Dell™ PowerConnect 5500 Series CLI Reference Guide -> Accéder au site Dell -> Accéder aux Codes Promo et Bons de réduction Dell -> Voir d'autres manuels Dell Revenir à l'accueil

ou juste avant la balise de fermeture -->

 

 

 

Accéder au Support :

http://supportapj.dell.com/support/edocs/network/pc5524p/en/CLI/PDF/en_cli.pdf

Commander sur Dell.com

 

Autres manuels :

Dell

Dell-Imprimantes-laser-Dell-2350d-et-Dell-2350dn

Dell-XPS-430-Guide-de-reference-rapide

Dell-PowerEdge-RAID-Controller-PERC-H700-et-H800-Guide-d-utilisation

Dell-Lifecycle-Controller-2-Version-1.00.00-User-s-Guide

Dell-OpenManage-Server-Administrator-Version-7.0-Guide-d-utilisation

Dell-Solutions-NAS-Dell-FluidFS-Manuel-du-proprietaire-Manue

Dell-Guide-de-l-utilisateur-Dell-V525w

Dell-XPS-13-Manuel-du-proprietaire

Dell-Adaptateurs-Brocade-Manuel-d-installation-et-de-reference

Dell-FluidFS-NAS-Solutions-NX3600-NX3610-Guide-de-deploiement

Dell-Systemes-Dell-PowerEdge-T410-Manuel-du-proprietaire

Dell-Latitude-ST-Manuel-du-proprietaire-Manuel

Dell-OptiPlex-360-Guide-de-configuration-et-de-reference-rapide

Dell-PowerEdge-R810-Manuel-du-proprietaire-du-materiel

Dell-Guide-d-installation-des-systemes-Dell-PowerVault-Modular-Disk-3000

Dell-Imprimante-laser-Dell-2230d-Guide-de-l-utilisateur

Dell-Systemes-Dell-PowerEdge-C6105-Manuel-du-proprietaire-du-materiel

Dell-Imprimante-personnelle-a-jet-d-encre-Dell-J740-Manuel-du-proprietaire

Dell-2130cn-IMPRIMANTE-LASER-COULEUR

Dell-Guide-d-utilisation-de-la-station-de-travail-Dell-Precision-T3400

Dell-1235cn-Imprimante-Multifonction-Mode-d-emploi

Dell-Vostro-1310-1510-1710-et-2510-Guide-de-configuration-et-de-reference-rapide

Dell-Guide-d-utilisation-APC-Smart-UPS-750VA-1000VA-1500VA-100-120-230-V-CA-2U-Montage-en-baie-Onduleur

Dell-Guide-d-utilisation-Modele-TL24iSCSIxSAS%201Gb-iSCSI-a-SAS

Dell-Imprimantes-laser-Dell-1130-et-Dell-1130n

Dell-Precision-M6400-Guide-de-configuration-et-de-reference-rapide

Dell-M770mm-Color-Monitor-Quick-Set-up

Dell-Carte-de-gestion-reseau-AP9617-AP9618-AP9619-Manuel-d-installation-et-de-demarrage-rapide

Dell-Projecteur-Dell-1410X-Guide-d-utilisation

Dell-Imprimante-couleur-Dell-1350cnw

Dell-Manuel-d-utilisation-Dell-Inspiron-M5040-15-N5040-15-N5050-Manuel

Dell-Manuel-de-maintenance-Dell-Inspiron-620

Dell-3D-VISION-MANUEL-D-UTILISATION

Dell-Inspiron-600m-Manuel-du-proprietaire

Dell-Systemes-Dell-PowerEdge-R805-Manuel-du-proprietaire

Dell-Systemes-Dell-PowerEdge-R900-Manuel-du-proprietaire

Dell-Systemes-Dell-PowerEdge-2970-Manuel-du-proprietaire

Dell-Systemes-Dell-PowerEdge-C6145-Manuel-du-proprietaire-du-materiel

Dell-Inspiron-660s-Manuel-du-proprietaire

Dell-P513w-User-s-Guide-Francais-manuel

Dell-Inspiron-660-manuels

Dell-Serveur-de-sauvegarde-sur-disque-Dell-PowerVault-DL-optimise-par-CommVault-Simpana-Guide-d-utilisation

Dell-P513w-User-s-Guide-Guide-de-l-utilisateur-manuel

Dell-Precision-Workstation-T1650-Manuel-du-proprietaire

Dell-ALIENWARE-M17x-MANUEL-DE-L-ORDINATEUR-PORTABLE

Dell-Manuel-du-proprietaire-de-Dell-PowerEdge-M905-M805-M600-et-M605

Dell-Inspiron-One-2330-Manuel-du-proprietaire

Dell-Dimension-1100-B110-Manuel-du-proprietaire

Dell-Vostro-270-Manuel-du-proprietaire

Dell-Systemes-Dell-PowerEdge-T320-Manuel-du-proprietaire

Dell-Station-de-travail-mobile-Dell-Precision-M4700-Manuel-du-proprietaire

Dell-XPS-8500-Manuel-du-proprietaire

Dell-1230c-Imprimante-laser-couleur-mode-d-emploi-Manuel

Dell-Client-Management-Manuel

Dell-Studio-XPS-Setup-Guide-Manue

Dell-Adaptateur-hote-Dell-PCIe-SCSI-Ultra320-monocanal-Guide-d-utilisation-Manuel

Dell-INSPIRON-DUO-SETUP-GUIDE-Manuel

Dell-INSPIRON-DUO-GUIDE-DE-CONFIGURATION-Manuel

Dell-Guide-de-l-utilisateur-Dell-Inspiron-M4040-14-N4050-Manuel

Dell-Guide-de-l-administrateur-de-Dell-PowerVault-705N-Manuel

Dell-Vostro-420-220-220s-Guide-de-Configuration-et-de-Reference-Rapide-Manuel

Dell-Matrices-de-stockage-Dell-PowerVault-MD3660f-Series-Guide-de-deploiement-Manuel

Dell-Systemes-Dell-PowerVault-Network-Attached-Storage-NAS-Guide-de-l-administrateur-Manuel

Dell-Latitude-D430-Guide-d-utilisation-Manuel

Dell-Studio-XPS-Guide-de-configuration-Manuel

Dell-PowerEdge-C410x-Manuel-du-proprietaire

Dell-Precision-Workstation-T1650-Manuel-du-proprietaire

Dell-Systemes-Dell-PowerEdge-R300-Manuel-du-proprietaire

Dell-Systemes%20-Dell%20PowerEdge-T110-II-Manuel-du-proprietaire

Dell-Vostro-200-Manuel-du-proprietaire-Mini-Tower

Dell-Inspiron-531-Manuel-du-proprietaire

Dell-ALIENWARE-MANUEL-DE-L-ORDINATEUR-DE-BUREAU-Francais

Dell-PowerEdge-R520-Manuel-du-proprietaire

Projecteur-Dell-1201MP-Manuel-d-utilisation

Dell-PowerEdge-R910-Manuel-du-proprietaire

Dell-Dimension-C521-Manuel-du-proprietaire

Dell-Systemes-Dell-PowerEdge-T605-Manuel-du-proprietaire

Dell-Mobile-Jamz

Dell-Inspiron-530-Series-Manuel-du-proprietaire

Dell-Vostro-3460-Manuels

Dell-OPENMANAGE-POWER-CENTER-1.1-Guide-d-utilisation

Dell-PowerVault-MD3660f-Storage-Arrays-Manuels

Dell™ Ekran Yöneticisi Kullanıcı Kılavuzu

Dell-PowerEdge-R620-Guide-de-mise-en-route

Dell-PowerEdge-R520-Guide-de-mise-en-route

DELL-POWERVAULT-MD1200-et-MD1220-TECHNICAL-GUIDEBOOK

Console-de-gestion-multi-onduleurs-Dell-Manuel-de-l-utilisateur-pour-l-installation-et-la-configuration

DELL-OPTIPLEX580-TECHNICAL-GUIDEBOOK-INSIDE-THE-OPTIPLEX-580

Dell-Inspiron-1720-manuels

Dell-PowerEdge-R720-et-R720xd-Guide-de-mise-en-route

Dell-Vostro-1540-1550-Manuel-du-proprietaire

Dell-Latitude-E5430-Manuel-du-proprietaire

Dell™ S2240L/S2340L Monitör Kullanıcı Kılavuzu

Dell PowerEdge Sistemleri İçin Microsoft Windows Server 2012 Önemli Bilgiler Kılavuzu

Dell-Guide-de-l-utilisateur-du-moniteur-Dell-S2240L-S2340L

Dell™ S320/S320wi Projektör Kullanım Kılavuzu

Dell-%20Vostro-270-Manuels

Dell-Vostro-3460-Manuel-du-proprietaire-Francais

Dell-Inspiron-9200-Manuel-de-l-utilisateur

Dell-Inspiron-2600-et-2650-Manuel-de-l-utilisateur

Dell-Axim-X30-Manuel-de-l-utilisateur

Dell-Vostro-2520-Manuel-du-proprietaire

Dell-Inspiron-1721-Manuel

Dell-Systemes-Dell-PowerEdge-T710-Manuel-du-proprietaire

Dell-Precision-Workstation-T5600-Manuel-du-proprietaire

Dell-Solutions-NAS-Dell-FluidFS-Manuel-du-proprietaire

Systemes-Dell-PowerEdge-C5220-Manuel-du-proprietaire-du-materiel

Dell-Dimension-3000-Manuel-du-proprietaire

Dell-PowerEdge-R210-Technical-Guide

Dell-Inspiron-Manuels

Dell-Manuel-du-proprietaire-du-Dell-Vostro-1700

Dell-Clavier-sans-fil-et-souris-Dell-KM713-Manuel-de-l'utilisateur

Dell-Systeme-de-navigation-GPS-Dell-Manuel-de-l'utilisateur

Dell-Logiciel-de-gestion-de-l-onduleur-Manuel-de-l-utilisateur-pour-l-installation-et-la-configuration

Dell-Demarrage-rapide-du-moniteur-couleur-M990

Dell-Manuel-de-l-utilisateur-de-la-station-de-travail-Dell-Precision-370

Dell-Systemes-Dell-PowerEdge-2800-Guide-d-installation-et-de-depannage

Dell-Manuel-de-l-utilisateur-du-systeme-Dell-OptiPlex-SX280

Dell-Vostro-1440-1450-Manuel-de-l-utilisateur

Dell-Photo-Printer-540-Guide-de-l-utilisateur

Dell-Streak-7-Francais-Manuel-de-l-utilisateur

Dell-Venue-Pro-Manuel-de-l-utilisateur

Dell-Imprimante-laser-personnelle-Dell-P1500-Manuel-du-proprietaire

Dell-PowerEdge-C5125-Manuel-du-proprietaire-du-materiel

Dell-Latitude-D630-Manuels

Dell-Vostro-400-Manuel-du-proprietaire-Mini-Tower

Dell-Systemes-Dell-PowerEdge-T100-Manuel-du-proprietaire

Dell-OptiPlex-9010-7010-compact-Manuel-du-proprietaire

Dell-PowerVault%20NX3200-Manuel-du-proprietaire

Dell-Inspiron-1200-et-2200-Manuel-de%20l-utilisateur

Dell-Vostro-1540-1550-Manuel-du-proprietaire

Dell-Inspiron-8600-Manuel-du-proprietaire

Dell-PowerVault-Baie-de-stockage-MD1120-Manuel-du-proprietaire

Dell-Dimension-E521-Manuel-du-proprietaire

Dell-Inspiron-9100-Manuel-du-proprietaire

Dell-Vostro-3360-Manuel-du-proprietaire

Dell-Systemes-Dell-PowerEdge-T300-Manuel-du-proprietaire

Dell-XPS-One-2710-manuel-d-utilisation

Dell-Inspiron-1150-Manuel-du-proprietaire

Dell-Latitude-E5530-Manuel-du-proprietaire

Dell-Inspiron-660-Manuel-du-proprietaire

Acceder-au-site-Dell

Dell-Manuel-du-proprietaire-des-Dell-Latitude-E6420-et-E6420-ATG-Francais

Dell-OptiPlex-9010-Tout-en-un-Manuel-du-proprietaire

Dell-Vostro-3560-Manuel-du-proprietaire

Dell-Systemes-Dell-PowerEdge-T110-Manuel-du-proprietaire

Dell-server-poweredge-m710-tech-guidebook_fr

Dell-Systemes-Dell-PowerEdge-R420-Manuel-du-proprietaire

Dell-Latitude-5420-E5420-E5420m-Manuel-de-l-utilisateur

Dell-Latitude-E6320-Manuel-de-l-utilisateur

Dell-Systemes-Dell-Inspiron-8200-Manuel-de-l-utilisateur-Francais

Dell-server-poweredge-r610-tech-guidebook_fr

Dell-server-poweredge-t710-technical-guide-book_fr

Dell-server-poweredge-m1000e-tech-guidebook_fr

Dell-server-poweredge-m610-tech-guidebook_fr

Dell-poweredge-r210-technical-guidebook-en_fr

Dell-MANUEL-ALIENWARE-M15x-MOBILE-Manuel-de-l-utilisateur

Dell-Axim-X51-X51v-Manuel-de-l-utilisateur

Dell-Beats-By-dr.dre-Manuel-et-Garantie

Dell-Dimension-3100C-Manuel-du-proprietaire

 

Dell-Precision-Workstation-T3600-Manuel-du-proprietaire

Dell-Vostro-200-Manuel-du-proprietaire-Slim-Tower

Dell-ALIENWARE-MANUEL-DE-L-ORDINATEUR-DE-BUREAU

Dell-OPENMANAGE-POWER-CENTER-1-1-Guide-d-utilisation

Dell-Vostro-360-Proprietaire-du-manuel

Dell-Dimension-3100C-Manuel-du-proprietaire

AlienwareArea-51Area-51ALX

Dell-Ordinateurs-de-Bureau-PC-Portables-Netbooks/AlienwareAurora-R3

AlienwareAurora-R4

lienwareAuroraAuroraALXAurora-R2

Chassis-RAID-Dell-PowerVault-MD3000i-Manuel-du-proprietaire

Dell-Axim-X50-Manuel-du-proprietaire

Dell-Axim-X51-X51v-Manuel-du-proprietaire

Dell-Baie-de-stockage-Dell-PowerVault-MD1000-Manuel-du-proprietaire

Dell-Boîtier-Dell-PowerEdge-M1000e-Manuel-du-proprietaire

Dell-Clavier-Axim-Manuel-du-proprietaire

Dell-Dimension-3100-E310-Manuel-du-proprietaire

Dell-Dimension-9200-Manuel-du-proprietaire

Dell-Dimension-E520-Manuel-du-proprietaire

Dell-Imprimante-laser-Dell-1100-Manuel-du-proprietaire

Dell-Imprimante-laser-de-groupe-de-travail-Dell-M5200-Manuel-du-proprietaire

Dell-Imprimante-laser-monochrome-Dell-5330dn-Mode-d-emploi

Dell-Imprimante-laser-multifonction-Dell-1600n-Manuel-du-proprietaire

Dell-Inspiron-13z-Manuel-du-proprietaire

Dell-Inspiron-17R-Manuel-du-proprietaire

Dell-Inspiron-530s-Manuel-d-utilisation

Dell-Inspiron-530s-Manuel-du-proprietaire

Dell-Inspiron-700m-Manuel-du-proprietaire

Dell-Inspiron-1100-Manuel-d-utilisation

Dell-Inspiron-1525-1526-Manuel-du-proprietaire

Dell-Inspiron-5100-et-5150-Manuel-d-utilisation

Dell-Inspiron-9300-Manuel-du-proprietaire

Dell-Inspiron-9400-E1705-Manuel-du-proprietaire

http://www.audentia-gestion.fr/Dell-Ordinateurs-de-Bureau-PC-Portables-Netbooks/Dell-Laser-Printer-1700-1700n-Manuel-du-proprietaire.htm

Dell-Laser-Printer-1710-1710n-Manuel-du-proprietaire

Dell-Laser-Printer-3100cn-manuel-du-proprietaire

Dell-Latitude-ST-Manuel-du-proprietaire

Dell-Latitude-XT3-Manuel-du-proprietaire

Dell-Liste-des-manuels-et-de-la-documentation-Dell

Dell-MANUEL-ALIENWARE-M11x-MOBILE-Manuel-du-proprietaire

Dell-MANUEL-ALIENWARE-M15x-MOBILE

Dell-MANUEL-D-ALIENWARE-M17x-MOBILE-francais

Dell-MANUEL-D-ALIENWARE-M17x-MOBILE

Dell-Manuel-d-utilisation-Dell-Inspiron-M5040-15-N5040-15-N5050

Dell-Manuel-d-utilisation-du-Dell-XPS-420

Dell-Manuel-de-l-Utilisateur-Dell-Latitude-E6220

Dell-Manuel-de-l-Utilisateur-Dell-Latitude-E6520

Dell-Manuel-de-l-utilisateur-Dell-Latitude-E6320

Dell-Manuel-de-maintenance-Dell-Inspiron-N5110

Dell-Manuel-du-proprietaire-Dell-Vostro-1500

Dell-Manuel-du-proprietaire-Dell-XPS-M1330

Dell-Manuel-du-proprietaire-des-Dell-Latitude-E6420-et-E6420-ATG

Dell-Manuel-du-proprietaire-du-Dell-Inspiron-1721

Dell-Manuel-du-proprietaire-du-Dell-XPS-M1730

Dell-Manuel-du-proprietaire-du-Dell-XPS-One

Dell-Matrices-de-stockage-Dell-PowerVault-MD3260i-Series-Guide-de-deploiement

Dell-Matrices-de-stockage-Dell-PowerVault-MD3660i-Series-Guide-de-deploiement

Dell-Photo-All-In-One-Printer-944-Manuel-du-proprietaire

Dell-Photo-All-In-One-Printer-964-Manuel-du-proprietaire

Dell-Photo-All-In-One-Printer%20942-Manuel-du-proprietaire

Dell-Photo-Printer-720-Manuel-du-proprietaire

Dell-PowerEdge-C8220-Manuel-du-proprietaire

Dell-PowerEdge-R620-Manuel-du-proprietaire

Dell-PowerVault-MD3260-3260i-3660i-3660f-3060e-Storage-Arrays-Guide-de-l-administrateur

Dell-PowerVault-MD3260-3260i-3660i-3660f-3060e-Storage-Arrays-Manuel-du-proprietaire

Dell-PowerVault-NX400-Guide-de-mise-en-route

Dell-Precision-Workstation-T7600-Manuel-du-proprietaire

Dell-Streak-7-Manuel-de-l-utilisateur

Dell-Streak-Manuel-d-utilisation

Dell-Systemes-Dell-Inspiron-4150-Manuel-de-l-utilisateur

Dell-Systemes-Dell-Inspiron-8200-Manuel-de-l-utilisateur

Dell-Systemes-Dell-PowerEdge-1950-Manuel-du-proprietaire

Dell-Systemes-Dell-PowerEdge-M420-Manuel-du-proprietaire

Dell-Systemes-Dell-PowerEdge-R210-II-Manuel-du-proprietaire

Dell-Systemes-Dell-PowerEdge-R410-Manuel-du-proprietaire

Dell-Systemes-Dell-PowerEdge-R710-Manuel-du-proprietaire%20-Manuel-d-utilisation

Dell-Systemes-Dell-PowerEdge-T310-Manuel-du-proprietaire

Dell-Systemes-Dell-PowerEdge-T420-Manuel-du-proprietaire

Dell-Systemes-Dell-PowerEdge-T620-Manuel-du-proprietaire

Dell-Systemes-Dell-PowerVault-NX400-Manuel-du-proprietaire

Dell-Tout-en-un-Dell-Photo-924-Manuel-du-proprietaire

Dell-Vostro-360-Proprietaire-du-manuel

Dell-Vostro-3750-Manuel-du-proprietaire

Dell-Vostro-V131-Manuel-du-proprietaire

Dell-XP-M1530-Manuel-du-proprietaire

Dell-XPS-630i-Manuel-du-proprietair

Dell-moniteur-D1920-Manuel-du-proprietaire

DellDimension1100Series

Imprimante-Dell-Photo-All-In-One-Printer-922-Manuel-du-proprietaire

Imprimante-laser-de-groupe-de-travail-Dell-S2500-Manuel-du-proprietaire

Imprimante-personnelle-Dell-AIO-A960-Manuel-du-proprietaire

alienwareX51

Dell-Manuel-de-l-Utilisateur-Dell-Latitude-E6220

Dell-Systemes-Dell-PowerEdge-T420-Manuel-du-proprietaire

Dell-Systemes-Dell-Inspiron-4150-Manuel-de-l-utilisateur

Dell-Streak-Manuel-d-utilisation

Dell-Manuel-du-proprietaire-du-Dell-XPS-M1730

Dell-Photo-All-In-One-Printer-944-Manuel-du-proprietaire

Dell-Manuel-du-proprietaire-du-Dell-XPS-One

Dell-Clavier-Axim-Manuel-du-proprietaire

Dell-Systemes-Dell-PowerEdge-R410-Manuel-du-proprietaire

Dell-Manuel-d-utilisation-Dell-Inspiron-M5040-15-N5040-15-N5050

Dell-Manuel-de-maintenance-Dell-Inspiron-N5110

Dell-Inspiron-1100-Manuel-d-utilisation

Dell-Imprimante-laser-de-groupe-de-travail-Dell-M5200-Manuel-du-proprietaire

Dell-Photo-Printer-720-Manuel-du-proprietaire

Dell-Imprimante-laser-Dell-1100-Manuel-du-proprietaire

Dell-Manuel-du-proprietaire-Dell-Vostro-1500

Dell-XP-M1530-Manuel-du-proprietaire

Dell-Inspiron-530s-Manuel-du-proprietaire

Dell-Systemes-Dell-PowerEdge-R710-Manuel-du-proprietaire-Manuel-d-utilisation

Dell-Inspiron-5100-et-5150-Manuel-d-utilisation

Dell-Manuel-de-l-Utilisateur-Dell-Latitude-E6520

Dell-MANUEL-D-ALIENWARE-M17x-MOBILE

Dell-Manuel-de-l-utilisateur-Dell-Latitude-E6320

Dell-Laser-Printer-3100cn-manuel-du-proprietaire

Dell-Inspiron-530s-Manuel-d-utilisation

Dell-Systemes-Dell-PowerEdge-1950-Manuel-du-proprietaire

Dell-Manuel-du-proprietaire-des-Dell-Latitude-E6420-et-E6420-ATG

Dell-Imprimante-laser-monochrome-Dell-5330dn-Mode-d-emploi

Dell-PowerVault-MD3260-3260i-3660i-3660f-3060e-Storage-Arrays-Guide-de-l-administrateur

Dell-PowerVault-NX400-Guide-de-mise-en-route

Dell-Matrices-de-stockage-Dell-PowerVault-MD3260i-Series-Guide-de-deploiement

Dell-PowerEdge-C8220-Manuel-du-proprietaire

Dell-MANUEL-ALIENWARE-M11x-MOBILE-Manuel-du-proprietaire

Dell-Systemes-Dell-PowerEdge-M420-Manuel-du-proprietaire

Dell-Systemes-Dell-PowerVault-NX400-Manuel-du-proprietaire

Dell-PowerVault-MD3260-3260i-3660i-3660f-3060e-Storage-Arrays-Manuel-du-proprietaire

