés
par le même certificat signé par l'autorité de
certification racine car CMC vous permet
uniquement de téléverser un seul certificat
SSL signé par une autorité de certification
de confiance.
J'ai créé un nouveau certificat
de RAC et je l'ai téléversé ;
depuis, l'interface Web ne se
lance pas.
Si vous avez utilisé les services de certificats
Microsoft pour générer le certificat RAC, vous
avez peut-être choisi Certificat d'utilisateur
par inadvertance au lieu de Certificat Web
lorsque vous avez créé le certificat.
Pour récupérer, générez une RSC, puis créez un
nouveau certificat Web avec les services de
certificats Microsoft et téléversez-le avec les
commandes RACADM suivantes :
racadm sslcsrgen [-g]
[-f {filename}]
racadm sslcertupload -t 1 -f
{web_sslcert}
Tableau 8-9. Utilisation de CMC avec Active Directory : questions les
plus fréquentes (suite)
Question RéponseUtilisation du service d'annuaire CMC 315
Que puis-je faire si je n'arrive pas à
ouvrir une session sur CMC avec
l'authentification Active Directory ?
Comment puis -je résoudre ce
problème ?
1 Assurez-vous que vous utilisez le nom de
domaine utilisateur correct pendant
l'ouverture de session, et non le
nom NetBIOS.
2 Si vous avez un compte utilisateur CMC
local, ouvrez une session CMC à l'aide de vos
références locales.
Une fois la session ouverte, effectuez
les étapes suivantes :
a Vérifiez que vous avez coché la case Activer
Active Directory sur la page de
configuration d'Active Directory de CMC.
b Vérifiez que le paramètre DNS est
correct sur la page de configuration du
réseau CMC.
c Vérifiez que vous avez téléversé le certificat
Active Directory sur CMC à partir du
certificat signé par l'autorité de
certification racine d'Active Directory.
d Vérifiez les certificats SSL des contrôleurs
de domaine pour vous assurer qu'ils
n'ont pas expiré.
e Vérifiez que le nom CMC, le nom de
domaine racine et le nom de domaine
CMC correspondent à la configuration de
votre environnement Active Directory.
f Assurez-vous que le mot de passe CMC
contient 127 caractères au maximum.
Tandis que CMC peut prendre en charge
des mots de passe comportant jusqu'à
256 caractères, Active Directory prend
uniquement en charge les mots de passe
d'un maximum de 127 caractères.
Tableau 8-9. Utilisation de CMC avec Active Directory : questions les
plus fréquentes (suite)
Question Réponse316 Utilisation du service d'annuaire CMC
Configuration de la connexion directe
Microsoft Windows 2000, Windows XP, Windows Server 2003, Windows Vista,
Windows 7 et Windows Server 2008 peuvent utiliser Kerberos, un protocole
d'authentification réseau, comme méthode d'authentification permettant aux
utilisateurs qui se sont connectés au domaine de se connecter automatiquement
ou directement à des applications ultérieures telles qu'Exchange.
Dès la version 2.10, CMC peut utiliser Kerberos pour prendre en charge deux
types supplémentaires de mécanismes d'ouverture de session : la connexion
directe et l'ouverture de session par carte à puce. Pour l'ouverture de session
par connexion directe, CMC utilise les informations d'identification du
système client, qui sont mises en mémoire cache par le système d'exploitation
lorsque vous ouvrez une session avec un compte Active Directory valide.
REMARQUE : la sélection d'une méthode d'ouverture de session ne définit pas les
attributs de règles par rapport à d'autres interfaces d'ouverture de session, par
exemple SSH. Vous devez également définir d'autres attributs de règles pour les
autres interfaces d'ouverture de session. Si vous souhaitez désactiver toutes les
autres interfaces d'ouverture de session, naviguez vers la page Services et
désactivez toutes (ou certaines) interfaces d'ouverture de session.
Configuration système requise
Pour utiliser l'authentification Kerberos, votre réseau doit inclure les éléments
suivants :
• Serveur DNS
• Microsoft Active Directory Server
REMARQUE : si vous utilisez Active Directory sous Windows 2003, assurezvous que les derniers service pack et les derniers correctifs sont bien
installés sur le système client. Si vous utilisez Active Directory sous Windows
2008, vérifiez que vous avez bien installé SP1 avec les correctifs suivants :
Windows6.0-KB951191-x86.msu pour l'utilitaire KTPASS. Sans ce correctif,
l'utilitaire génère des fichiers keytab erronés.
Windows6.0-KB957072-x86.msu pour utiliser les transactions GSS_API et SSL
pendant une liaison LDAP.
• Centre de distribution de clés Kerberos (fourni avec le logiciel du serveur
Active Directory Server)
• Serveur DHCP (recommandé)
• La zone inverse du serveur DNS doit comporter une entrée pour le serveur
Active Directory et pour CMCUtilisation du service d'annuaire CMC 317
Systèmes clients
• Pour l'ouverture de session par carte à puce uniquement, Microsoft Visual
C++ 2005 redistribuable doit être installé sur le système client. Pour plus
d'informations, voir
www.microsoft.com/downloads/details.aspx?FamilyID=
32BC1BEEA3F9-4C13-9C99-220B62A191EE&displaylang=en
• Pour la connexion directe et l'ouverture de session par carte à puce, le
système client doit faire partie du domaine Active Directory et du
royaume Kerberos.
CMC
• CMC doit comporter la version 2.10 du micrologiciel ou une
version ultérieure
• Chaque contrôleur CMC doit posséder un compte Active Directory
• CMC doit faire partie du domaine Active Directory et du
royaume Kerberos
Configuration des paramètres
Configuration requise
• Le royaume Kerberos et le centre de distribution de clés (KDC) pour
Active Directory (AD) ont été configurés (ksetup).
• Une infrastructure NTP et DNS robuste pour éviter des problèmes relatifs
à la dérive d'horloge et à la recherche inverse.
• Le groupe de rôles CMC avec schéma standard avec membres autorisés.
Configuration d'Active Directory
Dans la boîte de dialogue Propriétés CMC sous la section des options
Comptes, configurez les paramètres suivants :
• Le compte est fiable pour la délégation : actuellement, CMC n'utilise pas
les informations d'identification transférées qui sont créées lorsque cette
option est sélectionnée. Vous pouvez ou non sélectionner cette option
selon les besoins des autres services.
• Le compte est sensible et ne peut pas être délégué : vous pouvez ou non
sélectionner cette option selon les besoins des autres services.318 Utilisation du service d'annuaire CMC
• Types de cryptage DES de l'utilisateur Kerberos pour le compte :
sélectionnez cette option.
• Ne pas demander la pré-authentification Kerberos : ne sélectionnez pas
cette option.
Exécuter l'utilitaire ktpass (partie de Microsoft Windows) sur le contrôleur de
domaine (serveur Active Directory) sur lequel vous souhaitez mapper CMC à
un compte utilisateur dans Active Directory. Par exemple,
C:\>ktpass -princ
HTTP/cmcname.domain_name.com@REALM_NAME.COM -mapuser
dracname -crypto DES-CBC-MD5 -ptype KRB5_NT_PRINCIPAL
-pass * -out c:\krbkeytab
REMARQUE : cmcname.domainname.com doit être en minuscules
comme requis par RFC et le nom du ROYAUME (@REALM_NAME) doit être en
majuscules. CMC prend en outre en charge le type de cryptographie DES-CBC-MD5
pour l'authentification Kerberos.
Cette procédure génère un fichier keytab que vous devez téléverser sur CMC.
REMARQUE : le fichier keytab contient une clé de cryptage et doit être conservé
en lieu sûr. Pour plus d'informations sur l'utilitaire ktpass, consultez le site Web de
Microsoft à l'adresse :
technet2.microsoft.com/windowsserver/en/library/64042138-9a5a-4981-84e9-
d576a8db0d051033.mspx?mfr=true.
Configuration de CMC
REMARQUE : les étapes de configuration décrites dans cette section s'appliquent
uniquement à l'accès Web CMC.
Configurez CMC pour qu'il utilise le(s) groupe(s) de rôles avec schéma
standard configuré(s) dans Active Directory. Pour plus d'informations, voir
« Configuration du schéma standard d'Active Directory pour accéder à
CMC », à la page 288.
Téléversement du fichier keytab Kerberos
Le fichier keytab Kerberos sert d'informations d'authentification de nom
d'utilisateur et de mot de passe CMC auprès du centre de données Kerberos
(KDC), qui à son tour autorise l'accès à Active Directory. Chaque contrôleur
CMC du royaume Kerberos doit être enregistré auprès d'Active Directory et
doit comporter un fichier keytab unique. Utilisation du service d'annuaire CMC 319
Pour téléverser le fichier keytab :
1 Accédez à l'onglet Authentification utilisateur→ sous-onglet Services
d'annuaire. Vérifiez que Microsoft Active Directory Schéma standard ou
étendu est sélectionné. Si ce n'est pas le cas, sélectionnez votre préférence
et cliquez sur Appliquer.
2 Cliquez sur Parcourir dans la section Téléversement du fichier keytab
Kerberos, naviguez vers le dossier dans lequel vous avez enregistré le fichier
keytab, puis cliquez sur Téléverser.
Lorsque le téléversement est terminé, une zone de message apparaît,
indiquant la réussite ou l'échec du téléversement.
Activation de la connexion directe
1 Cliquez sur l'onglet Sécurité réseau de Chassis Management Controller→
Active Directory→ Configurer Active Directory.
La page Configuration et gestion d'Active Directory s'affiche.
2 Sur la page Configuration et gestion d'Active Directory, sélectionnez :
• Connexion directe : cette option vous permet d'ouvrir une session sur
CMC à l'aide des informations d'identification mises en mémoire
cache obtenues lorsque vous ouvrez une session sur Active Directory.
REMARQUE : toutes les interfaces hors bande de la ligne de commande, y
compris Secure Shell (SSH), Telnet, série et RACADM à distance, restent
inchangées pour cette option
3 Effectuez un défilement vers le bas de la page et cliquez sur Appliquer.
Vous pouvez tester Active Directory avec l'authentification Kerberos à l'aide
de la fonctionnalité de test des commandes de l'interface de ligne de
commande.
testfeature -f adkrb -u @
où utilisateur correspond à un compte d'utilisateur Active Directory valide.
La réussite d'une commande indique que CMC est en mesure d'acquérir des
références Kerberos et d'accéder au compte Active Directory de l'utilisateur.
En cas d'échec de la commande, résolvez l'erreur et répétez la commande.
Pour des informations supplémentaires, consultez le Guide de référence de la
ligne de commande RACADM pour iDRAC6 et CMC à l'adresse
support.dell.com/manuals.320 Utilisation du service d'annuaire CMC
Configuration du navigateur pour l'ouverture de session par
connexion directe
La connexion directe est prise en charge par les versions 6.0 et ultérieures
d'Internet Explorer et par les versions 3.0 et ultérieures de Firefox.
REMARQUE : les instructions suivantes s'appliquent uniquement si CMC utilise la
connexion directe avec l'authentification Kerberos.
Internet Explorer
Pour configurer Internet Explorer pour la connexion directe :
1 Dans Internet Explorer, sélectionnez Outils→ Options Internet.
2 Dans l'onglet Sécurité, sous Cliquez sur une zone pour afficher ou
modifier les paramètres de sécurité, sélectionnez Intranet local.
3 Cliquez sur Sites.
La boîte de dialogue Intranet local s'affiche.
4 Cliquez sur Advanced (Avancé).
La boîte de dialogue Paramètres avancés Intranet local s'affiche.
5 Dans Ajouter ce site Web à la zone, saisissez le nom de CMC et le
domaine auquel il appartient, puis cliquez sur Ajouter.
REMARQUE : vous pouvez utiliser un caractère générique (*) pour spécifier
tous les périphériques/utilisateurs de ce domaine.
Mozilla Firefox
1 Dans Firefox, saisissez about:config dans la barre d'adresses.
REMARQUE : si le navigateur affiche l'avertissement Ceci risque d'annuler
votre garantie, cliquez sur Je ferai attention, promis.
2 Dans la zone de texte Filtre, entrez negotiate.
Le navigateur affiche une liste des noms des préférences qui contiennent
le terme negotiate uniquement.
3 Dans la liste, double-cliquez sur network.negotiate-auth.trusted-uris.
4 Dans la boîte de dialogue Saisir une valeur de chaîne, saisissez le nom de
domaine CMC et cliquez sur OK.Utilisation du service d'annuaire CMC 321
Ouverture d'une session sur CMC avec la connexion directe
REMARQUE : vous ne pouvez pas utiliser l'adresse IP pour ouvrir une session
avec la connexion directe ou par carte à puce. Kerberos valide vos informations
d'identification par rapport au nom de domaine pleinement qualifié (FQDN).
Pour ouvrir une session dans CMC à l'aide de la connexion directe :
1 Ouvrez une session sur le système client avec votre compte réseau.
2 Accédez à la page Web de CMC via
https://
Par exemple, cmc-6G2WXF1.cmcad.lab
où cmc-6G2WXF1 correspond à nom_cmc
cmcad.lab à nom-domaine.
REMARQUE : si vous avez changé le numéro de port HTTPS par défaut (port
80), accédez à la page Web CMC via :, où nomcmc correspond au nom d'hôte CMC de CMC, nom-domaine
au nom du domaine et numéro de port au numéro de port HTTPS.
La page Connexion directe CMC s'affiche.
3 Cliquez sur Login (Connecter).
CMC vous ouvre une session à l'aide des informations d'identification
Kerberos qui ont été mises en mémoire cache par votre navigateur lorsque
vous avez ouvert une session avec votre compte Active Directory valide. En
cas d'échec de l'ouverture de session, le navigateur est redirigé vers la page
d'ouverture de session CMC normale.
REMARQUE : si vous n'avez pas ouvert de session sur le domaine Active
Directory et que vous utilisez un navigateur autre qu'Internet Explorer,
l'ouverture de session échoue et le navigateur affiche uniquement une
page vide. 322 Utilisation du service d'annuaire CMC
Configuration de l'authentification bifactorielle
par carte à puce
Les schémas d'authentification standard utilisent le nom d'utilisateur et le
mot de passe pour authentifier les utilisateurs. Pour sa part, l'authentification
bifactorielle offre un niveau de sécurité supérieur en demandant aux
utilisateurs d'avoir un mot de passe ou un code PIN et une carte physique
comprenant une clé privée ou un certificat numérique. Kerberos, un protocole
d'authentification réseau, utilise ce mécanisme d'authentification bifactorielle
qui permet aux systèmes de prouver leur authenticité. Microsoft
Windows 2000, Windows XP, Windows Server 2003, Windows Vista
et Windows Server 2008 utilisent Kerberos comme méthode
d'authentification préférée. Dès la version 2.10, CMC peut utiliser Kerberos
pour prendre en charge l'ouverture de session par carte à puce.
REMARQUE : la sélection d'une méthode d'ouverture de session ne définit pas les
attributs de règles par rapport à d'autres interfaces d'ouverture de session, par
exemple SSH. Vous devez également définir d'autres attributs de règles pour les
autres interfaces d'ouverture de session. Si vous souhaitez désactiver toutes les
autres interfaces d'ouverture de session, naviguez vers la page Services et
désactivez toutes (ou certaines) interfaces d'ouverture de session.
Configuration système requise
Les « Configuration système requise », à la page 316 pour la carte à puce sont
les mêmes que pour la connexion directe.
Configuration des paramètres
Les « Configuration requise », à la page 317 pour la carte à puce sont les
mêmes que pour la connexion directe.
Configuration d'Active Directory
Pour configurer Active Directory :
1 Configurez le royaume Kerberos et le centre de distribution de clés (KDC)
pour Active Directory, s'ils ne sont pas déjà configurés (ksetup).
REMARQUE : mettez en place une infrastructure NTP et DNS robuste pour
éviter des problèmes relatifs à la dérive d'horloge et à la recherche inverse.Utilisation du service d'annuaire CMC 323
2 Créez des utilisateurs Active Directory pour chaque contrôleur CMC,
configurés pour utiliser le cryptage DES Kerberos, mais non la
préauthentification.
3 Enregistrez les utilisateurs CMC auprès du centre de distribution de clés
avec Ktpass (ceci génère également une clé pour le téléversement sur
CMC).
Configuration de CMC
REMARQUE : les étapes de configuration décrites dans cette section s'appliquent
uniquement à l'accès Web CMC.
Configurez CMC pour qu'il utilise le(s) groupe(s) de rôles avec schéma
standard configuré(s) dans Active Directory. Pour plus d'informations, voir
« Configuration du schéma standard d'Active Directory pour accéder à
CMC », à la page 288.
Téléversement du fichier keytab Kerberos
Le fichier keytab Kerberos sert d'informations d'authentification de nom
d'utilisateur et de mot de passe CMC auprès du centre de données Kerberos
(KDC), qui à son tour autorise l'accès à Active Directory. Chaque contrôleur
CMC du royaume Kerberos doit être enregistré auprès d'Active Directory et
doit comporter un fichier keytab unique.
Pour téléverser le fichier keytab :
1 Accédez à l'onglet Authentification utilisateur→ sous-onglet Services
d'annuaire. Vérifiez que Microsoft Active Directory Schéma standard ou
étendu est sélectionné. Si ce n'est pas le cas, sélectionnez votre préférence
et cliquez sur Appliquer.
2 Cliquez sur Parcourir dans la section Téléversement du fichier keytab
Kerberos, naviguez vers le dossier dans lequel vous avez enregistré le fichier
keytab, puis cliquez sur Téléverser
Lorsque le téléversement est terminé, une zone de message apparaît,
indiquant la réussite ou l'échec du téléversement.324 Utilisation du service d'annuaire CMC
Activation de l'authentification par carte à puce
Pour activer l'authentification par carte à puce :
1 Accédez à l'onglet Authentification utilisateur→ sous-onglet Services
d'annuaire. Vérifiez que Microsoft Active Directory Schéma standard ou
étendu est sélectionné.
2 Dans la section Paramètres courants :
• Carte à puce : cette option exige l'insertion d'une carte à puce dans le
lecteur et la saisie du code PIN.
REMARQUE : toutes les interfaces hors bande de la ligne de commande, y
compris Secure Shell (SSH), Telnet, série et RACADM à distance, restent
inchangées pour cette option
3 Effectuez un défilement vers le bas de la page et cliquez sur Appliquer.
Vous pouvez tester Active Directory avec l'authentification Kerberos en
utilisant la fonctionnalité de test des commandes de l'interface de ligne
de commande.
Entrez :
testfeature -f adkrb -u @
où utilisateur correspond à un compte d'utilisateur Active Directory valide.
La réussite d'une commande indique que CMC est en mesure d'acquérir des
références Kerberos et d'accéder au compte Active Directory de l'utilisateur.
En cas d'échec de la commande, résolvez l'erreur et répétez la commande.
Pour plus d'informations, consultez la documentation de la commande
RACADM testfeature.
Configuration du navigateur pour l'ouverture de session par carte à puce
Mozilla Firefox
CMC 2.10 ne prend pas en charge l'ouverture de session par carte à puce via le
navigateur Firefox.
Internet Explorer
Assurez-vous que le navigateur Internet est bien configuré pour télécharger
des plug-in Active-X.Utilisation du service d'annuaire CMC 325
Ouverture de session sur CMC avec la carte à puce
REMARQUE : vous ne pouvez pas utiliser l'adresse IP pour ouvrir une session
avec la connexion directe ou par carte à puce. Kerberos valide vos informations
d'identification par rapport au nom de domaine pleinement qualifié (FQDN).
Pour ouvrir une session dans CMC à l'aide d'une carte à puce :
1 Ouvrez une session sur le système client avec votre compte réseau.
2 Accédez à la page Web de CMC via
https://
Par exemple, cmc-6G2WXF1.cmcad.lab
où cmc-6G2WXF1 correspond à nom_cmc
cmcad.lab à nom-domaine.
REMARQUE : si vous avez changé le numéro de port HTTPS par défaut
(port 80), accédez à la page Web CMC via :, où nomcmc correspond au nom d'hôte CMC de CMC, nom-domaine
au nom du domaine et numéro de port au numéro de port HTTPS.
La page Connexion directe CMC apparaît et vous invite à insérer la carte
à puce.
3 Insérez la carte à puce dans le lecteur et cliquez sur OK.
La boîte de dialogue contextuelle Code PIN s'affiche.
4 Facultativement, sélectionnez un délai de session. Il s'agit de la durée
pendant laquelle vous restez connecté sans activité. La valeur par défaut
est définie comme le délai d'inactivité du service Web. Voir Configuration
des services pour plus de détails.
5 Saisissez le code PIN, puis cliquez sur OK.
Résolution des problèmes liés à l'ouverture de session par carte à puce
Les astuces suivantes vous permettent de déboguer une carte à puce
inaccessible :
Le plug-in ActiveX est incapable de détecter le lecteur de cartes à puce
Vérifiez que la carte à puce est bien prise en charge sur le système
d'exploitation Microsoft Windows. Windows prend en charge un nombre
limité de fournisseurs de services cryptographiques (CSP) de cartes à puce.326 Utilisation du service d'annuaire CMC
En règle générale, pour vérifier si les CSP de carte à puce sont présents sur
un client donné, insérez la carte à puce dans le lecteur lorsque l'écran
d'ouverture de session de Windows apparaît (Ctrl-Alt-Suppr) et vérifiez si
Windows détecte bien la carte à puce et affiche la boîte de dialogue
Code PIN.
Code PIN de la carte à puce incorrect
Vérifiez si la carte à puce a été bloquée suite à un nombre trop élevé de
tentatives avec un code PIN incorrect. Dans ces cas, l'émetteur de la carte
à puce dans l'organisation peut vous aider à obtenir une nouvelle carte
à puce.
Impossible d'ouvrir une session sur CMC en tant qu'utilisateur
Active Directory
Si vous ne parvenez pas à ouvrir une session sur CMC en tant
qu'utilisateur Active Directory, essayez d'ouvrir une session sur CMC sans
activer l'ouverture de session par carte à puce. Vous avez également la
possibilité de désactiver l'ouverture de session par carte à puce via la
RACADM locale à l'aide des commandes suivantes :
racadm config -g cfgActiveDirectory -o cfgADSCLEnable 0
racadm config -g cfgActiveDirectory -o cfgADSSOEnable 0
Utilisation de CMC avec un LDAP générique
Un administrateur CMC peut désormais intégrer les connexions utilisateur
du serveur LDAP au MCC. Cette intégration nécessite une configuration à la
fois sur le serveur LDAP et CMC. Sur le serveur LDAP, un objet Groupe
standard est utilisé comme groupe de rôles. Un utilisateur ayant accès à CMC
sera membre du groupe de rôles. Les privilèges sont toujours stockés sur
CMC pour autorisation pareil à la configuration du schéma standard avec la
prise en charge d'Active Directory.
Pour permettre à l'utilisateur LDAP d'accéder à une carte CMC spécifique, le
nom du groupe de rôles et son nom de domaine doivent être configurés sur la
carte CMC spécifique. Vous pouvez configurer un maximum de cinq groupes
de rôles dans chaque contrôleur CMC. La Figure 5-43 présente le niveau de
privilège des groupes de rôles et la Figure 8-1 illustre les paramètres par défaut
des groupes de rôles. La Figure 8-5 illustre la configuration de CMC avec un
LDAP générique.Utilisation du service d'annuaire CMC 327
Figure 8-5. Configuration de CMC avec un LDAP générique
Configuration de l'annuaire LDAP générique pour accéder à CMC
La mise en œuvre du LDAP générique de CMC fait appel à deux phases pour
donner l'accès à un utilisateur. La phase 1 commence par l'authentification
des utilisateurs, suivie de la phase 2 pour l'autorisation de l'utilisateur.
Authentification et autorisation des utilisateurs LDAP
Certains serveurs d'annuaire exigent une liaison avant les recherches sur un
serveur LDAP spécifique. Voici les étapes de l'authentification :
1 Effectuez éventuellement la liaison au service d'annuaire. Par défaut, la
liaison est anonyme.
2 Recherchez l'utilisateur en fonction de son nom d'utilisateur. L'attribut par
défaut est uid.
3 Si plusieurs objets sont trouvés, le processus renvoie une erreur.
4 Annulez la liaison et effectuez une liaison avec le DN et le mot de passe de
l'utilisateur.
5 En cas d'échec de la liaison, la connexion échoue également.
Rôle
Groupe
Rôle
Nom du groupe
et nom du
domaine
Rôle
Définition
Utilisateur
Configuration du côté
LDAP générique
Configuration du
CMC328 Utilisation du service d'annuaire CMC
Si ces étapes réussissent, l'utilisateur est considéré comme authentifié.
La phase suivante concerne l'autorisation. CMC stocke un maximum de
5 groupes et leurs privilèges correspondants. Un utilisateur a la possibilité
d'être ajouté à plusieurs groupes au sein du service d'annuaire. Si l'utilisateur
est membre de plusieurs groupes, il obtient les privilèges de tous ses groupes.
Voici les étapes de l'autorisation :
1 Recherchez dans chaque groupe configuré le DN de l'utilisateur dans les
attributs member ou uniqueMember. Ce champ peut être configuré par
l'administrateur.
2 Pour chaque groupe dont l'utilisateur est membre, ajoutez leurs privilèges.
Configuration du service d'annuaire LDAP générique à l'aide de
l'interface Web de CMC
Vous pouvez utiliser le service LDAP (Lightweight Directory Access Protocol)
générique pour configurer votre logiciel afin qu'il fournisse l'accès à CMC. Le
service LDAP vous permet d'ajouter et de contrôler les privilèges utilisateur
CMC de vos utilisateurs existants.
REMARQUE : vous devez disposer du privilège Administrateur de configuration du
châssis pour configurer les paramètres Active Directory pour CMC.
Pour plus d'informations sur la configuration LDAP et la configuration du
LDAP générique, voir « Utilisation de CMC avec un LDAP générique », à la
page 326.
Pour afficher et configurer LDAP :
1 Connectez-vous à l'interface Web.
2 Cliquez sur l'onglet Authentification utilisateur, puis cliquez sur le sousonglet Services d'annuaire. La page Services d'annuaire s'affiche.
3 Cliquez sur le bouton radio associé au LDAP générique.
4 Configurez les options affichées et cliquez sur Appliquer.Utilisation du service d'annuaire CMC 329
La Figure 8-10 affiche les options disponibles :
Tableau 8-10. Paramètres communs
Paramètre Description
LDAP générique activé Active le service LDAP générique sur CMC.
Utilisez le nom unique
(DN) pour rechercher
l'appartenance au groupe
Spécifie le nom unique (DN) de groupes LDAP dont les
membres sont autorisés à accéder au périphérique.
Activer la validation de
certificat SSL
Si activé, CMC utilise le certificat d'une autorité de
certification pour valider le certificat du serveur LDAP
pendant l'établissement de liaisons SSL.
Liaison de DN Le nom unique d'un utilisateur utilisé pour établir la
liaison au serveur lors de la recherche du nom unique de
l'utilisateur d'ouverture de session. S'il n'est pas fourni,
une liaison anonyme est utilisée.
Password (Mot de passe) Mot de passe de liaison à utiliser conjointement avec le
nom unique de liaison.
REMARQUE : le mot de passe de liaison contient des
données sensibles et doit être protégé de manière
appropriée.
Nom unique de base à
rechercher
Nom unique de la branche du répertoire à partir duquel
toutes les recherches doivent débuter.
Attribut de l'identifiant
de l'utilisateur
Spécifie l'attribut à rechercher. S'il n'est pas configuré, uid
est utilisé par défaut. Il est recommandé qu'il soit unique
dans le DN de base choisi, faute de quoi un filtre de
recherche doit être configuré pour assurer l'unicité de
l'utilisateur d'ouverture de session. Si le DN d'utilisateur
ne peut pas être identifié par la recherche de la
combinaison de l'attribut et du filtre de recherche, la
connexion échoue avec une erreur.
Attribut de
l'appartenance au groupe
Spécifie l'attribut LDAP qui est utilisé pour vérifier
l'appartenance au groupe. Il doit s'agir d'un attribut de la
classe de groupe. S'il n'est pas spécifié, les attributs
member et unique member sont utilisés.330 Utilisation du service d'annuaire CMC
Sélection de vos serveurs LDAP
Vous pouvez configurer le serveur pour une utilisation avec le LDAP
générique de deux façons. Les serveurs statiques permettent à
l'administrateur de mettre un nom de domaine pleinement qualifié ou une
adresse IP dans le champ. Par ailleurs, une liste de serveurs LDAP peut être
récupérée en recherchant leur enregistrement SRV dans le DNS.
Les éléments suivants sont les propriétés de la section Serveurs LDAP :
• Utiliser les serveurs LDAP statiques : en sélectionnant cette option, le
service LDAP utilise les serveurs spécifiés avec le numéro de port fourni
(voir les détails ci-dessous).
REMARQUE : vous devez sélectionner Statique ou DNS.
• Adresse de serveur LDAP : préciser le nom de domaine pleinement qualifié
ou l'adresse IP du serveur LDAP. Pour spécifier plusieurs serveurs LDAP
redondants qui desservent le même domaine, fournissez la liste de tous les
serveurs séparés par des virgules. CMC tente de se connecter à chaque
serveur l'un après l'autre jusqu'à ce qu'une connexion soit établie.
• Port de serveur LDAP : port de LDAP sur SSL, par défaut 636 s'il n'est pas
configuré. Le port non SSL n'est pas pris en charge dans la version 3.0 de
CMC puisque le mot de passe ne peut être transporté sans SSL.
• Utiliser le DNS pour trouver des serveurs LDAP : en sélectionnant cette
option, LDAP utiliser le domaine de la recherche et le nom du service via
DNS. Vous devez sélectionner Statique ou DNS.
Filtre de recherche Indique un filtre de recherche LDAP valide. Ceci est
utilisé si l'attribut d'utilisateur ne parvient pas à identifier
de manière unique l'utilisateur d'ouverture de session dans
le nom unique de base choisi. S'il n'est pas spécifié, la
valeur est définie par défaut sur (objectClass=*), qui
recherche tous les objets de l'arborescence. La longueur
maximale de cette propriété est de 1 024 caractères.
Délai d'attente réseau
(secondes)
Définit le délai en secondes après lequel une session
LDAP inactive est automatiquement fermée.
Délai d'attente de
recherche (secondes)
Définit le délai en secondes après lequel une recherche est
automatiquement fermée.
Tableau 8-10. Paramètres communs (suite)
Paramètre DescriptionUtilisation du service d'annuaire CMC 331
La requête DNS suivante est effectuée pour les enregistrements SRV :
_._tcp.
où est le domaine racine à utiliser dans la requête et
est le nom du service à utiliser dans la requête. Par exemple :
_ldap._tcp.dell.com
où ldap est le nom de service et dell.com est le domaine de recherche.
Gestion des paramètres de groupe LDAP
Le tableau qui figure dans la section Paramètres du groupe répertorie les
groupes de rôles et affiche les noms, domaines et privilèges associés des
groupes de rôles qui sont déjà configurés.
• Pour configurer un nouveau groupe de rôles, cliquez sur un nom de groupe
de rôles qui n'a pas de nom, de domaine et de privilège dans la liste.
• Pour modifier les paramètres d'un groupe de rôles existant, cliquez sur le
nom de groupe de rôles.
Lorsque vous cliquez sur un nom de groupe de rôles, la page Configurer le
groupe de rôles s'affiche. L'aide relative à cette page est disponible via le lien
Aide en haut à droite de la page.
Gestion des certificats de sécurité LDAP
Cette section affiche les propriétés du certificat LDAP récemment téléversé
sur CMC. Si vous avez téléversé un certificat, utilisez ces informations pour
vérifier que le certificat est valide et n'a pas expiré.
REMARQUE : par défaut, CMC ne dispose pas d'un certificat de serveur délivré
par une autorité de certification pour Active Directory. Vous devez téléverser un
certificat de serveur valide, signé par une autorité de certification.
Les propriétés suivantes sont affichées pour le certificat :
• Numéro de série : numéro de série du certificat.
• Informations sur le sujet : sujet du certificat (nom de la personne ou de
l'entreprise certifiée).
• Informations sur l'émetteur : émetteur du certificat (nom de l'autorité
de certification).
• Valide à partir de : la date de début du certificat.
• Valide jusqu'à : la date d'expiration du certificat.332 Utilisation du service d'annuaire CMC
Utilisez les commandes ci-dessous pour téléverser et télécharger ce certificat :
• Téléverser : lance le processus de téléversement du certificat. Ce certificat,
qui vous est délivré par votre serveur LDAP, permet d'accéder à CMC.
• Télécharger : lance le processus de téléchargement. Vous êtes invité à
choisir un emplacement où enregistrer le fichier. Lorsque vous
sélectionnez cette option et cliquez sur Suivant, la boîte de dialogue
Téléchargement de fichier apparaît. Utilisez cette boîte de dialogue pour
spécifier l'emplacement réservé au certificat de serveur sur votre station de
gestion ou réseau partagé.
Configuration du service de répertoire LDAP générique avec la RACADM
REMARQUE : cette fonction prend en charge IPv4 et IPv6.
Il existe de nombreuses options permettant de configurer les connexions
LDAP. Dans la plupart des cas, certaines options peuvent être utilisées avec
leurs paramètres par défaut.
REMARQUE : il est vivement recommandé d'utiliser la commande 'racadm
testfeature -f LDAP' pour tester les paramètres LDAP lors des configurations
initiales. Cette fonction prend en charge IPv4 et IPv6.
Les modifications des propriétés requises comprennent l'activation des
connexions LDAP, la configuration du nom de domaine pleinement qualifié ou
de l'adresse IP du serveur, et la configuration du DN de base du serveur LDAP.
• $ racadm config -g cfgLDAP -o cfgLDAPEnable 1
• $ racadm config -g cfgLDAP -o cfgLDAPServer
192.168.0.1
• $ racadm config -g cfgLDAP -o cfgLDAPBaseDN dc=
company,dc=com
CMC peut être configuré pour interroger un serveur DNS à la recherche
d'enregistrements SRV. Si la propriété cfgLDAPSRVLookupEnable est
activée, la propriété cfgLDAPServer est ignorée. La requête suivante est
utilisée pour rechercher des enregistrements SRV dans le DNS :
_ldap._tcp.domainname.com
ldap dans la requête ci-dessus est la propriété
cfgLDAPSRVLookupServiceName.
cfgLDAPSRVLookupDomainName est configuré comme
nomdedomaine.com.Utilisation du service d'annuaire CMC 333
Utilisation
Pour vous connecter à CMC à l'aide d'un utilisateur LDAP, utilisez le nom
d'utilisateur à l'invite de connexion et le mot de passe de l'utilisateur à
l'invite de mot de passe. Si un utilisateur LDAP ne peut pas être identifié
pour une raison quelconque, CMC tente d'utiliser une connexion locale
avec les mêmes nom d'utilisateur et mot de passe. Ceci permet une
connexion si la connectivité réseau est interrompue ou si le serveur LDAP
n'est pas accessible.
Obtention d'aide
Le journal de suivi de CMC contient des informations expliquant pourquoi
un utilisateur ne parvient pas à se connecter. Pour trier les pannes de
connexions LDAP, il est recommandé d'utiliser la commande racadm
testfeature -f LDAP avec le débogage activé.334 Utilisation du service d'annuaire CMCGestion de l'alimentation 335
Gestion de l'alimentation
L'enceinte du serveur Dell PowerEdge M1000e est le serveur modulaire à plus
faible consommation énergétique du marché. Elle a été conçue pour inclure
des blocs d'alimentation et des ventilateurs haute performance, possède une
disposition optimisée afin que l'air circule plus facilement à travers le système
et comporte des composants à faible consommation énergétique répartis dans
l'enceinte. La conception matérielle optimisée est conjuguée à des capacités
de gestion de l'alimentation sophistiquées intégrées dans Chassis
Management Controller (CMC), des blocs d'alimentation et iDRAC pour
vous permettre d'améliorer davantage la gestion de l'alimentation et d'avoir
un contrôle total sur votre environnement d'alimentation.
L'enceinte modulaire PowerEdge M1000e est alimentée en courant alternatif
et distribue la charge sur toutes les unités d'alimentation internes actives.
Le système peut délivrer jusqu'à 16 685 watts d'alimentation alternative
allouée aux modules de serveurs et à l'infrastructure d'enceinte associée.
Vous pouvez contrôler la gestion de l'alimentation grâce à PM3 (Power
Measure, Mitigate, and Manage Console) (console de mesure, d'atténuation
et de gestion d'alimentation) Lorsque PM3 contrôle l'alimentation en
externe, CMC continue à maintenir :
• Règle de redondance
• Connexion à l'alimentation à distance
• Performance du serveur contre redondance de l'alimentation
• Enclenchement dynamique des blocs d'alimentation
• Opération 110 VCA
PM3 gère alors :
• l'alimentation du serveur
• La priorité du serveur
• Capacité maximale de l'alimentation d'entrée du système
• Mode de conservation de puissance maximale
Pour plus d'informations, voir « Gestion de l'alimentation externe », à la page 384.
REMARQUE : la puissance de sortie réelle est basée sur la configuration et la
charge de travail.336 Gestion de l'alimentation
Les fonctionnalités de gestion de l'alimentation du châssis M1000e aident les
administrateurs à configurer l'enceinte afin de réduire la consommation
électrique et à adapter la gestion de l'alimentation à leurs besoins et
environnements uniques.
L'enceinte PowerEdge M1000e peut être configurée pour n'importe laquelle
des trois règles de redondance affectant le comportement des unités
d'alimentation et déterminant la manière dont l'état de redondance du
châssis est signalé aux administrateurs.
Mode de redondance de l'alimentation alternative
La règle de redondance de l'alimentation alternative vise à permettre à un
système d'enceinte modulaire de fonctionner dans un mode dans lequel il
peut tolérer des pannes d'alimentation alternative. Ces pannes peuvent
provenir du réseau d'alimentation alternative, du câblage et de la distribution,
ou d'une unité d'alimentation elle-même.
Lorsque vous configurez un système pour une redondance alternative,
les unités d'alimentation sont divisées en réseaux : les unités d'alimentation
dans les logements 1, 2 et 3 sont dans le premier réseau tandis que les unités
d'alimentation dans les logements 4, 5 et 6 sont dans le deuxième réseau.
Le contrôleur CMC gère l'alimentation de sorte qu'en cas de défaillance d'un
réseau le système continue à fonctionner sans dégradation. La redondance
d'alimentation alternative tolère également les pannes des unités
d'alimentation individuelles.
REMARQUE : puisque l'un des rôles de la redondance d'alimentation alternative
est d'assurer un fonctionnement sans faille du serveur malgré une panne du réseau
électrique, la plus grande puissance est utilisée pour maintenir la redondance
d'alimentation alternative lorsque les capacités des deux réseaux sont à peu
près égales.
REMARQUE : la redondance d'alimentation alternative n'est atteinte que lorsque
les conditions de charge ne dépassent pas la capacité du réseau ayant la plus
faible puissance.Gestion de l'alimentation 337
Niveaux de redondance d'alimentation alternative
La configuration minimum est une unité d'alimentation dans chaque réseau
pour la redondance d'alimentation alternative. D'autres configurations sont
possibles avec toutes les combinaisons qui ont au moins une unité
d'alimentation dans chaque réseau. Cependant, pour rendre disponible la
puissance maximale, la puissance totale des unités d'alimentation dans
chaque colonne doit être aussi égale que possible. La limite maximale de la
puissance tout en conservant la redondance d'alimentation alternative est la
puissance disponible sur le plus faible des deux réseaux. La Figure 9-1 illustre
2 unités d'alimentation par réseau et une panne électrique sur le réseau 1
Si pour une raison quelconque CMC est incapable de maintenir la
redondance d'alimentation alternative, les alertes E-mail et/ou SNMP sont
envoyées aux administrateurs si l'événement Redondance perdue est
configuré pour les alertes.
Figure 9-1. 2 unités d'alimentation par réseau et une panne électrique sur le réseau 1
REMARQUE : en cas de panne d'une seule unité d'alimentation dans cette
configuration, les deux unités d'alimentation restantes dans le réseau défaillant
sont marquées comme En ligne. L'une des unités d'alimentation restantes peut
alors tomber en panne sans interrompre le fonctionnement du système. En cas de
panne d'une unité d'alimentation, l'intégrité du châssis est marquée comme Non
critique. Si le réseau plus petit ne peut pas prendre en charge la totalité des
allocations d'alimentation du châssis, la condition de la redondance d'alimentation
alternative est rapportée comme Sans redondance et l'intégrité du châssis est
affichée comme Critique.
Bloc
d'alimentation
n° 1
Logement
vide
n° 3
Logement
vide
n° 6
Réseau d'alimentation CA 1
Réseau d'alimentation CA 2
Bus d'alimentation CC du châssis
Bloc
d'alimentation
n° 2
Bloc
d'alimentation
n° 4
Bloc
d'alimentation
n° 5338 Gestion de l'alimentation
Mode de redondance des blocs d'alimentation
Le mode de redondance des blocs d'alimentation est utile lorsque des réseaux
d'alimentation redondants ne sont pas disponibles, mais que vous souhaitez
être protégé en cas de panne d'une seule unité d'alimentation entraînant
l'arrêt de vos serveurs dans une enceinte modulaire. L'unité d'alimentation
ayant la plus haute capacité est gardée en ligne à cette fin. Ceci forme un pool
de redondance des blocs d'alimentation. La Figure 9-2 illustre le mode de
redondance des blocs d'alimentation
Les unités d'alimentation se trouvant au-delà de celles exigées pour la
puissance et la redondance sont encore disponibles et seront ajoutées au pool
en cas de défaillance.
Contrairement à la redondance d'alimentation alternative, lorsque la redondance
du bloc d'alimentation est sélectionnée, CMC n'a pas besoin que les unités
d'alimentation soient présentes dans des positions de logement spécifiques.
REMARQUE : l'enclenchement dynamique des blocs d'alimentation (DPSE)
permet de mettre des unités d'alimentation en veille. L'état de veille indique un état
physique où l'alimentation n'est pas fournie. Lorsque vous activez l'enclenchement
dynamique des blocs d'alimentation, les unités d'alimentation supplémentaires sont
mises en mode Veille pour accroître l'efficacité et économiser de l'énergie.
Figure 9-2. Alimentation redondante : 4 blocs d'alimentation au total avec un bloc
d'alimentation en panne.
Bloc
d'alimentation
n° 1
Vide
Logement
n° 5
Bus d'alimentation CC du châssis
Réseau d'alimentation simple ou double :
La redondance des blocs d'alimentation couvre
les défaillances d'un seul bloc d'alimentation.
Bloc
d'alimentation
n° 2
Bloc
d'alimentation
n° 3
Bloc
d'alimentation
n° 4
Vide
Logement
n° 6Gestion de l'alimentation 339
Mode Sans redondance
Le mode Sans redondance est le paramètre d'usine de la configuration à
3 unités d'alimentation et indique qu'aucune redondance de l'alimentation
n'est configurée pour le châssis. Dans cette configuration, la condition
générale de la redondance du châssis indique toujours Sans redondance. La
Figure 9-3 illustre que le mode sans redondance est le paramètre d'usine par
défaut pour la configuration de 3 unités d'alimentation.
CMC n'a pas besoin que les unités d'alimentation soient présentes dans des
positions de logement spécifiques lorsque le mode Sans redondance
n'est configurée.
REMARQUE : toutes les unités d'alimentation dans le châssis sont répertoriées
comme étant En ligne si l'enclenchement dynamique des blocs d'alimentation est
désactivé en mode Sans redondance. Lorsque l'enclenchement dynamique des
blocs d'alimentation est activé, tous les blocs d'alimentation actifs dans le châssis
sont répertoriés comme En ligne et les unités d'alimentation supplémentaires
peuvent être mises en mode Veille pour augmenter l'efficacité du système.
Figure 9-3. Sans redondance avec trois unités d'alimentation dans le châssis
Bloc
d'alimentation
n° 1
Vide
Logement n° 4
Vide
Logement n° 5
Vide
Logement n° 6
Réseau d'alimentation CS 1
Bus d'alimentation CC du châssis
Réseau d'alimentation simple :
Aucune protection en cas de défaillance du
réseau ou d'un bloc d'alimentation
Bloc
d'alimentation
n° 2
Bloc
d'alimentation
n° 3340 Gestion de l'alimentation
Lorsqu'une unité d'alimentation est en panne, les autres unités
d'alimentation quittent le mode Veille, selon les besoins, afin de prendre en
charge les allocations d'alimentation du châssis. Si vous avez 4 blocs
d'alimentation, et n'en avez besoin que de trois, alors dans le cas où l'un des
blocs tombe en panne, le quatrième bloc est mis en ligne. Un châssis peut
avoir les 6 unités d'alimentation en ligne.
Lorsque vous activez l'enclenchement dynamique des blocs d'alimentation,
les unités d'alimentation supplémentaires sont mises en mode Veille pour
accroître l'efficacité et économiser de l'énergie. Pour plus d'informations, voir
« Enclenchement dynamique des blocs d'alimentation », à la page 343.
Bilan de puissance pour les modules matériels
La Figure 9-4 illustre un châssis contenant une configuration à six unités
d'alimentation. Les unités d'alimentation sont numérotées de 1 à 6, en
commençant par le côté gauche de l'enceinte.
Figure 9-4. Châssis doté de six unités d'alimentation
CMC maintient un bilan de puissance de l'enceinte qui réserve la puissance
nécessaire pour tous les serveurs et composants installés.
Unité
d'alimentation1
Unité
d'alimentation3
Unité
d'alimentation5
Unité
d'alimentation2
Unité
d'alimentation4
Unité
d'alimentation6 Gestion de l'alimentation 341
CMC alloue l'alimentation à l'infrastructure CMC et aux serveurs dans le
châssis. L'infrastructure CMC comprend les composants du châssis tels que
les ventilateurs, les modules d'E/S et iKVM (si celui-ci est présent). Le châssis
peut comporter jusqu'à 16 serveurs qui communiquent avec le châssis par le
biais d'iDRAC. Pour plus d'informations, consultez le Guide d'utilisation
d'iDRAC à l'adresse support.dell.com/manuals.
iDRAC fournit à CMC son enveloppe d'alimentation requise avant
d'alimenter le serveur. L'enveloppe d'alimentation comprend les exigences
d'alimentation maximale et minimale requises pour le fonctionnement du
serveur. L'estimation initiale d'iDRAC est fondée sur sa compréhension
initiale des composants du serveur. Après le début de l'exploitation et la
découverte des composants supplémentaires, iDRAC peut augmenter ou
diminuer ses besoins de puissance initiale.
Lorsqu'un serveur est alimenté dans une enceinte, le logiciel iDRAC refait une
estimation des besoins en alimentation et demande une modification
ultérieure de l'enveloppe d'alimentation.
CMC accorde l'alimentation demandée au serveur et la puissance allouée est
soustraite du bilan disponible. Une fois la demande d'alimentation du serveur
satisfaite, le logiciel iDRAC du serveur surveille en continu la consommation
électrique réelle. Selon les besoins d'alimentation réels, l'enveloppe
d'alimentation d'iDRAC peut changer au fil du temps. iDRAC demande une
augmentation de l'alimentation uniquement si les serveurs consomment la
totalité de l'alimentation allouée.
Sous forte charge les performances des processeurs du serveur peuvent être
dégradées pour s'assurer que la consommation d'énergie reste en dessous de la
Limite de la puissance d'entrée système configurée par l'utilisateur.
L'enceinte PowerEdge M1000e peut fournir une alimentation suffisante pour
obtenir des performances optimales de la plupart des configurations de
serveur, mais plusieurs configurations de serveurs disponibles ne consomment
pas l'alimentation maximale pouvant être délivrée par l'enceinte. Pour aider
les centres de données à alimenter leurs enceintes, le châssis M1000e vous
permet de spécifier une limite de la puissance d'entrée système pour garantir
le maintien de l'alimentation alternative du châssis sous un seuil donné.
CMC assure d'abord que suffisamment de puissance est disponible pour faire
fonctionner les ventilateurs, les modules d'E/S, iKVM
(le cas échéant) et CMC lui-même. Cette allocation de l'alimentation est
appelée Alimentation d'entrée allouée à l'infrastructure du châssis. À la suite
de l'infrastructure du châssis, les serveurs dans une enceinte sont mis sous
tension. Toute tentative de définition d'une limite de la puissance d'entrée
système en dessous de la consommation réelle échouera.342 Gestion de l'alimentation
S'il est nécessaire que le bilan d'alimentation total reste inférieur à la valeur de la
Limite de la puissance d'entrée du système, CMC alloue aux servers une valeur
inférieure à l'alimentation maximale demandée. L'alimentation allouée aux
serveurs est fonction de leur paramètre Priorité des serveurs, les serveurs de
priorité 1 obtenant une alimentation maximale, les serveurs de priorité 2 étant
alimentés après les serveurs de priorité 1, et ainsi de suite. Les serveurs de priorité
moindre peuvent être moins alimentés que les serveurs de priorité 1 en fonction
de la capacité maximale de l'alimentation d'entrée du système et du paramètre
Limite de la puissance d'entrée système configuré par l'utilisateur.
Les changements de configuration, tels que l'ajout d'un serveur dans le
châssis, peuvent imposer l'augmentation de la limite de la puissance d'entrée
système. Les besoins d'alimentation de l'enceinte modulaire augmentent
également lorsque les conditions thermiques changent et que les ventilateurs
doivent fonctionner à une vitesse plus élevée, entraînant une plus forte
consommation électrique. L'insertion de modules d'E/S et iKVM augmente
également les besoins d'alimentation de l'enceinte modulaire. Une petite
quantité d'énergie est consommée par les serveurs même lorsqu'ils sont mis
hors tension afin de maintenir alimenté le contrôleur de gestion.
Des serveurs supplémentaires ne peuvent être alimentés au sein de l'enceinte
modulaire que si une alimentation suffisante est disponible. La limite de la
puissance d'entrée système peut être augmentée à tout moment jusqu'à une
valeur maximale de 16 685 watts pour permettre l'alimentation de serveurs
supplémentaires.
Les changements dans l'enceinte modulaire permettant de réduire l'allocation
de puissance sont :
• Mise hors tension du serveur
• Server (Serveur)
• module d'E/S
• Suppression du module iKVM
• Transition du châssis à un état hors tension
Vous pouvez reconfigurer la limite de la puissance d'entrée système lorsque le
châssis est sous ou hors tension.
REMARQUE : lorsque vous insérez un serveur dont la géométrie n'est pas à
hauteur simple, si l'iDRAC ne dispose pas d'une puissance suffisante, le serveur
s'affiche en tant que plusieurs serveurs à hauteur simple.Gestion de l'alimentation 343
Paramètres de priorité de l'alimentation des logements du serveur
CMC vous permet de définir une priorité d'alimentation pour chacun des
seize logements de serveur au sein d'une enceinte. Les paramètres de priorité
vont de 1 (la plus haute) à 9 (la plus basse). Ces paramètres sont assignés aux
logements du châssis et la priorité du logement sera héritée par tout serveur
inséré dans ce logement. CMC utilise la priorité des logements en vue
d'alimenter en priorité les serveurs à priorité supérieure de l'enceinte.
Selon le paramètre de priorité de logement de serveur par défaut, l'alimentation
est répartie de façon égale dans tous les logements. La modification des priorités
des logements permet aux administrateurs de décider quels serveurs ont la
priorité pour les allocations d'alimentation. Si la priorité des modules serveurs
les plus critiques est laissée à la valeur par défaut de 1 et que les modules
serveurs les moins critiques sont définis sur une valeur de priorité de 2 ou plus,
les modules serveurs de priorité 1 sont alimentés en premier. Ces serveurs à
priorité supérieure obtiennent alors leur allocation d'alimentation maximale,
tandis que les serveurs à priorité inférieure peuvent ne pas disposer d'une
allocation d'alimentation suffisante pour fonctionner à leurs performances
maximales, voire ne pas du tout être alimentés, selon la faiblesse de la limite de
la puissance d'entrée système définie et les exigences d'alimentation du serveur.
Si un administrateur alimente manuellement les modules de serveur à faible
priorité avant ceux à priorité plus élevée, les modules de serveur à faible
priorité seront les premiers à avoir une allocation de puissance abaissée à la
valeur minimale, afin d'accommoder les serveurs à priorité plus élevée. Ainsi,
après épuisement de la puissance disponible pour l'allocation, CMC récupère
la puissance des serveurs à faible priorité ou priorité égale jusqu'à ce qu'ils
soient à leur niveau de puissance minimum.
REMARQUE : les modules d'E/S, les ventilateurs et iKVM (s'il est présent) reçoivent
la priorité la plus élevée. CMC récupère l'alimentation uniquement pour répondre aux
besoins d'alimentation d'un module ou d'un serveur de priorité supérieure.
Enclenchement dynamique des blocs d'alimentation
Le mode Enclenchement dynamique des blocs d'alimentation (DPSE) est
désactivé par défaut. L'enclenchement dynamique des blocs d'alimentation
économise l'énergie en optimisant l'efficacité énergétique de la puissance
d'alimentation de l'unité d'alimentation au châssis. Cela entraîne également
une augmentation de la vie de l'unité d'alimentation et une réduction de la
production de chaleur.344 Gestion de l'alimentation
CMC surveille l'allocation d'alimentation totale de l'enceinte et met les
unités d'alimentation non nécessaires en condition de secours, entraînant la
distribution de l'allocation d'alimentation totale du châssis à un nombre
moindre d'unités d'alimentation. Les unités d'alimentation connectées sont
plus efficaces lorsqu'elles fonctionnent à des niveaux de performance plus
élevés. Ainsi cela améliore-t-il leur efficacité tout en améliorant la longévité
des unités d'alimentation en veille.
Pour faire fonctionner les unités d'alimentation restantes à leur maximum
d'efficacité :
• Le mode Sans redondance avec enclenchement dynamique des blocs
d'alimentation économise beaucoup d'énergie, avec seulement le nombre
minimal d'unités d'alimentation en ligne. Les unités d'alimentation non
requises sont placées en mode Veille.
• Le mode Redondance des unités d'alimentation avec enclenchement
dynamique des blocs d'alimentation permet également d'économiser de
l'énergie. Au moins deux blocs d'alimentations sont actifs, avec une unité
d'alimentation nécessaire à l'alimentation de la configuration et une pour
fournir la redondance en cas de panne de l'unité d'alimentation. Le mode
Redondance des unités d'alimentation offre une protection contre la
panne de toute unité d'alimentation, mais ne protège pas en cas de perte
d'un réseau d'alimentation en CA.
• Le mode Redondance de l'alimentation alternative avec enclenchement
dynamique des blocs d'alimentation, dans lequel au moins deux des six
blocs d'alimentation sont actifs, un sur chaque réseau d'alimentation, offre
un bon compromis entre l'efficacité et la disponibilité maximale pour une
configuration d'enceinte modulaire partiellement chargée.
• La désactivation de l'enclenchement dynamique des blocs d'alimentation
(DPSE) offre la plus faible efficacité étant donné que tous les six blocs
d'alimentations sont actifs et partagent la charge, entraînant une plus
faible utilisation de chaque bloc d'alimentation.
Le mode Enclenchement dynamique des blocs d'alimentation peut être
activé pour les trois configurations de redondance des blocs
d'alimentation présentées ci-dessus : Sans redondance, Redondance des
blocs d'alimentation et Redondance de l'alimentation alternative.Gestion de l'alimentation 345
• Dans une configuration Sans redondance avec enclenchement
dynamique des blocs d'alimentation, le châssis M1000e peut comporter
jusqu'à cinq blocs d'alimentation condition de secours. Dans une
configuration à six unités d'alimentation, certaines unités d'alimentation
sont mises en veille et restent inutilisées afin d'améliorer l'efficacité
énergétique. Le retrait ou une panne d'une unité d'alimentation
connectée dans cette configuration entraînera la connexion d'une unité
d'alimentation en mode Veille ; cependant, les unités d'alimentation en
Veille peuvent nécessiter jusqu'à 2 secondes pour s'activer. Aussi certains
modules de serveurs peuvent-ils perdre de la puissance durant la
transition dans la configuration Sans redondance.
REMARQUE : dans une configuration à trois unités d'alimentation, la charge du
serveur peut empêcher la transition vers le mode Veille d'une unité d'alimentation.
• Dans une configuration Redondance des blocs d'alimentation, l'enceinte
maintient toujours une unité d'alimentation supplémentaire sous tension
et marquée En ligne en sus des unités d'alimentation requises pour
l'alimentation de l'enceinte. L'utilisation de l'alimentation est surveillée et
jusqu'à quatre unités d'alimentation peuvent être mises en veille en
fonction de la charge globale du système. Dans une configuration à six
unités d'alimentation, deux blocs d'alimentation au minimum sont
toujours sous tension.
Étant donné qu'une enceinte dans la configuration Redondance des
blocs d'alimentation possède toujours une unité d'alimentation
supplémentaire activée, l'enceinte peut tolérer la perte d'une unité
d'alimentation en ligne et disposer encore d'une alimentation suffisante
pour les modules serveurs installés. La perte de l'unité d'alimentation en
ligne entraîne la mise en ligne d'une unité d'alimentation en veille. Une
panne simultanée de plusieurs unités d'alimentation peut entraîner la
perte d'alimentation de plusieurs modules serveurs pendant la mise sous
tension des unités d'alimentation.
• Dans la configuration Redondance de l'alimentation alternative, tous les
blocs d'alimentation sont activés lors de l'alimentation du châssis.
L'utilisation d'énergie est surveillée, et si la configuration du système et
l'utilisation d'énergie le permettent, les unités d'alimentation sont placées
en mode Veille. Étant donné que l'état Connecté des unités d'alimentation
d'un réseau met en miroir celles de l'autre réseau, l'enceinte peut subir une
perte d'alimentation d'un réseau entier sans aucune interruption de
l'alimentation vers l'enceinte.346 Gestion de l'alimentation
Une augmentation de la demande d'électricité dans la configuration de la
redondance de l'alimentation alternative entraîne l'activation des unités
d'alimentation en mode Veille. Cela permet de maintenir la configuration
en miroir nécessaire pour une redondance de réseau double.
REMARQUE : lorsque le mode Enclenchement dynamique des blocs
d'alimentation est activé, les unités d'alimentation en veille sont mises dans l'état
En ligne afin de récupérer de l'alimentation si la demande en alimentation
augmente dans les trois modes de règles de redondance.
Règles de redondance
La règle de redondance est un ensemble configurable de propriétés qui
détermine la manière dont CMC gère l'alimentation du châssis. Les règles de
redondance suivantes sont configurables avec ou sans enclenchement
dynamique des unités d'alimentation :
• Redondance de l'alimentation alternative
• Redondance des blocs d'alimentation
• Sans redondance
La configuration de la redondance par défaut d'un châssis dépend du nombre
d'unités d'alimentation qu'il contient, tel qu'indiqué dans Figure 9-1.
Redondance de l'alimentation alternative
En mode Redondance d'alimentation alternative avec six unités
d'alimentation, les six sont toutes actives. Les trois unités d'alimentation
situées à gauche doivent être connectées à un réseau de courant alternatif,
alors que les trois unités situées à droite doivent être connectées à un réseau
de courant alternatif différent.
Tableau 9-1. Configuration de la redondance par défaut
Configuration des
unités
d'alimentation
Règle de redondance
par défaut
Paramètre par défaut
d'enclenchement dynamique des
unités d'alimentation
Six unités
d'alimentation
Redondance de
l'alimentation alternative
Désactivé
Trois unités
d'alimentation
Sans redondance DésactivéGestion de l'alimentation 347
PRÉCAUTION : pour éviter une panne système et pour garantir l'efficacité de la
redondance d'alimentation en CA, une série équilibrée d'unités d'alimentation
doit être correctement câblée pour séparer les réseaux d'alimentation en CA.
En cas de défaillance de l'un des réseaux d'alimentation alternative, les unités
d'alimentation du réseau d'alimentation alternative opérationnel prennent la
relève sans interruption pour les serveurs ou l'infrastructure.
PRÉCAUTION : en mode Redondance d'alimentation alternative, vous devez
disposer d'une série équilibrée d'unités d'alimentation (au moins une unité
d'alimentation sur chaque réseau). Si cette condition n'est pas remplie, la
redondance d'alimentation alternative n'est pas possible.
Redondance des blocs d'alimentation
Lorsque le mode Redondance des blocs d'alimentation est activé, une unité
d'alimentation du châssis est conservée comme alimentation de secours,
garantissant ainsi que la défaillance de l'une des unités d'alimentation n'engendre
pas la mise hors tension des serveurs ou du châssis. Le mode Redondance des
blocs d'alimentation nécessite jusqu'à quatre unités d'alimentation. Des unités
d'alimentation supplémentaires, si elles sont présentes, seront utilisées pour
améliorer l'efficacité énergétique du système si le mode Enclenchement
dynamique des blocs d'alimentation est activé. Les pannes ultérieures après une
perte de redondance peuvent entraîner la mise hors tension des serveurs
du châssis.
Sans redondance
Une alimentation excédant l'alimentation nécessaire pour que le châssis soit
disponible, même lors d'une panne, continue d'alimenter le châssis.
PRÉCAUTION : le mode Sans redondance utilise les meilleures unités
d'alimentation lorsque le mode Enclenchement dynamique des blocs
d'alimentation est activé pour les nécessités du châssis. Dans ce mode, l'échec
d'une seule unité d'alimentation entraîne la perte d'alimentation des serveurs et
des données.
Préservation de l'alimentation et modifications du bilan de puissance
CMC préserve l'alimentation lorsque la limite d'alimentation maximale
configurée par l'utilisateur est atteinte. Lorsque la demande en alimentation
excède la Limite de la puissance d'entrée système configurée par l'utilisateur,
CMC réduit l'alimentation des serveurs dans l'ordre de priorité inverse afin de
libérer de l'alimentation pour les serveurs de priorité supérieure et pour les
autres modules du châssis. 348 Gestion de l'alimentation
Lorsque tous les logements du châssis, ou plusieurs d'entre eux, sont
configurés avec le même niveau de priorité, CMC diminue l'alimentation des
serveurs par ordre croissant de numéro de logement. Par exemple, si les
serveurs des logements 1 et 2 ont le même niveau de priorité, l'alimentation
du serveur du logement 1 sera diminuée en premier.
REMARQUE : vous pouvez définir un niveau de priorité à chaque serveur du
châssis en lui attribuant un numéro de 1 à 9 inclus. Le niveau de priorité par défaut
est 1 pour l'ensemble des serveurs. Plus le nombre est faible, plus le niveau de
priorité est élevé.
Pour des instructions concernant l'attribution de niveaux de priorité aux
serveurs, voir « Utilisation de la RACADM », à la page 375.
Vous pouvez attribuer une priorité aux serveurs à l'aide de l'interface utilisateur :
1 Cliquez sur Serveurs dans l'arborescence système.
2 Cliquez sur Alimentation→ Priorité.
Modes Conservation d'énergie et Conservation max
CMC assure la conservation de la puissance maximale lorsque :
• L'utilisateur sélectionne le mode de conservation maximale en utilisant
l'interface Web ou RACADM.
• Un script de commande automatisé en ligne, délivré par un onduleur,
sélectionne le mode de conservation maximale.
En mode de conservation maximale, tous les serveurs commencent à
fonctionner à leur niveau de puissance minimum, et toutes les demandes
ultérieures d'attribution de puissance aux serveurs sont refusées. Dans ce
mode, les performances des serveurs sous tension peuvent être dégradées.
Des serveurs supplémentaires ne peuvent pas être mis sous tension, quelle
que soit la priorité du serveur.
Le système est restauré à son plein rendement lorsque l'utilisateur ou un script
de commande automatisé en ligne autorise le mode de conservation maximale.Gestion de l'alimentation 349
Utilisation de l'interface Web
Vous pouvez activer ou désactiver le mode de conservation maximale à l'aide
de l'interface :
1 Cliquez sur Présentation du châssis dans l'arborescence.
2 Cliquez sur Alimentation→ Configuration.
3 Sélectionnez le Mode de conservation d'énergie max pour activer
l'économie d'énergie maximale, puis cliquez sur Appliquer.
4 Décochez la case Mode de conservation énergétique max pour rétablir le
fonctionnement normal, puis cliquez sur Appliquer.
Utilisation de la RACADM
Ouvrez une console série/Telnet/SSH d'accès à CMC, puis ouvrez une session.
• Pour activer le mode de consommation énergétique maximale, entrez :
racadm config -g cfgChassisPower -o
cfgChassisMaxPowerConservationMode 1
• Pour rétablir le fonctionnement normal, entrez :
racadm config -g cfgChassisPower -o
cfgChassisMaxPowerConservationMode 0
Fonctionnement des unités d'alimentation 110 V
Certaines unités d'alimentation prennent en charge l'entrée 110V CA. Cette
entrée peut dépasser ce qui est autorisé pour le circuit de dérivation. Si une
unité d'alimentation est connectée au courant 110V CA, l'utilisateur doit
définir CMC pour le fonctionnement normal de l'enceinte. S'il n'est pas défini
et si des unités d'alimentation 110 V sont détectées, toutes les demandes
ultérieures d'attribution de puissance aux serveurs seront refusées. Dans ce
cas, les serveurs complémentaires ne peuvent être mis sous tension, quelle que
soit leur priorité. Vous pouvez définir CMC pour une utilisation avec les
unités d'alimentation 110 V en utilisant l'interface Web ou RACADM.350 Gestion de l'alimentation
Utilisation de l'interface Web
Vérifiez que le circuit 110 V est conçu pour le courant prévu, puis procédez
comme suit :
1 Cliquez sur Présentation du châssis dans l'arborescence.
2 Cliquez sur Alimentation→ Configuration.
3 Sélectionnez Autoriser le fonctionnement 110 VCA et cliquez
sur Appliquer.
Utilisation de la RACADM
Vérifiez que le circuit 110 V est conçu pour le courant prévu, puis procédez
comme suit :
1 Ouvrez une console série/Telnet/SSH d'accès à CMC, puis ouvrez une
session.
2 Activez les unités d'alimentation 110 VCA :
racadm config -g cfgChassisPower -o
cfgChassisAllow110VACOperation 1
Performance du serveur contre redondance de l'alimentation
Lorsqu'elle est activée, cette option favorise la performance du serveur et sa
mise sous tension plutôt que le maintien de la redondance de l'alimentation.
Lorsqu'elle est désactivée, le système favorise la redondance de l'alimentation
plutôt que la performance du serveur. Lorsqu'elle est désactivée et que
l'alimentation du châssis est insuffisante, pour la redondance comme pour
une pleine performance, alors afin de préserver la redondance, il se peut que
certains serveurs :
• ne reçoivent pas assez d'alimentation pour assurer une pleine performance.
• ne soient pas alimentés.
Utilisation de l'interface Web
Pour activer l'option Performance du serveur contre redondance de
l'alimentation, procédez comme suit :
1 Cliquez sur Présentation du châssis dans l'arborescence.
2 Cliquez sur Alimentation→ Configuration.
3 Sélectionnez Performance du serveur contre redondance de
l'alimentation, puis cliquez sur Appliquer.Gestion de l'alimentation 351
Pour désactiver l'option Performance du serveur contre redondance de
l'alimentation, procédez comme suit :
1 Cliquez sur Présentation du châssis dans l'arborescence.
2 Cliquez sur Alimentation→ Configuration.
3 Désélectionnez Performance du serveur contre redondance de
l'alimentation, puis cliquez sur Appliquer.
Utilisation de la RACADM
Pour activer l'option Performance du serveur contre redondance de
l'alimentation, procédez comme suit :
1 Ouvrez une console série/Telnet/SSH d'accès à CMC, puis ouvrez
une session.
2 Activer Performance du serveur contre redondance de l'alimentation :
racadm config -g cfgChassisPower -o
cfgChassisPerformanceOverRedundancy 1
Pour désactiver l'option Performance du serveur contre redondance de
l'alimentation, procédez comme suit :
1 Ouvrez une console série/Telnet/SSH d'accès à CMC, puis ouvrez
une session.
2 Désactivez Performance du serveur contre redondance de l'alimentation :
racadm config -g cfgChassisPower -o
cfgChassisPerformanceOverRedundancy 0
Journalisation distante
La consommation d'alimentation peut être enregistrée sur un serveur syslog
distant. La consommation d'alimentation totale, minimale, maximale et
moyenne du châssis tout au long d'une période de collecte peut être
journalisée. Pour des informations supplémentaires sur l'activation de cette
fonctionnalité et la configuration de l'intervalle de collecte/journalisation,
voir les sections associées ci-dessous.352 Gestion de l'alimentation
Utilisation de l'interface Web
Vous pouvez activer la journalisation de l'alimentation distante à l'aide de
l'interface utilisateur. Pour ce faire, ouvrez une session dans l'interface
utilisateur, puis procédez comme suit :
1 Cliquez sur Présentation du châssis dans l'arborescence.
2 Cliquez sur Alimentation→ Configuration.
3 Sélectionnez Journalisation de l'alimentation distante afin de pouvoir
journaliser des événements d'alimentation sur une hôte distant.
4 Spécifiez l'intervalle de journalisation requis (1 à 1 440 minutes).
5 Cliquez sur Appliquer pour enregistrer les modifications.
Utilisation de la RACADM
Ouvrez une console texte série, Telnet ou SSH vers CMC, ouvrez une session,
puis configurez la journalisation de l'alimentation distante tel qu'illustré :
1 Pour activer la fonctionnalité de journalisation de l'alimentation distante,
entrez la commande suivante :
racadm config -g cfgRemoteHosts -o
cfgRhostsSyslogPowerLoggingEnabled 1
2 Pour spécifier l'intervalle de journalisation de votre choix, entrez la
commande suivante :
racadm config -g cfgRemoteHosts -o
cfgRhostsSyslogPowerLoggingInterval n
où n correspond à 1 à 1 440 minutes.
3 Pour déterminer si la fonction de journalisation de l'alimentation distante
est activée, entrez la commande suivante :
racadm getconfig -g cfgRemoteHosts -o
cfgRhostsSyslogPowerLoggingEnabledGestion de l'alimentation 353
4 Pour déterminer l'intervalle de journalisation de l'alimentation distante,
entrez la commande suivante :
racadm getconfig -g cfgRemoteHosts -o
cfgRhostsSyslogPowerLoggingInterval
REMARQUE : la fonctionnalité de journalisation d'alimentation distante
dépend des hôtes syslog distants et s'ils ont été précédemment configurés.
La journalisation vers un ou plusieurs hôtes syslog distants doit être activée ;
sinon, la consommation d'alimentation est journalisée. Ceci peut être
effectuée à l'aide de l'interface utilisateur Web ou l'interface RACADM.
Pour plus de détails, voir les instructions de configuration syslog distant.
Défaillance d'une unité d'alimentation avec règle de redondance dégradée
ou absente
CMC diminue l'alimentation des serveurs en cas d'alimentation insuffisante,
par exemple suite à une défaillance d'une unité d'alimentation. Après avoir
diminué l'alimentation des serveurs, CMC évalue à nouveau les besoins
d'alimentation du châssis. Si les besoins d'alimentation ne sont toujours pas
satisfaits, CMC met hors tension les serveurs moins prioritaires.
L'alimentation des serveurs à priorité plus élevée est progressivement rétablie
tandis que les besoins d'alimentation respectent le bilan de puissance.
REMARQUE : pour configurer la stratégie de redondance, voir « Configuration du
bilan de puissance et de la redondance », à la page 371.
Règle d'enclenchement d'un nouveau serveur
Lorsqu'un nouveau serveur est mis sous tension, il se peut que CMC doive
diminuer l'alimentation des serveurs à priorité inférieure afin d'attribuer une
alimentation plus importante au nouveau serveur si l'ajout de ce dernier
engendre une demande supérieure à l'alimentation disponible pour le châssis.
Ceci se produit lorsque l'administrateur configure une limite d'alimentation
du châssis inférieure à celle nécessaire pour alimenter pleinement les serveurs,
ou lorsque l'alimentation disponible est insuffisante en cas de besoin
énergétique critique de l'ensemble des serveurs présents dans le châssis.
Si l'alimentation libérée en réduisant l'alimentation allouée aux serveurs de
priorité inférieure est insuffisante, il est possible que le nouveau serveur ne
soit pas alimenté. 354 Gestion de l'alimentation
L'alimentation la plus élevée à fournir, nécessaire au fonctionnement optimal
du châssis et de l'ensemble des serveurs (y compris le nouveau serveur),
constitue le cas le plus défavorable pour les besoins d'alimentation. Lorsque
cette alimentation est disponible, tous les serveurs bénéficient d'une
alimentation suffisante et le nouveau serveur peut être mis sous tension.
Lorsque le cas le plus défavorable pour les besoins d'alimentation ne peut
être résolu, l'alimentation est réduite sur les serveurs à priorité inférieure
jusqu'à ce qu'une quantité suffisante soit libérée pour mettre sous tension le
nouveau serveur.
La Figure 9-2 décrit les actions effectuées par CMC lors de la mise sous
tension d'un nouveau serveur dans le scénario décrit ci-dessus.
En cas de défaillance d'une unité d'alimentation, l'état d'intégrité devient non
critique et un événement de défaillance d'unité d'alimentation est généré.
Le retrait d'une unité d'alimentation entraîne un événement de retrait d'unité
d'alimentation.
Si l'un des deux événements provoque une perte de redondance, selon les
allocations d'alimentation, un événement de perte de redondance est généré.
Si la capacité d'alimentation ultérieure ou la capacité d'alimentation de
l'utilisateur est supérieure aux allocations de serveurs, les performances des
serveurs seront dégradées ou, dans le pire des cas, les serveurs pourront être
mis hors tension. Les deux conditions sont dans l'ordre de priorité inverse.
En d'autres termes, les serveurs de priorité inférieure sont mis hors tension
en premier.
Tableau 9-2. Prise en charge par CMC d'une tentative de mise sous tension d'un
serveur
L'alimentation du cas
le plus défavorable
est disponible
Prise en charge par CMC Mise sous
tension
du serveur
Oui La préservation de l'alimentation n'est
pas nécessaire
Autorisé
Non Passage en mode d'économie d'énergie :
• L'alimentation nécessaire au nouveau serveur
est disponible
• L'alimentation nécessaire au nouveau serveur
n'est pas disponible
Autorisé
Non autoriséeGestion de l'alimentation 355
La Figure 9-3 décrit la prise en charge par le micrologiciel de l'arrêt ou du
retrait d'une unité d'alimentation dans le cadre de différentes configurations
de redondance des unités d'alimentation.
Tableau 9-3. Impact d'une défaillance ou du retrait d'une unité d'alimentation sur
le châssis
Configuration
des unités
d'alimentation
Unités
d'alimentation
dynamiques
Enclenchement
Prise en charge par le micrologiciel
Redondance de
l'alimentation
alternative
Désactivé CMC vous alerte lors de la perte de redondance
d'alimentation alternative.
Redondance
des blocs
d'alimentation
Désactivé CMC vous alerte lors de la perte de redondance
des blocs d'alimentation.
Sans redondance Désactivé Réduit l'alimentation des serveurs de priorité
inférieure, le cas échéant.
Redondance de
l'alimentation
alternative
Activé CMC vous alerte lors de la perte de redondance
d'alimentation alternative. Les unités
d'alimentation en mode Attente (s'il y en a) sont
activées afin de compenser la perte d'énergie suite
à la défaillance ou au retrait de l'unité
d'alimentation.
Redondance des
blocs
d'alimentation
Activé CMC vous alerte lors de la perte de redondance
des blocs d'alimentation. Les unités
d'alimentation en mode Attente (s'il y en a) sont
activées afin de compenser la perte d'énergie suite
à une défaillance ou une déconnexion de l'unité
d'alimentation.
Sans redondance Activé Réduit l'alimentation des serveurs de priorité
inférieure, le cas échéant. 356 Gestion de l'alimentation
Retraits d'unités d'alimentation avec règle de redondance dégradée ou absente
CMC conserve une alimentation lorsque vous retirez une unité
d'alimentation ou un cordon d'alimentation alternative d'une unité
d'alimentation. CMC réduit l'alimentation des serveurs à priorité inférieure
jusqu'à ce qu'elle soit prise en charge par les unités d'alimentation restantes
du châssis. Si vous retirez plusieurs unités d'alimentation, CMC évalue à
nouveau les besoins d'alimentation lors du retrait de la seconde unité
d'alimentation afin de déterminer la réponse du micrologiciel. Si les besoins
d'alimentation ne sont toujours pas satisfaits, CMC peut mettre hors tension
les serveurs de priorité inférieure.
Limites
• CMC ne prend pas en charge l'arrêt automatisé d'un serveur à priorité
inférieure en vue de permettre la mise sous tension d'un serveur à priorité
supérieure. Ce type d'arrêt peut néanmoins être exécuté à l'initiative
d'un utilisateur.
• Les modifications apportées à la règle de redondance des unités
d'alimentation sont limitées par le nombre d'unités d'alimentation du
châssis. Vous pouvez sélectionner l'une des trois configurations de
redondance des unités d'alimentation répertoriées dans « Règles de
redondance », à la page 346.
Modifications d'alimentation et de la règle de redondance dans le
journal des événements système
Les modifications de l'état des blocs d'alimentation et de la règle de redondance
de l'alimentation sont enregistrées en tant qu'événements. Les événements liés
au bloc d'alimentation enregistrant des entrées dans le journal des événements
système (SEL) sont les insertions et retraits de blocs d'alimentation, l'insertion
et le retrait d'entrée d'alimentation et la confirmation/annulation de
sorties d'alimentation.Gestion de l'alimentation 357
La Figure 9-4 répertorie les entrées du journal SEL relatives aux changements
des blocs d'alimentation.
Les événements liés aux modifications de la condition de la redondance
d'alimentation qui enregistrent des entrées dans le journal SEL sont une perte de
redondance et un regain de redondance de l'enceinte modulaire qui est configurée
pour la règle d'alimentation en mode Redondance de l'alimentation alternative
ou la règle d'alimentation en mode Redondance des blocs d'alimentation. La
Figure 9-5 liste les entrées du journal SEL liées aux modifications de la stratégie
d'alimentation en mode Redondance de l'alimentation.
Tableau 9-4. Événements du journal SEL relatifs aux modifications d'alimentation
Événement d'alimentation Entrée du journal d'événements système (SEL)
Insertion La présence d'un bloc d'alimentation a
été confirmée
Retrait La présence d'un bloc d'alimentation a
été annulée
Alimentation alternative reçue la perte de l'alimentation a été annulée
perte de l'alimentation alternative la perte de l'alimentation a été confirmée
sortie CC produite La panne d'un bloc d'alimentation a été annulée
perte de sortie en CC La panne d'un bloc d'alimentation a
été confirmée
Fonctionnement 110 V non
reconnu détecté
l'alimentation basse tension d'entrée (110) a
été confirmée
Fonctionnement 110 V reconnu l'alimentation basse tension d'entrée (110) a
été annulée
Tableau 9-5. Événements du journal SEL relatifs aux modifications de la condition de
la redondance d'alimentation
Événement de stratégie
d'alimentation
Entrée du journal d'événements système (SEL)
Perte de la redondance La perte de la redondance a été affirmée
Regain de la redondance La perte de la redondance a été annulée358 Gestion de l'alimentation
Condition de la redondance et intégrité énergétique globale
La condition de la redondance est un facteur de détermination de l'intégrité
énergétique globale. Lorsque la règle de redondance d'alimentation est
définie, par exemple, sur le mode Redondance d'alimentation alternative et
que la condition de la redondance indique que le système fonctionne avec la
redondance, l'intégrité énergétique globale sera généralement OK. Toutefois,
si les conditions d'utilisation de la redondance d'alimentation alternative ne
peuvent pas être remplies, la condition de la redondance est Non et l'intégrité
énergétique globale est Critique. Ceci s'explique par le fait que le système ne
peut pas fonctionner conformément à la règle de redondance configurée.
REMARQUE : CMC n'effectue pas un contrôle préalable de ces conditions lorsque
vous modifiez la règle de redondance par ou vers le mode Redondance
d'alimentation alternative. Ainsi, la configuration de la règle de redondance peut
entraîner immédiatement une perte de redondance ou un regain.
Configuration et gestion de l'alimentation
Vous pouvez utiliser les interfaces Web et RACADM pour gérer et configurer
les commandes d'alimentation de CMC. Vous pouvez notamment :
• Consulter les allocations, la consommation et la condition d'alimentation
du châssis, des serveurs et des unités d'alimentation.
• Configurer le paramètre Limite de la puissance d'entrée système et la règle
de redondance pour le châssis.
• Exécuter des opérations de contrôle de l'alimentation (mise sous tension,
mise hors tension, réinitialisation du système, cycle d'alimentation)
du châssis.
Affichage de la condition d'intégrité des unités d'alimentation
La page Condition du bloc d'alimentation affiche la condition et les mesures
des unités d'alimentation associées au châssis.
Utilisation de l'interface Web
L'état d'intégrité d'une unité d'alimentation peut être consulté de deux
façons : à partir de la section Graphiques du châssis sur la page Condition du
châssis ou sur la page État du bloc d'alimentation. La page Graphiques du
châssis fournit une représentation graphique de l'ensemble des unités
d'alimentation installées dans le châssis. Gestion de l'alimentation 359
Pour consulter la condition d'intégrité des unités d'alimentation à l'aide des
graphiques du châssis :
1 Ouvrez une session sur l'interface Web de CMC.
2 La page Condition du châssis s'affiche. La section droite de la page
Graphiques du châssis fournit une vue arrière du châssis et contient la
condition d'intégrité de toutes les unités d'alimentation. L'état d'intégrité
de l'unité d'alimentation est indiqué par la couleur du sous-graphique
unité d'alimentation :
• Vert : l'unité d'alimentation est présente, sous tension et communique
avec CMC ; il n'y a aucune indication d'événement indésirable.
• Orange : défaillance d'une unité d'alimentation. Consulter le journal
CMC pour des détails sur la défaillance.
• Gris : se produit lors de l'initialisation d'unité d'alimentation et lorsque
le bloc d'alimentation est réglé en mode Veille, pendant l'allumage du
châssis ou l'insertion d'unité d'alimentation. L'unité d'alimentation est
présente et hors tension. Aucune condition défavorable n'est indiquée.
3 Placez le curseur sur un sous-graphique de l'unité d'alimentation pour
afficher le champ textuel ou l'infobulle correspondant. Le champ textuel
fournit des informations complémentaires sur l'unité d'alimentation.
4 Le lien hypertexte du sous-graphique de l'unité d'alimentation permet
d'accéder à la page de l'interface utilisateur de CMC correspondante pour
une navigation directe vers la page État du bloc d'alimentation associée à
l'ensemble des unités d'alimentation.
Pour consulter la condition d'intégrité des unités d'alimentation à l'aide de la
page État du bloc d'alimentation :
1 Ouvrez une session sur l'interface Web de CMC.
2 Sélectionnez Blocs d'alimentation dans l'arborescence du système.
La page État du bloc d'alimentation s'affiche.
La Figure 9-6 et la Figure 9-7 décrivent les informations mentionnées à la
page Condition du bloc d'alimentation. 360 Gestion de l'alimentation
Tableau 9-6. Blocs d'alimentation
Élément Description
Name (Nom) Indique le nom de l'unité d'alimentation : PS-[n], [n] étant le
numéro du bloc d'alimentation.
Présentation Indique si l'unité d'alimentation est Présente ou Absente.
Intégrité OK Indique que l'unité d'alimentation est présente
et qu'elle communique avec CMC. En cas de
perte des communications entre CMC et
l'unité d'alimentation, CMC ne pourra pas
obtenir ni afficher l'état de l'intégrité de
l'unité d'alimentation.
Avertissement Indique que des alertes d'avertissement seules
ont été émises et que des actions correctives
doivent être effectuées. Si aucune action
corrective n'est prise, des pannes d'alimentation
critiques ou graves susceptibles d'affecter
l'intégrité du serveur pourraient se produire.
Grave Indique qu'au moins une alerte de panne a été
générée pour le bloc d'alimentation. L'état
grave indique une panne d'alimentation du
châssis et la nécessité d'effectuer une action
corrective immédiatement.
État de
l'alimentation
Indique l'état d'alimentation des blocs d'alimentation (un seul à la
fois) : En cours d'initialisation, En ligne, Veille, Test de diagnostic,
Échec, Hors ligne, Inconnu ou Absent.
Capacité Affiche la capacité d'alimentation en watts.
Tableau 9-7. Condition de la puissance système
Élément Description
Intégrité globale
énergétique
Indique la condition d'intégrité (OK, Non critique, Critique,
Non récupérable, Autre, Inconnu) de la gestion de
l'alimentation du châssis entier.
Condition de la
puissance système
Affiche la condition de l'alimentation (Activé, Désactivé, Mis
sous tension, Mis hors tension) du châssis.Gestion de l'alimentation 361
Utilisation de la RACADM
Ouvrez une console texte série/Telnet/SSH d'accès à CMC, ouvrez une
session et entrez :
racadm getpminfo
Pour des informations supplémentaires sur la commande getpminfo, y
compris les détails de sorties, voir le Guide de référence de la ligne de
commande RACADM pour iDRAC6 et CMC sur le site de support Dell à
l'adresse support.dell.com/manuals.
Affichage de l'état de la consommation de puissance
CMC fournit la consommation électrique d'entrée réelle de l'intégralité du
système à la page Condition de la consommation énergétique.
Utilisation de l'interface Web
REMARQUE : vous devez disposer du privilège Administrateur de configuration du
châssis pour effectuer des tâches de gestion de l'alimentation.
Pour afficher la condition de la consommation énergétique à l'aide de
l'interface Web :
1 Ouvrez une session sur l'interface Web de CMC.
2 Cliquez sur Présentation du châssis dans l'arborescence.
3 Cliquez sur Alimentation→ Consommation énergétique.
La page Consommation énergétique s'affiche.
REMARQUE : vous pouvez également afficher la condition de la redondance
d'alimentation sous Blocs d'alimentation dans l'arborescence des systèmes→
onglet Condition.
Redondance Indique la condition de la redondance des blocs d'alimentation.
Les valeurs sont les suivantes :
Non : les blocs d'alimentation ne sont pas redondants.
Oui : une redondance totale est appliquée.
Tableau 9-7. Condition de la puissance système
Élément Description362 Gestion de l'alimentation
Utilisation de la RACADM
Pour afficher la condition de la consommation énergétique à l'aide
de RACADM :
Ouvrez une console texte série/Telnet/SSH d'accès à CMC, ouvrez une
session et entrez :
racadm getpminfo
Les Tableaux (de la Figure 9-8 à la Figure 9-11) décrivent les informations
affichées sur la page Consommation énergétique.
Tableau 9-8. Statistiques de l'alimentation en temps réel
Élément Description
Alimentation
d'entrée
du système
Affiche la consommation actuelle cumulée en courant alternatif
de l'ensemble des modules du châssis, mesurée à l'entrée des
unités d'alimentation. La valeur de puissance d'entrée dans le
système est indiquée en watts et en BTU/h.
Alimentation
maximale
du système
Affiche la consommation d'énergie maximale du système depuis
que l'ancienne valeur a été effacée. Cette propriété vous permet
d'effectuer le suivi de la puissance maximale consommée par le
système (châssis et modules) enregistrée sur une période
spécifiée. Cliquez sur le bouton de réinitialisation des
statistiques d'alimentation maximale/minimale sous le tableau
pour effacer cette valeur. La valeur de l'alimentation maximale du
système est indiquée en watts et en BTU/h.
Point de départ
de l'alimentation
maximale
du système
Affiche la date et l'heure enregistrées depuis que la dernière
valeur relative à la consommation d'énergie maximale du système
a été effacée. L'horodatage s'affiche au format hh:mm:ss
MM/JJ/AAAA, où hh correspond aux heures (0 à 24), mm aux
minutes (00 à 60), ss aux secondes (00 à 60), MM au mois
(1 à 12), JJ aux jours (1 à 31) et AAAA à l'année. Cette valeur est
réinitialisée à l'aide du bouton de réinitialisation des statistiques
d'alimentation maximale/minimale et également lorsque CMC
se réinitialise ou échoue.Gestion de l'alimentation 363
Horodatage de
la puissance
maximale
du système
Affiche la date et l'heure enregistrées lorsque le pic de
consommation électrique du système a été atteint au cours de la
période analysée. L'horodatage est affiché au format hh:mm:ss
MM/JJ/AAAA, où hh correspond aux heures (de 0 à 24), mm aux
minutes (de 00 à 60), ss aux secondes (de 00 à 60), MM au mois
(de 1 à 12), JJ au jour (de 1 à 31) et AAAA à l'année.
Puissance
minimale
du système
Affiche le niveau minimum de consommation en courant
alternatif du système (en watts) depuis la dernière réinitialisation
de cette valeur par un utilisateur. Cette propriété vous permet
d'effectuer le suivi de la consommation électrique minimale du
système (châssis et modules) enregistrée sur une période
spécifiée. Cliquez sur le bouton de réinitialisation des
statistiques d'alimentation maximale/minimale sous le tableau
pour effacer cette valeur. La valeur de l'alimentation minimale du
système est indiquée en watts et en BTU/h. Cette valeur est
réinitialisée à l'aide du bouton de réinitialisation des statistiques
d'alimentation maximale/minimale et également lorsque CMC
se réinitialise ou échoue.
Point de départ
de l'alimentation
minimale
du système
Affiche la date et l'heure enregistrées depuis que la dernière
valeur relative à la consommation de courant minimale du
système a été effacée. L' horodatage s'affiche au format hh:mm:ss
MM/JJ/AAAA, où hh correspond aux heures (0 à 24), mm aux
minutes (00 à 60), ss aux secondes (00 à 60), MM au mois
(1 à 12), JJ au jour (1 à 31) et AAAA à l'année. Cette valeur est
réinitialisée à l'aide du bouton de réinitialisation des statistiques
d'alimentation maximale/minimale et également lorsque CMC
se réinitialise ou échoue.
Horodatage
de l'alimentation
minimale
du système
Affiche la date et l'heure enregistrées lorsque la consommation
électrique minimale du système s'est produite sur la période
enregistrée. Le format de l'horodatage est identique à celui décrit
pour l'horodatage de l'alimentation maximale du système.
Tableau 9-8. Statistiques de l'alimentation en temps réel (suite)
Élément Description364 Gestion de l'alimentation
Alimentation à
l'état inactif
Affiche la consommation de courant estimée du châssis à l'état
inactif. L'état inactif est définit comme l'état du châssis lorsqu'il
est sous tension et que tous les modules consomment du courant
alors qu'il est à l'état inactif. Il s'agit d'une valeur estimée et non
mesurée. Cette dernière est estimée en fonction de l'alimentation
cumulée allouée aux composants de l'infrastructure du châssis
tels que les modules d'E/S, les ventilateurs, le module iKVM, les
contrôleurs iDRAC et l'écran LCD. Elle est également estimée en
fonction des besoins minimum en courant pour tous les serveurs
auxquels une alimentation a été allouée et qui sont sous-tension.
La valeur de l'alimentation du système à l'état inactif est indiquée
en watts et en BTU/h.
Alimentation
potentielle
du système
Affiche la consommation de courant estimée du châssis lorsqu'il
fonctionne à pleine puissance. La consommation de courant
maximale définit l'état du châssis lorsqu'il est mis sous tension et
que tous les modules consomment une alimentation maximale.
Il s'agit d'une valeur estimée calculée d'après la consommation
électrique agrégée de l'historique de la configuration système, et non
d'une valeur mesurée. Elle est calculée comme étant l'alimentation
cumulée allouée aux composants de l'infrastructure du châssis
(modules d'E/S, ventilateurs, iKVM, contrôleurs iDRAC et l'écran
LCD du panneau avant) et comme correspondant aux besoins
d'alimentation maximum de tous les serveurs auxquels une
alimentation a été allouée et qui sont sous tension. La valeur de
l'alimentation potentielle du système est indiquée en watts et
en BTU/h.
Lecture du
courant d'entrée
du système
Affiche la consommation de courant d'entrée totale du châssis
basée sur la somme des consommations de courant d'entrée de
chaque module d'unité d'alimentation spécifique présent dans le
châssis. La valeur du courant d'entrée du système est indiquée
en A (ampères).
Tableau 9-8. Statistiques de l'alimentation en temps réel (suite)
Élément DescriptionGestion de l'alimentation 365
Tableau 9-9. État des statistiques de l'énergie en temps réel
Élément Description
Consommation
d'énergie du système
Affiche la consommation d'énergie cumulée en courant
alternatif de tous les modules du châssis, mesurée à l'entrée
des blocs d'alimentation. La valeur est indiquée en kWh
(valeur cumulée).
Heure de début de
la consommation
énergétique
du système
Affiche la date et l'heure enregistrées depuis que la dernière
valeur relative à la consommation d'énergie du système a été
effacée et qu'un nouveau cycle de mesures a débuté.
L'horodatage s'affiche au format hh:mm:ss MM/JJ/AAAA,
où : hh correspond aux heures (0 à 24), mm à minutes (00 à
60), ss à secondes (00 à 60), MM à mois (1 à 12), JJ à jours
(1 à 31) et AAAA l'année. Cette valeur est réinitialisée à l'aide
du bouton de réinitialisation des statistiques énergétiques et
est conservée en cas de réinitialisation ou d'échec de CMC.
Horodatage de la
consommation
d'énergie du système
Affiche la date et l'heure de calcul de la consommation
d'énergie du système pour l'affichage. L'horodatage s'affiche au
format hh:mm:ss MM/JJ/AAAA, où : hh correspond aux heures
(0 à 24), mm à minutes (00 à 60), ss à secondes (00 à 60), MM
à mois (1 à 12), JJ à jours (1 à 31) et AAAA l'année.
Tableau 9-10. Condition de la puissance système
Élément Description
Intégrité globale
énergétique
Indique la condition de l'intégrité du sous-système de
puissance du châssis. :
• Icône de coche verte pour OK
• Icône de point d'exclamation jaune pour Non critique
• Icône de croix rouge pour Critique
Condition de la
puissance système
Affiche l'état de l'alimentation (Activé, Désactivé, Mis sous
tension, /Mis hors tension) du châssis.
Redondance Affiche l'état de la redondance. Les valeurs valides sont les
suivantes :
Non : les unités d'alimentation ne sont pas redondantes
Oui : une redondance totale est appliquée366 Gestion de l'alimentation
Affichage de la condition du bilan de puissance
CMC fournit des aperçus de la condition d'alimentation du sous-système
d'alimentation à la page Condition du bilan de puissance.
Utilisation de l'interface Web
REMARQUE : vous devez disposer du privilège Administrateur de configuration du
châssis pour effectuer des tâches de gestion de l'alimentation.
Pour afficher la condition du bilan de puissance à l'aide de l'interface Web :
1 Ouvrez une session sur l'interface Web de CMC.
2 Cliquez sur Présentation du châssis dans l'arborescence.
3 Cliquez sur Alimentation→ Condition du bilan de puissance.
La page Condition du bilan de puissance s'affiche.
Tableau 9-11. Modules serveurs
Élément Description
Logement Affiche l'emplacement du module de serveur. Le numéro d'ordre de
priorité (de logement) est un numéro séquentiel (de 1 à 16) qui
identifie le module serveur en fonction de son emplacement dans
le châssis.
Name (Nom) Affiche le nom du serveur. Le nom du serveur peut être redéfini
par l'utilisateur.
Présentation Indique si le serveur est présent dans le logement (Oui ou Non).
Si ce champ affiche Extension de n° (où n° est compris entre 1
et 8), le nombre qui suit correspond au logement principal d'un
serveur à logements multiples.
Réelle (AC) Mesure en temps réel de la consommation de puissance réelle du
serveur. La mesure est affichée en watts CA.
Heure de début
de la
consommation
énergétique
cumulée
Mesure en temps réel de la consommation énergétique cumulée
que le serveur a consommée depuis l'heure affichée dans le champ
Heure de début. L'unité de mesure est le Kilowattheure (kWh).
Horodatage
de la
consommation
de puissance
maximale
Affiche la consommation de puissance maximale consommée par le
serveur à un moment donnée. L'heure à laquelle le pic de
consommation électrique s'est produit est enregistrée dans le
champ Horodatage. La mesure est affichée en watts.Gestion de l'alimentation 367
Les tableaux (de la Figure 9-12 à la Figure 9-15) décrivent les informations
affichées sur la page Condition du bilan de puissance.
Pour plus d'informations sur la configuration des paramètres de ces informations,
voir « Configuration du bilan de puissance et de la redondance », à la page 371.
Utilisation de la RACADM
Ouvrez une console texte série/Telnet/SSH d'accès à CMC, ouvrez une
session et entrez :
racadm getpbinfo
Pour des informations supplémentaires sur la commande getpbinfo, y
compris les détails de sortie, voir la section sur la commande getpbinfo du
RACADM Command Line Reference Guide for iDRAC6 and CMC (Guide de
référence de la ligne de commande RACADM pour iDRAC6 et CMC).
Tableau 9-12. Configuration de la stratégie énergétique du système
Élément Description
Limite de la
puissance
d'entrée
système
Affiche la limite de consommation électrique maximale configurée
par l'utilisateur pour l'intégralité du système (châssis, CMC, serveurs,
modules d'E/S, blocs d'alimentation, iKVM et ventilateurs). CMC
applique cette limite en réduisant l'alimentation du serveur ou en
mettant hors tension les modules de serveur à priorité inférieure.
La valeur de la limite de la puissance d'entrée système est indiquée
en watts, BTU/h et pourcentages.
Si la consommation d'énergie du châssis dépasse la limite de la
puissance d'entrée système, les performances des serveurs à priorité
inférieure sont réduites jusqu'à ce que la consommation d'énergie
totale tombe en dessous de cette valeur.
Lorsque les serveurs sont configurés avec la même priorité, la
réduction d'alimentation ou la mise hors tension du serveur
s'applique en fonction de son numéro de connecteur. Par exemple,
le serveur sur le connecteur 1 est sélectionné en premier et celui sur
le connecteur 16 est sélectionné en dernier.368 Gestion de l'alimentation
Règle
de redondance
Indique la configuration de la redondance actuelle : Redondance de
l'alimentation alternative, Redondance du bloc d'alimentation et
Sans redondance.
Redondance de l'alimentation alternative : la charge de
l'alimentation est équilibrée sur l'ensemble des unités
d'alimentation. La moitié d'entre elles doivent être câblées sur un
réseau d'alimentation alternative et l'autre moitié doit être câblée
sur un autre réseau. Lorsque le système s'exécute de manière
optimale en mode Redondance de l'alimentation alternative, la
charge de la puissance est répartie de manière équilibrée sur tous les
blocs d'alimentation actifs. En cas de défaillance d'un réseau, les
unités d'alimentation du réseau de courant alternatif opérationnel
prennent le relais sans interruption.
Redondance des blocs d'alimentation : la capacité de l'unité
d'alimentation la plus puissante du châssis est conservée comme
alimentation de secours, garantissant ainsi que la défaillance de
l'une des unités d'alimentation n'engendre pas la mise hors tension
des modules serveurs ou du châssis.
Redondance des blocs d'alimentation : peut ne pas utiliser les six
blocs d'alimentation ; assez d'unités d'alimentation sont utilisées
pour s'assurer qu'en cas de panne l'un des autres peut continuer à
alimenter le châssis. Les autres blocs d'alimentation peuvent être
mis en mode Veille si le mode Enclenchement dynamique des blocs
d'alimentation est activé.
Sans redondance : la puissance de tous les blocs d'alimentation
actifs est suffisante pour alimenter l'ensemble du châssis, y compris
le châssis, les serveurs, les modules d'E/S, iKVM et CMC. Les autres
blocs d'alimentation peuvent être mis en mode Veille si le mode
Enclenchement dynamique des blocs d'alimentation est activé.
PRÉCAUTION : le mode Sans redondance utilise uniquement
le nombre minimum requis de blocs d'alimentation en même
temps, sans sauvegarde. La panne de l'une des trois unités
d'alimentation utilisées peut entraîner une coupure de courant
et la perte des données des modules de serveur.