Dell-Matrices-de-stockage-Dell-PowerVault-MD3660i-Series-Guide-de-deploiement

Dell-Laser-Printer-1700-1700n-Manuel-du-proprietaire

Dell-Inspiron-9400-E1705-Manuel-du-proprietaire

Dell-Tout-en-un-Dell-Photo-924-Manuel-du-proprietaire

Dell-Laser-Printer-1710-1710n-Manuel-du-proprietaire

Dell-Dimension-3100-E310-Manuel-du-proprietaire

Dell-Inspiron-1525-1526-Manuel-du-proprietaire

FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\New Cover_Dell_Contax.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 – F O R P R O O F O N LY Template Last Updated -03/06/2010 Dell PowerConnect 5500 Series CLI Reference Guide Regulatory Model: PC5524, PC5524P, PC5548 and PC5548PFILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\New DELL CONFIDENTIAL – PRELIMINARY 9/12/12 – FOR PROOF ONLY Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION: A CAUTION indicates potential damage to hardware or loss of data if instructions are not followed. WARNING: A WARNING indicates a potential for property damage, personal injury, or death. COMMENT Remove paragraph if it does not apply to your publication. ____________________ Information in this publication is subject to change without notice. © 2011-2012 Dell Inc. All rights reserved. Reproduction of these materials in any manner whatsoever without the written permission of Dell Inc. is strictly forbidden. Trademarks used in this text: Dell™, the DELL logo, Dell Precision™, OptiPlex™, Latitude™, PowerEdge™, PowerVault™, PowerConnect™, OpenManage™, EqualLogic™, KACE™, FlexAddress™ and Vostro™ are trademarks of Dell Inc. Intel ® , Pentium ® , Xeon ® , Core™ and Celeron ® are registered trademarks of Intel Corporation in the U.S. and other countries. AMD ® is a registered trademark and AMD Opteron™, AMD Phenom™, and AMD Sempron™ are trademarks of Advanced Micro Devices, Inc. Microsoft ® , Windows ® , Windows Server ® , MS-DOS ® and Windows Vista ® are either trademarks or registered trademarks of Microsoft Corporation in the United States and/or other countries. Red Hat Enterprise Linux ® and Enterprise Linux ® are registered trademarks of Red Hat, Inc. in the United States and/or other countries. Novell ® is a registered trademark and SUSE ™ is a trademark of Novell Inc. in the United States and other countries. Oracle ® is a registered trademark of Oracle Corporation and/or its affiliates. Citrix ® , Xen ® , XenServer ® and XenMotion ® are either registered trademarks or trademarks of Citrix Systems, Inc. in the United States and/or other countries. VMware ® , Virtual SMP ® , vMotion ® , vCenter ® , and vSphere ® are registered trademarks or trademarks of VMWare, Inc. in the United States or other countries. Other trademarks and trade names may be used in this publication to refer to either the entities claiming the marks and names or their products. Dell Inc. disclaims any proprietary interest in trademarks and trade names other than its own. Regulatory Models: PC5524, PC5524P, PC5548 and PC5548P September 2012 Rev. A043 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\CLI_Dell_ContaxTOC.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY Contents 1 Preface.................................................................... 33 2 User Interface Commands . . . . . . . . . . . . 41 enable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 disable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 login. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 configure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43 exit (Configuration). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43 exit (EXEC) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 end . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 history . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46 history size . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47 terminal history . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48 terminal history size. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 terminal datadump . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50 debug-mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50 show history . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 show privilege. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52 do . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52 banner exec . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 534 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\CLI_Dell_ContaxTOC.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY banner login . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55 banner motd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 exec-banner . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59 login-banner . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60 motd-banner . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61 show banner . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61 3 Macro Commands . . . . . . . . . . . . . . . . . . 63 macro name. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63 macro apply. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65 macro description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67 macro global . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68 macro global description . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69 show parser macro . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70 4 System Management Commands . . . . . . 71 ping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71 traceroute . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74 telnet. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77 resume . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81 hostname . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82 reload . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83 stack master . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83 system light . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84 switch renumber . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84 show switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 855 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\CLI_Dell_ContaxTOC.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY service cpu-utilization. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86 show cpu utilization. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87 clear cpu counters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87 service cpu-counters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88 show cpu counters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88 show users. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89 show sessions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90 show system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91 show version . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94 system resources routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94 show system resources routings. . . . . . . . . . . . . . . . . . . . . . 95 show system tcam utilization. . . . . . . . . . . . . . . . . . . . . . . . . 96 show system defaults . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97 show tech-support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101 system fans always-on . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102 show system fans . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103 asset-tag. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103 show system id . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104 5 Clock Commands . . . . . . . . . . . . . . . . . . 107 clock set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107 clock source . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108 clock timezone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108 clock summer-time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109 sntp authentication-key. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111 sntp authenticate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1126 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\CLI_Dell_ContaxTOC.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY sntp trusted-key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113 sntp client poll timer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114 sntp broadcast client enable . . . . . . . . . . . . . . . . . . . . . . . . 115 sntp anycast client enable . . . . . . . . . . . . . . . . . . . . . . . . . . 115 sntp client enable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116 sntp client enable (Interface) . . . . . . . . . . . . . . . . . . . . . . . 117 sntp unicast client enable . . . . . . . . . . . . . . . . . . . . . . . . . . 118 sntp unicast client poll . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119 sntp server. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119 sntp port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121 show clock . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122 show sntp configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . 124 show sntp status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124 6 Configuration/Image File Commands . . 127 copy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127 write memory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132 delete . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132 pwd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133 dir . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134 more . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135 cd. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136 rename . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137 boot system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138 show running-config . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139 show startup-config . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1407 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\CLI_Dell_ContaxTOC.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY show bootvar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140 7 Auto-Update and Auto-Configuration . . 143 boot host auto-config . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143 boot host auto-update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143 boot host dhcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144 boot host auto-save . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145 show boot. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145 ip dhcp tftp-server ip addr. . . . . . . . . . . . . . . . . . . . . . . . . . . 148 ip dhcp tftp-server file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149 show ip dhcp tftp-server . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149 8 Management ACL Commands . . . . . . . . . 151 management access-list . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151 permit (Management). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152 deny (Management) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153 management access-class . . . . . . . . . . . . . . . . . . . . . . . . . . 155 show management access-list . . . . . . . . . . . . . . . . . . . . . . 155 show management access-class . . . . . . . . . . . . . . . . . . . . 156 9 SNMP Commands . . . . . . . . . . . . . . . . . . 159 snmp-server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159 snmp-server community . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159 snmp-server view . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162 snmp-server group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1638 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\CLI_Dell_ContaxTOC.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY snmp-server user . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165 snmp-server filter. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167 snmp-server host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168 snmp-server engineID local. . . . . . . . . . . . . . . . . . . . . . . . . 171 snmp-server engineID remote . . . . . . . . . . . . . . . . . . . . . . 172 snmp-server enable traps. . . . . . . . . . . . . . . . . . . . . . . . . . . 173 snmp-server trap authentication. . . . . . . . . . . . . . . . . . . . . 174 snmp-server contact . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174 snmp-server location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175 snmp-server set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175 show snmp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176 show snmp engineID. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178 show snmp views . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179 show snmp groups. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179 show snmp filters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180 show snmp users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181 10 RSA and Certificate Commands . . . . . . 183 crypto key generate dsa . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183 crypto key generate rsa . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184 show crypto key mypubkey . . . . . . . . . . . . . . . . . . . . . . . . . 184 crypto certificate generate . . . . . . . . . . . . . . . . . . . . . . . . . 185 crypto certificate request. . . . . . . . . . . . . . . . . . . . . . . . . . . 187 crypto certificate import. . . . . . . . . . . . . . . . . . . . . . . . . . . . 188 crypto certificate export pkcs12 . . . . . . . . . . . . . . . . . . . . . 190 crypto certificate import pkcs12 . . . . . . . . . . . . . . . . . . . . . 1919 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\CLI_Dell_ContaxTOC.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY show crypto certificate mycertificate . . . . . . . . . . . . . . . . 193 11 Web Server Commands . . . . . . . . . . . . . 195 ip http server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195 ip http port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196 ip http timeout-policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196 ip http secure-server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197 ip http secure-port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198 ip https certificate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199 show ip http . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200 show ip https . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200 12 Telnet, SSH and Slogin Commands . . . . 203 ip telnet server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203 ip ssh port. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204 ip ssh server. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204 ip ssh pubkey-auth . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205 crypto key pubkey-chain ssh . . . . . . . . . . . . . . . . . . . . . . . . 206 user-key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207 key-string . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208 show ip ssh . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210 show crypto key pubkey-chain ssh. . . . . . . . . . . . . . . . . . . 211 13 Line Commands . . . . . . . . . . . . . . . . . . . . 213 line. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21310 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\CLI_Dell_ContaxTOC.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY speed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214 autobaud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214 exec-timeout. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215 show line . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216 14 AAA Commands . . . . . . . . . . . . . . . . . . . 219 aaa authentication login. . . . . . . . . . . . . . . . . . . . . . . . . . . . 219 aaa authentication enable . . . . . . . . . . . . . . . . . . . . . . . . . . 221 login authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223 enable authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223 ip http authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224 show authentication methods. . . . . . . . . . . . . . . . . . . . . . . 225 password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 226 service password-recovery . . . . . . . . . . . . . . . . . . . . . . . . . 227 enable password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228 username . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229 show user accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230 aaa accounting login . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231 aaa accounting dot1x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233 show accounting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235 passwords min-length . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235 passwords strength-check enable. . . . . . . . . . . . . . . . . . . 236 passwords strength minimum character-classes . . . . . . 237 passwords strength max-limit repeated-characters . . . 238 passwords aging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239 passwords history . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24011 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\CLI_Dell_ContaxTOC.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY passwords history hold-time . . . . . . . . . . . . . . . . . . . . . . . . 241 passwords lockout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242 aaa login-history file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243 set username active . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243 set line active . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 244 set enable-password active . . . . . . . . . . . . . . . . . . . . . . . . . 245 show passwords configuration . . . . . . . . . . . . . . . . . . . . . . 246 show users login-history. . . . . . . . . . . . . . . . . . . . . . . . . . . . 247 15 RADIUS Commands . . . . . . . . . . . . . . . . . 249 radius-server host. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249 radius-server key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251 radius-server retransmit . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252 radius-server source-ip. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253 radius-server source-ipv6. . . . . . . . . . . . . . . . . . . . . . . . . . . 254 radius-server timeout. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255 radius-server deadtime . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255 show radius-servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256 16 TACACS+ Commands . . . . . . . . . . . . . . . 259 tacacs-server host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259 tacacs-server key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 260 tacacs-server timeout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261 tacacs-server source-ip . . . . . . . . . . . . . . . . . . . . . . . . . . . . 262 show tacacs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26312 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\CLI_Dell_ContaxTOC.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY 17 Syslog Commands . . . . . . . . . . . . . . . . . 265 logging on . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265 Logging host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266 logging console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267 logging buffered . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 268 clear logging. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269 logging file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 270 clear logging file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 270 aaa logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271 file-system logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272 management logging. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273 show logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273 show logging file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 274 show syslog-servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 276 18 RMON Commands . . . . . . . . . . . . . . . . . 277 show rmon statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277 rmon collection stats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279 show rmon collection stats . . . . . . . . . . . . . . . . . . . . . . . . . 280 show rmon history . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281 rmon alarm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 284 show rmon alarm-table. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 286 show rmon alarm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 287 rmon event. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 289 show rmon events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 290 show rmon log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29113 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\CLI_Dell_ContaxTOC.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY rmon table-size . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292 19 802.1x Commands . . . . . . . . . . . . . . . . . . 295 aaa authentication dot1x. . . . . . . . . . . . . . . . . . . . . . . . . . . . 295 dot1x system-auth-control . . . . . . . . . . . . . . . . . . . . . . . . . . 296 dot1x port-control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 296 dot1x re-authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . 298 dot1x timeout reauth-period . . . . . . . . . . . . . . . . . . . . . . . . 298 dot1x re-authenticate. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 299 dot1x timeout quiet-period . . . . . . . . . . . . . . . . . . . . . . . . . . 300 dot1x timeout tx-period . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301 dot1x max-req . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 302 dot1x timeout supp-timeout . . . . . . . . . . . . . . . . . . . . . . . . . 303 dot1x timeout server-timeout . . . . . . . . . . . . . . . . . . . . . . . . 304 show dot1x. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 305 show dot1x users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 308 show dot1x statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 310 clear dot1x statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 311 dot1x auth-not-req . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 312 dot1x host-mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 313 dot1x violation-mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 314 dot1x guest-vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 315 dot1x guest-vlan timeout. . . . . . . . . . . . . . . . . . . . . . . . . . . . 316 dot1x guest-vlan enable . . . . . . . . . . . . . . . . . . . . . . . . . . . . 317 dot1x mac-authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . 318 dot1x traps mac-authentication success. . . . . . . . . . . . . . 31914 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\CLI_Dell_ContaxTOC.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY dot1x traps mac-authentication failure. . . . . . . . . . . . . . . 319 dot1x radius-attributes vlan. . . . . . . . . . . . . . . . . . . . . . . . . 320 dot1x radius-attributes filter-id. . . . . . . . . . . . . . . . . . . . . . 321 dot1x radius-attributes errors . . . . . . . . . . . . . . . . . . . . . . . 322 dot1x legacy-supp-mode . . . . . . . . . . . . . . . . . . . . . . . . . . . 322 show dot1x advanced . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 323 dot1x system-auth-control monitor . . . . . . . . . . . . . . . . . . 324 show dot1x monitoring result . . . . . . . . . . . . . . . . . . . . . . . 325 20 Ethernet Configuration Commands . . . . 329 interface. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 329 interface range . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 329 description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 330 speed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 330 duplex. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331 negotiation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 332 flowcontrol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333 flowcontrol (Global) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 334 show flowcontrol. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335 mdix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 336 back-pressure. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 337 port jumbo-frame . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 337 clear counters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 338 set interface active . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 339 show interfaces configuration . . . . . . . . . . . . . . . . . . . . . . 339 show interfaces status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34015 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\CLI_Dell_ContaxTOC.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY show interfaces advertise . . . . . . . . . . . . . . . . . . . . . . . . . . 341 show interfaces description. . . . . . . . . . . . . . . . . . . . . . . . . 342 show interfaces counters . . . . . . . . . . . . . . . . . . . . . . . . . . . 343 show port jumbo-frame . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 346 show errdisable interfaces. . . . . . . . . . . . . . . . . . . . . . . . . . 346 storm-control broadcast enable . . . . . . . . . . . . . . . . . . . . . 347 storm-control broadcast level kbps . . . . . . . . . . . . . . . . . . 348 storm-control include-multicast . . . . . . . . . . . . . . . . . . . . . 349 show storm-control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 350 21 PHY Diagnostics Commands. . . . . . . . . . 351 test cable-diagnostics tdr . . . . . . . . . . . . . . . . . . . . . . . . . . . 351 show cable-diagnostics tdr . . . . . . . . . . . . . . . . . . . . . . . . . 352 show cable-diagnostics cable-length . . . . . . . . . . . . . . . . 353 show fiber-ports optical-transceiver . . . . . . . . . . . . . . . . . 353 22 Power over Ethernet (PoE) Commands . 357 power inline. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 357 power inline limit-mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . 358 power inline powered-device . . . . . . . . . . . . . . . . . . . . . . . 359 power inline priority . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 359 power inline usage-threshold . . . . . . . . . . . . . . . . . . . . . . . 360 power inline traps enable. . . . . . . . . . . . . . . . . . . . . . . . . . . 361 power inline limit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 361 show power inline . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 362 show power inline consumption . . . . . . . . . . . . . . . . . . . . . 36616 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\CLI_Dell_ContaxTOC.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY show power inline version . . . . . . . . . . . . . . . . . . . . . . . . . 367 23 EEE Commands . . . . . . . . . . . . . . . . . . . 369 eee enable (global) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 369 eee enable (interface). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 369 eee lldp enable. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 370 show eee . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 370 24 Green Ethernet . . . . . . . . . . . . . . . . . . . 377 show green-ethernet. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 377 green-ethernet short-reach (global). . . . . . . . . . . . . . . . . . 379 green-ethernet short-reach (interface) . . . . . . . . . . . . . . . 379 green-ethernet short-reach force . . . . . . . . . . . . . . . . . . . . 380 green-ethernet short-reach threshold . . . . . . . . . . . . . . . . 381 green-ethernet power-meter reset. . . . . . . . . . . . . . . . . . . 382 25 Port Channel Commands . . . . . . . . . . . . 383 channel-group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 383 port-channel load-balance . . . . . . . . . . . . . . . . . . . . . . . . . 384 show interfaces port-channel . . . . . . . . . . . . . . . . . . . . . . . 385 26 Address Table Commands . . . . . . . . . . . 387 bridge multicast filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . 387 bridge multicast address . . . . . . . . . . . . . . . . . . . . . . . . . . . 388 bridge multicast forbidden address . . . . . . . . . . . . . . . . . . 38917 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\CLI_Dell_ContaxTOC.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY bridge multicast unregistered . . . . . . . . . . . . . . . . . . . . . . . 390 bridge multicast forward-all . . . . . . . . . . . . . . . . . . . . . . . . 391 bridge multicast forbidden forward-all . . . . . . . . . . . . . . . 392 mac address-table static . . . . . . . . . . . . . . . . . . . . . . . . . . . 393 clear mac address-table . . . . . . . . . . . . . . . . . . . . . . . . . . . 394 mac address-table aging-time . . . . . . . . . . . . . . . . . . . . . . 395 port security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 396 port security mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 397 port security max . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 397 port security routed secure-address. . . . . . . . . . . . . . . . . . 398 show mac address-table . . . . . . . . . . . . . . . . . . . . . . . . . . . 399 show mac address-table count . . . . . . . . . . . . . . . . . . . . . . 401 show bridge multicast address-table. . . . . . . . . . . . . . . . . 401 show bridge multicast address-table static . . . . . . . . . . . 405 show bridge multicast filtering . . . . . . . . . . . . . . . . . . . . . . 408 show bridge multicast unregistered. . . . . . . . . . . . . . . . . . 409 show ports security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 410 show ports security addresses . . . . . . . . . . . . . . . . . . . . . . 411 27 Port Monitor Commands . . . . . . . . . . . . . 413 port monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 413 show ports monitor. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 415 28 sFlow Commands . . . . . . . . . . . . . . . . . . 417 sflow receiver . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 417 sflow flow-sampling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41818 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\CLI_Dell_ContaxTOC.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY sflow counters-sampling . . . . . . . . . . . . . . . . . . . . . . . . . . . 419 clear sflow statistics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 419 show sflow configuration . . . . . . . . . . . . . . . . . . . . . . . . . . 420 show sflow statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 421 29 LLDP Commands . . . . . . . . . . . . . . . . . . 423 lldp run . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 423 lldp transmit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 423 lldp receive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 424 lldp timer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 425 lldp hold-multiplier . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 426 lldp reinit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 427 lldp tx-delay . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 428 lldp optional-tlv . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 428 lldp management-address . . . . . . . . . . . . . . . . . . . . . . . . . . 429 lldp notifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 430 lldp notifications interval . . . . . . . . . . . . . . . . . . . . . . . . . . . 431 lldp optional-tlv 802.1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 432 lldp med enable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 433 lldp med notifications topology-change . . . . . . . . . . . . . . 434 lldp med fast-start repeat-count . . . . . . . . . . . . . . . . . . . . . 435 lldp med network-policy (global) . . . . . . . . . . . . . . . . . . . . 435 lldp med network-policy (interface) . . . . . . . . . . . . . . . . . 436 clear lldp table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 437 lldp med location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 438 show lldp configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43919 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\CLI_Dell_ContaxTOC.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY show lldp med configuration . . . . . . . . . . . . . . . . . . . . . . . . 441 show lldp local tlvs-overloading. . . . . . . . . . . . . . . . . . . . . 443 show lldp local . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 444 show lldp neighbors. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 446 show lldp statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 451 30 Spanning-Tree Commands . . . . . . . . . . . 453 spanning-tree . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 453 spanning-tree mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 453 spanning-tree forward-time . . . . . . . . . . . . . . . . . . . . . . . . . 454 spanning-tree hello-time. . . . . . . . . . . . . . . . . . . . . . . . . . . . 455 spanning-tree max-age . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 456 spanning-tree priority . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 457 spanning-tree disable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 458 spanning-tree cost . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 459 spanning-tree port-priority . . . . . . . . . . . . . . . . . . . . . . . . . . 460 spanning-tree portfast . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 460 spanning-tree link-type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 461 spanning-tree pathcost method . . . . . . . . . . . . . . . . . . . . . . 462 spanning-tree bpdu (Global). . . . . . . . . . . . . . . . . . . . . . . . . 463 spanning-tree bpdu (Interface) . . . . . . . . . . . . . . . . . . . . . . 464 spanning-tree guard root. . . . . . . . . . . . . . . . . . . . . . . . . . . . 465 spanning-tree bpduguard . . . . . . . . . . . . . . . . . . . . . . . . . . . 466 clear spanning-tree detected-protocols . . . . . . . . . . . . . . 467 spanning-tree mst priority. . . . . . . . . . . . . . . . . . . . . . . . . . . 467 spanning-tree mst max-hops . . . . . . . . . . . . . . . . . . . . . . . . 46820 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\CLI_Dell_ContaxTOC.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY spanning-tree mst port-priority . . . . . . . . . . . . . . . . . . . . . . 469 spanning-tree mst cost . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 470 spanning-tree mst configuration. . . . . . . . . . . . . . . . . . . . . 471 instance (MST) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 472 name (MST) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 473 revision (MST) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 473 show (MST) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 474 exit (MST) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 475 abort (MST) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 476 show spanning-tree. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 476 show spanning-tree bpdu. . . . . . . . . . . . . . . . . . . . . . . . . . . 491 31 VLAN Commands . . . . . . . . . . . . . . . . . . 493 vlan database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 493 vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 493 interface vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 494 interface range vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 495 name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 496 switchport protected-port . . . . . . . . . . . . . . . . . . . . . . . . . . 497 switchport community . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 498 show interfaces protected-ports . . . . . . . . . . . . . . . . . . . . 498 switchport . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 499 switchport mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 500 switchport access vlan. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 501 switchport access multicast-tv vlan . . . . . . . . . . . . . . . . . 502 switchport trunk allowed vlan . . . . . . . . . . . . . . . . . . . . . . 50321 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\CLI_Dell_ContaxTOC.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY switchport trunk native vlan. . . . . . . . . . . . . . . . . . . . . . . . . 504 switchport general allowed vlan . . . . . . . . . . . . . . . . . . . . 505 switchport general pvid . . . . . . . . . . . . . . . . . . . . . . . . . . . . 506 switchport general ingress-filtering disable . . . . . . . . . . 507 switchport general acceptable-frame-type . . . . . . . . . . . 508 switchport customer vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . 509 switchport general forbidden vlan . . . . . . . . . . . . . . . . . . . 509 map protocol protocols-group . . . . . . . . . . . . . . . . . . . . . . . 510 switchport general map protocols-group vlan . . . . . . . . . 511 private-vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 512 private-vlan association . . . . . . . . . . . . . . . . . . . . . . . . . . . . 513 switchport private-vlan mapping . . . . . . . . . . . . . . . . . . . . 514 switchport private-vlan host-association . . . . . . . . . . . . . 515 show vlan private-vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 516 ip internal-usage-vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 516 show vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 518 show vlan multicast-tv . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 519 show vlan protocols-groups. . . . . . . . . . . . . . . . . . . . . . . . . 519 show vlan internal usage . . . . . . . . . . . . . . . . . . . . . . . . . . . 520 show interfaces switchport . . . . . . . . . . . . . . . . . . . . . . . . . 521 32 IGMP Snooping Commands . . . . . . . . . . 523 ip igmp snooping (Global) . . . . . . . . . . . . . . . . . . . . . . . . . . . 523 ip igmp snooping vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 523 ip igmp snooping mrouter . . . . . . . . . . . . . . . . . . . . . . . . . . 524 ip igmp snooping mrouter interface . . . . . . . . . . . . . . . . . . 52522 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\CLI_Dell_ContaxTOC.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY ip igmp snooping forbidden mrouter interface . . . . . . . . 526 ip igmp snooping static . . . . . . . . . . . . . . . . . . . . . . . . . . . . 527 ip igmp snooping multicast-tv . . . . . . . . . . . . . . . . . . . . . . . 528 ip igmp snooping querier . . . . . . . . . . . . . . . . . . . . . . . . . . . 529 ip igmp snooping querier address . . . . . . . . . . . . . . . . . . . 530 ip igmp robustness. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 531 ip igmp query-interval. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 531 ip igmp query-max-response-time . . . . . . . . . . . . . . . . . . . 532 ip igmp last-member-query-count . . . . . . . . . . . . . . . . . . . 533 ip igmp last-member-query-interval . . . . . . . . . . . . . . . . . 534 ip igmp snooping vlan immediate-leave . . . . . . . . . . . . . . 534 show ip igmp snooping mrouter . . . . . . . . . . . . . . . . . . . . . 535 show ip igmp snooping interface . . . . . . . . . . . . . . . . . . . . 536 show ip igmp snooping groups . . . . . . . . . . . . . . . . . . . . . . 537 show ip igmp snooping multicast-tv . . . . . . . . . . . . . . . . . 538 33 LACP Commands . . . . . . . . . . . . . . . . . . 541 lacp system-priority. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 541 lacp port-priority . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 542 lacp timeout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 542 show lacp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 543 show lacp port-channel . . . . . . . . . . . . . . . . . . . . . . . . . . . . 546 34 GVRP Commands . . . . . . . . . . . . . . . . . . 547 gvrp enable (Global) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 547 gvrp enable (Interface) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54723 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\CLI_Dell_ContaxTOC.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY garp timer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 548 gvrp vlan-creation-forbid . . . . . . . . . . . . . . . . . . . . . . . . . . . 550 gvrp registration-forbid . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 550 clear gvrp statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 551 show gvrp configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . 552 show gvrp statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 553 show gvrp error-statistics. . . . . . . . . . . . . . . . . . . . . . . . . . . 554 35 Voice VLAN Commands . . . . . . . . . . . . . 557 voice vlan id. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 557 voice vlan oui-table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 558 voice vlan cos mode. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 559 voice vlan cos . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 560 voice vlan aging-timeout. . . . . . . . . . . . . . . . . . . . . . . . . . . . 561 voice vlan enable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 561 voice vlan secure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 562 show voice vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 563 36 DHCP Snooping and ARP Inspection Commands 567 ip dhcp snooping. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 567 ip dhcp snooping vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 568 ip dhcp snooping trust . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 568 ip dhcp snooping information option allowed-untrusted 569 ip dhcp snooping verify . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 570 ip dhcp snooping database. . . . . . . . . . . . . . . . . . . . . . . . . . 57124 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\CLI_Dell_ContaxTOC.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY ip dhcp snooping database update-freq . . . . . . . . . . . . . . 572 ip dhcp snooping binding . . . . . . . . . . . . . . . . . . . . . . . . . . . 572 clear ip dhcp snooping database . . . . . . . . . . . . . . . . . . . . 574 show ip dhcp snooping. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 574 show ip dhcp snooping binding . . . . . . . . . . . . . . . . . . . . . 575 ip arp inspection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 576 ip arp inspection vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 577 ip arp inspection trust . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 578 ip arp inspection validate. . . . . . . . . . . . . . . . . . . . . . . . . . . 579 ip arp inspection list create. . . . . . . . . . . . . . . . . . . . . . . . . 580 ip mac. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 580 ip arp inspection list assign. . . . . . . . . . . . . . . . . . . . . . . . . 581 ip arp inspection logging interval. . . . . . . . . . . . . . . . . . . . 582 show ip arp inspection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 583 show ip arp inspection list. . . . . . . . . . . . . . . . . . . . . . . . . . 584 show ip arp inspection statistics . . . . . . . . . . . . . . . . . . . . 584 clear ip arp inspection statistics . . . . . . . . . . . . . . . . . . . . 585 ip dhcp information option . . . . . . . . . . . . . . . . . . . . . . . . . . 586 show ip dhcp information option . . . . . . . . . . . . . . . . . . . . 586 37 iSCSI Commands . . . . . . . . . . . . . . . . . . 589 iscsi enable. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 589 iscsi target port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 590 iscsi cos. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 591 iscsi aging-time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 593 iscsi max-tcp-connections . . . . . . . . . . . . . . . . . . . . . . . . . 59425 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\CLI_Dell_ContaxTOC.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY show iscsi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 595 show iscsi sessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 596 38 IP Addressing Commands . . . . . . . . . . . . 599 address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 599 ip address dhcp. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 601 renew dhcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 602 ip default-gateway . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 603 show ip interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 603 arp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 604 arp timeout (Global) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 605 arp timeout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 606 ip arp proxy disable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 607 ip proxy-arp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 607 clear arp-cache. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 608 show arp. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 608 show arp configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 609 interface ip. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 610 directed-broadcast. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 611 broadcast-address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 612 ip helper-address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 612 show ip helper-address. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 614 source-precedence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 615 ip domain lookup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 616 ip domain name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 616 ip name-server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61726 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\CLI_Dell_ContaxTOC.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY ip host. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 619 clear host. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 620 clear host dhcp. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 620 show hosts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 621 39 IPv6 Addressing Commands . . . . . . . . . 623 ipv6 enable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 623 ipv6 address autoconfig . . . . . . . . . . . . . . . . . . . . . . . . . . . . 624 ipv6 icmp error-interval . . . . . . . . . . . . . . . . . . . . . . . . . . . . 625 show ipv6 icmp error-interval . . . . . . . . . . . . . . . . . . . . . . . 626 ipv6 address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 627 ipv6 address link-local . . . . . . . . . . . . . . . . . . . . . . . . . . . . 628 ipv6 unreachables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 629 ipv6 default-gateway. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 630 show ipv6 interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 631 show IPv6 route . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 633 ipv6 nd dad attempts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 634 ipv6 host. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 635 ipv6 neighbor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 636 ipv6 set mtu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 637 ipv6 mld version . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 638 ipv6 mld join-group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 639 show ipv6 neighbors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 640 clear ipv6 neighbors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64127 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\CLI_Dell_ContaxTOC.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY 40 Tunnel Commands . . . . . . . . . . . . . . . . . . 643 interface tunnel. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 643 tunnel mode ipv6ip . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 643 tunnel isatap router . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 644 tunnel source . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 645 tunnel isatap query-interval . . . . . . . . . . . . . . . . . . . . . . . . . 646 tunnel isatap solicitation-interval. . . . . . . . . . . . . . . . . . . . 647 tunnel isatap robustness . . . . . . . . . . . . . . . . . . . . . . . . . . . . 648 show ipv6 tunnel. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 649 41 DHCP Relay Commands . . . . . . . . . . . . . 651 ip dhcp relay enable (Global) . . . . . . . . . . . . . . . . . . . . . . . . 651 ip dhcp relay enable (Interface). . . . . . . . . . . . . . . . . . . . . . 651 ip dhcp relay address (Global) . . . . . . . . . . . . . . . . . . . . . . . 652 ip dhcp relay address (Interface). . . . . . . . . . . . . . . . . . . . . 653 show ip dhcp relay . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 654 ip dhcp information option . . . . . . . . . . . . . . . . . . . . . . . . . . 655 show ip dhcp information option. . . . . . . . . . . . . . . . . . . . . 656 42 DHCP Server Commands . . . . . . . . . . . . 657 ip dhcp server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 657 ip dhcp pool host. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 657 ip dhcp pool network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 658 address (DHCP Host) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 659 address (DHCP Network) . . . . . . . . . . . . . . . . . . . . . . . . . . . 66028 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\CLI_Dell_ContaxTOC.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY lease . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 661 client-name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 663 default-router . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 663 dns-server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 664 domain-name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 665 netbios-name-server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 666 netbios-node-type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 667 next-server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 667 next-server-name. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 668 bootfile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 669 time-server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 670 option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 671 ip dhcp excluded-address . . . . . . . . . . . . . . . . . . . . . . . . . . 672 ip dhcp ping enable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 673 ping enable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 674 ip dhcp ping count . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 675 ip dhcp ping timeout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 676 clear ip dhcp binding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 677 show ip dhcp. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 677 show ip dhcp excluded-addresses . . . . . . . . . . . . . . . . . . 678 show ip dhcp pool host. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 678 show ip dhcp pool network . . . . . . . . . . . . . . . . . . . . . . . . . 680 show ip dhcp binding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 681 show ip dhcp server statistics . . . . . . . . . . . . . . . . . . . . . . 683 show ip dhcp allocated . . . . . . . . . . . . . . . . . . . . . . . . . . . . 684 show ip dhcp declined . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68629 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\CLI_Dell_ContaxTOC.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY show ip dhcp expired . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 687 show ip dhcp pre-allocated . . . . . . . . . . . . . . . . . . . . . . . . . 688 43 IP Routing Protocol-Independent Commands 691 ip route . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 691 ip routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 692 show ip route. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 692 44 ACL Commands . . . . . . . . . . . . . . . . . . . . 695 ip access-list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 695 permit ( IP ) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 696 deny ( IP ) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 698 ipv6 access-list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 702 permit ( IPv6 ) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 703 deny ( IPv6 ) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 705 mac access-list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 708 permit ( MAC ) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 709 service-acl input. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 710 service-acl output. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 711 service-acl input block . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 712 time-range . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 713 absolute . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 714 periodic. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 715 show time-range. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 717 show access-lists. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 717 show interfaces access-lists . . . . . . . . . . . . . . . . . . . . . . . . 71930 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\CLI_Dell_ContaxTOC.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY clear access-lists counters . . . . . . . . . . . . . . . . . . . . . . . . . 719 show interfaces access-lists counters . . . . . . . . . . . . . . . 720 45 Quality of Service (QoS) Commands . . . 723 qos. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 723 show qos . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 724 class-map . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 725 show class-map . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 726 match . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 727 policy-map. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 727 class . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 729 show policy-map . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 730 trust. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 731 set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 732 police . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 733 service-policy. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 735 qos aggregate-policer. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 735 show qos aggregate-policer . . . . . . . . . . . . . . . . . . . . . . . . 737 police aggregate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 737 wrr-queue cos-map . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 738 wrr-queue bandwidth . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 740 priority-queue out num-of-queues . . . . . . . . . . . . . . . . . . . 741 traffic-shape . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 742 traffic-shape queue . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 743 rate-limit (Ethernet) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 744 qos wrr-queue wrtd. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74431 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\CLI_Dell_ContaxTOC.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY show qos interface. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 745 qos wrr-queue threshold . . . . . . . . . . . . . . . . . . . . . . . . . . . . 748 qos map policed-dscp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 749 qos map dscp-queue . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 750 qos map dscp-dp. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 751 qos trust (Global). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 752 qos trust (Interface) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 753 qos cos . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 754 qos dscp-mutation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 755 qos map dscp-mutation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 756 show qos map . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 757 clear qos statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 759 qos statistics policer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 759 qos statistics aggregate-policer . . . . . . . . . . . . . . . . . . . . . 760 qos statistics queues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 760 show qos statistics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76132 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\CLI_Dell_ContaxTOC.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY33 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\CLI_Preface.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY 1 Preface About this Document This CLI Reference Guide describes how to use the CLI and a list of the CLI commands and their arguments. The CLI commands described in this document are organized according to feature groups in separate sections. This section describes how to use the CLI. It contains the following topics: • CLI Command Modes • Starting the CLI • CLI Command Conventions • Entering Commands CLI Command Modes To configure devices, the CLI is divided into various command modes. Each command mode has its own set of specific commands. Entering a question mark "?" at the console prompt displays a list of commands available for that particular command mode. A specific command, which varies from mode to mode, is used to navigate from one mode to another. The standard order to access the modes is as follows: User EXEC mode, Privileged EXEC mode, Global Configuration mode, and Interface Configuration modes. When starting a session, the initial mode for non-privileged users is the User EXEC mode. Only a limited subset of commands is available in the User EXEC mode. This level is reserved for tasks that do not change the configuration. 34 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\CLI_Preface.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Privileged users enter the Privileged EXEC mode directly using a password. This mode provides access to the device Configuration modes. The modes are described below. User EXEC Mode After logging into the device, the user is automatically in User EXEC command mode unless the user is defined as a privileged user. In general, the User EXEC commands enable the user to perform basic tests, and display system information. The user-level prompt consists of the device "host name" followed by the angle bracket (>). console> The default host name is "console" unless it has been changed using the hostname command in the Global Configuration mode. Privileged EXEC Mode Privileged access is password-protected to prevent unauthorized use, because many of the privileged commands set operating system parameters: The password is not displayed on the screen and is case sensitive. Privileged users enter directly into the Privileged EXEC mode. Use disable to return to the User EXEC mode. Global Configuration Mode Global Configuration mode commands apply to features that affect the system as a whole, rather than just a specific interface. To enter the Global Configuration mode, enter configure in the Privileged EXEC mode, and press . The Global Configuration mode prompt is displayed. console(config)# Use exit, end or ctrl/z to return to the Privileged EXEC mode. Interface Configuration Modes Commands in the following modes perform specific interface operations:35 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\CLI_Preface.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY • Line Interface — Contains commands to configure the management connections. These include commands such as line speed, timeout settings, etc. The Global Configuration mode command line is used to enter the Line Configuration command mode. • VLAN Database — Contains commands to create a VLAN as a whole. The Global Configuration mode command vlan database is used to enter the VLAN Database Interface Configuration mode. • Management Access List — Contains commands to define management access-lists. The Global Configuration mode command management access-list is used to enter the Management Access List Configuration mode. • Port Channel — Contains commands to configure port-channels, for example, assigning ports to a VLAN or port-channel. The Global Configuration mode command interface port-channel is used to enter the Port Channel Interface Configuration mode. • SSH Public Key-Chain — Contains commands to manually specify other device SSH public keys. The Global Configuration mode command crypto key pubkey-chain ssh is used to enter the SSH Public Key-chain Configuration mode. • Interface — Contains commands that configure the interface. The Global Configuration mode command interface is used to enter the Interface Configuration mode. Starting the CLI The switch can be managed over a direct connection to the switch console port, or via a Telnet connection. The switch is managed by entering command keywords and parameters at the prompt. Using the switch CLI commands is similar to entering commands on a UNIX system. If access is via a Telnet connection, ensure the device has an IP address defined, corresponding management access is granted, and the workstation used to access the device is connected to the device prior to using CLI commands. Accessing the CLI from the Console Line 1. Start the device and wait until the startup procedure is complete. The User Exec mode is entered, and the prompt "console>" is displayed. 36 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\CLI_Preface.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY 2. Configure the device and enter the necessary commands to complete the required tasks. 3. When finished, exit the session with the quit or exit command. Accessing the CLI from Telnet 1. Enter telnet and the IP address of the device. A User Name prompt is displayed. 2. Enter the User Name and Password. You are in the Privileged Exec mode. 3. Configure the device and enter the necessary commands to complete the required tasks. 4. When finished, exit the session with the quit or exit command. When another user is required to log onto the system, the login command is entered in the Privileged EXEC command mode,. This effectively logs off the current user and logs on the new user. CLI Command Conventions The following table describes the command syntax conventions. Conventions Description [ ] In a command line, square brackets indicates an optional entry. { } In a command line, curly brackets indicate a selection of compulsory parameters separated by the | character. One option must be selected. For example: flowcontrol {auto|on|off} means that for the flowcontrol command either auto, on or off must be selected. Italic font Indicates a parameter. Any individual key on the keyboard. For example click . Ctrl+F4 Any combination keys pressed simultaneously on the keyboard.37 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\CLI_Preface.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Entering Commands A CLI command is a series of keywords and arguments. Keywords identify a command, and arguments specify configuration parameters. For example, in the command "show interfaces status gi1/0/5" show, interfaces and status are keywords, gi is an argument that specifies the interface type, and 1/0/5 is an argument that specifies the port. To enter commands that require parameters, enter the required parameters after the command keyword. For example, to set a password for the administrator, enter: console(config)# username admin password smith Help information can be displayed in the following ways: • Keyword Lookup — The character ? is entered in place of a command. A list of all valid commands and corresponding help messages are displayed. • Partial Keyword Lookup — A command is incomplete and the character ? is entered in place of a parameter. The matched parameters for this command are displayed. The following describes features that assist in using the CLI: Terminal Command Buffer Every time a command is entered in the CLI, it is recorded on an internally managed Command History buffer. Commands stored in the buffer are maintained on a First In First Out (FIFO) basis.These commands can be Screen Display Indicates system messages and prompts appearing on the console. all When a parameter is required to define a range of ports or parameters and all is an option, the default for the command is all when no parameters are defined. For example, the command interface range port-channel has the option of either entering a range of channels, or selecting all. When the command is entered without a parameter, it automatically defaults to all. Conventions Description38 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\CLI_Preface.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY recalled, reviewed, modified, and reissued. This buffer is not preserved across device resets. The keys that can be used to access the history buffer are described in Table 1. By default, the history buffer system is enabled, but it can be disabled at any time. For information about the command syntax to enable or disable the history buffer, see the history command. There is a standard default number of commands that are stored in the buffer. The standard number of 10 commands can be increased to 256. By configuring 0, the effect is the same as disabling the history buffer system. For information about the command syntax for configuring the command history buffer, see the history size command. To display the history buffer, see show history command. Negating the Effect of Commands For many configuration commands, the prefix keyword "no" can be entered to cancel the effect of a command or reset the configuration to the default value. This guide describes the negation effect for all applicable commands. Command Completion If the command entered is incomplete, invalid, or has missing or invalid parameters, an appropriate error message is displayed. To complete an incomplete command, press the button. If the characters already entered are not enough for the system to identify a single matching command, press "?" to display the available commands matching the characters already entered. Incorrect or incomplete commands are automatically re-entered next to the cursor. If a parameter must be added, the parameter can be added to the basic command already displayed next to the cursor. The following example indicates that the command interface requires a missing parameter. (config)#interface %missing mandatory parameter (config)#interface39 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\CLI_Preface.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Keyboard Shortcuts The CLI has a range of keyboard shortcuts to assist in entering the CLI commands. The following table describes these shortcuts: Table 1: Keyboard Keys Keyboard Key Description Up-arrow key Recalls commands from the history buffer, beginning with the most recent command. Repeat the key sequence to recall successively older commands. Down-arrow key Returns the most recent commands from the history buffer after recalling commands with the up arrow key. Repeating the key sequence will recall successively more recent commands. Ctrl+A Moves the cursor to the beginning of the command line. Ctrl+E Moves the cursor to the end of the command line. Ctrl+Z / End Returns back to the Privileged EXEC mode from any mode. Backspace key Moves the cursor back one space. Up-arrow key Recalls commands from the history buffer, beginning with the most recent command. Repeat the key sequence to recall successively older commands.40 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\CLI_Preface.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LYUser Interface Commands 41 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\User_Interface.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY 2 User Interface Commands enable The enable EXEC mode command enters the Privileged EXEC mode. Syntax enable [privilege-level] Parameters privilege-level—Specifies the privilege level at which to enter the system. (Range: 1–15) Default Configuration The default privilege level is 15. Command Mode EXEC mode Example The following example enters the Privileged EXEC mode. Console> enable enter password: Console#42 User Interface Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\User_Interface.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY disable The disable Privileged EXEC mode command leaves the Privileged EXEC mode and returns to the User EXEC mode. Syntax disable [privilege-level] Parameters privilege-level—Specifies the privilege level at which to enter the system. (Range: 1–15) Default Configuration The default privilege level is 1. Command Mode Privileged EXEC mode Example The following example returns to the User EXEC mode. Console# disable Console> login The login EXEC mode command changes a user’s login. Syntax login Command Mode EXEC modeUser Interface Commands 43 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\User_Interface.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example The following example enters Privileged EXEC mode and logs in with username ‘admin’. Console> login User Name:admin Password:***** Console# configure The configure Privileged EXEC mode command enters the Global Configuration mode. Syntax configure [terminal] Parameters terminal—Enter the Global Configuration mode with or without the keyword terminal. Command Mode Privileged EXEC mode Example The following example enters Global Configuration mode. Console# configure Console(config)# exit (Configuration) The exit command exits any configuration mode to the next highest mode in the CLI mode hierarchy.44 User Interface Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\User_Interface.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Syntax exit Command Mode All commands in configuration modes. Examples The following examples change the configuration mode from Interface Configuration mode to Privileged EXEC mode. Console(config-if)# exit Console(config)# exit Console# Router(config-if)# exit Router(config)# exit Router# exit (EXEC) The exit EXEC mode command closes an active terminal session by logging off the device. Syntax exit Command Mode EXEC mode Example The following examples close an active terminal session. Console> exit Router> exitUser Interface Commands 45 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\User_Interface.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY end The end command ends the current configuration session and returns to the Privileged EXEC mode. Syntax end Command Mode All configuration modes Example The following examples end the Global Configuration mode session and return to the Privileged EXEC mode. Console(config)# end Console# Router(config-if)# end Router# help The help command displays a brief description of the Help system. Syntax help Command Mode All command modes Example The following example describes the Help system. Console# help46 User Interface Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\User_Interface.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Help may be requested at any point in a command by entering a question mark '?'. If nothing matches the currently entered incomplete command, the help list is empty. This indicates that there is no command matching the input as it currently appears. If the request is within a command, press the Backspace key and erase the entered characters to a point where the request results in a match. Help is provided when: 1. There is a valid command and a help request is made for entering a parameter or argument (e.g. 'show ?'). All possible parameters or arguments for the entered command are then displayed. 2. An abbreviated argument is entered and a help request is made for arguments matching the input (e.g. 'show pr?'). history The history Line Configuration mode command enables the command history function. Use the no form of this command to disable the command history function. Syntax history no history Default Configuration The history command is enabled. Command Mode Line Configuration mode User Guidelines This command enables the command history function for a specified line. Use the terminal history EXEC mode command to enable or disable the command history function for the current terminal session.User Interface Commands 47 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\User_Interface.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example The following example enables the command history function for Telnet. Console(config)# line telnet Console(config-line)# history history size The history size Line Configuration mode command changes the command history buffer size for a particular line. Use the no form of this command to reset the command history buffer size to the default value. Syntax history size number-of-commands no history size Parameters number-of-commands—Specifies the number of commands the system records in its history buffer. (Range: 0–256) Default Configuration The default command history buffer size is 10 commands. Command Mode Line Configuration mode User Guidelines This command configures the command history buffer size for a particular line. Use the terminal history size EXEC mode command to configure the command history buffer size for the current terminal session. The allocated command history buffer is per terminal user, and is taken from a shared buffer. If there is not enough space available in the shared buffer, the command history buffer size () cannot be increased above the default size.48 User Interface Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\User_Interface.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example The following example changes the command history buffer size to 100 entries for a particular line Console(config)# line telnet Console(config-line)# history size 100 terminal history The terminal history EXEC mode command enables the command history function for the current terminal session. Use the no form of this command to disable the command history function. Syntax terminal history terminal no history Default Configuration The default configuration for all terminal sessions is defined by the history Line Configuration mode command. Command Mode EXEC mode User Guidelines The command enables the command history for the current session. The default is determined by the history Line Configuration mode command. Example The following example disables the command history function for the current terminal session. Console> terminal no historyUser Interface Commands 49 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\User_Interface.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY terminal history size The terminal history size EXEC mode command changes the command history buffer size for the current terminal session. Use the no form of this command to reset the command history buffer size to the default value. Syntax terminal history size number-of-commands terminal no history size Parameters number-of-commands—Specifies the number of commands the system maintains in its history buffer. (Range: 10–256) Default Configuration The default configuration for all terminal sessions is defined by the history size Line Configuration mode command. Command Mode EXEC mode User Guidelines The terminal history size EXEC command changes the command history buffer size for the current terminal session. Use the history Line Configuration mode command to change the default command history buffer size. The maximum number of commands in all buffers is 256. Example The following example sets the command history buffer size to 20 commands for the current terminal session. Console> terminal history size 2050 User Interface Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\User_Interface.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY terminal datadump The terminal datadump EXEC mode command enables dumping all the output of a show command without prompting. Use the no form of this command to disable dumping. Syntax terminal datadump terminal no datadump Default Configuration Dumping is disabled. Command Mode EXEC mode User Guidelines By default, a More prompt is displayed when the output contains more lines than can be displayed on the screen. Pressing the Enter key displays the next line; pressing the Spacebar displays the next screen of output. The terminal datadump command enables dumping all output immediately after entering the show command. This command is relevant only for the current session. Example The following example dumps all output immediately after entering a show command. Console> terminal datadump debug-mode The debug-mode Privileged EXEC mode command mode switches to debug mode.User Interface Commands 51 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\User_Interface.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Syntax debug-mode Command Mode Privileged EXEC mode Example The following example enters Debug mode. Console# debug-mode show history The show history EXEC mode command lists commands entered in the current session. Syntax show history Command Mode EXEC mode User Guidelines The buffer includes executed and unexecuted commands. Commands are listed from the first to the most recent command. The buffer remains unchanged when entering into and returning from configuration modes. Example The following example displays all the commands entered while in the current Privileged EXEC mode. Console# show version SW version 3.131 (date 23-Jul-2005 time 17:34:19) HW version 1.0.0 Console# show clock52 User Interface Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\User_Interface.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY 15:29:03 Jun 17 2005 Console# show history show version show clock show history 3 commands were logged (buffer size is 10) show privilege The show privilege EXEC mode command displays the current privilege level. Syntax show privilege Command Mode EXEC mode Example The following example displays the current privilege level for the Privileged EXEC mode. Console# show privilege Current privilege level is 15 do The do command executes an EXEC-level command from Global Configuration mode or any configuration submode. Syntax do command Parameters command—Specifies the EXEC-level command to execute.User Interface Commands 53 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\User_Interface.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Command Mode All configuration modes Example The following example executes the show vlan Privileged EXEC mode command from Global Configuration mode. Example Console (Config)# do show vlan Vlan Name Ports Type Authorization ---- ---- --------------------------- -------- ------------- 1 1 gi1/0/1-39,Po1,Po2, other Required Po3,Po4,Po5,Po6,Po7,Po8 2 2 gi1/0/1 dynamicGvrp Required 10 v0010 gi1/0/1 permanent Not Required 11 V0011 gi1/0/1,gi1/0/13 permanent Required 20 20 gi1/0/1 permanent Required 30 30 gi1/0/1,gi1/0/13 permanent Required 31 31 gi1/0/1 permanent Required 91 91 gi1/0/1,gi1/0/40 permanent Required 4093 guest-vlan gi1/0/1,gi1/0/13 permanent Guest console(config)#s banner exec Use the banner exec command to specify and enable a message to be displayed when an EXEC process is created (The user has successfully logged in), use the banner exec command in Global Configuration mode. Use the no form of this command to delete the existing EXEC banner. Syntax banner exec d message-text d no banner exec54 User Interface Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\User_Interface.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Parameters • d—Delimiting character of your choice—a pound sign (#), for example. You cannot use the delimiting character in the banner message. • message-text—The message must start in a new line. You can enter multiline messages. You can include tokens in the form of $(token) in the message text. Tokens are replaced with the corresponding configuration variable. Tokens are described in the User Guidelines. The message can contain up to 2000 characters (after every 510 characters, you must press to continue). Default Configuration Disabled (no EXEC banner is displayed). Command Mode Global Configuration mode User Guidelines Follow this command with one or more blank spaces and a delimiting character of your choice. Then enter one or more lines of text, terminating the message with the second occurrence of the delimiting character. When a user connects to a device, the message-of-the-day (MOTD) banner appears first, followed by the login banner and prompts. After the user logs in to the device, the EXEC banner is displayed. Use tokens in the form of $(token) in the message text to customize the banner. The tokens are described in the table below: Token Information displayed in the banner $(hostname) Displays the host name for the device. $(domain) Displays the domain name for the device. $(bold) Indicates that the next text is a bold text. Using this token again indicates the end of the bold text. $(inverse) Indicates that the next text is an inverse text. Using this token again indicates the end of the inverse text. $(contact) Displays the system contact string.User Interface Commands 55 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\User_Interface.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Use the no exec-banner line configuration command to disable the EXEC banner on a particular line or lines. Example The following example sets an EXEC banner that uses tokens. The percent sign (%) is used as a delimiting character. Note that the $(token) syntax is replaced by the corresponding configuration variable. Device(config)# banner exec % Enter TEXT message. End with the character '%'. $(bold)Session activated.$(bold) Enter commands at the prompt. % When a user logs on to the system, the following output is displayed: Session activated. Enter commands at the prompt. banner login Use the banner login command in Global Configuration mode to specify and enable a message to be displayed before the username and password login prompts. Use the no form of this command to delete the existing Login banner. Syntax banner login d message-text d no banner login Parameters • Delimiting character of your choice—A pound sign (#), for example. You cannot use the delimiting character in the banner message. $(location) Displays the system location string. $(macaddress) Displays the base MAC address of the device.56 User Interface Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\User_Interface.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY • message-text—Message text. The message must start on a new line. You can enter multi-line messages. You can include tokens in the form of $(token) in the message text. Tokens are replaced with the corresponding configuration variable. Tokens are described in the User Guidelines. The message can contain up to 2000 characters (after every 510 characters, you must press to continue). Default Configuration Disabled (no Login banner is displayed). Command Mode Global Configuration mode User Guidelines Follow this command with one or more blank spaces and a delimiting character of your choice. Then enter one or more lines of text, terminating the message with the second occurrence of the delimiting character. When a user connects to a device, the message-of-the-day (MOTD) banner appears first, followed by the login banner and prompts. After the user logs in to the device, the EXEC banner is displayed. Use tokens in the form of $(token) in the message text to customize the banner. The tokens are described in the table below: Token Information displayed in the banner $(hostname) Displays the host name for the device. $(domain) Displays the domain name for the device. $(bold) Indicates that the next text is a bold text. Using this token again indicates the end of the bold text. $(inverse) Indicates that the next text is an inverse text. Using this token again indicates the end of the inverse text. $(contact) Displays the system contact string. $(location) Displays the system location string. $(macaddress) Displays the base MAC address of the device.User Interface Commands 57 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\User_Interface.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Use the no login-banner line configuration command to disable the Login banner on a particular line or lines. Example The following example sets a Login banner that uses tokens. The percent sign (%) is used as a delimiting character. Note that the $(token) syntax is replaced by the corresponding configuration variable. Device(config)# banner login % Enter TEXT message. End with the character '%'. You have entered $(hostname).$(domain) % When the login banner is executed, the user will see the following banner: You have entered host123.ourdomain.com banner motd Use the banner motd command in Global Configuration mode to specify and enable a message-of-the-day banner. Use the no form of this command to delete the existing MOTD banner. Syntax banner motd d message-text d no banner motd Parameters • d—Delimiting character of your choice—a pound sign (#), for example. You cannot use the delimiting character in the banner message. • message-text—The message must start on a new line. You can enter multiline messages. You can include tokens in the form of $(token) in the message text. Tokens are replaced with the corresponding configuration variable. Tokens are described in the User Guidelines. The message can contain up to 2000 characters (after every 510 characters, you must press to continue).58 User Interface Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\User_Interface.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Default Configuration Disabled (no MOTD banner is displayed). Command Mode Global Configuration mode User Guidelines Follow this command with one or more blank spaces and a delimiting character of your choice. Then enter one or more lines of text, terminating the message with the second occurrence of the delimiting character. When a user connects to a device, the message-of-the-day (MOTD) banner appears first, followed by the login banner and prompts. After the user logs in to the device, the EXEC banner is displayed. Use tokens in the form of $(token) in the message text to customize the banner. The tokens are described in the table below: Use the no motd-banner line configuration command to disable the MOTD banner on a particular line or lines. Example The following example sets an MOTD banner that uses tokens. The percent sign (%) is used as a delimiting character. Note that the $(token) syntax is replaced by the corresponding configuration variable. Token Information displayed in the banner $(hostname) Displays the host name for the device. $(domain) Displays the domain name for the device. $(bold) Indicates that the next text is a bold text. Using this token again to indicates the end of the bold text. $(inverse) Indicates that the next text is an inverse text. Using this token again indicates the end of the inverse text. $(contact) Displays the system contact string. $(location) Displays the system location string. $(mac-address) Displays the base MAC address of the device.User Interface Commands 59 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\User_Interface.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Device(config)# banner motd % Enter TEXT message. End with the character '%'. $(bold)Upgrade$(bold) to all devices begins at March 12 % When the login banner is executed, the user will see the following banner: Upgrade to all devices begins at March 12 exec-banner Use the exec-banner command in Line Configuration mode to enable the display of exec banners. Use the no form of this command to disable the display of exec banners. Syntax exec-banner no exec-banner Parameters This command has no arguments or keywords. Default Configuration Disabled Command Mode Line Configuration mode Example console# configure console(config)# line console console(config-line)# exec-banner console(config-line)# exit console(config)# line telnet console(config-line)# exec-banner console(config-line)# exit60 User Interface Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\User_Interface.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY console(config)# line ssh console(config-line)# exec-banner login-banner Use the login-banner command in Line Configuration mode to enable the display of login banners. Use the no form of this command to disable the display of login banners. Syntax login-banner no login-banner Parameters This command has no arguments or keywords. Default Configuration Enabled Command Mode Line Configuration mode Example console# configure console(config)# line console console(config-line)# login-banner console(config-line)# exit console(config)# line telnet console(config-line)# login-banner console(config-line)# exit console(config)# line ssh console(config-line)# login-bannerUser Interface Commands 61 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\User_Interface.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY motd-banner Use the motd-banner command in Line Configuration mode to enable the display of message-of-the-day banners. Use the no form of this command to disable the display of MOTD banners. Syntax motd-banner no motd-banner Parameters This command has no arguments or keywords. Default Configuration Enabled Command Mode Line Configuration mode Example console# configure console(config)# line console console(config-line)# motd-banner console(config-line)# exit console(config)# line telnet console(config-line)# motd-banner console(config-line)# exit console(config)# line ssh console(config-line)# motd-banner show banner Use the show banner command in EXEC mode to display the configuration of banners.62 User Interface Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\User_Interface.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Syntax show banner motd show banner login show banner exec Parameters This command has no arguments or keywords. Command Mode EXEC mode Examples Device> show banner motd Banner: MOTD Line SSH: Enabled Line Telnet: Enabled Line Console: Enabled 10000 giga ports switch console# console# show banner login ------------------------------------------------------------- Banner: Login Line SSH: Enabled Line Telnet: Enabled Line Console: Enabled console# console# show banner exec Banner: EXEC Line SSH: Enabled Line Telnet: Enabled Line Console: Enabled console#Macro Commands 63 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\750_Macro.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY 3 Macro Commands macro name Use the Macro Name Global Configuration mode command to create a user defined macro. Use the no form of this command to delete the macro definition. Syntax macro name [macro-name] no macro name [macro-name] Parameters macro-name—Name of the macro. Macro names are case sensitive. Default Configuration The command has no default setting. Command Mode Global Configuration mode User Guidelines A macro can contain up to 3000 characters and up to 200 lines. Enter one macro command per line. Use the @ character to end the macro. Use the # character at the beginning of a line to enter comment text within the macro. You can define mandatory keywords within a macro by using a help string to specify the keywords. Enter #macro keywords word to define the keywords that are available for use with the macro. The keyword name is case sensitive. You can enter up to three keywords separated by a space. Only the first three 64 Macro Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\750_Macro.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY keywords are visible if you enter more than three macro keywords. The command can be anywhere within the macro. When creating a macro, do not use the exit or end commands or change the command mode using interface interface-id. Doing so might cause commands that follow exit, end or interface interface-id to be executed in a different command mode. You can modify a macro by creating a new macro with the same name as the existing macro. The newer macro overwrites the existing macro. Examples The following example shows how to create a macro that defines the duplex mode and speed: Switch(config) # macro name dup Enter macro commands one per line. End with the character ‘@’. macro description dup duplex full speed auto The following example shows how to create a macro with #macro keywords: Switch(config) # macro name duplex Enter macro commands one per line. End with the character ‘@’. macro description duplex duplex $DUPLEX speed $SPEED #macro keywords $ DUPLEX $ SPEED @ The following example shows how to apply the macros to an interface: Switch(config-if) # macro apply duplex $DUPLEX full $SPEED auto Switch(config-if) # macro apply duplex ? WORDkeyword to replace with value e.g. $DUPLEX, $SPEED Macro Commands 65 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\750_Macro.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Switch(config-if) # macro apply duplex $DUPLEX ? WORDValue of the first keyword to replace Switch(config-if) # macro apply duplex $DUPLEX full $SPEED ? WORDValue of the second keyword to replace macro apply Use the macro apply interface configuration command to apply a macro to an interface or to apply and trace a macro configuration on an interface. Syntax macro {apply | trace} macro-name [parameter {value}] [parameter {value}] [parameter {value}] Parameters • apply—Apply a macro to the specific interface. • trace—Apply and trace a macro to the specific interface. • macro-name—Specify the name of the macro. • parameter—(Optional) Specify unique parameter values that are specific to the interface. You can enter up to three keyword-value pairs. Parameter keyword matching is case sensitive. All matching occurrences of the keyword are replaced with the corresponding value. Default Configuration The command has no default setting. Command Mode Interface Configuration mode User Guidelines You can use the macro trace macro-name Interface Configuration command to apply and show the macros running on an interface or to debug the macro to find any syntax or configuration errors. If a command fails because of a syntax error or a configuration error the macro continues to apply t) in the interface. Use the parameter value 66 Macro Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\750_Macro.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY keywords to designate values specific to the interface when creating a macro that requires the assignment of a unique value. Keyword matching is case sensitive. All matching occurrences of the keyword are replaced with the corresponding value. Any full match of a keyword, even if it is part of a large string, is considered a match and replaced by the corresponding value. Some macros might contain keywords that require a parameter value. You can use the macro apply macro-name command to display a list of any required values in the macro. If you apply a macro without entering the keyword values, the commands are invalid and are therefore not applied. When you apply a macro to an interface, the macro name is automatically added to the interface. You can display the applied commands and macro names by using the show running-configuration interface interface-id user EXEC mode command. A macro applied to an interface range behaves the same way as a macro applied to a single interface. When a macro is applied to an interface range, it is applied sequentially to each interface within the range. If a macro command fails on one interface, it is nonetheless applied to the remaining interfaces. Example Switch(config) # interface gi1/0/2 Switch(config-if) # macro trace dup Applying command… ‘duplex full’ Applying command… ‘speed auto’ Switch(config) # interface gi1/0/2 Switch(config-if) # macro apply duplex $DUPLEX full $SPEED auto Switch(config-if) # exit Switch(config) # interface gi1/0/3 Switch(config-if) # macro apply dup Switch(config-if) # exitMacro Commands 67 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\750_Macro.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY macro description Use the macro description Interface Configuration mode command to enter a description about which macros are applied to an interface. Use the no form of this command to remove the description. Syntax macro description text no macro description Parameters text—Description text. The text can contain up to 160 characters. Default Configuration The command has no default setting. Command Mode Interface Configuration mode User Guidelines When multiple macros are applied on a single interface, the description text is a concatenation of texts from a number of previously applied macros. You can verify your setting by entering the show parser macro description privileged EXEC modecommand. Example Switch(config) # interface gi1/0/2 Switch(config-if) # macro apply dup Switch(config-if) # end Switch(config) # interface gi1/0/3 Switch(config-if) # macro apply duplex $DUPLEX full $SPEED auto Switch(config-if) # end Switch # show parser macro description InterfaceMacro Description -----------------------------------------------------------------68 Macro Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\750_Macro.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY 1/2 dup 1/3 duplex ----------------------------------------------------------------- Switch(config) # interface gi1/0/2 Switch(config-if) # no macro description Switch(config-if) # end Switch # show parser macro description InterfaceMacro Description ----------------------------------------------------------------- 1/3 duplex ----------------------------------------------------------------- macro global Use the macro global Global Configuration command to apply a macro to a switch or to apply and trace a macro configuration on a switch. Syntax macro global {apply | trace} macro-name [parameter {value}] [parameter {value}] [parameter {value}] Parameters • apply—Apply a macro to the switch. • trace—Apply and trace a macro to the switch. • macro-name—Specify the name of the macro. • paramete—(Optional) Specify unique parameter values that are specific to the switch. You can enter up to three keyword-value pairs. Parameter keyword matching is case sensitive. All matching occurrences of the keyword are replaced with the corresponding value. Default Configuration The command has no default setting. Command Mode Global Configuration modeMacro Commands 69 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\750_Macro.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY User Guidelines You can use the macro global trace macro-name Global Configuration mode command to apply and show the macros running on the switch or to debug the macro in order to locate any syntax or configuration errors. If a command fails because of a syntax error or a configuration error when you apply a macro, the macro nonetheless continues to apply the remaining commands to the interface. Use the parameter value keywords to designate values specific to the switch when creating a macro that requires the assignment of unique value. Keyword matching is case sensitive. All matching occurrences of the keyword are replaced with the corresponding value. Any full match of a keyword, even if it is part of a large string, is considered a match and replaced by the corresponding value. Some macros might contain keywords that require a parameter value. You can use the macro global apply macro-name command to display a list of any required values in the macro. If you apply a macro without entering the keyword values, the commands are considered invalid and are not applied. When you apply a macro to the switch, the macro name is automatically added to the switch. You can display the applied commands and macro names by using the show running-configuration interface user EXEC mode command. macro global description Use the macro global description Global Configuration command to enter a description about which macros are applied to the switch. Use the no form of this command to remove the description. Syntax macro global description text no macro global description Parameters text—Description text. The text can contain up to 160 characters.70 Macro Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\750_Macro.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Default Configuration The command has no default setting. Command Mode Global Configuration mode User Guidelines When multiple global macros are applied to a switch, the global description text is a concatenation of texts from a number of previously applied macros. You can verify your settings by entering the show parser macro description privileged EXEC mode command. show parser macro Use the show parser macro User EXEC mode command to display the parameters for all configured macros or for one macro on the switch. Syntax show parser macro [{brief | description [interface interface-id] | name macro-name}] Parameters • brief—(Optional) Display the name of each macro. • description [interface]—(Optional) Display all macro descriptions. • interface-id—Or the description of a specific interface. • name macro-name—(Optional) Display information about a single macro identified by the macro name. Command Mode User EXEC modeSystem Management Commands 71 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\System_Management.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY 4 System Management Commands ping Use the ping command to send ICMP echo request packets to another node on the network. Syntax ping [ip] {ipv4-address | hostname} [size packet_size] [count packet_count] [timeout time_out] ping ipv6 {ipv6-address | hostname} [size packet_size] [count packet_count] [timeout time_out] Parameters • ip—Use IPv4 to check the network connectivity. • ipv6—Use IPv6 to check the network connectivity. • ipv4-address—IPv4 address to ping. • ipv6-address—Unicast or multicast IPv6 address to ping. When the IPv6 address is a Link Local address (IPv6Z address), the outgoing interface name must be specified. Refer to the User Guidelines for the interface name syntax. • hostname—Hostname to ping (160 characters. Maximum label size: 63.) • packet_size—Number of bytes in the packet not including the VLAN tag. The default is 64 bytes. (IPv4:64-1518, IPv6: 68-1518) • packet_count—Number of packets to send, from 1 to 65535 packets. The default is 4 packets. If 0 is entered, it pings until stopped (0–65535). • time-out—Timeout in milliseconds to wait for each reply, from 50 to 65535 milliseconds. The default is 2000 milliseconds (50–65535).72 System Management Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\System_Management.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Command Mode EXEC mode User Guidelines Press Esc to stop pinging. Following are sample results of the ping command: • Destination does not respond—If the host does not respond, a “no answer from host” appears within 10 seconds. • Destination unreachable—The gateway for this destination indicates that the destination is unreachable. • Network or host unreachable—The switch found no corresponding entry in the route table. The format of an IPv6Z address is: % • interface-name = vlan | ch | isatap | | 0 • integer = | • decimal-number = 0 | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 • physical-port-name = Designated port number, for example gi1/0/1 When using the ping ipv6 command to check network connectivity of a directly attached host using its link local address, the egress interface may be specified in the IPv6Z format. If the egress interface is not specified, the default interface is selected. Specifying interface zone=0 is equivalent to not defining an egress interface. When using the ping ipv6 command with MC address, the information displayed is taken from all received echo responses. Examples Console> ping ip 10.1.1.1 Pinging 10.1.1.1 with 64 bytes of data: 64 bytes from 10.1.1.1: icmp_seq=0. time=11 ms 64 bytes from 10.1.1.1: icmp_seq=1. time=8 ms 64 bytes from 10.1.1.1: icmp_seq=2. time=8 msSystem Management Commands 73 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\System_Management.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY 64 bytes from 10.1.1.1: icmp_seq=3. time=7 ms ----10.1.1.1 PING Statistics---- 4 packets transmitted, 4 packets received, 0% packet loss round-trip (ms) min/avg/max = 7/8/11 Console> ping ip yahoo.com Pinging yahoo.com [66.218.71.198] with 64 bytes of data: 64 bytes from 10.1.1.1: icmp_seq=0. time=11 ms 64 bytes from 10.1.1.1: icmp_seq=1. time=8 ms 64 bytes from 10.1.1.1: icmp_seq=2. time=8 ms 64 bytes from 10.1.1.1: icmp_seq=3. time=7 ms ----10.1.1.1 PING Statistics---- 4 packets transmitted, 4 packets received, 0% packet loss round-trip (ms) min/avg/max = 7/8/11 Console> ping ip oob/176.16.1.1 Pinging oob/176.16.1.1 with 64 bytes of data: 64 bytes from oob/176.16.1.1: icmp_seq=0. time=5 ms 64 bytes from oob/176.16.1.1: icmp_seq=1. time=5 ms 64 bytes from oob/176.16.1.1: icmp_seq=2. time=5 ms 64 bytes from oob/176.16.1.1: icmp_seq=3. time=5 ms ----10.1.1.1 PING Statistics---- 4 packets transmitted, 4 packets received, 0% packet loss round-trip (ms) min/avg/max = 5/5/5 console> ping ipv6 3003::11 Pinging 3003::11 with 64 bytes of data: 64 bytes from 3003::11: icmp_seq=1. time=0 ms 64 bytes from 3003::11: icmp_seq=2. time=50 ms 64 bytes from 3003::11: icmp_seq=3. time=0 ms74 System Management Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\System_Management.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY 64 bytes from 3003::11: icmp_seq=4. time=0 ms ----3003::11 PING Statistics---- 4 packets transmitted, 4 packets received, 0% packet loss round-trip (ms) min/avg/max = 0/12/50 console> ping ipv6 FF02::1 Pinging FF02::1 with 64 bytes of data: 64 bytes from 3003::11: icmp_seq=1. time=0 ms 64 bytes from 3003::33: icmp_seq=1. time=70 ms 64 bytes from 3003::11: icmp_seq=2. time=0 ms 64 bytes from 3003::55: icmp_seq=1. time=1050 ms 64 bytes from 3003::33: icmp_seq=2. time=70 ms 64 bytes from 3003::55: icmp_seq=2. time=1050 ms 64 bytes from 3003::11: icmp_seq=3. time=0 ms 64 bytes from 3003::33: icmp_seq=3. time=70 ms 64 bytes from 3003::11: icmp_seq=4. time=0 ms 64 bytes from 3003::55: icmp_seq=3. time=1050 ms 64 bytes from 3003::33: icmp_seq=4. time=70 ms 64 bytes from 3003::55: icmp_sq=4. time=1050 ms ---- FF02::1 PING Statistics---- 4 packets transmitted, 12 packets received traceroute To discover (?) the routes that packets will take when traveling to their destination, use the traceroute EXEC command. Syntax traceroute ip {ipv4-address | hostname} [size packet_size] [ttl max-ttl] [count packet_count] [timeout time_out] [source ip-address] [tos tos] traceroute ipv6 {ipv6-address | hostname} [size packet_size] [ttl max-ttl] [count packet_count] [timeout time_out] [source ip-address] [tos tos]System Management Commands 75 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\System_Management.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Parameters • ip—Use IPv4 to discover the route. • ipv6—Use IPv6 to discover the route. • ipv4-address—IPv4 address of the destination host. (Range: Valid IP address) • ipv6-address—IPv6 address of the destination host. • hostname—Hostname of the destination host. (Range: 1–160 characters. Maximum label size: 63.) • packet_size—Number of bytes in the packet not including the VLAN tag. The default is 64 bytes. (IPv4:64-1518, IPv6: 68-1518) • ttl max-ttl—The largest TTL value that can be used. The default is 30. The traceroute command terminates when the destination is reached or when this value is reached. (Range: 1–255) • count packet_count—The number of probes to be sent at each TTL level. The default count is 3. (Range: 1–10) • timeout time_out—The number of seconds to wait for a response to a probe packet. The default is 3 seconds. (Range: 1–60) • source ip-address—One of the interface addresses of the device to use as a source address for the probes. The device will normally pick what it feels is the best source address to use. (Range: Valid IP address) • tos tos—The Type-Of-Service byte in the IP Header of the packet.(Range: 0—255) Command Mode EXEC mode User Guidelines The traceroute command works by taking advantage of the error messages generated by routers when a datagram exceeds its time-to-live (TTL) value. The traceroute command starts by sending probe datagrams with a TTL value of one. This causes the first router to discard the probe datagram and send back an error message. The traceroute command sends several probes at each TTL level and displays the round-trip time for each. 76 System Management Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\System_Management.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY The traceroute command sends out one probe at a time. Each outgoing packet can result in one or two error messages. A "time exceeded” error message indicates that an intermediate router has seen and discarded the probe. A "destination unreachable" error message indicates that the destination node has received the probe and discarded it because it could not deliver the packet. If the timer goes off before a response comes in, the traceroute command prints an asterisk (*). The traceroute command terminates when the destination responds, when the maximum TTL is exceeded, or when the user interrupts the trace with Esc. The traceroute command is not relevant to IPv6 link local addresses. Example Router> traceroute ip umaxp1.physics.lsa.umich.edu Type Esc to abort. Tracing the route to umaxp1.physics.lsa.umich.edu (141.211.101.64) 1 i2-gateway.stanford.edu (192.68.191.83) 0 msec 0 msec 0 msec 2 STAN.POS.calren2.NET (171.64.1.213) 0 msec 0 msec 0 msec 3 SUNV--STAN.POS.calren2.net (198.32.249.73) 1 msec 1 msec 1 msec 4 Abilene--QSV.POS.calren2.net (198.32.249.162) 1 msec 1 msec 1 msec 5 kscyng-snvang.abilene.ucaid.edu (198.32.8.103) 33 msec 35 msec 35 msec 6 iplsng-kscyng.abilene.ucaid.edu (198.32.8.80) 47 msec 45 msec 45 msec 7 so-0-2-0x1.aa1.mich.net (192.122.183.9) 56 msec 53 msec 54 msec 8 atm1-0x24.michnet8.mich.net (198.108.23.82) 56 msec 56 msec 57 msec 9 * * * 10 A-ARB3-LSA-NG.c-SEB.umnet.umich.edu (141.211.5.22) 58 msec 58 msec 58 msec 11 umaxp1.physics.lsa.umich.edu (141.211.101.64) 62 msec 63 msec 63 msec Trace completedSystem Management Commands 77 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\System_Management.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY The following table describes the significant fields shown in the display: The following are characters that can appear in the traceroute command output: telnet The telnet EXEC mode command enables logging on to a host that supports Telnet. Syntax telnet {ip-address | hostname} [port] [keyword ...] Field Description 1 Indicates the sequence number of the router in the path to the host. i2-gateway.stanford.edu Host name of this router. 192.68.191.83 IP address of this router. 1 msec 1 msec 1 msec Round-trip time for each of the probes that are sent. Field Description * The probe timed out. ? Unknown packet type. A Administratively unreachable. Usually, this output indicates that an access list is blocking traffic. F Fragmentation required and DF is set. H Host unreachable. N Network unreachable. P Protocol unreachable. Q Source quench. R Fragment reassembly time exceeded S Source route failed. U Port unreachable. 78 System Management Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\System_Management.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Parameters • ip-address—Specifies the destination host IP address. • hostname—Specifies the destination host name. (Length: 1-160 characters. Maximum label length: 63 characters.) • port—Specifies the decimal TCP port number or one of the keywords listed in the Ports table in the User Guidelines. • keyword—Specifies the one or more keywords listed in the Keywords table in the User Guidelines. Default Configuration The default port is the Telnet port (23) on the host. By default, Telnet is enabled. Command Mode EXEC mode User Guidelines Telnet software supports special Telnet commands in the form of Telnet sequences that map generic terminal control functions to operating systemspecific functions. To enter a Telnet sequence, press the escape sequence keys (Ctrl-shift-6) followed by a Telnet command character. Special Telnet Sequences At any time during an active Telnet session, available Telnet commands can be listed by pressing the Ctrl-shift-6-? keys at the system prompt. Telnet Sequence Purpose Ctrl-shift-6-b Break Ctrl-shift-6-c Interrupt Process (IP) Ctrl-shift-6-h Erase Character (EC) Ctrl-shift-6-o Abort Output (AO) Ctrl-shift-6-t Are You There? (AYT) Ctrl-shift-6-u Erase Line (EL)System Management Commands 79 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\System_Management.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY A sample of this list follows. Note that the Ctrl-shift-6 sequence appears as ^^ on the screen. Console> ‘Ctrl-shift-6’ ? [Special telnet escape help] ^^ B sends telnet BREAK ^^ C sends telnet IP ^^ H sends telnet EC ^^ O sends telnet AO ^^ T sends telnet AYT ^^ U sends telnet EL Ctrl-shift-6 x suspends the session (return to system command prompt) Several concurrent Telnet sessions can be opened, enabling switching between the sessions. To open a subsequent session, the current connection has to be suspended by pressing the escape sequence keys (Ctrl-shift-6) and x to return to the system command prompt. Then open a new connection with the telnet EXEC mode command. This command lists concurrent Telnet connections to remote hosts that were opened by the current Telnet session to the local device. It does not list Telnet connections to remote hosts that were opened by other Telnet sessions. Keywords Table Options Description /echo Enables local echo. /quiet Prevents onscreen display of all messages from the software. /source-interface Specifies the source interface.80 System Management Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\System_Management.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Ports Table /stream Turns on stream processing, which enables a raw TCP stream with no Telnet control sequences. A stream connection does not process Telnet options and can be appropriate for connections to ports running UNIX-to-UNIX Copy Program (UUCP) and other non-Telnet protocols. Ctrl-shift-6 x Returns to the System Command Prompt. Keyword Description Port Number BGP Border Gateway Protocol 179 chargen Character generator 19 cmd Remote commands 514 daytime Daytime 13 discard Discard 9 domain Domain Name Service 53 echo Echo 7 exec Exec 512 finger Finger 79 ftp File Transfer Protocol 21 ftp-data FTP data connections 20 gopher Gopher 70 hostname NIC hostname server 101 ident Ident Protocol 113 irc Internet Relay Chat 194 klogin Kerberos login 543 kshell Kerberos shell 544 login Login 513 lpd Printer service 515 nntp Network News Transport Protocol 119 Options DescriptionSystem Management Commands 81 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\System_Management.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example The following example displays logging in to IP address 176.213.10.50 via Telnet. Console> telnet 176.213.10.50 Esc U sends telnet EL resume The resume EXEC mode command enables switching to another open Telnet session. Syntax resume [connection] Parameters connection—Specifies the connection number. (Range: 1-4 connections.) pim-auto-rp PIM Auto-RP 496 pop2 Post Office Protocol v2 109 pop3 Post Office Protocol v3 110 smtp Simple Mail Transport Protocol 25 sunrpc Sun Remote Procedure Call 111 syslog Syslog 514 tacacs TAC Access Control System 49 talk Talk 517 telnet Telnet 23 time Time 37 uucp Unix-to-Unix Copy Program 540 whois Nickname 43 www World Wide Web 80 Keyword Description Port Number82 System Management Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\System_Management.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Default Configuration The default connection number is that of the most recent connection. Command Mode EXEC mode Example The following command switches to open Telnet session number 1. Console> resume 1 hostname The hostname Global Configuration mode command specifies or modifies the device host name. Use the no form of the command to remove the existing host name. Syntax hostname name no hostname Parameters Name—specifies The Device Host Name. (Length: 1-160 Characters. Maximum label length: 63 characters.) Default Configuration No host name is defined. Command Mode Global Configuration mode Example The following example specifies the device host name as ‘enterprise’. Console(config)# hostname enterprise enterprise(config)#System Management Commands 83 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\System_Management.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY reload The reload Privileged EXEC mode command reloads the operating system. Syntax reload [slot stack-member-number] Command Mode Privileged EXEC mode Parameters stack-member-number —Specifies the new master unit number. (Range: 1–8). If unspecified, reloads all the units. Example The following example reloads the operating system on all units. Console# reload This command will reset the whole system and disconnect your current session. Do you want to continue? (y/n) [n] stack master The stack master Global Configuration mode command forces a stack master selection. Use the no form of this command to restore the default configuration. Syntax stack master unit unit no stack master Parameters unit —Specifies the new master unit number. (Range: 1–2) Default Configuration The default is no forced master.84 System Management Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\System_Management.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Command Mode Global Configuration mode Example The following example forces the stack master to be unit 2. Console(config)# stack master unit 2 system light Use the system light EXEC command to light LEDs on a specific unit. Syntax system light [unit unit-number] [duration seconds] system light stop Parameters • unit-number—Specify unit number or all. • seconds—The number of seconds to light the LEDs. If unspecified, defaults to 5 seconds. (Range: 2–6) • stop—Stop lighting the LEDs. Command Mode EXEC mode switch renumber Use the switch renumber Global Configuration command to change the unit ID of a specific unit. Syntax switch current-unit-number renumber new-unit-number Parameters • current-unit-number—Specify Unit number. (Range: 1–8)System Management Commands 85 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\System_Management.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY • new-unit-number—The new unit number. (Range: 1–8) Command Mode Global Configuration mode show switch The show switch EXEC mode command displays stack status information for the stack or stack member. Syntax show switch [stack-member-number] Parameters stack-member-number— Specifies the unit number. (Range: 1–6) Command Mode EXEC mode Example The following examples display the stack status information. Console> show switch Unit ---- 1 3 4 5 6 7 8 2 MAC Address ----------------- 00:00:b0:87:12:11 00:00:b0:87:12:13 00:00:b0:87:12:14 00:00:b0:87:12:15 00:00:b0:87:12:16 00:00:b0:87:12:17 00:00:b0:87:12:18 00:00:b0:87:12:12 SW ------ 3.30 3.30 3.30 3.30 3.30 3.30 3.30 3.30 Master ------ Enabled Forced Enabled Enabled Enabled Enabled Enabled Enabled Uplink ----- 2 1 3 4 5 6 7 8 Down link ----- 3 4 5 6 7 8 2 1 Status ------ Slave Master Slave Slave Slave Slave Slave Slave86 System Management Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\System_Management.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY service cpu-utilization The service cpu-utilization Global Configuration mode command enables measuring CPU utilization. Use the no form of this command to restore the default configuration. Syntax service cpu-utilization no service cpu-utilization Default Configuration Measuring CPU utilization is disabled. Command Mode Global Configuration mode User Guidelines Use the show cpu utilization Privileged EXEC command to view information on CPU utilization. Configured order: Unit 1 at Top, Unit 2 at bottom Console> show switch 1 Unit 1: MAC address: 00:00:b0:87:12:11 Master: Forced. Product: Fonseca 48. Software: 3.30 Uplink unit: 8. Downlink unit: 2. Status: Master Active image: image-1. Selected for next boot: image-2.System Management Commands 87 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\System_Management.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example The following example enables measuring CPU utilization. Console(config)# service cpu-utilization show cpu utilization The show cpu utilization Privileged EXEC mode command displays information about CPU utilization. Syntax show cpu utilization Command Mode Privileged EXEC mode User Guidelines Use the service cpu-utilization Global Configuration mode command to enable measuring CPU utilization. Example The following example displays CPU utilization information. Console# show cpu utilization CPU utilization service is on. CPU utilization -------------------------------------------------- five seconds: 5%; one minute: 3%; five minutes: 3% clear cpu counters The clear cpu counters EXEC mode command clears traffic counters to and from the CPU. Syntax clear cpu counters88 System Management Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\System_Management.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Command Mode EXEC mode Example The following example clears the CPU traffic counters. Console# clear cpu counters service cpu-counters The service cpu-counters Global Configuration mode command enables traffic counting to and from the CPU. To disable counting, use the no form of this command. Syntax service cpu-counters no service cpu-counters Command Mode Global Configuration mode User Guidelines Use the show cpu counters command to display the CPU traffic counters. Example The following example enables counting CPU traffic. Console(config)# service cpu-counters show cpu counters The show cpu counters EXEC mode command displays traffic counter information to and from the CPU. Syntax show cpu countersSystem Management Commands 89 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\System_Management.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Command Mode EXEC mode User Guidelines Use the service cpu-counters command to enable traffic counting to and from the CPU. Example The following example displays the CPU traffic counters. Console# show cpu counters CPU counters are active. In Octets: 987891 In Unicast Packets: 3589 In Multicast Packets: 29 In Broadcast Packets: 8 Out Octets: 972181 Out Unicast Packets: 3322 Out Multicast Packets: 22 Out Broadcast Packets: 8 show users The show users EXEC mode command displays information about the active users. Syntax show users Command Mode EXEC mode90 System Management Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\System_Management.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example The following example displays information about the active users. show sessions The show sessions EXEC mode command displays open Telnet sessions. Syntax show sessions Command Mode EXEC mode User Guidelines The command displays Telnet sessions to remote hosts opened by the current Telnet session to the local device. It does not display Telnet sessions to remote hosts opened by other Telnet sessions to the local device. Console# show users Username ---------- Bob John Robert Betty Sam Protocol ----------- Serial SSH HTTP Telnet Location ------------ 172.16.0.1 172.16.0.8 172.16.1.7 172.16.1.6System Management Commands 91 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\System_Management.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example The following example displays open Telnet sessions. The following table describes significant fields shown above. show system The show system EXEC mode command displays system information. Syntax show system [unit unit] Parameters unit unit — Specifies the unit number. (Range: 1–8) Command Mode EXEC mode Console# show sessions Connection ---------- 1 2 Host ------------- Remote router 172.16.1.2 Address ---------- 172.16.1.1 172.16.1.2 Port ----- 23 23 Byte ---- 89 8 Field Description Connection The connection number. Host The remote host to which the device is connected through a Telnet session. Address The remote host IP address. Port The Telnet TCP port number. Byte The number of unread bytes for the user to see on the connection.92 System Management Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\System_Management.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example The following example displays the system information. console# show system Unit Type ---- ---------------------- 1 PowerConnect 5524 2 PowerConnect 5524 3 PowerConnect 5524 4 PowerConnect 5524 5 PowerConnect 5524 6 PowerConnect 5524 7 PowerConnect 5524 8 PowerConnect 5524 Unit Main Power Supply Redundant Power Supply ---- ----------------- ---------------------- 1 OK 2 OK 3 OK 4 OK 5 OK 6 OK 7 OK 8 OK NOT OPERATIONAL Unit Fans Status ---- ------------- 1 OK 2 OK 3 OK 4 OK 5 IDLE 6 OK 7 OK 8 FAILURESystem Management Commands 93 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\System_Management.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Unit Temperature (Celsius) Temperature Sensor Status ---- ------------------------- --------------- 1 47 OK 2 45 OK 3 49 OK 4 36 OK 5 35 OK 6 45 OK 7 40 OK 8 56 OK Unit Up time ---- --------------- 1 00,00:31:24 2 00,00:31:19 3 00,00:31:24 4 00,00:31:24 5 00,00:31:24 6 00,00:31:24 7 00,00:31:25 8 00,00:31:25 console# show system unit 2 System Type: PowerConnect 5548 System Up Time (days,hour:min:sec): 08,23:03:46 System Contact: System Name: System Location: System MAC Address: 00:99:88:66:33:33 System Object ID: 1.3.6.1.4.1.674.10895.3031 Type: PowerConnect 5548 Main Power Supply Status: OK94 System Management Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\System_Management.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Fans Status: OK Unit Temperature (Celsius) Status ------------- ------------------- ------------- 2 42 OK show version The show version EXEC mode command displays system version information. Syntax show version [unit unit] Parameters unit unit — Specifies the unit number. (Range: 1–8) Command Mode EXEC mode Example The following example displays system version information. console > show version Unit SW Version Boot Version HW Version ------ ----------- ------------ ---------- 1 3.131 2.178 1.0.0 2 3.131 2.178 1.0.0 system resources routing The system resources routing Global Configuration mode command configures the routing table maximum size. Use the no form of this command to return to the default size. Syntax system resources routing routes hosts interfacesSystem Management Commands 95 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\System_Management.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY no system resources routing Parameters • routes—Specifies the maximum number of remote networks in the routing table. • hosts—Specifies the maximum number of directly attached hosts. • interfaces—Specifies the maximum number of IP interfaces. Default Configuration Hosts: 200, Routes: 64, IP Interfaces: 32 Command Mode Global Configuration mode User Guidelines The settings are effective after reboot. Example The following example configures the routing table maximum size. Console# system resources routing 20 23 5 show system resources routings The show system resources routings EXEC mode command displays system routing resources information. Syntax show system resources routings Command Mode EXEC mode96 System Management Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\System_Management.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example The following example displays the system routing resources information. Console> show system resources routings Parameters Current value After reboot Value -------------- ---------------- ------------------- Hosts: 100 100 Routes: 32 32 IP Interfaces: 32 32 show system tcam utilization The show system tcam utilization EXEC mode command displays the Ternary Content Addressable Memory (TCAM) utilization. Syntax show system tcam utilization [unit unit] Parameters unit unit—Specifies the unit number. (Range: 1–8) Command Mode EXEC mode Example The following example displays TCAM utilization information. Console> show system tcam utilization System: 75% Unit ---- 1 2 TCAM utilization [%] -------------------- 58 57System Management Commands 97 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\System_Management.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY show system defaults Use the show system defaults command to display system defaults. Syntax show system defaults [section] Parameters section—Show information for specific session only. Available values are: management, 802.1x, port, fdb, port-mirroring, spanning-tree, vlan, voicevlan, ip-addressing, network-security and qos-acl. Command Mode EXEC mode Examples console# show system defaults System Mode: Router Maximum units in stack: 8 # Management defaults Telnet: Enabled (Maximum 4 sessions, shared with SSH) SSH: Enabled (Maximum 4 sessions, shared with Telnet) HTTP: Enabled, port 80 (Maximum 27 sessions) HTTPS: Disabled SNMP: Enabled. User: first SNMP version: V3 SNMP Local Engine ID: 0000000001 SNMP Notifications: Enabled SNMP Authentication Notifications: Enabled Console: Enabled. Cryptographic keys are not generated HTTPS certificate is not generated Management ACL: No ACL is defined AAA Telnet authentication login: Local user data base98 System Management Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\System_Management.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY AAA HTTP authentication login: Local data base AAA HTTPS authentication login: Local data base Radius accounting: Disabled Radius: No server is defined Tacacs: No server is defined Syslog: No server is defined Logging: Enabled Logging to console: Informational messages Logging to internal buffer: Informational messages Logging to file: Error messages Logging to remote server: Informational messages Maximum no. of syslog messages: 200 SNTP: supported SNTP Port No.: 123 SNTP Interface: Enabled IP Domain Naming System: Enabled DHCP Server: Enabled DHCP Auto Configuration: Enabled DHCP Option 67: Enabled DHCP Option 82: Disabled # IPv6 defaults # 802.1x defaults 802.1X is disabled Mode: Multiple host Guest VLAN: Not defined # Interface defaults in present unit 48 GE regular 2 10G fiberOptics PoE: Enabled POE mode: Port Limit Duplex: Full Negotiation: Enabled Flow control: OffSystem Management Commands 99 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\System_Management.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Mdix mode: auto LAGs: No LAG is defined Storm control: Disabled Storm control mode: unknown unicast, broadcast, multicast Port security: Disabled LLDP: Enabled LLDPDU Handeling: Filtering Jumbo frames: Disabled Port-Channel Load Balancing: Layer 2 # Bridging defaults Maximum 16K entries Aging time: 5 minutes iSCSI: Enabled iSCSI cos: 5, with no remark # Multicast defaults Multicast filtering: Disabled IGMP snooping: Disabled IGMP Querier: Disabled Multicast TV Vlan Interface: disabled # Port monitoring defaults Port monitor is not defined Maximum source port: 4 Maximum destination ports for mirroring: 2 # Spanning tree defaults Spanning tree is Enabled Spanning tree mode is Classic Spanning tree interface: Enabled Port fast: Disabled BPDU handling: Filtering BPDU Guard: Disabled # Vlan defaults100 System Management Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\System_Management.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Maximum Vlans: 4094 Default VLAN: Enabled Default VLAN id: 1 GVRP: Disabled Port mode: undefined PVID: 1 VLAN membership: 1 # Voice vlan defaults Voice VLAN: Disabled Cos: 6 with no remark OUI table: 00:E0:BB 3COM 00:03:6B Cisco 00:E0:75 Veritel 00:D0:1E Pingtel 00:01:E3 Simens 00:60:B9 NEC/Philips 00:0F:E2 Huawei-3COM 00:09:6E Avaya # Network security defaults DHCP snooping: Disabled ARP inspection: Disabled ARP inspection Validation: Disabled # DOS attacks # IP addressing defaults No IP interface is defined # QOS and ACLs defaults QoS mode is basic QoS Basic Trust Mode: CoS QoS Advanced Trust Mode: CoS-DSCP Queue default mapping:System Management Commands 101 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\System_Management.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY cos qid: 0 2 1 1 2 1 3 3 4 4 5 5 6 6 7 7 show tech-support Use the show tech-support command to display system and configuration information you can provide to the Technical Assistance Center when reporting a problem. Syntax show tech-support [config] [memory] Parameters Memory—Displays memory and processor state data. Config—Displays switch configuration within the CLI commands supported on the device. Default Configuration By default, this command displays the output for technical-support-related show commands. Use keywords to specify the type of information to be displayed. If you do not specify any parameters, the system displays all configuration and memory data. Command Types Switch command. Command Mode EXEC mode102 System Management Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\System_Management.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY User Guidelines Caution: Avoid running multiple show tech-support commands on a switch or multiple switches on the network segment. Doing so may cause starvation of some time sensitive protocols, like STP. The show tech-support command may timeout if the configuration file output takes longer to display than the configured session timeout time. If this happens, enter a set logout timeout value of 0 to disable automatic disconnection of idle sessions or enter a longer timeout value. The show tech-support command output is continuous, it does not display one screen at a time. To interrupt the output, press Esc. If you specify the config keyword, the show tech-support command displays a list of the commands supported on the device. If user specifies the memory keyword, the show tech-support command displays the output: flash info (dir if existed, or flash mapping) show bootvar buffers info (like print os buff) memory info (like print os mem) proc info (lie print os tasks) versions of software components show cpu utilization system fans always-on Use the system fans always-on Global Configuration command to set the system fans to On regardless of device temperature. Use the no form of the command to return to default. Syntax system fans always-on [unit unit] no system fans always-on Parameters unit unit—Unit number or all. If unspecified, defaults to all. (Range: 1–8)System Management Commands 103 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\System_Management.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Default Configuration Automatic mode; The system fan speed depends on the temperature of the device. Command Mode Global Configuration mode show system fans Use the show system fans EXEC command to view the fans’ status Syntax show system fans Command Mode EXEC mode Example console>show system fans Unit Temperature Speed Admin state Oper state (Celsius) (RPM) --- --------------- ---------- -------------- ----------- 1 30 8000 auto on 2 40 8000 on on asset-tag The asset-tag Global Configuration mode command assigns an asset-tag to a device. Use the no form of this command to restore the default setting. Syntax asset-tag [unit unit] tag no asset-tag [unit unit]104 System Management Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\System_Management.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Parameters • unit —Specifies the unit number. (Range: 1–8) • tag—Specifies the device asset-tag. Default Configuration No asset tag is defined. The default unit number is the master unit number. Command Mode Global Configuration mode Example The following example assigns the asset-tag 2365491870 to the device. Console(config)# asset-tag 2365491870 show system id The show system id EXEC mode command displays the system identity information. Syntax show system id [unit unit] Parameters unit unit—Specifies the unit number. (Range: 1–8) Command Mode EXEC modeSystem Management Commands 105 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\System_Management.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example The following example displays the system identity information. Console> show system id Unit Service tag Serial number Asset tag ------ ------------- ------------- ----------- 1 89788978 8936589782 7843678957 2 3216523877 5621987728106 System Management Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\System_Management.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LYClock Commands 107 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Clock.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY 5 Clock Commands clock set The clock set Privileged EXEC mode command manually sets the system clock. Syntax clock set hh:mm:ss {[day month] | [month day]} year Parameters • hh:mm:ss—Specifies the current time in hours (military format), minutes, and seconds. (Range: hh: 0-23, mm: 0-59, ss: 0-59) • day—Specifies the current day of the month. (Range: 1-31) • month—Specifies the current month using the first three letters of the month name. (Range: Jan–Dec) • year—Specifies the current year. (Range: 2000–2037) Command Mode Privileged EXEC mode User Guidelines The user should enter the local clock time and date. Example The following example sets the system time to 13:32:00 on March 7th, 2005. Console# clock set 13:32:00 7 Mar 2005108 Clock Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Clock.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY clock source The clock source Global Configuration mode command configures an external time source for the system clock. Use the no form of this command to disable the external time source. Syntax clock source {sntp} no clock source Parameters sntp—Specifies that an SNTP server is the external clock source. Default Configuration There is no external clock source. Command Mode Global Configuration mode Example The following example configures an SNTP server as an external time source for the system clock. Console(config)# clock source sntp clock timezone Use the clock timezone Global Configuration command to set the time zone for display purposes. Use the no form of this command to set the time to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT), which is the same. Syntax clock timezone zone hours-offset [minutes-offset]Clock Commands 109 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Clock.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY no clock timezone Parameters • zone—The acronym of the time zone.(Range: Up to 4 characters) • hours-offset—Hours difference from UTC. (Range: (-12)–(+13)) • minutes-offset—Minutes difference from UTC. (Range: 0–59) Default Configuration Offset is 0. Acronym is empty. Command Mode Global Configuration mode User Guidelines The system internally keeps time in UTC, so this command is used only for display purposes and when the time is manually set. Example console(config)# clock timezone abc +2 minutes 32 clock summer-time Use one of the formats of the clock summer-time Global Configuration command to configure the system to automatically switch to summer time (daylight saving time). Use the no form of this command to configure the software not to automatically switch to summer time. Syntax clock summer-time zone recurring {usa | eu | {week day month hh:mm week day month hh:mm}} [offset] clock summer-time zone date date month year hh:mm date month year hh:mm [offset]110 Clock Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Clock.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY clock summer-time zone date month date year hh:mm month date year hh:mm [offset] no clock summer-time Parameters • zone—The acronym of the time zone to be displayed when summer time is in effect. (Range: Up to 4 characters) • recurring—Indicates that summer time should start and end on the corresponding specified days every year. • date—Indicates that summer time should start on the first specific date listed in the command and end on the second specific date in the command. • usa—The summer time rules are the United States rules. • eu—The summer time rules are the European Union rules. • week—Week of the month. Can be 1–4, first, last. • day—Day of the week (first three letters by name, such as Sun). (characters) • date—Date of the month. (Range: 1–31) • month—Month (first three letters by name, such as Feb). (characters) • year—year (no abbreviation). (Range: 2000–2097) • hh:mm—Time (military format) in hours and minutes. (Range: hh:mmhh: 0-23, mm: 0-59) • offset—Number of minutes to add during summer time (default is 60). (Range: 1440) Default Configuration Summer time is disabled. Command Mode Global Configuration mode User Guidelines In both the date and recurring forms of the command, the first part of the command specifies when summer time begins, and the second part specifies Clock Commands 111 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Clock.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY when it ends. All times are relative to the local time zone. The start time is relative to standard time. The end time is relative to summer time. If the starting month is chronologically after the ending month, the system assumes that you are in the southern hemisphere. USA rule for daylight saving time: • From 2007: • Start: Second Sunday in March • End: First Sunday in November • Time: 2 am local time • Before 2007: • Start: First Sunday in April • End: Last Sunday in October • Time: 2 am local time Example console(config)# clock summer-time abc date apr 1 2010 09:00 aug 2 2010 09:00 EU rule for daylight saving time: • Start: Last Sunday in March • End: Last Sunday in October • Time: 1.00 am (01:00) Greenwich Mean Time (GMT) sntp authentication-key The sntp authentication-key Global Configuration mode command defines an authentication key for Simple Network Time Protocol (SNTP). Use the no form of this command to remove the authentication key for SNTP. Syntax sntp authentication-key key-number md5 key-value no sntp authentication-key key-number112 Clock Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Clock.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Parameters • key-number—Specifies the key number. (Range: 1–4294967295) • key-value—Specifies the key value. (Length: 1–8 characters) Default Configuration No authentication key is defined. Command Mode Global Configuration mode Examples The following example defines the authentication key for SNTP. Console(config)# sntp authentication-key 8 md5 ClkKey Device(config)# sntp authentication-key 8 md5 ClkKey Device(config)# sntp trusted-key 8 Device(config)# sntp authenticate sntp authenticate The sntp authenticate Global Configuration mode command enables authentication for received Simple Network Time Protocol (SNTP) traffic from servers. Use the no form of this command to disable the feature. Syntax sntp authenticate no sntp authenticate Default Configuration Authentication is disabled. Command Mode Global Configuration modeClock Commands 113 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Clock.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY User Guidelines The command is relevant for both unicast and broadcast. Examples The following example enables authentication for received SNTP traffic. Console(config)# sntp authenticate Device(config)# sntp authentication-key 8 md5 ClkKey Device(config)# sntp trusted-key 8 Device(config)# sntp authenticate sntp trusted-key The sntp trusted-key Global Configuration mode command authenticates the system identity with which Simple Network Time Protocol (SNTP) synchronizes. Use the no form of this command to disable system identity authentication. Syntax sntp trusted-key key-number no sntp trusted-key key-number Parameters key-number—Specifies the key number of the authentication key to be trusted. (Range: 1–4294967295) Default Configuration No keys are trusted. Command Mode Global Configuration mode User Guidelines The command is relevant for both received unicast and broadcast.114 Clock Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Clock.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Examples The following example authenticates key 8. Console(config)# sntp trusted-key 8 Device(config)# sntp authentication-key 8 md5 ClkKey Device(config)# sntp trusted-key 8 Device(config)# sntp authenticate sntp client poll timer The sntp client poll timer Global Configuration mode command sets the polling time for the Simple Network Time Protocol (SNTP) client. Use the no form of this command to restore the default configuration. Syntax sntp client poll timer seconds no sntp client poll timer Parameters seconds—Specifies the polling interval in seconds. (Range: 60–86400) Default Configuration The default polling interval is 1024 seconds. Command Mode Global Configuration mode Example The following example sets the polling time for the SNTP client to 120 seconds. Console(config)# sntp client poll timer 120Clock Commands 115 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Clock.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY sntp broadcast client enable The sntp broadcast client enable Global Configuration mode command enables Simple Network Time Protocol (SNTP) broadcast clients. Use the no form of this command to disable SNTP broadcast clients. Syntax sntp broadcast client enable no sntp broadcast client enable Default Configuration The SNTP broadcast client is disabled. Command Mode Global Configuration mode User Guidelines Use the sntp client enable Interface Configuration mode command to enable the SNTP client on a specific interface. Example The following example enables the SNTP broadcast clients. s Console(config)# sntp broadcast client enable sntp anycast client enable The sntp anycast client enable Global Configuration mode command enables the SNTP anycast client. Use the no form of this command to disable the SNTP anycast client. Syntax sntp anycast client enable no sntp anycast client enable116 Clock Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Clock.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Default Configuration The SNTP anycast client is disabled. Command Mode Global Configuration mode User Guidelines The polling time is configured with the sntp client poll timer Global Configuration mode command. Use the sntp client enable Interface Configuration mode command to enable the SNTP client on a specific interface. Example The following example enables SNTP anycast clients. Console(config)# sntp anycast client enable sntp client enable The sntp client enable Global Configuration mode command enables the Simple Network Time Protocol (SNTP) broadcast and anycast client on an interface. Use the no form of this command to disable the SNTP client. Syntax sntp client enable {interface-id} no sntp client enable {interface-id} Parameters interface-id—Specifies an interface ID, which can be one of the following types: Ethernet port, Port-channel or VLAN. Default Configuration The SNTP client is disabled on an interface. Command Mode Global Configuration modeClock Commands 117 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Clock.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY User Guidelines The sntp broadcast client enable Global Configuration mode command globally enables broadcast clients. The sntp anycast client enable Global Configuration mode command globally enables anycast clients. Example The following example enables the SNTP broadcast and anycast client on gigabitethernet port gi1/0/3 Console(config)# sntp client enable gi1/0/3 sntp client enable (Interface) To enable the Simple Network Time Protocol (SNTP) broadcast and anycast client on an interface, use the sntp client enable Interface Configuration command. Use the no form of this command to disable the SNTP client. The sntp client enable Interface Configuration (Ethernet, Port-channel, VLAN) mode command enables the Simple Network Time Protocol (SNTP) broadcast and anycast client on an interface. Use the no form of this command to disable the SNTP client. Syntax sntp client enable no sntp client enable Default Configuration The SNTP client is disabled on an interface. Command Mode Interface Configuration (Ethernet, Port-channel, VLAN) mode User Guidelines The sntp broadcast client enable Global Configuration mode command globally enables broadcast clients.118 Clock Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Clock.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY The sntp anycast client enable Global Configuration mode command globally enables anycast clients. Example The following example enables the SNTP broadcast and anycast client on an interface. Console(config-if)# sntp client enable sntp unicast client enable The sntp unicast client enable Global Configuration mode command enables the device to use Simple Network Time Protocol (SNTP) predefined unicast clients. Use the no form of this command to disable the SNTP unicast clients. Syntax sntp unicast client enable no sntp unicast client enable Default Configuration The SNTP unicast client is disabled. Command Mode Global Configuration mode User Guidelines Use the sntp server Global Configuration mode command to define SNTP servers. Example The following example enables the device to use Simple Network Time Protocol (SNTP) unicast clients. Console(config)# sntp unicast client enableClock Commands 119 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Clock.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY sntp unicast client poll The sntp unicast client poll Global Configuration mode command enables polling for the Simple Network Time Protocol (SNTP) predefined unicast clients. Use the no form of this command to disable the polling for the SNTP client. Syntax sntp unicast client poll no sntp unicast client poll Default Configuration Polling is disabled. Command Mode Global Configuration mode User Guidelines Polling time is configured with the sntp client poll timer Global Configuration mode command. Example The following example enables polling for SNTP predefined unicast clients. Console(config)# sntp unicast client poll sntp server The sntp server Global Configuration mode command configures the device to use the Simple Network Time Protocol (SNTP) to request and accept Network Time Protocol (NTP) traffic from a specified server. Use the no form of this command to remove a server from the list of SNTP servers. Syntax sntp server {ipv4-address | ipv6-address | ipv6z-address | hostname} [poll] [key keyid]120 Clock Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Clock.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY no sntp server {ipv4-address | ipv6-address | ipv6z-address | hostname} Parameters • ipv4-address—Specifies the server IPv4 address. • ipv6-address—Specifies the server IPv6 address. A Link Local address (IPv6Z address) can be defined. • pv6z-address—Specifies the IPv6Z address to ping. The IPv6Z address format is: ipv6-link-local-address}%{interface-name}. The subparameters are: • ipv6-link-local-address—Specifies the IPv6 Link Local address. • interface-name—Specifies the outgoing interface name. The interface name has the format: vlan {integer} | ch {integer} | isatap {integer} | {physical-port-name}. The subparameter integer has the format: {decimal-digit} | {integer}{decimal-digit}. (Range for the decimaldigit: 0–9) • hostname—Specifies the server hostname. Only translation to IPv4 addresses is supported. (Length: 1–158 characters. Maximum label length: 63 characters) • poll—Enables polling. • key keyid—Specifies the Authentication key to use when sending packets to this peer. (Range:1–4294967295) Default Configuration No servers are defined. Command Mode Global Configuration mode User Guidelines Up to 8 SNTP servers can be defined. The sntp unicast client enable Global Configuration mode command enables predefined unicast clients. The sntp unicast client poll Global Configuration mode command globally enables polling.Clock Commands 121 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Clock.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Polling time is configured with the sntp client poll timer Global Configuration mode command. The format of an IPv6Z address is: %. interface-name = vlan | ch | isatap | | 0 integer = | decimal-number = 0 | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 physical-port-name = Designated port number, for example:gi1/0/16. If the egress interface is not specified, the default interface is selected. Specifying interface zone=0 is equal to not defining an egress interface. Example The following example configures the device to accept SNTP traffic from the server on 192.1.1.1. Console(config)# sntp server 192.1.1.1 sntp port The sntp port Global Configuration mode command specifies a Simple Network Time Protocol (SNTP) User Datagram Protocol (UDP) port. Use the no form of this command to use the SNTP server default port. Syntax sntp port port-number no sntp port Parameters port-number—Specifies the UDP port number used by an SNTP server. (Range 1–65535) Default Configuration The default port number is 123.122 Clock Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Clock.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Command Mode Global Configuration mode Example The following example specifies that port 321 of the SNTP server is the UDP port. Console(config)# sntp port 321 show clock The show clock EXEC mode command displays the time and date from the system clock. Syntax show clock [detail] Parameters detail—Displays the TimeZone and SummerTime configuration. Command Mode EXEC mode Example The following example displays the system time and date. Console> show clock 15:29:03 PDT(UTC-7) Jun 17 2002 Time source is SNTP Console> show clock detail 15:29:03 PDT(UTC-7) Jun 17 2002 Time source is SNTP Time zone:Clock Commands 123 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Clock.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Acronym is PST Offset is UTC-8 Summertime: Acronym is PDT Recurring every year. Begins at first Sunday of April at 2:00. Ends at last Sunday of October at 2:00. Offset is 60 minutes. DHCP timezone: Disabled Device> show clock detail 15:29:03 PDT(UTC-7) Jun 17 2002 Time source is SNTP Timezone (DHCP): Acronym is PST Offset is UTC-8 Timezone (static): Acronym is PST Offset is UTC-8 Summertime (Static): Acronym is PDT Recurring every year. Begins at first Sunday of April at 2:00. Ends at last Sunday of October at 2:00. Offset is 60 minutes. DHCP timezone: Enabled124 Clock Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Clock.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY show sntp configuration The show sntp configuration Privileged EXEC mode command displays the Simple Network Time Protocol (SNTP) configuration on the device. Syntax show sntp configuration Command Mode Privileged EXEC mode Example The following example displays the device’s current SNTP configuration. console# show sntp configuration SNTP port : 123 . Polling interval: 1024 seconds. No MD5 authentication keys. Authentication is not required for synchronization. No trusted keys. Unicast Clients: Enabled Unicast Clients Polling: Enabled Server Polling Encryption Key ----------------------------- ---------- -------------- 1.1.1.121 Disabled Disabled Broadcast Clients: disabled Anycast Clients: disabled No Broadcast Interfaces. console# show sntp status The show sntp status Privileged EXEC mode command displays the Simple Network Time Protocol (SNTP) servers status.Clock Commands 125 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Clock.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Syntax show sntp status Command Mode Privileged EXEC mode Example The following examples display the SNTP servers status. Device# show sntp status Clock is synchronized, stratum 4, reference is 176.1.1.8, unicast Reference time is AFE2525E.70597B34 (00:10:22.438 PDT Jul 5 1993) Console# show sntp status Clock is synchronized, stratum 4, reference is 176.1.1.8, unicast Reference time is AFE2525E.70597B34 (00:10:22.438 PDT Jul 5 1993) Unicast servers: Server -------- 176.1.1.8 Status ------- Up Last response --------------------- 19:58:22.289 PDT Feb 19 2005 Offset [mSec] ----- 7.33 Delay [mSec] ------ 117.79 176.1.8.17 Unknown 12:17.17.987 PDT Feb 19 2005 8.98 189.19 Anycast server: Server -------- 176.1.11.8 Interface ------- VLAN 118 Status ----- Up Last response ------------- 9:53:21.789 PDT Feb 19 2005 Offset [mSec] ----- 7.19 Delay [mSec] ------ 119.89 Broadcast: Server --------- 176.9.1.1 Interface --------- VLAN 119 Last response ---------------------------- 19:17:59.792 PDT Feb 19 2002126 Clock Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Clock.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LYConfiguration/Image File Commands 127 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Configuration_Image.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY 6 Configuration/Image File Commands copy The copy Privileged EXEC mode command copies files from a source to a destination. Syntax copy source-url destination-url [snmp] Parameters • source-url—Specifies the source file location URL or source file reserved keyword to be copied. (Length: 1–160 characters) • destination-url—Specifies the destination file URL or destination file reserved keyword. (Length: 1–160 characters) • snmp—Specifies that the destination/source file is in SNMP format. Used only when copying from/to startup-config. The following table displays URL options. Keyword Source or Destination flash:// Source or destination URL for flash memory. This is the default URL If a URL is specified without a prefix. running-config Currently running configuration file. startup-config Startup configuration file. image Image file. If specified as the source file, it is the active image file. If specified as the destination file, it is the non-active image file.128 Configuration/Image File Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Configuration_Image.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Command Mode Privileged EXEC mode User Guidelines The location of a file system dictates the format of the source or destination URL. The entire copying process may take several minutes and differs from protocol to protocol and from network to network. If the IPv6 address is a Link Local address (IPv6Z address), the outgoing interface name must be specified. The format of an IPv6Z address is: {ipv6- link-local-address}%{interface-name}. The subparameters are: • ipv6-link-local-address—Specifies the IPv6 Link Local address. boot Boot file. tftp:// Source or destination URL for a TFTP network server. The syntax for this alias is tftp://host/[directory]/filename. The host can be either an IP address or a host name. usb:// Copy to a file on the USB device. The syntax is: usb://directory/filename xmodem: Source for the file from a serial connection that uses the Xmodem protocol. unit://member/i mage Image file on one of the units. To copy from the master to all units, specify * in the member field. unit://member/ boot Boot file on one of the units. To copy from the master to all units, specify * in the member field unit://member/ startup-config Configuration file used during initialization (startup) on one of the units. null: Null destination for copies or files. A remote file can be copied to null to determine its size. mirror-config Mirrored configuration file WORD<1-128> Specify URL prefixes. Keyword Source or DestinationConfiguration/Image File Commands 129 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Configuration_Image.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY • interface-name—Specifies the outgoing interface name. The interface name has the format: vlan{integer} | ch{integer} | isatap{integer} | {physical-port-name}.The subparameter integer has the format: {decimaldigit} | {integer}{decimal-digit}. decimal-digit has the range 0–9 If the egress interface is not specified, the default interface is selected. Specifying interface zone=0 is equal to not defining an egress interface. Understanding Invalid Combinations of Source and Destination Some invalid combinations of source and destination exist. Specifically, if one of the following conditions exists: • The source file and destination file are the same file. • xmodem: is the destination file. The source file can be copied to image, boot and null: only. • tftp:// is the source file and destination file on the same copy. • *.prv files cannot be copied. • The source or destination is a slave unit (except for image and boot files).  mirror-config cannot be used as a destination The following table describes the copy characters: Copying an Image File from a Server to Flash Memory Use the copy source-url image command to copy an image file from a server to flash memory. Copying a Boot File from a Server to Flash Memory Use the copy source-url boot command to copy a boot file from a server to flash memory. Copying a Configuration File from a Server to the Running Configuration File Character Description ! For network transfers, indicates that the copy process is taking place. Each exclamation point indicates successful transfer of ten packets (512 bytes each). . For network transfers, indicates that the copy process timed out. Generally, several periods in a row means that the copy process may fail.s130 Configuration/Image File Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Configuration_Image.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Use the copy source-url running-config command to load a configuration file from a network server to the running device configuration file. The commands in the loaded configuration file are added to those in the running configuration file as if the commands were typed in the command-line interface (CLI). The resulting configuration file is a combination of the previous running configuration and the loaded configuration files, with the loaded configuration file taking precedence. Copying a Configuration File from a Server to the Startup Configuration Use the copy source-url startup-config command to copy a configuration file from a network server to the device startup configuration file. The startup configuration file is replaced by the copied configuration file. Storing the Running or Startup Configuration on a Server Use the copy running-config destination-url command to copy the current configuration file to a network server using TFTP, . Use the copy startup-config destination-url command to copy the startup configuration file to a network server. Saving The Running Configuration To The Startup Configuration Use the copy running-config startup-config command to copy the running configuration to the startup configuration file. -Backing Up the Running Configuration or Startup Configuration to a Backup Configuration file Use the copy running-config file command to back up the running configuration to a backup configuration file. Use the copy startup-config file command to back up the startup configuration to a backup configuration file. Examples The following example copies system image file1 from the TFTP server 172.16.101.101 to a non-active image file. Console# copy tftp://172.16.101.101/file1 image Accessing file 'file1' on 172.16.101.101...Configuration/Image File Commands 131 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Configuration_Image.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Loading file1 from 172.16.101.101: !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! [OK] Copy took 0:01:11 [hh:mm:ss] Copying an Image from a Server to Flash Memory The following example copies a system image named file1 from the TFTP server with an IP address of 172.16.101.101 to a non-active image file. Router# copy tftp://172.16.101.101/file1 image Accessing file 'file1' on 172.16.101.101... Loading file1 from 172.16.101.101: !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!! [OK] Copy took 0:01:11 [hh:mm:ss]132 Configuration/Image File Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Configuration_Image.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY write memory Use the write memory Privileged EXEC mode command to save the running configuration to the startup configuration file. Syntax write memory Parameters This command has no arguments or keywords. Command Mode Privileged EXEC mode Examples The following example copies system image file1 from the TFTP server 172.16.101.101 to a non-active image file. Console# write memory Overwrite file [startup-config] ?[Yes/press any key for no]....15-Sep-2010 11:27 :48 %COPY-I-FILECPY: Files Copy - source URL running-config destination URL flas h://startup-config 15-Sep-2010 11:27:50 %COPY-N-TRAP: The copy operation was completed successfully Copy succeeded delete The delete Privileged EXEC mode command deletes a file from a flash memory device. Syntax delete urlConfiguration/Image File Commands 133 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Configuration_Image.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Parameters url—Specifies the location URL or reserved keyword of the file to be deleted. (Length: 1–160 characters) The following table displays keywords and URL prefixes: Command Mode Privileged EXEC mode User Guidelines *.sys, *.prv, image-1 and image-2 files cannot be deleted. Example The following example deletes the file called ‘test’ from the flash memory. Console# delete flash:test Delete flash:test? [confirm] pwd Use the pwd Privileged EXECmode command to display a full, clarified path to the current directory. Parameters This command has no arguments or keywords. Command Mode EXEC mode Keyword Source or Destination flash:// URL of the flash memory. This is the default URL if a URL is specified without a prefix. usb:// URL of the USB memory. startup-config Startup configuration file. WORD Specify URL prefixes.134 Configuration/Image File Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Configuration_Image.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY dir The dir Privileged EXEC mode command displays the list of files on a flash file system. Syntax dir dir [directory-path] Command Mode Privileged EXEC mode Example The following example displays the list of files on a flash file system Total size of flash: 33292288 bytes Free size of flash: 20708893 bytes console# dir Directory of flash: File Name Permission Size Data Size Modified Flash ------------------- ---------- ---------- -------------------- tmp rw 524288 104 01-Jan-2010 05:35:04 image-1 rw 10485760 10485760 01-Jan-2010 06:10:23 image-2 rw 10485760 10485760 01-Jan-2010 05:43:54 dhcpsn.prv -- 262144 -- 01-Jan-2010 05:25:07 sshkeys.prv -- 262144 -- 04-Jan-2010 06:05:00 syslog1.sys r- 524288 -- 01-Jan-2010 05:57:00 syslog2.sys r- 524288 -- 01-Jan-2010 05:57:00 directry.prv -- 262144 -- 01-Jan-2010 05:25:07 startup-config rw 786432 1081 01-Jan-2010 10:05:34 Total size of flash: 66322432 bytes Free size of flash: 42205184 bytesConfiguration/Image File Commands 135 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Configuration_Image.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY console# more The more Privileged EXEC mode command displays a file. Syntax more url Parameters url—Specifies the location URL or reserved keyword of the source file to be displayed. (Length: 1–160 characters). The following table displays options for the URL parameter: Command Mode Privileged EXEC mode User Guidelines Files are displayed in ASCII format, except for the images, which are displayed in a hexadecimal format. *.prv files cannot be displayed. Example The following example displays the running configuration file contents. Keyword Source or Destination flash:// Source or destination URL for flash memory. If a URL is specified without a prefix, this is the default URL. running-config Current running configuration file. startup-config Startup configuration file. mirror-config Mirrored configuration file. usb: Universal Serial Bus (USB) File System136 Configuration/Image File Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Configuration_Image.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY console# more running-config no spanning-tree interface range gi1/0/1-48 speed 1000 exit no lldp run line console exec-timeout 0 exit cd Use the cd Privileged EXEC mode command to change the current directory. cd new-directory Parameters new-directory—The new directory. The new directory path may be specificed as either a Full Clarified Path or a Relative Path. Command Mode Privileged EXEC mode User Guidelines When command cd changes the current file system, the current directory of the previous file system is saved and when the command specifying only the file system (for example, cd usb:) sets the file system as current, the current directory is restored. Example console cd usb://private/conf console pwd usb://private/conf console cd .. console pwd usb://private console# cd flash:Configuration/Image File Commands 137 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Configuration_Image.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY console pwd flash:// console cd usb: console pwd usb://private console# cd flash:// console pwd flash:\\ console cd usb:// console pwd usb:// rename The rename Privileged EXEC mode command renames a file. Syntax rename url new-url Parameters • url—Specifies the file location URL. (Length: 1–160 characters) • new-url—Specifies the file’s new URL. (Length: 1–160 characters) The following table displays options for the URL parameter: Command Mode Privileged EXEC mode User Guidelines *.sys and *.prv files cannot be renamed. Keyword Source or Destination flash:// URL for flash memory. If a URL is specified without a prefix, this is the default URL. usb: Universal Serial Bus (USB) File System WORD Specify URL prefixes.138 Configuration/Image File Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Configuration_Image.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example The following example renames the configuration file. Console# rename configuration.bak m-config.bak boot system The boot system Privileged EXEC mode command specifies the active system image file that is loaded by the device at startup. Syntax boot system { image-1 | image-2 } [switch number | all] Parameters • switch number—Specifies the unit number. If unspecified, defaults to the master unit number. • image-1—Specifies that image-1 is loaded as the system image during the next device startup. • image-2—Specifies that image-2 is loaded as the system image during the next device startup. Default Configuration This command has no default configuration. The default unit number is the master unit number. Command Mode Privileged EXEC mode User Guidelines Use the show bootvar command to determine which image is the active image.Configuration/Image File Commands 139 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Configuration_Image.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example The following example specifies that image-1 is the active system image file loaded by the device at startup. Console# boot system image-1 show running-config The show running-config Privileged EXEC mode command displays the current running configuration file contents. Syntax show running-config Parameters This command has no arguments or keywords. Command Mode Privileged EXEC mode Example The following example displays the running configuration file contents. Console# show running-config no spanning-tree interface range gi1/0/1-48 speed 1000 exit no lldp run interface vlan 1 ip address 1.1.1.1 255.0.0.0 exit line console exec-timeout 0 exit console#140 Configuration/Image File Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Configuration_Image.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY show startup-config The show startup-config Privileged EXEC mode command displays the startup configuration file contents. Syntax show startup-config Command Mode Privileged EXEC mode Example The following example displays the startup configuration file contents. Console# show startup-config no spanning-tree interface range gi1/0/1-48 speed 1000 exit no lldp run interface vlan 1 ip address 1.1.1.1 255.0.0.0 exit line console exec-timeout 0 exit console# show bootvar The show bootvar EXEC mode command displays the active system image file that is loaded by the device at startup. Syntax show bootvar [unit unit]Configuration/Image File Commands 141 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Configuration_Image.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Parameters unit unit—Specifies the unit number. Command Mode EXEC mode Example The following example displays the active system image file that is loaded by the device at startup. Console# show bootvar Unit ---- 1 Image ----- 1 Filename -------- file1 Version ------- 3.1.31 Date -------------------- 23-Jul-2002 17:34:19 Status ----------- Active 1 2 file2 3.2.19 22-Jan-2003 19:22:32 Not active* 2 1 file1 3.1.31 23-Jul-2002 17:34:19 Not active 2 2 file2 3.2.19 22-Jan-2003 19:22:32 Active "*": Designates that the image was selected for the next boot.142 Configuration/Image File Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Configuration_Image.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LYAuto-Update and Auto-Configuration 143 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Auto-Update.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY 7 Auto-Update and AutoConfiguration boot host auto-config Use the boot host auto-config Global Configuration mode command to enable the support of auto configuration via DHCP. Use the no form of this command to disable DHCP auto configuration. Syntax boot host auto-config no boot host auto-config Parameters This command has no arguments or key words. Command Mode Global Configuration mode Default Configuration Enabled by default. boot host auto-update Use the boot host auto-update Global Configuration mode command to enable the support of auto updated via DHCP. Use the no form of this command to disable DHCP auto configuration.144 Auto-Update and Auto-Configuration FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Auto-Update.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Syntax boot host auto-update no boot host auto-update Parameters This command has no arguments or key words. Command Mode Global Configuration mode Default Configuration Enabled by default. boot host dhcp Use the boot host dhcp Global Configuration mode command to force the mechanism used to download a configuration file at the next system startup. Use the no form of this command to restore the host configuration file to the default. Syntax boot host dhcp no boot host dhcp Parameters This command has no arguments or key words. Command Mode Global Configuration mode User Guidelines Configuring boot host dhcp does not take effect until the next reboot.Auto-Update and Auto-Configuration 145 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Auto-Update.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY boot host auto-save Use the boot host auto-save Global Configuration mode command to enable automatic saving Running in Startup after download. Use the no form of this command restore default behavior. Syntax boot host auto-save no boot host auto-save Parameters This command has no arguments or key words. Command Mode Global Configuration mode Default Configuration Disable show boot Use the show boot Privilege EXEC mode command to show the status of the IP DHCP Auto Config process. Syntax show boot Parameters This command has no keywords or arguments. Command Mode Privilege EXEC mode Examples console# show boot146 Auto-Update and Auto-Configuration FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Auto-Update.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Auto Config ----------- Config Download via DHCP: enable Next Boot Config Download via DHCP: force Auto Config State: Finished TFTP Server IP address: 1.2.20.2 Configuration filename: /config/configfile1.cfg Auto Update ----------- Image Download via DHCP: enabled console# show boot Auto Config ----------- Config Download via DHCP: enable Next Boot Config Download via DHCP: default Auto Config State: Opening -config file Auto Update ------------- Image Download via DHCP: enabled Example 3. console# show boot Auto Config ----------- Config Download via DHCP: enable Next Boot Config Download via DHCP: default Auto Config State: Downloading configuration file Auto Update -----------Auto-Update and Auto-Configuration 147 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Auto-Update.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Image Download via DHCP: enabled console# show boot Auto Config ----------- Config Download via DHCP: enable Next Boot Config Download via DHCP: default Auto Config State: Searching hostname in indirect configuration file Auto Update ----------- Image Download via DHCP: enabled console# show boot Auto Config ----------- Config Download via DHCP: enable Next Boot Config Download via DHCP: default Auto Config State: Quit – failed all steps of finding existing configuration file Auto Update ----------- Image Download via DHCP: enabled console# show boot Auto Config ----------- Config Download via DHCP: enable Next Boot Config Download via DHCP: default Auto Update ----------- Image Download via DHCP: enabled Auto Update State: Downloaded indirect image file148 Auto-Update and Auto-Configuration FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Auto-Update.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY console# show boot Auto Config ----------- Config Download via DHCP: enable Next Boot Config Download via DHCP: default Auto Update ----------- Image Download via DHCP: enabled Auto Update State: Downloading image file console# show boot Auto Config ----------- Config Download via DHCP: enable Next Boot Config Download via DHCP: default Auto Config State: Finished TFTP Server IP address: 1.2.20.2 Configuration filename: /config/configfile1.cfg Auto Update ----------- Image Download via DHCP: enabled Auto Update State: Downloading image file ip dhcp tftp-server ip addr Use the ip dhcp tftp-server ip addr Global Configuration mode command to set the TFTP server’s IP address, used by a switch when it has not been received from the DHCP server. Use the no form of this command to remove the address. Syntax ip dhcp tftp-server ip addr ip-addr no ip dhcp tftp-server ip-addrAuto-Update and Auto-Configuration 149 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Auto-Update.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Parameters ip-addr IP—Address of TFTP server Default Configuration No IP address Command Mode Global Configuration mode ip dhcp tftp-server file Use the ip dhcp tftp-server file Global Configuration mode command to set the full file name on the TFTP server by a switch when it has not been received from the DHCP server. Use the no form of this command to remove the name. Syntax ip dhcp tftp-server file file-path no ip dhcp tftp-server file Parameters file-path—full file name on TFTP server Default Configuration No file name Command Mode Global Configuration mode show ip dhcp tftp-server Use the show ip dhcp tftp-server EXEC mode command to display information about the TFTP server. Syntax show ip dhcp tftp-server150 Auto-Update and Auto-Configuration FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Auto-Update.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Command Mode EXEC Example console# show ip dhcp tftp server tftp server address active 1.1.1.1 from sname manual 2.2.2.2 file path on tftp server active conf/conf-file from option 67Management ACL Commands 151 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Management_ACL.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY 8 Management ACL Commands management access-list The management access-list Global Configuration mode command configures a management access list and enters the Management Access-List Configuration command mode. Use the no form of this command to delete an access list. Syntax management access-list name no management access-list name Parameters name—Specifies the access list name. (Length: 1–32 characters) Command Mode Global Configuration mode User Guidelines Use this command to configure a management access list. This command enters the Management Access-List Configuration mode, where the denied or permitted access conditions are defined with the deny and permit commands. If no match criteria are defined, the default value is deny. When re-entering the access-list context, the new rules are entered at the end of the access list. Use the management access-class command to select the active access list. The active management list cannot be updated or removed.152 Management ACL Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Management_ACL.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY For IPv6 management traffic that is tunneled in IPv4 packets, the management ACL is applied first on the external IPv4 header (rules with service field are ignored), and then again on the inner IPv6 header. Example The following example creates a management access list called mlist, configures management gigabitethernet interfaces 1/0/1 and 1/0/9, and makes the new access list the active list. Console(config)# management access-list mlist Console(config-macl)# permit gi1/0/1 Console(config-macl)# permit gi1/0/9 Console(config-macl)# exit Console(config)# management access-class mlist The following example creates a management access list called ‘mlist’, configures all interfaces to be management interfaces except gigabitethernet interfaces 1/0/1 and 1/0/9, and makes the new access list the active list. Console(config)# management access-list mlist Console(config-macl)# deny gi1/0/1 Console(config-macl)# deny gi1/0/9 Console(config-macl)# permit Console(config-macl)# exit Console(config)# management access-class mlist permit (Management) The permit Management Access-List Configuration mode command sets conditions for the management access list. Syntax permit [interface-id] [service service] permit ip-source {ipv4-address | ipv6-address/ipv6-prefix-length} [mask {mask | prefix-length}] [interface-id] [service service]Management ACL Commands 153 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Management_ACL.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Parameters • interface-id:—Specify an interface ID. The interface ID can be one of the following types: Ethernet port, Port-channel or VLAN • service service — Specifies the service type. Possible values are: Telnet, SSH, HTTP, HTTPS and SNMP. • ipv4-address— Specifies the source IPv4 address. • ipv6-address/ipv6-prefix-length— Specifies the source IPv6 address and source IPv6 address prefix length. The prefix length must be preceded by a forward slash (/). The parameter is optional. • mask mask — Specifies the source IPv4 address network mask. This parameter is relevant only to IPv4 addresses. • mask prefix-length — Specifies the number of bits that comprise the source IPv4 address prefix. The prefix length must be preceded by a forward slash (/). This parameter is relevant only to IPv4 addresses. (Range: 0–32) Command Mode Management Access-List Configuration mode User Guidelines Rules with ethernet, VLAN, and port-channel parameters are valid only if an IP address is defined on the appropriate interface. Example The following example permits all ports in the access list called mlist Console(config)# management access-list mlist Console(config-macl)# permit deny (Management) The deny Management Access-List Configuration mode command sets conditions for the management access list.154 Management ACL Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Management_ACL.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Syntax deny [interface-id] [service service] deny ip-source {ipv4-address | ipv6-address/ipv6-prefix-length} [mask {mask | prefix-length}] [interface-id] [service service] Parameters • interface-id—Specifies an interface ID. The interface ID can be one of the following types: Ethernet port, Port-channel or VLAN • service service—Specifies the service type. Possible values are: Telnet, SSH, HTTP, HTTPS and SNMP. • ipv4-address—Specifies the source IPv4 address. • ipv6-address/ipv6-prefix-length—Specifies the source IPv6 address and source IPv6 address prefix length. The prefix length must be preceded by a forward slash (/). The parameter is optional. • mask mask—Specifies the source IPv4 address network mask. The parameter is relevant only to IPv4 addresses. • mask prefix-length—Specifies the number of bits that comprise the source IPv4 address prefix. The prefix length must be preceded by a forward slash (/). The parameter is relevant only to IPv4 addresses. (Range: 0–32) Command Mode Management Access-List Configuration mode User Guidelines Rules with ethernet, VLAN, and port-channel parameters are valid only if an IP address is defined on the appropriate interface. Example The following example denies all ports in the access list called mlist. Console(config)# management access-list mlist Console(config-macl)# denyManagement ACL Commands 155 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Management_ACL.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY management access-class The management access-class Global Configuration mode command restricts management connections by defining the active management access list. To disable management connection restrictions, use the no form of this command. Syntax management access-class {console-only | name} no management access-class Parameters • console-only—Specifies that the device can be managed only from the console. • name—Specifies the access list name to be used. (Length: 1–32 characters) Default Configuration The default configuration is no management connection restrictions. Command Mode Global Configuration mode Example The following example defines an access list called mlist as the active management access list. Console(config)# management access-class mlist show management access-list The show management access-list Privileged EXEC mode command displays management access lists. Syntax show management access-list [name]156 Management ACL Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Management_ACL.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Parameters name—Specifies the name of a management access list to be displayed. (Length: 1–32 characters) Command Mode Privileged EXEC mode Example The following example displays the mlist management access list. Console# show management access-list mlist console-only ------------ deny ! (Note: all other access implicitly denied) mlist ----- permit gi1/0/1 permit gi1/0/9 ! (Note: all other access implicitly denied) console# show management access-class The show management access-class Privileged EXEC mode command displays information about the active management access list. Syntax show management access-class Command Mode Privileged EXEC modeManagement ACL Commands 157 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Management_ACL.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example The following example displays the active management access list information. Console# show management access-class Management access-class is enabled, using access list mlist158 Management ACL Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Management_ACL.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LYSNMP Commands 159 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\SNMP.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY 9 SNMP Commands snmp-server Use the snmp-server server Global Configuration mode command to enable the device to be configured by SNMP. Use the no form of this command to disable this function. Syntax snmp-server server no snmp-server server Parameters This command has no arguments or keywords. Default Enabled Command Mode Global Configuration mode Example snmp-server server ====================== console(config)# snmp-server server snmp-server community Use the snmp-server community Global Configuration mode command to set up the community access string to permit access to the Simple Network 160 SNMP Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\SNMP.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Management Protocol command. Use the no form of this command to remove the specified community string. Syntax snmp-server community string [view view-name] [ro | rw | su] {ipv4- address| ipv6-address} [mask | prefix-length] [type router | oob] snmp-server community-group string group-name [ipv4-address| ipv6- address] [mask | prefix-length] [type router | oob] no snmp-server community string [ipv4-address| ipv6-address] Parameters • string—Community string that acts like a password and permits access to the SNMP protocol. (Range: 1–20 characters) • ro—Specifies read-only access (default) • rw—Specifies read-write access • su—Specifies SNMP administrator access • view view-name—Specifies the name of a view to be configured using the command snmp-server view (no specific order of the command configurations is imposed on the user). The view defines the objects available to the community. It is not relevant for su, which has access to the whole MIB. If unspecified, all the objects, except the community-table and SNMPv3 user and access tables, are available. (Range: 1–30 characters) • ipv4-address—Management station IPv4 address. The default is all IP addresses. • ipv6-address—Management station IPv4 address. The default is all IP addresses. • mask—Specifies the mask of the IPv4 address. This is not a network mask, but rather a mask that defines which bits of the packet’s source address are compared to the configured IP address. If unspecified, it defaults to 255.255.255.255. The command returns an error if the mask is specified without an IPv4 address. • prefix-length—Specifies the number of bits that comprise the IPv4 address prefix. If unspecified, it defaults to 32. The command returns an error if the prefix-length is specified without an IPv4 address.SNMP Commands 161 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\SNMP.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY • group-name—Specifies the name of a group that should be configured using the command snmp-server group with v1 or v2 parameter (no specific order of the two command configurations is imposed on the user). The group defines the objects available to the community. (Range: 1–30 characters) • type router—Specifies that SNMP requests for duplicate tables configure the router tables. This is the default. • type oob—Specifies that SNMP requests for duplicate tables configure the oob tables. Default No community is defined Command Mode Global Configuration mode User Guidelines You can’t specify view-name for su, which has access to the whole MIB. You can use the view-name to restrict the access rights of a community string. The logical key of the command is the pair (community, ip-address). If ipaddress is omitted then the key is (community, All-Ips). By specifying the view-name parameter, the software: • Generates an internal security-name. • Maps the internal security-name for SNMPv1 and SNMPv2 security models to an internal group-name. • Maps the internal group-name for SNMPv1 and SNMPv2 security models to view-name (read-view and notify-view always, and for rw for write-view also), You can use the group-name to restrict the access rights of a community string. By specifying the group-name parameter the software: • Generates an internal security-name. • Maps the internal security-name for SNMPv1 and SNMPv2 security models to the group-name.162 SNMP Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\SNMP.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY The snmp-server community-group command and snmp-server user command for v1 and v2 are equivalent. You should use the snmp-server community-group command when you want to configure the ipv4-address| ipv6-address management addresses. The Type keyword is used for a different purpose. Therefore, when defining an SNMP community, the administrator must indicate which tables are being configured. If Type is router, it means that the device's tables are being configured. Example snmp-server community ========================== console(config)# snmp-server community abcd su 1.1.1.121 mask 255.0.0.0 console(config)# snmp-server community-group tom abcd 1.1.1.122 prefix 8 snmp-server view The snmp-server view Global Configuration mode command creates or updates a Simple Network Management Protocol (SNMP) server view entry. Use the no form of this command to remove an SNMP server view entry. Syntax snmp-server view view-name oid-tree {included | excluded} no snmp-server view view-name [oid-tree] Parameters • view-name—Specifies the label for the view record that is being created or updated. The name is used to reference the record. (Length: 1–30 characters) • oid-tree—Specifies the ASN.1 subtree object identifier to be included or excluded from the view. To identify the subtree, specify a text string consisting of numbers, such as 1.3.6.2.4, or a word, such as System. Replace a single sub-identifier with the asterisk (*) wildcard to specify a subtree family; for example 1.3.*.4. • included—Specifies that the view type is included.SNMP Commands 163 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\SNMP.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY • excluded—Specifies that the view type is excluded. Default Configuration Default and DefaultSuper are the default view names. Command Mode Global Configuration mode User Guidelines This command can be entered multiple times for the same view record. The command logical key is the pair (view-name, oid-tree). The number of views is limited to 64. Default and DefaultSuper views are reserved for internal software use and cannot be deleted or modified. Example The following example creates a view that includes all objects in the MIB-II system group except for sysServices (System 7) and all objects for interface 1 in the MIB-II interface group. Console(config)# snmp-server view user-view system included Console(config)# snmp-server view user-view system.7 excluded Console(config)# snmp-server view user-view ifEntry.*.1 included snmp-server group The snmp-server group Global Configuration mode command configures a new Simple Network Management Protocol (SNMP) group or a table that maps SNMP users to SNMP views. Use the no form of this command, remove a specified SNMP group. Syntax snmp-server group groupname {v1 | v2 | v3 {noauth | auth | priv} [notify notifyview]} [read readview] [write writeview]164 SNMP Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\SNMP.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY no snmp-server group groupname {v1 | v2 | v3 [noauth | auth | priv]} [context name] Parameters • groupname—Specifies the group name. (Length: 1–30 characters) • v1—Specifies the SNMP Version 1 security model. • v2—Specifies the SNMP Version 2 security model. • v3—Specifies the SNMP Version 3 security model. • noauth—Specifies no packet authentication. Applicable only to the SNMP Version 3 security model. • auth—Specifies packet authentication without encryption. Applicable only to the SNMP Version 3 security model. • priv—Specifies packet authentication with encryption. Applicable only to the SNMP Version 3 security model. • notify notifyview—Specifies the view name that enables specifying an inform or a trap. Applicable only to the SNMP Version 3 security model. (Length: 1–30 characters) • read readview—Specifies the view name that enables viewing only the agent contents. (Length: 1–30 characters) • write writeview—Specifies the view name that enables entering data and configuring the agent contents. (Length: 1–30 characters) Default Configuration No group entry exists. If notifyview is not specified, nothing is defined for the notify view. If readview is not specified, all objects except for the community-table and SNMPv3 user and access tables are available. If writeview is not specified, nothing is defined for the write view. Command Mode Global Configuration modeSNMP Commands 165 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\SNMP.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY User Guidelines The command logical key is (groupname, snmp-version, security-level). For snmp-version v1/v2 the security-level is always noauth. The Router context is translated to "" context in the MIB. Example The following example attaches a group called user-group to SNMPv3 and assigns to the group the privacy security level and read access rights to a view called user-view. Console(config)# snmp-server group user-group v3 priv read userview snmp-server user Use the snmp-server user Global Configuration mode command to configure a new SNMP Version 3 user. Use the no form of the command to remove a user. Syntax snmp-server user username groupname {v1 | v2c | [remote host] v3 [encrypted] [auth {md5 | sha} auth-password]} no snmp-server user username [remote host] Parameters • username—The name of the user on the host that connects to the agent. (Range: Up to 20 characters) • groupname—The name of the group to which the user belongs. The group should be configured using the command snmp-server group with v3 parameters (no specific order of the 2 command configurations is imposed on the user). (Range: Up to 30 characters) • remote host—IP address of the remote SNMP host. • v1—Specifies that v1 is to be used. • v2c—Specifies that v2c is to be used.166 SNMP Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\SNMP.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY • v3—Specifies that v3 is to be used. • encrypted—Specifies whether the password appears in encrypted format. • auth—Specifies which authentication level is to be used. • md5—Specifies the HMAC-MD5-96 authentication level. • Sha—Specifies the HMAC-SHA-96 authentication level. • auth-password—Specifies the authentication password. Parameters Range engineid-string5 - 32 characters. auth-passwordUp to 32 characters. Default No group entry exists. Command Mode Global configuration User Guidelines If auth md5 or auth sha is specified, both authentication and privacy are enabled for the user. When you enter a show running-config command, you do not see a line for this user. To see if this user has been added to the configuration, type the show snmp user command. An SNMP EngineID should be defined in order to add users to the device. Changing or removing the value of snmpEngineID deletes the SNMPv3 users’ database. The logical key of the command is Username. Configuring a remote host is required in order to send informs to that host. A configured remote host is also able to manage the device (besides getting the informs) To configure a remote user, specify the IP address for the remote SNMP agent of the device where the user resides. Also, before you configure remote users for a particular agent, configure the SNMP engine ID, using the snmp-server engineID remote command. The remote agent's SNMP engine ID is needed when computing the authentication and privacy digests from the password. If SNMP Commands 167 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\SNMP.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY the remote engine ID is not configured first, the configuration command fails. Example snmp-server user ==================== console(config)# snmp-server user tom acbd v1 console(config)# snmp-server user tom acbd v2c console(config)# snmp-server engineid local default The engine-id must be unique within your administrative domain. Do you wish to continue? [Y/N] y The SNMPv3 database will be erased. Do you wish to continue? [Y/N] y console(config)# snmp-server user tom acbd v3 snmp-server filter The snmp-server filter Global Configuration mode command creates or updates a Simple Network Management Protocol (SNMP) server filter entry. Use the no form of this command to remove the specified SNMP server filter entry. Syntax snmp-server filter filter-name oid-tree {included | excluded} no snmp-server filter filter-name [oid-tree] Parameters • filter-name—Specifies the label for the filter record that is being updated or created. The name is used to reference the record. (Length: 1–30 characters)168 SNMP Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\SNMP.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY • oid-tree—Specifies the ASN.1 subtree object identifier to be included or excluded from the view. To identify the subtree, specify a text string consisting of numbers, such as 1.3.6.2.4, or a word, such as System. Replace a single sub-identifier with the asterisk (*) wildcard to specify a subtree family; for example, 1.3.*.4. • included—Specifies that the filter type is included. • excluded—Specifies that the filter type is excluded. Default Configuration No view entry exists. Command Mode Global Configuration mode User Guidelines This command can be entered multiple times for the same filter record. If an object identifier is included in two or more lines, later lines take precedence. The command's logical key is the pair (filter-name, oid-tree). Example The following example creates a filter that includes all objects in the MIB-II system group except for sysServices (System 7) and all objects for interface 1 in the MIB-II interfaces group. Console(config)# snmp-server filter filter-name system included Console(config)# snmp-server filter filter-name system.7 excluded Console(config)# snmp-server filter filter-name ifEntry.*.1 included snmp-server host Use the snmp-server host Global Configuration mode command to specify the recipient of a Simple Network Management Protocol notification operation. Use the no form of this command to remove the specified host.SNMP Commands 169 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\SNMP.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Syntax snmp-server host { ipv4-address | ipv6-address| hostname} [traps | informs] [version {1 | 2c | 3 [auth | noauth | priv]}] community-string [udp-port port] [filter filtername] [timeout seconds] [retries retries] no snmp-server host { ipv4-address | ipv6-address| hostname} [traps | informs] [version {1 | 2c | 3}] Parameters • pv4-address—IPv4 address of the host (the targeted recipient). • ipv6-address—Pv6 address of the host (the targeted recipient). When the IPv6 address is a Link Local address (IPv6Z address), the outgoing interface name must be specified. Refer to the User Guidelines for the interface name syntax. • hostname—Hostname of the host. (Range: 1–158 characters. Maximum label size: 63) • trap—Sends SNMP traps to this host (default). • informs—Sends SNMP informs to this host. Not applicable to SNMPv1. • 1—SNMPv1 traps are used. • 2c—SNMPv2 traps are used • 3—SNMPv2 traps are used • community-string—Password-like community string sent with the notification operation. (Range: 1–20 characters) • noauth—Specifies no authentication of a packet. • auth—Specifies authentication of a packet without encrypting it. • priv—Specifies authentication of a packet with encryption. • udp-port port—UDP port of the host to use. The default is 162. (Range: 1–65535) • filter filtername—A string that is the name of the filter that defines the filter for this host. If unspecified, nothing is filtered. The filter should be defined using the command snmp-server filter (no specific order of the command configurations is imposed on the user). (Range: Up to 30 characters)170 SNMP Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\SNMP.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY • timeout seconds—Number of seconds to wait for an acknowledgment before resending informs. The default is 15 seconds. The parameter is relevant only for informs. (Range: 1–300) • retries retries—Maximum number of times to resend an inform request, when a response is not received for a generated message. The default is 3. The parameter is relevant only for informs. (Range: 0–255) Command Mode Global Configuration mode User Guidelines The logical key of the command is the pair (ip-address/hostname, traps/informs, version). When configuring snmp v1 or v2 notifications recipient the software would automatically generate a notification view for that recipient for all the MIB. (.For SNMPv3 the software doesn’t automatically create a user nor a notify view. Use the commands snmp-server user, snmp-server group and snmpserver view in Global Configuration mode to create a user, a group or a notify group respectively. The format of an IPv6Z address is: % interface-name = vlan | ch | isatap | | 0 integer = | decimal-number = 0 | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 physical-port-name = Designated port number, for example 1/0/16 If the egress interface is not specified, the default interface is selected. Specifying interface zone=0 is equal to not defining an egress interface. Example The following defines a host at the IP address displayed. console(config)# snmp-server host 1.1.1.121 abcSNMP Commands 171 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\SNMP.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY snmp-server engineID local The snmp-server engineID local Global Configuration mode command specifies the Simple Network Management Protocol (SNMP) engineID on the local device. Use the no form of this command to remove the configured engine ID. Syntax snmp-server engineID local {engineid-string | default} no snmp-server engineID local Parameters • engineid-string—Specifies a concatenated hexadecimal character string identifying the engine ID. Each byte in a hexadecimal character string is two hexadecimal digits. Bytes are separated by a period or colon. If an odd number of hexadecimal digits are entered, the system automatically prefixes the digit 0 to the string. (Length: 5–32 characters, 9–64 hexadecimal digits) • default—Specifies that the engine ID is created automatically based on the device MAC address. Default Configuration The engine ID is not configured. If SNMPv3 is enabled using this command, and the default is specified, the default engine ID is defined per standard as: • First 4 octets: First bit = 1, the rest is IANA Enterprise number = 674. • Fifth octet: Set to 3 to indicate the MAC address that follows. • Last 6 octets: The device MAC address. Command Mode Global Configuration mode User Guidelines To use SNMPv3, specify an engine ID for the device. Any ID can be specified or use a default string, which is generated using the device MAC address.172 SNMP Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\SNMP.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY As the EngineID should be unique within an administrative domain, the following guidelines are recommended: • For standalone devices, use the default keyword to configure the Engine ID. • For stackable systems, configure an EngineID, and verify that it is unique within the administrative domain. Changing or removing the value of snmpEngineID deletes the SNMPv3 users database. The SNMP EngineID cannot be all 0x0 or all 0xF or 0x000000001 Example The following example enables SNMPv3 on the device and sets the device local engine ID to the default value. Console(config)# snmp-server engineID local default snmp-server engineID remote To specify the Simple Network Management Protocol (SNMP) engine ID of a remote SNMP device, use the snmp-server engineID remote Global Configuration mode command. Use the no form of this command to remove the configured engine ID. Syntax snmp-server engineID remote {ipv4-ip-address | ipv6 address} engineidstring no snmp-server engineID remote {ipv4-ip-address | ipv6 address} Parameters • ipv4-ip-address | ipv6 address—Pv4 or IPv6 address of the remote device • engineid-string—The character string that identifies the engine ID. The engine ID is a concatenated hexadecimal string. Each byte in hexadecimal character strings is two hexadecimal digits. Each byte can be separated by SNMP Commands 173 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\SNMP.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY a period or colon. If the user enters an odd number of hexadecimal digits, the system automatically prefixes the hexadecimal string with a zero. (Range: engineid-string5–32 characters. 9–64 hexadecimal digits) Default Configuration The EngineID is not configured. Command Mode Global Configuration mode User Guidelines A remote engine ID is required when an SNMP version 3 inform is configured. The remote engine ID is used to compute the security digest for authenticating and encrypting packets sent to a user on the remote host. snmp-server enable traps Use the snmp-server enable traps Global Configuration mode command to enable the device to send SNMP traps. Use the no form of the command to disable SNMP traps. Syntax snmp-server enable traps no snmp-server enable traps Default Configuration SNMP traps are enabled. Command Mode Global Configuration mode Example The following example enables SNMP traps. Console(config)# snmp-server enable traps174 SNMP Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\SNMP.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY snmp-server trap authentication Use the snmp-server trap authentication Global Configuration mode command to enable the device to send SNMP traps when authentication fails. Use the no form of this command to disable SNMP failed authentication traps. Syntax snmp-server trap authentication no snmp-server trap authentication Default Configuration SNMP failed authentication traps are enabled. Command Mode Global Configuration mode Example The following example enables SNMP failed authentication traps. Console(config)# snmp-server trap authentication snmp-server contact Use the snmp-server contact Global Configuration mode command to configure the system contact (sysContact) string. Use the no form of the command to remove the system contact information. Syntax snmp-server contact text no snmp-server contact Parameters text—Specifies the string describing system contact information. (Length: 1–160 characters)SNMP Commands 175 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\SNMP.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Command Mode Global Configuration mode Example The following example configures the system contact point called Technical_Support. Console(config)# snmp-server contact Technical_Support snmp-server location Use the snmp-server location Global Configuration mode command to configure the system location string. Use the no form of this command to remove the location string. Syntax snmp-server location text no snmp-server location Parameters text—Specifies a string describing system location information. (Length: 1–160 characters) Command Mode Global Configuration mode Example The following example defines the device location as New_York. Console(config)# snmp-server location New_York snmp-server set Use the snmp-server set Global Configuration mode command to define the SNMP MIB value.176 SNMP Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\SNMP.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Syntax snmp-server set variable-name name value [name2 value2 ...] Parameters • variable-name—Specifies the SNMP MIB variable name, which must be a valid string. • name value—Specifies a list of name and value pairs. Each name and value must be a valid string. In the case of scalar MIBs, there is only a single name-value pair. In the case of an entry in a table, there is at least one name-value pair, followed by one or more fields. Command Mode Global Configuration mode User Guidelines Although the CLI can set any required configuration, there might be a situation where an SNMP user sets a MIB variable that does not have an equivalent command. To generate configuration files that support those situations, use the snmp-server set command. Example The following example configures the scalar MIB sysName with the value TechSupp. Console(config)# snmp-server set sysName sysname TechSupp show snmp Use the show snmp Privileged EXEC mode command to display the SNMP status. Syntax show snmp Command Mode Privileged EXEC modeSNMP Commands 177 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\SNMP.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example The following example displays the SNMP communications status. Console# show snmp SNMP is enabled CommunityString -------------- public private private Community-Access ---------------- read only read write su View name ------------ user-view Default DefaultSuper IP Address ---------- All 172.16.1.1/1 0 172.16.1.1 Type ---- Router Router Router Communitystring -------------- public Group name ---------- user-group IP address ---------- All Type ------ Router Traps are enabled. Authentication trap is enabled. Version 1,2 notifications Target Address -------------- 192.122.173.42 192.122.173.42 Type ---- Trap Info rm Community --------- public public Version ------ 2 2 UDP Port --- 162 162 Filter name ------ TO Sec --- 15 15 Retries ------- 3 3 Version 3 notifications Target Address -------------- 192.122.173.42 Type ---- Info rm Username -------- Bob Security Level ------ Priv UDP Port --- 162 Filter name ----- TO Sec --- 15 Retries ------- 3 System Contact: Robert System Location: Marketing178 SNMP Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\SNMP.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY The following table describes the significant fields shown in the display. show snmp engineID Use the show snmp engineID Privileged EXEC mode command to display the local Simple Network Management Protocol (SNMP) engine ID. Syntax show snmp engineID Command Mode Privileged EXEC mode Example The following example displays the SNMP engine ID. Console # show snmp engineID Local SNMP engineID: 08009009020C0B099C075878 #Editor: If snmp-server engineID remote command is supported add the following line IP address Remote SNMP engineID ----------- ------------------------------- 172.16.1.1 08009009020C0B099C075879 Field Description Community-string The community access string permitting access to the SNMP protocol. Community-access The access type—read-only, read-write, super access. IP Address The management station IP Address. Trap-Rec-Address The targeted recipient. Trap-Rec-Community The statistics sent with the notification operation. Version The SNMP version (1 or 2) for the sent trap.SNMP Commands 179 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\SNMP.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY show snmp views Use the show snmp views Privileged EXEC mode command to display the configured SNMP views. Syntax show snmp views [viewname] Parameters viewname—Specifies the view name. (Length: 1–30 characters) Command Mode Privileged EXEC mode Example The following example displays the configured SNMP views. show snmp groups Use the show snmp groups Privileged EXEC mode command to display the configured SNMP groups. Syntax show snmp groups [groupname] Parameters groupname—Specifies the group name. (Length: 1–30 characters) Console# show snmp views Name OID Tree Type ---------------- Default Default ---------------------- iso snmpNotificationMIB ---------- Included Excluded180 SNMP Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\SNMP.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Command Mode Privileged EXEC mode Example The following example displays the configured SNMP groups. The following table describes significant fields shown above. show snmp filters Use the show snmp filters Privileged EXEC mode command to display the configured SNMP filters. Console# show snmp groups Name Security Views ------------- user-group managers-group Model ----- V3 V3 Level ---- priv priv Read ------- Default Default Write ------- "" Default Notify ------- "" "" Field Description Name Group name. Security Model SNMP model in use (v1, v2 or v3). Security Level Packet authentication with encryption. Applicable to SNMP v3 security only. Views Read View name enabling viewing the agent contents. If unspecified, all objects except the communitytable and SNMPv3 user and access tables are available. Write View name enabling data entry and managing the agent contents. Notify View name enabling specifying an inform or a trap.SNMP Commands 181 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\SNMP.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Syntax show snmp filters [filtername] Parameters filtername—Specifies the filter name. (Length: 1–30 characters) Command Mode Privileged EXEC mode Example The following example displays the configured SNMP filters. show snmp users Use the show snmp users Privileged EXEC mode command to display the configured SNMP users. Syntax show snmp users [username] Parameters username—Specifies the user name. (Length: 1–30 characters) Command Mode Privileged EXEC mode Console# show snmp filters Name OID Tree Type ------------ user-filter user-filter user-filter --------------------- 1.3.6.1.2.1.1 1.3.6.1.2.1.1.7 1.3.6.1.2.1.2.2.1.*.1 --------- Included Excluded Included182 SNMP Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\SNMP.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example The following example displays the configured SNMP users. Console# show snmp users Name ------ John John Group name ------------ user-group user-group Auth Method ------- md5 md5 Remote ------------------------ 08009009020C0B099C075879RSA and Certificate Commands 183 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\RSA_and_Certificates.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY 10 RSA and Certificate Commands crypto key generate dsa The crypto key generate dsa Global Configuration mode command generates DSA key pairs. Syntax crypto key generate dsa Default Configuration DSA key pairs do not exist. Command Mode Global Configuration mode User Guidelines DSA keys are generated in pairs - one public DSA key and one private DSA key. If the device already has DSA keys, a warning is displayed with a prompt to replace the existing keys with new keys. This command is not saved in the router configuration. However, the keys generated by this command are saved in the private configuration (which is never displayed to the user or backed up to another device). Example The following example generates DSA key pairs. Console(config)# crypto key generate dsa184 RSA and Certificate Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\RSA_and_Certificates.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY crypto key generate rsa The crypto key generate rsa Global Configuration mode command generates RSA key pairs. Syntax crypto key generate rsa Default Configuration RSA key paris do not exist. Command Mode Global Configuration mode User Guidelines RSA keys are generated in pairs - one public RSA key and one private RSA key. If the device already has RSA keys, a warning is displayed with a prompt to replace the existing keys with new keys. This command is not saved in the router configuration; however, the keys generated by this command are saved in the private configuration (which is never displayed to the user or backed up to another device). Example The following example generates RSA key pairs. Console(config)# crypto key generate rsa show crypto key mypubkey The show crypto key mypubkey Privileged EXEC mode command displays the device SSH public keys. Syntax show crypto key mypubkey [rsa | dsa]RSA and Certificate Commands 185 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\RSA_and_Certificates.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Parameters • rsa—Displays the RSA key. • dsa—Displays the DSA key. Command Mode Privileged EXEC mode Example The following example displays the SSH public RSA keys on the device. Console# show crypto key mypubkey rsa RSA key data: 005C300D 06092A86 4886F70D 01010105 00034B00 30480241 00C5E23B 55D6AB22 04AEF1BA A54028A6 9ACC01C5 129D99E4 64CAB820 847EDAD9 DF0B4E4C 73A05DD2 BD62A8A9 FA603DD2 E2A8A6F8 98F76E28 D58AD221 B583D7A4 71020301 87685768 Fingerprint(Hex): 77:C7:19:85:98:19:27:96:C9:CC:83:C5:78:89:F8:86 Fingerprint(Bubble Babble): yteriuwt jgkljhglk yewiury hdskjfryt gfhkjglk crypto certificate generate The crypto certificate generate Global Configuration mode command generates a self-signed certificate for HTTPS. Syntax crypto certificate number generate [key-generate [length]] [passphrase string] [cn common- name] [ou organization-unit] [or organization] [loc location] [st state] [cu country] [duration days] Parameters • number—Specifies the certificate number. (Range: 1–2) • key-generate—Regenerates SSL RSA key. • length—Specifies the SSL's RSA key length. (Range: 512–2048) • passphrase string—Specifies the passphrase used for exporting the certificate in PKCS12 file format. (Length: 8–96 characters)186 RSA and Certificate Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\RSA_and_Certificates.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY • cn common-name—Specifies the fully qualified device URL or IP address. (Length: 1–64 characters) • ou organization-unit—Specifies the organization-unit or department name. (Length: 1–64 characters) • or organization—Specifies the organization name. (Length: 1–64 characters) • loc location—Specifies the location or city name. (Length: 1–64 characters) • st state—Specifies the state or province name. (Length: 1–64 characters) • cu country—Specifies the country name. (Length: 2 characters) • duration days—Specifies the number of days a certification is valid. (Range: 30–3650) Default Configuration The default certificate number is 1. The default SSL’s RSA key length is 1024. If passphrase string is not specified, the certificate is not exportable. If cn common-name is not specified, it defaults to the device’s lowest static IPv6 address (when the certificate is generated), or to the device’s lowest static IPv4 address if there is no static IPv6 address, or to 0.0.0.0 if there is no static IP address. If duration days is not specified, it defaults to 365 days. Command Mode Global Configuration mode User Guidelines This command is not saved in the router configuration. However, the certificate and keys generated by this command are saved in the private configuration (which is never displayed to the user or backed up to another device). When exporting a RSA key pair to a PKCS#12 file, the RSA key pair is as secure as the passphrase. Keep the passphrase secure. If the RSA key does not exist, you must use the parameter key-generate.RSA and Certificate Commands 187 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\RSA_and_Certificates.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example The following example generates a self-signed certificate for HTTPS. Console# crypto certificate generate key-generate crypto certificate request The crypto certificate request Privileged EXEC mode command generates and displays a certificate request for HTTPS. Syntax crypto certificate number request common-name [ou organization-unit] [or organization] [loc location] [st state] [cu country] Parameters • number—Specifies the certificate number. (Range: 1–2) • common-name—Specifies the device’s fully qualified URL or IP address. (Length: 1–64 characters) • ou organization-unit—Specifies the organization-unit or department name. (Length: 1–64 characters) • or organization—Specifies the organization name. (Length: 1–64 characters) • loc location—Specifies the location or city name. (Length: 1–64 characters) • st state—Specifies the state or province name. (Length: 1–64 characters) • cu country—Specifies the country name. (Length: 2 characters) Command Mode Privileged EXEC mode User Guidelines Use this command to export a certificate request to a Certification Authority. The certificate request is generated in Base64-encoded X.509 format.188 RSA and Certificate Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\RSA_and_Certificates.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Before generating a certificate request, first generate a self-signed certificate using the crypto certificate generate Global Configuration mode command to generate the keys. The certificate fields must be re-entered. After receiving the certificate from the Certification Authority, use the crypto certificate import Global Configuration mode command to import the certificate into the device. This certificate replaces the self-signed certificate. Example The following example displays the certificate request for HTTPS. Console# crypto certificate 1 request -----BEGIN CERTIFICATE REQUEST----- MIwTCCASoCAQAwYjELMAkGA1UEBhMCUFAxCzAJBgNVBAgTAkNDMQswCQYDVQQH EwRDEMMAoGA1UEChMDZGxkMQwwCgYDVQQLEwNkbGQxCzAJBgNVBAMTAmxkMRAw DgKoZIhvcNAQkBFgFsMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC8ecwQ HdML0831i0fh/F0MV/Kib6Sz5p+3nUUenbfHp/igVPmFM+1nbqTDekb2ymCu6K aKvEbVLF9F2LmM7VPjDBb9bb4jnxkvwW/wzDLvW2rsy5NPmH1QVl+8Ubx3GyCm /oW93BSOFwxwEsP58kf+sPYPy+/8wwmoNtDwIDAQABoB8wHQYJKoZIhvcNAQkH MRDjEyMwgICCAgICAICAgIMA0GCSqGSIb3DQEBBAUAA4GBAGb8UgIx7rB05m+2 m5ZZPhIwl8ARSPXwhVdJexFjbnmvcacqjPG8pIiRV6LkxryGF2bVU3jKEipcZa g+uNpyTkDt3ZVU72pjz/fa8TF0n3 -----END CERTIFICATE REQUEST----- CN= router.gm.com 0= General Motors C= US crypto certificate import The crypto certificate import Global Configuration mode command imports a certificate signed by a Certification Authority for HTTPS. Syntax crypto certificate number importRSA and Certificate Commands 189 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\RSA_and_Certificates.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Parameters number—Specifies the certificate number. (Range: 1–2) Command Mode Global Configuration mode User Guidelines To end the session, use a blank line. The imported certificate must be based on a certificate request created by the crypto certificate request privileged EXEC command. If the public key found in the certificate does not match the device's SSL RSA key, the command fails. This command is not saved in the router configuration. However, the certificate imported by this command is saved in the private configuration (which is never displayed to the user or backed up to another device). Example The following example imports a certificate signed by Certification Authority for HTTPS. Console(config)# crypto certificate 1 import -----BEGIN CERTIFICATE----- dHmUgUm9vdCBDZXJ0aWZpZXIwXDANBgkqhkiG9w0BAQEFAANLADBIAkEAp4HS nnH/xQSGA2ffkRBwU2XIxb7n8VPsTm1xyJ1t11a1GaqchfMqqe0kmfhcoHSWr yf1FpD0MWOTgDAwIDAQABo4IBojCCAZ4wEwYJKwYBBAGCNxQCBAYeBABDAEEw CwR0PBAQDAgFGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFAf4MT9BRD47 ZvKBAEL9Ggp+6MIIBNgYDVR0fBIIBLTCCASkwgdKggc+ggcyGgclsZGFwOi8v L0VByb3h5JTIwU29mdHdhcmUlMjBSb290JTIwQ2VydGlmaWVyLENOPXNlcnZl -----END CERTIFICATE----- Certificate imported successfully. Issued to: router.gm.com Issued by: www.verisign.com Valid from: 8/9/2003 to 8/9/2004 Subject: CN= router.gm.com, 0= General Motors, C= US190 RSA and Certificate Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\RSA_and_Certificates.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Finger print: DC789788 DC88A988 127897BC BB789788 crypto certificate export pkcs12 The crypto certificate export pkcs12 Privileged EXEC mode command exports the certificate and the RSA keys within a PKCS12 file. Syntax crypto certificate number export pkcs12 Parameters number—Specifies the certificate number. (Range: 1–2) Command Mode Privileged EXEC mode User Guidelines The crypto certificate export pkcs12 command creates a PKCS 12 file that contains the certificate and an RSA key pair. The passphrase for the export is determined when the key is generated. The certificate and key pair are exported in a standard PEM-format PKCS12 file. This format can be converted to and from the binary PFX file used by Windows and Linux by using the openssl command-line tool. See an open source OpenSSL user manual (man pkcs12) for more information. Example The following example exports the certificate and the RSA keys within a PKCS12 file. Console# crypto certificate 1 export pkcs12 Bag Attributes localKeyID: 0C 75 81 77 5A 31 53 D1 FF 4E 26 BE 8D 4A FD 8B 22 9F 45 D4 subject=/C=us/ST= /L= /CN= /O= /OU= issuer= /C=us/ST= /L= /CN= /O= /OU= -----BEGIN CERTIFICATE----- MIIBfDCCASYCAQAwDQYJKoZIhvcNAQEEBQAwSTELMAkGA1UEBhMCdXMxCjAIBgNVRSA and Certificate Commands 191 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\RSA_and_Certificates.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY BAgTASAxCjAIBgNVBAcTASAxCjAIBgNVBAMTASAxCjAIBgNVBAoTASAxCjAIBgNV BAsTASAwHhcNMDQwMjA3MTU1NDQ4WhcNMDUwMjA2MTU1NDQ4WjBJMQswCQYDVQQG EwJ1czEKMAgGA1UECBMBIDEKMAgGA1UEBxMBIDEKMAgGA1UEAxMBIDEKMAgGA1UE ChMBIDEKMAgGA1UECxMBIDBcMA0GCSqGSIb3DQEBAQUAA0sAMEgCQQCZXP/tk3e/ jrulfZw8q8T2oS5ymrEIes/sRJE8uahTBJqKu1VHqRYJR3VYa/03HSJ741w5MzPI iuWZzrbbuXAxAgMBAAEwDQYJKoZIhvcNAQEEBQADQQBQ+GTLeN1p1kARxI4C1fTU efig3ffZ/tjW5q1t1r5F6zNv/GuXWw7rGzmRyoMXDcYp1TaA4gAIFQCpFGqiSbAx -----END CERTIFICATE----- Bag Attributes localKeyID: 0C 75 81 77 5A 31 53 D1 FF 4E 26 BE 8D 4A FD 8B 22 9F 45 D4 Key Attributes: -----BEGIN RSA PRIVATE KEY----- Proc-Type: 4,ENCRYPTED DEK-Info: DES-EDE3-CBC,085DCBF3A41D2669 dac0m9jqEp1DM50sIDb8Jq1jxW/1P0kqSxuMhc25OdBE/1fPBg9VSvV1ARaYt16W bX67UyJ8t7HHF3AowjcWzElQ5GJgSQ0VemsqsRQzjpCTb090rx+cNwVfIvjoedgQ Mtl5+fKIAcqsfEgEGJNXQ4jEzsXAkwfQLFfgt47O3IpkUn0AxrQzutJDOcC28Uxp raMVTVSlSkJIvaPuXJxdZ279tDMwZffILBfKCJGACT5V5/4WEqDkrF+uuF9/oxm2 5SVL8TvUmXB/3hX4UoaXtxAhuyOdhh1kyyZSpw9BPPR/8bc/wUYERh7+7JXLKHpd ueeu3znfIX4dDeti8B3xYvvE8kGZjxFN1cC3zc3JsD0IVu1LkyiAa93P4LPEvAwG Fw1LqmGiiqw9JM/tzc6kYkZXylFzCrSVf2exP+/tEvM= -----END RSA PRIVATE KEY----- crypto certificate import pkcs12 The crypto certificate import pkcs12 Privileged EXEC mode command imports the certificate and the RSA keys within a PKCS12 file. Syntax crypto certificate number import pkcs12 passphrase Parameters • number—Specifies the certificate number. (Range: 1–2) • passphrase—Specifies the passphrase used to encrypt the PKCS12 file for export. (Length: 8–96 characters)192 RSA and Certificate Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\RSA_and_Certificates.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Command Mode Privileged EXEC mode User Guidelines Use the passphrase that was exported by the crypto certificate export pkcs12 command. NOTE: This passphrase is saved for later exports. Example The following example imports the certificate and the RSA keys within a PKCS12 file. Console# crypto certificate 1 import pkcs12 passphrase Bag Attributes localKeyID: 0C 75 81 77 5A 31 53 D1 FF 4E 26 BE 8D 4A FD 8B 22 9F 45 D4 subject=/C=us/ST= /L= /CN= /O= /OU= issuer= /C=us/ST= /L= /CN= /O= /OU= -----BEGIN CERTIFICATE----- MIIBfDCCASYCAQAwDQYJKoZIhvcNAQEEBQAwSTELMAkGA1UEBhMCdXMxCjAIBgNV BAgTASAxCjAIBgNVBAcTASAxCjAIBgNVBAMTASAxCjAIBgNVBAoTASAxCjAIBgNV BAsTASAwHhcNMDQwMjA3MTU1NDQ4WhcNMDUwMjA2MTU1NDQ4WjBJMQswCQYDVQQG EwJ1czEKMAgGA1UECBMBIDEKMAgGA1UEBxMBIDEKMAgGA1UEAxMBIDEKMAgGA1UE ChMBIDEKMAgGA1UECxMBIDBcMA0GCSqGSIb3DQEBAQUAA0sAMEgCQQCZXP/tk3e/ jrulfZw8q8T2oS5ymrEIes/sRJE8uahTBJqKu1VHqRYJR3VYa/03HSJ741w5MzPI iuWZzrbbuXAxAgMBAAEwDQYJKoZIhvcNAQEEBQADQQBQ+GTLeN1p1kARxI4C1fTU efig3ffZ/tjW5q1t1r5F6zNv/GuXWw7rGzmRyoMXDcYp1TaA4gAIFQCpFGqiSbAx -----END CERTIFICATE----- Bag Attributes localKeyID: 0C 75 81 77 5A 31 53 D1 FF 4E 26 BE 8D 4A FD 8B 22 9F 45 D4 Key Attributes: -----BEGIN RSA PRIVATE KEY----- Proc-Type: 4,ENCRYPTED DEK-Info: DES-EDE3-CBC,085DCBF3A41D2669 dac0m9jqEp1DM50sIDb8Jq1jxW/1P0kqSxuMhc25OdBE/1fPBg9VSvV1ARaYt16W bX67UyJ8t7HHF3AowjcWzElQ5GJgSQ0VemsqsRQzjpCTb090rx+cNwVfIvjoedgQ Mtl5+fKIAcqsfEgEGJNXQ4jEzsXAkwfQLFfgt47O3IpkUn0AxrQzutJDOcC28UxpRSA and Certificate Commands 193 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\RSA_and_Certificates.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY raMVTVSlSkJIvaPuXJxdZ279tDMwZffILBfKCJGACT5V5/4WEqDkrF+uuF9/oxm2 5SVL8TvUmXB/3hX4UoaXtxAhuyOdhh1kyyZSpw9BPPR/8bc/wUYERh7+7JXLKHpd ueeu3znfIX4dDeti8B3xYvvE8kGZjxFN1cC3zc3JsD0IVu1LkyiAa93P4LPEvAwG Fw1LqmGiiqw9JM/tzc6kYkZXylFzCrSVf2exP+/tEvM= -----END RSA PRIVATE KEY----- show crypto certificate mycertificate The show crypto certificate mycertificate Privileged EXEC mode command displays the device SSL certificates. Syntax show crypto certificate mycertificate [number] Parameters number—Specifies the certificate number. (Range: 1–2 Command Mode Privileged EXEC mode Example The following example displays SSL certificate # 1 present on the device. Console# show crypto certificate mycertificate 1 -----BEGIN CERTIFICATE----- dHmUgUm9vdCBDZXJ0aWZpZXIwXDANBgkqhkiG9w0BAQEFAANLADBIAkEAp4HS nnH/xQSGA2ffkRBwU2XIxb7n8VPsTm1xyJ1t11a1GaqchfMqqe0kmfhcoHSWr yf1FpD0MWOTgDAwIDAQABo4IBojCCAZ4wEwYJKwYBBAGCNxQCBAYeBABDAEEw CwR0PBAQDAgFGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFAf4MT9BRD47 ZvKBAEL9Ggp+6MIIBNgYDVR0fBIIBLTCCASkwgdKggc+ggcyGgclsZGFwOi8v L0VByb3h5JTIwU29mdHdhcmUlMjBSb290JTIwQ2VydGlmaWVyLENOPXNlcnZl -----END CERTIFICATE----- Issued by: www.verisign.com Valid from: 8/9/2003 to 8/9/2004 Subject: CN= router.gm.com, 0= General Motors, C= US194 RSA and Certificate Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\RSA_and_Certificates.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Finger print: DC789788 DC88A988 127897BC BB789788Web Server Commands 195 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Web_Server.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY 11 Web Server Commands ip http server The ip http server Global Configuration mode command enables configuring and monitoring the device from a web browser. Use the no form of this command to disable this function. Syntax ip http server no ip http server Default Configuration HTTP server is enabled. Command Mode Global Configuration mode196 Web Server Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Web_Server.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example The following example enables configuring the device from a web browser. Console(config)# ip http server ip http port The ip http port Global Configuration mode command specifies the TCP port used by the web browser interface. Use the no form of this command to restore the default configuration. Syntax ip http port port-number no ip http port Parameters port-numberPort number—For use by the HTTP server. (Range: 0–65534) Default Configuration The default port number is 80. Command Mode Global Configuration mode Example The following example configures the http port number as 100. Console(config)# ip http port 100 ip http timeout-policy Use the ip http timeout-policy Global Configuration mode command to set the interval for the system to wait for user input in http sessions before automatic logoff. Use the no form of this command to return to the default value.Web Server Commands 197 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Web_Server.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Syntax ip http timeout-policy idle seconds no ip http timeout-policy Parameters seconds—Specifies the maximum number of seconds that a connection is kept open if no data is received or response data cannot be sent out. (Range: 0–86400) Default 600 seconds Command Mode Global Configuration mode User Guidelines This command also configures the timeout-policy for HTTPS. To specify no timeout, enter the ip http timeout-policy 0 command. Example The following example configures the http port number as 100. Console(config)# ip http timeout-policy 0 ip http secure-server Use the ip http secure-server Global Configuration mode command to enable the device to be configured securely from a browser, and to also enable the device to be monitored or have its configuration modified securely from a browser,. Use the no form of this command to disable this function. Syntax ip http secure-server no ip http secure-server198 Web Server Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Web_Server.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Parameters This command has no arguments or keywords. Default Disabled Command Mode Global Configuration mode User Guidelines Use the crypto certificate generate command to generate an HTTPS certificate. Example console(config)# ip http secure-server ip http secure-port To specify the TCP port to be used by the secure web browser interface, use the ip http secure-port Global Configuration mode command. To use the default port, use the no form of this command. Syntax ip http secure-port port-number no ip http secure-port Parameters port-number—Port number for use by the HTTPS server (Range: 0–65534) Default The default port number is 443. Command Mode Global Configuration modeWeb Server Commands 199 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Web_Server.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example console(config)# ip http secure-port 1234 ip https certificate The ip https certificate Global Configuration mode command configures the active certificate for HTTPS. Use the no form of this command to restore the default configuration. Syntax ip https certificate number no ip https certificate Parameters number—Specifies the certificate number. (Range: 1–2) Default Configuration The default certificate number is 1. Command Mode Global Configuration mode User Guidelines Use the crypto certificate generate command to generate a HTTPS certificate. Example The following example configures the active certificate for HTTPS. Console(config)# ip https certificate 2200 Web Server Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Web_Server.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY show ip http The show ip http EXEC mode command displays the HTTP server configuration. Syntax show ip http Command Mode EXEC mode Example The following example displays the HTTP server configuration. Console# show ip http HTTP server enabled Port: 80 Interactive timeout: 10 minutes show ip https The show ip https Privileged EXEC mode command displays the HTTPS server configuration. Syntax show ip https Command Mode Privileged EXEC mode Example The following example displays the HTTPS server configuration. Console# show ip https HTTPS server enabledWeb Server Commands 201 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Web_Server.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Port: 443 Interactive timeout: Follows the HTTP interactive timeout (10 minutes) Certificate 1 is active Issued by: www.verisign.com Valid from: 8/9/2003 to 8/9/2004 Subject: CN= router.gm.com, 0= General Motors, C= US Finger print: DC789788 DC88A988 127897BC BB789788 Certificate 2 is inactive Issued by: self-signed Valid from: 8/9/2003 to 8/9/2004 Subject: CN= router.gm.com, 0= General Motors, C= US Finger print: 1873B936 88DC3411 BC8932EF 782134BA202 Web Server Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Web_Server.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LYTelnet, SSH and Slogin Commands 203 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Telnet_SSH_and_Slogin.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY 12 Telnet, SSH and Slogin Commands ip telnet server The ip telnet server Global Configuration mode command enables the device to be configured from a Telnet server. Use the no form of this command to disable the device configuration from a Telnet server. Syntax ip telnet server no ip telnet server Default Configuration Device configuration from a Telnet server is enabled. Command Mode Global Configuration mode User Guidelines To control the device configuration by SSH, use the ip ssh server Global Configuration mode command. Example The following example enables the device to be configured from a Telnet server. Console(config)# ip telnet server204 Telnet, SSH and Slogin Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Telnet_SSH_and_Slogin.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY ip ssh port The ip ssh port Global Configuration mode command specifies the port used by the SSH server. Use the no form of this command to restore the default configuration. Syntax ip ssh port port-number no ip ssh port Parameters port-number—Specifies the port number to be used by the SSH server. (Range: 1–65535) Default Configuration The default port number is 22. Command Mode Global Configuration mode Example The following example specifies that port number 8080 is used by the SSH server. Console(config)# ip ssh port 8080 ip ssh server The ip ssh server Global Configuration mode command enables the device to be configured from an SSH server. Use the no form of this command to disable the device configuration from a SSH server,. Syntax ip ssh server no ip ssh serverTelnet, SSH and Slogin Commands 205 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Telnet_SSH_and_Slogin.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Default Configuration Device configuration from an SSH server is enabled. Command Mode Global Configuration mode User Guidelines If encryption keys are not generated, the SSH server is in standby until the keys are generated. To generate SSH server keys, use the crypto key generate dsa and crypto key generate rsa Global Configuration mode commands. Example The following example enables configuring the device from a SSH server. Console(config)# ip ssh server ip ssh pubkey-auth The ip ssh pubkey-auth Global Configuration mode command enables public key authentication of incoming SSH sessions. Use the no form of this command to disable this function. Syntax ip ssh pubkey-auth no ip ssh pubkey-auth Default Configuration Public Key authentication of incoming SSH sessions is disabled. Command Mode Global Configuration mode User Guidelines AAA authentication is independent.206 Telnet, SSH and Slogin Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Telnet_SSH_and_Slogin.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example The following example enables public key authentication for incoming SSH sessions. Console(config)# ip ssh pubkey-auth crypto key pubkey-chain ssh The crypto key pubkey-chain ssh Global Configuration mode command enters the SSH Public Key-chain Configuration mode. This mode is used to manually specify other device public keys such as SSH client public keys. Syntax crypto key pubkey-chain ssh Default Configuration Keys do not exist. Command Mode Global Configuration mode User Guidelines Use this command when you want to manually specify SSH client’s public keys. Example The following example enters the SSH Public Key-chain Configuration mode and manually configures the RSA key pair for SSH public key-chain to ‘bob’. Console(config)# crypto key pubkey-chain ssh Console(config-pubkey-chain)# user-key bob Console(config-pubkey-key)# key-string rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCvTnRwPWl Al4kpqIw9GBRonZQZxjHKcqKL6rMlQ+ ZNXfZSkvHG+QusIZ/76ILmFT34v7u7ChFAE+ Vu4GRfpSwoQUvV35LqJJk67IOU/zfwOl1gTelnet, SSH and Slogin Commands 207 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Telnet_SSH_and_Slogin.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY kTwml75QR9gHujS6KwGN2QWXgh3ub8gDjTSq muSn/Wd05iDX2IExQWu08licglk02LYciz +Z4TrEU/9FJxwPiVQOjc+KBXuR0juNg5nFYsY 0ZCk0N/W9a/tnkm1shRE7Di71+w3fNiOA 6w9o44t6+AINEICBCCA4YcF6zMzaT1wefWwX6f+ Rmt5nhhqdAtN/4oJfce166DqVX1gWmN zNR4DYDvSzg0lDnwCAC8Qh Fingerprint: a4:16:46:23:5a:8d:1d:b5:37:59:eb:44:13:b9:33:e9 user-key The user-key SSH Public Key-string Configuration mode command specifies which SSH public key is manually configured. Use the no form of this command to remove an SSH public key. Syntax user-key username {rsa | dsa} no user-key username Parameters • username—Specifies the remote SSH client username. (Length: 1–48 characters) • rsa—Specifies that the RSA key pair is manually configured. • dsa—Specifies that the DSA key pair is manually configured. Default Configuration No SSH public keys exist. Command Mode SSH Public Key-string Configuration mode User Guidelines Follow this command with the key-string SSH Public Key-String Configuration mode command to specify the key.208 Telnet, SSH and Slogin Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Telnet_SSH_and_Slogin.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Please note that after entering this command, the existing key is deleted even if no new key is defined by the key-string command Exampe The following example enables manually configuring an SSH public key for SSH public key-chain bob. Console(config)# crypto key pubkey-chain ssh Console(config-pubkey-chain)# user-key bob rsa Console(config-pubkey-key)# key-string row AAAAB3NzaC1yc2EAAAADAQABAAABAQCvTnRwPWl key-string The key-string SSH Public Key-string Configuration mode command manually specifies an SSH public key. Syntax key-string [row key-string] Parameters • row—Specifies the SSH public key row by row. • key-string—Specifies the key in UU-encoded DER format. UU-encoded DER format is the same format as in the authorized_keys file used by OpenSSH. (Length:0–160) Default Configuration Keys do not exist. Command Mode SSH Public Key-string Configuration mode User Guidelines Use the key-string SSH Public Key-string Configuration mode command without the row parameter to specify which SSH public key is to be Telnet, SSH and Slogin Commands 209 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Telnet_SSH_and_Slogin.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY interactively configured next. Enter a row with no characters to complete the command. Use the key-string row SSH Public Key-string Configuration mode command to specify the SSH public key, row by row. Each row must begin with a keystring row command. The UU-encoded DER format is the same format as in the authorized_keys file used by OpenSSH. Example The following example enters public key strings for SSH public key client ‘bob’. Console(config)# crypto key pubkey-chain ssh Console(config-pubkey-chain)# user-key bob rsa Console(config-pubkey-key)# key-string AAAAB3NzaC1yc2EAAAADAQABAAABAQCvTnRwPWl Al4kpqIw9GBRonZQZxjHKcqKL6rMlQ+ ZNXfZSkvHG+QusIZ/76ILmFT34v7u7ChFAE+ Vu4GRfpSwoQUvV35LqJJk67IOU/zfwOl1g kTwml75QR9gHujS6KwGN2QWXgh3ub8gDjTSq muSn/Wd05iDX2IExQWu08licglk02LYciz +Z4TrEU/9FJxwPiVQOjc+KBXuR0juNg5nFYsY 0ZCk0N/W9a/tnkm1shRE7Di71+w3fNiOA 6w9o44t6+AINEICBCCA4YcF6zMzaT1wefWwX6f+ Rmt5nhhqdAtN/4oJfce166DqVX1gWmN zNR4DYDvSzg0lDnwCAC8Qh Fingerprint: a4:16:46:23:5a:8d:1d:b5:37:59:eb:44:13:b9:33:e9 Console(config)# crypto key pubkey-chain ssh Console(config-pubkey-chain)# user-key bob rsa Console(config-pubkey-key)# key-string row AAAAB3Nza Console(config-pubkey-key)# key-string row C1yc2210 Telnet, SSH and Slogin Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Telnet_SSH_and_Slogin.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY show ip ssh The show ip ssh Privileged EXEC mode command displays the SSH server configuration. Syntax show ip ssh Command Mode Privileged EXEC mode Example The following example displays the SSH server configuration. The following table describes the significant fields shown in the display. Console# show ip ssh SSH server enabled. Port: 22 RSA key was generated. DSA (DSS) key was generated. SSH Public Key Authentication is enabled. Active incoming sessions: IP address --------- 172.16.0.1 SSH username ----------- John Brown Version ------- 1.5 Cipher ------ 3DES Auth code ---------- HMAC-SHA1 Field Description IP address The client address SSH username The user name Version The SSH version numberTelnet, SSH and Slogin Commands 211 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Telnet_SSH_and_Slogin.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY show crypto key pubkey-chain ssh The show crypto key pubkey-chain ssh Privileged EXEC mode command displays SSH public keys stored on the device. Syntax show crypto key pubkey-chain ssh [username username] [fingerprint {bubble-babble | hex}] Parameters • username username—Specifies the remote SSH client username. (Length: 1–48 characters) • fingerprint {bubble-babble | hex}—Specifies the fingerprint display format. The possible values are: • bubble-babble—Specifies that the fingerprint is displayed in Bubble Babble format. • hex—Specifies that the fingerprint is displayed in hexadecimal format. Default Configuration The default fingerprint format is hexadecimal. Command Mode Privileged EXEC mode Example The following examples display SSH public keys stored on the device. Console# show crypto key pubkey-chain ssh Username -------- Cipher The encryption type (3DES, Blowfish, RC4) Auth Code The authentication Code (HMAC-MD5, HMAC-SHA1) Field Description212 Telnet, SSH and Slogin Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Telnet_SSH_and_Slogin.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY bob john Fingerprint ----------------------------------------------- 9A:CC:01:C5:78:39:27:86:79:CC:23:C5:98:59:F1:86 98:F7:6E:28:F2:79:87:C8:18:F8:88:CC:F8:89:87:C8 Console# show crypto key pubkey-chain ssh username bob Username: bob Key: 005C300D 06092A86 4886F70D 01010105 00034B00 30480241 00C5E23B 55D6AB22 04AEF1BA A54028A6 9ACC01C5 129D99E4 Fingerprint: 9A:CC:01:C5:78:39:27:86:79:CC:23:C5:98:59:F1:86Line Commands 213 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Line.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY 13 Line Commands line The line Global Configuration mode command identifies a specific line for configuration and enters the Line Configuration command mode. Syntax line {console | telnet | ssh} Parameters • console—Enters the console terminal line mode. • telnet—Configures the device as a virtual terminal for remote console access (Telnet). • ssh—Configures the device as a virtual terminal for secured remote console access (SSH). Command Mode Global Configuration mode Example The following example configures the device as a virtual terminal for remote (Telnet) console access. Console(config)# line telnet Console(config-line)#214 Line Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Line.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY speed The speed Line Configuration mode command sets the line baud rate. Use the no form of this command to restore the default configuration. Syntax speed bps no speed Parameters bps—Specifies the baud rate in bits per second (bps). Possible values are 2400, 4800, 9600, 19200, 38400, 57600, and 115200. Default Configuration The default speed is 9600 bps. Command Mode Line Configuration (console) mode User Guidelines The configured speed is applied when Autobaud is disabled. This configuration applies to the current session only. Example The following example configures the line baud rate as 9600 bits per second. Console(config-line)# speed 9600 autobaud The autobaud Line Configuration mode command sets the line for automatic baud rate detection (autobaud). Use the no form of this command to disable automatic baud rate detection. Syntax autobaudLine Commands 215 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Line.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY no autobaud Default Configuration Automatic baud rate detection is disabled. Command Mode Line Configuration mode User Guidelines To start communication using Autobaud, press the Enter key twice. Example The following example enables autobaud. Console(config)# line console Console(config-line)# autobaud exec-timeout The exec-timeout Line Configuration mode command sets the session idle time interval, during which the system waits for user input before automatic logoff. Use the no form of this command to restore the default configuration. Syntax exec-timeout minutes [seconds] no exec-timeout Parameters • minutes—Specifies the number of minutes. (Range: 0-65535) • seconds—Specifies the number of seconds. (Range: 0-59) Default Configuration The default idle time interval is 10 minutes. Command Mode Line Configuration mode216 Line Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Line.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY User Guidelines To specify no timeout, enter the exec-timeout 0 0 command. Example The following example sets the HTTP session idle time interval before automatic logoff to 20 minutes. Console(config)# line console Console(config-line)# exec-timeout 20 show line The show line EXEC mode command displays line parameters. Syntax show line [console | telnet | ssh] Parameters • console—Displays the console configuration. • telnet—Displays the Telnet configuration. • ssh—Displays the SSH configuration. Default Configuration If the line is not specified, all line configuration parameters are displayed. Command Mode EXEC mode Example The following example displays the line configuration. Console> show line Console configuration:Line Commands 217 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Line.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Interactive timeout: Disabled History: 10 Baudrate: 9600 Databits: 8 Parity: none Stopbits: 1 Telnet configuration: Telnet is enabled. Interactive timeout: 10 minutes 10 seconds History: 10 SSH configuration: SSH is enabled. Interactive timeout: 10 minutes 10 seconds History: 10218 Line Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Line.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LYAAA Commands 219 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\AAA.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY 14 AAA Commands aaa authentication login The aaa authentication login Global Configuration mode command sets an authentication method applied during login. Use the no form of this command to restore the default authentication method. Syntax aaa authentication login {default | list-name} method [method2 ...] no aaa authentication login {default | list-name} Parameters • default—Uses the listed authentication methods that follow this argument as the default method list when a user logs in. • list-name—Specifies a name for a list of authentication methods activated when a user logs in. (Length: 1–12 characters) • method [method2 ...]—Specifies a list of methods that the authentication algorithm tries, in the given sequence. The additional authentication methods are used only if the previous method returns an error, not if it fails. To ensure that the authentication succeeds even if all methods return an error, specify none as the final method in the command line. Select one or more methods from the following list: Keyword Description enable Uses the enable password for authentication. line Uses the line password for authentication. local Uses the local username database for authentication.220 AAA Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\AAA.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Default Configuration The local user database is the default authentication method. This is the same as entering the command aaa authentication login local. NOTE: If an authentication method is not defined, console users can log in without any authentication verification. Command Mode Global Configuration mode User Guidelines The default and additional list names created with the aaa authentication login command are used with the login authentication command. Create a list by entering the aaa authentication login list-name method command for a particular protocol, where list-name is any character string used to name ) this list. The method argument identifies the list of methods that the authentication algorithm tries, in the given sequence. The additional methods of authentication are used only if the previous method returns an error, not if it fails. Specify none as the final method in the command line to ensure that the authentication succeeds even if all methods return an error. Example The following example sets the authentication login methods. Console (config)# aaa authentication login default radius local enable none none Uses no authentication. radius Uses the list of all RADIUS servers for authentication. tacacs Uses the list of all TACACS+ servers for authentication.AAA Commands 221 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\AAA.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY aaa authentication enable The aaa authentication enable Global Configuration mode command sets an authentication method for accessing higher privilege levels. To restore the default authentication method, use the no form of this command. Syntax aaa authentication enable {default | list-name} method [method2 ...] no aaa authentication enable {default | list-name} Parameters • default—Uses the listed authentication methods that follow this argument as the default method list, when accessing higher privilege levels. • list-name —Specifies a name for the list of authentication methods activated when a user accesses higher privilege levels. (Length: 1–12 characters) • method [method2 ...]—Specifies a list of methods that the authentication algorithm tries, in the given sequence. The additional authentication methods are used only if the previous method returns an error, not if it fails. Specify none as the final method in the command line to ensure that the authentication succeeds, even if all methods return an error. Select one or more methods from the following list: Keyword Description enable Uses the enable password for authentication. line Uses the line password for authentication. none Uses no authentication. radius Uses the list of all RADIUS servers for authentication. Uses username "$enabx$." where x is the privilege level. tacacs Uses the list of all TACACS servers for authentication. Uses username "$enabx$." where x is the privilege level.222 AAA Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\AAA.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Default Configuration The enable password command is the default authentication login method. This is the same as entering the command aaa authentication enable default enable. On a console, the enable password is used if a password exists. If no password is set, authentication still succeeds. This is the same as entering the command aaa authentication enable default enable none. Command Mode Global Configuration mode User Guidelines The default and additional list names created with the aaa authentication enable command are used with the enable authentication command. All aaa authentication enable default requests sent by the device to a RADIUS or TACACS+ server include the username $enabx$., where x is the requested privilege level. Create a list by entering the aaa authentication enable list-name method command where list-name is any character string used to name this list. The method argument identifies the list of methods that the authentication algorithm tries, in the given sequence. The additional methods of authentication are used only if the previous method returns an error, not if it fails. Specify none as the final method in the command line to ensure that the authentication succeeds even if all methods return an error. Example The following example sets the enable password for authentication for accessing higher privilege levels. Console(config)# aaa authentication enable default enableAAA Commands 223 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\AAA.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY login authentication The login authentication Line Configuration mode command specifies the login authentication method list for a remote Telnet or console session. Use the no form of this command to restore the default authentication method. Syntax login authentication {default | list-name} no login authentication Parameters • default—Uses the default list created with the aaa authentication login command. • list-name—Uses the specified list created with the aaa authentication login command. (Length: 1–12 characters). Default Configuration The default is the aaa authentication login command default. Command Mode Line Configuration mode Example The following example specifies the login authentication method for a console session. Console(config)# line console Console(config-line)# login authentication default enable authentication The enable authentication Line Configuration mode command specifies the authentication method for accessing a higher privilege level from a remote Telnet or console. Use the no form of this command to restore the default authentication method.224 AAA Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\AAA.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Syntax enable authentication {default | list-name} no enable authentication Parameters • default—Uses the default list created with the aaa authentication enable command. • list-name—Uses the specified list created with the aaa authentication enable command. (Length: 1–12 characters). Default Configuration The default is the aaa authentication enable command default. Command Mode Line Configuration mode Example The following example specifies the authentication method when accessing a higher privilege level from a console. Console(config)# line console Console(config-line)# enable authentication default ip http authentication The ip http authentication Global Configuration mode command specifies authentication methods for HTTP server access. Use the no form of this command to restore the default authentication method. Syntax ip http authentication aaa login-authentication method1 [method2...] no ip http authentication aaa login-authentication Parameters method [method2 ...]—Specifies a list of methods that the authentication algorithm tries, in the given sequence. The additional authentication AAA Commands 225 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\AAA.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY methods are used only if the previous method returns an error, not if it fails. Specify none as the final method in the command line to ensure that the authentication succeeds, even if all methods return an error. Select one or more methods from the following list: Default Configuration The local user database is the default authentication login method. This is the same as entering the ip http authentication local command. Command Mode Global Configuration mode User Guidelines The command is relevant for HTTP and HTTPS server users. The additional methods of authentication are used only if the previous method returns an error, not if it fails. Specify none as the final method in the command line to ensure that the authentication succeeds, even if all methods return an error. Example The following example specifies the HTTP access authentication methods. Console(config)# ip http authentication aaa login-authentication radius local show authentication methods The show authentication methods Privileged EXEC mode command displays information about the authentication methods. Keyword Description local Uses the local username database for authentication. none Uses no authentication. radius Uses the list of all RADIUS servers for authentication. tacacs Uses the list of all TACACS+ servers for authentication.226 AAA Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\AAA.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Syntax show authentication methods Command Mode Privileged EXEC mode Example The following example displays the authentication configuration. password The password Line Configuration mode command specifies a password on a line, also known as access method, such as a console or Telnet. Use the no form of this command to return to the default password. Console# show authentication methods Login Authentication Method Lists --------------------------------- Default: Radius, Local, Line Console_Login: Line, None Enable Authentication Method Lists ---------------------------------- Default: Radius, Enable Console_Enable: Enable, None Line -------------- Console Telnet SSH Login Method List ----------------- Console_Login Default Default Enable Method List ------------------ Console_Enable Default Default HTTP: Radius, local HTTPS: Radius, local Dot1x: RadiusAAA Commands 227 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\AAA.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Syntax password password [encrypted] no password Parameters • password—Specifies the password for this line. (Length: 0–159 characters) • encrypted—Specifies that the password is encrypted and copied from another device configuration. Default Configuration No password is defined. Command Mode Line Configuration mode Example The following example specifies the password ‘secret’ on a console. Console(config)# line console Console(config-line)# password secret service password-recovery Use the service password-recovery global configuration mode command to enable full functionality of the password-recovery mechanism. Use the no service password-recovery command to allow password-recovery mechanism without keeping the configuration and user files. Syntax service password-recovery no service password-recovery Parameters N/A228 AAA Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\AAA.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Default Configuration The full service password recovery is enabled by default. Command Mode Gobal Configuration mode User Guidelines This mechanism allows an end user, with physical access to the console port of the device, to enter the boot menu and trigger the password recovery process. The following functionality occurs: • If password recovery is enabled, the user can access the boot menu and trigger the password recovery in the boot menu. All configuration files and user files are kept. • If password recovery is disabled, the user still can access the boot menu and trigger the password recovery in the boot menu. However, the configuration files and user files are removed, and the following log message is generated to the terminal: “All the configuration and user files were removed” Example The following command disables password recovery: console# no service password recovery Note that choosing to use Password recovery option in the Boot Menu during the boot process will remove the configuration files and the user files. Would you like to continue ? Y/N. enable password Use the enable password Global Configuration mode command to set a local password to control access to normal and privilege levels. Use the no form of this command to return to the default password.AAA Commands 229 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\AAA.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Syntax enable password [ level privilege-level ] { password | encrypted encryptedpassword } no enable password [ level level ] Parameters • level privilege-level—Level for which the password applies. If not specified the level is 15. (Range: 1–15) • password—Password for this level. (Range: 0–159 chars) • encrypted-password—Encrypted password you enter, copied from another device configuration. Default Default for level is 15. Command Mode Global Configuration mode Example console(config)# enable password level 15 let-me-in username Use the username Global Configuration mode command to establish a username-based authentication system. Use the no form to remove a user name. Syntax username name { nopassword | password password | privilege privilege-level | password encrypted encrypted-password } username name no username name230 AAA Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\AAA.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Parameters • name—The name of the user. (Range: 1–20 characters) • nopassword—No password is required for this user to log in. • password—The authentication password for the user. (Range: 1–159) • password-encrypted—Encrypted password you enter, copied from another device configuration. • privilege privilege-level —Privilege level for which the password applies. If not specified the level is 15. (Range: 1–15) Default No user is defined. Command Mode Global Configuration mode Example console(config)# username tom privilege 15 password 1234 show user accounts The show user accounts Privileged EXEC mode command displays information about the users local database. Syntax show user accounts Command Mode Privileged EXEC modeAAA Commands 231 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\AAA.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example The following example displays information about the users local database. The following table describes the significant fields shown in the display: aaa accounting login Use the aaa accounting login command in Global Configuration mode to enable accounting of device management sessions. Use the no form of this command to disable accounting. Syntax aaa accounting login start-stop group radius no aaa accounting login start-stop group radius Parameters This command has no arguments or keywords. Default Disabled Command Mode Global Configuration mode Console# show user accounts Username -------- Bob Robert Smith Privilege --------- 15 15 15 Field Description Username The user name. Privilege The user’s privilege level.232 AAA Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\AAA.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY User Guidelines This command enables the recording of device management sessions (Telnet, serial and WEB but not SNMP). It records only users that were identified with a username (e.g. a user that was logged in with a line password is not recorded). If accounting is activated, the device sends a “start”/“stop” messages to a Radius server when a user logs in / logs out respectively. The device uses the configured priorities of the available Radius servers in order to select the Radius server. The following table describes the supported Radius accounting Attributes Values, and when they are sent by the switch. Example console(config)# aaa accounting login start-stop group radius Name Start Stop Description User-Name (1) Yes Yes User’s identity. NAS-IP-Address (4) Yes Yes The switch IP address that is used for the session with the Radius server. Class (25) Yes Yes Arbitrary value is included in all accounting packets for a specific session. Called-Station-ID (30) Yes Yes The switch IP address that is used for the management session. Calling-Station-ID (31) Yes Yes The user IP address. Acct-Session-ID (44) Yes Yes A unique accounting identifier. Acct-Authentic (45) Yes Yes Indicates how the supplicant was authenticated. Acct-Session-Time (46) No Yes Indicates how long the user was logged in. Acct-Terminate-Cause (49) No Yes Reports why the session was terminated.AAA Commands 233 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\AAA.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY aaa accounting dot1x To enable accounting of 802.1x sessions, use the aaa accounting dot1x Global Configuration mode command. Use the no form of this command to disable accounting. Syntax aaa accounting dot1x start-stop group radius no aaa accounting dot1x start-stop group radius Parameters This command has no arguments or keywords. Default Disabled Command Mode Global Configuration mode User Guidelines This command enables the recording of 802.1x sessions. If accounting is activated, the device sends a “start”/“stop” messages to a Radius server when a user logs in / logs out to the network, respectively. The device uses the configured priorities of the available Radius servers in order to select the Radius server. If a new replaces an old supplicant (even if the port state remains authorized), the software sends a “stop” message for the old supplicant and a “start” message for the new supplicant. In multiple sessions mode (dot1x multiple-hosts authentication), the software sends “start”/“stop” messages for each authenticated supplicant. In multiple hosts mode (dot1x multiple-hosts), the software sends “start”/“stop” messages only for the supplicant that has been authenticated.234 AAA Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\AAA.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY The software does not send “start”/“stop” messages if the port is forceauthorized. The software does not send “start”/“stop” messages for hosts that are sending traffic on the guest VLAN or on the unauthenticated VLANs. The following table describes the supported Radius accounting Attributes Values and when they are sent by the switch. Example console(config)# aaa accounting dot1x start-stop group radius Name Start Stop Description User-Name (1) Yes Yes Supplicant’s identity. NAS-IP-Address (4) Yes Yes The switch IP address that is used for the session with the Radius server. NAS-Port (5) Yes Yes The switch port from where the supplicant has logged in. Class (25) Yes Yes Arbitrary value is included in all accounting packets for a specific session. Called-Station-ID (30) Yes Yes The switch MAC address. Calling-Station-ID (31) Yes Yes The supplicant MAC address. Acct-Session-ID (44) Yes Yes A unique accounting identifier. Acct-Authentic (45) Yes Yes Indicates how the supplicant was authenticated. Acct-Session-Time (46) No Yes Indicated how long the supplicant was logged in. Acct-Terminate-Cause (49) No Yes Reports why the session was terminated. Nas-Port-Type (61) Yes Yes Indicates the supplicant physical port type.AAA Commands 235 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\AAA.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY show accounting The show accounting EXEC mode command displays information about the accounting status. Syntax show accounting Command Mode EXEC mode Example The following example displays information about the accounting status. Console# show accounting Login: Radius 802.1x: Disabled passwords min-length The passwords min-length Global Configuration mode command configures the minimal password length in the local database. Use the no form of this command to remove the restriction. Syntax passwords min-length length no passwords min-length Parameters length—Specifies the minimal length required for passwords. (Range: 8-64) Default Configuration There is no minimal length requirement until this command is executed.236 AAA Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\AAA.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Command Mode Global Configuration mode User Guidelines The setting is relevant to local user passwords, line passwords, and enable passwords. The software checks the minimum length requirement when defining a password in an unencrypted format, or when a user tries to log in. Note that if a password is inserted in encrypted format, the minimum length requirement is checked during user login only. Passwords that were defined before defining the minimum length requirement are only checked during user login. Example The following example configures the minimal required password length to 8 characters. Console (config)# passwords min-length 8 passwords strength-check enable Use the passwords strength-check enable Global Configuration mode command to enforce minimum password strength. The no form of this command disables enforcing password strength. Syntax passwords strength-check enable no passwords strength-check enable Parameters This command has no arguments or keywords Default DisabledAAA Commands 237 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\AAA.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Command Mode Global Configuration mode User Guidelines If password strength is enabled, the user is forced to enter passwords that: • Contain characters from user-defined several character classes (uppercase letters, lowercase letters, numbers, and special characters available on a standard keyboard). • Contain no character that is repeated more than user-defined times consecutively. The user can control the above attributes of password strength with specific commands. Example The following example enables password strength and configures the character classes to 3. Console (config)# passwords strength-check enable Console (config)# passwords strength minimum character-classes 3 passwords strength minimum character-classes Use the passwords strength minimum character-classes Global Configuration mode command to configure the minimal classes required for passwords in the local database. Use the no form to remove the requirement. Syntax passwords strength minimum character-classes number no passwords strength minimum character-classes Parameters number—The minimal length required for passwords.(Range: 0–4) Default 0238 AAA Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\AAA.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Command Mode Global Configuration mode User Guidelines The setting is relevant to local users’ passwords, line passwords and enable passwords. The software checks the minimum length requirement when you define a password in an unencrypted format. The classes are: upper case letters, lower case letters, numbers and special characters. passwords strength max-limit repeatedcharacters Use the passwords strength max-limit repeated-characters Global Configuration mode command to configure the maximum number of characters in the new password that can be repeated consecutively. Use the no form to remove the requirement. Syntax passwords strength max-limit repeated-characters number no passwords strength max-limit repeated-characters Parameters number—The maximum number of characters in the new password that can be repeated consecutively. (Range: 1–16) Default 1 Command Mode Global Configuration modeAAA Commands 239 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\AAA.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY User Guidelines The setting is relevant to local users’ passwords, line passwords and enable passwords. The software checks the maximum number of characters in the new password that can be repeated consecutively. passwords aging Use the passwords aging Global Configuration mode command to enforce password aging. Use the no form of this command to return to default. Syntax passwords aging days no passwords aging Parameters days—Specifies the number of days before a password change is forced. You can use 0 to disable aging. (Range: 0–365) Default Disabled Command Mode Global Configuration mode User Guidelines Aging is relevant only to users of the local database with privilege level 15 and to “enable” a password of privilege level 15. Example The following example configures the aging time to be 24. Console (config)# passwords aging 24240 AAA Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\AAA.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY passwords history The passwords history Global Configuration mode command configures the number of password changes required before a password can be reused. Use the no form of this command to remove the requirement. Syntax passwords history number no passwords history Parameters number—Specifies the number of password changes required before a password can be reused. (Range: 1–8) Default Configuration Password history is disabled. Command Mode Global Configuration mode User Guidelines The setting is relevant to local users’ passwords, line passwords and enable passwords. Password history is not checked during a configuration download. The password history is kept even if the password history check is disabled. The password history for a user is kept as long as the user is defined. Example The following example sets the number of password changes required before a password can be reused to 10. Console(config)# passwords history 10AAA Commands 241 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\AAA.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY passwords history hold-time The passwords history hold-time Global Configuration mode command configures the duration that a password is relevant for tracking passwords history. Use the no form of this command to return to the default configuration. Syntax passwords history hold-time days no passwords history hold-time Parameters days—Specifies the number of days a password is relevant for tracking passwords history. (Range: 1–365) Default Configuration Command Mode Global Configuration mode User Guidelines The setting is relevant to local users’ passwords, line passwords and enable passwords. The passwords are not deleted from the history database when they are not relevant for the password history tracking. Increasing the hold time might "return back" passwords. Example The following example configures the duration that a password is relevant for tracking passwords history. Console(config)# passwords history hold-time 10242 AAA Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\AAA.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY passwords lockout The passwords lockout Global Configuration mode command enables user account lockout after a series of authentication failures. Use the no form of this command to disable the lockout feature. Syntax passwords lockout number no passwords lockout Parameters number—Specifies the number of authentication failures before the user account is locked-out. (Range: 1–5) Default Configuration Lockout is disabled. Command Mode Global Configuration mode User Guidelines The setting is relevant to local users’ passwords, line passwords and enable passwords. The account is not locked out for access from the local console. A user with privilege level 15 can release accounts that are locked out by using the set username active, set enable-password active and set line active Privileged EXEC mode commands. Disabling lockout unlocks all users. Re-enabling lockout resets the authentication failures counters. Changing the authentication failures threshold does not reset the counters.AAA Commands 243 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\AAA.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example The following example enables user account lockout after 3 successive authentication failures. Console(config)# passwords lockout 3 aaa login-history file The aaa login-history file Global Configuration mode command enables writing to the login history file. Use the no form of this command to disable writing to the login history file. Syntax aaa login-history file no aaa login-history file Default Configuration Writing to the login history file is enabled. Command Mode Global Configuration mode User Guidelines The login history is stored in the device internal buffer. Example The following example enables writing to the login history file. Console(config)# aaa login-history file set username active The set username active Privileged EXEC mode command reactivates a locked out user account.244 AAA Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\AAA.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Syntax set username name active Parameters name—Specifies the user name: (Length: 1–20 characters) Default Configuration There is no default configuration for this command. Command Mode Privileged EXEC mode Example The following example reactivates user ‘Bob’. Console(config)# set username Bob active set line active The set line active Privileged EXEC mode command reactivates a locked out line. Syntax set line {console | telnet | ssh} active Parameters • console—Reactivates the console terminal line. • telnet—Reactivates the virtual terminal for remote (Telnet) console access. • ssh—Reactivates the virtual terminal for secured remote (SSH) console access. Default Configuration There is no default configuration for this command.AAA Commands 245 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\AAA.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Command Mode Privileged EXEC mode Example The following example reactivates the virtual terminal for remote (Telnet) console access. Console(config)# set line telnet active set enable-password active The set enable-password active Privileged EXEC mode command reactivates a locked out local password. Syntax set enable-password level active Parameters level—Specifies the privilege level to which the password applies. (Range 1–15) Default Configuration There is no default configuration for this command. Command Mode Privileged EXEC mode Example The following example reactivates a local password that applies to privilege level 1. Console(config)# set enable-password 1 active246 AAA Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\AAA.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY show passwords configuration The show passwords configuration Privileged EXEC mode command displays information about the password management configuration. Syntax show passwords configuration Parameters Command Mode Privileged EXEC mode Example Console# show passwords configuration Passwords aging is enabled with aging time 180 days. Minimal length: 8 Minimum character classes: 4 Maximal number of repeated characters: 2 History: 10 History hold time: 365 days Lockout control: Disabled Enable Passwords Level Lockout ----- --------- 1 1 15 0 Line Passwords Line Lockout ----- ------------ ConsoleTelnet LOCKOUT SSH 0AAA Commands 247 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\AAA.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY The following table describes the significant fields shown in the display: show users login-history The show users login-history Privileged EXEC mode command displays information about the user’s login history. Syntax show users login-history [username name] Parameters name—Name of the user. (Range: 1–20 characters) Field Description Minimal length The minimal length required for passwords in the local database. Minimal character classes The minimal number of different types of characters (special characters, integers and so on) required to be part of the password. Maximum number of repeated characters The maximum number of times a singe character can be repeated in the password. History The number of password changes required before a password in the local database can be reused. History hold time The duration that a password is relevant for tracking password history. Lockout control The user account lockout control status after a series of authentication failures. Level The applied password privilege level. Aging The password aging time in days. Expiry date The password expiration date. Lockout If lockout control is enabled, the specific number of times a user failed to enter the correct password since the last successful login is displayed. If the user is locked out, "LOCKOUT" is displayed. Line The applied password line type.248 AAA Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\AAA.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Command Mode Privileged EXEC mode Example The following example displays information about the users’ login history. Console# show users login-history File save: Enabled. Login Time -------------------- Jan 18 2004 23:58:17 Jan 19 2004 07:59:23 Jan 19 2004 08:23:48 Jan 19 2004 08:29:29 Jan 19 2004 08:42:31 Jan 19 2004 08:49:52 Username ---------- Robert Robert Bob Robert John Betty Protocol ---------- HTTP HTTP Serial HTTP SSH Telnet Location ------------ 172.16.1.8 172.16.0.8 172.16.0.8 172.16.0.1 172.16.1.7RADIUS Commands 249 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Radius.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY 15 RADIUS Commands radius-server host Use the radius-server host Global Configuration mode command to specify a RADIUS server host. Use the no form of the command to delete the specified RADIUS server host. Syntax radius-server host {ipv4-address | ipv6-address | ipv6z-address | hostname} [auth-port auth-port-number] [timeout timeout] [retransmit retries] [deadtime deadtime] [key key-string] [source {ipv4-address | ipv6-address}] [priority priority] [usage {login | 802.1x | all}] no radius-server host {ipv4-address | ipv6-address | hostname} Parameters • ipv4-address—Specifies the RADIUS server host IPv4 address. • ipv6-address—Specifies the RADIUS server host IPv6 address. • ipv6z-address—Specifies the RADIUS server host IPv6Z address. The IPv6Z address format is: {ipv6-link-local-address}%{interface-name}. The subparameters are: • ipv6-link-local-address—Specifies the IPv6 Link Local address. • interface-name—Specifies the outgoing interface name. The interface name has the format: vlan{integer} | ch{integer} | isatap{integer} | {physical-portname}. • The subparameter integer has the format: {decimal-digit} | {integer}{decimal-digit}. decimal-digit has the range 0–9.250 RADIUS Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Radius.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY • hostname—Specifies the RADIUS server host name. Translation to IPv4 addresses only is supported. (Length: 1–158 characters. Maximum label length: 63 characters) • auth-port auth-port-number—Specifies the port number for authentication requests. If the port number is set to 0, the host is not used for authentication. (Range: 0–65535) • timeout timeout—Specifies the timeout value in seconds. (Range: 1–30) • retransmit retries—Specifies the retransmit value. (Range: 1–10) • deadtime deadtime—Specifies the length of time in minutes during which a RADIUS server is skipped over by transaction requests. (Range: 0–2000) • key key-string—Specifies the authentication and encryption key for all RADIUS communications between the device and the RADIUS server. This key must match the encryption used on the RADIUS daemon. To specify an empty string, enter "". (Length: 0–128 characters) • source {ipv4-address | ipv6-address}—Specifies the source IPv4 or IPv6 address to use for communication. 0.0.0.0 is interpreted as a request to use the IP address of the outgoing IP interface. • priority priority—Specifies the order in which servers are used, where 0 has the highest priority. (Range: 0–65535) • usage {login | 802.1x | all}—Specifies the RADIUS server usage type. The possible values are: • login—Specifies that the RADIUS server is used for user login parameters authentication. • 802.1x—Specifies that the RADIUS server is used for 802.1x port authentication. • all—Specifies that the RADIUS server is used for user login parameters authentication and 802.1x port authentication. Default Configuration No RADIUS host is specified; the global radius-server command values are the default values. The default authentication port number is 1812. If timeout is not specified, the global value is used.RADIUS Commands 251 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Radius.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY If retransmit is not specified, the global value is used. If key-string is not specified, the global value is used. If the source value is not specified, the global value is used. The default usage type is all. Command Mode Global Configuration mode User Guidelines To specify multiple hosts, multiple radius-server host commands can be used. If no host-specific timeout, retries, deadtime or key-string values are specified, the global values apply to each RADIUS server host. The source parameter address type must be the same as that of the host parameter. Example The following example specifies a RADIUS server host with IP address 192.168.10.1, authentication request port number 20, and a 20-second timeout period. Console(config)# radius-server host 192.168.10.1 auth-port 20 timeout 20 radius-server key Use the radius-server key Global Configuration mode command to set the authentication and encryption key for all RADIUS communications between the device and the RADIUS daemon. Use the no form of this command to restore the default configuration. Syntax radius-server key [key-string] no radius-server key252 RADIUS Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Radius.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Parameters key-string—Specifies the authentication and encryption key for all RADIUS communications between the device and the RADIUS server. This key must match the encryption used on the RADIUS daemon. (Range: 0–128 characters) Default Configuration The key-string is an empty string. Command Mode Global Configuration mode Example The following example defines the authentication and encryption key for all RADIUS communications between the device and the RADIUS daemon. Console(config)# radius-server key enterprise-server radius-server retransmit Use the radius-server retransmit Global Configuration mode command to specify the number of times the software searches the list of RADIUS server hosts. Use the no form of this command to restore the default configuration. Syntax radius-server retransmit retries no radius-server retransmit Parameters retries—Specifies the retransmit value. (Range: 1–10) Default Configuration The software searches the list of RADIUS server hosts 3 times. Command Mode Global Configuration modeRADIUS Commands 253 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Radius.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example The following example configures the number of times the software searches all RADIUS server hosts as 5. console(config)# radius-server retransmit 5 radius-server source-ip Use the radius-server source-ip Global Configuration mode command to specify the source IP address used for communication with RADIUS servers. Use the no form of this command to restore the default configuration. Syntax radius-server source-ip {source} no radius-server source-ip {source} Parameters source—Specifies the source IP address. Default Configuration The source IP address is the IP address of the outgoing IP interface. Command Mode Global Configuration mode User Guidelines If there is no available IP interface of the configured IP source address, an error message is issued when attempting to communicate with the IP address. Example The following example configures the source IP address used for communication with all RADIUS servers to 10.1.1.1. console(config)# radius-server source-ip 10.1.1.1254 RADIUS Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Radius.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY radius-server source-ipv6 Use the radius-server source-ipv6 Global Configuration mode command to specify the source IPv6 address used for communication with RADIUS servers. Use the no form of this command to restore the default configuration. Syntax radius-server source-ipv6 {source} no radius-server source-ipv6 {source} Parameters source—Specifies the source IPv6 address. Default Configuration The source IP address is the IP address of the outgoing IP interface. Command Mode Global Configuration mode User Guidelines If there is no available IP interface of the configured IP source address, an error message is issued when attempting to communicate with the IP address. Example The following example configures the source IP address used for communication with all RADIUS servers to 3ffe:1900:4545:3:200:f8ff:fe21:67cf. console(config)# radius-server source-ipv6 3ffe:1900:4545:3:200:f8ff:fe21:67cfRADIUS Commands 255 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Radius.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY radius-server timeout Use the radius-server timeout Global Configuration mode command to set the time interval during which the device waits for a server host to reply. Use the no form of this command to restore the default configuration. Syntax radius-server timeout timeout no radius-server timeout Parameters timeout—Specifies the timeout value in seconds. (Range: 1–30) Default Configuration The default timeout value is 3 seconds. Command Mode Global Configuration mode Example The following example sets the timeout interval on all RADIUS servers to 5 seconds. Console(config)# radius-server timeout 5 radius-server deadtime Use the radius-server deadtime Global Configuration mode command to configure the time interval during which unavailable RADIUS servers are skipped over by transaction requests. This improves RADIUS response time when servers are unavailable. Use the no form of this command to restore the default configuration. Syntax radius-server deadtime deadtime no radius-server deadtime256 RADIUS Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Radius.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Parameters deadtime—Specifies the time interval in minutes during which a RADIUS server is skipped over by transaction requests. (Range: 0–2000) Default Configuration The default deadtime interval is 0. Command Mode Global Configuration mode Example The following example sets all RADIUS server deadtimes to 10 minutes. Console(config)# radius-server deadtime 10 show radius-servers Use the show radius-servers Privileged EXEC mode command to display the RADIUS server settings. Syntax show radius-servers Command Mode Privileged EXEC modeRADIUS Commands 257 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Radius.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example The following example displays RADIUS server settings. Console# show radius-servers IP address ---------- 172.16.1.1 172.16.1.2 Port Auth ---- 1812 1812 Port Acct ---- 1813 1813 Time Out ----- Global 11 Retrans mit ------- Global 8 Dead time ------ Global Global Source IP ------ Global Global Priority -------- 1 2 Usage ----- All All Global values -------------- TimeOut: 3 Retransmit: 3 Deadtime: 0 Source IP: 172.16.8.1258 RADIUS Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Radius.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LYTACACS+ Commands 259 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\TACACS.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY 16 TACACS+ Commands tacacs-server host Use the tacacs-server host Global Configuration mode command to specify a TACACS+ host. Use the no form of this command to delete the specified TACACS+ host. Syntax tacacs-server host {ip-address | hostname} [single-connection] [port portnumber] [timeout timeout] [key key-string] [source {source}] [priority priority] no tacacs-server host {ip-address | hostname} Parameters • ip-address—Specifies the TACACS+ server host IP address. • hostname—Specifies the TACACS+ server host name. (Length: 1-158 characters. Maximum label length: 63 characters) • single-connection—Specifies that a single open connection is maintained between the device and the daemon, instead of the device opening and closing a TCP connection to the daemon each time it communicates. • port port-number—Specifies the server port number. If the port number is 0, the host is not used for authentication. (Range: 0–65535) • timeout timeout—Specifies the timeout value in seconds. (Range: 1–30) • key key-string—Specifies the authentication and encryption key for all TACACS+ communications between the device and the TACACS+ server. This key must match the encryption used on the TACACS+ daemon. To specify an empty string, enter "". (Length: 0-128 characters)260 TACACS+ Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\TACACS.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY • source {source}—Specifies the source IP to use for the communication. 0.0.0.0 indicates a request to use the outgoing IP interface IP address. • priority priority—Specifies the order in which the TACACS+ servers are used, where 0 is the highest priority. (Range: 0–65535) Default Configuration No TACACS+ host is specified. The default port-number is 49. If timeout is not specified, the global value is used. If key-string is not specified, the global value is used. If source is not specified, the global value is used. Command Mode Global Configuration mode User Guidelines Multiple tacacs-server host commands can be used to specify multiple hosts. If no host-specific timeout, key, or source values are specified, the global values apply to each host. Example The following example specifies a TACACS+ host. Console(config)# tacacs-server host 172.16.1.1 tacacs-server key Use the tacacs-server key Global Configuration mode command to ses the authentication encryption key used for all TACACS+ communications between the device and the TACACS+ daemon. Use the no form of this command to disable the key. Syntax tacacs-server key key-string no tacacs-server keyTACACS+ Commands 261 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\TACACS.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Parameters key-string—Specifies the authentication and encryption key for all TACACS+ communications between the device and the TACACS+ server. This key must match the encryption used on the TACACS+ daemon. (Length: 0–128 characters) Default Configuration The default key is an empty string. Command Mode Global Configuration mode Example The following example sets Enterprise as the authentication encryption key for all TACACS+ servers. Console(config)# tacacs-server key enterprise tacacs-server timeout Use the tacacs-server timeout Global Configuration mode command to set the interval during which the device waits for a TACACS+ server to reply. Use the no form of this command to restore the default configuration. Syntax tacacs-server timeout timeout no tacacs-server timeout Parameters timeout—Specifies the timeout value in seconds. (Range: 1–30) Default Configuration The default timeout value is 5 seconds. Command Mode Global Configuration mode262 TACACS+ Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\TACACS.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example The following example sets the timeout value to 30 for all TACACS+ servers. Console(config)# tacacs-server timeout 30 tacacs-server source-ip Use the tacacs-server source-ip Global Configuration mode command to configure the source IP address to be used for communication with TACACS+ servers. Use the no form of this command to restore the default configuration. Syntax tacacs-server source-ip {source} no tacacs-server source-ip {source} Parameters source—Specifies the source IP address. (Range: Valid IP address) Default Configuration The default source IP address is the outgoing IP interface address. Command Mode Global Configuration mode User Guidelines If the configured IP source address has no available IP interface, an error message is issued when attempting to communicate with the IP address. Example The following example specifies the source IP address for all TACACS+ servers. Console(config)# tacacs-server source-ip 172.16.8.1TACACS+ Commands 263 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\TACACS.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY show tacacs Use the show tacacs Privileged EXEC mode command to display configuration and statistical information for a TACACS+ server. Syntax show tacacs [ip-address] Parameters ip-address—Specifies the TACACS+ server name or IP address. Default Configuration If ip-address is not specified, information for all TACACS+ servers is displayed. Command Mode Privileged EXEC mode Example The following example displays configuration and statistical information for all TACACS+ servers. Console# show tacacs IP address -------- 172.16.1.1 Status -------- Connected Port --- 49 Single Connection --------- No Time Out ----- Global Source IP ----- Global Priority ------ 1 Global values ------------- TimeOut: 3 Source IP: 172.16.8.1264 TACACS+ Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\TACACS.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LYSyslog Commands 265 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Syslog.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY 17 Syslog Commands logging on Use the logging on Global Configuration mode command to control error message logging. This command sends debug or error messages to a logging process, which logs messages asynchronously to designated locations for the process that generated the messages. Use the no form of this command to disable the logging process. Syntax logging on no logging on Default Configuration Message logging is enabled. Command Mode Global Configuration mode User Guidelines The logging process controls the logging messages distribution at various destinations, such as the logging buffer, logging file or syslog server. Logging on and off at these destinations can be individually configured using the logging buffered, logging file, and logging Global Configuration mode commands. However, if the logging on command is disabled, no messages are sent to these destinations. Only the console receives messages.266 Syslog Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Syslog.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example The following example enables logging error messages. Console(config)# logging on Logging host Use the logging host global configuration command to log messages to a syslog server. Use the no form of this command to delete the syslog server with the specified address from the list of syslogs. Syntax logging host {ipv4-address | ipv6-address | hostname} [port port] [severity level] [facility facility] [description text] no logging host {ipv4-address | ipv6-address | hostname} Parameters • ipv4-address—IPv4 address of the host to be used as a syslog server. • ipv6-address—Pv6 address of the host to be used as a syslog server. When the IPv6 address is a Link Local address (IPv6Z address), the outgoing interface name must be specified. Refer to the User Guidelines for the interface name syntax. • hostname—Hostname of the host to be used as a syslog server. Only translation to IPv4 addresses is supported. (Range: 1–158 characters. Maximum label size: 63) • port—Port number for syslog messages. If unspecified, the port number defaults to 514. (Range: 1–65535) • level—Limits the logging of messages to the syslog servers to a specified level: emergencies, alerts, critical, errors, warnings, notifications, informational, debugging. • facility—The facility that is indicated in the message. It can be one of the following values: local0, local1 , local2 , local3 , local4 , local5 , local 6, local7. If unspecified, the port number defaults to local7. • text—Description of the syslog server. (Range: Up to 64 characters)Syslog Commands 267 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Syslog.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Default No messages are logged to a syslog server host. Command Mode Global Configuration mode User Guidelines You can use multiple syslog servers. The format of an IPv6Z address is: % interface-name = vlan | ch | isatap | | 0 integer = | decimal-number = 0 | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 physical-port-name = Designated port number, for example 1/0/16. If the egress interface is not specified, the default interface is selected. Specifying interface zone=0 is equal to not defining an egress interface. Examples console(config)# logging host 1.1.1.121 console(config)# logging host 3000::100 logging console Use the logging console Global Configuration mode command to limit messages logged to the console to messages with a specific severity level. Use the no form of this command to disable logging limiting to the console. Syntax logging console level no logging console268 Syslog Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Syslog.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Parameters level—Specifies the severity level of logged messages displayed on the console. The possible values are: emergencies, alerts, critical, errors, warnings, notifications, informational and debugging. Default Configuration The default severity level is informational. Command Mode Global Configuration mode Example The following example limits logging messages displayed on the console to messages with severity level errors. Console(config)# logging console errors logging buffered Use the logging buffered Global Configuration mode command to limit the syslog message display from an internal buffer to messages with a specific severity leve, and to define the buffer sizel. Use the no form of this command to cancel using the buffer and returning the buffer size to defult Syntax logging buffered [buffer-size] [severity-level] no logging buffered Parameters buffer-size—Specifies the maximum number of messages stored in the history table. (Range: 20–400) severity-level—Specifies the severity level of messages logged in the buffer. The possible values are: emergencies, alerts, critical, errors, warnings, notifications, informational and debugging.Syslog Commands 269 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Syslog.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Default Configuration The default severity level is informational. Command Mode Global Configuration mode User Guidelines All the syslog messages are logged to the internal buffer. This command limits the messages displayed to the user. Example The following example limits the syslog message display from an internal buffer to messages with severity level debugging. Console(config)# logging buffered debugging clear logging Use the clear logging Privileged EXEC mode command to clear messages from the internal logging buffer. Syntax clear logging Command Mode Privileged EXEC mode Example The following example clears messages from the internal logging buffer. Console# clear logging Clear logging buffer [confirm]270 Syslog Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Syslog.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY logging file Use the logging file Global Configuration mode command to limit syslog messages sent to the logging file to messages with a specific severity level. Use the no form of this command to cancel using the buffer. Syntax logging file level no logging file Parameters level—Specifies the severity level of syslog messages sent to the logging file. The possible values are: emergencies, alerts, critical, errors, warnings, notifications, informational and debugging. Default Configuration The default severity level is errors. Command Mode Global Configuration mode Example The following example limits syslog messages sent to the logging file to messages with severity level alerts. Console(config)# logging file alerts clear logging file Use the clear logging file Privileged EXEC mode command to clear messages from the logging file. Syntax clear logging fileSyslog Commands 271 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Syslog.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Command Mode Privileged EXEC mode Example The following example clears messages from the logging file. Console# clear logging file Clear Logging File [y/n] aaa logging Use the aaa logging Global Configuration mode command to enable logging AAA login events. Use the no form of this command to disable logging AAA login events. Syntax aaa logging {login} no aaa logging {login} Parameters login—Enables logging messages related to successful AAA login events, unsuccessful AAA login events and other AAA login-related events. Default Configuration Logging of AAA login events is enabled. Command Mode Global Configuration mode User Guidelines This command enables logging messages related to successful login events, unsuccessful login events and other login-related events. Other types of AAA events are not subject to this command.272 Syslog Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Syslog.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example The following example enables logging messages related to AAA login events. Console(config)# aaa logging login file-system logging Use the file-system logging Global Configuration mode command to enable the logging of file system events. Use the no form of this command to disable logging file system events. Syntax file-system logging {copy | delete-rename} no file-system logging {copy | delete-rename} Parameters • copy—Specifies logging messages related to file copy operations. • delete-rename—Specifies logging messages related to file deletion and renaming operations. Default Configuration Logging file system events is enabled. Command Mode Global Configuration mode Example The following example enables logging messages related to file copy operations. Console(config)# file-system logging copySyslog Commands 273 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Syslog.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY management logging Use the management logging Global Configuration mode command to enable logging Management Access List (ACL) deny events. Use the no form of this command to disable logging management access list events. Syntax management logging {deny} no management logging {deny} Parameters deny—Enables logging messages related to management ACL deny actions. Default Configuration Logging management ACL deny events is enabled. Command Mode Global Configuration mode User Guidelines Other management ACL events are not subject to this command. Example The following example enables logging messages related to management ACL deny actions. Console(config)# management logging deny show logging Use the show logging Privileged EXEC mode command to display the logging status and the syslog messages stored in the internal buffer. Syntax show logging274 Syslog Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Syslog.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Command Mode Privileged EXEC mode Example The following example displays the logging status and the syslog messages stored in the internal buffer. console# show logging Logging is enabled. Console Logging: Level info. Console Messages: 0 Dropped. Buffer Logging: Level info. Buffer Messages: 61 Logged, 61 Displayed, 200 Max. File Logging: Level error. File Messages: 898 Logged, 64 Dropped. 4 messages were not logged Application filtering control Application Event Status -------------------- ---------------- --------- AAA Login Enabled File system Copy Enabled File system Delete-Rename Enabled Management ACL Deny Enabled Aggregation: Disabled. Aggregation aging time: 300 Sec 01-Jan-2010 05:29:46 :%INIT-I-Startup: Warm Startup 01-Jan-2010 05:29:02 :%LINK-I-Up: Vlan 1 01-Jan-2010 05:29:02 :%LINK-I-Up: gi1/0/48 01-Jan-2010 05:29:02 :%LINK-I-Up: gi1/0/47 01-Jan-2010 05:29:00 :%LINK-W-Down: gi1/0/48 show logging file Use the show logging file Privileged EXEC mode command to display the logging status and the syslog messages stored in the logging file.Syslog Commands 275 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Syslog.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Syntax show logging file Command Mode Privileged EXEC mode Example The following example displays the logging status and the syslog messages stored in the logging file. Logging is enabled. Console Logging: Level info. Console Messages: 0 Dropped. Buffer Logging: Level info. Buffer Messages: 61 Logged, 61 Displayed, 200 Max. File Logging: Level error. File Messages: 898 Logged, 64 Dropped. 4 messages were not logged Application filtering control Application Event Status ----------------- ---------------- --------- AAA Login Enabled File system Copy Enabled File system Delete-Rename Enabled Management ACL Deny Enabled Aggregation: Disabled. Aggregation aging time: 300 Sec 01-Jan-2010 05:57:00 :%SSHD-E-ERROR: SSH error: key_read: type mismatch: encoding error 01-Jan-2010 05:56:36 :%SSHD-E-ERROR: SSH error: key_read: type mismatch: encoding error 01-Jan-2010 05:55:37 :%SSHD-E-ERROR: SSH error: key_read: type mismatch: encoding error276 Syslog Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Syslog.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY 01-Jan-2010 05:55:03 :%SSHD-E-ERROR: SSH error: key_read: key_from_blob bgEgGnt9 z6NHgZwKI5xKqF7cBtdl1xmFgSEWuDhho5UedydAjVkKS5XR2... failed 01-Jan-2010 05:55:03 :%SSHD-E-ERROR: SSH error: key_from_blob: invalid key type. 01-Jan-2010 05:56:34 :%SSHD-E-ERROR: SSH error: bad sigbloblen 58 != SIGBLOB_LEN console# show syslog-servers Use the show syslog-servers Privileged EXEC mode command to display the syslog server settings. Syntax show syslog-servers Command Mode Privileged EXEC mode Example The following example displays the syslog server settings. console# show syslog-servers Device Configuration ----------------------------- IP address Port Severity Facility Description ------------- ---- --------- -------- -------------- 1.1.1.121 514 info local7 3000::100 514 info local7 console#RMON Commands 277 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\RMON.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY 18 RMON Commands show rmon statistics Use the show rmon statistics EXEC mode command to display RMON Ethernet statistics. Syntax show rmon statistics {interface-id} Parameters interface-id—Specifies an interface ID. The interface ID can be one of the following types: Ethernet port or Port-channel. Command Mode EXEC mode Example The following example displays RMON Ethernet statistics for gigabitethernet port 1/0/1. console# show rmon statistics gi1/0/1 Port gi1/0/1 Dropped: 0 Octets: 0 Packets: 0 Broadcast: 0 Multicast: 0 CRC Align Errors: 0 Collisions: 0 Undersize Pkts: 0 Oversize Pkts: 0 Fragments: 0 Jabbers: 0 64 Octets: 0 65 to 127 Octets: 1278 RMON Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\RMON.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY 128 to 255 Octets: 1 256 to 511 Octets: 1 512 to 1023 Octets: 0 1024 to max Octets: 0 The following table describes the significant fields displayed. Field Description Dropped The total number of events in which packets were dropped by the probe due to lack of resources. Note that this number is not necessarily the number of packets dropped. It is the number of times this condition was detected. Octets The total number of octets of data (including those in bad packets) received on the network (excluding framing bits but including FCS octets). Packets The total number of packets (including bad packets, broadcast packets, and multicast packets) received. Broadcast The total number of good packets received and directed to the broadcast address. This does not include multicast packets. Multicast The total number of good packets received and directed to a multicast address. This number does not include packets directed to the broadcast address. CRC Align Errors The total number of packets received with a length (excluding framing bits, but including FCS octets) of between 64 and 1518 octets, inclusive, but with either a bad Frame Check Sequence (FCS) with an integral number of octets (FCS Error) or a bad FCS with a nonintegral number of octets (Alignment Error). Collisions The best estimate of the total number of collisions on this Ethernet segment. Undersize Pkts The total number of packets received, less than 64 octets long (excluding framing bits, but including FCS octets) and otherwise well formed. Oversize Pkts The total number of packets received, longer than 1518 octets (excluding framing bits, but including FCS octets) and otherwise well formed.RMON Commands 279 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\RMON.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY rmon collection stats Use the rmon collection stats Interface Configuration mode command to enable Remote Monitoring (RMON) MIB history group of statistics on an Fragments The total number of packets received, less than 64 octets in length (excluding framing bits but including FCS octets) and either a bad Frame Check Sequence (FCS) with an integral number of octets (FCS Error) or a bad FCS with a non-integral number of octets (Alignment Error). Jabbers The total number of packets received, longer than 1518 octets (excluding framing bits, but including FCS octets), and either a bad Frame Check Sequence (FCS) with an integral number of octets (FCS Error) or a bad FCS with a non-integral number of octets (Alignment Error). 64 Octets The total number of packets (including bad packets) received that are 64 octets in length (excluding framing bits but including FCS octets). 65 to 127 Octets The total number of packets (including bad packets) received that are between 65 and 127 octets in length inclusive (excluding framing bits but including FCS octets). 128 to 255 Octets The total number of packets (including bad packets) received that are between 128 and 255 octets in length inclusive (excluding framing bits but including FCS octets). 256 to 511 Octets The total number of packets (including bad packets) received that are between 256 and 511 octets in length inclusive (excluding framing bits but including FCS octets). 512 to 1023 Octets The total number of packets (including bad packets) received that were between 512 and 1023 octets in length inclusive (excluding framing bits but including FCS octets). 1024 to max The total number of packets (including bad packets) received that were between 1024 octets and the maximum frame size in length inclusive (excluding framing bits but including FCS octets). Field Description 280 RMON Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\RMON.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY interface. Use the no form of this command to remove a specified RMON history group of statistics. Syntax rmon collection stats index [owner ownername] [buckets bucket-number] [interval seconds] no rmon collection stats index Parameters • index—The requested group of statistics index.(Range: 1–65535) • owner ownername—Records the name of the owner of the RMON group of statistics. If unspecified, the name is an empty string. (Range: Valid string) • buckets bucket-number—A value associated with the number of buckets specified for the RMON collection history group of statistics. If unspecified, defaults to 50.(Range: 1–50) • interval seconds—The number of seconds in each polling cycle. If unspecified, defaults to 1800 (Range: 1–3600). Command Mode Interface Configuration (Ethernet, Port-channel) mode. Cannot be configured for a range of interfaces (range context). show rmon collection stats Use the show rmon collection stats EXEC mode command to display the requested RMON history group statistics. Syntax show rmon collection stats [interface-id] Parameters interface-id—Specifies an interface ID. The interface ID can be one of the following types: Ethernet port or Port-channel.RMON Commands 281 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\RMON.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Command Mode EXEC mode Example The following example displays all RMON history group statistics. The following table describes the significant fields shown in the display. show rmon history Use the show rmon history EXEC mode command to display RMON Ethernet history statistics. Syntax show rmon history index {throughput | errors | other} [period seconds] Parameters • index—Specifies the set of samples to display. (Range: 1–65535) • throughput—Displays throughput counters. Console# show rmon collection stats Index ----- 1 2 Interface --------- gi1/0/1 gi1/0/1 Interval -------- 30 1800 Requested Samples --------- 50 50 Granted Samples -------- 50 50 Owner ------- CLI Manager Field Description Index An index that uniquely identifies the entry. Interface The sampled Ethernet interface. Interval The interval in seconds between samples. Requested Samples The requested number of samples to be saved. Granted Samples The granted number of samples to be saved. Owner The entity that configured this entry.282 RMON Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\RMON.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY • errors—Displays error counters. • other—Displays drop and collision counters. • period seconds—Specifies the period of time in seconds to display. (Range: 1–2147483647) Command Mode EXEC mode Example The following examples display RMON Ethernet history statistics for index 1 Console# show rmon history 1 throughput Sample Set: 1 Interface: gi1/0/1 Requested samples: 50 Owner: CLI Interval: 1800 Granted samples: 50 Maximum table size: 500 Time ------------ Jan 18 2005 21:57:00 Jan 18 2005 21:57:30 Octets ------- 303595962 287696304 Packets ------- 357568 275686 Broadcast -------- 3289 2789 Multicast --------- 7287 5878 Util ---- 19% 20% Console# show rmon history 1 errors Sample Set: 1 Interface:gi1/0/1 Requested samples: 50 Owner: Me Interval: 1800 Granted samples: 50 Maximum table size: 500 (800 after reset) Time ------------ Jan 18 2005 21:57:00 CRC Align ------- 1 Under size ----- 1 Oversize -------- 0 Fragments --------- 49 Jabbers ---- 0 Jan 18 2005 21:57:30 1 1 0 2 7 0RMON Commands 283 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\RMON.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY The following table describes significant fields shown in the display: Console# show rmon history 1 other Sample Set: 1 Interface: gi1/0/1 Requested samples: 50 Owner: Me Interval: 1800 Granted samples: 50 Maximum table size: 500 Time ------------------- Jan 18 2005 21:57:00 Jan 18 2005 21:57:30 Dropped ------ 3 3 Collisions ---------- 0 0 Field Description Time Date and Time the entry is recorded. Octets The total number of octets of data (including those in bad packets and excluding framing bits but including FCS octets) received on the network. Packets The number of packets (including bad packets) received during this sampling interval. Broadcast The number of good packets received during this sampling interval that were directed to the broadcast address. Multicast The number of good packets received during this sampling interval that were directed to a multicast address. This number does not include packets addressed to the broadcast address. Utilization The best estimate of the mean physical layer network utilization on this interface during this sampling interval, in hundredths of a percent. CRC Align The number of packets received during this sampling interval that had a length (excluding framing bits but including FCS octets) between 64 and 1518 octets, inclusive, but had either a bad Frame Check Sequence (FCS) with an integral number of octets (FCS Error) or a bad FCS with a non-integral number of octets (Alignment Error). Undersize The number of packets received during this sampling interval that were less than 64 octets long (excluding framing bits but including FCS octets) and were otherwise well formed.284 RMON Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\RMON.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY rmon alarm Use the rmon alarm Global Configuration mode command to configure alarm conditions. Use the no form of this command to remove an alarm. Syntax rmon alarm index mib-object-id interval rthreshold fthreshold revent fevent [type {absolute | delta}] [startup {rising | rising-falling | falling}] [owner name] no rmon alarm index Parameters • index—Specifies the alarm index. (Range: 1–65535) Oversize The number of packets received during this sampling interval that were longer than 1518 octets (excluding framing bits but including FCS octets) but were otherwise well formed. Fragments The total number of packets received during this sampling interval that were less than 64 octets in length (excluding framing bits but including FCS octets) and had either a bad Frame Check Sequence (FCS) with an integral number of octets (FCS Error), or a bad FCS with a non-integral number of octets (Alignment Error). It is normal for etherHistoryFragments to increment because it counts both runts (which are normal occurrences due to collisions) and noise hits. Jabbers The number of packets received during this sampling interval that were longer than 1518 octets (excluding framing bits but including FCS octets), and had either a bad Frame Check Sequence (FCS) with an integral number of octets (FCS Error) or a bad FCS with a non-integral number of octets (Alignment Error). Dropped The total number of events in which packets were dropped by the probe due to lack of resources during this sampling interval. This number is not necessarily the number of packets dropped, it is the number of times this condition has been detected. Collisions The best estimate of the total number of collisions on this Ethernet segment during this sampling interval. Field Description RMON Commands 285 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\RMON.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY • mib-object-id—Specifies the object identifier of the variable to be sampled. (Valid OID) • interval—Specifies the interval in seconds during which the data is sampled and compared with rising and falling thresholds. (Range: 1–4294967295) • rthreshold—Specifies the rising threshold value. (Range: 0–4294967295) • fthreshold—Specifies the falling threshold value. (Range: 0–4294967295) • revent—Specifies the index of the event triggered when a rising threshold is crossed. (Range: 0–65535) • fevent—Specifies the index of the event triggered when a falling threshold is crossed. (Range: 0–65535) • type {absolute | delta}—Specifies the method used for sampling the selected variable and calculating the value to be compared against the thresholds. The possible values are: • absolute—Specifies that the selected variable value is compared directly with the thresholds at the end of the sampling interval. • delta—Specifies that the selected variable value of the last sample is subtracted from the current value, and the difference is compared with the thresholds. • startup {rising | rising-falling | falling}—Specifies the alarm that may be sent when this entry becomes valid. The possible values are: • rising—Specifies that if the first sample (after this entry becomes valid) is greater than or equal to rthreshold, a single rising alarm is generated. • rising-falling—Specifies that if the first sample (after this entry becomes valid) is greater than or equal to rthreshold, a single rising alarm is generated. If the first sample (after this entry becomes valid) is less than or equal to fthreshold, a single falling alarm is generated. • fallin —Specifies that if the first sample (after this entry becomes valid) is less than or equal to fthreshold, a single falling alarm is generated. • owner name—Specifies the name of the person who configured this alarm. (Valid string)286 RMON Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\RMON.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Default Configuration The default method type is absolute. The default startup direction is rising-falling. If the owner name is not specified, it defaults to an empty string. Command Mode Global Configuration mode Example The following example configures an alarm with index 1000, MIB object ID D-Link, sampling interval 360000 seconds (100 hours), rising threshold value 1000000, falling threshold value 1000000, rising threshold event index 10, falling threshold event index 10, absolute method type and rising-falling alarm. console(config)# rmon alarm 1000 1.3.6.1.2.1.2.2.1.10.1 360000 1000000 1000000 10 20 show rmon alarm-table Use the show rmon alarm-table EXEC mode command to display a summary of the alarms table. Syntax show rmon alarm-table Command Mode EXEC modeRMON Commands 287 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\RMON.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example The following example displays the alarms table. The following table describes the significant fields shown in the display: show rmon alarm Use the show rmon alarm EXEC mode command to display alarm configuration. Syntax show rmon alarm number Parameters number—Specifies the alarm index. (Range: 1–65535) Command Mode EXEC mode Example The following example displays RMON 1 alarms. Console# show rmon alarm-table Index ----- 1 2 3 OID ---------------------- 1.3.6.1.2.1.2.2.1.10.1 1.3.6.1.2.1.2.2.1.10.1 1.3.6.1.2.1.2.2.1.10.9 Owner ------- CLI Manager CLI Field Description Index An index that uniquely identifies the entry. OID Monitored variable OID. Owner The entity that configured this entry.288 RMON Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\RMON.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Console# show rmon alarm 1 Alarm 1 ------- OID: 1.3.6.1.2.1.2.2.1.10.1 Last sample Value: 878128 Interval: 30 Sample Type: delta Startup Alarm: rising Rising Threshold: 8700000 Falling Threshold: 78 Rising Event: 1 Falling Event: 1 Owner: CLI The following table describes the significant fields shown in the display: Field Description Alarm Alarm index. OID Monitored variable OID. Last Sample Value The value of the statistic during the last sampling period. For example, if the sample type is delta, this value is the difference between the samples at the beginning and end of the period. If the sample type is absolute, this value is the sampled value at the end of the period. Interval The interval in seconds over which the data is sampled and compared with the rising and falling thresholds. Sample Type The method of sampling the variable and calculating the value compared against the thresholds. If the value is absolute, the variable value is compared directly with the thresholds at the end of the sampling interval. If the value is delta, the variable value at the last sample is subtracted from the current value, and the difference is compared with the thresholds.RMON Commands 289 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\RMON.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY rmon event Use the rmon event Global Configuration mode command to configure an event. Use the no form of this command to remove an event. Syntax rmon event index {none | log | trap | log-trap} [community text] [description text] [owner name] no rmon event index Parameters • index—Specifies the event index. (Range: 1–65535) • none— pecifies that no notification is generated by the device for this event. • log—Specifies that a notification entry is generated in the log table by the device for this event. Startup Alarm The alarm that may be sent when this entry is first set. If the first sample is greater than or equal to the rising threshold, and startup alarm is equal to rising or rising-falling, then a single rising alarm is generated. If the first sample is less than or equal to the falling threshold, and startup alarm is equal falling or rising-falling, then a single falling alarm is generated. Rising Threshold The sampled statistic rising threshold. When the current sampled value is greater than or equal to this threshold, and the value at the last sampling interval is less than this threshold, a single event is generated. Falling Threshold The sampled statistic falling threshold. When the current sampled value is less than or equal to this threshold, and the value at the last sampling interval is greater than this threshold, a single event is generated. Rising Event The event index used when a rising threshold is crossed. Falling Event The event index used when a falling threshold is crossed. Owner The entity that configured this entry. Field Description 290 RMON Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\RMON.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY • trap—Specifies that an SNMP trap is sent to one or more management stations by the device for this event. • log-trap—Specifies that an entry is generated in the log table and an SNMP trap is sent to one or more management stations by the device for this event. • community text—Specifies the SNMP community to which an SNMP trap is sent. (Octet string; length: 0–127 characters) • description text—Specifies a comment describing this event. (Length: 0–127 characters) • owner name—Specifies the name of the person who configured this event. (Valid string) Default Configuration If the owner name is not specified, it defaults to an empty string. Command Mode Global Configuration mode Example The following example configures an event identified as index 10, for which the device generates a notification in the log table. Console(config)# rmon event 10 log show rmon events Use the show rmon events EXEC mode command to display the RMON event table. Syntax show rmon events Command Mode EXEC modeRMON Commands 291 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\RMON.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example The following example displays the RMON event table. The following table describes significant fields shown in the display: show rmon log Use the show rmon log EXEC mode command to display the RMON log table. Console# show rmon events Index ----- 1 Descrip tion -------- Errors Type ------ Log Community -------- Owner ------ CLI Last time sent -------- Jan18 2006 23:58:17 2 High Broadcast LogTrap Router Manager Jan18 2006 23:59:48 Field Description Index A unique index that identifies this event. Description A comment describing this event. Type The type of notification that the device generates about this event. Can have the following values: none, log, trap, log-trap. In the case of log, an entry is made in the log table for each event. In the case of trap, an SNMP trap is sent to one or more management stations. Community If an SNMP trap is to be sent, it is sent to the SNMP community specified by this octet string. Owner The entity that configured this event. Last time sent The time this entry last generated an event. If this entry has not generated any events, this value is zero.292 RMON Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\RMON.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Syntax show rmon log [event] Parameters event—Specifies the event index. (Range: 0–65535) Command Mode EXEC mode Example The following examples display the RMON log table. rmon table-size Use the rmon table-size Global Configuration mode command to configure the maximum size of RMON tables. Use the no form of this command to return to the default configuration. Syntax rmon table-size {history entries | log entries} no rmon table-size {history | log} Parameters • history entries—Specifies the maximum number of history table entries. (Range: 20–270) Console# show rmon log Maximum table size: 500 (800 after reset) Event ----- 1 Description -------------- MIB Var.: 1.3.6.1.2.1.2.2.1.10.53 , Delta, Rising, Actual Val: 800, Thres.Set: 100, Interval (sec):1 Time ------------------- Jan 18 2006 23:48:19 RMON Commands 293 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\RMON.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY • log entries—Specifies the maximum number of log table entries. (Range: 20–100) Default Configuration The default history table size is 270 entries. The default log table size is 200 entries. Command Mode Global Configuration mode User Guidelines The configured table size takes effect after the device is rebooted. Example The following example configures the maximum size of RMON history tables to 100 entries. Console(config)# rmon table-size history 100294 RMON Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\RMON.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY802.1x Commands 295 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\802.1X.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY 19 802.1x Commands aaa authentication dot1x Use the aaa authentication dot1x Global Configuration mode command to specify one or more authentication, authorization, and accounting (AAA) methods for use on interfaces running IEEE 802.1x. Use the no form of this command to restore the default configuration. Syntax aaa authentication dot1x default method [method2 ...] no aaa authentication dot1x default Parameters method [method2 ...]—Specify at least one method from the following list: Default Configuration The default method is Radius. Command Mode Global Configuration mode User Guidelines Additional methods of authentication are used only if the previous method returns an error and not if the request for authentication is denied. Specify Keyword Description radius Uses the list of all RADIUS servers for authentication none Uses no authentication296 802.1x Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\802.1X.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY none as the final method in the command line to ensure that authentication succeeds even if all methods return an error. Example The following example uses the aaa authentication dot1x default command with no authentication. Console(config)# aaa authentication dot1x default none dot1x system-auth-control Use the dot1x system-auth-control Global Configuration mode command to enable 802.1x globally. Use the no form of this command to restore the default configuration. Syntax dot1x system-auth-control no dot1x system-auth-control Default Configuration All the ports are in FORCE_AUTHORIZED state. Command Mode Global Configuration mode Example The following example enables 802.1x globally. Console(config)# dot1x system-auth-control dot1x port-control Use the dot1x port-control Interface Configuration (Ethernet) mode command to enable manual control of the port authorization state. Use the no form of this command to restore the default configuration.802.1x Commands 297 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\802.1X.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Syntax dot1x port-control {auto | force-authorized | force-unauthorized} no dot1x port-control Parameters • auto—Enables 802.1x authentication on the interface and causes the port to transition to the authorized or unauthorized state based on the 802.1x authentication exchange between the device and the client. • force-authorized—Disables 802.1x authentication on the interface and causes the port to transition to the authorized state without any authentication exchange required. The port resends and receives normal traffic without 802.1x-based client authentication. • force-unauthorized—Denies all access through this interface by forcing the port to transition to the unauthorized state and ignoring all attempts by the client to authenticate. The device cannot provide authentication services to the client through the interface. Default Configuration The port is in the force-authorized state. Command Mode Interface Configuration (Ethernet) mode User Guidelines It is recommended to disable spanning tree or to enable spanning-tree PortFast mode on 802.1x edge ports (ports in auto state that are connected to end stations), in order to proceed to the forwarding state immediately after successful authentication. Example The following example enables 802.1x authentication on gigabitethernet port 1/0/15. Console(config)# interface gi1/0/15 Console(config-if)# dot1x port-control auto298 802.1x Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\802.1X.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY dot1x re-authentication Use the dot1x reauthentication Interface Configuration mode command to enable periodic re-authentication of the client. Use the no form of this command to return to the default setting. Syntax dot1x reauthentication no dot1x reauthentication Parameters This command has no arguments or keywords. Default Periodic re-authentication is disabled. Command Mode Interface configuration (Ethernet) Example console(config)# interface gi1/0/1 console(config-if)# dot1x reauthentication dot1x timeout reauth-period Use the dot1x timeout reauth-period Interface Configuration mode command to set the number of seconds between re-authentication attempts. Use the no form of this command to return to the default setting. Syntax dot1x timeout reauth-period seconds no dot1x timeout reauth-period802.1x Commands 299 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\802.1X.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Parameters seconds—Number of seconds between re-authentication attempts. (Range: 30–4294967295) Default 3600 Command Mode Interface Configuration (Ethernet) mode Example console(config)# interface gi1/0/1 console(config-if)# dot1x timeout reauth-period 5000 dot1x re-authenticate The dot1x re-authenticate Privileged EXEC mode command manually initiates re-authentication of all 802.1x-enabled ports or the specified 802.1xenabled port. Syntax dot1x re-authenticate [interface-id] Parameters interface-id—Specifies an interface ID. The interface ID must be an Ethernet port. Command Mode Privileged EXEC mode Example The following command manually initiates re-authentication of 802.1xenabled gigabitethernet port 1/0/15. Console# dot1x re-authenticate gi1/0/15300 802.1x Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\802.1X.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY dot1x timeout quiet-period Use the dot1x timeout quiet-period Interface Configuration (Ethernet) mode command to set the time interval that the device remains in a quiet state following a failed authentication exchange (for example, the client provided an invalid password). Use the no form of this command to restore the default configuration. Syntax dot1x timeout quiet-period seconds no dot1x timeout quiet-period Parameters seconds—Specifies the time interval in seconds that the device remains in a quiet state following a failed authentication exchange with the client. (Range: 0–65535 seconds) Default Configuration The default quiet period is 60 seconds. Command Mode Interface Configuration (Ethernet) mode User Guidelines During the quiet period, the device does not accept or initiate authentication requests. The default value of this command should only be changed to adjust to unusual circumstances, such as unreliable links or specific behavioral problems with certain clients and authentication servers. To provide faster response time to the user, a smaller number than the default value should be entered. Example The following example sets the time interval that the device remains in the quiet state following a failed authentication exchange to 3600 seconds.802.1x Commands 301 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\802.1X.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Console(config)# interface gi1/0/15 Console(config-if)# dot1x timeout quiet-period 3600 dot1x timeout tx-period Use the dot1x timeout tx-period Interface Configuration (Ethernet) mode command to set the time interval during which the device waits for a response to an Extensible Authentication Protocol (EAP) request/identity frame from the client before resending the request. Use the no form of this command to restore the default configuration. Syntax dot1x timeout tx-period seconds no dot1x timeout tx-period Parameters seconds—Specifies the time interval in seconds during which the device waits for a response to an EAP-request/identity frame from the client before resending the request. (Range: 1–65535 seconds) Default Configuration The default timeout period is 30 seconds. Command Mode Interface Configuration (Ethernet) mode User Guidelines The default value of this command should be changed only to adjust to unusual circumstances, such as unreliable links or specific behavioral problems with certain clients and authentication servers. Example The following command sets the time interval during which the device waits for a response to an EAP request/identity frame to 3600 seconds. Console(config)# interface gi1/0/15 Console(config-if)# dot1x timeout tx-period 3600302 802.1x Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\802.1X.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY dot1x max-req Use the dot1x max-req Interface Configuration mode command to set the maximum number of times that the device sends an Extensible Authentication Protocol (EAP) request/identity frame (assuming that no response is received) to the client before restarting the authentication process. Use the no form of this command to restore the default configuration. Syntax dot1x max-req count no dot1x max-req Parameters count—Specifies the maximum number of times that the device sends an EAP request/identity frame before restarting the authentication process. (Range: 1–10) Default Configuration The default maximum number of attempts is 2. Command Mode Interface Configuration (Ethernet) mode User Guidelines The default value of this command should be changed only to adjust to unusual circumstances, such as unreliable links or specific behavioral problems with certain clients and authentication servers. Example The following example sets the maximum number of times that the device sends an EAP request/identity frame to 6 Console(config)# interface gi1/0/15 Console(config-if)# dot1x max-req 6802.1x Commands 303 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\802.1X.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY dot1x timeout supp-timeout Use the dot1x timeout supp-timeout Interface Configuration (Ethernet) mode command to set the time interval during which the device waits for a response to an Extensible Authentication Protocol (EAP) request frame from the client before resending the request. Use the no form of this command to restore the default configuration. Syntax dot1x timeout supp-timeout seconds no dot1x timeout supp-timeout Parameters seconds—Specifies the time interval in seconds during which the device waits for a response to an EAP request frame from the client before resending the request. (Range: 1–65535 seconds) Default Configuration The default timeout period is 30 seconds. Command Mode Interface Configuration (Ethernet) mode User Guidelines The default value of this command should be changed only to adjust to unusual circumstances, such as unreliable links or specific behavioral problems with certain clients and authentication servers. Example The following example sets the time interval during which the device waits for a response to an EAP request frame from the client before resending the request to 3600 seconds. Console(config)# interface gi1/0/15 Console(config-if)# dot1x timeout supp-timeout 3600304 802.1x Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\802.1X.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY dot1x timeout server-timeout Use the dot1x timeout server-timeout Interface Configuration (Ethernet) mode command to set the time interval during which the device waits for a response from the authentication server. Use the no form of this command to restore the default configuration. Syntax dot1x timeout server-timeout seconds no dot1x timeout server-timeout Parameters seconds—Specifies the time interval in seconds during which the device waits for a response from the authentication server. (Range: 1–65535 seconds) Default Configuration The default timeout period is 30 seconds. Command Mode Interface Configuration (Ethernet) mode User Guidelines The actual timeout period can be determined by comparing the value specified by the dot1x timeout server-timeout command to the result of multiplying the number of retries specified by the radius-server retransmit command by the timeout period specified by the radius-server timeout command, and selecting the lower of the two values. Example The following example sets the time interval between retransmission of packets to the authentication server to 3600 seconds. Console(config)# interface gi1/0/15 Console(config-if)# dot1x timeout server-timeout 3600802.1x Commands 305 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\802.1X.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY show dot1x Use the show dot1x Privileged EXEC mode command to display the 802.1x device or specified interface status. Syntax show dot1x [interface interface-id] Parameters interface-id—Specify an interface ID. The interface ID must be an Ethernet port. Command Mode Privileged EXEC mode Example The following examples display the status of 802.1x-enabled Ethernet ports. Console# show dot1x 802.1x is enabled Port ---- gi1/0/1 gi1/0/2 gi1/0/3 gi1/0/4 gi1/0/5 Admin Mode ---------- Auto Auto Auto Force-auth Force-auth Oper Mode ------------ Authorized Authorized Unauthorized Authorized Unauthorized Reauth Control ------- Ena Ena Ena Dis Dis Reauth Period ------ 3600 3600 3600 3600 3600 Username -------- Bob John Clark n/a n/a * Port is down or not present. Console# show dot1x interface gi1/0/3 802.1x is enabled.306 802.1x Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\802.1X.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY The following table describes the significant fields shown in the display. Port ---- gi1/0/3 Admin Mode ---------- Auto Oper Mode ------------ Unauthorized Reauth Control ------- Enable Reauth Period ------ 3600 Username -------- Clark Quiet period: Tx period: Max req: Supplicant timeout: 60 Seconds 30 Seconds 2 30 Seconds Server timeout: Session Time (HH:MM:SS): MAC Address: Authentication Method: Termination Cause: 30 Seconds 08:19:17 00:08:78:32:98:78 Remote Supplicant logoff Authenticator State Machine State: HELD Backend State Machine State: Authentication success: Authentication fails: IDLE 9 1 Field Description Port The port number. Admin mode The port admin mode. Possible values: Force-auth, Force-unauth, Auto. Oper mode The port oper mode. Possible values: Authorized, Unauthorized or Down. Reauth Control Reauthentication control. Reauth Period Reauthentication period.802.1x Commands 307 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\802.1X.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Username The username representing the supplicant identity. This field shows the username if the port control is auto. If the port is Authorized, it displays the username of the current user. If the port is Unauthorized, it displays the last user authenticated successfully. Quiet period The number of seconds that the device remains in the quiet state following a failed authentication exchange (for example, the client provided an invalid password). Tx period The number of seconds that the device waits for a response to an Extensible Authentication Protocol (EAP) request/identity frame from the client before resending the request. Max req The maximum number of times that the device sends an EAP request frame (assuming that no response is received) to the client before restarting the authentication process. Supplicant timeout The number of seconds that the device waits for a response to an EAP-request frame from the client before resending the request. Server timeout The number of seconds that the device waits for a response from the authentication server before resending the request. Session Time The amount of time (HH:MM:SS) that the user is logged in. MAC address The supplicant MAC address. Authentication Method The authentication method used to establish the session. Termination Cause The reason for the session termination. State The current value of the Authenticator PAE state machine and of the Backend state machine. Authentication success The number of times the state machine received a Success message from the Authentication Server. Authentication fails The number of times the state machine received a Failure message from the Authentication Server. Field Description308 802.1x Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\802.1X.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY show dot1x users Use the show dot1x users Privileged EXEC mode command to display active 802.1x authenticated users for the device. Syntax show dot1x users [username username] Parameters username—Specifies the supplicant username (Length: 1–160 characters) Command Mode Privileged EXEC mode802.1x Commands 309 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\802.1X.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example The following example displays 802.1x users. Switch# show dot1x users Port Username Session Auth MAC VLAN Filter Time Method Address ------ ---------- ------------- -------- ------------- ---- ---- gi1/0/1 Bob 1d 03:08:58 Remote 0008.3b79.8787 3 gi1/0/2 John 08:19:17 None 0008.3b89.3127 2 OK Port Username Session Auth MAC VLAN Filter Time Method Address --------- ------------------------------ ----------- ---- ------ gi1/0/1 Bob 1d 09:07:38 Remote 0008.3b79.8787 3 OK gi1/0/1 Bernie 03:08:58 Remote 0008.3b79.3232 9 OK gi1/0/2 John 08:19:17 Remote 0008.3b89.3127 2 gi1/0/3 Paul 02:12:48 Remote 0008.3b89.8237 8 Warning Switch# show dot1x users username Bob Port Username Session Auth MAC VLAN Filter Time Method Address --------- ------------------------------ ----------- ---- ----- gi1/0/1 Bob 1d 09:07:38 Remote 0008.3b79.8787 3 OK Filter ID #1: Supplicant-IPv4 Filter ID #2: Supplicant-IPv6 Switch# show dot1x users username Bernie Port Username Session Auth MAC VLAN Filter Time Method Address --------- ------------------------------ ----------- ---- ----- gi1/0/1 Bernard 03:08:58 Remote 0008.3b79.3232 9 OK Filter ID #1: Supplicant-IPv4310 802.1x Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\802.1X.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY show dot1x statistics Use the show dot1x statistics Privileged EXEC mode command to display 802.1x statistics for the specified interface. Syntax show dot1x statistics interface interface-id Parameters interface-id—Specifies an interface ID. The interface ID must be an Ethernet port. Command Mode Privileged EXEC mode Example The following example displays 802.1x statistics for gigabitethernet port 1/0/1. Console# show dot1x statistics interface gi1/0/1 EapolFramesRx: 11 EapolFramesTx: 12 EapolStartFramesRx: 1 EapolLogoffFramesRx: 1 EapolRespIdFramesRx: 3 EapolRespFramesRx: 6 EapolReqIdFramesTx: 3 EapolReqFramesTx: 6 InvalidEapolFramesRx: 0 EapLengthErrorFramesRx: 0 LastEapolFrameVersion: 1 LastEapolFrameSource: 00:08:78:32:98:78802.1x Commands 311 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\802.1X.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY The following table describes the significant fields shown in the display: clear dot1x statistics Use the clear dot1x statistics Privileged EXEC mode command to clear 802.1x statistics. Field Description EapolFramesRx The number of valid EAPOL frames of any type that have been received by this Authenticator. EapolFramesTx The number of EAPOL frames of any type that have been transmitted by this Authenticator. EapolStartFramesRx The number of EAPOL Start frames that have been received by this Authenticator. EapolLogoffFramesRx The number of EAPOL Logoff frames that have been received by this Authenticator. EapolRespIdFramesRx The number of EAP Resp/Id frames that have been received by this Authenticator. EapolRespFramesRx The number of valid EAP Response frames (other than Resp/Id frames) that have been received by this Authenticator. EapolReqIdFramesTx The number of EAP Req/Id frames that have been transmitted by this Authenticator. EapolReqFramesTx The number of EAP Request frames (other than Req/Id frames) that have been transmitted by this Authenticator. InvalidEapolFramesRx The number of EAPOL frames that have been received by this Authenticator for which the frame type is not recognized. EapLengthErrorFramesR x The number of EAPOL frames that have been received by this Authenticator in which the Packet Body Length field is invalid. LastEapolFrameVersion The protocol version number carried in the most recently received EAPOL frame. LastEapolFrameSource The source MAC address carried in the most recently received EAPOL frame.312 802.1x Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\802.1X.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Syntax clear dot1x statistics [interface-id] Parameters interface-id—Specify an Ethernet port ID. Default Configuration Statistics on all ports are cleared. Command Mode Privileged EXEC mode Example The following example displays how to clear 802.1x statistics on all ports Console# clear dot1x statistics dot1x auth-not-req Use the dot1x auth-not-req Interface Configuration (VLAN) mode command to enable unauthorized devices access to the VLAN. Use the no form of this command to disable access to the VLAN. Syntax dot1x auth-not-req no dot1x auth-not-req Default Configuration Access is enabled. Command Mode Interface Configuration (VLAN) mode User Guidelines An access port cannot be a member in an unauthenticated VLAN. The native VLAN of a trunk port cannot be an unauthenticated VLAN.802.1x Commands 313 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\802.1X.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY For a general port, the PVID can be an unauthenticated VLAN (although only tagged packets are accepted in the unauthorized state). Example The following example enables unauthorized devices access to VLAN 5. Console(config)# interface vlan 5 Console(config-if)# dot1x auth-not-req dot1x host-mode Use the dot1x host-mode Interface Configuration mode command to allow a single host (client) or multiple hosts on an IEEE 802.1x-authorized port. Use the no form of this command to return to the default setting. Syntax dot1x host-mode {multi-host | single-host | multi-sessions} Parameters • multi-host—Enable multiple-hosts mode. • single-host—Enable single-hosts mode. • multi-sessions—Enable multiple-sessions mode. Default Default mode is multi-host. Command Mode Interface Configuration (Ethernet) mode User Guidelines In multiple hosts mode only one of the attached hosts must be successfully authorized for all hosts to be granted network access. If the port becomes unauthorized, all attached clients are denied access to the network. In multiple sessions mode each host must be successfully authorized in order to grant network access. Please note that packets are NOT encrypted, and 314 802.1x Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\802.1X.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY after success full authentication filtering is based on the source MAC address only. Port security on a port can’t be enabled in single-host mode and in multiplesessions mode. It is recommended to enable reauthentication when working in multiplesessions mode in order to detect User Logout for users that hadn’t sent Logoff. Example console(config)# interface gi1/0/1 console(config-if)# dot1x host-mode multi-host console(config-if)# dot1x host-mode single-host console(config-if)# dot1x host-mode multi-sessions dot1x violation-mode Use the dot1x violation-mode Interface Configuration (Ethernet) mode command to configure the action to be taken, when a station whose MAC address is not the supplicant MAC address, attempts to access the interface. Use the no form of this command to return to default. Syntax dot1x violation-mode {restrict | protect | shutdown} no dot1x violation-mode Parameters • restrict—Generates a trap when a station whose MAC address is not the supplicant MAC address, attempts to access the interface. The minimum time between the traps is 1 second. Those frames are forwarded but their source address are not learned. • protect—Discard frames with source addresses not the supplicant address. • shutdown—Discard frames with source addresses not the supplicant address and shutdown the port802.1x Commands 315 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\802.1X.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Default Configuration Protect Command Mode Interface Configuration (Ethernet) mode User Guidelines The command is relevant for single-host mode. The command is not relevant for multiple-hosts mode. The command is relevant for multiple-sessions mode, but you should note that since PCs are sending traffic prior to successful 802.1X authentication, this command might not be useful in this mode. BPDU message whose MAC address is not the supplicant MAC address wouldn’t be discarded in the protect mode. BPDU message whose MAC address is not the supplicant MAC address would cause a shutdown in the shutdown mode. Example console(config)# interface gigabitethernet gi1/0/1 console(config-if)# dot1x violation-mode protect dot1x guest-vlan Use the dot1x guest-vlan Interface Configuration (VLAN) mode command to define a guest VLAN. Use the no form of this command to restore the default configuration. Syntax dot1x guest-vlan no dot1x guest-vlan Default Configuration No VLAN is defined as a guest VLAN.316 802.1x Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\802.1X.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Command Mode Interface Configuration (VLAN) mode User Guidelines Use the dot1x guest-vlan enable Interface Configuration mode command to enable unauthorized users on an interface to access the guest VLAN. If the guest VLAN is defined and enabled, the port automatically joins the guest VLAN when the port is unauthorized and leaves it when the port becomes authorized. To be able to join or leave the guest VLAN, the port should not be a static member of the guest VLAN. Example The following example defines VLAN 2 as a guest VLAN. Console# configure Console(config)# interface vlan 2 Console(config-if)# dot1x guest-vlan dot1x guest-vlan timeout Use the dot1x guest-vlan timeout Global Configuration mode command to set the time delay between enabling 802.1x (or port up) and adding a port to the guest VLAN. Use the no form of this command to restore the default configuration. Syntax dot1x guest-vlan timeout timeout no dot1x guest-vlan timeout Parameters timeout—Specifies the time delay in seconds between enabling 802.1x (or port up) and adding the port to the guest VLAN. (Range: 30–180) Default Configuration The guest VLAN is applied immediately.802.1x Commands 317 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\802.1X.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Command Mode Global Configuration mode User Guidelines This command is relevant if the guest VLAN is enabled on the port. Configuring the timeout adds delay from enabling 802.1X (or port up) to the time the device adds the port to the guest VLAN. Example The following example sets the delay between enabling 802.1x and adding a port to a guest VLAN to 60 seconds. Console(config)# dot1x guest-vlan timeout 60 dot1x guest-vlan enable Use the dot1x guest-vlan enable Interface Configuration (Ethernet) mode command to enable unauthorized users on the interface access to the guest VLAN. Use the no form of this command to disable access. Syntax dot1x guest-vlan enable no dot1x guest-vlan enable Default Configuration The default configuration is disabled. Command Mode Interface Configuration (Ethernet) mode User Guidelines A device can have only one global guest VLAN. The guest VLAN is defined using the dot1x guest-vlan Interface Configuration mode command.318 802.1x Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\802.1X.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example The following example enables unauthorized users on gigabitethernet port 1/0/1 to access the guest VLAN. Console(config)# interface gi1/0/15 Console(config-if)# dot1x guest-vlan enable dot1x mac-authentication Use the dot1x mac-authentication Interface Configuration (Ethernet) mode command to enable authentication based on the station’s MAC address. Use the no form of this command to disable access. Syntax dot1x mac-authentication {mac-only | mac-and-802.1x} no dot1x mac-authentication Parameters • mac-only—Enables authentication based on the station's MAC address only. 802.1X frames are ignored. • mac-and-802.1x—Enables 802.1X authentication and MAC address authentication on the interface. Default Configuration Authentication based on the station's MAC address is disabled. Command Mode Interface Configuration (Ethernet) mode User Guidelines The guest VLAN must be enabled when MAC authentication is enabled. Static MAC addresses cannot be authorized. Do not change an authenticated MAC address to a static address. It is not recommended to delete authenticated MAC addresses. Reauthentication must be enabled when working in this mode.802.1x Commands 319 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\802.1X.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example The following example enables authentication based on the station’s MAC address on gigabitethernet port 1/0/1. Console(config)# interface gi1/0/1 Console(config-if)# dot1x mac-authentication mac-only dot1x traps mac-authentication success Use the dot1x traps mac-authentication success Global Configuration mode command to enable sending traps when a MAC address is successfully authenticated by the 802.1X mac-authentication access control. Use the no form of this command to disable the traps. Syntax dot1x traps mac-authentication success no dot1x traps mac-authentication success Parameters This command has no arguments or keywords. Default Default is disabled. Command Mode Global Configuration mode dot1x traps mac-authentication failure Use the dot1x traps mac-authentication failure Global Configuration mode command to enable sending traps when MAC address was failed in authentication of the 802.1X MAC authentication access control. Use the no form of this command to disable the traps.320 802.1x Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\802.1X.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Syntax dot1x traps mac-authentication failure no dot1x traps mac-authentication failure Parameters This command has no arguments or keywords. Default Default is disabled. Command Mode Global Configuration mode dot1x radius-attributes vlan Use the dot1x radius-attributes vlan Interface Configuration mode command, to enable user-based VLAN assignment. Use the no form of this command to disable user-based VLAN assignment. Syntax dot1x radius-attributes vlan no dot1x radius-attributes vlan Parameters This command has no arguments or keywords. Default Disabled Command Mode Interface Configuration (Ethernet) mode User Guidelines The configuration of this command is allowed only when the port is Forced Authorized.802.1x Commands 321 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\802.1X.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Radius attributes are supported only in the multiple sessions mode (multiple hosts with authentication) When Radius attributes are enabled and the Radius Accept message does not contain the supplicant’s VLAN as an attribute, then the supplicant is rejected. Packets to the supplicant are sent untagged. After successful authentication the port remains member in the unauthenticated VLANs and in the Guest VLAN. Other static VLAN configuration is not applied on the port. If the supplicant VLAN does not exist on the switch, the supplicant is rejected. Example console(config)# interface gi1/0/1 console(config-if)# dot1x radius-attributes vlan dot1x radius-attributes filter-id Use the dot1x radius-attributes filter-id Interface Configuration mode command to enable user-based ACL/Qos-Policy assignment. Use the no form of this command to disable user-based ACL/Qos-Policy assignment. Syntax dot1x radius-attributes filter-id no dot1x radius-attributes filter-id Parameters This command has no arguments or keywords. Default Disabled Command Mode Interface Configuration (Ethernet) mode322 802.1x Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\802.1X.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY User Guidelines User based ACL/Qos-Policy assignment is supported only in 802.1x multiple sessions. The configuration of the parameter is allowed only when the port is Forced Authorized or Forced Unauthorized. dot1x radius-attributes errors Use the dot1x radius-attributes errors Global Configuration mode command to specify error handling for the Radius attributes feature. Use the no form of this command to return to default. Syntax dot1x radius-attributes errors filter-id resources {accept | reject} no dot1x radius-attributes errors filter-id resources Parameters accept—If the Filter-ID cannot be allocated for resource allocation reasons, the user is accepted. If the Filter-ID canot be allocated for other reasons, the user is rejected. reject—If the Filter-ID cannot be assigned, the user is rejected. Default Reject Command Mode Global Configuration mode dot1x legacy-supp-mode Use the dot1x legacy-supp-mode Interface Configuration mode command in multiple session mode to enable 802.1x switch to send a periodic EAPOL request identity frame according to tx timeout period in order to verify authentication in multiple session mode of clients that do not follow 802.1x standard behavior. Use the no form of this command to return to the default setting.802.1x Commands 323 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\802.1X.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Syntax dot1x legacy-supp-mode no dot1x legacy-supp-mode Parameters This command has no arguments or keywords. Default Legacy support is disabled. Command Mode Interface Configuration (Ethernet) mode User Guidelines The command causes 802.1x switch to send an Extensible Authentication Protocol (EAP)-request/identity frame from the authenticator (switch) each tx-period automatically, when in multiple session mode. The command should be activated onlywhen all devices connected to that port do not follow 802.1x standard behavior to send EAPOL start packets when the client link goes up (for example, some Windows OS with pre Service Pack 3). show dot1x advanced Use the show dot1x advanced Privileged EXEC mode command to display 802.1x advanced features for the device or specified interface. Syntax show dot1x advanced [interface-id] Parameters nterface-id—Specify an interface ID. The interface ID must be an Ethernet port. Command Mode Privileged EXEC mode324 802.1x Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\802.1X.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example The following example displays 802.1x advanced features for the device. dot1x system-auth-control monitor Use the dot1x system-auth-control monitor Global Configuration command to enable 802.1x globally the 802.1x Monitoring mode and define the Monitor VLAN. Use the no format of the command to return to default. Syntax dot1x system-auth-control monitor [vlan vlan-id] no dot1x system-auth-control monitor console# show dot1x advanced Guest VLAN: 3978 Unauthenticated VLANs: 91, 92 Interface Multiple Guest MAC VLAN Legacy- Policy Hosts VLAN Authentication Assignment supp Mode Assignment ------------------ ---------------------- ----------- --------- ------ gi1/0/1 Disabled Enabled MAC-and-802.1X Enabled Enable Disabled gi1/0/2 Enabled Disabled Disabled Enabled Enable Disabled Switch# show dot1x advanced gi1/0/1 Interface Multiple Guest MAC VLAN Legacy- Policy Hosts VLAN Authentication Assignment sup Mode Assignment ------------------ ----------------------- ----------- ------ ------- gi1/0/1 Disabled Enabled MAC-and-802.1X Enabled Enable Legacy-Supp mode is disabled Policy assignment resource err handling: Accept Single host parameters Violation action: Discard Trap: Enabledx Status: Single-host locked Violations since last trap: 9802.1x Commands 325 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\802.1X.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Parameters vlan vlan-id—Specifies the 802.1x Monitoring VLAN. If the parameter is omitted, the Default VLAN is used as the 802.1x Monitoring VLAN.(Range: Any manually created VLAN or the Default VLAN) Default Disabled Command Mode Global Configuration mode User Guidelines The 802.1x Monitoring VLAN cannot be deleted manually. show dot1x monitoring result Use the show dot1x monitoring result Privileged EXEC mode command to display the captured information of each interface/host on the switch/stack. Syntax show dot1x monitoring result [username username] Parameters username username—Specifies supplicant username (Range: 1–80 characters) Command Mode Privileged EXEC mode User Guidelines The following table describes the significant fields shown in the display: Field Description Usernamr Supplicant Username VLAN VLAN assigned to Supplicant MAC address Supplicant MAC address326 802.1x Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\802.1X.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Port Ethernet port or port-channel Reject reason Reason in the case of failure. The following table describes the reasons. Time Supplicant Session time Table 1: Reject Reason Description Abbreviation Description ACL-DEL ACL was deleted by a user ACL-NOTEXST ACL sent by radius Server does not exist on the device ACL-OVRFL ACL sent by radius server can not be applied because of TCAM overflow AUTH-ERR Rejected by Radius due wrong user name or password in Radius server FLTR-ERR Radius accept message contains more than 2 filter-id FRS-MTH-DENY First method is "deny" IPv6WithMAC Radius accept message contains filter with IPv6 DIP and MAC addresses IPV6WithNotIP Radius accept message contains IPv6 and not IP simultaneously POL-BasicMode Policy Map is not supported in the QoS basic mode POL-DEL Policy Map was deleted by a user POL-OVRFL Policy Map sent by radius server can not be applied because of TCAM overflow RAD-APIERR RADIUS API returned error (e.g. No RADIUS server is configured). RAD_INVLRES RADIUS server returned invalid packet (e.g. EAP Attribute is missing) RAD-NORESP RADIUS server is not responding VLAN-DFLT VLAN sent by radius server can not be applied because it is the Default VLAN802.1x Commands 327 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\802.1X.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Examples Example 1 Switch# show dot1x monitoring results Monitoring VLAN: 100 Port VLAN UsernameMAC Reject Time Address Reason --------- --------------------------- ---------- --------- gi1/0/1 100 Bob 0008.3b79.8787 VLAN-NOTEX08:19:17 gi1/0/2 15 John 0008.3b89.3128 SERV-ERR 09:20:11 gi1/0/2 5 John 0008.3b89.3129 SERV-ERR 09:20:11 Example 2 Switch# show dot1x monitoring Bob Username: Bob Port gi1/0/1 Quiet period: 60 Seconds Tx period: 30 Seconds Max req: 2 Supplicant timeout: 30 Seconds Server timeout: 30 Seconds Session Time (HH:MM:SS): 08:19:17 MAC Address: 00:08:78:32:98:78 Authentication Method: Remote Assigned VLAN: 207 Reason for Failure: Radius server rejected authentication because username/password mismatch Example 3 VLAN-DYNAM VLAN sent by radius server can not be applied because it is a Dynamic VLAN VLAN-GUEST VLAN sent by radius server can not be applied because it is the Guest VLAN Table 1: Reject Reason Description328 802.1x Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\802.1X.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Switch# show dot1x monitoring Tom Username: Tom Port gi1/0/1 Quiet period: 60 Seconds Tx period: 30 Seconds Max req: 2 Supplicant timeout: 30 Seconds Server timeout: 30 Seconds Session Time (HH:MM:SS): 08:19:17 MAC Address: 00:08:78:32:98:78 Authentication Method: Remote Assigned VLAN: 207 Reason for Failure:VLAN was not defined on SwitchEthernet Configuration Commands 329 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Ethernet.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY 20 Ethernet Configuration Commands interface Use the interface Global Configuration mode command to configure an interface and enter interface configuration mode. Syntax interface interface-id Parameters interface-id—Specifies an interface ID. The interface ID can be one of the following types: Ethernet port or Port-channel. interface range Use the interface range command to execute a command on multiple ports at the same time. Syntax interface range interface-id-list Parameters interface-id-list—Specify list of interface IDs. The interface ID can be one of the following types: Ethernet port or Port-channel User Guidelines Commands under the interface range context are executed independently on each interface in the range: If the command returns an error on one of the interfaces, it does not stop the execution of the command on other interfaces.330 Ethernet Configuration Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Ethernet.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example console(config)# interface range gi1/0/1-20 description Use the description Interface Configuration (Ethernet, Port-channel) mode command to add a description to an interface. Use the no form of this command to remove the description. Syntax description string no description Parameters string—Specifies a comment or a description of the port to assist the user. (Length: 1–64 characters) Default Configuration The interface does not have a description. Command Mode Interface Configuration (Ethernet, Port-channel) mode Example The following example adds the description ‘SW#3’ to gigabitethernet port 1/0/5. Console(config)# interface gi1/0/5 Console(config-if)# description SW#3 speed Use the speed Interface Configuration (Ethernet, Port-channel) mode command to configure the speed of a given Ethernet interface when not Ethernet Configuration Commands 331 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Ethernet.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY using auto-negotiation. Use the no form of this command to restore the default configuration. Syntax speed {10 | 100 | 1000 | 10000} no speed Parameters • 10—Forces10 Mbps operation. • 100—Forces 100 Mbps operation. • 1000—Forces 1000 Mbps operation. • 10000—Forces 10000 Mbps operation. Default Configuration The port operates at its maximum speed capability. Command Mode Interface Configuration (Ethernet, Port-channel) mode User Guidelines The no speed command in a Port-channel context returns each port in the Port-channel to its maximum capability. Example The following example configures the speed of gigabitethernet port 1/0/5 to 100 Mbps operation. Console(config)# interface gi1/0/5 Console(config-if)# speed 100 duplex Use the duplex Interface Configuration (Ethernet, Port-channel) mode command to configure the full/half duplex operation of a given Ethernet interface when not using auto-negotiation. Use the no form of this command to restore the default configuration.332 Ethernet Configuration Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Ethernet.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Syntax duplex {half | full} no duplex Parameters • half—Forces half-duplex operation. • full—Forces full-duplex operation. Default Configuration The interface operates in full duplex mode. Command Mode Interface Configuration (Port-channel) mode Example The following example configures gigabitethernet port 1/0/5 to operate in full duplex mode. Console(config)# interface gi1/0/5 Console(config-if)# duplex full Console(config-if)# negotiation Use the negotiation Interface Configuration (Ethernet, Port-channel) mode command to enable auto-negotiation operation for the speed and duplex parameters and master-slave mode of a given interface, where the preferred default mode is master mode. Use the no form of this command to disable auto-negotiation. Syntax negotiation [capability [capability2 ... capability5]] [preferred {master | slave}] no negotiationEthernet Configuration Commands 333 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Ethernet.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Parameters • capability—Specifies the capabilities to advertise. (Possible values: 10h, 10f, 100h,100f, 1000f). If unspecified, defaults to list of all the capabilities of the port. • Preferred—Specifies the master-slave preference: • Master—Advertise master preference • Slave—Advertise slave preference Default Configuration Auto-negotiation is enabled and preferred default mode is master mode. Command Mode Interface Configuration (Ethernet, Port-channel) mode Example The following example enables auto-negotiation on gigabitethernet port 1/0/5. Console(config)# interface gi1/0/5 Console(config-if)# negotiation Console(config-if)# flowcontrol Use the flowcontrol Interface Configuration (Ethernet, Port-channel) mode command to configure the Flow Control on a given interface. Use the no form of this command to disable Flow Control. Syntax flowcontrol {auto | on | off} no flowcontrol Parameters • aut—Specifies auto-negotiation. • on—Enables Flow Control.334 Ethernet Configuration Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Ethernet.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY • off—Disables Flow Control. Default Configuration Flow control is enabled. Command Mode Interface Configuration (Ethernet, Port-channel) mode User Guidelines Use the negotiation command to enable flow control auto. Example The following example enables Flow Control on port gi1/0/1 Console(config)# interface gi1/0/1 Console(config-if)# flowcontrol on flowcontrol (Global) Use the flowcontrol Global Configuration mode command to configure the Flow Control global mode. Syntax flowcontrol {receive-only | send-receive} Parameters • receive-only—The interfaces with enabled Flow Control will receive pause frames, but will not send Flow Control pause frames. • send-receive—The interfaces with enabled Flow Control will receive and send pause frames. Default Configuration receive-only. Command Mode Global Configuration modeEthernet Configuration Commands 335 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Ethernet.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY User Guidelines This command only determines the global mode and does not enable/disable Flow Control on any interface. Flowcontrol must also be enabled on the specific interfaces required (they are enabled by default). Example The following example enables Flow Control in the mode of only receiving pause frames and not sending them. Console(config)# flowcontrol receive-only show flowcontrol Use the show flowcontrol Exec mode command to display the Flow Control global mode. Syntax show flowcontrol Parameters N/A Default Configuration N/A Command Mode Exec mode Example The following example displays the global Flow Control mode when it is receiveonly. Console# show flowcontrol Global Flow Control mode is receive-only.336 Ethernet Configuration Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Ethernet.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY mdix Use the mdix Interface Configuration (Ethernet) mode command to enable cable crossover on a given interface. Use the no form of this command to disable cable crossover. Syntax mdix {on | auto} no mdix Parameters • on—Enables manual MDIX. • auto—Enables automatic MDI/MDIX. Default Configuration The default setting is On. Command Mode Interface Configuration (Ethernet) mode Example The following example enables automatic crossover on port 1/5. Console(config)# interface gi1/0/1/5 Console(config-if)# mdix auto. The following example enables automatic crossover on port gigabitethernet 1/0/1. Console(config)# interface gi1/0/5 Console(config-if)# mdix autoEthernet Configuration Commands 337 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Ethernet.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY back-pressure Use the back-pressure Interface Configuration (Ethernet) mode command to enable back pressure on a specific interface. Use the no form of this command to disable back pressure. Syntax back-pressure no back-pressure Default Configuration Back pressure is enabled. Command Mode Interface Configuration (Ethernet) mode Example The following example enables back pressure on port gi1/0/5. Console(config)# interface gi1/0/5 Console(config-if)# back-pressure port jumbo-frame Use the port jumbo-frame Global Configuration mode command to enable jumbo frames on the device. Use the no form of this command to disable jumbo frames. Syntax port jumbo-frame no port jumbo-frame Default Configuration Jumbo frames are disabled on the device.338 Ethernet Configuration Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Ethernet.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Command Mode Global Configuration mode User Guidelines This command takes effect only after resetting the device. Example The following example enables jumbo frames on the device. Console(config)# port jumbo-frame clear counters Use the show interfaces counters EXEC mode command to display traffic seen by all the physical interfaces or by a specific interface. Syntax show interfaces counters [interface-id] [detailed] Parameters interface-id—Specifies an interface ID. The interface ID can be one of the following types: Ethernet port or Port-channel. detailed—Displays information for non-present ports in addition to present ports. Command Mode EXEC mode Example The following example clears the statistics counters for gigabitethernet port 1/0/5. Console# clear counters gi1/0/5.Ethernet Configuration Commands 339 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Ethernet.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY set interface active Use the set interface active EXEC mode command to reactivate an interface that was shut down. Syntax set interface active { interface-id } Parameters interface-id—Specifies an interface ID. The interface ID can be one of the following types: Ethernet port or Port-channel. Command Mode EXEC mode User Guidelines This command is used to activate interfaces that were configured to be active, but were shut down by the system. Example The following example reactivates gigabitethernet port 1/0/1. Console# set interface active gi1/0/1 show interfaces configuration Use the show interfaces configuration EXEC mode command to display the configuration for all configured interfaces or for a specific interface. Syntax show interfaces configuration [interface-id ] Parameters interface-id—Specifies an interface ID. The interface ID can be one of the following types: Ethernet port or Port-channel.340 Ethernet Configuration Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Ethernet.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Command Mode EXEC mode Example The following example displays the configuration of all configured interfaces: console# show interfaces configuration Flow Admin Back Mdix Port Type Duplex Speed Neg control State Pressure Mode ------ --------- ------ ----- -------- ------- ----- -------- - gi1/0/1 1G-Copper Full 10000 Disabled Off Up Disabled Off gi1/0/2 1G-Copper Full 1000 Disabled Off Up Disabled Off Flow Admin Ch Type Speed Neg Control State ------ ------ ----- -------- ------- ----- Po1 Disabled Off Up show interfaces status Use the show interfaces status EXEC mode command to display the status of all configured interfaces or of a specific interface. Syntax show interfaces status [interface-id][detailed] Parameters interface-id—Specifies an interface ID. The interface ID can be one of the following types: Ethernet port or Port-channel. detailed—Displays information for non-present ports in addition to present ports. Command Mode EXEC modeEthernet Configuration Commands 341 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Ethernet.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example The following example displays the status of all configured interfaces. console# show interfaces status Flow Link Back Mdix Port Type Duplex Speed Neg ctrl State Pressure Mode ------ --------- ------ ----- -------- ---- ------ -------- -- gi1/0/1 1G-Copper Full 1000 Disabled Off Up Disabled Off gi1/0/2 1G-Copper -- -- -- -- Down -- -- Flow Link Ch Type Duplex Speed Neg ctrl State ----- ------- ------ ----- ------- ---- ------ Po1 1G Full 10000 Disabled Off Up show interfaces advertise Use the show interfaces advertise EXEC mode command to display autonegotiation advertisement information for all configured interfaces or for a specific interface. Syntax show interfaces advertise [interface-id | Parameters interface-id—Specifies an interface ID. The interface ID can be one of the following types: Ethernet port or Port-channel. Command Mode EXEC mode342 Ethernet Configuration Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Ethernet.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Examples The following examples display auto-negotiation information. show interfaces description Use the show interfaces description EXEC mode command to display the description for all configured interfaces or for a specific interface. Syntax show interfaces description [interface-id] Parameters interface-id—Specifies an interface ID. The interface ID can be one of the following types: Ethernet port or Port-channel. Console# show interfaces advertise Port ---- gi1/0/1 gi1/0/2 Type ---------- 1G-Copper 1G-Copper Neg ------ Enable Enable Operational Link Advertisement ------------------------------ 1000f, 100f, 10f, 10h 1000f Console# show interfaces advertise gi1/0/1 Port:gi1/0/1 Type: 1G-Copper Link state: Up Auto Negotiation: enabled Admin Local link Advertisement Oper Local link Advertisement Remote Local link Advertisement Priority Resolution 10h --- yes yes no - 10f --- yes yes no - 100 h --- - yes yes yes - 100f ---- yes yes yes - 1000f ----- yes yes yes yes Console# show interfaces advertise gi1/0/1 Port: gi1/0/1 Type: 1G-Copper Link state: Up Auto negotiation: disabled.Ethernet Configuration Commands 343 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Ethernet.