Enclenchement
dynamique
des blocs
d'alimentation
Indique si l'activation des blocs d'alimentation dynamique est
activée ou désactivée. L'activation de cette fonctionnalité permet à
CMC de mettre les unités d'alimentation sous-utilisées en mode Veille
en fonction de la règle de redondance définie et des besoins
d'alimentation du système. La mise en mode attente des unités
d'alimentation sous-utilisées augmente l'utilisation et l'efficacité des
unités d'alimentation connectées, ce qui permet d'économiser l'énergie.
Tableau 9-12. Configuration de la stratégie énergétique du système (suite)
Élément DescriptionGestion de l'alimentation 369
Tableau 9-13. Bilan de puissance
Élément Description
Capacité maximale
de l'alimentation
d'entrée du système
Alimentation d'entrée maximale que les blocs d'alimentation
disponibles peuvent fournir au système (en watts).
Réserve de
redondance
d'entrée
Affiche la quantité d'alimentation redondante (en watts) en réserve
pouvant être utilisée en cas de panne d'un réseau de courant
alternatif ou d'un bloc d'alimentation.
Lorsque le châssis est configuré pour fonctionner en mode de
redondance de l'alimentation alternative, la réserve de redondance de
l'alimentation d'entrée correspond à la quantité de courant réservée
pouvant être utilisée en cas de panne du réseau de courant alternatif.
Lorsque le châssis est configuré pour fonctionner en mode de
redondance des blocs d'alimentation, la réserve de redondance de
l'alimentation d'entrée correspond à la quantité d'alimentation de
réserve pouvant être utilisée en cas de panne d'une unité
d'alimentation spécifique.
Alimentation
d'entrée allouée
aux serveurs
Affiche l'alimentation d'entrée cumulée (en watts) que CMC alloue
aux serveurs en fonction de leur configuration.
Alimentation
d'entrée allouée à
l'infrastructure
du châssis
Affiche l'alimentation d'entrée cumulée (en watts) que CMC alloue
à l'infrastructure du châssis (ventilateurs, modules d'E/S, iKVM,
CMC, CMC et iDRAC en veille sur les serveurs).
Total de
l'alimentation
d'entrée
disponible pour
l'allocation
Affiche la puissance totale du châssis, en watts, toujours disponible
pour l'attribution.
Capacité
d'alimentation
d'entrée
en attente
Affiche la quantité de courant d'entrée en attente (en watts)
disponible en cas de panne ou de suppression d'un bloc
d'alimentation. Ce champ affiche des relevés lorsque le système
possède au moins quatre blocs d'alimentation et que
l'enclenchement dynamique des blocs d'alimentation est activé.
REMARQUE : il est possible de voir une unité d'alimentation en veille
mais cela n'influe en rien sur la valeur de la capacité d'alimentation
d'entrée en attente. Dans ce cas, la valeur en watts de cette unité
d'alimentation contribue à la valeur Puissance d'entrée totale pouvant
être allouée. 370 Gestion de l'alimentation
Tableau 9-14. Modules serveurs
Élément Description
Logement Affiche l'emplacement du module de serveur. Le numéro d'ordre de
priorité (de logement) est un numéro séquentiel (de 1 à 16) qui
identifie le module serveur en fonction de son emplacement dans
le châssis.
Name (Nom) Affiche le nom du serveur. Le nom du serveur est défini
par l'utilisateur.
Type Affiche le type du serveur.
Priorité Indique le niveau de priorité affecté au logement du serveur dans le
châssis pour l'établissement du bilan de puissance. CMC utilise
cette valeur dans ses calculs lorsque l'alimentation doit être réduite
ou réattribuée selon les limites d'alimentation définie par
l'utilisateur, ou les défaillances des blocs d'alimentation ou des
réseaux d'alimentation.
Niveaux de priorité : 1 (le plus élevé) à 9 (le plus faible)
Par défaut :1
REMARQUE : le niveau de priorité du logement du serveur est associé
au logement du serveur, et non au serveur inséré dans le logement.
Si vous déplacez un serveur vers un logement différent du châssis ou
vers un autre châssis, la priorité précédemment associée au nouveau
logement détermine celle du serveur déplacé.
État de
l'alimentation
Affiche l'état d'alimentation du serveur :
• - : CMC n'a pas déterminé l'état d'alimentation du serveur.
• Désactivé : le serveur ou le châssis est désactivé.
• Activé : le châssis et le serveur sont activés.
• Activation : état temporaire entre le mode Désactivé et Activé.
Lorsque le cycle d'activation est terminé, l'état d'alimentation
passe en mode Activé.
• Désactivation : état temporaire entre le mode Activé et
Désactivé. Lorsque le cycle de désactivation est terminé, l'état
d'alimentation passe en mode Désactivé.
Bilan alloué :
réel
Indique la quantité d'alimentation allouée au module de serveur.
• Réel : puissance actuelle allouée à chaque serveur. Gestion de l'alimentation 371
Configuration du bilan de puissance et de la redondance
Le service de gestion de l'alimentation CMC optimise la consommation
électrique pour l'ensemble du châssis (châssis, serveurs, modules d'E/S,
iKVM, CMC et unités d'alimentation) et réattribue l'alimentation aux
différents modules en fonction de la demande.
Utilisation de l'interface Web
REMARQUE : vous devez disposer du privilège Administrateur de configuration du
châssis pour effectuer des tâches de gestion de l'alimentation.
Pour configurer le bilan de puissance à l'aide de l'interface Web :
1 Ouvrez une session sur l'interface Web de CMC.
2 Cliquez sur Présentation du châssis dans l'arborescence.
3 Cliquez sur Alimentation→ Configuration.
La page Configuration du bilan/de la redondance s'affiche.
4 Définissez une ou toutes les propriétés décrites dans la Figure 9-16 en
fonction de vos besoins.
5 Cliquez sur Appliquer pour enregistrer les modifications.
Pour actualiser le contenu de la page Configuration du bilan/de la redondance,
cliquez sur Actualiser. Pour en imprimer le contenu, cliquez sur Imprimer.
Tableau 9-15. Blocs d'alimentation du châssis
Élément Description
Nom Affiche le nom de l'unité d'alimentation au format PS-n, où n
correspond au numéro du bloc d'alimentation.
État de
l'alimentation
Indique l'état de l'alimentation de l'unité d'alimentation : En cours
d'initialisation, En ligne, En veille, Test de diagnostic, Échec,
Inconnu ou Absent (manquant).
Tension
d'entrée
Affiche la tension d'entrée actuelle dans le bloc d'alimentation.
Courant
d'entrée
Affiche le courant d'entrée actuel dans le bloc d'alimentation.
Alimentation
nominale
de sortie
Affiche l'alimentation nominale de sortie maximale du
bloc d'alimentation.372 Gestion de l'alimentation
Tableau 9-16. Propriétés du budget/de la redondance d'alimentation
configurables
Élément Description
Limite de la
puissance d'entrée
système
La limite de la puissance d'entrée système correspond à la
quantité maximale de courant alternatif que le système peut
allouer aux serveurs et à l'infrastructure du châssis. Cette
dernière peut être configurée par l'utilisateur sur n'importe
quelle valeur supérieure à celle de l'alimentation minimale
nécessaire aux serveurs activés et à l'infrastructure du châssis.
La configuration d'une valeur inférieure nécessaire aux
serveurs provoque un échec de l'infrastructure du châssis.
L'alimentation allouée aux serveurs et à l'infrastructure de
châssis se trouve dans l'interface utilisateur à la page
Présentation du châssis → Alimentation → Condition du
bilan de puissance dans la section Bilan de puissance ou via
la commande d'utilitaires CLI RACADM
(racadm getpbinfo).
Les utilisateurs peuvent désactiver un ou plusieurs serveurs
afin de réduire l'allocation d'alimentation en cours et tenter à
nouveau de configurer une valeur inférieure pour la limite de
la puissance d'entrée ou simplement configurer la capacité
avant de mettre les serveurs sous tension.
Pour modifier ce paramètre, vous pouvez entrer une valeur
dans n'importe quelle unité. L'interface assure que le champ
de l'unité dernièrement changé correspond à la valeur
soumise lors de l'application de ces modifications.
REMARQUE : pour planifier la capacité, consultez le
planificateur de capacité pour les centres de données (DCCP) à
l'adresse www.dell.com/calc.
REMARQUE : lorsque des modifications de valeur sont
spécifiées en watts, la valeur suggérée reflète exactement ce
qui est réellement appliqué. Toutefois, lorsque ces modifications
sont soumises en BTU/h ou en pourcentage, la valeur soumise
peut ne pas refléter exactement ce qui est appliqué. Cette
différence vient du fait que ces unités sont converties en watts,
puis appliquées (la conversion peut entraîner une erreur
d'arrondi). Gestion de l'alimentation 373
Règle de redondance Cette option vous permet de sélectionner l'une des options
suivantes :
• Sans redondance : la puissance des blocs d'alimentation est
utilisée pour alimenter l'ensemble du châssis, y compris le
châssis, les serveurs, les modules d'E/S, iKVM et CMC.
Aucun bloc d'alimentation ne doit être gardé en réserve.
REMARQUE : le mode Sans redondance utilise uniquement le
nombre minimum requis de blocs d'alimentation en même
temps. Si le nombre minimum de blocs d'alimentation est
installé, il n'y a pas de sauvegarde disponible. La panne de l'un
des trois blocs d'alimentation utilisés peut provoquer une perte
d'alimentation et/ou de données sur les serveurs. Si le nombre
de blocs d'alimentation requis est dépassé, les blocs
d'alimentation supplémentaires peuvent être placés en mode
de veille afin d'améliorer l'efficacité énergétique si le mode
Enclenchement dynamique des blocs d'alimentation est activé.
• Redondance des blocs d'alimentation : la capacité du bloc
d'alimentation nominal le plus important dans le châssis est
conservée comme alimentation de réserve, garantissant ainsi
le maintien de la mise sous tension des modules serveurs ou
du châssis en cas de défaillance de l'un des blocs
d'alimentation (unité de remplacement).
Le mode Redondance des blocs d'alimentation peut ne pas
utiliser tous les blocs installés. Les blocs
d'alimentation supplémentaires, s'ils sont présents, peuvent
être mis en veille afin d'améliorer l'efficacité énergétique si le
mode d'enclenchement dynamique des blocs d'alimentation
est activé. Le mode Redondance des blocs d'alimentation
empêche toute activation des modules de serveur lorsque la
consommation de courant du châssis dépasse l'alimentation
nominale. La panne de deux blocs d'alimentation peut
entraîner la mise hors tension de tout ou partie des modules
de serveur se trouvant dans le châssis. Les performances des
modules serveurs ne sont pas dégradées dans ce mode.
• Redondance de l'alimentation alternative : ce mode sépare
la moitié des unités d'alimentation en deux réseaux
d'alimentation (par exemple, les unités d'alimentation 1 à 3
composent le réseau d'alimentation 1 et les unités
d'alimentation 4 à 6 le réseau d'alimentation 2). La panne
d'une unité d'alimentation ou la perte de l'alimentation
alternative vers un réseau indique la perte de la redondance.
Tableau 9-16. Propriétés du budget/de la redondance d'alimentation
configurables (suite)
Élément Description374 Gestion de l'alimentation
Performance du
serveur contre
redondance de
l'alimentation
Lorsqu'elle est activée, cette option favorise la performance du
serveur et sa mise sous tension plutôt que le maintien de la
redondance de l'alimentation. Pour des informations
supplémentaires sur cette fonctionnalité, voir « Performance du
serveur contre redondance de l'alimentation », à la page 350.
Enclenchement
dynamique des blocs
d'alimentation
Permet la gestion d'énergie dynamique lorsque sélectionné.
En mode Enclenchement dynamique, les blocs
d'alimentation sont activés (en ligne) ou désactivés (en veille)
en fonction de la consommation électrique afin d'optimiser la
consommation énergétique dans l'ensemble du châssis.
Par exemple, si votre budget d'alimentation s'élève à 5000 watts,
votre stratégie de redondance est définie en mode Redondance
de l'alimentation alternative et vous disposez de 6 unités
d'alimentation. CMC définit 4 unités d'alimentation destinées à
la redondance alternative alors que les deux autres restent en
mode Veille. Si 2 000 W supplémentaires sont requis pour les
nouveaux serveurs installés ou si l'efficacité de l'alimentation de
la configuration système existante doit être améliorée, les deux
blocs d'alimentation en veille sont alors activés.
Désactiver le bouton
d'alimentation du
châssis
Désactive le bouton d'alimentation du châssis lorsque
sélectionné. Si la case est cochée et si vous tentez de modifier
l'état de l'alimentation du châssis en appuyant sur le bouton
d'alimentation du châssis, l'opération est ignorée.
Autoriser le
fonctionnement 110
VCA
Permet une utilisation normale, si les unités d'alimentation
sont connectées à une entrée 110 VCA, lorsque sélectionné.
Pour plus d'informations, voir « Fonctionnement des unités
d'alimentation 110 V», à la page 349.
Mode de
conservation max
Lorsque sélectionné, active immédiatement le mode de
conservation maximale de la puissance. Pour plus
d'informations, voir « Modes Conservation d'énergie et
Conservation max », à la page 348.
Tableau 9-16. Propriétés du budget/de la redondance d'alimentation
configurables (suite)
Élément DescriptionGestion de l'alimentation 375
Utilisation de la RACADM
Pour activer la redondance et définir la règle de redondance :
REMARQUE : vous devez disposer du privilège Administrateur de configuration du
châssis pour effectuer des tâches de gestion de l'alimentation.
1 Ouvrez une console série/Telnet/SSH d'accès à CMC, puis ouvrez
une session.
2 Définissez les propriétés selon vos besoins :
• Pour sélectionner une règle de redondance, entrez la commande :
racadm config -g cfgChassisPower -o
cfgChassisRedundancyPolicy
où (valeur) est 0 (Sans redondance), 1 (Redondance de
l'alimentation alternative) ou 2 (Redondance des blocs
d'alimentation). La valeur par défaut est 0.
Par exemple, la commande suivante :
racadm config -g cfgChassisPower -o
cfgChassisRedundancyPolicy 1
définit la règle de redondance sur 1.
• Pour activer ou désactiver l'enclenchement dynamique des unités
d'alimentation, entrez la commande :
racadm config -g cfgChassisPower -o
cfgChassisDynamicPSUEngagementEnable
où (valeur) est 0 (désactiver) ou 1 (activer). La valeur par
défaut est 0.
Par exemple, la commande suivante :
racadm config -g cfgChassisPower -o
cfgChassisDynamicPSUEngagementEnable 0
désactive l'enclenchement dynamique des unités d'alimentation.
Pour des information sur les commandes RACADM pour l'alimentation du
châssis, voir les sections config, getconfig, getpbinfo et cfgChassisPower dans
le RACADM Command Line Reference Guide for iDRAC6 and CM (Guide de
référence de la ligne de commande RACADM pour iDRAC6 et CMC).376 Gestion de l'alimentation
Affectation de niveaux de priorité aux serveurs
Les niveaux de priorité déterminent les serveurs qui doivent alimenter le
contrôleur CMC lorsqu'il a besoin de puissance supplémentaire.
REMARQUE : la priorité que vous affectez à un serveur est liée au logement dans
lequel il est installé et non au serveur lui-même. Si vous déplacez le serveur, vous
devez redéfinir la priorité à partir de son nouveau logement.
REMARQUE : vous devez disposer du privilège Administrateur de configuration du
châssis pour effectuer des tâches de gestion de l'alimentation.
Utilisation de l'interface Web
Pour affecter les niveaux de priorité à l'aide de l'interface Web du CMC :
1 Ouvrez une session sur l'interface Web de CMC.
2 Cliquez sur Présentation des serveurs dans l'arborescence. La page
Condition du serveur s'affiche.
3 Cliquez sur Alimentation→ Priorité des serveurs.
La page Priorité des serveurs affiche tous les serveurs installés dans
le châssis.
4 Sélectionnez un niveau de priorité (de 1 à 9, 1 étant le niveau le plus
élevé) pour le ou les serveurs de votre choix. La valeur par défaut est 1.
Vous pouvez affecter le même niveau de priorité à plusieurs serveurs.
5 Cliquez sur Appliquer pour enregistrer les modifications.
Utilisation de la RACADM
Ouvrez une console texte série/Telnet/SSH d'accès à CMC, ouvrez une
session et entrez :
racadm config -g cfgServerInfo -o cfgServerPriority -i
où (numéro de logement) (de 1 à 16) correspond au logement
du serveur et (niveau de priorité) est une valeur comprise
entre 1 et 9.
Par exemple, la commande suivante :
racadm config -g cfgServerInfo -o cfgServer Priority -i 5 1
définit le niveau de priorité sur 1 pour le serveur dans le logement 5.Gestion de l'alimentation 377
Définition du bilan de puissance
REMARQUE : vous devez disposer du privilège Administrateur de configuration du
châssis pour effectuer des tâches de gestion de l'alimentation.
Utilisation de l'interface Web
Pour définir le bilan de puissance à l'aide de l'interface Web CMC :
1 Ouvrez une session sur l'interface Web de CMC.
2 Cliquez sur Présentation du châssis dans l'arborescence. La page Intégrité
du châssis s'affiche.
3 Cliquez sur l'onglet Alimentation. La page État de la consommation
énergétique s'affiche.
4 Cliquez sur le sous-onglet Configuration.
La page Configuration du bilan/de la redondance s'affiche.
5 Entrez une valeur d'allocation d'énergie allant jusqu'à 11 637 watts dans le
champ textuel Limite de la puissance d'entrée système.
REMARQUE : le bilan d'alimentation maximal correspond à l'alimentation de
l'ensemble de trois unités d'alimentation le plus faible. Si vous tentez de
définir une valeur du bilan d'alimentation alternative supérieure, CMC affiche
un message de panne.
REMARQUE : lorsque des modifications de valeur sont spécifiées en watts,
la valeur suggérée reflète exactement ce qui est réellement appliqué.
Toutefois, lorsque les modifications sont soumises en BTU/h ou en
pourcentage, la valeur soumise peut ne pas refléter exactement ce qui est
réellement appliqué. Cette différence vient du fait que ces unités sont
converties en watts, puis appliquées (la conversion peut entraîner une erreur
d'arrondi).
6 Cliquez sur Appliquer pour enregistrer les modifications.
Utilisation de la RACADM
Ouvrez une console texte série/Telnet/SSH d'accès à CMC, ouvrez une
session et entrez :
racadm config -g cfgChassisPower -o
cfgChassisPowerCap 378 Gestion de l'alimentation
où (valeur) est un nombre compris entre 2 715 et 16 685 qui
représente la limite d'alimentation maximale en watts. La valeur par défaut
est 16685.
Par exemple, la commande suivante :
racadm config -g cfgChassisPower -o
cfgChassisPowerCap 5400
définit le bilan de puissance maximal sur 5 400 watts.
REMARQUE : la limite du bilan d'alimentation correspond à 16685 watts. Si vous
tentez de définir une valeur de bilan d'alimentation alternative supérieure à la
capacité d'alimentation du châssis, CMC affiche un message de panne.
Diminution de l'alimentation des serveurs afin de préserver le bilan
d'alimentation
CMC réduit les allocations d'alimentation des serveurs de priorité inférieure
lorsqu'une alimentation supplémentaire s'avère nécessaire afin de maintenir
la consommation électrique du système dans la limite de la puissance
d'entrée système configurée par l'utilisateur. Par exemple, lorsqu'un nouveau
serveur est activé, CMC peut réduire l'alimentation des serveurs de priorité
inférieure afin de libérer davantage d'alimentation pour le nouveau serveur.
Si cette alimentation demeure insuffisante après réduction des allocations
d'alimentation des serveurs de priorité inférieure, CMC diminue les
performances des serveurs jusqu'à libération d'une alimentation suffisante
pour le nouveau serveur.
CMC réduit l'allocation d'alimentation des serveurs dans deux cas :
• La consommation électrique globale excède la limite de la puissance
d'entrée système configurable (voir « Définition du bilan de puissance », à
la page 377.)
• Une panne d'alimentation survient dans le cadre d'une configuration
non redondante
Pour plus d'informations sur l'attribution de niveaux de priorité aux serveurs,
voir « Exécution de tâches de contrôle de l'alimentation sur le châssis », à la
page 379.Gestion de l'alimentation 379
Exécution de tâches de contrôle de l'alimentation sur le châssis
REMARQUE : vous devez disposer du privilège Administrateur de configuration du
châssis pour effectuer des tâches de gestion de l'alimentation.
REMARQUE : les opérations de contrôle de l'alimentation affectent l'intégralité du
châssis. Pour les tâches de contrôle de l'alimentation effectuées sur un module
d'E/S, voir « Exécution d'opérations de contrôle de l'alimentation sur un module
d'E/S », à la page 381. Pour les tâches de contrôle de l'alimentation effectuées sur
des serveurs, voir « Exécution de tâches de contrôle de l'alimentation sur un
serveur », à la page 382.
CMC vous permet d'exécuter à distance plusieurs opérations de gestion de
l'alimentation, comme par exemple une séquence d'arrêt correcte, sur
l'ensemble du châssis (châssis, serveurs, modules d'E/S, iKVM et unités
d'alimentation).
Utilisation de l'interface Web
Pour exécuter des opérations de contrôle de l'alimentation sur l'interface
Web CMC :
1 Ouvrez une session sur l'interface Web de CMC.
2 Cliquez sur Présentation du châssis dans l'arborescence.
3 Cliquez sur l'onglet Alimentation.
La page État de la consommation énergétique s'affiche.
4 Cliquez sur le sous-onglet Contrôle. La page Contrôle de l'alimentation
du châssis s'affiche.
5 Cliquez sur les boutons radio correspondant pour sélectionner l'une des
opérations de contrôle de l'alimentation suivantes :
• Mise sous tension du système : met le châssis sous tension (équivaut
à appuyer sur le bouton d'alimentation quand le châssis est désactivé).
Cette option est désactivée si le châssis est déjà sous tension.
REMARQUE : cette action met le châssis et autres sous-systèmes (iDRAC
sur les serveurs, les modules d'E/S et le module iKVM) sous tension.
Les serveurs ne sont pas mis sous tension. 380 Gestion de l'alimentation
• Mise hors tension du système : met le châssis hors tension. Cette
option est désactivée si le châssis est déjà hors tension.
REMARQUE : cette action met le châssis hors tension (châssis, serveurs,
modules d'E/S, module iKVM et blocs d'alimentation). Les modules CMC restent
sous tension, mais en veille virtuelle ; dans cet état, un bloc d'alimentation et
des ventilateurs refroidissent les modules CMC. Le bloc d'alimentation alimente
également le ventilateurs qui fonctionne à vitesse réduite.
• Exécuter un cycle d'alimentation sur le système (redémarrage à
froid) : arrête, puis redémarre le système. Cette option est désactivée
si le châssis est déjà hors tension.
REMARQUE : cette action met hors tension puis redémarre l'ensemble du
châssis (le châssis, les serveurs configurés pour être sous tension en
permanence, les modules d'E/S, l'iKVM et les blocs d'alimentation).
• Réinitialiser CMC : réinitialise CMC sans arrêter le système
(redémarrage à chaud). (Cette option est désactivée lorsque CMC est
déjà arrêté.)
REMARQUE : cette action redémarre uniquement CMC. Elle n'a aucun effet
sur les autres composants.
• Arrêt anormal : force la coupure de l'alimentation de tout le châssis
(châssis, serveurs, modules d'E/S, module iKVM et blocs
d'alimentation). Cette action ne permet pas l'arrêt normal du système
d'exploitation des serveurs avant la mise hors tension.
6 Cliquez sur Appliquer. Une boîte de dialogue vous invite à confirmer
l'opération.
7 Cliquez sur OK pour exécuter l'action de gestion de l'alimentation
(réinitialisation du système, par exemple).
Utilisation de la RACADM
Ouvrez une console texte série/Telnet/SSH d'accès à CMC, ouvrez une
session et entrez :
racadm chassisaction -m chassis
où a pour valeur powerup (mise sous tension), powerdown
(mise hors tension), powercycle (cycle d'alimentation),
nongraceshutdown (coupure franche) ou reset (réinitialisation).Gestion de l'alimentation 381
Exécution d'opérations de contrôle de l'alimentation sur un module d'E/S
Vous pouvez exécuter à distance une opération de réinitialisation ou lancer
un cycle d'alimentation sur un module d'E/S.
REMARQUE : vous devez disposer du privilège Administrateur de configuration du
châssis pour effectuer des tâches de gestion de l'alimentation.
Utilisation de l'interface Web
Pour exécuter des opérations de contrôle de puissance sur un module d'E/S à
l'aide de l'interface Web CMC :
1 Ouvrez une session sur l'interface Web de CMC.
2 Sélectionnez Présentation des modules d'E/S.
La page État des modules d'E/S s'affiche.
3 Cliquez sur l'onglet Alimentation.
La page Contrôle de l'alimentation s'affiche.
4 Sélectionnez l'opération à exécuter (réinitialiser ou cycle d'alimentation)
dans le menu déroulant situé en regard du module d'E/S correspondant
dans la liste.
5 Cliquez sur Appliquer.
Une boîte de dialogue vous invite à confirmer l'opération.
6 Cliquez sur OK pour exécuter l'action de gestion de l'alimentation
(par exemple, lancer un cycle d'alimentation du module d'E/S).
Utilisation de la RACADM
Pour exécuter des opérations de contrôle de puissance sur un module d'E/S à
l'aide de RACADM :
Ouvrez une console texte série/Telnet/SSH d'accès à CMC, ouvrez une
session et entrez :
racadm chassisaction -m switch-
où est un nombre compris entre 1 et 6 qui indique le module d'E/S
(A1, A2, B1, B2, C1, C2) et l'opération à exécuter : powercycle
or reset. (cycle d'alimentation ou réinitialisation.)382 Gestion de l'alimentation
Exécution de tâches de contrôle de l'alimentation sur un serveur
REMARQUE : vous devez disposer du privilège Administrateur de configuration du
châssis pour effectuer des tâches de gestion de l'alimentation.
CMC vous permet d'exécuter à distance plusieurs actions de gestion de
l'alimentation sur un serveur donné du châssis, par exemple une séquence
d'arrêt correcte.
Utilisation de l'interface Web
Pour exécuter des opérations de contrôle d'alimentation sur un serveur à l'aide
de l'interface Web :
1 Ouvrez une session sur l'interface Web de CMC.
2 Développez Présentation des serveurs dans l'arborescence système, puis
sélectionnez le serveur auquel vous souhaitez appliquer une opération de
contrôle de l'alimentation. La page Condition du serveur s'affiche.
3 Cliquez sur l'onglet Alimentation.
La page Gestion de l'alimentation du serveur s'affiche.
4 État de l'alimentation : affiche l'un des états d'alimentation du serveur
suivants :
• S/O : CMC n'a pas encore déterminé l'état d'alimentation du serveur.
• Désactivé : le serveur ou le châssis est hors tension.
• Activé : le châssis et le serveur sont sous tension.
• Activation : état temporaire entre le mode Désactivé et Activé.
Lorsque l'action est terminée, l'État d'alimentation est activé.
• Mise hors tension : état temporaire entre le mode Activé et Désactivé.
Lorsque l'action est terminée, l'État d'alimentation est désactivé.
5 Sélectionnez l'une des opérations de contrôle de l'alimentation suivantes
en cliquant sur le bouton d'option correspondant :
• Mise sous tension du système : met le serveur sous tension
(équivaut à appuyer sur le bouton d'alimentation quand le système
est hors tension). Cette option est désactivée si le serveur est déjà
sous tension.
• Mise hors tension du système : met le serveur hors tension
(équivaut à appuyer sur le bouton d'alimentation quand le système
est sous tension).
• Arrêt normal : arrête le serveur, puis le redémarre.Gestion de l'alimentation 383
• Réinitialisation du serveur (redémarrage à chaud) : redémarre le
serveur sans l'arrêter. Cette option est désactivée si le serveur est
hors tension.
• Mettre le serveur en cycle d'alimentation (redémarrage à froid) :
arrête, puis redémarre le serveur. Cette option est désactivée si le
serveur est hors tension.
6 Cliquez sur Appliquer. Une boîte de dialogue vous invite à confirmer
l'opération.
7 Cliquez sur OK pour lancer la tâche de gestion de l'alimentation
(réinitialisation du serveur, par exemple).
REMARQUE : toutes les opérations de contrôle de l'alimentation peuvent être
effectuées sur plusieurs serveurs depuis la page Serveurs→ Alimentation→ Contrôle.
Utilisation de la RACADM
Pour exécuter des opérations de contrôle de puissance sur un serveur à l'aide
de RACADM :
Ouvrez une console texte série/Telnet/SSH d'accès à CMC, ouvrez une
session et entrez :
racadm serveraction -m
où désigne le serveur par son numéro d'emplacement dans le
châssis (de 1 à 16) et indique l'opération à exécuter : powerup
(mettre sous tension), powerdown (mettre hors tension), powercycle
(cycle d'alimentation), graceshutdown (arrêt normal) ou hardreset
(réinitialisation matérielle).
Fonctionnement 110 V
Certains modèles d'unités d'alimentation sont capables de fonctionner à la
fois en 220 V et 110 V. L'alimentation 110 V peut avoir une capacité limitée ;
lorsqu'une connexion 110 V est détectée, le châssis n'accorde pas de demande
supplémentaire d'alimentation de serveur jusqu'à ce que l'utilisateur accepte
le fonctionnement 110 V en changeant la propriété de configuration de la
puissance. L'utilisateur doit vérifier que le circuit 110 V en cours d'utilisation
peut fournir la puissance nécessaire pour la configuration du châssis avant
l'acceptation. Après acceptation, le châssis accorde toutes les futures
demandes appropriées d'alimentation de serveur et utilise toute la capacité de
puissance disponible.384 Gestion de l'alimentation
L'utilisateur peut réinitialiser l'acceptation du 110V à tout moment depuis
l'interface graphique ou RACADM après l'installation initiale. Les entrées de
blocs d'alimentation sont enregistrées dans le journal lorsque les blocs
d'alimentation 110V sont détectés et retirés. Les entrées de blocs sont
également enregistrées dans le journal lorsqu'ils sont reconnus ou non
reconnus par l'utilisateur.
L'intégrité globale énergétique est au moins à l'état non critique lorsque le
châssis est en mode 110 V et que l'utilisateur n'a pas reconnu ce mode.
L'icône « Avertissement » est affichée sur la page principale de l'interface
utilisateur quand l'état est non critique.
Le mode mixte 110 V et 220 V n'est pas pris en charge. Si CMC détecte que
les deux tensions sont en cours d'utilisation, une tension est sélectionnée et
les blocs d'alimentation reliés à l'autre tension sont mis hors tension et
marqués comme défaillants.
Gestion de l'alimentation externe
La gestion de l'alimentation du CMC est contrôlée en option par le PM3
(« Power Measure, Mitigate, and Manage Console »). Pour plus
d'informations, voir le Guide d'utilisation PM3.
Lorsque la gestion externe d'alimentation est activée, PM3 gère :
• Alimentation serveur des serveurs de 12e génération
• Priorité de serveur des serveurs de 12e génération
• Capacité maximale de l'alimentation d'entrée du système
• Mode de conservation de puissance maximale
Le CMC continue à maintenir et à gérer :
• Règle de redondance
• Connexion à l'alimentation à distance
• Performance du serveur contre redondance de l'alimentation
• Enclenchement dynamique des blocs d'alimentation
• Alimentation serveur de serveurs de 11e génération et antérieure
PM3 gère ainsi la prioritisation et l'alimentation des serveurs lames de 12e
génération dans le châssis à partir du budget disponible après l'attribution
d'alimentation à l'infrastructure du châssis et aux serveurs lames de
génération antérieure. La connexion à l'alimentation à distance n'est pas
affectée par la gestion de l'alimentation externe. Gestion de l'alimentation 385
Utilisation de l'interface Web
Pour activer la gestion externe PM3 :
1 Connectez-vous au châssis à l'aide des privilèges Administrateur de
configuration de châssis.
2 Cliquez sur Présentation du châssis dans l'arborescence.
3 Cliquez sur Alimentation→ Configuration.
La page Configuration de la redondance/du budget s'affiche.
4 Définissez le Mode de gestion de l'alimentation basé sur le serveur.
5 Cliquez sur Appliquer.
Une fois le Mode de gestion de l'alimentation basé sur le serveur est activé,
le châssis est prêt pour la gestion PM3. Toutes les priorités de serveur de 12e
génération sont établies au niveau 1 (élevé). PM3 gère directement
l'alimentation et les priorités de serveur. Puisque PM3 contrôle les attributions
d'alimentation de serveur compatibles, CMC ne contrôle plus le Mode de
conservation d'alimentation maximale. Par conséquent, cette sélection
est désactivée.
Lorsque le Mode de conservation d'alimentation maximale est activé, le
CMC définit la Capacité de puissance d'entrée du système au maximum de
la capacité de gestion du châssis. CMC ne permet pas d'excéder la capacité la
plus élevée. Cependant, PM3 gère toutes les autres limitations de capacité
d'alimentation.
Pour désactiver la gestion externe d'alimentation :
1 Connectez-vous au châssis à l'aide des privilèges Administrateur de
configuration de châssis.
2 Cliquez sur Présentation du châssis dans l'arborescence.
3 Cliquez sur Alimentation→ Configuration.
La page Configuration de la redondance/du budget s'affiche.
4 Définissez le Mode de gestion de l'alimentation basé sur le serveur.
5 Cliquez sur Appliquer.
Lorsque la gestion PM3 d'alimentation est désactivée, le CMC revient à l'état
des paramètres de priorité du serveur avant l'activation de la gestion externe.
REMARQUE : lorsque la gestion PM3 est désactivée, le CMC ne revient pas à
l'état des paramètres antérieurs d'alimentation maximale du châssis. Voir le journal
MC pour les paramètres antérieurs pour une restauration manuelle des valeurs. 386 Gestion de l'alimentation
Utilisation de la RACADM
Ouvrez une console texte série/Telnet/SSH dans le CMC avec des privilèges
d'Administrateur de configuration de châssis.
Pour activer la gestion de l'alimentation à distance avec PM3, entrez :
racadm config -g cfgChassisPower -o
cfgChassisServerBasedPowerMgmtMode 1
Pour restaurer la gestion de l'alimentation CMC, entrez :
racadm config -g cfgChassisPower -o
cfgChassisServerBasedPowerMgmtMode 0
Lorsque la gestion de l'alimentation PM3 est désactivée, le CMC revient à l'état
des paramètres de priorité du serveur avant l'activation de la gestion externe.
REMARQUE : lorsque la gestion PM3 est désactivée, le CMC ne revient pas à
l'état des paramètres antérieurs d'alimentation maximale du châssis. Voir le journal
MC pour les paramètres antérieurs pour une restauration manuelle des valeurs.
Dépannage
Pour le dépannage de problèmes d'alimentation et de puissance, voir
« Dépannage et récupération », à la page 433.Utilisation du module iKVM 387
Utilisation du module iKVM
Présentation
Le module KVM d'accès local destiné à votre châssis de serveur Dell M1000e
est appelé Avocent Integrated KVM Switch Module, ou iKVM. iKVM est un
commutateur clavier, vidéo et souris analogique qui se branche sur votre
châssis. Ce module de châssis enfichable à chaud en option offre un accès
clavier, souris et vidéo local aux serveurs du châssis et à la ligne de commande
du contrôleur CMC actif.
Interface utilisateur d'iKVM
iKVM utilise l'interface graphique utilisateur OSCAR (On Screen
Configuration and Reporting/génération de rapports et configuration à
l'écran), activée par un raccourci clavier. OSCAR vous permet de sélectionner
un des serveurs ou la ligne de commande Dell CMC auquel vous souhaitez
accéder avec le clavier, l'affichage et la souris locaux.
Une seule session iKVM par châssis est autorisée.
Sécurité
L'interface utilisateur OSCAR vous permet de protéger votre système avec un
mot de passe d'économiseur d'écran. Après un temps défini par l'utilisateur, le
mode économiseur d'écran s'active et l'accès est interdit jusqu'à ce que le mot
de passe approprié soit saisi pour réactiver OSCAR.
Balayage
OSCAR vous permet de sélectionner une liste de serveurs qui sont affichés
dans l'ordre sélectionné lorsque OSCAR est en mode de balayage. 388 Utilisation du module iKVM
Identification des serveurs
CMC attribue des noms de logements à tous les serveurs du châssis. Bien que
vous puissiez attribuer des noms aux serveurs à l'aide de l'interface OSCAR
depuis une connexion à plusieurs couches, les noms attribués par CMC sont
prioritaires et tous les nouveaux noms que vous attribuez aux serveurs à l'aide
d'OSCAR sont écrasés.
CMC identifie un logement en lui attribuant un nom unique. Pour changer
les noms des logements à l'aide de l'interface Web CMC, voir « Modification
du nom d'un logement ». Pour changer le nom d'un logement avec
RACADM, consultez la section setslotname dans le Guide de référence de la
ligne de commande pour iDRAC7 et CMC.
Vidéo
Les connexions vidéo d'iKVM prennent en charge les résolutions d'affichage
vidéo comprises entre 640 x 480 à 60 Hz et 1280 x 1024 à 60 Hz.
Plug and Play
iKVM prend en charge Plug and Play du canal d'affichage des données
(DDC), qui automatise la configuration du moniteur vidéo, et est conforme à
la norme VESA DDC2B.
Évolutif FLASH
Vous pouvez mettre à jour le micrologiciel iKVM à l'aide de l'interface Web de
CMC ou de la commande fwupdate RACADM. Pour plus d'informations,
voir « Gestion d'iKVM depuis CMC », à la page 407.
Interfaces de connexion physique
Vous pouvez vous connecter à un serveur ou à la console de l'interface de ligne
de commande de CMC via iKVM depuis le panneau avant du châssis, une
interface de console analogique (ACI) et le panneau arrière du châssis.
REMARQUE : les ports du panneau de configuration avant du châssis sont conçus
spécifiquement pour iKVM, qui est en option. Si vous ne possédez pas iKVM, vous
ne pouvez pas utiliser les ports du panneau de configuration avant.Utilisation du module iKVM 389
Priorités de connexion d'iKVM
Une seule connexion iKVM est disponible à la fois. iKVM attribue un ordre de
priorité à chaque type de connexion afin qu'en présence de plusieurs connexions,
une seule connexion soit disponible tandis que les autres sont désactivées.
L'ordre de priorité pour les connexions d'iKVM est le suivant :
1 Panneau avant
2 ACI
3 Panneau arrière
Par exemple, si les connexions d'iKVM sont situées sur le panneau avant et sur
l'ACI, la connexion du panneau avant reste active tandis que la connexion de
l'ACI est désactivée. En cas de connexions de l'ACI et du panneau arrière, la
connexion de l'ACI devient prioritaire.
Affectation de plusieurs couches via la connexion de l'ACI
iKVM autorise les connexions auxquelles sont affectées plusieurs couches
avec les serveurs et la console de ligne de commande CMC d'iKVM, soit
en local via un port Remote Console Switch, soit à distance via le logiciel
Dell RCS. iKVM prend en charge les connexions de l'ACI depuis les
produits suivants :
• Commutateurs Dell Remote Console 180AS, 2160AS, 2161DS*,
2161DS-2 ou 4161DS
• Système de commutation Avocent AutoView
• Système de commutation Avocent DSR
• Système de commutation Avocent AMX
* Ne prend pas en charge la connexion de la console Dell CMC.
REMARQUE : iKVM prend également en charge une connexion de l'ACI vers les
Dell 180ES et 2160ES, mais l'affectation de plusieurs couches ne se fait pas de
façon transparente. Cette connexion exige un SIP USB vers PS2.390 Utilisation du module iKVM
Utilisation d'OSCAR
Cette section offre une présentation de l'interface OSCAR.
Notions de base sur la navigation
Tableau 10-1. Navigation dans OSCAR avec le clavier et la souris
Touche ou séquence
de touches
Résultat
• -
N'importe laquelle de ces séquences de touches peut ouvrir
OSCAR en fonction de vos paramètres Appeler OSCAR.
Vous pouvez activer deux, trois ou l'intégralité de ces
séquences de touches en cochant des cases dans la section
Invoquer OSCAR de la boîte de dialogue Menu principal,
puis en cliquant sur OK.
• -
• -
• -
Ouvre l'écran Aide de la boîte de dialogue active.
<Échap> Ferme la boîte de dialogue active sans enregistrer les
modifications apportées et retourne à la boîte de dialogue
précédente.
Dans la boîte de dialogue Menu principal, <Échap> ferme
l'interface OSCAR et retourne au serveur sélectionné.
Dans une boîte de message, il ferme la boîte contextuelle et
retourne à la boîte de dialogue active.
Ouvre des boîtes de dialogue, sélectionne ou coche des options,
et exécute des actions lorsqu'il est utilisé en conjonction avec
les lettres soulignées ou d'autres caractères désignés.
+ Ferme la boîte de dialogue active et retourne à la boîte de
dialogue précédente.
+ Sélectionne le bouton OK, puis retourne à la boîte
de dialogue précédente.
Termine une opération de commutateur dans la boîte de
dialogue Menu principal et quitte OSCAR.
Simple clic,
Dans une zone de texte, sélectionne le texte à modifier et
permet à la touche fléchée gauche et à la touche fléchée
droite de déplacer le curseur. Appuyez à nouveau
sur pour quitter le mode de modification.Utilisation du module iKVM 391
Configuration de l'OSCAR
,
Revient à la sélection précédente en l'absence d'autres
séquences de touches.
,
+<0>
Déconnecte immédiatement un utilisateur d'un serveur ;
aucun serveur n'est sélectionné. L'indicateur de condition
affiche Disponible. (Cette action s'applique uniquement
au =<0> du clavier et non à celui du pavé numérique.)
,
Active immédiatement le mode d'économiseur d'écran et
empêche l'accès à cette console spécifique, si elle est protégée
par mot de passe.
Touches fléchées
haut/bas
Déplace le curseur de ligne en ligne dans les listes.
Touches fléchées
droite/gauche
Déplace le curseur dans les colonnes lors de la modification
d'une zone de texte.
/ Déplace le curseur vers le haut (Accueil) ou vers le bas (Fin)
d'une liste.
Supprime des caractères dans une zone de texte.
Touches numérotées Tapez sur le clavier ou le pavé numérique.
Désactivé. Pour changer la casse, utilisez la touche .
Tableau 10-2. Fonctions du menu Configuration d'OSCAR
Fonction Objectif
Menu Change la liste des serveurs soit numériquement par
logement, soit alphabétiquement par nom.
Sécurité • Définit un mot de passe pour restreindre l'accès aux serveurs.
• Active un économiseur d'écran et définit un temps
d'inactivité avant l'apparition de l'économiseur d'écran et
définit le mode d'économie d'écran.
Indicateur Change l'affichage, la synchronisation, la couleur ou
l'emplacement de l'indicateur de condition.
Langue Change la langue de tous les écrans OSCAR.
Tableau 10-1. Navigation dans OSCAR avec le clavier et la souris (suite)
Touche ou séquence
de touches
Résultat392 Utilisation du module iKVM
Pour accéder à la boîte de dialogue Configuration :
1 Appuyez sur la touche pour lancer l'interface OSCAR.
La boîte de dialogue Menu principal s'affiche.
2 Cliquez sur Configuration. La boîte de dialogue Configuration apparaît.
Modification du comportement d'affichage
Utilisez la boîte de dialogue Menu pour changer l'ordre d'affichage des
serveurs et définir un temps de retard d'affichage de l'écran pour OSCAR.
Pour accéder à la boîte de dialogue Menu :
1 Appuyez sur pour lancer OSCAR. La boîte de dialogue
Menu principal s'affiche.
2 Cliquez sur Configuration, puis sur Menu. La boîte de dialogue
Menu s'affiche.
Pour choisir l'ordre d'affichage par défaut des serveurs dans la boîte de
dialogue Menu principal :
1 Sélectionnez Nom pour afficher les serveurs par nom, dans l'ordre
alphabétique.
ou
Sélectionnez Logement pour afficher les serveurs par numéro de logement.
2 Cliquez sur OK.
Pour attribuer une ou plusieurs séquences de touches pour l'activation
de l'OSCAR :
Sélectionnez une séquence de touche depuis le menu Appeler OSCAR,
puis cliquez sur OK.
La touche par défaut d'appel de l'OSCAR est .
Diffusion Configure pour contrôler simultanément plusieurs serveurs
par des actions sur le clavier et la souris.
Balayage Configure une séquence de balayage personnalisée pour un
maximum de 16 serveurs.
Tableau 10-2. Fonctions du menu Configuration d'OSCAR
Fonction ObjectifUtilisation du module iKVM 393
Pour définir un temps de retard d'affichage de l'écran pour OSCAR :
1 Entrez le nombre de secondes (de 0 à 9) pendant lesquelles l'affichage
d'OSCAR doit être retardé après que vous appuyez sur .
Entrez <0> pour lancer OSCAR immédiatement.
2 Cliquez sur OK.
Le paramétrage d'un temps de retard d'affichage d'OSCAR vous permet de
terminer une commutation logicielle. Pour procéder à une commutation
logicielle, voir « Commutation logicielle », à la page 397.
Contrôle de l'indicateur de condition
L'indicateur de condition s'affiche sur votre bureau de travail et indique le
nom du serveur sélectionné ou la condition du logement sélectionné. Utilisez
la boîte de dialogue Indicateur pour configurer l'indicateur à afficher par
serveur ou pour changer la couleur, l'opacité, le temps d'affichage et
l'emplacement de l'indicateur sur le bureau.
Pour accéder à la boîte de dialogue Indicateur :
1 Appuyez sur . La boîte de dialogue Menu principal
s'affiche.
2 Cliquez sur Configuration, puis sur Indicateur. La boîte de dialogue
Indicateur apparaît.
Pour spécifier le mode d'affichage de l'indicateur de condition :
1 Sélectionnez Affiché pour afficher l'indicateur en permanence ou Affiché
et synchronisé pour afficher l'indicateur pendant seulement cinq secondes
après la commutation.
REMARQUE : si vous sélectionnez Synchronisé uniquement, l'indicateur
n'est pas affiché.
Tableau 10-3. Indicateurs de condition d'OSCAR
Indicateur Description
Type d'indicateur par nom
Indicateur indiquant que l'utilisateur a été déconnecté
de tous les systèmes
Indicateur indiquant que le mode Diffusion est activé394 Utilisation du module iKVM
2 Sélectionnez une couleur d'indicateur dans la section Couleur d'affichage.
Les options disponibles sont le noir, le rouge, le bleu et le violet.
3 Dans Mode d'affichage, sélectionnez Opaque pour obtenir un indicateur
de couleur opaque ou Transparent pour voir le bureau à travers l'indicateur.
4 Pour positionner l'indicateur de condition sur le bureau :
a Cliquez sur Définir la position. L'indicateur de définition de
position apparaît.
b Cliquez avec le bouton gauche sur la barre de titre et faites-la glisser
vers l'emplacement souhaité sur le bureau.
c Cliquez avec le bouton droit pour retourner à la boîte de dialogue
Indicateur.
REMARQUE : les modifications apportées à la position de l'indicateur ne sont
pas enregistrées tant que vous n'avez pas cliqué sur OK dans la boîte de
dialogue Indicateur.
5 Cliquez sur OK pour enregistrer les paramètres.
Pour quitter sans enregistrer les modifications, cliquez sur .
Gestion de serveurs avec iKVM
iKVM est une matrice de commutateur analogique prenant en charge jusqu'à
16 serveurs. Le commutateur iKVM utilise l'interface utilisateur OSCAR
pour sélectionner et configurer vos serveurs. iKVM inclut en outre une entrée
système permettant d'établir une connexion de console de ligne de
commande CMC avec CMC.
Compatibilité des périphériques et prise en charge
iKVM est compatible avec les périphériques suivants :
• Claviers USB PC standard avec dispositions QWERTY, QWERTZ,
AZERTY et Japonais 109.
• Moniteurs VGA avec prise en charge DDC.
• Périphériques de pointage USB standard.
• Concentrateurs USB 1.1 auto-alimentés connectés au port USB local
sur iKVM.
• Concentrateurs USB 2.0 alimentés connectés à la console du panneau
avant du châssis Dell M1000e.Utilisation du module iKVM 395
REMARQUE : vous pouvez utiliser plusieurs claviers et plusieurs souris sur le port
USB local d'iKVM. iKVM rassemble les signaux d'entrée. Si des signaux d'entrée
simultanés sont émis par plusieurs claviers ou souris USB, des résultats
imprévisibles peuvent se produire.
REMARQUE : les connexions USB sont destinées uniquement aux claviers, souris
et concentrateurs USB pris en charge. iKVM ne prend pas en charge les données
transmises par d'autres périphériques USB.
Affichage et sélection de serveurs
Utilisez la boîte de dialogue Menu principal de l'OSCAR pour afficher,
configurer et gérer des serveurs via iKVM. Vous pouvez afficher vos serveurs
par nom ou par logement. le numéro de logement correspond au numéro du
logement occupé par le serveur dans le châssis. Ce numéro est indiqué dans
la colonne Logement.
REMARQUE : la ligne de commande Dell CMC occupe le logement 17. La sélection
de ce logement permet d'afficher la ligne de commande CMC, à partir de laquelle
vous pouvez exécuter les commandes RACADM ou vous connecter à la console
série du serveur ou des modules d'E/S.
REMARQUE : les noms de serveur et les numéros de logement sont attribués
par le contrôleur CMC.
Pour accéder à la boîte de dialogue Principale, procédez comme suit :
Appuyez sur la touche pour lancer l'interface OSCAR. La boîte
de dialogue Menu principal s'affiche.
ou
Si un mot de passe est défini, la boîte de dialogue Mot de passe s'affiche.
Entrez votre mot de passe et cliquez sur OK. La boîte de dialogue Menu
principal s'affiche.
Pour plus d'informations sur la définition d'un mot de passe, voir
« Paramétrage de la sécurité de la console », à la page 399.
REMARQUE : quatre options sont disponibles pour appeler OSCAR. Vous pouvez
activer une, plusieurs ou l'intégralité de ces séquences de touches en cochant des
cases dans la section Appeler OSCAR de la boîte de dialogue Menu principal, puis
en cliquant sur OK.396 Utilisation du module iKVM
Affichage de la condition de vos serveurs
La condition des serveurs dans votre châssis est indiquée dans les colonnes de
droite de la boîte de dialogue Menu principal. Le tableau suivant décrit les
symboles de condition.
Sélection des serveurs
Utilisez la boîte de dialogue Menu principal pour sélectionner des serveurs.
Lorsque vous sélectionnez un serveur, iKVM reconfigure le clavier et la souris
sur les paramètres appropriés pour ce serveur.
• Pour sélectionner des serveurs :
Double-cliquez sur le nom de serveur ou le numéro de logement.
ou
Si l'ordre d'affichage de votre liste de serveurs est défini par logement
(à savoir, le bouton Logement est enfoncé), tapez le numéro de logement
et appuyez sur .
ou
Si l'ordre d'affichage de votre liste de serveurs est défini par nom
(à savoir, le bouton Nom est enfoncé), tapez les premiers caractères du
nom du serveur, établissez-le comme nom unique et appuyez à deux
reprises sur .
• Pour sélectionner le serveur précédent :
Appuyez sur , puis sur . Cette combinaison de
touches alterne entre les connexions précédentes et actuelles.
Tableau 10-4. Symboles de condition de l'interface OSCAR
Symboles Description
(Point vert.) Le serveur est en ligne.
(X rouge.) Le serveur est hors ligne ou absent du châssis.
(Point jaune.) Le serveur n'est pas disponible.
(A ou B vert.) Le canal utilisateur indiqué par la lettre
(A=panneau arrière, B=panneau avant) accède au serveur.Utilisation du module iKVM 397
• Pour déconnecter l'utilisateur d'un serveur :
Appuyez sur pour accéder à OSCAR, puis cliquez
sur Déconnecter.
ou
Appuyez sur , puis sur <0>. L'état devient
disponible, sans serveur sélectionné. L'indicateur de condition sur votre
bureau, s'il est actif, affiche Disponible. Voir « Contrôle de l'indicateur de
condition », à la page 393.
Commutation logicielle
La commutation logicielle consiste à commuter entre les serveurs à l'aide d'une
séquence de touches rapides. Pour basculer vers un serveur de cette manière,
appuyez sur , puis tapez les premiers caractères de son nom ou de
son numéro. Si vous avez défini précédemment un temps de délai (le nombre
de secondes avant l'affichage de la boîte de dialogue Menu principal une fois que
a été enfoncé) et que vous appuyez sur les séquences de touches
avant que ce temps ne soit écoulé, l'interface OSCAR ne s'affiche pas.
Pour configurer OSCAR pour la commutation logicielle :
1 Appuyez sur la touche pour lancer l'interface OSCAR.
La boîte de dialogue Menu principal s'affiche.
2 Cliquez sur Configuration, puis sur Menu. La boîte de dialogue
Menu s'affiche.
3 Sélectionnez Nom ou Logement pour la touche Afficher/Trier.
4 Entrez le temps de délai souhaité en secondes dans le champ Temps de
délai d'affichage de l'écran.
5 Cliquez sur OK.
Pour effectuer une commutation logicielle vers un serveur :
• Pour sélectionner un serveur, appuyez sur .
Si l'ordre d'affichage de votre liste de serveurs est défini par logement
conformément à votre sélection à l'étape 3 (à savoir, le bouton Logement
est enfoncé), tapez le numéro de logement et appuyez sur .
ou398 Utilisation du module iKVM
Si l'ordre d'affichage de votre liste de serveurs est défini par nom
conformément à votre sélection à l'étape 3 (à savoir, le bouton Nom est
enfoncé), tapez les premiers caractères du nom du serveur pour l'établir
comme nom unique et appuyez sur .
• Pour retourner au serveur précédent, appuyez sur , puis
sur .
Connexions vidéo
iKVM ne comporte aucune connexion vidéo sur les panneaux avant et arrière du
châssis. Les signaux de connexion du panneau avant sont prioritaires sur ceux
du panneau arrière. Lorsqu'un moniteur est connecté au panneau avant, la
connexion vidéo n'aboutit pas au panneau arrière et un message de l'OSCAR
indique que les connexions KVM et ACI du panneau arrière sont désactivées.
Si le moniteur est désactivé (à savoir, retiré du panneau avant ou désactivé par
une commande CMC), la connexion ACI devient active tandis que la
connexion KVM du panneau arrière reste désactivée. (Pour plus d'informations
sur l'ordre de priorité des connexions, voir « Priorités de connexion d'iKVM ».)
Pour plus d'informations sur l'activation ou la désactivation de la connexion
du panneau avant, voir « Activation ou désactivation du panneau avant ».
Avertissement de préemption
Normalement, un utilisateur connecté à une console de serveur via iKVM et
un autre utilisateur connecté à la même console de serveur via la fonction de
redirection de console de la console d'interface utilisateur d'iDRAC ont tous
deux accès à la console et peuvent effectuer une saisie simultanément.
Pour empêcher que ce scénario ne se produise, l'utilisateur distant, avant
de lancer la redirection de console d'interface utilisateur d'iDRAC, peut
désactiver la console locale dans l'interface Web d'iDRAC. L'utilisateur local
d'iKVM voit un message OSCAR indiquant que la connexion sera préemptée
dans un délai spécifié. L'utilisateur local doit terminer son travail avant que
la fin de la connexion d'iKVM au serveur.
Aucune fonction de préemption n'est disponible pour l'utilisateur iKVM.
REMARQUE : si un utilisateur distant iDRAC a désactivé la vidéo locale pour
un serveur spécifique, la vidéo, le clavier et la souris de ce serveur seront
indisponibles pour iKVM. L'état du serveur est marqué d'un point jaune dans le
menu OSCAR pour indiquer qu'il est verrouillé ou indisponible pour un usage
local (voir « Affichage de la condition de vos serveurs »). Utilisation du module iKVM 399
Paramétrage de la sécurité de la console
OSCAR vous permet de configurer les paramètres de sécurité sur votre
console iKVM. Vous pouvez établir un mode d'économiseur d'écran qui
s'active lorsque votre console reste inutilisée pendant un délai spécifié.
Une fois ce mode activé, votre console demeure verrouillée jusqu'à ce que
vous appuyiez sur une touche quelconque ou déplaciez le curseur. Entrez
le mot de passe d'activation de l'économiseur d'écran pour continuer.
Utilisez la boîte de dialogue Sécurité pour verrouiller votre console en
instaurant une protection par mot de passe, définir ou changer votre mot
de passe, ou activer l'économiseur d'écran.
REMARQUE : si le mot de passe iKVM est perdu ou oublié, vous pouvez le
réinitialiser sur les paramètres par défaut d'iKVM à l'aide de l'interface Web CMC
ou RACADM. Voir « Suppression d'un mot de passe perdu ou oublié ».
Accès à la boîte de dialogue Sécurité
Pour accéder à la boîte de dialogue Security (Sécurité), procédez comme suit :
1 Appuyez sur . La boîte de dialogue Menu
principal s'affiche.
2 Cliquez sur Configuration et sur Sécurité. La boîte de dialogue
Sécurité apparaît.
Paramétrage ou modification du mot de passe
Pour définir ou modifier le mot de passe :
1 Cliquez une fois et appuyez sur , ou double-cliquez dans le
champ Nouveau.
2 Tapez le nouveau mot de passe dans le champ Nouveau et appuyez
sur . Les mots de passe sont sensibles à la casse et doivent
comprendre 5 à 12 caractères. Ils doivent inclure au moins une lettre et
un chiffre. Les caractères autorisés sont : A–Z, a–z, 0–9, espace et tiret.
3 Entrez à nouveau le mot de passe dans le champ Répéter, puis appuyez
sur .
4 Cliquez sur OK si vous souhaitez uniquement changer votre mot de passe,
puis fermez la boîte de dialogue.400 Utilisation du module iKVM
Protection de votre console par mot de passe
Pour activer la protection par mot de passe de votre console :
1 Paramétrez votre mot de passe comme indiqué dans la procédure
précédente.
2 Cochez la case Activer l'économiseur d'écran.
3 Entrez le nombre de minutes de temps d'inactivité (entre 1 et 99)
nécessaires à l'activation de la protection par mot de passe et de
l'économiseur d'écran.
4 Pour Mode : si votre moniteur est compatible ENERGY STAR,
sélectionnez Energy ; sinon, sélectionnez Écran.
REMARQUE : si le mode est défini sur Energy, l'appareil place le moniteur en
mode Veille. Ceci est normalement indiqué par la mise hors tension du
moniteur et par une lumière orange qui remplace la LED d'alimentation verte.
Si le mode est défini sur Écran, l'indicateur OSCAR rebondit sur l'écran
pendant toute la durée du test. Avant que le test ne commence, une boîte
contextuelle d'avertissement affiche le message suivant : « Le mode Energy
peut endommager un moniteur qui n'est pas compatible ENERGY STAR. Une
fois démarré, le test peut toutefois être abandonné immédiatement au moyen
de la souris ou du clavier ».
PRÉCAUTION : le moniteur peut être endommagé s'il est utilisé en mode
Energy sans être conforme à la norme Energy Star.
5 Facultatif : pour activer le test d'économiseur d'écran, cliquez sur Test.
La boîte de dialogue Test d'économiseur d'écran apparaît. Cliquez sur OK
pour lancer le test.
Le test dure 10 secondes. Lorsqu'il se termine, la boîte de dialogue
Sécurité réapparaît.
Ouverture de session
Pour lancer Oscar :
1 Appuyez sur pour lancer OSCAR. La boîte de dialogue
Mot de passe apparaît.
2 Tapez votre mot de passe, puis cliquez sur OK. La boîte de dialogue
Menu principal apparaît.Utilisation du module iKVM 401
Paramétrage de la fermeture de session automatique
Vous pouvez paramétrer OSCAR pour fermer automatiquement une session
sur un serveur après une période d'inactivité.
1 Dans la boîte de dialogue Menu principal, cliquez sur Configuration,
puis sur Sécurité.
2 Dans le champ Temps d'inactivité, entrez la période de temps pendant
laquelle vous souhaitez rester connecté à un serveur avant qu'il ne vous
déconnecte automatiquement.
3 Cliquez sur OK.
Suppression de la protection par mot de passe depuis votre console
Pour supprimer la protection par mot de passe à partir de la console :
1 Dans la boîte de dialogue Menu principal, cliquez sur Configuration,
puis sur Sécurité.
2 Dans la boîte de dialogue Sécurité, cliquez une fois et appuyez sur
, ou double-cliquez dans le champ Nouveau.
3 Laissez le champ Nouveau vide et appuyez sur .
4 Cliquez une fois et appuyez sur ou double-cliquez dans le
champ Répéter.
5 Laissez le champ Répéter vide et appuyez sur .
6 Cliquez sur OK si vous souhaitez uniquement supprimer votre mot
de passe.
Activation du mode d'économiseur d'écran sans protection par mot de passe
REMARQUE : si votre console est protégée par mot de passe, vous devez d'abord
supprimer cette protection. Suivez les étapes de la procédure précédente avant de
procéder comme suit.
Pour activer le mode d'économiseur d'écran sans protection par mot de passe :
1 Sélectionnez Activer l'économiseur d'écran.
2 Entrez le nombre de minutes (de 1 à 99) souhaité pour retarder l'activation
de l'économiseur d'écran.402 Utilisation du module iKVM
3 Sélectionnez Energy si votre moniteur est conforme à ENERGY STAR ;
sinon, sélectionnez Écran.
PRÉCAUTION : le moniteur peut être endommagé s'il est utilisé en mode
Energy sans être conforme à la norme Energy Star.
4 Facultatif : pour activer le test d'économiseur d'écran, cliquez sur Test.
La boîte de dialogue Test d'économiseur d'écran apparaît. Cliquez sur OK
pour lancer le test.
Le test dure 10 secondes. Lorsqu'il se termine, la boîte de dialogue
Sécurité réapparaît.
REMARQUE : l'activation du mode d'économiseur d'écran déconnecte
l'utilisateur d'un serveur ; aucun serveur n'est sélectionné. L'indicateur de
condition affiche Disponible.
Quitter le mode d'économiseur d'écran
Pour quitter le mode d'économiseur d'écran et revenir à la boîte de dialogue
Menu principal, appuyez sur une touche quelconque ou déplacez votre souris.
Pour désactiver l'économiseur d'écran :
Dans la boîte de dialogue Sécurité, décochez la case Activer l'économiseur
d'écran, puis cliquez sur OK.
Pour activer immédiatement l'économiseur d'écran, appuyez sur
, puis sur .
Suppression d'un mot de passe perdu ou oublié
Lorsque le mot de passe d'iKVM est perdu ou oublié, vous pouvez le
réinitialiser sur les paramètres par défaut d'iKVM, puis changer de mot de
passe. Vous pouvez réinitialiser le mot de passe avec l'interface Web de CMC
ou RACADM.
Pour réinitialiser un mot de passe perdu ou oublié d'iKVM avec l'interface
Web de CMC :
1 Ouvrez une session sur l'interface Web de CMC.
2 Sélectionnez iKVM dans le sous-menu Châssis.
3 Cliquez sur l'onglet Configuration. La page Configuration d'iKVM
s'affiche.
4 Cliquez sur Restaurer les valeurs par défaut.Utilisation du module iKVM 403
Vous pouvez ensuite changer le mot de passe par défaut via OSCAR.
Voir « Paramétrage ou modification du mot de passe ».
Pour réinitialiser un mot de passe perdu ou oublié à l'aide de RACADM, ouvrez
une console texte série/Telnet/SSH vers CMC, ouvrez une session et entrez :
racadm racresetcfg -m kvm
REMARQUE : l'utilisation de la commande racresetcfg réinitialise les paramètres
Activation du panneau avant et Activation de la console Dell CMC s'ils diffèrent des
valeurs par défaut.
Pour des informations supplémentaires sur la sous-commande racresetcfg,
voir la section racresetcfg du Guide de référence de la ligne de commande
RACADM pour iDRAC6 et CMC.
Modification de la langue
Utilisez la boîte de dialogue Langue pour afficher le texte de l'OSCAR dans
l'une des langues prises en charge. Le texte est immédiatement affiché dans la
langue sélectionnée sur tous les écrans d'OSCAR.
Pour changer la langue d'OSCAR :
1 Appuyez sur . La boîte de dialogue Menu principal
s'affiche.
2 Cliquez sur Configuration, puis sur Langue. La boîte de dialogue
Langue apparaît.
3 Cliquez sur le bouton d'option correspondant à la langue souhaitée, puis
cliquez sur OK.
Affichage des informations sur la version
Utilisez la boîte de dialogue Version pour afficher les versions du
micrologiciel et du matériel d'iKVM, et pour identifier la configuration de la
langue et du clavier.
Pour afficher les informations sur la version :
1 Appuyez sur . La boîte de dialogue Menu principal
s'affiche.
2 Cliquez sur Commandes, puis sur Afficher les versions. La boîte de
dialogue Version apparaît.
La moitié supérieure de la boîte de dialogue Version répertorie les versions
des sous-systèmes de l'appareil.
3 Cliquez sur ou appuyez sur <Échap> pour fermer la boîte de
dialogue Version.404 Utilisation du module iKVM
Balayage de votre système
En mode de balayage, iKVM balaye automatiquement de logement en
logement (de serveur en serveur). Vous pouvez balayer jusqu'à 16 serveurs
en spécifiant les serveurs que vous souhaitez balayer et le nombre de secondes
pendant lesquelles chaque serveur est affiché.
Pour ajouter des serveurs à la liste de balayage :
1 Appuyez sur . La boîte de dialogue Menu principal
s'affiche.
2 Cliquez sur Configuration, puis sur Balayage. La boîte de dialogue
Balayage qui apparaît répertorie tous les serveurs du châssis.
3 Cochez la case en regard des serveurs que vous souhaitez balayer.
ou
Double-cliquez sur le nom ou le logement du serveur.
ou
Appuyez sur et le numéro du serveur que vous souhaitez balayer.
Vous pouvez sélectionner jusqu'à 16 serveurs.
4 Dans le champ Temps, entrez le nombre de secondes (de 3 à 99) pendant
lesquelles iKVM devra patienter avant que le balayage ne se déplace au
serveur suivant dans la séquence.
5 Cliquez sur le bouton Ajouter/Supprimer, puis sur OK.
Pour supprimer un serveur de la liste Balayage :
1 Dans la boîte de dialogue Balayage, cochez la case située en regard du
serveur à supprimer.
ou
Double-cliquez sur le nom ou le logement du serveur.
ou
Cliquez sur le bouton Effacer pour supprimer tous les serveurs de la
liste Balayage.
2 Cliquez sur le bouton Ajouter/Supprimer, puis sur OK.Utilisation du module iKVM 405
Pour lancer le mode de balayage :
1 Appuyez sur . La boîte de dialogue Menu principal
s'affiche.
2 Cliquez sur Commandes. La boîte de dialogue Commandes apparaît.
3 Cochez la case Activation du balayage.
4 Cliquez sur OK. Un message indiquant que la souris et le clavier ont été
réinitialisés apparaît.
5 Cliquez sur pour fermer la boîte du message.
Pour annuler le mode de balayage :
1 Si l'interface OSCAR est ouverte et que la boîte de dialogue Menu
principal est affichée, sélectionnez un serveur dans la liste.
ou
Si l'interface OSCAR n'est pas ouverte, déplacez la souris ou
appuyez sur une touche quelconque du clavier. Le balayage s'arrête
au serveur sélectionné.
ou
Appuyez sur . La boîte de dialogue Menu principal
apparaît ; sélectionnez un serveur dans la liste.
2 Cliquez sur le bouton Commandes. La boîte de dialogue
Commandes apparaît.
3 Décochez la case Activation du balayage.
Diffusion aux serveurs
Vous pouvez contrôler simultanément plusieurs serveurs dans le système pour
vous assurer que tous les serveurs sélectionnés reçoivent une entrée
identique. Vous pouvez choisir de diffuser des séquences de touches et/ou des
déplacements de souris indépendamment.
REMARQUE : vous pouvez diffuser simultanément vers un maximum de
16 serveurs.406 Utilisation du module iKVM
Pour diffuser aux serveurs :
1 Appuyez sur . La boîte de dialogue Menu principal
s'affiche.
2 Cliquez sur Configuration, puis sur Diffuser. La boîte de dialogue
Diffuser apparaît.
REMARQUE : diffusion de séquences de touches : lorsque vous utilisez
des séquences de touches, l'état du clavier doit être identique pour tous les
serveurs recevant une diffusion afin que les séquences de touches puissent
être interprétées à l'identique. Plus spécifiquement, les modes
et doivent être les mêmes sur tous les claviers. Lorsqu'iKVM
tente d'envoyer simultanément des séquences de touches aux serveurs
sélectionnés, certains serveurs peuvent gêner et ainsi retarder la transmission.
REMARQUE : diffusion des déplacements de la souris : pour garantir la
précision de fonctionnement de la souris, tous les serveurs doivent avoir des
pilotes de souris, des bureaux (icônes placées à l'identique, par exemple)
et des résolutions vidéo identiques. La souris doit également se trouver
exactement à la même place sur tous les écrans. Ces conditions étant
extrêmement difficiles à remplir, la diffusion des déplacements de la souris
à plusieurs serveurs peut générer des résultats imprévisibles.
3 Activez la souris et/ou le clavier pour les serveurs qui doivent recevoir les
commandes de diffusion en cochant les cases correspondantes.
ou
Appuyez sur les touches fléchées haut ou bas pour déplacer le curseur vers
un serveur cible. Appuyez ensuite sur pour sélectionner la
case du clavier et/ou sur pour sélectionner la case de la
souris. Répétez cette procédure pour des serveurs supplémentaires.
4 Cliquez sur OK pour enregistrer les paramètres et revenir à la boîte de
dialogue Configuration. Cliquez sur ou appuyez sur <Échap> pour
revenir à la boîte de dialogue Menu principal.
5 Cliquez sur Commandes. La boîte de dialogue Commandes apparaît.
6 Cochez la case Activation de la diffusion pour activer la diffusion. La
boîte de dialogue Avertissement de diffusion apparaît.
7 Cliquez sur OK pour activer la diffusion.
Pour annuler et revenir à la boîte de dialogue Commandes, cliquez sur
ou appuyez sur <Échap>.Utilisation du module iKVM 407
8 Si la diffusion est activée, tapez les informations et/ou exécutez les
déplacements de la souris que vous souhaitez diffuser depuis la station de
gestion. Seuls les serveurs de la liste sont accessibles.
Pour désactiver la diffusion :
Dans la boîte de dialogue Commandes, décochez la case Activation de
la diffusion.
Gestion d'iKVM depuis CMC
Activation ou désactivation du panneau avant
Pour activer ou désactiver l'accès à iKVM depuis le panneau avant à l'aide
de RACADM, ouvrez une console texte série/Telnet/SSH vers CMC, ouvrez
une session et tapez :
racadm config -g cfgKVMInfo -o cfgKVMFrontPanelEnable
où correspond à 1 (activé) ou à 0 (désactivé).
Pour des informations supplémentaires sur la sous-commande config, voir la
section de la commande config du Guide de référence de la ligne de commande
RACADM pour iDRAC6 et CMC.
Pour activer ou désactiver l'accès à iKVM depuis le panneau avant à l'aide de
l'interface Web :
1 Ouvrez une session sur l'interface Web de CMC.
2 Sélectionnez iKVM dans l'arborescence du système. La page État du
module iKVM s'affiche.
3 Cliquez sur l'onglet Configuration. La page Configuration d'iKVM
s'affiche.
4 Pour activer, cochez la case USB/Vidéo du panneau avant activé.
Pour désactiver, décochez la case USB/Vidéo du panneau avant activé.
5 Cliquez sur Appliquer pour enregistrer le paramètre.408 Utilisation du module iKVM
Activation de la console Dell CMC via iKVM
Pour permettre à iKVM d'accéder à la console Dell CMC à l'aide de
RACADM, ouvrez une console texte série/Telnet/SSH vers CMC, ouvrez
une session et entrez :
racadm config -g cfgKVMInfo -o
cfgKVMAccessToCMCEnable 1
Pour activer la console Dell CMC avec l'interface Web :
1 Ouvrez une session sur l'interface Web de CMC.
2 Sélectionnez iKVM dans l'arborescence du système. La page État du
module iKVM s'affiche.
3 Cliquez sur l'onglet Configuration. La page Configuration d'iKVM
s'affiche.
4 Cochez la case Autoriser l'accès à l'interface de ligne de commande CMC
depuis iKVM.
5 Cliquez sur Appliquer pour enregistrer le paramètre.
Affichage de la condition et des propriétés d'iKVM
Le module KVM d'accès local destiné à votre châssis de serveur Dell M1000e
est appelé Avocent Integrated KVM Switch Module, ou iKVM. La condition
d'intégrité de l'iKVM associé au châssis peut être consultée sur la page
Intégrité des propriétés du châssis de la section Graphiques du châssis.
Pour consulter la condition d'intégrité d'iKVM à l'aide des graphiques du
châssis :
1 Ouvrez une session sur l'interface Web de CMC.
2 La page Condition du châssis s'affiche. La section de droite de la page
Graphiques du châssis, qui fournit une vue arrière du châssis, contient la
condition d'intégrité d'iKVM. La condition d'intégrité d'iKVM est
indiquée par la couleur du sous-graphique d'iKVM :
• Vert : iKVM est présent, sous tension et communique avec CMC ;
il n'y a aucune indication d'événement indésirable.
• Orange : iKVM est présent, mais peut être hors tension, ou ne pas
communiquer avec CMC ; un événement indésirable peut exister.
• Gris : iKVM est présent et est hors tension. Elle ne communique pas
avec CMC et il n'y a aucune indication d'événement indésirable.Utilisation du module iKVM 409
3 Placez le curseur sur le sous-graphique de l'iKVM pour afficher le texte du
champ ou l'infobulle correspondants. Le texte du champ fournit des
informations complémentaires sur cet iKVM.
4 Le lien hypertexte du sous-graphique de l'iKVM permet d'accéder à
l'interface graphique CMC correspondante fournissant une navigation
directe vers la page Condition d'iKVM.
Pour plus d'informations sur iKVM, voir « Utilisation du module iKVM ».
Pour consulter la condition d'iKVM à l'aide de la page Condition d'iKVM :
1 Ouvrez une session sur l'interface Web de CMC.
2 Sélectionnez iKVM dans l'arborescence du système. La page Condition
d'iKVM s'affiche.
Tableau 10-5. Informations sur la condition d'iKVM
Élément Description
Présence Indique si le module iKVM est présent ou absent.
État de l'alimentation Indique la condition de l'alimentation d'iKVM : sous tension,
hors tension ou - (absente).
Nom Affiche le nom de produit d'iKVM.
Fabricant Affiche le fabricant d'iKVM.
Numéro de pièce Affiche le numéro de pièce d'iKVM. Le numéro de pièce est
un identificateur unique fourni par le fournisseur.
Version du
micrologiciel
Indique la version du micrologiciel iKVM.
Version du matériel Indique la version du micrologiciel iKVM.
Panneau avant
connecté
Indique si le moniteur est connecté au connecteur VGA du
panneau avant (Oui ou Non). Ces informations sont fournies
à CMC afin qu'il puisse déterminer si un utilisateur local a
accès au châssis via le panneau avant.
Panneau arrière
connecté
Indique si le moniteur est connecté au connecteur VGA du
panneau arrière (Oui ou Non). Ces informations sont fournies
à CMC afin qu'il puisse déterminer si un utilisateur local a
accès au châssis via le panneau arrière.410 Utilisation du module iKVM
Mise à jour du micrologiciel du module iKVM
Vous pouvez mettre à jour le micrologiciel iKVM avec l'interface Web de
CMC ou RACADM.
Pour mettre à jour le micrologiciel iKVM avec l'interface Web de CMC :
1 Ouvrez une session sur l'interface Web de CMC.
2 Sélectionnez Châssis dans l'arborescence.
3 Cliquez sur l'onglet Update (Mise à jour). La page Composants pouvant
être mis à jour s'affiche.
4 Cliquez sur le nom du module iKVM. La page Mise à jour du
micrologiciel s'affiche.
5 Dans le champ Image de micrologiciel, entrez le chemin du fichier
image du micrologiciel sur votre station de gestion ou votre réseau partagé
ou cliquez sur Parcourir pour accéder à l'emplacement du fichier.
REMARQUE : le nom de l'image par défaut du micrologiciel iKVM est kvm.bin.
Cependant, vous pouvez modifier ce nom.
6 Cliquez sur Commencer la mise à jour de micrologiciel. Une boîte de
dialogue vous demande de confirmer l'opération.
Port cascade
connecté
iKVM prend en charge l'affectation de plusieurs couches de
façon transparente avec les dispositifs KVM externes de Dell
et d'Avocent à l'aide du matériel intégré. Lorsque plusieurs
couches sont affectées à iKVM, les serveurs du châssis sont
accessibles à partir de l'écran du commutateur KVM externe à
partir duquel plusieurs couches sont affectées à iKVM.
USB/Vidéo
du panneau
avant activés
Affiche si le connecteur VGA du panneau avant est activé
(oui ou non).
Autoriser l'accès
CMC à partir d'iKVM
Indique si la console de commande CMC accessible via iKVM
est activée (oui ou non).
Tableau 10-5. Informations sur la condition d'iKVM (suite)
Élément DescriptionUtilisation du module iKVM 411
7 Cliquez sur Oui pour continuer. La section Avancement de la mise à
jour du micrologiciel fournit des informations sur l'état de la mise à jour
du micrologiciel. Un indicateur d'état s'affiche sur la page pendant le
chargement du fichier image. La durée du transfert de fichiers peut
fortement varier en fonction de la vitesse de la connexion. Lorsque le
processus de mise à jour interne démarre, la page s'actualise
automatiquement et l'horloge de mise à jour du micrologiciel
s'affiche. Instructions supplémentaires à suivre :
• N'utilisez pas le bouton Actualiser et ne naviguez pas sur une autre
page pendant le transfert.
• Pour annuler le processus, cliquez sur Annuler le transfert du fichier
et la mise à jour. Cette option n'est disponible que pendant le
transfert du fichier.
• L'état de la mise à jour s'affiche dans le champ État de mise à jour. Ce
champ est mis à jour automatiquement pendant le transfert du fichier.
Certains anciens navigateurs ne prennent pas en charge ces mises à
jour automatiques. Pour actualiser manuellement le champ État de
mise à jour, cliquez sur Actualiser.
REMARQUE : la mise à jour de l'iKVM peut prendre jusqu'à une minute.
À la fin de la mise à jour, iKVM est réinitialisé et le nouveau micrologiciel est
mis à jour et apparaît sur la page Composants actualisables.
Pour mettre à jour le micrologiciel iKVM à l'aide de RACADM, ouvrez une
console texte série/Telnet/SSH vers CMC, ouvrez une session et entrez :
racadm fwupdate -g -u -a -d -m kvm
Par exemple :
racadm fwupdate -gua 192.168.0.10 -d ikvm.bin -m kvm
Pour des informations supplémentaires sur la sous-commande fwupdate,
voir la section de la commande fwupdate du Guide de référence de la ligne
de commande RACADM pour iDRAC6 et CMC.412 Utilisation du module iKVM
Dépannage
REMARQUE : Si une session de redirection de console est active et qu'un
moniteur de plus faible résolution est connecté à iKVM, la résolution de console
de serveur peut se réinitialiser si le serveur est sélectionné sur la console locale.
Si le serveur exécute un système d'exploitation Linux, une console X11 peut ne pas
être visible sur le moniteur local. Appuyez sur sur iKVM pour
basculer Linux en mode console de texte.
Tableau 10-6. Dépannage d'iKVM
Problème Cause probable et solution
Le message « L'utilisateur a été désactivé
par le contrôle CMC » apparaît sur le
moniteur connecté au panneau avant.
La connexion du panneau avant a été
désactivée par CMC.
Vous pouvez activer le panneau avant avec
l'interface Web de CMC ou RACADM.
Pour activer le panneau avant avec
l'interface Web :
1 Ouvrez une session sur l'interface
Web de CMC.
2 Sélectionnez iKVM dans l'arborescence
du système.
3 Cliquez sur l'onglet Configuration.
4 Cochez la case USB/Vidéo du panneau
avant activé.
5 Cliquez sur Appliquer pour enregistrer
le paramètre.
Pour activer le panneau avant à l'aide de
RACADM, ouvrez une console texte
série/Telnet/SSH vers CMC, ouvrez une
session et entrez :
racadm config -g cfgKVMInfo -
o cfgKVMAccesToCMCEnable 1Utilisation du module iKVM 413
L'accès au panneau arrière ne
fonctionne pas.
Le paramètre du panneau avant est activé
par CMC et un moniteur est connecté au
panneau avant.
Une seule connexion est autorisée à la
fois. La connexion du panneau avant est
prioritaire sur l'ACI et le panneau arrière.
Pour plus d'informations sur la priorité
des connexions, voir « « Priorités de
connexion d'iKVM » ».
Le message « L'utilisateur a été désactivé
car plusieurs couches ont été affectées à
un autre appareil » apparaît sur le
moniteur connecté au panneau arrière.
Un câble réseau est connecté au
connecteur du port ACI d'iKVM et à un
appareil KVM secondaire.
Une seule connexion est autorisée à la
fois. La connexion d'affectation de
plusieurs couches ACI est prioritaire sur la
connexion du moniteur sur le panneau
arrière. L'ordre de priorité est le suivant :
panneau avant, ACI, puis panneau arrière.
Tableau 10-6. Dépannage d'iKVM (suite)
Problème Cause probable et solution414 Utilisation du module iKVM
La LED orange d'iKVM clignote. Trois causes sont possibles :
iKVM présente un problème,
qui nécessite sa reprogrammation.
Pour corriger ce problème, suivez les
instructions de mise à jour
du micrologiciel d'iKVM (voir « « Mise à
jour du micrologiciel du module iKVM »).
iKVM est en train de reprogrammer
l'interface de la console CMC. Dans ce
cas, la console CMC est temporairement
indisponible et est représentée par un
point jaune dans l'interface OSCAR.
Ce processus dure jusqu'à 15 minutes.
Le micrologiciel iKVM a détecté une
erreur matérielle. Pour des informations
supplémentaires, affichez la condition
d'iKVM.
Pour afficher la condition d'iKVM avec
l'interface Web :
1 Ouvrez une session sur l'interface
Web de CMC.
2 Sélectionnez iKVM dans l'arborescence
du système.
Pour afficher la condition d'iKVM à l'aide
de RACADM, ouvrez une console texte
série/Telnet/SSH vers CMC, ouvrez une
session et tapez :
racadm getkvminfo
Tableau 10-6. Dépannage d'iKVM (suite)
Problème Cause probable et solutionUtilisation du module iKVM 415
Plusieurs couches ont été affectées à mon
iKVM via le port ACI vers un
commutateur KVM externe, mais toutes
les entrées pour les connexions ACI sont
indisponibles.
Tous les états indiquent un point jaune
dans l'interface OSCAR.
La connexion du panneau avant est
activée et un moniteur y est connecté. Le
panneau avant étant prioritaire sur toutes
les autres connexions d'iKVM, les
connecteurs de l'ACI et du panneau
arrière sont désactivés.
Pour activer la connexion du port ACI,
vous devez d'abord désactiver l'accès au
panneau avant ou retirer le moniteur
connecté au panneau avant. Les entrées
OSCAR du commutateur KVM externe
deviendront actives et accessibles.
Pour désactiver le panneau avant via
l'interface Web :
1 Ouvrez une session sur l'interface Web
de CMC.
2 Sélectionnez iKVM dans l'arborescence
du système.
3 Cliquez sur l'onglet Configuration.
4 Décochez la case USB/Vidéo du
panneau avant activé.
5 Cliquez sur Appliquer pour enregistrer
le paramètre.
Pour activer le panneau avant à l'aide de
RACADM, ouvrez une console texte
série/Telnet/SSH vers CMC, ouvrez une
session et entrez :
racadm config -g cfgKVMInfo -
o cfgKVMFrontPanelEnable 0
Tableau 10-6. Dépannage d'iKVM (suite)
Problème Cause probable et solution416 Utilisation du module iKVM
Dans le menu OSCAR, la connexion
Dell CMC affiche un X rouge et je ne
peux pas me connecter à CMC.
Il existe deux causes probables :
La console Dell CMC a été désactivée.
Dans ce cas, vous pouvez l'activer avec
l'interface Web de CMC ou RACADM.
Pour activer la console Dell CMC avec
l'interface Web :
1 Ouvrez une session sur l'interface
Web de CMC.
2 Sélectionnez iKVM dans l'arborescence
du système.
3 Cliquez sur l'onglet Configuration.
4 Cochez la case Autoriser l'accès à
l'interface de ligne de commande
CMC depuis iKVM.
5 Cliquez sur Appliquer pour enregistrer
le paramètre.
Pour activer la connexion Dell CMC à
l'aide de RACADM, ouvrez une console
texte série/Telnet/SSH vers CMC, ouvrez
une session et entrez :
racadm config -g cfgKVMInfo -
o cfgKVMAccessToCMCEnable 1
CMC est indisponible car il s'initialise,
commute vers le contrôleur CMC de
secours ou se reprogramme. Dans ce cas,
attendez tout simplement que CMC ait
terminé de s'initialiser.
Tableau 10-6. Dépannage d'iKVM (suite)
Problème Cause probable et solutionUtilisation du module iKVM 417
Le nom de logement d'un serveur affiche
« Initialisation en cours » dans OSCAR et
je ne peux pas le sélectionner.
Le serveur s'initialise ou le contrôleur
iDRAC sur ce serveur n'a pas pu s'initialiser.
Attendez tout d'abord 60 secondes. Si le
serveur s'initialise toujours, le nom de
logement apparaît dès que l'initialisation
est terminée et vous pouvez sélectionner
le serveur.
Si, après 60 secondes, OSCAR indique
encore que le logement s'initialise,
retirez puis réinsérez le serveur dans le
châssis. Cette action permet à iDRAC
de se réinitialiser.
Tableau 10-6. Dépannage d'iKVM (suite)
Problème Cause probable et solution418 Utilisation du module iKVMGestion de la structure d'E/S 419
Gestion de la structure d'E/S
Le châssis peut contenir jusqu'à six modules d'E/S, chacun pouvant être un module
de commutation ou de transfert.
Ces modules d'E/S sont répartis en trois groupes : A, B et C. Chaque groupe comprend
deux logements : 1 et 2. Les logements sont désignés par des lettres de gauche à droite à
l'arrière du châssis : A1 | B1 | C1 | C2 | B2 | A2. Chaque serveur comporte des
logements pour deux cartes mezzanine (MC) pour la connexion des modules d'E/S. La
carte porteuse et le module d'E/S correspondant doivent avoir la même structure.
L'E/S de châssis est séparé en 3 chemins de données discrètes par lettre : A, B et C.
Ces chemins sont décrits comme des « STRUCTURES » et prennent en charge
Ethernet et Fibre Channel ou InfiniBand. Ces chemins de structure discrets sont
répartis en « Banques » d'E/S, banque 1 et banque 2. Chaque adaptateur E/S de
serveur (carte porteuse ou LOM) peut avoir 2 ou 4 ports selon la capacité. Ces
ports sont répartis uniformément aux banques de modules d'E/S 1 et 2 pour
permettre la redondance. Lorsque vous déployez vos réseaux Ethernet, iSCSI ou
Fibre Channel, étendez leurs liens redondants sur les banques un et deux pour une
disponibilité maximale. On indique le module discret avec l'identificateur de
structure et le numéro de Banque.
Exemple : « A1 » indique structure « A » dans la banque « 1 ». « C2 » indique
structure « C » dans la banque « 2 ».
Le châssis prend en charge trois structures ou types de protocole. Les modules
d'E/S et les cartes mezzanine d'un groupe doivent comporter les mêmes types
de structures ou des types compatibles.
• Les modules d'E/S du groupe A sont toujours connectés aux adaptateurs
Ethernet intégrés des serveurs ; le type de structure du groupe A sera donc
toujours Ethernet.
• Pour le groupe B, les emplacements de module d'E/S sont en permanence
connectés à la première carte porteuse (MC) dans chaque module de serveur.
• Pour le groupe C, les emplacements de module d'E/S sont connectés en
permanence à la seconde carte porteuse (MC) dans chaque module de serveur.
REMARQUE : dans l'interface de ligne de commande CMC, les modules d'E/S sont
désignés par la convention, switch-n :
A1=commutateur-1, A2=commutateur-2, B1=commutateur-3, B2=commutateur-4,
C1=commutateur-5 et C2=commutateur-6.420 Gestion de la structure d'E/S
Gestion de la structure
La gestion de la structure permet d'éviter les problèmes d'ordre électrique, de
configuration ou de connectivité lors de l'installation d'un module d'E/S ou
d'une carte porteuse ayant une structure incompatible avec celle du châssis
établi. Des configurations matérielles non valides peuvent provoquer des
problèmes électriques ou de fonctionnement au niveau du châssis et de ses
composants. La gestion de la structure empêche les configurations non
valides d'être mises sous tension.
La Figure 11-1 désigne l'emplacement du module d'E/S dans le châssis.
L'emplacement de chaque module d'E/S est indiqué par son numéro de
groupe (A, B ou C). Ces chemins de structure discrets sont divisés en deux
banques, la banque 1 et la banque 2. Sur le châssis, les noms de logement des
modules d'E/S sont indiqués par A1, A2, B1, B2, C1 ou C2.
Figure 11-1. Vue arrière d'un châssis illustrant l'emplacement des modules d'E/S
1 Banque 1 (Logements A1, B1, C1) 2 Banque 2 (Logements A2, B2, C2)
1 2Gestion de la structure d'E/S 421
CMC crée à la fois des entrées dans le journal du matériel et dans le journal
CMC pour les configurations matérielles non valides.
Par exemple :
• Une carte porteuse Ethernet connectée à un module d'E/S Fibre Channel
n'est pas une configuration valide. Cependant, une carte porteuse
Ethernet connectée à un commutateur Ethernet et à un module d'E/S de
passerelle Ethernet installé dans le même groupe de module d'E/S est une
connexion valide.
• Un module d'E/S Fibre Channel de transfert et un commutateur d'E/S Fibre
channel dans les logements B1 et B2 est une configuration valide si la
première carte porteuse de tous les serveurs est également du type Fibre
Channel. Dans ce cas, CMC met les modules d'E/S et les serveurs sous
tension. Cependant, certains logiciels de redondance Fibre Channel risquent
de ne pas prendre en charge cette configuration : toutes les configurations
valides ne sont pas nécessairement des configurations prises en charge.
REMARQUE : la structure pour les modules d'E/S et les cartes porteuses du
serveur est vérifiée uniquement à la mise sous tension du châssis. Lorsque le
châssis est sur l'alimentation de secours, les micrologiciels iDRAC des modules du
serveur restent éteints et sont donc incapables de signaler le type de structure des
cartes porteuses du serveur. Le type de structure des cartes porteuses peut ne pas
être signalé dans l'interface utilisateur CMC jusqu'à ce que le contrôleur iDRAC du
serveur soit mis sous tension. En outre, si le châssis est sous tension, la vérification
de la structure est effectuée lorsqu'un serveur ou module d'E/S est inséré (en
option). Si un décalage de structure est détecté, le serveur ou module d'E/S est
autorisé à se mettre sous tension et le voyant de condition clignote en orange.
Configurations non valides
Il existe trois types de configurations non valides :
• La configuration de cartes porteuses ou LOM non valide, où le type de
structure d'un serveur récemment installé diffère de la structure du
module d'E/S existant.
• La configuration carte porteuse-module d'E/S non valide, où un module
d'E/S récemment installé possède un type de structure différent ou est
incompatible avec celui des cartes porteuses résidentes.
• Une configuration de module d'E/S-module d'E/S non valide, où un
module d'E/S récemment installé possède un type de structure différent ou
incompatible avec celui d'un module d'E/S déjà installé dans le groupe.422 Gestion de la structure d'E/S
Configuration de cartes porteuses non valides
Une configuration de carte porteuse non valide survient dès qu'une seule
carte porteuse ou LOM installée sur un serveur n'est pas prise en charge par le
module d'E/S correspondant. Dans ce cas, tous les autres serveurs du châssis
peuvent fonctionner, mais le serveur avec la carte porteuse discordante ne
pourra pas être mis sous tension. Le bouton d'alimentation sur le serveur se
met à clignoter orange pour indiquer un décalage de structure. Pour des
informations sur CMC et les journaux de matériel, voir « Affichage des
journaux d'événements », à la page 460.
Configuration de carte porteuse de module d'E/S non valide
Le module d'E/S discordant sera maintenu hors tension. CMC ajoute une
entrée aux journaux CMC et du matériel en indiquant la configuration non
valide et en précisant le nom du module d'E/S. CMC déclenche le
clignotement de la LED d'erreur du module d'E/S problématique. Si CMC
est configuré pour envoyer des alertes, il envoie des alertes par e-mail et/ou
SNMP pour cet événement. Pour des informations sur CMC et les journaux
de matériel, voir « Affichage des journaux d'événements », à la page 460.
Configuration module d'E/S - module d'E/S non valide
CMC maintient le module d'E/S nouvellement installé hors tension, déclenche
le clignotement de la LED d'erreur du module d'E/S et crée des entrées dans les
journaux CMC et du matériel concernant cette non correspondance. Pour des
informations sur CMC et les journaux de matériel, voir « Affichage des journaux
d'événements », à la page 460.
Scénario de nouveau démarrage
Lorsque le châssis est branché et mis sous tension, les modules d'E/S ont priorité
sur les serveurs. Le premier module d'E/S de chaque groupe est autorisé à
démarrer avant les autres. À ce stade, aucune vérification du type de structure
n'est effectuée. En l'absence d'un module d'E/S dans le premier logement d'un
groupe, le module du deuxième logement de ce groupe démarre. Lorsque les
deux logements comportent un module d'E/S, le module du deuxième
logement est comparé à celui du premier afin d'en vérifier la cohérence.
Après démarrage des modules d'E/S, les serveurs démarrent et CMC vérifie la
cohérence de la structure des serveurs.
Un module de transfert et un module de commutation sont autorisés dans le
même groupe tant que leur structure est identique. Les modules de
commutation et de transfert peuvent coexister dans un même groupe même s'ils
sont fabriqués par des fournisseurs différents.Gestion de la structure d'E/S 423
Surveillance de l'intégrité des modules d'E/S
Vous pouvez consulter la condition d'intégrité des modules d'E/S de deux
manières : à partir de la section Graphiques du châssis sur la page Condition
du châssis ou sur la page Condition des modules d'E/S. La page Graphiques
du châssis fournit une représentation graphique des modules d'E/S installés
dans le châssis.
Pour consulter la condition d'intégrité des modules d'E/S à l'aide des
graphiques du châssis :
1 Ouvrez une session sur l'interface Web de CMC.
2 La page Condition du châssis s'affiche. La section droite de la page
Graphiques du châssis, qui fournit une vue arrière du châssis, contient la
condition d'intégrité des modules d'E/S. La condition d'intégrité du
module d'E/S est indiqué par la couleur du graphique de module d'E/S :
• Vert : le module d'E/S est présent, sous tension et communique avec
CMC ; aucune indication d'événement indésirable.
• Orange : le module d'E/S est présent, mais peut ne pas être sous
tension ou peut ou ne pas communiquer avec CMC ; un
événement indésirable peut exister.
• Gris : le module d'E/S est présent et hors tension. Elle ne
communique pas avec CMC et il n'y a aucune indication d'événement
indésirable.
3 Placez le curseur sur un sous-graphique de module d'E/S pour afficher le
champ textuel ou l'infobulle correspondant. Le champ textuel fournit des
informations complémentaires sur le module d'E/S.
4 Le lien hypertexte du sous-graphique de module d'E/S permet d'accéder à
l'interface utilisateur CMC correspondante fournissant un accès direct
vers la page Condition des modules d'E/S associée au module.
Pour consulter la condition d'intégrité de tous les modules d'E/S à l'aide de la
page Condition des modules d'E/S :
1 Ouvrez une session sur l'interface Web de CMC.
2 Sélectionnez Modules E/S (Modules d'E/S) dans le menu Chassis de
l'arborescence.
3 Cliquez sur l'onglet Propriétés.
4 Cliquez sur le sous-onglet Condition. La page Condition des modules
d'E/S s'affiche.424 Gestion de la structure d'E/S
Tableau 11-1. Informations sur la condition d'intégrité des modules d'E/S
Élément Description
Logement Indique l'emplacement du module d'E/S dans le châssis par numéro
de groupe (A, B ou C) et banque (1 ou 2). Énumération de module
d'E/S : A1, A2, B1, B2, C1 ou C2.
Présentation Indique si le module d'E/S est présent (oui ou non).
Intégrité OK Indique que le module d'E/S est présent et
communique avec CMC. En cas de perte des
communications entre CMC et le serveur, CMC
ne peut ni obtenir ni afficher la condition de
l'intégrité du module d'E/S.
Informatif Affiche des informations sur les modules d'E/S
en l'absence de modification de la condition de
l'intégrité (OK, Avertissement, Grave).
Avertissement Indique que des alertes d'avertissement ont été
émises et que des actions correctives doivent
être effectuées. Si aucune action corrective n'est
prise, des pannes critiques ou graves susceptibles
d'affecter l'intégrité du module d'E/S pourraient
se produire.
Exemples de situations provoquant des
avertissements : discordance de structure entre
le module d'E/S et la structure de la carte
mezzanine du serveur ; configuration de
modules d'E/S non valide (où les modules d'E/S
nouvellement installés ne correspondent pas aux
modules d'E/S existants du même groupe).
Grave Indique qu'au moins une alerte de panne a été
générée. La condition Grave représente une
panne système du module d'E/S et des actions
correctives doivent être effectuées
immédiatement.
Exemples de situations provoquant une
condition Grave : détection d'une panne d'un
module d'E/S ; retrait d'un module d'E/S.
REMARQUE : toute modification de l'intégrité est consignée dans les
journaux du matériel et CMC. Pour plus d'informations, voir « Affichage
des journaux d'événements », à la page 460.Gestion de la structure d'E/S 425
Structure Indique le type de structure du module d'E/S : Gigabit Ethernet,
10GE XAUI, 10GE KR, 10GE XAUI KR, FC 4 Gb/s, FC 8 Gb/s, SAS 3
Gb/s, SAS 6 Gb/s, Infiniband SDR, Infiniband DDR, Infiniband
QDR, Interconnexion PCIe 1ère génération, Interconnexion PCIe
2ème génération.
REMARQUE : le fait de connaître les types de structure des modules
d'E/S de votre châssis permet d'éviter des dissociations de modules
d'E/S au sein d'un même groupe. Pour des informations sur la structure
E/S, voir « Gestion de la structure d'E/S », à la page 419.
Nom Affiche le nom de produit du module E/S.
Lancer la
console de
gestion des
modules d'E/S
Si le bouton d'un module d'E/S spécifique est présent, le fait de
cliquer dessus lance la console de gestion de ce module d'E/S dans
une nouvelle fenêtre de navigateur ou sous un nouvel onglet.
REMARQUE : cette option est uniquement disponible pour les
modules d'E/S de commutateurs gérés. Elle n'est pas disponible
pour les modules de transfert d'E/S ou pour les commutateurs
Infiniband non gérés.
REMARQUE : si un module d'E/S est inaccessible car il est hors
tension, si son interface de réseau local est désactivée ou qu'une
adresse IP valide n'a pas été assignée au module, alors l'option
Lancer l'interface utilisateur de module d'E/S n'est pas affichée
pour ce module d'E/S.
REMARQUE : il vous est alors demandé d'ouvrir une session
dans l'interface de gestion du module d'E/S.
REMARQUE : vous pouvez configurer l'adresse IP du module
d'E/S par l'intermédiaire de l'interface utilisateur de CMC, comme
décrit dans « Configuration des paramètres réseau pour un
module d'E/S spécifique », à la page 428.
Rôle Quand les modules d'E/S sont liés ensemble, le Rôle affiche la
hiérarchisation de modules d'E/S. Membre : le module fait partie d'un
ensemble de piles. Maître : le module est un point d'accès principal.
État de
l'alimentation
Indique la condition de l'alimentation du module d'E/S : sous
tension, hors tension ou N/A (absente).
Tableau 11-1. Informations sur la condition d'intégrité des modules d'E/S (suite)
Élément Description426 Gestion de la structure d'E/S
Affichage de la condition d'intégrité d'un module d'E/S spécifique
La page Condition du module d'E/S (distincte de la page Condition des
modules d'E/S) fournit un aperçu d'un module d'E/S spécifique.
Pour afficher la condition d'intégrité d'un module d'E/S spécifique :
1 Ouvrez une session sur l'interface Web de CMC.
2 Développez Modules d'E/S dans l'arborescence du système. Tous les
modules d'E/S (1 à 6) s'affichent dans la liste Modules d'E/S développée.
3 Cliquez sur le module d'E/S que vous souhaitez afficher dans la liste
Modules d'E/S de l'arborescence du système.
4 Cliquez sur le sous-onglet Condition. La page Condition des modules
d'E/S s'affiche.
Numéro de
service
Affiche le numéro de service du module d'E/S. Le numéro de service est
un identifiant unique fourni par Dell pour le support et la maintenance.
Toute modification de l'intégrité est consignée dans les journaux du
matériel et CMC. Pour plus d'informations, voir « Affichage des
journaux d'événements », à la page 460.
REMARQUE : les transferts n'ont pas de numéros de service. Seuls les
commutateurs en possèdent.
Tableau 11-2. Informations sur la condition d'intégrité du module d'E/S
Élément Description
Emplacement Indique l'emplacement d'un module d'E/S dans le châssis par
numéro de groupe (A, B ou C) et numéro de logement (1 ou 2).
Noms de logement : A1, A2, B1, B2, C1 ou C2.
Name (Nom) Affiche le nom du module d'E/S.
Présentation Indique si le module d'E/S est Présent ou Absent.
Tableau 11-1. Informations sur la condition d'intégrité des modules d'E/S (suite)
Élément DescriptionGestion de la structure d'E/S 427
Intégrité OK Indique que le module d'E/S est présent et
communique avec CMC. En cas de perte des
communications entre CMC et le serveur,
CMC ne peut ni obtenir ni afficher la
condition de l'intégrité du module d'E/S.
Informatif Affiche des informations sur les modules d'E/S
en l'absence de modification de la condition de
l'intégrité (OK, Avertissement, Grave).
Exemples de situations provoquant une
condition Informative : la présence du module
d'E/S a été détectée ; un utilisateur a demandé
un cycle d'alimentation du module d'E/S.
Avertissement Indique que des alertes d'avertissement ont été
émises et que des actions correctives doivent
être effectuées. Si aucune action corrective
n'est prise, des pannes critiques ou graves
susceptibles d'affecter l'intégrité du module
d'E/S pourraient se produire.
Exemples de situations provoquant des
avertissements : discordance de structure entre
le module d'E/S et la structure de la carte
mezzanine du serveur ; configuration de
modules d'E/S non valide, dans laquelle
les modules d'E/S récemment installés ne
correspondent pas aux modules d'E/S existants
du même groupe.
Grave Indique qu'au moins une alerte de panne a été
générée. La condition Grave représente une
panne système du module d'E/S et des actions
correctives doivent être effectuées
immédiatement.
Exemples de situations provoquant une
condition Grave : détection d'une panne d'un
module d'E/S ; retrait d'un module d'E/S.
REMARQUE : toute modification de l'intégrité est consignée dans les
journaux du matériel et CMC. Pour des informations sur l'affichage
des journaux, voir « Affichage du journal du matériel », à la page 460 et
« Affichage du journal CMC », à la page 463.
Tableau 11-2. Informations sur la condition d'intégrité du module d'E/S (suite)
Élément Description428 Gestion de la structure d'E/S
Configuration des paramètres réseau pour un module d'E/S spécifique
La page Configuration des modules d'E/S vous permet de spécifier les
paramètres réseau pour l'interface utilisée pour gérer le module d'E/S. Le port de
gestion hors bande (adresse IP) est configuré pour les commutateurs Ethernet.
Le port de gestion intra-bande (VLAN1) n'est pas configuré via cette interface.
REMARQUE : pour modifier des paramètres dans la page Configuration des
modules d'E/S, vous devez posséder des privilèges administrateur : de la
structure A afin de configurer le groupe A des modules d'E/S ; de la structure B afin
de configurer la groupe B des modules d'E/S ; ou de la structure C afin de
configurer le groupe C des modules d'E/S.
État de
l'alimentation
Indique la condition de l'alimentation du module d'E/S : sous
tension, hors tension ou N/A (absente).
Numéro de
service
Affiche le numéro de service du module d'E/S. Le numéro de service est
un identifiant unique fourni par Dell pour le support et la maintenance.
Structure Indique le type de structure du module d'E/S : Gigabit Ethernet,
10GE XAUI, 10GE KR, 10GE XAUI KR, FC 4 Gb/s, FC 8 Gb/s,
SAS 3 Gb/s, SAS 6 Gb/s, Infiniband SDR, Infiniband DDR,
Infiniband QDR, Interconnexion PCIe 1ère génération,
Interconnexion PCIe 2ème génération.
REMARQUE : le fait de connaître les types de structure des modules
d'E/S de votre châssis permet d'éviter des dissociations de modules
d'E/S au sein d'un même groupe. Pour des informations sur la
structure E/S, voir « Gestion de la structure d'E/S », à la page 419.
Adresse MAC Affiche l'adresse MAC du module d'E/S. L'adresse MAC est une
adresse unique attribuée à un périphérique par le fournisseur du
matériel à des fins d'identification.
REMARQUE : les transferts n'ont pas d'adresses MAC. Seuls les
commutateurs possèdent une adresse MAC.
Rôle Affiche l'adhésion à l'empilage du module d'E/S lorsque les modules
sont reliés :
• Membre : le module fait partie d'un ensemble de piles.
• Maître : le module est un point d'accès principal.
Tableau 11-2. Informations sur la condition d'intégrité du module d'E/S (suite)
Élément DescriptionGestion de la structure d'E/S 429
REMARQUE : concernant les commutateurs Ethernet, les adresses IP de gestion
hors bande et intra-bande (VLAN1) ne peuvent pas être identiques ni se trouver sur
le même réseau ; cette configuration empêcherait toute définition de l'adresse IP
de gestion hors bande. Pour plus d'informations sur l'adresse IP de gestion intrabande par défaut, reportez-vous à la documentation du module d'E/S.
REMARQUE : seuls les modules d'E/S présents dans le châssis s'affichent.
REMARQUE : ne tentez pas de configurer les paramètres réseau du module d'E/S
pour le module d'intercommunication Ethernet ou les commutateurs Infiniband.
Pour configurer les paramètres réseau d'un module d'E/S spécifique :
1 Ouvrez une session sur l'interface Web de CMC.
2 Développez Modules d'E/S dans l'arborescence du système. Cliquez sur le
sous-onglet Configuration. La page Configuration des paramètres réseau
des modules d'E/S s'affiche.
3 Pour configurer les paramètres réseau des modules d'E/S, entrez/sélectionnez
les valeurs des propriétés suivantes, puis cliquez sur Appliquer.
REMARQUE : seuls les modules d'E/S sous tension peuvent être configurés.
REMARQUE : l'adresse IP définie sur les modules d'E/S à partir de CMC n'est pas
enregistrée dans la configuration permanente de démarrage du commutateur. Pour
enregistrer l'adresse IP de manière permanente, entrez la commande connect
switch-n ou la commande racadm connect switch -n RACADM, ou
bien utilisez une interface directe de l'interface utilisateur du module d'E/S afin
d'enregistrer l'adresse dans le fichier de configuration de démarrage.
Tableau 11-3. Configurez les paramètres réseau du module d'E/S
Élément Description
Logement Indique l'emplacement d'un module d'E/S dans le châssis par numéro
de groupe (A, B ou C) et numéro de logement (1 ou 2). Noms de
logement : A1, A2, B1, B2, C1 ou C2. (La valeur du logement ne peut
pas être modifiée.)
Name (Nom) Affiche le nom de produit du module E/S. (Le nom du module d'E/S
ne peut pas être modifié.)
État de
l'alimentation
Affiche l'état d'alimentation du module d'E/S. (L'état d'alimentation
ne peut pas être modifié depuis cette page.)430 Gestion de la structure d'E/S
DHCP activé Permet au module d'E/S du châssis de demander et d'obtenir
automatiquement une adresse IP auprès du serveur DHCP (protocole
de configuration dynamique des hôtes).
Par défaut : coché (activé).
Si cette option est cochée, le module d'E/S récupère
automatiquement la configuration IP (adresse IP, masque de sousréseau et passerelle) auprès d'un serveur DHCP de votre réseau.
REMARQUE : lorsque cette fonctionnalité est activée, les champs des
propriétés Adresse IP, Passerelle et Masque de sous-réseau (situés en
regard de cette option) sont désactivés et les valeurs précédemment
saisies pour ces propriétés sont ignorées.
Si cette option n'est pas cochée, vous devez saisir manuellement
une adresse IP valide, une passerelle et un masque de sous-réseau dans les
champs de texte correspondants situés juste en dessous de cette option.
Adresse IP Indique l'adresse IP de l'interface réseau du module d'E/S.
Masque de
sous-réseau
Indique le masque de sous-réseau de l'interface réseau du module d'E/S.
par défaut Indique la passerelle de l'interface réseau du module d'E/S.
Tableau 11-3. Configurez les paramètres réseau du module d'E/S (suite)
Élément DescriptionGestion de la structure d'E/S 431
Dépannage des paramètres réseau de module d'E/S
La liste suivante contient les éléments de dépannage pour les paramètres
réseau de module d'E/S :
• CMC peut lire le paramètre d'adresse IP après une modification de la
configuration. Il affiche 0.0.0.0 une fois que vous avez cliqué sur
Appliquer. Cliquez sur le bouton Actualiser pour voir si l'adresse IP est
correctement définie sur le commutateur.
• Si vous ne définissez pas correctement l'adresse IP, le masque ou la
passerelle, le commutateur ne définit pas l'adresse IP et rétablit tous les
champs sur 0.0.0.0.
Erreurs les plus courantes :
• Les adresses IP de gestion hors bande et intra-bande sont identiques
ou configurées sur le même réseau.
• Le masque de sous-réseau n'est pas valide.
• La passerelle par défaut est définie vers une adresse qui ne se trouve
pas sur un réseau mais est connectée directement au commutateur.
Pour plus d'informations sur les paramètres réseau de module d'E/S, reportezvous au document Dell PowerConnect M6220 Switch Important Information
et au livre blanc Dell PowerConnect 6220 Series Port Aggregator. 432 Gestion de la structure d'E/SDépannage et récupération 433
Dépannage et récupération
Présentation
Cette section détaille les tâches de récupération et de résolution des
problèmes se produisant sur le système distant avec l'interface Web CMC.
• Collecte des informations de configuration, d'état d'erreur et des
journaux d'erreurs.
• Gestion de l'alimentation d'un système distant.
• Gestion des tâches Lifecycle Controller sur un système distant.
• Affichage des informations sur le châssis.
• Affichage des journaux d'événements.
• Utilisation de la console de diagnostic.
• Réinitialisation des composants.
• Dépannage des problèmes de protocole de temps du réseau (NTP).
• Dépannage des problèmes de réseau.
• Dépannage des problèmes d'alerte.
• Réinitialisation de mot de passe administrateur oublié.
• Enregistrement et restauration des certificats et paramètres de
configuration du châssis.
• Journaux et codes d'erreur.434 Dépannage et récupération
Outils de surveillance du châssis
Collecte des informations de configuration et d'état et journaux
du châssis
La sous-commande racdump fournit une commande unique d'obtention de
la condition complète du châssis, des informations sur l'état de configuration
et des journaux.
Utilisation
racadm racdump
La sous-commande racdump affiche les informations suivantes :
• informations générales sur le système/RAC
• informations sur CMC
• informations sur le châssis
• informations sur les sessions
• informations du capteur
• informations sur le numéro du micrologiciel
Interfaces prises en charge
• CLI RACADM
• RACADM distante
• RACADM Telnet
La commande RACADM peut être exécutée à distance à partir de l'invite de
commande d'une console série, Telnet ou SSH , ou d'une invite de
commande normale.
Pour obtenir la liste des options de syntaxe et de ligne de commande des
différentes sous-commandes RACDUMP, entrez :
racadm help Dépannage et récupération 435
CLI RACDUMP
Racdump inclut les sous-systèmes suivants et regroupe les commandes
RACADM suivantes :
Utilisation
racadm racdump
Tableau 12-1. Sous-systèmes et commandes RACADM
Sous-système Commande RACADM
Informations générales sur le système/RAC getsysinfo
Informations sur les sessions getssinfo
Informations du capteur getsensorinfo
Informations du commutateur (module d'E/S) getioinfo
Informations de la carte mezzanine (carte fille) getdcinfo
Informations de tous les modules getmodinfo
Informations du bilan de puissance getpbinfo
Informations KVM getkvminfo
Informations de NIC (module CMC) getniccfg
Informations de redondance getredundancymode
Information du journal de suivi gettracelog
Journal des événements RAC gettraclog
Journal des événements système getsel436 Dépannage et récupération
RACDUMP à distance
RACADM distante est un utilitaire côté client qui peut être exécuté à partir
d'une station de gestion via l'interface réseau hors bande. Une option de
capacité d'accès à distance -r qui vous permet de vous connecter au système
géré et d'exécuter les sous-commandes RACADM à partir d'une console
distante ou d'une station de gestion est offerte. Pour utiliser la capacité
d'accès à distance, il vous faut un nom d'utilisateur (option -u) et un mot de
passe (option -p) valides, ainsi que l'adresse IP de CMC.
REMARQUE : lorsque vous utilisez la capacité d'accès à distance de RACADM,
vous devez posséder des droits d'écriture sur les dossiers sur lesquels vous
utilisez les sous-commandes RACADM impliquant des opérations sur des fichiers,
par exemple :
– racadm getconfig -f
– racadm sslcertdownload -t
[-f ]
Utilisation de RACDUMP à distance
Pour utiliser la sous-commande RACDUMP à distance, entrez les
commandes suivantes :
racadm -r -u -p
racadm -i -r
REMARQUE : l'option -i indique à RACADM de demander le nom d'utilisateur et le
mot de passe de manière interactive. Sans l'option -i, vous devez indiquer le nom
d'utilisateur et le mot de passe dans la commande à l'aide des options -u et -p.
Par exemple :
racadm -r 192.168.0.120 -u root -p calvin racdump
racadm -i -r 192.168.0.120 racdump
Si le numéro de port HTTPS du CMC a été remplacé par un port personnalisé
autre que le port par défaut (443), la syntaxe suivante doit être utilisée :
racadm -r : -u -p
racadm -i -r :
Dépannage et récupération 437
Telnet RACDUMP
RACADM SSH/Telnet est utilisée pour faire référence à l'utilisation de la
commande RACDUMP à partir de l'invite SSH ou Telnet.
Pour plus d'informations sur les instructions de RACDUMP, voir le Guide de
référence de la ligne de commande RACADM pour iDRAC et CMC sur le site
support.dell.com/manuals.
Configuration des LED pour l'identification des composants du châssis
Vous pouvez définir des LED pour chaque composant (châssis, serveurs et
modules d'E/S). Celles-ci clignoteront alors pour identifier le composant
correspondant du châssis.
REMARQUE : vous devez disposer du privilège Administrateur de configuration du
châssis pour modifier ces paramètres.
Utilisation de l'interface Web
Pour activer le clignotement d'une, de plusieurs ou de toutes les LED
de composants :
1 Ouvrez une session sur l'interface Web de CMC.
2 Sélectionnez Châssis dans l'arborescence.
3 Cliquez sur l'onglet Dépannage.
4 Cliquez sur le sous-onglet Identifier. La page Identifier qui s'affiche
présente la liste de tous les composants du châssis.
5 Pour activer le clignotement d'une LED, cochez la case en regard du nom
de périphérique, puis cliquez sur Clignotement.
6 Pour désactiver le clignotement d'une LED, cochez la case en regard du
nom de périphérique, puis cliquez sur Arrêter le clignotement de la LED.438 Dépannage et récupération
Utilisation de la RACADM
Ouvrez une console texte série/Telnet/SSH d'accès à CMC, ouvrez une session
et entrez :
racadm setled -m [-l ]
où indique le module dont vous souhaitez configurer les LED.
Options de configuration :
• server-n où n = 1–16
• switch-n où n = 1–6
• cmc-active
et (état du voyant) indique si la LED doit clignoter.
Options de configuration :
• 0 : aucun clignotement (par défaut)
• 1 : clignotement
Configuration des alertes SNMP
Les interruptions SNMP (protocole de gestion de réseau simple) ou les
interruptions d'événements sont similaires aux alertes d'événement par e-mail.
Elles sont utilisées par une station de gestion pour recevoir des données de
CMC sans avoir à les demander.
Vous pouvez configurer CMC pour générer des interruptions d'événement.
La Figure 12-2 fournit un aperçu des événements déclencheurs des alertes
SNMP et par e-mail. Pour plus d'informations sur les alertes par e-mail, voir
« Configuration des alertes par messagerie », à la page 445.
REMARQUE : dès la version 2.10 de CMC, SNMP bénéficie désormais de la
capacité IPv6. Vous pouvez inclure une adresse IPv6 ou un nom de domaine
pleinement qualifié (FQDN) dans la destination pour une alerte d'événement.Dépannage et récupération 439
Tableau 12-2. Événements sur châssis susceptibles de générer des alertes SNMP et
par e-mail
Événement Description
Panne de sonde
de ventilateur
Un ventilateur est trop lent ou ne fonctionne pas
du tout.
Avertissement de capteur
de batterie
Une batterie a cessé de fonctionner.
Avertissement de capteur
de température
La température approche de ses limites excessivement
hautes ou basses.
Panne de capteur
de température
La température est trop haute ou trop basse pour un
fonctionnement correct.
Redondance dégradée La redondance des ventilateurs et/ou des blocs
d'alimentation a été réduite.
Perte de la redondance Les ventilateurs et/ou les blocs d'alimentation ne sont
plus redondants.
Avertissement de bloc
d'alimentation
Le bloc d'alimentation approche d'une condition
de panne.
Panne de bloc
d'alimentation
Le bloc d'alimentation est défaillant.
Bloc d'alimentation absent Un bloc d'alimentation qui devrait être en place
est manquant.
Erreur dans le journal
du matériel
Le journal du matériel ne fonctionne pas.
Avertissement du journal
du matériel
Le journal du matériel est presque plein.
Serveur absent Un serveur qui devrait être présent est manquant.
Panne de serveur Le serveur ne fonctionne pas.
KVM absent Un module KVM qui devrait être présent
est manquant.
Échec de KVM Le module KVM ne fonctionne pas.440 Dépannage et récupération
Vous pouvez ajouter et configurer des alertes SNMP à l'aide de l'interface
Web ou RACADM.
Utilisation de l'interface Web
REMARQUE : vous devez disposer du privilège Administrateur de configuration du
châssis pour ajouter ou configurer des alertes SNMP.
REMARQUE : pour plus de sécurité, il est vivement recommandé de modifier le
mot de passe par défaut du compte root (User 1). Le compte root est le compte
d'administration par défaut fourni avec le contrôleur CMC. Pour modifier le mot de
passe par défaut du compte root, cliquez sur la référence utilisateur 1 pour ouvrir la
page Configuration utilisateur. L'aide relative à cette page est disponible via le lien
Aide en haut à droite de la page.
Module d'E/S absent Un module d'E/S qui devrait être présent est manquant.
Panne de module d'E/S Le module d'E/S ne fonctionne pas.
Non correspondance de
version de micrologiciel
Il existe une incompatibilité du micrologiciel avec le
châssis ou du serveur.
Erreur de limite de
puissance du châssis
La consommation électrique au sein du châssis a atteint
la limite de puissance d'entrée système.
CARTE SD absente Aucun support ne se trouve dans le logement de carte
SD (Secure Digital) de CMC et une fonctionnalité
CMC configurée en a besoin.
Erreur de CARTE SD Une erreur s'est produite lors de l'accès au support se
trouvant dans le logement de carte SD (Secure Digital)
de CMC.
Erreur du groupe de châssis Le groupe de châssis contient une erreur de
configuration.
Tableau 12-2. Événements sur châssis susceptibles de générer des alertes SNMP et
par e-mail (suite)
Événement DescriptionDépannage et récupération 441
Pour ajouter et configurer des alertes SNMP à l'aide de l'interface Web CMC :
1 Ouvrez une session sur l'interface Web de CMC.
2 Sélectionnez Châssis dans l'arborescence du système.
3 Cliquez sur l'onglet Alertes. La page Événements sur châssis s'affiche.
4 Activation des alertes :
a Cochez les cases des événements pour lesquels vous souhaitez activer
les alertes. Pour activer tous les événements pour les alertes, cochez la
case Sélectionner tout.
b Cliquez sur Appliquer pour enregistrer vos paramètres.
5 Cliquez sur le sous-onglet Paramètres d'interruptions. La page
Destinations des alertes des événements sur châssis s'affiche.
6 Saisissez une adresse valide dans un champ Destination vide.
REMARQUE : une adresse valide est une adresse qui reçoit les alertes
d'interruptions. Utilisez le format IPv4 « à quatre points », la notation
d'adresses IPv6 standard ou FQDN. Par exemple : 123.123.123.123 ou
2001:db8:85a3::8a2e:370:7334 ou dell.com
7 Entrez la chaîne de communauté SNMP à laquelle appartient la station
de gestion de destination.
REMARQUE : les chaînes de communauté des pages Destinations des
alertes des événements sur châssis et Châssis→ Réseau→ Services
diffèrent. La chaîne de communauté des interruptions SNMP est celle utilisée
par CMC pour les interruptions sortantes à destination des stations de
gestion. La chaîne de communauté de la page Châssis→ Réseau→ Services
correspond à la chaîne de communauté utilisée par les stations de gestion
pour interroger le démon SNMP sur CMC.
8 Cliquez sur Appliquer pour enregistrer les modifications.
Pour tester une interruption d'événement pour une destination d'alerte :
1 Ouvrez une session sur l'interface Web de CMC.
2 Sélectionnez Châssis dans l'arborescence du système.
3 Cliquez sur l'onglet Alertes. La page Événements du châssis s'affiche.
4 Cliquez sur l'onglet Paramètres d'interruptions. La page Destinations des
alertes des événements du châssis s'affiche. 442 Dépannage et récupération
5 Cliquez sur Envoyer dans la colonne Interruption de test à côté de
la destination.
REMARQUE : spécifiez les destinations d'interruptions sous la forme d'adresses
numériques au format approprié (IPv6 ou IPv4) ou de noms de domaine pleinement
qualifiés (FQDN). Choisissez un format compatible avec votre technologie de mise
en réseau/infrastructure. La fonctionnalité Interruption de test ne peut pas détecter
les choix incorrects d'après la configuration réseau actuelle (par exemple,
l'utilisation d'une destination IPv6 dans un environnement IPv4 uniquement).
Utilisation de la RACADM
1 Ouvrez une console série/Telnet/SSH d'accès à CMC, puis ouvrez
une session.
REMARQUE : seul un masque de filtre peut être défini pour les alertes SNMP
et par e-mail. Vous pouvez passer l'étape 2 si vous avez déjà sélectionné le
masque de filtre.
2 Activez des alertes en entrant :
racadm config -g cfgAlerting -o cfgAlertingEnable 1
3 Spécifiez les événements pour lesquels vous souhaitez que CMC génère
des alertes en entrant :
racadm config -g cfgAlerting -o
cfgAlertingFilterMask
où est une valeur hexadécimale comprise entre 0x0
et 0xffffffff.
Pour obtenir la valeur du masque, utilisez une calculatrice scientifique en
mode hexadécimal et ajoutez les secondes valeurs des différents masques
(1, 2, 4, etc.) à l'aide de la touche .
Par exemple, pour activer les alertes d'interruptions pour l'avertissement de
capteur de batterie (0x2), la panne de bloc d'alimentation (0x1000) et la
panne de KVM (0x80000), entrez 2 1000 200000 et
appuyez sur la touche <=>.
La valeur hexadécimale qui en résulte est 208002 et la valeur du masque
pour la commande RACADM est 0x208002.Dépannage et récupération 443
Tableau 12-3. Masques de filtre d'interruptions d'événements
Événement Valeur du masque de filtre
Panne de sonde de ventilateur 0x1
Avertissement de capteur de batterie 0x2
Avertissement de capteur de température 0x8
Panne de capteur de température 0x10
Redondance dégradée 0x40
Perte de la redondance 0x80
Avertissement de bloc d'alimentation 0x800
Panne de bloc d'alimentation 0x1000
Bloc d'alimentation absent 0x2000
Erreur dans le journal du matériel 0x4000
Avertissement du journal du matériel 0x8000
Serveur absent 0x10000
Panne de serveur 0x20000
KVM absent 0x40000
Échec de KVM 0x80000
Module d'E/S absent 0x100000
Panne de module d'E/S 0x200000
Non correspondance de version de micrologiciel 0x400000
Erreur de limite de puissance du châssis 0x1000000
CARTE SD absente 0x2000000
Erreur de CARTE SD 0x4000000
Erreur du groupe de châssis 0x8000000444 Dépannage et récupération
4 Activez des alertes d'interruption en entrant :
racadm config -g cfgTraps -o cfgTrapsEnable 1 -i
où est une valeur comprise entre 1 et 4. Le numéro d'index est
utilisé par CMC pour distinguer jusqu'à quatre destinations configurables
pour les alertes d'interruptions. Les destinations peuvent être spécifiées
sous la forme d'adresses numériques au format approprié (IPv6 ou IPv4)
ou de noms de domaine pleinement qualifiés (FQDN).
5 Spécifiez une adresse IP de destination pour la réception d'alertes
d'interruption en entrant :
racadm config -g cfgTraps -o
cfgTrapsAlertDestIPAddr -i
où est une destination valide et est la valeur
d'index spécifiée à l'étape 4.
6 Spécifiez le nom de communauté en entrant :
racadm config -g cfgTraps -o cfgTrapsCommunityName
-i
où est la communauté SNMP à laquelle appartient
le châssis et est la valeur d'index spécifiée aux étapes 4 et 5.
Vous pouvez configurer jusqu'à quatre destinations pour recevoir des alertes
d'interruptions. Pour ajouter d'autres destinations, répétez les étapes 2 à 6.
REMARQUE : les commandes des étapes 2 à 6 écrasent tout paramètre existant
configuré pour l'index spécifié (1 à 4). Pour déterminer si des valeurs ont
précédemment été configurées pour un index, entrez : racadm get config -g
cfgTraps -i . Si l'index a été configuré, des valeurs apparaîtront pour les
objets cfgTrapsAlertDestIPAddr et cfgTrapsCommunityName.
Pour tester une interruption d'événement pour une destination d'alerte :
racadm testtrap -i
où est une valeur comprise entre 1 et 4 représentant la destination de
l'alerte à tester. Si vous n'êtes pas certain du numéro d'index, entrez :
racadm getconfig -g cfgTraps -i Dépannage et récupération 445
Téléchargement du fichier MIB (base d'information de gestion) SNMP
Le fichier MIB SNMP du CMC définit les types, les événements et les
indicateurs de châssis.
CMC vous permet de télécharger le fichier MIB via l'interface Web.
Pour télécharger le fichier MIB SNMP du CMC à l'aide de l'interface Web :
1 Ouvrez une session sur l'interface Web de CMC.
2 Sélectionnez Châssis dans l'arborescence.
3 Cliquez sur Réseau→ Services→ SNMP.
La section Configuration SNMP est activée.
4 Cliquez sur Enregistrer pour télécharger le fichier MIB du CMC vers votre
système local.
Pour plus d'informations sur le fichier MIB SNMP, voir le Guide de référence
SNMP de Dell OpenManage Server Administrator sur le site
support.dell.com/manuals.
Configuration des alertes par messagerie
Lorsque CMC détecte un événement sur le châssis, comme un avertissement
portant sur l'environnement ou une panne de composant, il peut être
configuré pour envoyer une alerte par e-mail vers une ou plusieurs adresses.
La Figure 12-2 fournit un aperçu des événements déclencheurs des alertes
SNMP et par e-mail. Pour plus d'informations sur les alertes SNMP, voir
« Configuration des alertes SNMP », à la page 438.
Vous pouvez ajouter et configurer des alertes par e-mail à l'aide de l'interface
Web ou RACADM.
Utilisation de l'interface Web
REMARQUE : vous devez disposer du privilège Administrateur de configuration du
châssis pour ajouter ou configurer des alertes par e-mail.
1 Ouvrez une session sur l'interface Web de CMC.
2 Sélectionnez Châssis dans l'arborescence du système.
3 Cliquez sur l'onglet Alertes. La page Événements sur châssis s'affiche.446 Dépannage et récupération
4 Activation des alertes :
a Cochez les cases des événements pour lesquels vous souhaitez activer
les alertes. Pour activer tous les événements pour les alertes, cochez la
case Sélectionner tout.
b Cliquez sur Appliquer pour enregistrer vos paramètres.
5 Cliquez sur le sous-onglet Paramètres des alertes par e-mail. La page
Destination des alertes par e-mail s'affiche.
6 Spécifiez l'adresse IP du serveur SMTP :
a Localisez le champ Serveur SMTP (e-mail), puis entrez le nom d'hôte
SMTP ou l'adresse IP.
REMARQUE : vous devez configurer le serveur de messagerie SMTP pour
accepter les e-mails transmis à partir de l'adresse IP de CMC, une
fonctionnalité qui est normalement désactivée sur la plupart des serveurs de
messagerie en raison des préoccupations de sécurité. Pour savoir
comment procéder en toute sécurité, reportez-vous à la documentation qui
accompagne votre serveur SMTP.
b Saisissez l'expéditeur de l'e-mail souhaité pour l'alerte ou laissez le
champ vide pour utiliser l'expéditeur de l'e-mail par défaut.
L'expéditeur par défaut est : cmc@ où
correspond à l'adresse IP de CMC. Pour entrer une valeur, utilisez la
syntaxe suivante pour le nom d'e-mail :
[@]. Le nom du domaine est facultatif.
Si @ n'est pas spécifié et qu'il existe un domaine de
réseau CMC actif, l'adresse e-mail @
est alors utilisée comme e-mail source. Si @ n'est pas
spécifié et que CMC ne possède pas de domaine de réseau actif,
l'adresse IP de CMC est utilisée (par exemple,
@).
c Cliquez sur Appliquer pour enregistrer vos modifications.
7 Spécifiez les adresses e-mail des destinataires des alertes :
a Saisissez une adresse e-mail valide dans un champ Adresse e-mail de
destination vide.
b Entrez un Nom facultatif. Ce nom correspond au destinataire de l'e-mail.
Le nom est ignoré si l'adresse e-mail correspondante n'est pas valide.
c Cliquez sur Appliquer pour enregistrer vos paramètres.Dépannage et récupération 447
Pour envoyer un e-mail test à une destination d'alerte par e-mail à l'aide de
l'interface Web CMC :
1 Ouvrez une session sur l'interface Web de CMC.
2 Sélectionnez Châssis dans l'arborescence du système.
3 Cliquez sur l'onglet Alertes. La page Événements sur châssis s'affiche.
4 Cliquez sur le sous-onglet Paramètres des alertes par e-mail. La page
Destination des alertes par e-mail s'affiche.
5 Cliquez sur Envoyer dans la colonne Adresse e-mail de destination en
regard de la destination.
Utilisation de la RACADM
Pour envoyer un e-mail test à une destination d'alerte par e-mail à l'aide
de RACADM :
1 Ouvrez une console série/Telnet/SSH d'accès à CMC, puis ouvrez
une session.
2 Activez des alertes en entrant :
racadm config -g cfgAlerting -o cfgAlertingEnable 1
REMARQUE : seul un masque de filtre peut être défini pour les alertes SNMP
et par e-mail. Vous pouvez passer l'étape 3 si vous avez déjà défini un masque
de filtre.
3 Spécifiez les événements pour lesquels vous souhaitez que CMC génère
des alertes en entrant :
racadm config -g cfgAlerting -o
cfgAlertingFilterMask
où correspond à une valeur hexadécimale comprise
entre 0x0 et 0xffffffff devant commencer par les caractères 0x.
La Figure 12-3 fournit des masques de filtre pour chaque type
d'événement. Pour des instructions sur le calcul de la valeur hexadécimale
du masque de filtre à activer, voir l'étape 3 de « Utilisation de la
RACADM », à la page 442.
4 Activez les alertes par e-mail en tapant :
racadm config -g cfgEmailAlert -o
cfgEmailAlertEnable 1 -i
où est une valeur comprise entre 1 et 4. Le numéro d'index est
utilisé par CMC pour distinguer jusqu'à quatre adresses e-mail de
destination configurables.448 Dépannage et récupération
5 Spécifiez une adresse e-mail de destination des alertes par e-mail
en tapant :
racadm config -g cfgEmailAlert -o
cfgEmailAlertAddress -i
où correspond à une adresse e-mail valide et
à la valeur de l'index spécifiée à l'étape étape 4.
6 Spécifiez le nom du destinataire de l'alerte par e-mail en tapant :
racadm config -g cfgEmailAlert -o
cfgEmailAlertEmailName -i
où correspond au nom de la personne ou du groupe
destinataire de l'alerte par e-mail et à la valeur de l'index
spécifiée aux étapes étape 4 et étape 5. Le nom du destinataire de l'e-mail
peut contenir jusqu'à 32 caractères alphanumériques, tirets, traits de
soulignement et points. Les espaces ne sont pas valides.
7 Définissez l'hôte SMTP en configurant la propriété de la base de données
cfgRhostsSmtpServerIpAddr en tapant :
racadm config -g cfgRemoteHosts -o
cfgRhostsSmtpServerIpAddr host.domain
où host.domain (domaine.hôte) est un nom de domaine complet.
Vous pouvez configurer jusqu'à quatre adresses e-mail de destination des
alertes par e-mail. Pour ajouter d'autres adresses e-mail, répétez les étapes de
l'étape 2 à l' étape 6.
REMARQUE : les commandes des étapes 2 à 6 écrasent tout paramètre existant
configuré pour l'index spécifié (1 à 4). Pour déterminer si des valeurs ont été
précédemment configurées pour un index, entrez : racadm get config -g
cfgEmailAlert -i . Si l'index a été configuré, des valeurs apparaîtront pour
les objets cfgEmailAlertAddress et cfgEmailAlertEmailName.Dépannage et récupération 449
Premières étapes de dépannage d'un
système distant
Les questions suivantes aident souvent à dépanner les problèmes de haut
niveau dans le système géré :
1 Le système est-il sous tension ou hors tension ?
2 S'il est sous tension, est-ce que le système d'exploitation fonctionne, est-il
tombé en panne ou est-il seulement bloqué ?
3 S'il est hors tension, est-ce que l'alimentation a été coupée soudainement ?
Surveillance de l'alimentation et exécution de
commandes de contrôle de l'alimentation sur
le châssis
Vous pouvez utiliser l'interface Web ou RACADM pour :
• afficher l'état actuel de l'alimentation du système
• effectuer un arrêt normal via le système d'exploitation lors du redémarrage
et mettre sous tension puis hors tension le système.
Pour des informations concernant la gestion de l'alimentation sur CMC et la
configuration du bilan de puissance, de la redondance et du contrôle de
l'alimentation, voir « Gestion de l'alimentation », à la page 335.
Affichage de la condition du bilan de puissance
Pour des instructions sur l'affichage de la condition du bilan de puissance du
châssis, des serveurs et des unités d'alimentation via l'interface Web ou
RACADM, voir « Affichage de l'état de la consommation de puissance », à la
page 361.
Exécution d'une opération de contrôle de l'alimentation
Pour des instructions sur la mise sous/hors tension, la réinitialisation, ou le
cycle d'alimentation du système via l'interface Web CMC ou RACADM, voir
« Exécution de tâches de contrôle de l'alimentation sur le châssis », à la
page 379, « Exécution d'opérations de contrôle de l'alimentation sur un
module d'E/S », à la page 381 et « Exécution de tâches de contrôle de
l'alimentation sur un serveur », à la page 382.450 Dépannage et récupération
Dépannage de l'alimentation
Les informations suivantes vous aident à dépanner le bloc d'alimentation et à
résoudre des problèmes d'alimentation :
• Problème : politique de redondance d'alimentation configurée sur
Redondance de l'alimentation alternative, et un événement de perte de
redondance de bloc d'alimentation redondante est survenu.
– Résolution A : cette configuration nécessite qu'au moins un bloc
d'alimentation du côté 1 (trois logements de gauche) et un bloc
d'alimentation dans le côté 2 (trois logements de droite) soient
présents et fonctionnels dans l'enceinte modulaire. En outre, la
capacité de chaque côté doit être suffisante pour soutenir les
allocations de puissances totales pour que le châssis maintienne la
redondance de l'alimentation alternative. (Pour une opération de
redondance de l'alimentation alternative complète, s'assurer qu'une
configuration de bloc d'alimentation complète de six blocs
d'alimentation est disponible.)
– Résolution B : vérifiez si tous les blocs d'alimentation sont
correctement connectés aux deux réseaux AC ; les blocs
d'alimentation du côté 1 doivent être connectés à un réseau de
courant alternatif, ceux du côté 2 doivent être raccordés au réseau à
courant alternatif, et les deux réseaux CA doivent fonctionner. La
redondance de l'alimentation alternative est perdue lorsque l'un des
réseaux d'alimentation alternative ne fonctionne pas.
• Problème : l'état de l'unité d'alimentation s'affiche comme Échoué
(Pas d'alimentation alternative), même lorsqu'un cordon d'alimentation
alternative est connecté et que l'unité de distribution d'alimentation
produit une sortie d'alimentation alternative satisfaisante.
– Résolution A : vérifiez et remplacez le cordon d'alimentation
alternative. Vérifiez et confirmez que l'unité de distribution électrique
acheminant l'électricité vers le bloc d'alimentation fonctionne comme
prévu. Si la panne persiste, appelez le service client de Dell en vue du
remplacement du bloc d'alimentation.
– Résolution B : vérifiez que l'unité d'alimentation est connectée à la
même tension que les autres. Si CMC détecte une unité
d'alimentation sur une tension différente, celle-ci est désactivée et
marquée comme défaillante.Dépannage et récupération 451
• Problème : l'enclenchement dynamique des blocs d'alimentation est
activé, mais aucun des blocs d'alimentation ne s'affiche à l'état Veille.
– Résolution A : l'excédent d'électricité est insuffisant. Un ou plusieurs
blocs d'alimentation sont placés en mode Veille seulement lorsque le
surplus d'énergie disponible dans l'enceinte dépasse la capacité d'au
moins un bloc d'alimentation.
– Résolution B : l'enclenchement dynamique des blocs d'alimentation
ne peut être entièrement pris en charge avec les blocs d'alimentation
présents dans l'enceinte. Pour vérifier si c'est le cas, utilisez l'interface
Web pour couper l'enclenchement dynamique des blocs
d'alimentation, puis rallumez-le. Un message s'affiche si
l'enclenchement dynamique des blocs d'alimentation ne peut pas être
pris en charge complètement.
• Problème : un nouveau serveur a été inséré dans l'enceinte contenant
assez de blocs d'alimentation, mais la mise sous tension du serveur ne
peut s'effectuer.
– Résolution A : vérifiez le paramètre de limite de puissance d'entrée
système ; il se peut qu'elle soit configurée sur un niveau trop faible
pour permettre la mise sous tension de serveurs supplémentaires.
– Résolution B : vérifiez le fonctionnement 110 V. Si des blocs
d'alimentation sont connectés à des circuits de dérivation 110V, vous
devez reconnaître cette configuration comme valide avant que les
serveurs soient autorisés à se mettre sous tension. Pour plus de détails,
consultez les paramètres de configuration de la puissance.
– Résolution C : vérifiez le paramètre de conservation de la puissance
max. S'il est défini, les serveurs sont autorisés à se mettre sous tension.
Pour plus de détails, consultez les paramètres de configuration de la
puissance.
– Résolution D : vérifiez la priorité de la puissance d'emplacement du
serveur de l'emplacement associé au serveur récemment inséré et
veillez à ce qu'elle ne soit pas inférieure à toute autre priorité de
puissance d'emplacement du serveur.452 Dépannage et récupération
• Problème : La puissance disponible ne cesse d'évoluer, même lorsque la
configuration de l'enceinte modulaire n'a pas changé
– Résolution : CMC 1.2 et les versions ultérieures intègrent la gestion
dynamique de l'alimentation de ventilateur qui réduit les allocations
de serveur brièvement si l'enceinte fonctionne à un niveau proche du
seuil énergétique maximal configuré par l'utilisateur ; cela permet
d'allouer de la puissance aux ventilateurs en réduisant les
performances du serveur afin de maintenir le débit de puissance
en dessous de la limite de la puissance d'entrée système. Ce
comportement est normal.
• Problème : 2000 W est signalé comme étant le surplus pour un maximum
de performance.
– Résolution : l'enceinte dispose de 2000 W de puissance excédentaire
disponible dans la configuration actuelle, et la limite de puissance
d'entrée système peut être réduite en toute sécurité en fonction de
cette quantité signalée sans affecter les performances du serveur.
• Problème : un sous-ensemble de serveurs n'est plus alimenté suite à une
panne du réseau d'alimentation en CA, même si le châssis fonctionnait en
mode de configuration Redondance d'alimentation alternative avec six
blocs d'alimentation.
– Résolution : cette situation peut se produire si les blocs
d'alimentation ne sont pas correctement connectés aux réseaux
électriques C.A. redondants lorsque la panne de réseau électrique C.A.
survient. La stratégie Redondance d'alimentation alternative exige
que les trois blocs d'alimentation de gauche soient connectés à un
réseau électrique C.A. et que les trois blocs d'alimentation de droite
soient connectés à l'autre réseau électrique C.A. Si deux unités
d'alimentation ne sont pas correctement connectées, par exemple si
l'unité d'alimentation3 et l'unité d'alimentation4 sont connectées aux
mauvais réseaux d'alimentation alternative, une panne de réseau
d'alimentation alternative entraîne la perte d'alimentation vers les
serveurs de priorité inférieure.Dépannage et récupération 453
• Problème : les serveurs de niveau de priorité le plus faible ne sont plus
alimentés suite à une panne d'unité d'alimentation.
– Résolution : ce comportement est normal si la stratégie
d'alimentation de l'enceinte a été configurée sur Sans redondance.
Pour éviter toute panne future du bloc d'alimentation entraînant la
mise hors tension des serveurs, veillez à ce que le châssis dispose d'au
moins quatre blocs d'alimentation et soit configuré pour la stratégie
Redondance du bloc d'alimentation afin d'empêcher la panne d'unité
d'alimentation d'affecter le fonctionnement du serveur.
• Problème : les performances globales du serveur diminuent lorsque la
température ambiante augmente dans le centre de données.
– Résolution : cette situation peut se produire si le paramètre Limite de
puissance d'entrée système a été configuré sur une valeur entraînant un
besoin accru de puissance pour les ventilateurs devant être réduits dans
l'allocation de puissance vers les serveurs. L'utilisateur peut définir la
Limite de puissance d'entrée système sur une valeur supérieure afin de
permettre une allocation de puissance supplémentaire aux ventilateurs
sans affecter les performances du serveur.
Gestion des tâches Lifecycle Controller sur un
système distant
Le service Lifecycle Controller est disponible sur chacun des serveurs et il est
optimisé par iDRAC. CMC fournit une liste de toutes les tâches du Lifecycle
Controller s'exécutant sur le ou les serveur(s) et permet de supprimer ou
d'éliminer les tâches existantes à l'aide de l'interface Web. Pour des
informations sur l'activation du Lifecycle Controller, voir « Mise à jour du
micrologiciel des composants du serveur à l'aide du Lifecycle Controller », à la
page 224.
La liste des tâches du Lifecycle Controller est une liste statique des tâches
existantes sur le serveur et doit être réactualisée pour offrir les conditions des
tâches du serveur les plus récentes. 454 Dépannage et récupération
La Figure 12-4 décrit les informations affichées dans la liste des tâches du
Lifecycle Controller
Les tâches du Lifecycle Controller permettent de supprimer ou d'éliminer les
tâches existantes sur le serveur.
Suppression de tâches
L'opération Supprimer est l'opération par défaut et permet de supprimer
toutes ou certaines tâches du ou des serveur(s). L'opération Supprimer
supprime les tâches sélectionnées dans la file d'attente des tâches du
Lifecycle Controller. La case en regard du champ Modèle permet la sélection
de toutes les tâches s'effectuant sur un serveur. Des tâches individuelles
peuvent être sélectionnées en cochant les cases à cocher en regard du champ
de la condition des tâches.
Élimination des tâches
L'opération Éliminer peut parfois s'avérer nécessaire lorsque la condition
d'une tâche est indéterminée ou qu'elle ne peut pas être supprimée à l'aide de
l'opération Supprimer les tâches. L'opération Éliminer réinitialise le Service
de gestion des données et supprime toutes les tâches du serveur. Elle peut
prendre quelque minute. La case à cocher en regard du champ Modèle
permet de sélectionner toutes les tâches pour l'opération Éliminer.
REMARQUE : restez sur la page après avoir planifié une opération.
Tableau 12-4. État des tâches du Lifecycle Controller
Événement Valeur du masque de filtre
Logement Indique le logement occupé par le serveur du châssis.
Les numéros de logement sont des ID séquentiels, qui vont
de 1 à 16 (pour les 16 logements disponibles dans le châssis),
qui permettent d'identifier l'emplacement du serveur dans le
châssis. Lorsqu'il y a moins de 16 serveurs dans les logements,
seuls les logements avec serveur sont affichés.
Name (Nom) Affiche le nom du serveur dans chaque logement.
Modèle Affiche le nom du modèle du serveur.
ID de la tâche Numéro affecté par le service du Lifecycle Controller à une
tâche spécifique.
Description Phrase indiquant le type de tâche sur le serveur, par exemple
une tâche de mise à jour, de redémarrage, etc.
Condition Indique l'état de la tâche sur le serveur.Dépannage et récupération 455
Affichage des résumés du châssis
CMC fournit des aperçus qui regroupent les informations relatives au châssis,
aux contrôleurs CMC principal et de secours, à iKVM, aux ventilateurs, aux
capteurs de température et aux modules d'E/S.
Utilisation de l'interface Web
Pour afficher les résumés du châssis, des contrôleurs CMC, du module iKVM
et des modules d'E/S :
1 Ouvrez une session sur l'interface Web de CMC.
2 Sélectionnez Châssis dans l'arborescence.
3 Cliquez sur l'onglet Résumé. La page Résumé du châssis s'affiche.
La Figure 12-5, la Figure 12-6, la Figure 12-7 et la Figure 12-8 décrivent les
informations affichées à la page Résumé du châssis.
Tableau 12-5. Résumé du châssis
Élément Description
Name (Nom) Affiche le nom du châssis. Le nom identifie le châssis sur le
réseau. Pour des informations sur la configuration du nom du
châssis, voir « Modification du nom d'un logement », à la
page 140.
Modèle Affiche le modèle de châssis ou son fabricant. Par exemple,
PowerEdge 2900.
Numéro de service Affiche le numéro de service du châssis. Le numéro de service
est un identifiant unique fourni par le fabricant pour le
support et la maintenance.
Numéro d'inventaire Affiche le numéro d'inventaire du châssis.
Emplacement Affiche l'emplacement du châssis.
Basculement
CMC disponible
Indique (Oui, Non) si le contrôleur CMC de secours
(le cas échéant) est capable de prendre le relais en cas
de basculement.
Condition de la
puissance système
Affiche la condition de la puissance système.456 Dépannage et récupération
Tableau 12-6. Résumé CMC
Élément Description
Information de CMC actif
Name (Nom) Affiche le nom CMC. Par exemple, CMC actif ou CMC
de secours.
Description Fournit une brève description de l'utilisation à laquelle CMC
est destiné.
Date/Heure Affiche la date et l'heure actuellement définies sur le
contrôleur CMC actif.
Emplacement du
logement du
contrôleur CMC actif
Affiche le logement sur le contrôleur CMC actif.
Mode de redondance Indique si le contrôleur CMC de secours est présent dans
le châssis.
Version du
micrologiciel
principale
Affiche la version du micrologiciel du contrôleur CMC actif.
Dernière mise à jour
de micrologiciel
Indique la date de la dernière mise à jour du micrologiciel. Si
aucune mise à jour n'a été effectuée, cette propriété affiche
en tant que S/O (-).
Version du matériel Affiche la version matérielle du contrôleur CMC actif.
Adresse MAC Affiche l'adresse MAC de l'interface réseau de CMC.
L'adresse MAC est un identificateur unique pour CMC sur
le réseau.
Adresse IP Affiche l'adresse IP de l'interface réseau de CMC.
par défaut Affiche la passerelle de l'interface réseau de CMC.
Masque de sousréseau
Affiche le masque de sous-réseau de l'interface réseau
de CMC.
Utiliser DHCP
(pour l'adresse IP
d'interface réseau)
Indique si CMC est activé pour demander et obtenir
automatiquement une adresse IP auprès du serveur DHCP
(protocole de configuration dynamique des hôtes) (Oui ou
Non). Le paramètre par défaut de cette propriété est Non.
Serveur DNS
principal
Indique le nom du serveur DNS principal.Dépannage et récupération 457
Autre serveur DNS Indique le nom du serveur DNS secondaire.
Utiliser DHCP pour
le nom de domaine
DNS
Indique l'utilisation de DHCP pour acquérir le nom de
domaine DNS (Oui, Non).
Nom de domaine DNS Affiche le nom de domaine DNS.
Informations sur le contrôleur CMC de secours
Présentation Indique (Oui, Non) si un second contrôleur CMC
(de secours) est installé.
Version du
micrologiciel
de secours
Affiche la version du micrologiciel CMC installé sur le
contrôleur CMC de secours.
Tableau 12-7. Résumé du module iKVM
Élément Description
Présentation Indique si le module iKVM est présent (oui ou non).
Name (Nom) Affiche le nom iKVM. Le nom identifie le module iKVM sur
le réseau.
Fabricant Affiche le modèle iKVM ou son fabricant.
Numéro de pièce Affiche le numéro de pièce d'iKVM. Le numéro de pièce est
un identificateur unique fourni par le fournisseur. Les
conventions d'attribution des noms des numéros de pièce
diffèrent d'un fournisseur à l'autre.
Version du
micrologiciel
Indique la version du micrologiciel iKVM.
Version du matériel Indique la version du micrologiciel iKVM.
État de
l'alimentation
Indique l'état de l'alimentation d'iKVM : sous tension, hors
tension ou S/O (absente).
USB/Vidéo du
panneau avant activés
Indique si les connecteurs USB et VGA du panneau avant
sont activés (Oui ou Non).
Tableau 12-6. Résumé CMC (suite)
Élément Description458 Dépannage et récupération
Autoriser l'accès à
l'interface de ligne
de commande
CMC à partir du
module iKVM
Indique que l'accès à l'interface de ligne de commande est
activé sur le module iKVM (Oui ou Non).
Tableau 12-8. Résumé des modules d'E/S
Élément Description
Emplacement Indique les logements occupés par les modules
d'E/S. Six logements sont identifiés par nom de
groupe (A, B ou C) et par numéro de logement
(1 ou 2). Noms des logements :
A-1, A-2, B-1, B-2, C-1 ou C-2.
Présentation Indique si le module d'E/S est présent
(oui ou non).
Name (Nom) Affiche le nom du module d'E/S.
Structure Affiche le type de structure.
État de l'alimentation Indique la condition de l'alimentation du
module d'E/S : sous tension, hors tension
ou N/A (absente).
Numéro de service Affiche le numéro de service du module d'E/S.
Le numéro de service est un identifiant unique
fourni par le fabricant pour le support et
la maintenance.
Tableau 12-7. Résumé du module iKVM (suite)
Élément DescriptionDépannage et récupération 459
Utilisation de la RACADM
1 Ouvrez une console série/Telnet/SSH d'accès à CMC, puis ouvrez une session.
2 Pour afficher les résumés du châssis et CMC, entrez :
racadm getsysinfo
3 Pour afficher le résumé iKVM, entrez :
racadm getkvminfo
4 Pour afficher le résumé iKVM, entrez :
racadm getioinfo
Affichage de la condition d'intégrité du châssis
et des composants
Utilisation de l'interface Web
Pour afficher les résumés du châssis et d'intégrité des composants :
1 Ouvrez une session sur l'interface Web de CMC.
2 Sélectionnez Châssis dans l'arborescence. La page Intégrité du
châssis s'affiche.
La section Graphiques du châssis fournit une vue avant et arrière du
châssis. Cette représentation graphique fournit un aperçu des
composants installés dans le châssis et de leur état correspondant.
Chaque graphique affiche une représentation en temps réel des
composants installés. L'état du composant est indiqué par la couleur du
sous-graphique de composant.
• Aucune couleur : le composant est présent, sous tension et
communique avec CMC, aucune indication d'événement indésirable.
• Panneau orange : indique que seules des alertes sont émises et que des
mesures correctives doivent être prises.
• Croix rouge : indique qu'au moins une condition de panne est
présente. Cela signifie que CMC peut toujours communiquer avec le
composant et que la condition d'intégrité signalée est critique.
• Grisé : indique que le composant est présent et n'est pas sous tension.
Elle ne communique pas avec CMC et il n'y a aucune indication
d'événement indésirable. 460 Dépannage et récupération
Un champ textuel ou un infobulle correspondant au composant s'affiche
lorsque vous placez le curseur sur le sous-graphique de ce dernier. L'état du
composant est mis à jour de manière dynamique et les couleurs du sousgraphique correspondant, ainsi que les champs textuels sont
automatiquement modifiés.
En cliquant sur le sous-graphique du composant, vous sélectionnez les
renseignements sur ce composant et les Liens rapides pour afficher sous les
graphiques du châssis.
La section Journal du matériel CMC fournit les 10 dernières entrées du
Journal du matériel CMC à des fins de référence.
Utilisation de la RACADM
Ouvrez une console texte série/Telnet/SSH d'accès à CMC, ouvrez une
session et entrez :
racadm getmodinfo
Affichage des journaux d'événements
Les pages Journal du matériel et Journal CMC affichent les événements
critiques pour le système qui surviennent sur le système géré.
Affichage du journal du matériel
CMC génère un journal du matériel pour les événements qui surviennent sur
le châssis. Vous pouvez afficher le journal du matériel à l'aide de l'interface
Web et de la RACADM distante.
REMARQUE : vous devez disposer du privilège Administrateur d'effacement des
journaux pour effacer le journal du matériel.
REMARQUE : vous pouvez configurer CMC de manière à envoyer des e-mails ou
des interruptions SNMP lorsque des événements spécifiques se produisent. Pour
des informations sur la configuration CMC concernant l'envoi des alertes, voir
« Configuration des alertes SNMP », à la page 438 et « Configuration des alertes par
messagerie », à la page 445.Dépannage et récupération 461
Exemples d'entrées du journal du matériel
critical System Software event: redundancy lost
Wed May 09 15:26:28 2007 normal System Software
event: log cleared was asserted
Wed May 09 16:06:00 2007 warning System Software
event: predictive failure was asserted
Wed May 09 15:26:31 2007 critical System Software
event: log full was asserted
Wed May 09 15:47:23 2007 unknown System Software
event: unknown event
Utilisation de l'interface Web
Vous pouvez afficher le journal du matériel, l'enregistrer dans un fichier texte
et l'effacer via l'interface Web CMC.
La Figure 12-9 décrit les informations fournies sur la page Journal du matériel
de l'interface Web CMC.
Pour afficher le journal du matériel :
1 Ouvrez une session sur l'interface Web de CMC.
2 Sélectionnez Châssis dans l'arborescence.
3 Cliquez sur l'onglet Journaux.
4 Cliquez sur le sous-onglet Journal du matériel. La page Journal du
matériel s'affiche.
Pour enregistrer une copie du journal du matériel sur votre station de gestion
ou sur le réseau :
1 Cliquez sur Enregistrer le journal.
Une boîte de dialogue s'ouvre.
2 Sélectionnez un emplacement pour un fichier texte du journal.
REMARQUE : les images graphiques utilisées pour indiquer la gravité dans
l'interface utilisateur n'apparaissent pas dans le journal car ce dernier est
enregistré en tant que fichier texte. Dans ce fichier texte, la gravité est indiquée par
les termes OK, Informatif, Inconnu, Avertissement et Grave. Les entrées de date et
d'heure apparaissent dans l'ordre ascendant. Si apparaît
dans la colonne Date et heure, cela signifie que l'événement s'est produit à l'arrêt
ou au démarrage de l'un des modules, lorsqu'aucune date ou heure n'est disponible.462 Dépannage et récupération
Pour effacer le journal de matériel, cliquez sur Effacer le journal.
REMARQUE : CMC crée une nouvelle entrée du journal qui indique que celui-ci a
été effacé.
Utilisation de la RACADM
Pour afficher le journal du matériel à l'aide de RACADM :
1 Ouvrez une console série/Telnet/SSH d'accès à CMC, puis ouvrez une session.
2 Pour afficher le journal du matériel, entrez :
racadm getsel
Pour effacer le journal du matériel, entrez :
racadm clrsel
Tableau 12-9. Informations du journal du matériel
Élément Description
Gravité OK Indique un événement normal qui ne nécessite
pas d'actions correctives.
Informatif Indique une entrée informative relative à un
événement pour lequel la condition Gravité n'a
pas été modifiée.
Inconnu Indique un événement non critique pour
lequel des actions correctives doivent être
effectuées rapidement pour éviter les
pannes système.
Avertissement Indique un événement critique nécessitant des
actions correctives immédiates pour éviter les
pannes système.
Grave Indique un événement critique nécessitant des
mesures correctives immédiates pour éviter les
pannes système.
Date/Heure Indique la date et l'heure exactes auxquelles l'événement s'est
produit (par exemple, en anglais Wed May 02 16:26:55 2007). Si les
champs de la date et de l'heure sont vides, cela signifie que
l'événement s'est produit au démarrage du système.
Description Fournit une brève description, générée par CMC, de l'événement
(par exemple, Redundancy lost, Server inserted). Dépannage et récupération 463
Affichage du journal CMC
CMC génère un journal des événements liés au châssis.
REMARQUE : vous devez disposer du privilège Administrateur d'effacement des
journaux pour effacer le journal du matériel.
Utilisation de l'interface Web
Vous pouvez afficher le journal CMC, l'enregistrer dans un fichier texte et
l'effacer via l'interface Web CMC.
Le journal peut être à nouveau trié par source, date et heure ou description en
cliquant sur l'en-tête de colonne correspondant. Pour inverser le tri, il vous
suffit de cliquer de nouveau sur les en-têtes de colonne.
La Figure 12-10 décrit les informations de la page Journal CMC de l'interface
Web CMC.
Pour afficher le journal CMC :
1 Ouvrez une session sur l'interface Web de CMC.
2 Sélectionnez Châssis dans l'arborescence.
3 Cliquez sur l'onglet Journaux.
4 Cliquez sur le sous-onglet Journal CMC. La page Journal CMC s'affiche.
5 Cliquez sur Enregistrer le journal pour enregistrer une copie du journal
CMC sur votre station de gestion ou sur le réseau.
La boîte de dialogue s'ouvre. Choisissez l'emplacement d'enregistrement
du fichier texte du journal.
Tableau 12-10. Informations du journal CMC
Commande Résultat
Source Indique l'interface (par exemple CMC) ayant provoqué
l'événement.
Date/Heure Indique la date et l'heure exactes auxquelles l'événement s'est
produit (par exemple, en anglais Wed May 02 16:26:55 2007).
Description Fournit une brève description de l'action, telle qu'une ouverture ou
fermeture de session, un échec d'ouverture de session ou
l'effacement des journaux. Les descriptions sont générées par CMC.464 Dépannage et récupération
Utilisation de la RACADM
Pour afficher les informations du journal CMC à l'aide de RACADM :
1 Ouvrez une console série/Telnet/SSH d'accès à CMC, puis ouvrez
une session.
2 Pour afficher le journal du matériel, entrez :
racadm getraclog
Pour effacer le journal du matériel, entrez :
racadm clrraclog
Utilisation de la console de diagnostic
La page Console de diagnostic permet à un utilisateur avancé ou à un
utilisateur sous la supervision du support technique de diagnostiquer les
problèmes matériels du châssis à l'aide de commandes CLI.
REMARQUE : vous devez disposer du privilège Administrateur de commandes de
débogage pour modifier ces paramètres.
Pour accéder à la page Console de diagnostic :
1 Ouvrez une session sur l'interface Web de CMC.
2 Sélectionnez Châssis dans l'arborescence.
3 Cliquez sur l'onglet Dépannage.
4 Cliquez sur le sous-onglet Diagnostic. La page Console de
diagnostic s'affiche.
Pour exécuter une commande CLI de diagnostic, entrez la commande dans
le champ Saisir une commande RACADM, puis cliquez sur Envoyer
pour exécuter la commande de diagnostic. La page Résultats des
diagnostics apparaît.
Pour retourner à la page Console de diagnostic, cliquez sur Retour à la page
Console de diagnostic ou sur Actualiser. Dépannage et récupération 465
La console de diagnostic prend en charge les commandes répertoriées dans la
Figure 12-11 ainsi que les commandes RACADM.
Réinitialisation des composants
La page Réinitialiser les composants permet aux utilisateurs de réinitialiser le
contrôleur CMC actif, ou de réattribuer virtuellement un siège aux serveurs,
les obligeant ainsi à se comporter comme s'ils avaient été retirés et réinsérés.
Si le châssis intègre un contrôleur CMC de secours, la réinitialisation de
CMC actif entraîne un basculement et le contrôleur CMC de secours devient
alors actif.
REMARQUE : pour réinitialiser les composants, vous devez disposer du privilège
Administrateur de commandes de débogage.
Tableau 12-11. Commandes de diagnostic prises en charge
Commande Résultat
arp Affiche le contenu de la table du protocole de résolution
d'adresses (ARP). Les entrées ARP ne peuvent être ni ajoutées,
ni supprimées.
ifconfig Affiche le contenu de la table d'interface réseau.
netstat Imprime le contenu du tableau de routage.
ping Vérifie que l' de destination est accessible à
partir de CMC avec le contenu actuel du tableau de routage.
Vous devez saisir une adresse IP de destination dans le champ
situé à droite de cette option. Un paquet d'écho du protocole
de contrôle des messages sur Internet (ICMP) est envoyé à
l'adresse IP de destination en fonction du contenu actuel de la
table de routage.
gettracelog Affiche le journal de suivi (cette opération peut prendre
quelques secondes). La commande gettracelog -i renvoie le
nombre d'enregistrements figurant dans le journal de suivi.
REMARQUE : pour des informations supplémentaires sur la
commande gettracelog, voir la section de la commande
gettracelog dans le RACADM Command Line Reference Guide
for iDRAC6 and CMC (Guide de référence de ligne de commande
RACADM pour iDRAC6 et CMC).466 Dépannage et récupération
Pour accéder à la page Console de diagnostic :
1 Ouvrez une session sur l'interface Web de CMC.
2 Sélectionnez Châssis dans l'arborescence.
3 Cliquez sur l'onglet Dépannage.
4 Cliquez sur le sous-onglet Réinitialiser les composants. La page
Réinitialiser les composants s'affiche. La section Résumé CMC de la page
Réinitialiser les composants affiche les informations suivantes :
Tableau 12-12. Résumé CMC
Attribut Description
Intégrité OK CMC est présent et communique avec ses
composants.
Informatif Affiche des informations sur CMC en
l'absence de modification de la condition de
l'intégrité (OK, Avertissement, Grave).
Avertissement Des alertes d'avertissement ont été émises et
des actions correctives doivent être effectuées.
Si aucune action corrective n'est effectuée,
des pannes critiques ou graves susceptibles
d'affecter l'intégrité de CMC peuvent
se produire.
Grave Au moins une alerte de panne a été générée.
L'état grave représente une panne système de
CMC et une action corrective doit être
effectuée immédiatement.
Date/Heure Affiche la date et l'heure de CMC au format
MM/JJ/AAAA, où MM correspond au mois, JJ à
la date et AAAA à l'année.
Emplacement
du logement du
contrôleur
CMC actif
Affiche le logement sur le contrôleur
CMC actif.
Mode de
redondance
Affiche Redondant si un contrôleur CMC de secours est présent
dans le châssis, et Sans de redondance si aucun contrôleur CMC de
secours n'est présent dans le châssis.Dépannage et récupération 467
5 La section Réattribuer virtuellement un siège aux serveurs de la page
Réinitialiser les composants affiche les informations suivantes :
Tableau 12-13. Réattribuer virtuellement un siège aux serveurs
Attribut Description
Logement Indique le logement occupé par le serveur du châssis. Les noms de
logement sont des ID séquentiels, allant de 1 à 16, permettant
d'identifier l'emplacement du serveur au sein du châssis.
Name (Nom) Affiche le nom du serveur dans chaque logement.
Présentation Indique si le serveur est présent dans le logement (Oui ou Non).
Intégrité OK Le serveur est présent et communique avec
CMC. En cas de perte de la communication
entre CMC et le serveur, CMC ne pourra pas
obtenir ni afficher la condition d'intégrité
du serveur.
Informatif Affiche des informations sur le serveur en
l'absence de modification de l'état de
l'intégrité (OK, Avertissement, Grave).
Avertissement Des alertes d'avertissement ont été émises et
des actions correctives doivent être
effectuées. Si aucune action corrective n'est
effectuée, des pannes critiques ou graves
susceptibles d'affecter l'intégrité du serveur
peuvent se produire.
Grave Au moins une alerte de panne a été générée.
L'état grave représente une panne système de
CMC et une action corrective doit être
effectuée immédiatement.468 Dépannage et récupération
Condition
iDRAC
Affiche la condition du contrôleur de gestion intégré iDRAC
du serveur :
• S/o (-) : le serveur n'est pas présent ou le châssis n'est pas sous
tension.
• Prêt : l'iDRAC est prêt et fonctionne normalement.
• Corrompu : le micrologiciel iDRAC est corrompu. Utilisez
l'utilitaire de mise à jour du micrologiciel iDRAC pour réparer
le micrologiciel.
• Échec : impossible de communiquer avec iDRAC. Cochez la case
Réattribuer virtuellement un siège pour supprimer l'erreur. Si cette
opération échoue, retirez et replacez manuellement le serveur pour
supprimer l'erreur.
• Mise à jour du micrologiciel : la mise à jour du micrologiciel
iDRAC est en cours ; attendez que la mise à jour se termine avant
de tenter une action quelconque.
• Initialisation : la réinitialisation iDRAC est en cours ; attendez
que la mise sous tension du contrôleur se termine avant de tenter
une action quelconque.
État de
l'alimentation
Affiche l'état de de l'alimentation du serveur :
• N/A (-): CMC n'a pas déterminé l'état d'alimentation du serveur.
• Désactivé : le serveur ou le châssis est hors tension.
• Activé : le châssis et le serveur sont sous tension.
• Activation : état temporaire entre le mode Désactivé et Activé.
Lorsque le cycle d'activation est terminé, l'état d'alimentation
passe en mode Activé.
• Mise hors tension : état temporaire entre le mode Activé et
Désactivé. Lorsque le cycle de désactivation est terminé, l'état
d'alimentation passe en mode Désactivé.
Réattribuer
virtuellement
un siège
Cochez la case pour réattribuer virtuellement un siège à ce serveur.
Tableau 12-13. Réattribuer virtuellement un siège aux serveurs (suite)
Attribut DescriptionDépannage et récupération 469
6 Pour réattribuer virtuellement un siège à un serveur, cochez la case des
serveurs dont le siège sera réattribué, puis sélectionnez Appliquer les
sélections. Cette opération oblige les serveurs à se comporter comme s'ils
avaient été retirés et réinsérés.
7 Sélectionnez Réinitialiser/Basculer CMC pour entraîner la réinitialisation
de CMC actif. Si un contrôleur CMC de secours est présent et qu'un
châssis est pleinement redondant, un basculement se produit, amenant le
contrôleur CMC de secours à devenir actif.
Résolution des erreurs de protocole de temps du
réseau (NTP)
Après avoir configuré CMC afin qu'il synchronise son horloge avec un serveur
de temps distant sur le réseau, un délai de 2 à 3 minutes peut s'écouler avant
qu'une modification de la date et de l'heure se produise. Si aucun
changement n'a eu lieu une fois ce délai écoulé, il peut être nécessaire de
procéder à un dépannage d'un problème. CMC peut ne pas être en mesure de
synchroniser son horloge pour plusieurs raisons :
• Un problème lié aux paramètres du serveur NTP 1, du serveur NTP 2 et du
serveur NTP 3 a pu se produire.
• Un nom d'hôte ou une adresse IP non valide a pu être entré par erreur.
• Un problème de connectivité réseau empêchant CMC de communiquer
avec l'un des serveurs NTP configurés a pu se produire.
• Un problème de DNS empêchant la résolution de l'un des noms d'hôte de
serveur NTP a pu se produire.
CMC fournit des outils de dépannage de ces problèmes ; la principale source
d'informations de dépannage étant le journal de suivi CMC. Ce journal
contient un message d'erreur concernant les pannes liées à NTP. Si le CMC
n'est pas en mesure d'effectuer la synchronisation avec l'un des serveurs NTP
distants ayant été configurés, il dérive alors sa synchronisation de l'horloge
système local.
Si le CMC est synchronisé sur l'horloge système local plutôt que sur un serveur
de temps distant, le journal de suivi contient une entrée similaire à la suivante :
Jan 8 20:02:40 cmc ntpd[1423]: synchronized to
LOCAL(0), stratum 10470 Dépannage et récupération
Vous pouvez également vérifier l'état ntpd en tapant la commande
RACADM suivante :
racadm getractime –n
Si aucun « * » n'est affiché par rapport à l'un des serveurs configurés, il est
possible qu'un élément ne soit pas configuré correctement. La sortie de la
commande ci-dessus contient également des statistiques NTP détaillées qui
peuvent faciliter le débogage du problème de non-synchronisation du serveur.
Si vous tentez de configurer un serveur NTP basé sur Windows, il peut s'avérer
utile d'augmenter le paramètre MaxDist pour ntpd. Avant de modifier ce
paramètre, il convient de bien lire et comprendre toutes les implications que
cela comporte, tout particulièrement car le paramètre par défaut doit être
suffisamment élevé pour pouvoir être accepté par la majorité des serveurs NTP.
Pour modifier le type de paramètre, entrez la commande suivante :
racadm config –g cfgRemoteHosts –o cfgRhostsNtpMaxDist 32
Après avoir effectué la modification, redémarrez ntpd en désactivant NTP, en
attendant entre 5 et 10 secondes, puis en réactivant NTP.
REMARQUE : NTP peut avoir besoin de 3 minutes de plus pour se synchroniser.
Pour désactiver NTP, entrez :
racadm config –g cfgRemoteHosts –o cfgRhostsNtpEnable 0
Pour activer NTP, entrez :
racadm config –g cfgRemoteHosts –o cfgRhostsNtpEnable 1
Si les serveurs NTP sont correctement configurés et que cette entrée est
présente dans le journal de suivi, cela confirme que le CMC est incapable de
se synchroniser avec l'un des serveurs NTP configurés.
D'autres entrées du journal de suivi liées à NTP peuvent vous aider à effectuer
le dépannage. S'il s'agit d'un problème de configuration incorrecte de l'adresse
IP du serveur NTP, une entrée similaire à la suivante risque de s'afficher :
Jan 8 19:59:24 cmc ntpd[1423]: Cannot find existing
interface for address 1.2.3.4 Jan 8 19:59:24 cmc
ntpd[1423]: configuration of 1.2.3.4 failed Dépannage et récupération 471
Si un paramètre de serveur NTP a été configuré avec un nom d'hôte non
valide, l'entrée du journal de suivi suivante risque de s'afficher :
Aug 21 14:34:27 cmc ntpd_initres[1298]: host name not
found: blabla Aug 21 14:34:27 cmc ntpd_initres[1298]:
couldn't resolve `blabla', giving up on it
Voir « Utilisation de la console de diagnostic », à la page 464 pour des
informations sur la saisie de la commande gettracelog pour passer en
revue le journal de suivi à l'aide de l'interface utilisateur CMC.
Interprétation des couleurs des LED et séquences
de clignotement
Les LED du châssis fournissent des informations selon leur couleur et leur
clignotement ou absence de clignotement :
• Une LED verte fixe indique que le composant est sous tension. Une LED
verte clignotante indique un événement critique mais de routine,
comme par exemple le téléversement du micrologiciel, au cours duquel
l'unité est indisponible. Cela n'indique pas une panne.
• Une LED orange clignotant sur un module indique une panne de ce module.
• L'utilisateur peut configurer les LED bleues clignotantes et les utiliser
pour l'identification (voir « Configuration des LED pour l'identification
des composants du châssis », à la page 437).
Tableau 12-14. Couleurs des LED et séquences de clignotement
Composant Couleur de la LED, séquence
de clignotement
Signification
CMC Vert, continu Sous tension
Vert, clignotant Micrologiciel en cours de téléversement
Vert, foncé Hors tension
Bleu, continu Actif
Bleu, clignotant Identificateur d'un module activé
par l'utilisateur
Orange, continu Inutilisé
Orange, clignotant Panne
Bleu, foncé Mode Veille472 Dépannage et récupération
iKVM Vert, continu Sous tension
Vert, clignotant Micrologiciel en cours de
téléversement
Vert, foncé Hors tension
Orange, continu Inutilisé
Orange, clignotant Panne
Orange, foncé Pas de panne
Server (Serveur) Vert, continu Sous tension
Vert, clignotant Micrologiciel en cours
de téléversement
Vert, foncé Hors tension
Bleu, continu Normal
Bleu, clignotant Identificateur d'un module activé par
l'utilisateur
Orange, continu Inutilisé
Orange, clignotant Panne
Bleu, foncé Pas de panne
Module d'E/S
(courant)
Vert, continu Sous tension
Vert, clignotant Micrologiciel en cours de
téléversement
Vert, foncé Hors tension
Bleu, continu Normal/maître de la pile
Bleu, clignotant Identificateur d'un module activé par
l'utilisateur
Orange, continu Inutilisé
Orange, clignotant Panne
Bleu, foncé Pas de panne/esclave de la pile
Tableau 12-14. Couleurs des LED et séquences de clignotement (suite)
Composant Couleur de la LED, séquence
de clignotement
SignificationDépannage et récupération 473
Module d'E/S
(transfert)
Vert, continu Sous tension
Vert, clignotant Inutilisé
Vert, foncé Hors tension
Bleu, continu Normal
Bleu, clignotant Identificateur d'un module activé par
l'utilisateur
Orange, continu Inutilisé
Orange, clignotant Panne
Bleu, foncé Pas de panne
Ventilateur Vert, continu Ventilateur en marche
Vert, clignotant Inutilisé
Vert, foncé Hors tension
Orange, continu Type de ventilateur non reconnu,
mettre à jour le micrologiciel CMC
Orange, clignotant Défaillance du ventilateur ;
tachymètre hors de portée
Orange, foncé Inutilisé
Bloc
d'alimentation
(Ovale) Vert, continu Alimentation en courant
alternatif OK
(Ovale) Vert, clignotant Inutilisé
(Ovale) Vert, foncé Alimentation en courant alternatif
défaillante
Orange, continu Inutilisé
Orange, clignotant Panne
Orange, foncé Pas de panne
(Cercle) Vert, continu Alimentation en courant continu OK
(Cercle) Vert, foncé Alimentation en courant continu
défaillante
Tableau 12-14. Couleurs des LED et séquences de clignotement (suite)
Composant Couleur de la LED, séquence
de clignotement
Signification474 Dépannage et récupération
Dépannage d'un contrôleur CMC qui ne répond pas
REMARQUE : il est impossible de se connecter sur le contrôleur CMC de secours
à l'aide d'une console série.
Si vous ne pouvez pas ouvrir une session sur CMC via l'une des interfaces
(interface Web, Telnet, SSH, RACADM distante ou série), vous pouvez
vérifier la fonctionnalité CMC en observant les LED de CMC, en obtenant
les informations de récupération via le port série DB-9 ou en récupérant
l'image du micrologiciel CMC.
Observation des LED afin d'isoler le problème
Lorsque vous faites face à CMC tel qu'il est installé dans le châssis, vous
voyez deux LED du côté gauche de la carte.
LED du haut : la LED verte supérieure indique l'état de l'alimentation.
Si celle-ci n'est PAS allumée :
1 Vérifiez qu'une alimentation secteur est présente sur au moins l'un des
blocs d'alimentation.
2 Vérifiez que la carte CMC est correctement insérée. Vous pouvez tirer sur
la poignée d'éjection, retirer la carte CMC et la réinstaller en vous assurant
qu'elle est insérée complètement et que le loquet se ferme correctement.
LED du bas : la LED inférieure est multicolore. Lorsque le contrôleur CMC
est actif et en cours de fonctionnement, et lorsqu'il n'y a pas de problème, la
LED inférieure est bleue. Si elle est orange, une panne a été détectée. Cette
panne peut avoir été causée par l'un des trois événements suivants :
• une panne du noyau. Dans ce cas, la carte CMC doit être remplacée.
• un échec de l'auto-test. Dans ce cas, la carte CMC doit être remplacée.
• une corruption de l'image. Dans ce cas, vous pouvez récupérer la carte
CMC en téléversant l'image du micrologiciel CMC.
REMARQUE : plus d'une minute est nécessaire pour amorcer/réinitialiser
normalement CMC sur le système d'exploitation concerné avant de pouvoir ouvrir
une session. La LED bleue est activée sur le CMC actif. Dans une configuration
redondante comprenant deux CMC, seule la LED supérieure verte est activée sur le
contrôleur CMC de secours.Dépannage et récupération 475
Obtention des informations de récupération à partir du port série DB-9
Lorsque la LED inférieure est orange, les informations de récupération
doivent être disponibles via le port série DB-9 situé à l'avant de CMC.
Pour obtenir les informations de récupération :
1 Installez un câble de modem NULL entre CMC et un ordinateur client.
2 Ouvrez le logiciel d'émulation de terminal de votre choix (comme par
exemple HyperTerminal ou Minicom). Configurez les paramètres suivants :
8 bits, aucune parité, aucun contrôle du débit, débit en bauds 115 200.
Un échec de la mémoire du noyau affichera un message d'erreur toutes les
cinq secondes.
3 Appuyez sur . Si une invite de récupération s'affiche, des
informations supplémentaires sont disponibles. L'invite indique le numéro
d'emplacement CMC et le type de panne.
Pour afficher la cause de la panne ainsi que la syntaxe de quelques
commandes, entrez
recover
puis appuyez sur . Exemples d'invites :
recover1[self test] CMC 1 self test failure
recover2[Bad FW images] CMC2 has corrupted images
• Si l'invite indique un échec de l'auto-test, il n'y a pas de composant
réparable sur CMC. CMC est défectueux et doit être renvoyé à Dell.
• Si l'invite indique Bad FW Images (Images FW incorrectes), suivez
les étapes fournies dans « Récupération de l'image du micrologiciel », à
la page 475 pour résoudre le problème.
Récupération de l'image du micrologiciel
CMC entre en mode de récupération lorsqu'un démarrage normal du système
d'exploitation CMC n'est pas possible. En mode de récupération, le sousensemble réduit de commandes disponible vous permet de reprogrammer les
périphériques Flash en téléversant le fichier de mise à jour du micrologiciel,
firmimg.cmc. Il s'agit du même fichier image de micrologiciel que celui
utilisé pour les mises à jour normales du micrologiciel. La procédure de
récupération affiche les opérations en cours et redémarre le système
d'exploitation de CMC lorsqu'elle a terminé.476 Dépannage et récupération
Lorsque vous entrez la commande recover et que vous appuyez ensuite
sur à l'invite de récupération, la cause de la récupération et les
sous-commandes disponibles s'affichent. Voici un exemple de séquence
de récupération :
recover getniccfg
recover setniccfg 192.168.0.120 255.255.255.0
192.168.0.1
recover ping 192.168.0.100
recover fwupdate -g -a 192.168.0.100
REMARQUE : connectez le câble réseau au port RJ45 situé le plus à gauche
REMARQUE : en mode récupération, vous ne pouvez pas utiliser normalement la
commande ping sur CMC car aucune pile réseau n'est active. La commande de
recover ping vous permet d'utiliser la commande ping sur le
serveur TFTP afin de vérifier la connexion au réseau local. Sur certains systèmes,
vous devrez utiliser la commande recover reset après la commande setniccfg.
Dépannage des problèmes de réseau
Le journal de suivi CMC interne vous permet de déboguer les problèmes
d'alerte et de réseau CMC. Vous pouvez accéder au journal de suivi via
l'interface Web CMC (voir « Utilisation de la console de diagnostic ») ou la
RACADM (voir « Utilisation de l'interface de ligne de commande
RACADM » et la section relative à la commande gettracelog du RACADM
Command Line Reference Guide for iDRAC6 and CMC (Guide de référence
de la ligne de commande RACADM pour iDRAC et CMC).
Le journal de suivi enregistre les informations suivantes :
• DHCP : effectue le suivi des paquets envoyés à un serveur DHCP et reçus
de celui-ci.
• DDNS : effectue le suivi des requêtes et des réponses de mise à jour
du DNS.
• Modifications de configuration apportées aux interfaces réseau.
Le journal de suivi peut en outre contenir des codes d'erreur spécifiques au
micrologiciel CMC (micrologiciel CMC interne) et non pas au système
d'exploitation du système géré.Dépannage et récupération 477
Réinitialisation de mot de passe
administrateur oublié
PRÉCAUTION : la plupart des réparations ne peuvent être effectuées que par un
technicien de maintenance agréé. N'effectuez que les opérations de dépannage et
les petites réparations autorisées par la documentation de votre produit et suivez
les instructions fournies en ligne ou par téléphone par l'équipe d'entretien et
d'assistance technique. Tout dommage causé par une réparation non autorisée par
Dell est exclu de votre garantie. Consultez et respectez les consignes de sécurité
fournies avec votre produit.
Un utilisateur doit disposer de privilèges Administrateur pour réaliser des
opérations de gestion. Le logiciel CMC possède une fonctionnalité de
protection du mot de passe de compte utilisateur qui peut être désactivée en
cas d'oubli du mot de passe du compte administrateur. En cas d'oubli du mot
de passe du compte administrateur, ce dernier peut être récupéré via le
cavalier PASSWORD_RSET sur la carte CMC.
La carte CMC possède un connecteur de réinitialisation du mot de passe à
deux fiches comme décrit dans laFigure 12-1. Si un cavalier est installé dans
le connecteur de réinitialisation, le mot de passe et le compte
d'administrateur par défaut sont activés et définis sur les valeurs par défaut
suivantes : nom d'utilisateur : root et mot de passe : calvin. Le compte
d'administrateur est réinitialisé sans tenir compte de la suppression du
compte ou de la modification du mot de passe.
REMARQUE : assurez-vous que le module CMC est en mode passif avant
de démarrer.
Un utilisateur doit disposer de privilèges Administrateur pour réaliser des
opérations de gestion. En cas d'oubli du mot de passe du compte
administrateur, ce dernier peut être récupéré via le cavalier
PASSWORD_RSET sur la carte CMC.
Le cavalier PASSWORD_RST utilise un connecteur à deux broches comme
indiqué dans la Figure 12-1.
Pendant que le cavalier PASSWORD_RST est installé, le compte
d'administrateur et le mot de passe par défaut sont activés et définis sur les
valeurs par défaut suivantes :
username: root
password: calvin478 Dépannage et récupération
Le compte administrateur est temporairement réinitialisé, même si le compte
d'administrateur a été supprimé ou si le mot de passe a été changé.
REMARQUE : lorsque le cavalier PASSWORD_RST est installé, une configuration
console en série par défaut est utilisée (plutôt que les valeurs de propriété de
configuration), comme suit :
cfgSerialBaudRate=115200
cfgSerialConsoleEnable=1
cfgSerialConsoleQuitKey=^\
cfgSerialConsoleIdleTimeout=0
cfgSerialConsoleNoAuth=0
cfgSerialConsoleCommand=""
cfgSerialConsoleColumns=0
1 Appuyez sur le loquet de blocage de CMC situé sur la poignée et faites
pivoter la poignée à l'opposé du panneau avant du module. Faites glisser le
module CMC hors de l'enceinte.
REMARQUE : les décharges électrostatiques peuvent affecter le CMC. Dans
certaines conditions, les décharges électrostatiques peuvent s'accumuler dans
votre organisme ou dans un objet, puis être transmises à un autre objet, comme
votre CMC. Pour éviter les dommages liés aux décharges électrostatiques, vous
devez veiller à décharger l'électricité statique de votre corps lors de la
manipulation et de l'accès au CMC en dehors du châssis.
2 Retirez la fiche de cavalier du connecteur de réinitialisation du mot de
passe, puis insérez la fiche à deux broches afin d'activer le compte
Administrateur par défaut. Pour identifier l'emplacement du cavalier de
mot de passe sur la carte CMC, voir Figure 12-1.Dépannage et récupération 479
Figure 12-1. Emplacement du cavalier de réinitialisation du mot de passe
3 Faites glisser le module CMC dans l'enceinte. Rebranchez les câbles qui
ont été débranchés.
REMARQUE : veillez à ce que le module CMC devienne le module actif et le
reste jusqu'à ce que les étapes restantes soient terminées.
Tableau 12-15. Paramètres du cavalier de mot de passe CMC
PASSWORD_RSET (par défaut) La fonction de réinitialisation du mot
de passe est désactivée.
La fonction de réinitialisation du mot
de passe est activée.
PASSWORD_RSET480 Dépannage et récupération
4 Si le module CMC branché par cavaliers est le seul module CMC, il vous
suffit d'attendre qu'il ait fini de redémarrer. En cas de présence de CMC
redondants dans votre châssis, effectuez un changement pour rendre actif
le module CMC branché par cavaliers. Sur l'interface utilisateur :
a Naviguez jusqu'à la page du Châssis, cliquez sur l'onglet
Alimentation→ sous-onglet Contrôle.
b Sélectionnez Réinitialiser CMC (redémarrage à chaud), puis cliquez
sur Appliquer.
Le CMC bascule automatiquement sur le module redondant qui devient
maintenant actif.
5 Connectez-vous au CMC actif à l'aide du nom d'utilisateur Administrateur
par défaut (root) et du mot de passe (calvin), puis restaurez (le cas
échéant) les paramètres de compte utilisateur. Les comptes et les mots de
passe existants ne sont pas désactivés et restent actifs.
6 Effectuez toutes les actions de gestion nécessaires, y compris la création
d'un nouveau mot de passe administrateur à la place de celui oublié.
7 Retirez le cavalier PASSWORD_RST à 2 broches, puis replacez la fiche
de cavalier.
a Appuyez sur le loquet de blocage de CMC situé sur la poignée et faites
pivoter la poignée à l'opposé du panneau avant du module. Faites
glisser le module CMC hors de l'enceinte.
b Retirez la fiche de cavalier à 2 broches puis replacez la fiche de cavalier.
c Faites glisser le module CMC dans l'enceinte. Rebranchez les câbles
qui ont été débranchés. Répétez l'étape 4 pour faire du module CMC
non cavalier le CMC actif.Dépannage et récupération 481
Enregistrement et restauration des certificats et
paramètres de configuration du châssis.
Dans l'interface utilisateur CMC, naviguez sur Présentation du châssis→
Configuration→ Sauvegarde du châssis. L'écran Sauvegarde du châssis
s'affiche.
Pour enregistrer une sauvegarde de la configuration du châssis :
1 Sur l'écran Sauvegarde du châssis, cliquez sur Enregistrer.
2 Ignorez le chemin du fichier par défaut (facultatif), puis cliquez sur OK
pour enregistrer le fichier.
REMARQUE : le nom du fichier de sauvegarde par défaut contient le numéro
de service du châssis. Ce fichier de sauvegarde peut être utilisé ultérieurement,
pour restaurer les paramètres et les certificats de ce châssis uniquement.
Pour restaurer la configuration du châssis :
1 Sur l'écran Sauvegarde du châssis, cliquez sur Naviguer.
2 Entrez ou naviguez sur le fichier de sauvegarde, puis cliquez sur Ouvrir
pour le sélectionner.
3 Cliquez sur Restaurer.
REMARQUE : CMC ne se réinitialise pas à la restauration de la configuration,
cependant les services CMC peuvent prendre un certain temps pour imposer toute
modification/nouvelle configuration. Une fois la restauration de la configuration
réussie, toutes les sessions actuelles sont fermées.
Dépannage des alertes
Utilisez le journal CMC et le journal de suivi pour dépanner les alertes CMC.
Le succès ou l'échec de chaque tentative d'envoi d'e-mail et/ou interruption
SNMP est enregistré dans le journal CMC. Le journal de suivi contient des
informations complémentaires sur les erreurs spécifiques. Cependant, étant
donné que SNMP ne confirme pas la livraison des interruptions, utilisez un
analyseur réseau ou un outil tel que, snmputil de Microsoft pour effectuer le
suivi des paquets sur le système géré.
Vous pouvez configurer les alertes SNMP à l'aide de l'interface Web.
Pour plus d'informations, voir « Configuration des alertes SNMP ». 482 Dépannage et récupérationDiagnostics 483
Diagnostics
L'écran LCD vous permet de diagnostiquer des problèmes concernant un
serveur ou un module dans le châssis. En cas de problème ou de défaillance
avec le châssis ou un serveur ou un autre module dans le châssis, l'indicateur
d'état de l'écran LCD clignote en orange. Dans le menu principal, une icône
avec un arrière-plan orange s'affiche en regard de l'élément de menu (Serveur
ou Enceinte) qui permet d'accéder au serveur ou au module défectueux.
En suivant les icônes orange jusque dans le système de menus de l'écran
LCD, vous pouvez afficher l'écran d'état et les messages d'erreur concernant
l'élément présentant le problème.
Les messages d'erreur de l'écran LCD peuvent être supprimés en supprimant
le module ou le serveur au centre du problème. Dans le cas d'erreurs de
serveur, utilisez l'interface Web iDRAC ou l'interface de ligne de commande
pour effacer le journal SEL (System Event Log - Journal des événements
système) afin de supprimer les erreurs de serveur de l'écran LCD.
Utilisation de l'interface de l'écran LCD
Vous pouvez utiliser l'écran LCD pour procéder à la configuration et aux
diagnostics, et pour obtenir des informations sur la condition du châssis et
son contenu.
Navigation sur l'écran LCD
Utilisez les boutons à droite de l'écran LCD pour vous servir de l'écran LCD.
Les boutons flèches haut, bas, gauche et droite permettent de changer les
éléments de menu ou les icônes sélectionnés à l'écran. L'élément sélectionné
est indiqué avec un arrière-plan ou un bord bleu clair.
Le bouton central active l'élément sélectionné.
Lorsque les messages affichés sur l'écran LCD débordent de l'écran, utilisez
les boutons flèches gauche et droite pour faire défiler le texte vers la gauche et
vers la droite.484 Diagnostics
Les icônes décrites dans la Figure 13-1 permettent de naviguer entre les
écrans LCD :
Menu Main (Menu principal)
Vous pouvez naviguer vers l'un des écrans suivants depuis le menu principal :
• Menu Configuration de l'écran LCD : sélectionne la langue à utiliser et
l'écran LCD qui s'affiche lorsque personne n'utilise l'écran LCD.
• Serveur : affiche des informations sur la condition des serveurs.
• Enceinte : affiche des informations sur la condition du châssis.
1 Utilisez les boutons flèche haut et bas pour mettre un élément
en surbrillance.
2 Appuyez sur le bouton central pour activer votre sélection.
Tableau 13-1. Icônes de navigation de l'écran LCD
Icône
normale
Icône en
surbrillance
Nom et description de l'icône
Précédent. Mettez en surbrillance le bouton central et
appuyez dessus pour retourner à l'écran précédent.
Accepter/Oui. Mettez en surbrillance le bouton central et
appuyez dessus pour accepter une modification et revenir à
l'écran précédent.
Ignorer/Suivant. Mettez le bouton central en surbrillance et
appuyez dessus pour ignorer les modifications apportées et
accéder à l'écran suivant.
Non Mettez en surbrillance le bouton central et appuyez
dessus pour répondre « Non » à une question.
Pivoter. Mettez le bouton central en surbrillance et appuyez
dessus pour alterner entre les affichages graphiques avant et
arrière du châssis.
REMARQUE : l'arrière-plan orange indique que la vue
opposée comporte des erreurs.
Identification de composant Fait clignoter la LED bleue sur
un composant.
REMARQUE : un rectangle bleu clignotant entoure cette
icône lorsque l'Identification de composant est activée.Diagnostics 485
Menu de configuration de l'écran LCD
Le menu Configuration de l'écran LCD affiche un menu d'éléments pouvant
être configurés :
• Configuration de la langue : choisissez la langue que vous souhaitez
utiliser pour le texte et les messages de l'écran LCD.
• Écran par défaut : choisissez l'écran qui s'affiche en l'absence d'activité sur
l'écran LCD.
1 Utilisez les boutons flèche haut et bas pour mettre un élément en
surbrillance dans le menu ou mettez en surbrillance l'icône Précédent si
vous souhaitez retourner au menu principal.
2 Appuyez sur le bouton central pour activer votre sélection.
Écran de configuration de la langue
L'écran Configuration de la langue vous permet de sélectionner la langue
utilisée pour les messages de l'écran LCD. La langue active est mise en
surbrillance avec un arrière-plan bleu clair.
1 Utilisez les boutons flèche haut, bas, gauche et droite pour mettre la
langue souhaitée en surbrillance.
2 Appuyez sur le bouton central. L'icône Accepter apparaît en surbrillance.
3 Appuyez sur le bouton central pour confirmer la modification. Le menu
Configuration de l'écran LCD est affiché.
Écran par défaut
L'écran par défaut vous permet de changer l'écran affiché par l'écran LCD en
l'absence d'activité sur le panneau. L'écran par défaut est le Menu principal.
Vous pouvez choisir parmi les écrans suivants à afficher :
• Menu Main (Menu principal)
• Condition du serveur (affichage graphique avant du châssis)
• Condition du module (affichage graphique arrière du châssis)
• Personnalisé (logo Dell avec le nom du châssis)486 Diagnostics
L'écran par défaut actif est mis en surbrillance en bleu clair.
1 Utilisez les boutons flèche haut et bas pour mettre en surbrillance l'écran
que vous souhaitez définir comme écran par défaut.
2 Appuyez sur le bouton central. L'icône Accepter est mise en surbrillance.
3 Appuyez de nouveau sur le bouton central pour confirmer la modification.
L'écran par défaut s'affiche.
Écran Condition du serveur graphique
L'écran Condition du serveur graphique affiche des icônes pour chaque
serveur installé dans le châssis et indique la condition d'intégrité générale de
chaque serveur. L'intégrité du serveur est indiquée par la couleur de l'icône
du serveur :
• Gris : le serveur est hors tension sans erreurs
• Vert : le serveur est sous tension sans erreurs
• Jaune : le serveur a une ou plusieurs erreurs non critiques
• Rouge : le serveur présente une ou plusieurs erreurs critiques
• Noir : le serveur n'est pas présent
Un rectangle bleu clair clignotant autour d'une icône de serveur indique que
le serveur est mis en surbrillance.
Pour afficher l'écran Condition du module graphique :
1 Mettez en surbrillance l'icône Rotation.
2 Appuyez sur le bouton central.
Pour afficher l'écran de condition d'un serveur :
1 Utilisez les boutons flèche pour mettre en surbrillance le serveur souhaité.
2 Appuyez sur le bouton central. L'écran Condition du serveur s'affiche.
Pour retourner au menu principal :
1 Utilisez les boutons flèche pour mettre en surbrillance l'icône Précédent.
2 Appuyez sur le bouton central.Diagnostics 487
Écran Condition du module graphique
L'écran Condition du module graphique affiche tous les modules installés à
l'arrière du châssis et fournit des informations récapitulatives sur l'intégrité de
chaque module. L'intégrité du module est indiquée par la couleur de chaque
icône de module, comme suit :
• Gris : le module est hors tension ou sous tension en veille sans erreurs
• Vert : le module est sous tension sans erreurs
• Jaune : le module a une ou plusieurs erreurs non critiques
• Rouge : le serveur présente une ou plusieurs erreurs critiques
• Noir : le module n'est pas présent
Un rectangle bleu clair clignotant autour d'une icône de module indique que
le module est mis en surbrillance.
Pour afficher l'écran Condition du serveur graphique :
1 Mettez en surbrillance l'icône Rotation.
2 Appuyez sur le bouton central.
Pour afficher l'écran de condition d'un module :
1 Utilisez les boutons flèche haut, bas, gauche et droite pour mettre le
module souhaité en surbrillance.
2 Appuyez sur le bouton central. L'écran Condition du module s'affiche.
Pour retourner au menu principal :
1 Utilisez les boutons flèche pour mettre en surbrillance l'icône Précédent.
2 Appuyez sur le bouton central. Le Menu principal s'affiche.
Écran du menu Enceinte
Cet écran vous permet de naviguer vers les écrans suivants :
• Écran Condition du module
• Écran Condition de l'enceinte
• Écran Résumé IP
• Menu Main (Menu principal)
1 Utilisez les boutons de navigation pour mettre en surbrillance l'élément
souhaité. (Mettez en surbrillance l'icône Précédent pour retourner au
menu principal.)
2 Appuyez sur le bouton central. L'écran sélectionné apparaît.488 Diagnostics
Écran Condition du module
L'écran Condition du module affiche des informations et des messages
d'erreur sur un module. Pour les messages susceptibles de s'afficher sur cet
écran, voir « Informations sur la condition du serveur et du module de l'écran
LCD », à la page 501 et « Messages d'erreur de l'écran LCD », à la page 492.
Utilisez les touches fléchées haut et bas pour faire défiler les messages.
Utilisez les touches fléchées gauche et droite pour faire défiler les messages
qui débordent de l'écran.
Mettez en surbrillance l'icône Précédent et appuyez sur le bouton central
pour retourner à l'écran Condition du module graphique.
Écran Condition de l'enceinte
L'écran Condition de l'enceinte affiche des messages d'information et d'erreur
concernant l'enceinte Voir « Messages d'erreur de l'écran LCD », à la page 492
pour les messages qui peuvent s'afficher sur cet écran.
Utilisez les touches fléchées haut et bas pour faire défiler les messages.
Utilisez les touches fléchées gauche et droite pour faire défiler les messages
qui débordent de l'écran.
Mettez en surbrillance l'icône Précédent et appuyez sur le bouton central
pour retourner à l'écran Condition de l'enceinte.
Écran Résumé IP
L'écran Résumé IP affiche des informations IP pour les contrôleurs CMC et
iDRAC de chaque serveur installé.
Utilisez les boutons flèche haut et bas pour faire défiler la liste. Utilisez les
boutons flèche gauche et droite pour faire défiler les messages sélectionnés
qui débordent de l'écran.
Utilisez les boutons flèche haut et bas pour sélectionner l'icône Précédent et
appuyez sur le bouton central pour retourner au menu Enceinte. Diagnostics 489
Diagnostics
L'écran LCD vous permet de diagnostiquer des problèmes concernant un
serveur ou un module dans le châssis. En cas de problème ou de défaillance
avec le châssis ou un serveur ou un autre module dans le châssis, l'indicateur
d'état de l'écran LCD clignote en orange. Dans le Menu principal, une icône
clignotante avec un arrière-plan orange s'affiche en regard de l'élément
de menu (Serveur ou Enceinte) qui permet d'accéder au serveur ou au
module défectueux.