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Command Mode EXEC mode Example The following example displays the description of all configured interfaces. show interfaces counters Use the show interfaces counters EXEC mode command to display traffic seen by all the physical interfaces or by a specific interface. Syntax show interfaces counters [interface-id] Parameters interface-id—Specifies an interface ID. The interface ID can be one of the following types: Ethernet port or Port-channel. Command Mode EXEC mode Console# show interfaces description Port gi1/0/1 gi1/0/1 gi1/0/2 gi1/0/1 gi1/0/1 gi1/0/2 Descriptions --------------------------------------------- Port that should be used for management only Ch ---- Po1 Description ----------- Output344 Ethernet Configuration Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Ethernet.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example The following example displays traffic seen by all the physical interfaces. console# show interfaces counters Port InUcastPkts InMcastPkts InBcastPkts InOctets ---------- ------------ ------------ ------------ ------------ gi1/0/1 0 0 0 0 Port OutUcastPkts OutMcastPkts OutBcastPkts OutOctets ---------- ------------ ------------ ------------ ------------ gi1/0/1 0 1 35 7051 Alignment Errors: 0 FCS Errors: 0 Single Collision Frames: 0 Multiple Collision Frames: 0 SQE Test Errors: 0 Deferred Transmissions: 0 Late Collisions: 0 Excessive Collisions: 0 Carrier Sense Errors: 0 Oversize Packets: 0 Internal MAC Rx Errors: 0 Symbol Errors: 0 Received Pause Frames: 0 Transmitted Pause Frames: 0Ethernet Configuration Commands 345 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Ethernet.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY The following table describes the fields shown in the display. Field Description InOctets The number of received octets. InUcastPkts The number of received unicast packets. InMcastPkts The number of received multicast packets. InBcastPkts The number of received broadcast packets. OutOctets The number of transmitted octets. OutUcastPkts The number of transmitted unicast packets. OutMcastPkts The number of transmitted multicast packets. OutBcastPkts The number of transmitted broadcast packets. FCS Errors The number of frames received that are an integral number of octets in length but do not pass the FCS check. Single Collision Frames The number of frames that are involved in a single collision, and are subsequently transmitted successfully. Multiple Collision Frames The number of frames that are involved in more than one collision and are subsequently transmitted successfully. SQE Test Errors The number of times that the SQE TEST ERROR is received. The SQE TEST ERROR is set in accordance with the rules for verification of the SQE detection mechanism in the PLS Carrier Sense Function as described in IEEE Std. 802.3, 2000 Edition, section 7.2.4.6. Deferred Transmissions The number of frames for which the first transmission attempt is delayed because the medium is busy. Late Collisions The number of times that a collision is detected later than one slotTime into the transmission of a packet. Excessive Collisions The number of frames for which transmission fails due to excessive collisions. Oversize Packets The number of frames received that exceed the maximum permitted frame size.346 Ethernet Configuration Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Ethernet.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY show port jumbo-frame Use the show port jumbo-frame EXEC mode command to display the configuration of jumbo frames. Syntax show port jumbo-frame Command Mode EXEC mode Example The following example displays the configuration of jumbo frames on the device. Console# show port jumbo-frame Jumbo frames are disabled Jumbo frames will be enabled after reset show errdisable interfaces Use the show errdisable interfaces EXEC mode command to display the ErrDisable state of all interfaces or of a specific interface. Internal MAC Rx Errors The number of frames for which reception fails due to an internal MAC sublayer receive error. Received Pause Frames The number of MAC Control frames received with an opcode indicating the PAUSE operation. Transmitted Pause Frames The number of MAC Control frames transmitted on this interface with an opcode indicating the PAUSE operation. Field DescriptionEthernet Configuration Commands 347 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Ethernet.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Syntax show errdisable interfaces Parameters • Interface - Interface number • port-channel-number - Port channel index. Command Mode EXEC mode Example The following example displays the Err-Disable state of all interfaces. Console# show errdisable interfaces Interface Reason --------- -------------- gi1/1/50 stp-bpdu-guard storm-control broadcast enable Use the storm-control broadcast enable Interface Configuration mode command to enable storm control. Use the no form of this command to disable storm control. Syntax storm-control broadcast enable no storm-control broadcast enable Parameters This command has no arguments or keywords. Default Configuration Disabled348 Ethernet Configuration Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Ethernet.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Command Mode Interface Configuration mode(Ethernet) User Guidelines • Use the storm-control broadcast level Interface Configuration command to set the maximum rate. • Use the storm-control include-multicast Interface Configuration command to also count multicast packets and optionally unknown unicast packets in the storm control calculation. • Example console(config)# interface gi1/0/1 console(config-if)# storm-control broadcast enable storm-control broadcast level kbps Use the storm-control broadcast levelInterface Configuration mode command to configure the maximum rate of broadcast. Use the no form of this command to return to default. Syntax storm-control broadcast level kbps kbps no storm-control broadcast level Parameters kbps—Maximum of kilo bits per second of broadcast traffic on a port. (Range: GE: 3.5M–1G, 10GE: 8.5M–10G) Default Configuration 1000 Command Mode Interface Configuration mode (Ethernet)Ethernet Configuration Commands 349 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Ethernet.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY User Guidelines Use the storm-control broadcast enable Interface Configuration command to enable storm control. The calculated rate includes the 20 bytes of Ethernet framing overhead (preamble+SFD+IPG). Example console(config)# interface gi1/0/1 console(config-if)# storm-control broadcast level kbps 12345 storm-control include-multicast Use the storm-control include-multicast Interface Configuration mode command to count multicast packets in the broadcast storm control. Use the no form of this command to disable counting of multicast packets in the broadcast storm control. Syntax storm-control include-multicast no storm-control include-multicast Parameters Default Configuration Disabled Command Mode Interface Configuration mode (Ethernet) User Guidelines Example console(config)# interface gi1/0/1 console(config-if)# storm-control include-multicast350 Ethernet Configuration Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Ethernet.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY show storm-control Use the show storm-control EXEC mode command to display the configuration of storm control. Syntax show storm-control [interface-id ] Parameters interface-id—Specifies the interface. Command Mode EXEC mode Example console# show storm-control Port State Rate [Kbits/Sec] Included ------ -------- --------------- ------------------------ gi1/0/1 Enabled 12345 Broadcast, Multicast, Unknown unicast gi1/0/2 Disabled 100000 Broadcast User Guidelines Use the storm-control broadcast enable Interface Configuration command to enable storm control. The calculated rate includes the 20 bytes of Ethernet framing overhead (preamble+SFD+IPG). If the suppression level in percentage is translated (for the current port’s speed) to a rate that is lower then the minimum rate, the minimum rate would be set. Example console(config)# interface gi1/0/1 console(config-if)# storm-control broadcast level kbps 12345PHY Diagnostics Commands 351 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Phy_Diagnostics.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY 21 PHY Diagnostics Commands test cable-diagnostics tdr Use the test cable-diagnostics tdr Privileged EXEC mode command to use Time Domain Reflectometry (TDR) technology to diagnose the quality and characteristics of a copper cable attached to a port. Syntax test cable-diagnostics tdr interface interface-id Parameters interface-id—Specifies an interface ID. The interface ID must be an Ethernet port. Command Mode Privileged EXEC mode User Guidelines The port to be tested should be shut down during the test, unless it is a combination port with fiber port active. The maximum length of cable for the TDR test is 120 meters. Example The following examples test the copper cables attached to ports 7 and 8. Console# test cable-diagnostics tdr interface gi1/0/7 Cable is open at 64 meters Console# test cable-diagnostics tdr interface gi1/0/8352 PHY Diagnostics Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Phy_Diagnostics.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Can't perform the test on fiber ports show cable-diagnostics tdr Use the show cable-diagnostics tdr EXEC mode command to display information on the last Time Domain Reflectometry (TDR) test performed on all copper ports or on a specific copper port. Syntax show cable-diagnostics tdr [interface interface-id] Parameters interface-id—Specifies an interface ID. The interface ID must be an Ethernet port. Command Mode EXEC mode User Guidelines The maximum length of cable for the TDR test is 120 meters. Example The following example displays information on the last TDR test performed on all copper ports. Console> show cable-diagnostics tdr Port ---- Result --------- Length [meters] -------------- Date --------------------- gi1/0/1 OK gi1/0/2 Short 50 13:32:00 23 July 2010 gi1/0/3 Test has not been performed gi1/0/4 Open 64 13:32:00 23 July 2010 gi1/0/5 Fiber - -PHY Diagnostics Commands 353 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Phy_Diagnostics.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY show cable-diagnostics cable-length Use the show cable-diagnostics cable-length EXEC mode command to display the estimated copper cable length attached to all ports or to a specific port. Syntax show cable-diagnostics cable-length [interface interface-id] Parameters interface-id—Specify an interface ID. The interface ID must be an Ethernet port. Command Mode EXEC mode User Guidelines The port must be active and working at 100 M or 1000 M. Example The following example displays the estimated copper cable length attached to all ports. show fiber-ports optical-transceiver Use the show fiber-ports optical-transceiver EXEC mode command to display the optical transceiver diagnostics. Console> show cable-diagnostics cable-length Port ---- gi1/0/1 gi1/0/2 gi1/0/3 gi1/0/4 Length [meters] ----------------- < 50 Copper not active 110-140 Fiber354 PHY Diagnostics Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Phy_Diagnostics.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Syntax show fiber-ports optical-transceiver [interface interface-id] [detailed] Parameters • interface-id—Specifies an interface ID. The interface ID must be an Ethernet port. • detailed—Displays detailed diagnostics. Command Mode EXEC mode Example The following examples display the optical transceiver diagnostics results. console# show fiber-ports optical-transceiver Port Temp Voltage Current Output Input LOS Power Power ----------- ------ ------- ------- ------ ----- --- gi1/0/1 W OK OK OK OK OK gi1/0/2 OK OK OK E OK OK Temp - Internally measured transceiver temperature Voltage - Internally measured supply voltage Current - Measured TX bias current Output Power - Measured TX output power in milliWatts Input Power - Measured RX received power in milliWatts LOS - Loss of signal N/A - Not Available, N/S - Not Supported, W - Warning, E - ErrorPHY Diagnostics Commands 355 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Phy_Diagnostics.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY console# show fiber-ports optical-transceiver detailed Port Temp Voltage Current Output Input LOS [C] [Volt] [mA] Power Power [mWatt] [mWatt] ----------- ------ ------- ------- ------- ------- --- gi0/1 Copper gi0/26 Copper gi0/27 28 3.32 7.26 3.53 3.68 No gi0/28 29 3.33 6.50 3.53 3.71 No Temp - Internally measured transceiver temperature Voltage - Internally measured supply voltage Current - Measured TX bias current Output Power - Measured TX output power in milliWatts Input Power - Measured RX received power in milliWatts LOS - Loss of signal N/A - Not Available, N/S - Not Supported, W - Warning, E - Error356 PHY Diagnostics Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Phy_Diagnostics.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LYPower over Ethernet (PoE) Commands 357 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\PoE.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY 22 Power over Ethernet (PoE) Commands power inline Use the power inline Interface Configuration mode command to configure the inline power administrative mode on an interface. Syntax power inline {auto | never} Parameters • auto—Turns on the device discovery protocol and applies power to the device. • never—Turns off the device discovery protocol and stops supplying power to the device. Default Configuration The default configuration is set to auto. Command Mode Interface Configuration (Ethernet) mode Example The following example turns on the device discovery protocol on port 4. Console(config)# interface gi1/0/4 Console(config-if)# power inline auto358 Power over Ethernet (PoE) Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\PoE.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY power inline limit-mode Use the power inline limit-mode Global Configuration mode command to set the power limit mode of the system. Use the no form of this command to return to the default. Syntax power inline limit-mode { port | max-port-power } no power inline limit-mode Parameters • port—The power limit of a port depends on port configuration • max-port-power—In this mode, each port can get up to the maximum power, which is 15.4W. Command Mode Global Configuration mode Default User Guidelines Changing the PoE limit mode of the system turns the power OFF and ON for all PoE ports. Example The following example sets the power limit to port. switchxxxxxx(config)# power inline limit-mode portPower over Ethernet (PoE) Commands 359 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\PoE.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY power inline powered-device Use the power inline powered-device Interface Configuration mode command to add a description of the powered device type. Use the no form of this command to remove the description. Syntax power inline powered-device pd-type no power inline powered-device Parameters pd-type—Enters a comment or a description to assist in recognizing the type of the powered device attached to this interface. (Length: 1–24 characters) Default Configuration There is no description. Command Mode Interface Configuration (Ethernet) mode Example The following example adds the description ‘ip phone’ of the device connected to port 4. Console(config)# interfacegi1/0/4 Console(config-if)# power inline powered-device ip phone power inline priority Use the power inline priority Interface Configuration (Ethernet) mode command to configure the interface inline power management priority. Use the no form of this command to restore the default configuration. Syntax power inline priority {critical | high | low}360 Power over Ethernet (PoE) Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\PoE.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY no power inline priority Parameters • critical—Specifies that the powered device operation is critical. • high—Specifies that the powered device operation is high priority. • low—Specifies that the powered device operation is low priority. Default Configuration The default configuration is set to low priority. Command Mode Interface Configuration (Ethernet) mode Example The following example sets the inline power management priority of gigabitethernet port 4 to High. Console(config)# interface gi1/0/4 Console(config-if)# power inline priority high power inline usage-threshold Use the power inline usage-threshold Global Configuration mode command to configure the threshold for initiating inline power usage alarms. Use the no form of this command to restore the default configuration. Syntax power inline usage-threshold percent no power inline usage-threshold Parameters percent—Specifies the threshold in percent to compare to the measured power. (Range: 1–99) Default Configuration The default threshold is 95 percent.Power over Ethernet (PoE) Commands 361 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\PoE.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Command Mode Global Configuration mode Example The following example configures the threshold for initiating inline power usage alarms to 90 percent. Console(config)# power inline usage-threshold 90 power inline traps enable Use the power inline traps enable Global Configuration mode command to enable inline power traps. Use the no form of this command to disable traps. Syntax power inline traps enable no power inline traps enable Default Configuration Inline power traps are disabled. Command Mode Global Configuration mode Example The following example enables inline power traps. Console(config)# power inline traps enable power inline limit Use the power inline limit Interface Configuration mode command to configure the power limit per port on an interface. Use the no form of the command to return to default. 362 Power over Ethernet (PoE) Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\PoE.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Syntax power inline limit power no power inline limit Parameters power—States the port power consumption limit in Milliwatts (Range: 0- 15400 Default Configuration The default value is the maximum power allowed in the specific working mode: • 15.4W Command Mode Interface Configuration (Ethernet) mode Example The following example sets inline power on a port. console(config)# interface gi1/0/1 console(config-if)# power inline limit 2222 show power inline Use the show power inline EXEC mode command to display information about the inline power for all interfaces or for a specific interface. Syntax show power inline [interface-id | module stack-member-number] Parameters interface-id—Specifies an interface ID. The interface ID must be an Ethernet port. stack-member-number—Specifies the switch member in a stack.Power over Ethernet (PoE) Commands 363 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\PoE.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Default Configuration There is no default configuration for this command. Command Mode EXEC mode Example 1: The following example displays information about the inline power. console(config)# show power inline Port based power-limit mode Unit Power Nominal Consumed Usage Traps Power Power Threshold ---- ------- ------- ------- ------ -------- 1 On 500 Watts 100 Watts (20%) 95 Disable 2 Off 1 Watts 0 Watts (0%) 95 Disable 3 Off 1 Watts 0 Watts (0%) 95 Disable 4 Off 1 Watts 0 Watts (0%) 95 Disable 5 Off 1 Watts 0 Watts (0%) 95 Disable 6 Off 1 Watts 0 Watts (0%) 95 Disable 7 Off 1 Watts 0 Watts (0%) 95 Disable 8 Off 1 Watts 0 Watts (0%) 95 Disable Port Powered Device State Status Priority Class ----- -------------- ----------- -------- -------- ------- gi1/0/1 IP Phone Model A Auto On High Class0 gi1/0/2 Wireless AP Model A Auto On Low Class1 gi1/0/3 Auto Off Low N/A ... Example 2: The following example displays information about the inline power for a specific port. console(config)# show power inline gi1/1/1 Port Powered Device State Status Priority Class 364 Power over Ethernet (PoE) Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\PoE.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY ----- -------------- ------- ------ -------- ------- gi1/1/1 IP Phone Model A Auto On High Class0 Power limit (for port power-limit mode): 15.4W Overload Counter: 0 Short Counter: 0 Denied Counter: 0 Absent Counter: 0 Invalid Signature Counter: 0 The following table describes the fields shown in the display: Field Description Power The inline power sourcing equipment operational status. Nominal Power The inline power sourcing equipment nominal power in Watts. Consumed Power The measured usage power in Watts. Usage Threshold The usage threshold expressed in percent for comparing the measured power and initiating an alarm if threshold is exceeded. Traps Indicates if inline power traps are enabled. Port The Ethernet port number. Powered device A description of the powered device type. Admin State Indicates if the port is enabled to provide power. The possible values are Auto or Never. Priority The port inline power management priority. The possible values are Critical, High or Low. Oper State Describes the port inline power operational state. The possible values are On, Off, Test-Fail, Testing, Searching or Fault. Classification The power consumption classification of the powered device. Overload Counter Counts the number of overload conditions detected. Short Counter Counts the number of short conditions detected. Denied Counter Counts the number of times power was denied.Power over Ethernet (PoE) Commands 365 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\PoE.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY The following table describes the fields shown in the display: Following is a list of port status values: Port is on - valid capacitor detected Port is on - valid resistor detected Port is off - main supply voltage is high Port is off - main supply voltage is low Port is off -‘disable all ports’ pin is active Port is off - non-existing port number Fewer ports are available than the max. Port is off - Port is yet undefined Port is off - internal hardware fault Port is off - user setting Port is off - detection is in process Port is off - non-802.3af powered device Port is off - Overload & Underload states Port is off – Underload state Port is off – Overload state Port is off - power budget exceeded Port is off - internal hardware fault Port is off – voltage injection into the port Port is off - improper Capacitor Detection results Port is off - discharged load Port fails Capacitor Port is on – detection regardless (Force On) Undefined error during Force On Supply voltage higher than settings Supply voltage lower than settings Disable_PDU flag raised during Force On Port is forced on, then disabled Port is off – forced power error due to Overload Absent Counter Counts the number of times power was removed because powered device dropout was detected. Invalid Signature Counter Counts the number of times an invalid signature of a powered device was detected. Field Description366 Power over Ethernet (PoE) Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\PoE.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Port is off - “out of power budget” during Force On Communication error with PoE devices after Force On Port is off – short condition Port is off – over temperature at the port Port is off – device is too hot Unknown device port status Force Power Error Short Circuit Force Power Error Channel Over Temperature Force Power Error Chip Over Temperature Power Management-Static Power Management-Static -ovl Force Power Error Management Static Force Power Error Management Static -ovl High power port is ON Chip Over Power Force Power Error Chip Over Power show power inline consumption Use the show power inline consumption EXEC mode command to display information about the inline power consumption for all interfaces or for a specific interface. Syntax show power inline consumption [interface-id | module stack-membernumber] Parameters Interface-id—Specifies an interface ID. The interface ID must be an Ethernet port. stack-member-number—Specifies the switch member in a stack. Default Configuration There is no default configuration for this command.Power over Ethernet (PoE) Commands 367 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\PoE.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Command Mode EXEC mode Example The following example displays information about the inline power consumption. show power inline version Use the show power inline version EXEC mode command to display the power inline microcontroller's software version for all the stacking units or for a specific unit. Syntax show power inline version [unit unit] Parameters unit unit — Specifies the stacking unit number. Default Configuration There is no default configuration for this command. Command Mode EXEC mode Console# show power inline consumption Port ---- gi1/0/1 gi1/0/1 gi1/0/1 Power Limit (W) ---------- 15.4 15.4 15.4 Power (W) ---------- 4.115 4.157 4.021 Voltage (V) --------- 50.8 50.7 50.9 Current (mA) --------- 81 82 79368 Power over Ethernet (PoE) Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\PoE.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example The following example displays information about the inline power consumption. Console# show power inline version Unit ---- 1 2 Software version ---------------- 1.12 1.12EEE Commands 369 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\750_EEE.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY 23 EEE Commands eee enable (global) Use the eee enable Global Configuration command to enable the EEE mode globally. Use the no format of the command to disable the mode. Syntax eee enable no eee enable Default Configuration EEE is enabled. Command Mode Global Configuration mide User Guidelines Since EEE uses the Auto-Negotiation to negotiate the EEE support on both sides of the link, if Auto-Negotiation is not enabled on the port, the EEE Operational status is disabled. eee enable (interface) Use the eee enable Interface Configuration command to enable the EEE mode on an Ethernet port. Use the no format of the command to disable the mode. Syntax eee enable370 EEE Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\750_EEE.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY no eee enable Default Configuration EEE is enabled. Command Mode Interface Configuration mode (Ethernet) User Guidelines Since EEE uses the Auto-Negotiation to negotiate the EEE support on both sides of the link, if Auto-Negotiation is not enabled on the port, the EEE Operational status is disabled. eee lldp enable Use the eee lldp enable Interface Configuration command to enable EEE support by LLDP on an Ethernet port. Use the no format of the command to disable the support. Syntax eee lldp enable no eee lldp enable Default Configuration Enabled Command Mode Interface Configuration mode (Ethernet) User Guidelines Enabling EEE LLDP advertisement allows devices to choose and change system wake-up times in order to get the optimal energy saving mode. show eee Use the show eee EXEC command to display EEE information.EEE Commands 371 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\750_EEE.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Syntax show eee [interface-id] Parameters interface-id—Specify an interface ID. The interface ID must be an Ethernet port. Command Mode EXEC Examples Example 1. Brief Information about all ports Switch>show eee EEE globally enabled EEE Administrate status is enabled on ports: gi1/0/1-6,gi1/0/12 EEE Operational status is enabled on ports: gi1/0/1,gi1/0/3- 6,gi1/0/12,gi1/0/15 EEE LLDP Administrate status is enabled on ports: gi1/0/1-10 EEE LLDP Operational status is enabled on ports: gi1/0/3-5 Example 2. Port in state notPresent, no information if port supports EEE Switch> show eee gi1/0/10 Port Status: notPresent EEE Administrate status: enabled EEE LLDP Administrate status: enabled EEE LLDP Administrate status: enabled Example 3. Port in status DOWN Switch>show eee gi1/0/10 Port Status: DOWN EEE capabilities: Speed 10M: EEE not supported372 EEE Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\750_EEE.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Speed 100M: EEE supported Speed 1G: EEE supported Speed 10G: EEE not supported EEE Administrate status: enabled EEE LLDP Administrate status: enabled Example 4. Port in status UP and does not support EEE Switch>show eee gi1/0/20 Port Status: UP EEE capabilities: Speed 10M: EEE not supported Speed 100M: EEE supported Speed 1G: EEE supported Speed 10G: EEE not supported Current port speed: 1Gbps EEE Administrate status: enabled EEE LLDP Administrate status: enabled Example 5. Neighbor does not support EEE Switch>show eee gi1/0/15 Port Status: UP EEE capabilities: Speed 10M: EEE not supported Speed 100M: EEE supported Speed 1G: EEE supported Speed 10G: EEE not supported Current port speed: 1Gbps EEE Remote status: disabled EEE Administrate status: enabled EEE Operational status: disabled (neighbor does not support) EEE LLDP Administrate status: enabledEEE Commands 373 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\750_EEE.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY EEE LLDP Operational status: disabled Example 6. EEE is disabled on the port Switch>show eee gi1/0/10 Port Status: UP EEE capabilities: Speed 10M: EEE not supported Speed 100M: EEE supported Speed 1G: EEE supported Speed 10G: EEE not supported Current port speed: 1Gbps EEE Administrate status: disabled EEE Operational status: disabled EEE LLDP Administrate status: enabled EEE LLDP Operational status: disabled Example 7. EEE is running on the port, EEE LLDP is disabled Switch>show eee gi1/0/12 Port Status: UP EEE capabilities: Speed 10M: EEE not supported Speed 100M: EEE supported Speed 1G: EEE supported Speed 10G: EEE not supported Current port speed: 1Gbps EEE Remote status: enabled EEE Administrate status: enabled EEE Operational status: enabled EEE LLDP Administrate status: disabled EEE LLDP Operational status: disabled Resolved Tx Timer: 10usec374 EEE Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\750_EEE.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Local Tx Timer: 10 usec Resolved Timer: 25 usec Local Rx Timer: 20 usec Example 8. EEE and EEE LLDP are running on the port Switch>show eee gi1/0/3 Port Status: UP EEE capabilities: Speed 10M: EEE not supported Speed 100M: EEE supported Speed 1G: EEE supported Speed 10G: EEE not supported Current port speed: 1Gbps EEE Remote status: enabled EEE Administrate status: enabled EEE Operational status: enabled EEE LLDP Administrate status: enabled EEE LLDP Operational status: enabled Resolved Tx Timer: 10usec Local Tx Timer: 10 usec Remote Rx Timer: 5 usec Resolved Timer: 25 usec Local Rx Timer: 20 usec Remote Tx Timer: 25 usec Example 9. EEE is running on the port, EEE LLDP enabled but not synchronized with remote link partner Switch>show eee gi1/0/9 Port Status: up EEE capabilities: Speed 10M: EEE not supported Speed 100M: EEE supportedEEE Commands 375 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\750_EEE.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Speed 1G: EEE supported Speed 10G: EEE not supported Current port speed: 1Gbps EEE Remote status: enabled EEE Administrate status: enabled EEE Operational status: enabled EEE LLDP Administrate status: enabled EEE LLDP Operational status: disabled Resolved Tx Timer: 64 Local Tx Timer: 64 Resolved Rx Timer: 16 Local Rx Timer: 16 Example 10. EEE and EEE LLDP are running on the port Switch>show eee gi1/0/3 Port Status: UP EEE capabilities: Speed 10M: EEE not supported Speed 100M: EEE supported Speed 1G: EEE supported Speed 10G: EEE not supported Current port speed: 1Gbps EEE Remote status: enabled EEE Administrate status: enabled EEE Operational status: enabled EEE LLDP Administrate status: enabled EEE LLDP Operational status: enabled Resolved Tx Timer: 10usec Local Tx Timer: 10 usec Remote Rx Timer: 5 usec Resolved Timer: 25 usec376 EEE Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\750_EEE.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Local Rx Timer: 20 usec Remote Tx Timer: 25 usecGreen Ethernet 377 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\750_Green_Ethernet.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY 24 Green Ethernet show green-ethernet Use the show green-ethernet Privileged EXEC mode command to show green-ethernet configuration and information. Syntax show green-ethernet [interface-id] Parameters interface-id—Specifies an interface ID. The interface ID must be an Ethernet port. Parameters Range Default. When no interface is specified, this command shows information for all interfaces. Command Mode Privileged EXEC mode User Guidelines The following describes all possible reasons the show command displays, and their descriptions. If there are a several reasons for non-operation, then only the highest priority reason is displayed. Energy-detect Non-operational Reasons priority Reason Description378 Green Ethernet FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\750_Green_Ethernet.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example console# show green-ethernet Energy-Detect mode: Enabled Short-Reach mode: Disabled Power Consumption: 76% (3.31W out of maximum 4.33W) Cumulative Energy Saved: 33 [Watt*Hour] Short-Reach cable length threshold: 50m Port Energy-Detect Short-Reach VCT Cable Admin Oper Reason Admin Force Oper Reason Length ---- ----- ---- ------- ----- ----- ---- ------- ------ gi1/0/1 on on off off off gi1/0/2 on off LU on off off < 50 gi1/0/3 on off LU off off off 1 NP Port is not present 2 LT Link Type is not supported (fiber, auto media select) 3 LU Port Link is up – NA Short-Reach Non-operational Reasons Priority Reason Description 1 NP Port is not present 2 LT Link Type is not supported (fiber) 3 LS Link Speed Is not Supported (100M,10M,10G) 4 LL Link Length received from VCT Test exceed threshold 6 LD Port Link is Down – NA Green Ethernet 379 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\750_Green_Ethernet.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY green-ethernet short-reach (global) Use the green-ethernet short-reach Global Configuration mode command to enable green-ethernet short-reach mode globally. Use the no form of this command to disabled it. Syntax green-ethernet short-reach no green-ethernet short-reach Parameters This command has no arguments or keywords. Default Configuration EEE is enabled. Command Mode Global Configuration mode Example console(config)# green-ethernet short-reach green-ethernet short-reach (interface) Use the green-ethernet short-reach Interface Configuration mode command to enable green-ethernet short-reach mode on an interface. Use the no form of this command to disable it on an interface. Syntax green-ethernet short-reach no green-ethernet short-reach Parameters This command has no arguments or keywords.380 Green Ethernet FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\750_Green_Ethernet.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Default Configuration EEE is enabled. Command Mode Interface Configuration mode (Ethernet) User Guidelines When short-reach Mode is enabled and is not forced, the VCT (Virtual Cable Tester) length check must be performed. The VCT length check can be performed only on a copper port operating at a speed of 1000 Mbps. If the media is not copper or the link speed is not 1000 Mbps and short-reach mode is not forced (by green-ethernet short-reach force), short-reach mode is not applied. When the interface is set to enhanced mode, after the VCT length check has completed and set the power to low, an active monitoring for errors is done continuously. In the case of errors crossing a certain threshold, the PHY will be reverted to long reach. Example console(config)# interface gi1/0/1 console(config-if)# green-ethernet short-reach green-ethernet short-reach force Use the green-ethernet short-reach force Interface Configuration mode command to force short-reach mode on an interface. Use the no form of this command to return to default. Syntax green-ethernet short-reach force no green-ethernet short-reach force Parameters This command has no arguments or keywords.Green Ethernet 381 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\750_Green_Ethernet.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Default Configuration Short-reach mode is not forced. Command Mode Interface Configuration mode(Ethernet) Example console(config)# interface gi1/0/1 console(config-if)# green-ethernet short-reach force green-ethernet short-reach threshold Use the green-ethernet short-reach threshold Global Configuration mode command to set the maximum cable length for applying short-reach. Use the no form of this command to return to default. Syntax green-ethernet short-reach threshold cable-length no green-ethernet short-reach threshold Parameters cable-length—Specifies the maximum cable length (in meters) measured by VCT that allows applying short-reach mode (cable-length 0–70 meters) Default Configuration The default length is 40 meters. Command Mode Global Configuration mode User Guidelines Note that the automatic cable length measurement accuracy is +-10 meters. i.e. a cable with a real length of 30 m may be evaluated in the range of 20m–40m. Length performance depends on the link partner signal quality, cable quality and whether link partner also operates in short-reach mode.382 Green Ethernet FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\750_Green_Ethernet.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY The recommended default is 50m, as recommended by Marvell PHY team for any cable type. see appendix However, Marvell tests show that link partner can operate error free with an up to 80 m cable (cat 5e). The user may choose to change the threshold parameter under certain circumstances. Setting the threshold to 0 meters basically results in the short reach feature always being disabled, because the threshold will always be exceeded. green-ethernet power-meter reset Use the green-ethernet power meter reset Privileged EXEC mode command to reset the power save meter. Syntax green-ethernet power-meter reset Command Mode Privileged EXEC mode.Port Channel Commands 383 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Port_Channel.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY 25 Port Channel Commands channel-group Use the channel-group Interface Configuration (Ethernet) mode command to associate a port with a port-channel. Use the no form of this command to remove a port from a port-channel. Syntax channel-group port-channel mode {on | auto} no channel-group Parameters • port-channel—Specifies the port channel number for the current port to join. • mode {on | auto}—Specifies the mode of joining the port channel. The possible values are: • on—Forces the port to join a channel without an LACP operation. • auto—Forces the port to join a channel as a result of an LACP operation. Default Configuration The port is not assigned to a port-channel. Command Mode Interface Configuration (Ethernet) mode384 Port Channel Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Port_Channel.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example The following example forces port gi1/0/1 to join port-channel 1 without an LACP operation. Console(config)# interface gi1/0/1 Console(config-if)# channel-group 1 mode on port-channel load-balance Use the port-channel load-balance Global Configuration mode command to configure the load balancing policy of the port channeling. Use the no form of this command to reset to default. Syntax port-channel load-balance {src-dst-mac | src-dst-ip | src-dst-mac-ip | } no port-channel load-balance Parameters • src-dst-mac—Port channel load balancing is based on the source and destination MAC address. • src-dst-ip—Port channel load balancing is based on the source and destination IP address. • src-dst-mac-ip—Port channel load balancing is based on the source and destination of MAC and IP addresses. Default Configuration src-dst-mac is the default option. Command Mode Global Configuration mode User Guidelines In src-dst-mac-ip-port load balancing policy, fragmented packets might be reordered.Port Channel Commands 385 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Port_Channel.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example console# console# configure console(config)# port-channel load-balance src-dst-mac console(config)# port-channel load-balance src-dst-ip console(config)# port-channel load-balance src-dst-mac-ip console(config)# port-channel load-balance src-dst-mac-ip-port console(config)# show interfaces port-channel Use the show interfaces port-channel EXEC mode command to display portchannel information for all port channels or for a specific port channel. Syntax show interfaces port-channel [interface-id] Parameters interface-id—Specify an interface ID. The interface ID must be a Port Channel. Command Mode EXEC mode Example The following example displays information on all port-channels. console# console# show interfaces port-channel Load balancing: src-dst-mac. Gathering information... Channel Ports ------- ----- Po1 Active: gi1/0/1,Inactive: gi1/0/2-3 Po2 Active: gi1/0/25 Inactive: gi1/0/24386 Port Channel Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Port_Channel.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Po3 console# show interfaces switchport gi1/0/10 Gathering information... Name: gi1/0/10 Switchport: enable Administrative Mode: access Operational Mode: down Access Mode VLAN: 1 Access Multicast TV VLAN: none Trunking Native Mode VLAN: 1 Trunking VLANs Enabled: 1 2-4094 (Inactive) General PVID: 1 General VLANs Enabled: none General Egress Tagged VLANs Enabled: none General Forbidden VLANs: none General Ingress Filtering: enabled General Acceptable Frame Type: all General GVRP status: disabled Customer Mode VLAN: none Private-vlan promiscuous-association primary VLAN: none Private-vlan promiscuous-association Secondary VLANs Enabled: none Private-vlan host-association primary VLAN: none Private-vlan host-association Secondary VLAN Enabled: none DVA: disableAddress Table Commands 387 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Address_Table.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY 26 Address Table Commands bridge multicast filtering Use the bridge multicast filtering Global Configuration mode command to enable the filtering of multicast addresses. Use the no form of this command to disable multicast address filtering. Syntax bridge multicast filtering no bridge multicast filtering Default Configuration Multicast address filtering is disabled. All multicast addresses are flooded to all ports. Command Mode Global Configuration mode User Guidelines If multicast devices exist on the VLAN, do not change the unregistered multicast addresses’ states to drop on the device ports. If multicast devices exist on the VLAN and IGMP-snooping is not enabled, the bridge multicast forward-all command should be used to enable forwarding all multicast packets to the multicast switches. Example The following example enables bridge multicast filtering. Console(config)# bridge multicast filtering388 Address Table Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Address_Table.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY bridge multicast address Use the bridge multicast address Interface Configuration (VLAN) mode command to register a MAC-layer multicast address in the bridge table and statically add or remove ports to or from the group. Use the no form of this command to unregister the MAC address. Syntax bridge multicast address {mac-multicast-address} [[add | remove] {ethernet interface-list | port-channel port-channel-list}] no bridge multicast address {mac-multicast-address} Parameters • mac-multicast-address—Specifies the group MAC multicast address. • add—Adds ports to the group. • remove—Removes ports from the group. • ethernet interface-list—Specifies a list of Ethernet ports. Separate nonconsecutive Ethernet ports with a comma and no spaces. Use a hyphen to designate a range of ports. • port-channel port-channel-list—Specifies a list of port channels. Separate nonconsecutive port-channels with a comma and no spaces; use a hyphen to designate a range of port channels. Default Configuration No multicast addresses are defined. If ethernet interface-list or port-channel port-channel-list is specified without specifying add or remove, the default option is add. Command Mode Interface Configuration (VLAN) mode User Guidelines To register the group in the bridge database without adding or removing ports or port channels, specify the mac-multicast-address parameter only.Address Table Commands 389 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Address_Table.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Static multicast addresses can be defined on static VLANs only. You can execute the command before the VLAN is created. Example The following example registers the MAC address to the bridge table: Console(config)# interface vlan 8 Console(config-if)# bridge multicast address 01:00:5e:02:02:03 The following example registers the MAC address and adds ports statically. Console(config)# interface vlan 8 Console(config-if)# bridge multicast address 01:00:5e:02:02:03 add gi1/0/1-2 bridge multicast forbidden address Use the bridge multicast forbidden address Interface Configuration (VLAN) mode command to forbid adding or removing a specific multicast address to or from specific ports. Use the no form of this command to restore the default configuration. Syntax bridge multicast forbidden address {mac-multicast-address} {add | remove} {ethernet interface-list | port-channel port-channel-list} no bridge multicast forbidden address {mac-multicast-address} Parameters • mac-multicast-address—Specifies the group MAC multicast address. • add—Forbids adding ports to the group. • remove—Forbids removing ports from the group. • ethernet interface-list—Specifies a list of Ethernet ports. Separate nonconsecutive Ethernet ports with a comma and no spaces. Use a hyphen to designate a range of ports.390 Address Table Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Address_Table.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY • port-channel port-channel-list—Specifies a list of port channels. Separate nonconsecutive port-channels with a comma and no spaces. Use a hyphen to designate a range of port channels. Default Configuration No forbidden addresses are defined. Command Mode Interface Configuration (VLAN) mode User Guidelines Before defining forbidden ports, the multicast group should be registered. You can execute the command before the VLAN is created. Example The following example forbids MAC address 0100.5e02.0203 on port 2/9 within VLAN 8. Console(config)# interface vlan 8 Console(config-if)# bridge multicast address 0100.5e.02.0203 Console(config-if)# bridge multicast forbidden address 0100.5e02.0203 add gi1/0/9 bridge multicast unregistered Use the bridge multicast unregistered Interface Configuration (Ethernet, Port-Channel) mode command to configure the forwarding state of unregistered multicast addresses. Use the no form of this command to restore the default configuration. Syntax bridge multicast unregistered {forwarding | filtering} no bridge multicast unregistered Parameters • forwarding—Forwards unregistered multicast packets.Address Table Commands 391 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Address_Table.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY • filtering—Filters unregistered multicast packets. Default Configuration Unregistered multicast addresses are forwarded. Command Mode Interface Configuration (Ethernet, Port-Channel) mode User Guidelines Do not enable unregistered multicast filtering on ports that are connected to routers, because the 224.0.0.x address range should not be filtered. Note that routers do not necessarily send IGMP reports for the 224.0.0.x range. You can execute the command before the VLAN is created. Example The following example specifies that unregistered multicast packets are filtered on gigabitethernet port 1/0/1: Console(config)# interface gi1/0/1 Console(config-if)# bridge multicast unregistered filtering bridge multicast forward-all Use the bridge multicast forward-all Interface Configuration (VLAN) mode command to enable forwarding all multicast packets for a range of ports or port channels. Use the no form of this command to restore the default configuration. Syntax bridge multicast forward-all {add | remove} {ethernet interface-list | portchannel port-channel-list} no bridge multicast forward-all Parameters • add—Forces forwarding of all multicast packets. • remove—Does not force forwarding of all multicast packets.392 Address Table Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Address_Table.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY • ethernet interface-list—Specifies a list of Ethernet ports. Separate nonconsecutive Ethernet ports with a comma and no spaces. Use a hyphen to designate a range of ports. • port-channel port-channel-list—Specifies a list of port channels. Separate nonconsecutive port-channels with a comma and no spaces. Use a hyphen to designate a range of port channels. Default Configuration Forwarding of all multicast packets is disabled. Command Mode Interface Configuration (VLAN) mode Example The following example enables all multicast packets on port gi1/0/8 to be forwarded. Console(config)# interface vlan 2 Console(config-if)# bridge multicast forward-all add gi1/0/8 bridge multicast forbidden forward-all Use the bridge multicast forbidden forward-all Interface Configuration (VLAN) mode command to forbid a port to dynamically join multicast groups. Use the no form of this command to restore the default configuration. Syntax bridge multicast forbidden forward-all {add | remove} {ethernet interfacelist | port-channel port-channel-list} no bridge multicast forbidden forward-all Parameters • add—Forbids forwarding of all multicast packets. • remove—Does not forbid forwarding of all multicast packets.Address Table Commands 393 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Address_Table.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY • ethernet interface-list—Specifies a list of Ethernet ports. Separate nonconsecutive Ethernet ports with a comma and no spaces. Use a hyphen to designate a range of ports. • port-channel port-channel-list—Specifies a list of port channels. Separate nonconsecutive port-channels with a comma and no spaces; use a hyphen to designate a range of port channels. Default Configuration Ports are not forbidden to dynamically join multicast groups. Command Mode Interface Configuration (VLAN) mode User Guidelines Use this command to forbid a port to dynamically join (by IGMP, for example) a multicast group. The port can still be a multicast router port. Example The following example forbids forwarding of all multicast packets to gi1/0/1 within VLAN 2. Console(config)# interface vlan 2 Console(config-if)# bridge multicast forbidden forward-all add ethernet gi1/0/1 mac address-table static Use the mac address-table static Global Configuration mode command to add MAC-layer station source address to the MAC address table. Use the no form of this command to delete the MAC address. Syntax mac address-table static mac-address vlan vlan-id interface interface-id [permanent | delete-on-reset | delete-on-timeout | secure ] no mac address-table static [mac-address] vlan vlan-id394 Address Table Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Address_Table.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Parameters mac-address—AC address (Range: Valid MAC address) vlan-id—Specify the VLAN interface-id—Specify an interface ID. The interface ID can be one of the following types: Ethernet port or port-channel (Range: Valid Ethernet port, Valid Port-channel number) permanent—The address can only deleted by the no bridge address command. delete-on-reset—The address is deleted after reset. delete-on-timeout—The address is deleted after aged out. secure—The address is deleted after the port changes mode to unlock learning (no port security command). Available only when the port is in learning locked mode. Default Configuration No static addresses are defined. The default mode for an added address is permanent. Command Mode Global Configuration mode Example console(config)# mac address-table static 00:3f:bd:45:5a:b1 vlan 1 gi1/0/1 clear mac address-table Use the clear mac address-table Privileged EXEC command to remove learned or secure entries from the forwarding database. Syntax clear mac address-table dynamic [ interface interface-id ] clear mac address-table secure interface interface-idAddress Table Commands 395 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Address_Table.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Parameters interface interface-id—Delete all dynamic address on the specified interface.The interface ID can be one of the following types: Ethernet port or port-channel. Command Mode Privileged EXEC mode Example console# clear mac address-table dynamic mac address-table aging-time Use the mac address-table aging-time global configuration command to set the aging time of the address table. Use the no form of this command to restore the default. Syntax mac address-table aging-time seconds no mac address-table aging-time Parameters seconds—Time is number of seconds. (Range:10–300) Default Configuration 300 Command Mode Global Configuration mode Example console(config)# mac address-table aging-time 600396 Address Table Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Address_Table.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY port security Use the port security Interface Configuration (Ethernet, Port-channel) mode command to enable port security on an interface. Use the no form of this command to disable port security on an interface. Syntax port security [forward | discard | discard-shutdown] [trap seconds] no port security Parameters • forward—Forwards packets with unlearned source addresses, but does not learn the address. • discard—Discards packets with unlearned source addresses. • discard-shutdown—Discards packets with unlearned source addresses and shuts down the port. • trap seconds—Sends SNMP traps and specifies the minimum time interval in seconds between consecutive traps. (Range: 1–1000000) Default Configuration The feature is disabled The default mode is discard. Command Mode Interface Configuration (Ethernet, port-channel) mode Example The following example forwards all packets to port gi1/0/1 without learning addresses of packets from unknown sources and sends traps every 100 seconds if a packet with an unknown source address is received. console(config)# gi1/0/1 Console(config-if)# port security forward trap 100Address Table Commands 397 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Address_Table.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY port security mode Use the port security mode Interface Configuration (Ethernet, port-channel) mode command configures the port security learning mode. Use the no form of this command to restore the default configuration. Syntax port security mode {lock | max-addresses } no port security mode Parameters • lock—Saves the current dynamic MAC addresses associated with the port and disables learning, relearning and aging. • max-addresses—Deletes the current dynamic MAC addresses associated with the port and learns up to the maximum number of addresses allowed on the port. Relearning and aging are enabled. Default Configuration The default port security mode is lock. Command Mode Interface Configuration (Ethernet, port-channel) mode Example The following example sets the port security mode to dynamic for gigabitethernet interface 1/0/7. Console(config)# interface gi1/0/7 Console(config-if)# port security mode dynamic port security max Use the port security mode Interface Configuration (Ethernet, Port-channel) mode command to configure the maximum number of addresses that can be learned on the port while the port is in port security max-addresses mode. Use the no form of this command to restore the default configuration.398 Address Table Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Address_Table.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Syntax port security max {max-addr} no port security max Parameters max-addr—Specifies the maximum number of addresses that can be learned on the port. (Range: 0–128) Default Configuration This default maximum number of addresses is 1. Command Mode Interface Configuration (Ethernet, Port-channel) mode User Guidelines This command is relevant in port security max-addresses mode only. Example Console(config)# interface gi1/0/1 Console(config-if)# port security max 20 port security routed secure-address Use the port security routed secure-address Interface Configuration (Ethernet, Port-channel) mode command to add a MAC-layer secure address to a routed port. Use the no form of this command to delete a MAC address from a routed port. Syntax port security routed secure-address mac-address no port security routed secure-address [mac-address] Parameters mac-address—Specifies the MAC address.Address Table Commands 399 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Address_Table.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Default Configuration No addresses are defined. Command Mode Interface Configuration (Ethernet, port-channel) mode. It cannot be configured for a range of interfaces (range context). User Guidelines This command enables adding secure MAC addresses to a routed port in port security mode. The command is available when the port is a routed port and in port security mode. The address is deleted if the port exits the security mode or is not a routed port. This command is required because the bridge address command cannot be executed on internal VLANs. Example The following example adds the MAC-layer address 66:66:66:66:66:66 to gigabitethernet port 1/0/1. Console(config)# interface gi1/0/1 Console(config-if)# port security routed secure-address 66:66:66:66:66:66 show mac address-table Use the show mac address-table EXEC command to view entries in the MAC address table. Syntax show mac address-table [dynamic | static| secure] [vlan vlan] [interface interface-id] [address mac-address] Parameters • dynamic—Displays only dynamic MAC address table entries. • static—Displays only static MAC address table entries. • secure—Displays only secure MAC address table entries.400 Address Table Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Address_Table.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY • vlan—Specifies VLAN, such as VLAN 1. • interface-id—Specifies an interface ID. The interface ID can be one of the following types: Ethernet port or port-channel. • mac-address—MAC address. Default Command Mode EXEC mode User Guidelines Internal usage VLANs (VLANs that are automatically allocated on routed ports) are presented in the VLAN column by a port number and not by a VLAN ID. Example Console# show mac address-table Aging time is 300 sec VLAN MAC Address Port Type -------- --------------------- ---------- ---------- 1 00:00:26:08:13:23 0 self 1 00:3f:bd:45:5a:b1 gi1/0/1 static 1 00:a1:b0:69:63:f3 gi1/0/24 dynamic 2 00:a1:b0:69:63:f3 gi1/0/24 dynamic Console# show mac address-table 00:3f:bd:45:5a:b1 Aging time is 300 sec VLAN MAC Address Port Type -------- --------------------- ---------- ---------- 1 00:3f:bd:45:5a:b1 static gi1/0/9Address Table Commands 401 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Address_Table.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY show mac address-table count Use the show mac address-table count EXEC mode command to display the number of addresses present in the Forwarding Database. Syntax show mac address-table count [vlan vlan | interface interface-id] Parameters • vlan—Specifies VLAN. • interface-id—Specifies an interface ID. The interface ID can be one of the following types: Ethernet port or port-channel. Command Mode EXEC mode Example Console# show mac address-table count Capacity: 8192 Free: 8083 Used: 109 Static addresses: 2 Secure addresses: 1 Dynamic addresses: 97 Internal addresses: 9 show bridge multicast address-table Use the show bridge multicast address-table EXEC mode command to display multicast MAC address or IP address table information.402 Address Table Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Address_Table.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Syntax show bridge multicast address-table [vlan vlan-id] [address {mac-multicastaddress | ipv4-multicast-address | ipv6-multicast-address}] [format {ip | mac}] Parameters • vlan vlan-id—Specifies the VLAN ID. • address {mac-multicast-address | ipv4-multicast-address | ipv6- multicast-address}—Specifies the multicast address. The possible values are: • mac-multicast-address—Specifies the MAC multicast address. • ipv4-multicast-address—Specifies the IPv4 multicast address. • ipv6-multicast-address—Specifies the IPv6 multicast address. • format {ip | mac}—Specifies the multicast address format. The possible values are: • ip—Specifies that the multicast address is an IP address. • mac—Specifies that the multicast address is a MAC address. Default Configuration If the format is not specified, it defaults to mac. Command Mode EXEC mode User Guidelines A MAC address can be displayed in IP format only if it is within the range 0100.5e00.0000 through 0100.5e7f.ffff. Multicast Router ports (defined statically or discovered dynamically) are members in all MC groups. Ports that were defined via bridge multicast forbidden forward-all command are displayed in all forbidden MC entries. Example The following example displays bridge multicast address information. Console# show bridge multicast address-tableAddress Table Commands 403 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Address_Table.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Multicast address table for VLANs in MAC-GROUP bridging mode: Vlan MAC Address Type Ports ---- ----------------- -------------- ----- 8 01:00:5e:02:02:03 Static 1-2 Forbidden ports for multicast addresses: Vlan MAC Address Ports ---- ----------------- ----- 8 01:00:5e:02:02:03 gi1/0/9 Multicast address table for VLANs in IPv4-GROUP bridging mode: Vlan MAC Address Type Ports ---- ----------------- -------------- ----- 1 224.0.0.251 Dynamic gi1/0/12 Forbidden ports for multicast addresses: Vlan MAC Address Ports ---- ----------------- ----- 1 232.5.6.5 1 233.22.2.6 Multicast address table for VLANs in IPv4-SRC-GROUP bridging mode: Vlan Group Address Source address Type Ports ---- --------------- --------------- -------- ----- 1 224.2.2.251 11.2.2.3 Dynamic gi1/0/11 Forbidden ports for multicast addresses:404 Address Table Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Address_Table.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Vlan Group Address Source Address Ports ---- --------------- --------------- ------- 8 239.2.2.2 * gi1/0/9 8 239.2.2.2 1.1.1.11 gi1/0/9 Multicast address table for VLANs in IPv6-GROUP bridging mode: VLAN IP/MAC Address Type Ports ---- ----------------- --------- --------------------- 8 ff02::4:4:4 Static gi1/0/1-2,gi1/0/7,Po1 Forbidden ports for multicast addresses: VLAN IP/MAC Address Ports ---- ----------------- ----------- 8 ff02::4:4:4 gi1/0/9 Multicast address table for VLANs in IPv6-SRC-GROUP bridging mode: Vlan Group Address Source address Type Ports ---- --------------- --------------- -------- ------------------ 8 ff02::4:4:4 * Static gi1/0/1-2,gi1/0/7,Po1 8 ff02::4:4:4 fe80::200:7ff: Static fe00:200 Forbidden ports for multicast addresses: Vlan Group Address Source address Ports ---- --------------- --------------- ---------- 8 ff02::4:4:4 * gi1/0/9 8 ff02::4:4:4 fe80::200:7ff:f gi1/0/9 e00:200Address Table Commands 405 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Address_Table.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY show bridge multicast address-table static Use the show bridge multicast address-table static EXEC mode command to display the statically configured multicast addresses. Syntax show bridge multicast address-table static [vlan vlan-id] [address macmulticast-address | ipv4-multicast-address | ipv6-multicast-address] [source ipv4-source-address | ipv6-source-address] [all | mac | ip] Parameters • vlan vlan-id—Specifies the VLAN ID. • address {mac-multicast-address | ipv4-multicast-address | ipv6- multicast-address}—Specifies the multicast address. The possible values are: • mac-multicast-address—Specifies the MAC multicast address. • ipv4-multicast-address—Specifies the IPv4 multicast address. • ipv6-multicast-address—Specifies the IPv6 multicast address. • source {ipv4-source-address | ipv6-source-address}—Specifies the source address. The possible values are: • ipv4-address—Specifies the source IPv4 address. • ipv6-address—Specifies the source IPv6 address. Default Configuration When all/mac/ip is not specified, all entries (mac and ip) will be displayed. Command Mode EXEC mode User Guidelines A MAC address can be displayed in IP format only if it is within the range 0100.5e00.0000–- 0100.5e7f.ffff.406 Address Table Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Address_Table.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example The following example displays the statically configured multicast addresses. Console# show bridge multicast address-table static MAC-GROUP table Vlan ---- 1 MAC Address -------------- 0100.9923.8787 Ports -------- gi1/0/1, gi1/0/2 Forbidden ports for multicast addresses: Vlan ---- MAC Address -------------- Ports -------- IPv4-GROUP Table Vlan ---- 1 19 19 IP Address ---------- 231.2.2.3 231.2.2.8 231.2.2.8 Ports -------- gi1/0/1, gi1/0/2 gi1/0/1-8 gi1/0/9-11 Forbidden ports for multicast addresses: Vlan ---- 1 19 IP Address ---------- 231.2.2.3 231.2.2.8 Ports -------- gi1/0/8 gi1/0/8 IPv4-SRC-GROUP Table:Address Table Commands 407 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Address_Table.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Vlan ---- Group Address --------------- Source address --------------- Ports ------ Forbidden ports for multicast addresses: Vlan ---- Group Address --------------- Source address --------------- Ports ------ IPv6-GROUP Table Vlan ---- 191 IP Address ----------------- FF12::8 Ports --------- gi1/0/1-8 Forbidden ports for multicast addresses: Vlan ---- 11 191 IP Address ----------------- FF12::3 FF12::8 Ports --------- gi1/0/8 gi1/0/8 IPv6-SRC-GROUP Table: Vlan ---- 192 Group Address --------------- FF12::8 Source address --------------- FE80::201:C9A9:FE40:8988 Ports ------ gi1/0/1- 8408 Address Table Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Address_Table.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY show bridge multicast filtering Use the show bridge multicast filtering EXEC mode command to display the multicast filtering configuration. Syntax show bridge multicast filtering vlan-id Parameters vlan-id—Specifies the VLAN ID. (Range: Valid VLAN) Command Mode EXEC mode Forbidden ports for multicast addresses: Vlan ---- 192 Group Address --------------- FF12::3 Source address --------------- FE80::201:C9A9:FE40 :8988 Ports ------ gi1/0/8Address Table Commands 409 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Address_Table.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example The following example displays the multicast configuration for VLAN 1. show bridge multicast unregistered Use the show bridge multicast unregistered EXEC mode command to display the unregistered multicast filtering configuration. Syntax show bridge multicast unregistered [interface-id] Parameters interface-id—Specifies an interface ID. The interface ID can be one of the following types: Ethernet port or Port-channel. Command Mode EXEC mode Console# show bridge multicast filtering 1 Filtering: Enabled VLAN: 1 Port ----- gi1/0/1 gi1/0/2 gi1/0/3 Forward-All Static --------- Forbidden Forward - Status ------ Filter Forward(s) Forward(d)410 Address Table Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Address_Table.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example The following example displays the unregistered multicast configuration. show ports security Use the show ports security Privileged EXEC mode command to display the port-lock status. Syntax show ports security [interface-id] Parameters interface-id—Specifies an interface ID. The interface ID can be one of the following types: Ethernet port or Port-channel. Command Mode Privileged EXEC mode Example The following example displays the port-lock status of all ports. console# show ports security Port Status Learning Action Max Trap Frequency ------- -------- --------- ------ --- ------- -------- gi1/0/1 Enabled Max- Discard 3 Enabled 100 Addresses gi1/0/2 Disabled Max- - 28 - - Console# show bridge multicast unregistered Port ------- gi1/0/1 gi1/0/2 gi1/0/3 Unregistered ------------- Forward Filter FilterAddress Table Commands 411 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Address_Table.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Addresses gi1/0/3 Enabled Lock Discard, 8 Disabled - Shutdown The following table describes the fields shown above. show ports security addresses Use the show ports security addresses Privileged EXEC mode command to display the current dynamic addresses in locked ports. Syntax show ports security addresses [interface-id Parameters interface-id—Specifies an interface ID. The interface ID can be one of the following types: Ethernet port or Port-channel. Command Mode Privileged EXEC mode Field Description Port The port number. Status The port security status. The possible values are: Enabled or Disabled. Mode The port security mode. Action The action taken on violation. Maximum The maximum number of addresses that can be associated on this port in the Max-Addresses mode. Trap The status of SNMP traps. The possible values are: Enable or Disable. Frequency The minimum time interval between consecutive traps.412 Address Table Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Address_Table.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example The following example displays dynamic addresses in all currently locked ports. Console# show ports security addresses Port ---- gi1/0/1 gi1/0/2 gi1/0/3 Status -------- Enabled Disabled Enabled Learning ------------- Max-addresses Max-addresses Lock Current ------- 2 - NA Maximum ------- 3 128 NAPort Monitor Commands 413 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Port_Monitor.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY 27 Port Monitor Commands port monitor Use the port monitor Interface Configuration (Ethernet) mode command to start a port monitoring session. Use the no form of this command to stop a port monitoring session. Syntax port monitor src-interface-id [rx | tx] no port monitor src-interface-id Parameters • rx—Monitors received packets only. If no option is specified, it monitors both rx and tx. • tx—Monitors transmitted packets only. If no option is specified, it monitors both rx and tx. • src-interface-id—Specifies an interface ID. The interface ID must be an Ethernet port. Default Configuration Monitors both received and transmitted packets. Command Mode Interface Configuration (Ethernet) mode. It cannot be configured for a range of interfaces (range context).414 Port Monitor Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Port_Monitor.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY User Guidelines This command enables port copy between Source Port (src-interface) to a Destination Port (The port in context). The analyzer port for port ingress traffic mirroring should be the same port for all mirrored ports. The analyzer port for port egress traffic mirroring should be the same port for all mirrored ports. Following are restrictions apply for ports that are configured to be source ports: • The port cannot be a destination port. The following restrictions apply to ports that are configured to be monitor ports: • The port can’t be source port. • The port isn’t member in port-channel. • IP interface is not configured on the port. • GVRP is not enabled on the port. • The port is not a member in any VLAN, except for the default VLAN (will be automatically removed from the default VLAN). • L2 protocols are not active on the copy dest. Port: LLDP, LBD, STP, LACP. The following restrictions apply to ports that are configured to be monitor ports: • The port cannot be source port. • The port is not a member in port-channel. Notes: • In this mode some traffic duplication on the analyzer port may be observed. For example: • Port 2 is being egress monitored by port 4. • Port 2 & 4 are members in VLAN 3. • Unknown Unicast packet sent to VLAN 3 will egress from port 4 twice, one instance as normal forward and another instance as mirrored from port 2.Port Monitor Commands 415 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Port_Monitor.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY • Moreover, if port 2 is an untagged member in VLAN 3 and port 4 is a tagged member then both instances will look different (one tagged and the other is not). • When the port is configured to 802.1X auto mode it will forward any mirrored traffic regardless of the .1X state. However, it will operate as a normal network port (forward traffic) only after authorization is done. • Mirrored traffic is exposed to STP state, i.e. if the port is in STP blocking, it will not egress any mirrored traffic. Example The following example copies traffic for both directions (Tx and Rx) from the source port gi1/0/8 to destination port gi1/0/1. Console(config)# interface gi1/0/1 Console(config-if)# port monitor gi1/0/8 show ports monitor Use the show ports monitor EXEC mode command to display the port monitoring status. Syntax show ports monitor Command Mode EXEC mode Example The following example displays the port monitoring status. Console# show ports monitor Source port Destination Port Type Status ----------- ---------------- -------- -------- gi1/0/8 gi1/0/1 RX,TX Active gi1/0/2 gi1/0/1 RX,TX Active gi1/0/18 gi1/0/1 RX Active416 Port Monitor Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Port_Monitor.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LYsFlow Commands 417 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\750_sFlow.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY 28 sFlow Commands sflow receiver Use the sflow receiver Global Configuration mode command to define sFlow collector. Use the no form of this command to remove the definition of the collector. Syntax sflow receiver index {ipv4-address | ipv6-address | hostname} [port port] [max-datagram-size bytes] no sflow receiver index Parameters • index—The index of the receiver. (Range: 1–8) • ipv4-address—Pv4 address of the host to be used as an sFlow Collector. • ipv6-address—IPv6 address of the host to be used as an sFlow Collector. When the IPv6 address is a Link Local address (IPv6Z address), the outgoing interface name must be specified. Refer to the User Guidelines for the interface name syntax. • hostname—Hostname of the host to be used as an sFlow Collector. Only translation to IPv4 addresses is supported. • port—Port number for syslog messages. If unspecified, the port number defaults to 6343. The range is 1-65535. • bytes—Specifies the maximum number of bytes that can be sent in a single sample datagram. If unspecified, it defaults to 1400. Default No receiver is defined.418 sFlow Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\750_sFlow.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Command Mode Global Configuration mode User Guidelines If the IP address of the sFlow receiver is set to 0.0.0.0, no sFlow datagrams are sent. sflow flow-sampling Use the sflow flow-sampling Interface Configuration mode command to enable sFlow Flow sampling and configure the average sampling rate of a specific port. Use the no form of this command to disable Flow sampling. Syntax sflow flow-sampling rate receiver-index [max-header-size bytes] no sflow flow-sampling Parameters  rate—Specifies the average sampling rate (Range: 1, 1024–1073741823.)  receiver-index—Index of the receiver/collector (Range: 1–8.)  bytes—Specifies the maximum number of bytes that would be copied from the sampled packet. If unspecified, defaults to 128. (Range: 20–256.) Default Disabled Command Mode Interface Configuration (Ethernet) mode User Guidelines A new sampling rate configuration is not immediately loaded to the hardware. It will be loaded to the hardware only after the next packet is sampled (based on the current sampling rate).sFlow Commands 419 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\750_sFlow.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY sflow counters-sampling Use the sflow counters-sampling Interface Configuration mode command to enable sFlow Counters sampling and to configure the maximum interval of a specific port. Use the no form of this command to disable sFlow Counters sampling. Syntax sflow counters-sampling interval receiver-index no sflow counters-sampling Parameters  interval—Specifies the maximum number of seconds between successive samples of the interface counters. (Range: 1, 15–86400.)  receiver-index—Index of the receiver/collector. (Range: 1–8.) Default Disabled Command Mode Interface Configuration (Ethernet) mode clear sflow statistics Use the clear sFlow statistics EXEC mode command to clear sFlow statistics. Syntax clear sflow statistics [interface-id] Parameters interface-id—Specifies an interface ID. The interface ID must be an Ethernet port. Command Mode EXEC mode420 sFlow Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\750_sFlow.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY User Guidelines If no interface is specified by the user, the command clears all the sFlow statistics counters (including datagrams sent). If an interface is specified by the user, the command clears only the counter of the specific interface. show sflow configuration Use the show sflow configuration EXEC mode command to display the sFlow configuration for ports that are enabled for Flow sampling or Counters sampling. Syntax show sflow configuration [interface-id] Parameters interface-id—Specifies an interface ID. The interface ID must be an Ethernet port. Command Mode EXEC mode Example Console # show sflow configuration Receivers Index IP Address Port Max Datagram Size ----- -------------------- -------- ---------------- 1 0.0.0.0 6343 1400 2 172.16.1.2 6343 1400 3 0.0.0.0 6343 1400 4 0.0.0.0 6343 1400 5 0.0.0.0 6343 1400 6 0.0.0.0 6343 1400 7 0.0.0.0 6343 1400 8 0.0.0.0 6343 1400 InterfacessFlow Commands 421 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\750_sFlow.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Inter- Flow Counters Max Header Flow Counters Collector face Sampling Sampling Size Collector Index Index ----- ----------- --------- --------- ---------- ----- ------------ gi1/0/1 1/2048 60 sec 128 1 1 gi1/0/2 1/4096 Disabled 128 0 2 show sflow statistics Use the show sflow statistics EXEC mode command to display the sFlow statistics for ports that are enabled for Flow sampling or Counters sampling. Syntax show sflow statistics [interface-id] Parameters interface-id—Specifies an interface ID. The interface ID must be an Ethernet port. Command Mode EXEC mode Example Console # show sflow statistics Total sFlow datagrams sent to collectors: 100 Interface Packets sampled datagrams sent to collector ---------- ----------- -------------- 1/1 30 50 1/2 10 10422 sFlow Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\750_sFlow.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY 1/1 0 10 1/2 0 0LLDP Commands 423 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\LLDP.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY 29 LLDP Commands lldp run Use the lldp run Global Configuration mode command to enable Link Layer Discovery Protocol (LLDP). To disable LLDP, use the no form of this command. Syntax lldp run no lldp run Parameters This command has no arguments or keywords. Default Enabled Command Mode Global Configuration mode Example console(config)# lldp run lldp transmit Use the lldp transmit Interface Configuration mode command to enable transmitting Link Layer Discovery Protocol (LLDP) on an interface. Use the no form of this command to stop transmitting LLDP on an interface.424 LLDP Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\LLDP.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Syntax lldp transmit no lldp transmit Parameters This command has no arguments or keywords. Default Enabled Command Mode Interface Configuration (Ethernet) mode User Guidelines LLDP manages LAG ports individually. LLDP sends separate advertisements on each port in a LAG. LLDP operation on a port is not dependent on the STP state of a port. I.e. LLDP frames are sent on blocked ports. If a port is controlled by 802.1X, LLDP would operate only if the port is authorized. Example console(config)# interface gi1/0/1 console(config-if)# lldp transmit lldp receive Use the lldp receive Interface Configuration mode command to enable receiving Link Layer Discovery Protocol (LLDP) on an interface. Use the no form of this command to stop receiving LLDP on an interface. Syntax lldp receive no lldp receiveLLDP Commands 425 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\LLDP.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Parameters This command has no arguments or keywords. Default Enabled Command Mode Interface Configuration (Ethernet) mode User Guidelines LLDP manages LAG ports individually. LLDP data received through LAG ports is stored individually per port. LLDP operation on a port is not dependent on the STP state of a port. I.e. LLDP frames are received on blocked ports. If a port is controlled by 802.1X, LLDP would operate only if the port is authorized. Example console(config)# interface gi1/0/1 console(config-if)# lldp receive lldp timer Use the lldp timer Global Configuration mode command to specify how often the software sends Link Layer Discovery Protocol (LLDP) updates. Use the no form of this command to restore the default configuration. Syntax lldp timer seconds no lldp timer Parameters seconds—Specifies, in seconds, how often the software sends LLDP updates. (Range: 5-32768 seconds)426 LLDP Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\LLDP.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Default Configuration The default update interval is 30 seconds. Command Mode Global Configuration mode Example The following example sets the interval for sending LLDP updates to 60 seconds. Console(config)# lldp timer 60 lldp hold-multiplier Use the lldp hold-multiplier Global Configuration mode command to set the time interval during which the receiving device holds a Link Layer Discovery Protocol (LLDP) packet before discarding it. Use the no form of this command to restore the default configuration. Syntax lldp hold-multiplier number no lldp hold-multiplier Parameters number—Specifies the LLDP packet hold time interval as a multiple of the LLDP timer value. (Range: 2use the no form of this command10) Default Configuration The default LLDP hold multiplier is 4. Command Mode Global Configuration mode User Guidelines The actual Time-To-Live (TTL) value of LLDP frames is expressed by the following formula:LLDP Commands 427 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\LLDP.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY TTL = min(65535, LLDP-Timer * LLDP-HoldMultiplier) For example, if the value of the LLDP timer is 30 seconds, and the value of the LLDP hold multiplier is 4, then the value 120 is encoded in the TTL field of the LLDP header. Example The following example sets the LLDP packet hold time interval to 90 seconds. Console(config)# lldp timer 30 Console(config)# lldp hold-multiplier 3 lldp reinit Use the lldp reinit Global Configuration mode command to specify the minimum time an LLDP port waits before reinitializing LLDP transmission. Use the no form of this command to revert to the default setting. Syntax lldp reinit seconds no lldp reinit Parameters seconds—Specifies the minimum time in seconds an LLDP port waits before reinitializing LLDP transmission.(Range: 1–10) Default 2 seconds Command Mode Global Configuration mode Example console(config)# lldp reinit 4428 LLDP Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\LLDP.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY lldp tx-delay Use the lldp tx-delay Global Configuration mode command to set the delay between successive LLDP frame transmissions initiated by value/status changes in the LLDP local systems MIB. Use the no form of this command to restore the default configuration. Syntax lldp tx-delay seconds no lldp tx-delay Parameters seconds—Specifies the delay in seconds between successive LLDP frame transmissions initiated by value/status changes in the LLDP local systems MIB. (Range: 1-8192 seconds) Default Configuration The default LLDP frame transmission delay is 2 seconds. Command Mode Global Configuration mode User Guidelines It is recommended that the tx-delay be less than 0.25 of the LLDP timer interval. Example The following example sets the LLDP transmission delay to 10 seconds. Console(config)# lldp tx-delay 10 lldp optional-tlv Use the lldp optional-tlv Interface Configuration (Ethernet) mode command to specify which optional TLVs from the basic set are transmitted. Use the no form of this command to restore the default configuration.LLDP Commands 429 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\LLDP.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Syntax lldp optional-tlv tlv [tlv2 … tlv5] no lldp optional-tlv Parameters tlv—Specifies TLV that should be included. Available optional TLVs are: port-desc, sys-name, sys-desc, sys-cap, 802.3-mac-phy, 802.3-lag, 802.3-maxframe-size. Default Configuration No optional TLV is transmitted. Command Mode Interface Configuration (Ethernet) mode Example The following example specifies that the port description TLV is transmitted on gigabitethernet port 1/0/2. Console(config)# interface gi1/0/2 Console(config-if)# lldp optional-tlv port-desc lldp management-address Use the lldp management-address Interface Configuration (Ethernet) mode command to specify the management address advertised from an interface. Use the no form of this command to stop advertising management address information. Syntax lldp management-address {ip-address | none | automatic [interface-id] } no lldp management-address Parameters • ip-address—Specifies the static management address to advertise. • none—Specifies that no address is advertised.430 LLDP Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\LLDP.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY • automatic—Specifies that the software would automatically choose a management address to advertise from all the IP addresses of the product. In case of multiple IP addresses the software chooses the lowest IP address among the dynamic IP addresses. If there are no dynamic addresses, the software chooses the lowest IP address among the static IP addresses. • automatic interface-id—Specifies that the software automatically chooses a management address to advertise from the IP ddresses that are configured (associated) for the interface ID. In case of multiple IP addresses, the software chooses the lowest IP address among the dynamic IP addresses of the interface. If there are no dynamic addresses, the software chooses the lowest IP address among the static IP addresses of the interface. The interface ID can be one of the following types: Ethernet port, Port-channel or VLAN. Note that if the port or port- channel are members in a VLAN that has an IP address, that address is not included because the address is associated with the VLAN. Default Configuration No IP address is advertised. The default advertisement is automatic. Command Mode Interface Configuration (Ethernet) mode User Guidelines Each port can advertise one IP address. Example The following example sets the LLDP management address advertisement mode to automatic on gigabitethernet port 1/0/2. Console(config)# interface gi1/0/2 Console(config)# lldp management-address automatic lldp notifications Use the lldp notifications Interface Configuration (Ethernet) mode command to enable or disable sending Link Layer Discovery Protocol (LLDP) LLDP Commands 431 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\LLDP.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY notifications on an interface. Use the no form of this command to restore the default configuration. Syntax lldp notifications {enable | disable} no lldp notifications Parameters • enable—Enables sending LLDP notifications. • disable—Disables sending LLDP notifications. Default Configuration Sending LLDP notifications is disabled. Command Mode Interface Configuration (Ethernet) mode Example The following example enables sending LLDP notifications on gigabitethernet port 1/0/5. Console(config)# interface gi1/0/5 Console(config)# lldp notifications 10 lldp notifications interval Use the lldp notifications interval Global Configuration mode command to configure the maximum transmission rate of LLDP notifications. Use the no form of this command to return to the default. Syntax lldp notifications interval seconds no lldp notifications interval432 LLDP Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\LLDP.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Parameters seconds—The device should not send more than one notification in the indicated period. (Range: 5–3600) Default 5 seconds Command Mode Global Configuration mode Example console(config)# lldp notification interval 10 lldp optional-tlv 802.1 Use the lldp optional-tlv Interface Configuration mode command to specify which optional TLVs from the basic set to transmit. Use the no form of this command revert to the default setting. Syntax lldp optional-tlv 802.1 pvid no lldp optional-tlv 802.1 pvid lldp optional-tlv 802.1 ppvid add ppvid lldp optional-tlv 802.1 ppvid remove ppvid lldp optional-tlv 802.1 vlan-name add vlan-id lldp optional-tlv 802.1 vlan-name remove vlan-id lldp optional-tlv 802.1 protocol add {stp | rstp | mstp | pause | 802.1x | lacp | gvrp} lldp optional-tlv 802.1 protocol remove {stp | rstp | mstp | pause | 802.1x | lacp | gvrp} Parameters • pvid—Advertises the PVID of the port.LLDP Commands 433 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\LLDP.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY • ppvid—Adds/removes PPVID for advertising. PPVID 0 can be used to advertise the PPVIDs capabilities of the interface.(Range: 0–4094) • vlan—Adds/removse VLAN ID for advertising. (Range: 1–4094) Default No optional TLV is transmitted. Command Mode Interface Configuration (Ethernet) mode lldp med enable Use the lldp med enable Interface Configuration (Ethernet) mode command to enable Link Layer Discovery Protocol (LLDP) Media Endpoint Discovery (MED) on an interface. Use the no form of this command to disable LLDP MED on an interface. Syntax lldp med enable [tlv … tlv4] no lldp med enable Parameters tlv—Specifies the TLV that should be included. Available TLVs are: networkpolicy, location, and poe-pse, inventory. The capabilities TLV is always included if LLDP-MED is enabled. Default Configuration LLDP MED is disabled. Command Mode Interface Configuration (Ethernet) mode Example The following example enables LLDP MED with the location TLV on gigabitethernet port 1/0/3.434 LLDP Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\LLDP.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Console(config)# interface gi1/0/3 Console(config)# lldp med enable location lldp med notifications topology-change Use the lldp med notifications topology-change Interface Configuration (Ethernet) mode command to enable sending LLDP MED topology change notifications. Use the no form of this command to restore the default configuration. Syntax lldp med notifications topology-change {enable | disable} no lldp med notifications topology-change Parameters • enable—Enables sending LLDP MED topology change notifications. • disable—Disables sending LLDP MED topology change notifications. Default Configuration Disable is the default. Command Mode Interface Configuration (Ethernet) mode Example The following example enables sending LLDP MED topology change notifications on gigabitethernet port 1/0/2. Console(config)# interface gi1/0/2 Console(config)# lldp med notifications topology-change enableLLDP Commands 435 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\LLDP.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY lldp med fast-start repeat-count Use the lldp med fast-start repeat-count Global Configuration mode command to configure the number of times the fast start LLDPDU is being sent during the activation of the fast start mechanism defined by LLDPMED. Use the no form of this command return to default. Syntax lldp med fast-start repeat-count number no lldp med fast-start repeat-count Parameters number—Specifies the number of times the fast start LLDPDU is being sent during the activation of the fast start mechanism. Default 3 Command Mode Global Configuration mode Example console(config)# lldp med fast-start repeat-count 4 lldp med network-policy (global) Use the lldp med network-policy Global Configuration mode command to define LLDP MED network policy. Use the no form of this command to remove LLDP MED network policy. Syntax lldp med network-policy number application [vlan id] [vlan-type {tagged | untagged}] [up priority] [dscp value] no lldp med network-policy number436 LLDP Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\LLDP.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Parameters • number—Network policy sequential number. • application—The name or the number of the primary function of the application defined for this network policy. Available application names are: voice, voice-signaling, guest-voice, guest-voice-signaling, softphonevoice, video-conferencing, streaming-video, video-signaling. • vlan id—VLAN identifier for the application. • vlan-type—Specifies if the application is using a Tagged or an Untagged VLAN. • up priority—User Priority (Layer 2 priority) to be used for the specified application. • dscp value—DSCP value to be used for the specified application. Default No Network policy is defined. Command Mode Global Configuration mode User Guidelines Use the lldp med network-policy Interface Configuration command to attach a network policy to a port. Up to 32 network policies can be defined. Example console(config)# lldp med network-policy 1 voice-signaling vlan 1 lldp med network-policy (interface) Use the lldp med network-policy Interface Configuration (Ethernet) mode command to attach or remove an LLDP MED network policy on an interface. Use the no form of this command to remove all the LLDP MED network policies from the interface.LLDP Commands 437 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\LLDP.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Syntax lldp med network-policy {add | remove} number no lldp med network-policy number Parameters • number—Specifies the network policy sequential number. • add—Attaches the specified network policy to the interface. • remove—Removes the specified network policy from the interface. Default Configuration No network policy is attached to the interface. Command Mode Interface Configuration (Ethernet) mode User Guidelines For each port, only one network policy per application (voice, voice-signaling, etc.) can be defined. Example The following example attaches LLDP MED network policy 1 to gigabitethernet port 1/0/1. Console(config)# interface gi1/0/1 Console(config-if)# lldp med network-policy add 1 clear lldp table Use the clear lldp table command in Privileged EXEC mode to restart the LLDP RX state machine and clear the neighbors table. Syntax clear lldp table [interface-id]438 LLDP Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\LLDP.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Parameters interface-id—Specifies an interface ID. The interface ID must be an Ethernet port. Command Mode Privileged EXEC mode Example console# clear lldp table gi1/0/1 lldp med location Use the lldp med location Interface Configuration (Ethernet) mode command to configure the location information for the Link Layer Discovery Protocol (LLDP) Media Endpoint Discovery (MED) for an interface. Use the no form of this command to delete location information for an interface. Syntax lldp med location {{coordinate data} | {civic-address data} | {ecs-elin data}} no lldp med location {coordinate | civic-address | ecs-elin} Parameters • coordinate—Specifies the location data as coordinates. • civic-address—Specifies the location data as a civic address. • ecs-elin—Specifies the location data as an Emergency Call Service Emergency Location Identification Number (ECS ELIN). • data—Specifies the location data in the format defined in ANSI/TIA 1057: dotted hexadecimal data: Each byte in a hexadecimal character string is two hexadecimal digits. Bytes are separated by a period or colon. (Length: coordinate: 16 bytes. Civic-address: 6-160 bytes. Ecs-elin: 10-25 bytes) Default Configuration The location is not configured.LLDP Commands 439 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\LLDP.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Command Mode Interface Configuration (Ethernet) mode Example The following example configures the LLDP MED location information on gigabitethernet port 1/0/2 as a civic address. console(config)# interface gi1/0/2 console(config-if)# lldp med location civic-address 616263646566 show lldp configuration Use the show lldp configuration Privileged EXEC mode command to display the Link Layer Discovery Protocol (LLDP) configuration for all interfaces or for a specific interface. Syntax show lldp configuration [interface-id] Parameters interface-id—Specifies an interface ID. The interface ID must be an Ethernet port. Command Mode Privileged EXEC mode Example The following example sets the LLDP re-initialization delay to 10 seconds. Switch# show lldp configuration State: Enabled Timer: 30 Seconds Hold multiplier: 4 Reinit delay: 2 Seconds Tx delay: 2 Seconds Notifications interval: 5 seconds440 LLDP Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\LLDP.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY LLDP packets handling: Filtering Port State Optional TLVs Address Notifications ---- ----- -------------- ------- ------------ gi1/0/1 RX,TX PD, SN, SD, SC 172.16.1.1 Disabled gi1/0/2 TX PD, SN 172.16.1.1 Disabled gi1/0/3 RX,TX PD, SN, SD, SC None Disabled gi1/0/5 RX,TX D, SN, SD, SC automatic Disabled gi1/0/6 RX,TX PD, SN, SD, SC auto vlan 1 Disabled gi1/0/7 RX,TX PD, SN, SD, SC auto g1 Disabled gi1/0/8 RX,TX PD, SN, SD, SC auto ch1 Disabled Switch# show lldp configuration gi1/0/1 State: Enabled Timer: 30 Seconds Hold multiplier: 4 Reinit delay: 2 Seconds Tx delay: 2 Seconds Notifications interval: 5 seconds LLDP packets handling: Filtering Port State Optional TLVs Address Notifications -------------- -------------- ------------------------ gi1/0/1 RX, TX PD, SN, SD, SC 72.16.1.1 Disabled 802.3 optional TLVs: 802.3-mac-phy, 802.3-lag, 802.3-max-frame-size 802.1 optional TLVs PVID: Enabled PPVIDs: 0, 1, 92 VLANs: 1, 92 Protocols: 802.1xLLDP Commands 441 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\LLDP.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY The following table describes the significant fields shown in the display: show lldp med configuration Use the show lldp med configuration Privileged EXEC mode command to display the Link Layer Discovery Protocol (LLDP) Media Endpoint Discovery (MED) configuration for all interfaces or for a specific interface. Syntax show lldp med configuration [interface-id] Parameters interface-id—Specifies an interface ID. The interface ID must be an Ethernet port. Field Description Timer The time interval between LLDP updates. Hold multiplier The amount of time (as a multiple of the timer interval) that the receiving device holds a Link Layer Discovery Protocol (LLDP) packet before discarding it. Reinit timer The minimum time interval an LLDP port waits before reinitializing an LLDP transmission. Tx delay The delay between successive LLDP frame transmissions initiated by value/status changes in the LLDP local systems MIB. Port The port number. State The port’s LLDP state. Optional TLVs Optional TLVs that are advertised. Possible values are: PD - Port description SN - System name SD - System description SC - System capabilities Address The management address that is advertised. Notifications Indicates whether LLDP notifications are enabled or disabled.442 LLDP Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\LLDP.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Command Mode Privileged EXEC mode Example The following examples display the LLDP MED configuration for all interfaces and for gigabitethernet port 1/0/1. console# show lldp med configuration Fast Start Repeat Count: 4. Network policy 1 ------------------- Application type: voiceSignaling VLAN ID: 1 untagged Layer 2 priority: 0 DSCP: 0 Port Capabilities Network Location Notifications Inventory policy ------ ----------- ---------- ---------- ------------ -------- gi1/0/1 Yes Yes Yes Enabled Yes gi1/0/2 Yes Yes No Enabled No gi1/0/3 No No No Enabled No console# show lldp med configuration gi1/0/1 Port Capabilities Network policy Location Notifications Inventory ------------------- -------------- -------- ---------- -------- gi1/0/1 Yes Yes Yes Enabled Yes Network policies: Location: Civic-address: 61:62:63:64:65:66LLDP Commands 443 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\LLDP.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY show lldp local tlvs-overloading Use the show lldp local tlvs-overloading EXEC mode command to display the status of TLVs overloading of the Link Layer Discovery Protocol (LLDP). Syntax show lldp local tlvs-overloading [interface-id] Parameters interface-id—Specifies an interface ID. The interface ID must be an Ethernet port. Command Mode EXEC mode User Guidelines The command calculates the overloading status of the current LLDP configuration, and not for the last LLDP packet that was sent. Example Switch# show lldp local tlvs-overloading Ports with LLDP TLV overloading are: gi1/0/1, gi1/0/9 Switch# show lldp local tlvs-overloading No LLDP TLV overloading. Switch# show lldp local tlvs-overloading gi1/0/1 TLVs Group Bytes Status ------------ ------ -------------- Mandatory 31 Transmitted LLDP-MED Capabilities 9 Transmitted LLDP-MED Location 200 Transmitted 802.1 1360 Overloading Total: 1600 bytes Left: 100 bytes444 LLDP Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\LLDP.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY show lldp local Use the show lldp local Privileged EXEC mode command to display the Link Layer Discovery Protocol (LLDP) information that is advertised from a specific port. Syntax show lldp local interface-id Parameters Interface-id—Specifies an interface ID. The interface ID must be an Ethernet port. Command Mode Privileged EXEC mode Example The following examples display LLDP information that is advertised from gigabitethernet ports 1/0/1 and 1/0/2. Switch# show lldp local gi1/0/1 Device ID: 0060.704C.73FF Port ID: gi1/0/1 Capabilities: Bridge System Name: ts-7800-1 System description: Port description: Management address: 172.16.1.8 802.3 MAC/PHY Configuration/Status Auto-negotiation support: Supported Auto-negotiation status: Enabled Auto-negotiation Advertised Capabilities: 100BASE-TX full duplex, 1000BASE-T full duplex Operational MAU type: 1000BaseTFD 802.3 Link Aggregation Aggregation capability: Capable of being aggregated Aggregation status: Not currently in aggregationLLDP Commands 445 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\LLDP.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Aggregation port ID: 1 802.3 Maximum Frame Size: 1522 802.3 EEE Local Tx: 30 usec Local Rx: 25 usec Remote Tx Echo: 30 usec Remote Rx Echo: 25 usec 802.1 PVID: 1 802.1 PPVID: 2 supported, enabled 802.1 VLAN: 2 (VLAN2) 802.1 Protocol: 88 8E 01 LLDP-MED capabilities: Network Policy, Location Identification LLDP-MED Device type: Network Connectivity LLDP-MED Network policy Application type: Voice Flags: Tagged VLAN VLAN ID: 2 Layer 2 priority: 0 DSCP: 0 LLDP-MED Power over Ethernet Device Type: Power Sourcing Entity Power source: Primary Power Source Power priority: High Power value: 9.6 Watts LLDP-MED Location Coordinates: 54:53:c1:f7:51:57:50:ba:5b:97:27:80:00:00:67:01 LLDP-MED Inventory Hardware Revision: B1 Firmware Revision: A1446 LLDP Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\LLDP.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Software Revision: 3.8 Serial number: 7978399 Manufacturer name: Manufacturer Model name: Model 1 Asset ID: Asset 123 Switch# show lldp local gi1/0/2 LLDP is disabled. show lldp neighbors Use the show lldp neighbors Privileged EXEC mode command to display information about neighboring devices discovered using Link Layer Discovery Protocol (LLDP). The information can be displayed for all interfaces or for a specific interface. Syntax show lldp neighbors [interface-id] Parameters interface-id—Specifies an interface ID. The interface ID must be an Ethernet port. Command Mode Privileged EXEC mode User Guidelines There are no guidelines for this command. A TLV value that cannot be displayed as an ASCII string is displayed as an hexadecimal string. Example The following examples display information about neighboring devices discovered using LLDP. Location information, if it exists, is also displayed.LLDP Commands 447 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\LLDP.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Switch# show lldp neighbors Port Device ID Port ID System Name Capabilities TTL ----- ------------------ -------- ---------- ----------- ---- gi1/0/1 00:00:00:11:11:11 gi1/0/1 ts-7800-2 B 90 gi1/0/1 00:00:00:11:11:11 D gi1/0/1 ts-7800-2 B 90 gi1/0/2 00:00:26:08:13:24 gi1/0/3 ts-7900-1 B, R 90 gi1/0/3 00:00:26:08:13:24 gi1/0/2 ts-7900-2 W 90 Switch# show lldp neighbors gi1/0/1 Device ID: 00:00:00:11:11:11 Port ID: gi1/0/ System Name: ts-7800-2 Capabilities: B System description: Port description: Management address: 172.16.1.1 Time To Live: 90 seconds 802.3 MAC/PHY Configuration/Status Auto-negotiation support: Supported. Auto-negotiation status: Enabled. Auto-negotiation Advertised Capabilities: 100BASE-TX full duplex, 1000BASE-T full duplex. Operational MAU type: 1000BaseTFD 802.3 Power via MDI MDI Power support Port Class: PD PSE MDI Power Support: Not Supported PSE MDI Power State: Not Enabled PSE power pair control ability: Not supported. PSE Power Pair: Signal PSE Power class: 1 802.3 Link Aggregation448 LLDP Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\LLDP.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Aggregation capability: Capable of being aggregated Aggregation status: Not currently in aggregation Aggregation port ID: 1 802.3 Maximum Frame Size: 1522 802.3 EEE Remote Tx: 25 usec Remote Rx: 30 usec Local Tx Echo: 30 usec Local Rx Echo: 25 usec 802.1 PVID: 1 802.1 PPVID: 2 supported, enabled 802.1 VLAN: 2(VLAN2) 802.1 Protocol: 88 8E 01 LLDP-MED capabilities: Network Policy. LLDP-MED Device type: Endpoint class 2. LLDP-MED Network policy Application type: Voice Flags: Unknown policy VLAN ID: 0 Layer 2 priority: 0 DSCP: 0 LLDP-MED Power over Ethernet Device Type: Power Device Power source: Primary power Power priority: High Power value: 9.6 Watts LLDP-MED Inventory Hardware revision: 2.1 Firmware revision: 2.3LLDP Commands 449 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\LLDP.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Software revision: 2.7.1 Serial number: LM759846587 Manufacturer name: VP Model name: TR12 Asset ID: 9 LLDP-MED Location Coordinates: 54:53:c1:f7:51:57:50:ba:5b:97:27:80:00:00:67:01 The following table describes significant LLDP fields shown in the display: Field Description Port The port number. Device ID The neighbor device’s configured ID (name) or MAC address. Port ID The neighbor device’s port ID. System name The neighbor device’s administratively assigned name. Capabilities The capabilities discovered on the neighbor device. Possible values are: B - Bridge R - Router W - WLAN Access Point T - Telephone D - DOCSIS cable device H - Host r - Repeater O - Other System description The neighbor device’s system description. Port description The neighbor device’s port description. Management address The neighbor device’s management address. Auto-negotiation support The auto-negotiation support status on the port. (Supported or Not Supported) Auto-negotiation status The active status of auto-negotiation on the port. (Enabled or Disabled)450 LLDP Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\LLDP.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Auto-negotiation Advertised Capabilities The port speed/duplex/flow-control capabilities advertised by the auto-negotiation. Operational MAU type The port MAU type. LLDP MED Capabilities The sender's LLDP-MED capabilities. Device type The device type. Indicates whether the sender is a Network Connectivity Device or Endpoint Device, and if an Endpoint, to which Endpoint Class it belongs. LLDP MED - Network Policy Application type The primary function of the application defined for this network policy. Flags Flags. The possible values are: Unknown policy: Policy is required by the device, but is currently unknown. Tagged VLAN: The specified application type is using a Tagged VLAN. Untagged VLAN: The specified application type is using an Untagged VLAN. VLAN ID The VLAN identifier for the application. Layer 2 priority The Layer 2 priority used for the specified application. DSCP The DSCP value used for the specified application. LLDP MED - Power Over Ethernet Power type The device power type. The possible values are: Power Sourcing Entity (PSE) or Power Device (PD). Power Source The power source utilized by a PSE or PD device. A PSE device advertises its power capability. The possible values are: Primary power source and Backup power source. A PD device advertises its power source. The possible values are: Primary power, Local power, Primary and Local power. Power priority The PD device priority. A PSE device advertises the power priority configured for the port. A PD device advertises the power priority configured for the device. The possible values are: Critical, High and Low.LLDP Commands 451 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\LLDP.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY show lldp statistics Use the show lldp statistics EXEC mode command to display the Link Layer Discovery Protocol (LLDP) statistics. Syntax show lldp statistics [interface-id] Parameters interface-id—Specifies an interface ID. The interface ID must be an Ethernet port. Command Mode EXEC mode Example Switch# show lldp statistics Contax(config-if)# do show lldp statistics Tables Last Change Time: 14-Oct-2010 32:08:18 Tables Inserts: 26 Tables Deletes: 2 Tables Dropped: 0 Tables Ageouts: 1 Power value The total power in watts required by a PD device from a PSE device, or the total power a PSE device is capable of sourcing over a maximum length cable based on its current configuration. LLDP MED - Location Coordinates, Civic address, ECS ELIN. The location information raw data.452 LLDP Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\LLDP.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY TX Frames RX Frames RX TLVs RX Ageouts Port Total Total Discarded Errors Discarded Unrecognized Total --------- --------- --------- --------- ------ --------- ------------ ------------------ ----------- gi1/0/1 730 850 0 0 0 0 0 gi1/0/2 0 0 0 0 0 0 0 gi1/0/3 730 0 0 0 0 0 0 gi1/0/4 0 0 0 0 0 0 0 gi1/0/5 0 0 0 0 0 0 0 gi1/0/6 8 7 0 0 0 0 1 gi1/0//7 0 0 0 0 0 0 0 gi1/0/8 0 0 0 0 0 0 0 gi1/0/9 730 0 0 0 0 0 0 gi1/0/10 0 0 0 0 0 0 0Spanning-Tree Commands 453 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Spanning-Tree.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY 30 Spanning-Tree Commands spanning-tree Use the spanning-tree Global Configuration mode command to enable spanning-tree functionality. Use the no form of this command to disable the spanning-tree functionality. Syntax spanning-tree no spanning-tree Default Configuration Spanning-tree is enabled. Command Mode Global Configuration mode Example The following example enables spanning-tree functionality. Console(config)# spanning-tree spanning-tree mode Use the spanning-tree mode Global Configuration mode command to configure the spanning-tree protocol currently running. Use the no form of this command to restore the default configuration.454 Spanning-Tree Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Spanning-Tree.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Syntax spanning-tree mode {stp | rstp | mst} no spanning-tree mode Parameters • stp—Specifies that the Spanning Tree Protocol (STP) is enabled. • rstp—Specifies that the Rapid Spanning Tree Protocol (RSTP) is enabled. • mst—Specifies that the Multiple Spanning Tree Protocol (MSTP) is enabled. Default Configuration The default is RSTP. Command Mode Global Configuration mode User Guidelines In RSTP mode, the device uses STP when the neighbor device uses STP. In MSTP mode, the device uses RSTP when the neighbor device uses RSTP, and uses STP when the neighbor device uses STP. Example The following example configures the spanning-tree protocol as RSTP. console(config)# spanning-tree mode mstp spanning-tree forward-time Use the spanning-tree forward-time Global Configuration mode command to configure the spanning-tree bridge forward time, which is the amount of time a port remains in the listening and learning states before entering the forwarding state. Use the no form of this command to restore the default configuration.Spanning-Tree Commands 455 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Spanning-Tree.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Syntax spanning-tree forward-time seconds no spanning-tree forward-time Parameters seconds—Specifies the spanning-tree forward time in seconds. (Range: 4–30) Default Configuration The default forwarding time for the IEEE Spanning Tree Protocol (STP) is 15 seconds. Command Mode Global Configuration mode User Guidelines When configuring the forwarding time, the following relationship should be maintained: 2*(Forward-Time - 1) >= Max-Age Example The following example configures the spanning tree bridge forwarding time to 25 seconds. Console(config)# spanning-tree forward-time 25 spanning-tree hello-time Use the spanning-tree hello-time Global Configuration mode command to configure the spanning tree bridge Hello time, which is how often the device broadcasts Hello messages to other devices. Use the no form of this command to restore the default configuration. Syntax spanning-tree hello-time seconds no spanning-tree hello-time456 Spanning-Tree Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Spanning-Tree.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Parameters seconds—Specifies the spanning-tree Hello time in seconds. (Range: 1–10) Default Configuration The default Hello time for IEEE Spanning Tree Protocol (STP) is 2 seconds. Command Mode Global Configuration mode User Guidelines When configuring the Hello time, the following relationship should be maintained: Max-Age >= 2*(Hello-Time + 1) Example The following example configures the spanning-tree bridge hello time to 5 seconds. Console(config)# spanning-tree hello-time 5 spanning-tree max-age Use the spanning-tree max-age Global Configuration mode command to configure the spanning-tree bridge maximum age. Use the no form of this command to restore the default configuration. Syntax spanning-tree max-age seconds no spanning-tree max-age Parameters seconds—Specifies the spanning-tree bridge maximum age in seconds. (Range: 6–40)Spanning-Tree Commands 457 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Spanning-Tree.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Default Configuration The default maximum age for IEEE Spanning Tree Protocol (STP) is 20 seconds. Command Mode Global Configuration mode User Guidelines When configuring the maximum age, the following relationships should be maintained: 2*(Forward-Time - 1) >= Max-Age Max-Age >= 2*(Hello-Time + 1) Example The following example configures the spanning-tree bridge maximum age to 10 seconds. Console(config)# spanning-tree max-age 10 spanning-tree priority Use the spanning-tree priority Global Configuration mode command to configure the device spanning-tree priority, which is used to determine which bridge is selected as the root bridge. Use the no form of this command to restore the default device spanning-tree priority. Syntax spanning-tree priority priority no spanning-tree priority Parameters priority—Specifies the bridge priority. (Range: 0–61440) Default Configuration The default bridge priority for IEEE Spanning Tree Protocol (STP) is 32768.458 Spanning-Tree Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Spanning-Tree.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Command Mode Global Configuration mode User Guidelines The priority value must be a multiple of 4096. The switch with the lowest priority is the root of the spanning tree. Example The following example configures the spanning-tree priority to 12288. Console(config)# spanning-tree priority 12288 spanning-tree disable Use the spanning-tree disable Interface Configuration (Ethernet, portchannel) mode command to disable the spanning tree on a specific port. Use the no form of this command to enable the spanning tree on a port. Syntax spanning-tree disable no spanning-tree disable Default Configuration Spanning tree is enabled on all ports. Command Mode Interface Configuration (Ethernet, port-channel) mode Example The following example disables the spanning tree on gigabitethernet port 1/0/5 Console(config)# interface gi1/0/5 Console(config-if)# spanning-tree disableSpanning-Tree Commands 459 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Spanning-Tree.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY spanning-tree cost Use the spanning-tree cost Interface Configuration (Ethernet, port-channel) mode command to configure the spanning-tree path cost for a port. Use the no form of this command to restore the default configuration. Syntax spanning-tree cost cost no spanning-tree cost Parameters cost—Specifies the port path cost. (Range: 1–200000000) Default Configuration Default path cost is determined by port speed and path cost method (long or short) as shown below: Command Mode Interface Configuration (Ethernet, port-channel) mode Example The following example configures the spanning-tree cost on gigabitethernet port 1/0/15 to 35000. Console(config)# interface gi1/0/15 Console(config-if)# spanning-tree cost 35000 Interface Long Short Port-channel 20,000 4 TenGigabit Ethernet (10000 Mbps) 2000 2 Gigabit Ethernet (1000 Mbps) 20,000 4 Fast Ethernet (100 Mbps) 200,000 19 Ethernet (10 Mbps) 2,000,000 100460 Spanning-Tree Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Spanning-Tree.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY spanning-tree port-priority Use the spanning-tree port-priority Interface Configuration (Ethernet, portchannel) mode command to configure the port priority. Use the no form of this command to restore the default configuration. Syntax spanning-tree port-priority priority no spanning-tree port-priority Parameters priority—Specifies the port priority. (Range: 0–240) Default Configuration The default port priority for IEEE Spanning Tree Protocol (STP) is 128. Command Mode Interface Configuration (Ethernet, port-channel) mode User Guidelines The priority value must be a multiple of 16. Example The following example configures the spanning priority on gigabitethernet port 1/0/15 to 96 Console(config)# interface gi1/0/15 Console(config-if)# spanning-tree port-priority 96 spanning-tree portfast Use the spanning-tree portfast Interface Configuration (Ethernet, portchannel) mode command to enable the PortFast mode. In PortFast mode, the interface is immediately put into the forwarding state upon linkup, without waiting for the standard forward time delay. Use the no form of this command to disable the PortFast mode.Spanning-Tree Commands 461 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Spanning-Tree.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Syntax spanning-tree portfast [auto] no spanning-tree portfast Parameters auto—Specifies that the software waits for 3 seconds (with no BPDUs received on the interface) before putting the interface into the PortFast mode. Default Configuration PortFast mode is disabled. Command Mode Interface Configuration (Ethernet, port-channel) mode Example The following example enables the PortFast mode on gigabitethernet port 1/0/15. Console(config)# interface gi1/0/15 Console(config-if)# spanning-tree portfast spanning-tree link-type Use the spanning-tree link-type Interface Configuration (Ethernet, portchannel) mode command to override the default link-type setting determined by the port duplex mode, and enable Rapid Spanning Tree Protocol (RSTP) transitions to the forwarding state. Use the no form of this command to restore the default configuration. Syntax spanning-tree link-type {point-to-point | shared} no spanning-tree spanning-tree link-type Parameters • point-to-point—Specifies that the port link type is point-to-point.462 Spanning-Tree Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Spanning-Tree.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY • shared—Specifies that the port link type is shared. Default Configuration The device derives the port link type from the duplex mode. A full-duplex port is considered a point-to-point link and a half-duplex port is considered a shared link. Command Mode Interface Configuration (Ethernet, port-channel) mode Example The following example enables shared spanning-tree on gigabitethernet port 1/0/15. Console(config)# interface gi1/0/15 Console(config-if)# spanning-tree link-type shared spanning-tree pathcost method Use the spanning-tree pathcost method Global Configuration mode command to set the default path cost method. Use the no form of this command to return to the default configuration. Syntax spanning-tree pathcost method {long | short} no spanning-tree pathcost method Parameters • long—Specifies that the default port path costs are within the range: 1–200,000,000. • short—Specifies that the default port path costs are within the range: 1–65,535. Default Configuration Short path cost method.Spanning-Tree Commands 463 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Spanning-Tree.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Command Mode Global Configuration mode User Guidelines This command applies to all the spanning tree instances on the switch. • If the short method is chosen, the switch use for the default cost values in the range 1 through 65,535. • If the long method is chosen, the switch use for the default cost values in the range 1 through 200,000,000. Example The following example sets the default path cost method to Long. Console(config)# spanning-tree pathcost method long spanning-tree bpdu (Global) Use the spanning-tree bpdu Global Configuration mode command to define BPDU handling when the spanning tree is disabled globally or on a single interface. Use the no form of this command to restore the default configuration. Syntax spanning-tree bpdu {filtering | flooding} no spanning-tree bpdu Parameters • filtering—Specifies that BPDU packets are filtered when the spanning tree is disabled on an interface. • flooding—Specifies that untagged BPDU packets are flooded unconditionally (without applying VLAN rules) to all ports with the spanning tree disabled and BPDU handling mode of flooding. Tagged BPDU packets are filtered.464 Spanning-Tree Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Spanning-Tree.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Default Configuration The default setting is flooding. Command Mode Global Configuration mode User Guidelines The filtering and flooding modes are relevant when the spanning tree is disabled globally or on a single interface. Example The following example defines the BPDU packet handling mode as flooding when the spanning tree is disabled on an interface. Console(config)# spanning-tree bpdu flooding spanning-tree bpdu (Interface) Use the spanning-tree bpdu Interface Configuration (Ethernet, Portchannel) mode command to define BPDU handling when the spanning tree is disabled on a single interface. Use the no form of this command to restore the default configuration. Syntax spanning-tree bpdu {filtering | flooding} no spanning-tree bpdu Parameters • filtering—Specifies that BPDU packets are filtered when the spanning tree is disabled on an interface. • flooding—Specifies that untagged BPDU packets are flooded unconditionally (without applying VLAN rules) to ports with the spanning tree disabled and BPDU handling mode of flooding. Tagged BPDU packets are filtered.Spanning-Tree Commands 465 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Spanning-Tree.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Default Configuration The spanning-tree bpdu (Global) command determines the default configuration. Command Mode Interface Configuration (Ethernet, Port-channel) mode Example The following example defines the BPDU packet as flooding when the spanning tree is disabled on gigabitethernet port 1/0/3. Console(config)# interface gi1/0/3 Console(config-if)# spanning-tree bpdu flooding spanning-tree guard root Use the spanning-tree guard root Interface Configuration (Ethernet, Portchannel) mode command to enable root guard on all spanning-tree instances on the interface. Root guard prevents the interface from becoming the root port of the device. Use the no form of this command to disable the root guard on the interface. Syntax spanning-tree guard root no spanning-tree guard root Default Configuration Root guard is disabled. Command Mode Interface Configuration (Ethernet, Port-channel) mode User Guidelines Root guard can be enabled when the device operates in STP, RSTP and MSTP modes.466 Spanning-Tree Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Spanning-Tree.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY When root guard is enabled, the port changes to the alternate state if the spanning-tree calculations select the port as the root port. Example The following example prevents gigabitethernet port 1/0/1 from being the root port of the device. Console(config)# interface gi1/0/1 Console(config-if)# spanning-tree guard root spanning-tree bpduguard Use the spanning-tree bpduguard Interface Configuration (Ethernet, portchannel) mode command to shut down an interface when it receives a bridge protocol data unit (BPDU). Use the no form of this command to restore the default configuration. Syntax spanning-tree bpduguard {enable | disable} no spanning-tree bpduguard Parameters enable—Enables BPDU Guard. disable—Disables BPDU Guard. Default Configuration BPDU Guard is disabled. Command Mode Interface Configuration (Ethernet, Port-channel) mode User Guidelines The command can be enabled when the spanning tree is enabled (useful when the port is in the PortFast mode) or disabled.Spanning-Tree Commands 467 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Spanning-Tree.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example The following example shuts down Ethernet port 1/0/5 when it receives a BPDU. Console(config)# interface gi1/0/5 Console(config-if)# spanning-tree bpduguard enable clear spanning-tree detected-protocols Use the clear spanning-tree detected-protocols Privileged EXEC command to restart the protocol migration process (force the renegotiation with neighboring switches) on all interfaces or on the specified interface Syntax clear spanning-tree detected-protocols [interface interface-id] Parameters interface-id—Specifies an interface ID. The interface ID can be one of the following types: Ethernet port or Port-channel. Command Mode Privileged EXEC mode User Guidelines This feature should be used only when working in RSTP or MSTP mode. Example console# clear spanning-tree detected-protocols spanning-tree mst priority Use the spanning-tree mst priority Global Configuration mode command to configure the device priority for the specified spanning-tree instance. Use the no form of this command to restore the default configuration.468 Spanning-Tree Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Spanning-Tree.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Syntax spanning-tree mst instance-id priority priority no spanning-tree mst instance-id priority Parameters • instance-id—Specifies the spanning-tree instance ID. (Range:1–15) • priority—Specifies the device priority for the specified spanning-tree instance. This setting affects the likelihood that the switch is selected as the root switch. A lower value increases the probability that the switch is selected as the root switch. (Range: 0–61440) Default Configuration The default bridge priority for IEEE Spanning Tree Protocol (STP) is 32768. Command Mode Global Configuration mode User Guidelines The priority value must be a multiple of 4096. The switch with the lowest priority is the root of the spanning tree. Example The following example configures the spanning tree priority of instance 1 to 4096. Console(config)# spanning-tree mst 1 priority 4096 spanning-tree mst max-hops Use the spanning-tree mst max-hops Global Configuration mode command to configure the number of hops in an MST region before the BDPU is discarded and the port information is aged out. Use the no form of this command to restore the default configuration. Syntax spanning-tree mst max-hops hop-countSpanning-Tree Commands 469 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Spanning-Tree.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY no spanning-tree mst max-hops Parameters hop-count—Specifies the number of hops in an MST region before the BDPU is discarded. (Range: 1–40) Default Configuration The default number of hops is 20. Command Mode Global Configuration mode Example The following example configures the maximum number of hops that a packet travels in an MST region before it is discarded to 10. Console(config)# spanning-tree mst max-hops 10 spanning-tree mst port-priority Use the spanning-tree mst port-priority Interface Configuration (Ethernet, port-channel) mode command to configure the priority of a port. Use the no form of this command to restore the default configuration. Syntax spanning-tree mst instance-id port-priority priority no spanning-tree mst instance-id port-priority Parameters • instance-id—Specifies the spanning tree instance ID. (Range: 1–15) • priority—Specifies the port priority. (Range: 0–240 in multiples of 16) Default Configuration The default port priority for IEEE Spanning Tree Protocol (STP) is 128.470 Spanning-Tree Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Spanning-Tree.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Command Mode Interface Configuration (Ethernet, port-channel) mode User Guidelines The priority value must be a multiple of 16. Example The following example configures the port priority of port gi1/0/1 to 144. Console(config)# interface gi1/0/1 Console(config-if)# spanning-tree mst 1 port-priority 144 spanning-tree mst cost Use the spanning-tree mst cost Interface Configuration (Ethernet, Portchannel) mode command to configure the path cost for multiple spanningtree (MST) calculations. If a loop occurs, the spanning tree considers path cost when selecting an interface to put in the forwarding state. Use the no form of this command to restore the default configuration. Syntax spanning-tree mst instance-id cost cost no spanning-tree mst instance-id cost Parameters • instance-id—Specifies the spanning-tree instance ID. (Range: 1–15) • cost—Specifies the port path cost. (Range: 1–200000000) Default Configuration Default path cost is determined by the port speed and path cost method (long or short) as shown below: Interface Long Short Port-channel 20,000 4 TenGigabit Ethernet (10000 Mbps) 2000 2Spanning-Tree Commands 471 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Spanning-Tree.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Command Mode Interface Configuration (Ethernet, port-channel) mode Example The following example configures the MSTP instance 1 path cost for gigabitethernet port 1/0/9 to 4. Console(config)# interface gi1/0/9 Console(config-if)# spanning-tree mst 1 cost 4 spanning-tree mst configuration Use the spanning-tree mst configuration Global Configuration mode command to enable configuring an MST region by entering the Multiple Spanning Tree (MST) mode. Syntax spanning-tree mst configuration Command Mode Global Configuration mode User Guidelines For two or more switches to be in the same MST region, they need to contain the same VLAN mapping, the same configuration revision number, and the same name. Example The following example configures an MST region. Console(config)# spanning-tree mst configuration Console(config-mst)# instance 1 vlan 10-20 Gigabit Ethernet (1000 Mbps) 20,000 4 Fast Ethernet (100 Mbps) 200,000 19 Ethernet (10 Mbps) 2,000,000 100472 Spanning-Tree Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Spanning-Tree.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Console(config-mst)# name region1 Console(config-mst)# revision 1 instance (MST) Use instance MST Configuration mode command to map VLANs to an MST instance. Use the no form of this command to restore default mapping. Syntax instance instance-id vlan vlan-range no instance instance-id vlan vlan-range Parameters • instance-id—MST instance (Range: 1–15) • vlan-range—The specified range of VLANs is added to the existing ones. To specify a range, use a hyphen. To specify a series, use a comma. (Range: 1–4094) Default Configuration All VLANs are mapped to the common and internal spanning tree (CIST) instance (instance 0). Command Mode MST Configuration mode User Guidelines All VLANs that are not explicitly mapped to an MST instance are mapped to the common and internal spanning tree (CIST) instance (instance 0) and cannot be unmapped from the CIST. For two or more devices to be in the same MST region, they must have the same VLAN mapping, the same configuration revision number, and the same name.Spanning-Tree Commands 473 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Spanning-Tree.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example The following example maps VLANs 10-20 to MST instance 1. Console(config)# spanning-tree mst configuration Console(config-mst)# instance 1 vlan 10-20 name (MST) Use the name MST Configuration mode command to define the MST configuration name. Use the no form of this command to restore the default setting. Syntax name string no name Parameters string—Specifies the MST configuration name. (Length: 1–32 characters) Default Configuration The default name is the bridge address. Command Mode MST Configuration mode Example The following example defines the configuration name as Region1. Console(config)# spanning-tree mst configuration Console(config-mst)# name region1 revision (MST) Use the revision MST Configuration mode command to define the MST configuration revision number. Use the no form of this command to restore the default configuration.474 Spanning-Tree Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Spanning-Tree.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Syntax revision value no revision Parameters value—Specifies the MST configuration revision number. (Range: 0–65535) Default Configuration The default configuration revision number is 0. Command Mode MST Configuration mode Example The following example sets the configuration revision to 1. Console(config) # spanning-tree mst configuration Console(config-mst) # revision 1 show (MST) Use the show MST Configuration mode command to displays the current or pending MST region configuration. Syntax show {current | pending} Parameters • current—Displays the current MST region configuration. • pending—Displays the pending MST region configuration. Command Mode MST Configuration modeSpanning-Tree Commands 475 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Spanning-Tree.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example The following example displays a pending MST region configuration. exit (MST) Use the exit MST Configuration mode command to exit the MST region Configuration mode and appy all configuration changes. Syntax exit Command Mode MST Configuration mode Example The following example exits the MST Configuration mode and saves changes. Console(config)# spanning-tree mst configuration Console(config-mst)# exit Console(config)# Console(config-mst)# show pending Pending MST configuration Name: Region1 Revision: 1 Instance -------- 0 1 Vlans Mapped ------------ 1-9,21-4094 10-20 State ------- Enabled Enabled476 Spanning-Tree Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Spanning-Tree.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY abort (MST) Use the abort MST Configuration mode command to exit the MST Configuration mode without applying the configuration changes. Syntax abort Command Mode MST Configuration mode Example The following example exits the MST Configuration mode without saving changes. Console(config)# spanning-tree mst configuration Console(config-mst)# abort show spanning-tree Use the show spanning-tree Privileged EXEC mode command to display the spanning-tree configuration. Syntax show spanning-tree [interface-id] [instance instance-id] show spanning-tree [detail] [active | blockedports] [instance instance-id] show spanning-tree mst-configuration Parameters • instance instance-id—Specifies the spanning tree instance ID. (Range: 0–15) • detail—Displays detailed information. • active—Displays active ports only. • blockedports—Displays blocked ports only.Spanning-Tree Commands 477 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Spanning-Tree.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY • mst-configuration—Displays the MST configuration identifier. • interface-id—Specifies an interface ID. The interface ID can be one of the following types: Ethernet port or Port-channel. Command Mode Privileged EXEC mode Example The following examples display spanning-tree information. Console# show spanning-tree Spanning tree enabled mode RSTP Default port cost method: long Loopback guard: Disabled Root ID Priority Address Path Cost Root Port 32768 00:01:42:97:e0:00 20000 gi1/0/1 Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec Bridge ID Priority Address 36864 00:02:4b:29:7a:00 Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec478 Spanning-Tree Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Spanning-Tree.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Interfaces Name --------- gi1/0/1 gi1/0/2 gi1/0/3 gi1/0/4 gi1/0/5 State ------ Enabled Enabled Disabled Enabled Enabled Prio. Nbr ------ 128.1 128.2 128.3 128.4 128.5 Cost ----- 20000 20000 20000 20000 20000 Sts --- FWD FWD - BLK DIS Role ---- Root Desg - Altn - PortFast --------- No No - No - Type ---------- P2p (RSTP) Shared (STP) - Shared (STP) - Console# show spanning-tree Spanning tree enabled mode RSTP Default port cost method: long Root ID Priority Address 36864 00:02:4b:29:7a:00 This switch is the Root. Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec InterfacesSpanning-Tree Commands 479 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Spanning-Tree.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Name -------- gi1/0/1 gi1/0/2 gi1/0/3 gi1/0/4 gi1/0/5 State -------- Enabled Enabled Disabled Enabled Enabled Prio.Nbr -------- 128.1 128.2 128.3 128.4 128.5 Cost ----- 20000 20000 20000 20000 20000 Sts --- FWD FWD - FWD DIS Role ---- Desg Desg - Desg - PortFast --------- No No - No - Type ---------- P2p (RSTP) Shared (STP) - Shared (STP) - Console# show spanning-tree Spanning tree disabled (BPDU filtering) mode RSTP Default port cost method: long Root ID Priority Address Path Cost Root Port Hello Time N/A N/A N/A N/A N/A Max Age N/A Forward Delay N/A Bridge ID Priority Address 36864 00:02:4b:29:7a:00 Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec Interfaces480 Spanning-Tree Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Spanning-Tree.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Name --------- gi1/0/1 gi1/0/2 gi1/0/3 gi1/0/4 gi1/0/5 State -------- Enabled Enabled Disabled Enabled Enabled Prio.Nbr ------- 128.1 128.2 128.3 128.4 128.5 Cost ----- 20000 20000 20000 20000 20000 Sts --- - - - - - Role ---- - - - - - PortFast --------- - - - - - Type ----- - - - - - Console# show spanning-tree active Spanning tree enabled mode RSTP Default port cost method: long Root ID Priority Address Path Cost Root Port 32768 00:01:42:97:e0:00 20000 gi1/0/1 Hello Time 2 sec Max Age 20 secForward Delay 15 sec Bridge ID Priority Address 36864 00:02:4b:29:7a:00 Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec InterfacesSpanning-Tree Commands 481 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Spanning-Tree.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Name --------- gi1/0/1 gi1/0/2 gi1/0/4 State -------- - Enabled Enabled Enabled Prio.Nbr -------- - 128.1 128.2 128.4 Cost ----- 20000 20000 20000 Sts --- FWD FWD BLK Role ---- Root Desg Altn PortFast --------- No No No Type ---------- P2p (RSTP) Shared (STP) Shared (STP) Console# show spanning-tree blockedports Spanning tree enabled mode RSTP Default port cost method: long Root ID Priority Address Path Cost Root Port 32768 00:01:42:97:e0:00 20000 gi1/0/1 Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec Bridge ID Priority 36864 Address 00:02:4b:29:7a:00 Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec Interfaces482 Spanning-Tree Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Spanning-Tree.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Name --------- gi1/0/4 State -------- - Enabled Prio.Nbr -------- - 128.4 Cost ----- 19 Sts --- BLK Role ---- Altn PortFast --------- No Type ---------- Shared (STP) Console# show spanning-tree detail Spanning tree enabled mode RSTP Default port cost method: long Root ID Priority Address Path Cost Root Port 32768 00:01:42:97:e0:00 20000 gi1/0/1 Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec Bridge ID Priority Address 36864 00:02:4b:29:7a:00 Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec Number of topology changes 2 last change occurred 2d18h ago Times: hold 1, topology change 35, notification 2 hello 2, max age 20, forward delay 15 Port 1 (gi1/0/1) enabled State: Forwarding Port id: 128.1 Type: P2p (configured: auto) RSTP Designated bridge Priority: 32768 Designated port id: 128.25 Guard root: Disabled Role: Root Port cost: 20000 Port Fast: No (configured:no) Address: 00:01:42:97:e0:00 Designated path cost: 0 BPDU guard: Disabled Number of transitions to forwarding state: 1 BPDU: sent 2, received 120638Spanning-Tree Commands 483 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Spanning-Tree.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Port 2 (gi1/0/2) enabled State: Forwarding Port id: 128.2 Type: Shared (configured: auto) STP Designated bridge Priority: 32768 Designated port id: 128.2 Guard root: Disabled Role: Designated Port cost: 20000 Port Fast: No (configured:no) Address: 00:02:4b:29:7a:00 Designated path cost: 20000 BPDU guard: Disabled Number of transitions to forwarding state: 1 BPDU: sent 2, received 170638 Port 3 (gi1/0/3) disabled State: N/A Port id: 128.3 Type: N/A (configured: auto) Designated bridge Priority: N/A Designated port id: N/A Guard root: Disabled Role: N/A Port cost: 20000 Port Fast: N/A (configured:no) Address: N/A Designated path cost: N/A BPDU guard: Disabled Number of transitions to forwarding state: N/A BPDU: sent N/A, received N/A Port 4 (gi1/0/4) enabled State: Blocking Port id: 128.4 Type: Shared (configured:auto) STP Designated bridge Priority: 28672 Designated port id: 128.25 Guard root: Disabled Role: Alternate Port cost: 20000 Port Fast: No (configured:no) Address: 00:30:94:41:62:c8 Designated path cost: 20000 BPDU guard: Disabled Number of transitions to forwarding state: 1 BPDU: sent 2, received 120638 Port 5 (gi1/0/5) enabled State: Disabled Port id: 128.5 Type: N/A (configured: auto) Designated bridge Priority: N/A Designated port id: N/A Guard root: Disabled Role: N/A Port cost: 20000 Port Fast: N/A (configured:no) Address: N/A Designated path cost: N/A BPDU guard: Disabled484 Spanning-Tree Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Spanning-Tree.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Number of transitions to forwarding state: N/A BPDU: sent N/A, received N/A Console# show spanning-tree ethernet gi1/0/1 Port 1 (gi1/0/1) enabled State: Forwarding Port id: 128.1 Type: P2p (configured: auto) RSTP Designated bridge Priority: 32768 Designated port id: 128.25 Guard root: Disabled Role: Root Port cost: 20000 Port Fast: No (configured:no) Address: 00:01:42:97:e0:00 Designated path cost: 0 BPDU guard: Disabled Number of transitions to forwarding state: 1 BPDU: sent 2, received 120638 Console# show spanning-tree mst-configuration Name: Region1 Revision: 1 Instance -------- 0 1 Vlans mapped ------------ 1-9, 21-4094 10-20 State --------- Enabled EnabledSpanning-Tree Commands 485 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Spanning-Tree.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Console# show spanning-tree Spanning tree enabled mode MSTP Default port cost method: long ###### MST 0 Vlans Mapped: 1-9 CST Root ID Priority Address Path Cost Root Port 32768 00:01:42:97:e0:00 20000 gi1/0/1 Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec IST Master ID Priority Address 32768 00:02:4b:29:7a:00 This switch is the IST master. Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec Max hops 20 Interfaces Name ---- gi1/0/1 gi1/0/2 gi1/0/3 gi1/0/4 State ------- Enabled Enabled Enabled Enabled Prio.Nbr -------- 128.1 128.2 128.3 128.4 Cost ----- 20000 20000 20000 20000 Sts --- FWD FWD FWD FWD Role ---- Root Desg Desg Desg PortFast -------- No No No No Type --------------- P2p Bound (RSTP) Shared Bound (STP) P2p P2p486 Spanning-Tree Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Spanning-Tree.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY ###### MST 1 Vlans Mapped: 10-20 Root ID Priority Address Path Cost Root Port Rem hops 24576 00:02:4b:29:89:76 20000 gi1/0/4 19 Bridge ID Priority Address 32768 00:02:4b:29:7a:00 Interfaces Name ---- gi1/0/1 gi1/0/2 gi1/0/3 gi1/0/4 State ------- Enabled Enabled Enabled Enabled Prio.Nbr -------- 128.1 128.2 128.3 128.4 Cost ----- 20000 20000 20000 20000 Sts --- FWD FWD BLK FWD Role ---- Boun Boun Altn Root PortFast -------- No No No No Type --------------- P2p Bound (RSTP) Shared Bound (STP) P2p P2p Console# show spanning-tree detail Spanning tree enabled mode MSTP Default port cost method: long ###### MST 0 Vlans Mapped: 1-9 CST Root ID Priority Address Path Cost Root Port 32768 00:01:42:97:e0:00 20000 gi1/0/1 Hello Time 2 sec Max Age 20 sec Forward Delay 15 secSpanning-Tree Commands 487 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Spanning-Tree.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY IST Master ID Priority Address 32768 00:02:4b:29:7a:00 This switch is the IST master. Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec Max hops 20 Number of topology changes 2 last change occurred 2d18h ago Times: hold 1, topology change 35, notification 2 hello 2, max age 20, forward delay 15 Port 1 (gi1/0/1) enabled State: Forwarding Port id: 128.1 Type: P2p (configured: auto) Boundary RSTP Designated bridge Priority: 32768 Designated port id: 128.25 Number of transitions to forwarding state: 1 BPDU: sent 2, received 120638 Role: Root Port cost: 20000 Port Fast: No (configured:no) Address: 00:01:42:97:e0:00 Designated path cost: 0 Port 2 (gi1/0/2) enabled State: Forwarding Port id: 128.2 Type: Shared (configured: auto) Boundary STP Designated bridge Priority: 32768 Designated port id: 128.2 Number of transitions to forwarding state: 1 BPDU: sent 2, received 170638 Role: Designated Port cost: 20000 Port Fast: No (configured:no) Address: 00:02:4b:29:7a:00 Designated path cost: 20000488 Spanning-Tree Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Spanning-Tree.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Port 3 (gi1/0/3) enabled State: Forwarding Port id: 128.3 Type: Shared (configured: auto) Internal Designated bridge Priority: 32768 Designated port id: 128.3 Number of transitions to forwarding state: 1 BPDU: sent 2, received 170638 Role: Designated Port cost: 20000 Port Fast: No (configured:no) Address: 00:02:4b:29:7a:00 Designated path cost: 20000 Port 4 (gi1/0/4) enabled State: Forwarding Port id: 128.4 Type: Shared (configured: auto) Internal Designated bridge Priority: 32768 Designated port id: 128.2 Number of transitions to forwarding state: 1 BPDU: sent 2, received 170638 Role: Designated Port cost: 20000 Port Fast: No (configured:no) Address: 00:02:4b:29:7a:00 Designated path cost: 20000 ###### MST 1 Vlans Mapped: 10-20 Root ID Priority Address Path Cost Root Port 24576 00:02:4b:29:89:76 20000 gi1/0/4 Rem hops 19 Bridge ID Priority Address 32768 00:02:4b:29:7a:00 Number of topology changes 2 last change occurred 1d9h ago Times: hold 1, topology change 2, notification 2 hello 2, max age 20, forward delay 15Spanning-Tree Commands 489 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Spanning-Tree.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Port 1 (gi1/0/1) enabled State: Forwarding Port id: 128.1 Type: P2p (configured: auto) Boundary RSTP Designated bridge Priority: 32768 Designated port id: 128.1 Number of transitions to forwarding state: 1 BPDU: sent 2, received 120638 Role: Boundary Port cost: 20000 Port Fast: No (configured:no) Address: 00:02:4b:29:7a:00 Designated path cost: 20000 Port 2 (gi1/0/2) enabled State: Forwarding Port id: 128.2 Type: Shared (configured: auto) Boundary STP Designated bridge Priority: 32768 Designated port id: 128.2 Number of transitions to forwarding state: 1 BPDU: sent 2, received 170638 Role: Designated Port cost: 20000 Port Fast: No (configured:no) Address: 00:02:4b:29:7a:00 Designated path cost: 20000 Port 3 (gi1/0/3) disabled State: Blocking Port id: 128.3 Type: Shared (configured: auto) Internal Designated bridge Priority: 32768 Designated port id: 128.78 Number of transitions to forwarding state: 1 BPDU: sent 2, received 170638 Role: Alternate Port cost: 20000 Port Fast: No (configured:no) Address: 00:02:4b:29:1a:19 Designated path cost: 20000 Port 4 (gi1/0/4) enabled State: Forwarding Port id: 128.4 Type: Shared (configured: auto) Internal Designated bridge Priority: 32768 Designated port id: 128.2 Number of transitions to forwarding state: 1 BPDU: sent 2, received 170638 Role: Designated Port cost: 20000 Port Fast: No (configured:no) Address: 00:02:4b:29:7a:00 Designated path cost: 20000490 Spanning-Tree Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Spanning-Tree.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Console# show spanning-tree Spanning tree enabled mode MSTP Default port cost method: long ###### MST 0 Vlans Mapped: 1-9 CST Root ID Priority Address Path Cost Root Port 32768 00:01:42:97:e0:00 20000 gi1/0/1 Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec IST Master ID Priority Address Path Cost Rem hops 32768 00:02:4b:19:7a:00 10000 19 Bridge ID Priority Address 32768 00:02:4b:29:7a:00 Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec Max hops 20 Console# show spanning-tree Spanning tree enabled mode MSTP Default port cost method: long ###### MST 0 Vlans Mapped: 1-9 CST Root ID Priority Address 32768 00:01:42:97:e0:00 This switch is root for CST and IST master.Spanning-Tree Commands 491 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Spanning-Tree.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY show spanning-tree bpdu Use the show spanning-tree bpdu EXEC mode command to display the BPDU handling when spanning-tree is disabled. Syntax show spanning-tree bpdu [interface-id] Parameters interface-id—Specifies an interface ID. The interface ID can be one of the following types: Ethernet port or Port-channel. Command Mode EXEC mode Example The following examples display spanning-tree information. Root Port gi1/0/1 Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec Max hops 20 Console# show spanning-tree bpdu Global: Flooding Interface --------- gi1/0/1 gi1/0/2 gi1/0/3 Admin Mode ---------- Global Global Flooding Oper Mode --------- Flooding STP STP492 Spanning-Tree Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Spanning-Tree.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LYVLAN Commands 493 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\VLAN_ISCLI_Only.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY 31 VLAN Commands vlan database Use the vlan database Global Configuration mode command to enter the VLAN Configuration mode. Syntax vlan database Command Mode Global Configuration mode Example The following example enters the VLAN database mode. Console(config)# vlan database Console(config-vlan)# vlan Use the vlan VLAN Configuration mode command to create a VLAN. Use the no form of this command to restore the default configuration or delete a VLAN. Syntax vlan vlan-range [name vlan-name] no vlan vlan-range The device accepts also the following syntax:494 VLAN Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\VLAN_ISCLI_Only.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY vlan vlan-range [name vlan-name] [media ethernet] [state active] no vlan vlan-range Parameters • vlan-range—Specifies a list of VLAN IDs to add. Separate nonconsecutive VLAN IDs with a comma and no spaces. Use a hyphen to designate a range of IDs. • name—Specifies the VLAN name. The option is only valid in cass where only one VLAN is configured by the command (Range: 1–32 characters) Command Mode VLAN Configuration mode Example The following example creates VLAN number 1972. Console(config)# vlan database Console(config-vlan)# vlan 1972 interface vlan Use the interface vlan Global Configuration mode command to enter the Interface Configuration (VLAN) mode and enable configuration of the specified VLAN ID. Syntax interface vlan vlan-id Parameters vlan-id—Specifies an existing VLAN ID. Command Mode Global Configuration modeVLAN Commands 495 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\VLAN_ISCLI_Only.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY User Guidelines If the VLAN does not exist (ghost VLAN), not all of the commands are available under the interface VLAN context. The commands that are supported for VLANs that do not exist are: • IGMP snooping control commands • Bridge multicast configuration commands Example The following example configures VLAN 1 with IP address 131.108.1.27 and subnet mask 255.255.255.0. Console (config)# interface vlan 1 Console (config-if)# ip address 131.108.1.27 255.255.255.0 interface range vlan Use the interface range vlan Global Configuration mode command to enable configuring multiple VLANs simultaneously. Syntax interface range vlan vlan-range Parameters vlan-range—Specifies a list of VLAN IDs. Separate nonconsecutive VLAN IDs with a comma and no spaces. Use a hyphen to designate a range of IDs. Command Mode Global Configuration mode User Guidelines Commands under the interface range context are executed independently on each interface in the range. If the command returns an error on one of the interfaces, an error message is displayed and command execution continues on the other interfaces.496 VLAN Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\VLAN_ISCLI_Only.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example The following example groups VLANs 221 through 228 and 889 to receive the same command. Console(config)# interface range vlan 221-228, vlan 889 Console(config-if)# name Use the name Interface Configuration (VLAN) mode command to add a name to a VLAN. Use the no form of this command to remove the VLAN name. Syntax name string no name Parameters string—Specifies a unique name associated with this VLAN. (Length: 1–32 characters) Default Configuration No name is defined. Command Mode Interface Configuration (VLAN) mode. It cannot be configured for a range of interfaces (range context). User Guidelines The VLAN name must be unique. Example The following example gives VLAN number 19 the name Marketing. Console(config)# interface vlan 19 Console(config-if)# name MarketingVLAN Commands 497 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\VLAN_ISCLI_Only.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY switchport protected-port Use the switchport protected-port Interface Configuration mode command to isolate unicast, multicast, and broadcast traffic at Layer 2 from other protected ports on the same switch. Use the no form of this command to disable protection on the port. Syntax switchport protected-port no switchport protected-port Parameters This command has no arguments or keywords. Default Configuration Unprotected Command Mode Interface configuration (Ethernet, port-channel) User Guidelines Use this command to isolate unicast, multicast, and broadcast traffic at Layer 2 from other protected ports (that are not associated with the same community as the ingress interface) on the same switch. Please note that the packet is still subject to FDB decision and to all filtering rules. Use the switchport community Interface Configuration command to associate the interface with a community. Example console(config)# interface gi1/0/1 console(config-if)# switchport protected-port498 VLAN Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\VLAN_ISCLI_Only.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY switchport community Use the switchport community Interface Configuration mode command to associate a protected port with a community. Use the no form of this command to return to default. Syntax switchport community community no switchport community Parameters community—Specifies the community number. (Range:1 - 30) Default Configuration The port is not associated with any community. Command Mode Interface Configuration (Ethernet, port-channel) mode User Guidelines The command is relevant only when the port is defined as a protected port. Use the switchport protected-port Interface Configuration command to define a port as a protected port. Example console(config)# interface gi1/0/1 console(config-if)# switchport community 1 show interfaces protected-ports Use the show interfaces protected-ports EXEC mode command to show protected ports configuration. Syntax show interfaces protected-ports [interface-id]VLAN Commands 499 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\VLAN_ISCLI_Only.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Parameters interface-id—Specifies an interface ID. The interface ID can be one of the following types: Ehernet port or Port-channel. Command Mode EXEC mode Example console# show interfaces protected-ports Interface State Community --------- ------------- --------- gi1/0/1 Protected 1 gi1/0/2 Protected Isolated gi1/0/3 Unprotected 20 gi1/0/4 Unprotected Isolated Note: The Community column for unprotected ports is relevant only when the port state is changed to Protected. switchport Use the switchport Interface Configuration mode command with no keywords to put an interface that is in Layer 3 mode into Layer 2 mode for Layer 2 configuration. Use the no form of this command to put an interface in Layer 3 mode. Syntax switchport no switchport Default Configuration Layer 2 mode500 VLAN Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\VLAN_ISCLI_Only.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Command Mode Interface Configuration (Ethernet, port-channel) mode switchport mode Use the switchport mode Interface Configuration (Ethernet, port-channel) mode command to configure the VLAN membership mode of a port. Use the no form of this command to restore the default configuration. Syntax switchport mode { access | trunk | general | private-vlan {promiscuous | host} | customer } no switchport mode Parameters • access—Specifies an untagged layer 2 VLAN port. • trunk—Specifies a trunking layer 2 VLAN port. • general—Specifies a full 802-1q supported VLAN port. • customer—Specifies that the port is connected to customer equipment. Used when the switch is in a provider network. • private-vlan promiscous—Private-VLAN promiscous port. • private-vlan host—Private-VLAN host port. Default Configuration Command Mode Interface Configuration (Ethernet, port-channel) mode User Guidelines • When the port mode is changed, it receives the configuration corresponding to the mode. • If the port mode is changed to access and the access VLAN does not exist, then the port will not belongs to any VLAN.VLAN Commands 501 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\VLAN_ISCLI_Only.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example The following example configures gigabitethernet port 1/0/1 as an untagged layer 2 VLAN port. Console(config)# interface gi1/0/1 Console(config-if)# switchport mode access switchport access vlan Use the switchport access vlan Interface Configuration (Ethernet, portchannel) mode command to configure the VLAN ID when the interface is in access mode. Use the no form of this command to restore the default configuration. Syntax switchport access vlan { vlan-id | none } no switchport access vlan Parameters vlan-id—Specifies the VLAN ID to which the port is configured. none—Specifies the access port cannot belong to any VLAN. Default Configuration If the default VLAN is enabled, the VLAN ID is 1. Otherwise, it is not a member of any VLAN. Command Mode Interface Configuration (Ethernet, port-channel) mode User Guidelines The command automatically removes the port from the previous VLAN and adds it to the new VLAN.502 VLAN Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\VLAN_ISCLI_Only.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example The following example configures a VLAN ID of 23 to the untagged layer 2 VLAN gigabitethernet port 1/0/1. Console(config)# interface gi1/0/1 Console(config-if)# switchport access vlan 23 switchport access multicast-tv vlan Use the switchport access multicast-tv vlan Interface Configuration (Ethernet, Port-channel) mode command to enable receiving multicast transmissions from a VLAN that is not the Access port VLAN, while keeping the L2 segregation with subscribers on different Access port VLANs. Use the no form of this command to disable receiving multicast transmissions. Syntax switchport access multicast-tv vlan vlan-id no switchport access multicast-tv vlan Parameters vlan-id—Specifies the Multicast TV VLAN ID. Default Configuration Receiving multicast transmissions is disabled. Command Mode Interface Configuration (Ethernet, Port-channel) mode User Guidelines The user cannot transmit multicast transmissions on the multicast TV VLAN. A multicast TV VLAN cannot be enabled if a Guest VLAN is enabled on the interface.VLAN Commands 503 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\VLAN_ISCLI_Only.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example The following example enables gigabitethernet port 1/0/5 to receive multicast transmissions from VLAN 11. Console(config)# interface gi1/0/5 Console(config-if)# switchport access multicast-tv vlan 11 switchport trunk allowed vlan Use the switchport trunk allowed vlan Interface Configuration mode command to set the trunk characteristics when the interface is in trunking mode. Use the no form of this command to reset a trunking characteristic to the default. Syntax switchport trunk allowed vlan { all | none | add vlan-list | remove vlan-list | except vlan-list } no switchport trunk allowed vlan Parameters all—Specifies all VLANs from 1 to 4094. At any time, the port belongs to all VLANs exiting at the time. (Range: 1–4094) none—Specifies an empty VLAN list The port does not belong to any VLAN. add vlan-list—List of VLAN IDs to add. Separate nonconsecutive VLAN IDs with a comma and no spaces. Use a hyphen to designate a range of IDs. remove vlan-list—List of VLAN IDs to remove. Separate nonconsecutive VLAN IDs with a comma and no spaces. Use a hyphen to designate a range of IDs. except vlan-list—List of VLAN IDs is calculated by inverting the defined list of VLANs (the calculated list will include all VLANs from interval 1..4094 except VLANs from the defined list.504 VLAN Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\VLAN_ISCLI_Only.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Default Configuration The Default VLAN is its Native VLAN and the port belongs to either all VLANs or only to the Default VLAN depending on a value of parameter Trunk Port Default Configuration. Command Mode Interface Configuration (Ethernet, port-channel) mode User Guidelines The RS port model behavior allows only the following options: Add and Remove. Inside except vlan-list is saved as add ~ vlan-list, where ~ vlan-list is a list of all VLANs from 1 to 4094 minus the VLANs from vlan-list. Command show running/startup always uses the latter format. The port must be in trunk mode before the command can take effect. Example console(config)# interface gi1/0/1 console(config-if)# switchport mode trunk console(config-if)# switchport trunk allowed vlan all switchport trunk native vlan Use the switchport trunk native vlan Interface Configuration (Ethernet, port-channel) mode command to define the native VLAN when the interface is in trunk mode. Use the no form of this command to restore the default configuration. Syntax switchport trunk native vlan { vlan-id | none } no switchport trunk native vlan Parameters • vlan-id—Specifies the native VLAN ID. • none—Specifies the access port cannot belong to any VLAN.VLAN Commands 505 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\VLAN_ISCLI_Only.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Default Configuration If the default VLAN is enabled, the VLAN ID is 1. Otherwise, the VLAN ID is 4095. Command Mode Interface Configuration (Ethernet, port-channel) mode User Guidelines The command adds the port as a member of the VLAN. If the port is already a member of the VLAN (not a native), it must first be removed from the VLAN. Example The following example configures VLAN number 123 as the native VLAN when the port is in trunk mode. Console# interface gi1/0/1 Console(config-if)# switchport trunk native vlan 123 switchport general allowed vlan Use the switchport general allowed vlan Interface Configuration mode command to set the general characteristics when the interface is in general mode. Use the no form of this command to reset a general characteristic to the default. Syntax switchport general allowed vlan {add | remove} vlan-list [tagged|untagged] no switchport general allowed vlan Parameters • add vlan-list—List of VLAN IDs to add. Separate nonconsecutive VLAN IDs with a comma and no spaces. Use a hyphen to designate a range of IDs. (Range: 1–4094)506 VLAN Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\VLAN_ISCLI_Only.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY • remove vlan-list—List of VLAN IDs to remove. Separate nonconsecutive VLAN IDs with a comma and no spaces. Use a hyphen to designate a range of IDs. • tagged - Specify that packets would be transmitted tagged for the configured VLANs • untagged - Specify that packets would be transmitted untagged for the configured VLANs (this is the default) Default Configuration The port’s PVID equals to the Default VLAN ID and belongs to the Default VLAN as untagged one. Command Mode Interface Configuration mode Example console(config-if)# interface gi1/0/1 console(config-if)# switchport mode general console(config-if)# switchport general allowed vlan add 2-3 tagged switchport general pvid Use the switchport general pvid Interface Configuration (Ethernet, Portchannel) mode command to configure the Port VLAN ID (PVID) when the interface is in general mode. Use the no form of this command to restore the default configuration. Syntax switchport general pvid vlan-id no switchport general pvid Parameters vlan-id—Specifies the Port VLAN ID (PVID).VLAN Commands 507 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\VLAN_ISCLI_Only.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Default Configuration If the default VLAN is enabled, PVID is 1. Otherwise, PVID is =4095. Command Mode Interface Configuration (Ethernet, Port-channel) mode Example The following example configures PVID 234 for gigabitethernet port 1/0/2, when the interface is in general mode. Console(config)# interface gi1/0/2 Console(config-if)# switchport mode general Console(config-if)# switchport general pvid 234 switchport general ingress-filtering disable Use the switchport general ingress-filtering disable Interface Configuration (Ethernet, Port-channel) mode command to disable port ingress filtering. Use the no form of this command to restore the default configuration. Syntax switchport general ingress-filtering disable no switchport general ingress-filtering disable Default Configuration Ingress filtering is enabled. Command Mode Interface Configuration (Ethernet, port-channel) mode Example The following example disables port ingress filtering on gigabitethernet port 1/0/1. Console(config)# interface gi1/0/1 Console(config-if)# switchport mode general508 VLAN Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\VLAN_ISCLI_Only.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Console(config-if)# switchport general ingress-filtering disable switchport general acceptable-frame-type Use the switchport general acceptable-frame-type Interface Configuration mode command to configure ingress filtering based on packet type tagged/untagged. Use the no form of this command to return to default. Syntax switchport general acceptable-frame-type {tagged-only | untagged-only | all} no switchport general acceptable-frame-type Parameters • tagged-only—Discard untagged packets and priority tagged packets. • untagged-only—Discard VLAN tagged packets (not including Priority tagged packets) • all—Do not discard packets based on whether the packet is VLAN tagged or not. Default Configuration All frame types are accepted at ingress. Command Mode Interface Configuration (Ethernet, port-channel) mode Example The following example configures gigabitethernet port 1/0/3 to discard untagged frames at ingress. Console(config)# interface gi1/0/3 Console(config-if)# switchport mode general Console(config-if)# switchport general acceptable-frame-type tagged-onlyVLAN Commands 509 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\VLAN_ISCLI_Only.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY switchport customer vlan Use the switchport customer vlan Interface Configuration (Ethernet, Portchannel) mode command to set the port's VLAN when the interface is in customer mode. Use the no form of this command to restore the default configuration. Syntax switchport customer vlan vlan-id no switchport customer vlan Parameters vlan-id—Specifies the customer VLAN ID. Default Configuration No VLAN is configured. Command Mode Interface Configuration (Ethernet, Port-channel) mode Example The following example defines gigabitethernet port 1/0/5 as a member of customer VLAN 5. Console(config)# interface gi1/0/5 Console(config-if)# switchport mode custmer Console(config-if)# switchport customer vlan isolated 5 switchport general forbidden vlan Use the switchport general forbidden vlan Interface Configuration (Ethernet, Port-channel) mode command to forbid adding or removing specific VLANs to or from a port. Use the no form of this command to restore the default configuration.510 VLAN Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\VLAN_ISCLI_Only.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Syntax switchport general forbidden vlan {add vlan-list | remove vlan-list} no switchport general forbidden vlan {add vlan-list | remove vlan-list} Parameters • add vlan-list—Specifies a list of VLAN IDs to add. Separate nonconsecutive VLAN IDs with a comma and no spaces. Use a hyphen to designate a range of IDs. • remove vlan-list—Specifies a list of VLAN IDs to remove. Separate nonconsecutive VLAN IDs with a comma and no spaces. Use a hyphen designate a range of IDs. Default Configuration All VLANs are allowed. Command Mode Interface Configuration (Ethernet, Port-channel) mode Example The following example forbids adding VLAN IDs 234 to 256 to gigabitethernet port 1/0/7. Console(config)# interface gi1/0/7 Console(config-if)# switchport mode general Console(config-if)# switchport general forbidden vlan add 234- 256 map protocol protocols-group Use the map protocol protocols-group VLAN Configuration mode command to map a protocol to a group of protocols. Use the no form of this command to delete a protocol from a group. Syntax map protocol protocol [encapsulation] protocols-group group no map protocol protocol [encapsulation]VLAN Commands 511 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\VLAN_ISCLI_Only.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Parameters • protocol—Specifies a 16-bit protocol number or one of the reserved names listed in the User Guidelines. (Range: 0x0600–0xFFFF) • encapsulation—Specifies one of the following values: Ethernet, rfc1042, llcOther. If no option is indicated, the default is Ethernet. • protocols-group group—Specifies the group number of the group of protocols associated together. (Range: 1–2147483647) Default Configuration The default encapsulation is Ethernet. Command Mode VLAN Configuration mode User Guidelines The value 0x8100 is not valid as the protocol number for Ethernet encapsulation. The following protocol names are reserved for Ethernet Encapsulation: • ip • arp • ipv6 • ipx Example The following example maps protocol ip to protocol group number 213. Console(config)# vlan database Console(config-vlan)# map protocol ip protocols-group 213 switchport general map protocols-group vlan Use the switchport general map protocols-group vlan Interface Configuration (Ethernet, Port-channel) mode command to set a protocolbased classification rule. Use the no form of this command to delete a classification.512 VLAN Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\VLAN_ISCLI_Only.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Syntax switchport general map protocols-group group vlan vlan-id no switchport general map protocols-group group Parameters • group—Specifies the group number as defined in the map protocol protocols-group command. (Range: 1–65535) • vlan-id—Defines the VLAN ID in the classifying rule. Command Mode Interface Configuration (Ethernet, port-channel) mode Default Configuration No classification is defined. User Guidelines The VLAN classification rule priorities are: 1. MAC-based VLAN (Best match among the rules) 2. Subnet-based VLAN (Best match among the rules) 3. Protocol-based VLAN 4. PVID Example The following example sets a protocol-based classification rule. Console(config-if)# switchport general map protocols-group 1 vlan 8 private-vlan Use the private-vlan Interface VLAN Configuration mode command to configure a private VLAN. Use the no form of this command to return the VLAN to normal VLAN configuration.VLAN Commands 513 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\VLAN_ISCLI_Only.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Syntax private-vlan {primary | isolated} no private-vlan Parameters • Primary—Designate the VLAN as Primary VLAN. • Isolated—Designate the VLAN as Isolated VLAN. Default Configuration No private VLANs are configured. Command Mode Interface Configuration (VLAN) mode User Guidelines • The VLAN type cannot be changed if there is a private-VLAN port that is a member in the VLAN. • The VLAN type cannot be changed if it is associated with other private VLANs. • The VLAN type is not kept as a property of the VLAN when it is deleted. private-vlan association Use the private-vlan association Interface VLAN Configuration mode command to configure the association between the primary VLAN and the secondary VLANs. Use the no form of this command to remove the association. Syntax private-vlan association [add | remove] secondary-vlan-list no private-vlan association Parameters • add—Associates a secondary VLAN to a primary VLAN. This is the default action.514 VLAN Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\VLAN_ISCLI_Only.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY • remove—Clears the association between a secondary VLAN and a primary VLAN. • secondary-vlan-list—Specifies one or more secondary VLANs to be associated with a primary VLAN in a private VLAN. Default Configuration No private VLANs are configured. Command Mode Interface Configuration (VLAN) mode User Guidelines • The command can only be executed in the context of the primary VLAN. • Private VLAN cannot be removed or change its type if it is associated with other private VLANs. • Primary VLAN can be associated with only single isolated VLAN. • A secondary VLAN can be associated with only one primary VLAN. • The association of secondary VLANs with a primary VLAN cannot be removed if there are private VLAN ports that are members in the secondary VLAN. • In MSTP mode, all the VLANs that are associated with a private VLAN should be mapped to the same instance. switchport private-vlan mapping Use the switchport private-vlan mapping Interface Configuration mode command to configure the VLANs of the private-vlan promiscuous port. Use the no form of this command to reset to default. Syntax switchport private-vlan mapping primary-vlan-id [add | remove] secondaryvlan-list no switchport private-vlan mappingVLAN Commands 515 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\VLAN_ISCLI_Only.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Parameters • primary-vlan-id—The VLAN ID of the primary VLAN. • secondary-vlan-list—Specifies one or more secondary VLANs. Default Configuration No VLAN is configured. Command Mode Interface Configuration (Ethernet, port-channel) mode User Guidelines The secondary VLANs should be associated with the primary VLANs, otherwise the configuration is not accepted. See the command private-vlan association. switchport private-vlan host-association Use the switchport private-vlan host-association Interface Configuration mode command to configure the VLANs of the private-vlan host port. Use the no form of this command to reset to default. Syntax switchport private-vlan host-association primary-vlan-id secondary-vlan-id no switchport private-vlan host-association Parameters • primary-vlan-id—The VLAN ID of the primary VLAN. • secondary-vlan-list—Specifies the secondary VLANs. The secondary VLAN is an isolated port. Default Configuration No VLAN is configured. Command Mode Interface Configuration (Ethernet, port-channel) mode516 VLAN Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\VLAN_ISCLI_Only.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY User Guidelines The secondary VLAN should be associated with the primary VLANs, otherwise the configuration is not accepted. See the command private-vlan association. show vlan private-vlan Use the show vlan private-vlan EXEC mode command to show the private VLANs information. Syntax show vlan private-vlan [tag vlan-id ] Parameters vlan-id—VLAN ID Command Mode EXEC mode User Guidelines The show command does not include non-private-vlan ports that are members in private VLANs. Example Console# show vlan private-vlan Primary Secondary Type Ports ----------- ----------- ----------- ---------------------- 150 primary gi1/0/15 150 151 isolated gi1/0/15 ip internal-usage-vlan Use the ip internal-usage-vlan Interface Configuration (Ethernet, Portchannel) mode command to reserve a VLAN as the internal usage VLAN of VLAN Commands 517 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\VLAN_ISCLI_Only.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY an interface. Use the no form of this command to restore the default configuration. Syntax ip internal-usage-vlan vlan-id no ip internal-usage-vlan Parameters vlan-id—Specifies the internal usage VLAN ID. Command Mode Interface Configuration (Ethernet, Port-channel) mode. It cannot be configured for a range of interfaces (range context). User Guidelines An internal usage VLAN is required when an IP interface is defined on an Ethernet port or Port-channel. Use this command to define the internal usage VLAN of a port. If an internal usage VLAN is not defined for a port, the software chooses one of the unused VLANs. If a VLAN ID was chosen by the software for internal usage, but it is desired to use that VLAN ID for a static or dynamic VLAN, do one of the following: • Remove the IP interface, create the VLAN, and recreate the IP interface. • Use this command to explicitly define the internal usage VLAN. Example The following example reserves unused VLAN 200 as the internal usage VLAN of Ethernet port 1/3gigabitethernet port 1/0/3. Console(config)# interface gi1/0/3 Console(config-if)# ip internal-usage-vlan 200518 VLAN Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\VLAN_ISCLI_Only.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY show vlan Use the show vlan Privileged EXEC mode command to display VLAN information for all VLANs or for a specific VLAN. Syntax show vlan [tag vlan-id | name vlan-name] Parameters • tag vlan-id—Specifies a VLAN ID. • name vlan-name—Specifies a VLAN name string. (Length: 1–32 characters) Command Mode Privileged EXEC mode Example The following example displays information for all VLANs. Console# show vlan VLAN ---- 1 10 11 20 21 30 31 91 3978 Name ---------- default VLAN0010 VLAN0011 VLAN0020 VLAN0021 VLAN0030 VLAN0031 VLAN0091 Guest VLAN Ports -------- gi1/0/1-2 gi1/0/3-4 gi1/0/1-2 gi1/0/3-4 gi1/0/1-2 gi1/0/17 Type ------- Other dynamic static static static static static static static Authorization -------------- Required Required Required Required Required Required Required Not Required GuestVLAN Commands 519 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\VLAN_ISCLI_Only.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY show vlan multicast-tv Use the show vlan multicast-tv EXEC mode command to display information on the source ports and receiver ports of multicast-TV VLAN. Syntax show vlan multicast-tv vlan vlan-id Parameters vlan-id—Specifies the VLAN ID. Command Mode EXEC mode Example The following example displays information on the source and receiver ports of multicast-TV VLAN ID 1000. The following table describes the significant fields shown in the display: show vlan protocols-groups Use the show vlan protocols-groups EXEC mode command to display protocols-groups information. Console # show vlan multicast-tv vlan 1000 Source ports ------------- gi1/0/8, gi1/0/9 Receiver Ports ---------------------- gi1/0/1-18, gi1/0/1-18, gi1/0/1-18 Field Description Source ports Ports that can transmit and receive traffic to and from the VLAN. Receiver ports Ports that can only receive traffic from the VLAN.520 VLAN Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\VLAN_ISCLI_Only.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Syntax show vlan protocols-groups Command Mode EXEC mode Example The following example displays protocols-groups information. show vlan internal usage Use the show vlan internal usage Privileged EXEC mode command to display a list of VLANs used internally by the device. Syntax show vlan internal usage Command Mode Privileged EXEC mode Console> show vlan protocols-groups Protocol ------------- 0x800 (IP) 0x806 (ARP) 0x86dd (IPv6) 0x8898 Encapsulation -------------- Ethernet Ethernet Ethernet Ethernet Group -------- 1 1 2 3VLAN Commands 521 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\VLAN_ISCLI_Only.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example The following example displays VLANs used internally by the device. show interfaces switchport Use the show interfaces switchport Privileged EXEC command to display the administrative and operational status of all interfaces or a specific interface. Syntax show interfaces switchport [interface-id] Parameters Interface-id—Specifies an interface ID. The interface ID can be one of the following types: Ehernet port or Port-channel. Example console# show interfaces switchport gi2/0/1 Gathering information... Name: gi1/0/1 Switchport: enable Administrative Mode: access Operational Mode: down Access Mode VLAN: 1 Access Multicast TV VLAN: none Console# show vlan internal usage VLAN -------- 1007 1008 1009 Usage -------- Eth 1/21 Eth 1/22 Eth 1/23 IP address ---------- Active Inactive Active Reserved ---------- No Yes Yes522 VLAN Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\VLAN_ISCLI_Only.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Trunking Native Mode VLAN: 1 Trunking VLANs Enabled: 1 2-4094 (Inactive) General PVID: 1 General VLANs Enabled: none General Egress Tagged VLANs Enabled: none General Forbidden VLANs: none General Ingress Filtering: enabled General Acceptable Frame Type: all General GVRP status: disabled General GVRP VLANs: none Customer Mode VLAN: none Private-vlan promiscuous-association primary VLAN: none Private-vlan promiscuous-association Secondary VLANs Enabled: none Private-vlan host-association primary VLAN: none Private-vlan host-association Secondary VLAN Enabled: none DVA: disable Protected: Enabled, Uplink is gi1/0/1 Classification rules: Classification type Group ID VLAN ID ------------------- -------- ------- Protocol 1 19 Protocol 1 20 Protocol 2 72 Subnet 1 15 MAC 6 11IGMP Snooping Commands 523 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\IGMP_Snooping.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY 32 IGMP Snooping Commands ip igmp snooping (Global) Use the ip igmp snooping Global Configuration mode command to enable Internet Group Management Protocol (IGMP) snooping. Use the no form of this command to disable IGMP snooping. Syntax ip igmp snooping no ip igmp snooping Default Configuration IGMP snooping is disabled. Command Mode Global Configuration mode Example The following example enables IGMP snooping. Console(config)# ip igmp snooping ip igmp snooping vlan Use the ip igmp snooping vlan Global Configuration mode command to enable Internet Group Management Protocol (IGMP) snooping on a specific VLAN. Use the no form of this command to disable IGMP snooping on a VLAN interface.524 IGMP Snooping Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\IGMP_Snooping.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Syntax ip igmp snooping vlan vlan-id no ip igmp snooping vlan vlan-id Parameters vlan-id—Specifies the VLAN. Default Disabled Command Mode Global Configuration mode User Guidelines IGMP snooping can be enabled only on static VLANs. IGMPv1, IGMPv2 and IGMPv3 are supported. To activate IGMP snooping, the bridge multicast filtering should be enabled. The User Guidelines of the bridge multicast mode Interface VLAN Configuration command describes the configuration that is written into the FDB as a function of the FDB mode and the IGMP version that is used in the network. Example console(config)# ip igmp snooping vlan 2 ip igmp snooping mrouter Use the ip igmp snooping mrouter Global Configuration mode command to enable automatic learning of multicast router ports. Use the no form of this command to remove the configuration. Syntax ip igmp snooping vlan vlan-id mrouter learn pim-dvmrp no ip igmp snooping vlan vlan-id mrouter learn pim-dvmrpIGMP Snooping Commands 525 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\IGMP_Snooping.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Parameters vlan-id—Specifies the VLAN. Default Learning pim-dvmrp is enabled. Command Mode Global Configuration mode User Guidelines Multicast router ports are learned based on: • Queries received on the port • PIM/PIMv2 received on the port • DVMRP received on the port • MRDISC received on the port  MOSPF received on the port You can execute the command before the VLAN is created. Example console(config)# ip igmp snooping vlan 1 mrouter learn pim-dvmrp ip igmp snooping mrouter interface Use the ip igmp snooping mrouter interface Global Configuration mode command to define a port that is connected to a multicast router port. Use the no form of this command to remove the configuration. Syntax ip igmp snooping vlan vlan-id mrouter interface interface-list no ip igmp snooping vlan vlan-id mrouter interface interface-list Parameters • vlan-id—Specifies the VLAN.526 IGMP Snooping Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\IGMP_Snooping.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY • interface-list—Specifies the list of interfaces. The interfaces can be one of the following types: Ethernet port or Port-channel. Default No ports defined Command Mode Global Configuration mode User Guidelines A port that is defined as a multicast router port receives all IGMP packets (reports and queries) as well as all multicast data. You can execute the command before the VLAN is created. Example console(config)# ip igmp snooping vlan 1 mrouter interface gi1/0/1 ip igmp snooping forbidden mrouter interface Use the ip igmp snooping forbidden mrouter interface Global Configuration mode command to forbid a port from being defined as a multicast router port by static configuration or by automatic learning. Use the no form of this command to remove the configuration. Syntax ip igmp snooping vlan vlan-id forbidden mrouter interface interface-list no ip igmp snooping vlan vlan-id forbidden mrouter interface interface-list Parameters • vlan-id—Specifies the VLAN. • interface-list—Specifies a list of interfaces. The interfaces can be from one of the following types: Ethernet port or Port-channel. Default No ports definedIGMP Snooping Commands 527 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\IGMP_Snooping.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Command Mode Global Configuration mode User Guidelines A port that is a forbidden mrouter port cannot be a multicast router port (i.e. cannot be learned dynamically or assigned statically). You can execute the command before the VLAN is created. Example console(config)# ip igmp snooping vlan 1 forbidden mrouter interface gi1/0/1 ip igmp snooping static Use the ip igmp snooping static Global Configuration mode command to register an IP-layer multicast address to the bridge table, and to add statically ports to the group. Use the no form of this command to remove ports specified as members of a static multicast group. Syntax ip igmp snooping vlan vlan-id static ip-address [interface interface-list] no ip igmp snooping vlan vlan-id static ip-address [interface interface-list] Parameter • vlan-id—Specifies the VLAN. • ip-address—Specifies the IP multicast address. • interface-list—Specifies a list of interfaces. The interfaces can be from one of the following types: Ethernet port or Port-channel. Default Configuration No multicast addresses are defined. Command Mode Global Configuration mode528 IGMP Snooping Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\IGMP_Snooping.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY User Guidelines Static multicast addresses can only be defined on static VLANs. You can execute the command before the VLAN is created. You can register an entry without specifying an interface. Using the no. command without a port-list removes the entry. Example console(config)# ip igmp snooping vlan 1 static 239.2.2.2 gi1/0/ ip igmp snooping multicast-tv Use the ip igmp snooping multicast-tv Global Configuration mode command to define the multicast ip-addresses that are associated with a multicast-tv VLAN. Use the no form of this command to remove all associations. Syntax ip igmp snooping vlan vlan-id multicast-tv ip-multicast-address [count number] no ip igmp snooping vlan vlan-id multicast-tv ip-multicast-address [count number] Parameters • vlan-id—Specifies the VLAN • number—Configures multiple contiguous multicast IP addresses. If not specified, the default is 1. (Range: 1–256) Default No multicast IP address is associated. Command Mode Global Configuration modeIGMP Snooping Commands 529 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\IGMP_Snooping.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY User Guidelines Use this command to define the multicast transmissions on a multicast-TV VLAN. The configuration is only relevant for an Access port that is a member in the configured VLAN as a multicast-TV VLAN. If an IGMP message is received on such an Access port, it is associated with the multicast-TV VLAN only if it is for one of the multicast IP addresses that are associated with the multicast-TV VLAN. Up to 256 VLANs can be configured. ip igmp snooping querier Use the ip igmp snooping querier Global Configuration mode command to enable the Internet Group Management Protocol (IGMP) querier on a specific VLAN. Use the no form of this command to disable the IGMP querier on a VLAN interface. Syntax ip igmp snooping vlan vlan-id querier no ip igmp snooping vlan vlan-id querier Parameters vlan-id—Specifies the VLAN Default Disabled Command Mode Global Configuration mode User Guidelines The IGMP snooping querier can be enabled on a VLAN only if IGMP snooping is enabled for that VLAN. No more then one switch can be configured as an IGMP Querier for a VLAN. When the IGMP snooping querier is enabled, it starts after a host-time-out/2 with no IGMP traffic detected from a multicast router.530 IGMP Snooping Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\IGMP_Snooping.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY The IGMP Snooping Querier disables itself if it detects IGMP traffic from a multicast router. It restarts automatically after host-time-out/2. Following are the IGMP snooping querier parameters as a function of the IGMP snooping parameters: • QueryMaxResponseTime: host-time-out/10. • QueryInterval: host-time-out/ 3. Example console(config)# ip igmp snooping vlan 1 querier ip igmp snooping querier address Use the ip igmp snooping querier address Global Configuration mode command to define the source IP address that the IGMP snooping querier would use. Use the no form of this command to return to default. Syntax ip igmp snooping vlan vlan-id querier address ip-address no ip igmp snooping vlan vlan-id querier address Parameters • vlan-id—Specifies the VLAN. • ip-addres—Source IP address. Default If an IP address is configured for the VLAN, it is used as the source address of the IGMP snooping querier. Command Mode Global Configuration mode User Guidelines If an IP address is not configured by this command, and no IP address is configured for the querier’s VLAN, the querier is disabled.IGMP Snooping Commands 531 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\IGMP_Snooping.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example console(config)# ip igmp snooping vlan 1 querier address 1.2.3.4 ip igmp robustness Use the ip igmp robustness Interface Configuration mode command to change a value of the IGMP robustness variable. Use the no format of the command to return to default. Syntax ip igmp robustness count no ip igmp robustness Parameters count—The number of expected packet loss on a link. Parameter range. (Range: 1–7) Default 2 Command Mode Interface Configuration (VLAN) mode User Guidelines You can execute the command before the VLAN is created. console(config)# interface vlan 1 console(config-if)# ip igmp robustness 3 ip igmp query-interval Use the ip igmp query-interval Interface Configuration mode command to configure the Query interval. Use the no format of the command to return to default.532 IGMP Snooping Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\IGMP_Snooping.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Syntax ip igmp query-interval seconds no ip igmp query-interval Parameters seconds—Frequency, in seconds, at which IGMP query messages are sent on the interface. (Range: 30–18000) Default 125 Command Mode Interface Configuration (VLAN) mode User Guidelines You can execute the command before the VLAN is created. Example ip igmp query-max-response-time Use the ip igmp query-max-response-time Interface Configuration mode command to configure the Query Maximum Response time. Use the no format of the command to return to default. Syntax ip igmp query-max-response-time seconds no ip igmp query-max-response-time Parameters seconds—Maximum response time, in seconds, advertised in IGMP queries. (Range: 5–20) Default 10IGMP Snooping Commands 533 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\IGMP_Snooping.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Command Mode Interface Configuration (VLAN) mode User Guidelines You can execute the command before the VLAN is created. Example ip igmp last-member-query-count Use the ip igmp last-member-query-count Interface Configuration mode command to configure the Last Member Query Counter. Use the no format of the command to return to default. Syntax ip igmp last-member-query-count count no ip igmp last-member-query-count Parameter count—The number of times that group- or group-source-specific queries are sent upon receipt of a message indicating a leave. (Range: 1–7) Default A value of Robustness variable Command Mode Interface Configuration (VLAN) mode User Guidelines You can execute the command before the VLAN is created. Example534 IGMP Snooping Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\IGMP_Snooping.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY ip igmp last-member-query-interval Use the ip igmp last-member-query-interval Interface Configuration mode command to configure the Last Member Query interval. Use the no format of the command to return to default. Syntax ip igmp last-member-query-interval milliseconds no ip igmp last-member-query-interval Parameters milliseconds—Interval, in milliseconds, at which IGMP group-specific host query messages are sent on the interface. (Range: 100–25500) Default 1000 Command Mode Interface Configuration (VLAN) mode User Guidelines You can execute the command before the VLAN is created. Example ip igmp snooping vlan immediate-leave Use the ip igmp snooping vlan immediate-leave Global Configuration mode command to enable the IGMP Snooping Immediate-Leave processing on a VLAN. Use the no format of the command to disable IGMP Snooping Immediate-Leave processing. Syntax ip igmp snooping vlan vlan-id immediate-leave no ip igmp snooping vlan vlan-id immediate-leaveIGMP Snooping Commands 535 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\IGMP_Snooping.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Parameters vlan-id—Specifies the VLAN ID value. (Range: 1–4094) Default Disabled Command Mode Global Configuration mode User Guidelines You can execute the command before the VLAN is created. Example show ip igmp snooping mrouter The show ip igmp snooping mrouter EXEC mode command displays information on dynamically learned multicast router interfaces for all VLANs or for a specific VLAN. Syntax show ip igmp snooping mrouter [interface vlan-id] Parameters interface vlan-id—Specifies the VLAN ID. Command Mode EXEC mode536 IGMP Snooping Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\IGMP_Snooping.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example The following example displays information on dynamically learned multicast router interfaces for VLAN 1000. show ip igmp snooping interface The show ip igmp snooping interface EXEC mode command displays the IGMP snooping configuration for a specific VLAN. Syntax show ip igmp snooping interface vlan-id Parameters vlan-id—Specifies the VLAN ID. Command Mode EXEC mode Example The following example displays the IGMP snooping configuration for VLAN 1000 Console # show ip igmp snooping interface 1000 IGMP Snooping is globally enabled IGMP Snooping admin: Enabled IGMP Snooping oper: Enabled Routers IGMP version: 3 Groups that are in IGMP version 2 compatibility mode: 231.2.2.3, 231.2.2.3 Groups that are in IGMP version 1 compatibility mode: Console# show ip igmp snooping mrouter interface 1000 VLAN ---- 1000 Static ------ gi1/0/1 Dynamic ------- gi1/0/2 Forbidden --------- gi1/0/3-gi1/0/23IGMP Snooping Commands 537 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\IGMP_Snooping.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY IGMP snooping querier admin: Enabled IGMP snooping querier oper: Enabled IGMP snooping querier address admin: IGMP snooping querier address oper: 172.16.1.1 IGMP snooping querier version admin: 3 IGMP snooping robustness: admin 2 oper 2 IGMP snooping query interval: admin 125 sec oper 125 sec IGMP snooping query maximum response: admin 10 sec oper 10 sec IGMP snooping last member query counter: admin 2 oper 2 IGMP snooping last member query interval: admin 1000 msec oper 500 msec IGMP snooping last immediate leave: enable Automatic learning of multicast router ports is enabled show ip igmp snooping groups The show ip igmp snooping groups EXEC mode command displays the multicast groups learned by the IGMP snooping. Syntax show ip igmp snooping groups [vlan vlan-id] [address ip-multicast-address] [source ip-address] Parameters vlan vlan-id—Specifies the VLAN ID. address ip-multicast-address—Specifies the IP multicast address. source ip-address—Specifies the IP source address. Command Mode EXEC mode538 IGMP Snooping Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\IGMP_Snooping.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY User Guidelines To see the full multicast address table (including static addresses), use the show bridge multicast address-table command. The Include list contains the ports which are in forwarding state for this group according to the snooping database. In general, the Exclude list contains the ports that have issued an explicit Exclude for that specific source in a multicast group. The Reporters That Are Forbidden Statically list contains the list of ports which have asked to receive a multicast flow but were defined as forbidden for that multicast group in multicast bridge. Note: under certain circumstances, the Exclude list may not contain accurate information.For example, in the case when two Exclude reports were received on the same port for the same group but for different sources, the port will not be in the Exclude list but rather in the Include’ list. Example The following example shows the output for IGMP version 2. show ip igmp snooping multicast-tv The show ip igmp snooping multicast-tv EXEC mode command displays the IP addresses associated with Multicast TV VLANs. Syntax show ip igmp snooping multicast-tv [vlan vlan-id] Parameters vlan vlan-id—Specifies the VLAN ID. Console# show ip igmp snooping groups Vlan ---- 1 1 19 IP Address --------- 231.2.2.2 231.2.2.3 231.2.2.4 Querier --------- Yes No Yes Ports -------- gi1/0/1 gi1/0/2 gi1/0/9IGMP Snooping Commands 539 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\IGMP_Snooping.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Command Mode EXEC mode Example The following example displays the IP addresses associated with all Multicast TV VLANs. Console# show ip igmp snooping multicast-tv VLAN IP Address ---- ----------- 1000 239.255.0.0 1000 239.255.0.1 1000 239.255.0.2 1000 239.255.0.3 1000 239.255.0.4 1000 239.255.0.5 1000 239.255.0.6 1000 239.255.0.7540 IGMP Snooping Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\IGMP_Snooping.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LYLACP Commands 541 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\LACP.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY 33 LACP Commands lacp system-priority Use the lacp system-priority Global Configuration mode command to set the system priority. Use the no form of this command to restore the default configuration. Syntax lacp system-priority value no lacp system-priority Parameters value—Specifies the system priority value. (Range: 1–65535) Default Configuration The default system priority is 1. Command Mode Global Configuration mode Example The following example sets the system priority to 120. Console(config)# lacp system-priority 120542 LACP Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\LACP.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY lacp port-priority Use the lacp port-priority Interface Configuration (Ethernet) mode command to set the physical port priority. Use the no form of this command to restore the default configuration. Syntax lacp port-priority value no lacp port-priority Parameters value—Specifies the port priority. (Range: 1use the no form of this command65535) Default Configuration The default port priority is 1. Command Mode Interface Configuration (Ethernet) mode Example The following example sets the priority of gigabitethernet port 1/0/6. console(config)# interface gi1/0/6 console(config-if)# lacp port-priority 247 lacp timeout Use the lacp timeout Interface Configuration (Ethernet) mode command to assign an administrative LACP timeout to an interface. Use the no form of this command to restore the default configuration. Syntax lacp timeout {long | short} no lacp timeoutLACP Commands 543 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\LACP.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Parameters • long—Specifies the long timeout value. • short—Specifies the short timeout value. Default Configuration The default port timeout value is Long. Command Mode Interface Configuration (Ethernet) mode Example The following example assigns a long administrative LACP timeout to gigabitethernet port 1/0/6. Console(config)# interface gi1/0/6 Console(config-if)# lacp timeout long show lacp Use the show lacp EXEC mode command to display LACP information for all Ethernet ports or for a specific Ethernet port. Syntax show lacp interface-id [ parameters | statistics | protocol-state ] Parameters • parameters—Displays parameters only. • statistics—Displays statistics only. • protocol-state—Displays protocol state only. Command Mode EXEC mode544 LACP Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\LACP.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example The following example displays LACP information for gigabitethernet port 1/0/1. Console> show lacp gi1/0/1 Port gi1/0/1 LACP parameters: Actor system priority: system mac addr: port Admin key: port Oper key: port Oper number: port Admin priority: port Oper priority: port Admin timeout: port Oper timeout: LACP Activity: Aggregation: synchronization: collecting: distributing: expired: 1 00:00:12:34:56:78 30 30 21 1 1 LONG LONG ACTIVE AGGREGATABLE FALSE FALSE FALSE FALSE PartnerLACP Commands 545 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\LACP.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY system priority: system mac addr: port Admin key: port Oper key: port Oper number: port Admin priority: port Oper priority: port Admin timeout: port Oper timeout: LACP Activity: Aggregation: synchronization: collecting: distributing: expired: 0 00:00:00:00:00:00 0 0 0 0 0 LONG LONG PASSIVE AGGREGATABLE FALSE FALSE FALSE FALSE Port gi1/0/1 LACP Statistics: LACP PDUs sent: LACP PDUs received: 2 2 Port gi1/0/1 LACP Protocol State: LACP State Machines: Receive FSM: Mux FSM: Port Disabled State Detached State Control Variables: BEGIN: LACP_Enabled: Ready_N: Selected: Port_moved: NNT: Port_enabled: FALSE TRUE FALSE UNSELECTED FALSE FALSE FALSE Timer counters: periodic tx timer: current while timer: wait while timer: 0 0 0546 LACP Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\LACP.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY show lacp port-channel Use the show lacp port-channel EXEC mode command to display LACP information for a port-channel. Syntax show lacp port-channel [ port_channel_number ] Parameters port_channel_number—Specifies the port-channel number. Command Mode EXEC mode Example The following example displays LACP information about port-channel 1. Console> show lacp port-channel 1 Port-Channel 1:Port Type 1000 Ethernet Actor System Priority: MAC Address: Admin Key: Oper Key: 1 000285:0E1C00 29 29 Partner System Priority: MAC Address: Oper Key: 0 00:00:00:00:00:00 14GVRP Commands 547 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\GVRP.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY 34 GVRP Commands gvrp enable (Global) Use the gvrp enable Global Configuration mode command to enable the Generic Attribute Registration Protocol (GARP) VLAN Registration Protocol (GVRP) globally. Use the no form of this command to disable GVRP on the device. Syntax gvrp enable no gvrp enable Default Configuration GVRP is globally disabled. Command Mode Global Configuration mode Example The following example enables GVRP globally on the device. Console(config)# gvrp enable gvrp enable (Interface) Use the gvrp enable Interface Configuration (Ethernet, Port-channel) mode command to enable GVRP on an interface. Use the no form of this command to disable GVRP on an interface.548 GVRP Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\GVRP.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Syntax gvrp enable no gvrp enable Default Configuration GVRP is disabled on all interfaces. Command Mode Interface Configuration (Ethernet, Port-channel) mode User Guidelines An access port does not dynamically join a VLAN because it is always a member of one VLAN only. Membership in an untagged VLAN is propagated in the same way as in a tagged VLAN. That is, the PVID must be manually defined as the untagged VLAN VID. Example The following example enables GVRP on gigabitethernet port 1/0/6. Console(config)# interface gi1/0/6 Console(config-if)# gvrp enable garp timer Use the garp timer Interface Configuration (Ethernet, port channel) mode command to adjust the values of the join, leave and leaveall timers of GARP applications, such as GVRP. Use the no form of this command to restore the default configuration. Syntax garp timer {join | leave | leaveall} timer-value no garp timer Parameters • join | leave | leaveall—Specifies the type of timer for which the timer value is specified. The possible values are:GVRP Commands 549 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\GVRP.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY • join—Specifies the GARP join timer. The GARP join timer value specifies the time interval between the two join messages sent by the GARP application. • leave—Specifies the GARP leave timer. The GARP leave timer value specifies the time interval for a GARP application to wait for a join message after receiving a leave message for a GARP attribute, before it de-registers the GARP attribute. • leaveall—Specifies the GARP leaveall timer. The GARP leaveall timer value specifies the time interval between leaveall messages for a GARP entity, which prompt other GARP entities to re-reregister all attribute information on this entity. • timer-value—Specifies the timer value in milliseconds in multiples of 10. (Range: 10–2147483640) Default Configuration The following are the default timer values: • Join timer—200 milliseconds • Leave timer—600 milliseconds • Leaveall timer—10000 milliseconds Command Mode Interface Configuration (Ethernet, Port-channel) mode User Guidelines The timer-value value must be a multiple of 10. The following relationship must be maintained between the timers: • The leave time must be greater than or equal to three times the join time. • The leave-all time must be greater than the leave time. Set the same GARP timer values on all Layer 2-connected devices to ensure proper operation of the GARP application.550 GVRP Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\GVRP.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example The following example sets the leave timer for gigabitethernet port 1/0/6 to 900 milliseconds. Console(config)# interface gi1/0/6 Console(config-if)# garp timer leave 900 gvrp vlan-creation-forbid Use the gvrp vlan-creation-forbid Interface Configuration (Ethernet, Portchannel) mode command to disable dynamic VLAN creation or modification. Use the no form of this command to enable dynamic VLAN creation or modification. Syntax gvrp vlan-creation-forbid no gvrp vlan-creation-forbid Default Configuration Dynamic VLAN creation or modification is enabled. Command Mode Interface Configuration (Ethernet, Port-channel) mode Example The following example disables dynamic VLAN creation on gigabitethernet port 1/0/3. Console(config)# interface gi1/0/3 Console(config-if)# gvrp vlan-creation-forbid gvrp registration-forbid Use the gvrp registration-forbid Interface Configuration (Ethernet, Portchannel) mode command to deregister all dynamic VLANs on a port and GVRP Commands 551 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\GVRP.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY prevent VLAN creation or registration on the port. Use the no form of this command to allow dynamic registration of VLANs on a port. Syntax gvrp registration-forbid no gvrp registration-forbid Default Configuration Dynamic registration of VLANs on the port is allowed. Command Mode Interface Configuration (Ethernet, Port-channel) mode Example The following example forbids dynamic registration of VLANs on gigabitethernet port 1/0/2. Console(config)# interface gi1/0/2 Console(config-if)# gvrp registration-forbid clear gvrp statistics Use the clear gvrp statistics Privileged EXEC mode command to clear GVRP statistical information for all interfaces or for a specific interface. Syntax clear gvrp statistics [interface-id] Parameters Interface-id—Specifies an interface ID. The interface ID can be one of the following types: Ethernet port or Port-channel. Command Mode Privileged EXEC mode552 GVRP Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\GVRP.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example The following example clears all GVRP statistical information on gigabitethernet port 1/0/5. Console# clear gvrp statistics gi1/0/5 show gvrp configuration Use the show gvrp configuration EXEC mode command to display GVRP configuration information, including timer values, whether GVRP and dynamic VLAN creation are enabled, and which ports are running GVRP. Syntax show gvrp configuration [interface-id] Parameters interface-id—Specifies an interface ID. The interface ID can be one of the following types: Ethernet port or Port-channel. Command Mode EXEC mode Example The following example displays GVRP configuration information. console# show gvrp configuration GVRP Feature is currently Enabled on the device. Maximum VLANs: 4094 Port(s) GVRP-Status Regist- Dynamic Timers(ms) ration VLAN Leave Creation Join Leave All ------- ----------- -------- --------- ---- ----- ---- gi1/0/1 Enabled Forbidden Disabled 200 600 10000 gi1/0/2 Enabled Normal Enabled 400 1200 20000GVRP Commands 553 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\GVRP.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY show gvrp statistics Use the show gvrp statistics EXEC mode command to display GVRP statistics for all interfaces or for a specific interface. Syntax show gvrp statistics [interface-id] Parameters interface-id—Specifies an interface ID. The interface ID can be one of the following types: Ethernet port or Port-channel. Command Mode EXEC mode Example The following example displays GVRP statistical information. Console# show gvrp statistics GVRP statistics: ---------------- Legend: rJE : rEmp: rLE : sJE : sEmp: sLE : Join Empty Received Empty Received Leave Empty Received Join Empty Sent Empty Sent Leave Empty Sent rJIn: Join In Received rLIn: Leave In Received rLA : Leave All Received sJIn: Join In Sent sLIn: Leave In Sent sLA : Leave All Sent554 GVRP Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\GVRP.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY show gvrp error-statistics Use the show gvrp error-statistics EXEC mode command to display GVRP error statistics for all interfaces or for a specific interface. Syntax show gvrp error-statistics [interface-id] Parameters interface-id—Specifies an interface ID. The interface ID can be one of the following types: Ethernet port or Port-channel. Command Mode EXEC mode Example The following example displays GVRP error statistics. console# show gvrp error-statistics GVRP Error Statistics: ---------------------- Legend: INVPROT : Invalid Protocol Id INVATYP : Invalid Attribute Type INVALEN : Invalid Attribute Length INVAVAL : Invalid Attribute Value INVEVENT: Invalid Event Port ----- 1/1 1/2 1/3 1/4 1/5 1/6 1/7 1/8 rJE ---- 0 0 0 0 0 0 0 0 rJIn ---- 0 0 0 0 0 0 0 0 rEmp ---- 0 0 0 0 0 0 0 0 rLIn ---- 0 0 0 0 0 0 0 0 rLE ---- 0 0 0 0 0 0 0 0 rLA ---- 0 0 0 0 0 0 0 0 sJE ---- 0 0 0 0 0 0 0 0 sJIn ---- 0 0 0 0 0 0 0 0 sEmp ---- 0 0 0 0 0 0 0 0 sLIn ---- 0 0 0 0 0 0 0 0 sLE ---- 0 0 0 0 0 0 0 0 sLA --- 0 0 0 0 0 0 0 0GVRP Commands 555 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\GVRP.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Port INVPROT INVATYP INVAVAL INVALEN INVEVENT -------- ------- ------- ------- ------- -------- gi1/0/1 0 0 0 0 0 gi1/0/2 0 0 0 0 0 gi1/0/3 0 0 0 0 0 gi1/0/4 0 0 0 0 0 gi1/0/5 0 0 0 0 0 gi1/0/6 0 0 0 0 0 gi1/0/0/7 0 0 0 0 0 gi1/0/0/8 0 0 0 0 0556 GVRP Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\GVRP.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LYVoice VLAN Commands 557 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Voice_VLAN.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY 35 Voice VLAN Commands voice vlan id The voice vlan id Global Configuration mode command specified the Voice VLAN Identified. The no format of the command returns the value to default. Syntax voice vlan id vlan-id no voice vlan id Parameters vlan-id—Specifies the voice VLAN ID. Parameters Range vlan-id—1-4094. Default Configuration Default VLAN's Identifier. Command Mode Global Configuration mode User Guidelines If the Voice VLAN does not exist it is created automatically. It will not removed automatically.558 Voice VLAN Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Voice_VLAN.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example The following example enables VLAN 35 as the voice VLAN on the device. Console(config)# voice vlan id 35 voice vlan oui-table Use the voice vlan oui-table Global Configuration mode command to configure the voice OUI table. Use the no form of this command to restore the default configuration. Syntax voice vlan oui-table {add mac-address-prefix | remove mac-address-prefix} [text] no voice vlan oui-table Parameters • add mac-address-prefix—Adds the specified MAC address to the voice VLAN OUI table. (Length: 3 bytes) • text—Adds the specified text as a description of the specified MAC address to the voice VLAN OUI table. (Length: 1–32 characters) • remove mac-address-prefix—Removes the specified MAC address from the voice VLAN OUI table. (Length: 3 bytes) Default Configuration The default voice VLAN OUI table is: OUI Description 00:e0:bb 3COM Phone 00:03:6b Cisco Phone 00:e0:75 Veritel Polycom Phone 00:d0:1e Pingtel Phone 00:01:e3 Siemens AG Phone 00:60:b9 NEC/Philips PhoneVoice VLAN Commands 559 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Voice_VLAN.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Command Mode Global Configuration mode User Guidelines The classification of a packet to Packets from VoIP Equipment/Phones is based on the packet’s OUI of the source Mac Address. In MAC addresses, the first three bytes contain a manufacturer ID (Organizationally Unique Identifiers - OUI) and the last three bytes contain a unique station ID. OUIs are globally assigned (administered) by the IEEE. Since the number of IP phones manufacturers that dominates the market is limited and well known, the known OUI values can be configured (as a default and user configurable) to the switch. Example The following example adds an entry to the voice VLAN OUI table. Console(config)# voice vlan oui-table add 00:AA:BB description experimental voice vlan cos mode Use the voice vlan cos mode Interface Configuration mode command to select the OUI Voice VLAN Class Of Service mode. Use the no form of this command. to return to the default. Syntax voice vlan cos mode {src | all} no voice vlan cos mode 00:0f:e2 Huawei-3COM Phone 00:09:6e Avaya Phone560 Voice VLAN Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Voice_VLAN.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Parameters • src—QoS attributes are applied only on packets from IP phones. See the User Guidelines. • all—QoS attributes are applied only on all packets that are classified to the Voice VLAN. Command Mode Interface Configuration (Ethernet, port-channel) mode voice vlan cos Use the voice vlan cos Global Configuration mode command to set the OUI Voice VLAN Class of Service (CoS). Use the no form of this command to restore the default configuration. Syntax voice vlan cos cos [remark] no voice vlan cos Parameters • cos—Specifies the voice VLAN Class of Service. (Range: 0–7) • remark—Specifies that the L2 User Priority is remarked. Default Configuration The default CoS value is 6. The L2 User Priority is not remarked. Command Mode Global Configuration mode User Guidelines Example The following example sets the OUI Voice VLAN CoS to 6.Voice VLAN Commands 561 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Voice_VLAN.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Console(config)# voice vlan cos 7 voice vlan aging-timeout Use the voice vlan aging-timeout Global Configuration mode command to set the OUI Voice VLAN aging timeout interval. Use the no form of this command to restore the default configuation. Syntax voice vlan aging-timeout minutes no voice vlan aging-timeout Parameters minutes—Specifies the voice VLAN aging timeout interval in minutes. (Range: 1–43200) Default Configuration The default voice VLAN aging timeout interval is 1440 minutes. Command Mode Global Configuration mode Example The following example sets the OUI Voice VLAN aging timeout interval to 12 hours. Console(config)# voice vlan aging-timeout 720 voice vlan enable Use the voice vlan enable Interface Configuration (Ethernet, Port-channel) mode command to enable OUI Voice VLAN configuration on a port. Use the no form of this command to disable OUI Voice VLAN configuration on a port.562 Voice VLAN Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Voice_VLAN.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Syntax voice vlan enable no voice vlan enable Default Configuration Automatic voice VLAN configuration of a port is disabled. Command Mode Interface Configuration (Ethernet, Port-channel) mode User Guidelines The port is added to the voice VLAN if a packet with a source MAC address that is a telephony MAC address (defined by the voice vlan oui-table Global Configuration mode command) is trapped on the port. Note: The packet VLAN ID can be the voice VLAN ID or any other VLAN ID. The port joins the voice VLAN as a tagged port. If the time since the last MAC address with a telephony MAC address aged out exceeds the timeout limit (configured by the voice vlan aging-timeout Global Configuration mode command), the port is removed from the voice VLAN. Example The following example enables OUI Voice VLAN configuration on gigabitethernet port 1/0/2. Console(config)# interface gi1/0/2 Console(config-if)# voice vlan enable voice vlan secure Use the voice vlan secure Interface Configuration (Ethernet, Port-channel) mode command to enable the secure mode for the OUI Voice VLAN. Use the no form of this command to disable the secure mode. Syntax voice vlan secureVoice VLAN Commands 563 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Voice_VLAN.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY no voice vlan secure Default Configuration The voice VLAN secure mode is disabled. Command Mode Interface Configuration (Ethernet, Port-channel) mode User Guidelines Use this command to specify that packets that are classified to the voice VLAN with a source MAC address that is not a telephony MAC address (defined by the voice vlan oui-table Global Configuration mode command) are discarded. This command is relevant only to ports that were added to the voice VLAN automatically Example The following example enables the secure mode for the OUI Voice VLAN on gigabitethernet port 1/0/8. Console(config)# interface gi1/0/8 Console(config-if)# voice vlan secure show voice vlan Use the show voice vlan EXEC mode command to display the voice VLAN status for all interfaces or for a specific interface. Syntax show voice vlan [type {oui | auto}] [interface-id] Parameters type {oui | auto}—Specifies which information is printed: oui - common and the OUI Voice VLAN specific parameters are printed auto - common and the Auto Voice VLAN specific parameters are printed564 Voice VLAN Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Voice_VLAN.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY If the parameter is omitted the current Voice VLAN type is applied. interface-id—Specifies an interface ID. If the parameter is omitted than information about all interfaces are printed. Applied only for the OUI VLAN type. Parameters Range interface-id—Ethernet, Port-channel Command Mode EXEC mode Example Example 1. switch>show voice vlan Administrate Voice VLAN state is auto-triggered Operational Voice VLAN state is auto-enabled Best Local Voice VLAN-ID is 20 Best Local VPT is 4 Best Local DSCP is 1 Voice VLAN is received from switch 00:01:22:01:ab:87:45 Agreed Voice VLAN priority is 0 (active UC device) Agreed Voice VLAN-ID is 100 Agreed VPT is 0 Agreed DSCP is 0 Agreed VLAN Last Change is 10-Apr-10 20:01:00 Example 2. Administrate Voice VLAN state is auto-enabled Operational Voice VLAN state is auto-enabled Best Local Voice VLAN-ID is 1 (default) Best Local VPT is 0 (default) Best Local DSCP is 0 (default) Agreed Voice VLAN is received from switch 00:01:22:01:ab:87:45 Agreed Voice VLAN priority is 2 (static)Voice VLAN Commands 565 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Voice_VLAN.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Agreed Voice VLAN-ID is 20 Agreed VPT is 7 Agreed DSCP is 20 Agreed VLAN Last Change is 10-Apr-10 20:01:00 Example 3. Administrate Voice VLAN state is auto-triggered Operational Voice VLAN state is disabled Example 4. Administrate Voice VLAN state is disabled Operational Voice VLAN state is disabled Best Local Voice VLAN-ID is 20 Best Local VPT is 0 (default) Best Local DSCP is 0 (default) Aging timeout: 1440 minutes CoS: 6 Remark: Yes Example 5. Administrate Voice VLAN state is oui-enabled Operational Voice VLAN state is oui-enabled Best Local Voice VLAN-ID is 1 (default) Best Local VPT is 4 Best Local DSCP is 1 Aging timeout: 1440 minutes CoS: 6 Remark: Yes OUI table MAC Address - Prefix Description -------------------- ------------------ 00:E0:BB 3COM 00:03:6B Cisco566 Voice VLAN Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Voice_VLAN.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY 00:E0:75 Veritel 00:D0:1E Pingtel 00:01:E3 Simens 00:60:B9 NEC/Philips 00:0F:E2 Huawei-3COM 00:09:6E Avaya Interface Enabled Secure Activated cos Mode ------------- ------- ------- --------- -------- gi1/0/1 Yes Yes Yes all gi1/0/2 Yes Yes No src gi1/0/3 No No - srcDHCP Snooping and ARP Inspection Commands 567 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\DHCP_Snooping.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY 36 DHCP Snooping and ARP Inspection Commands ip dhcp snooping Use the ip dhcp snooping Global Configuration mode command to enable Dynamic Host Configuration Protocol (DHCP) Snooping globally. Use the no form of this command to restore the default configuration. Syntax ip dhcp snooping no ip dhcp snooping Default Configuration DHCP snooping is disabled. Command Mode Global Configuration mode User Guidelines For any DHCP Snooping configuration to take effect, DHCP Snooping must be enabled globally. DHCP Snooping on a VLAN is not active until DHCP Snooping on a VLAN is enabled by using the ip dhcp snooping vlan Global Configuration mode command. Example The following example enables DHCP Snooping on the device. Console(config)# ip dhcp snooping568 DHCP Snooping and ARP Inspection Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\DHCP_Snooping.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY ip dhcp snooping vlan Use the ip dhcp snooping vlan Global Configuration mode command to enable DHCP Snooping on a VLAN. Use the no form of this command to disable DHCP Snooping on a VLAN. Syntax ip dhcp snooping vlan vlan-id no ip dhcp snooping vlan-id Parameters vlan-id—Specifies the VLAN ID. Default Configuration DHCP Snooping on a VLAN is disabled. Command Mode Global Configuration mode User Guidelines DHCP Snooping must be enabled globally before enabling DHCP Snooping on a VLAN. Example The following example enables DHCP Snooping on VLAN 21. Console(config)# ip dhcp snooping vlan 21 ip dhcp snooping trust Use the ip dhcp snooping trust Interface Configuration (Ethernet, Portchannel) mode command to configure a port as trusted for DHCP snooping purposes. Use the no form of this command to restore the default configuration.DHCP Snooping and ARP Inspection Commands 569 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\DHCP_Snooping.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Syntax ip dhcp snooping trust no ip dhcp snooping trust Default Configuration The interface is untrusted. Command Mode Interface Configuration (Ethernet, Port-channel) mode User Guidelines Configure as trusted the ports that are connected to a DHCP server or to other switches or routers. Configure the ports that are connected to DHCP clients as untrusted. Example The following example configures gigabitethernet port 1/0/5 as trusted for DHCP Snooping. Console(config)# interface gi1/0/5 Console(config-if)# ip dhcp snooping trust ip dhcp snooping information option alloweduntrusted Use the ip dhcp snooping information option allowed-untrusted Global Configuration mode command to allow a device to accept DHCP packets with option-82 information from an untrusted port. Use the no form of this command to drop these packets from an untrusted port. Syntax ip dhcp snooping information option allowed-untrusted no ip dhcp snooping information option allowed-untrusted570 DHCP Snooping and ARP Inspection Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\DHCP_Snooping.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Default Configuration DHCP packets with option-82 information from an untrusted port are discarded. Command Mode Global Configuration mode Example The following example allows a device to accept DHCP packets with option- 82 information from an untrusted port. Console(config)# ip dhcp snooping information option alloweduntrusted ip dhcp snooping verify Use the ip dhcp snooping verify Global Configuration mode command to configure a device to verify that the source MAC address in a DHCP packet received on an untrusted port matches the client hardware address. Use the no form of this command to disable MAC address verification in a DHCP packet received on an untrusted port. Syntax ip dhcp snooping verify no ip dhcp snooping verify Default Configuration The switch verifies that the source MAC address in a DHCP packet received on an untrusted port matches the client hardware address in the packet. Command Mode Global Configuration modeDHCP Snooping and ARP Inspection Commands 571 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\DHCP_Snooping.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example The following example configures a device to verify that the source MAC address in a DHCP packet received on an untrusted port matches the client hardware address. Console(config)# ip dhcp snooping verify ip dhcp snooping database Use the ip dhcp snooping database Global Configuration mode command to enable the DHCP Snooping binding database file. Use the no form of this command to delete the DHCP Snooping binding database file. Syntax ip dhcp snooping database no ip dhcp snooping database Default Configuration The DHCP Snooping binding database file is not defined. Command Mode Global Configuration mode User Guidelines The DHCP Snooping binding database file resides on Flash. To ensure that the lease time in the database is accurate, the Simple Network Time Protocol (SNTP) must be enabled and configured. The device writes binding changes to the binding database file only if the device system clock is synchronized with SNTP. Example The following example enables the DHCP Snooping binding database file. Console(config)# ip dhcp snooping database572 DHCP Snooping and ARP Inspection Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\DHCP_Snooping.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY ip dhcp snooping database update-freq Use the ip dhcp snooping database update-freq Global Configuration mode command to set the update frequency of the DHCP Snooping binding database file. Use the no form of this command to restore the default configuration. Syntax ip dhcp snooping database update-freq seconds no ip dhcp snooping database update-freq Parameters seconds—Specifies the update frequency in seconds. (Range: 600–86400) Default Configuration The default update frequency value is 1200 seconds. Command Mode Global Configuration mode Example The following example sets the DHCP Snooping binding database file update frequency to 1 hour. Console(config)# ip dhcp snooping database update-freq 3600 ip dhcp snooping binding Use the ip dhcp snooping binding Privileged EXEC mode command to configure the DHCP Snooping binding database and add binding entries to the database. Use the no form of this command to delete entries from the binding database. Syntax ip dhcp snooping binding mac-address vlan-id ip-address interface-id expiry {seconds | infinite}DHCP Snooping and ARP Inspection Commands 573 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\DHCP_Snooping.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY no ip dhcp snooping binding mac-address vlan-id Parameters • mac-address— pecifies a MAC address. • vlan-id—Specifies a VLAN number. • ip-address—Specifies an IP address. • interface-id—Specifies an interface ID. The interface ID can be one of the following types: Ethernet port or Port-channel. • expiry seconds—Specifies the time interval, in seconds, after which the binding entry is no longer valid. (Range: 10–4294967295) • expiry infinite—Specifies infinite lease time. Default Configuration No static binding exists. Command Mode Privileged EXEC mode User Guidelines After entering this command, an entry is added to the DHCP Snooping database. If the DHCP Snooping binding file exists, the entry is also added to that file. The entry is displayed in the show commands as a DHCP Snooping entry. The user cannot delete dynamic temporary entries for which the IP address is 0.0.0.0. Example The following example adds a binding entry to the DHCP Snooping binding database. Console# ip dhcp snooping binding 0060.704C.73FF 23 176.10.1.1 ethernet 1/5 expiry 900574 DHCP Snooping and ARP Inspection Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\DHCP_Snooping.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY clear ip dhcp snooping database Use the clear ip dhcp snooping database Privileged EXEC mode command to clear the DHCP Snooping binding database. Syntax clear ip dhcp snooping database Command Mode Privileged EXEC mode Example The following example clears the DHCP Snooping binding database. Console# clear ip dhcp snooping database show ip dhcp snooping Use the show ip dhcp snooping EXEC mode command to display the DHCP snooping configuration for all interfaces or for a specific interface. Syntax show ip dhcp snooping [interface-id] Parameters interface-id—Specifies an interface ID. The interface ID can be one of the following types: Ethernet port or Port-channel. Command Mode EXEC mode Example The following example displays the DHCP snooping configuration. console# show ip dhcp snooping DHCP snooping is EnabledDHCP Snooping and ARP Inspection Commands 575 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\DHCP_Snooping.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY DHCP snooping is configured on following VLANs: 21 DHCP snooping database is Enabled Relay agent Information option 82 is Enabled Option 82 on untrusted port is allowed Verification of hwaddr field is Enabled DHCP snooping file update frequency is configured to: 6666 seconds Interface Trusted ----------- ------------ gi1/0/1 Yes gi1/0/2 Yes show ip dhcp snooping binding Use the show ip dhcp snooping binding User EXEC mode command to display the DHCP Snooping binding database and configuration information for all interfaces or for a specific interface. Syntax show ip dhcp snooping binding [mac-address mac-address] [ip-address ipaddress] [vlan vlan-id] [interface-id] Parameters • mac-address mac-address—Specifies a MAC address. • ip-address ip-address—Specifies an IP address. • vlan vlan-id—Specifies a VLAN ID. • interface-id—Specifies an interface ID. The interface ID can be one of the following types: Ethernet port or Port-channel. Command Mode User EXEC mode576 DHCP Snooping and ARP Inspection Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\DHCP_Snooping.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example The following examples displays the DHCP snooping binding database and configuration information for all interfaces on a device. ip arp inspection Use the ip arp inspection Global Configuration mode command globally to enable Address Resolution Protocol (ARP) inspection. Use the no form of this command to disable ARP inspection. Syntax ip arp inspection no ip arp inspection Default Configuration ARP inspection is disabled. Command Mode Global Configuration mode User Guidelines Note that if a port is configured as an untrusted port, then it should also be configured as an untrusted port for DHCP Snooping, or the IP-address-MACaddress binding for this port should be configured statically. Otherwise, hosts that are attached to this port cannot respond to ARPs. Console# show ip dhcp snooping binding Update frequency: 1200 Total number of binding: 2 Mac Address ------------ 0060.704C.73 FF 0060.704C.7B C1 IP Address ---------- 10.1.8.1 10.1.8.2 Lease (sec) ------- 7983 92332 Type -------- snooping snooping (s) VLAN ---- 3 3 Interface --------- 1/21 1/22DHCP Snooping and ARP Inspection Commands 577 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\DHCP_Snooping.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example The following example enables ARP inspection on the device. Console(config)# ip arp inspection ip arp inspection vlan Use the ip arp inspection vlan Global Configuration mode command to enable ARP inspection on a VLAN, based on the DHCP Snooping database. Use the no form of this command to disable ARP inspection on a VLAN. Syntax ip arp inspection vlan vlan-id no ip arp inspection vlan vlan-id Parameters vlan-id—Specifies the VLAN ID. Default Configuration DHCP Snooping based ARP inspection on a VLAN is disabled. Command Mode Global Configuration mode User Guidelines This command enables ARP inspection on a VLAN based on the DHCP snooping database. Use the ip arp inspection list assign Global Configuration mode command to enable static ARP inspection. Example The following example enables DHCP Snooping based ARP inspection on VLAN 23. Console(config)# ip arp inspection vlan 23578 DHCP Snooping and ARP Inspection Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\DHCP_Snooping.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY ip arp inspection trust Use the ip arp inspection trust Interface Configuration (Ethernet, Portchannel) mode command to configure an interface trust state that determines if incoming Address Resolution Protocol (ARP) packets are inspected. Use the no form of this command to restore the default configuration. Syntax ip arp inspection trust no ip arp inspection trust Default Configuration The interface is untrusted. Command Mode Interface Configuration (Ethernet, Port-channel) mode User Guidelines The device does not check ARP packets that are received on the trusted interface; it only forwards the packets. For untrusted interfaces, the device intercepts all ARP requests and responses. It verifies that the intercepted packets have valid IP-to-MAC address bindings before updating the local cache and before forwarding the packet to the appropriate destination. The device drops invalid packets and logs them in the log buffer according to the logging configuration specified with the ip arp inspection log-buffer vlan Global Configuration mode command. Example The following example configures gigabitethernet port 1/0/3 as a trusted interface. Console(config)# interface gi1/0/3 Console(config-if)# ip arp inspection trustDHCP Snooping and ARP Inspection Commands 579 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\DHCP_Snooping.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY ip arp inspection validate Use the ip arp inspection validate Global Configuration mode command to perform specific checks for dynamic Address Resolution Protocol (ARP) inspection. Use the no form of this command to restore the default configuration. Syntax ip arp inspection validate no ip arp inspection validate Default Configuration ARP inspection validation is disabled. Command Mode Global Configuration mode User Guidelines The following checks are performed: • Source MAC address: Compares the source MAC address in the Ethernet header against the sender MAC address in the ARP body. This check is performed on both ARP requests and responses. • Destination MAC address: Compares the destination MAC address in the Ethernet header against the target MAC address in the ARP body. This check is performed for ARP responses. • IP addresses: Compares the ARP body for invalid and unexpected IP addresses. Addresses include 0.0.0.0, 255.255.255.255, and all IP multicast addresses. Example The following example executes ARP inspection validation. Console(config)# ip arp inspection validate580 DHCP Snooping and ARP Inspection Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\DHCP_Snooping.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY ip arp inspection list create Use the ip arp inspection list create Global Configuration mode command to create a static ARP binding list and enters the ARP list configuration mode. Use the no form of this command to delete the list. Syntax ip arp inspection list create name no ip arp inspection list create name Parameters name—Specifies the static ARP binding list name. (Length: 1–32 characters) Default Configuration No static ARP binding list exists. Command Mode Global Configuration mode User Guidelines Use the ip arp inspection list assign command to assign the list to a VLAN. Example The following example creates the static ARP binding list ‘servers’ and enters the ARP list configuration mode. Console(config)# ip arp inspection list create servers Console(config-ARP-list)# ip mac Use the ip mac ARP-list Configuration mode command to create a static ARP binding. Use the no form of this command to delete a static ARP binding. Syntax ip ip-address mac mac-addressDHCP Snooping and ARP Inspection Commands 581 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\DHCP_Snooping.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY no ip ip-address mac mac-address Parameters • ip-address—Specifies the IP address to be entered to the list. • mac-address—Specifies the MAC address associated with the IP address. Default Configuration No static ARP binding is defined. Command Mode ARP-list Configuration mode Example The following example creates a static ARP binding. Console(config)# ip arp inspection list create servers Console(config-ARP-list)# ip 172.16.1.1 mac 0060.704C.7321 Console(config-ARP-list)# ip 172.16.1.2 mac 0060.704C.7322 ip arp inspection list assign Use the ip arp inspection list assign Global Configuration mode command to assign a static ARP binding list to a VLAN. Use the no form of this command to delete the assignment. Syntax ip arp inspection list assign vlan-id name no ip arp inspection list assign vlan Parameters • vlan-id—Specifies the VLAN ID. • name—Specifies the static ARP binding list name. Default Configuration No static ARP binding list assignment exists.582 DHCP Snooping and ARP Inspection Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\DHCP_Snooping.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Command Mode Global Configuration mode Example The following example assigns the static ARP binding list Servers to VLAN 37. Console(config)# ip arp inspection list assign 37 servers ip arp inspection logging interval Use the ip arp inspection logging interval Global Configuration mode command to set the minimum time interval between successive ARP SYSLOG messages. Use the no form of this command to restore the default configuration. Syntax ip arp inspection logging interval {seconds | infinite} no ip arp inspection logging interval Parameters • seconds—Specifies the minimum time interval between successive ARP SYSLOG messages. A 0 value means that a system message is immediately generated. (Range: 0–86400) • infinite—Specifies that SYSLOG messages are not generated. Default Configuration The default minimum ARP SYSLOG message logging time interval is 5 seconds. Command Mode Global Configuration modeDHCP Snooping and ARP Inspection Commands 583 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\DHCP_Snooping.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example The following example sets the minimum ARP SYSLOG message logging time interval to 60 seconds. Console(config)# ip arp inspection logging interval 60 show ip arp inspection Use the show ip arp inspection EXEC mode command to display the ARP inspection configuration for all interfaces or for a specific interface. Syntax show ip arp inspection [interface-id] Parameters interface-id—Specifies an interface ID. The interface ID can be one of the following types:Ethernet port or Port-channel. Command Mode EXEC mode Example The following example displays the ARP inspection configuration. console# show ip arp inspection IP ARP inspection is Enabled IP ARP inspection is configured on following VLANs: 1 Verification of packet header is Enabled IP ARP inspection logging interval is: 222 seconds Interface Trusted ----------- ----------- gi1/0/1 Yes gi1/0/2 Yes584 DHCP Snooping and ARP Inspection Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\DHCP_Snooping.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY show ip arp inspection list Use the show ip arp inspection list Privileged EXEC mode command to display the static ARP binding list. Syntax show ip arp inspection list Command Mode Privileged EXEC mode Example The following example displays the static ARP binding list. show ip arp inspection statistics Use the show ip arp inspection statistics EXEC command to display Statistics For The Following Types Of Packets That Have Been Processed By This Feature: Forwarded, Dropped, IP/MAC Validation Failure. Syntax show ip arp inspection statistics [vlan vlan-id] Parameters vlan-id—Specifies VLAN ID. Console# show ip arp inspection list List name: servers Assigned to VLANs: 1,2 IP --------- 172.16.1.1 172.16.1.2 ARP -------------- 0060.704C.7322 0060.704C.7322DHCP Snooping and ARP Inspection Commands 585 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\DHCP_Snooping.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Command Mode EXEC mode User Guidelines To clear ARP Inspection counters use the clear ip arp inspection statistics CLI command. Counters values are kept when disabling the ARP Inspection feature. Example console# show ip arp inspection statistics Vlan Forwarded Packets Dropped Packets IP/MAC Failures ---- ----------------------------------------------- 2 1500100 80 clear ip arp inspection statistics Use the clear ip arp inspection statistics Privileged EXEC mode command to clear statistics ARP Inspection statistics globally. Syntax clear ip arp inspection statistics [vlan vlan-id] Parameters vlan-id—Specifies VLAN ID Command Mode Privileged EXEC mode Example console# clear ip arp inspection statistics586 DHCP Snooping and ARP Inspection Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\DHCP_Snooping.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY ip dhcp information option Use the ip dhcp information option Global Configuration command to enable DHCP option-82 data insertion. Use the no form of this command to disable DHCP option-82 data insertion. Syntax ip dhcp information option no ip dhcp information option Parameters This command has no arguments or keywords. Default Configuration DHCP option-82 data insertion is disabled. Command Mode Global Configuration mode User Guidelines DHCP option 82 would be enabled only if DHCP snooping or DHCP relay are enabled. Example console(config)# ip dhcp information option show ip dhcp information option The show ip dhcp information option EXEC mode command displays the DHCP Option 82 configuration. Syntax show ip dhcp information optionDHCP Snooping and ARP Inspection Commands 587 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\DHCP_Snooping.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Command Mode EXEC mode Example The following example displays the DHCP Option 82 configuration. console# show ip dhcp information option Relay agent Information option is Enabled588 DHCP Snooping and ARP Inspection Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\DHCP_Snooping.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LYiSCSI Commands 589 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\iSCSI.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY 37 iSCSI Commands iscsi enable Use the iscsi enable Global Configuration mode command to globally enable Internet Small Computer System Interface (iSCSI) awareness. This command changes the Flow Control global mode to receive-only, enables Flow Control on all interfaces, and enables jumbo frames. Use the no form of this command to globally disable iSCSI awareness. This version of the command does not affect the Flow Control global mode, does not disable Flow Control on all interfaces, and does not disable jumbo frames. Syntax iscsi enable no iscsi enable Default Configuration Disabled. Command Mode Global Configuration mode User Guidelines An iSCSI VLAN must be configured by using the iscsi vlan command before the device can assign a specific VLAN to iSCSI flows. When executing the no iscsi enable command, iSCSI resources (TCAM) are released.590 iSCSI Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\iSCSI.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example The following example enables iSCSI awareness globally. Console(config)# iscsi enable iscsi target port Use the iscsi target port Global Configuration mode command to configures iSCSI target ports. Use the no form of this command to delete the iSCSI target ports. Syntax iscsi target port tcp-port-1 [tcp-port-2.… tcp-port-8] [address ip-address] [name targetname] no iscsi target port tcp-port-1 [tcp-port-2.… tcp-port-8] [address ipaddress] Parameters • tcp-port—Specifies the TCP port number or list of TCP port numbers on which iSCSI targets listen to requests. Up to 8 TCP ports can be defined in the system, in one command or by using multiple commands. (Range: 1–65536) • address ip-address—Specifies the iSCSI target IP address. If the no form is used and the TCP port to be deleted is one that was bound to a specific IP address, the IP address field must be present. • name targetname—Specifies the iSCSI target name. The name can be statically configured, but it can also be obtained from iSNS or from the sendTargets response. The initiator must present both its iSCSI Initiator Name and the iSCSI Target Name to which it wishes to connect in the first login request of a new session or connection. The name must comprise valid characters, as specified by RFC 3722. (Length: 1–223 characters) Default Configuration iSCSI well-known ports 3260 and 860 are configured as the default target ports, but they can be removed just as any other configured target.iSCSI Commands 591 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\iSCSI.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Command Mode Global Configuration mode User Guidelines When working with private iSCSI ports (not IANA assigned iSCSI ports 3260 and 860), it is recommended that the target IP address also be specified, so that the device snoops only frames for which its TCP destination port is one of the configured TCP ports and their destination IP is the target's IP address. In this way, the CPU is not falsely loaded by non-iSCSI flows if other applications choose to use these un-reserved ports. It is the user’s responsibility to not define as iSCSI ports any ports that are well-known or are configured on the product for other uses, such as Telnet, SSH, HTTP, HTTPS, SNMP, or DHCP. To bind a port to an IP address, and the port is already defined but not bound to an IP address, first remove the port by using the no form of the command and then add it again with the relevant IP address. Target names are displayed only when using the show iscsi command. These names are not used to match (or to perform any sanity check on) the iSCSI session information acquired by snooping. A maximum of 16 TCP ports can be configured either bound to IP or not. This number can be changed by using the iscsi max target ports command. However, the change takes effect only after reset. Example The following example configures an iSCSI target port. Console(config)# iscsi target port 30001 address 176.16.1.1 name iqn.1993-11.com.diskvendor:diskarrays.sn.45678.tape:sys1.xyz iscsi cos Use the iscsi cos Global Configuration mode command to set the quality of service profile to apply to iSCSI flows. Use the no form of this command to restore the default configuration.592 iSCSI Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\iSCSI.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Syntax iscsi cos enable iscsi cos disable iscsi cos {vpt vpt | dscp dscp} [remark] Parameters • enable – enables iSCSI CoS • vpt —Specifies the VLAN Priority Tag (VPT) that iSCSI frames are assigned. (Range: 0–7) • dscp —Specifies the Differentiated Services Code Point (DSCP) that iSCSI frames are assigned. (Range: 0–63) • remark—Marks the iSCSI frames with the configured VPT or DSCP when egressing the switch. Default Configuration iSCSI COS is disabled by default, the default profile is VPT 5. Command Mode Global Configuration mode User Guidelines The iscsi cos enable command is used to enable an iSCSI CoS profile (whether the default profile or one configured by using the iscsi cos vpt/dscp command). When executing the iscsi cos disable command, iSCSI CoS configuration is not deleted. Use the Remark option to prioritize iSCSI traffic in the next hop switch, which might be iSCSI-unaware. iSCSI flows are assigned by default with a VPT/DSCP that is mapped to the highest queue not used for stack management or voice VLAN (if the mapping was not changed by the user). The user should also configure the relevant (vpt to queue/dscp to queue) table to complete the setting. Setting the VPT/DSCP sets the QoS profile that determines the egress queue to which the frame is mapped. The switch default setting for egress queues iSCSI Commands 593 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\iSCSI.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY scheduling is strict priority. The downside of strict priority queuing is that in certain circumstances (heavy high priority traffic), lower priority traffic may become bandwidth-starved. In WRR, the queue to which the flow is assigned can be set to get the required percentage. The user may want to complete the QoS setting by configuring the relevant ports to work in WRR mode with adequate weights. Example The following example sets the QoS profile to apply to iSCSI flows by assigning iSCSI frames with DSCP 31. Console(config)# iscsi cos enable Console(config)# iscsi cos dscp 31 iscsi aging-time Use the iscsi aging-time Global Configuration mode command to set the idle time interval for iSCSI sessions. Use the no form of this command. to cancel iSCSI session aging. Syntax iscsi aging-time minutes no iscsi aging-time Parameters minutes—Specifies the iSCSI session idle time interval in minutes before the session is terminated. (Minimum: 1 minute) Default Configuration The default idle time interval for iSCSI sessions is 120 minutes. Command Mode Global Configuration mode User Guidelines iSCSI session aging time may be longer than the defined aging time. This is due to a lack of ASIC counters used by the application for aging.594 iSCSI Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\iSCSI.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY When changing the iSCSI session aging time, the following occurs: • If the aging time is increased, the aging time for the current session is recalculated and increased by the difference between the new aging time and the current aging time. • If the aging time is decreased, the aging time for the current session is recalculated and decreased by the difference between the new aging time and the current aging time. If, after recalculation, it is determined that the current session idle time is greater than the new aging time, the session is immediately terminated. Example The following example sets the aging time for iSCSI sessions to 10 minutes. Console(config)# iscsi aging-time 10 iscsi max-tcp-connections To set the maximum number of iSCSI sessions that can be supported use the iscsi max-tcp-connections command in global configuration mode. To return to default, use the no form of this command. Syntax iscsi max-tcp-connections max-connections no iscsi max-tcp-connections Parameters max-connections—Specifies the maximum number of iSCSI connections that can be supported. (5-1024 ) Default Configuration 256 TCP connections Command Mode Global Configuration modeiSCSI Commands 595 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\iSCSI.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY User Guidelines The new setting will take affect only after reset. This command enables the user to define the number of iSCSI connections supported in the system. The amount of iSCSI sessions has effect on the system memory consumption. The memory consumption is ~500 bytes per session and 20 bytes per connection (256 sessions each with 4 connections consumes ~145KB). In the current implementation, if more than 1024 connections exist, you will still get QoS, but only 1024 connections will be displayed show iscsi Use the show iscsi Privileged EXEC mode command to display the iSCSI configuration. Syntax show iscsi Command Mode Privileged EXEC mode User Guidelines The iSCSI targets displayed are the statically configured targets only. To display all iSCSI entities (targets and initiators), whether statically configured or dynamically discovered, use the show iscsi sessions command.596 iSCSI Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\iSCSI.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example The following example display the iSCSI configuration. show iscsi sessions Use the show iscsi sessions Privileged EXEC mode command to display the iSCSI sessions. Syntax show iscsi sessions [detailed] Parameters detailed—Specifies that the displayed list is detailed. Command Mode Privileged EXEC mode Console# show iscsi iSCSI disabled iSCSI COS disabled iSCSI vpt is 5, Remark iSCSI aging time: 5 min. Maximum number of connections: 256 iSCSI targets and TCP ports: ---------------------------- TCP Target IP Name Port Address --------- ------------------ -------------------- 860 0.0.0.0 3260 0.0.0.0 9876 0.0.0.0 20002 0.0.0.0 20003 0.0.0.0 25555 0.0.0.0iSCSI Commands 597 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\iSCSI.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY User Guidelines The target list is not sorted alphabetically. The aging mechanism checks session activity in a group of N TCP iSCSI connections. In the worst case, if all 256 sessions are monitored and are not terminated gracefully, the existing mechanism causes inaccuracies; the last group of monitored iSCSI sessions are aged out after (256/N)*aging-time. In general, the higher the number of ungraceful terminated iSCSI TCP connections, the higher the aging-time inaccuracy. Example The following example displays the iSCSI sessions Console# show iscsi sessions Target: iqn.1993-11.com.disk-vendor:diskarrays.sn.45678 -------------------------------------------------------- Initiator: iqn.1992-04.com.os-vendor.plan9:cdrom.12 ISID: 11 Initiator: iqn.1995-05.com.os-vendor.plan9:cdrom.10 ISID: 222 ---------------------------------------------------------- Target: iqn.103-1.com.storagevendor:sn.43338.storage.tape:sys1.xyz ---------------------------------------------------------- Initiator: iqn.1992-04.com.os-vendor.plan9:cdrom.12 ISID: 44 Initiator: iqn.1995-05.com.os-vendor.plan9:cdrom.10 ISID: 65 ---------------------------------------------------------- Console# show iscsi sessions detailed Target: iqn.1993-11.com.disk-vendor:diskarrays.sn.45678 ---------------------------------------------------------- Session 1: ---------598 iSCSI Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\iSCSI.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Initiator: iqn.1992-04.com.osvendor.plan9:cdrom.12.storage:sys1.xyz UP Time: 02:10:45 (DD:HH:MM) Time for aging out: 10 min ISID: 11 Initiator IP Address ---------- 172.16.1.3 172.16.1.4 172.16.1.5 Initiator TCP Port --------- 49154 49155 49156 Target IP Address ----------- 172.16.1.20 172.16.1.21 172.16.1.22 Target IP Port ------- 30001 30001 30001 Session 2: --------- Initiator: iqn.1995-05.com.os-vendor.plan9:cdrom.10 Status: Active UP Time: 00:04:50 (DD:HH:MM) Time for aging out: 2 min ISID: 22 Initiator IP Address ---------- 172.16.1.30 172.16.1.40 Initiator TCP Port --------- 49200 49201 Target IP Address ---------- 172.16.1.20 172.16.1.21 Target IP Port ------- 30001 30001IP Addressing Commands 599 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\IP_Addressing.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY 38 IP Addressing Commands address Use the ip address Interface Configuration (Ethernet, VLAN, Port-channel) mode command to define an IP address for an interface. Use the no form of this command to remove an IP address definition. Syntax If the product is a switch router. ip address ip-address {mask | prefix-length} no ip address [ip-address] If the product is a switch only. ip address ip-address {mask | prefix-length} [default-gateway ip-address] no ip address [ip-address] If the product is switch only and supports a single IP address: ip address ip-address {mask | prefix-length} [default-gateway ip-address] no ip address Parameters • ip-address—Specifies the IP address. • mask—Specifies the network mask of the IP address. • prefix-length—Specifies the number of bits that comprise the IP address prefix.The prefix length must be preceded by a forward slash (/). (Range: 8–30) • default-gateway ip-address—Specifies the default gateway IP address.600 IP Addressing Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\IP_Addressing.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Default Configuration No IP address is defined for interfaces. Command Mode Interface Configuration (Ethernet, VLAN, Port-channel) mode. It cannot be configured for a range of interfaces (range context). User Guidelines Defining a static IP address on an interface implicitly removes the DHCP client configuration on the interface. If the product supports multiple IP addresses: The product supports up to x IP addresses. The IP addresses should be from different IP subnets. When adding an IP address from a subnet that already exists in the list, the new IP address replaces the existing IP address from that subnet. If the product is switch only and supports a single IP address. If the IP address configured in global context then it would be bound to the currently defined management interface. If the management interface is Default VLAN and the VID of the default VLAN is changed then when new setting is applied, the IP address will be automatically redefined on the new Default VLAN. If the IP address is configured in Interface context then the IP address is bound to the interface in context. If a static IP address is already defined, the user must do no IP address in the relevant interface context before changing the IP address. If a dynamic IP address is already defined, the user must do no ip address in the relevant interface context before configuring another dynamic IP address. The Interface context could be a port, LAG or VLAN, depending on support that is defined for the product. Example The following example configures VLAN 1 with IP address 131.108.1.27 and subnet mask 255.255.255.0. Console(config)# interface vlan 1IP Addressing Commands 601 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\IP_Addressing.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Console(config-if)# ip address 131.108.1.27 255.255.255.0 ip address dhcp Use the ip address dhcp Interface Configuration (Ethernet, VLAN, Portchannel) mode command to acquire an IP address for an Ethernet interface from the Dynamic Host Configuration Protocol (DHCP) server. Use the no form of this command to release an acquired IP address. Syntax ip address dhcp no ip address dhcp Parameters No parameters Command Mode Interface Configuration (Ethernet, VLAN, Port-channel) mode. It cannot be configured for a range of interfaces (range context). User Guidelines The ip address dhcp command allows any interface to dynamically learn its IP address by using the DHCP protocol. DHCP client configuration on an interface implicitly removes the static IP address configuration on the interface. If the device is configured to obtain its IP address from a DHCP server, it sends a DHCPDISCOVER message to provide information about itself to the DHCP server on the network. If the ip address dhcp command is used with or without the optional keyword, the DHCP option 12 field (host name option) is included in the DISCOVER message. By default, the host name specified in the option 12 field is the globally configured device host name. The no ip address dhcp command releases any IP address that was acquired, and sends a DHCPRELEASE message.602 IP Addressing Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\IP_Addressing.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example The following example acquires an IP address for gigabitethernet port 1/0/16 from DHCP. Console(config)# interface gi1/0/16 Console(config-if)# ip address dhcp renew dhcp Use the renew dhcp Privileged EXEC mode command to renew an IP address that was acquired from a DHCP server for a specific interface. Syntax renew dhcp { interface-id} [force-autoconfig] Parameters interface-id—Specifies an interface ID. The interface ID can be one of the following types: Ethernet port, Port-channel or VLAN. force-autoconfig - In the case the DHCP server holds a DHCP option 67 record for the assigned IP address, the file would overwrite the existing device configuration Command Mode Privileged EXEC mode User Guidelines Note that this command does not enable DHCP on an interface. If DHCP is not enabled on the requested interface, the command returns an error message. If DHCP is enabled on the interface and an IP address was already acquired, the command tries to renew that IP address. If DHCP is enabled on the interface and an IP address has not yet been acquired, the command initiates a DHCP request.IP Addressing Commands 603 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\IP_Addressing.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example The following example renews an IP address that was acquired from a DHCP server for VLAN 19. Console# renew dhcp vlan 19 ip default-gateway The ip default-gateway Global Configuration mode command defines a default gateway (device). Use the no form of this command to restore the default configuration. Syntax ip default-gateway ip-address no ip default-gateway Parameters ip-address—Specifies the default gateway IP address. Command Mode Global Configuration mode Default Configuration No default gateway is defined. Example The following example defines default gateway 192.168.1.1. Console(config)# ip default-gateway 192.168.1.1 show ip interface Use the show ip interface EXEC mode command to display the usability status of configured IP interfaces.604 IP Addressing Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\IP_Addressing.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Syntax show ip interface [interface-id ] Parameters interface-id—Specifies an interface ID. The interface ID can be one of the following types: Ethernet port, Port-channel or VLAN. Command Mode EXEC mode Example The following example displays the configured IP interfaces and their types. console# show ip interface IP Address I/F Type Directed Precedence Status Broadcast ------------- ------ ------- -------- ---------- ------- 10.5.234.232/24 vlan 1 Static disable No Valid arp Use the arp Global Configuration mode command to add a permanent entry to the Address Resolution Protocol (ARP) cache. Use the no form of this command to remove an entry from the ARP cache. Syntax arp ip-address mac-address [interface-id]] no arp ip-address Parameters • ip-address—IP address or IP alias to map to the specified MAC address. • mac-address—MAC address to map to the specified IP address or IP alias. • interface-id—interface ID. Can be Ethernet port, Port-channel or VLAN.IP Addressing Commands 605 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\IP_Addressing.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Command Mode Global Configuration mode Default Configuration No permanent entry is defined. User Guidelines The software uses ARP cache entries to translate 32-bit IP addresses into 48- bit hardware (MAC) addresses. Because most hosts support dynamic address resolution, static ARP cache entries generally do not need to be specified. Example The following example adds IP address 198.133.219.232 and MAC address 00:00:0c:40:0f:bc to the ARP table. Console(config)# arp 198.133.219.232 00:00:0c:40:0f:bc ethernet 1/6 arp timeout (Global) Use the arp timeout Global Configuration mode command to set the time interval during which an entry remains in the ARP cache. Use the no form of this command to restore the default configuration. Syntax arp timeout seconds no arp timeout Parameters seconds—Specifies the time interval (in seconds) during which an entry remains in the ARP cache. (Range: 1–40000000) Default Configuration The default ARP timeout is 60000 seconds in Router mode, and 300 seconds in Switch mode.606 IP Addressing Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\IP_Addressing.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Command Mode Global Configuration mode Example The following example configures the ARP timeout to 12000 seconds. Console(config)# arp timeout 12000 arp timeout Use the arp timeout inTerface Configuration command to configure how long an entry remains in the ARP cache for specific interface. Use the no form of this command restore the default value. Syntax arp timeout seconds no arp timeout Parameters seconds—Time (in seconds) that an entry remains in the ARP cache. It is recommended not to set it to less than 3600. (Range: 1–40000000) Default Defined by the arp timeout Global Configuration command Command Mode Interface Configuration (Ethernet, VLAN, Port-channel) mode. It cannot be configured for a range of interfaces (range context). User Guidelines This configuration can be applied only if at least one IP address defined on specific interface. Example Console (config)# interface vlan 1 Console(config-if)# arp timeout 12000IP Addressing Commands 607 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\IP_Addressing.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY ip arp proxy disable Use the ip arp proxy disable Global Configuration mode command to globally disable proxy Address Resolution Protocol (ARP). Use the no form of this command reenable proxy ARP. Syntax ip arp proxy disable no ip arp proxy disable Parameters This command has no arguments or key words. Default Enabled by default. Command Mode Global Configuration mode User Guidelines The ip arp proxy disable command overrides any proxy ARP interface configuration. ip proxy-arp Use the ip proxy-arp Interface Configuration mode command to enable an ARP proxy on specific interfaces. Use the no form of this command disable it. Syntax ip proxy-arp no ip proxy-arp Default Configuration ARP Proxy is disabled.608 IP Addressing Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\IP_Addressing.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Command Mode Interface Configuration (Ethernet, VLAN, Port-channel) mode. It cannot be configured for a range of interfaces (range context). User Guidelines This configuration can be applied only if at least one IP address is defined on a specific interface. Example The following example enables the ARP proxy. Console(config-if)# ip proxy-arp clear arp-cache Use the clear arp-cache Privileged EXEC mode command to delete all dynamic entries from the ARP cache. Syntax clear arp-cache Command Mode Privileged EXEC mode Example The following example deletes all dynamic entries from the ARP cache. Console# clear arp-cache show arp Use the show arp Privileged EXEC mode command to display entries in the ARP table. Syntax show arp [ip-address ip-address] [mac-address mac-address] [interface-id]IP Addressing Commands 609 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\IP_Addressing.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Parameters • ip-address ip-address—Specifies the IP address. • mac-address mac-address—Specifies the MAC address. • interface-id_Specifies an interface ID. The interface ID can be one of the following types: Ethernet port or Port-channel. Command Mode Privileged EXEC mode User Guidelines Since the associated interface of a MAC address can be aged out from the FDB table, the Interface field can be empty. If an ARP entry is associated with an IP interface that is defined on a port or port-channel, the VLAN field is empty. Example The following example displays entries in the ARP table. show arp configuration Use the show arp configuration privileged EXEC command to display the global and interface configuration of the ARP protocol. Syntax show arp configuration Console# show arp ARP timeout: 80000 Seconds VLAN ------- VLAN 1 VLAN 1 Interface --------- gi1/0/1 gi1/0/2 IP Address ---------- 10.7.1.102 10.7.1.135 HW Address ------------- 00:10:B5:04:DB:4B 00:50:22:00:2A:A4 Status ------- Dynamic Static610 IP Addressing Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\IP_Addressing.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Parameters This command has no arguments or key words. Command Mode Privileged EXEC mode Example Console# show arp configuration Global configuration: ARP Proxy: enabled ARP timeout: 80000 Seconds Interface configuration: g2: ARP Proxy: disabled ARP timeout:60000 Seconds VLAN 1: ARP Proxy: enabled ARP timeout:70000 Seconds VLAN 2: ARP Proxy: enabled ARP timeout:80000 Second (Global) interface ip Use the interface ip Global Configuration mode command to enter the IP Interface Configuration mode. Syntax interface ip ip-address Parameters ip-address—Specifies one of the IP addresses of the device.IP Addressing Commands 611 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\IP_Addressing.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Command Mode Global Configuration mode Example The following example enters the IP interface configuration mode. Console (config)# interface ip 192.168.1.1 Console (config-ip)# directed-broadcast Use the directed-broadcast IP Interface Configuration mode command to enable the translation of a directed broadcast to physical broadcasts. Use the no form of this command to disable this function. Syntax directed-broadcast no directed-broadcast Default Configuration Translation of a directed broadcast to physical broadcasts is disabled. All IP directed broadcasts are dropped. Command Mode IP Interface Configuration mode Example The following example enables the translation of a directed broadcast to physical broadcasts. Console (config)# interface ip 192.168.1.1 Console (config-ip)# directed-broadcast612 IP Addressing Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\IP_Addressing.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY broadcast-address Use the broadcast-address IP Interface Configuration mode command to define a broadcast address for an interface. Use the no form of this command to restore the default IP broadcast address. Syntax broadcast-address {255.255.255.255 | 0.0.0.0} no broadcast-address Parameters • 255.255.255.255—Specifies 255.255.255.255 as the broadcast address. • 0.0.0.0—Specifies 0.0.0.0 as the broadcast address. Default Configuration The default broadcast address is 255.255.255.255. Command Mode IP Interface Configuration mode Example The following example enables the translation of a directed broadcast to physical broadcasts. Console(config)# interface ip 192.168.1.1 Console(config-ip)# broadcast-address 255.255.255.255 ip helper-address Use the ip helper-address Global Configuration mode command to enable the forwarding of User Datagram Protocol (UDP) broadcast packets received on an interface to a specific (helper) address. Use the no form of this command to disable the forwarding of broadcast packets to a specific (helper) address.IP Addressing Commands 613 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\IP_Addressing.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Syntax ip helper-address {ip-interface | all} address [udp-port-list] no ip helper-address {ip-interface | all} address Parameters • ip-interface—Specifies the IP interface. • all—Specifies all IP interfaces. • address—Specifies the destination broadcast or host address to which to forward UDP broadcast packets. A value of 0.0.0.0 specifies that UDP broadcast packets are not forwarded to any host. • udp-port-list—Specifies the destination UDP port number to which to forward broadcast packets. (Range: 1–65535) Default Configuration Forwarding of User Datagram Protocol (UDP) broadcast packets received on an interface to a specific (helper) address is disabled. If udp-port-list is not specified, packets for the default services are forwarded to the helper address. Command Mode Global Configuration mode User Guidelines The ip helper-address command forwards specific UDP broadcast packets from one interface to another. Many helper addresses may be defined. However, the total number of addressport pairs is limited to 128 for the device. The setting of a helper address for a specific interface has precedence over the setting of a helper address for all the interfaces. Forwarding of BOOTP/DHCP (ports 67, 68) cannot be enabled with this command. Use the DHCP relay commands to relay BOOTP/DHCP packets. The ip helper-address command specifies a UDP port number to which UDP broadcast packets with that destination port number are forwarded. By 614 IP Addressing Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\IP_Addressing.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY default, if no UDP port number is specified, the device forwards UDP broadcast packets for the following six services: • IEN-116 Name Service (port 42) • DNS (port 53) • NetBIOS Name Server (port 137) • NetBIOS Datagram Server (port 138) • TACACS Server (port 49) • Time Service (port 37) Example The following example enables the forwarding of User Datagram Protocol (UDP) broadcasts received on all interfaces to specific UDP ports of a destination IP address. Console (config)# ip helper-address all 172.16.9.9 49 53 show ip helper-address Use the show ip helper-address Privileged EXEC mode command to display the IP helper addresses configuration on the system. Syntax show ip helper-address Parameters This command has no arguments or key words. Command Mode Privileged EXEC modeIP Addressing Commands 615 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\IP_Addressing.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example The following example displays the IP helper addresses configuration on the system. source-precedence Use the source-precedence IP Interface Configuration mode command to define a preference for an IP address as a source IP address for DHCP relayed messages on an interface. Use the no form of this command to restore the default configuration. Syntax source-precedence no source-precedence Default Configuration Source precedence is not defined for the address. Command Mode IP Interface Configuration mode User Guidelines For relayed DHCP messages, the source IP address selected is: 1. The lowest of the IP addresses defined as source-precedence IP addresses. 2. The lowest of the IP addresses if there are no source-precedence IP addresses. Console# show ip helper-address Interface ------------ 192.168.1.1 192.168.2.1 Helper Address -------------- 172.16.8.8 172.16.9.9 Udp ports ------------------------ 37, 42, 49, 53, 137, 138 37, 49616 IP Addressing Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\IP_Addressing.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example The following example defines a preference for an IP address as a source IP address for DHCP relayed messages on an interface. Console (config-ip)# source-precedence ip domain lookup Use the ip domain lookup Global Configuration mode command to enable the IP Domain Name System (DNS)-based host name-to-address translation. Use the no form of this command to disable DNS-based host name-toaddress translation. Syntax ip domain lookup no ip domain lookup Default Configuration IP Domain Name System (DNS)-based host name-to-address translation is enabled. Command Mode Global Configuration mode Example The following example enables IP Domain Name System (DNS)-based host name-to-address translation. Console(config)# ip domain lookup ip domain name Use the ip domain name Global Configuration mode command to define a default domain name used by the software to complete unqualified host names (names without a dotted-decimal domain name). Use the no form of this command to remove the default domain name.IP Addressing Commands 617 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\IP_Addressing.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Syntax ip domain name name no ip domain name Parameters name—Specifies the default domain name used to complete unqualified host names. Do not include the initial period that separates an unqualified name from the domain name. (Length: 1–158 characters. Maximum label length: 63 characters) Default Configuration A default domain name is not defined. Command Mode Global Configuration mode User Guidelines Domain names and host names are restricted to the ASCII letters A through Z (case-insensitive), the digits 0 through 9, the underscore and the hyphen. A period (.) is used to separate labels. The maximum size of a label is 63 characters. The maximum name size is 158 bytes. Example The following example defines the default domain name as ‘www.website.com’. Console(config)# ip domain name www.website.com ip name-server Use the ip name-server Global Configuration mode command to define the available name servers. Use the no form of this command to remove a name server.618 IP Addressing Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\IP_Addressing.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Syntax ip name-server { server1-ipv4-address | server1-ipv6-address} [serveraddress2 … server-address8] no ip name-server [server-address … server-address8] Parameters server-address—IP addresses of the name server. Up to 8 servers can be defined in one command or by using multiple commands. The IP address can be IPv4 address or IPv6 address. When the IPv6 address is a Link Local address (IPv6Z address), the outgoing interface name must be specified. Refer to the User Guidelines for the interface name syntax. Default Configuration No name server IP addresses are defined. Command Mode Global Configuration mode User Guidelines The preference of the servers is determined by the order in which they were entered. Up to 8 servers can be defined using one command or using multiple commands. The format of an IPv6Z address is: % interface-name = vlan | ch | isatap | | 0 integer = | decimal-number = 0 | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 physical-port-name= Designated port number, for example 1/0/16. If the egress interface is not specified, the default interface is selected. Specifying interface zone=0 is equal to not defining an egress interface.IP Addressing Commands 619 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\IP_Addressing.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example The following example defines the available name server. Console(config)# ip name-server 176.16.1.18 ip host Use the ip host Global Configuration mode command to define the static host name-to-address mapping in the host cache. Use the no form of this command to remove the static host name-to-address mapping. Syntax ip host name address [address2 address3 address4] no ip host name Parameters • name—Specifies the host name. (Length: 1–158 characters. Maximum label length: 63 characters) • address—Specifies the associated IP address. Up to 4 addresses can be defined. Default Configuration No host is defined. Command Mode Global Configuration mode User Guidelines Host names are restricted to the ASCII letters A through Z (case-insensitive), the digits 0 through 9, the underscore and the hyphen. A period (.) is used to separate labels. Example The following example defines a static host name-to-address mapping in the host cache. 620 IP Addressing Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\IP_Addressing.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Console(config)# ip host accounting.website.com 176.10.23.1 clear host Use the clear host Privileged EXEC mode command to delete entries from the host name-to-address cache. Syntax clear host {name | *} Parameters • name—Specifies the host entry to remove. (Length: 1–158 characters. Maximum label length: 63 characters) • * —Removes all entries. Command Mode Privileged EXEC mode Example The following example deletes all entries from the host name-to-address cache. Console# clear host * clear host dhcp Use the clear host dhcp Privileged EXEC mode command to delete entries from the host name-to-address mapping received from Dynamic Host Configuration Protocol (DHCP). Syntax clear host dhcp {name | *} Parameters • name —Specifies the host entry to remove. (Length: 1–158 characters. Maximum label length: 63 characters)IP Addressing Commands 621 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\IP_Addressing.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY • *—Removes all entries. Command Mode Privileged EXEC mode User Guidelines This command deletes the host name-to-address mapping temporarily until the next refresh of the IP addresses. Example The following example deletes all entries from the host name-to-address mapping received from DHCP. Console# clear host dhcp * show hosts Use the show hosts EXEC mode command to display the default domain name, the list of name server hosts, the static and the cached list of host names and addresses. Syntax show hosts [name] Parameters name—Specifies the host name. (Length: 1–158 characters. Maximum label length: 63 characters) Command Mode EXEC mode622 IP Addressing Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\IP_Addressing.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example The following example displays host information. Console> show hosts System name: Device Default domain is gm.com, sales.gm.com, usa.sales.gm.com(DHCP) Name/address lookup is enabled Name servers (Preference order): 176.16.1.18 176.16.1.19 Configured host name-to-address mapping: Host ----------------- accounting.gm.com Addresses ---------------------------- 176.16.8.8 176.16.8.9 (DHCP) 2002:0:130F::0A0:1504:0BB4 Host ---------------- www.stanford.edu Tota l ---- - 72 Elapse d ------ - 3 Type ---- IP Addresses ------------- 171.64.14.203IPv6 Addressing Commands 623 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\IPv6_Addressing.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY 39 IPv6 Addressing Commands ipv6 enable Use the ipv6 enable Interface Configuration (Ethernet, VLAN, Port-channel) mode command to enable the IPv6 addressing mode on an interface. Use the no form of this command to disable the IPv6 addressing mode on an interface. Syntax ipv6 enable [no-autoconfig] no ipv6 enable Parameters no-autoconfig—EnableS processing of IPv6 on an interface without stateless address autoconfiguration procedure Default Configuration IPv6 addressing is disabled. Unless you are using the no-autoconfig parameter, when the interface is enabled stateless address autoconfiguration procedure is enabled. Command Mode Interface Configuration (Ethernet, VLAN, Port-channel) mode. It cannot be configured for a range of interfaces (range context). User Guidelines The ipv6 enable command automatically configures an IPv6 link-local unicast address on the interface, while also enabling the interface for IPv6 624 IPv6 Addressing Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\IPv6_Addressing.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY processing. The no ipv6 enable command removes the entire IPv6 interface configuration. To enable stateless address autoconfiguration on an enabled IPv6 interface, use the IPv6 address autoconfig command. Example The following example enables VLAN 1 for the IPv6 addressing mode. Console(config)# interface vlan 1 Console(config-if)# ipv6 enable ipv6 address autoconfig Use the ipv6 address autoconfig Interface Configuration mode command to enable automatic configuration of IPv6 addresses, using stateless autoconfiguration on an interface. Addresses are configured depending on the prefixes received in Router Advertisement messages. Use the no form of this command to disable address autoconfiguration on the interface. Syntax ipv6 address autoconfig no ipv6 address autoconfig Parameters Thiis command has no arguments or keywords. Default Configuration Address autoconfiguration is enabled on the interface, no addresses are assigned by default. Command Mode Interface Configuration (Ethernet, VLAN, Port-channel) mode. IPv6 Addressing Commands 625 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\IPv6_Addressing.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY User Guidelines When address autoconfig is enabled, router solicitation ND procedure is initiated to discover a router and assign IP addresses to the interface, based on the advertised on-link prefixes. When disabling address autoconfig, automatically generated addresses that are assigned to the interface are removed. The default state of the address autoconfig is enabled. Use the enable ipv6 no-autoconfig command to enable an IPv6 interface without address autoconfig. Example console(config)# interface vlan 1 console(config-if)# ipv6 address autoconfig ipv6 icmp error-interval Use the ipv6 icmp error-interval Global Configuration mode command to configure the rate limit interval and bucket size parameters for IPv6 Internet Control Message Protocol (ICMP) error messages. Use the no form of this command to return the interval to its default setting. Syntax ipv6 icmp error-interval milliseconds [bucketsize] no ipv6 icmp error-interval Parameters • milliseconds—The time interval between tokens being placed in the bucket. Each token represents a single ICMP error message. The acceptable range is from 0–2147483647 with a default of 100 milliseconds. Setting milliseconds to 0 disables rate limiting. (Range: 0– 2147483647) • bucketsize—(Optional) The maximum number of tokens stored in the bucket. The acceptable range is from 1–200 with a default of 10 tokens.626 IPv6 Addressing Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\IPv6_Addressing.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Default Configuration The default interval is 100ms and the default bucketsize is 10 i.e. 100 ICMP error messages per second Command Mode Global Configuration mode User Guidelines To set the average ICMP error rate limit, calculate the interval with the following formula: Average Packets Per Second = (1/ interval) * bucket size Example console(config)# ipv6 icmp error-interval 123 45 show ipv6 icmp error-interval Use the show ipv6 error-interval command in the EXEC mode to display the IPv6 ICMP error interval. Syntax show ipv6 icmp error-interval Command Mode EXEC mode Example Console> show ipv6 icmp error-interval Rate limit interval: 100 ms Bucket size: 10 tokensIPv6 Addressing Commands 627 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\IPv6_Addressing.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY ipv6 address Use the ipv6 address Interface Configuration mode command to configure an IPv6 address for an interface. Use the no form of this command To remove the address from the interface. Syntax ipv6 address ipv6-address/prefix-length [eui-64] [anycast] no ipv6 address [ipv6-address/prefix-length] [eui-64] Parameters • ipv6-address—Specifies the IPv6 network assigned to the interface. This argument must be in the form documented in RFC 2373 where the address is specified in hexadecimal using 16-bit values between colons. • prefix-length—Specifies the length of the IPv6 prefix. A decimal value that indicates how many of the high-order contiguous bits of the address comprise the prefix (the network portion of the address). A slash mark (/) must precede the decimal. • eui-64—(Optional) Builds an interface ID in the low order 64 bits of the IPv6 address based on the interface MAC address. • anycast—(Optional) Indicates that this address is an anycast address. • prefix-length—3–128 (64 when the eui-64 parameter is used. Default Configuration No IP address is defined for the interface. Command Mode Interface configuration (Ethernet, VLAN, Port-channel) mode. It cannot be configured for a range of interfaces (range context). User Guidelines If the value specified for the /prefix-length argument is greater than 64 bits, the prefix bits have precedence over the interface ID.628 IPv6 Addressing Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\IPv6_Addressing.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Using the no IPv6 address command without arguments removes all manually configured IPv6 addresses from an interface, including link local manually configured addresses. Example console(config)# interface vlan 1 console(config-if)# ipv6 address 3000::123/64 eui-64 anycast ipv6 address link-local Use the ipv6 address link-local command to configure an IPv6 link-local address for an interface. Use the no form of this command to return to the default link local address on the interface. Syntax ipv6 address ipv6-address/prefix-length link-local no ipv6 address [ipv6-address/prefix-length link-local] Parameters • ipv6-address—Specifies the IPv6 network assigned to the interface.This argument must be in the form documented in RFC 2373 where the address is specified in hexadecimals using 16-bit values between colons. • prefix-length—Specifies the length of the IPv6 prefix. A decimal value indicates how many of the high-order contiguous bits of the address comprise the prefix (the network portion of the address). A slash mark (/) must precede the decimal. Only 64-bit length is supported, according to IPv6 over Ethernet’s well-known practice Default Configuration IPv6 is enabled on the interface, link local address of the interface is FE80::EUI64 (interface MAC address). Command Mode Interface Configuration (Ethernet, VLAN, Port-channel) mode. It cannot be configured for a range of interfaces (range context).IPv6 Addressing Commands 629 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\IPv6_Addressing.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY User Guidelines Using the no ipv6 link-local address command removes the manually configured link local IPv6 address from an interface. Multiple IPv6 addresses can be configured per interface, but only one link-local address. When the no ipv6 link-local address command is used, the interface is reconfigured with the standard link local address (the same IPv6 link-local address that is set automatically when the enable ipv6 command is used). The system automatically generates a link-local address for an interface when IPv6 processing is enabled on the interface. To manually specify a link-local address to be used by an interface, use the ipv6 link-local address command. The system supports only 64 bits prefix length for link-local addresses. Example console(config)# interface vlan 1 console(config-if)# ipv6 address fe80::123/64 link-local ipv6 unreachables Use the ipv6 unreachables Interface Configuration mode command to enable the generation of Internet Control Message Protocol for IPv6 (ICMPv6) unreachable messages for any packets arriving on a specified interface. Use the no form of this command To prevent the generation of unreachable messages. Syntax ipv6 unreachables no ipv6 unreachables Parameters This command has no arguments or keywords. Default Configuration ICMP unreachable messages are sent by default. Command Mode Interface Configuration (Ethernet, VLAN, Port-channel) mode.630 IPv6 Addressing Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\IPv6_Addressing.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY User Guidelines When ICMP unreachable messages are enabled, when receiving a packet addressed to one of the interface's IP address with TCP/UDP port not assigned, the device sends ICMP unreachable messages. Use the no ipv6 unreachables command to disable sending ICMP unreachable messages on the interface. Example console(config)# interface gi1/0/1 console(config-if)# ipv6 unreachables ipv6 default-gateway Use the ipv6 default-gateway Global Configuration mode command to define an IPv6 default gateway. Use the no form of this command To remove the default gateway. Syntax ipv6 default-gateway ipv6-address no ipv6 default-gateway Parameters ipv6-address—Specifies the IPv6 address of the next hop that can be used to reach that network. When the IPv6 address is a Link Local address (IPv6Z address), the outgoing interface name must be specified. Refer to the user guidelines for the interface name syntax. Default Configuration No default gateway is defined. Command Mode Global Configuration mode User Guidelines The format of an IPv6Z address is: %IPv6 Addressing Commands 631 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\IPv6_Addressing.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY interface-name = vlan | ch | | 0 integer = | decimal-number = 0 | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 physical-port-name = Designated port number, for example 1/0/16. Configuring a new default GW without deleting the previous configured information overwrites the previous configuration. A configured default GW has a higher precedence over automatically advertised (via router advertisement message). Precedence takes effect once the configured default GW is reachable. Reachability state is not verified automatically by the neighbor discovery protocol. Router reachability can be confirmed by either receiving Router Advertisement message containing router's MAC address or manually configured by user using the IPv6 neighbor CLI command. Another option to force reachability confirmation is to ping the router link-local address (this will initiate the neighbor discovery process). If the egress interface is not specified, the default interface is selected. Specifying interface zone=0 is equal to not defining an egress interface. Example console(config)# ipv6 default-gateway fe80::abcd show ipv6 interface Use the show ipv6 interface EXEC command mode to display the usability status of interfaces configured for IPv6. Syntax show ipv6 interface [interface-id] Parameters interface-id—Specifies an interface ID. The interface ID can be one of the following types: Ethernet port, Port-channel or VLAN. Default Configuration Displays all IPv6 interfaces.632 IPv6 Addressing Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\IPv6_Addressing.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Command Mode EXEC mode User Guidelines Use the show ipv6 neighbors command in the privileged EXEC mode to display IPv6 neighbor discovery cache information. Example Console# show ipv6 interface Interface IP addresses Type ----------- -------------------------------------- ------------ VLAN 1 4004::55/64 [ANY] manual VLAN 1 fe80::200:b0ff:fe00:0 linklayer VLAN 1 ff02::1 linklayer VLAN 1 ff02::77 manual VLAN 1 ff02::1:ff00:0 manual VLAN 1 ff02::1:ff00:1 manual VLAN 1 ff02::1:ff00:55 manual Default Gateway IP address Type Interface State ---------------------------- -------- --------- ----- fe80::77 Static VLAN 1 unreachable fe80::200:cff:fe4a:dfa8 Dynamic VLAN 1 stale Console# show ipv6 interface Vlan 15 IPv6 is disabled Console# show ipv6 interface Vlan 1 Number of ND DAD attempts: 1 MTU size: 1500 Stateless Address Autoconfiguration state: enabled ICMP unreachable message state: enabled MLD version: 2 IP addresses Type DAD StateIPv6 Addressing Commands 633 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\IPv6_Addressing.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY ------------------------------------- --------- ----------- 4004::55/64 [ANY] manual Active fe80::200:b0ff:fe00:0 linklayer Active ff02::1 linklayer ------ ff02::77 manual ------ ff02::1:ff00:0 manual ------ ff02::1:ff00:1 manual ------ ff02::1:ff00:55 manual ------ show IPv6 route Use the show ipv6 route command to display the current state of the IPv6 routing table. Syntax show ipv6 route Command Mode EXEC mode Example Console> show ipv6 route Codes: L - Local, S - Static, I - ICMP, ND - Router Advertisment The number in the brackets is the metric. S ::/0 via fe80::77 [0] VLAN 1 Lifetime Infinite ND ::/0 via fe80::200:cff:fe4a:dfa8 [0] VLAN 1 Lifetime 1784 sec L 2001::/64 is directly connected, g2 Lifetime Infinite L 2002:1:1:1::/64 is directly connected, VLAN 1 Lifetime 2147467 sec L 3001::/64 is directly connected, VLAN 1 Lifetime Infinite L 4004::/64 is directly connected, VLAN 1 Lifetime Infinite L 6001::/64 is directly connected, g2 Lifetime Infinite634 IPv6 Addressing Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\IPv6_Addressing.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY ipv6 nd dad attempts Use the ipv6 nd dad attempts Interface Configuration (Ethernet, VLAN, Port-channel) mode command to configure the number of consecutive neighbor solicitation messages that are sent on an interface while Duplicate Address Detection (DAD) is performed on the unicast IPv6 addresses of the interface. Use the no form of this command to restore the number of messages to the default value. Syntax ipv6 nd dad attempts attempts Parameters attempts—Specifies the number of neighbor solicitation messages. A value of 0 disables DAD processing on the specified interface. A value of 1 configures a single transmission without follow-up transmissions. (Range: 0–600) Default Configuration Duplicate Address Detection on unicast IPv6 addresses with the sending of one neighbor solicitation message is enabled. Command Mode Interface Configuration (Ethernet, VLAN, Port-channel) mode. It cannot be configured for a range of interfaces (range context). User Guidelines Duplicate Address Detection (DAD) verifies the uniqueness of new unicast IPv6 addresses before the addresses are assigned to interfaces (the new addresses remain in a tentative state while DAD is performed). DAD uses neighbor solicitation messages to verify the uniqueness of unicast IPv6 addresses. An interface returning to the administrative Up state restarts DAD for all of the unicast IPv6 addresses on the interface. While DAD is performed on the Link Local address of an interface, the state of the other IPv6 addresses is still set to TENTATIVE. When DAD is completed on the Link Local address, DAD is performed on the remaining IPv6 addresses.IPv6 Addressing Commands 635 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\IPv6_Addressing.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY When DAD identifies a duplicate address, the address state is set to DUPLICATE and the address is not used. If the duplicate address is the Link Local address of the interface, the processing of IPv6 packets is disabled on the interface and an error message is displayed. All configuration commands associated with the duplicate address remain as configured while the address state is set to DUPLICATE. If the Link Local address for an interface changes, DAD is performed on the new Link Local address and all of the other IPv6 address associated with the interface are regenerated (DAD is performed only on the new Link Local address). Configuring a value of 0 with the ipv6 nd dad attempts Interface Configuration mode command disables duplicate address detection processing on the specified interface. A value of 1 configures a single transmission without follow-up transmissions. The default is 1 message. Until the DAD process is completed, an IPv6 address is in the tentative state and cannot be used for data transfer. It is recommended to limit the configured value. Example The following example configures the number of consecutive neighbor solicitation messages sent during DAD processing to 2 on gigabitethernet port 1/0/9. Console (config)# interface gi1/0/9 Console (config-if)# ipv6 nd dad attempts 2 ipv6 host Use the ipv6 host Global Configuration mode command to define a static host name-to-address mapping in the host name cache. Use the no form of this command to remove the host name-to-address mapping. Syntax ipv6 host name ipv6-address1 [ipv6-address2...ipv6-address4] no ipv6 host name636 IPv6 Addressing Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\IPv6_Addressing.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Parameters nameName of the host. (Range: 1–158 characters) • ipv6-address1—Associated IPv6 address. This argument must be in the form documented in RFC 2373 where the address is specified in hexadecimal using 16-bit values between colons. When the IPv6 address is a Link Local address (IPv6Z address), the outgoing interface name must be specified. Refer to the user guidelines for the interface name syntax. • ipv6-address2-4—(Optional) Additional IPv6 addresses that may be associated with the host’s name Default Configuration No host is defined. Command Mode Global Configuration mode User Guidelines The format of an IPv6Z address is: % interface-name = vlan | ch | isatap | integer = | decimal-number = 0 | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 physical-port-name = Designated port number, for example 1/0/16. Example console(config)# ipv6 host server 3000::a31b ipv6 neighbor Use the ipv6 neighbor command to configure a static entry in the IPv6 neighbor discovery cache. Use the no form of this command to remove a static IPv6 entry from the IPv6 neighbor discovery cache.IPv6 Addressing Commands 637 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\IPv6_Addressing.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Syntax ipv6 neighbor ipv6_addr interface-id hw_addr no ipv6 neighbor ipv6_addr interface-id Parameters • Ipv6_addr—Specifies the Pv6 address to map to the specified MAC address. • interface-id—Specifies the interface that is associated with the IPv6 address • hw_addr—Specifies the MAC address to map to the specified IPv6 address. Command Mode Global Configuration mode User Guidelines The IPv6 neighbor command is similar to the ARP (global) command. If an entry for the specified IPv6 address already exists in the neighbor discovery cache—learned through the IPv6 neighbor discovery process—the entry is automatically converted to a static entry. A new static neighbor entry with a global address can be configured only if a manually configured subnet already exists in the device. Use the show IPv6 neighbors command to view static entries in the IPv6 neighbor discovery cache. Example console(config)# ipv6 neighbor 3000::a31b vlan 1 001b.3f9c.84ea ipv6 set mtu Use the ipv6 mtu Interface Configuration mode command to set the maximum transmission unit (MTU) size of IPv6 packets sent on an interface. Use the default parameter to restore the default MTU size.638 IPv6 Addressing Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\IPv6_Addressing.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Syntax ipv6 set mtu { interface-id } { bytes | default} Parameters • interface-id—Specifies an interface ID. The interface ID can be one of the following types: Ethernet port or Port-channel. • bytes—Specifies the MTU in bytes. • default—Sets the default MTU size 1500 bytes. Minimum is 1280 bytes Default Configuration 1500 bytes Command Mode Privileged EXEC mode User Guidelines This command is intended for debugging and testing purposes and should be used only by technical support personnel. Example console# ipv6 set mtu gi1/0/1 default ipv6 mld version Use the ipv6 mld version Interface Configuration mode command to change the version of the Multicast Listener Discovery Protocol (MLD). Use the no form of this command to change to the default version. Syntax ipv6 mld version {1 | 2} no ipv6 mld version Parameters 1—Specifies MLD version 1. 2—Specifies MLD version 2.IPv6 Addressing Commands 639 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\IPv6_Addressing.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Default Configuration MLD version 1. Command Mode Interface Configuration (Ethernet, VLAN, Port-channel) mode console(config)# interface vlan 1 console(config-if)# ipv6 mld version 2 ipv6 mld join-group Use the ipv6 mld join-group Interface Configuration mode command to configure Multicast Listener Discovery (MLD) reporting for a specified group. Use the no form of this command to cancel reporting and leave the group. Syntax ipv6 mld join-group group-address no ipv6 mld join-group group-address Parameters group-address—Specifies the IPv6 address of the multicast group. Default Configuration Command Mode Interface Configuration (Ethernet, VLAN, Port-channel) mode User Guidelines The ipv6 mld join-group command configures MLD reporting for a specified group. The packets that are addressed to a specified group address will be passed up to the client process in the device. 640 IPv6 Addressing Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\IPv6_Addressing.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example The following example configures MLD reporting for specific groups: ipv6 mld join-group ff02::10 show ipv6 neighbors Use the show ipv6 neighbors Privileged EXEC mode command to display IPv6 neighbor discovery cache information. Syntax show ipv6 neighbors {static | dynamic}[ipv6-address ipv6-address] [macaddress mac-address] [interface-id] Parameters • static—Shows static neighbor discovery cash entries. • dynamic—Shows dynamic neighbor discovery cash entries. • ipv6-address—Shows the neighbor discovery cache information entry of a specific IPv6 address. • mac-address—Shows the neighbor discovery cache information entry of a specific MAC address. • interface-id—Specifies an interface ID. The interface ID can be one of the following types: Ethernet port, Port-channel or VLAN. Command Mode Privileged EXEC mode User Guidelines Since the associated interface of a MAC address can be aged out from the FDB table, the Interface field can be empty. When an ARP entry is associated with an IP interface that is defined on a port or port-channel, the VLAN field is empty. The possible neighbor cash states are:IPv6 Addressing Commands 641 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\IPv6_Addressing.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY • INCMP (Incomplete)—Address resolution is being performed on the entry. Specifically, a Neighbor Solicitation has been sent to the solicitednode multicast address of the target, but the corresponding Neighbor Advertisement has not yet been received. • REACH (Reachable)—Positive confirmation was received within the last ReachableTime milliseconds that the forward path to the neighbor was functioning properly. While REACHABLE, no special action takes place as packets are sent. • STALE—More than ReachableTime milliseconds have elapsed since the last positive confirmation was received that the forward path was functioning properly. While stale, no action takes place until a packet is sent. • DELAY—More than ReachableTime milliseconds have elapsed since the last positive confirmation was received that the forward path was functioning properly, and a packet was sent within the last DELAY_FIRST_PROBE_TIME seconds. If no reachability confirmation is received within DELAY_FIRST_PROBE_TIME seconds of entering the DELAY state, send a Neighbor Solicitation and change the state to PROBE. • PROBE—A reachability confirmation is actively sought by retransmitting Neighbor Solicitations every RetransTimer milliseconds until a reachability confirmation is received. Example Console# show ipv6 neighbors dynamic Interface IPv6 address HW address State Router ---------- ----------------------- ---------------- ------ ------ VLAN 1 fe80::200:cff:fe4a:dfa8 00:00:0c:4a:df:a8 stale yes VLAN 1 fe80::2d0:b7ff:fea1:264d 00:d0:b7:a1:26:4d stale no clear ipv6 neighbors Use the clear ipv6 neighbors Privileged EXEC mode command to delete all entries in the IPv6 neighbor discovery cache, except for static entries.642 IPv6 Addressing Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\IPv6_Addressing.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Syntax clear ipv6 neighbors Parameters This command has no keywords or arguments. Command Mode Privileged EXEC mode Example console# clear ipv6 neighborsTunnel Commands 643 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Tunnel.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY 40 Tunnel Commands interface tunnel Use the interface tunnel Global Configuration mode command to enter the Interface Configuration (Tunnel) mode. Syntax interface tunnel number Parameters number—Specifies the tunnel index. Command Mode Global Configuration mode Example The following example enters the Interface Configuration (Tunnel) mode. Console(config)# interface tunnel 1 Console(config-tunnel)# tunnel mode ipv6ip Use the tunnel mode ipv6ip Interface Configuration (Tunnel) mode command to configure an IPv6 transition-mechanism global support mode. Use the no form of this command to remove an IPv6 transition mechanism. Syntax tunnel mode ipv6ip {isatap}644 Tunnel Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Tunnel.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY no tunnel mode ipv6ip Parameters isatap—Enables an automatic IPv6 over IPv4 Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) tunnel. Default Configuration The IPv6 transition-mechanism global support mode is disabled. Command Mode Interface Configuration (Tunnel) mode User Guidelines The system can be enabled to ISATAP tunnel. When enabled, an automatic tunnel interface is created on each interface that is assigned an IPv4 address. Note that on a specific interface (for example, port or VLAN), both native IPV6 and transition-mechanisms can coexist. The host implementation chooses the egress interface according to the scope of the destination IP address (such as ISATAP or native IPv6). Example The following example configures an IPv6 transition mechanism global support mode. Console(config)# interface tunnel 1 Console(config-tunnel)# tunnel mode ipv6ip isatap tunnel isatap router Use the tunnel isatap router Interface Configuration (Tunnel) mode command to configure a global string that represents a specific automatic tunnel router domain name. Use the no form of this command to remove the string associated with the router domain name and restore the default configuration. Syntax tunnel isatap router router-nameTunnel Commands 645 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Tunnel.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY no tunnel isatap router Parameters router-name—Specifies the router’s domain name. Default Configuration The automatic tunnel router's default domain name is ISATAP. Command Mode Interface Configuration (Tunnel) mode User Guidelines The ipv6 tunnel routers-dns command determines the string that the host uses for automatic tunnel router lookup in the IPv4 DNS procedure. By default, the string ISATAP is used for the corresponding automatic tunnel types. Only one string can represent the automatic tunnel router name per tunnel. Using this command, therefore, overwrites the existing entry. Example The following example configures the global string ISATAP2 as the automatic tunnel router domain name. Console(config)# tunnel 1 Console(config-tunnel)# tunnel isatap router ISATAP2 tunnel source Use the tunnel source Interface Configuration (Tunnel) mode command to set the local (source) IPv4 address of a tunnel interface. The no form deletes the tunnel local address. Syntax tunnel source { auto | ipv4-address } no tunnel source646 Tunnel Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Tunnel.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Parameters • auto—The system minimum IPv4 address is used as the source address for packets sent on the tunnel interface. If the IPv4 address is changed, then the local address of the tunnel interface is changed too. • ip4-address—Specifies the IPv4 address to use as the source address for packets sent on the tunnel interface. The local address of the tunnel interface is not changed when the IPv4 address is moved to another interface (only if StackTable is changed). Default No source address is defined. Command Mode Interface Configuration (Tunnel) mode User Guidelines The configured source IPv4 address is used for forming the tunnel interface identifier. The interface identifier is set to the 8 least significant bytes of the SIP field of the encapsulated IPv6 tunneled packets. Example console(config)# interface tunnel 1 console(config-tunnel)# tunnel source auto tunnel isatap query-interval Use the tunnel isatap query-interval Global Configuration mode command to set the time interval between Domain Name System (DNS) queries (before the ISATAP router IP address is known) for the automatic tunnel router domain name. Use the no form of this command to restore the default configuration. Syntax tunnel isatap query-interval seconds no tunnel isatap query-intervalTunnel Commands 647 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Tunnel.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Parameters seconds—Specifies the time interval in seconds between DNS queries. (Range: 10–3600) Default Configuration The default time interval between DNS queries is 10 seconds. Command Mode Global Configuration mode User Guidelines This command determines the time interval between DNS queries before the ISATAP router IP address is known. If the IP address is known, the robustness level that is set by the tunnel isatap robustness Global Configuration mode command determines the refresh rate. Example The following example sets the time interval between DNS queries to 30 seconds. Console(config)# tunnel isatap query-interval 30 tunnel isatap solicitation-interval Use the tunnel isatap solicitation-interval Global Configuration mode command to set the time interval between ISATAP router solicitation messages. Use the no form of this command to restore the default configuration. Syntax tunnel isatap solicitation-interval seconds no tunnel isatap solicitation-interval Parameters seconds—Specifies the time interval in seconds between ISATAP router solicitation messages. (Range: 10–3600)648 Tunnel Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Tunnel.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Default Configuration The default time interval between ISATAP router solicitation messages is 10 seconds. Command Mode Global Configuration mode User Guidelines This command determines the interval between router solicitation messages when there is no active ISATAP router. If there is an active ISATAP router, the robustness level set by the tunnel isatap robustness Global Configuration mode command determines the refresh rate. Example The following example sets the time interval between ISATAP router solicitation messages to 30 seconds. Console(config)# tunnel isatap solicitation-interval 30 tunnel isatap robustness Use the tunnel isatap robustness Global Configuration mode command to configure the number of DNS query/router solicitation refresh messages that the device sends. Use the no form of this command to restore the default configuration. Syntax tunnel isatap robustness number no tunnel isatap robustness Parameters number—Specifies the number of DNS query/router solicitation refresh messages that the device sends. (Range: 1–20) Default Configuration The default number of DNS query/router solicitation refresh messages that the device sends is 3.Tunnel Commands 649 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Tunnel.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Command Mode Global Configuration mode User Guidelines The DNS query interval (after the ISATAP router IP address is known) is the Time-To-Live (TTL) that is received from the DNS, divided by (Robustness + 1). The router solicitation interval (when there is an active ISATAP router) is the minimum-router-lifetime that is received from the ISATAP router, divided by (Robustness + 1). Example The following example sets the number of DNS query/router solicitation refresh messages that the device sends to 5. Console(config)# tunnel isatap robustness 5 show ipv6 tunnel Use the show ïpv6 tunnel EXEC mode command to display information on the ISATAP tunnel. Syntax show ïpv6 tunnel Command Mode EXEC mode Example The following example displays information on the ISATAP tunnel. Console> show ipv6 tunnel Tunnel 1 -------- Tunnel status : DOWN650 Tunnel Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\Tunnel.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Tunnel protocol : NONE Tunnel Local address type : auto Tunnel Local Ipv4 address : 0.0.0.0 Router DNS name : ISATAP Router IPv4 address : 0.0.0.0 DNS Query interval : 300 seconds Min DNS Query interval : 0 seconds Router Solicitation interval : 10 seconds Min Router Solicitation interval : 0 seconds Robustness : 2DHCP Relay Commands 651 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\DCHP_Relay.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY 41 DHCP Relay Commands ip dhcp relay enable (Global) Use the ip dhcp relay enable Global Configuration mode command to enable Dynamic Host Configuration Protocol (DHCP) relay features on the device. Use the no form of this command to disable the DHCP relay agent. Syntax ip dhcp relay enable no ip dhcp relay enable Default Configuration DHCP relay features are disabled. Command Mode Global Configuration mode Example The following example enables DHCP features on the device. Console(config)# ip dhcp relay enable ip dhcp relay enable (Interface) Use the ip dhcp relay enable Interface Configuration (VLAN, Ethernet, Portchannel) mode command to enable Dynamic Host Configuration Protocol (DHCP) relay features on the router. Use the no form of this command To disable the DHCP relay agent features.652 DHCP Relay Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\DCHP_Relay.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Syntax ip dhcp relay enable no ip dhcp relay enable Default Configuration Disabled Command Mode Interface Configuration (VLAN) mode Interface Configuration (VLAN, Ethernet, Port-channel) mode User Guidelines Enable DHCP relay globally before enabling DHCP relay on an interface. Example The following example enables DHCP features on VLAN 21. Console(config)# interface vlan 21 Console(config-if)# ip dhcp relay enable ip dhcp relay address (Global) Use the ip dhcp relay address Global Configuration mode command to define the DHCP servers available for the DHCP relay. Use the no form of this command to remove servers from the list. Syntax ip dhcp relay address ip-address no ip dhcp relay address [ip-address] Parameters ip-address—Specifies the DHCP server IP address. Up to 8 servers can be defined. Default Configuration No server is defined.DHCP Relay Commands 653 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\DCHP_Relay.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Command Mode Global Configuration mode Example The following example defines the DHCP server on the device. Console(config)# ip dhcp relay address 176.16.1.1 ip dhcp relay address (Interface) Use the ip dhcp relay address Interface Configuration (VLAN, Ethernet, Port-channel) command to define the DHCP servers available by the DHCP relay for DHCP clients connected to the interface. Use the no form of this command to remove the server from the list. Syntax ip dhcp relay address ip-address no ip dhcp relay address [ip-address] Parameters ip-address—Specifies the DHCP server IP address. Up to 8 servers can be defined. Default Configuration No server is defined. Command Mode Interface Configuration (VLAN, Ethernet, Port-channel) mode User Guidelines Use the ip dhcp relay address command to define a DHCP Server IP address per the interface. To define a few DHCP Servers, use the command a few times. To remove a DHCP Server, use the no form of the command with the ipaddress argument. The no form of the command without the ip-address argument deletes all DHCP servers defined per the interface.654 DHCP Relay Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\DCHP_Relay.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY You can use the command regardless if DHCP Relay is enabled on the interface. Example The following example defines the DHCP server on VLAN 21. Console(config)# interface vlan 21 Console(config-if)# ip dhcp relay address 176.16.1.1 show ip dhcp relay Use the show ip dhcp relay EXEC mode command to display the server addresses on the DHCP relay. Syntax show ip dhcp relay Command Mode EXEC mode Example The following example displays the server addresses on the DHCP relay. Console> show ip dhcp relay DHCP relay is globally enabled. DHCP relay is enabled on VLANs: 1, 2 DHCP relay is enabled on ports: 1/1 DHCP relay is enabled on port-channels: Servers: 172.16.1.11, 172.16.8.11 Console> show ip dhcp relayDHCP Relay Commands 655 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\DCHP_Relay.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY DHCP relay is globally enabled. DHCP relay is enabled on VLANs: 1, 2 Servers: 172.16.1.11, 172.16.8.11 ip dhcp information option Use the ip dhcp information option Global Configuration command to enable DHCP option-82 data insertion. Use the no form of this command to disable DHCP option-82 data insertion. Syntax ip dhcp information option no ip dhcp information option Parameters N/A Default Configuration DHCP option-82 data insertion is disabled. Command Mode Global Configuration mode User Guidelines DHCP option 82 would be enabled only if DHCP snooping or DHCP relay are enabled. Example The following example enable DHCP option-82 data insertion. Console(config)# ip dhcp information option656 DHCP Relay Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\DCHP_Relay.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY show ip dhcp information option The show ip dhcp information option EXEC mode command displays the DHCP Option 82 configuration. Syntax show ip dhcp information option Command Mode EXEC mode Example The following example displays the DHCP Option 82 configuration. Console> show ip dhcp information option Relay agent Information option is EnabledDHCP Server Commands 657 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\DCHP_Server.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY 42 DHCP Server Commands ip dhcp server Use the ip dhcp server Global Configuration mode command to enable the Dynamic Host Configuration Protocol (DHCP) server features on the device. Use the no form of this command to disable the DHCP server. Syntax ip dhcp server no ip dhcp server Default Configuration The DHCP server is disabled. Command Mode Global Configuration mode Example The following example enables the DHCP server on the device: Console(config)# ip dhcp server ip dhcp pool host Use the ip dhcp pool host Global Configuration mode command to configure a Dynamic Host Configuration Protocol (DHCP) static address on a DHCP Server and enter the DHCP Pool Host Configuration mode. Use the no form of this command to remove the address pool.658 DHCP Server Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\DCHP_Server.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Syntax ip dhcp pool host name no ip dhcp pool host name Parameters name—Specifies the DHCP address pool name. It can be either a symbolic string (such as Engineering) or an integer (such as 8). (Length: 1–32 characters) Default Configuration DHCP hosts are not configured. Command Mode Global Configuration mode User Guidelines During execution of this command, the configuration mode changes to the DHCP Pool Configuration mode, which is identified by the (config-dhcp)# prompt. In this mode, the administrator can configure host parameters, such as the IP subnet number and default router list. Example The following example configures Station as the DHCP address pool: Console(config)# ip dhcp pool host station Console(config-dhcp)# ip dhcp pool network Use the ip dhcp pool network Global Configuration mode command to configure a Dynamic Host Configuration Protocol (DHCP) address pool on a DHCP Server and enter DHCP Pool Configuration mode. Use the no form of this command to remove the address pool. Syntax ip dhcp pool network nameDHCP Server Commands 659 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\DCHP_Server.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY no ip dhcp pool network name Parameters name—Specifies the DHCP address pool name. It can be either a symbolic string (such as ‘engineering’) or an integer (such as 8). (Length: 1–32 characters) Default Configuration DHCP address pools are not configured. Command Mode Global Configuration mode User Guidelines During execution of this command, the configuration mode changes to DHCP Pool Network Configuration mode, which is identified by the (configdhcp)# prompt. In this mode, the administrator can configure pool parameters, such as the IP subnet number and default router list. Example The following example configures Pool1 as the DHCP address pool. Console(config)# ip dhcp pool network pool1 Console(config-dhcp)# address (DHCP Host) Use the address DHCP Pool Host Configuration mode command to manually bind an IP address to a Dynamic Host Configuration Protocol (DHCP) client. Use the no form of this command to remove the IP address binding to the client. Syntax address ip-address {mask | prefix-length} {client-identifier unique-identifier | hardware-address mac-address} no address660 DHCP Server Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\DCHP_Server.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Parameters • address—Specifies the client IP address. • mask—Specifies the client network mask. • prefix-length—Specifies the number of bits that comprise the address prefix. The prefix is an alternative way of specifying the client network mask. The prefix length must be preceded by a forward slash (/). • unique-identifier—Specifies the distinct client identification in dotted hexadecimal notation: Each byte in a hexadecimal character string is two hexadecimal digits. Bytes are separated by a period or colon. For example, 01b7.0813.8811.66. • hardware-address—Specifies the MAC address. Default Configuration DHCP hosts are not configured. Command Mode DHCP Pool Host Configuration mode Example The following example manually binds an IP address to a Dynamic Host Configuration Protocol (DHCP) client. Console(config-dhcp)# address 10.12.1.99 255.255.255.0 01b7.0813.8811.66 address (DHCP Network) Use the address DHCP Pool Network Configuration mode command to configure the subnet number and mask for a Dynamic Host Configuration Protocol (DHCP) address pool on DHCP Server. Use the no form of this command to remove the subnet number and mask. Syntax address {network-number | low low-address high high-address} {mask | prefix-length} no addressDHCP Server Commands 661 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\DCHP_Server.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Parameters • network-number—Specifies the IP address of the DHCP address pool. • mask—Specifies the pool network mask. • prefix-length—Specifies the number of bits that comprise the address prefix. The prefix is an alternative way of specifying the client network mask. The prefix length must be preceded by a forward slash (/). • low low-address—Specifies the first IP address to use in the address range. • high high-address—Specifies the last IP address to use in the address range. Default Configuration DHCP address pools are not configured. If the low address is not specified, it defaults to the first IP address in the network. If the high address is not specified, it defaults to the last IP address in the network. Command Mode DHCP Pool Network Configuration mode Example The following example configures the subnet number and mask for a Dynamic Host Configuration Protocol (DHCP) address pool on DHCP Server. Console(config-dhcp)# address 10.12.1.0 255.255.255.0 lease Use the lease DHCP Pool Network Configuration mode command to configure the time duration of the lease for an IP address that is assigned from a Dynamic Host Configuration Protocol (DHCP) Server to a DHCP client. Use the no form of this command to restore the default value.662 DHCP Server Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\DCHP_Server.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Syntax lease {days [{hours} [minutes]] | infinite} no lease Parameters • days—Specifies the number of days in the lease. • hours—Specifies the number of hours in the lease. A days value must be supplied before configuring an hours value. • minutes—Specifies the number of minutes in the lease. A days value and an hours value must be supplied before configuring a minutes value. • infinite—Specifies that the duration of the lease is unlimited. Default Configuration The default lease duration is 1 day. Command Mode DHCP Pool Network Configuration mode Examples The following example shows a 1-day lease. Console(config-dhcp)# lease 1 The following example shows a one-hour lease. Console(config-dhcp)# lease 0 1 The following example shows a one-minute lease. Console(config-dhcp)# lease 0 0 1 The following example shows an infinite (unlimited) lease. Console(config-dhcp)# lease infiniteDHCP Server Commands 663 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\DCHP_Server.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY client-name Use the client-name DHCP Pool Host Configuration mode command to define the name of a DHCP client. The client name should not include the domain name. Use the no form of this command to remove the client name. Syntax client-name name no client-name Parameters name—Specifies the client name, using standard ASCII characters. The client name should not include the domain name. For example, the name Mars should not be specified as mars.yahoo.com. (Length: 1–32 characters) Command Mode DHCP Pool Host Configuration mode Default Coniguration No client name is defined. Example The following example defines the string Client1 as the client name. Console(config-dhcp)# client-name client1 default-router Use the default-router DHCP Pool Configuration mode command to configure the default router list for a Dynamic Host Configuration Protocol (DHCP) client. Use the no form of this command to remove the default router list. Syntax default-router ip-address [ip-address2 ... ip-address8] no default-router664 DHCP Server Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\DCHP_Server.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Parameters ip-address—Specifies the IP address of a router. One IP address is required, although up to eight addresses can be specified in one command line. Command Mode DHCP Pool Host Configuration mode DHCP Pool Network Configuration mode Default Configuration No default router is defined. User Guidelines The router IP address should be on the same subnet as the client subnet. Example The following example specifies 10.12.1.99 as the default router IP address. Console(config-dhcp)# default-router 10.12.1.99 dns-server Use the dns-server DHCP Pool Configuration mode command to configure the Domain Name System (DNS) IP servers available to a Dynamic Host Configuration Protocol (DHCP) client. Use the no form of this command to remove the DNS server list. Syntax dns-server ip-address [ip-address2 ... ip-address8] no dns-server Parameters ip-address—Specifies a DNS Server IP address. One IP address is required, although up to eight addresses can be specified in one command line. Command Mode DHCP Pool Host Configuration modeDHCP Server Commands 665 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\DCHP_Server.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY DHCP Pool Network Configuration mode Default Configuration No DNS server is defined. User Guidelines If DNS IP servers are not configured for a DHCP client, the client cannot correlate host names to IP addresses. Example The following example specifies 10.12.1.99 as the client domain name server IP address. Console(config-dhcp)# dns-server 10.12.1.99 domain-name Use the domain-name DHCP Pool Configuration mode command to specify the domain name for a Dynamic Host Configuration Protocol (DHCP) client. Use the no form of this command to remove the domain name. Syntax domain-name domain no domain-name Parameters domain—Specifies the DHCP client domain name string. (Length: 1–32 characters) Command Mode DHCP Pool Host Configuration mode DHCP Pool Network Configuration mode Default Configuration No domain name is defined.666 DHCP Server Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\DCHP_Server.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example The following example specifies yahoo.com as the DHCP client domain name string. Console(config-dhcp)# domain-name yahoo.com netbios-name-server Use the netbios-name-server DHCP Pool Configuration mode command to configure the NetBIOS Windows Internet Naming Service (WINS) servers that are available to Microsoft Dynamic Host Configuration Protocol (DHCP) clients. Use the no form of this command to remove the NetBIOS name server list. Syntax netbios-name-server ip-address [ip-address2 ... ip-address8] no netbios-name-server Parameters ip-address—Specifies the NetBIOS WINS name server IP address. One IP address is required, although up to eight addresses can be specified in one command line. Command Mode DHCP Pool Host Configuration mode DHCP Pool Network Configuration mode Default Configuration No bios server is defined. Example The following example specifies the IP address of a NetBIOS name server available to the DHCP client. Console(config-dhcp)# netbios-name-server 10.12.1.90DHCP Server Commands 667 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\DCHP_Server.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY netbios-node-type Use the netbios-node-type DHCP Pool Configuration mode command to configure the NetBIOS node type for Microsoft Dynamic Host Configuration Protocol (DHCP) clients. Use the no form of this command to remove the NetBIOS node type. Syntax netbios-node-type {b-node | p-node | m-node | h-node} no netbios-node-type Parameters • b-node—Specifies the Broadcast NetBIOS node type. • p-node—Specifies the Peer-to-peer NetBIOS node type. • m-node—Specifies the Mixed NetBIOS node type. • h-node—Specifies the Hybrid NetBIOS node type. Command Mode DHCP Pool Host Configuration mode DHCP Pool Network Configuration mode Default Configuration No bios node type is defined. Example The following example specifies the client's NetBIOS type as hybrid. Console(config-dhcp)# netbios node-type h-node next-server Use the next-server DHCP Pool Configuration mode command to configure the next server in the boot process of a Dynamic Host Configuration Protocol (DHCP) client. Use the no form of this command to remove the boot server.668 DHCP Server Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\DCHP_Server.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Syntax next-server ip-address no next-server Parameters ip-address—Specifies the IP address of the next server in the boot process, which is typically a Trivial File Transfer Protocol (TFTP) server. Default Configuration If the next-server command is not used to configure a boot server list, the DHCP Server uses inbound interface helper addresses as boot servers. Command Mode DHCP Pool Host Configuration mode DHCP Pool Network Configuration mode Example The following example specifies 10.12.1.99 as the IP address of the next server in the boot process. Console(config-dhcp)# next-server 10.12.1.99 next-server-name Use the next-server-name DHCP Pool Configuration mode command to configure the next server name in the boot process of a Dynamic Host Configuration Protocol (DHCP) client. Use the no form of this command to remove the boot server name. Syntax next-server-name name no next-server-name Parameters name—Specifies the name of the next server in the boot process. (Length: 1–64 characters)DHCP Server Commands 669 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\DCHP_Server.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Command Mode DHCP Pool Host Configuration mode DHCP Pool Network Configuration mode Default Configuration No next server name is defined. Example The following example specifies www.bootserver.com as the name of the next server in the boot process of a DHCP client. Console(config-dhcp)# next-server www.bootserver.com bootfile Use the bootfile DHCP Pool Configuration mode command to specify the default boot image file name for a Dynamic Host Configuration Protocol (DHCP) client. Use the no form of this command to delete the boot image file name. Syntax bootfile filename no bootfile Parameters filename—Specifies the file name used as a boot image. (Length: 1–128 characters) Command Mode DHCP Pool Host Configuration mode DHCP Pool Network Configuration mode670 DHCP Server Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\DCHP_Server.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example The following example specifies boot_image_file as the default boot image file name for a DHCP client. Console(config-dhcp)# bootfile boot_image_file time-server Use the time-server DHCP Pool Configuration mode command to specify the time servers list for a Dynamic Host Configuration Protocol (DHCP) client. Use the no form of this command to remove the time servers list. Syntax time-server ip-address [ip-address2 ... ip-address8] no time-server Parameters ip-address—Specifies the IP address of a time server. One IP address is required, although up to eight addresses can be specified in one command line. Command Mode DHCP Pool Host Configuration mode DHCP Pool Network Configuration mode Default Configuration No time server name is defined. User Guidelines The router IP address should be on the same subnet as the client subnet. Example The following example specifies 10.12.1.99 as the time server IP address. Console(config-dhcp)# time-server 10.12.1.99DHCP Server Commands 671 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\DCHP_Server.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY option Use the option DHCP Pool Configuration mode command to configure the Dynamic Host Configuration Protocol (DHCP) Server options. Use the no form of this command to remove the options. Syntax option code {ascii ascii-string | hex hex-string | ip ip-address} option ip-list code ip-address1 [ip-address2 …] no option code Parameters • code—Specifies the DHCP option code. • ascii ascii-string—Specifies an NVT ASCII character string. ASCII character strings, which contain white space, must be delimited by quotation marks. • hex hex-string—Specifies dotted hexadecimal data: Each byte in hexadecimal character strings is two hexadecimal digits. Bytes are separated by a period or colon. • ip ip-address—Specifies an IP address. • ip-list—Specifies that a list of IP addresses immediately follows the option code. • ip-address1 [ip-address2 …]—Specifies a list of one or more IP addresses. Command Mode DHCP Pool Host Configuration mode DHCP Pool Network Configuration mode User Guidelines DHCP provides a framework for passing configuration information to hosts on a TCP/IP network. Configuration parameters and other control information are carried in tagged data items that are stored in the DHCP message options field. The data items themselves are also called options. The 672 DHCP Server Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\DCHP_Server.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY current set of DHCP options are documented in RFC 2131, Dynamic Host Configuration Protocol. For options in hexadecimal format, the string parameter should include all the bytes in the option value, including leading zeros. Examples The following example configures DHCP option 19, which specifies whether the client should configure its IP layer for packet forwarding. A value of 0 means disable Ip forwarding. A value of 1 means enable IP forwarding. IP forwarding is enabled in the following example. Console(config-dhcp)# option 19 hex 01 The following example configures DHCP option 2, which specifies the offset of the client's subnet in seconds from Coordinated Universal Time (UTC). A value of 0xE10 in the following example indicates a location 1 hour east of the meridian. Console(config-dhcp)# option 2 hex 00000E10 The following example configures DHCP option 72, which specifies the World Wide Web servers for DHCP clients. World Wide Web servers 172.16.3.252 and 172.16.3.253 are configured in the following example. Console(config-dhcp)# option ip-list 72 172.16.3.252 172.16.3.253 ip dhcp excluded-address Use the ip dhcp excluded-address Global Configuration mode command to specify the IP addresses that a Dynamic Host Configuration Protocol (DHCP) Server should not assign to DHCP clients. Use the no form of this command to remove the excluded IP addresses. Syntax ip dhcp excluded-address low-address [high-address] no ip dhcp excluded-address low-address [high-address]DHCP Server Commands 673 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\DCHP_Server.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Parameters • low-address—Specifies the excluded IP address, or first IP address in an excluded address range. • high-address—Specifies the last IP address in the excluded address range. Default Configuration All IP pool addresses are assignable. Command Mode Global Configuration mode User Guidelines The DHCP Server assumes that all pool addresses can be assigned to clients. Use this command to exclude a single IP address or a range of IP addresses. Example The following example configures an excluded IP address range from 172.16.1.100 through 172.16.1.199. Console(config)# ip dhcp excluded-address 172.16.1.100 172.16.1.199 ip dhcp ping enable Use the ip dhcp ping enable Global Configuration mode command to enable the Dynamic Host Configuration Protocol (DHCP) Server to send ping packets before assigning the address to a requesting client. Use the no form of this command to prevent the server from pinging pool addresses. Syntax ip dhcp ping enable no ip dhcp ping enable Default Configuration DHCP pinging is disabled.674 DHCP Server Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\DCHP_Server.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Command Mode Global Configuration mode User Guidelines The DHCP Server pings a pool address before assigning the address to a requesting client. If the ping is unanswered, the DHCP Server assumes (with a high probability) that the address is not in use and assigns the address to the requesting client. Example The following example enables the DHCP Server to send ping packets before assigning the address to a requesting client. Console(config)# ip dhcp ping enable ping enable Use the ping enable DHCP Pool Network Configuration mode command to enable the Dynamic Host Configuration Protocol (DHCP) Server to send ping packets before assigning the address to a requesting client. Use the no form of this command to prevent the server from pinging pool addresses. Syntax ping enable no ping enable Default Configuration The default configuration is set to enable. Command Mode DHCP Pool Network Configuration mode User Guidelines The DHCP Server pings a pool address before assigning the address to a requesting client. If the ping is unanswered, the DHCP Server assumes (with a high probability) that the address is not in use and assigns the address to the requesting client.DHCP Server Commands 675 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\DCHP_Server.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example The following example enables the DHCP Server to send ping packets before assigning the address to a requesting client. Console(config-dhcp)# ping enable ip dhcp ping count Use the ip dhcp ping count Global Configuration mode command to specify the number of packets a Dynamic Host Configuration Protocol (DHCP) Server sends to a pool address as part of a ping operation. Use the no form of this command to restore the default configuration. Syntax ip dhcp ping count number no ip dhcp ping count Parameters number—Specifies the number of ping packets that are sent before assigning the address to a requesting client. (Range: 1-10) Default Configuration A Dynamic Host Configuration Protocol (DHCP) Server sends two packets to a pool address as part of a ping operation. Command Mode Global Configuration mode Example The following example specifies that a DHCP Server sends five packets to a pool address as part of a ping operation. Console(config)# ip dhcp ping count 5676 DHCP Server Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\DCHP_Server.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY ip dhcp ping timeout The ip dhcp ping timeout Global Configuration mode command specifies the time interval during which a Dynamic Host Configuration Protocol (DHCP) Server waits for a ping reply from an address pool. To restore the default timeout, use the no form of this command. Syntax ip dhcp ping timeout milliseconds no ip dhcp ping timeout Parameters milliseconds — Specifies the amount of time (in milliseconds) that the DHCP server waits for a ping reply before it stops attempting to reach a pool address for client assignment. The timeout range is 300-10000 milliseconds. Default Configuration The default timeout is 500 milliseconds. Command Mode Global Configuration mode User Guidelines This command specifies how long to wait for a ping reply (in milliseconds). Example The following example specifies that a DHCP Server waits 1 second for a ping reply from an address pool before it stops attempting to reach a pool address for client assignment. Console(config)# ip dhcp ping timeout 1000DHCP Server Commands 677 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\DCHP_Server.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY clear ip dhcp binding The clear ip dhcp binding Privileged EXEC mode command deletes the dynamic address binding from the Dynamic Host Configuration Protocol (DHCP) Server database. Syntax clear ip dhcp binding {address | *} Parameters • address — Specifies the binding address to delete from the DHCP database. • * — Clears all automatic bindings. Command Mode Privileged EXEC mode User Guidelines Typically, the address denotes the client IP address. If the asterisk (*) character is specified as the address parameter, DHCP clears all dynamic bindings. Use the no ip dhcp pool Global Configuration mode command to delete a manual binding. Example The following example deletes the address binding 10.12.1.99 from a DHCP server database: Console# clear ip dhcp binding 10.12.1.99 show ip dhcp The show ip dhcp EXEC mode command displays the DHCP configuration. Syntax show ip dhcp678 DHCP Server Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\DCHP_Server.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Command Mode EXEC mode Example The following example displays the DHCP configuration. Console> show ip dhcp DHCP server is enabled. DHCP ping packets is enabled with 2 retries and 500 milliseconds. show ip dhcp excluded-addresses The show ip dhcp excluded-addresses EXEC mode command displays the excluded addresses. Syntax show ip dhcp excluded-addresses Command Mode EXEC mode Example The following example displays the excluded addresses. Console> show ip dhcp excluded-addresses The number of excluded addresses ranges is 2 Excluded addresses: 10.1.1.212- 10.1.1.219, 10.1.2.212- 10.1.2.219 show ip dhcp pool host The show ip dhcp pool host EXEC mode command displays the DHCP pool host configuration.DHCP Server Commands 679 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\DCHP_Server.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Syntax show ip dhcp pool host [address | name] Parameters • address — Specifies the client IP address. • name — Specifies the DHCP pool name. (Length: 1-32 characters) Command Mode EXEC mode Example The following example displays the DHCP pool host configuration. Console> show ip dhcp pool host The number of host pools is 1 Name --------- Station IP Address -------------- 172.16.1.11 Hardware Address ----------------- Client Identifier ----------------- 01b7.0813.8811.66 Console> show ip dhcp pool host station Name --------- Station IP Address -------------- 172.16.1.11 Hardware Address ----------------- Client Identifier ----------------- 01b7.0813.8811.66680 DHCP Server Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\DCHP_Server.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY show ip dhcp pool network The show ip dhcp pool network EXEC mode command displays the DHCP network configuration. Syntax show ip dhcp pool network [name] Parameters name — Specifies the DHCP pool name. (Length: 1-32 characters) Command Mode EXEC mode Example Router> show ip dhcp pool network The number of network pools is 2 Name Address range mask Lease ---------------------------------------------------- Mask: 255.255.0.0 Default router: 172.16.1.1 Client name: client1 DNS server: 10.12.1.99 Domain name: yahoo.com NetBIOS name server: 10.12.1.90 NetBIOS node type: h-node Next server: 10.12.1.99 Next-server-name: 10.12.1.100 Bootfile: Bootfile Time server 10.12.1.99 Options: Code ---- 19 Value ----- Ox01DHCP Server Commands 681 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\DCHP_Server.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY marketing 10.1.1.17-10.1.1.178 255.255.255.0 0d:12h:0m finance 10.1.2.8-10.1.2.178 255.255.255.0 0d:12h:0m Router> show ip dhcp pool network marketing Name Address range mask Lease --------------------------------- ------------------------ marketing 10.1.1.17-10.1.1.178 255.255.255.0 0d:12h:0m Statistics: All-range Available Free Pre-allocated Allocated Expired Declined ---------- --------- ----- ------------- --------- --------- -------- 162 150 68 50 20 3 9 Default router: 10.1.1.1 Ping packets: enabled DNS server: 10.12.1.99 Domain name: yahoo.com NetBIOS name server: 10.12.1.90 NetBIOS node type: h-node Next server: 10.12.1.99 Next-server-name: 10.12.1.100 Bootfile: Bootfile Time server 10.12.1.99 Options: Code Value ------------------ 19 Ox01 show ip dhcp binding Use the show ip dhcp binding EXEC mode command to display the specific one or all the address bindings on the Dynamic Host Configuration Protocol (DHCP) Server. Syntax show ip dhcp binding [ip-address] Parameters ip-address — Specifies the IP address682 DHCP Server Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\DCHP_Server.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Command Mode EXEC mode Example The following example displays the DHCP Server binding address parameters. Router> show ip dhcp binding DHCP server enabled The number of used (all types) entries is 5 The number of pre-allocated entries is 1 The number of allocated entries is 1 The number of expired entries is 1 The number of declined entries is 2 IP address Hardware Address Lease Expiration Type State ---------- ---------------- ------------- ------- --------- 1.16.1.11 00a0.9802.32de Feb 01 1998 dynamic allocated 1.16.3.23 02c7.f801.0422 12:00AM dynamic expired 1.16.3.24 02c7.f802.0422 dynamic declined 1.16.3.25 02c7.f803.0422 dynamic pre-allocated 1.16.3.26 02c7.f804.0422 dynamic declined Router> show ip dhcp binding 1.16.1.11 DHCP server enabled The number of used (all types) entries is 5 The number of pre-allocated entries is 1 The number of allocated entries is 1 The number of expired entries is 1 The number of declined entries is 2 IP address Hardware Address Lease Expiration Type State ---------- ---------------- ----------------- ------- --------- 1.16.1.11 00a0.9802.32de Feb 01 1998 dynamic allocated 12:00 AM Router> show ip dhcp binding 1.16.3.24DHCP Server Commands 683 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\DCHP_Server.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY DHCP server enabled The number of used (all types) entries is 5 The number of pre-allocated entries is 1 The number of allocated entries is 1 The number of expired entries is 1 The number of declined entries is 2 IP address Hardware Address Lease Expiration Type State ---------- ---------------- --------------- ------- --------- 1.16.3.24 02c7.f802.0422 dynamic declined The following table describes the significant fields shown in the display. show ip dhcp server statistics Use the show ip dhcp server statistics EXEC command to display Dynamic Host Configuration Protocol (DHCP) Server statistics. Syntax show ip dhcp server statistics Command Mode EXEC mode Field Description IP address The host IP address as recorded on the DHCP Server. Hardware address The MAC address or client identifier of the host as recorded on the DHCP Server. Lease expiration The lease expiration date of the host IP address. Type The manner in which the IP address was assigned to the host. State The IP Address state.684 DHCP Server Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\DCHP_Server.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example The following example displays DHCP Server statistics DHCP server enabled The number of network pools is 6 The number of excluded pools is 2 The number of used (all types) entries is 7 The number of pre-allocated entries is 1 The number of allocated entries is 3 The number of static entries is 1 The number of dynamic entries is 1 The number of automatic entries is 1 The number of expired entries is 1 The number of declined entries is 2 show ip dhcp allocated Use the show ip dhcp allocated EXEC mode command to display the specific one or all the allocated address on the Dynamic Host Configuration Protocol (DHCP) Server. Syntax show ip dhcp allocated [ip-address] Parameters ip-address — Specifies the IP address Command Mode EXEC mode Example The following example displays the DHCP Server allocated IP addresses. Router> show ip dhcp allocated DHCP server enabledDHCP Server Commands 685 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\DCHP_Server.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY The number of allocated entries is 3 The number of static entries is 1 The number of dynamic entries is 1 The number of automatic entries is 1 IP address Hardware address Lease expiration Type ---------- ---------------- -------------------- --------- 172.16.1.11 00a0.9802.32de Feb 01 1998 12:00 AM Dynamic 172.16.3.253 02c7.f800.0422 Infinite Automatic 172.16.3.254 02c7.f800.0422 Infinite Static Router> show ip dhcp allocated 172.16.1.11 DHCP server enabled The number of allocated entries is 2 The number of static entries is 0 The number of dynamic entries is 2 IP address Hardware address Lease expiration Type ---------- ---------------- -------------------- -------- 172.16.1.11 00a0.9802.32de Feb 01 1998 12:00 AM Dynamic Router> show ip dhcp allocated 172.16.3.254 DHCP server enabled The number of allocated entries is 2 The number of static entries is 0 The number of dynamic entries is 2 IP address Hardware address Lease expiration Type ---------- ---------------- -------------------- ------- 172.16.3.254 02c7.f800.0422 Infinite Static686 DHCP Server Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\DCHP_Server.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY The following table describes the significant fields shown in the display. show ip dhcp declined Use the show ip dhcp declined EXEC command to display the specific one or all the declined addresses on the Dynamic Host Configuration Protocol (DHCP) server. Syntax show ip dhcp declined [ip-address] Parameters ip-address—Specifies the IP address. Command Mode EXEC mode Example Router> show ip dhcp declined DHCP server enabled IP address Hardware address 172.16.1.11 00a0.9802.32de 172.16.3.254 02c7.f800.0422 Router> show ip dhcp declined 172.16.1.11 DHCP server enabled Field Description IP address The host IP address as recorded on the DHCP Server. Hardware address The MAC address or client identifier of the host as recorded on the DHCP Server. Lease expiration The lease expiration date of the host IP address. Type The manner in which the IP address was assigned to the host.DHCP Server Commands 687 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\DCHP_Server.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY IP address Hardware address 172.16.1.1100a0.9802.32de 172.16.1.12 show ip dhcp declined Field Descriptions • IP address—The IP address of the host as recorded on the DHCP Server. • Hardware address—The MAC address or client identifier of the host as recorded on the DHCP Server. show ip dhcp expired Use the show ip dhcp expired EXEC command to display the specific one or all the expired addresses on the Dynamic Host Configuration Protocol (DHCP) server. Syntax show ip dhcp expired [ip-address] Parameters ip-address—Specifies the IP. Command Mode EXEC mode Example Router> show ip dhcp expired DHCP server enabled IP address Hardware address 172.16.1.11 00a0.9802.32de 172.16.3.254 02c7.f800.0422 Router> show ip dhcp expired 172.16.1.11 DHCP server enabled688 DHCP Server Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\DCHP_Server.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY IP address Hardware address 172.16.1.1300a0.9802.32de 172.16.1.14 show ip dhcp expired Field Descriptions • IP address—The IP address of the host as recorded on the DHCP Server. • Hardware address—The MAC address or client identifier of the host as recorded on the DHCP Server. show ip dhcp pre-allocated Use the show ip dhcp pre-allocated EXEC command to display the specific one or all the pre-allocated addresses on the Dynamic Host Configuration Protocol (DHCP) server. Syntax show ip dhcp pre-allocated [ip-address] Parameters ip-address—Specifies the IP. Command Mode EXEC mode Examples Router> show ip dhcp pre-allocated DHCP server enabled IP address Hardware address 172.16.1.11 00a0.9802.32de 172.16.3.254 02c7.f800.0422 Router> show ip dhcp pre-allocated 172.16.1.11 DHCP server enabledDHCP Server Commands 689 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\DCHP_Server.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY IP address Hardware address 172.16.1.1500a0.9802.32de 172.16.1.16 show ip dhcp declined Field Descriptions • IP address—The IP address of the host as recorded on the DHCP Server. • Hardware address—The MAC address or client identifier of the host as recorded on the DHCP Server.690 DHCP Server Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\DCHP_Server.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LYIP Routing Protocol-Independent Commands 691 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\IP_Routing.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY 43 IP Routing Protocol-Independent Commands ip route Use the ip route Global Configuration mode command to configure static routes. Use the no form of this command to remove static routes. Syntax ip route prefix {mask | prefix-length} ip-address [metric distance] [rejectroute] no ip route prefix {mask | prefix-length} [ip-address] Parameters • prefix—Specifies the IP address that is the IP route prefix for the destination IP. • mask—Specifies the network subnet mask of the IP address prefix. • prefix-length—Specifies the number of bits that comprise the IP address prefix. The prefix length must be preceded by a forward slash (/). (Range: 0–32) • ip-address—Specifies the IP address or IP alias of the next hop that can be used to reach the network. • metric distance—Specifies an administrative distance. (Range: 1–255) • reject-route—Stops routing to the destination network via all gateways. Default Configuration The default administrative distance is 1.692 IP Routing Protocol-Independent Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\IP_Routing.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Command Mode Global Configuration mode Example The following example configures a static route with prefix 172.16.0.0, prefix length 16, and gateway 131.16.1.1. Console(config)# ip route 172.16.0.0 /16 131.16.1.1 ip routing Use the ip routing Global Configuration mode command to enable IPv4 Routing. Use the no format of the command to disable IPv4 Routing. Syntax ip routing no ip routing Default Configuration Enabled by default. Command Mode Global Configuration mode Default Configuration No routing is defined show ip route Use the show ip route EXEC mode command to display the current routing table state. Syntax show ip route [connected | static | {address address [mask | prefix-length] [longer-prefixes]}]IP Routing Protocol-Independent Commands 693 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\IP_Routing.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Parameters • connected—Displays connected routing entries only. • static—Displays static routing entries only. • address address—Specifies the address for which routing information is displayed. • mask—Specifies the network subnet mask of the IP address. • prefix-length—Specifies the number of bits that comprise the IP address prefix. The prefix length must be preceded by a forward slash (/). (Range: 1–32) • longer-prefixes—Specifies that the address and mask pair becomes a prefix and any routes that match that prefix are displayed. Command Mode EXEC mode Example The following example displays the current routing table state. Console> show ip route console# show ip route Maximum Parallel Paths: 1 (1 after reset) IP Forwarding: enabled Codes: C - connected, S - static, D - DHCP S 0.0.0.0/0 [1/1] via 10.5.234.254 119:9:27 vlan 1 C 10.5.234.0/24 is directly connected vlan 1 Console> show ip route address 172.1.1.0 255.255.255.0 Codes: C - connected, S - static, E - OSPF external, * - candidate default S 172.1.1.0/24 [5/3] via 10.0.2.1, 17:12:19, Ethernet1694 IP Routing Protocol-Independent Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\IP_Routing.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Console> show ip route address 172.1.1.0 255.255.255.0 longerprefixes Codes: C - connected, S - static, E - OSPF external S 172.1.1.0/24 [5/3] via 10.0.2.1, 17:12:19, Ethernet1 S 172.1.1.1/32 [5/3] via 10.0.3.1, 19:51:18, Ethernet1 The following table describes the significant fields shown in the display: Field Description O The protocol that derived the route. 10.8.1.0/24 The remote network address. [30/2000] The first number in the brackets is the administrative distance of the information source; the second number is the metric for the route. via 10.0.1.2 The address of the next router to the remote network. 00:39:08 The last time the route was updated, in hours:minutes:seconds. Ethernet 1 The interface through which the specified network can be reached.695 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\ACL.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY 44 ACL Commands ip access-list Use the ip access-list global configuration mode command to define an IPv4 access list and to place the device in IPv4 Access List Configuration mode. Use the no form of this command to remove the access list. Syntax ip access-list extended access-list-name no ip access-list extended access-list-name Parameters • access-list-name—Name of the IPv4 access list. • access-list-name—0–32 characters. (Use "" for empty string) Default No IPv4 access list is defined. Command Mode Global Configuration mode User Guidelines IPv4 ACL is defined by a unique name. IPv4 ACLs, IPv6 ACLs, MAC ACLs or policy maps cannot have the same name. Example console(config)# ip access-list extended server696 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\ACL.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY permit ( IP ) Use the permit IP Access-list Configuration mode command to set permit conditions for IPv4 access list. Syntax permit protocol {any | source source-wildcard} {any | destination destination-wildcard} [dscp number | precedence number] [time-range time-range-name] permit icmp {any | source source-wildcard} {any | destination destinationwildcard} [any | icmp-type] [any | icmp-code]] [dscp number | precedence number] [time-range time-range-name] permit igmp {any | source source-wildcard} {any | destination destinationwildcard}[igmp-type] [dscp number | precedence number] [time-range time-range-name] permit tcp {any | source source-wildcard} {any|source-port/port-range}{any | destination destination-wildcard} {any|destination-port/port-range } [dscp number | precedence number] [match-all list-of-flags] [time-range timerange-name] permit udp {any | source source-wildcard} {any|source-port/port-range} {any | destination destination-wildcard} {any|destination-port/port-range } [dscp number | precedence number] [match-all time-range-name] [timerange time-range-name] Parameters • protocol—The name or the number of an IP protocol. Available protocol names icmp, igmp, ip, tcp, egp, igp, udp, hmp, rdp, idpr, ipv6, ipv6:rout, ipv6:frag, idrp, rsvp, gre, esp, ah, ipv6:icmp, eigrp, ospf, ipinip, pim, l2tp, isis. To match any protocol use the IP keyword.(Range: 0–255) • source—Source IP address of the packet. • source-wildcard—Wildcard bits to be applied to the source IP address. Use ones in the bit position that you want to be ignored. • destination—Destination IP address of the packet. • destination-wildcard—Wildcard bits to be applied to the destination IP address. Use ones in the bit position that you want to be ignored.697 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\ACL.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY • dscp number—Specifies the DSCP value. • precedence number—Specifies the IP precedence value. • icmp-type—Specifies an ICMP message type for filtering ICMP packets. Enter a number or one of the following values: echo-reply, destinationunreachable, source-quench, redirect, alternate-host-address, echorequest, router-advertisement, router-solicitation, time-exceeded, parameter-problem, timestamp, timestamp-reply, information-request, information-reply, address-mask-request, address-mask-reply, traceroute, datagram-conversion-error, mobile-host-redirect, mobile-registrationrequest, mobile-registration-reply, domain-name-request, domain-namereply, skip, photuris. (Range: 0–255) • icmp-code—Specifies an ICMP message code for filtering ICMP packets. (Range: 0–255) • igmp-type—IGMP packets can be filtered by IGMP message type. Enter a number or one of the following values: host-query, host-report, dvmrp, pim, cisco-trace, host-report-v2, host-leave-v2, host-report-v3. (Range: 0–255) • destination-port—Specifies the UDP/TCP destination port. You can enter range of ports by using hyphen. E.g. 20 - 21. For TCP enter a number or one of the following values: bgp (179), chargen (19), daytime (13), discard (9), domain (53), drip (3949), echo (7), finger (79), ftp (21), ftpdata (20), gopher (70), hostname (42), irc (194), klogin (543), kshell (544), lpd (515), nntp (119), pop2 (109), pop3 (110), smtp (25), sunrpc (1110, syslog (514), tacacs-ds (49), talk (517), telnet (23), time (37), uucp (117), whois (43), www (80). For UDP enter a number or one of the following values: biff (512), bootpc (68), bootps (67), discard (9), dnsix (90), domain (53), echo (7 ), mobile-ip (434), nameserver (42), netbiosdgm (138), netbios-ns (137), on500-isakmp (4500), ntp (123), rip (520), snmp (161), snmptrap (162), sunrpc (111), syslog (514), tacacs-ds (49), talk (517), tftp (69), time (37), who (513), xdmcp (177).(Range: 0–65535). • source-port—Specifies the UDP/TCP source port. Predefined port names are defined in the destination-port parameter. (Range: 0–65535)698 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\ACL.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY • match-all list-of-flags—List of TCP flags that should occur. If a flag should be set, it is prefixed by “+”. If a flag should be unset, it is prefixed by “-”. Available options are +urg, +ack, +psh, +rst, +syn, +fin, -urg, - ack, -psh, -rst, -syn and -fin. The flags are concatenated to a one string. For example: +fin-ack. • time-range-name—Name of the time range that applies to this permit statement. (Range: 1–32) Default No IPv4 access list is defined. Command Mode IP Access-list Configuration mode User Guidelines Enter IP-access list configuration mode by using the IP Access-list Global Configuration command. After an access control entry (ACE) is added to an access control list, an implied deny any any condition exists at the end of the list. That is, if there are no matches, the packets are denied. However, before the first ACE is added, the list permits all packets. The number of TCP/UDP ranges that can be defined in ACLs is limited. You can define up to #ASIC-specific ranges for TCP and up to #ASIC-specific ranges for UDP. If a range of ports is used for source port in ACE it would be not be counted again if it is also used for source port in another ACE. If a range of ports is used for destination port in ACE it would be not be counted again if it is also used for destination port in another ACE. If a range of ports is used for source port it would be counted again if it is also used for destination port. Example console(config)# ip access-list extended server console(config-ip-al)# permit ip 1.1.1.0 0.0.0.255 1.1.2.0 0.0.0.0699 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\ACL.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY deny ( IP ) Use the deny IP Access-list Configuration mode command to set deny conditions for IPv4 access list. Syntax deny protocol {any | source source-wildcard} {any | destination destinationwildcard} [dscp number | precedence number] [time-range time-rangename] [disable-port | log-input] deny icmp {any | source source-wildcard} {any | destination destinationwildcard{any|icmp-type} {any|icmp-code} [dscp number | precedence number] [time-range time-range-name] [disable-port | log-input] deny igmp {any | source source-wildcard} {any | destination destinationwildcard}[igmp-type] [dscp number | precedence number] [time-range time-range-name] [disable-port | log-input] deny tcp {any | source source-wildcard} {any|source-port/port-range}{any | destination destination-wildcard} {any|destination-port/port-range } [dscp number | precedence number] [match-all list-of-flags] [time-range timerange-name] [disable-port | log-input] deny udp {any | source source-wildcard} {any|source-port/port-range} {any | destination destination-wildcard} {any|destination-port/port-range } [dscp number | precedence number] [match-all time-range-name] [time-range time-range-name] [disable-port | log-input] Parameters • protocol—The name or the number of an IP protocol. Available protocol names: icmp, igmp, ip, tcp, egp, igp, udp, hmp, rdp, idpr, ipv6, ipv6:rout, ipv6:frag, idrp, rsvp, gre, esp, ah, ipv6:icmp, eigrp, ospf, ipinip, pim, l2tp, isis. To match any protocol use the IP keyword. (Range: 0–255) • source—Source IP address of the packet. • source-wildcard—Wildcard bits to be applied to the source IP address. Use 1s in the bit position that you want to be ignored. • destination—Destination IP address of the packet. • destination-wildcard—Wildcard bits to be applied to the destination IP address. Use 1s in the bit position that you want to be ignored.700 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\ACL.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY • dscp number—Specifies the DSCP value. • precedence number—Specifies the IP precedence value. • icmp-type—Specifies an ICMP message type for filtering ICMP packets. Enter a number or one of the following values: echo-reply, destinationunreachable, source-quench, redirect, alternate-host-address, echorequest, router-advertisement, router-solicitation, time-exceeded, parameter-problem, timestamp, timestamp-reply, information-request, information-reply, address-mask-request, address-mask-reply, traceroute, datagram-conversion-error, mobile-host-redirect, mobile-registrationrequest, mobile-registration-reply, domain-name-request, domain-namereply, skip, photuris. (Range: 0–255) • icmp-code—Specifies an ICMP message code for filtering ICMP packets. (Range: 0–255) • igmp-type—IGMP packets can be filtered by IGMP message type. Enter a number or one of the following values: host-query, host-report, dvmrp, pim, cisco-trace, host-report-v2, host-leave-v2, host-report-v3. (Range: 0–255) • destination-port—Specifies the UDP/TCP destination port. You can enter range of ports by using hyphen. E.g. 20 - 21. For TCP enter a number or one of the following values: bgp (179), chargen (19), daytime (13), discard (9), domain (53), drip (3949), echo (7), finger (79), ftp (21), ftpdata (20), gopher (70), hostname (42), irc (194), klogin (543), kshell (544), lpd (515), nntp (119), pop2 (109), pop3 (110), smtp (25), sunrpc (1110, syslog (514), tacacs-ds (49), talk (517), telnet (23), time (37), uucp (117), whois (43), www (80). For UDP enter a number or one of the following values: biff (512), bootpc (68), bootps (67), discard (9), dnsix (90), domain (53), echo (7 ), mobile-ip (434), nameserver (42), netbios-dgm (138), netbios-ns (137), non500-isakmp (4500), ntp (123), rip (520), snmp 161), snmptrap (162), sunrpc (111), syslog (514), tacacs-ds (49), talk (517), tftp (69), time (37), who (513), xdmcp (177). (Range: 0–65535) • source-port—Specifies the UDP/TCP source port. Predefined port names are defined in the destination-port parameter. (Range: 0–65535)701 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\ACL.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY • match-all list-of-flags—List of TCP flags that should occur. If a flag should be set it is prefixed by “+”.If a flag should be unset it is prefixed by “-”. Available options are +urg, +ack, +psh, +rst, +syn, +fin, -urg, -ack, - psh, -rst, -syn and -fin. The flags are concatenated to a one string. For example: +fin-ack. • time-range-name—Name of the time range that applies to this permit statement. (Range: 1–32) • disable-port—The Ethernet interface is disabled if the condition is matched. • log-input—Specifies sending an informational syslog message about the packet that matches the entry. Because forwarding is done in hardware and logging is done in software, if a large number of packets match a deny ACE containing a log-input keyword, the software might not be able to match the hardware processing rate, and not all packets will be logged. Default No IPv4 access list is defined. Command Mode IP Access-list Configuration mode User Guidelines Enter IP-access list configuration mode by using the IP Access-list Global Configuration command. After an access control entry (ACE) is added to an access control list, an implied deny any any condition exists at the end of the list. That is, if there are no matches, the packets are denied. However, before the first ACE is added, the list permits all packets. The number of TCP/UDP ranges that can be defined in ACLs is limited. You can define up to #ASIC-specific ranges for TCP and up to #ASIC-specific ranges for UDP. If a range of ports is used for source port in ACE it would be not be counted again if it is also used for source port in another ACE. If a range of ports is used for destination port in ACE it would be not be counted again if it is also used for destination port in another ACE. If a range of ports is used for source port, it would be counted again if it is also used for destination port. 702 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\ACL.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY Example console(config)# ip access-list extended server console(config-ip-al)# deny ip 1.1.1.0 0.0.0.255 1.1.2.0 0.0.0.0 ipv6 access-list Use the ipv6 access-list global configuration mode command to define an IPv6 access list and to place the device in IPv6 access list configuration mode. Use the no form of this command to remove the access list. Syntax ipv6 access-list [access-list-name] no ipv6 access-list [access-list-name] Parameters • access-list-name—Name of the IPv6 access list. • access-list-name—0–32 characters (use "" for empty string) Default No IPv6 access list is defined. Command Mode Global Configuration mode User Guidelines IPv6 ACL is defined by a unique name. IPv4 ACLs, IPv6 ACLs, MAC ACLs or policy maps cannot have the same name. Every IPv6 ACL has implicit permit icmp any any nd-ns any, permit icmp any any nd-na any, and deny ipv6 any any statements as its last match conditions. (The former two match conditions allow for ICMPv6 neighbor discovery.) The IPv6 neighbor discovery process uses the IPv6 network layer service, therefore, by default, IPv6 ACLs implicitly allow IPv6 neighbor discovery packets to be sent and received on an interface. In IPv4, the Address Resolution Protocol (ARP), which is equivalent to the IPv6 neighbor 703 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\ACL.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY discovery process, uses a separate data link layer protocol; therefore, by default, IPv4 ACLs implicitly allow ARP packets to be sent and received on an interface. Example Switch (config)# ipv6 access-list acl1 Switch(config-ipv6-acl)# permit tcp 2001:0DB8:0300:0201::/64 any any 80 permit ( IPv6 ) Use the permit command in IPv6 Access-list Configuration mode to set permit conditions for IPv6 access list. Syntax permit protocol {any |{source-prefix/length }{any | destination- prefix/length } [dscp number | precedence number] [time-range time-rangename] permit icmp {any | {source-prefix/length }{any | destination- prefix/length } {any|icmp-type} {any|icmp-code} [dscp number | precedence number] [time-range time-range-name] permit tcp {any | {source-prefix/length } {any | source-port/port-range} }{any | destination- prefix/length } {any| destination-port/port-range} [dscp number | precedence number] [match-all list-of-flags] [time-range timerange-name] permit udp {any | {source-prefix/length }} {any | source-port/port-range} }{any | destination- prefix/length } {any| destination-port/port-range} [dscp number | precedence number] [time-range time-range-name] Parameters • protocol—The name or the number of an IP protocol. Available protocol names are: icmp (58), tcp (6) and udp (17). To match any protocol, use the IPv6 keyword. (Range: 0–255)704 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\ACL.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY • source-prefix/length—The source IPv6 network or class of networks about which to set permit conditions. This argument must be in the form documented in RFC 3513 where the address is specified in hexadecimal using 16-bit values between colons. • destination-prefix/length—The destination IPv6 network or class of networks about which to set permit conditions. This argument must be in the form documented in RFC 3513 where the address is specified in hexadecimal using 16-bit values between colons. • dscp number—Specifies the DSCP value. (Range: 0–63) • precedence number—Specifies the IP precedence value. • icmp-type—Specifies an ICMP message type for filtering ICMP packets. Enter a number or one of the following values: destination-unreachable (1), packet-too-big (2), time-exceeded (3), parameter-problem (4), echorequest (128), echo-reply (129), mld-query (130), mld-report (131), mldv2-report (143), mld-done (132), router-solicitation (133), routeradvertisement (134), nd-ns (135), nd-na (136). (Range: 0–255) • icmp-code—Specifies an ICMP message code for filtering ICMP packets. (Range: 0–255) • destination-port—Specifies the UDP/TCP destination port. You can enter a range of ports by using a hyphen. E.g. 20 - 21. For TCP enter a number or one of the following values: bgp (179), chargen (19), daytime (13), discard (9), domain (53), drip (3949), echo (7), finger (79), ftp (21), ftp-data (20), gopher (70), hostname (42), irc (194), klogin (543), kshell (544), lpd (515), nntp (119), pop2 (109), pop3 (110), smtp (25), sunrpc (1110, syslog (514), tacacs-ds (49), talk (517), telnet (23), time (37), uucp (117), whois (43), www (80). For UDP enter a number or one of the following values: biff (512), bootpc (68), bootps (67), discard (9), dnsix (90), domain (53), echo (7 ), mobile-ip (434), nameserver (42), netbiosdgm (138), netbios-ns (137), non500-isakmp (4500), ntp (123), rip (520), snmp (161), snmptrap (162), sunrpc (111), syslog (514), tacacs (49), talk (517), tftp (69), time (37), who (513), xdmcp (177). (Range: 0–65535) • source-port—Specifies the UDP/TCP source port. Predefined port names are defined in the destination-port parameter. (Range: 0–65535)705 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\ACL.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY • match-all list-of-flag—List of TCP flags that should occur. If a flag should be set it is prefixed by “+”.If a flag should be unset it is prefixed by “-”. Available options are +urg, +ack, +psh, +rst, +syn, +fin, -urg, -ack, -psh, -rst, -syn and -fin. The flags are concatenated to a one string. For example: +fin-ack. • time-range-name—Name of the time range that applies to this permit statement. (Range: 1–32) Default No IPv6 access list is defined. Command Mode Ipv6 Access-list Configuration mode User Guidelines The number of TCP/UDP ranges that can be defined in ACLs is limited. You can define up to #ASIC-specific ranges for TCP and up to #ASIC-specific ranges for UDP. If a range of ports is used for a source port in ACE it would be not be counted again if it is also used for a source port in another ACE. If a range of ports is used for destination port in ACE it would be not be counted again if it is also used for destination port in another ACE. If a range of ports is used for source port it would be counted again if it is also used for destination port. Example console(config)# ipv6 access-list server console(config-ipv6-al)# permit tcp 3001::2/64 any any 80 deny ( IPv6 ) Use the deny command in IPv6 access list configuration mode to set permit conditions for IPv6 access list.706 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\ACL.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY Syntax deny protocol {any | {source-prefix/length }{any | destination- prefix/length } [dscp number | precedence number] [time-range time-range-name] [disable-port | log-input] deny icmp {any | {source-prefix/length }{any | destination- prefix/length } {any|icmp-type} {any|icmp-code} [dscp number | precedence number] [time-range time-range-name] [disable-port | log-input] deny tcp {any | {source-prefix/length } {any | source-port/port-range} }{any | destination- prefix/length } {any| destination-port/port-range} [dscp number | precedence number] [match-all list-of-flags] [time-range timerange-name] [disable-port | log-input] deny udp {any | {source-prefix/length }} {any | source-port/port-range} }{any | destination- prefix/length } {any| destination-port/port-range} [dscp number | precedence number] [time-range time-range-name] [disable-port | log-input] Parameters • protocol—The name or the number of an IP protocol. Available protocol names are: icmp (58), tcp (6) and udp (17). To match any protocol use the IPv6 keyword. (Range: 0–255) • source-prefix/length—The source IPv6 network or class of networks about which to set permit conditions. This argument must be in the form documented in RFC 3513 where the address is specified in hexadecimal using 16-bit values between colons. • destination-prefix/length—The destination IPv6 network or class of networks about which to set permit conditions. This argument must be in the form documented in RFC 3513 where the address is specified in hexadecimal using 16-bit values between colons. • dscp number—Specifies the DSCP value. (Range: 0–63) • precedence number—Specifies the IP precedence value. • icmp-type—Specifies an ICMP message type for filtering ICMP packets. Enter a number or one of the following values: destination-unreachable (1), packet-too-big (2), time-exceeded (3), parameter-problem (4), echo-707 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\ACL.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY request (128), echo-reply (129), mld-query (130), mld-report (131), mldv2-report (143), mld-done (132), router-solicitation (133), routeradvertisement (134), nd-ns (135), nd-na (136). (Range: 0–255) • icmp-code—Specifies an ICMP message code for filtering ICMP packets. (Range: 0–255) • destination-port—Specifies the UDP/TCP destination port. You can enter a range of ports by using a hyphen. E.g. 20 - 21. For TCP enter a number or one of the following values: bgp (179), chargen (19), daytime (13), discard (9), domain (53), drip (3949), echo (7), finger (79), ftp (21), ftp-data 20), gopher (70), hostname (42), irc (194), klogin (543), kshell (544), lpd (515), nntp (119), pop2 (109), pop3 (110), smtp (25), sunrpc (1110, syslog (514), tacacs-ds (49), talk (517), telnet (23), time (37), uucp (117), whois (43), www (80). For UDP enter a number or one of the following values: biff (512), bootpc (68), bootps (67), discard (9), dnsix (90), domain (53), echo (7 ), mobile-ip (434), nameserver (42), netbiosdgm (138), netbios-ns (137), non500-isakmp (4500), ntp (123), rip (520), snmp (161), snmptrap (162), sunrpc (111), syslog (514), tacacs (49), talk (517), tftp (69), time (37), who (513), xdmcp (177). (Range: 0–65535) • source-port—Specifies the UDP/TCP source port. Predefined port names are defined in the destination-port parameter. (Range: 0–65535) • match-all list-of-flags—List of TCP flags that should occur. If a flag should be set it is prefixed by “+”.If a flag should be unset it is prefixed by “-”. Available options are +urg, +ack, +psh, +rst, +syn, +fin, -urg, -ack, - psh, -rst, -syn and -fin. The flags are concatenated to a one string. For example: +fin-ack. • time-range-name—Name of the time range that applies to this permit statement. (Range: 1–32) • disable-port—The Ethernet interface would be disabled if the condition is matched. • log-input—Specifies to send an informational syslog message about the packet that matches the entry. Because forwarding is done in hardware and logging is done in software, if a large number of packets match a deny ACE containing a log-input keyword, the software might not be able to match the hardware processing rate, and not all packets will be logged.708 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\ACL.