En suivant les icônes orange clignotantes dans le système de menus de l'écran
LCD, vous pouvez afficher l'écran Condition et les messages d'erreur
concernant l'élément présentant le problème.
Les messages d'erreur apparaissant sur l'écran LCD peuvent être supprimés
en supprimant le module ou le serveur à l'origine du problème ou en effaçant
le journal du matériel du module ou du serveur. En ce qui concerne les erreurs
liées au serveur, utilisez l'interface Web ou l'interface de ligne de commande
d'iDRAC pour effacer le journal des événements système (journal SEL) du
serveur. Quant aux erreurs concernant le châssis, utilisez l'interface Web ou
l'interface de ligne de commande de CMC pour effacer le journal du matériel.
Dépannage du matériel du LCD
Si vous rencontrez des problèmes avec l'écran LCD lors de votre utilisation de
CMC, suivez les éléments de dépannage matériel suivante pour déterminer
si le problème vient du matériel de l'écran LCD ou d'une connexion à
l'écran LCD.490 Diagnostics
Figure 13-1. Retrait et installation du module LCD
1 cache de protection des câbles 2 module LCD
3 câble ruban 4 charnières (2)
5 vis (2)
1
2
3
4
5Diagnostics 491
Tableau 13-2. Éléments de dépannage matériel LCD
Symptôme Problème Action de restauration
Message d'alerte de l'écran
CMC Not Responding
(CMC ne répond pas) et
la LED clignote orange
Perte de la
communication entre le
CMC et le panneau avant
LCD.
Vérifiez que le CMC
démarre, puis réinitialisez-le
à l'aide de l'interface
graphique ou des commandes
de l'utilitaire RACADM.
Message de l'écran d'alerte
CMC Not Responding
(CMC ne répond pas) et
la LED est orange fixe ou
est éteinte
Les communications du
module LCD sont
bloquées lors de
basculement du CMC ou
lors de redémarrages.
Consultez le journal du
matériel à l’aide de
l'interface graphique ou des
commandes de l'utilitaire
RACADM. Cherchez un
message indiquant : Can
not communicate with
LCD controller.
Réinstallez le câble ruban du
module LCD.
Le texte de l'écran LCD
est brouillé
Écran LCD défectueux Remplacez le module LCD.
Le LED et l'écran LCD
sont éteints.
Le câble LCD n'est pas
branché correctement
ou est défectueux ; ou
le module LCD est
défectueux.
Consultez le journal du
matériel à l’aide de
l'interface graphique ou des
commandes de l'utilitaire
RACADM. Recherchez des
messages du type :
• The LCD module cable
is not connected, or
is improperly
connected.
• The control panel
cable is not
connected, or is
improperly connected.
Réinstallez les câbles.
Message de l'écran LCD
CMC introuvable
Aucun CMC n'est présent
dans le châssis
Insérez un CMC dans le
châssis ou remplacez le
CMC existant s'il ne
fonctionne pas.492 Diagnostics
Messages du panneau avant de l'écran LCD
Cette section contient deux sous-sections qui répertorient les informations
sur les erreurs et les conditions qui apparaissent sur le panneau avant de
l'écran LCD.
Les messages d'erreur s'affichant sur l'écran LCD présentent un format
similaire à celui du journal des événements système (journal SEL) affiché sur
l'interface de ligne de commande ou l'interface Web.
Les tableaux présentés dans la section des erreurs répertorient les messages
d'erreur et d'avertissement qui apparaissent sur les divers écrans LCD et la
cause possible du message. Le texte figurant entre crochets fléchés (< >)
indique que le texte peut varier.
Les Informations sur la condition qui apparaissent sur l'écran LCD incluent
des informations descriptives sur les modules dans le châssis. Les tableaux
qui figurent dans cette section décrivent les informations affichées pour
chaque composant.
Messages d'erreur de l'écran LCD
Tableau 13-3. Écrans Condition de CMC
Gravité Message Cause
Critique La batterie CMC
a échoué.
La batterie CMOS de CMC est
manquante ou absence de tension.
Critique La pulsation LAN de CMC
a été perdue.
La connexion NIC de CMC a été
retirée ou n'est pas connectée.
Avertissement Détection d'une incompatibilité
micrologicielle ou logicielle entre
l'iDRAC du logement
et CMC.
Le micrologiciel entre les deux
périphériques ne correspond pas
pour prendre en charge une ou
plusieurs fonctionnalités.
Avertissement Détection d'une incompatibilité
micrologicielle ou logicielle entre
le BIOS du système du logement
et CMC.
Le micrologiciel entre les deux
périphériques ne correspond pas
pour prendre en charge une ou
plusieurs fonctionnalités.
Avertissement Détection d'une incompatibilité
micrologicielle ou logicielle entre
CMC 1 et CMC 2.
Le micrologiciel entre les deux
périphériques ne correspond pas
pour prendre en charge une ou
plusieurs fonctionnalités.Diagnostics 493
Tableau 13-4. Écran Condition de l'enceinte/du châssis
Gravité Message Cause
Critique Le ventilateur
est retiré.
Ce ventilateur est nécessaire
pour refroidir correctement
l'enceinte/le châssis.
Avertissement La redondance du bloc
d'alimentation est dégradée.
Une ou plusieurs unités
d'alimentation sont défaillantes
ou ont été retirées, et le système
ne peut plus prendre en charge
la redondance complète des
unités d'alimentation.
Critique La redondance du bloc
d'alimentation est perdue.
Une ou plusieurs unités
d'alimentation sont défaillantes ou
ont été retirées, et le système n'est
plus redondant.
Critique Les blocs d'alimentation ne sont
pas redondants. Les ressources
sont insuffisantes pour maintenir
un fonctionnement normal.
Une ou plusieurs unités
d'alimentation sont défaillantes ou
ont été retirées, et le système n'est
pas suffisamment alimenté pour
maintenir ses opérations normales.
Les serveurs pourraient se mettre
hors tension.
Avertissement La température ambiante du
panneau de configuration est
supérieure au seuil
d'avertissement maximal.
La température d'entrée du
châssis/enceinte a dépassé le
seuil d'avertissement.
Critique La température ambiante du
panneau de configuration est
supérieure au seuil
d'avertissement maximal.
La température d'entrée du
châssis/enceinte a dépassé le
seuil d'avertissement.
Critique La redondance CMC est perdue. CMC n'est plus redondant. Cela
se produit si le CMC en attente
est retiré.
Critique La journalisation de toutes les
erreurs est désactivée.
Le châssis/enceinte ne peut pas
journaliser tous les événements.
Ceci indique généralement que le
panneau de configuration ou le
câble de ce dernier a rencontré un
problème.494 Diagnostics
Avertissement Le journal est plein. Le châssis a détecté qu'une ou
plusieurs entrées uniquement
peuvent être ajoutées au journal
matériel CEL avant que celui-ci
soit plein.
Avertissement Le journal est presque plein. Le journal des événements du
châssis est plein à 75 %.
Tableau 13-5. Écrans Condition du ventilateur
Gravité Message Cause
Critique Les rotations par minute du
ventilateur sont en
dessous du seuil critique minimal.
La vitesse du ventilateur spécifié
ne suffit pas pour refroidir
suffisamment le système.
Critique Les rotations par minute du
ventilateur sont en
dessus du seuil critique minimal.
La vitesse du ventilateur spécifié
est trop haute. Ceci se produit
généralement suite à une pale de
ventilateur cassée.
Tableau 13-6. Écrans Condition du module d'E/S
Gravité Message Cause
Avertissement Détection d'une non
correspondance de structure dans
le module d'E/S .
La structure du module d'E/S ne
correspond pas à celle du serveur
ou du module d'E/S redondant.
Avertissement Détection d'un échec de réglage de
lien du module d'E/S .
Le module d'E/S n'a pas pu être
défini pour une utilisation
correcte du NIC sur un ou
plusieurs serveurs.
Critique Détection d'un échec dans le
module d'E/S .
Le module d'E/S est défaillant.
La même erreur peut également
se produire si le module d'E/S est
déclenché thermiquement.
Tableau 13-4. Écran Condition de l'enceinte/du châssis (suite)
Gravité Message CauseDiagnostics 495
Tableau 13-7. Écran Condition de l'IKVM
Gravité Message Cause
Avertissement La console n'est pas disponible
pour le KVM local.
Panne secondaire, par exemple
micrologiciel corrompu.
Critique Le KVM local ne peut pas
détecter d'hôtes.
Échec de l'énumération des hôtes
USB.
Critique OSCAR, l'affichage n'est pas
opérationnel pour le KVM local.
Échec de l'interface OSCAR.
Irrécupérable Le KMV local n'est pas
opérationnel et est mis
hors tension.
Échec RIP série ou échec de la
puce de l'hôte USB.
Tableau 13-8. Écrans Condition de l'unité d'alimentation
Gravité Message Cause
Critique Échec du bloc d'alimentation
.
L'unité d'alimentation est
défaillante.
Critique Perte de l'entrée d'alimentation du
bloc d'alimentation .
Perte de l'alimentation en CA -
secteur ou cordon en CA -
secteur débranché.
Avertissement Le bloc d'alimentation
fonctionne à 110 volts et pourrait
entraîner un court-circuit.
Le bloc d'alimentation est
branché sur un source de
110 volt.
Tableau 13-9. Écran Condition du serveur
Gravité Message Cause
Avertissement La température ambiante de la
carte système est inférieure au
seuil d'avertissement minimal.
La température du serveur
se rafraîchit.
Critique La température ambiante de la
carte système est inférieure au
seuil critique minimal.
La température du serveur baisse.496 Diagnostics
Avertissement La température ambiante de la
carte système est supérieure au
seuil d'avertissement maximal.
La température du serveur monte.
Critique La température ambiante de la
carte système est supérieure au
seuil critique maximal.
La température du serveur est
trop élevée.
Critique Le courant du verrou actuel de
la carte système dépasse la
plage autorisée.
Le courant a franchi un seuil de
dégradation.
Critique Échec de la batterie de la
carte système.
La batterie CMOS n'est pas
présente ou n'a pas de tension.
Avertissement Le niveau de charge de la batterie
de stockage est faible.
Le niveau de charge de la batterie
ROMB est faible.
Critique Échec de la batterie de stockage. La batterie CMOS n'est pas
présente ou n'a pas de tension.
Critique La tension de l'UC
dépasse la plage autorisée.
Critique La tension de la carte système
dépasse la plage autorisée.
Critique La tension de la carte
mezzanine dépasse la
plage autorisée.
Critique La tension du stockage dépasse la
plage autorisée.
Critique Erreur interne de l'UC
(IERR).
Panne de l'UC.
Critique Événement de déclenchement
thermique de l'UC
(surchauffe).
UC surchauffée.
Tableau 13-9. Écran Condition du serveur (suite)
Gravité Message CauseDiagnostics 497
Critique Configuration de l'UC
non prise en charge.
Type de processeur incorrect ou
dans un emplacement erroné.
Critique L'UC est absente. L'UC requise est manquante ou
est absente.
Critique Condition de la carte Mezz
B :
capteur de carte d'extension de la
carte Mezz B, l'erreur d'installation a
été confirmée.
Carte mezzanine incorrecte
installée pour la structure d'E/S
Critique Condition de la carte Mezz
C :
capteur de carte d'extension de la
carte Mezz C, l'erreur d'installation a
été confirmée.
Carte mezzanine incorrecte
installée pour la structure d'E/S
Critique Retrait du lecteur . Le lecteur de stockage a été retiré.
Critique Panne détectée dans le lecteur
.
Échec du lecteur de stockage.
Critique La tension à sécurité intégrée
de la carte système dépasse la
plage autorisée.
Cet événement est généré lorsque
les tensions de la carte système ne
sont pas aux niveaux normaux
Critique Le registre d'horloge de la
surveillance a expiré.
Le registre d'horloge de la
surveillance d'iDRAC expire et
aucune action n'est définie.
Critique Le registre d'horloge de la
surveillance a réinitialisé
le système.
La surveillance iDRAC a détecté
que le système est tombé en
panne (délai expiré car aucune
réponse n'a été reçue de l'hôte)
et que l'action est définie
sur redémarrage.
Tableau 13-9. Écran Condition du serveur (suite)
Gravité Message Cause498 Diagnostics
Critique Le registre d'horloge de la
surveillance a mis le système
hors tension.
La surveillance iDRAC a détecté
que le système est tombé en
panne (délai expiré car aucune
réponse n'a été reçue de l'hôte) et
que l'action est définie sur mise
hors tension.
Critique Le registre d'horloge de la
surveillance a exécuter un cycle
d'alimentation sur le système.
La surveillance iDRAC a détecté
que le système est tombé en
panne (délai expiré car aucune
réponse n'a été reçue de l'hôte)
et que l'action est définie sur
cycle d'alimentation.
Critique Le journal est plein. Le périphérique du journal SEL
détecte qu'une seule entrée peut
être ajoutée au journal SEL avant
qu'il ne soit plein.
Avertissement Détection d'erreurs de la mémoire
permanente corrigeable sur un
périphérique mémoire de
l'emplacement .
Avertissement Le taux d'erreur de la mémoire
permanente corrigeable a
augmenté pour un périphérique
mémoire de l'emplacement
.
Les erreurs corrigeables de l'ECC
atteignent un taux critique.
Critique Détection d'erreurs multi-bits sur
un périphérique mémoire de
l'emplacement .
Une erreur ECC non corrigeable
a été détectée.
Critique Détection d'une interruption non
masquable (NMI) lors d'une
vérification d'un canal d'E/S sur un
composant du périphérique
de fonction
du bus .
Une interruption critique est
générée dans le canal d'E/S.
Tableau 13-9. Écran Condition du serveur (suite)
Gravité Message CauseDiagnostics 499
Critique Détection d'une interruption
non masquable (NMI) lors
d'une vérification d'un canal
d'E/S sur un composant du
logement .
Une interruption critique est
générée dans le canal d'E/S.
Critique Détection d'une erreur de parité
PCI sur un composant du
périphérique de
fonction du bus
.
Une erreur de parité a été
détectée sur le bus PCI.
Critique Détection d'une erreur de parité
PCI sur un composant du
logement .
Une erreur de parité a été
détectée sur le bus PCI.
Critique Détection d'une erreur du système
PCI sur un composant du
périphérique de
fonction du bus
.
Erreur PCI détectée par
un périphérique.
Critique Détection d'une erreur du système
PCI sur un composant du
logement .
Erreur PCI détectée par
un périphérique.
Critique Désactivation de la journalisation
de la mémoire permanente
corrigeable pour un périphérique
mémoire de l'emplacement
.
La journalisation d'erreurs d'un
seul bit est désactivée lorsque
trop d'erreurs d'un seul bit (SBE)
sont journalisées pour un
périphérique mémoire.
Critique La journalisation de toutes les
erreurs est désactivée.
Irrécupérable Détection d'une erreur de
protocole de l'UC.
Le protocole du processeur est
passé à l'état irrécupérable.
Irrécupérable Détection d'une erreur de parité
du bus de l'UC.
Le PERR du bus du processeur
est passé à l'état irrécupérable.
Irrécupérable Détection d'une erreur
d'initialisation de l'UC.
L'initialisation du processeur est
passée à l'état irrécupérable.
Tableau 13-9. Écran Condition du serveur (suite)
Gravité Message Cause500 Diagnostics
REMARQUE : pour des informations supplémentaires sur des messages LCD du
serveur, voir le « Guide d'utilisation du serveur ».
Irrécupérable Détection du machine check
(vérification de machine) de l'UC.
Le Machine Check du processeur
est passé à l'état irrécupérable.
Critique Perte de la redondance de
la mémoire.
Critique Détection d'une erreur fatale du
bus sur un composant du
périphérique de
fonction du bus
.
Une erreur fatale a été détectée
sur le bus PCIe.
Critique Détection d'une interruption non
masquable (NMI) du logiciel sur
un composant du périphérique
de fonction
du bus .
Une erreur de puce a été
détectée.
Critique Échec de la programmation de
l'adresse MAC virtuelle sur un
composant du périphérique
de fonction
du bus .
L'adresse flex n'a pas pu
être programmée pour
ce périphérique.
Critique Échec de la prise en charge du
réglage de liaison ou de l'adresse
flex par la mémoire morte en
option du périphérique de la carte
mezzanine .
La mémoire morte en option ne
prend pas en charge l'adresse flex
ou le réglage de liaison.
Critique Échec d'obtention de données de
réglage de liaison ou de l'adresse
flex depuis iDRAC.
Tableau 13-9. Écran Condition du serveur (suite)
Gravité Message CauseDiagnostics 501
Informations sur la condition du serveur et du
module de l'écran LCD
Les tableaux figurant dans cette section décrivent les éléments de condition
qui sont affichés sur le panneau avant de l'écran LCD pour chaque type de
composant dans le châssis.
Tableau 13-10. Condition CMC
Élément Description
Exemple : CMC1,
CMC2
Nom/Emplacement
Aucune erreur Si aucune erreur ne s'est produite, le message « Aucune erreur »
s'affiche à la place de messages d'erreur.
Version du
micrologiciel
Ne s'affiche que sur un CMC actif. Affiche De secours pour le
CMC de secours.
IP4
Affiche la condition activée de l'IPv4 actuel uniquement sur
un CMC actif.
Adresse IP4 :
Ne s'affiche que si l'IPv4 est activée sur un CMC actif
uniquement.
IP6
Affiche la condition activée de l'IPv6 actuel uniquement sur
un CMC actif.
Adresse locale IP6 :
Ne s'affiche que si l'IPv6 est activée sur un CMC
actif uniquement.
Adresse globale IP6 :
Ne s'affiche que si l'IPv6 est activée sur un CMC
actif uniquement.502 Diagnostics
Tableau 13-11. Condition du châssis/de l'enceinte
Élément Description
Nom défini par
l'utilisateur
Exemple : « Système de rack Dell ». Définissable via
l'interface de ligne de commande ou l'interface utilisateur
Web de CMC.
Messages d'erreur Si aucune erreur ne s'est produite, le message Aucune erreur
s'affiche ; sinon, des messages d'erreur sont répertoriés, puis
des avertissements.
Numéro de modèle Exemple « PowerEdgeM1000 ».
Consommation
énergétique
Consommation électrique en watts.
Puissance maximale Consommation électrique maximale en watts.
Consommation
électrique minimale
Consommation électrique minimale en watts.
Température ambiante Température ambiante en degrés Celsius.
Numéro de service Le numéro de service attribué par l'usine.
Mode de redondance
de CMC
Non redondant ou redondant.
Mode de redondance de
l'unité d'alimentation
Non redondant, redondant en CA - secteur ou redondant
en CC.
Tableau 13-12. Condition du ventilateur
Élément Description
Nom/Emplacement Exemple : Ventilateur1, Ventilateur2, etc.
Messages d'erreur En l'absence d'erreurs, « Pas d'erreurs » est affiché ; sinon, les
messages d'erreur sont répertoriés, les erreurs critiques en
premier, puis les avertissements.
RPM Vitesse actuelle du ventilateur en tr/min.Diagnostics 503
Tableau 13-13. Condition de l'unité d'alimentation
Élément Description
Nom/Emplacement Exemple : Unité d'alimentation1, Unité d'alimentation2, etc.
Messages d'erreur En l'absence d'erreurs, « Pas d'erreurs » est affiché ; sinon, les
messages d'erreur sont répertoriés, les erreurs critiques en
premier, puis les avertissements.
Condition Hors ligne, en ligne ou veille.
Puissance maximale Puissance maximale que l'unité d'alimentation peut fournir
au système.
Tableau 13-14. Condition du module d'E/S
Élément Description
Nom/Emplacement Exemple : Module d'E/S A1, Module d'E/S B1. etc.
Messages d'erreur En l'absence d'erreurs, « Pas d'erreurs » est affiché ; sinon, les
messages d'erreur sont répertoriés, les erreurs critiques en
premier, puis les avertissements.
Condition Éteint ou allumé.
Modèle Modèle du module d'E/S.
Type de structure Type de mise en réseau.
Adresse IP Apparaît uniquement si le module d'E/S est allumé. Cette
valeur est zéro dans le cas d'un module d'E/S de type transfert
des données.
Numéro de service Le numéro de service attribué par l'usine.504 Diagnostics
Tableau 13-15. Condition iKVM
Élément Description
Name (Nom) iKVM
Aucune erreur Si aucune erreur ne s'est produite, le message Aucune erreur
s'affiche ; sinon, des messages d'erreur sont répertoriés. Les
erreurs critiques sont répertoriées en premier, puis les
avertissements. Pour plus d'informations, voir « Messages
d'erreur de l'écran LCD ».
Condition Éteint ou allumé
Modèle/Fabricant Une description du modèle iKVM.
Numéro de service Le numéro de service attribué par l'usine.
Numéro de pièce Le numéro de pièce détachée du fabricant.
Version du
micrologiciel
Version du micrologiciel du module iKVM.
Version du matériel Version du matériel du module iKVM.
REMARQUE : ces informations sont mises à jour de manière dynamique.
Tableau 13-16. Condition du serveur
Élément Description
Exemple : Serveur1, Serveur2. Nom/Emplacement
Aucune erreur Si aucune erreur ne s'est produite, le message Aucune
erreur s'affiche ; sinon, des messages d'erreur sont
répertoriés. Les erreurs critiques sont répertoriées en
premier, puis les avertissements. Pour plus
d'informations, voir « Messages d'erreur de l'écran
LCD ».
Nom du logement Nom du logement du châssis. Par exemple, SLOT-01.
REMARQUE : ce tableau est configurable via
l'interface de ligne de commande ou l'interface
utilisateur graphique Web du CMC.Diagnostics 505
Nom Nom du serveur, définissable par l'utilisateur via
Dell OpenManage. Le nom s'affiche uniquement une
fois que l'iDRAC a fini de démarrer et si le serveur
prend cette fonctionnalité en charge. Sinon, des
messages indiquant que l'iDRAC est en cours de
démarrage s'affichent.
Numéro de modèle S'affiche si iDRAC a fini de démarrer.
Numéro de service S'affiche si iDRAC a fini de démarrer.
Version du BIOS Version micrologicielle du BIOS du serveur.
Dernier code POST Affiche la dernière chaîne de messages du code POST
du BIOS du serveur.
Version du micrologiciel
iDRAC
S'affiche si iDRAC a fini de démarrer.
REMARQUE : la version iDRAC 1.01 s'affiche en tant
que 1.1. Il n'existe aucune version iDRAC 1.10.
IP4 Affiche la condition activée de l'IPv4.
Adresse IP4 :
S'affiche uniquement si l'IPv4 est activée.
IP6 S'affiche uniquement si l'iDRAC prend en charge
IPv6. Affiche la condition activée de l'IPv6.
Adresse locale IP6 :
S'affiche uniquement si l'iDRAC prend en charge
IPv6 et si IPv6 est activée.
Adresse globale IP6 :
S'affiche uniquement si l'iDRAC prend en charge
IPv6 et si IPv6 est activée.
FlexAddress activée sur les
structures
S'affiche uniquement si la fonctionnalité est installé.
Répertorie les structures activées sur ce serveur (c'est-
à-dire, A, B, C).
Tableau 13-16. Condition du serveur (suite)
Élément Description506 Diagnostics
Les informations de Figure 13-16 sont mises à jour de manière dynamique. Si
le serveur ne prend pas en charge cette fonctionnalité, les informations
suivantes ne s'affichent pas. Sinon, les options de Server Administrator sont
les suivantes :
• Option « Aucune » = Aucune chaîne ne doit être affichée sur l'écran LCD.
• Option « Par défaut » = Aucun effet.
• Option « Personnalisé » = Vous permet d'entrer un nom de chaîne pour le
serveur.
Les informations ne s'affichent que si l'iDRAC a fini de démarrer. Pour des
informations supplémentaires sur cette fonctionnalité, voir le RACADM
Command Line Reference Guide for iDRAC6 and CMC (Guide de référence
de ligne de commande pour iDRAC6 et CMC).Index 507
Index
A
ACI, 389
Activation de FlexAddress
Plus, 283
Activation ou désactivation
DCHP, 88
Active Directory, 285
ajout d'utilisateurs CMC, 306
configuration de l'accès à
CMC, 298
configuration et gestion des
certificats, 186
extension des schémas, 298
extensions de schéma, 292
objets, 293
utilisation avec le schéma
standard, 286
Affichage des paramètres réseau
IPv4 actuels, 85
Affichage des paramètres réseau
IPv6 actuels, 85
ajout
alertes SNMP, 438
alertes
dépannage, 481
alertes SNMP
ajout et configuration, 438
B
bilan de puissance
configuration, 54
C
caractéristiques
matériel, 27
caractéristiques matérielles, 27
certificat du serveur
affichage, 204
téléversement, 203
certificats
Active Directory, 186
SSL et numériques, 197
certificats
affichage d'un certificat du
serveur, 204
téléchargement d'un certificat du
serveur, 203
CMC
configuration, 308
création d'un fichier de
configuration, 103
environnement redondant, 58
fonctionnalités, 23
installation, 33
journal, 463
paramétrage, 33508 Index
commande de connexion
connexion à CMC en ligne de
commande, 67
configuration
alertes SNMP, 438
bilan de puissance, 54
module CMC à partir du
panneau LCD, 54
RACADM distant, 53
RACADM distant de CMC, 53
Configuration et gestion des
services LDAP
génériques, 193
connexion d'accès à distance
(RAC), 28
connexion directe, 316
console de ligne de commande
fonctionnalités, 61
console série
utilisation, 62
console telnet
utilisation, 62
E
économie d'énergie, 347
environnement redondant, 58
F
featurecard, 266
fichier de configuration
création, 103
FlexAddress, 263
activation, 264
configuration à l'aide de l'interface
de ligne de commande, 269
configuration Linux, 270
consultation de l'état à l'aide de
l'interface de ligne de
commande, 270
contrat de licence, 278
dépannage, 271
désactivation, 268
réveil sur réseau local, 271
vérification de l'activation, 266
fonctionnalités de CMC, 23
G
gestion des structures, 419
Gestion WS, 29
I
iDRAC
récupération du
micrologiciel, 223
iKVM, 387
installation de CMC, 33
Interface de console
analogique, 387Index 509
interface web
accès, 111
configuration des alertes par
e-mail, 445
J
journal du matériel, 460
journaux
CMC, 463
matériel, 460
M
micrologiciel
gestion, 215
mise à jour, CMC, 218
mise à jour, iKVM, 220
mise à jour, périphérique
d'infrastructure du module
d'E/S, 221
mise à jour, serveur iDRAC, 222
téléchargement, 54
Microsoft Active Directory, 285
module CMC
téléchargement de
micrologiciel, 54
mot de passe
désactivation, 477
réinitialisation de l'emplacement
du cavalier, 479
N
navigateur Web
configuration, 41
navigateur web
navigateurs pris en charge, 29
noms des logements
modification, 140
règles d'affectation des noms, 140
O
OSCAR, 387
P
panneau LCD
configuration du
module CMC, 54
paramétrage de CMC, 33
Paramètres de réseau LAN, 86
propriétés réseau
configuration à l'aide de
racadm, 84
configuration manuelle, 84
Q
questions fréquemment posées
gestion et récupération d'un
système distant, 259, 282510 Index
questions les plus fréquentes
utilisation de CMC avec Active
Directory, 313
R
RAC
voir Connexion d'accès à
distance, 28
RACADM
désinstallation à partir d'une
station de gestion Linux, 40
RACADM distant
configuration, 53
Red Hat Enterprise Linux
configuration pour la redirection
de console série, 70
règles d'analyse, 104
requête de signature de certificat
(RSC)
à propos de, 198
génération d'un nouveau
certificat, 199
S
schéma standard
utilisation avec Active
Directory, 286
Secure Sockets Layer (SSL)
à propos de, 197
sécurité
utilisation de certificats SSL et
numériques, 197
serveur proxy, 41
services
configuration, 205
snap-in
installation de l'extension de
Dell, 305
station de gestion
configuration de l'émulation de
terminal, 65
structure d'E/S, 419
système géré
accès via le port série local, 62
U
Utilisation de FlexAddress
Plus, 284
utilitaire racadm
configuration des propriétés
réseau, 84
règles d'analyse, 104
V
VLAN CMC, 91
Moniteur à Dell™ S2440L
Guide d'utilisation
Réglage de la résolution d'affchage
Information in this document is subject to change without notice.
© 2012 Dell Inc. All rights reserved.
Reproduction of these materials in any manner whatsoever without the written permission of Dell Inc. is strictly forbidden.
Marques de commerce utilisées dans ce texte : Dell et le logo DELL sont des marques de commerce de Dell Inc; Microsoft et Windows sont des marques
commerciales ou des marques commerciales déposées de Microsoft Corporation aux États-Unis et/ou dans d'autres pays; Intel est une marque déposée par Intel
Corporation aux Etats-Unis et dans d'autres pays; AVI sont des marques de commerce de Advanced Micro Devices, Inc; ENERGY STAR est une marque commerciale
déposée par U.S. Environmental Protection Agency. En tant que partenaire d’ENERGY STAR, Dell Inc. a déterminé que ce produit est conforme aux directives d’ENERGY
STAR pour son effcacité énergétique.
Other trademarks and trade names may be used in this document to refer to either the entities claiming the marks and names or their products. Dell Inc. disclaims any
proprietary interest in trademarks and trade names other than its own.
Modèle S2440Lb
Juillet 2012 Rev. A00Guide Utilisateur du moniteur à Dell™ S2440L
A Propos de Votre Moniteur
Installation de votre moniteur
Opération du moniteur
Guide de dépannage
Appendice
Remarques, Avertissements et Mises en garde
REMARQUE: Une REMARQUE indique des informations importantes qui vous aideront à mieux utiliser votre
ordinateur.
AVERTISSEMENT: Un AVERTISSEMENT indique un dommage potentiel matériel ou une perte de données si les instructions ne sont pas
suivies.
MISE EN GARDE: Une MISE EN GARDE attire votre attention sur un risque potentiel vis-à-vis de vos biens, sur des dommages corporels voire
sur un danger de mort.
Les informations présentes dans ce document sont sujettes à modifcation sans avis préalable.
© 2012 Dell Inc. Tous droits réservés.
La reproduction de ces contenus de toute manière que ce soit et sans la permission écrite de Dell Inc. est strictement interdite.
Marques de commerce utilisées dans ce texte : Dell et le logo DELL sont des marques de commerce de Dell Inc; Microsoft et Windows sont des marques commerciales ou des marques commerciales déposées de Microsoft Corporation aux États-Unis
et/ou dans d'autres pays; Intel est une marque déposée par Intel Corporation aux Etats-Unis et dans d'autres pays; AVI sont des marques de commerce de Advanced Micro Devices, Inc; ENERGY STAR est une marque commerciale déposée par U.S.
Environmental Protection Agency. En tant que partenaire d’ENERGY STAR, Dell Inc. a déterminé que ce produit est conforme aux directives d’ENERGY STAR pour son effcacité énergétique.
D'autres marques commerciales et appellations commerciales peuvent être utilisées dans ce document pour faire référence soit aux entités revendiquant les marques et les appellations soit à leurs produits. Dell Inc. désavoue tout intérêt propriétaire
dans les marques commerciales et appellations commerciales autres que les siennes.
Modèle S2440Lb
Juillet 2012 Rev. A00Retour à la page de sommaire
À Propos de Votre Moniteur
Guide Utilisateur du moniteur à Dell™ S2440L
Contenu de l'emballage
Caractéristiques du produit
Identiffcation des pièces et contrôles
Spécifcations du moniteur
Capacité Plug and Play
Politique de qualité relative aux pixels des moniteurs LCD
Lignes directrices relatives à la maintenance
Contenu de l'emballage
Votre moniteur est livré avec les éléments indiqués ci-dessous. Assurez-vous que tous les éléments sont présents et contactez Dell si quoi que ce soit manque.
REMARQUE : Certains éléments sont en option et peuvent ne pas être expédiés avec votre moniteur. Certaines fonctionnalités ou accessoires peuvent ne pas être disponibles dans certains pays.
Moniteur
Colonne du piedBase du pied
Câble d’alimentation
Adaptateur secteur
Câble VGA
Lien de câbleSupport des Pilotes et Documentation
Guide d’installation rapide
Informations sur la sécurité
Caractéristiques du produit
L'écran panneau plat Dell Professional S2440L a une matrice active, un transistor en couche mince (TFT), un affchage à cristaux liquides (ACL) et rétroéclairage à DÉL. Les principales caractéristiques du
moniteur sont les suivantes :
■ S2440L: Affchage sur une zone visible de 60,97 cm (24 pouces) (Mesurée en diagonale). Résolution de 1920 x 1080, plus un support plein écran pour les résolutions plus faibles.
■ Grand angle de visionnement pour pouvoir regarder le moniteur depuis une position assise ou debout ou tout en se déplaçant d’un côté à l’autre.
■ Capacité d’inclinaison.
■ Capacité Plug and play si votre système la prend en charge.
■ Réglages de l’affchage de l’écran (OSD) pour une facilité de confguration et l’optimisation de l’écran.
■ Le CD logiciel et de documentation inclut un fchier d’information (INF), un fchier de correspondance des couleurs d’image (ICM) et une documentation sur le produit.
■ Fonction d’économie d’énergie pour la conformité à la norme Energy Star.
■ Fente du verrouillage de sécurité.
■ Capacité de basculer des proportions d'images large en standard tout en maintenant la qualité d'image.
■ Classé EPEAT d'Argent.
■ Logiciel Dell Display Manager inclus (sur le CD fourni avec le moniteur).
■ Verre sans arsenic, et sans mercure pour le panneau seulement.
■ Taux de contraste dynamique élevé (8 000 000:1).
■ Alimentation de 0,5W en mode veille.
■ La Jauge d’énergie indique le niveau d’énergie consommée par le moniteur en temps réel.Identiffcation des pièces et contrôles
Vue de Face
Commandes en face avant
Étiquette Description
1
Touches de fonction (pour plus d’informations, voir Utilisation du
moniteur)
2 Bouton d’alimentation (avec diode témoin)Vue Arrière
Vue arrière avec base du moniteur
Étiquette Description Utilisez
1 Orifce de verrouillage de sécurité Utilisez un verrou de sécurité avec cet orifce pour fxer votre moniteur.
2 Réglementaire classement du label Listes des approbations réglementaires.
3
Etiquette à code-barre avec numéro de série Référez-vous à cette étiquette si vous devez contacter Dell pour un support
technique.
4 Stand bouton de retrait Stand de sortie à partir du moniteur.
5 Clip de rangement des câbles Permet de ranger les câbles en les faisant passer dans le clip.Vue Latérale
Vue de Dessous
Vue de dessous sans le socle du moniteur
Étiquette Description Utilisez
1 Sortie de ligne audio Connectez vos haut-parleurs.*
2 Connecteur HDMI Connectez le câble HDMI de votre ordinateur.
3 Connecteur VGA Branchez le câble VGA de votre ordinateur.
4 Connecteur du cordon d'alimentation CC Branchez le câble d'alimentation.
*L’utilisation d’un casque usage n’est pas prise en charge pour le connecteur de ligne de sortie audio.
Spécifcations du moniteur
Spécifcations de l'écran plat
Modèle S2440LType d'écran Matrice active - LCD TFT
Type de dalle VA
Dimensions de l'écran
60,9 cm (diagonale de l'image visible de 24
pouces)
Zone d'affchage préréglée:
Horizontale
Verticale
531,36 mm (20,92 pouces)
298,89 mm (11,77 pouces)
Finesse Pixel 0,277 mm
Angle de vision
178° (vertical) standard
178° (horizontal) standard
Sortie Luminance
Panneau : 280 cd/m²(standard)
Moniteur : 250 cd/m²(standard)
Rapport de contraste
5000 pour 1 (standard)
8M pour 1 (Contraste dynamique activé,
typiquement)
Revêtement de surface Refet avec revêtement dur 3H
Rétro-éclairage Système d'éclairage latéral DÉL
Temps de réponse
12 ms (standard)
6 ms (standard) avec dépassement
Nombre de couleurs 16,7 millions de couleurs
Gamme de couleurs CIE1976 (86%)*
*La gamme de couleurs du [S2440L] (standard) est basée sur les normes d'essais CIE1976 (86%) et CIE1931 (72%).
Spécifcations de la Résolution
Modèle S2440L
Plage de balyage horizontal 30 kHz à 83 kHz (automatique)
Plage de balayage vertical 56 Hz à 76 Hz (automatique)
Résolution maximale préréglée 1920 x 1080 à 60 Hz
Modes vidéo pris en charge
Modèle S2440L
Capacités d'affchage vidéo (lecture
HDMI)
480p, 480i, 576p, 576i, 720p, 1080p,
1080iModes d'Affchage Préréglés
S2440L
Mode d'affchage
Fréquence horizontale
(kHz)
Fréquence verticale (Hz) Horloge de pixels
(MHz)
Polarité de synchronisation
(Horizontale/Verticale)
VESA, 720 x 400 31,5 70,1 28,3 -/+
VESA, 640 x 480 31,5 60,0 25,2 -/-
VESA, 640 x 480 37,5 75,0 31,5 -/-
VESA, 800 x 600 37,9 60,3 40,0 +/+
VESA, 800 x 600 46,9 75,0 49,5 +/+
VESA, 1024 x 768 48,4 60,0 65,0 -/-
VESA, 1024 x 768 60,0 75,0 78,8 +/+
VESA, 1152 x 864 67,5 75,0 108,0 +/+
VESA, 1280 x 1024 64,0 60,0 108,0 +/+
VESA, 1280 x 1024 80,0 75,0 135,0 +/+
VESA, 1920 x 1080 67,5 60,0 148,5 +/+
Spécifcations électriques
Modèle S2440L
Signaux d'entrée vidéo
Analogique RGB, 0,7 Volts +/- 5%, polarité positive à 75 ohms
d'impédance d'entrée
HDMI, 600mV pour chaque ligne différentielle, impédance d’entrée de
100 ohms par paire différentiel
Signaux d'entrée de synchronisation
Synchronisations horizontale et verticale séparées, Niveau TTL sans polarité,
SOG (SYNC Composite sur Vert)
Adaptateur
CA/CC*
Tension/fréquence/courant
d’entrée
Adaptateur Delta ADP-40DD B : 100 VCA à 240 VCA / 50 Hz à 60 Hz ± 3 Hz /
1,5 A (Max.),
adaptateur Lite-On PA-1041-71: 100 VCA à 240 VCA / 50 Hz ou 60 Hz ± 3 Hz
/ 1,2 A (Max.)
Tension/courant de sortie Sortie :12 VCC / 3,33 A
Courant d'appel
120 V : 30 A (Max)
240 V : 60 A (Max)
*Adaptateurs CA/CC compatibles qualifés :
AVERTISSEMENT: Pour éviter d’endommager le moniteur, utilisez uniquement l’adaptateur conçu pour ce moniteur Dell en particulier.
Fabricant Modèle Polarité
Delta ADP-40DD BA
Lite-On PA-1041-71TP-LFCaractéristiques physiques
Modèle S2440L
Type de connecteur Prise Sub-D miniature à 15 broches, connecteur bleu; HDMI
Type du câble de signal
Analogique, amovible, D-sub, 15 broches, livré attaché au moniteur
Numérique: HDMI
Dimensions (avec base)
Hauteur 417,9 mm ( 16,45 pouces)
Largeur 567,4 mm (22,34 pouces)
Profondeur 190,8 mm (7,51 pouces)
Dimensions (sans base)
Hauteur 334,9 mm (13,18 pouces)
Largeur 567,4 mm (22,34 pouces)
Profondeur 43,5 mm (1,71 pouces)
Dimensions de la base
Hauteur 137,1 mm (5,4 pouces)
Largeur 190,8 mm (7,51 pouces)
Profondeur 190,8 mm (7,51 pouces)
Poids
Poids avec l'emballage 13,43 lb (6,09 kg)
Poids avec ensemble base et câbles 11,09 lb (5,03 kg)
Poids sans ensemble base 8,07 lb (3,66 kg)
Poids de l'ensemble base 1,92 lb (0,87 kg)
Brillant du cadre avant 90~100 unités de brillant
Caracrtéristiques environnementales
Modèle S2440L
Température
En fonctionnement 0°C à 40°C
A l'arrêt
Entreposage : -20°C à 60°C (-4°F à 140°F)
Expédition: -20°C à 60°C (-4°F à 140°F)Humidité
En fonctionnement 10% à 80%(sans condensation)
A l'arrêt
Entreposage : 5% à 90% (sans condensation)
Expédition: 5% à 90% (sans condensation)
Altitude
En fonctionnement 5000 m (16404 pieds) max
A l'arrêt 12192 m (40000 pieds) max
Dissipation Thermique
85,30 BTU/heure (maximum)
61,42 BTU/heure (typique)
Modes de gestion d'énergie
Si vous avez une carte graphique compatible DPM™ VESA ou un logiciel installé sur votre PC, le moniteur peut automatiquement réduire sa consommation électrique lorsqu'il n'est pas utilisé. On parle alors de
Mode d'économie d'énergie*. Si l’ordinateur détecte une entrée depuis le clavier, la souris ou d’autres périphériques, le moniteur reprend son fonctionnement automatiquement. Le tableau suivant donne la
consommation électrique et les signaux de cette fonctionnalité d'économie d'énergie automatique :
Modes VESA Sync.
Horizontale
Sync.
Verticale
Vidéo Témoin
d'alimentation
Consommation
électrique
Fonctionnement
normal
Actif Actif Actif Blanc 25 W (maximale)**
18 W (typique)
Mode Arrêt-Actif Inactif Inactif Vide Orange Moins de 0,5 W
Arrêt - - - Éteint Moins de 0,5 W
L’OSD ne fonctionnera qu'en mode normal. Lorsqu’un bouton est pressé en mode désactivé, l’un des messages suivants s’affche :
Activer l’ordinateur et le moniteur pour accéder à l’OSD.
REMARQUE : Ce moniteur est compatible ENERGY STAR®-et compatible.
* La consommation électrique nulle en mode ARRÊT ne peut être obtenue qu'en déconnectant le câble principal du moniteur.
** Consommation d'électricité maximale de luminance maximale.Assignations des broches
Connecteur VGA
Numéro
de broche
Côté 15-broches du câble de signal connecté
1 Vidéo-Rouge
2 Vidéo-Vert
3 Vidéo-Bleu
4 MASSE
5 Test-Auto
6 MASSE-R
7 MASSE-G
8 MASSE-B
9 Ordinateur 5V/3.3V
10 MASSE-sync
11 MASSE
12 Données DDC
13 Sync.H.
14 Sync V.
15 Horloge DDCConnecteur HDMI
Numéro
de broche
Côté 19 broches du câble de signal
connecté
1 TMDS DONNÉES 2+
2 TMDS DONNÉES 2 BLINDAGE
3 TMDS DONNÉES 2-
4 TMDS DONNÉES 1+
5 TMDS DONNÉES 1 BLINDAGE
6 TMDS DONNÉES 1-
7 TMDS DONNÉES 0+
8 TMDS DONNÉES 0 BLINDAGE
9 TMDS DONNÉES 0-
10 TMDS HORLOGE+
11 TMDS HORLOGE BLINDAGE
12 TMDS HORLOGE-
13 CEC
14 Réservé (N.C. sur le périphérique)
15 DDC HORLOGE (SCL)
16 DDC DONNÉES (SDA)
17 Terre DDC/CEC
18 +5V ALIMENTATION
19 DÉTECTION CONNEXION À CHAUD
Capacité Plug and Play
Vous pouvez installer ce moniteur avec n'importe système compatible Plug and Play. Ce moniteur fournit automatiquement à l'ordinateur ses données d'identifcation d'affchage étendues (Extended Display
Identifcation Data : EDID) en utilisant les protocoles DDC (Display Data Channel) de manière à ce que le système puisse effectuer automatiquement la confguration et optimiser les paramètres du moniteur.
La plupart des installation de moniteurs sont automatique, vous pouvez choisir différents réglages si vous le souhaitez. Pour plus d'informations sur la modifcation de réglages du moniteur, voir Utiliser le
moniteur.Politique de qualité relative aux pixels des moniteurs LCD
Pendant le processus de fabrication du moniteur LCD, il n'est pas inhabituel qu'un ou plusieurs pixels se fgent dans un état fxe, ce qui est diffcilement visible et n'affecte pas la qualité de l'affchage ni son
utilisabilité. Pour plus d'informations sur la Qualité des moniteurs Dell et la Politique sur les pixels, voir le site de Support de Dell à l'adresse : support.dell.com.
Lignes directrices relatives à la maintenance
Nettoyer votre moniteur
AVERTISSEMENT : Lisez et suivez les consignes de sécurité avant de nettoyer le moniteur.
MISE EN GARDE : Avant de nettoyer le moniteur, débranchez son câble d'alimentation de la prise
murale.
Pour les meilleures pratiques, suivez les instructions dans la liste ci-dessous pendant le déballage, le nettoyage ou la manipulation de votre moniteur :
Pour nettoyer votre écran antistatique, humidifez légèrement un chiffon doux et propre avec de l'eau. Si possible, utilisez un tissu de nettoyage spécial pour les écrans ou une solution adaptée au
revêtement antistatique. Ne pas utiliser de produits à base de benzène, un diluant, de l'ammoniaque, des nettoyants abrasifs ou des produits à base d'air comprimé.
Utilisez un chiffon légèrement humidifé et tiède pour nettoyer le moniteur. Evitez d'utiliser toutes sortes de détergents car certains peuvent laisser un flm trouble sur le moniteur.
Si vous remarquez la présence de poudres blanches lors du déballage de votre moniteur, éliminez-les à l'aide d'un chiffon.
Manipulez votre moniteur avec soin car les plastiques de couleur foncée peuvent rayer et laisser des marques de rayures blanches plus facilement que les moniteurs de couleur claire.
Pour aider à maintenir une meilleure qualité d’image sur votre moniteur, utiliser un économiseur d’écran qui change dynamiquement et veuillez éteindre votre moniteur quand vous ne l’utilisez pas.
Retour à la page de sommaireRetour à la page de sommaire
Installer Votre Moniteur
Guide Utilisateur du moniteur à Dell™ S2440L
Connecter la base
Connecter le moniteur
Organiser vos câbles
Enlever la base du moniteur
Connecter la base
REMARQUE : Le support et la base de l’écran sont fournis non assemblés à
l'écran.
1. Assemblez le support sur la base.
a. Fixez la colonne du pied à la base du pied.
b. Vissez la vis papillon située sous la base.2. Assemblez le socle ainsi formé avec l’écran.
a. Placez l’écran sur un tissu doux ou sur un coussin près du bord d’un bureau.
b. Alignez les pattes de fxation du socle avec la fente de fxation de l’écran.
c. Insérez les pattes de fxation dans l'écran jusqu’à ce qu’elles soient fxées en place.
Connecter votre moniteur
MISE EN GARDE : Avant de débuter quelque procédure que ce soit de cette section, suivez les Consignes de sécurité.
Pour connecter votre moniteur sur l'ordinateur :
1. Éteignez votre ordinateur et débranchez son câble d'alimentation.
Reliez le câble bleu (VGA) entre votre moniteur et votre ordinateur.
REMARQUE: Si votre ordinateur prend en charge un connecteur HDMI, connectez le câble HDMI (peut être acheté séparément) au moniteur et le connecteur HDMI sur votre
ordinateur.REMARQUE: Ne pas connecter le câble VGA/HDMI en même temps à l'ordinateur.
2. Raccorder le câble HDMI ou le câble d’affchage VGA au port vidéo correspondant à l'arrière de votre ordinateur. Ne pas utiliser les deux câbles sur le même ordinateur. Utiliser les deux
câbles uniquement s’ils sont connectés à différents ordinateurs avec les systèmes vidéo appropriés.
Brancher le câble VGA bleu
Brancher le câble HDMI
AVERTISSEMENT: Les graphiques sont utilisés à des seules fns d'illustration. L'aspect peut varier sur
l'ordinateur.Organiser vos câbles
Après avoir branché tous les câbles nécessaires sur votre écran et votre ordinateur, (Voir Connecter votre écran pour réaliser le raccordement des câbles), utilisez la rainure de gestion des câbles
pour aménager soigneusement tous les câbles comme illustré ci-dessus.
Enlever la base du moniteur
REMARQUE : Pour éviter les rayures sur l'écran LCD en enlevant la base, assurez-vous que le moniteur est placé sur une surface nette.
REMARQUE : Ceci est valable pour un moniteur avec un stand. Lorsque stand autre est acheté, s'il vous plaît vous référer au guide d'installation correspondant stand pour mettre en place des
instructions.Pour enlever la base :
1. Placez le moniteur sur une surface plane.
2. Appuyez sur le bouton de dégagement de la base et maintenez le enfoncé.
3. Retirez le pied.
Retour à la page de sommaireRetour à la page de sommaire
Utilisation du moniteur
Guide Utilisateur du moniteur à Dell™ S2440L
Allumer le moniteur
Utiliser les commandes du panneau frontal
Utiliser le menu sur écran (OSD)
Réglage de la résolution maximale
A l'aide de l'inclinaison
Allumer le moniteur
Appuyez le bouton pour allumer le moniteur.
Utiliser le Panneau Frontal
Utilisez les boutons sur le panneau frontal du moniteur pour régler les caractéristiques de l'image affchée. Quand vous utilisez ces boutons pour régler les commandes, un OSD affche les valeurs numériques des
caractéristiques que vous modifez.Boutons sur le panneau frontal Description
1
Touche de raccourci /
Modes de préréglage
Utiliser ce bouton pour choisir parmi différents modes de couleurs préréglés.
2
Touche de raccourci /
Luminosité/Contraste
Utiliser ce bouton pour accéder directement au menu « Luminosité/Contraste ».
3
Menu
Utiliser le bouton MENU pour activer l’affchage à l’écran (OSD) et sélectionner le menu OSD. Voir Accès au système des menus.
4
Quitter
Utiliser ce bouton pour revenir au menu principal ou au menu OSD principal.
5
Mise sous tension
(avec voyant de mise sous
tension)
Utiliser le bouton de mise sous tension pour allumer et éteindre le moniteur.
Le voyant blanc indique que le moniteur est allumé et prêt à fonctionner. Le voyant orange indique que le moniteur est en mode d'économie
d’énergie.
Boutons sur le panneau frontal
Utilisez les boutons du panneau avant du moniteur pour régler les paramètres de l’image.
Boutons sur le panneau frontal Description
1
Haut
Utilisez le bouton Haut pour ajuster (augmenter la valeur) des éléments dans le menu OSD.
2
Bas
Utilisez le bouton Bas pour ajuster (baisser la valeur) des éléments dans le menu OSD.
3
OK
Utilisez le bouton OK pour confrmer votre sélection.
4
Retour
Utilisez le bouton Retour pour retourner au menu précédent.
Utilisation du menu d’affchage à l’écran (OSD)
Accès au système des menus
REMARQUE : Si l’on accède à un autre menu ou quitte le menu OSD après avoir modifé les paramètres, les modifcations sont sauvegardées automatiquement par le moniteur. Elles sont également
sauvegardées après avoir attendu que le menu OSD disparaisse.
1. Appuyer sur le bouton pour lancer le menu OSD et affcher le menu principal.
Menu principal pour entrée analogique (VGA)ou
Menu principal pour entrée numérique (HDMI)REMARQUE : Le REGLAGE AUTO est disponible uniquement en cas d’utilisation du connecteur analogique (VGA).
2. Appuyer sur les boutons et pour accéder aux différentes options de confguration. En se déplaçant d’une icône à l’autre, le nom de l’option est affché en surbrillance. Se reporter au tableau suivant
pour la liste complète des options disponibles pour le moniteur.
3. Appuyer une fois sur le bouton pour activer l’option en surbrillance.
4. Appuyer sur les boutons et pour sélectionner le paramètre voulu.
5. Appuyer sur pour accéder à la barre de réglage puis utiliser les boutons et , en fonction des indicateurs sur le menu, pour effectuer des modifcations.
6. Sélectionner l’option pour revenir au menu principal.Icône Menu et sous-menus Description
Luminosité/Contraste Utiliser ce menu pour activer la fonction de réglage de luminosité/contraste.
Luminosité La luminosité permet de régler la luminance du rétroéclairage.
Appuyer sur le bouton pour augmenter la luminosité et sur le bouton pour la diminuer (mini. 0 / maxi. 100).
REMARQUE : Le réglage manuel de Luminosité est désactivé lorsque Gestion intelligente de l’énergie ou Contraste dynamique est activé.
Contraste Régler la luminosité au préalable puis le contraste uniquement si un réglage supplémentaire s’impose.
Appuyer sur le bouton pour augmenter le contraste et sur le bouton pour le diminuer (mini. 0 / maxi. 100).
La fonction de réglage du contraste permet d’ajuster le rapport des brillances entre parties sombres et claires de l’image sur l’écran.
Réglage auto Bien que le moniteur soit reconnu par l’ordinateur au démarrage, la fonction de Réglage Auto optimise les paramètres d’affchage en fonction de la confguration d’installation
propre à chaque utilisateur.
Le Réglage auto permet au moniteur de s’adapter automatiquement au signal vidéo entrant. Après avoir utilisé la fonction Réglage auto, le réglage du moniteur peut être
retouché en utilisant les commandes d’horloge de pixels (grossier) et de phase (fn) sous Paramètres d’image.
REMARQUE : Dans la plupart des cas, la fonction Réglage auto confère la meilleure image possible pour toutes les
confgurations.REMARQUE : L’option Réglage auto est disponible uniquement en cas d’utilisation du connecteur analogique (VGA).
Source entrée Utiliser le menu Source d’entrée pour effectuer une sélection entre les différents signaux vidéo pouvant être connectés au moniteur.
Sélection auto
Appuyez sur pour choisir Sélection auto, le moniteur recherche les signaux d’entrée disponibles.
VGA
Sélectionner Entrée VGA en cas d’utilisation du connecteur analogique (VGA). Appuyer sur pour sélectionner la source d’entrée VGA.
HDMI
Sélectionner l’entrée HDMI en cas d’utilisation du connecteur HDMI. Appuyer sur pour sélectionner la source d’entrée HDMI.
Réglage des couleurs
Utiliser Paramètres de couleurs pour ajuster le mode de paramétrage des couleurs.Format entrée
couleurs
Permet de changer le mode d’entrée vidéo :
RVB : Sélectionnez cette option si votre moniteur est connecté à un ordinateur ou un lecteur de DVD avec le câble VGA.
YPbPr : Sélectionnez cette option si votre moniteur est connecté à un lecteur de DVD par YPbPr au câble VGAI ; ou si le paramètre de sortie couleur DVD n’est pas RVB.Modes de préréglage Quand vous sélectionnez Modes de préréglage, vous pouvez choisir Standard, Multimédia, Film, Jeux, Texte, Chaud, Froid ou Couleur Perso dans la liste.
Standard : Permet d’obtenir les réglages par défaut du moniteur. Il s’agit du mode de préréglage par défaut.
Multimédia : Permet d’obtenir les réglages de couleurs adaptés aux applications multimédia.
Film : Permet d’obtenir les réglages de couleurs adaptés aux flms.
Jeux : Permet d’obtenir les réglages de couleurs adaptés à la plupart des applications de jeux.
Texte : Charge les réglages de luminosité et de netteté idéaux pour affcher les textes.
Chaud : Augmente la température des couleurs. L’écran affche des teintes plus chaudes avec des tons rouges/jaunes.
Froid : Diminue la température des couleurs. L’écran affche des teintes plus froides avec un ton bleuté.
Couleur Perso : Permet de paramétrer manuellement les couleurs. Agir sur les boutons et pour régler les valeurs des trois couleurs (rouge, vert, bleu) et
défnir un mode de préréglage des couleurs personnalisé.Hue Cette fonction permet de changer la teinte des images vidéo sur vert ou violet. Elle sert à obtenir le ton couleur chair souhaité. La teinte peut être réglée de « 0 » à « 100 ».
Appuyer sur pour renforcer la nuance de vert de l’image vidéo.
Appuyer sur pour renforcer la nuance de violet de l’image vidéo.
REMARQUE : L’ajustement de la teinte n’est disponible que lorsque vous sélectionnez un mode de préréglage Film ou Jeux.
Saturation Cette fonction permet de régler la saturation des couleurs pour les images vidéo. La saturation peut être réglée de «0 » à « 100 ».
Appuyer sur pour renforcer l’aspect monochrome de l’image vidéo.
Appuyer sur pour renforcer l’aspect coloré de l’image vidéo.
REMARQUE : L’ajustement de la saturation n’est disponible que lorsque vous sélectionnez un mode de préréglage Film ou Jeux.
Mode démo Divise l’écran en deux pour affcher côte à côte les images en mode Film normal et amélioré.
Vous pouvez également appuyer et simultanément pour activer/désactiver ce mode.
REMARQUE : Le Mode démo n’est disponible que lorsque vous sélectionnez le mode de préréglage Film.
Image Enhance Donne des images surdimensionnées de meilleure qualité en enlevant la décoloration de l’image et la rugosité du bord.
REMARQUE : Image Enhance n’est disponible que lorsque vous sélectionnez le mode de préréglage Standard, Multimédia, Film ou Jeux.Réinit. param.
couleur
Rétablit les paramètres de couleurs d’origine du moniteur.
Paramètres affchage La fonction Paramètres d’affchage permet de régler l’image.
Proportions Ajuste le format en Wide 16:9, 4:3 ou 5:4.
Position horizontale
Utiliser ou pour ajuster la position de l’image à gauche ou à droite. La valeur minimale de réglage est « 0 » (-). La valeur maximale de réglage est « 100 » (+).
Position verticale
Utiliser ou pour ajuster la position de l’image vers le haut ou le bas. La valeur minimale de réglage est « 0 » (-). La valeur maximale de réglage est « 100 » (+).
Finesse
Cette fonction permet de d’obtenir une image plus nette ou plus douce. Utiliser ou pour régler la netteté de « 0 » à « 100 ».
Horloge pixels Les réglages de phase et d’horloge de pixels permettent de régler le moniteur à la convenance de l’utilisateur.
Utiliser ou pour obtenir la meilleure qualité d’image possible.
Phase Si des résultats satisfaisants ne sont pas obtenus par le réglage de phase, utiliser le réglage d’horloge de pixels (grossier) puis de nouveau le réglage de phase (fn).
REMARQUE : Les réglages d’horloge et de phase sont disponibles uniquement pour les entrées « VGA ».Contraste dynamique Permet d’augmenter le niveau de contraste pour fournir une qualité d’image plus nette et détaillée.
Appuyer sur le bouton pour activer ou désactiver le contraste dynamique.
REMARQUE : Le Contraste dynamique offre un contraste plus élevé si vous sélectionnez un mode de préréglage Film ou Jeux.
Réinit. tous Param.
Affchage
Sélectionner cette option pour rétablir les paramètres d’affchage par défaut.
Autres paramétrages Sélectionner cette option pour régler les paramètres de l’OSD, comme la langue affchée, la durée pendant laquelle le menu reste affché à l’écran, etc.
Langue Cette option permet de choisir une des huit langues disponibles (Anglais, Espagnol, Français, Allemand, Chinois simplifé ou Japonais) pour l’affchage de l’OSD.
Transparence menu
Sélectionner cette option pour modifer la transparence du menu en appuyant sur le 1er ou le 2ème bouton (Mini.: 0 ~ Maxi.: 100).
Minuteur du menu Durée d’activation de l’OSD : Défnit la durée pendant laquelle l’OSD restera activé après avoir pressé un bouton.
Utiliser ou pour déplacer le curseur par incréments de 1 secondes, de 5 à 60 secondes.
Verrou du menu Permet de contrôler l’accès des utilisateurs aux réglages. Lorsque Verrouillage est sélectionné, aucun réglage de la part des utilisateurs n’est autorisé. Tous les boutons sont
verrouillés.
REMARQUE : Lorsque l’OSD est verrouillé, et si le bouton « menu » est pressé, l’utilisateur est ramené directement au menu de paramétrage de l’OSD, avec la fonction de
verrouillage de l’OSD sélectionnée. Sélectionner « Déverrouiller » pour obtenir le déverrouillage et permettre à l’utilisateur d’accéder à tous les paramètres applicables.
Gestion intelligente
de l’énergie
Pour activer ou désactiver la réduction dynamique du rétro-éclairage.
La fonction de réduction dynamique du rétro-éclairage réduit automatiquement le niveau de luminosité de l’écran lorsque l’image affchée contient une forte proportion de
zones lumineuses.DDC/CI La fonction DDC/CI (Canal de données d’affchage/Interface de commande) permet de contrôler les paramètres réglables (luminosité, équilibre des couleurs, etc.) via le logiciel
d’un ordinateur. Cette fonction peut être désactivée en sélectionnant « Désactiver ».
Cette fonction est destinée aux utilisateurs les plus expérimentés et à optimiser les performances du moniteur.
Conditionement LCD Contribue à réduire les cas mineurs de rémanence de l’image. Le programme peut mettre un certain temps pour fonctionner, suivant le degré de rémanence de l’image. Cette
fonction peut être activée en sélectionnant « Activer ».Réinitialisation Rétablit tous les paramètres de réglage de l’OSD aux valeurs d’usine.
Personnaliser Les utilisateurs peuvent choisir une fonction parmi « Modes de préréglage », « Luminosité/Contraste », « Réglage auto », « Source entrée » ou « Proportions » et la défnir
comme touche de raccourci.REMARQUE : Ce moniteur comporte une fonctionnalité intégrée pour calibrer automatiquement la luminosité et compenser le vieillissement de DEL.Messages d’avertissement OSD
Lorsque la fonction Gestion intelligente de l’énergie ou Contraste dynamique est activée (dans ces modes de préréglage : Film ou Jeux), le réglage manuel de la luminosité est désactivé.
L'un des messages d'avertissement suivants peut apparaître à l'écran indiquant que le moniteur est hors des limites de synchronisation :
Cela signife que l'écran ne peut pas se synchroniser avec le signal reçu depuis l'ordinateur. Voir Spécifcations du moniteur pour connaître les limites des fréquences Horizontale et Verticale
adressables par ce moniteur. Le mode recommandé est de 1920 x 1080.Vous verrez le message suivant avant que la fonction DDC/CI ne soit désactivée.
Lorsque le moniteur entre en mode d’Economie d’énergie, le message suivant s’affche :
Activez l’ordinateur et réveillez le moniteur pour obtenir l'accès à l’OSD
Si vous appuyez sur un des boutons autre que le bouton d'alimentation, l'un des messages suivants apparaît selon l'entrée choisie :
Entrée VGA/HDMISi l'entrée VGA ou HDMI est sélectionnée et si le câble correspondant n'est pas connecté, une boîte de dialogue fottante comme illustrée ci-dessous apparaît.
ou
Il est recommandé d’utiliser l’adaptateur secteur fourni. Si non, vous verrez le message, comme présenté ci-dessous.
Voir Solutions des problèmes pour plus d'informations.
Réglage de la résolution maximale
Pour régler le moniteur sur la résolution maximale:
Sous Windows Vista®, Windows® 7, Windows® 8:
1. Pour Windows®
8 seulement, sélectionnez la vignette Bureau pour passer au bureau classique.
2. Faites un clic-droit sur le bureau et sélectionnez Résolution d'écran.
3. Cliquez sur la Liste déroulante de la Résolution d'écran et sélectionnez 1920 x 1080.
4. Cliquez sur OK.
Si vous ne voyez pas l'option 1920 x 1080, vous avez peut-être besoin de mettre à jour votre pilote graphique. Selon votre ordinateur, menez à bien l'une des procédures suivantes :
Si vous avez un ordinateur de bureau ou portable Dell :
Allez sur le site support.dell.com, saisissez l'identifant de dépannage, et téléchargez le dernier pilote pour votre carte graphique.
Si vous utilisez un ordinateur d'une marque autre que Dell (portable ou de bureau) :
Allez sur le site de support de votre ordinateur et téléchargez les derniers pilotes graphiques.
Allez sur le site de support de votre carte et téléchargez les derniers pilotes graphiques.A l'aide de l'inclinaison
REMARQUE : Ceci est applicable pour un moniteur avec support. Après achat du support autre, veuillez consulter le guide d'installation du support respectifs pour les instructions
d'installation.
Inclinaison
Avec le pied fxé au moniteur, vous pouvez incliner le moniteur pour l’angle de vision le plus confortable.
REMARQUE : La base est détachée lorsque l'écran est livré depuis l'usine.
Retour à la page de sommaireRetour à la page de sommaire
Dépannage
Guide Utilisateur du moniteur à Dell™ S2440L
Test-Auto
Diagnostiques intégrés
Démo en magasin
Problèmes généraux
Problèmes spécifques au produit
MISE EN GARDE : Avant de débuter quelque procédure que ce soit de cette section, suivez les Consignes de sécurité.
Test-Auto
Votre moniteur dispose d'une fonction de test automatique qui vous permet de vérifer s'il fonctionne correctement. Si votre moniteur et votre ordinateur sont connectés correctement mais que l'écran du
moniteur reste éteint, effectuez le test automatique du moniteur en suivant ces étapes :
1. Éteignez votre ordinateur et le moniteur.
2. Débranchez le câble vidéo à l'arrière de l'ordinateur. Afn de vous assurer du bon fonctionnement du Test Automatique, déconnectez tous les câbles vidéo situés à l'arrière de l'ordinateur.
3. Rallumez le moniteur.
La boîte de dialogue fottante doit apparaître à l'écran (sur un arrière-plan noir) si le moniteur ne peut pas détecter un signal vidéo et s'il fonctionne correctement. En mode auto-test, le témoin
d'alimentation LED reste en blanc. De plus, en fonction de l'entrée sélectionnée, l'une des boîtes de dialogue illustrées ci-dessous déflera continuellement sur l'écran.
ou
4. Cette boîte de dialogue apparaîtra également lors du fonctionnement habituel du système en cas de déconnexion ou de dommages du câble vidéo.
5. Éteignez votre moniteur et reconnectez le câble vidéo; puis rallumez votre ordinateur ainsi que votre moniteur.
Si l'écran de votre moniteur n'affche toujours aucune image après avoir suivi la procédure précédente, vérifez votre contrôleur vidéo et votre ordinateur, puisque votre moniteur fonctionne
correctement.
Diagnostiques intégrés
Votre moniteur a un outil de diagnostic intégré qui vous aide à déterminer si l’anomalie d’écran que vous avez est un problème inhérent à votre moniteur, ou à votre ordinateur et carte vidéo.
REMARQUE :Vous pouvez effectuer le diagnostic intégré quand le câble vidéo est débranché et le monitor est en mode test automatique.Exécutez le diagnostic intégré.
1. Assurez-vous que l’écran est propre (pas de particules de poussière sur la surface de l’écran).
2. Débranchez le câble vidéo à l'arrière de l'ordinateur. Le moniteur se rend alors dans le mode de test automatique.
3. Pressez et maintenez enfoncés simultanément pendant 2 secondes les boutons 1 et 4 du panneau avant. Un écran gris apparaît.
4. Examinez soigneusement l’écran pour détecter des anomalies.
5. Enfoncez à nouveau le bouton 4 du panneau avant. L'affchage de l'écran doit passer au rouge.
6. Examinez l’écran pour détecter des anomalies quelconques.
7. Répétez les étapes 5 et 6 pour inspecter l'écran dans les couleurs vert, bleu, noir et blanc.
Le test est terminé quand l’écran blanc apparaît. Pour quitter, pressez à nouveau sur le bouton 4.
Si vous ne détectez pas d’anomalies quelconques lors de l’utilisation de l’outil de diagnostic intégré, le moniteur fonctionne correctement. Vérifez la carte vidéo et l’ordinateur.
Démo en magasin
Pour accéder au mode OSD en magasin
Débranchez/Déconnectez tous les câbles. Assurez-vous que le moniteur est en mode « Activé ». Appuyez et maintenez le bouton 2 et le bouton 4 pendant 5 secondes.
Pour quitter mode OSD en magasin
Appuyez le bouton d’alimentation une fois. Si l’alimentation est interrompue pendant démo, reprenez la démo après que l'alimentation est rétablie.
Problèmes généraux
Le tableau suivant contient les informations générales relatives aux problèmes courants du moniteur que vous pouvez rencontrer, et les solutions possibles.
Symptômes courants Description du problème Solutions possibles
Pas de vidéo / Témoin
d'alimentation éteint
Pas d'image Assurez-vous que le câble vidéo reliant l'ordinateur et le moniteur est correctement branché et fxé.
Vérifez que la prise de courant marche correctement en branchant un autre appareil électrique dessus.
Assurez-vous que le bouton d'alimentation est complètement enfoncé.
Assurez-vous que la source d'entrée correcte est sélectionnée via le menu Sélection source en entrée.
Pas de vidéo / Témoin
d'alimentation allumé
Pas d'image ou pas de
luminosité
Augmentez les contrôles de luminosité et de contraste via l'OSD.
Effectuez la vérifcation à l'aide de la fonction de test automatique de l'écran.
Vérifez qu'il n'y a pas de broches tordues ou cassées à l'extrémité du câble vidéo.
Exécutez le diagnostic intégré.Assurez-vous que la source d'entrée correcte est sélectionnée via le menu Sélection source en entrée.
Mauvaise mise au point L'image est foue, trouble ou
voilée.
Lancez la fonction Ajustement auto via l’OSD.
Réglez les contrôles de Phase et d'Horloge via l'OSD.
Retirez les câbles de rallonge vidéo.
Effectuer la réinitialisation du moniteur aux paramètres d'usine.
Modifer la résolution vidéo pour obtenir le rapport d’aspect correct.
Vidéo tremblante/vacillante Image comportant des
vagues ou un léger
mouvement
Lancez la fonction Ajustement auto via l’OSD.
Réglez les contrôles de Phase et d'Horloge via l'OSD.
Effectuer la réinitialisation du moniteur aux paramètres d'usine.
Vérifez les facteurs environnementaux.
Déplacez le moniteur et testez-le dans une autre pièce.
Pixels manquants L'écran LCD affche des
points.
Éteignez et rallumez.
Certains pixels allumés d'une manière permanente sont un défaut naturel de la technologie LCD.
Pour plus d'informations sur la Qualité des moniteurs Dell et la Politique sur les pixels, voir le site de Support de Dell à l'adresse :
support.dell.com.
Pixels fxess L'écran LCD affche des points
lumineux.
Éteignez et rallumez.
Certains pixels allumés d'une manière permanente sont un défaut naturel de la technologie LCD.
Pour plus d'informations sur la Qualité des moniteurs Dell et la Politique sur les pixels, voir le site de Support de Dell à l'adresse :
support.dell.com.
Problèmes de luminosité Image trop terne ou trop
lumineuse
Effectuez la réinitialisation du moniteur aux paramètres d'usine.
Lancez la fonction Ajustement auto via l’OSD.
Réglez les contrôles de luminosité et de contraste via l'OSD.
Distorsion géométrique Image mal centrée Effectuer la réinitialisation du moniteur aux paramètres d'usine.
Lancez la fonction Ajustement auto via l’OSD.
Ajuster les contrôles horizontaux et verticaux via l'OSD.
REMARQUE : Lors de l’utilisation de HDMI, les réglages de positionnement ne sont pas disponibles.
Lignes Horizontales et Verticales L'écran affche une ou
plusieurs lignes
Effectuez la réinitialisation du moniteur aux paramètres d'usine.
Lancez la fonction Ajustement auto via l’OSD.
Réglez les contrôles de Phase et d'Horloge Pixel via l'OSD.
Effectuez la procédure de test automatique du moniteur et déterminez si de telles lignes apparaissent également dans le mode de
test automatique.
Vérifez qu'il n'y a pas de broches tordues ou cassées à l'extrémité du câble vidéo.
Exécutez le diagnostic intégré.
REMARQUE : Lors de l’utilisation de HDMI, les réglages d'horloge et de phase pixel ne sont pas disponibles.
Problèmes de synchronisation L'écran est brouillé ou semble
découpé en pièces.
Effectuez la réinitialisation du moniteur aux paramètres d'usine.
Lancez la fonction Ajustement auto via l’OSD.
Réglez les contrôles de Phase et d'Horloge Pixel via l'OSD.
Effectuez la procédure de test automatique du moniteur pour déterminer si l'écran brouillé apparaît également dans le mode de test
automatique.
Vérifez qu'il n'y a pas de broches tordues ou cassées à l'extrémité du câble vidéo.
Redémarrez l'ordinateur en mode sans échec.
Problèmes liés à la sécurité Signes visibles de fumée ou
d'étincelles
N'effectuez aucun dépannage.
Contactez Dell immédiatement.
Problèmes intermittents Mauvais fonctionnement
marche et arrêt du moniteur
Assurez-vous que le câble vidéo reliant l'ordinateur et le moniteur est correctement branché et fxé.
Effectuez la réinitialisation du moniteur aux paramètres d'usine.
Effectuez la procédure de test automatique du moniteur pour déterminer si le problème intermittent se produit dans le mode de test
automatique.
Couleur manquante Couleur d'image manquante Effectuez la vérifcation à l'aide de la fonction de test automatique de l'écran.
Assurez-vous que le câble vidéo reliant l'ordinateur et le moniteur est correctement branché et fxé.
Vérifez qu'il n'y a pas de broches tordues ou cassées à l'extrémité du câble vidéo.
Mauvaise couleur La couleur de l'image n'est
pas bonne
Passez le mode de couleur dans l’OSD Paramètres Couleurs à ‘Graphiques’ ou ‘Vidéo’ en fonction de l’application.
Essayez les Modes de couleur prédéfnis dans l’OSD Paramètres Couleurs. Ajustez la valeur RVB dans l’OSD Paramètres Couleurs si
la Gestion des couleurs est désactivée.
Changez le Format de couleur d’entrée sur RVB PC ou YPbPr dans l’OSD Paramètres avancés.
Exécutez le diagnostic intégré.Rétention d'image en raison
d'une image statique laissée sur
le moniteur de façon prolongée
L'ombre faible d’une image
statique affchée apparaît sur
l’écran
Utilisez la fonctionnalité de gestion du courant pour éteindre le moniteur quand vous ne l’utilisez pas. (Pour plus d'informations, voir
Modes de gestion d'énergie).
Vous pouvez également utiliser un écran de veille qui change dynamiquement.
Problèmes spécifques au produit
Symptômes spécifques Description du problème Solutions possibles
L'image à l'écran est trop petite. L'image est centrée à l'écran mais
n'occupe pas toute la zone d'affchage.
Vérifez le réglage du taux d'échelle dans l'OSD de réglage de l'image
Effectuer la réinitialisation du moniteur aux paramètres d'usine.
Impossible de régler le moniteur avec
les boutons situés sur le panneau
frontal.
L'OSD n'apparaît pas à l'écran. Éteignez le moniteur, débranchez le cordon d'alimentation puis rebranchez-le et rallumez le moniteur.
Vérifez si le menu OSD a été verrouillé. Si c'est le cas, appuyez pendant 10 secondes sur le bouton au-dessus du
bouton Marche pour déverrouiller. Voir Verrouillage du menu.
Aucun signal d'entrée lorsque
l'utilisateur appuie sur les commandes
Pas d’image, la diode est bleue. Vérifez la source du signal. Assurez-vous que l'ordinateur n'est pas en mode d'économie d'énergie en déplaçant la
souris ou en appuyant sur une touche du clavier.
Vérifez que le câble de signal est branché correctement. Rebranchez le câble de signal si nécessaire.
Réinitialisez l'ordinateur ou le lecteur vidéo.
L'image ne remplit pas tout l'écran. L'image ne peut pas remplir la hauteur
ou la largeur de l'écran.
En raison des différents formats vidéo (proportions) des DVD, le moniteur peut ne pas s'affcher en plein écran.
Exécutez le diagnostic intégré.
REMARQUE : Lorsque vous choisissez le mode HDMI, la fonction Réglage auto n'est pas disponible.
Retour à la page de sommaireRetour à la Table des Matières
Appendice
Guide Utilisateur du moniteur à Dell™ S2440L
Consignes de Sécurité
Déclaration de la FCC (Etats-Unis seulement) et autres informations règlementaires
Contacter Dell
MISE EN GARDE: Consignes de Sécurité
MISE EN GARDE: Respectez les directives de sécurité indiquées ci-dessous pour votre sécurité et pour protéger votre ordinateur et votre
environnement de travail contre tout dommage.
Respectez les directives de sécurité indiquées ci-dessous pour votre Pour des informations sur les consignes de sécurité, consultez le Guide d’information sur le produit.
Déclaration de la FCC (Etats-Unis seulement) et autres informations règlementaires
Pour la déclaration de la FCC et les autres informations règlementaires, visitez le site Web suivant sur la conformité : www.dell.com\regulatory_compliance.Contacter Dell
Pour les clients aux Etats-Unis, appelez le 800-WWW-DELL (800-999-3355).
REMARQUE: Si vous n’avez pas de connexion Internet active, vous pouvez trouver l’information pour nous contacter sur votre facture d’achat, votre
bordereau d’emballage, votre relevé ou le catalogue des produits Dell.
Dell offre plusieurs options de services et d’assistance téléphonique et en ligne. Leur disponibilité est différente suivant les pays et les produits, et
certains services peuvent ne pas vous être offerts dans votre région. Pour contacter Dell pour les ventes, l’assistance technique, ou les questions de
service à la clientèle:
1. Consultez support.dell.com.
2. Vérifer votre pays ou région dans le menu déroulant Choisir un Pays /Région au bas de la page.
3. Cliquez sur Nous contacter sur la page à gauche.
4. Sélectionnez le lien adéquat du service ou de l’assistance requise.
5. Choisissez la méthode pour contacter Dell qui vous convient le mieux.
Retour à la Table des MatièresRetour à la Table des Matières
Installation de votre moniteur
Guide Utilisateur du moniteur à Dell™ S2440L
Réglage de la résolution d'affchage
Pour un fonctionnement maximum du moniteur lors de l'utilisation des systèmes d'exploitation Microsoft Windows, réglez la résolution d'affchage sur 1920 x 1080
pixels en suivant les étapes suivantes :
Sous Windows Vista®, Windows® 7, Windows® 8:
1. Pour Windows® 8 seulement, sélectionnez la vignette Bureau pour passer au bureau classique.
2. Faites un clic-droit sur le bureau et sélectionnez Résolution d'écran.
3. Cliquez sur la Liste déroulante de la Résolution d'écran et sélectionnez 1920 x 1080.
4. Cliquez sur OK.
Si vous ne voyez pas la résolution recommandée en option, vous avez peut-être besoin de mettre à jour votre pilote graphique. Veuillez choisir le scénario ci-dessous
qui décrit le mieux le système d'ordinateur que vous utilisez, et suivez les étapes fournies.
1: Si vous avez un ordinateur de bureau Dell™ ou un ordinateur portable Dell™ avec accès à Internet.
2: Si vous avez un ordinateur de bureau, portable ou une carte graphique non Dell™.
Retour à la Table des MatièresRetour à la Table des Matières
Installation de votre moniteur
Guide Utilisateur du moniteur à Dell™ S2440L
Si vous avez un ordinateur de bureau Dell™ ou un ordinateur portable Dell™ avec
accès à Internet
1. Allez sur http://support.dell.com, saisissez votre tag de service et téléchargez le dernier pilote pour votre carte graphique.
2. Après installation des pilotes pour votre Adaptateur Graphique, essayez de nouveau de confgurer la résolution sur sur 1920 x 1080.
REMARQUE : Si vous n'arrivez pas à confgurer la résolution sur 1920 x 1080, veuillez contacter Dell™ pour demander un Adaptateur Graphique qui prend en
charge ces résolutions.
Retour à la Table des MatièresRetour à la Table des Matières
Installation de votre moniteur
Guide Utilisateur du moniteur à Dell™ S2440L
Si vous avez un ordinateur de bureau, portable ou une carte graphique non Dell™.
Sous Windows Vista®, Windows® 7, Windows® 8:
1. Pour Windows® 8 seulement, sélectionnez la vignette Bureau pour passer au bureau classique.
2. Faites un clic-droit sur le bureau et sélectionnez Personnalisation.
3. Cliquez sur Modifer les paramètres d’affchage.
4. Cliquez sur Réglages avancés.
5. Identifez votre fournisseur de contrôleur graphique à partir de la description en haut de la fenêtre (par exemple NVIDIA, ATI, Intel etc).
6. Veuillez vous référer au site Web du fournisseur de votre carte graphique pour la mise à jour du pilote (par exemple http://www.ATI.com OU
http://www.NVIDIA.com).
7. Après installation des pilotes pour votre Adaptateur Graphique, essayez de nouveau de confgurer la résolution sur sur 1920 x 1080.
REMARQUE : Si vous n'arrivez pas à confgurer la résolution recommandée, veuillez contacter le fabricant de votre ordinateur ou envisager l'achat d'un
adaptateur graphique qui prenne en charge la résolution vidéo.
Retour à la Table des Matières
Guide de l’Utilisateur de l’Écran Large Dell™ IN1940MW
Guide d'utilisation
Instructions importantes pour défnir la résolution d'affchage sur 1440 x 900 (Maximum)
Les informations présentes dans ce document sont sujettes à modifcation sans avis préalable.
© 2012 Dell Inc. Tous droits réservés.
Toute reproduction de quelque manière que ce soit sans l'autorisation écrite de Dell Inc. est strictement interdite.
Marques utilisées dans ce texte : DELL et le logo DELL sont des marques commerciales de Dell Inc.; Microsoft et Windows sont des marques commerciales ou des marques déposées de Microsoft
Corporation aux Etats-Unis et/ou dans d’autres pays. Adobe est une marque déposée ou une marque commerciale d’Adobe Systems Incorporated aux États-Unis et/ou dans d’autres pays.
D'autres marques commerciales et appellations commerciales peuvent être utilisées dans ce document pour faire référence soit aux entités revendiquant les marques et les appellations soit à leurs
produits. Dell Inc. désavoue tout intérêt propriétaire dans les marques commerciales et appellations commerciales autres que les siennes.
Modèle IN1940MWb
Mai 2012 Rev. A00Guide de l’Utilisateur de l’Écran Large Dell™ IN1940MW
A Propos de Votre Moniteur
Installation de votre moniteur
Opération du moniteur
Guide de dépannage
Appendice
Remarques, Prudence et Avertissement
REMARQUE: Une REMARQUE indique des informations importantes qui vous aideront à mieux utiliser votre ordinateur.
PRUDENCE: Un PRUDENCE indique un risque potentiel de dommage matériel ou de perte de données et vous explique comment éviter ce
problème.
AVERTISSEMENT: Une AVERTISSEMENT indique un risque potentiel de dommage matériel, de blessure corporelle ou de décès.
Les informations présentes dans ce document sont sujettes à modifcation sans avis préalable.
© 2012 Dell Inc. Tous droits réservés.
Toute reproduction de quelque manière que ce soit sans l'autorisation écrite de Dell Inc. est strictement interdite.
Marques utilisées dans ce texte : DELL et le logo DELL sont des marques commerciales de Dell Inc.; Microsoft et Windows sont des marques commerciales ou des marques déposées de Microsoft
Corporation aux Etats-Unis et/ou dans d’autres pays; Adobe est une marque commerciale d’Adobe Systems Incorporated aux États-Unis et/ou dans d’autres pays.
D'autres marques commerciales et appellations commerciales peuvent être utilisées dans ce document pour faire référence soit aux entités revendiquant les marques et les appellations soit à leurs
produits. Dell Inc. désavoue tout intérêt propriétaire dans les marques commerciales et appellations commerciales autres que les siennes.
Modèle IN1940MWb
Mai 2012 Rev. A00Retour à la Table des matières
A propos de votre moniteur
Guide de l’Utilisateur de l’Écran Large Dell™ IN1940MW
Contenu de l'emballage
Caractéristiques du produit
Identiffcation des pièces et contrôles
Spécifcations du moniteur
Capacité Plug and Play
Qualité du moniteur LCD et politique de pixel
Instructions d'entretien
Contenu de la boîte
Votre moniteur est livré avec les éléments indiqués ci-dessous. Assurez-vous que tous les éléments sont présents et Contactez Dell™ si quoi que ce soit manque.
REMARQUE : Certains éléments sont en option et peuvent ne pas être expédiés avec votre moniteur. Certaines fonctionnalités ou accessoires
peuvent ne pas être disponibles dans certains pays.
MoniteurColonne du pied
Base du socle
Cordon d'alimentation
Câble VGA
Pilotes et Documentation média
Guide de mise en route
Informations de sécuritéCaractéristiques du produit
Le moniteur Dell™ IN1940MW a une matrice active, un transistor en couche mince (TFT), un écran à cristaux liquides (ACL). Les principales caractéristiques du
moniteur sont les suivantes :
■ Affchage sur une zone visible de 48,26 cm (19 pouces).
■ Résolution 1440 x 900 plus support plein écran à des résolutions inférieures.
■ Capacité de réglage d’inclinaison.
■ Une gamme de solutions de montage avec des orifces de fxation à écartement de 100 mm VESA® (Video Electronics Standards Association) et pied amovible.
■ Capacité Plug and Play si votre système la prend en charge..
■ Menu de réglage OSD (affchage à l’écran) pour une facilité de confguration et l’optimisation de l’écran.
■ Le CD logiciel et de documentation inclut un fchier d’information (INF), un fchier de correspondance des couleurs d’image (ICM) et une documentation sur le produit.
■ Fente de verrouillage de sécurité.Identiffcation des pièces et des contrôles
Vue de devant
Commandes en face avant
Label Description
1
Boutons de fonction (pour plus d'informations, voir
Utilisation du moniteur)
2 Bouton d'alimentation Marche/Arrêt (avec voyant DEL)Vue de derrière
Label Description Utilisation
1 Étiquette code-barre avec numéro de série Référez-vous à cette étiquette si vous devez contacter
Dell pour un support technique.
2 Etiquette de tension réglementaire Pour contacter Dell pour le support technique.
3 Orifces de montage VESA (100mm x 100mm - Derrière
la plaque de base attachée)
Pour installer le moniteur.
4 Orifce de verrouillage de sécurité Pour aider à sécuriser votre moniteur.
5 Crochets de fxation de la Soundbar Dell Pour attacher la Soundbar Dell optionnelle.Vue de coté
Vue de droiteVue de dessous
Label Description
1 Connecteur d'alimentation CA
2 Connecteur DVI
3 Connecteur VGA
Spécifcations du moniteur
Spécifcations de l'écran plat
Numéro de série Moniteur Dell IN1940MW
Type d'écran Matrice active - LCD TFT
Type de dalle TN
Dimensions de l'écran 19 pouces (taille de l'image visible 19 pouces)
Zone d'affchage préréglée 408,24(H)X255,15(V)
Horizontale 408,24 mm (16,08 pouces)
Verticale 255,15 mm (10,05 pouces)
Finesse Pixel 0,2835 mm
Angle de vision 160° (vertical) standard, 170° (horizontal) standardSortie Luminance 250 cd/m² (standard)
Rapport de contraste 1000:1 (typique)
Revêtement de surface Antirefet avec revêtement dur 3H
Rétro-éclairage Système à barre de diodes
Temps de réponse 5 ms standard
Nombre de couleurs 16,7 millions de couleurs
Gamme de couleurs 83% CIE1976 (typique)*
*La gamme de couleurs du [IN1940MW] (standard) est basée sur les normes d'essais CIE1976 (83%) et CIE1931 (72%).
Resolution Specifcations
Model Moniteur Dell IN1940MW
Plage de balyage horizontal 30 kHz à 83 kHz (automatique)
Plage de balayage vertical 50 Hz à 76 Hz (automatique)
Résolution maximale
préréglée
1440 X 900 à 60 Hz
Modes vidéo pris en charge
Capacités d'affchage vidéo (lecture DVI)
480i/480p/576i/576p/720p/1080i/1080P
(Prise en charge HDCP)Modes d'affchage préréglés
Mode d’affchage Fréquence
horizontale (kHz)
Fréquence
verticale (Hz)
Horloge de pixels
(MHz)
Polarité de
synchronisation
(Horizontale/Verticale)
VESA, 720 x 400 31,5 70,1 28,3 -/+
VESA, 640 x 480 31,5 59,9 25,2 -/-
VESA, 640 x 480 37,5 75,0 31,5 -/-
VESA, 800 x 600 37,9 60,3 40,0 +/+
VESA, 800 x 600 46,9 75,0 49,5 +/+
VESA, 1024 x 768 48,4 60,0 65,0 -/-
VESA, 1024 x 768 60,0 75,0 78,8 +/+
VESA, 1152 x 864 67,5 75,0 108,0 +/+
VESA, 1280 x 800 49,7 59,8 83,5 -/+
VESA, 1280 x 1024 64,0 60,0 108,0 +/+
VESA, 1280 x 1024 80,0 75,0 135,0 +/+
VESA, 1440 x 900 - Analogique 55,9 59,9 106,5 -/+
VESA, 1440 x 900 (CTV-R) - Numérique 55,5 59,9 88,8 +/-
Spécifcations électriques
Signaux d'entrée vidéo
Analogique RVB, 0,7 Volts +/- 5%, polarité positive à 75 ohms
d'impédance d'entrée
Numérique DVI-D TMDS, 600mV pour chaque ligne différentielle,
polarité positive à 50 ohms d'impédance d'entrée
Signaux d'entrée de
synchronisation
Synchronisations horizontale et verticale séparées, Niveau TTL sans
polarité, SOG (SYNC Composite sur Vert)
Tension d'entrée CA /
fréquence / courant
100 à 240 VCA / 50 ou 60 Hz + 3 Hz / 1,6 A (Max.)
Courant d'appel
120 V: 30 A (Max.)
240 V: 60 A (Max.)Caractéristiques physiques
Numéro de série Moniteur Dell IN1940MW
Type de connecteur
Connecteur bleu 15 broches D-sous-miniature ;
Connecteur blanc DVI-D.
Type du câble de signal
Numérique: Détachable, DVI-D, Broches pleines,
Expédié détaché du moniteur
Analogique, amovible, D-sub, 15 broches, livré fxé au
moniteur
Dimensions (avec base)
Hauteur 372,9 mm (14,68 pouces)
Largeur 443,8 mm (17,47 pouces)
Profondeur 163,5 mm (6,44 pouces)
Dimensions (sans base)
Hauteur 290,8 mm (11,45 pouces)
Largeur 443,8 mm (17,47 pouces)
Profondeur 52,0 mm (2,05 pouces)
Dimensions de la base
Hauteur 140,4 mm (5,53 pouces)
Largeur 236,0 mm (9,29 pouces)
Profondeur 163,5 mm (6,44 pouces)
Poids
Poids avec l'emballage 3,6 kg (7,93 lbs)
Poids avec ensemble base et
câbles
3,0 kg (6,61 lbs)
Poids sans ensemble base
(En cas de montage mural ou
de montage VESA - sans
câbles)
2,4 kg (5,29 lbs)
Poids de l'ensemble base 0,3 kg (0,66 lbs)Caracrtéristiques environnementales
Température
En fonctionnement 0° à 40 ° C (32° à 104 ° F)
A l'arrêt
Entreposage : -20° à 60° C (-4° à 140°F)
Expédition: -20° à 60° C (-4° à 140°F)
Humidité
En fonctionnement 10% à 80%(sans condensation)
A l'arrêt
Entreposage : 5% à 90% (sans condensation)
Expédition: 5% à 90%(sans condensation)
Altitude
En fonctionnement 3 048 m (10 000 pieds) max
A l'arrêt 10 668m (35 000 pieds) max
Dissipation Thermique
78,5 BTU/heure (maximum)
58,0 BTU/heure (typique)
Modes de gestion d'énergie
Si vous avez une carte graphique compatible DPM™ VESA ou un logiciel installé sur votre PC, le moniteur peut automatiquement réduire sa consommation électrique
lorsqu'il n'est pas utilisé. On parle alors de Mode d'économie d'énergie. Si l’ordinateur détecte une entrée depuis le clavier, la souris ou d’autres périphériques, le
moniteur reprend son fonctionnement automatiquement. Le tableau suivant donne la consommation électrique et les signaux de cette fonction d'économie d'énergie
automatique :
Modes VESA Sync. horizontale Sync. verticale Vidéo Indicateur
d'alimentation
Consommation électrique
Fonctionnement
normal
Active Active Active blanche 23 W (maximum)
Fonctionnement
normal
Active Active Active blanche 17 W (typique)
Mode Arrêt-Actif Inactif Inactif Vide Orange Moins de 0,5 W
Eteint - - - Eteint Moins de 0,5 W
L'OSD fonctionnera uniquement en mode fonctionnement normal.
Activez l’ordinateur et l’ordinateur pour avoir accès à l’ OSD.
* La consommation électrique nulle en mode ARRÊT ne peut être obtenue qu'en déconnectant le câble principal du moniteur.
** Consommation d’énergie maximum avec luminosité maximum et contraste, barre de son dell et un USB actif.Assignations des broches
VGA Connector
Numéro de
broche
Côté 15-broches du câble de signal
connecté
1 Vidéo-Rouge
2 Vidéo-Vert
3 Vidéo-Bleu
4 MASSE
5 Test-Auto
6 MASSE-R
7 MASSE-G
8 MASSE-B
9 Ordinateur 5V/3.3V
10 MASSE-sync
11 MASSE
12 Données DDC
13 Sync.H.
14 Sync V.
15 Horloge DDCConnecteur DVI
Numéro
de broche
24-broches du câble de signal Connecté
1 TMDS RX2-
2 TMDS RX2+
3 Masse TMDS
4 Flottant
5 Flottant
6 Horloge DDC
7 Données DDC
8 Flottant
9 TMDS RX1-
10 TMDS RX1+
11 Masse TMDS
12 Flottant
13 Flottant
14 Alimentation +5V/+3.3V
15 Test-Auto
16 Détection connexion à chaud
17 TMDS RX0-
18 TMDS RX0+
19 Masse TMDS
20 Flottant
21 Flottant22 Masse TMDS
23 Horloge TMDS+
24 Horloge TMDSCapacité Plug and Play
Vous pouvez installer ce moniteur avec n'importe système compatible Plug and Play. Ce moniteur fournit automatiquement à l'ordinateur ses données d'identifcation
d'affchage étendues (Extended Display Identifcation Data : EDID) en utilisant les protocoles DDC (Display Data Channel) de manière à ce que le système puisse
effectuer automatiquement la confguration et optimiser les paramètres du moniteur. La plupart des installations de moniteur sont automatiques. Vous pouvez
sélectionner différents paramètres si requis.
Qualité du moniteur LCD et politique de pixel
Pendant le processus de fabrication de ce moniteur LCD, il n'est pas anormal que un ou plusieurs pixels deviennent fxe et ne puissent plus changer. Le résultat visible
est un pixel fxe qui reste affché comme un minuscule point noir ou un point éclairé sans couleur. Lorsque un pixel reste allumé tout le temps, celui-ci est connu sous
le nom "point lumineux". Lorsqu’un pixel reste noir tout le temps, celui-ci est connu sous le nom "point noir".
Dans la plupart des cas, il est diffcile de voir ces pixels fxes et ceux-ci ne devraient pas affecter la qualité ou la fonctionalité de l'écran. Un écran avec entre 1 et 5
pixels fxes est considéré normal et standard. Pour toute information, visitez le site de support de Dell : support.dell.com.Instructions d'entretien
Entretien de votre moniteur
AVERTISSEMENT : Lisez et suivez les instructions de sécurité avant de nettoyer le moniteur.
AVERTISSEMENT : Avant de nettoyer le moniteur, débranchez le cordon d'alimentation du moniteur et de la prise
murale.
Pour les meilleures pratiques, suivez les instructions dans la liste ci-dessous pendant le déballage, le nettoyage ou la manipulation de votre moniteur :
Pour nettoyer votre écran antistatique, humidifez légèrement un chiffon doux et propre avec de l'eau. Si possible, utilisez un tissu de nettoyage spécial écran ou
une solution adaptée au revêtement antistatique. Ne pas utiliser de produits à base de benzène, un diluant, de l'ammoniaque, des nettoyants abrasifs ou des
produits à base d'air comprimé.
Utilisez un chiffon légèrement humidifé et tiède pour nettoyer les parties en matière plastique. Evitez d'utiliser toutes sortes de détergents car certains peuvent
laisser un flm trouble sur les parties plastiques.
Si vous remarquez la présence de poudres blanches lors du déballage de votre moniteur, éliminez-les à l'aide d'un chiffon. Cette poudre blanche est produite
pendant le transport du moniteur.
Manipulez votre moniteur avec soin car les plastiques de couleur foncée peuvent rayer et laisser des marques de rayures blanches plus facilement que les
moniteurs de couleur claire.
Pour aider à maintenir une meilleure qualité d’image sur votre moniteur, utiliser un économiseur d’écran qui change dynamiquement et veuillez éteindre votre
moniteur quand vous ne l’utilisez pas.
Retour à la Table des matièresRetour à la Table des matières
Installation du moniteur
Guide de l’Utilisateur de l’Écran Large Dell™ IN1940MW
Attacher la base
Enlever la base pour un montage mural VESA
Connecter votre moniteur
Connexion de la Soundbar Dell AX510PA (en option)
Attacher la base
REMARQUE :Lorsque le moniteur quitte l’usine, la base du socle n’est pas
montée.
1. Assemblez le support sur la
base.a. Placez le moniteur sur une surface plate et stable.
b. Faites glisser le corps du socle du moniteur vers le bas dans la base, jusqu’à ce qu’il s’enclenche en place.
2 Assemblez le socle ainsi formé avec l’écran.
a. Placez l’écran sur un tissu doux ou sur un coussin près du bord d’un bureau.
b. Alignez les pattes de fxation du socle avec la fente de fxation de l’écran.
c. Insérez les pattes de fxation dans l'écran jusqu’à ce qu’elles soient fxées en place.Enlever la base pour un montage mural VESA
Pour enlever la base du socle du moniteur :
1. Placez le moniteur sur un chiffon doux ou un coussin sur une surface plate et stable.
2. Avec un tournevis long, appuyez sur le bouton de verrouillage situé dans le trou juste au-dessus du porte-écran.
3. Une fois le bouton enfoncé, désolidarisez le support de l'écran.Connecter votre moniteur
AVERTISSEMENT : Avant de débuter quelque procédure que ce soit de cette section, suivez les Instructions de sécurité.
Pour connecter votre moniteur à l'ordinateur :
1. Eteignez votre ordinateur et débranchez le cordon d'alimentation.
Reliez le câble bleu (VGA) entre votre moniteur et votre ordinateur.
REMARQUE : Si votre ordinateur possède un connecteur DVI blanc, branchez le câble DVI blanc (optionnel) entre votre moniteur et votre
ordinateur.
REMARQUE : Ne branchez pas en même temps les câbles VGA et DVI blanc sur l'ordinateur car tous les moniteurs sont livrés avec le
câble VGA déjà attaché au moniteur.
2. Reliez le câble blanc (DVI Digital) ou bleu (VGA Analogique) du connecteur d'affchage au port vidéo correspondant qui se situe au dos de votre ordinateur. Ne pas
utiliser en même temps les deux câbles dans le même ordinateur. Les deux câbles peuvent être utilisés en même temps dans le seul cas ou ils sont reliés à deux
ordinateurs différents avec les systèmes vidéo appropriés. Branchement du câble VGA bleu
Brancher le câble DVI blanc (optionnel)
ATTENTION : Les illustrations ne sont qu’à titre indicatif seulement. L’apparence de l’ordinateur peut
varier.Connexion de la Soundbar Dell AX510PA (en option)
PRUDENCE : Ne pas utiliser de périphérique autre que la soundbar Dell.
Pour attacher la soundbar :
1. À l'arrière du moniteur, attachez la soundbar en alignant les deux fentes de la soundbar avec les deux crochets situés en bas du moniteur.
2. Faites glisser la soundbar vers la gauche jusqu'à ce qu'elle se mette en place.
3. Connectez la soundbar au connecteur d'alimentation CC de l’adaptateur d’alimentation de la soundbar.
4. Insérez la mini prise stéréo sortant de l'arrière de la soundbar dans le connecteur sortie audio de votre ordinateur.
Retour à la table des matièresRetour à la page de sommaire
Utilisation du moniteur
Guide Utilisateur du moniteur à Dell™ IN1940MW
Allumer le moniteur
Utiliser les commandes du panneau frontal
Utiliser le menu sur écran (OSD)
Réglage de la résolution maximale
Utiliser la Soundbar Dell
Utilisation de l'inclinaison
Allumer le moniteur
Appuyez le bouton pour allumer le moniteur.
Utiliser le Panneau Frontal
Utilisez les boutons sur le panneau frontal du moniteur pour régler les caractéristiques de l'image affchée. Quand vous utilisez ces boutons pour régler les commandes, un OSD affche les
valeurs numériques des caractéristiques que vous modifez.
Boutons sur le panneau frontal Description
1
Touche de raccourci /
Modes de préréglage
Utiliser ce bouton pour choisir parmi différents modes de couleurs préréglés.
2
Touche de raccourci /
Luminosité/Contraste
Utiliser ce bouton pour accéder directement au menu « Luminosité/Contraste ».
3
Menu
Utiliser le bouton MENU pour activer l’affchage à l’écran (OSD) et sélectionner le menu OSD. Voir Accès au système des menus.
4
Quitter
Utiliser ce bouton pour revenir au menu principal ou au menu OSD principal.5
Mise sous tension
(avec voyant de mise
sous tension)
Utiliser le bouton de mise sous tension pour allumer et éteindre le moniteur.
Le voyant blanc indique que le moniteur est allumé et prêt à fonctionner. Le voyant orange indique que le moniteur est en mode
d'économie d’énergie.
Boutons sur le panneau frontal
Utilisez les boutons du panneau avant du moniteur pour régler les paramètres de l’image.
Boutons sur le panneau frontal Description
1
Haut
Utilisez le bouton Haut pour ajuster (augmenter la valeur) des éléments dans le menu OSD.
2
Bas
Utilisez le bouton Bas pour ajuster (baisser la valeur) des éléments dans le menu OSD.
3
OK
Utilisez le bouton OK pour confrmer votre sélection.
4
Retour
Utilisez le bouton Retour pour retourner au menu précédent.Utilisation du menu d’affchage à l’écran (OSD)
Accès au système des menus
REMARQUE : Si l’on accède à un autre menu ou quitte le menu OSD après avoir modifé les paramètres, les modifcations sont sauvegardées automatiquement par le moniteur. Elles sont
également sauvegardées après avoir attendu que le menu OSD disparaisse.
1. Appuyer sur le bouton pour lancer le menu OSD et affcher le menu principal.
Menu principal pour entrée analogique (VGA)ou
Menu principal pour entrée numérique (DVI)
REMARQUE : Le REGLAGE AUTO est disponible uniquement en cas d’utilisation du connecteur analogique (VGA).
2. Appuyer sur les boutons et pour accéder aux différentes options de confguration. En se déplaçant d’une icône à l’autre, le nom de l’option est affché en surbrillance. Se
reporter au tableau suivant pour la liste complète des options disponibles pour le moniteur.
3. Appuyer une fois sur le bouton pour activer l’option en surbrillance.
4. Appuyer sur les boutons et pour sélectionner le paramètre voulu.
5. Appuyer sur pour accéder à la barre de réglage puis utiliser les boutons et , en fonction des indicateurs sur le menu, pour effectuer des modifcations.6. Sélectionner l’option pour revenir au menu principal.
Icône Menu et sous-menus Description
Luminosité/Contraste Utiliser ce menu pour activer la fonction de réglage de luminosité/contraste.
Luminosité La luminosité permet de régler la luminance du rétroéclairage.
Appuyer sur le bouton pour augmenter la luminosité et sur le bouton pour la diminuer (mini. 0 / maxi. 100).
REMARQUE : Le réglage manuel de Luminosité est désactivé lorsque Gestion intelligente de l’énergie est activé.
Contraste Régler la luminosité au préalable puis le contraste uniquement si un réglage supplémentaire s’impose.
Appuyer sur le bouton pour augmenter le contraste et sur le bouton pour le diminuer (mini. 0 / maxi. 100).
La fonction de réglage du contraste permet d’ajuster le rapport des brillances entre parties sombres et claires de l’image sur l’écran.Réglage auto Bien que le moniteur soit reconnu par l’ordinateur au démarrage, la fonction de Réglage Auto optimise les paramètres d’affchage en
fonction de la confguration d’installation propre à chaque utilisateur.
Le Réglage auto permet au moniteur de s’adapter automatiquement au signal vidéo entrant. Après avoir utilisé la fonction Réglage auto, le
réglage du moniteur peut être retouché en utilisant les commandes d’horloge de pixels (grossier) et de phase (fn) sous Paramètres d’image.
REMARQUE : Dans la plupart des cas, la fonction Réglage auto confère la meilleure image possible pour toutes les
confgurations.
REMARQUE : L’option Réglage auto est disponible uniquement en cas d’utilisation du connecteur analogique (VGA).
Source entrée Utiliser le menu Source d’entrée pour effectuer une sélection entre les différents signaux vidéo pouvant être connectés au moniteur.Sélection auto
Appuyez sur pour sélectionner Sélection auto, le moniteur détectera automatiquement soit l'entrée VGA soit l'entrée DVI-D.
VGA
Sélectionner Entrée VGA en cas d’utilisation du connecteur analogique (VGA). Appuyer sur pour sélectionner la source d’entrée VGA.
DVI-D
Sélectionner Entrée DVI-D en cas d’utilisation du connecteur numérique (DVI). Appuyer sur pour sélectionner la source d’entrée DVI.
Réglage des couleurs
Utiliser Paramètres de couleurs pour ajuster le mode de paramétrage des couleurs.
Format entrée couleurs Permet de changer le mode d’entrée vidéo :
RVB : Sélectionnez cette option si votre moniteur est connecté à un ordinateur ou un lecteur de DVD avec le câble VGA et DVI.
YPbPr : Sélectionnez cette option si votre moniteur est connecté à un lecteur de DVD par YPbPr à VGA, ou câble YPbPr à DVI ; ou si le
paramètre de sortie couleur DVD n’est pas RVB.Modes de préréglage Quand vous sélectionnez Modes de préréglage, vous pouvez choisir Standard, Multimédia, Film, Jeux, Texte, Chaud, Froid ou Couleur
Perso dans la liste.
Standard : Permet d’obtenir les réglages par défaut du moniteur. Il s’agit du mode de préréglage par défaut.
Multimédia : Permet d’obtenir les réglages de couleurs adaptés aux applications multimédia.
Film : Permet d’obtenir les réglages de couleurs adaptés aux flms.
Jeux : Permet d’obtenir les réglages de couleurs adaptés à la plupart des applications de jeux.
Texte : Charge les réglages de luminosité et de netteté idéaux pour affcher les textes.
Chaud : Augmente la température des couleurs. L’écran affche des teintes plus chaudes avec des tons rouges/jaunes.
Froid : Diminue la température des couleurs. L’écran affche des teintes plus froides avec un ton bleuté.
Couleur Perso : Permet de paramétrer manuellement les couleurs. Agir sur les boutons et pour régler les valeurs des trois
couleurs (rouge, vert, bleu) et défnir un mode de préréglage des couleurs personnalisé. Hue Cette fonction permet de changer la teinte des images vidéo sur vert ou violet. Elle sert à obtenir le ton couleur chair souhaité. La teinte peut
être réglée de « 0 » à « 100 ».
Appuyer sur pour renforcer la nuance de vert de l’image vidéo.
Appuyer sur pour renforcer la nuance de violet de l’image vidéo.
REMARQUE : L’ajustement de la teinte n’est disponible que lorsque vous sélectionnez un mode de préréglage Film ou Jeux.
Saturation Cette fonction permet de régler la saturation des couleurs pour les images vidéo. La saturation peut être réglée de «0 » à « 100 ».
Appuyer sur pour renforcer l’aspect monochrome de l’image vidéo.
Appuyer sur pour renforcer l’aspect coloré de l’image vidéo.
REMARQUE : L’ajustement de la saturation n’est disponible que lorsque vous sélectionnez un mode de préréglage Film ou Jeux.Réinit. param.couleur Rétablit les paramètres de couleurs d’origine du moniteur.
Paramètres affchage La fonction Paramètres d’affchage permet de régler l’image.
Proportions Ajuste le format en Wide 16:10, 5:4 ou 4:3.
Position horizontale
Utiliser ou pour ajuster la position de l’image à gauche ou à droite. La valeur minimale de réglage est « 0 » (-). La valeur
maximale de réglage est « 100 » (+).
Position verticale
Utiliser ou pour ajuster la position de l’image vers le haut ou le bas. La valeur minimale de réglage est « 0 » (-). La valeur
maximale de réglage est « 100 » (+).
Finesse
Cette fonction permet de d’obtenir une image plus nette ou plus douce. Utiliser ou pour régler la netteté de « 0 » à « 100 ».
Horloge pixels Les réglages de phase et d’horloge de pixels permettent de régler le moniteur à la convenance de l’utilisateur.
Utiliser ou pour obtenir la meilleure qualité d’image possible.Phase Si des résultats satisfaisants ne sont pas obtenus par le réglage de phase, utiliser le réglage d’horloge de pixels (grossier) puis de nouveau le
réglage de phase (fn).
REMARQUE : Les réglages d’horloge et de phase sont disponibles uniquement pour les entrées « VGA ».
Réinit. tous Param.
Affchage
Sélectionner cette option pour rétablir les paramètres d’affchage par défaut.
Autres paramétrages Sélectionner cette option pour régler les paramètres de l’OSD, comme la langue affchée, la durée pendant laquelle le menu reste affché à
l’écran, etc.
Langue Cette option permet de choisir une des huit langues disponibles (Anglais, Espagnol, Français, Allemand, Portugais brésilien, Russe, Chinois
simplifé ou Japonais) pour l’affchage de l’OSD.
Transparence menu
Sélectionner cette option pour modifer la transparence du menu en appuyant sur le 1er ou le 2ème bouton (Mini.: 0 ~ Maxi.: 100).
Minuteur du menu Durée d’activation de l’OSD : Défnit la durée pendant laquelle l’OSD restera activé après avoir pressé un bouton.
Utiliser ou pour déplacer le curseur par incréments de 1 secondes, de 5 à 60 secondes.Verrou du menu Permet de contrôler l’accès des utilisateurs aux réglages. Lorsque Verrouillage est sélectionné, aucun réglage de la part des utilisateurs n’est
autorisé. Tous les boutons sont verrouillés .
REMARQUE : Lorsque l’OSD est verrouillé, et si le bouton « menu » est pressé, l’utilisateur est ramené directement au menu de
paramétrage de l’OSD, avec la fonction de verrouillage de l’OSD sélectionnée. Sélectionner « Déverrouiller » pour obtenir le déverrouillage et
permettre à l’utilisateur d’accéder à tous les paramètres applicables.
Gestion intelligente de
l’énergie
Pour activer ou désactiver la réduction dynamique du rétro-éclairage.
La fonction de réduction dynamique du rétro-éclairage réduit automatiquement le niveau de luminosité de l’écran lorsque l’image affchée
contient une forte proportion de zones lumineuses.
DDC/CI La fonction DDC/CI (Canal de données d’affchage/Interface de commande) permet de contrôler les paramètres réglables (luminosité, équilibre
des couleurs, etc.) via le logiciel d’un ordinateur. Cette fonction peut être désactivée en sélectionnant « Désactiver ».
Cette fonction est destinée aux utilisateurs les plus expérimentés et à optimiser les performances du moniteur.
Conditionement LCD Contribue à réduire les cas mineurs de rémanence de l’image. Le programme peut mettre un certain temps pour fonctionner, suivant le degré
de rémanence de l’image. Cette fonction peut être activée en sélectionnant « Activer ».Réinitialisation Rétablit tous les paramètres de réglage de l’OSD aux valeurs d’usine.
Personnaliser Les utilisateurs peuvent choisir une fonction parmi « Modes de préréglage », « Luminosité/Contraste », « Réglage auto », « Source entrée », «
Proportions » et la défnir comme touche de raccourci.REMARQUE : Ce moniteur comporte une fonctionnalité intégrée pour calibrer automatiquement la luminosité et compenser le vieillissement de DEL.Messages d’avertissement OSD
Lorsque la fonction Gestion intelligente de l’énergie est activée (dans ces modes de préréglage : Film ou Jeux), le réglage manuel de la luminosité est désactivé.
L'un des messages d'avertissement suivants peut apparaître à l'écran indiquant que le moniteur est hors des limites de synchronisation :
Cela signife que l'écran ne peut pas se synchroniser avec le signal reçu depuis l'ordinateur. Voir Spécifcations du moniteur pour connaître les limites des fréquences
Horizontale et Verticale adressables par ce moniteur. Le mode recommandé est de 1440 x 900.
Vous verrez le message suivant avant que la fonction DDC/CI ne soit désactivée.Lorsque le moniteur entre en mode d’Economie d’énergie, le message suivant s’affche :
Activez l’ordinateur et réveillez le moniteur pour obtenir l'accès à l’OSD
Si vous appuyez sur un des boutons autre que le bouton d'alimentation, l'un des messages suivants apparaît selon l'entrée choisie :
Entrée VGA/DVI-DSi l'entrée VGA ou DVI-D est sélectionnée et si les deux câbles VGA et DVI-D ne sont pas connectés, une boîte de dialogue fottante comme illustrée ci-dessous apparaît.
ou
Voir Solutions des problèmes pour plus d'informations.Réglage de la résolution maximale
Pour régler le moniteur sur la résolution maximale:
Sous Windows Vista® ou Windows® 7:
1. Faites un clic-droit sur le bureau et sélectionnez Personnalisation.
2. Cliquez sur Modifer les paramètres d’affchage.
3. Déplacez le curseur vers la droite en maintenant enfoncé le bouton gauche de la souris afn de régler la résolution de l’écran sur 1440 x 900.
4. Cliquez sur OK.
Si vous ne voyez pas l'option 1440 x 900, vous avez peut-être besoin de mettre à jour votre pilote graphique. Selon votre ordinateur, menez à bien l'une des procédures suivantes :
Si vous avez un ordinateur de bureau ou portable Dell :
Allez sur le site support.dell.com, saisissez l'identifant de dépannage, et téléchargez le dernier pilote pour votre carte graphique.
Si vous utilisez un ordinateur d'une marque autre que Dell (portable ou de bureau) :
Allez sur le site de support de votre ordinateur et téléchargez les derniers pilotes graphiques.
Allez sur le site de support de votre carte et téléchargez les derniers pilotes graphiques.Utiliser la Soundbar Dell
La Soundbar Dell est un système deux voies stéréo qui peut se monter sur les écrans plats Dell. La Soundbar possède une molette de contrôle du volume et un contrôle Marche/Arrêt pour
ajuster le niveau général du système, une diode bleue indiquant la mise sous tension et deux prises audio pour casque.
1. Mécanisme de fxation
2. Commande d'alimentation/volume
3. Connecteurs pour écouteurs
4. Témoin d'alimentationUtilisation de l'inclinaison
Inclinaison
Vous pouvez incliner le moniteur à l’angle d’affchage le plus confortable.
REMARQUE : La base est détachée lorsque l'écran est livré depuis l'usine.
Retour à la page de sommaireRetour à la Table des Matières
Dépannage
Guide de l’Utilisateur de l’Écran Large Dell™ IN1940MW
Test-Auto
Problèmes généraux
Problèmes spécifques au produit
Dell Soundbar Problems
AVERTISSEMENT : Avant de débuter quelque procédure que ce soit de cette section, suivez les
Consignes de sécurité.
Test-Auto
Votre écran dispose d’une fonction de test automatique qui vous permet de vérifer la fonctionnalité de votre écran. Pour exécuter le test automatique de votre moniteur,
procédez comme suit :
1. Eteignez votre ordinateur et le moniteur.
2. Débranchez le câble vidéo à l'arrière de l'ordinateur. Afn de vous assurer du bon fonctionnement du test automatique, déconnectez le câble vidéo (VGA ou DVI-D) de
l’arrière de l’ordinateur.
3. Rallumez le moniteur.
4. Une boîte de dialogue fottante apparaît à l’écran.
REMARQUE :En fonction de l’entrée sélectionnée, une des boîtes de dialogue apparaît à l’écran.
REMARQUE :La boîte de dialogue apparaîtra également si le câble vidéo est déconnecté ou endommagé.
REMARQUE : Le témoin d’alimentation sur l’écran est blanc continu pendant le test automatique. L’écran entre en Mode d’économie d’énergie après 5 minutes
s’il est laissé en mode de test automatique.
ou 5. Éteignez votre écran et reconnectez le câble vidéo approprié.
6. Allumez votre ordinateur moniteur et l’écran.s
REMARQUE : Si aucune vidéo n’apparaît sur votre écran après avoir effectué le test automatique, il pourrait y avoir un problème avec la carte graphique. Contactez le
fabricant de votre ordinateur pour une assistance.
Diagnostiques intégrés
Votre moniteur a un outil de diagnostic intégré qui vous aide à déterminer si l’anomalie d’écran que vous avez est un problème inhérent avec votre moniteur, ou avec votre
ordinateur et carte vidéo.
Pour exécuter les diagnostics intégrés :
1. Assurez-vous que l'écran est propre (pas de particules de poussière sur la surface de l'écran).
2. Débranchez le câble vidéo à l'arrière de l'ordinateur ou du moniteur. Le moniteur alors va dans le mode test automatique.
3. Sur le panneau avant, appuyez et maintenez enfoncé les touches Touche de raccourci 1 et Touche de raccourci 4 du panneau avant, simultanément pendant 2
secondes. écran gris apparaît.
4. Examinez soigneusement l'écran pour des anomalies.
5. Appuyez de nouveau sur la touche Touche de raccourci 4 du panneau avant. La couleur de l'écran change à rouge.
6. Examinez l'écran pour des anomalies quelconques.
7. Répétez les étapes 5 et 6 pour inspecter l'écran avec les couleurs vert, bleu, noir et blanc et du texte.
Le test est terminé quand l'écran blanc apparaît. Pour quitter, appuyez de nouveau sur la touche Touche de raccourci 4.
REMARQUE : Si vous de détectez aucune anormalité de l’écran pendant les diagnostics intégrés, l’écran fonctionne normalement. Il pourrait y avoir un problème avec la carte
graphique. Contactez le fabricant de votre ordinateur pour une assistance.Problèmes généraux
Le tableau suivant contient des informations générales relatives aux problèmes courants du moniteur.
SYMPTÔMES COURANTS QUE SE PASSE-T-IL SOLUTIONS POSSIBLES
Pas de données vidéo/voyant
d'alimentation éteint
Pas d'image, moniteur « mort » Vérifez l'état de la connexion aux deux extrémités du câble vidéo.
Vérifez le bon fonctionnement de la prise de courant murale en utilisant d'autres équipements
électriques.
Assurez-vous que le bouton d'alimentation est complètement enfoncé.
Pas de données vidéo/voyant
d'alimentation éteint
Pas d'image ni de luminosité Augmentez les valeurs de luminosité et de contraste via le menu OSD.
Effectuez la procédure de test automatique du moniteur.
Recherchez d'éventuelles broches tordues ou endommagées sur le connecteur du câble vidéo.
Presser le bouton 5 situé au dessus du bouton d'alimentation, s'assurer que la bonne source
d'entrée est choisie via le bouton de Choix de source d'entrée.
Exécutez le diagnostic intégré.
Mise au point mauvaise L'image est foue, trouble, voilée Effectuez le réglage automatique via le menu OSD.
Ajustez les valeurs de Phase et de Horloge pixel via le menu OSD.
Supprimez les câbles d'extension vidéo.
Réinitialisez le moniteur aux paramètres de l'usine.
Diminuez la résolution vidéo au format correct (16:10).
Vidéo tremblante/vacillante Image comportant des vagues ou
un léger mouvement
Effectuez le réglage automatique via le menu OSD.
Ajustez les valeurs de Phase et de Horloge pixel via le menu OSD.
Réinitialisez le moniteur aux paramètres de l'usine.
Vérifez l'environnement du moniteur.
Déplacez le moniteur et vérifez-le dans une autre pièce.
Absence de pixels L'écran LCD comporte des points
noirs
Éteignez puis rallumez l'écran.
Le pixels qui restent éteints en permanence sont un défaut naturel se produisant dans la
technologie LCD.
Pour plus d'informations sur la Qualité des moniteurs Dell et la Politique sur les pixels, voir le site de
Support de Dell à l'adresse : support.dell.com.
Pixels fxes L'écran LCD comporte des points
noirs
Éteignez-le, puis rallumez-le
Il s'agit de pixels qui restent allumés en permanence, c'est un défaut naturel se produisant
dans la technologie LCD
Pour plus d'informations sur la Qualité des moniteurs Dell et la Politique sur les pixels, voir le site de
Support de Dell à l'adresse : support.dell.com.
Problèmes de luminosité Image trop terne ou trop
lumineuse
Réinitialisez le moniteur aux paramètres de l'usine.Effectuez le réglage automatique via le menu OSD.
Réglez les valeurs de luminosité et de contraste via le menu OSD.
Distorsion géométrique Image mal centrée Réinitialisez le moniteur aux paramètres de l'usine.
Effectuez le réglage automatique via le menu OSD.
Réglez les valeurs de luminosité et de contraste via le menu OSD.
REMARQUE : Lors de l'utilisation de 'DVI-D', les réglages de la position ne sont pas disponibles.
Lignes horizontales/verticales L'écran comporte une ou plusieurs
ligne(s)
Réinitialisez le moniteur aux paramètres de l'usine.
Effectuez le réglage automatique via le menu OSD.
Ajustez les valeurs de Phase et de Horloge pixel via le menu OSD.
Effectuez la procédure de test automatique du moniteur pour déterminer si l'écran reste
brouillé en mode de test automatique.
Recherchez d'éventuelles broches tordues ou endommagées sur le connecteur du câble vidéo.
REMARQUE : Lors de l'utilisation de 'DVI-D', les réglages du Horloge Pixel et Phase ne sont pas
disponibles.
Problèmes de synchronisation L'écran est brouillé ou semble
déchiré
Réinitialisez le moniteur aux paramètres de l'usine.
Effectuez le réglage automatique via le menu OSD.
Ajustez les valeurs de Phase et de Horloge pixel via le menu OSD.
Effectuez la procédure de test automatique du moniteur pour déterminer si l'écran reste
brouillé en mode de test automatique.
Recherchez d'éventuelles broches tordues ou endommagées sur le connecteur du câble vidéo.
Redémarrez l'ordinateur en mode sans échec.
Problèmes relatifs à la sécurité Signes visibles de fumée ou
d'étincelles
N'effectuez aucune procédure de dépannage.
Contacter Dell immédiatement.
Problèmes intermittents Mauvais fonctionnement de la
commande marche/arrêt
Vérifez l'état de la connexion aux deux extrémités du câble vidéo.
Réinitialisez le moniteur aux paramètres de l'usine.
Effectuez la procédure de test automatique du moniteur pour déterminer si le problème
intermittent se produit en mode de test automatique.
Couleur absente Couleur absente de l'image Effectuez la procédure de test automatique du moniteur.
Vérifez l'état de la connexion aux deux extrémités du câble vidéo.
Recherchez d'éventuelles broches tordues ou endommagées sur le connecteur du câble vidéo.Mauvaise couleur La couleur de l'image est
mauvaise
Sélectionnez Utilisateur pour régler la couleur
Réglez les valeurs R/V/B en mode Utilisateur
Rémanence d'une image statique
laissée sur le moniteur pendant
une longue période de temps
Légère ombre de l'affchage
statique qui apparaît à l'écran
Changez le Mode param. couleur dans le menu OSD Paramètres couleur sur Images ou Vidéo
selon l'application.
Essayez différents paramètres prédéfnis de couleur dans le menu OSD Paramètres couleur.
Réglez la valeur R/V/B dans le menu OSD Paramètres couleur si la Gestion des couleurs est
désactivée.
Changez le Format couleur en entrée sur PC RVB ou YPbPr dans le menu OSD Paramètres
avancés.
Rétention d'image (À partir d'une
image statique)
Une ombre faible à partir d'une
image statique apparaît sur l'écran
Utiliser la fonctionnalité de gestion de l'alimentation pour éteindre le moniteur à tout moment
quand vous ne l'utilisez pas (pour plus d'informations, voir Modes d'économie d'énergie).
Vous pouvez également utiliser un écran de veille qui change dynamiquement.
Problèmes spécifques au produit
Symptômes spécifques Description du problème Solutions possibles
L'image à l'écran est trop petite. L'image est centrée à l'écran mais
n'occupe pas toute la zone de vision.
Effectuer la réinitialisation du moniteur sur Réinitialisation usine.
Impossible de régler le moniteur avec
les boutons situés sur le panneau
frontal.
L'OSD n'apparaît pas à l'écran. Eteignez le moniteur, débranchez le cordon d'alimentation puis
rebranchez-le et rallumez le moniteur.
L'image ne remplit pas tout l'écran. L'image ne peut pas remplir la hauteur
ou la largeur de l'écran
En raison des différents formats vidéo (proportions) des DVD, le
moniteur peut ne pas s'affcher en plein écran.
Exécutez le diagnostic intégré.
REMARQUE :Lorsque vous choisissez le mode DVI-D, la fonction Réglage auto n'est pas disponible.
Problèmes liés à la Soundbar Dell™
Symptômes courants Description du problème Solutions possibles
Aucun son du système de l'endroit
où la Soundbar est alimentée par
l'adaptateur secteur
Pas d'alimentation à la Soundbar - le
témoin d'alimentation est éteint.
Faites tourner le bouton Alimentation/Volume sur la Soundbar dans le
sens horaire à une position moyenne; vérifez si le témoin d'alimentation
(LED Blanche) situé sur l'avant de la Soundbar est allumé.
Assurez-vous que le câble d'alimentation de la Soundbar est branché dans
l'adaptateur.Pas de son La Soundbar est alimentée - le
témoin d'alimentation est allumé
Branchez le câble d'entrée ligne audio dans la prise sortie audio de
l'ordinateur.
Réglez tous les contrôles du volume aux valeurs maximums et assurezvous que la fonction Muet n'est pas activée.
Effectuez la lecture de quelques fchiers audio sur l'ordinateur (par
exemple CD de musique, ou MP3).
Faites tourner le bouton Alimentation/Volume de la Soundbar dans le
sens horaire pour augmenter le volume.
Nettoyez et rebranchez la fche entrée ligne audio.
Testez la Soundbar en utilisant une autre source audio (par exemple :
lecteur de CD portable, lecteur MP3).
Son déformé La carte son de l'ordinateur est
utilisée comme source audio
Eliminez tous les obstacles séparant la Soundbar de l'utilisateur.
Assurez-vous que la fche entrée ligne audio est complètement insérée
dans la prise de la carte son.
Réglez tous les contrôles du volume de Windows aux valeurs moyennes.
Diminuez le volume de l'application audio.
Faites tourner le bouton Alimentation/Volume de la Soundbar dans le
sens anti-horaire pour baisser le volume.
Nettoyez et rebranchez la fche entrée ligne audio.
Effectuez un dépannage de la carte son de l'ordinateur.
Testez la Soundbar en utilisant une autre source audio (par exemple
lecteur de CD portable, lecteur MP3).
Evitez d'utiliser un câble de rallonge audio ou un convertissement de prise
audio.
Son déformé Une autre source audio est utilisée Eliminez tous les obstacles séparant la Soundbar de l'utilisateur.
Assurez-vous que la fche entrée ligne audio est complètement insérée
dans la prise de la source audio.
Diminuez le volume de la source audio.
Faites tourner le bouton Alimentation/Volume de la Soundbar dans le
sens anti-horaire pour baisser le volume.
Nettoyez et rebranchez la fche entrée ligne audio.
Sortie son déséquilibrée Sortie son provenant d'un seul côté
de la Soundbar
Eliminez tous les obstacles séparant la Soundbar de l'utilisateur.
Assurez-vous que la fche entrée ligne audio est complètement insérée
dans la prise de la carte son ou de la source audio.
Réglez tous les contrôles de balance audio (G-D) de Windows à une
valeur moyenne.
Nettoyez et rebranchez la fche entrée ligne audio.
Effectuez un dépannage de la carte son de l'ordinateur.
Testez la Soundbar en utilisant une autre source audio (par exemple :
lecteur de CD portable, lecteur MP3).
Volume Bas Le volume est trop bas Eliminez tous les obstacles séparant la Soundbar de l'utilisateur.
Faites tourner le bouton Alimentation/Volume de la Soundbar dans le
sens horaire pour augmenter le volume au maximum.
Réglez tous les contrôles du volume de Windows aux valeurs maximums.
Augmentez le volume de l'application audio.
Testez la Soundbar en utilisant une autre source audio (par exemple
lecteur de CD portable, lecteur MP3).
Retour à la Table des MatièresRetour à la Table des Matières
Appendice
Guide de l’Utilisateur de l’Écran Large Dell™ IN1940MW
Consignes de Sécurité
Déclaration de la FCC (Etats-Unis seulement) et autres informations règlementaires
Contacter Dell
AVERTISSEMENT: Consignes de Sécurité
AVERTISSEMENT: Respectez les directives de sécurité indiquées ci-dessous pour votre sécurité et pour protéger votre ordinateur et votre
environnement de travail contre tout dommage.
Respectez les directives de sécurité indiquées ci-dessous pour votre Pour des informations sur les consignes de sécurité, consultez le Guide d’information sur le produit.
Déclaration de la FCC (Etats-Unis seulement) et autres informations règlementaires
Pour la déclaration de la FCC et les autres informations règlementaires, visitez le site Web suivant sur la conformité : http://www.dell.com/regulatory_compliance.Contacter Dell
Pour les clients aux Etats-Unis, appelez le 800-WWW-DELL (800-999-3355).
REMARQUE: Si vous n’avez pas de connexion Internet active, vous pouvez trouver l’information pour nous contacter sur votre facture d’achat, votre bordereau
d’emballage, votre relevé ou le catalogue des produits Dell.
Dell offre plusieurs options de services et d’assistance téléphonique et en ligne. Leur disponibilité est différente suivant les pays et les produits, et
certains services peuvent ne pas vous être offerts dans votre région. Pour contacter Dell pour les ventes, l’assistance technique, ou les questions de
service à la clientèle:
1. Consultez support.dell.com.
2. Vérifer votre pays ou région dans le menu déroulant Choisir un Pays /Région au bas de la page.
3. Cliquez sur Nous contacter sur la page à gauche.
4. Sélectionnez le lien adéquat du service ou de l’assistance requise.
5. Choisissez la méthode pour contacter Dell qui vous convient le mieux.
Retour à la Table des MatièresRetour à la Table des Matières
Installation de votre moniteur
Guide de l’Utilisateur de l’Écran Large Dell™ IN1940MW
Instructions importantes pour défnir la résolution d'affchage sur 1440 x 900
(Maximum)
Pour obtenir des performances optimales avec les systèmes d'exploitation Microsoft Windows®, défnissez la résolution 1440 x 900 pixels en procédant comme suit :
Dans Windows Vista® ou Windows® 7 :
1. Cliquez avec le bouton droit sur le bureau et sélectionnez Personnalisation.
2. Cliquez sur Modifer les paramètres d'affchage.
3. Déplacez le curseur vers la droite en appuyant sur le bouton gauche de la souris et en le maintenant enfoncé et sélectionnez la résolution d'écran 1440 x 900.
4. Cliquez sur OK.
Si l'option 1440 x 900 n'apparaît pas, vous devez mettre à jour le pilote graphique. Ci-dessous, choisissez le scénario qui décrit le mieux l'ordinateur que vous
utilisez et suivez les instructions fournies :
1: Si vous avez un ordinateur de bureau Dell™ ou un ordinateur portable Dell™ avec accès à Internet.
2: Si vous avez un ordinateur de bureau, portable ou une carte graphique non Dell™.
Retour à la Table des MatièresRetour à la Table des Matières
Installation de votre moniteur
Guide de l’Utilisateur de l’Écran Large Dell™ IN1940MW
Si vous avez un ordinateur de bureau Dell™ ou un ordinateur portable Dell™ avec
accès à Internet
1. Allez sur http://support.dell.com, saisissez votre tag de service et téléchargez le dernier pilote pour votre carte graphique.
2. Après installation des pilotes pour votre Adaptateur Graphique, essayez de nouveau de confgurer la résolution sur 1440 x 900.
REMARQUE: Si vous n'arrivez pas à confgurer la résolution sur 1440 x 900, veuillez contacter Dell™ pour demander un Adaptateur Graphique qui prend en charge
ces résolutions.
Retour à la Table des MatièresRetour à la Table des Matières
Installation de votre moniteur
Guide de l’Utilisateur de l’Écran Large Dell™ IN1940MW
Si vous avez un ordinateur de bureau, portable ou une carte graphique non Dell™.
Dans Windows Vista® ou Windows® 7 :
1. Cliquez avec le bouton droit sur le bureau et sélectionnez Personnalisation.
2. Cliquez sur Modifer les paramètres d'affchage.
3. Cliquez sur Paramètres avancés.
4. Identifez le fournisseur du contrôleur graphique dans la description située dans la partie supérieure de la fenêtre (ex. :. NVIDIA, ATI, Intel, etc.).
5. Reportez-vous au site Web du fournisseur de la carte graphique pour obtenir la dernière version du pilote (par exemple,http://www.ATI.com OU
http://www.NVIDIA.com).
6. Après avoir installé le pilote de la carte graphique, défnissez de nouveau la résolution 1440 x 900.
REMARQUE:Si vous n'y parvenez pas, contactez le fabricant de l'ordinateur ou achetez une carte graphique qui prend en charge la résolution 1440 x
900.
Retour à la Table des Matières
ALIENWARE®
M17x MOBILE MANUALNotes, Cautions, and Warnings
NOTE: A NOTE indicates important information that helps you make better use of your computer.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how
to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
This item incorporates copy protection technology that is protected by U.S. patents and other intellectual property
rights of Rovi Corporation. Reverse engineering and disassembly are prohibited.
__________________
The contents herein are subject to change without notice.
© 2010-2012 Dell Inc. All rights reserved.
Reproduction of these materials in any manner whatsoever without the prior written permission of Dell Inc. is
strictly prohibited.
Trademarks used in this manual: Alienware®
, AlienFX®
, and the AlienHead logo are trademarks or registered
trademarks of Alienware Corporation; Dell™ is a trademark of Dell Inc.; Microsoft®
, Windows®
, and the Windows
start button logo are either trademarks or registered trademarks of Microsoft Corporation in the United
States and/or other countries; Intel®
and SpeedStep®
are registered trademarks and Core™ is a trademark of
Intel Corporation in the U.S. and other countries; Blu‑ray Disc™ is a trademark of the Blu‑ray Disc Association;
Bluetooth®
is a registered trademark owned by Bluetooth SIG, Inc.
Other trademarks and trade names may be used in this manual to refer to either the entities claiming the marks
and names or their products. Dell Inc. disclaims any proprietary interest in trademarks and trade names other
than its own.
Regulatory model: P11E Regulatory type: P11E001
Rev. A01 January 20123
CHAPTER 1: SETTING UP YOUR LAPTOP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9
Before Setting Up Your Laptop . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10
Connect the AC Adapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Press the Power Button . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13
Connect the Network Cable (Optional) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14
Set Up Microsoft Windows . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15
Set Up WirelessHD (Optional) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16
Set Up Wireless Display (Optional) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Connect to the Internet (Optional) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18
CHAPTER 2: GETTING TO KNOW YOUR LAPTOP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Left View Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .22
Right View Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .25
Back View Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .27
Display Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Computer Base and Keyboard Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Status Lights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Media Control Keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
CONTENTS4
CONTENTS
Power Button . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Function Keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
CHAPTER 3: USING YOUR LAPTOP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Alienware Command Center . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
Connecting External Displays . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
Using Removable Media and Cards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Using the Optical Drive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
Using the Integrated Camera . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
Using the Wireless Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
Battery Pack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .47
Power Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
nVidia Optimus Technology (Optional) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Free Fall Sensor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .52
Configuring the BIOS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
CHAPTER 4: INSTALLING AND REPLACING COMPONENTS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .67
Before You Begin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
Replacing the Battery Pack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .72
Upgrading or Replacing Memory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .74
Upgrading or Replacing the Hard Drive(s) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .785
CONTENTS
CHAPTER 5: TROUBLESHOOTING . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
Basic Hints and Tips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
Backup and General Maintenance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .87
Software Diagnostic Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
Answers to Common Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
CHAPTER 6: SYSTEM RECOVERY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
AlienRespawn . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
My Dell Downloads . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .102
CHAPTER 7: SPECIFICATIONS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .103
APPENDIX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
GENERAL AND ELECTRICAL SAFETY PRECAUTIONS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .120
CONTACTING ALIENWARE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12367
Dear Valued Alienware Customer,
Welcome to the Alienware family. We are thrilled to include you among the growing number
of savvy high‑performance computer users.
The Alienware technicians who have crafted your machine have made certain that your highperformance system is properly optimized and performs to its fullest potential. We build
machines with one single unwavering purpose: Build It As If It Were Your Own. The technicians
will not rest until your new machine meets or exceeds our very demanding criteria!
We have tested your machine extensively in order to ensure that you enjoy the highest levels
of performance. In addition to a standard burn‑in period, your system has been evaluated
using real‑world tools such as synthetic performance benchmarks.
We invite you to share your experience with your new high‑performance computer with us, so
please do not hesitate to either e-mail or call Alienware with any questions or concerns. The
entire staff shares your enthusiasm for new technology and we hope that you enjoy using
your new computer as much as Alienware enjoyed building it for you.
Sincerely,
Alienware Staff8CHAPTER 1: SETTING UP YOUR LAPTOP
CHAPTER 1:
SETTING UP YOUR LAPTOPCHAPTER 1: SETTING UP YOUR LAPTOP
10
Before Setting Up Your Laptop
Congratulations on the purchase of your Alienware M17x!
Read all safety and setup instructions before connecting your new laptop. Begin by carefully
opening the box and removing all components that were shipped to you.
Before setting up your laptop or components, see the included invoice to verify that all items
ordered are present and be sure to inspect all items for any physical damage that may have
occurred during shipment. Report any missing components or damaged items to customer
service within 5 days of receiving the shipment. Anything reported missing or damaged after
the first 5 days of receiving a shipment will not be honored. Some of the most common items
to check for include:
• Laptop and AC adapter with power cable
• Microsoft CD‑key located at the bottom of the laptop
• Monitor with power cable and video cable (if ordered)
• Keyboard (if ordered)
• Mouse (if ordered)
• Multimedia speakers and sub‑woofer (if ordered)
• Joystick controllers (if ordered)
You may also need a small flathead and/or a Phillips head screwdriver for connecting peripheral
cables to the laptop.CHAPTER 1: SETTING UP YOUR LAPTOP
11
Product Documentation and Media
The documentation that ships with your Alienware laptop is designed to provide answers to
many of the questions that may arise as you explore your new laptop’s capabilities. You may see
the documentation for technical information or general use as needed to answer questions in
the future, or aid you in finding answers and solutions. The media included with your laptop
is referenced in some sections of the documentation and may be needed to complete certain
tasks. As always, our technical support staff is available to assist you.
Placing Your Laptop
WARNING: Do not place the laptop near or over a radiator or heating vent. If your laptop
is placed in a cabinet, ensure that adequate ventilation is provided. Do not place the
laptop in a humid location or in any area where the laptop may be exposed to rain or
water. Be careful not to spill liquid of any kind on or into the laptop.
When placing your laptop, ensure that:
• It is placed on a surface that is both level and stable.
• The power and other cable connectors are not jammed between the laptop and a wall –
or any other object.
• Nothing obstructs airflow in front of, behind, or below the laptop.
• The laptop has enough room so that optical drives and other external storage drives can
be easily accessed.CHAPTER 1: SETTING UP YOUR LAPTOP
12
Connect the AC Adapter
WARNING: The AC adapter works with electrical outlets worldwide. However, power
connectors and power strips vary among countries. Using an incompatible cable or
improperly connecting the cable to a power strip or electrical outlet may cause fire or
equipment damage.CHAPTER 1: SETTING UP YOUR LAPTOP
13
Press the Power ButtonCHAPTER 1: SETTING UP YOUR LAPTOP
14
Connect the Network Cable (Optional)CHAPTER 1: SETTING UP YOUR LAPTOP
15
Set Up Microsoft Windows
Your computer is preconfigured with the Microsoft Windows operating system. To set up
Windows for the first time, follow the instructions on the screen. These steps are mandatory
and may take some time to complete. The Windows setup screens will take you through
several procedures including accepting license agreements, setting preferences, and setting
up an Internet connection.
CAUTION: Do not interrupt the operating system’s setup process. Doing so may render
your computer unusable and you will need to reinstall the operating system.
NOTE: For optimal performance of your computer, it is recommended that you
download and install the latest BIOS and drivers for your computer available at
support.dell.com.
NOTE: For more information on the operating system and features, see
support.dell.com/MyNewDell.
NOTE: It is recommended that you create a full system backup as soon as you set up
Microsoft Windows.CHAPTER 1: SETTING UP YOUR LAPTOP
16
Set Up WirelessHD (Optional)
The WirelessHD feature allows you to share high-definition video from your computer display
to a TV without the use of cables. To set up WirelessHD, use a WirelessHD kit. For instructions
on setting up WirelessHD, see the document that shipped with your WirelessHD kit.
NOTE: The WirelessHD kit does not ship with your computer and must be purchased
separately.
If your computer supports the WirelessHD feature, the WiHD Application Controller icon
will be available on the Windows desktop.
NOTE: You may have to set up WirelessHD kit before you set up WirelessHD. For more
information on setting up the WirelessHD kit, see the document that shipped with the
WirelessHD kit.
To set up WirelessHD:
1. Turn on your computer.
2. Ensure that wireless is enabled on your computer.
3. Double‑click the WiHD Application Controller icon on the desktop.
The WirelessHD Application Controller window appears.
4. Follow the instructions on screen.CHAPTER 1: SETTING UP YOUR LAPTOP
17
Set Up Wireless Display (Optional)
NOTE: The wireless display feature may not be supported on all computers. For information
about the hardware and software requirements for setting up wireless display, see
www.intel.com.
NOTE: The wireless display feature is available on your computer only if you ordered an
Intel Wi‑Fi WLAN card and nVidia graphics card with Optimus technology or AMD Radeon
graphics card at the time of purchase.
NOTE: It is recommended to use WirelessHD instead of wireless display for
graphic-intense applications such as high-definition gaming. For more information, see
“Set Up WirelessHD (Optional)” on page 16.
The Intel wireless display feature allows you to share your computer display to a TV without
the use of cables. You must connect a wireless display adapter to your TV before setting up
wireless display.
NOTE: The wireless display adapter does not ship with your computer and must be
purchased separately.
NOTE: For information on setting up the wireless display, see the document that shipped
with the wireless display adapter.CHAPTER 1: SETTING UP YOUR LAPTOP
18
Connect to the Internet (Optional)
Setting Up a Wired Connection
• If you are using a dial‑up connection, connect the telephone line to the optional external
USB modem and to the telephone wall jack before you set up your Internet connection.
• If you are using a DSL or cable/satellite modem connection, contact your ISP or cellular
telephone service for setup instructions.
To complete setting up your wired Internet connection, follow the instructions in “Setting Up
Your Internet Connection” on page 20.CHAPTER 1: SETTING UP YOUR LAPTOP
19
Setting Up a Wireless Connection
NOTE: To set up your wireless router, see the documentation that shipped with your
router.
Before you can use your wireless Internet connection, you need to connect to your wireless
router.
To set up your connection to a wireless router:
1. Ensure that wireless is enabled on your computer.
2. Save and close any open files, and exit any open programs.
3. Click Start → Control Panel.
4. In the search box, type network, and then click Network and Sharing Center→ Connect
to a network.
5. Follow the instructions on the screen to complete the setup.CHAPTER 1: SETTING UP YOUR LAPTOP
20
Setting Up Your Internet Connection
ISPs and ISP offerings vary by country. Contact your ISP for offerings available in your
country.
If you cannot connect to the Internet but have successfully connected in the past, the Internet
Service Provider (ISP) might have a service outage. Contact your ISP to check the service
status, or try connecting again later.
Have your ISP information ready. If you do not have an ISP, the Connect to the Internet wizard
can help you get one.
1. Save and close any open files, and exit any open programs.
2. Click Start → Control Panel.
3. In the search box, type network, and then click Network and Sharing Center→ Set up a
new connection or Network→ Connect to the Internet.
The Connect to the Internet window appears.
NOTE: If you do not know which type of connection to select, click Help me choose or
contact your ISP.
4. Follow the instructions on the screen and use the setup information provided by your ISP
to complete the setup. CHAPTER 2: GETTING TO
KNOW YOUR LAPTOP
CHAPTER 2: GETTING TO KNOW
YOUR LAPTOPCHAPTER 2: GETTING TO KNOW YOUR LAPTOP
22
This chapter provides information about your new laptop to familiarize you with its various
features, and get you up and running quickly.
Left View Features
1 2 3 4 5 6 7 8 9CHAPTER 2: GETTING TO KNOW YOUR LAPTOP
23
1 Security cable slot — Attaches a commercially available security cable to the
computer.
NOTE: Before you buy a security cable, ensure that it fits into the security cable slot on
your computer.
2 Network connector — Connects your computer to a network or broadband
device.
3 VGA connector — Connects your computer to a monitor or projector.
4 HDMI-output connector — Connects to a TV for both multi‑channel digital audio
and video signals.
NOTE: For a monitor without built‑in speakers, only the video signal will be read.
5 Mini-DisplayPort connector — Connects your computer to external DisplayPort
monitors and projectors.
NOTE: The mini-DisplayPort connector also connects to a VGA connector through an
optional mini-DisplayPort adapter. You can purchase the VGA cable and the
mini-DisplayPort adapter at www.dell.com.CHAPTER 2: GETTING TO KNOW YOUR LAPTOP
24
6 USB 3.0 connectors (2) — Provide faster data transmission between your
computer and USB devices.
7 Audio-out/Headphone/S/PDIF connector — Connects to amplifiers, speakers,
or TVs for digital audio output. Can also be used to connect to a pair of headphones,
powered speakers, or sound system.
NOTE: Use the S/PDIF adapter that shipped with your computer, to connect a TOSLINK
optical cable.
8 Microphone connector — Connects to a microphone or inputs signal for use with
audio programs.
9 Headphone connectors (2) — Connect to a pair of headphones or to a powered
speaker or sound system.CHAPTER 2: GETTING TO KNOW YOUR LAPTOP
25
Right View Features
1 2 3 4 5
1 Optical drive — Plays or records only standard-size (12 cm) CDs, DVDs, and Blu-ray Discs
(optional). Ensure that the side with print or writing is facing upward when inserting
discs. For more information, see “Using the Optical Drive“ on page 45.
2 9-in-1 Media Card Reader — Provides a fast and convenient way to view
and share digital photos, music, videos, and documents.
3 USB 2.0 connectors (2) — Connect to USB devices, such as a mouse, keyboard,
printer, external drive, or MP3 player.CHAPTER 2: GETTING TO KNOW YOUR LAPTOP
26
4 eSATA/USB combo connector with USB PowerShare — Connects to eSATA
compatible storage devices (such as external hard drives or optical drives) or USB
devices (such as a mouse, keyboard, printer, external drive, or MP3 player).
The USB Powershare feature allows you to charge USB devices when the computer is
powered on/off or in sleep state.
NOTE: Certain USB devices may not charge when the computer is powered off or in sleep
state. In such cases, turn on the computer to charge the device.
NOTE: You can enable or disable the option of charging the USB devices when the
computer is powered off or in sleep mode through the BIOS settings.
NOTE: If you turn off your computer while charging a USB device, the device stops
charging. To continue charging, disconnect the USB device and connect it again.
NOTE: The USB PowerShare is automatically shut off when only 10% of the total battery
life remains.
5 HDMI-input connector — Connects to the HDMI‑output connector on your video
device such as a DVD player, camcorder, or gaming device.
NOTE: The HDMI-input connector works only when the computer is on.CHAPTER 2: GETTING TO KNOW YOUR LAPTOP
27
Back View Features
1
1 AC adapter connector — Connects to an AC adapter to power the computer and
charge the battery.CHAPTER 2: GETTING TO KNOW YOUR LAPTOP
28
Display Features
1 2 3 4 5CHAPTER 2: GETTING TO KNOW YOUR LAPTOP
29
1 Left digital-array microphone — Combines with the right digital‑array microphone to
provide high quality sound for video chatting and voice recording.
2 Camera activity indicator — Indicates if the camera is on or off. A solid blue light
indicates camera activity.
3 Camera — Built‑in camera for video capture, conferencing, and chat.
4 Right digital-array microphone — Combines with the left digital‑array microphone to
provide high quality sound for video chatting and voice recording.
5 Display — Your display can vary based on selections you made when purchasing your
computer.
Your computer may support 3D display if you selected this option at the time of
purchase.
NOTE: If you experience discomfort while viewing 3D display, stop viewing the display,
remove your 3D glasses, and take rest.CHAPTER 2: GETTING TO KNOW YOUR LAPTOP
30
Computer Base and Keyboard Features
1
2
3 4
5
6CHAPTER 2: GETTING TO KNOW YOUR LAPTOP
31
1 Status lights (3) — Indicate if the Scroll Lock, Caps Lock, or Number Lock lights are
turned on or off. For more information, see “Status Lights” on page 32.
2 Keyboard — The backlit keyboard provides visibility in dark environments by
illuminating all symbols on the keys.
3 Touch pad buttons (2) — Provide left-click and right-click functions like those on a
mouse.
4 Touch pad — Provides the functionality of a mouse to move the cursor, drag or move
selected items, and left‑click by tapping the surface.
5 Media control keys (9) — Press the keys to perform the associated action. For more
information, see “Media Control Keys” on page 33.
6 Power button — Turns the computer on or off when pressed. For more information, see
“Power Button” on page 34. CHAPTER 2: GETTING TO KNOW YOUR LAPTOP
32
Status Lights
The three status lights are located at the top-left side of the keyboard. For the exact location,
see “Computer Base and Keyboard Features” on page 30.
Scroll Lock Light
Turns on when the scroll lock option is on.
Caps Lock Light
Turns on when the keyboard is in Caps Lock mode. In this mode, all characters you
type are in uppercase.
Number Lock Light
Turns on when the keyboard is in Num Lock mode. In this mode, the embedded
numeric keypads can be used.CHAPTER 2: GETTING TO KNOW YOUR LAPTOP
33
Media Control Keys
The media control keys are located at the top-right side of the keyboard. For the exact location,
see “Computer Base and Keyboard Features” on page 30. To activate, press the desired keys.
The keys will illuminate temporarily to confirm your selection.
Decrease volume
Increase volume
Mute the sound
Rewind or Play previous track
Play or Pause
Fast Forward or Play next track
Eject
Wireless Control - Switch wireless
communications on/off
(for more information, see “Using
the Wireless Control” on page 46)
Alienware Command Center
(for more information, see
“Alienware Command Center” on
page 40)CHAPTER 2: GETTING TO KNOW YOUR LAPTOP
34
Power Button
You can program this button to perform actions like shutting down the operating system or
entering the standby mode. For details on how to program this button, see Power Options in
the control panel of Microsoft Windows operating system.
The power button is located in the center of the hinge cover. For the exact location, see
“Computer Base and Keyboard Features” on page 30.
The color of the AlienHead rim indicates the power status. The color indicating the power
status can be changed using the AlienFX software.CHAPTER 2: GETTING TO KNOW YOUR LAPTOP
35
On AC adapter:
Blue or custom AC‑color The battery is fully charged.
Blue or custom AC‑color fading into
amber or custom battery‑color
The computer is turned off or on and
the battery is charging.
Blue or custom AC‑color fading into
black
The computer is in standby mode.
On battery:
Amber or custom battery‑color The battery is fully charged.
Amber or custom battery‑color fading
into black
The computer is in standby mode.
Blinking Amber or custom battery‑
color
The battery charge is low.
For more details on standby and hibernate mode, see Power Options in the control panel of
your Microsoft Windows operating system.CHAPTER 2: GETTING TO KNOW YOUR LAPTOP
36
Function Keys
NOTE: Depending on the configuration of the laptop you purchased, some of the function
keys may have no associated tasks.
The key is located at the bottom-left corner of the keyboard, and is used together with
other keys to activate certain functions. Hold down the key along with the key described
below:
FI – Suspend Mode
Press to enable suspend mode. In the suspend mode, the display and
selected devices will switch off for less energy consumption.
F2 — Check Battery Status
Press to display the Battery Status Meter.
F3 – Mute on/off
Press to enable or disable the mute function.
F4 – Increase Display Brightness
Press to increase the brightness of the display.CHAPTER 2: GETTING TO KNOW YOUR LAPTOP
37
F5 – Decrease Display Brightness
Press to decrease the brightness of the display.
F6 – Display Mode
Press to switch between clone mode and extended desktop mode,
when an external display is connected.
F7 – Switchable Graphics Toggle
Press to switch between integrated and discrete graphics option.
F8 – External HDMI Input Toggle
Press to switch between external HDMI input source.
F9 – Camera on/off
Press to switch off or switch on the camera.
F10 – Microsoft Mobility Center on/off
Press to launch or close the Microsoft Mobility Center application.CHAPTER 2: GETTING TO KNOW YOUR LAPTOP
38
F11 – AlienFX on/off
Press to enable or disable the AlienFX illumination.
F12 – Touch Pad on/off
Press to enable or disable the touch pad function and the illumination
around the touch pad. When the touch pad function is switched off, the touch pad
can still work temporarily for three to five seconds while the computer reboots into
the Windows operating system, or resumes from standby or hibernate mode.CHAPTER 3: USING YOUR LAPTOP
CHAPTER 3: USING YOUR LAPTOPCHAPTER 3: USING YOUR LAPTOP
40
Alienware Command Center
The Alienware Command Center gives you access to Alienware’s exclusive software and is a
continuously upgradable control panel. As Alienware releases new programs, they download
directly into the Command Center allowing you to build a library of system management,
optimization, and customization tools. You can access Alienware Command Center by
pressing on the media control keys. See “Media Control Keys” on page 33.
Connecting External Displays
If you want to enjoy your computing environment on a bigger scale visually, or extend your
desktop area, you can connect an external display such as a standalone monitor, an LCD TV,
or a projector.
Connecting a Display
Use the appropriate cable based on the connectors available on your computer and display.
Refer to the following table to identify the connectors on your computer and display.
NOTE: When connecting to a single display, connect the display to ONLY ONE of the
connectors on your computer.CHAPTER 3: USING YOUR LAPTOP
41
Connection Type Computer Cable Display
VGA‑to‑VGA
(VGA cable)
HDMI‑to‑HDMI
(HDMI cable)
Mini-DisplayPortto-DisplayPort
(Mini-DisplayPortto-DisplayPort
adapter +
DisplayPort Cable)
Mini-DisplayPortto‑DVI (Mini‑
DisplayPort-to-DVI
adapter + DVI
cable)CHAPTER 3: USING YOUR LAPTOP
42
NOTE: You can purchase the mini-DisplayPort-to-DisplayPort and
mini-DisplayPort-to-DVI adapters at www.dell.com.
1. Turn off your laptop.
2. Turn off the display and disconnect it from the power supply.
3. Connect one end of the display cable to the VGA, mini-DisplayPort, or HDMI connector on
your Alienware laptop.
4. Connect the other end of the cable to the same connector on your display.
5. If necessary, connect one end of the power cable to the display’s power connector.
6. Connect the other end of the power cable to a grounded three‑prong power strip or
wall outlet.
7. Turn on your laptop, and then turn on your display.CHAPTER 3: USING YOUR LAPTOP
43
Extending the Desktop
1. With the external display connected, right‑click on the desktop and select Personalize.
2. Select Connect to a projector or other external display in the upper left portion of the
screen.
3. Click Connect Display.
4. Select from the below options that appear on the screen:
• Duplicate my display on all displays (mirrored)
• Show different parts of my desktop on each display (extended)
• Show my desktop on the external display only
5. Click Apply to apply your changes and then click OK to exit the Display Settings control
panel.CHAPTER 3: USING YOUR LAPTOP
44
Using Removable Media and Cards
Observe the safety measures below:
CAUTION: Inserting a blank card upside down may damage your laptop.
When no Media Card is inserted into the Media Card slot, ensure that the blank card that
shipped with your laptop is inserted in the unused slot. The blank card protects the unused
slot from dust and other particles. When inserting a blank card, ensure that the correct side
is on the top (indicated by an arrow mark on some blank cards). For information on the media
cards supported, see “Specifications” on page 103.CHAPTER 3: USING YOUR LAPTOP
45
Using the Optical Drive
Your laptop has a slot load optical drive. Depending on the configuration ordered, your laptop
may have one of the following drive types. These logos are used to indicate each drive’s
capabilities and media compatibility.
DVD±R/W DVD±R/W drive can read CD‑ROM, CD‑R, CD‑R/W, DVD, DVD+R/W,
and DVD‑R/W media.
Blu‑ray Disc
Combo/Triple
Layer (optional)
Blu‑ray drive can read CD‑ROM, CD‑R, CD‑R/W, DVD, DVD+R/W,
DVD‑R/W, DVD+R, BD‑ROM media.
It can also record to CD‑R, CD‑R/W, DVD+R/W, DVD‑R/W, DVD+R
media.CHAPTER 3: USING YOUR LAPTOP
46
Using the Integrated Camera
FastAccess Facial Recognition
Your computer may have the FastAccess facial recognition feature. This feature helps keep your
Alienware computer secure by using the unique appearance of your face to verify your identity
and automatically supply login information that you would normally enter manually, such as
a user ID and password for a Windows account or a secure web site. For more information, click
Start → Programs→ FastAccess.
Turning the Camera On and Off
Press the key combination to switch on or switch off the camera. After switching
on the camera, you need to activate its function through the Microsoft Windows operating
system. In addition, you can also use Windows Movie Maker to create, edit, and share videos.
Using the Wireless Control
The wireless control allows you to quickly turn all of your wireless radios (Bluetooth, WLAN,
and WWAN) off, such as when you are asked to disable all wireless radios on an airplane flight.
Press on the media control keys to turn on all radios. Press again to return your wireless
radios to their respective states they were in before you pressed the wireless key the first
time.CHAPTER 3: USING YOUR LAPTOP
47
Battery Pack
Your laptop is equipped with a high‑energy rechargeable lithium ion (Li‑ion) battery pack.
Battery life will vary depending on your laptop configuration, model, applications installed,
power management settings, and features used. As with all batteries, the maximum capacity
of this battery will decrease with time and usage.
The battery meter lights on the battery pack indicate the charge level of the battery. When
you press the battery meter once, the charge level lights illuminate. Each of the five lights
represent approximately 20% of the total battery charge. For example, if four lights turn on,
there is 80% of battery charge remaining and if no lights turn on, there is no charge remaining
in the battery.
1 Battery Meter
1CHAPTER 3: USING YOUR LAPTOP
48
Power Management
Understanding Power Consumption
In order to fully utilize the power of your battery, it would be a good idea for you to spend some
time acquiring a basic understanding of the power management concept from your operating
system.
You can use the power options in your operating system to configure the power settings on
your computer. The Microsoft Windows operating system installed on your computer provides
three default options:
• Balanced — Offers full performance when you need it and saves power during periods of
inactivity.
• Power Saver — Saves power on your computer by reducing system performance to
maximize the life of the computer and by reducing the amount of energy consumed by
your computer over its lifetime.
• High Performance — Provides the highest level of system performance on your computer
by adapting processor speed to your activity and by maximizing system performance.CHAPTER 3: USING YOUR LAPTOP
49
Customizing Your Power Settings
1. Click Start → Control Panel.
2. Click All Control Panel Items.
3. Double‑click the Power Options icon.
4. Select a power plan from the options shown. To customize specific settings, click Change
plan settings next to the selected power plan.
Reducing Power Consumption
Although your laptop (together with the operating system) is capable of power conservation,
there are measures you can take to reduce the power consumption:
• Lower the intensity of the display backlight. A very bright screen translates to higher
power usage.
• Use the Go Dark option in the Alienware Command Center.CHAPTER 3: USING YOUR LAPTOP
50
nVidia Optimus Technology (Optional)
NOTE: The nVidia optimus technology is not supported on computers that use nVidia 3D
vision.
Your Alienware M17x laptop is equipped with the nVidia Optimus technology. The Optimus
technology is designed to maximize performance and user experience on your computer,
while minimizing the impact on battery life. It enables you to combine the graphic processing
capability of the integrated Intel graphic processing unit (GPU) with the discrete nVidia GPUv
while running graphic-intensive applications such as 3-D games. The nVidia GPU is turned on
only for preset applications and thus extends the battery life.
The Optimus technology is enabled through an application profile. When an application is
launched, the video drivers check to see if the application has a profile associated with it.
• If an application profile exists, the nVidia GPU is turned on and the application runs in
performance mode. The nVidia GPU is turned off automatically when the application is
closed.
• If an application profile does not exist, the integrated Intel GPU is used.
The default list of application profiles is updated frequently by nVidia and is automatically
downloaded to your computer when you are connected to the Internet.CHAPTER 3: USING YOUR LAPTOP
51
You can also create application profiles for any application on your computer. This may be
required for newly released games or applications that do not have a default application
profile.
Changing the Application Profile Settings
1. Right‑click on the desktop and select NVIDIA Control Panel.
2. In the NVIDIA Control Panel window, click 3D Settings to expand the selection (if not
already expanded) and then click Manage 3D Settings.
3. In the Program Settings tab, click Add and browse to select the application’s executable
file (.exe). Once added, you can change the settings for that application.
To change the settings for a specific application, locate the application in the Select a
program to customize: list and make the desired changes.
NOTE: For more information on the nVidia control panel options and settings,
click Help.CHAPTER 3: USING YOUR LAPTOP
52
Free Fall Sensor
Free fall sensor protects your computer hard drive from possible damage, by detecting a free
fall state caused by accidentally dropping the computer. When a free fall state is detected,
the hard drive is placed in a safe state to protect against damage to the read/write head and
possible data loss. Your hard drive returns to normal operation, when the free fall state is no
longer detected.CHAPTER 3: USING YOUR LAPTOP
53
Configuring the BIOS
System Setup
The System Setup options allow you to:
• Change the system configuration information after you add, change, or remove any
hardware in your laptop.
• Set or change a user‑selectable option.
• View the installed amount of memory or set the type of hard drive installed.
Before you use System Setup, it is recommended that you write down the current System
Setup information for future reference.
CAUTION: Do not change the settings in System Setup unless you are an expert
computer user. Certain changes can cause your computer to work incorrectly.CHAPTER 3: USING YOUR LAPTOP
54
Entering System Setup
1. Turn on (or restart) your laptop.
NOTE: Keyboard failure may result when a key on the keyboard is held down for extended
periods of time. To avoid possible keyboard failure, press and release in even
intervals until the System Setup screen appears.
2. While the laptop is booting, press immediately before the operating system logo
appears to access the BIOS Setup Utility.
If an error occurs during Power On Self Test (POST), you may also enter the BIOS Setup
Utility by pressing when prompted.
NOTE: If you wait too long and the operating system logo appears, continue to wait until
you see the Microsoft Windows desktop, then shut down your laptop and try again.
System Setup Screens
The BIOS Setup Utility window displays current or changeable configuration information for
your laptop. Information is divided into five menus: Main, Advanced, Security, Boot, and Exit.
Key functions appear at the bottom of the BIOS Setup Utility window and lists keys and their
functions within the active field.CHAPTER 3: USING YOUR LAPTOP
55
System Setup Options
NOTE: Depending on your computer and installed devices, the items listed in this section
may not appear, or may not appear exactly as listed.
NOTE: For the updated system setup information, see the Service Manual at
support.dell.com/manuals.
Main Menu
System Time
(hh:mm:ss)
Displays the system time.
System Date
(mm/dd/yyyy)
Displays the system date.
Alienware Displays the model number of your computer.
Service Tag Displays the service tag of your computer.
BIOS Version Displays the BIOS version.
EC Version Displays the EC firmware version.
ME Version Displays the Intel ME firmware version.
Sandy Bridge
Version
Displays the Sandy Bridge version.CHAPTER 3: USING YOUR LAPTOP
56
Main Menu
CPU Displays the type of processor installed.
CPU Frequency Displays the speed of the processor.
CPU L3 Cache Displays the processor cache size.
CPUID Displays the ID of the processor.
Integrated
Graphics
Displays the integrated graphics.
Discrete Graphics
1
Displays the primary discrete graphics.
Discrete Graphics
2
Displays the secondary discrete graphics.
Total Memory Displays the total memory available in your computer.
Memory Bank 0 Displays the memory size installed in DIMM 0.
Memory Bank 1 Displays the memory size installed in DIMM 1.
SATA Hard Drive Displays the installed SATA hard drive model.CHAPTER 3: USING YOUR LAPTOP
57
Advanced Menu
Intel SpeedStep Allows you to enable or disable the Intel SpeedStep technology.
Disabling this feature may improve performance, but will
greatly reduce battery life.
Virtualization Allows you to enable or disable the Intel Virtualization
technology.
USB Emulation Allows you to enable or disable the USB emulation feature. This
feature defines how the BIOS, in the absence of a USB-aware
operating system, handles USB devices. USB emulation is
always enabled during POST.
NOTE: You cannot boot any type of USB device (floppy, hard
drive, or memory key) when this option is off.
USB Wake Support Allows you to enable USB devices to wake the computer from
standby or to disable the USB wake support feature.
NOTE: If USB Powershare is enabled, a device connected to the
USB Powershare connector may not wake the computer.CHAPTER 3: USING YOUR LAPTOP
58
Advanced Menu
USB Power Share Allows you to charge USB devices when the computer is turned
off or in standby mode.
• AC Only: Charge USB devices when connected to AC adapter
only.
• AC and Battery: Charge USB devices when connected to
AC adapter and when the computer is running on battery.
• Disabled: Disables USB PowerShare.
Integrated Network Allows you to enable or disable the on‑board LAN controller.
• Disabled: Internal LAN is disabled and is not visible to the
operating system.
• Enabled: Internal LAN is enabled.
High Definition
Audio
Allows you to enable or disable the internal high definition
audio device.
• Disabled: The internal audio device is disabled and is not
visible to the operating system.
• Enabled: The internal audio device is enabled.
SD Card Reader Allows you to enable or disable the internal SD card reader.CHAPTER 3: USING YOUR LAPTOP
59
Advanced Menu
CPU Turbo Mode Allows you to enable or disable the Intel CPU turbo mode
performance option.
Performance Menu Allows you to configure fields in the Performance Options
sub-menu (for more information, see “Performance Options
Sub‑Menu“ on page 60).
Extended ICC Allows you to configure fields in the Extended ICC sub-menu
(for more information, see “Extended ICC Sub‑Menu“ on
page 62).
SATA Operation Allows you to configure the operating mode of the integrated
SATA hard drive controller.
• AHCI: SATA is configured for AHCI mode.
• RAID: STAT is configured for RAID mode.
SATA HARD DRIVE 1 Displays the installed primary SATA hard drive model.
SATA HARD DRIVE 2 Displays the installed secondary SATA hard drive model.CHAPTER 3: USING YOUR LAPTOP
60
Advanced Menu
Adapter Warnings Allows you to choose if the computer should display warning
messages when you use AC adapters that are not supported by
your computer.
• Disabled: BIOS will not detect unsupported AC adapters and
will not display any message to screen.
• Enabled : BIOS will detect unsupported AC adapters and
display an error to screen.
Charger Behavior Allows you to enable or disable battery charging.
Primary Display Allows you to choose a primary display.
Performance Options Sub-Menu
Overclocking
Feature
Allows you to enable or disable the global overclocking feature.
• Disabled: The overclocking feature is disabled.
• Enabled: Displays additional overclocking options.
Processor
Overclocking
Allows you to enable or disable the processor overclocking
feature.CHAPTER 3: USING YOUR LAPTOP
61
Performance Options Sub-Menu
Override Turbo
settings
Allows you to override CPU turbo mode settings.
Long Duration
Power Limit
Allows you to set the turbo mode power limit 1 value in watts.
Long Duration
Time Window
Allows you to set the turbo mode time 1 value in seconds.
Set Short
Duration Power
Limit
Allows you to enable or disable short duration power limit.
Short Duration
Power Limit
Options
Allows you to set the turbo mode power limit 2 value in watts.
Memory Overclocking
Memory Override
Support
Allows you to enable or disable the memory override option
support.
• Disabled: The memory override support is disabled.
• Enabled: Displays additional memory override support
options.
Memory Voltage Allows you to increase memory voltage.CHAPTER 3: USING YOUR LAPTOP
62
Performance Options Sub-Menu
Memory Frequency Allows you to set memory frequency.
XMP DIMM Profile Allows you to configure different XMP options.
Extended ICC Sub-Menu
Use Watchdog Timer
for ICC
Allows you to enable or disable the watchdog timer.
Turn off unused
PCI/PCIe clocks
Allows you to enable or disable the PCI/PCIe clocks.
• Disabled: All PCI/PCIe clocks are on.
• Enabled: Empty PCI/PCIe clocks disabled.
Lock ICC Registers Allows you to lock either static registers or all registers.
Clock_DIV-1S Displays the clock settings for the Div‑1S devices.
Clock_DIV-2S Displays the clock settings for the Div‑2S devices.
Clock_DIV-3 Displays the clock settings for the Div-3 devices.
Clock_DIV-4 Displays the clock settings for the Div‑4 devices.
Clock_DIV-1NS Displays the clock settings for the Div‑1NS devices.
Clock_DIV-2NS Displays the clock settings for the Div‑2NS devices.CHAPTER 3: USING YOUR LAPTOP
63
Wireless Menu
Bluetooth Allows you to enable or disable the internal Bluetooth device.
• Disabled: The internal Bluetooth device is disabled and is
not visible to the operating system.
• Enabled: The internal Bluetooth device is enabled.
Wireless Network Allows you to enable or disable the internal wireless device.
• Disabled: The internal wireless device is disabled and is not
visible to the operating system.
• Enabled: The internal wireless device is enabled.
DGX Allows you to enable or disable the internal DGX device.
Wireless Switch/
Hotkey
Allows you to disable all internal wireless devices.
Security Menu
Supervisor
Password
Displays if the supervisor password is clear or set.
User Password Displays if the user password is clear or set.CHAPTER 3: USING YOUR LAPTOP
64
Security Menu
Set Service Tag Displays the service tag of the computer when the service tag
is present.
Displays a field to input the service tag manually when the
service tag is absent.
Set Supervisor
Password
Allows you to set the supervisor password. The supervisor
password controls access to the system setup utility.
Set User Password Allows you to set the user password. The user password
controls access to the computer at boot.
Computrace Allows you to enable or disable Computrace security feature.
Boot Menu
Use the up or down arrow keys to change the boot device priority. You can choose from:
• Hard Drive
• USB Storage
• CD/DVD/BD
• Removal Devices
• NetworkCHAPTER 3: USING YOUR LAPTOP
65
Exit Menu
Exit Saving
Changes
Allows you to exit System Setup and save your changes to
CMOS.
Save Change
Without Exit
Allows you remain in System Setup and save your changes to
CMOS.
Exit Discarding
Changes
Allows you to exit System Setup and load previous values from
CMOS for all Setup items.
Load Optimal
Defaults
Allows you to load default values for all Setup items.
Discard Changes Allows you to load previous values from CMOS for all Setup
items.CHAPTER 3: USING YOUR LAPTOP
66CHAPTER 4: INSTALLING AND
REPLACING COMPONENTS
CHAPTER 4: INSTALLING AND
REPLACING COMPONENTSCHAPTER 4: INSTALLING AND REPLACING COMPONENTS
68
This chapter provides guidelines and instructions for increasing the processing power and
storage space, by upgrading equipment. You can purchase components for your computer at
www.dell.com or www.alienware.com.
NOTE: See the Service Manual at support.dell.com/manuals for installation instructions
of all serviceable components. Parts purchased from Dell and Alienware will ship with
specific replacement instructions.
Before You Begin
This section provides procedures for removing and installing the components in your laptop.
Unless otherwise noted, each procedure assumes that the following conditions exist:
• You have performed the steps in “Turning Off Your Computer” and “Before Working Inside
Your Computer” in this section.
• You have read the safety information that shipped with your computer.
• A component can be replaced or—if purchased separately—installed by performing the
removal procedure in reverse order.
The procedures in this section may require the following tools:
• Small flat-blade screwdriver
• Phillips screwdriverCHAPTER 4: INSTALLING AND REPLACING COMPONENTS
69
Turning Off Your Computer
CAUTION: To avoid losing data, save and close all open files and exit all open programs
before you turn off your laptop.
1. Save and close all open files and exit all open programs.
2. Click Start → Shut Down.
The laptop turns off after the operating system shutdown process finishes.
3. Ensure that the computer and any attached devices are turned off. If your computer
and attached devices did not automatically turn off when you shut down your operating
system, press and hold the power button for at least 8 to 10 seconds until the computer
turns off.CHAPTER 4: INSTALLING AND REPLACING COMPONENTS
70
Before Working Inside Your Computer
Use the following safety guidelines to help protect your computer from potential damage and
to help to ensure your own personal safety.
WARNING: Before working inside your laptop, read the safety information that
shipped with your computer. For additional safety best practices information, see the
Regulatory Compliance Homepage at www.dell.com/regulatory_compliance.
CAUTION: Handle components and cards with care. Do not touch the components or
contacts on a card. Hold a card by its edges. Hold a component such as a processor by
its edges, not by its pins.
CAUTION: Only a certified service technician should perform repairs on your computer.
Damage due to servicing that is not authorized by Dell is not covered by your
warranty.
CAUTION: To avoid electrostatic discharge, ground yourself by using a wrist grounding
strap or by periodically touching an unpainted metal surface (such as a connector on
the back of the computer).
CAUTION: When you disconnect a cable, pull on its connector or on its pull-tab, not on
the cable itself. Some cables have connectors with locking tabs; if you are disconnecting
this type of cable, press in on the locking tabs before you disconnect the cable. As you
pull connectors apart, keep them evenly aligned to avoid bending any connector pins.
Also, before you connect a cable, ensure that both connectors are correctly oriented
and aligned. CHAPTER 4: INSTALLING AND REPLACING COMPONENTS
71
CAUTION: To avoid damaging the computer, perform the following steps before you
begin working inside the computer.
1. Ensure that the work surface is flat and clean to prevent the computer cover from being
scratched.
2. Turn off your computer (for more information, see “Turning Off Your Computer” on
page 69).
CAUTION: To disconnect a network cable, first unplug the cable from your computer
and then unplug the cable from the network device.
3. Disconnect all telephone or network cables from the laptop.
4. Press and eject any installed cards from the Media Card Reader.
5. Disconnect your computer and all attached devices from their electrical outlets.
CAUTION: To help prevent damage to the system board, you must remove the battery
from the battery bay before you service the laptop.
6. Remove the battery from the battery bay (for more information, see “Replacing the
Battery Pack” on page 72).
7. Press the power button to ground the system board.CHAPTER 4: INSTALLING AND REPLACING COMPONENTS
72
Replacing the Battery Pack
This battery pack can easily be removed and replaced. Ensure that the laptop is properly shut
down before changing the battery pack.
CAUTION: To avoid damage to the laptop, use only the battery designed for this
particular Alienware laptop. Do not use batteries designed for other Alienware or Dell
laptops.
To remove the battery pack:
1. Follow the instructions in “Before You Begin” on page 68.
2. Shut down the laptop.
3. Turn the laptop over.
4. Slide the battery latch to the unlock position as shown.
The battery pack pops up.
5. Remove the battery pack.CHAPTER 4: INSTALLING AND REPLACING COMPONENTS
73
3
2
1
1 battery bay 3 battery pack
2 battery latch
To replace the battery pack, perform the removal steps in reverse order.CHAPTER 4: INSTALLING AND REPLACING COMPONENTS
74
Upgrading or Replacing Memory
Your laptop is equipped with a configurable memory unit. The industry standard JEDEC
PC3-10600 (DDR3) SODIMM memory module connectors are available for memory upgrade.
NOTE: If you purchased a dual‑core processor, your computer supports only memory
module connectors DIMM 1 and DIMM 2.
NOTE: The table below illustrates one possible way the system memory can be
configured. You can also configure the system memory by installing memory modules
in connectors DIMM 3 and DIMM 4.
Memory
connector
DIMM 1
Memory
connector
DIMM 2
Memory
connector
DIMM 3
Memory
connector
DIMM 4
Total memory
2 GB 2 GB — — 4 GB
2 GB 4 GB — — 6 GB
4 GB 4 GB — — 8 GB
8 GB 8 GB — — 16 GB
8 GB 8 GB 8 GB 8 GB 32 GBCHAPTER 4: INSTALLING AND REPLACING COMPONENTS
75
Removing the Memory Module(s)
NOTE: Your computer supports up to four memory module connectors. You can access
connectors DIMM 1 and DIMM 2 by removing the compartment door at the bottom of
your computer. To upgrade memory module(s) in connectors DIMM 3 and DIMM 4, see
the Service Manual at support.dell.com.
1. Follow the instructions in “Before You Begin” on page 68.
2. Remove the battery (see “Replacing the Battery Pack” on page 72).
3. Remove the two screws that secure the compartment door to the computer base.
4. Slide and lift the compartment door away from the computer.CHAPTER 4: INSTALLING AND REPLACING COMPONENTS
76
1
2
1 screws (2) 2 compartment door
5. Use your fingertips to carefully spread apart the memory module connector’s spring-locks
until the module pops up.
6. Remove the memory module.CHAPTER 4: INSTALLING AND REPLACING COMPONENTS
77
5
4
3
2
1
1 memory module 4 notch
2 spring locks (2) 5 memory module connector
3 tab
To replace the memory modules, perform the removal steps in reverse order. While inserting
the memory module into the connector align the notch on the memory module with the tab
on the memory module connector.
NOTE: If you need to install memory modules in two connectors, install a memory module
in the lower connector before you install a memory module in the upper connector.
NOTE: If the memory module is not installed properly, the computer may not boot.CHAPTER 4: INSTALLING AND REPLACING COMPONENTS
78
Upgrading or Replacing the Hard Drive(s)
Your laptop is equipped with two hard drive sockets.
Removing the Hard Drive(s)
1. Follow the instructions in “Before You Begin” on page 68.
2. Remove the battery pack (see “Replacing the Battery Pack” on page 72).
3. Remove the two screws that secure the compartment door to the computer base.
4. Slide and lift the compartment door away from the computer.CHAPTER 4: INSTALLING AND REPLACING COMPONENTS
79
1
2
1 screws (2) 2 compartment door
5. Loosen the three captive screws on the primary hard‑drive assembly (HDD0).
6. Using the pull‑tab, lift the primary hard‑drive assembly to disconnect it from the
connector on the system board.
7. Lift the primary hard‑drive assembly out of the computer base.CHAPTER 4: INSTALLING AND REPLACING COMPONENTS
80
1
2
3
1 pull tab 3 captive screws (3)
2 primary hard-drive
assembly
8. Loosen the three captive screws on the secondary hard‑drive assembly (HDD1).
9. Using the pull tab, lift the secondary hard‑drive assembly (HDD1) to disconnect it from
the connector on the system board.
10. Lift the secondary hard‑drive assembly out of the computer base.CHAPTER 4: INSTALLING AND REPLACING COMPONENTS
81
1
2
3
1 pull tab 3 captive screws (3)
2 secondary hard-drive
assemblyCHAPTER 4: INSTALLING AND REPLACING COMPONENTS
82
11. Remove the four screws that secure the hard drive to the hard‑drive bracket.
12. Lift the hard drive off the hard‑drive bracket.
1
2
3
1 hard drive 3 screws (4)
2 hard-drive bracketCHAPTER 4: INSTALLING AND REPLACING COMPONENTS
83
13. Remove the interposer from the hard drive.
2
1
1 hard drive 2 interposer
To replace the hard drive(s), perform the removal steps in reverse order.CHAPTER 4: INSTALLING AND REPLACING COMPONENTS
84CHAPTER 5: TROUBLESHOOTING
CHAPTER 5: TROUBLESHOOTINGCHAPTER 5: TROUBLESHOOTING
86
Basic Hints and Tips
• Computer does not power on: Is your AC adapter cable securely connected to a working
electrical outlet? If connected to a power strip, ensure that the strip is actually working.
• Connections: Check all the cables to ensure that there are no loose connections
anywhere.
• Power Savings: Ensure that your computer is not in hibernate or standby mode by
pressing the power button for less than 4 seconds. The power status light will fade from
blue to black while in standby mode; in hibernate mode it will be off.
• Brightness: Check and adjust the brightness of the display by pressing the key
combinations or .
• Display Choice: Press the key combination to ensure that the computer is not
set to “External Only” display.
• Use only the AC adapter that shipped with your laptop.CHAPTER 5: TROUBLESHOOTING
87
Backup and General Maintenance
• Always backup your important data on a regular basis and keep copies of your operating
system and software safe. Do not forget to note the serial numbers if you are storing
them outside of their original cases ‑ for example, in a CD wallet.
• Run maintenance programs as often as you can. You may schedule these programs to
run at times when you are not using your computer. You can use those provided with your
operating system, or buy more powerful, dedicated programs to do so.
• Write down your passwords and keep them safe (away from your computer). This is
especially important if you choose to password‑protect your computer’s BIOS and
operating system.
• Document vital settings such as network, dialup, mail and Internet settings.CHAPTER 5: TROUBLESHOOTING
88
When troubleshooting your computer, remember the following safety guidelines:
• Before touching any of the computer’s internal components, touch an unpainted portion
of the chassis. Doing so will safely discharge any static electricity, which could damage
your computer.
• Turn off your computer and any connected peripherals.
• Disconnect any peripherals from your computer.
Things to check:
• Ensure that the AC adapter cable is properly connected between your computer and a
grounded, three‑prong power outlet. Ensure that the power outlet is working.
• Ensure the UPS or power strip is turned on (if applicable).
• If your peripheral devices (for example keyboard, mouse, printer, and so on) are not
working, ensure that all connections are secure.
• If any computer components were added or removed before the problem began, check to
see if you performed the installation or removal procedures properly.
• If an error message appears on the screen, write down the exact error message prior to
calling Alienware Technical Support to aid in diagnosing and resolving your issue.
• If an error occurs in a specific program, see the program’s documentation. CHAPTER 5: TROUBLESHOOTING
89
Software Diagnostic Tools
Pre-Boot System Assessment (PSA)/Enhanced Pre-Boot
System Assessment (ePSA)
NOTE: Your computer may have Pre-boot System Assessment (PSA) or Enhanced
Pre-boot System Assessment (ePSA) pre-installed on your computer.
The computer runs the PSA/ePSA, a series of initial tests of your system board, keyboard,
display, memory, hard drive, etc.
To invoke PSA/ePSA:
1. Turn on (or restart) your computer.
2. When the Alienware logo appears, press immediately.
NOTE: If you wait too long and the operating system logo appears, continue to wait until
you see the Microsoft Windows desktop; then, shut down your computer and try again.
3. Select Diagnostics from the menu and press . CHAPTER 5: TROUBLESHOOTING
90
During the assessment, answer any questions that appear.
• If a failure is detected, the computer stops and beeps. To stop the assessment and
restart the computer, press ; to continue to the next test, press ; to retest the
component that failed, press .
• If failures are detected during the PSA/ePSA, write down the error code(s) and contact
Alienware (for more information, see “CONTACTING ALIENWARE“ on page 123).
If the PSA/ePSA completes successfully, the following message appears “Do you want to
run the remaining memory tests? This will take about 30 minutes or
more. Do you want to continue? (Recommended).”
If you are experiencing memory issues, press , otherwise press . A message stating the
completion of PSA/ePSA is displayed.
Press to reboot your computer.CHAPTER 5: TROUBLESHOOTING
91
Answers to Common Problems
System
The computer fails the POST
The Power On Self Test (POST) ensures that the computer meets all the necessary system
requirements and that all hardware is working properly before starting the remainder of the
boot process. If the computer passes the POST, the computer will continue to start normally.
However, if the computer fails the POST, the computer will generate a single beep to indicate
a general failure and an error message will be displayed. For assistance, contact Alienware
Technical Support (see “CONTACTING ALIENWARE“ on page 123).
The computer stops responding or a solid blue screen appears
CAUTION: You might lose data if you are unable to perform an operating system
shutdown.
If you are unable to get a response by pressing a key on your keyboard or moving your mouse,
press and hold the power button for at least 6 seconds until the computer turns off, then
restart your computer.
NOTE: The chkdsk program may run when you restart the computer. Follow the
instructions on the screen.CHAPTER 5: TROUBLESHOOTING
92
A program stops responding or crashes repeatedly
End the program:
1. Press simultaneously.
2. Click the Applications tab and select the program that is no longer responding.
3. Click End Task.
Check the software documentation.
If necessary, uninstall and then reinstall the program.
A program is designed for an earlier version of Microsoft Windows
Run the Program Compatibility Wizard:
The Program Compatibility Wizard configures a program so that it runs in an environment
similar to an earlier version of Microsoft Windows operating system environments.
1. Click Start → Control Panel→ Programs→ Programs and Features→ Use an older
program with this version of Windows.
2. In the welcome screen, click Next.
3. Follow the instructions on the screen.CHAPTER 5: TROUBLESHOOTING
93
Other software problems
Back up your files immediately
Use a virus-scanning program to check the hard drive, or CDs
Save and close any open files or programs and shut down your computer through the Start
menu
Scan the computer for spyware:
If you are experiencing slow computer performance, you frequently receive pop‑up
advertisements, or you are having problems connecting to the Internet, your computer might
be infected with spyware. Use an anti‑virus program that includes anti‑spyware protection
(your program may require an upgrade) to scan the computer and remove spyware.
Run the PSA/ePSA Diagnostics:
If all tests run successfully, the error condition is related to a software problem.CHAPTER 5: TROUBLESHOOTING
94
Check the software documentation or contact the software manufacturer for
troubleshooting information:
• Ensure that the program is compatible with the operating system installed on your
computer.
• Ensure that your computer meets the minimum hardware requirements needed to run
the software. See the software documentation for information.
• Ensure that the program is installed and configured properly.
• Verify that the device drivers do not conflict with the program.
• If necessary, uninstall and then reinstall the program.CHAPTER 5: TROUBLESHOOTING
95
Hard Drive Problems
Allow the computer to cool before turning it on
A hot hard drive may prevent the operating system from starting. Try allowing the computer
to return to room temperature before turning it on.
Run Check Disk
1. Click Start → Computer.
2. Right‑click Local Disk C:.
3. Click Properties→ Tools→ Check Now.
If the User Account Control window appears, click Continue.
4. Follow the instructions on the screen.CHAPTER 5: TROUBLESHOOTING
96
Memory
Memory errors detected on startup
• Check memory modules for correct seating and orientation. Reseat the memory modules
if applicable (see “Upgrading or Replacing Memory” on page 74).
• Computers using a dual-channel memory configuration require that memory modules be
installed in pairs. If you require assistance, contact Alienware Technical Support (for more
information, see “CONTACTING ALIENWARE“ on page 123).
Display
If the display is blank
NOTE: If you are using a program that requires a higher resolution than your computer
supports, it is recommended that you attach an external monitor to your computer.
The computer may be in a power saving mode:
Press a key on the keyboard or press the power button to resume normal operation.
Switch the video image:
If your computer is attached to an external monitor, press to switch the video
image to the display.CHAPTER 5: TROUBLESHOOTING
97
Power
When you press the power button, the computer does not turn on
• If the AC adapter cable is connected to a surge protector or UPS, ensure that the surge
protector or UPS is securely connected to an electrical outlet, is switched on and is
working correctly.
• Check that the wall outlet is working properly by testing another device such as a radio or
lamp that you know works. If the wall outlet is not working, contact an electrician or your
power company for further assistance.
• If the problem persists, contact Alienware support (see “CONTACTING ALIENWARE“ on
page 123).CHAPTER 5: TROUBLESHOOTING
98CHAPTER 6: SYSTEM RECOVERY
CHAPTER 6: SYSTEM RECOVERYCHAPTER 6: SYSTEM RECOVERY
100
AlienRespawn
CAUTION: Using AlienRespawn
permanently removes any programs
or drivers installed after you received
your computer. Create backup media of
applications you need to install on your
computer before using AlienRespawn.
Use AlienRespawn only if System
Restore did not resolve your operating
system problem.
CAUTION: Although AlienRespawn is
designed to preserve the data files on
your computer, it is recommended that
you backup your data files before using
AlienRespawn.
You can use AlienRespawn to restore your
hard drive to the operating state it was in
when you purchased your computer, while
preserving the data files.
AlienRespawn allows you to backup and
restore your computer to an earlier operating
state.
AlienRespawn Basic
To restore the factory image while preserving
the data files:
1. Turn off your computer.
2. Disconnect all the devices connected to
the computer (such as USB drive, printer,
and so on) and remove any recently
added internal hardware.
NOTE: Do not disconnect the AC adapter
cable.
3. Turn on your computer.
4. When the Alienware logo appears,
press several times to access the
Advanced Boot Options window.
NOTE: If you wait too long and the
operating system logo appears, continue
to wait until you see the Microsoft
Windows desktop; then, shut down your
computer and try again.
5. Select Repair Your Computer.CHAPTER 6: SYSTEM RECOVERY
101
6. Select AlienRespawn and Emergency
Backup from the System Recovery
Options menu and follow the
instructions on the screen.
NOTE: The restoration process may take
an hour or more depending on the size
of the data to be restored.
NOTE: For more information on
AlienRespawn, see knowledge base
article 353560 at support.dell.com.
Upgrading to AlienRespawn
Professional
AlienRespawn provides additional features
that allow you to:
• Backup and restore your computer based
on file types
• Backup files to a local storage device
• Schedule automated backups
To upgrade to AlienRespawn Professional:
1. Double‑click the AlienRespawn icon in
the notification area of your desktop.
2. Click Upgrade Now!
3. Follow the instructions on the screen.CHAPTER 6: SYSTEM RECOVERY
102
Dell DataSafe Online Backup
(Optional)
NOTE: Dell DataSafe Online is supported
only on Windows operating systems.
NOTE: A broadband connection is
recommended for fast upload or
download speeds.
Dell DataSafe Online is an automated
backup and recovery service that helps
protect your data and other important files
from catastrophic incidents like theft, fire,
or natural disasters. You can access the
service on your computer using a password‑
protected account.
For more information, go to
delldatasafe.com.
To schedule backups:
1. Double‑click the Dell DataSafe Online
icon on the taskbar.
2. Follow the instructions that appear on
the screen.
My Dell Downloads
NOTE: My Dell Downloads may not be
available in all regions.
Some of the software pre‑installed on your
new Dell computer do not include a backup
CD or DVD. This software is available on
the My Dell Downloads website. From this
website you can download available software
for reinstallation or create your own backup
media.
To register and use My Dell Downloads:
1. Go to DownloadStore.dell.com/media.
2. Follow the instructions on the screen to
register and download the software.
3. Reinstall the software or create a backup
media for future use.CHAPTER 7: SPECIFICATIONS
CHAPTER 7: BASIC SPECIFICATIONSCHAPTER 7: SPECIFICATIONS
104
Computer Model
Alienware M17x-R3
Dimensions
Height
Front 44.5 mm (1.75 inches)
Back 45.0 mm (1.77 inches)
Width 410.0 mm (16.14 inches)
Depth 304.0 mm (11.97 inches)
Weight with 9-cell battery and
optical drive (starting at)
4.26 kg (9.40 lb)
NOTE: The weight of your laptop will vary depending
on the configuration ordered and the manufacturing
variability.CHAPTER 7: SPECIFICATIONS
105
Processor and System Chipset
Processor • Intel Core i5
• Intel Core i7
L2 cache 256 KB
L3 cache up to 8 MB
Bus clock 100 MHz
System chipset Mobile Intel HM67 Express Chipset
SDRAM bus width one or two 64-bit channels of DDR3 memory up to
1333 MHz
Processor address bus width 32 bits
Processor data width 64 bits
BIOS SPI Flash Memory 32 Mbit
Graphics bus PCIe x16 busCHAPTER 7: SPECIFICATIONS
106
Memory
Connectors four internally-accessible DDR3 using JEDEC SODIMM
sockets
Capacities 2 GB, 4 GB, and 8 GB
Memory type up to 1333 MHz unbuffered non-ECC dual-channel DDR3
configuration
Memory configurations
possible
4 GB, 6 GB, 8 GB, 16 GB, and 32 GBCHAPTER 7: SPECIFICATIONS
107
Ports and Connectors
Network adapter one RJ45 connector
USB two 4-pin USB 2.0 and 3.0 compliant connectors
eSATA/USB combo one 7-pin/4-pin eSATA/USB 2.0-compliant combo
connector with PowerShare
HDMI input and output one 19-pin connector
Mini-DisplayPort one 20‑pin connector
VGA one 15‑hole connector
Audio two stereo headphones/speakers connectors
one microphone‑in connector
S/PDIF one headphone/S/PDIF combo connector
Media Card Reader one 9-in-1 slotCHAPTER 7: SPECIFICATIONS
108
Communications
Network adapter 10/100/1000 Mbps Ethernet LAN on system board
Wireless • one half Mini‑Card slot
• one full Mini‑Card slot
• Bluetooth; Wireless Display (optional); WirelessHD
(optional)
Video
Video controller
Integrated Intel HD Graphics 3000
Discrete • NVIDIA GeForce GTX 460M
• AMD Radeon HD 6970M
• AMD Radeon HD 6870MCHAPTER 7: SPECIFICATIONS
109
Video
Video memory
Integrated 512 MB dedicated video memory (for total system
memory greater than 4 GB)
Discrete • 1.5 GB
• 1.0 GB
• 2.0 GB
External display support HDMI, Mini DisplayPort, VGA, WiDi (optional), and
WirelessHD (optional)
Audio
Type High-Definition 5.1 surround sound audio
Controller IDT 92HD73 HDA codec
Speaker dual 8-ohms speakers in both the left and right speaker
assembly
Internal speaker amplifier up to 5 W per channel; up to 10 W total powerCHAPTER 7: SPECIFICATIONS
110
Audio
Internal microphone support dual digital microphone in camera assembly
Volume controls program menus and keyboard media function keys
Hard-Drive Storage
Interface • SATA 2.0 (3Gb/s)
• Solid‑State Drive (SSD)
Number of storage drives two
Hard drive • two 2.5 inch SATA 2.0 (3Gb/s) hard drives
• one solid‑state driveCHAPTER 7: SPECIFICATIONS
111
Media Card Reader
Cards supported • Secure Digital (SD) memory card
• Secure Digital Input/Output (SDIO) card
• Secure Digital Extended Capacity (SDXC) card
• MultiMedia Card (MMC)
• MultiMedia Card plus (MMC+)
• Memory Stick
• Memory Stick PRO
• xD-Picture Card (type - M and type - H)
• Hi Density‑SD (SDHD)
• Hi Capacity‑SD (SDHC)CHAPTER 7: SPECIFICATIONS
112
Display
Type • 17.3 inch HD+ WLED
• 17.3 inch FHD WLED
• 17.3 inch FHD 120 Hz WLED
• 17.3 inch FHD 120 Hz WLED with nVidia 3D vision
support
Maximum resolution 1920 x 1080
Dimensions (active area)
Height 215 mm (8.46 inches)
Width 382 mm (15.04 inches)
Diagonal 439 mm (17.28 inches)
Refresh rate 60 Hz
Operating angle 0° (closed) to 140°
Pixel pitch 0.2550 mm
Controls brightness can be controlled through keyboard
shortcutsCHAPTER 7: SPECIFICATIONS
113
Keyboard (Backlit)
Number of keys 82 (Korea, U.S., and Canada); 83 (Europe); 86 (Japan)
Backlight color RGB; colors can be changed by invoking the AlienFX
application in the Alienware Command Center. For
information, see “Alienware Command Center” on
page 40.
Touch Pad
X/Y position resolution
(graphics table mode)
240 cpi
Size
Height 54.00 mm (2.13 inches) sensor-active area
Width 100.00 mm (3.94 inches) rectangle
Camera
Camera resolution 3.0 megapixel
Video resolution 2048 x 1536
Diagonal viewing angle 60°CHAPTER 7: SPECIFICATIONS
114
Battery
9-cell “smart” lithium ion (92 Whr)
Height 22.00 mm (0.87 inches)
Width 233.00 mm (9.17 inches)
Depth 90.00 mm (3.54 inches)
Weight 0.52 kg (1.14 lb)
Voltage 11.10 VDC
Operating time battery operating time varies depending on operating
conditions and can be significantly reduced under
certain power‑intensive conditions.
Life span (approximate) 300 discharge/charge cycles
Temperature range
Operating 0° to 50°C (32° to 122°F)
Storage –20° to 60°C (–4° to 140°F)
Coin‑cell battery CR-2032CHAPTER 7: SPECIFICATIONS
115
AC Adapter
Type 150 W/240 W
Input voltage 100‑240 VAC
Input current (maximum)
150 W 2.50 A
240 W 3.50 A
Input frequency 50‑60 Hz
Output current
150 W 7.70 A (continuous)
240 W 12.30 A (continuous)
Output power
150 W 150 W
240 W 240 W
Rated output voltage 19.50 VDCCHAPTER 7: SPECIFICATIONS
116
AC Adapter
Temperature range
Operating
150 W 0° to 35°C (32° to 95°F)
240 W 0° to 40°C (32° to 104°F)
Storage –40° to 70°C (–40° to 158°F)
Connector types
DC connector 3-pin, 7.4 mm plug
AC connector 3-pin – C13 (150 W)
3-pin – C13 (240 W)
Computer Environment
Temperature range
Operating 0° to 35°C (32° to 95°F)
Storage –40° to 65°C (–40° to 149°F)CHAPTER 7: SPECIFICATIONS
117
Computer Environment
Relative humidity (maximum)
Operating 10% to 90% (non-condensing)
Storage 10% to 95% (non-condensing)
Maximum vibration (Using a random vibration spectrum that simulates user
environment)
Operating 0.66 GRMS
Storage 1.3 GRMS
Maximum shock (Measured with hard drive in operating status and a 2‑ms half‑sine pulse
for operating. Also measured with hard drive in head‑parked position and a 2‑ms half‑sine
pulse for storage)
Operating 110 G
Storage 160 G
Altitude (maximum)
Operating –15.2 to 3048 m (–50 to 10,000 ft)
Storage –15.2 to 10,668 m (–50 to 35,000 ft)
Airborne contaminant level G2 or lower as defined by ISA-S71.04-1985CHAPTER 7: SPECIFICATIONS
118APPENDIX
APPENDIXAPPENDIX
120
GENERAL AND ELECTRICAL SAFETY PRECAUTIONS
Computer Setup
• Read all instructions marked on the product and in the documentation before operating
your computer.
• Retain all safety and operating instructions.
• Never use this product near water or a heat source.
• Only set‑up the computer on a stable work surface.
• Only operate the computer using the power source type indicated on the rating label.
• Never block or cover any openings or fans in the computer case. These are required for
ventilation.
• Never insert objects of any kind into the ventilation openings.
• Ensure that your computer is properly grounded when in use.
• Do not attempt to connect your computer into an outlet that is not properly grounded.
• If an extension cord is used with your computer, ensure that the total ampere rating on
the computer does not exceed the maximum rating on the extension cord.APPENDIX
121
Computer Use
• Route the power cable and all cables away from where people might walk or trip over
them. Do not allow anything to rest on the power cable.
• Do not spill anything on or into your computer.
• To avoid electrical shock, always disconnect all power, modem and any other cables from
the wall outlets before handling the computer.
Electrostatic Discharge (ESD) Warning
Electrostatic Discharge (ESD) can cause damage to internal system components if precautions
are not taken. ESD is caused by static electricity and the damage caused is usually permanent.