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY Default No IPv6 access list is defined. Command Mode IPv6 Access-list Configuration mode User Guidelines The number of TCP/UDP ranges that can be defined in ACLs is limited. You can define up to #ASIC-specific ranges for TCP and up to #ASIC-specific ranges for UDP. If a range of ports is used for source port in ACE it would be not be counted again if it is also used for source port in another ACE. If a range of ports is used for a destination port in ACE it would be not be counted again if it is also used for a destination port in another ACE. If a range of ports is used for source port it would be counted again if it is also used for destination port. Example console(config)# ipv6 access-list server console(config-ipv6-al)# deny tcp 3001::2/64 any any 80 mac access-list Use the mac access-list Global Configuration mode command to define a Layer 2 access list and to place the device in MAC Access List Configuration mode. Use the no form of this command to remove the access list. Syntax mac access-list extended access-list-name no mac access-list extended access-list-name Parameters access-list-name—Specifies the name of the MAC access list. (Range: accesslist-name0–32 characters - use "" for empty string) Default No MAC access list is defined.709 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\ACL.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY Command Mode Global Configuration mode User Guidelines MAC ACLs are defined by a unique name. IPv4 ACLs, IPv6 ACLs, MAC ACLs or policy maps cannot have the same name. Example console(config)# mac access-list extended server1 permit ( MAC ) Use the permit command in MAC Access List Configuration mode to set permit conditions for an MAC access list,. Syntax permit {any | source source-wildcard} {any | destination destination-wildcard} [eth-type 0| aarp | amber | dec-spanning | decnet-iv | diagnostic | dsm | etype-6000] [vlan vlan-id] [cos cos cos-wildcard] [time-range time-range-name] Parameters • source—Source MAC address of the packet. • source-wildcard—Wildcard bits to be applied to the source MAC address. Use 1s in the bit position that you want to be ignored. • destination—Destination MAC address of the packet. • destination-wildcard—Wildcard bits to be applied to the destination MAC address. Use 1s in the bit position that you want to be ignored. • eth-type—The Ethernet type in hexadecimal format of the packet. • vlan-id—The VLAN ID of the packet. (Range: 1–4094) • cos—The Class of Service of the packet. (Range: 0–7) • cos-wildcard—Wildcard bits to be applied to the CoS. • time-range-name—Name of the time range that applies to this permit statement. (Range: 1–32)710 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\ACL.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY Default No MAC access list is defined. Command Mode MAC Access-list Configuration mode User Guidelines Enter MAC-access list configuration mode by using the MAC Access-list Global Configuration command. After an access control entry (ACE) is added to an access control list, an implied deny any any condition exists at the end of the list. That is, if there are no matches, the packets are denied. However, before the first ACE is added, the list permits all packets. Example console(config)# mac access-list extended server1 console(config-mac-al)# permit 00:00:00:00:00:01 00:00:00:00:00:ff any service-acl input Use the service-acl input command in Interface Configuration mode to control access to an interface. Use the no form of this command to remove the access control. Syntax service-acl input acl-name1 [acl-name2] no service-acl input Parameters acl-name—Specifies an ACL to apply to the interface. See the usage guidelines. (Range: acl-name 0–32 characters. Use "" for empty string) Default No ACL is assigned.711 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\ACL.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY Command Mode Interface Configuration (Ethernet, Port-Channel) mode. User Guidelines IPv4 ACLs and IPv6 ACLs can be bound together to an interface. MAC ACLs cannot be bound on an interface with an IPv4 ACL or IPv6 ACL. Two ACLs of the same type cannot be added to a port. An ACL cannot be added to a port that is already bounded to an ACL, without first removing the current ACL and binding the two ACLs together. Example console(config)# mac access-list extended server console(config-mac-al)# permit 00:00:00:00:00:01 00:00:00:00:00:ff any console(config-mac-al)# exit console(config)# interface gi1/0/1 console(config-if)# service-acl input server service-acl output Use the service-acl output command in Interface Configuration mode to control access to an interface on the egress (transmit path). Use the no form of this command to remove the access control. Syntax service-acl output acl-name1 [acl-name2] no service-acl output Parameters acl-name—Specifies an ACL to apply to the interface. See the Usage Guidelines. Range: acl-name –32 characters. Use "" for empty string Default No ACL is assigned.712 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\ACL.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY Command Mode Interface Configuration (Ethernet, Port-Channel) mode. User Guidelines The deny rule actions: log-input and disable-port are not supported. Using these actions will result in an error. IPv4 ACLs and IPv6 ACLs can be bound together on an interface. A MAC ACL cannot be bound on an interface together with an IPv4 ACL or IPv6 ACL. Two ACLs of the same type cannot be added to a port. An ACL cannot be added to a port that is already bound to an ACL, without first removing the current ACL and binding the two ACLs together Example console(config)# mac access-list extended server console(config-mac-al)# permit 00:00:00:00:00:01 00:00:00:00:00:ff any console(config-mac-al)# exit console(config)# interface gi1/0/1 console(config-if)# service-acl output server service-acl input block Use the service-acl input block Interface Configuration mode commands to discard packets that are classified to specific protocols. Use the no form of those commands to disable discarding of the packets. Syntax service-acl input protocol1 [protocol2 … protocol6] no service-acl input Parameters protocol—Specifies a protocol to filter. Available values are: blockcdp, blockvtp, blockdtp, blockudld, blockpagp, blocksstp, and blockall.713 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\ACL.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY Default Configuration No protocol is defined Command Mode Interface Configuration ((Ethernet, Port-Channel) mode User Guidelines To define multiple protocols on the same interface, define them in the same command. To change configuration of the protocol filtering for an interface, first remove the current assignment of protocol filtering assignment, and then assign the new configuration of the protocol filtering. If Proprietary Protocol Filtering rules are assigned on an interface, you cannot assign ACL or Policy Map or Security suite rules to that interface and enable 802.1X Dynamic Policy Assignment to that interface. If ACL or Policy Map or Security suite rules are assigned to an interface or 802.1X Dynamic Policy Assignment is enabled for an interface, you cannot assign Proprietary Protocol Filtering rules to that interface. The following table defines the DA and protocol types of the packets that are subject for discarding per each command: Example Console (Config-if)# service-acl input blockcdp blockvtp Command Destination Address Protocol Type blockcdp 0100.0ccc.cccc 0x2000 blockvtp 0100.0ccc.cccc 0x2003 blockdtp 0100.0ccc.cccc 0x2004 blockudld 0100.0ccc.cccc 0x0111 blockpagp 0100.0ccc.cccc 0x0104 blocksstp 0100.0ccc.cccd - blockall 0100.0ccc.ccc0 - 0100.0ccc.cccf -714 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\ACL.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY time-range Use the time-range global configuration mode command to enable TimeRange Configuration mode and define time ranges for functions (such as access lists). Use the no form of this command To remove the time range configuration. Syntax time-range time-range-name no time-range time-range-name Parameters time-range-name—Specifies the name for the time range. (Range: 1–32 characters) Default No time range is defined Command Mode Global Configuration mode User Guidelines After the time-range command, use the periodic time-range configuration command and the absolute time-range configuration command. Multiple periodic commands are allowed in a time range. Only one absolute command is allowed. If a time-range command has both absolute and periodic values specified, the periodic items are evaluated only after the absolute start time is reached, and are not further evaluated after the absolute end time is reached. All time specifications are interpreted as local time. To ensure that the time range entries take effect at the desired times, the software clock should be set by the user or by SNTP. If the software clock is not set by the user or by SNTP, time range ACEs are not activated. The user cannot delete a time-range that is bounded to an ACE or to any other feature.715 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\ACL.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY Example Console (config)# time-range http-allowed Console (config-time-range)# absolute start 12:00 1 jan 2005 end 12:00 31 dec 2005 Console (config-time-range)# periodic monday 8:00 to friday 20:00 absolute Use the absolute Time-range Configuration mode command to specify an absolute time when a time range is in effect. Use the no form of this command To remove the time limitation. Syntax absolute start hh:mm day month year no absolute start absolute end hh:mm day month year no absolute end Parameters • start—Absolute time and date that the permit or deny statement of the associated access list starts going into effect. If no start time and date are specified, the permit or deny statement is in effect immediately. • end—Absolute time and date that the permit or deny statement of the associated access list is no longer in effect. If no end time and date are specified, the permit or deny statement is in effect indefinitely. • hh:mm—Time in hours (military format) and minutes (Range: 0–23, mm: 0–5) • day—Day (by date) in the month. (Range: 1–31) • month—Month (first three letters by name). (Range: Jan...Dec) • year—Year (no abbreviation) (Range: 2000–2097) Default There is no absolute time when the time range is in effect. 716 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\ACL.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY Command Mode Time-Range Configuration mode periodic Use the periodic Time-Range Configuration mode command to specify a recurring (weekly) time range for functions that support the time-range feature. Use the no form of this command to remove the time limitation. Syntax periodic day-of-the-week hh:mm to day-of-the-week hh:mm no periodic day-of-the-week hh:mm to day-of-the-week hh:mm periodic list hh:mm to hh:mm day-of-the-week1 [day-of-the-week2… day-ofthe-week7] no periodic list hh:mm to hh:mm day-of-the-week1 [day-of-the-week2… dayof-the-week7] periodic list hh:mm to hh:mm all no periodic list all hh:mm to hh:mm all Parameters • day-of-the-week—The starting day that the associated time range is in effect. The second occurrence is the ending day the associated statement is in effect. The second occurrence can be the following week (see description in the User Guidelines). Possible values are: Monday, Tuesday, Wednesday, Thursday, Friday, Saturday, and Sunday. • hh:mm—The first occurrence of this argument is the starting hours:minutes (military format) that the associated time range is in effect. The second occurrence is the ending hours:minutes (military format) the associated statement is in effect. The second occurrence can be at the following day (see description in the User Guidelines). (Range: 0–23, mm: 0–59) • list day-of-the-week1—Specifies a list of days that the time range is in effect.717 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\ACL.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY Default There is no periodic time when the time range is in effect. Command Mode Time-range Configuration mode User Guidelines The second occurrence of the day can be at the following week. E.g. Thursday–Monday means that the time range is effective on Thursday, Friday, Saturday, Sunday, and Monday. The second occurrence of the time can be at thefollowing day. E.g. “22:00–2:00”. show time-range Use the show time-range EXEC command To display the time range configuration. Syntax show time-range time-range-name Parameters time-range-name—Specifies the name of the time range. (Range: 1–32) Command Mode EXEC mode Example Console# show time-range http-allowed -------------- absolute start 12:00 1 jan 2005 absolute end 12:00 31 dec 2005 periodic monday 8:00 to friday 20:00718 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\ACL.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY show access-lists Use the show access-lists Privileged EXEC mode command to display access control lists (ACLs) configured on the switch. Syntax show access-lists [name | access-list-number] show access-lists time-range-active [name] Parameters • name—Specifies the name of the ACL. • access-list-number—Specifies the number of the IP standard ACL list. • time-range-active—Shows only the Access Control Entries (ACEs) that their time-range is currently active (including those that are not associated with time-range). Command Mode Privileged EXEC mode Example Switch# show access-lists Router# show access-lists Standard IP access list 1 deny any Standard IP access list 2 deny 192.168.0.0, wildcard bits 0.0.0.255 permit any Standard IP access list 3 deny 0.0.0.0 deny 192.168.0.1, wildcard bits 0.0.0.255 permit any Standard IP access list 4 permit 0.0.0.0 permit 192.168.0.2, wildcard bits 0.0.0.255719 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\ACL.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY Extended IP access list ACL1 permit 234 172.30.40.1 0.0.0.0 any permit 234 172.30.8.8 0.0.0.0 any Extended IP access list ACL2 permit 234 172.30.19.1 0.0.0.255 any time-range weekdays permit 234 172.30.23.8 0.0.0.255 any time-range weekends Switch# show access-lists time-range-active Extended IP access list ACL1 permit 234 172.30.40.1 0.0.0.0 any permit 234 172.30.8.8 0.0.0.0 any Extended IP access list ACL2 permit 234 172.30.19.1 0.0.0.255 any time-range weekdays Switch# show access-lists show interfaces access-lists Use the show interfaces access-lists Privileged EXEC mode command to display access lists applied on interfaces. Syntax show interfaces access-lists [interface-id ] Parameters interface-id—Specifies an interface ID. The interface ID can be one of the following types: Ethernet port, Port-channel or VLAN. Command Mode Privileged EXEC mode720 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\ACL.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY Example Console# show interfaces access-lists Interface ACL ---------- --------- gi1/0/1 Ingress: ip,ipv6 Egress : mac gi1/0/4 Egress : mac gi1/0/5 Ingress: ip clear access-lists counters Use the Clear Access-lists Counters Privileged EXEC mode command to clear access-lists counters. Syntax clear access-lists counters [interface-id] Parameters interface-id—Specifies an interface ID. The interface ID can be one of the following types: Ethernet port or Port-channel. Command Mode Privileged EXEC mode Example console# clear access-lists counters gi1/0/1 show interfaces access-lists counters Use the show interfaces access-lists counters Privileged EXEC mode command to display Access List counters.721 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\ACL.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LY Syntax show interfaces access-lists counters [ ethernet interface | port-channel portchannel-number ] Parameters interface-id—Specifies an interface ID. The interface ID can be one of the following types: Ethernet port or Port-channel. Command Mode Privileged EXEC mode User Guidelines The counter of deny ACE hits counts only ACEs with the log-input keyword. Because forwarding is done in hardware and counting is done in software, if a large number of packets match a deny ACE containing a log-input keyword, the software might not be able to match the hardware processing rate, and some packets might not be counted. Example console# show interfaces access-lists counters Interface Deny ACE hits --------- ------------- gi1/0/1 79 gi1/0/2 9 gi1/0/3 0 Number of hits that were counted in global counter (due to lack of resources) =19722 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\ACL.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 2 0 1 2 - F O R P R O O F O N LYQuality of Service (QoS) Commands 723 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\QoS.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY 45 Quality of Service (QoS) Commands qos Use the qos Global Configuration mode command to enable Quality of Service (QoS) on the device. Use the no form of this command to disable QoS on the device Syntax qos [basic | advanced ] no qos Parameters • basic—QoS basic mode. If no option is specified, the QoS mode defaults to the basic mode. • advanced—Specifies the QoS advanced mode, which enables the full range of QoS configuration. Default Configuration If the qos command is entered without any parameters, the QoS basic mode is enabled. Command Mode Global Configuration mode Example The following example enables the QoS basic mode on the device. Console(config)# qos basic724 Quality of Service (QoS) Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\QoS.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY show qos Use the show qos EXEC mode command to display the Quality of Service (QoS) mode for the device. The trust mode is displayed for the QoS basic mode. Syntax show qos Parameters This command has no arguments or keywords. Default Configuration Disabled Command Mode Command Mode EXEC mode User Guidelines Trust mode is displayed if QoS is enabled in basic mode. Example The following example displays QoS attributes when QoS is enabled in basic mode on the device and the advanced mode is supported. Console> show qos Qos: basic Basic trust: dscp The following example displays QoS attributes when QoS is enabled in basic mode on the device and the advanced mode is not supported. Console> show qosQuality of Service (QoS) Commands 725 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\QoS.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Qos: disable Trust: dscp class-map Use the class-map Global Configuration mode command to create or modify a class map and enters the Class-map Configuration mode. Use the no form of this command todelete a class map. Syntax class-map class-map-name [match-all | match-any] no class-map class-map-name Parameters • class-map-name—Specifies the class map name. • match-all—Performs a logical AND of all the matching statements under this class map. All match criteria in this class map must be matched. • match-any—Performs a logical OR of all the matching statements under this class map. One or more match criteria in this class map must be matched. Default Configuration If neither match-all nor match-any is specified, the match-all parameter is selected by default. Command Mode Global Configuration mode User Guidelines The class-map Global Configuration mode command specifies the name of the class map for which class-map match criteria are to be created or modified and enters class-map configuration mode. In this mode, up to two match commands can be entered to configure the match criteria for this class. When using two match commands, each has to point to a different type of ACL (one IP and one MAC). The classification is by first match, therefore, the 726 Quality of Service (QoS) Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\QoS.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY order is important. The class-map command and its subcommands are used to define packet classification, marking, and aggregate policing as part of a globally named service policy applied on a per-interface basis. If there is more than one match statement in a match-all class map and if there is a repetitive classification field in the participating ACLs, an error message is generated. After entering the Quality of Service (QoS) Class-map Configuration mode, the following configuration commands are available: exit: Exits the QoS Class-map Configuration mode. match: Configures classification criteria. no: Removes a match statement from a class map. Example The following example creates a class map called Class1 and configures it to check that packets match all classification criteria in the class map match statement. Console(config)# class-map class1 match-all Console(config-cmap)# show class-map The show class-map EXEC mode command displays all class maps. Syntax show class-map [class-map-name] Parameters class-map-name—Specifies the name of the class map to be displayed. Command Mode EXEC mode Example The following example displays the class map for Class1.Quality of Service (QoS) Commands 727 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\QoS.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Console> show class-map class1 Class Map match-any class1 (id4) Match Ip dscp 11 21 match Use the match Class-map Configuration mode command to define the match criteria for classifying traffic. Use the no form of this command to delete the match criteria. Syntax match access-group acl-name no match access-group acl-name Parameters acl-name—Specifies the MAC or IP Access Control List (ACL) name. Default Configuration No match criterion is supported. Command Mode Class-map Configuration mode. Example The following example defines the match criterion for classifying traffic as an access group called Enterprise in a class map called Class1. Console(config)# class-map class1 Console(config-cmap)# match access-group enterprise policy-map Use the policy-map Global Configuration mode command to creates a policy map and enter the Policy-map Configuration mode. Use the no form of this command to delete a policy map.728 Quality of Service (QoS) Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\QoS.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Syntax policy-map policy-map-name no policy-map policy-map-name Parameters policy-map-name—Specifies the policy map name. Default Configuration The default behavior of the policy map is to set the DSCP value to 0 if the packet is an IP packet, and to set the CoS value to 0 if the packet is tagged. Command Mode Global Configuration mode User Guidelines Use the policy-map Global Configuration mode command to specify the name of the policy map to be created, added to, or modified before configuring policies for classes whose match criteria are defined in a class map. Entering the policy-map Global Configuration mode command also enables configuring or modifying the class policies for that policy map. Class policies in a policy map can be configured only if the classes have match criteria defined for them. Use the class-map Global Configuration mode and match Class-map Configuration mode commands to configure the match criteria for a class. The match criteria is for a class. Only one policy map per interface per direction is supported. The same policy map can be applied to multiple interfaces and directions. Example The following example creates a policy map called Policy1 and enters the Policy-map Configuration mode. Console(config)# policy-map policy1 Console(config-pmap)#Quality of Service (QoS) Commands 729 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\QoS.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY class The class Policy-map Configuration mode command defines a traffic classification and enters the Policy-map Class Configuration mode. Use the no form of this command to detach a class map from the policy map. Syntax class class-map-name [access-group acl-name] no class class-map-name Parameters • class-map-name—Specifies the name of an existing class map. If the class map does not exist, a new class map is created under the specified name. • acl-name—Specifies the name of an IP or MAC Access Control List (ACL). Default Configuration No class map is defined for the policy map. Command Mode Policy-map Configuration mode User Guidelines Use the policy-map Global Configuration mode command to identify the policy map and to enter the Policy-map Configuration mode before using the class command. After specifying a policy map, a policy for new classes can be configured or a policy for any existing classes in that policy map can be modified. Use the service-policy Interface Configuration (Ethernet, Port-channel) mode command to attach a policy map to an interface. Use an existing class map to attach classification criteria to the specified policy map and use the access-group parameter to modify the classification criteria of the class map. If this command is used to create a new class map, the name of an IP or MAC ACL must also be specified with the access-group parameter.730 Quality of Service (QoS) Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\QoS.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example The following example defines a traffic classification called Class1 with an access-group called Enterprise. The class is in a policy map called policy1. Console(config)# policy-map policy1 Console(config-pmap)# class class1 access-group enterprise show policy-map Use the show policy-map EXEC mode command to display all policy maps or a specific policy map. Syntax show policy-map [policy-map-name] Parameters policy-map-name—Specifies the policy map name. Command Mode EXEC mode Example The following example displays all policy maps. Console> show policy-map Policy Map policy1 class class1 set Ip dscp 7 Policy Map policy2 class class 2 police 96000 4800 exceed-action drop class class3 police 124000 96000 exceed-action policed-dscp-transmitQuality of Service (QoS) Commands 731 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\QoS.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY trust Use the trust Policy-map Class Configuration mode command to configure the trust state, which selects the value that QoS uses as the source of the internal DSCP value. Use the no form of this command to return to the default trust state. Syntax trust cos-dscp no trust Parameters cos-dscp—Specifies that if the packet is IP, then QoS acts as for dscp; otherwise QoS acts as for cos. Default Configuration The default state is untrusted. If the trust command is specified with no parameters, the default mode is dscp. Command Mode Policy-map Class Configuration mode User Guidelines Use this command to distinguish the Quality of Service (QoS) trust behavior for certain traffic from others. For example, incoming traffic with certain DSCP values can be trusted. A class map can be configured to match and trust the DSCP values in the incoming traffic. Trust values set with this command supersede trust values set on specific interfaces with the qos trust Interface Configuration mode command. The trust command and the set Policy-map Class Configuration mode command are mutually exclusive within the same policy map. Policy maps that contain set or trust Policy-map Class Configuration mode commands cannot be attached, or that have Access Control List (ACL) classification to an egress interface by using the service-policy Interface Configuration mode command.732 Quality of Service (QoS) Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\QoS.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY If specifying trust cos, QoS maps a packet to a queue, the received or default port CoS value, and the CoS-to-queue map. If specifying trust dscp, QoS maps the packet using the DSCP value from the ingress packet. If specifying tcp-udp-port, QoS maps the packet to a queue using the TCP\UDP port value from the ingress packet and the tcp-udp-port-to-queue map. Example The following example creates an ACL, places it into a class map, places the class map into a policy map and configures the trust state using the DSCP value in the ingress packet. console(config)# mac access-list extended m1 console(config-mac-al)# permit any any console(config-mac-al)# exit console(config)# class-map c1 console(config-cmap)# match access-group m1 console(config-cmap)# exit console(config)# policy-map p1 console(config-pmap)# class c1 console(config-pmap-c)# trust cos-dscp set Use the set Policy-map Class Configuration mode command to set new values in the IP packet. Syntax set {dscp new-dscp | queue queue-id | cos new-cos} no set Parameters • dscp new-dscp—Specifies the new DSCP value for the classified traffic. (Range: 0–63)Quality of Service (QoS) Commands 733 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\QoS.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY • queue queue-id—Specifies the explicit queue id to set the egress queue. • cos new-cos—Specifies the new User priority to be marked in the packet. (Range: 0–7) Command Mode Policy-map Class Configuration mode User Guidelines This command and the trust Policy-map Class Configuration mode command are mutually exclusive within the same policy map. Policy maps that contain set or trust Policy-map Class Configuration mode commands or that have ACL classifications cannot be attached to an egress interface using the Service-policy Interface Configuration mode command. To return to the Policy-map Configuration mode, use the exit command. To return to the Privileged EXEC mode, use the end command. Example The following example creates an ACL, places it into a class map, places the class map into a policy map and sets the DSCP value in the packet to 56 for classes in policy map called p1. console(config)# mac access-list extended m1 console(config-mac-al)# permit any any console(config-mac-al)# exit console(config)# class-map c1 console(config-cmap)# match access-group m1 console(config-cmap)# exit console(config)# policy-map p1 console(config-pmap)# class c1 Console(config-pmap-c)# set dscp 56 police Use the police Policy-map Class Configuration mode command to define the policer for classified traffic. Use the no form of this command to remove a policer.734 Quality of Service (QoS) Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\QoS.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Syntax police committed-rate-kbps committed-burst-byte [exceed-action {drop | policed-dscp-transmit}] no police Parameters • committed-rate-kbps—Specifies the average traffic rate (CIR) in kbits per second (bps). (Range: 3–12582912) • committed-burst-byte—Specifies the normal burst size (CBS) in bytes. (Range: 3000–19173960) • exceed-action {drop | policed-dscp-transmit}—Specifies the action taken when the rate is exceeded. The possible values are: • drop—Drops the packet. • policed-dscp-transmit—Remarks the packet DSCP, according to the policed-DSCP map as configured by the qos map policed-dscp Global Configuration mode command. Command Mode Policy-map Class Configuration mode User Guidelines Policing uses a token bucket algorithm. CIR represents the speed with which the token is removed from the bucket. CBS represents the depth of the bucket. Example The following example defines a policer for classified traffic. When the traffic rate exceeds 124,000 kbps or the normal burst size exceeds 9600 bytes, the packet is dropped. The class is called Class1 and is in a policy map called Policy1. Console(config)# policy-map policy1 Console(config-pmap)# class class1 Console(config-pmap-c)# police 124000 9600 exceed-action dropQuality of Service (QoS) Commands 735 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\QoS.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY service-policy Use the service-policy Interface Configuration (Ethernet, VLAN, Portchannel) mode command to apply a policy map to the input of a particular interface. Use the no form of this command to detach a policy map from an interface. Syntax service-policy input policy-map-name no service-policy input Parameters policy-map-name—Specifies the policy map name to apply to the input interface. (Length: 1–32 characters) Command Mode Interface Configuration (Ethernet, VLAN, Port-channel) mode User Guidelines Only one policy map per interface per direction is supported. Example The following example attaches a policy map called Policy1 to the input interface. Console(config-if)# service-policy input policy1 qos aggregate-policer Use the qos aggregate-policer Global Configuration mode command to define the policer parameters that can be applied to multiple traffic classes. Use the no form of this command to remove an existing aggregate policer. Syntax qos aggregate-policer aggregate-policer-name committed-rate-kbps excessburst-byte [exceed-action {drop | policed-dscp-transmit}]736 Quality of Service (QoS) Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\QoS.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY no qos aggregate-policer aggregate-policer-name Parameters • aggregate-policer-name—Specifies the aggregate policer name. • committed-rate-kbps—Specifies the average traffic rate (CIR) in kbits per second (kbps). (Range: 3–57982058) • excess-burst-byte—Specifies the normal burst size (CBS) in bytes. (Range: 3000–19173960) • exceed-action {drop | policed-dscp-transmit}—Specifies the action taken when the rate is exceeded. The possible values are: • drop—Drops the packet. • policed-dscp-transmit—Remarks the packet DSCP. Default Configuration No aggregate policer is defined. Command Mode Global Configuration mode User Guidelines Define an aggregate policer if the policer is shared with multiple classes. Policers in one port cannot be shared with other policers in another device. Traffic from two different ports can be aggregated for policing purposes. An aggregate policer can be applied to multiple classes in the same policy map. An aggregate policer cannot be applied across multiple policy maps. An aggregate policer cannot be deleted if it is being used in a policy map. The no police aggregate Policy-map Class Configuration mode command must first be used to delete the aggregate policer from all policy maps before using the no mls qos aggregate-policer command. Policing uses a token bucket algorithm. CIR represents the speed with which the token is removed from the bucket. CBS represents the depth of the bucket.Quality of Service (QoS) Commands 737 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\QoS.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example The following example defines the parameters of a policer called Policer1 that can be applied to multiple classes in the same policy map. When the average traffic rate exceeds 124,000 kbps or the normal burst size exceeds 9600 bytes, the packet is dropped. Console(config)# qos aggregate-policer policer1 124000 9600 exceed-action drop show qos aggregate-policer Use the show qos aggregate-policer EXEC mode command to display the aggregate policer parameter. Syntax show qos aggregate-policer [aggregate-policer-name] Parameters aggregate-policer-name—Specifies the aggregate policer name. Command Mode EXEC mode Example The following example displays the parameters of the aggregate policer called Policer1. Console> show qos aggregate-policer policer1 aggregate-policer policer1 96000 4800 exceed-action drop not used by any policy map police aggregate Use the police aggregate Policy-map Class Configuration mode command to apply an aggregate policer to multiple classes within the same policy map. Use 738 Quality of Service (QoS) Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\QoS.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY the no form of this command to remove an existing aggregate policer from a policy map. Syntax police aggregate aggregate-policer-name no police aggregate aggregate-policer-name Parameters aggregate-policer-name—Specifies the aggregate policer name. Command Mode Policy-map Class Configuration mode User Guidelines An aggregate policer can be applied to multiple classes in the same policy map. An aggregate policer cannot be applied across multiple policy maps or interfaces. Use the exit command to return to the Policy-map Configuration mode. Use the end command to return to the Privileged EXEC mode. Example The following example applies the aggregate policer called Policer1 to a class called Class1 in a policy map called Policy1. Console(config)# policy-map policy1 Console(config-pmap)# class class1 Console(config-pmap-c)# police aggregate policer1 wrr-queue cos-map Use the wrr-queue cos-map Global Configuration mode command maps Class of Service (CoS) values to a specific egress queue. Use the no form of this command to restore the default configuration. Syntax wrr-queue cos-map queue-id cos0 ... cos7Quality of Service (QoS) Commands 739 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\QoS.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY no wrr-queue cos-map [queue-id] Parameters • queue-id—Specifies the queue number to which the CoS values are mapped. • cos0 ... cos7—Specifies up to 7 CoS values to map to the specified queue number. (Range: 1–7) Default Configuration The default CoS value mapping to 8 queues is as follows: CoS value 0 is mapped to queue 3. CoS value 1 is mapped to queue 1. CoS value 2 is mapped to queue 2. CoS value 3 is mapped to queue 4. CoS value 4 is mapped to queue 5. CoS value 5 is mapped to queue 6. CoS value 6 is mapped to queue 7. CoS value 7 is mapped to queue 8. Command Mode Global Configuration mode User Guidelines Use this command to distribute traffic to different queues, where each queue is configured with different weighted round robin (WRR) and Weighted Random Early Detection (WRED) parameters. The expedite queues are enabled using the priority-queue out Interface Configuration mode commans Example The following example maps CoS value 7 to queue 2. Console(config)# wrr-queue cos-map 2 7740 Quality of Service (QoS) Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\QoS.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY wrr-queue bandwidth Use the wrr-queue bandwidth global Configuration command to assign Weighted Round Robin (WRR) weights to egress queues. The weight ratio determines the frequency at which the packet scheduler removes packets from each queue. Use the no form of this command to restore the default configuration. Syntax wrr-queue bandwidth weight1 weight2 ... weight_n no wrr-queue bandwidth Parameters weight1 weight2 ... weight_n—Specifies the ratio of the bandwidth assigned by the WRR packet scheduler to the packet queues. Separate values by a space. (Range: 0–255) Default Configuration wrr is disabled by default. The default wrr weight is '1' for all queues. Command Mode Global Configuration mode User Guidelines The ratio for each queue is defined as the queue weight divided by the sum of all queue weights (the normalized weight). This sets the bandwidth allocation of each queue. A weight of 0 indicates that no bandwidth is allocated for the same queue, and the shared bandwidth is divided among the remaining queues. It is not recommended to set the weight of a queue to a 0 as it might stop transmission of control-protocols packets generated by the device. All eight queues participate in the WRR, excluding the expedite queues, in which case the corresponding weight is ignored (not used in the ratio calculation). The expedite queue is a priority queue; it is serviced until empty before the other queues are serviced. The expedite queues are enabled by using the priority-queue out Interface Configuration mode command.Quality of Service (QoS) Commands 741 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\QoS.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example The followin 7 WRR queues. Console(config)# wrr-queue bandwidth 6 6 6 6 6 6 6 6 priority-queue out num-of-queues Use the priority-queue out num-of-queues Global Configuration mode command to configure the number of expedite queues. Use the no form of this command to restore the default configuration. Syntax priority-queue out num-of-queues number-of-queues no priority-queue out num-of-queues Parameters number-of-queues—Specifies the number of expedite queues. Expedite queues have higher indexes. (Range: 0–8). If number-of-queues = 0, all queues are assured forwarding. If number-of-queues = 8, all queues are expedited. Default Configuration All queues are expedite queues. Command Mode Global Configuration mode User Guidelines While configuring the priority-queue num-of-queues command, the weighted round robin (WRR) weight ratios are affected because there are fewer queues participating in WRR. This indicates that the corresponding weight in the wrr-queue bandwidth Interface Configuration mode command is ignored (not used in the ratio calculation).742 Quality of Service (QoS) Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\QoS.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example The following example configures the number of expedite queues as 2. Console(config)# priority-queue out num-of-queues 2 traffic-shape Use the traffic-shape Interface Configuration (Ethernet, Port-channel) mode command to configure the egress port shaper. Use the no form of this command to disable the shaper. Syntax traffic-shape committed-rate [committed-burst] no traffic-shape Parameters • committed-rate—Specifies the average traffic rate (CIR) in kbits per second (kbps). (Range: FE, GE: 64kbps–maximum port speed; 10GE: 64Kbps–maximum port speed) • committed-burst—Specifies the excess burst size (CBS) in bytes. (Range: 4KB –16MB) Default Configuration The shaper is disabled. Command Mode Interface Configuration (Ethernet, Port-channel) mode Example The following example sets a shaper on gigabitethernet port 1/0/5 on queue 1 when the average traffic rate exceeds 124000 kbps or the normal burst size exceeds 9600 bytes. Console(config)# interface gi1/0/5 Console(config-if)# traffic-shape 1 124000 9600Quality of Service (QoS) Commands 743 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\QoS.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY traffic-shape queue Use the traffic-shape queue Interface Configuration (Ethernet, Port-channel) mode command to configure the egress queue shaper. Use the no form of this command to disable the shaper. Syntax traffic-shape queue queue-id committed-rate [committed-burst] no traffic-shape queue queue-id Parameters • queue-id—Specifies the queue number to which the shaper is assigned. • committed-rate—Specifies the average traffic rate (CIR) in kbits per second (kbps). (Range: 64 kbps–maximum port speed) • committed-burst—Specifies the excess burst size (CBS) in bytes. (Range: 4 KB - 16 MB) Default Configuration The shaper is disabled. Command Mode Interface Configuration (Ethernet, Port-channel) mode Example The following example sets a shaper on gigabitethernet port 1/0/5 when the average traffic rate exceeds 124000 kbps or the normal burst size exceeds 9600 bytes. Console(config)# interface gi1/0/5 Console(config-if)# traffic-shape 124000 9600744 Quality of Service (QoS) Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\QoS.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY rate-limit (Ethernet) Use the rate-limit Interface Configuration (Ethernet) mode command to limit the incoming traffic rate on a port. Use the no form of this command to disable the rate limit. Syntax rate-limit committed-rate-kbps [burst committed-burst-byte] no rate-limit Parameters • rate—Specifies the maximum number of kilobits per second of ingress traffic on a port. The range is 3–10000000. • burst bytes—The burst size in bytes (3000–19173960). If unspecified, defaults to 128K. Default Configuration Rate limiting is disabled. Command Mode Interface Configuration (Ethernet) mode User Guidelines Example The following example limits the incoming traffic rate on gigabitethernet port 1/0/5 to 150,000 kbps. Console(config)# interface gi1/0/5 Console(config-if)# rate-limit 150000 qos wrr-queue wrtd Use the qos wrr-queue wrtd Global Configuration mode command to enable Weighted Random Tail Drop (WRTD). Use the no form of this command to disable WRTD.Quality of Service (QoS) Commands 745 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\QoS.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Syntax qos wrr-queue wrtd no qos wrr-queue wrtd Parameters This command has no arguments or keywords. Default Disabled Command Mode Global Configuration mode User Guidelines The command is effective after reset. show qos interface Use the show qos interface EXEC mode command to display Quality of Service (QoS) information on the interface. Syntax show qos interface [buffers | queueing | policers | shapers | rate-limit] [interface-id] Parameters • buffers—Displays the buffer settings for the interface's queues. For GE ports, displays the queue depth for each of the 8 queues. For FE ports, displays the minimum reserved setting. • queueing—Displays the queue's strategy (WRR or EF), the weight for WRR queues, the CoS to queue map and the EF priority. • policers—Displays all the policers configured for this interface, their settings, and the number of policers currently unused. • shapers—Displays the shaper of the specified interface and the shaper for the queue on the specified interface.746 Quality of Service (QoS) Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\QoS.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY • rate-limit—Displays the rate-limit configuration. • interface-id—Specifies an interface ID. The interface ID can be one of the following types: Ethernet port, or Port-channel. Default Configuration There is no default configuration for this command. Command Mode EXEC mode User Guidelines The policers option is relevant for a VLAN interface only. If no parameter is specified with the show qos interface command, the port QoS mode (DSCP trusted, CoS trusted, untrusted, and so on), default CoS value, DSCP-to-DSCP- map (if any) attached to the port, and policy map (if any) attached to the interface are displayed. If a specific interface is not specified, the information for all interfaces is displayed. Example This is an example of the output from the show qos interface buffers command for 8 queues. Console> show qos interface buffers gi1/0/1 gi1/0/1 Notify Q depth: buffers gi2/0/1 Ethernet gi2/0/1 qid thresh0 thresh1 thresh2 1 100 100 80 2 100 100 80 3 100 100 80 4 100 100 80 5 100 100 80 6 100 100 80 7 100 100 80 8 100 100 80Quality of Service (QoS) Commands 747 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\QoS.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY This is an example of the output from the show qos interface shapers command for 8 queues. Console> show qos interface shapers gi1/0/1 gi1/0/1 Port shaper: enable Committed rate: 192000 bps Committed burst: 9600 bytes QID 1 2 3 4 5 6 7 8 Status Enable Disable Enable Disable Disable Disable Enable Enable Target Committed Rate [bps] 100000 N/A 200000 N/A N/A N/A 178000 23000 Target Committed Burst [bytes] 17000 N/A 19000 N/A N/A N/A 8000 1000748 Quality of Service (QoS) Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\QoS.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY This is an example of the output from the show qos interface policer command. This is an example of the output from the show qos interface rate-limit command. qos wrr-queue threshold Use the qos wrr-queue threshold Global Configuration mode command to assign queue thresholds globally. Use the no form of this command to restore the default configuration. Console> show qos interface policer gi1/0/1 Ethernet gi1/0/1 Class map: A Policer type: aggregate Commited rate: 192000 bps Commited burst: 9600 bytes Exceed-action: policed-dscp-transmit Class map: B Policer type: single Commited rate: 192000 bps Commited burst: 9600 bytes Exceed-action: drop Class map: C Policer type: none Commited rate: N/A Commited burst: N/A Exceed-action: N/A Console> show qos interface rate-limit gi1/0/1 Port ----- gi1/0/1 rate-limit [kbps] ----------------- 1000 Burst [KBytes] -------------- 512KQuality of Service (QoS) Commands 749 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\QoS.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Syntax qos wrr-queue threshold {gigabitethernet | tengigabitethernet} queue-id threshold-percentage no qos wrr-queue threshold {gigabitethernet | tengigabitethernet} queue-id Parameters • gigabitethernet—Specifies that the thresholds are to be applied to Gigabit Ethernet ports. • tengigabitethernet—Specifies that the thresholds are to be applied to 10 Gigabit Ethernet ports. • queue-id—Specifies the queue number to which the tail-drop threshold is assigned. • threshold-percentage—Specifies the queue threshold percentage value. Default Configuration The default threshold is 80 percent. Command Mode Global Configuration mode User Guidelines If the threshold is exceeded, packets with the corresponding DP are dropped until the threshold is no longer exceeded. Example The following example assigns a threshold of 80 percent to WRR queue 1. Console(config)# qos wrr-queue threshold gigabitethernet 1 80 qos map policed-dscp Use the qos map policed-dscp Global Configuration mode command to configure the policed-DSCP map for remarking purposes. Use the no form of this command to restore the default configuration.750 Quality of Service (QoS) Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\QoS.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Syntax qos map policed-dscp dscp-list to dscp-mark-down no qos map policed-dscp [dscp-list] Parameters • dscp- list—Specifies up to 8 DSCP values, separated by spaces. (Range: 0–63) • dscp-mark-down—Specifies the DSCP value to mark down. (Range: 0–63) Default Configuration The default map is the Null map, which means that each incoming DSCP value is mapped to the same DSCP value. Command Mode Global Configuration mode. Example The following example marks incoming DSCP value 3 as DSCP value 43 on the policed-DSCP map. Console(config)# qos map policed-dscp 3 to 43 Reserved DSCP. DSCP 3 was not configured. qos map dscp-queue Use the qos map dscp-queue Global Configuration mode command to configure the DSCP to CoS map. Use the no form of this command to restore the default configuration. Syntax qos map dscp-queue dscp-list to queue-id no qos map dscp-queue [dscp-list]Quality of Service (QoS) Commands 751 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\QoS.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Parameters • dscp-list—Specifies up to 8 DSCP values, separated by spaces. (Range: 0– 63) • queue-id—Specifies the queue number to which the DSCP values are mapped. Default Configuration The default map for 8 queues is as follows. Command Mode Global Configuration mode Example The following example maps DSCP values 33, 40 and 41 to queue 1. Console(config)# qos map dscp-queue 33 40 41 to 1 qos map dscp-dp Use the qos map dscp-dp Global Configuration mode command to map the DSCP to Drop Precedence. Use the no form of this command to restore the default configuration. Syntax qos map dscp-dp dscp-list to dp no qos map dscp-dp [dscp-list] Parameters • dscp-list—Specifies up to 8 DSCP values, with values separated by a space. (Range: 0–63) DSCP value 0-7 8-15 16-23 24-31 32-39 40-47 48-56 57-63 QueueID 1 2 3 4 5 6 7 8752 Quality of Service (QoS) Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\QoS.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY • dp—Specifies the Drop Precedence value to which the DSCP values are mapped. (values: 0,2) where 2 is the highest Drop Precedence) Default Configuration All the DSCPs are mapped to Drop Precedence 0. Command Mode Global Configuration mode. Example The following example maps DSCP values 25, 27 and 29 to Drop Precedence 2. Console(config)# qos map dscp-dp 25 27 29 to 2 qos trust (Global) Use the qos trust Global Configuration mode command to configure the system to the basic mode and trust state. Use the no form of this command to return to the default configuration. Syntax qos trust {cos | dscp } no qos trust Parameters • cos— Specifies that ingress packets are classified with packet CoS values. Untagged packets are classified with the default port CoS value. • dscp—Specifies that ingress packets are classified with packet DSCP values. Default Configuration CoS is the default trust mode. Command Mode Global Configuration modeQuality of Service (QoS) Commands 753 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\QoS.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY User Guidelines This command can be used only in QoS basic mode. Packets entering a quality of service (QoS) domain are classified at the edge of the QoS domain. When the packets are classified at the edge, the switch port within the QoS domain can be configured to one of the trusted states because there is no need to classify the packets at every switch within the domain. Use this command to specify whether the port is trusted and which fields of the packet to use to classify traffic. When the system is configured with trust DSCP, the traffic is mapped to the queue by the DSCP-queue map. When the system is configured with trust CoS, the traffic is mapped to the queue by the CoS-queue map. Example The following example configures the system to the DSCP trust state. Console(config)# qos trust dscp qos trust (Interface) Use the qos trust Interface Configuration (Ethernet, Port-channel) mode command to enable each port trust state while the system is in the basic QoS mode. Use the no form of this command to disable the trust state on each port. Syntax qos trust no qos trust Default Configuration Each port is enabled while the system is in basic mode. Command Mode Interface Configuration (Ethernet, Port-channel) mode754 Quality of Service (QoS) Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\QoS.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example The following example configures gigabitethernet port 1/0/15 to the default trust state. Console(config)# interface gi1/0/15 Console(config-if)# qos trust qos cos Use the qos cos Interface Configuration (Ethernet, Port-channel) mode command to define the default CoS value of a port. Use the no form of this command to restore the default configuration. Syntax qos cos default-cos no qos cos Parameters default-cos—Specifies the default CoS value of the port. If the port is trusted and the packet is untagged, then the default CoS value become the CoS value. (Range: 0–7) Default Configuration The default CoS value of a port is 0. Command Mode Interface Configuration (Ethernet, Port-channel) mode User Guidelines Use the default CoS value to assign a CoS value to all untagged packets entering the port. Use the qos cos override command to assign this default CoS value to tagged packets. Example The following example defines the port gi1/0/15 default CoS value as 3 .Quality of Service (QoS) Commands 755 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\QoS.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Console(config)# interface gi1/0/15 Console(config-if)# qos cos 3 qos dscp-mutation Use the qos dscp-mutation Global Configuration mode command to apply the DSCP Mutation map to system DSCP trusted ports. Use the no form of this command to restore the trusted port with no DSCP mutation. Syntax qos dscp-mutation no qos dscp-mutation Command Mode Global Configuration mode. User Guidelines Apply the DSCP-to-DSCP-mutation map to a port at the boundary of a Quality of Service (QoS) administrative domain. If two QoS domains have different DSCP definitions, use the DSCP-to-DSCP-mutation map to translate a set of DSCP values to match the definition of another domain. Apply the map to ingress and to DSCP-trusted ports only. Applying this map to a port causes IP packets to be rewritten with newly mapped DSCP values at the ingress ports. If applying the DSCP mutation map to an untrusted port, to class of service (CoS), or to an IP-precedence trusted port, the command has no immediate effect until the port becomes DSCP-trusted. Example The following example applies the DSCP Mutation map to system DSCP trusted ports. Console(config)# qos dscp-mutation756 Quality of Service (QoS) Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\QoS.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY qos map dscp-mutation Use the qos map dscp-mutation Global Configuration mode command to configure the DSCP to DSCP Mutation table. Use the no form of this command to restore the default configuration. Syntax qos map dscp-mutation in-dscp to out-dscp no qos map dscp-mutation [in-dscp] Parameters • in-dscp—Specifies up to 8 DSCP values to map, separated by spaces. (Range: 0–63) • out-dscp—Specifies up to 8 DSCP mapped values, separated by spaces. (Range: 0–63) Default Configuration The default map is the Null map, which means that each incoming DSCP value is mapped to the same DSCP value. Command Mode Global Configuration mode. User Guidelines This is the only map that is not globally configured. It is possible to have several maps and assign each one to a different port. Example The following example changes DSCP values 1, 2, 4, 5 and 6 to DSCP Mutation Map value 63. Console(config)# qos map dscp-mutation 1 2 4 5 6 to 63Quality of Service (QoS) Commands 757 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\QoS.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY show qos map Use the show qos map EXEC mode command to display the QoS mapping information. Syntax show qos map [dscp-queue | dscp-dp | policed-dscp | dscp-mutation] Parameters • dscp-queue—Displays the DSCP to queue map. • dscp-dp—Displays the DSCP to Drop Precedence map. • policed-dscp—Displays the DSCP to DSCP remark table. • dscp-mutation—Displays the DSCP-DSCP mutation table. Command Mode EXEC mode Example The following example displays the QoS mapping information. Console> show qos map Dscp-queue map: d1 -- 0 1 2 3 4 5 6 : -- : : : : : : : d2 -- 0 -- 01 02 03 04 06 07 08 1 -- 01 02 03 04 06 07 08 2 -- 01 02 03 05 06 07 08 3 -- 01 02 03 05 06 07 08 4 -- 01 02 04 05 06 07 5 -- 01 02 04 05 06 07 6 -- 01 03 04 05 06 08 7 -- 01 03 04 05 06 08 8 -- 02 03 04 05 07 08 9 -- 02 03 04 05 07 08758 Quality of Service (QoS) Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\QoS.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY The following table appears:. The following table appears:. The following table appears:. Dscp-DP map: d1 -- 0 1 2 3 4 5 6 : -- : : : : : : : d2 -- 00 00 00 00 00 00 00 0 -- 00 00 00 00 00 00 00 1 -- 00 00 00 00 00 00 00 2 -- 00 00 00 00 00 00 00 3 -- 00 00 00 00 00 00 4 -- 00 00 00 00 00 00 5 -- 00 00 00 00 00 00 6 -- 00 00 00 00 00 00 7 -- 00 00 00 00 00 00 8 -- 00 00 00 00 00 00 9 -- 00 00 00 00 00 00 Policed-dscp map: d1 -- 0 1 2 3 4 5 6 : -- : : : : : : : d2 -- 0 -- 00 10 20 30 40 50 60 1 -- 01 11 21 31 41 51 61 2 -- 02 12 22 32 42 52 62 3 -- 03 13 23 33 43 53 63 4 -- 04 14 24 34 44 54 5 -- 05 15 25 35 45 55 6 -- 06 16 26 36 46 56 7 -- 07 17 27 37 47 57 8 -- 08 18 28 38 48 58 9 -- 09 19 29 39 49 59 Dscp-dscp mutation map: d1 -- 0 1 2 3 4 5 6 : -- : : : : : : : d2 -- 0 -- 00 10 20 30 40 50 60 1 -- 01 11 21 31 41 51 61 2 -- 02 12 22 32 42 52 62 3 -- 03 13 23 33 43 53 63 4 -- 04 14 24 34 44 54 5 -- 05 15 25 35 45 55 6 -- 06 16 26 36 46 56 7 -- 07 17 27 37 47 57 8 -- 08 18 28 38 48 58 9 -- 09 19 29 39 49 59Quality of Service (QoS) Commands 759 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\QoS.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY clear qos statistics Use the clear qos statistics EXEC mode command to clear the QoS statistics counters. Syntax clear qos statistics Command Mode EXEC mode Example The following example clears the QoS statistics counters. Console# clear qos statistics qos statistics policer Use the qos statistics policer Interface Configuration (Ethernet, Portchannel) mode command to enable counting in-profile and out-of-profile. Use the no form of this command to disable counting. Syntax qos statistics policer policy-map-name class-map-name no qos statistics policer policy-map-name class-map-name Parameters • policy-map-name—Specifies the policy map name. • class-map-name—Specifies the class map name. Default Configuration Counting in-profile and out-of-profile is disabled. Command Mode Interface Configuration (Ethernet, Port-channel) mode760 Quality of Service (QoS) Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\QoS.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Example The following example enables counting in-profile and out-of-profile on the interface. Console(config-if)# qos statistics policer policy1 class1 qos statistics aggregate-policer Use the qos statistics aggregate-policer Global Configuration mode command to enable counting in-profile and out-of-profile. Use the no form of this command to disable counting. Syntax qos statistics aggregate-policer aggregate-policer-name no qos statistics aggregate-policer aggregate-policer-name Parameters aggregate-policer-name—Specifies the aggregate policer name. Default Configuration Counting in-profile and out-of-profile is disabled. Command Mode Global Configuration mode Example The following example enables counting in-profile and out-of-profile on the interface. Console(config)# qos statistics aggregate-policer policer1 qos statistics queues Use the qos statistics queues Global Configuration mode command to enable QoS statistics for output queues. Use the no form of this command to disable QoS statistics for output queues.Quality of Service (QoS) Commands 761 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\QoS.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Syntax qos statistics queues set {queue | all} {dp | all} {interface | all} no qos statistics queues set Parameters • set—Specifies the counter set number. • interface—Specifies the Ethernet port. • queue—Specifies the output queue number. • dp—Specifies the drop precedence. The available values are: high, low. Default Configuration Set 1: All interfaces, all queues, high DP. Set 2: All interfaces, all queues, low DP. Command Mode Global Configuration mode User Guidelines There are no user guidelines for this command. Example The following example enables QoS statistics for output queues for counter set 1. Console(config)# qos statistics queues 1 all all all show qos statistics Use the show qos statistics EXEC mode command to display Quality of Service statistical information. Syntax show qos statistics762 Quality of Service (QoS) Commands FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\QoS.fm D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 9 / 1 2 / 1 2 - F O R P R O O F O N LY Command Mode EXEC mode User Guidelines Up to 16 sets of counters can be enabled for policers. The counters can be enabled in the creation of the policers. Use the qos statistics queues Global Configuration mode command to enable QoS statistics for output queues. Example The following example displays Quality of Service statistical information. Console# show qos statistics Policers --------- Interface ---------- gi1/0/1 gi1/0/1 gi1/0/2 gi1/0/2 Policy map ---------- Policy1 Policy1 Policy1 Policy1 Class Map --------- Class1 Class2 Class1 Class2 In-profile bytes ---------------- 7564575 8759 746587458 5326 Out-of-profile bytes -------------- 5433 52 3214 23 Aggregate Policers ------------------ Name --------- Policer1 In-profile bytes ---------------- 7985687 Out-of-profile bytes -------------------- 121322Quality of Service (QoS) Commands 763 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\CLI Folders\Dell Contax CLI\files\QoS.fm D E L L C O N F I D E N T I A L – P R E L I M I N A RY 9 / 1 2 / 1 2 - F O R P R O O F O N LY Output Queues ------------- Interface --------- gi1/0/1 gi1/0/2 Queue ----- 2 All DP -- High High Total packets ------------- 799921 5387326 %TD packets ----------- 1.2% 0.2% Micrologiciel Dell Chassis Management Controller Version 4.0 Guide d'utilisationRemarques et précautions REMARQUE : une REMARQUE indique des informations importantes qui peuvent vous aider à mieux utiliser votre ordinateur. PRÉCAUTION : une PRÉCAUTION indique un risque d'endommagement du matériel ou de perte de données en cas de non respect des instructions. ____________________ Les informations que contient cette publication sont sujettes à modification sans préavis. © 2012 Dell Inc. Tous droits réservés. La reproduction de ce document, de quelque manière que ce soit, sans l'autorisation écrite de Dell Inc. est strictement interdite. Marques utilisées dans ce texte : Dell™, le logo DELL, FlexAddress™, OpenManage™, PowerEdge™ et PowerConnect™ sont des marques de Dell Inc. Microsoft ® , Active Directory ® , Internet Explorer ® , Windows ® , Windows Server ® et Windows Vista ® sont des marques ou des marques déposées de Microsoft Corporation aux États-Unis et d'autres pays. Red Hat ® et Red Hat Enterprise Linux ® sont des marques déposées de Red Hat, Inc. aux États-Unis et dans d'autres pays. Novell ® est une marque déposée et SUSE ™ est une marque de Novell Inc. aux États-Unis et/ou dans d'autres pays. Intel ® est une marque déposée d'Intel Corporation. UNIX ® est une marque déposée de The Open Group aux États-Unis et dans d'autres pays. Avocent ® est une marque commerciale de Avocent Corporation. OSCAR ® est une marque déposée de Avocent Corporation ou ses filiales. Copyright 1998-2006 The OpenLDAP Foundation. Tous droits réservés. La redistribution et l'utilisation aux formats source et binaire, avec ou sans modification, ne sont permises que selon les termes de la licence publique OpenLDAP. Vous trouverez une copie de cette licence dans le fichier LICENSE qui figure dans le répertoire de haut niveau de la distribution ainsi qu'à l'adresse http://www.OpenLDAP.org/license.html. OpenLDAP est une marque déposée de The OpenLDAP Foundation. Il se peut que certains fichiers individuels et/ou progiciels fournis par des tiers soient sous copyright et qu'ils soient sujets à des restrictions supplémentaires. Ce produit est dérivé de la distribution LDAP v3.3 de l'Université du Michigan. Ce produit contient aussi des produits dérivés de sources publiques. Les informations sur OpenLDAP sont disponibles sur http://www.openldap.org/. Parties de Copyright 1998-2004 Kurt D. Zeilenga. Parties de Copyright 1998-2004 Net Boolean Incorporated. Parties de Copyright 2001-2004 IBM Corporation. Tous droits réservés. La redistribution et l'utilisation aux formats source et binaire, avec ou sans modification, ne sont permises que selon les termes de la licence publique OpenLDAP. Parties de Copyright 1999-2003 Howard Y.H. Chu. Parties de Copyright 1999-2003 Symas Corporation. Parties de Copyright 1998-2003 Hallvard B. Furuseth. Tous droits réservés. La redistribution et l'utilisation aux formats source et binaire, avec ou sans modification, sont permises tant que cet avis est conservé. Les noms des détendeurs de copyright ne peuvent pas être utilisés pour approuver ou promouvoir des produits dérivés de ce logiciel sans leur autorisation préalable par écrit. Ce logiciel est fourni « tel quel » sans garantie explicite ou tacite. Parties de Copyright (c) 1992-1996 Membres du conseil de l'Université du Michigan. Tous droits réservés. La redistribution et l'utilisation aux formats source et binaire sont permises tant que cet avis est conservé et que l'Université du Michigan à Ann Arbor reçoit les crédits qui lui sont dus. Le nom de l'université ne peut pas être utilisé pour approuver ou promouvoir des produits dérivés de ce logiciel sans son autorisation préalable par écrit. Ce logiciel est fourni « en l'état » sans garantie explicite ou tacite. D'autres marques et noms commerciaux peuvent être utilisés dans cette publication pour faire référence aux entités revendiquant la propriété de ces marques ou de ces noms de produits. Dell Inc. rejette tout intérêt exclusif dans les marques et les noms commerciaux autres que les siens. 2012 - 03Table des matières 3 Table des matières 1 Présentation . . . . . . . . . . . . . . . . . . . . . . 21 Nouveautés de cette version . . . . . . . . . . . . . . 22 Fonctionnalités de gestion de CMC . . . . . . . . . . . 23 Fonctionnalités de sécurité . . . . . . . . . . . . . . . 25 Présentation du châssis . . . . . . . . . . . . . . . . . 26 Caractéristiques matérielles . . . . . . . . . . . . . . 27 Ports TCP/IP . . . . . . . . . . . . . . . . . . . . 27 Connexions d'accès à distance prises en charge . . . 28 Plate-formes prises en charge . . . . . . . . . . . . . 28 Navigateurs Web pris en charge . . . . . . . . . . . . 29 Applications de console de gestion prises en charge . . . . . . . . . . . . . . . . . . . . . . . . 29 Prise en charge WS-Management . . . . . . . . . . . 29 Autres documents utiles. . . . . . . . . . . . . . . . . 31 2 Installation et configuration de CMC . . . 33 Avant de commencer . . . . . . . . . . . . . . . . . . 33 Installation du matériel CMC . . . . . . . . . . . . . . 33 Liste de contrôle pour l'intégration d'un châssis . . . . . . . . . . . . . . . . . . . . 344 Table des matières Connexion réseau CMC de base . . . . . . . . . . 35 Connexion réseau CMC en chaîne . . . . . . . . . 35 Installation de logiciel d'accès à distance sur une station de gestion . . . . . . . . . . . . . . . . . . . . 39 Installation de l'utilitaire RACADM sur une station de gestion Linux. . . . . . . . . . . . . . . 39 Désinstallation de l'utilitaire RACADM sur une station de gestion Linux . . . . . . . . . . . . 40 Configuration d'un navigateur Web . . . . . . . . . . . 41 Serveur proxy . . . . . . . . . . . . . . . . . . . . 41 Filtre anti-hameçonnage de Microsoft . . . . . . . 42 Récupération de la liste de révocation des certificats (CRL) . . . . . . . . . . . . . . . . 42 Téléchargement de fichiers à partir de CMC dans Internet Explorer . . . . . . . . . . . 43 Autorisation des animations dans Internet Explorer . . . . . . . . . . . . . . . 43 Configuration de l'accès initial à CMC . . . . . . . . . 44 Configuration du réseau CMC . . . . . . . . . . . 45 Configuration de la mise en réseau à l'aide de l'Assistant Configuration de l'écran LCD . . . . 46 Accès à CMC via un réseau . . . . . . . . . . . . . . . 53 Installation ou mise à jour du micrologiciel du module CMC . . . . . . . . . . . . . . . . . . . . . 54 Téléchargement du micrologiciel du module CMC . . . . . . . . . . . . . . . . . . . 54 Mise à jour du micrologiciel CMC à l'aide de l'interface Web . . . . . . . . . . . . . . . . . 55 Mise à jour du micrologiciel CMC via RACADM . . . 55 Configuration des propriétés de CMC . . . . . . . . . . 56 Configuration des bilans de puissance . . . . . . . 56 Configuration des paramètres réseau de CMC . . . . 56Table des matières 5 Ajout et configuration des utilisateurs . . . . . . . 57 Ajout d'alertes SNMP et par e-mail . . . . . . . . 57 Configuration de Syslog distant . . . . . . . . . . 57 Fonctionnement de l'environnement CMC redondant . . . . . . . . . . . . . . . . . . . . . 58 À propos du contrôleur CMC de secours . . . . . 58 Mode de sécurité CMC . . . . . . . . . . . . . . . 59 Processus de sélection de CMC actif . . . . . . . 60 Obtention de la condition d'intégrité du contrôleur CMC redondant . . . . . . . . . . . . . 60 3 Configuration de CMC pour utiliser des consoles de ligne de commande . . . . . . 61 Fonctionnalités de la console de ligne de commande de CMC. . . . . . . . . . . . . . . . . . 61 Utilisation d'une console série, Telnet ou SSH . . . . . 62 Utilisation d'une console Telnet avec CMC. . . . . . . 62 Utilisation de SSH avec CMC . . . . . . . . . . . . . . 63 Activation de SSH sur CMC . . . . . . . . . . . . 63 Changement de port SSH. . . . . . . . . . . . . . 64 Activation de la connexion du panneau avant à iKVM . . . . . . . . . . . . . . . 65 Configuration du logiciel d'émulation de terminal . . . 65 Configuration de Linux Minicom . . . . . . . . . . 65 Connexion aux serveurs ou aux modules d'E/S à l'aide de la commande Connect. . . . . . . . . . . . 67 Configuration du BIOS du serveur géré pour la redirection de console série . . . . . . . . . . . 69 Configuration de Windows pour la redirection de console série . . . . . . . . . . . . . . . . . . 706 Table des matières Configuration de Linux pour la redirection de console série du serveur pendant le démarrage . . . . . . . . . . . . . . . . . . . . 70 Configuration de Linux pour la redirection de console série du serveur après l'amorçage . . . . 72 4 Utilisation de l'interface de ligne de commande RACADM . . . . . . . . . . . . . 75 Utilisation d'une console série, Telnet ou SSH . . . . . 75 Ouverture d'une session CMC . . . . . . . . . . . 76 Démarrage d'une console texte . . . . . . . . . . 76 Utilisation de la RACADM . . . . . . . . . . . . . . . . 76 Sous-commandes RACADM . . . . . . . . . . . . 77 Accès à distance à RACADM. . . . . . . . . . . . 81 Activation et désactivation de la fonctionnalité distante de RACADM . . . . . . . . 82 Utilisation de RACADM à distance . . . . . . . . . 83 Messages d'erreur RACADM. . . . . . . . . . . . 84 Utilisation de RACADM pour la configuration CMC . . . . . . . . . . . . . . . . . . . . 84 Configuration des propriétés du réseau CMC . . . . . . 84 Configuration de l'accès initial à CMC . . . . . . . 85 Affichage des paramètres réseau actuels . . . . . 86 Configuration des paramètres du réseau local . . . . 86 Configuration des paramètres de sécurité réseau (IPv4 uniquement). . . . . . . . . . . . . . 93 Utilisation de RACADM pour la configuration des utilisateurs. . . . . . . . . . . . . . . . . . . . . . 94 Ajout d'un utilisateur CMC . . . . . . . . . . . . . 95Table des matières 7 Utilisation de RACADM pour configurer l'authentification par clé publique sur SSH. . . . . . . 96 Génération de clés publiques pour Windows . . . . . 97 Génération de clés publiques pour Linux . . . . . 98 Notes de syntaxe RACADM pour CMC. . . . . . . 98 Affichage des clés publiques. . . . . . . . . . . . 98 Ajout des clés publiques . . . . . . . . . . . . . . 99 Suppression des clés publiques . . . . . . . . . . 99 Ouverture de session avec l'authentification par clé publique. . . . . . . . . . . . . . . . . . . 99 Activation d'un utilisateur CMC ayant des droits . . . . . . . . . . . . . . . . . . . . . . 100 Désactivation d'un utilisateur CMC . . . . . . . . 100 Configuration de l'envoi de notifications par e-mail ou d'alertes SNMP . . . . . . . . . . . . . . . . 101 Configuration de plusieurs CMC dans plusieurs châssis . . . . . . . . . . . . . . . . . . . . 101 Création d'un fichier de configuration CMC . . . . 103 Règles d'analyse . . . . . . . . . . . . . . . . . . 104 Modification de l'adresse IP CMC . . . . . . . . . 106 Utilisation de RACADM pour configurer les propriétés sur iDRAC . . . . . . . . . . . . . . . . . . 108 Dépannage . . . . . . . . . . . . . . . . . . . . . . . . 109 5 Utilisation de l'interface Web de CMC . . . . . . . . . . . . . . . . . . . . . . . . . 111 Accès à l'interface Web CMC . . . . . . . . . . . . . . 111 Ouverture de session . . . . . . . . . . . . . . . . 113 Fermeture de session. . . . . . . . . . . . . . . . 114 Configuration des paramètres CMC de base . . . . . . 1148 Table des matières Définir l'emplacement physique et le nom du châssis . . . . . . . . . . . . . . . . . . 114 Définition de la date et de l'heure sur CMC . . . 115 Activation du support Flash amovible . . . . . . 115 Page Intégrité du châssis . . . . . . . . . . . . . . . 116 Utilisation d'un groupe de châssis . . . . . . . . . . 117 Fonctionnalités du groupe de châssis . . . . . . 117 Configuration d'un groupe de châssis . . . . . . 117 Retrait d'un membre du châssis chef. . . . . . . 119 Dissolution d'un groupe de châssis . . . . . . . 119 Désactivation d'un membre individuel sur le châssis membre . . . . . . . . . . . . . . . . 120 Lancement d'une page Web du châssis membre ou du serveur . . . . . . . . . . . . . . 120 Synchronisation des propriétés d'un nouveau membre avec celles du châssis chef. . . . . . . 121 Inventaire de lames pour Groupe MCM . . . . . 122 Enregistrement du rapport d'inventaire de lames . . . . . . . . . . . . . . . 122 Résumé des composants du châssis . . . . . . . . . 125 Graphiques du châssis . . . . . . . . . . . . . . 125 Intégrité du châssis . . . . . . . . . . . . . . . . 127 Informations sur le composant sélectionné. . . . . . 128 Surveillance de la condition d'intégrité du système . . . . . . . . . . . . . . . . . 134 Affichage des résumés relatifs au châssis et aux composants . . . . . . . . . . . . . . . . 134 Affichage de la condition du bilan de puissance . . . . . . . . . . . . . . . . 135 Affichage du nom du modèle de serveur et du numéro de service . . . . . . . . . . . . . 136Table des matières 9 Affichage de la condition d'intégrité de l'ensemble des serveurs . . . . . . . . . . . . . . 136 Modification du nom d'un logement . . . . . . . . 140 Utilisation du nom d'hôte du serveur comme nom de logement . . . . . . . . . . . . . . . . . . 142 Définition du premier périphérique d'amorçage pour les serveurs . . . . . . . . . . . . . . . . . . 142 Affichage de la condition d'intégrité d'un serveur spécifique . . . . . . . . . . . . . . 144 Affichage de la condition d'intégrité des modules d'E/S . . . . . . . . . . . . . . . . . 151 Affichage de la condition d'intégrité des ventilateurs. . . . . . . . . . . . . . . . . . . 152 Affichage de la condition d'iKVM . . . . . . . . . 154 Affichage de la condition d'intégrité des unités d'alimentation. . . . . . . . . . . . . . 155 Affichage de la condition des capteurs de température . . . . . . . . . . . . . . . . . . . 158 Affichage de l'état du panneau LCD. . . . . . . . . . . 160 Affichage des ID de nom mondial/Contrôle de l'accès aux médias (WWN/MAC) . . . . . . . . . . 161 Configuration de la structure . . . . . . . . . . . . 161 Adresses WWN/MAC . . . . . . . . . . . . . . . 161 Configuration des propriétés du réseau CMC. . . . . . 162 Configuration de l'accès initial à CMC . . . . . . . 162 Configuration des paramètres du réseau local. . . . 163 Configuration des paramètres de sécurité réseau CMC . . . . . . . . . . . . . . . . 171 Configuration des réseaux locaux virtuels (VLAN) . . . 173 Ajout et configuration d'utilisateurs CMC . . . . . . . 174 Types d'utilisateurs . . . . . . . . . . . . . . . . . 174 Ajout et gestion des utilisateurs . . . . . . . . . . 18310 Table des matières Configuration et gestion des certificats Microsoft Active Directory . . . . . . . . . . . . . . 186 Paramètres communs . . . . . . . . . . . . . . 186 Paramètres du schéma standard. . . . . . . . . 190 Paramètres du schéma étendu . . . . . . . . . . 191 Gestion des certificats Active Directory . . . . . . . 191 Fichier Keytab Kerberos . . . . . . . . . . . . . . . . 192 Configuration et gestion des services LDAP génériques. . . . . . . . . . . . . . . . . . . . 193 Sélection de vos serveurs LDAP. . . . . . . . . . . . 195 Gestion des paramètres de groupe LDAP . . . . . . . 196 Gestion des certificats de sécurité LDAP . . . . . . . 196 Sécurisation des communications CMC à l'aide de certificats SSL et numériques . . . . . . . . . . . 197 Secure Sockets Layer (SSL) . . . . . . . . . . . 197 Requête de signature de certificat (RSC). . . . . 198 Accès au menu principal SSL . . . . . . . . . . 199 Génération d'une nouvelle requête de signature de certificat . . . . . . . . . . . . . . 199 Téléversement d'un certificat de serveur . . . . 203 Téléverser une clé de serveur Web et un certificat . . . . . . . . . . . . . . . . . . 203 Affichage d'un certificat de serveur . . . . . . . 204 Gestion des sessions. . . . . . . . . . . . . . . . . . 204 Configuration des services . . . . . . . . . . . . . . 205 Configuration des bilans de puissance . . . . . . . . 214 Gestion des mises à jour du micrologiciel . . . . . . 215Table des matières 11 Affichage des versions actuelles du micrologiciel. . . . . . . . . . . . . . . . . . . 216 Mise à jour du micrologiciel . . . . . . . . . . . . 217 Restauration du micrologiciel iDRAC à l'aide de CMC . . . . . . . . . . . . . . . . . . . 223 Mise à jour du micrologiciel des composants du serveur à l'aide du Lifecycle Controller . . . . . . 224 Gestion iDRAC . . . . . . . . . . . . . . . . . . . . . . 236 iDRAC QuickDeploy. . . . . . . . . . . . . . . . . 237 Paramètres réseau d'iDRAC . . . . . . . . . . . . 241 Lancement de la console à distance depuis l'interface utilisateur de CMC . . . . . . . . . . . 244 Lancement d'iDRAC à l'aide d'une signature unique . . . . . . . . . . . . . . . . . . 245 Clonage de serveur . . . . . . . . . . . . . . . . . . . 246 Capturer un profil . . . . . . . . . . . . . . . . . . 247 Appliquer un profil . . . . . . . . . . . . . . . . . 247 Affichage des paramètres BIOS sur un serveur . . . 248 Gestion des profils stockés. . . . . . . . . . . . . 248 Journal des profils récents . . . . . . . . . . . . . 248 État d'achèvement et dépannage . . . . . . . . . 249 FlexAddress . . . . . . . . . . . . . . . . . . . . . . . 249 Affichage de l'état de FlexAddress. . . . . . . . . 249 Configurer FlexAddress. . . . . . . . . . . . . . . 254 Configuration de FlexAddress pour les logements et les structures au niveau du châssis . . . . . . . . . . . . . . . . . . . . . 255 Configuration de FlexAddress pour les logements au niveau du serveur . . . . . . . . . . 256 Partage de fichiers distants . . . . . . . . . . . . . . . 256 Questions les plus fréquentes . . . . . . . . . . . . . . 25912 Table des matières Dépannage du CMC . . . . . . . . . . . . . . . . . . 261 6 Utilisation de FlexAddress . . . . . . . . . . . 263 Activation de FlexAddress. . . . . . . . . . . . . . . 264 Vérification de l'activation de FlexAddress . . . 266 Désactivation de FlexAddress . . . . . . . . . . . . . 268 Désactivation de FlexAddress . . . . . . . . . . 268 Configuration de FlexAddress à l'aide de la CLI . . . 269 Configuration complémentaire de FlexAddress pour Linux . . . . . . . . . . . . . . 270 Consultation de l'état de FlexAddress à l'aide de la CLI . . . . . . . . . . . . . . . . . . . . 270 Configuration de FlexAddress via l'interface utilisateur . . . . . . . . . . . . . . . . . 271 Réveil sur LAN avec FlexAddress . . . . . . . . 271 Dépannage de FlexAddress . . . . . . . . . . . . . . 271 Messages des commandes . . . . . . . . . . . . . . 275 CONTRAT DE LICENCE DES LOGICIELS DELL FlexAddress . . . . . . . . . . . . . . . . . . . 278 Questions les plus fréquentes . . . . . . . . . . . . . 282 7 Utilisation de FlexAddress Plus . . . . . . . 283 Activation de FlexAddress Plus . . . . . . . . . . . . 283 FlexAddress comparé à FlexAddress Plus . . . . . . 284Table des matières 13 8 Utilisation du service d'annuaire CMC . . 285 Utilisation de CMC avec Microsoft Active Directory . . . 285 Extensions de schéma Active Directory . . . . . . 285 Schéma standard comparé au schéma étendu . . . 285 Présentation d'Active Directory avec le schéma standard . . . . . . . . . . . . . . . . . . . 286 Configuration du schéma standard d'Active Directory pour accéder à CMC. . . . . . . . . . . 288 Configuration de CMC avec Active Directory avec schéma standard et l'interface Web . . . . . 288 Configuration de CMC avec Active Directory avec schéma standard et RACADM . . . . . . . . 291 Présentation du schéma étendu. . . . . . . . . . . . . 292 Extensions de schéma Active Directory . . . . . . 292 Présentation des extensions de schéma du RAC. . . . . . . . . . . . . . . . . . . 293 Présentation des objets Active Directory . . . . . 293 Configuration du schéma étendu d'Active Directory pour accéder à votre CMC. . . . . . . . 298 Extension du schéma Active Directory. . . . . . . 298 Installation de l'extension Dell sur le snap-in Utilisateurs et ordinateurs Active Directory . . . . 305 Ajout d'utilisateurs CMC et de leurs privilèges à Active Directory . . . . . . . . . . . . . . . . . 306 Configuration de CMC avec le schéma étendu d'Active Directory et l'interface Web . . . . . . . 308 Configuration de CMC avec le schéma étendu d'Active Directory et RACADM. . . . . . . . . . . 311 Questions les plus fréquentes . . . . . . . . . . . 313 Configuration de la connexion directe . . . . . . . . . 316 Configuration système requise . . . . . . . . . . . 316 Configuration des paramètres . . . . . . . . . . . 317 Configuration d'Active Directory . . . . . . . . . . 31714 Table des matières Configuration de CMC . . . . . . . . . . . . . . 318 Téléversement du fichier keytab Kerberos . . . . 318 Activation de la connexion directe . . . . . . . . 319 Configuration du navigateur pour l'ouverture de session par connexion directe . . . . . . . . 320 Ouverture d'une session sur CMC avec la connexion directe. . . . . . . . . . . . . . . . . 321 Configuration de l'authentification bifactorielle par carte à puce . . . . . . . . . . . . . . . . . . . . 322 Configuration système requise . . . . . . . . . . 322 Configuration des paramètres . . . . . . . . . . 322 Configuration d'Active Directory . . . . . . . . . 322 Configuration de CMC . . . . . . . . . . . . . . 323 Téléversement du fichier keytab Kerberos . . . . 323 Activation de l'authentification par carte à puce. . . . . . . . . . . . . . . . . . . . 324 Configuration du navigateur pour l'ouverture de session par carte à puce . . . . . . . . . . . 324 Ouverture de session sur CMC avec la carte à puce . . . . . . . . . . . . . . . . . . 325 Résolution des problèmes liés à l'ouverture de session par carte à puce . . . . . . . . . . . 325 Utilisation de CMC avec un LDAP générique . . . . . 326 Configuration de l'annuaire LDAP générique pour accéder à CMC . . . . . . . . . . . . . . . 327 Configuration du service d'annuaire LDAP générique à l'aide de l'interface Web de CMC . . . . . . . . . . . . . . . . . . . . . . 328 Sélection de vos serveurs LDAP . . . . . . . . . 330 Gestion des paramètres de groupe LDAP . . . . 331 Gestion des certificats de sécurité LDAP . . . . 331 Configuration du service de répertoire LDAP générique avec la RACADM . . . . . . . . . . . 332 Utilisation . . . . . . . . . . . . . . . . . . . . . 333Table des matières 15 Obtention d'aide . . . . . . . . . . . . . . . . . . 333 9 Gestion de l'alimentation . . . . . . . . . . . 335 Mode de redondance de l'alimentation alternative . . . . . . . . . . . . . . 336 Mode de redondance des blocs d'alimentation. . . . . . . . . . . . . . . . . . . . 338 Mode Sans redondance . . . . . . . . . . . . . . 339 Bilan de puissance pour les modules matériels . . . . . . . . . . . . . . . . . 340 Paramètres de priorité de l'alimentation des logements du serveur . . . . . . . . . . . . . 343 Enclenchement dynamique des blocs d'alimentation . . . . . . . . . . . . . . . . 343 Règles de redondance . . . . . . . . . . . . . . . . . . 346 Redondance de l'alimentation alternative . . . . . 346 Redondance des blocs d'alimentation . . . . . . . 347 Sans redondance . . . . . . . . . . . . . . . . . . 347 Préservation de l'alimentation et modifications du bilan de puissance . . . . . . . . . . . . . . . 347 Modifications d'alimentation et de la règle de redondance dans le journal des événements système . . . . . . . . . . . . . . . . 356 Condition de la redondance et intégrité énergétique globale . . . . . . . . . . . . . . . . 358 Configuration et gestion de l'alimentation . . . . . . . 358 Affichage de la condition d'intégrité des unités d'alimentation . . . . . . . . . . . . . . . . 358 Affichage de l'état de la consommation de puissance . . . . . . . . . . . . . . . . . . . . 361 Affichage de la condition du bilan de puissance . . . . . . . . . . . . . . . . . . . . 366 Configuration du bilan de puissance et de la redondance . . . . . . . . . . . . . . . . . . 37116 Table des matières Affectation de niveaux de priorité aux serveurs . . . . . . . . . . . . . . . . . . . 376 Définition du bilan de puissance . . . . . . . . . 377 Diminution de l'alimentation des serveurs afin de préserver le bilan d'alimentation . . . . . . . 378 Exécution de tâches de contrôle de l'alimentation sur le châssis . . . . . . . . . . . 379 Exécution d'opérations de contrôle de l'alimentation sur un module d'E/S . . . . . . . . 381 Exécution de tâches de contrôle de l'alimentation sur un serveur . . . . . . . . . . . 382 Gestion de l'alimentation externe . . . . . . . . 384 Utilisation de la RACADM. . . . . . . . . . . . . 386 Dépannage . . . . . . . . . . . . . . . . . . . . 386 10 Utilisation du module iKVM . . . . . . . . . . 387 Présentation . . . . . . . . . . . . . . . . . . . . . . 387 Interface utilisateur d'iKVM . . . . . . . . . . . 387 Sécurité . . . . . . . . . . . . . . . . . . . . . . 387 Balayage . . . . . . . . . . . . . . . . . . . . . 387 Identification des serveurs . . . . . . . . . . . . 388 Vidéo . . . . . . . . . . . . . . . . . . . . . . . 388 Plug and Play . . . . . . . . . . . . . . . . . . . 388 Évolutif FLASH . . . . . . . . . . . . . . . . . . 388 Interfaces de connexion physique. . . . . . . . . . . 388 Priorités de connexion d'iKVM . . . . . . . . . . 389 Affectation de plusieurs couches via la connexion de l'ACI . . . . . . . . . . . . . . . 389 Utilisation d'OSCAR . . . . . . . . . . . . . . . . . . 390 Notions de base sur la navigation . . . . . . . . 390 Configuration de l'OSCAR. . . . . . . . . . . . . 391Table des matières 17 Gestion de serveurs avec iKVM . . . . . . . . . . . . . 394 Compatibilité des périphériques et prise en charge . . . . . . . . . . . . . . . . . 394 Affichage et sélection de serveurs. . . . . . . . . 395 Paramétrage de la sécurité de la console . . . . . 399 Balayage de votre système. . . . . . . . . . . . . 404 Diffusion aux serveurs . . . . . . . . . . . . . . . 405 Gestion d'iKVM depuis CMC . . . . . . . . . . . . . . 407 Activation ou désactivation du panneau avant. . . . 407 Activation de la console Dell CMC via iKVM. . . . 408 Affichage de la condition et des propriétés d'iKVM . . . . . . . . . . . . . . . . . 408 Mise à jour du micrologiciel du module iKVM . . . 410 Dépannage . . . . . . . . . . . . . . . . . . . . . . . . 412 11 Gestion de la structure d'E/S . . . . . . . . 419 Gestion de la structure . . . . . . . . . . . . . . . . . 420 Configurations non valides . . . . . . . . . . . . . . . 421 Configuration de cartes porteuses non valides . . . 422 Configuration de carte porteuse de module d'E/S non valide. . . . . . . . . . . . . . . . . . . 422 Configuration module d'E/S - module d'E/S non valide. . . . . . . . . . . . . . . . . . . 422 Scénario de nouveau démarrage . . . . . . . . . . . . 422 Surveillance de l'intégrité des modules d'E/S . . . . . 423 Affichage de la condition d'intégrité d'un module d'E/S spécifique . . . . . . . . . . . 426 Configuration des paramètres réseau pour un module d'E/S spécifique. . . . . . . . . . . . . 42818 Table des matières Dépannage des paramètres réseau de module d'E/S. . . . . . . . . . . . . . . . . . 431 12 Dépannage et récupération . . . . . . . . . . 433 Présentation . . . . . . . . . . . . . . . . . . . . . . 433 Outils de surveillance du châssis . . . . . . . . . . . 434 Collecte des informations de configuration et d'état et journaux du châssis . . . . . . . . . 434 Utilisation . . . . . . . . . . . . . . . . . . . . . 434 Interfaces prises en charge . . . . . . . . . . . 434 CLI RACDUMP . . . . . . . . . . . . . . . . . . 435 RACDUMP à distance. . . . . . . . . . . . . . . 436 Utilisation de RACDUMP à distance . . . . . . . 436 Telnet RACDUMP . . . . . . . . . . . . . . . . . 437 Configuration des LED pour l'identification des composants du châssis . . . . . . . . . . . 437 Configuration des alertes SNMP . . . . . . . . . 438 Téléchargement du fichier MIB (base d'information de gestion) SNMP . . . . . . . . . 445 Configuration des alertes par messagerie . . . . 445 Premières étapes de dépannage d'un système distant . . . . . . . . . . . . . . . . . . 449 Surveillance de l'alimentation et exécution de commandes de contrôle de l'alimentation sur le châssis. . . . . . . . . . . . . . . . . . . . . . 449 Affichage de la condition du bilan de puissance . . . . . . . . . . . . . . . . . . . 449 Exécution d'une opération de contrôle de l'alimentation . . . . . . . . . . . . . . . . . 449 Dépannage de l'alimentation . . . . . . . . . . . . . 450Table des matières 19 Gestion des tâches Lifecycle Controller sur un système distant . . . . . . . . . . . . . . . . . . . . 453 Affichage des résumés du châssis . . . . . . . . . . . 455 Affichage de la condition d'intégrité du châssis et des composants . . . . . . . . . . . . . . . . . . . . 459 Affichage des journaux d'événements . . . . . . . . . 460 Affichage du journal du matériel . . . . . . . . . . 460 Affichage du journal CMC . . . . . . . . . . . . . 463 Utilisation de la console de diagnostic . . . . . . . . . 464 Réinitialisation des composants . . . . . . . . . . . . 465 Résolution des erreurs de protocole de temps du réseau (NTP) . . . . . . . . . . . . . . . . . . . . . 469 Interprétation des couleurs des LED et séquences de clignotement . . . . . . . . . . . . . . . . . . . . . 471 Dépannage d'un contrôleur CMC qui ne répond pas . . . . . . . . . . . . . . . . . . . . . . 474 Observation des LED afin d'isoler le problème . . . . . . . . . . . . . . . . . . . . . 474 Obtention des informations de récupération à partir du port série DB-9 . . . . . . . . . . . . . 475 Récupération de l'image du micrologiciel . . . . . 475 Dépannage des problèmes de réseau. . . . . . . . . . 476 Réinitialisation de mot de passe administrateur oublié . . . . . . . . . . . . . . . . . . 477 Enregistrement et restauration des certificats et paramètres de configuration du châssis. . . . . . . 481 Dépannage des alertes . . . . . . . . . . . . . . . . . 48120 Table des matières 13 Diagnostics . . . . . . . . . . . . . . . . . . . . . . 483 Utilisation de l'interface de l'écran LCD . . . . . . . 483 Navigation sur l'écran LCD . . . . . . . . . . . . . . 483 Menu Main (Menu principal) . . . . . . . . . . . 484 Menu de configuration de l'écran LCD . . . . . . 485 Écran de configuration de la langue . . . . . . . 485 Écran par défaut . . . . . . . . . . . . . . . . . 485 Écran Condition du serveur graphique . . . . . . 486 Écran Condition du module graphique . . . . . . 487 Écran du menu Enceinte . . . . . . . . . . . . . 487 Écran Condition du module . . . . . . . . . . . . 488 Écran Condition de l'enceinte . . . . . . . . . . 488 Écran Résumé IP . . . . . . . . . . . . . . . . . 488 Diagnostics. . . . . . . . . . . . . . . . . . . . . . . 489 Dépannage du matériel du LCD . . . . . . . . . . . . 489 Messages du panneau avant de l'écran LCD . . . . . 492 Messages d'erreur de l'écran LCD . . . . . . . . . . 492 Informations sur la condition du serveur et du module de l'écran LCD . . . . . . . . . . . . . . . . . 501 Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 507Présentation 21 Présentation Dell Chassis Management Controller (CMC) est une solution matérielle et logicielle de gestion de systèmes enfichable à chaud, conçue pour fournir des fonctionnalités de gestion à distance et de contrôle de l'alimentation pour les systèmes de châssis Dell PowerEdge M1000e. • Fonctionnalités de gestion à distance • Contrôle de l'alimentation • Contrôle du refroidissement Le module CMC qui possède son propre microprocesseur et sa propre mémoire, est alimenté par le châssis modulaire sur lequel il est branché. Pour démarrer avec CMC, voir « Installation et configuration de CMC », à la page 33. Le module CMC offre de multiples fonctions de gestion pour les serveurs lames. Les fonctions premières du CMC sont la gestion de l'alimentation et la gestion thermique. • Gestion automatique des températures et de la consommation au niveau du châssis et en temps réel. – CMC surveille les exigences du système en matière de consommation et prend en charge le mode de mise en place facultative d'alimentation dynamique. Ceci permet au CMC d'activer ou de définir dynamiquement l'alimentation électrique de secours en fonction de la charge ou de la redondance des exigences afin d'améliorer l'efficacité de l'alimentation. – CMC donne des informations en temps réel sur la consommation, avec une consignation des limites haute et basse accompagnée d'un horodatage. – CMC prend en charge la définition d'un seuil d'alimentation (facultatif) qui permet de générer une alerte ou de déclencher certaines actions visant à maintenir la consommation en dessous d'un niveau donné : basculement des modules serveurs dans un mode de consommation réduite et/ou désactivation de la mise sous tension de nouveaux serveurs lames, etc.22 Présentation – CMC surveille et contrôle automatiquement le fonctionnement des ventilateurs en se basant sur la mesure en temps réel des températures ambiantes et internes. – CMC comporte des fonctions complètes d'inventaire et de consignation des erreurs ou des états. • CMC permet de centraliser la configuration des paramètres suivants : – Paramètres réseau et de sécurité du châssis M1000e – Redondance de l'alimentation et définition de seuils – Paramètres réseau des commutateurs d'E/S et du module iDRAC – Définition du premier périphérique d'amorçage sur les serveurs lames – CMC vérifie la cohérence des infrastructures d'E/S entre les modules d'E/S et les serveurs lames. Si nécessaire, il désactive des composants afin de protéger le matériel du système. – Sécurité des accès utilisateur Vous pouvez configurer CMC pour envoyer des alertes par courrier électronique ou des alertes d'interruption SNMP en cas d'avertissements ou d'erreurs liés à la température, aux problèmes de configuration matérielle, aux coupures de courant et aux vitesses de ventilateur. Vous pouvez configurer le châssis M1000e soit avec un CMC unique soit avec des CMC redondants. Dans le cadre de configurations de CMC redondants, si le CMC principal perd la communication avec l'enceinte ou le réseau de gestion, le CMC de secours prend le relais et gère le châssis. Nouveautés de cette version Cette version de CMC prend en charge les fonctionnalités suivantes : • Enregistrement et restauration de la configuration du châssis. • Journal SEL amélioré. • Carte fille de réseau lame 10 GO 57810-k Double port Broadcom. • Carte mezzanine lame 10 GO 57810-k double port Broadcom. • Carte mezzanine lame 1Gb quatre ports Intel I350. • Carte fille de réseau lame 10Gb double port Intel x520-k. • Carte mezzanine lame 10Gb double port Intel x520-k.Présentation 23 • Carte fille de réseau lame 10Gb double port Qlogic QMD8262-k. • Commutateur InfiniBand Mellanox M4001Q QDR/DDR. • Commutateur InfiniBand Mellanox M4001F FDR. • Carte mezzanine lame InfiniBand Mellanox ConnectX-3 QDR/DDR. • Carte mezzanine lame InfiniBand Mellanox ConnectX-3 FDR. • MIB CMC étendu pour contenir des OID pour emplacement physique de châssis. • MIB CMC étendu pour contenir des OID pour numéro de service et nom d'emplacement de serveur lame. • Permet la gestion d'alimentation externe via OMPC (Open Manage Power Connect). • Réplication d'un à plusieurs paramètres de serveur BIOS pour serveurs iDRAC6 et iDRAC7 (clonage de serveur). • Nouvelle fonctionnalité ajoutée à la fonction de gestion de plusieurs châssis pour synchroniser les propriétés d'un nouveau membre avec celles du leader. • Prise en charge du serveur iDRAC7 PowerEdge M620 initial. • Informations sur l'UC et la mémoire disponibles depuis l'interface GUI dans le cas des serveurs qui prennent en charge le Lifecycle Controller (LC). • Prise en charge de l'inventaire des serveurs et des modules d'E/S et génération de rapports pour un groupe MCM (gestion de plusieurs châssis). Fonctionnalités de gestion de CMC CMC offre les fonctionnalités de gestion suivantes : • Environnement CMC redondant. • Enregistrement DDNS (Système de noms de domaine dynamique) pour IPv4 et IPv6. • Gestion et surveillance à distance du système à l'aide de SNMP, d'une interface Web, d'un module iKVM ou d'une connexion Telnet/SSH. • Surveillance : permet d'accéder aux informations sur le système et à l'état des composants. • Accès aux journaux des événements système : accès au journal du matériel et au journal CMC.24 Présentation • Mises à jour du micrologiciel pour les différents composants du châssis : permet de mettre à jour le micrologiciel de CMC, des serveurs, du module iKVM, et les dispositifs d'infrastructure de module d'E/S. • Mise à jour micrologicielle de composants de serveurs entre autres le BIOS, les contrôleurs de réseau, les contrôleurs de stockage, sur plusieurs serveurs dans le chassis à l'aide de Lifecycle Controller. • Intégration du logiciel Dell OpenManage : vous permet de lancer l'interface Web CMC à partir de Dell OpenManage Server Administrator ou d'IT Assistant. • Alertes CMC : vous avertit des problèmes potentiels du nœud géré au moyen d'un message électronique ou d'une interruption SNMP. • Gestion de l'alimentation à distance : offre des fonctionnalités de gestion de l'alimentation à distance, comme l'arrêt et la réinitialisation de n'importe quel composant du châssis à partir d'une console de gestion. • Rapport sur l'alimentation. • Cryptage SSL (Secure Sockets Layer) : permet une gestion sécurisée du système distant via l'interface Web. • Point de lancement de l'interface Web Integrated Dell Remote Access Controller (iDRAC). • Prise en charge de la gestion WS. • Fonctionnalité FlexAddress : remplace les ID de nom mondial/Media Access Control (WWN/MAC) d'usine par les ID WWN/MAC de châssis pour un emplacement spécifique ou une mise à jour optionnelle. Pour plus d'informations, voir « Utilisation de FlexAddress », à la page 263. • Affichage graphique de l'état et de l'intégrité des composants de châssis. • Prise en charge des serveurs à connecteur unique ou multiple. • L'Assistant Configuration iDRAC LCD prend en charge la configuration réseau iDRAC. • Connexion unique iDRAC. • Prise en charge du protocole NTP. • Pages de résumé du serveur, de rapports de l'alimentation et de contrôle de l'alimentation optimisées. • Basculement CMC forcé et réattribution de sièges virtuelle de serveurs. • Gestion de plusieurs châssis. Celle-ci permet à jusqu'à 8 autres châssis d'être visibles depuis le châssis chef.Présentation 25 Fonctionnalités de sécurité CMC dispose des fonctionnalités de sécurité suivantes : • Gestion de la sécurité au niveau des mots de passe : empêche tout accès non autorisé à un système distant. • Authentification des utilisateurs via Active Directory (en option) ou via les ID d'utilisateur et les mots de passe stockés sur le matériel. • Autorité basée sur le rôle qui permet à un administrateur de configurer des privilèges spécifiques pour chaque utilisateur. • Configuration des ID utilisateur et des mots de passe via l'interface Web. • L'interface Web prend en charge le cryptage SSL 128 bits et 40 bits 3.0 (pour les pays où le 128 bits n'est pas acceptable). REMARQUE : Telnet ne prend pas en charge le cryptage SSL. • Ports IP configurables (si applicable). • Limites d'échecs d'ouverture de session par adresse IP, avec blocage de l'ouverture de session à partir de l'adresse IP lorsque la limite est dépassée. • Délai de session configurable, et plus d'une session simultanée. • Plage d'adresses IP limitée pour les clients se connectant à CMC. • Secure Shell (SSH) qui utilise une couche cryptée pour une sécurité plus élevée. • Connexion directe, authentification bifactorielle et authentification par clé publique.26 Présentation Présentation du châssis La Figure 1-1 illustre la face avant d'une carte CMC (installée) et les emplacements des logements CMC dans le châssis. Figure 1-1. Châssis Dell M1000e et CMC 1 Port GB 2 Port STK 1 2Présentation 27 Caractéristiques matérielles La section suivante fournit des informations sur les caractéristiques matérielles pour CMC. Ports TCP/IP Vous devez fournir les informations du port lorsque vous ouvrez des pare-feu pour l'accès à distance à un module CMC. Tableau 1-1. Ports d'écoute des serveurs CMC Numéro de port Fonction 22* SSH 23* Telnet 80* HTTP 161 Agent SNMP 443* HTTPS * Port configurable Tableau 1-2. Port client CMC Numéro de port Fonction 25 SMTP 53 DNS 68 Adresse IP attribuée par DHCP 69 TFTP 162 Interruption SNMP 514* Syslog distant 636 LDAPS 3 269 LDAPS pour le catalogue global (CG) * Port configurable28 Présentation Connexions d'accès à distance prises en charge La Figure 1-3 répertorie les contrôleurs d'accès à distance pris en charge. Plate-formes prises en charge CMC prend en charge les systèmes modulaires conçus pour la plate-forme M1000e. Pour des informations concernant la compatibilité avec CMC, consultez la documentation de votre périphérique. Pour connaître les plate-formes prises en charge, consultez la Matrice de prise en charge logicielle des systèmes Dell sur le site Web support.dell.com/manuals. Tableau 1-3. Connexions d'accès à distance prises en charge Connexion Fonctionnalités Ports d'interface réseau CMC • Port GB : interface réseau dédiée pour l'interface Web CMC Deux ports 10/100 Go, un pour la gestion et l'autre pour la consolation câble châssis à châssis • STK : port Uplink pour consolation câble réseau de gestion châssis à châssis • Ethernet 10 Mbits/100 Mbits/ 1 Mbits sur port GbE CMC • Prise en charge de DHCP • Interruptions SNMP et notifications d'événements par e-mail • Interface réseau pour le micrologiciel iDRAC et les modules d'E/S • Prise en charge de la console de commande Telnet/SSH et des commandes de l'interface de ligne de commande RACADM, y compris les commandes d'amorçage du système, de réinitialisation, de mise sous tension et d'arrêt Port série • Prise en charge de la console série et des commandes CLI RACADM, y compris les commandes de démarrage du système, de réinitialisation, de mise sous tension et d'arrêt • Prise en charge des échanges binaires pour les applications spécifiquement conçues pour communiquer avec un protocole binaire avec un type particulier de module d'E/S • Le port série peut être connecté à la console série d'un serveur ou à un module d'E/S à l'aide de la commande connect (or racadm connect) Autres connexions • Accès à la console Dell CMC via le module de commutation KVM intégré (iKVM) AvocentPrésentation 29 Navigateurs Web pris en charge Les navigateurs Web suivants sont pris en charge pour CMC 4.0 : • Microsoft Internet Explorer 8.0 pour Windows 7, Windows Vista, Windows XP et Windows Server 2003. • Microsoft Internet Explorer 7.0 pour Windows 7, Windows Vista, Windows XP et Windows Server 2003. • Mozilla Firefox 1.5 (32 bits) (fonctionnalité limitée). Pour les dernières informations relatives aux navigateurs Web pris en charge pour CMC 4.0, voir la Matrice de prise en charge des logiciels des systèmes Dell sur le site Web support.dell.com/manuals. Pour afficher les versions localisées de l'interface Web CMC : 1 Ouvrez le Panneau de configuration Windows. 2 Double-cliquez sur l'icône Options régionales. 3 Sélectionnez les paramètres régionaux souhaités dans le menu déroulant Vos paramètres régionaux (emplacement). Applications de console de gestion prises en charge CMC prend en charge l'intégration de Dell OpenManage IT Assistant. Pour plus d'informations, reportez-vous au jeu de documentation d'IT Assistant disponible sur le site Web du support de Dell à l'adresse support.dell.com/manuals. Prise en charge WS-Management Web Services for Management (WS-MAN) est un protocole basé sur SOAP (protocole simplifié d'accès aux objets) utilisé pour la gestion des systèmes. WS-MAN fournit un protocole interopérable pour les périphériques afin de partager et d'échanger des données sur les réseaux. CMC utilise WS-MAN pour transmettre les informations de gestion CIM (Common Information Model)-DMTF (Distributed Management Task Force). Les informations CIM définissent la sémantique et les types d'informations qui peuvent être manipulés dans un système géré. Les interfaces de gestion de plate-forme de serveurs intégrées à Dell sont organisées en profils où chaque profil définit les interfaces spécifiques d'un domaine de gestion particulier ou la zone de fonctionnalité. En outre, Dell a défini plusieurs extensions de modèle et de profil qui fournissent des interfaces pour des capacités supplémentaires.30 Présentation L'accès à WS-Management exige l'ouverture d'une session à l'aide des privilèges d'utilisateur local au moyen d'une authentification de base sur le protocole SSH (Secured Socket Layer) au port 443. Pour des informations sur la configuration de comptes utilisateurs, voir la section Propriétés de la base de données de la gestion de sessions du RACADM Command Line Reference Guide for iDRAC6 and CMC (Guide de référence de la ligne de commande RACADM pour iDRAC6 et CMC). Les données disponibles via WS-Management constituent un sous-ensemble de données fournies par l'interface d'instrumentation CMC mise en correspondance avec les profils DMTF suivants (version 1.0.0) : • Profil d'allocations de fonctionnalités • Profil des mesures de base • Profil du serveur de base • Profil du système informatique • Profil du système modulaire • Profil des actifs physiques • Profil d'allocation de l'alimentation Dell • Profil du bloc d'alimentation Dell • Profil de la topologie d'alimentation Dell • Profil de gestion de l'état de l'alimentation • Profil d'enregistrement du profil • Profil du journal des enregistrements • Profil d'allocation des ressources • Profil d'autorisation basée sur les rôles • Profil des capteurs • Profil des processeurs de services • Profil de gestion simple de l'identité • Profil de client Dell Active Directory • Profil de contrôle de l'amorçage • Profil de carte réseau simplifié de DellPrésentation 31 La mise en œuvre WS-MAN CMC utilise SSL sur le port 443 pour sécuriser le transport et prend en charge l'authentification de base. Pour des informations sur la configuration de comptes utilisateur, voir la section Propriétés de la base de données de la gestion de sessions du RACADM Command Line Reference Guide for iDRAC6 and CMC (Guide de référence de la ligne de commande RACADM pour iDRAC6 et CMC). Les interfaces des services Web peuvent être utilisées en exploitant l'infrastructure client, comme Windows WinRM et l'interface de ligne de commande Powershell, les utilitaires open source comme WSMANCLI et les environnements de programmation d'application comme Microsoft .NET. Pour la connexion client à l'aide de Microsoft WinRM, la version minimale requise est 2.0. Pour plus d'informations, consultez l'article Microsoft . Le Centre technique de Dell contient des guides de mise en œuvre supplémentaires, des livres blancs, des profils et des exemples de codes à l'adresse www.delltechcenter.com. Pour plus d'informations, voir : • Le site Web DTMF : www.dmtf.org/standards/profiles/ • Notes de mise à jour ou fichier « Lisez-moi » de WS-MAN. • www.wbemsolutions.com/ws_management.html • Spécifications DMTF WS-Management : www.dmtf.org/standards/wbem/wsman Autres documents utiles En plus de ce manuel, les manuels suivants sont disponibles sur support.dell.com/manuals. Sur la page Manuels, cliquez sur Logiciel→ Gestion de systèmes. Cliquez sur le lien du produit approprié sur le côté droit pour accéder aux documents : • L'aide en ligne de CMC fournit des informations sur l'utilisation de l'interface Web. • Les caractéristiques techniques de la carte Secure Digital de CMC fournissent une version du micrologiciel et un BIOS minimum, plus des informations sur son installation et son utilisation. • Le Guide d'utilisation d'Integrated Dell Remote Access Controller 6 (iDRAC6) Enterprise pour les serveurs lames fournit des informations concernant l'installation, la configuration et la maintenance d'iDRAC sur les systèmes gérés.32 Présentation • Le Guide d'utilisation de Dell OpenManage IT Assistant fournit des informations relatives à IT Assistant. • Documentation spécifique à votre application tierce de console de gestion. • Le Guide d'utilisation de Dell OpenManage Server Administrator donne des informations sur l'installation et l'utilisation de Server Administrator. • Le Guide d'utilisation des progiciels Dell Update Package fournit des informations sur l'obtention et l'utilisation des progiciels Dell Update Package dans le cadre de la stratégie de mise à jour de votre système. La documentation système suivante fournit des informations supplémentaires sur le système sur lequel CMC est installé : • Les instructions de sécurité fournies avec votre système contiennent d'importantes informations se rapportant à la sécurité et à la réglementation. Pour obtenir des informations supplémentaires sur la réglementation, voir la page d'accueil Regulatory Compliance (Conformité à la réglementation) à l'adresse www.dell.com/regulatory_compliance. Les informations sur la garantie se trouvent dans ce document ou dans un document distinct. • Les documents Guide d'installation du rack et Instructions d'installation du rack fournis avec la solution rack décrivent l'installation du système. • Le Manuel du propriétaire du matériel, qui présente les fonctionnalités du système, contient des informations de dépannage ainsi que des instructions d'installation ou de remplacement des composants du système. • La documentation relative aux logiciels de gestion de systèmes décrit les fonctionnalités, la configuration requise, l'installation et l'utilisation de base du logiciel. • La documentation fournie avec les composants achetés séparément indique comment configurer et installer ces options. • Les notes de mise à jour ou les fichiers « Lisez-moi » éventuellement fournis contiennent des mises à jour de dernière minute apportées au système ou à la documentation ou bien des informations techniques avancées destinées aux utilisateurs expérimentés ou aux techniciens. • Pour plus d'informations sur les paramètres réseau de module d'E/S, reportez-vous au document Dell PowerConnect M6220 Switch Important Information et au livre blanc Dell PowerConnect 6220 Series Port Aggregator. Des mises à jour sont parfois fournies avec le système pour décrire les modifications apportées au système, au logiciel et/ou à la documentation. lisez toujours les mises à jour en premier, car elles remplacent souvent les informations contenues dans d'autres documents.Installation et configuration de CMC 33 Installation et configuration de CMC Cette section contient des informations sur l'installation de votre matériel CMC, l'accès à CMC et la configuration de votre environnement de gestion en vue d'utiliser CMC, et vous guide dans les étapes suivantes de configuration de CMC. • Configuration de l'accès initial à CMC • Accès à CMC via un réseau • Ajout et configuration d'utilisateurs CMC • Mise à jour du micrologiciel CMC Pour des informations supplémentaires sur l'installation et la configuration des environnements CMC redondants, voir « Fonctionnement de l'environnement CMC redondant », à la page 58. Avant de commencer Préalablement à la configuration de votre environnement CMC, téléchargez la dernière version du micrologiciel CMC depuis le site Web de support de Dell à l'adresse support.dell.com. En outre, assurez-vous que vous disposez du DVD Dell Systems Management Tools and Documentation fourni avec votre système. Installation du matériel CMC CMC est pré-installé sur votre châssis, donc aucune installation n'est requise. Vous pouvez installer un second contrôleur CMC qui servira de CMC de secours. Pour plus d'informations sur l'utilisation d'un contrôleur de secours, voir « Fonctionnement de l'environnement CMC redondant », à la page 58. 34 Installation et configuration de CMC Liste de contrôle pour l'intégration d'un châssis Les étapes suivantes vous permettent de configurer le châssis avec précision : 1 Votre contrôleur CMC et la station de gestion sur laquelle vous utilisez votre navigateur doivent appartenir au même réseau appelé le réseau de gestion. Connectez un câble de réseau Ethernet entre le port CMC étiqueté GB et le réseau de gestion. REMARQUE : ne placez pas de câble dans le port Ethernet CMC nommé STK. Pour plus d'informations sur le câblage du port STK, voir « Fonctionnement de l'environnement CMC redondant », à la page 58. 2 Installez les modules d'E/S dans le châssis et reliez-les. 3 Insérez les serveurs dans le châssis. 4 Connectez le châssis à la source d'alimentation. 5 Appuyez sur le bouton d'alimentation situé dans le coin inférieur gauche du châssis ou mettez le châssis sous tension depuis l'interface CMC après avoir terminé l'étape 7. REMARQUE : n'allumez pas les serveurs. 6 À l'aide du panneau LCD sur l'avant du système, fournissez à CMC une adresse IP statique ou DHCP. 7 Connectez-vous à l'adresse IP de CMC via le navigateur web en utilisant le nom d'utilisateur (root) et le mot de passe (Calvin) par défaut. 8 À chaque iDRAC, donnez une adresse IP dans l'interface utilisateur CMC et activez l'interface LAN et IPMI. REMARQUE : l'interface LAN iDRAC sur certains serveurs est désactivée par défaut. 9 À chaque module d'E/S, donnez une adresse IP dans l'interface utilisateur CMC. 10 Connectez-vous à chaque iDRAC par l'intermédiaire du navigateur Web et fournissez la configuration finale d'Idrac. Le nom d'utilisateur par défaut est root et le mot de passe par défaut est calvin. 11 Connectez-vous à chaque module d'E/S par l'intermédiaire du navigateur Web et fournissez la configuration finale du module d'E/S. 12 Allumez les serveurs et installez le système d'exploitation.Installation et configuration de CMC 35 Connexion réseau CMC de base Pour une redondance maximale, connectez chaque contrôleur CMC disponible à votre réseau de gestion. Chaque CMC dispose de deux ports Ethernet RJ-45, nommés GB (port de sortie des données) et STK (port d'extension ou de consolidation de câble). Vous devez connecter le port GB au réseau de gestion à l'aide d'un câblage élémentaire et laisser le port STK inutilisé. PRÉCAUTION : la connexion du port STK au réseau de gestion peut provoquer des résultats imprévisibles. Le câblage des ports GB et STK au même réseau (domaine de diffusion) peut provoquer une perturbation importante de la diffusion. Connexion réseau CMC en chaîne Si vous disposez de plusieurs châssis dans un rack, vous pouvez réduire le nombre de connexions au réseau de gestion en connectant jusqu'à quatre châssis en chaîne. Si chacun des quatre châssis contient un contrôleur CMC redondant, la connexion en chaîne permet de réduire le nombre des connexions au réseau de gestion de huit à deux. Si chaque châssis ne comporte un seul CMC, les connexions sont réduites de quatre à une seule. Lors de la connexion en chaîne des châssis, GB est le port « de sortie des données » et STK est le port d'« extension » (consolidation de câble). Connectez les ports GB au réseau de gestion ou au port STK de CMC dans un châssis qui est plus proche du réseau. Vous devez connecter le port STK à un port GB plus éloigné de la chaîne ou du réseau seulement. Créez des chaînes distinctes pour les contrôleurs CMC des logements CMC principaux et secondaires. La Figure 2-1 illustre l'agencement des câbles pour quatre châssis en chaîne, chacun avec un contrôleur CMC actif et un contrôleur CMC secondaire de secours.36 Installation et configuration de CMC Figure 2-1. Connexion réseau CMC en chaîne 1 réseau de gestion 2 CMC de secours 3 CMC actif 1 3 2Installation et configuration de CMC 37 La Figure 2-2, laFigure 2-3 et la Figure 2-4 illustrent des exemples de mauvais câblage de CMC. Figure 2-2. Mauvais câblage pour la connexion réseau CMC - 2 CMC Figure 2-3. Mauvais câblage pour la connexion réseau CMC - 1 CMC38 Installation et configuration de CMC Figure 2-4. Mauvais câblage pour la connexion réseau CMC - 2 CMC Pour mettre quatre châssis en chaîne : 1 Connectez le port GB de CMC actif du premier châssis au réseau de gestion. 2 Connectez le port GB de CMC actif du second châssis au port STK de CMC actif du premier châssis. 3 Si vous disposez d'un troisième châssis, connectez le port GB de son contrôleur CMC actif au port STK du contrôleur CMC actif du second châssis. 4 Si vous disposez d'un quatrième châssis, connectez le port GB de son contrôleur CMC actif au port STK du troisième châssis. 5 Si vous disposez de CMC redondants dans le châssis, connectez-les selon le même modèle. PRÉCAUTION : le port STK de chacun des contrôleurs CMC ne doit jamais être connecté au réseau de gestion. Il peut uniquement être connecté au port GB d'un autre châssis. La connexion d'un port STK au réseau de gestion peut perturber le réseau et entraîner une perte de données. Le câblage des ports GB et STK au même réseau (domaine de diffusion) peut provoquer une perturbation importante de la diffusion. REMARQUE : ne branchez jamais un contrôleur CMC actif sur un contrôleur CMC secondaire. REMARQUE : la réinitialisation d'un contrôleur CMC dont le port STK est connecté en chaîne à un autre contrôleur CMC peut perturber le réseau pour les contrôleurs CMC situés plus loin dans la chaîne. Les contrôleurs CMC enfants peuvent journaliser des messages qui indiquent que la liaison réseau a été perdue et peuvent basculer sur leurs contrôleurs CMC redondants. Pour démarrer avec CMC, voir « Installation de logiciel d'accès à distance sur une station de gestion », à la page 39.Installation et configuration de CMC 39 Installation de logiciel d'accès à distance sur une station de gestion Vous pouvez accéder à CMC à partir d'une station de gestion à l'aide d'un logiciel d'accès à distance, tel que les utilitaires de console Telnet, Secure Shell (SSH) ou série qui se trouvent dans votre système d'exploitation ou via l'interface Web. Pour utiliser le RACADM distant à partir de votre station de gestion, installez-le en utilisant le DVD de documentation et d'outils de Dell Systems Management qui est disponible avec votre système. Ce DVD inclut les composants Dell OpenManage suivants : • Racine du DVD : contient l'utilitaire d'installation et de mise à jour des systèmes Dell. • SYSMGMT: contient les produits Systems Management Software, dont Dell OpenManage Server Administrator. • Docs : contient la documentation des systèmes, produits logiciels Systems Management, périphériques et contrôleurs RAID. • SERVICE : contient les outils dont vous avez besoin pour configurer votre système ainsi que les derniers diagnostics et pilotes optimisés par Dell pour votre système. Pour plus d'informations sur l'installation des composants logiciels Dell OpenManage, voir le Guide d'utilisation de Dell OpenManage Installation and Security disponible sur le DVD ou à l'adresse support.dell.com/manuals. Vous pouvez également télécharger la dernière version des outils DRAC Dell depuis support.dell.com. Installation de l'utilitaire RACADM sur une station de gestion Linux 1 Ouvrez une session en tant que « root » sur le système fonctionnant sous le système d'exploitation Red Hat Enterprise Linux ou SUSE Linux Enterprise Server sur lequel vous souhaitez installer les composants du système géré. 2 Insérez le DVD Dell Systems Management Tools and Documentation dans le lecteur de DVD. 40 Installation et configuration de CMC 3 Pour monter le DVD à l'emplacement requis, utilisez la commande mount ou une commande similaire. REMARQUE : sur le système d'exploitation Red Hat Enterprise Linux 5, les DVD sont montés automatiquement avec l'option -noexec mount. Cette option ne vous permet pas d'exécuter de fichiers exécutables à partir du DVD. Vous devez monter manuellement le DVD-ROM, puis exécuter les programmes exécutables. 4 Accédez au répertoire SYSMGMT/ManagementStation/linux/rac. Pour installer le logiciel RAC, entrez la commande suivante : rpm -ivh *.rpm 5 Si vous avez besoin d'aide avec la commande RACADM, tapez racadm help après avoir émis les commandes précédentes. Pour plus d'informations sur RACADM, voir « Utilisation de l'interface de ligne de commande RACADM », à la page 75. REMARQUE : lors de l'utilisation des fonctionnalités distantes de l'utilitaire RACADM, vous devez disposer d'un accès en écriture sur les dossiers sur lesquels vous utilisez les sous-commandes RACADM impliquant des opérations sur des fichiers, comme par exemple : racadm getconfig -f Pour plus d'informations sur racadm à distance, voir « Accès à distance à RACADM », à la page 81 et les sections suivantes. Désinstallation de l'utilitaire RACADM sur une station de gestion Linux 1 Ouvrez une session en tant que root sur le système sur lequel vous souhaitez désinstaller les fonctionnalités de Management Station. 2 Utilisez la commande de requête rpm pour déterminer la version installée des outils DRAC : rpm -qa | grep mgmtst-racadm 3 Vérifiez la version du progiciel à désinstaller et désinstallez la fonctionnalité à l'aide de la commande rpm -e `rpm -qa | grep mgmtst-racadm`.Installation et configuration de CMC 41 Configuration d'un navigateur Web Vous pouvez configurer et gérer CMC ainsi que les serveurs et modules installés sur le châssis via un navigateur Web. voir la section Navigateurs pris en charge de la Matrice de prise en charge des logiciels des systèmes Dell sur le site Web support.dell.com/manuals. Votre CMC et la station de gestion sur laquelle vous utilisez votre navigateur doivent appartenir au même réseau, que l'on appelle le réseau de gestion. En fonction de vos besoins de sécurité, le réseau de gestion peut être un réseau isolé hautement sécurisé. REMARQUE : vous devez veiller à ce que les mesures de sécurité du réseau de gestion, telles que les pare-feux et les serveurs proxy, n'empêchent pas votre navigateur Web d'accéder à CMC. Il convient également de garder à l'esprit que les fonctionnalités de certains navigateurs peuvent interférer avec la connectivité et les performances, en particulier si le réseau de gestion ne dispose pas d'un accès à Internet. Si votre station de gestion exécute un système d'exploitation Windows, certains paramètres d'Internet Explorer peuvent interférer avec la connectivité même si vous utilisez une interface de ligne de commande pour accéder au réseau de gestion. Serveur proxy Pour naviguer via un serveur proxy qui n'a pas accès au réseau de gestion, vous pouvez ajouter les adresses de réseau de gestion à la liste d'exception du navigateur. Cela indique au navigateur d'ignorer le serveur proxy lors de l'accès au réseau de gestion. Internet Explorer Pour modifier la liste d'exception dans Internet Explorer : 1 Démarrez Internet Explorer. 2 Cliquez sur Outils→ Options Internet→ Connexions. 3 Dans la section Paramètres du réseau local, cliquez sur Paramètres LAN. 4 Dans la section Serveur proxy, cliquez sur Avancé. 5 Dans la section Exceptions, ajoutez les adresses des contrôleurs CMC et iDRAC du réseau de gestion à la liste dont les éléments sont séparés par des points-virgules. Vous pouvez utiliser des noms DNS et des caractères génériques dans vos entrées. 42 Installation et configuration de CMC Mozilla FireFox Pour modifier la liste des exceptions dans Mozilla Firefox version 3.0 : 1 Lancez Mozilla Firefox. 2 Cliquez sur Outils→ Options (pour Windows) ou sur Modifier→ Préférences (pour Linux). 3 Cliquez sur Avancé, puis cliquez sur l'onglet Réseau. 4 Cliquez sur Paramètres. 5 Sélectionnez la Configuration manuelle de Proxy. 6 Dans le champ Pas de proxy pour, ajoutez les adresses des contrôleurs CMC et iDRAC du réseau de gestion à la liste dont les éléments sont séparés par des virgules. Vous pouvez utiliser des noms DNS et des caractères génériques dans vos entrées. Filtre anti-hameçonnage de Microsoft Si le filtre anti-hameçonnage de Microsoft est activé dans Internet Explorer 7 sur votre système de gestion, et que votre CMC n'a pas accès à Internet, l'accès à CMC peut être retardé de quelques secondes. Ce retard peut se produire si vous utilisez le navigateur ou une autre interface, comme RACADM à distance Suivez les étapes ci-dessous pour désactiver le filtre anti-hameçonnage : 1 Démarrez Internet Explorer. 2 Cliquez sur Outils→ Filtre anti-hameçonnage, puis sélectionnez Paramètres du filtre anti-hameçonnage. 3 Cochez la case Désactiver le filtre d'hameçonnage, puis cliquez sur OK. Récupération de la liste de révocation des certificats (CRL) Si CMC ne dispose pas d'un accès à Internet, désactivez la fonctionnalité de récupération de la liste de révocation des certificats dans Internet Explorer. Cette fonctionnalité vérifie si un serveur comme le serveur Web de CMC utilise un certificat figurant sur une liste de certificats révoqués, récupérée à partir d'Internet. Si Internet est inaccessible, cette fonctionnalité peut provoquer des retards de plusieurs secondes lorsque vous accédez à CMC à l'aide du navigateur ou d'une interface de ligne de commande telle que RACADM à distance. Installation et configuration de CMC 43 Pour désactiver la récupération de la liste de révocation des certificats : 1 Démarrez Internet Explorer. 2 Cliquez sur Outils→ Options Internet, puis sur Avancé. 3 Faites défiler la liste jusqu'à la section Sécurité et décochez la case Vérifier la révocation des certificats de l'éditeur, puis cliquez sur OK. Téléchargement de fichiers à partir de CMC dans Internet Explorer Lorsque vous utilisez Internet Explorer pour télécharger des fichiers à partir de CMC, vous risquez de rencontrer des problèmes lorsque l'option Ne pas enregistrer les pages cryptées sur le disque n'est pas activée. Suivez les étapes suivantes pour activer l'option Ne pas enregistrer les pages cryptées sur le disque : 1 Démarrez Internet Explorer. 2 Cliquez sur Outils→ Options Internet, puis sur Avancé. 3 Effectuez un défilement jusqu'à la section Sécurité et cochez Ne pas enregistrer les pages cryptées sur le disque. Autorisation des animations dans Internet Explorer Lors du transfert de fichiers vers et à partir de l'interface Web, une icône de transfert de fichiers tourne pour indiquer l'activité de transfert. Dans Internet Explorer, cela exige la configuration du navigateur pour la lecture d'animations. Il s'agit de la configuration par défaut. Pour configurer Internet Explorer pour la lecture d'animations : 1 Démarrez Internet Explorer. 2 Cliquez sur Outils→ Options Internet, puis sur Avancé. 3 Faites défiler la liste des paramètres jusqu'à la section Multimédia, puis cochez l'option Lire les animations dans les pages Web.44 Installation et configuration de CMC Configuration de l'accès initial à CMC Pour la gestion à distance de CMC, connectez CMC sur votre réseau de gestion, puis configurez les paramètres réseau CMC. REMARQUE : pour gérer la solution M1000e, elle doit être connectée à votre réseau de gestion. Pour plus d'informations sur la configuration des paramètres réseau de CMC, voir « Configuration du réseau CMC », à la page 45. Cette configuration initiale définit les paramètres réseau TCP/IP qui permettent l'accès à CMC. CMC et iDRAC sur chaque serveur et les ports de gestion de réseau pour tous les modules d'E/S sont connectés à un réseau commun interne dans le châssis M1000e. Cela permet au réseau de gestion d'être isolé du réseau de données du serveur. Il est important de séparer ce trafic pour un accès ininterrompu à la gestion du châssis. CMC est connecté au réseau de gestion. Tout accès externe à CMC et aux micrologiciels iDRAC s'effectue via CMC. L'accès aux serveurs gérés s'effectue, à l'inverse, via des connexions réseau aux modules d'E/S. Cela permet d'isoler le réseau applicatif du réseau de gestion. REMARQUE : il est recommandé d'isoler la gestion du châssis du réseau de données. Dell ne peut pas prendre en charge ou garantir la disponibilité d'un châssis qui est mal intégré à l'environnement. En raison du potentiel de trafic sur le réseau de données, les interfaces de gestion sur le réseau de gestion interne peuvent être saturées par le trafic destiné aux serveurs. Il en résulte des retards de communication dans CMC et iDRAC. Les retards peuvent donner lieu à un comportement imprévisible du châssis, par exemple, CMC peut afficher iDRAC comme étant hors ligne alors qu'il est sous tension et en cours d'exécution, entraînant à son tour un autre comportement indésirable. S'il s'avère peu pratique d'isoler physiquement le réseau de gestion, l'autre option consiste à séparer le trafic CMC et iDRAC sur un VLAN séparé. Les interfaces réseau CMC et iDRAC peuvent être configurées pour utiliser un VLAN avec la commande racadm setniccfg. Pour des informations supplémentaires, voir le Guide de référence de la ligne de commande RACADM pour iDRAC6 et CMC. Si vous ne disposez que d'un seul châssis, connectez le contrôleur CMC principal et le cas échéant le contrôleur CMC secondaire au réseau de gestion. Si vous avez un contrôleur CMC redondant, utilisez un autre câble réseau et connectez le port GB CMC à un second port du réseau de gestion.Installation et configuration de CMC 45 Si vous disposez de plusieurs châssis, vous pouvez choisir entre une connexion de base où chaque CMC est connecté au réseau de gestion, et une connexion en chaîne des châssis où les châssis sont connectés en série et où seul l'un d'entre eux est connecté au réseau de gestion. La connexion de base utilise un plus grand nombre de ports sur le réseau de gestion et offre une plus grande redondance. La connexion en chaîne utilise un nombre moins important de ports sur le réseau de gestion mais introduit des dépendances entre les contrôleurs CMC, ce qui réduit la redondance du système. Pour plus d'informations sur la connexion en chaîne, voir « Connexion réseau CMC en chaîne », à la page 35. REMARQUE : un câblage incorrect du contrôleur CMC dans une configuration redondante peut entraîner la perte de la gestion et créer des perturbations importantes de la diffusion. Configuration du réseau CMC REMARQUE : si vous modifiez les paramètres réseau de CMC, la connexion réseau en cours risque d'être coupée. Vous pouvez effectuer la configuration réseau initiale d'un contrôleur CMC avant ou après l'obtention d'une adresse IP par CMC. Si vous configurez les paramètres réseau initiaux de CMC avant d'avoir obtenu une adresse IP, vous pouvez utiliser l'une des interfaces suivantes : • L'écran LCD du panneau avant du châssis • La console série CMC Dell Si vous configurez les paramètres réseau initiaux de CMC après avoir obtenu une adresse IP, vous pouvez utiliser l'une des interfaces suivantes : • Interfaces de ligne de commande telles que la console série, Telnet, SSH ou la console CMC Dell via iKVM • RACADM à distance • L'interface Web CMC46 Installation et configuration de CMC Configuration de la mise en réseau à l'aide de l'Assistant Configuration de l'écran LCD REMARQUE : vous ne pouvez utiliser l'Assistant Configuration de l'écran LCD pour configurer CMC qu'avant le déploiement de CMC ou la modification du mot de passe par défaut. Si le mot de passe n'est pas modifié, il est toujours possible d'utiliser l'écran LCD pour reconfigurer CMC, en créant un risque de sécurité. L'écran LCD se situe dans le coin inférieur gauche à l'avant du châssis. La Figure 2-5 présente l'écran LCD. Figure 2-5. Affichage LCD L'écran LCD affiche des menus, des icônes, des images et des messages. 1 écran LCD 2 bouton de sélection 3 boutons de défilement (4) 4 indicateur d'état LED 1 2 3 4Installation et configuration de CMC 47 Un indicateur d'état LED de l'écran LCD fournit une indication de l'intégrité générale du châssis et de ses composants. • Un voyant bleu continu indique une intégrité satisfaisante. • Un voyant orange clignotant indique qu'au moins un composant est défaillant. • Un voyant bleu clignotant est un signal d'identification d'un châssis au sein d'un groupe de châssis. Navigation dans l'écran LCD Le côté droit de l'écran LCD comporte cinq boutons : quatre boutons flèche (haut, bas, gauche et droite) ainsi qu'un bouton central. • Pour passer d'un écran à l'autre, utilisez les boutons flèche droite (suivant) et gauche (précédent). Au cours de l'utilisation de l'Assistant Configuration, vous pouvez à tout moment revenir à l'écran précédent. • Pour faire défiler les options d'un écran, utilisez les boutons flèche bas et haut. • Pour sélectionner et enregistrer l'élément d'un écran et passer à l'écran suivant, utilisez le bouton central. Pour des informations supplémentaires sur l'utilisation de l'écran LCD, voir la section portant sur l'écran LCD du Guide de référence de la ligne de commande RACADM pour iDRAC6 et CMC. Utilisation de l'Assistant Configuration de l'écran LCD Pour configurer le réseau à l'aide de l'Assistant Configuration de l'écran LCD : 1 Si ce n'est déjà fait, appuyez sur le bouton d'alimentation du châssis pour le mettre sous tension. L'écran LCD affiche une série d'écrans d'initialisation lors de sa mise sous tension. Lorsqu'il est prêt, l'écran Configuration de la langue s'affiche. 2 Sélectionnez votre langue à l'aide des boutons fléchés, puis appuyez sur le bouton central pour sélectionner Accepter/Oui, puis appuyez à nouveau sur le bouton central. 3 L'écran Enceinte s'affiche avec la question suivante : Configurer l'enceinte ?. a Appuyez sur le bouton central pour passer à l'écran Paramètres réseau CMC. Voir l'étape 4. b Pour quitter le menu Configurer l'enceinte, sélectionnez l'icône NON et appuyez sur le bouton central. Voir l'étape 9. 48 Installation et configuration de CMC 4 Appuyez sur le bouton central pour passer à l'écran Paramètres réseau CMC. 5 Sélectionnez la vitesse de votre réseau (10 Mbits/s, 100 Mbits/s, 1 Gbit/s ou Automatique) à l'aide du bouton flèche bas. REMARQUE : Le paramètre Vitesse réseau doit correspondre à votre configuration réseau afin de garantir l'efficacité du débit du réseau. Si la vitesse réseau que vous paramétrez est inférieure à la vitesse de votre configuration réseau, la consommation de bande passante augmente et les communications réseau ralentissent. Déterminez si votre réseau prend en charge les vitesses réseau ci-dessus et paramétrez-le en conséquence. Si votre configuration réseau ne correspond à aucune de ces valeurs, Dell vous recommande d'utiliser la négociation automatique (option Automatique) ou de contacter le fabricant de votre équipement réseau. Appuyez sur le bouton central pour passer à l'écran Paramètres réseau CMC suivant. 6 Sélectionnez le mode duplex (semi ou total) qui correspond à votre environnement réseau. REMARQUE : les paramètres de la vitesse réseau et du mode duplex ne sont pas disponibles lorsque l'option de négociation automatique est activée ou qu'une vitesse de 1 000 Mo (1 Gbit/s) est sélectionnée. REMARQUE : si la négociation automatique est activée pour un périphérique mais pas pour l'autre, alors le périphérique qui utilise la négociation automatique peut déterminer la vitesse réseau de l'autre périphérique, mais pas le mode duplex. Dans ce cas, le mode duplex adopte par défaut le paramètre Semi-duplex lors de la négociation automatique. Une telle différence de mode duplex entraîne un ralentissement des connexions réseau. Appuyez sur le bouton central pour passer à l'écran Paramètres réseau CMC suivant. 7 Sélectionnez le protocole Internet (IPv4, IPv6, ou les deux) que vous souhaitez utiliser pour CMC. Appuyez sur le bouton central pour passer à l'écran Paramètres réseau CMC suivant.Installation et configuration de CMC 49 8 Sélectionnez le mode selon lequel vous souhaitez que CMC obtienne les adresses IP de la carte réseau : REMARQUE : si le mode DHCP (Protocole de configuration dynamique des hôtes) est sélectionné pour la configuration IP CMC, l'enregistrement DNS est alors également activé par défaut. DHCP (Dynamic Host Configuration Protocol - Protocole de configuration dynamique des hôtes) CMC récupère automatiquement la configuration IP (adresse IP, masque et passerelle) auprès d'un serveur DHCP de votre réseau. CMC reçoit une adresse IP unique allouée via votre réseau. Si vous avez sélectionné l'option DHCP, appuyez sur le bouton central. L'écran Configurer iDRAC ? s'affiche. Passez à l'étape 10. Statique Vous devez entrer manuellement l'adresse IP, la passerelle et le masque de sous-réseau dans les écrans qui suivent. Si vous avez sélectionné l'option Statique, appuyez sur le bouton central pour poursuivre avec l'écran Paramètres réseau CMC suivant, puis : a Définissez l'adresse IP statique en utilisant les touches fléchées droite ou gauche pour vous déplacer et les touches fléchées haut et bas pour sélectionner un nombre pour chaque position. Une fois l'adresse IP statique définie, appuyez sur le bouton central pour continuer. b Définissez le masque de sous-réseau, puis appuyez sur le bouton central. c Définissez la passerelle, puis appuyez sur le bouton central. L'écran Résumé réseau s'affiche. L'écran Résumé réseau répertorie l'adresse IP statique, le masque de sous-réseau et la passerelle que vous venez d'entrer. Vérifiez l'exactitude de ces paramètres. Pour corriger un paramètre, accédez au bouton flèche gauche, puis appuyez sur le bouton central pour retourner à l'écran de ce paramètre. Après avoir effectué une correction, appuyez sur le bouton central. d Après avoir vérifié l'exactitude des paramètres entrés, appuyez sur le bouton central. L'écran Enregistrer le DNS ? apparaît.50 Installation et configuration de CMC 9 Si vous avez sélectionné DHCP à l'étape précédente, passez à l'étape 10. Pour enregistrer l'adresse IP de votre serveur DNS, appuyez sur le bouton central. Si vous ne possédez pas de DNS, appuyez sur la touche fléchée droite. L'écran Enregistrer le DNS ? apparaît ; passez à l'étape 10. Définissez l'adresse IP du DNS en utilisant les touches fléchées droite ou gauche pour vous déplacer et les touches fléchées haut et bas pour sélectionner un nombre pour chaque position. Une fois l'adresse IP du DNS définie, appuyez sur le bouton central pour continuer. 10 Indiquez si vous souhaitez configurer iDRAC : – Non : passez à l'étape 13. – Oui : appuyez sur le bouton central pour continuer. Vous pouvez également configurer iDRAC depuis l'interface utilisateur CMC. 11 Sélectionnez le protocole Internet (IPv4, IPv6, ou les deux) que vous souhaitez utiliser pour les serveurs. Dynamic Host Configuration Protocol (Protocole de configuration dynamique des hôtes) iDRAC récupère automatiquement la configuration IP (adresse IP, masque et passerelle) auprès d'un serveur DHCP de votre réseau. Une adresse IP unique sera attribuée à iDRAC via votre réseau. Appuyez sur le bouton central. Installation et configuration de CMC 51 a Sélectionnez Activer ou Désactiver pour activer ou désactiver le canal IPMI LAN. Appuyez sur le bouton central pour continuer. b Sur l'écran Configuration iDRAC, pour appliquer tous les paramètres réseau iDRAC aux serveurs installés, mettez en surbrillance l'icône Accepter/Oui, puis appuyez sur le bouton central. Pour ne pas appliquer les paramètres réseau iDRAC aux serveurs installés, mettez en surbrillance l'icône Non et appuyez sur le bouton central pour passer à l'étape c. c Sur l'écran Configuration iDRAC suivant, pour appliquer tous les paramètres réseau iDRAC aux serveurs récemment installés, mettez en surbrillance l'icône Accepter/Oui et appuyez sur le bouton central ; lorsqu'un nouveau serveur est inséré dans le châssis, l'écran LCD invite l'utilisateur à préciser s'il souhaite déployer automatiquement le serveur à l'aide des paramètres/règles réseau précédemment configurés. Pour ne pas appliquer les paramètres réseau iDRAC aux serveurs récemment installés, mettez en surbrillance l'icône Non et appuyez sur le bouton central ; lorsqu'un nouveau serveur est inséré dans le châssis, les paramètres réseau iDRAC ne sont pas configurés. Statique Vous devez entrer manuellement l'adresse IP, la passerelle et le masque de sous-réseau dans les écrans qui suivent. Si vous avez sélectionné l'option Statique, appuyez sur le bouton central pour passer à l'écran Paramètres réseau iDRAC suivant, puis : a Définissez l'adresse IP statique en utilisant les touches fléchées droite ou gauche pour vous déplacer et les touches fléchées haut et bas pour sélectionner un nombre pour chaque position. Cette adresse est l'adresse IP statique de l'iDRAC qui se trouve dans le premier logement. L'adresse IP statique de chaque iDRAC suivant est calculée en tant qu'incrément du numéro d'emplacement de cette adresse IP. Une fois l'adresse IP statique définie, appuyez sur le bouton central pour continuer. b Définissez le masque de sous-réseau, puis appuyez sur le bouton central. c Définissez la passerelle, puis appuyez sur le bouton central. 52 Installation et configuration de CMC 12 Sur l'écran Enceinte, mettez en surbrillance l'icône Accepter/Oui et appuyez sur le bouton central pour appliquer tous les paramètres d'enceinte. Pour ne pas appliquer les paramètres d'enceinte, mettez en surbrillance l'icône Non et appuyez sur le bouton central. 13 Sur l'écran Résumé IP, vérifiez que les adresses IP que vous avez fournies sont correctes. Pour corriger un paramètre, accédez au bouton flèche gauche, puis appuyez sur le bouton central pour retourner à l'écran de ce paramètre. Après avoir effectué votre correction, appuyez sur le bouton central. Le cas échéant, accédez au bouton flèche droite, puis appuyez sur le bouton central pour retourner à l'écran Résumé IP. Lorsque vous avez confirmé l'exactitude des paramètres saisis, appuyez sur le bouton central. L'Assistant Configuration se ferme et l'écran Menu principal s'affiche. REMARQUE : si vous avez sélectionné Oui/Accepter, l'écran Attente apparaît avant l'affichage de l'écran Résumé IP. Les modules CMC et iDRAC sont désormais disponibles sur le réseau. Vous pouvez accéder à CMC sur l'adresse IP attribuée à l'aide de l'interface Web ou des interfaces de ligne de commande telles que la console série, Telnet et SSH. REMARQUE : une fois la configuration réseau à l'aide de l'Assistant Configuration de l'écran LCD terminée, l'Assistant devient indisponible.Installation et configuration de CMC 53 Accès à CMC via un réseau Après avoir configuré les paramètres réseau CMC, vous pouvez accéder à distance à CMC à l'aide de l'une des interfaces suivantes : La Figure 2-1 répertorie les interfaces que vous pouvez utiliser pour accéder à distance à CMC. REMARQUE : puisque telnet n'est pas aussi sécurisé que les autres interfaces, il est désactivé par défaut. Activez Telnet via le Web, SSH ou RACADM à distance. REMARQUE : le nom d'utilisateur par défaut de CMC est root et le mot de passe par défaut est calvin. Tableau 2-1. Interfaces CMC Interface Description Interface Web Fournit un accès à distance à CMC à l'aide d'une interface utilisateur. L'interface Web est intégrée au micrologiciel CMC et accessible via l'interface NIC d'un navigateur Web pris en charge sur la station de gestion. Pour obtenir la liste des navigateurs Web pris en charge, consultez la section Navigateurs pris en charge de la Matrice de prise en charge des logiciels des systèmes Dell sur le site Web support.dell.com/manuals. Interface de ligne de commande RACADM à distance Fournit un accès à distance à CMC à partir d'une station de gestion qui utilise une interface de ligne de commande. L'utilitaire RACADM distant utilise l'option racadm -r avec l'adresse IP de CMC pour exécuter des commandes sur CMC. Pour plus d'informations sur racadm à distance, voir « Accès à distance à RACADM », à la page 81 et les sections suivantes. Telnet Fournit un accès par ligne de commande à CMC via le réseau. L'interface de ligne de commande RACADM et la commande connect, utilisées pour se connecter à la console série d'un serveur ou d'un module d'E/S, sont disponibles à partir de la ligne de commande CMC. REMARQUE : Telnet est un protocole non sécurisé qui transmet toutes les données, y compris les mots de passe, en texte simple. Pour transmettre des informations critiques, utilisez l'interface SSH. SSH Fournit les mêmes fonctionnalités que la console Telnet par l'utilisation d'une couche de transport cryptée pour une sécurité accrue.54 Installation et configuration de CMC Vous pouvez accéder aux interfaces Web CMC et iDRAC via la carte d'interface réseau CMC à l'aide d'un navigateur Web pris en charge. Vous pouvez également les lancer à partir de Dell Server Administrator ou de Dell OpenManage IT Assistant. Pour obtenir la liste des navigateurs Web pris en charge, consultez la section Navigateurs pris en charge de la Matrice de prise en charge des logiciels des systèmes Dell sur le site Web support.dell.com/manuals. Pour accéder à CMC via un navigateur Web pris en charge, voir « Accès à l'interface Web CMC », à la page 111. Pour accéder à l'interface CMC à l'aide de Dell Server Administrator, lancez Server Administrator sur votre station de gestion. Dans l'arborescence du système située sur le panneau gauche de la page d'accueil de Server Administrator, cliquez sur Système→ Châssis principal du système→ Remote Access Controller. Pour plus d'informations, consultez le Guide d'utilisation de Dell Server Administrator. Pour accéder à la ligne de commande de CMC à l'aide de Telnet ou de SSH, voir « Configuration de CMC pour utiliser des consoles de ligne de commande », à la page 61. Pour plus d'informations sur l'utilisation de RACADM, voir « Utilisation de l'interface de ligne de commande RACADM », à la page 75. Pour plus d'informations sur l'utilisation de la commande connect, ou racadm connect, pour se connecter aux serveurs et modules d'E/S, voir « Connexion aux serveurs ou aux modules d'E/S à l'aide de la commande Connect », à la page 67. Installation ou mise à jour du micrologiciel du module CMC La section suivante décrit l'installation et la mise à jour du micrologiciel CMC. Téléchargement du micrologiciel du module CMC Avant de procéder à la mise à jour du micrologiciel, téléchargez la dernière version du micrologiciel à partir du site support.dell.com et enregistrez-la sur le système local. Le progiciel du micrologiciel CMC comprend les éléments suivants : • Code et données compilés du micrologiciel du module CMC • Fichiers de données de l'interface Web, JPEG et d'autres interfaces utilisateur • Fichiers de configuration par défautInstallation et configuration de CMC 55 REMARQUE : lors des mises à jour du micrologiciel CMC, une partie ou l'ensemble des ventilateurs du châssis tourne à 100 %. REMARQUE : par défaut, la mise à jour du micrologiciel conserve les paramètres CMC définis. Au cours de la mise à jour, vous pouvez réinitialiser les paramètres de configuration du module CMC afin de rétablir les valeurs par défaut définies en usine. REMARQUE : si des contrôleurs CMC redondants sont installés dans le châssis, il est primordial de les mettre tous les deux à jour avec la même version du micrologiciel. Si les contrôleurs CMC utilisent des micrologiciels différents et qu'un basculement se produit, des résultats inattendus peuvent se produire. Vous pouvez utiliser la commande getsysinfo de RACADM (voir la section relative à la commande getsysinfo du Guide de référence de la ligne de commande RACADM pour iDRAC6 et CMC) ou la page Résumé du châssis (voir « Affichage des versions actuelles du micrologiciel », à la page 216) pour afficher les versions de micrologiciel actuelles des contrôleurs CMC installés dans votre châssis. Si vous disposez d'un contrôleur CMC de secours, il est recommandé de mettre les deux contrôleurs CMC à jour en même temps en une seule opération. Une fois le contrôleur de secours mis à jour, permutez les rôles des modules CMC de manière à ce que celui qui vient d'être mis à jour devienne le contrôleur actif et que celui doté de l'ancien micrologiciel devienne le contrôleur de secours. (voir la section relative à la commande cmcchangeover du Guide de référence de la ligne de commande RACADM pour iDRAC6 et CMC pour obtenir de l'aide concernant l'échange de rôles). Ceci vous permet de vérifier que la mise à jour s'est bien déroulée et que le nouveau micrologiciel fonctionne correctement avant de procéder à la mise à jour du micrologiciel au sein du deuxième contrôleur CMC. Lorsque les deux contrôleurs CMC sont mis à jour, vous pouvez utiliser la commande cmcchangeover pour rétablir leurs rôles précédents. Le micrologiciel CMC révision 2.x met à jour le contrôleur principal et le contrôleur redondant sans avoir recours à la commande cmcchangeover. Mise à jour du micrologiciel CMC à l'aide de l'interface Web Pour des instructions sur l'utilisation de l'interface Web pour la mise à jour du micrologiciel CMC, voir « Mise à jour du micrologiciel du contrôleur CMC », à la page 218. Mise à jour du micrologiciel CMC via RACADM Pour obtenir des instructions relatives à l'utilisation de la sous-commande fwupdate pour mettre à jour le micrologiciel CMC, consultez la section relative à la commande fwupdate du Guide de référence de la ligne de commande RACADM pour iDRAC6 et CMC.56 Installation et configuration de CMC Configuration des propriétés de CMC Vous pouvez configurer les propriétés de CMC telles que le bilan d'alimentation, les paramètres réseau, les utilisateurs et les alertes SNMP et par e-mail à l'aide de l'interface Web ou de RACADM. Pour plus d'informations sur l'utilisation de l'interface Web, voir « Accès à l'interface Web CMC », à la page 111. Pour plus d'informations sur l'utilisation de RACADM, voir « Utilisation de l'interface de ligne de commande RACADM », à la page 75. PRÉCAUTION : l'utilisation simultanée de plusieurs outils de configuration CMC peut provoquer des résultats inattendus. Configuration des bilans de puissance CMC offre un service d'établissement d'un bilan de puissance qui vous permet de configurer le bilan de puissance, la redondance et l'alimentation dynamique du châssis. Le service de gestion de l'alimentation permet l'optimisation de la consommation électrique et la réattribution de l'alimentation aux différents modules en fonction de la demande. Pour plus d'informations sur la gestion de l'alimentation de CMC, voir « Gestion de l'alimentation », à la page 335. Pour des instructions sur la configuration du bilan de puissance et des autres paramètres d'alimentation à l'aide de l'interface Web, voir « Configuration des bilans de puissance », à la page 214. Configuration des paramètres réseau de CMC REMARQUE : si vous modifiez les paramètres réseau de CMC, la connexion réseau en cours risque d'être coupée. Vous pouvez configurer les paramètres réseau de CMC à l'aide de l'un des outils suivants : • RACADM : pour plus d'informations, voir « Configuration de plusieurs CMC dans plusieurs châssis », à la page 101. REMARQUE : pour déployer CMC dans un environnement Linux, voir « Installation de l'utilitaire RACADM sur une station de gestion Linux », à la page 39. • Interface Web : pour plus d'informations, voir « Configuration des propriétés du réseau CMC », à la page 162.Installation et configuration de CMC 57 Ajout et configuration des utilisateurs Vous pouvez ajouter et configurer des utilisateurs CMC à l'aide de RACADM ou de l'interface Web CMC. Vous pouvez également utiliser Microsoft Active Directory pour gérer les utilisateurs. Pour obtenir des instructions sur l'ajout et la configuration des utilisateurs de clé publique pour CMC à l'aide de RACADM, voir « Utilisation de RACADM pour configurer l'authentification par clé publique sur SSH », à la page 96. Pour des instructions sur l'ajout et la configuration d'utilisateurs à l'aide de l'interface Web, voir « Ajout et configuration d'utilisateurs CMC », à la page 174. Pour des instructions sur l'utilisation d'Active Directory avec votre CMC, voir « Utilisation du service d'annuaire CMC », à la page 285. Ajout d'alertes SNMP et par e-mail Vous pouvez configurer CMC pour qu'il génère des alertes SNMP et/ou par e-mail lorsque certains événements se produisent au niveau du châssis. Pour en savoir plus, voir « Configuration des alertes SNMP », à la page 438 et « Configuration des alertes par messagerie », à la page 445. Configuration de Syslog distant La fonctionnalité syslog distant est activée/configurée via l'interface utilisateur de CMC ou la commande racadm. Les options de configuration incluent le nom (ou l'adresse IP) du serveur syslog et le port UDP utilisé par CMC lors du transfert des entrées du journal. Vous pouvez spécifier jusqu'à 3 destinations de serveur syslog distinctes dans la configuration. Syslog distant constitue une cible de journal supplémentaire pour CMC. Lorsque vous avez configuré syslog distant, chaque nouvelle entrée de journal générée par CMC est transférée aux destinations. REMARQUE : comme le transport réseau pour les entrées de journal transférées est UDP, il n'existe aucune garantie que les entrées de journal sont délivrées, pas plus que CMC n'indique si les entrées de journal ont été correctement reçues. Pour configurer les services CMC : 1 Ouvrez une session sur l'interface Web de CMC. 2 Cliquez sur l'onglet Réseau. 3 Cliquez sur le sous-onglet Services. La page Services s'affiche. Pour plus d'informations sur la configuration de syslog distant, voir la Figure 5-58.58 Installation et configuration de CMC Fonctionnement de l'environnement CMC redondant Vous pouvez installer un contrôleur CMC de secours qui prend la relève en cas de défaillance du contrôleur CMC actif. Le contrôleur CMC redondant peut être pré-installé ou ajouté à une date ultérieure. Il est important que le réseau de CMC soit correctement câblé pour assurer une redondance complète ou des performances optimales. Un basculement peut survenir lorsque vous : • Exécutez la commande RACADM cmcchangeover. (Voir la section relative à la commande cmcchangeover du Guide de référence de la ligne de commande RACADM pour iDRAC et CMC. • Exécutez la commande RACADM racreset sur le contrôleur CMC actif. (Voir la section relative à la commande racreset du Guide de référence de la ligne de commande RACADM pour iDRAC6 et CMC. • Réinitialisez le contrôleur CMC actif à partir de l'interface Web. (Reportez-vous à l'option Réinitialiser le contrôleur CMC des opérations de contrôle de l'alimentation décrite dans « Exécution de tâches de contrôle de l'alimentation sur le châssis », à la page 379.) • Retirez le câble réseau du contrôleur CMC actif. • Retirez le contrôleur CMC actif du châssis. • Lancez un flash du micrologiciel CMC sur le contrôleur CMC actif. • Disposez d'un contrôleur CMC actif qui n'est plus fonctionnel. REMARQUE : en cas de basculement de CMC, toutes les connexions iDRAC et toutes les sessions CMC actives sont perdues. Les utilisateurs dont la session est perdue doivent se reconnecter au nouveau contrôleur CMC actif. À propos du contrôleur CMC de secours Le contrôleur CMC de secours est identique au contrôleur CMC actif et est maintenu comme un miroir de celui-ci. Les contrôleurs CMC actif et de secours doivent tous deux être installés avec la même révision du micrologiciel. Si les révisions du micrologiciel diffèrent, le système signale une dégradation de la redondance. Le contrôleur CMC de secours prend en charge les mêmes paramètres et propriétés que le contrôleur actif. Vous devez maintenir la même version du micrologiciel sur les deux contrôleurs CMC mais vous n'avez pas à reproduire les paramètres de configuration sur le contrôleur CMC de secours. REMARQUE : pour des informations sur l'installation d'un contrôleur CMC de secours, consultez le Manuel du propriétaire du matériel. pour des instructions sur l'installation du micrologiciel CMC sur votre CMC de secours, voir « Installation ou mise à jour du micrologiciel du module CMC », à la page 54.Installation et configuration de CMC 59 Mode de sécurité CMC En mode de sécurité, semblable à la protection de basculement offerte par le CMC redondant, l'enceinte M1000e active le mode de sécurité en vue de protéger les lames et les modules E/S de toute défaillance. Le mode de sécurité est activé lorsque aucun CMC ne contrôle le châssis. Au cours du basculement du CMC ou lors de la perte de gestion d'un CMC unique : • Vous ne pouvez pas mettre sous tension des lames nouvellement installées. • Vous ne pouvez pas accéder à distance aux lames existantes. • Les ventilateurs de refroidissement du châssis tournent à 100 % pour la protection thermique des composants. • Jusqu'à la restauration de la gestion du CMC, la performance des lames est réduite afin de limiter la consommation d'énergie. La perte de gestion de CMC peut entraîner les conditions suivantes : • Suppression du CMC : la gestion du châssis reprend après le remplacement du CMC ou après le basculement au CMC de secours. • Suppression du câble réseau du CMC ou perte de connexion réseau du CMC : la gestion du châssis reprend après le basculement du châssis vers le CMC de secours. Le basculement du réseau est possible uniquement en mode CMC redondant. • Réinitialisation du CMC : la gestion du châssis est rétablie après le redémarrage du CMC ou après le basculement du châssis vers le CMC en attente. • Commande de basculement du CMC émise : la gestion du châssis est rétablie après le basculement du châssis vers le CMC de secours. • Réinitialisation du micrologiciel du CMC : la gestion du châssis reprend après le redémarrage du CMC ou après le basculement du châssis vers le CMC de secours. Il vous est recommandé de mettre d'abord à jour le CMC de secours afin qu'un seul événement de basculement se produise. • Détection et correction d'erreurs du CMC : la gestion du châssis reprend après la réinitialisation du CMC ou le basculement du châssis vers le CMC de secours. REMARQUE : vous pouvez configurer l'enceinte soit avec un CMC unique soit à l'aide de CMC redondants. Dans le cadre de configurations de CMC redondants, si le CMC principal perd la communication avec l'enceinte ou le réseau de gestion, le CMC de secours assure la gestion du châssis. 60 Installation et configuration de CMC Processus de sélection de CMC actif Il n'existe aucune différence entre les deux logements CMC ; en d'autres termes, l'un ne prévaut pas sur l'autre. En effet, le contrôleur CMC qui est installé ou démarré le premier assume le rôle de contrôleur CMC actif. Si une alimentation alternative est appliquée aux deux contrôleurs CMC installés, le contrôleur CMC installé dans le logement CMC 1 du châssis (à gauche) assume normalement le rôle de contrôleur CMC actif. Le contrôleur CMC actif est signalé par une LED bleue. Si deux contrôleurs CMC sont insérés dans un châssis qui est déjà sous tension, la négociation automatique active/de secours peut prendre jusqu'à deux minutes. Le fonctionnement normal du châssis est rétabli une fois la négociation terminée. Obtention de la condition d'intégrité du contrôleur CMC redondant Vous pouvez afficher la condition d'intégrité du contrôleur CMC de secours dans l'interface Web. Pour plus d'informations sur l'accès à la condition d'intégrité de CMC dans l'interface Web,voir 130.Configuration de CMC pour utiliser des consoles de ligne de commande 61 Configuration de CMC pour utiliser des consoles de ligne de commande Cette section fournit des informations sur les fonctionnalités de la console de ligne de commande CMC (ou console série/Telnet/Secure Shell) et explique comment configurer votre système de manière à pouvoir effectuer des actions de gestion de systèmes via la console. Pour plus d'informations sur l'utilisation des commandes RACADM dans CMC via la console de ligne de commande, voir « Utilisation de l'interface de ligne de commande RACADM », à la page 75. Fonctionnalités de la console de ligne de commande de CMC CMC prend en charge les fonctions de console série, Telnet et SSH suivantes : • Une connexion de client série et un maximum de quatre connexions de clients Telnet simultanées. • Un maximum de quatre connexions de clients Secure Shell (SSH) simultanées. • Prise en charge des commandes RACADM. • Commande connect intégrée de connexion à la console série des serveurs et des modules d'E/S ; également disponible sous la forme racadm connect. • Modification et historique de la ligne de commande. • Contrôle du délai d'expiration de la session sur toutes les interfaces de console.62 Configuration de CMC pour utiliser des consoles de ligne de commande Utilisation d'une console série, Telnet ou SSH Lorsque vous vous connectez à la ligne de commande CMC, vous pouvez entrer les commandes suivantes : Utilisation d'une console Telnet avec CMC Un maximum de quatre systèmes client Telnet et quatre clients SSH peuvent se connecter à la fois. Si votre station de gestion exécute Windows XP ou Windows 2003, un problème peut surgir au niveau des caractères lors d'une session Telnet sur CMC. Ce problème peut prendre la forme d'une ouverture de session figée, la touche Retour ne répondant pas et l'invite de mot de passe n'apparaissant pas. Pour résoudre ce problème, téléchargez le correctif 824810 à partir du site Web du support de Microsoft à l'adresse support.microsoft.com. Consultez l'article 824810 de la Base de connaissances de Microsoft pour plus d'informations. Tableau 3-1. Commandes de la ligne de commande CMC Commande Description racadm Les commandes RACADM commencent par le mot-clé racadm et sont suivies d'une sous-commande, comme getconfig, serveraction ou getsensorinfo. Voir « Utilisation de l'interface de ligne de commande RACADM », à la page 75 plus de détails sur l'utilisation de RACADM. connect Établit une connexion à la console série d'un serveur ou d'un module d'E/S. Voir « Connexion aux serveurs ou aux modules d'E/S à l'aide de la commande Connect », à la page 67 pour obtenir de l'aide sur l'utilisation de la commande connect. REMARQUE : la commande racadm connect peut également être utilisée. exit, logout et quit Ces commandes exécutent toutes la même action : elles mettent fin à la session en cours et retournent à une invite d'ouverture de session. Configuration de CMC pour utiliser des consoles de ligne de commande 63 Utilisation de SSH avec CMC SSH est une session de ligne de commande qui intègre les mêmes fonctions qu'une session Telnet, mais avec la négociation et le cryptage de session afin d'améliorer la sécurité. CMC prend en charge la version 2 de SSH avec authentification par mot de passe. Par défaut, SSH est activé sur le contrôleur CMC. REMARQUE : CMC ne prend pas en charge la version 1 de SSH. Lorsqu'une erreur se produit lors de la procédure d'ouverture de session, le client SSH publie un message d'erreur. Le texte du message dépend du client et n'est pas contrôlé par le contrôleur CMC. Consultez les messages RACLog pour déterminer la cause de la panne. REMARQUE : OpenSSH doit être exécuté à partir d'un émulateur de terminal VT100 ou ANSI sous Windows. Vous pouvez aussi exécuter OpenSSH à l'aide de Putty.exe. L'exécution d'OpenSSH à partir d'une invite de commande Windows n'offre pas une fonctionnalité complète (quelques touches ne répondent pas et aucun graphique n'est affiché). Pour Linux, exécutez les services de clients SSH pour vous connecter à CMC avec n'importe quel shell. Quatre sessions SSH simultanées sont prises en charge à la fois. Le délai d'expiration de la session est contrôlé par la propriété cfgSsnMgtSshIdleTimeout. Pour des informations supplémentaires, consultez le chapitre portant sur les propriétés de la base de données du Guide de référence de la ligne de commande RACADM pour iDRAC6 et CMC, la page Gestion des services dans l'interface Web, ou voir « Configuration des services », à la page 205. CMC prend également en charge l'authentification par clé publique (PKA) sur SSH. Cette méthode d'authentification améliore l'automatisation des scripts SSH en évitant d'intégrer ou de demander l'ID utilisateur/le mot de passe. Pour plus d'informations, voir « Utilisation de RACADM pour configurer l'authentification par clé publique sur SSH », à la page 96. Activation de SSH sur CMC SSH est activé par défaut. Si SSH est désactivé, vous pouvez l'activer avec n'importe quelle autre interface prise en charge. Pour des instructions sur l'activation des connexions SSH sur CMC à l'aide de RACADM, consultez la section relative à la commande config et la section Propriétés de la base de données cfgSerial du Guide de référence la ligne de commande RACADM pour iDRAC6 et CMC. Pour des instructions sur l'activation des connexions SSH sur CMC à l'aide de l'interface Web, voir « Configuration des services », à la page 205.64 Configuration de CMC pour utiliser des consoles de ligne de commande Changement de port SSH Pour changer de port SSH, utilisez la commande suivante : racadm config -g cfgRacTuning -o cfgRacTuneSshPort Pour des informations supplémentaires sur les propriétés cfgSerialSshEnable et cfgRacTuneSshPort, voir le chapitre Propriétés de la base de données du Guide de référence de la ligne de commande RACADM pour iDRAC6 et CMC. La mise en œuvre SSH CMC prend en charge plusieurs schémas de cryptographie, comme illustré dans la Figure 3-2. Tableau 3-2. Schémas de cryptographie Type de schéma Schéma Cryptographie asymétrique Spécification de bits (aléatoire) Diffie-Hellman DSA/DSS 512-1024 par NIST Cryptographie symétrique • AES256-CBC • RIJNDAEL256-CBC • AES192-CBC • RIJNDAEL192-CBC • AES128-CBC • RIJNDAEL128-CBC • BLOWFISH-128-CBC • 3DES-192-CBC • ARCFOUR-128 Intégrité du message • HMAC-SHA1-160 • HMAC-SHA1-96 • HMAC-MD5-128 • HMAC-MD5-96 Authentification Password (Mot de passe)Configuration de CMC pour utiliser des consoles de ligne de commande 65 Activation de la connexion du panneau avant à iKVM Pour des informations et des instructions sur l'utilisation des ports du panneau avant de l'iKVM, voir « Activation ou désactivation du panneau avant », à la page 407. Configuration du logiciel d'émulation de terminal CMC prend en charge une console texte série d'une station de gestion exécutant l'un des types de logiciel d'émulation de terminal suivants : • Linux Minicom • HyperTerminal Private Edition (version 6.3) de Hilgraeve Effectuez les étapes des sous-sections suivantes pour configurer votre type de logiciel de terminal. Configuration de Linux Minicom Minicom est un utilitaire d'accès au port série pour Linux. Les étapes suivantes s'appliquent pour configurer Minicom version 2.0. Les autres versions de Minicom peuvent être légèrement différentes, mais elles requièrent les mêmes paramètres de base. Voir les informations de « Paramètres de Minicom requis », à la page 66 pour configurer les autres versions de Minicom. Configuration de Minicom version 2.0 REMARQUE : Pour optimiser les résultats, définissez la propriété cfgSerialConsoleColumns pour qu'elle corresponde au nombre de colonnes. Rappel : l'invite utilise deux caractères. Par exemple, pour une fenêtre de terminal de 80 colonnes, entrez : racadm config –g cfgSerial –o cfgSerialConsoleColumns 80. 1 Si vous n'avez pas de fichier de configuration Minicom, passez à l'étape suivante. Si vous avez un fichier de configuration Minicom, tapez minicom et passez à l'étape 13. 2 À l'invite de commande Linux, tapez minicom -s. 3 Sélectionnez Configuration du port série et appuyez sur . 4 Appuyez sur et sélectionnez le périphérique série approprié (par exemple, /dev/ttyS0).66 Configuration de CMC pour utiliser des consoles de ligne de commande 5 Appuyez sur et définissez l'option Bits par seconde/Parité/Bits sur 115200 8N1. 6 Appuyez sur , définissez Contrôle du débit du matériel sur Oui et définissez Contrôle du débit du logiciel sur Non. Pour quitter le menu Configuration du port série, appuyez sur . 7 Sélectionnez Modem et numérotation et appuyez sur . 8 Dans le menu Configuration du modem et numérotation, appuyez sur pour effacer les paramètres init, reset, connect et hangup de sorte qu'ils soient vides, puis appuyez sur pour enregistrer chaque valeur vide. 9 Lorsque tous les champs indiqués ont été effacés, appuyez sur pour quitter le menu Configuration de la numérotation du modem et des paramètres. 10 Sélectionnez Enregistrer la configuration sous config_name et appuyez sur . 11 Sélectionnez Quitter Minicom et appuyez sur . 12 À l'invite shell de commande, tapez minicom . 13 Appuyez sur , , pour quitter Minicom. Assurez-vous que la fenêtre Minicom affiche une invite de connexion. Lorsque l'invite de connexion apparaît, votre connexion est établie. Vous êtes maintenant prêt à vous connecter et à accéder à l'interface de ligne de commande CMC. Paramètres de Minicom requis Utilisez la Figure 3-3 pour configurer toute version de Minicom. Tableau 3-3. Paramètres de Minicom Description du paramètre Paramètre requis B/s/Par/Bits 115200 8N1 Contrôle du débit matériel Oui Contrôle du débit logiciel Non Émulation de terminal ANSI Paramètres de la numérotation du modem et des paramètres Effacez les paramètres init, reset, connect et hangup pour qu'ils soient videsConfiguration de CMC pour utiliser des consoles de ligne de commande 67 Connexion aux serveurs ou aux modules d'E/S à l'aide de la commande Connect CMC peut établir une connexion pour rediriger la console série du serveur ou des modules d'E/S. Pour les serveurs, la redirection de la console série peut être effectuée de plusieurs façons : • À l'aide de la ligne de commande CMC et de la commande connect ou racadm connect. Pour des informations supplémentaires sur le paramètre connect, voir la commande racadm connect du Guide de référence de la ligne de commande RACADM pour iDRAC6 et CMC. • À l'aide de la fonctionnalité de redirection de la console série de l'interface Web iDRAC. • À l'aide de la fonctionnalité Serial Over LAN (SOL) iDRAC. En revanche, pour les consoles série/Telnet/SSH, CMC prend en charge la commande connect pour établir une connexion série vers le serveur ou les modules d'E/S. La console série du serveur contient à la fois les écrans d'amorçage et de configuration du BIOS et la console série du système d'exploitation. Pour les modules d'E/S, la console série du commutateur est disponible. PRÉCAUTION : lorsqu'elle est exécutée depuis la console série de CMC, l'option connect -b reste connectée jusqu'à la réinitialisation de CMC. Cette connexion constitue un risque potentiel de sécurité. REMARQUE : la commande connect fournit l'option –b (binaire). L'option –b transmet des données binaires brutes et cfgSerialConsoleQuitKey n'est pas utilisé. De plus, lors de la connexion à un serveur avec la console série CMC, les transitions dans le signal DTR (par exemple, si le câble série est retiré pour connecter un débogueur) n'entraînent pas une fermeture de session. REMARQUE : si un module d'E/S ne prend pas en charge la redirection de console, la commande connect affiche une console vide. Dans ce cas, pour revenir à la console CMC, tapez la séquence Échap. La séquence Échap de la console par défaut est \. Le système géré comprend jusqu'à six modules d'E/S. Pour vous connecter à un module d'E/S, tapez : connect switch-n où n est un libellé de module d'E/S A1, A2, B1, B2, C1 et C2.68 Configuration de CMC pour utiliser des consoles de ligne de commande (Voir la Figure 11-1 pour une illustration du placement des modules d'E/S dans le châssis.) Lorsque vous référencez les modules d'E/S dans la commande connect, ils sont adressés à des commutateurs, comme présenté dans la Figure 3-4. REMARQUE : il ne peut y avoir qu'une seule connexion de module d'E/S par châssis à la fois. REMARQUE : vous ne pouvez pas vous connecter aux fonctions d'intercommunication depuis la console série. Pour vous connecter à une console série du serveur géré, utilisez la commande connect server-n, où -n est le numéro d'emplacement du serveur ; vous pouvez également utiliser la commande racadm connect server-n. Lorsque vous vous connectez à un serveur à l'aide de l'option -b, une communication binaire est très probablement établie et le caractère d'échappement est désactivé. Si iDRAC n'est pas disponible, le message d'erreur Pas de route vers l'hôte apparaît. La commande connect server-n permet à l'utilisateur d'accéder au port série du serveur. Une fois cette connexion établie, l'utilisateur est en mesure de voir la redirection de console du serveur via le port série de CMC qui inclut à la fois la console série du BIOS et la console série du système d'exploitation. REMARQUE : pour afficher les écrans d'amorçage du BIOS, la redirection série doit être activée dans la configuration BIOS des serveurs. Vous devez également définir la fenêtre d'émulateur de terminal sur 80x25. Sinon, l'écran est illisible. Tableau 3-4. Adressage des modules d'E/S aux commutateurs Nom de modules d'E/S Commutateur A1 commutateur-a1 ou commutateur- 1 A2 commutateur-a2 ou commutateur- 2 B1 commutateur-a1 ou commutateur- 3 B2 commutateur-a2 ou commutateur- 4 C1 commutateur-a1 ou commutateur- 5 C2 commutateur-a2 ou commutateur- 6Configuration de CMC pour utiliser des consoles de ligne de commande 69 REMARQUE : certaines touches ne fonctionnent pas dans les écrans de configuration du BIOS ; par conséquent, vous devez spécifier des séquences d'échappement appropriées pour CTRL+ALT+SUPPR, ainsi que d'autres séquences d'échappement. L'écran de redirection initial affiche les séquences d'échappement nécessaires. Configuration du BIOS du serveur géré pour la redirection de console série Il est nécessaire de se connecter au serveur géré à l'aide d'iKVM (voir « Gestion de serveurs avec iKVM », à la page 394) ou d'établir une session VKVM depuis l'interface utilisateur Web iDRAC (voir le Guide d'utilisation d'iDRAC à l'adresse support.dell.com/manuals). La communication série dans le BIOS est désactivée par défaut. Pour rediriger les données de la console texte hôte vers les communications série sur le réseau local, vous devez activer la redirection de console via COM1. Pour modifier le paramétrage du BIOS : 1 Démarrez le serveur géré. 2 Appuyez sur pour accéder à l'utilitaire de configuration du BIOS pendant le POST. 3 Effectuez un défilement vers le bas jusqu'à Communication série et appuyez sur . Dans la boîte de dialogue contextuelle, la liste des communications série affiche les options suivantes : • désactivé • activé sans redirection de console • activé avec redirection de console via COM1 Utilisez les touches fléchées pour naviguer entre ces options. 4 Assurez-vous qu'Activé avec redirection de console via COM1 est activé. 5 Activez la Redirection après démarrage (la valeur par défaut est Désactivée). Cette option active la redirection de console du BIOS à chaque redémarrage. 6 Enregistrez les modifications et quittez. 7 Le serveur géré redémarre.70 Configuration de CMC pour utiliser des consoles de ligne de commande Configuration de Windows pour la redirection de console série Aucune configuration n'est nécessaire pour les serveurs exécutant les versions de Microsoft Windows Server à partir de Windows Server 2003. Windows reçoit des informations du BIOS et active la console d'administration spéciale (SAC) un COM1. Configuration de Linux pour la redirection de console série du serveur pendant le démarrage Les étapes suivantes sont spécifiques au chargeur GRUB (GRand Unified Bootloader) de Linux. Il faudra faire des modifications du même type si vous utilisez un chargeur d'amorçage différent. REMARQUE : lorsque vous configurez la fenêtre d'émulation VT100 du client, définissez la fenêtre ou l'application qui affiche la console redirigée sur 25 lignes x 80 colonnes pour que le texte s'affiche correctement ; sinon, certains écrans de texte risquent d'être illisibles. Modifiez le fichier /etc/grub.conf de la manière suivante : 1 Localisez les sections relatives aux paramètres généraux dans le fichier et ajoutez les deux lignes suivantes : serial --unit=1 --speed=57600 terminal --timeout=10 serial 2 Ajoutez deux options à la ligne du noyau : noyau de la console=ttyS1,57600 3 Si le fichier /etc/grub.conf contient une instruction splashimage, transformez-la en commentaire. L'exemple suivant illustre les modifications décrites dans cette procédure. # grub.conf generated by anaconda # # Note that you do not have to rerun grub after making changes # to this file # NOTICE: You do not have a /boot partition. This means that # all kernel and initrd paths are relative to /, e.g. # root (hd0,0)Configuration de CMC pour utiliser des consoles de ligne de commande 71 # kernel /boot/vmlinuz-version ro root= /dev/sdal # initrd /boot/initrd-version.img # #boot=/dev/sda default=0 timeout=10 #splashimage=(hd0,2)/grub/splash.xpm.gz serial --unit=1 --speed=57600 terminal --timeout=10 serial title Red Hat Linux Advanced Server (2.4.9-e.3smp) root (hd0,0) kernel /boot/vmlinuz-2.4.9-e.3smp ro root= /dev/sda1 hda=ide-scsi console=ttyS0 console= ttyS1,57600 initrd /boot/initrd-2.4.9-e.3smp.img title Red Hat Linux Advanced Server-up (2.4.9-e.3) root (hd0,00) kernel /boot/vmlinuz-2.4.9-e.3 ro root=/dev/sda1 initrd /boot/initrd-2.4.9-e.3.img Lors de l'édition du fichier /etc/grub.conf, suivez les consignes suivantes : • Désactivez l'interface graphique de GRUB et utilisez l'interface texte. Dans le cas contraire, l'écran de GRUB ne s'affiche pas sur la redirection de console. Pour désactiver l'interface utilisateur, commentez la ligne commençant par splashimage. • Pour activer plusieurs options GRUB afin de démarrer les sessions de console via la connexion série, ajoutez la ligne suivante à toutes les options : console=ttyS1,57600 Dans l'exemple, console=ttyS1,57600 est ajouté à la première option uniquement.72 Configuration de CMC pour utiliser des consoles de ligne de commande Configuration de Linux pour la redirection de console série du serveur après l'amorçage Modifiez le fichier /etc/inittab de la manière suivante : • Ajoutez une nouvelle ligne pour configurer agetty sur le port série COM2 : co:2345:respawn:/sbin/agetty -h -L 57600 ttyS1 ansi L'exemple suivant montre le fichier avec la nouvelle ligne. # # inittab This file describes how the INIT process # should set up the system in a certain # run-level. # # Author: Miquel van Smoorenburg # Modified for RHS Linux by Marc Ewing and # Donnie Barnes # # Default runlevel. The runlevels used by RHS are: # 0 - halt (Do NOT set initdefault to this) # 1 - Single user mode # 2 - Multiuser, without NFS (The same as 3, if you # do not have networking) # 3 - Full multiuser mode # 4 - unused # 5 - X11 # 6 - reboot (Do NOT set initdefault to this) # id:3:initdefault: # System initialization. si::sysinit:/etc/rc.d/rc.sysinit l0:0:wait:/etc/rc.d/rc 0 l1:1:wait:/etc/rc.d/rc 1 l2:2:wait:/etc/rc.d/rc 2 l3:3:wait:/etc/rc.d/rc 3Configuration de CMC pour utiliser des consoles de ligne de commande 73 l4:4:wait:/etc/rc.d/rc 4 l5:5:wait:/etc/rc.d/rc 5 l6:6:wait:/etc/rc.d/rc 6 # Things to run in every runlevel. ud::once:/sbin/update # Trap CTRL-ALT-DELETE ca::ctrlaltdel:/sbin/shutdown -t3 -r now # When our UPS tells us power has failed, assume we have a few # minutes of power left. Schedule a shutdown for 2 minutes from now. # This does, of course, assume you have power installed and your # UPS is connected and working correctly. pf::powerfail:/sbin/shutdown -f -h +2 "Power Failure; System Shutting Down" # If power was restored before the shutdown kicked in, cancel it. pr:12345:powerokwait:/sbin/shutdown -c "Power Restored; Shutdown Cancelled" # Run gettys in standard runlevels co:2345:respawn:/sbin/agetty -h -L 57600 ttyS1 ansi 1:2345:respawn:/sbin/mingetty tty1 2:2345:respawn:/sbin/mingetty tty2 3:2345:respawn:/sbin/mingetty tty3 4:2345:respawn:/sbin/mingetty tty4 5:2345:respawn:/sbin/mingetty tty5 6:2345:respawn:/sbin/mingetty tty6 # Run xdm in runlevel 5 # xdm is now a separate service x:5:respawn:/etc/X11/prefdm -nodaemon74 Configuration de CMC pour utiliser des consoles de ligne de commande Modifiez le fichier /etc/securetty de la manière suivante : Ajoutez une nouvelle ligne avec le nom du tty série de COM2 : ttyS1 L'exemple suivant montre un fichier avec la nouvelle ligne. vc/1 vc/2 vc/3 vc/4 vc/5 vc/6 vc/7 vc/8 vc/9 vc/10 vc/11 tty1 tty2 tty3 tty4 tty5 tty6 tty7 tty8 tty9 tty10 tty11 ttyS1Utilisation de l'interface de ligne de commande RACADM 75 Utilisation de l'interface de ligne de commande RACADM L'utilitaire RACADM fournit une série de commandes qui vous permet de configurer de gérer CMC via une interface textuelle. L'utilitaire RACADM est accessible grâce à une connexion Telnet/SSH ou série, à l'aide de la console CMC Dell du module iKVM ou à distance à l'aide de l'interface de ligne de commande RACADM installée sur la station de gestion. L'interface RACADM est classée comme suit : REMARQUE : RACADM distant est inclus sur le DVD Dell Systems Management Tools and Documentation et est installé sur une station de gestion. • RACADM distant : permet l'exécution de commandes RACADM sur une station de gestion avec l'option -r et le nom DNS ou l'adresse IP de CMC. • Micrologiciel RACADM : permet de se connecter à CMC à l'aide d'une connexion Telnet, SSH, série ou du module iKVM. Le micrologiciel RACADM permet la mise en œuvre de RACADM (qui fait partie du micrologiciel CMC). Vous pouvez utiliser des commandes de RACADM distant dans des scripts pour configurer plusieurs contrôleurs CMC. CMC ne prend pas en charge les scripts de sorte que vous ne pouvez pas exécuter directement des scripts sur CMC. Pour plus d'informations sur la configuration de plusieurs contrôleurs CMC, voir « Configuration de plusieurs CMC dans plusieurs châssis », à la page 101. Utilisation d'une console série, Telnet ou SSH Vous pouvez ouvrir une session CMC via une connexion série ou Telnet/SSH, ou encore via la console Dell CMC du module iKVM. Pour la configuration d'un accès à distance ou en série à CMC, voir « Configuration de CMC pour utiliser des consoles de ligne de commande », à la page 61. Les options de sous-commandes couramment utilisées sont répertoriées dans la Figure 4-2. Une liste exhaustive des sous-commandes RACADM est répertoriée dans le chapitre Sous-commandes RACADM du RACADM Command Line Reference Guide for iDRAC6 and CMC (Guide de référence de la ligne de commande RACADM pour iDRAC6 et CMC).76 Utilisation de l'interface de ligne de commande RACADM Ouverture d'une session CMC Une fois le logiciel d'émulation de terminal et le BIOS du nœud géré de votre station de gestion configurés, effectuez les étapes suivantes pour ouvrir une session sur CMC : 1 Connectez-vous à CMC à l'aide du logiciel d'émulation de terminal de votre station de gestion. 2 Entrez votre nom d'utilisateur et votre mot de passe CMC, puis appuyez sur . Vous êtes connecté à CMC. Démarrage d'une console texte Vous pouvez ouvrir une session sur CMC via un réseau Telnet ou SSH, un port série ou la console Dell CMC de l'iKVM. Ouvrez une session Telnet ou SSH, connectez-vous et ouvrez une session sur CMC. Pour plus d'informations sur la connexion à CMC via le module iKVM, voir « Utilisation du module iKVM », à la page 387. Utilisation de la RACADM Les sous-commandes RACADM peuvent être exécutées à distance à partir de l'invite de commande d'une console série, Telnet ou SSH , ou d'une invite de commande normale. Utilisez les sous-commandes RACADM pour configurer les propriétés CMC et effectuer des tâches de gestion à distance. Pour afficher la liste des souscommandes RACADM, entrez : racadm help Utilisé sans option ou sous-commande, RACADM affiche des informations de syntaxe et des instructions sur la manière d'accéder aux sous-commandes et à l'aide. Pour obtenir la liste des options de syntaxe et de ligne de commande des différentes sous-commandes, entrez : racadm help Utilisation de l'interface de ligne de commande RACADM 77 Sous-commandes RACADM La Figure 4-1 fournit une liste abrégée des sous-commandes les plus courantes utilisées dans RACADM. Pour une liste exhaustive des souscommandes RACADM, comprenant la syntaxe et les entrées valides, consultez le chapitre Sous-commandes RACADM du RACADM Command Line Reference Guide for iDRAC6 and CMC (Guide de référence de la ligne de commande RACADM pour iDRAC6 et CMC). REMARQUE : la commande connect est disponible en tant que commande RACADM et en tant que commande CMC intégrée. Les commandes exit, quit et logout sont des commandes CMC intégrées, et non des commandes RACADM. Aucune de ces commandes ne peut être utilisée avec RACADM distant. Pour plus d'informations sur l'utilisation de ces commandes, voir « Connexion aux serveurs ou aux modules d'E/S à l'aide de la commande Connect », à la page 67. Tableau 4-1. Sous-commandes RACADM Commande Description help Répertorie les descriptions des sous-commandes CMC. help Répertorie une synthèse de l'utilisation de la souscommande spécifiée. ? Répertorie les descriptions des sous-commandes CMC. ? Répertorie une synthèse de l'utilisation de la souscommande spécifiée. arp Affiche le contenu de la table ARP. Les entrées de la table ARP ne peuvent être ni ajoutées, ni supprimées. chassisaction Exécute les opérations power-up, power-down, reset et power-cycle sur le châssis, le commutateur et le module KVM. closessn Ferme une session. clrraclog Efface le journal CMC et crée une entrée unique qui indique l'utilisateur et l'heure d'effacement du journal. clrsel Efface les entrées du journal des événements système. cmcchangeover Modifie l'état de CMC d'actif à veille ou vice versa, dans les environnements CMC redondants. config Configure CMC.78 Utilisation de l'interface de ligne de commande RACADM connect Se connecte à la console série d'un serveur ou d'un module d'E/S. Voir « Connexion aux serveurs ou aux modules d'E/S à l'aide de la commande Connect », à la page 67 pour obtenir de l'aide pour l'utilisation de la sous-commande connect. deploy Déploie un serveur en spécifiant les propriétés requises. feature Affiche les fonctionnalités actives et non actives. featurecard Affiche des informations sur l'état de la carte de fonction. fwupdate Effectue des mises à jour du micrologiciel de composant du système et affiche l'état de la mise à jour. getassettag Affiche le numéro d'inventaire du châssis. getchassisname Affiche le nom du châssis. getconfig Affiche les propriétés de configuration CMC actuelles. getdcinfo Affiche les informations générales relatives aux défaillances de configuration du module d'E/S et de la carte fille. getfanreqinfo Affiche les requêtes du ventilateur pour les serveurs et les commutateurs dans %. getflexaddr Affiche l'état activé/désactivé de la fonctionnalité FlexAddress en fonction de la relation emplacement/structure. Si elle est utilisée avec l'option -i, la commande affiche l'adresse WWN et MAC d'un emplacement spécifique. getioinfo Affiche des informations générales relatives au module d'E/S. getkvminfo Affiche des informations concernant le module iKVM. getled Affiche les paramètres des LED d'un module. getmacaddress Affiche l'adresse MAC d'un serveur. getmodinfo Affiche les informations de configuration et de condition d'un module. getniccfg Affiche la configuration IP actuelle du contrôleur. getpbinfo Affiche des informations sur la condition du bilan de puissance. Tableau 4-1. Sous-commandes RACADM (suite) Commande DescriptionUtilisation de l'interface de ligne de commande RACADM 79 getpminfo Affiche des informations sur la condition de la gestion d'alimentation. getraclog Affiche le journal CMC. getractime Affiche l'heure CMC. getredundancymode Affiche le mode de redondance CMC. getsel Affiche le journal des événements système (journal du matériel). getsensorinfo Affiche des informations concernant les capteurs du système. getslotname Affiche le nom d'un logement du châssis. getssninfo Affiche des informations sur les sessions actives. getsvctag Affiche les numéros de service. getsysinfo Affiche des informations générales concernant CMC et le système. gettracelog Affiche le journal CMCtrace. Si elle est utilisée avec l'option -i, la commande affiche le nombre d'entrées du journal de suivi CMC. getversion Affiche la version actuelle du logiciel, les informations sur le modèle et indique si le périphérique peut être mis à jour. ifconfig Affiche la configuration IP CMC actuelle. krbkeytabupload Téléverse un keytab Kerberos dans CMC. netstat Affiche la table de routage et les connexions actuelles. ping Vérifie que l'adresse IPv4 de destination est accessible à partir de CMC avec le contenu actuel du tableau de routage. ping6 Vérifie que l'adresse IPv6 de destination est accessible à partir de CMC avec le contenu actuel du tableau de routage. racdump Affiche l'état du châssis complet, des informations sur l'état de configuration, ainsi que des journaux d'événements de l'historique. Utilisée pour vérifier la configuration après le déploiement et pendant les sessions de débogage. racreset Réinitialise CMC. Tableau 4-1. Sous-commandes RACADM (suite) Commande Description80 Utilisation de l'interface de ligne de commande RACADM racresetcfg Restaure la configuration CMC par défaut. remoteimage Connecte, déconnecte ou déploie un fichier de média sur un serveur distant. serveraction Effectue des opérations de gestion de l'alimentation sur le système géré. setassettag Définit le numéro d'inventaire du châssis. setchassisname Définit le nom du châssis. setflexaddr Active/désactive FlexAddress sur un emplacement/structure spécifique, lorsque la fonctionnalité FlexAddress est activée sur le châssis. setled Définit les paramètres des LED d'un module. setniccfg Définit la configuration IP du contrôleur. setractime Définit l'heure CMC. setslotname Définit le nom d'un logement dans le châssis. setsysinfo Définit le nom et l'emplacement du châssis. sshpkauth Téléverse jusqu'à 6 différentes clés SSH publiques, supprime des clés existantes et affiche les clés déjà existantes dans CMC. sslcertdownload Télécharge un certificat signé par une autorité de certification. sslcertupload Téléverse un certificat signé par une autorité de certification ou un certificat de serveur vers CMC. sslcertview Affiche un certificat signé par une autorité de certification ou un certificat de serveur dans CMC. sslcsrgen Génère et télécharge la RSC SSL. sslresetcfg Restaure le certificat auto-signé utilisé par l'interface utilisateur Web CMC. testemail Force CMC à envoyer un e-mail en passant par le NIC de CMC. Tableau 4-1. Sous-commandes RACADM (suite) Commande DescriptionUtilisation de l'interface de ligne de commande RACADM 81 Accès à distance à RACADM testfeature Vous permet de vérifier les paramètres de configuration d'une fonctionnalité donnée. Par exemple, il prend en charge le test de la configuration Active Directory avec l'authentification simple (nom d'utilisateur et mot de passe) ou l'authentification Kerberos (connexion directe ou ouverture de session par carte à puce). testtrap Force CMC à envoyer une alerte SNMP via la carte d'interface réseau CMC. traceroute Imprime le trajet emprunté par les paquets IPv4 vers un nœud réseau. traceroute6 Imprime le trajet emprunté par les paquets IPv6 vers un nœud réseau. Tableau 4-2. Options des sous-commandes de RACADM distant Option Description -r -r : Spécifie l'adresse IP distante du contrôleur. Utilisez lorsque le numéro de port CMC n'est pas le port par défaut (443). -i Indique à RACADM de demander le nom d'utilisateur et le mot de passe à l'utilisateur de manière interactive. -u Spécifie le nom d'utilisateur qui est utilisé pour authentifier la transaction de commande. Lorsque l'option -u est utilisée, l'option -p doit l'être également et l'option -i (interactive) n'est pas autorisée. -p Spécifie le mot de passe utilisé pour authentifier la transaction de commande. Si l'option -p est utilisée, l'option -i n'est pas autorisée. Tableau 4-1. Sous-commandes RACADM (suite) Commande Description82 Utilisation de l'interface de ligne de commande RACADM Pour accéder à distance à RACADM, entrez les commandes suivantes : racadm -r -u -p racadm -i -r REMARQUE : l'option -i ordonne à RACADM de demander le nom d'utilisateur et le mot de passe de manière interactive. Sans l'option -i, vous devez indiquer le nom d'utilisateur et le mot de passe dans la commande à l'aide des options -u et -p. Par exemple : racadm -r 192.168.0.120 -u root -p calvin getsysinfo racadm -i -r 192.168.0.120 getsysinfo Si le numéro de port HTTPS CMC a été remplacé par un port personnalisé autre que le port par défaut (443), la syntaxe suivante doit être utilisée : racadm -r : -u -p racadm -i -r : Activation et désactivation de la fonctionnalité distante de RACADM REMARQUE : Dell recommande l'exécution de ces commandes sur le châssis. La fonctionnalité distante de RACADM est activée par défaut sur CMC. Dans les commandes suivantes, l'option -g précise le groupe de configuration auquel appartient l'objet et l'option -o précise l'objet de configuration à configurer. Pour désactiver la fonctionnalité distante de RACADM, entrez : racadm config -g cfgRacTuning -o cfgRacTuneRemoteRacadmEnable 0 Pour réactiver la fonctionnalité distante de RACADM\, entrez : racadm config -g cfgRacTuning -o cfgRacTuneRemoteRacadmEnable 1Utilisation de l'interface de ligne de commande RACADM 83 Utilisation de RACADM à distance REMARQUE : configurez l'adresse IP de CMC avant d'utiliser la fonctionnalité distante de RACADM. Pour plus d'informations sur la configuration de CMC, voir « Installation et configuration de CMC », à la page 33. L'option distante (-r) de la console RACADM vous permet de vous connecter au système géré et d'exécuter des sous-commandes RACADM à partir d'une console ou d'une station de gestion distante. Pour utiliser la capacité distante, vous avez besoin d'un nom d'utilisateur (option -u) et d'un mot de passe (option -p) valides, ainsi que de l'adresse IP de CMC. Avant d'essayer d'accéder à distance à RACADM, vérifiez que vous disposez des autorisations nécessaires. Pour afficher vos privilèges utilisateur, entrez : racadm getconfig -g cfguseradmin -i n où n est votre Réf. utilisateur (1 à 16). Si vous ne connaissez pas votre Réf. utilisateur, essayez différentes valeurs pour n. REMARQUE : la fonctionnalité distante de RACADM est uniquement prise en charge sur les stations de gestion via un navigateur pris en charge. Pour des informations supplémentaires, consultez la section Navigateurs pris en charge de la Matrice de prise en charge des logiciels des systèmes Dell sur le site Web du support de Dell à l'adresse support.dell.com/manuals. REMARQUE : pour utiliser la fonctionnalité distante de RACADM, vous devez posséder un droit d'écriture pour les dossiers sur lesquels vous exécutez des souscommandes RACADM impliquant des opérations sur les fichiers. Par exemple : racadm getconfig -f -r or racadm sslcertupload -t 1 -f c:\cert\cert.txt Lorsque vous utilisez RACADM distant pour capturer les groupes de configuration dans un fichier, si aucune propriété de clé n'est définie dans un groupe, le groupe de configuration n'est pas enregistré en tant qu'élément du fichier de configuration. Si ces groupes de configuration doivent être clonés sur d'autres contrôleurs CMC, la propriété de clé doit être définie avant l'exécution de la commande getconfig -f. Sinon, vous pouvez saisir manuellement les propriétés manquantes dans le fichier de configuration après avoir exécuté la commande getconfig -f. Ceci s'applique à tous les groupes racadm indexés. 84 Utilisation de l'interface de ligne de commande RACADM La liste suivante répertorie les groupes indexés qui présentent ce comportement ainsi que leurs propriétés de clé correspondantes : cfgUserAdmin - cfgUserAdminUserName cfgEmailAlert - cfgEmailAlertAddress cfgTraps - cfgTrapsAlertDestIPAddr cfgStandardSchema - cfgSSADRoleGroupName cfgServerInfo - cfgServerBmcMacAddress Messages d'erreur RACADM Pour des informations concernant les messages d'erreur de l'interface de ligne de commande RACADM, voir « Dépannage », à la page 109. Utilisation de RACADM pour la configuration CMC REMARQUE : pour la configuration initiale du CMC, vous devez être connecté en tant qu'utilisateur root pour exécuter des commandes RACADM sur un système distant. Un autre utilisateur doté de privilèges permettant la configuration du CMC peut être créé. L'interface Web CMC permet de configurer rapidement CMC (voir « Utilisation de l'interface Web de CMC », à la page 111). Toutefois, si vous préférez la configuration par ligne de commande ou script, ou si vous devez configurer plusieurs contrôleurs CMC, utilisez RACADM distant installé avec les agents CMC sur la station de gestion. Configuration des propriétés du réseau CMC Avant de commencer à configurer CMC, vous devez configurer les paramètres réseau CMC afin de permettre la gestion à distance de CMC. Cette configuration initiale définit les paramètres de mise en réseau TCP/IP qui permettent l'accès à CMC.Utilisation de l'interface de ligne de commande RACADM 85 Configuration de l'accès initial à CMC Cette section explique comment exécuter la configuration réseau initiale CMC à l'aide des commandes RACADM. Toutes les opérations de configuration décrites dans cette section peuvent être effectuées à l'aide de l'écran LCD du panneau avant. Voir « Configuration de la mise en réseau à l'aide de l'Assistant Configuration de l'écran LCD », à la page 46. PRÉCAUTION : la modification des paramètres sur l'écran Paramètres réseau CMC peut entraîner la déconnexion de votre connexion réseau actuelle. Pour des informations supplémentaires sur les sous-commandes réseau, voir les sections Sous-commandes RACADM et Définitions des groupes et des objets de la base de données des propriétés du Guide de référence de la ligne de commande RACADM pour iDRAC et CMC. REMARQUE : vous devez disposer de privilèges Administrateur de configuration du châssis pour configurer les paramètres réseau CMC. CMC prend en charge les modes d'adressage IPv4 et IPv6. Les paramètres de configuration pour IPv4 et IPv6 sont indépendants les uns des autres. Affichage des paramètres réseau IPv4 actuels Pour afficher un résumé des paramètres du NIC, DHCP, de vitesse réseau et du mode duplex, entrez : racadm getniccfg or racadm getconfig -g cfgCurrentLanNetworking Affichage des paramètres réseau IPv6 actuels Pour afficher un résumé des paramètres réseau, entrez : racadm getconfig -g cfgIpv6LanNetworking Pour afficher les informations sur l'adressage IPv4 et IPv6 correspondant au type de châssis : racadm getsysinfo Par défaut, CMC demande et obtient automatiquement une adresse IP auprès du serveur DHCP (Protocole de configuration dynamique des hôtes). Vous pouvez désactiver cette fonctionnalité et préciser l'adresse IP statique de CMC, la passerelle et le masque de sous-réseau.86 Utilisation de l'interface de ligne de commande RACADM Pour désactiver DHCP et préciser l'adresse IP statique de CMC, la passerelle et le masque de sous-réseau, entrez : racadm config -g cfgLanNetworking -o cfgNicUseDHCP 0 racadm config -g cfgLanNetworking -o cfgNicIpAddress racadm config -g cfgLanNetworking -o cfgNicGateway racadm config -g cfgLanNetworking -o cfgNicNetmask Affichage des paramètres réseau actuels Pour afficher un résumé des paramètres de NIC, DHCP, de vitesse réseau et du mode duplex, entrez : racadm getniccfg or racadm getconfig -g cfgCurrentLanNetworking Pour afficher l'adresse IP et les informations DHCP, d'adresse MAC et du DNS pour le châssis, entrez : racadm getsysinfo Configuration des paramètres du réseau local REMARQUE : pour effectuer les étapes suivantes, vous devez disposer des privilèges Administrateur de configuration du châssis. REMARQUE : les paramètres du réseau local tels que, la chaîne de communauté et l'adresse IP du serveur SMTP, affectent CMC et les paramètres externes du châssis. REMARQUE : si vous avez deux contrôleurs CMC (actif et veille) sur le châssis, et qu'ils sont connectés au réseau, le contrôleur CMC en veille acquiert automatiquement les paramètres réseau du contrôleur CMC actif en cas de basculement. REMARQUE : lorsque IPv6 est activé au moment du démarrage, trois demandes de routeur sont envoyées toutes les quatre secondes. Si des commutateurs réseau externes exécutent le protocole Spanning Tree (SPT), les ports du commutateur externe peuvent être bloqués pendant plus de douze secondes pendant lesquelles les demandes de routeur IPv6 sont envoyées. Dans de tels cas, la connectivité IPv6 peut être limitée jusqu'à ce que des annonces de routeur soient gratuitement envoyées par les routeurs IPv6.Utilisation de l'interface de ligne de commande RACADM 87 Activation de l'interface réseau CMC Pour activer / désactiver l'interface réseau CMC pour IPv4 et IPv6, entrez : racadm config -g cfgLanNetworking -o cfgNicEnable 1 racadm config -g cfgLanNetworking -o cfgNicEnable 0 REMARQUE : le NIC de CMC est activé par défaut. Pour activer/désactiver l'adressage IPv4 de CMC, entrez : racadm config -g cfgLanNetworking -o cfgNicIPv4Enable 1 racadm config -g cfgLanNetworking -o cfgNicIPv4Enable 0 REMARQUE : l'adressageIPv4 de CMC est activé par défaut. Pour activer/désactiver l'adressage IPv6 de CMC, entrez : racadm config -g cfgIpv6LanNetworking -o cfgIPv6Enable 1 racadm config -g cfgIpv6LanNetworking -o cfgIPv6Enable 0 REMARQUE : l'adressage IPv6 de CMC est désactivé par défaut. par défaut, pour IPv4, CMC demande et obtient automatiquement une adresse IP CMC auprès du serveur DHCP (protocole de configuration dynamique des hôtes). Vous pouvez désactiver la fonctionnalité DHCP et préciser l'adresse IP CMC statique, la passerelle et le masque de sous-réseau. Dans le cas d'un réseau iPv4, pour désactiver DHCP et préciser l'adresse IP statique de CMC, la passerelle et le masque de sous-réseau, entrez : racadm config -g cfgLanNetworking -o cfgNicUseDhcp 0 racadm config -g cfgLanNetworking -o cfgNicIpAddress racadm config -g cfgLanNetworking -o cfgNicGateway racadm config -g cfgLanNetworking -o cfgNicNetmask Par défaut, pour IPv6, CMC demande et obtient automatiquement une adresse IP CMC auprès du mécanisme de configuration automatique IPv6.88 Utilisation de l'interface de ligne de commande RACADM Dans le cas d'un réseau IPv6, pour désactiver la fonctionnalité Configuration automatique et spécifier une adresse IPv6 CMC statique, une passerelle et une longueur de préfixe, entrez : racadm config -g cfgIPv6LanNetworking -o cfgIPv6AutoConfig 0 racadm config -g cfgIPv6LanNetworking -o cfgIPv6Address racadm config -g cfgIPv6LanNetworking -o cfgIPv6PrefixLength 64 racadm config -g cfgIPv6LanNetworking -o cfgIPv6Gateway Activation ou désactivation de DHCP pour l'adresse d'interface réseau CMC Lorsqu'elle est activée, la fonctionnalité du protocole DHCP pour l'adresse IP du NIP de CMC demande et obtient automatiquement une adresse IP auprès du serveur DHCP (protocole de configuration dynamique des hôtes). Cette fonctionnalité est activée par défaut. Vous pouvez désactiver la fonctionnalité DHCP pour l'adresse du NIC et préciser une adresse IP statique, un masque de sous-réseau et une passerelle. Pour plus d'informations, voir « Configuration de l'accès initial à CMC », à la page 85. Activation ou désactivation du protocole DHCP pour les adresses IP du DNS La fonctionnalité d'utilisation du protocole DHCP pour l'adresse du DNS de CMC est désactivée par défaut. Lorsqu'elle est activée, cette fonctionnalité obtient les adresses principale et secondaire du serveur DNS auprès du serveur DHCP. En utilisant cette fonctionnalité, vous n'avez pas à configurer d'adresses IP statiques pour le serveur DNS. Pour désactiver la fonctionnalité d'utilisation du protocole DHCP pour les adresses de DNS et spécifier les adresses statiques préférées et alternatives du serveur DNS, entrez : racadm config -g cfgLanNetworking -o cfgDNSServersFromDHCP 0 Pour désactiver la fonctionnalité d'utilisation du protocole DHCP pour les adresses de DNS et spécifier les adresses statiques préférées et alternatives du serveur DNS, entrez : racadm config -g cfgIPv6LanNetworking -o cfgIPv6DNSServersFromDHCP6 0 Utilisation de l'interface de ligne de commande RACADM 89 Définition des adresses IP statiques du DNS REMARQUE : les paramètres des adresses IP de DNS statique ne sont pas valides tant que la fonction adresse DNS pour DCHP est désactivée. Pour IPv4, pour définir les adresses IP préférées principale et secondaire du serveur DNS, entrez : racadm config -g cfgLanNetworking -o cfgDNSServer1 racadm config -g cfgLanNetworking -o cfgDNSServer2 Pour IPv6, pour définir les adresses IP préférées principale et secondaire du serveur DNS, entrez : racadm config -g cfgIPv6LanNetworking -o cfgIPv6DNSServer1 racadm config -g cfgIPv6LanNetworking -o cfgIPv6DNSServer2 Configuration des paramètres DNS (IPv4 et IPv6) • Enregistrement CMC : pour enregistrer CMC sur le serveur DNS, entrez : racadm config -g cfgLanNetworking -o cfgDNSRegisterRac 1 REMARQUE : certains serveurs DNS ne peuvent enregistrer que des noms de 31 caractères maximum. Assurez-vous que le nom désigné se trouve dans la limite DNS requise. REMARQUE : les paramètres suivants ne sont valides que si vous avez enregistré CMC sur le serveur DNS en définissant la variable cfgDNSRegisterRac sur la valeur 1. • Nom CMC : par défaut, le nom CMC sur le serveur DNS est cmc- . Pour modifier le nom CMC sur le serveur DNS, entrez : racadm config -g cfgLanNetworking -o cfgDNSRacName (nom) est une chaîne de jusqu'à 63 caractères alphanumériques et traits d'union. Par exemple, cmc-1 ou d-345.90 Utilisation de l'interface de ligne de commande RACADM • Nom de domaine DNS : Le nom de domaine DNS par défaut contient un espace unique. Pour définir un nom de domaine DNS, entrez : racadm config -g cfgLanNetworking -o cfgDNSDomainName (nom) est une chaîne de jusqu'à 254 caractères alphanumériques et traits d'union. Par exemple : p45, a-tz-1 ou r-id-001. Configuration de l'auto-négociation, du mode duplex et de la vitesse du réseau (IPv4 et IPv6) Lorsqu'elle est activée, la fonctionnalité Négociation automatique détermine si CMC définit automatiquement le mode duplex et la vitesse réseau en entrant en communication avec le routeur ou le commutateur le plus proche. La négociation automatique est activée par défaut. Vous pouvez désactiver la négociation automatique et préciser le mode duplex et la vitesse réseau en tapant : racadm config -g cfgNetTuning -o cfgNetTuningNicAutoneg 0 racadm config -g cfgNetTuning -o cfgNetTuningNicFullDuplex or est égal à 0 (semi duplex) ou 1 (duplex total, valeur par défaut) racadm config -g cfgNetTuning -o cfgNetTuningNicSpeed où : is 10 or 100(default).> correspond à 10 ou 100 (par défaut).Utilisation de l'interface de ligne de commande RACADM 91 Configuration du VLAN CMC (IPv4 et IPv6) 1 Activez les fonctions VLAN du réseau de gestion du châssis externe : racadm config -g cfgLanNetworking -o cfgNicVLanEnable 1 2 Spécifiez le N° VLAN pour le réseau de gestion du châssis externe : racadm config -g cfgLanNetworking -o cfgNicVlanID Les valeurs valides pour sont comprises entre 1– 4000 et 4021– 4094. La valeur par défaut est 1. Par exemple : racadm config -g cfgLanNetworking -o cfgNicVlanID 1 3 Spécifiez ensuite la priorité VLAN pour le réseau de gestion du châssis externe : racadm config -g cfgLanNetworking -o cfgNicVLanPriority Les valeurs valides pour vont de 0 à 7. La valeur par défaut est 0. Par exemple : racadm config -g cfgLanNetworking -o cfgNicVLanPriority 7 Vous pouvez également spécifier l'ID du VLAN et la priorité VLAN avec une seule commande : racadm setniccfg -v Par exemple : racadm setniccfg -v 1 792 Utilisation de l'interface de ligne de commande RACADM Suppression du VLAN de CMC Pour supprimer le VLAN de CMC, désactivez les fonctions VLAN du réseau de gestion du châssis externe : racadm config -g cfgLanNetworking -o cfgDNSServersFromDHCP cfgNicVLanEnable 0 Vous pouvez également supprimer le VLAN de CMC en utilisant la commande suivante : racadm setniccfg -v Configuration d'un VLAN de serveur Spécifiez l'ID de VLAN et la priorité d'un serveur particulier avec la commande suivante : racadm setniccfg -m server- -v Les valeurs valides pour sont comprises entre 1 et 16. Les valeurs valides pour sont comprises entre 1– 4000 et 4021– 4094. La valeur par défaut est 1. Les valeurs valides pour sont comprises entre 0 et 7. La valeur par défaut est 0. Par exemple : racadm setniccfg -m server-1 -v 1 7 Suppression d'un VLAN de serveur Pour supprimer un VLAN de serveur, désactivez les fonctions VLAN du réseau du serveur spécifié : racadm setniccfg -m server- -v Les valeurs valides pour sont comprises entre 1 et 16. Par exemple : racadm setniccfg -m server-1 -vUtilisation de l'interface de ligne de commande RACADM 93 Configuration de l'unité de transmission maximale (MTU) (IPv4 et IPv6) La propriété MTU permet la définition d'une limite de taille pour les paquets pouvant être transmis via l'interface. Pour définir cette propriété MTU, entrez : racadm config -g cfgNetTuning -o cfgNetTuningMtu est une valeur comprise entre 576 et 1 500 (inclus). La valeur par défaut est 1 500. REMARQUE : IPv6 requiert une MTU minimale de 1 280. Si IPv6 est activé et que cfgNetTuningMtu est défini sur une valeur inférieure, CMC utilisera une MTU de 1 280. Configuration de l'adresse IP du serveur SMTP (IPv4 et IPv6) Vous pouvez activer CMC pour l'envoi d'alertes par e-mail via le protocole SMTP (Simple Mail Transfer Protocol) vers une adresse IP spécifiée. Pour activer cette fonctionnalité, entrez : racadm config -g cfgRemoteHosts -o cfgRhostsSmtpServerIpAddr est l'adresse IP du serveur SMTP du réseau. REMARQUE : si votre réseau dispose d'un serveur SMTP qui diffuse et renouvelle périodiquement les baux d'adresses IP et si les adresses sont différentes, alors ce paramètre de propriété ne fonctionne pas pendant un certain temps en raison des modifications apportées à l'adresse IP spécifiée du serveur SMTP. Si c'est le cas, utilisez le nom DNS. Configuration des paramètres de sécurité réseau (IPv4 uniquement) Pour effectuer les étapes suivantes, vous devez disposer des privilèges Administrateur de configuration du châssis. Activation de la vérification de plage d'adresses IP (IPv4 uniquement) Le filtrage IP compare l'adresse IP d'une ouverture de session entrante à la plage d'adresses IP qui est spécifiée dans les propriétés cfgRacTuning suivantes : • cfgRacTuneIpRangeAddr • cfgRacTuneIpRangeMask94 Utilisation de l'interface de ligne de commande RACADM L'ouverture de session à partir de l'adresse IP entrante est autorisée uniquement si les deux éléments suivants sont identiques : • cfgRacTuneIpRangeMask au niveau du bit et avec une adresse IP entrante • cfgRacTuneIpRangeMask au niveau du bit et avec cfgRacTuneIpRangeAddr Utilisation de RACADM pour la configuration des utilisateurs Vous pouvez configurer jusqu'à 16 utilisateurs dans la base de données de propriétés CMC. Avant d'activer manuellement un utilisateur CMC, vérifiez s'il existe des utilisateurs actuels. Si vous configurez un nouveau contrôleur CMC ou avez exécuté la commande racresetcfgde de RACADM, le seul utilisateur actuel est root, avec le mot de passe calvin. La sous-commande racresetcfg restaure les paramètres CMC par défaut d'origine. PRÉCAUTION : utilisez la commande racresetcfg avec précaution car elle restaure les valeurs par défaut de tous les paramètres de configuration. Toute modification précédente est perdue. REMARQUE : les utilisateurs peuvent être activés et désactivés au fil du temps ; la désactivation d'un utilisateur ne le supprime pas de la base de données. Pour vérifier si un utilisateur existe, ouvrez une console textuelle Telnet / SSH sur CMC, connectez-vous et entrez la commande suivante une fois pour chaque indice compris entre 1 et 16 : racadm getconfig -g cfgUserAdmin -i Plusieurs paramètres et références d'objet sont affichés avec leurs valeurs actuelles. Les deux objets d'intérêt sont : # cfgUserAdminIndex=XX cfgUserAdminUserName= Si l'objet cfgUserAdminUserName n'a pas de valeur, ce numéro d'index, indiqué par l'objet cfgUserAdminIndex, peut être utilisé. Si un nom suit le signe « = », l'index est pris par ce nom d'utilisateur.Utilisation de l'interface de ligne de commande RACADM 95 REMARQUE : lorsque vous activez ou désactivez manuellement un utilisateur avec la sous-commande racadm config, vous devez spécifier l'index via l'option -i. L'objet cfgUserAdminIndex affiché dans l'exemple précédent contient un caractère « # ». De même, si vous utilisez la commande racadm config -f racadm.cfg pour spécifier un nombre quelconque de groupes/objets à écrire, l'index ne peut pas être spécifié. Un nouvel utilisateur est ajouté au premier index disponible. Ce comportement permet une plus grande flexibilité dans la configuration d'un second contrôleur CMC possédant les mêmes paramètres que le contrôleur CMC principal. Ajout d'un utilisateur CMC Quelques commandes élémentaires sont disponibles pour ajouter un nouvel utilisateur à la configuration CMC. Procédez comme suit : 1 Définissez le nom d'utilisateur. 2 Définissez le mot de passe. 3 Définissez les privilèges utilisateur. Pour des informations sur les privilèges utilisateur, voir la Figure 5-42 et la Figure 5-43. 4 Activez l'utilisateur. Exemple L'exemple suivant décrit comment ajouter un nouvel utilisateur appelé « Jean » avec un mot de passe « 123456 » et des privilèges d'ouverture de session CMC. REMARQUE : consultez le tableau 3-1 du chapitre Propriétés de la base de données du Guide de référence de la ligne de commande RACADM pour iDRAC6 et CMC pour une liste des valeurs de masque binaire valides correspondant à des privilèges d'utilisateur spécifiques. La valeur de privilège par défaut est 0, indiquant que l'utilisateur n'a aucun privilège activé. racadm config -g cfgUserAdmin -o cfgUserAdminUserName -i 2 john racadm config -g cfgUserAdmin -o cfgUserAdminPassword -i 2 123456 racadm config -g cfgUserAdmin -i 2 -o cfgUserAdminPrivilege 0x00000001 racadm config -g cfgUserAdmin -i 2 -o cfgUserAdminEnable 1 Pour vérifier qu'un utilisateur a bien été ajouté avec les privilèges corrects, utilisez la commande suivante : racadm getconfig -g cfgUserAdmin -i 296 Utilisation de l'interface de ligne de commande RACADM Utilisation de RACADM pour configurer l'authentification par clé publique sur SSH Vous pouvez configurer jusqu'à 6 clés publiques pouvant être utilisées avec le nom d'utilisateur du service sur l'interface SSH. Avant d'ajouter ou de supprimer des clés publiques, veillez à utiliser la commande view pour voir les clés qui sont déjà configurées afin de ne pas écraser ou supprimer une clé accidentellement. Le nom d'utilisateur du service est un compte d'utilisateur spécial qui peut être utilisé lors de l'accès à CMC via SSH. Lorsque le PKA sur SSH est installé et utilisé correctement, vous ne devez pas entrer un nom d'utilisateur ou un mot de passe pour vous connecter à CMC. Cela peut être très utile pour créer des scripts automatisés afin d'exécuter des fonctions différentes. Lorsque vous êtes prêt à configurer cette fonctionnalité, tenez compte des points suivants : • l'interface utilisateur n'est pas prise en charge pour la gestion de cette fonctionnalité ; vous ne pouvez utiliser que RACADM. • Lorsque vous ajoutez des clés publiques, vérifiez que les clés existantes ne figurent pas déjà dans l'index dans lequel la nouvelle clé est ajoutée. CMC n'effectue aucun contrôle pour vérifier que les clés précédentes sont bien supprimées avant l'ajout d'une nouvelle clé. Dès qu'une nouvelle clé est ajoutée, elle est automatiquement effective tant que l'interface SSH est activée. • Lorsque vous utilisez la section de commentaire de la clé publique, n'oubliez pas que seuls les 16 premiers caractères sont utilisés par CMC. Le commentaire de la clé publique est utilisé par CMC pour différencier les utilisateurs SSH lors de l'utilisation de la commande getssninfo RACADM car tous les utilisateurs PKA utilisent le nom d'utilisateur du service pour ouvrir une session. Par exemple, si deux clés publiques sont configurées, l'une avec le commentaire PC1 et l'autre avec le commentaire PC2 : racadm getssninfo Type User IP Address Login Date/Time SSH PC1 x.x.x.x 06/16/2009 09:00:00 SSH PC2 x.x.x.x 06/16/2009 09:00:00 Pour des informations supplémentaires sur la commande sshpkauth, voir le Guide de référence de la ligne de commande RACADM pour iDRAC6 et CMC.Utilisation de l'interface de ligne de commande RACADM 97 Génération de clés publiques pour Windows Avant l'ajout d'un compte, le système qui accèdera à CMC sur SSH nécessite une clé publique. Deux méthodes sont possibles pour générer la paire de clés publique/privée : utiliser l'application PuTTY Key Generator pour les clients exécutant Windows ou la CLI ssh-keygen pour les clients exécutant Linux. Cette section donne des instructions simples pour générer une paire de clés publique/privée pour les deux applications. Pour une utilisation supplémentaire ou avancée de ces outils, consultez l'Aide de l'application. Pour utiliser PuTTY Key Generator pour les clients Windows afin de créer la clé de base : 1 Démarrez l'application et sélectionnez SSH-2 RSA ou SSH-2 DSA comme type de clé à générer (SSH-1 n'est pas pris en charge). 2 Saisissez le nombre de bits de la clé. Ce nombre doit être compris entre 768 et 4 096. REMARQUE : CMC peut ne pas afficher de message si vous ajoutez des clés de moins de 768 bits ou de plus de 4 096 bits, mais lorsque vous essaierez d'ouvrir une session avec ces clés, vous échouerez. 3 Cliquez sur Générer et déplacez la souris dans la fenêtre en suivant les instructions. Une fois la clé créée, vous pouvez modifier le champ Commentaire de la clé. Vous pouvez également saisir une phrase de passe pour sécuriser la clé. Veillez à bien enregistrer la clé privée. 4 Vous pouvez utiliser la clé publique de deux façons : • enregistrer la clé publique dans un fichier à téléverser ultérieurement. • copier/coller le texte de la fenêtre Clé publique à coller lorsque vous ajoutez le compte à l'aide de l'option de texte98 Utilisation de l'interface de ligne de commande RACADM Génération de clés publiques pour Linux L'application ssh-keygen pour les clients Linux est un outil de ligne de commande sans interface utilisateur graphique. Ouvrez une fenêtre de terminal et entrez, à l'invite shell : ssh-keygen –t rsa –b 1024 –C testing où L'option –t doit être dsa ou rsa. l'option –b spécifie la taille du cryptage binaire entre 768 et 4 096. l'option –C permet de modifier le commentaire de la clé publique et est facultative. la est facultative. Lorsque la commande s'est exécutée, utilisez le fichier public pour passer à RACADM en vue du téléversement du fichier. Notes de syntaxe RACADM pour CMC Lorsque vous utilisez la commande racadm sshpkauth, vérifiez les points suivants : • Pour l'option –i, le paramètre doit être svcacct. Tous les autres paramètres pour -i échouent dans CMC. Le svcacct est un compte spécial pour l'authentification à clé publique sur SSH dans CMC. • Pour se connecter à CMC, l'utilisateur doit être service. Les utilisateurs des autres catégories ont accès aux clés publiques entrées en utilisant la commande sshpkauth. Affichage des clés publiques Pour afficher les clés publiques que vous avez ajoutées à CMC, entrez : racadm sshpkauth –i svcacct –k all –v Pour afficher une seule clé à la fois, remplacez all par un nombre compris entre 1 et 6. Par exemple, pour afficher la clé 2, entrez : racadm sshpkauth –i svcacct –k 2 –vUtilisation de l'interface de ligne de commande RACADM 99 Ajout des clés publiques Pour ajouter une clé publique à CMC à l'aide des options de téléversement de fichier -f, entrez : racadm sshpkauth –i svcacct –k 1 –p 0xfff –f REMARQUE : vous pouvez uniquement utiliser l'option de téléversement de fichier avec RACADM distant. Pour plus d'informations, voir « Accès à distance à RACADM », à la page 81 et les sections suivantes. Pour obtenir des privilèges de clé publique, reportez-vous au Tableau 3-1 du chapitre sur les propriétés de la base de données du Guide de référence de la ligne de commande RACADM pour iDRAC6 et CMC. Pour ajouter une clé publique à l'aide de l'option de téléversement de texte, entrez : racadm sshpkauth –i svcacct –k 1 –p 0xfff –t “” Suppression des clés publiques Pour supprimer une clé publique, entrez : racadm sshpkauth –i svcacct –k 1 –d Pour supprimer toutes les clés publiques, entrez : racadm sshpkauth –i svcacct –k all –d Ouverture de session avec l'authentification par clé publique Une fois les clés publiques téléversées, vous pouvez ouvrir une session CMC sur SSH sans avoir à saisir un mot de passe. Vous avez également la possibilité d'envoyer une commande RACADM unique en tant qu'argument de ligne de commande à l'application SSH. Les options de ligne de commande se comportent comme RACADM distant car la session se termine une fois la commande exécutée. Par exemple : Ouverture de session : ssh service@ où ssh service@ correspond à l'adresse IP de CMC.100 Utilisation de l'interface de ligne de commande RACADM Envoi de commandes racadm : ssh service@ racadm getversion ssh service@ racadm getsel Lorsque vous ouvrez une session avec le compte de service, si une phrase de passe a été configurée lors de la création de la paire de clés publique/privée, vous pouvez être invité à saisir à nouveau cette phrase de passe. Si une phrase de passe est utilisée avec les clés, les clients Windows et Linux fournissent des méthodes pour automatiser aussi cette procédure. Pour les clients Windows, vous pouvez utiliser l'application Pageant. Elle s'exécute en arrière-plan et rend la saisie de la phrase de passe transparente. Pour les clients Linux, vous pouvez utiliser ssh-agent. Pour configurer et utiliser l'une de ces applications, voir la documentation fournie depuis cette application. Activation d'un utilisateur CMC ayant des droits Pour accorder des droits d'administration spécifiques (autorisation basée sur le rôle) à un utilisateur, commencez par rechercher un index utilisateur disponible en suivant les étapes indiquées dans « Avant de commencer », à la page 33. Ensuite, entrez les lignes de commande suivantes avec le nouveau nom d'utilisateur et le nouveau mot de passe. racadm config -g cfgUserAdmin -o cfgUserAdminPrivilege -i REMARQUE : consultez le Tableau 3-1 du chapitre Propriétés de la base de données du Guide de référence de la ligne de commande RACADM pour iDRAC6 et CMC pour une liste des valeurs de masque binaire valides correspondant à des privilèges d'utilisateur spécifiques. La valeur de privilège par défaut est 0, indiquant que l'utilisateur n'a aucun privilège activé. Désactivation d'un utilisateur CMC À l'aide de l'interface RACADM, vous pouvez uniquement désactiver manuellement les utilisateurs CMC et de manière individuelle. Vous ne pouvez pas supprimer les utilisateurs à l'aide d'un fichier de configuration. L'exemple suivant illustre la syntaxe de commande qui peut être utilisée pour supprimer un utilisateur CMC : racadm config -g cfgUserAdmin -i 2 cfgUserAdminPrivilege 0x0Utilisation de l'interface de ligne de commande RACADM 101 Configuration de l'envoi de notifications par e-mail ou d'alertes SNMP Vous pouvez configurer CMC pour envoyer des interruptions d'événement SNMP et/ou des alertes par e-mail lorsque certains événements se produisent au niveau du châssis. Pour plus d'informations et d'instructions, voir « Configuration des alertes SNMP », à la page 438 et « Configuration des alertes par messagerie », à la page 445. Vous pouvez spécifier les destinations d'interruptions sous la forme d'adresses numériques au format approprié (IPv6 ou IPv4) ou de noms de domaine pleinement qualifiés (FQDN). Choisissez un format compatible avec votre technologie de mise en réseau/infrastructure. REMARQUE : la fonctionnalité INTERRUPTION test ne détecte pas les choix incorrects en fonction de la configuration réseau actuelle. Par exemple, l'utilisation d'une destination IPv6 dans un environnement IPv4 uniquement. Configuration de plusieurs CMC dans plusieurs châssis À l'aide de RACADM, vous pouvez configurer un ou plusieurs CMC avec des propriétés identiques. Lorsque vous effectuez une requête sur une carte CMC spécifique à l'aide de son numéro de groupe et du numéro de l'objet, RACADM crée le fichier de configuration racadm.cfg à partir des informations collectées. En exportant le fichier vers un ou plusieurs CMC, vous pouvez configurer vos contrôleurs avec des propriétés identiques en un minimum de temps. REMARQUE : certains fichiers de configuration contiennent des informations CMC uniques (comme l'adresse IP statique) qui doivent être modifiées avant d'exporter le fichier vers d'autres CMC. 1 Utilisez RACADM pour effectuer une requête auprès de CMC cible contenant la configuration appropriée. REMARQUE : le fichier de configuration généré est monfichier.cfg. Vous pouvez renommer ce fichier. REMARQUE : le fichier .cfg ne contient aucun mot de passe utilisateur. Lorsque le fichier .cfg est téléversé sur le nouveau CMC, tous les mots de passe doivent être à nouveau ajoutés.102 Utilisation de l'interface de ligne de commande RACADM 2 Ouvrez une console texte Telnet/SSH sur CMC, ouvrez une session et entrez : racadm getconfig -f myfile.cfg REMARQUE : la redirection d'une configuration CMC vers un fichier à l'aide de getconfig -f est uniquement prise en charge par l'interface de RACADM distant. Pour plus d'informations, voir « Accès à distance à RACADM », à la page 81. 3 Modifiez le fichier de configuration à l'aide d'un éditeur de texte brut (optionnel). Tout caractère de formatage spécial dans le fichier de configuration peut corrompre la base de données RACADM. 4 Utilisez le fichier de configuration nouvellement créé pour modifier un CMC cible. À l'invite de commande, entrez : racadm config –f myfile.cfg 5 Réinitialisez le contrôleur CMC cible qui a été configuré. À l'invite de commande, entrez : racadm reset La sous-commande getconfig -f myfile.cfg (étape 1) demande la configuration CMC pour le contrôleur CMC principal et génère le fichier monfichier.cfg. Si nécessaire, vous pouvez renommer le fichier ou l'enregistrer dans un emplacement différent. Vous pouvez utiliser la commande getconfig pour effectuer les actions suivantes : • afficher toutes les propriétés de configuration dans un groupe (spécifié par le nom de groupe et l'index), • afficher toutes les propriétés de configuration pour un utilisateur par nom d'utilisateur. La sous-commande config charge les informations sur les autres CMC. Server Administrator utilise la commande config pour synchroniser la base de données des noms d'utilisateur et mots de passe.Utilisation de l'interface de ligne de commande RACADM 103 Création d'un fichier de configuration CMC Le fichier de configuration CMC .cfg est utilisé avec la commande racadm config -f .cfg pour créer un fichier de texte brut. La commande vous permet de construire un fichier de configuration (similaire à un fichier .ini) et de configurer CMC à partir de ce fichier. Vous pouvez utiliser n'importe quel nom de fichier, et le fichier ne nécessite pas d'extension .cfg (même si on le désigne par cette extension dans cette sous-section). REMARQUE : pour des informations supplémentaires sur la sous-commande getconfig, voir le Guide de référence de la ligne de commande RACADM pour iDRAC6 et CMC. RACADM analyse le fichier .cfg lors de son premier chargement sur CMC afin de vérifier la présence de noms de groupes et d'objets valides et le respect de quelques règles simples de syntaxe. Les erreurs sont indiquées avec le numéro de ligne dans laquelle l'erreur a été détectée et un message explique le problème. Tout le fichier est analysé et toutes les erreurs sont affichées. Les commandes d'écriture ne sont pas transmises à CMC si une erreur est trouvée dans le fichier .cfg. Vous devez corriger toutes les erreurs pour que la configuration puisse avoir lieu. Pour vérifier les erreurs avant de créer le fichier de configuration, utilisez l'option -c avec la sous-commande config. Avec l'option -c, config vérifie uniquement la syntaxe et n'écrit pas sur CMC. Tenez compte des consignes suivantes lorsque vous créez un fichier .cfg : • Si l'analyseur rencontre un groupe indexé, c'est la valeur de l'objet ancré qui différencie les différents index. L'analyseur lit tous les index CMC de ce groupe. Les objets de ce groupe représentent des modifications lorsque CMC est configuré. Si un objet modifié représente un nouvel index, l'index est créé sur CMC pendant la configuration.104 Utilisation de l'interface de ligne de commande RACADM • Vous ne pouvez pas choisir les index désirés dans un fichier .cfg. Les index peuvent être créés et supprimés. Au fil du temps, le groupe peut se fragmenter par suite des index utilisés et inutilisés. Si un index est présent, il est modifié. Si un index n'est pas présent, le premier index disponible est utilisé. Cette méthode permet une certaine flexibilité lors de l'ajout d'entrées indexées où il est inutile d'établir des correspondances d'index exactes entre tous les CMC gérés. Les nouveaux utilisateurs sont ajoutés au premier index disponible. Un fichier .cfg qui analyse et s'exécute correctement sur un CMC peut ne pas s'exécuter correctement sur un autre si tous les index sont remplis et qu'un nouvel utilisateur doit être ajouté. • Utilisez la sous-commande racresetcfg pour configurer les deux CMC avec des propriétés identiques. Utilisez la sous-commande racresetcfg pour réinitialiser CMC à ses paramètres initiaux par défaut et exécutez ensuite la commande racadm config -f .cfg. Le fichier .cfg doit inclure tous les objets, utilisateurs, index et autres paramètres appropriés. Voir le chapitre Propriétés de la base de données du Guide de référence de la ligne de commande RACADM pour iDRAC6 et CMC pour une liste exhaustive des objets et des groupes. PRÉCAUTION : utilisez la sous-commande racresetcfg pour réinitialiser la base de données et les paramètres de carte réseau CMC sur leurs paramètres par défaut d'origine, et supprimer tous les utilisateurs et toutes les configurations utilisateur. Pendant que l'utilisateur root est disponible, les paramètres par défaut des autres utilisateurs sont également réinitialisés. Règles d'analyse • Les lignes qui commencent par le caractère de hachage « # » sont traitées comme des commentaires. Une ligne de commentaire doit commencer dans la première colonne. Un caractère « # » dans toute autre colonne est traité comme un caractère #. Certains paramètres de modem peuvent inclure les caractères # dans leurs chaînes de caractères. Un caractère d'échappement n'est pas requis. Vous pouvez générer un fichier .cfg à partir d'une commande racadm getconfig -f (nom de fichier).cfg, puis exécuter une commande racadm config -f .cfg (nom de fichier.cfg) sur un autre CMC sans ajouter de caractères d'échappement.Utilisation de l'interface de ligne de commande RACADM 105 Par exemple : # # This is a comment [cfgUserAdmin] cfgUserAdminPageModemInitString= • Toutes les entrées de groupe doivent être entourées de crochets d'ouverture et de fermeture ([ et ]). Le caractère « [ » du début indiquant un nom de groupe doit commencer dans la colonne 1. Ce nom de groupe doit être spécifié avant n'importe quel objet dans ce groupe. Les objets auxquels aucun nom de groupe n'est associé génèrent une erreur. Les données de configuration s'organisent en groupes tel que défini dans le chapitre Propriétés de la base de données du Guide de référence de la ligne de commande RACADM pour iDRAC6 et CMC. L'exemple suivant affiche un nom de groupe, un objet et la valeur de propriété de l'objet : [cfgLanNetworking] - {group name} cfgNicIpAddress=143.154.133.121 {object name} {object value} • Tous les paramètres sont spécifiés en tant que paires « objet=valeur » sans espace entre l'objet, le signe = et la valeur. Les espaces blancs qui sont inclus après la valeur sont ignorés. Un espace blanc à l'intérieur d'une chaîne de valeurs n'est pas modifié. Tout caractère à droite du symbole « = » est pris tel quel (par exemple, un deuxième « = », un « # », « [ », « ] », et ainsi de suite). Ces caractères sont des caractères de script de conversation de modem valides. [cfgLanNetworking] - {group name} cfgNicIpAddress=143.154.133.121 {object value} • L'analyseur .cfg ignore une entrée d'objet d'index. Vous ne pouvez pas spécifier quel index est utilisé. Si l'index existe déjà, il est utilisé ou la nouvelle entrée est créée dans le premier index disponible pour ce groupe. La commande racadm getconfig-f .cfg (nom de fichier.cfg) insère un commentaire devant les objets d'index, ce qui vous permet de visualiser les commentaires inclus.106 Utilisation de l'interface de ligne de commande RACADM REMARQUE : vous pouvez créer un groupe indexé manuellement en utilisant la commande suivante : racadm config -g -o -i • La ligne d'un groupe indexé ne peut pas être supprimée d'un fichier .cfg. Si vous supprimez cette ligne à l'aide d'un éditeur de texte, RACADM interrompra son analyse du fichier de configuration et vous avertira de l'erreur. Vous devez supprimer un objet indexé manuellement en utilisant la commande suivante : racadm config -g -o -i "" REMARQUE : une chaîne de caractères nulle (identifiée par deux caractères ") demande à CMC de supprimer l'index du groupe spécifié. Pour voir le contenu d'un groupe indexé, utilisez la commande suivante : racadm getconfig -g -i • Pour les groupes indexés, l'ancre d'objet doit être le premier objet après les crochets « [ ] ». Voici des exemples de groupes indexés actuels : [cfgUserAdmin] cfgUserAdminUserName= Si vous entrez racadm getconfig -f .cfg, (mon exemple.cfg) la commande construit un fichier .cfg pour la configuration CMC actuelle. Ce fichier de configuration peut être utilisé comme exemple et comme point de départ de votre fichier .cfg unique. Modification de l'adresse IP CMC Lorsque vous modifiez l'adresse IP CMC dans le fichier de configuration, supprimez toutes les entrées = (valeur) inutiles. Seul le nom du groupe variable actuel avec « [ » et « ] » est conservé, avec les deux entrées = (valeur) correspondant au changement d'adresse IP.Utilisation de l'interface de ligne de commande RACADM 107 Exemple : # # object Group « cfgLanNetworking » # [cfgLanNetworking] cfgNicIpAddress=10.35.10.110 cfgNicGateway=10.35.10.1 Ce fichier est mis à jour comme suit : # # Groupe d'objet « cfgLanNetworking » # [cfgLanNetworking] cfgNicIpAddress=10.35.9.143 # comment, the rest of this line is ignored cfgNicGateway=10.35.9.1 La commande racadm config -f .cfg (monfichier.cfg) analyse le fichier et identifie toutes les erreurs par numéro de ligne. Un fichier correct met à jour les bonnes entrées. En outre, vous pouvez utiliser la commande getconfig utilisée dans l'exemple précédent pour confirmer la mise à jour. Utilisez ce fichier pour télécharger des modifications à l'échelle de l'entreprise ou pour configurer de nouveaux systèmes sur le réseau à l'aide de la commande racadm getconfig -f .cfg (monfichier.cfg). REMARQUE : « Anchor » est un mot réservé qui ne doit pas être utilisé dans le fichier .cfg. 108 Utilisation de l'interface de ligne de commande RACADM Utilisation de RACADM pour configurer les propriétés sur iDRAC Les commandes config/getconfig RACADM prennent en charge l'option -m pour les groupes de configuration suivants : • cfgLanNetworking • cfgIPv6LanNetworking • cfgRacTuning • cfgRemoteHosts • cfgSerial • cfgSessionManagement REMARQUE : pour plus d'informations sur les valeurs et les plages de propriétés par défaut, consultez le Guide d'utilisation d'Integrated Dell Remote Access Controller 6 (iDRAC6) Enterprise pour les serveurs lames. Si le micrologiciel sur le serveur ne prend pas une fonctionnalité en charge, la configuration d'une propriété liée à cette fonctionnalité entraîne l'affichage d'une erreur. Par exemple, l'utilisation de RACADM pour activer syslog distant sur un iDRAC non pris en charge entraîne l'affichage d'un message d'erreur. De même, lors de l'affichage des propriétés iDRAC à l'aide de la commande getconfig de RACADM, les valeurs de propriétés sont affichées sous la forme - pour une fonctionnalité non prise en charge sur le serveur. Par exemple : $ racadm getconfig -g cfgSessionManagement -m server-1 # cfgSsnMgtWebServerMaxSessions=- # cfgSsnMgtWebServerActiveSessions=- # cfgSsnMgtWebServerTimeout=- # cfgSsnMgtSSHMaxSessions=- # cfgSsnMgtSSHActiveSessions=- # cfgSsnMgtSSHTimeout=- # cfgSsnMgtTelnetMaxSessions=- # cfgSsnMgtTelnetActiveSessions=- # cfgSsnMgtTelnetTimeout=-Utilisation de l'interface de ligne de commande RACADM 109 Dépannage La Figure 4-3 répertorie les problèmes courants liés à RACADM distant. Tableau 4-3. Utilisation des commandes Serial/ RACADM : Questions les plus fréquentes Question Réponse Après avoir réinitialisé CMC (avec la sous-commande racreset de RACADM), j'entre une commande et le message suivant s'affiche : racadm Transport: ERROR: (RC=-1) Qu'est-ce que ce message signifie ? Vous devez attendre que CMC soit complètement réinitialisé avant d'envoyer une autre commande. Lorsque j'utilise les souscommandes RACADM, je reçois des erreurs que je ne comprends pas. Il se peut que vous rencontriez une ou plusieurs des erreurs suivantes lors de l'utilisation de RACADM : • Messages d'erreur locaux : problèmes de syntaxe, d'erreurs typographiques et de noms incorrects . Exemple : ERREUR : Utilisez la sous-commande help RACADM pour afficher la syntaxe correcte et les informations d'utilisation. • Messages d'erreur liés à CMC : problèmes qui empêchent CMC d'effectuer une opération. Le message peut également indiquer « Échec d'une commande RACADM ». entrez racadm gettracelog pour obtenir des informations de débogage.110 Utilisation de l'interface de ligne de commande RACADM Pendant l'utilisation de RACADM distant, l'invite s'est modifiée pour afficher « > » et je ne parviens pas à récupérer l'invite « $ ». Si vous entrez des guillemets doubles différents (") ou une citation simple différente (') dans la commande, l'interface utilisateur change vers l'invite « > » et met en file d'attente toutes les commandes. Pour revenir à l'invite « $ », entrez –d. Les commandes suivantes ont affiché le message d'erreur « Introuvable » : $ logout $ quit Les commandes « logout » et « quit » ne sont pas prises en charge dans l'interface de ligne de commande CMC. Tableau 4-3. Utilisation des commandes Serial/ RACADM : Questions les plus fréquentes (suite) Question RéponseUtilisation de l'interface Web de CMC 111 Utilisation de l'interface Web de CMC CMC intègre une interface Web qui vous permet de configurer les propriétés et les utilisateurs CMC, d'effectuer les tâches de gestion à distance et de dépanner un système (géré) distant en cas de problème. Pour la gestion quotidienne du châssis, utilisez l'interface Web de CMC. Ce chapitre fournit des informations sur la manière d'effectuer les tâches de gestion courantes du châssis à l'aide de l'interface Web de CMC. Vous pouvez également effectuer l'ensemble des tâches de configuration à l'aide de commandes RACADM locales ou de consoles de ligne de commande (console série, Telnet ou SSH). Pour plus d'informations sur l'utilisation de RACADM en local, voir « Utilisation de l'interface de ligne de commande RACADM », à la page 75. Pour des informations sur l'utilisation des consoles de ligne de commande, voir « Configuration de CMC pour utiliser des consoles de ligne de commande », à la page 61. REMARQUE : si vous utilisez Microsoft Internet Explorer pour vous connecter via un proxy et que l'erreur « La page XML ne peut être affichée » s'affiche, vous devez désactiver le proxy pour continuer. Accès à l'interface Web CMC Pour accéder à l'interface Web CMC sur IPv4 : 1 Ouvrez une fenêtre d'un navigateur Web pris en charge. Pour les dernières informations relatives aux navigateurs Web pris en charge, consultez la Matrice de prise en charge des logiciels des systèmes Dell sur le site Web support.dell.com/manuals.112 Utilisation de l'interface Web de CMC 2 Entrez l'adresse URL suivante dans le champ Adresse, puis appuyez sur : https:// Si le numéro de port HTTPS par défaut (port 443) a été modifié, entrez : https://: est l'adresse IP CMC et le numéro de port HTTPS. La page Ouverture de session CMC s'affiche. Pour accéder à l'interface Web CMC sur IPv6 : 1 Ouvrez une fenêtre d'un navigateur Web pris en charge. Pour les dernières informations relatives aux navigateurs Web pris en charge, consultez la Matrice de prise en charge des logiciels des systèmes Dell sur le site Web support.dell.com/manuals. 2 Entrez l'adresse URL suivante dans le champ Adresse, puis appuyez sur : https://[] REMARQUE : lorsque vous utilisez IPv6, vous devez mettre entre crochets ([ ]). Le numéro de port HTTPS dans l'URL est facultatif si vous utilisez toujours la valeur par défaut (443). Sinon, vous devez spécifier le numéro de port. La syntaxe de l'URL CMC IPv6 avec le numéro de port spécifié est la suivante : https://[]: est l'adresse IP CMC et le numéro de port HTTPS. La page Ouverture de session CMC s'affiche.Utilisation de l'interface Web de CMC 113 Ouverture de session REMARQUE : pour ouvrir une session CMC, vous devez posséder un compte CMC doté du privilège Ouverture de session CMC. REMARQUE : par défaut, le nom d'utilisateur est root et le mot de passe calvin. Le compte root est le compte d'administration par défaut fourni avec le contrôleur CMC. Pour plus de sécurité, Dell recommande vivement de modifier le mot de passe par défaut du compte root lors de la procédure de configuration initiale. REMARQUE : le contrôleur CMC ne prend pas en charge les caractères ASCII étendus (ß, å, é, ü, etc.), ni les caractères utilisés dans des langues autres que l'anglais. REMARQUE : vous ne pouvez pas vous connecter à l'interface Web avec différents noms d'utilisateur dans plusieurs fenêtres du navigateur sur une seule station de travail. Vous pouvez ouvrir une session en tant qu'utilisateur CMC ou en tant qu'utilisateur Active Directory. Pour ouvrir une session : 1 Dans le champ Nom d'utilisateur, entrez votre nom d'utilisateur : • Nom d'utilisateur du contrôleur CMC : • Nom d'utilisateur Active Directory : <\, / or @. • Nom d'utilisateur LDAP : REMARQUE : ce champ est sensible à la casse. 2 Dans le champ Mot de passe, entrez votre mot de passe d'utilisateur pour le contrôleur CMC ou pour Active Directory. REMARQUE : ce champ est sensible à la casse. 3 Facultativement, sélectionnez un délai de session. C'est la durée pendant laquelle vous pouvez rester connecté sans activité avant d'être automatiquement déconnecté. La valeur par défaut est définie comme le délai d'inactivité du service Web. Voir Configuration des services pour plus de détails. 4 Cliquez sur OK ou appuyez sur .114 Utilisation de l'interface Web de CMC Fermeture de session Lorsqu'une session est ouverte dans l'interface Web, vous pouvez à tout moment la fermer en cliquant sur Fermer la session dans le coin supérieur droit de chaque page. REMARQUE : veillez à appliquer (enregistrer) les paramètres ou les informations entrés sur une page. Si vous fermez la session ou quittez cette page sans appliquer vos modifications, celles-ci seront perdues. Configuration des paramètres CMC de base Les sections suivantes fournissent des informations sur la configuration des paramètres CMC de base. Définir l'emplacement physique et le nom du châssis Vous pouvez définir l'emplacement du châssis dans un centre de données ainsi que le nom de châssis permettant de l'identifier sur le réseau (le nom par défaut est « Dell Rack System »). Par exemple, une requête SNMP sur le nom de châssis retourne le nom que vous avez configuré. Pour définir un emplacement et un nom de châssis : 1 Ouvrez une session sur l'interface Web de CMC. La page Intégrité du châssis s'affiche. 2 Cliquez sur l'onglet Configuration. La page Paramètres généraux du châssis s'affiche. 3 Entrez les propriétés d'emplacement dans les champs Data Center, Rayon, Rack et Emplacement de rack. REMARQUE : le champ d'emplacement de châssis est facultatif. Il vous est recommandé d'utiliser les champs Data Center, Rayon, Rack et Emplacement de rack pour indiquer l'emplacement physique du châssis. 4 Entrez le nouveau nom dans le champ Nom du châssis, puis cliquez sur Appliquer.Utilisation de l'interface Web de CMC 115 Définition de la date et de l'heure sur CMC Vous pouvez définir manuellement la date et l'heure, ou bien vous pouvez synchroniser la date et l'heure avec un serveur NTP (Network Time Protocol). Pour définir la date et l'heure sur CMC : 1 Ouvrez une session sur l'interface Web de CMC. La page Intégrité du châssis s'affiche. 2 Cliquez sur l'onglet Configuration. La page Paramètres généraux du châssis s'affiche. 3 Cliquez sur le sous-onglet Date/Heure. La page Date/Heure s'affiche. 4 Pour synchroniser la date et l'heure avec un serveur NTP (Network Time Protocol), cochez Activer NTP et spécifiez jusqu'à trois serveurs NTP. 5 Pour définir manuellement la date et l'heure, décochez Activer NTP et modifiez les champs Date et Heure, sélectionnez le Fuseau horaire dans le menu déroulant, puis cliquez ensuite sur Appliquer. Pour définir la date et l'heure en utilisant l'interface de ligne de commande, consultez les sections concernant les groupes de propriétés de la base de données cfgRemoteHosts et la commande config dans le Guide de référence de la ligne de commande RACADM pour 'iDRAC7 et le contrôleur CMC. Activation du support Flash amovible Vous pouvez activer ou réparer le média Flash amovible facultatif pour l'utiliser en tant que stockage non volatil étendu. Le fonctionnement de certaines fonctionnalités de CMC dépend du stockage non volatil. Pour activer ou réparer le média Flash amovible : 1 Ouvrez une session sur l'interface Web de CMC. La page Intégrité du châssis s'affiche. 2 Cliquez sur Contrôleur du châssis dans la liste d'arborescence. La page Condition du contrôleur du châssis s'affiche. 3 Cliquez sur l'onglet Média Flash. La page Média Flash amovible s'affiche.116 Utilisation de l'interface Web de CMC 4 Pour commencer à utiliser le média, sélectionnez Utiliser le média Flash pour le stockage des données du châssis dans la liste déroulante. 5 Si le support d'un CMC semble avoir un problème, rendez CMC actif et sélectionnez Préparer ou réparer le média contrôleur actif dans la liste déroulante. Si deux CMC sont présents dans le châssis, les deux CMC doivent contenir un média Flash. Les fonctionnalités CMC qui dépendent du média Flash (sauf pour Flexaddress) ne fonctionnent correctement qu'une fois le média autorisé par Dell installé et activé sur cette page. Page Intégrité du châssis Quand vous vous connectez au contrôleur CMC, la page Intégrité du châssis (Présentation du châssis→ Propriétés→ Intégrité) s'affiche. Les informations et actions les plus souvent requises sont disponibles sur cette page. Si votre châssis est configuré en tant que Chef de groupe, la page Intégrité du groupe s'affiche après la connexion. Pour plus d'informations, voir « Utilisation d'un groupe de châssis », à la page 117. La page Intégrité du châssis affiche une vue graphique du châssis et de ses composants, ainsi que les détails des composants. Selon le composant sélectionné, différentes actions ou liens vers d'autres pages sont disponibles. En outre, les derniers événements du journal du matériel de CMC sont également affichés. Toutes les informations sont mises à jour dynamiquement sur la page Intégrité du châssis. Cette page contient deux sections : Résumé des composants du châssis en haut, suivi de la liste Événements récents du journal de matériel de CMC. La section Résumé des composants du châssis (également intitulée « Intégrité du châssis » lorsque les informations générales sur le châssis sont affichées) affiche les graphiques et leurs informations associées. Vous pouvez masquer cette section en cliquant sur l'icône Fermer. La partie gauche de la section Résumé des composants du châssis affiche les graphiques et les liens rapides du châssis. La moitié droite affiche des informations, liens et actions liés à l'élément sélectionné. Cliquez sur la représentation graphique d'un composant pour sélectionner le composant. Une fois sélectionné, le graphique devient bleu.Utilisation de l'interface Web de CMC 117 La liste Événements récents du journal de matériel de CMC affiche les 10 derniers événements de ce journal. Le contenu de cette section est mis à jour dynamiquement et présente les derniers événements en haut de la liste. Pour plus d'informations sur les entrées de journal matériel de CMC, voir « Affichage des journaux d'événements », à la page 460. Utilisation d'un groupe de châssis Le contrôleur CMC permet de contrôler plusieurs châssis depuis un seul châssis chef. À l'activation d'un groupe de châssis, le contrôleur CMC du châssis chef génère un affichage graphique de l'état du châssis chef et de tous les châssis membres au sein du groupe du châssis. Fonctionnalités du groupe de châssis Les fonctions du groupe de châssis sont les suivantes : • La page GUI des groupes du châssis affiche des images qui représentent l'arrière et l'avant de chaque châssis, un ensemble pour le châssis chef et un ensemble pour chaque châssis membre. • Des problèmes liés à l'intégrité du chef et des membres d'un groupe sont affichées en couleur rouge ou jaune accompagnés d'une croix X ou d'un ! sur le composant présentant des problèmes. Des détails sont visibles sous l'image du châssis en cliquant sur cette dernière ou sur le bouton Détails. • Des liens de lancement rapide sont disponibles pour ouvrir les pages Web du châssis membre ou du serveur. • Un inventaire de lames et d'E/S est disponible pour tout groupe. • Une option sélectionnable est disponible pour synchroniser les propriétés d'un nouveau membre avec celles du chef de groupe lorsqu'un nouveau membre est ajouté à ce dernier. Configuration d'un groupe de châssis Un groupe de châssis peut contenir jusqu'à huit membres. De plus, un chef ou un membre ne peut appartenir qu'à un seul groupe. Un châssis, chef ou membre, faisant partie d'un groupe ne peut pas être ajouté à un autre groupe. Il peut être supprimé d'un groupe, puis ajouté à un autre groupe ultérieurement.118 Utilisation de l'interface Web de CMC Pour configurer le groupe de châssis via l'interface utilisateur : 1 Connnectez-vous au châssis chef à l'aide des privilèges administrateur du châssis. 2 Cliquez sur Configuration→ Administration des groupes. La page Groupe de châssis s'affiche. 3 Dans la page Groupe de châssis, sélectionnez Chef sous Rôle. Un champ permettant d'ajouter le nom du groupe s'affiche. 4 Entrez le nom du groupe dans le champ Nom du groupe, puis cliquez sur Appliquer. REMARQUE : les mêmes règles qui s'appliquent pour un nom de domaine s'appliquent au nom de groupe. L'interface GUI devient automatiquement la page GUI du groupe de châssis une fois le groupe de châssis créé. L'arborescence du système affiche le groupe par son nom de groupe et le châssis chef ainsi que le châssis membre non peuplé. Une fois le groupe du châssis configuré, des membres peuvent être ajoutés à celui-ci : 1 Connectez-vous au châssis chef à l'aide des privilèges administrateur. 2 Sélectionnez le châssis chef dans l'arborescence. 3 Cliquez sur Configuration→ Administration des groupes. 4 Sous Gestion des groupes, saisissez l'adresse IP ou le nom DNS du membre dans le champ Nom d'hôte/Adresse IP. 5 Dans le champ Nom utilisateur du châssis membre, saisissez un nom utilisateur à l'aide des privilèges administrateur du châssis. 6 Saisissez le mot de passe correspondant dans le champ Mot de passe. 7 Facultatif : sélectionnez Synchroniser le nouveau membre avec les propriétés du leader/chef pour pousser les propriétés du chef vers le membre. Pour plus d'informations, voir la sous-section « Synchronisation des propriétés d'un nouveau membre avec celles du châssis chef », à la page 121. 8 Sélectionnez le bouton Appliquer.Utilisation de l'interface Web de CMC 119 9 Répétez les étapes de l'étape 4 à l'étape 8 pour ajouter jusqu'à huit membres. Les noms de châssis des nouveaux membres s'affichent dans la boîte de dialogue libellée Membres. L'état du nouveau membre s'affiche lorsque le groupe est sélectionnée dans l'arborescence. Des détails sont disponibles en cliquant sur l'image du châssis ou sur le bouton Détails. REMARQUE : lorsqu'elles sont saisies, les références d'un membres sont transmises de manière sécuritaire au châssis membre afin d'établir une relation de confiance entre le membre et le châssis chef. Les références ne restent sur aucun des châssis et ne sont plus échangées après l'établissement initial de la relation de confiance. Retrait d'un membre du châssis chef Vous pouvez supprimer un membre du groupe du châssis chef. Pour supprimer un membre : 1 Connectez-vous au châssis chef à l'aide des privilèges administrateur. 2 Sélectionnez le châssis chef dans l'arborescence. 3 Cliquez sur Configuration→ Administration des groupes. 4 Dans la liste Suppression de membres, sélectionnez le nom du membre ou des membres à supprimer, puis cliquez sur Appliquer. Le châssis chef communique au membre ou aux membres sélectionnés qu'ils ont été supprimés du groupe. Le nom du membre est supprimé de la boîte de dialogue. Le châssis membre ne pourra pas recevoir le message si un problème de réseau empêche la communication entre le chef et le membre. Dans ce cas, désactivez le membre depuis le châssis membre pour terminer le processus de retrait. Pour plus d'informations, consultez la sous-section « Désactivation d'un membre individuel sur le châssis membre », à la page 120. Dissolution d'un groupe de châssis Pour dissoudre un groupe de châssis depuis le châssis chef : 1 Connectez-vous au châssis chef à l'aide des privilèges administrateur. 2 Sélectionnez le châssis chef dans l'arborescence. 3 Cliquez sur Configuration→ Administration des groupes. 4 Dans la page du Groupe du châssis, sous Rôle, sélectionnez Aucun, puis cliquez sur Appliquer.120 Utilisation de l'interface Web de CMC Le châssis chef communique alors avec tous les membres qui ont été supprimés pour leur faire savoir qu'ils ont été supprimés du groupe. Enfin, le châssis chef ne tient plus ce rôle. Il peut maintenant être affecté en tant que membre ou chef d'un autre groupe. Le châssis membre ne pourra pas recevoir le message si un problème de réseau empêche la communication entre le chef et le membre. Dans ce cas, désactivez le membre depuis le châssis membre pour terminer le processus de retrait. Pour plus d'informations, consultez la sous-section « Désactivation d'un membre individuel sur le châssis membre », à la page 120. Désactivation d'un membre individuel sur le châssis membre Il arrive qu'un membre ne puisse pas être supprimé d'un groupe par le châssis chef. Cela peut se produire si la connectivité réseau du membre est perdue. Pour supprimer un membre d'un groupe dans le châssis membre : 1 Connectez-vous au châssis membre à l'aide des privilèges d'administrateur de châssis. 2 Cliquez sur Configuration→ Administration des groupes. 3 Sélectionnez Aucun, puis cliquez sur Appliquer. Lancement d'une page Web du châssis membre ou du serveur Des liens vers une page Web du châssis membre, vers une console à distance du serveur ou vers la page Web de l'iDRAC du serveur au sein du groupe sont disponibles via la page de groupe du châssis chef. Pour vous connecter au périphérique membre, utilisez les nom d'utilisateur et mot de passe utilisés établir une connexion au châssis chef. Si le périphérique membre dispose des mêmes coordonnées d'ouverture de session, aucune coordonnée supplémentaire n'est nécessaire. Sinon, l'utilisateur est dirigé vers la page d'ouverture de session du périphérique membre. Pour naviguer vers les périphériques membres : 1 Ouvrez une session dans le châssis chef. 2 Sélectionnez Groupe : nom dans l'arborescence. 3 Si un membre CMC correspond à la destination requise, sélectionnez Lancer CMC sous le châssis souhaité.Utilisation de l'interface Web de CMC 121 Si un serveur de châssis correspond à la destination requise, procédez comme suit : a Sélectionnez l'image du châssis de destination. b Dans l'image du châssis qui apparaît sous le panneau Intégrité et alertes, sélectionnez le serveur. c Dans la boîte de dialogue libellée Liens rapides, sélectionnez le périphérique de destination. Une nouvelle fenêtre contenant la page de destination ou l'écran d'ouverture de session s'affiche. Synchronisation des propriétés d'un nouveau membre avec celles du châssis chef Vous pouvez appliquer les propriétés du chef à un membre nouvellement ajouté à un groupe. Pour synchroniser un nouveau membre avec les propriétés du chef : 1 Connectez-vous au châssis chef à l'aide des privilèges administrateur. 2 Sélectionnez le châssis chef dans l'arborescence. 3 Cliquez sur Configuration→ Administration des groupes. 4 Lorsque vous ajoutez un nouveau membre au groupe, sélectionnez Synchroniser le nouveau membre avec les propriétés du leader/chef sur la page Groupe de châssis. 5 Cliquez sur Appliquer. Le membre prend les propriétés du leader.122 Utilisation de l'interface Web de CMC Les propriétés du service de configuration suivantes de plusieurs systèmes dans le châssis sont affectées après la synchronisation : Inventaire de lames pour Groupe MCM La page Intégrité de groupe de châssis affiche tous les châssis membres et vous permet d'enregistrer le rapport d'inventaire de lames dans un fichier à l'aide de la fonction de téléchargement de tout navigateur standard. Le rapport contient des données pour : • Toutes les lames actuellement présentes dans le groupe de châssis (y compris le chef). • Logements vides et les logements d'extension (y compris les lames de pleine hauteur et de double largeur). Enregistrement du rapport d'inventaire de lames Pour enregistrer le rapport d'inventaire de lames : 1 Ouvrez une session dans l'interface Web du CMC, puis sélectionnez Groupe dans l'arborescence système. La page Intégrité du châssis s'affiche. 2 Cliquez sur le bouton Enregistrer le rapport d'inventaire. La boîte de dialogue Téléchargement de fichier qui s'affiche vous invite à ouvrir ou à enregistrer le fichier. Tableau 5-1. Propriétés de service de configuration Propriété Navigation Configuration du protocole SNMP Cliquez sur Présentation du châssis→ Réseau→ Services→ SNMP pour plus de détails. Connexion à distance à un châssis Cliquez sur Présentation du châssis→ Réseau→ Services→ SNMP pour plus de détails. Authentification d'utilisateur à l'aide de services LDAP et Active Directory Cliquez sur Présentation du châssis→ Authentification utilisateur→ Services d'annuaire pour plus de détails. Alertes de châssis Cliquez sur Présentation du châssis→ Alertes pour plus de détails.Utilisation de l'interface Web de CMC 123 3 Cliquez sur Enregistrer et spécifiez le chemin et le nom de fichier du rapport d'inventaire de lames. REMARQUE : pour que le rapport d'inventaire de lames soit le plus précis possible, le chef du groupe de châssis, le châssis membre du groupe de châssis et les lames dans les châssis associés doivent être sous tension. Données exportées Le rapport d'inventaire de lames contient les données les plus récemment renvoyées par chaque membre du groupe de châssis au cours de l'interrogation régulière du chef de groupe de châssis (toutes les 30 secondes). Pour obtenir le rapport d'inventaire de lames le plus précis : • Le chef de groupe de châssis et tous les châssis membres du groupe de châssis doivent être en état Alimentation de châssis activée • Toutes les lames dans les châssis associés doivent être sous tension Les données d'inventaire des châssis et lames associées peuvent ne pas apparaître dans le rapport d'inventaire si un sous-ensemble de châssis membres d'un groupe de châssis sont : • en état de Alimentation de châssis désactivée • Hors tension La Figure 5-2 répertorie les champs de données spécifiques et les conditions particulières requises pour les champs à inclure dans le rapport pour chaque lame : Tableau 5-2. Descriptions des champs d'inventaire de lames Champ de données Exemple Nom du châssis Chef de châssis de centre de données Adresse IP du châssis 192.168.0.1 Emplacement de logement 1 Nom de logement SLOT-01 Nom d'hôte Serveur Web d'entreprise REMARQUE : requiert un agent Server Administrator exécuté sur le serveur ; autrement, le champ sera vierge.124 Utilisation de l'interface Web de CMC Format des données Le rapport d'inventaire est généré dans un fichier au format .CSV de sorte à pouvoir les importer vers divers outils, tel que Microsoft Excel. Le fichier de rapport d'inventaire .CSV peut être importé vers des modèles en sélectionnant Données→ De texte dans MS Excel. Après l'importation du rapport d'inventaire dans MS Excel, si un message s'affiche vous invitant à fournir des informations supplémentaires, sélectionnez le fichier séparé par des virgules à importer vers MS Excel. Système d'exploitation Windows Server 2008 REMARQUE : requiert un agent Server Administrator exécuté sur le serveur ; autrement, le champ sera vierge. Modèle PowerEdgeM610 Numéro de service 1PB8VF1 Mémoire système totale 4 Go REMARQUE : requiert un CMC 4.0 (ou ultérieur) sur le membre ; autrement le champ sera vierge. Nbr d'UC 2 REMARQUE : requiert un CMC 4.0 (ou ultérieur) sur le membre ; autrement le champ sera vierge. Infos sur l'UC UC Intel (R) Xeon (R) E5502 à 1,87GHzn REMARQUE : requiert un CMC 4.0 (ou ultérieur) sur le membre ; autrement le champ sera vierge. Tableau 5-2. Descriptions des champs d'inventaire de lames (suite) Champ de données ExempleUtilisation de l'interface Web de CMC 125 Résumé des composants du châssis Les sections suivantes fournissent des informations sur le récapitulatif des composant de châssis. Graphiques du châssis Le châssis est représenté par les vues avant et arrière (image supérieure et image inférieure, respectivement). Les serveurs et l'écran LCD sont affichés dans la vue avant et les autres composants sont affichés dans la vue arrière. La sélection des composants est indiquée par une dominante bleue et est contrôlée en cliquant sur l'image du composant requis. Quand un composant est présent dans le châssis, une icône de ce type de composant est affichée dans le graphique du logement où le composant a été installé. Les logements vides sont affichés sur un fond gris anthracite. L'icône du composant indique visuellement l'état du composant. L'icône de serveur est utilisée dans la Figure 5-1 à titre d'exemple. D'autres composants affichent des icônes qui représentent visuellement le composant physique. Les icônes des serveurs et des modules d'E/S s'étendent sur plusieurs logements lorsqu'un élément de taille double est installé. En survolant un composant, vous afficherez une info-bulle avec plus d'informations sur ce composant. Tableau 5-3. États des icônes de serveur Icône Description Le serveur est allumé et fonctionne normalement.126 Utilisation de l'interface Web de CMC La Figure 5-4 affiche les liens rapides de châssis. Le serveur est éteint. Le serveur signale une erreur non critique. Le serveur signale une erreur critique. Aucun serveur présent. Tableau 5-3. États des icônes de serveur (suite) Icône DescriptionUtilisation de l'interface Web de CMC 127 Intégrité du châssis Dans la première page qui s'affiche, le côté droit de la page contient des informations du niveau du châssis et des alertes. Toutes les alertes actives critiques et non critiques sont affichées. En cliquant sur un composant, vous remplacez les informations au niveau du châssis par l'affichage des informations associées au composant sélectionné. Pour restaurer les informations au niveau du châssis, cliquez sur Retourner à l'intégrité du châssis dans le coin supérieur droit. Tableau 5-4. Liens rapides de châssis Champ Description Configurer les utilisateurs Accédez à Présentation du châssis→ Authentification utilisateur→ Utilisateurs locaux Configuration réseau Accédez à Présentation du châssis→ Réseau→ Réseau Configuration de l'alimentation Accédez à Présentation du châssis→ Alimentation→ Configuration Mise à jour de micrologiciel Accédez à Présentation du châssis→ Mise à jour→ Mise à jour du micrologiciel Tableau 5-5. Informations de la page du châssis Champ Description Modèle Affiche le modèle du panneau LCD du châssis. Micrologiciel Affiche la version du micrologiciel du contrôleur CMC actif. Numéro de service Affiche le numéro de service du châssis. Le numéro de service est un identifiant unique fourni par le fabricant pour le support et la maintenance. Numéro d'inventaire Affiche le numéro d'inventaire du châssis. Alimentation d'entrée Alimentation que le châssis consomme actuellement.128 Utilisation de l'interface Web de CMC Informations sur le composant sélectionné Les informations pour le composant sélectionné sont affichées dans trois sections indépendantes : • Intégrité, Performances et Propriétés Les événements actifs critiques et non critiques tels que ceux figurant dans les journaux de matériel sont affichés ici, le cas échéant. Les données de performances qui peuvent varier avec le temps sont également présentées ici. • Propriétés Les propriétés des composants qui ne varient pas avec le temps ou qui changent rarement sont affichées ici. • Liens rapides La section Liens rapides fournit un moyen commode de navigation des pages les plus souvent consultées, ainsi que les actions les plus fréquemment effectuées. Seuls les liens applicables à l'élément sélectionné sont affichés dans cette section. Seuil énergétique Puissance d'entrée maximale définie par l'utilisateur pour la consommation. Lorsque le châssis atteint cette limite, les serveurs ralentissent pour éviter une nouvelle augmentation dans la puissance d'entrée requise. Stratégie d'alimentation Préférence définie par l'utilisateur pour la coordination des multiples unités d'alimentation. Intégrité Affiche l'intégrité générale du sous-système d'alimentation du châssis. Tableau 5-5. Informations de la page du châssis (suite) Champ DescriptionUtilisation de l'interface Web de CMC 129 Tableau 5-6. Informations sur l'intégrité et les performances - Serveurs Élément Description État de l'alimentation État Sous tension/Hors tension du serveur. Voir la Figure 5-25 pour plus de détails sur les différents types d'états d'alimentation. Intégrité Affiche l'équivalent texte de l'icône d'intégrité. Consommation énergétique Quantité d'énergie que consomme le serveur à l'heure actuelle. Alimentation allouée Quantité d'alimentation allouée au serveur. Température Température lue par le capteur de température du serveur. Tableau 5-7. Propriétés du serveur Élément Description Nom Nom de logement attribué par l'utilisateur. Modèle Modèle du serveur, par exemple « PowerEdge M600 » ou « PowerEdge M605 ». Numéro de service Le numéro de service du serveur. Le numéro de service est un identifiant unique fourni par le fabricant pour le support et la maintenance. Si le serveur est absent, ce champ est vide. SE Système d'exploitation du serveur. Nom d'hôte Nom du serveur, tel qu'établi par le système d'exploitation. iDRAC Version du micrologiciel iDRAC sur le serveur. BIOS Version du BIOS du serveur. CPLD Affiche le numéro de version du circuit logique programmable complexe (CPLD) du serveur. Informations UC Affiche le nombre et le type d'UC installées sur le serveur. Mémoire système totale Affiche la mémoire totale de système (en GO) installée sur le serveur.130 Utilisation de l'interface Web de CMC Tableau 5-8. Liens rapides - Serveurs Élément Description Condition du serveur Accédez à Présentation des serveurs→ → Propriétés→ Condition Lancez la console distante Invoque une session clavier-écran-souris sur le serveur si le serveur prend en charge cette opération. Lancer l'interface utilisateur iDRAC Invoque une console de gestion iDRAC pour le serveur. Mettre le serveur sous tension Appliquer la tension à un serveur qui est hors tension. Mettre le serveur hors tension Couper l'alimentation d'un serveur qui est sous tension. Partage de fichiers à distance Accédez à Présentation des serveurs→ Configuration→ Partage de fichiers à distance Déployer le réseau iDRAC Accédez à Présentation des serveurs→ Configuration→ iDRAC (Déployer iDRAC) Lifecycle Controller Accédez à Présentation du serveur→ Mise à jour→ Mise à jour du micrologiciel Tableau 5-9. Intégrité et performances de module d'E/S Élément Description État de l'alimentation Affiche l'état de l'alimentation du module d'E/S : sous tension, hors tension ou inconnu (absent). Rôle Affiche l'adhésion à l'empilage du module d'E/S lorsque les modules sont reliés. Membre : le module fait partie d'un ensemble de piles. Maître : le module est un point d'accès principal. Utilisation de l'interface Web de CMC 131 Tableau 5-10. Propriétés du module d'E/S Élément Description Modèle Affiche le nom de produit du module d'E/S. Numéro de service Affiche le numéro de service du module d'E/S. Le numéro de service est un identifiant unique fourni par Dell pour le support et la maintenance. Tableau 5-11. Liens rapides - Modules d'E/S Élément Description Condition du module d'E/S Accédez à Modules d'E/S→ → Propriétés→ Condition Lancer l'interface utilisateur du module d'E/S Si l'icône d'un module d'E/S spécifique est présente, un clic sur cette icône lance la console de gestion de ce module d'E/S dans une nouvelle fenêtre de navigateur ou sous un nouvel onglet. Tableau 5-12. Intégrité et performances du contrôleur CMC actif Élément Description Mode de redondance Affiche le basculement disponible du contrôleur CMC de secours. Si le micrologiciel CMC ne correspond pas ou si CMC n'est pas câblé correctement au réseau de gestion, la redondance apparaît comme non disponible. Adresse MAC Affiche l'adresse MAC de l'interface réseau de CMC. L'adresse MAC est un identificateur unique pour CMC sur le réseau. IPv4 Affiche l'adresse IPv4 de l'interface réseau de CMC. IPv6 Affiche l'adresse IPv6 de l'interface réseau de CMC.132 Utilisation de l'interface Web de CMC Tableau 5-13. Propriétés de CMC Élément Description Micrologiciel Affiche la version du micrologiciel du contrôleur CMC actif. Micrologiciel Affiche la version du micrologiciel CMC installé sur le contrôleur CMC de secours. Si vous n'avez pas installé un deuxième contrôleur CMC, ce champ affiche N/A. Dernière mise à jour Indique la date de la dernière mise à jour du micrologiciel. Si aucune mise à jour ne s'est produite, ce champ affiche S/O (-). Matériel Affiche la version matérielle du contrôleur CMC actif. Tableau 5-14. Liens rapides - CMC Élément Description Condition CMC Accédez à Contrôleur du châssis→ Propriétés→ Condition Mise en réseau Accédez à Présentation du châssis→ Réseau→ Réseau Mise à jour de micrologiciel Accédez à Présentation du châssis→ Mise à jour→ Mise à jour du micrologiciel Tableau 5-15. Intégrité et performances du module iKVM Élément Description Console OSCAR Indique si le connecteur du panneau arrière VGA est activé (Oui ou Non) pour l'accès à CMC. Tableau 5-16. Propriétés du module iKVM Élément Description Nom Affiche le nom iKVM. Numéro de pièce Affiche le numéro de pièce d'iKVM. Le numéro de pièce est un identificateur unique fourni par le fournisseur. Les conventions d'attribution des noms des numéros de pièce diffèrent d'un fournisseur à l'autre. Micrologiciel Indique la version du micrologiciel iKVM. Matériel Indique la version du micrologiciel iKVM. Utilisation de l'interface Web de CMC 133 Tableau 5-17. Liens rapides - iKVM Élément Description Condition iKVM Accédez à iKVM→ Propriétés→ Condition Mise à jour de micrologiciel Accédez à Présentation du châssis→ Mise à jour→ Mise à jour du micrologiciel Tableau 5-18. Intégrité et performances du ventilateur Élément Description Vitesse Indique la vitesse du ventilateur en tours par minute (tr/min). Tableau 5-19. Propriétés du ventilateur Élément Description Seuil critique inférieur Vitesse en dessous de laquelle le ventilateur est considéré comme étant en panne. Seuil critique supérieur Vitesse au-dessus de laquelle le ventilateur est considéré comme étant en panne. Tableau 5-20. Liens rapides - Ventilateur Élément Description Condition du ventilateur Accédez à Ventilateurs→ Propriétés→ Condition Tableau 5-21. Intégrité et performances de l'unité d'alimentation Élément Description État de l'alimentation Indique l'état d'alimentation des blocs d'alimentation (un seul à la fois) : En cours d'initialisation, En ligne, Veille, Test de diagnostic, Échec, Mise à jour, Hors ligne ou Inconnu.134 Utilisation de l'interface Web de CMC Il n'existe aucun lien rapide pour le panneau LCD. Surveillance de la condition d'intégrité du système Affichage des résumés relatifs au châssis et aux composants La page de CMC Intégrité du châssis contient une représentation graphique du châssis, fournissant une présentation visuelle des composants installés. La page Intégrité du châssis est mise à jour de manière dynamique. Les couleurs du sous-graphique des composants et les champs textuels sont automatiquement modifiés. Tableau 5-22. Propriétés de l'unité d'alimentation Élément Description Capacité Affiche la capacité de l'unité d'alimentation (en watts). Tableau 5-23. Liens rapides - Unité d'alimentation Élément Description État du bloc d'alimentation Accédez à Blocs d'alimentation→ Propriétés→ Condition Consommation énergétique Accédez à Présentation du châssis→ Alimentation→ Consommation électrique Bilan de puissance du système Accédez à Présentation du châssis→ Alimentation→ Condition du bilan de puissance Tableau 5-24. Intégrité et performances du panneau LCD Élément Description Condition du panneau LCD Affiche la présence et la condition du panneau LCD. Intégrité du châssis Affiche la description texte de l'intégrité du châssis.Utilisation de l'interface Web de CMC 135 Figure 5-1. Exemple de graphiques du châssis dans l'interface Web La page Intégrité du châssis fournit une condition générale de l'intégrité du châssis, des modules CMC principal et de secours, des modules de serveur, des modules d'E/S, des ventilateurs, du module iKVM, des blocs d'alimentation et du panneau LCD. Des informations plus détaillées sur chaque composant s'affichent en cliquant sur le composant. Pour des instructions sur l'affichage des résumés du châssis et de ses composants, voir « Affichage des résumés du châssis », à la page 455. Affichage de la condition du bilan de puissance La page Condition du bilan de puissance affiche la condition du bilan de puissance pour le châssis, les serveurs et les unités d'alimentation du châssis. Pour des instructions sur l'affichage de la condition du bilan de puissance, voir « Affichage de l'état de la consommation de puissance », à la page 361. Pour plus d'informations sur la gestion de l'alimentation de CMC, voir « Gestion de l'alimentation », à la page 335.136 Utilisation de l'interface Web de CMC Affichage du nom du modèle de serveur et du numéro de service Le nom du modèle et le numéro de service de chaque serveur peuvent être obtenus instantanément en procédant comme suit : • Extension des serveurs dans l'arborescence du système. Tous les serveurs (1 à 16) s'affichent dans la liste développée Serveurs. Le nom de logement sans serveur est grisé. • Le passage du curseur sur le nom du logement ou du numéro de logement d'un serveur fait apparaître une info-bulle avec le nom du modèle du serveur et le numéro de service (si disponible). Affichage de la condition d'intégrité de l'ensemble des serveurs Vous pouvez consulter la condition d'intégrité de tous les serveurs depuis la section Graphiques du châssis de la page Intégrité du châssis ou Condition des serveurs. La page Graphiques du châssis fournit un aperçu graphique de tous les serveurs installés dans le châssis. Pour consulter la condition d'intégrité des serveurs à l'aide des graphiques du châssis : 1 Ouvrez une session sur l'interface Web de CMC. La page Intégrité du châssis s'affiche. La section située au centre de la page Graphiques du châssis représente une vue de face du châssis et contient la condition d'intégrité de tous les serveurs. La condition d'intégrité du serveur est indiquée par la couleur du sous-graphique du serveur : • Aucune couleur : le composant est présent, sous tension et communique avec le contrôleur CMC. Il n'existe aucune indication d'événement indésirable. • Panneau orange : indique que seules des alertes sont émises et que des mesures correctives doivent être prises. • Croix rouge : indique qu'au moins une condition de panne est présente. Cela signifie que CMC peut toujours communiquer avec le composant et que la condition d'intégrité signalée est critique. • Grisé : indique que le composant est présent et n'est pas sous tension. Elle ne communique pas avec CMC et il n'y a aucune indication d'événement indésirable.Utilisation de l'interface Web de CMC 137 La page Condition des serveurs fournit un aperçu des serveurs du châssis. Pour afficher la condition d'intégrité de tous les serveurs en utilisant la page Condition des serveurs : 1 Ouvrez une session sur l'interface Web de CMC. 2 Cliquez sur Présentation des serveurs dans l'arborescence. La page Condition des serveurs s'affiche. Tableau 5-25. Informations relatives à la condition de l'ensemble des serveurs Élément Description Logement Affiche l'emplacement du serveur. Le numéro de logement est un numéro séquentiel qui identifie le serveur en fonction de son emplacement dans le châssis. Nom Indique le nom du serveur, qui est par défaut désigné par le nom de son logement (SLOT01 à SLOT-16). REMARQUE : vous pouvez changer le nom du serveur par défaut. Pour des instructions, voir « Modification du nom d'un logement », à la page 140. Modèle Affiche le nom du modèle du serveur. Si ce champ est vide, le serveur n'est pas présent. Si ce champ affiche Extension de n° (où la valeur de n° est comprise entre 1 et 8), le n° correspond au logement principal d'un serveur à plusieurs logements.138 Utilisation de l'interface Web de CMC Intégrité OK Indique que le serveur est présent et qu'il communique avec CMC. En cas de perte de la communication entre CMC et le serveur, CMC ne pourra pas obtenir ni afficher la condition d'intégrité du serveur. Informatif Affiche des informations sur les serveurs en l'absence de modification de l'état de l'intégrité (OK, Avertissement, Critique). Avertissement Indique que des alertes d'avertissement seules ont été émises et que des actions correctives doivent être effectuées. Si aucune action corrective n'est effectuée, des pannes critiques susceptibles d'affecter l'intégrité du serveur peuvent se produire. Critique Indique qu'au moins une alerte de panne a été générée. La condition Critique représente une panne système du serveur et des actions correctives doivent être effectuées immédiatement. Aucune valeur Lorsque le serveur est absent du logement, les informations d'intégrité ne sont pas fournies. Tableau 5-25. Informations relatives à la condition de l'ensemble des serveurs (suite) Élément DescriptionUtilisation de l'interface Web de CMC 139 Lancez la console distante Cliquez ici pour lancer une session clavier-écran-souris sur le serveur dans une nouvelle fenêtre ou un nouvel onglet. Cette icône n'est affichée pour un serveur que si toutes les conditions suivantes sont remplies : • Serveurs prenant en charge iDRAC6 et iDRAC7. • Le châssis est sous tension. • L'interface de réseau local sur le serveur est activée. • La version d'iDRAC est 2.20 ou ultérieure. Cette fonctionnalité s'exécute correctement si les conditions suivantes sont remplies : • Le système hôte dispose du JRE (Java Runtime Environment) 6 Update 16 ou ultérieur. • Le navigateur sur le système hôte autorise les fenêtres contextuelles (le blocage des fenêtres contextuelles est désactivé). Lancer l'interface utilisateur iDRAC Cliquez-gauche sur l'icône pour lancer la console de gestion iDRAC pour un serveur dans une nouvelle fenêtre ou un nouvel onglet du navigateur. Cette icône n'est affichée pour un serveur que si toutes les conditions suivantes sont remplies : • Le serveur est présent. • Le châssis est sous tension. • L'interface de réseau local sur le serveur est activée. Cette fonctionnalité fonctionne correctement si la condition suivante est remplie : • Le navigateur sur le système hôte autorise les fenêtres contextuelles (le blocage des fenêtres contextuelles est désactivé). REMARQUE : si le serveur est retiré du châssis, l'adresse IP d'iDRAC est modifiée ou s'il y a un problème de connexion de réseau sur iDRAC, un clic sur l'icône Lancer l'interface utilisateur iDRAC risque d'afficher une page d'erreur sur l'interface de réseau local d'iDRAC. Tableau 5-25. Informations relatives à la condition de l'ensemble des serveurs (suite) Élément Description140 Utilisation de l'interface Web de CMC Pour des informations sur la procédure de lancement de la console de gestion iDRAC et les stratégies de signature unique, consultez « Lancement d'iDRAC à l'aide d'une signature unique », à la page 245. Modification du nom d'un logement La page Noms des logements vous permet de mettre à jour les noms des logements du châssis. Les noms de logements sont utilisés pour identifier des serveurs individuels. Pour le choix des noms de logements, les règles suivantes s'appliquent : • Les noms peuvent contenir un maximum de 15 caractères ASCII non étendus (codes ASCII de 32 à 126). • Les noms de logements doivent être uniques au sein d'un châssis. Le nom de chaque logement doit être unique. • Les chaînes de caractères ne sont pas sensibles à la casse. Serveur-1, serveur-1 et SERVEUR-1 sont des noms équivalents. État de l'alimentation Affiche l'état d'alimentation du serveur : • - : CMC n'a pas encore déterminé l'état d'alimentation du serveur. • Désactivé : le serveur ou le châssis est hors tension. • Activé : le châssis et le serveur sont sous tension. • Activation : état temporaire entre le mode Désactivé et Activé. Lorsque l'action est terminée, l'État d'alimentation est activé. • Mise hors tension : état temporaire entre le mode Activé et Désactivé. Lorsque l'action est terminée, l'État d'alimentation est désactivé. Numéro de service Affiche le numéro de service du serveur. Le numéro de service est un identifiant unique fourni par le fabricant pour le support et la maintenance. Si le serveur est absent, ce champ est vide. Tableau 5-25. Informations relatives à la condition de l'ensemble des serveurs (suite) Élément DescriptionUtilisation de l'interface Web de CMC 141 • Les noms de logements ne doivent pas commencer par les chaînes de caractères suivantes : • Switch- (Commutateur-) • Fan- (Ventilateur-) • PS- • KVM • DRAC- • MC- • Chassis (Châssis) • Housing-Left (Boîtier-Gauche) • Housing-Right (Boîtier-Droite) • Housing-Center (Boîtier-Centre) • Les chaînes de caractères Server-1 à Server-16 peuvent être utilisées, mais uniquement pour le logement correspondant. Par exemple, Server-3 est un nom valide pour le logement 3 mais pas pour le logement 4. Il convient de noter que Server-03 est un nom valide pour n'importe quel logement. REMARQUE : pour modifier le nom du logement, vous devez avoir le privilège d'Administrateur de configuration du châssis. REMARQUE : la configuration du nom du logement dans l'interface Web réside uniquement sur CMC. Si un serveur est retiré du châssis, le paramètre du nom du logement ne s'applique plus au serveur. REMARQUE : le paramètre du nom du logement n'est pas étendu au module iKVM optionnel. Les informations du nom du logement sont disponibles via l'unité remplaçable sur site du module iKVM. REMARQUE : la configuration du nom d'un logement dans l'interface Web CMC supplante toujours les modifications apportées au nom d'affichage dans l'interface iDRAC. Pour modifier le nom d'un logement : 1 Ouvrez une session sur l'interface Web de CMC. 2 Sélectionnez Présentation des serveurs dans le menu Châssis de l'arborescence du système.142 Utilisation de l'interface Web de CMC 3 Cliquez sur Configuration→ Noms des logements. La page Noms des logements s'affiche. 4 Entrez le nom modifié ou le nouveau nom d'un logement dans le champ Nom de logement. Répétez cette action pour chaque logement que vous souhaitez renommer, puis cliquez sur Appliquer. 5 Pour restaurer le nom du logement par défaut (de SLOT-01 à SLOT-16, basé sur la place du logement du serveur) sur le serveur, appuyez sur Restaurer la valeur par défaut. Utilisation du nom d'hôte du serveur comme nom de logement La page Noms des logements permet de remplacer les noms de logements statiques par le nom d'hôte du serveur (ou nom du système), si disponible. Pour ce faire, l'agent OMSA doit être installé sur le serveur. Consultez le Guide d'utilisation de Dell OpenManage Server Administrator pour plus de détails sur l'agent OMSA. Pour utiliser le nom d'hôte du serveur en tant que nom de logement : 1 Ouvrez une session sur l'interface Web de CMC. 2 Sélectionnez Présentation des serveurs dans le menu Châssis de l'arborescence du système. 3 Cliquez sur Configuration→ Noms des logements. La page Noms des logements s'affiche. 4 Sélectionnez Utiliser le nom d'hôte comme nom de logement, puis cliquez sur Appliquer. Définition du premier périphérique d'amorçage pour les serveurs La page Périphérique de démarrage initial vous permet de spécifier le périphérique d'amorçage de chaque serveur. Il est possible qu'il ne s'agisse pas du périphérique d'amorçage initial réel du serveur ou même d'un périphérique présent dans ce serveur, mais il est utilisé par CMC en tant que périphérique d'amorçage initial associé à ce serveur.Utilisation de l'interface Web de CMC 143 Vous pouvez définir le périphérique d'amorçage par défaut, mais aussi indiquer un périphérique d'amorçage qui ne sera utilisé qu'une seule fois pour démarrer le système à partir d'une image spécifique. Cette image peut vous permettre, par exemple, d'effectuer des tâches telles que l'exécution de diagnostics, la réinstallation d'un système d'exploitation, etc. Le périphérique d'amorçage spécifié doit exister et contenir un support amorçable. REMARQUE : pour définir le premier périphérique d'amorçage pour les serveurs, vous devez avoir des privilèges d'administrateur du serveur ou des privilèges d'administrateur de configuration du châssis et des privilèges de connexion iDRAC. Tableau 5-26. Périphériques d'amorçage Périphérique d'amorçage Description PXE Permet de démarrer à partir d'un protocole PXE (environnement d'exécution prédémarrage) sur la carte d'interface réseau. Disque dur Permet de démarrer à partir du disque dur sur le serveur. CD/DVD local Permet de démarrer à partir d'un lecteur de CD/DVD sur le serveur. Disquette virtuelle Permet de démarrer à partir du lecteur de disquette virtuel. Le lecteur de disquette (ou l'image d'une disquette) se trouve sur un autre ordinateur du réseau de gestion et est connecté à l'aide du visualiseur de console de l'interface utilisateur iDRAC. CD/DVD virtuel Permet de démarrer à partir d'un lecteur de CD/DVD virtuel ou d'une image ISO sur CD/DVD. Le lecteur optique ou le fichier de l'image ISO se trouve sur un autre ordinateur ou un autre disque disponible sur le réseau de gestion et est connecté à l'aide du visualiseur de console de l'interface utilisateur d'iDRAC. iSCSI Permet de démarrer à partir d'un périphérique Internet SCSI (interface système pour micro-ordinateur). Carte SD locale Démarrer à partir de la carte locale SD (Secure Digital) : uniquement pour les serveurs prenant en charge les systèmes iDRAC6 et iDRAC7. Disquette Démarrage à partir d'une disquette insérée dans le lecteur local de disquette. RFS Démarrer à partir d'une image RFS (Remote File Share). Le fichier d'image est relié à l'aide de l'affichage de la console GUI d'iDRAC.144 Utilisation de l'interface Web de CMC Pour définir le premier périphérique d'amorçage pour certains serveurs ou pour tous les serveurs du châssis : 1 Ouvrez une session sur l'interface Web de CMC. 2 Cliquez sur Présentation des serveurs dans l'arborescence, puis sur Configuration→ Périphérique de démarrage initial. La liste des serveurs apparaît. 3 Sélectionnez le périphérique d'amorçage que vous souhaitez utiliser pour chaque serveur. 4 Si vous souhaitez que le serveur s'amorce depuis le périphérique sélectionné à chaque amorçage, décochez la case Démarrer une seule fois correspondant à ce serveur. Si vous souhaitez que le serveur s'amorce depuis le périphérique sélectionné au prochain cycle d'amorçage uniquement, cochez la case Démarrer une seule fois correspondant à ce serveur, puis cliquez sur Appliquer. Affichage de la condition d'intégrité d'un serveur spécifique Vous pouvez consulter la condition d'intégrité d'un serveur de deux manières : à partir de la section Graphiques du châssis sur la page Intégrité du châssis ou sur la page Condition du serveur. La page Intégrité du châssis fournit une représentation graphique d'un serveur spécifique installé dans le châssis. Pour consulter la condition d'intégrité des serveurs à l'aide des graphiques du châssis : 1 Ouvrez une session sur l'interface Web de CMC. La page Intégrité du châssis s'affiche. La section située au centre de la page Graphiques du châssis représente une vue de face du châssis et contient la condition d'intégrité de tous les serveurs. La condition d'intégrité du serveur est indiquée par la couleur du sous-graphique du serveur : • Aucune couleur : le serveur est présent, sous tension et communique avec CMC, aucune indication d'événement indésirable. • Panneau orange : indique que seules des alertes sont émises et que des mesures correctives doivent être prises. Utilisation de l'interface Web de CMC 145 • Croix rouge : indique qu'au moins une condition de panne est présente. Cela signifie que CMC peut toujours communiquer avec le composant et que la condition d'intégrité signalée est critique. • Grisé : indique que le composant est présent et n'est pas sous tension. Elle ne communique pas avec CMC et il n'y a aucune indication d'événement indésirable. 2 Déplacez le curseur pour parcourir un sous-graphique de serveur individuel. Une astuce textuelle correspondante est affichée. Le champ textuel fournit des informations complémentaires sur ce serveur. 3 Cliquez sur le sous-graphique du serveur pour sélectionner les informations du serveur et afficher les Liens rapides sur la droite des graphiques du châssis. La page Condition du serveur (à ne pas confondre avec la page Condition des serveurs) fournit un aperçu du serveur et un point de lancement d'iDRAC (micrologiciel utilisé pour gérer le serveur) vers l'interface Web. REMARQUE : vous devez posséder un nom d'utilisateur et un mot de passe iDRAC pour utiliser l'interface utilisateur iDRAC. Pour plus d'informations sur iDRAC et l'utilisation de l'interface Web iDRAC, consultez le Guide d'utilisation du micrologiciel Integrated Dell Remote Access Controller. Pour afficher la condition d'intégrité d'un serveur spécifique : 1 Ouvrez une session sur l'interface Web de CMC. 2 Développez Présentation des serveurs dans l'arborescence. Tous les serveurs (1 à 16) s'affichent dans la liste développée Serveurs. 3 Cliquez sur le (logement de) serveur que vous souhaitez afficher. La page Condition du serveur s'affiche.146 Utilisation de l'interface Web de CMC Vous pouvez également consulter la page d'état du serveur en cliquant sur le lien d'état dans les liens rapides du serveur sur le côté droit de la page. Tableau 5-27. Condition d'un serveur spécifique : Propriétés Élément Description Logement Indique le logement occupé par le serveur sur le châssis. Les numéros de logement sont des ID séquentiels, qui vont de 1 à 16 (16 logements sont disponibles dans le châssis) et qui permettent d'identifier l'emplacement du serveur dans le châssis. Nom du logement Indique le nom du logement où réside le serveur. Présentation Indique si le serveur est présent dans le logement (Oui ou Non). Lorsque le serveur est absent, l'intégrité, l'état de l'alimentation et le numéro de service du serveur sont inconnus (ne s'affichent pas). Intégrité OK Indique que le serveur est présent et qu'il communique avec CMC. En cas de perte de la communication entre CMC et le serveur, CMC ne pourra pas obtenir ni afficher la condition d'intégrité du serveur. Informatif Affiche des informations sur les serveurs en l'absence de modification de l'état de l'intégrité (OK, Avertissement, Critique). Avertissement Indique que des alertes d'avertissement seules ont été émises et que des actions correctives doivent être effectuées. Si aucune action corrective n'est effectuée, des pannes critiques susceptibles d'affecter l'intégrité du serveur peuvent se produire. Critique Indique qu'au moins une alerte de panne a été générée. La condition Critique représente une panne système du serveur et des actions correctives doivent être effectuées immédiatement. Aucune valeur Lorsque le serveur est absent du logement, les informations d'intégrité ne sont pas fournies. Modèle du serveur Indique le modèle du serveur qui se trouve dans le châssis. Exemples : PowerEdge M600, PowerEdge M605.Utilisation de l'interface Web de CMC 147 Numéro de service Affiche le numéro de service du serveur. Le numéro de service est un identifiant unique fourni par le fabricant pour le support et la maintenance. Si le serveur est absent, ce champ est vide. Micrologiciel iDRAC Indique la version d'iDRAC actuellement installée sur le serveur. Version du CPLD Affiche le numéro de version du circuit logique programmable complexe (CPLD) du serveur. Version du BIOS Indique la version du BIOS qui se trouve sur le serveur. Système d'exploitation Indique le système d'exploitation installé sur le serveur. CPU Information (Informations UC) Affiche le type et le nombre d'UC installées dans le serveur. Mémoire système totale Affiche la mémoire système totale (en GO) installée sur le serveur. Tableau 5-27. Condition d'un serveur spécifique : Propriétés (suite) Élément Description148 Utilisation de l'interface Web de CMC Tableau 5-28. Condition du serveur : journal des événements système iDRAC Élément Description Gravité OK Indique un événement normal qui ne nécessite pas d'actions correctives. Informatif Indique une entrée informative relative à un événement pour lequel la condition Gravité n'a pas été modifiée. Inconnu Indique un événement inconnu/non classifié. Avertissement Indique un événement non critique pour lequel des actions correctives doivent être effectuées rapidement pour éviter les pannes système. Critique Indique un événement critique nécessitant des actions correctives immédiates pour éviter les pannes système. Date/Heure Indique la date et l'heure exactes auxquelles l'événement s'est produit (par exemple, Wed May 02 16:26:55 2007). Description Fournit une brève description de l'événement Tableau 5-29. Condition du serveur spécifique : paramètres réseau d'iDRAC Élément Description Activé sur le LAN Indique si le canal de réseau local est activé (Oui) ou désactivé (Non).Utilisation de l'interface Web de CMC 149 Tableau 5-30. Condition du serveur : paramètres réseau iDRAC IPv4 Élément Description Activé Indique si le protocole IPv4 est utilisé sur le réseau local (Oui). Si le serveur ne prend pas en charge IPv6, le protocole IPv4 est toujours activé et ce paramètre n'est pas affiché. DHCP activé Indique si le protocole DHCP (Dynamic Host Configuration Protocol) est activé (Oui) ou désactivé (Non). Si cette option est activée (Oui), le serveur récupère automatiquement la configuration IP (adresse IP, masque de sousréseau et passerelle) auprès d'un serveur DHCP de votre réseau. Le serveur utilise toujours une adresse IP unique allouée sur votre réseau. IPMI sur le réseau local activé Indique si le canal réseau local IPMI est activé (Oui) ou désactivé (Non). Adresse IP Indique l'adresse IP de l'interface réseau d'iDRAC. Masque de sous-réseau Indique le masque de sous-réseau de l'interface réseau d'iDRAC. Passerelle Indique la passerelle de l'interface réseau d'iDRAC. Tableau 5-31. Condition du serveur : paramètres réseau iDRAC IPv6 Élément Description Activé Indique si le protocole IPv6 est utilisé sur le réseau local (Oui). Configuration automatique activée Indique si la configuration automatique pour IPv6 est activée (Oui). Si la configuration automatique est activée, le serveur récupère automatiquement la configuration IPv6 (Adresse IPv6, Longueur du préfixe et Passerelle IPv6) auprès d'un routeur IPv6 de votre réseau. Le serveur disposera toujours d'une adresse IPv6 unique sur votre réseau et pourra avoir jusqu'à 16 adresses IPv6. Adresse locale de liaison Adresse IPv6 assignée à CMC d'après l'adresse MAC de CMC. Passerelle Affiche la passerelle IPv6 de l'interface réseau d'iDRAC.150 Utilisation de l'interface Web de CMC Adresse IPv6 Affiche une adresse IPv6 pour l'interface réseau iDRAC. Ces adresses peuvent être au nombre de 16 au maximum. La longueur du préfixe, si elle est différente de zéro, est indiquée après une barre oblique (« / »). Tableau 5-32. Condition d'un serveur spécifique : adresse WWN/MAC Élément Description Logement Indique le ou les logements occupés par le serveur du châssis. Emplacement Affiche l'emplacement occupé par les modules d'entrée/sortie. Les six emplacements sont identifiés par une combinaison du nom du groupe (A, B ou C) et le numéro de logement (1 ou 2). Les noms de logement sont les suivants : A1, A2, B1, B2, C1 et C2. Structure Affiche le type de structure d'E/S. Attribuée par le serveur Affiche les adresses WWN/MAC attribuées par le serveur qui sont incorporées au matériel du contrôleur. Les adresses WWN/MAC affichant « - » indiquent que l'interface d'une structure spécifique n'a pas été installée. Attribuée par le châssis Affiche les adresses WWN/MAC attribuées par le châssis qui sont utilisées pour ce logement particulier. Les adresses WWN/MAC affichant « - » indiquent que la fonctionnalité FlexAddress n'a pas été installée. REMARQUE : une coche verte dans la colonne Attribuée par le serveur ou dans la colonne Attribuée par le châssis indique le type des adresses actives. REMARQUE : lorsque FlexAddress est activé, les logements sans serveurs installés affichent l'attribution MAC/WWN attribuée par le châssis pour les contrôleurs Ethernet incorporés (Structure A). Les adresses attribuées par le châssis pour les structures B et C affichent « - », à moins que ces structures soient en cours d'utilisation sur des serveurs dans les logements occupés. On assume que les mêmes types de structure seront déployés dans les logements inoccupés. Tableau 5-31. Condition du serveur : paramètres réseau iDRAC IPv6 (suite) Élément DescriptionUtilisation de l'interface Web de CMC 151 Pour des informations sur la procédure de lancement de la console de gestion iDRAC et les stratégies de signature unique, consultez « Lancement d'iDRAC à l'aide d'une signature unique », à la page 245. Affichage de la condition d'intégrité des modules d'E/S Vous pouvez consulter la condition d'intégrité des modules d'E/S de deux manières : à partir de la section Résumé des composants du châssis sur la page Intégrité du châssis ou sur la page Condition des modules d'E/S. La page Intégrité du châssis fournit une représentation graphique des modules d'E/S installés dans le châssis. Pour consulter la condition d'intégrité des modules d'E/S à l'aide des graphiques du châssis : 1 Ouvrez une session sur l'interface Web de CMC. La page Intégrité du châssis s'affiche. La section située au centre de la page Graphiques du châssis représente une vue de face du châssis et contient la condition d'intégrité des modules d'E/S. La condition d'intégrité des modules d'E/S est indiquée par la couleur du sousgraphique des modules d'E/S : • Aucune couleur : le composant est présent, sous tension et communique avec le contrôleur CMC. Il n'existe aucune indication d'événement indésirable. • Panneau orange : indique que seules des alertes sont émises et que des mesures correctives doivent être prises. • Croix rouge : indique qu'au moins une condition de panne est présente. Cela signifie que CMC peut toujours communiquer avec le composant et que la condition d'intégrité signalée est critique. • Grisé : indique que le module est présent et n'est pas sous tension. Elle ne communique pas avec CMC et il n'y a aucune indication d'événement indésirable. 2 Déplacez le curseur pour parcourir un sous-graphique du module d'E/S individuel. Une astuce textuelle correspondante est affichée. Le champ textuel fournit des informations complémentaires sur le module d'E/S.152 Utilisation de l'interface Web de CMC 3 En cliquant sur le sous-graphique du module d'E/S, vous sélectionnez les informations du module d'E/S et ses Liens rapides pour les afficher à droite des graphiques du châssis. La page Condition des modules d'E/S présente l'ensemble des modules d'E/S associés au châssis. Pour des instructions sur l'affichage de l'intégrité des modules d'E/S via l'interface Web ou RACADM, voir « Surveillance de l'intégrité des modules d'E/S », à la page 423. Affichage de la condition d'intégrité des ventilateurs REMARQUE : lorsqu'une mise à jour du micrologiciel d'un contrôleur CMC ou d'un module iDRAC est en cours sur un serveur, une partie ou l'ensemble des unités de ventilation du châssis fonctionne à 100 %. Ce comportement est normal. Vous pouvez consulter la condition d'intégrité des modules d'E/S de deux manières : à partir de la section Résumé des composants du châssis sur la page Intégrité du châssis ou sur la page Condition des ventilateurs. La page Intégrité du châssis fournit une représentation graphique de tous les ventilateurs installés dans le châssis. Pour consulter la condition d'intégrité des ventilateurs à l'aide des Graphiques du châssis : 1 Ouvrez une session sur l'interface Web de CMC. La page Intégrité du châssis s'affiche. La section située au centre de la page Graphiques du châssis représente une vue arrière du châssis et contient la condition d'intégrité de tous les ventilateurs. La condition d'intégrité du ventilateur est indiquée par la couleur du sous-graphique du ventilateur : • Aucune couleur : le ventilateur est présent et en cours d'exécution ; aucune indication d'événement indésirable. • Panneau orange : indique que seules des alertes sont émises et que des mesures correctives doivent être prises. • Croix rouge : indique qu'au moins une condition de panne est présente. Cela signifie que la condition d'intégrité est signalée comme critique. • Grisé : indique que le ventilateur est présent et n'est pas sous tension. Aucune condition défavorable n'est indiquée.Utilisation de l'interface Web de CMC 153 2 Déplacez le curseur pour survoler un sous-graphique de ventilateur individuel. Une astuce textuelle correspondante est affichée. Le champ textuel fournit des informations complémentaires sur le ventilateur. 3 En cliquant sur le sous-graphique du module d'E/S, vous sélectionnez les informations du ventilateur et ses Liens rapides pour les afficher à droite des graphiques du châssis. La page Condition des ventilateurs fournit la condition et les mesures de vitesse en tours par minute (tr/min) des ventilateurs du châssis. Celui-ci peut comporter un ou plusieurs ventilateurs. CMC, qui contrôle les vitesses des ventilateurs, augmente ou diminue automatiquement ces dernières sur la base des événements qui surviennent à l'échelle du système. CMC génère une alerte et augmente les vitesses des ventilateurs lorsque les événements suivants se produisent : • Le seuil de température ambiante de CMC est dépassé. • Un ventilateur est défaillant. • Un ventilateur est retiré du châssis. Pour afficher la condition d'intégrité des ventilateurs : 1 Ouvrez une session sur l'interface Web de CMC. 2 Sélectionnez Ventilateurs dans l'arborescence du système. La page Condition des ventilateurs s'affiche. Vous pouvez également consulter la page Condition des ventilateurs en cliquant sur le lien d'état dans les liens rapides des informations du ventilateur sur le côté droit de la page. Tableau 5-33. Informations relatives à la condition d'intégrité des ventilateurs Élément Description Nom Affiche le nom du ventilateur au format VENTILATEUR-n, où n correspond au numéro du ventilateur. Présentation Indique si le ventilateur est présent (Oui ou Non). 154 Utilisation de l'interface Web de CMC Affichage de la condition d'iKVM Le module KVM d'accès local destiné à votre châssis de serveur Dell M1000e est appelé Avocent Integrated KVM Switch Module, soit iKVM. La condition d'intégrité d'iKVM associé au châssis peut être consultée sur la page Intégrité du châssis. Pour consulter la condition d'intégrité d'iKVM à l'aide des graphiques du châssis : 1 Ouvrez une session sur l'interface Web de CMC. La page Intégrité du châssis s'affiche. La section inférieure de la page Graphiques du châssis représente une vue arrière du châssis et contient la condition d'intégrité d'iKVM. La condition d'intégrité d'iKVM est indiquée par la couleur du sous-graphique d'iKVM : • Aucune couleur : iKVM est présent, sous tension et communique avec le contrôleur CMC. Il n'existe aucune indication d'événement indésirable. Intégrité OK Indique que l'unité de ventilateur est présente et que le ventilateur communique avec CMC. En cas de perte des communications entre CMC et l'unité de ventilateur, CMC ne pourra pas obtenir ni afficher l'état de l'intégrité du ventilateur. Critique Indique qu'au moins une alerte de panne a été générée. La condition Critique indique une panne du système au niveau du ventilateur nécessitant une réparation immédiate afin d'éviter toute surchauffe et/ou arrêt du système. Inconnu Affiché lorsque le châssis est mis sous tension pour la première fois. En cas de perte des communications entre CMC et l'unité de ventilateur, CMC ne pourra pas obtenir ni afficher l'état de l'intégrité du ventilateur. Vitesse Indique la vitesse du ventilateur en tr/min. Tableau 5-33. Informations relatives à la condition d'intégrité des ventilateurs (suite) Élément DescriptionUtilisation de l'interface Web de CMC 155 • Panneau orange : indique que seules des alertes sont émises et que des mesures correctives doivent être prises. • Croix rouge : indique qu'au moins une condition de panne est présente. Cela signifie que CMC peut toujours communiquer avec iKVM et que la condition d'intégrité signalée est critique. • Grisé : indique que le module iKVM est présent et n'est pas sous tension. Elle ne communique pas avec CMC et il n'y a aucune indication d'événement indésirable. 2 Utilisez le curseur pour survoler le sous-graphique iKVM. Une astuce textuelle correspondante est affichée. Le texte du champ fournit des informations complémentaires sur cet iKVM. 3 En cliquant sur le sous-graphique d'iKVM, vous sélectionnez les informations du ventilateur et ses Liens rapides pour les afficher à droite des graphiques du châssis. Vous pouvez également consulter la page Condition d'iKVM en cliquant sur le lien d'état dans les liens rapides des informations du ventilateur sur le côté droit de la page. Pour des instructions sur l'affichage de la condition du module iKVM et la définition de ses propriétés, voir : • « Affichage de la condition et des propriétés d'iKVM », à la page 408 • « Activation ou désactivation du panneau avant », à la page 407 • « Activation de la console Dell CMC via iKVM », à la page 408 • « Mise à jour du micrologiciel du module iKVM », à la page 410 Pour plus d'informations sur iKVM, voir « Utilisation du module iKVM », à la page 387. Affichage de la condition d'intégrité des unités d'alimentation Vous pouvez consulter la condition d'intégrité des unités d'alimentation de deux manières : à partir de la section Résumé des composants du châssis de la page Intégrité du châssis ou de la page Condition du bloc d'alimentation. La page Intégrité du châssis fournit une représentation graphique de toutes les unités d'alimentation installées dans le châssis. 156 Utilisation de l'interface Web de CMC Pour consulter la condition d'intégrité des unités d'alimentation à l'aide des graphiques du châssis : 1 Ouvrez une session sur l'interface Web de CMC. La page Intégrité du châssis s'affiche. La section inférieure de la page Graphiques du châssis représente une vue arrière du châssis et contient la condition d'intégrité de toutes les unités d'alimentation. L'état d'intégrité des unités d'alimentation est indiqué par la couleur du sous-graphique des unités d'alimentation : • Aucune couleur : unité d'alimentation présente et sous tension qui communique avec le contrôleur CMC. Il n'existe aucune indication d'événement indésirable. • Panneau orange : indique que seules des alertes sont émises et que des mesures correctives doivent être prises. • Croix rouge : indique qu'au moins une condition de panne est présente. Cela signifie que CMC peut toujours communiquer avec l'unité d'alimentation et que la condition d'intégrité signalée est critique. • Grisé : indique que l'unité d'alimentation est présente et n'est pas sous tension. Elle ne communique pas avec CMC et il n'y a aucune indication d'événement indésirable. 2 Placez le curseur sur le sous-graphique d'une unité d'alimentation spécifique pour afficher le champ textuel ou l'info bulle correspondant. Le champ textuel fournit des informations complémentaires sur l'unité d'alimentation. 3 En cliquant sur le sous-graphique de l'unité d'alimentation, vous sélectionnez les informations de celle-ci et ses Liens rapides pour les afficher à droite des graphiques du châssis. La page Condition du bloc d'alimentation affiche la condition et les mesures des unités d'alimentation associées au châssis. Pour plus d'informations sur la gestion de l'alimentation de CMC, voir « Gestion de l'alimentation », à la page 335. Pour afficher la condition d'intégrité des unités d'alimentation : 1 Ouvrez une session sur l'interface Web de CMC. 2 Sélectionnez Blocs d'alimentation dans l'arborescence du système. La page Condition du bloc d'alimentation s'affiche.Utilisation de l'interface Web de CMC 157 Vous pouvez également consulter la page Condition des unités d'alimentation en cliquant sur le lien d'état dans les liens rapides des informations du ventilateur sur le côté droit de la page. Tableau 5-34. Informations relatives à la condition d'intégrité des blocs d'alimentation Élément Description Nom Affiche le nom de l'unité d'alimentation au format PS-n, où n correspond au numéro du bloc d'alimentation. Présentation Indique si le bloc d'alimentation est présent (oui ou non). Intégrité OK Indique que l'unité d'alimentation est présente et qu'elle communique avec CMC. Indique que l'intégrité de l'unité d'alimentation est OK. En cas de perte des communications entre CMC et l'unité de ventilateur, CMC ne pourra pas obtenir ni afficher l'état de l'intégrité de l'unité d'alimentation. Critique Indique que l'unité d'alimentation est en panne et que l'intégrité est critique. Une action corrective doit être effectuée immédiatement. Le non respect de cette consigne peut entraîner l'arrêt du composant en raison d'une panne de courant. Inconnu Affiché lorsque le châssis est mis sous tension pour la première fois. En cas de perte des communications entre CMC et l'unité d'alimentation, CMC ne pourra pas obtenir ni afficher l'état de l'intégrité de l'unité d'alimentation. État de l'alimentation Indique l'état de l'alimentation de l'unité d'alimentation : Connecté, Éteint ou Logement vide. Capacité Affiche la capacité d'alimentation en watts.158 Utilisation de l'interface Web de CMC Affichage de la condition des capteurs de température La page Condition des capteurs de température affiche l'état et les lectures des capteurs de température sur le châssis entier (châssis et serveurs). REMARQUE : La valeur des capteurs de température ne peut pas être modifiée. Toute modification au-delà du seuil génère une alerte qui affecte la vitesse du ventilateur. Par exemple, si le capteur de température ambiante de CMC excède le seuil, la vitesse des ventilateurs du châssis augmente. Pour afficher la condition d'intégrité des capteurs de température : 1 Ouvrez une session sur l'interface Web de CMC. 2 Sélectionnez Capteurs de température dans l'arborescence du système. La page Condition des capteurs de température s'affiche. Tableau 5-35. Condition de la puissance système Élément Description Intégrité globale énergétique Indique la condition d'intégrité (OK, Non critique, Critique, Non récupérable, Autre, Inconnu) de la gestion de l'alimentation pour tout le châssis. Condition de la puissance système Affiche la condition de l'alimentation (Activé, Désactivé, Mis sous tension, Mis hors tension) du châssis. Redondance Indique la condition de la redondance des blocs d'alimentation. Les valeurs sont les suivantes : Non : les blocs d'alimentation ne sont pas redondants. Oui : une redondance totale est appliquée. Tableau 5-36. Informations relatives à la condition d'intégrité des capteurs de température Élément Description ID Affiche l'emplacement du capteur de température. Name (Nom) Affiche le nom de chaque capteur de température pour le châssis et les serveurs. Présentation Indique si le module est présent (Oui) ou absent (Non) dans le châssis.Utilisation de l'interface Web de CMC 159 Intégrité OK Indique que le module est présent et qu'il communique avec CMC. En cas de perte de la communication entre CMC et le serveur, CMC ne pourra pas obtenir ni afficher la condition d'intégrité du serveur. Avertissement Indique que seules des alertes d'avertissement ont été émises et que des actions correctives doivent être effectuées. Si aucune action corrective n'est effectuée, des pannes critiques susceptibles d'affecter l'intégrité du serveur peuvent se produire. Grave Indique qu'au moins une alerte de panne a été générée. La condition Critique représente une panne système du module et des actions correctives doivent être effectuées immédiatement. Inconnu Indique que la communication avec le module n'a pas été établie. C'est généralement parce que le châssis est éteint ou qu'il n'a pas terminé l'initialisation. Lecture Indique la température actuelle en degrés Celsius et Fahrenheit. Seuil maximal Indique la température la plus élevée, en degrés Celsius et Fahrenheit, à laquelle une alerte de panne est générée. Tableau 5-36. Informations relatives à la condition d'intégrité des capteurs de température (suite) Élément Description160 Utilisation de l'interface Web de CMC Affichage de l'état du panneau LCD Vous pouvez consulter la condition d'intégrité du panneau LCD en utilisant les graphiques du châssis associés avec le châssis sur la page Intégrité du châssis. Pour afficher la condition d'intégrité du panneau LCD : 1 Ouvrez une session sur l'interface Web de CMC. La page Intégrité du châssis s'affiche. La partie supérieure des graphiques du châssis représente la façade du châssis. La condition d'intégrité de l'écran LCD est indiquée par la couleur du sous-graphique du LCD : • Aucune couleur : le LCD est présent, sous tension, et communique avec CMC. Aucune indication d'événement indésirable. • Panneau orange : indique que seules des alertes sont émises et que des mesures correctives doivent être prises. • Croix rouge : indique qu'au moins une condition de panne est présente. La condition d'intégrité est critique. • Grisé : indique que le LCD est présent et n'est pas sous tension. Il ne communique pas avec CMC et il n'y a aucune indication d'événement indésirable. 2 Déplacez le curseur sur le sous-graphique du panneau LCD. L'astuce textuelle ou à l'écran correspondante, qui fournit des informations supplémentaires sur le panneau LCD, est affichée. 3 Cliquez sur le sous-graphique LCD pour sélectionner les informations sur le LCD et les afficher sur le côté droit des graphiques du châssis.Utilisation de l'interface Web de CMC 161 Affichage des ID de nom mondial/Contrôle de l'accès aux médias (WWN/MAC) La page Résumé WWN/MAC affiche la configuration WWN et l'adresse MAC d'un logement présent dans le châssis. Configuration de la structure La section Configuration de la structure affiche le type de structure d'entrée/sortie installée dans les structures A, B et C. Une coche verte indique que la structure est activée pour FlexAddress. La fonctionnalité FlexAddress permet le déploiement des adresses WWN/MAC de logement persistantes et attribuées par le châssis, dans plusieurs structures et plusieurs logements de ce dernier. Cette fonctionnalité est activée sur une base par structure et par logement. REMARQUE : voir « Utilisation de FlexAddress », à la page 263 pour plus d'informations sur la fonctionnalité FlexAddress. Adresses WWN/MAC La section Adresse WWN/MAC affiche les informations des adresses WWN/MAC qui sont attribuées à tous les serveurs, même si les logements de serveurs sont actuellement vides. Emplacement : affiche l'emplacement du logement occupé par les modules d'E/S. Les six logements sont identifiés par la combinaison d'un nom de groupe (A, B ou C) et d'un numéro de logement (1 ou 2) : noms des logements A1, A2, B1, B2, C1 ou C2. iDRAC représente le contrôleur de gestion intégré du serveur. Structure affiche le type de structure d'E/S. Attribuée par le serveur affiche les adresses WWN/MAC attribuées par le serveur et incorporées au matériel du contrôleur. Attribuée par le châssis affiche les adresses WWN/MAC attribuées par le châssis à ce logement spécifique. Une coche verte dans la colonne Attribuée par le serveur ou Attribuée par le châssis indique le type des adresses actives. Les adresses attribuées par le châssis sont attribuées lorsque FlexAddress est activée sur le châssis et représente les adresses de logement persistantes. Lorsque les adresses attribuées par le châssis sont cochées, ces adresses seront utilisées même si un serveur est remplacé par un autre. 162 Utilisation de l'interface Web de CMC Configuration des propriétés du réseau CMC REMARQUE : les modifications apportées à la configuration réseau peuvent entraîner la perte de connectivité pendant la session réseau actuelle. Configuration de l'accès initial à CMC Avant de configurer CMC, vous devez configurer les paramètres réseau CMC afin de permettre la gestion à distance de CMC. Cette configuration initiale définit les paramètres de mise en réseau TCP/IP qui permettent l'accès à CMC. REMARQUE : vous devez disposer de privilèges Administrateur de configuration du châssis pour configurer les paramètres réseau CMC. 1 Connectez-vous à l'interface Web. 2 Cliquez sur Présentation du châssis dans l'arborescence. 3 Cliquez sur l'onglet Réseau. La page Configuration réseau s'affiche. 4 Activez ou désactivez DHCP pour CMC en cochant ou en décochant la case Utiliser DHCP (pour l'adresse IP de l'interface réseau CMC). 5 Si vous avez désactivé le protocole DHCP, entrez l'adresse IP, la passerelle et le masque de sous-réseau. 6 Cliquez sur Appliquer les changements au bas de la page.Utilisation de l'interface Web de CMC 163 Configuration des paramètres du réseau local REMARQUE : vous devez disposer de privilèges Administrateur de configuration du châssis pour configurer les paramètres réseau CMC. REMARQUE : les paramètres de la page Configuration réseau, tels que la chaîne de communauté et l'adresse IP du serveur SMTP, affectent à la fois CMC et les paramètres externes du châssis. REMARQUE : si vous disposez de deux modules CMC (principal et de secours) sur le châssis et qu'ils sont tous les deux connectés au réseau, le contrôleur CMC de secours récupère automatiquement les paramètres réseau en cas de défaillance du contrôleur CMC principal. Pour configurer les paramètres LAN du réseau : 1 Connectez-vous à l'interface Web. 2 Cliquez sur l'onglet Réseau. 3 Configurez les paramètres de réseau CMC décrits dans la Figure 5-37 à dans la Figure 5-39, puis cliquez sur Appliquer les modifications. Pour configurer les paramètres de plage et de blocage IP, cliquez sur le bouton Paramètres avancés (voir « Configuration des paramètres de sécurité réseau CMC », à la page 171). Pour actualiser le contenu de la page Configuration réseau, cliquez sur Actualiser. Pour imprimer le contenu de la page Configuration réseau, cliquez sur Imprimer.164 Utilisation de l'interface Web de CMC Tableau 5-37. Paramètres réseau Paramètre Description Adresse MAC de CMC Affiche l'adresse MAC du châssis, qui est un identificateur unique du châssis sur le réseau. Activer l'interface réseau de CMC Active l'interface réseau de CMC Par défaut : activé. Si cette option est cochée : • CMC est accessible via le réseau d'ordinateurs avec lequel il communique. • Les interfaces Web, de ligne de commande (RACADM distant), WSMAN, Telnet et SSH associées à CMC sont disponibles. Si cette option n'est pas cochée : • L'interface réseau de CMC ne peut pas communiquer sur le réseau. • La communication avec le châssis via CMC n'est pas disponible. • Les interfaces Web, de ligne de commande (RACADM à distance), WSMAN, Telnet et SSH associées à CMC ne sont pas disponibles. • L'interface Web iDRAC du serveur, l'interface de ligne de commande locale, les modules d'E/S et iKVM sont toujours accessibles. • Les adresses réseau d'iDRAC et de CMC peuvent être obtenues dans ce cas à partir de l'écran LCD du châssis. REMARQUE : l'accès aux autres composants du châssis accessibles via le réseau n'est pas affecté en cas de désactivation ou de perte du réseau sur le châssis. Enregistrer CMC sur DNS Cette propriété enregistre le nom CMC sur le serveur DNS. Par défaut : Décoché (désactivé). REMARQUE : certains serveurs DNS ne peuvent enregistrer que des noms de 31 caractères maximum. Assurez-vous que le nom désigné se trouve dans la limite DNS requise. Utilisation de l'interface Web de CMC 165 Nom CMC DNS Affiche le nom CMC uniquement lorsque l'option Enregistrer CMC sur DNS est sélectionnée. Le nom CMC par défaut est CMC_numéro_de_service, où numéro de service est le numéro de service du châssis, par exemple : CMC-00002. Il peut comporter jusqu'à 63 caractères. Le premier caractère doit être une lettre (a-z, A-Z) et doit être suivi de caractères alphanumériques (a-z, A-Z, 0-9) ou de tirets (-). Utiliser DHCP pour le nom de domaine DNS Utilise le nom de domaine DNS par défaut. Cette case est active uniquement lorsque l'option Utiliser DHCP (pour l'adresse IP de l'interface réseau de CMC) est sélectionnée. Par défaut : activé Nom de domaine DNS Le nom de domaine DNS par défaut est un caractère vide. Ce champ est modifiable uniquement lorsque la case Utiliser DHCP pour le nom de domaine DNS est cochée. Négociation automatique (1 Go) Détermine si CMC définit automatiquement le mode duplex et la vitesse réseau en communicant avec le routeur ou le commutateur le plus proche (activé) ou vous permet de définir manuellement le mode duplex et la vitesse réseau (désactivé). Par défaut : activé. Si la négociation automatique est activée, CMC communique automatiquement avec le routeur ou commutateur le plus proche et fonctionne à une vitesse de 1 Go. Lorsque l'option Négociation automatique est désactivée, vous devez définir manuellement le mode duplex et la vitesse réseau. Tableau 5-37. Paramètres réseau (suite) Paramètre Description166 Utilisation de l'interface Web de CMC Vitesse du réseau Définissez la vitesse réseau sur 100 Mbits/s ou 10 Mbits/s en fonction de votre environnement réseau. REMARQUE : le paramètre Vitesse réseau doit correspondre à votre configuration réseau afin de garantir l'efficacité du débit du réseau. Si la vitesse réseau que vous paramétrez est inférieure à la vitesse de votre configuration réseau, la consommation de bande passante augmente et les communications réseau ralentissent. Déterminez si votre réseau prend en charge les vitesses réseau ci-dessus et paramétrez-le en conséquence. Si votre configuration réseau ne correspond à aucune de ces valeurs, Dell vous recommande d'utiliser la négociation automatique ou de contacter le fabricant de votre équipement réseau. REMARQUE : pour utiliser les vitesses de 1 000 Mo ou 1 Go, sélectionnez Négociation automatique. Mode duplex Définissez le mode duplex sur Total ou Semi en fonction de votre environnement réseau. Conséquences : si l'option Négociation automatique est activée pour un périphérique mais non pour l'autre, alors le périphérique qui utilise la négociation automatique peut déterminer la vitesse réseau de l'autre périphérique, mais non le mode duplex. Dans ce cas, le mode duplex utilisé par défaut pendant la négociation automatique est le mode Semi duplex. Cette différence de mode duplex entraîne un ralentissement des connexions réseau. REMARQUE : les paramètres Vitesse réseau et Mode duplex ne sont pas disponibles si la négociation automatique est activée. MTU Définit la taille de l'unité de transmission maximale (MTU) ou le paquet le plus volumineux pouvant être transmis via l'interface. Plage de configuration : 576 à 1 500. Par défaut : 1 500. REMARQUE : IPv6 requiert une MTU minimale de 1 280. Si IPv6 est activé et que cfgNetTuningMtu est défini sur une valeur inférieure, CMC utilisera une MTU de 1 280. Tableau 5-37. Paramètres réseau (suite) Paramètre DescriptionUtilisation de l'interface Web de CMC 167 Tableau 5-38. Paramètres IPv4 Paramètre Description Activer IPv4 Permet à CMC d'utiliser le protocole IPv4 pour communiquer sur le réseau. Le fait de décocher cette case n'empêche pas la mise en réseau IPv6. Par défaut : coché (activé). Activation DHCP Permet à CMC de demander et d'obtenir automatiquement une adresse IP auprès du serveur DHCP (protocole de configuration dynamique des hôtes) IPv4. Par défaut : coché (activé). Si cette option est cochée, CMC récupère automatiquement la configuration IPv4 (adresse IP, masque de sous-réseau et passerelle) auprès d'un serveur DHCP de votre réseau. CMC utilise toujours une adresse IP unique allouée sur votre réseau. REMARQUE : lorsque cette fonctionnalité est activée, les champs des propriétés Adresse IP statique, Masque de sous-réseau statique et Passerelle statique (situés immédiatement après cette option dans la page Configuration réseau) sont désactivés et toutes les valeurs précédemment saisies pour ces propriétés sont ignorées. Si cette option n'est pas cochée, vous devez taper manuellement l'adresse IP statique, le masque de sousréseau statique et la passerelle statique dans les champs de texte qui suivent immédiatement cette option sur la page Configuration réseau. Adresse IP statique Affiche l'adresse IPv4 de l'interface réseau de CMC. Masque de sous-réseau statique Spécifie le masque de sous-réseau IPv4 statique de l'interface réseau de CMC. 168 Utilisation de l'interface Web de CMC Passerelle statique Affiche la passerelle IPv4 de l'interface réseau de CMC. REMARQUE : les champs Adresse IP statique, Masque de sous-réseau statique et Passerelle statique sont actifs uniquement si Activation DHCP (le champ de propriété précédant ces champs) est désactivé (décoché). Dans ce cas, vous devez taper manuellement l'adresse IP statique, le masque de sous-réseau statique et la passerelle statique pour que CMC puisse les utiliser sur le réseau. REMARQUE : les champs Adresse IP statique, Masque de sous-réseau statique et Passerelle statique s'appliquent uniquement au périphérique du châssis. Ils n'affectent pas les autres composants de la solution du châssis accessibles sur le réseau tels que le réseau du serveur, l'accès local, les modules d'E/S et iKVM. Utiliser DHCP pour obtenir des adresses de serveur DNS Obtient les adresses de serveur DNS principales et secondaires du serveur de DHCP au lieu des paramètres statiques. Par défaut : coché (activé) par défaut REMARQUE : si l'option Utiliser DHCP (pour l'adresse IP de l'interface réseau de CMC) est activée, activez la propriété Utiliser DHCP pour obtenir des adresses de serveur DNS. Si cette option est cochée, CMC récupère automatiquement son adresse IP DNS auprès d'un serveur DHCP sur votre réseau. REMARQUE : lorsque cette propriété est activée, les champs de propriété Serveur DNS statique préféré et Autre serveur DNS statique (situés immédiatement après cette option dans la page Configuration réseau) sont désactivés et toutes les valeurs précédemment entrées pour ces propriétés sont ignorées. Si cette option n'est pas sélectionnée, CMC récupère l'adresse IP DNS auprès du serveur DNS statique préféré et du serveur DNS statique alternatif. Les adresses de ces serveurs sont spécifiées dans les champs de texte qui suivent immédiatement cette option sur la page Configuration réseau. Tableau 5-38. Paramètres IPv4 (suite) Paramètre DescriptionUtilisation de l'interface Web de CMC 169 Serveur DNS statique préféré Spécifie l'adresse IP statique du serveur DNS préféré. Le serveur DNS statique préféré est uniquement mis en œuvre lorsque l'option Utiliser DHCP pour obtenir des adresses de serveur DNS est désactivée. Autre serveur DNS statique Spécifie l'adresse IP statique du serveur DNS auxiliaire. L'autre serveur DNS statique est uniquement mis en œuvre lorsque l'option Utiliser DHCP pour obtenir des adresses de serveur DNS est désactivée. Si vous ne disposez pas d'un serveur DNS alternatif, entrez l'adresse IP 0.0.0.0. Tableau 5-39. Paramètres IPv6 Paramètre Description Activer IPv6 Permet à CMC d'utiliser le protocole IPv6 pour communiquer sur le réseau. Le fait de décocher cette case n'empêche pas la mise en réseau IPv4. Par défaut : coché (activé). Activation de la configuration automatique Permet à CMC d'utiliser le protocole IPv6 pour obtenir l'adresse IPv6 et les paramètres de la passerelle auprès d'un routeur IPv6 configuré pour fournir ces informations. CMC dispose alors d'une adresse IPv6 unique sur votre réseau. Par défaut : coché (activé). REMARQUE : lorsque cette fonctionnalité est activée, les champs des propriétés Adresse IPv6 statique, Longueur de préfixe statique et Passerelle statique (situés immédiatement après cette option dans la page Configuration réseau) sont désactivés et toutes les valeurs précédemment saisies pour ces propriétés sont ignorées. Si cette option n'est pas cochée, vous devez taper manuellement l'adresse IPv6 statique, la longueur de préfixe statique et la passerelle statique dans les champs de texte qui suivent immédiatement cette option sur la page Configuration réseau. Adresse IPv6 statique Spécifie l'adresse IPv6 de l'interface réseau de CMC lorsque la configuration automatique n'est pas activée. Tableau 5-38. Paramètres IPv4 (suite) Paramètre Description170 Utilisation de l'interface Web de CMC Longueur de préfixe statique Spécifie la longueur du préfixe IPv6 de l'interface réseau de CMC lorsque la configuration automatique n'est pas activée. Passerelle statique Spécifie la passerelle IPv6 statique de l'interface réseau de CMC lorsque la configuration automatique n'est pas activée. REMARQUE : les champs Adresse IPv6 statique, Longueur de préfixe statique et Passerelle statique sont actifs uniquement si Activer pour l'autoconfiguration (le champ de propriété précédant ces champs) est désactivé (décoché). Dans ce cas, vous devez taper manuellement l'adresse IPv6 statique, la longueur de préfixe statique et la passerelle statique pour que CMC puisse les utiliser sur le réseau IPv6. REMARQUE : les champs Adresse IPv6 statique, longueur de préfixe statique et Passerelle statique s'appliquent uniquement au périphérique du châssis. Ils n'affectent pas les autres composants de la solution du châssis accessibles sur le réseau tels que le réseau du serveur, l'accès local, les modules d'E/S et iKVM. Serveur DNS statique préféré Spécifie l'adresse IPv6 statique du serveur DNS préféré. Le serveur DNS statique préféré est uniquement mis en œuvre lorsque l'option Utiliser DHCP pour obtenir des adresses de serveur DNS est désactivée ou décochée. Les deux zones de configuration IPv4 et IPv6 comportent une entrée pour ce serveur. Autre serveur DNS statique Spécifie l'adresse IPv6 statique du serveur DNS alternatif. Si vous ne disposez pas d'un serveur DNS alternatif, saisissez l'adresse IPv6 « :: ». L'entrée du serveur DNS statique alternatif est uniquement prise en compte lorsque l'option Utiliser DHCP pour obtenir des adresses de serveur DNS est désactivée ou décochée. Les deux zones de configuration IPv4 et IPv6 comportent une entrée pour ce serveur. Tableau 5-39. Paramètres IPv6 (suite) Paramètre DescriptionUtilisation de l'interface Web de CMC 171 Configuration des paramètres de sécurité réseau CMC REMARQUE : pour effectuer les étapes suivantes, vous devez disposer des privilèges Administrateur de configuration du châssis. Pour configurer les paramètres de sécurité réseau CMC. 1 Connectez-vous à l'interface Web. 2 Cliquez sur l'onglet Réseau. La page Configuration réseau s'affiche. 3 Cliquez sur le bouton Paramètres avancés. La page Sécurité réseau s'affiche. 4 Configurez les paramètres de sécurité réseau CMC. La Figure 5-40 décrit les paramètres de la page Sécurité réseau. REMARQUE : les paramètres Plage IP et Blocage IP s'appliquent uniquement à IPv4. Tableau 5-40. Paramètres de la page Sécurité réseau Paramètres Description Plage IP activée Active la fonctionnalité de vérification de la plage IP, qui définit une plage d'adresses IP spécifique pouvant accéder à CMC. Adresse de la plage IP Détermine l'adresse IP de base pour la vérification de la plage.172 Utilisation de l'interface Web de CMC Masque de la plage IP Définit une plage d'adresses IP spécifique pouvant accéder à CMC : ce processus est appelé vérification de la plage IP. La vérification de la plage IP permet uniquement l'accès à CMC à partir des clients ou des stations de gestion dont les adresses IP appartiennent à la plage spécifiée par l'utilisateur. Toutes les autres ouvertures de session sont refusées. Par exemple : Masque de plage IP : 255.255.255.0 (11111111.11111111.11111111.00000000) Adresse de la plage IP : 192.168.0.255 (11000000.10101000.00000000.11111111) La plage d'adresses IP résultante correspond à n'importe quelle adresse contenant 192.168.0, c'est-à-dire toute adresse comprise entre 192.168.0.0 et 192.168.0.255. Blocage IP activé Active la fonctionnalité de blocage d'une adresse IP, qui limite le nombre de tentatives de connexion ayant échoué à partir d'une adresse IP spécifique pour une durée présélectionnée. Nombre d'échecs avant blocage IP Définit le nombre d'échecs de tentatives d'ouverture de session à partir d'une adresse IP avant que les tentatives d'ouverture de session ne soient rejetées à partir de cette adresse. Plage d'échecs avant blocage IP Détermine la période, en secondes, pendant laquelle doit se produire le nombre d'échecs avant blocage IP pour déclencher la période de pénalité du bloc IP. Tableau 5-40. Paramètres de la page Sécurité réseau (suite) Paramètres DescriptionUtilisation de l'interface Web de CMC 173 5 Cliquez sur Appliquer pour enregistrer vos paramètres. Pour actualiser le contenu de la page Sécurité réseau, cliquez sur Actualiser. Pour imprimer le contenu de la page Sécurité réseau, cliquez sur Imprimer. Configuration des réseaux locaux virtuels (VLAN) Les VLAN sont utilisés pour permettre à plusieurs VLAN de coexister sur le même câble réseau physique et pour diviser le trafic réseau à des fins de sécurité ou de gestion de la charge . Lorsque vous activez la fonctionnalité VLAN, chaque paquet réseau reçoit un numéro VLAN. Pour configurer des réseaux VLAN : 1 Connectez-vous à l'interface Web. 2 Cliquez sur l'onglet Réseau→ sous-onglet VLAN. La page Paramètres des numéros VLAN apparaît. Les numéros VLAN correspondent aux propriétés du châssis. Ils demeurent associés au châssis, même en cas de retrait d'un composant. 3 Configurez les paramètres VLAN CMC/iDRAC. Période de pénalité avant blocage IP Période en secondes pendant laquelle les tentatives d'ouverture de session à partir d'une adresse IP avec un nombre d'échecs excessif sont rejetées. REMARQUE : les champs Nombre d'échecs avant blocage d'adresse IP, Plage d'échecs avant blocage d'adresse IP et Période de pénalité avant blocage d'adresse IP sont actifs uniquement si la case Blocage d'adresse IP activé (le champ de propriétés précédant ces champs) est cochée (activée). Dans ce cas, vous devez saisir manuellement les propriétés Nombre d'échecs avant blocage d'adresse IP, Plage d'échecs avant blocage d'adresse IP et Période de pénalité avant blocage d'adresse IP. Tableau 5-40. Paramètres de la page Sécurité réseau (suite) Paramètres Description174 Utilisation de l'interface Web de CMC La Figure 5-41 décrit les paramètres de la page Sécurité réseau. 4 Cliquez sur Appliquer pour enregistrer les paramètres. Vous pouvez également accéder à cette page depuis Présentation du châssis→ Serveurs→ onglet Configuration→ sous-onglet VLAN. Ajout et configuration d'utilisateurs CMC Pour gérer votre système avec CMC et maintenir la sécurité du système, créez des utilisateurs uniques et octroyez-leur des droits d'administration spécifiques (ou autorité basée sur les rôles). Pour une sécurité supplémentaire, vous pouvez aussi configurer des alertes qui sont envoyées par e-mail à des utilisateurs spécifiques quand un événement système spécifique se produit. Types d'utilisateurs Il existe deux types d'utilisateurs : les utilisateurs CMC et les utilisateurs iDRAC. Les utilisateurs CMC sont également appelés « utilisateurs châssis ». Étant donné qu'iDRAC réside sur le serveur, les utilisateurs iDRAC sont également appelés « utilisateurs du serveur ». Tableau 5-41. Paramètres des numéros VLAN Paramètre Description Logement Indique le logement occupé par le serveur du châssis. Les logements sont des ID séquentiels, qui vont de 1 à 16 (pour les 16 logements disponibles dans le châssis), qui permettent d'identifier l'emplacement du serveur dans le châssis. Nom Affiche le nom du serveur dans chaque logement. Activer Active VLAN si la case est cochée. VLAN est désactivé par défaut. Priorité Indique le niveau de priorité de la trame, qui peut être utilisé pour établir la priorité des différents types de trafic (voix, vidéo et données). Les priorités valides sont comprises entre 0 et 7, où 0 (priorité par défaut) correspond à la priorité inférieure et 7 à la priorité supérieure. ID Affiche l'ID VLAN (identification). Les ID VLAN valides sont les suivants : 1 à 4 000 et 4 021 à 4 094. L'ID VLAN par défaut est 1. Utilisation de l'interface Web de CMC 175 Les utilisateurs CMC peuvent être des utilisateurs locaux ou des utilisateurs Active Directory. Les utilisateurs iDRAC peuvent également être des utilisateurs locaux ou de service d'annuaire. Sauf si un utilisateur CMC possède des privilèges administrateur de serveur, les privilèges octroyés à un utilisateur CMC ne sont pas automatiquement transférés à ce même utilisateur sur un serveur car les utilisateurs du serveur sont créés indépendamment des utilisateurs CMC. En d'autres termes, les utilisateurs CMC Active Directory et les utilisateurs iDRAC Active Directory résident sur deux branches différentes de l'arborescence Active Directory. Pour créer un utilisateur local du serveur, l'administrateur de configuration des utilisateurs doit directement ouvrir une session sur le serveur. Les utilisateurs de configuration ne peuvent pas créer un utilisateur de serveur depuis CMC, et vice versa. Cette règle protège la sécurité et l'intégrité des serveurs. Tableau 5-42. Types d'utilisateurs Privilège Description Ouverture de session utilisateur CMC L'utilisateur peut se connecter à CMC et afficher toutes les données de CMC, mais ne peut pas ajouter ou modifier des données ou exécuter des commandes. Un utilisateur peut posséder d'autres privilèges sans nécessairement posséder le privilège d'ouverture de session sur CMC. Cette fonctionnalité est utile lorsqu'un utilisateur n'a temporairement plus le droit d'ouvrir une session. Lorsque le privilège d'ouverture de session sur CMC de cet utilisateur est rétabli, l'utilisateur conserve tous les autres privilèges précédemment octroyés.176 Utilisation de l'interface Web de CMC Administrateur de configuration du châssis L'utilisateur peut ajouter ou modifier des données qui : • Identifient le châssis, telles que le nom du châssis et son emplacement. • Sont attribuées spécifiquement au châssis, tel que le mode IP (statique ou DHCP), l'adresse IP statique, la passerelle statique et le masque de sous-réseau statique. • Fournissent des services au châssis, tels que la date et heure, la mise à jour de micrologiciel et la réinitialisation CMC. • Sont associées au châssis, par exemple, le nom de logement et la priorité du logement. Bien que ces propriétés s'appliquent aux serveurs, ce sont strictement des propriétés du châssis qui concernent les logements plutôt que les serveurs eux-mêmes. C'est pourquoi, les noms de logement et les priorités de logement peuvent être ajoutés ou modifiés, que les serveurs soient présents dans les logements ou non. Lorsqu'un serveur est déplacé vers un châssis différent, il hérite du nom et de la priorité du logement affectés au logement qu'il occupe dans le nouveau châssis. Le nom et la priorité du logement précédent restent avec le châssis précédent. REMARQUE : les utilisateurs de CMC disposant de privilèges Chassis Configuration Administrator (administrateur de configuration de châssis) peuvent configurer les paramètres d'alimentation. Cependant, le privilège Chassis Control Administrator est nécessaire pour effectuer des opérations d'alimentation de châssis, notamment la mise sous et hors tension. Administrateur de configuration des utilisateurs L'utilisateur peut : • Ajouter un nouvel utilisateur. • Supprimer un utilisateur existant. • Modifier le mot de passe d'un utilisateur. • Modifier les privilèges d'un utilisateur. • Activer ou désactiver les privilèges d'ouverture de session d'un utilisateur tout en conservant le nom et les autres privilèges de l'utilisateur dans la base de données. Tableau 5-42. Types d'utilisateurs (suite) Privilège DescriptionUtilisation de l'interface Web de CMC 177 Administrateur d'effacement des journaux L'utilisateur peut effacer le journal matériel et le journal CMC. Administrateur et contrôle du châssis (Commandes d'alimentation) Les utilisateurs CMC qui disposent du privilège Administrateur privilégié du châssis peuvent effectuer toutes les opérations liées à l'alimentation : Contrôler les opérations d'alimentation du châssis, y compris la mise sous tension, la mise hors tension et le cycle d'alimentation. REMARQUE : pour configurer des paramètres d'alimentation, le privilège de Chassis Configuration Administrator est nécessaire. Tableau 5-42. Types d'utilisateurs (suite) Privilège Description178 Utilisation de l'interface Web de CMC Server Administrator Ceci est un privilège général : les droits d'administrateur de serveur sont des droits permanents qui autorisent l'utilisateur CMC à effectuer des opérations sur n'importe quel serveur présent dans le châssis. Lorsqu'un utilisateur doté du privilège d'administrateur du serveur émet une action à effectuer sur un serveur, le micrologiciel CMC envoie la commande au serveur cible sans vérifier les privilèges de cet utilisateur sur le serveur. Autrement dit, les droits d'administrateur de serveur annulent toute absence de droits d'administrateur sur le serveur. Sans les droits d'administrateur de serveur, un utilisateur créé sur le châssis ne peut exécuter une commande sur un serveur que lorsque les conditions suivantes sont réunies : • Le même nom d'utilisateur est utilisé sur le serveur. • Le même nom d'utilisateur doit avoir exactement le même mot de passe sur le serveur. • L'utilisateur doit avoir le droit d'exécuter la commande. Lorsqu'un utilisateur CMC qui ne dispose pas du privilège Administrateur de serveur émet une action à effectuer sur un serveur, CMC envoie une commande au serveur cible accompagnée du nom de connexion et du mot de passe de l'utilisateur. Si l'utilisateur n'existe pas sur le serveur ou si le mot de passe ne correspond pas, l'utilisateur se voit dans l'impossibilité d'effectuer l'action. Si l'utilisateur existe sur le serveur cible et si le mot de passe correspond, le serveur répond avec les privilèges accordés à l'utilisateur sur le serveur. Selon les privilèges renvoyés par le serveur, le micrologiciel CMC décide si l'utilisateur a le droit d'effectuer l'action. Vous trouverez ci-dessous la liste des privilèges et des actions serveur auxquels l'administrateur du serveur a droit. Ces droits sont appliqués uniquement lorsque l'utilisateur du châssis ne dispose pas de droits d'administration serveur sur le châssis. Tableau 5-42. Types d'utilisateurs (suite) Privilège DescriptionUtilisation de l'interface Web de CMC 179 Administrateur du serveur (suite) Administrateur de configuration du serveur : • Définir l'adresse IP • Définir la passerelle • Définir le masque de sous-réseau • Définir le périphérique de démarrage initial Configurer les utilisateurs : • Définir le mot de passe racine iDRAC • Réinitialiser iDRAC Administrateur de contrôle du serveur : • Sous tension • Hors tension • Cycle d'alimentation • Arrêt normal • Redémarrage du serveur Utilisateur d'alertes de test L'utilisateur peut envoyer des messages d'alerte d'essai. Administrateur de commandes de débogage L'utilisateur peut exécuter des commandes de diagnostic système. Administrateur de structure A L'utilisateur peut définir et configurer le module d'E/S de la structure A, qui réside dans le logement A1 ou A2 des logements d'E/S. Administrateur de structure B L'utilisateur peut définir et configurer le module d'E/S de la structure B, qui réside dans le logement B1 ou B2 des logements d'E/S. Administrateur de structure C L'utilisateur peut définir et configurer le module d'E/S de la structure C, qui réside dans le logement C1 ou C2 des logements d'E/S. Tableau 5-42. Types d'utilisateurs (suite) Privilège Description180 Utilisation de l'interface Web de CMC Les groupes d'utilisateurs CMC fournissent une série de groupes d'utilisateurs disposant de privilèges préattribués. REMARQUE : si vous sélectionnez Administrateur, Utilisateur privilégié ou Utilisateur invité, puis que vous ajoutez ou supprimez un privilège du jeu prédéfini, le groupe CMC devient automatiquement Personnalisé. Super utilisateur L'utilisateur a un accès racine à CMC et a des privilèges d'administrateur de configuration des utilisateurs et de connexion à l'utilisateur CMC. Seuls les utilisateurs avec des privilèges Super utilisateur peuvent accorder aux utilisateurs nouveaux ou existants des privilèges d'Administrateur des commandes de débogage et de Super utilisateur. Tableau 5-43. Privilèges de groupe CMC Groupe d'utilisateurs Privilèges octroyés Administrateur • Ouverture de session utilisateur CMC • Administrateur de configuration du châssis • Administrateur de configuration des utilisateurs • Administrateur d'effacement des journaux • Server Administrator • Utilisateur d'alertes de test • Administrateur de commandes de débogage • Administrateur de structure A • Administrateur de structure B • Administrateur de structure C Tableau 5-42. Types d'utilisateurs (suite) Privilège DescriptionUtilisation de l'interface Web de CMC 181 Utilisateur privilégié • Connexion • Administrateur d'effacement des journaux • Administrateur et contrôle du châssis • Server Administrator • Utilisateur d'alertes de test • Administrateur de structure A • Administrateur de structure B • Administrateur de structure C Utilisateur invité Connexion Personnalisé Sélectionnez n'importe quelle combinaison des autorisations suivantes : • Ouverture de session utilisateur CMC • Administrateur de configuration du châssis • Administrateur de configuration des utilisateurs • Administrateur d'effacement des journaux • Administrateur et contrôle du châssis • Super utilisateur • Server Administrator • Utilisateur d'alertes de test • Administrateur de commandes de débogage • Administrateur de structure A • Administrateur de structure B • Administrateur de structure C None (Aucune) Aucun droit attribué Tableau 5-43. Privilèges de groupe CMC (suite) Groupe d'utilisateurs Privilèges octroyés182 Utilisation de l'interface Web de CMC Tableau 5-44. Comparaison des privilèges des administrateurs CMC, des utilisateurs privilégiés et des utilisateurs invités Privilège défini Droits d'administrateur Utilisateur privilégié Autorisations Utilisateur invité Autorisations Ouverture de session utilisateur CMC Administrateur de configuration du châssis Administrateur de configuration des utilisateurs Administrateur d'effacement des journaux Administrateur et contrôle du châssis Super utilisateur Server Administrator Utilisateur d'alertes de test Administrateur de commandes de débogage Administrateur de structure A Administrateur de structure B Administrateur de structure CUtilisation de l'interface Web de CMC 183 Ajout et gestion des utilisateurs À partir des pages Utilisateurs et Configuration utilisateur de l'interface Web, vous pouvez afficher les informations relatives aux utilisateurs CMC, ajouter un nouvel utilisateur et modifier les paramètres d'un utilisateur existant. Vous pouvez configurer jusqu'à 16 utilisateurs locaux. Si des utilisateurs supplémentaires sont nécessaires et que votre entreprise utilise Microsoft Active Directory ou les services LDAP, vous pouvez le configurer pour permettre l'accès à CMC. La configuration d'Active Directory vous permet d'ajouter des privilèges d'utilisateur CMC à vos utilisateurs existants dans votre logiciel Active Directory et de les contrôler, en plus des 16 utilisateurs locaux. Pour plus d'informations, voir « Utilisation du service d'annuaire CMC », à la page 285. Pour plus d'informations sur LDAP, consultez la section « Utilisation de CMC avec les services Lightweight Directory Access Protocol » La session de l'utilisateur peut être ouverte via l'interface Web, ou encore via une session Telnet, série, SSH ou iKVM. Un maximum de 22 sessions actives (interface Web, Telnet, série, SSH et iKVM, dans n'importe quelle combinaison) peuvent être partagées par les utilisateurs. REMARQUE : pour plus de sécurité, il est vivement recommandé de modifier le mot de passe par défaut du compte root (User 1). Le compte root est le compte d'administration par défaut fourni avec le contrôleur CMC. Pour modifier le mot de passe par défaut de ce compte, cliquez sur ID utilisateur 1 afin d'ouvrir la page Configuration des utilisateurs. L'aide relative à cette page est disponible via le lien Aide en haut à droite de la page. Pour ajouter et configurer des utilisateurs CMC : REMARQUE : vous devez disposer du privilège de configuration des utilisateurs pour effectuer les étapes suivantes. 1 Connectez-vous à l'interface Web. 2 Cliquez sur l'onglet Authentification utilisateur. La page Utilisateurs locaux s'affiche, répertoriant l'ID, le nom d'utilisateur, les privilèges CMC et l'état d'ouverture de session de chaque utilisateur, y compris ceux de l'utilisateur racine. Aucune information utilisateur n'est affichée pour les ID utilisateur disponibles pour la configuration.184 Utilisation de l'interface Web de CMC 3 Cliquez sur un numéro d'ID utilisateur disponible. La page Configuration utilisateur s'affiche. Pour actualiser le contenu de la page Utilisateurs, cliquez sur Actualiser. Pour imprimer le contenu de la page Utilisateurs, cliquez sur Imprimer. 4 Sélectionnez les paramètres généraux de l'utilisateur. Tableau 5-45. décrit les paramètres généraux de configuration d'un nom d'utilisateur et d'un mot de passe CMC (nouveau ou existant). Propriété Description Réf. utilisateur (lecture seule) Identifie un utilisateur à l'aide de l'un des 16 nombres séquentiels prédéfinis utilisés à des fins d'écriture de scripts de l'interface de ligne de commande. La réf. utilisateur identifie un utilisateur donné lors de la configuration de cet utilisateur à l'aide de l'outil de l'interface de ligne de commande (RACADM). Vous ne pouvez pas modifier la référence utilisateur. Si vous modifiez des informations d'utilisateur root, ce champ est statique. Vous ne pouvez pas modifier le nom d'utilisateur root. Activer l'utilisateur Active ou désactive l'accès de l'utilisateur à CMC. Nom d'utilisateur Définit ou affiche le nom d'utilisateur CMC unique correspondant à l'utilisateur. Ce nom d'utilisateur peut contenir jusqu'à 16 caractères. Les noms d'utilisateur CMC ne peuvent pas contenir de barres obliques (/) ni de points (.). REMARQUE : si vous modifiez le nom d'utilisateur, le nouveau nom apparaît dans l'interface utilisateur lors de la prochaine ouverture de session. Tout utilisateur qui ouvre une session après l'application du nouveau nom d'utilisateur pourra immédiatement observer la modification. Modifier le mot de passe Permet la modification du mot de passe d'un utilisateur existant. Définissez le nouveau mot de passe dans le champ Nouveau mot de passe. La case Modifier le mot de passe ne peut pas être sélectionnée si vous configurez un nouvel utilisateur. Vous ne pouvez la sélectionner que lorsque vous modifiez un paramètre utilisateur existant. Utilisation de l'interface Web de CMC 185 5 Affectez l'utilisateur à un groupe d'utilisateurs du contrôleur CMC. La Figure 5-42 décrit les privilèges utilisateur CMC. Lorsque vous sélectionnez un privilège utilisateur dans le menu déroulant CMC Group (Groupe CMC), les privilèges activés (cochés) correspondent aux paramètres prédéfinis pour ce groupe. Vous pouvez modifier les privilèges octroyés à un utilisateur en sélectionnant ou en désélectionnant des cases à cocher. Après avoir sélectionné un groupe CMC ou défini les privilèges d'un utilisateur, cliquez sur Appliquer les changements pour que les changements effectués soient conservés. Pour actualiser le contenu de la page Configuration utilisateur, cliquez sur Actualiser. Pour imprimer le contenu de la page Configuration utilisateur, cliquez sur Imprimer. Mot de passe Définit un nouveau mot de passe pour un utilisateur existant. Pour modifier le mot de passe, vous devez également cocher la case Modifier le mot de passe. Le mot de passe peut contenir jusqu'à 20 caractères, qui s'affichent sous forme de points à mesure de leur saisie. Confirmer le mot de passe Vérifie le mot de passe que vous avez entré dans le champ Nouveau mot de passe. REMARQUE : les champs Nouveau mot de passe et Confirmez le nouveau mot de passe sont modifiables uniquement lorsque vous (1) configurez un nouvel utilisateur ou que vous (2) modifiez les paramètres d'un utilisateur existant, et que la case Modifier le mot de passe est cochée. Tableau 5-45. décrit les paramètres généraux de configuration d'un nom d'utilisateur et d'un mot de passe CMC (nouveau ou existant). (suite) Propriété Description186 Utilisation de l'interface Web de CMC Configuration et gestion des certificats Microsoft Active Directory REMARQUE : vous devez disposer du privilège Administrateur de configuration du châssis pour configurer les paramètres Active Directory pour CMC. REMARQUE : pour plus d'informations sur la configuration d'Active Directory et sur la manière de configurer Active Directory avec le schéma standard ou un schéma étendu, voir « Utilisation du service d'annuaire CMC », à la page 285. Vous pouvez utiliser le service Microsoft Active Directory pour configurer votre logiciel afin de fournir l'accès à CMC. Le service Active Directory vous permet d'ajouter et de contrôler les privilèges utilisateur CMC de vos utilisateurs existants. Pour accéder à la page Menu principal d'Active Directory : 1 Connectez-vous à l'interface Web. 2 Cliquez sur l'onglet Authentification utilisateur, puis cliquez sur le sousonglet Services d'annuaire. 3 Sélectionnez le bouton radio pour Microsoft Active Directory schéma standard ou schéma étendu. Les tableaux Active Directory s'affichent. Paramètres communs Cette section vous permet de configurer et d'afficher les paramètres communs d'Active Directory pour CMC. Tableau 5-46. Paramètres communs Champ Description Activer Active Directory Active la connexion Active Directory sur CMC. Vous devez installer des certificats SSL pour les serveurs Active Directory qui sont signés par la même autorité de certificat et les charger sur CMC. Utilisation de l'interface Web de CMC 187 Activer la connexion par carte à puce Active l'inter-fonctionnement d'Active Directory basé sur l'authentification Kerberos prise en charge par un plug-in de navigateur auto-installé et fourni par Dell, et l'utilisation de carte à puce. Pour activer la carte à puce, cochez la case. Pour désactiver la carte à puce, décochez la case. Si vous activez la carte à puce, vous devez également configurer votre poste de travail client Microsoft Windows pour qu'il opère correctement avec la fonctionnalité de lecteur de cartes à puce. Cela implique d'installer les pilotes appropriés pour le lecteur de cartes à puce et ceux pour la carte à puce actuellement utilisée. Les pilotes de carte à puce varient selon les fournisseurs. La carte à puce doit être correctement programmée avec les autorisations nécessaires en utilisant les services d'inscription de carte à puce fournis par le serveur Active Directory adéquat. REMARQUE : la connexion par carte à puce et la connexion directe s'excluent mutuellement. Vous ne pouvez en configurer qu'une seule à la fois. Activer la connexion directe Permet à CMC d'utiliser Active Directory. Pour activer la connexion directe, cochez la case. Pour désactiver la connexion directe, décochez la case. Si vous activez la connexion directe, vous devez également définir les propriétés Active Directory et sélectionner le schéma que vous souhaitez utiliser. REMARQUE : la connexion par carte à puce et la connexion directe s'excluent mutuellement. Vous ne pouvez en configurer qu'une seule à la fois. Tableau 5-46. Paramètres communs (suite) Champ Description188 Utilisation de l'interface Web de CMC Activer la validation de certificat SSL Permet la validation de certificat SSL pour la connexion SSL Active Directory de CMC. Pour désactiver la validation du certificat SSL, décochez la case. PRÉCAUTION : en désactivant cette fonctionnalité, vous exposez l'authentification à une attaque de l'homme du milieu (MITM). Pour que le navigateur fonctionne correctement, il faut que CMC soit accessible via une URL HTTP qui contient une adresse de domaine pleinement qualifiée pour CMC, à savoir http://cmc-6g2wxf1.dom.net. Une adresse IP simple pour CMC n'entraîne pas un bon fonctionnement de la connexion directe. Pour prendre en charge les adresses de domaine pleinement qualifiées, il est nécessaire d'enregistrer CMC auprès du service de nom de domaine du serveur Active Directory. Si l'authentification de navigateur à connexion directe est infructueuse, la méthode d'authentification locale et habituelle du navigateur par nom d'utilisateur / mot de passe est automatiquement présentée. De même, après une connexion directe réussie la méthode nom d'utilisateur / mot de passe est proposée lors d'une action de déconnexion. La connexion directe est destinée à être pratique, et non pas restrictive. REMARQUE : l'authentification du navigateur basée sur carte à puce ne fonctionne que pour les clients Microsoft Windows et Internet Explorer. Le plug-in de navigateur auto-installé et fourni par Dell (ActiveX control) est dépendant du système d'exploitation Microsoft Windows ayant le composant d'exécution suivant pré- installé : Microsoft Visual C++ 2005 Redistributable Package (x86). Le lien suivant peut aider à trouver le composant : microsoft.com/downloads/details.aspx?FamilyID= 32BC1BEE-A3F9-4C13-9C99-220B62A191EE&displaylang= en. Le client Windows nécessite des privilèges élevés pour installer avec succès le contrôle ActiveX. De même, la configuration du navigateur doit pouvoir accepter l'installation des contrôles ActiveX non signés. Tableau 5-46. Paramètres communs (suite) Champ DescriptionUtilisation de l'interface Web de CMC 189 L'activation de la carte à puce applique une politique d'authentification du navigateur par carte à puce uniquement. Les autres méthodes d'authentification du navigateur telles que l'authentification locale ou Active Directory par nom d'utilisateur / mot de passe sont limitées. Si la politique d'application de l'authentification par carte à puce uniquement est adoptée, il est important que l'opération de la carte à puce soit entièrement validée avant que les autres méthodes d'accès à CMC soient désactivées. Dans le cas contraire, l'accès à CMC peut être verrouillé par inadvertance. Nom de domaine racine Spécifie le nom de domaine utilisé par Active Directory. Le nom de domaine racine est le nom de domaine racine entièrement qualifié pour la forêt. REMARQUE : le nom de domaine racine doit être un nom de domaine valide qui respecte la convention d'attribution des noms x.y, où x est une chaîne de 1 à 256 caractères ASCII non séparés par des espaces, et où y est un type de domaine valide tel que com, edu, gov, int, mil, net ou org. Délai d'attente AD Définit le délai en secondes après lequel une session Active Directory inactive est automatiquement fermée. Valeurs valides : 15 300 secondes Par défaut : 90 secondes Spécifier le serveur AD à rechercher (facultatif) Active (si coché) l'appel dirigé vers le contrôleur de domaine et le catalogue global. Si vous activez cette option, vous devez également spécifier les emplacements du contrôleur de domaine et du catalogue global dans les paramètres suivants. REMARQUE : le nom apparaissant sur le certificat d'autorité de certification d'Active Directory n'est pas comparé au serveur Active Directory ou au serveur du catalogue global spécifié. Contrôleur de domaine Spécifie le serveur où votre service Active Directory est installé. Cette option n'est valide que si Spécifier le serveur AD à rechercher (facultatif) est activé. Tableau 5-46. Paramètres communs (suite) Champ Description190 Utilisation de l'interface Web de CMC Paramètres du schéma standard Les paramètres du schéma standard s'affichent lorsque l'option Microsoft Active Directory (Standard Schema) est sélectionnée. Cette section décrit tous les groupes de rôles déjà configurés et leurs noms, domaines et droits associés. Pour modifier les paramètres d'un groupe de rôles, cliquez sur son numéro dans la liste Groupes de rôles. REMARQUE : si vous cliquez sur le lien d'un groupe de rôles avant d'avoir appliqué les nouveaux paramètres que vous avez définis, ces derniers seront perdus. Afin d'éviter la perte de tout nouveau paramètre, cliquez sur Appliquer avant de cliquer sur le bouton d'un groupe de rôles. La page Configurer le groupe de rôles s'affiche. • Nom du groupe : nom qui identifie le groupe de rôles dans l'Active Directory associé à la carte CMC. • Domaine du groupe : domaine où se situe le groupe. • Privilèges de groupe : niveau de privilège du groupe. Cliquez sur Appliquer pour enregistrer les paramètres. Cliquez sur Retourner à la page Configuration pour retourner à la page Services d'annuaire. Pour actualiser le contenu de la page Services d'annuaire, cliquez sur Actualiser. Pour imprimer le contenu de la page Services d'annuaire, cliquez sur Imprimer. Catalogue global Spécifie l'emplacement du catalogue global sur le contrôleur de domaine d'Active Directory. Le catalogue global fournit une ressource pour rechercher une forêt Active Directory. Cette option n'est valide que si Spécifier le serveur AD à rechercher (facultatif) est activé. Tableau 5-46. Paramètres communs (suite) Champ DescriptionUtilisation de l'interface Web de CMC 191 Paramètres du schéma étendu Ces paramètres du schéma étendu dotés des propriétés suivantes s'affichent lorsque l'option Microsoft Active Directory (Extended Schema) est sélectionnée : • Nom du dispositif CMC : affiche le nom de l'objet de dispositif RAC que vous avez créé pour CMC. Le nom du dispositif CMC identifie de manière unique la carte CMC dans Active Directory. Le nom du dispositif CMC doit être identique au nom courant du nouvel objet de dispositif RAC que vous avez créé dans votre contrôleur de domaine. Le nom de CMC doit être une chaîne de 1 à 256 caractères ASCII, sans espace entre les caractères. • Nom de domaine CMC : affiche le nom DNS (chaîne) du domaine où l'objet de dispositif RAC d'Active Directory réside. Le nom de domaine de CMC doit être un nom de domaine valide composé de x.y, où x est une chaîne de 1 à 256 caractères ASCII sans espace entre les caractères et y est un type de domaine valide comme com, edu, gov, int, mil ou org. Gestion des certificats Active Directory Cette section affiche les propriétés du certificat Active Directory récemment transféré à CMC. Si vous avez téléversé un certificat, utilisez ces informations pour vérifier que le certificat est valide et n'a pas expiré. REMARQUE : par défaut, CMC ne dispose pas d'un certificat de serveur délivré par une autorité de certification pour Active Directory. Vous devez téléverser un certificat de serveur valide, signé par une autorité de certification. Les propriétés suivantes sont affichées pour le certificat : • Numéro de série : numéro de série du certificat. • Informations sur le sujet : sujet du certificat (nom de la personne ou de l'entreprise certifiée). • Renseignements sur l'émetteur : émetteur du certificat (nom de l'autorité de certification). • Valide à partir de : la date de début du certificat. • Valide jusqu'à : la date d'expiration du certificat.192 Utilisation de l'interface Web de CMC Utilisez les commandes ci-dessous pour téléverser et télécharger ce certificat : • Téléverser : lance le processus de téléversement du certificat. Ce certificat, qui vous est délivré par Active Directory, permet d'accéder à CMC. • Télécharger : lance le processus de téléchargement. Vous êtes invité à choisir un emplacement où enregistrer le fichier. Lorsque vous sélectionnez cette option et cliquez sur Suivant, la boîte de dialogue Téléchargement de fichier apparaît. Utilisez cette boîte de dialogue pour spécifier l'emplacement réservé au certificat de serveur sur votre station de gestion ou réseau partagé. REMARQUE : par défaut, CMC ne dispose pas d'un certificat de serveur délivré par une autorité de certification pour Active Directory. Vous devez téléverser un certificat de serveur valide, signé par une autorité de certification. Fichier Keytab Kerberos Vous pouvez téléverser un fichier keytab Kerberos généré sur le serveur Active Directory associé. Vous pouvez générer le fichier keytab Kerberos depuis le serveur Active Directory en exécutant l'utilitaire ktpass.exe. Ce fichier keytab établit une relation de confiance entre le serveur Active Directory Server et CMC. REMARQUE : CMC ne dispose pas d'un fichier keytab Kerberos pour Active Directory. Vous devez téléverser un fichier keytab Kerberos généré. Pour plus d'informations, voir « Configuration de la connexion directe », à la page 316. Les actions suivantes sont autorisées : • Parcourir : ouvre une boîte de dialogue Parcourir, depuis laquelle vous sélectionnez le certificat de serveur que vous souhaitez téléverser. • Téléverser : lance le processus de téléchargement du certificat en utilisant le chemin du fichier que vous spécifiez. Utilisation de l'interface Web de CMC 193 Configuration et gestion des services LDAP génériques Vous pouvez utiliser le service LDAP (Lightweight Directory Access Protocol) générique pour configurer votre logiciel afin qu'il fournisse l'accès à CMC. Le service LDAP vous permet d'ajouter et de contrôler les privilèges utilisateur CMC de vos utilisateurs existants. REMARQUE : vous devez disposer du privilège Administrateur de configuration du châssis pour configurer les paramètres Active Directory pour CMC. Pour afficher et configurer LDAP : 1 Connectez-vous à l'interface Web. 2 Cliquez sur l'onglet Authentification utilisateur, puis cliquez sur le sousonglet Services d'annuaire. La page Services d'annuaire s'affiche. 3 Cliquez sur le bouton radio associé au LDAP générique. 4 Configurez les options affichées et cliquez sur Appliquer. La Figure 5-47 répertorie les options de configuration disponibles. Tableau 5-47. Paramètres communs Paramètre Description LDAP générique activé Active le service LDAP générique sur CMC. Utilisez le nom unique (DN) pour rechercher l'appartenance au groupe. Spécifie le nom unique (DN) de groupes LDAP dont les membres sont autorisés à accéder au dispositif. Activer la validation de certificat SSL Si activé, CMC utilise le certificat d'une autorité de certification pour valider le certificat du serveur LDAP pendant l'établissement de liaisons SSL. Liaison de DN Le nom unique d'un utilisateur utilisé pour établir la liaison au serveur lors de la recherche du nom unique de l'utilisateur d'ouverture de session. S'il n'est pas fourni, une liaison anonyme est utilisée.194 Utilisation de l'interface Web de CMC Mot de passe Mot de passe de liaison à utiliser conjointement avec le nom unique de liaison. REMARQUE : le mot de passe de liaison contient des données sensibles et doit être protégé de manière appropriée. Nom unique de base à rechercher Nom unique de la branche du répertoire à partir duquel toutes les recherches doivent débuter. Attribut de l'identifiant de l'utilisateur Spécifie l'attribut à rechercher. S'il n'est pas configuré, uid est utilisé par défaut. Il est recommandé qu'il soit unique dans le DN de base choisi, faute de quoi un filtre de recherche doit être configuré pour assurer l'unicité de l'utilisateur d'ouverture de session. Si le DN d'utilisateur ne peut pas être identifié par la recherche de la combinaison de l'attribut et du filtre de recherche, la connexion échoue avec une erreur. Attribut de l'appartenance au groupe. Spécifie l'attribut LDAP qui est utilisé pour vérifier l'appartenance au groupe. Il doit s'agir d'un attribut de la classe de groupe. S'il n'est pas spécifié, les attributs member et unique member sont utilisés. Filtre de recherche Indique un filtre de recherche LDAP valide. Ceci est utilisé si l'attribut d'utilisateur ne parvient pas à identifier de manière unique l'utilisateur d'ouverture de session dans le nom unique de base choisi. S'il n'est pas spécifié, la valeur est définie par défaut sur (objectClass=*), qui recherche tous les objets de l'arborescence. La longueur maximale de cette propriété est de 1 024 caractères. Délai d'attente réseau (secondes) Définit le délai en secondes après lequel une session LDAP inactive est automatiquement fermée. Délai d'attente de recherche (secondes) Définit le délai en secondes après lequel une recherche est automatiquement fermée. Tableau 5-47. Paramètres communs (suite) Paramètre DescriptionUtilisation de l'interface Web de CMC 195 Sélection de vos serveurs LDAP Vous pouvez configurer le serveur pour une utilisation avec le LDAP générique de deux façons. Les serveurs statiques permettent à l'administrateur de mettre un nom de domaine pleinement qualifié ou une adresse IP dans le champ. Par ailleurs, une liste de serveurs LDAP peut être récupérée en recherchant leur enregistrement SRV dans le DNS. Les éléments suivants sont les propriétés de la section Serveurs LDAP : • Utiliser les serveurs LDAP statiques : lorsque vous sélectionnez cette option, le service LDAP utilise les serveurs spécifiés avec le numéro de port fourni (voir les détails ci-dessous). REMARQUE : vous devez sélectionner Statique ou DNS. • Adresse de serveur LDAP : préciser le nom de domaine pleinement qualifié ou l'adresse IP du serveur LDAP. Pour spécifier plusieurs serveurs LDAP redondants qui desservent le même domaine, fournissez la liste de tous les serveurs séparés par des virgules. CMC tente de se connecter à chaque serveur l'un après l'autre jusqu'à ce qu'une connexion soit établie. • Port de serveur LDAP : port de LDAP sur SSL, par défaut 636 s'il n'est pas configuré. Le port non SSL n'est pas pris en charge dans la version 3.0 de CMC puisque le mot de passe ne peut être transporté sans SSL. • Utiliser le DNS pour trouver des serveurs LDAP : lorsque vous sélectionnez cette option, LDAP utilise le domaine de la recherche et le nom du service via DNS. Vous devez sélectionner Statique ou DNS. La requête DNS suivante est effectuée pour les enregistrements SRV : _[Service Name]._tcp.[Search Domain] où est le domaine racine à utiliser dans la requête et est le nom du service à utiliser dans la requête. Par exemple : _ldap._tcp.dell.com où ldap est le nom de service et dell.com est le domaine de recherche.196 Utilisation de l'interface Web de CMC Gestion des paramètres de groupe LDAP Le tableau qui figure dans la section Paramètres du groupe répertorie les groupes de rôles et affiche les noms, domaines et privilèges associés des groupes de rôles qui sont déjà configurés. • Pour configurer un nouveau groupe de rôles, cliquez sur un nom de groupe de rôles qui n'a pas de nom, de domaine et de privilège dans la liste. • Pour modifier les paramètres d'un groupe de rôles existant, cliquez sur le nom de groupe de rôles. Lorsque vous cliquez sur un nom de groupe de rôles, la page Configurer le groupe de rôles s'affiche. L'aide relative à cette page est disponible via le lien Aide en haut à droite de la page. Gestion des certificats de sécurité LDAP Cette section affiche les propriétés du certificat LDAP récemment téléversé sur CMC. Si vous avez téléversé un certificat, utilisez ces informations pour vérifier que le certificat est valide et n'a pas expiré. REMARQUE : par défaut, CMC ne dispose pas d'un certificat de serveur délivré par une autorité de certification pour Active Directory. Vous devez téléverser un certificat de serveur valide, signé par une autorité de certification. Les propriétés suivantes sont affichées pour le certificat : • Numéro de série : numéro de série du certificat. • Informations sur le sujet : sujet du certificat (nom de la personne ou de l'entreprise certifiée). • Informations sur l'émetteur : émetteur du certificat (nom de l'autorité de certification). • Valide à partir de : la date de début du certificat. • Valide jusqu'à : la date d'expiration du certificat.Utilisation de l'interface Web de CMC 197 Utilisez les commandes ci-dessous pour téléverser et télécharger ce certificat : • Téléverser : lance le processus de téléversement du certificat. Ce certificat, qui vous est délivré par votre serveur LDAP, permet d'accéder à CMC. • Télécharger : lance le processus de téléchargement. Vous êtes invité à choisir un emplacement où enregistrer le fichier. Lorsque vous sélectionnez cette option et cliquez sur Suivant, la boîte de dialogue Téléchargement de fichier apparaît. Utilisez cette boîte de dialogue pour spécifier l'emplacement réservé au certificat de serveur sur votre station de gestion ou réseau partagé. Sécurisation des communications CMC à l'aide de certificats SSL et numériques Cette sous-section fournit des informations sur les fonctionnalités de sécurité des données suivantes qui sont intégrées dans CMC : • « Secure Sockets Layer (SSL) », à la page 197. • « Requête de signature de certificat (RSC) », à la page 198. • « Accès au menu principal SSL », à la page 199. • « Génération d'une nouvelle requête de signature de certificat », à la page 199. • « Téléversement d'un certificat de serveur », à la page 203. • « Téléverser une clé de serveur Web et un certificat », à la page 203. • « Affichage d'un certificat de serveur », à la page 204. Secure Sockets Layer (SSL) CMC utilise Web Server, un serveur configuré pour utiliser le protocole de sécurité SSL standard de l'industrie afin de transférer des données cryptées sur Internet. Basé sur la technologie de cryptage à clé publique et à clé privée, SSL est une technique très répandue permettant une communication authentifiée et cryptée entre les clients et les serveurs afin d'empêcher toute écoute indiscrète sur un réseau. 198 Utilisation de l'interface Web de CMC Le protocole SSL permet à un système compatible SSL d'effectuer les tâches suivantes : • S'authentifier sur un client activé SSL. • Permettre au client de s'authentifier sur le serveur. • Permettre aux deux systèmes d'établir une connexion cryptée. Ce processus de cryptage fournit un haut niveau de protection des données. CMC applique la norme de cryptage SSL à 128 bits, qui est la forme la plus fiable de cryptage généralement disponible pour les navigateurs Internet en Amérique du Nord. CMC Web Server inclut un certificat numérique SSL Dell auto-signé (la référence serveur). Pour garantir un haut niveau de sécurité sur Internet, remplacez le certificat SSL de serveur Web en envoyant une requête à CMC pour générer une nouvelle requête de signature de certificat (RSC). Requête de signature de certificat (RSC) Une RSC est une requête numérique auprès d'une autorité de certification en vue de l'obtention d'un certificat de sécurité serveur. Les certificats de serveur sécurisé garantissent l'identité d'un système distant et assurent que les informations échangées avec le système distant ne peuvent être ni affichées, ni modifiées par d'autres. Pour garantir la sécurité de CMC, il est fortement recommandé de générer une RSC, de l'envoyer à une autorité de certification et de téléverser le certificat qu'elle vous renvoie. Une autorité de certification est une entité commerciale reconnue dans l'industrie de l'informatique pour ses critères élevés en matière de dépistage et d'identification fiables et d'autres critères de sécurité importants. Thawte et VeriSign sont des exemples d'AC. Une fois que l'autorité de certification reçoit votre RSC, elle examine et vérifie les informations qu'elle contient. Si le demandeur répond aux normes de sécurité de l'autorité de certification, celle-ci émet un certificat qui identifie ce demandeur de manière unique pour les transactions effectuées sur des réseaux et sur Internet. Une fois que l'autorité de certification approuve la RSC et qu'elle vous envoie un certificat, vous devez téléverser le certificat sur le micrologiciel CMC. Les informations de la RSC stockées sur le micrologiciel CMC doivent correspondre aux informations du certificat.Utilisation de l'interface Web de CMC 199 Accès au menu principal SSL REMARQUE : vous devez disposer du privilège Administrateur de configuration du châssis pour configurer les paramètres SSL pour CMC. REMARQUE : les certificats de serveur que vous téléversez doivent être valides (ils ne doivent pas avoir expiré) et signés par une autorité de certification. Pour accéder au menu principal SSL : 1 Connectez-vous à l'interface Web. 2 Cliquez sur l'onglet Réseau, puis sur le sous-onglet SSL. La page Menu principal SSL s'affiche. Utilisez les options de la page Menu principal SSL pour générer une RSC à envoyer à une autorité de certification. Les informations de la RSC sont stockées dans le micrologiciel CMC. Génération d'une nouvelle requête de signature de certificat Pour des raisons de sécurité, Dell vous recommande vivement d'obtenir et de téléverser un certificat de serveur sécurisé sur CMC. Les certificats de serveur sécurisé vérifient l'identité d'un système distant et garantissent que les informations échangées avec le système distant ne peuvent être ni affichées ni modifiées par d'autres personnes. Sans certificat de serveur sécurisé, CMC est vulnérable aux accès par les utilisateurs non autorisés. Tableau 5-48. Options du menu principal SSL Champ Description Générer une nouvelle requête de signature de certificat (RSC) Sélectionnez cette option, puis cliquez sur Suivant pour ouvrir la page Générer la requête de signature de certificat (RSC), sur laquelle vous pouvez générer une RSC à envoyer à une autorité de certification afin de demander un certificat Web sécurisé. REMARQUE : chaque nouvelle SRC supplante la RSC qui se trouve déjà sur le micrologiciel. Pour qu'une autorité de certification accepte votre RSC, la RSC de CMC doit correspondre au certificat renvoyé par l'autorité de certification.200 Utilisation de l'interface Web de CMC Pour obtenir un certificat de serveur sécurisé pour CMC, vous devez envoyer une requête de signature de certificat (RSC) à l'autorité de certification de votre choix. Une RSC est une requête numérique de certificat de serveur sécurisé signé contenant des informations sur votre compagnie et une clé d'identification unique. Lorsqu'une RSC est générée depuis la page Générer une requête de signature de certificat (RSC), vous êtes invité à en enregistrer une copie sur votre station de gestion ou votre réseau partagé, et les informations uniques utilisées pour générer la RSC sont stockées sur CMC. Ces informations sont utilisées par la suite pour authentifier le certificat de serveur que vous recevez de l'autorité de certification. Après avoir reçu le certificat de serveur de l'autorité de certification, vous devez ensuite le téléverser sur CMC. Téléverser le certificat de serveur basé sur la RSC générée Sélectionnez cette option, puis cliquez sur Suivant pour ouvrir la page Téléversement d'un certificat sur laquelle vous pouvez téléverser un certificat existant auquel votre société est autorisée à accéder et qu'elle utilise pour contrôler l'accès à CMC. REMARQUE : CMC accepte uniquement les certificats X509, encodés en base 64. Les certificats encodés DER ne sont pas acceptés. Si vous téléversez un nouveau certificat, il remplace le certificat par défaut que vous avez reçu avec CMC. Téléverser une clé de serveur Web et un certificat Sélectionnez cette option, puis cliquez sur Suivant pour ouvrir la page Téléversement d'une clé et d'un certificat de serveur Web sur laquelle vous pouvez téléverser une clé de serveur Web et un certificat de serveur existants auxquels votre société est autorisée à accéder et qu'elle utilise pour contrôler l'accès à CMC. REMARQUE : CMC accepte uniquement les certificats X.509 encodés en base 64. Les certificats binaires encodés DER ne sont pas acceptés. Si vous téléversez un nouveau certificat, il remplace le certificat par défaut que vous avez reçu avec CMC. Afficher le certificat de serveur Sélectionnez l'option, puis cliquez sur le bouton Suivant pour ouvrir la page Afficher le certificat de serveur sur laquelle vous pouvez visualiser le certificat du serveur actuel. Tableau 5-48. Options du menu principal SSL (suite) Champ DescriptionUtilisation de l'interface Web de CMC 201 REMARQUE : pour que CMC puisse accepter le certificat de serveur renvoyé par l'autorité de certification, les informations d'authentification contenues dans le nouveau certificat doivent correspondre aux informations stockées sur CMC lors de la génération de la RSC. PRÉCAUTION : lorsqu'une nouvelle RSC est générée, elle remplace les RSC existant déjà sur CMC. Si une RSC en attente est écrasée avant la délivrance de son certificat de serveur par une autorité de certification, CMC n'acceptera pas le certificat de serveur car les informations qu'il utilise pour authentifier le certificat auront été perdues. Soyez vigilant lorsque vous générez une RSC afin d'éviter de remplacer les RSC en attente. Pour générer une RSC : 1 Sur la page Menu principal SSL, sélectionnez Générer une nouvelle requête de signature de certificat (RSC), puis cliquez sur Suivant. La page Générer une requête de signature de certificat (RSC) s'affiche. 2 Entrez une valeur pour chaque attribut de la RSC. 3 Cliquez sur Générer. La boîte de dialogue Téléchargement de fichier apparaît. 4 Enregistrez le fichier csr.txt sur votre station de gestion ou votre réseau partagé. (Vous pouvez également ouvrir le fichier et l'enregistrer ultérieurement). Vous soumettrez ensuite ce fichier à une autorité de certification. Tableau 5-49. Options de la page Générer une requête de signature de certificat (RSC) Champ Description Nom commun Nom exact à certifier (généralement le nom de domaine du serveur Web, par exemple, www.compagniexyz.com). Sont valides : les caractères alphanumériques (A-Z, a-z, 0-9), les traits d'union, les traits de soulignement et les points. Ne sont pas valides : les caractères non-alphanumériques non repris ci-dessus (notamment @ # $ % & *) et les caractères utilisés principalement dans d'autres langues que l'anglais tels que ß, å, é, ü.202 Utilisation de l'interface Web de CMC Nom de l'organisation Nom associé à votre entreprise (par exemple : entreprise XYZ). Sont valides : les caractères alphanumériques (A-Z, a-z, 0-9), les traits d'union, les traits de soulignement, les points et les espaces. Ne sont pas valides : les caractères non alphanumériques non repris ci-dessus (notamment @ # $ % & *). Unité organisationnelle Nom associé à une unité organisationnelle, comme un service (par exemple : groupe de l'entreprise). Sont valides : les caractères alphanumériques (A-Z, a-z, 0-9), les traits d'union, les traits de soulignement, les points et les espaces. Ne sont pas valides : les caractères non alphanumériques non repris ci-dessus (notamment @ # $ % & *). Ville Ville ou autre emplacement de votre compagnie (par exemple : Marseille, Montréal). Sont valides : les caractères alphanumériques (A-Z, a-z, 0-9) et les espaces. Ne sont pas valides : les caractères non alphanumériques non repris ci-dessus (notamment @ # $ % & *). État État, province ou territoire où se trouve l'entité qui demande la certification (par exemple : Texas, Québec, Bouches-duRhône). REMARQUE : n'utilisez pas d'abréviations. Sont valides : les caractères alphanumériques (lettres en majuscules et en minuscules, 0-9) et les espaces. Ne sont pas valides : les caractères non alphanumériques non repris ci-dessus (notamment @ # $ % & *). Pays Pays où se trouve la compagnie qui demande la certification. E-mail Adresse de messagerie de votre compagnie. Entrez l'adresse de messagerie que vous souhaitez associer à la RSC. L'adresse de messagerie doit être valide et contenir le symbole @ (par exemple, nom@compagniexyz.com). REMARQUE : cette adresse de messagerie est facultative. Tableau 5-49. Options de la page Générer une requête de signature de certificat (RSC) Champ DescriptionUtilisation de l'interface Web de CMC 203 Téléversement d'un certificat de serveur Pour téléverser un certificat de serveur : 1 Sur la page Menu principal SSL, sélectionnez Téléverser le certificat de serveur basé sur RSC généré, puis cliquez sur Suivant. La page Téléversement d'un certificat s'affiche. 2 Entrez le chemin du fichier dans le champ de texte ou cliquez sur Parcourir pour sélectionner le fichier. 3 Cliquez sur Appliquer. Si le certificat n'est pas valide, un message d'erreur s'affiche. REMARQUE : la valeur Chemin du fichier affiche le chemin de fichier relatif du certificat que vous téléversez. Vous devez taper le chemin de fichier absolu, y compris le chemin et le nom de fichier complets et l'extension du fichier. Pour actualiser le contenu de la page Téléversement d'un certificat, cliquez sur Actualiser. Pour imprimer le contenu de la page Téléversement d'un certificat, cliquez sur Imprimer. Téléverser une clé de serveur Web et un certificat Pour téléverser une clé de serveur Web et un certificat : 1 Sélectionnez Téléverser une clé de serveur Web et un certificat, puis cliquez sur Suivant. 2 Entrez le fichier de clé privée en utilisant le menu de navigation. 3 Sélectionnez un fichier de certificat en utilisant le menu de navigation. 4 Quand les deux fichiers sont téléchargés, cliquez sur Appliquer. Si la clé du serveur Web et le certificat ne correspondent pas, un message d'erreur s'affiche. REMARQUE : CMC accepte uniquement les certificats X509, encodés en base 64. Les certificats qui utilisent d'autres schémas de codage tels que DER ne sont pas acceptés. Si vous téléversez un nouveau certificat, il remplace le certificat par défaut que vous avez reçu avec CMC. REMARQUE : pour téléverser une clé de serveur Web et un certificat de serveur, vous devez avoir des privilèges d'administrateur de configuration du châssis. REMARQUE : après le chargement du micrologiciel, CMC est réinitialisé et devient temporairement indisponible. Pour éviter de déconnecter d'autres utilisateurs au cours d'une réinitialisation, avertissez les utilisateurs autorisés susceptibles de se connecter à CMC et recherchez les sessions actives affichées dans la page Sessions sous l'onglet Réseau.204 Utilisation de l'interface Web de CMC Affichage d'un certificat de serveur Sur la page Menu principal SSL, sélectionnez Afficher le certificat de serveur, puis cliquez sur Suivant. La page Afficher le certificat de serveur s'affiche. La Figure 5-50 décrit les champs et les descriptions associées énumérés dans la fenêtre Certificat. Pour actualiser le contenu de la page Afficher le certificat de serveur, cliquez sur Actualiser. Pour imprimer le contenu de la page Afficher le certificat de serveur, cliquez sur Imprimer. Gestion des sessions La page Sessions affiche toutes les instances en cours des connexions au châssis et vous permet de mettre fin à une session active. REMARQUE : pour terminer une session, vous devez disposer du privilège Administrateur de configuration du châssis. Pour gérer ou fermer une session : 1 Ouvrez une session sur CMC via le Web. 2 Cliquez sur l'onglet Réseau, puis sur le sous-onglet Sessions. 