Computer technicians wear a special wrist‑strap that grounds them to the computer’s case to
prevent ESD damage. To reduce the chances of ESD damage:
• Turn off your computer’s power and wait several minutes before starting to work.
• Ground yourself by touching the case of the computer.
• Avoid walking around while replacing items inside the case, especially if you are on a
carpet or during low temperature and low humidity.
• Touch only those items which must be replaced.
• If you have to remove peripheral cards for any reason, place them on the portion of the
computer’s case that was removed. Do not touch the edge connectors at the bottom of
the card that connect to the system board.APPENDIX
122
General Safety Precautions
• Mechanical Shock: Your computer should never be subjected to severe mechanical
shocks. Careless handling of your computer may cause damage. Mechanical Shock is not
covered by the warranty.
• Electrical Shock: If you do not open up your computer, there is nothing to worry about.
Your computer protects itself against most irregularities in the power source.
When You Should Contact Alienware
• The battery, power cable or connector is damaged.
• Your computer has had liquid spilled into it.
• Your computer was dropped or the case was damaged.
• Normal operation of the computer does not occur when the operating instructions are
followed.
Replacement Components or Accessories
It is only advised to use replacement parts or accessories recommended by Alienware.APPENDIX
123
CONTACTING ALIENWARE
For customers in the United States/Canada, call 1-800-ALIENWARE.
NOTE: If you do not have an active Internet connection, you can find contact information
on your purchase invoice, packing slip, bill, or Dell product catalog.
Dell provides several online and telephone‑based support and service options. Because
availability varies by country and product, some services may not be available in your area.
To contact Dell for sales, technical support, or customer service issues:
1. Visit www.dell.com/contactdell.
2. Select your country or region.
3. Select the appropriate service or support link based on your need.
4. Choose the method of contacting Dell that is convenient for you.APPENDIX
124
Websites
You can learn about Alienware products and services on the following websites:
• www.dell.com
• www.dell.com/ap (Asian/Pacific countries only)
• www.dell.com/jp (Japan only)
• www.euro.dell.com (Europe only)
• www.dell.com/la (Latin American and Caribbean countries)
• www.dell.ca (Canada only)
You can access Alienware Support through the following websites:
• support.dell.com
• support.jp.dell.com (Japan only)
• support.euro.dell.com (Europe only)
• support.la.dell.com (Argentina, Brazil, Chile, Mexico)APPENDIX
125
Information for NOM, or Official Mexican Standard
(Only for Mexico)
The following information is provided in the device(s) described in this document in accordance
with the requirements of the Official Mexican Standard (NOM):
Importer:
Dell México S.A. de C.V.
Paseo de la Reforma 2620 - Flat 11°
Col. Lomas Altas
11950 México, D.F.
Regulatory
Model Number Voltage Frequency
Electricity
Consumption
Output
Voltage
Output
Intensity
P11E 100‑240V AC 50‑60 Hz 2.50 A/3.50 A 19.50 VDC 7.70 A/12.30 A
For details, read the safety information that shipped with your computer.
For additional safety best practices information, see www.dell.com/regulatory_compliance.
w w w . d e l l . c o m | s u p p o r t . d e l l . c o m / m a n u a l s
Alienware X51
Owner’s Manual
Regulatory model: D05S
Regulatory type: D05S001
book.book Page 1 Tuesday, January 17, 2012 10:32 PMNotes, Cautions, and Warnings
NOTE: A NOTE indicates important information that helps you make better
use of your product.
CAUTION: A CAUTION indicates either potential damage to hardware or
loss of data, and tells you how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage,
personal injury, or death.
____________________
Information in this document is subject to change without notice.
© 2012 Dell Inc. All rights reserved.
Reproduction of these materials in any manner whatsoever without the written permission of Dell Inc.
is strictly forbidden.
Trademarks used in this text: Dell™ and the DELL logo are trademarks of Dell Inc.
Alienware
®
is a registered trademark of Alienware Corporation.
Microsoft
®
, Windows
®
, and the Windows start button logo are either trademarks or registered
trademarks of Microsoft Corporation in the United States and/or other countries.
Other trademarks and trade names may be used in this document to refer to either the entities claiming
the marks and names or their products. Dell Inc. disclaims any proprietary interest in trademarks and
trade names other than its own.
2012 - 01 Rev. A00
book.book Page 2 Tuesday, January 17, 2012 10:32 PMContents 3
Contents
1 About Your Computer. . . . . . . . . . . . . . . . . 5
Front View . . . . . . . . . . . . . . . . . . . . . . . . . 5
Back View . . . . . . . . . . . . . . . . . . . . . . . . . 6
Specifications . . . . . . . . . . . . . . . . . . . . . . . 6
2 Before You Begin . . . . . . . . . . . . . . . . . . . . 7
Turn Off Your Computer and
Connected Devices . . . . . . . . . . . . . . . . . . 7
Safety Instructions . . . . . . . . . . . . . . . . . . 7
3 Working Inside Your Computer . . . . . . . . . 9
4 System Setup . . . . . . . . . . . . . . . . . . . . . . 11
Overview. . . . . . . . . . . . . . . . . . . . . . . . . 11
Entering System Setup . . . . . . . . . . . . . . . . . . 11
System Setup Screens . . . . . . . . . . . . . . . 12
System Setup Options . . . . . . . . . . . . . . . 12
Boot Sequence . . . . . . . . . . . . . . . . . . . 16
book.book Page 3 Tuesday, January 17, 2012 10:32 PM4 Contents
5 Flashing the BIOS . . . . . . . . . . . . . . . . . 19
6 Contacting Alienware . . . . . . . . . . . . . . 21
Websites . . . . . . . . . . . . . . . . . . . . . . 21
book.book Page 4 Tuesday, January 17, 2012 10:32 PMAbout Your Computer 5
1
About Your Computer
Front View
NOTE: Your Alienware X51 computer supports dual orientation. You can place your
computer vertically or horizontally. The rotatable AlienHead allows you to change
the direction of the AlienHead depending on the orientation of your computer.
1 power button 2 optical-drive eject button
3 optical drive 4 rotatable AlienHead
5 microphone connector 6 headphone connector
7 USB 2.0 connectors (2)
1
2
3
4
5
6
7
book.book Page 5 Tuesday, January 17, 2012 10:32 PM6 About Your Computer
Back View
Specifications
For more information on specifications of your computer,
see support.dell.com/manuals.
1 optical S/PDIF connector 2 HDMI connector
3 USB 2.0 connectors (4) 4 USB 3.0 connectors (2)
5 audio connectors (6) 6 hard-drive activity light
7 AC-adapter connector 8 discrete graphics card
9 security-cable slot 10 network connector and
network lights
11 coaxial S/PDIF connector
1
2
3
4
5
6
7
11
10
9
8
book.book Page 6 Tuesday, January 17, 2012 10:32 PMBefore You Begin 7
2
Before You Begin
Turn Off Your Computer and Connected Devices
CAUTION: To avoid losing data, save and close all open files and exit all open
programs before you turn off your computer.
1 Save and close all open files and exit all open programs.
2 Click Start and click Shut Down.
Microsoft Windows shuts down and then the computer turns off.
NOTE: If you are using a different operating system, see the documentation
of your operating system for shut-down instructions.
3 Disconnect your computer and all attached devices from their
electrical outlets.
4 Disconnect all telephone cables, network cables, and attached devices
from your computer.
5 Press and hold the power button, while the computer is unplugged,
to ground the system board.
Safety Instructions
Use the following safety guidelines to protect your computer from potential
damage and ensure your personal safety.
WARNING: Before you begin, read the safety information that shipped with your
computer. For additional safety best practices information, see the Regulatory
Compliance Homepage at dell.com/regulatory_compliance.
CAUTION: To avoid damaging the computer, ensure that the work surface is flat
and clean.
CAUTION: Only a certified service technician is authorized to remove the
computer cover and access any of the components inside the computer. See the
safety instructions for complete information about safety precautions and
protecting against electrostatic discharge.
book.book Page 7 Tuesday, January 17, 2012 10:32 PM8 Before You Begin
CAUTION: When you disconnect a cable, pull on its connector or on its pull-tab,
not on the cable itself. Some cables have connectors with locking tabs or
thumb-screws that you must disengage before disonnecting the cable. When
disconnecting cables, keep them evenly aligned to avoid bending any connector
pins. When connecting cables, ensure that the connectors and ports are correctly
oriented and aligned.
CAUTION: To disconnect a network cable, first unplug the cable from your
computer and then unplug the cable from the network device.
NOTE: Ensure that you remove the security cable from the security-cable slot,
if applicable.
book.book Page 8 Tuesday, January 17, 2012 10:32 PMWorking Inside Your Computer 9
3
Working Inside Your Computer
CAUTION: Only a certified service technician is authorized to remove the
computer cover and access any of the components inside the computer. See the
safety instructions for complete information about safety precautions and
protecting against electrostatic discharge.
For information on removing and replacing the internal component of
your computer, contact Alienware. See "Contacting Alienware" on page 21.
book.book Page 9 Tuesday, January 17, 2012 10:32 PM10 Working Inside Your Computer
book.book Page 10 Tuesday, January 17, 2012 10:32 PMSystem Setup 11
4
System Setup
Overview
Use the system setup to:
• get information about the hardware installed in your computer, such as the
amount of RAM, the size of the hard drive, and so on
• change the system configuration information
• set or change a user-selectable option, such as the user password, type of
hard drive installed, enabling or disabling base devices, and so on
NOTE: Before you change system setup, it is recommended that you note the
system-setup screen information for future reference.
Entering System Setup
1 Turn on (or restart) your computer.
2 During POST, when the DELL logo is displayed, watch for the F2 prompt
to appear and then press immediately.
NOTE: The F2 prompt indicates that the keyboard has initialized. This prompt
can appear very quickly, so you must watch for it, and then press . If you
press before the F2 prompt, this keystroke is lost. If you wait too long and
the operating system logo appears, continue to wait until you see the
Microsoft Windows desktop. Then, turn off your computer and try again.
See "Turn Off Your Computer and Connected Devices" on page 7.
book.book Page 11 Tuesday, January 17, 2012 10:32 PM12 System Setup
System Setup Screens
The system setup screen displays current or changeable configuration
information for your computer. Information on the screen is divided into
three areas: the setup item, active help screen, and key functions.
System Setup Options
NOTE: Depending on your computer and installed devices, the items listed in this
section may appear, or may not appear exactly as listed.
Setup Item — This field appears on
the left side of the system setup
window. The field is a scrollable list
containing features that define the
configuration of your computer,
including installed hardware, power
conservation, and security features.
Scroll up and down the list with the
up- and down-arrow keys. As an option
is highlighted, the Help Screen
displays more information about that
option and available settings.
Help Screen — This field appears on the
right side of the system setup window and
contains information about each option
listed in the Setup Item. In this field you
can view information about your computer
and make changes to your current settings.
Press the up-arrow and down-arrow keys to
highlight an option. Press to
make that selection active and return to
the Setup Item.
NOTE: Not all settings listed in the Setup
Item are changeable.
Key Functions — This field appears below the Help Screen and lists keys and their
functions within the active system setup field.
Main
BIOS Information
Product Information
Build Date Displays the BIOS release date.
Product Name Displays the product name.
BIOS Version Displays the BIOS version number.
Set Service Tag Allows you to enter the service tag of your computer.
Asset Tag Displays the asset tag of the computer.
book.book Page 12 Tuesday, January 17, 2012 10:32 PMSystem Setup 13
Memory Information
Total Memory Displays the total memory of the computer.
Memory Available Displays the amount of memory available on the
computer.
Memory Technology Displays the type of memory technology used.
Memory Speed Displays the memory speed.
CPU Information
Processor ID Displays the processor identification code.
CPU Speed Displays the processor speed.
Cache L2 Displays the processor L2 cache size.
Cache L3 Displays the processor L3 cache size.
Advanced — Standard CMOS Features
System Date
(mm:dd:yy)
Displays current date.
System Time
(hh:mm:ss)
Displays the current time.
Device Information
SATA Port1 Displays the SATA 1 drive integrated in the
computer.
SATA Port2 Displays the SATA 2 drive integrated in the
computer.
SATA Port3 Displays the SATA 3 drive integrated in the
computer.
Wait for ‘F1’ If
Errors
If enabled, the system will HALT during boot to
display system errors.
Advanced — Advanced BIOS
Features
Bootup Num-Lock Select power-on state for num-lock.
OptionROM Display
Screen
Allows you to display or hide the RAID Option ROM
screen during POST.
book.book Page 13 Tuesday, January 17, 2012 10:32 PM14 System Setup
Advanced — CPU Configuration
Hyper-threading
Technology
If disabled only one thread per enabled core is active.
XD Bit Capability Enable XD Bit Capability to allow the processor to
distinguish between the bits of code that can be
executed and the ones that cannot be executed.
Intel(R) SpeedStep
tech
If enabled, the processor clock speed and core
voltage are adjusted dynamically based on the
processor load.
Intel(R) C-State tech Allows you to enable the number of cores in each
processor package. Options 1-5.
Advanced — Integrated
Devices
USB Controller Allows you to enable or disable the integrated USB
controller.
HD Audio Allows you to enable or disable the integrated audio
controller.
Onboard LAN
Controller
Allows you to enable or disable the onboard LAN
controller.
Launch PXE OpROM Allows you to enable or disable the boot option for
legacy network devices.
PCH SATA
Configuration
SATA Mode Displays the SATA mode.
Advanced — Power Management Setup
Suspend Mode Sets the energy-saving mode of the ACPI function.
AC Recovery Sets what action the computer takes when power is
restored.
Auto Power On Allows the computer to start up at a certain time.
Auto Power On Date Allows you to set RTC Wake Up Date.
Auto Power On Hour Allows you to set RTC Wake Up Hour.
Auto Power On Minute Allows you to set RTC Wake Up Minute.
Auto Power On Second Allows you to set RTC Wake Up Second
book.book Page 14 Tuesday, January 17, 2012 10:32 PMSystem Setup 15
Security
Supervisor Password: Allows you to change the supervisor password.
User Password: Allows you to change the user password. You cannot
use the user password to enter the BIOS setup,
during POST.
Set Supervisor
Password
Allows you to set a supervisor password.
Set User Password Allows you to set a supervisor password.
Boot
Set Boot Priority
1st Boot Device Displays the first boot device.
Default: USB floppy-drive.
2nd Boot Device Displays the second boot device.
Default: USB hard-drive.
3rd Boot Device Displays the third boot device.
Default: USB optical-drive.
4th Boot Device Displays the fourth boot device.
Default: hard-drive.
5th Boot Device Displays the fifth boot device.
Default: optical-drive.
6th Boot Device Displays the sixth boot device.
Default: network boot.
7th Boot Device Displays the seventh boot device.
Default: UEFI.
Hard Disk Drive BBS
Priorities
Sets the hard drive boot priority. The items displayed
are dynamically updated according to the hard drives
detected.
USB Disk BBS Drive
Priorities
Sets the USB drive boot priority.
CD/DVD ROM Drive BBS
Priorities
Sets the CD/DVD drive boot priority.
book.book Page 15 Tuesday, January 17, 2012 10:32 PM16 System Setup
Boot Sequence
This feature allows you to change the boot sequence for devices.
Boot Options
• Diskette Drive — The computer attempts to boot from the floppy disk
drive. If no operating system is on the drive, the computer generates an
error message.
• Hard Drive — The computer attempts to boot from the primary hard
drive. If no operating system is on the drive, the computer generates an
error message.
• CD/DVD/CD-RW Drive — The computer attempts to boot from the
optical drive. If no disc is in the drive, or if the disc is not bootable,
the computer generates an error message.
• USB Storage Device — Insert the memory device into a USB connector
and restart the computer. When F12 Boot Options appears in the
lower-right corner of the screen, press . The BIOS detects the
device and adds the USB flash option to the boot menu.
NOTE: To boot to a USB device, the device must be bootable. To ensure that
your device is bootable, check the device documentation.
• Network — The computer attempts to boot from the network. If no
operating system is found on the network, the computer generates an
error message.
Exit
Provides options to Save Changes and Reset, Discard Changes
and Reset, and Restore Defaults.
book.book Page 16 Tuesday, January 17, 2012 10:32 PMSystem Setup 17
Changing Boot Sequence for the Current Boot
You can use this feature to change the current boot sequence, for example,
to boot from the optical drive to run Dell Diagnostics from the Drivers and
Utilities disc. The previous boot sequence is restored at the next boot.
1 If you are booting from a USB device, connect the USB device to a
USB connector.
2 Turn on (or restart) your computer.
3 When F2 Setup, F12 Boot Options appears in the lower-right
corner of the screen, press .
NOTE: If you wait too long and the operating system logo appears, continue to wait
until you see the Microsoft Windows desktop. Then shut down your computer and
try again.
The Boot Device Menu appears, listing all available boot devices.
4 On the Boot Device Menu choose the device you want to boot from.
For example, if you are booting to a USB memory key, highlight USB
Storage Device and press .
Changing Boot Sequence for Future Boots
1 Enter system setup. See "Entering System Setup" on page 11.
2 Use the arrow keys to highlight the Boot menu option and press
to access the menu.
NOTE: Write down your current boot sequence in case you want to restore it.
3 Press the up- and down-arrow keys to move through the list of devices.
4 Press plus (+) or minus (–) to change the boot priority of the device.
book.book Page 17 Tuesday, January 17, 2012 10:32 PM18 System Setup
book.book Page 18 Tuesday, January 17, 2012 10:32 PMFlashing the BIOS 19
5
Flashing the BIOS
The BIOS may require flashing when an update is available or when replacing
the system board. To flash the BIOS:
1 Turn on the computer.
2 Go to support.dell.com/support/downloads.
3 Locate the BIOS update file for your computer:
NOTE: The Service Tag for your computer is located on a label at the back of
your computer.
If you have your computer’s Service Tag:
a Click Enter a Tag.
b Enter your computer’s Service Tag in the Enter a service tag: field,
click Go, and proceed to step 4.
If you do not have your computer’s Service Tag:
a Click Select Model.
b Select the type of product in the Select Your Product Family list.
c Select the product brand in the Select Your Product Line list.
d Select the product model number in the Select Your Product Model list.
NOTE: If you have selected a different model and want to start over again,
click Start Over on the top right of the menu.
e Click Confirm.
4 A list of results appears on the screen. Click BIOS.
5 Click Download Now to download the latest BIOS file.
The File Download window appears.
6 Click Save to save the file on your desktop. The file downloads to your
desktop.
7 Click Close if the Download Complete window appears.
The file icon appears on your desktop and is titled the same as the
downloaded BIOS update file.
8 Double-click the file icon on the desktop and follow the instructions on
the screen.
book.book Page 19 Tuesday, January 17, 2012 10:32 PM20 Flashing the BIOS
book.book Page 20 Tuesday, January 17, 2012 10:32 PMContacting Alienware 21
6
Contacting Alienware
NOTE: Dell provides several online and telephone-based support and service
options for your Alienware computer. These services may vary by country and
product and may not be available in your area.
To contact Dell for sales, technical support, or customer service issues:
1 Go to dell.com/contactdell.
2 Select your region, country, or language.
3 Select the segment for contact.
4 Select the appropriate service or support link based on your need.
5 Choose the method of contacting Dell that is convenient for you.
If you are in the United States, call 1-800-ALIENWARE for help on your
Alienware computer.
Websites
For the latest information, FAQ’s, and solutions to most common issues,
see support.dell.com/Alienware.
book.book Page 21 Tuesday, January 17, 2012 10:32 PM
w w w . d e l l . c o m | s u p p o r t . d e l l . c o m
Systèmes Dell™ PowerEdge™ 6950
Manuel du propriétaireRemarques, avis et précautions
REMARQUE : une REMARQUE indique des informations importantes qui peuvent vous aider à mieux utiliser votre
ordinateur.
AVIS : un AVIS vous avertit d’un risque de dommage matériel ou de perte de données et vous indique comment éviter
le problème.
PRÉCAUTION : une PRÉCAUTION indique un risque potentiel d’endommagement du matériel, de blessure corporelle
ou de mort.
____________________
Les informations contenues dans ce document peuvent être modifiées sans préavis.
© 2006 Dell Inc. Tous droits réservés.
La reproduction de ce document de quelque manière que ce soit sans l’autorisation écrite de Dell Inc. est strictement interdite.
Marques utilisées dans ce document : Dell, le logo DELL, Inspiron, Dell Precision, Dimension, OptiPlex, Latitude, PowerConnect, PowerEdge,
PowerVault, PowerApp, Dell OpenManage et Dell XPS sont des marques de Dell Inc. ; Microsoft, MS-DOS, Windows et Windows Server sont
des marques déposées de Microsoft Corporation ; AMD, AMD PowerNow! et Opteron sont des marques d’Advanced Micro Devices, Inc. ;
EMC est une marque déposée d’EMC Corporation.
Tous les autres noms de marques et marques commerciales utilisés dans ce document se rapportent aux sociétés propriétaires des marques et
des noms de ces produits. Dell Inc. décline tout intérêt dans l’utilisation des marques déposées et des noms de marques ne lui appartenant pas.
Septembre 2006Sommaire 3
Sommaire
1 Présentation du système . . . . . . . . . . . . . . . . . . . . . . . . 9
Autres informations utiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Fonctions du système accessibles au démarrage . . . . . . . . . . . . . . . 10
Voyants et caractéristiques du panneau avant . . . . . . . . . . . . . . . . . 11
Codes des voyants de disques durs . . . . . . . . . . . . . . . . . . . . 13
Voyants et caractéristiques du panneau arrière . . . . . . . . . . . . . . . . 14
Connexion de périphériques externes . . . . . . . . . . . . . . . . . . . 14
Codes du voyant d’alimentation . . . . . . . . . . . . . . . . . . . . . . . . . 15
Codes des voyants de NIC . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Messages d’état affichés sur l’écran LCD. . . . . . . . . . . . . . . . . . . . 16
Résolution des incidents décrits par les messages
d’état de l’écran LCD . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Suppression des messages d’état de l’écran LCD . . . . . . . . . . . . . 24
Messages système . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Messages d’avertissement . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Messages de diagnostic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Messages d’alerte . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
2 Utilisation du programme de configuration du système . . . 33
Accès au programme de configuration du système. . . . . . . . . . . . . . . 33
Réponse aux messages d’erreur . . . . . . . . . . . . . . . . . . . . . . 33
Utilisation du programme de configuration du système . . . . . . . . . . 344 Sommaire
Options du programme de configuration du système . . . . . . . . . . . . . . 34
Écran principal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Écran Memory Information (Informations sur la mémoire) . . . . . . . . 38
Écran CPU Information (Informations sur le processeur) . . . . . . . . . 39
Écran Integrated Devices (Périphériques intégrés) . . . . . . . . . . . . 40
Écran System Security (Sécurité du système) . . . . . . . . . . . . . . . 41
Écran Exit (Quitter) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
Mot de passe système et mot de passe de configuration . . . . . . . . . . . . 43
Utilisation du mot de passe système . . . . . . . . . . . . . . . . . . . . 43
Utilisation du mot de passe de configuration. . . . . . . . . . . . . . . . 46
Désactivation d’un mot de passe oublié. . . . . . . . . . . . . . . . . . . . . 48
Configuration du contrôleur BMC . . . . . . . . . . . . . . . . . . . . . . . . 48
Accès au module de configuration BMC . . . . . . . . . . . . . . . . . . 48
Options du module de configuration du contrôleur BMC . . . . . . . . . 48
3 Installation des composants du système . . . . . . . . . . . . . 49
Outils recommandés . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Intérieur du système . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Retrait et réinstallation du cadre avant en option . . . . . . . . . . . . . . . 52
Ouverture et fermeture du système . . . . . . . . . . . . . . . . . . . . . . . 52
Ouverture du système. . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
Fermeture du système . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
Ventilateurs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
Retrait d’un ventilateur . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
Réinstallation d’un ventilateur . . . . . . . . . . . . . . . . . . . . . . . 55
Protecteurs de ventilation . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
Retrait des protecteurs de ventilation . . . . . . . . . . . . . . . . . . . 56
Réinstallation des protecteurs de ventilation . . . . . . . . . . . . . . . 57
Blocs d’alimentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
Retrait d’un bloc d’alimentation . . . . . . . . . . . . . . . . . . . . . . 57
Réinstallation d’un bloc d’alimentation . . . . . . . . . . . . . . . . . . . 58Sommaire 5
Cartes d’extension . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Consignes d’installation des cartes d’extension . . . . . . . . . . . . . . 59
Installation d’une carte d’extension . . . . . . . . . . . . . . . . . . . . 60
Retrait d’une carte d’extension . . . . . . . . . . . . . . . . . . . . . . . 62
Carte RAC. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
Mémoire système . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
Consignes générales d’installation des barrettes de mémoire . . . . . . 64
Installation de barrettes de mémoire . . . . . . . . . . . . . . . . . . . . 66
Retrait de barrettes de mémoire . . . . . . . . . . . . . . . . . . . . . . 68
Processeurs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
Retrait d’un processeur. . . . . . . . . . . . . . . . . . . . . . . . . . . 69
Installation d’un processeur . . . . . . . . . . . . . . . . . . . . . . . . 72
Modules VRM du processeur . . . . . . . . . . . . . . . . . . . . . . . . . . 73
Installation d’un module VRM . . . . . . . . . . . . . . . . . . . . . . . 73
Retrait d’un module VRM . . . . . . . . . . . . . . . . . . . . . . . . . . 75
Installation d’un lecteur de disquette . . . . . . . . . . . . . . . . . . . . . . 75
Installation d’un lecteur optique. . . . . . . . . . . . . . . . . . . . . . . . . 78
Disques durs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
Avant de commencer . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
Configuration du périphérique d’amorçage . . . . . . . . . . . . . . . . 81
Retrait d’un cache de lecteur. . . . . . . . . . . . . . . . . . . . . . . . 81
Installation d’un cache de lecteur . . . . . . . . . . . . . . . . . . . . . 81
Retrait d’un disque dur enfichable à chaud . . . . . . . . . . . . . . . . 81
Installation d’un disque dur enfichable à chaud . . . . . . . . . . . . . . 83
Remplacement d’un disque dur installé dans un support . . . . . . . . . 83
Cartes contrôleur SAS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
Retrait d’une carte contrôleur SAS. . . . . . . . . . . . . . . . . . . . . 85
Installation d’une carte contrôleur SAS . . . . . . . . . . . . . . . . . . 85
Installation de la pile d’une carte contrôleur RAID SAS . . . . . . . . . . 85
Connexion d’un lecteur de bande SAS externe . . . . . . . . . . . . . . . . . 86
Connexion d’un périphérique de stockage Fibre Channel externe . . . . . . . 87
Pile du système. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
Remplacement de la pile du système. . . . . . . . . . . . . . . . . . . . 886 Sommaire
Panneau de commande (maintenance uniquement) . . . . . . . . . . . . . . 90
Retrait du panneau de commande . . . . . . . . . . . . . . . . . . . . . 90
Installation du panneau de commande. . . . . . . . . . . . . . . . . . . 92
Carte intermédiaire de ventilateur (maintenance uniquement) . . . . . . . . 92
Retrait d’une carte intermédiaire de ventilateur . . . . . . . . . . . . . . 92
Installation d’une carte intermédiaire de ventilateur. . . . . . . . . . . . 93
Carte de distribution de l’alimentation (maintenance uniquement) . . . . . . 94
Retrait de la carte de distribution de l’alimentation . . . . . . . . . . . . 94
Installation de la carte de distribution de l’alimentation . . . . . . . . . . 96
Commutateur d’intrusion du châssis (maintenance uniquement) . . . . . . . 96
Retrait du commutateur d’intrusion du châssis . . . . . . . . . . . . . . 96
Installation du commutateur d’intrusion du châssis . . . . . . . . . . . . 98
Fond de panier SAS (maintenance uniquement) . . . . . . . . . . . . . . . . 99
Retrait du fond de panier SAS . . . . . . . . . . . . . . . . . . . . . . . 99
Installation du fond de panier SAS . . . . . . . . . . . . . . . . . . . . 101
Carte système (maintenance uniquement) . . . . . . . . . . . . . . . . . . 102
Retrait de la carte système . . . . . . . . . . . . . . . . . . . . . . . . 102
Installation de la carte système. . . . . . . . . . . . . . . . . . . . . . 107
4 Dépannage du système . . . . . . . . . . . . . . . . . . . . . . . . 109
La sécurité d’abord, pour vous et pour le système . . . . . . . . . . . . . . 109
Routine de démarrage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
Vérification des incidents simples liés à l’alimentation . . . . . . . . . . . 110
Vérification du matériel . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110
Résolution des conflits d’attribution d’IRQ . . . . . . . . . . . . . . . . 110
Dépannage des connexions externes . . . . . . . . . . . . . . . . . . 111
Dépannage du sous-système vidéo . . . . . . . . . . . . . . . . . . . 111
Dépannage du clavier . . . . . . . . . . . . . . . . . . . . . . . . . . 112
Dépannage de la souris. . . . . . . . . . . . . . . . . . . . . . . . . . 113
Dépannage des incidents liés aux E-S série . . . . . . . . . . . . . . . . . 113
Dépannage d’un périphérique d’E-S série . . . . . . . . . . . . . . . . 114
Dépannage d’un périphérique USB. . . . . . . . . . . . . . . . . . . . 114
Dépannage d’un NIC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115Sommaire 7
Dépannage d’un système mouillé . . . . . . . . . . . . . . . . . . . . . . . 116
Dépannage d’un système endommagé . . . . . . . . . . . . . . . . . . . . 117
Dépannage de la pile du système . . . . . . . . . . . . . . . . . . . . . . . 118
Dépannage des blocs d’alimentation . . . . . . . . . . . . . . . . . . . . . 119
Dépannage des incidents de refroidissement du système . . . . . . . . . . 120
Dépannage d’un ventilateur . . . . . . . . . . . . . . . . . . . . . . . 120
Dépannage de la mémoire système . . . . . . . . . . . . . . . . . . . . . . 121
Dépannage d’un lecteur de disquette . . . . . . . . . . . . . . . . . . . . . 123
Dépannage d’un lecteur optique. . . . . . . . . . . . . . . . . . . . . . . . 124
Dépannage d’un disque dur . . . . . . . . . . . . . . . . . . . . . . . . . . 125
Dépannage d’un contrôleur SAS ou RAID SAS . . . . . . . . . . . . . . . . 127
Dépannage d’un lecteur de bande SAS externe . . . . . . . . . . . . . . . 128
Dépannage des cartes d’extension . . . . . . . . . . . . . . . . . . . . . . 129
Dépannage des microprocesseurs . . . . . . . . . . . . . . . . . . . . . . 130
5 Exécution des diagnostics du système. . . . . . . . . . . . . . 133
Utilisation de Dell PowerEdge Diagnostics. . . . . . . . . . . . . . . . . . 133
Fonctionnalités des diagnostics du système . . . . . . . . . . . . . . . . . 133
Quand utiliser les diagnostics du système . . . . . . . . . . . . . . . . . . 134
Exécution des diagnostics du système . . . . . . . . . . . . . . . . . . . . 134
Options de test des diagnostics du système. . . . . . . . . . . . . . . . . . 134
Utilisation des options de test personnalisées . . . . . . . . . . . . . . . . 135
Sélection de périphériques à tester . . . . . . . . . . . . . . . . . . . 135
Sélection d’options de diagnostic . . . . . . . . . . . . . . . . . . . . 135
Visualisation des informations et des résultats . . . . . . . . . . . . . 1358 Sommaire
6 Cavaliers et connecteurs . . . . . . . . . . . . . . . . . . . . . . . 137
Cavaliers de la carte système . . . . . . . . . . . . . . . . . . . . . . . . . 137
Désactivation d’un mot de passe oublié. . . . . . . . . . . . . . . . . . . . 139
Connecteurs de la carte système . . . . . . . . . . . . . . . . . . . . . . . 140
Connecteurs de la carte de fond de panier SAS . . . . . . . . . . . . . . . 143
7 Obtention d’aide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
Assistance technique . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
Services en ligne . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146
Service AutoTech . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147
Service d’état des commandes automatisé . . . . . . . . . . . . . . . 147
Service de support technique . . . . . . . . . . . . . . . . . . . . . . 147
Service Dell de formation et de certification pour les entreprises. . . . . . 147
Incidents liés à votre commande . . . . . . . . . . . . . . . . . . . . . . . 147
Informations produit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147
Renvoi d’articles pour une réparation sous garantie
ou un remboursement sous forme d’avoir . . . . . . . . . . . . . . . . . . . 148
Avant d’appeler . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148
Contacter Dell . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150
Glossaire . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179Présentation du système 9
Présentation du système
Cette section décrit les caractéristiques essentielles au fonctionnement du système (matériel,
micrologiciel et interface logicielle). Les connecteurs situés sur les panneaux avant et arrière
permettent au système de bénéficier d’une connectivité optimale et de nombreuses possibilités
d’extension. Le micrologiciel, le système d’exploitation et les applications gèrent le système ainsi
que l’état des composants. Ils vous alertent lorsqu’un incident survient. Les informations
concernant l’état du système peuvent être transmises par les éléments suivants :
• Voyants des panneaux avant et arrière
• Messages d’état affichés sur l’écran LCD
• Messages du système
• Messages d’avertissement
• Messages de diagnostic
• Messages d’alerte
Cette section décrit chaque type de message et répertorie les causes possibles et les mesures
à prendre pour résoudre les incidents indiqués. Elle contient également une description des
voyants et des caractéristiques du système.
Autres informations utiles
PRÉCAUTION : le document Product Information Guide (Guide d’informations sur le produit) contient
d’importantes informations se rapportant à la sécurité et aux réglementations. Les informations sur
la garantie se trouvent soit dans ce document, soit à part.
• Les documents Rack Installation Guide (Guide d’installation du rack) et Rack Installation
Instructions (Instructions d’installation du rack) fournis avec la solution rack décrivent
l’installation du système.
• Le document Getting Started Guide (Guide de mise en route) décrit les caractéristiques
du système, les procédures de configuration et les spécifications techniques.
• Les CD fournis avec le système contiennent des documents et des outils relatifs à la configuration
et à la gestion du système.
• La documentation du logiciel de gestion des systèmes comprend des renseignements sur
les fonctionnalités, les spécifications, l’installation et le fonctionnement de base du logiciel.
• La documentation du système d’exploitation indique comment installer (au besoin), configurer
et utiliser le système d’exploitation.10 Présentation du système
• La documentation fournie avec les composants achetés séparément contient des informations
permettant de configurer et d’installer ces options.
• Des mises à jour sont parfois fournies avec le système. Elles décrivent les modifications apportées
au système, aux logiciels ou à la documentation.
REMARQUE : vérifiez toujours si des mises à jour sont disponibles sur le site support.dell.com et lisez-les
en premier, car elles remplacent souvent les informations contenues dans les autres documents.
• Des notes de version ou des fichiers lisez-moi (readme) sont parfois fournis ; ils contiennent des mises
à jour de dernière minute apportées au système ou à la documentation, ou des documents de référence
technique avancés destinés aux utilisateurs expérimentés ou aux techniciens.
Fonctions du système accessibles au démarrage
Le tableau 1-1 décrit certaines touches pouvant être utilisées lors du démarrage pour accéder
aux caractéristiques du système. Si le système d’exploitation commence à se charger alors que vous
n’avez pas encore appuyé sur la touche voulue, laissez-le finir de démarrer, puis arrêtez-le et réessayez.
Tableau 1-1. Touches d’accès aux fonctions du système
Touche(s) Description
Permet d’accéder au programme de configuration du système. Voir “Utilisation du programme
de configuration du système”, page 33.
Permet d’accéder au programme de diagnostic du système. Voir “Exécution des diagnostics
du système”, page 134.
Permet d’accéder à l’écran de sélection d’un périphérique d’amorçage.
Quitte l’amorçage PXE.
Ouvre l’utilitaire de gestion du contrôleur BMC (BaseBoard Management Controller), qui permet
d’accéder au journal d’événements du système (SEL). Voir le document BMC User’s Guide (Guide
d’utilisation du contrôleur BMC) pour plus d’informations sur la configuration et l’utilisation
de ce contrôleur.
Ouvre l’utilitaire de configuration SAS. Consultez le guide d’utilisation de la carte SAS pour plus
d’informations.
Cette option s’affiche uniquement si le support PXE est activé dans le programme de configuration
du système (voir “Écran Integrated Devices (Périphériques intégrés)”, page 40). Elle permet de
configurer les paramètres du NIC pour le démarrage PXE. Pour plus d’informations, consultez
la documentation du NIC intégré.
Si vous installez le contrôleur DRAC (Dell Remote Access Controller) en option, cette
combinaison de touches permet d’accéder aux paramètres de configuration correspondants.
Consultez le guide d’utilisation du contrôleur DRAC pour plus d’informations sur la configuration
et l’utilisation de ce contrôleur. Présentation du système 11
Voyants et caractéristiques du panneau avant
La figure 1-1 présente les boutons, les voyants et les connecteurs situés derrière le cadre de rack
(en option), sur le panneau avant.
Figure 1-1. Voyants et caractéristiques du panneau avant
Tableau 1-2. Voyants, boutons et connecteurs du panneau avant
Numéro Voyant, bouton ou connecteur Icône Description
1 Voyant et bouton
d’alimentation
Le bouton d’alimentation contrôle la sortie du bloc
d’alimentation en CC qui alimente le système.
REMARQUE : si vous éteignez un ordinateur utilisant un
système d’exploitation conforme ACPI en appuyant sur le
bouton d’alimentation, le système peut effectuer un arrêt
normal avant que l’alimentation ne soit coupée. Si le
système d’exploitation n’est pas conforme ACPI,
une pression sur le bouton d’alimentation l’éteint
immédiatement.
2 Bouton NMI Utilisé pour la résolution de certains incidents liés aux
logiciels et aux pilotes de périphériques avec certains
systèmes d’exploitation. Pour l’activer, utilisez la pointe
d’un trombone.
Utilisez-le uniquement si un technicien de support
qualifié vous demande de le faire, ou si cela est
préconisé dans la documentation du système
d’exploitation.
2 3 4 5 6
1
7
812 Présentation du système
3 Bouton d’identification
du système
Les boutons d’identification des panneaux avant
et arrière peuvent servir à identifier un système
spécifique au sein d’un rack. Si on appuie sur l’un
de ces boutons, les voyants bleus d’état du système
avant et arrière clignotent jusqu’à ce que l’utilisateur
appuie de nouveau sur l’un des boutons.
4 Écran LCD Affiche l’ID du système, des informations d’état et des
messages d’erreur.
L’écran LCD s’allume lorsque le système fonctionne
normalement. Les logiciels de gestion de systèmes,
tout comme les boutons d’identification situés à l’avant
et à l’arrière du système, peuvent faire clignoter l’écran
LCD en bleu pour identifier un système spécifique.
L’écran LCD s’allume en orange lorsque survient
un incident lié au bloc d’alimentation, au ventilateur,
à la température ou au disque dur, et que cet incident
doit être traité.
REMARQUE : si le système est connecté à l’alimentation
en CA et si une erreur a été détectée, l’écran LCD s’allume
en orange, que le système soit allumé ou non.
5 Connecteurs USB (2) Permettent de connecter des périphériques compatibles
USB 2.0 au système.
6 Connecteur vidéo Permet de connecter un moniteur au système.
7 Disques durs (en option) Cinq lecteurs 3,5 pouces
8 Lecteur optique et lecteur
de disquette (en option)
Lecteur optique slim et lecteur de disquette
(tous deux en option)
REMARQUE : les périphériques DVD sont uniquement des périphériques de données.
Tableau 1-2. Voyants, boutons et connecteurs du panneau avant (suite)
Numéro Voyant, bouton ou connecteur Icône DescriptionPrésentation du système 13
Codes des voyants de disques durs
Les supports de disque dur comprennent un voyant d’activité et un voyant d’état. Voir la figure 1-2.
Figure 1-2. Voyants des disques durs
Le tableau 1-3 répertorie les codes de voyants des disques durs RAID. Ce comportement varie
en fonction des événements affectant les lecteurs du système. Par exemple, si un disque dur tombe
en panne, la séquence “Échec du disque” apparaît. Lorsque vous avez sélectionné le lecteur à retirer,
la séquence “Préparation au retrait” apparaît, suivie de la séquence “Lecteur prêt à être inséré ou retiré”.
Une fois le lecteur de rechange installé, la séquence indiquant que le lecteur est en cours de préparation
apparaît, suivie de la séquence “Lecteur en ligne”.
1 Voyant d’état du lecteur (vert et orange) 2 Voyant d’activité du lecteur (vert)
Tableau 1-3. Codes des voyants de disques durs RAID
Signification Comportement du voyant d’état
Identification de l’unité/
Préparation au retrait
Clignotement vert deux fois par seconde
Lecteur prêt à être inséré ou retiré Éteint
REMARQUE : à la mise sous tension du système, le voyant d’état
du lecteur ne s’allume qu’une fois tous les disques durs initialisés.
Lorsqu’il est éteint, l’état des disques ne permet par leur insertion
ni leur retrait.
Panne anticipée du lecteur Clignotement vert, orange, puis extinction
Échec du disque Clignotement orange quatre fois par seconde
Disque en cours de reconstruction Vert, clignotement lent
Lecteur en ligne Vert fixe
Reconstruction arrêtée Clignotement vert pendant trois secondes, puis orange pendant trois
secondes, puis extinction pendant six secondes
1 214 Présentation du système
Voyants et caractéristiques du panneau arrière
La figure 1-3 présente les boutons, les voyants et les connecteurs situés sur le panneau arrière du système.
Figure 1-3. Voyants et caractéristiques du panneau arrière
Connexion de périphériques externes
Appliquez les consignes suivantes lorsque vous connectez des périphériques externes au système :
• La plupart des périphériques doivent être reliés à un connecteur spécifique et requièrent l’installation
de pilotes pour pouvoir fonctionner correctement. Les pilotes sont généralement fournis avec
le système d’exploitation ou avec le périphérique lui-même. Consultez la documentation du
périphérique pour obtenir des instructions spécifiques sur l’installation et la configuration.
• Connectez toujours les périphériques externes lorsque le système est éteint. Ensuite, allumez les
périphériques externes avant le système, à moins que la documentation du périphérique ne stipule
le contraire.
Pour plus d’informations sur chaque connecteur, voir “Cavaliers et connecteurs”, page 137. Pour plus
d’informations sur l’activation, la désactivation et la configuration des ports d’E-S et des connecteurs,
voir “Utilisation du programme de configuration du système”, page 33.
2 7
1
3
8
4 5 6
11 10 9
1 Connecteur série 2 Connecteur vidéo 3 Connecteurs USB (2)
4 Connecteur NIC2 5 Connecteur NIC1 6 Port de contrôleur d’accès
à distance (RAC, en option)
7 Logements de cartes
d’extension
8 Bloc d’alimentation 2 9 Voyant d’état du système
10 Bouton d’identification
du système
11 Bloc d’alimentation 1Présentation du système 15
Codes du voyant d’alimentation
Le bouton d’alimentation du panneau avant contrôle la mise sous tension des blocs d’alimentation
du système. Le voyant correspondant peut fournir des informations sur l’état de l’alimentation
(voir la figure 1-1). Le tableau 1-4 répertorie les codes de ce voyant.
Les voyants des blocs d’alimentation indiquent si le système est alimenté ou si une panne d’alimentation
s’est produite (voir la figure 1-4).
Figure 1-4. Voyants des blocs d’alimentation
Tableau 1-4. Codes du voyant d’alimentation
Voyant Fonction
Allumé Indique que le système est alimenté et opérationnel.
Éteint Indique que le système n’est pas alimenté.
Tableau 1-5. Voyants du bloc d’alimentation
Voyant Fonction
État du bloc d’alimentation Un voyant vert indique que le bloc d’alimentation fonctionne normalement.
Panne du bloc d’alimentation Un voyant orange indique qu’un incident lié au bloc d’alimentation s’est produit.
État de l’alimentation en CA Un voyant vert indique qu’une source de courant alternatif valide est reliée au bloc
d’alimentation.
1 Voyant d’état du bloc
d’alimentation
2 Voyant de panne du bloc
d’alimentation
3 Voyant d’état
de l’alimentation en CA
1 2 316 Présentation du système
Codes des voyants de NIC
Chaque NIC du panneau arrière est équipé d’un voyant qui fournit des informations sur l’activité
du réseau et l’état du lien. Voir la figure 1-5. Le tableau 1-6 répertorie les codes des voyants de NIC.
Figure 1-5. Voyants de NIC
Messages d’état affichés sur l’écran LCD
L’écran LCD du panneau de commande affiche des messages d’état indiquant si le système fonctionne
correctement ou s’il requiert une intervention.
Il s’allume en bleu en cas de fonctionnement normal et en orange si une erreur est détectée.
Dans ce dernier cas, il affiche un message comprenant un code d’état suivi d’un texte descriptif.
Le tableau 1-7 répertorie les messages d’état qui peuvent s’afficher sur l’écran LCD et indique leur
cause probable. Les messages de l’écran LCD se rapportent aux événements enregistrés dans le journal
d’événements du système. Pour plus d’informations sur ce journal et sur la configuration des paramètres
de gestion du système, consultez la documentation du logiciel de gestion de systèmes.
PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour
accéder aux composants internes. Reportez-vous au document Product Information Guide (Guide d’informations
sur le produit) pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans
l’ordinateur et la protection contre les décharges électrostatiques.
REMARQUE : si le démarrage du système échoue, appuyez sur le bouton d’ID du système pendant au moins cinq
secondes, jusqu’à ce qu’un code d’erreur s’affiche sur l’écran LCD. Notez ce code, puis reportez-vous à la section
“Obtention d’aide”, page 145.
1 Voyant de lien 2 Voyant d’activité
Tableau 1-6. Codes des voyants de NIC
Voyant Code du voyant
Les voyants de lien et d’activité
sont éteints.
Le NIC n’est pas connecté au réseau.
Le voyant de lien est vert. Le NIC est connecté à un périphérique valide sur le réseau.
Le voyant d’activité clignote
en orange.
Des données sont en cours d’envoi ou de réception sur
le réseau.
1 2Présentation du système 17
Tableau 1-7. Messages d’état affichés sur l’écran LCD
Message
sur
la ligne 2
Message
sur
la ligne 2
Causes Actions correctrices
N/A NOM DU SYSTÈME Chaîne de 62 caractères pouvant
être définie par l’utilisateur dans le
programme de configuration du
système.
Ce nom s’affiche dans les cas
suivants :
• Le système est sous tension.
• Le système est hors tension et des
erreurs POST sont affichées.
Ce message est affiché uniquement
pour information.
Vous pouvez modifier la chaîne
système dans le programme de
configuration du système. Voir
“Utilisation du programme de
configuration du système”, page 33.
E1000 FAILSAFE, Call
Support
Voir “Obtention d’aide”, page 145.
E1A14 SAS Cable A Le câble SAS A est mal inséré,
manquant ou endommagé.
Vérifiez la connexion du câble
au niveau du fond de panier SAS.
Voir “Connecteurs de la carte de
fond de panier SAS”, page 143.
E1A15 SAS Cable B Le câble SAS B est mal inséré,
manquant ou endommagé.
Vérifiez la connexion du câble
au niveau du fond de panier SAS.
Voir “Connecteurs de la carte de
fond de panier SAS”, page 143.
E1114 Temp Ambient La température ambiante
du système est en dehors des limites
autorisées.
Voir “Dépannage des
incidents de refroidissement
du système”, page 120.
E1210 CMOS Batt La pile CMOS est manquante
ou la tension est en dehors des
limites autorisées.
Voir “Dépannage de la pile
du système”, page 118.
E1211 ROMB Batt La pile RAID est manquante
ou endommagée, ou bien elle
ne peut pas se recharger suite
à un incident lié aux conditions
thermiques.
Réinstallez la pile RAID. Voir les
sections “Installation de la pile
d’une carte contrôleur RAID
SAS”, page 85 et “Dépannage
des incidents de refroidissement
du système”, page 120.
E12nn XX PwrGd Panne du régulateur
de tension indiqué.
Voir “Obtention d’aide”, page 145.
E1229 CPU # VCORE Panne du régulateur de tension
VCORE du processeur n.
Voir “Obtention d’aide”, page 145.18 Présentation du système
E122A CPU # VTT La tension VTT du processeur n
a dépassé les limites autorisées.
Voir “Obtention d’aide”, page 145.
E122B 0.9V Over
Voltage
Le régulateur de tension 0,9 V
a dépassé les limites autorisées.
Voir “Obtention d’aide”, page 145.
E122C CPU Power Fault Une panne du régulateur de tension
a été détectée lors de l’activation du
ou des régulateur(s) du processeur.
Voir “Obtention d’aide”, page 145.
E122D CPU # VDDIO La tension VDDIO du processeur n
a dépassé les limites autorisées.
Voir “Obtention d’aide”, page 145.
E122E CPU # VDDA La tension VDDA du processeur n
a dépassé les limites autorisées.
Voir “Obtention d’aide”, page 145.
E1310 RPM Fan nn Le nombre de tours par minute
du ventilateur indiqué est en dehors
des limites autorisées.
Voir “Dépannage des incidents
de refroidissement du système”,
page 120.
E1313 Fan Redundancy Panne d’un ou de plusieurs
ventilateur(s). La redondance
des ventilateurs n’est plus assurée.
Voir “Dépannage des incidents
de refroidissement du système”,
page 120.
E1410 CPU n IERR Le microprocesseur indiqué renvoie
une erreur système.
Pour obtenir les informations
les plus récentes sur le système,
voir le document Information
Update Tech Sheet (Fiche technique
de mise à jour des informations),
qui est accessible à partir
du site support.dell.com.
Si l’incident persiste, voir
“Obtention d’aide”, page 145.
Tableau 1-7. Messages d’état affichés sur l’écran LCD (suite)
Message
sur
la ligne 2
Message
sur
la ligne 2
Causes Actions correctricesPrésentation du système 19
E1414 CPU n Thermtrip La température du microprocesseur
spécifié est en dehors des limites
autorisées et celui-ci s’est arrêté.
Voir “Dépannage des incidents
de refroidissement du système”,
page 120. Si l’incident persiste,
assurez-vous que les dissipateurs
de chaleur du microprocesseur
sont correctement installés.
Voir “Dépannage des
microprocesseurs”, page 130.
REMARQUE : l’écran LCD continue
à afficher ce message jusqu’à
ce que le câble d’alimentation
du système soit débranché puis
rebranché à la source d’alimentation
en CA, ou jusqu’à ce que le journal
d’événements soit vidé à l’aide
de Server Assistant ou de BMC
Management Utility. Consultez
le document Dell OpenManage
Baseboard Management Controller
User’s Guide (Guide d’utilisation du
contrôleur BMC Dell OpenManage)
pour plus d’informations concernant
ces utilitaires.
E1418 CPU n Presence Le processeur indiqué est manquant
ou endommagé et la configuration
du système n’est pas prise en charge.
Voir “Dépannage des
microprocesseurs”, page 130.
E1423 CPU # VRM
Missing
Le module VRM du processeur
indiqué est manquant
ou défectueux.
Retirez ce module et réinstallez-le.
Voir “Modules VRM du
processeur”, page 73.
Si l’incident persiste, la carte
système est défectueuse. Voir
“Obtention d’aide”, page 145.
E141C CPU Mismatch La configuration des processeurs
n’est pas prise en charge par Dell.
Vérifiez que les processeurs
sont de même type et conformes
aux spécifications techniques du
microprocesseur (voir le document
Getting Started Guide [Guide de
mise en route] du système).
Tableau 1-7. Messages d’état affichés sur l’écran LCD (suite)
Message
sur
la ligne 2
Message
sur
la ligne 2
Causes Actions correctrices20 Présentation du système
E141F CPU Protocol Le BIOS du système a renvoyé une
erreur de protocole liée au
processeur.
Voir “Obtention d’aide”, page 145.
E1420 CPU Bus PERR Le BIOS du système a renvoyé une
erreur de parité liée au bus
du processeur.
Voir “Obtention d’aide”, page 145.
E1421 CPU Init Le BIOS du système a renvoyé une
erreur d’initialisation du processeur.
Voir “Obtention d’aide”, page 145.
E1422 CPU Machine Chk Le BIOS du système a renvoyé une
erreur liée à la vérification
du système.
Voir “Obtention d’aide”, page 145.
E1610 PS n Missing Le bloc d’alimentation indiqué
a été retiré ou mal installé.
Voir “Dépannage des blocs
d’alimentation”, page 119.
E1614 PS n Status Le bloc d’alimentation indiqué
est défectueux ou mal installé.
Voir “Dépannage des blocs
d’alimentation”, page 119.
E1618 PS n Predictive La tension du bloc d’alimentation
est en dehors des limites autorisées.
Le bloc d’alimentation indiqué est
défectueux ou mal installé.
Voir “Dépannage des blocs
d’alimentation”, page 119.
E161C PS n Input Lost La source d’alimentation du
bloc d’alimentation indiqué
est indisponible ou en dehors
des limites autorisées.
Vérifiez la source d’alimentation
du bloc d’alimentation indiqué.
Si l’incident persiste, voir
“Dépannage des blocs
d’alimentation”, page 119.
E1620 PS n Input
Range
La source d’alimentation du
bloc d’alimentation indiqué
est indisponible ou en dehors
des limites autorisées.
Vérifiez la source d’alimentation
du bloc d’alimentation indiqué.
Si l’incident persiste, voir
“Dépannage des blocs
d’alimentation”, page 119.
E1624 PS Redundancy La redondance des blocs d’alimentation n’est plus assurée. Si le bloc
d’alimentation restant tombe
en panne, le système s’arrêtera.
Voir “Dépannage des blocs
d’alimentation”, page 119.
E1625 PS AC Current La source d’alimentation électrique
est en dehors des limites autorisées.
Vérifiez la source d’alimentation
en CA.
Tableau 1-7. Messages d’état affichés sur l’écran LCD (suite)
Message
sur
la ligne 2
Message
sur
la ligne 2
Causes Actions correctricesPrésentation du système 21
E1710 I/O Channel Chk Le BIOS du système a renvoyé
une erreur liée à la vérification
des canaux d’E-S.
Voir “Obtention d’aide”, page 145.
E1711 PCI PERR Bnn Dnn
Fnn
PCI PERR Slot n
Le BIOS du système a renvoyé
une erreur de parité PCI liée à un
composant résidant dans l’espace
de configuration PCI du bus nn,
périphérique nn, fonction nn.
Le BIOS du système a renvoyé
une erreur de parité PCI liée
à un composant installé dans
le logement PCI n.
Retirez et réinstallez les cartes
d’extension PCI. Si l’incident
persiste, voir “Dépannage des
cartes d’extension”, page 129.
Si l’incident persiste, la carte
système est défectueuse. Voir
“Obtention d’aide”, page 145.
E1712 PCI SERR Bnn Dnn
Fnn
PCI SERR Slot n
Le BIOS du système a renvoyé
une erreur système PCI liée à un
composant résidant dans l’espace
de configuration PCI du bus nn,
périphérique nn, fonction nn.
Le BIOS du système a renvoyé
une erreur système PCI liée
à un composant installé dans
le logement n.
Retirez et réinstallez les cartes
d’extension PCI. Si l’incident
persiste, voir “Dépannage des
cartes d’extension”, page 129.
Si l’incident persiste, la carte
système est défectueuse. Voir
“Obtention d’aide”, page 145.
E1714 Unknown Err Le BIOS du système a détecté une
erreur système non identifiée.
Voir “Obtention d’aide”, page 145.
E171F PCIE Fatal Err
Bnn Dnn Fnn
PCIE Fatal Err
Slot n
Le BIOS du système a renvoyé
une erreur fatale PCIe liée à un
composant résidant dans l’espace
de configuration PCI du bus nn,
périphérique nn, fonction nn.
Le BIOS du système a renvoyé
une erreur fatale PCIe liée
à un composant installé dans
le logement n.
Retirez et réinstallez les cartes
d’extension PCI. Si l’incident
persiste, voir “Dépannage des
cartes d’extension”, page 129.
Si l’incident persiste, la carte
système est défectueuse. Voir
“Obtention d’aide”, page 145.
E1810 HDD nn Fault Le disque dur indiqué est
défectueux.
Voir “Dépannage d’un disque
dur”, page 125.
E1811 HDD nn Rbld Abrt Le disque dur indiqué a arrêté
la reconstruction avant la fin
de l’opération.
Voir “Dépannage d’un disque
dur”, page 125.
Tableau 1-7. Messages d’état affichés sur l’écran LCD (suite)
Message
sur
la ligne 2
Message
sur
la ligne 2
Causes Actions correctrices22 Présentation du système
E1812 HDD nn Removed Le disque dur indiqué a été retiré
du système.
Ce message s’affiche uniquement
à titre d’information.
E1914 DRAC5 Conn2 Cbl Le câble DRAC 5 est manquant. Reconnectez ce câble. Voir “Carte
RAC”, page 62.
E2010 No Memory Aucune mémoire n’est installée dans
le système.
Installez des barrettes de mémoire.
Voir “Mémoire système”, page 64.
E2011 Mem Config Err Mémoire détectée mais non
configurable. Erreur détectée lors
de la configuration de la mémoire.
Voir “Dépannage de la mémoire
système”, page 121.
E2012 Unusable Memory Mémoire configurée mais
inutilisable. Échec du sous-système
de mémoire.
Voir “Dépannage de la mémoire
système”, page 121.
E2013 Shadow BIOS
Fail
Le BIOS du système n’est pas
parvenu à copier son image flash
dans la mémoire.
Voir “Dépannage de la mémoire
système”, page 121.
E2014 CMOS Fail Échec du CMOS. La RAM CMOS
ne fonctionne pas correctement.
Voir “Obtention d’aide”, page 145.
E2015 DMA Controller Échec du contrôleur DMA. Voir “Obtention d’aide”, page 145.
E2016 Int Controller Échec du contrôleur d’interruptions. Voir “Obtention d’aide”, page 145.
E2017 Timer Fail Échec de rafraîchissement
du temporisateur.
Voir “Obtention d’aide”, page 145.
E2018 Prog Timer Échec du temporisateur d’intervalle
programmable.
Voir “Obtention d’aide”, page 145.
E2019 Parity Error Erreur de parité. Voir “Obtention d’aide”, page 145.
E201A SIO Err Échec SIO. Voir “Obtention d’aide”, page 145.
E201B Kybd Controller Échec du contrôleur du clavier. Voir “Obtention d’aide”, page 145.
E201C SMI Init Échec d’initialisation SMI
(System Management Interrupt).
Voir “Obtention d’aide”, page 145.
E201D Shutdown Test Échec du test d’arrêt du BIOS. Voir “Obtention d’aide”, page 145.
E201E POST Mem Test Échec du test mémoire pendant
l’auto-test de démarrage du BIOS.
Voir “Dépannage de la
mémoire système”, page 121.
Si l’incident persiste, voir
“Obtention d’aide”, page 145.
Tableau 1-7. Messages d’état affichés sur l’écran LCD (suite)
Message
sur
la ligne 2
Message
sur
la ligne 2
Causes Actions correctricesPrésentation du système 23
E201F DRAC Config Échec de la configuration
du contrôleur DRAC
(Dell Remote Access Controller).
Vérifiez si l’écran affiche des
messages d’erreur spécifiques.
Assurez-vous que le
contrôleur DRAC et les
câbles correspondants sont
correctement installés.
Voir “Carte RAC”, page 62.
Si l’incident persiste, consultez
la documentation
du contrôleur DRAC.
E2020 CPU Config Échec de configuration
du processeur.
Vérifiez si l’écran affiche des
messages d’erreur spécifiques.
E2021 Memory
Population
Incorrect memory configuration.
L’ordre d’insertion des barrettes
de mémoire est incorrect.
Vérifiez si l’écran affiche des
messages d’erreur spécifiques.
Voir “Dépannage de la mémoire
système”, page 121.
E2022 POST Fail Échec général après le test vidéo. Vérifiez si l’écran affiche des
messages d’erreur spécifiques.
E2110 MBE DIMM
nn & nn
L’une des barrettes DIMM
du groupe “nn & nn” présente une
erreur de mémoire multibits (MBE).
Voir “Dépannage de la mémoire
système”, page 121.
E2111 SBE Log Disable
DIMM nn
Le BIOS du système a désactivé la
consignation des erreurs de mémoire
portant sur un seul bit (SBE)
jusqu’au prochain redémarrage du
système. “nn” représente la barrette
DIMM indiquée par le BIOS.
Voir “Dépannage de la mémoire
système”, page 121.
I1910 Intrusion Le capot du système a été retiré. Ce message s’affiche uniquement
à titre d’information.
I1911 >3 ERRs Chk Log Les messages à afficher dépassent
la capacité de l’écran LCD.
L’écran LCD ne peut afficher que
trois messages d’erreur à la suite.
Le quatrième message indique
que la capacité de l’écran est
à son maximum.
Vérifiez le journal d’événements
du système pour plus de détails.
Tableau 1-7. Messages d’état affichés sur l’écran LCD (suite)
Message
sur
la ligne 2
Message
sur
la ligne 2
Causes Actions correctrices24 Présentation du système
Résolution des incidents décrits par les messages d’état de l’écran LCD
Le code et le texte affichés sur l’écran LCD permettent souvent d’identifier une panne précise pouvant
facilement être corrigée. Par exemple, si le code E0708 PROC_1_Presence s’affiche, cela signifie
qu’aucun microprocesseur n’est installé dans le support 1.
En outre, il est possible de déterminer la cause de l’incident si plusieurs erreurs de même type
surviennent. Par exemple, si vous recevez une série de messages indiquant plusieurs incidents
liés à la tension, le problème peut être lié à une défaillance d’un bloc d’alimentation.
Suppression des messages d’état de l’écran LCD
Pour les pannes liées aux capteurs (de température, de tension, des ventilateurs, etc.), le message
de l’écran LCD est supprimé automatiquement lorsque le capteur revient à la normale. Par exemple,
l’écran LCD affiche un message indiquant que la température d’un composant n’est pas conforme
aux limites acceptables, puis supprime ce message lorsque la température redevient normale.
Pour les messages suivants, une intervention de l’utilisateur est requise :
• Clear the SEL (Vider le journal d’événements du système) : cette tâche doit être effectuée à partir
du logiciel de gestion du système. L’historique des événements du système sera perdu.
• Power cycle (Mettre le système hors tension) : mettez le système hors tension et débranchez-le
de la prise de courant. Attendez environ 10 secondes, puis rebranchez le câble d’alimentation
et redémarrez le système.
I1912 SEL Full Le journal d’événements du système
est saturé et ne peut plus contenir
d’événements.
Supprimez des événements
du journal.
W1228 ROMB Batt < 24hr Ce message avertit qu’il reste
moins de 24 heures de charge
à la pile RAID.
Remplacez la pile RAID. Voir
“Installation de la pile d’une carte
contrôleur RAID SAS”, page 85.
REMARQUE : pour obtenir le nom complet d’une abréviation ou d’un sigle utilisé dans ce tableau, voir le
“Glossaire”, page 171.
Tableau 1-7. Messages d’état affichés sur l’écran LCD (suite)
Message
sur
la ligne 2
Message
sur
la ligne 2
Causes Actions correctricesPrésentation du système 25
Ces interventions permettent d’effacer les messages d’erreur. Les voyants d’état et l’écran LCD
reviennent à l’état normal. Les messages réapparaîtront dans les conditions suivantes :
• Le capteur est revenu à l’état normal mais a de nouveau subi une panne, ayant pour effet de créer
une nouvelle entrée dans le journal.
• Le système a été réinitialisé et de nouvelles erreurs ont été détectées.
• Une panne a été détectée sur une autre source correspondant au même message.
Messages système
Le système affiche des messages d’erreur pour informer l’utilisateur qu’un incident s’est produit.
Le tableau 1-8 répertorie les messages qui peuvent s’afficher et indique leur cause probable,
ainsi que les mesures correctives appropriées.
REMARQUE : si vous recevez un message du système qui n’est pas répertorié dans le tableau 1-8, vérifiez
la documentation de l’application que vous utilisiez au moment où le message est apparu. Vous pouvez aussi
vous reporter à la documentation du système d’exploitation pour obtenir une explication du message et l’action
conseillée.
PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour
accéder aux composants internes. Reportez-vous au document Product Information Guide (Guide d’informations
sur le produit) pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans
l’ordinateur et la protection contre les décharges électrostatiques.
Tableau 1-8. Messages système
Message Causes Actions correctrices
Alert! Node Interleaving
disabled! Memory
configuration does not
support Node Interleaving.
La configuration de la mémoire ne
prend pas en charge l’imbrication
de nœuds. Le système fonctionne,
mais de façon réduite.
Les barrettes de mémoire
doivent être installées dans une
configuration prenant en charge
l’imbrication de nœuds. Voir “Consignes
générales d’installation des barrettes de
mémoire”, page 64. Si l’incident persiste,
voir “Dépannage de la mémoire
système”, page 121.
Attempting to update
Remote Configuration.
Please wait...
Une requête de configuration
à distance a été détectée et est
en cours de traitement.
Attendez que le processus se termine.
BIOS Update Attempt
Failed!
La tentative de mise à jour à distance
du BIOS a échoué.
Réessayez de mettre le BIOS à jour.
Si l’incident persiste, voir “Obtention
d’aide”, page 145.
Caution! NVRAM_CLR
jumper is installed
on system board.
Le cavalier NVRAM_CLR est installé.
Le CMOS a été initialisé.
Retirez le cavalier NVRAM_CLR Voir la
figure 6-1 pour identifier l’emplacement
des cavaliers. 26 Présentation du système
Diskette drive n
seek failure
Paramètres incorrects dans
le programme de configuration
du système.
Lancez le programme de configuration
du système pour corriger les paramètres.
Voir “Utilisation du programme de
configuration du système”, page 33.
Lecteur de disquette défectueux
ou mal installé.
Remplacez la disquette. Si l’incident
persiste, voir “Dépannage d’un lecteur
de disquette”, page 123.
Câble d’interface du lecteur
de disquette ou câble d’alimentation débranché.
Réinsérez le câble d’interface du lecteur
de disquette ou le câble d’alimentation.
Voir “Dépannage d’un lecteur de
disquette”, page 123.
Diskette read failure Disquette défectueuse ou mal insérée. Remplacez la disquette. Si l’incident
persiste, voir “Dépannage d’un lecteur
de disquette”, page 123.
Diskette subsystem
reset failed
Disquette défectueuse ou mal insérée. Remplacez la disquette. Si l’incident
persiste, voir “Dépannage d’un lecteur
de disquette”, page 123.
Drive not ready Disquette manquante ou mal insérée
dans le lecteur.
Remplacez la disquette. Si l’incident
persiste, voir “Dépannage d’un lecteur
de disquette”, page 123.
Error: Memory failure
detected. Memory size
reduced. Replace the
faulty DIMM as soon
as possible.
Barrettes de mémoire défectueuses
ou mal installées.
Voir “Dépannage de la mémoire
système”, page 121.
Remote configuration
update attempt failed
Le système n’est pas parvenu à traiter
la requête de configuration à distance.
Faites une nouvelle tentative.
Fatal error caused
a system reset:
Please check the system
event log for details.
Erreur fatale du système. Consultez le journal d’événements du
système pour en connaître la cause, puis
reportez-vous à la section appropriée
dans la rubrique “Dépannage du
système”, page 109.
Gate A20 failure Contrôleur du clavier défectueux ;
carte système défectueuse.
Voir “Obtention d’aide”, page 145.
General failure Le système d’exploitation ne peut
pas exécuter la commande.
Ce message est habituellement suivi
d’informations spécifiques. Notez ces
informations et prenez les mesures
adéquates pour résoudre l’incident.
Tableau 1-8. Messages système (suite)
Message Causes Actions correctricesPrésentation du système 27
Invalid NVRAM
configuration, resource
re-allocated
Le système a détecté et corrigé un
conflit de ressources.
Aucune action n’est requise.
Keyboard Controller
failure
Contrôleur du clavier défectueux ;
carte système défectueuse.
Voir “Obtention d’aide”, page 145.
Manufacturing mode
detected
Le système est en mode assemblage. Redémarrez le système pour lui faire
quitter le mode assemblage.
Memory address line
failure at adresse, read
valeur expecting valeur
Barrette(s) de mémoire
défectueuse(s) ou mal installée(s).
Voir “Dépannage de la mémoire
système”, page 121.
Memory double word logic
failure at adresse, read
valeur expecting valeur
Memory odd/even logic
failure at adresse, read
valeur expecting valeur
Memory write/read failure
at address, read valeur
expecting valeur
Memory tests terminated
by keystroke.
Test de la mémoire interrompu lors
de l’auto-test de démarrage par une
pression de la barre d’espacement.
Ce message s’affiche uniquement à titre
d’information.
No boot device available Sous-système du lecteur optique,
du lecteur de disquette ou du disque
dur défectueux ou manquant ; disque
dur défectueux ou manquant ; aucune
disquette de démarrage dans l’unité A.
Utilisez une disquette, un CD ou un
disque dur amorçable. Si l’incident
persiste, voir les sections “Dépannage
d’un lecteur de disquette”, page 123,
“Dépannage d’un lecteur optique”,
page 124 et “Dépannage d’un disque
dur”, page 125. Voir “Utilisation du
programme de configuration
du système”, page 33 pour plus
d’informations sur la définition
de la séquence d’amorçage.
Tableau 1-8. Messages système (suite)
Message Causes Actions correctrices28 Présentation du système
No boot sector
on hard drive
Paramètres incorrects dans le
programme de configuration du
système ; système d’exploitation
introuvable sur le disque dur.
Vérifiez les paramètres de configuration
du disque dur dans le programme
de configuration du système. Voir
“Utilisation du programme de
configuration du système”, page 33.
Si nécessaire, installez le système
d’exploitation sur le disque dur.
Consultez la documentation du
système d’exploitation.
No timer tick interrupt Carte système défectueuse. Voir “Obtention d’aide”, page 145.
Not a boot diskette La disquette ne contient pas
de système d’exploitation.
Utilisez une disquette amorçable.
PCIe Degraded Link Width
Error: Embedded
Bus#nn/Dev#nn/Funcn
Expected Link Width is n
Actual Link Width is n
Carte PCIe défectueuse ou mal
installée dans le support spécifié.
Réinstallez la carte PCIe dans
le support dont le numéro est
spécifié. Voir “Installation d’une
carte d’extension”, page 60.
Si l’incident persiste, voir
“Obtention d’aide”, page 145.
PCIe Degraded Link Width
Error: Slot n
Expected Link Width is n
Actual Link Width is n
Carte PCIe défectueuse ou mal
installée dans le support spécifié.
Réinstallez la carte PCIe dans le support
dont le numéro est spécifié. Voir
“Installation d’une carte d’extension”,
page 60. Si l’incident persiste, voir
“Obtention d’aide”, page 145.
PCIe Fatal Error caused
a system reset: Slot n
ou
Embedded
Bus#nn/Dev#nn/Funcn
Please check the system
event log for details.
Carte PCIe défectueuse ou mal
installée dans le support spécifié.
Réinstallez la carte PCIe dans le support
dont le numéro est spécifié. Voir
“Installation d’une carte d’extension”,
page 60. Si l’incident persiste, voir
“Obtention d’aide”, page 145.
PCI BIOS failed to install Un échec de la somme
de contrôle du périphérique BIOS
PCI (ROM d’option) est détecté
lors de la duplication miroir. Câbles
de carte(s) d’extension mal branchés ;
carte d’extension défectueuse ou mal
installée.
Réinstallez les cartes PCIe dans
leur logement. Vérifiez que tous
les câbles sont fermement raccordés
aux cartes d’extension. Si l’incident
persiste, voir “Dépannage des cartes
d’extension”, page 129.
Tableau 1-8. Messages système (suite)
Message Causes Actions correctricesPrésentation du système 29
Plug & Play
Configuration Error
Une erreur s’est produite lors
de l’initialisation d’un périphérique
PCI ; la carte système est défectueuse.
Installez la fiche du cavalier
NVRAM_CLR et redémarrez
le système. Voir la figure 6-1 pour
identifier l’emplacement des cavaliers.
Si l’incident persiste, voir “Dépannage
des cartes d’extension”, page 129.
Read fault
Requested sector not found
Le système d’exploitation ne peut
pas lire la disquette ou le disque dur,
l’ordinateur n’a pas trouvé un secteur
particulier sur le disque ou le secteur
demandé est défectueux.
Remplacez la disquette. Assurez-vous
que les câbles du lecteur de disquette
et du disque dur sont correctement
connectés. Voir “Dépannage d’un lecteur
de disquette”, page 123, “Dépannage
d’un lecteur optique”, page 124 ou
“Dépannage d’un disque dur”, page 125.
Remote Access Controller
cable error or incorrect
card in the RAC slot.
Les câbles RAC sont déconnectés
ou la carte RAC a été installée dans
un logement d’extension incorrect.
Vérifiez que les câbles RAC sont
correctement connectés et que
la carte RAC est installée dans le
logement d’extension qui convient.
Voir “Carte RAC”, page 62.
Remote Access Controller
not installed in the
RAC slot.
La carte RAC est installée dans
un logement d’extension incorrect.
Vérifiez que la carte RAC est installée
dans le logement d’extension qui
convient. Voir “Carte RAC”, page 62.
Remote configuration
update attempt failed
Le système n’est pas parvenu à traiter
la requête de configuration à distance.
Faites une nouvelle tentative.
ROM bad checksum = adresse Carte d’extension défectueuse
ou mal installée.
Réinstallez les cartes PCIe dans leur
logement. Vérifiez que tous les câbles
sont fermement raccordés aux cartes
d’extension. Si l’incident persiste, voir
“Dépannage des cartes d’extension”,
page 129.
SAS port n hard disk drive
not found
Les câbles SAS ne sont pas connectés
correctement, ou bien le lecteur est
introuvable.
Voir “Dépannage d’un disque
dur”, page 125.
Sector not found
Seek error
Seek operation failed
Le lecteur de disquette ou le disque
dur est défectueux.
Voir “Dépannage d’un lecteur de
disquette”, page 123 ou “Dépannage
d’un disque dur”, page 125.
Shutdown failure Le test d’arrêt a échoué. Voir “Dépannage de la mémoire
système”, page 121.
Tableau 1-8. Messages système (suite)
Message Causes Actions correctrices30 Présentation du système
The amount of system
memory has changed
Ajout ou suppression de mémoire,
ou barrette de mémoire défectueuse.
Si vous venez d’ajouter ou de supprimer
de la mémoire, ce message s’affiche
uniquement pour information et peut
être ignoré. Dans le cas contraire, vérifiez
le journal d’événements du système pour
identifier les erreurs détectées et
remplacez la barrette de mémoire
défectueuse. Voir “Dépannage de la
mémoire système”, page 121.
This system supports only
Opteron 8000 series
processors.
Le ou les microprocesseurs ne sont
pas pris en charge par le système.
Installez un microprocesseur ou une
combinaison de microprocesseurs pris
en charge. Voir “Installation d’un
processeur”, page 72.
Time-of-day clock stopped Pile ou puce défectueuse. Voir “Dépannage de la pile du système”,
page 118.
Time-of-day not set -
please run SETUP program.
Paramètres d’heure ou de date
incorrects ; pile du système
défectueuse.
Vérifiez les paramètres de l’heure et de
la date. Voir “Utilisation du programme
de configuration du système”,
page 33. Si l’incident persiste,
remplacez la pile du système.
Voir “Pile du système”, page 88.
Timer chip counter 2
failed
Carte système défectueuse. Voir “Obtention d’aide”, page 145.
Unsupported CPU
combination
Unsupported CPU stepping
detected
Le ou les microprocesseurs ne sont pas
pris en charge par le système.
Installez un microprocesseur ou une
combinaison de microprocesseurs pris
en charge. Voir “Installation d’un
processeur”, page 72.
Utility partition
not available
Vous avez appuyé sur la touche
pendant l’auto-test de
démarrage, mais le disque dur
d’amorçage ne contient aucune
partition d’utilitaires.
Créez une partition d’utilitaires sur le
disque dur d’amorçage. Reportez-vous
aux CD fournis avec le système.
Warning: Following faulty
DIMMs are disabled:
CPUn: DIMM n
CPUn: DIMM n
Total memory size is
reduced.
Les barrettes de mémoire utilisées
par le processeur n sont défectueuses
ou mal installées.
Voir “Dépannage de la mémoire
système”, page 121.
Tableau 1-8. Messages système (suite)
Message Causes Actions correctricesPrésentation du système 31
Warning! No microcode
update loaded for
processor n
La mise à jour du micrologiciel
a échoué.
Mettez le BIOS à jour. Voir “Obtention
d’aide”, page 145.
Warning: One or more
faulty DIMMs found on CPUn
Les barrettes de mémoire utilisées
par le processeur n sont défectueuses
ou mal installées.
Voir “Dépannage de la mémoire
système”, page 121.
Warning: The installed
memory configuration is
not optimal. For more
information on valid
memory configurations,
please see the system
documentation on the
technical support web
site.
La configuration de mémoire n’est pas
valide. Le système fonctionne,
mais de façon réduite.
Les barrettes de mémoire doivent être
installées dans une configuration valide.
Voir “Consignes générales d’installation
des barrettes de mémoire”, page 64.
Si l’incident persiste, voir “Dépannage
de la mémoire système”, page 121.
Write fault
Write fault
on selected drive
Disquette ou disque dur défectueux ;
défaillance du sous-système du lecteur
optique, du lecteur de disquette
ou du disque dur.
Voir “Dépannage d’un lecteur de
disquette”, page 123, “Dépannage
d’un lecteur optique”, page 124
ou “Dépannage d’un disque dur”,
page 125.
REMARQUE : pour obtenir le nom complet d’une abréviation ou d’un sigle utilisé dans ce tableau,
voir le “Glossaire”, page 171.
Tableau 1-8. Messages système (suite)
Message Causes Actions correctrices32 Présentation du système
Messages d’avertissement
Un message d’avertissement signale un incident possible et vous demande une réponse avant de laisser
le système poursuivre son exécution. Par exemple, lorsque vous lancez le formatage d’une disquette,
un message vous avertit que vous allez perdre toutes les données qu’elles contient. Les messages
d’avertissement interrompent la tâche en cours et vous demandent de répondre en tapant
y (pour oui) ou n (pour non).
REMARQUE : ces messages sont générés par l’application ou par le système d’exploitation. Pour plus
d’informations, consultez la documentation fournie avec le système d’exploitation ou l’application.
Messages de diagnostic
Les diagnostics du système peuvent afficher un ou plusieurs messages d’erreur. Ceux-ci ne sont pas
traités dans la présente section. Prenez note du message sur une copie de la liste de vérification des
diagnostics (voir “Obtention d’aide”, page 145), puis suivez les instructions de cette section pour obtenir
une assistance technique.
Messages d’alerte
Le logiciel de gestion des systèmes génère des messages d’alerte système. Ils comprennent des messages
d’informations, d’état, d’avertissement et de panne concernant les conditions des lecteurs, de la
température, des ventilateurs et de l’alimentation. Pour obtenir des informations supplémentaires,
consultez la documentation du logiciel de gestion des systèmes.Utilisation du programme de configuration du système 33
Utilisation du programme de configuration
du système
Après avoir installé le système, lancez le programme de configuration pour vous familiariser avec
la configuration et les paramètres facultatifs disponibles. Notez les informations contenues dans
la configuration pour pouvoir vous y reporter ultérieurement.
Vous pouvez utiliser le programme de configuration du système pour :
• Modifier les informations de configuration stockées dans la mémoire vive rémanente après l’ajout,
la modification ou le retrait de matériel
• Définir ou modifier les options que l’utilisateur peut sélectionner, par exemple l’heure et la date
du système
• Activer ou désactiver les périphériques intégrés
• Corriger les incohérences éventuelles entre le matériel installé et les paramètres de configuration
Accès au programme de configuration du système
1 Allumez ou redémarrez le système.
2 Appuyez sur immédiatement après le message suivant :
= System Setup
Si le système d’exploitation commence à se charger alors que vous n’avez pas encore appuyé
sur , laissez-le finir de démarrer, puis arrêtez-le et réessayez.
REMARQUE : pour arrêter correctement le système, consultez la documentation du système
d’exploitation.
Réponse aux messages d’erreur
Vous pouvez accéder au programme de configuration du système en répondant à certains
messages d’erreur. Si un message d’erreur s’affiche quand le système démarre, notez ce message.
Avant d’accéder au programme de configuration du système, voir “Messages système”, page 25
pour trouver une explication du message et des suggestions de correction.
REMARQUE : il est normal qu’un message d’erreur s’affiche lorsque vous redémarrez le système après
avoir installé une extension de mémoire.34 Utilisation du programme de configuration du système
Utilisation du programme de configuration du système
Le tableau 2-1 répertorie les touches utilisées pour afficher ou modifier les informations affichées
dans les écrans du programme de configuration du système, et pour quitter ce programme.
REMARQUE : pour la plupart des options, les modifications effectuées sont enregistrées mais ne prennent effet
qu’au redémarrage du système.
Options du programme de configuration du système
Écran principal
Lorsque vous accédez au programme de configuration du système, son écran principal apparaît
(voir la figure 2-1).
Tableau 2-1. Touches de navigation du programme de configuration du système
Touches Action
Dans le menu principal, sélectionnez une option
disposant d’un sous-menu, telle que “Memory
Information” (Informations sur la mémoire).
Flèche vers le haut
ou
Le curseur passe au champ précédent.
Flèche vers le bas ou Le curseur passe au champ suivant.
Barre d’espacement, <+>, <–>,
flèche vers la gauche ou vers
la droite
Permet de faire défiler les options disponibles pour
un champ. Vous pouvez également taper la valeur
appropriée dans certains champs.
<Échap> Quitte le programme et redémarre le système
si des changements ont été effectués.
Ouvre le fichier d’aide du programme
de configuration du système.Utilisation du programme de configuration du système 35
Figure 2-1. Écran principal du programme de configuration du système
Le tableau 2-2 répertorie les options et les descriptions des champs qui apparaissent dans l’écran
principal du programme de configuration du système. Pour plus d’informations, voir “Options de l’écran
System Security (Sécurité du système)”, page 41.
REMARQUE : les options disponibles varient en fonction de la configuration du système.
REMARQUE : les valeurs par défaut sont répertoriées sous le paramètre correspondant, le cas échéant.36 Utilisation du programme de configuration du système
Tableau 2-2. Options du programme de configuration du système
Option Description
System Time (Heure système) Réinitialise l’heure de l’horloge interne du système.
System Date (Date système) Réinitialise la date du calendrier interne du système.
Memory Information
(Informations sur la mémoire)
Affiche des informations relatives à la mémoire installée. Voir “Écran
Memory Information (Informations sur la mémoire)”, page 38.
CPU Information
(Informations sur
le processeur)
Affiche des informations relatives aux microprocesseurs (vitesse, taille de la
mémoire cache, etc.). Voir “Écran CPU Information (Informations sur le
processeur)”, page 39.
Boot Sequence (Séquence
d’amorçage)
Détermine l’ordre dans lequel le système recherche les périphériques
d’amorçage pendant le démarrage du système. Les options disponibles
sont le lecteur de disquette, le lecteur de CD, les disques durs et le réseau.
REMARQUE : le démarrage du système à partir d’un périphérique externe
connecté à une carte SAS n’est pas pris en charge. Voir le site support.dell.com
pour obtenir les informations les plus récentes concernant le démarrage à partir
de périphériques externes.
Hard-Disk Drive Sequence
(Séquence des disques durs)
Détermine l’ordre dans lequel le système recherche les disques durs pendant
le démarrage du système. Les sélections dépendent des disques durs installés.
USB Flash Drive Type
(Type de lecteur Flash USB)
Auto (option par défaut)
Détermine le type d’émulation pour le lecteur flash USB. L’option Hard disk
(Disque dur) permet au lecteur flash USB de se comporter comme un disque
dur. L’option Floppy (Lecteur de disquette) permet au lecteur flash USB de
se comporter comme un lecteur de disquette amovible. L’option Auto choisit
automatiquement le type d’émulation.
Boot Sequence Retry
(Nouvelle tentative
de séquence d’amorçage)
Si ce champ est activé et si le système n’a pas démarré correctement,
ce dernier effectue une nouvelle tentative 30 secondes plus tard.
Integrated Devices
(Périphériques intégrés)
Voir “Écran Integrated Devices (Périphériques intégrés)”, page 40.
PCI IRQ Assignment
(IRQ affectées aux
périphériques PCI)
Affiche un écran permettant de modifier l’IRQ affectée à chaque
périphérique intégré du bus PCI, ainsi qu’à toutes les cartes d’extension
nécessitant une IRQ.Utilisation du programme de configuration du système 37
Serial Communication
(Communication série)
Off (Désactivé, option
par défaut)
Les options disponibles sont On with Console Redirection
(Activée avec redirection de console) via COM2 et Off (Désactivée).
ESM (Embedded Server
Management [gestion
de serveur intégrée])
Affiche un écran permettant de configurer les options de l’écran LCD
du panneau avant et de définir une chaîne affichée sur cet écran.
System Security
(Sécurité du système)
Affiche un écran permettant de configurer le mot de passe système ainsi
que les fonctions de mot de passe. Pour plus d’informations, voir les sections
“Écran System Security (Sécurité du système)”, page 41, “Utilisation du mot
de passe système”, page 43 et “Utilisation du mot de passe de configuration”,
page 46.
Keyboard NumLock
(Touche Verr Num)
On (Activé, option par défaut)
Détermine si le système démarre en mode Verr Num s’il est équipé d’un
clavier à 101 ou 102 touches (cette option ne s’applique pas aux claviers
à 84 touches).
Report Keyboard Errors
(Signaler les erreurs de clavier)
Report (Signaler, option
par défaut)
Active ou désactive la consignation des erreurs liées au clavier
pendant l’auto-test de démarrage. Sélectionnez Report (Signaler) pour les
systèmes hôtes équipés de claviers. Sélectionnez Do Not Report (Ne pas
signaler) pour supprimer tous les messages d’erreur liés au clavier ou à son
contrôleur pendant l’auto-test de démarrage. Ce paramètre n’affecte pas
le fonctionnement du clavier lui-même, s’il est connecté au système.
Tableau 2-2. Options du programme de configuration du système (suite)
Option Description38 Utilisation du programme de configuration du système
Écran Memory Information (Informations sur la mémoire)
Le tableau 2-4 répertorie les descriptions des champs qui apparaissent dans l’écran Memory Information
(Informations sur la mémoire).
Tableau 2-3. Écran Memory Information (Informations sur la mémoire)
Option Description
System Memory Size
(Taille de la mémoire système)
Affiche la quantité de mémoire système.
System Memory Type
(Type de mémoire système)
Affiche le type de la mémoire.
System Memory Speed
(Vitesse de la mémoire système)
Affiche la vitesse de la mémoire système.
Video Memory (Mémoire vidéo) Affiche la quantité de mémoire vidéo.
System Memory Testing
(Test de la mémoire système)
Cette option détermine si la mémoire système est testée à chaque
démarrage. Les valeurs possibles sont Enabled (Activé) et Disabled
(Désactivé).
Node Interleaving
(Imbrication de nœuds)
Lorsque ce champ est activé, l’imbrication de mémoire est
prise en charge si une configuration de mémoire symétrique
est installée. S’il est désactivé (état par défaut), le système est
en mesure de prendre en charge les configurations mémoire NUMA
(Non-Uniform Memory Architecture [Architecture mémoire non
uniforme]). Voir “Consignes générales d’installation des barrettes
de mémoire”, page 64.Utilisation du programme de configuration du système 39
Écran CPU Information (Informations sur le processeur)
Le tableau 2-4 répertorie les options et les descriptions des champs qui apparaissent dans l’écran
CPU Information (Informations sur le processeur).
Activation de la technologie PowerNow!™
La technologie PowerNow! contrôle les performances du processeur du système en réglant automatiquement sa fréquence de fonctionnement et sa tension en fonction de la tâche exécutée. Elle
permet d’économiser une quantité considérable d’énergie lorsqu’une application ne requiert pas des
performances optimales. Ainsi, le processeur fonctionne à sa vitesse maximale lorsque cela est nécessaire,
mais la fonction d’économie d’énergie est utilisée autant que possible.
REMARQUE : la prise en charge de PowerNow! dépend du système d’exploitation installé sur le système
et de sa version.
Pour activer cette fonction, accédez au programme de configuration du système et activez l’option
Demand-Based Power Management (Gestion de l’alimentation en fonction de la demande) dans
l’écran CPU Information (Informations sur le processeur).
Sous Microsoft®
Windows®
, vous devrez également installer le pilote PowerNow! pour pouvoir activer
la fonction. Ce pilote est disponible sur le CD Dell OpenManage Service and Diagnostic fourni avec
le système, ainsi que sur le site support.dell.com.
Tableau 2-4. Écran CPU Information (Informations sur le processeur)
Option Description
64-bit (64 bits) Indique si le ou les processeurs installés prennent en charge
les extensions Intel 64 bits.
Core Speed (Vitesse d’horloge) Affiche la vitesse d’horloge du ou des processeurs.
Bus Speed (Vitesse du bus) Affiche la vitesse de bus du ou des processeurs.
Demand-Based Power
Management (Gestion
de l’alimentation en
fonction de la demande)
Disabled (Désactivé,
option par défaut)
Active ou désactive la gestion de l’alimentation en fonction
de la demande. Si cette option est activée, les tables d’état
des performances du processeur sont envoyées au système
d’exploitation. Si l’un des processeurs ne prend pas en charge
la gestion de l’alimentation en fonction de la demande, le champ
est en lecture seule et est défini sur Disabled (Désactivé).
Processor X ID
(ID Processeur X)
Affiche le numéro de modèle du processeur. Un sous-menu affiche
la quantité de mémoire cache de niveau 2 et le nombre de noyaux.40 Utilisation du programme de configuration du système
Écran Integrated Devices (Périphériques intégrés)
Le tableau 2-5 répertorie les options et les descriptions des champs qui apparaissent dans l’écran
Integrated Devices (Périphériques intégrés).
Tableau 2-5. Options de l’écran Integrated Devices (Périphériques intégrés)
Option Description
IDE CD-ROM Controller
(Contrôleur de lecteur
de CD-ROM IDE)
Auto (option par défaut)
Active le contrôleur IDE intégré. Si cette option est définie sur Auto, chaque canal
du contrôleur IDE intégré est activé si des périphériques IDE sont connectés au canal
et si aucun contrôleur IDE externe n’est détecté.
REMARQUE : cette option ne s’affiche pas dans le menu si le système n’est pas
équipé de ce périphérique en option.
User Accessible USB Ports
(Ports USB accessibles
aux utilisateurs)
All Ports On (Tous ports
activés, option par défaut)
Active ou désactive les ports du système qui sont accessibles à l’utilisateur.
Les options disponibles sont All Ports On (Tous ports activés), Only Back Ports
On (Ports arrière activés) ou All Ports Off (Tous ports désactivés). La désactivation
des ports USB permet de libérer des ressources système pour les autres
périphériques.
Embedded Gb NIC1
(NIC Gigabit intégré 1)
Enabled with PXE
(Activé avec PXE,
option par défaut)
Active ou désactive le NIC1 intégré au système. Les options disponibles sont
Enabled without PXE (Activé sans PXE), Enabled with PXE (Activé avec PXE)
et Disabled (Désactivé). Le support PXE permet au système de démarrer à partir
du réseau. Les modifications prennent effet après le redémarrage du système.
MAC Address
(Adresse MAC)
Affiche l’adresse MAC du NIC1. L’utilisateur ne peut pas modifier la valeur
de ce champ.
Embedded Gb NIC2
(NIC Gigabit intégré 2)
Enabled without PXE
(Activé sans PXE,
valeur par défaut)
Active ou désactive le NIC2 intégré au système. Les options disponibles sont
Enabled without PXE (Activé sans PXE), Enabled with PXE (Activé avec PXE)
et Disabled (Désactivé). Le support PXE permet au système de démarrer à partir
du réseau. Les modifications prennent effet après le redémarrage du système.
MAC Address
(Adresse MAC)
Affiche l’adresse MAC du NIC2. L’utilisateur ne peut pas modifier la valeur
de ce champ.
TOE Capability
(Fonctionnalité TOE)
Affiche l’état de la fonctionnalité TOE (TCP/IP Offload Engine, moteur
de décentralisation TCP/IP) pour le NIC.Utilisation du programme de configuration du système 41
Écran System Security (Sécurité du système)
Le tableau 2-6 répertorie les options et les descriptions des champs qui apparaissent dans l’écran System
Security (Sécurité du système).
Tableau 2-6. Options de l’écran System Security (Sécurité du système)
Option Description
System Password
(Mot de passe système)
Affiche l’état actuel de la fonction de protection par mot de passe et permet
d’attribuer et de confirmer un nouveau mot de passe système.
REMARQUE : voir “Utilisation du mot de passe système”, page 43 pour obtenir des
instructions sur l’attribution, l’utilisation ou la modification d’un mot de passe système
existant.
Setup Password
(Mot de passe
de configuration)
Restreint l’accès au programme de configuration du système, tout comme le mot
de passe système protège l’accès à ce dernier.
REMARQUE : voir “Utilisation du mot de passe de configuration”, page 46 pour plus
d’instructions sur l’attribution, l’utilisation ou la modification d’un mot de passe de
configuration existant.
Password Status
(État du mot de passe)
Si l’option Setup Password (Mot de passe de configuration) est définie sur
Enabled (Activé), le mot de passe système ne peut pas être modifié ni désactivé
au démarrage du système.
Pour empêcher la modification du mot de passe système, définissez un mot
de passe de configuration à l’aide de l’option Setup Password (Mot de passe
de configuration), puis paramétrez Password Status (État du mot de passe) sur
Locked (Verrouillé). Le mot de passe système ne peut alors plus être changé via
l’option System Password (Mot de passe système). Il est également impossible
de le désactiver au démarrage du système en appuyant sur .
Pour déverrouiller le mot de passe système, entrez le mot de passe de configuration
dans le champ Setup Password (Mot de passe de configuration) et paramétrez
Password Status (État du mot de passe) sur Unlocked (Non verrouillé). Il redevient
alors possible de désactiver le mot de passe système au démarrage en appuyant
sur , puis de le modifier en utilisant l’option System Password
(Mot de passe système).42 Utilisation du programme de configuration du système
Écran Exit (Quitter)
Une fois que vous avez appuyé sur <Échap> pour quitter le programme de configuration du système,
l’écran Exit (Quitter) affiche les options suivantes :
• Save Changes and Exit (Enregistrer les modifications et quitter)
• Discard Changes and Exit (Annuler les modifications et quitter)
• Return to Setup (Retourner au programme de configuration)
Power Button
(Bouton d’alimentation)
Ce bouton met le système sous tension et hors tension.
• Si vous éteignez un ordinateur utilisant un système d’exploitation conforme ACPI
en appuyant sur le bouton d’alimentation, le système peut effectuer un arrêt
normal avant que l’alimentation ne soit coupée.
• Si le système d’exploitation n’est pas conforme ACPI, une pression sur ce bouton
met immédiatement l’ordinateur hors tension.
Ce bouton est activé dans le programme de configuration du système. Si vous
sélectionnez “Disabled” (Désactivé), le bouton sert uniquement à mettre le
système sous tension.
REMARQUE : il est toujours possible d’allumer le système à l’aide du bouton
d’alimentation, même si l’option Power Button (Bouton d’alimentation) a la valeur
Disabled (Désactivé).
NMI Button
(Bouton NMI)
AVIS : utilisez ce bouton uniquement si un technicien de support qualifié vous
demande de le faire, ou si cela est préconisé dans la documentation du système
d’exploitation. Lorsque vous appuyez dessus, le système d’exploitation s’arrête
et affiche un écran de diagnostic.
Active ou désactive la fonction NMI.
AC Power
Recovery (Retour
de l’alimentation secteur)
Last (Dernier, option
par défaut)
Détermine le comportement du système au retour de l’alimentation secteur.
L’option Last (Dernier) indique que le système doit revenir au même état qu’avant
la coupure d’alimentation. Avec l’option On (Marche), le système démarre dès que
l’alimentation en CA est rétablie. Avec l’option Off (Arrêt), il reste hors tension
quand l’alimentation est rétablie.
Tableau 2-6. Options de l’écran System Security (Sécurité du système) (suite)
Option DescriptionUtilisation du programme de configuration du système 43
Mot de passe système et mot de passe de configuration
AVIS : les mots de passe offrent simplement une fonction de sécurité de base protégeant les données du système.
Si vos données nécessitent une protection plus importante, prenez des mesures supplémentaires (chiffrement des
données, etc.).
AVIS : il est très facile d’accéder aux données stockées sur le système si vous laissez celui-ci sans surveillance
alors que vous n’avez pas défini de mot de passe système. Si l’ordinateur n’est pas verrouillé, une personne non
autorisée peut aussi déplacer le cavalier d’activation du mot de passe et effacer celui-ci.
À la livraison de l’ordinateur, le mot de passe système n’est pas activé. Si votre système doit
impérativement être protégé, ne l’utilisez qu’après avoir activé la protection par mot de passe.
Vous ne pouvez changer ou supprimer que les mots de passe que vous connaissez
(voir “Suppression ou modification d’un mot de passe système existant”, page 45). Si vous
avez oublié votre mot de passe, vous ne pourrez pas faire fonctionner le système ni modifier
sa configuration tant qu’un technicien de maintenance qualifié n’aura pas effacé les mots de passe
en déplaçant le cavalier approprié sur la carte système. Cette procédure est décrite dans la section
“Désactivation d’un mot de passe oublié”, page 139.
Utilisation du mot de passe système
Si un mot de passe système est défini, seuls ceux qui le connaissent ont accès au système. Si le paramètre
System Password (Mot de passe système) est réglé sur Enabled (Activé), le mot de passe doit être entré
au démarrage de l’ordinateur.
Attribution d’un mot de passe système
Avant d’attribuer un mot de passe système, accédez au programme de configuration du système
et vérifiez l’option System Password (Mot de passe système).
Si un mot de passe système est attribué, l’option System Password a la valeur Enabled (Activé).
Si le paramètre Password Status (État du mot de passe) indique Unlocked (Non verrouillé), vous
pouvez modifier le mot de passe système. Si Password Status (État du mot de passe) indique Locked
(Verrouillé), vous ne pouvez pas modifier ce mot de passe. Si le mot de passe système est désactivé par
la position d’un cavalier, l’état est Disabled (Désactivé). Il est alors impossible d’entrer ce mot de passe
et de le modifier.
Si aucun mot de passe système n’est attribué et si le cavalier de mot de passe de la carte système est
sur la position activée (réglage par défaut), l’option System Password (Mot de passe système) est définie
sur Not Enabled (Désactivé) et le champ Password Status (État du mot de passe) indique Unlocked
(Non verrouillé). Pour attribuer un mot de passe système :
1 Vérifiez que l’option Password Status (État du mot de passe) a la valeur Unlocked (Non verrouillé).
2 Sélectionnez System Password (Mot de passe système) et appuyez sur . 44 Utilisation du programme de configuration du système
3 Tapez le nouveau mot de passe système.
Le mot de passe peut contenir jusqu’à 32 caractères.
Les caractères entrés ne sont pas affichés dans le champ, ils sont remplacés (y compris les espaces)
par des caractères génériques.
L’attribution du mot de passe ne tient pas compte de la différence entre majuscules et minuscules.
Cependant, certaines combinaisons de touches ne sont pas valides. Pour supprimer un caractère lors
de l’entrée de votre mot de passe, appuyez sur la touche ou sur la touche fléchée
vers la gauche.
REMARQUE : pour quitter le champ sans attribuer de mot de passe, appuyez sur . Vous passerez
alors au champ suivant, ou appuyez sur <Échap> à tout moment avant la fin de l’étape 5.
4 Appuyez sur .
5 Pour confirmer votre mot de passe, tapez-le une seconde fois et appuyez sur .
L’option System Password (Mot de passe système) prend la valeur Enabled (Activé). Quittez
le programme de configuration en sauvegardant et commencez à utiliser le système.