3 Sur la page Sessions, localisez la session que vous souhaitez terminer, puis cliquez sur le bouton approprié. La Figure 5-51 affiche les propriétés des sessions. Tableau 5-50. Informations relatives au certificat Champ Description Série Numéro de série du certificat. Objet Attributs du certificat saisis par le sujet. Émetteur Attributs du certificat renvoyés par l'émetteur. Pas avant Date d'émission du certificat Pas après Date d'expiration du certificatUtilisation de l'interface Web de CMC 205 Configuration des services CMC se sert de Web Server, un serveur configuré pour utiliser le protocole de sécurité SSL standard de l'industrie afin d'accepter et de transférer les données cryptées depuis et vers des clients sur Internet. Web Server comprend un certificat numérique SSL auto-signé Dell (référence serveur) et est chargé d'accepter et de répondre aux requêtes HTTP sécurisées émanant des clients. Ce service est requis par l'interface Web et l'outil CLI distant pour communiquer avec CMC. REMARQUE : l'outil CLI distant (RACADM) et l'interface Web utilisent Web Server. Dans l'éventualité où Web Server n'est pas actif, RACADM distant et l'interface Web ne sont pas utilisables. REMARQUE : en cas de réinitialisation de Web Server, patientez au moins une minute pour que les services soient de nouveau disponibles. La réinitialisation du serveur Web se produit généralement suite à l'un des événements suivants : la configuration réseau ou les propriétés de sécurité réseau ont été modifiées via l'interface utilisateur Web CMC ou RACADM ; la configuration du port de serveur Web a été modifiée via l'interface utilisateur Web ou RACADM ; CMC a été réinitialisé ou un nouveau certificat de serveur SSL a été téléversé. REMARQUE : pour modifier les paramètres des services, vous devez disposer du privilège Administrateur de configuration du châssis. Tableau 5-51. Propriétés des sessions Propriété Description Nº de session Affiche le numéro d'identification généré séquentiellement pour chaque instance d'ouverture de session. Nom d'utilisateur Affiche le nom d'ouverture de session de l'utilisateur (utilisateur local ou utilisateur Active Directory). Des exemples de noms d'utilisateur Active Directory sont nom@domaine.com, domaine.com/nom, domaine.com\nom. Adresse IP Affiche l'adresse IP de l'utilisateur. Type de session Décrit le type de session : Telnet, série, SSH, RACADM distant, SMASH CLP, WSMAN ou d'interface utilisateur graphique. Fermer Vous permet de fermer les sessions répertoriées, à l'exception de la vôtre. Pour mettre fin à la session associée, cliquez sur le bouton. Cette colonne est affichée uniquement si vous disposez du privilège Administrateur de configuration du châssis.206 Utilisation de l'interface Web de CMC Pour configurer les services CMC : 1 Ouvrez une session sur l'interface Web de CMC. 2 Cliquez sur l'onglet Réseau. 3 Cliquez sur le sous-onglet Services. La page Services s'affiche. 4 Configurez les services suivants, si nécessaire : • Console série CMC (Figure 5-52) • Server Web (Figure 5-53) • SSH (Figure 5-54) • Telnet (Figure 5-55) • RACADM distant (Figure 5-56) • SNMP (Figure 5-57) • Syslog distant (Figure 5-58) 5 Cliquez sur Appliquer pour mettre à jour l'ensemble des délais par défaut, ainsi que les délais maximaux. Tableau 5-52. Paramètres de la console série CMC Paramètre Description Activé Active l'interface de la console Telnet sur CMC. Par défaut : décoché (désactivé) Redirection activée Active la redirection de la console série/texte vers le serveur via votre client série/Telnet/SSH à partir de CMC. CMC se connecte à iDRAC qui, de façon interne, se connecte au port COM2 du serveur. Options de configuration : coché (activé), décoché (désactivé) Par défaut : coché (activé).Utilisation de l'interface Web de CMC 207 Délai d'attente en cas d'inactivité Indique le nombre de secondes s'écoulant avant la déconnexion automatique d'une session série inactive. La modification du paramètre Délai d'attente prend effet à la prochaine ouverture de session. Elle n'affecte pas la session en cours. Plage du délai d'attente : de 0 ou 60 à 10 800 secondes. Pour désactiver la fonctionnalité du délai d'attente, entrez 0. Par défaut : 1 800 secondes. Baud Rate (Débit en bauds) Indique la vitesse des données sur le port série externe de CMC. Options de configuration : 9 600, 19 200, 28 800, 38 400, 57 600 et 115 200 b/s. Par défaut : 115 200 b/s Authentification désactivée Permet l'authentification de l'ouverture de session de la console série de CMC. Par défaut : décoché (désactivé) Tableau 5-52. Paramètres de la console série CMC (suite) Paramètre Description208 Utilisation de l'interface Web de CMC Touche Échap Vous permet de spécifier la séquence d'échappement qui met fin à la redirection de la console série/texte lorsque vous utilisez la commande connect ou racadm connect. Par défaut : ^\ (maintenir la touche enfoncée et taper une barre oblique inverse (\)) REMARQUE : l'accent circonflexe représente la touche . Options de configuration : • valeur décimale (par exemple : 95) • valeur hexadécimale (par exemple : 0x12) • valeur octale (par exemple : 007) • valeur ASCII (par exemple : ^a) Les valeurs ASCII peuvent être représentées à l'aide des codes suivants de touches d'échappement : • Échap suivi par un caractère alphabétique (a-z, A-Z) • Échap suivi par les caractères spéciaux suivants : [ ] \ ^ _ • Longueur maximale autorisée : 4 Taille de la mémoire tampon de l'historique Indique la taille maximale de l'historique du tampon, qui contient les derniers caractères inscrits dans la console série. Par défaut : 8 192 caractères Commande d'ouverture de session Spécifie la commande série qui est exécutée automatiquement lorsqu'un utilisateur ouvre une session sur l'interface de la console série de CMC. Exemple : connect server-1 Par défaut : [Null] Tableau 5-52. Paramètres de la console série CMC (suite) Paramètre DescriptionUtilisation de l'interface Web de CMC 209 Tableau 5-53. Paramètres du serveur Web Paramètre Description Activé Active les services de Web Server (accès via distante RACADM distant et l'interface Web) pour CMC. Par défaut : coché (activé) Nombre maximal de sessions Indique le nombre maximal de sessions d'interface utilisateur Web simultanées autorisées pour le châssis. La modification de la propriété Nombre maximal de sessions prend effet à l'ouverture de session suivante. Elle n'affecte pas les sessions actives ouvertes (y compris la vôtre). RACADM à distance n'est pas affecté par la propriété Nombre maximal de sessions de Web Server. Plage autorisée : 1 à 4 Par défaut : 4 REMARQUE : si vous définissez la propriété Nombre maximal de sessions sur une valeur inférieure au nombre actuel de sessions actives et que vous fermez ensuite la session, vous ne pourrez pas ouvrir de session avant la fermeture ou l'expiration des autres sessions. Délai d'attente en cas d'inactivité Indique le nombre de secondes avant qu'une session d'interface utilisateur Web inactive soit automatiquement déconnectée. La modification du paramètre Délai d'attente prend effet à la prochaine ouverture de session. Elle n'affecte pas la session en cours. Plage du délai d'attente : 60 à 10 800 secondes. Par défaut : 1 800 secondes.210 Utilisation de l'interface Web de CMC Numéro de port HTTP Indique le port par défaut utilisé par CMC pour écouter une connexion de serveur. REMARQUE : lorsque vous indiquez l'adresse HTTP dans le navigateur, Web Server la redirige automatiquement et utilise HTTPS. Si le numéro de port HTTP par défaut (80) a été modifié, vous devez inclure le numéro de port dans l'adresse du champ d'adresse du navigateur, comme indiqué ci-dessous : http://: où adresse IP correspond à l'adresse IP du châssis et numéro de port représente le numéro de port HTTP autre que le numéro par défaut (80). Plage de configuration : 10 à 65 535 Par défaut : 80 Numéro de port HTTPS Affiche le port par défaut utilisé par CMC pour écouter une connexion de serveur sécurisée. Si le numéro de port HTTPS par défaut (443) a été changé, vous devez inclure le numéro de port dans l'adresse du champ d'adresse du navigateur, comme indiqué ci-dessous : https://: correspond à l'adresse IP du châssis et numéro de port représente le numéro de port HTTP autre que le numéro par défaut (80). Plage de configuration : 10 à 65 535 Par défaut : 443 Tableau 5-53. Paramètres du serveur Web (suite) Paramètre DescriptionUtilisation de l'interface Web de CMC 211 Tableau 5-54. Paramètres SSH Paramètre Description Activé Permet d'utiliser SSH sur CMC. Par défaut : coché (activé) Nombre maximal de sessions Le nombre maximal de sessions SSH simultanées autorisées pour le châssis. La modification de cette propriété prend effet à la prochaine ouverture de session. Elle n'affecte pas les sessions actives ouvertes (y compris la vôtre). Plage de configuration : 1 à 4 Par défaut : 4 REMARQUE : si vous définissez la propriété Nombre maximal de sessions sur une valeur inférieure au nombre actuel de sessions actives et que vous fermez ensuite la session, vous ne pourrez pas ouvrir de session avant la fermeture ou l'expiration des autres sessions. Délai d'attente en cas d'inactivité Indique le nombre de secondes s'écoulant avant la déconnexion automatique d'une session SSH inactive. La modification du paramètre Délai d'attente prend effet à la prochaine ouverture de session. Elle n'affecte pas la session en cours. Plage du délai d'attente : 0 ou 60 à 10 800 secondes. Pour désactiver la fonctionnalité du délai d'attente, entrez 0. Par défaut : 1 800 secondes. Numéro de port Port utilisé par CMC pour écouter une connexion de serveur. Plage de configuration : 10 à 65 535 Par défaut : 22 212 Utilisation de l'interface Web de CMC Tableau 5-55. Paramètres Telnet Paramètre Description Activé Active l'interface de la console Telnet sur CMC. Par défaut : décoché (désactivé) Nombre maximal de sessions Le nombre maximal de sessions Telnet simultanées autorisées pour le châssis. La modification de cette propriété prend effet à la prochaine ouverture de session. Elle n'affecte pas les sessions actives ouvertes (y compris la vôtre). Plage autorisée : 1 à 4 Par défaut : 4 REMARQUE : si vous définissez la propriété Nombre maximal de sessions sur une valeur inférieure au nombre actuel de sessions actives et que vous fermez ensuite la session, vous ne pourrez pas ouvrir de session avant la fermeture ou l'expiration des autres sessions. Délai d'attente en cas d'inactivité Indique le nombre de secondes s'écoulant avant la déconnexion automatique d'une session Telnet inactive. La modification du paramètre Délai d'attente prend effet à la prochaine ouverture de session. Elle n'affecte pas la session en cours. Plage du délai d'attente : 0 ou 60 à 10 800 secondes. Pour désactiver la fonctionnalité du délai d'attente, entrez 0. Par défaut : 1 800 secondes. Numéro de port Indique le port par défaut utilisé par CMC pour écouter une connexion de serveur. Par défaut : 23Utilisation de l'interface Web de CMC 213 Tableau 5-56. Paramètres de RACADM distant Paramètre Description Activé Permet à l'utilitaire RACADM distant d'accéder à CMC. Par défaut : coché (activé) Nombre maximal de sessions Le nombre maximal de sessions RACADM simultanées autorisées pour le châssis. La modification de cette propriété prend effet à la prochaine ouverture de session. Elle n'affecte pas les sessions actives ouvertes (y compris la vôtre). Plage autorisée : 1 à 4 Par défaut : 4 REMARQUE : si vous définissez la propriété Nombre maximal de sessions sur une valeur inférieure au nombre actuel de sessions actives et que vous fermez ensuite la session, vous ne pourrez pas ouvrir de session avant la fermeture ou l'expiration des autres sessions. Délai d'attente en cas d'inactivité Indique le nombre de secondes s'écoulant avant la déconnexion automatique d'une session racadm inactive. Toute modification du paramètre Délai d'attente en cas d'inactivité sera effective à la prochaine ouverture de session ; elle n'aura aucune incidence sur la session actuelle. Pour désactiver la fonctionnalité Délai d'attente en cas d'inactivité, entrez 0. Plage du délai d'attente : 0 ou 10 à 1 920 secondes. Pour désactiver la fonctionnalité du délai d'attente, entrez 0. Par défaut : 30 secondes Tableau 5-57. Configuration SNMP Paramètre Description Activé Active SNMP sur CMC. Valeurs valides : coché (activé), décoché (désactivé) Par défaut : décoché (désactivé) Nom de communauté Indique la chaîne de communauté utilisée pour obtenir des données du démon SNMP de CMC.214 Utilisation de l'interface Web de CMC Configuration des bilans de puissance CMC vous permet d'établir un bilan de puissance et de gérer l'alimentation du châssis. Le service de gestion de l'alimentation optimise la puissance consommée et réaffecte l'alimentation aux différents modules en fonction de la demande. Pour des instructions sur la configuration de l'alimentation via CMC, voir « Configuration et gestion de l'alimentation », à la page 358. Pour plus d'informations sur le service de gestion de l'alimentation de CMC, voir « Gestion de l'alimentation », à la page 335. Tableau 5-58. Configuration de Syslog distant Paramètre Description Activé Permet la transmission et la capture à distance des entrées du journal de CMC et du journal du matériel au(x) serveur(s) spécifié(s). Valeurs valides : coché (activé), décoché (désactivé) Par défaut : décoché (désactivé) Serveur Syslog 1 Le premier des trois serveurs possibles qui hébergera une copie des entrées du journal de CMC et du journal du matériel. Spécifié sous la forme d'un nom d'hôte, d'une adresse IPv6 ou d'une adresse IPv4. Serveur Syslog 2 Le deuxième des trois serveurs possibles qui hébergera une copie des entrées du journal de CMC et du journal du matériel. Spécifié sous la forme d'un nom d'hôte, d'une adresse IPv6 ou d'une adresse IPv4. Serveur Syslog 3 Le troisième des trois serveurs possibles qui hébergera une copie des entrées du journal de CMC et du journal du matériel. Spécifié sous la forme d'un nom d'hôte, d'une adresse IPv6 ou d'une adresse IPv4. Numéro de port Syslog Spécifie le numéro de port sur le serveur distant pour recevoir une copie des entrées du journal de CMC et du journal du matériel. Le même numéro de port est utilisé pour les trois serveurs. Un numéro de port syslog valide est compris entre 10 et 65 535. Par défaut : 514Utilisation de l'interface Web de CMC 215 Gestion des mises à jour du micrologiciel Cette section décrit la manière de mettre à jour un progiciel sur les composants de châssis et de serveur à l'aide de l'interface GUI et de l'utilitaire RACADM. Vous pouvez mettre à jour les composants suivants à l'aide de l'interface GUI et de RACADM. Dans l'interface GUI, vous pouvez effectuer la mise à jour en utilisant les pages Présentation du châssis→ Mettre à jour ou Chassis Controller→ Mettre à jour : • CMC : principal et secondaire • iKVM • iDRAC : les iDRAC du progiciel iDRAC antérieurs à iDRAC6 doivent être mis à jour à l'aide de l'interface de récupération. iDRAC6 FW peut également être mis à jour avec l'interface de récupération, mais est déprécié dans iDRAC6 et versions ultérieures. • Périphériques d'infrastructure du module d'E/S La page Présentation du serveur→ Mises à jour de l'interface GUI vous permet de mettre à jour les composants suivants. • iDRAC • BIOS • Unified Server Configurator • Diagnostics 32 bits • Paquet de pilotes du SE • Contrôleurs d'interface réseau (NIC) • Contrôleurs RAID Les mises à jour de progiciel de composant de serveur sont effectuées à l'aide du service Lifecycle Controller disponible sur iDRAC. Le Lifecycle Controller prend en charge les images progicielles au format DUP (Dell Update Package). La configuration CMC par défaut limite la taille du DUP à 48Mo. Le DUP de composant du progiciel OS-Driver dépasse cette limite et doit être mis à jour séparément à l'aide de la fonction Stockage étendu). Pour plus d'informations, voir « Mise à jour du micrologiciel des composants du serveur à l'aide du Lifecycle Controller », à la page 224.216 Utilisation de l'interface Web de CMC Lors de la mise à jour du micrologiciel, il convient de suivre la procédure recommandée, qui permet de prévenir une perte du service en cas d'échec de la mise à jour. Pour les instructions à suivre, voir « Installation ou mise à jour du micrologiciel du module CMC », à la page 54. Affichage des versions actuelles du micrologiciel La page Mise à jour affiche la version actuelle de tous les châssis de composants actualisables. Peuvent être inclus : le micrologiciel iKVM, le micrologiciel du contrôleur CMC principal et, le cas échéant, le micrologiciel du contrôleur CMC de secours, le micrologiciel iDRAC et le micrologiciel de périphérique d'infrastructure du module d'E/S. Pour plus d'informations, voir « Mise à jour du micrologiciel du périphérique d'infrastructure du module d'E/S », à la page 221. Pour afficher les composants du châssis pouvant être mis à jour : 1 Connectez-vous à l'interface Web. Pour plus d'informations, voir « Accès à l'interface Web CMC », à la page 111. 2 Cliquez sur Présentation du châssis dans l'arborescence. REMARQUE : sinon, cliquez sur Contrôleur du châssis dans l'arborescence du système. 3 Cliquez sur l'onglet Update (Mise à jour). La page Mise à jour du micrologiciel s'affiche. Pour afficher les composants de serveur actualisables : 1 Connectez-vous à l'interface Web. Pour plus d'informations, voir « Accès à l'interface Web CMC », à la page 111. 2 Cliquez sur Présentation des serveurs dans l'arborescence. 3 Cliquez sur l'onglet Mettre à jour. La Mise à jour du composant du serveur s'affiche. Pour ouvrir une page de mise à jour pour certains dispositifs : 1 Cliquez sur le nom du périphérique ou sélectionnez l'option Sélectionner / Désélectionner tout. 2 Cliquez sur Appliquer la mise à jour. Une page de mise à jour des dispositifs sélectionnés s'affiche. Utilisation de l'interface Web de CMC 217 Si le châssis renferme un serveur de génération antérieure avec iDRAC en mode de récupération ou si CMC détecte que le micrologiciel de l'iDRAC est endommagé, alors le module iDRAC de génération antérieure est également répertorié dans la page Mise à jour du micrologiciel. Voir « Restauration du micrologiciel iDRAC à l'aide de CMC », à la page 223 pour les étapes à suivre afin de récupérer le micrologiciel iDRAC à l'aide de CMC. Mise à jour du micrologiciel REMARQUE : pour mettre à jour le micrologiciel sur CMC, vous devez disposer du privilège Administrateur de configuration du châssis. REMARQUE : la mise à jour de micrologiciel conserve les paramètres CMC et iKVM actuels. REMARQUE : si une session de l'interface utilisateur Web est utilisée pour mettre à jour le micrologiciel d'un composant système, le paramètre Délai d'attente en cas d'inactivité doit être supérieur au délai de transfert du fichier. Dans certains cas, le transfert du fichier du micrologiciel peut prendre jusqu'à 30 minutes. Pour définir la valeur Délai d'attente en cas d'inactivité, voir « Configuration des services », à la page 205. La page Mise à jour du micrologiciel affiche la version actuelle du micrologiciel pour chaque composant répertorié et vous permet de mettre à jour le micrologiciel à la dernière révision. Pour mettre à jour les micrologiciels des périphériques, procédez comme suit : 1 Sélectionnez les périphériques à mettre à jour. 2 Cliquez sur le bouton Appliquer sous le groupement. 3 Cliquez sur Parcourir pour sélectionner l'image du micrologiciel. 4 Cliquez sur Commencer la mise à jour de micrologiciel pour démarrer le processus de mise à jour. Le message Transfert en cours de l'image de fichier s'affiche, suivi d'une page d'état de l'avancement. REMARQUE : vérifiez que vous disposez de la dernière version du micrologiciel. Vous pouvez télécharger la dernière version du fichier image du micrologiciel sur le site Web du support de Dell à l'adresse support.dell.com.218 Utilisation de l'interface Web de CMC Mise à jour du micrologiciel du contrôleur CMC REMARQUE : lorsqu'une mise à jour du micrologiciel d'un contrôleur CMC ou d'un module iDRAC est en cours sur un serveur, une partie ou l'ensemble des unités de ventilation du châssis fonctionne à 100 %. Ce comportement est normal. REMARQUE : une fois le micrologiciel correctement téléversé, le CMC actif se réinitialise et devient temporairement indisponible. Si un contrôleur CMC secondaire est présent, les rôles de CMC principal et secondaire permutent. Le contrôleur CMC secondaire devient le contrôleur CMC principal. Si une mise à jour est appliquée uniquement au contrôleur CMC actif (principal), ce dernier n'exécute pas l'image mise à jour après sa réinitialisation ; seul le contrôleur CMC de secours (secondaire) dispose de cette image. En général, il est vivement recommandé de maintenir des versions identiques du micrologiciel pour le contrôleur CMC secondaire et le contrôleur CMC principal. REMARQUE : pour éviter de déconnecter d'autres utilisateurs au cours d'une réinitialisation, avertissez les utilisateurs autorisés susceptibles de se connecter à CMC et recherchez les sessions actives affichées dans la page Sessions. Pour ouvrir la page Sessions, sélectionnez Châssis dans l'arborescence, cliquez sur l'onglet Réseau, puis sur le sous-onglet Sessions. L'aide relative à cette page est disponible via le lien Aide en haut à droite de la page. REMARQUE : lors du transfert de fichiers vers et à partir de CMC, l'icône de transfert de fichiers tourne. Si votre icône est animée, vérifiez que votre navigateur est configuré pour autoriser les animations. Voir « Autorisation des animations dans Internet Explorer », à la page 43 pour des instructions. REMARQUE : si vous rencontrez des problèmes lors du téléchargement de fichiers à partir de CMC dans Internet Explorer, activez l'option Ne pas enregistrer les pages cryptées sur le disque. Pour des instructions, voir « Téléchargement de fichiers à partir de CMC dans Internet Explorer », à la page 43. Pour mettre à jour le micrologiciel CMC : 1 Dans la page Mise à jour du micrologiciel, sélectionnez le ou les modules CMC à mettre à jour en cochant la case Mettre à jour les cibles. Il est possible de mettre à jour simultanément les deux modules CMC. 2 Cliquez sur le bouton Appliquer la mise à jour CMC sous la liste des composants CMC. REMARQUE : le nom par défaut de l'image du micrologiciel de CMC est firmimg.cmc. Le micrologiciel de CMC doit être mis à jour en premier, avant le périphérique d'infrastructure du module d'E/S. Utilisation de l'interface Web de CMC 219 3 Dans le champ Image de micrologiciel, entrez le chemin du fichier image du micrologiciel sur votre station de gestion ou votre réseau partagé ou cliquez sur Parcourir pour accéder à l'emplacement du fichier. 4 Cliquez sur Commencer la mise à jour de micrologiciel. La section Avancement de la mise à jour du micrologiciel fournit des informations sur l'état de la mise à jour du micrologiciel. Un indicateur d'état s'affiche sur la page pendant le chargement du fichier image. La durée du transfert de fichiers peut fortement varier en fonction de la vitesse de la connexion. Lorsque le processus de mise à jour interne démarre, la page s'actualise automatiquement et l'horloge de mise à jour du micrologiciel s'affiche. Instructions supplémentaires à suivre : • N'utilisez pas le bouton Actualiser et ne naviguez pas sur une autre page pendant le transfert. • Pour annuler le processus, cliquez sur Annuler le transfert du fichier et la mise à jour. Cette option n'est disponible que pendant le transfert du fichier. • L'état de la mise à jour s'affiche dans le champ État de mise à jour. Ce champ est mis à jour automatiquement pendant le transfert du fichier. REMARQUE : la mise à jour de CMC peut prendre plusieurs minutes. 5 Pour un CMC de secours (secondaire), le champ État de la mise à jour affiche « Terminé » lorsque la mise à jour est terminée. Pour un CMC actif (principal), la session du navigateur et la connexion à CMC sont perdues temporairement pendant la mise hors tension de CMC au cours des dernières étapes de la mise à jour du micrologiciel. Vous devez rouvrir une session quelques minutes plus tard, lorsque le contrôleur CMC actif a redémarré. Après la réinitialisation de CMC, le nouveau micrologiciel est affiché sur la page Mise à jour du micrologiciel. REMARQUE : après la mise à niveau du micrologiciel, videz la mémoire cache du navigateur Web. Consultez l'aide en ligne de votre navigateur pour des instructions sur le vidage de la mémoire cache.220 Utilisation de l'interface Web de CMC Mise à jour du micrologiciel du module iKVM REMARQUE : après le chargement du micrologiciel, le module iKVM est réinitialisé et devient temporairement indisponible. 1 Ouvrez à nouveau une session dans l'interface Web CMC. 2 Cliquez sur Présentation du châssis dans l'arborescence. 3 Cliquez sur l'onglet Update (Mise à jour). La page Mise à jour du micrologiciel s'affiche. 4 Sélectionnez le composant iKVM à mettre à jour en cochant la case Mettre à jour les cibles pour ce composant iKVM. 5 Cliquez sur le bouton Appliquer la mise à jour iKVM sous la liste des composants iKVM. 6 Dans le champ Image de micrologiciel, entrez le chemin du fichier image du micrologiciel sur votre station de gestion ou votre réseau partagé ou cliquez sur Parcourir pour accéder à l'emplacement du fichier. REMARQUE : le nom de l'image par défaut du micrologiciel iKVM est ikvm.bin. Cependant, vous pouvez modifier ce nom pour éviter toute confusion avec les images précédentes. 7 Cliquez sur Commencer la mise à jour de micrologiciel. 8 Cliquez sur Oui pour continuer. La section Avancement de la mise à jour du micrologiciel fournit des informations sur l'état de la mise à jour du micrologiciel. Un indicateur d'état s'affiche sur la page pendant le chargement du fichier image. La durée du transfert de fichiers peut fortement varier en fonction de la vitesse de la connexion. Lorsque le processus de mise à jour interne démarre, la page s'actualise automatiquement et l'horloge de mise à jour du micrologiciel s'affiche. Instructions supplémentaires à suivre : • N'utilisez pas le bouton Actualiser et ne naviguez pas sur une autre page pendant le transfert. • Pour annuler le processus, cliquez sur Annuler le transfert du fichier et la mise à jour. Cette option n'est disponible que pendant le transfert du fichier. • L'état de la mise à jour s'affiche dans le champ État de mise à jour. Ce champ est mis à jour automatiquement pendant le transfert du fichier. REMARQUE : la mise à jour d'iKVM peut prendre jusqu'à deux minutes. À la fin de la mise à jour, iKVM est réinitialisé et le nouveau micrologiciel apparaît sur la page Mise à jour du micrologiciel.Utilisation de l'interface Web de CMC 221 Mise à jour du micrologiciel du périphérique d'infrastructure du module d'E/S En effectuant cette mise à jour, le micrologiciel pour un composant de périphérique du module d'E/S est mis à jour, mais pas le micrologiciel du périphérique du module d'E/S lui-même ; le composant est l'ensemble de circuits d'interface entre le périphérique du module d'E/S et CMC. L'image de mise à jour du composant réside dans le système de fichiers CMC ; quant au composant, il est affiché comme périphérique actualisable sur l'interface utilisateur Web de CMC uniquement si la révision actuelle du composant et l'image du composant sur CMC ne correspondent pas. Pour mettre à jour le micrologiciel du périphérique d'infrastructure du module d'ES : 1 Ouvrez à nouveau une session dans l'interface Web CMC. 2 Cliquez sur Présentation du châssis dans l'arborescence. 3 Cliquez sur l'onglet Update (Mise à jour). La page Mise à jour du micrologiciel s'affiche. 4 Sélectionnez le périphérique du module d'E/S à mettre à jour en cochant la case Mettre à jour les cibles pour ce périphérique du module d'E/S. 5 Cliquez sur le bouton Appliquer la mise à jour IOM sous la liste des composants IOM. REMARQUE : le champ Image de micrologiciel n'apparaît pas pour une cible de périphérique d'infrastructure du module d'E/S (IOMINF) car l'image requise se trouve sur CMC. Le micrologiciel CMC doit être mis à jour en premier, avant le micrologiciel IOMINF. Les mises à jour d'IOMINF sont autorisées par CMC s'il détecte que le micrologiciel IOMINF est obsolète avec l'image contenue dans le système de fichiers CMC. Si le micrologiciel IOMINF est récent, CMC empêche les mises à jour d'IOMINF. Les périphériques IOMINF récents doivent être répertoriés en tant que périphériques pouvant être mis à jour.222 Utilisation de l'interface Web de CMC 6 Cliquez sur Commencer la mise à jour de micrologiciel. La section Avancement de la mise à jour du micrologiciel fournit des informations sur l'état de la mise à jour du micrologiciel. Un indicateur d'état s'affiche sur la page pendant le chargement du fichier image. La durée du transfert de fichiers peut fortement varier en fonction de la vitesse de la connexion. Lorsque le processus de mise à jour interne démarre, la page s'actualise automatiquement et l'horloge de mise à jour du micrologiciel s'affiche. Instructions supplémentaires à suivre : • N'utilisez pas le bouton Actualiser et ne naviguez pas vers une autre page pendant le transfert de fichiers. • L'état de la mise à jour s'affiche dans le champ État de mise à jour. Ce champ est mis à jour automatiquement pendant le transfert du fichier. REMARQUE : aucun décompte du temps de transfert ne s'affiche lors de la mise à jour du micrologiciel IOMINF. La mise à jour entraîne une courte perte de la connectivité au périphérique du module d'E/S, car ce dernier redémarre à la fin du processus. Lorsque la mise à jour est terminée, le nouveau micrologiciel est affiché et le système mis à jour n'est plus présent sur la page Mise à jour du micrologiciel. Mise à jour du micrologiciel iDRAC du serveur REMARQUE : iDRAC (sur un serveur) se réinitialise et est temporairement indisponible après le chargement des mises à jour du micrologiciel. REMARQUE : la version du micrologiciel iDRAC doit être la version 1.4 ou une version ultérieure pour les serveurs disposant d'iDRAC, ou la version 2.0 ou une version ultérieure pour les serveurs sur lesquels iDRAC6 Enterprise est installé. Si la mise à jour du progiciel iDRAC vers la version 3.0 ou une version ultérieure depuis une version iDRAC antérieure à 2.3, le progiciel iDRAC doit d'abord être mis à jour à la version 2.3 avant la mise à jour à la version 3.0 ou versions ultérieure. 1 Ouvrez à nouveau une session dans l'interface Web CMC. 2 Cliquez sur Présentation du châssis dans l'arborescence. 3 Cliquez sur l'onglet Mettre à jour. La page Mise à jour du micrologiciel s'affiche. 4 Sélectionnez le ou les périphériques iDRAC à mettre à jour en cochant la case Mettre à jour les cibles pour ces périphériques. 5 Cliquez sur le bouton Appliquer la mise à jour iDRAC sous la liste des composants iDRAC.Utilisation de l'interface Web de CMC 223 6 Dans le champ Image de micrologiciel, entrez le chemin du fichier image du micrologiciel sur votre station de gestion ou votre réseau partagé ou cliquez sur Parcourir pour accéder à l'emplacement du fichier. 7 Cliquez sur Commencer la mise à jour de micrologiciel. La section Avancement de la mise à jour du micrologiciel fournit des informations sur l'état de la mise à jour du micrologiciel. Un indicateur d'état s'affiche sur la page pendant le chargement du fichier image. La durée du transfert de fichiers peut fortement varier en fonction de la vitesse de la connexion. Lorsque la procédure de mise à jour interne démarre, la page s'actualise automatiquement et l'horloge de mise à jour du micrologiciel s'affiche. Instructions supplémentaires à suivre : • N'utilisez pas le bouton Actualiser et ne naviguez pas vers une autre page pendant le transfert de fichiers. • Pour annuler le processus, cliquez sur Annuler le transfert du fichier et la mise à jour. Cette option n'est disponible que pendant le transfert du fichier. • L'état de la mise à jour s'affiche dans le champ État de mise à jour. Ce champ est mis à jour automatiquement pendant le transfert du fichier. REMARQUE : la mise à jour peut prendre plusieurs minutes pour CMC ou le serveur. Restauration du micrologiciel iDRAC à l'aide de CMC Le micrologiciel iDRAC est généralement mis à jour à l'aide des fonctionnalités iDRAC telles que l'interface Web iDRAC, l'interface de ligne de commande SM-CLP ou les progiciels de mise à jour spécifiques aux systèmes d'exploitation téléchargés sur le site support.dell.com. Consultez le Guide d'utilisation du micrologiciel iDRAC pour des instructions de mise à jour du micrologiciel iDRAC. Les générations initiales de serveurs peuvent avoir des micrologiciels corrompus récupérés par le nouveau processus de micrologiciel iDRAC de mise à jour. Lorsque CMC détecte un micrologiciel iDRAC corrompu, il répertorie le serveur dans la page Mise à jour du micrologiciel. 224 Utilisation de l'interface Web de CMC Pour mettre à jour le micrologiciel iDRAC. 1 Téléchargez la dernière version du micrologiciel iDRAC sur votre ordinateur de gestion depuis l'adresse support.dell.com. 2 Ouvrez une session sur l'interface Web (voir « Accès à l'interface Web CMC », à la page 111). 3 Cliquez sur Présentation du châssis dans l'arborescence. 4 Cliquez sur l'onglet Update (Mise à jour). La page Mise à jour du micrologiciel s'affiche. 5 Sélectionnez le ou les contrôleurs iDRAC à mettre à jour en cochant la case Mettre à jour les cibles pour ces périphériques. 6 Cliquez sur le bouton Appliquer la mise à jour iDRAC sous la liste des composants iDRAC. 7 Cliquez sur Parcourir, naviguez vers l'image du micrologiciel iDRAC que vous avez téléchargée et cliquez sur Ouvrir. REMARQUE : le nom par défaut de l'image du micrologiciel iDRAC est firmimg.imc. Le micrologiciel de CMC doit être mis à jour en premier, avant le périphérique d'infrastructure du module d'E/S. 8 Cliquez sur Commencer la mise à jour de micrologiciel. Instructions supplémentaires à suivre : • N'utilisez pas le bouton Actualiser et ne naviguez pas vers une autre page pendant le transfert de fichiers. • Pour annuler le processus, cliquez sur Annuler le transfert du fichier et la mise à jour. Cette option n'est disponible que pendant le transfert du fichier. • L'état de la mise à jour s'affiche dans le champ État de mise à jour. Ce champ est mis à jour automatiquement pendant le transfert du fichier. REMARQUE : la mise à jour du micrologiciel iDRAC peut prendre jusqu'à 10 minutes. Mise à jour du micrologiciel des composants du serveur à l'aide du Lifecycle Controller Le service Lifecycle Controller est disponible sur chaque serveur et facilité par iDRAC. La page Mise à jour des composants du serveur permet de gérer le micrologiciel des composants et périphériques des serveurs à l'aide du Utilisation de l'interface Web de CMC 225 service Lifecycle Controller. Le Lifecycle Controller utilise une optimisation algorithmique pour mettre à jour le progiciel réduisant de manière efficace le nombre de redémarrage. Avant l'utilisation de la fonctionnalité de mise à jour basée sur Lifecycle Controller, les versions du micrologiciel des serveurs doivent être mises à jour. REMARQUE : vous devez mettre à jour le progiciel CMC avant de mettre à jour les modules progiciels de composant de serveur. Vous devez mettre à jour les modules progiciels de composant de serveur dans l'ordre qui suit : • BIOS • Lifecycle Controller • iDRAC Voir la section « Versions de progiciel de module recommandées » dans la section Lisez-moi de CMC sur le site support.dell.com/manuals. Le Lifecycle Controller fournit la prise en charge de mise à jour de module pour les serveurs iDRAC6 et versions ultérieures. Le progiciel iDRAC doit être à la version 2.3 ou version ultérieure pour pouvoir mettre à jour le progiciel à l'aide de contrôleur Lifecycle. Lors de la mise à jour manuelle du progicielle à l'aide de DUP, vous devez mettre à jour le progiciel dans l'ordre suivant : • BIOS • Lifecycle Controller • iDRAC : si vous mettez à jour le progiciel iDRAC vers la version 3.0 ou une version ultérieure depuis une version iDRAC antérieure à 2.3, le progiciel iDRAC doit d'abord être mis à jour à la version 2.3 avant la mise à jour à la version 3.0 ou version ultérieure.226 Utilisation de l'interface Web de CMC Activation du Lifecycle Controller Si le serveur ne prend pas en charge le service Lifecycle Controller, la section Inventaire du micrologiciel affiche le message Non pris en charge. Le service Lifecycle Controller peut être désactivé sur le serveur. Dans ce cas, la section Inventaire du système affiche Lifecycle Controller peut ne pas être activé. Pour activer le service Lifecycle Controller sur la dernière génération des serveurs, mettez à niveau les serveurs existants en installant le micrologiciel Unified Server Configurator (USC) et en mettant à jour le micrologiciel iDRAC6. Dans le cas d'une génération plus ancienne de serveurs, cette mise à niveau peut ne pas être possible. Normalement, le micrologiciel USC est installé via un progiciel d'installation approprié à exécuter sur le SE. Un progiciel spécial de réparation ou d'installation avec l'extension de fichier .usc est disponible sur l'interface de navigateur Web iDRAC natif. Ce progiciel permet l'installation du micrologiciel USC par la voie de transmission habituelle de la mise à jour micrologicielle. Pour des informations supplémentaires, consultez le Guide d'utilisation de Dell Lifecycle Controller pour USC/USC-LCE. Le service de contrôleur Lifecycle peut être activé au cours du processus de démarrage de serveur. Pour les serveurs iDRAC6 servers, sur la console de démarrage, lorsque vous y êtes invité avec le message Appuyez sur pour configurer l'accès à distance sous 5 sec., appuyez sur . Dans l'écran de configuration, activez Services du système. Pour annuler toutes les tâches planifiées en attente et les supprimer de la file d'attente, sélectionnez Annuler les services du système. La page Mise à jour des composants du serveur permet de mettre à jour les micrologiciels de votre système. Pour utiliser les fonctionnalités et fonctions de cette page, vous devez disposer des droits suivants : • Pour CMC : Server Administrator. • Pour iDRAC : Configurer iDRAC et Ouvrir une session dans iDRAC. Si vous ne disposez pas des droits nécessaires, l'inventaire du micrologiciel des composants et des périphériques ne peut être visualisé que depuis le serveur. Aucun composant ou périphérique ne peut être sélectionné pour toute tâche du Lifecycle Controller sur le serveur.Utilisation de l'interface Web de CMC 227 Pour des informations supplémentaires sur le Lifecycle Controller, les composants du serveur, et la gestion du micrologiciel de périphériques, voir : • Présentation des services distants du Dell Lifecycle Controller • delltechcenter.com/page/Lifecycle+Controller. Mécanismes de filtrage Les informations sur les composants et périphériques répartis sur tous les serveurs sont récupérées simultanément. Pour gérer tant d'informations, le Lifecycle Controller fournit divers mécanismes de filtrage. Ces filtres vous permettent de : • sélectionner une ou plusieurs catégories de composants ou périphériques pour une visualisation aisée, • comparer les versions micrologicielles des composants et périphériques répartis sur le serveur, • filtrer automatiquement les composants et périphériques, pour réduire la catégorie d'un composant ou périphérique selon les types ou modèles. REMARQUE : la fonction de filtrage automatique est importante au cours de l'utilisation du DUP (Dell Update Package). La programmation de la mise à jour d'un DUP peut dépendre du type ou modèle du composant ou périphérique. Le comportement du filtrage automatique est conçu pour réduire les décisions de sélections ultérieures après la sélection initiale effectuée. Exemples Voici quelques exemples où les mécanismes de filtrage sont appliqués : • Si le filtre du BIOS est sélectionné, seul l'inventaire du BIOS pour tous les serveurs est introduit. Si l'ensemble des serveurs consiste en un nombre de modèles présents sur le server, la logique de filtrage automatique supprime automatiquement tous les autres serveurs ne correspondant pas au modèle du serveur sélectionné. Ceci assure que l'image de mise à jour du micrologiciel du BIOS (DUP) sélectionnée est compatible avec le modèle correcte du serveur. Parfois, l'image de mise à jour du micrologiciel du BIOS (DUP) peut être compatible avec un certain nombre de modèles de serveur. De telles optimisations sont ignorées au cas où la compatibilité cesse ultérieurement. 228 Utilisation de l'interface Web de CMC • Le filtrage automatique est important pour les mises à jour micrologicielles des NIC et des contrôleurs RAID. Ces catégories de périphériques renferment différents types et modèles. De la même manière, les images de mises à jour micrologicielles (DUP) peuvent être disponibles sous formes optimisées où un DUP unique peut être programmé pour mettre à jour plusieurs types ou modèles de périphériques d'une catégorie donnée. La page Mise à jour des composants du serveur fournit les sections suivantes : • Filtre de mise à jour des composants/périphériques : cette section est utilisée pour contrôler la visualisation des composants et/ou périphériques de la section Inventaire du micrologiciel. Lorsque le filtre d'un type de composant ou périphérique est activé, la section Inventaire du micrologiciel est modifiée et affiche uniquement le composant ou périphérique activé sur tous les serveurs. Après avoir sélectionné un filtre et après l'affichage d'un ensemble de composants et périphériques filtrés dans la section de l'inventaire, un filtrage supplémentaire peut se produire lorsqu'un composant ou périphérique est sélectionné pour être mis à jour. Par exemple, si le filtre du BIOS est sélectionné, la section de l'inventaire affiche tous les serveurs et leur composant BIOS uniquement. Si un composant BIOS d'un des serveurs est sélectionné, l'inventaire est à nouveau filtré pour afficher les serveurs correspondant au nom du modèle du serveur sélectionné. Si aucun filtre n'est sélectionné et qu'une mise à jour d'un composant ou périphérique est sélectionnée, le filtre associé à cette sélection est automatiquement activé. Un filtrage supplémentaire peut se produire lorsque la section de l'inventaire affiche tous les serveurs correspondant au composant sélectionné en termes de modèle, type ou quelque forme d'identité. Par exemple, si un composant BIOS d'un des serveurs est sélectionné pour être mis à jour, le filtre est configuré sur le BIOS automatiquement et la section de l'inventaire affiche les serveurs qui correspondent au nom du modèle du serveur sélectionné.Utilisation de l'interface Web de CMC 229 Activer le filtre permet au composant ou périphérique associé d'être filtré dans la section Inventaire du micrologiciel. Après l'activation d'un filtre, seuls les composants ou périphériques associés répartis sur tous les serveurs présents dans le châssis peuvent être affichés. Le filtre est un filtre en dérivation. Cela signifie qu'il n'accepte que des composants ou périphériques associés y étant associés et exclut tous les autres. Un ou plusieurs filtres (ou tous) peuvent être sélectionnés, au besoin. Les composants ou périphériques sont groupés sous les catégories suivantes : – BIOS – iDRAC – Unified Server Configurator (Lifecycle Controller) – Diagnostics 32 bits – Progiciel de pilotes du SE – Network Interface Controllers (NIC) et contrôleurs RAID • Inventaire du micrologiciel des composants/périphériques : cette section récapitule la condition des versions micrologicielles de tous les composants et périphériques répartis sur tous les serveurs actuellement présents dans le châssis. Les options d'opérations du Lifecycle Controller telles que Mise à jour, Restauration, Réinstallation et Suppression de tâche sont disponibles. Seul un type d'opération peut être effectué simultanément. Les composants et périphériques non pris en charge peuvent être répertoriés dans le cadre de l'inventaire, mais n'autorisent pas les opérations Lifecycle Controller. Les serveurs ne prenant pas actuellement en charge le service Lifecycle Controller sont répertoriés comme Non pris en charge. Un lien hypertexte est fourni permettant de naviguer vers une page alternative d'où la mise à jour du micrologiciel iDRAC uniquement peut être effectuée. Cette page ne prend pas en charge la mise à jour de composants ou périphériques sur le serveur. Seul le micrologiciel iDRAC peut être mis à jour sur la page alternative et ne dépend pas de la voie de transmission du Lifecycle Controller. 230 Utilisation de l'interface Web de CMC Si le serveur est répertorié comme Pas prêt, cela indique que lorsque l'inventaire du micrologiciel était récupéré, l'iDRAC du serveur était encore en cours d'initialisation. Patientez jusqu'à ce que l'iDRAC soient complètement opérationnel, puis réinitialisez la page pour que l'inventaire du micrologiciel soit à nouveau récupéré. Si l'inventaire des composants ou périphériques n'affiche pas les éléments physiquement installés sur le serveur, vous devez appeler l'USC (Unified Server Configurator Console) lorsque le serveur est en cours d'amorçage. Ceci aide à actualiser les composants internes et les informations sur les périphériques et fournit d'autres moyens de vérifier les composants et périphériques actuellement installés. Cette situation se produit lorsque : • le micrologiciel iDRAC du serveur est mis à jour pour introduire la fonctionnalité Lifecycle Controller à la gestion du serveur, • les nouveaux périphériques ont été récemment insérés dans le serveur. Pour rendre cette action automatique, l'utilitaire de configuration iDRAC fournit une option accessible via la console d'amorçage. Pour les serveurs iDRAC6 servers, sur la console de démarrage, lorsque vous y êtes invité avec le message Appuyez sur pour configurer l'accès à distance sous 5 sec., appuyez sur . Ensuite, sur l'écran d'installation, activez Collecter l'inventaire système au redémarrage. Pour les serveurs iDRAC7, sur la console de démarrage, sélectionnez F2 pour la configuration du système. Sur l'écran d'installation, sélectionnez les paramètres iDRAC, puis sélectionnez les services de système (USC). Ensuite, sur l'écran d'installation, activez Collecter l'inventaire système au redémarrage. Utilisation de l'interface Web de CMC 231 La Figure 5-59 affiche les informations sur les composants et les périphériques présents sur le serveur : Tableau 5-59. Informations sur les composants et périphériques Champ Description Logement Indique le logement occupé par le serveur du châssis. Les numéros de logement sont des ID séquentiels, qui vont de 1 à 16 (pour les 16 logements disponibles dans le châssis), qui permettent d'identifier l'emplacement du serveur dans le châssis. Lorsqu'il y a moins de 16 serveurs dans les logements, seuls les logements avec serveur sont affichés. Name (Nom) Affiche le nom du serveur dans chaque logement. Modèle Affiche le nom du modèle du serveur. Composant/Périphé rique Affiche une description du composant ou périphérique présent sur le serveur. Si la colonne est trop étroite, l'outil « souris sur image » offre une vue de la description. Version actuelle Affiche la version actuelle du composant ou périphérique présent sur le système. Si une case à cocher se trouve en regard de la version actuelle, cela indique qu'une image micrologicielle du micrologiciel actuellement installé pour le composant ou périphérique est disponible dans le Lifecycle Controller pour une opération de Réinstallation. Version de restauration Affiche la version de restauration du composant ou périphérique présent sur le serveur. Une case à cocher en regard de la version de restauration indique qu'une image micrologicielle du micrologiciel précédemment installé pour le composant ou périphérique est disponible dans le Lifecycle Controller pour une opération de Restauration. Sa disponibilité dépend de la logique de compatibilité de version du Lifecycle Controller. Cela suppose également que la mise à jour précédente a été facilitée par le Lifecycle Controller.232 Utilisation de l'interface Web de CMC Condition des tâches Affiche la condition des tâches de toute opération programmée sur le serveur. La condition des tâches est mise à jour en continu de manière dynamique. Si l'achèvement d'une tâche dont la condition est terminée est détecté, les versions des micrologiciels des composants et périphériques présents sur ce serveur sont alors automatiquement réactualisées au cas où une modification de la version du micrologiciel d'un composant ou périphérique se serait produite. Si une case à cocher est présente en regard de la condition des tâches, cela indique qu'une tâche du Lifecycle Controller est en cours et se trouve actuellement dans la condition indiquée. Elle peut être cochée pour une opération de Suppression de tâches. Une icône informative, qui se trouve également en regard de la condition actuelle, fournit des informations supplémentaires sur la condition actuelle des tâches. Pour consulter ces informations, il suffit de cliquer sur l'icône ou de placer le curseur au-dessus. Tableau 5-59. Informations sur les composants et périphériques (suite) Champ DescriptionUtilisation de l'interface Web de CMC 233 Mise à jour Sélectionne le composant ou périphérique pour la mise à jour du micrologiciel sur le serveur. Utilisez la touche de raccourci CRTL pour sélectionner un type de composant ou périphérique à mettre à jour sur tous les serveurs applicables. Appuyer sur la touche CRTL et la maintenir enfoncée met tous les composants en surbrillance jaune. Tout en appuyant sur la touche CRTL, sélectionnez le composant ou périphérique requis en cochant la cache associée dans la colonne Mettre à jour. Les mises à jour du BIOS sont spécifiques au modèle du serveur. La logique de sélection dépend de ce comportement. Il arrive que même si un seul périphérique NIC est sélectionné pour la mise à jour du micrologiciel sur un serveur, celle-ci peut s'appliquer à tous les périphériques NIC du serveur. Ce comportement est inhérent à la fonctionnalité du Lifecycle Controller, tout particulièrement la programmation contenue dans le DUP (Dell Update Package). La taille des DUP actuellement prise en charge est inférieure à 48 Mo. Si la taille de l'image du fichier de mise à jour est supérieure, la condition des tâches indique que le téléchargement a échoué. Si plusieurs tentatives de mise à jour de composants sont effectuées sur un serveur, la taille combinée de tous les fichiers de mise à jour du micrologiciel peut également dépasser 48 Mo. Dans un tel cas, une des mises à jour de composant échoue car son fichier de mise à jour est réduit. Une stratégie recommandée pour la mise à jour de plusieurs composants est de mettre à jour l'USC et des composants de diagnostics de 32 bits simultanément en premier. Ces mises à jour ne nécessitent pas un redémarrage du serveur et sont relativement rapides. Les autres composants peuvent alors être mis à jour ensemble. Toutes les mises à jour du Lifecycle Controller sont normalement programmées pour être exécutées immédiatement. Cependant, il arrive que les services du système retardent cette exécution. Dans de telles situations, la mise à jour échoue car le partage à distance hébergé par le CMC n'est plus disponible. Tableau 5-59. Informations sur les composants et périphériques (suite) Champ Description234 Utilisation de l'interface Web de CMC Lorsqu'un composant ou périphérique est sélectionné pour être mis à jour, le DUP (Dell Update Package) doit être spécifié. Un tableau secondaire identifiant le composant/périphérique et un sélectionneur pour le fichier d'image du micrologiciel s'affichent. Ceci permet de spécifier le fichier d'image du micrologiciel associé au composant ou périphérique. Un sélectionneur spécifique s'affiche pour chaque type de composant/périphérique sélectionné pour être mis à jour. REMARQUE : seul un sélectionneur par catégorie de composant ou périphérique s'affiche. Ceci est plus apparent dans le cas de périphériques NIC et de périphériques de contrôleur RAID. Ces périphériques peuvent inclure plusieurs types et modèles. La logique de sélection de mise à jour filtre automatiquement le type ou modèle de périphérique pertinent selon les périphériques initialement sélectionnés. Ce comportement de filtrage automatique résulte du fait que seul un fichier d'image du micrologiciel pour la catégorie peut être spécifié à la fois. Le fichier d'image du micrologiciel doit être un DUP (Dell Update Package) Microsoft Windows. Celui-ci est un fichier exécutable Microsoft Windows. REMARQUE : la taille limite de mise à jour d'un DUP unique ou de plusieurs DUP combinés peut être ignorée si la fonctionnalité Stockage étendu est installée et activée. Pour plus d'information sur l'activation de stockage étendu, voir « Activation du support Flash amovible », à la page 115. REMARQUE : Dell vous recommande d'effacer la file d'attente des tâches avant d'initialiser une mise à jour micrologicielle des composants du serveur. La liste des tâches s'exécutant sur le ou les serveur(s) est disponible sur la page Tâches du Lifecycle Controller. Cette page permet la suppression d'une ou de plusieurs tâche(s) ou l'élimination de toutes les tâches du serveur. Consultez la section Dépannage du « Gestion des tâches Lifecycle Controller sur un système distant », à la page 453.Utilisation de l'interface Web de CMC 235 La page Mise à jour des composants du serveur vous permet d'effectuer différentes actions à l'aide des boutons disponibles. Chaque bouton permet d'effectuer l'opération du Lifecycle Controller qui lui est associée. Pour effectuer une opération, un composant ou périphérique au moins doit être sélectionné pour celle-ci. Si une opération de Mise à jour est sélectionnée pour un composant ou périphérique, le fichier d'image du micrologiciel de ce composant ou périphérique doit alors être spécifié dans la section Mettre à jour le filtre et la sélection du fichier d'image. Restez sur la page après avoir planifié une opération. Si vous tentez de vous rendre sur une autre page, un message contextuel de confirmation s'affiche permettant d'annuler cette tentative. Sinon, l'opération est annulée. Une interruption, particulièrement lorsqu'elle se produit au cours d'une opération de Mise à jour, peut entraîner l'annulation du téléversement du fichier d'image du micrologiciel avant qu'il puisse être achevé. Après avoir planifié une opération, veillez à ce que le message contextuel de confirmation qui indique que la planification a réussi soit acquitté. Une fois planifiée sur le serveur, l'exécution d'une opération du Lifecycle Controller peut prendre 10 à 15 minutes. Le processus comprend plusieurs redémarrages du serveur au cours desquels l'installation du micrologiciel est exécutée. Celle-ci comprend également une étape de vérification du micrologiciel. La progression de ce processus peut être suivie en consultant la console du serveur. Si plusieurs composants ou périphériques nécessitant une mise à jour se trouvent sur le serveur, consolidez toutes les mises à jour en une opération planifiée. Ceci minimise ainsi le nombre de redémarrages requis. La Figure 5-60 décrit les boutons disponibles et les actions pouvant être effectuées sur la page Mise à jour des composants du serveur : Tableau 5-60. Actions de mise à jour des composants du serveur Bouton Action Mise à jour Effectue l'opération de Mise à jour pour planifier les mises à jour du micrologiciel des composants et/ou périphériques sélectionnés d'un ou plusieurs serveur(s). Restauration Effectue l'opération de Restauration pour planifier les restaurations du micrologiciel des composants et/ou périphériques sélectionnés d'un ou plusieurs serveur(s). 236 Utilisation de l'interface Web de CMC Pour certains composants, les actions de mise à jour, de retour en arrière et de réinstallation peuvent exiger un redémarrage. Le redémarrage peut être retardé en faisant la sélection dans la liste déroulante. Sélectionnez Reboot Now (redémarrez maintenant) si le serveur a besoin d'être redémarré immédiatement ou Reboot Later (redémarrer plus tard) pour redémarrer le serveur manuellement ultérieurement. Il arrive que, lorsqu'une opération est en cours de soumission pour une planification via une autre session ou un autre contexte, une autre tentative d'opération soit effectuée. Dans ce cas, un message contextuel de confirmation s'affiche indiquant la situation et vous informant que l'opération n'a pas été soumise. Laissez l'opération en cours se terminer, puis soumettez à nouveau l'opération. Gestion iDRAC CMC fournit une page Déployer iDRAC pour permettre à l'utilisateur de définir les paramètres de configuration de réseau iDRAC pour les serveurs, qu'ils soient déjà installés ou nouvellement insérés. Un utilisateur peut configurer un ou plusieurs périphériques iDRAC installés à partir de cette page. L'utilisateur peut également définir les paramètres de configuration réseau iDRAC par défaut et le mot de passe racine pour les serveurs qui seront installés ultérieurement ; ces paramètres par défaut sont les paramètres iDRAC QuickDeploy. Pour des informations supplémentaires sur le comportement iDRAC, consultez les Guides d'utilisation d'iDRAC sur le site Web support.dell.com/manuals. Réinstallation Effectue l'opération de Réinstallation pour planifier les réinstallations du micrologiciel des composants et/ou périphériques sélectionnés d'un ou plusieurs serveur(s). Suppression de tâches Effectue l'opération de Suppression de tâches pour supprimer les tâches associées aux composants et/ou périphériques sélectionnés sur un ou plusieurs serveurs. Tableau 5-60. Actions de mise à jour des composants du serveur Bouton ActionUtilisation de l'interface Web de CMC 237 iDRAC QuickDeploy La section iDRAC QuickDeploy de la page Déployer iDRAC contient les paramètres de configuration de réseau qui sont appliqués aux serveurs nouvellement insérés. Vous pouvez utiliser ces paramètres pour remplir automatiquement le tableau Paramètres réseau iDRAC qui se trouve sous la section QuickDeploy. Une fois que QuickDeploy est activé, les paramètres QuickDeploy sont appliqués aux serveurs après avoir été installés. Pour plus d'information sur les paramètres QuickDeploy d'iDRAC, voir l'étape 8 dans « Configuration de la mise en réseau à l'aide de l'Assistant Configuration de l'écran LCD », à la page 46. Pour activer iDRAC QuickDeploy et configurer ses paramètres : 1 Ouvrez une session sur l'interface Web de CMC. 2 Cliquez sur Présentation des serveurs dans l'arborescence. 3 Cliquez sur l'onglet Configuration. La page Déployer iDRAC apparaît. 4 Définissez les paramètres QuickDeploy en conséquence. Tableau 5-61. Paramètres QuickDeploy Paramètre Description QuickDeploy activé Active/désactive la fonctionnalité QuickDeploy qui applique automatiquement les paramètres iDRAC configurés sur cette page aux serveurs nouvellement installés ; la configuration automatique doit être confirmée localement sur l'écran LCD. REMARQUE : cela inclut le mot de passe de l'utilisateur racine si la case Définir le mot de passe racine d'iDRAC sur l'insertion de serveur est cochée. Par défaut : décoché (désactivé) Définir le mot de passe racine d'iDRAC sur l'insertion de serveur Spécifie si le mot de passe racine d'iDRAC du serveur doit être remplacé par la valeur fournie dans la boîte de dialogue Mot de passe racine iDRAC lorsque le serveur est inséré. 238 Utilisation de l'interface Web de CMC Mot de passe racine d'iDRAC Lorsque les cases Définir le mot de passe racine d'iDRAC lors de l'insertion de serveur et QuickDeploy activé sont cochées, cette valeur de mot de passe est assignée au mot de passe de l'utilisateur racine iDRAC d'un serveur dès que ce dernier est inséré dans le châssis. Le mot de passe peut contenir entre 1 et 20 caractères imprimables (y compris les espaces). Confirmer le mot de passe racine d'iDRAC Vérifie le mot de passe entré dans le champ Mot de passe racine d'iDRAC. Activer le réseau local d'iDRAC Active/désactive le canal de réseau local d'iDRAC. Par défaut : décoché (désactivé) Activer IPv4 pour iDRAC Active/Désactive IPv4 sur iDRAC. Le paramètre par défaut est activé. Activer IPMI sur le réseau local d'iDRAC Active/désactive le canal IPMI sur le réseau local pour chaque iDRAC présent dans le châssis. Par défaut : décoché (désactivé) Activer DHCP pour iDRAC Active/désactive DHCP pour chaque iDRAC présent dans le châssis. Si cette option est activée, les champs IP QuickDeploy, Masque de sous-réseau QuickDeploy et Passerelle QuickDeploy sont désactivés et ne peuvent pas être modifiés étant donné que DHCP assigne automatiquement ces paramètres pour chaque iDRAC. Par défaut : décoché (désactivé) Tableau 5-61. Paramètres QuickDeploy (suite) Paramètre DescriptionUtilisation de l'interface Web de CMC 239 Première adresse IPv4 d'iDRAC (logement 1) Spécifie l'adresse IP statique d'iDRAC du serveur dans le logement 1 de l'enceinte. L'adresse IP de chaque iDRAC suivant est incrémenté de un pour chaque logement à partir de l'adresse IP statique du logement 1. Si la somme de l'adresse IP et du numéro du logement est supérieure au masque de sous-réseau, un message d'erreur s'affiche. REMARQUE : le masque de sous-réseau et la passerelle ne sont pas incrémentés comme l'adresse IP. Par exemple, si la première adresse IP est 192.168.0.250 et que le masque de sous-réseau est 255.255.0.0, l'adresse IP QuickDeploy pour le logement 15 est 192.168.0.265. Si le masque de sous-réseau est 255.255.255.0, le message d'erreur La plage de l'adresse IP QuickDeploy n'est pas contenue dans le sous-réseau QuickDeploy s'affiche lorsque vous appuyez sur l'un des boutons Enregistrer les paramètres QuickDeploy ou Remplir automatiquement avec les paramètres QuickDeploy. Masque de sous-réseau IPv4 d'iDRAC Spécifie le masque de sous-réseau QuickDeploy assigné à tout serveur nouvellement inséré. Passerelle IPv4 d'iDRAC Spécifie la passerelle par défaut QuickDeploy assignée à tout iDRAC présent dans le châssis. Activer IPv6 pour iDRAC Active l'adressage IPv6 pour chaque iDRAC présent dans le châssis qui possède la capacité IPv6. Activer la configuration automatique IPv6 d'iDRAC Active iDRAC pour obtenir les paramètres IPv6 (adresse et longueur de préfixe) auprès d'un serveur DHCPv6 et autorise également la configuration automatique des adresses statiques. Le paramètre par défaut est activé. Passerelle IPv6 d'iDRAC Spécifie la passerelle IPv6 par défaut à assigner aux iDRAC. Le paramètre par défaut est « :: ». Longueur de préfixe IPv6 iDRAC Spécifie la longueur de préfixe à assigner pour les adresses IPv6 sur l'iDRAC. Le paramètre par défaut est 64. Tableau 5-61. Paramètres QuickDeploy (suite) Paramètre Description240 Utilisation de l'interface Web de CMC 5 Pour enregistrer les sélections, cliquez sur le bouton Enregistrer les paramètres QuickDeploy. Si vous avez modifié les paramètres réseau iDRAC, cliquez sur le bouton Appliquer les paramètres réseau d'iDRAC pour déployer les paramètres sur iDRAC. 6 Pour mettre à jour le tableau avec les derniers paramètres QuickDeploy enregistrés et restaurer les paramètres réseau iDRAC sur les valeurs actuelles pour chaque serveur installé, cliquez sur Actualiser. REMARQUE : si vous cliquez sur le bouton Actualiser, tous les paramètres de configuration réseau d'iDRAC QuickDeploy et d'iDRAC qui n'ont pas été enregistrés seront supprimés. La fonctionnalité QuickDeploy est exécutée seulement si elle est activée et si un serveur est inséré dans le châssis. Si les cases Définir le mot de passe de root iDRAC lors de l'insertion du serveur et QuickDeploy activé sont cochées, l'utilisateur est invité via l'interface LCD à autoriser ou non la modification du mot de passe. Si certains paramètres de configuration réseau diffèrent des paramètres iDRAC actuels, l'utilisateur peut accepter ou refuser les modifications. REMARQUE : s'il existe une différence de réseau local ou de réseau local sur IPMI, l'utilisateur est invité à accepter le paramètre de l'adresse IP de QuickDeploy. Si la différence est le paramètre DHCP, l'utilisateur est invité à accepter le paramètre QuickDeploy DHCP. Pour copier les paramètres QuickDeploy dans la section Paramètres réseau d'iDRAC, cliquez sur Remplir automatiquement avec les paramètres QuickDeploy. Les paramètres de configuration réseau QuickDeploy sont copiés dans les champs correspondants du tableau Paramètres de configuration réseau d'iDRAC. REMARQUE : les modifications apportées aux champs de QuickDeploy sont immédiates. Cependant, la propagation, de CMC à iDRAC, des modifications apportées à un ou plusieurs paramètres de configuration réseau de serveur iDRAC risquent de prendre quelques minutes. Si vous appuyez trop tôt sur le bouton Actualiser, des données partiellement correctes pour un ou plusieurs serveurs iDRAC seront affichées.Utilisation de l'interface Web de CMC 241 Paramètres réseau d'iDRAC La section Paramètres réseau d'iDRAC de la page Déployer iDRAC contient un tableau énumérant les paramètres de configuration réseau IPv4 et IPv6 d'iDRAC de tous les serveurs installés. À l'aide de ce tableau, vous pouvez configurer les paramètres de configuration réseau d'iDRAC pour chaque serveur installé. Les valeurs initiales affichées dans chaque champ correspondent aux valeurs actuelles provenant d'iDRAC. Lorsque vous modifiez un champ et que vous cliquez sur Appliquer les paramètres réseau d'iDRAC, le champ modifié est enregistré sur iDRAC. Pour activer le Réseau iDRAC et configurer ses paramètres : 1 Ouvrez une session sur l'interface Web de CMC. 2 Cliquez sur Présentation des serveurs dans l'arborescence. 3 Cliquez sur l'onglet Configuration. La page Déployer iDRAC apparaît. 4 Cochez la case QuickDeploy activé pour activer les paramètres de déploiement rapide. 5 Définissez les Paramètres réseau d'iDRAC en conséquence. Tableau 5-62. Paramètres réseau d'iDRAC Paramètre Description Logement Indique le logement occupé par le serveur du châssis. Les numéros de logement sont des numéros séquentiels, qui vont de 1 à 16 (16 logements sont disponibles dans le châssis), qui permettent d'identifier l'emplacement des serveurs dans le châssis. REMARQUE : lorsqu'il y a moins de 16 serveurs dans les logements, seuls les logements avec serveur sont affichés. Nom Affiche le nom du serveur présent dans chaque logement. Par défaut, les logements sont nommés SLOT-01 à SLOT-16. REMARQUE : le nom d'un logement ne peut être vide ou NUL.242 Utilisation de l'interface Web de CMC Activer le réseau local Active (coché) ou désactive (décoché) le canal de réseau local . REMARQUE : lorsque le réseau local n'est pas sélectionné (désactivé), aucun autre paramètre de configuration réseau (IPMI sur réseau local, DHCP, Masque de sous-réseau de l'adresse IP et Passerelle) n'est utilisé. Ces champs ne sont pas accessibles. Modifier le mot de passe racine Permet (lorsque la case est cochée) de modifier le mot de passe de l'utilisateur racine iDRAC. Les champs Mot de passe root d'iDRAC et Confirmer le mot de passe root d'iDRAC doivent être remplis pour que cette opération réussisse. DHCP S'il est sélectionné, le protocole DHCP est utilisé pour acquérir l'adresse IP, le masque de sous-réseau et la passerelle par défaut d'iDRAC ; sinon, les valeurs définies dans les champs de configuration réseau d'iDRAC sont utilisées. Le réseau local doit être activé pour définir ce champ. IPMI sur le LAN Active (case cochée) ou désactive (case décochée) le canal réseau local d'IPMI. Le réseau local doit être activé pour définir ce champ. Adresse IP Adresse IPv4 ou IPv6 statique assignée à iDRAC situé dans ce logement. Masque de sous-réseau Spécifie le masque de sous-réseau assigné au module iDRAC installé dans ce logement. Passerelle Spécifie la passerelle par défaut assignée au module iDRAC installé dans ce logement. Activer IPv4 Active iDRAC dans le logement pour utiliser le protocole IPv4 sur le réseau. Vous devez sélectionner l'option Activer le réseau local pour que cette option soit active. Le paramètre par défaut est activé. Tableau 5-62. Paramètres réseau d'iDRAC (suite) Paramètre DescriptionUtilisation de l'interface Web de CMC 243 6 Pour déployer le paramètre sur iDRAC, cliquez sur le bouton Appliquer les paramètres réseau d'iDRAC. Si vous avez modifié les paramètres de déploiement rapide, ceux-ci seront également enregistrés. 7 Pour restaurer les paramètres réseau d'iDRAC sur les valeurs actuelles de chaque serveur installé et pour mettre à jour le tableau Déploiement rapide avec les derniers paramètres de déploiement rapide enregistrés, cliquez sur Actualiser. REMARQUE : si vous cliquez sur le bouton Actualiser, tous les paramètres de configuration de QuickDeploy d'iDRAC et réseau d'iDRAC qui n'ont pas été enregistrés sont supprimés. Le tableau Paramètres réseau d'iDRAC reflète les futurs paramètres de configuration réseau ; les valeurs affichées pour les serveurs installés peuvent ou non être identiques aux paramètres de configuration réseau de l'iDRAC actuellement installé. Après avoir apporté des modifications, appuyez sur le bouton Actualiser pour mettre à jour la page Déployer iDRAC avec les paramètres de configuration réseau de chaque iDRAC installé. Activer IPv6 Active iDRAC dans le logement pour utiliser le protocole IPv6 sur le réseau. Vous devez sélectionner l'option Activer le réseau local et désélectionner l'option Configuration automatique pour que cette option soit active. Le paramètre par défaut est désactivé. REMARQUE : cette option est disponible uniquement si le serveur est conforme iPv6. Configuration automatique Active iDRAC pour obtenir les paramètres IPv6 (adresse et longueur de préfixe) auprès d'un serveur DHCPv6 et autorise également la configuration automatique des adresses statiques. REMARQUE : cette option est disponible uniquement si le serveur est conforme iPv6. Longueur du préfixe Spécifie la longueur, en bits, du sous-réseau IPv6 auquel appartient cet iDRAC. Tableau 5-62. Paramètres réseau d'iDRAC (suite) Paramètre Description244 Utilisation de l'interface Web de CMC REMARQUE : les modifications apportées aux champs de QuickDeploy sont immédiates. Cependant, la propagation, de CMC à iDRAC, des modifications apportées à un ou plusieurs paramètres de configuration réseau de serveur iDRAC risquent de prendre quelques minutes. Si vous appuyez trop tôt sur le bouton Actualiser, des données partiellement correctes pour un ou plusieurs serveurs iDRAC seront affichées. Lancement de la console à distance depuis l'interface utilisateur de CMC Cette fonctionnalité vous permet de lancer une session clavier-écran-souris directement sur le serveur. Pour lancer la console à distance depuis la page d'accueil de l'interface utilisateur de CMC : 1 Cliquez sur le serveur spécifié dans le graphique du châssis. 2 Dans Liens rapides, cliquez sur le lien Lancer la console distante. Pour lancer une console distante de serveur à partir de la page Condition des serveurs : 1 Dans l'arborescence du système, sélectionnez Présentation des serveurs. 2 Cliquez sur Lancer la console distante dans le tableau pour le serveur spécifié. Pour lancer une console distante de serveur pour une personne : 1 Développez Présentation des serveurs dans l'arborescence. Tous les serveurs (1 à 16) s'affichent dans la liste développée des serveurs. 2 Dans l'arborescence du système, cliquez sur le serveur que vous souhaitez afficher. La page Condition du serveur s'affiche. 3 Cliquez sur Lancer la console distante. La fonctionnalité de console distante est prise en charge uniquement lorsque toutes les conditions suivantes sont remplies : • Le châssis est sous tension. • Serveurs prenant en charge iDRAC6 et iDRAC7. • L'interface de réseau local sur le serveur est activée. • La version d'iDRAC est 2.20 ou ultérieure.Utilisation de l'interface Web de CMC 245 • Le système hôte dispose du JRE (Java Runtime Environment) 6 Update 16 ou ultérieur. • Le navigateur sur le système hôte autorise les fenêtres contextuelles (le blocage de fenêtres contextuelles est désactivé). REMARQUE : la console distante peut également être lancée depuis l'interface graphique d'iDRAC. Voir l'interface graphique d'iDRAC pour plus de détails. Lancement d'iDRAC à l'aide d'une signature unique CMC fournit une gestion limitée des composants individuels du châssis, tels que les serveurs. Pour une gestion complète de ces composants individuels, CMC fournit un point de lancement de l'interface Web du contrôleur de gestion (iDRAC) du serveur. Pour lancer la console de gestion iDRAC depuis la page Serveurs : 1 Ouvrez une session sur l'interface Web de CMC. 2 Cliquez sur Présentation des serveurs dans l'arborescence. La page Condition du serveur s'affiche. 3 Cliquez sur l'icône Lancer l'interface utilisateur iDRAC correspondant au serveur que vous voulez gérer. Pour lancer la console de gestion d'iDRAC pour un serveur individuel : 1 Ouvrez une session sur l'interface Web de CMC. 2 Développez Présentation des serveurs dans l'arborescence. Tous les serveurs (1 à 16) s'affichent dans la liste développée Serveurs. 3 Cliquez sur le serveur dont vous souhaitez afficher les informations. La page Condition du serveur s'affiche. 4 Cliquez sur l'icône Lancer l'interface utilisateur iDRAC. Un utilisateur peut lancer l'interface utilisateur iDRAC sans avoir à ouvrir une session une deuxième fois, étant donné que cette fonctionnalité utilise l'authentification unique. Les stratégies de connexion directe sont décrites ci-dessous. • Un utilisateur CMC ayant un privilège administratif sur le serveur sera automatiquement connecté à iDRAC à l'aide de l'authentification unique. Une fois sur le site iDRAC, les privilèges administrateur sont automatiquement accordés à cet utilisateur. Cela est vrai même si l'utilisateur n'a pas de compte sur iDRAC ou si le compte n'a pas de privilèges administrateur. 246 Utilisation de l'interface Web de CMC • Un utilisateur CMC qui n'a PAS de privilège administratif sur le serveur mais a le même compte sur iDRAC sera automatiquement connecté à iDRAC à l'aide de l'authentification unique. Une fois sur le site iDRAC, les privilèges qui ont été créés pour le compte iDRAC sont accordés à l'utilisateur. • Un utilisateur CMC qui n'a pas de privilège administratif sur le serveur ou le même compte sur iDRAC, ne sera PAS automatiquement connecté à iDRAC à l'aide de l'authentification unique. Cet utilisateur est dirigé vers la page d'ouverture de session iDRAC quand il appuie sur le bouton Lancer l'interface utilisateur d'iDRAC. REMARQUE : le terme « même compte » dans ce contexte signifie que l'utilisateur a le même nom d'ouverture de session avec un mot de passe correspondant pour CMC et pour iDRAC. Tout utilisateur qui a le même nom d'ouverture de session mais un mot de passe différent n'est pas considéré comme ayant le même compte. REMARQUE : les utilisateurs peuvent être invités à ouvrir une session sur iDRAC (voir la troisième puce de la stratégie d'authentification unique ci-dessus). REMARQUE : si le réseau local de réseau iDRAC est désactivé (Réseau local = non), l'authentification unique n'est pas disponible. REMARQUE : si le serveur est retiré du châssis, que l'adresse IP iDRAC est modifiée ou qu'un problème de connexion survient au niveau du réseau iDRAC, une page d'erreur peut s'afficher lorsque l'utilisateur clique sur l'icône Lancer l'interface utilisateur iDRAC. Clonage de serveur La fonction de clonage de serveur permet à l'utilisateur d'appliquer tous les paramètres BIOS clonables depuis un serveur spécifié vers un serveur ou plus. Des paramètres BIOS clonables sont des paramètres BIOS qui peuvent être modifiés et sont conçus pour être répliqués sur les serveurs. La fonction de clonage du serveur prend en charge les serveurs iDRAC6 et iDRAC7. Des serveurs iDRAC de générations antérieures sont répertoriés, mais sont grisés sur la page principale et ne sont pas habilités à utiliser cette fonction. Utilisation de l'interface Web de CMC 247 Pour utiliser la fonction de clonage de serveur : • iDRAC doit disposer de la version minimale requise. Les serveurs iDRAC6 requièrent au minimum une version 3.2 et les serveurs iDRAC7 requièrent une version 1.0.0. • Le serveur doit disposer d'une génération prise en charge d'iDRAC. • Le serveur doit être sous tension. Vous devez configurer les paramètres BIOS à l'aide de fonction de clonage de serveur uniquement via l'interface web du CMC. La page Profils BIOS vous permet d'effectuer cette opération. Pour accéder à la page Profils Bios, cliquez sur Présentation du serveur→ Configuration→ Profils. Les serveurs source et cible doivent être de la même génération. Seuls les paramètres clonables disponibles seront appliqués d'un profil de serveur à un autre. Capturer un profil Avant de cloner les propriétés BIOS d'un serveur, vous devez capturer les propriétés dans un profil stocké. Lors de la création d'un profil stocké, attribuez à chaque profil un nom et une description. Vous pouvez enregistrer un maximum de 16 Profils stockés sur le support de stockage étendu non volatile du CMC. La suppression ou la désactivation de supports de stockage étendu non volatile empêchent l'accès aux profils stockés et désactivent la fonction de clonage de serveur. Appliquer un profil Lorsque des profils stockés sont disponibles dans le support de stockage étendu non volatile du CMC, appliquez un profil stocké à un serveur ou plus, pour lancer une opération de clonage de serveur. Pour chaque serveur, l'état, le numéro de logement et le nom du type d'opération sont affichés dans le tableau Appliquer un profil. Après l'application d'un profil stocké, dans un serveur, celui-ci doit être redémarré immédiatement. 248 Utilisation de l'interface Web de CMC Affichage des paramètres BIOS sur un serveur Pour afficher les paramètres BIOS d'un serveur dans le tableau Appliquer un profil, cliquez sur Afficher dans la colonne des paramètres BIOS de l'entrée sélectionnée. La page Afficher les paramètres s'affiche. Seuls s'affichent les paramètres BIOS sur le serveur pouvant être modifiés par l'application d'un profil (paramètres clonables). Les paramètres sont divisés en groupes de manière semblable à l'affichage sur l'écran d'installation BIOS d'iDRAC. REMARQUE : toute modification apportée dans la console aux paramètres BIOS de lames s'affiche sur la page Afficher les paramètres seulement après l'exécution d'un inventaire de système sur la lame. À cet effet, le CSIOR (Collect System Inventory On Reboot) doit être activé dans BIOS. Gestion des profils stockés Pour gérer les profils stockés sur le CMC, cliquez sur Gérer des profils dans le tableau Appliquer un profil. La page de gestion des profils BIOS s'affiche. La page de gestion de profils BIOS vous permet de modifier le nom et la description d'un profil stocké, afficher les paramètres BIOS qu'il contient ou effacer un profil stocké. Journal des profils récents Le tableau de Journal de profils récents sur la page de clonage de lame principale répertorie les entrées récentes du journal de profils directement à partir des opérations de clonage de serveur. Chaque journal de profil affiche la gravité de même que l'heure et la date de soumission de l'opération de clonage ainsi que la description du message du journal de clonage. Les messages qui se trouvent dans le Journal de profils récents sont également inscrits dans le journal RAC. Le tableau de Journal de profils récents contient les 10 entrées les plus récentes du journal de profil. Pour afficher les entrées disponibles, cliquez sur Aller au journal de profils.Utilisation de l'interface Web de CMC 249 État d'achèvement et dépannage Pour vérifier l'état d'achèvement de l'application d'un profil BIOS requis : 1 Capturez l'id de la tâche soumise depuis le tableau Journal de profils récents sur la page principale de clonage de serveur. 2 Recherchez le même id de tâche dans le tableau des Tâches sur la page Tâches Lifecycle Controller Présentation du serveur→ Dépannage→ Tâches Lifecycle Controller). FlexAddress Cette section décrit les écrans de l'interface Web de la fonctionnalité FlexAddress. FlexAddress est une mise à niveau facultative qui permet aux modules serveurs de remplacer l'ID WWN/MAC d'usine par un ID WWN/MAC fourni par le châssis. REMARQUE : vous devez acheter et installer la mise à niveau FlexAddress pour avoir accès à ces écrans de configuration. Si la mise à niveau n'a pas été achetée et installée, le texte suivant s'affiche sur l'interface Web : Optional feature not installed. See the Dell Chassis Management Controller Users Guide for information on the chassis-based WWN and MAC address administration feature. To purchase this feature, please contact Dell at www.dell.com. Affichage de l'état de FlexAddress Vous pouvez utiliser l'interface Web pour consulter des informations sur l'état de FlexAddress. Vous pouvez consulter les informations relatives à l'ensemble du châssis ou à un serveur particulier. Les informations affichées incluent : • Configuration des structures • Fonctionnalité FlexAddress activée/désactivée • Numéro et nom du logement • Adresses attribuées par le châssis et le serveur • Adresses en cours d'utilisation250 Utilisation de l'interface Web de CMC REMARQUE : vous pouvez également consulter l'état de FlexAddress à l'aide de l'interface de ligne de commande. Pour plus d'informations sur les commandes, voir « Utilisation de FlexAddress », à la page 263. Consultation de l'état de FlexAddress pour le châssis Les informations sur l'état de FlexAddress peuvent concerner l'ensemble du châssis. Les informations de condition indiquent si la fonctionnalité est active et fournissent un aperçu de la condition de FlexAddress pour chaque serveur. Pour savoir si FlexAddress est actif pour le châssis : 1 Ouvrez une session sur l'interface Web (voir « Accès à l'interface Web CMC », à la page 111). 2 Cliquez sur Présentation du châssis dans l'arborescence. 3 Cliquez sur l'onglet Configuration. La page Configuration générale apparaît. L'entrée FlexAddress est marquée comme Actif ou Non actif. Actif indique que la fonctionnalité est installée sur le châssis. Non actif indique que la fonctionnalité n'est pas installée et n'est pas utilisée par le châssis. Pour afficher une présentation des conditions FlexAddress pour chaque module du serveur : 1 Connectez-vous à l'interface Web (« Accès à l'interface Web CMC », à la page 111). 2 Cliquez sur Présentation des serveurs→ Propriétés→ WWN/MAC. 3 La page Résumé FlexAddress s'affiche. Cette page vous permet de consulter la configuration WWN et les adresses MAC de tous les logements du châssis. La page d'état fournit les informations suivantes : Configuration de la structure Structure A, Structure B, et Structure C affichent le type des structures d'entrée/sortie installées. iDRAC affiche l'adresse MAC de gestion du serveur. REMARQUE : si la structure A est activée, les logements inoccupés affichent les adresses MAC attribuées par le châssis pour la structure A et MAC ou WWN pour les structures B et C s'ils sont utilisés par les logements occupés.Utilisation de l'interface Web de CMC 251 4 Pour des informations supplémentaires, cliquez sur Aide. Consulter l'état de FlexAddress pour le serveur Il est également possible d'afficher des informations relatives à l'état de FlexAddress pour chaque serveur. Les informations au niveau d'un serveur comportent un résumé de l'état de FlexAddress pour ce serveur. Pour afficher les informations FlexAddress des serveurs : 1 Ouvrez une session sur l'interface Web (voir « Accès à l'interface Web CMC », à la page 111). 2 Développez Présentation des serveurs dans l'arborescence. Tous les serveurs (1 à 16) s'affichent dans la liste développée Serveurs. 3 Cliquez sur le serveur dont vous souhaitez afficher les informations. La page Condition du serveur s'affiche. 4 Cliquez sur l'onglet Configuration, puis sur le sous-onglet FlexAddress. La page Déployer FlexAddress s'affiche. Cette page vous permet de consulter la configuration WWN et les adresses MAC du serveur sélectionné. Adresses WWN/ MAC Affiche la configuration FlexAddress de chaque logement du châssis. Les informations affichées comprennent : • Le contrôleur de gestion d'iDRAC n'est pas une structure, mais son adresse FlexAddress est traitée en tant que telle. • L'emplacement et le nom des logements • L'état de FlexAddress (actif/ non actif) • Le type de structure • Les adresses WWN/MAC en cours d'utilisation attribuées par le châssis et attribuées par le serveur Une coche verte indique le type de l'adresse active, soit attribuée par le serveur, soit attribuée par le châssis.252 Utilisation de l'interface Web de CMC La page d'état fournit les informations suivantes : Tableau 5-63. Informations sur la page d'état FlexAddress activé Indique si la fonctionnalité FlexAddress est activée ou non pour ce logement particulier. État actuel Affiche la configuration actuelle de FlexAddress : • Attribuée par le châssis : l'adresse de logement sélectionnée est attribuée par le châssis à l'aide de FlexAddress. Les adresses WWN/MAC des logements restent identiques, même si un nouveau serveur est installé. • Attribuée par le serveur : le serveur utilise l'adresse attribuée par le serveur ou l'adresse par défaut incorporée au matériel du contrôleur. État de l'alimentation Affiche la condition actuelle de l'alimentation des serveurs. Les valeurs sont les suivantes : Allumé, Mise sous tension, Mise hors tension, Éteint, et - (si aucun serveur n'est présent).Utilisation de l'interface Web de CMC 253 Intégrité OK Indique que la fonctionnalité FlexAddress est présente et fournit son état à CMC. En cas de perte des communications entre CMC et FlexAddress, CMC ne pourra pas obtenir ni afficher la condition de l'intégrité de FlexAddress. Informatif Affiche des informations sur FlexAddress en l'absence de modification de la condition de l'intégrité (OK, Avertissement, Critique). Avertissement Indique que seules des alertes d'avertissement ont été émises et que des actions correctives doivent être effectuées. Si aucune action corrective n'est effectuée, des pannes critiques susceptibles d'affecter l'intégrité du serveur peuvent se produire. Critique Indique qu'au moins une alerte de panne a été générée. La condition Critique représente une panne système du serveur et des actions correctives doivent être effectuées immédiatement. Aucune valeur Lorsque la fonctionnalité FlexAddress est absente, les informations d'intégrité ne sont pas fournies. Micrologiciel iDRAC Indique la version d'iDRAC actuellement installée sur le serveur. Version du BIOS Affiche la version actuelle du BIOS du module de serveur. Logement Numéro de logement du serveur associé à l'emplacement de la structure. Emplacement Affiche l'emplacement du module d'entrée/sortie (E/S) dans le châssis sous forme de numéro de groupe (A, B, ou C)/numéro de logement (1 ou 2). Noms de logement : A1, A2, B1, B2, C1 ou C2. Structure Affiche le type de structure. Tableau 5-63. Informations sur la page d'état (suite)254 Utilisation de l'interface Web de CMC 5 Pour des informations supplémentaires, cliquez sur Aide. Configurer FlexAddress Si vous l'achetez en même temps que le châssis, il sera installé et activé à la mise sous tension du système. Si vous achetez FlexAdress séparément, vous devez installer la carte de fonctionnalité SD conformément aux instructions fournies dans le document Spécifications techniques de la carte Secure Digital (SD) de Chassis Management Controller (CMC). Vous trouverez ce document sur le site web support.dell.com/manuals. Vous devez mettre le serveur hors tension avant de commencer la configuration. Vous pouvez activer ou désactiver FlexAddress structure par structure. Vous pouvez également activer/désactiver cette fonctionnalité logement par logement. Une fois que vous avez activé cette fonctionnalité par structure, vous pouvez sélectionner les logements à activer. Par exemple, si la structure A est activée, la fonctionnalité FlexAddress est activée uniquement sur la structure A des logements activés. Toutes les autres structures utilisent les identifiants WWN/MAC d'usine sur le serveur. La fonctionnalité FlexAddress est activée sur tous les logements sélectionnés pour les structures activées. Par exemple, il n'est pas possible d'activer les structures A et B et d'activer FlexAddress pour le logement 1 de la structure A, mais pas de la structure B. REMARQUE : vous pouvez également configurer FlexAddress à l'aide de l'interface de ligne de commande. Pour plus d'informations sur les commandes, voir « Utilisation de FlexAddress », à la page 263. REMARQUE : assurez-vous que les serveurs lames sont hors tension avant de changer l'adresse flex de niveau de structure (A, B, C, or DRAC). Attribuée par le serveur Affiche les adresses WWN/MAC attribuées par le serveur qui sont incorporées au matériel du contrôleur. Attribuée par le châssis Affiche les adresses WWN/MAC qui sont utilisées pour ce logement particulier. Tableau 5-63. Informations sur la page d'état (suite)Utilisation de l'interface Web de CMC 255 Configuration de FlexAddress pour les logements et les structures au niveau du châssis Vous pouvez activer ou désactiver la fonctionnalité FlexAddress pour des structures et des logements au niveau du châssis. Cette fonctionnalité est d'abord activée structure par structure ; c'est seulement ensuite qu'elle est activée pour des logements. Les structures et les logements doivent être activés pour configurer FlexAddress. Effectuez les étapes suivantes pour activer ou désactiver des structures et des logements afin d'utiliser la fonctionnalité FlexAddress : 1 Ouvrez une session sur l'interface Web (voir « Accès à l'interface Web CMC », à la page 111). 2 Cliquez sur Présentation des serveurs dans l'arborescence. 3 Cliquez sur l'onglet Configuration→ sous-onglet FlexAddress. La page Déployer FlexAddress s'affiche. 4 La section Sélectionner des structures pour WWN/MAC attribués par le châssis comporte une case à cocher pour Structure A, Structure B, Structure C et iDRAC. 5 Cliquez sur la case à cocher de chaque structure pour laquelle vous voulez activer FlexAddress. Pour désactiver une structure, décochez la case située en regard de celle-ci. REMARQUE : si aucune structure n'est sélectionnée, FlexAddress n'est pas activé pour les logements sélectionnés. Dans la page Sélectionner des logements pour les WWN/MAC attribuées par le châssis la case de chacun des logements (1à 16) est activée. 6 Cliquez sur la case Activée de chaque logement pour lequel vous souhaitez activer FlexAddress. Si vous souhaitez sélectionner tous les logements, cochez la case Sélectionner/Désélectionner tout. Pour désactiver un logement, décochez la case Activée. REMARQUE : si un serveur est présent dans le logement, mettez-le hors tension pour pouvoir activer la fonctionnalité FlexAddress sur ce logement. REMARQUE : si aucun logement n'est sélectionné, FlexAddress n'est pas activé pour les structures sélectionnées. 7 Cliquez sur Appliquer pour enregistrer les modifications. Pour des informations supplémentaires, cliquez sur Aide. 256 Utilisation de l'interface Web de CMC Configuration de FlexAddress pour les logements au niveau du serveur Vous pouvez activer ou désactiver la fonctionnalité FlexAddress pour des logements au niveau du serveur. Pour activer ou désactiver un logement individuel afin d'utiliser la fonctionnalité FlexAddress : 1 Ouvrez une session sur l'interface Web (voir « Accès à l'interface Web CMC », à la page 111). 2 Développez Présentation des serveurs dans l'arborescence. Tous les serveurs (1 à 16) s'affichent dans la liste développée Serveurs. 3 Cliquez sur le serveur dont vous souhaitez afficher les informations. La page Condition du serveur s'affiche. 4 Cliquez sur l'onglet Configuration, puis sur le sous-onglet FlexAddress. La page État de FlexAddress s'affiche. 5 Utilisez le menu déroulant FlexAddress activé pour effectuer votre sélection. Sélectionnez Oui pour activer FlexAddress et Non pour désactiver la fonctionnalité. 6 Cliquez sur Appliquer pour enregistrer les modifications. Pour des informations supplémentaires, cliquez sur Aide. Partage de fichiers distants L'option Partage de fichiers de média virtuel distants mappe un fichier depuis un lecteur de partage sur le réseau à un ou plusieurs serveurs via CMC pour déployer ou mettre à jour un système d'exploitation. Lorsque la connexion est établie, le fichier distant est accessible comme s'il se trouvait sur le système local. Deux types de média sont pris en charge : lecteurs de disquette et lecteurs de CD/DVD. 1 Ouvrez une session sur l'interface Web (voir « Accès à l'interface Web CMC », à la page 111). 2 Cliquez sur Présentation des serveurs dans l'arborescence. 3 Cliquez sur l'onglet Configuration, puis sur le sous-onglet Partage de fichiers distants. La page Déployer le partage de fichiers distants apparaît. 4 Définissez les paramètres Partage de fichiers distants.Utilisation de l'interface Web de CMC 257 Tableau 5-64. Paramètres Partage de fichiers distants Paramètre Description Chemin d'accès du fichier image Le chemin des fichiers image est requis uniquement pour les opérations de connexion et de déploiement. Il ne s'applique pas aux opérations de déconnexion. Le nom du chemin du lecteur réseau est monté sur le serveur via un protocole SMB Windows ou NFS Linux/Unix. Par exemple, pour vous connecter au CIFS, tapez : //// Pour vous connecter au NFS, tapez : //:// Les noms de fichiers qui se terminent par .img sont connectés en tant que disquettes virtuelles. Les noms de fichiers qui se terminent par .iso sont connectés en tant que CD/DVD virtuels. Le nom peut comporter jusqu'à 511 caractères. Nom d'utilisateur Le nom d'utilisateur est requis uniquement pour les opérations de connexion et de déploiement. Il ne s'applique pas aux opérations de déconnexion. Le nombre maximum de caractères pouvant être spécifiés dans ce champ est 40. Mot de passe Le mot de passe est requis uniquement pour les opérations de connexion et de déploiement. Il ne s'applique pas aux opérations de déconnexion. Le nombre maximum de caractères pouvant être spécifiés dans ce champ est 40. Logement Identifie l'emplacement du logement. Les numéros de logement sont séquentiels, de 1 à 16 (pour les 16 logements disponibles dans le châssis). Nom Indique le nom du logement. Les logements sont nommés selon leur position dans le châssis. Modèle Affiche le nom du modèle du serveur.258 Utilisation de l'interface Web de CMC 5 Cliquez sur Connecter pour vous connecter à un partage de fichiers distant. Pour vous connecter à un partage de fichiers distants, vous devez fournir le chemin, le nom d'utilisateur et le mot de passe. La réussite de l'opération vous permet d'accéder au média. Cliquez sur Déconnecter pour vous déconnecter d'un partage de fichiers distant précédemment connecté. Cliquez sur Déployer pour déployer le périphérique du média. REMARQUE : enregistrez tous les fichiers de travail avant d'exécuter la commande deploy car cette action entraîne le redémarrage du serveur. Cette commande implique les actions suivantes : – Le partage de fichiers distant est connecté. – Le fichier est sélectionné comme premier périphérique d'amorçage pour les serveurs. – Le serveur est redémarré. – Le serveur est mis sous tension s'il était hors tension. État de l'alimentation Affiche l'état d'alimentation du serveur : - : CMC n'a pas encore déterminé l'état d'alimentation du serveur. Désactivé : le serveur ou le châssis est hors tension. Activé : le châssis et le serveur sont sous tension. Mise sous tension : état temporaire entre Désactivé et Activé. En cas de réussite, l'état de l'alimentation est Activé. Mise hors tension : état temporaire entre Activé et Désactivé. En cas de réussite, l'état de l'alimentation est Désactivé. Condition de la connexion Affiche la condition de la connexion du partage de fichiers distant. Sélectionner/D ésélectionner tout Sélectionnez cette option avant de lancer une opération de partage de fichiers distant. Les opérations de partage de fichiers distants sont les suivantes : Connecter, Déconnecter et Déployer. Tableau 5-64. Paramètres Partage de fichiers distants (suite) Paramètre DescriptionUtilisation de l'interface Web de CMC 259 Questions les plus fréquentes La Figure 5-65répertorie les questions fréquemment posées concernant la gestion et la récupération d'un système distant. Tableau 5-65. Gestion et récupération d'un système distant Question Réponse Lorsque j'accède à l'interface Web CMC, un avertissement de sécurité s'affiche et indique que le nom d'hôte du certificat SSL ne correspond pas au nom d'hôte CMC. CMC est doté d'un certificat de serveur CMC par défaut qui assure la sécurisation du réseau pour l'interface Web et les fonctionnalités de RACADM à distance. Lorsque ce certificat est utilisé, le navigateur Web affiche un avertissement de sécurité car le certificat par défaut est attribué au certificat par défaut CMC, lequel ne correspond pas au nom d'hôte CMC (l'adresse IP, par exemple). Pour corriger ce problème de sécurité, téléversez un certificat de serveur CMC attribué à l'adresse IP CMC. Lorsque vous générez la requête de signature de certificat (RSC) qui servira à émettre le certificat, assurez-vous que le nom commun (CN) de la RSC correspond à l'adresse IP CMC (192.168.0.120, par exemple) ou au nom de CMC DNS enregistré. Afin de vous assurer que la RSC correspond au nom de DNS CMC enregistré : 1 Cliquez sur Présentation du châssis dans l'arborescence système. 2 Cliquez sur l'onglet Réseau, puis sur Réseau. La page Configuration du réseau apparaît. 3 Cochez la case Enregistrer CMC sur DNS. 4 Dans le champ Nom CMC DNS, saisissez le nom CMC. 5 Cliquez sur Appliquer les modifications. Voir « Sécurisation des communications CMC à l'aide de certificats SSL et numériques », à la page 197 pour plus d'informations sur la génération de RSC et l'émission de certificats.260 Utilisation de l'interface Web de CMC RACADM distante et les services Web ne sont plus disponibles lorsque les propriétés sont modifiées. Pourquoi ? Après la réinitialisation du Web Server CMC, il peut s'écouler une minute avant que les services RACADM à distance et l'interface Web ne redeviennent disponibles. Le Web Server CMC est réinitialisé dans les cas suivants : • quand la configuration réseau ou les propriétés de sécurité réseau sont modifiées à l'aide de l'interface utilisateur Web CMC. • quand la propriété cfgRacTuneHttpsPort est modifiée (y compris lorsqu'une commande config -f la modifie). • quand la commande racresetcfg est utilisée ou que la sauvegarde de la configuration du châssis est restaurée. • quand CMC est réinitialisé. • quand un nouveau certificat de serveur SSL est téléversé. Mon serveur DNS n'enregistre pas mon CMC. Pourquoi ? Certains serveurs DNS ne peuvent enregistrer que des noms de 31 caractères maximum. Lorsque j'accède à l'interface Web CMC, un avertissement de sécurité s'affiche et indique que le certificat SSL a été émis par une autorité de certification qui n'est pas fiable. CMC est doté d'un certificat de serveur CMC par défaut qui assure la sécurisation du réseau pour l'interface Web et les fonctionnalités de RACADM à distance. Ce certificat n'est pas émis par une autorité de certification de confiance. Pour résoudre ce problème de sécurité, téléversez un certificat de serveur CMC émis par une autorité de certification de confiance (Thawte ou Verisign, par exemple). Pour plus d'informations sur l'émission de certificats, voir « Sécurisation des communications CMC à l'aide de certificats SSL et numériques », à la page 197. Tableau 5-65. Gestion et récupération d'un système distant (suite) Question RéponseUtilisation de l'interface Web de CMC 261 Dépannage du CMC L'interface Web CMC fournit des outils d'identification, de diagnostic et de résolution des problèmes rencontrés avec votre châssis. Pour plus d'informations sur la résolution des problèmes, voir « Dépannage et récupération » à la page 433. Le message suivant s'affiche pour des raisons inconnues : Remote Access: SNMP Authentication Failure Pourquoi ? Pendant la découverte, IT Assistant essaie de vérifier les noms de communauté get et set du périphérique. Dans IT Assistant, le nom de communauté get = public et le nom de communauté set = private. Par défaut, le nom de communauté de l'agent CMC est public. Lorsque IT Assistant envoie une requête de définition, l'agent CMC génère une erreur d'authentification SNMP car il accepte uniquement les requêtes de la communauté = public Vous pouvez changer le nom de communauté CMC à l'aide de RACADM. Pour afficher le nom de communauté CMC, utilisez la commande suivante : racadm getconfig -g cfgOobSnmp Pour définir le nom de communauté CMC, utilisez la commande suivante : racadm config -g cfgOobSnmp -o cfgOobSnmpAgentCommunity Pour ne pas générer d'interruption d'authentification SNMP, vous devez entrer des noms de communauté qui seront acceptés par l'agent. Comme CMC n'accepte qu'un seul nom de communauté, vous devez entrer le même nom pour les communautés get et set lorsque vous configurez les découvertes sous IT Assistant. Tableau 5-65. Gestion et récupération d'un système distant (suite) Question Réponse262 Utilisation de l'interface Web de CMCUtilisation de FlexAddress 263 Utilisation de FlexAddress La fonctionnalité FlexAddress est une mise à niveau facultative qui permet aux modules serveurs de remplacer les ID réseau World Wide Name et Media Access Control (WWN/MAC) d'usine par des ID WWN/MAC fournis par le châssis. Chaque module serveur se voit attribuer des ID WWN et/ou MAC uniques lors de la fabrication. Avant FlexAddress, si vous deviez remplacer un module de serveur par un autre, les identifiants WWN/MAC changeaient et il fallait alors reconfigurer les outils de gestion réseau Ethernet et les ressources du SAN pour prendre en compte le nouveau module de serveur. FlexAddress permet à CMC d'attribuer des identifiants WWN/MAC à un logement particulier et de remplacer les identifiants définis en usine. Les identifiants WWN/MAC des logements sont conservés lors du remplacement du module de serveur. Grâce à cette fonctionnalité, il n'est plus nécessaire de reconfigurer les outils de gestion réseau Ethernet et les ressources du SAN lors de l'ajout d'un nouveau module de serveur. De plus, le remplacement s'effectue uniquement lorsqu'un module de serveur est inséré dans un châssis pour lequel la fonctionnalité FlexAddress est activée, aucune modification permanente n'est apportée au module de serveur. Si vous déplacez un module de serveur dans un châssis qui ne prend pas en charge FlexAddress, les identifiants WWN/MAC définis en usine sont utilisés. Avant d'installer FlexAddress, vous pouvez déterminer la plage d'adresses MAC contenue dans une carte de fonctionnalité FlexAddress en insérant la carte SD dans un lecteur de cartes mémoire USB et en consultant le fichier pwwn_mac.xml. Ce fichier XML de la carte SD n'est pas crypté et contient une balise XML mac_start qui représente la première adresse MAC hexadécimale utilisée pour cette plage d'adresses MAC unique. Le marqueur mac_count représente le nombre total d'adresses MAC allouées par la carte SD. La plage totale d'adresses MAC allouées peut être déterminée par l'opération suivante : + 0xCF (208 - 1) = mac_end où 208 correspond à mac_count et la formule est + - 1 = 264 Utilisation de FlexAddress Par exemple : (starting_mac)00188BFFDCFA + 0xCF = (ending_mac)00188BFFDDC9. REMARQUE : verrouillez la carte SD avant de l'insérer dans le « lecteur de cartes mémoire » USB pour éviter d'en modifier le contenu accidentellement. Vous devez déverrouiller la carte SD avant de l'insérer dans le module CMC. Activation de FlexAddress FlexAddress est livré sur une carte Secure Digital (SD) qui doit être insérée dans CMC pour activer la fonctionnalité. Pour activer la fonctionnalité FlexAddress, des mises à jour logicielles peuvent être requises ; si vous n'activez pas FlexAddress, ces mises à jour ne sont pas requises. Les mises à jour, répertoriées dans le tableau ci-dessous, comprennent les BIOS des modules de serveur, les BIOS ou micrologiciels des cartes porteuses d'E/S et les micrologiciels CMC. Vous devez appliquer ces mises à jour avant d'activer FlexAddress. Si ces mises à jour ne sont pas appliquées, la fonctionnalité FlexAddress peut ne pas fonctionner comme prévu. Composant Version minimale requise Carte mezzanine Ethernet : Broadcom M5708t, 5709, 5710 Micrologiciel du code de démarrage 4.4.1 ou ultérieur Micrologiciel de démarrage iSCSI 2.7.11 ou ultérieur Micrologiciel PXE 4.4.3 ou ultérieur Carte mezzanine FC : QLogic QME2472, FC8 BIOS 2.04 ou ultérieur Carte mezzanine FC : Emulex LPe1105-M4, FC8 BIOS 3.03a3 et micrologiciel 2.72A2 ou ultérieurUtilisation de FlexAddress 265 REMARQUE : tout système commandé après le mois de juin 2008 intègre les versions de micrologiel adéquates. Pour assurer un déploiement correct de la fonctionnalité FlexAddress, mettez à jour le BIOS et le micrologiciel dans l'ordre suivant : 1 Mettez à jour le BIOS et tout le micrologiciel de la carte mezzanine. 2 Mettez à jour le BIOS du module serveur. 3 Mettez à jour le micrologiciel iDRAC sur le module serveur. 4 Mettez à jour tout le micrologiciel CMC dans le châssis ; s'il y a des contrôleurs CMC redondants, assurez-vous que les deux soient mis à jour. 5 Insérez la carte SD dans le module passif pour un système à contrôleur CMC redondant ou dans le contrôleur CMC unique pour un système non-redondant. REMARQUE : la fonctionnalité n'est pas activée si le micrologiciel CMC qui prend en charge FlexAddress (version 1.10 ou ultérieure) n'est pas installé. BIOS du module serveur PowerEdge M600 – BIOS 2.02 ou version ultérieure PowerEdge M605 – BIOS 2.03 ou version ultérieure PowerEdge M805 PowerEdge M905 PowerEdge M610 PowerEdge M710 PowerEdge M710hd LAN sur carte mère (LOM) de PowerEdge M600/M605 Micrologiciel du code de démarrage 4.4.1 ou ultérieur Micrologiciel de démarrage iSCSI 2.7.11 ou ultérieur iDRAC Version 1.50 ou ultérieure pour les systèmes PowerEdge xx0x Version 2.10 ou ultérieure pour les systèmes PowerEdge xx1x CMC Version 1.10 ou ultérieure Composant Version minimale requise266 Utilisation de FlexAddress Voir le document Spécifications techniques de la carte Secure Digital (SD) de Chassis Management Controller (CMC) pour installer la carte SD. REMARQUE : la carte SD dispose d'une fonctionnalité FlexAddress. Les données contenues dans la carte SD sont cryptées et ne peuvent en aucune façon être dupliquées ou modifiées afin de garantir que le système et ses fonctions restent opérationnels. REMARQUE : vous ne pouvez utiliser la carte SD que sur un seul châssis à la fois. Si vous avez plusieurs châssis, vous devez acheter d'autres cartes SD. L'activation de la fonctionnalité FlexAddress est automatique au redémarrage de CMC une fois que la carte de fonctionnalité SD est installée ; cette activation lie la fonctionnalité au châssis actuel. Si la carte SD est installée sur le contrôleur CMC redondant, l'activation de la fonctionnalité FlexAddress n'a lieu que lorsque le CMC redondant devient actif. Consultez le document Spécifications techniques de la carte Secure Digital (SD) de Chassis Management Controller (CMC) pour plus d'informations sur l'activation du contrôleur CMC de secours. Lorsque CMC a redémarré, vérifiez l'activation en suivant les instructions de la section suivante, « Vérification de l'activation de FlexAddress », à la page 266. Vérification de l'activation de FlexAddress Vous pouvez utiliser des commandes de l'utilitaire RACADM pour vérifier l'activation de la carte de fonctionnalité SD et l'activation FlexAddress. Utilisez la commande de l'utilitaire RACADM suivante pour vérifier la carte de fonctionnalité SD et son état : racadm featurecard -sUtilisation de FlexAddress 267 Utilisez la commande RACADM suivante pour afficher toutes les fonctionnalités activées sur le châssis : racadm feature -s La commande renvoie le message d'état suivant : Feature = FlexAddress Date Activated = 8 April 2008 - 10:39:40 Feature installed from SD-card SN = 01122334455 Tableau 6-1. Messages d'état renvoyés par la commande featurecard -s Message d'état Actions Aucune carte de fonction insérée. Vérifiez que la carte SD est correctement insérée dans le contrôleur CMC. Dans une configuration CMC redondante, assurez-vous que le CMC sur lequel est installée la carte de fonctionnalité SD est le contrôleur CMC actif, et non celui de secours. La carte de fonction insérée est valide et contient la fonctionnalité FlexAddress suivante : la carte de fonction est liée à ce châssis. Aucune action n'est requise. La carte de fonction insérée est valide et contient la ou les fonction(s) suivante(s) FlexAddress : La carte de fonction est liée à un autre châssis, svctag = ABC1234, SD card SN = 01122334455 Retirez la carte SD, localisez et installez la carte SD du châssis actuel. La carte de fonction insérée est valide et contient la fonctionnalité FlexAddress suivante : la carte de fonction n'est pas liée à ce châssis. Cette carte de fonctionnalité SD peut être déplacée dans un autre châssis ou réactivée dans le châssis actuel. Pour la réactiver dans le châssis actuel, entrez racadm racreset jusqu'à ce que le module CMC dans lequel la carte de fonctionnalité est installée devienne actif.268 Utilisation de FlexAddress Si aucune fonctionnalité n'est active sur le châssis, la commande renvoie le message : racadm feature -s No features active on the chassis. Les cartes de fonction Dell peuvent contenir plusieurs fonctions. Une fois toutes les fonctions figurant sur une carte de fonction Dell activées sur un châssis, les autres fonctions pouvant être incluses sur cette carte Dell ne peuvent pas être activées sur un châssis différent. Dans ce cas, la commande -s de la fonction racadm affiche le message suivant pour les fonctions concernées : ERROR: One or more features on the SD card are active on another chassis. Pour des informations supplémentaires sur les commandes RACADM, voir les sections de commandes fonction et carte de fonction du Guide de référence de ligne de commande RACADM pour iDRAC6 et CMC. Désactivation de FlexAddress Il est possible de désactiver la fonctionnalité FlexAddress et de rétablir la carte SD à l'état précédant l'installation à l'aide d'une commande RACADM. Il n'existe aucune fonctionnalité de désactivation dans l'interface Web. La désactivation rétablit l'état d'origine de la carte SD : elle peut alors être installée et activée sur un autre châssis. REMARQUE : la carte SD doit être installée physiquement sur CMC et le châssis doit être mis hors tension avant l'exécution de er la commande de désactivation. Si vous exécutez la commande de désactivation alors qu'aucune carte n'est installée ou lorsqu'une carte provenant d'un autre châssis est présente, la fonctionnalité est alors désactivée et aucune modification n'est apportée à la carte. Désactivation de FlexAddress Utilisez la commande RACADM suivante pour désactiver la fonctionnalité FlexAddress et restaurer la carte SD : racadm feature -d -c flexaddressUtilisation de FlexAddress 269 Si la désactivation réussit, la commande renvoie le message d'état suivant : feature FlexAddress is deactivated on the chassis successfully. Si le châssis n'a pas été mis hors tension avant l'exécution, la commande échoue et renvoie le message d'erreur suivant : ERROR: Unable to deactivate the feature because the chassis is powered ON Pour des informations supplémentaires sur la commande, voir la section de commande fonction du Guide de référence de ligne de commande RACADM pour iDRAC6 et CMC. Configuration de FlexAddress à l'aide de la CLI REMARQUE : vous devez activer à la fois le logement et la structure pour que l'adresse MAC assignée par le châssis soit poussée vers iDRAC. . REMARQUE : vous pouvez également consulter la condition de FlexAddress à l'aide de l'interface utilisateur graphique. Pour plus d'informations, voir « FlexAddress », à la page 249. Vous pouvez utiliser l'interface de ligne de commande pour activer ou désactiver FlexAddress structure par structure. Vous pouvez également activer/désactiver cette fonctionnalité logement par logement. Une fois que vous avez activé cette fonctionnalité par structure, vous pouvez sélectionner les logements à activer. Par exemple, si seule la structure A est activée, FlexAddress est activée uniquement sur la structure A des logements activés. Toutes les autres structures utilisent les identifiants WWN/MAC d'usine sur le serveur. Pour que cette fonctionnalité fonctionne, la structure doit être activée et le serveur doit être mis hors tension. FlexAddress est activée sur les logements activés de toutes les structures qui sont activées. Par exemple, il n'est pas possible d'activer les structures A et B et d'activer FlexAddress pour le logement 1 de la structure A, mais pas de la structure B. Utilisez la commande de l'utilitaire RACADM suivante pour activer ou désactiver les structures : racadm setflexaddr [-f ] = A, B, C or iDRAC = 0 or 1270 Utilisation de FlexAddress Où 0 est désactivé et 1 activé. Utilisez la commande de l'utilitaire RACADM suivante pour activer ou désactiver des logements : racadm setflexaddr [-i ] = 1 to 16 = 0 or 1 Où 0 est désactivé et 1 activé. Pour des informations supplémentaires sur la commande, voir la section de commande setflexaddr du Guide de référence de ligne de commande RACADM pour iDRAC6 et CMC. Configuration complémentaire de FlexAddress pour Linux Lorsque vous passez d'un ID MAC attribué par le serveur à un ID MAC attribué par le châssis sur un système d'exploitation basé sur Linux, il peut être nécessaire d'effectuer des étapes de configuration supplémentaires : • SUSE Linux Enterprise Server 9 et 10 : vous devez exécuter YAST (Yet another Setup Tool) sur votre système Linux pour configurer vos périphériques réseau, puis redémarrer les services réseau. • Red Hat Enterprise Linux 4 (RHEL) et RHEL 5 : exécutez Kudzu, un utilitaire permettant de détecter et de configurer le matériel ajouté/modifié sur le système. Kudzu comprend le menu de découverte du matériel ; il détecte les modifications des adresses MAC lors du retrait et de l'ajout de matériel. Consultation de l'état de FlexAddress à l'aide de la CLI Vous pouvez utiliser l'interface de ligne de commande pour consulter les informations d'état de FlexAddress. Vous pouvez consulter les informations relatives à la condition pour l'ensemble du châssis ou un logement particulier. Les informations affichées incluent : • Configuration des structures • FlexAddress activée/désactivée • Numéro et nom du logement • Adresses attribuées par le châssis et le serveur • Adresses en cours d'utilisationUtilisation de FlexAddress 271 Utilisez la commande RACADM suivante pour afficher l'état de FlexAddress sur l'ensemble du châssis : racadm getflexaddr Pour afficher l'état FlexAddress d'un logement particulier : racadm getflexaddr [-i ] = 1 to 16 Voir « Configuration de FlexAddress à l'aide de la CLI », à la page 269 pour des détails supplémentaires sur la configuration de FlexAddress. Pour des informations supplémentaires sur la commande, voir la section de commande getflexaddr du Guide de référence de ligne de commande RACADM pour iDRAC6 et CMC. Configuration de FlexAddress via l'interface utilisateur Réveil sur LAN avec FlexAddress Lorsque la fonctionnalité FlexAddress est déployée pour la première fois, il est nécessaire de mettre le module serveur hors tension, puis de le remettre sous tension pour que la fonctionnalité FlexAddress soit prise en compte. FlexAddress est programmée par le BIOS du module serveur sur les périphériques Ethernet. Pour que le BIOS du module serveur programme l'adresse, il faut qu'il soit opérationnel, ce qui nécessite la mise sous tension du module serveur. Une fois que les séquences de mise hors tension et de mise sous tension ont été exécutées, les ID MAC attribués par le châssis sont disponibles pour la fonction Réveil sur LAN (WOL). Dépannage de FlexAddress Cette section contient des informations de dépannage pour FlexAddress. 1 Que se passe-t-il si une carte de fonction est retirée ? Rien. Les cartes de fonction peuvent être retirées et stockées ou laissées en place. 2 Que se passe-t-il si une carte de fonction utilisée dans un châssis est retirée et insérée dans un autre châssis ?272 Utilisation de FlexAddress L'interface Web affiche une erreur qui indique : This feature card was activated with a different chassis. It must be removed before accessing the FlexAddress feature. Current Chassis Service Tag = XXXXXXXX Feature Card Chassis Service Tag = YYYYYYYY Une entrée sera ajoutée au journal CMC : cmc : feature 'FlexAddress@YYYYYYYY' not activated; chassis ID='XXXXXXXX' 3 Que se passe-t-il si la carte de fonction est retirée et qu'une carte non FlexAddress est installée ? Aucune activation ou modification de la carte n'a lieu. CMC ignore la carte. Dans ce cas, la commande $racadm featurecard -s renvoie le message suivant : No feature card inserted ERROR: can't open file 4 Que se passe-t-il si une carte de fonction est liée à un châssis dont le numéro de service est reprogrammé ? • Si la carte de fonction d'origine figure dans le contrôleur CMC actif sur ce châssis ou sur un autre châssis, l'interface Web affiche une erreur indiquant ce qui suit : This feature card was activated with a different chassis. It must be removed before accessing the FlexAddress feature. Current Chassis Service Tag = XXXXXXXX Feature Card Chassis Service Tag = YYYYYYYYUtilisation de FlexAddress 273 La carte de fonction d'origine ne peut plus être désactivée sur ce châssis ou sur un autre châssis, à moins que l'assistance Dell ne reprogramme le numéro de service du châssis d'origine dans un châssis et que le contrôleur CMC sur lequel est installée la carte de fonction d'origine devienne actif sur ce châssis. • La fonctionnalité FlexAddress reste activée sur le châssis initialement lié. La fonctionnalité de liaison de ce châssis est mise à jour pour refléter le nouveau numéro de service. 5 Vais-je recevoir un message d'erreur si deux cartes de fonction sont installées sur mon système CMC redondant ? La carte de fonction du contrôleur CMC actif est active et installée dans le châssis. CMC ignore la deuxième carte. 6 Est-ce que la carte SD dispose d'un verrou de protection en écriture ? Oui. Avant d'installer la carte SD dans le contrôleur CMC, vérifiez que le loquet de protection en écriture est en position « déverrouillée ». La fonctionnalité FlexAddress ne peut être activée si la carte SD est protégée en écriture. Dans ce cas, la commande $racadm feature -s renvoie le message suivant : No features active on the chassis. ERROR: read only file system 7 Que se passe-t-il si aucune carte SD n'est présente dans le contrôleur CMC actif ? La commande $racadm featurecard -s renvoie le message suivant : No feature card inserted. 8 Qu'advient-il de la fonctionnalité FlexAddress si le BIOS du serveur est mis à jour d'une version 1.xx à une version 2.xx ? Le module de serveur doit être mis hors tension préalablement à toute utilisation avec FlexAddress. Une fois la mise à jour du BIOS du serveur terminée, le module de serveur n'obtient pas d’adresses attribuées par le châssis avant la mise hors tension, puis la mise sous tension du serveur.274 Utilisation de FlexAddress 9 Que se passe-t-il si un châssis doté d'un seul contrôleur CMC est mis à niveau vers une version du micrologiciel antérieure à la version 1.10 ? • La fonctionnalité FlexAddress et sa configuration sont supprimées du châssis. • La carte de fonctionnalité utilisée pour activer la fonctionnalité sur ce châssis est inchangée et reste liée au châssis. Lorsque le micrologiciel CMC du châssis est mis à niveau par la suite à la version 1.10 ou ultérieure, la fonctionnalité FlexAddress est réactivée par réinsertion de la carte de fonction d'origine (le cas échéant), en réinitialisant CMC (si la carte de fonction a été insérée à la fin de la mise à niveau du micrologiciel) et en reconfigurant la fonctionnalité. 10 Que se passe-t-il si une unité CMC est remplacée par une autre dotée d'un micrologiciel de version antérieure à 1.10 dans un châssis comportant des modules CMC redondants ? Dans un châssis comportant des modules CMC redondants, si vous remplacez un contrôleur CMC par un autre dont la version de micrologiciel est antérieure à la version 1.10, vous devez suivre la procédure suivante pour que la fonctionnalité et la configuration FlexAddress actuelles ne soient PAS supprimées. a Assurez-vous que la version du micrologiciel CMC actif est toujours la version 1.10 ou une version ultérieure. b Retirez le contrôleur CMC de secours et insérez un nouveau contrôleur CMC à son emplacement. c À partir du CMC actif, mettez à niveau le micrologiciel CMC de secours vers la version 1.10 ou une version ultérieure. REMARQUE : si vous ne mettez pas à jour le micrologiciel CMC de secours vers la version 1.10 ou une version ultérieure et qu'un basculement se produit, la fonctionnalité FlexAddress n'est pas configurée et vous devez alors réactiver et reconfigurer la fonctionnalité. 11 La carte SD ne se trouvait pas dans le châssis lorsque j'ai exécuté la commande de désactivation sur FlexAddress. Comment puis-je récupérer la carte SD maintenant ? Le problème est que la carte SD ne peut pas être utilisée pour installer FlexAddress sur un autre châssis si elle ne se trouvait pas dans CMC lorsque FlexAddress a été désactivée. Pour restaurer l'usage de la carte, réinsérez-la dans un contrôleur CMC dans le châssis à laquelle elle est liée, réinstallez FlexAddress, puis désactivez à nouveau FlexAddress.Utilisation de FlexAddress 275 12 La carte SD est installée correctement et toutes les mises à jour de micrologiciel/logiciel sont installées. FlexAddress semble active, mais aucune option de l'écran de déploiement du serveur ne me permet de déployer cette fonctionnalité. Quel est le problème ? Il s'agit d'un problème de cache du navigateur. Fermez le navigateur, puis relancez-le. 13 Qu'advient-il de FlexAddress si je dois réinitialiser la configuration de mon châssis avec la commande RACADM racresetcfg ? La fonctionnalité FlexAddress restera activée et prête à l'utilisation. Toutes les structures et tous les logements seront sélectionnés comme structures et logements par défaut. REMARQUE : il est vivement recommandé de mettre le châssis hors tension avant d'émettre la commande RACADM racresetcfg. Messages des commandes Le tableau suivant répertorie les commandes RACADM et leurs sorties pour des problèmes FlexAddress courants. Tableau 6-2. Sortie et commandes FlexAddress Problème Commande Sortie La carte SD du contrôleur CMC actif est liée à un autre numéro de service. $racadm featurecard -s The feature card inserted is valid and contains the following feature(s) FlexAddress: The feature card is bound to another chassis, svctag = SD card SN =276 Utilisation de FlexAddress La carte SD du contrôleur CMC actif est liée au même numéro de service. $racadm featurecard -s The feature card inserted is valid and contains the following feature(s) FlexAddress: The feature card is bound to this chassis La carte SD du contrôleur CMC actif n'est liée à aucun numéro de service. $racadm featurecard -s The feature card inserted is valid and contains the following feature(s) FlexAddress: The feature card is not bound to any chassis La fonctionnalité FlexAddress n'est pas active sur le châssis pour une raison inconnue (Pas de carte SD insérée/carte SD corrompue/ fonctionnalité désactivée/carte SD liée à un autre châssis). $racadm setflexaddr [-f ] OR $racadm setflexaddr [-i ] ERROR: Flexaddress feature is not active on the chassis L'utilisateur invité tente de définir FlexAddress sur des logements/des structures. $racadm setflexaddr [-f ] $racadm setflexaddr [-i ] ERROR: Insufficient user privileges to perform operation Tableau 6-2. Sortie et commandes FlexAddress (suite) Problème Commande SortieUtilisation de FlexAddress 277 Désactivation de la fonctionnalité FlexAddress alors que le châssis est sous tension. $racadm feature -d -c flexaddress ERROR: Unable to deactivate the feature because the chassis is powered ON L'utilisateur invité essaie de désactiver la fonctionnalité sur le châssis. $racadm feature -d -c flexaddress ERROR: Insufficient user privileges to perform operation Modification des paramètres FlexAddress de logement/structure pendant que les modules de serveur sont sous tension. $racadm setflexaddr -i 1 1 ERROR: Unable to perform the set operation because it affects a powered ON server Pourquoi, après la désactivation de la fonction FlexAddressPlus (bien que FlexAddress soit toujours activée), la commande racadm setflexaddr échoue telle sur le CMC (encore actif) ? Si le CMC est activé par la suite, alors que la carte de fonction FlexAddressPlus est toujours dans son logement, la fonction FlexAddressPlus est réactivée et les modifications de configuration de flexaddress de logement/structure peuvent se poursuivre. Tableau 6-2. Sortie et commandes FlexAddress (suite) Problème Commande Sortie278 Utilisation de FlexAddress CONTRAT DE LICENCE DES LOGICIELS DELL FlexAddress Le présent document constitue un contrat liant l'utilisateur du Logiciel à Dell Products, L.P. ou Dell Global B.V. (« Dell »). Ce contrat s'applique à tous les logiciels distribués avec le produit Dell, pour lesquels il n'existe aucun contrat de licence distinct vous liant avec l'éditeur ou le propriétaire du logiciel (collectivement ci-après, le « Logiciel »). Ce contrat ne concerne pas la vente du Logiciel ou de toute autre propriété intellectuelle. Tous les droits concernant la propriété intellectuelle du Logiciel sont détenus par l'éditeur ou le propriétaire du Logiciel. Tous les droits non expressément accordés dans le présent contrat sont réservés par l'éditeur ou le propriétaire du Logiciel. En ouvrant l'emballage contenant le Logiciel, en installant ou en téléchargeant le Logiciel, ou en utilisant le Logiciel préchargé ou intégré à votre produit, vous acceptez d'être lié par les termes du présent Contrat. Si vous refusez ces conditions, retournez rapidement tous les éléments composant le Logiciel (disques, documentations et emballage) et désinstallez le Logiciel préchargé ou intégré au produit. Vous ne pouvez utiliser le Logiciel que sur un ordinateur à la fois. Si vous disposez de plusieurs licences pour le Logiciel, vous pouvez en utiliser autant d'exemplaires que vous avez de licences. Le terme « Utiliser » désigne le chargement dans la mémoire temporaire ou permanente de l'ordinateur. L'installation sur un serveur de réseau à des fins de distribution sur d'autres postes de travail n'est pas considérée comme une « Utilisation » si, et seulement si, vous disposez d'une licence distincte pour chaque ordinateur sur lequel le Logiciel est distribué. Vous devez vous assurer que le nombre de personnes utilisant le Logiciel installé sur un serveur de réseau n'excède pas le nombre de licences que vous possédez. Si le nombre d'utilisateurs du Logiciel installé sur un serveur de réseau excède votre nombre de licences, vous devez vous procurer une licence additionnelle pour chacun des utilisateurs en surnombre avant d'autoriser ceux-ci à utiliser le Logiciel. Si vous êtes une entreprise cliente de Dell ou une société affiliée de Dell, vous autorisez Dell, ou tout agent sélectionné par Dell, à contrôler votre utilisation du Logiciel aux heures normales de bureau, et vous acceptez de collaborer avec Dell dans le cadre de cet audit. Vous acceptez de fournir à Dell toutes les données pouvant raisonnablement être considérées comme ayant un rapport avec votre utilisation du Logiciel. Le contrôle sera limité à la vérification de votre respect des dispositions du présent contrat. Utilisation de FlexAddress 279 Ce Logiciel est protégé par la loi relative au droit d'auteur et par les conventions internationales. Vous êtes autorisé à créer une seule copie du Logiciel à des fins de sauvegarde ou d'archivage, ou à le transférer sur un seul disque dur, à la condition que vous conserviez l'original uniquement à des fins de sauvegarde ou d'archivage. Vous n'êtes pas autorisé à prêter ni à louer le Logiciel ni à copier les documents imprimés fournis avec celui-ci. Vous êtes autorisé à transférer à titre permanent le Logiciel et tous ses composants dans le cadre de la vente ou du transfert du produit Dell, à condition que vous n'en conserviez aucun exemplaire, que vous transfériez la totalité du Logiciel (y compris tous ses composants, les médias et la documentation imprimée), et que le bénéficiaire du transfert accepte les termes du présent contrat. Tout transfert doit inclure la mise à jour la plus récente ainsi que toutes les versions précédentes. Vous n'êtes pas autorisé à reconstituer la logique du Logiciel, à le décompiler ou à le désassembler. Si le kit fourni avec l'ordinateur contient des disques compacts et/ou des disquettes 3 pouces ½ ou 5 pouces ¼, vous ne pouvez utiliser que les disques du format approprié pour l'ordinateur. Vous n'êtes pas autorisé à utiliser les disques sur un autre ordinateur ou réseau ni à les louer, les prêter ou les transférer à un autre utilisateur, sauf si l'opération s'effectue en conformité avec les dispositions du présent contrat. GARANTIE LIMITÉE Dell garantit que les disques du Logiciel sont exempts de tout défaut matériel et de fabrication dans des conditions normales d'utilisation, pour une période de 90 (quatre-vingt dix) jours à compter de leur date de réception. Cette garantie limitée ne s'applique qu'à vous et n'est pas transférable. Toute garantie implicite est limitée à une période de 90 (quatre-vingt dix) jours à compter de la date à laquelle vous avez reçu le Logiciel. Certaines législations n'autorisent pas la limitation des garanties implicites, auquel cas, la limitation ci-dessus ne vous sera pas applicable. La responsabilité totale de Dell et de ses fournisseurs, et le seul recours dont vous disposez, sont limités soit (a) au remboursement du montant payé pour le Logiciel ou (b) au remplacement de tout disque non conforme aux dispositions de la présente garantie et ayant été renvoyé à Dell accompagné d'un numéro d'autorisation de retour, les coûts et risques afférents étant de votre responsabilité. Cette garantie ne s'appliquera pas en cas de dommage au disque causé par une utilisation incorrecte, un accident, un acte de vandalisme, ou en cas de modifications ou d'opérations de maintenance non effectuées par Dell. Tout disque fourni en remplacement du disque d'origine est garanti pour la durée la plus longue entre (a) le nombre de jours restants par rapport à la garantie d'origine ou (b) un délai de 30 (trente) jours. 280 Utilisation de FlexAddress Dell ne garantit PAS le fonctionnement ininterrompu ou sans erreur du Logiciel, NI son adéquation à vos besoins. Le fait d'avoir choisi ce Logiciel pour obtenir les résultats attendus, son utilisation et les résultats obtenus sont de votre seule et unique responsabilité. EN SON PROPRE NOM ET CELUI DE SES FOURNISSEURS, DELL DÉCLINE TOUTE AUTRE GARANTIE OU CONDITION EXPRESSE OU IMPLICITE, INCLUANT SANS RESTRICTION LES GARANTIES ET CONDITIONS IMPLICITES DE QUALITÉ OU D'ADAPTABILITÉ À UN USAGE PARTICULIER, RELATIVES AU LOGICIEL ET AUX DOCUMENTS FOURNIS AVEC CELUI-CI. Cette garantie limitée vous donne des droits légaux spécifiques, auxquels peuvent s'ajouter d'autres droits, qui varient selon la juridiction. DELL ET SES FOURNISSEURS NE SONT EN AUCUN CAS RESPONSABLES DES DOMMAGES QUELS QU'ILS SOIENT, Y COMPRIS, MAIS SANS S'Y LIMITER, LA PERTE DE BÉNÉFICES, L'INTERRUPTION D'ACTIVITÉ, LA PERTE D'INFORMATIONS COMMERCIALES, OU TOUTE AUTRE PERTE FINANCIÈRE, DÉCOULANT DE L'UTILISATION DU LOGICIEL OU DE L'INCAPACITÉ À UTILISER LE LOGICIEL, MÊME SI DELL OU SON REVENDEUR ONT ÉTÉ INFORMÉS DE LA POSSIBILITÉ DE TELS DOMMAGES. Certaines législations n'autorisent pas la limitation ou l'exclusion de responsabilité pour des préjudices accessoires ou indirects, auquel cas l'exclusion ou la limitation qui précède ne vous sera pas applicable. LOGICIEL LIBRE (Open Source) Une partie de ce CD peut contenir des logiciels libres, que vous pouvez utiliser conformément aux termes et conditions des licences spécifiques sous lesquelles ils ont été distribués. CE LOGICIEL LIBRE EST DISTRIBUÉ DANS L'ESPOIR QU'IL SERA UTILISE, MAIS IL EST FOURNI « EN L'ÉTAT », SANS AUCUNE GARANTIE DE QUELQUE NATURE QUE CE SOIT, EXPRESSE OU IMPLICITE, Y COMPRIS, MAIS SANS S'Y LIMITER, LES GARANTIES IMPLICITES DE COMMERCIABILITÉ ET DE LA CONFORMITÉ À UNE UTILISATION PARTICULIÈRE. EN AUCUN CAS, DELL, LES TITULAIRES DES DROITS D'AUTEUR OU TOUTE PARTIE AYANT CONTRIBUÉ À CE LOGICIEL NE POURRONT ÊTRE TENUS POUR RESPONSABLES DES DOMMAGES DIRECTS, INDIRECTS, ACCESSOIRES, SPÉCIAUX, EXEMPLAIRES OU CONSÉCUTIFS (Y COMPRIS MAIS SANS S'Y LIMITER, LA MISE À Utilisation de FlexAddress 281 DISPOSITION DE BIENS OU DE SERVICES DE SUBSTITUTION, LA PERTE DE BÉNÉFICES, REVENUS, DONNÉES OU UTILITÉ OU L'INTERRUPTION D'UNE ACTIVITÉ), QUELLES QU'EN SOIENT LA CAUSE ET LA RESPONSABILITÉ (CONTRACTUELLE, RESPONSABILITÉ STRICTE OU DÉLIT CIVIL [Y COMPRIS LA NÉGLIGENCE OU TOUTE AUTRE CAUSE]), RÉSULTANT DE L'UTILISATION DU LOGICIEL, ET CE MÊME SI DELL, LES TITULAIRES DES DROITS D'AUTEUR OU TOUTE PARTIE AYANT CONTRIBUÉ À CE LOGICIEL ONT ÉTÉ INFORMÉS DE LA POSSIBILITÉ DE TELS DOMMAGES. DROITS LIMITÉS DU GOUVERNEMENT DES ÉTATS-UNIS Le Logiciel est un « article de commerce », tel que défini par l'article 48 C.F.R. 2.101 (Oct. 1995), consistant en un « logiciel d'ordinateur du commerce » et une « documentation de logiciel d'ordinateur du commerce », termes devant être compris dans leur acception utilisée à l'article 48 C.F.R. 12.212. En accord avec les articles 48 C.F.R. 12.212 et 48 C.F.R. 227.7202-1 à 227.7202-4, tous U.S. Tous les utilisateurs finals du gouvernement américain acquièrent le Logiciel et la documentation dans la limite des droits énoncés par les présentes. Fournisseur/Éditeur du logiciel: Dell Products, L.P., One Dell Way, Round Rock, Texas 78682. CONSIGNES GÉNÉRALES Ce contrat est valide jusqu'à expiration. Il sera résilié uniquement conformément aux conditions décrites ci-dessus, ou en cas de non-respect par l'utilisateur de l'une quelconque des clauses décrites. Une fois ce contrat arrivé à expiration, vous acceptez que le Logiciel et tout matériel l'accompagnant, ainsi que toutes les copies de ces éléments, doivent être détruits. Ce contrat est régi par les lois de l'état du Texas. Les dispositions du présent contrat sont juridiquement indépendantes les unes des autres. Le fait que l'une de ces dispositions se révèle non applicable n'altère en rien le caractère légal et obligatoire des autres dispositions, termes ou conditions du présent contrat. Le présent contrat lie également les successeurs et ayant-droits de l'utilisateur. Les parties renoncent expressément à tout droit de jugement par un jury des éventuels litiges liés au Logiciel ou au présent contrat. Cette dérogation n'étant pas valide dans certaines juridictions, il est possible qu'elle ne s'applique pas dans votre cas. Vous reconnaissez avoir lu et compris le présent contrat et en accepter les termes, et confirmez qu'il constitue le seul accord complet et exclusif entre vous et Dell concernant le Logiciel.282 Utilisation de FlexAddress Questions les plus fréquentes La Figure 6-3 répertorie les questions les plus fréquemment posées à propos de la fonction FlexaddressPlus. Tableau 6-3. FlexaddressPlus Question Réponse Pourquoi après la désactivation de la fonction FlexAddressPlus (bien que FlexAddress soit toujours activé), la commande racadm setflexaddr échoue t-elle sur le CMC (encore actif) ? Si le CMC est activé par la suite, alors que la carte de fonction FlexAddressPlus est toujours sans son logement, la fonction FlexAddressPlus est réactivée et les modifications de configuration de logement/structure de flexaddress peuvent se poursuivre. Utilisation de FlexAddress Plus 283 Utilisation de FlexAddress Plus FlexAddress Plus est une nouvelle fonctionnalité ajoutée à la carte de fonction version 2.0. Il s'agit d'une mise à niveau depuis la fonctionnalité FlexAddress version 1.0. FlexAddress Plus contient davantage d'adresses MAC que la fonctionnalité FlexAddress. Ces deux fonctionnalités permettent au châssis d'attribuer les adresses WWN/MAC (World Wide Name/Media Access Control) aux périphériques Fibre Channel et Ethernet. Les adresses WWN/MAC attribuées par le châssis sont globalement uniques et spécifiques à un logement de serveur. Activation de FlexAddress Plus La fonctionnalité FlexAddress Plus est fournie sur la carte Secure Digital (SD), tout comme la fonctionnalité FlexAddress. REMARQUE : la carte SD libellée FlexAddress ne contient que la fonctionnalité FlexAddress, et la carte libellée FlexAddress Plus contient FlexAddress et FlexAddress Plus. Pour activer la fonctionnalité, la carte doit être insérée dans le module CMC. Certains serveurs, tels que PowerEdge M710HD, peuvent avoir besoin de plus d'adresses MAC que FA ne peut en procurer à CMC, selon leur configuration. Pour ces serveurs, une mise à niveau vers FA+ permet d'optimiser pleinement la configuration WWN/MAC. Veuillez contacter Dell pour obtenir de l'assistance concernant la fonctionnalité FlexAddress Plus. Les mises à jour logicielles suivantes sont requises pour activer la fonctionnalité FlexAddress Plus : serveur BIOS, serveur iDRAC et micrologiciel CMC. Si ces mises à jour ne sont pas appliquées, seule la fonctionnalité FlexAddress est disponible. Pour des informations sur les exigences minimales requises pour les versions de ces composants, voir la section CMC 4.0 de Lisez-moi sur support/dell.com/manuals.284 Utilisation de FlexAddress Plus FlexAddress comparé à FlexAddress Plus FlexAddress a 208 adresses réparties dans 16 logements de serveur, chacun étant alloué à 13 MAC. FlexAddress a 2 928 adresses réparties dans 16 logements de serveur, chacun étant alloué à 183 MAC. Le tableau ci-dessous indique la disposition des adresses MAC dans les deux fonctionnalités. Figure 7-1. Fonctionnalité FlexAdress (FA) comparée à la fonctionnalité FlexPlusAddress (FA+) Circuit A Circuit B Circuit C Gestion iDRAC Nbre total de MAC FlexAddress 4 4 4 1 13 FlexAddress Plus 60 60 60 3 183 FA+ Logement 16 FA Logement 16 iDRAC Circuit A Circuit B Circuit C iDRAC Circuit A Circuit B Circuit C iDRAC Circuit A Circuit B Circuit CUtilisation du service d'annuaire CMC 285 Utilisation du service d'annuaire CMC Un service d'annuaire permet de maintenir une base de données commune rassemblant toutes les informations nécessaires au contrôle des utilisateurs réseau, des ordinateurs, des imprimantes, etc. Si votre entreprise utilise le logiciel Microsoft Active Directory ou LDAP Directory, vous pouvez configurer CMC pour utiliser l'authentification des utilisateurs basée sur répertoire. Utilisation de CMC avec Microsoft Active Directory REMARQUE : l'utilisation d'Active Directory pour reconnaître les utilisateurs CMC est prise en charge par les systèmes d'exploitation Microsoft Windows 2000 et Windows Server 2003. Active Directory sur IPv6 est pris en charge uniquement sous Windows 2008. Extensions de schéma Active Directory Vous pouvez utiliser Active Directory pour définir l'accès utilisateur à CMC selon deux méthodes : • La solution de schéma standard qui utilise uniquement les objets de groupe Active Directory standard. • La solution de schéma étendu, qui utilise des objets Active Directory définis par Dell. Schéma standard comparé au schéma étendu Lorsque vous utilisez Active Directory pour configurer l'accès à CMC, vous devez choisir la solution de schéma étendu ou schéma standard. Avec le schéma standard : • Aucune extension de schéma n'est nécessaire car le schéma standard utilise uniquement des objets Active Directory. • La configuration d'Active Directory est simple. Avec le schéma étendu : • Tous les objets de contrôle d'accès sont maintenus dans Active Directory. • La configuration de l'accès utilisateur sur des contrôleurs CMC différents avec des niveaux de privilège différents permet une flexibilité maximale.286 Utilisation du service d'annuaire CMC Présentation d'Active Directory avec le schéma standard L'utilisation du schéma étendu pour l'intégration d'Active Directory requiert une configuration sur Active Directory et sur CMC. Du côté d'Active Directory, un objet Groupe standard est utilisé comme groupe de rôles. Un utilisateur ayant accès à CMC sera membre du groupe de rôles. Pour donner à cet utilisateur accès à une carte CMC spécifique, le nom du groupe de rôles et son nom de domaine doivent être configurés sur cette carte CMC. Contrairement à la solution du schéma étendu, le niveau des rôles et des privilèges est défini sur chaque carte CMC et non pas dans Active Directory. Vous pouvez configurer et définir un maximum de cinq groupes de rôles sur chaque contrôleur CMC. La Figure 8-1 illustre la configuration de CMC avec Active Directory et le schéma standard. La Figure 5-43 présente le niveau de privilège des groupes de rôles et la Figure 8-1 illustre les paramètres par défaut des groupes de rôles. Figure 8-1. Configuration de CMC avec Active Directory et le schéma standard Rôle Groupe Rôle Nom du groupe et nom du domaine Rôle Définition Utilisateur Configuration du côté d'Active Directory Configuration du CMCUtilisation du service d'annuaire CMC 287 REMARQUE : les valeurs de masque binaire sont utilisées uniquement lors de la définition du schéma standard avec RACADM. Tableau 8-1. Privilèges par défaut des groupes de rôles Groupe de rôles Privilège par défaut Niveau Droits accordés Masque binaire 1 None (Aucune) • Ouverture de session utilisateur CMC • Administrateur de configuration du châssis • Administrateur de configuration des utilisateurs • Administrateur d'effacement des journaux • Administrateur et contrôle du châssis • Super utilisateur • Server Administrator • Utilisateur d'alertes de test • Administrateur de commandes de débogage • Administrateur de structure A • Administrateur de structure B • Administrateur de structure C 0x00000fff 2 None (Aucune) • Ouverture de session utilisateur CMC • Administrateur d'effacement des journaux • Administrateur et contrôle du châssis • Server Administrator • Utilisateur d'alertes de test • Administrateur de structure A • Administrateur de structure B • Administrateur de structure C 0x00000ed9 3 None (Aucune) Ouverture de session utilisateur CMC 0x00000001 4 None (Aucune) Aucun droit attribué 0x00000000 5 None (Aucune) Aucun droit attribué 0x00000000288 Utilisation du service d'annuaire CMC REMARQUE : pour plus d'informations sur les privilèges utilisateur, voir « Types d'utilisateurs », à la page 174. Il existe deux méthodes pour activer Active Directory avec le schéma standard : • Avec l'interface Web de CMC. Voir « Configuration de CMC avec Active Directory avec schéma standard et l'interface Web », à la page 288. • Avec l'outil CLI?RACADM. Voir « Configuration de CMC avec Active Directory avec schéma standard et RACADM », à la page 291. Configuration du schéma standard d'Active Directory pour accéder à CMC Vous devez suivre les étapes suivantes pour configurer Active Directory pour qu'un utilisateur Active Directory puisse accéder à CMC : 1 Sur un serveur Active Directory (contrôleur de domaine), ouvrez le snap-in Utilisateurs et ordinateurs Active Directory. 2 Créez un groupe ou sélectionnez un groupe existant. Le nom du groupe et le nom de ce domaine doivent être configurés sur CMC soit avec l'interface Web soit RACADM. Pour en savoir plus, voir « Configuration de CMC avec Active Directory avec schéma standard et l'interface Web », à la page 288 ou « Configuration de CMC avec Active Directory avec schéma standard et RACADM », à la page 291. 3 Ajoutez l'utilisateur Active Directory comme membre du groupe Active Directory pour qu'il puisse accéder à iDRAC6. Configuration de CMC avec Active Directory avec schéma standard et l'interface Web 1 Ouvrez une session sur l'interface Web de CMC. 2 Sélectionnez Châssis dans l'arborescence du système. 3 Cliquez sur Authentification utilisateur→ Services d'annuaire. La page Services d'annuaire s'affiche. 4 Sélectionnez le bouton radio en regard de Microsoft Active Directory (Schéma standard). La page Configuration et gestion d'Active Directory apparaît.Utilisation du service d'annuaire CMC 289 5 Dans la section Paramètres communs : a Sélectionnez la case à cocher Activer Active Directory. b entrez le nom de domaine racine. REMARQUE : le nom de domaine racine doit être un nom de domaine valide qui respecte la convention d'attribution des noms x.y, où x est une chaîne de 1 à 256 caractères ASCII non séparés par des espaces, et où y est un type de domaine valide tel que com, edu, gov, int, mil, net ou org. c entrez le Délai d'attente en secondes. Le Délai d'attente est compris entre 15 et 300 secondes. Le Délai d'attente par défaut est 90 secondes. 6 Si vous voulez que l'appel dirigé recherche le contrôleur de domaine et le catalogue global, cochez la case Chercher le serveur AD à rechercher (facultatif), puis : a Dans le champ de texte Contrôleur de domaine, entrez le nom du serveur sur lequel est installé le service Active Directory. b Dans le champ de texte Catalogue global, entrez l'emplacement du catalogue global sur le contrôleur de domaine d'Active Directory. Le catalogue global fournit une ressource pour rechercher une forêt Active Directory. 7 Cliquez sur Appliquer pour enregistrer vos paramètres. REMARQUE : vous devez appliquer vos paramètres avant de passer à l'étape suivante. Si vous n'appliquez pas les paramètres, vous perdez les paramètres entrés lorsque vous passez à la page suivante. 8 Dans la section Paramètres du schéma standard, cliquez sur un Groupe de rôles. La page Configurer le groupe de rôles s'affiche. 9 Saisissez le Nom du groupe. Le nom du groupe identifie le groupe de rôles dans l'Active Directory associé à la carte CMC. 10 Saisissez le Domaine du groupe. Le Domaine du groupe est le nom de domaine racine pleinement qualifié de la forêt. 11 Sélectionnez les privilèges du groupe dans la page Privilèges de groupes de rôles. Si vous modifiez des privilèges, le privilège du groupe de rôles (administrateur, utilisateur privilégié ou utilisateur invité) existant deviendra celui du groupe personnalisé ou du groupe de rôles approprié. Voir Figure 5-43.290 Utilisation du service d'annuaire CMC 12 Cliquez sur Appliquer pour enregistrer les paramètres Groupe de rôles. 13 Cliquez sur Retour à la page Configuration. 14 Téléversez votre certificat signé par une autorité de certification racine de la forêt de domaines sur CMC. Dans la section Gestion des certificats, entrez le chemin d'accès du fichier du certificat ou naviguez vers le fichier du certificat. Cliquez sur le bouton Téléverser pour transférer le fichier vers CMC. REMARQUE : la valeur Chemin du fichier affiche le chemin de fichier relatif du certificat que vous téléversez. Vous devez taper le chemin de fichier absolu, y compris le chemin et le nom de fichier complets et l'extension du fichier. Les certificats SSL des contrôleurs de domaine doivent être signés par le certificat signé par l'autorité de certification racine. Le certificat signé par l'autorité de certification racine doit être disponible sur la station de gestion accédant à CMC. 15 Cliquez sur Appliquer. Le serveur Web de CMC redémarre automatiquement lorsque vous cliquez sur Appliquer. 16 Fermez, puis ouvrez une session sur CMC pour terminer la configuration de la fonctionnalité Active Directory CMC. 17 Sélectionnez Châssis dans l'arborescence du système. 18 Cliquez sur l'onglet Réseau. 19 Cliquez sur le sous-onglet Réseau. La page Configuration réseau s'affiche. 20 Si Utiliser DHCP (pour l'adresse IP du NIC) est sélectionné sous Paramètres réseau, sélectionnez Utiliser DHCP pour obtenir l'adresse du serveur DNS. Pour saisir manuellement l'adresse IP du serveur DNS, désélectionnez Utiliser DHCP pour obtenir des adresses de serveur DNS et entrez les adresses IP de serveur DNS principale et alternative. 21 Cliquez sur Appliquer les modifications. La configuration de la fonctionnalité du schéma standard d'Active Directory CMC est terminée.Utilisation du service d'annuaire CMC 291 Configuration de CMC avec Active Directory avec schéma standard et RACADM Pour configurer la fonctionnalité Active Directory CMC avec le schéma standard à l'aide de l'interface de ligne de commande RACADM, utilisez les commandes suivantes : 1 Ouvrez une console texte série/Telnet/SSH d'accès à CMC et entrez : racadm config -g cfgActiveDirectory -o cfgADEnable 1 racadm config -g cfgActiveDirectory -o cfgADType 2 racadm config -g cfgActiveDirectory -o cfgADRootDomain racadm config -g cfgStandardSchema -i -o cfgSSADRoleGroupName racadm config -g cfgStandardSchema -i -o cfgSSADRoleGroupDomain racadm config -g cfgStandardSchema -i -o cfgSSADRoleGroupPrivilege racadm sslcertupload -t 0x2 -f racadm sslcertdownload -t 0x1 -f REMARQUE : pour les valeurs de nombre de masques binaires, consultez le Tableau 3-1 dans le chapitre des propriétés de la base de données du Guide de référence de la ligne de commande RACADM pour iDRAC6 et CMC.292 Utilisation du service d'annuaire CMC 2 Spécifiez un serveur DNS à l'aide de l'une des options suivantes : • Si DHCP est activé sur CMC et que vous voulez utiliser l'adresse DNS obtenue automatiquement par le serveur DHCP, entrez la commande suivante : racadm config -g cfgLanNetworking -o cfgDNSServersFromDHCP 1 • Si le protocole DHCP est désactivé sur CMC ou que vous voulez entrer manuellement l'adresse IP DNS, entrez les commandes suivantes : racadm config -g cfgLanNetworking -o cfgDNSServersFromDHCP 0 racadm config -g cfgLanNetworking -o cfgDNSServer1 racadm config -g cfgLanNetworking -o cfgDNSServer2 Présentation du schéma étendu Il existe deux méthodes pour activer Active Directory avec le schéma étendu : • Utilisation de l'interface Web de CMC. Pour les instructions, voir « Configuration de CMC avec le schéma étendu d'Active Directory et l'interface Web », à la page 308. • Utilisation de l'interface de ligne de commande RACADM. Pour les instructions, voir « Configuration de CMC avec le schéma étendu d'Active Directory et RACADM », à la page 311. Extensions de schéma Active Directory Les données d'Active Directory constituent une base de données distribuée d'attributs et de classes. Le schéma Active Directory inclut les règles qui déterminent le type de données pouvant être ajoutées ou incluses dans la base de données. La classe d'utilisateur est un exemple de classe qui est conservée dans la base de données. Les attributs de classe d'utilisateur peuvent inclure le prénom de l'utilisateur, son nom de famille, son numéro de téléphone, etc. Utilisation du service d'annuaire CMC 293 Vous pouvez étendre la base de données d'Active Directory en y ajoutant vos propres attributs et classes pour répondre aux besoins de l'environnement de votre entreprise. Dell a étendu ce schéma pour inclure les modifications nécessaires à la prise en charge de l'authentification et de l'autorisation de la gestion à distance. Chaque attribut ou classe ajouté à un schéma Active Directory existant peut être défini par une référence unique. Pour maintenir des numéros uniques dans l'industrie, Microsoft conserve une base de données d'identifiants d'objets (OID) d'Active Directory. Pour étendre le schéma dans Active Directory de Microsoft, Dell a créé des OID uniques, des extensions de noms uniques et des numéros d'attributs liés de façon unique pour des attributs et classes spécifiques à Dell : Extension de Dell : dell OID de base de Dell : 1.2.840.113556.1.8000.1280 Plage de N° d'association RAC : 12070–2079 Présentation des extensions de schéma du RAC Dell fournit un groupe de propriétés que vous pouvez configurer. Le schéma étendu par Dell inclut les propriétés Association, Périphérique et Privilège. La propriété Association lie les utilisateurs ou les groupes à un ensemble spécifique de privilèges pour un ou plusieurs périphériques RAC. Ce modèle offre à l'administrateur un maximum de flexibilité sur les différentes combinaisons d'utilisateurs, de privilèges du RAC et de périphériques RAC sur le réseau, sans ajouter trop de complexité. Présentation des objets Active Directory Lorsque le réseau que vous voulez intégrer avec Active Directory pour l'authentification et l'autorisation comprend deux CMC, vous devez créer au moins un objet Association et un objet Périphérique RAC pour chaque contrôleur CMC. Vous pouvez créer plusieurs objets Association et chaque objet Association peut être lié à autant d'utilisateurs, groupes d'utilisateurs ou objets Périphérique RAC que nécessaire. Les utilisateurs et les objets Périphérique RAC peuvent être des membres de n'importe quel domaine dans l'entreprise. Cependant, chaque objet Association ne peut être lié (ou ne peut lier les utilisateurs, les groupes d'utilisateurs ou les objets Périphérique RAC) qu'à un seul objet Privilège. Cet exemple permet à l'administrateur de contrôler les privilèges de chaque utilisateur sur des CMC spécifiques. 294 Utilisation du service d'annuaire CMC L'objet Périphérique RAC est le lien vers le micrologiciel du RAC permettant à Active Directory d'effectuer une requête d'authentification et d'autorisation. Lorsqu'un RAC est ajouté au réseau, l'administrateur doit configurer le RAC et son objet de périphérique avec son nom Active Directory pour que les utilisateurs puissent établir l'authentification et l'autorisation avec Active Directory. En outre, l'administrateur doit ajouter le RAC à au moins un objet Association pour que les utilisateurs puissent s'authentifier. La Figure 8-2 illustre le fait que l'objet Association fournit la connexion nécessaire pour toute authentification et autorisation. REMARQUE : l'objet Privilège RAC s'applique à DRAC 4, DRAC 5 et à CMC. Vous pouvez créer autant d'objets Association que vous le voulez. Vous devez toutefois créer au moins un objet Association et avoir un objet Périphérique RAC pour chaque RAC (CMC) présent sur le réseau que vous voulez intégrer à Active Directory. Figure 8-2. Configuration type pour les objets Active Directory Objet Association Groupe(s) d'utilisateurs Objet Privilège Objet(s) Périphérique RAC Objet Privilège du RACUtilisation du service d'annuaire CMC 295 L'objet Association inclut autant d'utilisateurs et/ou de groupes que d'objets Périphérique RAC. Toutefois, l'objet Association ne peut inclure qu'un seul objet Privilège par objet Association. L'objet Association connecte les « Utilisateurs » qui ont des « Privilèges » sur les contrôleurs RAC (CMC). En outre, vous pouvez configurer des objets Active Directory dans un domaine unique ou dans des domaines multiples. Par exemple, supposons que vous avez deux contrôleurs CMC (RAC1 et RAC2) et trois utilisateurs Active Directory existants (utilisateur1, utilisateur2 et utilisateur3). Vous voulez donner des privilèges d'administrateur à utilisateur1 et à utilisateur2 sur les deux CMC et des privilèges d'ouverture de session à utilisateur3 sur la carte RAC2. La Figure 8-3 montre comment configurer les objets Active Directory dans ce scénario. Lorsque vous ajoutez des groupes universels à partir de domaines séparés, créez un objet Association avec une étendue universelle. Les objets Association par défaut créés par l'utilitaire Dell Schema Extender sont des groupes locaux de domaines et ne fonctionnent pas avec les groupes universels d'autres domaines. Figure 8-3. Configuration d'objets Active Directory dans un domaine unique AO1 AO2 Groupe1 Priv1 Priv2 Utilisateur1 Utilisateur2 Utilisateur3 RAC1 RAC2296 Utilisation du service d'annuaire CMC Pour configurer les objets pour le scénario de domaine unique : 1 Créez deux objets Association. 2 Créez deux objets Périphérique RAC, RAC1 et RAC2, pour représenter les deux CMC. 3 Créez deux objets Privilège, Priv1 et Priv2 ; Priv1 disposant de tous les privilèges (administrateur) et Priv2 disposant des privilèges d'ouverture de session. 4 Groupez Utilisateur1 et Utilisateur2 dans le Groupe1. 5 Ajoutez Groupe1 comme membre de l'objet Association 1 (A01), Priv1 comme objet Privilège dans A01, et RAC1 et RAC2 comme périphériques RAC dans A01. 6 Ajoutez Utilisateur3 comme membre de l'objet Association 2 (A02), Priv2 comme objet Privilège dans A02 et RAC2 comme périphérique RAC dans A02. Pour des instructions détaillées, voir « Ajout d'utilisateurs CMC et de leurs privilèges à Active Directory », à la page 306. La Figure 8-4 fournit un exemple d'objets Active Directory dans de multiples domaines. Dans ce scénario, vous avez deux CMC (RAC1 et RAC2) et trois utilisateurs Active Directory existants (utilisateur1, utilisateur2 et utilisateur3). Utilisateur1 est dans le Domaine1 ; Utilisateur2 et Utilisateur3 sont dans le Domaine2. Dans ce scénario, configurez utilisateur1 et utilisateur2 avec les droits d'administrateur sur les deux CMC et configurez utilisateur3 avec les privilèges d'ouverture de session sur la carte RAC2.Utilisation du service d'annuaire CMC 297 Figure 8-4. Configuration des objets Active Directory dans des domaines multiples Pour configurer les objets pour le scénario de domaine multiple : 1 Assurez-vous que la fonction de forêt de domaines est en mode Natif ou Windows 2003. 2 Créez deux objets Association, A01 (d'étendue universelle) et A02, dans n'importe quel domaine. La Figure 8-4 illustre les objets du Domaine2. 3 Créez deux objets Périphérique RAC, RAC1 et RAC2, pour représenter les deux CMC. 4 Créez deux objets Privilège, Priv1 et Priv2 ; Priv1 disposant de tous les privilèges (administrateur) et Priv2 disposant des privilèges d'ouverture de session. 5 Groupez Utilisateur1 et Utilisateur2 dans le Groupe1. L'étendue de groupe de Groupe1 doit être Universel. 6 Ajoutez Groupe1 comme membre de l'objet Association 1 (A01), Priv1 comme objet Privilège dans A01, et RAC1 et RAC2 comme périphériques RAC dans A01. 7 Ajoutez Utilisateur3 comme membre de l'objet Association 2 (A02), Priv2 comme objet Privilège dans A02 et RAC2 comme périphérique RAC dans A02. AO1 AO2 Groupe1 Priv1 Priv2 Utilisateur1 Utilisateur2 Utilisateur3 RAC1 RAC2 Domaine1 Domaine2298 Utilisation du service d'annuaire CMC Configuration du schéma étendu d'Active Directory pour accéder à votre CMC Avant d'utiliser Active Directory pour accéder à CMC, configurez le logiciel Active Directory et CMC : 1 Étendez le schéma Active Directory (voir « Extension du schéma Active Directory », à la page 298). 2 Étendez le snap-in Utilisateurs et ordinateurs Active Directory (voir « Installation de l'extension Dell sur le snap-in Utilisateurs et ordinateurs Active Directory », à la page 305). 3 Ajoutez des utilisateurs CMC et leurs privilèges à Active Directory (voir « Ajout d'utilisateurs CMC et de leurs privilèges à Active Directory », à la page 306). 4 Activez SSL sur chaque contrôleur de domaine. 5 Configurez les propriétés Active Directory de CMC via l'interface Web CMC ou l'utilitaire RACADM (voir « Configuration de CMC avec le schéma étendu d'Active Directory et l'interface Web », à la page 308 ou « Configuration de CMC avec le schéma étendu d'Active Directory et RACADM », à la page 311). Extension du schéma Active Directory En étendant votre schéma Active Directory, vous ajoutez une division opérationnelle Dell, des classes et des attributs de schéma, et des exemples d'objets Privilège et Association au schéma Active Directory. Pour étendre le schéma, vous devez avoir des privilèges d'administrateur de schéma pour le propriétaire de rôle FSMO contrôleur de schéma de la forêt de domaine. Vous pouvez étendre votre schéma en utilisant une des méthodes suivantes : • l'utilitaire Dell Schema Extender ; • le fichier script LDIF. Si vous utilisez le fichier script LDIF, la division opérationnelle Dell ne sera pas ajoutée au schéma. Utilisation du service d'annuaire CMC 299 Les fichiers LDIF et Dell Schema Extender sont situés sur votre DVD Dell Systems Management Tools and Documentation respectivement dans les répertoires suivants : • :\SYSMGMT\ManagementStation\support\ OMActiveDirectory_Tools\\LDIF Files • :\SYSMGMT\ManagementStation\support\ OMActiveDirectory_ Tools\\Schema Extender Pour utiliser les fichiers LDIF, consultez les instructions du fichier « Lisezmoi » qui se trouve dans le répertoire LDIF_Files. Pour obtenir des instructions sur l'utilisation de Dell Schema Extender pour étendre le schéma Active Directory, voir « Utilisation de Dell Schema Extender », à la page 299. Vous pouvez copier et exécuter Schema Extender ou les fichiers LDIF depuis n'importe quel emplacement. Utilisation de Dell Schema Extender PRÉCAUTION : l'utilitaire Dell Schema Extender utilise le fichier SchemaExtenderOem.ini. Pour que l'utilitaire Dell Schema Extender fonctionne normalement, ne changez pas le nom de ce fichier. 1 Dans l'écran Bienvenue, cliquez sur Suivant. 2 Lisez et comprenez l'avertissement, puis cliquez sur Suivant. 3 Sélectionnez Utiliser les références d'ouverture de session actuelles ou saisissez un nom d'utilisateur et un mot de passe ayant des droits d'administrateur de schéma. 4 Cliquez sur Suivant pour exécuter Dell Schema Extender. 5 Cliquez sur Terminer. Le schéma est étendu. Pour vérifier l'extension de schéma, utilisez la console de gestion de Microsoft (MMC) et le snap-in du schéma Active Directory pour vérifier ce qui suit : • Classes : voir Figure 8-2 à Figure 8-7 • Attributs : voir Figure 8-8 Consultez votre documentation Microsoft pour des informations supplémentaires sur comment activer et utiliser le snap-in du schéma Active Directory MMC.300 Utilisation du service d'annuaire CMC Tableau 8-2. Définitions de classe pour les classes ajoutées au schéma Active Directory Nom de classe Numéro d'identification d'objet (OID) attribué dellRacDevice 1.2.840.113556.1.8000.1280.1.1.1.1 dellAssociationObject 1.2.840.113556.1.8000.1280.1.1.1.2 dellRACPrivileges 1.2.840.113556.1.8000.1280.1.1.1.3 dellPrivileges 1.2.840.113556.1.8000.1280.1.1.1.4 dellProduct 1.2.840.113556.1.8000.1280.1.1.1.5 Tableau 8-3. Classe dellRacDevice OID 1.2.840.113556.1.8000.1280.1.1.1.1 Description Représente le périphérique RAC de Dell. Le périphérique RAC doit être configuré comme dellRacDevice dans Active Directory. Cette configuration permet à CMC d'envoyer des requêtes de protocole LDAP (Lightweight Directory Access Protocol) à Active Directory. Type de classe Classe structurelle SuperClasses dellProduct Attributs dellSchemaVersion dellRacType Tableau 8-4. dellAssociationObject Class OID 1.2.840.113556.1.8000.1280.1.1.1.2 Description Représente l'objet Association de Dell. L'objet Association établit la connexion entre les utilisateurs et les périphériques. Type de classe Classe structurelle SuperClasses Groupe Attributs dellProductMembers dellPrivilegeMemberUtilisation du service d'annuaire CMC 301 Tableau 8-5. Classe dellRAC4Privileges OID 1.2.840.113556.1.8000.1280.1.1.1.3 Description Définit les droits (privilèges) d'autorisation pour le périphérique CMC. Type de classe Classe auxiliaire SuperClasses None (Aucune) Attributs dellIsLoginUser dellIsCardConfigAdmin dellIsUserConfigAdmin dellIsLogClearAdmin dellIsServerResetUser dellIsTestAlertUser dellIsDebugCommandAdmin dellPermissionMask1 dellPermissionMask2 Tableau 8-6. Classe dellPrivileges OID 1.2.840.113556.1.8000.1280.1.1.1.4 Description Classe de conteneur pour les privilèges (droits d'autorisation) de Dell. Type de classe Classe structurelle SuperClasses Utilisateur Attributs dellRAC4Privileges Tableau 8-7. Classe dellProduct OID 1.2.840.113556.1.8000.1280.1.1.1.5 Description Classe principale à partir de laquelle tous les produits Dell sont dérivés. Type de classe Classe structurelle SuperClasses Ordinateur Attributs dellAssociationMembers302 Utilisation du service d'annuaire CMC Tableau 8-8. Liste des attributs ajoutés au schéma Active Directory OID attribué/Identifiant d'objet de syntaxe Valeur unique Attribut : dellPrivilegeMember Description : Liste des objets dellPrivilege appartenant à cet attribut. OID : 1.2.840.113556.1.8000.1280.1.1.2.1 Nom unique : (LDAPTYPE_DN 1.3.6.1.4.1.1466.115.121.1.12) FALSE Attribut : dellProductMembers Description : Liste des objets dellRacDevices appartenant à ce rôle. Cet attribut est le lien vers l'avant vers le lien vers l'arrière dellAssociationMembers. Numéro de lien : 12070 OID : 1.2.840.113556.1.8000.1280.1.1.2.2 Nom unique : (LDAPTYPE_DN 1.3.6.1.4.1.1466.115.121.1.12) FALSE Attribut : dellIsCardConfigAdmin Description : VRAI si l'utilisateur a des droits d'ouverture de session sur le périphérique. OID : 1.2.840.113556.1.8000.1280.1.1.2.4 Booléen (LDAPTYPE_BOOLEAN 1.3.6.1.4.1.1466.115.121.1.7) TRUE Attribut : dellIsLoginUser Description : VRAI si l'utilisateur a des droits d'ouverture de session sur le périphérique. OID : 1.2.840.113556.1.8000.1280.1.1.2.3 Booléen (LDAPTYPE_BOOLEAN 1.3.6.1.4.1.1466.115.121.1.7) TRUE Attribut : dellIsCardConfigAdmin Description : VRAI si l'utilisateur a des droits d'ouverture de session sur le périphérique. OID : 1.2.840.113556.1.8000.1280.1.1.2.4 Booléen (LDAPTYPE_BOOLEAN 1.3.6.1.4.1.1466.115.121.1.7) TRUEUtilisation du service d'annuaire CMC 303 Attribut : dellIsUserConfigAdmin Description : VRAI si l'utilisateur a des droits d'administrateur et configuration des utilisateurs sur le périphérique. OID : 1.2.840.113556.1.8000.1280.1.1.2.5 Booléen (LDAPTYPE_BOOLEAN 1.3.6.1.4.1.1466.115.121.1.7) TRUE Attribut : delIsLogClearAdmin Description : VRAI si l'utilisateur a des droits d'administrateur et d'effacement des journaux sur le périphérique. OID : 1.2.840.113556.1.8000.1280.1.1.2.6 Booléen (LDAPTYPE_BOOLEAN 1.3.6.1.4.1.1466.115.121.1.7) TRUE Attribut : dellIsServerResetUser Description : VRAI si l'utilisateur a des droits de réinitialisation de serveur sur le périphérique. OID : 1.2.840.113556.1.8000.1280.1.1.2.7 Booléen (LDAPTYPE_BOOLEAN 1.3.6.1.4.1.1466.115.121.1.7) TRUE Attribut : dellIsTestAlertUser Description : VRAI si l'utilisateur a des droits d'utilisateur et de test d'alertes sur le périphérique. OID : 1.2.840.113556.1.8000.1280.1.1.2.10 Booléen (LDAPTYPE_BOOLEAN 1.3.6.1.4.1.1466.115.121.1.7) TRUE Attribut : dellIsDebugCommandAdmin Description : VRAI si l'utilisateur a des droits d'administrateur pour la commande de débogage sur le périphérique. OID : 1.2.840.113556.1.8000.1280.1.1.2.11 Booléen (LDAPTYPE_BOOLEAN 1.3.6.1.4.1.1466.115.121.1.7) TRUE Attribut : dellSchemaVersion Description : la version actuelle du schéma est utilisée pour mettre le schéma à jour. OID : 1.2.840.113556.1.8000.1280.1.1.2.12 Case Ignore String (LDAPTYPE_CASEIGNORESTRING 1.2.840.113556.1.4.905) TRUE Tableau 8-8. Liste des attributs ajoutés au schéma Active Directory (suite) OID attribué/Identifiant d'objet de syntaxe Valeur unique304 Utilisation du service d'annuaire CMC Attribut : dellRacType Description : Cet attribut est le type de RAC actuel pour l'objet dellRacDevice et le lien vers l'arrière vers le lien vers l'avant dellAssociationObjectMembers. OID : 1.2.840.113556.1.8000.1280.1.1.2.13 Case Ignore String (LDAPTYPE_CASEIGNORESTRING 1.2.840.113556.1.4.905) TRUE Attribut : dellAssociationMembers Description : Liste des dellAssociationObjectMembers appartenant à ce produit. Cet attribut est le lien vers l'arrière vers l'attribut lié dellProductMembers. ID de lien : 12071 OID : 1.2.840.113556.1.8000.1280.1.1.2.14 Nom distingué (LDAPTYPE_DN 1.3.6.1.4.1.1466.115.121.1.12) FALSE Attribut : dellPermissionsMask1 OID : 1.2.840.113556.1.8000.1280.1.6.2.1 Integer (LDAPTYPE_INTEGER) Attribut : dellPermissionsMask2 OID : 1.2.840.113556.1.8000.1280.1.6.2.2 Integer (LDAPTYPE_INTEGER) Tableau 8-8. Liste des attributs ajoutés au schéma Active Directory (suite) OID attribué/Identifiant d'objet de syntaxe Valeur uniqueUtilisation du service d'annuaire CMC 305 Installation de l'extension Dell sur le snap-in Utilisateurs et ordinateurs Active Directory Lorsque vous étendez le schéma dans Active Directory, vous devez également développer le snap-in Utilisateurs et ordinateurs Active Directory pour que l'administrateur puisse gérer les périphériques RAC (CMC), les utilisateurs et les groupes d'utilisateurs, les associations RAC et les privilèges RAC. Lorsque vous installez Systems Management Software à l'aide du DVD Dell Systems Management Tools and Documentation, vous pouvez étendre le snap-in en sélectionnant l'option Extension Dell sur le snap-in Utilisateurs et ordinateurs Active Directory lors de la procédure d'installation. Voir le Guide d'installation de Dell OpenManage Server Administrator et le Guide d'installation du logiciel de la station de gestion de Dell OpenManage pour des instructions supplémentaires sur l'installation du logiciel de gestion des systèmes. Pour plus d'informations sur le snap-in Utilisateurs et ordinateurs Active Directory, voir la documentation Microsoft. Installation du pack administrateur Vous devez installer le pack administrateur sur tous les systèmes qui gèrent les objets CMC d'Active Directory. Si vous n'installez pas le pack administrateur, vous ne pouvez pas visualiser l'objet RAC Dell dans le conteneur. Ouverture du snap-in Utilisateurs et ordinateurs Active Directory Pour ouvrir le snap-in Utilisateurs et ordinateurs Active Directory : 1 Si vous avez ouvert une session sur le contrôleur de domaine, cliquez sur Démarrer→ Outils d'administration→ Utilisateurs et ordinateurs Active Directory. Si vous n'avez pas ouvert une session sur le contrôleur de domaine, le pack administrateur Microsoft approprié doit être installé sur votre système local. Pour installer ce pack administrateur, cliquez sur Démarrer→ Exécuter, entrez MMC et appuyez sur . Ceci ouvre la console de gestion Microsoft (MMC). 2 Dans la fenêtre Console 1, cliquez sur Fichier (ou sur Console sur les systèmes exécutant Windows 2000). 3 Cliquez sur Ajouter/Supprimer un snap-in.306 Utilisation du service d'annuaire CMC 4 Sélectionnez le snap-in Utilisateurs et ordinateurs Active Directory, puis cliquez sur Ajouter. 5 Cliquez sur Close (Fermer). Ajout d'utilisateurs CMC et de leurs privilèges à Active Directory Le snap-in Utilisateurs et ordinateurs Active Directory étendu par Dell vous permet d'ajouter des utilisateurs CMC et des privilèges en créant des objets RAC, Association et Privilège. Pour ajouter chaque type d'objet : 1 Créer un objet Périphérique RAC. 2 Créer un objet Privilège. 3 Créer un objet Association. 4 Ajouter des objets à un objet Association. Création d'un objet Périphérique RAC Pour créer un objet Périphérique RAC 1 Dans la fenêtre Racine de la console MMC, cliquez avec le bouton droit de la souris sur un conteneur. 2 Sélectionnez Nouveau→ Objet RAC Dell. La fenêtre Nouvel objet apparaît. 3 Entrez un nom pour le nouvel objet. Ce nom doit être identique au nom CMC saisi à l'étape a de« Configuration de CMC avec le schéma étendu d'Active Directory et l'interface Web », à la page 308. 4 Sélectionnez Objet du périphérique RAC, puis cliquez sur OK. Création d'un objet Privilège REMARQUE : un objet Privilège doit être créé dans le même domaine que l'objet Association associé. Pour créer un objet Privilège : 1 Dans la fenêtre Racine de la console (MMC), cliquez avec le bouton droit de la souris sur un conteneur. 2 Sélectionnez Nouveau→ Objet RAC Dell. La fenêtre Nouvel objet apparaît. 3 Entrez un nom pour le nouvel objet. 4 Sélectionnez Objet Privilège, puis cliquez sur OK.Utilisation du service d'annuaire CMC 307 5 Cliquez avec le bouton droit de la souris sur l'objet Privilège que vous avez créé et sélectionnez Propriétés. 6 Cliquez sur l'onglet Privilèges RAC et sélectionnez les privilèges que vous souhaitez attribuer à l'utilisateur. Pour plus d'informations sur les privilèges utilisateur CMC, voir « Types d'utilisateurs », à la page 174. Création d'un objet Association L'objet Association est dérivé d'un groupe et doit contenir un type de groupe. L'étendue de l'association spécifie le type de groupe de sécurité pour l'objet Association. Quand vous créez un objet Association, vous devez choisir l'étendue de l'association qui s'applique au type d'objet que vous avez l'intention d'ajouter. Par exemple, si vous sélectionnez Universel, les objets Association sont uniquement disponibles lorsque le domaine d'Active Directory fonctionne en mode natif ou supérieur. Pour créer un objet Association : 1 Dans la fenêtre Racine de la console (MMC), cliquez avec le bouton droit de la souris sur un conteneur. 2 Sélectionnez Nouveau→ Objet RAC Dell. Cette action ouvre la fenêtre Nouvel objet. 3 Entrez un nom pour le nouvel objet. 4 Sélectionnez Objet Association. 5 Sélectionnez l'étendue de l'objet Association, puis cliquez sur OK. Ajout d'objets à un objet Association En utilisant la fenêtre Propriétés de l'objet Association, vous pouvez associer des utilisateurs, des groupes d'utilisateurs, des objets Privilège et des périphériques RAC ou des groupes de périphériques RAC. Si votre système s'exécute sous Windows 2000 ou supérieur, utilisez les groupes universels pour répartir sur des domaines vos utilisateurs ou vos objets RAC. Vous pouvez ajouter des groupes d'utilisateurs et de périphériques RAC. La procédure de création de groupes associés à Dell et de groupes non associés à Dell est identique. Ajout d'utilisateurs ou de groupes d'utilisateurs Pour ajouter des utilisateurs ou des groupes d'utilisateurs : 1 Cliquez avec le bouton droit de la souris sur l'objet Association et sélectionnez Propriétés. 2 Sélectionnez l'onglet Utilisateurs et cliquez sur Ajouter. 3 Entrez le nom de l'utilisateur ou du groupe d'utilisateurs et cliquez sur OK.308 Utilisation du service d'annuaire CMC Cliquez sur l'onglet Objet Privilège pour ajouter l'objet Privilège à l'association qui définit les privilèges de l'utilisateur ou du groupe d'utilisateurs durant l'authentification auprès d'un périphérique RAC. Vous ne pouvez ajouter qu'un seul objet Privilège à un objet Association. Ajout de privilèges Pour ajouter des privilèges : 1 Sélectionnez l'onglet Objet Privilège et cliquez sur Ajouter. 2 Entrez le nom de l'objet Privilège et cliquez sur OK. Cliquez sur l'onglet Produits pour ajouter un ou plusieurs périphériques RAC à l'association. Les périphériques associés spécifient les périphériques RAC connectés au réseau qui sont disponibles pour les utilisateurs ou les groupes d'utilisateurs définis. Vous pouvez ajouter plusieurs périphériques RAC à un objet Association. Ajout de périphériques RAC ou de groupes de périphériques RAC Pour ajouter des périphériques RAC ou des groupes de périphériques RAC : 1 Sélectionnez l'onglet Produits et cliquez sur Ajouter. 2 Entrez le nom du périphérique RAC ou du groupe de périphériques RAC et cliquez sur OK. 3 Dans la fenêtre Propriétés, cliquez sur Appliquer, puis sur OK. Configuration de CMC avec le schéma étendu d'Active Directory et l'interface Web Pour configurer CMC avec le schéma étendu d'Active Directory et l'interface Web : 1 Ouvrez une session sur l'interface Web de CMC. 2 Sélectionnez Châssis dans l'arborescence. 3 Cliquez sur Authentification utilisateurs→ Services d'annuaire. La page Services d'annuaire s'affiche. 4 Sélectionnez Microsoft Active Directory (Schéma étendu). 5 Dans la section Paramètres communs : a Assurez-vous d'avoir coché la case Active Directory activé. b Entrez le nom de domaine racine.Utilisation du service d'annuaire CMC 309 REMARQUE : le nom de domaine racine doit être un nom de domaine valide qui respecte la convention d'attribution des noms x.y, où x est une chaîne ASCII de 1 à 256 caractères sans espace, et où y est un type de domaine valide tel que com, edu, gov, int, mil, net ou org. c Entrez le Délai d'attente en secondes. Plage de configuration : 15 à 300 secondes. Par défaut : 90 secondes 6 Facultatif : si vous voulez que l'appel dirigé recherche le contrôleur de domaine et le catalogue global, cochez la case Chercher le serveur AD à rechercher (facultatif), puis : a Dans le champ de texte Contrôleur de domaine, entrez le nom du serveur sur lequel est installé le service Active Directory. b Dans le champ de texte Catalogue global, entrez l'emplacement du catalogue global sur le contrôleur de domaine d'Active Directory. Le catalogue global fournit une ressource pour rechercher une forêt Active Directory. REMARQUE : la définition de l'adresse IP 0.0.0.0 désactive la recherche d'un serveur par CMC. REMARQUE : vous pouvez spécifier une liste de serveurs de contrôleur de domaine ou de catalogue global séparés par des virgules. CMC vous permet de spécifier jusqu'à trois adresses IP ou noms d'hôte. REMARQUE : les serveurs de contrôleur de domaine ou de catalogue global qui ne sont pas correctement configurés pour tous les domaines et applications peuvent produire des résultats inattendus au cours du fonctionnement des applications/domaines existants. 7 Dans la section Paramètres du schéma étendu : a Entrez le nom du dispositif CMC. Le nom CMC identifie de manière unique la carte CMC dans Active Directory. Le nom CMC doit être identique au nom de domaine du nouvel objet CMC que vous avez créé dans votre contrôleur de domaine. Le nom CMC doit être une chaîne ASCII de 1 à 256 caractères sans espace. b Entrez le nom de domaine CMC (exemple : cmc.com). Le nom de domaine CMC est le nom DNS (chaîne) du domaine sur lequel réside l'objet CMC d'Active Directory. Le nom doit être un nom de domaine valide sous la forme x.y, où x est une chaîne ASCII de 1 à 256 caractères sans espace entre les caractères, et où y est un type de domaine valide comme com, edu, gov, int, mil, net ou org.310 Utilisation du service d'annuaire CMC 8 Cliquez sur Appliquer pour enregistrer vos paramètres. REMARQUE : vous devez appliquer vos paramètres avant de passer à l'étape suivante, au cours de laquelle vous allez accéder à une autre page. Si vous n'appliquez pas les paramètres, vous perdrez les paramètres que vous avez saisis lorsque vous naviguerez vers la page suivante. 9 Dans la section Gérer les certificats, entrez le chemin du fichier du certificat dans le champ de texte, ou cliquez sur Parcourir pour sélectionner le fichier de certificat. Cliquez sur le bouton Téléverser pour transférer le fichier vers CMC. REMARQUE : la valeur Chemin du fichier affiche le chemin de fichier relatif du certificat que vous téléversez. Vous devez taper le chemin de fichier absolu, y compris le chemin et le nom de fichier complets et l'extension du fichier. La validation du certificat SSL est requise par défaut. Il y a un nouveau paramètre dans le groupe RACADM cfgActiveDirectory et dans l'interface graphique pour désactiver la vérification du certificat. PRÉCAUTION : la désactivation de ce certificat est dangereuse. Pour activer la validation du certificat SSL (par défaut) : racadm config -g cfgActiveDirectory -o cfgADCertValidationEnable 1 Pour désactiver la validation du certificat SSL : racadm config -g cfgActiveDirectory -o cfgADCertValidationEnable 0 Les certificats SSL du contrôleur de domaine doivent être signés par l'autorité de certification racine. Le certificat signé par l'autorité de certification racine doit être disponible sur la station de gestion accédant à CMC. 10 Cliquez sur Appliquer. Le serveur Web CMC redémarre automatiquement lorsque vous cliquez sur Appliquer. 11 Ouvrez à nouveau une session dans l'interface Web CMC. 12 Sélectionnez Châssis dans l'arborescence du système, cliquez sur l'onglet Réseau, puis cliquez sur le sous-onglet Réseau. La page Configuration réseau s'affiche.Utilisation du service d'annuaire CMC 311 13 Si Utiliser DHCP pour l'adresse IP de l'interface réseau CMC est activé, effectuez l'une des opérations suivantes : • Sélectionnez Utiliser DHCP pour obtenir des adresses de serveur DNS pour que le serveur DHCP puisse obtenir automatiquement les adresses du serveur DNS. • Configurez manuellement une adresse IP de serveur DNS en laissant la case Utiliser DHCP pour obtenir des adresses de serveur DNS décochée puis en tapant vos adresses IP de serveur DNS principal et d'autre serveur DNS dans les champs fournis à cet effet. 14 Cliquez sur Appliquer les modifications. La configuration de la fonctionnalité Active Directory CMC avec schéma étendu est terminée. Configuration de CMC avec le schéma étendu d'Active Directory et RACADM Utilisez les commandes suivantes pour configurer la fonctionnalité Active Directory CMC avec le schéma étendu via l'outil d'interface de ligne de commande RACADM plutôt que via l'interface Web. 1 Ouvrez une console texte série/Telnet/SSH d'accès à CMC et entrez : racadm config -g cfgActiveDirectory -o cfgADEnable 1 racadm config -g cfgActiveDirectory -o cfgADType 1 racadm config -g cfgActiveDirectory -o cfgADRacDomain racadm config -g cfgActiveDirectory -o cfgADRootDomain racadm config -g cfgActiveDirectory -o cfgADRacName racadm sslcertupload -t 0x2 -f -r racadm sslcertdownload -t 0x1 -f REMARQUE : vous pouvez utiliser cette commande via la RACADM distante uniquement. Pour plus d'informations sur la RACADM distante, voir « Accès à distance à RACADM », à la page 81.312 Utilisation du service d'annuaire CMC Facultatif : si vous voulez spécifier un serveur LDAP ou de catalogue global au lieu d'utiliser les serveurs renvoyés par le serveur DNS pour rechercher un nom d'utilisateur, entrez la commande suivante pour activer l'option Spécifier un serveur : racadm config -g cfgActiveDirectory -o cfgADSpecifyServerEnable 1 REMARQUE : lorsque vous utilisez l'option Spécifier un serveur, le nom d'hôte figurant dans le certificat signé par l'autorité de certification ne correspond pas au nom du serveur spécifié. Ceci est particulièrement utile si vous êtes un administrateur CMC car cela vous permet de saisir un nom d'hôte et une adresse IP. Après avoir activé l'option Spécifier un serveur, vous pouvez spécifier un serveur LDAP et un catalogue global avec les adresses IP ou les noms de domaine complets (FQDN) des serveurs. Les FQDN se composent des noms d'hôte et des noms de domaine des serveurs. Pour spécifier un serveur LDAP, entrez : racadm config -g cfgActiveDirectory -o cfgADDomainController Pour spécifier un serveur de catalogue global, entrez : racadm config -g cfgActiveDirectory -o cfgADGlobalCatalog REMARQUE : la définition de l'adresse IP 0.0.0.0 désactive la recherche d'un serveur par CMC. REMARQUE : vous pouvez spécifier une liste de serveurs LDAP ou de catalogue global séparés par des virgules. CMC vous permet de spécifier jusqu'à trois adresses IP ou noms d'hôte. REMARQUE : les LDAP qui ne sont pas correctement configurés pour tous les domaines et applications peuvent produire des résultats inattendus au cours du fonctionnement des applications/domaines existants. 2 Spécifiez un serveur DNS à l'aide de l'une des options suivantes : • Si DHCP est activé sur CMC et que vous voulez utiliser l'adresse DNS obtenue automatiquement par le serveur DHCP, entrez la commande suivante : racadm config -g cfgLanNetworking -o cfgDNSServersFromDHCP 1Utilisation du service d'annuaire CMC 313 • Si le protocole DHCP est désactivé sur CMC ou s'il est activé mais que vous voulez spécifier manuellement l'adresse IP DNS, entrez les commandes suivantes : racadm config -g cfgLanNetworking -o cfgDNSServersFromDHCP 0 racadm config -g cfgLanNetworking -o cfgDNSServer1 racadm config -g cfgLanNetworking -o cfgDNSServer2 La configuration de la fonctionnalité de schéma étendu est terminée. Questions les plus fréquentes Tableau 8-9. Utilisation de CMC avec Active Directory : questions les plus fréquentes Question Réponse Puis-je ouvrir une session sur CMC en utilisant Active Directory sur plusieurs arborescences ? Oui. L'algorithme de requête Active Directory de CMC prend en charge plusieurs arborescences d'une seule forêt. L'ouverture d'une session sur CMC avec Active Directory est-elle possible en mode mixte (c'est-à-dire, avec les contrôleurs de domaine de la forêt s'exécutant sur des systèmes d'exploitation différents, comme Microsoft Windows 2000 ou Windows Server 2003) ? Oui. En mode mixte, tous les objets utilisés par la procédure de requête CMC (notamment, l'utilisateur, l'objet Périphérique RAC et l'objet Association) doivent figurer dans le même domaine. Le snap-in Utilisateurs et ordinateurs Active Directory étendu par Dell vérifie le mode et limite les utilisateurs pour créer des objets à travers les domaines en mode mixte. L'utilisation de CMC avec Active Directory permet-elle de prendre en charge plusieurs environnements de domaine ? Oui. Le niveau de la fonction de forêt de domaine doit être en mode natif ou Windows 2003. En outre, les groupes parmi l'objet Association, les objets Utilisateur RAC et les objets Périphérique RAC (y compris l'objet Association) doivent être des groupes universels.314 Utilisation du service d'annuaire CMC Ces objets étendus par Dell (objets Association Dell, Périphérique RAC Dell et Privilège Dell) peuvent-ils appartenir à différents domaines ? L'objet Association et l'objet Privilège doivent appartenir au même domaine. Le snap-in Utilisateurs et ordinateurs Active Directory étendu par Dell vous force à créer ces deux objets dans le même domaine. D'autres objets peuvent appartenir à différents domaines. Y a-t-il des restrictions concernant la configuration SSL du contrôleur de domaine ? Oui. Tous les certificats SSL pour les serveurs Active Directory de la forêt doivent être signés par le même certificat signé par l'autorité de certification racine car CMC vous permet uniquement de téléverser un seul certificat SSL signé par une autorité de certification de confiance. J'ai créé un nouveau certificat de RAC et je l'ai téléversé ; depuis, l'interface Web ne se lance pas. Si vous avez utilisé les services de certificats Microsoft pour générer le certificat RAC, vous avez peut-être choisi Certificat d'utilisateur par inadvertance au lieu de Certificat Web lorsque vous avez créé le certificat. Pour récupérer, générez une RSC, puis créez un nouveau certificat Web avec les services de certificats Microsoft et téléversez-le avec les commandes RACADM suivantes : racadm sslcsrgen [-g] [-f {filename}] racadm sslcertupload -t 1 -f {web_sslcert} Tableau 8-9. Utilisation de CMC avec Active Directory : questions les plus fréquentes (suite) Question RéponseUtilisation du service d'annuaire CMC 315 Que puis-je faire si je n'arrive pas à ouvrir une session sur CMC avec l'authentification Active Directory ? Comment puis -je résoudre ce problème ? 1 Assurez-vous que vous utilisez le nom de domaine utilisateur correct pendant l'ouverture de session, et non le nom NetBIOS. 2 Si vous avez un compte utilisateur CMC local, ouvrez une session CMC à l'aide de vos références locales. Une fois la session ouverte, effectuez les étapes suivantes : a Vérifiez que vous avez coché la case Activer Active Directory sur la page de configuration d'Active Directory de CMC. b Vérifiez que le paramètre DNS est correct sur la page de configuration du réseau CMC. c Vérifiez que vous avez téléversé le certificat Active Directory sur CMC à partir du certificat signé par l'autorité de certification racine d'Active Directory. d Vérifiez les certificats SSL des contrôleurs de domaine pour vous assurer qu'ils n'ont pas expiré. e Vérifiez que le nom CMC, le nom de domaine racine et le nom de domaine CMC correspondent à la configuration de votre environnement Active Directory. f Assurez-vous que le mot de passe CMC contient 127 caractères au maximum. Tandis que CMC peut prendre en charge des mots de passe comportant jusqu'à 256 caractères, Active Directory prend uniquement en charge les mots de passe d'un maximum de 127 caractères. Tableau 8-9. Utilisation de CMC avec Active Directory : questions les plus fréquentes (suite) Question Réponse316 Utilisation du service d'annuaire CMC Configuration de la connexion directe Microsoft Windows 2000, Windows XP, Windows Server 2003, Windows Vista, Windows 7 et Windows Server 2008 peuvent utiliser Kerberos, un protocole d'authentification réseau, comme méthode d'authentification permettant aux utilisateurs qui se sont connectés au domaine de se connecter automatiquement ou directement à des applications ultérieures telles qu'Exchange. Dès la version 2.10, CMC peut utiliser Kerberos pour prendre en charge deux types supplémentaires de mécanismes d'ouverture de session : la connexion directe et l'ouverture de session par carte à puce. Pour l'ouverture de session par connexion directe, CMC utilise les informations d'identification du système client, qui sont mises en mémoire cache par le système d'exploitation lorsque vous ouvrez une session avec un compte Active Directory valide. REMARQUE : la sélection d'une méthode d'ouverture de session ne définit pas les attributs de règles par rapport à d'autres interfaces d'ouverture de session, par exemple SSH. Vous devez également définir d'autres attributs de règles pour les autres interfaces d'ouverture de session. Si vous souhaitez désactiver toutes les autres interfaces d'ouverture de session, naviguez vers la page Services et désactivez toutes (ou certaines) interfaces d'ouverture de session. Configuration système requise Pour utiliser l'authentification Kerberos, votre réseau doit inclure les éléments suivants : • Serveur DNS • Microsoft Active Directory Server REMARQUE : si vous utilisez Active Directory sous Windows 2003, assurezvous que les derniers service pack et les derniers correctifs sont bien installés sur le système client. Si vous utilisez Active Directory sous Windows 2008, vérifiez que vous avez bien installé SP1 avec les correctifs suivants : Windows6.0-KB951191-x86.msu pour l'utilitaire KTPASS. Sans ce correctif, l'utilitaire génère des fichiers keytab erronés. Windows6.0-KB957072-x86.msu pour utiliser les transactions GSS_API et SSL pendant une liaison LDAP. • Centre de distribution de clés Kerberos (fourni avec le logiciel du serveur Active Directory Server) • Serveur DHCP (recommandé) • La zone inverse du serveur DNS doit comporter une entrée pour le serveur Active Directory et pour CMCUtilisation du service d'annuaire CMC 317 Systèmes clients • Pour l'ouverture de session par carte à puce uniquement, Microsoft Visual C++ 2005 redistribuable doit être installé sur le système client. Pour plus d'informations, voir www.microsoft.com/downloads/details.aspx?FamilyID= 32BC1BEEA3F9-4C13-9C99-220B62A191EE&displaylang=en • Pour la connexion directe et l'ouverture de session par carte à puce, le système client doit faire partie du domaine Active Directory et du royaume Kerberos. CMC • CMC doit comporter la version 2.10 du micrologiciel ou une version ultérieure • Chaque contrôleur CMC doit posséder un compte Active Directory • CMC doit faire partie du domaine Active Directory et du royaume Kerberos Configuration des paramètres Configuration requise • Le royaume Kerberos et le centre de distribution de clés (KDC) pour Active Directory (AD) ont été configurés (ksetup). • Une infrastructure NTP et DNS robuste pour éviter des problèmes relatifs à la dérive d'horloge et à la recherche inverse. • Le groupe de rôles CMC avec schéma standard avec membres autorisés. Configuration d'Active Directory Dans la boîte de dialogue Propriétés CMC sous la section des options Comptes, configurez les paramètres suivants : • Le compte est fiable pour la délégation : actuellement, CMC n'utilise pas les informations d'identification transférées qui sont créées lorsque cette option est sélectionnée. Vous pouvez ou non sélectionner cette option selon les besoins des autres services. • Le compte est sensible et ne peut pas être délégué : vous pouvez ou non sélectionner cette option selon les besoins des autres services.318 Utilisation du service d'annuaire CMC • Types de cryptage DES de l'utilisateur Kerberos pour le compte : sélectionnez cette option. • Ne pas demander la pré-authentification Kerberos : ne sélectionnez pas cette option. Exécuter l'utilitaire ktpass (partie de Microsoft Windows) sur le contrôleur de domaine (serveur Active Directory) sur lequel vous souhaitez mapper CMC à un compte utilisateur dans Active Directory. Par exemple, C:\>ktpass -princ HTTP/cmcname.domain_name.com@REALM_NAME.COM -mapuser dracname -crypto DES-CBC-MD5 -ptype KRB5_NT_PRINCIPAL -pass * -out c:\krbkeytab REMARQUE : cmcname.domainname.com doit être en minuscules comme requis par RFC et le nom du ROYAUME (@REALM_NAME) doit être en majuscules. CMC prend en outre en charge le type de cryptographie DES-CBC-MD5 pour l'authentification Kerberos. Cette procédure génère un fichier keytab que vous devez téléverser sur CMC. REMARQUE : le fichier keytab contient une clé de cryptage et doit être conservé en lieu sûr. Pour plus d'informations sur l'utilitaire ktpass, consultez le site Web de Microsoft à l'adresse : technet2.microsoft.com/windowsserver/en/library/64042138-9a5a-4981-84e9- d576a8db0d051033.mspx?mfr=true. Configuration de CMC REMARQUE : les étapes de configuration décrites dans cette section s'appliquent uniquement à l'accès Web CMC. Configurez CMC pour qu'il utilise le(s) groupe(s) de rôles avec schéma standard configuré(s) dans Active Directory. Pour plus d'informations, voir « Configuration du schéma standard d'Active Directory pour accéder à CMC », à la page 288. Téléversement du fichier keytab Kerberos Le fichier keytab Kerberos sert d'informations d'authentification de nom d'utilisateur et de mot de passe CMC auprès du centre de données Kerberos (KDC), qui à son tour autorise l'accès à Active Directory. Chaque contrôleur CMC du royaume Kerberos doit être enregistré auprès d'Active Directory et doit comporter un fichier keytab unique. Utilisation du service d'annuaire CMC 319 Pour téléverser le fichier keytab : 1 Accédez à l'onglet Authentification utilisateur→ sous-onglet Services d'annuaire. Vérifiez que Microsoft Active Directory Schéma standard ou étendu est sélectionné. Si ce n'est pas le cas, sélectionnez votre préférence et cliquez sur Appliquer. 2 Cliquez sur Parcourir dans la section Téléversement du fichier keytab Kerberos, naviguez vers le dossier dans lequel vous avez enregistré le fichier keytab, puis cliquez sur Téléverser. Lorsque le téléversement est terminé, une zone de message apparaît, indiquant la réussite ou l'échec du téléversement. Activation de la connexion directe 1 Cliquez sur l'onglet Sécurité réseau de Chassis Management Controller→ Active Directory→ Configurer Active Directory. La page Configuration et gestion d'Active Directory s'affiche. 2 Sur la page Configuration et gestion d'Active Directory, sélectionnez : • Connexion directe : cette option vous permet d'ouvrir une session sur CMC à l'aide des informations d'identification mises en mémoire cache obtenues lorsque vous ouvrez une session sur Active Directory. REMARQUE : toutes les interfaces hors bande de la ligne de commande, y compris Secure Shell (SSH), Telnet, série et RACADM à distance, restent inchangées pour cette option 3 Effectuez un défilement vers le bas de la page et cliquez sur Appliquer. Vous pouvez tester Active Directory avec l'authentification Kerberos à l'aide de la fonctionnalité de test des commandes de l'interface de ligne de commande. testfeature -f adkrb -u @ où utilisateur correspond à un compte d'utilisateur Active Directory valide. La réussite d'une commande indique que CMC est en mesure d'acquérir des références Kerberos et d'accéder au compte Active Directory de l'utilisateur. En cas d'échec de la commande, résolvez l'erreur et répétez la commande. Pour des informations supplémentaires, consultez le Guide de référence de la ligne de commande RACADM pour iDRAC6 et CMC à l'adresse support.dell.com/manuals.320 Utilisation du service d'annuaire CMC Configuration du navigateur pour l'ouverture de session par connexion directe La connexion directe est prise en charge par les versions 6.0 et ultérieures d'Internet Explorer et par les versions 3.0 et ultérieures de Firefox. REMARQUE : les instructions suivantes s'appliquent uniquement si CMC utilise la connexion directe avec l'authentification Kerberos. Internet Explorer Pour configurer Internet Explorer pour la connexion directe : 1 Dans Internet Explorer, sélectionnez Outils→ Options Internet. 2 Dans l'onglet Sécurité, sous Cliquez sur une zone pour afficher ou modifier les paramètres de sécurité, sélectionnez Intranet local. 3 Cliquez sur Sites. La boîte de dialogue Intranet local s'affiche. 4 Cliquez sur Advanced (Avancé). La boîte de dialogue Paramètres avancés Intranet local s'affiche. 5 Dans Ajouter ce site Web à la zone, saisissez le nom de CMC et le domaine auquel il appartient, puis cliquez sur Ajouter. REMARQUE : vous pouvez utiliser un caractère générique (*) pour spécifier tous les périphériques/utilisateurs de ce domaine. Mozilla Firefox 1 Dans Firefox, saisissez about:config dans la barre d'adresses. REMARQUE : si le navigateur affiche l'avertissement Ceci risque d'annuler votre garantie, cliquez sur Je ferai attention, promis. 2 Dans la zone de texte Filtre, entrez negotiate. Le navigateur affiche une liste des noms des préférences qui contiennent le terme negotiate uniquement. 3 Dans la liste, double-cliquez sur network.negotiate-auth.trusted-uris. 4 Dans la boîte de dialogue Saisir une valeur de chaîne, saisissez le nom de domaine CMC et cliquez sur OK.Utilisation du service d'annuaire CMC 321 Ouverture d'une session sur CMC avec la connexion directe REMARQUE : vous ne pouvez pas utiliser l'adresse IP pour ouvrir une session avec la connexion directe ou par carte à puce. Kerberos valide vos informations d'identification par rapport au nom de domaine pleinement qualifié (FQDN). Pour ouvrir une session dans CMC à l'aide de la connexion directe : 1 Ouvrez une session sur le système client avec votre compte réseau. 2 Accédez à la page Web de CMC via https:// Par exemple, cmc-6G2WXF1.cmcad.lab où cmc-6G2WXF1 correspond à nom_cmc cmcad.lab à nom-domaine. REMARQUE : si vous avez changé le numéro de port HTTPS par défaut (port 80), accédez à la page Web CMC via :, où nomcmc correspond au nom d'hôte CMC de CMC, nom-domaine au nom du domaine et numéro de port au numéro de port HTTPS. La page Connexion directe CMC s'affiche. 3 Cliquez sur Login (Connecter). CMC vous ouvre une session à l'aide des informations d'identification Kerberos qui ont été mises en mémoire cache par votre navigateur lorsque vous avez ouvert une session avec votre compte Active Directory valide. En cas d'échec de l'ouverture de session, le navigateur est redirigé vers la page d'ouverture de session CMC normale. REMARQUE : si vous n'avez pas ouvert de session sur le domaine Active Directory et que vous utilisez un navigateur autre qu'Internet Explorer, l'ouverture de session échoue et le navigateur affiche uniquement une page vide. 322 Utilisation du service d'annuaire CMC Configuration de l'authentification bifactorielle par carte à puce Les schémas d'authentification standard utilisent le nom d'utilisateur et le mot de passe pour authentifier les utilisateurs. Pour sa part, l'authentification bifactorielle offre un niveau de sécurité supérieur en demandant aux utilisateurs d'avoir un mot de passe ou un code PIN et une carte physique comprenant une clé privée ou un certificat numérique. Kerberos, un protocole d'authentification réseau, utilise ce mécanisme d'authentification bifactorielle qui permet aux systèmes de prouver leur authenticité. Microsoft Windows 2000, Windows XP, Windows Server 2003, Windows Vista et Windows Server 2008 utilisent Kerberos comme méthode d'authentification préférée. Dès la version 2.10, CMC peut utiliser Kerberos pour prendre en charge l'ouverture de session par carte à puce. REMARQUE : la sélection d'une méthode d'ouverture de session ne définit pas les attributs de règles par rapport à d'autres interfaces d'ouverture de session, par exemple SSH. Vous devez également définir d'autres attributs de règles pour les autres interfaces d'ouverture de session. Si vous souhaitez désactiver toutes les autres interfaces d'ouverture de session, naviguez vers la page Services et désactivez toutes (ou certaines) interfaces d'ouverture de session. Configuration système requise Les « Configuration système requise », à la page 316 pour la carte à puce sont les mêmes que pour la connexion directe. Configuration des paramètres Les « Configuration requise », à la page 317 pour la carte à puce sont les mêmes que pour la connexion directe. Configuration d'Active Directory Pour configurer Active Directory : 1 Configurez le royaume Kerberos et le centre de distribution de clés (KDC) pour Active Directory, s'ils ne sont pas déjà configurés (ksetup). REMARQUE : mettez en place une infrastructure NTP et DNS robuste pour éviter des problèmes relatifs à la dérive d'horloge et à la recherche inverse.Utilisation du service d'annuaire CMC 323 2 Créez des utilisateurs Active Directory pour chaque contrôleur CMC, configurés pour utiliser le cryptage DES Kerberos, mais non la préauthentification. 3 Enregistrez les utilisateurs CMC auprès du centre de distribution de clés avec Ktpass (ceci génère également une clé pour le téléversement sur CMC). Configuration de CMC REMARQUE : les étapes de configuration décrites dans cette section s'appliquent uniquement à l'accès Web CMC. Configurez CMC pour qu'il utilise le(s) groupe(s) de rôles avec schéma standard configuré(s) dans Active Directory. Pour plus d'informations, voir « Configuration du schéma standard d'Active Directory pour accéder à CMC », à la page 288. Téléversement du fichier keytab Kerberos Le fichier keytab Kerberos sert d'informations d'authentification de nom d'utilisateur et de mot de passe CMC auprès du centre de données Kerberos (KDC), qui à son tour autorise l'accès à Active Directory. Chaque contrôleur CMC du royaume Kerberos doit être enregistré auprès d'Active Directory et doit comporter un fichier keytab unique. Pour téléverser le fichier keytab : 1 Accédez à l'onglet Authentification utilisateur→ sous-onglet Services d'annuaire. Vérifiez que Microsoft Active Directory Schéma standard ou étendu est sélectionné. Si ce n'est pas le cas, sélectionnez votre préférence et cliquez sur Appliquer. 2 Cliquez sur Parcourir dans la section Téléversement du fichier keytab Kerberos, naviguez vers le dossier dans lequel vous avez enregistré le fichier keytab, puis cliquez sur Téléverser Lorsque le téléversement est terminé, une zone de message apparaît, indiquant la réussite ou l'échec du téléversement.324 Utilisation du service d'annuaire CMC Activation de l'authentification par carte à puce Pour activer l'authentification par carte à puce : 1 Accédez à l'onglet Authentification utilisateur→ sous-onglet Services d'annuaire. Vérifiez que Microsoft Active Directory Schéma standard ou étendu est sélectionné. 2 Dans la section Paramètres courants : • Carte à puce : cette option exige l'insertion d'une carte à puce dans le lecteur et la saisie du code PIN. REMARQUE : toutes les interfaces hors bande de la ligne de commande, y compris Secure Shell (SSH), Telnet, série et RACADM à distance, restent inchangées pour cette option 3 Effectuez un défilement vers le bas de la page et cliquez sur Appliquer. Vous pouvez tester Active Directory avec l'authentification Kerberos en utilisant la fonctionnalité de test des commandes de l'interface de ligne de commande. Entrez : testfeature -f adkrb -u @ où utilisateur correspond à un compte d'utilisateur Active Directory valide. La réussite d'une commande indique que CMC est en mesure d'acquérir des références Kerberos et d'accéder au compte Active Directory de l'utilisateur. En cas d'échec de la commande, résolvez l'erreur et répétez la commande. Pour plus d'informations, consultez la documentation de la commande RACADM testfeature. Configuration du navigateur pour l'ouverture de session par carte à puce Mozilla Firefox CMC 2.10 ne prend pas en charge l'ouverture de session par carte à puce via le navigateur Firefox. Internet Explorer Assurez-vous que le navigateur Internet est bien configuré pour télécharger des plug-in Active-X.Utilisation du service d'annuaire CMC 325 Ouverture de session sur CMC avec la carte à puce REMARQUE : vous ne pouvez pas utiliser l'adresse IP pour ouvrir une session avec la connexion directe ou par carte à puce. Kerberos valide vos informations d'identification par rapport au nom de domaine pleinement qualifié (FQDN). Pour ouvrir une session dans CMC à l'aide d'une carte à puce : 1 Ouvrez une session sur le système client avec votre compte réseau. 2 Accédez à la page Web de CMC via https:// Par exemple, cmc-6G2WXF1.cmcad.lab où cmc-6G2WXF1 correspond à nom_cmc cmcad.lab à nom-domaine. REMARQUE : si vous avez changé le numéro de port HTTPS par défaut (port 80), accédez à la page Web CMC via :, où nomcmc correspond au nom d'hôte CMC de CMC, nom-domaine au nom du domaine et numéro de port au numéro de port HTTPS. La page Connexion directe CMC apparaît et vous invite à insérer la carte à puce. 3 Insérez la carte à puce dans le lecteur et cliquez sur OK. La boîte de dialogue contextuelle Code PIN s'affiche. 4 Facultativement, sélectionnez un délai de session. Il s'agit de la durée pendant laquelle vous restez connecté sans activité. La valeur par défaut est définie comme le délai d'inactivité du service Web. Voir Configuration des services pour plus de détails. 5 Saisissez le code PIN, puis cliquez sur OK. Résolution des problèmes liés à l'ouverture de session par carte à puce Les astuces suivantes vous permettent de déboguer une carte à puce inaccessible : Le plug-in ActiveX est incapable de détecter le lecteur de cartes à puce Vérifiez que la carte à puce est bien prise en charge sur le système d'exploitation Microsoft Windows. Windows prend en charge un nombre limité de fournisseurs de services cryptographiques (CSP) de cartes à puce.326 Utilisation du service d'annuaire CMC En règle générale, pour vérifier si les CSP de carte à puce sont présents sur un client donné, insérez la carte à puce dans le lecteur lorsque l'écran d'ouverture de session de Windows apparaît (Ctrl-Alt-Suppr) et vérifiez si Windows détecte bien la carte à puce et affiche la boîte de dialogue Code PIN. Code PIN de la carte à puce incorrect Vérifiez si la carte à puce a été bloquée suite à un nombre trop élevé de tentatives avec un code PIN incorrect. Dans ces cas, l'émetteur de la carte à puce dans l'organisation peut vous aider à obtenir une nouvelle carte à puce. Impossible d'ouvrir une session sur CMC en tant qu'utilisateur Active Directory Si vous ne parvenez pas à ouvrir une session sur CMC en tant qu'utilisateur Active Directory, essayez d'ouvrir une session sur CMC sans activer l'ouverture de session par carte à puce. Vous avez également la possibilité de désactiver l'ouverture de session par carte à puce via la RACADM locale à l'aide des commandes suivantes : racadm config -g cfgActiveDirectory -o cfgADSCLEnable 0 racadm config -g cfgActiveDirectory -o cfgADSSOEnable 0 Utilisation de CMC avec un LDAP générique Un administrateur CMC peut désormais intégrer les connexions utilisateur du serveur LDAP au MCC. Cette intégration nécessite une configuration à la fois sur le serveur LDAP et CMC. Sur le serveur LDAP, un objet Groupe standard est utilisé comme groupe de rôles. Un utilisateur ayant accès à CMC sera membre du groupe de rôles. Les privilèges sont toujours stockés sur CMC pour autorisation pareil à la configuration du schéma standard avec la prise en charge d'Active Directory. Pour permettre à l'utilisateur LDAP d'accéder à une carte CMC spécifique, le nom du groupe de rôles et son nom de domaine doivent être configurés sur la carte CMC spécifique. Vous pouvez configurer un maximum de cinq groupes de rôles dans chaque contrôleur CMC. La Figure 5-43 présente le niveau de privilège des groupes de rôles et la Figure 8-1 illustre les paramètres par défaut des groupes de rôles. La Figure 8-5 illustre la configuration de CMC avec un LDAP générique.Utilisation du service d'annuaire CMC 327 Figure 8-5. Configuration de CMC avec un LDAP générique Configuration de l'annuaire LDAP générique pour accéder à CMC La mise en œuvre du LDAP générique de CMC fait appel à deux phases pour donner l'accès à un utilisateur. La phase 1 commence par l'authentification des utilisateurs, suivie de la phase 2 pour l'autorisation de l'utilisateur. Authentification et autorisation des utilisateurs LDAP Certains serveurs d'annuaire exigent une liaison avant les recherches sur un serveur LDAP spécifique. Voici les étapes de l'authentification : 1 Effectuez éventuellement la liaison au service d'annuaire. Par défaut, la liaison est anonyme. 2 Recherchez l'utilisateur en fonction de son nom d'utilisateur. L'attribut par défaut est uid. 3 Si plusieurs objets sont trouvés, le processus renvoie une erreur. 4 Annulez la liaison et effectuez une liaison avec le DN et le mot de passe de l'utilisateur. 5 En cas d'échec de la liaison, la connexion échoue également. Rôle Groupe Rôle Nom du groupe et nom du domaine Rôle Définition Utilisateur Configuration du côté LDAP générique Configuration du CMC328 Utilisation du service d'annuaire CMC Si ces étapes réussissent, l'utilisateur est considéré comme authentifié. La phase suivante concerne l'autorisation. CMC stocke un maximum de 5 groupes et leurs privilèges correspondants. Un utilisateur a la possibilité d'être ajouté à plusieurs groupes au sein du service d'annuaire. Si l'utilisateur est membre de plusieurs groupes, il obtient les privilèges de tous ses groupes. Voici les étapes de l'autorisation : 1 Recherchez dans chaque groupe configuré le DN de l'utilisateur dans les attributs member ou uniqueMember. Ce champ peut être configuré par l'administrateur. 2 Pour chaque groupe dont l'utilisateur est membre, ajoutez leurs privilèges. Configuration du service d'annuaire LDAP générique à l'aide de l'interface Web de CMC Vous pouvez utiliser le service LDAP (Lightweight Directory Access Protocol) générique pour configurer votre logiciel afin qu'il fournisse l'accès à CMC. Le service LDAP vous permet d'ajouter et de contrôler les privilèges utilisateur CMC de vos utilisateurs existants. REMARQUE : vous devez disposer du privilège Administrateur de configuration du châssis pour configurer les paramètres Active Directory pour CMC. Pour plus d'informations sur la configuration LDAP et la configuration du LDAP générique, voir « Utilisation de CMC avec un LDAP générique », à la page 326. Pour afficher et configurer LDAP : 1 Connectez-vous à l'interface Web. 2 Cliquez sur l'onglet Authentification utilisateur, puis cliquez sur le sousonglet Services d'annuaire. La page Services d'annuaire s'affiche. 3 Cliquez sur le bouton radio associé au LDAP générique. 4 Configurez les options affichées et cliquez sur Appliquer.Utilisation du service d'annuaire CMC 329 La Figure 8-10 affiche les options disponibles : Tableau 8-10. Paramètres communs Paramètre Description LDAP générique activé Active le service LDAP générique sur CMC. Utilisez le nom unique (DN) pour rechercher l'appartenance au groupe Spécifie le nom unique (DN) de groupes LDAP dont les membres sont autorisés à accéder au périphérique. Activer la validation de certificat SSL Si activé, CMC utilise le certificat d'une autorité de certification pour valider le certificat du serveur LDAP pendant l'établissement de liaisons SSL. Liaison de DN Le nom unique d'un utilisateur utilisé pour établir la liaison au serveur lors de la recherche du nom unique de l'utilisateur d'ouverture de session. S'il n'est pas fourni, une liaison anonyme est utilisée. Password (Mot de passe) Mot de passe de liaison à utiliser conjointement avec le nom unique de liaison. REMARQUE : le mot de passe de liaison contient des données sensibles et doit être protégé de manière appropriée. Nom unique de base à rechercher Nom unique de la branche du répertoire à partir duquel toutes les recherches doivent débuter. Attribut de l'identifiant de l'utilisateur Spécifie l'attribut à rechercher. S'il n'est pas configuré, uid est utilisé par défaut. Il est recommandé qu'il soit unique dans le DN de base choisi, faute de quoi un filtre de recherche doit être configuré pour assurer l'unicité de l'utilisateur d'ouverture de session. Si le DN d'utilisateur ne peut pas être identifié par la recherche de la combinaison de l'attribut et du filtre de recherche, la connexion échoue avec une erreur. Attribut de l'appartenance au groupe Spécifie l'attribut LDAP qui est utilisé pour vérifier l'appartenance au groupe. Il doit s'agir d'un attribut de la classe de groupe. S'il n'est pas spécifié, les attributs member et unique member sont utilisés.330 Utilisation du service d'annuaire CMC Sélection de vos serveurs LDAP Vous pouvez configurer le serveur pour une utilisation avec le LDAP générique de deux façons. Les serveurs statiques permettent à l'administrateur de mettre un nom de domaine pleinement qualifié ou une adresse IP dans le champ. Par ailleurs, une liste de serveurs LDAP peut être récupérée en recherchant leur enregistrement SRV dans le DNS. Les éléments suivants sont les propriétés de la section Serveurs LDAP : • Utiliser les serveurs LDAP statiques : en sélectionnant cette option, le service LDAP utilise les serveurs spécifiés avec le numéro de port fourni (voir les détails ci-dessous). REMARQUE : vous devez sélectionner Statique ou DNS. • Adresse de serveur LDAP : préciser le nom de domaine pleinement qualifié ou l'adresse IP du serveur LDAP. Pour spécifier plusieurs serveurs LDAP redondants qui desservent le même domaine, fournissez la liste de tous les serveurs séparés par des virgules. CMC tente de se connecter à chaque serveur l'un après l'autre jusqu'à ce qu'une connexion soit établie. • Port de serveur LDAP : port de LDAP sur SSL, par défaut 636 s'il n'est pas configuré. Le port non SSL n'est pas pris en charge dans la version 3.0 de CMC puisque le mot de passe ne peut être transporté sans SSL. • Utiliser le DNS pour trouver des serveurs LDAP : en sélectionnant cette option, LDAP utiliser le domaine de la recherche et le nom du service via DNS. Vous devez sélectionner Statique ou DNS. Filtre de recherche Indique un filtre de recherche LDAP valide. Ceci est utilisé si l'attribut d'utilisateur ne parvient pas à identifier de manière unique l'utilisateur d'ouverture de session dans le nom unique de base choisi. S'il n'est pas spécifié, la valeur est définie par défaut sur (objectClass=*), qui recherche tous les objets de l'arborescence. La longueur maximale de cette propriété est de 1 024 caractères. Délai d'attente réseau (secondes) Définit le délai en secondes après lequel une session LDAP inactive est automatiquement fermée. Délai d'attente de recherche (secondes) Définit le délai en secondes après lequel une recherche est automatiquement fermée. Tableau 8-10. Paramètres communs (suite) Paramètre DescriptionUtilisation du service d'annuaire CMC 331 La requête DNS suivante est effectuée pour les enregistrements SRV : _._tcp. est le domaine racine à utiliser dans la requête et est le nom du service à utiliser dans la requête. Par exemple : _ldap._tcp.dell.com où ldap est le nom de service et dell.com est le domaine de recherche. Gestion des paramètres de groupe LDAP Le tableau qui figure dans la section Paramètres du groupe répertorie les groupes de rôles et affiche les noms, domaines et privilèges associés des groupes de rôles qui sont déjà configurés. • Pour configurer un nouveau groupe de rôles, cliquez sur un nom de groupe de rôles qui n'a pas de nom, de domaine et de privilège dans la liste. • Pour modifier les paramètres d'un groupe de rôles existant, cliquez sur le nom de groupe de rôles. Lorsque vous cliquez sur un nom de groupe de rôles, la page Configurer le groupe de rôles s'affiche. L'aide relative à cette page est disponible via le lien Aide en haut à droite de la page. Gestion des certificats de sécurité LDAP Cette section affiche les propriétés du certificat LDAP récemment téléversé sur CMC. Si vous avez téléversé un certificat, utilisez ces informations pour vérifier que le certificat est valide et n'a pas expiré. REMARQUE : par défaut, CMC ne dispose pas d'un certificat de serveur délivré par une autorité de certification pour Active Directory. Vous devez téléverser un certificat de serveur valide, signé par une autorité de certification. Les propriétés suivantes sont affichées pour le certificat : • Numéro de série : numéro de série du certificat. • Informations sur le sujet : sujet du certificat (nom de la personne ou de l'entreprise certifiée). • Informations sur l'émetteur : émetteur du certificat (nom de l'autorité de certification). • Valide à partir de : la date de début du certificat. • Valide jusqu'à : la date d'expiration du certificat.332 Utilisation du service d'annuaire CMC Utilisez les commandes ci-dessous pour téléverser et télécharger ce certificat : • Téléverser : lance le processus de téléversement du certificat. Ce certificat, qui vous est délivré par votre serveur LDAP, permet d'accéder à CMC. • Télécharger : lance le processus de téléchargement. Vous êtes invité à choisir un emplacement où enregistrer le fichier. Lorsque vous sélectionnez cette option et cliquez sur Suivant, la boîte de dialogue Téléchargement de fichier apparaît. Utilisez cette boîte de dialogue pour spécifier l'emplacement réservé au certificat de serveur sur votre station de gestion ou réseau partagé. Configuration du service de répertoire LDAP générique avec la RACADM REMARQUE : cette fonction prend en charge IPv4 et IPv6. Il existe de nombreuses options permettant de configurer les connexions LDAP. Dans la plupart des cas, certaines options peuvent être utilisées avec leurs paramètres par défaut. REMARQUE : il est vivement recommandé d'utiliser la commande 'racadm testfeature -f LDAP' pour tester les paramètres LDAP lors des configurations initiales. Cette fonction prend en charge IPv4 et IPv6. Les modifications des propriétés requises comprennent l'activation des connexions LDAP, la configuration du nom de domaine pleinement qualifié ou de l'adresse IP du serveur, et la configuration du DN de base du serveur LDAP. • $ racadm config -g cfgLDAP -o cfgLDAPEnable 1 • $ racadm config -g cfgLDAP -o cfgLDAPServer 192.168.0.1 • $ racadm config -g cfgLDAP -o cfgLDAPBaseDN dc= company,dc=com CMC peut être configuré pour interroger un serveur DNS à la recherche d'enregistrements SRV. Si la propriété cfgLDAPSRVLookupEnable est activée, la propriété cfgLDAPServer est ignorée. La requête suivante est utilisée pour rechercher des enregistrements SRV dans le DNS : _ldap._tcp.domainname.com ldap dans la requête ci-dessus est la propriété cfgLDAPSRVLookupServiceName. cfgLDAPSRVLookupDomainName est configuré comme nomdedomaine.com.Utilisation du service d'annuaire CMC 333 Utilisation Pour vous connecter à CMC à l'aide d'un utilisateur LDAP, utilisez le nom d'utilisateur à l'invite de connexion et le mot de passe de l'utilisateur à l'invite de mot de passe. Si un utilisateur LDAP ne peut pas être identifié pour une raison quelconque, CMC tente d'utiliser une connexion locale avec les mêmes nom d'utilisateur et mot de passe. Ceci permet une connexion si la connectivité réseau est interrompue ou si le serveur LDAP n'est pas accessible. Obtention d'aide Le journal de suivi de CMC contient des informations expliquant pourquoi un utilisateur ne parvient pas à se connecter. Pour trier les pannes de connexions LDAP, il est recommandé d'utiliser la commande racadm testfeature -f LDAP avec le débogage activé.334 Utilisation du service d'annuaire CMCGestion de l'alimentation 335 Gestion de l'alimentation L'enceinte du serveur Dell PowerEdge M1000e est le serveur modulaire à plus faible consommation énergétique du marché. Elle a été conçue pour inclure des blocs d'alimentation et des ventilateurs haute performance, possède une disposition optimisée afin que l'air circule plus facilement à travers le système et comporte des composants à faible consommation énergétique répartis dans l'enceinte. La conception matérielle optimisée est conjuguée à des capacités de gestion de l'alimentation sophistiquées intégrées dans Chassis Management Controller (CMC), des blocs d'alimentation et iDRAC pour vous permettre d'améliorer davantage la gestion de l'alimentation et d'avoir un contrôle total sur votre environnement d'alimentation. L'enceinte modulaire PowerEdge M1000e est alimentée en courant alternatif et distribue la charge sur toutes les unités d'alimentation internes actives. Le système peut délivrer jusqu'à 16 685 watts d'alimentation alternative allouée aux modules de serveurs et à l'infrastructure d'enceinte associée. Vous pouvez contrôler la gestion de l'alimentation grâce à PM3 (Power Measure, Mitigate, and Manage Console) (console de mesure, d'atténuation et de gestion d'alimentation) Lorsque PM3 contrôle l'alimentation en externe, CMC continue à maintenir : • Règle de redondance • Connexion à l'alimentation à distance • Performance du serveur contre redondance de l'alimentation • Enclenchement dynamique des blocs d'alimentation • Opération 110 VCA PM3 gère alors : • l'alimentation du serveur • La priorité du serveur • Capacité maximale de l'alimentation d'entrée du système • Mode de conservation de puissance maximale Pour plus d'informations, voir « Gestion de l'alimentation externe », à la page 384. REMARQUE : la puissance de sortie réelle est basée sur la configuration et la charge de travail.336 Gestion de l'alimentation Les fonctionnalités de gestion de l'alimentation du châssis M1000e aident les administrateurs à configurer l'enceinte afin de réduire la consommation électrique et à adapter la gestion de l'alimentation à leurs besoins et environnements uniques. L'enceinte PowerEdge M1000e peut être configurée pour n'importe laquelle des trois règles de redondance affectant le comportement des unités d'alimentation et déterminant la manière dont l'état de redondance du châssis est signalé aux administrateurs. Mode de redondance de l'alimentation alternative La règle de redondance de l'alimentation alternative vise à permettre à un système d'enceinte modulaire de fonctionner dans un mode dans lequel il peut tolérer des pannes d'alimentation alternative. Ces pannes peuvent provenir du réseau d'alimentation alternative, du câblage et de la distribution, ou d'une unité d'alimentation elle-même. Lorsque vous configurez un système pour une redondance alternative, les unités d'alimentation sont divisées en réseaux : les unités d'alimentation dans les logements 1, 2 et 3 sont dans le premier réseau tandis que les unités d'alimentation dans les logements 4, 5 et 6 sont dans le deuxième réseau. Le contrôleur CMC gère l'alimentation de sorte qu'en cas de défaillance d'un réseau le système continue à fonctionner sans dégradation. La redondance d'alimentation alternative tolère également les pannes des unités d'alimentation individuelles. REMARQUE : puisque l'un des rôles de la redondance d'alimentation alternative est d'assurer un fonctionnement sans faille du serveur malgré une panne du réseau électrique, la plus grande puissance est utilisée pour maintenir la redondance d'alimentation alternative lorsque les capacités des deux réseaux sont à peu près égales. REMARQUE : la redondance d'alimentation alternative n'est atteinte que lorsque les conditions de charge ne dépassent pas la capacité du réseau ayant la plus faible puissance.Gestion de l'alimentation 337 Niveaux de redondance d'alimentation alternative La configuration minimum est une unité d'alimentation dans chaque réseau pour la redondance d'alimentation alternative. D'autres configurations sont possibles avec toutes les combinaisons qui ont au moins une unité d'alimentation dans chaque réseau. Cependant, pour rendre disponible la puissance maximale, la puissance totale des unités d'alimentation dans chaque colonne doit être aussi égale que possible. La limite maximale de la puissance tout en conservant la redondance d'alimentation alternative est la puissance disponible sur le plus faible des deux réseaux. La Figure 9-1 illustre 2 unités d'alimentation par réseau et une panne électrique sur le réseau 1 Si pour une raison quelconque CMC est incapable de maintenir la redondance d'alimentation alternative, les alertes E-mail et/ou SNMP sont envoyées aux administrateurs si l'événement Redondance perdue est configuré pour les alertes. Figure 9-1. 2 unités d'alimentation par réseau et une panne électrique sur le réseau 1 REMARQUE : en cas de panne d'une seule unité d'alimentation dans cette configuration, les deux unités d'alimentation restantes dans le réseau défaillant sont marquées comme En ligne. L'une des unités d'alimentation restantes peut alors tomber en panne sans interrompre le fonctionnement du système. En cas de panne d'une unité d'alimentation, l'intégrité du châssis est marquée comme Non critique. Si le réseau plus petit ne peut pas prendre en charge la totalité des allocations d'alimentation du châssis, la condition de la redondance d'alimentation alternative est rapportée comme Sans redondance et l'intégrité du châssis est affichée comme Critique. Bloc d'alimentation n° 1 Logement vide n° 3 Logement vide n° 6 Réseau d'alimentation CA 1 Réseau d'alimentation CA 2 Bus d'alimentation CC du châssis Bloc d'alimentation n° 2 Bloc d'alimentation n° 4 Bloc d'alimentation n° 5338 Gestion de l'alimentation Mode de redondance des blocs d'alimentation Le mode de redondance des blocs d'alimentation est utile lorsque des réseaux d'alimentation redondants ne sont pas disponibles, mais que vous souhaitez être protégé en cas de panne d'une seule unité d'alimentation entraînant l'arrêt de vos serveurs dans une enceinte modulaire. L'unité d'alimentation ayant la plus haute capacité est gardée en ligne à cette fin. Ceci forme un pool de redondance des blocs d'alimentation. La Figure 9-2 illustre le mode de redondance des blocs d'alimentation Les unités d'alimentation se trouvant au-delà de celles exigées pour la puissance et la redondance sont encore disponibles et seront ajoutées au pool en cas de défaillance. Contrairement à la redondance d'alimentation alternative, lorsque la redondance du bloc d'alimentation est sélectionnée, CMC n'a pas besoin que les unités d'alimentation soient présentes dans des positions de logement spécifiques. REMARQUE : l'enclenchement dynamique des blocs d'alimentation (DPSE) permet de mettre des unités d'alimentation en veille. L'état de veille indique un état physique où l'alimentation n'est pas fournie. Lorsque vous activez l'enclenchement dynamique des blocs d'alimentation, les unités d'alimentation supplémentaires sont mises en mode Veille pour accroître l'efficacité et économiser de l'énergie. Figure 9-2. Alimentation redondante : 4 blocs d'alimentation au total avec un bloc d'alimentation en panne. Bloc d'alimentation n° 1 Vide Logement n° 5 Bus d'alimentation CC du châssis Réseau d'alimentation simple ou double : La redondance des blocs d'alimentation couvre les défaillances d'un seul bloc d'alimentation. Bloc d'alimentation n° 2 Bloc d'alimentation n° 3 Bloc d'alimentation n° 4 Vide Logement n° 6Gestion de l'alimentation 339 Mode Sans redondance Le mode Sans redondance est le paramètre d'usine de la configuration à 3 unités d'alimentation et indique qu'aucune redondance de l'alimentation n'est configurée pour le châssis. Dans cette configuration, la condition générale de la redondance du châssis indique toujours Sans redondance. La Figure 9-3 illustre que le mode sans redondance est le paramètre d'usine par défaut pour la configuration de 3 unités d'alimentation. CMC n'a pas besoin que les unités d'alimentation soient présentes dans des positions de logement spécifiques lorsque le mode Sans redondance n'est configurée. REMARQUE : toutes les unités d'alimentation dans le châssis sont répertoriées comme étant En ligne si l'enclenchement dynamique des blocs d'alimentation est désactivé en mode Sans redondance. Lorsque l'enclenchement dynamique des blocs d'alimentation est activé, tous les blocs d'alimentation actifs dans le châssis sont répertoriés comme En ligne et les unités d'alimentation supplémentaires peuvent être mises en mode Veille pour augmenter l'efficacité du système. Figure 9-3. Sans redondance avec trois unités d'alimentation dans le châssis Bloc d'alimentation n° 1 Vide Logement n° 4 Vide Logement n° 5 Vide Logement n° 6 Réseau d'alimentation CS 1 Bus d'alimentation CC du châssis Réseau d'alimentation simple : Aucune protection en cas de défaillance du réseau ou d'un bloc d'alimentation Bloc d'alimentation n° 2 Bloc d'alimentation n° 3340 Gestion de l'alimentation Lorsqu'une unité d'alimentation est en panne, les autres unités d'alimentation quittent le mode Veille, selon les besoins, afin de prendre en charge les allocations d'alimentation du châssis. Si vous avez 4 blocs d'alimentation, et n'en avez besoin que de trois, alors dans le cas où l'un des blocs tombe en panne, le quatrième bloc est mis en ligne. Un châssis peut avoir les 6 unités d'alimentation en ligne. Lorsque vous activez l'enclenchement dynamique des blocs d'alimentation, les unités d'alimentation supplémentaires sont mises en mode Veille pour accroître l'efficacité et économiser de l'énergie. Pour plus d'informations, voir « Enclenchement dynamique des blocs d'alimentation », à la page 343. Bilan de puissance pour les modules matériels La Figure 9-4 illustre un châssis contenant une configuration à six unités d'alimentation. Les unités d'alimentation sont numérotées de 1 à 6, en commençant par le côté gauche de l'enceinte. Figure 9-4. Châssis doté de six unités d'alimentation CMC maintient un bilan de puissance de l'enceinte qui réserve la puissance nécessaire pour tous les serveurs et composants installés. Unité d'alimentation1 Unité d'alimentation3 Unité d'alimentation5 Unité d'alimentation2 Unité d'alimentation4 Unité d'alimentation6 Gestion de l'alimentation 341 CMC alloue l'alimentation à l'infrastructure CMC et aux serveurs dans le châssis. L'infrastructure CMC comprend les composants du châssis tels que les ventilateurs, les modules d'E/S et iKVM (si celui-ci est présent). Le châssis peut comporter jusqu'à 16 serveurs qui communiquent avec le châssis par le biais d'iDRAC. Pour plus d'informations, consultez le Guide d'utilisation d'iDRAC à l'adresse support.dell.com/manuals. iDRAC fournit à CMC son enveloppe d'alimentation requise avant d'alimenter le serveur. L'enveloppe d'alimentation comprend les exigences d'alimentation maximale et minimale requises pour le fonctionnement du serveur. L'estimation initiale d'iDRAC est fondée sur sa compréhension initiale des composants du serveur. Après le début de l'exploitation et la découverte des composants supplémentaires, iDRAC peut augmenter ou diminuer ses besoins de puissance initiale. Lorsqu'un serveur est alimenté dans une enceinte, le logiciel iDRAC refait une estimation des besoins en alimentation et demande une modification ultérieure de l'enveloppe d'alimentation. CMC accorde l'alimentation demandée au serveur et la puissance allouée est soustraite du bilan disponible. Une fois la demande d'alimentation du serveur satisfaite, le logiciel iDRAC du serveur surveille en continu la consommation électrique réelle. Selon les besoins d'alimentation réels, l'enveloppe d'alimentation d'iDRAC peut changer au fil du temps. iDRAC demande une augmentation de l'alimentation uniquement si les serveurs consomment la totalité de l'alimentation allouée. Sous forte charge les performances des processeurs du serveur peuvent être dégradées pour s'assurer que la consommation d'énergie reste en dessous de la Limite de la puissance d'entrée système configurée par l'utilisateur. L'enceinte PowerEdge M1000e peut fournir une alimentation suffisante pour obtenir des performances optimales de la plupart des configurations de serveur, mais plusieurs configurations de serveurs disponibles ne consomment pas l'alimentation maximale pouvant être délivrée par l'enceinte. Pour aider les centres de données à alimenter leurs enceintes, le châssis M1000e vous permet de spécifier une limite de la puissance d'entrée système pour garantir le maintien de l'alimentation alternative du châssis sous un seuil donné. CMC assure d'abord que suffisamment de puissance est disponible pour faire fonctionner les ventilateurs, les modules d'E/S, iKVM (le cas échéant) et CMC lui-même. Cette allocation de l'alimentation est appelée Alimentation d'entrée allouée à l'infrastructure du châssis. À la suite de l'infrastructure du châssis, les serveurs dans une enceinte sont mis sous tension. Toute tentative de définition d'une limite de la puissance d'entrée système en dessous de la consommation réelle échouera.342 Gestion de l'alimentation S'il est nécessaire que le bilan d'alimentation total reste inférieur à la valeur de la Limite de la puissance d'entrée du système, CMC alloue aux servers une valeur inférieure à l'alimentation maximale demandée. L'alimentation allouée aux serveurs est fonction de leur paramètre Priorité des serveurs, les serveurs de priorité 1 obtenant une alimentation maximale, les serveurs de priorité 2 étant alimentés après les serveurs de priorité 1, et ainsi de suite. Les serveurs de priorité moindre peuvent être moins alimentés que les serveurs de priorité 1 en fonction de la capacité maximale de l'alimentation d'entrée du système et du paramètre Limite de la puissance d'entrée système configuré par l'utilisateur. Les changements de configuration, tels que l'ajout d'un serveur dans le châssis, peuvent imposer l'augmentation de la limite de la puissance d'entrée système. Les besoins d'alimentation de l'enceinte modulaire augmentent également lorsque les conditions thermiques changent et que les ventilateurs doivent fonctionner à une vitesse plus élevée, entraînant une plus forte consommation électrique. L'insertion de modules d'E/S et iKVM augmente également les besoins d'alimentation de l'enceinte modulaire. Une petite quantité d'énergie est consommée par les serveurs même lorsqu'ils sont mis hors tension afin de maintenir alimenté le contrôleur de gestion. Des serveurs supplémentaires ne peuvent être alimentés au sein de l'enceinte modulaire que si une alimentation suffisante est disponible. La limite de la puissance d'entrée système peut être augmentée à tout moment jusqu'à une valeur maximale de 16 685 watts pour permettre l'alimentation de serveurs supplémentaires. Les changements dans l'enceinte modulaire permettant de réduire l'allocation de puissance sont : • Mise hors tension du serveur • Server (Serveur) • module d'E/S • Suppression du module iKVM • Transition du châssis à un état hors tension Vous pouvez reconfigurer la limite de la puissance d'entrée système lorsque le châssis est sous ou hors tension. REMARQUE : lorsque vous insérez un serveur dont la géométrie n'est pas à hauteur simple, si l'iDRAC ne dispose pas d'une puissance suffisante, le serveur s'affiche en tant que plusieurs serveurs à hauteur simple.Gestion de l'alimentation 343 Paramètres de priorité de l'alimentation des logements du serveur CMC vous permet de définir une priorité d'alimentation pour chacun des seize logements de serveur au sein d'une enceinte. Les paramètres de priorité vont de 1 (la plus haute) à 9 (la plus basse). Ces paramètres sont assignés aux logements du châssis et la priorité du logement sera héritée par tout serveur inséré dans ce logement. CMC utilise la priorité des logements en vue d'alimenter en priorité les serveurs à priorité supérieure de l'enceinte. Selon le paramètre de priorité de logement de serveur par défaut, l'alimentation est répartie de façon égale dans tous les logements. La modification des priorités des logements permet aux administrateurs de décider quels serveurs ont la priorité pour les allocations d'alimentation. Si la priorité des modules serveurs les plus critiques est laissée à la valeur par défaut de 1 et que les modules serveurs les moins critiques sont définis sur une valeur de priorité de 2 ou plus, les modules serveurs de priorité 1 sont alimentés en premier. Ces serveurs à priorité supérieure obtiennent alors leur allocation d'alimentation maximale, tandis que les serveurs à priorité inférieure peuvent ne pas disposer d'une allocation d'alimentation suffisante pour fonctionner à leurs performances maximales, voire ne pas du tout être alimentés, selon la faiblesse de la limite de la puissance d'entrée système définie et les exigences d'alimentation du serveur. Si un administrateur alimente manuellement les modules de serveur à faible priorité avant ceux à priorité plus élevée, les modules de serveur à faible priorité seront les premiers à avoir une allocation de puissance abaissée à la valeur minimale, afin d'accommoder les serveurs à priorité plus élevée. Ainsi, après épuisement de la puissance disponible pour l'allocation, CMC récupère la puissance des serveurs à faible priorité ou priorité égale jusqu'à ce qu'ils soient à leur niveau de puissance minimum. REMARQUE : les modules d'E/S, les ventilateurs et iKVM (s'il est présent) reçoivent la priorité la plus élevée. CMC récupère l'alimentation uniquement pour répondre aux besoins d'alimentation d'un module ou d'un serveur de priorité supérieure. Enclenchement dynamique des blocs d'alimentation Le mode Enclenchement dynamique des blocs d'alimentation (DPSE) est désactivé par défaut. L'enclenchement dynamique des blocs d'alimentation économise l'énergie en optimisant l'efficacité énergétique de la puissance d'alimentation de l'unité d'alimentation au châssis. Cela entraîne également une augmentation de la vie de l'unité d'alimentation et une réduction de la production de chaleur.344 Gestion de l'alimentation CMC surveille l'allocation d'alimentation totale de l'enceinte et met les unités d'alimentation non nécessaires en condition de secours, entraînant la distribution de l'allocation d'alimentation totale du châssis à un nombre moindre d'unités d'alimentation. Les unités d'alimentation connectées sont plus efficaces lorsqu'elles fonctionnent à des niveaux de performance plus élevés. Ainsi cela améliore-t-il leur efficacité tout en améliorant la longévité des unités d'alimentation en veille. Pour faire fonctionner les unités d'alimentation restantes à leur maximum d'efficacité : • Le mode Sans redondance avec enclenchement dynamique des blocs d'alimentation économise beaucoup d'énergie, avec seulement le nombre minimal d'unités d'alimentation en ligne. Les unités d'alimentation non requises sont placées en mode Veille. • Le mode Redondance des unités d'alimentation avec enclenchement dynamique des blocs d'alimentation permet également d'économiser de l'énergie. Au moins deux blocs d'alimentations sont actifs, avec une unité d'alimentation nécessaire à l'alimentation de la configuration et une pour fournir la redondance en cas de panne de l'unité d'alimentation. Le mode Redondance des unités d'alimentation offre une protection contre la panne de toute unité d'alimentation, mais ne protège pas en cas de perte d'un réseau d'alimentation en CA. • Le mode Redondance de l'alimentation alternative avec enclenchement dynamique des blocs d'alimentation, dans lequel au moins deux des six blocs d'alimentation sont actifs, un sur chaque réseau d'alimentation, offre un bon compromis entre l'efficacité et la disponibilité maximale pour une configuration d'enceinte modulaire partiellement chargée. • La désactivation de l'enclenchement dynamique des blocs d'alimentation (DPSE) offre la plus faible efficacité étant donné que tous les six blocs d'alimentations sont actifs et partagent la charge, entraînant une plus faible utilisation de chaque bloc d'alimentation. Le mode Enclenchement dynamique des blocs d'alimentation peut être activé pour les trois configurations de redondance des blocs d'alimentation présentées ci-dessus : Sans redondance, Redondance des blocs d'alimentation et Redondance de l'alimentation alternative.Gestion de l'alimentation 345 • Dans une configuration Sans redondance avec enclenchement dynamique des blocs d'alimentation, le châssis M1000e peut comporter jusqu'à cinq blocs d'alimentation condition de secours. Dans une configuration à six unités d'alimentation, certaines unités d'alimentation sont mises en veille et restent inutilisées afin d'améliorer l'efficacité énergétique. Le retrait ou une panne d'une unité d'alimentation connectée dans cette configuration entraînera la connexion d'une unité d'alimentation en mode Veille ; cependant, les unités d'alimentation en Veille peuvent nécessiter jusqu'à 2 secondes pour s'activer. Aussi certains modules de serveurs peuvent-ils perdre de la puissance durant la transition dans la configuration Sans redondance. REMARQUE : dans une configuration à trois unités d'alimentation, la charge du serveur peut empêcher la transition vers le mode Veille d'une unité d'alimentation. • Dans une configuration Redondance des blocs d'alimentation, l'enceinte maintient toujours une unité d'alimentation supplémentaire sous tension et marquée En ligne en sus des unités d'alimentation requises pour l'alimentation de l'enceinte. L'utilisation de l'alimentation est surveillée et jusqu'à quatre unités d'alimentation peuvent être mises en veille en fonction de la charge globale du système. Dans une configuration à six unités d'alimentation, deux blocs d'alimentation au minimum sont toujours sous tension. Étant donné qu'une enceinte dans la configuration Redondance des blocs d'alimentation possède toujours une unité d'alimentation supplémentaire activée, l'enceinte peut tolérer la perte d'une unité d'alimentation en ligne et disposer encore d'une alimentation suffisante pour les modules serveurs installés. La perte de l'unité d'alimentation en ligne entraîne la mise en ligne d'une unité d'alimentation en veille. Une panne simultanée de plusieurs unités d'alimentation peut entraîner la perte d'alimentation de plusieurs modules serveurs pendant la mise sous tension des unités d'alimentation. • Dans la configuration Redondance de l'alimentation alternative, tous les blocs d'alimentation sont activés lors de l'alimentation du châssis. L'utilisation d'énergie est surveillée, et si la configuration du système et l'utilisation d'énergie le permettent, les unités d'alimentation sont placées en mode Veille. Étant donné que l'état Connecté des unités d'alimentation d'un réseau met en miroir celles de l'autre réseau, l'enceinte peut subir une perte d'alimentation d'un réseau entier sans aucune interruption de l'alimentation vers l'enceinte.346 Gestion de l'alimentation Une augmentation de la demande d'électricité dans la configuration de la redondance de l'alimentation alternative entraîne l'activation des unités d'alimentation en mode Veille. Cela permet de maintenir la configuration en miroir nécessaire pour une redondance de réseau double. REMARQUE : lorsque le mode Enclenchement dynamique des blocs d'alimentation est activé, les unités d'alimentation en veille sont mises dans l'état En ligne afin de récupérer de l'alimentation si la demande en alimentation augmente dans les trois modes de règles de redondance. Règles de redondance La règle de redondance est un ensemble configurable de propriétés qui détermine la manière dont CMC gère l'alimentation du châssis. Les règles de redondance suivantes sont configurables avec ou sans enclenchement dynamique des unités d'alimentation : • Redondance de l'alimentation alternative • Redondance des blocs d'alimentation • Sans redondance La configuration de la redondance par défaut d'un châssis dépend du nombre d'unités d'alimentation qu'il contient, tel qu'indiqué dans Figure 9-1. Redondance de l'alimentation alternative En mode Redondance d'alimentation alternative avec six unités d'alimentation, les six sont toutes actives. Les trois unités d'alimentation situées à gauche doivent être connectées à un réseau de courant alternatif, alors que les trois unités situées à droite doivent être connectées à un réseau de courant alternatif différent. Tableau 9-1. Configuration de la redondance par défaut Configuration des unités d'alimentation Règle de redondance par défaut Paramètre par défaut d'enclenchement dynamique des unités d'alimentation Six unités d'alimentation Redondance de l'alimentation alternative Désactivé Trois unités d'alimentation Sans redondance DésactivéGestion de l'alimentation 347 PRÉCAUTION : pour éviter une panne système et pour garantir l'efficacité de la redondance d'alimentation en CA, une série équilibrée d'unités d'alimentation doit être correctement câblée pour séparer les réseaux d'alimentation en CA. En cas de défaillance de l'un des réseaux d'alimentation alternative, les unités d'alimentation du réseau d'alimentation alternative opérationnel prennent la relève sans interruption pour les serveurs ou l'infrastructure. PRÉCAUTION : en mode Redondance d'alimentation alternative, vous devez disposer d'une série équilibrée d'unités d'alimentation (au moins une unité d'alimentation sur chaque réseau). Si cette condition n'est pas remplie, la redondance d'alimentation alternative n'est pas possible. Redondance des blocs d'alimentation Lorsque le mode Redondance des blocs d'alimentation est activé, une unité d'alimentation du châssis est conservée comme alimentation de secours, garantissant ainsi que la défaillance de l'une des unités d'alimentation n'engendre pas la mise hors tension des serveurs ou du châssis. Le mode Redondance des blocs d'alimentation nécessite jusqu'à quatre unités d'alimentation. Des unités d'alimentation supplémentaires, si elles sont présentes, seront utilisées pour améliorer l'efficacité énergétique du système si le mode Enclenchement dynamique des blocs d'alimentation est activé. Les pannes ultérieures après une perte de redondance peuvent entraîner la mise hors tension des serveurs du châssis. Sans redondance Une alimentation excédant l'alimentation nécessaire pour que le châssis soit disponible, même lors d'une panne, continue d'alimenter le châssis. PRÉCAUTION : le mode Sans redondance utilise les meilleures unités d'alimentation lorsque le mode Enclenchement dynamique des blocs d'alimentation est activé pour les nécessités du châssis. Dans ce mode, l'échec d'une seule unité d'alimentation entraîne la perte d'alimentation des serveurs et des données. Préservation de l'alimentation et modifications du bilan de puissance CMC préserve l'alimentation lorsque la limite d'alimentation maximale configurée par l'utilisateur est atteinte. Lorsque la demande en alimentation excède la Limite de la puissance d'entrée système configurée par l'utilisateur, CMC réduit l'alimentation des serveurs dans l'ordre de priorité inverse afin de libérer de l'alimentation pour les serveurs de priorité supérieure et pour les autres modules du châssis. 348 Gestion de l'alimentation Lorsque tous les logements du châssis, ou plusieurs d'entre eux, sont configurés avec le même niveau de priorité, CMC diminue l'alimentation des serveurs par ordre croissant de numéro de logement. Par exemple, si les serveurs des logements 1 et 2 ont le même niveau de priorité, l'alimentation du serveur du logement 1 sera diminuée en premier. REMARQUE : vous pouvez définir un niveau de priorité à chaque serveur du châssis en lui attribuant un numéro de 1 à 9 inclus. Le niveau de priorité par défaut est 1 pour l'ensemble des serveurs. Plus le nombre est faible, plus le niveau de priorité est élevé. Pour des instructions concernant l'attribution de niveaux de priorité aux serveurs, voir « Utilisation de la RACADM », à la page 375. Vous pouvez attribuer une priorité aux serveurs à l'aide de l'interface utilisateur : 1 Cliquez sur Serveurs dans l'arborescence système. 2 Cliquez sur Alimentation→ Priorité. Modes Conservation d'énergie et Conservation max CMC assure la conservation de la puissance maximale lorsque : • L'utilisateur sélectionne le mode de conservation maximale en utilisant l'interface Web ou RACADM. • Un script de commande automatisé en ligne, délivré par un onduleur, sélectionne le mode de conservation maximale. En mode de conservation maximale, tous les serveurs commencent à fonctionner à leur niveau de puissance minimum, et toutes les demandes ultérieures d'attribution de puissance aux serveurs sont refusées. Dans ce mode, les performances des serveurs sous tension peuvent être dégradées. Des serveurs supplémentaires ne peuvent pas être mis sous tension, quelle que soit la priorité du serveur. Le système est restauré à son plein rendement lorsque l'utilisateur ou un script de commande automatisé en ligne autorise le mode de conservation maximale.Gestion de l'alimentation 349 Utilisation de l'interface Web Vous pouvez activer ou désactiver le mode de conservation maximale à l'aide de l'interface : 1 Cliquez sur Présentation du châssis dans l'arborescence. 2 Cliquez sur Alimentation→ Configuration. 3 Sélectionnez le Mode de conservation d'énergie max pour activer l'économie d'énergie maximale, puis cliquez sur Appliquer. 4 Décochez la case Mode de conservation énergétique max pour rétablir le fonctionnement normal, puis cliquez sur Appliquer. Utilisation de la RACADM Ouvrez une console série/Telnet/SSH d'accès à CMC, puis ouvrez une session. • Pour activer le mode de consommation énergétique maximale, entrez : racadm config -g cfgChassisPower -o cfgChassisMaxPowerConservationMode 1 • Pour rétablir le fonctionnement normal, entrez : racadm config -g cfgChassisPower -o cfgChassisMaxPowerConservationMode 0 Fonctionnement des unités d'alimentation 110 V Certaines unités d'alimentation prennent en charge l'entrée 110V CA. Cette entrée peut dépasser ce qui est autorisé pour le circuit de dérivation. Si une unité d'alimentation est connectée au courant 110V CA, l'utilisateur doit définir CMC pour le fonctionnement normal de l'enceinte. S'il n'est pas défini et si des unités d'alimentation 110 V sont détectées, toutes les demandes ultérieures d'attribution de puissance aux serveurs seront refusées. Dans ce cas, les serveurs complémentaires ne peuvent être mis sous tension, quelle que soit leur priorité. Vous pouvez définir CMC pour une utilisation avec les unités d'alimentation 110 V en utilisant l'interface Web ou RACADM.350 Gestion de l'alimentation Utilisation de l'interface Web Vérifiez que le circuit 110 V est conçu pour le courant prévu, puis procédez comme suit : 1 Cliquez sur Présentation du châssis dans l'arborescence. 2 Cliquez sur Alimentation→ Configuration. 3 Sélectionnez Autoriser le fonctionnement 110 VCA et cliquez sur Appliquer. Utilisation de la RACADM Vérifiez que le circuit 110 V est conçu pour le courant prévu, puis procédez comme suit : 1 Ouvrez une console série/Telnet/SSH d'accès à CMC, puis ouvrez une session. 2 Activez les unités d'alimentation 110 VCA : racadm config -g cfgChassisPower -o cfgChassisAllow110VACOperation 1 Performance du serveur contre redondance de l'alimentation Lorsqu'elle est activée, cette option favorise la performance du serveur et sa mise sous tension plutôt que le maintien de la redondance de l'alimentation. Lorsqu'elle est désactivée, le système favorise la redondance de l'alimentation plutôt que la performance du serveur. Lorsqu'elle est désactivée et que l'alimentation du châssis est insuffisante, pour la redondance comme pour une pleine performance, alors afin de préserver la redondance, il se peut que certains serveurs : • ne reçoivent pas assez d'alimentation pour assurer une pleine performance. • ne soient pas alimentés. Utilisation de l'interface Web Pour activer l'option Performance du serveur contre redondance de l'alimentation, procédez comme suit : 1 Cliquez sur Présentation du châssis dans l'arborescence. 2 Cliquez sur Alimentation→ Configuration. 3 Sélectionnez Performance du serveur contre redondance de l'alimentation, puis cliquez sur Appliquer.Gestion de l'alimentation 351 Pour désactiver l'option Performance du serveur contre redondance de l'alimentation, procédez comme suit : 1 Cliquez sur Présentation du châssis dans l'arborescence. 2 Cliquez sur Alimentation→ Configuration. 3 Désélectionnez Performance du serveur contre redondance de l'alimentation, puis cliquez sur Appliquer. Utilisation de la RACADM Pour activer l'option Performance du serveur contre redondance de l'alimentation, procédez comme suit : 1 Ouvrez une console série/Telnet/SSH d'accès à CMC, puis ouvrez une session. 2 Activer Performance du serveur contre redondance de l'alimentation : racadm config -g cfgChassisPower -o cfgChassisPerformanceOverRedundancy 1 Pour désactiver l'option Performance du serveur contre redondance de l'alimentation, procédez comme suit : 1 Ouvrez une console série/Telnet/SSH d'accès à CMC, puis ouvrez une session. 2 Désactivez Performance du serveur contre redondance de l'alimentation : racadm config -g cfgChassisPower -o cfgChassisPerformanceOverRedundancy 0 Journalisation distante La consommation d'alimentation peut être enregistrée sur un serveur syslog distant. La consommation d'alimentation totale, minimale, maximale et moyenne du châssis tout au long d'une période de collecte peut être journalisée. Pour des informations supplémentaires sur l'activation de cette fonctionnalité et la configuration de l'intervalle de collecte/journalisation, voir les sections associées ci-dessous.352 Gestion de l'alimentation Utilisation de l'interface Web Vous pouvez activer la journalisation de l'alimentation distante à l'aide de l'interface utilisateur. Pour ce faire, ouvrez une session dans l'interface utilisateur, puis procédez comme suit : 1 Cliquez sur Présentation du châssis dans l'arborescence. 2 Cliquez sur Alimentation→ Configuration. 3 Sélectionnez Journalisation de l'alimentation distante afin de pouvoir journaliser des événements d'alimentation sur une hôte distant. 4 Spécifiez l'intervalle de journalisation requis (1 à 1 440 minutes). 5 Cliquez sur Appliquer pour enregistrer les modifications. Utilisation de la RACADM Ouvrez une console texte série, Telnet ou SSH vers CMC, ouvrez une session, puis configurez la journalisation de l'alimentation distante tel qu'illustré : 1 Pour activer la fonctionnalité de journalisation de l'alimentation distante, entrez la commande suivante : racadm config -g cfgRemoteHosts -o cfgRhostsSyslogPowerLoggingEnabled 1 2 Pour spécifier l'intervalle de journalisation de votre choix, entrez la commande suivante : racadm config -g cfgRemoteHosts -o cfgRhostsSyslogPowerLoggingInterval n où n correspond à 1 à 1 440 minutes. 3 Pour déterminer si la fonction de journalisation de l'alimentation distante est activée, entrez la commande suivante : racadm getconfig -g cfgRemoteHosts -o cfgRhostsSyslogPowerLoggingEnabledGestion de l'alimentation 353 4 Pour déterminer l'intervalle de journalisation de l'alimentation distante, entrez la commande suivante : racadm getconfig -g cfgRemoteHosts -o cfgRhostsSyslogPowerLoggingInterval REMARQUE : la fonctionnalité de journalisation d'alimentation distante dépend des hôtes syslog distants et s'ils ont été précédemment configurés. La journalisation vers un ou plusieurs hôtes syslog distants doit être activée ; sinon, la consommation d'alimentation est journalisée. Ceci peut être effectuée à l'aide de l'interface utilisateur Web ou l'interface RACADM. Pour plus de détails, voir les instructions de configuration syslog distant. Défaillance d'une unité d'alimentation avec règle de redondance dégradée ou absente CMC diminue l'alimentation des serveurs en cas d'alimentation insuffisante, par exemple suite à une défaillance d'une unité d'alimentation. Après avoir diminué l'alimentation des serveurs, CMC évalue à nouveau les besoins d'alimentation du châssis. Si les besoins d'alimentation ne sont toujours pas satisfaits, CMC met hors tension les serveurs moins prioritaires. L'alimentation des serveurs à priorité plus élevée est progressivement rétablie tandis que les besoins d'alimentation respectent le bilan de puissance. REMARQUE : pour configurer la stratégie de redondance, voir « Configuration du bilan de puissance et de la redondance », à la page 371. Règle d'enclenchement d'un nouveau serveur Lorsqu'un nouveau serveur est mis sous tension, il se peut que CMC doive diminuer l'alimentation des serveurs à priorité inférieure afin d'attribuer une alimentation plus importante au nouveau serveur si l'ajout de ce dernier engendre une demande supérieure à l'alimentation disponible pour le châssis. Ceci se produit lorsque l'administrateur configure une limite d'alimentation du châssis inférieure à celle nécessaire pour alimenter pleinement les serveurs, ou lorsque l'alimentation disponible est insuffisante en cas de besoin énergétique critique de l'ensemble des serveurs présents dans le châssis. Si l'alimentation libérée en réduisant l'alimentation allouée aux serveurs de priorité inférieure est insuffisante, il est possible que le nouveau serveur ne soit pas alimenté. 354 Gestion de l'alimentation L'alimentation la plus élevée à fournir, nécessaire au fonctionnement optimal du châssis et de l'ensemble des serveurs (y compris le nouveau serveur), constitue le cas le plus défavorable pour les besoins d'alimentation. Lorsque cette alimentation est disponible, tous les serveurs bénéficient d'une alimentation suffisante et le nouveau serveur peut être mis sous tension. Lorsque le cas le plus défavorable pour les besoins d'alimentation ne peut être résolu, l'alimentation est réduite sur les serveurs à priorité inférieure jusqu'à ce qu'une quantité suffisante soit libérée pour mettre sous tension le nouveau serveur. La Figure 9-2 décrit les actions effectuées par CMC lors de la mise sous tension d'un nouveau serveur dans le scénario décrit ci-dessus. En cas de défaillance d'une unité d'alimentation, l'état d'intégrité devient non critique et un événement de défaillance d'unité d'alimentation est généré. Le retrait d'une unité d'alimentation entraîne un événement de retrait d'unité d'alimentation. Si l'un des deux événements provoque une perte de redondance, selon les allocations d'alimentation, un événement de perte de redondance est généré. Si la capacité d'alimentation ultérieure ou la capacité d'alimentation de l'utilisateur est supérieure aux allocations de serveurs, les performances des serveurs seront dégradées ou, dans le pire des cas, les serveurs pourront être mis hors tension. Les deux conditions sont dans l'ordre de priorité inverse. En d'autres termes, les serveurs de priorité inférieure sont mis hors tension en premier. Tableau 9-2. Prise en charge par CMC d'une tentative de mise sous tension d'un serveur L'alimentation du cas le plus défavorable est disponible Prise en charge par CMC Mise sous tension du serveur Oui La préservation de l'alimentation n'est pas nécessaire Autorisé Non Passage en mode d'économie d'énergie : • L'alimentation nécessaire au nouveau serveur est disponible • L'alimentation nécessaire au nouveau serveur n'est pas disponible Autorisé Non autoriséeGestion de l'alimentation 355 La Figure 9-3 décrit la prise en charge par le micrologiciel de l'arrêt ou du retrait d'une unité d'alimentation dans le cadre de différentes configurations de redondance des unités d'alimentation. Tableau 9-3. Impact d'une défaillance ou du retrait d'une unité d'alimentation sur le châssis Configuration des unités d'alimentation Unités d'alimentation dynamiques Enclenchement Prise en charge par le micrologiciel Redondance de l'alimentation alternative Désactivé CMC vous alerte lors de la perte de redondance d'alimentation alternative. Redondance des blocs d'alimentation Désactivé CMC vous alerte lors de la perte de redondance des blocs d'alimentation. Sans redondance Désactivé Réduit l'alimentation des serveurs de priorité inférieure, le cas échéant. Redondance de l'alimentation alternative Activé CMC vous alerte lors de la perte de redondance d'alimentation alternative. Les unités d'alimentation en mode Attente (s'il y en a) sont activées afin de compenser la perte d'énergie suite à la défaillance ou au retrait de l'unité d'alimentation. Redondance des blocs d'alimentation Activé CMC vous alerte lors de la perte de redondance des blocs d'alimentation. Les unités d'alimentation en mode Attente (s'il y en a) sont activées afin de compenser la perte d'énergie suite à une défaillance ou une déconnexion de l'unité d'alimentation. Sans redondance Activé Réduit l'alimentation des serveurs de priorité inférieure, le cas échéant. 356 Gestion de l'alimentation Retraits d'unités d'alimentation avec règle de redondance dégradée ou absente CMC conserve une alimentation lorsque vous retirez une unité d'alimentation ou un cordon d'alimentation alternative d'une unité d'alimentation. CMC réduit l'alimentation des serveurs à priorité inférieure jusqu'à ce qu'elle soit prise en charge par les unités d'alimentation restantes du châssis. Si vous retirez plusieurs unités d'alimentation, CMC évalue à nouveau les besoins d'alimentation lors du retrait de la seconde unité d'alimentation afin de déterminer la réponse du micrologiciel. Si les besoins d'alimentation ne sont toujours pas satisfaits, CMC peut mettre hors tension les serveurs de priorité inférieure. Limites • CMC ne prend pas en charge l'arrêt automatisé d'un serveur à priorité inférieure en vue de permettre la mise sous tension d'un serveur à priorité supérieure. Ce type d'arrêt peut néanmoins être exécuté à l'initiative d'un utilisateur. • Les modifications apportées à la règle de redondance des unités d'alimentation sont limitées par le nombre d'unités d'alimentation du châssis. Vous pouvez sélectionner l'une des trois configurations de redondance des unités d'alimentation répertoriées dans « Règles de redondance », à la page 346. Modifications d'alimentation et de la règle de redondance dans le journal des événements système Les modifications de l'état des blocs d'alimentation et de la règle de redondance de l'alimentation sont enregistrées en tant qu'événements. Les événements liés au bloc d'alimentation enregistrant des entrées dans le journal des événements système (SEL) sont les insertions et retraits de blocs d'alimentation, l'insertion et le retrait d'entrée d'alimentation et la confirmation/annulation de sorties d'alimentation.Gestion de l'alimentation 357 La Figure 9-4 répertorie les entrées du journal SEL relatives aux changements des blocs d'alimentation. Les événements liés aux modifications de la condition de la redondance d'alimentation qui enregistrent des entrées dans le journal SEL sont une perte de redondance et un regain de redondance de l'enceinte modulaire qui est configurée pour la règle d'alimentation en mode Redondance de l'alimentation alternative ou la règle d'alimentation en mode Redondance des blocs d'alimentation. La Figure 9-5 liste les entrées du journal SEL liées aux modifications de la stratégie d'alimentation en mode Redondance de l'alimentation. Tableau 9-4. Événements du journal SEL relatifs aux modifications d'alimentation Événement d'alimentation Entrée du journal d'événements système (SEL) Insertion La présence d'un bloc d'alimentation a été confirmée Retrait La présence d'un bloc d'alimentation a été annulée Alimentation alternative reçue la perte de l'alimentation a été annulée perte de l'alimentation alternative la perte de l'alimentation a été confirmée sortie CC produite La panne d'un bloc d'alimentation a été annulée perte de sortie en CC La panne d'un bloc d'alimentation a été confirmée Fonctionnement 110 V non reconnu détecté l'alimentation basse tension d'entrée (110) a été confirmée Fonctionnement 110 V reconnu l'alimentation basse tension d'entrée (110) a été annulée Tableau 9-5. Événements du journal SEL relatifs aux modifications de la condition de la redondance d'alimentation Événement de stratégie d'alimentation Entrée du journal d'événements système (SEL) Perte de la redondance La perte de la redondance a été affirmée Regain de la redondance La perte de la redondance a été annulée358 Gestion de l'alimentation Condition de la redondance et intégrité énergétique globale La condition de la redondance est un facteur de détermination de l'intégrité énergétique globale. Lorsque la règle de redondance d'alimentation est définie, par exemple, sur le mode Redondance d'alimentation alternative et que la condition de la redondance indique que le système fonctionne avec la redondance, l'intégrité énergétique globale sera généralement OK. Toutefois, si les conditions d'utilisation de la redondance d'alimentation alternative ne peuvent pas être remplies, la condition de la redondance est Non et l'intégrité énergétique globale est Critique. Ceci s'explique par le fait que le système ne peut pas fonctionner conformément à la règle de redondance configurée. REMARQUE : CMC n'effectue pas un contrôle préalable de ces conditions lorsque vous modifiez la règle de redondance par ou vers le mode Redondance d'alimentation alternative. Ainsi, la configuration de la règle de redondance peut entraîner immédiatement une perte de redondance ou un regain. Configuration et gestion de l'alimentation Vous pouvez utiliser les interfaces Web et RACADM pour gérer et configurer les commandes d'alimentation de CMC. Vous pouvez notamment : • Consulter les allocations, la consommation et la condition d'alimentation du châssis, des serveurs et des unités d'alimentation. • Configurer le paramètre Limite de la puissance d'entrée système et la règle de redondance pour le châssis. • Exécuter des opérations de contrôle de l'alimentation (mise sous tension, mise hors tension, réinitialisation du système, cycle d'alimentation) du châssis. Affichage de la condition d'intégrité des unités d'alimentation La page Condition du bloc d'alimentation affiche la condition et les mesures des unités d'alimentation associées au châssis. Utilisation de l'interface Web L'état d'intégrité d'une unité d'alimentation peut être consulté de deux façons : à partir de la section Graphiques du châssis sur la page Condition du châssis ou sur la page État du bloc d'alimentation. La page Graphiques du châssis fournit une représentation graphique de l'ensemble des unités d'alimentation installées dans le châssis. Gestion de l'alimentation 359 Pour consulter la condition d'intégrité des unités d'alimentation à l'aide des graphiques du châssis : 1 Ouvrez une session sur l'interface Web de CMC. 2 La page Condition du châssis s'affiche. La section droite de la page Graphiques du châssis fournit une vue arrière du châssis et contient la condition d'intégrité de toutes les unités d'alimentation. L'état d'intégrité de l'unité d'alimentation est indiqué par la couleur du sous-graphique unité d'alimentation : • Vert : l'unité d'alimentation est présente, sous tension et communique avec CMC ; il n'y a aucune indication d'événement indésirable. • Orange : défaillance d'une unité d'alimentation. Consulter le journal CMC pour des détails sur la défaillance. • Gris : se produit lors de l'initialisation d'unité d'alimentation et lorsque le bloc d'alimentation est réglé en mode Veille, pendant l'allumage du châssis ou l'insertion d'unité d'alimentation. L'unité d'alimentation est présente et hors tension. Aucune condition défavorable n'est indiquée. 3 Placez le curseur sur un sous-graphique de l'unité d'alimentation pour afficher le champ textuel ou l'infobulle correspondant. Le champ textuel fournit des informations complémentaires sur l'unité d'alimentation. 4 Le lien hypertexte du sous-graphique de l'unité d'alimentation permet d'accéder à la page de l'interface utilisateur de CMC correspondante pour une navigation directe vers la page État du bloc d'alimentation associée à l'ensemble des unités d'alimentation. Pour consulter la condition d'intégrité des unités d'alimentation à l'aide de la page État du bloc d'alimentation : 1 Ouvrez une session sur l'interface Web de CMC. 2 Sélectionnez Blocs d'alimentation dans l'arborescence du système. La page État du bloc d'alimentation s'affiche. La Figure 9-6 et la Figure 9-7 décrivent les informations mentionnées à la page Condition du bloc d'alimentation. 360 Gestion de l'alimentation Tableau 9-6. Blocs d'alimentation Élément Description Name (Nom) Indique le nom de l'unité d'alimentation : PS-[n], [n] étant le numéro du bloc d'alimentation. Présentation Indique si l'unité d'alimentation est Présente ou Absente. Intégrité OK Indique que l'unité d'alimentation est présente et qu'elle communique avec CMC. En cas de perte des communications entre CMC et l'unité d'alimentation, CMC ne pourra pas obtenir ni afficher l'état de l'intégrité de l'unité d'alimentation. Avertissement Indique que des alertes d'avertissement seules ont été émises et que des actions correctives doivent être effectuées. Si aucune action corrective n'est prise, des pannes d'alimentation critiques ou graves susceptibles d'affecter l'intégrité du serveur pourraient se produire. Grave Indique qu'au moins une alerte de panne a été générée pour le bloc d'alimentation. L'état grave indique une panne d'alimentation du châssis et la nécessité d'effectuer une action corrective immédiatement. État de l'alimentation Indique l'état d'alimentation des blocs d'alimentation (un seul à la fois) : En cours d'initialisation, En ligne, Veille, Test de diagnostic, Échec, Hors ligne, Inconnu ou Absent. Capacité Affiche la capacité d'alimentation en watts. Tableau 9-7. Condition de la puissance système Élément Description Intégrité globale énergétique Indique la condition d'intégrité (OK, Non critique, Critique, Non récupérable, Autre, Inconnu) de la gestion de l'alimentation du châssis entier. Condition de la puissance système Affiche la condition de l'alimentation (Activé, Désactivé, Mis sous tension, Mis hors tension) du châssis.Gestion de l'alimentation 361 Utilisation de la RACADM Ouvrez une console texte série/Telnet/SSH d'accès à CMC, ouvrez une session et entrez : racadm getpminfo Pour des informations supplémentaires sur la commande getpminfo, y compris les détails de sorties, voir le Guide de référence de la ligne de commande RACADM pour iDRAC6 et CMC sur le site de support Dell à l'adresse support.dell.com/manuals. Affichage de l'état de la consommation de puissance CMC fournit la consommation électrique d'entrée réelle de l'intégralité du système à la page Condition de la consommation énergétique. Utilisation de l'interface Web REMARQUE : vous devez disposer du privilège Administrateur de configuration du châssis pour effectuer des tâches de gestion de l'alimentation. Pour afficher la condition de la consommation énergétique à l'aide de l'interface Web : 1 Ouvrez une session sur l'interface Web de CMC. 2 Cliquez sur Présentation du châssis dans l'arborescence. 3 Cliquez sur Alimentation→ Consommation énergétique. La page Consommation énergétique s'affiche. REMARQUE : vous pouvez également afficher la condition de la redondance d'alimentation sous Blocs d'alimentation dans l'arborescence des systèmes→ onglet Condition. Redondance Indique la condition de la redondance des blocs d'alimentation. Les valeurs sont les suivantes : Non : les blocs d'alimentation ne sont pas redondants. Oui : une redondance totale est appliquée. Tableau 9-7. Condition de la puissance système Élément Description362 Gestion de l'alimentation Utilisation de la RACADM Pour afficher la condition de la consommation énergétique à l'aide de RACADM : Ouvrez une console texte série/Telnet/SSH d'accès à CMC, ouvrez une session et entrez : racadm getpminfo Les Tableaux (de la Figure 9-8 à la Figure 9-11) décrivent les informations affichées sur la page Consommation énergétique. Tableau 9-8. Statistiques de l'alimentation en temps réel Élément Description Alimentation d'entrée du système Affiche la consommation actuelle cumulée en courant alternatif de l'ensemble des modules du châssis, mesurée à l'entrée des unités d'alimentation. La valeur de puissance d'entrée dans le système est indiquée en watts et en BTU/h. Alimentation maximale du système Affiche la consommation d'énergie maximale du système depuis que l'ancienne valeur a été effacée. Cette propriété vous permet d'effectuer le suivi de la puissance maximale consommée par le système (châssis et modules) enregistrée sur une période spécifiée. Cliquez sur le bouton de réinitialisation des statistiques d'alimentation maximale/minimale sous le tableau pour effacer cette valeur. La valeur de l'alimentation maximale du système est indiquée en watts et en BTU/h. Point de départ de l'alimentation maximale du système Affiche la date et l'heure enregistrées depuis que la dernière valeur relative à la consommation d'énergie maximale du système a été effacée. L'horodatage s'affiche au format hh:mm:ss MM/JJ/AAAA, où hh correspond aux heures (0 à 24), mm aux minutes (00 à 60), ss aux secondes (00 à 60), MM au mois (1 à 12), JJ aux jours (1 à 31) et AAAA à l'année. Cette valeur est réinitialisée à l'aide du bouton de réinitialisation des statistiques d'alimentation maximale/minimale et également lorsque CMC se réinitialise ou échoue.Gestion de l'alimentation 363 Horodatage de la puissance maximale du système Affiche la date et l'heure enregistrées lorsque le pic de consommation électrique du système a été atteint au cours de la période analysée. L'horodatage est affiché au format hh:mm:ss MM/JJ/AAAA, où hh correspond aux heures (de 0 à 24), mm aux minutes (de 00 à 60), ss aux secondes (de 00 à 60), MM au mois (de 1 à 12), JJ au jour (de 1 à 31) et AAAA à l'année. Puissance minimale du système Affiche le niveau minimum de consommation en courant alternatif du système (en watts) depuis la dernière réinitialisation de cette valeur par un utilisateur. Cette propriété vous permet d'effectuer le suivi de la consommation électrique minimale du système (châssis et modules) enregistrée sur une période spécifiée. Cliquez sur le bouton de réinitialisation des statistiques d'alimentation maximale/minimale sous le tableau pour effacer cette valeur. La valeur de l'alimentation minimale du système est indiquée en watts et en BTU/h. Cette valeur est réinitialisée à l'aide du bouton de réinitialisation des statistiques d'alimentation maximale/minimale et également lorsque CMC se réinitialise ou échoue. Point de départ de l'alimentation minimale du système Affiche la date et l'heure enregistrées depuis que la dernière valeur relative à la consommation de courant minimale du système a été effacée. L' horodatage s'affiche au format hh:mm:ss MM/JJ/AAAA, où hh correspond aux heures (0 à 24), mm aux minutes (00 à 60), ss aux secondes (00 à 60), MM au mois (1 à 12), JJ au jour (1 à 31) et AAAA à l'année. Cette valeur est réinitialisée à l'aide du bouton de réinitialisation des statistiques d'alimentation maximale/minimale et également lorsque CMC se réinitialise ou échoue. Horodatage de l'alimentation minimale du système Affiche la date et l'heure enregistrées lorsque la consommation électrique minimale du système s'est produite sur la période enregistrée. Le format de l'horodatage est identique à celui décrit pour l'horodatage de l'alimentation maximale du système. Tableau 9-8. Statistiques de l'alimentation en temps réel (suite) Élément Description364 Gestion de l'alimentation Alimentation à l'état inactif Affiche la consommation de courant estimée du châssis à l'état inactif. L'état inactif est définit comme l'état du châssis lorsqu'il est sous tension et que tous les modules consomment du courant alors qu'il est à l'état inactif. Il s'agit d'une valeur estimée et non mesurée. Cette dernière est estimée en fonction de l'alimentation cumulée allouée aux composants de l'infrastructure du châssis tels que les modules d'E/S, les ventilateurs, le module iKVM, les contrôleurs iDRAC et l'écran LCD. Elle est également estimée en fonction des besoins minimum en courant pour tous les serveurs auxquels une alimentation a été allouée et qui sont sous-tension. La valeur de l'alimentation du système à l'état inactif est indiquée en watts et en BTU/h. Alimentation potentielle du système Affiche la consommation de courant estimée du châssis lorsqu'il fonctionne à pleine puissance. La consommation de courant maximale définit l'état du châssis lorsqu'il est mis sous tension et que tous les modules consomment une alimentation maximale. Il s'agit d'une valeur estimée calculée d'après la consommation électrique agrégée de l'historique de la configuration système, et non d'une valeur mesurée. Elle est calculée comme étant l'alimentation cumulée allouée aux composants de l'infrastructure du châssis (modules d'E/S, ventilateurs, iKVM, contrôleurs iDRAC et l'écran LCD du panneau avant) et comme correspondant aux besoins d'alimentation maximum de tous les serveurs auxquels une alimentation a été allouée et qui sont sous tension. La valeur de l'alimentation potentielle du système est indiquée en watts et en BTU/h. Lecture du courant d'entrée du système Affiche la consommation de courant d'entrée totale du châssis basée sur la somme des consommations de courant d'entrée de chaque module d'unité d'alimentation spécifique présent dans le châssis. La valeur du courant d'entrée du système est indiquée en A (ampères). Tableau 9-8. Statistiques de l'alimentation en temps réel (suite) Élément DescriptionGestion de l'alimentation 365 Tableau 9-9. État des statistiques de l'énergie en temps réel Élément Description Consommation d'énergie du système Affiche la consommation d'énergie cumulée en courant alternatif de tous les modules du châssis, mesurée à l'entrée des blocs d'alimentation. La valeur est indiquée en kWh (valeur cumulée). Heure de début de la consommation énergétique du système Affiche la date et l'heure enregistrées depuis que la dernière valeur relative à la consommation d'énergie du système a été effacée et qu'un nouveau cycle de mesures a débuté. L'horodatage s'affiche au format hh:mm:ss MM/JJ/AAAA, où : hh correspond aux heures (0 à 24), mm à minutes (00 à 60), ss à secondes (00 à 60), MM à mois (1 à 12), JJ à jours (1 à 31) et AAAA l'année. Cette valeur est réinitialisée à l'aide du bouton de réinitialisation des statistiques énergétiques et est conservée en cas de réinitialisation ou d'échec de CMC. Horodatage de la consommation d'énergie du système Affiche la date et l'heure de calcul de la consommation d'énergie du système pour l'affichage. L'horodatage s'affiche au format hh:mm:ss MM/JJ/AAAA, où : hh correspond aux heures (0 à 24), mm à minutes (00 à 60), ss à secondes (00 à 60), MM à mois (1 à 12), JJ à jours (1 à 31) et AAAA l'année. Tableau 9-10. Condition de la puissance système Élément Description Intégrité globale énergétique Indique la condition de l'intégrité du sous-système de puissance du châssis. : • Icône de coche verte pour OK • Icône de point d'exclamation jaune pour Non critique • Icône de croix rouge pour Critique Condition de la puissance système Affiche l'état de l'alimentation (Activé, Désactivé, Mis sous tension, /Mis hors tension) du châssis. Redondance Affiche l'état de la redondance. Les valeurs valides sont les suivantes : Non : les unités d'alimentation ne sont pas redondantes Oui : une redondance totale est appliquée366 Gestion de l'alimentation Affichage de la condition du bilan de puissance CMC fournit des aperçus de la condition d'alimentation du sous-système d'alimentation à la page Condition du bilan de puissance. Utilisation de l'interface Web REMARQUE : vous devez disposer du privilège Administrateur de configuration du châssis pour effectuer des tâches de gestion de l'alimentation. Pour afficher la condition du bilan de puissance à l'aide de l'interface Web : 1 Ouvrez une session sur l'interface Web de CMC. 2 Cliquez sur Présentation du châssis dans l'arborescence. 3 Cliquez sur Alimentation→ Condition du bilan de puissance. La page Condition du bilan de puissance s'affiche. Tableau 9-11. Modules serveurs Élément Description Logement Affiche l'emplacement du module de serveur. Le numéro d'ordre de priorité (de logement) est un numéro séquentiel (de 1 à 16) qui identifie le module serveur en fonction de son emplacement dans le châssis. Name (Nom) Affiche le nom du serveur. Le nom du serveur peut être redéfini par l'utilisateur. Présentation Indique si le serveur est présent dans le logement (Oui ou Non). Si ce champ affiche Extension de n° (où n° est compris entre 1 et 8), le nombre qui suit correspond au logement principal d'un serveur à logements multiples. Réelle (AC) Mesure en temps réel de la consommation de puissance réelle du serveur. La mesure est affichée en watts CA. Heure de début de la consommation énergétique cumulée Mesure en temps réel de la consommation énergétique cumulée que le serveur a consommée depuis l'heure affichée dans le champ Heure de début. L'unité de mesure est le Kilowattheure (kWh). Horodatage de la consommation de puissance maximale Affiche la consommation de puissance maximale consommée par le serveur à un moment donnée. L'heure à laquelle le pic de consommation électrique s'est produit est enregistrée dans le champ Horodatage. La mesure est affichée en watts.Gestion de l'alimentation 367 Les tableaux (de la Figure 9-12 à la Figure 9-15) décrivent les informations affichées sur la page Condition du bilan de puissance. Pour plus d'informations sur la configuration des paramètres de ces informations, voir « Configuration du bilan de puissance et de la redondance », à la page 371. Utilisation de la RACADM Ouvrez une console texte série/Telnet/SSH d'accès à CMC, ouvrez une session et entrez : racadm getpbinfo Pour des informations supplémentaires sur la commande getpbinfo, y compris les détails de sortie, voir la section sur la commande getpbinfo du RACADM Command Line Reference Guide for iDRAC6 and CMC (Guide de référence de la ligne de commande RACADM pour iDRAC6 et CMC). Tableau 9-12. Configuration de la stratégie énergétique du système Élément Description Limite de la puissance d'entrée système Affiche la limite de consommation électrique maximale configurée par l'utilisateur pour l'intégralité du système (châssis, CMC, serveurs, modules d'E/S, blocs d'alimentation, iKVM et ventilateurs). CMC applique cette limite en réduisant l'alimentation du serveur ou en mettant hors tension les modules de serveur à priorité inférieure. La valeur de la limite de la puissance d'entrée système est indiquée en watts, BTU/h et pourcentages. Si la consommation d'énergie du châssis dépasse la limite de la puissance d'entrée système, les performances des serveurs à priorité inférieure sont réduites jusqu'à ce que la consommation d'énergie totale tombe en dessous de cette valeur. Lorsque les serveurs sont configurés avec la même priorité, la réduction d'alimentation ou la mise hors tension du serveur s'applique en fonction de son numéro de connecteur. Par exemple, le serveur sur le connecteur 1 est sélectionné en premier et celui sur le connecteur 16 est sélectionné en dernier.368 Gestion de l'alimentation Règle de redondance Indique la configuration de la redondance actuelle : Redondance de l'alimentation alternative, Redondance du bloc d'alimentation et Sans redondance. Redondance de l'alimentation alternative : la charge de l'alimentation est équilibrée sur l'ensemble des unités d'alimentation. La moitié d'entre elles doivent être câblées sur un réseau d'alimentation alternative et l'autre moitié doit être câblée sur un autre réseau. Lorsque le système s'exécute de manière optimale en mode Redondance de l'alimentation alternative, la charge de la puissance est répartie de manière équilibrée sur tous les blocs d'alimentation actifs. En cas de défaillance d'un réseau, les unités d'alimentation du réseau de courant alternatif opérationnel prennent le relais sans interruption. Redondance des blocs d'alimentation : la capacité de l'unité d'alimentation la plus puissante du châssis est conservée comme alimentation de secours, garantissant ainsi que la défaillance de l'une des unités d'alimentation n'engendre pas la mise hors tension des modules serveurs ou du châssis. Redondance des blocs d'alimentation : peut ne pas utiliser les six blocs d'alimentation ; assez d'unités d'alimentation sont utilisées pour s'assurer qu'en cas de panne l'un des autres peut continuer à alimenter le châssis. Les autres blocs d'alimentation peuvent être mis en mode Veille si le mode Enclenchement dynamique des blocs d'alimentation est activé. Sans redondance : la puissance de tous les blocs d'alimentation actifs est suffisante pour alimenter l'ensemble du châssis, y compris le châssis, les serveurs, les modules d'E/S, iKVM et CMC. Les autres blocs d'alimentation peuvent être mis en mode Veille si le mode Enclenchement dynamique des blocs d'alimentation est activé. PRÉCAUTION : le mode Sans redondance utilise uniquement le nombre minimum requis de blocs d'alimentation en même temps, sans sauvegarde. La panne de l'une des trois unités d'alimentation utilisées peut entraîner une coupure de courant et la perte des données des modules de serveur. Enclenchement dynamique des blocs d'alimentation Indique si l'activation des blocs d'alimentation dynamique est activée ou désactivée. L'activation de cette fonctionnalité permet à CMC de mettre les unités d'alimentation sous-utilisées en mode Veille en fonction de la règle de redondance définie et des besoins d'alimentation du système. La mise en mode attente des unités d'alimentation sous-utilisées augmente l'utilisation et l'efficacité des unités d'alimentation connectées, ce qui permet d'économiser l'énergie. Tableau 9-12. Configuration de la stratégie énergétique du système (suite) Élément DescriptionGestion de l'alimentation 369 Tableau 9-13. Bilan de puissance Élément Description Capacité maximale de l'alimentation d'entrée du système Alimentation d'entrée maximale que les blocs d'alimentation disponibles peuvent fournir au système (en watts). Réserve de redondance d'entrée Affiche la quantité d'alimentation redondante (en watts) en réserve pouvant être utilisée en cas de panne d'un réseau de courant alternatif ou d'un bloc d'alimentation. Lorsque le châssis est configuré pour fonctionner en mode de redondance de l'alimentation alternative, la réserve de redondance de l'alimentation d'entrée correspond à la quantité de courant réservée pouvant être utilisée en cas de panne du réseau de courant alternatif. Lorsque le châssis est configuré pour fonctionner en mode de redondance des blocs d'alimentation, la réserve de redondance de l'alimentation d'entrée correspond à la quantité d'alimentation de réserve pouvant être utilisée en cas de panne d'une unité d'alimentation spécifique. Alimentation d'entrée allouée aux serveurs Affiche l'alimentation d'entrée cumulée (en watts) que CMC alloue aux serveurs en fonction de leur configuration. Alimentation d'entrée allouée à l'infrastructure du châssis Affiche l'alimentation d'entrée cumulée (en watts) que CMC alloue à l'infrastructure du châssis (ventilateurs, modules d'E/S, iKVM, CMC, CMC et iDRAC en veille sur les serveurs). Total de l'alimentation d'entrée disponible pour l'allocation Affiche la puissance totale du châssis, en watts, toujours disponible pour l'attribution. Capacité d'alimentation d'entrée en attente Affiche la quantité de courant d'entrée en attente (en watts) disponible en cas de panne ou de suppression d'un bloc d'alimentation. Ce champ affiche des relevés lorsque le système possède au moins quatre blocs d'alimentation et que l'enclenchement dynamique des blocs d'alimentation est activé. REMARQUE : il est possible de voir une unité d'alimentation en veille mais cela n'influe en rien sur la valeur de la capacité d'alimentation d'entrée en attente. Dans ce cas, la valeur en watts de cette unité d'alimentation contribue à la valeur Puissance d'entrée totale pouvant être allouée. 370 Gestion de l'alimentation Tableau 9-14. Modules serveurs Élément Description Logement Affiche l'emplacement du module de serveur. Le numéro d'ordre de priorité (de logement) est un numéro séquentiel (de 1 à 16) qui identifie le module serveur en fonction de son emplacement dans le châssis. Name (Nom) Affiche le nom du serveur. Le nom du serveur est défini par l'utilisateur. Type Affiche le type du serveur. Priorité Indique le niveau de priorité affecté au logement du serveur dans le châssis pour l'établissement du bilan de puissance. CMC utilise cette valeur dans ses calculs lorsque l'alimentation doit être réduite ou réattribuée selon les limites d'alimentation définie par l'utilisateur, ou les défaillances des blocs d'alimentation ou des réseaux d'alimentation. Niveaux de priorité : 1 (le plus élevé) à 9 (le plus faible) Par défaut :1 REMARQUE : le niveau de priorité du logement du serveur est associé au logement du serveur, et non au serveur inséré dans le logement. Si vous déplacez un serveur vers un logement différent du châssis ou vers un autre châssis, la priorité précédemment associée au nouveau logement détermine celle du serveur déplacé. État de l'alimentation Affiche l'état d'alimentation du serveur : • - : CMC n'a pas déterminé l'état d'alimentation du serveur. • Désactivé : le serveur ou le châssis est désactivé. • Activé : le châssis et le serveur sont activés. • Activation : état temporaire entre le mode Désactivé et Activé. Lorsque le cycle d'activation est terminé, l'état d'alimentation passe en mode Activé. • Désactivation : état temporaire entre le mode Activé et Désactivé. Lorsque le cycle de désactivation est terminé, l'état d'alimentation passe en mode Désactivé. Bilan alloué : réel Indique la quantité d'alimentation allouée au module de serveur. • Réel : puissance actuelle allouée à chaque serveur. Gestion de l'alimentation 371 Configuration du bilan de puissance et de la redondance Le service de gestion de l'alimentation CMC optimise la consommation électrique pour l'ensemble du châssis (châssis, serveurs, modules d'E/S, iKVM, CMC et unités d'alimentation) et réattribue l'alimentation aux différents modules en fonction de la demande. Utilisation de l'interface Web REMARQUE : vous devez disposer du privilège Administrateur de configuration du châssis pour effectuer des tâches de gestion de l'alimentation. Pour configurer le bilan de puissance à l'aide de l'interface Web : 1 Ouvrez une session sur l'interface Web de CMC. 2 Cliquez sur Présentation du châssis dans l'arborescence. 3 Cliquez sur Alimentation→ Configuration. La page Configuration du bilan/de la redondance s'affiche. 4 Définissez une ou toutes les propriétés décrites dans la Figure 9-16 en fonction de vos besoins. 5 Cliquez sur Appliquer pour enregistrer les modifications. Pour actualiser le contenu de la page Configuration du bilan/de la redondance, cliquez sur Actualiser. Pour en imprimer le contenu, cliquez sur Imprimer. Tableau 9-15. Blocs d'alimentation du châssis Élément Description Nom Affiche le nom de l'unité d'alimentation au format PS-n, où n correspond au numéro du bloc d'alimentation. État de l'alimentation Indique l'état de l'alimentation de l'unité d'alimentation : En cours d'initialisation, En ligne, En veille, Test de diagnostic, Échec, Inconnu ou Absent (manquant). Tension d'entrée Affiche la tension d'entrée actuelle dans le bloc d'alimentation. Courant d'entrée Affiche le courant d'entrée actuel dans le bloc d'alimentation. Alimentation nominale de sortie Affiche l'alimentation nominale de sortie maximale du bloc d'alimentation.372 Gestion de l'alimentation Tableau 9-16. Propriétés du budget/de la redondance d'alimentation configurables Élément Description Limite de la puissance d'entrée système La limite de la puissance d'entrée système correspond à la quantité maximale de courant alternatif que le système peut allouer aux serveurs et à l'infrastructure du châssis. Cette dernière peut être configurée par l'utilisateur sur n'importe quelle valeur supérieure à celle de l'alimentation minimale nécessaire aux serveurs activés et à l'infrastructure du châssis. La configuration d'une valeur inférieure nécessaire aux serveurs provoque un échec de l'infrastructure du châssis. L'alimentation allouée aux serveurs et à l'infrastructure de châssis se trouve dans l'interface utilisateur à la page Présentation du châssis → Alimentation → Condition du bilan de puissance dans la section Bilan de puissance ou via la commande d'utilitaires CLI RACADM (racadm getpbinfo). Les utilisateurs peuvent désactiver un ou plusieurs serveurs afin de réduire l'allocation d'alimentation en cours et tenter à nouveau de configurer une valeur inférieure pour la limite de la puissance d'entrée ou simplement configurer la capacité avant de mettre les serveurs sous tension. Pour modifier ce paramètre, vous pouvez entrer une valeur dans n'importe quelle unité. L'interface assure que le champ de l'unité dernièrement changé correspond à la valeur soumise lors de l'application de ces modifications. REMARQUE : pour planifier la capacité, consultez le planificateur de capacité pour les centres de données (DCCP) à l'adresse www.dell.com/calc. REMARQUE : lorsque des modifications de valeur sont spécifiées en watts, la valeur suggérée reflète exactement ce qui est réellement appliqué. Toutefois, lorsque ces modifications sont soumises en BTU/h ou en pourcentage, la valeur soumise peut ne pas refléter exactement ce qui est appliqué. Cette différence vient du fait que ces unités sont converties en watts, puis appliquées (la conversion peut entraîner une erreur d'arrondi). Gestion de l'alimentation 373 Règle de redondance Cette option vous permet de sélectionner l'une des options suivantes : • Sans redondance : la puissance des blocs d'alimentation est utilisée pour alimenter l'ensemble du châssis, y compris le châssis, les serveurs, les modules d'E/S, iKVM et CMC. Aucun bloc d'alimentation ne doit être gardé en réserve. REMARQUE : le mode Sans redondance utilise uniquement le nombre minimum requis de blocs d'alimentation en même temps. Si le nombre minimum de blocs d'alimentation est installé, il n'y a pas de sauvegarde disponible. La panne de l'un des trois blocs d'alimentation utilisés peut provoquer une perte d'alimentation et/ou de données sur les serveurs. Si le nombre de blocs d'alimentation requis est dépassé, les blocs d'alimentation supplémentaires peuvent être placés en mode de veille afin d'améliorer l'efficacité énergétique si le mode Enclenchement dynamique des blocs d'alimentation est activé. • Redondance des blocs d'alimentation : la capacité du bloc d'alimentation nominal le plus important dans le châssis est conservée comme alimentation de réserve, garantissant ainsi le maintien de la mise sous tension des modules serveurs ou du châssis en cas de défaillance de l'un des blocs d'alimentation (unité de remplacement). Le mode Redondance des blocs d'alimentation peut ne pas utiliser tous les blocs installés. Les blocs d'alimentation supplémentaires, s'ils sont présents, peuvent être mis en veille afin d'améliorer l'efficacité énergétique si le mode d'enclenchement dynamique des blocs d'alimentation est activé. Le mode Redondance des blocs d'alimentation empêche toute activation des modules de serveur lorsque la consommation de courant du châssis dépasse l'alimentation nominale. La panne de deux blocs d'alimentation peut entraîner la mise hors tension de tout ou partie des modules de serveur se trouvant dans le châssis. Les performances des modules serveurs ne sont pas dégradées dans ce mode. • Redondance de l'alimentation alternative : ce mode sépare la moitié des unités d'alimentation en deux réseaux d'alimentation (par exemple, les unités d'alimentation 1 à 3 composent le réseau d'alimentation 1 et les unités d'alimentation 4 à 6 le réseau d'alimentation 2). La panne d'une unité d'alimentation ou la perte de l'alimentation alternative vers un réseau indique la perte de la redondance. Tableau 9-16. Propriétés du budget/de la redondance d'alimentation configurables (suite) Élément Description374 Gestion de l'alimentation Performance du serveur contre redondance de l'alimentation Lorsqu'elle est activée, cette option favorise la performance du serveur et sa mise sous tension plutôt que le maintien de la redondance de l'alimentation. Pour des informations supplémentaires sur cette fonctionnalité, voir « Performance du serveur contre redondance de l'alimentation », à la page 350. Enclenchement dynamique des blocs d'alimentation Permet la gestion d'énergie dynamique lorsque sélectionné. En mode Enclenchement dynamique, les blocs d'alimentation sont activés (en ligne) ou désactivés (en veille) en fonction de la consommation électrique afin d'optimiser la consommation énergétique dans l'ensemble du châssis. Par exemple, si votre budget d'alimentation s'élève à 5000 watts, votre stratégie de redondance est définie en mode Redondance de l'alimentation alternative et vous disposez de 6 unités d'alimentation. CMC définit 4 unités d'alimentation destinées à la redondance alternative alors que les deux autres restent en mode Veille. Si 2 000 W supplémentaires sont requis pour les nouveaux serveurs installés ou si l'efficacité de l'alimentation de la configuration système existante doit être améliorée, les deux blocs d'alimentation en veille sont alors activés. Désactiver le bouton d'alimentation du châssis Désactive le bouton d'alimentation du châssis lorsque sélectionné. Si la case est cochée et si vous tentez de modifier l'état de l'alimentation du châssis en appuyant sur le bouton d'alimentation du châssis, l'opération est ignorée. Autoriser le fonctionnement 110 VCA Permet une utilisation normale, si les unités d'alimentation sont connectées à une entrée 110 VCA, lorsque sélectionné. Pour plus d'informations, voir « Fonctionnement des unités d'alimentation 110 V», à la page 349. Mode de conservation max Lorsque sélectionné, active immédiatement le mode de conservation maximale de la puissance. Pour plus d'informations, voir « Modes Conservation d'énergie et Conservation max », à la page 348. Tableau 9-16. Propriétés du budget/de la redondance d'alimentation configurables (suite) Élément DescriptionGestion de l'alimentation 375 Utilisation de la RACADM Pour activer la redondance et définir la règle de redondance : REMARQUE : vous devez disposer du privilège Administrateur de configuration du châssis pour effectuer des tâches de gestion de l'alimentation. 1 Ouvrez une console série/Telnet/SSH d'accès à CMC, puis ouvrez une session. 2 Définissez les propriétés selon vos besoins : • Pour sélectionner une règle de redondance, entrez la commande : racadm config -g cfgChassisPower -o cfgChassisRedundancyPolicy (valeur) est 0 (Sans redondance), 1 (Redondance de l'alimentation alternative) ou 2 (Redondance des blocs d'alimentation). La valeur par défaut est 0. Par exemple, la commande suivante : racadm config -g cfgChassisPower -o cfgChassisRedundancyPolicy 1 définit la règle de redondance sur 1. • Pour activer ou désactiver l'enclenchement dynamique des unités d'alimentation, entrez la commande : racadm config -g cfgChassisPower -o cfgChassisDynamicPSUEngagementEnable (valeur) est 0 (désactiver) ou 1 (activer). La valeur par défaut est 0. Par exemple, la commande suivante : racadm config -g cfgChassisPower -o cfgChassisDynamicPSUEngagementEnable 0 désactive l'enclenchement dynamique des unités d'alimentation. Pour des information sur les commandes RACADM pour l'alimentation du châssis, voir les sections config, getconfig, getpbinfo et cfgChassisPower dans le RACADM Command Line Reference Guide for iDRAC6 and CM (Guide de référence de la ligne de commande RACADM pour iDRAC6 et CMC).376 Gestion de l'alimentation Affectation de niveaux de priorité aux serveurs Les niveaux de priorité déterminent les serveurs qui doivent alimenter le contrôleur CMC lorsqu'il a besoin de puissance supplémentaire. REMARQUE : la priorité que vous affectez à un serveur est liée au logement dans lequel il est installé et non au serveur lui-même. Si vous déplacez le serveur, vous devez redéfinir la priorité à partir de son nouveau logement. REMARQUE : vous devez disposer du privilège Administrateur de configuration du châssis pour effectuer des tâches de gestion de l'alimentation. Utilisation de l'interface Web Pour affecter les niveaux de priorité à l'aide de l'interface Web du CMC : 1 Ouvrez une session sur l'interface Web de CMC. 2 Cliquez sur Présentation des serveurs dans l'arborescence. La page Condition du serveur s'affiche. 3 Cliquez sur Alimentation→ Priorité des serveurs. La page Priorité des serveurs affiche tous les serveurs installés dans le châssis. 4 Sélectionnez un niveau de priorité (de 1 à 9, 1 étant le niveau le plus élevé) pour le ou les serveurs de votre choix. La valeur par défaut est 1. Vous pouvez affecter le même niveau de priorité à plusieurs serveurs. 5 Cliquez sur Appliquer pour enregistrer les modifications. Utilisation de la RACADM Ouvrez une console texte série/Telnet/SSH d'accès à CMC, ouvrez une session et entrez : racadm config -g cfgServerInfo -o cfgServerPriority -i (numéro de logement) (de 1 à 16) correspond au logement du serveur et (niveau de priorité) est une valeur comprise entre 1 et 9. Par exemple, la commande suivante : racadm config -g cfgServerInfo -o cfgServer Priority -i 5 1 définit le niveau de priorité sur 1 pour le serveur dans le logement 5.Gestion de l'alimentation 377 Définition du bilan de puissance REMARQUE : vous devez disposer du privilège Administrateur de configuration du châssis pour effectuer des tâches de gestion de l'alimentation. Utilisation de l'interface Web Pour définir le bilan de puissance à l'aide de l'interface Web CMC : 1 Ouvrez une session sur l'interface Web de CMC. 2 Cliquez sur Présentation du châssis dans l'arborescence. La page Intégrité du châssis s'affiche. 3 Cliquez sur l'onglet Alimentation. La page État de la consommation énergétique s'affiche. 4 Cliquez sur le sous-onglet Configuration. La page Configuration du bilan/de la redondance s'affiche. 5 Entrez une valeur d'allocation d'énergie allant jusqu'à 11 637 watts dans le champ textuel Limite de la puissance d'entrée système. REMARQUE : le bilan d'alimentation maximal correspond à l'alimentation de l'ensemble de trois unités d'alimentation le plus faible. Si vous tentez de définir une valeur du bilan d'alimentation alternative supérieure, CMC affiche un message de panne. REMARQUE : lorsque des modifications de valeur sont spécifiées en watts, la valeur suggérée reflète exactement ce qui est réellement appliqué. Toutefois, lorsque les modifications sont soumises en BTU/h ou en pourcentage, la valeur soumise peut ne pas refléter exactement ce qui est réellement appliqué. Cette différence vient du fait que ces unités sont converties en watts, puis appliquées (la conversion peut entraîner une erreur d'arrondi). 6 Cliquez sur Appliquer pour enregistrer les modifications. Utilisation de la RACADM Ouvrez une console texte série/Telnet/SSH d'accès à CMC, ouvrez une session et entrez : racadm config -g cfgChassisPower -o cfgChassisPowerCap 378 Gestion de l'alimentation où (valeur) est un nombre compris entre 2 715 et 16 685 qui représente la limite d'alimentation maximale en watts. La valeur par défaut est 16685. Par exemple, la commande suivante : racadm config -g cfgChassisPower -o cfgChassisPowerCap 5400 définit le bilan de puissance maximal sur 5 400 watts. REMARQUE : la limite du bilan d'alimentation correspond à 16685 watts. Si vous tentez de définir une valeur de bilan d'alimentation alternative supérieure à la capacité d'alimentation du châssis, CMC affiche un message de panne. Diminution de l'alimentation des serveurs afin de préserver le bilan d'alimentation CMC réduit les allocations d'alimentation des serveurs de priorité inférieure lorsqu'une alimentation supplémentaire s'avère nécessaire afin de maintenir la consommation électrique du système dans la limite de la puissance d'entrée système configurée par l'utilisateur. Par exemple, lorsqu'un nouveau serveur est activé, CMC peut réduire l'alimentation des serveurs de priorité inférieure afin de libérer davantage d'alimentation pour le nouveau serveur. Si cette alimentation demeure insuffisante après réduction des allocations d'alimentation des serveurs de priorité inférieure, CMC diminue les performances des serveurs jusqu'à libération d'une alimentation suffisante pour le nouveau serveur. CMC réduit l'allocation d'alimentation des serveurs dans deux cas : • La consommation électrique globale excède la limite de la puissance d'entrée système configurable (voir « Définition du bilan de puissance », à la page 377.) • Une panne d'alimentation survient dans le cadre d'une configuration non redondante Pour plus d'informations sur l'attribution de niveaux de priorité aux serveurs, voir « Exécution de tâches de contrôle de l'alimentation sur le châssis », à la page 379.Gestion de l'alimentation 379 Exécution de tâches de contrôle de l'alimentation sur le châssis REMARQUE : vous devez disposer du privilège Administrateur de configuration du châssis pour effectuer des tâches de gestion de l'alimentation. REMARQUE : les opérations de contrôle de l'alimentation affectent l'intégralité du châssis. Pour les tâches de contrôle de l'alimentation effectuées sur un module d'E/S, voir « Exécution d'opérations de contrôle de l'alimentation sur un module d'E/S », à la page 381. Pour les tâches de contrôle de l'alimentation effectuées sur des serveurs, voir « Exécution de tâches de contrôle de l'alimentation sur un serveur », à la page 382. CMC vous permet d'exécuter à distance plusieurs opérations de gestion de l'alimentation, comme par exemple une séquence d'arrêt correcte, sur l'ensemble du châssis (châssis, serveurs, modules d'E/S, iKVM et unités d'alimentation). Utilisation de l'interface Web Pour exécuter des opérations de contrôle de l'alimentation sur l'interface Web CMC : 1 Ouvrez une session sur l'interface Web de CMC. 2 Cliquez sur Présentation du châssis dans l'arborescence. 3 Cliquez sur l'onglet Alimentation. La page État de la consommation énergétique s'affiche. 4 Cliquez sur le sous-onglet Contrôle. La page Contrôle de l'alimentation du châssis s'affiche. 5 Cliquez sur les boutons radio correspondant pour sélectionner l'une des opérations de contrôle de l'alimentation suivantes : • Mise sous tension du système : met le châssis sous tension (équivaut à appuyer sur le bouton d'alimentation quand le châssis est désactivé). Cette option est désactivée si le châssis est déjà sous tension. REMARQUE : cette action met le châssis et autres sous-systèmes (iDRAC sur les serveurs, les modules d'E/S et le module iKVM) sous tension. Les serveurs ne sont pas mis sous tension. 380 Gestion de l'alimentation • Mise hors tension du système : met le châssis hors tension. Cette option est désactivée si le châssis est déjà hors tension. REMARQUE : cette action met le châssis hors tension (châssis, serveurs, modules d'E/S, module iKVM et blocs d'alimentation). Les modules CMC restent sous tension, mais en veille virtuelle ; dans cet état, un bloc d'alimentation et des ventilateurs refroidissent les modules CMC. Le bloc d'alimentation alimente également le ventilateurs qui fonctionne à vitesse réduite. • Exécuter un cycle d'alimentation sur le système (redémarrage à froid) : arrête, puis redémarre le système. Cette option est désactivée si le châssis est déjà hors tension. REMARQUE : cette action met hors tension puis redémarre l'ensemble du châssis (le châssis, les serveurs configurés pour être sous tension en permanence, les modules d'E/S, l'iKVM et les blocs d'alimentation). • Réinitialiser CMC : réinitialise CMC sans arrêter le système (redémarrage à chaud). (Cette option est désactivée lorsque CMC est déjà arrêté.) REMARQUE : cette action redémarre uniquement CMC. Elle n'a aucun effet sur les autres composants. • Arrêt anormal : force la coupure de l'alimentation de tout le châssis (châssis, serveurs, modules d'E/S, module iKVM et blocs d'alimentation). Cette action ne permet pas l'arrêt normal du système d'exploitation des serveurs avant la mise hors tension. 6 Cliquez sur Appliquer. Une boîte de dialogue vous invite à confirmer l'opération. 7 Cliquez sur OK pour exécuter l'action de gestion de l'alimentation (réinitialisation du système, par exemple). Utilisation de la RACADM Ouvrez une console texte série/Telnet/SSH d'accès à CMC, ouvrez une session et entrez : racadm chassisaction -m chassis a pour valeur powerup (mise sous tension), powerdown (mise hors tension), powercycle (cycle d'alimentation), nongraceshutdown (coupure franche) ou reset (réinitialisation).Gestion de l'alimentation 381 Exécution d'opérations de contrôle de l'alimentation sur un module d'E/S Vous pouvez exécuter à distance une opération de réinitialisation ou lancer un cycle d'alimentation sur un module d'E/S. REMARQUE : vous devez disposer du privilège Administrateur de configuration du châssis pour effectuer des tâches de gestion de l'alimentation. Utilisation de l'interface Web Pour exécuter des opérations de contrôle de puissance sur un module d'E/S à l'aide de l'interface Web CMC : 1 Ouvrez une session sur l'interface Web de CMC. 2 Sélectionnez Présentation des modules d'E/S. La page État des modules d'E/S s'affiche. 3 Cliquez sur l'onglet Alimentation. La page Contrôle de l'alimentation s'affiche. 4 Sélectionnez l'opération à exécuter (réinitialiser ou cycle d'alimentation) dans le menu déroulant situé en regard du module d'E/S correspondant dans la liste. 5 Cliquez sur Appliquer. Une boîte de dialogue vous invite à confirmer l'opération. 6 Cliquez sur OK pour exécuter l'action de gestion de l'alimentation (par exemple, lancer un cycle d'alimentation du module d'E/S). Utilisation de la RACADM Pour exécuter des opérations de contrôle de puissance sur un module d'E/S à l'aide de RACADM : Ouvrez une console texte série/Telnet/SSH d'accès à CMC, ouvrez une session et entrez : racadm chassisaction -m switch- est un nombre compris entre 1 et 6 qui indique le module d'E/S (A1, A2, B1, B2, C1, C2) et l'opération à exécuter : powercycle or reset. (cycle d'alimentation ou réinitialisation.)382 Gestion de l'alimentation Exécution de tâches de contrôle de l'alimentation sur un serveur REMARQUE : vous devez disposer du privilège Administrateur de configuration du châssis pour effectuer des tâches de gestion de l'alimentation. CMC vous permet d'exécuter à distance plusieurs actions de gestion de l'alimentation sur un serveur donné du châssis, par exemple une séquence d'arrêt correcte. Utilisation de l'interface Web Pour exécuter des opérations de contrôle d'alimentation sur un serveur à l'aide de l'interface Web : 1 Ouvrez une session sur l'interface Web de CMC. 2 Développez Présentation des serveurs dans l'arborescence système, puis sélectionnez le serveur auquel vous souhaitez appliquer une opération de contrôle de l'alimentation. La page Condition du serveur s'affiche. 3 Cliquez sur l'onglet Alimentation. La page Gestion de l'alimentation du serveur s'affiche. 4 État de l'alimentation : affiche l'un des états d'alimentation du serveur suivants : • S/O : CMC n'a pas encore déterminé l'état d'alimentation du serveur. • Désactivé : le serveur ou le châssis est hors tension. • Activé : le châssis et le serveur sont sous tension. • Activation : état temporaire entre le mode Désactivé et Activé. Lorsque l'action est terminée, l'État d'alimentation est activé. • Mise hors tension : état temporaire entre le mode Activé et Désactivé. Lorsque l'action est terminée, l'État d'alimentation est désactivé. 5 Sélectionnez l'une des opérations de contrôle de l'alimentation suivantes en cliquant sur le bouton d'option correspondant : • Mise sous tension du système : met le serveur sous tension (équivaut à appuyer sur le bouton d'alimentation quand le système est hors tension). Cette option est désactivée si le serveur est déjà sous tension. • Mise hors tension du système : met le serveur hors tension (équivaut à appuyer sur le bouton d'alimentation quand le système est sous tension). • Arrêt normal : arrête le serveur, puis le redémarre.Gestion de l'alimentation 383 • Réinitialisation du serveur (redémarrage à chaud) : redémarre le serveur sans l'arrêter. Cette option est désactivée si le serveur est hors tension. • Mettre le serveur en cycle d'alimentation (redémarrage à froid) : arrête, puis redémarre le serveur. Cette option est désactivée si le serveur est hors tension. 6 Cliquez sur Appliquer. Une boîte de dialogue vous invite à confirmer l'opération. 7 Cliquez sur OK pour lancer la tâche de gestion de l'alimentation (réinitialisation du serveur, par exemple). REMARQUE : toutes les opérations de contrôle de l'alimentation peuvent être effectuées sur plusieurs serveurs depuis la page Serveurs→ Alimentation→ Contrôle. Utilisation de la RACADM Pour exécuter des opérations de contrôle de puissance sur un serveur à l'aide de RACADM : Ouvrez une console texte série/Telnet/SSH d'accès à CMC, ouvrez une session et entrez : racadm serveraction -m désigne le serveur par son numéro d'emplacement dans le châssis (de 1 à 16) et indique l'opération à exécuter : powerup (mettre sous tension), powerdown (mettre hors tension), powercycle (cycle d'alimentation), graceshutdown (arrêt normal) ou hardreset (réinitialisation matérielle). Fonctionnement 110 V Certains modèles d'unités d'alimentation sont capables de fonctionner à la fois en 220 V et 110 V. L'alimentation 110 V peut avoir une capacité limitée ; lorsqu'une connexion 110 V est détectée, le châssis n'accorde pas de demande supplémentaire d'alimentation de serveur jusqu'à ce que l'utilisateur accepte le fonctionnement 110 V en changeant la propriété de configuration de la puissance. L'utilisateur doit vérifier que le circuit 110 V en cours d'utilisation peut fournir la puissance nécessaire pour la configuration du châssis avant l'acceptation. Après acceptation, le châssis accorde toutes les futures demandes appropriées d'alimentation de serveur et utilise toute la capacité de puissance disponible.384 Gestion de l'alimentation L'utilisateur peut réinitialiser l'acceptation du 110V à tout moment depuis l'interface graphique ou RACADM après l'installation initiale. Les entrées de blocs d'alimentation sont enregistrées dans le journal lorsque les blocs d'alimentation 110V sont détectés et retirés. Les entrées de blocs sont également enregistrées dans le journal lorsqu'ils sont reconnus ou non reconnus par l'utilisateur. L'intégrité globale énergétique est au moins à l'état non critique lorsque le châssis est en mode 110 V et que l'utilisateur n'a pas reconnu ce mode. L'icône « Avertissement » est affichée sur la page principale de l'interface utilisateur quand l'état est non critique. Le mode mixte 110 V et 220 V n'est pas pris en charge. Si CMC détecte que les deux tensions sont en cours d'utilisation, une tension est sélectionnée et les blocs d'alimentation reliés à l'autre tension sont mis hors tension et marqués comme défaillants. Gestion de l'alimentation externe La gestion de l'alimentation du CMC est contrôlée en option par le PM3 (« Power Measure, Mitigate, and Manage Console »). Pour plus d'informations, voir le Guide d'utilisation PM3. Lorsque la gestion externe d'alimentation est activée, PM3 gère : • Alimentation serveur des serveurs de 12e génération • Priorité de serveur des serveurs de 12e génération • Capacité maximale de l'alimentation d'entrée du système • Mode de conservation de puissance maximale Le CMC continue à maintenir et à gérer : • Règle de redondance • Connexion à l'alimentation à distance • Performance du serveur contre redondance de l'alimentation • Enclenchement dynamique des blocs d'alimentation • Alimentation serveur de serveurs de 11e génération et antérieure PM3 gère ainsi la prioritisation et l'alimentation des serveurs lames de 12e génération dans le châssis à partir du budget disponible après l'attribution d'alimentation à l'infrastructure du châssis et aux serveurs lames de génération antérieure. La connexion à l'alimentation à distance n'est pas affectée par la gestion de l'alimentation externe. Gestion de l'alimentation 385 Utilisation de l'interface Web Pour activer la gestion externe PM3 : 1 Connectez-vous au châssis à l'aide des privilèges Administrateur de configuration de châssis. 2 Cliquez sur Présentation du châssis dans l'arborescence. 3 Cliquez sur Alimentation→ Configuration. La page Configuration de la redondance/du budget s'affiche. 4 Définissez le Mode de gestion de l'alimentation basé sur le serveur. 5 Cliquez sur Appliquer. Une fois le Mode de gestion de l'alimentation basé sur le serveur est activé, le châssis est prêt pour la gestion PM3. Toutes les priorités de serveur de 12e génération sont établies au niveau 1 (élevé). PM3 gère directement l'alimentation et les priorités de serveur. Puisque PM3 contrôle les attributions d'alimentation de serveur compatibles, CMC ne contrôle plus le Mode de conservation d'alimentation maximale. Par conséquent, cette sélection est désactivée. Lorsque le Mode de conservation d'alimentation maximale est activé, le CMC définit la Capacité de puissance d'entrée du système au maximum de la capacité de gestion du châssis. CMC ne permet pas d'excéder la capacité la plus élevée. Cependant, PM3 gère toutes les autres limitations de capacité d'alimentation. Pour désactiver la gestion externe d'alimentation : 1 Connectez-vous au châssis à l'aide des privilèges Administrateur de configuration de châssis. 2 Cliquez sur Présentation du châssis dans l'arborescence. 3 Cliquez sur Alimentation→ Configuration. La page Configuration de la redondance/du budget s'affiche. 4 Définissez le Mode de gestion de l'alimentation basé sur le serveur. 5 Cliquez sur Appliquer. Lorsque la gestion PM3 d'alimentation est désactivée, le CMC revient à l'état des paramètres de priorité du serveur avant l'activation de la gestion externe. REMARQUE : lorsque la gestion PM3 est désactivée, le CMC ne revient pas à l'état des paramètres antérieurs d'alimentation maximale du châssis. Voir le journal MC pour les paramètres antérieurs pour une restauration manuelle des valeurs. 386 Gestion de l'alimentation Utilisation de la RACADM Ouvrez une console texte série/Telnet/SSH dans le CMC avec des privilèges d'Administrateur de configuration de châssis. Pour activer la gestion de l'alimentation à distance avec PM3, entrez : racadm config -g cfgChassisPower -o cfgChassisServerBasedPowerMgmtMode 1 Pour restaurer la gestion de l'alimentation CMC, entrez : racadm config -g cfgChassisPower -o cfgChassisServerBasedPowerMgmtMode 0 Lorsque la gestion de l'alimentation PM3 est désactivée, le CMC revient à l'état des paramètres de priorité du serveur avant l'activation de la gestion externe. REMARQUE : lorsque la gestion PM3 est désactivée, le CMC ne revient pas à l'état des paramètres antérieurs d'alimentation maximale du châssis. Voir le journal MC pour les paramètres antérieurs pour une restauration manuelle des valeurs. Dépannage Pour le dépannage de problèmes d'alimentation et de puissance, voir « Dépannage et récupération », à la page 433.Utilisation du module iKVM 387 Utilisation du module iKVM Présentation Le module KVM d'accès local destiné à votre châssis de serveur Dell M1000e est appelé Avocent Integrated KVM Switch Module, ou iKVM. iKVM est un commutateur clavier, vidéo et souris analogique qui se branche sur votre châssis. Ce module de châssis enfichable à chaud en option offre un accès clavier, souris et vidéo local aux serveurs du châssis et à la ligne de commande du contrôleur CMC actif. Interface utilisateur d'iKVM iKVM utilise l'interface graphique utilisateur OSCAR (On Screen Configuration and Reporting/génération de rapports et configuration à l'écran), activée par un raccourci clavier. OSCAR vous permet de sélectionner un des serveurs ou la ligne de commande Dell CMC auquel vous souhaitez accéder avec le clavier, l'affichage et la souris locaux. Une seule session iKVM par châssis est autorisée. Sécurité L'interface utilisateur OSCAR vous permet de protéger votre système avec un mot de passe d'économiseur d'écran. Après un temps défini par l'utilisateur, le mode économiseur d'écran s'active et l'accès est interdit jusqu'à ce que le mot de passe approprié soit saisi pour réactiver OSCAR. Balayage OSCAR vous permet de sélectionner une liste de serveurs qui sont affichés dans l'ordre sélectionné lorsque OSCAR est en mode de balayage. 388 Utilisation du module iKVM Identification des serveurs CMC attribue des noms de logements à tous les serveurs du châssis. Bien que vous puissiez attribuer des noms aux serveurs à l'aide de l'interface OSCAR depuis une connexion à plusieurs couches, les noms attribués par CMC sont prioritaires et tous les nouveaux noms que vous attribuez aux serveurs à l'aide d'OSCAR sont écrasés. CMC identifie un logement en lui attribuant un nom unique. Pour changer les noms des logements à l'aide de l'interface Web CMC, voir « Modification du nom d'un logement ». Pour changer le nom d'un logement avec RACADM, consultez la section setslotname dans le Guide de référence de la ligne de commande pour iDRAC7 et CMC. Vidéo Les connexions vidéo d'iKVM prennent en charge les résolutions d'affichage vidéo comprises entre 640 x 480 à 60 Hz et 1280 x 1024 à 60 Hz. Plug and Play iKVM prend en charge Plug and Play du canal d'affichage des données (DDC), qui automatise la configuration du moniteur vidéo, et est conforme à la norme VESA DDC2B. Évolutif FLASH Vous pouvez mettre à jour le micrologiciel iKVM à l'aide de l'interface Web de CMC ou de la commande fwupdate RACADM. Pour plus d'informations, voir « Gestion d'iKVM depuis CMC », à la page 407. Interfaces de connexion physique Vous pouvez vous connecter à un serveur ou à la console de l'interface de ligne de commande de CMC via iKVM depuis le panneau avant du châssis, une interface de console analogique (ACI) et le panneau arrière du châssis. REMARQUE : les ports du panneau de configuration avant du châssis sont conçus spécifiquement pour iKVM, qui est en option. Si vous ne possédez pas iKVM, vous ne pouvez pas utiliser les ports du panneau de configuration avant.Utilisation du module iKVM 389 Priorités de connexion d'iKVM Une seule connexion iKVM est disponible à la fois. iKVM attribue un ordre de priorité à chaque type de connexion afin qu'en présence de plusieurs connexions, une seule connexion soit disponible tandis que les autres sont désactivées. L'ordre de priorité pour les connexions d'iKVM est le suivant : 1 Panneau avant 2 ACI 3 Panneau arrière Par exemple, si les connexions d'iKVM sont situées sur le panneau avant et sur l'ACI, la connexion du panneau avant reste active tandis que la connexion de l'ACI est désactivée. En cas de connexions de l'ACI et du panneau arrière, la connexion de l'ACI devient prioritaire. Affectation de plusieurs couches via la connexion de l'ACI iKVM autorise les connexions auxquelles sont affectées plusieurs couches avec les serveurs et la console de ligne de commande CMC d'iKVM, soit en local via un port Remote Console Switch, soit à distance via le logiciel Dell RCS. iKVM prend en charge les connexions de l'ACI depuis les produits suivants : • Commutateurs Dell Remote Console 180AS, 2160AS, 2161DS*, 2161DS-2 ou 4161DS • Système de commutation Avocent AutoView • Système de commutation Avocent DSR • Système de commutation Avocent AMX * Ne prend pas en charge la connexion de la console Dell CMC. REMARQUE : iKVM prend également en charge une connexion de l'ACI vers les Dell 180ES et 2160ES, mais l'affectation de plusieurs couches ne se fait pas de façon transparente. Cette connexion exige un SIP USB vers PS2.390 Utilisation du module iKVM Utilisation d'OSCAR Cette section offre une présentation de l'interface OSCAR. Notions de base sur la navigation Tableau 10-1. Navigation dans OSCAR avec le clavier et la souris Touche ou séquence de touches Résultat • - N'importe laquelle de ces séquences de touches peut ouvrir OSCAR en fonction de vos paramètres Appeler OSCAR. Vous pouvez activer deux, trois ou l'intégralité de ces séquences de touches en cochant des cases dans la section Invoquer OSCAR de la boîte de dialogue Menu principal, puis en cliquant sur OK. • --- Ouvre l'écran Aide de la boîte de dialogue active. <Échap> Ferme la boîte de dialogue active sans enregistrer les modifications apportées et retourne à la boîte de dialogue précédente. Dans la boîte de dialogue Menu principal, <Échap> ferme l'interface OSCAR et retourne au serveur sélectionné. Dans une boîte de message, il ferme la boîte contextuelle et retourne à la boîte de dialogue active. Ouvre des boîtes de dialogue, sélectionne ou coche des options, et exécute des actions lorsqu'il est utilisé en conjonction avec les lettres soulignées ou d'autres caractères désignés. + Ferme la boîte de dialogue active et retourne à la boîte de dialogue précédente. + Sélectionne le bouton OK, puis retourne à la boîte de dialogue précédente. Termine une opération de commutateur dans la boîte de dialogue Menu principal et quitte OSCAR. Simple clic, Dans une zone de texte, sélectionne le texte à modifier et permet à la touche fléchée gauche et à la touche fléchée droite de déplacer le curseur. Appuyez à nouveau sur pour quitter le mode de modification.Utilisation du module iKVM 391 Configuration de l'OSCAR , Revient à la sélection précédente en l'absence d'autres séquences de touches. , +<0> Déconnecte immédiatement un utilisateur d'un serveur ; aucun serveur n'est sélectionné. L'indicateur de condition affiche Disponible. (Cette action s'applique uniquement au =<0> du clavier et non à celui du pavé numérique.) , Active immédiatement le mode d'économiseur d'écran et empêche l'accès à cette console spécifique, si elle est protégée par mot de passe. Touches fléchées haut/bas Déplace le curseur de ligne en ligne dans les listes. Touches fléchées droite/gauche Déplace le curseur dans les colonnes lors de la modification d'une zone de texte. / Déplace le curseur vers le haut (Accueil) ou vers le bas (Fin) d'une liste. Supprime des caractères dans une zone de texte. Touches numérotées Tapez sur le clavier ou le pavé numérique. Désactivé. Pour changer la casse, utilisez la touche . Tableau 10-2. Fonctions du menu Configuration d'OSCAR Fonction Objectif Menu Change la liste des serveurs soit numériquement par logement, soit alphabétiquement par nom. Sécurité • Définit un mot de passe pour restreindre l'accès aux serveurs. • Active un économiseur d'écran et définit un temps d'inactivité avant l'apparition de l'économiseur d'écran et définit le mode d'économie d'écran. Indicateur Change l'affichage, la synchronisation, la couleur ou l'emplacement de l'indicateur de condition. Langue Change la langue de tous les écrans OSCAR. Tableau 10-1. Navigation dans OSCAR avec le clavier et la souris (suite) Touche ou séquence de touches Résultat392 Utilisation du module iKVM Pour accéder à la boîte de dialogue Configuration : 1 Appuyez sur la touche pour lancer l'interface OSCAR. La boîte de dialogue Menu principal s'affiche. 2 Cliquez sur Configuration. La boîte de dialogue Configuration apparaît. Modification du comportement d'affichage Utilisez la boîte de dialogue Menu pour changer l'ordre d'affichage des serveurs et définir un temps de retard d'affichage de l'écran pour OSCAR. Pour accéder à la boîte de dialogue Menu : 1 Appuyez sur pour lancer OSCAR. La boîte de dialogue Menu principal s'affiche. 2 Cliquez sur Configuration, puis sur Menu. La boîte de dialogue Menu s'affiche. Pour choisir l'ordre d'affichage par défaut des serveurs dans la boîte de dialogue Menu principal : 1 Sélectionnez Nom pour afficher les serveurs par nom, dans l'ordre alphabétique. ou Sélectionnez Logement pour afficher les serveurs par numéro de logement. 2 Cliquez sur OK. Pour attribuer une ou plusieurs séquences de touches pour l'activation de l'OSCAR : Sélectionnez une séquence de touche depuis le menu Appeler OSCAR, puis cliquez sur OK. La touche par défaut d'appel de l'OSCAR est . Diffusion Configure pour contrôler simultanément plusieurs serveurs par des actions sur le clavier et la souris. Balayage Configure une séquence de balayage personnalisée pour un maximum de 16 serveurs. Tableau 10-2. Fonctions du menu Configuration d'OSCAR Fonction ObjectifUtilisation du module iKVM 393 Pour définir un temps de retard d'affichage de l'écran pour OSCAR : 1 Entrez le nombre de secondes (de 0 à 9) pendant lesquelles l'affichage d'OSCAR doit être retardé après que vous appuyez sur . Entrez <0> pour lancer OSCAR immédiatement. 2 Cliquez sur OK. Le paramétrage d'un temps de retard d'affichage d'OSCAR vous permet de terminer une commutation logicielle. Pour procéder à une commutation logicielle, voir « Commutation logicielle », à la page 397. Contrôle de l'indicateur de condition L'indicateur de condition s'affiche sur votre bureau de travail et indique le nom du serveur sélectionné ou la condition du logement sélectionné. Utilisez la boîte de dialogue Indicateur pour configurer l'indicateur à afficher par serveur ou pour changer la couleur, l'opacité, le temps d'affichage et l'emplacement de l'indicateur sur le bureau. Pour accéder à la boîte de dialogue Indicateur : 1 Appuyez sur . La boîte de dialogue Menu principal s'affiche. 2 Cliquez sur Configuration, puis sur Indicateur. La boîte de dialogue Indicateur apparaît. Pour spécifier le mode d'affichage de l'indicateur de condition : 1 Sélectionnez Affiché pour afficher l'indicateur en permanence ou Affiché et synchronisé pour afficher l'indicateur pendant seulement cinq secondes après la commutation. REMARQUE : si vous sélectionnez Synchronisé uniquement, l'indicateur n'est pas affiché. Tableau 10-3. Indicateurs de condition d'OSCAR Indicateur Description Type d'indicateur par nom Indicateur indiquant que l'utilisateur a été déconnecté de tous les systèmes Indicateur indiquant que le mode Diffusion est activé394 Utilisation du module iKVM 2 Sélectionnez une couleur d'indicateur dans la section Couleur d'affichage. Les options disponibles sont le noir, le rouge, le bleu et le violet. 3 Dans Mode d'affichage, sélectionnez Opaque pour obtenir un indicateur de couleur opaque ou Transparent pour voir le bureau à travers l'indicateur. 4 Pour positionner l'indicateur de condition sur le bureau : a Cliquez sur Définir la position. L'indicateur de définition de position apparaît. b Cliquez avec le bouton gauche sur la barre de titre et faites-la glisser vers l'emplacement souhaité sur le bureau. c Cliquez avec le bouton droit pour retourner à la boîte de dialogue Indicateur. REMARQUE : les modifications apportées à la position de l'indicateur ne sont pas enregistrées tant que vous n'avez pas cliqué sur OK dans la boîte de dialogue Indicateur. 5 Cliquez sur OK pour enregistrer les paramètres. Pour quitter sans enregistrer les modifications, cliquez sur . Gestion de serveurs avec iKVM iKVM est une matrice de commutateur analogique prenant en charge jusqu'à 16 serveurs. Le commutateur iKVM utilise l'interface utilisateur OSCAR pour sélectionner et configurer vos serveurs. iKVM inclut en outre une entrée système permettant d'établir une connexion de console de ligne de commande CMC avec CMC. Compatibilité des périphériques et prise en charge iKVM est compatible avec les périphériques suivants : • Claviers USB PC standard avec dispositions QWERTY, QWERTZ, AZERTY et Japonais 109. • Moniteurs VGA avec prise en charge DDC. • Périphériques de pointage USB standard. • Concentrateurs USB 1.1 auto-alimentés connectés au port USB local sur iKVM. • Concentrateurs USB 2.0 alimentés connectés à la console du panneau avant du châssis Dell M1000e.Utilisation du module iKVM 395 REMARQUE : vous pouvez utiliser plusieurs claviers et plusieurs souris sur le port USB local d'iKVM. iKVM rassemble les signaux d'entrée. Si des signaux d'entrée simultanés sont émis par plusieurs claviers ou souris USB, des résultats imprévisibles peuvent se produire. REMARQUE : les connexions USB sont destinées uniquement aux claviers, souris et concentrateurs USB pris en charge. iKVM ne prend pas en charge les données transmises par d'autres périphériques USB. Affichage et sélection de serveurs Utilisez la boîte de dialogue Menu principal de l'OSCAR pour afficher, configurer et gérer des serveurs via iKVM. Vous pouvez afficher vos serveurs par nom ou par logement. le numéro de logement correspond au numéro du logement occupé par le serveur dans le châssis. Ce numéro est indiqué dans la colonne Logement. REMARQUE : la ligne de commande Dell CMC occupe le logement 17. La sélection de ce logement permet d'afficher la ligne de commande CMC, à partir de laquelle vous pouvez exécuter les commandes RACADM ou vous connecter à la console série du serveur ou des modules d'E/S. REMARQUE : les noms de serveur et les numéros de logement sont attribués par le contrôleur CMC. Pour accéder à la boîte de dialogue Principale, procédez comme suit : Appuyez sur la touche pour lancer l'interface OSCAR. La boîte de dialogue Menu principal s'affiche. ou Si un mot de passe est défini, la boîte de dialogue Mot de passe s'affiche. Entrez votre mot de passe et cliquez sur OK. La boîte de dialogue Menu principal s'affiche. Pour plus d'informations sur la définition d'un mot de passe, voir « Paramétrage de la sécurité de la console », à la page 399. REMARQUE : quatre options sont disponibles pour appeler OSCAR. Vous pouvez activer une, plusieurs ou l'intégralité de ces séquences de touches en cochant des cases dans la section Appeler OSCAR de la boîte de dialogue Menu principal, puis en cliquant sur OK.396 Utilisation du module iKVM Affichage de la condition de vos serveurs La condition des serveurs dans votre châssis est indiquée dans les colonnes de droite de la boîte de dialogue Menu principal. Le tableau suivant décrit les symboles de condition. Sélection des serveurs Utilisez la boîte de dialogue Menu principal pour sélectionner des serveurs. Lorsque vous sélectionnez un serveur, iKVM reconfigure le clavier et la souris sur les paramètres appropriés pour ce serveur. • Pour sélectionner des serveurs : Double-cliquez sur le nom de serveur ou le numéro de logement. ou Si l'ordre d'affichage de votre liste de serveurs est défini par logement (à savoir, le bouton Logement est enfoncé), tapez le numéro de logement et appuyez sur . ou Si l'ordre d'affichage de votre liste de serveurs est défini par nom (à savoir, le bouton Nom est enfoncé), tapez les premiers caractères du nom du serveur, établissez-le comme nom unique et appuyez à deux reprises sur . • Pour sélectionner le serveur précédent : Appuyez sur , puis sur . Cette combinaison de touches alterne entre les connexions précédentes et actuelles. Tableau 10-4. Symboles de condition de l'interface OSCAR Symboles Description (Point vert.) Le serveur est en ligne. (X rouge.) Le serveur est hors ligne ou absent du châssis. (Point jaune.) Le serveur n'est pas disponible. (A ou B vert.) Le canal utilisateur indiqué par la lettre (A=panneau arrière, B=panneau avant) accède au serveur.Utilisation du module iKVM 397 • Pour déconnecter l'utilisateur d'un serveur : Appuyez sur pour accéder à OSCAR, puis cliquez sur Déconnecter. ou Appuyez sur , puis sur <0>. L'état devient disponible, sans serveur sélectionné. L'indicateur de condition sur votre bureau, s'il est actif, affiche Disponible. Voir « Contrôle de l'indicateur de condition », à la page 393. Commutation logicielle La commutation logicielle consiste à commuter entre les serveurs à l'aide d'une séquence de touches rapides. Pour basculer vers un serveur de cette manière, appuyez sur , puis tapez les premiers caractères de son nom ou de son numéro. Si vous avez défini précédemment un temps de délai (le nombre de secondes avant l'affichage de la boîte de dialogue Menu principal une fois que a été enfoncé) et que vous appuyez sur les séquences de touches avant que ce temps ne soit écoulé, l'interface OSCAR ne s'affiche pas. Pour configurer OSCAR pour la commutation logicielle : 1 Appuyez sur la touche pour lancer l'interface OSCAR. La boîte de dialogue Menu principal s'affiche. 2 Cliquez sur Configuration, puis sur Menu. La boîte de dialogue Menu s'affiche. 3 Sélectionnez Nom ou Logement pour la touche Afficher/Trier. 4 Entrez le temps de délai souhaité en secondes dans le champ Temps de délai d'affichage de l'écran. 5 Cliquez sur OK. Pour effectuer une commutation logicielle vers un serveur : • Pour sélectionner un serveur, appuyez sur . Si l'ordre d'affichage de votre liste de serveurs est défini par logement conformément à votre sélection à l'étape 3 (à savoir, le bouton Logement est enfoncé), tapez le numéro de logement et appuyez sur . ou398 Utilisation du module iKVM Si l'ordre d'affichage de votre liste de serveurs est défini par nom conformément à votre sélection à l'étape 3 (à savoir, le bouton Nom est enfoncé), tapez les premiers caractères du nom du serveur pour l'établir comme nom unique et appuyez sur . • Pour retourner au serveur précédent, appuyez sur , puis sur . Connexions vidéo iKVM ne comporte aucune connexion vidéo sur les panneaux avant et arrière du châssis. Les signaux de connexion du panneau avant sont prioritaires sur ceux du panneau arrière. Lorsqu'un moniteur est connecté au panneau avant, la connexion vidéo n'aboutit pas au panneau arrière et un message de l'OSCAR indique que les connexions KVM et ACI du panneau arrière sont désactivées. Si le moniteur est désactivé (à savoir, retiré du panneau avant ou désactivé par une commande CMC), la connexion ACI devient active tandis que la connexion KVM du panneau arrière reste désactivée. (Pour plus d'informations sur l'ordre de priorité des connexions, voir « Priorités de connexion d'iKVM ».) Pour plus d'informations sur l'activation ou la désactivation de la connexion du panneau avant, voir « Activation ou désactivation du panneau avant ». Avertissement de préemption Normalement, un utilisateur connecté à une console de serveur via iKVM et un autre utilisateur connecté à la même console de serveur via la fonction de redirection de console de la console d'interface utilisateur d'iDRAC ont tous deux accès à la console et peuvent effectuer une saisie simultanément. Pour empêcher que ce scénario ne se produise, l'utilisateur distant, avant de lancer la redirection de console d'interface utilisateur d'iDRAC, peut désactiver la console locale dans l'interface Web d'iDRAC. L'utilisateur local d'iKVM voit un message OSCAR indiquant que la connexion sera préemptée dans un délai spécifié. L'utilisateur local doit terminer son travail avant que la fin de la connexion d'iKVM au serveur. Aucune fonction de préemption n'est disponible pour l'utilisateur iKVM. REMARQUE : si un utilisateur distant iDRAC a désactivé la vidéo locale pour un serveur spécifique, la vidéo, le clavier et la souris de ce serveur seront indisponibles pour iKVM. L'état du serveur est marqué d'un point jaune dans le menu OSCAR pour indiquer qu'il est verrouillé ou indisponible pour un usage local (voir « Affichage de la condition de vos serveurs »). Utilisation du module iKVM 399 Paramétrage de la sécurité de la console OSCAR vous permet de configurer les paramètres de sécurité sur votre console iKVM. Vous pouvez établir un mode d'économiseur d'écran qui s'active lorsque votre console reste inutilisée pendant un délai spécifié. Une fois ce mode activé, votre console demeure verrouillée jusqu'à ce que vous appuyiez sur une touche quelconque ou déplaciez le curseur. Entrez le mot de passe d'activation de l'économiseur d'écran pour continuer. Utilisez la boîte de dialogue Sécurité pour verrouiller votre console en instaurant une protection par mot de passe, définir ou changer votre mot de passe, ou activer l'économiseur d'écran. REMARQUE : si le mot de passe iKVM est perdu ou oublié, vous pouvez le réinitialiser sur les paramètres par défaut d'iKVM à l'aide de l'interface Web CMC ou RACADM. Voir « Suppression d'un mot de passe perdu ou oublié ». Accès à la boîte de dialogue Sécurité Pour accéder à la boîte de dialogue Security (Sécurité), procédez comme suit : 1 Appuyez sur . La boîte de dialogue Menu principal s'affiche. 2 Cliquez sur Configuration et sur Sécurité. La boîte de dialogue Sécurité apparaît. Paramétrage ou modification du mot de passe Pour définir ou modifier le mot de passe : 1 Cliquez une fois et appuyez sur , ou double-cliquez dans le champ Nouveau. 2 Tapez le nouveau mot de passe dans le champ Nouveau et appuyez sur . Les mots de passe sont sensibles à la casse et doivent comprendre 5 à 12 caractères. Ils doivent inclure au moins une lettre et un chiffre. Les caractères autorisés sont : A–Z, a–z, 0–9, espace et tiret. 3 Entrez à nouveau le mot de passe dans le champ Répéter, puis appuyez sur . 4 Cliquez sur OK si vous souhaitez uniquement changer votre mot de passe, puis fermez la boîte de dialogue.400 Utilisation du module iKVM Protection de votre console par mot de passe Pour activer la protection par mot de passe de votre console : 1 Paramétrez votre mot de passe comme indiqué dans la procédure précédente. 2 Cochez la case Activer l'économiseur d'écran. 3 Entrez le nombre de minutes de temps d'inactivité (entre 1 et 99) nécessaires à l'activation de la protection par mot de passe et de l'économiseur d'écran. 4 Pour Mode : si votre moniteur est compatible ENERGY STAR, sélectionnez Energy ; sinon, sélectionnez Écran. REMARQUE : si le mode est défini sur Energy, l'appareil place le moniteur en mode Veille. Ceci est normalement indiqué par la mise hors tension du moniteur et par une lumière orange qui remplace la LED d'alimentation verte. Si le mode est défini sur Écran, l'indicateur OSCAR rebondit sur l'écran pendant toute la durée du test. Avant que le test ne commence, une boîte contextuelle d'avertissement affiche le message suivant : « Le mode Energy peut endommager un moniteur qui n'est pas compatible ENERGY STAR. Une fois démarré, le test peut toutefois être abandonné immédiatement au moyen de la souris ou du clavier ». PRÉCAUTION : le moniteur peut être endommagé s'il est utilisé en mode Energy sans être conforme à la norme Energy Star. 5 Facultatif : pour activer le test d'économiseur d'écran, cliquez sur Test. La boîte de dialogue Test d'économiseur d'écran apparaît. Cliquez sur OK pour lancer le test. Le test dure 10 secondes. Lorsqu'il se termine, la boîte de dialogue Sécurité réapparaît. Ouverture de session Pour lancer Oscar : 1 Appuyez sur pour lancer OSCAR. La boîte de dialogue Mot de passe apparaît. 2 Tapez votre mot de passe, puis cliquez sur OK. La boîte de dialogue Menu principal apparaît.Utilisation du module iKVM 401 Paramétrage de la fermeture de session automatique Vous pouvez paramétrer OSCAR pour fermer automatiquement une session sur un serveur après une période d'inactivité. 1 Dans la boîte de dialogue Menu principal, cliquez sur Configuration, puis sur Sécurité. 2 Dans le champ Temps d'inactivité, entrez la période de temps pendant laquelle vous souhaitez rester connecté à un serveur avant qu'il ne vous déconnecte automatiquement. 3 Cliquez sur OK. Suppression de la protection par mot de passe depuis votre console Pour supprimer la protection par mot de passe à partir de la console : 1 Dans la boîte de dialogue Menu principal, cliquez sur Configuration, puis sur Sécurité. 2 Dans la boîte de dialogue Sécurité, cliquez une fois et appuyez sur , ou double-cliquez dans le champ Nouveau. 3 Laissez le champ Nouveau vide et appuyez sur . 4 Cliquez une fois et appuyez sur ou double-cliquez dans le champ Répéter. 5 Laissez le champ Répéter vide et appuyez sur . 6 Cliquez sur OK si vous souhaitez uniquement supprimer votre mot de passe. Activation du mode d'économiseur d'écran sans protection par mot de passe REMARQUE : si votre console est protégée par mot de passe, vous devez d'abord supprimer cette protection. Suivez les étapes de la procédure précédente avant de procéder comme suit. Pour activer le mode d'économiseur d'écran sans protection par mot de passe : 1 Sélectionnez Activer l'économiseur d'écran. 2 Entrez le nombre de minutes (de 1 à 99) souhaité pour retarder l'activation de l'économiseur d'écran.402 Utilisation du module iKVM 3 Sélectionnez Energy si votre moniteur est conforme à ENERGY STAR ; sinon, sélectionnez Écran. PRÉCAUTION : le moniteur peut être endommagé s'il est utilisé en mode Energy sans être conforme à la norme Energy Star. 4 Facultatif : pour activer le test d'économiseur d'écran, cliquez sur Test. La boîte de dialogue Test d'économiseur d'écran apparaît. Cliquez sur OK pour lancer le test. Le test dure 10 secondes. Lorsqu'il se termine, la boîte de dialogue Sécurité réapparaît. REMARQUE : l'activation du mode d'économiseur d'écran déconnecte l'utilisateur d'un serveur ; aucun serveur n'est sélectionné. L'indicateur de condition affiche Disponible. Quitter le mode d'économiseur d'écran Pour quitter le mode d'économiseur d'écran et revenir à la boîte de dialogue Menu principal, appuyez sur une touche quelconque ou déplacez votre souris. Pour désactiver l'économiseur d'écran : Dans la boîte de dialogue Sécurité, décochez la case Activer l'économiseur d'écran, puis cliquez sur OK. Pour activer immédiatement l'économiseur d'écran, appuyez sur , puis sur . Suppression d'un mot de passe perdu ou oublié Lorsque le mot de passe d'iKVM est perdu ou oublié, vous pouvez le réinitialiser sur les paramètres par défaut d'iKVM, puis changer de mot de passe. Vous pouvez réinitialiser le mot de passe avec l'interface Web de CMC ou RACADM. Pour réinitialiser un mot de passe perdu ou oublié d'iKVM avec l'interface Web de CMC : 1 Ouvrez une session sur l'interface Web de CMC. 2 Sélectionnez iKVM dans le sous-menu Châssis. 3 Cliquez sur l'onglet Configuration. La page Configuration d'iKVM s'affiche. 4 Cliquez sur Restaurer les valeurs par défaut.Utilisation du module iKVM 403 Vous pouvez ensuite changer le mot de passe par défaut via OSCAR. Voir « Paramétrage ou modification du mot de passe ». Pour réinitialiser un mot de passe perdu ou oublié à l'aide de RACADM, ouvrez une console texte série/Telnet/SSH vers CMC, ouvrez une session et entrez : racadm racresetcfg -m kvm REMARQUE : l'utilisation de la commande racresetcfg réinitialise les paramètres Activation du panneau avant et Activation de la console Dell CMC s'ils diffèrent des valeurs par défaut. Pour des informations supplémentaires sur la sous-commande racresetcfg, voir la section racresetcfg du Guide de référence de la ligne de commande RACADM pour iDRAC6 et CMC. Modification de la langue Utilisez la boîte de dialogue Langue pour afficher le texte de l'OSCAR dans l'une des langues prises en charge. Le texte est immédiatement affiché dans la langue sélectionnée sur tous les écrans d'OSCAR. Pour changer la langue d'OSCAR : 1 Appuyez sur . La boîte de dialogue Menu principal s'affiche. 2 Cliquez sur Configuration, puis sur Langue. La boîte de dialogue Langue apparaît. 3 Cliquez sur le bouton d'option correspondant à la langue souhaitée, puis cliquez sur OK. Affichage des informations sur la version Utilisez la boîte de dialogue Version pour afficher les versions du micrologiciel et du matériel d'iKVM, et pour identifier la configuration de la langue et du clavier. Pour afficher les informations sur la version : 1 Appuyez sur . La boîte de dialogue Menu principal s'affiche. 2 Cliquez sur Commandes, puis sur Afficher les versions. La boîte de dialogue Version apparaît. La moitié supérieure de la boîte de dialogue Version répertorie les versions des sous-systèmes de l'appareil. 3 Cliquez sur ou appuyez sur <Échap> pour fermer la boîte de dialogue Version.404 Utilisation du module iKVM Balayage de votre système En mode de balayage, iKVM balaye automatiquement de logement en logement (de serveur en serveur). Vous pouvez balayer jusqu'à 16 serveurs en spécifiant les serveurs que vous souhaitez balayer et le nombre de secondes pendant lesquelles chaque serveur est affiché. Pour ajouter des serveurs à la liste de balayage : 1 Appuyez sur . La boîte de dialogue Menu principal s'affiche. 2 Cliquez sur Configuration, puis sur Balayage. La boîte de dialogue Balayage qui apparaît répertorie tous les serveurs du châssis. 3 Cochez la case en regard des serveurs que vous souhaitez balayer. ou Double-cliquez sur le nom ou le logement du serveur. ou Appuyez sur et le numéro du serveur que vous souhaitez balayer. Vous pouvez sélectionner jusqu'à 16 serveurs. 4 Dans le champ Temps, entrez le nombre de secondes (de 3 à 99) pendant lesquelles iKVM devra patienter avant que le balayage ne se déplace au serveur suivant dans la séquence. 5 Cliquez sur le bouton Ajouter/Supprimer, puis sur OK. Pour supprimer un serveur de la liste Balayage : 1 Dans la boîte de dialogue Balayage, cochez la case située en regard du serveur à supprimer. ou Double-cliquez sur le nom ou le logement du serveur. ou Cliquez sur le bouton Effacer pour supprimer tous les serveurs de la liste Balayage. 2 Cliquez sur le bouton Ajouter/Supprimer, puis sur OK.Utilisation du module iKVM 405 Pour lancer le mode de balayage : 1 Appuyez sur . La boîte de dialogue Menu principal s'affiche. 2 Cliquez sur Commandes. La boîte de dialogue Commandes apparaît. 3 Cochez la case Activation du balayage. 4 Cliquez sur OK. Un message indiquant que la souris et le clavier ont été réinitialisés apparaît. 5 Cliquez sur pour fermer la boîte du message. Pour annuler le mode de balayage : 1 Si l'interface OSCAR est ouverte et que la boîte de dialogue Menu principal est affichée, sélectionnez un serveur dans la liste. ou Si l'interface OSCAR n'est pas ouverte, déplacez la souris ou appuyez sur une touche quelconque du clavier. Le balayage s'arrête au serveur sélectionné. ou Appuyez sur . La boîte de dialogue Menu principal apparaît ; sélectionnez un serveur dans la liste. 2 Cliquez sur le bouton Commandes. La boîte de dialogue Commandes apparaît. 3 Décochez la case Activation du balayage. Diffusion aux serveurs Vous pouvez contrôler simultanément plusieurs serveurs dans le système pour vous assurer que tous les serveurs sélectionnés reçoivent une entrée identique. Vous pouvez choisir de diffuser des séquences de touches et/ou des déplacements de souris indépendamment. REMARQUE : vous pouvez diffuser simultanément vers un maximum de 16 serveurs.406 Utilisation du module iKVM Pour diffuser aux serveurs : 1 Appuyez sur . La boîte de dialogue Menu principal s'affiche. 2 Cliquez sur Configuration, puis sur Diffuser. La boîte de dialogue Diffuser apparaît. REMARQUE : diffusion de séquences de touches : lorsque vous utilisez des séquences de touches, l'état du clavier doit être identique pour tous les serveurs recevant une diffusion afin que les séquences de touches puissent être interprétées à l'identique. Plus spécifiquement, les modes et doivent être les mêmes sur tous les claviers. Lorsqu'iKVM tente d'envoyer simultanément des séquences de touches aux serveurs sélectionnés, certains serveurs peuvent gêner et ainsi retarder la transmission. REMARQUE : diffusion des déplacements de la souris : pour garantir la précision de fonctionnement de la souris, tous les serveurs doivent avoir des pilotes de souris, des bureaux (icônes placées à l'identique, par exemple) et des résolutions vidéo identiques. La souris doit également se trouver exactement à la même place sur tous les écrans. Ces conditions étant extrêmement difficiles à remplir, la diffusion des déplacements de la souris à plusieurs serveurs peut générer des résultats imprévisibles. 3 Activez la souris et/ou le clavier pour les serveurs qui doivent recevoir les commandes de diffusion en cochant les cases correspondantes. ou Appuyez sur les touches fléchées haut ou bas pour déplacer le curseur vers un serveur cible. Appuyez ensuite sur pour sélectionner la case du clavier et/ou sur pour sélectionner la case de la souris. Répétez cette procédure pour des serveurs supplémentaires. 4 Cliquez sur OK pour enregistrer les paramètres et revenir à la boîte de dialogue Configuration. Cliquez sur ou appuyez sur <Échap> pour revenir à la boîte de dialogue Menu principal. 5 Cliquez sur Commandes. La boîte de dialogue Commandes apparaît. 6 Cochez la case Activation de la diffusion pour activer la diffusion. La boîte de dialogue Avertissement de diffusion apparaît. 7 Cliquez sur OK pour activer la diffusion. Pour annuler et revenir à la boîte de dialogue Commandes, cliquez sur ou appuyez sur <Échap>.Utilisation du module iKVM 407 8 Si la diffusion est activée, tapez les informations et/ou exécutez les déplacements de la souris que vous souhaitez diffuser depuis la station de gestion. Seuls les serveurs de la liste sont accessibles. Pour désactiver la diffusion : Dans la boîte de dialogue Commandes, décochez la case Activation de la diffusion. Gestion d'iKVM depuis CMC Activation ou désactivation du panneau avant Pour activer ou désactiver l'accès à iKVM depuis le panneau avant à l'aide de RACADM, ouvrez une console texte série/Telnet/SSH vers CMC, ouvrez une session et tapez : racadm config -g cfgKVMInfo -o cfgKVMFrontPanelEnable correspond à 1 (activé) ou à 0 (désactivé). Pour des informations supplémentaires sur la sous-commande config, voir la section de la commande config du Guide de référence de la ligne de commande RACADM pour iDRAC6 et CMC. Pour activer ou désactiver l'accès à iKVM depuis le panneau avant à l'aide de l'interface Web : 1 Ouvrez une session sur l'interface Web de CMC. 2 Sélectionnez iKVM dans l'arborescence du système. La page État du module iKVM s'affiche. 3 Cliquez sur l'onglet Configuration. La page Configuration d'iKVM s'affiche. 4 Pour activer, cochez la case USB/Vidéo du panneau avant activé. Pour désactiver, décochez la case USB/Vidéo du panneau avant activé. 5 Cliquez sur Appliquer pour enregistrer le paramètre.408 Utilisation du module iKVM Activation de la console Dell CMC via iKVM Pour permettre à iKVM d'accéder à la console Dell CMC à l'aide de RACADM, ouvrez une console texte série/Telnet/SSH vers CMC, ouvrez une session et entrez : racadm config -g cfgKVMInfo -o cfgKVMAccessToCMCEnable 1 Pour activer la console Dell CMC avec l'interface Web : 1 Ouvrez une session sur l'interface Web de CMC. 2 Sélectionnez iKVM dans l'arborescence du système. La page État du module iKVM s'affiche. 3 Cliquez sur l'onglet Configuration. La page Configuration d'iKVM s'affiche. 4 Cochez la case Autoriser l'accès à l'interface de ligne de commande CMC depuis iKVM. 5 Cliquez sur Appliquer pour enregistrer le paramètre. Affichage de la condition et des propriétés d'iKVM Le module KVM d'accès local destiné à votre châssis de serveur Dell M1000e est appelé Avocent Integrated KVM Switch Module, ou iKVM. La condition d'intégrité de l'iKVM associé au châssis peut être consultée sur la page Intégrité des propriétés du châssis de la section Graphiques du châssis. Pour consulter la condition d'intégrité d'iKVM à l'aide des graphiques du châssis : 1 Ouvrez une session sur l'interface Web de CMC. 2 La page Condition du châssis s'affiche. La section de droite de la page Graphiques du châssis, qui fournit une vue arrière du châssis, contient la condition d'intégrité d'iKVM. La condition d'intégrité d'iKVM est indiquée par la couleur du sous-graphique d'iKVM : • Vert : iKVM est présent, sous tension et communique avec CMC ; il n'y a aucune indication d'événement indésirable. • Orange : iKVM est présent, mais peut être hors tension, ou ne pas communiquer avec CMC ; un événement indésirable peut exister. • Gris : iKVM est présent et est hors tension. Elle ne communique pas avec CMC et il n'y a aucune indication d'événement indésirable.Utilisation du module iKVM 409 3 Placez le curseur sur le sous-graphique de l'iKVM pour afficher le texte du champ ou l'infobulle correspondants. Le texte du champ fournit des informations complémentaires sur cet iKVM. 4 Le lien hypertexte du sous-graphique de l'iKVM permet d'accéder à l'interface graphique CMC correspondante fournissant une navigation directe vers la page Condition d'iKVM. Pour plus d'informations sur iKVM, voir « Utilisation du module iKVM ». Pour consulter la condition d'iKVM à l'aide de la page Condition d'iKVM : 1 Ouvrez une session sur l'interface Web de CMC. 2 Sélectionnez iKVM dans l'arborescence du système. La page Condition d'iKVM s'affiche. Tableau 10-5. Informations sur la condition d'iKVM Élément Description Présence Indique si le module iKVM est présent ou absent. État de l'alimentation Indique la condition de l'alimentation d'iKVM : sous tension, hors tension ou - (absente). Nom Affiche le nom de produit d'iKVM. Fabricant Affiche le fabricant d'iKVM. Numéro de pièce Affiche le numéro de pièce d'iKVM. Le numéro de pièce est un identificateur unique fourni par le fournisseur. Version du micrologiciel Indique la version du micrologiciel iKVM. Version du matériel Indique la version du micrologiciel iKVM. Panneau avant connecté Indique si le moniteur est connecté au connecteur VGA du panneau avant (Oui ou Non). Ces informations sont fournies à CMC afin qu'il puisse déterminer si un utilisateur local a accès au châssis via le panneau avant. Panneau arrière connecté Indique si le moniteur est connecté au connecteur VGA du panneau arrière (Oui ou Non). Ces informations sont fournies à CMC afin qu'il puisse déterminer si un utilisateur local a accès au châssis via le panneau arrière.410 Utilisation du module iKVM Mise à jour du micrologiciel du module iKVM Vous pouvez mettre à jour le micrologiciel iKVM avec l'interface Web de CMC ou RACADM. Pour mettre à jour le micrologiciel iKVM avec l'interface Web de CMC : 1 Ouvrez une session sur l'interface Web de CMC. 2 Sélectionnez Châssis dans l'arborescence. 3 Cliquez sur l'onglet Update (Mise à jour). La page Composants pouvant être mis à jour s'affiche. 4 Cliquez sur le nom du module iKVM. La page Mise à jour du micrologiciel s'affiche. 5 Dans le champ Image de micrologiciel, entrez le chemin du fichier image du micrologiciel sur votre station de gestion ou votre réseau partagé ou cliquez sur Parcourir pour accéder à l'emplacement du fichier. REMARQUE : le nom de l'image par défaut du micrologiciel iKVM est kvm.bin. Cependant, vous pouvez modifier ce nom. 6 Cliquez sur Commencer la mise à jour de micrologiciel. Une boîte de dialogue vous demande de confirmer l'opération. Port cascade connecté iKVM prend en charge l'affectation de plusieurs couches de façon transparente avec les dispositifs KVM externes de Dell et d'Avocent à l'aide du matériel intégré. Lorsque plusieurs couches sont affectées à iKVM, les serveurs du châssis sont accessibles à partir de l'écran du commutateur KVM externe à partir duquel plusieurs couches sont affectées à iKVM. USB/Vidéo du panneau avant activés Affiche si le connecteur VGA du panneau avant est activé (oui ou non). Autoriser l'accès CMC à partir d'iKVM Indique si la console de commande CMC accessible via iKVM est activée (oui ou non). Tableau 10-5. Informations sur la condition d'iKVM (suite) Élément DescriptionUtilisation du module iKVM 411 7 Cliquez sur Oui pour continuer. La section Avancement de la mise à jour du micrologiciel fournit des informations sur l'état de la mise à jour du micrologiciel. Un indicateur d'état s'affiche sur la page pendant le chargement du fichier image. La durée du transfert de fichiers peut fortement varier en fonction de la vitesse de la connexion. Lorsque le processus de mise à jour interne démarre, la page s'actualise automatiquement et l'horloge de mise à jour du micrologiciel s'affiche. Instructions supplémentaires à suivre : • N'utilisez pas le bouton Actualiser et ne naviguez pas sur une autre page pendant le transfert. • Pour annuler le processus, cliquez sur Annuler le transfert du fichier et la mise à jour. Cette option n'est disponible que pendant le transfert du fichier. • L'état de la mise à jour s'affiche dans le champ État de mise à jour. Ce champ est mis à jour automatiquement pendant le transfert du fichier. Certains anciens navigateurs ne prennent pas en charge ces mises à jour automatiques. Pour actualiser manuellement le champ État de mise à jour, cliquez sur Actualiser. REMARQUE : la mise à jour de l'iKVM peut prendre jusqu'à une minute. À la fin de la mise à jour, iKVM est réinitialisé et le nouveau micrologiciel est mis à jour et apparaît sur la page Composants actualisables. Pour mettre à jour le micrologiciel iKVM à l'aide de RACADM, ouvrez une console texte série/Telnet/SSH vers CMC, ouvrez une session et entrez : racadm fwupdate -g -u -a -d -m kvm Par exemple : racadm fwupdate -gua 192.168.0.10 -d ikvm.bin -m kvm Pour des informations supplémentaires sur la sous-commande fwupdate, voir la section de la commande fwupdate du Guide de référence de la ligne de commande RACADM pour iDRAC6 et CMC.412 Utilisation du module iKVM Dépannage REMARQUE : Si une session de redirection de console est active et qu'un moniteur de plus faible résolution est connecté à iKVM, la résolution de console de serveur peut se réinitialiser si le serveur est sélectionné sur la console locale. Si le serveur exécute un système d'exploitation Linux, une console X11 peut ne pas être visible sur le moniteur local. Appuyez sur sur iKVM pour basculer Linux en mode console de texte. Tableau 10-6. Dépannage d'iKVM Problème Cause probable et solution Le message « L'utilisateur a été désactivé par le contrôle CMC » apparaît sur le moniteur connecté au panneau avant. La connexion du panneau avant a été désactivée par CMC. Vous pouvez activer le panneau avant avec l'interface Web de CMC ou RACADM. Pour activer le panneau avant avec l'interface Web : 1 Ouvrez une session sur l'interface Web de CMC. 2 Sélectionnez iKVM dans l'arborescence du système. 3 Cliquez sur l'onglet Configuration. 4 Cochez la case USB/Vidéo du panneau avant activé. 5 Cliquez sur Appliquer pour enregistrer le paramètre. Pour activer le panneau avant à l'aide de RACADM, ouvrez une console texte série/Telnet/SSH vers CMC, ouvrez une session et entrez : racadm config -g cfgKVMInfo - o cfgKVMAccesToCMCEnable 1Utilisation du module iKVM 413 L'accès au panneau arrière ne fonctionne pas. Le paramètre du panneau avant est activé par CMC et un moniteur est connecté au panneau avant. Une seule connexion est autorisée à la fois. La connexion du panneau avant est prioritaire sur l'ACI et le panneau arrière. Pour plus d'informations sur la priorité des connexions, voir « « Priorités de connexion d'iKVM » ». Le message « L'utilisateur a été désactivé car plusieurs couches ont été affectées à un autre appareil » apparaît sur le moniteur connecté au panneau arrière. Un câble réseau est connecté au connecteur du port ACI d'iKVM et à un appareil KVM secondaire. Une seule connexion est autorisée à la fois. La connexion d'affectation de plusieurs couches ACI est prioritaire sur la connexion du moniteur sur le panneau arrière. L'ordre de priorité est le suivant : panneau avant, ACI, puis panneau arrière. Tableau 10-6. Dépannage d'iKVM (suite) Problème Cause probable et solution414 Utilisation du module iKVM La LED orange d'iKVM clignote. Trois causes sont possibles : iKVM présente un problème, qui nécessite sa reprogrammation. Pour corriger ce problème, suivez les instructions de mise à jour du micrologiciel d'iKVM (voir « « Mise à jour du micrologiciel du module iKVM »). iKVM est en train de reprogrammer l'interface de la console CMC. Dans ce cas, la console CMC est temporairement indisponible et est représentée par un point jaune dans l'interface OSCAR. Ce processus dure jusqu'à 15 minutes. Le micrologiciel iKVM a détecté une erreur matérielle. Pour des informations supplémentaires, affichez la condition d'iKVM. Pour afficher la condition d'iKVM avec l'interface Web : 1 Ouvrez une session sur l'interface Web de CMC. 2 Sélectionnez iKVM dans l'arborescence du système. Pour afficher la condition d'iKVM à l'aide de RACADM, ouvrez une console texte série/Telnet/SSH vers CMC, ouvrez une session et tapez : racadm getkvminfo Tableau 10-6. Dépannage d'iKVM (suite) Problème Cause probable et solutionUtilisation du module iKVM 415 Plusieurs couches ont été affectées à mon iKVM via le port ACI vers un commutateur KVM externe, mais toutes les entrées pour les connexions ACI sont indisponibles. Tous les états indiquent un point jaune dans l'interface OSCAR. La connexion du panneau avant est activée et un moniteur y est connecté. Le panneau avant étant prioritaire sur toutes les autres connexions d'iKVM, les connecteurs de l'ACI et du panneau arrière sont désactivés. Pour activer la connexion du port ACI, vous devez d'abord désactiver l'accès au panneau avant ou retirer le moniteur connecté au panneau avant. Les entrées OSCAR du commutateur KVM externe deviendront actives et accessibles. Pour désactiver le panneau avant via l'interface Web : 1 Ouvrez une session sur l'interface Web de CMC. 2 Sélectionnez iKVM dans l'arborescence du système. 3 Cliquez sur l'onglet Configuration. 4 Décochez la case USB/Vidéo du panneau avant activé. 5 Cliquez sur Appliquer pour enregistrer le paramètre. Pour activer le panneau avant à l'aide de RACADM, ouvrez une console texte série/Telnet/SSH vers CMC, ouvrez une session et entrez : racadm config -g cfgKVMInfo - o cfgKVMFrontPanelEnable 0 Tableau 10-6. Dépannage d'iKVM (suite) Problème Cause probable et solution416 Utilisation du module iKVM Dans le menu OSCAR, la connexion Dell CMC affiche un X rouge et je ne peux pas me connecter à CMC. Il existe deux causes probables : La console Dell CMC a été désactivée. Dans ce cas, vous pouvez l'activer avec l'interface Web de CMC ou RACADM. Pour activer la console Dell CMC avec l'interface Web : 1 Ouvrez une session sur l'interface Web de CMC. 2 Sélectionnez iKVM dans l'arborescence du système. 3 Cliquez sur l'onglet Configuration. 4 Cochez la case Autoriser l'accès à l'interface de ligne de commande CMC depuis iKVM. 5 Cliquez sur Appliquer pour enregistrer le paramètre. Pour activer la connexion Dell CMC à l'aide de RACADM, ouvrez une console texte série/Telnet/SSH vers CMC, ouvrez une session et entrez : racadm config -g cfgKVMInfo - o cfgKVMAccessToCMCEnable 1 CMC est indisponible car il s'initialise, commute vers le contrôleur CMC de secours ou se reprogramme. Dans ce cas, attendez tout simplement que CMC ait terminé de s'initialiser. Tableau 10-6. Dépannage d'iKVM (suite) Problème Cause probable et solutionUtilisation du module iKVM 417 Le nom de logement d'un serveur affiche « Initialisation en cours » dans OSCAR et je ne peux pas le sélectionner. Le serveur s'initialise ou le contrôleur iDRAC sur ce serveur n'a pas pu s'initialiser. Attendez tout d'abord 60 secondes. Si le serveur s'initialise toujours, le nom de logement apparaît dès que l'initialisation est terminée et vous pouvez sélectionner le serveur. Si, après 60 secondes, OSCAR indique encore que le logement s'initialise, retirez puis réinsérez le serveur dans le châssis. Cette action permet à iDRAC de se réinitialiser. Tableau 10-6. Dépannage d'iKVM (suite) Problème Cause probable et solution418 Utilisation du module iKVMGestion de la structure d'E/S 419 Gestion de la structure d'E/S Le châssis peut contenir jusqu'à six modules d'E/S, chacun pouvant être un module de commutation ou de transfert. Ces modules d'E/S sont répartis en trois groupes : A, B et C. Chaque groupe comprend deux logements : 1 et 2. Les logements sont désignés par des lettres de gauche à droite à l'arrière du châssis : A1 | B1 | C1 | C2 | B2 | A2. Chaque serveur comporte des logements pour deux cartes mezzanine (MC) pour la connexion des modules d'E/S. La carte porteuse et le module d'E/S correspondant doivent avoir la même structure. L'E/S de châssis est séparé en 3 chemins de données discrètes par lettre : A, B et C. Ces chemins sont décrits comme des « STRUCTURES » et prennent en charge Ethernet et Fibre Channel ou InfiniBand. Ces chemins de structure discrets sont répartis en « Banques » d'E/S, banque 1 et banque 2. Chaque adaptateur E/S de serveur (carte porteuse ou LOM) peut avoir 2 ou 4 ports selon la capacité. Ces ports sont répartis uniformément aux banques de modules d'E/S 1 et 2 pour permettre la redondance. Lorsque vous déployez vos réseaux Ethernet, iSCSI ou Fibre Channel, étendez leurs liens redondants sur les banques un et deux pour une disponibilité maximale. On indique le module discret avec l'identificateur de structure et le numéro de Banque. Exemple : « A1 » indique structure « A » dans la banque « 1 ». « C2 » indique structure « C » dans la banque « 2 ». Le châssis prend en charge trois structures ou types de protocole. Les modules d'E/S et les cartes mezzanine d'un groupe doivent comporter les mêmes types de structures ou des types compatibles. • Les modules d'E/S du groupe A sont toujours connectés aux adaptateurs Ethernet intégrés des serveurs ; le type de structure du groupe A sera donc toujours Ethernet. • Pour le groupe B, les emplacements de module d'E/S sont en permanence connectés à la première carte porteuse (MC) dans chaque module de serveur. • Pour le groupe C, les emplacements de module d'E/S sont connectés en permanence à la seconde carte porteuse (MC) dans chaque module de serveur. REMARQUE : dans l'interface de ligne de commande CMC, les modules d'E/S sont désignés par la convention, switch-n : A1=commutateur-1, A2=commutateur-2, B1=commutateur-3, B2=commutateur-4, C1=commutateur-5 et C2=commutateur-6.420 Gestion de la structure d'E/S Gestion de la structure La gestion de la structure permet d'éviter les problèmes d'ordre électrique, de configuration ou de connectivité lors de l'installation d'un module d'E/S ou d'une carte porteuse ayant une structure incompatible avec celle du châssis établi. Des configurations matérielles non valides peuvent provoquer des problèmes électriques ou de fonctionnement au niveau du châssis et de ses composants. La gestion de la structure empêche les configurations non valides d'être mises sous tension. La Figure 11-1 désigne l'emplacement du module d'E/S dans le châssis. L'emplacement de chaque module d'E/S est indiqué par son numéro de groupe (A, B ou C). Ces chemins de structure discrets sont divisés en deux banques, la banque 1 et la banque 2. Sur le châssis, les noms de logement des modules d'E/S sont indiqués par A1, A2, B1, B2, C1 ou C2. Figure 11-1. Vue arrière d'un châssis illustrant l'emplacement des modules d'E/S 1 Banque 1 (Logements A1, B1, C1) 2 Banque 2 (Logements A2, B2, C2) 1 2Gestion de la structure d'E/S 421 CMC crée à la fois des entrées dans le journal du matériel et dans le journal CMC pour les configurations matérielles non valides. Par exemple : • Une carte porteuse Ethernet connectée à un module d'E/S Fibre Channel n'est pas une configuration valide. Cependant, une carte porteuse Ethernet connectée à un commutateur Ethernet et à un module d'E/S de passerelle Ethernet installé dans le même groupe de module d'E/S est une connexion valide. • Un module d'E/S Fibre Channel de transfert et un commutateur d'E/S Fibre channel dans les logements B1 et B2 est une configuration valide si la première carte porteuse de tous les serveurs est également du type Fibre Channel. Dans ce cas, CMC met les modules d'E/S et les serveurs sous tension. Cependant, certains logiciels de redondance Fibre Channel risquent de ne pas prendre en charge cette configuration : toutes les configurations valides ne sont pas nécessairement des configurations prises en charge. REMARQUE : la structure pour les modules d'E/S et les cartes porteuses du serveur est vérifiée uniquement à la mise sous tension du châssis. Lorsque le châssis est sur l'alimentation de secours, les micrologiciels iDRAC des modules du serveur restent éteints et sont donc incapables de signaler le type de structure des cartes porteuses du serveur. Le type de structure des cartes porteuses peut ne pas être signalé dans l'interface utilisateur CMC jusqu'à ce que le contrôleur iDRAC du serveur soit mis sous tension. En outre, si le châssis est sous tension, la vérification de la structure est effectuée lorsqu'un serveur ou module d'E/S est inséré (en option). Si un décalage de structure est détecté, le serveur ou module d'E/S est autorisé à se mettre sous tension et le voyant de condition clignote en orange. Configurations non valides Il existe trois types de configurations non valides : • La configuration de cartes porteuses ou LOM non valide, où le type de structure d'un serveur récemment installé diffère de la structure du module d'E/S existant. • La configuration carte porteuse-module d'E/S non valide, où un module d'E/S récemment installé possède un type de structure différent ou est incompatible avec celui des cartes porteuses résidentes. • Une configuration de module d'E/S-module d'E/S non valide, où un module d'E/S récemment installé possède un type de structure différent ou incompatible avec celui d'un module d'E/S déjà installé dans le groupe.422 Gestion de la structure d'E/S Configuration de cartes porteuses non valides Une configuration de carte porteuse non valide survient dès qu'une seule carte porteuse ou LOM installée sur un serveur n'est pas prise en charge par le module d'E/S correspondant. Dans ce cas, tous les autres serveurs du châssis peuvent fonctionner, mais le serveur avec la carte porteuse discordante ne pourra pas être mis sous tension. Le bouton d'alimentation sur le serveur se met à clignoter orange pour indiquer un décalage de structure. Pour des informations sur CMC et les journaux de matériel, voir « Affichage des journaux d'événements », à la page 460. Configuration de carte porteuse de module d'E/S non valide Le module d'E/S discordant sera maintenu hors tension. CMC ajoute une entrée aux journaux CMC et du matériel en indiquant la configuration non valide et en précisant le nom du module d'E/S. CMC déclenche le clignotement de la LED d'erreur du module d'E/S problématique. Si CMC est configuré pour envoyer des alertes, il envoie des alertes par e-mail et/ou SNMP pour cet événement. Pour des informations sur CMC et les journaux de matériel, voir « Affichage des journaux d'événements », à la page 460. Configuration module d'E/S - module d'E/S non valide CMC maintient le module d'E/S nouvellement installé hors tension, déclenche le clignotement de la LED d'erreur du module d'E/S et crée des entrées dans les journaux CMC et du matériel concernant cette non correspondance. Pour des informations sur CMC et les journaux de matériel, voir « Affichage des journaux d'événements », à la page 460. Scénario de nouveau démarrage Lorsque le châssis est branché et mis sous tension, les modules d'E/S ont priorité sur les serveurs. Le premier module d'E/S de chaque groupe est autorisé à démarrer avant les autres. À ce stade, aucune vérification du type de structure n'est effectuée. En l'absence d'un module d'E/S dans le premier logement d'un groupe, le module du deuxième logement de ce groupe démarre. Lorsque les deux logements comportent un module d'E/S, le module du deuxième logement est comparé à celui du premier afin d'en vérifier la cohérence. Après démarrage des modules d'E/S, les serveurs démarrent et CMC vérifie la cohérence de la structure des serveurs. Un module de transfert et un module de commutation sont autorisés dans le même groupe tant que leur structure est identique. Les modules de commutation et de transfert peuvent coexister dans un même groupe même s'ils sont fabriqués par des fournisseurs différents.Gestion de la structure d'E/S 423 Surveillance de l'intégrité des modules d'E/S Vous pouvez consulter la condition d'intégrité des modules d'E/S de deux manières : à partir de la section Graphiques du châssis sur la page Condition du châssis ou sur la page Condition des modules d'E/S. La page Graphiques du châssis fournit une représentation graphique des modules d'E/S installés dans le châssis. Pour consulter la condition d'intégrité des modules d'E/S à l'aide des graphiques du châssis : 1 Ouvrez une session sur l'interface Web de CMC. 2 La page Condition du châssis s'affiche. La section droite de la page Graphiques du châssis, qui fournit une vue arrière du châssis, contient la condition d'intégrité des modules d'E/S. La condition d'intégrité du module d'E/S est indiqué par la couleur du graphique de module d'E/S : • Vert : le module d'E/S est présent, sous tension et communique avec CMC ; aucune indication d'événement indésirable. • Orange : le module d'E/S est présent, mais peut ne pas être sous tension ou peut ou ne pas communiquer avec CMC ; un événement indésirable peut exister. • Gris : le module d'E/S est présent et hors tension. Elle ne communique pas avec CMC et il n'y a aucune indication d'événement indésirable. 3 Placez le curseur sur un sous-graphique de module d'E/S pour afficher le champ textuel ou l'infobulle correspondant. Le champ textuel fournit des informations complémentaires sur le module d'E/S. 4 Le lien hypertexte du sous-graphique de module d'E/S permet d'accéder à l'interface utilisateur CMC correspondante fournissant un accès direct vers la page Condition des modules d'E/S associée au module. Pour consulter la condition d'intégrité de tous les modules d'E/S à l'aide de la page Condition des modules d'E/S : 1 Ouvrez une session sur l'interface Web de CMC. 2 Sélectionnez Modules E/S (Modules d'E/S) dans le menu Chassis de l'arborescence. 3 Cliquez sur l'onglet Propriétés. 4 Cliquez sur le sous-onglet Condition. La page Condition des modules d'E/S s'affiche.424 Gestion de la structure d'E/S Tableau 11-1. Informations sur la condition d'intégrité des modules d'E/S Élément Description Logement Indique l'emplacement du module d'E/S dans le châssis par numéro de groupe (A, B ou C) et banque (1 ou 2). Énumération de module d'E/S : A1, A2, B1, B2, C1 ou C2. Présentation Indique si le module d'E/S est présent (oui ou non). Intégrité OK Indique que le module d'E/S est présent et communique avec CMC. En cas de perte des communications entre CMC et le serveur, CMC ne peut ni obtenir ni afficher la condition de l'intégrité du module d'E/S. Informatif Affiche des informations sur les modules d'E/S en l'absence de modification de la condition de l'intégrité (OK, Avertissement, Grave). Avertissement Indique que des alertes d'avertissement ont été émises et que des actions correctives doivent être effectuées. Si aucune action corrective n'est prise, des pannes critiques ou graves susceptibles d'affecter l'intégrité du module d'E/S pourraient se produire. Exemples de situations provoquant des avertissements : discordance de structure entre le module d'E/S et la structure de la carte mezzanine du serveur ; configuration de modules d'E/S non valide (où les modules d'E/S nouvellement installés ne correspondent pas aux modules d'E/S existants du même groupe). Grave Indique qu'au moins une alerte de panne a été générée. La condition Grave représente une panne système du module d'E/S et des actions correctives doivent être effectuées immédiatement. Exemples de situations provoquant une condition Grave : détection d'une panne d'un module d'E/S ; retrait d'un module d'E/S. REMARQUE : toute modification de l'intégrité est consignée dans les journaux du matériel et CMC. Pour plus d'informations, voir « Affichage des journaux d'événements », à la page 460.Gestion de la structure d'E/S 425 Structure Indique le type de structure du module d'E/S : Gigabit Ethernet, 10GE XAUI, 10GE KR, 10GE XAUI KR, FC 4 Gb/s, FC 8 Gb/s, SAS 3 Gb/s, SAS 6 Gb/s, Infiniband SDR, Infiniband DDR, Infiniband QDR, Interconnexion PCIe 1ère génération, Interconnexion PCIe 2ème génération. REMARQUE : le fait de connaître les types de structure des modules d'E/S de votre châssis permet d'éviter des dissociations de modules d'E/S au sein d'un même groupe. Pour des informations sur la structure E/S, voir « Gestion de la structure d'E/S », à la page 419. Nom Affiche le nom de produit du module E/S. Lancer la console de gestion des modules d'E/S Si le bouton d'un module d'E/S spécifique est présent, le fait de cliquer dessus lance la console de gestion de ce module d'E/S dans une nouvelle fenêtre de navigateur ou sous un nouvel onglet. REMARQUE : cette option est uniquement disponible pour les modules d'E/S de commutateurs gérés. Elle n'est pas disponible pour les modules de transfert d'E/S ou pour les commutateurs Infiniband non gérés. REMARQUE : si un module d'E/S est inaccessible car il est hors tension, si son interface de réseau local est désactivée ou qu'une adresse IP valide n'a pas été assignée au module, alors l'option Lancer l'interface utilisateur de module d'E/S n'est pas affichée pour ce module d'E/S. REMARQUE : il vous est alors demandé d'ouvrir une session dans l'interface de gestion du module d'E/S. REMARQUE : vous pouvez configurer l'adresse IP du module d'E/S par l'intermédiaire de l'interface utilisateur de CMC, comme décrit dans « Configuration des paramètres réseau pour un module d'E/S spécifique », à la page 428. Rôle Quand les modules d'E/S sont liés ensemble, le Rôle affiche la hiérarchisation de modules d'E/S. Membre : le module fait partie d'un ensemble de piles. Maître : le module est un point d'accès principal. État de l'alimentation Indique la condition de l'alimentation du module d'E/S : sous tension, hors tension ou N/A (absente). Tableau 11-1. Informations sur la condition d'intégrité des modules d'E/S (suite) Élément Description426 Gestion de la structure d'E/S Affichage de la condition d'intégrité d'un module d'E/S spécifique La page Condition du module d'E/S (distincte de la page Condition des modules d'E/S) fournit un aperçu d'un module d'E/S spécifique. Pour afficher la condition d'intégrité d'un module d'E/S spécifique : 1 Ouvrez une session sur l'interface Web de CMC. 2 Développez Modules d'E/S dans l'arborescence du système. Tous les modules d'E/S (1 à 6) s'affichent dans la liste Modules d'E/S développée. 3 Cliquez sur le module d'E/S que vous souhaitez afficher dans la liste Modules d'E/S de l'arborescence du système. 4 Cliquez sur le sous-onglet Condition. La page Condition des modules d'E/S s'affiche. Numéro de service Affiche le numéro de service du module d'E/S. Le numéro de service est un identifiant unique fourni par Dell pour le support et la maintenance. Toute modification de l'intégrité est consignée dans les journaux du matériel et CMC. Pour plus d'informations, voir « Affichage des journaux d'événements », à la page 460. REMARQUE : les transferts n'ont pas de numéros de service. Seuls les commutateurs en possèdent. Tableau 11-2. Informations sur la condition d'intégrité du module d'E/S Élément Description Emplacement Indique l'emplacement d'un module d'E/S dans le châssis par numéro de groupe (A, B ou C) et numéro de logement (1 ou 2). Noms de logement : A1, A2, B1, B2, C1 ou C2. Name (Nom) Affiche le nom du module d'E/S. Présentation Indique si le module d'E/S est Présent ou Absent. Tableau 11-1. Informations sur la condition d'intégrité des modules d'E/S (suite) Élément DescriptionGestion de la structure d'E/S 427 Intégrité OK Indique que le module d'E/S est présent et communique avec CMC. En cas de perte des communications entre CMC et le serveur, CMC ne peut ni obtenir ni afficher la condition de l'intégrité du module d'E/S. Informatif Affiche des informations sur les modules d'E/S en l'absence de modification de la condition de l'intégrité (OK, Avertissement, Grave). Exemples de situations provoquant une condition Informative : la présence du module d'E/S a été détectée ; un utilisateur a demandé un cycle d'alimentation du module d'E/S. Avertissement Indique que des alertes d'avertissement ont été émises et que des actions correctives doivent être effectuées. Si aucune action corrective n'est prise, des pannes critiques ou graves susceptibles d'affecter l'intégrité du module d'E/S pourraient se produire. Exemples de situations provoquant des avertissements : discordance de structure entre le module d'E/S et la structure de la carte mezzanine du serveur ; configuration de modules d'E/S non valide, dans laquelle les modules d'E/S récemment installés ne correspondent pas aux modules d'E/S existants du même groupe. Grave Indique qu'au moins une alerte de panne a été générée. La condition Grave représente une panne système du module d'E/S et des actions correctives doivent être effectuées immédiatement. Exemples de situations provoquant une condition Grave : détection d'une panne d'un module d'E/S ; retrait d'un module d'E/S. REMARQUE : toute modification de l'intégrité est consignée dans les journaux du matériel et CMC. Pour des informations sur l'affichage des journaux, voir « Affichage du journal du matériel », à la page 460 et « Affichage du journal CMC », à la page 463. Tableau 11-2. Informations sur la condition d'intégrité du module d'E/S (suite) Élément Description428 Gestion de la structure d'E/S Configuration des paramètres réseau pour un module d'E/S spécifique La page Configuration des modules d'E/S vous permet de spécifier les paramètres réseau pour l'interface utilisée pour gérer le module d'E/S. Le port de gestion hors bande (adresse IP) est configuré pour les commutateurs Ethernet. Le port de gestion intra-bande (VLAN1) n'est pas configuré via cette interface. REMARQUE : pour modifier des paramètres dans la page Configuration des modules d'E/S, vous devez posséder des privilèges administrateur : de la structure A afin de configurer le groupe A des modules d'E/S ; de la structure B afin de configurer la groupe B des modules d'E/S ; ou de la structure C afin de configurer le groupe C des modules d'E/S. État de l'alimentation Indique la condition de l'alimentation du module d'E/S : sous tension, hors tension ou N/A (absente). Numéro de service Affiche le numéro de service du module d'E/S. Le numéro de service est un identifiant unique fourni par Dell pour le support et la maintenance. Structure Indique le type de structure du module d'E/S : Gigabit Ethernet, 10GE XAUI, 10GE KR, 10GE XAUI KR, FC 4 Gb/s, FC 8 Gb/s, SAS 3 Gb/s, SAS 6 Gb/s, Infiniband SDR, Infiniband DDR, Infiniband QDR, Interconnexion PCIe 1ère génération, Interconnexion PCIe 2ème génération. REMARQUE : le fait de connaître les types de structure des modules d'E/S de votre châssis permet d'éviter des dissociations de modules d'E/S au sein d'un même groupe. Pour des informations sur la structure E/S, voir « Gestion de la structure d'E/S », à la page 419. Adresse MAC Affiche l'adresse MAC du module d'E/S. L'adresse MAC est une adresse unique attribuée à un périphérique par le fournisseur du matériel à des fins d'identification. REMARQUE : les transferts n'ont pas d'adresses MAC. Seuls les commutateurs possèdent une adresse MAC. Rôle Affiche l'adhésion à l'empilage du module d'E/S lorsque les modules sont reliés : • Membre : le module fait partie d'un ensemble de piles. • Maître : le module est un point d'accès principal. Tableau 11-2. Informations sur la condition d'intégrité du module d'E/S (suite) Élément DescriptionGestion de la structure d'E/S 429 REMARQUE : concernant les commutateurs Ethernet, les adresses IP de gestion hors bande et intra-bande (VLAN1) ne peuvent pas être identiques ni se trouver sur le même réseau ; cette configuration empêcherait toute définition de l'adresse IP de gestion hors bande. Pour plus d'informations sur l'adresse IP de gestion intrabande par défaut, reportez-vous à la documentation du module d'E/S. REMARQUE : seuls les modules d'E/S présents dans le châssis s'affichent. REMARQUE : ne tentez pas de configurer les paramètres réseau du module d'E/S pour le module d'intercommunication Ethernet ou les commutateurs Infiniband. Pour configurer les paramètres réseau d'un module d'E/S spécifique : 1 Ouvrez une session sur l'interface Web de CMC. 2 Développez Modules d'E/S dans l'arborescence du système. Cliquez sur le sous-onglet Configuration. La page Configuration des paramètres réseau des modules d'E/S s'affiche. 3 Pour configurer les paramètres réseau des modules d'E/S, entrez/sélectionnez les valeurs des propriétés suivantes, puis cliquez sur Appliquer. REMARQUE : seuls les modules d'E/S sous tension peuvent être configurés. REMARQUE : l'adresse IP définie sur les modules d'E/S à partir de CMC n'est pas enregistrée dans la configuration permanente de démarrage du commutateur. Pour enregistrer l'adresse IP de manière permanente, entrez la commande connect switch-n ou la commande racadm connect switch -n RACADM, ou bien utilisez une interface directe de l'interface utilisateur du module d'E/S afin d'enregistrer l'adresse dans le fichier de configuration de démarrage. Tableau 11-3. Configurez les paramètres réseau du module d'E/S Élément Description Logement Indique l'emplacement d'un module d'E/S dans le châssis par numéro de groupe (A, B ou C) et numéro de logement (1 ou 2). Noms de logement : A1, A2, B1, B2, C1 ou C2. (La valeur du logement ne peut pas être modifiée.) Name (Nom) Affiche le nom de produit du module E/S. (Le nom du module d'E/S ne peut pas être modifié.) État de l'alimentation Affiche l'état d'alimentation du module d'E/S. (L'état d'alimentation ne peut pas être modifié depuis cette page.)430 Gestion de la structure d'E/S DHCP activé Permet au module d'E/S du châssis de demander et d'obtenir automatiquement une adresse IP auprès du serveur DHCP (protocole de configuration dynamique des hôtes). Par défaut : coché (activé). Si cette option est cochée, le module d'E/S récupère automatiquement la configuration IP (adresse IP, masque de sousréseau et passerelle) auprès d'un serveur DHCP de votre réseau. REMARQUE : lorsque cette fonctionnalité est activée, les champs des propriétés Adresse IP, Passerelle et Masque de sous-réseau (situés en regard de cette option) sont désactivés et les valeurs précédemment saisies pour ces propriétés sont ignorées. Si cette option n'est pas cochée, vous devez saisir manuellement une adresse IP valide, une passerelle et un masque de sous-réseau dans les champs de texte correspondants situés juste en dessous de cette option. Adresse IP Indique l'adresse IP de l'interface réseau du module d'E/S. Masque de sous-réseau Indique le masque de sous-réseau de l'interface réseau du module d'E/S. par défaut Indique la passerelle de l'interface réseau du module d'E/S. Tableau 11-3. Configurez les paramètres réseau du module d'E/S (suite) Élément DescriptionGestion de la structure d'E/S 431 Dépannage des paramètres réseau de module d'E/S La liste suivante contient les éléments de dépannage pour les paramètres réseau de module d'E/S : • CMC peut lire le paramètre d'adresse IP après une modification de la configuration. Il affiche 0.0.0.0 une fois que vous avez cliqué sur Appliquer. Cliquez sur le bouton Actualiser pour voir si l'adresse IP est correctement définie sur le commutateur. • Si vous ne définissez pas correctement l'adresse IP, le masque ou la passerelle, le commutateur ne définit pas l'adresse IP et rétablit tous les champs sur 0.0.0.0. Erreurs les plus courantes : • Les adresses IP de gestion hors bande et intra-bande sont identiques ou configurées sur le même réseau. • Le masque de sous-réseau n'est pas valide. • La passerelle par défaut est définie vers une adresse qui ne se trouve pas sur un réseau mais est connectée directement au commutateur. Pour plus d'informations sur les paramètres réseau de module d'E/S, reportezvous au document Dell PowerConnect M6220 Switch Important Information et au livre blanc Dell PowerConnect 6220 Series Port Aggregator. 432 Gestion de la structure d'E/SDépannage et récupération 433 Dépannage et récupération Présentation Cette section détaille les tâches de récupération et de résolution des problèmes se produisant sur le système distant avec l'interface Web CMC. • Collecte des informations de configuration, d'état d'erreur et des journaux d'erreurs. • Gestion de l'alimentation d'un système distant. • Gestion des tâches Lifecycle Controller sur un système distant. • Affichage des informations sur le châssis. • Affichage des journaux d'événements. • Utilisation de la console de diagnostic. • Réinitialisation des composants. • Dépannage des problèmes de protocole de temps du réseau (NTP). • Dépannage des problèmes de réseau. • Dépannage des problèmes d'alerte. • Réinitialisation de mot de passe administrateur oublié. • Enregistrement et restauration des certificats et paramètres de configuration du châssis. • Journaux et codes d'erreur.434 Dépannage et récupération Outils de surveillance du châssis Collecte des informations de configuration et d'état et journaux du châssis La sous-commande racdump fournit une commande unique d'obtention de la condition complète du châssis, des informations sur l'état de configuration et des journaux. Utilisation racadm racdump La sous-commande racdump affiche les informations suivantes : • informations générales sur le système/RAC • informations sur CMC • informations sur le châssis • informations sur les sessions • informations du capteur • informations sur le numéro du micrologiciel Interfaces prises en charge • CLI RACADM • RACADM distante • RACADM Telnet La commande RACADM peut être exécutée à distance à partir de l'invite de commande d'une console série, Telnet ou SSH , ou d'une invite de commande normale. Pour obtenir la liste des options de syntaxe et de ligne de commande des différentes sous-commandes RACDUMP, entrez : racadm help Dépannage et récupération 435 CLI RACDUMP Racdump inclut les sous-systèmes suivants et regroupe les commandes RACADM suivantes : Utilisation racadm racdump Tableau 12-1. Sous-systèmes et commandes RACADM Sous-système Commande RACADM Informations générales sur le système/RAC getsysinfo Informations sur les sessions getssinfo Informations du capteur getsensorinfo Informations du commutateur (module d'E/S) getioinfo Informations de la carte mezzanine (carte fille) getdcinfo Informations de tous les modules getmodinfo Informations du bilan de puissance getpbinfo Informations KVM getkvminfo Informations de NIC (module CMC) getniccfg Informations de redondance getredundancymode Information du journal de suivi gettracelog Journal des événements RAC gettraclog Journal des événements système getsel436 Dépannage et récupération RACDUMP à distance RACADM distante est un utilitaire côté client qui peut être exécuté à partir d'une station de gestion via l'interface réseau hors bande. Une option de capacité d'accès à distance -r qui vous permet de vous connecter au système géré et d'exécuter les sous-commandes RACADM à partir d'une console distante ou d'une station de gestion est offerte. Pour utiliser la capacité d'accès à distance, il vous faut un nom d'utilisateur (option -u) et un mot de passe (option -p) valides, ainsi que l'adresse IP de CMC. REMARQUE : lorsque vous utilisez la capacité d'accès à distance de RACADM, vous devez posséder des droits d'écriture sur les dossiers sur lesquels vous utilisez les sous-commandes RACADM impliquant des opérations sur des fichiers, par exemple : – racadm getconfig -f – racadm sslcertdownload -t [-f ] Utilisation de RACDUMP à distance Pour utiliser la sous-commande RACDUMP à distance, entrez les commandes suivantes : racadm -r -u -p racadm -i -r

REMARQUE : l'option -i indique à RACADM de demander le nom d'utilisateur et le mot de passe de manière interactive. Sans l'option -i, vous devez indiquer le nom d'utilisateur et le mot de passe dans la commande à l'aide des options -u et -p. Par exemple : racadm -r 192.168.0.120 -u root -p calvin racdump racadm -i -r 192.168.0.120 racdump Si le numéro de port HTTPS du CMC a été remplacé par un port personnalisé autre que le port par défaut (443), la syntaxe suivante doit être utilisée : racadm -r : -u -p racadm -i -r : Dépannage et récupération 437 Telnet RACDUMP RACADM SSH/Telnet est utilisée pour faire référence à l'utilisation de la commande RACDUMP à partir de l'invite SSH ou Telnet. Pour plus d'informations sur les instructions de RACDUMP, voir le Guide de référence de la ligne de commande RACADM pour iDRAC et CMC sur le site support.dell.com/manuals. Configuration des LED pour l'identification des composants du châssis Vous pouvez définir des LED pour chaque composant (châssis, serveurs et modules d'E/S). Celles-ci clignoteront alors pour identifier le composant correspondant du châssis. REMARQUE : vous devez disposer du privilège Administrateur de configuration du châssis pour modifier ces paramètres. Utilisation de l'interface Web Pour activer le clignotement d'une, de plusieurs ou de toutes les LED de composants : 1 Ouvrez une session sur l'interface Web de CMC. 2 Sélectionnez Châssis dans l'arborescence. 3 Cliquez sur l'onglet Dépannage. 4 Cliquez sur le sous-onglet Identifier. La page Identifier qui s'affiche présente la liste de tous les composants du châssis. 5 Pour activer le clignotement d'une LED, cochez la case en regard du nom de périphérique, puis cliquez sur Clignotement. 6 Pour désactiver le clignotement d'une LED, cochez la case en regard du nom de périphérique, puis cliquez sur Arrêter le clignotement de la LED.438 Dépannage et récupération Utilisation de la RACADM Ouvrez une console texte série/Telnet/SSH d'accès à CMC, ouvrez une session et entrez : racadm setled -m [-l ] où indique le module dont vous souhaitez configurer les LED. Options de configuration : • server-n où n = 1–16 • switch-n où n = 1–6 • cmc-active et (état du voyant) indique si la LED doit clignoter. Options de configuration : • 0 : aucun clignotement (par défaut) • 1 : clignotement Configuration des alertes SNMP Les interruptions SNMP (protocole de gestion de réseau simple) ou les interruptions d'événements sont similaires aux alertes d'événement par e-mail. Elles sont utilisées par une station de gestion pour recevoir des données de CMC sans avoir à les demander. Vous pouvez configurer CMC pour générer des interruptions d'événement. La Figure 12-2 fournit un aperçu des événements déclencheurs des alertes SNMP et par e-mail. Pour plus d'informations sur les alertes par e-mail, voir « Configuration des alertes par messagerie », à la page 445. REMARQUE : dès la version 2.10 de CMC, SNMP bénéficie désormais de la capacité IPv6. Vous pouvez inclure une adresse IPv6 ou un nom de domaine pleinement qualifié (FQDN) dans la destination pour une alerte d'événement.Dépannage et récupération 439 Tableau 12-2. Événements sur châssis susceptibles de générer des alertes SNMP et par e-mail Événement Description Panne de sonde de ventilateur Un ventilateur est trop lent ou ne fonctionne pas du tout. Avertissement de capteur de batterie Une batterie a cessé de fonctionner. Avertissement de capteur de température La température approche de ses limites excessivement hautes ou basses. Panne de capteur de température La température est trop haute ou trop basse pour un fonctionnement correct. Redondance dégradée La redondance des ventilateurs et/ou des blocs d'alimentation a été réduite. Perte de la redondance Les ventilateurs et/ou les blocs d'alimentation ne sont plus redondants. Avertissement de bloc d'alimentation Le bloc d'alimentation approche d'une condition de panne. Panne de bloc d'alimentation Le bloc d'alimentation est défaillant. Bloc d'alimentation absent Un bloc d'alimentation qui devrait être en place est manquant. Erreur dans le journal du matériel Le journal du matériel ne fonctionne pas. Avertissement du journal du matériel Le journal du matériel est presque plein. Serveur absent Un serveur qui devrait être présent est manquant. Panne de serveur Le serveur ne fonctionne pas. KVM absent Un module KVM qui devrait être présent est manquant. Échec de KVM Le module KVM ne fonctionne pas.440 Dépannage et récupération Vous pouvez ajouter et configurer des alertes SNMP à l'aide de l'interface Web ou RACADM. Utilisation de l'interface Web REMARQUE : vous devez disposer du privilège Administrateur de configuration du châssis pour ajouter ou configurer des alertes SNMP. REMARQUE : pour plus de sécurité, il est vivement recommandé de modifier le mot de passe par défaut du compte root (User 1). Le compte root est le compte d'administration par défaut fourni avec le contrôleur CMC. Pour modifier le mot de passe par défaut du compte root, cliquez sur la référence utilisateur 1 pour ouvrir la page Configuration utilisateur. L'aide relative à cette page est disponible via le lien Aide en haut à droite de la page. Module d'E/S absent Un module d'E/S qui devrait être présent est manquant. Panne de module d'E/S Le module d'E/S ne fonctionne pas. Non correspondance de version de micrologiciel Il existe une incompatibilité du micrologiciel avec le châssis ou du serveur. Erreur de limite de puissance du châssis La consommation électrique au sein du châssis a atteint la limite de puissance d'entrée système. CARTE SD absente Aucun support ne se trouve dans le logement de carte SD (Secure Digital) de CMC et une fonctionnalité CMC configurée en a besoin. Erreur de CARTE SD Une erreur s'est produite lors de l'accès au support se trouvant dans le logement de carte SD (Secure Digital) de CMC. Erreur du groupe de châssis Le groupe de châssis contient une erreur de configuration. Tableau 12-2. Événements sur châssis susceptibles de générer des alertes SNMP et par e-mail (suite) Événement DescriptionDépannage et récupération 441 Pour ajouter et configurer des alertes SNMP à l'aide de l'interface Web CMC : 1 Ouvrez une session sur l'interface Web de CMC. 2 Sélectionnez Châssis dans l'arborescence du système. 3 Cliquez sur l'onglet Alertes. La page Événements sur châssis s'affiche. 4 Activation des alertes : a Cochez les cases des événements pour lesquels vous souhaitez activer les alertes. Pour activer tous les événements pour les alertes, cochez la case Sélectionner tout. b Cliquez sur Appliquer pour enregistrer vos paramètres. 5 Cliquez sur le sous-onglet Paramètres d'interruptions. La page Destinations des alertes des événements sur châssis s'affiche. 6 Saisissez une adresse valide dans un champ Destination vide. REMARQUE : une adresse valide est une adresse qui reçoit les alertes d'interruptions. Utilisez le format IPv4 « à quatre points », la notation d'adresses IPv6 standard ou FQDN. Par exemple : 123.123.123.123 ou 2001:db8:85a3::8a2e:370:7334 ou dell.com 7 Entrez la chaîne de communauté SNMP à laquelle appartient la station de gestion de destination. REMARQUE : les chaînes de communauté des pages Destinations des alertes des événements sur châssis et Châssis→ Réseau→ Services diffèrent. La chaîne de communauté des interruptions SNMP est celle utilisée par CMC pour les interruptions sortantes à destination des stations de gestion. La chaîne de communauté de la page Châssis→ Réseau→ Services correspond à la chaîne de communauté utilisée par les stations de gestion pour interroger le démon SNMP sur CMC. 8 Cliquez sur Appliquer pour enregistrer les modifications. Pour tester une interruption d'événement pour une destination d'alerte : 1 Ouvrez une session sur l'interface Web de CMC. 2 Sélectionnez Châssis dans l'arborescence du système. 3 Cliquez sur l'onglet Alertes. La page Événements du châssis s'affiche. 4 Cliquez sur l'onglet Paramètres d'interruptions. La page Destinations des alertes des événements du châssis s'affiche. 442 Dépannage et récupération 5 Cliquez sur Envoyer dans la colonne Interruption de test à côté de la destination. REMARQUE : spécifiez les destinations d'interruptions sous la forme d'adresses numériques au format approprié (IPv6 ou IPv4) ou de noms de domaine pleinement qualifiés (FQDN). Choisissez un format compatible avec votre technologie de mise en réseau/infrastructure. La fonctionnalité Interruption de test ne peut pas détecter les choix incorrects d'après la configuration réseau actuelle (par exemple, l'utilisation d'une destination IPv6 dans un environnement IPv4 uniquement). Utilisation de la RACADM 1 Ouvrez une console série/Telnet/SSH d'accès à CMC, puis ouvrez une session. REMARQUE : seul un masque de filtre peut être défini pour les alertes SNMP et par e-mail. Vous pouvez passer l'étape 2 si vous avez déjà sélectionné le masque de filtre. 2 Activez des alertes en entrant : racadm config -g cfgAlerting -o cfgAlertingEnable 1 3 Spécifiez les événements pour lesquels vous souhaitez que CMC génère des alertes en entrant : racadm config -g cfgAlerting -o cfgAlertingFilterMask est une valeur hexadécimale comprise entre 0x0 et 0xffffffff. Pour obtenir la valeur du masque, utilisez une calculatrice scientifique en mode hexadécimal et ajoutez les secondes valeurs des différents masques (1, 2, 4, etc.) à l'aide de la touche . Par exemple, pour activer les alertes d'interruptions pour l'avertissement de capteur de batterie (0x2), la panne de bloc d'alimentation (0x1000) et la panne de KVM (0x80000), entrez 2 1000 200000 et appuyez sur la touche <=>. La valeur hexadécimale qui en résulte est 208002 et la valeur du masque pour la commande RACADM est 0x208002.Dépannage et récupération 443 Tableau 12-3. Masques de filtre d'interruptions d'événements Événement Valeur du masque de filtre Panne de sonde de ventilateur 0x1 Avertissement de capteur de batterie 0x2 Avertissement de capteur de température 0x8 Panne de capteur de température 0x10 Redondance dégradée 0x40 Perte de la redondance 0x80 Avertissement de bloc d'alimentation 0x800 Panne de bloc d'alimentation 0x1000 Bloc d'alimentation absent 0x2000 Erreur dans le journal du matériel 0x4000 Avertissement du journal du matériel 0x8000 Serveur absent 0x10000 Panne de serveur 0x20000 KVM absent 0x40000 Échec de KVM 0x80000 Module d'E/S absent 0x100000 Panne de module d'E/S 0x200000 Non correspondance de version de micrologiciel 0x400000 Erreur de limite de puissance du châssis 0x1000000 CARTE SD absente 0x2000000 Erreur de CARTE SD 0x4000000 Erreur du groupe de châssis 0x8000000444 Dépannage et récupération 4 Activez des alertes d'interruption en entrant : racadm config -g cfgTraps -o cfgTrapsEnable 1 -i est une valeur comprise entre 1 et 4. Le numéro d'index est utilisé par CMC pour distinguer jusqu'à quatre destinations configurables pour les alertes d'interruptions. Les destinations peuvent être spécifiées sous la forme d'adresses numériques au format approprié (IPv6 ou IPv4) ou de noms de domaine pleinement qualifiés (FQDN). 5 Spécifiez une adresse IP de destination pour la réception d'alertes d'interruption en entrant : racadm config -g cfgTraps -o cfgTrapsAlertDestIPAddr -i est une destination valide et est la valeur d'index spécifiée à l'étape 4. 6 Spécifiez le nom de communauté en entrant : racadm config -g cfgTraps -o cfgTrapsCommunityName -i est la communauté SNMP à laquelle appartient le châssis et est la valeur d'index spécifiée aux étapes 4 et 5. Vous pouvez configurer jusqu'à quatre destinations pour recevoir des alertes d'interruptions. Pour ajouter d'autres destinations, répétez les étapes 2 à 6. REMARQUE : les commandes des étapes 2 à 6 écrasent tout paramètre existant configuré pour l'index spécifié (1 à 4). Pour déterminer si des valeurs ont précédemment été configurées pour un index, entrez : racadm get config -g cfgTraps -i . Si l'index a été configuré, des valeurs apparaîtront pour les objets cfgTrapsAlertDestIPAddr et cfgTrapsCommunityName. Pour tester une interruption d'événement pour une destination d'alerte : racadm testtrap -i est une valeur comprise entre 1 et 4 représentant la destination de l'alerte à tester. Si vous n'êtes pas certain du numéro d'index, entrez : racadm getconfig -g cfgTraps -i Dépannage et récupération 445 Téléchargement du fichier MIB (base d'information de gestion) SNMP Le fichier MIB SNMP du CMC définit les types, les événements et les indicateurs de châssis. CMC vous permet de télécharger le fichier MIB via l'interface Web. Pour télécharger le fichier MIB SNMP du CMC à l'aide de l'interface Web : 1 Ouvrez une session sur l'interface Web de CMC. 2 Sélectionnez Châssis dans l'arborescence. 3 Cliquez sur Réseau→ Services→ SNMP. La section Configuration SNMP est activée. 4 Cliquez sur Enregistrer pour télécharger le fichier MIB du CMC vers votre système local. Pour plus d'informations sur le fichier MIB SNMP, voir le Guide de référence SNMP de Dell OpenManage Server Administrator sur le site support.dell.com/manuals. Configuration des alertes par messagerie Lorsque CMC détecte un événement sur le châssis, comme un avertissement portant sur l'environnement ou une panne de composant, il peut être configuré pour envoyer une alerte par e-mail vers une ou plusieurs adresses. La Figure 12-2 fournit un aperçu des événements déclencheurs des alertes SNMP et par e-mail. Pour plus d'informations sur les alertes SNMP, voir « Configuration des alertes SNMP », à la page 438. Vous pouvez ajouter et configurer des alertes par e-mail à l'aide de l'interface Web ou RACADM. Utilisation de l'interface Web REMARQUE : vous devez disposer du privilège Administrateur de configuration du châssis pour ajouter ou configurer des alertes par e-mail. 1 Ouvrez une session sur l'interface Web de CMC. 2 Sélectionnez Châssis dans l'arborescence du système. 3 Cliquez sur l'onglet Alertes. La page Événements sur châssis s'affiche.446 Dépannage et récupération 4 Activation des alertes : a Cochez les cases des événements pour lesquels vous souhaitez activer les alertes. Pour activer tous les événements pour les alertes, cochez la case Sélectionner tout. b Cliquez sur Appliquer pour enregistrer vos paramètres. 5 Cliquez sur le sous-onglet Paramètres des alertes par e-mail. La page Destination des alertes par e-mail s'affiche. 6 Spécifiez l'adresse IP du serveur SMTP : a Localisez le champ Serveur SMTP (e-mail), puis entrez le nom d'hôte SMTP ou l'adresse IP. REMARQUE : vous devez configurer le serveur de messagerie SMTP pour accepter les e-mails transmis à partir de l'adresse IP de CMC, une fonctionnalité qui est normalement désactivée sur la plupart des serveurs de messagerie en raison des préoccupations de sécurité. Pour savoir comment procéder en toute sécurité, reportez-vous à la documentation qui accompagne votre serveur SMTP. b Saisissez l'expéditeur de l'e-mail souhaité pour l'alerte ou laissez le champ vide pour utiliser l'expéditeur de l'e-mail par défaut. L'expéditeur par défaut est : cmc@ correspond à l'adresse IP de CMC. Pour entrer une valeur, utilisez la syntaxe suivante pour le nom d'e-mail : [@]. Le nom du domaine est facultatif. Si @ n'est pas spécifié et qu'il existe un domaine de réseau CMC actif, l'adresse e-mail @ est alors utilisée comme e-mail source. Si @ n'est pas spécifié et que CMC ne possède pas de domaine de réseau actif, l'adresse IP de CMC est utilisée (par exemple, @). c Cliquez sur Appliquer pour enregistrer vos modifications. 7 Spécifiez les adresses e-mail des destinataires des alertes : a Saisissez une adresse e-mail valide dans un champ Adresse e-mail de destination vide. b Entrez un Nom facultatif. Ce nom correspond au destinataire de l'e-mail. Le nom est ignoré si l'adresse e-mail correspondante n'est pas valide. c Cliquez sur Appliquer pour enregistrer vos paramètres.Dépannage et récupération 447 Pour envoyer un e-mail test à une destination d'alerte par e-mail à l'aide de l'interface Web CMC : 1 Ouvrez une session sur l'interface Web de CMC. 2 Sélectionnez Châssis dans l'arborescence du système. 3 Cliquez sur l'onglet Alertes. La page Événements sur châssis s'affiche. 4 Cliquez sur le sous-onglet Paramètres des alertes par e-mail. La page Destination des alertes par e-mail s'affiche. 5 Cliquez sur Envoyer dans la colonne Adresse e-mail de destination en regard de la destination. Utilisation de la RACADM Pour envoyer un e-mail test à une destination d'alerte par e-mail à l'aide de RACADM : 1 Ouvrez une console série/Telnet/SSH d'accès à CMC, puis ouvrez une session. 2 Activez des alertes en entrant : racadm config -g cfgAlerting -o cfgAlertingEnable 1 REMARQUE : seul un masque de filtre peut être défini pour les alertes SNMP et par e-mail. Vous pouvez passer l'étape 3 si vous avez déjà défini un masque de filtre. 3 Spécifiez les événements pour lesquels vous souhaitez que CMC génère des alertes en entrant : racadm config -g cfgAlerting -o cfgAlertingFilterMask correspond à une valeur hexadécimale comprise entre 0x0 et 0xffffffff devant commencer par les caractères 0x. La Figure 12-3 fournit des masques de filtre pour chaque type d'événement. Pour des instructions sur le calcul de la valeur hexadécimale du masque de filtre à activer, voir l'étape 3 de « Utilisation de la RACADM », à la page 442. 4 Activez les alertes par e-mail en tapant : racadm config -g cfgEmailAlert -o cfgEmailAlertEnable 1 -i est une valeur comprise entre 1 et 4. Le numéro d'index est utilisé par CMC pour distinguer jusqu'à quatre adresses e-mail de destination configurables.448 Dépannage et récupération 5 Spécifiez une adresse e-mail de destination des alertes par e-mail en tapant : racadm config -g cfgEmailAlert -o cfgEmailAlertAddress -i correspond à une adresse e-mail valide et à la valeur de l'index spécifiée à l'étape étape 4. 6 Spécifiez le nom du destinataire de l'alerte par e-mail en tapant : racadm config -g cfgEmailAlert -o cfgEmailAlertEmailName -i correspond au nom de la personne ou du groupe destinataire de l'alerte par e-mail et à la valeur de l'index spécifiée aux étapes étape 4 et étape 5. Le nom du destinataire de l'e-mail peut contenir jusqu'à 32 caractères alphanumériques, tirets, traits de soulignement et points. Les espaces ne sont pas valides. 7 Définissez l'hôte SMTP en configurant la propriété de la base de données cfgRhostsSmtpServerIpAddr en tapant : racadm config -g cfgRemoteHosts -o cfgRhostsSmtpServerIpAddr host.domain où host.domain (domaine.hôte) est un nom de domaine complet. Vous pouvez configurer jusqu'à quatre adresses e-mail de destination des alertes par e-mail. Pour ajouter d'autres adresses e-mail, répétez les étapes de l'étape 2 à l' étape 6. REMARQUE : les commandes des étapes 2 à 6 écrasent tout paramètre existant configuré pour l'index spécifié (1 à 4). Pour déterminer si des valeurs ont été précédemment configurées pour un index, entrez : racadm get config -g cfgEmailAlert -i . Si l'index a été configuré, des valeurs apparaîtront pour les objets cfgEmailAlertAddress et cfgEmailAlertEmailName.Dépannage et récupération 449 Premières étapes de dépannage d'un système distant Les questions suivantes aident souvent à dépanner les problèmes de haut niveau dans le système géré : 1 Le système est-il sous tension ou hors tension ? 2 S'il est sous tension, est-ce que le système d'exploitation fonctionne, est-il tombé en panne ou est-il seulement bloqué ? 3 S'il est hors tension, est-ce que l'alimentation a été coupée soudainement ? Surveillance de l'alimentation et exécution de commandes de contrôle de l'alimentation sur le châssis Vous pouvez utiliser l'interface Web ou RACADM pour : • afficher l'état actuel de l'alimentation du système • effectuer un arrêt normal via le système d'exploitation lors du redémarrage et mettre sous tension puis hors tension le système. Pour des informations concernant la gestion de l'alimentation sur CMC et la configuration du bilan de puissance, de la redondance et du contrôle de l'alimentation, voir « Gestion de l'alimentation », à la page 335. Affichage de la condition du bilan de puissance Pour des instructions sur l'affichage de la condition du bilan de puissance du châssis, des serveurs et des unités d'alimentation via l'interface Web ou RACADM, voir « Affichage de l'état de la consommation de puissance », à la page 361. Exécution d'une opération de contrôle de l'alimentation Pour des instructions sur la mise sous/hors tension, la réinitialisation, ou le cycle d'alimentation du système via l'interface Web CMC ou RACADM, voir « Exécution de tâches de contrôle de l'alimentation sur le châssis », à la page 379, « Exécution d'opérations de contrôle de l'alimentation sur un module d'E/S », à la page 381 et « Exécution de tâches de contrôle de l'alimentation sur un serveur », à la page 382.450 Dépannage et récupération Dépannage de l'alimentation Les informations suivantes vous aident à dépanner le bloc d'alimentation et à résoudre des problèmes d'alimentation : • Problème : politique de redondance d'alimentation configurée sur Redondance de l'alimentation alternative, et un événement de perte de redondance de bloc d'alimentation redondante est survenu. – Résolution A : cette configuration nécessite qu'au moins un bloc d'alimentation du côté 1 (trois logements de gauche) et un bloc d'alimentation dans le côté 2 (trois logements de droite) soient présents et fonctionnels dans l'enceinte modulaire. En outre, la capacité de chaque côté doit être suffisante pour soutenir les allocations de puissances totales pour que le châssis maintienne la redondance de l'alimentation alternative. (Pour une opération de redondance de l'alimentation alternative complète, s'assurer qu'une configuration de bloc d'alimentation complète de six blocs d'alimentation est disponible.) – Résolution B : vérifiez si tous les blocs d'alimentation sont correctement connectés aux deux réseaux AC ; les blocs d'alimentation du côté 1 doivent être connectés à un réseau de courant alternatif, ceux du côté 2 doivent être raccordés au réseau à courant alternatif, et les deux réseaux CA doivent fonctionner. La redondance de l'alimentation alternative est perdue lorsque l'un des réseaux d'alimentation alternative ne fonctionne pas. • Problème : l'état de l'unité d'alimentation s'affiche comme Échoué (Pas d'alimentation alternative), même lorsqu'un cordon d'alimentation alternative est connecté et que l'unité de distribution d'alimentation produit une sortie d'alimentation alternative satisfaisante. – Résolution A : vérifiez et remplacez le cordon d'alimentation alternative. Vérifiez et confirmez que l'unité de distribution électrique acheminant l'électricité vers le bloc d'alimentation fonctionne comme prévu. Si la panne persiste, appelez le service client de Dell en vue du remplacement du bloc d'alimentation. – Résolution B : vérifiez que l'unité d'alimentation est connectée à la même tension que les autres. Si CMC détecte une unité d'alimentation sur une tension différente, celle-ci est désactivée et marquée comme défaillante.Dépannage et récupération 451 • Problème : l'enclenchement dynamique des blocs d'alimentation est activé, mais aucun des blocs d'alimentation ne s'affiche à l'état Veille. – Résolution A : l'excédent d'électricité est insuffisant. Un ou plusieurs blocs d'alimentation sont placés en mode Veille seulement lorsque le surplus d'énergie disponible dans l'enceinte dépasse la capacité d'au moins un bloc d'alimentation. – Résolution B : l'enclenchement dynamique des blocs d'alimentation ne peut être entièrement pris en charge avec les blocs d'alimentation présents dans l'enceinte. Pour vérifier si c'est le cas, utilisez l'interface Web pour couper l'enclenchement dynamique des blocs d'alimentation, puis rallumez-le. Un message s'affiche si l'enclenchement dynamique des blocs d'alimentation ne peut pas être pris en charge complètement. • Problème : un nouveau serveur a été inséré dans l'enceinte contenant assez de blocs d'alimentation, mais la mise sous tension du serveur ne peut s'effectuer. – Résolution A : vérifiez le paramètre de limite de puissance d'entrée système ; il se peut qu'elle soit configurée sur un niveau trop faible pour permettre la mise sous tension de serveurs supplémentaires. – Résolution B : vérifiez le fonctionnement 110 V. Si des blocs d'alimentation sont connectés à des circuits de dérivation 110V, vous devez reconnaître cette configuration comme valide avant que les serveurs soient autorisés à se mettre sous tension. Pour plus de détails, consultez les paramètres de configuration de la puissance. – Résolution C : vérifiez le paramètre de conservation de la puissance max. S'il est défini, les serveurs sont autorisés à se mettre sous tension. Pour plus de détails, consultez les paramètres de configuration de la puissance. – Résolution D : vérifiez la priorité de la puissance d'emplacement du serveur de l'emplacement associé au serveur récemment inséré et veillez à ce qu'elle ne soit pas inférieure à toute autre priorité de puissance d'emplacement du serveur.452 Dépannage et récupération • Problème : La puissance disponible ne cesse d'évoluer, même lorsque la configuration de l'enceinte modulaire n'a pas changé – Résolution : CMC 1.2 et les versions ultérieures intègrent la gestion dynamique de l'alimentation de ventilateur qui réduit les allocations de serveur brièvement si l'enceinte fonctionne à un niveau proche du seuil énergétique maximal configuré par l'utilisateur ; cela permet d'allouer de la puissance aux ventilateurs en réduisant les performances du serveur afin de maintenir le débit de puissance en dessous de la limite de la puissance d'entrée système. Ce comportement est normal. • Problème : 2000 W est signalé comme étant le surplus pour un maximum de performance. – Résolution : l'enceinte dispose de 2000 W de puissance excédentaire disponible dans la configuration actuelle, et la limite de puissance d'entrée système peut être réduite en toute sécurité en fonction de cette quantité signalée sans affecter les performances du serveur. • Problème : un sous-ensemble de serveurs n'est plus alimenté suite à une panne du réseau d'alimentation en CA, même si le châssis fonctionnait en mode de configuration Redondance d'alimentation alternative avec six blocs d'alimentation. – Résolution : cette situation peut se produire si les blocs d'alimentation ne sont pas correctement connectés aux réseaux électriques C.A. redondants lorsque la panne de réseau électrique C.A. survient. La stratégie Redondance d'alimentation alternative exige que les trois blocs d'alimentation de gauche soient connectés à un réseau électrique C.A. et que les trois blocs d'alimentation de droite soient connectés à l'autre réseau électrique C.A. Si deux unités d'alimentation ne sont pas correctement connectées, par exemple si l'unité d'alimentation3 et l'unité d'alimentation4 sont connectées aux mauvais réseaux d'alimentation alternative, une panne de réseau d'alimentation alternative entraîne la perte d'alimentation vers les serveurs de priorité inférieure.Dépannage et récupération 453 • Problème : les serveurs de niveau de priorité le plus faible ne sont plus alimentés suite à une panne d'unité d'alimentation. – Résolution : ce comportement est normal si la stratégie d'alimentation de l'enceinte a été configurée sur Sans redondance. Pour éviter toute panne future du bloc d'alimentation entraînant la mise hors tension des serveurs, veillez à ce que le châssis dispose d'au moins quatre blocs d'alimentation et soit configuré pour la stratégie Redondance du bloc d'alimentation afin d'empêcher la panne d'unité d'alimentation d'affecter le fonctionnement du serveur. • Problème : les performances globales du serveur diminuent lorsque la température ambiante augmente dans le centre de données. – Résolution : cette situation peut se produire si le paramètre Limite de puissance d'entrée système a été configuré sur une valeur entraînant un besoin accru de puissance pour les ventilateurs devant être réduits dans l'allocation de puissance vers les serveurs. L'utilisateur peut définir la Limite de puissance d'entrée système sur une valeur supérieure afin de permettre une allocation de puissance supplémentaire aux ventilateurs sans affecter les performances du serveur. Gestion des tâches Lifecycle Controller sur un système distant Le service Lifecycle Controller est disponible sur chacun des serveurs et il est optimisé par iDRAC. CMC fournit une liste de toutes les tâches du Lifecycle Controller s'exécutant sur le ou les serveur(s) et permet de supprimer ou d'éliminer les tâches existantes à l'aide de l'interface Web. Pour des informations sur l'activation du Lifecycle Controller, voir « Mise à jour du micrologiciel des composants du serveur à l'aide du Lifecycle Controller », à la page 224. La liste des tâches du Lifecycle Controller est une liste statique des tâches existantes sur le serveur et doit être réactualisée pour offrir les conditions des tâches du serveur les plus récentes. 454 Dépannage et récupération La Figure 12-4 décrit les informations affichées dans la liste des tâches du Lifecycle Controller Les tâches du Lifecycle Controller permettent de supprimer ou d'éliminer les tâches existantes sur le serveur. Suppression de tâches L'opération Supprimer est l'opération par défaut et permet de supprimer toutes ou certaines tâches du ou des serveur(s). L'opération Supprimer supprime les tâches sélectionnées dans la file d'attente des tâches du Lifecycle Controller. La case en regard du champ Modèle permet la sélection de toutes les tâches s'effectuant sur un serveur. Des tâches individuelles peuvent être sélectionnées en cochant les cases à cocher en regard du champ de la condition des tâches. Élimination des tâches L'opération Éliminer peut parfois s'avérer nécessaire lorsque la condition d'une tâche est indéterminée ou qu'elle ne peut pas être supprimée à l'aide de l'opération Supprimer les tâches. L'opération Éliminer réinitialise le Service de gestion des données et supprime toutes les tâches du serveur. Elle peut prendre quelque minute. La case à cocher en regard du champ Modèle permet de sélectionner toutes les tâches pour l'opération Éliminer. REMARQUE : restez sur la page après avoir planifié une opération. Tableau 12-4. État des tâches du Lifecycle Controller Événement Valeur du masque de filtre Logement Indique le logement occupé par le serveur du châssis. Les numéros de logement sont des ID séquentiels, qui vont de 1 à 16 (pour les 16 logements disponibles dans le châssis), qui permettent d'identifier l'emplacement du serveur dans le châssis. Lorsqu'il y a moins de 16 serveurs dans les logements, seuls les logements avec serveur sont affichés. Name (Nom) Affiche le nom du serveur dans chaque logement. Modèle Affiche le nom du modèle du serveur. ID de la tâche Numéro affecté par le service du Lifecycle Controller à une tâche spécifique. Description Phrase indiquant le type de tâche sur le serveur, par exemple une tâche de mise à jour, de redémarrage, etc. Condition Indique l'état de la tâche sur le serveur.Dépannage et récupération 455 Affichage des résumés du châssis CMC fournit des aperçus qui regroupent les informations relatives au châssis, aux contrôleurs CMC principal et de secours, à iKVM, aux ventilateurs, aux capteurs de température et aux modules d'E/S. Utilisation de l'interface Web Pour afficher les résumés du châssis, des contrôleurs CMC, du module iKVM et des modules d'E/S : 1 Ouvrez une session sur l'interface Web de CMC. 2 Sélectionnez Châssis dans l'arborescence. 3 Cliquez sur l'onglet Résumé. La page Résumé du châssis s'affiche. La Figure 12-5, la Figure 12-6, la Figure 12-7 et la Figure 12-8 décrivent les informations affichées à la page Résumé du châssis. Tableau 12-5. Résumé du châssis Élément Description Name (Nom) Affiche le nom du châssis. Le nom identifie le châssis sur le réseau. Pour des informations sur la configuration du nom du châssis, voir « Modification du nom d'un logement », à la page 140. Modèle Affiche le modèle de châssis ou son fabricant. Par exemple, PowerEdge 2900. Numéro de service Affiche le numéro de service du châssis. Le numéro de service est un identifiant unique fourni par le fabricant pour le support et la maintenance. Numéro d'inventaire Affiche le numéro d'inventaire du châssis. Emplacement Affiche l'emplacement du châssis. Basculement CMC disponible Indique (Oui, Non) si le contrôleur CMC de secours (le cas échéant) est capable de prendre le relais en cas de basculement. Condition de la puissance système Affiche la condition de la puissance système.456 Dépannage et récupération Tableau 12-6. Résumé CMC Élément Description Information de CMC actif Name (Nom) Affiche le nom CMC. Par exemple, CMC actif ou CMC de secours. Description Fournit une brève description de l'utilisation à laquelle CMC est destiné. Date/Heure Affiche la date et l'heure actuellement définies sur le contrôleur CMC actif. Emplacement du logement du contrôleur CMC actif Affiche le logement sur le contrôleur CMC actif. Mode de redondance Indique si le contrôleur CMC de secours est présent dans le châssis. Version du micrologiciel principale Affiche la version du micrologiciel du contrôleur CMC actif. Dernière mise à jour de micrologiciel Indique la date de la dernière mise à jour du micrologiciel. Si aucune mise à jour n'a été effectuée, cette propriété affiche en tant que S/O (-). Version du matériel Affiche la version matérielle du contrôleur CMC actif. Adresse MAC Affiche l'adresse MAC de l'interface réseau de CMC. L'adresse MAC est un identificateur unique pour CMC sur le réseau. Adresse IP Affiche l'adresse IP de l'interface réseau de CMC. par défaut Affiche la passerelle de l'interface réseau de CMC. Masque de sousréseau Affiche le masque de sous-réseau de l'interface réseau de CMC. Utiliser DHCP (pour l'adresse IP d'interface réseau) Indique si CMC est activé pour demander et obtenir automatiquement une adresse IP auprès du serveur DHCP (protocole de configuration dynamique des hôtes) (Oui ou Non). Le paramètre par défaut de cette propriété est Non. Serveur DNS principal Indique le nom du serveur DNS principal.Dépannage et récupération 457 Autre serveur DNS Indique le nom du serveur DNS secondaire. Utiliser DHCP pour le nom de domaine DNS Indique l'utilisation de DHCP pour acquérir le nom de domaine DNS (Oui, Non). Nom de domaine DNS Affiche le nom de domaine DNS. Informations sur le contrôleur CMC de secours Présentation Indique (Oui, Non) si un second contrôleur CMC (de secours) est installé. Version du micrologiciel de secours Affiche la version du micrologiciel CMC installé sur le contrôleur CMC de secours. Tableau 12-7. Résumé du module iKVM Élément Description Présentation Indique si le module iKVM est présent (oui ou non). Name (Nom) Affiche le nom iKVM. Le nom identifie le module iKVM sur le réseau. Fabricant Affiche le modèle iKVM ou son fabricant. Numéro de pièce Affiche le numéro de pièce d'iKVM. Le numéro de pièce est un identificateur unique fourni par le fournisseur. Les conventions d'attribution des noms des numéros de pièce diffèrent d'un fournisseur à l'autre. Version du micrologiciel Indique la version du micrologiciel iKVM. Version du matériel Indique la version du micrologiciel iKVM. État de l'alimentation Indique l'état de l'alimentation d'iKVM : sous tension, hors tension ou S/O (absente). USB/Vidéo du panneau avant activés Indique si les connecteurs USB et VGA du panneau avant sont activés (Oui ou Non). Tableau 12-6. Résumé CMC (suite) Élément Description458 Dépannage et récupération Autoriser l'accès à l'interface de ligne de commande CMC à partir du module iKVM Indique que l'accès à l'interface de ligne de commande est activé sur le module iKVM (Oui ou Non). Tableau 12-8. Résumé des modules d'E/S Élément Description Emplacement Indique les logements occupés par les modules d'E/S. Six logements sont identifiés par nom de groupe (A, B ou C) et par numéro de logement (1 ou 2). Noms des logements : A-1, A-2, B-1, B-2, C-1 ou C-2. Présentation Indique si le module d'E/S est présent (oui ou non). Name (Nom) Affiche le nom du module d'E/S. Structure Affiche le type de structure. État de l'alimentation Indique la condition de l'alimentation du module d'E/S : sous tension, hors tension ou N/A (absente). Numéro de service Affiche le numéro de service du module d'E/S. Le numéro de service est un identifiant unique fourni par le fabricant pour le support et la maintenance. Tableau 12-7. Résumé du module iKVM (suite) Élément DescriptionDépannage et récupération 459 Utilisation de la RACADM 1 Ouvrez une console série/Telnet/SSH d'accès à CMC, puis ouvrez une session. 2 Pour afficher les résumés du châssis et CMC, entrez : racadm getsysinfo 3 Pour afficher le résumé iKVM, entrez : racadm getkvminfo 4 Pour afficher le résumé iKVM, entrez : racadm getioinfo Affichage de la condition d'intégrité du châssis et des composants Utilisation de l'interface Web Pour afficher les résumés du châssis et d'intégrité des composants : 1 Ouvrez une session sur l'interface Web de CMC. 2 Sélectionnez Châssis dans l'arborescence. La page Intégrité du châssis s'affiche. La section Graphiques du châssis fournit une vue avant et arrière du châssis. Cette représentation graphique fournit un aperçu des composants installés dans le châssis et de leur état correspondant. Chaque graphique affiche une représentation en temps réel des composants installés. L'état du composant est indiqué par la couleur du sous-graphique de composant. • Aucune couleur : le composant est présent, sous tension et communique avec CMC, aucune indication d'événement indésirable. • Panneau orange : indique que seules des alertes sont émises et que des mesures correctives doivent être prises. • Croix rouge : indique qu'au moins une condition de panne est présente. Cela signifie que CMC peut toujours communiquer avec le composant et que la condition d'intégrité signalée est critique. • Grisé : indique que le composant est présent et n'est pas sous tension. Elle ne communique pas avec CMC et il n'y a aucune indication d'événement indésirable. 460 Dépannage et récupération Un champ textuel ou un infobulle correspondant au composant s'affiche lorsque vous placez le curseur sur le sous-graphique de ce dernier. L'état du composant est mis à jour de manière dynamique et les couleurs du sousgraphique correspondant, ainsi que les champs textuels sont automatiquement modifiés. En cliquant sur le sous-graphique du composant, vous sélectionnez les renseignements sur ce composant et les Liens rapides pour afficher sous les graphiques du châssis. La section Journal du matériel CMC fournit les 10 dernières entrées du Journal du matériel CMC à des fins de référence. Utilisation de la RACADM Ouvrez une console texte série/Telnet/SSH d'accès à CMC, ouvrez une session et entrez : racadm getmodinfo Affichage des journaux d'événements Les pages Journal du matériel et Journal CMC affichent les événements critiques pour le système qui surviennent sur le système géré. Affichage du journal du matériel CMC génère un journal du matériel pour les événements qui surviennent sur le châssis. Vous pouvez afficher le journal du matériel à l'aide de l'interface Web et de la RACADM distante. REMARQUE : vous devez disposer du privilège Administrateur d'effacement des journaux pour effacer le journal du matériel. REMARQUE : vous pouvez configurer CMC de manière à envoyer des e-mails ou des interruptions SNMP lorsque des événements spécifiques se produisent. Pour des informations sur la configuration CMC concernant l'envoi des alertes, voir « Configuration des alertes SNMP », à la page 438 et « Configuration des alertes par messagerie », à la page 445.Dépannage et récupération 461 Exemples d'entrées du journal du matériel critical System Software event: redundancy lost Wed May 09 15:26:28 2007 normal System Software event: log cleared was asserted Wed May 09 16:06:00 2007 warning System Software event: predictive failure was asserted Wed May 09 15:26:31 2007 critical System Software event: log full was asserted Wed May 09 15:47:23 2007 unknown System Software event: unknown event Utilisation de l'interface Web Vous pouvez afficher le journal du matériel, l'enregistrer dans un fichier texte et l'effacer via l'interface Web CMC. La Figure 12-9 décrit les informations fournies sur la page Journal du matériel de l'interface Web CMC. Pour afficher le journal du matériel : 1 Ouvrez une session sur l'interface Web de CMC. 2 Sélectionnez Châssis dans l'arborescence. 3 Cliquez sur l'onglet Journaux. 4 Cliquez sur le sous-onglet Journal du matériel. La page Journal du matériel s'affiche. Pour enregistrer une copie du journal du matériel sur votre station de gestion ou sur le réseau : 1 Cliquez sur Enregistrer le journal. Une boîte de dialogue s'ouvre. 2 Sélectionnez un emplacement pour un fichier texte du journal. REMARQUE : les images graphiques utilisées pour indiquer la gravité dans l'interface utilisateur n'apparaissent pas dans le journal car ce dernier est enregistré en tant que fichier texte. Dans ce fichier texte, la gravité est indiquée par les termes OK, Informatif, Inconnu, Avertissement et Grave. Les entrées de date et d'heure apparaissent dans l'ordre ascendant. Si apparaît dans la colonne Date et heure, cela signifie que l'événement s'est produit à l'arrêt ou au démarrage de l'un des modules, lorsqu'aucune date ou heure n'est disponible.462 Dépannage et récupération Pour effacer le journal de matériel, cliquez sur Effacer le journal. REMARQUE : CMC crée une nouvelle entrée du journal qui indique que celui-ci a été effacé. Utilisation de la RACADM Pour afficher le journal du matériel à l'aide de RACADM : 1 Ouvrez une console série/Telnet/SSH d'accès à CMC, puis ouvrez une session. 2 Pour afficher le journal du matériel, entrez : racadm getsel Pour effacer le journal du matériel, entrez : racadm clrsel Tableau 12-9. Informations du journal du matériel Élément Description Gravité OK Indique un événement normal qui ne nécessite pas d'actions correctives. Informatif Indique une entrée informative relative à un événement pour lequel la condition Gravité n'a pas été modifiée. Inconnu Indique un événement non critique pour lequel des actions correctives doivent être effectuées rapidement pour éviter les pannes système. Avertissement Indique un événement critique nécessitant des actions correctives immédiates pour éviter les pannes système. Grave Indique un événement critique nécessitant des mesures correctives immédiates pour éviter les pannes système. Date/Heure Indique la date et l'heure exactes auxquelles l'événement s'est produit (par exemple, en anglais Wed May 02 16:26:55 2007). Si les champs de la date et de l'heure sont vides, cela signifie que l'événement s'est produit au démarrage du système. Description Fournit une brève description, générée par CMC, de l'événement (par exemple, Redundancy lost, Server inserted). Dépannage et récupération 463 Affichage du journal CMC CMC génère un journal des événements liés au châssis. REMARQUE : vous devez disposer du privilège Administrateur d'effacement des journaux pour effacer le journal du matériel. Utilisation de l'interface Web Vous pouvez afficher le journal CMC, l'enregistrer dans un fichier texte et l'effacer via l'interface Web CMC. Le journal peut être à nouveau trié par source, date et heure ou description en cliquant sur l'en-tête de colonne correspondant. Pour inverser le tri, il vous suffit de cliquer de nouveau sur les en-têtes de colonne. La Figure 12-10 décrit les informations de la page Journal CMC de l'interface Web CMC. Pour afficher le journal CMC : 1 Ouvrez une session sur l'interface Web de CMC. 2 Sélectionnez Châssis dans l'arborescence. 3 Cliquez sur l'onglet Journaux. 4 Cliquez sur le sous-onglet Journal CMC. La page Journal CMC s'affiche. 5 Cliquez sur Enregistrer le journal pour enregistrer une copie du journal CMC sur votre station de gestion ou sur le réseau. La boîte de dialogue s'ouvre. Choisissez l'emplacement d'enregistrement du fichier texte du journal. Tableau 12-10. Informations du journal CMC Commande Résultat Source Indique l'interface (par exemple CMC) ayant provoqué l'événement. Date/Heure Indique la date et l'heure exactes auxquelles l'événement s'est produit (par exemple, en anglais Wed May 02 16:26:55 2007). Description Fournit une brève description de l'action, telle qu'une ouverture ou fermeture de session, un échec d'ouverture de session ou l'effacement des journaux. Les descriptions sont générées par CMC.464 Dépannage et récupération Utilisation de la RACADM Pour afficher les informations du journal CMC à l'aide de RACADM : 1 Ouvrez une console série/Telnet/SSH d'accès à CMC, puis ouvrez une session. 2 Pour afficher le journal du matériel, entrez : racadm getraclog Pour effacer le journal du matériel, entrez : racadm clrraclog Utilisation de la console de diagnostic La page Console de diagnostic permet à un utilisateur avancé ou à un utilisateur sous la supervision du support technique de diagnostiquer les problèmes matériels du châssis à l'aide de commandes CLI. REMARQUE : vous devez disposer du privilège Administrateur de commandes de débogage pour modifier ces paramètres. Pour accéder à la page Console de diagnostic : 1 Ouvrez une session sur l'interface Web de CMC. 2 Sélectionnez Châssis dans l'arborescence. 3 Cliquez sur l'onglet Dépannage. 4 Cliquez sur le sous-onglet Diagnostic. La page Console de diagnostic s'affiche. Pour exécuter une commande CLI de diagnostic, entrez la commande dans le champ Saisir une commande RACADM, puis cliquez sur Envoyer pour exécuter la commande de diagnostic. La page Résultats des diagnostics apparaît. Pour retourner à la page Console de diagnostic, cliquez sur Retour à la page Console de diagnostic ou sur Actualiser. Dépannage et récupération 465 La console de diagnostic prend en charge les commandes répertoriées dans la Figure 12-11 ainsi que les commandes RACADM. Réinitialisation des composants La page Réinitialiser les composants permet aux utilisateurs de réinitialiser le contrôleur CMC actif, ou de réattribuer virtuellement un siège aux serveurs, les obligeant ainsi à se comporter comme s'ils avaient été retirés et réinsérés. Si le châssis intègre un contrôleur CMC de secours, la réinitialisation de CMC actif entraîne un basculement et le contrôleur CMC de secours devient alors actif. REMARQUE : pour réinitialiser les composants, vous devez disposer du privilège Administrateur de commandes de débogage. Tableau 12-11. Commandes de diagnostic prises en charge Commande Résultat arp Affiche le contenu de la table du protocole de résolution d'adresses (ARP). Les entrées ARP ne peuvent être ni ajoutées, ni supprimées. ifconfig Affiche le contenu de la table d'interface réseau. netstat Imprime le contenu du tableau de routage. ping Vérifie que l' de destination est accessible à partir de CMC avec le contenu actuel du tableau de routage. Vous devez saisir une adresse IP de destination dans le champ situé à droite de cette option. Un paquet d'écho du protocole de contrôle des messages sur Internet (ICMP) est envoyé à l'adresse IP de destination en fonction du contenu actuel de la table de routage. gettracelog Affiche le journal de suivi (cette opération peut prendre quelques secondes). La commande gettracelog -i renvoie le nombre d'enregistrements figurant dans le journal de suivi. REMARQUE : pour des informations supplémentaires sur la commande gettracelog, voir la section de la commande gettracelog dans le RACADM Command Line Reference Guide for iDRAC6 and CMC (Guide de référence de ligne de commande RACADM pour iDRAC6 et CMC).466 Dépannage et récupération Pour accéder à la page Console de diagnostic : 1 Ouvrez une session sur l'interface Web de CMC. 2 Sélectionnez Châssis dans l'arborescence. 3 Cliquez sur l'onglet Dépannage. 4 Cliquez sur le sous-onglet Réinitialiser les composants. La page Réinitialiser les composants s'affiche. La section Résumé CMC de la page Réinitialiser les composants affiche les informations suivantes : Tableau 12-12. Résumé CMC Attribut Description Intégrité OK CMC est présent et communique avec ses composants. Informatif Affiche des informations sur CMC en l'absence de modification de la condition de l'intégrité (OK, Avertissement, Grave). Avertissement Des alertes d'avertissement ont été émises et des actions correctives doivent être effectuées. Si aucune action corrective n'est effectuée, des pannes critiques ou graves susceptibles d'affecter l'intégrité de CMC peuvent se produire. Grave Au moins une alerte de panne a été générée. L'état grave représente une panne système de CMC et une action corrective doit être effectuée immédiatement. Date/Heure Affiche la date et l'heure de CMC au format MM/JJ/AAAA, où MM correspond au mois, JJ à la date et AAAA à l'année. Emplacement du logement du contrôleur CMC actif Affiche le logement sur le contrôleur CMC actif. Mode de redondance Affiche Redondant si un contrôleur CMC de secours est présent dans le châssis, et Sans de redondance si aucun contrôleur CMC de secours n'est présent dans le châssis.Dépannage et récupération 467 5 La section Réattribuer virtuellement un siège aux serveurs de la page Réinitialiser les composants affiche les informations suivantes : Tableau 12-13. Réattribuer virtuellement un siège aux serveurs Attribut Description Logement Indique le logement occupé par le serveur du châssis. Les noms de logement sont des ID séquentiels, allant de 1 à 16, permettant d'identifier l'emplacement du serveur au sein du châssis. Name (Nom) Affiche le nom du serveur dans chaque logement. Présentation Indique si le serveur est présent dans le logement (Oui ou Non). Intégrité OK Le serveur est présent et communique avec CMC. En cas de perte de la communication entre CMC et le serveur, CMC ne pourra pas obtenir ni afficher la condition d'intégrité du serveur. Informatif Affiche des informations sur le serveur en l'absence de modification de l'état de l'intégrité (OK, Avertissement, Grave). Avertissement Des alertes d'avertissement ont été émises et des actions correctives doivent être effectuées. Si aucune action corrective n'est effectuée, des pannes critiques ou graves susceptibles d'affecter l'intégrité du serveur peuvent se produire. Grave Au moins une alerte de panne a été générée. L'état grave représente une panne système de CMC et une action corrective doit être effectuée immédiatement.468 Dépannage et récupération Condition iDRAC Affiche la condition du contrôleur de gestion intégré iDRAC du serveur : • S/o (-) : le serveur n'est pas présent ou le châssis n'est pas sous tension. • Prêt : l'iDRAC est prêt et fonctionne normalement. • Corrompu : le micrologiciel iDRAC est corrompu. Utilisez l'utilitaire de mise à jour du micrologiciel iDRAC pour réparer le micrologiciel. • Échec : impossible de communiquer avec iDRAC. Cochez la case Réattribuer virtuellement un siège pour supprimer l'erreur. Si cette opération échoue, retirez et replacez manuellement le serveur pour supprimer l'erreur. • Mise à jour du micrologiciel : la mise à jour du micrologiciel iDRAC est en cours ; attendez que la mise à jour se termine avant de tenter une action quelconque. • Initialisation : la réinitialisation iDRAC est en cours ; attendez que la mise sous tension du contrôleur se termine avant de tenter une action quelconque. État de l'alimentation Affiche l'état de de l'alimentation du serveur : • N/A (-): CMC n'a pas déterminé l'état d'alimentation du serveur. • Désactivé : le serveur ou le châssis est hors tension. • Activé : le châssis et le serveur sont sous tension. • Activation : état temporaire entre le mode Désactivé et Activé. Lorsque le cycle d'activation est terminé, l'état d'alimentation passe en mode Activé. • Mise hors tension : état temporaire entre le mode Activé et Désactivé. Lorsque le cycle de désactivation est terminé, l'état d'alimentation passe en mode Désactivé. Réattribuer virtuellement un siège Cochez la case pour réattribuer virtuellement un siège à ce serveur. Tableau 12-13. Réattribuer virtuellement un siège aux serveurs (suite) Attribut DescriptionDépannage et récupération 469 6 Pour réattribuer virtuellement un siège à un serveur, cochez la case des serveurs dont le siège sera réattribué, puis sélectionnez Appliquer les sélections. Cette opération oblige les serveurs à se comporter comme s'ils avaient été retirés et réinsérés. 7 Sélectionnez Réinitialiser/Basculer CMC pour entraîner la réinitialisation de CMC actif. Si un contrôleur CMC de secours est présent et qu'un châssis est pleinement redondant, un basculement se produit, amenant le contrôleur CMC de secours à devenir actif. Résolution des erreurs de protocole de temps du réseau (NTP) Après avoir configuré CMC afin qu'il synchronise son horloge avec un serveur de temps distant sur le réseau, un délai de 2 à 3 minutes peut s'écouler avant qu'une modification de la date et de l'heure se produise. Si aucun changement n'a eu lieu une fois ce délai écoulé, il peut être nécessaire de procéder à un dépannage d'un problème. CMC peut ne pas être en mesure de synchroniser son horloge pour plusieurs raisons : • Un problème lié aux paramètres du serveur NTP 1, du serveur NTP 2 et du serveur NTP 3 a pu se produire. • Un nom d'hôte ou une adresse IP non valide a pu être entré par erreur. • Un problème de connectivité réseau empêchant CMC de communiquer avec l'un des serveurs NTP configurés a pu se produire. • Un problème de DNS empêchant la résolution de l'un des noms d'hôte de serveur NTP a pu se produire. CMC fournit des outils de dépannage de ces problèmes ; la principale source d'informations de dépannage étant le journal de suivi CMC. Ce journal contient un message d'erreur concernant les pannes liées à NTP. Si le CMC n'est pas en mesure d'effectuer la synchronisation avec l'un des serveurs NTP distants ayant été configurés, il dérive alors sa synchronisation de l'horloge système local. Si le CMC est synchronisé sur l'horloge système local plutôt que sur un serveur de temps distant, le journal de suivi contient une entrée similaire à la suivante : Jan 8 20:02:40 cmc ntpd[1423]: synchronized to LOCAL(0), stratum 10470 Dépannage et récupération Vous pouvez également vérifier l'état ntpd en tapant la commande RACADM suivante : racadm getractime –n Si aucun « * » n'est affiché par rapport à l'un des serveurs configurés, il est possible qu'un élément ne soit pas configuré correctement. La sortie de la commande ci-dessus contient également des statistiques NTP détaillées qui peuvent faciliter le débogage du problème de non-synchronisation du serveur. Si vous tentez de configurer un serveur NTP basé sur Windows, il peut s'avérer utile d'augmenter le paramètre MaxDist pour ntpd. Avant de modifier ce paramètre, il convient de bien lire et comprendre toutes les implications que cela comporte, tout particulièrement car le paramètre par défaut doit être suffisamment élevé pour pouvoir être accepté par la majorité des serveurs NTP. Pour modifier le type de paramètre, entrez la commande suivante : racadm config –g cfgRemoteHosts –o cfgRhostsNtpMaxDist 32 Après avoir effectué la modification, redémarrez ntpd en désactivant NTP, en attendant entre 5 et 10 secondes, puis en réactivant NTP. REMARQUE : NTP peut avoir besoin de 3 minutes de plus pour se synchroniser. Pour désactiver NTP, entrez : racadm config –g cfgRemoteHosts –o cfgRhostsNtpEnable 0 Pour activer NTP, entrez : racadm config –g cfgRemoteHosts –o cfgRhostsNtpEnable 1 Si les serveurs NTP sont correctement configurés et que cette entrée est présente dans le journal de suivi, cela confirme que le CMC est incapable de se synchroniser avec l'un des serveurs NTP configurés. D'autres entrées du journal de suivi liées à NTP peuvent vous aider à effectuer le dépannage. S'il s'agit d'un problème de configuration incorrecte de l'adresse IP du serveur NTP, une entrée similaire à la suivante risque de s'afficher : Jan 8 19:59:24 cmc ntpd[1423]: Cannot find existing interface for address 1.2.3.4 Jan 8 19:59:24 cmc ntpd[1423]: configuration of 1.2.3.4 failed Dépannage et récupération 471 Si un paramètre de serveur NTP a été configuré avec un nom d'hôte non valide, l'entrée du journal de suivi suivante risque de s'afficher : Aug 21 14:34:27 cmc ntpd_initres[1298]: host name not found: blabla Aug 21 14:34:27 cmc ntpd_initres[1298]: couldn't resolve `blabla', giving up on it Voir « Utilisation de la console de diagnostic », à la page 464 pour des informations sur la saisie de la commande gettracelog pour passer en revue le journal de suivi à l'aide de l'interface utilisateur CMC. Interprétation des couleurs des LED et séquences de clignotement Les LED du châssis fournissent des informations selon leur couleur et leur clignotement ou absence de clignotement : • Une LED verte fixe indique que le composant est sous tension. Une LED verte clignotante indique un événement critique mais de routine, comme par exemple le téléversement du micrologiciel, au cours duquel l'unité est indisponible. Cela n'indique pas une panne. • Une LED orange clignotant sur un module indique une panne de ce module. • L'utilisateur peut configurer les LED bleues clignotantes et les utiliser pour l'identification (voir « Configuration des LED pour l'identification des composants du châssis », à la page 437). Tableau 12-14. Couleurs des LED et séquences de clignotement Composant Couleur de la LED, séquence de clignotement Signification CMC Vert, continu Sous tension Vert, clignotant Micrologiciel en cours de téléversement Vert, foncé Hors tension Bleu, continu Actif Bleu, clignotant Identificateur d'un module activé par l'utilisateur Orange, continu Inutilisé Orange, clignotant Panne Bleu, foncé Mode Veille472 Dépannage et récupération iKVM Vert, continu Sous tension Vert, clignotant Micrologiciel en cours de téléversement Vert, foncé Hors tension Orange, continu Inutilisé Orange, clignotant Panne Orange, foncé Pas de panne Server (Serveur) Vert, continu Sous tension Vert, clignotant Micrologiciel en cours de téléversement Vert, foncé Hors tension Bleu, continu Normal Bleu, clignotant Identificateur d'un module activé par l'utilisateur Orange, continu Inutilisé Orange, clignotant Panne Bleu, foncé Pas de panne Module d'E/S (courant) Vert, continu Sous tension Vert, clignotant Micrologiciel en cours de téléversement Vert, foncé Hors tension Bleu, continu Normal/maître de la pile Bleu, clignotant Identificateur d'un module activé par l'utilisateur Orange, continu Inutilisé Orange, clignotant Panne Bleu, foncé Pas de panne/esclave de la pile Tableau 12-14. Couleurs des LED et séquences de clignotement (suite) Composant Couleur de la LED, séquence de clignotement SignificationDépannage et récupération 473 Module d'E/S (transfert) Vert, continu Sous tension Vert, clignotant Inutilisé Vert, foncé Hors tension Bleu, continu Normal Bleu, clignotant Identificateur d'un module activé par l'utilisateur Orange, continu Inutilisé Orange, clignotant Panne Bleu, foncé Pas de panne Ventilateur Vert, continu Ventilateur en marche Vert, clignotant Inutilisé Vert, foncé Hors tension Orange, continu Type de ventilateur non reconnu, mettre à jour le micrologiciel CMC Orange, clignotant Défaillance du ventilateur ; tachymètre hors de portée Orange, foncé Inutilisé Bloc d'alimentation (Ovale) Vert, continu Alimentation en courant alternatif OK (Ovale) Vert, clignotant Inutilisé (Ovale) Vert, foncé Alimentation en courant alternatif défaillante Orange, continu Inutilisé Orange, clignotant Panne Orange, foncé Pas de panne (Cercle) Vert, continu Alimentation en courant continu OK (Cercle) Vert, foncé Alimentation en courant continu défaillante Tableau 12-14. Couleurs des LED et séquences de clignotement (suite) Composant Couleur de la LED, séquence de clignotement Signification474 Dépannage et récupération Dépannage d'un contrôleur CMC qui ne répond pas REMARQUE : il est impossible de se connecter sur le contrôleur CMC de secours à l'aide d'une console série. Si vous ne pouvez pas ouvrir une session sur CMC via l'une des interfaces (interface Web, Telnet, SSH, RACADM distante ou série), vous pouvez vérifier la fonctionnalité CMC en observant les LED de CMC, en obtenant les informations de récupération via le port série DB-9 ou en récupérant l'image du micrologiciel CMC. Observation des LED afin d'isoler le problème Lorsque vous faites face à CMC tel qu'il est installé dans le châssis, vous voyez deux LED du côté gauche de la carte. LED du haut : la LED verte supérieure indique l'état de l'alimentation. Si celle-ci n'est PAS allumée : 1 Vérifiez qu'une alimentation secteur est présente sur au moins l'un des blocs d'alimentation. 2 Vérifiez que la carte CMC est correctement insérée. Vous pouvez tirer sur la poignée d'éjection, retirer la carte CMC et la réinstaller en vous assurant qu'elle est insérée complètement et que le loquet se ferme correctement. LED du bas : la LED inférieure est multicolore. Lorsque le contrôleur CMC est actif et en cours de fonctionnement, et lorsqu'il n'y a pas de problème, la LED inférieure est bleue. Si elle est orange, une panne a été détectée. Cette panne peut avoir été causée par l'un des trois événements suivants : • une panne du noyau. Dans ce cas, la carte CMC doit être remplacée. • un échec de l'auto-test. Dans ce cas, la carte CMC doit être remplacée. • une corruption de l'image. Dans ce cas, vous pouvez récupérer la carte CMC en téléversant l'image du micrologiciel CMC. REMARQUE : plus d'une minute est nécessaire pour amorcer/réinitialiser normalement CMC sur le système d'exploitation concerné avant de pouvoir ouvrir une session. La LED bleue est activée sur le CMC actif. Dans une configuration redondante comprenant deux CMC, seule la LED supérieure verte est activée sur le contrôleur CMC de secours.Dépannage et récupération 475 Obtention des informations de récupération à partir du port série DB-9 Lorsque la LED inférieure est orange, les informations de récupération doivent être disponibles via le port série DB-9 situé à l'avant de CMC. Pour obtenir les informations de récupération : 1 Installez un câble de modem NULL entre CMC et un ordinateur client. 2 Ouvrez le logiciel d'émulation de terminal de votre choix (comme par exemple HyperTerminal ou Minicom). Configurez les paramètres suivants : 8 bits, aucune parité, aucun contrôle du débit, débit en bauds 115 200. Un échec de la mémoire du noyau affichera un message d'erreur toutes les cinq secondes. 3 Appuyez sur . Si une invite de récupération s'affiche, des informations supplémentaires sont disponibles. L'invite indique le numéro d'emplacement CMC et le type de panne. Pour afficher la cause de la panne ainsi que la syntaxe de quelques commandes, entrez recover puis appuyez sur . Exemples d'invites : recover1[self test] CMC 1 self test failure recover2[Bad FW images] CMC2 has corrupted images • Si l'invite indique un échec de l'auto-test, il n'y a pas de composant réparable sur CMC. CMC est défectueux et doit être renvoyé à Dell. • Si l'invite indique Bad FW Images (Images FW incorrectes), suivez les étapes fournies dans « Récupération de l'image du micrologiciel », à la page 475 pour résoudre le problème. Récupération de l'image du micrologiciel CMC entre en mode de récupération lorsqu'un démarrage normal du système d'exploitation CMC n'est pas possible. En mode de récupération, le sousensemble réduit de commandes disponible vous permet de reprogrammer les périphériques Flash en téléversant le fichier de mise à jour du micrologiciel, firmimg.cmc. Il s'agit du même fichier image de micrologiciel que celui utilisé pour les mises à jour normales du micrologiciel. La procédure de récupération affiche les opérations en cours et redémarre le système d'exploitation de CMC lorsqu'elle a terminé.476 Dépannage et récupération Lorsque vous entrez la commande recover et que vous appuyez ensuite sur à l'invite de récupération, la cause de la récupération et les sous-commandes disponibles s'affichent. Voici un exemple de séquence de récupération : recover getniccfg recover setniccfg 192.168.0.120 255.255.255.0 192.168.0.1 recover ping 192.168.0.100 recover fwupdate -g -a 192.168.0.100 REMARQUE : connectez le câble réseau au port RJ45 situé le plus à gauche REMARQUE : en mode récupération, vous ne pouvez pas utiliser normalement la commande ping sur CMC car aucune pile réseau n'est active. La commande de recover ping vous permet d'utiliser la commande ping sur le serveur TFTP afin de vérifier la connexion au réseau local. Sur certains systèmes, vous devrez utiliser la commande recover reset après la commande setniccfg. Dépannage des problèmes de réseau Le journal de suivi CMC interne vous permet de déboguer les problèmes d'alerte et de réseau CMC. Vous pouvez accéder au journal de suivi via l'interface Web CMC (voir « Utilisation de la console de diagnostic ») ou la RACADM (voir « Utilisation de l'interface de ligne de commande RACADM » et la section relative à la commande gettracelog du RACADM Command Line Reference Guide for iDRAC6 and CMC (Guide de référence de la ligne de commande RACADM pour iDRAC et CMC). Le journal de suivi enregistre les informations suivantes : • DHCP : effectue le suivi des paquets envoyés à un serveur DHCP et reçus de celui-ci. • DDNS : effectue le suivi des requêtes et des réponses de mise à jour du DNS. • Modifications de configuration apportées aux interfaces réseau. Le journal de suivi peut en outre contenir des codes d'erreur spécifiques au micrologiciel CMC (micrologiciel CMC interne) et non pas au système d'exploitation du système géré.Dépannage et récupération 477 Réinitialisation de mot de passe administrateur oublié PRÉCAUTION : la plupart des réparations ne peuvent être effectuées que par un technicien de maintenance agréé. N'effectuez que les opérations de dépannage et les petites réparations autorisées par la documentation de votre produit et suivez les instructions fournies en ligne ou par téléphone par l'équipe d'entretien et d'assistance technique. Tout dommage causé par une réparation non autorisée par Dell est exclu de votre garantie. Consultez et respectez les consignes de sécurité fournies avec votre produit. Un utilisateur doit disposer de privilèges Administrateur pour réaliser des opérations de gestion. Le logiciel CMC possède une fonctionnalité de protection du mot de passe de compte utilisateur qui peut être désactivée en cas d'oubli du mot de passe du compte administrateur. En cas d'oubli du mot de passe du compte administrateur, ce dernier peut être récupéré via le cavalier PASSWORD_RSET sur la carte CMC. La carte CMC possède un connecteur de réinitialisation du mot de passe à deux fiches comme décrit dans laFigure 12-1. Si un cavalier est installé dans le connecteur de réinitialisation, le mot de passe et le compte d'administrateur par défaut sont activés et définis sur les valeurs par défaut suivantes : nom d'utilisateur : root et mot de passe : calvin. Le compte d'administrateur est réinitialisé sans tenir compte de la suppression du compte ou de la modification du mot de passe. REMARQUE : assurez-vous que le module CMC est en mode passif avant de démarrer. Un utilisateur doit disposer de privilèges Administrateur pour réaliser des opérations de gestion. En cas d'oubli du mot de passe du compte administrateur, ce dernier peut être récupéré via le cavalier PASSWORD_RSET sur la carte CMC. Le cavalier PASSWORD_RST utilise un connecteur à deux broches comme indiqué dans la Figure 12-1. Pendant que le cavalier PASSWORD_RST est installé, le compte d'administrateur et le mot de passe par défaut sont activés et définis sur les valeurs par défaut suivantes : username: root password: calvin478 Dépannage et récupération Le compte administrateur est temporairement réinitialisé, même si le compte d'administrateur a été supprimé ou si le mot de passe a été changé. REMARQUE : lorsque le cavalier PASSWORD_RST est installé, une configuration console en série par défaut est utilisée (plutôt que les valeurs de propriété de configuration), comme suit : cfgSerialBaudRate=115200 cfgSerialConsoleEnable=1 cfgSerialConsoleQuitKey=^\ cfgSerialConsoleIdleTimeout=0 cfgSerialConsoleNoAuth=0 cfgSerialConsoleCommand="" cfgSerialConsoleColumns=0 1 Appuyez sur le loquet de blocage de CMC situé sur la poignée et faites pivoter la poignée à l'opposé du panneau avant du module. Faites glisser le module CMC hors de l'enceinte. REMARQUE : les décharges électrostatiques peuvent affecter le CMC. Dans certaines conditions, les décharges électrostatiques peuvent s'accumuler dans votre organisme ou dans un objet, puis être transmises à un autre objet, comme votre CMC. Pour éviter les dommages liés aux décharges électrostatiques, vous devez veiller à décharger l'électricité statique de votre corps lors de la manipulation et de l'accès au CMC en dehors du châssis. 2 Retirez la fiche de cavalier du connecteur de réinitialisation du mot de passe, puis insérez la fiche à deux broches afin d'activer le compte Administrateur par défaut. Pour identifier l'emplacement du cavalier de mot de passe sur la carte CMC, voir Figure 12-1.Dépannage et récupération 479 Figure 12-1. Emplacement du cavalier de réinitialisation du mot de passe 3 Faites glisser le module CMC dans l'enceinte. Rebranchez les câbles qui ont été débranchés. REMARQUE : veillez à ce que le module CMC devienne le module actif et le reste jusqu'à ce que les étapes restantes soient terminées. Tableau 12-15. Paramètres du cavalier de mot de passe CMC PASSWORD_RSET (par défaut) La fonction de réinitialisation du mot de passe est désactivée. La fonction de réinitialisation du mot de passe est activée. PASSWORD_RSET480 Dépannage et récupération 4 Si le module CMC branché par cavaliers est le seul module CMC, il vous suffit d'attendre qu'il ait fini de redémarrer. En cas de présence de CMC redondants dans votre châssis, effectuez un changement pour rendre actif le module CMC branché par cavaliers. Sur l'interface utilisateur : a Naviguez jusqu'à la page du Châssis, cliquez sur l'onglet Alimentation→ sous-onglet Contrôle. b Sélectionnez Réinitialiser CMC (redémarrage à chaud), puis cliquez sur Appliquer. Le CMC bascule automatiquement sur le module redondant qui devient maintenant actif. 5 Connectez-vous au CMC actif à l'aide du nom d'utilisateur Administrateur par défaut (root) et du mot de passe (calvin), puis restaurez (le cas échéant) les paramètres de compte utilisateur. Les comptes et les mots de passe existants ne sont pas désactivés et restent actifs. 6 Effectuez toutes les actions de gestion nécessaires, y compris la création d'un nouveau mot de passe administrateur à la place de celui oublié. 7 Retirez le cavalier PASSWORD_RST à 2 broches, puis replacez la fiche de cavalier. a Appuyez sur le loquet de blocage de CMC situé sur la poignée et faites pivoter la poignée à l'opposé du panneau avant du module. Faites glisser le module CMC hors de l'enceinte. b Retirez la fiche de cavalier à 2 broches puis replacez la fiche de cavalier. c Faites glisser le module CMC dans l'enceinte. Rebranchez les câbles qui ont été débranchés. Répétez l'étape 4 pour faire du module CMC non cavalier le CMC actif.Dépannage et récupération 481 Enregistrement et restauration des certificats et paramètres de configuration du châssis. Dans l'interface utilisateur CMC, naviguez sur Présentation du châssis→ Configuration→ Sauvegarde du châssis. L'écran Sauvegarde du châssis s'affiche. Pour enregistrer une sauvegarde de la configuration du châssis : 1 Sur l'écran Sauvegarde du châssis, cliquez sur Enregistrer. 2 Ignorez le chemin du fichier par défaut (facultatif), puis cliquez sur OK pour enregistrer le fichier. REMARQUE : le nom du fichier de sauvegarde par défaut contient le numéro de service du châssis. Ce fichier de sauvegarde peut être utilisé ultérieurement, pour restaurer les paramètres et les certificats de ce châssis uniquement. Pour restaurer la configuration du châssis : 1 Sur l'écran Sauvegarde du châssis, cliquez sur Naviguer. 2 Entrez ou naviguez sur le fichier de sauvegarde, puis cliquez sur Ouvrir pour le sélectionner. 3 Cliquez sur Restaurer. REMARQUE : CMC ne se réinitialise pas à la restauration de la configuration, cependant les services CMC peuvent prendre un certain temps pour imposer toute modification/nouvelle configuration. Une fois la restauration de la configuration réussie, toutes les sessions actuelles sont fermées. Dépannage des alertes Utilisez le journal CMC et le journal de suivi pour dépanner les alertes CMC. Le succès ou l'échec de chaque tentative d'envoi d'e-mail et/ou interruption SNMP est enregistré dans le journal CMC. Le journal de suivi contient des informations complémentaires sur les erreurs spécifiques. Cependant, étant donné que SNMP ne confirme pas la livraison des interruptions, utilisez un analyseur réseau ou un outil tel que, snmputil de Microsoft pour effectuer le suivi des paquets sur le système géré. Vous pouvez configurer les alertes SNMP à l'aide de l'interface Web. Pour plus d'informations, voir « Configuration des alertes SNMP ». 482 Dépannage et récupérationDiagnostics 483 Diagnostics L'écran LCD vous permet de diagnostiquer des problèmes concernant un serveur ou un module dans le châssis. En cas de problème ou de défaillance avec le châssis ou un serveur ou un autre module dans le châssis, l'indicateur d'état de l'écran LCD clignote en orange. Dans le menu principal, une icône avec un arrière-plan orange s'affiche en regard de l'élément de menu (Serveur ou Enceinte) qui permet d'accéder au serveur ou au module défectueux. En suivant les icônes orange jusque dans le système de menus de l'écran LCD, vous pouvez afficher l'écran d'état et les messages d'erreur concernant l'élément présentant le problème. Les messages d'erreur de l'écran LCD peuvent être supprimés en supprimant le module ou le serveur au centre du problème. Dans le cas d'erreurs de serveur, utilisez l'interface Web iDRAC ou l'interface de ligne de commande pour effacer le journal SEL (System Event Log - Journal des événements système) afin de supprimer les erreurs de serveur de l'écran LCD. Utilisation de l'interface de l'écran LCD Vous pouvez utiliser l'écran LCD pour procéder à la configuration et aux diagnostics, et pour obtenir des informations sur la condition du châssis et son contenu. Navigation sur l'écran LCD Utilisez les boutons à droite de l'écran LCD pour vous servir de l'écran LCD. Les boutons flèches haut, bas, gauche et droite permettent de changer les éléments de menu ou les icônes sélectionnés à l'écran. L'élément sélectionné est indiqué avec un arrière-plan ou un bord bleu clair. Le bouton central active l'élément sélectionné. Lorsque les messages affichés sur l'écran LCD débordent de l'écran, utilisez les boutons flèches gauche et droite pour faire défiler le texte vers la gauche et vers la droite.484 Diagnostics Les icônes décrites dans la Figure 13-1 permettent de naviguer entre les écrans LCD : Menu Main (Menu principal) Vous pouvez naviguer vers l'un des écrans suivants depuis le menu principal : • Menu Configuration de l'écran LCD : sélectionne la langue à utiliser et l'écran LCD qui s'affiche lorsque personne n'utilise l'écran LCD. • Serveur : affiche des informations sur la condition des serveurs. • Enceinte : affiche des informations sur la condition du châssis. 1 Utilisez les boutons flèche haut et bas pour mettre un élément en surbrillance. 2 Appuyez sur le bouton central pour activer votre sélection. Tableau 13-1. Icônes de navigation de l'écran LCD Icône normale Icône en surbrillance Nom et description de l'icône Précédent. Mettez en surbrillance le bouton central et appuyez dessus pour retourner à l'écran précédent. Accepter/Oui. Mettez en surbrillance le bouton central et appuyez dessus pour accepter une modification et revenir à l'écran précédent. Ignorer/Suivant. Mettez le bouton central en surbrillance et appuyez dessus pour ignorer les modifications apportées et accéder à l'écran suivant. Non Mettez en surbrillance le bouton central et appuyez dessus pour répondre « Non » à une question. Pivoter. Mettez le bouton central en surbrillance et appuyez dessus pour alterner entre les affichages graphiques avant et arrière du châssis. REMARQUE : l'arrière-plan orange indique que la vue opposée comporte des erreurs. Identification de composant Fait clignoter la LED bleue sur un composant. REMARQUE : un rectangle bleu clignotant entoure cette icône lorsque l'Identification de composant est activée.Diagnostics 485 Menu de configuration de l'écran LCD Le menu Configuration de l'écran LCD affiche un menu d'éléments pouvant être configurés : • Configuration de la langue : choisissez la langue que vous souhaitez utiliser pour le texte et les messages de l'écran LCD. • Écran par défaut : choisissez l'écran qui s'affiche en l'absence d'activité sur l'écran LCD. 1 Utilisez les boutons flèche haut et bas pour mettre un élément en surbrillance dans le menu ou mettez en surbrillance l'icône Précédent si vous souhaitez retourner au menu principal. 2 Appuyez sur le bouton central pour activer votre sélection. Écran de configuration de la langue L'écran Configuration de la langue vous permet de sélectionner la langue utilisée pour les messages de l'écran LCD. La langue active est mise en surbrillance avec un arrière-plan bleu clair. 1 Utilisez les boutons flèche haut, bas, gauche et droite pour mettre la langue souhaitée en surbrillance. 2 Appuyez sur le bouton central. L'icône Accepter apparaît en surbrillance. 3 Appuyez sur le bouton central pour confirmer la modification. Le menu Configuration de l'écran LCD est affiché. Écran par défaut L'écran par défaut vous permet de changer l'écran affiché par l'écran LCD en l'absence d'activité sur le panneau. L'écran par défaut est le Menu principal. Vous pouvez choisir parmi les écrans suivants à afficher : • Menu Main (Menu principal) • Condition du serveur (affichage graphique avant du châssis) • Condition du module (affichage graphique arrière du châssis) • Personnalisé (logo Dell avec le nom du châssis)486 Diagnostics L'écran par défaut actif est mis en surbrillance en bleu clair. 1 Utilisez les boutons flèche haut et bas pour mettre en surbrillance l'écran que vous souhaitez définir comme écran par défaut. 2 Appuyez sur le bouton central. L'icône Accepter est mise en surbrillance. 3 Appuyez de nouveau sur le bouton central pour confirmer la modification. L'écran par défaut s'affiche. Écran Condition du serveur graphique L'écran Condition du serveur graphique affiche des icônes pour chaque serveur installé dans le châssis et indique la condition d'intégrité générale de chaque serveur. L'intégrité du serveur est indiquée par la couleur de l'icône du serveur : • Gris : le serveur est hors tension sans erreurs • Vert : le serveur est sous tension sans erreurs • Jaune : le serveur a une ou plusieurs erreurs non critiques • Rouge : le serveur présente une ou plusieurs erreurs critiques • Noir : le serveur n'est pas présent Un rectangle bleu clair clignotant autour d'une icône de serveur indique que le serveur est mis en surbrillance. Pour afficher l'écran Condition du module graphique : 1 Mettez en surbrillance l'icône Rotation. 2 Appuyez sur le bouton central. Pour afficher l'écran de condition d'un serveur : 1 Utilisez les boutons flèche pour mettre en surbrillance le serveur souhaité. 2 Appuyez sur le bouton central. L'écran Condition du serveur s'affiche. Pour retourner au menu principal : 1 Utilisez les boutons flèche pour mettre en surbrillance l'icône Précédent. 2 Appuyez sur le bouton central.Diagnostics 487 Écran Condition du module graphique L'écran Condition du module graphique affiche tous les modules installés à l'arrière du châssis et fournit des informations récapitulatives sur l'intégrité de chaque module. L'intégrité du module est indiquée par la couleur de chaque icône de module, comme suit : • Gris : le module est hors tension ou sous tension en veille sans erreurs • Vert : le module est sous tension sans erreurs • Jaune : le module a une ou plusieurs erreurs non critiques • Rouge : le serveur présente une ou plusieurs erreurs critiques • Noir : le module n'est pas présent Un rectangle bleu clair clignotant autour d'une icône de module indique que le module est mis en surbrillance. Pour afficher l'écran Condition du serveur graphique : 1 Mettez en surbrillance l'icône Rotation. 2 Appuyez sur le bouton central. Pour afficher l'écran de condition d'un module : 1 Utilisez les boutons flèche haut, bas, gauche et droite pour mettre le module souhaité en surbrillance. 2 Appuyez sur le bouton central. L'écran Condition du module s'affiche. Pour retourner au menu principal : 1 Utilisez les boutons flèche pour mettre en surbrillance l'icône Précédent. 2 Appuyez sur le bouton central. Le Menu principal s'affiche. Écran du menu Enceinte Cet écran vous permet de naviguer vers les écrans suivants : • Écran Condition du module • Écran Condition de l'enceinte • Écran Résumé IP • Menu Main (Menu principal) 1 Utilisez les boutons de navigation pour mettre en surbrillance l'élément souhaité. (Mettez en surbrillance l'icône Précédent pour retourner au menu principal.) 2 Appuyez sur le bouton central. L'écran sélectionné apparaît.488 Diagnostics Écran Condition du module L'écran Condition du module affiche des informations et des messages d'erreur sur un module. Pour les messages susceptibles de s'afficher sur cet écran, voir « Informations sur la condition du serveur et du module de l'écran LCD », à la page 501 et « Messages d'erreur de l'écran LCD », à la page 492. Utilisez les touches fléchées haut et bas pour faire défiler les messages. Utilisez les touches fléchées gauche et droite pour faire défiler les messages qui débordent de l'écran. Mettez en surbrillance l'icône Précédent et appuyez sur le bouton central pour retourner à l'écran Condition du module graphique. Écran Condition de l'enceinte L'écran Condition de l'enceinte affiche des messages d'information et d'erreur concernant l'enceinte Voir « Messages d'erreur de l'écran LCD », à la page 492 pour les messages qui peuvent s'afficher sur cet écran. Utilisez les touches fléchées haut et bas pour faire défiler les messages. Utilisez les touches fléchées gauche et droite pour faire défiler les messages qui débordent de l'écran. Mettez en surbrillance l'icône Précédent et appuyez sur le bouton central pour retourner à l'écran Condition de l'enceinte. Écran Résumé IP L'écran Résumé IP affiche des informations IP pour les contrôleurs CMC et iDRAC de chaque serveur installé. Utilisez les boutons flèche haut et bas pour faire défiler la liste. Utilisez les boutons flèche gauche et droite pour faire défiler les messages sélectionnés qui débordent de l'écran. Utilisez les boutons flèche haut et bas pour sélectionner l'icône Précédent et appuyez sur le bouton central pour retourner au menu Enceinte. Diagnostics 489 Diagnostics L'écran LCD vous permet de diagnostiquer des problèmes concernant un serveur ou un module dans le châssis. En cas de problème ou de défaillance avec le châssis ou un serveur ou un autre module dans le châssis, l'indicateur d'état de l'écran LCD clignote en orange. Dans le Menu principal, une icône clignotante avec un arrière-plan orange s'affiche en regard de l'élément de menu (Serveur ou Enceinte) qui permet d'accéder au serveur ou au module défectueux. En suivant les icônes orange clignotantes dans le système de menus de l'écran LCD, vous pouvez afficher l'écran Condition et les messages d'erreur concernant l'élément présentant le problème. Les messages d'erreur apparaissant sur l'écran LCD peuvent être supprimés en supprimant le module ou le serveur à l'origine du problème ou en effaçant le journal du matériel du module ou du serveur. En ce qui concerne les erreurs liées au serveur, utilisez l'interface Web ou l'interface de ligne de commande d'iDRAC pour effacer le journal des événements système (journal SEL) du serveur. Quant aux erreurs concernant le châssis, utilisez l'interface Web ou l'interface de ligne de commande de CMC pour effacer le journal du matériel. Dépannage du matériel du LCD Si vous rencontrez des problèmes avec l'écran LCD lors de votre utilisation de CMC, suivez les éléments de dépannage matériel suivante pour déterminer si le problème vient du matériel de l'écran LCD ou d'une connexion à l'écran LCD.490 Diagnostics Figure 13-1. Retrait et installation du module LCD 1 cache de protection des câbles 2 module LCD 3 câble ruban 4 charnières (2) 5 vis (2) 1 2 3 4 5Diagnostics 491 Tableau 13-2. Éléments de dépannage matériel LCD Symptôme Problème Action de restauration Message d'alerte de l'écran CMC Not Responding (CMC ne répond pas) et la LED clignote orange Perte de la communication entre le CMC et le panneau avant LCD. Vérifiez que le CMC démarre, puis réinitialisez-le à l'aide de l'interface graphique ou des commandes de l'utilitaire RACADM. Message de l'écran d'alerte CMC Not Responding (CMC ne répond pas) et la LED est orange fixe ou est éteinte Les communications du module LCD sont bloquées lors de basculement du CMC ou lors de redémarrages. Consultez le journal du matériel à l’aide de l'interface graphique ou des commandes de l'utilitaire RACADM. Cherchez un message indiquant : Can not communicate with LCD controller. Réinstallez le câble ruban du module LCD. Le texte de l'écran LCD est brouillé Écran LCD défectueux Remplacez le module LCD. Le LED et l'écran LCD sont éteints. Le câble LCD n'est pas branché correctement ou est défectueux ; ou le module LCD est défectueux. Consultez le journal du matériel à l’aide de l'interface graphique ou des commandes de l'utilitaire RACADM. Recherchez des messages du type : • The LCD module cable is not connected, or is improperly connected. • The control panel cable is not connected, or is improperly connected. Réinstallez les câbles. Message de l'écran LCD CMC introuvable Aucun CMC n'est présent dans le châssis Insérez un CMC dans le châssis ou remplacez le CMC existant s'il ne fonctionne pas.492 Diagnostics Messages du panneau avant de l'écran LCD Cette section contient deux sous-sections qui répertorient les informations sur les erreurs et les conditions qui apparaissent sur le panneau avant de l'écran LCD. Les messages d'erreur s'affichant sur l'écran LCD présentent un format similaire à celui du journal des événements système (journal SEL) affiché sur l'interface de ligne de commande ou l'interface Web. Les tableaux présentés dans la section des erreurs répertorient les messages d'erreur et d'avertissement qui apparaissent sur les divers écrans LCD et la cause possible du message. Le texte figurant entre crochets fléchés (< >) indique que le texte peut varier. Les Informations sur la condition qui apparaissent sur l'écran LCD incluent des informations descriptives sur les modules dans le châssis. Les tableaux qui figurent dans cette section décrivent les informations affichées pour chaque composant. Messages d'erreur de l'écran LCD Tableau 13-3. Écrans Condition de CMC Gravité Message Cause Critique La batterie CMC a échoué. La batterie CMOS de CMC est manquante ou absence de tension. Critique La pulsation LAN de CMC a été perdue. La connexion NIC de CMC a été retirée ou n'est pas connectée. Avertissement Détection d'une incompatibilité micrologicielle ou logicielle entre l'iDRAC du logement et CMC. Le micrologiciel entre les deux périphériques ne correspond pas pour prendre en charge une ou plusieurs fonctionnalités. Avertissement Détection d'une incompatibilité micrologicielle ou logicielle entre le BIOS du système du logement et CMC. Le micrologiciel entre les deux périphériques ne correspond pas pour prendre en charge une ou plusieurs fonctionnalités. Avertissement Détection d'une incompatibilité micrologicielle ou logicielle entre CMC 1 et CMC 2. Le micrologiciel entre les deux périphériques ne correspond pas pour prendre en charge une ou plusieurs fonctionnalités.Diagnostics 493 Tableau 13-4. Écran Condition de l'enceinte/du châssis Gravité Message Cause Critique Le ventilateur est retiré. Ce ventilateur est nécessaire pour refroidir correctement l'enceinte/le châssis. Avertissement La redondance du bloc d'alimentation est dégradée. Une ou plusieurs unités d'alimentation sont défaillantes ou ont été retirées, et le système ne peut plus prendre en charge la redondance complète des unités d'alimentation. Critique La redondance du bloc d'alimentation est perdue. Une ou plusieurs unités d'alimentation sont défaillantes ou ont été retirées, et le système n'est plus redondant. Critique Les blocs d'alimentation ne sont pas redondants. Les ressources sont insuffisantes pour maintenir un fonctionnement normal. Une ou plusieurs unités d'alimentation sont défaillantes ou ont été retirées, et le système n'est pas suffisamment alimenté pour maintenir ses opérations normales. Les serveurs pourraient se mettre hors tension. Avertissement La température ambiante du panneau de configuration est supérieure au seuil d'avertissement maximal. La température d'entrée du châssis/enceinte a dépassé le seuil d'avertissement. Critique La température ambiante du panneau de configuration est supérieure au seuil d'avertissement maximal. La température d'entrée du châssis/enceinte a dépassé le seuil d'avertissement. Critique La redondance CMC est perdue. CMC n'est plus redondant. Cela se produit si le CMC en attente est retiré. Critique La journalisation de toutes les erreurs est désactivée. Le châssis/enceinte ne peut pas journaliser tous les événements. Ceci indique généralement que le panneau de configuration ou le câble de ce dernier a rencontré un problème.494 Diagnostics Avertissement Le journal est plein. Le châssis a détecté qu'une ou plusieurs entrées uniquement peuvent être ajoutées au journal matériel CEL avant que celui-ci soit plein. Avertissement Le journal est presque plein. Le journal des événements du châssis est plein à 75 %. Tableau 13-5. Écrans Condition du ventilateur Gravité Message Cause Critique Les rotations par minute du ventilateur sont en dessous du seuil critique minimal. La vitesse du ventilateur spécifié ne suffit pas pour refroidir suffisamment le système. Critique Les rotations par minute du ventilateur sont en dessus du seuil critique minimal. La vitesse du ventilateur spécifié est trop haute. Ceci se produit généralement suite à une pale de ventilateur cassée. Tableau 13-6. Écrans Condition du module d'E/S Gravité Message Cause Avertissement Détection d'une non correspondance de structure dans le module d'E/S . La structure du module d'E/S ne correspond pas à celle du serveur ou du module d'E/S redondant. Avertissement Détection d'un échec de réglage de lien du module d'E/S . Le module d'E/S n'a pas pu être défini pour une utilisation correcte du NIC sur un ou plusieurs serveurs. Critique Détection d'un échec dans le module d'E/S . Le module d'E/S est défaillant. La même erreur peut également se produire si le module d'E/S est déclenché thermiquement. Tableau 13-4. Écran Condition de l'enceinte/du châssis (suite) Gravité Message CauseDiagnostics 495 Tableau 13-7. Écran Condition de l'IKVM Gravité Message Cause Avertissement La console n'est pas disponible pour le KVM local. Panne secondaire, par exemple micrologiciel corrompu. Critique Le KVM local ne peut pas détecter d'hôtes. Échec de l'énumération des hôtes USB. Critique OSCAR, l'affichage n'est pas opérationnel pour le KVM local. Échec de l'interface OSCAR. Irrécupérable Le KMV local n'est pas opérationnel et est mis hors tension. Échec RIP série ou échec de la puce de l'hôte USB. Tableau 13-8. Écrans Condition de l'unité d'alimentation Gravité Message Cause Critique Échec du bloc d'alimentation . L'unité d'alimentation est défaillante. Critique Perte de l'entrée d'alimentation du bloc d'alimentation . Perte de l'alimentation en CA - secteur ou cordon en CA - secteur débranché. Avertissement Le bloc d'alimentation fonctionne à 110 volts et pourrait entraîner un court-circuit. Le bloc d'alimentation est branché sur un source de 110 volt. Tableau 13-9. Écran Condition du serveur Gravité Message Cause Avertissement La température ambiante de la carte système est inférieure au seuil d'avertissement minimal. La température du serveur se rafraîchit. Critique La température ambiante de la carte système est inférieure au seuil critique minimal. La température du serveur baisse.496 Diagnostics Avertissement La température ambiante de la carte système est supérieure au seuil d'avertissement maximal. La température du serveur monte. Critique La température ambiante de la carte système est supérieure au seuil critique maximal. La température du serveur est trop élevée. Critique Le courant du verrou actuel de la carte système dépasse la plage autorisée. Le courant a franchi un seuil de dégradation. Critique Échec de la batterie de la carte système. La batterie CMOS n'est pas présente ou n'a pas de tension. Avertissement Le niveau de charge de la batterie de stockage est faible. Le niveau de charge de la batterie ROMB est faible. Critique Échec de la batterie de stockage. La batterie CMOS n'est pas présente ou n'a pas de tension. Critique La tension de l'UC dépasse la plage autorisée. Critique La tension de la carte système dépasse la plage autorisée. Critique La tension de la carte mezzanine dépasse la plage autorisée. Critique La tension du stockage dépasse la plage autorisée. Critique Erreur interne de l'UC (IERR). Panne de l'UC. Critique Événement de déclenchement thermique de l'UC (surchauffe). UC surchauffée. Tableau 13-9. Écran Condition du serveur (suite) Gravité Message CauseDiagnostics 497 Critique Configuration de l'UC non prise en charge. Type de processeur incorrect ou dans un emplacement erroné. Critique L'UC est absente. L'UC requise est manquante ou est absente. Critique Condition de la carte Mezz B : capteur de carte d'extension de la carte Mezz B, l'erreur d'installation a été confirmée. Carte mezzanine incorrecte installée pour la structure d'E/S Critique Condition de la carte Mezz C : capteur de carte d'extension de la carte Mezz C, l'erreur d'installation a été confirmée. Carte mezzanine incorrecte installée pour la structure d'E/S Critique Retrait du lecteur . Le lecteur de stockage a été retiré. Critique Panne détectée dans le lecteur . Échec du lecteur de stockage. Critique La tension à sécurité intégrée de la carte système dépasse la plage autorisée. Cet événement est généré lorsque les tensions de la carte système ne sont pas aux niveaux normaux Critique Le registre d'horloge de la surveillance a expiré. Le registre d'horloge de la surveillance d'iDRAC expire et aucune action n'est définie. Critique Le registre d'horloge de la surveillance a réinitialisé le système. La surveillance iDRAC a détecté que le système est tombé en panne (délai expiré car aucune réponse n'a été reçue de l'hôte) et que l'action est définie sur redémarrage. Tableau 13-9. Écran Condition du serveur (suite) Gravité Message Cause498 Diagnostics Critique Le registre d'horloge de la surveillance a mis le système hors tension. La surveillance iDRAC a détecté que le système est tombé en panne (délai expiré car aucune réponse n'a été reçue de l'hôte) et que l'action est définie sur mise hors tension. Critique Le registre d'horloge de la surveillance a exécuter un cycle d'alimentation sur le système. La surveillance iDRAC a détecté que le système est tombé en panne (délai expiré car aucune réponse n'a été reçue de l'hôte) et que l'action est définie sur cycle d'alimentation. Critique Le journal est plein. Le périphérique du journal SEL détecte qu'une seule entrée peut être ajoutée au journal SEL avant qu'il ne soit plein. Avertissement Détection d'erreurs de la mémoire permanente corrigeable sur un périphérique mémoire de l'emplacement . Avertissement Le taux d'erreur de la mémoire permanente corrigeable a augmenté pour un périphérique mémoire de l'emplacement . Les erreurs corrigeables de l'ECC atteignent un taux critique. Critique Détection d'erreurs multi-bits sur un périphérique mémoire de l'emplacement . Une erreur ECC non corrigeable a été détectée. Critique Détection d'une interruption non masquable (NMI) lors d'une vérification d'un canal d'E/S sur un composant du périphérique de fonction du bus . Une interruption critique est générée dans le canal d'E/S. Tableau 13-9. Écran Condition du serveur (suite) Gravité Message CauseDiagnostics 499 Critique Détection d'une interruption non masquable (NMI) lors d'une vérification d'un canal d'E/S sur un composant du logement . Une interruption critique est générée dans le canal d'E/S. Critique Détection d'une erreur de parité PCI sur un composant du périphérique de fonction du bus . Une erreur de parité a été détectée sur le bus PCI. Critique Détection d'une erreur de parité PCI sur un composant du logement . Une erreur de parité a été détectée sur le bus PCI. Critique Détection d'une erreur du système PCI sur un composant du périphérique de fonction du bus . Erreur PCI détectée par un périphérique. Critique Détection d'une erreur du système PCI sur un composant du logement . Erreur PCI détectée par un périphérique. Critique Désactivation de la journalisation de la mémoire permanente corrigeable pour un périphérique mémoire de l'emplacement . La journalisation d'erreurs d'un seul bit est désactivée lorsque trop d'erreurs d'un seul bit (SBE) sont journalisées pour un périphérique mémoire. Critique La journalisation de toutes les erreurs est désactivée. Irrécupérable Détection d'une erreur de protocole de l'UC. Le protocole du processeur est passé à l'état irrécupérable. Irrécupérable Détection d'une erreur de parité du bus de l'UC. Le PERR du bus du processeur est passé à l'état irrécupérable. Irrécupérable Détection d'une erreur d'initialisation de l'UC. L'initialisation du processeur est passée à l'état irrécupérable. Tableau 13-9. Écran Condition du serveur (suite) Gravité Message Cause500 Diagnostics REMARQUE : pour des informations supplémentaires sur des messages LCD du serveur, voir le « Guide d'utilisation du serveur ». Irrécupérable Détection du machine check (vérification de machine) de l'UC. Le Machine Check du processeur est passé à l'état irrécupérable. Critique Perte de la redondance de la mémoire. Critique Détection d'une erreur fatale du bus sur un composant du périphérique de fonction du bus . Une erreur fatale a été détectée sur le bus PCIe. Critique Détection d'une interruption non masquable (NMI) du logiciel sur un composant du périphérique de fonction du bus . Une erreur de puce a été détectée. Critique Échec de la programmation de l'adresse MAC virtuelle sur un composant du périphérique de fonction du bus . L'adresse flex n'a pas pu être programmée pour ce périphérique. Critique Échec de la prise en charge du réglage de liaison ou de l'adresse flex par la mémoire morte en option du périphérique de la carte mezzanine . La mémoire morte en option ne prend pas en charge l'adresse flex ou le réglage de liaison. Critique Échec d'obtention de données de réglage de liaison ou de l'adresse flex depuis iDRAC. Tableau 13-9. Écran Condition du serveur (suite) Gravité Message CauseDiagnostics 501 Informations sur la condition du serveur et du module de l'écran LCD Les tableaux figurant dans cette section décrivent les éléments de condition qui sont affichés sur le panneau avant de l'écran LCD pour chaque type de composant dans le châssis. Tableau 13-10. Condition CMC Élément Description Exemple : CMC1, CMC2 Nom/Emplacement Aucune erreur Si aucune erreur ne s'est produite, le message « Aucune erreur » s'affiche à la place de messages d'erreur. Version du micrologiciel Ne s'affiche que sur un CMC actif. Affiche De secours pour le CMC de secours. IP4 Affiche la condition activée de l'IPv4 actuel uniquement sur un CMC actif. Adresse IP4 : Ne s'affiche que si l'IPv4 est activée sur un CMC actif uniquement. IP6 Affiche la condition activée de l'IPv6 actuel uniquement sur un CMC actif. Adresse locale IP6 : Ne s'affiche que si l'IPv6 est activée sur un CMC actif uniquement. Adresse globale IP6 : Ne s'affiche que si l'IPv6 est activée sur un CMC actif uniquement.502 Diagnostics Tableau 13-11. Condition du châssis/de l'enceinte Élément Description Nom défini par l'utilisateur Exemple : « Système de rack Dell ». Définissable via l'interface de ligne de commande ou l'interface utilisateur Web de CMC. Messages d'erreur Si aucune erreur ne s'est produite, le message Aucune erreur s'affiche ; sinon, des messages d'erreur sont répertoriés, puis des avertissements. Numéro de modèle Exemple « PowerEdgeM1000 ». Consommation énergétique Consommation électrique en watts. Puissance maximale Consommation électrique maximale en watts. Consommation électrique minimale Consommation électrique minimale en watts. Température ambiante Température ambiante en degrés Celsius. Numéro de service Le numéro de service attribué par l'usine. Mode de redondance de CMC Non redondant ou redondant. Mode de redondance de l'unité d'alimentation Non redondant, redondant en CA - secteur ou redondant en CC. Tableau 13-12. Condition du ventilateur Élément Description Nom/Emplacement Exemple : Ventilateur1, Ventilateur2, etc. Messages d'erreur En l'absence d'erreurs, « Pas d'erreurs » est affiché ; sinon, les messages d'erreur sont répertoriés, les erreurs critiques en premier, puis les avertissements. RPM Vitesse actuelle du ventilateur en tr/min.Diagnostics 503 Tableau 13-13. Condition de l'unité d'alimentation Élément Description Nom/Emplacement Exemple : Unité d'alimentation1, Unité d'alimentation2, etc. Messages d'erreur En l'absence d'erreurs, « Pas d'erreurs » est affiché ; sinon, les messages d'erreur sont répertoriés, les erreurs critiques en premier, puis les avertissements. Condition Hors ligne, en ligne ou veille. Puissance maximale Puissance maximale que l'unité d'alimentation peut fournir au système. Tableau 13-14. Condition du module d'E/S Élément Description Nom/Emplacement Exemple : Module d'E/S A1, Module d'E/S B1. etc. Messages d'erreur En l'absence d'erreurs, « Pas d'erreurs » est affiché ; sinon, les messages d'erreur sont répertoriés, les erreurs critiques en premier, puis les avertissements. Condition Éteint ou allumé. Modèle Modèle du module d'E/S. Type de structure Type de mise en réseau. Adresse IP Apparaît uniquement si le module d'E/S est allumé. Cette valeur est zéro dans le cas d'un module d'E/S de type transfert des données. Numéro de service Le numéro de service attribué par l'usine.504 Diagnostics Tableau 13-15. Condition iKVM Élément Description Name (Nom) iKVM Aucune erreur Si aucune erreur ne s'est produite, le message Aucune erreur s'affiche ; sinon, des messages d'erreur sont répertoriés. Les erreurs critiques sont répertoriées en premier, puis les avertissements. Pour plus d'informations, voir « Messages d'erreur de l'écran LCD ». Condition Éteint ou allumé Modèle/Fabricant Une description du modèle iKVM. Numéro de service Le numéro de service attribué par l'usine. Numéro de pièce Le numéro de pièce détachée du fabricant. Version du micrologiciel Version du micrologiciel du module iKVM. Version du matériel Version du matériel du module iKVM. REMARQUE : ces informations sont mises à jour de manière dynamique. Tableau 13-16. Condition du serveur Élément Description Exemple : Serveur1, Serveur2. Nom/Emplacement Aucune erreur Si aucune erreur ne s'est produite, le message Aucune erreur s'affiche ; sinon, des messages d'erreur sont répertoriés. Les erreurs critiques sont répertoriées en premier, puis les avertissements. Pour plus d'informations, voir « Messages d'erreur de l'écran LCD ». Nom du logement Nom du logement du châssis. Par exemple, SLOT-01. REMARQUE : ce tableau est configurable via l'interface de ligne de commande ou l'interface utilisateur graphique Web du CMC.Diagnostics 505 Nom Nom du serveur, définissable par l'utilisateur via Dell OpenManage. Le nom s'affiche uniquement une fois que l'iDRAC a fini de démarrer et si le serveur prend cette fonctionnalité en charge. Sinon, des messages indiquant que l'iDRAC est en cours de démarrage s'affichent. Numéro de modèle S'affiche si iDRAC a fini de démarrer. Numéro de service S'affiche si iDRAC a fini de démarrer. Version du BIOS Version micrologicielle du BIOS du serveur. Dernier code POST Affiche la dernière chaîne de messages du code POST du BIOS du serveur. Version du micrologiciel iDRAC S'affiche si iDRAC a fini de démarrer. REMARQUE : la version iDRAC 1.01 s'affiche en tant que 1.1. Il n'existe aucune version iDRAC 1.10. IP4 Affiche la condition activée de l'IPv4. Adresse IP4 : S'affiche uniquement si l'IPv4 est activée. IP6 S'affiche uniquement si l'iDRAC prend en charge IPv6. Affiche la condition activée de l'IPv6. Adresse locale IP6 : S'affiche uniquement si l'iDRAC prend en charge IPv6 et si IPv6 est activée. Adresse globale IP6 : S'affiche uniquement si l'iDRAC prend en charge IPv6 et si IPv6 est activée. FlexAddress activée sur les structures S'affiche uniquement si la fonctionnalité est installé. Répertorie les structures activées sur ce serveur (c'est- à-dire, A, B, C). Tableau 13-16. Condition du serveur (suite) Élément Description506 Diagnostics Les informations de Figure 13-16 sont mises à jour de manière dynamique. Si le serveur ne prend pas en charge cette fonctionnalité, les informations suivantes ne s'affichent pas. Sinon, les options de Server Administrator sont les suivantes : • Option « Aucune » = Aucune chaîne ne doit être affichée sur l'écran LCD. • Option « Par défaut » = Aucun effet. • Option « Personnalisé » = Vous permet d'entrer un nom de chaîne pour le serveur. Les informations ne s'affichent que si l'iDRAC a fini de démarrer. Pour des informations supplémentaires sur cette fonctionnalité, voir le RACADM Command Line Reference Guide for iDRAC6 and CMC (Guide de référence de ligne de commande pour iDRAC6 et CMC).Index 507 Index A ACI, 389 Activation de FlexAddress Plus, 283 Activation ou désactivation DCHP, 88 Active Directory, 285 ajout d'utilisateurs CMC, 306 configuration de l'accès à CMC, 298 configuration et gestion des certificats, 186 extension des schémas, 298 extensions de schéma, 292 objets, 293 utilisation avec le schéma standard, 286 Affichage des paramètres réseau IPv4 actuels, 85 Affichage des paramètres réseau IPv6 actuels, 85 ajout alertes SNMP, 438 alertes dépannage, 481 alertes SNMP ajout et configuration, 438 B bilan de puissance configuration, 54 C caractéristiques matériel, 27 caractéristiques matérielles, 27 certificat du serveur affichage, 204 téléversement, 203 certificats Active Directory, 186 SSL et numériques, 197 certificats affichage d'un certificat du serveur, 204 téléchargement d'un certificat du serveur, 203 CMC configuration, 308 création d'un fichier de configuration, 103 environnement redondant, 58 fonctionnalités, 23 installation, 33 journal, 463 paramétrage, 33508 Index commande de connexion connexion à CMC en ligne de commande, 67 configuration alertes SNMP, 438 bilan de puissance, 54 module CMC à partir du panneau LCD, 54 RACADM distant, 53 RACADM distant de CMC, 53 Configuration et gestion des services LDAP génériques, 193 connexion d'accès à distance (RAC), 28 connexion directe, 316 console de ligne de commande fonctionnalités, 61 console série utilisation, 62 console telnet utilisation, 62 E économie d'énergie, 347 environnement redondant, 58 F featurecard, 266 fichier de configuration création, 103 FlexAddress, 263 activation, 264 configuration à l'aide de l'interface de ligne de commande, 269 configuration Linux, 270 consultation de l'état à l'aide de l'interface de ligne de commande, 270 contrat de licence, 278 dépannage, 271 désactivation, 268 réveil sur réseau local, 271 vérification de l'activation, 266 fonctionnalités de CMC, 23 G gestion des structures, 419 Gestion WS, 29 I iDRAC récupération du micrologiciel, 223 iKVM, 387 installation de CMC, 33 Interface de console analogique, 387Index 509 interface web accès, 111 configuration des alertes par e-mail, 445 J journal du matériel, 460 journaux CMC, 463 matériel, 460 M micrologiciel gestion, 215 mise à jour, CMC, 218 mise à jour, iKVM, 220 mise à jour, périphérique d'infrastructure du module d'E/S, 221 mise à jour, serveur iDRAC, 222 téléchargement, 54 Microsoft Active Directory, 285 module CMC téléchargement de micrologiciel, 54 mot de passe désactivation, 477 réinitialisation de l'emplacement du cavalier, 479 N navigateur Web configuration, 41 navigateur web navigateurs pris en charge, 29 noms des logements modification, 140 règles d'affectation des noms, 140 O OSCAR, 387 P panneau LCD configuration du module CMC, 54 paramétrage de CMC, 33 Paramètres de réseau LAN, 86 propriétés réseau configuration à l'aide de racadm, 84 configuration manuelle, 84 Q questions fréquemment posées gestion et récupération d'un système distant, 259, 282510 Index questions les plus fréquentes utilisation de CMC avec Active Directory, 313 R RAC voir Connexion d'accès à distance, 28 RACADM désinstallation à partir d'une station de gestion Linux, 40 RACADM distant configuration, 53 Red Hat Enterprise Linux configuration pour la redirection de console série, 70 règles d'analyse, 104 requête de signature de certificat (RSC) à propos de, 198 génération d'un nouveau certificat, 199 S schéma standard utilisation avec Active Directory, 286 Secure Sockets Layer (SSL) à propos de, 197 sécurité utilisation de certificats SSL et numériques, 197 serveur proxy, 41 services configuration, 205 snap-in installation de l'extension de Dell, 305 station de gestion configuration de l'émulation de terminal, 65 structure d'E/S, 419 système géré accès via le port série local, 62 U Utilisation de FlexAddress Plus, 284 utilitaire racadm configuration des propriétés réseau, 84 règles d'analyse, 104 V VLAN CMC, 91 Moniteur à Dell™ S2440L Guide d'utilisation Réglage de la résolution d'affchage Information in this document is subject to change without notice. © 2012 Dell Inc. All rights reserved. Reproduction of these materials in any manner whatsoever without the written permission of Dell Inc. is strictly forbidden. Marques de commerce utilisées dans ce texte : Dell et le logo DELL sont des marques de commerce de Dell Inc; Microsoft et Windows sont des marques commerciales ou des marques commerciales déposées de Microsoft Corporation aux États-Unis et/ou dans d'autres pays; Intel est une marque déposée par Intel Corporation aux Etats-Unis et dans d'autres pays; AVI sont des marques de commerce de Advanced Micro Devices, Inc; ENERGY STAR est une marque commerciale déposée par U.S. Environmental Protection Agency. En tant que partenaire d’ENERGY STAR, Dell Inc. a déterminé que ce produit est conforme aux directives d’ENERGY STAR pour son effcacité énergétique. Other trademarks and trade names may be used in this document to refer to either the entities claiming the marks and names or their products. Dell Inc. disclaims any proprietary interest in trademarks and trade names other than its own. Modèle S2440Lb Juillet 2012 Rev. A00Guide Utilisateur du moniteur à Dell™ S2440L A Propos de Votre Moniteur Installation de votre moniteur Opération du moniteur Guide de dépannage Appendice Remarques, Avertissements et Mises en garde REMARQUE: Une REMARQUE indique des informations importantes qui vous aideront à mieux utiliser votre ordinateur. AVERTISSEMENT: Un AVERTISSEMENT indique un dommage potentiel matériel ou une perte de données si les instructions ne sont pas suivies. MISE EN GARDE: Une MISE EN GARDE attire votre attention sur un risque potentiel vis-à-vis de vos biens, sur des dommages corporels voire sur un danger de mort. Les informations présentes dans ce document sont sujettes à modifcation sans avis préalable. © 2012 Dell Inc. Tous droits réservés. La reproduction de ces contenus de toute manière que ce soit et sans la permission écrite de Dell Inc. est strictement interdite. Marques de commerce utilisées dans ce texte : Dell et le logo DELL sont des marques de commerce de Dell Inc; Microsoft et Windows sont des marques commerciales ou des marques commerciales déposées de Microsoft Corporation aux États-Unis et/ou dans d'autres pays; Intel est une marque déposée par Intel Corporation aux Etats-Unis et dans d'autres pays; AVI sont des marques de commerce de Advanced Micro Devices, Inc; ENERGY STAR est une marque commerciale déposée par U.S. Environmental Protection Agency. En tant que partenaire d’ENERGY STAR, Dell Inc. a déterminé que ce produit est conforme aux directives d’ENERGY STAR pour son effcacité énergétique. D'autres marques commerciales et appellations commerciales peuvent être utilisées dans ce document pour faire référence soit aux entités revendiquant les marques et les appellations soit à leurs produits. Dell Inc. désavoue tout intérêt propriétaire dans les marques commerciales et appellations commerciales autres que les siennes. Modèle S2440Lb Juillet 2012 Rev. A00Retour à la page de sommaire À Propos de Votre Moniteur Guide Utilisateur du moniteur à Dell™ S2440L Contenu de l'emballage Caractéristiques du produit Identiffcation des pièces et contrôles Spécifcations du moniteur Capacité Plug and Play Politique de qualité relative aux pixels des moniteurs LCD Lignes directrices relatives à la maintenance Contenu de l'emballage Votre moniteur est livré avec les éléments indiqués ci-dessous. Assurez-vous que tous les éléments sont présents et contactez Dell si quoi que ce soit manque. REMARQUE : Certains éléments sont en option et peuvent ne pas être expédiés avec votre moniteur. Certaines fonctionnalités ou accessoires peuvent ne pas être disponibles dans certains pays. Moniteur Colonne du piedBase du pied Câble d’alimentation Adaptateur secteur Câble VGA Lien de câbleSupport des Pilotes et Documentation Guide d’installation rapide Informations sur la sécurité Caractéristiques du produit L'écran panneau plat Dell Professional S2440L a une matrice active, un transistor en couche mince (TFT), un affchage à cristaux liquides (ACL) et rétroéclairage à DÉL. Les principales caractéristiques du moniteur sont les suivantes : ■ S2440L: Affchage sur une zone visible de 60,97 cm (24 pouces) (Mesurée en diagonale). Résolution de 1920 x 1080, plus un support plein écran pour les résolutions plus faibles. ■ Grand angle de visionnement pour pouvoir regarder le moniteur depuis une position assise ou debout ou tout en se déplaçant d’un côté à l’autre. ■ Capacité d’inclinaison. ■ Capacité Plug and play si votre système la prend en charge. ■ Réglages de l’affchage de l’écran (OSD) pour une facilité de confguration et l’optimisation de l’écran. ■ Le CD logiciel et de documentation inclut un fchier d’information (INF), un fchier de correspondance des couleurs d’image (ICM) et une documentation sur le produit. ■ Fonction d’économie d’énergie pour la conformité à la norme Energy Star. ■ Fente du verrouillage de sécurité. ■ Capacité de basculer des proportions d'images large en standard tout en maintenant la qualité d'image. ■ Classé EPEAT d'Argent. ■ Logiciel Dell Display Manager inclus (sur le CD fourni avec le moniteur). ■ Verre sans arsenic, et sans mercure pour le panneau seulement. ■ Taux de contraste dynamique élevé (8 000 000:1). ■ Alimentation de 0,5W en mode veille. ■ La Jauge d’énergie indique le niveau d’énergie consommée par le moniteur en temps réel.Identiffcation des pièces et contrôles Vue de Face Commandes en face avant Étiquette Description 1 Touches de fonction (pour plus d’informations, voir Utilisation du moniteur) 2 Bouton d’alimentation (avec diode témoin)Vue Arrière Vue arrière avec base du moniteur Étiquette Description Utilisez 1 Orifce de verrouillage de sécurité Utilisez un verrou de sécurité avec cet orifce pour fxer votre moniteur. 2 Réglementaire classement du label Listes des approbations réglementaires. 3 Etiquette à code-barre avec numéro de série Référez-vous à cette étiquette si vous devez contacter Dell pour un support technique. 4 Stand bouton de retrait Stand de sortie à partir du moniteur. 5 Clip de rangement des câbles Permet de ranger les câbles en les faisant passer dans le clip.Vue Latérale Vue de Dessous Vue de dessous sans le socle du moniteur Étiquette Description Utilisez 1 Sortie de ligne audio Connectez vos haut-parleurs.* 2 Connecteur HDMI Connectez le câble HDMI de votre ordinateur. 3 Connecteur VGA Branchez le câble VGA de votre ordinateur. 4 Connecteur du cordon d'alimentation CC Branchez le câble d'alimentation. *L’utilisation d’un casque usage n’est pas prise en charge pour le connecteur de ligne de sortie audio. Spécifcations du moniteur Spécifcations de l'écran plat Modèle S2440LType d'écran Matrice active - LCD TFT Type de dalle VA Dimensions de l'écran 60,9 cm (diagonale de l'image visible de 24 pouces) Zone d'affchage préréglée: Horizontale Verticale 531,36 mm (20,92 pouces) 298,89 mm (11,77 pouces) Finesse Pixel 0,277 mm Angle de vision 178° (vertical) standard 178° (horizontal) standard Sortie Luminance Panneau : 280 cd/m²(standard) Moniteur : 250 cd/m²(standard) Rapport de contraste 5000 pour 1 (standard) 8M pour 1 (Contraste dynamique activé, typiquement) Revêtement de surface Refet avec revêtement dur 3H Rétro-éclairage Système d'éclairage latéral DÉL Temps de réponse 12 ms (standard) 6 ms (standard) avec dépassement Nombre de couleurs 16,7 millions de couleurs Gamme de couleurs CIE1976 (86%)* *La gamme de couleurs du [S2440L] (standard) est basée sur les normes d'essais CIE1976 (86%) et CIE1931 (72%). Spécifcations de la Résolution Modèle S2440L Plage de balyage horizontal 30 kHz à 83 kHz (automatique) Plage de balayage vertical 56 Hz à 76 Hz (automatique) Résolution maximale préréglée 1920 x 1080 à 60 Hz Modes vidéo pris en charge Modèle S2440L Capacités d'affchage vidéo (lecture HDMI) 480p, 480i, 576p, 576i, 720p, 1080p, 1080iModes d'Affchage Préréglés S2440L Mode d'affchage Fréquence horizontale (kHz) Fréquence verticale (Hz) Horloge de pixels (MHz) Polarité de synchronisation (Horizontale/Verticale) VESA, 720 x 400 31,5 70,1 28,3 -/+ VESA, 640 x 480 31,5 60,0 25,2 -/- VESA, 640 x 480 37,5 75,0 31,5 -/- VESA, 800 x 600 37,9 60,3 40,0 +/+ VESA, 800 x 600 46,9 75,0 49,5 +/+ VESA, 1024 x 768 48,4 60,0 65,0 -/- VESA, 1024 x 768 60,0 75,0 78,8 +/+ VESA, 1152 x 864 67,5 75,0 108,0 +/+ VESA, 1280 x 1024 64,0 60,0 108,0 +/+ VESA, 1280 x 1024 80,0 75,0 135,0 +/+ VESA, 1920 x 1080 67,5 60,0 148,5 +/+ Spécifcations électriques Modèle S2440L Signaux d'entrée vidéo Analogique RGB, 0,7 Volts +/- 5%, polarité positive à 75 ohms d'impédance d'entrée HDMI, 600mV pour chaque ligne différentielle, impédance d’entrée de 100 ohms par paire différentiel Signaux d'entrée de synchronisation Synchronisations horizontale et verticale séparées, Niveau TTL sans polarité, SOG (SYNC Composite sur Vert) Adaptateur CA/CC* Tension/fréquence/courant d’entrée Adaptateur Delta ADP-40DD B : 100 VCA à 240 VCA / 50 Hz à 60 Hz ± 3 Hz / 1,5 A (Max.), adaptateur Lite-On PA-1041-71: 100 VCA à 240 VCA / 50 Hz ou 60 Hz ± 3 Hz / 1,2 A (Max.) Tension/courant de sortie Sortie :12 VCC / 3,33 A Courant d'appel 120 V : 30 A (Max) 240 V : 60 A (Max) *Adaptateurs CA/CC compatibles qualifés : AVERTISSEMENT: Pour éviter d’endommager le moniteur, utilisez uniquement l’adaptateur conçu pour ce moniteur Dell en particulier. Fabricant Modèle Polarité Delta ADP-40DD BA Lite-On PA-1041-71TP-LFCaractéristiques physiques Modèle S2440L Type de connecteur Prise Sub-D miniature à 15 broches, connecteur bleu; HDMI Type du câble de signal Analogique, amovible, D-sub, 15 broches, livré attaché au moniteur Numérique: HDMI Dimensions (avec base) Hauteur 417,9 mm ( 16,45 pouces) Largeur 567,4 mm (22,34 pouces) Profondeur 190,8 mm (7,51 pouces) Dimensions (sans base) Hauteur 334,9 mm (13,18 pouces) Largeur 567,4 mm (22,34 pouces) Profondeur 43,5 mm (1,71 pouces) Dimensions de la base Hauteur 137,1 mm (5,4 pouces) Largeur 190,8 mm (7,51 pouces) Profondeur 190,8 mm (7,51 pouces) Poids Poids avec l'emballage 13,43 lb (6,09 kg) Poids avec ensemble base et câbles 11,09 lb (5,03 kg) Poids sans ensemble base 8,07 lb (3,66 kg) Poids de l'ensemble base 1,92 lb (0,87 kg) Brillant du cadre avant 90~100 unités de brillant Caracrtéristiques environnementales Modèle S2440L Température En fonctionnement 0°C à 40°C A l'arrêt Entreposage : -20°C à 60°C (-4°F à 140°F) Expédition: -20°C à 60°C (-4°F à 140°F)Humidité En fonctionnement 10% à 80%(sans condensation) A l'arrêt Entreposage : 5% à 90% (sans condensation) Expédition: 5% à 90% (sans condensation) Altitude En fonctionnement 5000 m (16404 pieds) max A l'arrêt 12192 m (40000 pieds) max Dissipation Thermique 85,30 BTU/heure (maximum) 61,42 BTU/heure (typique) Modes de gestion d'énergie Si vous avez une carte graphique compatible DPM™ VESA ou un logiciel installé sur votre PC, le moniteur peut automatiquement réduire sa consommation électrique lorsqu'il n'est pas utilisé. On parle alors de Mode d'économie d'énergie*. Si l’ordinateur détecte une entrée depuis le clavier, la souris ou d’autres périphériques, le moniteur reprend son fonctionnement automatiquement. Le tableau suivant donne la consommation électrique et les signaux de cette fonctionnalité d'économie d'énergie automatique : Modes VESA Sync. Horizontale Sync. Verticale Vidéo Témoin d'alimentation Consommation électrique Fonctionnement normal Actif Actif Actif Blanc 25 W (maximale)** 18 W (typique) Mode Arrêt-Actif Inactif Inactif Vide Orange Moins de 0,5 W Arrêt - - - Éteint Moins de 0,5 W L’OSD ne fonctionnera qu'en mode normal. Lorsqu’un bouton est pressé en mode désactivé, l’un des messages suivants s’affche : Activer l’ordinateur et le moniteur pour accéder à l’OSD. REMARQUE : Ce moniteur est compatible ENERGY STAR®-et compatible. * La consommation électrique nulle en mode ARRÊT ne peut être obtenue qu'en déconnectant le câble principal du moniteur. ** Consommation d'électricité maximale de luminance maximale.Assignations des broches Connecteur VGA Numéro de broche Côté 15-broches du câble de signal connecté 1 Vidéo-Rouge 2 Vidéo-Vert 3 Vidéo-Bleu 4 MASSE 5 Test-Auto 6 MASSE-R 7 MASSE-G 8 MASSE-B 9 Ordinateur 5V/3.3V 10 MASSE-sync 11 MASSE 12 Données DDC 13 Sync.H. 14 Sync V. 15 Horloge DDCConnecteur HDMI Numéro de broche Côté 19 broches du câble de signal connecté 1 TMDS DONNÉES 2+ 2 TMDS DONNÉES 2 BLINDAGE 3 TMDS DONNÉES 2- 4 TMDS DONNÉES 1+ 5 TMDS DONNÉES 1 BLINDAGE 6 TMDS DONNÉES 1- 7 TMDS DONNÉES 0+ 8 TMDS DONNÉES 0 BLINDAGE 9 TMDS DONNÉES 0- 10 TMDS HORLOGE+ 11 TMDS HORLOGE BLINDAGE 12 TMDS HORLOGE- 13 CEC 14 Réservé (N.C. sur le périphérique) 15 DDC HORLOGE (SCL) 16 DDC DONNÉES (SDA) 17 Terre DDC/CEC 18 +5V ALIMENTATION 19 DÉTECTION CONNEXION À CHAUD Capacité Plug and Play Vous pouvez installer ce moniteur avec n'importe système compatible Plug and Play. Ce moniteur fournit automatiquement à l'ordinateur ses données d'identifcation d'affchage étendues (Extended Display Identifcation Data : EDID) en utilisant les protocoles DDC (Display Data Channel) de manière à ce que le système puisse effectuer automatiquement la confguration et optimiser les paramètres du moniteur. La plupart des installation de moniteurs sont automatique, vous pouvez choisir différents réglages si vous le souhaitez. Pour plus d'informations sur la modifcation de réglages du moniteur, voir Utiliser le moniteur.Politique de qualité relative aux pixels des moniteurs LCD Pendant le processus de fabrication du moniteur LCD, il n'est pas inhabituel qu'un ou plusieurs pixels se fgent dans un état fxe, ce qui est diffcilement visible et n'affecte pas la qualité de l'affchage ni son utilisabilité. Pour plus d'informations sur la Qualité des moniteurs Dell et la Politique sur les pixels, voir le site de Support de Dell à l'adresse : support.dell.com. Lignes directrices relatives à la maintenance Nettoyer votre moniteur AVERTISSEMENT : Lisez et suivez les consignes de sécurité avant de nettoyer le moniteur. MISE EN GARDE : Avant de nettoyer le moniteur, débranchez son câble d'alimentation de la prise murale. Pour les meilleures pratiques, suivez les instructions dans la liste ci-dessous pendant le déballage, le nettoyage ou la manipulation de votre moniteur : Pour nettoyer votre écran antistatique, humidifez légèrement un chiffon doux et propre avec de l'eau. Si possible, utilisez un tissu de nettoyage spécial pour les écrans ou une solution adaptée au revêtement antistatique. Ne pas utiliser de produits à base de benzène, un diluant, de l'ammoniaque, des nettoyants abrasifs ou des produits à base d'air comprimé. Utilisez un chiffon légèrement humidifé et tiède pour nettoyer le moniteur. Evitez d'utiliser toutes sortes de détergents car certains peuvent laisser un flm trouble sur le moniteur. Si vous remarquez la présence de poudres blanches lors du déballage de votre moniteur, éliminez-les à l'aide d'un chiffon. Manipulez votre moniteur avec soin car les plastiques de couleur foncée peuvent rayer et laisser des marques de rayures blanches plus facilement que les moniteurs de couleur claire. Pour aider à maintenir une meilleure qualité d’image sur votre moniteur, utiliser un économiseur d’écran qui change dynamiquement et veuillez éteindre votre moniteur quand vous ne l’utilisez pas. Retour à la page de sommaireRetour à la page de sommaire Installer Votre Moniteur Guide Utilisateur du moniteur à Dell™ S2440L Connecter la base Connecter le moniteur Organiser vos câbles Enlever la base du moniteur Connecter la base REMARQUE : Le support et la base de l’écran sont fournis non assemblés à l'écran. 1. Assemblez le support sur la base. a. Fixez la colonne du pied à la base du pied. b. Vissez la vis papillon située sous la base.2. Assemblez le socle ainsi formé avec l’écran. a. Placez l’écran sur un tissu doux ou sur un coussin près du bord d’un bureau. b. Alignez les pattes de fxation du socle avec la fente de fxation de l’écran. c. Insérez les pattes de fxation dans l'écran jusqu’à ce qu’elles soient fxées en place. Connecter votre moniteur MISE EN GARDE : Avant de débuter quelque procédure que ce soit de cette section, suivez les Consignes de sécurité. Pour connecter votre moniteur sur l'ordinateur : 1. Éteignez votre ordinateur et débranchez son câble d'alimentation. Reliez le câble bleu (VGA) entre votre moniteur et votre ordinateur. REMARQUE: Si votre ordinateur prend en charge un connecteur HDMI, connectez le câble HDMI (peut être acheté séparément) au moniteur et le connecteur HDMI sur votre ordinateur.REMARQUE: Ne pas connecter le câble VGA/HDMI en même temps à l'ordinateur. 2. Raccorder le câble HDMI ou le câble d’affchage VGA au port vidéo correspondant à l'arrière de votre ordinateur. Ne pas utiliser les deux câbles sur le même ordinateur. Utiliser les deux câbles uniquement s’ils sont connectés à différents ordinateurs avec les systèmes vidéo appropriés. Brancher le câble VGA bleu Brancher le câble HDMI AVERTISSEMENT: Les graphiques sont utilisés à des seules fns d'illustration. L'aspect peut varier sur l'ordinateur.Organiser vos câbles Après avoir branché tous les câbles nécessaires sur votre écran et votre ordinateur, (Voir Connecter votre écran pour réaliser le raccordement des câbles), utilisez la rainure de gestion des câbles pour aménager soigneusement tous les câbles comme illustré ci-dessus. Enlever la base du moniteur REMARQUE : Pour éviter les rayures sur l'écran LCD en enlevant la base, assurez-vous que le moniteur est placé sur une surface nette. REMARQUE : Ceci est valable pour un moniteur avec un stand. Lorsque stand autre est acheté, s'il vous plaît vous référer au guide d'installation correspondant stand pour mettre en place des instructions.Pour enlever la base : 1. Placez le moniteur sur une surface plane. 2. Appuyez sur le bouton de dégagement de la base et maintenez le enfoncé. 3. Retirez le pied. Retour à la page de sommaireRetour à la page de sommaire Utilisation du moniteur Guide Utilisateur du moniteur à Dell™ S2440L Allumer le moniteur Utiliser les commandes du panneau frontal Utiliser le menu sur écran (OSD) Réglage de la résolution maximale A l'aide de l'inclinaison Allumer le moniteur Appuyez le bouton pour allumer le moniteur. Utiliser le Panneau Frontal Utilisez les boutons sur le panneau frontal du moniteur pour régler les caractéristiques de l'image affchée. Quand vous utilisez ces boutons pour régler les commandes, un OSD affche les valeurs numériques des caractéristiques que vous modifez.Boutons sur le panneau frontal Description 1 Touche de raccourci / Modes de préréglage Utiliser ce bouton pour choisir parmi différents modes de couleurs préréglés. 2 Touche de raccourci / Luminosité/Contraste Utiliser ce bouton pour accéder directement au menu « Luminosité/Contraste ». 3 Menu Utiliser le bouton MENU pour activer l’affchage à l’écran (OSD) et sélectionner le menu OSD. Voir Accès au système des menus. 4 Quitter Utiliser ce bouton pour revenir au menu principal ou au menu OSD principal. 5 Mise sous tension (avec voyant de mise sous tension) Utiliser le bouton de mise sous tension pour allumer et éteindre le moniteur. Le voyant blanc indique que le moniteur est allumé et prêt à fonctionner. Le voyant orange indique que le moniteur est en mode d'économie d’énergie. Boutons sur le panneau frontal Utilisez les boutons du panneau avant du moniteur pour régler les paramètres de l’image. Boutons sur le panneau frontal Description 1 Haut Utilisez le bouton Haut pour ajuster (augmenter la valeur) des éléments dans le menu OSD. 2 Bas Utilisez le bouton Bas pour ajuster (baisser la valeur) des éléments dans le menu OSD. 3 OK Utilisez le bouton OK pour confrmer votre sélection. 4 Retour Utilisez le bouton Retour pour retourner au menu précédent. Utilisation du menu d’affchage à l’écran (OSD) Accès au système des menus REMARQUE : Si l’on accède à un autre menu ou quitte le menu OSD après avoir modifé les paramètres, les modifcations sont sauvegardées automatiquement par le moniteur. Elles sont également sauvegardées après avoir attendu que le menu OSD disparaisse. 1. Appuyer sur le bouton pour lancer le menu OSD et affcher le menu principal. Menu principal pour entrée analogique (VGA)ou Menu principal pour entrée numérique (HDMI)REMARQUE : Le REGLAGE AUTO est disponible uniquement en cas d’utilisation du connecteur analogique (VGA). 2. Appuyer sur les boutons et pour accéder aux différentes options de confguration. En se déplaçant d’une icône à l’autre, le nom de l’option est affché en surbrillance. Se reporter au tableau suivant pour la liste complète des options disponibles pour le moniteur. 3. Appuyer une fois sur le bouton pour activer l’option en surbrillance. 4. Appuyer sur les boutons et pour sélectionner le paramètre voulu. 5. Appuyer sur pour accéder à la barre de réglage puis utiliser les boutons et , en fonction des indicateurs sur le menu, pour effectuer des modifcations. 6. Sélectionner l’option pour revenir au menu principal.Icône Menu et sous-menus Description Luminosité/Contraste Utiliser ce menu pour activer la fonction de réglage de luminosité/contraste. Luminosité La luminosité permet de régler la luminance du rétroéclairage. Appuyer sur le bouton pour augmenter la luminosité et sur le bouton pour la diminuer (mini. 0 / maxi. 100). REMARQUE : Le réglage manuel de Luminosité est désactivé lorsque Gestion intelligente de l’énergie ou Contraste dynamique est activé. Contraste Régler la luminosité au préalable puis le contraste uniquement si un réglage supplémentaire s’impose. Appuyer sur le bouton pour augmenter le contraste et sur le bouton pour le diminuer (mini. 0 / maxi. 100). La fonction de réglage du contraste permet d’ajuster le rapport des brillances entre parties sombres et claires de l’image sur l’écran. Réglage auto Bien que le moniteur soit reconnu par l’ordinateur au démarrage, la fonction de Réglage Auto optimise les paramètres d’affchage en fonction de la confguration d’installation propre à chaque utilisateur. Le Réglage auto permet au moniteur de s’adapter automatiquement au signal vidéo entrant. Après avoir utilisé la fonction Réglage auto, le réglage du moniteur peut être retouché en utilisant les commandes d’horloge de pixels (grossier) et de phase (fn) sous Paramètres d’image. REMARQUE : Dans la plupart des cas, la fonction Réglage auto confère la meilleure image possible pour toutes les confgurations.REMARQUE : L’option Réglage auto est disponible uniquement en cas d’utilisation du connecteur analogique (VGA). Source entrée Utiliser le menu Source d’entrée pour effectuer une sélection entre les différents signaux vidéo pouvant être connectés au moniteur. Sélection auto Appuyez sur pour choisir Sélection auto, le moniteur recherche les signaux d’entrée disponibles. VGA Sélectionner Entrée VGA en cas d’utilisation du connecteur analogique (VGA). Appuyer sur pour sélectionner la source d’entrée VGA. HDMI Sélectionner l’entrée HDMI en cas d’utilisation du connecteur HDMI. Appuyer sur pour sélectionner la source d’entrée HDMI. Réglage des couleurs Utiliser Paramètres de couleurs pour ajuster le mode de paramétrage des couleurs.Format entrée couleurs Permet de changer le mode d’entrée vidéo : RVB : Sélectionnez cette option si votre moniteur est connecté à un ordinateur ou un lecteur de DVD avec le câble VGA. YPbPr : Sélectionnez cette option si votre moniteur est connecté à un lecteur de DVD par YPbPr au câble VGAI ; ou si le paramètre de sortie couleur DVD n’est pas RVB.Modes de préréglage Quand vous sélectionnez Modes de préréglage, vous pouvez choisir Standard, Multimédia, Film, Jeux, Texte, Chaud, Froid ou Couleur Perso dans la liste. Standard : Permet d’obtenir les réglages par défaut du moniteur. Il s’agit du mode de préréglage par défaut. Multimédia : Permet d’obtenir les réglages de couleurs adaptés aux applications multimédia. Film : Permet d’obtenir les réglages de couleurs adaptés aux flms. Jeux : Permet d’obtenir les réglages de couleurs adaptés à la plupart des applications de jeux. Texte : Charge les réglages de luminosité et de netteté idéaux pour affcher les textes. Chaud : Augmente la température des couleurs. L’écran affche des teintes plus chaudes avec des tons rouges/jaunes. Froid : Diminue la température des couleurs. L’écran affche des teintes plus froides avec un ton bleuté. Couleur Perso : Permet de paramétrer manuellement les couleurs. Agir sur les boutons et pour régler les valeurs des trois couleurs (rouge, vert, bleu) et défnir un mode de préréglage des couleurs personnalisé.Hue Cette fonction permet de changer la teinte des images vidéo sur vert ou violet. Elle sert à obtenir le ton couleur chair souhaité. La teinte peut être réglée de « 0 » à « 100 ». Appuyer sur pour renforcer la nuance de vert de l’image vidéo. Appuyer sur pour renforcer la nuance de violet de l’image vidéo. REMARQUE : L’ajustement de la teinte n’est disponible que lorsque vous sélectionnez un mode de préréglage Film ou Jeux. Saturation Cette fonction permet de régler la saturation des couleurs pour les images vidéo. La saturation peut être réglée de «0 » à « 100 ». Appuyer sur pour renforcer l’aspect monochrome de l’image vidéo. Appuyer sur pour renforcer l’aspect coloré de l’image vidéo. REMARQUE : L’ajustement de la saturation n’est disponible que lorsque vous sélectionnez un mode de préréglage Film ou Jeux. Mode démo Divise l’écran en deux pour affcher côte à côte les images en mode Film normal et amélioré. Vous pouvez également appuyer et simultanément pour activer/désactiver ce mode. REMARQUE : Le Mode démo n’est disponible que lorsque vous sélectionnez le mode de préréglage Film. Image Enhance Donne des images surdimensionnées de meilleure qualité en enlevant la décoloration de l’image et la rugosité du bord. REMARQUE : Image Enhance n’est disponible que lorsque vous sélectionnez le mode de préréglage Standard, Multimédia, Film ou Jeux.Réinit. param. couleur Rétablit les paramètres de couleurs d’origine du moniteur. Paramètres affchage La fonction Paramètres d’affchage permet de régler l’image. Proportions Ajuste le format en Wide 16:9, 4:3 ou 5:4. Position horizontale Utiliser ou pour ajuster la position de l’image à gauche ou à droite. La valeur minimale de réglage est « 0 » (-). La valeur maximale de réglage est « 100 » (+). Position verticale Utiliser ou pour ajuster la position de l’image vers le haut ou le bas. La valeur minimale de réglage est « 0 » (-). La valeur maximale de réglage est « 100 » (+). Finesse Cette fonction permet de d’obtenir une image plus nette ou plus douce. Utiliser ou pour régler la netteté de « 0 » à « 100 ». Horloge pixels Les réglages de phase et d’horloge de pixels permettent de régler le moniteur à la convenance de l’utilisateur. Utiliser ou pour obtenir la meilleure qualité d’image possible. Phase Si des résultats satisfaisants ne sont pas obtenus par le réglage de phase, utiliser le réglage d’horloge de pixels (grossier) puis de nouveau le réglage de phase (fn). REMARQUE : Les réglages d’horloge et de phase sont disponibles uniquement pour les entrées « VGA ».Contraste dynamique Permet d’augmenter le niveau de contraste pour fournir une qualité d’image plus nette et détaillée. Appuyer sur le bouton pour activer ou désactiver le contraste dynamique. REMARQUE : Le Contraste dynamique offre un contraste plus élevé si vous sélectionnez un mode de préréglage Film ou Jeux. Réinit. tous Param. Affchage Sélectionner cette option pour rétablir les paramètres d’affchage par défaut. Autres paramétrages Sélectionner cette option pour régler les paramètres de l’OSD, comme la langue affchée, la durée pendant laquelle le menu reste affché à l’écran, etc. Langue Cette option permet de choisir une des huit langues disponibles (Anglais, Espagnol, Français, Allemand, Chinois simplifé ou Japonais) pour l’affchage de l’OSD. Transparence menu Sélectionner cette option pour modifer la transparence du menu en appuyant sur le 1er ou le 2ème bouton (Mini.: 0 ~ Maxi.: 100). Minuteur du menu Durée d’activation de l’OSD : Défnit la durée pendant laquelle l’OSD restera activé après avoir pressé un bouton. Utiliser ou pour déplacer le curseur par incréments de 1 secondes, de 5 à 60 secondes. Verrou du menu Permet de contrôler l’accès des utilisateurs aux réglages. Lorsque Verrouillage est sélectionné, aucun réglage de la part des utilisateurs n’est autorisé. Tous les boutons sont verrouillés. REMARQUE : Lorsque l’OSD est verrouillé, et si le bouton « menu » est pressé, l’utilisateur est ramené directement au menu de paramétrage de l’OSD, avec la fonction de verrouillage de l’OSD sélectionnée. Sélectionner « Déverrouiller » pour obtenir le déverrouillage et permettre à l’utilisateur d’accéder à tous les paramètres applicables. Gestion intelligente de l’énergie Pour activer ou désactiver la réduction dynamique du rétro-éclairage. La fonction de réduction dynamique du rétro-éclairage réduit automatiquement le niveau de luminosité de l’écran lorsque l’image affchée contient une forte proportion de zones lumineuses.DDC/CI La fonction DDC/CI (Canal de données d’affchage/Interface de commande) permet de contrôler les paramètres réglables (luminosité, équilibre des couleurs, etc.) via le logiciel d’un ordinateur. Cette fonction peut être désactivée en sélectionnant « Désactiver ». Cette fonction est destinée aux utilisateurs les plus expérimentés et à optimiser les performances du moniteur. Conditionement LCD Contribue à réduire les cas mineurs de rémanence de l’image. Le programme peut mettre un certain temps pour fonctionner, suivant le degré de rémanence de l’image. Cette fonction peut être activée en sélectionnant « Activer ».Réinitialisation Rétablit tous les paramètres de réglage de l’OSD aux valeurs d’usine. Personnaliser Les utilisateurs peuvent choisir une fonction parmi « Modes de préréglage », « Luminosité/Contraste », « Réglage auto », « Source entrée » ou « Proportions » et la défnir comme touche de raccourci.REMARQUE : Ce moniteur comporte une fonctionnalité intégrée pour calibrer automatiquement la luminosité et compenser le vieillissement de DEL.Messages d’avertissement OSD Lorsque la fonction Gestion intelligente de l’énergie ou Contraste dynamique est activée (dans ces modes de préréglage : Film ou Jeux), le réglage manuel de la luminosité est désactivé. L'un des messages d'avertissement suivants peut apparaître à l'écran indiquant que le moniteur est hors des limites de synchronisation : Cela signife que l'écran ne peut pas se synchroniser avec le signal reçu depuis l'ordinateur. Voir Spécifcations du moniteur pour connaître les limites des fréquences Horizontale et Verticale adressables par ce moniteur. Le mode recommandé est de 1920 x 1080.Vous verrez le message suivant avant que la fonction DDC/CI ne soit désactivée. Lorsque le moniteur entre en mode d’Economie d’énergie, le message suivant s’affche : Activez l’ordinateur et réveillez le moniteur pour obtenir l'accès à l’OSD Si vous appuyez sur un des boutons autre que le bouton d'alimentation, l'un des messages suivants apparaît selon l'entrée choisie : Entrée VGA/HDMISi l'entrée VGA ou HDMI est sélectionnée et si le câble correspondant n'est pas connecté, une boîte de dialogue fottante comme illustrée ci-dessous apparaît. ou Il est recommandé d’utiliser l’adaptateur secteur fourni. Si non, vous verrez le message, comme présenté ci-dessous. Voir Solutions des problèmes pour plus d'informations. Réglage de la résolution maximale Pour régler le moniteur sur la résolution maximale: Sous Windows Vista®, Windows® 7, Windows® 8: 1. Pour Windows® 8 seulement, sélectionnez la vignette Bureau pour passer au bureau classique. 2. Faites un clic-droit sur le bureau et sélectionnez Résolution d'écran. 3. Cliquez sur la Liste déroulante de la Résolution d'écran et sélectionnez 1920 x 1080. 4. Cliquez sur OK. Si vous ne voyez pas l'option 1920 x 1080, vous avez peut-être besoin de mettre à jour votre pilote graphique. Selon votre ordinateur, menez à bien l'une des procédures suivantes : Si vous avez un ordinateur de bureau ou portable Dell : Allez sur le site support.dell.com, saisissez l'identifant de dépannage, et téléchargez le dernier pilote pour votre carte graphique. Si vous utilisez un ordinateur d'une marque autre que Dell (portable ou de bureau) : Allez sur le site de support de votre ordinateur et téléchargez les derniers pilotes graphiques. Allez sur le site de support de votre carte et téléchargez les derniers pilotes graphiques.A l'aide de l'inclinaison REMARQUE : Ceci est applicable pour un moniteur avec support. Après achat du support autre, veuillez consulter le guide d'installation du support respectifs pour les instructions d'installation. Inclinaison Avec le pied fxé au moniteur, vous pouvez incliner le moniteur pour l’angle de vision le plus confortable. REMARQUE : La base est détachée lorsque l'écran est livré depuis l'usine. Retour à la page de sommaireRetour à la page de sommaire Dépannage Guide Utilisateur du moniteur à Dell™ S2440L Test-Auto Diagnostiques intégrés Démo en magasin Problèmes généraux Problèmes spécifques au produit MISE EN GARDE : Avant de débuter quelque procédure que ce soit de cette section, suivez les Consignes de sécurité. Test-Auto Votre moniteur dispose d'une fonction de test automatique qui vous permet de vérifer s'il fonctionne correctement. Si votre moniteur et votre ordinateur sont connectés correctement mais que l'écran du moniteur reste éteint, effectuez le test automatique du moniteur en suivant ces étapes : 1. Éteignez votre ordinateur et le moniteur. 2. Débranchez le câble vidéo à l'arrière de l'ordinateur. Afn de vous assurer du bon fonctionnement du Test Automatique, déconnectez tous les câbles vidéo situés à l'arrière de l'ordinateur. 3. Rallumez le moniteur. La boîte de dialogue fottante doit apparaître à l'écran (sur un arrière-plan noir) si le moniteur ne peut pas détecter un signal vidéo et s'il fonctionne correctement. En mode auto-test, le témoin d'alimentation LED reste en blanc. De plus, en fonction de l'entrée sélectionnée, l'une des boîtes de dialogue illustrées ci-dessous déflera continuellement sur l'écran. ou 4. Cette boîte de dialogue apparaîtra également lors du fonctionnement habituel du système en cas de déconnexion ou de dommages du câble vidéo. 5. Éteignez votre moniteur et reconnectez le câble vidéo; puis rallumez votre ordinateur ainsi que votre moniteur. Si l'écran de votre moniteur n'affche toujours aucune image après avoir suivi la procédure précédente, vérifez votre contrôleur vidéo et votre ordinateur, puisque votre moniteur fonctionne correctement. Diagnostiques intégrés Votre moniteur a un outil de diagnostic intégré qui vous aide à déterminer si l’anomalie d’écran que vous avez est un problème inhérent à votre moniteur, ou à votre ordinateur et carte vidéo. REMARQUE :Vous pouvez effectuer le diagnostic intégré quand le câble vidéo est débranché et le monitor est en mode test automatique.Exécutez le diagnostic intégré. 1. Assurez-vous que l’écran est propre (pas de particules de poussière sur la surface de l’écran). 2. Débranchez le câble vidéo à l'arrière de l'ordinateur. Le moniteur se rend alors dans le mode de test automatique. 3. Pressez et maintenez enfoncés simultanément pendant 2 secondes les boutons 1 et 4 du panneau avant. Un écran gris apparaît. 4. Examinez soigneusement l’écran pour détecter des anomalies. 5. Enfoncez à nouveau le bouton 4 du panneau avant. L'affchage de l'écran doit passer au rouge. 6. Examinez l’écran pour détecter des anomalies quelconques. 7. Répétez les étapes 5 et 6 pour inspecter l'écran dans les couleurs vert, bleu, noir et blanc. Le test est terminé quand l’écran blanc apparaît. Pour quitter, pressez à nouveau sur le bouton 4. Si vous ne détectez pas d’anomalies quelconques lors de l’utilisation de l’outil de diagnostic intégré, le moniteur fonctionne correctement. Vérifez la carte vidéo et l’ordinateur. Démo en magasin Pour accéder au mode OSD en magasin Débranchez/Déconnectez tous les câbles. Assurez-vous que le moniteur est en mode « Activé ». Appuyez et maintenez le bouton 2 et le bouton 4 pendant 5 secondes. Pour quitter mode OSD en magasin Appuyez le bouton d’alimentation une fois. Si l’alimentation est interrompue pendant démo, reprenez la démo après que l'alimentation est rétablie. Problèmes généraux Le tableau suivant contient les informations générales relatives aux problèmes courants du moniteur que vous pouvez rencontrer, et les solutions possibles. Symptômes courants Description du problème Solutions possibles Pas de vidéo / Témoin d'alimentation éteint Pas d'image Assurez-vous que le câble vidéo reliant l'ordinateur et le moniteur est correctement branché et fxé. Vérifez que la prise de courant marche correctement en branchant un autre appareil électrique dessus. Assurez-vous que le bouton d'alimentation est complètement enfoncé. Assurez-vous que la source d'entrée correcte est sélectionnée via le menu Sélection source en entrée. Pas de vidéo / Témoin d'alimentation allumé Pas d'image ou pas de luminosité Augmentez les contrôles de luminosité et de contraste via l'OSD. Effectuez la vérifcation à l'aide de la fonction de test automatique de l'écran. Vérifez qu'il n'y a pas de broches tordues ou cassées à l'extrémité du câble vidéo. Exécutez le diagnostic intégré.Assurez-vous que la source d'entrée correcte est sélectionnée via le menu Sélection source en entrée. Mauvaise mise au point L'image est foue, trouble ou voilée. Lancez la fonction Ajustement auto via l’OSD. Réglez les contrôles de Phase et d'Horloge via l'OSD. Retirez les câbles de rallonge vidéo. Effectuer la réinitialisation du moniteur aux paramètres d'usine. Modifer la résolution vidéo pour obtenir le rapport d’aspect correct. Vidéo tremblante/vacillante Image comportant des vagues ou un léger mouvement Lancez la fonction Ajustement auto via l’OSD. Réglez les contrôles de Phase et d'Horloge via l'OSD. Effectuer la réinitialisation du moniteur aux paramètres d'usine. Vérifez les facteurs environnementaux. Déplacez le moniteur et testez-le dans une autre pièce. Pixels manquants L'écran LCD affche des points. Éteignez et rallumez. Certains pixels allumés d'une manière permanente sont un défaut naturel de la technologie LCD. Pour plus d'informations sur la Qualité des moniteurs Dell et la Politique sur les pixels, voir le site de Support de Dell à l'adresse : support.dell.com. Pixels fxess L'écran LCD affche des points lumineux. Éteignez et rallumez. Certains pixels allumés d'une manière permanente sont un défaut naturel de la technologie LCD. Pour plus d'informations sur la Qualité des moniteurs Dell et la Politique sur les pixels, voir le site de Support de Dell à l'adresse : support.dell.com. Problèmes de luminosité Image trop terne ou trop lumineuse Effectuez la réinitialisation du moniteur aux paramètres d'usine. Lancez la fonction Ajustement auto via l’OSD. Réglez les contrôles de luminosité et de contraste via l'OSD. Distorsion géométrique Image mal centrée Effectuer la réinitialisation du moniteur aux paramètres d'usine. Lancez la fonction Ajustement auto via l’OSD. Ajuster les contrôles horizontaux et verticaux via l'OSD. REMARQUE : Lors de l’utilisation de HDMI, les réglages de positionnement ne sont pas disponibles. Lignes Horizontales et Verticales L'écran affche une ou plusieurs lignes Effectuez la réinitialisation du moniteur aux paramètres d'usine. Lancez la fonction Ajustement auto via l’OSD. Réglez les contrôles de Phase et d'Horloge Pixel via l'OSD. Effectuez la procédure de test automatique du moniteur et déterminez si de telles lignes apparaissent également dans le mode de test automatique. Vérifez qu'il n'y a pas de broches tordues ou cassées à l'extrémité du câble vidéo. Exécutez le diagnostic intégré. REMARQUE : Lors de l’utilisation de HDMI, les réglages d'horloge et de phase pixel ne sont pas disponibles. Problèmes de synchronisation L'écran est brouillé ou semble découpé en pièces. Effectuez la réinitialisation du moniteur aux paramètres d'usine. Lancez la fonction Ajustement auto via l’OSD. Réglez les contrôles de Phase et d'Horloge Pixel via l'OSD. Effectuez la procédure de test automatique du moniteur pour déterminer si l'écran brouillé apparaît également dans le mode de test automatique. Vérifez qu'il n'y a pas de broches tordues ou cassées à l'extrémité du câble vidéo. Redémarrez l'ordinateur en mode sans échec. Problèmes liés à la sécurité Signes visibles de fumée ou d'étincelles N'effectuez aucun dépannage. Contactez Dell immédiatement. Problèmes intermittents Mauvais fonctionnement marche et arrêt du moniteur Assurez-vous que le câble vidéo reliant l'ordinateur et le moniteur est correctement branché et fxé. Effectuez la réinitialisation du moniteur aux paramètres d'usine. Effectuez la procédure de test automatique du moniteur pour déterminer si le problème intermittent se produit dans le mode de test automatique. Couleur manquante Couleur d'image manquante Effectuez la vérifcation à l'aide de la fonction de test automatique de l'écran. Assurez-vous que le câble vidéo reliant l'ordinateur et le moniteur est correctement branché et fxé. Vérifez qu'il n'y a pas de broches tordues ou cassées à l'extrémité du câble vidéo. Mauvaise couleur La couleur de l'image n'est pas bonne Passez le mode de couleur dans l’OSD Paramètres Couleurs à ‘Graphiques’ ou ‘Vidéo’ en fonction de l’application. Essayez les Modes de couleur prédéfnis dans l’OSD Paramètres Couleurs. Ajustez la valeur RVB dans l’OSD Paramètres Couleurs si la Gestion des couleurs est désactivée. Changez le Format de couleur d’entrée sur RVB PC ou YPbPr dans l’OSD Paramètres avancés. Exécutez le diagnostic intégré.Rétention d'image en raison d'une image statique laissée sur le moniteur de façon prolongée L'ombre faible d’une image statique affchée apparaît sur l’écran Utilisez la fonctionnalité de gestion du courant pour éteindre le moniteur quand vous ne l’utilisez pas. (Pour plus d'informations, voir Modes de gestion d'énergie). Vous pouvez également utiliser un écran de veille qui change dynamiquement. Problèmes spécifques au produit Symptômes spécifques Description du problème Solutions possibles L'image à l'écran est trop petite. L'image est centrée à l'écran mais n'occupe pas toute la zone d'affchage. Vérifez le réglage du taux d'échelle dans l'OSD de réglage de l'image Effectuer la réinitialisation du moniteur aux paramètres d'usine. Impossible de régler le moniteur avec les boutons situés sur le panneau frontal. L'OSD n'apparaît pas à l'écran. Éteignez le moniteur, débranchez le cordon d'alimentation puis rebranchez-le et rallumez le moniteur. Vérifez si le menu OSD a été verrouillé. Si c'est le cas, appuyez pendant 10 secondes sur le bouton au-dessus du bouton Marche pour déverrouiller. Voir Verrouillage du menu. Aucun signal d'entrée lorsque l'utilisateur appuie sur les commandes Pas d’image, la diode est bleue. Vérifez la source du signal. Assurez-vous que l'ordinateur n'est pas en mode d'économie d'énergie en déplaçant la souris ou en appuyant sur une touche du clavier. Vérifez que le câble de signal est branché correctement. Rebranchez le câble de signal si nécessaire. Réinitialisez l'ordinateur ou le lecteur vidéo. L'image ne remplit pas tout l'écran. L'image ne peut pas remplir la hauteur ou la largeur de l'écran. En raison des différents formats vidéo (proportions) des DVD, le moniteur peut ne pas s'affcher en plein écran. Exécutez le diagnostic intégré. REMARQUE : Lorsque vous choisissez le mode HDMI, la fonction Réglage auto n'est pas disponible. Retour à la page de sommaireRetour à la Table des Matières Appendice Guide Utilisateur du moniteur à Dell™ S2440L Consignes de Sécurité Déclaration de la FCC (Etats-Unis seulement) et autres informations règlementaires Contacter Dell MISE EN GARDE: Consignes de Sécurité MISE EN GARDE: Respectez les directives de sécurité indiquées ci-dessous pour votre sécurité et pour protéger votre ordinateur et votre environnement de travail contre tout dommage. Respectez les directives de sécurité indiquées ci-dessous pour votre Pour des informations sur les consignes de sécurité, consultez le Guide d’information sur le produit. Déclaration de la FCC (Etats-Unis seulement) et autres informations règlementaires Pour la déclaration de la FCC et les autres informations règlementaires, visitez le site Web suivant sur la conformité : www.dell.com\regulatory_compliance.Contacter Dell Pour les clients aux Etats-Unis, appelez le 800-WWW-DELL (800-999-3355). REMARQUE: Si vous n’avez pas de connexion Internet active, vous pouvez trouver l’information pour nous contacter sur votre facture d’achat, votre bordereau d’emballage, votre relevé ou le catalogue des produits Dell. Dell offre plusieurs options de services et d’assistance téléphonique et en ligne. Leur disponibilité est différente suivant les pays et les produits, et certains services peuvent ne pas vous être offerts dans votre région. Pour contacter Dell pour les ventes, l’assistance technique, ou les questions de service à la clientèle: 1. Consultez support.dell.com. 2. Vérifer votre pays ou région dans le menu déroulant Choisir un Pays /Région au bas de la page. 3. Cliquez sur Nous contacter sur la page à gauche. 4. Sélectionnez le lien adéquat du service ou de l’assistance requise. 5. Choisissez la méthode pour contacter Dell qui vous convient le mieux. Retour à la Table des MatièresRetour à la Table des Matières Installation de votre moniteur Guide Utilisateur du moniteur à Dell™ S2440L Réglage de la résolution d'affchage Pour un fonctionnement maximum du moniteur lors de l'utilisation des systèmes d'exploitation Microsoft Windows, réglez la résolution d'affchage sur 1920 x 1080 pixels en suivant les étapes suivantes : Sous Windows Vista®, Windows® 7, Windows® 8: 1. Pour Windows® 8 seulement, sélectionnez la vignette Bureau pour passer au bureau classique. 2. Faites un clic-droit sur le bureau et sélectionnez Résolution d'écran. 3. Cliquez sur la Liste déroulante de la Résolution d'écran et sélectionnez 1920 x 1080. 4. Cliquez sur OK. Si vous ne voyez pas la résolution recommandée en option, vous avez peut-être besoin de mettre à jour votre pilote graphique. Veuillez choisir le scénario ci-dessous qui décrit le mieux le système d'ordinateur que vous utilisez, et suivez les étapes fournies. 1: Si vous avez un ordinateur de bureau Dell™ ou un ordinateur portable Dell™ avec accès à Internet. 2: Si vous avez un ordinateur de bureau, portable ou une carte graphique non Dell™. Retour à la Table des MatièresRetour à la Table des Matières Installation de votre moniteur Guide Utilisateur du moniteur à Dell™ S2440L Si vous avez un ordinateur de bureau Dell™ ou un ordinateur portable Dell™ avec accès à Internet 1. Allez sur http://support.dell.com, saisissez votre tag de service et téléchargez le dernier pilote pour votre carte graphique. 2. Après installation des pilotes pour votre Adaptateur Graphique, essayez de nouveau de confgurer la résolution sur sur 1920 x 1080. REMARQUE : Si vous n'arrivez pas à confgurer la résolution sur 1920 x 1080, veuillez contacter Dell™ pour demander un Adaptateur Graphique qui prend en charge ces résolutions. Retour à la Table des MatièresRetour à la Table des Matières Installation de votre moniteur Guide Utilisateur du moniteur à Dell™ S2440L Si vous avez un ordinateur de bureau, portable ou une carte graphique non Dell™. Sous Windows Vista®, Windows® 7, Windows® 8: 1. Pour Windows® 8 seulement, sélectionnez la vignette Bureau pour passer au bureau classique. 2. Faites un clic-droit sur le bureau et sélectionnez Personnalisation. 3. Cliquez sur Modifer les paramètres d’affchage. 4. Cliquez sur Réglages avancés. 5. Identifez votre fournisseur de contrôleur graphique à partir de la description en haut de la fenêtre (par exemple NVIDIA, ATI, Intel etc). 6. Veuillez vous référer au site Web du fournisseur de votre carte graphique pour la mise à jour du pilote (par exemple http://www.ATI.com OU http://www.NVIDIA.com). 7. Après installation des pilotes pour votre Adaptateur Graphique, essayez de nouveau de confgurer la résolution sur sur 1920 x 1080. REMARQUE : Si vous n'arrivez pas à confgurer la résolution recommandée, veuillez contacter le fabricant de votre ordinateur ou envisager l'achat d'un adaptateur graphique qui prenne en charge la résolution vidéo. Retour à la Table des Matières Guide de l’Utilisateur de l’Écran Large Dell™ IN1940MW Guide d'utilisation Instructions importantes pour défnir la résolution d'affchage sur 1440 x 900 (Maximum) Les informations présentes dans ce document sont sujettes à modifcation sans avis préalable. © 2012 Dell Inc. Tous droits réservés. Toute reproduction de quelque manière que ce soit sans l'autorisation écrite de Dell Inc. est strictement interdite. Marques utilisées dans ce texte : DELL et le logo DELL sont des marques commerciales de Dell Inc.; Microsoft et Windows sont des marques commerciales ou des marques déposées de Microsoft Corporation aux Etats-Unis et/ou dans d’autres pays. Adobe est une marque déposée ou une marque commerciale d’Adobe Systems Incorporated aux États-Unis et/ou dans d’autres pays. D'autres marques commerciales et appellations commerciales peuvent être utilisées dans ce document pour faire référence soit aux entités revendiquant les marques et les appellations soit à leurs produits. Dell Inc. désavoue tout intérêt propriétaire dans les marques commerciales et appellations commerciales autres que les siennes. Modèle IN1940MWb Mai 2012 Rev. A00Guide de l’Utilisateur de l’Écran Large Dell™ IN1940MW A Propos de Votre Moniteur Installation de votre moniteur Opération du moniteur Guide de dépannage Appendice Remarques, Prudence et Avertissement REMARQUE: Une REMARQUE indique des informations importantes qui vous aideront à mieux utiliser votre ordinateur. PRUDENCE: Un PRUDENCE indique un risque potentiel de dommage matériel ou de perte de données et vous explique comment éviter ce problème. AVERTISSEMENT: Une AVERTISSEMENT indique un risque potentiel de dommage matériel, de blessure corporelle ou de décès. Les informations présentes dans ce document sont sujettes à modifcation sans avis préalable. © 2012 Dell Inc. Tous droits réservés. Toute reproduction de quelque manière que ce soit sans l'autorisation écrite de Dell Inc. est strictement interdite. Marques utilisées dans ce texte : DELL et le logo DELL sont des marques commerciales de Dell Inc.; Microsoft et Windows sont des marques commerciales ou des marques déposées de Microsoft Corporation aux Etats-Unis et/ou dans d’autres pays; Adobe est une marque commerciale d’Adobe Systems Incorporated aux États-Unis et/ou dans d’autres pays. D'autres marques commerciales et appellations commerciales peuvent être utilisées dans ce document pour faire référence soit aux entités revendiquant les marques et les appellations soit à leurs produits. Dell Inc. désavoue tout intérêt propriétaire dans les marques commerciales et appellations commerciales autres que les siennes. Modèle IN1940MWb Mai 2012 Rev. A00Retour à la Table des matières A propos de votre moniteur Guide de l’Utilisateur de l’Écran Large Dell™ IN1940MW Contenu de l'emballage Caractéristiques du produit Identiffcation des pièces et contrôles Spécifcations du moniteur Capacité Plug and Play Qualité du moniteur LCD et politique de pixel Instructions d'entretien Contenu de la boîte Votre moniteur est livré avec les éléments indiqués ci-dessous. Assurez-vous que tous les éléments sont présents et Contactez Dell™ si quoi que ce soit manque. REMARQUE : Certains éléments sont en option et peuvent ne pas être expédiés avec votre moniteur. Certaines fonctionnalités ou accessoires peuvent ne pas être disponibles dans certains pays. MoniteurColonne du pied Base du socle Cordon d'alimentation Câble VGA Pilotes et Documentation média Guide de mise en route Informations de sécuritéCaractéristiques du produit Le moniteur Dell™ IN1940MW a une matrice active, un transistor en couche mince (TFT), un écran à cristaux liquides (ACL). Les principales caractéristiques du moniteur sont les suivantes : ■ Affchage sur une zone visible de 48,26 cm (19 pouces). ■ Résolution 1440 x 900 plus support plein écran à des résolutions inférieures. ■ Capacité de réglage d’inclinaison. ■ Une gamme de solutions de montage avec des orifces de fxation à écartement de 100 mm VESA® (Video Electronics Standards Association) et pied amovible. ■ Capacité Plug and Play si votre système la prend en charge.. ■ Menu de réglage OSD (affchage à l’écran) pour une facilité de confguration et l’optimisation de l’écran. ■ Le CD logiciel et de documentation inclut un fchier d’information (INF), un fchier de correspondance des couleurs d’image (ICM) et une documentation sur le produit. ■ Fente de verrouillage de sécurité.Identiffcation des pièces et des contrôles Vue de devant Commandes en face avant Label Description 1 Boutons de fonction (pour plus d'informations, voir Utilisation du moniteur) 2 Bouton d'alimentation Marche/Arrêt (avec voyant DEL)Vue de derrière Label Description Utilisation 1 Étiquette code-barre avec numéro de série Référez-vous à cette étiquette si vous devez contacter Dell pour un support technique. 2 Etiquette de tension réglementaire Pour contacter Dell pour le support technique. 3 Orifces de montage VESA (100mm x 100mm - Derrière la plaque de base attachée) Pour installer le moniteur. 4 Orifce de verrouillage de sécurité Pour aider à sécuriser votre moniteur. 5 Crochets de fxation de la Soundbar Dell Pour attacher la Soundbar Dell optionnelle.Vue de coté Vue de droiteVue de dessous Label Description 1 Connecteur d'alimentation CA 2 Connecteur DVI 3 Connecteur VGA Spécifcations du moniteur Spécifcations de l'écran plat Numéro de série Moniteur Dell IN1940MW Type d'écran Matrice active - LCD TFT Type de dalle TN Dimensions de l'écran 19 pouces (taille de l'image visible 19 pouces) Zone d'affchage préréglée 408,24(H)X255,15(V) Horizontale 408,24 mm (16,08 pouces) Verticale 255,15 mm (10,05 pouces) Finesse Pixel 0,2835 mm Angle de vision 160° (vertical) standard, 170° (horizontal) standardSortie Luminance 250 cd/m² (standard) Rapport de contraste 1000:1 (typique) Revêtement de surface Antirefet avec revêtement dur 3H Rétro-éclairage Système à barre de diodes Temps de réponse 5 ms standard Nombre de couleurs 16,7 millions de couleurs Gamme de couleurs 83% CIE1976 (typique)* *La gamme de couleurs du [IN1940MW] (standard) est basée sur les normes d'essais CIE1976 (83%) et CIE1931 (72%). Resolution Specifcations Model Moniteur Dell IN1940MW Plage de balyage horizontal 30 kHz à 83 kHz (automatique) Plage de balayage vertical 50 Hz à 76 Hz (automatique) Résolution maximale préréglée 1440 X 900 à 60 Hz Modes vidéo pris en charge Capacités d'affchage vidéo (lecture DVI) 480i/480p/576i/576p/720p/1080i/1080P (Prise en charge HDCP)Modes d'affchage préréglés Mode d’affchage Fréquence horizontale (kHz) Fréquence verticale (Hz) Horloge de pixels (MHz) Polarité de synchronisation (Horizontale/Verticale) VESA, 720 x 400 31,5 70,1 28,3 -/+ VESA, 640 x 480 31,5 59,9 25,2 -/- VESA, 640 x 480 37,5 75,0 31,5 -/- VESA, 800 x 600 37,9 60,3 40,0 +/+ VESA, 800 x 600 46,9 75,0 49,5 +/+ VESA, 1024 x 768 48,4 60,0 65,0 -/- VESA, 1024 x 768 60,0 75,0 78,8 +/+ VESA, 1152 x 864 67,5 75,0 108,0 +/+ VESA, 1280 x 800 49,7 59,8 83,5 -/+ VESA, 1280 x 1024 64,0 60,0 108,0 +/+ VESA, 1280 x 1024 80,0 75,0 135,0 +/+ VESA, 1440 x 900 - Analogique 55,9 59,9 106,5 -/+ VESA, 1440 x 900 (CTV-R) - Numérique 55,5 59,9 88,8 +/- Spécifcations électriques Signaux d'entrée vidéo Analogique RVB, 0,7 Volts +/- 5%, polarité positive à 75 ohms d'impédance d'entrée Numérique DVI-D TMDS, 600mV pour chaque ligne différentielle, polarité positive à 50 ohms d'impédance d'entrée Signaux d'entrée de synchronisation Synchronisations horizontale et verticale séparées, Niveau TTL sans polarité, SOG (SYNC Composite sur Vert) Tension d'entrée CA / fréquence / courant 100 à 240 VCA / 50 ou 60 Hz + 3 Hz / 1,6 A (Max.) Courant d'appel 120 V: 30 A (Max.) 240 V: 60 A (Max.)Caractéristiques physiques Numéro de série Moniteur Dell IN1940MW Type de connecteur Connecteur bleu 15 broches D-sous-miniature ; Connecteur blanc DVI-D. Type du câble de signal Numérique: Détachable, DVI-D, Broches pleines, Expédié détaché du moniteur Analogique, amovible, D-sub, 15 broches, livré fxé au moniteur Dimensions (avec base) Hauteur 372,9 mm (14,68 pouces) Largeur 443,8 mm (17,47 pouces) Profondeur 163,5 mm (6,44 pouces) Dimensions (sans base) Hauteur 290,8 mm (11,45 pouces) Largeur 443,8 mm (17,47 pouces) Profondeur 52,0 mm (2,05 pouces) Dimensions de la base Hauteur 140,4 mm (5,53 pouces) Largeur 236,0 mm (9,29 pouces) Profondeur 163,5 mm (6,44 pouces) Poids Poids avec l'emballage 3,6 kg (7,93 lbs) Poids avec ensemble base et câbles 3,0 kg (6,61 lbs) Poids sans ensemble base (En cas de montage mural ou de montage VESA - sans câbles) 2,4 kg (5,29 lbs) Poids de l'ensemble base 0,3 kg (0,66 lbs)Caracrtéristiques environnementales Température En fonctionnement 0° à 40 ° C (32° à 104 ° F) A l'arrêt Entreposage : -20° à 60° C (-4° à 140°F) Expédition: -20° à 60° C (-4° à 140°F) Humidité En fonctionnement 10% à 80%(sans condensation) A l'arrêt Entreposage : 5% à 90% (sans condensation) Expédition: 5% à 90%(sans condensation) Altitude En fonctionnement 3 048 m (10 000 pieds) max A l'arrêt 10 668m (35 000 pieds) max Dissipation Thermique 78,5 BTU/heure (maximum) 58,0 BTU/heure (typique) Modes de gestion d'énergie Si vous avez une carte graphique compatible DPM™ VESA ou un logiciel installé sur votre PC, le moniteur peut automatiquement réduire sa consommation électrique lorsqu'il n'est pas utilisé. On parle alors de Mode d'économie d'énergie. Si l’ordinateur détecte une entrée depuis le clavier, la souris ou d’autres périphériques, le moniteur reprend son fonctionnement automatiquement. Le tableau suivant donne la consommation électrique et les signaux de cette fonction d'économie d'énergie automatique : Modes VESA Sync. horizontale Sync. verticale Vidéo Indicateur d'alimentation Consommation électrique Fonctionnement normal Active Active Active blanche 23 W (maximum) Fonctionnement normal Active Active Active blanche 17 W (typique) Mode Arrêt-Actif Inactif Inactif Vide Orange Moins de 0,5 W Eteint - - - Eteint Moins de 0,5 W L'OSD fonctionnera uniquement en mode fonctionnement normal. Activez l’ordinateur et l’ordinateur pour avoir accès à l’ OSD. * La consommation électrique nulle en mode ARRÊT ne peut être obtenue qu'en déconnectant le câble principal du moniteur. ** Consommation d’énergie maximum avec luminosité maximum et contraste, barre de son dell et un USB actif.Assignations des broches VGA Connector Numéro de broche Côté 15-broches du câble de signal connecté 1 Vidéo-Rouge 2 Vidéo-Vert 3 Vidéo-Bleu 4 MASSE 5 Test-Auto 6 MASSE-R 7 MASSE-G 8 MASSE-B 9 Ordinateur 5V/3.3V 10 MASSE-sync 11 MASSE 12 Données DDC 13 Sync.H. 14 Sync V. 15 Horloge DDCConnecteur DVI Numéro de broche 24-broches du câble de signal Connecté 1 TMDS RX2- 2 TMDS RX2+ 3 Masse TMDS 4 Flottant 5 Flottant 6 Horloge DDC 7 Données DDC 8 Flottant 9 TMDS RX1- 10 TMDS RX1+ 11 Masse TMDS 12 Flottant 13 Flottant 14 Alimentation +5V/+3.3V 15 Test-Auto 16 Détection connexion à chaud 17 TMDS RX0- 18 TMDS RX0+ 19 Masse TMDS 20 Flottant 21 Flottant22 Masse TMDS 23 Horloge TMDS+ 24 Horloge TMDSCapacité Plug and Play Vous pouvez installer ce moniteur avec n'importe système compatible Plug and Play. Ce moniteur fournit automatiquement à l'ordinateur ses données d'identifcation d'affchage étendues (Extended Display Identifcation Data : EDID) en utilisant les protocoles DDC (Display Data Channel) de manière à ce que le système puisse effectuer automatiquement la confguration et optimiser les paramètres du moniteur. La plupart des installations de moniteur sont automatiques. Vous pouvez sélectionner différents paramètres si requis. Qualité du moniteur LCD et politique de pixel Pendant le processus de fabrication de ce moniteur LCD, il n'est pas anormal que un ou plusieurs pixels deviennent fxe et ne puissent plus changer. Le résultat visible est un pixel fxe qui reste affché comme un minuscule point noir ou un point éclairé sans couleur. Lorsque un pixel reste allumé tout le temps, celui-ci est connu sous le nom "point lumineux". Lorsqu’un pixel reste noir tout le temps, celui-ci est connu sous le nom "point noir". Dans la plupart des cas, il est diffcile de voir ces pixels fxes et ceux-ci ne devraient pas affecter la qualité ou la fonctionalité de l'écran. Un écran avec entre 1 et 5 pixels fxes est considéré normal et standard. Pour toute information, visitez le site de support de Dell : support.dell.com.Instructions d'entretien Entretien de votre moniteur AVERTISSEMENT : Lisez et suivez les instructions de sécurité avant de nettoyer le moniteur. AVERTISSEMENT : Avant de nettoyer le moniteur, débranchez le cordon d'alimentation du moniteur et de la prise murale. Pour les meilleures pratiques, suivez les instructions dans la liste ci-dessous pendant le déballage, le nettoyage ou la manipulation de votre moniteur : Pour nettoyer votre écran antistatique, humidifez légèrement un chiffon doux et propre avec de l'eau. Si possible, utilisez un tissu de nettoyage spécial écran ou une solution adaptée au revêtement antistatique. Ne pas utiliser de produits à base de benzène, un diluant, de l'ammoniaque, des nettoyants abrasifs ou des produits à base d'air comprimé. Utilisez un chiffon légèrement humidifé et tiède pour nettoyer les parties en matière plastique. Evitez d'utiliser toutes sortes de détergents car certains peuvent laisser un flm trouble sur les parties plastiques. Si vous remarquez la présence de poudres blanches lors du déballage de votre moniteur, éliminez-les à l'aide d'un chiffon. Cette poudre blanche est produite pendant le transport du moniteur. Manipulez votre moniteur avec soin car les plastiques de couleur foncée peuvent rayer et laisser des marques de rayures blanches plus facilement que les moniteurs de couleur claire. Pour aider à maintenir une meilleure qualité d’image sur votre moniteur, utiliser un économiseur d’écran qui change dynamiquement et veuillez éteindre votre moniteur quand vous ne l’utilisez pas. Retour à la Table des matièresRetour à la Table des matières Installation du moniteur Guide de l’Utilisateur de l’Écran Large Dell™ IN1940MW Attacher la base Enlever la base pour un montage mural VESA Connecter votre moniteur Connexion de la Soundbar Dell AX510PA (en option) Attacher la base REMARQUE :Lorsque le moniteur quitte l’usine, la base du socle n’est pas montée. 1. Assemblez le support sur la base.a. Placez le moniteur sur une surface plate et stable. b. Faites glisser le corps du socle du moniteur vers le bas dans la base, jusqu’à ce qu’il s’enclenche en place. 2 Assemblez le socle ainsi formé avec l’écran. a. Placez l’écran sur un tissu doux ou sur un coussin près du bord d’un bureau. b. Alignez les pattes de fxation du socle avec la fente de fxation de l’écran. c. Insérez les pattes de fxation dans l'écran jusqu’à ce qu’elles soient fxées en place.Enlever la base pour un montage mural VESA Pour enlever la base du socle du moniteur : 1. Placez le moniteur sur un chiffon doux ou un coussin sur une surface plate et stable. 2. Avec un tournevis long, appuyez sur le bouton de verrouillage situé dans le trou juste au-dessus du porte-écran. 3. Une fois le bouton enfoncé, désolidarisez le support de l'écran.Connecter votre moniteur AVERTISSEMENT : Avant de débuter quelque procédure que ce soit de cette section, suivez les Instructions de sécurité. Pour connecter votre moniteur à l'ordinateur : 1. Eteignez votre ordinateur et débranchez le cordon d'alimentation. Reliez le câble bleu (VGA) entre votre moniteur et votre ordinateur. REMARQUE : Si votre ordinateur possède un connecteur DVI blanc, branchez le câble DVI blanc (optionnel) entre votre moniteur et votre ordinateur. REMARQUE : Ne branchez pas en même temps les câbles VGA et DVI blanc sur l'ordinateur car tous les moniteurs sont livrés avec le câble VGA déjà attaché au moniteur. 2. Reliez le câble blanc (DVI Digital) ou bleu (VGA Analogique) du connecteur d'affchage au port vidéo correspondant qui se situe au dos de votre ordinateur. Ne pas utiliser en même temps les deux câbles dans le même ordinateur. Les deux câbles peuvent être utilisés en même temps dans le seul cas ou ils sont reliés à deux ordinateurs différents avec les systèmes vidéo appropriés. Branchement du câble VGA bleu Brancher le câble DVI blanc (optionnel) ATTENTION : Les illustrations ne sont qu’à titre indicatif seulement. L’apparence de l’ordinateur peut varier.Connexion de la Soundbar Dell AX510PA (en option) PRUDENCE : Ne pas utiliser de périphérique autre que la soundbar Dell. Pour attacher la soundbar : 1. À l'arrière du moniteur, attachez la soundbar en alignant les deux fentes de la soundbar avec les deux crochets situés en bas du moniteur. 2. Faites glisser la soundbar vers la gauche jusqu'à ce qu'elle se mette en place. 3. Connectez la soundbar au connecteur d'alimentation CC de l’adaptateur d’alimentation de la soundbar. 4. Insérez la mini prise stéréo sortant de l'arrière de la soundbar dans le connecteur sortie audio de votre ordinateur. Retour à la table des matièresRetour à la page de sommaire Utilisation du moniteur Guide Utilisateur du moniteur à Dell™ IN1940MW Allumer le moniteur Utiliser les commandes du panneau frontal Utiliser le menu sur écran (OSD) Réglage de la résolution maximale Utiliser la Soundbar Dell Utilisation de l'inclinaison Allumer le moniteur Appuyez le bouton pour allumer le moniteur. Utiliser le Panneau Frontal Utilisez les boutons sur le panneau frontal du moniteur pour régler les caractéristiques de l'image affchée. Quand vous utilisez ces boutons pour régler les commandes, un OSD affche les valeurs numériques des caractéristiques que vous modifez. Boutons sur le panneau frontal Description 1 Touche de raccourci / Modes de préréglage Utiliser ce bouton pour choisir parmi différents modes de couleurs préréglés. 2 Touche de raccourci / Luminosité/Contraste Utiliser ce bouton pour accéder directement au menu « Luminosité/Contraste ». 3 Menu Utiliser le bouton MENU pour activer l’affchage à l’écran (OSD) et sélectionner le menu OSD. Voir Accès au système des menus. 4 Quitter Utiliser ce bouton pour revenir au menu principal ou au menu OSD principal.5 Mise sous tension (avec voyant de mise sous tension) Utiliser le bouton de mise sous tension pour allumer et éteindre le moniteur. Le voyant blanc indique que le moniteur est allumé et prêt à fonctionner. Le voyant orange indique que le moniteur est en mode d'économie d’énergie. Boutons sur le panneau frontal Utilisez les boutons du panneau avant du moniteur pour régler les paramètres de l’image. Boutons sur le panneau frontal Description 1 Haut Utilisez le bouton Haut pour ajuster (augmenter la valeur) des éléments dans le menu OSD. 2 Bas Utilisez le bouton Bas pour ajuster (baisser la valeur) des éléments dans le menu OSD. 3 OK Utilisez le bouton OK pour confrmer votre sélection. 4 Retour Utilisez le bouton Retour pour retourner au menu précédent.Utilisation du menu d’affchage à l’écran (OSD) Accès au système des menus REMARQUE : Si l’on accède à un autre menu ou quitte le menu OSD après avoir modifé les paramètres, les modifcations sont sauvegardées automatiquement par le moniteur. Elles sont également sauvegardées après avoir attendu que le menu OSD disparaisse. 1. Appuyer sur le bouton pour lancer le menu OSD et affcher le menu principal. Menu principal pour entrée analogique (VGA)ou Menu principal pour entrée numérique (DVI) REMARQUE : Le REGLAGE AUTO est disponible uniquement en cas d’utilisation du connecteur analogique (VGA). 2. Appuyer sur les boutons et pour accéder aux différentes options de confguration. En se déplaçant d’une icône à l’autre, le nom de l’option est affché en surbrillance. Se reporter au tableau suivant pour la liste complète des options disponibles pour le moniteur. 3. Appuyer une fois sur le bouton pour activer l’option en surbrillance. 4. Appuyer sur les boutons et pour sélectionner le paramètre voulu. 5. Appuyer sur pour accéder à la barre de réglage puis utiliser les boutons et , en fonction des indicateurs sur le menu, pour effectuer des modifcations.6. Sélectionner l’option pour revenir au menu principal. Icône Menu et sous-menus Description Luminosité/Contraste Utiliser ce menu pour activer la fonction de réglage de luminosité/contraste. Luminosité La luminosité permet de régler la luminance du rétroéclairage. Appuyer sur le bouton pour augmenter la luminosité et sur le bouton pour la diminuer (mini. 0 / maxi. 100). REMARQUE : Le réglage manuel de Luminosité est désactivé lorsque Gestion intelligente de l’énergie est activé. Contraste Régler la luminosité au préalable puis le contraste uniquement si un réglage supplémentaire s’impose. Appuyer sur le bouton pour augmenter le contraste et sur le bouton pour le diminuer (mini. 0 / maxi. 100). La fonction de réglage du contraste permet d’ajuster le rapport des brillances entre parties sombres et claires de l’image sur l’écran.Réglage auto Bien que le moniteur soit reconnu par l’ordinateur au démarrage, la fonction de Réglage Auto optimise les paramètres d’affchage en fonction de la confguration d’installation propre à chaque utilisateur. Le Réglage auto permet au moniteur de s’adapter automatiquement au signal vidéo entrant. Après avoir utilisé la fonction Réglage auto, le réglage du moniteur peut être retouché en utilisant les commandes d’horloge de pixels (grossier) et de phase (fn) sous Paramètres d’image. REMARQUE : Dans la plupart des cas, la fonction Réglage auto confère la meilleure image possible pour toutes les confgurations. REMARQUE : L’option Réglage auto est disponible uniquement en cas d’utilisation du connecteur analogique (VGA). Source entrée Utiliser le menu Source d’entrée pour effectuer une sélection entre les différents signaux vidéo pouvant être connectés au moniteur.Sélection auto Appuyez sur pour sélectionner Sélection auto, le moniteur détectera automatiquement soit l'entrée VGA soit l'entrée DVI-D. VGA Sélectionner Entrée VGA en cas d’utilisation du connecteur analogique (VGA). Appuyer sur pour sélectionner la source d’entrée VGA. DVI-D Sélectionner Entrée DVI-D en cas d’utilisation du connecteur numérique (DVI). Appuyer sur pour sélectionner la source d’entrée DVI. Réglage des couleurs Utiliser Paramètres de couleurs pour ajuster le mode de paramétrage des couleurs. Format entrée couleurs Permet de changer le mode d’entrée vidéo : RVB : Sélectionnez cette option si votre moniteur est connecté à un ordinateur ou un lecteur de DVD avec le câble VGA et DVI. YPbPr : Sélectionnez cette option si votre moniteur est connecté à un lecteur de DVD par YPbPr à VGA, ou câble YPbPr à DVI ; ou si le paramètre de sortie couleur DVD n’est pas RVB.Modes de préréglage Quand vous sélectionnez Modes de préréglage, vous pouvez choisir Standard, Multimédia, Film, Jeux, Texte, Chaud, Froid ou Couleur Perso dans la liste. Standard : Permet d’obtenir les réglages par défaut du moniteur. Il s’agit du mode de préréglage par défaut. Multimédia : Permet d’obtenir les réglages de couleurs adaptés aux applications multimédia. Film : Permet d’obtenir les réglages de couleurs adaptés aux flms. Jeux : Permet d’obtenir les réglages de couleurs adaptés à la plupart des applications de jeux. Texte : Charge les réglages de luminosité et de netteté idéaux pour affcher les textes. Chaud : Augmente la température des couleurs. L’écran affche des teintes plus chaudes avec des tons rouges/jaunes. Froid : Diminue la température des couleurs. L’écran affche des teintes plus froides avec un ton bleuté. Couleur Perso : Permet de paramétrer manuellement les couleurs. Agir sur les boutons et pour régler les valeurs des trois couleurs (rouge, vert, bleu) et défnir un mode de préréglage des couleurs personnalisé. Hue Cette fonction permet de changer la teinte des images vidéo sur vert ou violet. Elle sert à obtenir le ton couleur chair souhaité. La teinte peut être réglée de « 0 » à « 100 ». Appuyer sur pour renforcer la nuance de vert de l’image vidéo. Appuyer sur pour renforcer la nuance de violet de l’image vidéo. REMARQUE : L’ajustement de la teinte n’est disponible que lorsque vous sélectionnez un mode de préréglage Film ou Jeux. Saturation Cette fonction permet de régler la saturation des couleurs pour les images vidéo. La saturation peut être réglée de «0 » à « 100 ». Appuyer sur pour renforcer l’aspect monochrome de l’image vidéo. Appuyer sur pour renforcer l’aspect coloré de l’image vidéo. REMARQUE : L’ajustement de la saturation n’est disponible que lorsque vous sélectionnez un mode de préréglage Film ou Jeux.Réinit. param.couleur Rétablit les paramètres de couleurs d’origine du moniteur. Paramètres affchage La fonction Paramètres d’affchage permet de régler l’image. Proportions Ajuste le format en Wide 16:10, 5:4 ou 4:3. Position horizontale Utiliser ou pour ajuster la position de l’image à gauche ou à droite. La valeur minimale de réglage est « 0 » (-). La valeur maximale de réglage est « 100 » (+). Position verticale Utiliser ou pour ajuster la position de l’image vers le haut ou le bas. La valeur minimale de réglage est « 0 » (-). La valeur maximale de réglage est « 100 » (+). Finesse Cette fonction permet de d’obtenir une image plus nette ou plus douce. Utiliser ou pour régler la netteté de « 0 » à « 100 ». Horloge pixels Les réglages de phase et d’horloge de pixels permettent de régler le moniteur à la convenance de l’utilisateur. Utiliser ou pour obtenir la meilleure qualité d’image possible.Phase Si des résultats satisfaisants ne sont pas obtenus par le réglage de phase, utiliser le réglage d’horloge de pixels (grossier) puis de nouveau le réglage de phase (fn). REMARQUE : Les réglages d’horloge et de phase sont disponibles uniquement pour les entrées « VGA ». Réinit. tous Param. Affchage Sélectionner cette option pour rétablir les paramètres d’affchage par défaut. Autres paramétrages Sélectionner cette option pour régler les paramètres de l’OSD, comme la langue affchée, la durée pendant laquelle le menu reste affché à l’écran, etc. Langue Cette option permet de choisir une des huit langues disponibles (Anglais, Espagnol, Français, Allemand, Portugais brésilien, Russe, Chinois simplifé ou Japonais) pour l’affchage de l’OSD. Transparence menu Sélectionner cette option pour modifer la transparence du menu en appuyant sur le 1er ou le 2ème bouton (Mini.: 0 ~ Maxi.: 100). Minuteur du menu Durée d’activation de l’OSD : Défnit la durée pendant laquelle l’OSD restera activé après avoir pressé un bouton. Utiliser ou pour déplacer le curseur par incréments de 1 secondes, de 5 à 60 secondes.Verrou du menu Permet de contrôler l’accès des utilisateurs aux réglages. Lorsque Verrouillage est sélectionné, aucun réglage de la part des utilisateurs n’est autorisé. Tous les boutons sont verrouillés . REMARQUE : Lorsque l’OSD est verrouillé, et si le bouton « menu » est pressé, l’utilisateur est ramené directement au menu de paramétrage de l’OSD, avec la fonction de verrouillage de l’OSD sélectionnée. Sélectionner « Déverrouiller » pour obtenir le déverrouillage et permettre à l’utilisateur d’accéder à tous les paramètres applicables. Gestion intelligente de l’énergie Pour activer ou désactiver la réduction dynamique du rétro-éclairage. La fonction de réduction dynamique du rétro-éclairage réduit automatiquement le niveau de luminosité de l’écran lorsque l’image affchée contient une forte proportion de zones lumineuses. DDC/CI La fonction DDC/CI (Canal de données d’affchage/Interface de commande) permet de contrôler les paramètres réglables (luminosité, équilibre des couleurs, etc.) via le logiciel d’un ordinateur. Cette fonction peut être désactivée en sélectionnant « Désactiver ». Cette fonction est destinée aux utilisateurs les plus expérimentés et à optimiser les performances du moniteur. Conditionement LCD Contribue à réduire les cas mineurs de rémanence de l’image. Le programme peut mettre un certain temps pour fonctionner, suivant le degré de rémanence de l’image. Cette fonction peut être activée en sélectionnant « Activer ».Réinitialisation Rétablit tous les paramètres de réglage de l’OSD aux valeurs d’usine. Personnaliser Les utilisateurs peuvent choisir une fonction parmi « Modes de préréglage », « Luminosité/Contraste », « Réglage auto », « Source entrée », « Proportions » et la défnir comme touche de raccourci.REMARQUE : Ce moniteur comporte une fonctionnalité intégrée pour calibrer automatiquement la luminosité et compenser le vieillissement de DEL.Messages d’avertissement OSD Lorsque la fonction Gestion intelligente de l’énergie est activée (dans ces modes de préréglage : Film ou Jeux), le réglage manuel de la luminosité est désactivé. L'un des messages d'avertissement suivants peut apparaître à l'écran indiquant que le moniteur est hors des limites de synchronisation : Cela signife que l'écran ne peut pas se synchroniser avec le signal reçu depuis l'ordinateur. Voir Spécifcations du moniteur pour connaître les limites des fréquences Horizontale et Verticale adressables par ce moniteur. Le mode recommandé est de 1440 x 900. Vous verrez le message suivant avant que la fonction DDC/CI ne soit désactivée.Lorsque le moniteur entre en mode d’Economie d’énergie, le message suivant s’affche : Activez l’ordinateur et réveillez le moniteur pour obtenir l'accès à l’OSD Si vous appuyez sur un des boutons autre que le bouton d'alimentation, l'un des messages suivants apparaît selon l'entrée choisie : Entrée VGA/DVI-DSi l'entrée VGA ou DVI-D est sélectionnée et si les deux câbles VGA et DVI-D ne sont pas connectés, une boîte de dialogue fottante comme illustrée ci-dessous apparaît. ou Voir Solutions des problèmes pour plus d'informations.Réglage de la résolution maximale Pour régler le moniteur sur la résolution maximale: Sous Windows Vista® ou Windows® 7: 1. Faites un clic-droit sur le bureau et sélectionnez Personnalisation. 2. Cliquez sur Modifer les paramètres d’affchage. 3. Déplacez le curseur vers la droite en maintenant enfoncé le bouton gauche de la souris afn de régler la résolution de l’écran sur 1440 x 900. 4. Cliquez sur OK. Si vous ne voyez pas l'option 1440 x 900, vous avez peut-être besoin de mettre à jour votre pilote graphique. Selon votre ordinateur, menez à bien l'une des procédures suivantes : Si vous avez un ordinateur de bureau ou portable Dell : Allez sur le site support.dell.com, saisissez l'identifant de dépannage, et téléchargez le dernier pilote pour votre carte graphique. Si vous utilisez un ordinateur d'une marque autre que Dell (portable ou de bureau) : Allez sur le site de support de votre ordinateur et téléchargez les derniers pilotes graphiques. Allez sur le site de support de votre carte et téléchargez les derniers pilotes graphiques.Utiliser la Soundbar Dell La Soundbar Dell est un système deux voies stéréo qui peut se monter sur les écrans plats Dell. La Soundbar possède une molette de contrôle du volume et un contrôle Marche/Arrêt pour ajuster le niveau général du système, une diode bleue indiquant la mise sous tension et deux prises audio pour casque. 1. Mécanisme de fxation 2. Commande d'alimentation/volume 3. Connecteurs pour écouteurs 4. Témoin d'alimentationUtilisation de l'inclinaison Inclinaison Vous pouvez incliner le moniteur à l’angle d’affchage le plus confortable. REMARQUE : La base est détachée lorsque l'écran est livré depuis l'usine. Retour à la page de sommaireRetour à la Table des Matières Dépannage Guide de l’Utilisateur de l’Écran Large Dell™ IN1940MW Test-Auto Problèmes généraux Problèmes spécifques au produit Dell Soundbar Problems AVERTISSEMENT : Avant de débuter quelque procédure que ce soit de cette section, suivez les Consignes de sécurité. Test-Auto Votre écran dispose d’une fonction de test automatique qui vous permet de vérifer la fonctionnalité de votre écran. Pour exécuter le test automatique de votre moniteur, procédez comme suit : 1. Eteignez votre ordinateur et le moniteur. 2. Débranchez le câble vidéo à l'arrière de l'ordinateur. Afn de vous assurer du bon fonctionnement du test automatique, déconnectez le câble vidéo (VGA ou DVI-D) de l’arrière de l’ordinateur. 3. Rallumez le moniteur. 4. Une boîte de dialogue fottante apparaît à l’écran. REMARQUE :En fonction de l’entrée sélectionnée, une des boîtes de dialogue apparaît à l’écran. REMARQUE :La boîte de dialogue apparaîtra également si le câble vidéo est déconnecté ou endommagé. REMARQUE : Le témoin d’alimentation sur l’écran est blanc continu pendant le test automatique. L’écran entre en Mode d’économie d’énergie après 5 minutes s’il est laissé en mode de test automatique. ou 5. Éteignez votre écran et reconnectez le câble vidéo approprié. 6. Allumez votre ordinateur moniteur et l’écran.s REMARQUE : Si aucune vidéo n’apparaît sur votre écran après avoir effectué le test automatique, il pourrait y avoir un problème avec la carte graphique. Contactez le fabricant de votre ordinateur pour une assistance. Diagnostiques intégrés Votre moniteur a un outil de diagnostic intégré qui vous aide à déterminer si l’anomalie d’écran que vous avez est un problème inhérent avec votre moniteur, ou avec votre ordinateur et carte vidéo. Pour exécuter les diagnostics intégrés : 1. Assurez-vous que l'écran est propre (pas de particules de poussière sur la surface de l'écran). 2. Débranchez le câble vidéo à l'arrière de l'ordinateur ou du moniteur. Le moniteur alors va dans le mode test automatique. 3. Sur le panneau avant, appuyez et maintenez enfoncé les touches Touche de raccourci 1 et Touche de raccourci 4 du panneau avant, simultanément pendant 2 secondes. écran gris apparaît. 4. Examinez soigneusement l'écran pour des anomalies. 5. Appuyez de nouveau sur la touche Touche de raccourci 4 du panneau avant. La couleur de l'écran change à rouge. 6. Examinez l'écran pour des anomalies quelconques. 7. Répétez les étapes 5 et 6 pour inspecter l'écran avec les couleurs vert, bleu, noir et blanc et du texte. Le test est terminé quand l'écran blanc apparaît. Pour quitter, appuyez de nouveau sur la touche Touche de raccourci 4. REMARQUE : Si vous de détectez aucune anormalité de l’écran pendant les diagnostics intégrés, l’écran fonctionne normalement. Il pourrait y avoir un problème avec la carte graphique. Contactez le fabricant de votre ordinateur pour une assistance.Problèmes généraux Le tableau suivant contient des informations générales relatives aux problèmes courants du moniteur. SYMPTÔMES COURANTS QUE SE PASSE-T-IL SOLUTIONS POSSIBLES Pas de données vidéo/voyant d'alimentation éteint Pas d'image, moniteur « mort » Vérifez l'état de la connexion aux deux extrémités du câble vidéo. Vérifez le bon fonctionnement de la prise de courant murale en utilisant d'autres équipements électriques. Assurez-vous que le bouton d'alimentation est complètement enfoncé. Pas de données vidéo/voyant d'alimentation éteint Pas d'image ni de luminosité Augmentez les valeurs de luminosité et de contraste via le menu OSD. Effectuez la procédure de test automatique du moniteur. Recherchez d'éventuelles broches tordues ou endommagées sur le connecteur du câble vidéo. Presser le bouton 5 situé au dessus du bouton d'alimentation, s'assurer que la bonne source d'entrée est choisie via le bouton de Choix de source d'entrée. Exécutez le diagnostic intégré. Mise au point mauvaise L'image est foue, trouble, voilée Effectuez le réglage automatique via le menu OSD. Ajustez les valeurs de Phase et de Horloge pixel via le menu OSD. Supprimez les câbles d'extension vidéo. Réinitialisez le moniteur aux paramètres de l'usine. Diminuez la résolution vidéo au format correct (16:10). Vidéo tremblante/vacillante Image comportant des vagues ou un léger mouvement Effectuez le réglage automatique via le menu OSD. Ajustez les valeurs de Phase et de Horloge pixel via le menu OSD. Réinitialisez le moniteur aux paramètres de l'usine. Vérifez l'environnement du moniteur. Déplacez le moniteur et vérifez-le dans une autre pièce. Absence de pixels L'écran LCD comporte des points noirs Éteignez puis rallumez l'écran. Le pixels qui restent éteints en permanence sont un défaut naturel se produisant dans la technologie LCD. Pour plus d'informations sur la Qualité des moniteurs Dell et la Politique sur les pixels, voir le site de Support de Dell à l'adresse : support.dell.com. Pixels fxes L'écran LCD comporte des points noirs Éteignez-le, puis rallumez-le Il s'agit de pixels qui restent allumés en permanence, c'est un défaut naturel se produisant dans la technologie LCD Pour plus d'informations sur la Qualité des moniteurs Dell et la Politique sur les pixels, voir le site de Support de Dell à l'adresse : support.dell.com. Problèmes de luminosité Image trop terne ou trop lumineuse Réinitialisez le moniteur aux paramètres de l'usine.Effectuez le réglage automatique via le menu OSD. Réglez les valeurs de luminosité et de contraste via le menu OSD. Distorsion géométrique Image mal centrée Réinitialisez le moniteur aux paramètres de l'usine. Effectuez le réglage automatique via le menu OSD. Réglez les valeurs de luminosité et de contraste via le menu OSD. REMARQUE : Lors de l'utilisation de 'DVI-D', les réglages de la position ne sont pas disponibles. Lignes horizontales/verticales L'écran comporte une ou plusieurs ligne(s) Réinitialisez le moniteur aux paramètres de l'usine. Effectuez le réglage automatique via le menu OSD. Ajustez les valeurs de Phase et de Horloge pixel via le menu OSD. Effectuez la procédure de test automatique du moniteur pour déterminer si l'écran reste brouillé en mode de test automatique. Recherchez d'éventuelles broches tordues ou endommagées sur le connecteur du câble vidéo. REMARQUE : Lors de l'utilisation de 'DVI-D', les réglages du Horloge Pixel et Phase ne sont pas disponibles. Problèmes de synchronisation L'écran est brouillé ou semble déchiré Réinitialisez le moniteur aux paramètres de l'usine. Effectuez le réglage automatique via le menu OSD. Ajustez les valeurs de Phase et de Horloge pixel via le menu OSD. Effectuez la procédure de test automatique du moniteur pour déterminer si l'écran reste brouillé en mode de test automatique. Recherchez d'éventuelles broches tordues ou endommagées sur le connecteur du câble vidéo. Redémarrez l'ordinateur en mode sans échec. Problèmes relatifs à la sécurité Signes visibles de fumée ou d'étincelles N'effectuez aucune procédure de dépannage. Contacter Dell immédiatement. Problèmes intermittents Mauvais fonctionnement de la commande marche/arrêt Vérifez l'état de la connexion aux deux extrémités du câble vidéo. Réinitialisez le moniteur aux paramètres de l'usine. Effectuez la procédure de test automatique du moniteur pour déterminer si le problème intermittent se produit en mode de test automatique. Couleur absente Couleur absente de l'image Effectuez la procédure de test automatique du moniteur. Vérifez l'état de la connexion aux deux extrémités du câble vidéo. Recherchez d'éventuelles broches tordues ou endommagées sur le connecteur du câble vidéo.Mauvaise couleur La couleur de l'image est mauvaise Sélectionnez Utilisateur pour régler la couleur Réglez les valeurs R/V/B en mode Utilisateur Rémanence d'une image statique laissée sur le moniteur pendant une longue période de temps Légère ombre de l'affchage statique qui apparaît à l'écran Changez le Mode param. couleur dans le menu OSD Paramètres couleur sur Images ou Vidéo selon l'application. Essayez différents paramètres prédéfnis de couleur dans le menu OSD Paramètres couleur. Réglez la valeur R/V/B dans le menu OSD Paramètres couleur si la Gestion des couleurs est désactivée. Changez le Format couleur en entrée sur PC RVB ou YPbPr dans le menu OSD Paramètres avancés. Rétention d'image (À partir d'une image statique) Une ombre faible à partir d'une image statique apparaît sur l'écran Utiliser la fonctionnalité de gestion de l'alimentation pour éteindre le moniteur à tout moment quand vous ne l'utilisez pas (pour plus d'informations, voir Modes d'économie d'énergie). Vous pouvez également utiliser un écran de veille qui change dynamiquement. Problèmes spécifques au produit Symptômes spécifques Description du problème Solutions possibles L'image à l'écran est trop petite. L'image est centrée à l'écran mais n'occupe pas toute la zone de vision. Effectuer la réinitialisation du moniteur sur Réinitialisation usine. Impossible de régler le moniteur avec les boutons situés sur le panneau frontal. L'OSD n'apparaît pas à l'écran. Eteignez le moniteur, débranchez le cordon d'alimentation puis rebranchez-le et rallumez le moniteur. L'image ne remplit pas tout l'écran. L'image ne peut pas remplir la hauteur ou la largeur de l'écran En raison des différents formats vidéo (proportions) des DVD, le moniteur peut ne pas s'affcher en plein écran. Exécutez le diagnostic intégré. REMARQUE :Lorsque vous choisissez le mode DVI-D, la fonction Réglage auto n'est pas disponible. Problèmes liés à la Soundbar Dell™ Symptômes courants Description du problème Solutions possibles Aucun son du système de l'endroit où la Soundbar est alimentée par l'adaptateur secteur Pas d'alimentation à la Soundbar - le témoin d'alimentation est éteint. Faites tourner le bouton Alimentation/Volume sur la Soundbar dans le sens horaire à une position moyenne; vérifez si le témoin d'alimentation (LED Blanche) situé sur l'avant de la Soundbar est allumé. Assurez-vous que le câble d'alimentation de la Soundbar est branché dans l'adaptateur.Pas de son La Soundbar est alimentée - le témoin d'alimentation est allumé Branchez le câble d'entrée ligne audio dans la prise sortie audio de l'ordinateur. Réglez tous les contrôles du volume aux valeurs maximums et assurezvous que la fonction Muet n'est pas activée. Effectuez la lecture de quelques fchiers audio sur l'ordinateur (par exemple CD de musique, ou MP3). Faites tourner le bouton Alimentation/Volume de la Soundbar dans le sens horaire pour augmenter le volume. Nettoyez et rebranchez la fche entrée ligne audio. Testez la Soundbar en utilisant une autre source audio (par exemple : lecteur de CD portable, lecteur MP3). Son déformé La carte son de l'ordinateur est utilisée comme source audio Eliminez tous les obstacles séparant la Soundbar de l'utilisateur. Assurez-vous que la fche entrée ligne audio est complètement insérée dans la prise de la carte son. Réglez tous les contrôles du volume de Windows aux valeurs moyennes. Diminuez le volume de l'application audio. Faites tourner le bouton Alimentation/Volume de la Soundbar dans le sens anti-horaire pour baisser le volume. Nettoyez et rebranchez la fche entrée ligne audio. Effectuez un dépannage de la carte son de l'ordinateur. Testez la Soundbar en utilisant une autre source audio (par exemple lecteur de CD portable, lecteur MP3). Evitez d'utiliser un câble de rallonge audio ou un convertissement de prise audio. Son déformé Une autre source audio est utilisée Eliminez tous les obstacles séparant la Soundbar de l'utilisateur. Assurez-vous que la fche entrée ligne audio est complètement insérée dans la prise de la source audio. Diminuez le volume de la source audio. Faites tourner le bouton Alimentation/Volume de la Soundbar dans le sens anti-horaire pour baisser le volume. Nettoyez et rebranchez la fche entrée ligne audio. Sortie son déséquilibrée Sortie son provenant d'un seul côté de la Soundbar Eliminez tous les obstacles séparant la Soundbar de l'utilisateur. Assurez-vous que la fche entrée ligne audio est complètement insérée dans la prise de la carte son ou de la source audio. Réglez tous les contrôles de balance audio (G-D) de Windows à une valeur moyenne. Nettoyez et rebranchez la fche entrée ligne audio. Effectuez un dépannage de la carte son de l'ordinateur. Testez la Soundbar en utilisant une autre source audio (par exemple : lecteur de CD portable, lecteur MP3). Volume Bas Le volume est trop bas Eliminez tous les obstacles séparant la Soundbar de l'utilisateur. Faites tourner le bouton Alimentation/Volume de la Soundbar dans le sens horaire pour augmenter le volume au maximum. Réglez tous les contrôles du volume de Windows aux valeurs maximums. Augmentez le volume de l'application audio. Testez la Soundbar en utilisant une autre source audio (par exemple lecteur de CD portable, lecteur MP3). Retour à la Table des MatièresRetour à la Table des Matières Appendice Guide de l’Utilisateur de l’Écran Large Dell™ IN1940MW Consignes de Sécurité Déclaration de la FCC (Etats-Unis seulement) et autres informations règlementaires Contacter Dell AVERTISSEMENT: Consignes de Sécurité AVERTISSEMENT: Respectez les directives de sécurité indiquées ci-dessous pour votre sécurité et pour protéger votre ordinateur et votre environnement de travail contre tout dommage. Respectez les directives de sécurité indiquées ci-dessous pour votre Pour des informations sur les consignes de sécurité, consultez le Guide d’information sur le produit. Déclaration de la FCC (Etats-Unis seulement) et autres informations règlementaires Pour la déclaration de la FCC et les autres informations règlementaires, visitez le site Web suivant sur la conformité : http://www.dell.com/regulatory_compliance.Contacter Dell Pour les clients aux Etats-Unis, appelez le 800-WWW-DELL (800-999-3355). REMARQUE: Si vous n’avez pas de connexion Internet active, vous pouvez trouver l’information pour nous contacter sur votre facture d’achat, votre bordereau d’emballage, votre relevé ou le catalogue des produits Dell. Dell offre plusieurs options de services et d’assistance téléphonique et en ligne. Leur disponibilité est différente suivant les pays et les produits, et certains services peuvent ne pas vous être offerts dans votre région. Pour contacter Dell pour les ventes, l’assistance technique, ou les questions de service à la clientèle: 1. Consultez support.dell.com. 2. Vérifer votre pays ou région dans le menu déroulant Choisir un Pays /Région au bas de la page. 3. Cliquez sur Nous contacter sur la page à gauche. 4. Sélectionnez le lien adéquat du service ou de l’assistance requise. 5. Choisissez la méthode pour contacter Dell qui vous convient le mieux. Retour à la Table des MatièresRetour à la Table des Matières Installation de votre moniteur Guide de l’Utilisateur de l’Écran Large Dell™ IN1940MW Instructions importantes pour défnir la résolution d'affchage sur 1440 x 900 (Maximum) Pour obtenir des performances optimales avec les systèmes d'exploitation Microsoft Windows®, défnissez la résolution 1440 x 900 pixels en procédant comme suit : Dans Windows Vista® ou Windows® 7 : 1. Cliquez avec le bouton droit sur le bureau et sélectionnez Personnalisation. 2. Cliquez sur Modifer les paramètres d'affchage. 3. Déplacez le curseur vers la droite en appuyant sur le bouton gauche de la souris et en le maintenant enfoncé et sélectionnez la résolution d'écran 1440 x 900. 4. Cliquez sur OK. Si l'option 1440 x 900 n'apparaît pas, vous devez mettre à jour le pilote graphique. Ci-dessous, choisissez le scénario qui décrit le mieux l'ordinateur que vous utilisez et suivez les instructions fournies : 1: Si vous avez un ordinateur de bureau Dell™ ou un ordinateur portable Dell™ avec accès à Internet. 2: Si vous avez un ordinateur de bureau, portable ou une carte graphique non Dell™. Retour à la Table des MatièresRetour à la Table des Matières Installation de votre moniteur Guide de l’Utilisateur de l’Écran Large Dell™ IN1940MW Si vous avez un ordinateur de bureau Dell™ ou un ordinateur portable Dell™ avec accès à Internet 1. Allez sur http://support.dell.com, saisissez votre tag de service et téléchargez le dernier pilote pour votre carte graphique. 2. Après installation des pilotes pour votre Adaptateur Graphique, essayez de nouveau de confgurer la résolution sur 1440 x 900. REMARQUE: Si vous n'arrivez pas à confgurer la résolution sur 1440 x 900, veuillez contacter Dell™ pour demander un Adaptateur Graphique qui prend en charge ces résolutions. Retour à la Table des MatièresRetour à la Table des Matières Installation de votre moniteur Guide de l’Utilisateur de l’Écran Large Dell™ IN1940MW Si vous avez un ordinateur de bureau, portable ou une carte graphique non Dell™. Dans Windows Vista® ou Windows® 7 : 1. Cliquez avec le bouton droit sur le bureau et sélectionnez Personnalisation. 2. Cliquez sur Modifer les paramètres d'affchage. 3. Cliquez sur Paramètres avancés. 4. Identifez le fournisseur du contrôleur graphique dans la description située dans la partie supérieure de la fenêtre (ex. :. NVIDIA, ATI, Intel, etc.). 5. Reportez-vous au site Web du fournisseur de la carte graphique pour obtenir la dernière version du pilote (par exemple,http://www.ATI.com OU http://www.NVIDIA.com). 6. Après avoir installé le pilote de la carte graphique, défnissez de nouveau la résolution 1440 x 900. REMARQUE:Si vous n'y parvenez pas, contactez le fabricant de l'ordinateur ou achetez une carte graphique qui prend en charge la résolution 1440 x 900. Retour à la Table des Matières ALIENWARE® M17x MOBILE MANUALNotes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem. WARNING: A WARNING indicates a potential for property damage, personal injury, or death. This item incorporates copy protection technology that is protected by U.S. patents and other intellectual property rights of Rovi Corporation. Reverse engineering and disassembly are prohibited. __________________ The contents herein are subject to change without notice. © 2010-2012 Dell Inc. All rights reserved. Reproduction of these materials in any manner whatsoever without the prior written permission of Dell Inc. is strictly prohibited. Trademarks used in this manual: Alienware® , AlienFX® , and the AlienHead logo are trademarks or registered trademarks of Alienware Corporation; Dell™ is a trademark of Dell Inc.; Microsoft® , Windows® , and the Windows start button logo are either trademarks or registered trademarks of Microsoft Corporation in the United States and/or other countries; Intel® and SpeedStep® are registered trademarks and Core™ is a trademark of Intel Corporation in the U.S. and other countries; Blu‑ray Disc™ is a trademark of the Blu‑ray Disc Association; Bluetooth® is a registered trademark owned by Bluetooth SIG, Inc. Other trademarks and trade names may be used in this manual to refer to either the entities claiming the marks and names or their products. Dell Inc. disclaims any proprietary interest in trademarks and trade names other than its own. Regulatory model: P11E Regulatory type: P11E001 Rev. A01 January 20123 CHAPTER 1: SETTING UP YOUR LAPTOP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9 Before Setting Up Your Laptop . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10 Connect the AC Adapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Press the Power Button . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13 Connect the Network Cable (Optional) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14 Set Up Microsoft Windows . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15 Set Up WirelessHD (Optional) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16 Set Up Wireless Display (Optional) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 Connect to the Internet (Optional) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18 CHAPTER 2: GETTING TO KNOW YOUR LAPTOP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 Left View Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .22 Right View Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .25 Back View Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .27 Display Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 Computer Base and Keyboard Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 Status Lights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 Media Control Keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 CONTENTS4 CONTENTS Power Button . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 Function Keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 CHAPTER 3: USING YOUR LAPTOP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 Alienware Command Center . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 Connecting External Displays . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 Using Removable Media and Cards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 Using the Optical Drive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 Using the Integrated Camera . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46 Using the Wireless Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46 Battery Pack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .47 Power Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48 nVidia Optimus Technology (Optional) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50 Free Fall Sensor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .52 Configuring the BIOS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 CHAPTER 4: INSTALLING AND REPLACING COMPONENTS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .67 Before You Begin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68 Replacing the Battery Pack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .72 Upgrading or Replacing Memory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .74 Upgrading or Replacing the Hard Drive(s) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .785 CONTENTS CHAPTER 5: TROUBLESHOOTING . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85 Basic Hints and Tips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86 Backup and General Maintenance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .87 Software Diagnostic Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89 Answers to Common Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91 CHAPTER 6: SYSTEM RECOVERY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99 AlienRespawn . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100 My Dell Downloads . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .102 CHAPTER 7: SPECIFICATIONS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .103 APPENDIX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119 GENERAL AND ELECTRICAL SAFETY PRECAUTIONS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .120 CONTACTING ALIENWARE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12367 Dear Valued Alienware Customer, Welcome to the Alienware family. We are thrilled to include you among the growing number of savvy high‑performance computer users. The Alienware technicians who have crafted your machine have made certain that your highperformance system is properly optimized and performs to its fullest potential. We build machines with one single unwavering purpose: Build It As If It Were Your Own. The technicians will not rest until your new machine meets or exceeds our very demanding criteria! We have tested your machine extensively in order to ensure that you enjoy the highest levels of performance. In addition to a standard burn‑in period, your system has been evaluated using real‑world tools such as synthetic performance benchmarks. We invite you to share your experience with your new high‑performance computer with us, so please do not hesitate to either e-mail or call Alienware with any questions or concerns. The entire staff shares your enthusiasm for new technology and we hope that you enjoy using your new computer as much as Alienware enjoyed building it for you. Sincerely, Alienware Staff8CHAPTER 1: SETTING UP YOUR LAPTOP CHAPTER 1: SETTING UP YOUR LAPTOPCHAPTER 1: SETTING UP YOUR LAPTOP 10 Before Setting Up Your Laptop Congratulations on the purchase of your Alienware M17x! Read all safety and setup instructions before connecting your new laptop. Begin by carefully opening the box and removing all components that were shipped to you. Before setting up your laptop or components, see the included invoice to verify that all items ordered are present and be sure to inspect all items for any physical damage that may have occurred during shipment. Report any missing components or damaged items to customer service within 5 days of receiving the shipment. Anything reported missing or damaged after the first 5 days of receiving a shipment will not be honored. Some of the most common items to check for include: • Laptop and AC adapter with power cable • Microsoft CD‑key located at the bottom of the laptop • Monitor with power cable and video cable (if ordered) • Keyboard (if ordered) • Mouse (if ordered) • Multimedia speakers and sub‑woofer (if ordered) • Joystick controllers (if ordered) You may also need a small flathead and/or a Phillips head screwdriver for connecting peripheral cables to the laptop.CHAPTER 1: SETTING UP YOUR LAPTOP 11 Product Documentation and Media The documentation that ships with your Alienware laptop is designed to provide answers to many of the questions that may arise as you explore your new laptop’s capabilities. You may see the documentation for technical information or general use as needed to answer questions in the future, or aid you in finding answers and solutions. The media included with your laptop is referenced in some sections of the documentation and may be needed to complete certain tasks. As always, our technical support staff is available to assist you. Placing Your Laptop WARNING: Do not place the laptop near or over a radiator or heating vent. If your laptop is placed in a cabinet, ensure that adequate ventilation is provided. Do not place the laptop in a humid location or in any area where the laptop may be exposed to rain or water. Be careful not to spill liquid of any kind on or into the laptop. When placing your laptop, ensure that: • It is placed on a surface that is both level and stable. • The power and other cable connectors are not jammed between the laptop and a wall – or any other object. • Nothing obstructs airflow in front of, behind, or below the laptop. • The laptop has enough room so that optical drives and other external storage drives can be easily accessed.CHAPTER 1: SETTING UP YOUR LAPTOP 12 Connect the AC Adapter WARNING: The AC adapter works with electrical outlets worldwide. However, power connectors and power strips vary among countries. Using an incompatible cable or improperly connecting the cable to a power strip or electrical outlet may cause fire or equipment damage.CHAPTER 1: SETTING UP YOUR LAPTOP 13 Press the Power ButtonCHAPTER 1: SETTING UP YOUR LAPTOP 14 Connect the Network Cable (Optional)CHAPTER 1: SETTING UP YOUR LAPTOP 15 Set Up Microsoft Windows Your computer is preconfigured with the Microsoft Windows operating system. To set up Windows for the first time, follow the instructions on the screen. These steps are mandatory and may take some time to complete. The Windows setup screens will take you through several procedures including accepting license agreements, setting preferences, and setting up an Internet connection. CAUTION: Do not interrupt the operating system’s setup process. Doing so may render your computer unusable and you will need to reinstall the operating system. NOTE: For optimal performance of your computer, it is recommended that you download and install the latest BIOS and drivers for your computer available at support.dell.com. NOTE: For more information on the operating system and features, see support.dell.com/MyNewDell. NOTE: It is recommended that you create a full system backup as soon as you set up Microsoft Windows.CHAPTER 1: SETTING UP YOUR LAPTOP 16 Set Up WirelessHD (Optional) The WirelessHD feature allows you to share high-definition video from your computer display to a TV without the use of cables. To set up WirelessHD, use a WirelessHD kit. For instructions on setting up WirelessHD, see the document that shipped with your WirelessHD kit. NOTE: The WirelessHD kit does not ship with your computer and must be purchased separately. If your computer supports the WirelessHD feature, the WiHD Application Controller icon  will be available on the Windows desktop. NOTE: You may have to set up WirelessHD kit before you set up WirelessHD. For more information on setting up the WirelessHD kit, see the document that shipped with the WirelessHD kit. To set up WirelessHD: 1. Turn on your computer. 2. Ensure that wireless is enabled on your computer. 3. Double‑click the WiHD Application Controller icon on the desktop. The WirelessHD Application Controller window appears. 4. Follow the instructions on screen.CHAPTER 1: SETTING UP YOUR LAPTOP 17 Set Up Wireless Display (Optional) NOTE: The wireless display feature may not be supported on all computers. For information about the hardware and software requirements for setting up wireless display, see www.intel.com. NOTE: The wireless display feature is available on your computer only if you ordered an Intel Wi‑Fi WLAN card and nVidia graphics card with Optimus technology or AMD Radeon graphics card at the time of purchase. NOTE: It is recommended to use WirelessHD instead of wireless display for graphic-intense applications such as high-definition gaming. For more information, see “Set Up WirelessHD (Optional)” on page 16. The Intel wireless display feature allows you to share your computer display to a TV without the use of cables. You must connect a wireless display adapter to your TV before setting up wireless display. NOTE: The wireless display adapter does not ship with your computer and must be purchased separately. NOTE: For information on setting up the wireless display, see the document that shipped with the wireless display adapter.CHAPTER 1: SETTING UP YOUR LAPTOP 18 Connect to the Internet (Optional) Setting Up a Wired Connection • If you are using a dial‑up connection, connect the telephone line to the optional external USB modem and to the telephone wall jack before you set up your Internet connection. • If you are using a DSL or cable/satellite modem connection, contact your ISP or cellular telephone service for setup instructions. To complete setting up your wired Internet connection, follow the instructions in “Setting Up Your Internet Connection” on page 20.CHAPTER 1: SETTING UP YOUR LAPTOP 19 Setting Up a Wireless Connection NOTE: To set up your wireless router, see  the documentation that shipped with your router. Before you can use your wireless Internet connection, you need to connect to your wireless router. To set up your connection to a wireless router: 1. Ensure that wireless is enabled on your computer. 2. Save and close any open files, and exit any open programs. 3. Click Start → Control Panel. 4. In the search box, type network, and then click Network and Sharing Center→ Connect to a network. 5. Follow the instructions on the screen to complete the setup.CHAPTER 1: SETTING UP YOUR LAPTOP 20 Setting Up Your Internet Connection ISPs and ISP offerings vary by country. Contact your ISP for offerings available in your country. If you cannot connect to the Internet but have successfully connected in the past, the Internet Service Provider (ISP) might have a service outage. Contact your ISP to check the service status, or try connecting again later. Have your ISP information ready. If you do not have an ISP, the Connect to the Internet wizard can help you get one. 1. Save and close any open files, and exit any open programs. 2. Click Start → Control Panel. 3. In the search box, type network, and then click Network and Sharing Center→ Set up a new connection or Network→ Connect to the Internet. The Connect to the Internet window appears. NOTE: If you do not know which type of connection to select, click Help me choose or contact your ISP. 4. Follow the instructions on the screen and use the setup information provided by your ISP to complete the setup. CHAPTER 2: GETTING TO KNOW YOUR LAPTOP CHAPTER 2: GETTING TO KNOW YOUR LAPTOPCHAPTER 2: GETTING TO KNOW YOUR LAPTOP 22 This chapter provides information about your new laptop to familiarize you with its various features, and get you up and running quickly. Left View Features 1 2 3 4 5 6 7 8 9CHAPTER 2: GETTING TO KNOW YOUR LAPTOP 23 1 Security cable slot — Attaches a commercially available security cable to the computer. NOTE: Before you buy a security cable, ensure that it fits into the security cable slot on your computer. 2 Network connector — Connects your computer to a network or broadband device. 3 VGA connector — Connects your computer to a monitor or projector. 4 HDMI-output connector — Connects to a TV for both multi‑channel digital audio and video signals. NOTE: For a monitor without built‑in speakers, only the video signal will be read. 5 Mini-DisplayPort connector — Connects your computer to external DisplayPort monitors and projectors. NOTE: The mini-DisplayPort connector also connects to a VGA connector through an optional mini-DisplayPort adapter. You can purchase the VGA cable and the mini-DisplayPort adapter at www.dell.com.CHAPTER 2: GETTING TO KNOW YOUR LAPTOP 24 6 USB 3.0 connectors (2) — Provide faster data transmission between your computer and USB devices. 7 Audio-out/Headphone/S/PDIF connector — Connects to amplifiers, speakers, or TVs for digital audio output. Can also be used to connect to a pair of headphones, powered speakers, or sound system. NOTE: Use the S/PDIF adapter that shipped with your computer, to connect a TOSLINK optical cable. 8 Microphone connector — Connects to a microphone or inputs signal for use with audio programs. 9 Headphone connectors (2) — Connect to a pair of headphones or to a powered speaker or sound system.CHAPTER 2: GETTING TO KNOW YOUR LAPTOP 25 Right View Features 1 2 3 4 5 1 Optical drive — Plays or records only standard-size (12 cm) CDs, DVDs, and Blu-ray Discs (optional). Ensure that the side with print or writing is facing upward when inserting discs. For more information, see “Using the Optical Drive“ on page 45. 2 9-in-1 Media Card Reader — Provides a fast and convenient way to view and share digital photos, music, videos, and documents. 3 USB 2.0 connectors (2) — Connect to USB devices, such as a mouse, keyboard, printer, external drive, or MP3 player.CHAPTER 2: GETTING TO KNOW YOUR LAPTOP 26 4 eSATA/USB combo connector with USB PowerShare — Connects to eSATA compatible storage devices (such as external hard drives or optical drives) or USB devices (such as a mouse, keyboard, printer, external drive, or MP3 player). The USB Powershare feature allows you to charge USB devices when the computer is powered on/off or in sleep state. NOTE: Certain USB devices may not charge when the computer is powered off or in sleep state. In such cases, turn on the computer to charge the device. NOTE: You can enable or disable the option of charging the USB devices when the computer is powered off or in sleep mode through the BIOS settings. NOTE: If you turn off your computer while charging a USB device, the device stops charging. To continue charging, disconnect the USB device and connect it again. NOTE: The USB PowerShare is automatically shut off when only 10% of the total battery life remains. 5 HDMI-input connector — Connects to the HDMI‑output connector on your video device such as a DVD player, camcorder, or gaming device. NOTE: The HDMI-input connector works only when the computer is on.CHAPTER 2: GETTING TO KNOW YOUR LAPTOP 27 Back View Features 1 1 AC adapter connector — Connects to an AC adapter to power the computer and charge the battery.CHAPTER 2: GETTING TO KNOW YOUR LAPTOP 28 Display Features 1 2 3 4 5CHAPTER 2: GETTING TO KNOW YOUR LAPTOP 29 1 Left digital-array microphone — Combines with the right digital‑array microphone to provide high quality sound for video chatting and voice recording. 2 Camera activity indicator — Indicates if the camera is on or off. A solid blue light indicates camera activity. 3 Camera — Built‑in camera for video capture, conferencing, and chat. 4 Right digital-array microphone — Combines with the left digital‑array microphone to provide high quality sound for video chatting and voice recording. 5 Display — Your display can vary based on selections you made when purchasing your computer. Your computer may support 3D display if you selected this option at the time of purchase. NOTE: If you experience discomfort while viewing 3D display, stop viewing the display, remove your 3D glasses, and take rest.CHAPTER 2: GETTING TO KNOW YOUR LAPTOP 30 Computer Base and Keyboard Features 1 2 3 4 5 6CHAPTER 2: GETTING TO KNOW YOUR LAPTOP 31 1 Status lights (3) — Indicate if the Scroll Lock, Caps Lock, or Number Lock lights are turned on or off. For more information, see “Status Lights” on page 32. 2 Keyboard — The backlit keyboard provides visibility in dark environments by illuminating all symbols on the keys. 3 Touch pad buttons (2) — Provide left-click and right-click functions like those on a mouse. 4 Touch pad — Provides the functionality of a mouse to move the cursor, drag or move selected items, and left‑click by tapping the surface. 5 Media control keys (9) — Press the keys to perform the associated action. For more information, see “Media Control Keys” on page 33. 6 Power button — Turns the computer on or off when pressed. For more information, see “Power Button” on page 34. CHAPTER 2: GETTING TO KNOW YOUR LAPTOP 32 Status Lights The three status lights are located at the top-left side of the keyboard. For the exact location, see “Computer Base and Keyboard Features” on page 30. Scroll Lock Light Turns on when the scroll lock option is on. Caps Lock Light Turns on when the keyboard is in Caps Lock mode. In this mode, all characters you type are in uppercase. Number Lock Light Turns on when the keyboard is in Num Lock mode. In this mode, the embedded numeric keypads can be used.CHAPTER 2: GETTING TO KNOW YOUR LAPTOP 33 Media Control Keys The media control keys are located at the top-right side of the keyboard. For the exact location, see “Computer Base and Keyboard Features” on page 30. To activate, press the desired keys. The keys will illuminate temporarily to confirm your selection. Decrease volume Increase volume Mute the sound Rewind or Play previous track Play or Pause Fast Forward or Play next track Eject Wireless Control - Switch wireless communications on/off (for more information, see “Using the Wireless Control” on page 46) Alienware Command Center (for more information, see “Alienware Command Center” on page 40)CHAPTER 2: GETTING TO KNOW YOUR LAPTOP 34 Power Button You can program this button to perform actions like shutting down the operating system or entering the standby mode. For details on how to program this button, see Power Options in the control panel of Microsoft Windows operating system. The power button is located in the center of the hinge cover. For the exact location, see “Computer Base and Keyboard Features” on page 30. The color of the AlienHead rim indicates the power status. The color indicating the power status can be changed using the AlienFX software.CHAPTER 2: GETTING TO KNOW YOUR LAPTOP 35 On AC adapter: Blue or custom AC‑color The battery is fully charged. Blue or custom AC‑color fading into amber or custom battery‑color The computer is turned off or on and the battery is charging. Blue or custom AC‑color fading into black The computer is in standby mode. On battery: Amber or custom battery‑color The battery is fully charged. Amber or custom battery‑color fading into black The computer is in standby mode. Blinking Amber or custom battery‑ color The battery charge is low. For more details on standby and hibernate mode, see Power Options in the control panel of your Microsoft Windows operating system.CHAPTER 2: GETTING TO KNOW YOUR LAPTOP 36 Function Keys NOTE: Depending on the configuration of the laptop you purchased, some of the function keys may have no associated tasks. The key is located at the bottom-left corner of the keyboard, and is used together with other keys to activate certain functions. Hold down the key along with the key described below: FI – Suspend Mode Press to enable suspend mode. In the suspend mode, the display and selected devices will switch off for less energy consumption. F2 — Check Battery Status Press to display the Battery Status Meter. F3 – Mute on/off Press to enable or disable the mute function. F4 – Increase Display Brightness Press to increase the brightness of the display.CHAPTER 2: GETTING TO KNOW YOUR LAPTOP 37 F5 – Decrease Display Brightness Press to decrease the brightness of the display. F6 – Display Mode Press to switch between clone mode and extended desktop mode, when an external display is connected. F7 – Switchable Graphics Toggle Press to switch between integrated and discrete graphics option. F8 – External HDMI Input Toggle Press to switch between external HDMI input source. F9 – Camera on/off Press to switch off or switch on the camera. F10 – Microsoft Mobility Center on/off Press to launch or close the Microsoft Mobility Center application.CHAPTER 2: GETTING TO KNOW YOUR LAPTOP 38 F11 – AlienFX on/off Press to enable or disable the AlienFX illumination. F12 – Touch Pad on/off Press to enable or disable the touch pad function and the illumination around the touch pad. When the touch pad function is switched off, the touch pad can still work temporarily for three to five seconds while the computer reboots into the Windows operating system, or resumes from standby or hibernate mode.CHAPTER 3: USING YOUR LAPTOP CHAPTER 3: USING YOUR LAPTOPCHAPTER 3: USING YOUR LAPTOP 40 Alienware Command Center The Alienware Command Center gives you access to Alienware’s exclusive software and is a continuously upgradable control panel. As Alienware releases new programs, they download directly into the Command Center allowing you to build a library of system management, optimization, and customization tools. You can access Alienware Command Center by pressing on the media control keys. See “Media Control Keys” on page 33. Connecting External Displays If you want to enjoy your computing environment on a bigger scale visually, or extend your desktop area, you can connect an external display such as a standalone monitor, an LCD TV, or a projector. Connecting a Display Use the appropriate cable based on the connectors available on your computer and display. Refer to the following table to identify the connectors on your computer and display. NOTE: When connecting to a single display, connect the display to ONLY ONE of the connectors on your computer.CHAPTER 3: USING YOUR LAPTOP 41 Connection Type Computer Cable Display VGA‑to‑VGA (VGA cable) HDMI‑to‑HDMI (HDMI cable) Mini-DisplayPortto-DisplayPort (Mini-DisplayPortto-DisplayPort adapter + DisplayPort Cable) Mini-DisplayPortto‑DVI (Mini‑ DisplayPort-to-DVI adapter + DVI cable)CHAPTER 3: USING YOUR LAPTOP 42 NOTE: You can purchase the mini-DisplayPort-to-DisplayPort and mini-DisplayPort-to-DVI adapters at www.dell.com. 1. Turn off your laptop. 2. Turn off the display and disconnect it from the power supply. 3. Connect one end of the display cable to the VGA, mini-DisplayPort, or HDMI connector on your Alienware laptop. 4. Connect the other end of the cable to the same connector on your display. 5. If necessary, connect one end of the power cable to the display’s power connector. 6. Connect the other end of the power cable to a grounded three‑prong power strip or wall outlet. 7. Turn on your laptop, and then turn on your display.CHAPTER 3: USING YOUR LAPTOP 43 Extending the Desktop 1. With the external display connected, right‑click on the desktop and select Personalize. 2. Select Connect to a projector or other external display in the upper left portion of the screen. 3. Click Connect Display. 4. Select from the below options that appear on the screen: • Duplicate my display on all displays (mirrored) • Show different parts of my desktop on each display (extended) • Show my desktop on the external display only 5. Click Apply to apply your changes and then click OK to exit the Display Settings control panel.CHAPTER 3: USING YOUR LAPTOP 44 Using Removable Media and Cards Observe the safety measures below: CAUTION: Inserting a blank card upside down may damage your laptop. When no Media Card is inserted into the Media Card slot, ensure that the blank card that shipped with your laptop is inserted in the unused slot. The blank card protects the unused slot from dust and other particles. When inserting a blank card, ensure that the correct side is on the top (indicated by an arrow mark on some blank cards). For information on the media cards supported, see “Specifications” on page 103.CHAPTER 3: USING YOUR LAPTOP 45 Using the Optical Drive Your laptop has a slot load optical drive. Depending on the configuration ordered, your laptop may have one of the following drive types. These logos are used to indicate each drive’s capabilities and media compatibility. DVD±R/W DVD±R/W drive can read CD‑ROM, CD‑R, CD‑R/W, DVD, DVD+R/W, and DVD‑R/W media. Blu‑ray Disc Combo/Triple Layer (optional) Blu‑ray drive can read CD‑ROM, CD‑R, CD‑R/W, DVD, DVD+R/W, DVD‑R/W, DVD+R, BD‑ROM media. It can also record to CD‑R, CD‑R/W, DVD+R/W, DVD‑R/W, DVD+R media.CHAPTER 3: USING YOUR LAPTOP 46 Using the Integrated Camera FastAccess Facial Recognition Your computer may have the FastAccess facial recognition feature. This feature helps keep your Alienware computer secure by using the unique appearance of your face to verify your identity and automatically supply login information that you would normally enter manually, such as a user ID and password for a Windows account or a secure web site. For more information, click Start → Programs→ FastAccess. Turning the Camera On and Off Press the key combination to switch on or switch off the camera. After switching on the camera, you need to activate its function through the Microsoft Windows operating system. In addition, you can also use Windows Movie Maker to create, edit, and share videos. Using the Wireless Control The wireless control allows you to quickly turn all of your wireless radios (Bluetooth, WLAN, and WWAN) off, such as when you are asked to disable all wireless radios on an airplane flight. Press on the media control keys to turn on all radios. Press again to return your wireless radios to their respective states they were in before you pressed the wireless key the first time.CHAPTER 3: USING YOUR LAPTOP 47 Battery Pack Your laptop is equipped with a high‑energy rechargeable lithium ion (Li‑ion) battery pack. Battery life will vary depending on your laptop configuration, model, applications installed, power management settings, and features used. As with all batteries, the maximum capacity of this battery will decrease with time and usage. The battery meter lights on the battery pack indicate the charge level of the battery. When you press the battery meter once, the charge level lights illuminate. Each of the five lights represent approximately 20% of the total battery charge. For example, if four lights turn on, there is 80% of battery charge remaining and if no lights turn on, there is no charge remaining in the battery. 1 Battery Meter 1CHAPTER 3: USING YOUR LAPTOP 48 Power Management Understanding Power Consumption In order to fully utilize the power of your battery, it would be a good idea for you to spend some time acquiring a basic understanding of the power management concept from your operating system. You can use the power options in your operating system to configure the power settings on your computer. The Microsoft Windows operating system installed on your computer provides three default options: • Balanced — Offers full performance when you need it and saves power during periods of inactivity. • Power Saver — Saves power on your computer by reducing system performance to maximize the life of the computer and by reducing the amount of energy consumed by your computer over its lifetime. • High Performance — Provides the highest level of system performance on your computer by adapting processor speed to your activity and by maximizing system performance.CHAPTER 3: USING YOUR LAPTOP 49 Customizing Your Power Settings 1. Click Start → Control Panel. 2. Click All Control Panel Items. 3. Double‑click the Power Options icon. 4. Select a power plan from the options shown. To customize specific settings, click Change plan settings next to the selected power plan. Reducing Power Consumption Although your laptop (together with the operating system) is capable of power conservation, there are measures you can take to reduce the power consumption: • Lower the intensity of the display backlight. A very bright screen translates to higher power usage. • Use the Go Dark option in the Alienware Command Center.CHAPTER 3: USING YOUR LAPTOP 50 nVidia Optimus Technology (Optional) NOTE: The nVidia optimus technology is not supported on computers that use nVidia 3D vision. Your Alienware M17x laptop is equipped with the nVidia Optimus technology. The Optimus technology is designed to maximize performance and user experience on your computer, while minimizing the impact on battery life. It enables you to combine the graphic processing capability of the integrated Intel graphic processing unit (GPU) with the discrete nVidia GPUv while running graphic-intensive applications such as 3-D games. The nVidia GPU is turned on only for preset applications and thus extends the battery life. The Optimus technology is enabled through an application profile. When an application is launched, the video drivers check to see if the application has a profile associated with it. • If an application profile exists, the nVidia GPU is turned on and the application runs in performance mode. The nVidia GPU is turned off automatically when the application is closed. • If an application profile does not exist, the integrated Intel GPU is used. The default list of application profiles is updated frequently by nVidia and is automatically downloaded to your computer when you are connected to the Internet.CHAPTER 3: USING YOUR LAPTOP 51 You can also create application profiles for any application on your computer. This may be required for newly released games or applications that do not have a default application profile. Changing the Application Profile Settings 1. Right‑click on the desktop and select NVIDIA Control Panel. 2. In the NVIDIA Control Panel window, click 3D Settings to expand the selection (if not already expanded) and then click Manage 3D Settings. 3. In the Program Settings tab, click Add and browse to select the application’s executable file (.exe). Once added, you can change the settings for that application. To change the settings for a specific application, locate the application in the Select a program to customize: list and make the desired changes. NOTE: For more information on the nVidia control panel options and settings, click Help.CHAPTER 3: USING YOUR LAPTOP 52 Free Fall Sensor Free fall sensor protects your computer hard drive from possible damage, by detecting a free fall state caused by accidentally dropping the computer. When a free fall state is detected, the hard drive is placed in a safe state to protect against damage to the read/write head and possible data loss. Your hard drive returns to normal operation, when the free fall state is no longer detected.CHAPTER 3: USING YOUR LAPTOP 53 Configuring the BIOS System Setup The System Setup options allow you to: • Change the system configuration information after you add, change, or remove any hardware in your laptop. • Set or change a user‑selectable option. • View the installed amount of memory or set the type of hard drive installed. Before you use System Setup, it is recommended that you write down the current System Setup information for future reference. CAUTION: Do not change the settings in System Setup unless you are an expert computer user. Certain changes can cause your computer to work incorrectly.CHAPTER 3: USING YOUR LAPTOP 54 Entering System Setup 1. Turn on (or restart) your laptop. NOTE: Keyboard failure may result when a key on the keyboard is held down for extended periods of time. To avoid possible keyboard failure, press and release in even intervals until the System Setup screen appears. 2. While the laptop is booting, press immediately before the operating system logo appears to access the BIOS Setup Utility. If an error occurs during Power On Self Test (POST), you may also enter the BIOS Setup Utility by pressing when prompted. NOTE: If you wait too long and the operating system logo appears, continue to wait until you see the Microsoft Windows desktop, then shut down your laptop and try again. System Setup Screens The BIOS Setup Utility window displays current or changeable configuration information for your laptop. Information is divided into five menus: Main, Advanced, Security, Boot, and Exit. Key functions appear at the bottom of the BIOS Setup Utility window and lists keys and their functions within the active field.CHAPTER 3: USING YOUR LAPTOP 55 System Setup Options NOTE: Depending on your computer and installed devices, the items listed in this section may not appear, or may not appear exactly as listed. NOTE: For the updated system setup information, see the Service Manual at support.dell.com/manuals. Main Menu System Time (hh:mm:ss) Displays the system time. System Date (mm/dd/yyyy) Displays the system date. Alienware Displays the model number of your computer. Service Tag Displays the service tag of your computer. BIOS Version Displays the BIOS version. EC Version Displays the EC firmware version. ME Version Displays the Intel ME firmware version. Sandy Bridge Version Displays the Sandy Bridge version.CHAPTER 3: USING YOUR LAPTOP 56 Main Menu CPU Displays the type of processor installed. CPU Frequency Displays the speed of the processor. CPU L3 Cache Displays the processor cache size. CPUID Displays the ID of the processor. Integrated Graphics Displays the integrated graphics. Discrete Graphics 1 Displays the primary discrete graphics. Discrete Graphics 2 Displays the secondary discrete graphics. Total Memory Displays the total memory available in your computer. Memory Bank 0 Displays the memory size installed in DIMM 0. Memory Bank 1 Displays the memory size installed in DIMM 1. SATA Hard Drive Displays the installed SATA hard drive model.CHAPTER 3: USING YOUR LAPTOP 57 Advanced Menu Intel SpeedStep Allows you to enable or disable the Intel SpeedStep technology. Disabling this feature may improve performance, but will greatly reduce battery life. Virtualization Allows you to enable or disable the Intel Virtualization technology. USB Emulation Allows you to enable or disable the USB emulation feature. This feature defines how the BIOS, in the absence of a USB-aware operating system, handles USB devices. USB emulation is always enabled during POST. NOTE: You cannot boot any type of USB device (floppy, hard drive, or memory key) when this option is off. USB Wake Support Allows you to enable USB devices to wake the computer from standby or to disable the USB wake support feature. NOTE: If USB Powershare is enabled, a device connected to the USB Powershare connector may not wake the computer.CHAPTER 3: USING YOUR LAPTOP 58 Advanced Menu USB Power Share Allows you to charge USB devices when the computer is turned off or in standby mode. • AC Only: Charge USB devices when connected to AC adapter only. • AC and Battery: Charge USB devices when connected to AC adapter and when the computer is running on battery. • Disabled: Disables USB PowerShare. Integrated Network Allows you to enable or disable the on‑board LAN controller. • Disabled: Internal LAN is disabled and is not visible to the operating system. • Enabled: Internal LAN is enabled. High Definition Audio Allows you to enable or disable the internal high definition audio device. • Disabled: The internal audio device is disabled and is not visible to the operating system. • Enabled: The internal audio device is enabled. SD Card Reader Allows you to enable or disable the internal SD card reader.CHAPTER 3: USING YOUR LAPTOP 59 Advanced Menu CPU Turbo Mode Allows you to enable or disable the Intel CPU turbo mode performance option. Performance Menu Allows you to configure fields in the Performance Options sub-menu (for more information, see “Performance Options Sub‑Menu“ on page 60). Extended ICC Allows you to configure fields in the Extended ICC sub-menu (for more information, see “Extended ICC Sub‑Menu“ on page 62). SATA Operation Allows you to configure the operating mode of the integrated SATA hard drive controller. • AHCI: SATA is configured for AHCI mode. • RAID: STAT is configured for RAID mode. SATA HARD DRIVE 1 Displays the installed primary SATA hard drive model. SATA HARD DRIVE 2 Displays the installed secondary SATA hard drive model.CHAPTER 3: USING YOUR LAPTOP 60 Advanced Menu Adapter Warnings Allows you to choose if the computer should display warning messages when you use AC adapters that are not supported by your computer. • Disabled: BIOS will not detect unsupported AC adapters and will not display any message to screen. • Enabled : BIOS will detect unsupported AC adapters and display an error to screen. Charger Behavior Allows you to enable or disable battery charging. Primary Display Allows you to choose a primary display. Performance Options Sub-Menu Overclocking Feature Allows you to enable or disable the global overclocking feature. • Disabled: The overclocking feature is disabled. • Enabled: Displays additional overclocking options. Processor Overclocking Allows you to enable or disable the processor overclocking feature.CHAPTER 3: USING YOUR LAPTOP 61 Performance Options Sub-Menu Override Turbo settings Allows you to override CPU turbo mode settings. Long Duration Power Limit Allows you to set the turbo mode power limit 1 value in watts. Long Duration Time Window Allows you to set the turbo mode time 1 value in seconds. Set Short Duration Power Limit Allows you to enable or disable short duration power limit. Short Duration Power Limit Options Allows you to set the turbo mode power limit 2 value in watts. Memory Overclocking Memory Override Support Allows you to enable or disable the memory override option support. • Disabled: The memory override support is disabled. • Enabled: Displays additional memory override support options. Memory Voltage Allows you to increase memory voltage.CHAPTER 3: USING YOUR LAPTOP 62 Performance Options Sub-Menu Memory Frequency Allows you to set memory frequency. XMP DIMM Profile Allows you to configure different XMP options. Extended ICC Sub-Menu Use Watchdog Timer for ICC Allows you to enable or disable the watchdog timer. Turn off unused PCI/PCIe clocks Allows you to enable or disable the PCI/PCIe clocks. • Disabled: All PCI/PCIe clocks are on. • Enabled: Empty PCI/PCIe clocks disabled. Lock ICC Registers Allows you to lock either static registers or all registers. Clock_DIV-1S Displays the clock settings for the Div‑1S devices. Clock_DIV-2S Displays the clock settings for the Div‑2S devices. Clock_DIV-3 Displays the clock settings for the Div-3 devices. Clock_DIV-4 Displays the clock settings for the Div‑4 devices. Clock_DIV-1NS Displays the clock settings for the Div‑1NS devices. Clock_DIV-2NS Displays the clock settings for the Div‑2NS devices.CHAPTER 3: USING YOUR LAPTOP 63 Wireless Menu Bluetooth Allows you to enable or disable the internal Bluetooth device. • Disabled: The internal Bluetooth device is disabled and is not visible to the operating system. • Enabled: The internal Bluetooth device is enabled. Wireless Network Allows you to enable or disable the internal wireless device. • Disabled: The internal wireless device is disabled and is not visible to the operating system. • Enabled: The internal wireless device is enabled. DGX Allows you to enable or disable the internal DGX device. Wireless Switch/ Hotkey Allows you to disable all internal wireless devices. Security Menu Supervisor Password Displays if the supervisor password is clear or set. User Password Displays if the user password is clear or set.CHAPTER 3: USING YOUR LAPTOP 64 Security Menu Set Service Tag Displays the service tag of the computer when the service tag is present. Displays a field to input the service tag manually when the service tag is absent. Set Supervisor Password Allows you to set the supervisor password. The supervisor password controls access to the system setup utility. Set User Password Allows you to set the user password. The user password controls access to the computer at boot. Computrace Allows you to enable or disable Computrace security feature. Boot Menu Use the up or down arrow keys to change the boot device priority. You can choose from: • Hard Drive • USB Storage • CD/DVD/BD • Removal Devices • NetworkCHAPTER 3: USING YOUR LAPTOP 65 Exit Menu Exit Saving Changes Allows you to exit System Setup and save your changes to CMOS. Save Change Without Exit Allows you remain in System Setup and save your changes to CMOS. Exit Discarding Changes Allows you to exit System Setup and load previous values from CMOS for all Setup items. Load Optimal Defaults Allows you to load default values for all Setup items. Discard Changes Allows you to load previous values from CMOS for all Setup items.CHAPTER 3: USING YOUR LAPTOP 66CHAPTER 4: INSTALLING AND REPLACING COMPONENTS CHAPTER 4: INSTALLING AND REPLACING COMPONENTSCHAPTER 4: INSTALLING AND REPLACING COMPONENTS 68 This chapter provides guidelines and instructions for increasing the processing power and storage space, by upgrading equipment. You can purchase components for your computer at www.dell.com or www.alienware.com. NOTE: See the Service Manual at support.dell.com/manuals for installation instructions of all serviceable components. Parts purchased from Dell and Alienware will ship with specific replacement instructions. Before You Begin This section provides procedures for removing and installing the components in your laptop. Unless otherwise noted, each procedure assumes that the following conditions exist: • You have performed the steps in “Turning Off Your Computer” and “Before Working Inside Your Computer” in this section. • You have read the safety information that shipped with your computer. • A component can be replaced or—if purchased separately—installed by performing the removal procedure in reverse order. The procedures in this section may require the following tools: • Small flat-blade screwdriver • Phillips screwdriverCHAPTER 4: INSTALLING AND REPLACING COMPONENTS 69 Turning Off Your Computer CAUTION: To avoid losing data, save and close all open files and exit all open programs before you turn off your laptop. 1. Save and close all open files and exit all open programs. 2. Click Start → Shut Down. The laptop turns off after the operating system shutdown process finishes. 3. Ensure that the computer and any attached devices are turned off. If your computer and attached devices did not automatically turn off when you shut down your operating system, press and hold the power button for at least 8 to 10 seconds until the computer turns off.CHAPTER 4: INSTALLING AND REPLACING COMPONENTS 70 Before Working Inside Your Computer Use the following safety guidelines to help protect your computer from potential damage and to help to ensure your own personal safety. WARNING: Before working inside your laptop, read the safety information that shipped with your computer. For additional safety best practices information, see the Regulatory Compliance Homepage at www.dell.com/regulatory_compliance. CAUTION: Handle components and cards with care. Do not touch the components or contacts on a card. Hold a card by its edges. Hold a component such as a processor by its edges, not by its pins. CAUTION: Only a certified service technician should perform repairs on your computer. Damage due to servicing that is not authorized by Dell is not covered by your warranty. CAUTION: To avoid electrostatic discharge, ground yourself by using a wrist grounding strap or by periodically touching an unpainted metal surface (such as a connector on the back of the computer). CAUTION: When you disconnect a cable, pull on its connector or on its pull-tab, not on the cable itself. Some cables have connectors with locking tabs; if you are disconnecting this type of cable, press in on the locking tabs before you disconnect the cable. As you pull connectors apart, keep them evenly aligned to avoid bending any connector pins. Also, before you connect a cable, ensure that both connectors are correctly oriented and aligned. CHAPTER 4: INSTALLING AND REPLACING COMPONENTS 71 CAUTION: To avoid damaging the computer, perform the following steps before you begin working inside the computer. 1. Ensure that the work surface is flat and clean to prevent the computer cover from being scratched. 2. Turn off your computer (for more information, see “Turning Off Your Computer” on page 69). CAUTION: To disconnect a network cable, first unplug the cable from your computer and then unplug the cable from the network device. 3. Disconnect all telephone or network cables from the laptop. 4. Press and eject any installed cards from the Media Card Reader. 5. Disconnect your computer and all attached devices from their electrical outlets. CAUTION: To help prevent damage to the system board, you must remove the battery from the battery bay before you service the laptop. 6. Remove the battery from the battery bay (for more information, see “Replacing the Battery Pack” on page 72). 7. Press the power button to ground the system board.CHAPTER 4: INSTALLING AND REPLACING COMPONENTS 72 Replacing the Battery Pack This battery pack can easily be removed and replaced. Ensure that the laptop is properly shut down before changing the battery pack. CAUTION: To avoid damage to the laptop, use only the battery designed for this particular Alienware laptop. Do not use batteries designed for other Alienware or Dell laptops. To remove the battery pack: 1. Follow the instructions in “Before You Begin” on page 68. 2. Shut down the laptop. 3. Turn the laptop over. 4. Slide the battery latch to the unlock position as shown. The battery pack pops up. 5. Remove the battery pack.CHAPTER 4: INSTALLING AND REPLACING COMPONENTS 73 3 2 1 1 battery bay 3 battery pack 2 battery latch To replace the battery pack, perform the removal steps in reverse order.CHAPTER 4: INSTALLING AND REPLACING COMPONENTS 74 Upgrading or Replacing Memory Your laptop is equipped with a configurable memory unit. The industry standard JEDEC PC3-10600 (DDR3) SODIMM memory module connectors are available for memory upgrade. NOTE: If you purchased a dual‑core processor, your computer supports only memory module connectors DIMM 1 and DIMM 2. NOTE: The table below illustrates one possible way the system memory can be configured. You can also configure the system memory by installing memory modules in connectors DIMM 3 and DIMM 4. Memory connector DIMM 1 Memory connector DIMM 2 Memory connector DIMM 3 Memory connector DIMM 4 Total memory 2 GB 2 GB — — 4 GB 2 GB 4 GB — — 6 GB 4 GB 4 GB — — 8 GB 8 GB 8 GB — — 16 GB 8 GB 8 GB 8 GB 8 GB 32 GBCHAPTER 4: INSTALLING AND REPLACING COMPONENTS 75 Removing the Memory Module(s) NOTE: Your computer supports up to four memory module connectors. You can access connectors DIMM 1 and DIMM 2 by removing the compartment door at the bottom of your computer. To upgrade memory module(s) in connectors DIMM 3 and DIMM 4, see the Service Manual at support.dell.com. 1. Follow the instructions in “Before You Begin” on page 68. 2. Remove the battery (see “Replacing the Battery Pack” on page 72). 3. Remove the two screws that secure the compartment door to the computer base. 4. Slide and lift the compartment door away from the computer.CHAPTER 4: INSTALLING AND REPLACING COMPONENTS 76 1 2 1 screws (2) 2 compartment door 5. Use your fingertips to carefully spread apart the memory module connector’s spring-locks until the module pops up. 6. Remove the memory module.CHAPTER 4: INSTALLING AND REPLACING COMPONENTS 77 5 4 3 2 1 1 memory module 4 notch 2 spring locks (2) 5 memory module connector 3 tab To replace the memory modules, perform the removal steps in reverse order. While inserting the memory module into the connector align the notch on the memory module with the tab on the memory module connector. NOTE: If you need to install memory modules in two connectors, install a memory module in the lower connector before you install a memory module in the upper connector. NOTE: If the memory module is not installed properly, the computer may not boot.CHAPTER 4: INSTALLING AND REPLACING COMPONENTS 78 Upgrading or Replacing the Hard Drive(s) Your laptop is equipped with two hard drive sockets. Removing the Hard Drive(s) 1. Follow the instructions in “Before You Begin” on page 68. 2. Remove the battery pack (see “Replacing the Battery Pack” on page 72). 3. Remove the two screws that secure the compartment door to the computer base. 4. Slide and lift the compartment door away from the computer.CHAPTER 4: INSTALLING AND REPLACING COMPONENTS 79 1 2 1 screws (2) 2 compartment door 5. Loosen the three captive screws on the primary hard‑drive assembly (HDD0). 6. Using the pull‑tab, lift the primary hard‑drive assembly to disconnect it from the connector on the system board. 7. Lift the primary hard‑drive assembly out of the computer base.CHAPTER 4: INSTALLING AND REPLACING COMPONENTS 80 1 2 3 1 pull tab 3 captive screws (3) 2 primary hard-drive assembly 8. Loosen the three captive screws on the secondary hard‑drive assembly (HDD1). 9. Using the pull tab, lift the secondary hard‑drive assembly (HDD1) to disconnect it from the connector on the system board. 10. Lift the secondary hard‑drive assembly out of the computer base.CHAPTER 4: INSTALLING AND REPLACING COMPONENTS 81 1 2 3 1 pull tab 3 captive screws (3) 2 secondary hard-drive assemblyCHAPTER 4: INSTALLING AND REPLACING COMPONENTS 82 11. Remove the four screws that secure the hard drive to the hard‑drive bracket. 12. Lift the hard drive off the hard‑drive bracket. 1 2 3 1 hard drive 3 screws (4) 2 hard-drive bracketCHAPTER 4: INSTALLING AND REPLACING COMPONENTS 83 13. Remove the interposer from the hard drive. 2 1 1 hard drive 2 interposer To replace the hard drive(s), perform the removal steps in reverse order.CHAPTER 4: INSTALLING AND REPLACING COMPONENTS 84CHAPTER 5: TROUBLESHOOTING CHAPTER 5: TROUBLESHOOTINGCHAPTER 5: TROUBLESHOOTING 86 Basic Hints and Tips • Computer does not power on: Is your AC adapter cable securely connected to a working electrical outlet? If connected to a power strip, ensure that the strip is actually working. • Connections: Check all the cables to ensure that there are no loose connections anywhere. • Power Savings: Ensure that your computer is not in hibernate or standby mode by pressing the power button for less than 4 seconds. The power status light will fade from blue to black while in standby mode; in hibernate mode it will be off. • Brightness: Check and adjust the brightness of the display by pressing the key combinations or . • Display Choice: Press the key combination to ensure that the computer is not set to “External Only” display. • Use only the AC adapter that shipped with your laptop.CHAPTER 5: TROUBLESHOOTING 87 Backup and General Maintenance • Always backup your important data on a regular basis and keep copies of your operating system and software safe. Do not forget to note the serial numbers if you are storing them outside of their original cases ‑ for example, in a CD wallet. • Run maintenance programs as often as you can. You may schedule these programs to run at times when you are not using your computer. You can use those provided with your operating system, or buy more powerful, dedicated programs to do so. • Write down your passwords and keep them safe (away from your computer). This is especially important if you choose to password‑protect your computer’s BIOS and operating system. • Document vital settings such as network, dialup, mail and Internet settings.CHAPTER 5: TROUBLESHOOTING 88 When troubleshooting your computer, remember the following safety guidelines: • Before touching any of the computer’s internal components, touch an unpainted portion of the chassis. Doing so will safely discharge any static electricity, which could damage your computer. • Turn off your computer and any connected peripherals. • Disconnect any peripherals from your computer. Things to check: • Ensure that the AC adapter cable is properly connected between your computer and a grounded, three‑prong power outlet. Ensure that the power outlet is working. • Ensure the UPS or power strip is turned on (if applicable). • If your peripheral devices (for example keyboard, mouse, printer, and so on) are not working, ensure that all connections are secure. • If any computer components were added or removed before the problem began, check to see if you performed the installation or removal procedures properly. • If an error message appears on the screen, write down the exact error message prior to calling Alienware Technical Support to aid in diagnosing and resolving your issue. • If an error occurs in a specific program, see the program’s documentation. CHAPTER 5: TROUBLESHOOTING 89 Software Diagnostic Tools Pre-Boot System Assessment (PSA)/Enhanced Pre-Boot System Assessment (ePSA) NOTE: Your computer may have Pre-boot System Assessment (PSA) or Enhanced Pre-boot System Assessment (ePSA) pre-installed on your computer. The computer runs the PSA/ePSA, a series of initial tests of your system board, keyboard, display, memory, hard drive, etc. To invoke PSA/ePSA: 1. Turn on (or restart) your computer. 2. When the Alienware logo appears, press immediately. NOTE: If you wait too long and the operating system logo appears, continue to wait until you see the Microsoft Windows desktop; then, shut down your computer and try again. 3. Select Diagnostics from the menu and press . CHAPTER 5: TROUBLESHOOTING 90 During the assessment, answer any questions that appear. • If a failure is detected, the computer stops and beeps. To stop the assessment and restart the computer, press ; to continue to the next test, press ; to retest the component that failed, press . • If failures are detected during the PSA/ePSA, write down the error code(s) and contact Alienware (for more information, see “CONTACTING ALIENWARE“ on page 123). If the PSA/ePSA completes successfully, the following message appears “Do you want to run the remaining memory tests? This will take about 30 minutes or more. Do you want to continue? (Recommended).” If you are experiencing memory issues, press , otherwise press . A message stating the completion of PSA/ePSA is displayed. Press to reboot your computer.CHAPTER 5: TROUBLESHOOTING 91 Answers to Common Problems System The computer fails the POST The Power On Self Test (POST) ensures that the computer meets all the necessary system requirements and that all hardware is working properly before starting the remainder of the boot process. If the computer passes the POST, the computer will continue to start normally. However, if the computer fails the POST, the computer will generate a single beep to indicate a general failure and an error message will be displayed. For assistance, contact Alienware Technical Support (see “CONTACTING ALIENWARE“ on page 123). The computer stops responding or a solid blue screen appears CAUTION: You might lose data if you are unable to perform an operating system shutdown. If you are unable to get a response by pressing a key on your keyboard or moving your mouse, press and hold the power button for at least 6 seconds until the computer turns off, then restart your computer. NOTE: The chkdsk program may run when you restart the computer. Follow the instructions on the screen.CHAPTER 5: TROUBLESHOOTING 92 A program stops responding or crashes repeatedly End the program: 1. Press simultaneously. 2. Click the Applications tab and select the program that is no longer responding. 3. Click End Task. Check the software documentation. If necessary, uninstall and then reinstall the program. A program is designed for an earlier version of Microsoft Windows Run the Program Compatibility Wizard: The Program Compatibility Wizard configures a program so that it runs in an environment similar to an earlier version of Microsoft Windows operating system environments. 1. Click Start → Control Panel→ Programs→ Programs and Features→ Use an older program with this version of Windows. 2. In the welcome screen, click Next. 3. Follow the instructions on the screen.CHAPTER 5: TROUBLESHOOTING 93 Other software problems Back up your files immediately Use a virus-scanning program to check the hard drive, or CDs Save and close any open files or programs and shut down your computer through the Start menu Scan the computer for spyware: If you are experiencing slow computer performance, you frequently receive pop‑up advertisements, or you are having problems connecting to the Internet, your computer might be infected with spyware. Use an anti‑virus program that includes anti‑spyware protection (your program may require an upgrade) to scan the computer and remove spyware. Run the PSA/ePSA Diagnostics: If all tests run successfully, the error condition is related to a software problem.CHAPTER 5: TROUBLESHOOTING 94 Check the software documentation or contact the software manufacturer for troubleshooting information: • Ensure that the program is compatible with the operating system installed on your computer. • Ensure that your computer meets the minimum hardware requirements needed to run the software. See the software documentation for information. • Ensure that the program is installed and configured properly. • Verify that the device drivers do not conflict with the program. • If necessary, uninstall and then reinstall the program.CHAPTER 5: TROUBLESHOOTING 95 Hard Drive Problems Allow the computer to cool before turning it on A hot hard drive may prevent the operating system from starting. Try allowing the computer to return to room temperature before turning it on. Run Check Disk 1. Click Start → Computer. 2. Right‑click Local Disk C:. 3. Click Properties→ Tools→ Check Now. If the User Account Control window appears, click Continue. 4. Follow the instructions on the screen.CHAPTER 5: TROUBLESHOOTING 96 Memory Memory errors detected on startup • Check memory modules for correct seating and orientation. Reseat the memory modules if applicable (see “Upgrading or Replacing Memory” on page 74). • Computers using a dual-channel memory configuration require that memory modules be installed in pairs. If you require assistance, contact Alienware Technical Support (for more information, see “CONTACTING ALIENWARE“ on page 123). Display If the display is blank NOTE: If you are using a program that requires a higher resolution than your computer supports, it is recommended that you attach an external monitor to your computer. The computer may be in a power saving mode: Press a key on the keyboard or press the power button to resume normal operation. Switch the video image: If your computer is attached to an external monitor, press to switch the video image to the display.CHAPTER 5: TROUBLESHOOTING 97 Power When you press the power button, the computer does not turn on • If the AC adapter cable is connected to a surge protector or UPS, ensure that the surge protector or UPS is securely connected to an electrical outlet, is switched on and is working correctly. • Check that the wall outlet is working properly by testing another device such as a radio or lamp that you know works. If the wall outlet is not working, contact an electrician or your power company for further assistance. • If the problem persists, contact Alienware support (see “CONTACTING ALIENWARE“ on page 123).CHAPTER 5: TROUBLESHOOTING 98CHAPTER 6: SYSTEM RECOVERY CHAPTER 6: SYSTEM RECOVERYCHAPTER 6: SYSTEM RECOVERY 100 AlienRespawn CAUTION: Using AlienRespawn permanently removes any programs or drivers installed after you received your computer. Create backup media of applications you need to install on your computer before using AlienRespawn. Use AlienRespawn only if System Restore did not resolve your operating system problem. CAUTION: Although AlienRespawn is designed to preserve the data files on your computer, it is recommended that you backup your data files before using AlienRespawn. You can use AlienRespawn to restore your hard drive to the operating state it was in when you purchased your computer, while preserving the data files. AlienRespawn allows you to backup and restore your computer to an earlier operating state. AlienRespawn Basic To restore the factory image while preserving the data files: 1. Turn off your computer. 2. Disconnect all the devices connected to the computer (such as USB drive, printer, and so on) and remove any recently added internal hardware. NOTE: Do not disconnect the AC adapter cable. 3. Turn on your computer. 4. When the Alienware logo appears, press several times to access the Advanced Boot Options window. NOTE: If you wait too long and the operating system logo appears, continue to wait until you see the Microsoft Windows desktop; then, shut down your computer and try again. 5. Select Repair Your Computer.CHAPTER 6: SYSTEM RECOVERY 101 6. Select AlienRespawn and Emergency Backup from the System Recovery Options menu and follow the instructions on the screen. NOTE: The restoration process may take an hour or more depending on the size of the data to be restored. NOTE: For more information on AlienRespawn, see knowledge base article 353560 at support.dell.com. Upgrading to AlienRespawn Professional AlienRespawn provides additional features that allow you to: • Backup and restore your computer based on file types • Backup files to a local storage device • Schedule automated backups To upgrade to AlienRespawn Professional: 1. Double‑click the AlienRespawn icon in the notification area of your desktop. 2. Click Upgrade Now! 3. Follow the instructions on the screen.CHAPTER 6: SYSTEM RECOVERY 102 Dell DataSafe Online Backup (Optional) NOTE: Dell DataSafe Online is supported only on Windows operating systems. NOTE: A broadband connection is recommended for fast upload or download speeds. Dell DataSafe Online is an automated backup and recovery service that helps protect your data and other important files from catastrophic incidents like theft, fire, or natural disasters. You can access the service on your computer using a password‑ protected account. For more information, go to delldatasafe.com. To schedule backups: 1. Double‑click the Dell DataSafe Online icon  on the taskbar. 2. Follow the instructions that appear on the screen. My Dell Downloads NOTE: My Dell Downloads may not be available in all regions. Some of the software pre‑installed on your new Dell computer do not include a backup CD or DVD. This software is available on the My Dell Downloads website. From this website you can download available software for reinstallation or create your own backup media. To register and use My Dell Downloads: 1. Go to DownloadStore.dell.com/media. 2. Follow the instructions on the screen to register and download the software. 3. Reinstall the software or create a backup media for future use.CHAPTER 7: SPECIFICATIONS CHAPTER 7: BASIC SPECIFICATIONSCHAPTER 7: SPECIFICATIONS 104 Computer Model Alienware M17x-R3 Dimensions Height Front 44.5 mm (1.75 inches) Back 45.0 mm (1.77 inches) Width 410.0 mm (16.14 inches) Depth 304.0 mm (11.97 inches) Weight with 9-cell battery and optical drive (starting at) 4.26 kg (9.40 lb) NOTE: The weight of your laptop will vary depending on the configuration ordered and the manufacturing variability.CHAPTER 7: SPECIFICATIONS 105 Processor and System Chipset Processor • Intel Core i5 • Intel Core i7 L2 cache 256 KB L3 cache up to 8 MB Bus clock 100 MHz System chipset Mobile Intel HM67 Express Chipset SDRAM bus width one or two 64-bit channels of DDR3 memory up to 1333 MHz Processor address bus width 32 bits Processor data width 64 bits BIOS SPI Flash Memory 32 Mbit Graphics bus PCIe x16 busCHAPTER 7: SPECIFICATIONS 106 Memory Connectors four internally-accessible DDR3 using JEDEC SODIMM sockets Capacities 2 GB, 4 GB, and 8 GB Memory type up to 1333 MHz unbuffered non-ECC dual-channel DDR3 configuration Memory configurations possible 4 GB, 6 GB, 8 GB, 16 GB, and 32 GBCHAPTER 7: SPECIFICATIONS 107 Ports and Connectors Network adapter one RJ45 connector USB two 4-pin USB 2.0 and 3.0 compliant connectors eSATA/USB combo one 7-pin/4-pin eSATA/USB 2.0-compliant combo connector with PowerShare HDMI input and output one 19-pin connector Mini-DisplayPort one 20‑pin connector VGA one 15‑hole connector Audio two stereo headphones/speakers connectors one microphone‑in connector S/PDIF one headphone/S/PDIF combo connector Media Card Reader one 9-in-1 slotCHAPTER 7: SPECIFICATIONS 108 Communications Network adapter 10/100/1000 Mbps Ethernet LAN on system board Wireless • one half Mini‑Card slot • one full Mini‑Card slot • Bluetooth; Wireless Display (optional); WirelessHD (optional) Video Video controller Integrated Intel HD Graphics 3000 Discrete • NVIDIA GeForce GTX 460M • AMD Radeon HD 6970M • AMD Radeon HD 6870MCHAPTER 7: SPECIFICATIONS 109 Video Video memory Integrated 512 MB dedicated video memory (for total system memory greater than 4 GB) Discrete • 1.5 GB • 1.0 GB • 2.0 GB External display support HDMI, Mini DisplayPort, VGA, WiDi (optional), and WirelessHD (optional) Audio Type High-Definition 5.1 surround sound audio Controller IDT 92HD73 HDA codec Speaker dual 8-ohms speakers in both the left and right speaker assembly Internal speaker amplifier up to 5 W per channel; up to 10 W total powerCHAPTER 7: SPECIFICATIONS 110 Audio Internal microphone support dual digital microphone in camera assembly Volume controls program menus and keyboard media function keys Hard-Drive Storage Interface • SATA 2.0 (3Gb/s) • Solid‑State Drive (SSD) Number of storage drives two Hard drive • two 2.5 inch SATA 2.0 (3Gb/s) hard drives • one solid‑state driveCHAPTER 7: SPECIFICATIONS 111 Media Card Reader Cards supported • Secure Digital (SD) memory card • Secure Digital Input/Output (SDIO) card • Secure Digital Extended Capacity (SDXC) card • MultiMedia Card (MMC) • MultiMedia Card plus (MMC+) • Memory Stick • Memory Stick PRO • xD-Picture Card (type - M and type - H) • Hi Density‑SD (SDHD) • Hi Capacity‑SD (SDHC)CHAPTER 7: SPECIFICATIONS 112 Display Type • 17.3 inch HD+ WLED • 17.3 inch FHD WLED • 17.3 inch FHD 120 Hz WLED • 17.3 inch FHD 120 Hz WLED with nVidia 3D vision support Maximum resolution 1920 x 1080 Dimensions (active area) Height 215 mm (8.46 inches) Width 382 mm (15.04 inches) Diagonal 439 mm (17.28 inches) Refresh rate 60 Hz Operating angle 0° (closed) to 140° Pixel pitch 0.2550 mm Controls brightness can be controlled through keyboard shortcutsCHAPTER 7: SPECIFICATIONS 113 Keyboard (Backlit) Number of keys 82 (Korea, U.S., and Canada); 83 (Europe); 86 (Japan) Backlight color RGB; colors can be changed by invoking the AlienFX application in the Alienware Command Center. For information, see “Alienware Command Center” on page 40. Touch Pad X/Y position resolution (graphics table mode) 240 cpi Size Height 54.00 mm (2.13 inches) sensor-active area Width 100.00 mm (3.94 inches) rectangle Camera Camera resolution 3.0 megapixel Video resolution 2048 x 1536 Diagonal viewing angle 60°CHAPTER 7: SPECIFICATIONS 114 Battery 9-cell “smart” lithium ion (92 Whr) Height 22.00 mm (0.87 inches) Width 233.00 mm (9.17 inches) Depth 90.00 mm (3.54 inches) Weight 0.52 kg (1.14 lb) Voltage 11.10 VDC Operating time battery operating time varies depending on operating conditions and can be significantly reduced under certain power‑intensive conditions. Life span (approximate) 300 discharge/charge cycles Temperature range Operating 0° to 50°C (32° to 122°F) Storage –20° to 60°C (–4° to 140°F) Coin‑cell battery CR-2032CHAPTER 7: SPECIFICATIONS 115 AC Adapter Type 150 W/240 W Input voltage 100‑240 VAC Input current (maximum) 150 W 2.50 A 240 W 3.50 A Input frequency 50‑60 Hz Output current 150 W 7.70 A (continuous) 240 W 12.30 A (continuous) Output power 150 W 150 W 240 W 240 W Rated output voltage 19.50 VDCCHAPTER 7: SPECIFICATIONS 116 AC Adapter Temperature range Operating 150 W 0° to 35°C (32° to 95°F) 240 W 0° to 40°C (32° to 104°F) Storage –40° to 70°C (–40° to 158°F) Connector types DC connector 3-pin, 7.4 mm plug AC connector 3-pin – C13 (150 W) 3-pin – C13 (240 W) Computer Environment Temperature range Operating 0° to 35°C (32° to 95°F) Storage –40° to 65°C (–40° to 149°F)CHAPTER 7: SPECIFICATIONS 117 Computer Environment Relative humidity (maximum) Operating 10% to 90% (non-condensing) Storage 10% to 95% (non-condensing) Maximum vibration (Using a random vibration spectrum that simulates user environment) Operating 0.66 GRMS Storage 1.3 GRMS Maximum shock (Measured with hard drive in operating status and a 2‑ms half‑sine pulse for operating. Also measured with hard drive in head‑parked position and a 2‑ms half‑sine pulse for storage) Operating 110 G Storage 160 G Altitude (maximum) Operating –15.2 to 3048 m (–50 to 10,000 ft) Storage –15.2 to 10,668 m (–50 to 35,000 ft) Airborne contaminant level G2 or lower as defined by ISA-S71.04-1985CHAPTER 7: SPECIFICATIONS 118APPENDIX APPENDIXAPPENDIX 120 GENERAL AND ELECTRICAL SAFETY PRECAUTIONS Computer Setup • Read all instructions marked on the product and in the documentation before operating your computer. • Retain all safety and operating instructions. • Never use this product near water or a heat source. • Only set‑up the computer on a stable work surface. • Only operate the computer using the power source type indicated on the rating label. • Never block or cover any openings or fans in the computer case. These are required for ventilation. • Never insert objects of any kind into the ventilation openings. • Ensure that your computer is properly grounded when in use. • Do not attempt to connect your computer into an outlet that is not properly grounded. • If an extension cord is used with your computer, ensure that the total ampere rating on the computer does not exceed the maximum rating on the extension cord.APPENDIX 121 Computer Use • Route the power cable and all cables away from where people might walk or trip over them. Do not allow anything to rest on the power cable. • Do not spill anything on or into your computer. • To avoid electrical shock, always disconnect all power, modem and any other cables from the wall outlets before handling the computer. Electrostatic Discharge (ESD) Warning Electrostatic Discharge (ESD) can cause damage to internal system components if precautions are not taken. ESD is caused by static electricity and the damage caused is usually permanent. Computer technicians wear a special wrist‑strap that grounds them to the computer’s case to prevent ESD damage. To reduce the chances of ESD damage: • Turn off your computer’s power and wait several minutes before starting to work. • Ground yourself by touching the case of the computer. • Avoid walking around while replacing items inside the case, especially if you are on a carpet or during low temperature and low humidity. • Touch only those items which must be replaced. • If you have to remove peripheral cards for any reason, place them on the portion of the computer’s case that was removed. Do not touch the edge connectors at the bottom of the card that connect to the system board.APPENDIX 122 General Safety Precautions • Mechanical Shock: Your computer should never be subjected to severe mechanical shocks. Careless handling of your computer may cause damage. Mechanical Shock is not covered by the warranty. • Electrical Shock: If you do not open up your computer, there is nothing to worry about. Your computer protects itself against most irregularities in the power source. When You Should Contact Alienware • The battery, power cable or connector is damaged. • Your computer has had liquid spilled into it. • Your computer was dropped or the case was damaged. • Normal operation of the computer does not occur when the operating instructions are followed. Replacement Components or Accessories It is only advised to use replacement parts or accessories recommended by Alienware.APPENDIX 123 CONTACTING ALIENWARE For customers in the United States/Canada, call 1-800-ALIENWARE. NOTE: If you do not have an active Internet connection, you can find contact information on your purchase invoice, packing slip, bill, or Dell product catalog. Dell provides several online and telephone‑based support and service options. Because availability varies by country and product, some services may not be available in your area. To contact Dell for sales, technical support, or customer service issues: 1. Visit www.dell.com/contactdell. 2. Select your country or region. 3. Select the appropriate service or support link based on your need. 4. Choose the method of contacting Dell that is convenient for you.APPENDIX 124 Websites You can learn about Alienware products and services on the following websites: • www.dell.com • www.dell.com/ap (Asian/Pacific countries only) • www.dell.com/jp (Japan only) • www.euro.dell.com (Europe only) • www.dell.com/la (Latin American and Caribbean countries) • www.dell.ca (Canada only) You can access Alienware Support through the following websites: • support.dell.com • support.jp.dell.com (Japan only) • support.euro.dell.com (Europe only) • support.la.dell.com (Argentina, Brazil, Chile, Mexico)APPENDIX 125 Information for NOM, or Official Mexican Standard (Only for Mexico) The following information is provided in the device(s) described in this document in accordance with the requirements of the Official Mexican Standard (NOM): Importer: Dell México S.A. de C.V. Paseo de la Reforma 2620 - Flat 11° Col. Lomas Altas 11950 México, D.F. Regulatory Model Number Voltage Frequency Electricity Consumption Output Voltage Output Intensity P11E 100‑240V AC 50‑60 Hz 2.50 A/3.50 A 19.50 VDC 7.70 A/12.30 A For details, read the safety information that shipped with your computer. For additional safety best practices information, see www.dell.com/regulatory_compliance. w w w . d e l l . c o m | s u p p o r t . d e l l . c o m / m a n u a l s Alienware X51 Owner’s Manual Regulatory model: D05S Regulatory type: D05S001 book.book Page 1 Tuesday, January 17, 2012 10:32 PMNotes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your product. CAUTION: A CAUTION indicates either potential damage to hardware or loss of data, and tells you how to avoid the problem. WARNING: A WARNING indicates a potential for property damage, personal injury, or death. ____________________ Information in this document is subject to change without notice. © 2012 Dell Inc. All rights reserved. Reproduction of these materials in any manner whatsoever without the written permission of Dell Inc. is strictly forbidden. Trademarks used in this text: Dell™ and the DELL logo are trademarks of Dell Inc. Alienware ® is a registered trademark of Alienware Corporation. Microsoft ® , Windows ® , and the Windows start button logo are either trademarks or registered trademarks of Microsoft Corporation in the United States and/or other countries. Other trademarks and trade names may be used in this document to refer to either the entities claiming the marks and names or their products. Dell Inc. disclaims any proprietary interest in trademarks and trade names other than its own. 2012 - 01 Rev. A00 book.book Page 2 Tuesday, January 17, 2012 10:32 PMContents 3 Contents 1 About Your Computer. . . . . . . . . . . . . . . . . 5 Front View . . . . . . . . . . . . . . . . . . . . . . . . . 5 Back View . . . . . . . . . . . . . . . . . . . . . . . . . 6 Specifications . . . . . . . . . . . . . . . . . . . . . . . 6 2 Before You Begin . . . . . . . . . . . . . . . . . . . . 7 Turn Off Your Computer and Connected Devices . . . . . . . . . . . . . . . . . . 7 Safety Instructions . . . . . . . . . . . . . . . . . . 7 3 Working Inside Your Computer . . . . . . . . . 9 4 System Setup . . . . . . . . . . . . . . . . . . . . . . 11 Overview. . . . . . . . . . . . . . . . . . . . . . . . . 11 Entering System Setup . . . . . . . . . . . . . . . . . . 11 System Setup Screens . . . . . . . . . . . . . . . 12 System Setup Options . . . . . . . . . . . . . . . 12 Boot Sequence . . . . . . . . . . . . . . . . . . . 16 book.book Page 3 Tuesday, January 17, 2012 10:32 PM4 Contents 5 Flashing the BIOS . . . . . . . . . . . . . . . . . 19 6 Contacting Alienware . . . . . . . . . . . . . . 21 Websites . . . . . . . . . . . . . . . . . . . . . . 21 book.book Page 4 Tuesday, January 17, 2012 10:32 PMAbout Your Computer 5 1 About Your Computer Front View NOTE: Your Alienware X51 computer supports dual orientation. You can place your computer vertically or horizontally. The rotatable AlienHead allows you to change the direction of the AlienHead depending on the orientation of your computer. 1 power button 2 optical-drive eject button 3 optical drive 4 rotatable AlienHead 5 microphone connector 6 headphone connector 7 USB 2.0 connectors (2) 1 2 3 4 5 6 7 book.book Page 5 Tuesday, January 17, 2012 10:32 PM6 About Your Computer Back View Specifications For more information on specifications of your computer, see support.dell.com/manuals. 1 optical S/PDIF connector 2 HDMI connector 3 USB 2.0 connectors (4) 4 USB 3.0 connectors (2) 5 audio connectors (6) 6 hard-drive activity light 7 AC-adapter connector 8 discrete graphics card 9 security-cable slot 10 network connector and network lights 11 coaxial S/PDIF connector 1 2 3 4 5 6 7 11 10 9 8 book.book Page 6 Tuesday, January 17, 2012 10:32 PMBefore You Begin 7 2 Before You Begin Turn Off Your Computer and Connected Devices CAUTION: To avoid losing data, save and close all open files and exit all open programs before you turn off your computer. 1 Save and close all open files and exit all open programs. 2 Click Start and click Shut Down. Microsoft Windows shuts down and then the computer turns off. NOTE: If you are using a different operating system, see the documentation of your operating system for shut-down instructions. 3 Disconnect your computer and all attached devices from their electrical outlets. 4 Disconnect all telephone cables, network cables, and attached devices from your computer. 5 Press and hold the power button, while the computer is unplugged, to ground the system board. Safety Instructions Use the following safety guidelines to protect your computer from potential damage and ensure your personal safety. WARNING: Before you begin, read the safety information that shipped with your computer. For additional safety best practices information, see the Regulatory Compliance Homepage at dell.com/regulatory_compliance. CAUTION: To avoid damaging the computer, ensure that the work surface is flat and clean. CAUTION: Only a certified service technician is authorized to remove the computer cover and access any of the components inside the computer. See the safety instructions for complete information about safety precautions and protecting against electrostatic discharge. book.book Page 7 Tuesday, January 17, 2012 10:32 PM8 Before You Begin CAUTION: When you disconnect a cable, pull on its connector or on its pull-tab, not on the cable itself. Some cables have connectors with locking tabs or thumb-screws that you must disengage before disonnecting the cable. When disconnecting cables, keep them evenly aligned to avoid bending any connector pins. When connecting cables, ensure that the connectors and ports are correctly oriented and aligned. CAUTION: To disconnect a network cable, first unplug the cable from your computer and then unplug the cable from the network device. NOTE: Ensure that you remove the security cable from the security-cable slot, if applicable. book.book Page 8 Tuesday, January 17, 2012 10:32 PMWorking Inside Your Computer 9 3 Working Inside Your Computer CAUTION: Only a certified service technician is authorized to remove the computer cover and access any of the components inside the computer. See the safety instructions for complete information about safety precautions and protecting against electrostatic discharge. For information on removing and replacing the internal component of your computer, contact Alienware. See "Contacting Alienware" on page 21. book.book Page 9 Tuesday, January 17, 2012 10:32 PM10 Working Inside Your Computer book.book Page 10 Tuesday, January 17, 2012 10:32 PMSystem Setup 11 4 System Setup Overview Use the system setup to: • get information about the hardware installed in your computer, such as the amount of RAM, the size of the hard drive, and so on • change the system configuration information • set or change a user-selectable option, such as the user password, type of hard drive installed, enabling or disabling base devices, and so on NOTE: Before you change system setup, it is recommended that you note the system-setup screen information for future reference. Entering System Setup 1 Turn on (or restart) your computer. 2 During POST, when the DELL logo is displayed, watch for the F2 prompt to appear and then press immediately. NOTE: The F2 prompt indicates that the keyboard has initialized. This prompt can appear very quickly, so you must watch for it, and then press . If you press before the F2 prompt, this keystroke is lost. If you wait too long and the operating system logo appears, continue to wait until you see the Microsoft Windows desktop. Then, turn off your computer and try again. See "Turn Off Your Computer and Connected Devices" on page 7. book.book Page 11 Tuesday, January 17, 2012 10:32 PM12 System Setup System Setup Screens The system setup screen displays current or changeable configuration information for your computer. Information on the screen is divided into three areas: the setup item, active help screen, and key functions. System Setup Options NOTE: Depending on your computer and installed devices, the items listed in this section may appear, or may not appear exactly as listed. Setup Item — This field appears on the left side of the system setup window. The field is a scrollable list containing features that define the configuration of your computer, including installed hardware, power conservation, and security features. Scroll up and down the list with the up- and down-arrow keys. As an option is highlighted, the Help Screen displays more information about that option and available settings. Help Screen — This field appears on the right side of the system setup window and contains information about each option listed in the Setup Item. In this field you can view information about your computer and make changes to your current settings. Press the up-arrow and down-arrow keys to highlight an option. Press to make that selection active and return to the Setup Item. NOTE: Not all settings listed in the Setup Item are changeable. Key Functions — This field appears below the Help Screen and lists keys and their functions within the active system setup field. Main BIOS Information Product Information Build Date Displays the BIOS release date. Product Name Displays the product name. BIOS Version Displays the BIOS version number. Set Service Tag Allows you to enter the service tag of your computer. Asset Tag Displays the asset tag of the computer. book.book Page 12 Tuesday, January 17, 2012 10:32 PMSystem Setup 13 Memory Information Total Memory Displays the total memory of the computer. Memory Available Displays the amount of memory available on the computer. Memory Technology Displays the type of memory technology used. Memory Speed Displays the memory speed. CPU Information Processor ID Displays the processor identification code. CPU Speed Displays the processor speed. Cache L2 Displays the processor L2 cache size. Cache L3 Displays the processor L3 cache size. Advanced — Standard CMOS Features System Date (mm:dd:yy) Displays current date. System Time (hh:mm:ss) Displays the current time. Device Information SATA Port1 Displays the SATA 1 drive integrated in the computer. SATA Port2 Displays the SATA 2 drive integrated in the computer. SATA Port3 Displays the SATA 3 drive integrated in the computer. Wait for ‘F1’ If Errors If enabled, the system will HALT during boot to display system errors. Advanced — Advanced BIOS Features Bootup Num-Lock Select power-on state for num-lock. OptionROM Display Screen Allows you to display or hide the RAID Option ROM screen during POST. book.book Page 13 Tuesday, January 17, 2012 10:32 PM14 System Setup Advanced — CPU Configuration Hyper-threading Technology If disabled only one thread per enabled core is active. XD Bit Capability Enable XD Bit Capability to allow the processor to distinguish between the bits of code that can be executed and the ones that cannot be executed. Intel(R) SpeedStep tech If enabled, the processor clock speed and core voltage are adjusted dynamically based on the processor load. Intel(R) C-State tech Allows you to enable the number of cores in each processor package. Options 1-5. Advanced — Integrated Devices USB Controller Allows you to enable or disable the integrated USB controller. HD Audio Allows you to enable or disable the integrated audio controller. Onboard LAN Controller Allows you to enable or disable the onboard LAN controller. Launch PXE OpROM Allows you to enable or disable the boot option for legacy network devices. PCH SATA Configuration SATA Mode Displays the SATA mode. Advanced — Power Management Setup Suspend Mode Sets the energy-saving mode of the ACPI function. AC Recovery Sets what action the computer takes when power is restored. Auto Power On Allows the computer to start up at a certain time. Auto Power On Date Allows you to set RTC Wake Up Date. Auto Power On Hour Allows you to set RTC Wake Up Hour. Auto Power On Minute Allows you to set RTC Wake Up Minute. Auto Power On Second Allows you to set RTC Wake Up Second book.book Page 14 Tuesday, January 17, 2012 10:32 PMSystem Setup 15 Security Supervisor Password: Allows you to change the supervisor password. User Password: Allows you to change the user password. You cannot use the user password to enter the BIOS setup, during POST. Set Supervisor Password Allows you to set a supervisor password. Set User Password Allows you to set a supervisor password. Boot Set Boot Priority 1st Boot Device Displays the first boot device. Default: USB floppy-drive. 2nd Boot Device Displays the second boot device. Default: USB hard-drive. 3rd Boot Device Displays the third boot device. Default: USB optical-drive. 4th Boot Device Displays the fourth boot device. Default: hard-drive. 5th Boot Device Displays the fifth boot device. Default: optical-drive. 6th Boot Device Displays the sixth boot device. Default: network boot. 7th Boot Device Displays the seventh boot device. Default: UEFI. Hard Disk Drive BBS Priorities Sets the hard drive boot priority. The items displayed are dynamically updated according to the hard drives detected. USB Disk BBS Drive Priorities Sets the USB drive boot priority. CD/DVD ROM Drive BBS Priorities Sets the CD/DVD drive boot priority. book.book Page 15 Tuesday, January 17, 2012 10:32 PM16 System Setup Boot Sequence This feature allows you to change the boot sequence for devices. Boot Options • Diskette Drive — The computer attempts to boot from the floppy disk drive. If no operating system is on the drive, the computer generates an error message. • Hard Drive — The computer attempts to boot from the primary hard drive. If no operating system is on the drive, the computer generates an error message. • CD/DVD/CD-RW Drive — The computer attempts to boot from the optical drive. If no disc is in the drive, or if the disc is not bootable, the computer generates an error message. • USB Storage Device — Insert the memory device into a USB connector and restart the computer. When F12 Boot Options appears in the lower-right corner of the screen, press . The BIOS detects the device and adds the USB flash option to the boot menu. NOTE: To boot to a USB device, the device must be bootable. To ensure that your device is bootable, check the device documentation. • Network — The computer attempts to boot from the network. If no operating system is found on the network, the computer generates an error message. Exit Provides options to Save Changes and Reset, Discard Changes and Reset, and Restore Defaults. book.book Page 16 Tuesday, January 17, 2012 10:32 PMSystem Setup 17 Changing Boot Sequence for the Current Boot You can use this feature to change the current boot sequence, for example, to boot from the optical drive to run Dell Diagnostics from the Drivers and Utilities disc. The previous boot sequence is restored at the next boot. 1 If you are booting from a USB device, connect the USB device to a USB connector. 2 Turn on (or restart) your computer. 3 When F2 Setup, F12 Boot Options appears in the lower-right corner of the screen, press . NOTE: If you wait too long and the operating system logo appears, continue to wait until you see the Microsoft Windows desktop. Then shut down your computer and try again. The Boot Device Menu appears, listing all available boot devices. 4 On the Boot Device Menu choose the device you want to boot from. For example, if you are booting to a USB memory key, highlight USB Storage Device and press . Changing Boot Sequence for Future Boots 1 Enter system setup. See "Entering System Setup" on page 11. 2 Use the arrow keys to highlight the Boot menu option and press to access the menu. NOTE: Write down your current boot sequence in case you want to restore it. 3 Press the up- and down-arrow keys to move through the list of devices. 4 Press plus (+) or minus (–) to change the boot priority of the device. book.book Page 17 Tuesday, January 17, 2012 10:32 PM18 System Setup book.book Page 18 Tuesday, January 17, 2012 10:32 PMFlashing the BIOS 19 5 Flashing the BIOS The BIOS may require flashing when an update is available or when replacing the system board. To flash the BIOS: 1 Turn on the computer. 2 Go to support.dell.com/support/downloads. 3 Locate the BIOS update file for your computer: NOTE: The Service Tag for your computer is located on a label at the back of your computer. If you have your computer’s Service Tag: a Click Enter a Tag. b Enter your computer’s Service Tag in the Enter a service tag: field, click Go, and proceed to step 4. If you do not have your computer’s Service Tag: a Click Select Model. b Select the type of product in the Select Your Product Family list. c Select the product brand in the Select Your Product Line list. d Select the product model number in the Select Your Product Model list. NOTE: If you have selected a different model and want to start over again, click Start Over on the top right of the menu. e Click Confirm. 4 A list of results appears on the screen. Click BIOS. 5 Click Download Now to download the latest BIOS file. The File Download window appears. 6 Click Save to save the file on your desktop. The file downloads to your desktop. 7 Click Close if the Download Complete window appears. The file icon appears on your desktop and is titled the same as the downloaded BIOS update file. 8 Double-click the file icon on the desktop and follow the instructions on the screen. book.book Page 19 Tuesday, January 17, 2012 10:32 PM20 Flashing the BIOS book.book Page 20 Tuesday, January 17, 2012 10:32 PMContacting Alienware 21 6 Contacting Alienware NOTE: Dell provides several online and telephone-based support and service options for your Alienware computer. These services may vary by country and product and may not be available in your area. To contact Dell for sales, technical support, or customer service issues: 1 Go to dell.com/contactdell. 2 Select your region, country, or language. 3 Select the segment for contact. 4 Select the appropriate service or support link based on your need. 5 Choose the method of contacting Dell that is convenient for you. If you are in the United States, call 1-800-ALIENWARE for help on your Alienware computer. Websites For the latest information, FAQ’s, and solutions to most common issues, see support.dell.com/Alienware. book.book Page 21 Tuesday, January 17, 2012 10:32 PM w w w . d e l l . c o m | s u p p o r t . d e l l . c o m Systèmes Dell™ PowerEdge™ 6950 Manuel du propriétaireRemarques, avis et précautions REMARQUE : une REMARQUE indique des informations importantes qui peuvent vous aider à mieux utiliser votre ordinateur. AVIS : un AVIS vous avertit d’un risque de dommage matériel ou de perte de données et vous indique comment éviter le problème. PRÉCAUTION : une PRÉCAUTION indique un risque potentiel d’endommagement du matériel, de blessure corporelle ou de mort. ____________________ Les informations contenues dans ce document peuvent être modifiées sans préavis. © 2006 Dell Inc. Tous droits réservés. La reproduction de ce document de quelque manière que ce soit sans l’autorisation écrite de Dell Inc. est strictement interdite. Marques utilisées dans ce document : Dell, le logo DELL, Inspiron, Dell Precision, Dimension, OptiPlex, Latitude, PowerConnect, PowerEdge, PowerVault, PowerApp, Dell OpenManage et Dell XPS sont des marques de Dell Inc. ; Microsoft, MS-DOS, Windows et Windows Server sont des marques déposées de Microsoft Corporation ; AMD, AMD PowerNow! et Opteron sont des marques d’Advanced Micro Devices, Inc. ; EMC est une marque déposée d’EMC Corporation. Tous les autres noms de marques et marques commerciales utilisés dans ce document se rapportent aux sociétés propriétaires des marques et des noms de ces produits. Dell Inc. décline tout intérêt dans l’utilisation des marques déposées et des noms de marques ne lui appartenant pas. Septembre 2006Sommaire 3 Sommaire 1 Présentation du système . . . . . . . . . . . . . . . . . . . . . . . . 9 Autres informations utiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Fonctions du système accessibles au démarrage . . . . . . . . . . . . . . . 10 Voyants et caractéristiques du panneau avant . . . . . . . . . . . . . . . . . 11 Codes des voyants de disques durs . . . . . . . . . . . . . . . . . . . . 13 Voyants et caractéristiques du panneau arrière . . . . . . . . . . . . . . . . 14 Connexion de périphériques externes . . . . . . . . . . . . . . . . . . . 14 Codes du voyant d’alimentation . . . . . . . . . . . . . . . . . . . . . . . . . 15 Codes des voyants de NIC . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 Messages d’état affichés sur l’écran LCD. . . . . . . . . . . . . . . . . . . . 16 Résolution des incidents décrits par les messages d’état de l’écran LCD . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 Suppression des messages d’état de l’écran LCD . . . . . . . . . . . . . 24 Messages système . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 Messages d’avertissement . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 Messages de diagnostic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 Messages d’alerte . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 2 Utilisation du programme de configuration du système . . . 33 Accès au programme de configuration du système. . . . . . . . . . . . . . . 33 Réponse aux messages d’erreur . . . . . . . . . . . . . . . . . . . . . . 33 Utilisation du programme de configuration du système . . . . . . . . . . 344 Sommaire Options du programme de configuration du système . . . . . . . . . . . . . . 34 Écran principal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 Écran Memory Information (Informations sur la mémoire) . . . . . . . . 38 Écran CPU Information (Informations sur le processeur) . . . . . . . . . 39 Écran Integrated Devices (Périphériques intégrés) . . . . . . . . . . . . 40 Écran System Security (Sécurité du système) . . . . . . . . . . . . . . . 41 Écran Exit (Quitter) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 Mot de passe système et mot de passe de configuration . . . . . . . . . . . . 43 Utilisation du mot de passe système . . . . . . . . . . . . . . . . . . . . 43 Utilisation du mot de passe de configuration. . . . . . . . . . . . . . . . 46 Désactivation d’un mot de passe oublié. . . . . . . . . . . . . . . . . . . . . 48 Configuration du contrôleur BMC . . . . . . . . . . . . . . . . . . . . . . . . 48 Accès au module de configuration BMC . . . . . . . . . . . . . . . . . . 48 Options du module de configuration du contrôleur BMC . . . . . . . . . 48 3 Installation des composants du système . . . . . . . . . . . . . 49 Outils recommandés . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50 Intérieur du système . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50 Retrait et réinstallation du cadre avant en option . . . . . . . . . . . . . . . 52 Ouverture et fermeture du système . . . . . . . . . . . . . . . . . . . . . . . 52 Ouverture du système. . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 Fermeture du système . . . . . . . . . . . . . . . . . . . . . . . . . . . 54 Ventilateurs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54 Retrait d’un ventilateur . . . . . . . . . . . . . . . . . . . . . . . . . . . 54 Réinstallation d’un ventilateur . . . . . . . . . . . . . . . . . . . . . . . 55 Protecteurs de ventilation . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 Retrait des protecteurs de ventilation . . . . . . . . . . . . . . . . . . . 56 Réinstallation des protecteurs de ventilation . . . . . . . . . . . . . . . 57 Blocs d’alimentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 Retrait d’un bloc d’alimentation . . . . . . . . . . . . . . . . . . . . . . 57 Réinstallation d’un bloc d’alimentation . . . . . . . . . . . . . . . . . . . 58Sommaire 5 Cartes d’extension . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59 Consignes d’installation des cartes d’extension . . . . . . . . . . . . . . 59 Installation d’une carte d’extension . . . . . . . . . . . . . . . . . . . . 60 Retrait d’une carte d’extension . . . . . . . . . . . . . . . . . . . . . . . 62 Carte RAC. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62 Mémoire système . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64 Consignes générales d’installation des barrettes de mémoire . . . . . . 64 Installation de barrettes de mémoire . . . . . . . . . . . . . . . . . . . . 66 Retrait de barrettes de mémoire . . . . . . . . . . . . . . . . . . . . . . 68 Processeurs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69 Retrait d’un processeur. . . . . . . . . . . . . . . . . . . . . . . . . . . 69 Installation d’un processeur . . . . . . . . . . . . . . . . . . . . . . . . 72 Modules VRM du processeur . . . . . . . . . . . . . . . . . . . . . . . . . . 73 Installation d’un module VRM . . . . . . . . . . . . . . . . . . . . . . . 73 Retrait d’un module VRM . . . . . . . . . . . . . . . . . . . . . . . . . . 75 Installation d’un lecteur de disquette . . . . . . . . . . . . . . . . . . . . . . 75 Installation d’un lecteur optique. . . . . . . . . . . . . . . . . . . . . . . . . 78 Disques durs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80 Avant de commencer . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80 Configuration du périphérique d’amorçage . . . . . . . . . . . . . . . . 81 Retrait d’un cache de lecteur. . . . . . . . . . . . . . . . . . . . . . . . 81 Installation d’un cache de lecteur . . . . . . . . . . . . . . . . . . . . . 81 Retrait d’un disque dur enfichable à chaud . . . . . . . . . . . . . . . . 81 Installation d’un disque dur enfichable à chaud . . . . . . . . . . . . . . 83 Remplacement d’un disque dur installé dans un support . . . . . . . . . 83 Cartes contrôleur SAS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85 Retrait d’une carte contrôleur SAS. . . . . . . . . . . . . . . . . . . . . 85 Installation d’une carte contrôleur SAS . . . . . . . . . . . . . . . . . . 85 Installation de la pile d’une carte contrôleur RAID SAS . . . . . . . . . . 85 Connexion d’un lecteur de bande SAS externe . . . . . . . . . . . . . . . . . 86 Connexion d’un périphérique de stockage Fibre Channel externe . . . . . . . 87 Pile du système. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88 Remplacement de la pile du système. . . . . . . . . . . . . . . . . . . . 886 Sommaire Panneau de commande (maintenance uniquement) . . . . . . . . . . . . . . 90 Retrait du panneau de commande . . . . . . . . . . . . . . . . . . . . . 90 Installation du panneau de commande. . . . . . . . . . . . . . . . . . . 92 Carte intermédiaire de ventilateur (maintenance uniquement) . . . . . . . . 92 Retrait d’une carte intermédiaire de ventilateur . . . . . . . . . . . . . . 92 Installation d’une carte intermédiaire de ventilateur. . . . . . . . . . . . 93 Carte de distribution de l’alimentation (maintenance uniquement) . . . . . . 94 Retrait de la carte de distribution de l’alimentation . . . . . . . . . . . . 94 Installation de la carte de distribution de l’alimentation . . . . . . . . . . 96 Commutateur d’intrusion du châssis (maintenance uniquement) . . . . . . . 96 Retrait du commutateur d’intrusion du châssis . . . . . . . . . . . . . . 96 Installation du commutateur d’intrusion du châssis . . . . . . . . . . . . 98 Fond de panier SAS (maintenance uniquement) . . . . . . . . . . . . . . . . 99 Retrait du fond de panier SAS . . . . . . . . . . . . . . . . . . . . . . . 99 Installation du fond de panier SAS . . . . . . . . . . . . . . . . . . . . 101 Carte système (maintenance uniquement) . . . . . . . . . . . . . . . . . . 102 Retrait de la carte système . . . . . . . . . . . . . . . . . . . . . . . . 102 Installation de la carte système. . . . . . . . . . . . . . . . . . . . . . 107 4 Dépannage du système . . . . . . . . . . . . . . . . . . . . . . . . 109 La sécurité d’abord, pour vous et pour le système . . . . . . . . . . . . . . 109 Routine de démarrage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109 Vérification des incidents simples liés à l’alimentation . . . . . . . . . . . 110 Vérification du matériel . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110 Résolution des conflits d’attribution d’IRQ . . . . . . . . . . . . . . . . 110 Dépannage des connexions externes . . . . . . . . . . . . . . . . . . 111 Dépannage du sous-système vidéo . . . . . . . . . . . . . . . . . . . 111 Dépannage du clavier . . . . . . . . . . . . . . . . . . . . . . . . . . 112 Dépannage de la souris. . . . . . . . . . . . . . . . . . . . . . . . . . 113 Dépannage des incidents liés aux E-S série . . . . . . . . . . . . . . . . . 113 Dépannage d’un périphérique d’E-S série . . . . . . . . . . . . . . . . 114 Dépannage d’un périphérique USB. . . . . . . . . . . . . . . . . . . . 114 Dépannage d’un NIC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115Sommaire 7 Dépannage d’un système mouillé . . . . . . . . . . . . . . . . . . . . . . . 116 Dépannage d’un système endommagé . . . . . . . . . . . . . . . . . . . . 117 Dépannage de la pile du système . . . . . . . . . . . . . . . . . . . . . . . 118 Dépannage des blocs d’alimentation . . . . . . . . . . . . . . . . . . . . . 119 Dépannage des incidents de refroidissement du système . . . . . . . . . . 120 Dépannage d’un ventilateur . . . . . . . . . . . . . . . . . . . . . . . 120 Dépannage de la mémoire système . . . . . . . . . . . . . . . . . . . . . . 121 Dépannage d’un lecteur de disquette . . . . . . . . . . . . . . . . . . . . . 123 Dépannage d’un lecteur optique. . . . . . . . . . . . . . . . . . . . . . . . 124 Dépannage d’un disque dur . . . . . . . . . . . . . . . . . . . . . . . . . . 125 Dépannage d’un contrôleur SAS ou RAID SAS . . . . . . . . . . . . . . . . 127 Dépannage d’un lecteur de bande SAS externe . . . . . . . . . . . . . . . 128 Dépannage des cartes d’extension . . . . . . . . . . . . . . . . . . . . . . 129 Dépannage des microprocesseurs . . . . . . . . . . . . . . . . . . . . . . 130 5 Exécution des diagnostics du système. . . . . . . . . . . . . . 133 Utilisation de Dell PowerEdge Diagnostics. . . . . . . . . . . . . . . . . . 133 Fonctionnalités des diagnostics du système . . . . . . . . . . . . . . . . . 133 Quand utiliser les diagnostics du système . . . . . . . . . . . . . . . . . . 134 Exécution des diagnostics du système . . . . . . . . . . . . . . . . . . . . 134 Options de test des diagnostics du système. . . . . . . . . . . . . . . . . . 134 Utilisation des options de test personnalisées . . . . . . . . . . . . . . . . 135 Sélection de périphériques à tester . . . . . . . . . . . . . . . . . . . 135 Sélection d’options de diagnostic . . . . . . . . . . . . . . . . . . . . 135 Visualisation des informations et des résultats . . . . . . . . . . . . . 1358 Sommaire 6 Cavaliers et connecteurs . . . . . . . . . . . . . . . . . . . . . . . 137 Cavaliers de la carte système . . . . . . . . . . . . . . . . . . . . . . . . . 137 Désactivation d’un mot de passe oublié. . . . . . . . . . . . . . . . . . . . 139 Connecteurs de la carte système . . . . . . . . . . . . . . . . . . . . . . . 140 Connecteurs de la carte de fond de panier SAS . . . . . . . . . . . . . . . 143 7 Obtention d’aide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145 Assistance technique . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145 Services en ligne . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146 Service AutoTech . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147 Service d’état des commandes automatisé . . . . . . . . . . . . . . . 147 Service de support technique . . . . . . . . . . . . . . . . . . . . . . 147 Service Dell de formation et de certification pour les entreprises. . . . . . 147 Incidents liés à votre commande . . . . . . . . . . . . . . . . . . . . . . . 147 Informations produit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147 Renvoi d’articles pour une réparation sous garantie ou un remboursement sous forme d’avoir . . . . . . . . . . . . . . . . . . . 148 Avant d’appeler . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148 Contacter Dell . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150 Glossaire . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171 Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179Présentation du système 9 Présentation du système Cette section décrit les caractéristiques essentielles au fonctionnement du système (matériel, micrologiciel et interface logicielle). Les connecteurs situés sur les panneaux avant et arrière permettent au système de bénéficier d’une connectivité optimale et de nombreuses possibilités d’extension. Le micrologiciel, le système d’exploitation et les applications gèrent le système ainsi que l’état des composants. Ils vous alertent lorsqu’un incident survient. Les informations concernant l’état du système peuvent être transmises par les éléments suivants : • Voyants des panneaux avant et arrière • Messages d’état affichés sur l’écran LCD • Messages du système • Messages d’avertissement • Messages de diagnostic • Messages d’alerte Cette section décrit chaque type de message et répertorie les causes possibles et les mesures à prendre pour résoudre les incidents indiqués. Elle contient également une description des voyants et des caractéristiques du système. Autres informations utiles PRÉCAUTION : le document Product Information Guide (Guide d’informations sur le produit) contient d’importantes informations se rapportant à la sécurité et aux réglementations. Les informations sur la garantie se trouvent soit dans ce document, soit à part. • Les documents Rack Installation Guide (Guide d’installation du rack) et Rack Installation Instructions (Instructions d’installation du rack) fournis avec la solution rack décrivent l’installation du système. • Le document Getting Started Guide (Guide de mise en route) décrit les caractéristiques du système, les procédures de configuration et les spécifications techniques. • Les CD fournis avec le système contiennent des documents et des outils relatifs à la configuration et à la gestion du système. • La documentation du logiciel de gestion des systèmes comprend des renseignements sur les fonctionnalités, les spécifications, l’installation et le fonctionnement de base du logiciel. • La documentation du système d’exploitation indique comment installer (au besoin), configurer et utiliser le système d’exploitation.10 Présentation du système • La documentation fournie avec les composants achetés séparément contient des informations permettant de configurer et d’installer ces options. • Des mises à jour sont parfois fournies avec le système. Elles décrivent les modifications apportées au système, aux logiciels ou à la documentation. REMARQUE : vérifiez toujours si des mises à jour sont disponibles sur le site support.dell.com et lisez-les en premier, car elles remplacent souvent les informations contenues dans les autres documents. • Des notes de version ou des fichiers lisez-moi (readme) sont parfois fournis ; ils contiennent des mises à jour de dernière minute apportées au système ou à la documentation, ou des documents de référence technique avancés destinés aux utilisateurs expérimentés ou aux techniciens. Fonctions du système accessibles au démarrage Le tableau 1-1 décrit certaines touches pouvant être utilisées lors du démarrage pour accéder aux caractéristiques du système. Si le système d’exploitation commence à se charger alors que vous n’avez pas encore appuyé sur la touche voulue, laissez-le finir de démarrer, puis arrêtez-le et réessayez. Tableau 1-1. Touches d’accès aux fonctions du système Touche(s) Description Permet d’accéder au programme de configuration du système. Voir “Utilisation du programme de configuration du système”, page 33. Permet d’accéder au programme de diagnostic du système. Voir “Exécution des diagnostics du système”, page 134. Permet d’accéder à l’écran de sélection d’un périphérique d’amorçage. Quitte l’amorçage PXE. Ouvre l’utilitaire de gestion du contrôleur BMC (BaseBoard Management Controller), qui permet d’accéder au journal d’événements du système (SEL). Voir le document BMC User’s Guide (Guide d’utilisation du contrôleur BMC) pour plus d’informations sur la configuration et l’utilisation de ce contrôleur. Ouvre l’utilitaire de configuration SAS. Consultez le guide d’utilisation de la carte SAS pour plus d’informations. Cette option s’affiche uniquement si le support PXE est activé dans le programme de configuration du système (voir “Écran Integrated Devices (Périphériques intégrés)”, page 40). Elle permet de configurer les paramètres du NIC pour le démarrage PXE. Pour plus d’informations, consultez la documentation du NIC intégré. Si vous installez le contrôleur DRAC (Dell Remote Access Controller) en option, cette combinaison de touches permet d’accéder aux paramètres de configuration correspondants. Consultez le guide d’utilisation du contrôleur DRAC pour plus d’informations sur la configuration et l’utilisation de ce contrôleur. Présentation du système 11 Voyants et caractéristiques du panneau avant La figure 1-1 présente les boutons, les voyants et les connecteurs situés derrière le cadre de rack (en option), sur le panneau avant. Figure 1-1. Voyants et caractéristiques du panneau avant Tableau 1-2. Voyants, boutons et connecteurs du panneau avant Numéro Voyant, bouton ou connecteur Icône Description 1 Voyant et bouton d’alimentation Le bouton d’alimentation contrôle la sortie du bloc d’alimentation en CC qui alimente le système. REMARQUE : si vous éteignez un ordinateur utilisant un système d’exploitation conforme ACPI en appuyant sur le bouton d’alimentation, le système peut effectuer un arrêt normal avant que l’alimentation ne soit coupée. Si le système d’exploitation n’est pas conforme ACPI, une pression sur le bouton d’alimentation l’éteint immédiatement. 2 Bouton NMI Utilisé pour la résolution de certains incidents liés aux logiciels et aux pilotes de périphériques avec certains systèmes d’exploitation. Pour l’activer, utilisez la pointe d’un trombone. Utilisez-le uniquement si un technicien de support qualifié vous demande de le faire, ou si cela est préconisé dans la documentation du système d’exploitation. 2 3 4 5 6 1 7 812 Présentation du système 3 Bouton d’identification du système Les boutons d’identification des panneaux avant et arrière peuvent servir à identifier un système spécifique au sein d’un rack. Si on appuie sur l’un de ces boutons, les voyants bleus d’état du système avant et arrière clignotent jusqu’à ce que l’utilisateur appuie de nouveau sur l’un des boutons. 4 Écran LCD Affiche l’ID du système, des informations d’état et des messages d’erreur. L’écran LCD s’allume lorsque le système fonctionne normalement. Les logiciels de gestion de systèmes, tout comme les boutons d’identification situés à l’avant et à l’arrière du système, peuvent faire clignoter l’écran LCD en bleu pour identifier un système spécifique. L’écran LCD s’allume en orange lorsque survient un incident lié au bloc d’alimentation, au ventilateur, à la température ou au disque dur, et que cet incident doit être traité. REMARQUE : si le système est connecté à l’alimentation en CA et si une erreur a été détectée, l’écran LCD s’allume en orange, que le système soit allumé ou non. 5 Connecteurs USB (2) Permettent de connecter des périphériques compatibles USB 2.0 au système. 6 Connecteur vidéo Permet de connecter un moniteur au système. 7 Disques durs (en option) Cinq lecteurs 3,5 pouces 8 Lecteur optique et lecteur de disquette (en option) Lecteur optique slim et lecteur de disquette (tous deux en option) REMARQUE : les périphériques DVD sont uniquement des périphériques de données. Tableau 1-2. Voyants, boutons et connecteurs du panneau avant (suite) Numéro Voyant, bouton ou connecteur Icône DescriptionPrésentation du système 13 Codes des voyants de disques durs Les supports de disque dur comprennent un voyant d’activité et un voyant d’état. Voir la figure 1-2. Figure 1-2. Voyants des disques durs Le tableau 1-3 répertorie les codes de voyants des disques durs RAID. Ce comportement varie en fonction des événements affectant les lecteurs du système. Par exemple, si un disque dur tombe en panne, la séquence “Échec du disque” apparaît. Lorsque vous avez sélectionné le lecteur à retirer, la séquence “Préparation au retrait” apparaît, suivie de la séquence “Lecteur prêt à être inséré ou retiré”. Une fois le lecteur de rechange installé, la séquence indiquant que le lecteur est en cours de préparation apparaît, suivie de la séquence “Lecteur en ligne”. 1 Voyant d’état du lecteur (vert et orange) 2 Voyant d’activité du lecteur (vert) Tableau 1-3. Codes des voyants de disques durs RAID Signification Comportement du voyant d’état Identification de l’unité/ Préparation au retrait Clignotement vert deux fois par seconde Lecteur prêt à être inséré ou retiré Éteint REMARQUE : à la mise sous tension du système, le voyant d’état du lecteur ne s’allume qu’une fois tous les disques durs initialisés. Lorsqu’il est éteint, l’état des disques ne permet par leur insertion ni leur retrait. Panne anticipée du lecteur Clignotement vert, orange, puis extinction Échec du disque Clignotement orange quatre fois par seconde Disque en cours de reconstruction Vert, clignotement lent Lecteur en ligne Vert fixe Reconstruction arrêtée Clignotement vert pendant trois secondes, puis orange pendant trois secondes, puis extinction pendant six secondes 1 214 Présentation du système Voyants et caractéristiques du panneau arrière La figure 1-3 présente les boutons, les voyants et les connecteurs situés sur le panneau arrière du système. Figure 1-3. Voyants et caractéristiques du panneau arrière Connexion de périphériques externes Appliquez les consignes suivantes lorsque vous connectez des périphériques externes au système : • La plupart des périphériques doivent être reliés à un connecteur spécifique et requièrent l’installation de pilotes pour pouvoir fonctionner correctement. Les pilotes sont généralement fournis avec le système d’exploitation ou avec le périphérique lui-même. Consultez la documentation du périphérique pour obtenir des instructions spécifiques sur l’installation et la configuration. • Connectez toujours les périphériques externes lorsque le système est éteint. Ensuite, allumez les périphériques externes avant le système, à moins que la documentation du périphérique ne stipule le contraire. Pour plus d’informations sur chaque connecteur, voir “Cavaliers et connecteurs”, page 137. Pour plus d’informations sur l’activation, la désactivation et la configuration des ports d’E-S et des connecteurs, voir “Utilisation du programme de configuration du système”, page 33. 2 7 1 3 8 4 5 6 11 10 9 1 Connecteur série 2 Connecteur vidéo 3 Connecteurs USB (2) 4 Connecteur NIC2 5 Connecteur NIC1 6 Port de contrôleur d’accès à distance (RAC, en option) 7 Logements de cartes d’extension 8 Bloc d’alimentation 2 9 Voyant d’état du système 10 Bouton d’identification du système 11 Bloc d’alimentation 1Présentation du système 15 Codes du voyant d’alimentation Le bouton d’alimentation du panneau avant contrôle la mise sous tension des blocs d’alimentation du système. Le voyant correspondant peut fournir des informations sur l’état de l’alimentation (voir la figure 1-1). Le tableau 1-4 répertorie les codes de ce voyant. Les voyants des blocs d’alimentation indiquent si le système est alimenté ou si une panne d’alimentation s’est produite (voir la figure 1-4). Figure 1-4. Voyants des blocs d’alimentation Tableau 1-4. Codes du voyant d’alimentation Voyant Fonction Allumé Indique que le système est alimenté et opérationnel. Éteint Indique que le système n’est pas alimenté. Tableau 1-5. Voyants du bloc d’alimentation Voyant Fonction État du bloc d’alimentation Un voyant vert indique que le bloc d’alimentation fonctionne normalement. Panne du bloc d’alimentation Un voyant orange indique qu’un incident lié au bloc d’alimentation s’est produit. État de l’alimentation en CA Un voyant vert indique qu’une source de courant alternatif valide est reliée au bloc d’alimentation. 1 Voyant d’état du bloc d’alimentation 2 Voyant de panne du bloc d’alimentation 3 Voyant d’état de l’alimentation en CA 1 2 316 Présentation du système Codes des voyants de NIC Chaque NIC du panneau arrière est équipé d’un voyant qui fournit des informations sur l’activité du réseau et l’état du lien. Voir la figure 1-5. Le tableau 1-6 répertorie les codes des voyants de NIC. Figure 1-5. Voyants de NIC Messages d’état affichés sur l’écran LCD L’écran LCD du panneau de commande affiche des messages d’état indiquant si le système fonctionne correctement ou s’il requiert une intervention. Il s’allume en bleu en cas de fonctionnement normal et en orange si une erreur est détectée. Dans ce dernier cas, il affiche un message comprenant un code d’état suivi d’un texte descriptif. Le tableau 1-7 répertorie les messages d’état qui peuvent s’afficher sur l’écran LCD et indique leur cause probable. Les messages de l’écran LCD se rapportent aux événements enregistrés dans le journal d’événements du système. Pour plus d’informations sur ce journal et sur la configuration des paramètres de gestion du système, consultez la documentation du logiciel de gestion de systèmes. PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Reportez-vous au document Product Information Guide (Guide d’informations sur le produit) pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l’ordinateur et la protection contre les décharges électrostatiques. REMARQUE : si le démarrage du système échoue, appuyez sur le bouton d’ID du système pendant au moins cinq secondes, jusqu’à ce qu’un code d’erreur s’affiche sur l’écran LCD. Notez ce code, puis reportez-vous à la section “Obtention d’aide”, page 145. 