6 Vous pouvez redémarrer le système immédiatement pour activer la protection par mot de passe,
ou simplement continuer à travailler.
REMARQUE : la protection par mot de passe ne prend effet que lorsque vous redémarrez le système.
Protection de l’ordinateur à l’aide d’un mot de passe système
REMARQUE : si vous avez attribué un mot de passe de configuration (voir “Utilisation du mot de passe
de configuration”, page 46), le système l’accepte également comme mot de passe système.
Lorsque le paramètre Password Status (État du mot de passe) a la valeur Unlocked (Non verrouillé),
vous pouvez activer ou désactiver la protection par mot de passe.
Pour laisser la protection par mot de passe activée :
1 Démarrez le système ou redémarrez-le en appuyant sur .
2 Tapez le mot de passe et appuyez sur .
Pour désactiver la protection par mot de passe :
1 Démarrez le système ou redémarrez-le en appuyant sur .
2 Tapez le mot de passe et appuyez sur .
Si l’option Password Status (État du mot de passe) a la valeur Locked (Verrouillé) lorsque vous allumez
ou redémarrez le système (en appuyant sur ), tapez votre mot de passe
et appuyez sur à l’invite du système.
Une fois que vous avez tapé le mot de passe système correct et appuyé sur , le système
fonctionne normalement.Utilisation du programme de configuration du système 45
Si vous entrez un mot de passe incorrect, le système affiche un message et vous invite à entrer
de nouveau votre mot de passe. Vous disposez de trois tentatives pour entrer le bon mot de passe.
Après une troisième tentative infructueuse, le système indique qu’il va s’arrêter. L’affichage de ce
message peut vous alerter du fait qu’une personne a essayé d’utiliser le système à votre insu.
Même si vous avez éteint et redémarré le système, le message d’erreur continue à s’afficher jusqu’à
ce que le bon mot de passe soit entré.
REMARQUE : vous pouvez combiner l’utilisation des paramètres Password Status (État du mot de passe),
System Password (Mot de passe système) et Setup Password (Mot de passe de configuration) pour mieux
protéger le système contre toute modification non autorisée.
Suppression ou modification d’un mot de passe système existant
1 À l’invite, appuyez sur pour désactiver le mot de passe système existant.
S’il vous est demandé d’entrer le mot de passe de configuration, contactez votre administrateur réseau.
2 Pour ouvrir le programme de configuration du système, appuyez sur pendant l’auto-test
de démarrage.
3 Sélectionnez le champ System Security (Sécurité du système) pour vérifier que l’option Password
Status (État du mot de passe) est définie sur Unlocked (Non verrouillé).
4 À l’invite, entrez le mot de passe système.
5 Vérifiez que l’option System Password (Mot de passe système) est définie sur Not Enabled
(Non activé).
Si tel est le cas, le mot de passe système a été supprimé. Si l’option System Password (Mot de passe
système) est définie sur Enabled (Activé), appuyez sur pour redémarrer le système,
puis recommencez les étapes 2 à 5.46 Utilisation du programme de configuration du système
Utilisation du mot de passe de configuration
Lisez les sections suivantes pour attribuer ou modifier le mot de passe de configuration.
Attribution d’un mot de passe de configuration
Un mot de passe de configuration ne peut être attribué (ou modifié) que lorsque l’option Setup
Password (Mot de passe de configuration) est définie sur Not Enabled (Désactivé). Pour attribuer
un mot de passe de configuration, sélectionnez l’option Setup Password (Mot de passe de configuration)
et appuyez sur <+> ou sur <–>. Le système vous invite à entrer et à confirmer le mot de passe. Si vous
utilisez un caractère non autorisé, le système émet un signal sonore.
REMARQUE : le mot de passe de configuration peut être identique à celui du système. si les deux mots de passe
sont différents, le mot de passe de configuration peut être utilisé à la place du mot de passe système, mais
l’opération inverse n’est pas possible.
Le mot de passe peut contenir jusqu’à 32 caractères.
Les caractères entrés ne sont pas affichés dans le champ, ils sont remplacés (y compris les espaces)
par des caractères génériques.
L’attribution du mot de passe ne tient pas compte de la différence entre majuscules et
minuscules. Cependant, certaines combinaisons de touches ne sont pas valides. Si vous entrez une
de ces combinaisons, le système émet un signal sonore. Pour supprimer un caractère lors de l’entrée
de votre mot de passe, appuyez sur la touche ou sur la touche fléchée vers la gauche.
Une fois le mot de passe vérifié, le paramètre Setup Password (Mot de passe de configuration) prend
la valeur Enabled (Activé). La prochaine fois que vous accéderez au programme de configuration,
le système vous demandera d’entrer le mot de passe de configuration.
La modification du mot de passe de configuration prend effet immédiatement (il n’est pas nécessaire
de redémarrer le système).Utilisation du programme de configuration du système 47
Fonctionnement du système avec un mot de passe de configuration activé
Si le paramètre Setup Password (Mot de passe de configuration) a la valeur Enabled (Activé), vous devez
entrer ce mot de passe pour modifier la plupart des options de configuration du système. Une invite
de saisie s’affiche lorsque vous accédez au programme de configuration du système.
Si vous n’entrez pas le bon mot de passe au bout de trois essais, vous pouvez visualiser les écrans
de configuration du système mais vous ne pouvez y apporter aucune modification. La seule exception
est la suivante : si le paramètre System Password (Mot de passe système) n’a pas la valeur Enabled
(Activé) et n’est pas verrouillé par l’option Password Status (État du mot de passe), vous pouvez
attribuer un mot de passe système. Cependant, vous ne pouvez pas désactiver ni modifier un mot
de passe existant.
REMARQUE : il est possible de combiner l’utilisation des options Password Status (État du mot de passe) et Setup
Password (Mot de passe de configuration) pour empêcher toute modification du mot de passe système.
Suppression ou modification d’un mot de passe de configuration existant
1 Ouvrez le programme de configuration du système et sélectionnez l’option System Security
(Sécurité du système).
2 Sélectionnez l’option Setup Password (Mot de passe de configuration), appuyez sur
pour accéder à la fenêtre appropriée, et appuyez sur deux fois pour effacer le mot
de passe en cours.
Le paramètre prend la valeur Not Enabled (Non activé).
3 Si vous souhaitez attribuer un nouveau mot de passe de configuration, suivez les étapes décrites dans
la section “Attribution d’un mot de passe de configuration”, page 46.48 Utilisation du programme de configuration du système
Désactivation d’un mot de passe oublié
Voir “Désactivation d’un mot de passe oublié”, page 139.
Configuration du contrôleur BMC
Le contrôleur BMC permet de configurer, contrôler et restaurer les systèmes à distance. Il offre les
fonctionnalités suivantes :
• Utilisation du NIC intégré au système
• Consignation des incidents et alertes SNMP
• Accès au journal d’événements du système et à l’état du capteur
• Contrôle des fonctions du système, y compris la mise sous tension et hors tension
• Support indépendant de l’état d’alimentation ou de fonctionnement du système
• Redirection de la console de texte pour la configuration du système, les utilitaires à interface texte
et les consoles du système d’exploitation
REMARQUE : pour accéder à distance au contrôleur BMC à l’aide des NIC intégrés, vous devez connecter
le réseau au NIC1 intégré.
Pour plus d’informations sur l’utilisation du contrôleur BMC, consultez la documentation des applications
BMC et de gestion des systèmes.
Accès au module de configuration BMC
1 Allumez ou redémarrez le système.
2 À l’invite qui s’affiche après l’auto-test de démarrage, appuyez sur .
Si le système d’exploitation commence à se charger alors que vous n’avez pas encore appuyé sur
, laissez-le finir de démarrer, puis arrêtez-le et réessayez.
Options du module de configuration du contrôleur BMC
Pour plus d’informations concernant les options du module de configuration du contrôleur BMC et du
port EMP (port de gestion d’urgence), consultez le document BMC User’s Guide (Guide d’utilisation
du contrôleur BMC).Installation des composants du système 49
Installation des composants du système
Cette section décrit l’installation des composants suivants :
• Cadre avant
• Capot du système
• Modules de ventilation
• Protecteurs de ventilation
• Blocs d’alimentation
• Cartes d’extension
• Carte RAC
• Mémoire système
• Processeurs
• Lecteur de disquette
• Lecteur optique
• Disques durs
• Carte contrôleur SAS
• Pile RAID
• Lecteur de bande SAS externe
• Périphérique Fibre Channel externe
• Pile du système
• Panneau de commande
• Carte intermédiaire de ventilateur
• Carte de distribution de l’alimentation
• Commutateur d’intrusion du châssis
• Carte de fond de panier SAS
• Carte système50 Installation des composants du système
Outils recommandés
Vous pouvez avoir besoin des éléments suivants pour exécuter les procédures de cette section :
• Clé du système
• Tournevis cruciforme n° 2
• Tournevis Torx T10
• Petit tournevis plat
• Bracelet anti-statique
Intérieur du système
PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour
accéder aux composants internes. Reportez-vous au document Product Information Guide (Guide d’informations
sur le produit) pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans
l’ordinateur et la protection contre les décharges électrostatiques.
Sur la figure 3-1, le cadre, le capot et les protecteurs de ventilation ont été retirés pour montrer l’intérieur
du système.
AVIS : ne retirez pas les protecteurs de ventilation si le système est sous tension. Ceux-ci doivent être installés
de manière à diriger la circulation de l’air produit par les ventilateurs. Installation des composants du système 51
Figure 3-1. Intérieur du système
La carte système contient les circuits de contrôle du système et d’autres composants électroniques.
Les processeurs et les barrettes de mémoire sont installés directement sur cette carte.
Les baies de disques durs peuvent accueillir jusqu’à cinq disques SAS de 3,5 pouces (en option). Ceux-ci
sont connectés à une carte contrôleur SAS ou RAID SAS (en option) par l’intermédiaire d’un fond de
panier SAS. Un support de lecteur amovible peut accueillir un lecteur optique et un lecteur de disquette,
tous deux en option.
7
5
8
2
1
6
9
3
4
1 Modules de ventilation (4) 2 Fond de panier SAS 3 Processeurs/dissipateurs
de chaleur (4)
4 Barrettes de mémoire (16) 5 Cartes d’extension (7) 6 Carte contrôleur SAS
7 Carte RAC (en option) 8 Lecteur optique slim (en option) 9 Disques durs de 3,5 pouces,
en option (5)52 Installation des composants du système
Retrait et réinstallation du cadre avant en option
1 Ouvrez le verrou situé sur le côté gauche du cadre.
2 Faites pivoter le côté gauche du cadre pour l’écarter du panneau avant.
3 Dégagez la partie droite du cadre puis retirez-le.
Figure 3-2. Retrait et réinstallation du cadre avant en option
Pour réinstaller le cache en option, emboîtez sa partie droite sur le châssis, puis remettez le cache sur
le système. Bloquez le cadre à l’aide du verrou. Voir la figure 3-2.
Ouverture et fermeture du système
PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour
accéder aux composants internes. Reportez-vous au document Product Information Guide (Guide d’informations
sur le produit) pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans
l’ordinateur et la protection contre les décharges électrostatiques.
PRÉCAUTION : demandez toujours de l’aide avant de soulever le système. N’essayez pas de le soulever seul
car vous risqueriez de vous blesser.
1 Verrou 2 Cadre
2
1Installation des composants du système 53
Ouverture du système
1 Sauf si vous installez un composant enfichable à chaud, tel qu’un ventilateur ou un disque dur,
vous devez arrêter le système et les périphériques connectés, puis le débrancher de la prise de courant
et des périphériques.
2 Tournez le verrou du loquet de fermeture dans le sens inverse des aiguilles d’une montre.
Voir la figure 3-3.
3 Soulevez le loquet situé sur la partie supérieure du système puis faites glisser le capot vers l’arrière.
Voir la figure 3-3.
4 Saisissez le capot de chaque côté et soulevez-le doucement pour le retirer du système.
Figure 3-3. Retrait et réinstallation du capot du système
1 Loquet 2 Verrou du loquet de fermeture 3 Crochets en J
2
1
354 Installation des composants du système
Fermeture du système
1 Soulevez le loquet du capot.
2 Alignez le capot avec les bords gauche et droit du système, puis décalez-le légèrement vers l’arrière
de façon que les pattes situées à l’intérieur du capot s’enclenchent dans les crochets en J.
Voir la figure 3-3.
3 Rabattez le capot sur le châssis et refermez le loquet.
4 Tournez le verrou du loquet de fermeture dans le sens des aiguilles d’une montre pour fixer le capot.
Ventilateurs
Ce système est équipé de quatre ventilateurs enfichables à chaud, qui sont connectés directement
à la carte système.
AVIS : en cas de panne, les numéros attribués aux ventilateurs permettent au logiciel de gestion des systèmes
de vous indiquer quel ventilateur doit être remplacé.
Retrait d’un ventilateur
PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour
accéder aux composants internes. Reportez-vous au document Product Information Guide (Guide d’informations
sur le produit) pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans
l’ordinateur et la protection contre les décharges électrostatiques.
REMARQUE : la procédure de retrait est la même pour tous les modules de ventilation.
1 Ouvrez le système. Voir “Ouverture du système”, page 53.
2 Appuyez sur les deux loquets situés en haut du ventilateur puis retirez celui-ci. Voir la figure 3-4.Installation des composants du système 55
Figure 3-4. Retrait et installation d’un ventilateur
Réinstallation d’un ventilateur
REMARQUE : la procédure d’installation est la même pour tous les ventilateurs.
1 Vérifiez que la poignée du ventilateur est relevée et insérez ce dernier sur la base de rétention
jusqu’à ce qu’il soit correctement emboîté. Abaissez la poignée du ventilateur jusqu’à ce que
vous entendiez un déclic. Voir la figure 3-4.
2 Refermez le système. Voir “Fermeture du système”, page 54.
1 Ventilateur 2 Loquets (2) 3 Connecteur d’alimentation
du ventilateur
4 Connecteur d’alimentation
du ventilateur sur la baie
5 FAN4 6 FAN2
7 FAN1 8 FAN3
1 2
3
4
8
6
5
756 Installation des composants du système
Protecteurs de ventilation
Les trois protecteurs de ventilation dirigent la ventilation à l’intérieur du système.
Retrait des protecteurs de ventilation
AVIS : ne retirez pas les protecteurs de ventilation si le système est sous tension. Ceux-ci doivent être installés
de manière à diriger la circulation de l’air produit par les ventilateurs.
1 Saisissez le protecteur de ventilation supérieur par les quatre trous prévus à cet effet, puis soulevez-le
pour le retirer du système. Voir la figure 3-5.
2 Retirez les protecteurs de gauche et de droite pour faciliter l’accès aux composants internes
du système.
Figure 3-5. Retrait et réinstallation des protecteurs de ventilation
1 Protecteur de ventilation de gauche 2 Trous 3 Protecteur de ventilation de droite
4 Protecteur de ventilation supérieur 5 Guide 6 Logement
1
3
2
5
4
6Installation des composants du système 57
Réinstallation des protecteurs de ventilation
1 Insérez verticalement le protecteur de gauche dans le système. Les guides situés sur les bords
du protecteur doivent s’insérer dans les fentes correspondantes situées sur les côtés du châssis.
Voir la figure 3-5.
2 Appuyez doucement sur le protecteur jusqu’à ce qu’il s’enclenche dans le châssis.
3 Installez le protecteur de droite.
4 Installez le protecteur supérieur.
Blocs d’alimentation
Le système peut être équipé de deux blocs d’alimentation d’une puissance de sortie de 1570 W.
Le second bloc est utilisé comme une source d’alimentation redondante enfichable à chaud.
AVIS : le système assure un mode redondant uniquement si deux blocs d’alimentation sont installés et s’ils sont
connectés à une source en CA. Si vous installez certains composants tiers (cartes PCI, par exemple) non testés
ou non pris en charge par Dell, il est possible que les blocs d’alimentation ne soient pas redondants à certaines
tensions en entrée.
AVIS : le système risque de surchauffer si vous l’utilisez pendant une période prolongée avec un seul bloc
d’alimentation.
Retrait d’un bloc d’alimentation
1 Déconnectez le câble d’alimentation du secteur et du bloc que vous souhaitez retirer.
2 Appuyez sur le levier de dégagement et ouvrez-le, puis retirez le bloc d’alimentation du châssis.
Voir la figure 3-6.
REMARQUE : vous devrez peut-être débloquer et relever le passe-câbles s’il gêne le retrait du bloc
d’alimentation. Pour plus d’informations ce dernier, consultez le document Rack Installation Guide
(Guide d’installation du rack). 58 Installation des composants du système
Figure 3-6. Retrait et réinstallation d’un bloc d’alimentation
Réinstallation d’un bloc d’alimentation
1 Tout en maintenant le levier ouvert, faites glisser le nouveau bloc d’alimentation dans le châssis
jusqu’à ce que le levier touche le châssis. Voir la figure 3-6.
2 Refermez le levier d’éjection du bloc d’alimentation jusqu’à ce qu’il s’enclenche dans son loquet.
Voir la figure 3-6.
REMARQUE : si vous avez débloqué le passe-câbles à l’étape 2, remettez-le en place. Pour plus
d’informations sur ce dernier, consultez le document Rack Installation Guide (Guide d’installation du rack).
3 Connectez le câble d’alimentation sur le bloc d’alimentation, et branchez l’autre extrémité sur une
prise de courant.
AVIS : lorsque vous connecterez le câble d’alimentation, faites-le passer dans la boucle du serre-câble.
REMARQUE : après avoir installé un nouveau bloc d’alimentation dans un système équipé de deux modules,
patientez quelques secondes pour que le système reconnaisse ce module et détermine son état. Le voyant
du bloc d’alimentation s’allume en vert si le bloc fonctionne normalement (voir la figure 1-4).
1 Bloc d’alimentation 2 Levier d’éjection 3 Loquet du levier d’éjection
3
1
2Installation des composants du système 59
Cartes d’extension
Consignes d’installation des cartes d’extension
La carte système peut accueillir jusqu’à huit cartes d’extension PCI-Express (PCIe). Voir la figure 3-7
et le tableau 3-1 :
• Logements 1 et 2 : PCIe x4. Le logement 2 peut accueillir une carte pleine longueur.
• Logements 3 et 4 : PCIe x8. Ces deux logements peuvent accueillir des cartes d’extension pleine
longueur.
• Logements 5 à 7 : PCIe x4. Le logement 5 peut accueillir une carte pleine longueur.
• Un logement d’extension (INTERNAL_STORAGE) est réservé pour la carte contrôleur SAS
du système.
• Si vous disposez d’une carte RAC, vous devez l’installer dans le logement RAC_CONN (voir “Carte
RAC”, page 62).
Figure 3-7. Logements d’extension
SLOT 5
SLOT 7
SLOT 6 SLOT 2 SLOT 4 SLOT 3 SLOT 1 INTERNAL_ STORAGE
RAC_CONN
Arrière du système
Avant du système60 Installation des composants du système
Installation d’une carte d’extension
PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour
accéder aux composants internes. Reportez-vous au document Product Information Guide (Guide d’informations
sur le produit) pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans
l’ordinateur et la protection contre les décharges électrostatiques.
1 Déballez la carte d’extension et préparez-la en vue de son installation.
Pour obtenir des instructions, consultez la documentation fournie avec la carte.
2 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant.
3 Ouvrez le système. Voir “Ouverture du système”, page 53.
4 Si vous ajoutez une nouvelle carte, sélectionnez un logement d’extension approprié. Voir “Consignes
d’installation des cartes d’extension”, page 59.
5 Ouvrez le taquet de fixation de la carte d’extension et retirez la plaque de recouvrement.
Voir la figure 3-8.
6 Installez la carte d’extension :
a En tenant la carte par les bords, positionnez-la en alignant son connecteur latéral avec
le connecteur d’extension correspondant de la carte système.
AVIS : si vous installez une carte contrôleur RAID SAS, évitez d’appuyer sur la barrette de mémoire lors
de cette opération.
b Insérez le connecteur latéral jusqu’à ce que la carte soit correctement installée.
c Fermez le taquet de fixation des cartes. Voir la figure 3-8.
Tableau 3-1. Logements d’extension
Logement Description
SLOT 1 PCIe x4
SLOT 2 PCIe x4
SLOT 3 PCIe x8
SLOT 4 PCIe x8
SLOT 5 PCIe x4
SLOT 6 PCIe x4
SLOT 7 PCIe x4
INTERNAL_STORAGE Réservé pour les cartes contrôleur
RAC_CONN Réservé pour une carte RACInstallation des composants du système 61
Figure 3-8. Retrait et installation d’une carte d’extension
7 Connectez tous les câbles requis sur la carte d’extension.
• Si vous installez une carte RAC, voir “Carte RAC”, page 62.
• Si vous installez une carte contrôleur SAS, voir “Installation d’une carte contrôleur SAS”, page 85.
8 Refermez le système. Voir “Fermeture du système”, page 54.
1 Guide d’alignement (cartes
pleine longueur uniquement)
2 Carte d’extension 3 Taquet de fixation
des cartes d’extension
3
2
162 Installation des composants du système
Retrait d’une carte d’extension
PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour
accéder aux composants internes. Reportez-vous au document Product Information Guide (Guide d’informations
sur le produit) pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans
l’ordinateur et la protection contre les décharges électrostatiques.
1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant.
2 Ouvrez le système. Voir “Ouverture du système”, page 53.
3 Déconnectez tous les câbles de la carte.
4 Retirez la carte d’extension :
a Ouvrez le taquet de fixation des cartes. Voir la figure 3-8.
b Tenez la carte d’extension par les coins supérieurs et retirez-la doucement de son connecteur.
5 Si vous retirez la carte et ne la remplacez pas, installez une plaque de recouvrement métallique
sur l’ouverture du logement vide et refermez le taquet.
REMARQUE : l’installation d’une plaque de recouvrement sur les logements d’extension vides
est obligatoire pour que le système reste conforme à l’homologation FCC (Federal Communications
Commission). Ces plaques empêchent en outre la poussière et les impuretés de pénétrer dans le système
et facilitent le refroidissement et la ventilation.
6 Refermez le système. Voir “Fermeture du système”, page 54.
Carte RAC
1 Déballez la carte RAC et préparez-la en vue de son installation.
Pour obtenir des instructions, consultez la documentation fournie avec la carte.
2 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant.
3 Ouvrez le système. Voir “Ouverture du système”, page 53.
4 Retirez les protecteurs de ventilation. Voir “Retrait des protecteurs de ventilation”, page 56.
5 Retirez l’obturateur de prise du panneau arrière du système. Voir la figure 1-3.
6 Retirez la carte contrôleur de stockage du logement INTERNAL_STORAGE :
a Déconnectez tous les câbles de données de la carte.
b Tenez la carte contrôleur de stockage par les coins et retirez-la doucement de son connecteur.Installation des composants du système 63
7 Installez la carte RAC dans le logement RAC_CONN :
a Placez la carte RAC de sorte que son connecteur de NIC s’insère dans l’ouverture appropriée
du panneau arrière. Voir la figure 3-9.
b Positionnez la carte en alignant son connecteur latéral avec le connecteur correspondant
de la carte système.
c Insérez le connecteur latéral jusqu’à ce que la carte soit correctement installée.
8 Connectez le câble de gestion (50 broches) et le câble MII (44 broches) fournis avec la carte RAC
sur cette dernière (voir la figure 3-9), puis sur les deux connecteurs correspondants de la carte système.
Figure 3-9. Connecteurs de la carte RAC
9 Réinstallez la carte contrôleur de stockage.
10 Réinstallez les protecteurs de ventilation. Voir “Réinstallation des protecteurs de ventilation”, page 57.
11 Reconnectez tous les câbles à la carte contrôleur de stockage en les acheminant de manière appropriée
le long des protecteurs de ventilation.
12 Refermez le système. Voir “Fermeture du système”, page 54.
13 Rebranchez le système à la prise de courant et allumez-le, ainsi que les périphériques connectés.
1 Connecteur RJ-45 2 Connecteur du câble MII
(44 broches)
3 Connecteur du câble
de gestion (50 broches)
1
3
264 Installation des composants du système
14 Accédez au programme de configuration du système et vérifiez que le paramètre de la séquence
d’amorçage a été modifié pour prendre en compte la présence de la carte RAC. Voir “Using the System
Setup Program” (Utilisation du programme de configuration du système), dans le document Hardware
Owner’s Manual (Manuel du propriétaire).
15 Quittez le programme de configuration du système et redémarrez l’ordinateur.
Lorsque le système démarre, le message Remote Access Control Detected
(Dispositif d’accès distant détecté) s’affiche, ainsi que des informations concernant
la mémoire morte et le micrologiciel de la carte.
Appuyez sur pour accéder à l’écran de configuration de la carte. Consultez la
documentation de cette dernière pour plus d’informations sur sa configuration et son utilisation.
Mémoire système
Vous pouvez ajouter de la mémoire supplémentaire au système (maximum autorisé : 32 Go pour les
configurations à deux processeurs ; 64 Go pour celles à quatre processeurs). Pour ce faire, installez des
barrettes DDR II à 667 MHz, par paires de 512 Mo, 1 Go, 2 Go ou 4 Go. Les seize logements de mémoire
se trouvent sur la carte système, sous les protecteurs de ventilation. Chaque processeur dispose de quatre
canaux de mémoire organisés en deux paires de deux.
Le système prend en charge l’architecture NUMA. Chaque processeur dispose d’un contrôleur
de mémoire qui lui est propre, ainsi que d’une mémoire locale qui permet de réduire les temps
d’accès ; il peut également accéder à la mémoire d’un autre processeur. Cette architecture améliore
les performances du système si le système d’exploitation installé la prend en charge.
AVIS : pour activer l’architecture NUMA, ouvrez le programme de configuration du système et désactivez l’option
Node Interleaving (Imbrication de nœuds). Voir “Utilisation du programme de configuration du système”, page 33.
Consignes générales d’installation des barrettes de mémoire
Pour optimiser les performances du système, observez les consignes suivantes lorsque vous configurez
la mémoire système.
• Les barrettes de mémoire doivent être installées par paires, en commençant par les logements
DIMM1 et DIMM2 (processeur 1), DIMM5 et DIMM6 (processeur 2), DIMM9 et DIMM10
(processeur 3), enfin DIMM13 et DIMM14 (processeur 4).
• Les barrettes doivent être de vitesse et de technologie identiques. Deux barrettes d’une même paire
doivent avoir les mêmes caractéristiques.
La mémoire peut être installée dans une configuration à deux processeurs (tableau 3-2) ou à quatre
processeurs (tableau 3-3). Installation des composants du système 65
Tableau 3-2. Configurations de mémoire à deux processeurs
Mémoire
système
totale
CPU 1 CPU2
DIMM1 DIMM2 DIMM3 DIMM4 DIMM5 DIMM6 DIMM7 DIMM8
2 Go 512 Mo 512 Mo 512 Mo 512 Mo
4 Go 512 Mo 512 Mo 512 Mo 512 Mo 512 Mo 512 Mo 512 Mo 512 Mo
4 Go 1 Go 1 Go 1 Go 1 Go
6 Go 1 Go 1 Go 512 Mo 512 Mo 1 Go 1 Go 512 Mo 512 Mo
8 Go 1 Go 1 Go 1 Go 1 Go 1 Go 1 Go 1 Go 1 Go
8 Go 2 Go 2 Go 2 Go 2 Go
16 Go 2 Go 2 Go 2 Go 2 Go 2 Go 2 Go 2 Go 2 Go
16 Go 4 Go 4 Go 4 Go 4 Go
24 Go 4 Go 4 Go 2 Go 2 Go 4 Go 4 Go 2 Go 2 Go
32 Go 4 Go 4 Go 4 Go 4 Go 4 Go 4 Go 4 Go 4 Go
Tableau 3-3. Configurations de mémoire à quatre processeurs
Mémoire
système
totale
CPU 1 CPU2 CPU3 CPU4
Barrette DIMM Barrette DIMM Barrette DIMM Barrette DIMM
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
4 Go 512
Mo
512
Mo
512
Mo
512
Mo
512
Mo
512
Mo
512
Mo
512
Mo
8 Go 512
Mo
512
Mo
512
Mo
512
Mo
512
Mo
512
Mo
512
Mo
512
Mo
512
Mo
512
Mo
512
Mo
512
Mo
512
Mo
512
Mo
512
Mo
512
Mo
8 Go 1 Go 1 Go 1 Go 1 Go 1 Go 1 Go 1 Go 1 Go
12 Go 1 Go 1 Go 512
Mo
512
Mo
1 Go 1 Go 512
Mo
512
Mo
1 Go 1 Go 512
Mo
512
Mo
1 Go 1 Go 512
Mo
512
Mo66 Installation des composants du système
Installation de barrettes de mémoire
PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour
accéder aux composants internes. Reportez-vous au document Product Information Guide (Guide d’informations
sur le produit) pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans
l’ordinateur et la protection contre les décharges électrostatiques.
PRÉCAUTION : les barrettes DIMM restent chaudes un certain temps après la mise hors tension du système.
Laissez-les tiédir avant de les manipuler. Tenez-les par les bords en évitant de toucher leurs composants.
1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant.
2 Ouvrez le système. Voir “Ouverture du système”, page 53.
3 Retirez les protecteurs de ventilation. Voir “Retrait des protecteurs de ventilation”, page 56.
4 Identifiez les connecteurs de barrettes de mémoire. Voir la figure 6-2.
5 Appuyez sur les dispositifs d’éjection du support, puis écartez-les (voir la figure 3-10) pour pouvoir
insérer la barrette.
6 Tenez chaque barrette de mémoire par les bords, sans toucher la partie centrale.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
16 Go 1 Go 1 Go 1 Go 1 Go 1 Go 1 Go 1 Go 1 Go 1 Go 1 Go 1 Go 1 Go 1 Go 1 Go 1 Go 1 Go
16 Go 2 Go 2 Go 2 Go 2 Go 2 Go 2 Go 2 Go 2 Go
24 Go 2 Go 2 Go 1 Go 1 Go 2 Go 2 Go 1 Go 1 Go 2 Go 2 Go 1 Go 1 Go 2 Go 2 Go 1 Go 1 Go
32 Go 2 Go 2 Go 2 Go 2 Go 2 Go 2 Go 2 Go 2 Go 2 Go 2 Go 2 Go 2 Go 2 Go 2 Go 2 Go 2 Go
32 Go 4 Go 4 Go 4 Go 4 Go 4 Go 4 Go 4 Go 4 Go
48 Go 4 Go 4 Go 2 Go 2 Go 4 Go 4 Go 2 Go 2 Go 4 Go 4 Go 2 Go 2 Go 4 Go 4 Go 2 Go 2 Go
64 Go 4 Go 4 Go 4 Go 4 Go 4 Go 4 Go 4 Go 4 Go 4 Go 4 Go 4 Go 4 Go 4 Go 4 Go 4 Go 4 Go
Tableau 3-3. Configurations de mémoire à quatre processeurs (suite)
Mémoire
système
totale
CPU 1 CPU2 CPU3 CPU4
Barrette DIMM Barrette DIMM Barrette DIMM Barrette DIMMInstallation des composants du système 67
Figure 3-10. Retrait et installation d’une barrette de mémoire
7 Alignez le connecteur latéral de la barrette avec le détrompeur du support, puis insérez la barrette
dans le support.
REMARQUE : les détrompeurs permettent de s’assurer que la barrette sera insérée dans le bon sens.
8 Appuyez sur la barrette de mémoire avec les pouces tout en relevant les dispositifs d’éjection avec
les index pour verrouiller la barrette dans son support.
Si la barrette est installée correctement, les dispositifs d’éjection sont alignés avec ceux des autres
connecteurs contenant également des barrettes.
9 Recommencez la procédure, de l’étape 5 à l’étape 8, pour installer les barrettes de mémoire restantes.
Voir le tableau 3-2 ou le tableau 3-3.
10 Réinstallez les protecteurs de ventilation. Voir “Retrait et réinstallation des protecteurs
de ventilation”, page 56.
11 Refermez le système. Voir “Fermeture du système”, page 54.
1 Barrette de mémoire 2 Dispositifs d’éjection (2) 3 Détrompeur
2
1
368 Installation des composants du système
12 Démarrez le système, appuyez sur pour accéder au programme de configuration du système,
puis vérifiez le paramètre System Memory (Mémoire système) dans l’écran System Setup
(Configuration du système) principal.
La valeur indiquée doit déjà avoir été modifiée par le système pour prendre en compte la mémoire
qui vient d’être installée.
13 Si la valeur est fausse, il est possible qu’une ou plusieurs barrettes de mémoire soient mal installées.
Recommencez la procédure, de l’étape 2 à l’étape 12, en vérifiant que les barrettes de mémoire sont
correctement insérées dans leur support.
14 Exécutez le test de mémoire des diagnostics du système. Voir “Exécution des diagnostics du système”,
page 133.
Retrait de barrettes de mémoire
PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour
accéder aux composants internes. Reportez-vous au document Product Information Guide (Guide d’informations
sur le produit) pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans
l’ordinateur et la protection contre les décharges électrostatiques.
PRÉCAUTION : les barrettes DIMM restent chaudes un certain temps après la mise hors tension du système.
Laissez-les tiédir avant de les manipuler. Tenez-les par les bords en évitant de toucher leurs composants.
1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant.
2 Ouvrez le système. Voir “Ouverture du système”, page 53.
3 Retirez les protecteurs de ventilation. Voir “Retrait des protecteurs de ventilation”, page 56.
4 Repérez les connecteurs de barrettes de mémoire. Voir la figure 6-2.
5 Écartez les dispositifs d’éjection situés à chaque extrémité du support pour extraire la barrette
de mémoire. Voir la figure 3-10.
Tenez chaque barrette de mémoire par les bords, sans toucher la partie centrale.
6 Réinstallez les protecteurs de ventilation. Voir “Réinstallation des protecteurs de ventilation”, page 57.
7 Refermez le système. Voir “Fermeture du système”, page 54.Installation des composants du système 69
Processeurs
Le système peut prendre en charge deux ou quatre processeurs. Pour tirer parti des futures options
en matière de vitesse et des nouvelles fonctionnalités émergentes, vous pouvez mettre les processeurs
existants à niveau, ou en ajouter un troisième et un quatrième. Chaque processeur (et sa mémoire cache
interne) est contenu dans une matrice LGA (Land Grid Array), qui est installée dans un support de la
carte système.
AVIS : tous les processeurs doivent avoir la même fréquence d’horloge et la même tension de cœur.
Retrait d’un processeur
1 Avant de mettre le système à niveau, téléchargez puis installez la version du BIOS système la plus
récente, disponible à l’adresse support.dell.com.
2 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant.
3 Ouvrez le système. Voir “Ouverture du système”, page 53.
4 Retirez les protecteurs de ventilation. Voir “Retrait des protecteurs de ventilation”, page 56.
AVIS : il se peut que le processeur reste attaché au dissipateur de chaleur et se désolidarise de son support
lorsque vous retirez le dissipateur. C’est pourquoi il est recommandé de retirer le dissipateur de chaleur quand
le processeur est tiède.
AVIS : ne retirez jamais le dissipateur de chaleur d’un processeur si vous n’avez pas l’intention de retirer
le processeur lui-même. Le dissipateur de chaleur est indispensable pour maintenir les conditions de température
adéquates.
AVIS : le processeur et le dissipateur de chaleur peuvent être brûlants. Laissez-les tiédir avant de les manipuler.
5 Appuyez sur le taquet bleu situé à l’extrémité de l’un des leviers de fixation du dissipateur de chaleur,
puis relevez ce levier de 90 degrés. Voir la figure 3-11.70 Installation des composants du système
Figure 3-11. Retrait et installation du dissipateur de chaleur
6 Patientez 30 secondes, le temps que le dissipateur de chaleur se détache du processeur.
7 Ouvrez l’autre levier de fixation du dissipateur de chaleur.
8 Si le dissipateur de chaleur ne se détache pas du processeur, faites-le tourner doucement dans le sens
des aiguilles d’une montre, puis dans l’autre sens jusqu’à ce qu’il se détache (ne tirez pas dessus pour
le détacher du processeur).
1 Dissipateur de chaleur 2 Leviers de fixation
du dissipateur de chaleur (2)
3 Loquet du levier de fixation
2
1
3Installation des composants du système 71
9 Soulevez le dissipateur de chaleur pour le dégager du processeur et mettez-le de côté en le posant
à l’envers.
10 À l’aide d’un chiffon propre et non pelucheux, retirez la graisse thermique qui recouvre la surface
du cadre de protection du processeur.
11 Relevez le levier d’éjection de 90 degrés jusqu’à ce que le processeur sorte de son support.
Voir la figure 3-12.
Figure 3-12. Retrait et installation du processeur
12 Ouvrez le cadre de protection du processeur puis retirez le processeur de son support. Laissez le levier
relevé afin de pouvoir installer le nouveau processeur.
AVIS : veillez à ne pas tordre les broches du support lors du retrait du processeur. Vous risqueriez d’endommager
définitivement le support et la carte système.
1 Processeur 2 Cache de support (doit être retiré avant
l’installation d’un nouveau processeur)
3 Levier d’éjection
4 Support 5 Cadre de protection du processeur 6 Repères (2)
2
4
5
1
6
372 Installation des composants du système
Installation d’un processeur
1 Déballez le nouveau processeur.
2 Alignez le processeur avec les deux repères du support. Voir la figure 3-12.
3 Si vous installez un processeur dans un support vide, procédez comme suit :
a Retirez le cache recouvrant le support. Voir la figure 3-12.
b Relevez le levier d’éjection de 90 degrés. Voir la figure 3-12.
c Relevez le cadre de protection du processeur. Voir la figure 3-12.
4 Installez le processeur dans le support.
AVIS : un mauvais positionnement risquerait d’endommager définitivement la carte système ou le processeur
lorsque vous remettrez le système sous tension.
a Si ce n’est déjà fait, redressez le levier d’éjection.
b Une fois que vous avez aligné le processeur sur les repères, insérez-le doucement dans le support.
AVIS : ne forcez pas lorsque vous installez le processeur. S’il est positionné correctement, il s’insère dans
le support très facilement.
c Fermez le cadre de protection du processeur. Voir la figure 3-12.
d Abaissez le levier d’éjection du support jusqu’à ce qu’il s’enclenche et verrouille le processeur.
Voir la figure 3-12.
5 Installez le dissipateur de chaleur.
REMARQUE : si aucun nouveau dissipateur de chaleur n’est fourni, utilisez celui que vous avez retiré
à l’étape 9.
a Si un nouveau dissipateur de chaleur vous a été fourni avec le kit du processeur, retirez le feuillet
de protection de la couche de graisse thermique déjà appliquée sur le dessus du dissipateur.
Voir la figure 3-11.
Si le kit a été livré sans dissipateur de chaleur, appliquez une couche de graisse thermique neuve :
• À l’aide d’un chiffon propre et non pelucheux, retirez la graisse qui recouvre le dissipateur
de chaleur.
• Ouvrez le paquet de graisse fourni avec le kit du processeur et appliquez-en une couche
régulière sur le dessus du processeur.
b Placez le dissipateur de chaleur sur le processeur. Voir la figure 3-11.
c Fermez puis verrouillez l’un des deux leviers de fixation du dissipateur de chaleur.
Voir la figure 3-11.
d Fermez puis verrouillez le second levier de fixation du dissipateur de chaleur.
AVIS : lorsque vous ajoutez un troisième puis un quatrième processeur, vous devez également installer un module
VRM (régulateur de tension) pour chacun d’entre eux. Voir “Installation d’un module VRM”, page 73.Installation des composants du système 73
6 Réinstallez les protecteurs de ventilation. Voir “Réinstallation des protecteurs de ventilation”, page 57.
7 Refermez le système. Voir “Fermeture du système”, page 54.
8 Redémarrez le système.
Lorsque le système démarre, il détecte la présence du ou des nouveau(x) processeur(s) et modifie
automatiquement les informations du programme de configuration du système.
9 Appuyez sur pour accéder au programme de configuration du système et vérifier que les informations
relatives au processeur correspondent bien à la nouvelle configuration.
Voir “Utilisation du programme de configuration du système”, page 33 pour plus d’instructions
concernant l’utilisation du programme de configuration du système.
10 Exécutez les diagnostics du système pour vérifier que le nouveau processeur fonctionne correctement.
Voir “Exécution des diagnostics du système”, page 133 pour plus d’informations concernant
l’exécution des diagnostics.
Modules VRM du processeur
Lorsque vous ajoutez un troisième puis un quatrième processeur, vous devez également installer
un module VRM (régulateur de tension) pour chacun d’entre eux.
Installation d’un module VRM
PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour
accéder aux composants internes. Reportez-vous au document Product Information Guide (Guide d’informations
sur le produit) pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans
l’ordinateur et la protection contre les décharges électrostatiques.
1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant.
2 Ouvrez le système. Voir “Ouverture du système”, page 53.
3 Retirez le protecteur de ventilation supérieur. Voir “Retrait des protecteurs de ventilation”, page 56.
4 Repérez les supports des deux modules VRM. Voir la figure 6-2.
5 Appuyez sur les dispositifs d’éjection du support puis écartez-les (voir la figure 3-13) pour pouvoir
insérer le module VRM dans le support.74 Installation des composants du système
Figure 3-13. Retrait et installation d’un module VRM
6 Tout en maintenant le module VRM par les bords, alignez son connecteur latéral avec le support,
puis insérez le module.
REMARQUE : le support est muni d’un détrompeur qui permet de s’assurer que le module VRM sera inséré
dans le bon sens.
7 Appuyez sur le VRM avec les pouces tout en relevant les dispositifs d’éjection avec les index pour
verrouiller le module dans le connecteur.
8 Recommencez la procédure, de l’étape 5 à l’étape 7, pour installer le second module VRM.
9 Réinstallez le protecteur de ventilation supérieur. Voir “Réinstallation des protecteurs de ventilation”,
page 57.
10 Refermez le système. Voir “Fermeture du système”, page 54.
1 Module VRM 2 Dispositifs d’éjection (2)
2
1Installation des composants du système 75
Retrait d’un module VRM
PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour
accéder aux composants internes. Reportez-vous au document Product Information Guide (Guide d’informations
sur le produit) pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans
l’ordinateur et la protection contre les décharges électrostatiques.
PRÉCAUTION : les modules VRM restent chauds un certain temps après la mise hors tension du système.
Laissez-les tiédir avant de les manipuler. Tenez toujours les modules par les bords.
1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant.
2 Ouvrez le système. Voir “Ouverture du système”, page 53.
3 Retirez le protecteur de ventilation supérieur. Voir “Retrait des protecteurs de ventilation”, page 56.
4 Repérez les supports des modules VRM. Voir la figure 6-2.
5 Appuyez sur les dispositifs d’éjection du support, puis écartez-les pour extraire le module VRM.
Voir la figure 3-13.
Installation d’un lecteur de disquette
1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant.
2 Retirez le cadre avant, s’il est installé. Voir “Retrait et réinstallation du cadre avant en option”, page 52.
3 Pour retirer le support de lecteur, tirez le loquet de dégagement et faites glisser le support hors
du châssis. Voir la figure 3-14.76 Installation des composants du système
Figure 3-14. Retrait et installation du support de lecteur optique/de disquette
4 Retirez le lecteur optique ou le cache correspondant du support :
a Desserrez la vis du loquet maintenant le lecteur optique ou le cache. Voir la figure 3-15.
b Dégagez le loquet.
c Soulevez le lecteur optique ou le cache pour l’extraire du support.
1 Loquet de dégagement 2 Support du lecteur optique
ou du lecteur de disquette
2
1Installation des composants du système 77
Figure 3-15. Installation d’un lecteur de disquette dans le support
1 Support du lecteur optique
ou du lecteur de disquette
2 Plots d’alignement 3 Lecteur de disquette
4 Ressort de rétention 5 Cache de la baie de lecteur optique 6 Carte d’interface
7 Rivets en plastique (2) 8 Loquet 9 Vis moletée
1
3
9
6
8
7
2
5
478 Installation des composants du système
5 Pour retirer la plaque recouvrant la baie du lecteur de disquette, écartez légèrement le ressort
et soulevez la plaque.
6 Déplacez légèrement le ressort et insérez le lecteur de disquette dans le support.
Les plots du support doivent s’engager dans les trous correspondants sur le côté du lecteur.
Voir la figure 3-15.
7 Remettez le lecteur optique ou le cache correspondant dans le support.
Les plots du support doivent s’engager dans les trous correspondants sur le côté du lecteur.
8 Réenclenchez le loquet et serrez la vis.
9 Insérez le support contenant le lecteur jusqu’à ce que son plateau s’enclenche. Voir la figure 3-15
10 Réinstallez le cadre avant, le cas échéant. Voir “Retrait et réinstallation du cadre avant en option”,
page 52.
11 Rebranchez le système et les périphériques sur leurs prises électriques.
Installation d’un lecteur optique
Il est possible de monter un lecteur optique slim (en option) sur un plateau qui s’installe dans
le panneau avant et se connecte au contrôleur de la carte système par l’intermédiaire du fond
de panier SAS.
REMARQUE : les périphériques DVD sont uniquement des périphériques de données.
1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant.
2 Retirez le cadre. Voir “Retrait et réinstallation du cadre avant en option”, page 52.
3 Pour retirer le support de lecteur, tirez le loquet de dégagement et faites glisser le support hors
du châssis. Voir la figure 3-14.
4 Retirez du support le cache du lecteur optique :
a Desserrez la vis du loquet maintenant le lecteur optique ou le cache. Voir la figure 3-16.
b Dégagez le loquet.
c Soulevez la plaque de recouvrement.Installation des composants du système 79
Figure 3-16. Installation d’un lecteur optique dans le support
5 Installez le nouveau lecteur optique dans le support. Voir la figure 3-16.
Les plots du support doivent s’engager dans les trous correspondants sur le côté du lecteur.
6 Fixez la carte d’interface sur l’arrière du support à l’aide des deux rivets de plastique.
Voir la figure 3-16.
7 Réenclenchez le loquet et serrez la vis.
8 Insérez le support contenant le lecteur jusqu’à ce que le plateau s’enclenche. Voir la figure 3-14
9 Réinstallez le cadre avant, le cas échéant. Voir “Retrait et réinstallation du cadre avant en option”,
page 52.
10 Rebranchez le système et les périphériques sur leurs prises électriques.
1 Support du lecteur optique
ou du lecteur de disquette
2 Lecteur optique 3 Carte d’interface
4 Rivets en plastique (2) 5 Loquet 6 Vis moletée
1
6
3
5
4
280 Installation des composants du système
Disques durs
Le système peut accueillir jusqu’à cinq disques durs SAS de 3,5 pouces. Tous les disques sont connectés
à la carte système par l’intermédiaire d’une carte de fond de panier SAS. Voir “Fond de panier SAS
(maintenance uniquement)”, page 99 pour plus d’informations sur les options de cette dernière.
Les systèmes équipés d’un contrôleur RAID SAS (en option) prennent en charge l’insertion
à chaud. La figure 3-17 montre les ID des disques.
Figure 3-17. ID des disques durs
Avant de commencer
AVIS : avant de tenter de retirer ou d’installer un lecteur pendant que le système est en cours d’exécution,
reportez-vous à la documentation de la carte contrôleur RAID SAS pour vérifier que la configuration
de l’adaptateur à l’hôte lui permet de prendre en charge le retrait et l’insertion à chaud.
REMARQUE : il est recommandé d’utiliser uniquement des lecteurs testés et approuvés pour une utilisation avec
la carte de fond de panier SAS.
Il vous faudra peut-être utiliser des programmes autres que ceux fournis avec le système d’exploitation
pour partitionner et formater les disques durs.
AVIS : n’éteignez pas et ne redémarrez pas le système pendant le formatage du lecteur. Cela risquerait
d’endommager ce dernier.
Lorsque vous formatez un disque dur à haute capacité, prévoyez suffisamment de temps pour que
le formatage s’exécute entièrement. De longs délais de formatage sont normaux pour ces lecteurs.
ID 3
ID 2
ID 1
ID 0
ID 4Installation des composants du système 81
Configuration du périphérique d’amorçage
Si vous envisagez de démarrer le système à partir d’un disque dur, celui-ci doit être relié au contrôleur
principal (d’amorçage). L’ordre de démarrage spécifié dans le programme de configuration du système
détermine le périphérique utilisé pour l’amorçage du système.
Le programme de configuration du système contient des options qui sont utilisées par le système pour
rechercher les périphériques de démarrage installés. Voir “Utilisation du programme de configuration
du système”, page 33 pour plus de détails sur le programme de configuration du système.
Retrait d’un cache de lecteur
AVIS : pour assurer un refroidissement correct du système, vous devez installer un cache sur toutes les baies
de disque dur vides. Si vous retirez un support de disque dur du système et ne le réinstallez pas immédiatement,
installez un cache sur l’emplacement vide.
1 Retirez le cadre. Voir “Retrait et réinstallation du cadre avant en option”, page 52.
2 Pour éjecter un cache, passez le doigt sous son extrémité carénée et appuyez sur le loquet.
3 Faites levier jusqu’à ce que le cache soit complètement dégagé.
Installation d’un cache de lecteur
La forme du cache de disque permet de s’assurer qu’il sera correctement inséré dans la baie.
Pour installer un cache de lecteur 3,5 pouces, insérez et faites pivoter le côté avec détrompeur
dans la baie de lecteurs. Appuyez de manière égale sur l’autre côté du cache jusqu’à ce qu’il soit
correctement emboîté.
Retrait d’un disque dur enfichable à chaud
1 Retirez le cadre. Voir “Retrait et réinstallation du cadre avant en option”, page 52.
2 Préparez le retrait du disque à l’aide du logiciel de gestion RAID. Attendez que les voyants du support
indiquent que le disque peut être retiré en toute sécurité. Reportez-vous à la documentation
du contrôleur RAID SAS pour plus d’informations sur le retrait d’un lecteur enfichable à chaud.
Si le lecteur était en ligne, le voyant d’activité/panne vert clignote lors de la mise hors tension
du disque. Quand les deux voyants sont éteints, vous pouvez retirer le lecteur.
3 Ouvrez la poignée du support pour débloquer le lecteur. Voir la figure 3-18.
4 Extrayez le disque de la baie.
5 Si vous ne réinstallez pas le disque dur ou si vous ne le remplacez pas par un autre, placez un cache
sur la baie vide. Voir “Installation d’un cache de lecteur”, page 81.
AVIS : pour assurer un refroidissement correct du système, vous devez installer un cache sur toutes les baies
de disque dur vides.82 Installation des composants du système
Figure 3-18. Retrait et installation d’un disque dur enfichable à chaud
1 Disque dur 2 Support de disque 3 Poignée d’éjection du support de lecteur
3
1
2Installation des composants du système 83
Installation d’un disque dur enfichable à chaud
AVIS : lorsque vous installez un disque dur, assurez-vous que les lecteurs adjacents ne sont pas en cours
d’installation. Si vous insérez un support de disque dur et tentez d’en verrouiller la poignée alors qu’un disque
dur voisin n’est que partiellement installé, vous risquez d’endommager le ressort de protection de ce dernier
et de le rendre inutilisable.
AVIS : certains systèmes d’exploitation ne prennent pas en charge les disques durs enfichables à chaud.
Reportez-vous à la documentation fournie avec le système d’exploitation.
1 Retirez le cadre. Voir “Retrait et réinstallation du cadre avant en option”, page 52.
2 Si la baie est fermée par un cache, retirez-le. Voir “Retrait d’un cache de lecteur”, page 81.
3 Installez le disque dur enfichable à chaud.
a Ouvrez la poignée du support de disque dur.
b Insérez le support de disque dans la baie jusqu’à ce qu’il touche le fond de panier.
c Refermez la poignée pour maintenir le disque dur en place.
4 Réinstallez le cadre avant, le cas échéant. Voir “Retrait et réinstallation du cadre avant en option”,
page 52.
Remplacement d’un disque dur installé dans un support
Pour retirer un disque dur installé dans un support, retirez les quatre vis situées sur les rails coulissants
du support, puis retirez le disque.
Pour installer un nouveau disque dur dans le support, procédez comme suit :
1 Insérez le disque dur dans le support, connecteur vers l’arrière. Voir la figure 3-19.
2 En disposant l’assemblage tel qu’il est représenté à la figure 3-19, faites correspondre l’ouverture
arrière inférieure du disque dur avec celle marquée “SAS” sur le support.
Si la position est correcte, l’arrière du disque dur arrive au même niveau que l’arrière du support.
3 Fixez le disque dur sur le support à l’aide des quatre vis. Voir la figure 3-19.84 Installation des composants du système
Figure 3-19. Installation d’un disque dur SAS dans un support
1 Vis (4) 2 Support de disque 3 Disque dur SAS
1
3
2Installation des composants du système 85
Cartes contrôleur SAS
Retrait d’une carte contrôleur SAS
PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour
accéder aux composants internes. Reportez-vous au document Product Information Guide (Guide d’informations
sur le produit) pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans
l’ordinateur et la protection contre les décharges électrostatiques.
1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant.
2 Ouvrez le système. Voir “Ouverture du système”, page 53.
3 Débranchez le(s) câble(s) de données de la carte contrôleur.
4 Si vous retirez un contrôleur RAID SAS, débranchez le câble de la pile RAID de cette carte.
5 Retirez la carte de son logement.
Voir “Retrait d’une carte d’extension”, page 62.
Installation d’une carte contrôleur SAS
PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour
accéder aux composants internes. Reportez-vous au document Product Information Guide (Guide d’informations
sur le produit) pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans
l’ordinateur et la protection contre les décharges électrostatiques.
1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant.
2 Ouvrez le système. Voir “Ouverture du système”, page 53.
3 Installez la carte contrôleur dans le logement d’extension INTERNAL_STORAGE.
Pour obtenir des instructions sur l’installation de la carte, voir “Installation d’une carte d’extension”,
page 60.
4 Connectez la carte au fond de panier SAS.
• Si vous installez une carte contrôleur SAS, branchez le câble de données SAS sur le connecteur
SAS A du fond de panier. Voir la figure 6-3.
• Si vous installez une carte contrôleur RAID SAS, reliez par un câble de données SAS
le connecteur 0 (bleu) de la carte et le connecteur SAS A du fond de panier ; faites de même
pour relier le connecteur 1 de la carte et le connecteur SAS B du fond de panier. Voir la figure 6-3.
Installation de la pile d’une carte contrôleur RAID SAS
Installez la pile RAID dans le support en plastique correspondant qui se trouve à l’intérieur du châssis.
Branchez le câble de la pile sur le connecteur situé sur la carte contrôleur RAID SAS, à côté de la barrette
de mémoire RAID.86 Installation des composants du système
Figure 3-20. Installation de la pile RAID
Connexion d’un lecteur de bande SAS externe
Cette sous-section décrit le raccordement d’un lecteur de bande SAS externe et d’une carte contrôleur
SAS externe (en option).
PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour
accéder aux composants internes. Reportez-vous au document Product Information Guide (Guide d’informations
sur le produit) pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans
l’ordinateur et la protection contre les décharges électrostatiques.
1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant.
2 Ouvrez le système. Voir “Ouverture du système”, page 53.
3 Mettez-vous à la terre en touchant une partie métallique non peinte à l’arrière de l’ordinateur,
puis déballez le lecteur.
4 Déballez le lecteur de bande et la carte contrôleur.
1 Pile RAID 2 Câble de la pile RAID 3 Carte contrôleur RAID
1
3
2Installation des composants du système 87
5 Installez la carte contrôleur SAS externe dans un logement d’extension. Voir “Installation d’une carte
d’extension”, page 60.
6 Connectez le câble d’interface au lecteur de bande.
7 Raccordez l’autre extrémité du câble d’interface au connecteur SAS externe du support de la carte
contrôleur.
8 Branchez le câble d’alimentation du lecteur de bande sur une prise électrique.
9 Refermez le système. Voir “Fermeture du système”, page 54.
10 Rebranchez le système et les périphériques sur le secteur, puis remettez-les sous tension.
11 Effectuez une sauvegarde sur bande et un test de vérification de l’unité, en suivant les instructions
de la documentation correspondante.
Connexion d’un périphérique de stockage Fibre Channel externe
Cette sous-section décrit le raccordement de périphériques Fibre Channel externes et d’une carte
HBA Fibre Channel (en option).
PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour
accéder aux composants internes. Reportez-vous au document Product Information Guide (Guide d’informations
sur le produit) pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans
l’ordinateur et la protection contre les décharges électrostatiques.
1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant.
2 Ouvrez le système. Voir “Ouverture du système”, page 53.
3 Mettez-vous à la terre en touchant une partie métallique non peinte à l’arrière du système, déballez
le lecteur et comparez les paramètres du cavalier et du commutateur avec ceux décrits dans
la documentation fournie avec le lecteur.
4 Installez la carte HBA Fibre Channel dans un logement d’extension. Voir “Installation d’une carte
d’extension”, page 60.
5 Branchez l’extrémité du câble Fibre Channel sur le connecteur du support de la carte HBA.
6 Refermez le système. Voir “Fermeture du système”, page 54.
7 Rebranchez le système et les périphériques sur le secteur, puis remettez-les sous tension.88 Installation des composants du système
Pile du système
La pile du système est une pile bouton de 3,0 volts (V).
Remplacement de la pile du système
PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour
accéder aux composants internes. Reportez-vous au document Product Information Guide (Guide d’informations
sur le produit) pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans
l’ordinateur et la protection contre les décharges électrostatiques.
PRÉCAUTION : une nouvelle pile mal installée risque d’exploser. Lors d’un remplacement, utilisez une pile de
type identique ou d’un type équivalent recommandé par le fabricant. Mettez les piles usagées au rebut selon les
instructions du fabricant. Consultez le document System Information Guide (Guide d’informations du système)
pour obtenir des informations supplémentaires.
1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant.
2 Ouvrez le système. Voir “Ouverture du système”, page 53.
3 Retirez les protecteurs de ventilation. Voir “Retrait des protecteurs de ventilation”, page 56.
4 Identifiez le support de pile. Voir la figure 6-2.
AVIS : si vous sortez la pile de son support avec un objet pointu, prenez garde de ne pas toucher la carte système.
Vérifiez que l’objet est inséré entre la pile et son support avant de tenter d’extraire la pile. Sinon, vous risquez
d’endommager la carte système en arrachant le support ou en brisant des éléments de circuit sur la carte système.
AVIS : pour ne pas endommager le connecteur de pile, maintenez-le en place lorsque vous installez ou retirez
une pile.
5 Retirez la pile du système. Voir la figure 3-21.
a Maintenez le connecteur de pile en place en appuyant fermement sur le côté positif
du connecteur.
b Tout en maintenant le connecteur, poussez la pile vers le côté positif et soulevez-la pour
la retirer du connecteur.Installation des composants du système 89
Figure 3-21. Remplacement de la pile du système
AVIS : pour ne pas endommager le connecteur de pile, maintenez-le en place lorsque vous installez
ou retirez une pile.
6 Installez la nouvelle pile.
a Maintenez le connecteur de pile en place en appuyant fermement sur le côté positif
du connecteur.
b Tenez la pile en plaçant le “+” vers le haut et faites-la glisser sous les pattes de fixation situées
du côté positif du connecteur.
c Appuyez sur la pile pour l’installer dans le connecteur.
7 Réinstallez les protecteurs de ventilation. Voir “Réinstallation des protecteurs de ventilation”, page 57.
8 Refermez le système. Voir “Fermeture du système”, page 54.
9 Rebranchez le système sur la prise de courant et allumez-le, ainsi que tous les périphériques connectés.
10 Accédez au programme de configuration du système pour vérifier que la pile fonctionne correctement.
Voir “Utilisation du programme de configuration du système”, page 33.
11 Entrez la date et l’heure dans les champs Time (Heure) et Date du programme de configuration
du système.
12 Quittez le programme de configuration du système.
13 Pour tester la pile qui vient d’être installée, éteignez le système et débranchez-le de sa prise électrique
pendant au moins une heure.
14 Une heure plus tard, rebranchez le système à sa prise électrique et allumez-le.
15 Accédez au programme de configuration du système et, si l’heure et la date sont toujours
incorrectes, consultez la section “Obtention d’aide”, page 145 pour savoir comment obtenir
une assistance technique.
1 Côté positif du connecteur de pile 2 Pile du système 3 Côté négatif du connecteur de pile
2
3
190 Installation des composants du système
Panneau de commande (maintenance uniquement)
Retrait du panneau de commande
PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour
accéder aux composants internes. Reportez-vous au document Product Information Guide (Guide d’informations
sur le produit) pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans
l’ordinateur et la protection contre les décharges électrostatiques.
1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant.
2 Ouvrez le système. Voir “Ouverture du système”, page 53.
3 Déconnectez le câble de données reliant le panneau à la carte du panneau de commande.
Voir la figure 3-22.
4 Déconnectez le câble du module d’affichage enfiché dans la carte du panneau de commande.
Voir la figure 3-22.
5 Retirez les trois vis Torx qui fixent la carte du panneau de commande au châssis, puis retirez
cette carte.
6 Retirez le module d’affichage :
a Insérez le bout d’un trombone dans l’orifice situé sur le côté droit du module d’affichage,
puis retirez doucement l’étiquette.
b Retirez les deux vis Torx qui fixent le module d’affichage au châssis.
7 Retirez le module d’affichage.Installation des composants du système 91
Figure 3-22. Retrait et installation du panneau de commande
1 Module d’affichage 2 Câble du module d’affichage 3 Carte du panneau
de commande
4 Câble de la carte
du panneau de commande
5 Vis fixant la carte
du panneau de commande (3)
6 Étiquette du module
d’affichage
7 Vis du module d’affichage (2)
3
3
4
5
6
7
1
2 92 Installation des composants du système
Installation du panneau de commande
PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour
accéder aux composants internes. Reportez-vous au document Product Information Guide (Guide d’informations
sur le produit) pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans
l’ordinateur et la protection contre les décharges électrostatiques.
1 Insérez le module d’affichage du panneau de commande dans l’ouverture du châssis et fixez-le
à l’aide des deux vis Torx.
2 Collez l’étiquette du panneau de commande sur le module d’affichage.
3 Installez la carte du panneau de commande dans le châssis et fixez-la à l’aide des trois vis Torx.
Voir la figure 3-22.
4 Connectez le câble du module d’affichage à la carte du panneau de commande. Voir la figure 3-22.
5 Acheminez le câble du panneau de commande dans les passe-câbles du châssis, puis connectez-le
à la carte du panneau de commande.
6 Refermez le système. Voir “Fermeture du système”, page 54.
7 Réinstallez le cadre avant, le cas échéant. Voir “Retrait et réinstallation du cadre avant en option”,
page 52.
8 Rebranchez le système à la prise de courant et allumez-le, ainsi que les périphériques connectés.
Carte intermédiaire de ventilateur (maintenance uniquement)
Retrait d’une carte intermédiaire de ventilateur
PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour
accéder aux composants internes. Reportez-vous au document Product Information Guide (Guide d’informations
sur le produit) pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans
l’ordinateur et la protection contre les décharges électrostatiques.
1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant.
2 Ouvrez le système. Voir “Ouverture du système”, page 53.
AVIS : pour éviter d’endommager les lecteurs et le fond de panier, retirez du système les lecteurs SAS et le support
du lecteur optique/de disquette avant d’enlever le fond de panier. Avant de retirer les disques durs, notez leur
numéro d’emplacement et étiquetez-les afin de pouvoir les réinstaller au même endroit ultérieurement.
3 Pour retirer le support de lecteur optique/de disquette, tirez le loquet de dégagement et extrayez
le support du châssis. Voir la figure 3-18.
4 Retirez les ventilateurs 1 et 3 ou 2 et 4 (en fonction de la carte à réinstaller). Voir “Retrait d’un
ventilateur”, page 54.
5 Retirez le fond de panier SAS. Voir “Fond de panier SAS (maintenance uniquement)”, page 99.
6 Retirez les deux vis puis la carte intermédiaire de ventilateur. Voir la figure 3-23.Installation des composants du système 93
Figure 3-23. Retrait et installation d’une carte intermédiaire de ventilateur
Installation d’une carte intermédiaire de ventilateur
PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour
accéder aux composants internes. Reportez-vous au document Product Information Guide (Guide d’informations
sur le produit) pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans
l’ordinateur et la protection contre les décharges électrostatiques.
1 Insérez les deux pattes de fixation situées sur la carte intermédiaire dans les emplacements
correspondants qui se trouvent sur le côté de la baie de ventilation. Voir la figure 3-23.
2 Fixez la carte intermédiaire à l’aide des deux vis.
3 Réinstallez le fond de panier SAS. Voir “Installation du fond de panier SAS”, page 101.
1 Vis (2) 2 Carte intermédiaire
de ventilateur
3 Pattes de fixation (2)
4 Ouvertures (2)
2
4
3
194 Installation des composants du système
4 Installez les ventilateurs. Voir “Réinstallation d’un ventilateur”, page 55.
5 Installez le support du lecteur optique/de disquette.
Réinstallez le support dans le système et fixez-le en appuyant sur le loquet de dégagement.
Voir la figure 3-14.
6 Remettez les disques durs SAS à leur emplacement d’origine. Voir “Installation d’un disque
dur enfichable à chaud”, page 83.
7 Refermez le système. Voir “Fermeture du système”, page 54.
8 Rebranchez le système sur la prise de courant et allumez-le, ainsi que tous les périphériques connectés.
Carte de distribution de l’alimentation (maintenance uniquement)
Retrait de la carte de distribution de l’alimentation
PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour
accéder aux composants internes. Reportez-vous au document Product Information Guide (Guide d’informations
sur le produit) pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans
l’ordinateur et la protection contre les décharges électrostatiques.
1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant.
2 Ouvrez le système. Voir “Ouverture du système”, page 53.
3 Retirez les blocs d’alimentation. Voir “Retrait d’un bloc d’alimentation”, page 57.
4 Retirez la carte système. Voir “Retrait de la carte système”, page 102.
5 Retirez les sept vis qui fixent la carte. Voir la figure 3-24.
6 Soulevez la carte de distribution de l’alimentation pour la retirer du châssis.Installation des composants du système 95
Figure 3-24. Retrait et installation de la carte de distribution de l’alimentation
1 Pattes de fixation (3) 2 Orifices de fixation (3) 3 Carte de distribution
de l’alimentation
4 Vis (7)
1
4
3
296 Installation des composants du système
Installation de la carte de distribution de l’alimentation
PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour
accéder aux composants internes. Reportez-vous au document Product Information Guide (Guide d’informations
sur le produit) pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans
l’ordinateur et la protection contre les décharges électrostatiques.
1 Alignez les trois orifices de fixation de la carte de distribution de l’alimentation avec les trois pattes
situées dans la partie inférieure du châssis. Voir la figure 3-24.
2 Fixez la carte à l’aide des sept vis.
3 Installez la carte système. Voir la procédure décrite à la section “Installation de la carte système”,
de l’étape 3 à l’étape 14.
4 Installez les blocs d’alimentation. Voir “Réinstallation d’un bloc d’alimentation”, page 58.
5 Refermez le système. Voir “Fermeture du système”, page 54.
6 Rebranchez le système sur la prise de courant et allumez-le, ainsi que tous les périphériques connectés.
Commutateur d’intrusion du châssis (maintenance uniquement)
Retrait du commutateur d’intrusion du châssis
PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour
accéder aux composants internes. Reportez-vous au document Product Information Guide (Guide d’informations
sur le produit) pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans
l’ordinateur et la protection contre les décharges électrostatiques.
1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant.
2 Ouvrez le système. Voir “Ouverture du système”, page 53.
3 Retirez le protecteur de ventilation supérieur. Voir “Retrait des protecteurs de ventilation”, page 56.
4 Le cas échéant, retirez le dissipateur de chaleur du processeur 4 (voir “Processeurs”, page 69).
5 Déconnectez le câble du commutateur d’intrusion enfiché sur la carte système. Voir la figure 3-25.
6 Tirez doucement sur le commutateur d’intrusion pour le dégager de son clip. Installation des composants du système 97
Figure 3-25. Retrait et installation du commutateur d’intrusion du châssis
1 Clip du commutateur
d’intrusion
2 Commutateur d’intrusion 3 Bords cannelés (2)
4 Câble du commutateur
d’intrusion
4
3
1
298 Installation des composants du système
Installation du commutateur d’intrusion du châssis
PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour
accéder aux composants internes. Reportez-vous au document Product Information Guide (Guide d’informations
sur le produit) pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans
l’ordinateur et la protection contre les décharges électrostatiques.
1 Branchez le câble du commutateur d’intrusion sur le connecteur correspondant de la carte système.
Voir la figure 3-25.
2 Alignez les deux bords cannelés de la partie supérieure du commutateur avec l’intérieur du clip,
puis appuyez doucement jusqu’à ce que le commutateur s’enclenche. Voir la figure 3-25.
3 Le cas échéant, réinstallez le dissipateur de chaleur sur le processeur 4 (voir “Processeurs”, page 69).
4 Réinstallez le protecteur de ventilation supérieur. Voir “Réinstallation des protecteurs
de ventilation”, page 57.
5 Refermez le système. Voir “Fermeture du système”, page 54.
6 Rebranchez le système sur la prise de courant et allumez-le, ainsi que tous les périphériques connectés.Installation des composants du système 99
Fond de panier SAS (maintenance uniquement)
Retrait du fond de panier SAS
PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour
accéder aux composants internes. Reportez-vous au document Product Information Guide (Guide d’informations
sur le produit) pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans
l’ordinateur et la protection contre les décharges électrostatiques.
1 Retirez le cadre, le cas échéant. Voir “Retrait et réinstallation du cadre avant en option”, page 52.
2 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant.
3 Ouvrez le système. Voir “Ouverture du système”, page 53.
AVIS : pour éviter d’endommager les lecteurs et le fond de panier, retirez du système les lecteurs SAS et le support
du lecteur optique/de disquette avant d’enlever le fond de panier.
AVIS : avant de retirer les disques durs, notez leur numéro d’emplacement et étiquetez-les afin de pouvoir les
réinstaller au même endroit ultérieurement.
4 Retirez tous les disques durs SAS. Voir “Retrait d’un disque dur enfichable à chaud”, page 81.
5 Pour retirer le support de lecteur optique/de disquette, tirez le loquet de dégagement et extrayez
le support du châssis. Voir la figure 3-18.
6 Retirez les protecteurs de ventilation. Voir “Retrait des protecteurs de ventilation”, page 56.
AVIS : lorsque vous débranchez le câble du panneau de commande, maintenez la languette d’extraction blanche
située près du connecteur correspondant afin d’éviter d’endommager le fond de panier SAS ou le câble.
7 Débranchez le câble du panneau de commande enfiché à l’avant du fond de panier SAS.
Voir la figure 6-3.
8 Débranchez le câble SAS, le câble d’interface et le câble d’alimentation qui sont branchés à l’arrière
du fond de panier SAS.
9 Retirez le fond de panier SAS :
a Tirez sur le plot de fixation bleu, puis soulevez le fond de panier. Voir la figure 3-26.
b Lorsque le fond de panier est au niveau le plus haut possible, tirez-le vers l’arrière du système pour
le dégager des crochets de fixation.
c Retirez la carte du système, en prenant garde de ne pas endommager les composants situés sur
celle-ci.
d Posez le fond de panier SAS sur un plan de travail, face vers le bas.100 Installation des composants du système
Figure 3-26. Retrait et installation du fond de panier SAS
1 Plot de fixation 2 Fond de panier SAS 3 Câble du connecteur
du panneau de commande
4 Encoche d’alignement
pour installation
5 Orifices de fixation (7)
5
4
3
1
2Installation des composants du système 101
Installation du fond de panier SAS
PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour
accéder aux composants internes. Reportez-vous au document Product Information Guide (Guide d’informations
sur le produit) pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans
l’ordinateur et la protection contre les décharges électrostatiques.
1 Installez le fond de panier SAS :
a Faites descendre lentement la carte dans le système en faisant attention à ne pas endommager
ses composants.
b Positionnez la fente d’alignement située en partie inférieure du fond de panier face au plot
correspondant situé au fond du châssis. Voir la figure 3-26.
c Emboîtez les orifices de fixation du fond de panier dans les crochets correspondants du châssis.
d Abaissez le fond de panier jusqu’à ce que le plot bleu s’enclenche.
2 Branchez le câble SAS, le câble d’interface et le câble d’alimentation à l’arrière du fond de panier SAS.
3 Connectez le câble du panneau de commande à l’avant du fond de panier SAS.
4 Remettez les disques durs SAS à leur emplacement d’origine. Voir “Disques durs”, page 80.
5 Installez le support du lecteur optique/de disquette.
Réinstallez le support dans le système et fixez-le en appuyant sur le loquet de dégagement. Voir la
figure 3-14.
6 Installez les protecteurs de ventilation. Voir “Réinstallation des protecteurs de ventilation”, page 57.
7 Refermez le système. Voir “Fermeture du système”, page 54.
8 Rebranchez le système sur la prise de courant et allumez-le, ainsi que tous les périphériques connectés.102 Installation des composants du système
Carte système (maintenance uniquement)
Retrait de la carte système
PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour
accéder aux composants internes. Reportez-vous au document Product Information Guide (Guide d’informations
sur le produit) pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans
l’ordinateur et la protection contre les décharges électrostatiques.
1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant.
2 Ouvrez le système. Voir “Ouverture du système”, page 53.
AVIS : pour éviter d’endommager les lecteurs et le fond de panier, retirez du système les lecteurs SAS et le support
du lecteur optique/de disquette avant d’enlever le fond de panier.
AVIS : avant de retirer les disques durs, notez leur numéro d’emplacement et étiquetez-les afin de pouvoir les
réinstaller au même endroit ultérieurement.
3 Retirez les protecteurs de ventilation. Voir “Retrait des protecteurs de ventilation”, page 56.
4 Retirez les dissipateurs de chaleur des processeurs. Voir “Processeurs”, page 69.
5 Débranchez le câble SAS, le câble d’interface et le câble d’alimentation qui sont branchés à l’arrière
du fond de panier SAS.
6 Retirez toutes les cartes d’extension, ainsi que la carte contrôleur. Voir “Retrait d’une carte
d’extension”, page 62.
7 Le cas échéant, débranchez puis retirez la carte RAC.
8 Le cas échéant, retirez les modules VRM des processeurs 3 et 4. Voir “Retrait d’un module VRM”,
page 75.
9 Mettez les deux commutateurs à glissière situés de chaque côté du châssis en position ouverte afin
de déverrouiller la barre transversale du châssis, puis soulevez cette dernière pour la retirer.
Voir la figure 3-27. Installation des composants du système 103
Figure 3-27. Retrait et installation de la barre transversale du châssis
10 Débranchez de la carte système le câble du commutateur d’intrusion du châssis, le câble de la pile
RAID (le cas échéant), ainsi que tous les câbles d’interface.
11 Débranchez de la carte système le faisceau de câbles de distribution de l’alimentation.
Le faisceau de câbles et les côtés du châssis sont équipés de bandes Velcro qui permettent de fixer le
faisceau pendant le retrait de la carte système. Relevez le faisceau de câbles et fixez-le sur le côté du
châssis. Voir la figure 3-28.
1 Position fermée 2 Position ouverte 3 Barre transversale
4 Guides d’alignement (2) 5 Ouvertures (2) 6 Commutateurs à glissière (2)
4
6
1
5
2
3104 Installation des composants du système
Figure 3-28. Fixation du faisceau de câbles de distribution de l’alimentation
12 Retirez le logement de la pile RAID :
a Relevez le levier puis soulevez doucement le logement de la pile pour le retirer. Voir la figure 3-29.
b Soulevez le logement de la pile pour le retirer du châssis.
1 Faisceau de câbles de distribution de l’alimentation 2 Bandes Velcro (2)
1 2Installation des composants du système 105
Figure 3-29. Retrait et installation du logement de la pile RAID
13 Retirez la carte système :
a Tirez sur le plot de fixation bleu situé au milieu de la carte système, puis faites glisser cette
dernière vers l’avant du châssis jusqu’à ce qu’elle bute. Voir la figure 3-30.
b Soulevez la carte système doucement et de manière égale au-dessus des crochets de fixation en
vous assurant qu’elle ne les touche pas, puis faites-la basculer en la soulevant par le côté gauche.
Voir la figure 3-30.
c Soulevez la carte système pour la retirer du châssis (côté gauche en premier).
1 Pattes de fixation (2) 2 Orifices de fixation (2) 3 Logement de la pile RAID
2
1
3106 Installation des composants du système
Figure 3-30. Retrait et installation de la carte système
1 Carte système 2 Orifices de fixation 3 Crochets de fixation
4 Plot de fixation
4
1
2
3Installation des composants du système 107
Installation de la carte système
PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour
accéder aux composants internes. Reportez-vous au document Product Information Guide (Guide d’informations
sur le produit) pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans
l’ordinateur et la protection contre les décharges électrostatiques.
1 Installez les processeurs sur la nouvelle carte système. Voir la figure 6-2 pour identifier l’emplacement
des connecteurs sur la carte système.
REMARQUE : n’installez pas les dissipateurs de chaleur pour le moment.
2 Retirez les barrettes de mémoire de l’ancienne carte puis installez-les sur la nouvelle,
aux mêmes emplacements. Voir les sections “Retrait de barrettes de mémoire”, page 68
et “Installation de barrettes de mémoire”, page 66.
3 Installez la nouvelle carte système :
a Insérez doucement la nouvelle carte système dans le châssis (côté droit en premier).
b Abaissez doucement le côté gauche de la carte.
REMARQUE : vérifiez que le câble d’alimentation du fond de panier SAS (qui provient de la carte
de distribution de l’alimentation) n’interfère pas lors de l’installation de la carte système dans le châssis.
c Relevez doucement l’avant de la carte système et posez-la de façon qu’elle repose totalement sur
le fond du châssis.
d Vérifiez que tous les crochets de fixation situés au fond du châssis sont correctement insérés dans
les orifices de fixation correspondants de la carte système. Voir la figure 3-30.
e Poussez la carte vers l’arrière du châssis, jusqu’à ce que le plot de fixation bleu s’enclenche.
4 Installez le logement de la pile RAID :
a Insérez les deux pattes de fixation situées sur le logement de la pile dans les emplacements
correspondants qui se trouvent sur la paroi interne du châssis. Voir la figure 3-29.
b Appuyez sur le logement de la pile pour le fixer.
5 Branchez les câbles dans l’ordre énuméré ci-dessous (voir la figure 6-2 et la figure 6-3 pour connaître
les emplacements des connecteurs sur la carte système et sur le fond de panier SAS) :
• Branchez le faisceau de câbles de distribution de l’alimentation sur le connecteur situé dans
le coin de la carte système.
• Branchez le câble d’interface sur le connecteur CONTROL_PANEL de la carte système et sur
le connecteur d’interface du fond de panier SAS.
• Branchez le câble de données SAS A sur le connecteur 0 de la carte contrôleur et sur le connecteur
SAS A du fond de panier.108 Installation des composants du système
• Branchez le câble de données SAS B sur le connecteur 1 de la carte contrôleur et sur le connecteur
SAS B du fond de panier, le cas échéant.
• Branchez le câble d’alimentation SAS sur le connecteur correspondant du fond de panier SAS.
• Branchez le câble du commutateur d’intrusion du châssis sur le connecteur correspondant
de la carte système.
6 Installez les dissipateurs de chaleur. Voir “Processeurs”, page 69.
7 Le cas échéant, réinstallez les deux modules VRM des processeurs. Voir “Installation d’un module
VRM”, page 73.
8 Installez la barre transversale du châssis :
a Insérez les guides situés à chaque extrémité de la barre dans les orifices correspondants du châssis.
Voir la figure 3-27.
b Insérez la barre jusqu’à ce que les guides touchent la partie inférieure des orifices.
c Fixez la barre en mettant les deux commutateurs à glissière situés de chaque côté du châssis
en position fermée.
9 Installez toutes les cartes d’extension. Voir “Installation d’une carte d’extension”, page 60.
10 Le cas échéant, reconnectez le câble de la pile RAID sur la carte contrôleur RAID.
11 Le cas échéant, réinstallez et connectez la carte RAC.
12 Installez les protecteurs de ventilation. Voir “Réinstallation des protecteurs de ventilation”, page 57.
13 Installez le support du lecteur optique/de disquette.
Réinstallez le support dans le système et fixez-le en appuyant sur le loquet de dégagement.
Voir la figure 3-14.
14 Installez les disques durs SAS à leur emplacement d’origine. Voir “Installation d’un disque dur
enfichable à chaud”, page 83.
15 Refermez le système. Voir “Fermeture du système”, page 54.
16 Rebranchez le système sur la prise de courant et allumez-le, ainsi que tous les périphériques connectés.
17 Réinstallez le cadre. Voir “Retrait et réinstallation du cadre avant en option”, page 52.Dépannage du système 109
Dépannage du système
La sécurité d’abord, pour vous et pour le système
Pour effectuer certaines des procédures décrites ici, vous devez retirer le capot du système
et intervenir à l’intérieur. Lorsque vous intervenez sur le système, suivez strictement les
opérations décrites dans ce guide ou dans une autre documentation accompagnant le système.
PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système
pour accéder aux composants internes. Avant de commencer toute intervention, reportez-vous au document
Product Information Guide (Guide d’informations sur le produit) pour obtenir des informations détaillées sur
les consignes de sécurité, les interventions dans l’ordinateur et la protection contre les décharges
électrostatiques.
Routine de démarrage
Écoutez et observez le système pendant la procédure de démarrage, pour repérer les symptômes
décrits dans le tableau 4-1.
Tableau 4-1. Indications fournies par la procédure de démarrage
Symptôme Action
L’écran LCD du panneau avant affiche un message
d’état ou d’erreur.
Voir “Messages d’état affichés sur l’écran
LCD”, page 16.
Affichage d’un message d’erreur sur le moniteur. Voir “Messages système”, page 25.
Messages d’alerte du logiciel de gestion des systèmes. Consultez la documentation du logiciel de gestion
des systèmes.
Comportement du voyant d’alimentation du moniteur. Voir “Dépannage du sous-système vidéo”, page 111.
Comportement des voyants du clavier. Voir “Dépannage du clavier”, page 112.
Comportement du voyant d’activité du lecteur
de CD USB.
Voir “Dépannage d’un périphérique USB”, page 114.
Comportement du voyant d’activité du lecteur de CD. Voir “Dépannage d’un lecteur optique”, page 124.
Comportement du voyant d’activité du disque dur. Voir “Dépannage d’un disque dur”, page 125.
Bruit inhabituel de raclement ou de grincement
constant lors de l’accès à un lecteur.
Voir “Obtention d’aide”, page 145.110 Dépannage du système
Vérification des incidents simples liés à l’alimentation
1 Si le voyant d’alimentation situé sur le panneau avant du système ou sur les blocs d’alimentation
indique que le système n’est pas alimenté, vérifiez que les câbles sont correctement branchés sur
les blocs.
2 Si le système est connecté à une PDU (Power Distribution Unit [unité de distribution
d’alimentation]) ou à un onduleur, éteignez l’élément en question puis rallumez-le.
3 Si ces lecteurs ne sont pas alimentés, branchez-les sur une autre prise. Si le système n’est toujours
pas alimenté, essayez une autre PDU ou un autre onduleur.
4 Rebranchez le système sur la prise de courant et allumez-le.
Si l’incident persiste, voir “Dépannage des blocs d’alimentation”, page 119.
Vérification du matériel
Cette section contient les procédures de dépannage des périphériques externes directement connectés
au système, comme le moniteur, le clavier ou la souris. Avant de suivre l’une de ces procédures, voir
“Dépannage des connexions externes”, page 111.
Résolution des conflits d’attribution d’IRQ
La plupart des périphériques PCI peuvent partager une IRQ avec un autre périphérique ; cependant,
les deux périphériques concernés ne peuvent pas fonctionner simultanément. Pour éviter ce type
de conflit, consultez la documentation de chaque périphérique PCI pour obtenir ses spécifications
d’IRQ. Les affectations des IRQ sont répertoriées dans le tableau 4-2.
Tableau 4-2. Affectations par défaut des IRQ
Ligne IRQ Affectation
IRQ0 Horloge du système
IRQ1 Contrôleur du clavier
IRQ2 Contrôleur d’interruption 1, pour activer les IRQ 8 à 15
IRQ3 Disponible
IRQ4 Port série 1 (COM1 et COM3)
IRQ5 Contrôleur d’accès à distance
IRQ6 Contrôleur du lecteur de disquette
IRQ7 Port parallèle
IRQ8 Horloge temps réel
IRQ9 Fonctions ACPI (pour la gestion de l’alimentation)
IRQ10 DisponibleDépannage du système 111
Dépannage des connexions externes
Le plus souvent, les incidents liés au système, au moniteur et aux autres périphériques (comme une
imprimante, un clavier, une souris ou un autre périphérique externe) sont causés par des câbles mal
raccordés ou débranchés. Vérifiez que tous les câbles externes sont fermement raccordés aux connecteurs
correspondants. Voir les sections “Voyants et caractéristiques du panneau avant”, page 11 et “Voyants et
caractéristiques du panneau arrière”, page 14 pour identifier les connecteurs des panneaux avant
et arrière du système.
Dépannage du sous-système vidéo
Incident
• Le moniteur ne fonctionne pas correctement.
• La mémoire vidéo est défectueuse.
Action
1 Vérifiez les connexions du moniteur à l’alimentation et au système.
2 Déterminez si le système contient une carte d’extension équipée d’un connecteur de sortie vidéo.
Si tel est le cas, le câble du moniteur doit être branché sur le connecteur de la carte d’extension, et non
sur le connecteur vidéo intégré du système.
Pour vérifier que le moniteur est relié au connecteur approprié, mettez le système hors tension,
attendez une minute, puis reliez le moniteur à l’autre connecteur vidéo. Remettez ensuite le système
sous tension.
IRQ11 Disponible
IRQ12 Disponible
IRQ13 Coprocesseur mathématique
IRQ14 Contrôleur du lecteur de CD IDE
IRQ15 Disponible
Tableau 4-2. Affectations par défaut des IRQ (suite)
Ligne IRQ Affectation112 Dépannage du système
3 Vérifiez si des moniteurs sont reliés à la fois au connecteur vidéo avant et au connecteur vidéo arrière
du système.
Le système prend en charge un seul moniteur, qui doit être connecté soit à l’avant, soit à l’arrière
du système. Si un moniteur est connecté au panneau avant, le connecteur vidéo arrière est désactivé.
Si deux moniteurs sont reliés au système, déconnectez-en un. Si l’incident persiste, passez à l’étape
suivante.
4 Exécutez le test de diagnostic en ligne approprié. Voir “Utilisation de Dell PowerEdge Diagnostics”,
page 133.
Si le test aboutit, l’incident n’est pas lié au matériel vidéo.
Si le test échoue, voir “Obtention d’aide”, page 145.
Dépannage du clavier
Incident
• Un message d’erreur du système signale un incident lié au clavier.
• Le clavier ne fonctionne pas correctement.
Action
1 Accédez au programme de configuration du système et vérifiez que les ports USB sont activés.
Voir “Utilisation du programme de configuration du système”, page 33.
2 Examinez le clavier et son câble pour voir s’ils sont endommagés.
3 Remplacez le clavier défectueux par un clavier fiable.
Si l’incident est résolu, remplacez le clavier défectueux. Voir “Obtention d’aide”, page 145.
4 Exécutez le test de diagnostic en ligne approprié. Voir “Exécution des diagnostics
du système”, page 133.
Si l’incident persiste, voir “Obtention d’aide”, page 145.Dépannage du système 113
Dépannage de la souris
Incident
• Un message d’erreur du système signale un incident lié à la souris.
• La souris ne fonctionne pas correctement.
Action
1 Examinez la souris et son câble pour voir s’ils sont endommagés.
Si la souris n’est pas endommagée, passez à l’étape 4.
2 Accédez au programme de configuration du système et vérifiez que les ports USB sont activés.
Voir “Utilisation du programme de configuration du système”, page 33.
Si la souris est endommagée, passez à l’étape suivante.
3 Remplacez la souris défectueuse par une souris fiable.
Si l’incident est résolu, remplacez la souris défectueuse. Voir “Obtention d’aide”, page 145.
4 Si l’incident persiste, voir “Obtention d’aide”, page 145.
5 Exécutez le test de diagnostic en ligne approprié. Voir “Utilisation de Dell PowerEdge Diagnostics”,
page 133.
Si le test échoue, passez à l’étape suivante.
Dépannage des incidents liés aux E-S série
Incident
• Un message d’erreur signale un incident lié à un port série.
• Un périphérique connecté à un port série ne fonctionne pas correctement.
Action
1 Ouvrez le programme de configuration du système et vérifiez que le port série est activé et
correctement configuré pour l’application en cours. Voir “Utilisation du programme de configuration
du système”, page 33.
2 Si l’incident affecte uniquement une application particulière, consultez sa documentation pour
connaître la configuration requise des différents ports.
3 Exécutez le test de diagnostic en ligne approprié. Voir “Utilisation de Dell PowerEdge Diagnostics”,
page 133.
Si l’incident persiste alors que le test a abouti, voir Dépannage d’un périphérique d’E-S série.114 Dépannage du système
Dépannage d’un périphérique d’E-S série
Incident
• Le périphérique connecté au port série ne fonctionne pas correctement.
Action
1 Éteignez le système et les périphériques connectés au port série.
2 Remplacez le câble d’interface série par un câble en état de fonctionnement, puis allumez le système
et le périphérique série.
Si l’incident est résolu, remplacez le câble d’interface.
3 Éteignez le système et le périphérique série et remplacez ce dernier par un périphérique similaire.
4 Allumez le système et le périphérique série.
Si l’incident est résolu, remplacez le périphérique série. Voir “Obtention d’aide”, page 145.
Si l’incident persiste, voir “Obtention d’aide”, page 145.
Dépannage d’un périphérique USB
Incident
• Un message du système signale un incident lié à un périphérique USB.
• Un périphérique connecté à un port USB ne fonctionne pas correctement.
Action
1 Accédez au programme de configuration du système et vérifiez que les ports USB sont activés.
Voir “Utilisation du programme de configuration du système”, page 33.
2 Éteignez le système et tous les périphériques USB.
3 Déconnectez les périphériques USB, puis raccordez le périphérique défectueux à l’autre
connecteur USB.
4 Allumez le système et le périphérique reconnecté.
Si l’incident est résolu, le connecteur USB est peut-être défectueux. Voir “Obtention d’aide”, page 145.
5 Si possible, remplacez le câble d’interface par un câble qui fonctionne.
Si l’incident est résolu, remplacez le câble d’interface. Voir “Obtention d’aide”, page 145.
6 Éteignez le système et le périphérique USB et remplacez ce dernier par un périphérique similaire.
7 Allumez le système et le périphérique USB.
Si l’incident est résolu, remplacez le périphérique USB. Voir “Obtention d’aide”, page 145.
Si l’incident persiste, voir “Obtention d’aide”, page 145.Dépannage du système 115
Dépannage d’un NIC
Incident
• Le NIC ne parvient pas à communiquer avec le réseau.
Action
1 Exécutez le test de diagnostic en ligne approprié. Voir “Exécution des diagnostics du système”,
page 133.
2 Observez le voyant approprié du connecteur de NIC. Voir “Codes des voyants de NIC”, page 16.
• Si le voyant de lien ne s’allume pas, vérifiez toutes les connexions des câbles.
• Si le voyant d’activité ne s’allume pas, les fichiers des pilotes réseau sont peut-être altérés
ou manquants.
Supprimez puis réinstallez les pilotes le cas échéant. Consultez la documentation du NIC.
• Si possible, modifiez le paramétrage de négociation automatique.
• Utilisez un autre connecteur sur le commutateur ou le concentrateur.
Si vous utilisez une carte réseau au lieu d’un NIC intégré, consultez la documentation fournie
avec celle-ci.
3 Vérifiez que les pilotes appropriés sont installés et que les protocoles sont liés. Consultez
la documentation du NIC.
4 Accédez au programme de configuration du système et vérifiez que les interfaces réseau sont activées.
Voir “Utilisation du programme de configuration du système”, page 33.
5 Vérifiez que les NIC, les concentrateurs et les commutateurs du réseau sont tous réglés sur la même
vitesse de transmission des données. Consultez la documentation du matériel réseau.
6 Vérifiez que tous les câbles réseau sont du type approprié et qu’ils ne dépassent pas la longueur
maximum. Voir le câblage réseau requis dans le document Getting Started Guide (Guide de mise
en route).116 Dépannage du système
Dépannage d’un système mouillé
Incident
• Système mouillé.
• Excès d’humidité.
Action
PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour
accéder aux composants internes. Reportez-vous au document Product Information Guide (Guide d’informations
sur le produit) pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans
l’ordinateur et la protection contre les décharges électrostatiques.
1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant.
2 Ouvrez le système. Voir “Ouverture et fermeture du système”, page 52.
3 Retirez toutes les cartes d’extension du système. Voir “Retrait d’une carte d’extension”, page 62.
4 Laissez le système sécher complètement pendant au moins 24 heures.
5 Refermez le système. Voir “Ouverture et fermeture du système”, page 52.
6 Rebranchez le système à la prise de courant et allumez-le, ainsi que les périphériques connectés.
Si le système ne démarre pas normalement, voir “Obtention d’aide”, page 145.
7 Si le système démarre normalement, arrêtez-le et réinstallez les cartes d’extension que vous avez
retirées. Voir “Installation d’une carte d’extension”, page 60.
8 Exécutez le test de diagnostic en ligne approprié. Voir “Utilisation de Dell PowerEdge
Diagnostics”, page 133.
Si le test échoue, voir “Obtention d’aide”, page 145.Dépannage du système 117
Dépannage d’un système endommagé
Incident
• Le système est tombé ou a été endommagé.
Action
PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour
accéder aux composants internes. Avant de commencer toute intervention, reportez-vous au document Product
Information Guide (Guide d’informations sur le produit) pour obtenir des informations détaillées sur les consignes
de sécurité, les interventions dans l’ordinateur et la protection contre les décharges électrostatiques.
1 Ouvrez le système. Voir “Ouverture et fermeture du système”, page 52.
2 Assurez-vous que les composants suivants sont correctement installés :
• Cartes d’extension
• Blocs d’alimentation
• Ventilateurs
• Processeurs et dissipateurs de chaleur
• Barrettes de mémoire
• Connexions d’un support de lecteur à la carte de fond de panier.
3 Vérifiez que tous les câbles sont correctement connectés.
4 Refermez le système. Voir “Ouverture et fermeture du système”, page 52.
5 Lancez les tests System board (Carte système) des diagnostics du système.
Voir “Utilisation de Dell PowerEdge Diagnostics”, page 133.
Si les tests échouent, voir “Obtention d’aide”, page 145.118 Dépannage du système
Dépannage de la pile du système
Incident
• Un message du système signale un incident lié à la pile.
• Le programme de configuration du système perd les informations.
• La date et l’heure du système se dérèglent constamment.
REMARQUE : si le système reste éteint longtemps (pendant des semaines ou des mois), la NVRAM peut perdre
ses informations de configuration. Cette situation est causée par une pile défectueuse.
Action
1 Entrez de nouveau l’heure et la date dans le programme de configuration du système. Voir “Utilisation
du programme de configuration du système”, page 33.
2 Éteignez et débranchez le système de la prise électrique pendant au moins une heure.
3 Rebranchez le système sur la prise de courant et allumez-le.
4 Ouvrez le programme de configuration du système.
Si la date et l’heure du programme de configuration du système ne sont pas correctes, remplacez
la pile. Voir “Pile du système”, page 88.
Si l’incident persiste malgré le remplacement de la pile, voir “Obtention d’aide”, page 145.
REMARQUE : certains logiciels peuvent provoquer une accélération ou un ralentissement de l’heure système.
Si le système semble fonctionner normalement à l’exception de l’heure qui est conservée dans le programme
de configuration du système, l’incident peut être causé par un logiciel plutôt que par une pile défectueuse.Dépannage du système 119
Dépannage des blocs d’alimentation
Incident
• Les voyants d’état du système sont orange.
• Les voyants de panne des blocs d’alimentation sont orange.
• L’écran LCD du panneau avant indique qu’un incident lié aux blocs d’alimentation s’est produit.
Action
1 Déterminez l’emplacement du bloc d’alimentation défectueux.
Le voyant de panne du bloc d’alimentation est allumé. Voir “Codes du voyant d’alimentation”,
page 15.
AVIS : les blocs d’alimentation sont enfichables à chaud. Le système ne peut fonctionner que si au moins un bloc
d’alimentation est installé ; il est en mode redondant si deux blocs d’alimentation sont installés. Ne retirez et ne
remplacez qu’un seul bloc d’alimentation à la fois dans un système sous tension. Le système risque de surchauffer
si vous l’utilisez pendant une période prolongée avec un seul bloc d’alimentation.
2 Retirez le bloc d’alimentation défectueux. Voir “Blocs d’alimentation”, page 57.
3 Retirez et réinstallez le bloc d’alimentation pour vous assurer qu’il est bien en place. Voir “Blocs
d’alimentation”, page 57.
REMARQUE : après avoir installé un nouveau bloc d’alimentation, patientez plusieurs secondes pour laisser
au système le temps de le reconnaître et de déterminer s’il fonctionne correctement. Le voyant d’alimentation
s’allume en vert si le bloc d’alimentation fonctionne normalement. Voir “Codes du voyant d’alimentation”,
page 15.
Si l’incident persiste, voir “Obtention d’aide”, page 145.120 Dépannage du système
Dépannage des incidents de refroidissement du système
Incident
• Le logiciel de gestion des systèmes a émis un message d’erreur concernant les ventilateurs.
Action
Vérifiez qu’aucune des conditions suivantes n’est présente :
• Le capot du système, le protecteur de ventilation, un cache de lecteur ou une plaque de recouvrement
avant ou arrière a été retiré.
• La température ambiante est trop élevée.
• La circulation de l’air extérieur est bloquée.
• Les câbles à l’intérieur du système gênent l’aération.
• Un des ventilateurs a été retiré ou est en panne. Voir “Dépannage d’un ventilateur”, page 120.
Dépannage d’un ventilateur
Incident
• Le voyant d’état du système est orange.
• Le logiciel de gestion des systèmes a émis un message d’erreur concernant les ventilateurs.
• L’écran LCD du panneau avant signale un incident au niveau du ventilateur.
• Le voyant d’état d’un ventilateur indique un incident lié au ventilateur.
Action
PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour
accéder aux composants internes. Avant de commencer toute intervention, reportez-vous au document Product
Information Guide (Guide d’informations sur le produit) pour obtenir des informations détaillées sur les consignes
de sécurité, les interventions dans l’ordinateur et la protection contre les décharges électrostatiques.
1 Exécutez le test de diagnostic en ligne approprié. Voir “Utilisation de Dell PowerEdge Diagnostics”,
page 133.
2 Ouvrez le système. Voir “Ouverture et fermeture du système”, page 52.
PRÉCAUTION : les ventilateurs sont enfichables à chaud. Pour maintenir un refroidissement adéquat lorsque
le système est sous tension, remplacez les ventilateurs un à la fois.
3 Identifiez le ventilateur défectueux indiqué sur l’écran LCD, le logiciel de diagnostic, ou le voyant
de ventilateur qui clignote en orange. Pour connaître le numéro d’identification de chaque ventilateur,
voir la figure 3-4.Dépannage du système 121
4 Vérifiez que le câble d’alimentation du ventilateur défectueux est bien raccordé au connecteur
approprié. Dans le cas d’un ventilateur enfichable à chaud, retirez puis réinstallez le ventilateur.
Voir “Ventilateurs”, page 54.
REMARQUE : patientez 30 secondes pour laisser au système le temps de reconnaître le ventilateur
et de déterminer s’il fonctionne normalement.