1 Voyant de lien 2 Voyant d’activité Tableau 1-6. Codes des voyants de NIC Voyant Code du voyant Les voyants de lien et d’activité sont éteints. Le NIC n’est pas connecté au réseau. Le voyant de lien est vert. Le NIC est connecté à un périphérique valide sur le réseau. Le voyant d’activité clignote en orange. Des données sont en cours d’envoi ou de réception sur le réseau. 1 2Présentation du système 17 Tableau 1-7. Messages d’état affichés sur l’écran LCD Message sur la ligne 2 Message sur la ligne 2 Causes Actions correctrices N/A NOM DU SYSTÈME Chaîne de 62 caractères pouvant être définie par l’utilisateur dans le programme de configuration du système. Ce nom s’affiche dans les cas suivants : • Le système est sous tension. • Le système est hors tension et des erreurs POST sont affichées. Ce message est affiché uniquement pour information. Vous pouvez modifier la chaîne système dans le programme de configuration du système. Voir “Utilisation du programme de configuration du système”, page 33. E1000 FAILSAFE, Call Support Voir “Obtention d’aide”, page 145. E1A14 SAS Cable A Le câble SAS A est mal inséré, manquant ou endommagé. Vérifiez la connexion du câble au niveau du fond de panier SAS. Voir “Connecteurs de la carte de fond de panier SAS”, page 143. E1A15 SAS Cable B Le câble SAS B est mal inséré, manquant ou endommagé. Vérifiez la connexion du câble au niveau du fond de panier SAS. Voir “Connecteurs de la carte de fond de panier SAS”, page 143. E1114 Temp Ambient La température ambiante du système est en dehors des limites autorisées. Voir “Dépannage des incidents de refroidissement du système”, page 120. E1210 CMOS Batt La pile CMOS est manquante ou la tension est en dehors des limites autorisées. Voir “Dépannage de la pile du système”, page 118. E1211 ROMB Batt La pile RAID est manquante ou endommagée, ou bien elle ne peut pas se recharger suite à un incident lié aux conditions thermiques. Réinstallez la pile RAID. Voir les sections “Installation de la pile d’une carte contrôleur RAID SAS”, page 85 et “Dépannage des incidents de refroidissement du système”, page 120. E12nn XX PwrGd Panne du régulateur de tension indiqué. Voir “Obtention d’aide”, page 145. E1229 CPU # VCORE Panne du régulateur de tension VCORE du processeur n. Voir “Obtention d’aide”, page 145.18 Présentation du système E122A CPU # VTT La tension VTT du processeur n a dépassé les limites autorisées. Voir “Obtention d’aide”, page 145. E122B 0.9V Over Voltage Le régulateur de tension 0,9 V a dépassé les limites autorisées. Voir “Obtention d’aide”, page 145. E122C CPU Power Fault Une panne du régulateur de tension a été détectée lors de l’activation du ou des régulateur(s) du processeur. Voir “Obtention d’aide”, page 145. E122D CPU # VDDIO La tension VDDIO du processeur n a dépassé les limites autorisées. Voir “Obtention d’aide”, page 145. E122E CPU # VDDA La tension VDDA du processeur n a dépassé les limites autorisées. Voir “Obtention d’aide”, page 145. E1310 RPM Fan nn Le nombre de tours par minute du ventilateur indiqué est en dehors des limites autorisées. Voir “Dépannage des incidents de refroidissement du système”, page 120. E1313 Fan Redundancy Panne d’un ou de plusieurs ventilateur(s). La redondance des ventilateurs n’est plus assurée. Voir “Dépannage des incidents de refroidissement du système”, page 120. E1410 CPU n IERR Le microprocesseur indiqué renvoie une erreur système. Pour obtenir les informations les plus récentes sur le système, voir le document Information Update Tech Sheet (Fiche technique de mise à jour des informations), qui est accessible à partir du site support.dell.com. Si l’incident persiste, voir “Obtention d’aide”, page 145. Tableau 1-7. Messages d’état affichés sur l’écran LCD (suite) Message sur la ligne 2 Message sur la ligne 2 Causes Actions correctricesPrésentation du système 19 E1414 CPU n Thermtrip La température du microprocesseur spécifié est en dehors des limites autorisées et celui-ci s’est arrêté. Voir “Dépannage des incidents de refroidissement du système”, page 120. Si l’incident persiste, assurez-vous que les dissipateurs de chaleur du microprocesseur sont correctement installés. Voir “Dépannage des microprocesseurs”, page 130. REMARQUE : l’écran LCD continue à afficher ce message jusqu’à ce que le câble d’alimentation du système soit débranché puis rebranché à la source d’alimentation en CA, ou jusqu’à ce que le journal d’événements soit vidé à l’aide de Server Assistant ou de BMC Management Utility. Consultez le document Dell OpenManage Baseboard Management Controller User’s Guide (Guide d’utilisation du contrôleur BMC Dell OpenManage) pour plus d’informations concernant ces utilitaires. E1418 CPU n Presence Le processeur indiqué est manquant ou endommagé et la configuration du système n’est pas prise en charge. Voir “Dépannage des microprocesseurs”, page 130. E1423 CPU # VRM Missing Le module VRM du processeur indiqué est manquant ou défectueux. Retirez ce module et réinstallez-le. Voir “Modules VRM du processeur”, page 73. Si l’incident persiste, la carte système est défectueuse. Voir “Obtention d’aide”, page 145. E141C CPU Mismatch La configuration des processeurs n’est pas prise en charge par Dell. Vérifiez que les processeurs sont de même type et conformes aux spécifications techniques du microprocesseur (voir le document Getting Started Guide [Guide de mise en route] du système). Tableau 1-7. Messages d’état affichés sur l’écran LCD (suite) Message sur la ligne 2 Message sur la ligne 2 Causes Actions correctrices20 Présentation du système E141F CPU Protocol Le BIOS du système a renvoyé une erreur de protocole liée au processeur. Voir “Obtention d’aide”, page 145. E1420 CPU Bus PERR Le BIOS du système a renvoyé une erreur de parité liée au bus du processeur. Voir “Obtention d’aide”, page 145. E1421 CPU Init Le BIOS du système a renvoyé une erreur d’initialisation du processeur. Voir “Obtention d’aide”, page 145. E1422 CPU Machine Chk Le BIOS du système a renvoyé une erreur liée à la vérification du système. Voir “Obtention d’aide”, page 145. E1610 PS n Missing Le bloc d’alimentation indiqué a été retiré ou mal installé. Voir “Dépannage des blocs d’alimentation”, page 119. E1614 PS n Status Le bloc d’alimentation indiqué est défectueux ou mal installé. Voir “Dépannage des blocs d’alimentation”, page 119. E1618 PS n Predictive La tension du bloc d’alimentation est en dehors des limites autorisées. Le bloc d’alimentation indiqué est défectueux ou mal installé. Voir “Dépannage des blocs d’alimentation”, page 119. E161C PS n Input Lost La source d’alimentation du bloc d’alimentation indiqué est indisponible ou en dehors des limites autorisées. Vérifiez la source d’alimentation du bloc d’alimentation indiqué. Si l’incident persiste, voir “Dépannage des blocs d’alimentation”, page 119. E1620 PS n Input Range La source d’alimentation du bloc d’alimentation indiqué est indisponible ou en dehors des limites autorisées. Vérifiez la source d’alimentation du bloc d’alimentation indiqué. Si l’incident persiste, voir “Dépannage des blocs d’alimentation”, page 119. E1624 PS Redundancy La redondance des blocs d’alimentation n’est plus assurée. Si le bloc d’alimentation restant tombe en panne, le système s’arrêtera. Voir “Dépannage des blocs d’alimentation”, page 119. E1625 PS AC Current La source d’alimentation électrique est en dehors des limites autorisées. Vérifiez la source d’alimentation en CA. Tableau 1-7. Messages d’état affichés sur l’écran LCD (suite) Message sur la ligne 2 Message sur la ligne 2 Causes Actions correctricesPrésentation du système 21 E1710 I/O Channel Chk Le BIOS du système a renvoyé une erreur liée à la vérification des canaux d’E-S. Voir “Obtention d’aide”, page 145. E1711 PCI PERR Bnn Dnn Fnn PCI PERR Slot n Le BIOS du système a renvoyé une erreur de parité PCI liée à un composant résidant dans l’espace de configuration PCI du bus nn, périphérique nn, fonction nn. Le BIOS du système a renvoyé une erreur de parité PCI liée à un composant installé dans le logement PCI n. Retirez et réinstallez les cartes d’extension PCI. Si l’incident persiste, voir “Dépannage des cartes d’extension”, page 129. Si l’incident persiste, la carte système est défectueuse. Voir “Obtention d’aide”, page 145. E1712 PCI SERR Bnn Dnn Fnn PCI SERR Slot n Le BIOS du système a renvoyé une erreur système PCI liée à un composant résidant dans l’espace de configuration PCI du bus nn, périphérique nn, fonction nn. Le BIOS du système a renvoyé une erreur système PCI liée à un composant installé dans le logement n. Retirez et réinstallez les cartes d’extension PCI. Si l’incident persiste, voir “Dépannage des cartes d’extension”, page 129. Si l’incident persiste, la carte système est défectueuse. Voir “Obtention d’aide”, page 145. E1714 Unknown Err Le BIOS du système a détecté une erreur système non identifiée. Voir “Obtention d’aide”, page 145. E171F PCIE Fatal Err Bnn Dnn Fnn PCIE Fatal Err Slot n Le BIOS du système a renvoyé une erreur fatale PCIe liée à un composant résidant dans l’espace de configuration PCI du bus nn, périphérique nn, fonction nn. Le BIOS du système a renvoyé une erreur fatale PCIe liée à un composant installé dans le logement n. Retirez et réinstallez les cartes d’extension PCI. Si l’incident persiste, voir “Dépannage des cartes d’extension”, page 129. Si l’incident persiste, la carte système est défectueuse. Voir “Obtention d’aide”, page 145. E1810 HDD nn Fault Le disque dur indiqué est défectueux. Voir “Dépannage d’un disque dur”, page 125. E1811 HDD nn Rbld Abrt Le disque dur indiqué a arrêté la reconstruction avant la fin de l’opération. Voir “Dépannage d’un disque dur”, page 125. Tableau 1-7. Messages d’état affichés sur l’écran LCD (suite) Message sur la ligne 2 Message sur la ligne 2 Causes Actions correctrices22 Présentation du système E1812 HDD nn Removed Le disque dur indiqué a été retiré du système. Ce message s’affiche uniquement à titre d’information. E1914 DRAC5 Conn2 Cbl Le câble DRAC 5 est manquant. Reconnectez ce câble. Voir “Carte RAC”, page 62. E2010 No Memory Aucune mémoire n’est installée dans le système. Installez des barrettes de mémoire. Voir “Mémoire système”, page 64. E2011 Mem Config Err Mémoire détectée mais non configurable. Erreur détectée lors de la configuration de la mémoire. Voir “Dépannage de la mémoire système”, page 121. E2012 Unusable Memory Mémoire configurée mais inutilisable. Échec du sous-système de mémoire. Voir “Dépannage de la mémoire système”, page 121. E2013 Shadow BIOS Fail Le BIOS du système n’est pas parvenu à copier son image flash dans la mémoire. Voir “Dépannage de la mémoire système”, page 121. E2014 CMOS Fail Échec du CMOS. La RAM CMOS ne fonctionne pas correctement. Voir “Obtention d’aide”, page 145. E2015 DMA Controller Échec du contrôleur DMA. Voir “Obtention d’aide”, page 145. E2016 Int Controller Échec du contrôleur d’interruptions. Voir “Obtention d’aide”, page 145. E2017 Timer Fail Échec de rafraîchissement du temporisateur. Voir “Obtention d’aide”, page 145. E2018 Prog Timer Échec du temporisateur d’intervalle programmable. Voir “Obtention d’aide”, page 145. E2019 Parity Error Erreur de parité. Voir “Obtention d’aide”, page 145. E201A SIO Err Échec SIO. Voir “Obtention d’aide”, page 145. E201B Kybd Controller Échec du contrôleur du clavier. Voir “Obtention d’aide”, page 145. E201C SMI Init Échec d’initialisation SMI (System Management Interrupt). Voir “Obtention d’aide”, page 145. E201D Shutdown Test Échec du test d’arrêt du BIOS. Voir “Obtention d’aide”, page 145. E201E POST Mem Test Échec du test mémoire pendant l’auto-test de démarrage du BIOS. Voir “Dépannage de la mémoire système”, page 121. Si l’incident persiste, voir “Obtention d’aide”, page 145. Tableau 1-7. Messages d’état affichés sur l’écran LCD (suite) Message sur la ligne 2 Message sur la ligne 2 Causes Actions correctricesPrésentation du système 23 E201F DRAC Config Échec de la configuration du contrôleur DRAC (Dell Remote Access Controller). Vérifiez si l’écran affiche des messages d’erreur spécifiques. Assurez-vous que le contrôleur DRAC et les câbles correspondants sont correctement installés. Voir “Carte RAC”, page 62. Si l’incident persiste, consultez la documentation du contrôleur DRAC. E2020 CPU Config Échec de configuration du processeur. Vérifiez si l’écran affiche des messages d’erreur spécifiques. E2021 Memory Population Incorrect memory configuration. L’ordre d’insertion des barrettes de mémoire est incorrect. Vérifiez si l’écran affiche des messages d’erreur spécifiques. Voir “Dépannage de la mémoire système”, page 121. E2022 POST Fail Échec général après le test vidéo. Vérifiez si l’écran affiche des messages d’erreur spécifiques. E2110 MBE DIMM nn & nn L’une des barrettes DIMM du groupe “nn & nn” présente une erreur de mémoire multibits (MBE). Voir “Dépannage de la mémoire système”, page 121. E2111 SBE Log Disable DIMM nn Le BIOS du système a désactivé la consignation des erreurs de mémoire portant sur un seul bit (SBE) jusqu’au prochain redémarrage du système. “nn” représente la barrette DIMM indiquée par le BIOS. Voir “Dépannage de la mémoire système”, page 121. I1910 Intrusion Le capot du système a été retiré. Ce message s’affiche uniquement à titre d’information. I1911 >3 ERRs Chk Log Les messages à afficher dépassent la capacité de l’écran LCD. L’écran LCD ne peut afficher que trois messages d’erreur à la suite. Le quatrième message indique que la capacité de l’écran est à son maximum. Vérifiez le journal d’événements du système pour plus de détails. Tableau 1-7. Messages d’état affichés sur l’écran LCD (suite) Message sur la ligne 2 Message sur la ligne 2 Causes Actions correctrices24 Présentation du système Résolution des incidents décrits par les messages d’état de l’écran LCD Le code et le texte affichés sur l’écran LCD permettent souvent d’identifier une panne précise pouvant facilement être corrigée. Par exemple, si le code E0708 PROC_1_Presence s’affiche, cela signifie qu’aucun microprocesseur n’est installé dans le support 1. En outre, il est possible de déterminer la cause de l’incident si plusieurs erreurs de même type surviennent. Par exemple, si vous recevez une série de messages indiquant plusieurs incidents liés à la tension, le problème peut être lié à une défaillance d’un bloc d’alimentation. Suppression des messages d’état de l’écran LCD Pour les pannes liées aux capteurs (de température, de tension, des ventilateurs, etc.), le message de l’écran LCD est supprimé automatiquement lorsque le capteur revient à la normale. Par exemple, l’écran LCD affiche un message indiquant que la température d’un composant n’est pas conforme aux limites acceptables, puis supprime ce message lorsque la température redevient normale. Pour les messages suivants, une intervention de l’utilisateur est requise : • Clear the SEL (Vider le journal d’événements du système) : cette tâche doit être effectuée à partir du logiciel de gestion du système. L’historique des événements du système sera perdu. • Power cycle (Mettre le système hors tension) : mettez le système hors tension et débranchez-le de la prise de courant. Attendez environ 10 secondes, puis rebranchez le câble d’alimentation et redémarrez le système. I1912 SEL Full Le journal d’événements du système est saturé et ne peut plus contenir d’événements. Supprimez des événements du journal. W1228 ROMB Batt < 24hr Ce message avertit qu’il reste moins de 24 heures de charge à la pile RAID. Remplacez la pile RAID. Voir “Installation de la pile d’une carte contrôleur RAID SAS”, page 85. REMARQUE : pour obtenir le nom complet d’une abréviation ou d’un sigle utilisé dans ce tableau, voir le “Glossaire”, page 171. Tableau 1-7. Messages d’état affichés sur l’écran LCD (suite) Message sur la ligne 2 Message sur la ligne 2 Causes Actions correctricesPrésentation du système 25 Ces interventions permettent d’effacer les messages d’erreur. Les voyants d’état et l’écran LCD reviennent à l’état normal. Les messages réapparaîtront dans les conditions suivantes : • Le capteur est revenu à l’état normal mais a de nouveau subi une panne, ayant pour effet de créer une nouvelle entrée dans le journal. • Le système a été réinitialisé et de nouvelles erreurs ont été détectées. • Une panne a été détectée sur une autre source correspondant au même message. Messages système Le système affiche des messages d’erreur pour informer l’utilisateur qu’un incident s’est produit. Le tableau 1-8 répertorie les messages qui peuvent s’afficher et indique leur cause probable, ainsi que les mesures correctives appropriées. REMARQUE : si vous recevez un message du système qui n’est pas répertorié dans le tableau 1-8, vérifiez la documentation de l’application que vous utilisiez au moment où le message est apparu. Vous pouvez aussi vous reporter à la documentation du système d’exploitation pour obtenir une explication du message et l’action conseillée. PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Reportez-vous au document Product Information Guide (Guide d’informations sur le produit) pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l’ordinateur et la protection contre les décharges électrostatiques. Tableau 1-8. Messages système Message Causes Actions correctrices Alert! Node Interleaving disabled! Memory configuration does not support Node Interleaving. La configuration de la mémoire ne prend pas en charge l’imbrication de nœuds. Le système fonctionne, mais de façon réduite. Les barrettes de mémoire doivent être installées dans une configuration prenant en charge l’imbrication de nœuds. Voir “Consignes générales d’installation des barrettes de mémoire”, page 64. Si l’incident persiste, voir “Dépannage de la mémoire système”, page 121. Attempting to update Remote Configuration. Please wait... Une requête de configuration à distance a été détectée et est en cours de traitement. Attendez que le processus se termine. BIOS Update Attempt Failed! La tentative de mise à jour à distance du BIOS a échoué. Réessayez de mettre le BIOS à jour. Si l’incident persiste, voir “Obtention d’aide”, page 145. Caution! NVRAM_CLR jumper is installed on system board. Le cavalier NVRAM_CLR est installé. Le CMOS a été initialisé. Retirez le cavalier NVRAM_CLR Voir la figure 6-1 pour identifier l’emplacement des cavaliers. 26 Présentation du système Diskette drive n seek failure Paramètres incorrects dans le programme de configuration du système. Lancez le programme de configuration du système pour corriger les paramètres. Voir “Utilisation du programme de configuration du système”, page 33. Lecteur de disquette défectueux ou mal installé. Remplacez la disquette. Si l’incident persiste, voir “Dépannage d’un lecteur de disquette”, page 123. Câble d’interface du lecteur de disquette ou câble d’alimentation débranché. Réinsérez le câble d’interface du lecteur de disquette ou le câble d’alimentation. Voir “Dépannage d’un lecteur de disquette”, page 123. Diskette read failure Disquette défectueuse ou mal insérée. Remplacez la disquette. Si l’incident persiste, voir “Dépannage d’un lecteur de disquette”, page 123. Diskette subsystem reset failed Disquette défectueuse ou mal insérée. Remplacez la disquette. Si l’incident persiste, voir “Dépannage d’un lecteur de disquette”, page 123. Drive not ready Disquette manquante ou mal insérée dans le lecteur. Remplacez la disquette. Si l’incident persiste, voir “Dépannage d’un lecteur de disquette”, page 123. Error: Memory failure detected. Memory size reduced. Replace the faulty DIMM as soon as possible. Barrettes de mémoire défectueuses ou mal installées. Voir “Dépannage de la mémoire système”, page 121. Remote configuration update attempt failed Le système n’est pas parvenu à traiter la requête de configuration à distance. Faites une nouvelle tentative. Fatal error caused a system reset: Please check the system event log for details. Erreur fatale du système. Consultez le journal d’événements du système pour en connaître la cause, puis reportez-vous à la section appropriée dans la rubrique “Dépannage du système”, page 109. Gate A20 failure Contrôleur du clavier défectueux ; carte système défectueuse. Voir “Obtention d’aide”, page 145. General failure Le système d’exploitation ne peut pas exécuter la commande. Ce message est habituellement suivi d’informations spécifiques. Notez ces informations et prenez les mesures adéquates pour résoudre l’incident. Tableau 1-8. Messages système (suite) Message Causes Actions correctricesPrésentation du système 27 Invalid NVRAM configuration, resource re-allocated Le système a détecté et corrigé un conflit de ressources. Aucune action n’est requise. Keyboard Controller failure Contrôleur du clavier défectueux ; carte système défectueuse. Voir “Obtention d’aide”, page 145. Manufacturing mode detected Le système est en mode assemblage. Redémarrez le système pour lui faire quitter le mode assemblage. Memory address line failure at adresse, read valeur expecting valeur Barrette(s) de mémoire défectueuse(s) ou mal installée(s). Voir “Dépannage de la mémoire système”, page 121. Memory double word logic failure at adresse, read valeur expecting valeur Memory odd/even logic failure at adresse, read valeur expecting valeur Memory write/read failure at address, read valeur expecting valeur Memory tests terminated by keystroke. Test de la mémoire interrompu lors de l’auto-test de démarrage par une pression de la barre d’espacement. Ce message s’affiche uniquement à titre d’information. No boot device available Sous-système du lecteur optique, du lecteur de disquette ou du disque dur défectueux ou manquant ; disque dur défectueux ou manquant ; aucune disquette de démarrage dans l’unité A. Utilisez une disquette, un CD ou un disque dur amorçable. Si l’incident persiste, voir les sections “Dépannage d’un lecteur de disquette”, page 123, “Dépannage d’un lecteur optique”, page 124 et “Dépannage d’un disque dur”, page 125. Voir “Utilisation du programme de configuration du système”, page 33 pour plus d’informations sur la définition de la séquence d’amorçage. Tableau 1-8. Messages système (suite) Message Causes Actions correctrices28 Présentation du système No boot sector on hard drive Paramètres incorrects dans le programme de configuration du système ; système d’exploitation introuvable sur le disque dur. Vérifiez les paramètres de configuration du disque dur dans le programme de configuration du système. Voir “Utilisation du programme de configuration du système”, page 33. Si nécessaire, installez le système d’exploitation sur le disque dur. Consultez la documentation du système d’exploitation. No timer tick interrupt Carte système défectueuse. Voir “Obtention d’aide”, page 145. Not a boot diskette La disquette ne contient pas de système d’exploitation. Utilisez une disquette amorçable. PCIe Degraded Link Width Error: Embedded Bus#nn/Dev#nn/Funcn Expected Link Width is n Actual Link Width is n Carte PCIe défectueuse ou mal installée dans le support spécifié. Réinstallez la carte PCIe dans le support dont le numéro est spécifié. Voir “Installation d’une carte d’extension”, page 60. Si l’incident persiste, voir “Obtention d’aide”, page 145. PCIe Degraded Link Width Error: Slot n Expected Link Width is n Actual Link Width is n Carte PCIe défectueuse ou mal installée dans le support spécifié. Réinstallez la carte PCIe dans le support dont le numéro est spécifié. Voir “Installation d’une carte d’extension”, page 60. Si l’incident persiste, voir “Obtention d’aide”, page 145. PCIe Fatal Error caused a system reset: Slot n ou Embedded Bus#nn/Dev#nn/Funcn Please check the system event log for details. Carte PCIe défectueuse ou mal installée dans le support spécifié. Réinstallez la carte PCIe dans le support dont le numéro est spécifié. Voir “Installation d’une carte d’extension”, page 60. Si l’incident persiste, voir “Obtention d’aide”, page 145. PCI BIOS failed to install Un échec de la somme de contrôle du périphérique BIOS PCI (ROM d’option) est détecté lors de la duplication miroir. Câbles de carte(s) d’extension mal branchés ; carte d’extension défectueuse ou mal installée. Réinstallez les cartes PCIe dans leur logement. Vérifiez que tous les câbles sont fermement raccordés aux cartes d’extension. Si l’incident persiste, voir “Dépannage des cartes d’extension”, page 129. Tableau 1-8. Messages système (suite) Message Causes Actions correctricesPrésentation du système 29 Plug & Play Configuration Error Une erreur s’est produite lors de l’initialisation d’un périphérique PCI ; la carte système est défectueuse. Installez la fiche du cavalier NVRAM_CLR et redémarrez le système. Voir la figure 6-1 pour identifier l’emplacement des cavaliers. Si l’incident persiste, voir “Dépannage des cartes d’extension”, page 129. Read fault Requested sector not found Le système d’exploitation ne peut pas lire la disquette ou le disque dur, l’ordinateur n’a pas trouvé un secteur particulier sur le disque ou le secteur demandé est défectueux. Remplacez la disquette. Assurez-vous que les câbles du lecteur de disquette et du disque dur sont correctement connectés. Voir “Dépannage d’un lecteur de disquette”, page 123, “Dépannage d’un lecteur optique”, page 124 ou “Dépannage d’un disque dur”, page 125. Remote Access Controller cable error or incorrect card in the RAC slot. Les câbles RAC sont déconnectés ou la carte RAC a été installée dans un logement d’extension incorrect. Vérifiez que les câbles RAC sont correctement connectés et que la carte RAC est installée dans le logement d’extension qui convient. Voir “Carte RAC”, page 62. Remote Access Controller not installed in the RAC slot. La carte RAC est installée dans un logement d’extension incorrect. Vérifiez que la carte RAC est installée dans le logement d’extension qui convient. Voir “Carte RAC”, page 62. Remote configuration update attempt failed Le système n’est pas parvenu à traiter la requête de configuration à distance. Faites une nouvelle tentative. ROM bad checksum = adresse Carte d’extension défectueuse ou mal installée. Réinstallez les cartes PCIe dans leur logement. Vérifiez que tous les câbles sont fermement raccordés aux cartes d’extension. Si l’incident persiste, voir “Dépannage des cartes d’extension”, page 129. SAS port n hard disk drive not found Les câbles SAS ne sont pas connectés correctement, ou bien le lecteur est introuvable. Voir “Dépannage d’un disque dur”, page 125. Sector not found Seek error Seek operation failed Le lecteur de disquette ou le disque dur est défectueux. Voir “Dépannage d’un lecteur de disquette”, page 123 ou “Dépannage d’un disque dur”, page 125. Shutdown failure Le test d’arrêt a échoué. Voir “Dépannage de la mémoire système”, page 121. Tableau 1-8. Messages système (suite) Message Causes Actions correctrices30 Présentation du système The amount of system memory has changed Ajout ou suppression de mémoire, ou barrette de mémoire défectueuse. Si vous venez d’ajouter ou de supprimer de la mémoire, ce message s’affiche uniquement pour information et peut être ignoré. Dans le cas contraire, vérifiez le journal d’événements du système pour identifier les erreurs détectées et remplacez la barrette de mémoire défectueuse. Voir “Dépannage de la mémoire système”, page 121. This system supports only Opteron 8000 series processors. Le ou les microprocesseurs ne sont pas pris en charge par le système. Installez un microprocesseur ou une combinaison de microprocesseurs pris en charge. Voir “Installation d’un processeur”, page 72. Time-of-day clock stopped Pile ou puce défectueuse. Voir “Dépannage de la pile du système”, page 118. Time-of-day not set - please run SETUP program. Paramètres d’heure ou de date incorrects ; pile du système défectueuse. Vérifiez les paramètres de l’heure et de la date. Voir “Utilisation du programme de configuration du système”, page 33. Si l’incident persiste, remplacez la pile du système. Voir “Pile du système”, page 88. Timer chip counter 2 failed Carte système défectueuse. Voir “Obtention d’aide”, page 145. Unsupported CPU combination Unsupported CPU stepping detected Le ou les microprocesseurs ne sont pas pris en charge par le système. Installez un microprocesseur ou une combinaison de microprocesseurs pris en charge. Voir “Installation d’un processeur”, page 72. Utility partition not available Vous avez appuyé sur la touche pendant l’auto-test de démarrage, mais le disque dur d’amorçage ne contient aucune partition d’utilitaires. Créez une partition d’utilitaires sur le disque dur d’amorçage. Reportez-vous aux CD fournis avec le système. Warning: Following faulty DIMMs are disabled: CPUn: DIMM n CPUn: DIMM n Total memory size is reduced. Les barrettes de mémoire utilisées par le processeur n sont défectueuses ou mal installées. Voir “Dépannage de la mémoire système”, page 121. Tableau 1-8. Messages système (suite) Message Causes Actions correctricesPrésentation du système 31 Warning! No microcode update loaded for processor n La mise à jour du micrologiciel a échoué. Mettez le BIOS à jour. Voir “Obtention d’aide”, page 145. Warning: One or more faulty DIMMs found on CPUn Les barrettes de mémoire utilisées par le processeur n sont défectueuses ou mal installées. Voir “Dépannage de la mémoire système”, page 121. Warning: The installed memory configuration is not optimal. For more information on valid memory configurations, please see the system documentation on the technical support web site. La configuration de mémoire n’est pas valide. Le système fonctionne, mais de façon réduite. Les barrettes de mémoire doivent être installées dans une configuration valide. Voir “Consignes générales d’installation des barrettes de mémoire”, page 64. Si l’incident persiste, voir “Dépannage de la mémoire système”, page 121. Write fault Write fault on selected drive Disquette ou disque dur défectueux ; défaillance du sous-système du lecteur optique, du lecteur de disquette ou du disque dur. Voir “Dépannage d’un lecteur de disquette”, page 123, “Dépannage d’un lecteur optique”, page 124 ou “Dépannage d’un disque dur”, page 125. REMARQUE : pour obtenir le nom complet d’une abréviation ou d’un sigle utilisé dans ce tableau, voir le “Glossaire”, page 171. Tableau 1-8. Messages système (suite) Message Causes Actions correctrices32 Présentation du système Messages d’avertissement Un message d’avertissement signale un incident possible et vous demande une réponse avant de laisser le système poursuivre son exécution. Par exemple, lorsque vous lancez le formatage d’une disquette, un message vous avertit que vous allez perdre toutes les données qu’elles contient. Les messages d’avertissement interrompent la tâche en cours et vous demandent de répondre en tapant y (pour oui) ou n (pour non). REMARQUE : ces messages sont générés par l’application ou par le système d’exploitation. Pour plus d’informations, consultez la documentation fournie avec le système d’exploitation ou l’application. Messages de diagnostic Les diagnostics du système peuvent afficher un ou plusieurs messages d’erreur. Ceux-ci ne sont pas traités dans la présente section. Prenez note du message sur une copie de la liste de vérification des diagnostics (voir “Obtention d’aide”, page 145), puis suivez les instructions de cette section pour obtenir une assistance technique. Messages d’alerte Le logiciel de gestion des systèmes génère des messages d’alerte système. Ils comprennent des messages d’informations, d’état, d’avertissement et de panne concernant les conditions des lecteurs, de la température, des ventilateurs et de l’alimentation. Pour obtenir des informations supplémentaires, consultez la documentation du logiciel de gestion des systèmes.Utilisation du programme de configuration du système 33 Utilisation du programme de configuration du système Après avoir installé le système, lancez le programme de configuration pour vous familiariser avec la configuration et les paramètres facultatifs disponibles. Notez les informations contenues dans la configuration pour pouvoir vous y reporter ultérieurement. Vous pouvez utiliser le programme de configuration du système pour : • Modifier les informations de configuration stockées dans la mémoire vive rémanente après l’ajout, la modification ou le retrait de matériel • Définir ou modifier les options que l’utilisateur peut sélectionner, par exemple l’heure et la date du système • Activer ou désactiver les périphériques intégrés • Corriger les incohérences éventuelles entre le matériel installé et les paramètres de configuration Accès au programme de configuration du système 1 Allumez ou redémarrez le système. 2 Appuyez sur immédiatement après le message suivant : = System Setup Si le système d’exploitation commence à se charger alors que vous n’avez pas encore appuyé sur , laissez-le finir de démarrer, puis arrêtez-le et réessayez. REMARQUE : pour arrêter correctement le système, consultez la documentation du système d’exploitation. Réponse aux messages d’erreur Vous pouvez accéder au programme de configuration du système en répondant à certains messages d’erreur. Si un message d’erreur s’affiche quand le système démarre, notez ce message. Avant d’accéder au programme de configuration du système, voir “Messages système”, page 25 pour trouver une explication du message et des suggestions de correction. REMARQUE : il est normal qu’un message d’erreur s’affiche lorsque vous redémarrez le système après avoir installé une extension de mémoire.34 Utilisation du programme de configuration du système Utilisation du programme de configuration du système Le tableau 2-1 répertorie les touches utilisées pour afficher ou modifier les informations affichées dans les écrans du programme de configuration du système, et pour quitter ce programme. REMARQUE : pour la plupart des options, les modifications effectuées sont enregistrées mais ne prennent effet qu’au redémarrage du système. Options du programme de configuration du système Écran principal Lorsque vous accédez au programme de configuration du système, son écran principal apparaît (voir la figure 2-1). Tableau 2-1. Touches de navigation du programme de configuration du système Touches Action Dans le menu principal, sélectionnez une option disposant d’un sous-menu, telle que “Memory Information” (Informations sur la mémoire). Flèche vers le haut ou Le curseur passe au champ précédent. Flèche vers le bas ou Le curseur passe au champ suivant. Barre d’espacement, <+>, <–>, flèche vers la gauche ou vers la droite Permet de faire défiler les options disponibles pour un champ. Vous pouvez également taper la valeur appropriée dans certains champs. <Échap> Quitte le programme et redémarre le système si des changements ont été effectués. Ouvre le fichier d’aide du programme de configuration du système.Utilisation du programme de configuration du système 35 Figure 2-1. Écran principal du programme de configuration du système Le tableau 2-2 répertorie les options et les descriptions des champs qui apparaissent dans l’écran principal du programme de configuration du système. Pour plus d’informations, voir “Options de l’écran System Security (Sécurité du système)”, page 41. REMARQUE : les options disponibles varient en fonction de la configuration du système. REMARQUE : les valeurs par défaut sont répertoriées sous le paramètre correspondant, le cas échéant.36 Utilisation du programme de configuration du système Tableau 2-2. Options du programme de configuration du système Option Description System Time (Heure système) Réinitialise l’heure de l’horloge interne du système. System Date (Date système) Réinitialise la date du calendrier interne du système. Memory Information (Informations sur la mémoire) Affiche des informations relatives à la mémoire installée. Voir “Écran Memory Information (Informations sur la mémoire)”, page 38. CPU Information (Informations sur le processeur) Affiche des informations relatives aux microprocesseurs (vitesse, taille de la mémoire cache, etc.). Voir “Écran CPU Information (Informations sur le processeur)”, page 39. Boot Sequence (Séquence d’amorçage) Détermine l’ordre dans lequel le système recherche les périphériques d’amorçage pendant le démarrage du système. Les options disponibles sont le lecteur de disquette, le lecteur de CD, les disques durs et le réseau. REMARQUE : le démarrage du système à partir d’un périphérique externe connecté à une carte SAS n’est pas pris en charge. Voir le site support.dell.com pour obtenir les informations les plus récentes concernant le démarrage à partir de périphériques externes. Hard-Disk Drive Sequence (Séquence des disques durs) Détermine l’ordre dans lequel le système recherche les disques durs pendant le démarrage du système. Les sélections dépendent des disques durs installés. USB Flash Drive Type (Type de lecteur Flash USB) Auto (option par défaut) Détermine le type d’émulation pour le lecteur flash USB. L’option Hard disk (Disque dur) permet au lecteur flash USB de se comporter comme un disque dur. L’option Floppy (Lecteur de disquette) permet au lecteur flash USB de se comporter comme un lecteur de disquette amovible. L’option Auto choisit automatiquement le type d’émulation. Boot Sequence Retry (Nouvelle tentative de séquence d’amorçage) Si ce champ est activé et si le système n’a pas démarré correctement, ce dernier effectue une nouvelle tentative 30 secondes plus tard. Integrated Devices (Périphériques intégrés) Voir “Écran Integrated Devices (Périphériques intégrés)”, page 40. PCI IRQ Assignment (IRQ affectées aux périphériques PCI) Affiche un écran permettant de modifier l’IRQ affectée à chaque périphérique intégré du bus PCI, ainsi qu’à toutes les cartes d’extension nécessitant une IRQ.Utilisation du programme de configuration du système 37 Serial Communication (Communication série) Off (Désactivé, option par défaut) Les options disponibles sont On with Console Redirection (Activée avec redirection de console) via COM2 et Off (Désactivée). ESM (Embedded Server Management [gestion de serveur intégrée]) Affiche un écran permettant de configurer les options de l’écran LCD du panneau avant et de définir une chaîne affichée sur cet écran. System Security (Sécurité du système) Affiche un écran permettant de configurer le mot de passe système ainsi que les fonctions de mot de passe. Pour plus d’informations, voir les sections “Écran System Security (Sécurité du système)”, page 41, “Utilisation du mot de passe système”, page 43 et “Utilisation du mot de passe de configuration”, page 46. Keyboard NumLock (Touche Verr Num) On (Activé, option par défaut) Détermine si le système démarre en mode Verr Num s’il est équipé d’un clavier à 101 ou 102 touches (cette option ne s’applique pas aux claviers à 84 touches). Report Keyboard Errors (Signaler les erreurs de clavier) Report (Signaler, option par défaut) Active ou désactive la consignation des erreurs liées au clavier pendant l’auto-test de démarrage. Sélectionnez Report (Signaler) pour les systèmes hôtes équipés de claviers. Sélectionnez Do Not Report (Ne pas signaler) pour supprimer tous les messages d’erreur liés au clavier ou à son contrôleur pendant l’auto-test de démarrage. Ce paramètre n’affecte pas le fonctionnement du clavier lui-même, s’il est connecté au système. Tableau 2-2. Options du programme de configuration du système (suite) Option Description38 Utilisation du programme de configuration du système Écran Memory Information (Informations sur la mémoire) Le tableau 2-4 répertorie les descriptions des champs qui apparaissent dans l’écran Memory Information (Informations sur la mémoire). Tableau 2-3. Écran Memory Information (Informations sur la mémoire) Option Description System Memory Size (Taille de la mémoire système) Affiche la quantité de mémoire système. System Memory Type (Type de mémoire système) Affiche le type de la mémoire. System Memory Speed (Vitesse de la mémoire système) Affiche la vitesse de la mémoire système. Video Memory (Mémoire vidéo) Affiche la quantité de mémoire vidéo. System Memory Testing (Test de la mémoire système) Cette option détermine si la mémoire système est testée à chaque démarrage. Les valeurs possibles sont Enabled (Activé) et Disabled (Désactivé). Node Interleaving (Imbrication de nœuds) Lorsque ce champ est activé, l’imbrication de mémoire est prise en charge si une configuration de mémoire symétrique est installée. S’il est désactivé (état par défaut), le système est en mesure de prendre en charge les configurations mémoire NUMA (Non-Uniform Memory Architecture [Architecture mémoire non uniforme]). Voir “Consignes générales d’installation des barrettes de mémoire”, page 64.Utilisation du programme de configuration du système 39 Écran CPU Information (Informations sur le processeur) Le tableau 2-4 répertorie les options et les descriptions des champs qui apparaissent dans l’écran CPU Information (Informations sur le processeur). Activation de la technologie PowerNow!™ La technologie PowerNow! contrôle les performances du processeur du système en réglant automatiquement sa fréquence de fonctionnement et sa tension en fonction de la tâche exécutée. Elle permet d’économiser une quantité considérable d’énergie lorsqu’une application ne requiert pas des performances optimales. Ainsi, le processeur fonctionne à sa vitesse maximale lorsque cela est nécessaire, mais la fonction d’économie d’énergie est utilisée autant que possible. REMARQUE : la prise en charge de PowerNow! dépend du système d’exploitation installé sur le système et de sa version. Pour activer cette fonction, accédez au programme de configuration du système et activez l’option Demand-Based Power Management (Gestion de l’alimentation en fonction de la demande) dans l’écran CPU Information (Informations sur le processeur). Sous Microsoft® Windows® , vous devrez également installer le pilote PowerNow! pour pouvoir activer la fonction. Ce pilote est disponible sur le CD Dell OpenManage Service and Diagnostic fourni avec le système, ainsi que sur le site support.dell.com. Tableau 2-4. Écran CPU Information (Informations sur le processeur) Option Description 64-bit (64 bits) Indique si le ou les processeurs installés prennent en charge les extensions Intel 64 bits. Core Speed (Vitesse d’horloge) Affiche la vitesse d’horloge du ou des processeurs. Bus Speed (Vitesse du bus) Affiche la vitesse de bus du ou des processeurs. Demand-Based Power Management (Gestion de l’alimentation en fonction de la demande) Disabled (Désactivé, option par défaut) Active ou désactive la gestion de l’alimentation en fonction de la demande. Si cette option est activée, les tables d’état des performances du processeur sont envoyées au système d’exploitation. Si l’un des processeurs ne prend pas en charge la gestion de l’alimentation en fonction de la demande, le champ est en lecture seule et est défini sur Disabled (Désactivé). Processor X ID (ID Processeur X) Affiche le numéro de modèle du processeur. Un sous-menu affiche la quantité de mémoire cache de niveau 2 et le nombre de noyaux.40 Utilisation du programme de configuration du système Écran Integrated Devices (Périphériques intégrés) Le tableau 2-5 répertorie les options et les descriptions des champs qui apparaissent dans l’écran Integrated Devices (Périphériques intégrés). Tableau 2-5. Options de l’écran Integrated Devices (Périphériques intégrés) Option Description IDE CD-ROM Controller (Contrôleur de lecteur de CD-ROM IDE) Auto (option par défaut) Active le contrôleur IDE intégré. Si cette option est définie sur Auto, chaque canal du contrôleur IDE intégré est activé si des périphériques IDE sont connectés au canal et si aucun contrôleur IDE externe n’est détecté. REMARQUE : cette option ne s’affiche pas dans le menu si le système n’est pas équipé de ce périphérique en option. User Accessible USB Ports (Ports USB accessibles aux utilisateurs) All Ports On (Tous ports activés, option par défaut) Active ou désactive les ports du système qui sont accessibles à l’utilisateur. Les options disponibles sont All Ports On (Tous ports activés), Only Back Ports On (Ports arrière activés) ou All Ports Off (Tous ports désactivés). La désactivation des ports USB permet de libérer des ressources système pour les autres périphériques. Embedded Gb NIC1 (NIC Gigabit intégré 1) Enabled with PXE (Activé avec PXE, option par défaut) Active ou désactive le NIC1 intégré au système. Les options disponibles sont Enabled without PXE (Activé sans PXE), Enabled with PXE (Activé avec PXE) et Disabled (Désactivé). Le support PXE permet au système de démarrer à partir du réseau. Les modifications prennent effet après le redémarrage du système. MAC Address (Adresse MAC) Affiche l’adresse MAC du NIC1. L’utilisateur ne peut pas modifier la valeur de ce champ. Embedded Gb NIC2 (NIC Gigabit intégré 2) Enabled without PXE (Activé sans PXE, valeur par défaut) Active ou désactive le NIC2 intégré au système. Les options disponibles sont Enabled without PXE (Activé sans PXE), Enabled with PXE (Activé avec PXE) et Disabled (Désactivé). Le support PXE permet au système de démarrer à partir du réseau. Les modifications prennent effet après le redémarrage du système. MAC Address (Adresse MAC) Affiche l’adresse MAC du NIC2. L’utilisateur ne peut pas modifier la valeur de ce champ. TOE Capability (Fonctionnalité TOE) Affiche l’état de la fonctionnalité TOE (TCP/IP Offload Engine, moteur de décentralisation TCP/IP) pour le NIC.Utilisation du programme de configuration du système 41 Écran System Security (Sécurité du système) Le tableau 2-6 répertorie les options et les descriptions des champs qui apparaissent dans l’écran System Security (Sécurité du système). Tableau 2-6. Options de l’écran System Security (Sécurité du système) Option Description System Password (Mot de passe système) Affiche l’état actuel de la fonction de protection par mot de passe et permet d’attribuer et de confirmer un nouveau mot de passe système. REMARQUE : voir “Utilisation du mot de passe système”, page 43 pour obtenir des instructions sur l’attribution, l’utilisation ou la modification d’un mot de passe système existant. Setup Password (Mot de passe de configuration) Restreint l’accès au programme de configuration du système, tout comme le mot de passe système protège l’accès à ce dernier. REMARQUE : voir “Utilisation du mot de passe de configuration”, page 46 pour plus d’instructions sur l’attribution, l’utilisation ou la modification d’un mot de passe de configuration existant. Password Status (État du mot de passe) Si l’option Setup Password (Mot de passe de configuration) est définie sur Enabled (Activé), le mot de passe système ne peut pas être modifié ni désactivé au démarrage du système. Pour empêcher la modification du mot de passe système, définissez un mot de passe de configuration à l’aide de l’option Setup Password (Mot de passe de configuration), puis paramétrez Password Status (État du mot de passe) sur Locked (Verrouillé). Le mot de passe système ne peut alors plus être changé via l’option System Password (Mot de passe système). Il est également impossible de le désactiver au démarrage du système en appuyant sur . Pour déverrouiller le mot de passe système, entrez le mot de passe de configuration dans le champ Setup Password (Mot de passe de configuration) et paramétrez Password Status (État du mot de passe) sur Unlocked (Non verrouillé). Il redevient alors possible de désactiver le mot de passe système au démarrage en appuyant sur , puis de le modifier en utilisant l’option System Password (Mot de passe système).42 Utilisation du programme de configuration du système Écran Exit (Quitter) Une fois que vous avez appuyé sur <Échap> pour quitter le programme de configuration du système, l’écran Exit (Quitter) affiche les options suivantes : • Save Changes and Exit (Enregistrer les modifications et quitter) • Discard Changes and Exit (Annuler les modifications et quitter) • Return to Setup (Retourner au programme de configuration) Power Button (Bouton d’alimentation) Ce bouton met le système sous tension et hors tension. • Si vous éteignez un ordinateur utilisant un système d’exploitation conforme ACPI en appuyant sur le bouton d’alimentation, le système peut effectuer un arrêt normal avant que l’alimentation ne soit coupée. • Si le système d’exploitation n’est pas conforme ACPI, une pression sur ce bouton met immédiatement l’ordinateur hors tension. Ce bouton est activé dans le programme de configuration du système. Si vous sélectionnez “Disabled” (Désactivé), le bouton sert uniquement à mettre le système sous tension. REMARQUE : il est toujours possible d’allumer le système à l’aide du bouton d’alimentation, même si l’option Power Button (Bouton d’alimentation) a la valeur Disabled (Désactivé). NMI Button (Bouton NMI) AVIS : utilisez ce bouton uniquement si un technicien de support qualifié vous demande de le faire, ou si cela est préconisé dans la documentation du système d’exploitation. Lorsque vous appuyez dessus, le système d’exploitation s’arrête et affiche un écran de diagnostic. Active ou désactive la fonction NMI. AC Power Recovery (Retour de l’alimentation secteur) Last (Dernier, option par défaut) Détermine le comportement du système au retour de l’alimentation secteur. L’option Last (Dernier) indique que le système doit revenir au même état qu’avant la coupure d’alimentation. Avec l’option On (Marche), le système démarre dès que l’alimentation en CA est rétablie. Avec l’option Off (Arrêt), il reste hors tension quand l’alimentation est rétablie. Tableau 2-6. Options de l’écran System Security (Sécurité du système) (suite) Option DescriptionUtilisation du programme de configuration du système 43 Mot de passe système et mot de passe de configuration AVIS : les mots de passe offrent simplement une fonction de sécurité de base protégeant les données du système. Si vos données nécessitent une protection plus importante, prenez des mesures supplémentaires (chiffrement des données, etc.). AVIS : il est très facile d’accéder aux données stockées sur le système si vous laissez celui-ci sans surveillance alors que vous n’avez pas défini de mot de passe système. Si l’ordinateur n’est pas verrouillé, une personne non autorisée peut aussi déplacer le cavalier d’activation du mot de passe et effacer celui-ci. À la livraison de l’ordinateur, le mot de passe système n’est pas activé. Si votre système doit impérativement être protégé, ne l’utilisez qu’après avoir activé la protection par mot de passe. Vous ne pouvez changer ou supprimer que les mots de passe que vous connaissez (voir “Suppression ou modification d’un mot de passe système existant”, page 45). Si vous avez oublié votre mot de passe, vous ne pourrez pas faire fonctionner le système ni modifier sa configuration tant qu’un technicien de maintenance qualifié n’aura pas effacé les mots de passe en déplaçant le cavalier approprié sur la carte système. Cette procédure est décrite dans la section “Désactivation d’un mot de passe oublié”, page 139. Utilisation du mot de passe système Si un mot de passe système est défini, seuls ceux qui le connaissent ont accès au système. Si le paramètre System Password (Mot de passe système) est réglé sur Enabled (Activé), le mot de passe doit être entré au démarrage de l’ordinateur. Attribution d’un mot de passe système Avant d’attribuer un mot de passe système, accédez au programme de configuration du système et vérifiez l’option System Password (Mot de passe système). Si un mot de passe système est attribué, l’option System Password a la valeur Enabled (Activé). Si le paramètre Password Status (État du mot de passe) indique Unlocked (Non verrouillé), vous pouvez modifier le mot de passe système. Si Password Status (État du mot de passe) indique Locked (Verrouillé), vous ne pouvez pas modifier ce mot de passe. Si le mot de passe système est désactivé par la position d’un cavalier, l’état est Disabled (Désactivé). Il est alors impossible d’entrer ce mot de passe et de le modifier. Si aucun mot de passe système n’est attribué et si le cavalier de mot de passe de la carte système est sur la position activée (réglage par défaut), l’option System Password (Mot de passe système) est définie sur Not Enabled (Désactivé) et le champ Password Status (État du mot de passe) indique Unlocked (Non verrouillé). Pour attribuer un mot de passe système : 1 Vérifiez que l’option Password Status (État du mot de passe) a la valeur Unlocked (Non verrouillé). 2 Sélectionnez System Password (Mot de passe système) et appuyez sur . 44 Utilisation du programme de configuration du système 3 Tapez le nouveau mot de passe système. Le mot de passe peut contenir jusqu’à 32 caractères. Les caractères entrés ne sont pas affichés dans le champ, ils sont remplacés (y compris les espaces) par des caractères génériques. L’attribution du mot de passe ne tient pas compte de la différence entre majuscules et minuscules. Cependant, certaines combinaisons de touches ne sont pas valides. Pour supprimer un caractère lors de l’entrée de votre mot de passe, appuyez sur la touche ou sur la touche fléchée vers la gauche. REMARQUE : pour quitter le champ sans attribuer de mot de passe, appuyez sur . Vous passerez alors au champ suivant, ou appuyez sur <Échap> à tout moment avant la fin de l’étape 5. 4 Appuyez sur . 5 Pour confirmer votre mot de passe, tapez-le une seconde fois et appuyez sur . L’option System Password (Mot de passe système) prend la valeur Enabled (Activé). Quittez le programme de configuration en sauvegardant et commencez à utiliser le système. 6 Vous pouvez redémarrer le système immédiatement pour activer la protection par mot de passe, ou simplement continuer à travailler. REMARQUE : la protection par mot de passe ne prend effet que lorsque vous redémarrez le système. Protection de l’ordinateur à l’aide d’un mot de passe système REMARQUE : si vous avez attribué un mot de passe de configuration (voir “Utilisation du mot de passe de configuration”, page 46), le système l’accepte également comme mot de passe système. Lorsque le paramètre Password Status (État du mot de passe) a la valeur Unlocked (Non verrouillé), vous pouvez activer ou désactiver la protection par mot de passe. Pour laisser la protection par mot de passe activée : 1 Démarrez le système ou redémarrez-le en appuyant sur . 2 Tapez le mot de passe et appuyez sur . Pour désactiver la protection par mot de passe : 1 Démarrez le système ou redémarrez-le en appuyant sur . 2 Tapez le mot de passe et appuyez sur . Si l’option Password Status (État du mot de passe) a la valeur Locked (Verrouillé) lorsque vous allumez ou redémarrez le système (en appuyant sur ), tapez votre mot de passe et appuyez sur à l’invite du système. Une fois que vous avez tapé le mot de passe système correct et appuyé sur , le système fonctionne normalement.Utilisation du programme de configuration du système 45 Si vous entrez un mot de passe incorrect, le système affiche un message et vous invite à entrer de nouveau votre mot de passe. Vous disposez de trois tentatives pour entrer le bon mot de passe. Après une troisième tentative infructueuse, le système indique qu’il va s’arrêter. L’affichage de ce message peut vous alerter du fait qu’une personne a essayé d’utiliser le système à votre insu. Même si vous avez éteint et redémarré le système, le message d’erreur continue à s’afficher jusqu’à ce que le bon mot de passe soit entré. REMARQUE : vous pouvez combiner l’utilisation des paramètres Password Status (État du mot de passe), System Password (Mot de passe système) et Setup Password (Mot de passe de configuration) pour mieux protéger le système contre toute modification non autorisée. Suppression ou modification d’un mot de passe système existant 1 À l’invite, appuyez sur pour désactiver le mot de passe système existant. S’il vous est demandé d’entrer le mot de passe de configuration, contactez votre administrateur réseau. 2 Pour ouvrir le programme de configuration du système, appuyez sur pendant l’auto-test de démarrage. 3 Sélectionnez le champ System Security (Sécurité du système) pour vérifier que l’option Password Status (État du mot de passe) est définie sur Unlocked (Non verrouillé). 4 À l’invite, entrez le mot de passe système. 5 Vérifiez que l’option System Password (Mot de passe système) est définie sur Not Enabled (Non activé). Si tel est le cas, le mot de passe système a été supprimé. Si l’option System Password (Mot de passe système) est définie sur Enabled (Activé), appuyez sur pour redémarrer le système, puis recommencez les étapes 2 à 5.46 Utilisation du programme de configuration du système Utilisation du mot de passe de configuration Lisez les sections suivantes pour attribuer ou modifier le mot de passe de configuration. Attribution d’un mot de passe de configuration Un mot de passe de configuration ne peut être attribué (ou modifié) que lorsque l’option Setup Password (Mot de passe de configuration) est définie sur Not Enabled (Désactivé). Pour attribuer un mot de passe de configuration, sélectionnez l’option Setup Password (Mot de passe de configuration) et appuyez sur <+> ou sur <–>. Le système vous invite à entrer et à confirmer le mot de passe. Si vous utilisez un caractère non autorisé, le système émet un signal sonore. REMARQUE : le mot de passe de configuration peut être identique à celui du système. si les deux mots de passe sont différents, le mot de passe de configuration peut être utilisé à la place du mot de passe système, mais l’opération inverse n’est pas possible. Le mot de passe peut contenir jusqu’à 32 caractères. Les caractères entrés ne sont pas affichés dans le champ, ils sont remplacés (y compris les espaces) par des caractères génériques. L’attribution du mot de passe ne tient pas compte de la différence entre majuscules et minuscules. Cependant, certaines combinaisons de touches ne sont pas valides. Si vous entrez une de ces combinaisons, le système émet un signal sonore. Pour supprimer un caractère lors de l’entrée de votre mot de passe, appuyez sur la touche ou sur la touche fléchée vers la gauche. Une fois le mot de passe vérifié, le paramètre Setup Password (Mot de passe de configuration) prend la valeur Enabled (Activé). La prochaine fois que vous accéderez au programme de configuration, le système vous demandera d’entrer le mot de passe de configuration. La modification du mot de passe de configuration prend effet immédiatement (il n’est pas nécessaire de redémarrer le système).Utilisation du programme de configuration du système 47 Fonctionnement du système avec un mot de passe de configuration activé Si le paramètre Setup Password (Mot de passe de configuration) a la valeur Enabled (Activé), vous devez entrer ce mot de passe pour modifier la plupart des options de configuration du système. Une invite de saisie s’affiche lorsque vous accédez au programme de configuration du système. Si vous n’entrez pas le bon mot de passe au bout de trois essais, vous pouvez visualiser les écrans de configuration du système mais vous ne pouvez y apporter aucune modification. La seule exception est la suivante : si le paramètre System Password (Mot de passe système) n’a pas la valeur Enabled (Activé) et n’est pas verrouillé par l’option Password Status (État du mot de passe), vous pouvez attribuer un mot de passe système. Cependant, vous ne pouvez pas désactiver ni modifier un mot de passe existant. REMARQUE : il est possible de combiner l’utilisation des options Password Status (État du mot de passe) et Setup Password (Mot de passe de configuration) pour empêcher toute modification du mot de passe système. Suppression ou modification d’un mot de passe de configuration existant 1 Ouvrez le programme de configuration du système et sélectionnez l’option System Security (Sécurité du système). 2 Sélectionnez l’option Setup Password (Mot de passe de configuration), appuyez sur pour accéder à la fenêtre appropriée, et appuyez sur deux fois pour effacer le mot de passe en cours. Le paramètre prend la valeur Not Enabled (Non activé). 3 Si vous souhaitez attribuer un nouveau mot de passe de configuration, suivez les étapes décrites dans la section “Attribution d’un mot de passe de configuration”, page 46.48 Utilisation du programme de configuration du système Désactivation d’un mot de passe oublié Voir “Désactivation d’un mot de passe oublié”, page 139. Configuration du contrôleur BMC Le contrôleur BMC permet de configurer, contrôler et restaurer les systèmes à distance. Il offre les fonctionnalités suivantes : • Utilisation du NIC intégré au système • Consignation des incidents et alertes SNMP • Accès au journal d’événements du système et à l’état du capteur • Contrôle des fonctions du système, y compris la mise sous tension et hors tension • Support indépendant de l’état d’alimentation ou de fonctionnement du système • Redirection de la console de texte pour la configuration du système, les utilitaires à interface texte et les consoles du système d’exploitation REMARQUE : pour accéder à distance au contrôleur BMC à l’aide des NIC intégrés, vous devez connecter le réseau au NIC1 intégré. Pour plus d’informations sur l’utilisation du contrôleur BMC, consultez la documentation des applications BMC et de gestion des systèmes. Accès au module de configuration BMC 1 Allumez ou redémarrez le système. 2 À l’invite qui s’affiche après l’auto-test de démarrage, appuyez sur . Si le système d’exploitation commence à se charger alors que vous n’avez pas encore appuyé sur , laissez-le finir de démarrer, puis arrêtez-le et réessayez. Options du module de configuration du contrôleur BMC Pour plus d’informations concernant les options du module de configuration du contrôleur BMC et du port EMP (port de gestion d’urgence), consultez le document BMC User’s Guide (Guide d’utilisation du contrôleur BMC).Installation des composants du système 49 Installation des composants du système Cette section décrit l’installation des composants suivants : • Cadre avant • Capot du système • Modules de ventilation • Protecteurs de ventilation • Blocs d’alimentation • Cartes d’extension • Carte RAC • Mémoire système • Processeurs • Lecteur de disquette • Lecteur optique • Disques durs • Carte contrôleur SAS • Pile RAID • Lecteur de bande SAS externe • Périphérique Fibre Channel externe • Pile du système • Panneau de commande • Carte intermédiaire de ventilateur • Carte de distribution de l’alimentation • Commutateur d’intrusion du châssis • Carte de fond de panier SAS • Carte système50 Installation des composants du système Outils recommandés Vous pouvez avoir besoin des éléments suivants pour exécuter les procédures de cette section : • Clé du système • Tournevis cruciforme n° 2 • Tournevis Torx T10 • Petit tournevis plat • Bracelet anti-statique Intérieur du système PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Reportez-vous au document Product Information Guide (Guide d’informations sur le produit) pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l’ordinateur et la protection contre les décharges électrostatiques. Sur la figure 3-1, le cadre, le capot et les protecteurs de ventilation ont été retirés pour montrer l’intérieur du système. AVIS : ne retirez pas les protecteurs de ventilation si le système est sous tension. Ceux-ci doivent être installés de manière à diriger la circulation de l’air produit par les ventilateurs. Installation des composants du système 51 Figure 3-1. Intérieur du système La carte système contient les circuits de contrôle du système et d’autres composants électroniques. Les processeurs et les barrettes de mémoire sont installés directement sur cette carte. Les baies de disques durs peuvent accueillir jusqu’à cinq disques SAS de 3,5 pouces (en option). Ceux-ci sont connectés à une carte contrôleur SAS ou RAID SAS (en option) par l’intermédiaire d’un fond de panier SAS. Un support de lecteur amovible peut accueillir un lecteur optique et un lecteur de disquette, tous deux en option. 7 5 8 2 1 6 9 3 4 1 Modules de ventilation (4) 2 Fond de panier SAS 3 Processeurs/dissipateurs de chaleur (4) 4 Barrettes de mémoire (16) 5 Cartes d’extension (7) 6 Carte contrôleur SAS 7 Carte RAC (en option) 8 Lecteur optique slim (en option) 9 Disques durs de 3,5 pouces, en option (5)52 Installation des composants du système Retrait et réinstallation du cadre avant en option 1 Ouvrez le verrou situé sur le côté gauche du cadre. 2 Faites pivoter le côté gauche du cadre pour l’écarter du panneau avant. 3 Dégagez la partie droite du cadre puis retirez-le. Figure 3-2. Retrait et réinstallation du cadre avant en option Pour réinstaller le cache en option, emboîtez sa partie droite sur le châssis, puis remettez le cache sur le système. Bloquez le cadre à l’aide du verrou. Voir la figure 3-2. Ouverture et fermeture du système PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Reportez-vous au document Product Information Guide (Guide d’informations sur le produit) pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l’ordinateur et la protection contre les décharges électrostatiques. PRÉCAUTION : demandez toujours de l’aide avant de soulever le système. N’essayez pas de le soulever seul car vous risqueriez de vous blesser. 1 Verrou 2 Cadre 2 1Installation des composants du système 53 Ouverture du système 1 Sauf si vous installez un composant enfichable à chaud, tel qu’un ventilateur ou un disque dur, vous devez arrêter le système et les périphériques connectés, puis le débrancher de la prise de courant et des périphériques. 2 Tournez le verrou du loquet de fermeture dans le sens inverse des aiguilles d’une montre. Voir la figure 3-3. 3 Soulevez le loquet situé sur la partie supérieure du système puis faites glisser le capot vers l’arrière. Voir la figure 3-3. 4 Saisissez le capot de chaque côté et soulevez-le doucement pour le retirer du système. Figure 3-3. Retrait et réinstallation du capot du système 1 Loquet 2 Verrou du loquet de fermeture 3 Crochets en J 2 1 354 Installation des composants du système Fermeture du système 1 Soulevez le loquet du capot. 2 Alignez le capot avec les bords gauche et droit du système, puis décalez-le légèrement vers l’arrière de façon que les pattes situées à l’intérieur du capot s’enclenchent dans les crochets en J. Voir la figure 3-3. 3 Rabattez le capot sur le châssis et refermez le loquet. 4 Tournez le verrou du loquet de fermeture dans le sens des aiguilles d’une montre pour fixer le capot. Ventilateurs Ce système est équipé de quatre ventilateurs enfichables à chaud, qui sont connectés directement à la carte système. AVIS : en cas de panne, les numéros attribués aux ventilateurs permettent au logiciel de gestion des systèmes de vous indiquer quel ventilateur doit être remplacé. Retrait d’un ventilateur PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Reportez-vous au document Product Information Guide (Guide d’informations sur le produit) pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l’ordinateur et la protection contre les décharges électrostatiques. REMARQUE : la procédure de retrait est la même pour tous les modules de ventilation. 1 Ouvrez le système. Voir “Ouverture du système”, page 53. 2 Appuyez sur les deux loquets situés en haut du ventilateur puis retirez celui-ci. Voir la figure 3-4.Installation des composants du système 55 Figure 3-4. Retrait et installation d’un ventilateur Réinstallation d’un ventilateur REMARQUE : la procédure d’installation est la même pour tous les ventilateurs. 1 Vérifiez que la poignée du ventilateur est relevée et insérez ce dernier sur la base de rétention jusqu’à ce qu’il soit correctement emboîté. Abaissez la poignée du ventilateur jusqu’à ce que vous entendiez un déclic. Voir la figure 3-4. 2 Refermez le système. Voir “Fermeture du système”, page 54. 1 Ventilateur 2 Loquets (2) 3 Connecteur d’alimentation du ventilateur 4 Connecteur d’alimentation du ventilateur sur la baie 5 FAN4 6 FAN2 7 FAN1 8 FAN3 1 2 3 4 8 6 5 756 Installation des composants du système Protecteurs de ventilation Les trois protecteurs de ventilation dirigent la ventilation à l’intérieur du système. Retrait des protecteurs de ventilation AVIS : ne retirez pas les protecteurs de ventilation si le système est sous tension. Ceux-ci doivent être installés de manière à diriger la circulation de l’air produit par les ventilateurs. 1 Saisissez le protecteur de ventilation supérieur par les quatre trous prévus à cet effet, puis soulevez-le pour le retirer du système. Voir la figure 3-5. 2 Retirez les protecteurs de gauche et de droite pour faciliter l’accès aux composants internes du système. Figure 3-5. Retrait et réinstallation des protecteurs de ventilation 1 Protecteur de ventilation de gauche 2 Trous 3 Protecteur de ventilation de droite 4 Protecteur de ventilation supérieur 5 Guide 6 Logement 1 3 2 5 4 6Installation des composants du système 57 Réinstallation des protecteurs de ventilation 1 Insérez verticalement le protecteur de gauche dans le système. Les guides situés sur les bords du protecteur doivent s’insérer dans les fentes correspondantes situées sur les côtés du châssis. Voir la figure 3-5. 2 Appuyez doucement sur le protecteur jusqu’à ce qu’il s’enclenche dans le châssis. 3 Installez le protecteur de droite. 4 Installez le protecteur supérieur. Blocs d’alimentation Le système peut être équipé de deux blocs d’alimentation d’une puissance de sortie de 1570 W. Le second bloc est utilisé comme une source d’alimentation redondante enfichable à chaud. AVIS : le système assure un mode redondant uniquement si deux blocs d’alimentation sont installés et s’ils sont connectés à une source en CA. Si vous installez certains composants tiers (cartes PCI, par exemple) non testés ou non pris en charge par Dell, il est possible que les blocs d’alimentation ne soient pas redondants à certaines tensions en entrée. AVIS : le système risque de surchauffer si vous l’utilisez pendant une période prolongée avec un seul bloc d’alimentation. Retrait d’un bloc d’alimentation 1 Déconnectez le câble d’alimentation du secteur et du bloc que vous souhaitez retirer. 2 Appuyez sur le levier de dégagement et ouvrez-le, puis retirez le bloc d’alimentation du châssis. Voir la figure 3-6. REMARQUE : vous devrez peut-être débloquer et relever le passe-câbles s’il gêne le retrait du bloc d’alimentation. Pour plus d’informations ce dernier, consultez le document Rack Installation Guide (Guide d’installation du rack). 58 Installation des composants du système Figure 3-6. Retrait et réinstallation d’un bloc d’alimentation Réinstallation d’un bloc d’alimentation 1 Tout en maintenant le levier ouvert, faites glisser le nouveau bloc d’alimentation dans le châssis jusqu’à ce que le levier touche le châssis. Voir la figure 3-6. 2 Refermez le levier d’éjection du bloc d’alimentation jusqu’à ce qu’il s’enclenche dans son loquet. Voir la figure 3-6. REMARQUE : si vous avez débloqué le passe-câbles à l’étape 2, remettez-le en place. Pour plus d’informations sur ce dernier, consultez le document Rack Installation Guide (Guide d’installation du rack). 3 Connectez le câble d’alimentation sur le bloc d’alimentation, et branchez l’autre extrémité sur une prise de courant. AVIS : lorsque vous connecterez le câble d’alimentation, faites-le passer dans la boucle du serre-câble. REMARQUE : après avoir installé un nouveau bloc d’alimentation dans un système équipé de deux modules, patientez quelques secondes pour que le système reconnaisse ce module et détermine son état. Le voyant du bloc d’alimentation s’allume en vert si le bloc fonctionne normalement (voir la figure 1-4). 1 Bloc d’alimentation 2 Levier d’éjection 3 Loquet du levier d’éjection 3 1 2Installation des composants du système 59 Cartes d’extension Consignes d’installation des cartes d’extension La carte système peut accueillir jusqu’à huit cartes d’extension PCI-Express (PCIe). Voir la figure 3-7 et le tableau 3-1 : • Logements 1 et 2 : PCIe x4. Le logement 2 peut accueillir une carte pleine longueur. • Logements 3 et 4 : PCIe x8. Ces deux logements peuvent accueillir des cartes d’extension pleine longueur. • Logements 5 à 7 : PCIe x4. Le logement 5 peut accueillir une carte pleine longueur. • Un logement d’extension (INTERNAL_STORAGE) est réservé pour la carte contrôleur SAS du système. • Si vous disposez d’une carte RAC, vous devez l’installer dans le logement RAC_CONN (voir “Carte RAC”, page 62). Figure 3-7. Logements d’extension SLOT 5 SLOT 7 SLOT 6 SLOT 2 SLOT 4 SLOT 3 SLOT 1 INTERNAL_ STORAGE RAC_CONN Arrière du système Avant du système60 Installation des composants du système Installation d’une carte d’extension PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Reportez-vous au document Product Information Guide (Guide d’informations sur le produit) pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l’ordinateur et la protection contre les décharges électrostatiques. 1 Déballez la carte d’extension et préparez-la en vue de son installation. Pour obtenir des instructions, consultez la documentation fournie avec la carte. 2 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant. 3 Ouvrez le système. Voir “Ouverture du système”, page 53. 4 Si vous ajoutez une nouvelle carte, sélectionnez un logement d’extension approprié. Voir “Consignes d’installation des cartes d’extension”, page 59. 5 Ouvrez le taquet de fixation de la carte d’extension et retirez la plaque de recouvrement. Voir la figure 3-8. 6 Installez la carte d’extension : a En tenant la carte par les bords, positionnez-la en alignant son connecteur latéral avec le connecteur d’extension correspondant de la carte système. AVIS : si vous installez une carte contrôleur RAID SAS, évitez d’appuyer sur la barrette de mémoire lors de cette opération. b Insérez le connecteur latéral jusqu’à ce que la carte soit correctement installée. c Fermez le taquet de fixation des cartes. Voir la figure 3-8. Tableau 3-1. Logements d’extension Logement Description SLOT 1 PCIe x4 SLOT 2 PCIe x4 SLOT 3 PCIe x8 SLOT 4 PCIe x8 SLOT 5 PCIe x4 SLOT 6 PCIe x4 SLOT 7 PCIe x4 INTERNAL_STORAGE Réservé pour les cartes contrôleur RAC_CONN Réservé pour une carte RACInstallation des composants du système 61 Figure 3-8. Retrait et installation d’une carte d’extension 7 Connectez tous les câbles requis sur la carte d’extension. • Si vous installez une carte RAC, voir “Carte RAC”, page 62. • Si vous installez une carte contrôleur SAS, voir “Installation d’une carte contrôleur SAS”, page 85. 8 Refermez le système. Voir “Fermeture du système”, page 54. 1 Guide d’alignement (cartes pleine longueur uniquement) 2 Carte d’extension 3 Taquet de fixation des cartes d’extension 3 2 162 Installation des composants du système Retrait d’une carte d’extension PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Reportez-vous au document Product Information Guide (Guide d’informations sur le produit) pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l’ordinateur et la protection contre les décharges électrostatiques. 1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant. 2 Ouvrez le système. Voir “Ouverture du système”, page 53. 3 Déconnectez tous les câbles de la carte. 4 Retirez la carte d’extension : a Ouvrez le taquet de fixation des cartes. Voir la figure 3-8. b Tenez la carte d’extension par les coins supérieurs et retirez-la doucement de son connecteur. 5 Si vous retirez la carte et ne la remplacez pas, installez une plaque de recouvrement métallique sur l’ouverture du logement vide et refermez le taquet. REMARQUE : l’installation d’une plaque de recouvrement sur les logements d’extension vides est obligatoire pour que le système reste conforme à l’homologation FCC (Federal Communications Commission). Ces plaques empêchent en outre la poussière et les impuretés de pénétrer dans le système et facilitent le refroidissement et la ventilation. 6 Refermez le système. Voir “Fermeture du système”, page 54. Carte RAC 1 Déballez la carte RAC et préparez-la en vue de son installation. Pour obtenir des instructions, consultez la documentation fournie avec la carte. 2 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant. 3 Ouvrez le système. Voir “Ouverture du système”, page 53. 4 Retirez les protecteurs de ventilation. Voir “Retrait des protecteurs de ventilation”, page 56. 5 Retirez l’obturateur de prise du panneau arrière du système. Voir la figure 1-3. 6 Retirez la carte contrôleur de stockage du logement INTERNAL_STORAGE : a Déconnectez tous les câbles de données de la carte. b Tenez la carte contrôleur de stockage par les coins et retirez-la doucement de son connecteur.Installation des composants du système 63 7 Installez la carte RAC dans le logement RAC_CONN : a Placez la carte RAC de sorte que son connecteur de NIC s’insère dans l’ouverture appropriée du panneau arrière. Voir la figure 3-9. b Positionnez la carte en alignant son connecteur latéral avec le connecteur correspondant de la carte système. c Insérez le connecteur latéral jusqu’à ce que la carte soit correctement installée. 8 Connectez le câble de gestion (50 broches) et le câble MII (44 broches) fournis avec la carte RAC sur cette dernière (voir la figure 3-9), puis sur les deux connecteurs correspondants de la carte système. Figure 3-9. Connecteurs de la carte RAC 9 Réinstallez la carte contrôleur de stockage. 10 Réinstallez les protecteurs de ventilation. Voir “Réinstallation des protecteurs de ventilation”, page 57. 11 Reconnectez tous les câbles à la carte contrôleur de stockage en les acheminant de manière appropriée le long des protecteurs de ventilation. 12 Refermez le système. Voir “Fermeture du système”, page 54. 13 Rebranchez le système à la prise de courant et allumez-le, ainsi que les périphériques connectés. 1 Connecteur RJ-45 2 Connecteur du câble MII (44 broches) 3 Connecteur du câble de gestion (50 broches) 1 3 264 Installation des composants du système 14 Accédez au programme de configuration du système et vérifiez que le paramètre de la séquence d’amorçage a été modifié pour prendre en compte la présence de la carte RAC. Voir “Using the System Setup Program” (Utilisation du programme de configuration du système), dans le document Hardware Owner’s Manual (Manuel du propriétaire). 15 Quittez le programme de configuration du système et redémarrez l’ordinateur. Lorsque le système démarre, le message Remote Access Control Detected (Dispositif d’accès distant détecté) s’affiche, ainsi que des informations concernant la mémoire morte et le micrologiciel de la carte. Appuyez sur pour accéder à l’écran de configuration de la carte. Consultez la documentation de cette dernière pour plus d’informations sur sa configuration et son utilisation. Mémoire système Vous pouvez ajouter de la mémoire supplémentaire au système (maximum autorisé : 32 Go pour les configurations à deux processeurs ; 64 Go pour celles à quatre processeurs). Pour ce faire, installez des barrettes DDR II à 667 MHz, par paires de 512 Mo, 1 Go, 2 Go ou 4 Go. Les seize logements de mémoire se trouvent sur la carte système, sous les protecteurs de ventilation. Chaque processeur dispose de quatre canaux de mémoire organisés en deux paires de deux. Le système prend en charge l’architecture NUMA. Chaque processeur dispose d’un contrôleur de mémoire qui lui est propre, ainsi que d’une mémoire locale qui permet de réduire les temps d’accès ; il peut également accéder à la mémoire d’un autre processeur. Cette architecture améliore les performances du système si le système d’exploitation installé la prend en charge. AVIS : pour activer l’architecture NUMA, ouvrez le programme de configuration du système et désactivez l’option Node Interleaving (Imbrication de nœuds). Voir “Utilisation du programme de configuration du système”, page 33. Consignes générales d’installation des barrettes de mémoire Pour optimiser les performances du système, observez les consignes suivantes lorsque vous configurez la mémoire système. • Les barrettes de mémoire doivent être installées par paires, en commençant par les logements DIMM1 et DIMM2 (processeur 1), DIMM5 et DIMM6 (processeur 2), DIMM9 et DIMM10 (processeur 3), enfin DIMM13 et DIMM14 (processeur 4). • Les barrettes doivent être de vitesse et de technologie identiques. Deux barrettes d’une même paire doivent avoir les mêmes caractéristiques. La mémoire peut être installée dans une configuration à deux processeurs (tableau 3-2) ou à quatre processeurs (tableau 3-3). Installation des composants du système 65 Tableau 3-2. Configurations de mémoire à deux processeurs Mémoire système totale CPU 1 CPU2 DIMM1 DIMM2 DIMM3 DIMM4 DIMM5 DIMM6 DIMM7 DIMM8 2 Go 512 Mo 512 Mo 512 Mo 512 Mo 4 Go 512 Mo 512 Mo 512 Mo 512 Mo 512 Mo 512 Mo 512 Mo 512 Mo 4 Go 1 Go 1 Go 1 Go 1 Go 6 Go 1 Go 1 Go 512 Mo 512 Mo 1 Go 1 Go 512 Mo 512 Mo 8 Go 1 Go 1 Go 1 Go 1 Go 1 Go 1 Go 1 Go 1 Go 8 Go 2 Go 2 Go 2 Go 2 Go 16 Go 2 Go 2 Go 2 Go 2 Go 2 Go 2 Go 2 Go 2 Go 16 Go 4 Go 4 Go 4 Go 4 Go 24 Go 4 Go 4 Go 2 Go 2 Go 4 Go 4 Go 2 Go 2 Go 32 Go 4 Go 4 Go 4 Go 4 Go 4 Go 4 Go 4 Go 4 Go Tableau 3-3. Configurations de mémoire à quatre processeurs Mémoire système totale CPU 1 CPU2 CPU3 CPU4 Barrette DIMM Barrette DIMM Barrette DIMM Barrette DIMM 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 4 Go 512 Mo 512 Mo 512 Mo 512 Mo 512 Mo 512 Mo 512 Mo 512 Mo 8 Go 512 Mo 512 Mo 512 Mo 512 Mo 512 Mo 512 Mo 512 Mo 512 Mo 512 Mo 512 Mo 512 Mo 512 Mo 512 Mo 512 Mo 512 Mo 512 Mo 8 Go 1 Go 1 Go 1 Go 1 Go 1 Go 1 Go 1 Go 1 Go 12 Go 1 Go 1 Go 512 Mo 512 Mo 1 Go 1 Go 512 Mo 512 Mo 1 Go 1 Go 512 Mo 512 Mo 1 Go 1 Go 512 Mo 512 Mo66 Installation des composants du système Installation de barrettes de mémoire PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Reportez-vous au document Product Information Guide (Guide d’informations sur le produit) pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l’ordinateur et la protection contre les décharges électrostatiques. PRÉCAUTION : les barrettes DIMM restent chaudes un certain temps après la mise hors tension du système. Laissez-les tiédir avant de les manipuler. Tenez-les par les bords en évitant de toucher leurs composants. 1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant. 2 Ouvrez le système. Voir “Ouverture du système”, page 53. 3 Retirez les protecteurs de ventilation. Voir “Retrait des protecteurs de ventilation”, page 56. 4 Identifiez les connecteurs de barrettes de mémoire. Voir la figure 6-2. 5 Appuyez sur les dispositifs d’éjection du support, puis écartez-les (voir la figure 3-10) pour pouvoir insérer la barrette. 6 Tenez chaque barrette de mémoire par les bords, sans toucher la partie centrale. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 16 Go 1 Go 1 Go 1 Go 1 Go 1 Go 1 Go 1 Go 1 Go 1 Go 1 Go 1 Go 1 Go 1 Go 1 Go 1 Go 1 Go 16 Go 2 Go 2 Go 2 Go 2 Go 2 Go 2 Go 2 Go 2 Go 24 Go 2 Go 2 Go 1 Go 1 Go 2 Go 2 Go 1 Go 1 Go 2 Go 2 Go 1 Go 1 Go 2 Go 2 Go 1 Go 1 Go 32 Go 2 Go 2 Go 2 Go 2 Go 2 Go 2 Go 2 Go 2 Go 2 Go 2 Go 2 Go 2 Go 2 Go 2 Go 2 Go 2 Go 32 Go 4 Go 4 Go 4 Go 4 Go 4 Go 4 Go 4 Go 4 Go 48 Go 4 Go 4 Go 2 Go 2 Go 4 Go 4 Go 2 Go 2 Go 4 Go 4 Go 2 Go 2 Go 4 Go 4 Go 2 Go 2 Go 64 Go 4 Go 4 Go 4 Go 4 Go 4 Go 4 Go 4 Go 4 Go 4 Go 4 Go 4 Go 4 Go 4 Go 4 Go 4 Go 4 Go Tableau 3-3. Configurations de mémoire à quatre processeurs (suite) Mémoire système totale CPU 1 CPU2 CPU3 CPU4 Barrette DIMM Barrette DIMM Barrette DIMM Barrette DIMMInstallation des composants du système 67 Figure 3-10. Retrait et installation d’une barrette de mémoire 7 Alignez le connecteur latéral de la barrette avec le détrompeur du support, puis insérez la barrette dans le support. REMARQUE : les détrompeurs permettent de s’assurer que la barrette sera insérée dans le bon sens. 8 Appuyez sur la barrette de mémoire avec les pouces tout en relevant les dispositifs d’éjection avec les index pour verrouiller la barrette dans son support. Si la barrette est installée correctement, les dispositifs d’éjection sont alignés avec ceux des autres connecteurs contenant également des barrettes. 9 Recommencez la procédure, de l’étape 5 à l’étape 8, pour installer les barrettes de mémoire restantes. Voir le tableau 3-2 ou le tableau 3-3. 10 Réinstallez les protecteurs de ventilation. Voir “Retrait et réinstallation des protecteurs de ventilation”, page 56. 11 Refermez le système. Voir “Fermeture du système”, page 54. 1 Barrette de mémoire 2 Dispositifs d’éjection (2) 3 Détrompeur 2 1 368 Installation des composants du système 12 Démarrez le système, appuyez sur pour accéder au programme de configuration du système, puis vérifiez le paramètre System Memory (Mémoire système) dans l’écran System Setup (Configuration du système) principal. La valeur indiquée doit déjà avoir été modifiée par le système pour prendre en compte la mémoire qui vient d’être installée. 13 Si la valeur est fausse, il est possible qu’une ou plusieurs barrettes de mémoire soient mal installées. Recommencez la procédure, de l’étape 2 à l’étape 12, en vérifiant que les barrettes de mémoire sont correctement insérées dans leur support. 14 Exécutez le test de mémoire des diagnostics du système. Voir “Exécution des diagnostics du système”, page 133. Retrait de barrettes de mémoire PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Reportez-vous au document Product Information Guide (Guide d’informations sur le produit) pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l’ordinateur et la protection contre les décharges électrostatiques. PRÉCAUTION : les barrettes DIMM restent chaudes un certain temps après la mise hors tension du système. Laissez-les tiédir avant de les manipuler. Tenez-les par les bords en évitant de toucher leurs composants. 1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant. 2 Ouvrez le système. Voir “Ouverture du système”, page 53. 3 Retirez les protecteurs de ventilation. Voir “Retrait des protecteurs de ventilation”, page 56. 4 Repérez les connecteurs de barrettes de mémoire. Voir la figure 6-2. 5 Écartez les dispositifs d’éjection situés à chaque extrémité du support pour extraire la barrette de mémoire. Voir la figure 3-10. Tenez chaque barrette de mémoire par les bords, sans toucher la partie centrale. 6 Réinstallez les protecteurs de ventilation. Voir “Réinstallation des protecteurs de ventilation”, page 57. 7 Refermez le système. Voir “Fermeture du système”, page 54.Installation des composants du système 69 Processeurs Le système peut prendre en charge deux ou quatre processeurs. Pour tirer parti des futures options en matière de vitesse et des nouvelles fonctionnalités émergentes, vous pouvez mettre les processeurs existants à niveau, ou en ajouter un troisième et un quatrième. Chaque processeur (et sa mémoire cache interne) est contenu dans une matrice LGA (Land Grid Array), qui est installée dans un support de la carte système. AVIS : tous les processeurs doivent avoir la même fréquence d’horloge et la même tension de cœur. Retrait d’un processeur 1 Avant de mettre le système à niveau, téléchargez puis installez la version du BIOS système la plus récente, disponible à l’adresse support.dell.com. 2 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant. 3 Ouvrez le système. Voir “Ouverture du système”, page 53. 4 Retirez les protecteurs de ventilation. Voir “Retrait des protecteurs de ventilation”, page 56. AVIS : il se peut que le processeur reste attaché au dissipateur de chaleur et se désolidarise de son support lorsque vous retirez le dissipateur. C’est pourquoi il est recommandé de retirer le dissipateur de chaleur quand le processeur est tiède. AVIS : ne retirez jamais le dissipateur de chaleur d’un processeur si vous n’avez pas l’intention de retirer le processeur lui-même. Le dissipateur de chaleur est indispensable pour maintenir les conditions de température adéquates. AVIS : le processeur et le dissipateur de chaleur peuvent être brûlants. Laissez-les tiédir avant de les manipuler. 5 Appuyez sur le taquet bleu situé à l’extrémité de l’un des leviers de fixation du dissipateur de chaleur, puis relevez ce levier de 90 degrés. Voir la figure 3-11.70 Installation des composants du système Figure 3-11. Retrait et installation du dissipateur de chaleur 6 Patientez 30 secondes, le temps que le dissipateur de chaleur se détache du processeur. 7 Ouvrez l’autre levier de fixation du dissipateur de chaleur. 8 Si le dissipateur de chaleur ne se détache pas du processeur, faites-le tourner doucement dans le sens des aiguilles d’une montre, puis dans l’autre sens jusqu’à ce qu’il se détache (ne tirez pas dessus pour le détacher du processeur). 1 Dissipateur de chaleur 2 Leviers de fixation du dissipateur de chaleur (2) 3 Loquet du levier de fixation 2 1 3Installation des composants du système 71 9 Soulevez le dissipateur de chaleur pour le dégager du processeur et mettez-le de côté en le posant à l’envers. 10 À l’aide d’un chiffon propre et non pelucheux, retirez la graisse thermique qui recouvre la surface du cadre de protection du processeur. 11 Relevez le levier d’éjection de 90 degrés jusqu’à ce que le processeur sorte de son support. Voir la figure 3-12. Figure 3-12. Retrait et installation du processeur 12 Ouvrez le cadre de protection du processeur puis retirez le processeur de son support. Laissez le levier relevé afin de pouvoir installer le nouveau processeur. AVIS : veillez à ne pas tordre les broches du support lors du retrait du processeur. Vous risqueriez d’endommager définitivement le support et la carte système. 1 Processeur 2 Cache de support (doit être retiré avant l’installation d’un nouveau processeur) 3 Levier d’éjection 4 Support 5 Cadre de protection du processeur 6 Repères (2) 2 4 5 1 6 372 Installation des composants du système Installation d’un processeur 1 Déballez le nouveau processeur. 2 Alignez le processeur avec les deux repères du support. Voir la figure 3-12. 3 Si vous installez un processeur dans un support vide, procédez comme suit : a Retirez le cache recouvrant le support. Voir la figure 3-12. b Relevez le levier d’éjection de 90 degrés. Voir la figure 3-12. c Relevez le cadre de protection du processeur. Voir la figure 3-12. 4 Installez le processeur dans le support. AVIS : un mauvais positionnement risquerait d’endommager définitivement la carte système ou le processeur lorsque vous remettrez le système sous tension. a Si ce n’est déjà fait, redressez le levier d’éjection. b Une fois que vous avez aligné le processeur sur les repères, insérez-le doucement dans le support. AVIS : ne forcez pas lorsque vous installez le processeur. S’il est positionné correctement, il s’insère dans le support très facilement. c Fermez le cadre de protection du processeur. Voir la figure 3-12. d Abaissez le levier d’éjection du support jusqu’à ce qu’il s’enclenche et verrouille le processeur. Voir la figure 3-12. 5 Installez le dissipateur de chaleur. REMARQUE : si aucun nouveau dissipateur de chaleur n’est fourni, utilisez celui que vous avez retiré à l’étape 9. a Si un nouveau dissipateur de chaleur vous a été fourni avec le kit du processeur, retirez le feuillet de protection de la couche de graisse thermique déjà appliquée sur le dessus du dissipateur. Voir la figure 3-11. Si le kit a été livré sans dissipateur de chaleur, appliquez une couche de graisse thermique neuve : • À l’aide d’un chiffon propre et non pelucheux, retirez la graisse qui recouvre le dissipateur de chaleur. • Ouvrez le paquet de graisse fourni avec le kit du processeur et appliquez-en une couche régulière sur le dessus du processeur. b Placez le dissipateur de chaleur sur le processeur. Voir la figure 3-11. c Fermez puis verrouillez l’un des deux leviers de fixation du dissipateur de chaleur. Voir la figure 3-11. d Fermez puis verrouillez le second levier de fixation du dissipateur de chaleur. AVIS : lorsque vous ajoutez un troisième puis un quatrième processeur, vous devez également installer un module VRM (régulateur de tension) pour chacun d’entre eux. Voir “Installation d’un module VRM”, page 73.Installation des composants du système 73 6 Réinstallez les protecteurs de ventilation. Voir “Réinstallation des protecteurs de ventilation”, page 57. 7 Refermez le système. Voir “Fermeture du système”, page 54. 8 Redémarrez le système. Lorsque le système démarre, il détecte la présence du ou des nouveau(x) processeur(s) et modifie automatiquement les informations du programme de configuration du système. 9 Appuyez sur pour accéder au programme de configuration du système et vérifier que les informations relatives au processeur correspondent bien à la nouvelle configuration. Voir “Utilisation du programme de configuration du système”, page 33 pour plus d’instructions concernant l’utilisation du programme de configuration du système. 10 Exécutez les diagnostics du système pour vérifier que le nouveau processeur fonctionne correctement. Voir “Exécution des diagnostics du système”, page 133 pour plus d’informations concernant l’exécution des diagnostics. Modules VRM du processeur Lorsque vous ajoutez un troisième puis un quatrième processeur, vous devez également installer un module VRM (régulateur de tension) pour chacun d’entre eux. Installation d’un module VRM PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Reportez-vous au document Product Information Guide (Guide d’informations sur le produit) pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l’ordinateur et la protection contre les décharges électrostatiques. 1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant. 2 Ouvrez le système. Voir “Ouverture du système”, page 53. 3 Retirez le protecteur de ventilation supérieur. Voir “Retrait des protecteurs de ventilation”, page 56. 4 Repérez les supports des deux modules VRM. Voir la figure 6-2. 5 Appuyez sur les dispositifs d’éjection du support puis écartez-les (voir la figure 3-13) pour pouvoir insérer le module VRM dans le support.74 Installation des composants du système Figure 3-13. Retrait et installation d’un module VRM 6 Tout en maintenant le module VRM par les bords, alignez son connecteur latéral avec le support, puis insérez le module. REMARQUE : le support est muni d’un détrompeur qui permet de s’assurer que le module VRM sera inséré dans le bon sens. 7 Appuyez sur le VRM avec les pouces tout en relevant les dispositifs d’éjection avec les index pour verrouiller le module dans le connecteur. 8 Recommencez la procédure, de l’étape 5 à l’étape 7, pour installer le second module VRM. 9 Réinstallez le protecteur de ventilation supérieur. Voir “Réinstallation des protecteurs de ventilation”, page 57. 10 Refermez le système. Voir “Fermeture du système”, page 54. 1 Module VRM 2 Dispositifs d’éjection (2) 2 1Installation des composants du système 75 Retrait d’un module VRM PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Reportez-vous au document Product Information Guide (Guide d’informations sur le produit) pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l’ordinateur et la protection contre les décharges électrostatiques. PRÉCAUTION : les modules VRM restent chauds un certain temps après la mise hors tension du système. Laissez-les tiédir avant de les manipuler. Tenez toujours les modules par les bords. 1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant. 2 Ouvrez le système. Voir “Ouverture du système”, page 53. 3 Retirez le protecteur de ventilation supérieur. Voir “Retrait des protecteurs de ventilation”, page 56. 4 Repérez les supports des modules VRM. Voir la figure 6-2. 5 Appuyez sur les dispositifs d’éjection du support, puis écartez-les pour extraire le module VRM. Voir la figure 3-13. Installation d’un lecteur de disquette 1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant. 2 Retirez le cadre avant, s’il est installé. Voir “Retrait et réinstallation du cadre avant en option”, page 52. 3 Pour retirer le support de lecteur, tirez le loquet de dégagement et faites glisser le support hors du châssis. Voir la figure 3-14.76 Installation des composants du système Figure 3-14. Retrait et installation du support de lecteur optique/de disquette 4 Retirez le lecteur optique ou le cache correspondant du support : a Desserrez la vis du loquet maintenant le lecteur optique ou le cache. Voir la figure 3-15. b Dégagez le loquet. c Soulevez le lecteur optique ou le cache pour l’extraire du support. 1 Loquet de dégagement 2 Support du lecteur optique ou du lecteur de disquette 2 1Installation des composants du système 77 Figure 3-15. Installation d’un lecteur de disquette dans le support 1 Support du lecteur optique ou du lecteur de disquette 2 Plots d’alignement 3 Lecteur de disquette 4 Ressort de rétention 5 Cache de la baie de lecteur optique 6 Carte d’interface 7 Rivets en plastique (2) 8 Loquet 9 Vis moletée 1 3 9 6 8 7 2 5 478 Installation des composants du système 5 Pour retirer la plaque recouvrant la baie du lecteur de disquette, écartez légèrement le ressort et soulevez la plaque. 6 Déplacez légèrement le ressort et insérez le lecteur de disquette dans le support. Les plots du support doivent s’engager dans les trous correspondants sur le côté du lecteur. Voir la figure 3-15. 7 Remettez le lecteur optique ou le cache correspondant dans le support. Les plots du support doivent s’engager dans les trous correspondants sur le côté du lecteur. 8 Réenclenchez le loquet et serrez la vis. 9 Insérez le support contenant le lecteur jusqu’à ce que son plateau s’enclenche. Voir la figure 3-15 10 Réinstallez le cadre avant, le cas échéant. Voir “Retrait et réinstallation du cadre avant en option”, page 52. 11 Rebranchez le système et les périphériques sur leurs prises électriques. Installation d’un lecteur optique Il est possible de monter un lecteur optique slim (en option) sur un plateau qui s’installe dans le panneau avant et se connecte au contrôleur de la carte système par l’intermédiaire du fond de panier SAS. REMARQUE : les périphériques DVD sont uniquement des périphériques de données. 1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant. 2 Retirez le cadre. Voir “Retrait et réinstallation du cadre avant en option”, page 52. 3 Pour retirer le support de lecteur, tirez le loquet de dégagement et faites glisser le support hors du châssis. Voir la figure 3-14. 4 Retirez du support le cache du lecteur optique : a Desserrez la vis du loquet maintenant le lecteur optique ou le cache. Voir la figure 3-16. b Dégagez le loquet. c Soulevez la plaque de recouvrement.Installation des composants du système 79 Figure 3-16. Installation d’un lecteur optique dans le support 5 Installez le nouveau lecteur optique dans le support. Voir la figure 3-16. Les plots du support doivent s’engager dans les trous correspondants sur le côté du lecteur. 6 Fixez la carte d’interface sur l’arrière du support à l’aide des deux rivets de plastique. Voir la figure 3-16. 7 Réenclenchez le loquet et serrez la vis. 8 Insérez le support contenant le lecteur jusqu’à ce que le plateau s’enclenche. Voir la figure 3-14 9 Réinstallez le cadre avant, le cas échéant. Voir “Retrait et réinstallation du cadre avant en option”, page 52. 10 Rebranchez le système et les périphériques sur leurs prises électriques. 1 Support du lecteur optique ou du lecteur de disquette 2 Lecteur optique 3 Carte d’interface 4 Rivets en plastique (2) 5 Loquet 6 Vis moletée 1 6 3 5 4 280 Installation des composants du système Disques durs Le système peut accueillir jusqu’à cinq disques durs SAS de 3,5 pouces. Tous les disques sont connectés à la carte système par l’intermédiaire d’une carte de fond de panier SAS. Voir “Fond de panier SAS (maintenance uniquement)”, page 99 pour plus d’informations sur les options de cette dernière. Les systèmes équipés d’un contrôleur RAID SAS (en option) prennent en charge l’insertion à chaud. La figure 3-17 montre les ID des disques. Figure 3-17. ID des disques durs Avant de commencer AVIS : avant de tenter de retirer ou d’installer un lecteur pendant que le système est en cours d’exécution, reportez-vous à la documentation de la carte contrôleur RAID SAS pour vérifier que la configuration de l’adaptateur à l’hôte lui permet de prendre en charge le retrait et l’insertion à chaud. REMARQUE : il est recommandé d’utiliser uniquement des lecteurs testés et approuvés pour une utilisation avec la carte de fond de panier SAS. Il vous faudra peut-être utiliser des programmes autres que ceux fournis avec le système d’exploitation pour partitionner et formater les disques durs. AVIS : n’éteignez pas et ne redémarrez pas le système pendant le formatage du lecteur. Cela risquerait d’endommager ce dernier. Lorsque vous formatez un disque dur à haute capacité, prévoyez suffisamment de temps pour que le formatage s’exécute entièrement. De longs délais de formatage sont normaux pour ces lecteurs. ID 3 ID 2 ID 1 ID 0 ID 4Installation des composants du système 81 Configuration du périphérique d’amorçage Si vous envisagez de démarrer le système à partir d’un disque dur, celui-ci doit être relié au contrôleur principal (d’amorçage). L’ordre de démarrage spécifié dans le programme de configuration du système détermine le périphérique utilisé pour l’amorçage du système. Le programme de configuration du système contient des options qui sont utilisées par le système pour rechercher les périphériques de démarrage installés. Voir “Utilisation du programme de configuration du système”, page 33 pour plus de détails sur le programme de configuration du système. Retrait d’un cache de lecteur AVIS : pour assurer un refroidissement correct du système, vous devez installer un cache sur toutes les baies de disque dur vides. Si vous retirez un support de disque dur du système et ne le réinstallez pas immédiatement, installez un cache sur l’emplacement vide. 1 Retirez le cadre. Voir “Retrait et réinstallation du cadre avant en option”, page 52. 2 Pour éjecter un cache, passez le doigt sous son extrémité carénée et appuyez sur le loquet. 3 Faites levier jusqu’à ce que le cache soit complètement dégagé. Installation d’un cache de lecteur La forme du cache de disque permet de s’assurer qu’il sera correctement inséré dans la baie. Pour installer un cache de lecteur 3,5 pouces, insérez et faites pivoter le côté avec détrompeur dans la baie de lecteurs. Appuyez de manière égale sur l’autre côté du cache jusqu’à ce qu’il soit correctement emboîté. Retrait d’un disque dur enfichable à chaud 1 Retirez le cadre. Voir “Retrait et réinstallation du cadre avant en option”, page 52. 2 Préparez le retrait du disque à l’aide du logiciel de gestion RAID. Attendez que les voyants du support indiquent que le disque peut être retiré en toute sécurité. Reportez-vous à la documentation du contrôleur RAID SAS pour plus d’informations sur le retrait d’un lecteur enfichable à chaud. Si le lecteur était en ligne, le voyant d’activité/panne vert clignote lors de la mise hors tension du disque. Quand les deux voyants sont éteints, vous pouvez retirer le lecteur. 3 Ouvrez la poignée du support pour débloquer le lecteur. Voir la figure 3-18. 4 Extrayez le disque de la baie. 5 Si vous ne réinstallez pas le disque dur ou si vous ne le remplacez pas par un autre, placez un cache sur la baie vide. Voir “Installation d’un cache de lecteur”, page 81. AVIS : pour assurer un refroidissement correct du système, vous devez installer un cache sur toutes les baies de disque dur vides.82 Installation des composants du système Figure 3-18. Retrait et installation d’un disque dur enfichable à chaud 1 Disque dur 2 Support de disque 3 Poignée d’éjection du support de lecteur 3 1 2Installation des composants du système 83 Installation d’un disque dur enfichable à chaud AVIS : lorsque vous installez un disque dur, assurez-vous que les lecteurs adjacents ne sont pas en cours d’installation. Si vous insérez un support de disque dur et tentez d’en verrouiller la poignée alors qu’un disque dur voisin n’est que partiellement installé, vous risquez d’endommager le ressort de protection de ce dernier et de le rendre inutilisable. AVIS : certains systèmes d’exploitation ne prennent pas en charge les disques durs enfichables à chaud. Reportez-vous à la documentation fournie avec le système d’exploitation. 1 Retirez le cadre. Voir “Retrait et réinstallation du cadre avant en option”, page 52. 2 Si la baie est fermée par un cache, retirez-le. Voir “Retrait d’un cache de lecteur”, page 81. 3 Installez le disque dur enfichable à chaud. a Ouvrez la poignée du support de disque dur. b Insérez le support de disque dans la baie jusqu’à ce qu’il touche le fond de panier. c Refermez la poignée pour maintenir le disque dur en place. 4 Réinstallez le cadre avant, le cas échéant. Voir “Retrait et réinstallation du cadre avant en option”, page 52. Remplacement d’un disque dur installé dans un support Pour retirer un disque dur installé dans un support, retirez les quatre vis situées sur les rails coulissants du support, puis retirez le disque. Pour installer un nouveau disque dur dans le support, procédez comme suit : 1 Insérez le disque dur dans le support, connecteur vers l’arrière. Voir la figure 3-19. 2 En disposant l’assemblage tel qu’il est représenté à la figure 3-19, faites correspondre l’ouverture arrière inférieure du disque dur avec celle marquée “SAS” sur le support. Si la position est correcte, l’arrière du disque dur arrive au même niveau que l’arrière du support. 3 Fixez le disque dur sur le support à l’aide des quatre vis. Voir la figure 3-19.84 Installation des composants du système Figure 3-19. Installation d’un disque dur SAS dans un support 1 Vis (4) 2 Support de disque 3 Disque dur SAS 1 3 2Installation des composants du système 85 Cartes contrôleur SAS Retrait d’une carte contrôleur SAS PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Reportez-vous au document Product Information Guide (Guide d’informations sur le produit) pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l’ordinateur et la protection contre les décharges électrostatiques. 1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant. 2 Ouvrez le système. Voir “Ouverture du système”, page 53. 3 Débranchez le(s) câble(s) de données de la carte contrôleur. 4 Si vous retirez un contrôleur RAID SAS, débranchez le câble de la pile RAID de cette carte. 5 Retirez la carte de son logement. Voir “Retrait d’une carte d’extension”, page 62. Installation d’une carte contrôleur SAS PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Reportez-vous au document Product Information Guide (Guide d’informations sur le produit) pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l’ordinateur et la protection contre les décharges électrostatiques. 1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant. 2 Ouvrez le système. Voir “Ouverture du système”, page 53. 3 Installez la carte contrôleur dans le logement d’extension INTERNAL_STORAGE. Pour obtenir des instructions sur l’installation de la carte, voir “Installation d’une carte d’extension”, page 60. 4 Connectez la carte au fond de panier SAS. • Si vous installez une carte contrôleur SAS, branchez le câble de données SAS sur le connecteur SAS A du fond de panier. Voir la figure 6-3. • Si vous installez une carte contrôleur RAID SAS, reliez par un câble de données SAS le connecteur 0 (bleu) de la carte et le connecteur SAS A du fond de panier ; faites de même pour relier le connecteur 1 de la carte et le connecteur SAS B du fond de panier. Voir la figure 6-3. Installation de la pile d’une carte contrôleur RAID SAS Installez la pile RAID dans le support en plastique correspondant qui se trouve à l’intérieur du châssis. Branchez le câble de la pile sur le connecteur situé sur la carte contrôleur RAID SAS, à côté de la barrette de mémoire RAID.86 Installation des composants du système Figure 3-20. Installation de la pile RAID Connexion d’un lecteur de bande SAS externe Cette sous-section décrit le raccordement d’un lecteur de bande SAS externe et d’une carte contrôleur SAS externe (en option). PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Reportez-vous au document Product Information Guide (Guide d’informations sur le produit) pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l’ordinateur et la protection contre les décharges électrostatiques. 1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant. 2 Ouvrez le système. Voir “Ouverture du système”, page 53. 3 Mettez-vous à la terre en touchant une partie métallique non peinte à l’arrière de l’ordinateur, puis déballez le lecteur. 4 Déballez le lecteur de bande et la carte contrôleur. 1 Pile RAID 2 Câble de la pile RAID 3 Carte contrôleur RAID 1 3 2Installation des composants du système 87 5 Installez la carte contrôleur SAS externe dans un logement d’extension. Voir “Installation d’une carte d’extension”, page 60. 6 Connectez le câble d’interface au lecteur de bande. 7 Raccordez l’autre extrémité du câble d’interface au connecteur SAS externe du support de la carte contrôleur. 8 Branchez le câble d’alimentation du lecteur de bande sur une prise électrique. 9 Refermez le système. Voir “Fermeture du système”, page 54. 10 Rebranchez le système et les périphériques sur le secteur, puis remettez-les sous tension. 11 Effectuez une sauvegarde sur bande et un test de vérification de l’unité, en suivant les instructions de la documentation correspondante. Connexion d’un périphérique de stockage Fibre Channel externe Cette sous-section décrit le raccordement de périphériques Fibre Channel externes et d’une carte HBA Fibre Channel (en option). PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Reportez-vous au document Product Information Guide (Guide d’informations sur le produit) pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l’ordinateur et la protection contre les décharges électrostatiques. 1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant. 2 Ouvrez le système. Voir “Ouverture du système”, page 53. 3 Mettez-vous à la terre en touchant une partie métallique non peinte à l’arrière du système, déballez le lecteur et comparez les paramètres du cavalier et du commutateur avec ceux décrits dans la documentation fournie avec le lecteur. 4 Installez la carte HBA Fibre Channel dans un logement d’extension. Voir “Installation d’une carte d’extension”, page 60. 5 Branchez l’extrémité du câble Fibre Channel sur le connecteur du support de la carte HBA. 6 Refermez le système. Voir “Fermeture du système”, page 54. 7 Rebranchez le système et les périphériques sur le secteur, puis remettez-les sous tension.88 Installation des composants du système Pile du système La pile du système est une pile bouton de 3,0 volts (V). Remplacement de la pile du système PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Reportez-vous au document Product Information Guide (Guide d’informations sur le produit) pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l’ordinateur et la protection contre les décharges électrostatiques. PRÉCAUTION : une nouvelle pile mal installée risque d’exploser. Lors d’un remplacement, utilisez une pile de type identique ou d’un type équivalent recommandé par le fabricant. Mettez les piles usagées au rebut selon les instructions du fabricant. Consultez le document System Information Guide (Guide d’informations du système) pour obtenir des informations supplémentaires. 1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant. 2 Ouvrez le système. Voir “Ouverture du système”, page 53. 3 Retirez les protecteurs de ventilation. Voir “Retrait des protecteurs de ventilation”, page 56. 4 Identifiez le support de pile. Voir la figure 6-2. AVIS : si vous sortez la pile de son support avec un objet pointu, prenez garde de ne pas toucher la carte système. Vérifiez que l’objet est inséré entre la pile et son support avant de tenter d’extraire la pile. Sinon, vous risquez d’endommager la carte système en arrachant le support ou en brisant des éléments de circuit sur la carte système. AVIS : pour ne pas endommager le connecteur de pile, maintenez-le en place lorsque vous installez ou retirez une pile. 5 Retirez la pile du système. Voir la figure 3-21. a Maintenez le connecteur de pile en place en appuyant fermement sur le côté positif du connecteur. b Tout en maintenant le connecteur, poussez la pile vers le côté positif et soulevez-la pour la retirer du connecteur.Installation des composants du système 89 Figure 3-21. Remplacement de la pile du système AVIS : pour ne pas endommager le connecteur de pile, maintenez-le en place lorsque vous installez ou retirez une pile. 6 Installez la nouvelle pile. a Maintenez le connecteur de pile en place en appuyant fermement sur le côté positif du connecteur. b Tenez la pile en plaçant le “+” vers le haut et faites-la glisser sous les pattes de fixation situées du côté positif du connecteur. c Appuyez sur la pile pour l’installer dans le connecteur. 7 Réinstallez les protecteurs de ventilation. Voir “Réinstallation des protecteurs de ventilation”, page 57. 8 Refermez le système. Voir “Fermeture du système”, page 54. 9 Rebranchez le système sur la prise de courant et allumez-le, ainsi que tous les périphériques connectés. 10 Accédez au programme de configuration du système pour vérifier que la pile fonctionne correctement. Voir “Utilisation du programme de configuration du système”, page 33. 11 Entrez la date et l’heure dans les champs Time (Heure) et Date du programme de configuration du système. 12 Quittez le programme de configuration du système. 13 Pour tester la pile qui vient d’être installée, éteignez le système et débranchez-le de sa prise électrique pendant au moins une heure. 14 Une heure plus tard, rebranchez le système à sa prise électrique et allumez-le. 15 Accédez au programme de configuration du système et, si l’heure et la date sont toujours incorrectes, consultez la section “Obtention d’aide”, page 145 pour savoir comment obtenir une assistance technique. 1 Côté positif du connecteur de pile 2 Pile du système 3 Côté négatif du connecteur de pile 2 3 190 Installation des composants du système Panneau de commande (maintenance uniquement) Retrait du panneau de commande PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Reportez-vous au document Product Information Guide (Guide d’informations sur le produit) pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l’ordinateur et la protection contre les décharges électrostatiques. 1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant. 2 Ouvrez le système. Voir “Ouverture du système”, page 53. 3 Déconnectez le câble de données reliant le panneau à la carte du panneau de commande. Voir la figure 3-22. 4 Déconnectez le câble du module d’affichage enfiché dans la carte du panneau de commande. Voir la figure 3-22. 5 Retirez les trois vis Torx qui fixent la carte du panneau de commande au châssis, puis retirez cette carte. 6 Retirez le module d’affichage : a Insérez le bout d’un trombone dans l’orifice situé sur le côté droit du module d’affichage, puis retirez doucement l’étiquette. b Retirez les deux vis Torx qui fixent le module d’affichage au châssis. 7 Retirez le module d’affichage.Installation des composants du système 91 Figure 3-22. Retrait et installation du panneau de commande 1 Module d’affichage 2 Câble du module d’affichage 3 Carte du panneau de commande 4 Câble de la carte du panneau de commande 5 Vis fixant la carte du panneau de commande (3) 6 Étiquette du module d’affichage 7 Vis du module d’affichage (2) 3 3 4 5 6 7 1 2 92 Installation des composants du système Installation du panneau de commande PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Reportez-vous au document Product Information Guide (Guide d’informations sur le produit) pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l’ordinateur et la protection contre les décharges électrostatiques. 1 Insérez le module d’affichage du panneau de commande dans l’ouverture du châssis et fixez-le à l’aide des deux vis Torx. 2 Collez l’étiquette du panneau de commande sur le module d’affichage. 3 Installez la carte du panneau de commande dans le châssis et fixez-la à l’aide des trois vis Torx. Voir la figure 3-22. 4 Connectez le câble du module d’affichage à la carte du panneau de commande. Voir la figure 3-22. 5 Acheminez le câble du panneau de commande dans les passe-câbles du châssis, puis connectez-le à la carte du panneau de commande. 6 Refermez le système. Voir “Fermeture du système”, page 54. 7 Réinstallez le cadre avant, le cas échéant. Voir “Retrait et réinstallation du cadre avant en option”, page 52. 8 Rebranchez le système à la prise de courant et allumez-le, ainsi que les périphériques connectés. Carte intermédiaire de ventilateur (maintenance uniquement) Retrait d’une carte intermédiaire de ventilateur PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Reportez-vous au document Product Information Guide (Guide d’informations sur le produit) pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l’ordinateur et la protection contre les décharges électrostatiques. 1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant. 2 Ouvrez le système. Voir “Ouverture du système”, page 53. AVIS : pour éviter d’endommager les lecteurs et le fond de panier, retirez du système les lecteurs SAS et le support du lecteur optique/de disquette avant d’enlever le fond de panier. Avant de retirer les disques durs, notez leur numéro d’emplacement et étiquetez-les afin de pouvoir les réinstaller au même endroit ultérieurement. 3 Pour retirer le support de lecteur optique/de disquette, tirez le loquet de dégagement et extrayez le support du châssis. Voir la figure 3-18. 4 Retirez les ventilateurs 1 et 3 ou 2 et 4 (en fonction de la carte à réinstaller). Voir “Retrait d’un ventilateur”, page 54. 5 Retirez le fond de panier SAS. Voir “Fond de panier SAS (maintenance uniquement)”, page 99. 6 Retirez les deux vis puis la carte intermédiaire de ventilateur. Voir la figure 3-23.Installation des composants du système 93 Figure 3-23. Retrait et installation d’une carte intermédiaire de ventilateur Installation d’une carte intermédiaire de ventilateur PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Reportez-vous au document Product Information Guide (Guide d’informations sur le produit) pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l’ordinateur et la protection contre les décharges électrostatiques. 1 Insérez les deux pattes de fixation situées sur la carte intermédiaire dans les emplacements correspondants qui se trouvent sur le côté de la baie de ventilation. Voir la figure 3-23. 2 Fixez la carte intermédiaire à l’aide des deux vis. 3 Réinstallez le fond de panier SAS. Voir “Installation du fond de panier SAS”, page 101. 1 Vis (2) 2 Carte intermédiaire de ventilateur 3 Pattes de fixation (2) 4 Ouvertures (2) 2 4 3 194 Installation des composants du système 4 Installez les ventilateurs. Voir “Réinstallation d’un ventilateur”, page 55. 5 Installez le support du lecteur optique/de disquette. Réinstallez le support dans le système et fixez-le en appuyant sur le loquet de dégagement. Voir la figure 3-14. 6 Remettez les disques durs SAS à leur emplacement d’origine. Voir “Installation d’un disque dur enfichable à chaud”, page 83. 7 Refermez le système. Voir “Fermeture du système”, page 54. 8 Rebranchez le système sur la prise de courant et allumez-le, ainsi que tous les périphériques connectés. Carte de distribution de l’alimentation (maintenance uniquement) Retrait de la carte de distribution de l’alimentation PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Reportez-vous au document Product Information Guide (Guide d’informations sur le produit) pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l’ordinateur et la protection contre les décharges électrostatiques. 1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant. 2 Ouvrez le système. Voir “Ouverture du système”, page 53. 3 Retirez les blocs d’alimentation. Voir “Retrait d’un bloc d’alimentation”, page 57. 4 Retirez la carte système. Voir “Retrait de la carte système”, page 102. 5 Retirez les sept vis qui fixent la carte. Voir la figure 3-24. 6 Soulevez la carte de distribution de l’alimentation pour la retirer du châssis.Installation des composants du système 95 Figure 3-24. Retrait et installation de la carte de distribution de l’alimentation 1 Pattes de fixation (3) 2 Orifices de fixation (3) 3 Carte de distribution de l’alimentation 4 Vis (7) 1 4 3 296 Installation des composants du système Installation de la carte de distribution de l’alimentation PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Reportez-vous au document Product Information Guide (Guide d’informations sur le produit) pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l’ordinateur et la protection contre les décharges électrostatiques. 1 Alignez les trois orifices de fixation de la carte de distribution de l’alimentation avec les trois pattes situées dans la partie inférieure du châssis. Voir la figure 3-24. 2 Fixez la carte à l’aide des sept vis. 3 Installez la carte système. Voir la procédure décrite à la section “Installation de la carte système”, de l’étape 3 à l’étape 14. 4 Installez les blocs d’alimentation. Voir “Réinstallation d’un bloc d’alimentation”, page 58. 5 Refermez le système. Voir “Fermeture du système”, page 54. 6 Rebranchez le système sur la prise de courant et allumez-le, ainsi que tous les périphériques connectés. Commutateur d’intrusion du châssis (maintenance uniquement) Retrait du commutateur d’intrusion du châssis PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Reportez-vous au document Product Information Guide (Guide d’informations sur le produit) pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l’ordinateur et la protection contre les décharges électrostatiques. 1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant. 2 Ouvrez le système. Voir “Ouverture du système”, page 53. 3 Retirez le protecteur de ventilation supérieur. Voir “Retrait des protecteurs de ventilation”, page 56. 4 Le cas échéant, retirez le dissipateur de chaleur du processeur 4 (voir “Processeurs”, page 69). 5 Déconnectez le câble du commutateur d’intrusion enfiché sur la carte système. Voir la figure 3-25. 6 Tirez doucement sur le commutateur d’intrusion pour le dégager de son clip. Installation des composants du système 97 Figure 3-25. Retrait et installation du commutateur d’intrusion du châssis 1 Clip du commutateur d’intrusion 2 Commutateur d’intrusion 3 Bords cannelés (2) 4 Câble du commutateur d’intrusion 4 3 1 298 Installation des composants du système Installation du commutateur d’intrusion du châssis PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Reportez-vous au document Product Information Guide (Guide d’informations sur le produit) pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l’ordinateur et la protection contre les décharges électrostatiques. 1 Branchez le câble du commutateur d’intrusion sur le connecteur correspondant de la carte système. Voir la figure 3-25. 2 Alignez les deux bords cannelés de la partie supérieure du commutateur avec l’intérieur du clip, puis appuyez doucement jusqu’à ce que le commutateur s’enclenche. Voir la figure 3-25. 3 Le cas échéant, réinstallez le dissipateur de chaleur sur le processeur 4 (voir “Processeurs”, page 69). 4 Réinstallez le protecteur de ventilation supérieur. Voir “Réinstallation des protecteurs de ventilation”, page 57. 5 Refermez le système. Voir “Fermeture du système”, page 54. 6 Rebranchez le système sur la prise de courant et allumez-le, ainsi que tous les périphériques connectés.Installation des composants du système 99 Fond de panier SAS (maintenance uniquement) Retrait du fond de panier SAS PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Reportez-vous au document Product Information Guide (Guide d’informations sur le produit) pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l’ordinateur et la protection contre les décharges électrostatiques. 1 Retirez le cadre, le cas échéant. Voir “Retrait et réinstallation du cadre avant en option”, page 52. 2 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant. 3 Ouvrez le système. Voir “Ouverture du système”, page 53. AVIS : pour éviter d’endommager les lecteurs et le fond de panier, retirez du système les lecteurs SAS et le support du lecteur optique/de disquette avant d’enlever le fond de panier. AVIS : avant de retirer les disques durs, notez leur numéro d’emplacement et étiquetez-les afin de pouvoir les réinstaller au même endroit ultérieurement. 4 Retirez tous les disques durs SAS. Voir “Retrait d’un disque dur enfichable à chaud”, page 81. 5 Pour retirer le support de lecteur optique/de disquette, tirez le loquet de dégagement et extrayez le support du châssis. Voir la figure 3-18. 6 Retirez les protecteurs de ventilation. Voir “Retrait des protecteurs de ventilation”, page 56. AVIS : lorsque vous débranchez le câble du panneau de commande, maintenez la languette d’extraction blanche située près du connecteur correspondant afin d’éviter d’endommager le fond de panier SAS ou le câble. 7 Débranchez le câble du panneau de commande enfiché à l’avant du fond de panier SAS. Voir la figure 6-3. 8 Débranchez le câble SAS, le câble d’interface et le câble d’alimentation qui sont branchés à l’arrière du fond de panier SAS. 9 Retirez le fond de panier SAS : a Tirez sur le plot de fixation bleu, puis soulevez le fond de panier. Voir la figure 3-26. b Lorsque le fond de panier est au niveau le plus haut possible, tirez-le vers l’arrière du système pour le dégager des crochets de fixation. c Retirez la carte du système, en prenant garde de ne pas endommager les composants situés sur celle-ci. d Posez le fond de panier SAS sur un plan de travail, face vers le bas.100 Installation des composants du système Figure 3-26. Retrait et installation du fond de panier SAS 1 Plot de fixation 2 Fond de panier SAS 3 Câble du connecteur du panneau de commande 4 Encoche d’alignement pour installation 5 Orifices de fixation (7) 5 4 3 1 2Installation des composants du système 101 Installation du fond de panier SAS PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Reportez-vous au document Product Information Guide (Guide d’informations sur le produit) pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l’ordinateur et la protection contre les décharges électrostatiques. 1 Installez le fond de panier SAS : a Faites descendre lentement la carte dans le système en faisant attention à ne pas endommager ses composants. b Positionnez la fente d’alignement située en partie inférieure du fond de panier face au plot correspondant situé au fond du châssis. Voir la figure 3-26. c Emboîtez les orifices de fixation du fond de panier dans les crochets correspondants du châssis. d Abaissez le fond de panier jusqu’à ce que le plot bleu s’enclenche. 2 Branchez le câble SAS, le câble d’interface et le câble d’alimentation à l’arrière du fond de panier SAS. 3 Connectez le câble du panneau de commande à l’avant du fond de panier SAS. 4 Remettez les disques durs SAS à leur emplacement d’origine. Voir “Disques durs”, page 80. 5 Installez le support du lecteur optique/de disquette. Réinstallez le support dans le système et fixez-le en appuyant sur le loquet de dégagement. Voir la figure 3-14. 6 Installez les protecteurs de ventilation. Voir “Réinstallation des protecteurs de ventilation”, page 57. 7 Refermez le système. Voir “Fermeture du système”, page 54. 8 Rebranchez le système sur la prise de courant et allumez-le, ainsi que tous les périphériques connectés.102 Installation des composants du système Carte système (maintenance uniquement) Retrait de la carte système PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Reportez-vous au document Product Information Guide (Guide d’informations sur le produit) pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l’ordinateur et la protection contre les décharges électrostatiques. 1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant. 2 Ouvrez le système. Voir “Ouverture du système”, page 53. AVIS : pour éviter d’endommager les lecteurs et le fond de panier, retirez du système les lecteurs SAS et le support du lecteur optique/de disquette avant d’enlever le fond de panier. AVIS : avant de retirer les disques durs, notez leur numéro d’emplacement et étiquetez-les afin de pouvoir les réinstaller au même endroit ultérieurement. 3 Retirez les protecteurs de ventilation. Voir “Retrait des protecteurs de ventilation”, page 56. 4 Retirez les dissipateurs de chaleur des processeurs. Voir “Processeurs”, page 69. 5 Débranchez le câble SAS, le câble d’interface et le câble d’alimentation qui sont branchés à l’arrière du fond de panier SAS. 6 Retirez toutes les cartes d’extension, ainsi que la carte contrôleur. Voir “Retrait d’une carte d’extension”, page 62. 7 Le cas échéant, débranchez puis retirez la carte RAC. 8 Le cas échéant, retirez les modules VRM des processeurs 3 et 4. Voir “Retrait d’un module VRM”, page 75. 9 Mettez les deux commutateurs à glissière situés de chaque côté du châssis en position ouverte afin de déverrouiller la barre transversale du châssis, puis soulevez cette dernière pour la retirer. Voir la figure 3-27. Installation des composants du système 103 Figure 3-27. Retrait et installation de la barre transversale du châssis 10 Débranchez de la carte système le câble du commutateur d’intrusion du châssis, le câble de la pile RAID (le cas échéant), ainsi que tous les câbles d’interface. 11 Débranchez de la carte système le faisceau de câbles de distribution de l’alimentation. Le faisceau de câbles et les côtés du châssis sont équipés de bandes Velcro qui permettent de fixer le faisceau pendant le retrait de la carte système. Relevez le faisceau de câbles et fixez-le sur le côté du châssis. Voir la figure 3-28. 1 Position fermée 2 Position ouverte 3 Barre transversale 4 Guides d’alignement (2) 5 Ouvertures (2) 6 Commutateurs à glissière (2) 4 6 1 5 2 3104 Installation des composants du système Figure 3-28. Fixation du faisceau de câbles de distribution de l’alimentation 12 Retirez le logement de la pile RAID : a Relevez le levier puis soulevez doucement le logement de la pile pour le retirer. Voir la figure 3-29. b Soulevez le logement de la pile pour le retirer du châssis. 1 Faisceau de câbles de distribution de l’alimentation 2 Bandes Velcro (2) 1 2Installation des composants du système 105 Figure 3-29. Retrait et installation du logement de la pile RAID 13 Retirez la carte système : a Tirez sur le plot de fixation bleu situé au milieu de la carte système, puis faites glisser cette dernière vers l’avant du châssis jusqu’à ce qu’elle bute. Voir la figure 3-30. b Soulevez la carte système doucement et de manière égale au-dessus des crochets de fixation en vous assurant qu’elle ne les touche pas, puis faites-la basculer en la soulevant par le côté gauche. Voir la figure 3-30. c Soulevez la carte système pour la retirer du châssis (côté gauche en premier). 1 Pattes de fixation (2) 2 Orifices de fixation (2) 3 Logement de la pile RAID 2 1 3106 Installation des composants du système Figure 3-30. Retrait et installation de la carte système 1 Carte système 2 Orifices de fixation 3 Crochets de fixation 4 Plot de fixation 4 1 2 3Installation des composants du système 107 Installation de la carte système PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Reportez-vous au document Product Information Guide (Guide d’informations sur le produit) pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l’ordinateur et la protection contre les décharges électrostatiques. 1 Installez les processeurs sur la nouvelle carte système. Voir la figure 6-2 pour identifier l’emplacement des connecteurs sur la carte système. REMARQUE : n’installez pas les dissipateurs de chaleur pour le moment. 2 Retirez les barrettes de mémoire de l’ancienne carte puis installez-les sur la nouvelle, aux mêmes emplacements. Voir les sections “Retrait de barrettes de mémoire”, page 68 et “Installation de barrettes de mémoire”, page 66. 3 Installez la nouvelle carte système : a Insérez doucement la nouvelle carte système dans le châssis (côté droit en premier). b Abaissez doucement le côté gauche de la carte. REMARQUE : vérifiez que le câble d’alimentation du fond de panier SAS (qui provient de la carte de distribution de l’alimentation) n’interfère pas lors de l’installation de la carte système dans le châssis. c Relevez doucement l’avant de la carte système et posez-la de façon qu’elle repose totalement sur le fond du châssis. d Vérifiez que tous les crochets de fixation situés au fond du châssis sont correctement insérés dans les orifices de fixation correspondants de la carte système. Voir la figure 3-30. e Poussez la carte vers l’arrière du châssis, jusqu’à ce que le plot de fixation bleu s’enclenche. 4 Installez le logement de la pile RAID : a Insérez les deux pattes de fixation situées sur le logement de la pile dans les emplacements correspondants qui se trouvent sur la paroi interne du châssis. Voir la figure 3-29. b Appuyez sur le logement de la pile pour le fixer. 5 Branchez les câbles dans l’ordre énuméré ci-dessous (voir la figure 6-2 et la figure 6-3 pour connaître les emplacements des connecteurs sur la carte système et sur le fond de panier SAS) : • Branchez le faisceau de câbles de distribution de l’alimentation sur le connecteur situé dans le coin de la carte système. • Branchez le câble d’interface sur le connecteur CONTROL_PANEL de la carte système et sur le connecteur d’interface du fond de panier SAS. • Branchez le câble de données SAS A sur le connecteur 0 de la carte contrôleur et sur le connecteur SAS A du fond de panier.108 Installation des composants du système • Branchez le câble de données SAS B sur le connecteur 1 de la carte contrôleur et sur le connecteur SAS B du fond de panier, le cas échéant. • Branchez le câble d’alimentation SAS sur le connecteur correspondant du fond de panier SAS. • Branchez le câble du commutateur d’intrusion du châssis sur le connecteur correspondant de la carte système. 6 Installez les dissipateurs de chaleur. Voir “Processeurs”, page 69. 7 Le cas échéant, réinstallez les deux modules VRM des processeurs. Voir “Installation d’un module VRM”, page 73. 8 Installez la barre transversale du châssis : a Insérez les guides situés à chaque extrémité de la barre dans les orifices correspondants du châssis. Voir la figure 3-27. b Insérez la barre jusqu’à ce que les guides touchent la partie inférieure des orifices. c Fixez la barre en mettant les deux commutateurs à glissière situés de chaque côté du châssis en position fermée. 9 Installez toutes les cartes d’extension. Voir “Installation d’une carte d’extension”, page 60. 10 Le cas échéant, reconnectez le câble de la pile RAID sur la carte contrôleur RAID. 11 Le cas échéant, réinstallez et connectez la carte RAC. 12 Installez les protecteurs de ventilation. Voir “Réinstallation des protecteurs de ventilation”, page 57. 13 Installez le support du lecteur optique/de disquette. Réinstallez le support dans le système et fixez-le en appuyant sur le loquet de dégagement. Voir la figure 3-14. 14 Installez les disques durs SAS à leur emplacement d’origine. Voir “Installation d’un disque dur enfichable à chaud”, page 83. 15 Refermez le système. Voir “Fermeture du système”, page 54. 16 Rebranchez le système sur la prise de courant et allumez-le, ainsi que tous les périphériques connectés. 17 Réinstallez le cadre. Voir “Retrait et réinstallation du cadre avant en option”, page 52.Dépannage du système 109 Dépannage du système La sécurité d’abord, pour vous et pour le système Pour effectuer certaines des procédures décrites ici, vous devez retirer le capot du système et intervenir à l’intérieur. Lorsque vous intervenez sur le système, suivez strictement les opérations décrites dans ce guide ou dans une autre documentation accompagnant le système. PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Avant de commencer toute intervention, reportez-vous au document Product Information Guide (Guide d’informations sur le produit) pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l’ordinateur et la protection contre les décharges électrostatiques. Routine de démarrage Écoutez et observez le système pendant la procédure de démarrage, pour repérer les symptômes décrits dans le tableau 4-1. Tableau 4-1. Indications fournies par la procédure de démarrage Symptôme Action L’écran LCD du panneau avant affiche un message d’état ou d’erreur. Voir “Messages d’état affichés sur l’écran LCD”, page 16. Affichage d’un message d’erreur sur le moniteur. Voir “Messages système”, page 25. Messages d’alerte du logiciel de gestion des systèmes. Consultez la documentation du logiciel de gestion des systèmes. Comportement du voyant d’alimentation du moniteur. Voir “Dépannage du sous-système vidéo”, page 111. Comportement des voyants du clavier. Voir “Dépannage du clavier”, page 112. Comportement du voyant d’activité du lecteur de CD USB. Voir “Dépannage d’un périphérique USB”, page 114. Comportement du voyant d’activité du lecteur de CD. Voir “Dépannage d’un lecteur optique”, page 124. Comportement du voyant d’activité du disque dur. Voir “Dépannage d’un disque dur”, page 125. Bruit inhabituel de raclement ou de grincement constant lors de l’accès à un lecteur. Voir “Obtention d’aide”, page 145.110 Dépannage du système Vérification des incidents simples liés à l’alimentation 1 Si le voyant d’alimentation situé sur le panneau avant du système ou sur les blocs d’alimentation indique que le système n’est pas alimenté, vérifiez que les câbles sont correctement branchés sur les blocs. 2 Si le système est connecté à une PDU (Power Distribution Unit [unité de distribution d’alimentation]) ou à un onduleur, éteignez l’élément en question puis rallumez-le. 3 Si ces lecteurs ne sont pas alimentés, branchez-les sur une autre prise. Si le système n’est toujours pas alimenté, essayez une autre PDU ou un autre onduleur. 4 Rebranchez le système sur la prise de courant et allumez-le. Si l’incident persiste, voir “Dépannage des blocs d’alimentation”, page 119. Vérification du matériel Cette section contient les procédures de dépannage des périphériques externes directement connectés au système, comme le moniteur, le clavier ou la souris. Avant de suivre l’une de ces procédures, voir “Dépannage des connexions externes”, page 111. Résolution des conflits d’attribution d’IRQ La plupart des périphériques PCI peuvent partager une IRQ avec un autre périphérique ; cependant, les deux périphériques concernés ne peuvent pas fonctionner simultanément. Pour éviter ce type de conflit, consultez la documentation de chaque périphérique PCI pour obtenir ses spécifications d’IRQ. Les affectations des IRQ sont répertoriées dans le tableau 4-2. Tableau 4-2. Affectations par défaut des IRQ Ligne IRQ Affectation IRQ0 Horloge du système IRQ1 Contrôleur du clavier IRQ2 Contrôleur d’interruption 1, pour activer les IRQ 8 à 15 IRQ3 Disponible IRQ4 Port série 1 (COM1 et COM3) IRQ5 Contrôleur d’accès à distance IRQ6 Contrôleur du lecteur de disquette IRQ7 Port parallèle IRQ8 Horloge temps réel IRQ9 Fonctions ACPI (pour la gestion de l’alimentation) IRQ10 DisponibleDépannage du système 111 Dépannage des connexions externes Le plus souvent, les incidents liés au système, au moniteur et aux autres périphériques (comme une imprimante, un clavier, une souris ou un autre périphérique externe) sont causés par des câbles mal raccordés ou débranchés. Vérifiez que tous les câbles externes sont fermement raccordés aux connecteurs correspondants. Voir les sections “Voyants et caractéristiques du panneau avant”, page 11 et “Voyants et caractéristiques du panneau arrière”, page 14 pour identifier les connecteurs des panneaux avant et arrière du système. Dépannage du sous-système vidéo Incident • Le moniteur ne fonctionne pas correctement. • La mémoire vidéo est défectueuse. Action 1 Vérifiez les connexions du moniteur à l’alimentation et au système. 2 Déterminez si le système contient une carte d’extension équipée d’un connecteur de sortie vidéo. Si tel est le cas, le câble du moniteur doit être branché sur le connecteur de la carte d’extension, et non sur le connecteur vidéo intégré du système. Pour vérifier que le moniteur est relié au connecteur approprié, mettez le système hors tension, attendez une minute, puis reliez le moniteur à l’autre connecteur vidéo. Remettez ensuite le système sous tension. IRQ11 Disponible IRQ12 Disponible IRQ13 Coprocesseur mathématique IRQ14 Contrôleur du lecteur de CD IDE IRQ15 Disponible Tableau 4-2. Affectations par défaut des IRQ (suite) Ligne IRQ Affectation112 Dépannage du système 3 Vérifiez si des moniteurs sont reliés à la fois au connecteur vidéo avant et au connecteur vidéo arrière du système. Le système prend en charge un seul moniteur, qui doit être connecté soit à l’avant, soit à l’arrière du système. Si un moniteur est connecté au panneau avant, le connecteur vidéo arrière est désactivé. Si deux moniteurs sont reliés au système, déconnectez-en un. Si l’incident persiste, passez à l’étape suivante. 4 Exécutez le test de diagnostic en ligne approprié. Voir “Utilisation de Dell PowerEdge Diagnostics”, page 133. Si le test aboutit, l’incident n’est pas lié au matériel vidéo. Si le test échoue, voir “Obtention d’aide”, page 145. Dépannage du clavier Incident • Un message d’erreur du système signale un incident lié au clavier. • Le clavier ne fonctionne pas correctement. Action 1 Accédez au programme de configuration du système et vérifiez que les ports USB sont activés. Voir “Utilisation du programme de configuration du système”, page 33. 2 Examinez le clavier et son câble pour voir s’ils sont endommagés. 3 Remplacez le clavier défectueux par un clavier fiable. Si l’incident est résolu, remplacez le clavier défectueux. Voir “Obtention d’aide”, page 145. 4 Exécutez le test de diagnostic en ligne approprié. Voir “Exécution des diagnostics du système”, page 133. Si l’incident persiste, voir “Obtention d’aide”, page 145.Dépannage du système 113 Dépannage de la souris Incident • Un message d’erreur du système signale un incident lié à la souris. • La souris ne fonctionne pas correctement. Action 1 Examinez la souris et son câble pour voir s’ils sont endommagés. Si la souris n’est pas endommagée, passez à l’étape 4. 2 Accédez au programme de configuration du système et vérifiez que les ports USB sont activés. Voir “Utilisation du programme de configuration du système”, page 33. Si la souris est endommagée, passez à l’étape suivante. 3 Remplacez la souris défectueuse par une souris fiable. Si l’incident est résolu, remplacez la souris défectueuse. Voir “Obtention d’aide”, page 145. 4 Si l’incident persiste, voir “Obtention d’aide”, page 145. 5 Exécutez le test de diagnostic en ligne approprié. Voir “Utilisation de Dell PowerEdge Diagnostics”, page 133. Si le test échoue, passez à l’étape suivante. Dépannage des incidents liés aux E-S série Incident • Un message d’erreur signale un incident lié à un port série. • Un périphérique connecté à un port série ne fonctionne pas correctement. Action 1 Ouvrez le programme de configuration du système et vérifiez que le port série est activé et correctement configuré pour l’application en cours. Voir “Utilisation du programme de configuration du système”, page 33. 2 Si l’incident affecte uniquement une application particulière, consultez sa documentation pour connaître la configuration requise des différents ports. 3 Exécutez le test de diagnostic en ligne approprié. Voir “Utilisation de Dell PowerEdge Diagnostics”, page 133. Si l’incident persiste alors que le test a abouti, voir Dépannage d’un périphérique d’E-S série.114 Dépannage du système Dépannage d’un périphérique d’E-S série Incident • Le périphérique connecté au port série ne fonctionne pas correctement. Action 1 Éteignez le système et les périphériques connectés au port série. 2 Remplacez le câble d’interface série par un câble en état de fonctionnement, puis allumez le système et le périphérique série. Si l’incident est résolu, remplacez le câble d’interface. 3 Éteignez le système et le périphérique série et remplacez ce dernier par un périphérique similaire. 4 Allumez le système et le périphérique série. Si l’incident est résolu, remplacez le périphérique série. Voir “Obtention d’aide”, page 145. Si l’incident persiste, voir “Obtention d’aide”, page 145. Dépannage d’un périphérique USB Incident • Un message du système signale un incident lié à un périphérique USB. • Un périphérique connecté à un port USB ne fonctionne pas correctement. Action 1 Accédez au programme de configuration du système et vérifiez que les ports USB sont activés. Voir “Utilisation du programme de configuration du système”, page 33. 2 Éteignez le système et tous les périphériques USB. 3 Déconnectez les périphériques USB, puis raccordez le périphérique défectueux à l’autre connecteur USB. 4 Allumez le système et le périphérique reconnecté. Si l’incident est résolu, le connecteur USB est peut-être défectueux. Voir “Obtention d’aide”, page 145. 5 Si possible, remplacez le câble d’interface par un câble qui fonctionne. Si l’incident est résolu, remplacez le câble d’interface. Voir “Obtention d’aide”, page 145. 6 Éteignez le système et le périphérique USB et remplacez ce dernier par un périphérique similaire. 7 Allumez le système et le périphérique USB. Si l’incident est résolu, remplacez le périphérique USB. Voir “Obtention d’aide”, page 145. Si l’incident persiste, voir “Obtention d’aide”, page 145.Dépannage du système 115 Dépannage d’un NIC Incident • Le NIC ne parvient pas à communiquer avec le réseau. Action 1 Exécutez le test de diagnostic en ligne approprié. Voir “Exécution des diagnostics du système”, page 133. 2 Observez le voyant approprié du connecteur de NIC. Voir “Codes des voyants de NIC”, page 16. • Si le voyant de lien ne s’allume pas, vérifiez toutes les connexions des câbles. • Si le voyant d’activité ne s’allume pas, les fichiers des pilotes réseau sont peut-être altérés ou manquants. Supprimez puis réinstallez les pilotes le cas échéant. Consultez la documentation du NIC. • Si possible, modifiez le paramétrage de négociation automatique. • Utilisez un autre connecteur sur le commutateur ou le concentrateur. Si vous utilisez une carte réseau au lieu d’un NIC intégré, consultez la documentation fournie avec celle-ci. 3 Vérifiez que les pilotes appropriés sont installés et que les protocoles sont liés. Consultez la documentation du NIC. 4 Accédez au programme de configuration du système et vérifiez que les interfaces réseau sont activées. Voir “Utilisation du programme de configuration du système”, page 33. 5 Vérifiez que les NIC, les concentrateurs et les commutateurs du réseau sont tous réglés sur la même vitesse de transmission des données. Consultez la documentation du matériel réseau. 6 Vérifiez que tous les câbles réseau sont du type approprié et qu’ils ne dépassent pas la longueur maximum. Voir le câblage réseau requis dans le document Getting Started Guide (Guide de mise en route).116 Dépannage du système Dépannage d’un système mouillé Incident • Système mouillé. • Excès d’humidité. Action PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Reportez-vous au document Product Information Guide (Guide d’informations sur le produit) pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l’ordinateur et la protection contre les décharges électrostatiques. 1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant. 2 Ouvrez le système. Voir “Ouverture et fermeture du système”, page 52. 3 Retirez toutes les cartes d’extension du système. Voir “Retrait d’une carte d’extension”, page 62. 4 Laissez le système sécher complètement pendant au moins 24 heures. 5 Refermez le système. Voir “Ouverture et fermeture du système”, page 52. 6 Rebranchez le système à la prise de courant et allumez-le, ainsi que les périphériques connectés. Si le système ne démarre pas normalement, voir “Obtention d’aide”, page 145. 7 Si le système démarre normalement, arrêtez-le et réinstallez les cartes d’extension que vous avez retirées. Voir “Installation d’une carte d’extension”, page 60. 8 Exécutez le test de diagnostic en ligne approprié. Voir “Utilisation de Dell PowerEdge Diagnostics”, page 133. Si le test échoue, voir “Obtention d’aide”, page 145.Dépannage du système 117 Dépannage d’un système endommagé Incident • Le système est tombé ou a été endommagé. Action PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Avant de commencer toute intervention, reportez-vous au document Product Information Guide (Guide d’informations sur le produit) pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l’ordinateur et la protection contre les décharges électrostatiques. 1 Ouvrez le système. Voir “Ouverture et fermeture du système”, page 52. 2 Assurez-vous que les composants suivants sont correctement installés : • Cartes d’extension • Blocs d’alimentation • Ventilateurs • Processeurs et dissipateurs de chaleur • Barrettes de mémoire • Connexions d’un support de lecteur à la carte de fond de panier. 3 Vérifiez que tous les câbles sont correctement connectés. 4 Refermez le système. Voir “Ouverture et fermeture du système”, page 52. 5 Lancez les tests System board (Carte système) des diagnostics du système. Voir “Utilisation de Dell PowerEdge Diagnostics”, page 133. Si les tests échouent, voir “Obtention d’aide”, page 145.118 Dépannage du système Dépannage de la pile du système Incident • Un message du système signale un incident lié à la pile. • Le programme de configuration du système perd les informations. • La date et l’heure du système se dérèglent constamment. REMARQUE : si le système reste éteint longtemps (pendant des semaines ou des mois), la NVRAM peut perdre ses informations de configuration. Cette situation est causée par une pile défectueuse. Action 1 Entrez de nouveau l’heure et la date dans le programme de configuration du système. Voir “Utilisation du programme de configuration du système”, page 33. 2 Éteignez et débranchez le système de la prise électrique pendant au moins une heure. 3 Rebranchez le système sur la prise de courant et allumez-le. 4 Ouvrez le programme de configuration du système. Si la date et l’heure du programme de configuration du système ne sont pas correctes, remplacez la pile. Voir “Pile du système”, page 88. Si l’incident persiste malgré le remplacement de la pile, voir “Obtention d’aide”, page 145. REMARQUE : certains logiciels peuvent provoquer une accélération ou un ralentissement de l’heure système. Si le système semble fonctionner normalement à l’exception de l’heure qui est conservée dans le programme de configuration du système, l’incident peut être causé par un logiciel plutôt que par une pile défectueuse.Dépannage du système 119 Dépannage des blocs d’alimentation Incident • Les voyants d’état du système sont orange. • Les voyants de panne des blocs d’alimentation sont orange. • L’écran LCD du panneau avant indique qu’un incident lié aux blocs d’alimentation s’est produit. Action 1 Déterminez l’emplacement du bloc d’alimentation défectueux. Le voyant de panne du bloc d’alimentation est allumé. Voir “Codes du voyant d’alimentation”, page 15. AVIS : les blocs d’alimentation sont enfichables à chaud. Le système ne peut fonctionner que si au moins un bloc d’alimentation est installé ; il est en mode redondant si deux blocs d’alimentation sont installés. Ne retirez et ne remplacez qu’un seul bloc d’alimentation à la fois dans un système sous tension. Le système risque de surchauffer si vous l’utilisez pendant une période prolongée avec un seul bloc d’alimentation. 2 Retirez le bloc d’alimentation défectueux. Voir “Blocs d’alimentation”, page 57. 3 Retirez et réinstallez le bloc d’alimentation pour vous assurer qu’il est bien en place. Voir “Blocs d’alimentation”, page 57. REMARQUE : après avoir installé un nouveau bloc d’alimentation, patientez plusieurs secondes pour laisser au système le temps de le reconnaître et de déterminer s’il fonctionne correctement. Le voyant d’alimentation s’allume en vert si le bloc d’alimentation fonctionne normalement. Voir “Codes du voyant d’alimentation”, page 15. Si l’incident persiste, voir “Obtention d’aide”, page 145.120 Dépannage du système Dépannage des incidents de refroidissement du système Incident • Le logiciel de gestion des systèmes a émis un message d’erreur concernant les ventilateurs. Action Vérifiez qu’aucune des conditions suivantes n’est présente : • Le capot du système, le protecteur de ventilation, un cache de lecteur ou une plaque de recouvrement avant ou arrière a été retiré. • La température ambiante est trop élevée. • La circulation de l’air extérieur est bloquée. • Les câbles à l’intérieur du système gênent l’aération. • Un des ventilateurs a été retiré ou est en panne. Voir “Dépannage d’un ventilateur”, page 120. Dépannage d’un ventilateur Incident • Le voyant d’état du système est orange. • Le logiciel de gestion des systèmes a émis un message d’erreur concernant les ventilateurs. • L’écran LCD du panneau avant signale un incident au niveau du ventilateur. • Le voyant d’état d’un ventilateur indique un incident lié au ventilateur. Action PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Avant de commencer toute intervention, reportez-vous au document Product Information Guide (Guide d’informations sur le produit) pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l’ordinateur et la protection contre les décharges électrostatiques. 1 Exécutez le test de diagnostic en ligne approprié. Voir “Utilisation de Dell PowerEdge Diagnostics”, page 133. 2 Ouvrez le système. Voir “Ouverture et fermeture du système”, page 52. PRÉCAUTION : les ventilateurs sont enfichables à chaud. Pour maintenir un refroidissement adéquat lorsque le système est sous tension, remplacez les ventilateurs un à la fois. 3 Identifiez le ventilateur défectueux indiqué sur l’écran LCD, le logiciel de diagnostic, ou le voyant de ventilateur qui clignote en orange. Pour connaître le numéro d’identification de chaque ventilateur, voir la figure 3-4.Dépannage du système 121 4 Vérifiez que le câble d’alimentation du ventilateur défectueux est bien raccordé au connecteur approprié. Dans le cas d’un ventilateur enfichable à chaud, retirez puis réinstallez le ventilateur. Voir “Ventilateurs”, page 54. REMARQUE : patientez 30 secondes pour laisser au système le temps de reconnaître le ventilateur et de déterminer s’il fonctionne normalement. 5 Si l’incident persiste, installez un nouveau ventilateur. Voir “Ventilateurs”, page 54. Si le nouveau ventilateur fonctionne normalement, refermez le système. Voir “Ouverture et fermeture du système”, page 52. Si le nouveau ventilateur ne fonctionne pas, voir “Obtention d’aide”, page 145. Dépannage de la mémoire système Incident • Une barrette de mémoire est défectueuse. • Carte système défectueuse. • L’écran LCD du panneau avant indique qu’un incident lié à la mémoire système s’est produit. Action PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Reportez-vous au document Product Information Guide (Guide d’informations sur le produit) pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l’ordinateur et la protection contre les décharges électrostatiques. 1 Si le système fonctionne, exécutez le test des diagnostics en ligne approprié. Voir “Utilisation de Dell PowerEdge Diagnostics”, page 133. Si les diagnostics indiquent une panne, suivez les instructions fournies par le programme de diagnostic. Si l’incident persiste ou si le système ne fonctionne toujours pas, passez à l’étape suivante. 2 Éteignez le système et les périphériques connectés, puis débranchez le système de la prise de courant et appuyez sur le bouton d’alimentation. Rebranchez ensuite le système à la prise de courant. 3 Allumez le système et les périphériques connectés. Pendant que le système redémarre, notez les messages qui s’affichent à l’écran. Si la quantité de mémoire système détectée pendant l’auto-test de démarrage ne correspond pas à la mémoire installée, ou si un message d’erreur relatif à la mémoire s’affiche, passez à l’étape 4. Si des messages d’erreur s’affichent, indiquant qu’une barrette de mémoire est en panne, passez à l’étape 11. 4 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant. 5 Ouvrez le système. Voir “Ouverture et fermeture du système”, page 52.122 Dépannage du système 6 Assurez-vous que les bancs de mémoire sont remplis dans le bon ordre. Voir “Consignes générales d’installation des barrettes de mémoire”, page 64. Si les connecteurs mémoire sont remplis correctement, passez à l’étape suivante. 7 Remettez les barrettes de mémoire dans leurs supports. Voir “Installation de barrettes de mémoire”, page 66. 8 Refermez le système. Voir “Ouverture et fermeture du système”, page 52. 9 Rebranchez le système à la prise de courant et allumez-le, ainsi que les périphériques connectés. 10 Accédez au programme de configuration du système et vérifiez le paramétrage de la mémoire système. Voir “Utilisation du programme de configuration du système”, page 33. Si l’espace mémoire installé ne correspond pas au paramètre de mémoire système, passez à l’étape suivante. 11 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant. 12 Ouvrez le système. Voir “Ouverture et fermeture du système”, page 52. REMARQUE : il existe plusieurs configurations pour les barrettes de mémoire (voir “Consignes générales d’installation des barrettes de mémoire”, page 64). 13 Si un test de diagnostic ou un message d’erreur indique qu’une barrette de mémoire est défectueuse, repositionnez-la ou remplacez-la. Vous pouvez également échanger la barrette se trouvant dans le logement 1 avec une autre barrette fiable (de même type et de même capacité). Voir “Installation de barrettes de mémoire”, page 66. 14 Refermez le système. Voir “Ouverture et fermeture du système”, page 52. 15 Rebranchez le système à la prise de courant et allumez-le, ainsi que les périphériques connectés. 16 Pendant l’amorçage du système, observez les voyants de diagnostic du panneau avant, et guettez l’apparition de messages d’erreur. 17 Si l’incident persiste, répétez la procédure, de l’étape 11 à l’étape 17, pour chaque barrette installée. Si l’incident persiste malgré la vérification de toutes les barrettes, voir “Obtention d’aide”, page 145.Dépannage du système 123 Dépannage d’un lecteur de disquette Incident • Un message d’erreur signale un incident lié au lecteur de disquette. Action PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Avant de commencer toute intervention, reportez-vous au document Product Information Guide (Guide d’informations sur le produit) pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l’ordinateur et la protection contre les décharges électrostatiques. 1 Accédez au programme de configuration du système et vérifiez que le lecteur de disquette est configuré correctement. Voir “Utilisation du programme de configuration du système”, page 33. 2 Retirez le cadre. Voir “Retrait et réinstallation du cadre avant en option”, page 52. 3 Retirez le support du lecteur de disquette ou du lecteur optique et vérifiez que le câble du lecteur de disquette est fermement raccordé. Réinstallez le support du lecteur optique ou du lecteur de disquette, en vous assurant qu’il est correctement inséré et positionné dans le châssis. Voir la figure 3-14. 4 Exécutez le test de diagnostic en ligne approprié pour vérifier que le lecteur de disquette fonctionne correctement. Si le test échoue, passez à l’étape suivante. Voir “Utilisation de Dell PowerEdge Diagnostics”, page 133. 5 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant. 6 Ouvrez le système. Voir “Ouverture et fermeture du système”, page 52. 7 Retirez toutes les cartes d’extension du système. Voir “Retrait d’une carte d’extension”, page 62. 8 Refermez le système. Voir “Ouverture et fermeture du système”, page 52. 9 Rebranchez le système à la prise de courant et allumez-le, ainsi que les périphériques connectés. 10 Exécutez le test de diagnostic en ligne approprié pour vérifier que le lecteur de disquette fonctionne correctement. Si les tests réussissent, il est possible qu’une carte d’extension soit en conflit avec la logique du lecteur de disquette ou qu’elle soit défectueuse. Passez à l’étape suivante. Si le test échoue, voir “Obtention d’aide”, page 145.124 Dépannage du système 11 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant. 12 Ouvrez le système. Voir “Ouverture et fermeture du système”, page 52. 13 Réinstallez l’une des cartes d’extension retirées à l’étape 7. Voir “Installation d’une carte d’extension”, page 60. 14 Refermez le système. Voir “Ouverture et fermeture du système”, page 52. 15 Rebranchez le système à la prise de courant et allumez-le, ainsi que les périphériques connectés. 16 Exécutez le test de diagnostic en ligne approprié pour vérifier que le lecteur de disquette fonctionne correctement. 17 Recommencez la procédure, de l’étape 11 à l’étape 16, jusqu’à ce que toutes les cartes d’extension soient réinstallées ou que l’une des cartes fasse échouer les tests. Si l’incident persiste, voir “Obtention d’aide”, page 145. Dépannage d’un lecteur optique Incident • Le système ne peut pas lire les données d’un CD ou d’un DVD placé dans le lecteur. • Le voyant du lecteur optique ne clignote pas au démarrage du système. REMARQUE : les périphériques DVD sont uniquement des périphériques de données. Action PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Reportez-vous au document Product Information Guide (Guide d’informations sur le produit) pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l’ordinateur et la protection contre les décharges électrostatiques. 1 Essayez un autre CD ou DVD fonctionnel. 2 Accédez au programme de configuration du système et vérifiez que le contrôleur IDE du lecteur est activé. Voir “Utilisation du programme de configuration du système”, page 33. 3 Exécutez le test de diagnostic en ligne approprié. Voir “Utilisation de Dell PowerEdge Diagnostics”, page 133. 4 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant. 5 Ouvrez ou retirez le cadre. Voir “Retrait et réinstallation du cadre avant en option”, page 52. 6 Ouvrez le système. Voir “Ouverture et fermeture du système”, page 52. 7 Vérifiez que le câble d’interface est correctement connecté au lecteur optique et à la carte latérale. 8 Refermez le système. Voir “Ouverture et fermeture du système”, page 52. 9 Rebranchez le système à la prise de courant et allumez-le, ainsi que les périphériques connectés. Si l’incident persiste, voir “Obtention d’aide”, page 145.Dépannage du système 125 Dépannage d’un disque dur Incident • Erreur de pilote de périphérique. • Un ou plusieurs disques durs ne sont pas reconnus par le système. Action PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Reportez-vous au document Product Information Guide (Guide d’informations sur le produit) pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l’ordinateur et la protection contre les décharges électrostatiques. AVIS : cette procédure de dépannage risque de supprimer les données stockées sur le disque dur. Avant de continuer, créez une copie de sauvegarde de tous les fichiers qui se trouvent sur le disque dur. 1 Exécutez le test de diagnostic en ligne approprié. Voir “Utilisation de Dell PowerEdge Diagnostics”, page 133. Procédez comme suit, selon les résultats du test de diagnostic. 2 Retirez le cadre. Voir “Retrait et réinstallation du cadre avant en option”, page 52. 3 Si l’incident concerne plusieurs disques durs, passez à l’étape 8. S’il concerne un seul disque dur, passez à l’étape suivante. 4 Mettez le système hors tension, remboîtez le disque dur et redémarrez le système. 5 Si le système est équipé d’un contrôleur RAID SAS, effectuez les opérations suivantes. a Redémarrez le système et appuyez sur pour ouvrir l’utilitaire de configuration de l’adaptateur à l’hôte. Consultez la documentation fournie avec le contrôleur pour obtenir des informations sur cet utilitaire. b Assurez-vous que le disque dur a été correctement configuré. c Quittez l’utilitaire de configuration et laissez le système d’exploitation démarrer. 6 Assurez-vous que les pilotes requis pour la carte contrôleur sont installés et configurés correctement. Reportez-vous à la documentation du système d’exploitation pour plus d’informations. AVIS : si le système est équipé d’une carte contrôleur RAID SAS, ignorez l’étape suivante.126 Dépannage du système 7 Si le système contient une carte contrôleur SAS sans option RAID, retirez le disque dur et échangez-le avec un disque opérationnel installé dans une autre baie. Si l’incident est résolu, réinstallez le disque dur dans la baie d’origine. Voir “Installation d’un disque dur enfichable à chaud”, page 83. Si le disque dur fonctionne correctement dans la baie d’origine, il se peut que des incidents liés au support de lecteur surviennent par intermittence. Remplacez ce support. Voir “Obtention d’aide”, page 145. Si le disque dur fonctionne correctement dans une autre baie, mais pas dans sa baie d’origine, l’incident est lié à un connecteur du fond de panier SAS. Voir “Obtention d’aide”, page 145. 8 Vérifiez les connexions des câbles à l’intérieur du système : a Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant. b Ouvrez le système. Voir “Ouverture et fermeture du système”, page 52. c Vérifiez que le fond de panier SAS est correctement relié à la carte contrôleur. Voir “Installation d’une carte contrôleur SAS”, page 85. d Vérifiez que les câbles de données sont correctement insérés dans leurs connecteurs. e Vérifiez que le connecteur d’alimentation du fond de panier SAS est correctement inséré dans son connecteur. f Refermez le système. Voir “Ouverture et fermeture du système”, page 52. g Rebranchez le système à la prise de courant et allumez-le, ainsi que les périphériques connectés. Si l’incident persiste, voir “Obtention d’aide”, page 145.Dépannage du système 127 Dépannage d’un contrôleur SAS ou RAID SAS REMARQUE : lorsque vous dépannez un contrôleur SAS ou RAID SAS, reportez-vous également à sa documentation et à celle du système d’exploitation. Incident • Un message d’erreur signale un incident lié au contrôleur SAS ou RAID SAS. • Le contrôleur SAS ou RAID SAS ne fonctionne pas correctement ou pas du tout. Action PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Avant de commencer toute intervention, reportez-vous au document Product Information Guide (Guide d’informations sur le produit) pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l’ordinateur et la protection contre les décharges électrostatiques. 1 Exécutez le test de diagnostic en ligne approprié. Voir “Utilisation de Dell PowerEdge Diagnostics”, page 133. 2 Accédez au programme de configuration du système et vérifiez que le contrôleur SAS ou RAID SAS est activé. Voir “Utilisation du programme de configuration du système”, page 33. 3 Redémarrez le système et appuyez sur pour ouvrir l’utilitaire de configuration : Reportez-vous à la documentation du contrôleur pour obtenir des informations sur les paramètres de configuration. 4 Vérifiez les paramètres de configuration, corrigez-les au besoin et redémarrez le système. Si l’incident persiste, passez à l’étape suivante. 5 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant. 6 Ouvrez le système. Voir “Ouverture et fermeture du système”, page 52. 7 Vérifiez que la carte contrôleur est correctement insérée dans le connecteur INTERNAL_STORAGE de la carte système. Voir “Installation d’une carte contrôleur SAS”, page 85.128 Dépannage du système 8 Si le système est équipé d’un contrôleur RAID SAS, vérifiez que les composants suivants sont correctement installés et connectés : • Barrette de mémoire • Pile RAID 9 Vérifiez que le fond de panier est correctement relié au contrôleur SAS. Voir “Fond de panier SAS (maintenance uniquement)”, page 99. 10 Refermez le système. Voir “Ouverture et fermeture du système”, page 52. 11 Rebranchez le système à la prise de courant et allumez-le, ainsi que les périphériques connectés. Si l’incident persiste, procédez comme suit : • Si le système est équipé d’un contrôleur SAS, voir “Obtention d’aide”, page 145. • Si le système est équipé d’un contrôleur RAID, remplacez la pile RAID. Voir “Installation de la pile d’une carte contrôleur RAID SAS”, page 85. Si le remplacement de la pile ne résout pas l’incident, voir “Obtention d’aide”, page 145. Dépannage d’un lecteur de bande SAS externe Incident • Lecteur de bande défectueux • Cartouche défectueuse • Logiciel de sauvegarde sur bande ou pilote du lecteur de bande manquant ou altéré • Contrôleur SAS défectueux Action 1 Retirez la cartouche que vous utilisiez lorsque l’incident s’est produit, et remplacez-la par une autre dont vous êtes certain qu’elle fonctionne. 2 Assurez-vous que les pilotes correspondant au lecteur de bande sont installés et configurés correctement. 3 Exécutez les diagnostics en ligne appropriés. Voir “Utilisation de Dell PowerEdge Diagnostics”, page 133. 4 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant. PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Avant de commencer toute intervention, reportez-vous au document Product Information Guide (Guide d’informations sur le produit) pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l’ordinateur et la protection contre les décharges électrostatiques.Dépannage du système 129 5 Ouvrez le système. Voir “Ouverture et fermeture du système”, page 52. 6 Vérifiez que la carte contrôleur est correctement insérée dans le connecteur de la carte système. 7 Vérifiez que le câble d’interface/d’alimentation en CC du lecteur de bande est connecté au lecteur de bande et à la carte contrôleur. 8 Refermez le système. Voir “Ouverture et fermeture du système”, page 52. 9 Rebranchez le système à la prise de courant et allumez-le, ainsi que les périphériques connectés. 10 Si l’incident n’est pas résolu, consultez la documentation du lecteur de bande pour obtenir des instructions de dépannage supplémentaires. 11 Réinstallez le logiciel de sauvegarde sur bande en suivant les instructions de sa documentation d’accompagnement. 12 Si vous ne parvenez pas à résoudre l’incident, consultez la section “Obtention d’aide”, page 145. Dépannage des cartes d’extension REMARQUE : lorsque vous dépannez une carte d’extension, consultez la documentation du système d’exploitation et de la carte d’extension. Incident • Un message d’erreur signale un incident lié à une carte d’extension. • La carte d’extension ne fonctionne pas correctement ou pas du tout. Action PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Avant de commencer toute intervention, reportez-vous au document Product Information Guide (Guide d’informations sur le produit) pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l’ordinateur et la protection contre les décharges électrostatiques. 1 Exécutez le test de diagnostic en ligne approprié. Voir “Exécution des diagnostics du système”, page 133. 2 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant. 3 Ouvrez le système. Voir “Ouverture et fermeture du système”, page 52. 4 Vérifiez que chaque carte d’extension est insérée à fond dans son connecteur. Voir “Cartes d’extension”, page 59. 5 Refermez le système. Voir “Ouverture et fermeture du système”, page 52. 6 Rebranchez le système à la prise de courant et allumez-le, ainsi que les périphériques connectés. Si l’incident persiste, passez à l’étape suivante.130 Dépannage du système 7 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant. 8 Ouvrez le système. Voir “Ouverture et fermeture du système”, page 52. 9 Retirez toutes les cartes d’extension du système. Voir “Retrait d’une carte d’extension”, page 62. 10 Refermez le système. Voir “Ouverture et fermeture du système”, page 52. 11 Rebranchez le système à la prise de courant et allumez-le, ainsi que les périphériques connectés. 12 Exécutez le test de diagnostic en ligne approprié. Si le test échoue, voir “Obtention d’aide”, page 145. 13 Pour chaque carte d’extension retirée à l’étape 9, effectuez les opérations suivantes : a Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant. b Ouvrez le système. Voir “Ouverture et fermeture du système”, page 52. c Réinstallez une des cartes d’extension. Voir “Installation d’une carte d’extension”, page 60. d Refermez le système. “Ouverture et fermeture du système”, page 52. e Exécutez le test de diagnostic approprié. Si le test échoue, voir “Obtention d’aide”, page 145. Dépannage des microprocesseurs Incident • Un message d’erreur signale un incident lié au processeur. • L’écran LCD du panneau avant indique qu’un incident lié aux processeurs ou à la carte système s’est produit. • Un dissipateur de chaleur n’est pas installé pour chaque processeur. Action PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Reportez-vous au document Product Information Guide (Guide d’informations sur le produit) pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l’ordinateur et la protection contre les décharges électrostatiques. 1 Exécutez le test des diagnostics en ligne approprié. Voir “Utilisation de Dell PowerEdge Diagnostics”, page 133. 2 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant. 3 Ouvrez le système. Voir “Ouverture et fermeture du système”, page 52.Dépannage du système 131 4 Vérifiez que chaque processeur et chaque dissipateur de chaleur est installé correctement. Voir “Retrait d’un processeur”, page 69. 5 Refermez le système. Voir “Ouverture et fermeture du système”, page 52. 6 Rebranchez le système à la prise de courant et allumez-le, ainsi que les périphériques connectés. 7 Exécutez le test de diagnostic en ligne approprié. Si le test échoue ou si l’incident persiste, passez à l’étape suivante. 8 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant. 9 Ouvrez le système. Voir “Ouverture et fermeture du système”, page 52. 10 Remplacez le processeur 1 par un autre processeur de même type. Voir les sections “Retrait d’un processeur”, page 69 et “Installation d’un processeur”, page 72. 11 Refermez le système. Voir “Ouverture et fermeture du système”, page 52. 12 Exécutez le test de diagnostic en ligne approprié. Si les tests aboutissent, remplacez le processeur 1. Voir “Obtention d’aide”, page 145. Si le test échoue, voir “Obtention d’aide”, page 145.132 Dépannage du systèmeExécution des diagnostics du système 133 Exécution des diagnostics du système Si vous rencontrez des difficultés lors de l’utilisation du système, lancez les diagnostics avant de demander une assistance technique. Le but des diagnostics est de tester le matériel du système sans nécessiter d’équipement supplémentaire et sans risque de perte de données. Si vous ne réussissez pas à corriger l’incident, le personnel de service et de support peut s’aider des résultats de ces tests. Utilisation de Dell PowerEdge Diagnostics Pour diagnostiquer un incident, commencez par utiliser les diagnostics en ligne, Dell™ PowerEdge™ Diagnostics. Ces derniers comprennent divers modules de test pour le châssis et les composants de stockage (disques durs, mémoire physique, ports de communication et d’impression, NIC, CMOS, etc.). Si vous n’arrivez pas à identifier l’incident à l’aide de PowerEdge Diagnostics, utilisez les diagnostics du système. Les fichiers requis pour exécuter PowerEdge Diagnostics sur les systèmes Microsoft Windows et Linux sont disponibles sur le site support.dell.com, ainsi que sur les CD fournis avec le système. Pour plus d’informations sur l’utilisation des diagnostics, consultez le document Dell PowerEdge Diagnostics User’s Guide (Guide d’utilisation de Dell PowerEdge Diagnostics). Fonctionnalités des diagnostics du système Les diagnostics du système contiennent des menus et des options permettant de tester des groupes de périphériques ou des périphériques particuliers. Ces options permettent : • de lancer un ou plusieurs tests ; • de définir l’ordre des tests ; • de répéter des tests ; • d’afficher, d’imprimer et d’enregistrer les résultats des tests ; • d’interrompre temporairement un test quand une erreur est détectée ou de l’arrêter lorsqu’une limite d’erreur définie par l’utilisateur est atteinte ; • d’afficher des messages d’aide qui décrivent brièvement chaque test et ses paramètres ; • d’afficher des messages d’état qui vous indiquent si les tests ont abouti ; • d’afficher des messages d’erreur qui vous indiquent si des incidents sont survenus pendant les tests.134 Exécution des diagnostics du système Quand utiliser les diagnostics du système Le fait qu’un composant ou un périphérique important du système ne fonctionne pas normalement peut être le symptôme d’une panne. Tant que le processeur et les périphériques d’entrée-sortie du système (le moniteur, le clavier et le lecteur de disquette) fonctionnent, vous pouvez utiliser les diagnostics pour faciliter l’identification de l’incident. Exécution des diagnostics du système Les diagnostics du système s’exécutent à partir de la partition d’utilitaires du disque dur. AVIS : n’utilisez les diagnostics que sur le système. Leur utilisation sur d’autres systèmes peut entraîner des résultats non valides ou générer des messages d’erreur. De plus, n’utilisez que le programme fourni avec le système (ou une mise à jour). 1 Au démarrage du système, appuyez sur pendant l’auto-test de démarrage. 2 Dans le menu principal de la partition d’utilitaires, sélectionnez Run System Diagnostics (Exécuter les diagnostics du système), ou sélectionnez Run Memory Diagnostics (Exécuter les diagnostics de la mémoire) si vous cherchez à identifier un incident lié à la mémoire. Quand vous lancez les diagnostics du système, un message s’affiche, indiquant qu’ils sont en cours d’initialisation. Ensuite, le menu Diagnostics s’affiche. Ce menu vous permet de lancer tous ou certains tests, ou encore de quitter les diagnostics du système. REMARQUE : avant de lire le reste de cette section, lancez les diagnostics du système pour afficher l’utilitaire à l’écran. Options de test des diagnostics du système Cliquez sur l’option de test voulue dans la fenêtre Main Menu (Menu principal). Le tableau 5-1 contient une brève explication sur les options de test disponibles. Tableau 5-1. Options de test des diagnostics du système Option de test Fonction Express Test (Test rapide) Effectue une vérification rapide du système. Cette option exécute les tests de périphériques qui ne requièrent pas d’action de l’utilisateur. Elle permet d’identifier rapidement la source de l’incident. Extended Test (Test complet) Effectue une vérification plus complète du système. Ce test peut prendre plus d’une heure. Custom Test (Test personnalisé) Teste un périphérique particulier. Information Affiche les résultats des tests.Exécution des diagnostics du système 135 Utilisation des options de test personnalisées Lorsque vous sélectionnez l’option Custom Test (Test personnalisé) dans l’écran Main Menu (Menu principal), la fenêtre Customize (Personnaliser) s’affiche. Elle permet de sélectionner les périphériques à tester, de choisir des options de test spécifiques et de visualiser les résultats obtenus. Sélection de périphériques à tester La partie gauche de la fenêtre Customize (Personnaliser) répertorie les périphériques qui peuvent être testés. Ceux-ci sont regroupés par type ou par module, selon l’option sélectionnée. Cliquez sur le signe (+) en regard d’un périphérique ou d’un module pour visualiser ses composants. Cliquez sur (+) sur un composant pour visualiser les tests disponibles. Si vous cliquez sur un périphérique et non sur ses composants, tous les composants de ce périphérique sont sélectionnés pour le test. Sélection d’options de diagnostic Le champ Diagnostics Options (Options de diagnostic) permet de sélectionner la façon dont le périphérique sera testé. Vous pouvez définir les options suivantes : • Non-Interactive Tests Only (Tests non-interactifs uniquement) : cette option permet d’exécuter uniquement les tests ne nécessitant aucune intervention de l’utilisateur. • Quick Tests Only (Tests rapides uniquement) : cette option permet d’exécuter uniquement les tests rapides sur le périphérique sélectionné. Les tests étendus ne seront pas lancés si vous sélectionnez cette option. • Show Ending Timestamp (Afficher l’heure de fin) : cette option permet d’ajouter un horodatage au journal de test. • Test Iterations (Nombre d’itérations) : cette option sélectionne le nombre de fois où le test est exécuté. • Log output file pathname (Emplacement du fichier de sortie) : cette option permet d’indiquer l’emplacement où le journal de test doit être sauvegardé. Visualisation des informations et des résultats Les onglets de la fenêtre Customize (Personnaliser) contiennent des informations sur les tests et les résultats. Les onglets suivants sont disponibles : • Results (Résultats) : indique le test exécuté et son résultat. • Errors (Erreurs) : affiche les erreurs qui se sont produites pendant le test. • Help (Aide) : affiche des informations sur le périphérique, le composant ou le test sélectionné. • Configuration : affiche des informations de base concernant la configuration du périphérique sélectionné. • Parameters (Paramètres) : le cas échéant, cet onglet affiche les paramètres que vous pouvez définir pour le test à exécuter.136 Exécution des diagnostics du systèmeCavaliers et connecteurs 137 Cavaliers et connecteurs Cette section fournit des informations spécifiques sur les cavaliers du système. Elle contient également des informations générales sur les cavaliers et les commutateurs et décrit les connecteurs des différentes cartes du système. Cavaliers de la carte système La figure 6-1 indique l’emplacement des cavaliers de configuration sur la carte système. Le tableau 6-1 répertorie les réglages de ces cavaliers. REMARQUE : pour accéder aux cavaliers, retirez les protecteurs de ventilation. Voir “Retrait des protecteurs de ventilation”, page 56.138 Cavaliers et connecteurs Figure 6-1. Cavaliers de la carte système Tableau 6-1. Réglages des cavaliers de la carte système Cavalier Réglage Description 1 PSWD_EN (par défaut) La fonction de mot de passe est activée. La fonction de mot de passe est désactivée. 2 NVRAM_CLR (par défaut) Les paramètres de configuration sont conservés au démarrage du système. Les paramètres de configuration sont effacés au prochain démarrage du système. REMARQUE : pour obtenir le nom complet d’une abréviation ou d’un sigle utilisé dans ce tableau, voir le “Glossaire”, page 171.Cavaliers et connecteurs 139 Désactivation d’un mot de passe oublié Les fonctionnalités logicielles de protection du système comprennent un mot de passe système et un mot de passe de configuration, qui sont présentés en détail dans la section “Utilisation du programme de configuration du système”, page 33. Le cavalier de mot de passe active ces fonctions ou les désactive, et efface le(s) mot(s) de passe utilisé(s). PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Reportez-vous au document Product Information Guide (Guide d’informations sur le produit) pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l’ordinateur et la protection contre les décharges électrostatiques. 1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant. 2 Ouvrez le système. Voir “Ouverture et fermeture du système”, page 52. 3 Relevez le protecteur de ventilation de la mémoire. 4 Retirez la fiche du cavalier de mot de passe. Voir la figure 6-1 pour repérer l’emplacement du cavalier de mot de passe sur la carte système. 5 Refermez le système. 6 Reconnectez le système et les périphériques sur le secteur, puis remettez-les sous tension. Pour que les mots de passe existants soient désactivés (effacés), le système doit démarrer avec la fiche du cavalier de mot de passe retirée. Toutefois, avant d’attribuer un nouveau mot de passe système et/ou de configuration, vous devez réinstaller la fiche du cavalier. REMARQUE : si vous attribuez un nouveau mot de passe système et/ou de configuration alors que la fiche de cavalier est encore retirée, le système désactive les nouveaux mots de passe à son prochain démarrage. 7 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant. 8 Ouvrez le système. Voir “Ouverture et fermeture du système”, page 52. 9 Installez la fiche sur le cavalier du mot de passe. 10 Abaissez le protecteur de ventilation de la mémoire. 11 Refermez le système. 12 Reconnectez le système et les périphériques sur le secteur, puis remettez-les sous tension. 13 Attribuez un nouveau mot de passe système et/ou de configuration. Pour attribuer un nouveau mot de passe à l’aide du programme de configuration du système, voir “Attribution d’un mot de passe système”, page 43.140 Cavaliers et connecteurs Connecteurs de la carte système Voir la figure 6-2 et le tableau 6-2 pour obtenir la description et l’emplacement des connecteurs de la carte système. Figure 6-2. Connecteurs de la carte système 1 2 3 13 14 4 5 6 7 8 9 10 11 12 15 16 17 18 19 20 21 22 23 24 28 27 26 25 33 32 31 30 29 38 35 36 37 34 40 39Cavaliers et connecteurs 141 Tableau 6-2. Connecteurs de la carte système Label du connecteur Description 1 PSWD_EN Cavalier de mot de passe 2 NVRAM_CLR Cavalier de configuration 3 SLOT 7 Connecteur de carte d’extension PCIe x4 4 SLOT 6 Connecteur de carte d’extension PCIe x4 5 SLOT 5 Connecteur de carte d’extension PCIe x4 6 SLOT 4 Connecteur de carte d’extension PCIe x8 7 SLOT 3 Connecteur de carte d’extension PCIe x8 8 SLOT 2 Connecteur de carte d’extension PCIe x4 9 SLOT 1 Connecteur de carte d’extension PCIe x4 10 INTERNAL_STORAGE Connecteur de carte contrôleur SAS 11 RAC_CONN Connecteur de carte d’accès à distance (RAC, en option) 12 RAC_CONN1 Connecteur du câble RAC (40 broches) 13 RAC_CONN2 Connecteur du câble RAC (50 broches) 14 CPU 1 Connecteur du processeur 1 15 DIMM 1 Connecteur de barrette de mémoire (logement 1) 16 DIMM 2 Connecteur de barrette de mémoire (logement 2) 17 DIMM 3 Connecteur de barrette de mémoire (logement 3) 18 DIMM 4 Connecteur de barrette de mémoire (logement 4) 19 DIMM 9 Connecteur de barrette de mémoire (logement 9) 20 DIMM 10 Connecteur de barrette de mémoire (logement 10) 21 DIMM 11 Connecteur de barrette de mémoire (logement 11) 22 DIMM 12 Connecteur de barrette de mémoire (logement 12) 23 12 V Connecteur d’alimentation (12 V) 24 PWR_3.3Stby_Cntrl Connecteur de signal pour la carte de distribution de l’alimentation 25 CPU 3 Connecteur du processeur 3 26 VRM 3 Connecteur de module VRM 3 27 VRM 4 Connecteur de module VRM 4 28 CPU 4 Connecteur du processeur 4 REMARQUE : pour obtenir le nom complet d’une abréviation ou d’un sigle utilisé dans ce tableau, voir le “Glossaire”, page 171.142 Cavaliers et connecteurs 29 INTRUSION Connecteur du commutateur d’intrusion 30 DIMM 13 Connecteur de barrette de mémoire (logement 13) 31 DIMM 14 Connecteur de barrette de mémoire (logement 14) 32 DIMM 15 Connecteur de barrette de mémoire (logement 15) 33 DIMM 16 Connecteur de barrette de mémoire (logement 16) 34 CPU 2 Connecteur du processeur 2 35 DIMM 5 Connecteur de barrette de mémoire (logement 5) 36 DIMM 6 Connecteur de barrette de mémoire (logement 6) 37 DIMM 7 Connecteur de barrette de mémoire (logement 7) 38 DIMM 8 Connecteur de barrette de mémoire (logement 8) 39 BATTERY Connecteur pour la pile bouton de 3 V 40 CONTROL_PANEL Connecteur du câble du panneau de commande Tableau 6-2. Connecteurs de la carte système (suite) Label du connecteur Description REMARQUE : pour obtenir le nom complet d’une abréviation ou d’un sigle utilisé dans ce tableau, voir le “Glossaire”, page 171.Cavaliers et connecteurs 143 Connecteurs de la carte de fond de panier SAS La figure 6-3 montre l’emplacement des connecteurs sur la carte de fond de panier. Figure 6-3. Connecteurs de la carte de fond de panier SAS 3 4 2 1 5 6 1 SAS A 2 Interface de données 3 Alimentation 4 Panneau de commande (situé à l’avant de la carte) 5 SAS B 6 Encoche d’alignement pour installation144 Cavaliers et connecteursObtention d’aide 145 Obtention d’aide Assistance technique Si vous avez besoin d’assistance pour un incident technique, effectuez les opérations suivantes : 1 Suivez les procédures de la section “Dépannage du système”, page 109. 2 Exécutez les diagnostics du système et notez toutes les informations obtenues. 3 Faites une copie de la Liste de vérification des diagnostics et complétez-la. 4 Pour vous aider lors des procédures d’installation et de dépannage, utilisez toute la gamme de services en ligne proposés par Dell sur le site support.dell.com. Pour plus d’informations, voir “Services en ligne”, page 146. 5 Si les étapes précédentes n’ont pas résolu l’incident, appelez Dell pour obtenir une assistance technique. REMARQUE : passez votre appel à partir d’un téléphone qui se trouve près du système pour que le support technique puisse vous guider dans l’accomplissement des opérations nécessaires. REMARQUE : il se peut que le système de code de service express de Dell ne soit pas disponible dans votre pays. Lorsque le système téléphonique automatisé de Dell vous le demande, entrez votre code de service express pour acheminer directement votre appel vers le personnel de support compétent. Si vous ne disposez pas d’un code de service express, ouvrez le dossier Dell Accessories (Accessoires Dell), doublecliquez sur l’icône Express Service Code (Code de service express) et suivez les indications. Pour obtenir des instructions sur l’utilisation du service de support technique, voir les sections “Service de support technique”, page 147 et “Avant d’appeler”, page 148. REMARQUE : certains des services suivants ne sont disponibles que dans certains pays. Appelez votre représentant Dell local pour obtenir des informations sur leur disponibilité.146 Obtention d’aide Services en ligne Vous pouvez accéder au site Dell Support à l’adresse support.dell.com. Sélectionnez votre région sur la page WELCOME TO DELL SUPPORT (Bienvenue dans le service de support de Dell) et donnez les détails requis pour accéder aux outils d’aide et aux informations. Vous pouvez contacter Dell en utilisant les adresses ci-dessous : • World Wide Web www.dell.com/ www.dell.com/ap/ (région Asie/Pacifique uniquement) www.dell.com/jp (Japon uniquement) www.euro.dell.com (Europe uniquement) www.dell.com/la (pays d’Amérique latine) www.dell.ca (Canada uniquement) • Protocole de transfert de fichiers (FTP) anonyme ftp.dell.com/ Connectez-vous en tant que user:anonymous (utilisateur : anonyme), et indiquez votre adresse e-mail comme mot de passe. • Service de support électronique support@us.dell.com apsupport@dell.com (région Asie/Pacifique uniquement) support.jp.dell.com (Japon uniquement) support.euro.dell.com (Europe uniquement) • Service de devis électronique apmarketing@dell.com (région Asie/Pacifique uniquement) sales_canada@dell.com (Canada uniquement)Obtention d’aide 147 Service AutoTech Le service de support technique automatisé de Dell, “AutoTech”, fournit des réponses préenregistrées aux questions les plus fréquentes des clients de Dell concernant leurs systèmes informatiques portables et de bureau. Quand vous appelez AutoTech, utilisez votre téléphone à touches pour choisir les sujets qui correspondent à vos questions. Le service AutoTech est disponible 24 heures sur 24, 7 jours sur 7. Vous pouvez aussi accéder à ce service via le service de support technique. Consultez les informations de contact de votre région. Service d’état des commandes automatisé Pour vérifier l’état de vos commandes de produits Dell™, vous pouvez visiter le site Web support.dell.com ou appeler le service d’état des commandes automatisé. Un message préenregistré vous invite à entrer les informations concernant votre commande afin de la localiser et de vous informer. Consultez les informations de contact de votre région. Service de support technique Le service de support technique Dell est disponible 24 heures sur 24, 7 jours sur 7, pour répondre à vos questions concernant le matériel Dell. Notre équipe de support technique utilise des diagnostics assistés par ordinateur pour répondre plus rapidement et plus efficacement à vos questions. Pour contacter le service de support technique de Dell, voir “Avant d’appeler”, page 148 puis reportez-vous aux informations de contact de votre région. Service Dell de formation et de certification pour les entreprises Des formations et certifications Dell Enterprise sont disponibles. Pour plus d’informations, consultez le site www.dell.com/training. Ce service n’est disponible que dans certains pays. Incidents liés à votre commande Si vous avez un problème avec votre commande (pièces manquantes ou inadaptées, problème de facturation), contactez le service clientèle de Dell. Ayez votre facture ou votre bordereau d’emballage à portée de main lorsque vous appelez. Consultez les informations de contact de votre région. Informations produit Si vous avez besoin d’informations à propos d’autres produits disponibles chez Dell, ou si vous désirez passer une commande, consultez le site Web de Dell à l’adresse www.dell.com. Pour trouver le numéro de téléphone à appeler pour parler à un spécialiste des ventes, consultez les informations de contact de votre région.148 Obtention d’aide Renvoi d’articles pour une réparation sous garantie ou un remboursement sous forme d’avoir Préparez comme indiqué ci-après tous les articles à renvoyer, que ce soit pour un renvoi ou un remboursement sous forme d’avoir : 1 Appelez Dell pour obtenir un numéro d’autorisation de renvoi du matériel et écrivez-le lisiblement et bien en vue sur l’extérieur de la boîte. Pour trouver le numéro de téléphone à appeler, consultez les informations de contact de votre région. 2 Joignez une copie de votre facture et une lettre décrivant la raison du renvoi. 3 Joignez une copie de la liste de vérification des diagnostics indiquant les tests que vous avez effectués et les messages d’erreur générés par les Diagnostics du système. 4 Joignez tous les accessoires associés aux éléments renvoyés (câbles d’alimentation, médias [disquettes et CD], guides) s’il s’agit d’une demande de remboursement sous forme d’avoir. 5 Renvoyez l’équipement dans son emballage d’origine (ou un équivalent). Les frais d’expédition sont à votre charge. Vous devez également assurer les produits retournés et assumer les risques de pertes en cours d’expédition. Les envois en port dû ne sont pas acceptés. Si l’un des éléments décrits ci-dessus manque à l’envoi, ce dernier sera refusé à l’arrivée et vous sera renvoyé. Avant d’appeler REMARQUE : ayez votre code de service express à portée de main quand vous appelez. Le code permet au système d’assistance téléphonique automatisé de Dell de diriger votre appel plus efficacement. N’oubliez pas de remplir la Liste de vérification des diagnostics. Si possible, allumez le système avant d’appeler Dell pour obtenir une assistance technique et utilisez un téléphone qui se trouve à côté ou à proximité de l’ordinateur. Il vous sera demandé de taper certaines commandes et de relayer certaines informations détaillées pendant les opérations ou d’essayer d’autres opérations de dépannage qui ne sont possibles que sur le système informatique même. N’oubliez pas de vous munir de la documentation de l’ordinateur. PRÉCAUTION : avant d’intervenir sur les composants de l’ordinateur, consultez les consignes de sécurité qui se trouvent dans le document Product Information Guide (Guide d’informations sur le produit).Obtention d’aide 149 Liste de vérification des diagnostics Nom : Date : Adresse : Numéro de téléphone : Numéro de service (code barre à l’arrière de l’ordinateur) : Code de service express : Numéro d’autorisation de renvoi de matériel (fourni par un technicien de support de Dell) : Système d’exploitation et version : Périphériques : Cartes d’extension : Êtes-vous connecté à un réseau ? Oui Non Réseau, version et carte de réseau : Programmes et versions : Consultez la documentation du système d’exploitation pour déterminer le contenu des fichiers de démarrage du système. Si possible, imprimez chaque fichier. Sinon, notez leur contenu avant d’appeler Dell. Description de l’incident et procédures de dépannage effectuées :150 Obtention d’aide Contacter Dell Vous pouvez contacter Dell à partir des sites Web suivants : • www.dell.com • support.dell.com (support) Vous trouverez les adresses Web spécifiques à votre pays dans la section correspondant du tableau ci-dessous. REMARQUE : les numéros d’appel gratuits ne peuvent être utilisés que dans le pays pour lequel ils sont mentionnés. REMARQUE : dans certains pays, un support technique spécifique a été mis en place pour les ordinateurs Dell™ XPS™. Dans ce cas, un numéro de téléphone spécifique est indiqué pour les pays participants. Si vous ne trouvez aucun numéro de téléphone spécifique pour les systèmes XPS, vous pouvez contacter le service technique Dell. Votre appel sera réacheminé vers le service compétent. Pour contacter Dell, utilisez les adresses électroniques, les numéros de téléphone et les codes indiqués dans le tableau suivant. Si vous avez besoin d’assistance pour connaître les indicatifs à utiliser, contactez un standardiste local ou international. REMARQUE : les coordonnées indiquées étaient correctes au moment de l’impression de ce document, mais peuvent avoir été modifiées. Pays (ville) Indicatif d’accès international - Indicatif du pays Indicatif de la ville Nom du service ou zone de service Site web et adresse e-mail Indicatifs de zone, numéros locaux et numéros d’appel gratuit Afrique du Sud (Johannesburg) Indicatif d’accès international : 09/091 Indicatif du pays : 27 Indicatif de la ville : 11 Site Web : support.euro.dell.com E-mail : dell_za_support@dell.com File d’appel Gold 011 709 7713 Support technique 011 709 7710 Service clientèle 011 709 7707 Ventes 011 709 7700 Fax 011 706 0495 Standard 011 709 7700Obtention d’aide 151 Allemagne (Francfort) Indicatif d’accès international : 00 Indicatif du pays : 49 Indicatif de la ville : 69 Site Web : support.euro.dell.com E-mail : tech_support_central_europe@dell.com Support technique XPS 069 9792 7222 Support technique pour les autres systèmes Dell 069 9792-7200 Service clientèle auprès du grand public et des PME/PMI 0180-5-224400 Service clientèle pour le segment global 069 9792-7320 Service clientèle pour les comptes privilégiés 069 9792-7320 Service clientèle pour les grandes entreprises 069 9792-7320 Service clientèle pour les comptes publics 069 9792-7320 Standard 069 9792-7000 Amérique Latine Support technique clientèle (Austin, Texas, USA) 512 728-4093 Service clientèle (Austin, Texas, USA) 512 728-3619 Fax (support technique et service clientèle) (Austin, Texas, USA) 512 728-3883 Ventes (Austin, Texas, États-Unis) 512 728-4397 Ventes par fax (Austin, Texas, USA) 512 728-4600 ou 512 728-3772 Anguilla Site Web : www.dell.com.ai E-mail : la-techsupport@dell.com Support général numéro vert : 800-335-0031 Antigua et Barbuda Site Web : www.dell.com.ag E-mail : la-techsupport@dell.com Support général 1-800-805-5924 Antilles néerlandaises E-mail : la-techsupport@dell.com Support général 001-800-882-1519 Aomen Support technique (Dell™ Dimension™, Dell Inspiron™, Dell OptiPlex™, Dell Latitude™, et Dell Precision™) 0800-105 Support technique (serveurs et stockage) 0800-105 Pays (ville) Indicatif d’accès international - Indicatif du pays Indicatif de la ville Nom du service ou zone de service Site web et adresse e-mail Indicatifs de zone, numéros locaux et numéros d’appel gratuit152 Obtention d’aide Argentine (Buenos Aires) Indicatif d’accès international : 00 Indicatif du pays : 54 Indicatif de la ville : 11 Site Web : www.dell.com.ar E-mail : la-techsupport@dell.com E-mail (ordinateurs de bureau et portables) : la-techsupport@dell.com E-mail (serveurs et produits de stockage EMC ® ) : la_enterprise@dell.com Service clientèle numéro vert : 0-800-444-0730 Support technique numéro vert : 0-800-444-0733 Services de support technique numéro vert : 0-800-444-0724 Ventes 0-810-444-3355 Aruba Site Web : www.dell.com.aw E-mail : la-techsupport@dell.com Support général numéro vert : 800-1578 Australie (Sydney) Indicatif d’accès international : 0011 Indicatif du pays : 61 Indicatif de la ville : 2 Site Web : support.ap.dell.com E-mail : support.ap.dell.com/contactus Support technique (XPS) numéro vert : 1300 790 877 Support général 13DELL-133355 Autriche (Vienne) Indicatif d’accès international : 900 Indicatif du pays : 43 Indicatif de la ville : 1 Site Web : support.euro.dell.com E-mail : tech_support_central_europe@dell.com Ventes au grand public et aux PME/PMI 0820 240 530 00 Fax pour le grand public et aux PME/PMI 0820 240 530 49 Service clientèle auprès du grand public et des PME/PMI 0820 240 530 14 Service clientèle auprès des comptes privilégiés/des grandes entreprises 0820 240 530 16 Support XPS 0820 240 530 81 Support technique pour les autres systèmes Dell (grand public et PME/PMI) 0820 240 530 17 Support auprès des comptes privilégiés/des grandes entreprises 0820 240 530 17 Standard 0820 240 530 00 Pays (ville) Indicatif d’accès international - Indicatif du pays Indicatif de la ville Nom du service ou zone de service Site web et adresse e-mail Indicatifs de zone, numéros locaux et numéros d’appel gratuitObtention d’aide 153 Bahamas Site Web : www.dell.com.bs E-mail : la-techsupport@dell.com Support général numéro vert : 1-866-874-3038 Belgique (Bruxelles) Indicatif d’accès international : 00 Indicatif du pays : 32 Indicatif de la ville : 2 Site Web : support.euro.dell.com Support technique XPS 02 481 92 96 Support technique pour les autres systèmes Dell 02 481 92 88 Support technique par fax 02 481 92 95 Service clientèle 02 713 15 65 Ventes aux grandes entreprises 02 481 91 00 Fax 02 481 92 99 Standard 02 481 91 00 Bermudes Site Web : www.dell.com/bm E-mail : la-techsupport@dell.com Support général 1-877-890-0751 Bolivie Site Web : www.dell.com/bo E-mail : la-techsupport@dell.com Support général numéro vert : 800-10-0238 Brésil Indicatif d’accès international : 00 Indicatif du pays : 55 Indicatif de la ville : 51 Site Web : www.dell.com/br E-mail : BR-TechSupport@dell.com Service clientèle et support technique 0800 90 3355 Support technique par fax 51 2104 5470 Service clientèle par fax 51 2104 5480 Ventes 0800 722 3498 Brunei Indicatif du pays : 673 Support technique (Penang, Malaisie) 604 633 4966 Service clientèle (Penang, Malaisie) 604 633 4888 Ventes aux particuliers (Penang, Malaisie) 604 633 4955 Pays (ville) Indicatif d’accès international - Indicatif du pays Indicatif de la ville Nom du service ou zone de service Site web et adresse e-mail Indicatifs de zone, numéros locaux et numéros d’appel gratuit154 Obtention d’aide Canada (North York, Ontario) Indicatif d’accès international : 011 État des commandes en ligne : www.dell.ca/ostatus Site Web : support.ca.dell.com AutoTech (support technique automatisé Matériel et Garantie) numéro vert : 1-800-247-9362 Service clientèle (activités à domicile et bureau domestique) numéro vert : 1-800-847-4096 Service clientèle (petites, moyennes et grandes entreprises, administrations) numéro vert : 1-800-387-5757 Service clientèle (imprimantes, projecteurs, téléviseurs, ordinateurs de poche, lecteurs audio numériques et périphériques sans fil) numéro vert : 1-800-847-4096 Support de garantie du matériel - par téléphone (XPS) numéro vert : 1-866-398-8977 Support de garantie du matériel – par téléphone (activités à domicile et bureau domestique) numéro vert : 1-800-847-4096 Support de garantie du matériel – par téléphone (petites, moyennes et grandes entreprises, administrations) numéro vert : 1-800-387-5757 Support de garantie du matériel – par téléphone (imprimantes, projecteurs, téléviseurs, ordinateurs de poche, lecteurs audio numériques et périphériques sans fil) 1-877-335-5767 Ventes (Petites entreprises et activités professionnelles à domicile) numéro vert : 1-800-387-5752 Ventes (moyennes et grandes entreprises, pouvoirs publics) numéro vert : 1-800-387-5755 Ventes de pièces détachées et de services étendus 1 866 440 3355 Chili (Santiago) Indicatif du pays : 56 Indicatif de la ville : 2 Site Web : www.dell.com/cl E-mail : la-techsupport@dell.com Ventes et support clientèle numéro vert : 1230-020-4823 Pays (ville) Indicatif d’accès international - Indicatif du pays Indicatif de la ville Nom du service ou zone de service Site web et adresse e-mail Indicatifs de zone, numéros locaux et numéros d’appel gratuitObtention d’aide 155 Chine (Xiamen) Indicatif du pays : 86 Indicatif de la ville : 592 Site Web de support technique : support.dell.com.cn E-mail du support technique : support.dell.com.cn/email E-mail du service clientèle : customer_cn@dell.com Support technique par fax 592 818 1350 Support technique (XPS) numéro vert : 800 858 0540 Support technique (Dimension et Inspiron) numéro vert : 800 858 2969 Support technique (OptiPlex, Latitude et Dell Precision) numéro vert : 800 858 0950 Support technique (serveurs et stockage) numéro vert : 800 858 0960 Support technique (projecteurs, PDA, commutateurs, routeurs, etc.) numéro vert : 800 858 2920 Support technique (imprimantes) numéro vert : 800 858 2311 Service clientèle numéro vert : 800 858 2060 Service clientèle par fax 592 818 1308 Grand public et PME/PMI numéro vert : 800 858 2222 Division des comptes privilégiés numéro vert : 800 858 2557 Comptes de grandes entreprises - GCP numéro vert : 800 858 2055 Comptes clés des grandes entreprises numéro vert : 800 858 2628 Comptes de grandes entreprises - Nord numéro vert : 800 858 2999 Comptes grandes entreprises - administrations et éducation Nord numéro vert : 800 858 2955 Comptes de grandes entreprises - Est numéro vert : 800 858 2020 Comptes grandes entreprises - administrations et éducation Est numéro vert : 800 858 2669 Comptes grandes entreprises - Queue Team numéro vert : 800 858 2572 Comptes de grandes entreprises - Sud numéro vert : 800 858 2355 Comptes grandes entreprises - Ouest numéro vert : 800 858 2811 Comptes grandes entreprises - Pièces détachées numéro vert : 800 858 2621 Pays (ville) Indicatif d’accès international - Indicatif du pays Indicatif de la ville Nom du service ou zone de service Site web et adresse e-mail Indicatifs de zone, numéros locaux et numéros d’appel gratuit156 Obtention d’aide Colombie Site Web : www.dell.com/cl E-mail : la-techsupport@dell.com Support général 01-800-915-4755 Corée (Séoul) Indicatif d’accès international : 001 Indicatif du pays : 82 Indicatif de la ville : 2 E-mail : krsupport@dell.com Support numéro vert : 080-200-3800 Support technique (XPS) numéro vert : 080-999-0283 Support (Dimension, PDA, Electronics and Accessories) numéro vert : 080-200-3801 Ventes numéro vert : 080-200-3600 Fax 2194-6202 Standard 2194-6000 Costa Rica Site Web : www.dell.com/cr E-mail : la-techsupport@dell.com Support général 0800-012-0231 Danemark (Copenhague) Indicatif d’accès international : 00 Indicatif du pays : 45 Site Web : support.euro.dell.com Support technique XPS 7010 0074 Support technique pour les autres systèmes Dell 7023 0182 Service clientèle (relationnel) 7023 0184 Service clientèle auprès du grand public et des PME/PMI 3287 5505 Standard (relationnel) 3287 1200 Fax du standard (Relations clientèle) 3287 1201 Standard (grand public et PME/PMI) 3287 5000 Fax du standard (grand public et PME/PMI) 3287 5001 Dominique Site Web : www.dell.com/dm E-mail : la-techsupport@dell.com Support général numéro vert : 1-866-278-6821 Pays (ville) Indicatif d’accès international - Indicatif du pays Indicatif de la ville Nom du service ou zone de service Site web et adresse e-mail Indicatifs de zone, numéros locaux et numéros d’appel gratuitObtention d’aide 157 Équateur Site Web : www.dell.com/ec E-mail : la-techsupport@dell.com Support général (appel à partir de Quito) numéro vert : 999-119-877- 655-3355 Support général (appel à partir de Guayaquil) numéro vert : 1800-999-119- 877-655-3355 Espagne (Madrid) Indicatif d’accès international : 00 Indicatif du pays : 34 Indicatif de la ville : 91 Site Web : support.euro.dell.com Grand public et PME/PMI Support technique 902 100 130 Service clientèle 902 118 540 Ventes 902 118 541 Standard 902 118 541 Fax 902 118 539 Grandes entreprises Support technique 902 100 130 Service clientèle 902 115 236 Standard 91 722 92 00 Fax 91 722 95 83 États-Unis (Austin, Texas) Indicatif d’accès international : 011 Indicatif du pays : 1 Service d’état des commandes automatisé numéro vert : 1-800-433-9014 AutoTech (ordinateurs portables et de bureau) numéro vert : 1-800-247-9362 Support Garantie et matériel (téléviseurs, imprimantes et projecteurs Dell) pour les clients Relationship numéro vert : 1-877-459-7298 Support aux consommateurs pour XPS - Amérique numéro vert : 1-800-232-8544 Support pour les particuliers (activités à domicile et bureau domestique) pour tous les autres produits Dell numéro vert : 1-800-624-9896 Service clientèle numéro vert : 1-800-624-9897 Clients du Programme d’achat employé numéro vert : 1-800-695-8133 Pays (ville) Indicatif d’accès international - Indicatif du pays Indicatif de la ville Nom du service ou zone de service Site web et adresse e-mail Indicatifs de zone, numéros locaux et numéros d’appel gratuit158 Obtention d’aide États-Unis (Austin, Texas) (suite) Site Web des services financiers : www.dellfinancialservices.com Services financiers (leasing/prêts) numéro vert : 1-877-577-3355 Services financiers (Comptes privilégiés Dell [DPA]) numéro vert : 1-800-283-2210 Entreprises Service clientèle et support technique numéro vert : 1-800-456-3355 Clients du Programme d’achat employé numéro vert : 1-800-695-8133 Support imprimantes, projecteurs, PDA et lecteurs MP3 numéro vert : 1-877-459-7298 Service public (administrations, éducation, santé) Service clientèle et support technique numéro vert : 1-800-456-3355 Clients du Programme d’achat employé numéro vert : 1-800-695-8133 Ventes Dell numéro vert : 1-800-289-3355 ou numéro vert : 1-800- 879-3355 Points de vente Dell (ordinateurs Dell recyclés) numéro vert : 1-888-798-7561 Ventes de logiciels et de périphériques numéro vert : 1-800-671-3355 Ventes de pièces détachées numéro vert : 1-800-357-3355 Service étendu et ventes sous garantie numéro vert : 1-800-247-4618 Fax numéro vert : 1-800-727-8320 Services Dell pour les sourds, les malentendants ou les personnes ayant des difficultés d’élocution numéro vert : 1-877-DELLTTY (1-877-335-5889) Finlande (Helsinki) Indicatif d’accès international : 990 Indicatif du pays : 358 Indicatif de la ville : 9 Site Web : support.euro.dell.com E-mail : fi_support@dell.com Support technique 0207 533 555 Service clientèle 0207 533 538 Standard 0207 533 533 Ventes, moins de 500 employés 0207 533 540 Fax 0207 533 530 Ventes, plus de 500 employés 0207 533 533 Fax 0207 533 530 Pays (ville) Indicatif d’accès international - Indicatif du pays Indicatif de la ville Nom du service ou zone de service Site web et adresse e-mail Indicatifs de zone, numéros locaux et numéros d’appel gratuitObtention d’aide 159 France (Paris, Montpellier) Indicatif d’accès international : 00 Indicatif du pays : 33 Indicatif de la ville : (1) (4) Site Web : support.euro.dell.com Grand public et PME/PMI Support technique XPS 0825 387 129 Support technique pour les autres systèmes Dell 0825 387 270 Service clientèle 0825 823 833 Standard 0825 004 700 Standard (appels extérieurs à la France) 04 99 75 40 00 Ventes 0825 004 700 Fax 0825 004 701 Télécopieur (appels extérieurs à la France) 04 99 75 40 01 Grandes entreprises Support technique 0825 004 719 Service clientèle 0825 338 339 Standard 01 55 94 71 00 Ventes 01 55 94 71 00 Fax 01 55 94 71 01 Grèce Indicatif d’accès international : 00 Indicatif du pays : 30 Site Web : support.euro.dell.com Support technique 00800-44 14 95 18 Support technique Gold 00800-44 14 00 83 Standard 2108129810 Standard – Service Gold 2108129811 Ventes 2108129800 Fax 2108129812 Grenade E-mail : la-techsupport@dell.com Support général numéro vert : 1-866-540-3355 Guatemala E-mail : la-techsupport@dell.com Support général 1-800-999-0136 Guyane E-mail : la-techsupport@dell.com Support général numéro vert : 1-877-270-4609 Pays (ville) Indicatif d’accès international - Indicatif du pays Indicatif de la ville Nom du service ou zone de service Site web et adresse e-mail Indicatifs de zone, numéros locaux et numéros d’appel gratuit160 Obtention d’aide Hong Kong Indicatif d’accès international : 001 Indicatif du pays : 852 Site Web : support.ap.dell.com E-mail du support technique : support.dell.com.cn/email Support technique (XPS) 00852-3416 6923 Support technique (Dimension et Inspiron) 00852-2969 3188 Support technique (OptiPlex, Latitude et Dell Precision) 00852-2969 3191 Support technique (serveurs et stockage) 00852-2969 3196 Support technique (projecteurs, PDA, commutateurs, routeurs, etc.) 00852-3416 0906 Service clientèle 00852-3416 0910 Comptes grandes entreprises 00852-3416 0907 Programmes comptes internationaux 00852-3416 0908 Division moyennes entreprises 00852-3416 0912 Division petites entreprises et activités professionnelles à domicile 00852-2969 3105 Îles Caïmans E-mail : la-techsupport@dell.com Support général 1-877-262-5415 Îles Turks et Caicos Site Web : www.dell.com/tc E-mail : la-techsupport@dell.com Support général numéro vert : 1-877-441-4735 Îles vierges (États-Unis) E-mail : la-techsupport@dell.com Support général numéro vert : 1-877-702-4360 Îles vierges britanniques Support général numéro vert : 1-866-278-6820 Pays (ville) Indicatif d’accès international - Indicatif du pays Indicatif de la ville Nom du service ou zone de service Site web et adresse e-mail Indicatifs de zone, numéros locaux et numéros d’appel gratuitObtention d’aide 161 Inde Site Web : support.ap.dell.com E-mail : india_support_desktop@dell.com india_support_notebook@dell.com india_support_Server@dell.com Support technique (ordinateurs XPS) 0802 506 8033 ou numéro vert : 1800 425 2066 Support technique (ordinateurs portables, ordinateurs de bureau, serveurs et stockage) 1600338045 et 1600448046 Ventes (comptes grandes entreprises) 1600 33 8044 Ventes (grand public et PME/PMI) 1600 33 8046 Irlande (Cherrywood) Indicatif d’accès international : 00 Indicatif du pays : 353 Indicatif de la ville : 1 Site Web : support.euro.dell.com E-mail : dell_direct_support@dell.com Ventes Ventes en Irlande 01 204 4444 Dell Outlet 1850 200 778 HelpDesk des commandes en ligne : 1850 200 778 Service clientèle Service clientèle auprès des particuliers 01 204 4014 Service clientèle auprès des PME/PMI 01 204 4014 Service clientèle auprès des grandes entreprises 1850 200 982 Support technique Support technique pour les systèmes XPS uniquement 1850 200 722 Support technique pour les autres systèmes Dell 1850 543 543 Général Ventes/Télécopieur 01 204 0103 Standard 01 204 4444 Service clientèle au Royaume-Uni (au RU uniquement) 0870 906 0010 Service clientèle entreprises (depuis le RoyaumeUni uniquement) 0870 907 4499 Ventes au Royaume-Uni (au RU uniquement) 0870 907 4000 Pays (ville) Indicatif d’accès international - Indicatif du pays Indicatif de la ville Nom du service ou zone de service Site web et adresse e-mail Indicatifs de zone, numéros locaux et numéros d’appel gratuit162 Obtention d’aide Italie (Milan) Indicatif d’accès international : 00 Indicatif du pays : 39 Indicatif de la ville : 02 Site Web : support.euro.dell.com Grand public et PME/PMI Support technique 02 577 826 90 Service clientèle 02 696 821 14 Fax 02 696 821 13 Standard 02 696 821 12 Grandes entreprises Support technique 02 577 826 90 Service clientèle 02 577 825 55 Fax 02 575 035 30 Standard 02 577 821 Jamaïque E-mail : la-techsupport@dell.com Support technique général (appel à partir de la Jamaïque uniquement) 1-800-440-9205 Japon (Kawasaki) Indicatif d’accès international : 001 Indicatif du pays : 81 Indicatif de la ville : 44 Site Web : support.jp.dell.com Support technique (XPS) numéro vert : 0120-937-786 Support technique à l’extérieur du Japon (XPS) 044-520-1235 Service clientèle XPS (si des éléments commandés sont manquants ou ont été endommagés en cours d’expédition) 044-556-4240 Support technique (Dimension et Inspiron) numéro vert : 0120-198-226 Support technique à l’extérieur du Japon (Dimension et Inspiron) 81-44-520-1435 Support technique (Dell Precision, OptiPlex et Latitude) numéro vert : 0120-198-433 Support technique à l’extérieur du Japon (Dell Precision, OptiPlex et Latitude) 81-44-556-3894 Support technique (Dell PowerApp™, Dell PowerEdge™, Dell PowerConnect™ et Dell PowerVault™) numéro vert : 0120-198-498 Pays (ville) Indicatif d’accès international - Indicatif du pays Indicatif de la ville Nom du service ou zone de service Site web et adresse e-mail Indicatifs de zone, numéros locaux et numéros d’appel gratuitObtention d’aide 163 Japon (Kawasaki) (suite) Support technique à l’extérieur du Japon (PowerApp, PowerEdge, PowerConnect et PowerVault) 81-44-556-4162 Support technique (projecteurs, PDA, imprimantes, routeurs) numéro vert : 0120-981-690 Support technique à l’extérieur du Japon (projecteurs, PDA, imprimantes, routeurs) 81-44-556-3468 Service Faxbox 044-556-3490 Service d’état des commandes automatisé 24 heures sur 24 044-556-3801 Service clientèle 044-556-4240 Division Ventes aux entreprises (jusqu’à 400 salariés) 044-556-1465 Division Ventes aux comptes privilégiés (plus de 400 employés) 044-556-3433 Ventes secteur public (agences gouvernementales, établissements d’enseignement et institutions médicales) 044-556-5963 Global Segment Japon 044-556-3469 Particulier 044-556-1760 Standard 044-556-4300 La Barbade Site Web : www.dell.com/bb E-mail : la-techsupport@dell.com Support général 1-800-534-3142 Luxembourg Indicatif d’accès international : 00 Indicatif du pays : 352 Site Web : support.euro.dell.com Support 342 08 08 075 Ventes au grand public et aux PME/PMI +32 (0)2 713 15 96 Ventes aux grandes entreprises 26 25 77 81 Service clientèle +32 (0)2 481 91 19 Fax 26 25 77 82 Macao Indicatif du pays : 853 Support technique numéro vert : 0800 105 Service client (Xiamen, Chine) 34 160 910 Ventes aux particuliers (Xiamen, China) 29 693 115 Pays (ville) Indicatif d’accès international - Indicatif du pays Indicatif de la ville Nom du service ou zone de service Site web et adresse e-mail Indicatifs de zone, numéros locaux et numéros d’appel gratuit164 Obtention d’aide Malaisie (Penang) Indicatif d’accès international : 00 Indicatif du pays : 60 Indicatif de la ville : 4 Site Web : support.ap.dell.com Support technique (XPS) numéro vert : 1800 885 784 Support technique (Dell Precision, OptiPlex et Latitude) numéro vert : 1 800 880 193 Support technique (Dimension, Inspiron, Electronics, Accessories) numéro vert : 1 800 881 306 Support technique (PowerApp, PowerEdge, PowerConnect et PowerVault) numéro vert : 1800 881 386 Service clientèle numéro vert : 1800 881 306 (option 6) Ventes aux particuliers numéro vert : 1 800 888 202 Ventes aux grandes entreprises numéro vert : 1 800 888 213 Mexique Indicatif d’accès international : 00 Indicatif du pays : 52 E-mail : la-techsupport@dell.com Support technique clientèle 001-877-384-8979 ou 001-877-269-3383 Ventes 50-81-8800 ou 01-800-888-3355 Service clientèle 001-877-384-8979 ou 001-877-269-3383 Principal 50-81-8800 ou 01-800-888-3355 Montserrat E-mail : la-techsupport@dell.com Support général numéro vert : 1-866-278-6822 Nicaragua E-mail : la-techsupport@dell.com Support général 001-800-220-1377 Pays (ville) Indicatif d’accès international - Indicatif du pays Indicatif de la ville Nom du service ou zone de service Site web et adresse e-mail Indicatifs de zone, numéros locaux et numéros d’appel gratuitObtention d’aide 165 Norvège (Lysaker) Indicatif d’accès international : 00 Indicatif du pays : 47 Site Web : support.euro.dell.com Support technique XPS 815 35 043 Support technique pour les autres produits Dell 671 16882 Suivi clientèle 671 17575 Service clientèle auprès du grand public et des PME/PMI 23162298 Standard 671 16800 Standard par fax 671 16865 Nouvelle-Zélande Indicatif d’accès international : 00 Indicatif du pays : 64 Site Web : support.ap.dell.com E-mail : support.ap.dell.com/contactus Support technique (XPS) numéro vert : 0800 335 540 Support général 0800 441 567 Panama E-mail : la-techsupport@dell.com Support général 011-800-507-1264 Pays du Pacifique et du Sud-Est de l’Asie Support technique, service clientèle et ventes (Penang, Malaisie) 604 633 4810 Pays-Bas (Amsterdam) Indicatif d’accès international : 00 Indicatif du pays : 31 Indicatif de la ville : 20 Site Web : support.euro.dell.com Support technique XPS 020 674 45 94 Support technique pour les autres systèmes Dell 020 674 45 00 Support technique par fax 020 674 47 66 Service clientèle auprès du grand public et des PME/PMI 020 674 42 00 Suivi clientèle 020 674 4325 Ventes au grand public et aux PME/PMI 020 674 55 00 Ventes relationnelles 020 674 50 00 Ventes par fax au grand public et aux PME/PMI 020 674 47 75 Ventes relationnelles par fax 020 674 47 50 Standard 020 674 50 00 Standard par fax 020 674 47 50 Pérou E-mail : la-techsupport@dell.com Support général 0800-50-669 Pays (ville) Indicatif d’accès international - Indicatif du pays Indicatif de la ville Nom du service ou zone de service Site web et adresse e-mail Indicatifs de zone, numéros locaux et numéros d’appel gratuit166 Obtention d’aide Pologne (Varsovie) Indicatif d’accès international : 011 Indicatif du pays : 48 Indicatif de la ville : 22 Site Web : support.euro.dell.com E-mail : pl_support_tech@dell.com Téléphone du service clientèle 57 95 700 Service clientèle 57 95 999 Ventes 57 95 999 Télécopie du service clientèle 57 95 806 Télécopie de la réception 57 95 998 Standard 57 95 999 Portugal Indicatif d’accès international : 00 Indicatif du pays : 351 Site Web : support.euro.dell.com Support technique 707200149 Service clientèle 800 300 413 Ventes 800 300 410, 800 300 411, 800 300 412 ou 21 422 07 10 Fax 21 424 01 12 Porto Rico E-mail : la-techsupport@dell.com Support général 1-877-537-3355 République dominicaine Site Web : www.dell.com/do E-mail : la-techsupport@dell.com Support général 1-800-156-1588 République Tchèque (Prague) Indicatif d’accès international : 00 Indicatif du pays : 420 Site Web : support.euro.dell.com E-mail : czech_dell@dell.com Support technique 22537 2727 Service clientèle 22537 2707 Fax 22537 2714 Support technique par fax 22537 2728 Standard 22537 2711 Pays (ville) Indicatif d’accès international - Indicatif du pays Indicatif de la ville Nom du service ou zone de service Site web et adresse e-mail Indicatifs de zone, numéros locaux et numéros d’appel gratuitObtention d’aide 167 Royaume-Uni (Bracknell) Indicatif d’accès international : 00 Indicatif du pays : 44 Indicatif de la ville : 1344 Site Web : support.euro.dell.com E-mail : dell_direct_support@dell.com Site Web du service clientèle : support.euro.dell.com/uk/en/ECare/form/home.asp Ventes Ventes au grand public et aux PME/PMI 0870 907 4000 Ventes aux entreprises et au secteur public 01344 860 456 Service clientèle Service clientèle auprès du grand public et des PME/PMI 0870 906 0010 Service clientèle auprès des grandes entreprises 01344 373 185 Comptes privilégiés (de 500 à 5 000 employés) 0870 906 0010 Service clientèle des comptes globaux 01344 373 186 Service clientèle des comptes gouvernementaux centralisés 01344 373 193 Service clientèle pour le gouvernement local et le secteur de l’enseignement 01344 373 199 Service clientèle pour le secteur médical 01344 373 194 Support technique Support technique pour les systèmes XPS uniquement 0870 366 4180 Support technique (grandes entreprises/comptes privilégiés/PCA [+ de 1000 employés]) 0870 908 0500 Support technique pour les autres produits 0870 353 0800 Général Télécopieur petites entreprises et activités professionnelles à domicile 0870 907 4006 Saint-Kitts-et-Nevis Site Web : www.dell.com/kn E-mail : la-techsupport@dell.com Support général numéro vert : 1-866-540-3355 Saint-Vincent-et-les-Grenadines Site Web : www.dell.com/vc E-mail : la-techsupport@dell.com Support général numéro vert : 1-866-464-4353 Pays (ville) Indicatif d’accès international - Indicatif du pays Indicatif de la ville Nom du service ou zone de service Site web et adresse e-mail Indicatifs de zone, numéros locaux et numéros d’appel gratuit168 Obtention d’aide Salvador Site Web : www.dell.com/ec E-mail : la-techsupport@dell.com Support général 800-6132 Singapour (Singapour) Indicatif d’accès international : 005 Indicatif du pays : 65 REMARQUE : les numéros de téléphone indiqués dans cette section doivent être utilisés uniquement à Singapour et en Malaisie. Site Web : support.ap.dell.com Support technique (XPS) numéro vert : 1800 394 7464 Support technique (Dimension, Inspiron, Electronics, Accessories) numéro vert : 1 800 394 7430 Support technique (OptiPlex, Latitude et Dell Precision) numéro vert : 1 800 394 7488 Support technique (PowerApp, PowerEdge, PowerConnect et PowerVault) numéro vert : 1 800 394 7478 Service clientèle numéro vert : 1 800 394 7430 (option 6) Ventes aux particuliers numéro vert : 1 800 394 7412 Ventes aux grandes entreprises numéro vert : 1 800 394 7419 Slovaquie (Prague) Indicatif d’accès international : 00 Indicatif du pays : 421 Site Web : support.euro.dell.com E-mail : czech_dell@dell.com Support technique 02 5441 5727 Service clientèle 420 22537 2707 Fax 02 5441 8328 Support technique par fax 02 5441 8328 Standard (ventes) 02 5441 7585 Ste Lucie Site Web : www.dell.com/lc E-mail : la-techsupport@dell.com Support général numéro vert : 1-866-464-4352 Pays (ville) Indicatif d’accès international - Indicatif du pays Indicatif de la ville Nom du service ou zone de service Site web et adresse e-mail Indicatifs de zone, numéros locaux et numéros d’appel gratuitObtention d’aide 169 Suède (Upplands Vasby) Indicatif d’accès international : 00 Indicatif du pays : 46 Indicatif de la ville : 8 Site Web : support.euro.dell.com Support technique XPS 0771 340 340 Support technique pour les autres produits Dell 08 590 05 199 Suivi clientèle 08 590 05 642 Service clientèle auprès du grand public et des PME/PMI 08 587 70 527 Support du programme d’achats pour employés (EPP, Employee Purchase Program) 020 140 14 44 Support technique par fax 08 590 05 594 Ventes 08 590 05 185 Suisse (Genève) Indicatif d’accès international : 00 Indicatif du pays : 41 Indicatif de la ville : 22 Site Web : support.euro.dell.com E-mail : Tech_support_central_Europe@dell.com Support technique XPS 0848 33 88 57 Support technique (grand public et PME/PMI) pour tous les autres produits Dell 0844 811 411 Support technique (grandes entreprises) 0844 822 844 Service clientèle (grand public et PME/PMI) 0848 802 202 Service clientèle (grandes entreprises) 0848 821 721 Fax 022 799 01 90 Standard 022 799 01 01 Taïwan Indicatif d’accès international : 002 Indicatif du pays : 886 Site Web : support.ap.dell.com E-mail : support.dell.com.cn/email Support technique (XPS) numéro vert : 0080 186 3085 Support technique (OptiPlex, Latitude, Inspiron, Dimension, composants électroniques et accessoires) numéro vert : 0080 186 1011 Support technique (serveurs et stockage) numéro vert : 0080 160 1256 Service clientèle numéro vert : 0080 160 1250 (option 5) Ventes aux particuliers numéro vert : 0080 165 1228 Ventes aux grandes entreprises numéro vert : 0080 165 1227 Pays (ville) Indicatif d’accès international - Indicatif du pays Indicatif de la ville Nom du service ou zone de service Site web et adresse e-mail Indicatifs de zone, numéros locaux et numéros d’appel gratuit170 Obtention d’aide Thaïlande Indicatif d’accès international : 001 Indicatif du pays : 66 Site Web : support.ap.dell.com Support technique (OptiPlex, Latitude et Dell Precision) numéro vert : 1800 0060 07 Support technique (PowerApp, PowerEdge, PowerConnect et PowerVault) numéro vert : 1800 0600 09 Service clientèle numéro vert : 1800 006 007 (option 7) Ventes aux grandes entreprises numéro vert : 1800 006 009 Ventes aux particuliers numéro vert : 1800 006 006 Trinité-et-Tobago Site Web : www.dell.com/tt E-mail : la-techsupport@dell.com Support général numéro vert : 1-888-799-5908 Uruguay Site Web : www.dell.com/uy E-mail : la-techsupport@dell.com Support général numéro vert : 000-413-598-2521 Venezuela Site Web : www.dell.com/ve E-mail : la-techsupport@dell.com Support général 0800-100-4752 Pays (ville) Indicatif d’accès international - Indicatif du pays Indicatif de la ville Nom du service ou zone de service Site web et adresse e-mail Indicatifs de zone, numéros locaux et numéros d’appel gratuitGlossaire 171 Glossaire Cette section définit ou identifie les termes techniques, abréviations et sigles utilisés dans la documentation fournie avec le système. A : Ampère(s). ACPI : Acronyme de “Advanced Configuration and Power Interface”. Interface standard qui permet au système d’exploitation de contrôler les paramètres relatifs à la configuration et à la gestion de l’alimentation. adresse MAC : Adresse de contrôle d’accès aux supports. L’adresse MAC identifie le matériel du système de manière unique sur un réseau. adresse mémoire : Emplacement précis, exprimé normalement en nombre hexadécimal, dans la RAM du système. ANSI : Acronyme de “American National Standards Institute”, institut des normes nationales américaines. Principal organisme dédié au développement des normes technologiques spécifiques des États-Unis. application : Logiciel conçu pour effectuer une tâche spécifique ou une série de tâches. Les applications s’exécutent à partir du système d’exploitation. ASCII : Acronyme de “American Standard Code for Information Interchange”, code des normes américaines pour l’échange d’informations. barrette de mémoire : Petite carte de circuits, contenant des puces de mémoire, qui se connecte à la carte système. BIOS : Acronyme de “Basic Input/Output System”, système d’entrées/sorties de base. Le BIOS du système contient des programmes stockés sur une puce de mémoire flash. Le BIOS contrôle les fonctions suivantes : • Les communications entre le processeur et les périphériques • Diverses fonctions, comme les messages du système bit : Plus petite unité d’information interprétée par le système. BMC : Acronyme de “Baseboard Management Controller”, contrôleur de gestion de la carte de base. BTU : Acronyme de “British Thermal Unit”, unité thermique britannique. bus : Chemin d’informations entre les différents composants du système. Le système contient un bus d’extension qui permet au microprocesseur de communiquer avec les contrôleurs des différents périphériques connectés au système. Il contient également un bus d’adresse et un bus de données pour les communications entre le microprocesseur et la RAM. bus d’extension : Votre système contient un bus d’extension qui permet au processeur de communiquer avec les contrôleurs des périphériques, comme les NIC. bus frontal : Chemin des données et interface physique entre le microprocesseur et la mémoire principale (RAM). bus local : Sur les systèmes à bus local, certains matériels (comme l’adaptateur vidéo) peuvent être conçus pour fonctionner beaucoup plus vite que sur un bus d’extension traditionnel. Voir aussi bus. C : Celsius. CA : Courant alternatif. cache interne du processeur : Mémoire cache d’instructions et de données intégrée au processeur. carte d’extension : Carte supplémentaire (par exemple un adaptateur SCSI ou un NIC) qui se branche dans un connecteur d’extension sur la carte système de l’ordinateur. Une carte adaptateur ajoute des fonctions spéciales au système en fournissant une interface entre le bus d’extension et un périphérique.172 Glossaire carte hôte : Carte assurant la communication entre le bus du système et le contrôleur d’un périphérique. Les contrôleurs de disque dur disposent de circuits de carte hôte. Pour ajouter un bus SCSI au système, vous devez installer ou raccorder la carte hôte adéquate. carte système : La carte système contient en général la plupart des composants intégrés à votre système, comme le processeur, la RAM, des contrôleurs et divers circuits de ROM. carte vidéo : Circuits qui assurent les fonctions vidéo de l’ordinateur (en association avec le moniteur). Il peut s’agir d’une carte d’extension installée dans un connecteur, ou de circuits intégrés sur la carte système. cavalier : Petit composant pour carte à circuits imprimés, disposant de deux ou plusieurs broches. Des fiches en plastique contenant un fil s’engagent sur les broches. Ce fil relie les broches et ferme un circuit, offrant un moyen simple et réversible de changer le câblage de la carte. CC : Courant continu. CD : Disque compact. Les lecteurs de CD utilisent une technologie optique pour lire les données sur les CD. cm : Centimètres. CMOS : Acronyme de “Complementary Metal-Oxide Semiconductor”, semi-conducteur d’oxyde métallique supplémentaire. COMn : Nom de périphérique permettant de désigner les ports série du système. combinaison de touches : Commande qui se fait en appuyant sur plusieurs touches en même temps (par exemple ). composant : Dans le contexte de l’interface DMI, il s’agit d’un élément compatible DMI, comme un système d’exploitation, un ordinateur, une carte d’extension ou un périphérique. Chaque composant est constitué de groupes et d’attributs, définis comme caractéristiques de ce composant. connecteur d’extension : Connecteur situé sur la carte système ou la carte de montage, auquel se branche une carte d’extension. contrôleur : Circuit qui contrôle le transfert des données entre le microprocesseur et la mémoire ou entre le microprocesseur et les périphériques. coprocesseur : Circuit qui libère le processeur principal de certaines tâches de traitement. Par exemple, un coprocesseur mathématique se charge du traitement numérique. CPU : Acronyme de “Central Processing Unit”, unité centrale de traitement. Voir processeur. DDR : Acronyme de “Double Data Rate”, double débit de données. Technologie des barrettes de mémoire permettant de doubler le débit. définition graphique : Indique le nombre de pixels en largeur et le nombre de pixels en hauteur, par exemple 640 x 480. Pour afficher dans une résolution graphique donnée, vous devez installer les pilotes vidéo appropriés et votre moniteur doit accepter cette résolution. DHCP : Acronyme de “Dynamic Host Configuration Protocol”. Méthode permettant d’affecter automatiquement une adresse IP à un système client. diagnostics : Série de nombreux tests pour le système. DIMM : Acronyme de “Dual In-Line Memory Module”, barrette de mémoire à double rangée de connexions. Voir aussi barrette de mémoire. DIN : Acronyme de “Deutsche Industrie-Norm”, norme de l’industrie allemande. disquette d’amorçage : Disquette utilisée pour démarrer le système si celui-ci ne peut pas être initialisé à partir du disque dur. disquette système : Voir disquette d’amorçage. DMA : Acronyme de “Direct Memory Access”, accès direct à la mémoire. Un canal DMA permet le transfert direct de certains types de données entre la RAM et un périphérique, sans passer par le processeur. DMI : Acronyme de “Desktop Management Interface”, interface de gestion de bureau. L’interface DMI permet de gérer les logiciels et matériels du système en recueillant des informations sur ses composants, comme le système d’exploitation, la mémoire, les périphériques, les cartes d’extension et le numéro d’inventaire.Glossaire 173 DNS : Acronyme de “Domain Name System”, système de noms de domaines. Méthode de conversion des noms de domaines Internet (par exemple www.dell.com) en adresses IP (comme 143.166.83.200). DRAM : Acronyme de “Dynamic Random-Access Memory”, mémoire vive dynamique. Normalement, la mémoire vive d’un système est composée entièrement de puces DRAM. DVD : Acronyme de “Digital Versatile Disc”, disque numérique polyvalent. ECC : Acronyme de “Error Checking and Correction”, vérification et correction d’erreur. EEPROM : Acronyme de “Electronically Erasable Programmable Read-Only Memory”, mémoire morte reprogrammable électroniquement. EMC : Acronyme de “Electromagnetic Compatibility”, compatibilité électromagnétique. EMI : Acronyme de “ElectroMagnetic Interference”, interférence électromagnétique. E-S : Entrée/sortie. Un clavier est un périphérique d’entrée et une imprimante est un périphérique de sortie. En général, l’activité d’E-S peut être différenciée de l’activité de calcul. ESD : Acronyme de “Electrostratic Discharge”, décharge électrostatique. ESM : Acronyme de “Embedded Server Management”, gestion de serveur intégrée. étiquette de service : Code à barres se trouvant sur le système, et permettant de l’identifier lorsque vous appelez le support technique de Dell. F : Fahrenheit. FAT : Acronyme de “File allocation table”, table d’allocation des fichiers. Structure du système de fichiers utilisée par MS-DOS® pour organiser et suivre le stockage des fichiers. Le système d’exploitation Microsoft® Windows® permet d’utiliser une structure de système de fichiers FAT. FBD : Acronyme de “Fully Buffered Dual In-Line Memory Module”, barrette DIMM avec tampon intégral. fichier readme : Fichier texte fourni avec un logiciel ou un matériel, et qui contient des informations complétant ou mettant à jour la documentation. fichier read-only : Fichier en lecture seule, qui ne peut être ni modifié, ni effacé. fichier system.ini : Fichier de démarrage du système d’exploitation Windows. Quand vous lancez Windows, il consulte le fichier system.ini pour déterminer une variété d’options pour l’environnement d’exploitation Windows. Entre autres, le fichier system.ini indique les pilotes vidéo, souris et clavier qui sont installés pour Windows. fichier win.ini : Fichier de démarrage du système d’exploitation Windows. Quand vous lancez Windows, le système consulte le fichier win.ini pour déterminer une variété d’options pour l’environnement d’exploitation Windows. Ce fichier comprend aussi des sections qui contiennent les paramètres facultatifs pour les programmes Windows installés sur le disque dur. formater : Préparer un lecteur de disque dur ou une disquette à stocker des fichiers. Un formatage inconditionnel efface toutes les données stockées sur le disque. ft : Foot (pied). FTP : Acronyme de “File Transfert Protocol”, protocole de transfert de fichiers. g : Gramme(s). G : Gravité. Gb : Gigabit : 1024 mégabits ou 1 073 741 824 bits. Go : Giga-octet : 1024 Mo ou 1 073 741 824 octets. Quand on parle de stockage sur disque dur, la mesure est souvent arrondie à 1 000 000 000 octets. groupe : Dans le contexte de l’interface DMI, un groupe est une structure de données qui définit les informations courantes, ou attributs, d’un composant gérable. guarding : Type de redondance de données qui utilise un groupe de disques physiques pour stocker les données, et un disque supplémentaire pour stocker les informations de parité. Voir également mise en miroir, striping et RAID.174 Glossaire h : Hexadécimal. Système de numération en base 16, souvent utilisé en programmation pour identifier les adresses mémoire de RAM et d’E-S du système pour les périphériques. Dans le texte, les chiffres hexadécimaux sont souvent suivis d’un h. hot plug (enfichage à chaud) : Caractéristique permettant de remplacer un composant du système lorsque ce dernier est en cours de fonctionnement. Hz : Hertz. ID : Identification. IDE : Acronyme de “Integrated Drive Electronics”. Interface standard entre la carte système et les périphériques de stockage. informations de configuration du système : Données stockées en mémoire, qui informent un système sur la manière dont le matériel est installé et dont le système doit être configuré pour fonctionner. IP : Acronyme de “Internet Protocol”, protocole Internet. IPX : Acronyme de “Internet package exchange”. IRQ : Interrupt ReQuest (demande d’interruption). Un signal indiquant que des données vont être envoyées ou reçues par un périphérique, et envoyé au microprocesseur par une ligne d’IRQ. Chaque liaison avec un périphérique doit avoir un numéro d’IRQ. Deux périphériques peuvent avoir la même IRQ, mais vous ne pouvez pas les utiliser simultanément. K : Kilo, 1000. Kb : Kilobit, 1024 bits. Kbps : Kilobits par seconde. kg : Kilogramme, 1000 grammes. kHz : Kilohertz. KMM : Acronyme de “Keyboard/Monitor/Mouse”, ensemble clavier/moniteur/souris. Ko : Kilo-octet, 1024 octets. Ko/s : Kilo-octets par seconde. KVM : Commutateur KVM. Le terme KVM désigne un commutateur qui permet de sélectionner le système à partir duquell’image est affichée et pour lequel le clavier et la souris sont utilisés. lame : Module équipé d’un processeur, de mémoire et d’un disque dur. Ces modules sont montés dans une baie qui dispose d’alimentations et de ventilateurs. LAN : Réseau local. Un LAN se limite normalement à un bâtiment ou à un groupe de bâtiments proches, où tout l’équipement est relié par des fils réservés au réseau LAN. lb : Livres (poids). LCD : Écran à cristaux liquides. LED : Acronyme de “Light-Emitting Diode”, diode luminescente. Composant électronique qui s’allume lorsqu’il est traversé par un courant. LGA : Acronyme de “Land Grid Array”, matrice LGA. Type de support de processeur. Contrairement aux PGA, ce type de connexion n’utilise pas des broches mais des contacteurs qui permettent d’augmenter le nombre de connexions sur le microprocesseur. Linux : Système d’exploitation similaire à UNIX et pouvant être utilisé sur une grande diversité de platesformes matérielles. Linux est un logiciel libre et gratuit. Certaines distributions plus complètes, accompagnées de support technique et de formation, sont payantes et disponibles chez des distributeurs comme Red Hat Software (www.redhat.com). LVD : Acronyme de “Low Voltage Differential”, différentiel à basse tension. m : Mètre(s). mA : Milliampère(s). mAh : Milliampère à l’heure. Mb : Mégabit, soit 1 048 576 bits. Mbps : Mégabits par seconde. MBR : Acronyme de “Master Boot Record”, enregistrement d’amorçage principal. mémoire : Zone de stockage des données de base du système. Un ordinateur peut disposer de différentes sortes de mémoire, intégrée (RAM et ROM) ou ajoutée sous forme de barrettes DIMM. Glossaire 175 mémoire cache : Zone de mémoire rapide contenant une copie des données ou des instructions pour les récupérer plus vite. Quand un programme demande des données qui se trouvent dans le cache, l’utilitaire de mise en mémoire cache du disque peut extraire les données plus vite de la RAM que du disque même. mémoire conventionnelle : Les premiers 640 Ko de la RAM. La mémoire conventionnelle est présente dans tous les systèmes. Sauf s’ils ont été conçus de façon particulière, les programmes MS-DOS® sont limités à cette mémoire de base. mémoire flash : Type d’EEPROM pouvant être reprogrammée en place dans le système, à partir d’un utilitaire sur disquette. La plupart des EEPROM ne peut être reprogrammée qu’avec un équipement spécial. mémoire système : Voir RAM. mémoire vidéo : La plupart des cartes vidéo VGA et SVGA contiennent de la mémoire, différente de la RAM du système. La mémoire vidéo installée affecte surtout le nombre de couleurs affichables (ce qui dépend aussi du pilote vidéo et du moniteur). MHz : Mégahertz. mise en miroir : Redondance de données qui utilise un ensemble de disques physiques pour stocker les données et un ou plusieurs ensembles de disques supplémentaires pour stocker des copies des données. Cette fonction est en général assurée par un logiciel. Voir également guarding, mise en miroir intégrée, striping et RAID. mise en miroir intégrée : Mise en miroir physique de deux disques. Cette fonction intégrée est assurée par le matériel du système. Voir aussi mise en miroir. mm : Millimètre. Mo : Méga-octet, soit 1 048 576 octets. Quand on parle de stockage sur disque dur, la mesure est souvent arrondie à 1 000 000 octets. Mo/s : Mégaoctets par seconde. mode graphique : Mode vidéo qui peut être défini par le nombre de pixels horizontaux x , le nombre de pixels verticaux y et le nombre de couleurs z. mode protégé : Mode d’exploitation qui permet aux systèmes d’exploitation de mettre en œuvre les éléments et fonctions suivants : • Espace d’adresse mémoire de 16 Mo à 4 Go • Traitement multitâche • De la mémoire virtuelle, une méthode pour augmenter la mémoire adressable en utilisant le lecteur de disque dur Les systèmes d’exploitation Windows 2000 et UNIX 32 bits s’exécutent en mode protégé. En revanche, cela n’est pas le cas pour MS-DOS. ms : Milliseconde. MS-DOS® : Microsoft Disk Operating System. NAS : Acronyme de “Network Attached Storage”, stockage réseau. Le NAS est l’un des concepts utilisés pour l’implémentation du stockage partagé sur un réseau. Les systèmes NAS ont leurs propres systèmes d’exploitation, matériel intégré, et leurs propres logiciels optimisés pour répondre à des besoins spécifiques en termes de stockage. NIC : Acronyme de “Network Interface Controller”. Carte réseau intégrée ou installée sous forme de carte d’extension, pour relier le système à un réseau. NMI : Acronyme de “NonMaskable Interrupt”, interruption non masquable. Un matériel envoie une NMI pour signaler au microprocesseur des erreurs matérielles. ns : Nanoseconde. NTFS : Option du système de fichiers NT dans le système d’exploitation Windows 2000. numéro d’inventaire : Code individuel attribué à un système, normalement par un administrateur, à des fins de sécurité ou de suivi. NVRAM : Mémoire vive rémanente. Mémoire qui ne perd pas son contenu lorsque le système est mis hors tension. La NVRAM est utilisée pour conserver la date, l’heure et la configuration du système. panneau de commande : Partie du système qui porte les voyants et contrôles, comme le commutateur d’alimentation et le voyant d’alimentation.176 Glossaire parité : Informations redondantes associées à un bloc de données. partition : Vous pouvez partager un disque dur en plusieurs sections physiques appelées partitions, avec la commande fdisk. Chaque partition peut contenir plusieurs disques logiques. Après un partitionnement, vous devez formater chaque disque logique avec la commande format. PCI : Acronyme de “Peripheral Component Interconnect”, interconnexion de composants périphériques. Norme pour l’implémentation des bus locaux. PDU : Acronyme de “Power Distribution Unit”, unité de distribution électrique. Source d’alimentation dotée de plusieurs prises de courant qui fournit l’alimentation électrique aux serveurs et aux systèmes de stockage d’un rack. périphérique : Matériel interne ou externe, connecté à un système, comme une imprimante, un lecteur de disquette ou un clavier. PGA : Acronyme de “Pin Grid Array”, matrice de broches. Type de support de microprocesseur qui permet de retirer le microprocesseur. pile de sauvegarde : Pile qui conserve dans une région spécifique de la mémoire les informations sur la configuration du système, la date et l’heure, lorsque vous éteignez le système. pilote de périphérique : Programme qui permet au système d’exploitation ou à un autre programme de communiquer correctement avec un périphérique ou un matériel donné. Certains pilotes de périphériques, comme les pilotes réseau, doivent être chargés par le fichier config.sys ou comme programmes résidant en mémoire (en général par le fichier autoexec.bat). D’autres, comme le pilote vidéo, se chargent lorsque vous démarrez le programme pour lequel ils sont conçus. pilote vidéo : Programme qui permet aux applications et systèmes d’exploitation en mode graphique, d’afficher avec une résolution et le nombre de couleurs désirées. Le pilote vidéo doit correspondre à la carte vidéo installée. pixel : Point sur un écran vidéo. Les pixels sont disposés en lignes et en colonnes afin de créer une image. Une résolution vidéo, par exemple 640 x 480, indique le nombre de pixels en largeur et le nombre de pixels en hauteur. port en amont : Port sur un commutateur ou un concentrateur réseau, qui sert à le relier à un autre commutateur ou concentrateur, sans utiliser de câble croisé. port série : Port d’E-S, utilisé le plus souvent pour connecter un modem au système. Normalement, vous pouvez identifier un port série sur le système grâce à son connecteur à 9 broches. POST : Acronyme de “Power-On Self-Test”, auto-test de démarrage. Quand vous allumez le système, avant que le système d’exploitation ne se charge, ce programme teste différents composants dont la RAM, les lecteurs de disque et le clavier. processeur : Circuit de calcul principal du système, qui contrôle l’interprétation et l’exécution des fonctions mathématiques et logiques. Un logiciel écrit pour un microprocesseur doit souvent être révisé pour fonctionner sur un autre microprocesseur. CPU est un synonyme de microprocesseur. programme de configuration du système : Programme basé sur le BIOS et permettant de configurer le matériel du système et de personnaliser son fonctionnement, en paramétrant des fonctions telles que la protection par mot de passe et la gestion d’énergie. Comme le programme de configuration du système est stocké dans la mémoire vive rémanente, tous les paramètres restent effectifs jusqu’à ce que vous les changiez. PS/2 : Personal System/2. PXE : Acronyme de “Preboot eXecution Environment”, environnement d’exécution avant démarrage. La fonction PXE permet de démarrer un système (sans disque dur ni disquette amorçable) à partir d’une unité réseau.Glossaire 177 RAID : Acronyme de “Redundant Array of Independent Disks”, matrice redondante de disques indépendants. Technologie permettant la mise en redondance des données. Les types de RAID les plus fréquents sont les RAID 0, 1, 5, 10 et 50. Voir aussi guarding, mise en miroir et striping. RAM : Acronyme de “Random-Access Memory”, mémoire vive. Zone principale de stockage temporaire du système pour les instructions d’un programme et les données. Toutes les informations stockées dans la RAM sont perdues lorsque vous éteignez le système. RAS : Acronyme de “Remote Access Service”, service d’accès à distance. Sous Microsoft Windows, ce service permet d’accéder à un réseau distant à l’aide d’un modem. répertoire : Les répertoires permettent de conserver des fichiers apparentés sur un disque en les organisant hiérarchiquement dans une structure en “arborescence inversée”. Chaque disque possède un répertoire “racine”. Les répertoires supplémentaires qui partent du répertoire racine sont appelés sous-répertoires. Ces derniers peuvent contenir d’autres répertoires, formant une sousarborescence. ROM : Acronyme de “Read-Only Memory”, mémoire morte. La ROM contient les programmes essentiels au fonctionnement du système. Ces informations sont conservées lorsque le système est mis hors tension. Le programme qui lance la procédure d’amorçage et l’auto-test de démarrage de l’ordinateur sont des exemples de code en ROM. ROMB : Acronyme de “RAID on Motherboard”, fonction RAID incluse sur la carte mère. routine d’amorçage : Programme qui initialise la mémoire et les périphériques matériels, puis charge le système d’exploitation. À moins que le système d’exploitation ne réponde pas, vous pouvez redémarrer (faire un démarrage à chaud) le système en appuyant sur . Sinon, vous devez appuyer sur le bouton de réinitialisation ou éteindre puis rallumer le système. rpm : Tours par minute. RTC : Acronyme de “Real-Time Clock”, horloge temps réel. SAS : Acronyme de “Serial-Attached SCSI”. SATA : Acronyme de “Serial Advanced Technology Attachment”, connexion par technologie série avancée. Interface standard entre la carte système et les périphériques de stockage. sauvegarde : Copie d’un programme ou de données. Par précaution, il convient de sauvegarder régulièrement le disque dur du système. Avant de modifier la configuration du système, il est conseillé de sauvegarder les fichiers de démarrage importants du système d’exploitation. SCSI : Acronyme de “Small Computer System Interface”, interface système pour micro-ordinateur. Interface de bus d’E-S avec des transmissions de données plus rapides que les ports de modem standard. SDRAM : Acronyme de “Synchronous Dynamic RandomAccess Memory”, mémoire vive dynamique synchrone. sec : Seconde(s). SEL : Acronyme de “System Event Log”, journal des événements système. Utilisé par le logiciel de gestion des systèmes pour enregistrer les événements et les erreurs système. SMART : Acronyme de “Self-Monitoring Analysis and Reporting Technology”, technologie de prévision des défaillances des lecteurs de disque. Cette technologie permet aux lecteurs de disque dur de signaler les erreurs et les pannes au BIOS du système puis d’afficher un message d’erreur sur l’écran. SMP : Multiprocesseur symétrique. Se dit d’un système qui dispose de plusieurs processeurs reliés par un lien haut débit géré par un système d’exploitation où tous les processeurs ont les mêmes priorités d’accès au système d’E-S. SNMP : Acronyme de “Simple Network Management Protocol”, protocole de gestion de réseau simple. Interface standard qui permet au gestionnaire du réseau de surveiller et de gérer les stations de travail à distance. spanning (concaténation) : Dans ce mode, les volumes de disques attachés sont combinés ensemble et vus par le système d’exploitation comme un disque unique. L’espace disponible est ainsi mieux utilisé.178 Glossaire striping (répartition des données) : Méthode de répartition des données sur trois ou plusieurs disques, en utilisant une quantité donnée d’espace sur chacun. L’espace occupé par une bande (“stripe”) est le même sur chaque disque. Un disque virtuel peut utiliser plusieurs bandes sur le même jeu de disques. Voir également guarding, mise en miroir et RAID. SVGA : Acronyme de “Super Video Graphics Array”, super matrice graphique vidéo. VGA et SVGA sont des normes de cartes graphiques. Leur résolution et le nombre de couleurs possibles sont supérieurs à celles des normes précédentes. système “sans tête” : Système ou périphérique qui fonctionne sans moniteur, souris ni clavier. Habituellement, les systèmes sans tête sont gérés par le réseau à l’aide d’un navigateur Internet. TCP/IP : Acronyme de “Transmission Control Protocol/Internet Protocol”. température ambiante : Température de l’endroit ou de la pièce où se trouve le système. terminaison : Certains périphériques (par exemple à chaque extrémité d’une chaîne SCSI) doivent être dotés d’une terminaison pour empêcher les réflexions et les signaux parasites sur le câble. Lorsque de tels périphériques sont connectés en série, vous pourrez avoir à activer ou désactiver leur terminaison (si elle est intégrée), en déplaçant un cavalier ou des commutateurs sur chaque périphérique, ou en modifiant ses paramètres dans le logiciel de configuration. UNIX : Universal Internet Exchange. UNIX est un système d’exploitation écrit en langage C. Il est le précurseur de Linux. UPS : Acronyme de “Uninterruptible Power Supply”, alimentation sans interruption. Unité, alimentée par batterie, qui fournit automatiquement l’alimentation du système en cas de coupure de courant. USB : Un connecteur USB permet de relier divers périphériques compatibles avec la norme USB, comme des souris, claviers, imprimantes, haut-parleurs, etc. Les périphériques USB peuvent être branchés et débranchés pendant que le système est en fonctionnement. utilitaire : Programme qui sert à gérer les ressources du système (mémoire, disques durs, imprimantes, etc.). UTP : Acronyme de “Unshielded Twisted Pair”, paire torsadée non blindée. Type de câblage utilisé pour relier un ordinateur à une ligne téléphonique. V : Volt(s). VCA : Volts en courant alternatif. VCC : Volts en courant continu. VGA : Acronyme de “Video Graphics Array”, matrice graphique vidéo. VGA et SVGA sont des normes de cartes graphiques offrant une résolution et un nombre de couleurs supérieurs à ceux des normes précédentes. volume de disque simple : Volume d’espace disponible sur un disque physique dynamique. W : Watt(s). WH : Wattheure(s). Windows 2000 : Système d’exploitation Microsoft Windows complet et intégré qui ne requiert pas MS-DOS et qui fournit des performances avancées en matière de système d’exploitation, une facilité d’utilisation accrue, une fonctionnalité de groupe de travail améliorée ainsi qu’un système de navigation et de gestion de fichiers simplifié. Windows Powered : Se dit d’un système d’exploitation Windows conçu pour les systèmes NAS (stockage relié au réseau). Il est dédié au service des fichiers pour les clients sur le réseau. Windows Server® 2003 : Ensemble de technologies Microsoft qui permet l’intégration logicielle en utilisant les services Web XML. Ces derniers sont de petites applications réutilisables et écrites en XML, qui permettent de communiquer des données entre des sources qui ne sont pas connectées autrement. XML : Acronyme de “Extensible Markup Language”. Le langage XML sert à créer des formats communs d’information, puis à partager le format et les données sur le Web, les intranets, etc. ZIF : Acronyme de “Zero insertion force”, force d’insertion nulle.Index 179 Index A Accessibles au démarrage, touches, 10 Alerte, messages, 32 Avertissement, messages, 32 B Barrettes de mémoire (DIMM) Configuration, 64 Dépannage, 121 Installation, 66 Retrait, 68 Blocs d'alimentation Dépannage, 119 Réinstallation, 58 Retrait, 57 BMC Configuration, 48 Module de configuration, 10 C Cadre Retrait, 52 Capot Fermeture, 54 Ouverture, 52 Carte contrôleur SAS Installation, 85 Pile RAID, 85 Retrait, 85 Carte de distribution de l'alimentation Installation, 96 Retrait, 94 Carte de fond de panier SAS Connecteurs, 143 Installation, 101 Retrait, 99 Carte intermédiaire de ventilateur Installation, 93 Retrait, 92 Carte RAC Connecteurs, 63 Installation, 62 Logement d'extension, 59 Port du système, 14 Carte système Cavaliers, 137 Connecteurs, 140 Installation, 107 Retrait, 102 Cartes d'extension Contrôleur SAS, 85 Dépannage, 129 Installation, 60 Retrait, 62 Cavaliers (carte système), 137 Clavier Dépannage, 112 Commutateur d'intrusion du châssis Installation, 98 Retrait, 96 Configuration du système Accès au contrôleur BMC, 48 Options, 34 Touches de navigation, 34 Connecteurs Carte de fond de panier SAS, 143 Carte système, 140 Panneau arrière, 14 Panneau avant, 11 Consignes Installation de cartes d'extension, 59 Installation de mémoire, 64 Contacter Dell, 150 Contrôleur BMC voir BMC Contrôleur d'accès à distance Voir Carte RAC Contrôleur RAID Dépannage, 127 Contrôleur SAS Dépannage, 127180 Index 180 Index D Dell Contacter, 149-150 Dépannage Blocs d'alimentation, 119 Carte contrôleur RAID SAS, 127 Cartes d'extension, 129 Clavier, 112 Connexions externes, 111 Disque dur, 125 Incidents liés à l'alimentation, 110 Lecteur de bande, 128 Lecteur de disquette, 123 Lecteur optique, 124 Mémoire, 121 NIC, 115 Périphérique d'E-S série, 114 Périphérique USB, 114 Pile (RAID), 127 Pile (système), 118 Processeurs, 130 Refroidissement du système, 120 Routine de démarrage, 109 Souris, 113 Système endommagé, 117 Système mouillé, 116 Ventilateurs, 120 Vidéo, 111 Diagnostic, messages, 32 Diagnostics Options de test, 134 Options de test avancées, 135 Quand les utiliser, 134 DIMM, barrettes Voir Barrettes de mémoire (DIMM) Disque dur SATA Voir Disques durs (SAS/SATA) Disques durs (SAS/SATA) Codes des voyants, 13 Dépannage, 125 ID, 80 Installation, 83 Périphérique d'amorçage, 81 Retrait, 81 Support de disque, 84 Disques durs enfichables à chaud, 80 Dissipateur de chaleur, 70 E Écrans de configuration du système Integrated Devices (Périphériques intégrés), 40 Memory Information (Informations sur la mémoire), 38 Principal, 34 System Security (Sécurité du système), 41 Éléments requis, 50 Emplacements Voir Logements d'extension F Fonctions du panneau avant, 11 I Installation, 70 Barrettes de mémoire, 66 Cache de disque dur, 81 Carte d'extension, 60 Carte de distribution de l'alimentation, 96 Carte de fond de panier SAS, 101 Carte intermédiaire de ventilateur, 93 Carte RAC, 62 Commutateur d'intrusion du châssis, 98 Contrôleur SAS, 85 Disques durs, 83 Dissipateur de chaleur, 70 Lecteur de disquette, 75 Lecteur optique, 78 Module VRM, 73 Panneau de commande, 92 Pile RAID, 85 Processeur, 69, 71 IRQ Affectations, 110 Conflits, 110Index 181 L Lecteur de bande (externe) Connexion, 86 Dépannage, 128 Lecteur de CD/DVD Voir Lecteur optique Lecteur de disquette Dépannage, 123 Installation, 75 Support de disque, 77 Lecteur optique Dépannage, 124 Installation, 78 Support de disque, 79 Lecteur, cache Installation, 81 Retrait, 81 Logements d'extension, 59 M Maintenance Carte de distribution de l'alimentation, 94 Carte intermédiaire de ventilateur, 92 Carte système, 102 Commutateur d'intrusion du châssis, 96 Panneau de commande, 90 Messages Alerte, 32 Avertissement, 32 Codes des voyants des disques durs, 13 Diagnostics, 32 Écran d'état LCD, 16 Système, 25 Microprocesseur Voir Processeur Module VRM Installation, 73 Retrait, 75 Mot de passe de configuration Attribution, 46 Modification, 47 Utilisation, 46 Mot de passe système Attribution, 43 Modification, 45 Suppression, 45 Utilisation, 43 Mots de passe Configuration, 46 Désactivation, 139 Système, 43 N NIC Connecteurs du panneau arrière, 14 Dépannage, 115 Voyants, 16 Numéros de téléphone, 150 O Outils nécessaires, 50 P Panneau arrière, caractéristiques, 14 Panneau de commande Installation, 92 Retrait, 90 Périphérique d'amorçage Configuration, 81 Périphérique d'E-S série Dépannage, 114 Périphérique de stockage Fibre Channel, 87 Périphérique USB Connecteurs du panneau arrière, 14 Connecteurs du panneau avant, 11 Dépannage, 114 Pile (RAID) Dépannage, 127 Installation, 85 Pile (système) Dépannage, 118 Réinstallation, 88 Pile RAID, 85 Processeur Dépannage, 130 Installation, 71 Réinstallation, 69182 Index 182 Index Programme de configuration du système Accès, 33 Protecteur de ventilation Réinstallation, 57 Retrait, 56 R Refroidissement du système Dépannage, 120 Réinstallation Bloc d'alimentation, 58 Pile du système, 88 Pile RAID, 85 Processeur, 69 Protecteur de ventilation, 57 Ventilateur, 55 Retrait Barrettes de mémoire, 68 Bloc d'alimentation, 57 Cache de disque dur, 81 Cadre, 52 Capot, 52 Carte d'extension, 62 Carte de distribution de l'alimentation, 94 Carte de fond de panier SAS, 99 Carte intermédiaire de ventilateur, 92 Carte système, 102 Retrait (suite) Commutateur d'intrusion du châssis, 96 Contrôleur SAS, 85 Disques durs, 81 Module VRM, 75 Panneau de commande, 90 Protecteur de ventilation, 56 Ventilateur, 54 S SATA, disque dur Voir Disques durs (SAS/SATA) Sécurité, 109 Souris Dépannage, 113 Support Contacter Dell, 149-150 Support de disque Disque dur, 82 Lecteur optique/ de disquette, 76 Support ZIF, 69 Système Fermeture, 54 Ouverture, 52 Système mouillé Dépannage, 116 Système, messages, 25 T Touches Caractéristiques de la carte RAC, 10 Démarrage, 10 Programme de configuration du système, 33 Touches accessibles pendant l'auto-test de démarrage, 10 V Ventilateur Dépannage, 120 Réinstallation, 55 Retrait, 54 Vidéo Connecteur du panneau arrière, 14 Connecteur du panneau avant, 11 Dépannage, 111 Voyant d'alimentation, 15 Voyants Alimentation, 15 Disque dur, 13 NIC, 16 Panneau arrière, 14 Panneau avant, 11 Emplacement des cavaliers de la carte système des systèmes Dell PowerEdge R310 - Mise à jour des informations Cette mise à jour des informations remplace les informations contenues dans le Hardware Owner’s Manual (Manuel du propriétaire) sur le site support.dell.com/manuals. Pour connaître l'emplacement des cavaliers de la carte système, voir la Figure 1. Figure 1. Emplacement des cavaliers de la carte système 1 2 3 11 10 8 67 12 13 14 15 16 18 19 20 21 9 17 5 4Tableau 1. Connecteurs et cavaliers de la carte système Élément Connecteur Description 1 RISER2 Connecteur d'interface USB du panneau de commande 2 RISER1 Connecteur SATA A 3 iDRAC6 Enterprise Connecteur de la carte iDRAC6 Enterprise 4 iDRAC6 Express Connecteur de la carte iDRAC6 Express 5 UC Support du processeur 6 FAN1 Connecteur du ventilateur 1 du système 7 FAN2 Connecteur du ventilateur 2 du système 8 FAN3 Connecteur du ventilateur 3 du système 9 5 3 1 6 4 2 Logement de barrette de mémoire 5 Logement de barrette de mémoire 3 Logement de barrette de mémoire 1 (levier d'éjection blanc) Logement de barrette de mémoire 6 Logement de barrette de mémoire 4 Logement de barrette de mémoire 2 (levier d'éjection blanc) 10 12 V Connecteur d'alimentation à 4 broches 11 PWR_CONN Connecteur d'alimentation à 24 broches 12 CTRL_PNL Connecteur du panneau de commande 13 SATA_A Connecteur SATA A 14 SATA_B Connecteur SATA B 15 SATA_C Connecteur SATA C 16 SATA_D Connecteur SATA D 17 PWRD_EN NVRAM_CLR Cavalier d'activation du mot de passe Cavalier d'effacement NVRAM 18 USB_CONN Connecteur USB interne____________________ © 2012 Dell Inc. Marques mentionnées dans ce document : Dell™, le logo DELL et PowerEdge™ sont des marques de Dell Inc. Juin 2012 Rév. A00 19 BATTERY Support de batterie 20 HD_ACT_CARD Connecteur de câble de carte d'extension 21 PCIE-G2-X4 Connecteur de contrôleur de stockage interne Tableau 1. Connecteurs et cavaliers de la carte système Élément Connecteur Description Alienware M17x R4 Owner’s Manual Computer model: M17x R4 Regulatory model: P11E Regulatory type: P11E002Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION: A CAUTION indicates potential damage to hardware or loss of data if instructions are not followed. WARNING: A WARNING indicates a potential for property damage, personal injury, or death. ____________________ Information in this document is subject to change without notice. © 2012 Dell Inc. All rights reserved. Reproduction of these materials in any manner whatsoever without the written permission of Dell Inc. is strictly forbidden. Trademarks used in this text: Dell™ and the DELL logo are trademarks of Dell Inc.; Alienware ® is a registered trademark of Alienware Corporation; Bluetooth ® is a registered trademark owned by Bluetooth SIG, Inc. and is used by Dell under license; Microsoft ® , Windows ® , and the Windows start button logo are either trademarks or registered trademarks of Microsoft Corporation in the United States and/or other countries. Other trademarks and trade names may be used in this document to refer to either the entities claiming the marks and names or their products. Dell Inc. disclaims any proprietary interest in trademarks and trade names other than its own. 2012 - 04 Rev. A00Contents | 3 Contents 1 Before You Begin. . . . . . . . . . . . . . . . . . . . 9 Turn Off Your Computer and Connected Devices. . . . 9 Safety Instructions . . . . . . . . . . . . . . . . . . . . . . . 9 Recommended Tools. . . . . . . . . . . . . . . . . . . . . 10 2 After Working Inside Your Computer 11 3 Removing the Battery Pack. . . . . . . . . . 12 Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 4 Replacing the Battery Pack . . . . . . . . . . 13 Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 Postrequsites . . . . . . . . . . . . . . . . . . . . . . . . . 13 5 Removing the Compartment Door. . . . 14 Prerequsites . . . . . . . . . . . . . . . . . . . . . . . . . . 14 Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 6 Replacing the Compartment Door . . . . 15 Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 Postrequsites . . . . . . . . . . . . . . . . . . . . . . . . . 15 7 Removing the Coin-Cell Battery . . . . . . 16 Prerequsites . . . . . . . . . . . . . . . . . . . . . . . . . . 16 Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 8 Replacing the Coin-Cell Battery 17 Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 Postrequsites . . . . . . . . . . . . . . . . . . . . . . . . . 17 9 Removing the Hard Drive(s). . . . . . . . . . 18 Prerequsites . . . . . . . . . . . . . . . . . . . . . . . . . . 18 Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184 | Contents 10 Replacing the Hard Drive(s). . . . . . . . . . 21 Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 Postrequsites . . . . . . . . . . . . . . . . . . . . . . . . . 21 11 Removing the Memory Module(s) . . . . 22 Prerequsites . . . . . . . . . . . . . . . . . . . . . . . . . . 22 Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 12 Replacing the Memory Module(s) . . . . 24 Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 Postrequsites . . . . . . . . . . . . . . . . . . . . . . . . . 25 13 Removing the Graphics-Card Heat Sink Fan 26 Prerequsites . . . . . . . . . . . . . . . . . . . . . . . . . . 26 Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 14 Replacing the Graphics-Card Heat Sink Fan 28 Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 Postrequsites . . . . . . . . . . . . . . . . . . . . . . . . . 28 15 Removing the Processor Heat-Sink Fan 29 Prerequsites . . . . . . . . . . . . . . . . . . . . . . . . . . 29 Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 16 Replacing the Processor Heat-Sink Fan 31 Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 Postrequsites . . . . . . . . . . . . . . . . . . . . . . . . . 31 17 Removing the Graphics-Card Assembly 32 Prerequsites . . . . . . . . . . . . . . . . . . . . . . . . . . 32 Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33Contents | 5 18 Replacing the Graphics-Card Assembly 34 Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 Postrequsites . . . . . . . . . . . . . . . . . . . . . . . . . 34 19 Removing the Processor Heat-Sink 35 Prerequsites . . . . . . . . . . . . . . . . . . . . . . . . . . 35 Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 20 Replacing the Processor Heat-Sink 37 Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 Postrequsites . . . . . . . . . . . . . . . . . . . . . . . . . 37 21 Removing the Processor Module 38 Prerequsites . . . . . . . . . . . . . . . . . . . . . . . . . . 38 Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38 22 Replacing the Processor Module . . . . . 40 Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 Postrequsites . . . . . . . . . . . . . . . . . . . . . . . . . 40 23 Removing the Center Control Cover 41 Prerequsites . . . . . . . . . . . . . . . . . . . . . . . . . . 41 Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 24 Replacing the Center Control Cover 44 Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 Postrequsites . . . . . . . . . . . . . . . . . . . . . . . . . 44 25 Removing the Keyboard . . . . . . . . . . . . 45 Prerequsites . . . . . . . . . . . . . . . . . . . . . . . . . . 45 Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . 456 | Contents 26 Replacing the Keyboard . . . . . . . . . . . . 48 Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48 Postrequsites . . . . . . . . . . . . . . . . . . . . . . . . . 48 27 Removing the Mini-Card . . . . . . . . . . . . 49 Prerequsites . . . . . . . . . . . . . . . . . . . . . . . . . . 49 Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50 28 Replacing the Mini-Card . . . . . . . . . . . . . 51 Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 Postrequsites . . . . . . . . . . . . . . . . . . . . . . . . . 52 29 Removing the WirelessHD Card 53 Prerequsites . . . . . . . . . . . . . . . . . . . . . . . . . . 53 Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 30 Replacing the WirelessHD Card 54 Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54 Postrequsites . . . . . . . . . . . . . . . . . . . . . . . . . 54 31 Removing the Power Button Board 55 Prerequsites . . . . . . . . . . . . . . . . . . . . . . . . . . 55 Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55 32 Replacing the Power Button Board 56 Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 Postrequsites . . . . . . . . . . . . . . . . . . . . . . . . . 56 33 Removing the Display Assembly 57 Prerequsites . . . . . . . . . . . . . . . . . . . . . . . . . . 57 Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57Contents | 7 34 Replacing the Display Assembly 60 Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60 Postrequsites . . . . . . . . . . . . . . . . . . . . . . . . . 60 35 Removing the Status Light Board 61 Prerequsites . . . . . . . . . . . . . . . . . . . . . . . . . . 61 Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61 36 Replacing the Status Light Board 63 Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63 Postrequsites . . . . . . . . . . . . . . . . . . . . . . . . . 63 37 Removing the Palm Rest Assembly 64 Prerequsites . . . . . . . . . . . . . . . . . . . . . . . . . . 64 Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65 38 Replacing the Palm Rest Assembly 66 Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66 Postrequsites . . . . . . . . . . . . . . . . . . . . . . . . . 66 39 Removing the Bluetooth Card. . . . . . . 67 Prerequsites . . . . . . . . . . . . . . . . . . . . . . . . . . 67 Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67 40 Replacing the Bluetooth Card . . . . . . . 69 Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69 Postrequsites . . . . . . . . . . . . . . . . . . . . . . . . . 69 41 Removing the Speakers . . . . . . . . . . . . 70 Prerequsites . . . . . . . . . . . . . . . . . . . . . . . . . . 70 Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70 42 Replacing the Speakers . . . . . . . . . . . . 72 Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . 728 | Contents Postrequsites . . . . . . . . . . . . . . . . . . . . . . . . . 72 43 Removing the Optical Drive . . . . . . . . 73 Prerequsites . . . . . . . . . . . . . . . . . . . . . . . . . . 73 Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 44 Replacing the Optical Drive . . . . . . . . . 76 Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76 Postrequsites . . . . . . . . . . . . . . . . . . . . . . . . . 76 45 Removing the System Board. . . . . . . . . 77 Prerequsites . . . . . . . . . . . . . . . . . . . . . . . . . . 77 Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78 46 Replacing the System Board . . . . . . . . 79 Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79 Postrequsites . . . . . . . . . . . . . . . . . . . . . . . . . 79 Entering the Service Tag in the BIOS . . . . . . . . . . 80 47 System Setup . . . . . . . . . . . . . . . . . . . . . . . 81 Configuring the System Setup . . . . . . . . . . . . . . 81 Entering System Setup . . . . . . . . . . . . . . . . . . . 81 System Setup Screens. . . . . . . . . . . . . . . . . . . . 81 System Setup Options. . . . . . . . . . . . . . . . . . . . 82 48 Flashing the BIOS . . . . . . . . . . . . . . . . . . 88Before You Begin | 9 Before You Begin Turn Off Your Computer and Connected Devices CAUTION: To avoid losing data, save and close all open files and exit all open programs before you turn off your computer. 1 Save and close all open files and exit all open programs. 2 Click Start and click Shut down. Microsoft Windows shuts down and then the computer turns off. NOTE: If you are using a different operating system, see the documentation of your operating system for shut-down instructions. 3 Disconnect your computer and all attached devices from their electrical outlets. 4 Disconnect all telephone cables, network cables, and attached devices from your computer. 5 Press and hold the power button for about 5 seconds, after the computer is unplugged, to ground the system board. Safety Instructions Use the following safety guidelines to protect your computer from potential damage and ensure your personal safety. WARNING: Before working inside your computer, read the safety information that shipped with your computer. For additional safety best practices information, see the Regulatory Compliance Homepage at dell.com/regulatory_compliance. WARNING: Disconnect all power sources before opening the computer cover or panels. After you finish working inside the computer, replace all covers, panels, and screws before connecting to the power source. CAUTION: To avoid damaging the computer, ensure that the work surface is flat and clean. CAUTION: To avoid damaging the components and cards, handle them by their edges and avoid touching pins and contacts. 110 | Before You Begin CAUTION: Only a certified service technician is authorized to remove the computer cover and access any of the components inside the computer. See the safety instructions for complete information about safety precautions, working inside your computer, and protecting against electrostatic discharge. CAUTION: Before touching anything inside your computer, ground yourself by touching an unpainted metal surface, such as the metal at the back of the computer. While you work, periodically touch an unpainted metal surface to dissipate static electricity, which could harm internal components. CAUTION: When you disconnect a cable, pull on its connector or on its pull-tab, not on the cable itself. Some cables have connectors with locking tabs or thumb-screws that you must disengage before disconnecting the cable. When disconnecting cables, keep them evenly aligned to avoid bending any connector pins. When connecting cables, ensure that the connectors and ports are correctly oriented and aligned. CAUTION: To disconnect a network cable, first unplug the cable from your computer and then unplug the cable from the network device. CAUTION: Press and eject any installed card from the 8-in-1 Media Card Reader. Recommended Tools The procedures in this document may require the following tools: • Phillips screwdriver • Plastic scribe • Small flat-blade screwdriverAfter Working Inside Your Computer | 11 After Working Inside Your Computer After you complete replacement procedures, ensure the following: • Replace all screws and ensure that no stray screws remain inside your computer • Connect any external devices, cables, cards, and any other part(s) you removed before working on your computer • Connect your computer and all attached devices to their electrical outlets CAUTION: Before turning on your computer, replace all screws and ensure that no stray screws remain inside the computer. Failure to do so may damage your computer. 212 | Removing the Battery Pack Removing the Battery Pack WARNING: Before working inside your computer, read the safety information that shipped with your computer and follow the steps in "Before You Begin" on page 9. For additional safety best practices information, see the Regulatory Compliance Homepage at dell.com/ regulatory_compliance. Procedure 1 Slide the battery latch to the unlock position as shown. The battery pack pops up. 2 Remove the battery pack. 1 battery pack 2 battery latch 3 1 2Replacing the Battery Pack | 13 Replacing the Battery Pack WARNING: Before working inside your computer, read the safety information that shipped with your computer and follow the steps in "Before You Begin" on page 9. For additional safety best practices information, see the Regulatory Compliance Homepage at dell.com/ regulatory_compliance. Procedure CAUTION: To avoid damage to the computer, use only the battery designed for this particular Alienware computer. Align the tabs on the battery with the slots on the battery bay and snap the battery into place. Postrequsites Follow the instructions in "After Working Inside Your Computer" on page 11. 414 | Removing the Compartment Door Removing the Compartment Door WARNING: Before working inside your computer, read the safety information that shipped with your computer and follow the steps in "Before You Begin" on page 9. For additional safety best practices information, see the Regulatory Compliance Homepage at dell.com/ regulatory_compliance. Prerequsites Remove the battery pack. See "Removing the Battery Pack" on page 12. Procedure 1 Remove the screws that secure the compartment door to the computer base. 2 Slide and lift the compartment door away from the computer. 1 compartment door 2 screws (2) 5 2 1Replacing the Compartment Door | 15 Replacing the Compartment Door WARNING: Before working inside your computer, read the safety information that shipped with your computer and follow the steps in "Before You Begin" on page 9. For additional safety best practices information, see the Regulatory Compliance Homepage at dell.com/ regulatory_compliance. Procedure 1 Align the tabs on the compartment door with the slots on the computer base and slide the compartment door into place. 2 Replace the two screws that secure the compartment door to the computer base. Postrequsites 1 Replace the battery pack. See "Replacing the Battery Pack" on page 13. 2 Follow the instructions in "After Working Inside Your Computer" on page 11. 616 | Removing the Coin-Cell Battery Removing the Coin-Cell Battery WARNING: Before working inside your computer, read the safety information that shipped with your computer and follow the steps in "Before You Begin" on page 9. For additional safety best practices information, see the Regulatory Compliance Homepage at dell.com/ regulatory_compliance. Prerequsites 1 Remove the battery pack. See "Removing the Battery Pack" on page 12. 2 Remove the compartment door. See "Removing the Compartment Door" on page 14. Procedure Use a plastic scribe to pry up the coin-cell battery from the slot on the system board. 1 plastic scribe 2 coin-cell battery 7 1 2Replacing the Coin-Cell Battery | 17 Replacing the Coin-Cell Battery WARNING: Before working inside your computer, read the safety information that shipped with your computer and follow the steps in "Before You Begin" on page 9. For additional safety best practices information, see the Regulatory Compliance Homepage at dell.com/ regulatory_compliance. Procedure 1 Hold the coin-cell battery with the positive side facing up. 2 Slide the coin-cell battery into the slot and gently press until it snaps into place. Postrequsites 1 Replace the compartment door. See "Replacing the Compartment Door" on page 15. 2 Replace the battery pack. See "Replacing the Battery Pack" on page 13. 3 Follow the instructions in "After Working Inside Your Computer" on page 11. 818 | Removing the Hard Drive(s) Removing the Hard Drive(s) WARNING: Before working inside your computer, read the safety information that shipped with your computer and follow the steps in "Before You Begin" on page 9. For additional safety best practices information, see the Regulatory Compliance Homepage at dell.com/ regulatory_compliance. WARNING: If you remove the hard drive from the computer when the drive is hot, do not touch the metal housing of the hard drive. CAUTION: To help prevent damage to the system board, remove the main battery. See "Removing the Battery Pack" on page 12. CAUTION: To prevent data loss, turn off your computer . See "Turn Off Your Computer and Connected Devices" on page 9. Do not remove the hard drive while the computer is On or in Sleep state. CAUTION: Hard drives are extremely fragile. Exercise care when handling the hard drive. Prerequsites 1 Remove the battery pack. See "Removing the Battery Pack" on page 12. 2 Remove the compartment door. See "Removing the Compartment Door" on page 14. Procedure 1 Loosen the captive screws that secure the hard-drive assembly to the computer base. 2 Using the pull-tab, lift the hard-drive assembly to disconnect it from the connector on the system board. 3 Lift the hard-drive assembly out of the computer base. 9Removing the Hard Drive(s) | 19 Primary hard-drive assembly Secondary hard-drive assembly 1 captive screws (3) 2 primary hard-drive assembly 1 captive screws (3) 2 secondary hard-drive assembly 1 2 1 220 | Removing the Hard Drive(s) 4 Remove the screws that secure the hard drive to the hard-drive bracket. 5 Lift the hard-drive off the hard-drive bracket. 6 Remove the interposer from the hard drive. CAUTION: When the hard drive is not in the computer, store it in protective antistatic packaging. See "Protecting Against Electrostatic Discharge" in the safety instructions that shipped with your computer. 1 interposer 2 screws (4) 3 hard drive 4 hard-drive bracket 1 2 4 2Replacing the Hard Drive(s) | 21 Replacing the Hard Drive(s) WARNING: Before working inside your computer, read the safety information that shipped with your computer and follow the steps in "Before You Begin" on page 9. For additional safety best practices information, see the Regulatory Compliance Homepage at dell.com/ regulatory_compliance. CAUTION: Hard drives are extremely fragile. Exercise care when handling the hard drive. NOTE: Dell or Alienware does not guarantee compatibility or provide support for hard drives from sources other than Dell. NOTE: If you are installing a hard drive from a source other than Dell or Alienware, you need to install an operating system, drivers, and utilities on the new hard drive. Procedure 1 Remove the new drive from its packaging. Save the original packaging for storing or shipping the hard drive. 2 Connect the interposer to the hard drive. 3 Place the hard drive in the hard-drive bracket. 4 Replace the screws that secure the hard drive to the hard-drive bracket. 5 Align the connector on the hard drive with the connector on the system board and press the hard drive until it is fully seated. 6 Tighten the captive screws that secure the hard-drive assembly to the computer base. Postrequsites 1 Replace the compartment door. See "Replacing the Compartment Door" on page 15. 2 Replace the battery pack. See "Replacing the Battery Pack" on page 13. 3 Follow the instructions in "After Working Inside Your Computer" on page 11. 4 Install the operating system for your computer, as needed. 5 Install the drivers and utilities for your computer, as needed. 1022 | Removing the Memory Module(s) Removing the Memory Module(s) WARNING: Before working inside your computer, read the safety information that shipped with your computer and follow the steps in "Before You Begin" on page 9. For additional safety best practices information, see the Regulatory Compliance Homepage at dell.com/ regulatory_compliance. NOTE: Your computer supports up to four memory module connectors. You can access connectors DIMM 1 and DIMM 2 by removing the compartment door at the bottom of your computer. You can access connectors DIMM 3 and DIMM 4 by removing the memory-module cover on top of the palm rest assembly. Prerequsites 1 Remove the battery pack. See "Removing the Battery Pack" on page 12. 2 Remove the compartment door. See "Removing the Compartment Door" on page 14. Procedure 1 To remove memory module(s) from connectors DIMM 1 and DIMM 2, go to step 3. 2 To remove memory-module(s) from connectors DIMM 3 and DIMM 4: a Remove the center control cover. See "Removing the Center Control Cover" on page 41. b Remove the keyboard. See "Removing the Keyboard" on page 45. c Remove the screws that secure the memory-module cover to the palm rest assembly. 1 memory-module cover 2 screws (3) 11 2 1Removing the Memory Module(s) | 23 CAUTION: To prevent damage to the memory-module connector, do not use tools to spread the memory module securing clips. 3 Use your fingertips to carefully spread apart the securing clips on each end of the memory-module connector until the memory module pops up. 4 Remove the memory module from the memory-module connector. 1 memory-module connector 2 securing clips (2) 3 memory module 3 2 124 | Replacing the Memory Module(s) Replacing the Memory Module(s) WARNING: Before working inside your computer, read the safety information that shipped with your computer and follow the steps in "Before You Begin" on page 9. For additional safety best practices information, see the Regulatory Compliance Homepage at dell.com/ regulatory_compliance. NOTE: Memory modules purchased from Dell or Alienware are covered under your computer warranty. NOTE: If you purchased a dual-core processor, your computer supports only memory module connectors DIMM 1 and DIMM 2. NOTE: Your computer supports up to four memory module connectors. You can access connectors DIMM 1 and DIMM 2 by removing the compartment door at the bottom of your computer. You can access connectors DIMM 3 and DIMM 4 by removing the memory-module cover on top of the palm rest assembly. Procedure NOTE: If you need to install memory modules in two connectors, install a memory module in the lower connector before you install a memory module in the upper connector. 1 Align the notch in the memory module with the tab on the memory-module connector. 2 Slide the memory module firmly into the connector at a 45-degree angle, and press the memory module down until it clicks into place. If you do not hear the click, remove the memory module and reinstall it. NOTE: If the memory module is not installed properly, the computer may not boot. 12Replacing the Memory Module(s) | 25 3 If you have replaced memory module(s) in connectors DIMM 1 and DIMM 2, go to Postrequsites. 4 If you have replaced memory module(s) in connectors DIMM 3 and DIMM 4: a Align the screw holes on the memory-module cover with the screw holes on the palm rest assembly. b Replace the screws that secure the memory-module cover to the palm rest assembly. c Replace the keyboard. See "Replacing the Keyboard" on page 48. d Replace the center control cover. See "Replacing the Center Control Cover" on page 44. Postrequsites 1 Replace the compartment door. See "Replacing the Compartment Door" on page 15. 2 Replace the battery pack. See "Replacing the Battery Pack" on page 13. 3 Follow the instructions in "After Working Inside Your Computer" on page 11. As the computer boots, it detects the additional memory and automatically updates the system configuration information. To confirm the amount of memory installed in the computer: Click Start → Control Panel→ System and Security→ System. 1 memory-module connector 2 tab 3 notch 1 2 326 | Removing the Graphics-Card Heat Sink Fan Removing the Graphics-Card Heat Sink Fan WARNING: Before working inside your computer, read the safety information that shipped with your computer and follow the steps in "Before You Begin" on page 9. For additional safety best practices information, see the Regulatory Compliance Homepage at dell.com/ regulatory_compliance. WARNING: The graphics-card assembly may be very hot during normal operation. Ensure that it has had sufficient time to cool before you touch it. Prerequsites 1 Remove the battery pack. See "Removing the Battery Pack" on page 12. 2 Remove the compartment door. See "Removing the Compartment Door" on page 14. 13Removing the Graphics-Card Heat Sink Fan | 27 Procedure 1 Disconnect the graphics-card heat sink fan cable from the connector on the system board. 2 Loosen the captive screws that secure the graphics-card heat sink fan to the chassis. 3 Lift the graphics-card heat sink fan along with the cable away from the computer base. 1 graphics-card heat sink fan cable 2 captive screws (3) 3 graphics-card heat sink fan 1 2 328 | Replacing the Graphics-Card Heat Sink Fan Replacing the Graphics-Card Heat Sink Fan WARNING: Before working inside your computer, read the safety information that shipped with your computer and follow the steps in "Before You Begin" on page 9. For additional safety best practices information, see the Regulatory Compliance Homepage at dell.com/ regulatory_compliance. Procedure 1 Align the screw holes on the graphics-card heat sink fan with the screw holes on the chassis. 2 Tighten the captive screws that secure the graphics-card heat sink fan to the chassis. 3 Connect the graphics-card heat sink fan cable to the connector on the system board. Postrequsites 1 Replace the compartment door. See "Replacing the Compartment Door" on page 15. 2 Replace the battery pack. See "Replacing the Battery Pack" on page 13. 3 Follow the instructions in "After Working Inside Your Computer" on page 11. 14Removing the Processor Heat-Sink Fan | 29 Removing the Processor Heat-Sink Fan WARNING: Before working inside your computer, read the safety information that shipped with your computer and follow the steps in "Before You Begin" on page 9. For additional safety best practices information, see the Regulatory Compliance Homepage at dell.com/ regulatory_compliance. WARNING: The processor heat-sink may be very hot during normal operation. Ensure that it has had sufficient time to cool before you touch it. Prerequsites 1 Remove the battery pack. See "Removing the Battery Pack" on page 12. 2 Remove the compartment door. See "Removing the Compartment Door" on page 14. 1530 | Removing the Processor Heat-Sink Fan Procedure 1 Disconnect the processor heat-sink fan cable from the connector on the system board. 2 Loosen the captive screws that secure the processor heat-sink fan to the chassis. 3 Lift the processor heat-sink fan along with the cable away from the chassis. 1 processor heat-sink fan cable 2 processor heat-sink fan 3 captive screws (3) 1 2 3Replacing the Processor Heat-Sink Fan | 31 Replacing the Processor Heat-Sink Fan WARNING: Before working inside your computer, read the safety information that shipped with your computer and follow the steps in "Before You Begin" on page 9. For additional safety best practices information, see the Regulatory Compliance Homepage at dell.com/ regulatory_compliance. Procedure 1 Align the screw holes on the processor heat-sink fan with the screw holes on the chassis. 2 Tighten the captive screws that secure the processor heat-sink fan to the chassis. 3 Connect the processor heat-sink fan cable to the connector on the system board. Postrequsites 1 Replace the compartment door. See "Replacing the Compartment Door" on page 15. 2 Replace the battery pack. See "Replacing the Battery Pack" on page 13. 3 Follow the instructions in "After Working Inside Your Computer" on page 11. 1632 | Removing the Graphics-Card Assembly Removing the Graphics-Card Assembly WARNING: Before working inside your computer, read the safety information that shipped with your computer and follow the steps in "Before You Begin" on page 9. For additional safety best practices information, see the Regulatory Compliance Homepage at dell.com/ regulatory_compliance. WARNING: The graphics-card assembly may be very hot during normal operation. Ensure that it has had sufficient time to cool before you touch it. Prerequsites 1 Remove the battery pack. See "Removing the Battery Pack" on page 12. 2 Remove the compartment door. See "Removing the Compartment Door" on page 14. 3 Remove the graphics-card heat sink fan. See "Removing the Graphics-Card Heat Sink Fan" on page 26. 17Removing the Graphics-Card Assembly | 33 Procedure 1 Remove the screws that secure the graphics-card assembly to the system board. 2 Lift and slide the graphics-card assembly to disconnect it from the connector on the system board. 1 graphics-card assembly 2 screws (2) 1 234 | Replacing the Graphics-Card Assembly Replacing the Graphics-Card Assembly WARNING: Before working inside your computer, read the safety information that shipped with your computer and follow the steps in "Before You Begin" on page 9. For additional safety best practices information, see the Regulatory Compliance Homepage at dell.com/ regulatory_compliance. Procedure 1 Insert the graphics card connector at a 45-degree angle into the connector on the system board. 2 Press the other end of the graphics-card assembly down into the slot on the system board and replace the two screws that secure the graphics-card assembly to the system board. Postrequsites 1 Replace the graphics-card heat sink fan. See "Replacing the Graphics-Card Heat Sink Fan" on page 28. 2 Replace the compartment door. See "Replacing the Compartment Door" on page 15. 3 Replace the battery pack. See "Replacing the Battery Pack" on page 13. 4 Follow the instructions in "After Working Inside Your Computer" on page 11. 18Removing the Processor Heat-Sink | 35 Removing the Processor HeatSink WARNING: Before working inside your computer, read the safety information that shipped with your computer and follow the steps in "Before You Begin" on page 9. For additional safety best practices information, see the Regulatory Compliance Homepage at dell.com/ regulatory_compliance. WARNING: If you remove the processor heat-sink from the computer when the heat sink is hot, do not touch the metal housing of the processor heat-sink. Prerequsites 1 Remove the battery pack. See "Removing the Battery Pack" on page 12. 2 Remove the compartment door. See "Removing the Compartment Door" on page 14. 3 Remove the processor heat-sink fan. See "Removing the Processor Heat-Sink Fan" on page 29. 1936 | Removing the Processor Heat-Sink Procedure 1 In sequential order (indicated on the processor heat-sink), loosen the captive screws that secure the processor heat-sink to the system board. 2 Lift the processor heat-sink at an angle toward the front of the computer and out of the computer base. 1 processor heat-sink 2 captive screws (4) 2 1Replacing the Processor Heat-Sink | 37 Replacing the Processor Heat-Sink WARNING: Before working inside your computer, read the safety information that shipped with your computer and follow the steps in "Before You Begin" on page 9. For additional safety best practices information, see the Regulatory Compliance Homepage at dell.com/ regulatory_compliance. CAUTION: Incorrect alignment of the processor heat-sink can damage the processor. NOTE: The original thermal grease can be reused if the original processor heat-sink is reinstalled. If the processor heat-sink is replaced, use the thermal grease provided in the kit to ensure that thermal conductivity is achieved. Procedure 1 Slide the processor heat-sink in place. 2 Align the captive screws on the processor heat-sink with the screw holes on the system board and tighten the screws in sequential order (indicated on the processor heat-sink). Postrequsites 1 Replace the processor heat-sink fan. See "Replacing the Processor Heat-Sink Fan" on page 31. 2 Replace the compartment door. See "Replacing the Compartment Door" on page 15. 3 Replace the battery pack. See "Replacing the Battery Pack" on page 13. 4 Follow the instructions in "After Working Inside Your Computer" on page 11. 2038 | Removing the Processor Module Removing the Processor Module WARNING: Before working inside your computer, read the safety information that shipped with your computer and follow the steps in "Before You Begin" on page 9. For additional safety best practices information, see the Regulatory Compliance Homepage at dell.com/ regulatory_compliance. Prerequsites CAUTION: To prevent intermittent contact between the ZIF-socket cam screw and the processor module when removing the processor, press to apply slight pressure to the center of the processor module while turning the cam screw. CAUTION: To avoid damage to the processor module, hold the screwdriver so that it is perpendicular to the processor module when turning the cam screw. 1 Remove the battery pack. See "Removing the Battery Pack" on page 12. 2 Remove the compartment door. See "Removing the Compartment Door" on page 14. 3 Remove the processor heat-sink fan. See "Removing the Processor Heat-Sink Fan" on page 29. 4 Remove the processor heat-sink. See "Removing the Processor Heat-Sink" on page 35. Procedure 1 To loosen the ZIF socket, use a small, flat-blade screwdriver and rotate the ZIF-socket cam screw counterclockwise until it comes to the cam stop. CAUTION: To ensure maximum cooling for the processor module, do not touch the heat transfer areas on the processor thermal cooling assembly. The oils in your skin can reduce the heat transfer capability of the thermal pads. CAUTION: When removing the processor module, lift the module straight up. Be careful not to bend the pins on the processor module. 21Removing the Processor Module | 39 2 Lift the processor module from the ZIF socket. 1 ZIF socket 2 ZIF-socket cam screw 2 140 | Replacing the Processor Module Replacing the Processor Module WARNING: Before working inside your computer, read the safety information that shipped with your computer. For additional safety best practices information, see the Regulatory Compliance Homepage at www.dell.com/regulatory_compliance. Procedure NOTE: If a new processor module is installed, you will receive a new thermal-cooling assembly, which will include an affixed thermal pad, or you will receive a new thermal pad along with documentation to illustrate proper installation. 1 Align the pin-1 corner of the processor module with the pin-1 corner of the ZIF socket, then place the processor module. NOTE: The pin-1 corner of the processor module has a triangle that aligns with the triangle on the pin-1 corner of the ZIF socket. When the processor module is properly seated, all four corners are aligned at the same height. If one or more corners of the module are higher than the others, the module is not seated properly. CAUTION: To prevent intermittent contact between the ZIF-socket cam screw and the processor module when replacing the processor, press to apply slight pressure to the center of the processor module while turning the cam screw. CAUTION: To avoid damage to the processor module, hold the screwdriver perpendicular to the processor module when turning the cam screw. 2 Tighten the ZIF socket by turning the cam screw clockwise to secure the processor module to the ZIF socket. Postrequsites 1 Replace the processor heat-sink. See "Replacing the Processor Heat-Sink" on page 37. 2 Replace the processor heat-sink fan. See "Replacing the Processor Heat-Sink Fan" on page 31. 3 Replace the compartment door. See "Replacing the Compartment Door" on page 15. 4 Replace the battery pack. See "Replacing the Battery Pack" on page 13. 22Removing the Center Control Cover | 41 Removing the Center Control Cover WARNING: Before working inside your computer, read the safety information that shipped with your computer and follow the steps in "Before You Begin" on page 9. For additional safety best practices information, see the Regulatory Compliance Homepage at dell.com/ regulatory_compliance. Prerequsites 1 Remove the battery pack. See "Removing the Battery Pack" on page 12. 2 Remove the compartment door. See "Removing the Compartment Door" on page 14. Procedure 1 Remove the screws that secure the center control cover to the computer base. CAUTION: Be extremely careful when removing the center control cover. The cover along with the cable that attaches to it are fragile. 2 Turn the computer over and open the display as far as possible. 1 screws (5) 23 142 | Removing the Center Control Cover 3 Gently pry the center control cover from the back of the computer and then ease the tabs on the center control cover out of the slots on the palm rest assembly. CAUTION: Be extremely careful when removing and handling the center control cover. Failure to do so could result in scratching the display panel. 4 Turn the center control cover towards the display. 5 Disconnect the media control keys cable from the connector on the system board. 6 Lift the center control cover away from the computer. 1 center control cover 1Removing the Center Control Cover | 43 1 media control keys cable 144 | Replacing the Center Control Cover Replacing the Center Control Cover WARNING: Before working inside your computer, read the safety information that shipped with your computer and follow the steps in "Before You Begin" on page 9. For additional safety best practices information, see the Regulatory Compliance Homepage at dell.com/ regulatory_compliance. Procedure 1 Connect the media control keys cable to the connector on the system board. 2 Align the tabs on the center control cover with the slots on the palm rest assembly and snap the center control cover into place. 3 Close the display and turn the computer over. 4 Replace the screws that secure the center control cover to the computer base. Postrequsites 1 Replace the compartment door. See "Replacing the Compartment Door" on page 15. 2 Replace the battery pack. See "Replacing the Battery Pack" on page 13. 24Removing the Keyboard | 45 Removing the Keyboard WARNING: Before working inside your computer, read the safety information that shipped with your computer and follow the steps in "Before You Begin" on page 9. For additional safety best practices information, see the Regulatory Compliance Homepage at dell.com/ regulatory_compliance. Prerequsites 1 Remove the battery pack. See "Removing the Battery Pack" on page 12. 2 Remove the compartment door. See "Replacing the Compartment Door" on page 15. 3 Remove the center control cover. See "Removing the Center Control Cover" on page 41. Procedure 1 Remove the screws that secure the keyboard to the computer base. CAUTION: The keycaps on the keyboard are fragile, easily dislodged, and time-consuming to replace. Be careful when removing and handling the keyboard. CAUTION: Be extremely careful when removing and handling the keyboard. Failure to do so could result in scratching the display panel. 2 Carefully lift the keyboard and slide the keyboard tabs out of the slots on the palm rest assembly. 3 Carefully turn the keyboard over and place it on the palm rest assembly. 2546 | Removing the Keyboard 4 Lift the release latches on the connectors on the system board and disconnect the keyboard cable and backlit keyboard cable. 1 screws (5) 2 keyboard 1 2Removing the Keyboard | 47 5 Lift the keyboard off the palm rest assembly. 1 keyboard cable 2 backlit keyboard cable 1 248 | Replacing the Keyboard Replacing the Keyboard WARNING: Before working inside your computer, read the safety information that shipped with your computer and follow the steps in "Before You Begin" on page 9. For additional safety best practices information, see the Regulatory Compliance Homepage at dell.com/ regulatory_compliance. Procedure 1 Slide the keyboard cable and backlit keyboard cable into their connectors on the system board and press down on their connector latches to secure the cables. 2 Slide the tabs on the keyboard into the slots on the palm rest assembly and lower the keyboard into place. 3 Replace the screws that secure the keyboard to the computer base. Postrequsites 1 Replace the center control cover. See "Replacing the Center Control Cover" on page 44. 2 Replace the compartment door. See "Replacing the Compartment Door" on page 15. 3 Replace the battery pack. See "Replacing the Battery Pack" on page 13. 4 Follow the instructions in "After Working Inside Your Computer" on page 11. 26Removing the Mini-Card | 49 Removing the Mini-Card WARNING: Before working inside your computer, read the safety information that shipped with your computer and follow the steps in "Before You Begin" on page 9. For additional safety best practices information, see the Regulatory Compliance Homepage at dell.com/ regulatory_compliance. If you ordered a wireless Mini-Card with your computer, the card is already installed. Your computer supports one half Mini-Card slot for WLAN. NOTE: Depending on the configuration of the computer when it was sold, the Mini-Card slot may or may not have a Mini-Card installed. Prerequsites 1 Remove the battery pack. See "Removing the Battery Pack" on page 12. 2 Remove the compartment door. See "Removing the Compartment Door" on page 14. 3 Remove the center control cover. See "Removing the Center Control Cover" on page 41. 4 Remove the keyboard. See "Removing the Keyboard" on page 45. 2750 | Removing the Mini-Card Procedure 1 Disconnect the antenna cables from the Mini-Card. 2 Remove the screw that secures the Mini-Card to the system board. 3 Lift the Mini-Card out of the connector on the system board. CAUTION: When the Mini-Card is not in the computer, store it in protective antistatic packaging. For more information, see "Protecting Against Electrostatic Discharge" in the safety information that shipped with your computer. 1 screw 2 antenna cables (2) 3 Mini-Card 2 1 3Replacing the Mini-Card | 51 Replacing the Mini-Card WARNING: Before working inside your computer, read the safety information that shipped with your computer and follow the steps in "Before You Begin" on page 9. For additional safety best practices information, see the Regulatory Compliance Homepage at dell.com/ regulatory_compliance. NOTE: Dell or Alienware does not guarantee compatibility or provide support for Mini-Cards from sources other than Dell or Alienware. Your computer supports one half Mini-Card slot for WLAN. NOTE: Depending on the configuration of the computer when it was sold, the Mini-Card slot may or may not have a Mini-Card installed. Procedure 1 Remove the new Mini-Card from its packaging. CAUTION: Use firm and even pressure to slide the card into place. If you use excessive force, you may damage the connector. CAUTION: The connectors are keyed to ensure correct insertion. If you feel resistance, check the connectors on the card and on the system board, and realign the card. 2 Insert the Mini-Card connector at a 45-degree angle into the connector on the system board. 3 Press the other end of the Mini-Card down into the slot on the system board and replace the screw that secures the Mini-Card to the system board. 4 Connect the appropriate antenna cables to the Mini-Card you are installing. The following table provides the antenna cable color scheme for the Mini-Card supported by your computer. Connectors on the Mini-Card Antenna Cable Color Scheme WLAN (2 or 3 antenna cables) Main WLAN (white triangle) Auxiliary WLAN (black triangle) MIMO WLAN (gray triangle) (optional) white black gray 2852 | Replacing the Mini-Card Postrequsites 1 Replace the keyboard. See "Replacing the Keyboard" on page 48. 2 Replace the center control cover. See "Replacing the Center Control Cover" on page 44. 3 Replace the compartment door. See "Replacing the Compartment Door" on page 15. 4 Replace the battery pack. See "Replacing the Battery Pack" on page 13. 5 Follow the instructions in "After Working Inside Your Computer" on page 11. 6 Install the drivers and utilities for your computer, as required. NOTE: If you are installing a Mini-card from a source other than Dell or Alienware, you must install the appropriate drivers and utilities.Removing the WirelessHD Card | 53 Removing the WirelessHD Card WARNING: Before working inside your computer, read the safety information that shipped with your computer and follow the steps in "Before You Begin" on page 9. For additional safety best practices information, see the Regulatory Compliance Homepage at dell.com/ regulatory_compliance. If you ordered a wirelessHD card with your computer, the card is already installed. Prerequsites 1 Remove the battery pack. See "Removing the Battery Pack" on page 12. 2 Remove the compartment door. See "Removing the Compartment Door" on page 14. 3 Remove the center control cover. See "Removing the Center Control Cover" on page 41. 4 Remove the keyboard. See "Removing the Keyboard" on page 45. Procedure 1 Disconnect the wirelessHD card cable from the connector on the wirelessHD card. 2 Remove the screw that secures the wirelessHD card to the system board. 3 Lift the wirelessHD card out of the connector on the system board. 1 wirelessHD card cable 2 wirelessHD card 3 screw 29 1 2 354 | Replacing the WirelessHD Card Replacing the WirelessHD Card WARNING: Before working inside your computer, read the safety information that shipped with your computer and follow the steps in "Before You Begin" on page 9. For additional safety best practices information, see the Regulatory Compliance Homepage at dell.com/ regulatory_compliance. If you ordered a wirelessHD card with your computer, the card is already installed. Procedure 1 Remove the new wirelessHD card from its packaging. CAUTION: Use firm and even pressure to slide the card into place. If you use excessive force, you may damage the connector. CAUTION: The connectors are keyed to ensure correct insertion. If you feel resistance, check the connectors on the card and on the system board, and realign the card. 2 Insert the wirelessHD card connector at a 45-degree angle into the connector on the system board. 3 Press the other end of the wirelessHD card down into the slot on the system board and replace the screw that secures the wirelessHD card to the system board. 4 Connect the wirelessHD card cable to the connector on the wirelessHD card. Postrequsites 1 Replace the keyboard. See "Replacing the Keyboard" on page 48. 2 Replace the center control cover. See "Replacing the Center Control Cover" on page 44. 3 Replace the compartment door. See "Replacing the Compartment Door" on page 15. 4 Replace the battery pack. See "Replacing the Battery Pack" on page 13. 5 Follow the instructions in "After Working Inside Your Computer" on page 11. 30Removing the Power Button Board | 55 Removing the Power Button Board WARNING: Before working inside your computer, read the safety information that shipped with your computer and follow the steps in "Before You Begin" on page 9. For additional safety best practices information, see the Regulatory Compliance Homepage at dell.com/ regulatory_compliance. Prerequsites 1 Remove the battery pack. See "Removing the Battery Pack" on page 12. 2 Remove the compartment door. See "Removing the Compartment Door" on page 14. 3 Remove the center control cover. See "Removing the Center Control Cover" on page 41. 4 Remove the keyboard. See "Removing the Keyboard" on page 45. Procedure 1 Disconnect the power button board cable from the connector on the system board. 2 Remove the screws that secure the power button board to the palm rest assembly. 3 Lift the power button board off the palm rest assembly. 1 screws (2) 2 power button board 3 power button board cable 31 3 1 256 | Replacing the Power Button Board Replacing the Power Button Board WARNING: Before working inside your computer, read the safety information that shipped with your computer and follow the steps in "Before You Begin" on page 9. For additional safety best practices information, see the Regulatory Compliance Homepage at dell.com/ regulatory_compliance. Procedure 1 Align the slots on the power button board with the alignment posts on the chassis and secure the power button board in place. 2 Replace the screws that secure the power button board to the palm rest assembly. 3 Connect the power button board cable to the connector on the system board. Postrequsites 1 Replace the keyboard. See "Replacing the Keyboard" on page 48. 2 Replace the center control cover. See "Removing the Center Control Cover" on page 41. 3 Replace the compartment door. See "Replacing the Compartment Door" on page 15. 4 Replace the battery pack. See "Replacing the Keyboard" on page 48. 5 Follow the instructions in "After Working Inside Your Computer" on page 11. 32Removing the Display Assembly | 57 Removing the Display Assembly WARNING: Before working inside your computer, read the safety information that shipped with your computer and follow the steps in "Before You Begin" on page 9. For additional safety best practices information, see the Regulatory Compliance Homepage at dell.com/ regulatory_compliance. Prerequsites 1 Remove the battery pack. See "Removing the Battery Pack" on page 12. 2 Remove the compartment door. See "Removing the Compartment Door" on page 14. 3 Remove the center control cover. See "Removing the Center Control Cover" on page 41. 4 Remove the keyboard. See "Removing the Keyboard" on page 45. 5 Disconnect the antenna cables from the Mini-Card. See "Removing the Mini-Card" on page 49. 6 Disconnect the wirelessHD card cable from the connector on the wirelessHD card. See "Removing the WirelessHD Card" on page 53. Procedure 1 Loosen the captive screws that secure the display cable to the system board. 2 Using the pull-tab, pull the display cable to disconnect the display cable from the connector on the system board. 3 Disconnect the camera cable and infrared cable from the respective system board connectors. 4 Note the routing of the display cable, camera cable, infrared cable, wirelessHD card cable, Mini-Card antenna cables and remove the cables from the routing guides on the palm rest assembly. 3358 | Removing the Display Assembly 5 Remove the screws that secure the display assembly to the computer base. 6 Lift the display assembly off the computer. 1 wirelessHD card cable 2 display cable 3 captive screws (2) 4 camera cable 5 infrared cable 2 3 1 4 5Removing the Display Assembly | 59 1 display assembly 2 screws (6) 1 260 | Replacing the Display Assembly Replacing the Display Assembly WARNING: Before working inside your computer, read the safety information that shipped with your computer and follow the steps in "Before You Begin" on page 9. For additional safety best practices information, see the Regulatory Compliance Homepage at dell.com/ regulatory_compliance. Procedure 1 Place the display assembly in position and replace the screws that secure the display assembly to the computer base. 2 Route the display cable, camera cable, infrared cable, wirelessHD card cable, and Mini-Card antenna cables through the routing guides on the palm rest assembly. 3 Connect the display cable to the connector on the system board. 4 Tighten the captive screws that secure the display cable to the system board. 5 Connect the camera cable and infrared cable to the respective system board connectors. Postrequsites 1 Connect the wirelessHD card cable to the connector on the wirelessHD card. See "Replacing the WirelessHD Card" on page 54. 2 Connect the Mini-Card antenna cables to the Mini-Card. See "Replacing the Mini-Card" on page 51. 3 Replace the keyboard. See "Replacing the Keyboard" on page 48. 4 Replace the center control cover. See "Replacing the Center Control Cover" on page 44. 5 Replace the compartment door. See "Replacing the Compartment Door" on page 15. 6 Replace the battery pack. See "Replacing the Battery Pack" on page 13. 7 Follow the instructions in "After Working Inside Your Computer" on page 11. 34Removing the Status Light Board | 61 Removing the Status Light Board WARNING: Before working inside your computer, read the safety information that shipped with your computer and follow the steps in "Before You Begin" on page 9. For additional safety best practices information, see the Regulatory Compliance Homepage at dell.com/ regulatory_compliance. Prerequsites 1 Remove the battery pack. See "Removing the Battery Pack" on page 12. 2 Remove the compartment door. See "Removing the Compartment Door" on page 14. 3 Remove the center control cover. See "Removing the Center Control Cover" on page 41. 4 Remove the keyboard. See "Removing the Keyboard" on page 45. 5 Remove the display assembly. See "Removing the Display Assembly" on page 57. Procedure 1 Disconnect the status light board cable from the connector on the system board. 2 Note the routing of status light board cable and remove the cable from the routing guides. 3 Remove the screws that secure the status light board to the palm rest assembly. 4 Lift the status light board off the palm rest assembly. 3562 | Removing the Status Light Board 1 screws (2) 2 status light board 3 status light board cable 1 2 3Replacing the Status Light Board | 63 Replacing the Status Light Board WARNING: Before working inside your computer, read the safety information that shipped with your computer and follow the steps in "Before You Begin" on page 9. For additional safety best practices information, see the Regulatory Compliance Homepage at dell.com/ regulatory_compliance. Procedure 1 Align the slots on the status light board with the alignment posts on the palm rest assembly and secure the status light board in place. 2 Replace the screws that secure the status light board to the palm rest assembly. 3 Route the status light board cable through the routing guides on the palm rest assembly. 4 Connect the status light board cable to the connector on the system board. Postrequsites 1 Replace the display assembly. See "Replacing the Display Assembly" on page 60. 2 Replace the keyboard. See "Replacing the Keyboard" on page 48. 3 Replace the center control cover. See "Replacing the Center Control Cover" on page 44. 4 Replace the compartment door. See "Replacing the Compartment Door" on page 15. 5 Replace the battery pack. See "Replacing the Battery Pack" on page 13. 6 Follow the instructions in "After Working Inside Your Computer" on page 11. 3664 | Removing the Palm Rest Assembly Removing the Palm Rest Assembly WARNING: Before working inside your computer, read the safety information that shipped with your computer and follow the steps in "Before You Begin" on page 9. For additional safety best practices information, see the Regulatory Compliance Homepage at dell.com/ regulatory_compliance. Prerequsites 1 Remove any installed card or blank from the 9-in-1 Media Card Reader. 2 Remove the battery pack. See "Removing the Battery Pack" on page 12. 3 Remove the compartment door. See "Removing the Compartment Door" on page 14. 4 Remove the screws that secure the palm rest assembly to the computer base. 5 Remove the center control cover. See "Removing the Center Control Cover" on page 41. 6 Remove the keyboard. See "Removing the Keyboard" on page 45. 1 screws (5) 37 1Removing the Palm Rest Assembly | 65 7 Remove the power button board. See "Removing the Power Button Board" on page 55. 8 Remove the display assembly. See "Removing the Display Assembly" on page 57. 9 Remove the status light board. See "Removing the Status Light Board" on page 61. Procedure 1 Disconnect the touch pad cable, LVDS cable, and Media Card Reader cable from the connectors on the system board. 2 Remove the screws that secure the palm rest assembly to the computer base. 3 Carefully pry out the palm rest assembly along the rear edge and then ease the palm rest assembly from the computer base. CAUTION: Carefully separate the palm rest assembly from the computer base to avoid damage to the palm rest assembly. 4 Lift the palm rest assembly off the computer base. 1 palm rest assembly 2 LVDS cable 3 touch pad cable 4 Media Card Reader cable 5 screws (3) 2 3 4 5 166 | Replacing the Palm Rest Assembly Replacing the Palm Rest Assembly WARNING: Before working inside your computer, read the safety information that shipped with your computer and follow the steps in "Before You Begin" on page 9. For additional safety best practices information, see the Regulatory Compliance Homepage at dell.com/ regulatory_compliance. Procedure 1 Align the screw holes on the palm rest assembly with the screw holes on the computer base. 2 Replace the screws that secure the palm rest assembly to the computer base. 3 Connect the touch pad cable, LVDS cable, and Media Card Reader cable to the connectors on the system board. Postrequsites 1 Replace the status light board. See "Replacing the Status Light Board" on page 63. 2 Replace the display assembly. See "Replacing the Display Assembly" on page 60. 3 Replace the power button board. See "Replacing the Power Button Board" on page 56. 4 Replace the keyboard. See "Replacing the Keyboard" on page 48. 5 Replace the center control cover. See "Replacing the Center Control Cover" on page 44. 6 Turn the computer over and replace the screws that secure the palm rest assembly to the computer base. 7 Replace the compartment door. See "Replacing the Compartment Door" on page 15. 8 Replace the battery pack. See "Replacing the Battery Pack" on page 13. 9 Replace any cards or blank that you removed from the 9-in-1 Media Card Reader. 10 Follow the instructions in "After Working Inside Your Computer" on page 11. 38Removing the Bluetooth Card | 67 Removing the Bluetooth Card WARNING: Before working inside your computer, read the safety information that shipped with your computer and follow the steps in "Before You Begin" on page 9. For additional safety best practices information, see the Regulatory Compliance Homepage at dell.com/ regulatory_compliance. If you ordered a card with Bluetooth wireless technology with your computer, it is already installed. Prerequsites 1 Remove the battery pack. See "Removing the Battery Pack" on page 12. 2 Remove the compartment door. See "Removing the Compartment Door" on page 14. 3 Remove the center control cover. See "Removing the Center Control Cover" on page 41. 4 Remove the keyboard. See "Removing the Keyboard" on page 45. 5 Remove the power button board. See "Removing the Power Button Board" on page 55. 6 Remove the display assembly. See "Removing the Display Assembly" on page 57. 7 Remove the status light board. See "Removing the Status Light Board" on page 61. 8 Remove the palm rest assembly. See "Removing the Palm Rest Assembly" on page 64. Procedure 1 Disconnect the Bluetooth-card cable from the connector on the system board. 2 Remove the screw that secures the Bluetooth card to the system board. 3 Lift the Bluetooth card away from the system board. 3968 | Removing the Bluetooth Card 1 Bluetooth-card cable 2 Bluetooth card 3 screw 1 3 2Replacing the Bluetooth Card | 69 Replacing the Bluetooth Card WARNING: Before working inside your computer, read the safety information that shipped with your computer and follow the steps in "Before You Begin" on page 9. For additional safety best practices information, see the Regulatory Compliance Homepage at dell.com/ regulatory_compliance. Procedure 1 Align the screw hole on the Bluetooth card with the screw hole on the system board. 2 Replace the screw that secures the Bluetooth card to the system board. 3 Connect the Bluetooth-card cable to the connector on the system board. Postrequsites 1 Replace the palm rest assembly. See "Replacing the Palm Rest Assembly" on page 66. 2 Replace the status light board. See "Replacing the Status Light Board" on page 63. 3 Replace the display assembly. See "Replacing the Display Assembly" on page 60. 4 Replace the power button board. See "Replacing the Power Button Board" on page 56. 5 Replace the keyboard. See "Replacing the Keyboard" on page 48. 6 Replace the center control cover. See "Replacing the Center Control Cover" on page 44. 7 Replace the compartment door. See "Replacing the Compartment Door" on page 15. 8 Replace the battery pack. See "Replacing the Battery Pack" on page 13. 9 Follow the instructions in "After Working Inside Your Computer" on page 11. 4070 | Removing the Speakers Removing the Speakers WARNING: Before working inside your computer, read the safety information that shipped with your computer and follow the steps in "Before You Begin" on page 9. For additional safety best practices information, see the Regulatory Compliance Homepage at dell.com/ regulatory_compliance. Prerequsites 1 Remove the battery pack. See "Removing the Battery Pack" on page 12. 2 Remove the compartment door. See "Removing the Compartment Door" on page 14. 3 Remove the center control cover. See "Removing the Center Control Cover" on page 41. 4 Remove the keyboard. See "Removing the Keyboard" on page 45. 5 Remove the power button board. See "Removing the Power Button Board" on page 55. 6 Remove the display assembly. See "Removing the Display Assembly" on page 57. 7 Remove the status light board. See "Removing the Status Light Board" on page 61. 8 Remove the palm rest assembly. See "Removing the Palm Rest Assembly" on page 64. Procedure 1 Disconnect the speakers cable from the connector on the system board. 2 Note the speakers cable routing and remove the cable from the routing guides on the computer base. 3 Remove the screws that secure the speakers to the computer base. 4 Lift the speakers along with the cable off the computer base. 41Removing the Speakers | 71 1 speakers (2) 2 screws (4) 3 speakers cable 1 2 372 | Replacing the Speakers Replacing the Speakers WARNING: Before working inside your computer, read the safety information that shipped with your computer and follow the steps in "Before You Begin" on page 9. For additional safety best practices information, see the Regulatory Compliance Homepage at dell.com/ regulatory_compliance. Procedure 1 Align the screw holes on the speakers with the screw holes on the computer base. 2 Replace the screws that secure the speakers to the computer base. 3 Route the speakers cable through the routing guides on the computer base. 4 Connect the speakers cable to the connector on the system board. Postrequsites 1 Replace the palm rest assembly. See "Replacing the Palm Rest Assembly" on page 66. 2 Replace the status light board. See "Replacing the Status Light Board" on page 63. 3 Replace the display assembly. See "Replacing the Display Assembly" on page 60. 4 Replace the power button board. See "Replacing the Power Button Board" on page 56. 5 Replace the keyboard. See "Replacing the Keyboard" on page 48. 6 Replace the center control cover. See "Replacing the Center Control Cover" on page 44. 7 Replace the compartment door. See "Replacing the Compartment Door" on page 15. 8 Replace the battery pack. See "Replacing the Battery Pack" on page 13. 9 Follow the instructions in "After Working Inside Your Computer" on page 11. 