5 Si l’incident persiste, installez un nouveau ventilateur. Voir “Ventilateurs”, page 54.
Si le nouveau ventilateur fonctionne normalement, refermez le système. Voir “Ouverture et fermeture
du système”, page 52.
Si le nouveau ventilateur ne fonctionne pas, voir “Obtention d’aide”, page 145.
Dépannage de la mémoire système
Incident
• Une barrette de mémoire est défectueuse.
• Carte système défectueuse.
• L’écran LCD du panneau avant indique qu’un incident lié à la mémoire système s’est produit.
Action
PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour
accéder aux composants internes. Reportez-vous au document Product Information Guide (Guide d’informations
sur le produit) pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans
l’ordinateur et la protection contre les décharges électrostatiques.
1 Si le système fonctionne, exécutez le test des diagnostics en ligne approprié.
Voir “Utilisation de Dell PowerEdge Diagnostics”, page 133.
Si les diagnostics indiquent une panne, suivez les instructions fournies par le programme de
diagnostic. Si l’incident persiste ou si le système ne fonctionne toujours pas, passez à l’étape suivante.
2 Éteignez le système et les périphériques connectés, puis débranchez le système de la prise de courant
et appuyez sur le bouton d’alimentation. Rebranchez ensuite le système à la prise de courant.
3 Allumez le système et les périphériques connectés. Pendant que le système redémarre, notez les
messages qui s’affichent à l’écran.
Si la quantité de mémoire système détectée pendant l’auto-test de démarrage ne correspond pas
à la mémoire installée, ou si un message d’erreur relatif à la mémoire s’affiche, passez à l’étape 4.
Si des messages d’erreur s’affichent, indiquant qu’une barrette de mémoire est en panne,
passez à l’étape 11.
4 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant.
5 Ouvrez le système. Voir “Ouverture et fermeture du système”, page 52.122 Dépannage du système
6 Assurez-vous que les bancs de mémoire sont remplis dans le bon ordre. Voir “Consignes générales
d’installation des barrettes de mémoire”, page 64.
Si les connecteurs mémoire sont remplis correctement, passez à l’étape suivante.
7 Remettez les barrettes de mémoire dans leurs supports. Voir “Installation de barrettes
de mémoire”, page 66.
8 Refermez le système. Voir “Ouverture et fermeture du système”, page 52.
9 Rebranchez le système à la prise de courant et allumez-le, ainsi que les périphériques connectés.
10 Accédez au programme de configuration du système et vérifiez le paramétrage de la mémoire système.
Voir “Utilisation du programme de configuration du système”, page 33.
Si l’espace mémoire installé ne correspond pas au paramètre de mémoire système,
passez à l’étape suivante.
11 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant.
12 Ouvrez le système. Voir “Ouverture et fermeture du système”, page 52.
REMARQUE : il existe plusieurs configurations pour les barrettes de mémoire (voir “Consignes générales
d’installation des barrettes de mémoire”, page 64).
13 Si un test de diagnostic ou un message d’erreur indique qu’une barrette de mémoire est
défectueuse, repositionnez-la ou remplacez-la. Vous pouvez également échanger la barrette se
trouvant dans le logement 1 avec une autre barrette fiable (de même type et de même capacité).
Voir “Installation de barrettes de mémoire”, page 66.
14 Refermez le système. Voir “Ouverture et fermeture du système”, page 52.
15 Rebranchez le système à la prise de courant et allumez-le, ainsi que les périphériques connectés.
16 Pendant l’amorçage du système, observez les voyants de diagnostic du panneau avant, et guettez
l’apparition de messages d’erreur.
17 Si l’incident persiste, répétez la procédure, de l’étape 11 à l’étape 17, pour chaque barrette installée.
Si l’incident persiste malgré la vérification de toutes les barrettes, voir “Obtention d’aide”, page 145.Dépannage du système 123
Dépannage d’un lecteur de disquette
Incident
• Un message d’erreur signale un incident lié au lecteur de disquette.
Action
PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour
accéder aux composants internes. Avant de commencer toute intervention, reportez-vous au document Product
Information Guide (Guide d’informations sur le produit) pour obtenir des informations détaillées sur les consignes
de sécurité, les interventions dans l’ordinateur et la protection contre les décharges électrostatiques.
1 Accédez au programme de configuration du système et vérifiez que le lecteur de disquette est
configuré correctement. Voir “Utilisation du programme de configuration du système”, page 33.
2 Retirez le cadre. Voir “Retrait et réinstallation du cadre avant en option”, page 52.
3 Retirez le support du lecteur de disquette ou du lecteur optique et vérifiez que le câble du lecteur
de disquette est fermement raccordé. Réinstallez le support du lecteur optique ou du lecteur
de disquette, en vous assurant qu’il est correctement inséré et positionné dans le châssis.
Voir la figure 3-14.
4 Exécutez le test de diagnostic en ligne approprié pour vérifier que le lecteur de disquette fonctionne
correctement. Si le test échoue, passez à l’étape suivante.
Voir “Utilisation de Dell PowerEdge Diagnostics”, page 133.
5 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant.
6 Ouvrez le système. Voir “Ouverture et fermeture du système”, page 52.
7 Retirez toutes les cartes d’extension du système. Voir “Retrait d’une carte d’extension”, page 62.
8 Refermez le système. Voir “Ouverture et fermeture du système”, page 52.
9 Rebranchez le système à la prise de courant et allumez-le, ainsi que les périphériques connectés.
10 Exécutez le test de diagnostic en ligne approprié pour vérifier que le lecteur de disquette fonctionne
correctement.
Si les tests réussissent, il est possible qu’une carte d’extension soit en conflit avec la logique du lecteur
de disquette ou qu’elle soit défectueuse. Passez à l’étape suivante.
Si le test échoue, voir “Obtention d’aide”, page 145.124 Dépannage du système
11 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant.
12 Ouvrez le système. Voir “Ouverture et fermeture du système”, page 52.
13 Réinstallez l’une des cartes d’extension retirées à l’étape 7. Voir “Installation d’une carte d’extension”,
page 60.
14 Refermez le système. Voir “Ouverture et fermeture du système”, page 52.
15 Rebranchez le système à la prise de courant et allumez-le, ainsi que les périphériques connectés.
16 Exécutez le test de diagnostic en ligne approprié pour vérifier que le lecteur de disquette fonctionne
correctement.
17 Recommencez la procédure, de l’étape 11 à l’étape 16, jusqu’à ce que toutes les cartes d’extension
soient réinstallées ou que l’une des cartes fasse échouer les tests.
Si l’incident persiste, voir “Obtention d’aide”, page 145.
Dépannage d’un lecteur optique
Incident
• Le système ne peut pas lire les données d’un CD ou d’un DVD placé dans le lecteur.
• Le voyant du lecteur optique ne clignote pas au démarrage du système.
REMARQUE : les périphériques DVD sont uniquement des périphériques de données.
Action
PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour
accéder aux composants internes. Reportez-vous au document Product Information Guide (Guide d’informations
sur le produit) pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans
l’ordinateur et la protection contre les décharges électrostatiques.
1 Essayez un autre CD ou DVD fonctionnel.
2 Accédez au programme de configuration du système et vérifiez que le contrôleur IDE du lecteur
est activé. Voir “Utilisation du programme de configuration du système”, page 33.
3 Exécutez le test de diagnostic en ligne approprié. Voir “Utilisation de Dell PowerEdge Diagnostics”,
page 133.
4 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant.
5 Ouvrez ou retirez le cadre. Voir “Retrait et réinstallation du cadre avant en option”, page 52.
6 Ouvrez le système. Voir “Ouverture et fermeture du système”, page 52.
7 Vérifiez que le câble d’interface est correctement connecté au lecteur optique et à la carte latérale.
8 Refermez le système. Voir “Ouverture et fermeture du système”, page 52.
9 Rebranchez le système à la prise de courant et allumez-le, ainsi que les périphériques connectés.
Si l’incident persiste, voir “Obtention d’aide”, page 145.Dépannage du système 125
Dépannage d’un disque dur
Incident
• Erreur de pilote de périphérique.
• Un ou plusieurs disques durs ne sont pas reconnus par le système.
Action
PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour
accéder aux composants internes. Reportez-vous au document Product Information Guide (Guide d’informations
sur le produit) pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans
l’ordinateur et la protection contre les décharges électrostatiques.
AVIS : cette procédure de dépannage risque de supprimer les données stockées sur le disque dur.
Avant de continuer, créez une copie de sauvegarde de tous les fichiers qui se trouvent sur le disque dur.
1 Exécutez le test de diagnostic en ligne approprié. Voir “Utilisation de Dell PowerEdge Diagnostics”,
page 133.
Procédez comme suit, selon les résultats du test de diagnostic.
2 Retirez le cadre. Voir “Retrait et réinstallation du cadre avant en option”, page 52.
3 Si l’incident concerne plusieurs disques durs, passez à l’étape 8. S’il concerne un seul disque dur,
passez à l’étape suivante.
4 Mettez le système hors tension, remboîtez le disque dur et redémarrez le système.
5 Si le système est équipé d’un contrôleur RAID SAS, effectuez les opérations suivantes.
a Redémarrez le système et appuyez sur pour ouvrir l’utilitaire de configuration
de l’adaptateur à l’hôte.
Consultez la documentation fournie avec le contrôleur pour obtenir des informations
sur cet utilitaire.
b Assurez-vous que le disque dur a été correctement configuré.
c Quittez l’utilitaire de configuration et laissez le système d’exploitation démarrer.
6 Assurez-vous que les pilotes requis pour la carte contrôleur sont installés et configurés correctement.
Reportez-vous à la documentation du système d’exploitation pour plus d’informations.
AVIS : si le système est équipé d’une carte contrôleur RAID SAS, ignorez l’étape suivante.126 Dépannage du système
7 Si le système contient une carte contrôleur SAS sans option RAID, retirez le disque dur et échangez-le
avec un disque opérationnel installé dans une autre baie.
Si l’incident est résolu, réinstallez le disque dur dans la baie d’origine. Voir “Installation d’un disque
dur enfichable à chaud”, page 83.
Si le disque dur fonctionne correctement dans la baie d’origine, il se peut que des incidents
liés au support de lecteur surviennent par intermittence. Remplacez ce support.
Voir “Obtention d’aide”, page 145.
Si le disque dur fonctionne correctement dans une autre baie, mais pas dans sa baie d’origine,
l’incident est lié à un connecteur du fond de panier SAS. Voir “Obtention d’aide”, page 145.
8 Vérifiez les connexions des câbles à l’intérieur du système :
a Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant.
b Ouvrez le système. Voir “Ouverture et fermeture du système”, page 52.
c Vérifiez que le fond de panier SAS est correctement relié à la carte contrôleur. Voir “Installation
d’une carte contrôleur SAS”, page 85.
d Vérifiez que les câbles de données sont correctement insérés dans leurs connecteurs.
e Vérifiez que le connecteur d’alimentation du fond de panier SAS est correctement inséré dans
son connecteur.
f Refermez le système. Voir “Ouverture et fermeture du système”, page 52.
g Rebranchez le système à la prise de courant et allumez-le, ainsi que les périphériques connectés.
Si l’incident persiste, voir “Obtention d’aide”, page 145.Dépannage du système 127
Dépannage d’un contrôleur SAS ou RAID SAS
REMARQUE : lorsque vous dépannez un contrôleur SAS ou RAID SAS, reportez-vous également
à sa documentation et à celle du système d’exploitation.
Incident
• Un message d’erreur signale un incident lié au contrôleur SAS ou RAID SAS.
• Le contrôleur SAS ou RAID SAS ne fonctionne pas correctement ou pas du tout.
Action
PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour
accéder aux composants internes. Avant de commencer toute intervention, reportez-vous au document Product
Information Guide (Guide d’informations sur le produit) pour obtenir des informations détaillées sur les consignes
de sécurité, les interventions dans l’ordinateur et la protection contre les décharges électrostatiques.
1 Exécutez le test de diagnostic en ligne approprié. Voir “Utilisation de Dell PowerEdge Diagnostics”,
page 133.
2 Accédez au programme de configuration du système et vérifiez que le contrôleur SAS ou RAID SAS
est activé. Voir “Utilisation du programme de configuration du système”, page 33.
3 Redémarrez le système et appuyez sur pour ouvrir l’utilitaire de configuration :
Reportez-vous à la documentation du contrôleur pour obtenir des informations sur les paramètres
de configuration.
4 Vérifiez les paramètres de configuration, corrigez-les au besoin et redémarrez le système.
Si l’incident persiste, passez à l’étape suivante.
5 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant.
6 Ouvrez le système. Voir “Ouverture et fermeture du système”, page 52.
7 Vérifiez que la carte contrôleur est correctement insérée dans le connecteur INTERNAL_STORAGE
de la carte système. Voir “Installation d’une carte contrôleur SAS”, page 85.128 Dépannage du système
8 Si le système est équipé d’un contrôleur RAID SAS, vérifiez que les composants suivants sont
correctement installés et connectés :
• Barrette de mémoire
• Pile RAID
9 Vérifiez que le fond de panier est correctement relié au contrôleur SAS. Voir “Fond de panier SAS
(maintenance uniquement)”, page 99.
10 Refermez le système. Voir “Ouverture et fermeture du système”, page 52.
11 Rebranchez le système à la prise de courant et allumez-le, ainsi que les périphériques connectés.
Si l’incident persiste, procédez comme suit :
• Si le système est équipé d’un contrôleur SAS, voir “Obtention d’aide”, page 145.
• Si le système est équipé d’un contrôleur RAID, remplacez la pile RAID. Voir “Installation de la pile
d’une carte contrôleur RAID SAS”, page 85. Si le remplacement de la pile ne résout pas l’incident,
voir “Obtention d’aide”, page 145.
Dépannage d’un lecteur de bande SAS externe
Incident
• Lecteur de bande défectueux
• Cartouche défectueuse
• Logiciel de sauvegarde sur bande ou pilote du lecteur de bande manquant ou altéré
• Contrôleur SAS défectueux
Action
1 Retirez la cartouche que vous utilisiez lorsque l’incident s’est produit, et remplacez-la par une autre
dont vous êtes certain qu’elle fonctionne.
2 Assurez-vous que les pilotes correspondant au lecteur de bande sont installés et configurés
correctement.
3 Exécutez les diagnostics en ligne appropriés. Voir “Utilisation de Dell PowerEdge
Diagnostics”, page 133.
4 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant.
PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour
accéder aux composants internes. Avant de commencer toute intervention, reportez-vous au document Product
Information Guide (Guide d’informations sur le produit) pour obtenir des informations détaillées sur les consignes
de sécurité, les interventions dans l’ordinateur et la protection contre les décharges électrostatiques.Dépannage du système 129
5 Ouvrez le système. Voir “Ouverture et fermeture du système”, page 52.
6 Vérifiez que la carte contrôleur est correctement insérée dans le connecteur de la carte système.
7 Vérifiez que le câble d’interface/d’alimentation en CC du lecteur de bande est connecté au lecteur
de bande et à la carte contrôleur.
8 Refermez le système. Voir “Ouverture et fermeture du système”, page 52.
9 Rebranchez le système à la prise de courant et allumez-le, ainsi que les périphériques connectés.
10 Si l’incident n’est pas résolu, consultez la documentation du lecteur de bande pour obtenir des
instructions de dépannage supplémentaires.
11 Réinstallez le logiciel de sauvegarde sur bande en suivant les instructions de sa documentation
d’accompagnement.
12 Si vous ne parvenez pas à résoudre l’incident, consultez la section “Obtention d’aide”, page 145.
Dépannage des cartes d’extension
REMARQUE : lorsque vous dépannez une carte d’extension, consultez la documentation du système
d’exploitation et de la carte d’extension.
Incident
• Un message d’erreur signale un incident lié à une carte d’extension.
• La carte d’extension ne fonctionne pas correctement ou pas du tout.
Action
PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour
accéder aux composants internes. Avant de commencer toute intervention, reportez-vous au document Product
Information Guide (Guide d’informations sur le produit) pour obtenir des informations détaillées sur les consignes
de sécurité, les interventions dans l’ordinateur et la protection contre les décharges électrostatiques.
1 Exécutez le test de diagnostic en ligne approprié. Voir “Exécution des diagnostics du système”,
page 133.
2 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant.
3 Ouvrez le système. Voir “Ouverture et fermeture du système”, page 52.
4 Vérifiez que chaque carte d’extension est insérée à fond dans son connecteur. Voir “Cartes
d’extension”, page 59.
5 Refermez le système. Voir “Ouverture et fermeture du système”, page 52.
6 Rebranchez le système à la prise de courant et allumez-le, ainsi que les périphériques connectés.
Si l’incident persiste, passez à l’étape suivante.130 Dépannage du système
7 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant.
8 Ouvrez le système. Voir “Ouverture et fermeture du système”, page 52.
9 Retirez toutes les cartes d’extension du système. Voir “Retrait d’une carte d’extension”, page 62.
10 Refermez le système. Voir “Ouverture et fermeture du système”, page 52.
11 Rebranchez le système à la prise de courant et allumez-le, ainsi que les périphériques connectés.
12 Exécutez le test de diagnostic en ligne approprié.
Si le test échoue, voir “Obtention d’aide”, page 145.
13 Pour chaque carte d’extension retirée à l’étape 9, effectuez les opérations suivantes :
a Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant.
b Ouvrez le système. Voir “Ouverture et fermeture du système”, page 52.
c Réinstallez une des cartes d’extension. Voir “Installation d’une carte d’extension”, page 60.
d Refermez le système. “Ouverture et fermeture du système”, page 52.
e Exécutez le test de diagnostic approprié.
Si le test échoue, voir “Obtention d’aide”, page 145.
Dépannage des microprocesseurs
Incident
• Un message d’erreur signale un incident lié au processeur.
• L’écran LCD du panneau avant indique qu’un incident lié aux processeurs ou à la carte système
s’est produit.
• Un dissipateur de chaleur n’est pas installé pour chaque processeur.
Action
PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour
accéder aux composants internes. Reportez-vous au document Product Information Guide (Guide d’informations
sur le produit) pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans
l’ordinateur et la protection contre les décharges électrostatiques.
1 Exécutez le test des diagnostics en ligne approprié. Voir “Utilisation de Dell PowerEdge Diagnostics”,
page 133.
2 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant.
3 Ouvrez le système. Voir “Ouverture et fermeture du système”, page 52.Dépannage du système 131
4 Vérifiez que chaque processeur et chaque dissipateur de chaleur est installé correctement.
Voir “Retrait d’un processeur”, page 69.
5 Refermez le système. Voir “Ouverture et fermeture du système”, page 52.
6 Rebranchez le système à la prise de courant et allumez-le, ainsi que les périphériques connectés.
7 Exécutez le test de diagnostic en ligne approprié.
Si le test échoue ou si l’incident persiste, passez à l’étape suivante.
8 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant.
9 Ouvrez le système. Voir “Ouverture et fermeture du système”, page 52.
10 Remplacez le processeur 1 par un autre processeur de même type. Voir les sections “Retrait d’un
processeur”, page 69 et “Installation d’un processeur”, page 72.
11 Refermez le système. Voir “Ouverture et fermeture du système”, page 52.
12 Exécutez le test de diagnostic en ligne approprié.
Si les tests aboutissent, remplacez le processeur 1. Voir “Obtention d’aide”, page 145.
Si le test échoue, voir “Obtention d’aide”, page 145.132 Dépannage du systèmeExécution des diagnostics du système 133
Exécution des diagnostics du système
Si vous rencontrez des difficultés lors de l’utilisation du système, lancez les diagnostics avant
de demander une assistance technique. Le but des diagnostics est de tester le matériel du système
sans nécessiter d’équipement supplémentaire et sans risque de perte de données. Si vous ne réussissez
pas à corriger l’incident, le personnel de service et de support peut s’aider des résultats de ces tests.
Utilisation de Dell PowerEdge Diagnostics
Pour diagnostiquer un incident, commencez par utiliser les diagnostics en ligne, Dell™ PowerEdge™
Diagnostics. Ces derniers comprennent divers modules de test pour le châssis et les composants de
stockage (disques durs, mémoire physique, ports de communication et d’impression, NIC, CMOS,
etc.). Si vous n’arrivez pas à identifier l’incident à l’aide de PowerEdge Diagnostics, utilisez les
diagnostics du système.
Les fichiers requis pour exécuter PowerEdge Diagnostics sur les systèmes Microsoft Windows et Linux
sont disponibles sur le site support.dell.com, ainsi que sur les CD fournis avec le système. Pour plus
d’informations sur l’utilisation des diagnostics, consultez le document Dell PowerEdge Diagnostics
User’s Guide (Guide d’utilisation de Dell PowerEdge Diagnostics).
Fonctionnalités des diagnostics du système
Les diagnostics du système contiennent des menus et des options permettant de tester des groupes
de périphériques ou des périphériques particuliers. Ces options permettent :
• de lancer un ou plusieurs tests ;
• de définir l’ordre des tests ;
• de répéter des tests ;
• d’afficher, d’imprimer et d’enregistrer les résultats des tests ;
• d’interrompre temporairement un test quand une erreur est détectée ou de l’arrêter lorsqu’une
limite d’erreur définie par l’utilisateur est atteinte ;
• d’afficher des messages d’aide qui décrivent brièvement chaque test et ses paramètres ;
• d’afficher des messages d’état qui vous indiquent si les tests ont abouti ;
• d’afficher des messages d’erreur qui vous indiquent si des incidents sont survenus pendant
les tests.134 Exécution des diagnostics du système
Quand utiliser les diagnostics du système
Le fait qu’un composant ou un périphérique important du système ne fonctionne pas normalement peut
être le symptôme d’une panne. Tant que le processeur et les périphériques d’entrée-sortie du système
(le moniteur, le clavier et le lecteur de disquette) fonctionnent, vous pouvez utiliser les diagnostics
pour faciliter l’identification de l’incident.
Exécution des diagnostics du système
Les diagnostics du système s’exécutent à partir de la partition d’utilitaires du disque dur.
AVIS : n’utilisez les diagnostics que sur le système. Leur utilisation sur d’autres systèmes peut entraîner des
résultats non valides ou générer des messages d’erreur. De plus, n’utilisez que le programme fourni avec le
système (ou une mise à jour).
1 Au démarrage du système, appuyez sur pendant l’auto-test de démarrage.
2 Dans le menu principal de la partition d’utilitaires, sélectionnez Run System Diagnostics (Exécuter les
diagnostics du système), ou sélectionnez Run Memory Diagnostics (Exécuter les diagnostics de la
mémoire) si vous cherchez à identifier un incident lié à la mémoire.
Quand vous lancez les diagnostics du système, un message s’affiche, indiquant qu’ils sont en cours
d’initialisation. Ensuite, le menu Diagnostics s’affiche. Ce menu vous permet de lancer tous ou certains
tests, ou encore de quitter les diagnostics du système.
REMARQUE : avant de lire le reste de cette section, lancez les diagnostics du système pour afficher l’utilitaire
à l’écran.
Options de test des diagnostics du système
Cliquez sur l’option de test voulue dans la fenêtre Main Menu (Menu principal). Le tableau 5-1 contient
une brève explication sur les options de test disponibles.
Tableau 5-1. Options de test des diagnostics du système
Option de test Fonction
Express Test (Test rapide) Effectue une vérification rapide du système. Cette option exécute les
tests de périphériques qui ne requièrent pas d’action de l’utilisateur.
Elle permet d’identifier rapidement la source de l’incident.
Extended Test (Test complet) Effectue une vérification plus complète du système. Ce test peut
prendre plus d’une heure.
Custom Test
(Test personnalisé)
Teste un périphérique particulier.
Information Affiche les résultats des tests.Exécution des diagnostics du système 135
Utilisation des options de test personnalisées
Lorsque vous sélectionnez l’option Custom Test (Test personnalisé) dans l’écran Main Menu
(Menu principal), la fenêtre Customize (Personnaliser) s’affiche. Elle permet de sélectionner les
périphériques à tester, de choisir des options de test spécifiques et de visualiser les résultats obtenus.
Sélection de périphériques à tester
La partie gauche de la fenêtre Customize (Personnaliser) répertorie les périphériques qui peuvent être
testés. Ceux-ci sont regroupés par type ou par module, selon l’option sélectionnée. Cliquez sur le signe (+)
en regard d’un périphérique ou d’un module pour visualiser ses composants. Cliquez sur (+) sur un
composant pour visualiser les tests disponibles. Si vous cliquez sur un périphérique et non sur ses
composants, tous les composants de ce périphérique sont sélectionnés pour le test.
Sélection d’options de diagnostic
Le champ Diagnostics Options (Options de diagnostic) permet de sélectionner la façon dont le
périphérique sera testé. Vous pouvez définir les options suivantes :
• Non-Interactive Tests Only (Tests non-interactifs uniquement) : cette option permet d’exécuter
uniquement les tests ne nécessitant aucune intervention de l’utilisateur.
• Quick Tests Only (Tests rapides uniquement) : cette option permet d’exécuter uniquement les tests
rapides sur le périphérique sélectionné. Les tests étendus ne seront pas lancés si vous sélectionnez
cette option.
• Show Ending Timestamp (Afficher l’heure de fin) : cette option permet d’ajouter un horodatage
au journal de test.
• Test Iterations (Nombre d’itérations) : cette option sélectionne le nombre de fois où le test est
exécuté.
• Log output file pathname (Emplacement du fichier de sortie) : cette option permet d’indiquer
l’emplacement où le journal de test doit être sauvegardé.
Visualisation des informations et des résultats
Les onglets de la fenêtre Customize (Personnaliser) contiennent des informations sur les tests et les
résultats. Les onglets suivants sont disponibles :
• Results (Résultats) : indique le test exécuté et son résultat.
• Errors (Erreurs) : affiche les erreurs qui se sont produites pendant le test.
• Help (Aide) : affiche des informations sur le périphérique, le composant ou le test sélectionné.
• Configuration : affiche des informations de base concernant la configuration du périphérique
sélectionné.
• Parameters (Paramètres) : le cas échéant, cet onglet affiche les paramètres que vous pouvez définir
pour le test à exécuter.136 Exécution des diagnostics du systèmeCavaliers et connecteurs 137
Cavaliers et connecteurs
Cette section fournit des informations spécifiques sur les cavaliers du système. Elle contient
également des informations générales sur les cavaliers et les commutateurs et décrit les connecteurs
des différentes cartes du système.
Cavaliers de la carte système
La figure 6-1 indique l’emplacement des cavaliers de configuration sur la carte système.
Le tableau 6-1 répertorie les réglages de ces cavaliers.
REMARQUE : pour accéder aux cavaliers, retirez les protecteurs de ventilation. Voir “Retrait des protecteurs
de ventilation”, page 56.138 Cavaliers et connecteurs
Figure 6-1. Cavaliers de la carte système
Tableau 6-1. Réglages des cavaliers de la carte système
Cavalier Réglage Description
1 PSWD_EN (par défaut) La fonction de mot de passe est activée.
La fonction de mot de passe est désactivée.
2 NVRAM_CLR (par défaut) Les paramètres de configuration sont conservés
au démarrage du système.
Les paramètres de configuration sont effacés
au prochain démarrage du système.
REMARQUE : pour obtenir le nom complet d’une abréviation ou d’un sigle utilisé dans ce tableau,
voir le “Glossaire”, page 171.Cavaliers et connecteurs 139
Désactivation d’un mot de passe oublié
Les fonctionnalités logicielles de protection du système comprennent un mot de passe système et un
mot de passe de configuration, qui sont présentés en détail dans la section “Utilisation du programme
de configuration du système”, page 33. Le cavalier de mot de passe active ces fonctions ou les
désactive, et efface le(s) mot(s) de passe utilisé(s).
PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour
accéder aux composants internes. Reportez-vous au document Product Information Guide (Guide d’informations
sur le produit) pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans
l’ordinateur et la protection contre les décharges électrostatiques.
1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant.
2 Ouvrez le système. Voir “Ouverture et fermeture du système”, page 52.
3 Relevez le protecteur de ventilation de la mémoire.
4 Retirez la fiche du cavalier de mot de passe.
Voir la figure 6-1 pour repérer l’emplacement du cavalier de mot de passe sur la carte système.
5 Refermez le système.
6 Reconnectez le système et les périphériques sur le secteur, puis remettez-les sous tension.
Pour que les mots de passe existants soient désactivés (effacés), le système doit démarrer avec la fiche
du cavalier de mot de passe retirée. Toutefois, avant d’attribuer un nouveau mot de passe système
et/ou de configuration, vous devez réinstaller la fiche du cavalier.
REMARQUE : si vous attribuez un nouveau mot de passe système et/ou de configuration alors que la fiche
de cavalier est encore retirée, le système désactive les nouveaux mots de passe à son prochain démarrage.
7 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant.
8 Ouvrez le système. Voir “Ouverture et fermeture du système”, page 52.
9 Installez la fiche sur le cavalier du mot de passe.
10 Abaissez le protecteur de ventilation de la mémoire.
11 Refermez le système.
12 Reconnectez le système et les périphériques sur le secteur, puis remettez-les sous tension.
13 Attribuez un nouveau mot de passe système et/ou de configuration.
Pour attribuer un nouveau mot de passe à l’aide du programme de configuration du système,
voir “Attribution d’un mot de passe système”, page 43.140 Cavaliers et connecteurs
Connecteurs de la carte système
Voir la figure 6-2 et le tableau 6-2 pour obtenir la description et l’emplacement des connecteurs
de la carte système.
Figure 6-2. Connecteurs de la carte système
1
2
3
13
14
4 5 6 7 8 9 10 11 12
15
16
17
18
19
20
21
22
23
24
28 27 26 25
33
32
31
30
29
38
35
36
37
34
40
39Cavaliers et connecteurs 141
Tableau 6-2. Connecteurs de la carte système
Label du connecteur Description
1 PSWD_EN Cavalier de mot de passe
2 NVRAM_CLR Cavalier de configuration
3 SLOT 7 Connecteur de carte d’extension PCIe x4
4 SLOT 6 Connecteur de carte d’extension PCIe x4
5 SLOT 5 Connecteur de carte d’extension PCIe x4
6 SLOT 4 Connecteur de carte d’extension PCIe x8
7 SLOT 3 Connecteur de carte d’extension PCIe x8
8 SLOT 2 Connecteur de carte d’extension PCIe x4
9 SLOT 1 Connecteur de carte d’extension PCIe x4
10 INTERNAL_STORAGE Connecteur de carte contrôleur SAS
11 RAC_CONN Connecteur de carte d’accès à distance (RAC, en option)
12 RAC_CONN1 Connecteur du câble RAC (40 broches)
13 RAC_CONN2 Connecteur du câble RAC (50 broches)
14 CPU 1 Connecteur du processeur 1
15 DIMM 1 Connecteur de barrette de mémoire (logement 1)
16 DIMM 2 Connecteur de barrette de mémoire (logement 2)
17 DIMM 3 Connecteur de barrette de mémoire (logement 3)
18 DIMM 4 Connecteur de barrette de mémoire (logement 4)
19 DIMM 9 Connecteur de barrette de mémoire (logement 9)
20 DIMM 10 Connecteur de barrette de mémoire (logement 10)
21 DIMM 11 Connecteur de barrette de mémoire (logement 11)
22 DIMM 12 Connecteur de barrette de mémoire (logement 12)
23 12 V Connecteur d’alimentation (12 V)
24 PWR_3.3Stby_Cntrl Connecteur de signal pour la carte de distribution de l’alimentation
25 CPU 3 Connecteur du processeur 3
26 VRM 3 Connecteur de module VRM 3
27 VRM 4 Connecteur de module VRM 4
28 CPU 4 Connecteur du processeur 4
REMARQUE : pour obtenir le nom complet d’une abréviation ou d’un sigle utilisé dans ce tableau,
voir le “Glossaire”, page 171.142 Cavaliers et connecteurs
29 INTRUSION Connecteur du commutateur d’intrusion
30 DIMM 13 Connecteur de barrette de mémoire (logement 13)
31 DIMM 14 Connecteur de barrette de mémoire (logement 14)
32 DIMM 15 Connecteur de barrette de mémoire (logement 15)
33 DIMM 16 Connecteur de barrette de mémoire (logement 16)
34 CPU 2 Connecteur du processeur 2
35 DIMM 5 Connecteur de barrette de mémoire (logement 5)
36 DIMM 6 Connecteur de barrette de mémoire (logement 6)
37 DIMM 7 Connecteur de barrette de mémoire (logement 7)
38 DIMM 8 Connecteur de barrette de mémoire (logement 8)
39 BATTERY Connecteur pour la pile bouton de 3 V
40 CONTROL_PANEL Connecteur du câble du panneau de commande
Tableau 6-2. Connecteurs de la carte système (suite)
Label du connecteur Description
REMARQUE : pour obtenir le nom complet d’une abréviation ou d’un sigle utilisé dans ce tableau,
voir le “Glossaire”, page 171.Cavaliers et connecteurs 143
Connecteurs de la carte de fond de panier SAS
La figure 6-3 montre l’emplacement des connecteurs sur la carte de fond de panier.
Figure 6-3. Connecteurs de la carte de fond de panier SAS
3
4
2
1
5
6
1 SAS A 2 Interface de données 3 Alimentation
4 Panneau de commande
(situé à l’avant de la carte)
5 SAS B 6 Encoche d’alignement
pour installation144 Cavaliers et connecteursObtention d’aide 145
Obtention d’aide
Assistance technique
Si vous avez besoin d’assistance pour un incident technique, effectuez les opérations suivantes :
1 Suivez les procédures de la section “Dépannage du système”, page 109.
2 Exécutez les diagnostics du système et notez toutes les informations obtenues.
3 Faites une copie de la Liste de vérification des diagnostics et complétez-la.
4 Pour vous aider lors des procédures d’installation et de dépannage, utilisez toute la gamme
de services en ligne proposés par Dell sur le site support.dell.com.
Pour plus d’informations, voir “Services en ligne”, page 146.
5 Si les étapes précédentes n’ont pas résolu l’incident, appelez Dell pour obtenir une assistance
technique.
REMARQUE : passez votre appel à partir d’un téléphone qui se trouve près du système pour que le support
technique puisse vous guider dans l’accomplissement des opérations nécessaires.
REMARQUE : il se peut que le système de code de service express de Dell ne soit pas disponible dans
votre pays.
Lorsque le système téléphonique automatisé de Dell vous le demande, entrez votre code de service
express pour acheminer directement votre appel vers le personnel de support compétent. Si vous ne
disposez pas d’un code de service express, ouvrez le dossier Dell Accessories (Accessoires Dell), doublecliquez sur l’icône Express Service Code (Code de service express) et suivez les indications.
Pour obtenir des instructions sur l’utilisation du service de support technique, voir les sections “Service
de support technique”, page 147 et “Avant d’appeler”, page 148.
REMARQUE : certains des services suivants ne sont disponibles que dans certains pays. Appelez votre
représentant Dell local pour obtenir des informations sur leur disponibilité.146 Obtention d’aide
Services en ligne
Vous pouvez accéder au site Dell Support à l’adresse support.dell.com. Sélectionnez votre région sur la page
WELCOME TO DELL SUPPORT (Bienvenue dans le service de support de Dell) et donnez les détails
requis pour accéder aux outils d’aide et aux informations.
Vous pouvez contacter Dell en utilisant les adresses ci-dessous :
• World Wide Web
www.dell.com/
www.dell.com/ap/ (région Asie/Pacifique uniquement)
www.dell.com/jp (Japon uniquement)
www.euro.dell.com (Europe uniquement)
www.dell.com/la (pays d’Amérique latine)
www.dell.ca (Canada uniquement)
• Protocole de transfert de fichiers (FTP) anonyme
ftp.dell.com/
Connectez-vous en tant que user:anonymous (utilisateur : anonyme), et indiquez votre
adresse e-mail comme mot de passe.
• Service de support électronique
support@us.dell.com
apsupport@dell.com (région Asie/Pacifique uniquement)
support.jp.dell.com (Japon uniquement)
support.euro.dell.com (Europe uniquement)
• Service de devis électronique
apmarketing@dell.com (région Asie/Pacifique uniquement)
sales_canada@dell.com (Canada uniquement)Obtention d’aide 147
Service AutoTech
Le service de support technique automatisé de Dell, “AutoTech”, fournit des réponses préenregistrées
aux questions les plus fréquentes des clients de Dell concernant leurs systèmes informatiques portables
et de bureau.
Quand vous appelez AutoTech, utilisez votre téléphone à touches pour choisir les sujets qui correspondent
à vos questions.
Le service AutoTech est disponible 24 heures sur 24, 7 jours sur 7. Vous pouvez aussi accéder à ce service
via le service de support technique. Consultez les informations de contact de votre région.
Service d’état des commandes automatisé
Pour vérifier l’état de vos commandes de produits Dell™, vous pouvez visiter le site Web support.dell.com
ou appeler le service d’état des commandes automatisé. Un message préenregistré vous invite à entrer les
informations concernant votre commande afin de la localiser et de vous informer. Consultez les
informations de contact de votre région.
Service de support technique
Le service de support technique Dell est disponible 24 heures sur 24, 7 jours sur 7, pour répondre à vos
questions concernant le matériel Dell. Notre équipe de support technique utilise des diagnostics assistés
par ordinateur pour répondre plus rapidement et plus efficacement à vos questions.
Pour contacter le service de support technique de Dell, voir “Avant d’appeler”, page 148 puis reportez-vous
aux informations de contact de votre région.
Service Dell de formation et de certification pour les entreprises
Des formations et certifications Dell Enterprise sont disponibles. Pour plus d’informations, consultez le site
www.dell.com/training. Ce service n’est disponible que dans certains pays.
Incidents liés à votre commande
Si vous avez un problème avec votre commande (pièces manquantes ou inadaptées, problème
de facturation), contactez le service clientèle de Dell. Ayez votre facture ou votre bordereau d’emballage
à portée de main lorsque vous appelez. Consultez les informations de contact de votre région.
Informations produit
Si vous avez besoin d’informations à propos d’autres produits disponibles chez Dell, ou si vous désirez
passer une commande, consultez le site Web de Dell à l’adresse www.dell.com. Pour trouver le numéro
de téléphone à appeler pour parler à un spécialiste des ventes, consultez les informations de contact
de votre région.148 Obtention d’aide
Renvoi d’articles pour une réparation sous garantie
ou un remboursement sous forme d’avoir
Préparez comme indiqué ci-après tous les articles à renvoyer, que ce soit pour un renvoi ou un
remboursement sous forme d’avoir :
1 Appelez Dell pour obtenir un numéro d’autorisation de renvoi du matériel et écrivez-le lisiblement
et bien en vue sur l’extérieur de la boîte.
Pour trouver le numéro de téléphone à appeler, consultez les informations de contact de votre région.
2 Joignez une copie de votre facture et une lettre décrivant la raison du renvoi.
3 Joignez une copie de la liste de vérification des diagnostics indiquant les tests que vous avez effectués
et les messages d’erreur générés par les Diagnostics du système.
4 Joignez tous les accessoires associés aux éléments renvoyés (câbles d’alimentation, médias [disquettes
et CD], guides) s’il s’agit d’une demande de remboursement sous forme d’avoir.
5 Renvoyez l’équipement dans son emballage d’origine (ou un équivalent).
Les frais d’expédition sont à votre charge. Vous devez également assurer les produits retournés
et assumer les risques de pertes en cours d’expédition. Les envois en port dû ne sont pas acceptés.
Si l’un des éléments décrits ci-dessus manque à l’envoi, ce dernier sera refusé à l’arrivée et vous sera renvoyé.
Avant d’appeler
REMARQUE : ayez votre code de service express à portée de main quand vous appelez. Le code permet au système
d’assistance téléphonique automatisé de Dell de diriger votre appel plus efficacement.
N’oubliez pas de remplir la Liste de vérification des diagnostics. Si possible, allumez le système avant
d’appeler Dell pour obtenir une assistance technique et utilisez un téléphone qui se trouve à côté ou
à proximité de l’ordinateur. Il vous sera demandé de taper certaines commandes et de relayer certaines
informations détaillées pendant les opérations ou d’essayer d’autres opérations de dépannage qui ne sont
possibles que sur le système informatique même. N’oubliez pas de vous munir de la documentation de
l’ordinateur.
PRÉCAUTION : avant d’intervenir sur les composants de l’ordinateur, consultez les consignes de sécurité qui
se trouvent dans le document Product Information Guide (Guide d’informations sur le produit).Obtention d’aide 149
Liste de vérification des diagnostics
Nom :
Date :
Adresse :
Numéro de téléphone :
Numéro de service (code barre à l’arrière de l’ordinateur) :
Code de service express :
Numéro d’autorisation de renvoi de matériel (fourni par un technicien de support de Dell) :
Système d’exploitation et version :
Périphériques :
Cartes d’extension :
Êtes-vous connecté à un réseau ? Oui Non
Réseau, version et carte de réseau :
Programmes et versions :
Consultez la documentation du système d’exploitation pour déterminer le contenu des
fichiers de démarrage du système. Si possible, imprimez chaque fichier. Sinon, notez leur
contenu avant d’appeler Dell.
Description de l’incident et procédures de dépannage effectuées :150 Obtention d’aide
Contacter Dell
Vous pouvez contacter Dell à partir des sites Web suivants :
• www.dell.com
• support.dell.com (support)
Vous trouverez les adresses Web spécifiques à votre pays dans la section correspondant du tableau
ci-dessous.
REMARQUE : les numéros d’appel gratuits ne peuvent être utilisés que dans le pays pour lequel ils sont
mentionnés.
REMARQUE : dans certains pays, un support technique spécifique a été mis en place pour les ordinateurs Dell™
XPS™. Dans ce cas, un numéro de téléphone spécifique est indiqué pour les pays participants. Si vous ne trouvez
aucun numéro de téléphone spécifique pour les systèmes XPS, vous pouvez contacter le service technique Dell.
Votre appel sera réacheminé vers le service compétent.
Pour contacter Dell, utilisez les adresses électroniques, les numéros de téléphone et les codes indiqués
dans le tableau suivant. Si vous avez besoin d’assistance pour connaître les indicatifs à utiliser,
contactez un standardiste local ou international.
REMARQUE : les coordonnées indiquées étaient correctes au moment de l’impression de ce document,
mais peuvent avoir été modifiées.
Pays (ville)
Indicatif d’accès international -
Indicatif du pays
Indicatif de la ville
Nom du service ou zone de service
Site web et adresse e-mail
Indicatifs de zone,
numéros locaux et
numéros d’appel gratuit
Afrique du Sud (Johannesburg)
Indicatif d’accès
international : 09/091
Indicatif du pays : 27
Indicatif de la ville : 11
Site Web : support.euro.dell.com
E-mail : dell_za_support@dell.com
File d’appel Gold 011 709 7713
Support technique 011 709 7710
Service clientèle 011 709 7707
Ventes 011 709 7700
Fax 011 706 0495
Standard 011 709 7700Obtention d’aide 151
Allemagne (Francfort)
Indicatif d’accès
international : 00
Indicatif du pays : 49
Indicatif de la ville : 69
Site Web : support.euro.dell.com
E-mail : tech_support_central_europe@dell.com
Support technique XPS 069 9792 7222
Support technique pour les autres systèmes Dell 069 9792-7200
Service clientèle auprès du grand public
et des PME/PMI
0180-5-224400
Service clientèle pour le segment global 069 9792-7320
Service clientèle pour les comptes privilégiés 069 9792-7320
Service clientèle pour les grandes entreprises 069 9792-7320
Service clientèle pour les comptes publics 069 9792-7320
Standard 069 9792-7000
Amérique Latine Support technique clientèle (Austin, Texas, USA) 512 728-4093
Service clientèle (Austin, Texas, USA) 512 728-3619
Fax (support technique et service clientèle)
(Austin, Texas, USA)
512 728-3883
Ventes (Austin, Texas, États-Unis) 512 728-4397
Ventes par fax (Austin, Texas, USA) 512 728-4600
ou 512 728-3772
Anguilla Site Web : www.dell.com.ai
E-mail : la-techsupport@dell.com
Support général numéro vert : 800-335-0031
Antigua et Barbuda Site Web : www.dell.com.ag
E-mail : la-techsupport@dell.com
Support général 1-800-805-5924
Antilles néerlandaises E-mail : la-techsupport@dell.com
Support général 001-800-882-1519
Aomen Support technique (Dell™ Dimension™,
Dell Inspiron™, Dell OptiPlex™, Dell Latitude™,
et Dell Precision™)
0800-105
Support technique (serveurs et stockage) 0800-105
Pays (ville)
Indicatif d’accès international -
Indicatif du pays
Indicatif de la ville
Nom du service ou zone de service
Site web et adresse e-mail
Indicatifs de zone,
numéros locaux et
numéros d’appel gratuit152 Obtention d’aide
Argentine (Buenos Aires)
Indicatif d’accès
international : 00
Indicatif du pays : 54
Indicatif de la ville : 11
Site Web : www.dell.com.ar
E-mail : la-techsupport@dell.com
E-mail (ordinateurs de bureau et portables) :
la-techsupport@dell.com
E-mail (serveurs et produits de stockage EMC
®
) :
la_enterprise@dell.com
Service clientèle numéro vert : 0-800-444-0730
Support technique numéro vert : 0-800-444-0733
Services de support technique numéro vert : 0-800-444-0724
Ventes 0-810-444-3355
Aruba Site Web : www.dell.com.aw
E-mail : la-techsupport@dell.com
Support général numéro vert : 800-1578
Australie (Sydney)
Indicatif d’accès
international : 0011
Indicatif du pays : 61
Indicatif de la ville : 2
Site Web : support.ap.dell.com
E-mail : support.ap.dell.com/contactus
Support technique (XPS) numéro vert : 1300 790 877
Support général 13DELL-133355
Autriche (Vienne)
Indicatif d’accès
international : 900
Indicatif du pays : 43
Indicatif de la ville : 1
Site Web : support.euro.dell.com
E-mail : tech_support_central_europe@dell.com
Ventes au grand public et aux PME/PMI 0820 240 530 00
Fax pour le grand public et aux PME/PMI 0820 240 530 49
Service clientèle auprès du grand public
et des PME/PMI
0820 240 530 14
Service clientèle auprès des comptes privilégiés/des
grandes entreprises
0820 240 530 16
Support XPS 0820 240 530 81
Support technique pour les autres systèmes Dell
(grand public et PME/PMI)
0820 240 530 17
Support auprès des comptes privilégiés/des
grandes entreprises
0820 240 530 17
Standard 0820 240 530 00
Pays (ville)
Indicatif d’accès international -
Indicatif du pays
Indicatif de la ville
Nom du service ou zone de service
Site web et adresse e-mail
Indicatifs de zone,
numéros locaux et
numéros d’appel gratuitObtention d’aide 153
Bahamas Site Web : www.dell.com.bs
E-mail : la-techsupport@dell.com
Support général numéro vert : 1-866-874-3038
Belgique (Bruxelles)
Indicatif d’accès
international : 00
Indicatif du pays : 32
Indicatif de la ville : 2
Site Web : support.euro.dell.com
Support technique XPS 02 481 92 96
Support technique pour les autres systèmes Dell 02 481 92 88
Support technique par fax 02 481 92 95
Service clientèle 02 713 15 65
Ventes aux grandes entreprises 02 481 91 00
Fax 02 481 92 99
Standard 02 481 91 00
Bermudes Site Web : www.dell.com/bm
E-mail : la-techsupport@dell.com
Support général 1-877-890-0751
Bolivie Site Web : www.dell.com/bo
E-mail : la-techsupport@dell.com
Support général numéro vert : 800-10-0238
Brésil
Indicatif d’accès
international : 00
Indicatif du pays : 55
Indicatif de la ville : 51
Site Web : www.dell.com/br
E-mail : BR-TechSupport@dell.com
Service clientèle et support technique 0800 90 3355
Support technique par fax 51 2104 5470
Service clientèle par fax 51 2104 5480
Ventes 0800 722 3498
Brunei
Indicatif du pays : 673
Support technique (Penang, Malaisie) 604 633 4966
Service clientèle (Penang, Malaisie) 604 633 4888
Ventes aux particuliers (Penang, Malaisie) 604 633 4955
Pays (ville)
Indicatif d’accès international -
Indicatif du pays
Indicatif de la ville
Nom du service ou zone de service
Site web et adresse e-mail
Indicatifs de zone,
numéros locaux et
numéros d’appel gratuit154 Obtention d’aide
Canada (North York, Ontario)
Indicatif d’accès
international : 011
État des commandes en ligne : www.dell.ca/ostatus
Site Web : support.ca.dell.com
AutoTech (support technique automatisé
Matériel et Garantie)
numéro vert : 1-800-247-9362
Service clientèle (activités à domicile
et bureau domestique)
numéro vert : 1-800-847-4096
Service clientèle (petites, moyennes
et grandes entreprises, administrations)
numéro vert : 1-800-387-5757
Service clientèle (imprimantes, projecteurs,
téléviseurs, ordinateurs de poche, lecteurs
audio numériques et périphériques sans fil)
numéro vert : 1-800-847-4096
Support de garantie du matériel -
par téléphone (XPS)
numéro vert : 1-866-398-8977
Support de garantie du matériel – par téléphone
(activités à domicile et bureau domestique)
numéro vert : 1-800-847-4096
Support de garantie du matériel – par téléphone
(petites, moyennes et grandes entreprises,
administrations)
numéro vert : 1-800-387-5757
Support de garantie du matériel – par téléphone
(imprimantes, projecteurs, téléviseurs, ordinateurs
de poche, lecteurs audio numériques et
périphériques sans fil)
1-877-335-5767
Ventes (Petites entreprises et activités
professionnelles à domicile)
numéro vert : 1-800-387-5752
Ventes (moyennes et grandes entreprises,
pouvoirs publics)
numéro vert : 1-800-387-5755
Ventes de pièces détachées et de services étendus 1 866 440 3355
Chili (Santiago)
Indicatif du pays : 56
Indicatif de la ville : 2
Site Web : www.dell.com/cl
E-mail : la-techsupport@dell.com
Ventes et support clientèle numéro vert : 1230-020-4823
Pays (ville)
Indicatif d’accès international -
Indicatif du pays
Indicatif de la ville
Nom du service ou zone de service
Site web et adresse e-mail
Indicatifs de zone,
numéros locaux et
numéros d’appel gratuitObtention d’aide 155
Chine (Xiamen)
Indicatif du pays : 86
Indicatif de la ville : 592
Site Web de support technique :
support.dell.com.cn
E-mail du support technique :
support.dell.com.cn/email
E-mail du service clientèle : customer_cn@dell.com
Support technique par fax 592 818 1350
Support technique (XPS) numéro vert : 800 858 0540
Support technique (Dimension et Inspiron) numéro vert : 800 858 2969
Support technique (OptiPlex, Latitude et Dell
Precision)
numéro vert : 800 858 0950
Support technique (serveurs et stockage) numéro vert : 800 858 0960
Support technique (projecteurs, PDA,
commutateurs, routeurs, etc.)
numéro vert : 800 858 2920
Support technique (imprimantes) numéro vert : 800 858 2311
Service clientèle numéro vert : 800 858 2060
Service clientèle par fax 592 818 1308
Grand public et PME/PMI numéro vert : 800 858 2222
Division des comptes privilégiés numéro vert : 800 858 2557
Comptes de grandes entreprises - GCP numéro vert : 800 858 2055
Comptes clés des grandes entreprises numéro vert : 800 858 2628
Comptes de grandes entreprises - Nord numéro vert : 800 858 2999
Comptes grandes entreprises - administrations
et éducation Nord
numéro vert : 800 858 2955
Comptes de grandes entreprises - Est numéro vert : 800 858 2020
Comptes grandes entreprises - administrations
et éducation Est
numéro vert : 800 858 2669
Comptes grandes entreprises - Queue Team numéro vert : 800 858 2572
Comptes de grandes entreprises - Sud numéro vert : 800 858 2355
Comptes grandes entreprises - Ouest numéro vert : 800 858 2811
Comptes grandes entreprises - Pièces détachées numéro vert : 800 858 2621
Pays (ville)
Indicatif d’accès international -
Indicatif du pays
Indicatif de la ville
Nom du service ou zone de service
Site web et adresse e-mail
Indicatifs de zone,
numéros locaux et
numéros d’appel gratuit156 Obtention d’aide
Colombie Site Web : www.dell.com/cl
E-mail : la-techsupport@dell.com
Support général 01-800-915-4755
Corée (Séoul)
Indicatif d’accès
international : 001
Indicatif du pays : 82
Indicatif de la ville : 2
E-mail : krsupport@dell.com
Support numéro vert : 080-200-3800
Support technique (XPS) numéro vert : 080-999-0283
Support (Dimension, PDA, Electronics and
Accessories)
numéro vert : 080-200-3801
Ventes numéro vert : 080-200-3600
Fax 2194-6202
Standard 2194-6000
Costa Rica Site Web : www.dell.com/cr
E-mail : la-techsupport@dell.com
Support général 0800-012-0231
Danemark (Copenhague)
Indicatif d’accès
international : 00
Indicatif du pays : 45
Site Web : support.euro.dell.com
Support technique XPS 7010 0074
Support technique pour les autres systèmes Dell 7023 0182
Service clientèle (relationnel) 7023 0184
Service clientèle auprès du grand public
et des PME/PMI
3287 5505
Standard (relationnel) 3287 1200
Fax du standard (Relations clientèle) 3287 1201
Standard (grand public et PME/PMI) 3287 5000
Fax du standard (grand public et PME/PMI) 3287 5001
Dominique Site Web : www.dell.com/dm
E-mail : la-techsupport@dell.com
Support général numéro vert : 1-866-278-6821
Pays (ville)
Indicatif d’accès international -
Indicatif du pays
Indicatif de la ville
Nom du service ou zone de service
Site web et adresse e-mail
Indicatifs de zone,
numéros locaux et
numéros d’appel gratuitObtention d’aide 157
Équateur Site Web : www.dell.com/ec
E-mail : la-techsupport@dell.com
Support général (appel à partir de Quito) numéro vert : 999-119-877-
655-3355
Support général (appel à partir de Guayaquil) numéro vert : 1800-999-119-
877-655-3355
Espagne (Madrid)
Indicatif d’accès
international : 00
Indicatif du pays : 34
Indicatif de la ville : 91
Site Web : support.euro.dell.com
Grand public et PME/PMI
Support technique 902 100 130
Service clientèle 902 118 540
Ventes 902 118 541
Standard 902 118 541
Fax 902 118 539
Grandes entreprises
Support technique 902 100 130
Service clientèle 902 115 236
Standard 91 722 92 00
Fax 91 722 95 83
États-Unis (Austin, Texas)
Indicatif d’accès
international : 011
Indicatif du pays : 1
Service d’état des commandes automatisé numéro vert : 1-800-433-9014
AutoTech (ordinateurs portables et de bureau) numéro vert : 1-800-247-9362
Support Garantie et matériel (téléviseurs,
imprimantes et projecteurs Dell) pour les
clients Relationship
numéro vert : 1-877-459-7298
Support aux consommateurs pour XPS - Amérique numéro vert : 1-800-232-8544
Support pour les particuliers (activités à domicile
et bureau domestique) pour tous les autres
produits Dell
numéro vert : 1-800-624-9896
Service clientèle numéro vert : 1-800-624-9897
Clients du Programme d’achat employé numéro vert : 1-800-695-8133
Pays (ville)
Indicatif d’accès international -
Indicatif du pays
Indicatif de la ville
Nom du service ou zone de service
Site web et adresse e-mail
Indicatifs de zone,
numéros locaux et
numéros d’appel gratuit158 Obtention d’aide
États-Unis (Austin, Texas)
(suite)
Site Web des services financiers :
www.dellfinancialservices.com
Services financiers (leasing/prêts) numéro vert : 1-877-577-3355
Services financiers
(Comptes privilégiés Dell [DPA])
numéro vert : 1-800-283-2210
Entreprises
Service clientèle et support technique numéro vert : 1-800-456-3355
Clients du Programme d’achat employé numéro vert : 1-800-695-8133
Support imprimantes, projecteurs,
PDA et lecteurs MP3
numéro vert : 1-877-459-7298
Service public (administrations, éducation, santé)
Service clientèle et support technique numéro vert : 1-800-456-3355
Clients du Programme d’achat employé numéro vert : 1-800-695-8133
Ventes Dell numéro vert : 1-800-289-3355
ou numéro vert : 1-800-
879-3355
Points de vente Dell (ordinateurs Dell recyclés) numéro vert : 1-888-798-7561
Ventes de logiciels et de périphériques numéro vert : 1-800-671-3355
Ventes de pièces détachées numéro vert : 1-800-357-3355
Service étendu et ventes sous garantie numéro vert : 1-800-247-4618
Fax numéro vert : 1-800-727-8320
Services Dell pour les sourds, les malentendants
ou les personnes ayant des difficultés d’élocution
numéro vert : 1-877-DELLTTY
(1-877-335-5889)
Finlande (Helsinki)
Indicatif d’accès
international : 990
Indicatif du pays : 358
Indicatif de la ville : 9
Site Web : support.euro.dell.com
E-mail : fi_support@dell.com
Support technique 0207 533 555
Service clientèle 0207 533 538
Standard 0207 533 533
Ventes, moins de 500 employés 0207 533 540
Fax 0207 533 530
Ventes, plus de 500 employés 0207 533 533
Fax 0207 533 530
Pays (ville)
Indicatif d’accès international -
Indicatif du pays
Indicatif de la ville
Nom du service ou zone de service
Site web et adresse e-mail
Indicatifs de zone,
numéros locaux et
numéros d’appel gratuitObtention d’aide 159
France (Paris, Montpellier)
Indicatif d’accès
international : 00
Indicatif du pays : 33
Indicatif de la ville : (1) (4)
Site Web : support.euro.dell.com
Grand public et PME/PMI
Support technique XPS 0825 387 129
Support technique pour les autres systèmes Dell 0825 387 270
Service clientèle 0825 823 833
Standard 0825 004 700
Standard (appels extérieurs à la France) 04 99 75 40 00
Ventes 0825 004 700
Fax 0825 004 701
Télécopieur (appels extérieurs à la France) 04 99 75 40 01
Grandes entreprises
Support technique 0825 004 719
Service clientèle 0825 338 339
Standard 01 55 94 71 00
Ventes 01 55 94 71 00
Fax 01 55 94 71 01
Grèce
Indicatif d’accès
international : 00
Indicatif du pays : 30
Site Web : support.euro.dell.com
Support technique 00800-44 14 95 18
Support technique Gold 00800-44 14 00 83
Standard 2108129810
Standard – Service Gold 2108129811
Ventes 2108129800
Fax 2108129812
Grenade E-mail : la-techsupport@dell.com
Support général numéro vert : 1-866-540-3355
Guatemala E-mail : la-techsupport@dell.com
Support général 1-800-999-0136
Guyane E-mail : la-techsupport@dell.com
Support général numéro vert : 1-877-270-4609
Pays (ville)
Indicatif d’accès international -
Indicatif du pays
Indicatif de la ville
Nom du service ou zone de service
Site web et adresse e-mail
Indicatifs de zone,
numéros locaux et
numéros d’appel gratuit160 Obtention d’aide
Hong Kong
Indicatif d’accès
international : 001
Indicatif du pays : 852
Site Web : support.ap.dell.com
E-mail du support technique :
support.dell.com.cn/email
Support technique (XPS) 00852-3416 6923
Support technique (Dimension et Inspiron) 00852-2969 3188
Support technique (OptiPlex,
Latitude et Dell Precision)
00852-2969 3191
Support technique (serveurs et stockage) 00852-2969 3196
Support technique (projecteurs, PDA,
commutateurs, routeurs, etc.)
00852-3416 0906
Service clientèle 00852-3416 0910
Comptes grandes entreprises 00852-3416 0907
Programmes comptes internationaux 00852-3416 0908
Division moyennes entreprises 00852-3416 0912
Division petites entreprises et activités
professionnelles à domicile
00852-2969 3105
Îles Caïmans E-mail : la-techsupport@dell.com
Support général 1-877-262-5415
Îles Turks et Caicos Site Web : www.dell.com/tc
E-mail : la-techsupport@dell.com
Support général numéro vert : 1-877-441-4735
Îles vierges (États-Unis) E-mail : la-techsupport@dell.com
Support général numéro vert : 1-877-702-4360
Îles vierges britanniques Support général numéro vert : 1-866-278-6820
Pays (ville)
Indicatif d’accès international -
Indicatif du pays
Indicatif de la ville
Nom du service ou zone de service
Site web et adresse e-mail
Indicatifs de zone,
numéros locaux et
numéros d’appel gratuitObtention d’aide 161
Inde Site Web : support.ap.dell.com
E-mail : india_support_desktop@dell.com
india_support_notebook@dell.com
india_support_Server@dell.com
Support technique (ordinateurs XPS) 0802 506 8033
ou numéro vert : 1800 425 2066
Support technique (ordinateurs portables,
ordinateurs de bureau, serveurs et stockage)
1600338045
et 1600448046
Ventes (comptes grandes entreprises) 1600 33 8044
Ventes (grand public et PME/PMI) 1600 33 8046
Irlande (Cherrywood)
Indicatif d’accès
international : 00
Indicatif du pays : 353
Indicatif de la ville : 1
Site Web : support.euro.dell.com
E-mail : dell_direct_support@dell.com
Ventes
Ventes en Irlande 01 204 4444
Dell Outlet 1850 200 778
HelpDesk des commandes en ligne : 1850 200 778
Service clientèle
Service clientèle auprès des particuliers 01 204 4014
Service clientèle auprès des PME/PMI 01 204 4014
Service clientèle auprès des grandes entreprises 1850 200 982
Support technique
Support technique pour les systèmes XPS
uniquement
1850 200 722
Support technique pour les autres systèmes Dell 1850 543 543
Général
Ventes/Télécopieur 01 204 0103
Standard 01 204 4444
Service clientèle au Royaume-Uni (au RU
uniquement)
0870 906 0010
Service clientèle entreprises (depuis le RoyaumeUni uniquement)
0870 907 4499
Ventes au Royaume-Uni (au RU uniquement) 0870 907 4000
Pays (ville)
Indicatif d’accès international -
Indicatif du pays
Indicatif de la ville
Nom du service ou zone de service
Site web et adresse e-mail
Indicatifs de zone,
numéros locaux et
numéros d’appel gratuit162 Obtention d’aide
Italie (Milan)
Indicatif d’accès
international : 00
Indicatif du pays : 39
Indicatif de la ville : 02
Site Web : support.euro.dell.com
Grand public et PME/PMI
Support technique 02 577 826 90
Service clientèle 02 696 821 14
Fax 02 696 821 13
Standard 02 696 821 12
Grandes entreprises
Support technique 02 577 826 90
Service clientèle 02 577 825 55
Fax 02 575 035 30
Standard 02 577 821
Jamaïque E-mail : la-techsupport@dell.com
Support technique général (appel à partir
de la Jamaïque uniquement)
1-800-440-9205
Japon (Kawasaki)
Indicatif d’accès
international : 001
Indicatif du pays : 81
Indicatif de la ville : 44
Site Web : support.jp.dell.com
Support technique (XPS) numéro vert : 0120-937-786
Support technique à l’extérieur du Japon (XPS) 044-520-1235
Service clientèle XPS (si des éléments commandés
sont manquants ou ont été endommagés en cours
d’expédition)
044-556-4240
Support technique (Dimension et Inspiron) numéro vert : 0120-198-226
Support technique à l’extérieur du Japon
(Dimension et Inspiron)
81-44-520-1435
Support technique (Dell Precision,
OptiPlex et Latitude)
numéro vert : 0120-198-433
Support technique à l’extérieur du Japon
(Dell Precision, OptiPlex et Latitude)
81-44-556-3894
Support technique (Dell PowerApp™,
Dell PowerEdge™, Dell PowerConnect™
et Dell PowerVault™)
numéro vert : 0120-198-498
Pays (ville)
Indicatif d’accès international -
Indicatif du pays
Indicatif de la ville
Nom du service ou zone de service
Site web et adresse e-mail
Indicatifs de zone,
numéros locaux et
numéros d’appel gratuitObtention d’aide 163
Japon (Kawasaki) (suite) Support technique à l’extérieur du Japon
(PowerApp, PowerEdge, PowerConnect
et PowerVault)
81-44-556-4162
Support technique (projecteurs, PDA,
imprimantes, routeurs)
numéro vert : 0120-981-690
Support technique à l’extérieur du Japon
(projecteurs, PDA, imprimantes, routeurs)
81-44-556-3468
Service Faxbox 044-556-3490
Service d’état des commandes automatisé
24 heures sur 24
044-556-3801
Service clientèle 044-556-4240
Division Ventes aux entreprises
(jusqu’à 400 salariés)
044-556-1465
Division Ventes aux comptes privilégiés
(plus de 400 employés)
044-556-3433
Ventes secteur public (agences gouvernementales,
établissements d’enseignement et institutions
médicales)
044-556-5963
Global Segment Japon 044-556-3469
Particulier 044-556-1760
Standard 044-556-4300
La Barbade Site Web : www.dell.com/bb
E-mail : la-techsupport@dell.com
Support général 1-800-534-3142
Luxembourg
Indicatif d’accès
international : 00
Indicatif du pays : 352
Site Web : support.euro.dell.com
Support 342 08 08 075
Ventes au grand public et aux PME/PMI +32 (0)2 713 15 96
Ventes aux grandes entreprises 26 25 77 81
Service clientèle +32 (0)2 481 91 19
Fax 26 25 77 82
Macao
Indicatif du pays : 853
Support technique numéro vert : 0800 105
Service client (Xiamen, Chine) 34 160 910
Ventes aux particuliers (Xiamen, China) 29 693 115
Pays (ville)
Indicatif d’accès international -
Indicatif du pays
Indicatif de la ville
Nom du service ou zone de service
Site web et adresse e-mail
Indicatifs de zone,
numéros locaux et
numéros d’appel gratuit164 Obtention d’aide
Malaisie (Penang)
Indicatif d’accès
international : 00
Indicatif du pays : 60
Indicatif de la ville : 4
Site Web : support.ap.dell.com
Support technique (XPS) numéro vert : 1800 885 784
Support technique (Dell Precision,
OptiPlex et Latitude)
numéro vert : 1 800 880 193
Support technique (Dimension, Inspiron,
Electronics, Accessories)
numéro vert : 1 800 881 306
Support technique (PowerApp, PowerEdge,
PowerConnect et PowerVault)
numéro vert : 1800 881 386
Service clientèle numéro vert : 1800 881 306
(option 6)
Ventes aux particuliers numéro vert : 1 800 888 202
Ventes aux grandes entreprises numéro vert : 1 800 888 213
Mexique
Indicatif d’accès
international : 00
Indicatif du pays : 52
E-mail : la-techsupport@dell.com
Support technique clientèle 001-877-384-8979
ou 001-877-269-3383
Ventes 50-81-8800
ou 01-800-888-3355
Service clientèle 001-877-384-8979
ou 001-877-269-3383
Principal 50-81-8800
ou 01-800-888-3355
Montserrat E-mail : la-techsupport@dell.com
Support général numéro vert : 1-866-278-6822
Nicaragua E-mail : la-techsupport@dell.com
Support général 001-800-220-1377
Pays (ville)
Indicatif d’accès international -
Indicatif du pays
Indicatif de la ville
Nom du service ou zone de service
Site web et adresse e-mail
Indicatifs de zone,
numéros locaux et
numéros d’appel gratuitObtention d’aide 165
Norvège (Lysaker)
Indicatif d’accès
international : 00
Indicatif du pays : 47
Site Web : support.euro.dell.com
Support technique XPS 815 35 043
Support technique pour les autres produits Dell 671 16882
Suivi clientèle 671 17575
Service clientèle auprès du grand public
et des PME/PMI
23162298
Standard 671 16800
Standard par fax 671 16865
Nouvelle-Zélande
Indicatif d’accès
international : 00
Indicatif du pays : 64
Site Web : support.ap.dell.com
E-mail : support.ap.dell.com/contactus
Support technique (XPS) numéro vert : 0800 335 540
Support général 0800 441 567
Panama E-mail : la-techsupport@dell.com
Support général 011-800-507-1264
Pays du Pacifique
et du Sud-Est de l’Asie
Support technique, service clientèle et ventes
(Penang, Malaisie)
604 633 4810
Pays-Bas (Amsterdam)
Indicatif d’accès
international : 00
Indicatif du pays : 31
Indicatif de la ville : 20
Site Web : support.euro.dell.com
Support technique XPS 020 674 45 94
Support technique pour les autres systèmes Dell 020 674 45 00
Support technique par fax 020 674 47 66
Service clientèle auprès du grand public et des
PME/PMI
020 674 42 00
Suivi clientèle 020 674 4325
Ventes au grand public et aux PME/PMI 020 674 55 00
Ventes relationnelles 020 674 50 00
Ventes par fax au grand public et aux PME/PMI 020 674 47 75
Ventes relationnelles par fax 020 674 47 50
Standard 020 674 50 00
Standard par fax 020 674 47 50
Pérou E-mail : la-techsupport@dell.com
Support général 0800-50-669
Pays (ville)
Indicatif d’accès international -
Indicatif du pays
Indicatif de la ville
Nom du service ou zone de service
Site web et adresse e-mail
Indicatifs de zone,
numéros locaux et
numéros d’appel gratuit166 Obtention d’aide
Pologne (Varsovie)
Indicatif d’accès
international : 011
Indicatif du pays : 48
Indicatif de la ville : 22
Site Web : support.euro.dell.com
E-mail : pl_support_tech@dell.com
Téléphone du service clientèle 57 95 700
Service clientèle 57 95 999
Ventes 57 95 999
Télécopie du service clientèle 57 95 806
Télécopie de la réception 57 95 998
Standard 57 95 999
Portugal
Indicatif d’accès
international : 00
Indicatif du pays : 351
Site Web : support.euro.dell.com
Support technique 707200149
Service clientèle 800 300 413
Ventes 800 300 410, 800 300 411,
800 300 412 ou 21 422 07 10
Fax 21 424 01 12
Porto Rico E-mail : la-techsupport@dell.com
Support général 1-877-537-3355
République dominicaine Site Web : www.dell.com/do
E-mail : la-techsupport@dell.com
Support général 1-800-156-1588
République Tchèque (Prague)
Indicatif d’accès
international : 00
Indicatif du pays : 420
Site Web : support.euro.dell.com
E-mail : czech_dell@dell.com
Support technique 22537 2727
Service clientèle 22537 2707
Fax 22537 2714
Support technique par fax 22537 2728
Standard 22537 2711
Pays (ville)
Indicatif d’accès international -
Indicatif du pays
Indicatif de la ville
Nom du service ou zone de service
Site web et adresse e-mail
Indicatifs de zone,
numéros locaux et
numéros d’appel gratuitObtention d’aide 167
Royaume-Uni (Bracknell)
Indicatif d’accès
international : 00
Indicatif du pays : 44
Indicatif de la ville : 1344
Site Web : support.euro.dell.com
E-mail : dell_direct_support@dell.com
Site Web du service clientèle :
support.euro.dell.com/uk/en/ECare/form/home.asp
Ventes
Ventes au grand public et aux PME/PMI 0870 907 4000
Ventes aux entreprises et au secteur public 01344 860 456
Service clientèle
Service clientèle auprès du grand public
et des PME/PMI
0870 906 0010
Service clientèle auprès des grandes entreprises 01344 373 185
Comptes privilégiés (de 500 à 5 000 employés) 0870 906 0010
Service clientèle des comptes globaux 01344 373 186
Service clientèle des comptes gouvernementaux
centralisés
01344 373 193
Service clientèle pour le gouvernement local
et le secteur de l’enseignement
01344 373 199
Service clientèle pour le secteur médical 01344 373 194
Support technique
Support technique pour les systèmes XPS
uniquement
0870 366 4180
Support technique (grandes entreprises/comptes
privilégiés/PCA [+ de 1000 employés])
0870 908 0500
Support technique pour les autres produits 0870 353 0800
Général
Télécopieur petites entreprises et activités
professionnelles à domicile
0870 907 4006
Saint-Kitts-et-Nevis Site Web : www.dell.com/kn
E-mail : la-techsupport@dell.com
Support général numéro vert : 1-866-540-3355
Saint-Vincent-et-les-Grenadines Site Web : www.dell.com/vc
E-mail : la-techsupport@dell.com
Support général numéro vert : 1-866-464-4353
Pays (ville)
Indicatif d’accès international -
Indicatif du pays
Indicatif de la ville
Nom du service ou zone de service
Site web et adresse e-mail
Indicatifs de zone,
numéros locaux et
numéros d’appel gratuit168 Obtention d’aide
Salvador Site Web : www.dell.com/ec
E-mail : la-techsupport@dell.com
Support général 800-6132
Singapour (Singapour)
Indicatif d’accès
international : 005
Indicatif du pays : 65
REMARQUE : les numéros de téléphone indiqués
dans cette section doivent être utilisés uniquement
à Singapour et en Malaisie.
Site Web : support.ap.dell.com
Support technique (XPS) numéro vert : 1800 394 7464
Support technique (Dimension, Inspiron,
Electronics, Accessories)
numéro vert : 1 800 394 7430
Support technique (OptiPlex,
Latitude et Dell Precision)
numéro vert : 1 800 394 7488
Support technique (PowerApp, PowerEdge,
PowerConnect et PowerVault)
numéro vert : 1 800 394 7478
Service clientèle numéro vert : 1 800 394 7430
(option 6)
Ventes aux particuliers numéro vert : 1 800 394 7412
Ventes aux grandes entreprises numéro vert : 1 800 394 7419
Slovaquie (Prague)
Indicatif d’accès
international : 00
Indicatif du pays : 421
Site Web : support.euro.dell.com
E-mail : czech_dell@dell.com
Support technique 02 5441 5727
Service clientèle 420 22537 2707
Fax 02 5441 8328
Support technique par fax 02 5441 8328
Standard (ventes) 02 5441 7585
Ste Lucie Site Web : www.dell.com/lc
E-mail : la-techsupport@dell.com
Support général numéro vert : 1-866-464-4352
Pays (ville)
Indicatif d’accès international -
Indicatif du pays
Indicatif de la ville
Nom du service ou zone de service
Site web et adresse e-mail
Indicatifs de zone,
numéros locaux et
numéros d’appel gratuitObtention d’aide 169
Suède (Upplands Vasby)
Indicatif d’accès
international : 00
Indicatif du pays : 46
Indicatif de la ville : 8
Site Web : support.euro.dell.com
Support technique XPS 0771 340 340
Support technique pour les autres produits Dell 08 590 05 199
Suivi clientèle 08 590 05 642
Service clientèle auprès du grand public
et des PME/PMI
08 587 70 527
Support du programme d’achats pour employés
(EPP, Employee Purchase Program)
020 140 14 44
Support technique par fax 08 590 05 594
Ventes 08 590 05 185
Suisse (Genève)
Indicatif d’accès
international : 00
Indicatif du pays : 41
Indicatif de la ville : 22
Site Web : support.euro.dell.com
E-mail : Tech_support_central_Europe@dell.com
Support technique XPS 0848 33 88 57
Support technique (grand public et PME/PMI)
pour tous les autres produits Dell
0844 811 411
Support technique (grandes entreprises) 0844 822 844
Service clientèle (grand public et PME/PMI) 0848 802 202
Service clientèle (grandes entreprises) 0848 821 721
Fax 022 799 01 90
Standard 022 799 01 01
Taïwan
Indicatif d’accès
international : 002
Indicatif du pays : 886
Site Web : support.ap.dell.com
E-mail : support.dell.com.cn/email
Support technique (XPS) numéro vert : 0080 186 3085
Support technique (OptiPlex, Latitude,
Inspiron, Dimension, composants électroniques
et accessoires)
numéro vert : 0080 186 1011
Support technique (serveurs et stockage) numéro vert : 0080 160 1256
Service clientèle numéro vert : 0080 160 1250
(option 5)
Ventes aux particuliers numéro vert : 0080 165 1228
Ventes aux grandes entreprises numéro vert : 0080 165 1227
Pays (ville)
Indicatif d’accès international -
Indicatif du pays
Indicatif de la ville
Nom du service ou zone de service
Site web et adresse e-mail
Indicatifs de zone,
numéros locaux et
numéros d’appel gratuit170 Obtention d’aide
Thaïlande
Indicatif d’accès
international : 001
Indicatif du pays : 66
Site Web : support.ap.dell.com
Support technique (OptiPlex,
Latitude et Dell Precision)
numéro vert : 1800 0060 07
Support technique (PowerApp, PowerEdge,
PowerConnect et PowerVault)
numéro vert : 1800 0600 09
Service clientèle numéro vert : 1800 006 007
(option 7)
Ventes aux grandes entreprises numéro vert : 1800 006 009
Ventes aux particuliers numéro vert : 1800 006 006
Trinité-et-Tobago Site Web : www.dell.com/tt
E-mail : la-techsupport@dell.com
Support général numéro vert : 1-888-799-5908
Uruguay Site Web : www.dell.com/uy
E-mail : la-techsupport@dell.com
Support général numéro vert : 000-413-598-2521
Venezuela Site Web : www.dell.com/ve
E-mail : la-techsupport@dell.com
Support général 0800-100-4752
Pays (ville)
Indicatif d’accès international -
Indicatif du pays
Indicatif de la ville
Nom du service ou zone de service
Site web et adresse e-mail
Indicatifs de zone,
numéros locaux et
numéros d’appel gratuitGlossaire 171
Glossaire
Cette section définit ou identifie les termes
techniques, abréviations et sigles utilisés dans
la documentation fournie avec le système.
A : Ampère(s).
ACPI : Acronyme de “Advanced Configuration and Power
Interface”. Interface standard qui permet au système
d’exploitation de contrôler les paramètres relatifs à la
configuration et à la gestion de l’alimentation.
adresse MAC : Adresse de contrôle d’accès aux supports.
L’adresse MAC identifie le matériel du système de
manière unique sur un réseau.
adresse mémoire : Emplacement précis, exprimé
normalement en nombre hexadécimal, dans la RAM
du système.
ANSI : Acronyme de “American National Standards
Institute”, institut des normes nationales américaines.
Principal organisme dédié au développement des normes
technologiques spécifiques des États-Unis.
application : Logiciel conçu pour effectuer une tâche
spécifique ou une série de tâches. Les applications
s’exécutent à partir du système d’exploitation.
ASCII : Acronyme de “American Standard Code
for Information Interchange”, code des normes
américaines pour l’échange d’informations.
barrette de mémoire : Petite carte de circuits, contenant
des puces de mémoire, qui se connecte à la carte système.
BIOS : Acronyme de “Basic Input/Output System”,
système d’entrées/sorties de base. Le BIOS du système
contient des programmes stockés sur une puce de
mémoire flash. Le BIOS contrôle les fonctions suivantes :
• Les communications entre le processeur et les
périphériques
• Diverses fonctions, comme les messages du système
bit : Plus petite unité d’information interprétée
par le système.
BMC : Acronyme de “Baseboard Management
Controller”, contrôleur de gestion de la carte de base.
BTU : Acronyme de “British Thermal Unit”,
unité thermique britannique.
bus : Chemin d’informations entre
les différents composants du système.
Le système contient un bus d’extension qui
permet au microprocesseur de communiquer avec
les contrôleurs des différents périphériques connectés
au système. Il contient également un bus d’adresse
et un bus de données pour les communications
entre le microprocesseur et la RAM.
bus d’extension : Votre système contient un bus
d’extension qui permet au processeur de communiquer
avec les contrôleurs des périphériques, comme les NIC.
bus frontal : Chemin des données et interface physique
entre le microprocesseur et la mémoire principale (RAM).
bus local : Sur les systèmes à bus local, certains matériels
(comme l’adaptateur vidéo) peuvent être conçus pour
fonctionner beaucoup plus vite que sur un bus
d’extension traditionnel. Voir aussi bus.
C : Celsius.
CA : Courant alternatif.
cache interne du processeur : Mémoire cache
d’instructions et de données intégrée au processeur.
carte d’extension : Carte supplémentaire (par exemple
un adaptateur SCSI ou un NIC) qui se branche dans
un connecteur d’extension sur la carte système
de l’ordinateur. Une carte adaptateur ajoute des
fonctions spéciales au système en fournissant une
interface entre le bus d’extension et un périphérique.172 Glossaire
carte hôte : Carte assurant la communication entre
le bus du système et le contrôleur d’un périphérique.
Les contrôleurs de disque dur disposent de circuits de
carte hôte. Pour ajouter un bus SCSI au système, vous
devez installer ou raccorder la carte hôte adéquate.
carte système : La carte système contient en général
la plupart des composants intégrés à votre système,
comme le processeur, la RAM, des contrôleurs
et divers circuits de ROM.
carte vidéo : Circuits qui assurent les fonctions
vidéo de l’ordinateur (en association avec le moniteur).
Il peut s’agir d’une carte d’extension installée dans un
connecteur, ou de circuits intégrés sur la carte système.
cavalier : Petit composant pour carte à circuits imprimés,
disposant de deux ou plusieurs broches. Des fiches en
plastique contenant un fil s’engagent sur les broches.
Ce fil relie les broches et ferme un circuit, offrant un
moyen simple et réversible de changer le câblage de
la carte.
CC : Courant continu.
CD : Disque compact. Les lecteurs de CD utilisent une
technologie optique pour lire les données sur les CD.
cm : Centimètres.
CMOS : Acronyme de “Complementary Metal-Oxide
Semiconductor”, semi-conducteur d’oxyde métallique
supplémentaire.
COMn : Nom de périphérique permettant de désigner les
ports série du système.
combinaison de touches : Commande qui se fait
en appuyant sur plusieurs touches en même temps
(par exemple ).
composant : Dans le contexte de l’interface DMI,
il s’agit d’un élément compatible DMI, comme
un système d’exploitation, un ordinateur, une carte
d’extension ou un périphérique. Chaque composant
est constitué de groupes et d’attributs, définis comme
caractéristiques de ce composant.
connecteur d’extension : Connecteur situé sur la carte
système ou la carte de montage, auquel se branche une
carte d’extension.
contrôleur : Circuit qui contrôle le transfert des
données entre le microprocesseur et la mémoire
ou entre le microprocesseur et les périphériques.
coprocesseur : Circuit qui libère le processeur
principal de certaines tâches de traitement. Par exemple,
un coprocesseur mathématique se charge du traitement
numérique.
CPU : Acronyme de “Central Processing Unit”,
unité centrale de traitement. Voir processeur.
DDR : Acronyme de “Double Data Rate”, double débit
de données. Technologie des barrettes de mémoire
permettant de doubler le débit.
définition graphique : Indique le nombre de pixels en
largeur et le nombre de pixels en hauteur, par exemple
640 x 480. Pour afficher dans une résolution graphique
donnée, vous devez installer les pilotes vidéo appropriés
et votre moniteur doit accepter cette résolution.
DHCP : Acronyme de “Dynamic Host Configuration
Protocol”. Méthode permettant d’affecter automatiquement une adresse IP à un système client.
diagnostics : Série de nombreux tests pour le système.
DIMM : Acronyme de “Dual In-Line Memory Module”,
barrette de mémoire à double rangée de connexions.
Voir aussi barrette de mémoire.
DIN : Acronyme de “Deutsche Industrie-Norm”,
norme de l’industrie allemande.
disquette d’amorçage : Disquette utilisée pour démarrer
le système si celui-ci ne peut pas être initialisé à partir
du disque dur.
disquette système : Voir disquette d’amorçage.
DMA : Acronyme de “Direct Memory Access”,
accès direct à la mémoire. Un canal DMA permet
le transfert direct de certains types de données entre
la RAM et un périphérique, sans passer par le processeur.
DMI : Acronyme de “Desktop Management Interface”,
interface de gestion de bureau. L’interface DMI permet
de gérer les logiciels et matériels du système en recueillant
des informations sur ses composants, comme le système
d’exploitation, la mémoire, les périphériques, les cartes
d’extension et le numéro d’inventaire.Glossaire 173
DNS : Acronyme de “Domain Name System”, système
de noms de domaines. Méthode de conversion des noms
de domaines Internet (par exemple www.dell.com)
en adresses IP (comme 143.166.83.200).
DRAM : Acronyme de “Dynamic Random-Access
Memory”, mémoire vive dynamique. Normalement,
la mémoire vive d’un système est composée entièrement
de puces DRAM.
DVD : Acronyme de “Digital Versatile Disc”,
disque numérique polyvalent.
ECC : Acronyme de “Error Checking and Correction”,
vérification et correction d’erreur.
EEPROM : Acronyme de “Electronically Erasable
Programmable Read-Only Memory”, mémoire morte
reprogrammable électroniquement.
EMC : Acronyme de “Electromagnetic Compatibility”,
compatibilité électromagnétique.
EMI : Acronyme de “ElectroMagnetic Interference”,
interférence électromagnétique.
E-S : Entrée/sortie. Un clavier est un périphérique
d’entrée et une imprimante est un périphérique de sortie.
En général, l’activité d’E-S peut être différenciée de
l’activité de calcul.
ESD : Acronyme de “Electrostratic Discharge”, décharge
électrostatique.
ESM : Acronyme de “Embedded Server Management”,
gestion de serveur intégrée.
étiquette de service : Code à barres se trouvant sur
le système, et permettant de l’identifier lorsque vous
appelez le support technique de Dell.
F : Fahrenheit.
FAT : Acronyme de “File allocation table”, table
d’allocation des fichiers. Structure du système de fichiers
utilisée par MS-DOS®
pour organiser et suivre le stockage
des fichiers. Le système d’exploitation Microsoft®
Windows®
permet d’utiliser une structure de système de
fichiers FAT.
FBD : Acronyme de “Fully Buffered Dual In-Line
Memory Module”, barrette DIMM avec tampon intégral.
fichier readme : Fichier texte fourni avec un logiciel ou un
matériel, et qui contient des informations complétant ou
mettant à jour la documentation.
fichier read-only : Fichier en lecture seule, qui ne peut
être ni modifié, ni effacé.
fichier system.ini : Fichier de démarrage du système
d’exploitation Windows. Quand vous lancez Windows,
il consulte le fichier system.ini pour déterminer une
variété d’options pour l’environnement d’exploitation
Windows. Entre autres, le fichier system.ini indique
les pilotes vidéo, souris et clavier qui sont installés
pour Windows.
fichier win.ini : Fichier de démarrage du système
d’exploitation Windows. Quand vous lancez Windows,
le système consulte le fichier win.ini pour déterminer une
variété d’options pour l’environnement d’exploitation
Windows. Ce fichier comprend aussi des sections
qui contiennent les paramètres facultatifs pour les
programmes Windows installés sur le disque dur.
formater : Préparer un lecteur de disque dur
ou une disquette à stocker des fichiers. Un formatage
inconditionnel efface toutes les données stockées sur
le disque.
ft : Foot (pied).
FTP : Acronyme de “File Transfert Protocol”, protocole
de transfert de fichiers.
g : Gramme(s).
G : Gravité.
Gb : Gigabit : 1024 mégabits ou 1 073 741 824 bits.
Go : Giga-octet : 1024 Mo ou 1 073 741 824 octets.
Quand on parle de stockage sur disque dur, la mesure
est souvent arrondie à 1 000 000 000 octets.
groupe : Dans le contexte de l’interface DMI, un groupe
est une structure de données qui définit les informations
courantes, ou attributs, d’un composant gérable.
guarding : Type de redondance de données qui utilise
un groupe de disques physiques pour stocker les données,
et un disque supplémentaire pour stocker les informations
de parité. Voir également mise en miroir, striping et RAID.174 Glossaire
h : Hexadécimal. Système de numération en base 16,
souvent utilisé en programmation pour identifier les
adresses mémoire de RAM et d’E-S du système pour les
périphériques. Dans le texte, les chiffres hexadécimaux
sont souvent suivis d’un h.
hot plug (enfichage à chaud) : Caractéristique permettant
de remplacer un composant du système lorsque ce dernier
est en cours de fonctionnement.
Hz : Hertz.
ID : Identification.
IDE : Acronyme de “Integrated Drive Electronics”.
Interface standard entre la carte système et les
périphériques de stockage.
informations de configuration du système : Données
stockées en mémoire, qui informent un système sur
la manière dont le matériel est installé et dont
le système doit être configuré pour fonctionner.
IP : Acronyme de “Internet Protocol”, protocole Internet.
IPX : Acronyme de “Internet package exchange”.
IRQ : Interrupt ReQuest (demande d’interruption).
Un signal indiquant que des données vont être
envoyées ou reçues par un périphérique, et envoyé
au microprocesseur par une ligne d’IRQ. Chaque liaison
avec un périphérique doit avoir un numéro d’IRQ. Deux
périphériques peuvent avoir la même IRQ, mais vous ne
pouvez pas les utiliser simultanément.
K : Kilo, 1000.
Kb : Kilobit, 1024 bits.
Kbps : Kilobits par seconde.
kg : Kilogramme, 1000 grammes.
kHz : Kilohertz.
KMM : Acronyme de “Keyboard/Monitor/Mouse”,
ensemble clavier/moniteur/souris.
Ko : Kilo-octet, 1024 octets.
Ko/s : Kilo-octets par seconde.
KVM : Commutateur KVM. Le terme KVM désigne
un commutateur qui permet de sélectionner le système
à partir duquell’image est affichée et pour lequel le clavier
et la souris sont utilisés.
lame : Module équipé d’un processeur, de mémoire
et d’un disque dur. Ces modules sont montés dans
une baie qui dispose d’alimentations et de ventilateurs.
LAN : Réseau local. Un LAN se limite normalement à un
bâtiment ou à un groupe de bâtiments proches, où tout
l’équipement est relié par des fils réservés au réseau LAN.
lb : Livres (poids).
LCD : Écran à cristaux liquides.
LED : Acronyme de “Light-Emitting Diode”, diode
luminescente. Composant électronique qui s’allume
lorsqu’il est traversé par un courant.
LGA : Acronyme de “Land Grid Array”, matrice LGA.
Type de support de processeur. Contrairement aux PGA,
ce type de connexion n’utilise pas des broches mais des
contacteurs qui permettent d’augmenter le nombre de
connexions sur le microprocesseur.
Linux : Système d’exploitation similaire à UNIX et
pouvant être utilisé sur une grande diversité de platesformes matérielles. Linux est un logiciel libre et gratuit.
Certaines distributions plus complètes, accompagnées
de support technique et de formation, sont payantes
et disponibles chez des distributeurs comme
Red Hat Software (www.redhat.com).
LVD : Acronyme de “Low Voltage Differential”,
différentiel à basse tension.
m : Mètre(s).
mA : Milliampère(s).
mAh : Milliampère à l’heure.
Mb : Mégabit, soit 1 048 576 bits.
Mbps : Mégabits par seconde.
MBR : Acronyme de “Master Boot Record”,
enregistrement d’amorçage principal.
mémoire : Zone de stockage des données de base
du système. Un ordinateur peut disposer de différentes
sortes de mémoire, intégrée (RAM et ROM) ou ajoutée
sous forme de barrettes DIMM. Glossaire 175
mémoire cache : Zone de mémoire rapide contenant
une copie des données ou des instructions pour les
récupérer plus vite. Quand un programme demande des
données qui se trouvent dans le cache, l’utilitaire de mise
en mémoire cache du disque peut extraire les données
plus vite de la RAM que du disque même.
mémoire conventionnelle : Les premiers 640 Ko
de la RAM. La mémoire conventionnelle est présente
dans tous les systèmes. Sauf s’ils ont été conçus de
façon particulière, les programmes MS-DOS®
sont
limités à cette mémoire de base.
mémoire flash : Type d’EEPROM pouvant être
reprogrammée en place dans le système, à partir d’un
utilitaire sur disquette. La plupart des EEPROM ne peut
être reprogrammée qu’avec un équipement spécial.
mémoire système : Voir RAM.
mémoire vidéo : La plupart des cartes vidéo VGA
et SVGA contiennent de la mémoire, différente de la
RAM du système. La mémoire vidéo installée affecte
surtout le nombre de couleurs affichables (ce qui dépend
aussi du pilote vidéo et du moniteur).
MHz : Mégahertz.
mise en miroir : Redondance de données qui utilise un
ensemble de disques physiques pour stocker les données
et un ou plusieurs ensembles de disques supplémentaires
pour stocker des copies des données. Cette fonction est en
général assurée par un logiciel. Voir également guarding,
mise en miroir intégrée, striping et RAID.
mise en miroir intégrée : Mise en miroir physique
de deux disques. Cette fonction intégrée est assurée
par le matériel du système. Voir aussi mise en miroir.
mm : Millimètre.
Mo : Méga-octet, soit 1 048 576 octets. Quand on parle
de stockage sur disque dur, la mesure est souvent arrondie
à 1 000 000 octets.
Mo/s : Mégaoctets par seconde.
mode graphique : Mode vidéo qui peut être défini par
le nombre de pixels horizontaux x , le nombre de pixels
verticaux y et le nombre de couleurs z.
mode protégé : Mode d’exploitation qui permet aux
systèmes d’exploitation de mettre en œuvre les éléments
et fonctions suivants :
• Espace d’adresse mémoire de 16 Mo à 4 Go
• Traitement multitâche
• De la mémoire virtuelle, une méthode pour
augmenter la mémoire adressable en utilisant
le lecteur de disque dur
Les systèmes d’exploitation Windows 2000 et UNIX
32 bits s’exécutent en mode protégé. En revanche,
cela n’est pas le cas pour MS-DOS.
ms : Milliseconde.
MS-DOS® :
Microsoft Disk Operating System.
NAS : Acronyme de “Network Attached Storage”,
stockage réseau. Le NAS est l’un des concepts
utilisés pour l’implémentation du stockage partagé sur
un réseau. Les systèmes NAS ont leurs propres systèmes
d’exploitation, matériel intégré, et leurs propres logiciels
optimisés pour répondre à des besoins spécifiques en
termes de stockage.
NIC : Acronyme de “Network Interface Controller”.
Carte réseau intégrée ou installée sous forme de carte
d’extension, pour relier le système à un réseau.
NMI : Acronyme de “NonMaskable Interrupt”,
interruption non masquable. Un matériel envoie une NMI
pour signaler au microprocesseur des erreurs matérielles.
ns : Nanoseconde.
NTFS : Option du système de fichiers NT dans le système
d’exploitation Windows 2000.
numéro d’inventaire : Code individuel attribué à un
système, normalement par un administrateur, à des fins
de sécurité ou de suivi.
NVRAM : Mémoire vive rémanente. Mémoire qui ne perd
pas son contenu lorsque le système est mis hors tension.
La NVRAM est utilisée pour conserver la date, l’heure
et la configuration du système.
panneau de commande : Partie du système qui porte
les voyants et contrôles, comme le commutateur
d’alimentation et le voyant d’alimentation.176 Glossaire
parité : Informations redondantes associées à un bloc
de données.
partition : Vous pouvez partager un disque dur
en plusieurs sections physiques appelées partitions,
avec la commande fdisk. Chaque partition peut contenir
plusieurs disques logiques. Après un partitionnement,
vous devez formater chaque disque logique avec
la commande format.
PCI : Acronyme de “Peripheral Component
Interconnect”, interconnexion de composants
périphériques. Norme pour l’implémentation
des bus locaux.
PDU : Acronyme de “Power Distribution Unit”, unité
de distribution électrique. Source d’alimentation dotée
de plusieurs prises de courant qui fournit l’alimentation
électrique aux serveurs et aux systèmes de stockage
d’un rack.
périphérique : Matériel interne ou externe, connecté à un
système, comme une imprimante, un lecteur de disquette
ou un clavier.
PGA : Acronyme de “Pin Grid Array”, matrice de broches.
Type de support de microprocesseur qui permet de retirer
le microprocesseur.
pile de sauvegarde : Pile qui conserve dans une
région spécifique de la mémoire les informations sur
la configuration du système, la date et l’heure, lorsque
vous éteignez le système.
pilote de périphérique : Programme qui permet
au système d’exploitation ou à un autre programme
de communiquer correctement avec un périphérique
ou un matériel donné. Certains pilotes de périphériques,
comme les pilotes réseau, doivent être chargés par le
fichier config.sys ou comme programmes résidant en
mémoire (en général par le fichier autoexec.bat). D’autres,
comme le pilote vidéo, se chargent lorsque vous démarrez
le programme pour lequel ils sont conçus.
pilote vidéo : Programme qui permet aux applications
et systèmes d’exploitation en mode graphique, d’afficher
avec une résolution et le nombre de couleurs désirées.
Le pilote vidéo doit correspondre à la carte vidéo installée.
pixel : Point sur un écran vidéo. Les pixels sont
disposés en lignes et en colonnes afin de créer une image.
Une résolution vidéo, par exemple 640 x 480, indique
le nombre de pixels en largeur et le nombre de pixels
en hauteur.
port en amont : Port sur un commutateur ou
un concentrateur réseau, qui sert à le relier à un
autre commutateur ou concentrateur, sans utiliser
de câble croisé.
port série : Port d’E-S, utilisé le plus souvent pour
connecter un modem au système. Normalement, vous
pouvez identifier un port série sur le système grâce à son
connecteur à 9 broches.
POST : Acronyme de “Power-On Self-Test”, auto-test de
démarrage. Quand vous allumez le système, avant que le
système d’exploitation ne se charge, ce programme teste
différents composants dont la RAM, les lecteurs de disque
et le clavier.
processeur : Circuit de calcul principal du système,
qui contrôle l’interprétation et l’exécution des fonctions
mathématiques et logiques. Un logiciel écrit pour un
microprocesseur doit souvent être révisé pour fonctionner
sur un autre microprocesseur. CPU est un synonyme de
microprocesseur.
programme de configuration du système : Programme
basé sur le BIOS et permettant de configurer le matériel
du système et de personnaliser son fonctionnement,
en paramétrant des fonctions telles que la protection
par mot de passe et la gestion d’énergie. Comme
le programme de configuration du système est
stocké dans la mémoire vive rémanente, tous les
paramètres restent effectifs jusqu’à ce que vous
les changiez.
PS/2 : Personal System/2.
PXE : Acronyme de “Preboot eXecution Environment”,
environnement d’exécution avant démarrage. La fonction
PXE permet de démarrer un système (sans disque dur
ni disquette amorçable) à partir d’une unité réseau.Glossaire 177
RAID : Acronyme de “Redundant Array of Independent
Disks”, matrice redondante de disques indépendants.
Technologie permettant la mise en redondance des
données. Les types de RAID les plus fréquents sont
les RAID 0, 1, 5, 10 et 50. Voir aussi guarding,
mise en miroir et striping.
RAM : Acronyme de “Random-Access Memory”,
mémoire vive. Zone principale de stockage temporaire
du système pour les instructions d’un programme et les
données. Toutes les informations stockées dans la RAM
sont perdues lorsque vous éteignez le système.
RAS : Acronyme de “Remote Access Service”, service
d’accès à distance. Sous Microsoft Windows, ce service
permet d’accéder à un réseau distant à l’aide d’un modem.
répertoire : Les répertoires permettent de conserver
des fichiers apparentés sur un disque en les organisant
hiérarchiquement dans une structure en “arborescence
inversée”. Chaque disque possède un répertoire “racine”.
Les répertoires supplémentaires qui partent du répertoire
racine sont appelés sous-répertoires. Ces derniers peuvent
contenir d’autres répertoires, formant une sousarborescence.
ROM : Acronyme de “Read-Only Memory”, mémoire
morte. La ROM contient les programmes essentiels
au fonctionnement du système. Ces informations
sont conservées lorsque le système est mis hors
tension. Le programme qui lance la procédure
d’amorçage et l’auto-test de démarrage de
l’ordinateur sont des exemples de code en ROM.
ROMB : Acronyme de “RAID on Motherboard”, fonction
RAID incluse sur la carte mère.
routine d’amorçage : Programme qui initialise la mémoire
et les périphériques matériels, puis charge le système
d’exploitation. À moins que le système d’exploitation
ne réponde pas, vous pouvez redémarrer (faire un
démarrage à chaud) le système en appuyant sur