42Removing the Optical Drive | 73 Removing the Optical Drive WARNING: Before working inside your computer, read the safety information that shipped with your computer and follow the steps in "Before You Begin" on page 9. For additional safety best practices information, see the Regulatory Compliance Homepage at dell.com/ regulatory_compliance. Prerequsites 1 Remove the battery pack. See "Removing the Battery Pack" on page 12. 2 Remove the compartment door. See "Removing the Compartment Door" on page 14. 3 Remove the center control cover. See "Removing the Center Control Cover" on page 41. 4 Remove the keyboard. See "Removing the Keyboard" on page 45. 5 Remove the power button board. See "Removing the Power Button Board" on page 55. 6 Remove the display assembly. See "Removing the Display Assembly" on page 57. 7 Remove the status light board. See "Removing the Status Light Board" on page 61. 8 Remove the palm rest assembly. See "Removing the Palm Rest Assembly" on page 64. 9 Remove the speakers. See "Removing the Speakers" on page 70. Procedure 1 Lift the release latch on the connector on the system board and disconnect the optical-drive cable from the connector on the system board. 2 Remove the screws that secure the optical-drive assembly to the computer base. 3 Lift the optical-drive assembly off the computer base. 4374 | Removing the Optical Drive 4 Remove the screws that secure the optical-drive bracket to the optical drive. 1 optical-drive cable 2 screws (2) 3 optical drive 1 optical drive 2 optical-drive bracket 3 screws (5) 1 3 2 1 2 3Removing the Optical Drive | 75 5 Disconnect the interposer from the optical drive. 1 interposer 176 | Replacing the Optical Drive Replacing the Optical Drive WARNING: Before working inside your computer, read the safety information that shipped with your computer and follow the steps in "Before You Begin" on page 9. For additional safety best practices information, see the Regulatory Compliance Homepage at dell.com/ regulatory_compliance. Procedure 1 Connect the interposer to the optical drive. 2 Align the screw holes on the optical-drive bracket with the screw holes on the optical drive and replace the screws that secure the optical-drive bracket to the optical drive. 3 Align the slot on the optical-drive bracket with the alignment posts on computer chassis and secure the optical-drive assembly in place. 4 Replace the screws that secure the optical-drive assembly to the computer base. 5 Slide the optical drive cable into the connector on the system board and press down on the connector latch to secure the cable. Postrequsites 1 Replace the speakers. See "Replacing the Speakers" on page 72. 2 Replace the palm rest assembly. See "Replacing the Palm Rest Assembly" on page 66. 3 Replace the status light board. See "Replacing the Status Light Board" on page 63. 4 Replace the display assembly. See "Replacing the Display Assembly" on page 60. 5 Replace the power button board. See "Replacing the Power Button Board" on page 56. 6 Replace the keyboard. See "Replacing the Keyboard" on page 48. 7 Replace the center control cover. See "Replacing the Center Control Cover" on page 44. 8 Replace the compartment door. See "Replacing the Compartment Door" on page 15. 9 Replace the battery pack. See "Replacing the Battery Pack" on page 13. 10 Follow the instructions in "After Working Inside Your Computer" on page 11. 44Removing the System Board | 77 Removing the System Board WARNING: Before working inside your computer, read the safety information that shipped with your computer and follow the steps in "Before You Begin" on page 9. For additional safety best practices information, see the Regulatory Compliance Homepage at dell.com/ regulatory_compliance. CAUTION: Handle components by their edges, and avoid touching pins and contacts. The system board’s BIOS chip contains the Service Tag, which is also visible on a barcode label at the bottom of the computer. Prerequsites 1 Remove any installed card or blank from the 9-in-1 Media Card Reader. 2 Remove the battery pack. See "Removing the Battery Pack" on page 12. 3 Remove the compartment door. See "Removing the Compartment Door" on page 14. 4 Remove the hard drive(s). See "Removing the Hard Drive(s)" on page 18. 5 Remove the coin-cell battery. See "Removing the Coin-Cell Battery" on page 16. 6 Remove the memory module(s). See "Removing the Memory Module(s)" on page 22. 7 Remove the graphics-card heat sink fan. See "Removing the Graphics-Card Heat Sink Fan" on page 26. 8 Remove the graphics-card assembly. See "Removing the Graphics-Card Assembly" on page 32. 9 Remove the processor heat-sink fan. See "Removing the Processor Heat-Sink Fan" on page 29. 10 Remove the processor heat-sink. See "Removing the Processor Heat-Sink" on page 35. 11 Remove the processor module. See "Removing the Processor Module" on page 38. 12 Remove the center control cover. See "Removing the Center Control Cover" on page 41. 13 Remove the keyboard. See "Removing the Keyboard" on page 45. 14 Remove the Mini-Card. See "Removing the Mini-Card" on page 49. 15 Remove the power button board. See "Removing the Power Button Board" on page 55. 16 Remove the display assembly. See "Removing the Display Assembly" on page 57. 17 Remove the wirelessHD card. See "Removing the WirelessHD Card" on page 53. 18 Remove the status light board. See "Removing the Status Light Board" on page 61. 4578 | Removing the System Board 19 Remove the palm rest assembly. See "Removing the Palm Rest Assembly" on page 64. 20 Remove the Bluetooth card. See "Removing the Bluetooth Card" on page 67. 21 Remove the speakers. See "Removing the Speakers" on page 70. 22 Follow the instructions from step 1 to step 3 in "Removing the Optical Drive" on page 73. Procedure 1 Remove the screws that secure the system board to the computer base. 2 Carefully ease the connectors on the system board out of the slots in the computer, and lift the system board off the computer base. 1 screws (6) 2 system board 1 2Replacing the System Board | 79 Replacing the System Board WARNING: Before working inside your computer, read the safety information that shipped with your computer and follow the steps in "Before You Begin" on page 9. For additional safety best practices information, see the Regulatory Compliance Homepage at dell.com/ regulatory_compliance. CAUTION: Handle components by their edges, and avoid touching pins and contacts. Procedure 1 Align the connectors on the system board with the slots on the computer base and place it on the computer base. 2 Replace the screws that secure the system board to the computer base. Postrequsites 1 Follow the instructions from step 3 to step 5 in "Replacing the Optical Drive" on page 76. 2 Replace the speakers. See "Replacing the Speakers" on page 72. 3 Replace the Bluetooth card. See "Replacing the Bluetooth Card" on page 69. 4 Replace the palm rest assembly. See "Replacing the Palm Rest Assembly" on page 66. 5 Replace the status light board. See "Replacing the Status Light Board" on page 63. 6 Replace the wirelessHD card. See "Replacing the WirelessHD Card" on page 54. 7 Replace the display assembly. See "Replacing the Display Assembly" on page 60. 8 Replace the power button board. See "Replacing the Power Button Board" on page 56. 9 Replace the Mini-Card. See "Replacing the Mini-Card" on page 51. 10 Replace the memory module(s). See "Replacing the Memory Module(s)" on page 24. 11 Replace the keyboard. See "Replacing the Keyboard" on page 48. 12 Replace the center control cover. See "Replacing the Center Control Cover" on page 44. 13 Replace the processor module. See "Replacing the Processor Module" on page 40. 14 Replace the processor heat-sink. See "Replacing the Processor Heat-Sink" on page 37. 15 Replace the processor heat-sink fan. See "Replacing the Processor Heat-Sink Fan" on page 31. 16 Replace the graphics-card assembly. See "Replacing the Graphics-Card Assembly" on page 34. 4680 | Replacing the System Board 17 Replace the graphics-card heat sink fan. See "Replacing the Graphics-Card Heat Sink Fan" on page 28. 18 Replace the coin-cell battery. See "Replacing the Coin-Cell Battery" on page 17. 19 Replace the hard drive(s). See "Replacing the Hard Drive(s)" on page 21. 20 Replace the compartment door. See "Replacing the Compartment Door" on page 15. 21 Replace the battery pack. See "Replacing the Battery Pack" on page 13. 22 Replace any cards or blank that you removed from the 9-in-1 Media Card Reader. 23 Follow the instructions in "After Working Inside Your Computer" on page 11. 24 Turn on the computer. NOTE: After you have replaced the system board, enter the computer Service Tag into the BIOS of the replacement system board. 25 Enter the service tag. See "Entering the Service Tag in the BIOS" on page 80. Entering the Service Tag in the BIOS 1 Ensure that the AC adapter is plugged in and that the main battery is installed properly. 2 Turn on the computer. 3 Press during POST to enter the system setup program. 4 Navigate to the security tab and enter the service tag in the Set Service Tag field.System Setup | 81 System Setup Configuring the System Setup The System Setup options allow you to: • Change the system configuration information after you add, change or remove any hardware in your laptop. • Set or change a user-selectable option. • View the installed amount of memory or set the type of hard drive installed. Before you use System Setup, it is recommended that you write down the current System Setup information for future reference. CAUTION: Do not change the settings in System Setup unless you are an expert computer user. Certain changes can cause your computer to work incorrectly. Entering System Setup 1 Turn on (or restart) your laptop. NOTE: Keyboard failure may result when a key on the keyboard is held down for extended periods of time. To avoid possible keyboard failure, press and release in even intervals until the System Setup screen appears. 2 While the laptop is booting, press immediately before the operating system logo appears to access the BIOS Setup Utility. If an error occurs during POST (Power On Self Test), you may also enter the BIOS Setup Utility by pressing when prompted. NOTE: If you wait too long and the operating system logo appears, continue to wait until you see the Microsoft Windows desktop, then shut down your laptop and try again. System Setup Screens The BIOS Setup Utility window displays current or changeable configuration information for your laptop. Information is divided into five menus: Main, Advanced, Security, Boot, and Exit. Key functions appear at the bottom of the BIOS Setup Utility window and lists keys and their functions within the active field. 4782 | System Setup System Setup Options NOTE: Depending on your computer and installed devices, the items listed in this section may not appear, or may not appear exactly as listed. Main Menu System Time (hh:mm:ss) Displays the system time. System Date (mm/dd/yyyy) Displays the system date. Alienware Displays the model number of your computer. Service Tag Displays the Service Tag of your computer. BIOS Version Displays the BIOS version. EC Version Displays the EC firmware version. ME version Displays the Intel ME firmware version. CPU Displays the type of processor installed. CPU Frequency Displays the speed of the processor. CPU L3 Cache Displays the processor cache size. CPUID Displays the ID of the processor. Integrated Graphics Displays the integrated graphics. Discrete Graphics Displays the discrete graphics. Total Memory Displays the total memory available in your computer. Memory Bank 0 Displays the memory size installed in DIMM 0. Memory Bank 1 Displays the memory size installed in DIMM 1. Memory Bank 2 Displays the memory size installed in DIMM 2. Memory Bank 3 Displays the memory size installed in DIMM 3. Advanced MenuSystem Setup | 83 Intel SpeedStep Allows you to enable or disable the Intel SpeedStep technology. Disabling this feature may improve performance, but will greatly reduce battery life. Virtualization Allows you to enable or disable the Intel Virtualization technology. USB Emulation Allows you to enable or disable the USB emulation feature. This feature defines how the BIOS, in the absence of a USB-aware operating system, handles USB devices. USB emulation is always enabled during POST. NOTE: You cannot boot any type of USB device (floppy, hard drive, or memory key) when this option is off. USB Wake Support Allows you to enable USB devices to wake the computer from standby or to disable the USB wake support feature. NOTE: If USB Powershare is enabled, a device connected to the USB Powershare connector may not wake the computer. USB Power Share Allows you to charge USB devices when the computer is turned off or in standby mode. • AC Only: Charge USB devices when connected to AC adapter only. • AC and Battery: Charge USB devices when connected to AC adapter and when the computer is running on battery. • Disabled: Disables USB PowerShare. Integrated Network Allows you to enable or disable the onboard LAN controller. • Disabled: Internal LAN is disabled and is not visible to the operating system. • Enabled: Internal LAN is enabled.84 | System Setup High Definition Audio Allows you to enable or disable the internal high definition audio device. • Disabled: The internal audio device is disabled and is not visible to the operating system. • Enabled: The internal audio device is enabled. SD Card Reader Allows you to enable or disable the internal SD card reader. CPU Turbo Mode Allows you to enable or disable the Intel CPU turbo mode performance option. Performance Options Allows you to configure fields in the Performance Options sub-menu. For more information, see "Advanced Menu—Performance Options" on page 85. SATA Operation Allows you to configure the operating mode of the integrated SATA hard drive controller. • AHCI: SATA is configured for AHCI mode. • RAID: SATA is configured for RAID mode. SATA HARD DRIVE 1 Displays the installed primary SATA hard drive model. SATA HARD DRIVE 2 Displays the installed secondary SATA hard drive model. Adapter Warnings • Allows you to choose if the computer should display warning messages when you use AC adapters that are not supported by your computer. • Enabled: BIOS will detect unsupported AC adapters and display an error on the screen. Charger Behavior Allows you to enable or disable battery charging.System Setup | 85 Advanced Menu—Performance Options Overclocking Feature Allows you to enable or disable the global overclocking feature. • Disabled: The overclocking feature is disabled. • Enabled: Displays additional overclocking options. Override Turbo settings Allows you to override CPU turbo mode settings. Long Duration PWR Limit Allows you to set the turbo mode power limit 1 value in watts. Long Duration Time Window Allows you to set the turbo mode time 1 value in seconds. Set Short Duration PWR Limit Allows you to enable or disable short duration power limit. Set Duration Limit Allows you to set the turbo mode power limit 2 values in watts. Bus Clock Current Frequency Displays the current bus clock frequency. New Frequency in 10KHz increments Allows you to set the bus clock frequency in increments of 10KHz. Apply New Bus Clock Frequency Applies the new bus clock frequency immediately, temporarily, or permanently. Memory Overclocking Memory Override Support Allows you to enable or disable the memory override option support. • Disabled: The memory override support is disabled. • Enabled: Displays additional memory override support options. Memory Voltage Allows you to increase memory voltage. Memory Frequency Allows you to set memory frequency. DIMM Profile (XMP) Allows you to configure different XMP options.86 | System Setup Wireless Menu Bluetooth Allows you to enable or disable the internal Bluetooth device. • Disabled: The internal Bluetooth device is disabled and is not visible to the operating system. • Enabled: The internal Bluetooth device is enabled. Wireless Network Allows you to enable or disable the internal wireless device. • Disabled: The internal wireless device is disabled and is not visible to the operating system. • Enabled: The internal wireless device is enabled. DMC Allows you to enable or disable the internal DMC device. Wireless Switch/Hotkey Allows you to disable all internal wireless devices. Security Menu Supervisor Password Displays if the supervisor password is clear or set. User Password Displays if the user password is clear or set. Set Service Tag Displays the Service Tag of the computer when the Service Tag is present. Displays a field to input the Service Tag manually when the Service Tag is absent. Set Supervisor Password Allows you to set the supervisor password. The supervisor password controls access to the system setup utility. Set User Password Allows you to set the user password. The user password controls access to the computer at boot. Computrace Allows you to enable or disable Computrace security feature.System Setup | 87 Boot Menu Use the up- or down- arrow keys to change the boot device priority. You can choose from: • Hard Drive • USB Storage • CD/DVD/BD • Removal Devices • Network Exit Menu Exit Saving Changes Allows you to exit System Setup and save your changes to CMOS. Save Change Without Exit Allows you to remain in System Setup and save your changes to CMOS. Exit Discarding Changes Allows you to exit System Setup and load previous values from CMOS for all Setup items. Load Optimal Defaults Allows you to load default values for all Setup items. Discard Changes Allows you to load previous values from CMOS for all Setup items.88 | Flashing the BIOS Flashing the BIOS The BIOS may require flashing when an update is available or when replacing the system board. To flash the BIOS: 1 Turn on the computer. 2 Go to support.dell.com/support/downloads. 3 Locate the BIOS update file for your computer: NOTE: The Service Tag for your computer is located on a label at the back of your computer. For more information, see the Quick Start Guide that shipped with your computer. If you have your computer’s Service Tag or Express Service Code: a Enter your computer’s Service Tag or Express Service Code in the Service Tag or Express Service Code field. b Click Submit and proceed to step 4. If you do not have your computer’s Service Tag or Express Service Code: a Select one of the following options: • Automatically detect my Service Tag for me • Choose from My Products and Services List • Choose from a list of all Dell products b Click Continue and follow the instructions on the screen. 4 A list of results appears on the screen. Click BIOS. 5 Click Download File to download the latest BIOS file. 6 In the Please select your download method below window, click For Single File Download via Browser, and then click Download Now. 7 In the Save As window, select an appropriate location to download the file on your computer. 8 If the Download Complete window appears, click Close. 9 Navigate to the folder where you downloaded the BIOS update file. The file icon appears in the folder and is titled the same as the downloaded BIOS update file. 10 Double-click the BIOS update file icon and follow the instructions that appear on the screen. 48 Dell XPS 13 Owner’s Manual Computer model: L321x Regulatory model: P29G Regulatory type: P29G001 OM_Book.book Page 1 Tuesday, February 28, 2012 10:16 AMNotes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION: A CAUTION indicates potential damage to hardware or loss of data if instructions are not followed. WARNING: A WARNING indicates a potential for property damage, personal injury, or death. ____________________ Information in this document is subject to change without notice. © 2012 Dell Inc. All rights reserved. Reproduction of these materials in any manner whatsoever without the written permission of Dell Inc. is strictly forbidden. Trademarks used in this text: Dell™, the DELL logo, and XPS™ are trademarks of Dell Inc.; Microsoft ® , Windows ® and the Windows start button logo are either trademarks or registered trademarks of Microsoft corporation in the United States and/or other countries; Bluetooth ® is a registered trademark owned by Bluetooth SIG, Inc. and is used by Dell under license. Other trademarks and trade names may be used in this document to refer to either the entities claiming the marks and names or their products. Dell Inc. disclaims any proprietary interest in trademarks and trade names other than its own. Regulatory model: P29G Regulatory type: P29G001 2012 - 01 Rev. A00 OM_Book.book Page 2 Tuesday, February 28, 2012 10:16 AMContents 3 Contents 1 Before You Begin . . . . . . . . . . . . . . . . . . . . 9 Turn Off Your Computer and Connected Devices . . . . . 9 Safety Instructions . . . . . . . . . . . . . . . . . . . . 10 Recommended Tools. . . . . . . . . . . . . . . . . . . 10 2 After Working Inside Your Computer. . . . 11 3 Base Cover . . . . . . . . . . . . . . . . . . . . . . . 13 Removing the Base Cover . . . . . . . . . . . . . . . . 13 Replacing the Base Cover . . . . . . . . . . . . . . . . 14 4 Power-Light Board . . . . . . . . . . . . . . . . . 15 Prerequisites. . . . . . . . . . . . . . . . . . . . . . . 15 Removing the Power-Light Board . . . . . . . . . . . . 15 Replacing the Power-Light Board . . . . . . . . . . . . 16 Postrequisites . . . . . . . . . . . . . . . . . . . . . . 16 5 Battery . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 Prerequisites. . . . . . . . . . . . . . . . . . . . . . . 17 OM_Book.book Page 3 Tuesday, February 28, 2012 10:16 AM4 Contents Removing the Battery . . . . . . . . . . . . . . . . . . 17 Replacing the Battery . . . . . . . . . . . . . . . . . . 18 Postrequisites . . . . . . . . . . . . . . . . . . . . . . 18 6 Speakers . . . . . . . . . . . . . . . . . . . . . . . . 19 Prerequisites . . . . . . . . . . . . . . . . . . . . . . . 19 Removing the Speakers . . . . . . . . . . . . . . . . . 19 Replacing the Speakers . . . . . . . . . . . . . . . . . 22 Postrequisites . . . . . . . . . . . . . . . . . . . . . . 22 7 Wireless Mini-Card . . . . . . . . . . . . . . . . 23 Prerequisites . . . . . . . . . . . . . . . . . . . . . . . 23 Removing the Mini-Card . . . . . . . . . . . . . . . . . 24 Replacing the Mini-Card. . . . . . . . . . . . . . . . . 25 Postrequisites . . . . . . . . . . . . . . . . . . . . . . 26 8 Solid-State Drive . . . . . . . . . . . . . . . . . . 27 Prerequisites . . . . . . . . . . . . . . . . . . . . . . . 27 Removing the Solid-State Drive . . . . . . . . . . . . . 27 Replacing the Solid-State Drive . . . . . . . . . . . . . 28 Postrequisites . . . . . . . . . . . . . . . . . . . . . . 28 OM_Book.book Page 4 Tuesday, February 28, 2012 10:16 AMContents 5 9 Heat Sink . . . . . . . . . . . . . . . . . . . . . . . . . 29 Prerequisites. . . . . . . . . . . . . . . . . . . . . . . 29 Removing the Heat Sink . . . . . . . . . . . . . . . . . 29 Replacing the Heat Sink . . . . . . . . . . . . . . . . . 30 Postrequisites . . . . . . . . . . . . . . . . . . . . . . 30 10 Fan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 Prerequisites. . . . . . . . . . . . . . . . . . . . . . . 31 Removing the Fan . . . . . . . . . . . . . . . . . . . . 31 Replacing the Fan . . . . . . . . . . . . . . . . . . . . 33 Postrequisites . . . . . . . . . . . . . . . . . . . . . . 33 11 Power-Adapter Connector . . . . . . . . . . . 35 Prerequisites. . . . . . . . . . . . . . . . . . . . . . . 35 Removing the Power-Adapter Connector . . . . . . . . 35 Replacing the Power-Adapter Connector. . . . . . . . 37 Postrequisites . . . . . . . . . . . . . . . . . . . . . . 38 12 I/O Board . . . . . . . . . . . . . . . . . . . . . . . . . 39 Prerequisites. . . . . . . . . . . . . . . . . . . . . . . 39 Removing the I/O Board . . . . . . . . . . . . . . . . . 40 Replacing the I/O Board . . . . . . . . . . . . . . . . . 40 OM_Book.book Page 5 Tuesday, February 28, 2012 10:16 AM6 Contents Postrequisites . . . . . . . . . . . . . . . . . . . . . . 41 13 System Board . . . . . . . . . . . . . . . . . . . . . 43 Prerequisites . . . . . . . . . . . . . . . . . . . . . . . 43 Removing the System Board . . . . . . . . . . . . . . . 44 Replacing the System Board. . . . . . . . . . . . . . . 46 Postrequisites . . . . . . . . . . . . . . . . . . . . . . 47 Entering the Service Tag in BIOS . . . . . . . . . . . . 47 14 Coin-Cell Battery . . . . . . . . . . . . . . . . . . 49 Prerequisites . . . . . . . . . . . . . . . . . . . . . . . 49 Removing the Coin-Cell Battery . . . . . . . . . . . . . 50 Replacing the Coin-Cell Battery . . . . . . . . . . . . . 50 Postrequisites . . . . . . . . . . . . . . . . . . . . . . 51 15 Display Assembly . . . . . . . . . . . . . . . . . . 53 Prerequisites . . . . . . . . . . . . . . . . . . . . . . . 53 Removing the Display Assembly. . . . . . . . . . . . . 53 Replacing the Display Assembly . . . . . . . . . . . . 56 Postrequisites . . . . . . . . . . . . . . . . . . . . . . 57 OM_Book.book Page 6 Tuesday, February 28, 2012 10:16 AMContents 7 16 Keyboard . . . . . . . . . . . . . . . . . . . . . . . . . 59 Prerequisites. . . . . . . . . . . . . . . . . . . . . . . 59 Removing the Keyboard . . . . . . . . . . . . . . . . . 60 Replacing the Keyboard . . . . . . . . . . . . . . . . . 61 Postrequisites . . . . . . . . . . . . . . . . . . . . . . 61 17 Palm-Rest Assembly . . . . . . . . . . . . . . . . 63 Prerequisites. . . . . . . . . . . . . . . . . . . . . . . 63 Removing the Palm-Rest Assembly . . . . . . . . . . . 64 Replacing the Palm-Rest Assembly . . . . . . . . . . . 64 Postrequisites . . . . . . . . . . . . . . . . . . . . . . 65 18 System Setup . . . . . . . . . . . . . . . . . . . . . . 67 Overview. . . . . . . . . . . . . . . . . . . . . . . . . 67 Entering System Setup . . . . . . . . . . . . . . . . . . 67 19 Flashing the BIOS . . . . . . . . . . . . . . . . . . 73 OM_Book.book Page 7 Tuesday, February 28, 2012 10:16 AM8 Contents OM_Book.book Page 8 Tuesday, February 28, 2012 10:16 AMBefore You Begin 9 Before You Begin Turn Off Your Computer and Connected Devices CAUTION: To avoid losing data, save and close all open files and exit all open programs before you turn off your computer. 1 Save and close all open files and exit all open programs. 2 Click Start and click Shut Down. Microsoft Windows shuts down and then the computer turns off. NOTE: If you are using a different operating system, see the documentation of your operating system for shut-down instructions. 3 Disconnect your computer and all attached devices from their electrical outlets. 4 Disconnect all telephone cables, network cables, and attached devices from your computer. 5 After the computer is unplugged, press and hold the power button for about 5 seconds to ground the system board. OM_Book.book Page 9 Tuesday, February 28, 2012 10:16 AM10 Before You Begin Safety Instructions Use the following safety guidelines to protect your computer from potential damage and ensure your personal safety. WARNING: Before working inside your computer, read the safety information that shipped with your computer. For additional safety best practices information, see the Regulatory Compliance Homepage at dell.com/regulatory_compliance. CAUTION: To avoid damaging the computer, ensure that the work surface is flat and clean. CAUTION: To avoid damaging the components and cards, handle them by their edges and avoid touching pins and contacts. WARNING: Disconnect all power sources before opening the computer cover or panels. After you finish working inside the computer, replace all covers, panels, and screws before connecting to the power source. CAUTION: Only a certified service technician is authorized to remove the computer cover and access any of the components inside the computer. See the safety instructions for complete information about safety precautions, working inside your computer, and protecting against electrostatic discharge. CAUTION: Before touching anything inside your computer, ground yourself by touching an unpainted metal surface, such as the metal at the back of the computer. While you work, periodically touch an unpainted metal surface to dissipate static electricity, which could harm internal components. CAUTION: When you disconnect a cable, pull on its connector or on its pull-tab, not on the cable itself. Some cables have connectors with locking tabs or thumb-screws that you must disengage before disconnecting the cable. When disconnecting cables, keep them evenly aligned to avoid bending any connector pins. When connecting cables, ensure that the connectors and ports are correctly oriented and aligned. CAUTION: To disconnect a network cable, first unplug the cable from your computer and then unplug the cable from the network device. Recommended Tools The procedures in this document may require the following tools: • Torx 5 screwdriver • Phillips screwdriver • Plastic scribe OM_Book.book Page 10 Tuesday, February 28, 2012 10:16 AMAfter Working Inside Your Computer 11 2 After Working Inside Your Computer After you complete replacement procedures, ensure the following: • Replace all screws and ensure that no stray screws remain inside your computer • Connect any external devices, cables, cards, and any other part(s) you removed before working on your computer • Connect your computer and all attached devices to their electrical outlets CAUTION: Before turning on your computer, replace all screws and ensure that no stray screws remain inside the computer. Failure to do so may damage your computer. OM_Book.book Page 11 Tuesday, February 28, 2012 10:16 AM12 After Working Inside Your Computer OM_Book.book Page 12 Tuesday, February 28, 2012 10:16 AMBase Cover 13 3 Base Cover WARNING: Before working inside your computer, read the safety information that shipped with your computer and follow the steps in "Before You Begin" on page 9. For additional safety best practices information, see the Regulatory Compliance Homepage at dell.com/regulatory_compliance. Removing the Base Cover 1 Close the display and turn the computer over. 2 Using a Torx 5 screwdriver, remove the screws that secure the base cover to the palm-rest assembly. 3 Using your fingertips, lift the base cover starting from the back of your computer. 4 Remove the base cover off the palm-rest assembly. 1 base cover 2 screws (10) 1 2 OM_Book.book Page 13 Tuesday, February 28, 2012 10:16 AM14 Base Cover Replacing the Base Cover 1 Align the base cover with the palm-rest assembly and press the base cover into place. 2 Using a Torx 5 screwdriver, replace the screws that secure the base cover to the palm-rest assembly. 3 Follow the instructions in "After Working Inside Your Computer" on page 11. OM_Book.book Page 14 Tuesday, February 28, 2012 10:16 AMPower-Light Board 15 4 Power-Light Board WARNING: Before working inside your computer, read the safety information that shipped with your computer and follow the steps in "Before You Begin" on page 9. For additional safety best practices information, see the Regulatory Compliance Homepage at dell.com/regulatory_compliance. Prerequisites 1 Remove the base cover. See "Removing the Base Cover" on page 13. Removing the Power-Light Board 1 Lift the connector latch and pull the pull-tab to disconnect the power-light board cable from the connector on the I/O board. 2 Remove the screw that secures the power-light board to the palm-rest assembly. 3 Lift the power-light board off the palm-rest assembly. 1 screw 2 power-light board cable 3 power-light board 2 3 1 OM_Book.book Page 15 Tuesday, February 28, 2012 10:16 AM16 Power-Light Board Replacing the Power-Light Board 1 Align the screw hole on the power-light board with the screw hole on the palm-rest assembly. 2 Replace the screw that secures the power-light board to the palm-rest assembly. 3 Slide the power-light board cable into the system-board connector and press down on the connector latch to secure the cable. Postrequisites 1 Replace the base cover. See "Replacing the Base Cover" on page 14. 2 Follow the instructions in "After Working Inside Your Computer" on page 11. OM_Book.book Page 16 Tuesday, February 28, 2012 10:16 AMBattery 17 5 Battery WARNING: Before working inside your computer, read the safety information that shipped with your computer and follow the steps in "Before You Begin" on page 9. For additional safety best practices information, see the Regulatory Compliance Homepage at dell.com/regulatory_compliance. Prerequisites 1 Remove the base cover. See "Removing the Base Cover" on page 13. 2 Remove the power-light board. See "Removing the Power-Light Board" on page 15. Removing the Battery 1 Disconnect the battery cable from the system-board. 2 Remove the screws that secure the battery to the palm-rest assembly. 3 Lift the battery off the palm-rest assembly. 1 screws (8) 2 battery 3 battery cable 3 2 1 OM_Book.book Page 17 Tuesday, February 28, 2012 10:16 AM18 Battery Replacing the Battery 1 Align the screw holes on the battery with the screw holes on the palm-rest assembly. 2 Replace the screws that secure the battery to the palm-rest assembly. 3 Connect the battery cable to the system-board. Postrequisites 1 Replace the power-light board. See "Replacing the Power-Light Board" on page 16. 2 Replace the base cover. See "Replacing the Base Cover" on page 14. 3 Follow the instructions in "After Working Inside Your Computer" on page 11. OM_Book.book Page 18 Tuesday, February 28, 2012 10:16 AMSpeakers 19 6 Speakers WARNING: Before working inside your computer, read the safety information that shipped with your computer and follow the steps in "Before You Begin" on page 9. For additional safety best practices information, see the Regulatory Compliance Homepage at dell.com/regulatory_compliance. Prerequisites 1 Remove the base cover. See "Removing the Base Cover" on page 13. 2 Remove the power-light board. See "Removing the Power-Light Board" on page 15. 3 Remove the battery. See "Removing the Battery" on page 17. Removing the Speakers Left Speaker 1 Disconnect the I/O cable from the I/O board connector and system-board connector. 1 I/O cable 2 I/O board connector 3 system-board connector 2 3 1 OM_Book.book Page 19 Tuesday, February 28, 2012 10:16 AM20 Speakers 2 Disconnect the left-speaker cable from the I/O board connector. 3 Release the Mini-Card cables from the routing guide on the left speaker. 4 Remove the two screws that secure the left speaker to the palm-rest assembly. 5 Lift the left speaker off the palm-rest assembly. 1 screws (2) 2 routing guide 3 left-speaker cable 1 2 3 OM_Book.book Page 20 Tuesday, February 28, 2012 10:16 AMSpeakers 21 Right Speaker 1 Disconnect the right-speaker cable from the system-board connector. 2 Remove the two screws that secure the right speaker to the palm-rest assembly. 3 Lift the right speaker off the palm-rest assembly. 1 screws (2) 2 right-speaker cable 1 2 OM_Book.book Page 21 Tuesday, February 28, 2012 10:16 AM22 Speakers Replacing the Speakers Left Speaker 1 Align the screw holes on the left speaker with the screw holes on the palm-rest assembly. 2 Replace the two screws that secure the left speaker to the palm-rest assembly. 3 Route the mini-card cables through the routing guide on the left speaker. 4 Connect the left-speaker cable to the I/O board connector. 5 Connect the I/O cable to the I/O board connector and system-board connector. Right Speaker 1 Align the screw holes on the right speaker with the screw holes on the palm-rest assembly. 2 Replace the two screws that secure the right speaker to the palm-rest assembly. 3 Connect the right-speaker cable to the system-board connector. Postrequisites 1 Replace the battery. See "Replacing the Battery" on page 18. 2 Replace the power-light board. See "Replacing the Power-Light Board" on page 16. 3 Replace the base cover. See "Replacing the Base Cover" on page 14. 4 Follow the instructions in "After Working Inside Your Computer" on page 11. OM_Book.book Page 22 Tuesday, February 28, 2012 10:16 AMWireless Mini-Card 23 7 Wireless Mini-Card WARNING: Before working inside your computer, read the safety information that shipped with your computer and follow the steps in "Before You Begin" on page 9. For additional safety best practices information, see the Regulatory Compliance Homepage at dell.com/regulatory_compliance. NOTE: Dell does not guarantee compatibility or provide support for mini-cards from sources other than Dell. If you ordered a wireless mini-card with your computer, the card is already installed. Your computer has one half mini-card slot which supports a Wireless Local Area Network (WLAN) + Bluetooth combo card. Prerequisites 1 Remove the base cover. See "Removing the Base Cover" on page 13. 2 Remove the power-light board. See "Removing the Power-Light Board" on page 15. 3 Remove the battery. See "Removing the Battery" on page 17. 4 Remove the right speaker. See "Removing the Speakers" on page 19. CAUTION: When the mini-card is not in the computer, store it in protective antistatic packaging. For more information, see "Protecting Against Electrostatic Discharge" in the safety information that shipped with your computer. OM_Book.book Page 23 Tuesday, February 28, 2012 10:16 AM24 Wireless Mini-Card Removing the Mini-Card 1 Disconnect the mini-card cables from the connectors on the mini-card. 2 Remove the screw that secures the mini-card to the system board. 3 Slide and remove the mini-card out of the system-board connector. 1 mini-card cables (2) 1 screw 2 mini-card 3 system-board connector 1 2 3 1 OM_Book.book Page 24 Tuesday, February 28, 2012 10:16 AMWireless Mini-Card 25 Replacing the Mini-Card 1 Remove the new mini-card from its packaging. 2 Align the notch on the mini-card with the tab in the system-board connector. CAUTION: Use firm and even pressure to slide the mini-card into place. If you use excessive force, you may damage the connector. CAUTION: The connectors are keyed to ensure correct insertion. If you feel resistance, check the connectors on the mini-card and on the system board, and realign the mini-card. CAUTION: To avoid damage to the mini-card, never place cables under the mini-card. 3 Insert the mini-card connector at a 45-degree angle into the system-board connector. 4 Press the other end of the mini-card down into the slot on the system board and replace the screw that secures the mini-card to the system board. 5 Connect the mini-card cables to the connectors on the mini-card. The following table provides the mini-card cable color scheme for the Mini-Card supported by your computer. Connectors on the Mini-Card Mini-Card Cable Color Scheme WLAN + Bluetooth (2 cables) Main WLAN + Bluetooth (white triangle) Auxiliary WLAN + Bluetooth (black triangle) white black OM_Book.book Page 25 Tuesday, February 28, 2012 10:16 AM26 Wireless Mini-Card Postrequisites 1 Replace the right speaker. See "Replacing the Speakers" on page 22. 1 Replace the battery. See "Replacing the Battery" on page 18. 2 Replace the power-light board. See "Replacing the Power-Light Board" on page 16. 3 Replace the base cover. See "Replacing the Base Cover" on page 14. 4 Follow the instructions in "After Working Inside Your Computer" on page 11. OM_Book.book Page 26 Tuesday, February 28, 2012 10:16 AMSolid-State Drive 27 8 Solid-State Drive WARNING: Before working inside your computer, read the safety information that shipped with your computer and follow the steps in "Before You Begin" on page 9. For additional safety best practices information, see the Regulatory Compliance Homepage at dell.com/regulatory_compliance. CAUTION: To avoid data loss, do not remove the solid-state drive while the computer is On or in Sleep state. CAUTION: Solid-state drives are extremely fragile. Exercise care when handling the solid-state drive. Prerequisites 1 Remove the base cover. See "Removing the Base Cover" on page 13. 2 Remove the power-light board. See "Removing the Power-Light Board" on page 15. 3 Remove the battery. See "Removing the Battery" on page 17. Removing the Solid-State Drive 1 Peel the tape that is adhered over the solid-state drive. 2 Remove the screw that secures the solid-state drive to the system board. 1 tape 1 OM_Book.book Page 27 Tuesday, February 28, 2012 10:16 AM28 Solid-State Drive 3 Slide and remove the solid-state drive out of the system-board connector. Replacing the Solid-State Drive 1 Align the notch on the solid-state drive with the tab in the system-board connector. CAUTION: Use firm and even pressure to slide the solid-state drive into place. If you use excessive force, you may damage the connector. 2 Insert the solid-state drive connector at a 45-degree angle into the system-board connector. 3 Replace the screw that secures the solid-state drive to the system board. 4 Adhere the tape over the solid-state drive. Postrequisites 1 Replace the battery. See "Replacing the Battery" on page 18. 2 Replace the power-light board. See "Replacing the Power-Light Board" on page 16. 3 Replace the base cover. See "Replacing the Base Cover" on page 14. 4 Follow the instructions in "After Working Inside Your Computer" on page 11. 1 screw 2 system-board connector 3 solid-state drive 2 3 1 OM_Book.book Page 28 Tuesday, February 28, 2012 10:16 AMHeat Sink 29 9 Heat Sink WARNING: Before working inside your computer, read the safety information that shipped with your computer and follow the steps in "Before You Begin" on page 9. For additional safety best practices information, see the Regulatory Compliance Homepage at dell.com/regulatory_compliance. Prerequisites 1 Remove the base cover. See "Removing the Base Cover" on page 13. 2 Remove the power-light board. See "Removing the Power-Light Board" on page 15. 3 Remove the battery. See "Removing the Battery" on page 17. Removing the Heat Sink 1 In sequential order (indicated on the heat sink), remove the screws that secure the heat sink to the system board. 2 Lift the heat sink off the system board. 1 heat sink 2 screws (4) 1 2 OM_Book.book Page 29 Tuesday, February 28, 2012 10:16 AM30 Heat Sink Replacing the Heat Sink NOTE: The original thermal grease can be reused, if the original system board and heat sink are reinstalled together. If either the system board or the heat sink is replaced, use the thermal pad provided in the kit to ensure that thermal conductivity is achieved. 1 Clean the thermal grease from the bottom of the heat sink and reapply it. 2 Align the screw holes on the heat sink with the screw holes on the system board. 3 In sequential order (indicated on the heat sink), replace the screws that secure the heat sink to the system board. Postrequisites 1 Replace the battery. See "Replacing the Battery" on page 18. 2 Replace the power-light board. See "Replacing the Power-Light Board" on page 16. 3 Replace the base cover. See "Replacing the Base Cover" on page 14. 4 Follow the instructions in "After Working Inside Your Computer" on page 11. OM_Book.book Page 30 Tuesday, February 28, 2012 10:16 AMFan 31 10 Fan WARNING: Before working inside your computer, read the safety information that shipped with your computer and follow the steps in "Before You Begin" on page 9. For additional safety best practices information, see the Regulatory Compliance Homepage at dell.com/regulatory_compliance. Prerequisites 1 Remove the base cover. See "Removing the Base Cover" on page 13. 2 Remove the power-light board. See "Removing the Power-Light Board" on page 15. 3 Remove the battery. See "Removing the Battery" on page 17. Removing the Fan 1 Disconnect the I/O cable from the I/O board connector and systemboard connector. 1 I/O cable 2 I/O board connector 3 system-board connector 2 3 1 OM_Book.book Page 31 Tuesday, February 28, 2012 10:16 AM32 Fan 2 Disconnect the power-adapter connector cable from the system-board connector. 3 Release the power-adapter connector cable from the routing guides on the fan. 4 Disconnect the fan cable from the I/O board connector. 5 Remove the screws that secure the fan to the palm-rest assembly. 6 Lift the fan off the palm-rest assembly. 1 routing guides 2 power-adapter connector cable 1 fan cable 2 screws (2) 3 fan 1 2 3 2 1 OM_Book.book Page 32 Tuesday, February 28, 2012 10:16 AMFan 33 Replacing the Fan 1 Align the screw holes on the fan with the screw holes on the palm-rest assembly. 2 Replace the screws that secure the fan to the palm-rest assembly. 3 Connect the fan cable to the I/O board connector. 4 Route the power-adapter connector cable through the routing guides on the fan. 5 Connect the power-adapter connector cable to the system-board connector. 6 Connect the I/O cable to the I/O board connector and system-board connector. Postrequisites 1 Replace the battery. See "Replacing the Battery" on page 18. 2 Replace the power-light board. See "Replacing the Power-Light Board" on page 16. 3 Replace the base cover. See "Replacing the Base Cover" on page 14. 4 Follow the instructions in "After Working Inside Your Computer" on page 11. OM_Book.book Page 33 Tuesday, February 28, 2012 10:16 AM34 Fan OM_Book.book Page 34 Tuesday, February 28, 2012 10:16 AMPower-Adapter Connector 35 11 Power-Adapter Connector WARNING: Before working inside your computer, read the safety information that shipped with your computer and follow the steps in "Before You Begin" on page 9. For additional safety best practices information, see the Regulatory Compliance Homepage at dell.com/regulatory_compliance. Prerequisites 1 Remove the base cover. See "Removing the Base Cover" on page 13. 2 Remove the power-light board. See "Removing the Power-Light Board" on page 15. 3 Remove the battery. See "Removing the Battery" on page 17. 4 Remove the speakers. See "Removing the Speakers" on page 19. Removing the Power-Adapter Connector 1 Disconnect the mini-card cables from the connectors on the mini-card. 2 Lift the connector latch and pull the pull-tab to disconnect the touchpad cable from the connector on the system board. 3 Release the mini-card cables from the routing guides. OM_Book.book Page 35 Tuesday, February 28, 2012 10:16 AM36 Power-Adapter Connector 4 Disconnect the power-adapter connector cable from the system-board connector. 5 Release the power-adapter connector cable from the routing guides on the fan. 6 Remove the screw that secures the power-adapter connector to the palm-rest assembly. 7 Lift the power-adapter connector off the palm-rest assembly. 1 routing guides 2 touchpad cable 3 mini-card cables (2) 1 3 2 OM_Book.book Page 36 Tuesday, February 28, 2012 10:16 AMPower-Adapter Connector 37 Replacing the Power-Adapter Connector 1 Align the screw hole on the power-adapter connector with the screw hole on the palm-rest assembly. 2 Replace the screw that secures the power-adapter connector to the palm-rest assembly. 3 Route the power-adapter connector cable through the routing guides on the fan. 4 Connect the power-adapter connector cable to the system-board connector. 5 Route the mini-card cables through the routing guides. 6 Slide the touchpad cable into the system-board connector and press down on the connector latch to secure the cable. 1 routing guides 2 screw 3 power-adapter connector cable 1 2 3 OM_Book.book Page 37 Tuesday, February 28, 2012 10:16 AM38 Power-Adapter Connector 7 Connect the mini-card cables to the connectors on the mini-card. The following table provides the mini-card cable color scheme for the mini-card supported by your computer. Postrequisites 1 Replace the speakers. See "Replacing the Speakers" on page 22. 2 Replace the battery. See "Replacing the Battery" on page 18. 3 Replace the power-light board. See "Replacing the Power-Light Board" on page 16. 4 Replace the base cover. See "Replacing the Base Cover" on page 14. 5 Follow the instructions in "After Working Inside Your Computer" on page 11. Connectors on the Mini-Card Mini-Card Cable Color Scheme WLAN + Bluetooth (2 cables) Main WLAN + Bluetooth (white triangle) Auxiliary WLAN + Bluetooth (black triangle) white black OM_Book.book Page 38 Tuesday, February 28, 2012 10:16 AM I/O Board 39 12 I/O Board WARNING: Before working inside your computer, read the safety information that shipped with your computer and follow the steps in "Before You Begin" on page 9. For additional safety best practices information, see the Regulatory Compliance Homepage at dell.com/regulatory_compliance. Prerequisites 1 Remove the base cover. See "Removing the Base Cover" on page 13. 2 Remove the power-light board. See "Removing the Power-Light Board" on page 15. 3 Remove the battery. See "Removing the Battery" on page 17. 4 Remove the speakers. See "Removing the Speakers" on page 19. 5 Remove the power-adapter connector. See "Removing the Power-Adapter Connector" on page 35. 6 Remove the fan. See "Removing the Fan" on page 31. OM_Book.book Page 39 Tuesday, February 28, 2012 10:16 AM40 I/O Board Removing the I/O Board 1 Remove the screw that secures the I/O board to the palm-rest assembly. 2 Lift the I/O board off the palm-rest assembly. Replacing the I/O Board 1 Align the screw holes on the I/O board with the screw holes on the palm-rest assembly. 2 Replace the screw that secure the I/O board to the palm-rest assembly. 1 I/O board 2 screw 1 2 OM_Book.book Page 40 Tuesday, February 28, 2012 10:16 AM I/O Board 41 Postrequisites 1 Replace the fan. See "Replacing the Fan" on page 33. 2 Replace the power-adapter connector. See "Replacing the Power-Adapter Connector" on page 37. 3 Replace the speakers See "Replacing the Speakers" on page 22. 4 Replace the battery. See "Replacing the Battery" on page 18. 5 Replace the power-light board. See "Replacing the Power-Light Board" on page 16. 6 Replace the base cover. See "Replacing the Base Cover" on page 14. 7 Follow the instructions in "After Working Inside Your Computer" on page 11. OM_Book.book Page 41 Tuesday, February 28, 2012 10:16 AM42 I/O Board OM_Book.book Page 42 Tuesday, February 28, 2012 10:16 AMSystem Board 43 13 System Board WARNING: Before working inside your computer, read the safety information that shipped with your computer and follow the steps in "Before You Begin" on page 9. For additional safety best practices information, see the Regulatory Compliance Homepage at dell.com/regulatory_compliance. Prerequisites 1 Remove the base cover. See "Removing the Base Cover" on page 13. 2 Remove the power-light board. See "Removing the Power-Light Board" on page 15. 3 Remove the battery. See "Removing the Battery" on page 17. 4 Remove the right speaker. See "Removing the Speakers" on page 19. 5 Remove the mini-card. See "Removing the Mini-Card" on page 24. 6 Remove the solid-state drive. See "Removing the Solid-State Drive" on page 27. 7 Remove the heat sink. See "Removing the Heat Sink" on page 29. 8 Remove the fan. See "Removing the Fan" on page 31. OM_Book.book Page 43 Tuesday, February 28, 2012 10:16 AM44 System Board Removing the System Board NOTE: Your computer’s service tag is stored in the system board. You must enter the service tag in the BIOS after you replace the system-board assembly. NOTE: Before disconnecting the cables from the system board, note the location of the connectors so that you can reconnect them correctly after you replace the system-board assembly. 1 Disconnect the display cable from the connector on the system board. 2 Lift the connector latch and pull the pull-tab to disconnect the touchpad cable and keyboard-backlight cable from the connectors on the system board. 1 touchpad cable 2 keyboard-backlight cable 3 display cable 1 2 3 OM_Book.book Page 44 Tuesday, February 28, 2012 10:16 AMSystem Board 45 3 Remove the screws that secure the system board to the palm-rest assembly. 4 Turn the system board over and place it over the palm-rest assembly. 5 Lift the connector latch and disconnect the keyboard cable from the system board connector. 1 system board 2 screws (4) 1 2 OM_Book.book Page 45 Tuesday, February 28, 2012 10:16 AM46 System Board Replacing the System Board 1 Slide the keyboard cable into the system-board connector and press down on the connector latch to secure the cable. 2 Align the screw holes on the system board with the screw holes on the palm-rest assembly. 3 Replace the screws that secure the system board to the palm-rest assembly. 4 Connect the display cable to the system board connector. 5 Slide the touchpad-cable and keyboard-backlight cable into the systemboard connectors and press down on the latch to secure the cables. 1 keyboard cable 1 OM_Book.book Page 46 Tuesday, February 28, 2012 10:16 AMSystem Board 47 Postrequisites 1 Replace the fan. See "Replacing the Fan" on page 33. 2 Replace the heat sink. See "Replacing the Heat Sink" on page 30. 3 Replace the solid-state drive. See "Replacing the Solid-State Drive" on page 28. 4 Replace the mini-card. See "Replacing the Mini-Card" on page 25. 5 Replace the right speaker. See "Replacing the Speakers" on page 22. 6 Replace the battery. See "Replacing the Battery" on page 18. 7 Replace the power-light board. See "Replacing the Power-Light Board" on page 16. 8 Replace the base cover. See "Replacing the Base Cover" on page 14. 9 Follow the instructions in "After Working Inside Your Computer" on page 11. Entering the Service Tag in BIOS 1 Turn on the computer. 2 Press during POST to enter the system setup program. 3 Navigate to the main tab and enter the service tag in the Service Tag Setting field. OM_Book.book Page 47 Tuesday, February 28, 2012 10:16 AM48 System Board OM_Book.book Page 48 Tuesday, February 28, 2012 10:16 AMCoin-Cell Battery 49 14 Coin-Cell Battery WARNING: Before working inside your computer, read the safety information that shipped with your computer and follow the steps in "Before You Begin" on page 9. For additional safety best practices information, see the Regulatory Compliance Homepage at dell.com/regulatory_compliance. WARNING: The battery may explode if installed incorrectly. Replace the battery only with the same or equivalent type. Discard used batteries according to the manufacturer’s instructions. Prerequisites 1 Remove the base cover. See "Removing the Base Cover" on page 13. 2 Remove the power-light board. See "Removing the Power-Light Board" on page 15. 3 Remove the battery. See "Removing the Battery" on page 17. 4 Remove the Mini-Card. See "Removing the Mini-Card" on page 24. 5 Remove the solid-state drive. See "Removing the Solid-State Drive" on page 27. 6 Remove the heat sink. See "Removing the Heat Sink" on page 29. 7 Remove the fan. See "Removing the Fan" on page 31. 8 Remove the system board. See "Removing the System Board" on page 44. OM_Book.book Page 49 Tuesday, February 28, 2012 10:16 AM50 Coin-Cell Battery Removing the Coin-Cell Battery CAUTION: Removing the coin-cell battery resets the BIOS settings to default. It is recommended that you note the BIOS settings before removing the coin-cell battery. 1 Using a plastic scribe, gently pry out the coin-cell battery out of the battery socket on the system board. Replacing the Coin-Cell Battery 1 With the positive-side facing up, snap the coin-cell battery into the battery socket on the system board. 1 system board 2 coin-cell battery 3 plastic scribe 1 3 2 OM_Book.book Page 50 Tuesday, February 28, 2012 10:16 AMCoin-Cell Battery 51 Postrequisites 1 Replace the system board. See "Replacing the System Board" on page 46. 2 Replace the fan. See "Replacing the Fan" on page 33. 3 Replace the heat sink. See "Replacing the Heat Sink" on page 30. 4 Replace the solid-state drive. See "Replacing the Solid-State Drive" on page 28. 5 Replace the Mini-Card. See "Replacing the Mini-Card" on page 25. 6 Replace the battery. See "Replacing the Battery" on page 18. 7 Replace the power-light board. See "Replacing the Power-Light Board" on page 16. 8 Replace the base cover. See "Replacing the Base Cover" on page 14. 9 Follow the instructions in "After Working Inside Your Computer" on page 11. OM_Book.book Page 51 Tuesday, February 28, 2012 10:16 AM52 Coin-Cell Battery OM_Book.book Page 52 Tuesday, February 28, 2012 10:16 AMDisplay Assembly 53 15 Display Assembly WARNING: Before working inside your computer, read the safety information that shipped with your computer and follow the steps in "Before You Begin" on page 9. For additional safety best practices information, see the Regulatory Compliance Homepage at dell.com/regulatory_compliance. Prerequisites 1 Remove the base cover. See "Removing the Base Cover" on page 13. 2 Remove the power-light board. See "Removing the Power-Light Board" on page 15. 3 Remove the battery. See "Removing the Battery" on page 17. 4 Remove the speakers. See "Removing the Speakers" on page 19. Removing the Display Assembly 1 Disconnect the display cable from the system-board connector. 1 display cable 1 OM_Book.book Page 53 Tuesday, February 28, 2012 10:16 AM54 Display Assembly 2 Disconnect the power-adapter connector cable from the system-board connector. 3 Release the power-adapter connector cable from the routing guides on the fan. 4 Disconnect the mini-card cables from the connectors on the mini-card. 5 Lift the connector latch and pull the pull-tab to disconnect the touchpad cable from the connector on the system board. 1 routing guides 2 power-adapter connector cable 1 2 OM_Book.book Page 54 Tuesday, February 28, 2012 10:16 AMDisplay Assembly 55 6 Release the mini-card cables from the routing guides. 7 Remove the screws that secure the display assembly to the palm-rest assembly. 1 routing guides 2 touchpad cable 3 mini-card cables (2) 1 2 3 OM_Book.book Page 55 Tuesday, February 28, 2012 10:16 AM56 Display Assembly 8 Gently lift the palm-rest assembly to a 90-degree angle and then release the palm-rest assembly off the display assembly. Replacing the Display Assembly 1 Slide and place the palm-rest assembly over the display assembly. 2 Press down on the display hinges and ensure that the screw holes on the display hinges align with the screw holes on the palm-rest assembly. 3 Replace the screws that secure the display assembly to the palm-rest assembly. 4 Route the mini-card cables through the routing guides. 5 Slide the touchpad cable into the system-board connector and press down on the connector latch to secure the keyboard cable. 1 palm-rest assembly 2 screws (4) 3 display hinges (2) 3 1 2 OM_Book.book Page 56 Tuesday, February 28, 2012 10:16 AMDisplay Assembly 57 6 Connect the mini-card cables to the connectors on the mini-card. The following table provides the mini-card cable color scheme for the mini-card supported by your computer. 7 Route the power-adapter connector cable through the routing guides on the fan. 8 Connect the power-adapter connector cable to the system-board connector. Postrequisites 1 Replace the speakers. See "Replacing the Speakers" on page 22. 2 Replace the battery. See "Replacing the Battery" on page 18. 3 Replace the power-light board. See "Replacing the Power-Light Board" on page 16. 4 Replace the base cover. See "Replacing the Base Cover" on page 14. 5 Follow the instructions in "After Working Inside Your Computer" on page 11. Connectors on the Mini-Card Mini-Card Cable Color Scheme WLAN + Bluetooth (2 cables) Main WLAN + Bluetooth (white triangle) Auxiliary WLAN + Bluetooth (black triangle) white black OM_Book.book Page 57 Tuesday, February 28, 2012 10:16 AM58 Display Assembly OM_Book.book Page 58 Tuesday, February 28, 2012 10:16 AMKeyboard 59 16 Keyboard WARNING: Before working inside your computer, read the safety information that shipped with your computer and follow the steps in "Before You Begin" on page 9. For additional safety best practices information, see the Regulatory Compliance Homepage at dell.com/regulatory_compliance. Prerequisites 1 Remove the base cover. See "Removing the Base Cover" on page 13. 2 Remove the power-light board. See "Removing the Power-Light Board" on page 15. 3 Remove the battery. See "Removing the Battery" on page 17. 4 Remove the speakers. See "Removing the Speakers" on page 19. 5 Remove the mini-card. See "Removing the Mini-Card" on page 24. 6 Remove the solid-state drive. See "Removing the Solid-State Drive" on page 27. 7 Remove the heat sink. See "Removing the Heat Sink" on page 29. 8 Remove the power-adapter connector. See "Removing the Power-Adapter Connector" on page 35. 9 Remove the fan. See "Removing the Fan" on page 31. 10 Remove the I/O board. See "Removing the I/O Board" on page 40. 11 Remove the system board. See "Removing the System Board" on page 44. OM_Book.book Page 59 Tuesday, February 28, 2012 10:16 AM60 Keyboard Removing the Keyboard 1 Remove the screw that secures the mini-card clamp. 2 Remove the mini-card clamp off the palm-rest assembly. 3 Remove the screws that secure the keyboard to the palm-rest assembly. 4 Lift the keyboard off the palm-rest assembly. 1 screw 2 mini-card clamp 3 keyboard 3 1 2 OM_Book.book Page 60 Tuesday, February 28, 2012 10:16 AMKeyboard 61 Replacing the Keyboard 1 Align the screw holes on the keyboard with the screw holes on the palmrest assembly. 2 Replace the screws that secure the keyboard to the palm-rest assembly. 3 Align the screw hole on the mini-card clamp with the screw hole on the palm-rest assembly. 4 Replace the screw that secures the mini-card clamp to the palm-rest assembly. Postrequisites 1 Replace the system board. See "Replacing the System Board" on page 46. 2 Replace the I/O board. See "Replacing the I/O Board" on page 40. 3 Replace the fan. See "Replacing the Fan" on page 33. 4 Replace the power-adapter connector. See "Replacing the Power-Adapter Connector" on page 37. 5 Replace the heat sink. See "Replacing the Heat Sink" on page 30. 6 Replace the solid-state drive. See "Replacing the Solid-State Drive" on page 28. 7 Replace the mini-card. See "Replacing the Mini-Card" on page 25. 8 Replace the speakers. See "Replacing the Speakers" on page 22. 9 Replace the battery. See "Replacing the Battery" on page 18. 10 Replace the power-light board. See "Replacing the Power-Light Board" on page 16. 11 Replace the base cover. See "Replacing the Base Cover" on page 14. 12 Follow the instructions in "After Working Inside Your Computer" on page 11. OM_Book.book Page 61 Tuesday, February 28, 2012 10:16 AM62 Keyboard OM_Book.book Page 62 Tuesday, February 28, 2012 10:16 AMPalm-Rest Assembly 63 17 Palm-Rest Assembly WARNING: Before working inside your computer, read the safety information that shipped with your computer and follow the steps in "Before You Begin" on page 9. For additional safety best practices information, see the Regulatory Compliance Homepage at dell.com/regulatory_compliance. Prerequisites 1 Remove the base cover. See "Removing the Base Cover" on page 13. 2 Remove the power-light board. See "Removing the Power-Light Board" on page 15. 3 Remove the battery. See "Removing the Battery" on page 17. 4 Remove the speakers. See "Removing the Speakers" on page 19. 5 Remove the mini-card. See "Removing the Mini-Card" on page 24. 6 Remove the solid-state drive. See "Removing the Solid-State Drive" on page 27. 7 Remove the heat sink. See "Removing the Heat Sink" on page 29. 8 Remove the power-adapter connector. See "Removing the Power-Adapter Connector" on page 35. 9 Remove the fan. See "Removing the Fan" on page 31. 10 Remove the system board. See "Removing the System Board" on page 44. 11 Remove the I/O board. See "Removing the I/O Board" on page 40. 12 Remove the keyboard. See "Removing the Keyboard" on page 60. OM_Book.book Page 63 Tuesday, February 28, 2012 10:16 AM64 Palm-Rest Assembly Removing the Palm-Rest Assembly 1 Remove the screws that secure the display assembly to the palm-rest assembly. 2 Gently lift the palm-rest assembly to a 90-degree angle and then release the palm-rest assembly off the display assembly. CAUTION: Carefully separate the palm-rest assembly from the display assembly to avoid damage to the display assembly. Replacing the Palm-Rest Assembly 1 Slide and place the palm-rest assembly over the display assembly. 2 Press down on the display hinges and ensure the screw holes in the display hinges align with the screw holes on the palm-rest assembly. 3 Replace the screws that secure the palm-rest assembly to the display assembly. 1 palm-rest assembly 2 screws (4) 3 display hinges (2) 3 1 2 OM_Book.book Page 64 Tuesday, February 28, 2012 10:16 AMPalm-Rest Assembly 65 Postrequisites 1 Replace the keyboard. See "Replacing the Keyboard" on page 61. 2 Replace the system board. See "Replacing the System Board" on page 46. 3 Replace I/O board. See "Replacing the I/O Board" on page 40. 4 Replace the fan. See "Replacing the Fan" on page 33. 5 Replace the power-adapter connector. See "Replacing the Power-Adapter Connector" on page 37. 6 Replace the heat sink. See "Replacing the Heat Sink" on page 30. 7 Replace the solid-state drive. See "Replacing the Solid-State Drive" on page 28. 8 Replace the mini-card. See "Replacing the Mini-Card" on page 25. 9 Replace the speakers. See "Replacing the Speakers" on page 22. 10 Replace the battery. See "Replacing the Battery" on page 18. 11 Replace the power-light board. See "Replacing the Power-Light Board" on page 16. 12 Replace the base cover. See "Replacing the Base Cover" on page 14. 13 Follow the instructions in "After Working Inside Your Computer" on page 11. OM_Book.book Page 65 Tuesday, February 28, 2012 10:16 AM66 Palm-Rest Assembly OM_Book.book Page 66 Tuesday, February 28, 2012 10:16 AMSystem Setup Utility 67 18 System Setup Overview Use the system setup to: • Get information about the hardware installed in your computer, such as the amount of RAM, the size of the hard drive, and so on • Change the system configuration information • Set or change a user-selectable option, such as the user password, type of hard drive installed, enabling or disabling base devices, and so on NOTE: Before you change system setup, it is recommended that you write down the system setup screen information for future reference. Entering System Setup 1 Turn on (or restart) your computer. 2 During POST, when the DELL logo is displayed, watch for the F2 prompt to appear and then press immediately. NOTE: The F2 prompt indicates that the keyboard has initialized. This prompt can appear very quickly, so you must watch for it, and then press . If you press before the F2 prompt, this keystroke is lost. If you wait too long and the operating system logo appears, continue to wait until you see the Microsoft Windows desktop. Then, turn off your computer and try again. System Setup Screens The system setup screen displays current or changeable configuration information for your computer. Information on the screen is divided into three areas: the setup item, active help screen, and key functions. OM_Book.book Page 67 Tuesday, February 28, 2012 10:16 AM68 System Setup Utility System Setup Options NOTE: Depending on your computer and installed devices, the items listed in this section may appear, or may not appear exactly as listed. Setup Item — This field appears on the left side of the system setup window. The field is a scrollable list containing features that define the configuration of your computer, including installed hardware, power conservation, and security features. Scroll up and down the list with the up- and down-arrow keys. As an option is highlighted, the Help Screen displays more information about that option and available settings. Help Screen — This field appears on the right side of the system setup window and contains information about each option listed in the Setup Item. In this field you can view information about your computer and make changes to your current settings. Press the up- and down-arrow keys to highlight an option. Press to make that selection active and return to the Setup Item. NOTE: Not all settings listed in the Setup Item are changeable. Key Functions — This field appears below the Help Screen and lists keys and their functions within the active system setup field. Main System Time (hh:mm:ss) Displays the current time. System Date (mm:dd:yy) Displays current date. BIOS Version Displays the BIOS version number. Product Name Displays the product name. Service Tag Displays the service tag of your computer. Asset Tag Displays the asset tag of the computer. CPU Type Displays the processor type. CPU Speed Displays the processor speed. CPU ID Displays the processor identification code. OM_Book.book Page 68 Tuesday, February 28, 2012 10:16 AMSystem Setup Utility 69 CPU Cache L1 Cache Displays the processor L1 cache size. L2 Cache Displays the processor L2 cache size. L3 Cache Displays the processor L3 cache size. Fixed HDD Displays the device name and size. AC Adapter Type Displays the device name and type. System Memory Displays the system memory. Extended Memory Displays the extended memory. Memory Speed Displays the memory speed. Keyboard Type Displays the keyboard type. Advanced Intel (R) Speedstep (TM) If enabled, the processor clock speed and core voltage are adjusted dynamically based on the processor load. Virtualization If enabled, a Virtual Machine Monitor (VMM) will be able to access your computer. USB Emulation If enabled, defines how the BIOS controls USB devices. USB Powershare If enabled, external devices can be charged even when the computer is turned off. USB Wake Support If enabled, USB devices can be configured to wake the computer from Standby. SATA Operation If enabled, configures the operating mode of the integrated SATA controller. Adapter Warnings If enabled, the BIOS will display a warning message when the power adapter used is not compatible. Function Key Behavior If enabled, you can use the multimedia keys directly without using the function key combination. OM_Book.book Page 69 Tuesday, February 28, 2012 10:16 AM70 System Setup Utility Battery Health Displays the battery health of your computer. Intel (R) Smart Connect Technology If enabled, allows your computer to check for updates even when in Sleep state. Intel (R) Rapid Start Technology iRST Support If enabled, will allow you to configure a RAID controller on your system. Entry on S3 RTC wake If enabled, will wake the computer before it reaches the hibernate state. Entry after If enabled, will allow you to set a timer to wake the computer at a particular interval. Entry on S3 critical battery event If enabled, will wake the computer and alert you when the battery level is low. Miscellaneous Devices External USB Ports Allows you to enable or disable external USB ports. Security Set Service Tag Allows you to enter the service tag of your computer. Admin Password is: Displays the admin account password. System Password is: Displays the system password. HDD Password State Displays the HDD password state. Set Admin Password Allows you to set the admin password. Set System Password Allows you to set the system password. Set HDD Password Allows you to set the HDD password. Password Change: Displays whether you have access to change passwords. Computrace: Allows you to track your computer, if it is lost or stolen. OM_Book.book Page 70 Tuesday, February 28, 2012 10:16 AMSystem Setup Utility 71 Boot Sequence This feature allows you to change the boot sequence for devices. Boot Options • Removable Drive — The computer attempts to boot from the removable drive. If no operating system is on the drive, the computer generates an error message. • Hard Drive — The computer attempts to boot from the primary hard drive. If no operating system is on the drive, the computer generates an error message. • USB Storage Device — Insert the memory device into a USB port and restart the computer. When F12 Boot Options appears in the lowerright corner of the screen, press . The BIOS detects the device and adds the USB flash option to the boot menu. Boot Boot Priority Order Removable Drive Allows you to boot the system using a removable (external) drive. Hard Drive Allows you to boot the system from the primary hard drive. USB Storage Device Allows you to boot the system from a USB storage device. CD/DVD/CD-RW Drive Allows you to boot the system from the optical drive. Exit Exit Saving Changes Allows you to save the changes made and exit the BIOS. Exit discarding Changes Allows you to discard the changes made and exit the BIOS. Load Setup Defaults Allows you to load the default BIOS settings. Discard Changes Discards the changes made to the BIOS. Save Changes Saves the changes made to the BIOS. OM_Book.book Page 71 Tuesday, February 28, 2012 10:16 AM72 System Setup Utility NOTE: To boot to a USB device, the device must be bootable. To ensure that your device is bootable, check the device documentation. • CD/DVD/CD-RW Drive — The computer attempts to boot from the optical drive. If no disc is in the drive, or if the disc is not bootable, the computer generates an error message. Changing Boot Sequence for the Current Boot You can use this feature to change the current boot sequence, for example, to boot from the optical drive to run Dell Diagnostics from the Drivers and Utilities disc. The previous boot sequence is restored at the next boot. 1 If you are booting from a USB device, connect the USB device to a USB port. 2 Turn on (or restart) your computer. 3 When F12 Boot Options options appears in the lower-right corner of the screen, press . NOTE: If you wait too long and the operating system logo appears, continue to wait until you see the Microsoft Windows desktop. Then shut down your computer and try again. The Boot Priority Order menu appears, listing all available boot devices. 4 On the Boot Priority Order menu choose the device you want to boot from. For example, if you are booting to a USB memory key, highlight USB Storage Device and press . Changing Boot Sequence for Future Boots 1 Enter system setup. See "Entering System Setup" on page 67. 2 Use the arrow keys to highlight the Boot menu option and press to access the menu. NOTE: Write down your current boot sequence in case you want to restore it. 3 Press the up- and down-arrow keys to move through the list of devices. 4 Press plus (+) or minus (–) to change the boot priority of the device. OM_Book.book Page 72 Tuesday, February 28, 2012 10:16 AMFlashing the BIOS 73 19 Flashing the BIOS The BIOS may require flashing when an update is available or when replacing the system board. To flash the BIOS: 1 Turn on the computer. 2 Go to support.dell.com/support/downloads. 3 Locate the BIOS update file for your computer: NOTE: The Service Tag for your computer is located on a label at the bottom of your computer. For more information, see the Quick Start Guide that shipped with your computer. If you have your computer’s Service Tag or Express Service Code: a Enter your computer’s Service Tag or Express Service Code in the Service Tag or Express Service Code field. b Click Submit and proceed to step 4. If you do not have your computer’s Service Tag or Express Service Code: a Select one of the following options: • Automatically detect my Service Tag for me • Choose from My Products and Services List • Choose from a list of all Dell products b Click Continue and follow the instructions on the screen. 4 A list of applications and drivers available for your computer appears on the screen. Click BIOS. 5 Click Download File to download the latest BIOS file. 6 Select your preferred download method in the Please select your download method below window; click Download Now. The File Download window appears. 7 Click Save to save the file on your computer and wait till the download has been completed. 8 Click Run to install the updated BIOS settings to your computer. 9 Follow the instructions on the screen. OM_Book.book Page 73 Tuesday, February 28, 2012 10:16 AM74 Flashing the BIOS OM_Book.book Page 74 Tuesday, February 28, 2012 10:16 AM HBA SAS Dell PowerEdge 6 Gb/s et Internal Tape Adapter Guide d'utilisationRemarques, précautions et avertissements REMARQUE : une REMARQUE indique des informations importantes qui peuvent vous aider à mieux utiliser votre ordinateur. PRÉCAUTION : une PRÉCAUTION indique un risque d’endommagement du matériel ou de perte de données en cas de non-respect des instructions. AVERTISSEMENT : un AVERTISSEMENT vous avertit d’un risque d'endommagement du matériel, de blessure corporelle ou même de mort. ________________________________________ Les informations que contient ce document sont sujettes à modification sans préavis. © 2012 Dell Inc. Tous droits réservés. La reproduction de ce document, de quelque manière que ce soit, sans l'autorisation écrite de Dell Inc. est strictement interdite. Marques utilisées dans ce document : Dell™, le logo DELL, PowerEdge™ et OpenManage™ sont des marques de Dell Inc. ; Microsoft ® , Windows ® et Windows Server ® sont des marques ou des marques déposées de Microsoft Corporation aux États-Unis et/ou dans d'autres pays; SUSE ® est une marque déposée de Novell, Inc. aux États-Unis et dans d'autres pays ; Red Hat ® et Red Hat Enterprise Linux ® sont des marques déposées de Red Hat Inc. aux États-Unis et dans d'autres pays. D'autres marques commerciales et noms de marque peuvent être utilisés dans ce document pour faire référence aux entités se réclamant de ces marques et de ces noms ou à leurs produits. Dell Inc. rejette tout intérêt exclusif dans les marques et les noms commerciaux autres que les siens. UCS-71, UCS-70 et UCSM-70 2012 - 02 Rév. A00Table des matières 3 Table des matières 1 Présentation . . . . . . . . . . . . . . . . . . . . . . . 5 Architecture du matériel . . . . . . . . . . . . . . . . . 6 Systèmes d'exploitation pris en charge. . . . . . . . . . 7 Documentation connexe. . . . . . . . . . . . . . . . . . 7 Contacter Dell . . . . . . . . . . . . . . . . . . . . . . . 8 2 Fonctionnalités des HBA SAS 6 Gb/s et Internal Tape Adapter PowerEdge . . . . . . 9 Fonction de voyant d'activité des ports pour la carte HBA SAS 6 Gb/s uniquement . . . . . . . . . . . . . . 11 3 Installation du matériel . . . . . . . . . . . . . . 13 Installation des cartes HBA SAS 6 Gb/s Dell PowerEdge et Internal Tape Adapter (ITA) . . . . . . . . . . . . . . . . 13 4 Installation des pilotes . . . . . . . . . . . . . . 17 Installation du pilote Windows . . . . . . . . . . . . . 18 Création du support de pilotes . . . . . . . . . . . 18 Tâches préalables à l'installation . . . . . . . . . 18 Installation du pilote pendant l'installation du système d'exploitation Windows Server 2003. . . . 204 Table des matières Installation du pilote pendant l'installation du système d'exploitation Windows Server 2008 ou Windows Server 2008 R2 . . . . . . . . . . . . . . 20 Installation du pilote de Windows Server 2003, Windows Server 2008 ou Windows Server 2008 R2 pour un nouveau contrôleur RAID. . . . . . . . 21 Mise à jour du pilote Windows . . . . . . . . . . . 22 Installation du Pilote Linux . . . . . . . . . . . . . . . 23 Installation du module RPM avec prise en charge DKMS . . . . . . . . . . . . . . . . . . . . 23 Mise à niveau du noyau. . . . . . . . . . . . . . . 24 5 BIOS HBA SAS 6 Gb/s . . . . . . . . . . . . . . 25 Messages de l'auto-test de démarrage . . . . . . . . . 25 Codes des messages d'erreur du BIOS . . . . . . 25 Utilitaire de configuration . . . . . . . . . . . . . . . . 26 Utilisation de l'utilitaire de configuration . . . . . . 26 Fonctions de l'utilitaire de configuration . . . . . . 26 Écran Quitter . . . . . . . . . . . . . . . . . . . . 27 6 Dépannage . . . . . . . . . . . . . . . . . . . . . . . 29 Problèmes d'ordre général . . . . . . . . . . . . . . . 29 Messages d'erreur de l'utilitaire de configuration . . . 29 Messages d'erreur du BIOS . . . . . . . . . . . . . . . 31 A Mise à jour du micrologiciel . . . . . . . . . 35 Utilitaire de mise à jour du micrologiciel . . . . . . . . 35Présentation 5 Présentation La carte HBA SAS 6 Gb/s Dell PowerEdge et les cartes ITA (Internal Tape Adapter - Adaptateur de bandes internes) font partie des solutions de contrôleurs SCSI reliés en série Dell (SAS). La carte HBA SAS 6 Gb/s et les cartes ITA sont dotées des caractéristiques suivantes : • Conformité T10 SAS 2.0 avec un débit de 6 Gb/s • Prise en charge de périphériques de bandes SAS externes pris en charge par Dell et de la connectivité RBOD (RAID Bunch of Disks - Ensemble RAID de disques) (HBA SAS 6 Gb/s) • Prise en charge de périphériques de bandes internes SAS pris en charge par Dell (Internal Tape Adapter - Adaptateur de bandes internes) • Cartes PCIe standard demi-longueur, demi-hauteur • Prises en charge par une longueur de lien x8 PCIe • Prises en charge sur des plateformes dotées de connecteurs PCIe x8 et x16 • Communiquent avec les périphériques SAS à l'aide de connecteurs mini-SAS 2x4 • Prise en charge des lecteurs de bande LT03 060, LT04 et LT05 • Prise en charge pour matériel complet TLR (Transport Layer Retry), pour améliorer la vitesse de transfert de bande maximale • PCIe 2.0 conforme aux fonctions principales6 Présentation Architecture du matériel La figure 1-1 affiche l'architecture du matériel de la carte HBA SAS 6 Gb/s. L'architecture de la carte ITA est similaire sauf lorsque les connecteurs sont internes. Figure 1-1. Architecture du matériel des cartes HBA SAS 6 Gb/s et ITA 1 Connecteurs SAS externes 2 x4 2 Connecteur PCI-EPrésentation 7 Systèmes d'exploitation pris en charge La carte HBA SAS 6 Gb/s et les cartes ITA prennent en charge les systèmes d'exploitation suivants : • Famille Microsoft Windows Server 2003 • Famille Microsoft Windows Server 2008 (y compris la virtualisation Hyper-V) • Microsoft Windows Server 2008 R2 • Red Hat Enterprise Linux version 5 mise à jour 7 et Service Pack 1 version 6 • SUSE Linux Enterprise Server version 10 Service Pack 4 (64 bits uniquement), et version 11 Progiciel de service 2 (64 bits uniquement) • VMware ESX 4.1 Mise à jour 1 et ESXi 5.0. REMARQUE : pour obtenir la dernière liste des systèmes d'exploitation pris en charge, voir la documentation concernant votre système, disponible sur le site de support de Dell, support.dell.com/manuals. Pour connaître la configuration requise pour un Service Pack de système d'exploitation particulier, voir Drivers and Downloads (Pilotes et téléchargements) sur le site de support de Dell, support.dell.com. Documentation connexe • Pour lire et télécharger la documentation de ce produit, rendez-vous sur support.dell.com/manuals et suivez les instructions à l'écran. Vous pouvez saisir votre Numéro de service, sélectionner votre produit dans la liste de modèles, vous connecter à votre compte ou cliquer sur n'importe quel composant individuel. • Pour obtenir la documentation sur le contrôleur de stockage, rendez-vous sur support.dell.com/manuals et cliquez sur Storage Controllers (Contrôleurs de stockage).8 Présentation Contacter Dell REMARQUE : si vous ne disposez pas d'une connexion Internet active, vous pouvez utiliser les coordonnées figurant sur votre preuve d'achat, votre bordereau de marchandises, votre facture ou encore dans le catalogue de produits Dell. Dell propose plusieurs options de maintenance et d'assistance technique en ligne et par téléphone. Leur disponibilité variant d'un pays à l'autre, il est possible que certains services ne soient pas proposés dans votre région. Pour contacter Dell pour des questions ayant trait aux ventes, au support technique ou au service client : 1 Rendez-vous sur le site support.dell.com. 2 Sélectionnez votre catégorie de support. 3 Si vous ne vous trtouvez pas aux États-Unis, sélectionnez le code de votre pays au bas de la page ou sélectionnez All (Tous) pour plus de choix. 4 Sélectionnez le lien de service ou de support approprié en fonction de vos besoins.Fonctionnalités des HBA SAS 6 Gb/s et Internal Tape Adapter PowerEdge 9 Fonctionnalités des HBA SAS 6 Gb/s et Internal Tape Adapter PowerEdge Cette section présente les caractéristiques des cartes HBA SAS 6 Gb/s et Internal Tape Adapter Dell PowerEdge. Le tableau 2-1 compare les caractéristiques des cartes HBA SAS 6 Gb/s et Internal Tape Adapter. Tableau 2-1. Caractéristiques des HBA SAS 6 Gb/s et Internal Tape Adapter Caractéristiques HBA SAS 6 Gbit/s Internal Tape Adapter (ITA) Technologie SAS Oui Oui Prise en charge de l'interface hôte PCI-e x4 ou x8 Oui Oui Facteur de forme Adaptateur PCI demihauteur, demi-longueur Demi-hauteur Demi-longueur Adaptateur PCI Contrôleur d'E/S (IOC) LSI SAS 2008 SAS LSI 2008 Vitesse du noyau : 533 MHz SAS LSI 2008 Vitesse du noyau : 533 MHz Tension de fonctionnement +12 V, +3,3 V, +3,3 Vaux +12 V, +3,3 V, +3,3 Vaux Communication avec le système Voies PCI-e Voies PCI-e Connexion aux périphériques finaux Liaisons SAS Liaisons SAS Connecteurs SAS 2x4 externes Internes, 2x4 Sans plomb Oui Oui10 Fonctionnalités des HBA SAS 6 Gb/s et Internal Tape Adapter PowerEdge Systèmes d'exploitation pris en charge MicrosoftWindows Server 2003 Microsoft Windows Server 2008 et Windows Server 2008 R2 : Red Hat Enterprise Linux version 5 mise à jour 7 et ultérieure Red Hat Enterprise Linux version 6 SP 1 et ultérieure SUSE Linux Enterprise Server version 10 SP 4 et ultérieure (64 bits uniquement) SUSE Linux Enterprise Server version 11 et SP 2 (64 bits uniquement) Compatibilité SAS et SATA conforme Dell Oui Oui Périphériques finaux à connexion directe pris en charge par Dell Périphériques de bandes et RBOD externes pris en charge par Dell. Périphériques de bande internes pris en charge par Dell. Support RAID matériel Non Non Tableau 2-1. Caractéristiques des HBA SAS 6 Gb/s et Internal Tape Adapter (suite) Caractéristiques HBA SAS 6 Gbit/s Internal Tape Adapter (ITA)Fonctionnalités des HBA SAS 6 Gb/s et Internal Tape Adapter PowerEdge 11 Fonction de voyant d'activité des ports pour la carte HBA SAS 6 Gb/s uniquement Les contrôleurs HBA SAS 6 Gb/s sont équipés de voyants d'activité des ports ou d'état. Les voyants permettent de déterminer rapidement l'état des ports SAS externes. Chaque connecteur x4 possède son propre jeu de voyants. Le tableau 2-2 répertorie la couleur des voyants et l'état de port SAS correspondant. Tableau 2-2. Description des DEL de connecteur x4 Couleur de DEL État de port SAS Désactivé Cela indique l'un des éléments suivants : • L'appareil est hors tension. • Le port a été réinitialisé. • Toutes les liaisons de port sont déconnectées ou le câble est débranché. Vert Toutes les liaisons du port sont connectées et opérationnelles. Orange Une ou plusieurs liaisons entrantes du port ne sont pas connectées. Applicable uniquement dans une configuration port large.12 Fonctionnalités des HBA SAS 6 Gb/s et Internal Tape Adapter PowerEdgeInstallation du matériel 13 Installation du matériel Ce chapitre décrit l'installation des cartes HBA SAS 6 Gb/s Dell PowerEdge et Internal Tape Adapter (ITA). Les cartes HBA SAS 6 Gb/s Dell PowerEdge et Internal Tape Adapter (ITA) sont disponibles avec le système ou en tant que kit. Lorsque les cartes HBA SAS 6 Gb/s Dell PowerEdge et Internal Tape Adapter (ITA) sont disponibles : • Avec le système : les pilotes sont installés et prêts à être utilisés. • En tant que kit : vous devez installer les pilotes. Pour plus d'informations, voir « Installation des pilotes », à la page 17. Installation des cartes HBA SAS 6 Gb/s Dell PowerEdge et Internal Tape Adapter (ITA) PRÉCAUTION : la plupart des réparations ne peuvent être effectuées que par un technicien de maintenance agréé. N'effectuez que les opérations de dépannage et les petites réparations autorisées par la documentation de votre produit et suivez les instructions fournies en ligne ou par téléphone par l'équipe de maintenance et d'assistance technique. Tout dommage causé par une réparation non autorisée par Dell est exclu de votre garantie. Lisez et respectez les consignes de sécurité fournies avec le produit. 1 Déballez la HBA SAS 6 Gb/s ou l'Internal Tape Adapter et assurez-vous qu'aucun dommage n'existe. REMARQUE : Contacter Dellcontactez Dell si le contrôleur est endommagé. 2 Mettez le système et les périphériques qui y sont connectés hors tension, puis débranchez le système de la prise secteur. Pour en savoir plus sur les blocs d'alimentation, voir le Hardware Owner’s Manual (Manuel du propriétaire du matériel) ou le User’s Guide (Guide d'utilisation) de votre système. 3 Déconnectez le système du réseau et retirez son capot. Pour en savoir plus sur l'ouverture du système, voir le Hardware Owner’s Manual (Manuel du propriétaire du matériel) ou le User’s Guide (Guide d'utilisation) de votre système.14 Installation du matériel 4 Choisissez un logement PCI-e approprié. Lorsque vous ajoutez une carte HBA SAS 6 Gb/s ou Internal Tape Adapter (ITA), retirez le cache de l'arrière du système aligné sur le logement PCI-e que vous avez sélectionné. REMARQUE : pour en savoir plus sur les logements PCI-e, voir le document Hardware Owner’s Manual (Manuel du propriétaire du matériel) du système. 5 Alignez le contrôleur sur le logement PCI-e sélectionné. 6 Insérez le contrôleur dans ce logement. Voir figure 3-1. REMARQUE : la figure 3-1 affiche la HBA SAS 6 Gb/s, mais les instructions d'installation sont les mêmes pour la HBA SAS 6 Gb/s et l'Internal Tape Adapter. Figure 3-1. Installation d'une HBA SAS 6 Gb/s 1 vis du support 2 HBA SAS 6 Gbit/s 3 logement PCI-E 1 2 3Installation du matériel 15 7 Serrez la vis du support, s'il y en a une, ou utilisez les clips de retenue pour fixer le contrôleur au châssis du système. 8 Dans le cas de la carte Internal Tape Adapter, connectez les câbles situés à l'extrémité des périphériques au contrôleurs. Voir la figure 3-2. REMARQUE : bien que l'adaptateur de bande interne dispose de deux connecteurs internes, seul un périphérique de bande interne est pris en charge. Utilisez le connecteur (sur la carte) portant l'étiquette « A ». Figure 3-2. Connexion du câble Internal Tape Adapter 9 Pour le contrôleur HBA SAS 6 Gb/s, connectez le câble du périphérique de bandes ou du boîtier externe à l'adaptateur. Voir la figure 3-3. REMARQUE : le câble externe peut être connecté indifféremment à l'un des deux connecteurs externes. 1 câble 2 connecteur SASx4 interne 3 Internal Tape Adapter 3 2 116 Installation du matériel Figure 3-3. Connexion du câble HBA SAS 6 Gb/s 10 Remettez en place le capot du système. Pour en savoir plus sur la fermeture du système, voir le Hardware Owner’s Manual (Manuel du propriétaire du matériel) ou au User’s Guide (Guide d'utilisation) de votre système. 11 Reconnectez le ou les cordons d'alimentation et câbles réseau, puis mettez le système sous tension. REMARQUE : pour en savoir plus sur la connexion de la HBA SAS 6 Gb/s à un boîtier ou périphérique de bandes externe, voir le Hardware Owner’s Manual (Manuel du propriétaire du matériel) sur le site Web de support Dell à l'adresse support.dell.com/manuals. REMARQUE : les cartes HBA SAS 6 Gb/s et Internal Tape Adapter ne prennent pas en charge l'installation d'un système d'exploitation sur un disque relié à un lecteur HBA SAS 6 Gb/s ou un lecteur de bandes. REMARQUE : les disques durs ne sont pas pris en charge sur l'Internal Tape Adapter. 1 HBA SAS 6 Gbit/s 2 Câble du périphérique de bandes ou boîtier externe 1 2 Installation des pilotes 17 Installation des pilotes Les cartes HBA SAS 6 Gb/s Dell PowerEdge et Internal Tape Adapter nécessitent des pilotes de logiciels pour fonctionner sous Microsoft Windows, Red Hat Enterprise Linux et SUSE Linux. Ce chapitre présente les procédures permettant d'installer les pilotes des systèmes d'exploitation suivants : • Famille de serveurs Microsoft Windows Server 2003 • Famille de serveurs Microsoft Windows Server 2008 • Windows Server 2008 R2 • Red Hat Linux version 5 Mise à jour 7 • SUSE Linux Enterprise Server version 10 Progiciel de service 4 (64 bits uniquement), et version 11 Progiciel de service 2 (64 bits uniquement) Un pilote peut être installé de l'une des trois manières suivantes : • Ajout lors de l'installation du système d'exploitation. • Après avoir ajouté un nouveau contrôleur HBA SAS 6 Gb/s ou Internal Tape Adapter sur un système d'exploitation existant. • Mise à jour des pilotes existants. REMARQUE : pour vérifier que vous avez la dernière version des pilotes mentionnés dans cette section, rendez-vous sur le site web du Support Dell, à l'adresse support.dell.com. Si une version plus récente s'y trouve, vous pouvez la télécharger sur votre système. 18 Installation des pilotes Installation du pilote Windows Cette section présente les procédures à suivre pour installer le pilote Windows. Création du support de pilotes Pour créer le support de pilotes : 1 Sur le site de support de Dell, support.dell.com, accédez à la section de téléchargement correspondant au système. 2 Localisez et téléchargez le pilote de carte HBA SAS 6 Gb/s ou Internal Tape Adapter le plus récent sur le système. 3 Suivez les instructions du site de support de Dell pour extraire le pilote et le stocker sur le support de votre choix. Tâches préalables à l'installation Avant d'installer le système d'exploitation : • Lisez le document Mise en route Microsoft fourni avec le système d'exploitation. • Assurez-vous que votre système est équipé des derniers BIOS et micrologiciel. Assurez-vous que le dernier pilote est disponible pour une installation. Si nécessaire, téléchargez la version la plus récente du BIOS, du micrologiciel et des pilotes à partir du site de support de Dell, à l'adresse support.dell.com. • Créez un support contenant les pilotes de périphériques (disquette, lecteur USB, CD ou DVD). Création d'un disque de pilotes de périphériques Pour créer un support de pilote de périphérique, utilisez l'une des méthodes suivantes décrites dans les sections suivantes :Installation des pilotes 19 Téléchargement de pilotes à l'aide du support Dell Systems Service and Diagnostic Tools 1 Insérez le support Dell Systems Service and Diagnostics Tools dans un système. L'écran Welcome to Dell Service and Diagnostic Utilities (Bienvenue dans les utilitaires Dell de service et de diagnostic) s'affiche. 2 Sélectionnez le modèle et le système d'exploitation de votre système. 3 Cliquez sur Continuer. 4 Sélectionnez le pilote souhaité dans la liste de pilotes affichée, puis procédez comme suit. a Sélectionnez le fichier zip auto-extractible et cliquez sur Exécuter. b Copiez le pilote sur une disquette, un CD, un DVD ou un lecteur USB. c Répétez l'étape 4 pour tous les pilotes nécessaires. 5 Pendant l'installation du système d'exploitation, décrite dans « Installation du pilote pendant l'installation du système d'exploitation Windows Server 2003 », à la page 20 et « Installation du pilote pendant l'installation du système d'exploitation Windows Server 2008 ou Windows Server 2008 R2 », à la page 20, utilisez le disque que vous avez créé avec l'option Charger un pilote pour charger des pilotes de périphérique de stockage de masse. Téléchargement des pilotes à partir du site Web de support Dell 1 Rendez-vous sur le site support.dell.com. 2 Cliquez sur Drivers and Downloads (Pilotes et téléchargements). 3 Entrez le numéro de série du système dans le champ Sélectionner par Nº de service ou sélectionnez le modèle du système. 4 Sélectionnez les options System Type (Type de système), Operating System (Système d'exploitation), Driver Language (Langue du pilote) et Category (Catégorie) appropriées dans la liste déroulante. 5 Celle-ci affiche les pilotes correspondant à vos sélections s'affichent. À partir de la liste, téléchargez les pilotes voulus sur une disquette, une clé USB, un CD ou un DVD. 20 Installation des pilotes 6 Au cours de l'installation du système d'exploitation décrite à la section « Installation du pilote pendant l'installation du système d'exploitation Windows Server 2003 », à la page 20, indiquez le support que vous avez créé à l'aide de l'option Load Driver (Charger un pilote) pour charger des pilotes de stockage de masse. Installation du pilote pendant l'installation du système d'exploitation Windows Server 2003 1 Amorcez le système à l'aide du disque Windows Server 2003. 2 Appuyez sur la touche lorsque le message Press F6 if you need to install a third party SCSI or RAID driver (Appuyer sur F6 si vous avez besoin d'installer un pilote SCSI ou RAID tiers) s'affiche. Un écran vous demandant d'ajouter des contrôleurs supplémentaires dans le système s'affiche. 3 Appuyez sur . Le système vous invite à insérer le support de pilotes dans le lecteur. REMARQUE : utilisez une clé USB formatée pour l'apport du pilote. Pour en savoir plus sur le pilote, accédez au site Web du service de support de Dell, à l'adresse support.dell.com. 4 Insérez le support de pilotes dans le lecteur, puis appuyez sur . Une liste des contrôleurs SAS s'affiche. 5 Sélectionnez le pilote adapté au contrôleur installé et appuyez sur pour charger ce pilote. REMARQUE : si la version de ce pilote ne correspond pas à la version de votre système, un message s'affiche. Pour utiliser le pilote du support, appuyez sur la touche . 6 Appuyez sur pour poursuivre le processus d'installation. Installation du pilote pendant l'installation du système d'exploitation Windows Server 2008 ou Windows Server 2008 R2 1 Amorcez le système à l'aide du disque Windows Server 2008 ou Windows Server 2008 R2. 2 Suivez les instructions à l'écran jusqu'à ce que le message suivant s'affiche : Where do you want to install 2008; (Où souhaitez-vous installer Windows Server 2008 ) Installation des pilotes 21 3 Sélectionnez Load driver... (Charger le pilote) Le système vous invite à insérer le média dans le lecteur. Insérez le support d'installation, puis accédez à l'emplacement approprié lorsque vous y êtes invité. 4 Lorsque vous y êtes invité, sélectionnez la carte appropriée dans la liste, cliquez sur Next (Suivant) et poursuivez l'installation normalement. Installation du pilote de Windows Server 2003, Windows Server 2008 ou Windows Server 2008 R2 pour un nouveau contrôleur RAID 1 Mettez le système hors tension. 2 Installez le nouveau contrôleur dans le système. 3 Mettez le système sous tension. Le système d'exploitation Windows détecte le nouveau contrôleur et affiche un message pour vous le signaler. 4 L'Assistant Found New Hardware Wizard (Nouveau matériel détecté) s'affiche et indique le nom du périphérique détecté. 5 Cliquez sur Suivant. 6 Dans l'écran Locate driver device (Rechercher le pilote de périphérique), sélectionnez Search for a suitable driver for my device (Rechercher un pilote approprié pour mon périphérique), puis cliquez sur Suivant. 7 Vérifiez que les fichiers de pilote sont disponibles et naviguez vers l'emplacement voulu à partir de l'écran Locate driver device. 8 Cliquez sur Suivant. 9 L'Assistant détecte et installe les pilotes de périphérique appropriés pour le nouveau contrôleur. 10 Cliquez sur Terminer pour achever l'installation. 11 Redémarrez le système si Windows vous le demande. REMARQUE : le système d'exploitation Windows Server 2008 R2 comprend un pilote de périphérique qui prend en charge les contrôleurs SAS. Le système détecte automatiquement le nouveau contrôleur et installe le pilote. Vérifiez la version du pilote installé par Windows et mettez-le à jour, le cas échéant.22 Installation des pilotes Mise à jour du pilote Windows Pour mettre à jour le pilote Windows de la carte HBA SAS 6 Gb/s ou Internal Tape Adapter déjà installée sur votre système, effectuez les étapes suivantes : REMARQUE : il importe de penser à fermer toutes les applications ouvertes avant de mettre le pilote à jour. 1 Selon votre système d'exploitation, sélectionnez l'action appropriée dans la liste suivante : • Pour Windows Server 2003 : Cliquez sur Démarrer→ Paramètres→ Panneau de configuration→ Système. • Pour Windows Server 2008 : Cliquez sur Start→ Settings→ Control Panel→ System (Démarrer→ Paramètres→ Panneau de configuration→ Système). • Pour Windows Server 2008 R2 : Cliquez sur Démarrer → Panneau de configuration→ Système et sécurité→ Système. La fenêtre Propriétés système s'affiche. 2 Selon votre système d'exploitation, sélectionnez l'action appropriée dans la liste suivante : • Pour Windows Server 2003 : Cliquez sur l'onglet Hardware (Matériel). • Pour Windows Server 2008 : Cliquez sur Device Manager (Gestionnaire de périphériques). • Windows Server 2008 R2 : Cliquez sur Device Manager (Gestionnaire de périphériques). L'écran Device Manager s'affiche. REMARQUE : sinon, ouvrez le Device Manager. Dans Windows Explorer, cliquez avec le bouton droit sur My Computer (Poste de travail), puis sélectionnez Manage (Gérer). L'écran Computer Management (Gestion de l'ordinateur) s'affiche. Sélectionnez Device Manager dans le volet gauche. 3 Double-cliquez sur Contrôleurs SCSI et RAID. REMARQUE : dans Windows 2008, SAS est listé sous Contrôleurs de stockage.Installation des pilotes 23 4 Double-cliquez sur le contrôleur dont vous souhaitez mettre à jour le pilote. 5 Cliquez sur l'onglet Pilote, puis sur Update Driver (Mettre à jour le pilote). L'Assistant de mise à niveau de pilote de périphérique s'affiche. 6 Insérez le support contenant les fichiers du pilote (clé USB ou autre). 7 Cliquez sur Install from a list or specific location (Installer à partir d'une liste ou d'un emplacement spécifique) 8 Cliquez sur Suivant. 9 Suivez les étapes de l'Assistant et accédez à l'emplacement où sont stockés les fichiers du pilote. 10 Sélectionnez le fichier.inf sur la clé USB (ou autre support). 11 Cliquez sur Suivant et poursuivez l'installation à l'aide de l'Assistant. 12 Cliquez sur Finish (Terminer) pour quitter l'Assistant, puis redémarrez le système pour que les modifications prennent effet. Installation du Pilote Linux Pour installer le pilote pour Linux, suivez les procédures de cette section. Le pilote est fréquemment mis à jour. Pour vous assurer que vous en utilisez la dernière version, téléchargez le pilote Linux le plus récent à partir du site du support de Dell, support.dell.com. Installation du module RPM avec prise en charge DKMS 1 Décompressez le lot de fichiers de pilote tarball au format gzip. 2 Installez l'outil DKMS à l'aide de la commande suivante : rpm –ihv dkms-.noarch.rpm 3 Installez les fichiers de pilote en exécutant la commande suivante : rpm –ihv mpt2sas-.noarch.rpm REMARQUE : utilisez rpm -Uvh pour mettre à jour un module existant. 4 Si la version précédente du pilote de périphérique était utilisée, vous devez redémarrer le système pour que la mise à jour prenne effet. 5 Vérifiez que le pilote a été chargé avec ces commandes système : modinfo mpt2sas and dkms status.24 Installation des pilotes Mise à niveau du noyau Vous devez réinstaller les progiciels de pilotes activés par DKMSlors de la mise à jour d'un nouveau noyau. Pour mettre à jour ou installer le pilote du nouveau noyau : 1 Dans une fenêtre de terminal, tapez la commande suivante : dkms build -m -v -k dkms install -m -v -k 2 Pour vérifier si le pilote est bien installé dans le nouveau noyau, entrez : dkms status Le message suivant s'affiche : , , : installed (, , : installé) 3 Si la version précédente du pilote de périphérique était utilisée, vous devez redémarrer le système pour que la mise à jour prenne effet.BIOS HBA SAS 6 Gb/s 25 BIOS HBA SAS 6 Gb/s Le BIOS des cartes HBA SAS 6 Gb/s Dell PowerEdge et Internal Tape Adapter offre les fonctionnalités suivantes : • Prise en charge de plusieurs contrôleurs SAS • Image de récupération de la ROM BIOS • Messages d'erreur sur l'état de l'auto-test de démarrage • Utilitaire de configuration à interface textuelle accessible pendant l'auto-test de démarrage () Messages de l'auto-test de démarrage Pendant l'auto-test de démarrage, le BIOS affiche des messages contenant les informations d'état et d'identification des contrôleurs. Il affiche également les erreurs détectées lors de l'auto-test de démarrage. La bannière d'identification de l'auto-test de démarrage du BIOS indique le numéro de version du BIOS, les informations de copyright et la version du contrôleur. Au cours de l'auto-test de démarrage, le BIOS affiche également un message vous invitant à lancer l'utilitaire de configuration. Codes des messages d'erreur du BIOS En cas d'erreur du BIOS lors de l'auto-test de démarrage, l'utilitaire de configuration du BIOS vous oblige à reconnaître les erreurs BIOS en interrompant l'auto-test de démarrage après l'affichage du message d'erreur. Pour continuer, appuyez sur une touche du clavier. L'utilitaire de configuration du BIOS permet de choisir de poursuivre ou d'arrêter le démarrage en cas d'erreur. REMARQUE : l'utilitaire de configuration du BIOS ne prend pas en charge l'amorçage du système sur des périphériques connectés aux cartes HBA SAS 6 Gb/s ou Internal Tape Adapter. Le message suivant s'affiche lors du POST pour indiquer que l'amorçage du système est désactivé pour ces contrôleurs : Adapter(s)disabled by user (Adaptateur(s) désactivé(s) par l'utilisateur).26 BIOS HBA SAS 6 Gb/s Utilitaire de configuration Utilisation de l'utilitaire de configuration 1 Démarrez le système. 2 Appuyez sur au cours de l'auto-test de démarrage lorsqu'un message vous y invite. Patientez jusqu'à ce que l'amorçage du système d'exploitation se termine. Redémarrez ensuite le système et faites une nouvelle tentative. REMARQUE : après avoir appuyé sur , appuyez sur la touche de l'adaptateur pour le gérer. REMARQUE : l'utilitaire de configuration ne vous permet pas de configurer les périphériques de bandes et RBOD. Les périphériques de bandes et RBOD ont leur propre interface de gestion de configuration. Fonctions de l'utilitaire de configuration les écrans sont organisés selon une hiérarchie précise. Des conseils de navigation sont affichés au bas de chaque panneau. Les écrans sont les suivants : • Liste des adaptateurs : répertorie toutes les cartes HBA SAS 6 Gb/s et Internal Tape Adapter du système. • Propriétés globales : répertorie les propriétés statiques et modifiables applicables à toutes les cartes HBA SAS 6 Gb/s et Internal Tape Adapter du système. • Propriétés adaptateur : écran principal du contrôleur sélectionné. Répertorie les propriétés statiques et modifiables des cartes HBA SAS 6 Gb/s et Internal Tape Adapter sélectionnées. et affiche un menu qui permet d'accéder à des fenêtres supplémentaires. • Topologie SAS : répertorie la topologie physique correspondant au contrôleur sélectionné. • Propriétés de périphérique : répertorie les propriétés des périphériques physiques rattachés au contrôleur sélectionné. • Propriétés avancées de l'adaptateur : répertorie les propriétés avancées correspondant au contrôleur sélectionné.BIOS HBA SAS 6 Gb/s 27 Écran Quitter REMARQUE : les modifications apportées à l'utilitaire de configuration du BIOS SAS ne prennent effet qu'une fois l'utilitaire fermé. Utilisez la Liste d'adaptateurs et appuyez sur la touche <Échap> pour enregistrer et quitter l'utilitaire de configuration du BIOS SAS. Un écran de sortie similaire apparaît lorsque vous sortez des autres écrans de l'utilitaire de configuration du BIOS SAS. Utilisez les écrans de sortie pour enregistrer vos paramètres.28 BIOS HBA SAS 6 Gb/sDépannage 29 Dépannage Pour des informations de support et de dépannage relatives aux cartes HBA SAS 6 Gb/s Dell PowerEdge ou ITA (Internal Tape Adapter), rendez-vous sur le site Web de support Dell à l'adresse support.dell.com. Problèmes d'ordre général REMARQUE : pour des informations de dépannage supplémentaires, consultez la section OpenManage Storage Services User’s Guide (Guide d'utilisation des services de stockage OpenManage) du site Web de support Dell à l'adresse support.dell.com. Messages d'erreur de l'utilitaire de configuration REMARQUE : si les messages d'erreur continuent de s'afficher, une fois les étapes de résolution effectuées, contactez le Support Dell pour un dépannage avancé. Pour contacter le support technique de Dell, voir « Contacter Dell », à la page 8. • Message : An error occurred while reading non-volatile settings (Une erreur est survenue lors de la lecture de paramètres rémanents) Description : une erreur est survenue au cours de la lecture d'un des paramètres du micrologiciel. Solution suggérée : réinstallez le contrôleur et effectuez un redémarrage. • Message : An error occurred while reading current controller settings (Une erreur est survenue lors de la lecture de paramètres actuels) Description : la configuration et l'initialisation du contrôleur ont échoué. Solution suggérée : redémarrez le système.30 Dépannage • Message : Advanced Device Properties settings not found (Paramètres des propriétés avancées de périphériques introuvables) Description : lecture impossible de données vitales de la page de configuration depuis le micrologiciel. Solution suggérée : flashez de nouveau le micrologiciel et effectuez un redémarrage. • Message : Error obtaining PHY properties configuration information (Une erreur est survenue lors de l'obtention des informations de configuration des propriétés physiques) Description : lecture impossible de données vitales de la page de configuration depuis le micrologiciel. Solution suggérée : flashez de nouveau le micrologiciel et effectuez un redémarrage. • Message : Configuration Utility Options Image checksum error (Erreur de somme de contrôle dans l'image des options de l'utilitaire de configuration) Description : échec de la lecture des options de l'utilitaire de Configuration depuis le flash. Solution suggérée : redémarrez et réessayez. Si l'incident persiste, flashez de nouveau le micrologiciel du contrôleur. • Message : Can't load default Configuration Utility options (Chargement impossible des options de l'utilitaire de configuration) Description : échec de l'allocation de la mémoire pour les options de l'utilitaire Configuration. • Message : An error occurred while writing nonvolatile settings (Une erreur est survenue lors de l'écriture de paramètres rémanents) Description : une erreur s'est produite lors de l'écriture d'un ou de plusieurs paramètres dans le micrologiciel.Dépannage 31 Messages d'erreur du BIOS • Message : Press to enable BIOS (Appuyez sur pour activer le BIOS) Description : lorsque le BIOS est désactivé, vous avez la possibilité de l'activer en accédant à l'utilitaire de Configuration Vous pouvez modifier le paramètre et le définir sur Enabled (Activé) dans l'utilitaire de Configuration. • Message : Adapter configuration may have changed, reconfiguration is recommended! Press CTRL-C to run Dell 6Gbps SAS HBA Configuration Utility… (La configuration de l'adaptateur peut avoir été modifiée. Nous vous recommandons de le reconfigurer ! Appuyez sur CTRL-C pour exécuter l'utilitaire de configuration Dell HBA SAS 6 Gb/s…) Description : démarrez l'utilitaire de Configuration et confirmez la configuration du contrôleur HBA SAS 6 Gb/s ou ITA (Internal Tape Adapter). • Message : Initializing... (Initialisation en cours) Description : ce message s'affiche lorsque le BIOS attend de procéder à l'initialisation. • Message : SAS discovery error (Erreur de découverte SAS) Description : ce message indique qu'une erreur de découverte a été signalée par le micrologiciel. D'autres messages du même type peuvent également s'afficher. Accédez à l'utilitaire de configuration pour identifier la cause de l'erreur. • Message : Device not available at HBA n,HDL n, LUN (Périphérique non disponible au niveau HBA n, HDL n, LUN) Description : le périphérique n'est pas encore opérationnel. Une nouvelle tentative va être effectuée. Si le problème persiste, redémarrez le système. • Message : ERROR! Device is not responding to Read Capacity (ERREUR ! Le périphérique ne répond pas à la Capacité de lecture) Description : le périphérique ne répond pas à la commande de capacité de lecture. Contactez Dell.32 Dépannage • Message : Failed to add device, too many devices! (Échec de l'ajout du périphérique, trop de périphériques !) Description : allocation de ressources pour périphériques supplémentaires impossible. • Message : ERROR! Adapter Malfunctioning! (ERREUR ! Adaptateur en panne !) Description : l'initialisation de l'adaptateur n'a pas abouti. Il est possible que sa configuration soit incorrecte. Rechargez la configuration du BIOS. Lancez à nouveau l'utilitaire de configuration et vérifiez si l'incident persiste ou non • Message : MPT firmware fault (Panne du micrologiciel MTP) Description : l'initialisation de l'adaptateur n'a pas abouti. Il est possible que sa configuration soit incorrecte. Rechargez la configuration du BIOS. Lancez à nouveau l'utilitaire de configuration et vérifiez si l'incident persiste ou non. • Message : Updating Adapter List! (Liste d'adaptateurs en cours de mise à jour !) Description : un nouvel adaptateur pour lequel aucun enregistrement n'est trouvé. Un enregistrement est créé pour ce dernier. • Message : Adapter(s) disabled by user (Adaptateur(s) désactivé(s) par l'utilisateur) Description : un adaptateur a été détecté, mais il a été désactivé dans l'utilitaire de configuration et ne sera pas utilisé par le BIOS. • Message : Adapter configuration may have changed, reconfiguration is recommended! (La configuration de l'adaptateur peut avoir été modifiée. Nous vous recommandons de le reconfigurer !) Description : un contrôleur a été déplacé ou réinstallé sur le système. Ajoutez-le à la séquence d'amorçage à l'aide des ressources disponibles. • Message : Memory allocation failed (Échec de l'allocation de la mémoire) Description : le contrôleur n'a pas pu allouer suffisamment de mémoire pour charger l'utilitaire de configuration, son fichier de chaînes de caractères ou son fichier d'options. Redémarrez le système.Dépannage 33 • Message : Invalid or corrupt image (Image corrompue ou non valide) Description : l'une des images de l'utilitaire de configuration, de son fichier de chaînes de caractères ou de son fichier d'options est corrompue. Rechargez le BIOS. Flashez de nouveau le micrologiciel. • Message : Image upload failed (Échec du chargement de l'image) Description : impossible de charger l'image de l'utilitaire de configuration, son fichier de chaînes de caractères ou son fichier d'options. Rechargez le BIOS. Flashez de nouveau le micrologiciel. • Message : Unable to load the Dell 6 Gbp SAS HBA Configuration Utility (Chargement impossible de l'utilitaire de configuration Dell HBA SAS 6 Gb/s) Description : chargement de l'utilitaire de configuration impossible. Cette erreur suit généralement l'un des quatre messages précédents. • Message : Dell 6 Gbp SAS HBA configuration utility will load after initialization! (L'utilitaire de configuration Dell HBA SAS 6 Gb/s se chargera après l'initialisation !) Description : la commande sert à lancer l'utilitaire de configuration, mais la mémoire disponible est insuffisante. L'utilitaire de configuration se charge (s'amorce) après l'initialisation POST. • Message : MPT BIOS Fault xxh encountered at adapter PCI (xxh, xxh,xxh) (Erreur du BIOS MPT xxh survenue sur l'adaptateur PCI [xxh, xxh, xxh]) Description : – Fault 01 : aucun port d'E/S n'est assigné à l'adaptateur. – Fault 02 : une panne de micrologiciel MPT est survenue. – Fault 03 : aucune image pour l'amorçage du téléchargement du micrologiciel. – Fault 04 : erreur de somme d'amorçage du téléchargement du micrologiciel. – Fault 05 : erreur de matériel IOC. – Fault 06 : erreur de communication du micrologiciel MPT. 34 Dépannage – Fault 07 : erreur de bus maître PCI. – Fault 08 : image de chaîne (messages) introuvable. – Fault 09 : échec d'allocation de mémoire de chaîne. – Fault 0A : échec du chargement de la chaîne. – Fault 0B : image de chaîne non valide. – Fault 0C : configuration IOC non prise en charge. – Fault 0D : délai d'attente de réponse IOC. – Fault 0E : erreur de transmission d'établissement de liaison de sonnette. – Fault 0F : erreur de réception d'établissement de liaison de sonnette. – Fault 10 : aucune adresse d'E/S mappée pour mémoire assignée. – Fault 11 : échec des faits IOC. – Fault 12 : échec de l'initialisation IOC. – Fault 13 : échec d'activation de port. • Message : MPT BIOS Fault xxh encountered at adapter PCI (xxh, xxh,xxh) (Erreur du BIOS MPT xxh survenue sur l'adaptateur PCI [xxh, xxh, xxh]) Description : lorsque xxh est 02 ou 11, une valeur de panne hexadécimale à 4 chiffres peut s'afficher avec ce message. Notez cette valeur pour obtenir de l'aide du support technique. • Message : One or more unsupported device detected! (Un ou plusieurs périphériques non pris en charge détectés !) Description : une erreur de topologie se produit au cours du balayage du périphériques. • Message : SAS Address NOT programmed on controller in slot xx (l'adresse SAS n'est PAS programmée sur le contrôleur se trouvant dans l'emplacement xx) Description : l'adresse SAS (ID universel) est égale à zéro et n'est pas programmée. • Message : Bus master ERROR! (ERREUR du bus maître !) Description : l'activation du bus maître n'a pas été définie pour cette puce.Annexe A : Mise à jour du micrologiciel 35 Mise à jour du micrologiciel Vous pouvez flasher le progiciel de micrologiciel pour mettre à jour l'un des éléments suivants : • Dell PowerEdge • HBA SAS 6 Gbit/s • Micrologiciel de la carte Internal Tape Adapter. Flashez le progiciel de micrologiciel lorsque le contrôleur est en cours d'utilisation. Redémarrez le système pour que toutes les modifications prennent effet. Si un incident se produit pendant le flashage du progiciel de micrologiciel (coupure de courant, etc.), le contrôleur revient à la version précédente du micrologiciel. REMARQUE : si vous flashez le micrologiciel alors que le contrôleur est en cours d'utilisation, vous pourrez constater une réduction des performances de ce dernier. Utilitaire de mise à jour du micrologiciel Vous pouvez exécuter l'utilitaire de mise à jour du progiciel de micrologiciel depuis différents systèmes d'exploitation. Le progiciel de micrologiciel est automatisé et ne nécessite aucune intervention de la part de l'utilisateur. Vous trouverez cet utilitaire sur le support PowerEdge Service and Diagnostic Utilities (Utilitaires de diagnostic et de dépannage PowerEdge) fourni avec le système. La mise à jour doit être effectuée manuellement. Pour les dernières mises à jour et procédures de mise à jour du progiciel de micrologiciel, consultez le site Web de support Dell à l'adresse support.dell.com.36 Annexe A : Mise à jour du micrologiciel Systèmes Dell PowerEdge R910 Mise à jour des informationsRemarques, précautions et avertissements REMARQUE : Une REMARQUE indique des informations importantes qui peuvent vous aider à mieux utiliser votre ordinateur. PRÉCAUTION : Une PRÉCAUTION indique un risque de dommage matériel ou de perte de données en cas de non-respect des instructions. AVERTISSEMENT : un AVERTISSEMENT vous avertit d’un risque d'endommagement du matériel, de blessure corporelle ou même de mort. ____________________ © 2010–2012 Dell Inc. Marques commerciales utilisées dans ce document : Dell™, le logo DELL et PowerEdge™ sont des marques de Dell Inc. Intel ® est une marque déposée d'Intel Corporation aux États-Unis et dans d'autres pays. Microsoft ® , Windows ® et Windows Server ® sont des marques déposées de Microsoft Corporation aux États-Unis et/ou dans d'autres pays. Broadcom ® est une marque déposée de Broadcom Corporation et/ou de ses filiales aux États-Unis et dans certains autres pays.Red Hat Enterprise Linux ® et Enterprise Linux ® sont des marques déposées de Red Hat, Inc. aux États-Unis et dans d'autres pays. 2012 - 06 Rev. A02Mise à jour des informations 3 Mises à jour relatives au retrait des blocs d'alimentation La carte de montage d'E/S dotée d'un port réseau 10G nécessite au moins deux blocs d'alimentation pour l'alimentation de veille du système. Si vous retirez du système les câbles d'alimentation en CA lorsque le système est alimenté en CC, celui-ci peut fonctionner temporairement en dessous du niveau d'alimentation minimal requis. Le journal des événements système (SEL) du contrôleur BMC peut enregistrer des erreurs d'alimentation de la carte de montage VR2/ES et/ou des erreurs fatales PCIe lorsque l'alimentation en CA du système est inférieure au minimal requis. REMARQUE : ces erreurs n'ont pas d'incidence sur le fonctionnement du système. Pour éviter ces erreurs, vérifiez les points suivants : • Le système fonctionne avec au moins deux blocs d'alimentation. • Éteignez le système avant de retirer ou de connecter ses câbles d'alimentation en CA. Limitations du système avec carte de montage E/S de 10 GbE en option La carte de montage E/S de 10 GbE offre deux ports SFP+ 10 Go utilisant un contrôleur Broadcom 57711 et deux ports 1 GbE. Les limitations avec la carte de montage E/S 10 GbE sont les suivantes : • Afin d'assurer la redondance de l'alimentation du système, la carte nécessite le branchement des quatre blocs d'alimentation à la source de courant alternatif. L'alimentation du système devient non redondante si l'un des blocs d'alimentation est retiré. PRÉCAUTION : une panne d'alimentation ou le retrait d'un autre bloc d'alimentation après que l'alimentation du système soit devenue non redondante peut entraîner une panne du système et conduire à la perte de données. • La fonction WOL (Wake On LAN, réveil par le réseau) n'est pas prise en charge sur les ports SFP+ 10 Go à cause de limitations de conception du contrôleur Broadcom 57711. Cependant, la fonction est prise en charge sur les deux ports 1 GbE disponibles sur la carte de montage. 4 Mise à jour des informations Mise à jour de la mémoire système Le système prend en charge des barrettes RDIMM de 32 Go à quatre rangées pour un total maximal de 2 To. Le Tableau 1 présente les configurations de mémoire disponibles avec les barrettes RDIMM 32 Go sur un système à quatre processeurs. Tableau 1. Configuration de mémoire avec barrettes RDIMM 32 Go, par processeur Mises à jour Microsoft Vous trouverez des informations sur les problèmes ci-après sur le site Web d'aide et de support de Microsoft à l'adresse support.microsoft.com : • Les systèmes exécutant Microsoft Windows Server 2003 ou Windows Server 2008 ne peuvent pas passer en mode veille prolongée s'ils sont dotés de plus de 4 Go de mémoire. Pour plus d'informations sur l'activation de l'hibernation sur les systèmes dotés de plus de 4 Go de mémoire, consultez l'article KB888575 de la base de connaissances à l'adresse microsoft.com. • Microsoft Windows Server 2008 R2 ne peut ni être installé ni exécuté sur les systèmes dotés d'1 To de mémoire système. Ce problème peut se produire en modes UEFI (Unified Extensible Firmware Interface) ou en mode BIOS hérité. Pour plus d'informations, consultez l'article KB980598 à l'adresse microsoft.com. • Les systèmes exécutant Microsoft Windows Server 2008 ne prennent pas en charge l'amorçage iSCSI si une carte SD est installée dans leur module SD interne. En outre, l'amorçage iSCSI ne fonctionne pas lorsqu'un périphérique de stockage USB est inséré dans un port du système. Pour plus d'informations, consultez l'article KB968410 à l'adresse microsoft.com. Mode de mémoire Mémoire totale (par processeur) / Mémoire système totale Carte de montage A (capacité de mémoire en Go) Carte de montage B (capacité de mémoire en Go) 1 5 2 6 3 7 4 8 1 5 2 6 3 7 4 8 Puissance et performances optimisées 256 Go / 1 To 32 32 32 32 32 32 32 32 Puissance et performances optimisées 512 Go / 2 To 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32Mise à jour des informations 5 Mémoire flash Le support VFlash fourni par Dell n'est pas partitionné de sorte à pouvoir prendre en charge la fonctionnalité de mémoire flash virtuelle du module iDRAC6 Enterprise. La première fois que vous utilisez la fonctionnalité de mémoire flash virtuelle, vous êtes invité à formater le support à l'aide de l'interface utilisateur du module iDRAC. Limitation d'adresse de Red Hat Enterprise Linux 5.4 avec 1 To (lorsque le mode mémoire RAS n'est pas utilisé) Red Hat Enterprise Linux 5.4 connaît une limitation d'adresse avec une mémoire système de 1 To. Pour installer Red Hat Enterprise Linux 5.4, utilisez le temporisateur mem=1024G. Le système ne démarre pas sur le système d'exploitation si un temporisateur mem=1024G n'est pas utilisé. Pour plus d'informations, consultez l'article de la base de connaissances à l'adresse kbase.redhat.com/faq/docs/DOC-25412. Microsoft Windows Server 2003 R2 SP2 (x64) Edition avec limitation SP2 s'il est doté d'une mémoire système de 1 To (lorsque le mode mémoire RAS n'est pas utilisé) Le système ne démarre pas sur le système d'exploitation avec une mémoire système de 1 To. Pour résoudre ce problème, appliquez l'option sparing (réserve) ou mirror (miroir) au mode de mémoire RAS. Après avoir installé le système d'exploitation, ajoutez un temporisateur mem=1046528 ou /burnmemory=2048 sur le fichier boot.ini avant de désactiver le mode RAS pour les démarrages suivants. Étiquettes des adresses MAC Pour des raisons de sécurité, les étiquettes des adresses MAC de la carte NIC et du module iDRAC6 Enterprise intégrés, apposées sur votre système, ne peuvent pas être remises en place une fois qu'elles ont été enlevées.6 Mise à jour des informations REMARQUE : les étiquettes sont situées sur le panneau d'identification, à l'avant du système. Limitations du système avec une carte de montage PCIe en option La carte de montage PCIe permet d'étendre à 10 le nombre de logements d'extension PCIe disponibles sur le système. À cause de la limitation de l'espace d'adressage d'E/S à 64 Ko sur l'architecture Intel IA32 et à cause de la granularité d'E/S de 4 Ko imposée par les spécifications du pont PCI, vous pouvez dépasser les ressources d'E/S si vous installez des adaptateurs nécessitant un espace d'adressage d'E/S de plus de 4 Ko. L'auto-test de démarrage ne s'effectue pas si l'espace d'adressage d'E/S de 64 Ko est dépassé. Pour plus d'informations sur les adaptateurs pris en charge, consultez le document Dell PowerEdge R910 Hardware Owner's Manual (Dell PowerEdge R910 - Manuel du propriétaire) à l'adresse support.dell.com/manuals. Informations sur le progiciel de mise à jour Dell Au cours du processus d'installation du progiciel de mise à jour Dell, il est possible que des messages concernant ce qui suit apparaissent : • Demande de redémarrage du système avant la fin de l'installation du progiciel de mise à jour • Détection de matériel par Windows • Problème de configuration du matériel dans Windows • Nouvelle énumération de VFlash et des modifications provisoires de lettres d'unité dans Windows Il est recommandé de désactiver l'OS Watchdog Timer (temporisateur de surveillance du système d'exploitation) pendant l'exécution du progiciel de mise à jour Dell du BIOS. Le système risque de redémarrer pendant une mise à jour et d'endommager la mémoire flash si : • L'OS Watchdog Timer (Temporisateur de surveillance du système d'exploitation) du BIOS système est activé. • Le temporisateur expire (s'il a été configuré trop court)Mise à jour des informations 7 Regroupement («teaming») des cartes réseau Le système dispose de cartes réseau Broadcom intégrées qui peuvent être associées à d'autres fournisseurs tels qu'Intel. Il est recommandé d'utiliser dans ce cas le pilote de regroupement Broadcom. Limitation d'emplacement d'adaptateur de stockage PERC H800 Dell (avec PERC H700i comme contrôleur de stockage interne) Le système prend en charge jusqu'à deux adaptateurs PERC H800. Il n'y a pas de limitation d'emplacements lorsqu'un seul adaptateur H800 est installé. Cependant, si vous installez deux adaptateurs H800 sur un système doté d'un adaptateur de stockage interne PERC H700i, un des adaptateurs H800 doit être installé à l'emplacement 7 (emplacement Gen 2 x16). Si vous exécutez des diagnostics système intégrés sans avoir installé d'adaptateur H800 à l'emplacement 7, cela génère une erreur logicielle. Dans le même cas de figure, si vous activez la fonction CSIOR (Collect System Inventory on Restart, Inventaire du système de collecte au redémarrage), vous risquez de ne pas pouvoir démarrer sur le système d'exploitation. Vous pouvez activer/désactiver la fonction CSIOR via l'utilitaire de configuration iDRAC en appuyant sur pendant le démarrage. Pour plus d'informations, consultez iDRAC User's Guide (Guide d'utilisation d'iDRAC) à l'adresse support.dell.com/manuals. Limitations des services système de Dell Lifecycle Controller (contrôleur de cycle de vie) Tableau 2. Problèmes liés aux services système de Lifecycle Controller Problème Action recommandée Certains disques virtuels de SAS6/iR ou PERC H200 sont dans un état de fonctionnement inactif ou non optimal. Activez les disques virtuels avant de redémarrer à partir de Lifecycle Controller. PERC H200 ou HBA SAS 6 Gbps sont configurés avec deux disques virtuels. Il s'agit d'un problème connu. Ne créez pas de disques virtuels multiples avec PERC H200 ou HBA SAS 6 Gbps.8 Mise à jour des informations Mises à jour du Manuel du propriétaire Paramètres des cavaliers de la carte système Cette mise à jour des informations remplace les informations contenues dans le Hardware Owner’s Manual (Manuel du propriétaire) sur le site support.dell.com/manuals. Pour identifier les connecteurs de la carte système, reportez-vous à la section Figure 1. Tableau 3. Paramètres des cavaliers de la carte système Cavalier Paramètre Description PSWD_EN (par défaut) La fonction de mot de passe est activée (broches 2 à 4) La fonction de mot de passe est désactivée et l'accès local à la carte iDRAC6 est déverrouillé lors du prochain cycle d'alimentation secteur (broches 4 à 6) NVRAM_CLR (par défaut) Les paramètres de configuration sont conservés au démarrage du système (broches 3 à 5). Les paramètres de configuration sont effacés au prochain démarrage du système (broches 1 à 3).Mise à jour des informations 9 Figure 1. Cavaliers de la carte système10 Mise à jour des informations Mise à jour des paramètres par défaut des options de configuration du BIOS Mode de redondance des blocs d'alimentation (avec une carte d'E/S de 10 Go) Le mode de redondance pour une configuration de système redondant doté d'une carte d'E/S de 10 Go et de quatre modules d'alimentation est : 2+1. Tableau 4. Paramètres par défaut des options de configuration du BIOS Écran Option Option par défaut Memory Settings (Paramètres de la mémoire) System Memory Testing (Test de la mémoire système) Désactivé Power Management (Gestion de l'alimentation) Power Management (Gestion de l'alimentation) Active Power Controller (Contrôleur d'alimentation actif) Integrated Devices (Périphériques intégrés) SR-IOV Global Enable (Activation des périphériques SR-IOV avec la commande globale) Désactivé SATA Settings (Paramètres SATA) Embedded SATA (SATA intégré) ATA Mode (Mode ATA)Mise à jour des informations 11 Mémoire système Pour installer et retirer les barrettes de mémoire si votre système est doté d'une carte de montage de mémoire comme sur la Figure 2, suivez la procédure ci-dessous. Installation de barrettes de mémoire AVERTISSEMENT : les barrettes de mémoire restent chaudes un certain temps après la mise hors tension du système. Attendez qu'elles refroidissent avant de les manipuler. Tenez-les par les bords en évitant de toucher leurs composants. PRÉCAUTION : la plupart des réparations ne peuvent être effectuées que par un technicien de maintenance agréé. N'effectuez que les opérations de dépannage et les petites réparations autorisées par la documentation de votre produit et suivez les instructions fournies en ligne ou par téléphone par l'équipe de maintenance et d'assistance technique. Tout dommage causé par une réparation non autorisée par Dell est exclu de votre garantie. Consultez et respectez les consignes de sécurité fournies avec votre produit. 1 Mettez le système et les périphériques qui y sont connectés hors tension, puis débranchez le système de la prise secteur. 2 Ouvrez le système. Voir « Opening the System » (Ouverture du système) dans le Manuel du propriétaire. 3 Retirez les cartes de montage de mémoire. Voir « Removing a Memory Riser » (Retrait d'une carte de montage de mémoire) dans le Manuel du propriétaire. 4 Appuyez sur les deux pattes de dégagement jusqu'à ce que le capot de la barrette de mémoire soit débloqué puis soulevez-le en suivant la flèche. Voir Figure 2. 5 Appuyez sur les éjecteurs du support de barrette de mémoire puis dégagez­les, comme illustré à la Figure 3-9 du Manuel du propriétaire. 6 Alignez le connecteur de bord de la barrette de mémoire sur le repère du support, puis insérez la barrette dans le support. REMARQUE : le support de barrette de mémoire est doté d'un repère qui permet d'insérer la barrette dans le bon sens. 7 Appuyez sur la barrette de mémoire avec les pouces afin de l'enclencher dans le support.12 Mise à jour des informations Si la barrette de mémoire est installée correctement, les pattes d'éjection du support s'alignent sur celles des autres supports pourvus de barrettes de mémoire. Répétez la procédure de l'étape 5 à l'étape 7 afin d'installer les barrettes restantes. Consultez les tableaux 3-1 et 3-2 du Manuel du propriétaire. 8 Appuyez sur les quatre languettes puis fermez le capot de la barrette de mémoire. Voir Figure 3. 9 Installez les cartes de montage de mémoire. Voir « Installing a Memory Riser » (Installation d'une carte de montage de mémoire) dans le Manuel du propriétaire. 10 Refermez le système. Voir « Closing the System » (Fermeture du système) dans le Manuel du propriétaire. 11 Rebranchez le système à la prise secteur et mettez-le sous tension, ainsi que les périphériques qui y sont connectés. 12 Appuyez sur pour accéder au programme de configuration du système, puis vérifiez le paramètre System Memory (Mémoire système) dans l'écran principal System Setup (Configuration du système). 13 Le système doit normalement avoir déjà modifié la valeur pour prendre en compte la mémoire qui vient d'être installée. 14 Si la valeur est incorrecte, il se peut qu'une ou plusieurs des barrettes de mémoire ne soient pas installées correctement. Recommencez la procédure décrite de l'étape 2 à l'étape 13 en vérifiant que les barrettes de mémoire sont correctement emboîtées dans leurs supports. 15 Exécutez le test de mémoire des diagnostics du système. Voir « Running the Embedded System Diagnostics » (Exécution des diagnostics système intégrés) dans le Manuel du propriétaire. Mise à jour des informations 13 Figure 2. Installation et retrait d'une barrette de mémoire 1 pattes de dégagement (2) 2 poignée 3 carte de montage de mémoire 4 bouton de dégagement 5 guide de la carte 6 connecteur de carte de montage de mémoire 1 3 2 4 5 614 Mise à jour des informations Retrait de barrettes de mémoire AVERTISSEMENT : les barrettes de mémoire restent chaudes un certain temps après la mise hors tension du système. Attendez qu'elles refroidissent avant de les manipuler. Tenez-les par les bords en évitant de toucher leurs composants. PRÉCAUTION : la plupart des réparations ne peuvent être effectuées que par un technicien de maintenance agréé. N'effectuez que les opérations de dépannage et les petites réparations autorisées par la documentation de votre produit et suivez les instructions fournies en ligne ou par téléphone par l'équipe de maintenance et d'assistance technique. Tout dommage causé par une réparation non autorisée par Dell est exclu de votre garantie. Consultez et respectez les consignes de sécurité fournies avec votre produit. PRÉCAUTION : Pour assurer un refroidissement correct du système, vous devez installer un cache dans chaque support de barrette de mémoire vacant. Ne retirez un cache que si vous envisagez d'installer une barrette de mémoire à sa place. 1 Mettez le système et les périphériques qui y sont connectés hors tension, puis débranchez le système de la prise secteur. 2 Ouvrez le système. Voir « Opening the System » (Ouverture du système) dans le Manuel du propriétaire. 3 Retirez les cartes de montage de mémoire. Voir « Removing a Memory Riser » (Retrait d'une carte de montage de mémoire) dans le Manuel du propriétaire. 4 Appuyez sur les languettes dans le sens indiqué par les flèches et retirez le capot des barrettes de mémoire. Voir Figure 3. PRÉCAUTION : tenez chaque barrette par les bords, sans toucher la partie centrale. 5 Appuyez sur les pattes d'éjection situées de part et d'autre du support pour éjecter la barrette de mémoire. 6 Appuyez sur les quatre languettes puis fermez le capot de la barrette de mémoire. Voir Figure 3.Mise à jour des informations 15 Figure 3. Retrait et installation du capot de la barrette de mémoire 7 Installez les cartes de montage de mémoire. Voir « Installing a Memory Riser » (Installation d'une carte de montage de mémoire) dans le Manuel du propriétaire. 8 Refermez le système. Voir « Closing the System » (Fermeture du système) dans le Manuel du propriétaire. 9 Rebranchez le système et les périphériques à leur source d'alimentation, puis mettez-les sous tension. 1 patte de dégagement 2 capot de la barrette de mémoire 3 languettes (4) 2 1 316 Mise à jour des informations Systèmes Dell PowerEdge R420 Manuel du propriétaire Modèle réglementaire: E18S Series Type réglementaire: E18S001Remarques, précautions et avertissements REMARQUE: Une REMARQUE indique des informations importantes qui peuvent vous aider à mieux utiliser l'ordinateur. PRÉCAUTION: Une PRÉCAUTION indique un risque de dommage matériel ou de perte de données et vous indique comment éviter le problème. AVERTISSEMENT: Un AVERTISSEMENT indique un risque d'endommagement du matériel, de blessure corporelle ou de mort. Les informations que contient ce document sont sujettes à modification sans préavis. © 2012 Dell Inc. Tous droits réservés. La reproduction de ce document, de quelque manière que ce soit, sans l'autorisation écrite de Dell Inc. est strictement interdite. Marques commerciales utilisées dans ce document : Dell™, le logo Dell, Dell Precision™, OptiPlex™, Latitude™, PowerEdge™, PowerVault™, PowerConnect™, OpenManage™, EqualLogic™, Compellent™, KACE™, FlexAddress,™ Force10™ et Vostro™ sont des marques de Dell Inc. Intel®, Pentium®, Xeon®, Core® et Celeron® sont des marques déposées d'Intel Corporation aux États-Unis et dans d'autres pays. AMD® est une marque déposée, et AMD Opteron™, AMD Phenom™ et AMD Sempron™ sont des marques commerciales d'Advanced Micro Devices, Inc. Microsoft®, Windows®, Windows Server®, Internet Explorer®, MS-DOS®, Windows Vista® et Active Directory® sont des marques ou des marques déposées de Microsoft Corporation aux États-Unis et/ou dans d'autres pays. Red Hat® et Red Hat® Enterprise Linux® sont des marques déposées de Red Hat, Inc. aux États-Unis et/ou d'autres pays. Novell® et SUSE® sont des marques déposées de Novell Inc. aux États-Unis et dans d'autres pays. Oracle® est une marque déposée d'Oracle Corporation et/ou de ses filiales. Citrix®, Xen®, XenServer® et XenMotion® sont des marques ou des marques déposées de Citrix Systems, Inc. aux États-Unis et/ou dans d'autres pays. VMware®, Virtual SMP®, vMotion®, vCenter® et vSphere® sont des marques ou des marques déposées de VMware, Inc. aux États-Unis ou dans d'autres pays. IBM® est une marque déposée d'International Business Machines Corporation. D'autres marques et noms commerciaux peuvent être utilisés dans cette publication pour faire référence aux entités se réclamant de ces marques et noms ou à leurs produits. Dell Inc. rejette tout intérêt exclusif dans les marques et noms ne lui appartenant pas. 2012 - 03 Rev. A00Table des matières Remarques, précautions et avertissements..............................................................................2 Chapitre 1: À propos du système.................................................................................................9 Voyants et fonctions du panneau avant...................................................................................................................9 Fonctionnalités de l'écran LCD...............................................................................................................................13 Écran d'accueil................................................................................................................................................14 Menu Configuration..........................................................................................................................................14 Menu Vue.........................................................................................................................................................15 Voyants de diagnostic............................................................................................................................................15 Codes des voyants des disques durs.....................................................................................................................17 Voyants et caractéristiques du panneau arrière....................................................................................................18 Codes des voyants de carte réseau.......................................................................................................................19 Codes du voyant d'alimentation.............................................................................................................................19 Autres informations utiles.......................................................................................................................................20 Chapitre 2: Utilisation du gestionnaire de configuration du système et d'amorçage......21 Choix du mode d'amorçage du système.................................................................................................................21 Accès à la configuration du système.....................................................................................................................22 Réponse aux messages d'erreur.....................................................................................................................22 Utilisation des touches de navigation de la configuration du système...........................................................22 Options de configuration du système.....................................................................................................................23 Écran principal System Setup (Configuration du système)..............................................................................23 Écran System BIOS (BIOS du système)...........................................................................................................23 Écran System Information (Informations sur le système)................................................................................24 Écran Memory Settings (Paramètres de la mémoire)......................................................................................24 Écran Processor Settings (Paramètres du processeur)..................................................................................25 Écran SATA Settings (Paramètres SATA)........................................................................................................26 Écran Boot Settings (Paramètres d'amorçage)...............................................................................................27 Écran Integrated Devices (Périphériques intégrés)........................................................................................28 Écran Serial Communications (Communications série)...................................................................................29 Écran System Profile Settings (Paramètres du profil du système)..................................................................30 Écran System Security (Sécurité du système).................................................................................................31 Paramètres divers............................................................................................................................................32 Fonctionnalités de mot de passe du système et de mot de passe de configuration..............................................33 Attribution d'un mot de passe système et/ou de configuration.......................................................................33 Suppression ou modification d'un mot de passe de configuration..................................................................34 Protection du système à l'aide d'un mot de passe système............................................................................35Utilisation du système avec un mot de passe de configuration activé............................................................35 Accès au Gestionnaire d'amorçage UEFI...............................................................................................................35 Utilisation des touches de navigation du Gestionnaire d'amorçage...............................................................36 Écran Boot Manager (Gestionnaire d'amorçage)............................................................................................36 Menu UEFI Boot (Amorçage UEFI)...................................................................................................................37 Gestion intégrée du système..................................................................................................................................37 Utilitaire de configuration iDRAC............................................................................................................................37 Accès à l'utilitaire de configuration iDRAC......................................................................................................38 Chapitre 3: Installation des composants du système.............................................................39 Outils recommandés...............................................................................................................................................39 Cadre avant (en option)..........................................................................................................................................39 Installation du cadre avant...............................................................................................................................39 Retrait du cadre avant......................................................................................................................................40 Ouverture et fermeture du système........................................................................................................................40 Ouverture du système......................................................................................................................................40 Fermeture du système......................................................................................................................................41 À l'intérieur du système..........................................................................................................................................41 Carénage de refroidissement.................................................................................................................................44 Retrait du carénage de refroidissement..........................................................................................................44 Installation du carénage de refroidissement...................................................................................................45 Mémoire système...................................................................................................................................................45 Consignes générales pour l'installation des barrettes de mémoire................................................................47 Consignes spécifiques à chaque mode...........................................................................................................47 Retrait de barrettes de mémoire......................................................................................................................50 Installation de barrettes de mémoire...............................................................................................................51 Disques durs...........................................................................................................................................................52 Retrait d'un cache de lecteur de disque dur de 2,5 pouces............................................................................53 Installation d'un cache de lecteur de disque dur de 2,5 pouces.....................................................................53 Retrait d'un cache de disque dur de 3,5 pouces..............................................................................................54 Installation d'un cache de lecteur de disque dur de 3,5 pouces.....................................................................54 Retrait d'un disque dur remplaçable à chaud..................................................................................................54 Installation d'un disque dur remplaçable à chaud...........................................................................................55 Retrait d'un disque dur connecté par câble.....................................................................................................56 Installation d'un disque dur connecté par câble.............................................................................................57 Retrait d'un disque dur de 2,5 pouces depuis un adaptateur de disque dur de 3,5 pouces............................57 Installation d'un disque dur de 2,5 pouces dans un adaptateur de disque dur de 3,5 pouces........................58 Retrait d'un disque dur ou un adaptateur de disque dur depuis un support de disque dur............................58 Installation d'un disque dur ou un adaptateur de disque dur dans un support de disque dur........................61 Lecteur optique (en option).....................................................................................................................................62 Retrait d'un lecteur optique dans des systèmes de disques durs remplaçables à chaud..............................62 Installation d'un lecteur optique dans des systèmes de disques durs remplaçables à chaud.......................63Retrait d'un lecteur optique dans des systèmes de disques durs connectés par câble.................................63 Installation d'un lecteur optique dans des systèmes de disques durs connectés par câble..........................65 Ventilateurs.............................................................................................................................................................65 Retrait d'un ventilateur.....................................................................................................................................65 Installation d'un ventilateur..............................................................................................................................66 Clé de mémoire USB interne (en option)................................................................................................................67 Remplacement de la clé USB interne..............................................................................................................67 Cartes d'extension et cartes de montage pour cartes d'extension.......................................................................68 Consignes d'installation des cartes d'extension.............................................................................................68 Retrait d'une carte d'extension........................................................................................................................69 Installation d'une carte d'extension.................................................................................................................71 Retrait des cartes de montage pour cartes d'extension 1 et 2........................................................................71 Installation des cartes de montage pour cartes d'extension 1 et 2.................................................................73 Cartes de ports iDRAC (en option)..........................................................................................................................73 Retrait de la carte de ports iDRAC...................................................................................................................73 Installation de la carte de ports iDRAC............................................................................................................74 Carte SD vFlash.......................................................................................................................................................75 Remplacement de la carte SD vFlash..............................................................................................................75 Module SD interne double......................................................................................................................................76 Retrait du module SD interne double...............................................................................................................76 Installation du module SD interne double........................................................................................................77 Carte SD interne.....................................................................................................................................................78 Retrait d'une carte SD interne.........................................................................................................................78 Installation d'une carte SD interne..................................................................................................................78 Carte contrôleur de stockage intégrée...................................................................................................................79 Retrait de la carte contrôleur de stockage intégrée........................................................................................79 Installation de la carte contrôleur de stockage intégrée.................................................................................80 Processeurs............................................................................................................................................................81 Retrait d'un processeur....................................................................................................................................81 Installation d'un processeur............................................................................................................................83 Blocs d'alimentation...............................................................................................................................................85 Alimentation de rechange................................................................................................................................85 Retrait d'un bloc d'alimentation redondant......................................................................................................85 Installation d'un bloc d'alimentation redondant..............................................................................................86 Retrait d'un bloc d'alimentation non redondant...............................................................................................87 Installation d'un bloc d'alimentation non redondant.......................................................................................88 Retrait du cache de bloc d'alimentation..........................................................................................................88 Installation du cache de bloc d'alimentation...................................................................................................89 Pile du système.......................................................................................................................................................89 Remplacement de la pile du système...............................................................................................................89 Fond de panier des disques durs............................................................................................................................90 Retrait du fond de panier des disques durs.....................................................................................................90Installation du fond de panier des disques durs..............................................................................................94 Assemblage du panneau de commande................................................................................................................95 Retrait du panneau de commande...................................................................................................................95 Installation du panneau de commande............................................................................................................96 Retrait du module du panneau de commande.................................................................................................97 Installation du module du panneau de commande........................................................................................100 Module VGA..........................................................................................................................................................101 Retrait du module VGA...................................................................................................................................101 Installation du module VGA............................................................................................................................102 Carénage de la carte de distribution d'alimentation............................................................................................102 Retrait du carénage de la carte de distribution d'alimentation.....................................................................102 Installation du carénage de la carte de distribution d'alimentation..............................................................103 Carte de distribution d'alimentation.....................................................................................................................104 Retrait de la carte de distribution d'alimentation...........................................................................................104 Installation de la carte de distribution d'alimentation...................................................................................105 Carte système.......................................................................................................................................................105 Retrait de la carte système............................................................................................................................105 Installation de la carte système.....................................................................................................................106 Chapitre 4: Dépannage du système........................................................................................109 La sécurité en priorité, pour vous et votre système.............................................................................................109 Dépannage des échecs de démarrage du système.............................................................................................109 Dépannage des connexions externes..................................................................................................................109 Dépannage du sous-système vidéo......................................................................................................................109 Dépannage d'un périphérique USB......................................................................................................................109 Dépannage d'un périphérique d'E/S série............................................................................................................110 Dépannage d'une carte réseau............................................................................................................................110 Dépannage d'un système mouillé.........................................................................................................................111 Dépannage d'un système endommagé................................................................................................................111 Dépannage de la pile du système.........................................................................................................................112 Dépannage des blocs d'alimentation...................................................................................................................112 Dépannage des problèmes de refroidissement...................................................................................................113 Dépannage des ventilateurs de refroidissement.................................................................................................113 Dépannage de la mémoire système.....................................................................................................................113 Dépannage d'une clé USB interne.......................................................................................................................114 Dépannage d'une carte SD..................................................................................................................................115 Dépannage d'un lecteur optique..........................................................................................................................115 Dépannage d'une unité de sauvegarde sur bande..............................................................................................116 Dépannage d'un disque dur..................................................................................................................................116 Dépannage d'un contrôleur de stockage.............................................................................................................117 Dépannage des cartes d'extension......................................................................................................................118 Dépannage des processeurs................................................................................................................................118Chapitre 5: Utilisation des diagnostics du système..............................................................121 Dell Online Diagnostics.........................................................................................................................................121 Diagnostics du système intégré Dell....................................................................................................................121 Quand utiliser les diagnostics intégrés du système......................................................................................121 Exécution des diagnostics intégrés du système............................................................................................121 Commandes du diagnostic du système..........................................................................................................122 Chapitre 6: Cavaliers et connecteurs......................................................................................123 Paramètres des cavaliers de la carte système....................................................................................................123 Connecteurs de la carte système.........................................................................................................................124 Désactivation d'un mot de passe oublié...............................................................................................................125 Chapitre 7: Caractéristiques techniques................................................................................127 Chapitre 8: Messages système................................................................................................131 Messages LCD......................................................................................................................................................131 Affichage des messages sur l'écran LCD......................................................................................................131 Suppression des messages affichés sur l'écran LCD....................................................................................131 Messages d'erreur du système............................................................................................................................131 Messages d'avertissement..................................................................................................................................150 Messages de diagnostic.......................................................................................................................................150 Messages d'alerte................................................................................................................................................151 Chapitre 9: Obtention d'aide.....................................................................................................153 Contacter Dell.......................................................................................................................................................15381 À propos du système Voyants et fonctions du panneau avant Figure 1. Voyants et fonctions du panneau avant : système quatre disques durs de 3,5 pouces Élément Voyant, bouton ou connecteur Icône Description 1 Voyant de mise sous tension, bouton d'alimentation Le voyant de mise sous tension s'allume lorsque le système est allumé. Le bouton d'alimentation contrôle l'alimentation fournie au système. REMARQUE: Si vous éteignez un ordinateur utilisant un système d'exploitation compatible ACPI en appuyant sur le bouton d'alimentation, le système peut effectuer un arrêt normal avant la mise hors tension de l'ordinateur. 2 Bouton NMI Ce bouton permet de résoudre les erreurs liées aux logiciels ou aux pilotes de périphériques rencontrées avec certains systèmes d'exploitation. Appuyez sur ce bouton à l'aide de la pointe d'un trombone. Appuyez sur ce bouton uniquement si un technicien de support qualifié vous indique de le faire ou si cela est indiqué dans la documentation du système d'exploitation. 3 Bouton d'identification du système Les boutons d'identification des panneaux avant et arrière peuvent servir à identifier un système spécifique au sein d'un rack. Si l'un de ces boutons est activé, l'écran LCD du panneau avant et le voyant d'état du système situé sur le panneau arrière clignotent jusqu'à ce que l'utilisateur appuie de nouveau sur l'un des boutons. Appuyez rapidement pour activer ou désactiver l'ID du système. En cas de blocage du système durant l'exécution de l'auto-test de démarrage, appuyez sur le bouton de l'ID du système pendant plus de 5 secondes pour accéder au mode d'avancement du BIOS. 9Élément Voyant, bouton ou connecteur Icône Description Pour réinitialiser l'iDRAC (s'il n'a pas été désactivé au cours de la configuration iDRAC F2) appuyez sur le bouton et maintenez-le enfoncé pendant plus de 15 secondes. 4 Connecteur vidéo Permet de connecter un moniteur VGA au système. 5 Boutons de menu de l'écran LCD Permettent de naviguer dans le menu de l'écran LCD du panneau de commande. 6 Écran LCD Affiche l'ID du système, les informations d'état et les messages d'erreur du système. L'écran LCD est bleu lorsque le système fonctionne normalement. Il est orange lorsque le système nécessite une intervention. Il affiche alors un code d'erreur suivi d'un texte descriptif. REMARQUE: Si le système est connecté à l'alimentation secteur et si une erreur a été détectée, l'écran LCD est orange, que le système soit allumé ou non. 7 Connecteurs USB (2) Permet de connecter des périphériques USB au système. Les ports sont compatibles USB 2.0. 8 Plaquette d'information Une étiquette amovible vous permet d'enregistrer les informations sur le système, telles que le code de service, la carte réseau et l'adresse MAC, etc. 9 Lecteur optique (en option) Un lecteur SATA DVD-ROM ou DVD+/-RW ultramince. 10 Disques durs Jusqu'à quatre disques durs remplaçables à chaud de 2,5 ou 3,5 pouces ou SSD. Figure 2. Voyants et fonctions du panneau avant : système de huit disques durs de 2,5 pouces Élément Voyant, bouton ou connecteur Icône Description 1 Voyant de mise sous tension, bouton d'alimentation Le voyant de mise sous tension s'allume lorsque le système est allumé. Le bouton d'alimentation contrôle l'alimentation fournie au système. 10Élément Voyant, bouton ou connecteur Icône Description REMARQUE: Si vous éteignez un ordinateur utilisant un système d'exploitation compatible ACPI en appuyant sur le bouton d'alimentation, le système peut effectuer un arrêt normal avant la mise hors tension de l'ordinateur. 2 Bouton NMI Ce bouton permet de résoudre les erreurs liées aux logiciels ou aux pilotes de périphériques rencontrées avec certains systèmes d'exploitation. Appuyez sur ce bouton à l'aide de la pointe d'un trombone. Appuyez sur ce bouton uniquement si un technicien de support qualifié vous indique de le faire ou si cela est indiqué dans la documentation du système d'exploitation. 3 Bouton d'identification du système Les boutons d'identification des panneaux avant et arrière peuvent servir à identifier un système spécifique au sein d'un rack. Si l'un de ces boutons est activé, l'écran LCD du panneau avant et le voyant d'état du système situé sur le panneau arrière clignotent jusqu'à ce que l'utilisateur appuie de nouveau sur l'un des boutons. Appuyez rapidement pour activer ou désactiver l'ID du système. En cas de blocage du système durant l'exécution de l'auto-test de démarrage appuyez sur le bouton de l'ID du système pendant plus de 5 secondes pour accéder au mode d'avancement du BIOS. Pour réinitialiser l'iDRAC (s'il n'a pas été désactivé au cours de la configuration iDRAC F2) appuyez sur le bouton et maintenez-le enfoncé pendant plus de 15 secondes. 4 Connecteurs USB (2) Permet de connecter des périphériques USB au système. Les ports sont compatibles USB 2.0. 5 Lecteur optique (en option) Un lecteur SATA DVD-ROM ou DVD+/-RW ultramince. 6 Boutons de menu de l'écran LCD Permettent de naviguer dans le menu de l'écran LCD du panneau de commande. 7 Écran LCD Affiche l'ID du système, les informations d'état et les messages d'erreur du système. L'écran LCD est bleu lorsque le système fonctionne normalement. Il est orange lorsque le système nécessite une intervention. Il affiche alors un code d'erreur suivi d'un texte descriptif. REMARQUE: Si le système est connecté à l'alimentation secteur et si une erreur a été détectée, l'écran LCD est orange, que le système soit allumé ou non. 8 Plaquette d'information Une étiquette amovible qui vous permet d'enregistrer des informations sur le système, telles que le code de service, la carte réseau et l'adresse MAC, etc. 11Élément Voyant, bouton ou connecteur Icône Description 9 Connecteur vidéo Permet de connecter un moniteur VGA au système. 10 Disques durs Jusqu'à huit disques durs échangeables à chaud de 2,5 pouces. Figure 3. Voyants et fonctions du panneau avant : système quatre disques durs de 3,5 pouces Élément Voyant, bouton ou connecteur Icône Description 1 Voyant de mise sous tension, bouton d'alimentation Le voyant de mise sous tension s'allume lorsque le système est allumé. Le bouton d'alimentation contrôle l'alimentation fournie au système. REMARQUE: Si vous éteignez un ordinateur utilisant un système d'exploitation compatible ACPI en appuyant sur le bouton d'alimentation, le système peut effectuer un arrêt normal avant la mise hors tension de l'ordinateur. 2 Bouton NMI Ce bouton permet de résoudre les erreurs liées aux logiciels ou aux pilotes de périphériques rencontrées avec certains systèmes d'exploitation. Appuyez sur ce bouton à l'aide de la pointe d'un trombone. Appuyez sur ce bouton uniquement si un technicien de support qualifié vous indique de le faire ou si cela est indiqué dans la documentation du système d'exploitation. 3 Bouton d'identification du système Les boutons d'identification du système qui se trouvent sur les panneaux avants et arrières peuvent être utilisés pour localiser un système particulier dans un rack. Lorsque vous appuyez sur un de ces boutons, le voyant d'état de système qui se trouve à l'arrière clignote jusqu'à ce que vous appuyiez de nouveau sur un des boutons. Appuyez pour faire basculer l'ID du système. Si le système cesse de répondre pendant l'auto-test de démarrage, appuyez sur le bouton de l'ID du système et maintenez-le enfoncé pendant plus de cinq secondes pour entrer en mode d'avancement du BIOS. Pour réinitialiser l'iDRAC (si non désactivé pendant la configuration iDRAC F2) appuyez sur le bouton et maintenez-le enfoncé pendant plus de 15 secondes. 4 Connecteur vidéo Permet de connecter un moniteur VGA au système. 12Élément Voyant, bouton ou connecteur Icône Description 5 Voyants de diagnostic Les voyants de diagnostic s'allument pour afficher l'état d'erreur. 6 Connecteurs USB (2) Permet de connecter des périphériques USB au système. Les ports sont compatibles USB 2.0. 7 Plaquette d'information Une étiquette amovible vous permet d'enregistrer des informations sur le système, telles que le code de service, la carte réseau et l'adresse MAC, etc. 8 Lecteur optique (en option) Un lecteur SATA DVD-ROM ou DVD+/-RW ultramince. 9 Disques durs Jusqu'à quatre disques durs SATA de 3,5 pouces Fonctionnalités de l'écran LCD REMARQUE: La fonction de l'écran LCD n'est pas disponible dans un système de disque dur branché par câble. L'écran LCD du système affiche des informations et des messages indiquant si le système fonctionne correctement ou s'il requiert une intervention. Voir Messages d'erreur du système pour obtenir des informations sur des codes d'erreur spécifiques. • Le rétro-éclairage de l'écran LCD est de couleur bleue en fonctionnement normal et orange en cas d'erreur. • Lorsque le système est en mode veille, l'écran LCD n'est pas rétro-éclairé. Pour activer le rétroéclairage, appuyez sur le bouton Sélectionner, Gauche ou Droite de l'écran LCD. • Le rétro-éclairage de l'écran LCD reste inactif si l'affichage de messages a été désactivé via l'utilitaire iDRAC, l'écran LCD ou d'autres outils. Figure 4. Fonctionnalités de l'écran LCD Élément Bouton Description 1 Gauche Fait revenir le curseur étape par étape. 2 Sélectionner Permet de sélectionner l'élément de menu mis en surbrillance à l'aide du curseur. 3 Droite Fait avancer le curseur étape par étape. Durant le défilement des messages : 13Élément Bouton Description • Appuyez une fois pour augmenter la vitesse de défilement. • Appuyez de nouveau pour arrêter le défilement. • Appuyez une nouvelle fois pour rétablir la vitesse de défilement par défaut. • Appuyez encore une fois pour répéter le cycle. Écran d'accueil L'écran d'accueil affiche des informations sur le système qui sont configurables par l'utilisateur. Cet écran est affiché lors d'un fonctionnement système normal quand il n'y a pas de messages d'état ou d'erreurs. Lorsque le système est en mode de veille, le rétro-éclairage LCD s'éteint après cinq minutes d'inactivité s'il n'y a pas de messages d'erreur. Appuyez sur l'un des trois boutons de navigation (sélectionner, gauche ou droit) pour afficher l'écran d'accueil. Pour retourner à l'écran d'accueil à partir d'un autre menu, continuez de sélectionner la flèche haut jusqu'à ce que l'icône Accueil soit affichée, puis sélectionnez l'icône Accueil. Sur l'écran d'accueil, appuyez sur le bouton Sélectionner pour accéder au menu principal. Menu Configuration REMARQUE: Si vous sélectionnez une option dans le menu Setup (Configuration), vous devez confirmer l'option avant de passer à l'étape suivante. Option Description iDRAC Sélectionnez DHCP ou Static IP (IP statique) pour configurer le mode réseau. Si Static IP (IP statique) est sélectionné, les champs disponibles sont IP, Subnet (Sub) (sous-réseau) et Gateway (Gtw) (passerelle). Sélectionnez Setup DNS (configuration de DNS) pour activer une DNS et pour afficher les adresses de domaine. Deux entrées de DNS séparées sont disponibles. Set Error (Définition du mode d'erreur) Sélectionnez SEL pour afficher des messages d'erreur LCD dans un format qui correspond à la description IPMI dans le journal SEL. Il s'agit d'une méthode pratique lorsque vous essayez de faire correspondre un message LCD avec une entrée SEL. Sélectionnez Simple pour afficher des messages d'erreur LCD dans une description conviviale simplifiée. Référez-vous à la section Messages d'erreur système pour voir une liste de messages dans ce format. Set Home (Définition de l'écran d'accueil) Sélectionnez l'information par défaut que vous voulez afficher sur l'écran d'accueil LCD. Référezvous à la section View Menu (Menu Vue) pour voir les options et les articles d'options qui peuvent être réglés par défaut sur l'écran d'accueil. 14Menu Vue REMARQUE: Si vous sélectionnez une option dans le menu View (Vue), vous devez confirmer l'option avant de passer à l'étape suivante. Option Description IP iDRAC Affiche les adresses IPv4 ou IPv6 de l'iDRAC7. Il s'agit de l'adresse DNS (principale et secondaire), de l'adresse de passerelle, de l'adresse IP et de l'adresse de sous-réseau (l'IPv6 ne comprend par de sous-réseau). MAC Affiche les adresses MAC des périphériques iDRAC, iSCSI ou réseau. Nom Affiche le nom d'hôte, le modèle ou une chaîne définie par l'utilisateur pour le système. Numéro Affiche le numéro d'inventaire ou le numéro de service du système. Alimentation Affiche la sortie d'alimentation du système en UET/h ou watts. Le format d'affichage peut être configuré dans le sous-menu Set home (Configurer accueil) du menu Setup (Configurer). Température Affiche la température du système en Celsius et Fahrenheit. Le format d'affichage peut être configuré dans le sous-menu Set home (Configurer accueil) du menu Setup (Configurer). Voyants de diagnostic Les voyants de diagnostic sur le panneau avant du système affichent l'état pendant le démarrage du système. REMARQUE: Aucun voyant de diagnostic n'est allumé lorsque le système est hors tension. Pour démarrer le système, branchez-le à une source d'alimentation et appuyez sur le bouton d'alimentation. La section suivante décrit les conditions du système et les mesures correctives possibles associées à ces voyants : Voyant d'intégrité État Mesure corrective Si le système est sous tension et en bon état, le voyant s'allume en bleu. Aucune requise. L'indicateur clignote en orange si le système est victime d'une erreur (par exemple, un ventilateur ou un disque dur défaillant), qu'il soit sous tension ou en veille. Reportez-vous au journal des événements système ou aux messages du système pour le problème rencontré. Une configuration incorrecte de la mémoire peut provoquer un blocage au démarrage du système et une absence de sortie vidéo. Reportez-vous à la section Obtention d'aide. Voyant du disque dur État Mesure corrective Le voyant s'allume en vert pour indiquer une activité du disque dur. Aucune requise. 15Voyant électrique État Mesure corrective Le voyant clignote en orange si le système rencontre une erreur électrique (par exemple, une tension en dehors des limites ou un bloc d'alimentation ou un régulateur de tension). Reportez-vous au journal des événements système ou aux messages du système pour le problème rencontré. S'il est provoqué par un problème du bloc d'alimentation, vérifiez le voyant sur le bloc d'alimentation. Réinstallez le bloc d'alimentation en le retirant puis en le réinstallant. Si le problème persiste, reportez-vous à la section Obtention d'aide. Voyant de température État Mesure corrective Le voyant clignote en orange si le système rencontre une erreur de température (par exemple, une température en dehors des limites ou un ventilateur défaillant). Assurez-vous qu'aucune des conditions suivantes n'existe : • Retrait ou panne de l'un des ventilateurs. • Retrait du capot du système, du carénage de refroidissement, de la plaque de recouvrement EMI, du cache de barrette de mémoire ou de plaque de recouvrement arrière. • La température ambiante est trop élevée. • La circulation de l'air extérieur est bloquée. Voir la section Obtention d'aide. Voyant de mémoire État Mesure corrective Le voyant clignote en orange si une erreur de mémoire survient. Reportez-vous au journal des événements système ou aux messages du système pour trouver l'emplacement de la mémoire défaillante. Réinstallez le périphérique de mémoire. Si le problème persiste, reportez-vous à la section Obtention d'aide. Voyant PCIe État Mesure corrective Le voyant clignote en orange si la carte PCIe rencontre une erreur. Redémarrez le système. Mettez à jour tous les pilotes requis pour la carte PCIe. Réinstallez la carte. Si le problème persiste, reportez-vous à la section Obtention d'aide. 16Codes des voyants des disques durs Figure 5. Voyants de disque dur 1. voyant d'activité du disque dur (vert) 2. voyant d'état du disque dur (vert et orange) REMARQUE: Si le disque dur est en mode Advanced Host Controller Interface (AHCI), le voyant de l'état (sur la droite) ne fonctionne pas et reste éteint. Codes des voyants d'état des disques (RAID uniquement) État Voyant vert clignotant deux fois par seconde Identification du disque/préparation au retrait Éteint Disque prêt pour insertion ou retrait REMARQUE: Le voyant d'état des disques reste éteint jusqu'à ce que tous les disques soient initialisés après la mise sous tension du système. Il n'est pas possible d'insérer ou de retirer des disques au cours de cette période. Vert clignotant, puis orange, puis extinction Panne du lecteur prévisible Orange clignotant quatre fois par seconde Disque en panne Vert clignotant lentement Disque en cours de reconstruction Vert fixe Disque en ligne Voyant vert clignotant pendant trois secondes, orange pendant trois secondes et extinction pendant six secondes Reconstruction annulée 17Voyants et caractéristiques du panneau arrière Figure 6. Voyants et caractéristiques du panneau arrière Élément Voyant, bouton ou connecteur Icône Description 1 Logement 1 de carte d'extension PCIe Vous permet de connecter une carte d'extension PCI Express mi-hauteur. 2 Logement de la carte vFlash Vous permet de connecter la carte vFlash. 3 Port iDRAC (en option) Port de gestion dédié sur la carte des ports iDRAC. 4 Connecteur série Permet de connecter un périphérique série au système. 5 Logement de la carte d'extension PCIe 2 Vous permet de connecter une carte d'extension PCI Express pleine hauteur. 6 Connecteur vidéo Permet de connecter un moniteur VGA au système. 7 Connecteurs Ethernet (2) Connecteur de cartes réseau 10/100/1000 intégrées. 8 Connecteurs USB (2) Permet de connecter des périphériques USB au système. Les ports sont compatibles USB 2.0. 9 Connecteur d'identification du système Permet de connecter l'assemblage des voyants d'état du système en option au moyen du bras de gestion des câbles en option. 10 Bouton d'identification du système Les boutons d'identification du système qui se trouvent sur les panneaux avant et arrière peuvent être utilisés pour localiser un système particulier dans un rack. Lorsque vous appuyez sur un de ces boutons, le voyant d'état de système qui se trouve à l'arrière clignote jusqu'à ce que vous appuyiez de nouveau sur un des boutons. Appuyez pour faire basculer l'ID du système. Si le système cesse de répondre pendant l'auto-test de démarrage, appuyez sur le bouton de l'ID du système et maintenez-le enfoncé pendant plus de cinq secondes pour entrer en mode d'avancement du BIOS. Pour réinitialiser l'iDRAC (si non désactivé pendant la configuration iDRAC F2) appuyez sur le bouton et maintenez-le enfoncé pendant plus de 15 secondes. 11 Alimentation (PSU1) 350 W et 550 W 18Élément Voyant, bouton ou connecteur Icône Description 12 REMARQUE: Il n'y a qu'un support de bloc d'alimentation pour les blocs d'alimentation nonredondants. Alimentation (PSU2) Codes des voyants de carte réseau Figure 7. Voyant de la carte réseau 1. voyant de liaison 2. voyant d'activité Voyant Code du voyant Les voyants de liaison et d'activité sont éteints La carte réseau n'est pas connectée au réseau. Le voyant de liaison est vert La carte réseau est connectée à un réseau valide à la vitesse de débit de port maximale (1 Gb/s ou 10 Gb/s). Le voyant de liaison est orange La carte réseau est connectée à un réseau valide à un débit moindre que son débit de port maximal. Le voyant d'activité clignote en vert. Des données réseau sont en cours d'envoi ou de réception. Codes du voyant d'alimentation Chaque bloc d'alimentation possède une poignée transparente lumineuse qui sert de voyant pour montrer si l'alimentation est présente ou non. Figure 8. Voyant d'état du bloc d'alimentation 191. Voyant d'état/poignée du bloc d'alimentation Comportement du voyant d'alimentation État Éteint Non connecté. Vert La poignée s'allume en vert pour signaler qu'une source d'alimentation valide est connectée au bloc d'alimentation et que celui-ci est opérationnel. Orange clignotant Un voyant orange indique un problème lié au bloc d'alimentation. PRÉCAUTION: Lorsque vous corrigez une non-correspondance de bloc d'alimentation, remplacez uniquement le bloc d'alimentation dont le voyant clignote. Si vous remplacez l'autre bloc d'alimentation pour créer une paire correspondante, une erreur peut se produire et le système peut s'éteindre de manière péremptoire. Pour modifier la configuration de tension de sortie haute en tension de sortie basse, et vice versa, vous devez éteindre le système. PRÉCAUTION: Les blocs d'alimentation en CA prennent en charge des tensions d'entrée de 220 V et 110 V. Lorsque deux blocs d'alimentation identiques reçoivent différentes tensions d'entrée, leur puissance de sortie peut être différente, ce qui occasionne une noncorrespondance. PRÉCAUTION: Si deux blocs sont installés, ils doivent être du même type et disposer de la même puissance maximale de sortie. Vert clignotant Lorsque vous ajoutez un bloc d'alimentation à chaud, ce voyant indique que les deux blocs d'alimentation ne correspondent pas (en termes d'efficacité, de fonctions, d'état de santé et de tension prise en charge). Remplacez le bloc d'alimentation au voyant clignotant par un bloc d'alimentation aux capacités identiques à celles de l'autre bloc d'alimentation installé. Autres informations utiles AVERTISSEMENT: Reportez-vous aux informations concernant la sécurité et les réglementations livrées avec votre système. Les informations sur la garantie peuvent être incluses dans ce document ou bien dans un document séparé. • Le Getting Started Guide (Guide de démarrage) présente l'installation de votre système et ses caractéristiques techniques. Ce document est disponible en ligne à l'adresse support.dell.com/manuals. • La documentation fournie avec le rack indique comment installer le système dans un rack, le cas échéant. • Tous les supports fournis avec le système contiennent de la documentation et des outils permettant de configurer et de gérer le système, notamment les supports du système d'exploitation, du logiciel de gestion du système, des mises à jour système et des composants système que vous avez achetés avec le système. • Pour obtenir le nom complet d'une abréviation ou connaître la signification d'un sigle utilisé dans ce tableau, voir Glossary (Glossaire) sur support.dell.com/manuals. REMARQUE: Vérifiez toujours si des mises à jour sont disponibles sur le site support.dell.com/manuals et lisez les informations de mise à jour en premier, car elles remplacent souvent les informations que contiennent les autres documents. 202 Utilisation du gestionnaire de configuration du système et d'amorçage La configuration du système vous permet de gérer le matériel du système et de définir les options au niveau du BIOS. Les touches suivantes permettent d'accéder à certaines fonctions au démarrage du système : Touche Description Permet d'accéder à la configuration du système. Permet d'entrer dans les Services système, ce qui ouvre le Dell Lifecycle Controller 2 (LC2). Le Dell LC2 prend en charge des fonctions de gestion du système telles que le déploiement du système d'exploitation, les diagnostics matériels, les mises à jour de plate-forme et la configuration de plate-forme, à l'aide de l'interface utilisateur graphique. L'ensemble des fonctions exactes du LC2 est déterminé par la licence iDRAC achetée. Pour de plus amples informations, reportez-vous à la documentation Dell LC2. Permet d'accéder au gestionnaire d'amorçage BIOS ou UEFI selon la configuration de démarrage de votre système. Permet de lancer l'amorçage PXE (Preboot eXecution Environment). À partir de la configuration du système, vous pouvez effectuer les tâches suivantes : • Modifier les paramètres NVRAM après l'ajout ou la suppression de matériel • Afficher la configuration matérielle du système • Activer ou désactiver les périphériques intégrés • Définir les seuils de gestion de l'alimentation et des performances • Gérer la sécurité du système Vous pouvez accéder à la configuration du système à l'aide : • du navigateur graphique standard, activé par défaut • du navigateur de texte, activé à l'aide de Console Redirection (Redirection de la console) Pour activer Console Redirection (Redirection de la console), dans System Setup(Configuration du système), sélectionnez System BIOS (BIOS du système) → écran Serial Communication (Communications série) → Serial Communication (Communications série), sélectionnez On with Console Redirection(Activé avec la console de redirection). REMARQUE: Par défaut, le texte d'aide pour le champ sélectionné est affiché dans le navigateur graphique. Pour afficher le texte d'aide dans le navigateur de texte, vous devez appuyer sur la touche . Choix du mode d'amorçage du système Le programme de configuration du système vous permet de spécifier le mode d'amorçage pour l'installation du système d'exploitation : • Le mode d'amorçage du BIOS (par défaut) est l'interface standard d'amorçage au niveau du BIOS. 21• Le mode d'amorçage de l'UEFI est une interface d'amorçage améliorée de 64 bits basée sur des spécifications UEFI et superposée au système du BIOS. Vous devez sélectionner le mode d'amorçage dans le champ Boot Mode (Mode d'amorçage) de l'écran Boot Settings (Paramètres d'amorçage) dans System Setup (Configuration du système). Une fois le mode d'amorçage spécifié, le système démarre dans le mode spécifié et vous pouvez procéder à l'installation de votre système d'exploitation depuis ce mode. Ensuite, vous devez redémarrer le système à l'aide du même mode d'amorçage (BIOS ou UEFI) pour accéder au système d'exploitation installé. Si vous essayez de démarrer le système à partir d'un autre mode d'amorçage, le système se bloquera au démarrage. REMARQUE: Les systèmes d'exploitation doivent être compatibles avec l'UEFI afin d'être installés en mode d'amorçage UEFI. Les systèmes d'exploitation DOS et 32 bits ne prennent pas en charge l'UEFI et ne peuvent être installés qu'à partir du mode d'amorçage BIOS. REMARQUE: Pour obtenir les dernières informations sur les systèmes d'exploitation pris en charge, rendez-vous sur le site dell.com/ossupport. Accès à la configuration du système 1. Allumez ou redémarrez le système. 2. Appuyez sur dès que vous avez vu le message suivant : = System Setup (Configuration du système) Si le système d'exploitation commence à se charger alors que vous n'avez pas encore appuyé sur , attendez que le système finisse de démarrer, puis redémarrez-le et réessayez. Réponse aux messages d'erreur Si un message d'erreur s'affiche pendant que le système s'amorce, prenez en note le message. Pour en savoir plus, référez-vous à la section Messages d'erreur du système. REMARQUE: Il est normal qu'un message s'affiche lorsque vous redémarrez le système après avoir installé une mise à niveau de mémoire. Utilisation des touches de navigation de la configuration du système Touches Action Flèche vers le haut Permet de revenir au champ précédent. Flèche vers le bas Permet de passer au champ suivant. Vous permet de saisir une valeur dans le champ sélectionné (le cas échéant) ou de suivre le lien dans le champ. Barre d'espacement Permet d'étendre ou de réduire la liste déroulante, le cas échéant. Passe à l'objectif suivant. REMARQUE: Seulement pour le navigateur de graphiques standard. <Échap> Permet de passer à la page précédente jusqu'à ce que vous voyiez l'écran principal. Appuyez sur <Échap> dans l'écran principal pour afficher un message qui vous invite à enregistrer toutes les modifications non enregistrées et pour redémarrer le système. 22Touches Action Permet d'afficher le fichier d'aide de la configuration du système. REMARQUE: Pour la plupart des options, les modifications effectuées sont enregistrées mais ne prennent effet qu'au redémarrage du système. Options de configuration du système Écran principal System Setup (Configuration du système) REMARQUE: Appuyez sur pour réinitialiser les paramètres du BIOS ou de l'UEFI à leur valeur par défaut. Élément de menu Description System BIOS (BIOS du système) Cette option est utilisée pour afficher et configurer les paramètres du BIOS. iDRAC Settings (Paramètres iDRAC) Cette option est utilisée pour afficher et configurer les paramètres iDRAC. Device Settings (Paramètres du périphérique) Cette option est utilisée pour afficher et configurer les paramètres du périphérique. Écran System BIOS (BIOS du système) REMARQUE: Les options de configuration du système varient en fonction de la configuration du système. REMARQUE: Les valeurs par défaut sont répertoriées sous l'option correspondante dans les sections suivantes, le cas échéant. Élément de menu Description Informations système Permet d'afficher les informations sur le système telles que le nom du modèle du système, la version du BIOS, numéro de service, etc. Memory Settings (Paramètres de la mémoire) Permet d'afficher les informations et les options relatives à la mémoire installée. Processor settings (Paramètres du processeur) Permet d'afficher les informations et les options relatives au processeur telles que la vitesse, la taille du cache, etc. SATA Settings (Paramètres SATA) Permet d'afficher les options permettant d'activer ou de désactiver le contrôleur et les ports SATA intégrés. Boot Settings (Paramètres d'amorçage) Permet d'afficher les options pour indiquer le mode d'amorçage (BIOS ou UEFI). Vous permet de modifier les paramètres d'amorçage UEFI et BIOS. Integrated Devices (Périphériques intégrés) Permet d'afficher les options permettant d'activer ou de désactiver les ports et les contrôleurs de périphérique intégré et de spécifier les fonctionnalités et options associées. Serial Communication (Communications série) Permet d'afficher les options permettant d'activer ou de désactiver les ports série et de spécifier les fonctionnalités et options associées. 23Élément de menu Description System Profile Settings (Paramètres du profil du système) Permet d'afficher les options permettant de modifier les paramètres de gestion de l'alimentation du processeur, la fréquence de la mémoire, etc. System Security (Sécurité du système) Permet d'afficher les options permettant de configurer les paramètres de sécurité du système tels que le mot de passe du système, le mot de passe de configuration, la sécurité TPM, etc. Cela permet également d'activer ou de désactiver les boutons d'alimentation et NMI du système. Miscellaneous Settings (Paramètres divers) Permet d'afficher les options permettant de modifier la date du système, l'heure, etc. Écran System Information (Informations sur le système) Élément de menu Description System Model Name (Nom du modèle du système) Affiche le nom du modèle du système. System BIOS Version (Version du BIOS du système) Affiche la version du BIOS installée sur le système. System Service Tag (Numéro de service du système) Affiche le numéro de service du système. System Manufacturer (Fabricant du système) Affiche le nom du fabricant du système. System Manufacturer Contact Information (Coordonnées du fabricant du système) Affiche les coordonnées du fabricant du système. Écran Memory Settings (Paramètres de la mémoire) Élément de menu Description System Memory Size (Taille de la mémoire système) Indique la taille de la mémoire installée dans le système. System Memory Type (Type de mémoire système) Indique le type de mémoire installée dans le système. System Memory Speed (Vitesse de la mémoire système) Indique la vitesse de la mémoire système. System Memory Voltage (Tension de la mémoire système) Indique la tension de la mémoire système. Video Memory (Mémoire vidéo) Affiche la quantité de mémoire vidéo disponible. System Memory Testing (Test de la mémoire système) Indique si les tests de la mémoire système sont exécutés pendant l'amorçage du système. Les options sont Enabled (Activé) et Disabled (Désactivé).Par défaut, l'option System Memory Testing (Test de la mémoire système) est réglée sur Disabled (Désactivé). Memory Operating Mode (Mode de fonctionnement de la mémoire) Indique le mode de fonctionnement de la mémoire. Les options disponibles dépendant de la configuration de la mémoire du système sont Optimizer Mode (Mode optimisé), Advanced ECC Mode (Mode ECC avancé), Mirror Mode (Mode miroir), Spare Mode (Mode réserve) et Spare with Advanced ECC Mode (Mode 24Élément de menu Description réserve et ECC avancé). Par défaut, l'option Memory Operating Mode (Mode de fonctionnement de la mémoire) est réglée sur Optimizer Mode (Mode optimisé). REMARQUE: Le mode de fonctionnement de la mémoire peut avoir des paramètres par défaut et des options disponibles différents selon la configuration de la mémoire. Node Interleaving (Entrelacement de nœuds) Si ce champ est réglé sur Enabled (Activé), l'entrelacement de nœuds est pris en charge si une configuration de mémoire symétrique est installée. Si le champ est réglé sur Disabled (Désactivé), le système prend en charge des configurations de mémoire (asymétriques) d'architecture de la mémoire non uniforme (NUMA). Par défaut, l'option Node Interleaving (Entrelacement de nœuds) est réglée sur Disabled (Désactivé). Écran Processor Settings (Paramètres du processeur) Élément de menu Description Logical Processor (Processeur logique) Vous permet d'activer ou de désactiver les processeurs logiques et d'activer le nombre de processeurs logiques. Si l'option Logical Processor (Processeur logique) est réglée sur Enabled (Activé), le BIOS affiche tous les processeurs logiques. Si cette option est réglée sur Disabled (Désactivé), le BIOS n'affiche qu'un processeur logique par cœur. Par défaut, l'option Logical Processor (Processeur logique) est réglée sur Enabled (Activé). QPI Speed (Vitesse QPI) Vous permet de régler les paramètres de débit de données QuickPath Interconnect. Par défaut, l'option QPI Speed (Vitesse QPI) est réglée sur Maximum data rate (Débit de données maximal). REMARQUE: L'option QPI Speed (Vitesse QPI) est affichée uniquement lorsque les deux processeurs sont installés. Alternate RTID (Requestor Transaction ID) Setting (Paramètre RTID alterné) Vous permet d'attribuer plus de RTID au support à distance augmentant ainsi la performance du cache entre les supports ou de travailler en mode normal pour NUMA. Par défaut, Alternate RTID (Requestor Transaction ID) Setting (Paramètre RTID alterné) est réglé sur Disabled (Désactivé). Virtualization Technology (Technologie de virtualisation) Vous permet d'activer ou de désactiver les capacités matérielles supplémentaires fournies par la technologie de virtualisation. Par défaut, l'option Virtualization Technology (Technologie de virtualisation) est réglée sur Enabled (Désactivé). Adjacent Cache Line Prefetch (Prérécupération de la ligne de mémoire cache adjacente) Vous permet d'optimiser le système pour des applications nécessitant une utilisation élevée de l'accès séquentiel de la mémoire. Par défaut, l'option Adjacent Cache Line Prefetch (Prérécupération de la ligne de mémoire cache adjacente) est réglée sur Enabled (Activé). Vous pouvez désactiver cette option pour des applications nécessitant une utilisation élevée à un accès aléatoire à la mémoire. 25Élément de menu Description Hardware Prefetcher (Prérécupérateur de matériel) Vous permet d'activer ou de désactiver le prérécupérateur de matériel. Par défaut, l'option Hardware Prefetcher (Prérécupérateur de matériel) est réglée sur Enabled (Activé). DCU Streamer Prefetcher (Prérécupération du dévideur d'antémémoire de données) Vous permet d'activer ou de désactiver le prérécupérateur du dévideur d'antémémoire de données. Par défaut, l'option DCU Streamer Prefetcher (Prérécupération du dévideur d'antémémoire de données) est réglée sur Enabled (Activé). DCU IP Prefetcher (Prérécupération de l'adresse IP de l'antémémoire de données) Vous permet d'activer ou de désactiver le prérécupérateur de l'adresse IP du dévideur d'antémémoire de données. Par défaut, l'option DCU IP Prefetcher (Prérécupération de l'adresse IP de l'antémémoire de données) est réglée sur Enabled (Activé). Execute Disable (Exécution de la désactivation) Vous permet d'activer ou de désactiver la technologie de protection mémoire d'exécution de la désactivation. Par défaut, l'option Execute Disable (Exécution de la désactivation) est réglée sur Enabled (Activé). Number of Cores per Processor (Nombre de cœurs par processeur) Vous permet de contrôler le nombre de cœurs disponibles pour chaque processeur. Par défaut, l'option Number of Cores per Processor (Nombre de cœurs par processeur) est réglée sur All (Tous). Processor 64-bit Support (Prise en charge des processeurs 64 bits) Indique si le ou les processeurs prennent en charge les extensions 64 bits. Processor Core Speed (Vitesse du cœur du processeur) Affiche la fréquence maximale du cœur du processeur. Processor Bus Speed (Vitesse de bus du processeur) Affiche la vitesse de bus des processeurs. REMARQUE: L'option de la vitesse de bus du processeur est affichée uniquement lorsque les deux processeurs sont installés. Processeur 1 REMARQUE: Les paramètres suivants sont affichés pour chaque processeur installé dans le système. Family-Model-Stepping (FamilleModèle-Stepping) Affichez la famille, le modèle et le stepping du processeur tels que définis par Intel. Brand (Marque) Affiche le nom de la marque signalé par le processeur. (Level 2 Cache) Cache de niveau 2 Affiche la taille de la mémoire cache de niveau 2 Level 3 Cache (Cache de niveau 3) Affiche la taille de la mémoire cache L3 Number of Cores (Nombre de noyaux) Indique le nombre de cœurs activés par processeur. Écran SATA Settings (Paramètres SATA) Élément de menu Description Embedded SATA (SATA intégré) Permet au disque SATA intégré d'être réglé sur les modes Off (Éteint), ATA, AHCI ou RAID. Par défaut, la fonction Embedded SATA (SATA intégré) est réglée sur AHCI Mode (Mode AHCI). 26Élément de menu Description Port A La fonction Auto permet au BIOS de prendre en charge le périphérique connecté au port SATA A. Par défaut, le port A est réglé sur Auto. Port B La fonction Auto permet au BIOS de prendre en charge le périphérique connecté au port SATA B. Par défaut, le port B est réglé sur Auto. Port C La fonction Auto permet au BIOS de prendre en charge le périphérique connecté au port SATA C. Par défaut, le port C est réglé sur Auto. Port D La fonction Auto permet au BIOS de prendre en charge le périphérique connecté au port SATA D. Par défaut, le port D est réglé sur Auto. Port E Active automatiquement la prise en charge du BIOS pour les périphériques reliés au port E SATA. Par défaut, le Port E est défini sur Auto. REMARQUE: Les ports A, B, C et D sont utilisés pour les lecteurs de fonds de panier et le port E pour le lecteur optique (CD/DVD). Écran Boot Settings (Paramètres d'amorçage) Élément de menu Description Boot Mode (Mode d'amorçage) Vous permet de définir le mode d'amorçage du système. PRÉCAUTION: La permutation du mode d'amorçage peut empêcher le démarrage du système si le système d'exploitation n'a pas été installé selon le même mode d'amorçage. Si le système d'exploitation prend en charge l'UEFI, vous pouvez définir cette option sur UEFI. Le réglage de ce champ sur BIOS permet la compatibilité avec des systèmes d'exploitation non UEFI. Par défaut, l'option Boot Mode (Mode d'amorçage) est réglée sur BIOS. REMARQUE: Le réglage de ce champ sur UEFI désactive le menu BIOS Boot Settings (Paramètres d'amorçage du BIOS). Le réglage de ce champ sur BIOS désactive le menu UEFI Boot Settings (Paramètres d'amorçage UEFI). Boot Sequence Retry (Réexécution de la séquence d'amorçage) Vous permet d'activer ou de désactiver la fonction de réexécution de la séquence d'amorçage. Si ce champ est activé et que le système n'arrive pas à démarrer, ce dernier ré-exécute la séquence d'amorçage après 30 secondes. Par défaut, l'option Boot Sequence Retry (Réexécution de la séquence d'amorçage) est réglée sur Disabled (Désactivé). BIOS Boot Settings (Paramètres d'amorçage BIOS) Vous permet d'activer ou de désactiver les options d'amorçage du BIOS. REMARQUE: Cette option est activée uniquement si le mode d'amorçage est le BIOS. UEFI Boot Settings (Paramètres d'amorçage UEFI) Vous permet d'activer ou de désactiver les options d'amorçage de l'UEFI. REMARQUE: Cette option est activée uniquement si le mode d'amorçage est l'UEFI. One-Time Boot (Amorçage ponctuel) Vous permet d'activer ou de désactiver l'amorçage ponctuel depuis un périphérique sélectionné. 27Écran Integrated Devices (Périphériques intégrés) Élément de menu Description Integrated RAID controller (Contrôleur RAID intégré) Vous permet d'activer ou de désactiver le contrôleur RAID intégré. Par option, l'option Integrated RAID Controller (Contrôleur RAID intégré) est réglée sur Enabled (Activé). REMARQUE: Cette option s'affiche uniquement si un contrôleur RAID intégré est installé sur le système. User Accessible USB Ports (Ports USB accessibles à l'utilisateur) Vous permet d'activer ou de désactiver les ports USB accessibles à l'utilisateur. Si vous sélectionnez Only Back Ports On (Seuls les ports arrière sont activés), les ports USB avant seront désactivés, et si vous sélectionnez All ports Off (Tous les ports sont désactivés), les ports USB avants et arrières seront désactivés. Par défaut, l'option User Accessible USB Ports (Ports accessibles à l'utilisateur) est réglée sur All ports On (Tous les ports sont activés). Internal USB Port (Port USB interne) Vous permet d'activer ou de désactiver le port interne USB. Par défaut, l'option Internal USB Port (Port USB interne) est réglée sur On (Activé). Internal SD Card Port (Port de carte SD interne) Active ou désactive le port de la carte SD interne du système. Par défaut, l'option Internal SD Card Port (Port de la carte SD interne du système) est réglée sur On (Activé). REMARQUE: Cette option s'affiche seulement si le IDSDM est installé sur la carte système. Internal SD Card Redundancy (Redondance de la carte SD interne) Lorsque l'option est réglée sur le mode Mirror (Miroir), les données sont écrites sur les deux cartes SD. Si l'une des cartes tombe en panne, les données sont écrites sur la carte SD active. Les données depuis cette carte sont copiées sur la carte SD de remplacement au prochain démarrage. Par défaut, l'option Internal SD Card Redundancy (Redondance de la carte SD interne) est définie sur Mirror (Miroir). REMARQUE: Cette option s'affiche seulement si le IDSDM est installé sur la carte système. Integrated Network Card 1 (Carte réseau intégrée 1) Vous permet d'activer ou de désactiver la carte réseau intégrée 1. Par défaut, l'option Integrated Network Card 1 (Carte réseau intégrée 1) est réglée sur Enabled (Activé). OS Watchdog Timer (Temporisateur de surveillance du système d'exploitation) Vous permet d'activer ou de désactiver le temporisateur de surveillance du système d'exploitation. Lorsque ce champ est activé, le système d'exploitation initialise le temporisateur et ce dernier aide à la récupération du système d'exploitation. Par défaut, l'option OS Watchdog Timer (Temporisateur de surveillance du système d'exploitation) est réglée sur Disabled (Désactivé). Embedded Video Controller (Contrôleur vidéo intégré) Vous permet d'activer ou de désactiver Embedded Video Controller (Contrôleur vidéo intégré). Par défaut, le contrôleur vidéo intégré est réglé sur Enabled (Activé). SR-IOV Global Enable (Activation des périphériques SR-IOV avec la commande globale) Vous permet d'activer ou de désactiver la configuration du BIOS des périphériques SRIOV (Single Root I/O Virtualization). Par défaut, l'option SR-IOV Global Enable (Activation des périphériques SR-IOV avec la commande globale) est réglée sur Disabled (Désactivé) 28Élément de menu Description Slot Disablement (Désactivation des logements) Vous permet d'activer ou de désactiver des logements PCIe disponibles sur votre système. La fonction Slot Disablement (Désactivation des logements) contrôle la configuration des cartes PCIe installées dans un logement spécifique. PRÉCAUTION: La désactivation de logement doit être utilisée seulement lorsque la carte périphérique installée empêche l'amorçage dans le système d'exploitation ou lorsqu'elle cause des délais lors du démarrage du système. Si le logement est désactivé, l'option ROM et le pilote UEFI sont aussi désactivés. Écran Serial Communications (Communications série) Élément de menu Description Serial Communication (Communications série) Vous permet de sélectionner des périphériques de communication série (Périphérique série 1 et Périphérique série 2) dans le BIOS. La redirection de la console BIOS peut aussi être activée et l'adresse du port utilisée peut être spécifiée. Par défaut, l'option Serial Communication (Communication série) est réglée sur On without Console Redirection (Activée sans redirection de console). Serial Port Address (Adresse de port série) Vous permet de définir l'adresse de port pour les périphériques série. Par défaut, l'option Serial Port Address (Adresse de port série) est réglée sur Serial Device 1=COM2, Serial Device 2=COM1 (périphérique série 1=COM2, périphérique série 2=COM1). REMARQUE: Seul le périphérique série 2 (Serial Device 2) peut être associé aux connectivités SOL (Serial Over LAN). Pour utiliser la redirection de console par SOL, configurez la même adresse de port pour la redirection de console et le périphérique série. External Serial Connector (Connecteur série externe) Vous permet d'associer le connecteur série externe au périphérique série 1, au périphérique série 2 ou au périphérique d'accès à distance. Par défaut, l'option External Serial Connector (Connecteur série externe) est réglée sur Serial Device1 (Périphérique série 1). REMARQUE: Seul le périphérique série 2 peut être associé aux connectivités SOL. Pour utiliser la redirection de console par SOL, configurez la même adresse de port pour la redirection de console et le périphérique série. Failsafe Baud Rate (Débit en bauds de la ligne de secours) Affiche le débit en bauds de la ligne de secours pour la redirection de console. Le BIOS tente de déterminer le débit en bauds automatiquement. Ce débit est utilisé uniquement si la tentative échoue et la valeur ne doit pas être modifiée. Par défaut, l'option Failsafe Baud Rate (Débit en bauds de la ligne de secours) est réglée sur 11520. Remote Terminal Type (Type du terminal distant) Vous permet de définir le type de terminal de console distant. Par défaut, l'option Remote Terminal Type (Type du terminal distant) est réglée sur VT 100/VT220. Redirection After Boot (Redirection après démarrage) Vous permet d'activer ou de désactiver la redirection de console du BIOS lorsque le système d'exploitation est en cours de chargement. Par défaut, l'option Redirection After Boot (Redirection après démarrage) est réglée sur Enabled (Activé). 29Écran System Profile Settings (Paramètres du profil du système) Élément de menu Description System Profile (Profil du système) Vous permet de régler le profil du système. Si vous réglez l'option System Profile (Profil du système) sur un mode autre que Custom (Personnalisé), le BIOS définit automatiquement le reste des options. Vous ne pouvez que modifier le reste des options si le mode est réglé sur Custom (Personnalisé). Par défaut, l'option System Profile (Profil du système) est réglée sur Performance Per Watt Optimized (DAPC) [Performance par watt optimisée (DAPC)]. DAPC correspond à Dell Active Power Controller (Contrôleur de l'alimentation actif Dell). REMARQUE: Les paramètres suivants ne sont disponibles que lorsque System Profile (Profil du système) est réglé sur Custom (Personnalisé). CPU Power Management (Gestion de l'alimentation de l'UC) Vous permet de régler la gestion de l'alimentation de l'UC. Par défaut, l'option CPU Power Management (Gestion de l'alimentation de l'UC) est réglée sur System DBPM (DAPC) [Modulation biphasée différentielle du système (DAPC)]. DBPM correspond à DemandBased Power Management (Gestion de l'alimentation en fonction de la demande). Memory Frequency (Fréquence de la mémoire) Vous permet de définir la fréquence de la mémoire. Par défaut, l'option Memory Frequency (Fréquence de la mémoire) est réglée sur Maximum Performance (Performances maximales). Turbo Boost Vous permet d'activer ou de désactiver le processeur pour faire fonctionner le mode turbo boost. Par défaut, l'option Turbo Boost est réglée sur Enabled (Activé). C1E Vous permet d'activer et de désactiver le processeur pour basculer à un état de performances minimales lorsqu'il est inactif. Par défaut, l'option C1E est réglée sur Enabled (Activé). C States (États C) Vous permet d'activer ou de désactiver le processeur pour fonctionner avec tous les états d'alimentation disponibles. Par défaut, l'option C States (États C) est réglée sur Enabled (Activé). Monitor/Mwait (Moniteur/ Mwait) Vous permet d'activer les instructions Monitor/Mwait (Moniteur/Mwait) dans le processeur. Par défaut, l'option Monitor/Mwait (Moniteur/Mwait) est réglée sur Enabled (Activé) pour tous les profils systèmes, sauf pour Custom (Personnalisé). REMARQUE: Cette option peut être désactivée uniquement si l'option C States (États C) en mode Custom (Personnalisé) est désactivée. REMARQUE: Lorsque C States (États C) est activé dans le mode Custom (Personnalisé), la modification du paramètre Monitor/Mwait (Moniteur/Mwait) n'a aucun impact sur la puissance/les performances du système. Memory Patrol Scrub (Vérification et correction d'erreur de la mémoire) Vous permet de définir la fréquence de vérification et de correction d'erreur de la mémoire. Par défaut, l'option Memory Patrol Scrub (Vérification et correction d'erreur de la mémoire) est réglée sur Standard. Memory Refresh Rate (Taux de rafraîchissement de la mémoire) Vous permet de régler le taux de rafraîchissement de la mémoire. Par défaut, l'option Memory Refresh Rate (Taux de rafraîchissement de la mémoire) est réglée sur 1x. 30Élément de menu Description Memory Operating Voltage (Tension de fonctionnement de la mémoire) Vous permet de régler la sélection de tension des barrettes DIMM. Lorsque l'option est réglée sur Auto, le système règle automatiquement la tension du système à un paramètre optimal basé sur la capacité des barrettes DIMM ainsi que le nombre de barrettes DIMM installées. Par défaut, l'option Memory Operating Voltage (Tension de fonctionnement de la mémoire) est réglée sur Auto. Écran System Security (Sécurité du système) Élément de menu Description Intel AES-NI L'option Intel AES-In améliore la vitesse des applications en réalisant un cryptage et un décryptage à l'aide de l'ensemble des consignes liées à la norme de cryptage avancé, et est réglée sur Enabled (Activé) par défaut. System Password (Mot de passe du système) Vous permet de définir le mot de passe système. Cette option est réglée sur Enabled (Activé) par défaut et est en lecture seule si le cavalier de mot de passe n'est pas installé dans le système. Setup Password (Mot de passe de configuration) Vous permet de définir le mot de passe de configuration. Cette option est en lecture seule si le cavalier du mot de passe n'est pas installé sur le système. Password Status (État du mot de passe) Vous permet de verrouiller le mot de passe du système. Par défaut, l'option Password Status (État du mot de passe) est réglée sur Unlocked (Déverrouillé). TPM Security (Sécurité TPM) Vous permet de contrôler le mode de signalement du module TPM (Trusted Platform Module). Par défaut, l'option TPM Security est réglée sur Off (Désactivé). Vous ne pouvez modifier TPM Status (Condition TPM), TPM Activation (Activation de la puce TPM) et les champs Intel TXT que si le champ TPM Status (Condition TPM) est réglé sur On with Pre-boot Measurements (Activé avec les mesures de pré-amorçage) ou On without Pre-boot Measurements (Activé sans mesures pré-amorçage). TPM Activation (Activation de la puce TPM) Vous permet de modifier l'état opérationnel du module TPM. Par défaut, l'option TPM Activation (Activation de la puce TPM) est réglée sur No Change (Aucun changement). TPM Status (État TPM) Affiche la condition du module TPM. TPM Clear (Effacement TPM) PRÉCAUTION: L'effacement du module TPM entraîne une perte de toutes les clés du module TPM. La perte des clés du module TPM peut affecter le démarrage du système d'exploitation. Vous permet d'effacer tous les contenus du module TPM. Par défaut, l'option TPM Clear (Effacement TPM) est réglée sur No (Non). Intel TXT Vous permet d'activer ou de désactiver la technologie Intel Trusted Execution Technology. Pour activer Intel TXT, l'option Virtualization Technology (Technologie de virtualisation) doit être activée et l'option TPM Security (Sécurité TPM) doit être activée avec les mesures de pré-amorçage. Par défaut, l'option Intel TXT est réglée sur Off (Désactivé). BIOS Update Control (Contrôle de la mise à jour du BIOS) Vous permet de mettre à jour le BIOS en utilisant des utilitaires flash basés sur des environnements DOS ou UEFI. Pour les environnements ne nécessitant aucune mise à jour BIOS locale, il est recommandé de régler ce champ sur Limited (Limité). Par 31Élément de menu Description défaut, l'option Local BIOS Update Support (Prise en charge de la mise à jour du BIOS locale) est réglée sur Unlocked (Déverrouillé). REMARQUE: Les mises à jour du BIOS utilisant Dell Update Package ne sont pas concernées par cette option. Power Button (Bouton d'alimentation) Vous permet d'activer ou de désactiver le bouton d'alimentation sur l'avant du système. Par défaut l'option Power Button (Bouton d'alimentation) est réglée sur Enabled (Activé). NMI Button (Bouton INM) Vous permet d'activer ou de désactiver le bouton INM sur l'avant du système. Par défaut l'option NMI Button (Bouton INM) est réglée sur Enabled (Activé). AC Power Recovery Delay (Délai de restauration de l'alimentation) Vous permet de définir le temps de réaction du système une fois l'alimentation restaurée dans le système. Par défaut, l'option AC Power Recovery (Restauration de l'alimentation) est réglée sur Last (Dernière). AC Power Recovery Delay (Délai de restauration de l'alimentation secteur) Vous permet de régler la façon dont le système prend en charge le décalage de mise sous tension après que le courant alternatif soit restauré dans le système. Par défaut, l'option AC Power Recovery Delay (Délai de restauration du courant alternatif) est réglée sur Immediate (Immédiat). User Defined Delay (60s to 240s) (Délai défini de l'utilisateur [60 à 240]) Vous permet de régler le User Defined Delay (Délai défini de l'utilisateur) lorsque l'option User Defined (Utilisateur défini) pour le AC Power Recovery Delay (Délai de restauration du courant alternatif) est sélectionné. Paramètres divers Élément de menu Description System Time (Heure système) Vous permet de régler l'heure sur le système. System Date (Date système) Vous permet de régler la date sur le système. Asset Tag (Numéro d'inventaire) Affiche le numéro d'inventaire et vous permet de le modifier à des fins de sécurité et de suivi. Keyboard NumLock (Verr Num clavier) Vous permet de définir si le système démarre avec la fonction Verr Num activée ou désactivée. Par défaut, Keyboard NumLock (Verr Num clavier) est réglé sur On (Activé). REMARQUE: Ce champ ne s'applique pas aux claviers à 84 touches. Report Keyboard Errors (Signaler les erreurs de clavier) Vous permet de définir si les messages d'erreur de clavier sont signalés pendant le démarrage du système. Par défaut, le champ Report Keyboard Errors (Signaler les erreurs de clavier) est réglé sur Report (Signaler). F1/F2 Prompt on Error (Invite F1/F2 en cas d'erreur) Vous permet d'activer ou de désactiver l'invite F1/F2 en cas d'erreur. Par défaut, F1/F2 Prompt on Error (Invite F1/F2 en cas d'erreur) est réglé sur Enabled (Activé). In-System Characterization (Caractérisation dans le système) Ce champ permet d'activer ou de désactiver In-System Characterization (Caractérisation dans le système). Par défaut, In-System Characterization (Caractérisation dans le système) est réglé sur Enabled (Activé). 32Fonctionnalités de mot de passe du système et de mot de passe de configuration Vous pouvez créer un mot de passe du système et un mot de passe de configuration pour protéger le système. Pour activer la création du mot de passe du système et du mot de passe de configuration, le cavalier de mot de passe doit être activé. Pour obtenir plus d'informations sur les paramètres du cavalier du mot de passe, reportez-vous à la section Paramètres du cavalier de la carte système. System Password (Mot de passe du système) Il s'agit du mot de passe que vous devez saisir pour ouvrir une session sur le système. Setup Password (Mot de passe de configuration) Il s'agit du mot de passe que vous devez saisir pour accéder et effectuer les modifications sur les paramètres du BIOS ou UEFI de votre système. PRÉCAUTION: Les fonctionnalités de mot de passe assurent la sécurité de base des données de votre système. PRÉCAUTION: N'importe qui peut accéder aux données enregistrées sur votre système si celui-ci est en cours de fonctionnement et sans surveillance. REMARQUE: Votre système est fourni avec la fonction de mot de passe du système et de configuration désactivée. Attribution d'un mot de passe système et/ou de configuration REMARQUE: Le cavalier de mot de passe active ou désactive les fonctions de mot de passe du système et de mot de passe de configuration. Pour obtenir des informations sur les paramètres du cavalier de mot de passe, reportezvous à la section Paramètres du cavalier de la carte système. Vous pouvez attribuer un nouveau System Password (Mot de passe du système) et/ou Setup Password (Mot de passe de configuration) ou modifier un System Password (Mot de passe du système) et/ou un Setup Password (Mot de passe de configuration) déjà existant lorsque le paramètre du cavalier du mot de passe est activé et que l'option Password Status (État du mot de passe) est Unlocked (Déverrouillé). Si Password Status (État du mot de passe) est réglé sur Locked (Verrouillé), vous ne pouvez pas modifier le mot de passe du système et/ou le mot de passe de configuration. Si le paramètre du cavalier du mot de passe est désactivé, le mot de passe du système et le mot de passe de configuration existants sont supprimés et vous n'avez pas besoin de fournir au système un mot de passe du système pour ouvrir une session. Attribution d'un mot de passe système et/ou de configuration : 1. Pour accéder à la configuration du système, appuyez immédiatement après le démarrage ou le redémarrage sur la touche . 2. Dans System Setup Main Menu (Menu principal de la configuration du système), sélectionnez System BIOS (BIOS du système) et appuyez sur . L'écran System BIOS (BIOS du système) s'affiche. 3. Dans l'écran System BIOS (BIOS du système), sélectionnez System Security (Sécurité du système) et appuyez sur . L'écran System Security (Sécurité du système) s'affiche. 4. Dans l'écran System Security (Sécurité du système), vérifiez que Password Status (État du mot de passe) est réglé sur Unlocked (Déverrouillé). 5. Sélectionnez System Password (Mot de passe du système), saisissez votre mot de passe du système, puis appuyez sur ou . Utilisez les consignes suivantes pour attribuer le mot de passe du système : 33– Un mot de passe peut contenir au maximum 32 caractères. – Le mot de passe peut contenir des chiffres allant de 0 à 9. – Seules les minuscules sont valides, les majuscules ne sont pas autorisées. – Les caractères spéciaux suivants sont autorisés : espace, (”), (+), (,), (-), (.), (/), (;), ([), (\), (]), (`). Un message vous invite à ressaisir le mot de passe du système. 6. Saisissez à nouveau le mot de passe du système entré précédemment puis cliquez sur OK. 7. Sélectionnez Setup Password (Mot de passe de configuration), saisissez votre mot de passe du système, puis appuyez sur ou . Un message vous invite à ressaisir le mot de passe de configuration. 8. Saisissez à nouveau le mot de passe de configuration entré précédemment puis cliquez sur OK. 9. Appuyez sur <Échap> pour revenir à l'écran du BIOS du système. Appuyez de nouveau sur <Échap> pour faire apparaître une invite d'enregistrement des modifications. REMARQUE: La protection par mot de passe ne prend effet que lorsque vous redémarrez le système. Suppression ou modification d'un mot de passe de configuration Assurez-vous que le cavalier de mot de passe est activé et que Password Status (État du mot de passe) est réglé sur Unlocked (Déverrouillé) avant d'essayer de supprimer ou de modifier le mot de passe du système et/ou de configuration. Vous ne pouvez pas supprimer ou modifier un mot de passe du système existant si Password Status (État du mot de passe) est réglé sur Locked (Verrouillé). Pour supprimer ou modifier le mot de passe du système et/ou de configuration : 1. Pour accéder à la configuration du système, appuyez immédiatement après le démarrage ou le redémarrage sur la touche . 2. Dans System Setup Main Menu (Menu principal de la configuration du système), sélectionnez System BIOS (BIOS du système) et appuyez sur . L'écran System BIOS (BIOS du système) s'affiche. 3. Dans l'écran System BIOS (BIOS du système), sélectionnez System Security (Sécurité du système) et appuyez sur . L'écran System Security (Sécurité du système) s'affiche. 4. Dans l'écran System Security (Sécurité du système), vérifiez que Password Status (État du mot de passe) est réglé sur Unlocked (Déverrouillé). 5. Sélectionnez System Password (Mot de passe du système), modifiez ou supprimer le mot de passe du système existant et appuyez sur ou . 6. Sélectionnez Setup Password (Mot de passe de configuration), modifiez ou supprimer le mot de passe de configuration existant et appuyez sur ou . REMARQUE: Si vous modifiez le mot de passe du système et/ou de configuration, un message vous invite à ressaisir le nouveau mot de passe. Si vous supprimer le mot de passe du système et/ou de configuration, un message vous invite à confirmer la suppression. 7. Appuyez sur <Échap> pour revenir à l'écran du BIOS du système. Appuyez de nouveau sur <Échap> pour faire apparaître une invite d'enregistrement des modifications. REMARQUE: Vous pouvez désactiver la sécurité du mot de passe tout en vous connectant au système. Pour ce faire, démarrez ou redémarrez le système, saisissez votre mot de passe puis appuyez sur . 34Protection du système à l'aide d'un mot de passe système REMARQUE: Si vous avez attribué un mot de passe de configuration, le système l'accepte également comme mot de passe du système alternatif. 1. Allumez ou redémarrez le système. 2. Saisissez le mot de passe, puis appuyez sur . Si Password Status (État du mot de passe) indique Locked (Verrouillé), vous devez saisir le mot de passe, puis appuyer sur lorsque le système vous y invite au redémarrage. Si un mot de passe du système incorrect est saisi, le système affiche un message et vous invite à saisir de nouveau votre mot de passe. Vous disposez de trois tentatives pour saisir le bon mot de passe. Après la troisième tentative infructueuse, le système affiche un message d'erreur indiquant que le système s'est arrêté et qu'il doit être éteint. Même après l'arrêt et le redémarrage du système, le message d'erreur continue à s'afficher tant que vous n'avez pas entré le mot de passe approprié. REMARQUE: Vous pouvez utiliser l'option Password Status (État du mot de passe) conjointement avec les options System Password (Mot de passe du système) et Setup Password (Mot de passe de configuration) pour mieux protéger le système contre toute modification non autorisée. Utilisation du système avec un mot de passe de configuration activé Si l'option Setup Password (Mot de passe de configuration) indique Enabled (Activé), saisissez ce mot de passe avant de modifier la plupart des options de configuration du système. Si vous ne saisissez pas le bon mot de passe au bout de trois tentatives, le système affiche le message Invalid Password! Number of unsuccessful password attempts: System Halted! Must power down. (Mot de passe incorrect ! Nombre d'essai Système arrêté ! Redémarrez le système.) Même après l'arrêt et le redémarrage du système, le message d'erreur continue à s'afficher tant que vous n'avez pas entré le mot de passe approprié. Les options suivantes font office d'exceptions : • Si l'option System Password (Mot de passe du système) n'est ni définie sur Enabled (Activé) ni verrouillée via l'option Password Status (État du mot de passe), vous pouvez attribuer un mot de passe du système. • Vous ne pouvez ni désactiver ni changer un mot de passe système existant. REMARQUE: Il est possible de combiner l'utilisation des options Password Status (État du mot de passe) et Setup Password (Mot de passe de configuration) pour empêcher toute modification non autorisée du mot de passe système. Accès au Gestionnaire d'amorçage UEFI REMARQUE: Les systèmes d'exploitation doivent être compatibles avec une version UEFI 64 bits (comme par exemple Microsoft Windows Server 2008 version x64) pour pouvoir être installés à partir du mode d'amorçage UEFI. L'installation des systèmes d'exploitation DOS et 32 bits est possible uniquement à partir du mode d'amorçage sur le BIOS. Le Gestionnaire d'amorçage permet d'effectuer les opérations suivantes : • Ajouter, supprimer et organiser les options d'amorçage • Accéder à la configuration du système et aux options d'amorçage BIOS sans nécessiter de redémarrage 35Pour accéder au Gestionnaire d'amorçage : 1. Allumez ou redémarrez le système. 2. Appuyez sur dès l'apparition du message suivant : = UEFI Boot Manager (Gestionnaire d'amorçage UEFI) Si le système d'exploitation commence à se charger alors que vous n'avez pas encore appuyé sur , attendez que le système finisse de démarrer, puis redémarrez-le et réessayez. Utilisation des touches de navigation du Gestionnaire d'amorçage Touche Description Flèche vers le haut Permet de revenir au champ précédent. Flèche vers le bas Permet de passer au champ suivant. Vous permet de saisir une valeur dans le champ sélectionné (le cas échéant) ou de suivre le lien dans le champ. Barre d'espacement Permet d'étendre ou de réduire la liste déroulante, le cas échéant. Passe à l'objectif suivant. REMARQUE: Pour le navigateur de graphiques standard seulement. <Échap> Passe à la page précédente jusqu'à ce que vous aperceviez l'écran principal. En appuyant sur la touche <Échap> dans l'écran principal, vous quitterez le gestionnaire d'amorçage et démarrerez le système. Permet d'afficher le fichier d'aide de la configuration du système. REMARQUE: Pour la plupart des options, les modifications effectuées sont enregistrées mais ne prennent effet qu'au redémarrage du système. Écran Boot Manager (Gestionnaire d'amorçage) Élément de menu Description Continue Normal Boot (Poursuivre le démarrage normal) Le système tente d'effectuer successivement l'amorçage sur différents périphériques en commençant par le premier dans l'ordre d'amorçage. En cas d'échec de l'amorçage, le système passe au périphérique suivant dans l'ordre d'amorçage jusqu'à ce que le démarrage réussisse ou qu'aucune autre option ne soit disponible. Menu BIOS Boot (Amorçage BIOS) Affiche la liste des options d'amorçage BIOS disponibles (marquées par des astérisques). Choisissez l'option d'amorçage de votre choix, puis appuyez sur . Menu UEFI Boot (Amorçage UEFI) Affiche la liste des options d'amorçage UEFI disponibles (marquées par des astérisques). Choisissez l'option d'amorçage de votre choix, puis appuyez sur . Le menu UEFI Boot (Amorçage UEFI) vous permet d'utiliser les options suivantes : Add Boot Option (Ajouter une option d'amorçage), Delete Boot Option (Supprimer une option d'amorçage) ou Boot From File (Amorçage à partir d'un fichier). 36Élément de menu Description Menu Driver Health (Intégrité du pilote) Affiche une liste des pilotes installés sur le système ainsi que leur état d'intégrité. Launch System Setup (Démarrer la configuration du système) Vous permet d'accéder au programme de configuration du système. System Utilities (Utilitaires du système) Vous permet d'accéder à l'explorateur de fichier de mise à jour du BIOS, d'exécuter le programme Dell Diagnostics et de redémarrer le système. Menu UEFI Boot (Amorçage UEFI) Élément de menu Description Select UEFI Boot Option (Sélectionner une option d'amorçage UEFI) Affiche la liste des options d'amorçage UEFI disponibles (marquées par des astérisques), choisissez l'option d'amorçage de votre choix, puis appuyez sur . Add Boot Option (Ajouter une option d'amorçage) Ajoute une nouvelle option d'amorçage. Delete Boot Option (Supprimer une option d'amorçage) Supprime une option d'amorçage existante. Boot From File (Amorçage à partir d'un fichier) Définit une option d'amorçage utilisable une seule fois qui ne figure pas dans la liste des options d'amorçage. Gestion intégrée du système Le Dell Lifecycle Controller offre une gestion avancée des systèmes intégrés tout au long du cycle de vie du serveur. Le Lifecycle Controller peut être démarré pendant la séquence d'amorçage et peut fonctionner indépendamment du système d'exploitation. REMARQUE: Certaines configurations de plate-forme peuvent ne pas prendre en charge l'ensemble des fonctionnalités de Lifecycle Controller. Pour plus d'informations sur la configuration de Lifecycle Controller, la configuration du matériel et du micrologiciel et le déploiement du système d'exploitation, reportez-vous à la documentation relative à Lifecycle Controller, disponible à l'adresse support.dell.com/manuals. Utilitaire de configuration iDRAC L'utilitaire de configuration iDRAC est une interface permettant d'installer et de configurer les paramètres iDRAC à l'aide de UEFI. Vous pouvez activer ou désactiver de nombreux paramètres iDRAC à l'aide de l'utilitaire de configuration iDRAC7. REMARQUE: L'accès à certaines fonctions de l'utilitaire de configuration iDRAC exige la mise à niveau de la licence iDRAC7 Enterprise. Pour en savoir plus sur l'utilisation d'iDRAC, reportez-vous à la section iDRAC7 User's Guide (Guide de l'utilisateur iDRAC7) sous Software → Systems Management → Dell Remote Access Controllers (Logiciel, Gestion des systèmes, Contrôleurs d'accès à distance DELL) à l'adresse suivante : support.dell.com/manuals. 37Accès à l'utilitaire de configuration iDRAC 1. Activez ou redémarrez le système géré. 2. Appuyez sur pendant l'auto-test de démarrage (POST). 3. Sur la page System Setup Main Menu (Menu principal du système de configuration), cliquez sur iDRAC Settings (Paramètres iDRAC). La page iDRAC Settings (Paramètres iDRAC) s'affiche. 383 Installation des composants du système Outils recommandés Vous pouvez avoir besoin des outils suivants pour réaliser les procédures décrites dans cette section : • Clé du verrouillage à clé du système • Tournevis cruciforme n°2 • Tournevis Torx T10 et T15 • Bracelet antistatique connecté à une prise de terre Cadre avant (en option) Installation du cadre avant 1. Accrochez l'extrémité droite du cadre au châssis. 2. Fixez l'extrémité libre du cadre sur le système. 3. Fixez le cadre à l'aide du verrouillage à clé. Figure 9. Installation et retrait du cadre avant 1. Loquet de dégagement 2. Verrou 3. Cadre avant 4. Crochet de verrouillage 39Retrait du cadre avant 1. Ouvrez le verrou situé à l'extrémité gauche du cadre. 2. Soulevez le loquet d'éjection situé près du verrou. 3. Faites pivoter l'extrémité gauche du cadre pour écarter celui-ci du panneau avant. 4. Décrochez la partie droite du cadre et retirez le cadre du système. Ouverture et fermeture du système AVERTISSEMENT: Chaque fois que vous devez soulever le système, demandez de l'aide. Pour éviter les blessures, ne tentez pas de soulever le système par vous-même. AVERTISSEMENT: Ouvrir ou retirer le capot du système lorsque celui-ci est sous tension est dangereux. Vous risqueriez de recevoir une décharge électrique. PRÉCAUTION: La plupart des réparations ne peuvent être effectuées que par un technicien de maintenance agréé. N'effectuez que les opérations de dépannage et les petites réparations autorisées par la documentation de votre produit et suivez les instructions fournies en ligne ou par téléphone par l'équipe de maintenance et d'assistance technique. Tout dommage causé par une réparation non autorisée par Dell est exclu de votre garantie. Consultez et respectez les consignes de sécurité fournies avec votre produit. PRÉCAUTION: Ne pas faire fonctionner le système sans le capot pour une durée dépassant cinq minutes. Ouverture du système REMARQUE: L'utilisation systématique d'un tapis et d'un bracelet antistatiques est recommandée pour manipuler les composants internes du système. 1. Mettez le système et les périphériques connectés hors tension, puis débranchez le système de la prise secteur. 2. Tournez le verrou du loquet de dégagement dans le sens inverse des aiguilles d'une montre pour le déverrouiller. 3. Soulevez le loquet situé sur la partie supérieure du système, puis faites glisser le capot vers l'arrière. 4. Saisissez le capot de chaque côté, puis soulevez-le avec précaution pour le retirer du système. 40Figure 10. Ouverture et fermeture du système 1. Capot du système 2. Loquet 3. Verrou du loquet de dégagement Fermeture du système 1. Relevez le loquet situé sur le capot. 2. Placez le capot sur le châssis et décalez-le légèrement vers l'arrière pour le dégager des crochets du châssis, de sorte qu'il repose totalement à plat sur ce dernier. 3. Rabattez le loquet pour faire pivoter le capot en position fermée. 4. Tournez le verrou du loquet de dégagement dans le sens des aiguilles d'une montre pour fermer le capot. 5. Rebranchez le système à la prise secteur et mettez-le sous tension, ainsi que les périphériques qui y sont connectés. À l'intérieur du système PRÉCAUTION: La plupart des réparations ne peuvent être effectuées que par un technicien de maintenance agréé. N'effectuez que les opérations de dépannage et les petites réparations autorisées par la documentation de votre produit et suivez les instructions fournies en ligne ou par téléphone par l'équipe de maintenance et d'assistance technique. Tout dommage causé par une réparation non autorisée par Dell est exclu de votre garantie. Consultez et respectez les consignes de sécurité fournies avec votre produit. REMARQUE: Les composants remplaçables à chaud sont indiqués en orange et les ergots sur les composants sont indiqués en bleu. 41Figure 11. À l'intérieur du système : avec un bloc d'alimentation non-redondant 1. Carénage de refroidissement 2. Bloc d'alimentation 3. Carte contrôleur de stockage 4. Carte de montage pour cartes d'extension 2 5. Carte d'extension 6. Carte de montage pour cartes d'extension 1 7. Dissipateur de chaleur du processeur 2 8. Barrettes de mémoire DIMM (12) 9. Ventilateurs (5) 10. Lecteur optique 11. Disques durs (4) 12. Panneau d'E/S avant 13. Loquet de fixation de câbles 42Figure 12. À l'intérieur du système : avec des blocs d'alimentation redondants 1. Carénage de la carte de distribution d'alimentation 2. Carénage de refroidissement 3. Blocs d'alimentation (2) 4. Carte contrôleur de stockage 5. Carte de montage pour cartes d'extension 2 6. Carte d'extension 7. Carte de montage pour cartes d'extension 1 8. Dissipateur de chaleur du processeur 2 9. Barrettes de mémoire DIMM (12) 10. Ventilateurs (5) 11. Lecteur optique 12. Disques durs (4) 13. Panneau de commande 14. Fond de panier des disques durs 15. Loquet d'acheminement de câbles 16. Carte de distribution de l'alimentation 43Carénage de refroidissement Retrait du carénage de refroidissement PRÉCAUTION: La plupart des réparations ne peuvent être effectuées que par un technicien de maintenance agréé. N'effectuez que les opérations de dépannage et les petites réparations autorisées par la documentation de votre produit et suivez les instructions fournies en ligne ou par téléphone par l'équipe de maintenance et d'assistance technique. Tout dommage causé par une réparation non autorisée par Dell est exclu de votre garantie. Consultez et respectez les consignes de sécurité fournies avec votre produit. PRÉCAUTION: Ne mettez jamais le système sous tension sans le carénage de refroidissement. Le système peut surchauffer rapidement entraînant sa mise hors tension ainsi qu'une perte de données. 1. Éteignez le système et les périphériques connectés, puis débranchez le système de la prise secteur et des périphériques. 2. Ouvrez le système. 3. Saisissez les ergots, puis soulevez le carénage de refroidissement du support de ventilateur. Figure 13. Retrait et installation du carénage de refroidissement 1. Carénage de refroidissement 2. Pattes du carénage de refroidissement (4) 3. Support du ventilateur 44Installation du carénage de refroidissement PRÉCAUTION: La plupart des réparations ne peuvent être effectuées que par un technicien de maintenance agréé. N'effectuez que les opérations de dépannage et les petites réparations autorisées par la documentation de votre produit et suivez les instructions fournies en ligne ou par téléphone par l'équipe de maintenance et d'assistance technique. Tout dommage causé par une réparation non autorisée par Dell est exclu de votre garantie. Consultez et respectez les consignes de sécurité fournies avec votre produit. REMARQUE: Pour une installation du carénage de refroidissement du châssis, assurez-vous que les câbles à l'intérieur du système sont acheminés via le loquet de fixation de câbles. 1. Alignez le carénage de refroidissement en utilisant les baies de ventilateurs numérotées comme repère. 2. Abaissez le carénage de refroidissement dans le châssis. Lorsqu'il est correctement installé, les numéros de supports de mémoire sur le carénage d'alignement avec les supports de mémoire et les quatre pattes sur le carénage de refroidissement reposent sur le support de ventilateur. 3. Refermez le système. 4. Rebranchez le système à la prise secteur et mettez-le sous tension, ainsi que les périphériques qui y sont connectés. Mémoire système Votre système prend en charge des barrettes de mémoire DIMM ECC DDR3 sans tampon (ECC UDIMM) et des barrettes de mémoire DIMM à registres (RDIMM). Il prend en charge les spécifications de tension DDR3 et DDR3L. REMARQUE: MT/s indique la vitesse de la barrette DIMM en méga-transferts par seconde. La fréquence de fonctionnement de bus mémoire peut être de 1 600 MT/s, 1 333 MT/s, 1 066 MT/s ou 800 MT/s selon : • le type de barrette DIMM (UDIMM ou RDIMM) • la configuration de la barrette DIMM (nombre de rangées) ; • la fréquence maximale des barrettes DIMM • le nombre de barrettes DIMM installées par canal • la tension de fonctionnement de la barrette DIMM • le profil système sélectionné (par exemple, Performance Optimized [Performance optimisée], Custom [Personnalisé] ou Dense Configuration Optimized [Configuration dense optimisée]) • la fréquence maximale de la barrette DIMM prise en charge des processeurs Le tableau suivant présente les installations de mémoire et les fréquences de fonctionnement pour les configurations prises en charge. Type de barrette de mémoire DIMM Barrettes installées/canal DIMM Fréquence de fonctionnement (en MT/s) Rangées de barrettes DIMM maximales/canal 1,5 V 1,35 V ECC UDIMM 1 1 333, 1 066 et 800 1 333, 1 066 et 800 Double rangée 2 1 333, 1 066 et 800 1 066 et 800 Double rangée Barrette RDIMM 1 1 600, 1 333, 1 066 et 800 1 333, 1 066 et 800 1 333, 1 066 et 800 1 066 et 800 Double rangée Quadruple rangée 45Type de barrette de mémoire DIMM Barrettes installées/canal DIMM Fréquence de fonctionnement (en MT/s) Rangées de barrettes DIMM maximales/canal 1,5 V 1,35 V 2 1 600, 1 333, 1 066 et 800 1 066 et 800 1 333, 1 066 et 800 1 066 et 800 Double rangée Quadruple rangée Le système contient 12 supports de barrettes de mémoire divisés en deux ensembles de six supports, un ensemble par processeur. Chaque ensemble de six supports est organisé en trois canaux. Dans chaque canal, les leviers d'éjection du premier support sont blancs et du deuxième sont noirs. REMARQUE: Les barrettes DIMM des supports A1 à A6 sont attribuées au processeur 1 et les barrettes DIMM des supports B1 à B6 sont attribuées au processeur 2. Figure 14. Emplacement des supports de mémoire Les canaux de mémoire sont répartis comme suit : 46Processeur 1 Canal 1 : supports de barrettes de mémoire A1 et A4 Canal 2 : supports de barrettes de mémoire A2 et A5 Canal 3 : supports de barrettes de mémoire A3 et A6 Processeur 2 Canal 1 : supports de barrettes de mémoire B1 et B4 Canal 2 : supports de barrettes de mémoire B2 et B5 Canal 3 : supports de barrettes de mémoire B3 et B6 Consignes générales pour l'installation des barrettes de mémoire Ce système prend en charge la configuration de mémoire flexible, permettant une configuration et une exécution du système depuis n'importe quelle configuration architecturale d'un jeu de puces valide. Ci-dessous se trouvent les consignes recommandées pour obtenir des performances optimales : • Les barrettes UDIMM et RDIMM ne doivent pas être mélangées. • Les barrettes DIMM DRAM x4 et x8 peuvent être combinées. Pour obtenir plus d'informations, reportez-vous aux consignes spécifiques à chaque mode. • Deux barrettes UDIMM maximum peuvent être installées dans un canal. • Deux barrettes RDIMM à quatre rangée maximum peuvent être installées dans un canal. • Deux barrettes RDIMM à rangée unique ou à double rangée maximum peuvent être installées dans un canal. • Une barrette RDIMM à quatre rangées et une barrette RDIMM à rangée simple ou à double rangée peuvent être installées dans un canal. • Remplissez les supports de barrettes DIMM uniquement si un processeur est installé. Pour les systèmes à processeur unique, les supports A1 à A6 sont disponibles. Pour les systèmes à double processeur, les supports A1 à A6 et les supports B1 à B6 sont disponibles. • Remplissez d'abord tous les supports avec les pattes de dégagement blanches puis les noires. • Remplissez les supports par le nombre de rangées le plus élevé dans l'ordre suivant : tout d'abord les supports avec les pattes de dégagement blanches, puis les noires. Par exemple, si vous souhaitez mélanger des barrettes DIMM à quatre rangées et à double rangée, installez les barrettes DIMM à quatre rangées dans les supports avec pattes de dégagement blanches et les barrettes à double rangée dans les supports avec pattes de dégagement noires. • Dans une configuration à deux processeurs, la configuration de la mémoire pour chaque processeur doit être identique. Par exemple, si vous remplissez le support A1 pour le processeur 1, vous devez alors remplir le support B1 pour le processeur 2, etc. • Des barrettes de mémoire de différentes tailles peuvent être combinées tant que les autres règles de population de mémoire sont respectées (par exemple, les barrettes de mémoire de 2 Go et de 4 Go peuvent être mélangées). • Selon les consignes spécifiques à chaque mode, remplissez deux ou trois barrettes de mémoire DIMM par processeur (une barrette DIMM par canal) à la fois pour maximiser les performances. Pour obtenir plus d'informations, reportez-vous aux consignes spécifiques à chaque mode. • Si les barrettes de mémoire avec différentes vitesses sont installées, elles fonctionneront à la vitesse de la/des barrette(s) de mémoire installée(s) la/les plus lente(s) ou plus lentement selon la configuration des barrettes DIMM sur le système. Consignes spécifiques à chaque mode Quatre canaux de mémoire sont attribués à chaque processeur. Les configurations autorisées dépendent du mode de mémoire sélectionné. 47REMARQUE: Les barrettes DIMM DRAM de largeur x4 et x8 peuvent être mélangées pour offrir une prise en charge des fonctionnalités RAS. Toutefois, toutes les recommandations pour des fonctionnalités RAS spécifiques doivent être respectées. Les barrettes DIMM DRAM de largeur x4 conservent la correction SDDC (Single Device Data Correction) dans le mode d'optimisation de la mémoire (canal indépendant). Les barrettes DIMM DRAM de largeur x8 nécessitent le mode Fonctions ECC avancées pour profiter de la correction SDDC. Les sections suivantes offrent des recommandations supplémentaires relatives au remplissage de logements pour chaque mode. Fonctions ECC avancées (Lockstep) Le mode Advanced ECC (Fonctions avancées) permet d'étendre la SDDC des barrettes DIMM DRAM de largeur x4 aux DRAM de largeur x4 et x8. Ce mode permet de protéger le système contre les échecs de puce DRAM seule au cours du fonctionnement normal. Consignes d'installation de la mémoire : • Les barrettes de mémoire A1, A4, B1 et B4 sont désactivées et ne prennent pas en charge le mode ECC avancées. • Les barrettes DIMM doivent être installées par paires identiques. Les barrettes DIMM installées dans les supports de mémoire (A2, B2) doivent correspondre aux barrettes de mémoire DIMM installées dans les supports de mémoire (A3, B3) et les barrettes DIMM installées dans les supports de mémoire (A5, B5) doivent correspondre aux barrettes de mémoire DIMM installées dans les supports de mémoire (A6, B6). REMARQUE: Les fonctions ECC avancées avec mise en miroir ne sont pas prises en charge. Mode Memory Optimized (Independent Channel) [Optimisation de la mémoire (canal indépendant)] Ce mode prend en charge la SDDC uniquement pour les barrettes de mémoire qui utilisent une largeur de périphérique x4 et qui n'imposent aucune exigence spécifique relative à la population d'emplacements. Memory Sparing (Mémoire de réserve) REMARQUE: Afin d'utiliser la mémoire de réserve, cette fonction doit être activée dans la configuration du système. Dans ce mode, une rangée par canal est réservée. Dans le cas où des erreurs corrigeables persistantes sont détectées sur une rangée, les données de cette rangée sont copiées sur la rangée de réserve et la rangée défaillante est désactivée. Lorsque la mémoire de réserve est activée, la mémoire système disponible du système d'exploitation est réduite d'une rangée par canal. Par exemple, dans un système à trois barrettes de mémoire DIMM double rangée de 8 Go, la mémoire système disponible est : 1/2 (rangées/canal) × 3 (barrettes de mémoire DIMM) × 8 Go = 12 Go et non pas 3 (barrettes de mémoire) × 8 Go = 24 Go. REMARQUE: La mémoire de réserve n'offre aucune protection contre une erreur non corrigeable sur plusieurs bits. REMARQUE: Les modes Fonctions ECC avancées/Lockstep et Optimisation prennent en charge la mémoire de réserve. Memory Mirroring (Mise en miroir de la mémoire) La mise en miroir de la mémoire offre le mode disposant de la plus forte fiabilité des barrettes DIMM comparativement aux autres modes. En effet, il offre une protection contre les incidents non corrigeables sur plusieurs bits. Dans une configuration mise en miroir, la mémoire système totale disponible correspond à la moitié du total de la mémoire physique installée. La moitié de la mémoire installée est utilisée pour mettre en miroir les barrettes DIMM actives. Dans le cas d'une erreur non corrigeable, le système bascule sur la copie mis en miroir. Cela garantie la SDDC et la protection sur plusieurs bits. Consignes d'installation de la mémoire : 48REMARQUE: Le premier canal de mémoire pour chaque processeur (canal 1) est désactivé et n'est pas disponible pour la mise en mirroir de la mémoire. • Les canaux de mémoire 2 et 3 doivent être utilisés. • Les barrettes doivent être de taille, de vitesse et de technologie identiques. • Les barrettes de mémoire DIMM installées dans les logements de mémoire avec des pattes de dégagement blanches doivent être identiques et la même règle doit s'appliquer pour les logements avec les pattes de dégagement noires. Par exemple, les barrettes de mèmoire DIMM installées dans les logements A2 et A3 doivent être identiques. Exemples de configurations de mémoire Les tableaux suivants présentent des exemples de configuration de mémoire conformes aux consignes énoncées dans cette section. REMARQUE: Les barrettes RDIMM à quatre rangées de 16 Go ne sont pas prises en charge. REMARQUE: Les sigles 1R et 2R utilisés dans les tableaux ci-dessous correspondent à des barrettes DIMM à rangée simple et double. Tableau 1. Configurations de mémoire — Un processeur Capacité du système (en Go) Taille des barrettes de mémoire DIMM (en Go) Nombre de barrettes de mémoire DIMM Organisation et vitesse Remplissage des logements de barrettes de mémoire DIMM 2 2 1 1R x8, 1 333 MT/s 1R x8, 1 600 MT/s A1 4 2 2 1R x8, 1 333 MT/s 1R x8, 1 600 MT/s A1, A2 10 2 5 1R x8, 1 333 MT/s 1R x8, 1 600 MT/s A1, A2, A3, A4, A5 12 4 3 1R x8, 1 333 MT/s 1R x8, 1 600 MT/s A1, A2, A3 20 4 5 1R x8, 1 333 MT/s 1R x8, 1 600 MT/s A1, A2, A3, A4, A5 24 8 3 2R x4, 1 333 MT/s 2R x4, 1 600 MT/s A1, A2, A3 32 8 4 2R x4, 1 333 MT/s 2R x4, 1 600 MT/s A1, A2, A3, A4 48 16 3 2R x4, 1 333 MT/s 2R x4, 1 600 MT/s A1, A2, A3 96 16 6 2R x4, 1 333 MT/s 2R x4, 1 600 MT/s A1, A2, A3, A4, A5, A6 49Tableau 2. Configurations de mémoire — Deux processeurs Capacité du système (en Go) Taille des barrettes de mémoire DIMM (en Go) Nombre de barrettes de mémoire DIMM Organisation et vitesse Remplissage des logements de barrettes de mémoire DIMM 4 2 2 1R x8, 1 333 MT/s 1R x8, 1 600 MT/s A1, B1 8 2 4 1R x8, 1 333 MT/s 1R x8, 1 600 MT/s A1, A2, B1, B2 12 2 6 1R x8, 1 333 MT/s 1R x8, 1 600 MT/s A1, A2, A3, B1, B2, B3 24 4 6 2R x8, 1 333 MT/s 2R x8, 1 600 MT/s A1, A2, A3, B1, B2, B3 48 8 6 2R x4, 1 333 MT/s 2R x4, 1 600 MT/s A1, A2, A3, B1, B2, B3 96 16 6 2R x4, 1 333 MT/s 2R x4, 1 600 MT/s A1, A2, A3, B1, B2, B3 128 16 8 2R x4, 1 333 MT/s 2R x4, 1 600 MT/s A1, A2, A3, A4, B1, B2, B3, B4 160 16 10 2R x4, 1 333 MT/s 2R x4, 1 600 MT/s A1, A2, A3, A4, A5, B1, B2, B3, B4, B5 192 16 12 2R x4, 1 333 MT/s 2R x4, 1 600 MT/s A1, A2, A3, A4, A5, A6, B1, B2, B3, B4, B5, B6 Retrait de barrettes de mémoire AVERTISSEMENT: Les barrettes de mémoire restent chaudes au toucher quelques temps après l'arrêt du système. Laissez refroidir les barrettes avant de les manipuler. Manipulez les barrettes par les bords de la carte et évitez de toucher leurs composants. PRÉCAUTION: La plupart des réparations ne peuvent être effectuées que par un technicien de maintenance agréé. N'effectuez que les opérations de dépannage et les petites réparations autorisées par la documentation de votre produit et suivez les instructions fournies en ligne ou par téléphone par l'équipe de maintenance et d'assistance technique. Tout dommage causé par une réparation non autorisée par Dell est exclu de votre garantie. Consultez et respectez les consignes de sécurité fournies avec votre produit. PRÉCAUTION: Pour assurer le bon refroidissement du système, des barrettes neutres doivent être installées dans tout logement de barrette inoccupé. Retirez les barrettes neutres uniquement si vous avez l'intention d'utiliser des barrettes de mémoire dans ces logements. 1. Éteignez le système et les périphériques qui y sont connectés, puis débranchez le système de la prise secteur et déconnectez-le des périphériques. 2. Ouvrez le système. 3. Retirez le carénage de refroidissement. 4. Localisez le(s) support(s) de barrettes de mémoire appropriés. PRÉCAUTION: Tenez chaque barrette par les bords, en veillant à ne pas toucher la partie centrale. 505. Exercez une pression vers le bas puis vers l'extérieur sur les dispositifs d'éjection situés de part et d'autre de l'emplacement, afin d'extraire la barrette de mémoire. Figure 15. Retrait et installation d'une barrette de mémoire 1. module de mémoire 2. dispositifs d'éjection du support pour barrette de mémoire (2) 3. détrompeur 6. Installez les caches du module de mémoire dans le ou les supports du module de mémoire vides afin de garantir le refroidissement correct du système. 7. Installez le carénage de ventilation. 8. Refermez le système. 9. Rebranchez le système à la prise secteur et mettez-le sous tension, ainsi que les périphériques qui y sont connectés. Installation de barrettes de mémoire AVERTISSEMENT: Les barrettes de mémoire restent chaudes au toucher quelques temps après l'arrêt du système. Laissez refroidir les barrettes avant de les manipuler. Manipulez les barrettes par les bords de la carte et évitez de toucher leurs composants. PRÉCAUTION: La plupart des réparations ne peuvent être effectuées que par un technicien de maintenance agréé. N'effectuez que les opérations de dépannage et les petites réparations autorisées par la documentation de votre produit et suivez les instructions fournies en ligne ou par téléphone par l'équipe de maintenance et d'assistance technique. Tout dommage causé par une réparation non autorisée par Dell est exclu de votre garantie. Consultez et respectez les consignes de sécurité fournies avec votre produit. PRÉCAUTION: Pour assurer le bon refroidissement du système, des barrettes neutres doivent être installées dans tout logement de barrette inoccupé. Retirez les barrettes neutres uniquement si vous avez l'intention d'utiliser des barrettes de mémoire dans ces logements. 511. Éteignez le système et les périphériques qui y sont connectés, puis débranchez le système de la prise secteur et déconnectez-le des périphériques. 2. Ouvrez le système. 3. Retirez le carénage de refroidissement. 4. Identifiez les supports de barrettes de mémoire. 5. Appuyez sur les éjecteurs qui se trouvent sur le support du module de mémoire et relâchez-les afin de permettre au module de mémoire de s'insérer dans le support. Si un cache de module de mémoire est installé dans le support, enlevez-le. REMARQUE: Conservez le ou les caches de module de mémoire pour une utilisation ultérieure. PRÉCAUTION: Tenez chaque barrette par les bords, en veillant à ne pas toucher la partie centrale. 6. Alignez le connecteur de bord de la barrette de mémoire sur le repère du support, puis insérez la barrette dans le support. REMARQUE: Le détrompeur du logement de la barrette mémoire permet de garantir que la barrette est insérée dans le bon sens. 7. Appuyez sur la barrette de mémoire avec les pouces jusqu'à verrouillage du loquet des leviers du support. Si la barrette de mémoire est installée correctement, les leviers s'alignent sur ceux des autres connecteurs équipés de barrettes. 8. Répétez les étapes 4 à 7 de cette procédure pour installer les barrettes de mémoire restantes. 9. Réinstallez le carénage de refroidissement. 10. Refermez le système. 11. Rebranchez le système à la prise secteur et mettez-le sous tension, ainsi que les périphériques qui y sont connectés. 12. Appuyez sur pour accéder à la Configuration système, puis vérifiez les paramètres de la mémoire. Le système doit normalement avoir déjà modifié la valeur pour prendre en compte la mémoire qui vient d'être installée. 13. Si la valeur est incorrecte, un ou plusieurs module de mémoire peuvent ne pas être installés correctement. Répétez les étapes 4 à 7 de cette procédure, en vous assurant bien que les modules de mémoire sont fermement positionnés dans leurs supports. 14. Exécutez le test de diagnostic approprié. Pour plus d'informations, reportez-vous à la section Utilisation des diagnostics système. Disques durs Selon la configuration, votre système prend en charge l'un des éléments suivants : Systèmes à quatre disques durs Jusqu'à quatre disques durs connectés par câble de 3,5 pouces ou Jusqu'à quatre disques durs SAS, SATA ou Nearline SAS de 3,5 pouces, remplaçables à chaud ou Jusqu'à quatre disques durs SAS, SATA, SAS SSD, SATA SSD ou Nearline SAS de 2,5 pouces, remplaçables à chaud Systèmes à huit disques durs Jusqu'à huit disques durs SAS, SATA, SAS SSD, SATA SSD ou Nearline SAS de 2,5 pouces, remplaçables à chaud REMARQUE: Des disques durs SSD/SAS/SATA ne peuvent pas être mélangés dans un système. 52Les disques durs remplaçables à chaud se connectent au système grâce au fond de panier de disques durs. Les disques durs remplaçables à chaud sont fournis dans des supports de disques durs remplaçables à chaud qui s'insèrent dans les logements de disques durs. PRÉCAUTION: Avant de retirer ou d'installer un disque dur remplaçable à chaud pendant que le système est en cours de fonctionnement, reportez-vous à la documentation relative à la carte contrôleur de stockage pour vérifier que la configuration de l'adaptateur hôte lui permet de prendre en charge le retrait et l'insertion de disques durs remplaçables à chaud. PRÉCAUTION: N'éteignez pas votre système et ne le redémarrez pas pendant que le disque dur est en train de se formater. Cela pourrait causer une panne du disque dur. REMARQUE: Utilisez uniquement des disques durs testés et homologués pour l'utilisation avec le fond de panier de disque dur. Lorsque vous formatez un disque dur, prévoyez assez de temps pour terminer le formatage. Souvenez-vous que des disques durs à capacité élevée peuvent prendre des heures pour se formater. Retrait d'un cache de lecteur de disque dur de 2,5 pouces PRÉCAUTION: Pour assurer un refroidissement correct du système, vous devez installer un cache de disque dur dans toutes les baies de disque dur vacantes. 1. Retirez le cadre avant s'il est installé. 2. Appuyez sur le bouton de dégagement et extrayez le cache hors du logement de disque. Figure 16. Retrait et installation d'un cache de lecteur de disque dur de 2,5 pouces 1. cache de disque dur 2. bouton de dégagement Installation d'un cache de lecteur de disque dur de 2,5 pouces 1. Retirez le cadre avant s'il est installé. 2. Insérez le cache de disque dur dans le logement de disque dur jusqu'à ce que le bouton de dégagement s'enclenche. 3. Le cas échéant, installez le cadre avant. 53Retrait d'un cache de disque dur de 3,5 pouces PRÉCAUTION: Pour assurer un refroidissement correct du système, vous devez installer un cache dans tous les logements de disque dur vacants. 1. Retirez le cadre avant s'il est installé. 2. Saisissez l'avant du cache de disque dur, appuyez sur le bouton de dégagement et extrayez le cache hors du logement de disque. Figure 17. Retrait et installation d'un cache de disque dur de 3,5 pouces 1. Cache de disque dur 2. Bouton de dégagement Installation d'un cache de lecteur de disque dur de 3,5 pouces 1. Retirez le cadre avant s'il est installé. 2. Insérez le cache de disque dur dans le logement de disque dur jusqu'à ce que le bouton de dégagement s'enclenche. 3. Le cas échéant, installez le cadre avant. Retrait d'un disque dur remplaçable à chaud PRÉCAUTION: Pour éviter toute perte de données, veillez à ce que le remplacement de lecteurs à chaud soit pris en charge. Consultez la documentation fournie avec le système d'exploitation. 1. À partir du logiciel de gestion, préparez le retrait du disque dur. Attendez que les indicateurs du support de disque dur signalent qu'il peut être retiré en toute sécurité. Pour de plus amples informations, consultez la documentation du contrôleur de stockage. Si le disque dur est en ligne, l'indicateur d'activité/de panne clignote en vert lorsque le disque dur est mis hors tension. Une fois les indicateurs du disque dur éteints, celui-ci est prêt à être retiré. 2. Appuyez sur le bouton de dégagement pour ouvrir la poignée de dégagement du support du disque. 3. Retirez le support de disque dur de la baie de disque. 54PRÉCAUTION: Pour assurer un refroidissement correct du système, vous devez installer un cache de disque dur dans toutes les baies de disque dur vacantes. 4. Insérez un cache de lecteur dans la baie de disque dur vacante. Figure 18. Retrait et installation d'un disque dur remplaçable à chaud 1. bouton de dégagement 2. disque dur 3. poignée du support de disque dur Installation d'un disque dur remplaçable à chaud PRÉCAUTION: La plupart des réparations ne peuvent être effectuées que par un technicien de maintenance agréé. N'effectuez que les opérations de dépannage et les petites réparations autorisées par la documentation de votre produit et suivez les instructions fournies en ligne ou par téléphone par l'équipe de maintenance et d'assistance technique. Tout dommage causé par une réparation non autorisée par Dell est exclu de votre garantie. Consultez et respectez les consignes de sécurité fournies avec votre produit. PRÉCAUTION: Utilisez uniquement des disques durs testés et homologués pour l'utilisation avec le fond de panier de disque dur. PRÉCAUTION: La prise en charge de la combinaison lecteurs SAS et SATA dans le même volume RAID n'est pas assurée. PRÉCAUTION: Lors de l'installation d'un disque dur, assurez-vous que les lecteurs adjacents sont pleinement installés. Si vous essayez d'insérer un support de disque dur et de verrouiller sa poignée en regard d'un support partiellement installé, vous risquez d'endommager le ressort du carénage du support partiellement installé et de le rendre inutilisable. PRÉCAUTION: Pour éviter toute perte de données, veillez à ce que le remplacement de lecteurs à chaud soit pris en charge. Consultez la documentation fournie avec le système d'exploitation. PRÉCAUTION: Lorsqu'un disque dur remplaçable à chaud est installé et que le système est mis sous tension, le disque dur commence automatiquement à se reconstruire. Veillez strictement à ce que le disque dur de remplacement soit vierge ou contienne des données que vous souhaitez écraser. Les éventuelles données présentes sur le disque dur de remplacement sont immédiatement perdues après l'installation du disque. 551. Si un cache de disque dur est installé dans le logement de disque dur, retirez-le. 2. Installez le disque dur dans le support de disque dur. 3. Appuyez sur le bouton de dégagement situé à l'avant du support de disque dur puis tournez la poignée. 4. Insérez le support de disque dur dans le logement de disque dur jusqu'à ce que le support se connecte au fond de panier. 5. Fermez la poignée du support de disque dur afin de verrouiller le lecteur. Retrait d'un disque dur connecté par câble PRÉCAUTION: La plupart des réparations ne peuvent être effectuées que par un technicien de maintenance agréé. N'effectuez que les opérations de dépannage et les petites réparations autorisées par la documentation de votre produit et suivez les instructions fournies en ligne ou par téléphone par l'équipe de maintenance et d'assistance technique. Tout dommage causé par une réparation non autorisée par Dell est exclu de votre garantie. Consultez et respectez les consignes de sécurité fournies avec votre produit. 1. Retirez le cadre avant s'il est installé. 2. Mettez le système et les périphériques connectés hors tension, débranchez le système de la prise secteur, puis déconnectez-le de tous les périphériques. 3. Ouvrez le système. 4. Déconnectez les câbles de données et d'alimentation du disque dur. 5. Appuyez sur la patte de dégagement située sur le support de disque dur et extrayez le disque dur de la baie de disques durs. PRÉCAUTION: Pour assurer un refroidissement correct du système, vous devez installer un cache sur tous les logements de disque dur vacants. 6. Insérez un cache sur le logement de disque dur vacant. Figure 19. Retrait et installation d'un disque dur connecté par câble 1. Disque dur 2. Câble d'alimentation/de données 3. Languette de dégagement 4. Support de disque dur 56Installation d'un disque dur connecté par câble PRÉCAUTION: La plupart des réparations ne peuvent être effectuées que par un technicien de maintenance agréé. N'effectuez que les opérations de dépannage et les petites réparations autorisées par la documentation de votre produit et suivez les instructions fournies en ligne ou par téléphone par l'équipe de maintenance et d'assistance technique. Tout dommage causé par une réparation non autorisée par Dell est exclu de votre garantie. Consultez et respectez les consignes de sécurité fournies avec votre produit. 1. Retirez le cadre avant s'il est installé. 2. Mettez le système et les périphériques connectés hors tension, débranchez le système de la prise secteur, puis déconnectez-le de tous les périphériques. 3. Ouvrez le système. 4. Appuyez sur la patte de dégagement située sur le support de disque dur, puis extrayez le lecteur du système. 5. Insérez le disque dur dans son support. 6. Insérez le cache de disque dur dans le logement de disque dur jusqu'à ce qu'il s'enclenche. 7. Branchez le câble d'alimentation/de données au disque dur. – Pour relier le disque dur au contrôleur SATA intégré (disques durs SATA seulement), branchez le câble de données SATA sur le connecteur SATA_A-D de la carte système. – Pour relier le disque dur à une carte contrôleur SAS RAID (disques durs SAS ou SATA), branchez le câble de données sur le connecteur situé sur le bord de la carte. 8. Refermez le système. 9. Rebranchez le système sur la prise secteur et allumez-le, ainsi que les périphériques connectés. 10. Accédez au programme de configuration du système et vérifiez que le contrôleur de disque dur est activé. 11. Quittez le programme de configuration du système et redémarrez le système. 12. Installez les logiciels requis pour le fonctionnement du disque dur comme décrit dans la documentation du disque dur. Retrait d'un disque dur de 2,5 pouces depuis un adaptateur de disque dur de 3,5 pouces REMARQUE: Un disque dur de 2,5 pouces est installé dans un adaptateur de disque dur de 3,5 pouces, qui est installé dans le support de disque dur de 3,5 pouces. Cela s'applique à un système à quatre disques durs avec disques durs remplaçables à chaud. 1. Retirez les deux vis du côté de l'adaptateur de disque dur de 3,5 pouces. 2. Faites glissez le disque dur depuis l'adaptateur de disque dur. 57Figure 20. Retrait et installation d'un disque dur de 2,5 pouces dans un adaptateur de disque dur de 3,5 pouces 1. Vis (2) 2. Adaptateur de disque dur de 3,5 pouces 3. Disque dur de 2,5 pouces Installation d'un disque dur de 2,5 pouces dans un adaptateur de disque dur de 3,5 pouces PRÉCAUTION: La plupart des réparations ne peuvent être effectuées que par un technicien de maintenance agréé. N'effectuez que les opérations de dépannage et les petites réparations autorisées par la documentation de votre produit et suivez les instructions fournies en ligne ou par téléphone par l'équipe de maintenance et d'assistance technique. Tout dommage causé par une réparation non autorisée par Dell est exclu de votre garantie. Consultez et respectez les consignes de sécurité fournies avec votre produit. 1. Alignez les trous de vis sur le disque dur de 2,5 pouces avec les trous de vis de l'adaptateur de disque dur de 3,5 pouces. 2. Installez les vis qui fixent le disque dur à l'adaptateur. Retrait d'un disque dur ou un adaptateur de disque dur depuis un support de disque dur 1. Retirez les vis des rails coulissants du support de disque dur. 2. Extrayez le disque dur/l'adaptateur de disque dur du support de disque dur. 58Figure 21. Retrait ou installation d'un disque dur remplaçable à chaud dans un support de disque dur 1. Support de disque dur 2. Vis (4) 3. Disque dur 4. Trous de vis (4) 59Figure 22. Retrait et installation d'un adaptateur de disque dur avec un disque dur de 2,5 pouces remplaçables à chaud dans un support de disque dur de 3,5 pouces 1. Support de disque dur 2. Vis (5) 3. Adaptateur de disque dur de 3,5 pouces 4. Disques durs de 2,5 pouces 60Figure 23. Retrait et installation d'un disque dur connecté par câble dans un support 1. Vis (4) 2. Disque dur 3. Trous de vis (4) 4. Support de disque dur Installation d'un disque dur ou un adaptateur de disque dur dans un support de disque dur PRÉCAUTION: La plupart des réparations ne peuvent être effectuées que par un technicien de maintenance agréé. N'effectuez que les opérations de dépannage et les petites réparations autorisées par la documentation de votre produit et suivez les instructions fournies en ligne ou par téléphone par l'équipe de maintenance et d'assistance technique. Tout dommage causé par une réparation non autorisée par Dell est exclu de votre garantie. Consultez et respectez les consignes de sécurité fournies avec votre produit. 1. Insérez le disque dur/l'adaptateur de disque dur dans le support de disque dur avec l'extrémité du connecteur du disque dur vers l'arrière. 2. Alignez les trous de vis du disque dur sur ceux de l'arrière du support. Si la position est correcte, l'arrière du disque dur s'aligne sur l'arrière du support. 3. Fixez le disque dur sur le support à l'aide des vis. 61Lecteur optique (en option) Retrait d'un lecteur optique dans des systèmes de disques durs remplaçables à chaud PRÉCAUTION: La plupart des réparations ne peuvent être effectuées que par un technicien de maintenance agréé. N'effectuez que les opérations de dépannage et les petites réparations autorisées par la documentation de votre produit et suivez les instructions fournies en ligne ou par téléphone par l'équipe de maintenance et d'assistance technique. Tout dommage causé par une réparation non autorisée par Dell est exclu de votre garantie. Consultez et respectez les consignes de sécurité fournies avec votre produit. 1. Retirez le cadre avant s'il est installé. 2. Éteignez le système et les périphériques connectés, puis débranchez le système de la prise secteur et des périphériques. 3. Ouvrez le système. 4. Débranchez le câble d'alimentation/ de données de l'arrière du lecteur optique. Notez l'acheminement des câbles d'alimentation/de données du système lorsque vous les retirez de la carte système et du lecteur optique. Vous devrez ensuite reproduire la même disposition pour éviter que les câbles ne soient coincés ou écrasés. 5. Pour libérer le lecteur optique, appuyez puis enfoncez la patte d'éjection vers l'avant du système. 6. Extrayez le lecteur optique en le faisant glisser hors de son logement. 7. Si vous n'envisagez pas d'installer un nouveau lecteur optique, installez un cache. 8. Refermez le système. 9. Rebranchez le système à la prise secteur et mettez-le sous tension, ainsi que les périphériques qui y sont connectés. 10. Le cas échéant, installez le cadre avant. Figure 24. Retrait et installation d'un lecteur optique (dans des systèmes de disques durs remplaçables à chaud) 1. Lecteur optique 2. Câble de données 3. Câble d'alimentation 624. Languette de dégagement Installation d'un lecteur optique dans des systèmes de disques durs remplaçables à chaud PRÉCAUTION: La plupart des réparations ne peuvent être effectuées que par un technicien de maintenance agréé. N'effectuez que les opérations de dépannage et les petites réparations autorisées par la documentation de votre produit et suivez les instructions fournies en ligne ou par téléphone par l'équipe de maintenance et d'assistance technique. Tout dommage causé par une réparation non autorisée par Dell est exclu de votre garantie. Consultez et respectez les consignes de sécurité fournies avec votre produit. 1. Retirez le cadre avant s'il est installé. 2. Éteignez le système et les périphériques connectés, puis débranchez le système de la prise de courant. 3. Ouvrez le système. 4. Pour retirer le cache du lecteur optique, appuyez sur la patte d'éjection de couleur bleue située à l'arrière du cache, puis exercez une pression pour l'extraire du système. 5. Alignez le lecteur optique avec le logement de lecteur optique situé à l'avant du châssis. 6. Faites glisser le lecteur optique dans le logement jusqu'à ce que le loquet s'enclenche. 7. Branchez le câble d'alimentation/de données situé à l'arrière du lecteur. 8. Acheminez le câble d'alimentation/de données sous le câble acheminant le loquet au système. 9. Branchez le câble d'alimentation/de données aux connecteurs de la carte système. 10. Refermez le système. 11. Le cas échéant, installez le cadre avant. 12. Rebranchez le système à la prise secteur et mettez-le sous tension, ainsi que les périphériques qui y sont connectés. Retrait d'un lecteur optique dans des systèmes de disques durs connectés par câble PRÉCAUTION: La plupart des réparations ne peuvent être effectuées que par un technicien de maintenance agréé. N'effectuez que les opérations de dépannage et les petites réparations autorisées par la documentation de votre produit et suivez les instructions fournies en ligne ou par téléphone par l'équipe de maintenance et d'assistance technique. Tout dommage causé par une réparation non autorisée par Dell est exclu de votre garantie. Consultez et respectez les consignes de sécurité fournies avec votre produit. 1. Retirez le cadre avant s'il est installé. 2. Éteignez le système et les périphériques connectés, puis débranchez le système de la prise secteur et des périphériques. 3. Ouvrez le système. 4. Débranchez le câble d'alimentation/de données de l'arrière du lecteur optique. Notez l'acheminement des câbles d'alimentation/de données lorsque vous les retirez de la carte système et du lecteur optique. Vous devrez ensuite reproduire la même disposition pour éviter que les câbles ne soient coincés ou écrasés. 5. Tirez sur le loquet de dégagement et désengagez le lecteur optique des encoches des picots métalliques. 6. Soulevez le lecteur optique pour le sortir du système. 7. Si vous n'envisagez pas d'installer un nouveau lecteur optique, installez un cache. 8. Refermez le système. 639. Rebranchez le système à la prise secteur et mettez-le sous tension, ainsi que les périphériques qui y sont connectés. 10. Le cas échéant, installez le cadre avant. Figure 25. Retrait et installation d'un lecteur optique (dans des systèmes de disques durs connectés par câble) 1. Câble de données 2. Câble d'alimentation 3. Lecteur optique 4. Loquet de dégagement 5. Picots en métal (4) 6. Encoches (2) 64Installation d'un lecteur optique dans des systèmes de disques durs connectés par câble PRÉCAUTION: La plupart des réparations ne peuvent être effectuées que par un technicien de maintenance agréé. N'effectuez que les opérations de dépannage et les petites réparations autorisées par la documentation de votre produit et suivez les instructions fournies en ligne ou par téléphone par l'équipe de maintenance et d'assistance technique. Tout dommage causé par une réparation non autorisée par Dell est exclu de votre garantie. Consultez et respectez les consignes de sécurité fournies avec votre produit. 1. Retirez le cadre avant s'il est installé. 2. Éteignez le système et les périphériques connectés, puis débranchez le système de la prise de courant. 3. Ouvrez le système. 4. Alignez les deux encoches des picots métalliques avec les logements sur le côté du lecteur optique. 5. Insérez le lecteur optique dans les encoches jusqu'à ce qu'il soit en place et que le loquet de dégagement s'enclenche. 6. Branchez le câble d'alimentation. 7. Raccordez le câble de données à l'arrière du lecteur et au connecteur SATA de la carte système. REMARQUE: Acheminez et fixez les câbles à l'aide du loquet d'acheminement du câble sur le châssis du système pour empêcher qu'ils ne soient pincés ou coincés. 8. Refermez le système. 9. Le cas échéant, installez le cadre avant. 10. Rebranchez le système à la prise secteur et mettez-le sous tension, ainsi que les périphériques qui y sont connectés. Ventilateurs Votre système prend en charge les éléments suivants : • Jusqu'à cinq ventilateurs dans une configuration de bloc d'alimentation non-redondante. • Jusqu'à six ventilateurs dans une configuration de bloc d'alimentation redondante. REMARQUE: Le ventilateur 1 doit être installé dans une configuration de bloc d'alimentation redondante. REMARQUE: Le retrait et l'installation à chaud des ventilateurs ne sont pas pris en charge. REMARQUE: En cas de problème dû à un ventilateur spécifique, le logiciel de gestion du système référence les numéros des ventilateurs. Ceci facilite l'identification et le remplacement d'un ventilateur défectueux au sein du module de ventilation. Retrait d'un ventilateur AVERTISSEMENT: Ouvrez ou retirez le capot du système lorsque celui-ci est sous tension est dangereux. Vous risqueriez de recevoir une décharge électrique. Manipulez avec précaution les ventilateurs lorsque vous les retirez ou les installez. PRÉCAUTION: La plupart des réparations ne peuvent être effectuées que par un technicien de maintenance agréé. N'effectuez que les opérations de dépannage et les petites réparations autorisées par la documentation de votre produit et suivez les instructions fournies en ligne ou par téléphone par l'équipe de maintenance et d'assistance technique. Tout dommage causé par une réparation non autorisée par Dell est exclu de votre garantie. Consultez et respectez les consignes de sécurité fournies avec votre produit. 65PRÉCAUTION: Ne faites pas fonctionner le système si le capot est retiré pour une durée supérieure à cinq minutes. REMARQUE: La procédure de retrait pour chaque ventilateur est identique. 1. Éteignez le système et les périphériques connectés, puis débranchez le système de la prise de courant. 2. Ouvrez le système. 3. Retirez le carénage de refroidissement ou le carénage de la carte de distribution de l'alimentation, selon le cas. 4. Débranchez le câble d'alimentation du ventilateur qui est enfichée dans le connecteur du câble d'alimentation sur la carte système ou la carte de distribution de l'alimentation. 5. Soulevez le ventilateur pour l'extraire du support du ventilateur de refroidissement. Figure 26. Retrait et installation d'un ventilateur de refroidissement 1. Ventilateur 2. Connecteur du câble d'alimentation 3. Support du ventilateur Installation d'un ventilateur PRÉCAUTION: La plupart des réparations ne peuvent être effectuées que par un technicien de maintenance agréé. N'effectuez que les opérations de dépannage et les petites réparations autorisées par la documentation de votre produit et suivez les instructions fournies en ligne ou par téléphone par l'équipe de maintenance et d'assistance technique. Tout dommage causé par une réparation non autorisée par Dell est exclu de votre garantie. Consultez et respectez les consignes de sécurité fournies avec votre produit. 1. Éteignez le système et les périphériques connectés, puis débranchez le système de la prise de courant. 2. Ouvrez le système. 663. Retirez le carénage de refroidissement ou le carénage de la carte de distribution de l'alimentation, selon le cas. 4. En vous plaçant face au système, abaissez le ventilateur dans le support du ventilateur de refroidissement. REMARQUE: Lorsqu'il est aligné correctement, le câble du ventilateur se trouve sur la gauche du ventilateur. 5. Branchez le câble d'alimentation du ventilateur au connecteur du câble d'alimentation sur la carte système ou la carte de distribution de l'alimentation. 6. Réinstallez le carénage de refroidissement ou le carénage de la carte de distribution de l'alimentation, selon le cas. 7. Refermez le système. 8. Rebranchez le système à la prise secteur et mettez-le sous tension, ainsi que les périphériques qui y sont connectés. Clé de mémoire USB interne (en option) Une clé de mémoire USB en option installée à l'intérieur du système peut servir de périphérique d'amorçage, de clé de sécurité ou de périphérique de stockage de masse. Le connecteur USB doit être activé à l'aide de l'option Internal USB Port (Port USB interne) de l'écran Integrated Devices (Périphériques intégrés) du programme de configuration du système. Pour pouvoir démarrer le système à partir de la clé de mémoire USB, configurez cette dernière avec une image d'amorçage, puis ajoutez la clé à la séquence d'amorçage définie dans le programme de configuration du système. REMARQUE: Le connecteur USB interne (INT_USB) est situé sur la carte de montage pour cartes d'extension 2. Remplacement de la clé USB interne PRÉCAUTION: La plupart des réparations ne peuvent être effectuées que par un technicien de maintenance agréé. N'effectuez que les opérations de dépannage et les petites réparations autorisées par la documentation de votre produit et suivez les instructions fournies en ligne ou par téléphone par l'équipe de maintenance et d'assistance technique. Tout dommage causé par une réparation non autorisée par Dell est exclu de votre garantie. Consultez et respectez les consignes de sécurité fournies avec votre produit. 1. Éteignez le système et les périphériques connectés, puis débranchez le système de la prise secteur et des périphériques. 2. Ouvrez le système. 3. Localisez le connecteur USB (INT_USB) sur la carte de montage pour cartes d'extension 2. 4. Le cas échéant, retirez la clé USB. 5. Insérez la clé de mémoire USB dans le connecteur USB. 6. Refermez le système. 7. Rebranchez le système à la prise secteur et mettez-le sous tension, ainsi que les périphériques qui y sont connectés. 8. Accédez à la configuration du système et vérifiez que la clé USB a été détectée par le système. 67Figure 27. Remplacement de la clé USB interne 1. Clé de mémoire USB 2. Connecteur de clé de mémoire USB Cartes d'extension et cartes de montage pour cartes d'extension REMARQUE: Une carte de montage pour cartes d'extension manquante ou non prise en charge créé un événement dans le journal des événements système. Cela n'empêche pas votre système d'être mis sous tension et aucun message de l'auto-test de démarrage du BIOS ni de pause F1/F2 n'est affiché. Consignes d'installation des cartes d'extension Votre système prend en charge les cartes d'extension PCI Express de 2ème et 3ème génération. REMARQUE: Si vous installez un deuxième processeur, vous devez mettre à niveau une carte de montage pour cartes d'extension 1 pour optimiser la vitesse du logement PCIe 1. Le tableau suivant décrit les configurations de la carte de montage pour des systèmes à processeur unique ou double : Tableau 3. Configuration de la carte de montage pour des systèmes à processeur unique et double Nombre de processeurs Connecteurs de la carte d'extension Carte de montage 1 Carte de montage 2 Un PCIE_G2_X4 iDRAC_Enterprise PCIE_G3_X16 Deux PCIE_G3_X16 iDRAC_Enterprise PCIE_G3_X16 REMARQUE: Les cartes de montage pour carte d'extension répertoriées ci-dessus ne peuvent pas être interceptées entre les systèmes à processeur unique ou double. Le tableau suivant fournit un guide d'installation des cartes d'extension pour un refroidissement approprié et un ajustement mécanique correct. Les cartes d'extension à la priorité la plus haute doivent être installées tout d'abord par priorité de logement indiquée. Toutes les autres cartes d'extension doivent être installées par ordre de priorité de carte et de priorité de logement. 68Tableau 4. Priorité d'installation des cartes d'extension Priorité de la carte Type de carte Hauteur Priorité du logement Max autorisé par logement 1 RAID Taille standard Demi-hauteur 2 ou 1 1 2 Adaptateurs réseau de convergence (CNA) Taille standard Demi-hauteur 2 ou 1 1 3 Cartes réseau 10 Gb Taille standard Demi-hauteur 2 ou 1 1 4 HBA FC8 Taille standard Demi-hauteur 2 ou 1 1 5 FC4 HBA Taille standard 2 ou 1 1 6 Cartes réseau 1 Gb Taille standard Demi-hauteur 2 ou 1 1 7 Non-Raid Taille standard Demi-hauteur 2 ou 1 1 Retrait d'une carte d'extension PRÉCAUTION: La plupart des réparations ne peuvent être effectuées que par un technicien de maintenance agréé. N'effectuez que les opérations de dépannage et les petites réparations autorisées par la documentation de votre produit et suivez les instructions fournies en ligne ou par téléphone par l'équipe de maintenance et d'assistance technique. Tout dommage causé par une réparation non autorisée par Dell est exclu de votre garantie. Consultez et respectez les consignes de sécurité fournies avec votre produit. 1. Éteignez le système et les périphériques connectés, puis débranchez le système de la prise secteur et des périphériques. 2. Ouvrez le système. 3. Déconnectez tous les câbles connectés à la carte d'extension ou à la carte de montage de carte d'extension. 4. Soulevez le loquet de la carte d'extension. 5. Pour retirer une carte d'extension de la carte de montage 2, tirez sur le loquet bleu sur le support de carte d'extension. 6. Tenez la carte d'extension par ses bords et retirez-la de son connecteur sur la carte de montage. 7. Si vous retirez définitivement la carte, installez une plaque de recouvrement métallique sur l'emplacement non utilisé, puis refermez le loquet. REMARQUE: Vous devez installer une plaque de recouvrement sur un logement d'expansion vide pour conserver la certification FCC (Federal Communications Commission) du système. Les plaques empêchent également la pénétration de poussières et d'impuretés dans le système et favorisent le refroidissement et la circulation d'air dans le système. 8. Refermez le système. 9. Rebranchez le système à la prise secteur et mettez-le sous tension, ainsi que les périphériques qui y sont connectés. 69Figure 28. Retrait et installation de la carte d'extension de la carte de montage pour cartes d'extension 1 1. Carte d'extension 2. Loquet de carte d'extension 3. Ergots de la carte de montage (2) 4. Carte de montage d'extension 1 Figure 29. Retrait et installation de la carte d'extension de la carte de montage pour cartes d'extension 2 1. Carte de montage d'extension 2 2. Ergots de la carte de montage pour cartes d'extension (2) 703. Loquet de carte d'extension 4. Carte d'extension 5. Support de carte d'extension Installation d'une carte d'extension PRÉCAUTION: La plupart des réparations ne peuvent être effectuées que par un technicien de maintenance agréé. N'effectuez que les opérations de dépannage et les petites réparations autorisées par la documentation de votre produit et suivez les instructions fournies en ligne ou par téléphone par l'équipe de maintenance et d'assistance technique. Tout dommage causé par une réparation non autorisée par Dell est exclu de votre garantie. Consultez et respectez les consignes de sécurité fournies avec votre produit. 1. Déballez la carte d'extension, puis préparez-la en vue de son installation. Pour des instructions, consultez la documentation fournie avec la carte. 2. Éteignez le système et les périphériques connectés, puis débranchez le système de la prise secteur et des périphériques. 3. Ouvrez le système. 4. Repérez le connecteur de la carte d'extension sur la carte de montage. 5. Ouvrez le loquet de la carte d'extension, puis retirez la plaque de recouvrement. 6. En tenant la carte par les bords, positionnez-la en alignant son connecteur latéral avec le connecteur de la carte d'extension. 7. Insérez le connecteur du bord de la carte dans le connecteur de carte d'extension, jusqu'à ce que la carte soit en place. REMARQUE: Assurez-vus que la carte d'extension est correctement installée le long du châssis afin que le loquet de la carte d'extension puisse être fermé. 8. Appuyez sur le loquet de dégagement situé sur le support de la carte d'extension et déplacez le support de carte d'extension afin qu'il prenne en charge la carte d'extension sur la carte de montage pour cartes d'extension 2. REMARQUE: Assurez-vous que le support de la carte d'extension est fixé correctement au châssis, afin que le loquet de la carte d'extension puisse être inséré à l'arrière du châssis. 9. Branchez les câbles à la carte d'extension, le cas échéant. 10. Refermez le système. 11. Rebranchez le système à la prise secteur et mettez-le sous tension, ainsi que les périphériques qui y sont connectés. 12. Installez tous les pilotes de périphérique requis pour la carte, comme indiqué dans la documentation de celle-ci. Retrait des cartes de montage pour cartes d'extension 1 et 2 PRÉCAUTION: La plupart des réparations ne peuvent être effectuées que par un technicien de maintenance agréé. N'effectuez que les opérations de dépannage et les petites réparations autorisées par la documentation de votre produit et suivez les instructions fournies en ligne ou par téléphone par l'équipe de maintenance et d'assistance technique. Tout dommage causé par une réparation non autorisée par Dell est exclu de votre garantie. Consultez et respectez les consignes de sécurité fournies avec votre produit. 1. Éteignez le système et les périphériques connectés, puis débranchez le système de la prise secteur et des périphériques. 2. Ouvrez le système. 3. Si une carte d'extension est installée, retirez-la. 714. En maintenant les ergots, soulevez la carte de montage pour cartes d'extension hors du connecteur de carte de montage de la carte système. Figure 30. Retrait et installation de la carte de montage pour cartes d'extension 1 1. Carte de montage pour cartes d'extension 1 2. Ergots de la carte de montage pour cartes d'extension (2) 3. Guides de la carte de montage (2) 4. Connecteur Figure 31. Retrait et installation de la carte de montage pour cartes d'extension 2 1. Commutateur d'intrusion dans le châssis 722. Ergots de la carte de montage pour cartes d'extension 3. Carte de montage d'extension 2 4. Connecteur de la carte de montage pour cartes d'extension 2 5. Guides de la carte de montage (2) 5. Réinstallez la carte de montage de carte d'extension. 6. Refermez le système. 7. Rebranchez le système à la prise secteur et mettez-le sous tension, ainsi que les périphériques qui y sont connectés. Installation des cartes de montage pour cartes d'extension 1 et 2 PRÉCAUTION: La plupart des réparations ne peuvent être effectuées que par un technicien de maintenance agréé. N'effectuez que les opérations de dépannage et les petites réparations autorisées par la documentation de votre produit et suivez les instructions fournies en ligne ou par téléphone par l'équipe de maintenance et d'assistance technique. Tout dommage causé par une réparation non autorisée par Dell est exclu de votre garantie. Consultez et respectez les consignes de sécurité fournies avec votre produit. 1. Réinstallez la (les) carte(s) d'extension dans la carte de montage pour cartes d'extension, le cas échéant. 2. Alignez la carte de montage pour cartes d'extension sur le connecteur et les guides de la carte de montage sur la carte système. 3. Abaissez la carte de montage pour cartes d'extension jusqu'à ce que son connecteur soit complètement enclenché. 4. Refermez le système. 5. Rebranchez le système à la prise secteur et mettez-le sous tension, ainsi que les périphériques qui y sont connectés. 6. Installez tous les pilotes de périphérique requis pour la carte, comme indiqué dans la documentation de celle-ci. Cartes de ports iDRAC (en option) La carte de ports iDRAC prend en charge les éléments suivants : • un port Ethernet 1 GbE • carte SD vFlash Retrait de la carte de ports iDRAC PRÉCAUTION: La plupart des réparations ne peuvent être effectuées que par un technicien de maintenance agréé. N'effectuez que les opérations de dépannage et les petites réparations autorisées par la documentation de votre produit et suivez les instructions fournies en ligne ou par téléphone par l'équipe de maintenance et d'assistance technique. Tout dommage causé par une réparation non autorisée par Dell est exclu de votre garantie. Consultez et respectez les consignes de sécurité fournies avec votre produit. 1. Éteignez le système et les périphériques connectés, puis débranchez le système de la prise secteur et des périphériques. 2. Ouvrez le système. 3. Débranchez tous les câbles connectés à la carte de ports iDRAC. 4. Soulevez le loquet de la carte d'extension. 5. Si elle est installée, retirez la carte d'extension de la carte de montage 1. 736. En prenant en charge la carte de montage pour cartes d'extension par les ergots, maintenez la carte de ports iDRAC par les bords et retirez-la du connecteur pour carte de ports iDRAC sur la carte de montage. 7. Si vous retirez définitivement la carte, installez une plaque de recouvrement métallique sur l'emplacement non utilisé, puis refermez le loquet. REMARQUE: Vous devez installer une plaque de recouvrement sur un logement d'expansion vide pour conserver la certification FCC (Federal Communications Commission) du système. Les plaques empêchent également la pénétration de poussières et d'impuretés dans le système et favorisent le refroidissement et la circulation d'air dans le système. 8. Refermez le système. 9. Rebranchez le système à la prise secteur et mettez-le sous tension, ainsi que les périphériques qui y sont connectés. Figure 32. Retrait et installation de la carte de ports iDRAC 1. Loquet de carte d'extension 2. Ergots de la carte de montage pour cartes d'extension (2) 3. Carte de montage pour cartes d'extension 1 4. Connecteur de la carte de ports iDRAC 5. Logement de carte SD 6. Port Ethernet RJ-45 7. Carte de ports iDRAC Installation de la carte de ports iDRAC PRÉCAUTION: La plupart des réparations ne peuvent être effectuées que par un technicien de maintenance agréé. N'effectuez que les opérations de dépannage et les petites réparations autorisées par la documentation de votre produit et suivez les instructions fournies en ligne ou par téléphone par l'équipe de maintenance et d'assistance technique. Tout dommage causé par une réparation non autorisée par Dell est exclu de votre garantie. Consultez et respectez les consignes de sécurité fournies avec votre produit. 1. Déballez la carte de ports iDRAC, puis préparez-la en vue de son installation. Pour des instructions, consultez la documentation fournie avec la carte. 2. Éteignez le système et les périphériques connectés, puis débranchez le système de la prise secteur et des périphériques. 743. Ouvrez le système. 4. Localisez le connecteur de carte de ports iDRAC sur la carte de montage pour cartes d'extension 1. 5. Ouvrez le loquet de la carte d'extension, puis retirez la plaque de recouvrement. 6. En tenant la carte par les bords, positionnez-la en alignant son connecteur latéral avec le connecteur de la carte de ports iDRAC. 7. Alignez le support de la carte de ports iDRAC avec les crochets sur le châssis. 8. Insérez fermement le connecteur du bord de la carte dans le connecteur de carte de ports iDRAC jusqu'à ce que la carte soit en place. 9. Remettez en place le loquet de la carte d'extension. 10. Connectez les câbles à la carte de ports iDRAC, le cas échéant. 11. Refermez le système. 12. Rebranchez le système à la prise secteur et mettez-le sous tension, ainsi que les périphériques qui y sont connectés. 13. Installez tous les pilotes de périphérique requis pour la carte, comme indiqué dans la documentation de celle-ci. Carte SD vFlash Une carte SD vFlash est une carte numérique sécurisée (SD) qui se connecte dans un logement de carte SD vFlash sur le système. Elle offre des capacités de stockage local permanent à la demande et un environnement de déploiement personnalisé qui permet l'automatisation de la configuration des serveurs, des scripts et de l'imagerie. Elle émule les périphériques USB. Pour plus d'informations, consultez le iDRAC7 User's Guide (Guide d'utilisation iDRAC7) sous Software → Systems Management → Dell Remote Access Controllers (Logiciel Gestion des systèmes Contrôleurs d'accès à distance Dell) à l'adresse support.dell.com/manuals. Remplacement de la carte SD vFlash 1. Localisez le logement du support vFlash sur le système. 2. Pour retirer la carte SD vFlash installée, enfoncez-la pour la déverrouiller, puis retirez-la de son logement. Figure 33. Retrait et installation de la carte SD vFlash 1. Carte SD vFlash 2. Logement pour carte SD vFlash 3. Pour installer la carte SD vFlash, insérez l'extrémité de la broche de contact de la carte SD (étiquette vers le haut) dans le logement de carte du module. REMARQUE: Le logement est muni d'un détrompeur qui permet d'insérer la carte dans le bon sens. 754. Appuyez sur la carte pour qu'elle s'enclenche dans son logement. Module SD interne double REMARQUE: Lorsque l'option Redundancy (Redondance) est définie sur Mirror Mode (Mode miroir) dans l'écran Integrated Devices (Périphériques intégrés), l'information est répliquée d'une carte SD à l'autre. Retrait du module SD interne double PRÉCAUTION: La plupart des réparations ne peuvent être effectuées que par un technicien de maintenance agréé. N'effectuez que les opérations de dépannage et les petites réparations autorisées par la documentation de votre produit et suivez les instructions fournies en ligne ou par téléphone par l'équipe de maintenance et d'assistance technique. Tout dommage causé par une réparation non autorisée par Dell est exclu de votre garantie. Consultez et respectez les consignes de sécurité fournies avec votre produit. 1. Éteignez le système et les périphériques connectés, puis débranchez le système de la prise secteur et des périphériques. 2. Ouvrez le système. 3. Retirez la carte de montage pour cartes d'extension 1 et toutes les cartes installées sur la carte de montage. 4. Repérez le module SD interne double sur le connecteur IDSDM de la carte système. 5. Le cas échéant, retirez la ou les cartes SD. 6. Maintenez la patte puis retirez le module SD double de la carte système. 7. Replacez la carte de montage pour cartes d'extension 1 et, le cas échéant, les cartes sur la carte de montage. 8. Refermez le système. 9. Rebranchez le système à la prise secteur et mettez-le sous tension, ainsi que les périphériques qui y sont connectés. 76Figure 34. Retrait et installation du module SD interne double 1. Languette de retrait bleue 2. Carte SD 1 3. Carte SD 2 4. Module SD double 5. Connecteur de la carte système Installation du module SD interne double PRÉCAUTION: La plupart des réparations ne peuvent être effectuées que par un technicien de maintenance agréé. N'effectuez que les opérations de dépannage et les petites réparations autorisées par la documentation de votre produit et suivez les instructions fournies en ligne ou par téléphone par l'équipe de maintenance et d'assistance technique. Tout dommage causé par une réparation non autorisée par Dell est exclu de votre garantie. Consultez et respectez les consignes de sécurité fournies avec votre produit. 1. Éteignez le système et les périphériques connectés, puis débranchez le système de la prise secteur et des périphériques. 2. Ouvrez le système. 3. Retirez la carte de montage pour cartes d'extension 1 et toutes les cartes installées sur la carte de montage. 4. Repérez le connecteur IDSDM sur la carte système. 5. Alignez les connecteurs sur la carte système et le module SD double. 6. Appuyez sur le module SD double jusqu'à ce qu'il soit fermement installé sur la carte système. 777. Replacez la carte de montage pour cartes d'extension 1 et, le cas échéant, les cartes sur la carte de montage. 8. Refermez le système. 9. Rebranchez le système à la prise secteur et mettez-le sous tension, ainsi que les périphériques qui y sont connectés. Carte SD interne Retrait d'une carte SD interne PRÉCAUTION: La plupart des réparations ne peuvent être effectuées que par un technicien de maintenance agréé. N'effectuez que les opérations de dépannage et les petites réparations autorisées par la documentation de votre produit et suivez les instructions fournies en ligne ou par téléphone par l'équipe de maintenance et d'assistance technique. Tout dommage causé par une réparation non autorisée par Dell est exclu de votre garantie. Consultez et respectez les consignes de sécurité fournies avec votre produit. 1. Éteignez le système et les périphériques connectés, puis débranchez le système de la prise secteur et des périphériques. 2. Ouvrez le système. 3. Repérez l'emplacement de la carte SD sur le module SD interne double. Exercez une pression sur la carte afin de la libérer, puis retirez-la de son logement. 4. Refermez le système. 5. Rebranchez le système à la prise secteur et mettez-le sous tension, ainsi que les périphériques qui y sont connectés. Installation d'une carte SD interne PRÉCAUTION: La plupart des réparations ne peuvent être effectuées que par un technicien de maintenance agréé. N'effectuez que les opérations de dépannage et les petites réparations autorisées par la documentation de votre produit et suivez les instructions fournies en ligne ou par téléphone par l'équipe de maintenance et d'assistance technique. Tout dommage causé par une réparation non autorisée par Dell est exclu de votre garantie. Consultez et respectez les consignes de sécurité fournies avec votre produit. REMARQUE: Pour utiliser une carte SD avec le système, assurez-vous que le port correspondant est activé dans le programme de configuration du système. 1. Éteignez le système et les périphériques connectés, puis débranchez le système de la prise secteur et des périphériques. 2. Ouvrez le système. 3. Situez le connecteur de carte SD sur le module SD interne double puis, l'étiquette étant orientée vers le haut, insérez l'extrémité de la broche de contact dans le logement. REMARQUE: Le logement est muni d'un repère qui permet d'insérer la carte dans le bon sens. 4. Exercez une pression sur la carte jusqu'à ce qu'elle se mette en place. 5. Refermez le système. 6. Rebranchez le système à la prise secteur et mettez-le sous tension, ainsi que les périphériques qui y sont connectés. 78Carte contrôleur de stockage intégrée Votre système comprend un logement de carte d'extension dédié sur la carte système pour une carte contrôleur intégrée qui fournit le sous-système de stockage intégré pour les disques durs internes de votre système. Le contrôleur prend en charge les disques durs SAS et SATA et vous permet également d'installer des disques durs en configuration RAID comme pris en charge par la version du contrôleur de stockage incluse dans votre système. Retrait de la carte contrôleur de stockage intégrée PRÉCAUTION: La plupart des réparations ne peuvent être effectuées que par un technicien de maintenance agréé. N'effectuez que les opérations de dépannage et les petites réparations autorisées par la documentation de votre produit et suivez les instructions fournies en ligne ou par téléphone par l'équipe de maintenance et d'assistance technique. Tout dommage causé par une réparation non autorisée par Dell est exclu de votre garantie. Consultez et respectez les consignes de sécurité fournies avec votre produit. 1. Éteignez le système et les périphériques connectés, puis débranchez le système de la prise secteur et des périphériques. 2. Ouvrez le système. REMARQUE: Il est recommandé de retirer la carte de montage pour cartes d'extension 2 avant de retirer la carte du contrôleur de stockage. 3. Appuyez sur les deux leviers d'éjection situés sur le bord de la carte pour libérer la carte du connecteur. 4. Déverrouillez la carte du support de carte du contrôleur de stockage de la carte système. 5. Retirez la carte. 6. Refermez le système. 7. Rebranchez le système à la prise secteur et mettez-le sous tension, ainsi que les périphériques qui y sont connectés. 79Figure 35. Retrait et installation de la carte contrôleur de stockage intégrée 1. Ergots (2) 2. Carte contrôleur de stockage 3. Support de la carte contrôleur de stockage 4. Leviers de dégagement (2) 5. Connecteur de la carte du contrôleur de stockage Installation de la carte contrôleur de stockage intégrée PRÉCAUTION: La plupart des réparations ne peuvent être effectuées que par un technicien de maintenance agréé. N'effectuez que les opérations de dépannage et les petites réparations autorisées par la documentation de votre produit et suivez les instructions fournies en ligne ou par téléphone par l'équipe de maintenance et d'assistance technique. Tout dommage causé par une réparation non autorisée par Dell est exclu de votre garantie. Consultez et respectez les consignes de sécurité fournies avec votre produit. 1. Mettez le système et les périphériques qui y sont connectés hors tension, puis débranchez le système de la prise secteur. 2. Ouvrez le système. 3. Alignez l'une des extrémités de la carte avec le support de carte sur la carte système. 804. Abaissez l'autre extrémité de la carte dans le support de carte du contrôleur de stockage sur la carte système. 5. Appuyez sur les ergots de la carte et poussez la carte jusqu'à ce qu'elle s'enclenche. Lorsque la carte est en place, les leviers d'éjection se referment sur la carte. 6. Refermez le système. 7. Rebranchez le système à la prise secteur et mettez-le sous tension, ainsi que les périphériques qui y sont connectés. Processeurs Utilisez la procédure suivante lors de : • l'installation d'un processeur supplémentaire • le remplacement d'un processeur REMARQUE: Pour assurer un refroidissement du système correct, vous devez installer un cache de processeur et un cache de dissipateur de chaleur dans un support de processeur vide. Retrait d'un processeur PRÉCAUTION: La plupart des réparations ne peuvent être effectuées que par un technicien de maintenance agréé. N'effectuez que les opérations de dépannage et les petites réparations autorisées par la documentation de votre produit et suivez les instructions fournies en ligne ou par téléphone par l'équipe de maintenance et d'assistance technique. Tout dommage causé par une réparation non autorisée par Dell est exclu de votre garantie. Consultez et respectez les consignes de sécurité fournies avec votre produit. 1. Avant de mettre à niveau votre système, téléchargez la dernière version du BIOS du système à partir du site support.dell.com. Suivez ensuite les instructions contenues dans le fichier de téléchargement compressé pour installer la mise à jour. REMARQUE: Vous pouvez mettre à jour le BIOS du système à l'aide de Lifecycle Controller. 2. Mettez le système et les périphériques connectés hors tension, puis débranchez le système de la prise secteur. Une fois le système débranché de l'alimentation en CA, appuyez sur le bouton d'alimentation et maintenez-le enfoncé pendant 3 secondes afin de décharger complètement le système avant d'en retirer le capot. 3. Ouvrez le système. 4. Retirez le carénage de refroidissement. AVERTISSEMENT: Le radiateur et le processeur restent chauds au toucher pendant quelques temps après l'arrêt du système. Laissez refroidir le radiateur et le processeur avant de les manipuler. PRÉCAUTION: Ne retirez jamais le dissipateur de chaleur d'un processeur, sauf si vous souhaitez retirer également le processeur. Le dissipateur de chaleur est essentiel au maintien de bonnes conditions thermiques. 5. Desserrez les supports de fixation du dissipateur de chaleur. 6. Soulevez le dissipateur de chaleur pour le dégager du processeur, puis mettez-le de côté. 81Figure 36. Retrait et installation du dissipateur de chaleur du processeur 1. Support de fixation (4) 2. Dissipateur de chaleur 3. Vis de fixation (4) PRÉCAUTION: La pression exercée pour maintenir le processeur dans son support est très forte. Si vous ne maintenez pas fermement le levier de dégagement, il risque de se redresser brusquement. 7. Avec le pouce, appuyez fermement sur le levier de dégagement du support du processeur, puis déverrouillez-le en exerçant une pression pour l'extraire de dessous la patte. Faites pivoter le levier vers le haut. 8. Faites pivoter le cadre de protection du processeur vers le haut pour le dégager. PRÉCAUTION: Les broches du support sont fragiles et peuvent être endommagées. Faites attention à ne pas plier les broches lorsque vous retirez le processeur de son support. 9. Extrayez le processeur de son support et laissez le levier d'éjection ouvert en vue de l'installation du nouveau processeur. 82Figure 37. Retrait et installation d'un processeur 1. Processeur 2. Cadre de protection du processeur 3. Encoches du processeur (2) REMARQUE: Une fois le processeur retiré, placez-le dans un conteneur antistatique pour une utilisation ultérieure, un retour ou pour un stockage temporaire. Ne touchez pas le bas du processeur. Touchez uniquement les extrémités de ses côtés. Installation d'un processeur PRÉCAUTION: La plupart des réparations ne peuvent être effectuées que par un technicien de maintenance agréé. N'effectuez que les opérations de dépannage et les petites réparations autorisées par la documentation de votre produit et suivez les instructions fournies en ligne ou par téléphone par l'équipe de maintenance et d'assistance technique. Tout dommage causé par une réparation non autorisée par Dell est exclu de votre garantie. Consultez et respectez les consignes de sécurité fournies avec votre produit. REMARQUE: Si vous n'installez qu'un seul processeur, il doit être placé dans le support UC1. REMARQUE: Si vous installez un second processeur, vous devez retirez le ventilateur factice de l'emplacement VENTILATEUR 6, installez un ventilateur dans cet emplacement puis mettez à niveau les deux cartes de montage (carte de montage 1 et 2). Pour plus d'informations, reportez-vous aux consignes d'installation des cartes d'extension. 83REMARQUE: Lorsque vous installez un deuxième processeur de votre système avec un bloc d'alimentation redondant de 350 W, il est fortement recommandé de mettre à jour le bloc d'alimentation redondant sur 550 W afin d'éviter les possibles pertes de performances. 1. Avant de mettre à niveau votre système, téléchargez la dernière version du BIOS du système à partir du site support.dell.com. Suivez ensuite les instructions contenues dans le fichier de téléchargement compressé pour installer la mise à jour. REMARQUE: Vous pouvez mettre à jour le BIOS du système à l'aide de Lifecycle Controller. 2. Mettez le système et les périphériques connectés hors tension, puis débranchez le système de la prise secteur. Une fois ce dernier débranché de la source d'alimentation, appuyez sur le bouton d'alimentation et maintenez-le enfoncé pendant trois secondes afin de décharger complètement le système, avant d'en retirer le capot. 3. Ouvrez le système. 4. Retirez le carénage de refroidissement. AVERTISSEMENT: Le radiateur et le processeur restent chauds au toucher pendant quelques temps après l'arrêt du système. Laissez refroidir le radiateur et le processeur avant de les manipuler. PRÉCAUTION: Ne retirez jamais le dissipateur de chaleur d'un processeur, sauf si vous souhaitez retirer également le processeur. Le dissipateur de chaleur est essentiel au maintien de bonnes conditions thermiques. 5. Retirez le dissipateur de chaleur/cache de dissipateur de chaleur et le processeur/cache de processeur, le cas échéant. REMARQUE: La procédure de retrait du cache de dissipateur de chaleur ou du cache de processeur est similaire à celle du dissipateur de chaleur et du processeur. 6. Déballez le nouveau processeur. 7. Déverrouillez le levier en exerçant une pression pour l'extraire de dessous la patte. 8. Faites pivoter le cadre de protection du processeur vers le haut pour le dégager. 9. Alignez le processeur sur les détrompeurs du support ZIF. PRÉCAUTION: Si le processeur n'est pas positionné correctement, il risque d'être endommagé ou d'endommager la carte système de manière permanente. Faites attention à ne pas plier les broches du support. PRÉCAUTION: Ne forcez pas l'installation du processeur. Lorsqu'il est positionné correctement, celui-ci s'enclenche facilement dans le support. 10. Mettez les leviers de dégagement du support de processeur en position ouverte, puis alignez la broche du processeur, à l'aide du guide de positionnement de la broche du support comme référence, puis installez avec précaution le processeur dans son support. 11. Fermez le cadre de protection du processeur. 12. À l'aide d'un chiffon propre et non pelucheux, essuyez la pâte thermique du dissipateur de chaleur. PRÉCAUTION: Si vous appliquez trop de pâte thermique, celle-ci risque d'atteindre et de contaminer le support de processeur. 13. Ouvrez le paquet de pâte thermique fourni avec le kit du processeur, puis appliquez-en tout le contenu sur le centre de la face supérieure du nouveau processeur. 14. Placez le dissipateur de chaleur sur le processeur. 15. À l'aide d'un tournevis cruciforme n° 2, serrez les supports de retenue du dissipateur de chaleur. 16. Installez le carénage de refroidissement. 17. Refermez le système. 18. Rebranchez le système et les périphériques aux prises secteur, puis mettez le système sous tension. 19. Appuyez sur pour accéder à la configuration du système, et vérifiez que les informations relatives au processeur correspondent bien à la nouvelle configuration. 8420. Lancez les diagnostics du système pour vérifier que le nouveau processeur fonctionne correctement. Blocs d'alimentation Le système prend en charge les blocs d'alimentation suivants : • 350 W • 550 W Lorsque deux blocs d'alimentation identiques sont installés, la configuration de l'alimentation est redondante (1 + 1). En mode redondant, l'alimentation est fournie au système de façon égale à partir des deux blocs d'alimentation, ceci pour une plus grande efficacité. Si un seul bloc d'alimentation est installé, la configuration est non redondante (1 + 0). L'alimentation est fournie au système uniquement par le bloc d'alimentation unique. REMARQUE: Si deux blocs sont installés, ils doivent être du même type et disposer de la même puissance maximale de sortie. Alimentation de rechange Votre système prend en charge la fonction d'alimentation de rechange, qui permet de réduire considérablement la surcharge d'alimentation associée à la redondance de blocs d'alimentation. Lorsque cette fonction est activée, un bloc d'alimentation redondant passe en état de veille. Le bloc d'alimentation actif prend en charge 100 % de la charge et fonctionne donc de façon plus efficace. Le bloc d'alimentation redondant en état de veille surveille la tension de sortie du bloc d'alimentation actif. Si celle-ci chute, il revient à l'état actif. Le bloc d'alimentation actif peut également activer un bloc d'alimentation en veille, lorsqu'il devient plus efficace d'avoir les deux blocs activés. Les valeurs par défaut des blocs d'alimentation activent les deux blocs si la charge sur le bloc d'alimentation actif est supérieure à 50 %, et mettent en veille le bloc redondant si la charge descend en dessous de 20 %. Vous pouvez configurer la fonction d'alimentation de rechange via les paramètres iDRAC. Pour plus d'informations sur les paramètres iDRAC, consultez le iDRAC7 User's Guide (Guide d'utilisation iDRAC7) sous Software → Systems Management → Dell Remote Access Controllers (LogicielGestion des systèmesContrôleurs d'accès à distance Dell) à l'adresse support.dell.com/manuals. Retrait d'un bloc d'alimentation redondant PRÉCAUTION: La plupart des réparations ne peuvent être effectuées que par un technicien de maintenance agréé. N'effectuez que les opérations de dépannage et les petites réparations autorisées par la documentation de votre produit et suivez les instructions fournies en ligne ou par téléphone par l'équipe de maintenance et d'assistance technique. Tout dommage causé par une réparation non autorisée par Dell est exclu de votre garantie. Consultez et respectez les consignes de sécurité fournies avec votre produit. PRÉCAUTION: Le système exige un bloc d'alimentation pour un fonctionnement normal. Sur les systèmes redondants, retirez et remplacez un seul bloc d'alimentation à la fois lorsque le système est sous tension. 1. Débranchez le câble d'alimentation de la source d'alimentation électrique. 2. Débranchez le câble d'alimentation du bloc d'alimentation et retirez les bandes Velcro utilisées pour attacher les câbles du système. 85REMARQUE: Vous devrez peut-être détacher et soulever le bras de retenue optionnel du câble s'il empêche le retrait du bloc d'alimentation. Pour de plus amples informations sur le bras de retenue du câble, reportez-vous à la documentation de rack du système. 3. Appuyez sur la patte de dégagement et tirez le bloc d'alimentation vers l'extérieur pour le libérer de la carte de distribution de l'alimentation et du châssis. Figure 38. Retrait et installation d'un bloc d'alimentation redondant 1. Bloc d'alimentation redondant 2. Loquet de dégagement 3. Poignée du bloc d'alimentation Installation d'un bloc d'alimentation redondant 1. Vérifiez que les blocs d'alimentation sont de même type et qu'ils ont la même puissance maximale de sortie. REMARQUE: La puissance maximale (en watts) est indiquée sur l'étiquette du bloc d'alimentation. 2. Le cas échéant, retirez le cache du bloc d'alimentation. 3. Faites glisser le bloc d'alimentation dans le châssis jusqu'à ce qu'il s'emboîte complètement et que le loquet de dégagement s'enclenche. REMARQUE: Si vous avez déverrouillé le bras de gestion de câbles au cours de l'étape 2 de la procédure précédente, verrouillez-le à nouveau. Pour obtenir des informations sur le bras de gestion des câbles, reportezvous à la documentation du rack du système. 4. Branchez le câble d'alimentation sur le bloc d'alimentation et branchez son autre extrémité sur une prise électrique. PRÉCAUTION: Lorsque vous branchez le câble d'alimentation, fixez-le à l'aide de la bande. REMARQUE: Lors de l'installation, du remplacement à chaud ou de l'ajout à chaud d'un bloc d'alimentation sur un système qui en comporte deux, attendez quelques secondes pour que le système reconnaisse le bloc d'alimentation et détermine son état. Le voyant d'état du bloc d'alimentation s'allume en vert pour indiquer que le bloc d'alimentation fonctionne correctement. 86Retrait d'un bloc d'alimentation non redondant PRÉCAUTION: La plupart des réparations ne peuvent être effectuées que par un technicien de maintenance agréé. N'effectuez que les opérations de dépannage et les petites réparations autorisées par la documentation de votre produit et suivez les instructions fournies en ligne ou par téléphone par l'équipe de maintenance et d'assistance technique. Tout dommage causé par une réparation non autorisée par Dell est exclu de votre garantie. Consultez et respectez les consignes de sécurité fournies avec votre produit. 1. Mettez le système hors tension, y compris les périphériques connectés. 2. Débranchez le câble d'alimentation de la source d'alimentation électrique. 3. Débranchez le câble d'alimentation du bloc d'alimentation et retirez les bandes Velcro utilisées pour attacher les câbles du système. REMARQUE: Vous devrez peut-être détacher et soulever le bras de retenue optionnel du câble s'il empêche le retrait du bloc d'alimentation. Pour de plus amples informations sur le bras de retenue du câble, reportez-vous à la documentation de rack du système. 4. Ouvrez le système. 5. Débranchez tous les câbles d'alimentation reliant le bloc d'alimentation à la carte système, aux disques durs et au lecteur optique. 6. Retirez la vis fixant le bloc d'alimentation au châssis, puis faites glisser puis soulevez le bloc d'alimentation pour l'extraire du châssis. Figure 39. Retrait et installation d'un bloc d'alimentation non redondant 1. Bloc d'alimentation 2. Vis 873. Câble d'alimentation à 24 broches 4. Câble d'alimentation à 8 broches 5. Picot de fixation 6. Câble d'alimentation SATA Installation d'un bloc d'alimentation non redondant REMARQUE: Un bloc d'alimentation non redondant remplaçable à chaud doit être installé dans le logement 1 de la baie d'alimentation. 1. Ouvrez le système. 2. Alignez les trous de fixation des vis situés sur le bloc d'alimentation avec les picots de fixation du châssis. 3. Serrez la vis pour fixer le bloc d'alimentation au châssis. 4. Branchez tous les câbles d'alimentation de la carte système, des disques durs et du lecteur optique. 5. Refermez le système. 6. Branchez le câble d'alimentation sur le bloc d'alimentation et branchez son autre extrémité sur une prise électrique. Retrait du cache de bloc d'alimentation PRÉCAUTION: Pour assurer un refroidissement du système correct, il est nécessaire d'installer le cache du bloc d'alimentation dans la deuxième baie d'alimentation dans le cas d'une configuration non redondante. Retirez le cache du bloc d'alimentation uniquement si vous installez un deuxième bloc d'alimentation. Si vous installez un bloc d'alimentation secondaire, tirez sur le cache placé sur la baie vers l'extérieur pour l'extraire. Figure 40. Retrait et installation d'un cache de bloc d'alimentation 1. Cache de bloc d'alimentation 88Installation du cache de bloc d'alimentation REMARQUE: Le cache de bloc d'alimentation ne doit être installé que sur la seconde baie d'alimentation. Pour installer le cache de bloc d'alimentation, alignez-le sur la baie d'alimentation, puis insérez-le dans le châssis jusqu'à ce qu'il se mette en place en émettant un déclic. Pile du système Remplacement de la pile du système AVERTISSEMENT: Il existe un risque d'explosion d'une nouvelle batterie si elle n'est pas correctement installée. Remplacez la batterie par une batterie identique ou équivalente recommandée par le fabricant. Pour en savoir plus, consultez les informations de sécurité. PRÉCAUTION: La plupart des réparations ne peuvent être effectuées que par un technicien de maintenance agréé. N'effectuez que les opérations de dépannage et les petites réparations autorisées par la documentation de votre produit et suivez les instructions fournies en ligne ou par téléphone par l'équipe de maintenance et d'assistance technique. Tout dommage causé par une réparation non autorisée par Dell est exclu de votre garantie. Consultez et respectez les consignes de sécurité fournies avec votre produit. 1. Éteignez le système et les périphériques connectés, puis débranchez le système de la prise secteur et des périphériques. 2. Ouvrez le système. 3. Localisez le support de pile. PRÉCAUTION: Pour ne pas endommager le connecteur de la pile, vous devez le maintenir fermement en place lorsque vous installez ou retirez une pile. 4. Pour retirer la pile, maintenez son connecteur en place en appuyant fermement sur le pôle positif de ce dernier. Figure 41. Remplacement de la pile du système 1. Pôle positif du connecteur de pile 2. Patte de fixation 5. Soulevez la pile hors des pattes de fixation situées sur le pôle négatif du connecteur. 896. Pour installer une nouvelle pile, maintenez son connecteur en place en appuyant fermement sur le pôle positif de ce dernier. 7. Tenez la pile, le pôle positif «+» vers le haut, puis glissez-la sous les pattes de fixation du pôle positif du connecteur. 8. Appuyez sur la pile pour l'enclencher dans le connecteur. 9. Refermez le système. 10. Rebranchez le système sur la prise secteur et mettez-le sous tension, ainsi que les périphériques qui y sont connectés. 11. Accédez à la configuration du système et vérifiez que la pile fonctionne correctement. 12. Entrez l'heure et la date exactes dans les champs Time (Heure) et Date du programme de configuration du système. 13. Quittez la configuration du système. Fond de panier des disques durs Votre système prend en charge les éléments suivants : • Fond de panier de quatre disques durs • Fond de panier de huit disques durs Retrait du fond de panier des disques durs PRÉCAUTION: La plupart des réparations ne peuvent être effectuées que par un technicien de maintenance agréé. N'effectuez que les opérations de dépannage et les petites réparations autorisées par la documentation de votre produit et suivez les instructions fournies en ligne ou par téléphone par l'équipe de maintenance et d'assistance technique. Tout dommage causé par une réparation non autorisée par Dell est exclu de votre garantie. Consultez et respectez les consignes de sécurité fournies avec votre produit. 1. Retirez le cadre avant s'il est installé. 2. Mettez le système et les périphériques qui y sont connectés hors tension, puis débranchez le système de la prise secteur. 3. Ouvrez le système. PRÉCAUTION: Pour éviter d'endommager les disques durs et le fond de panier, retirez du système les disques durs avant d'enlever le fond de panier. PRÉCAUTION: Avant de retirer chaque disque dur, notez son numéro d'emplacement et étiquetez-le temporairement afin de pouvoir ensuite le réinstaller au même endroit. 4. Retirez tous les disques durs. 5. Débranchez le(s) câble(s) de données SAS/SATA/SSD, de transmission et d'alimentation du fond de panier. 6. Appuyez les pattes de dégagement et faites glisser le fond de panier vers le haut pour le retirer. Figure 42. Vue frontale du fond de panier de quatre disques durs 901. Connecteurs de disques durs (4) 2. Connecteur SAS 3. Câble d'alimentation pour lecteur optique Figure 43. Vue arrière du fond de panier de quatre disques durs 1. Fond de panier de disques durs 2. Connecteur de signal du fond de panier 3. Connecteur d'alimentation du fond de panier Figure 44. Retrait et installation du fond de panier de quatre disques durs 1. Pattes de dégagement (2) 2. Fond de panier de disques durs 3. Broches de guidage (2) 4. Crochets du châssis (4) 91Figure 45. Schéma de câblage : fond de panier de quatre disques durs 1. Carte système 2. Fond de panier de disques durs 3. Connecteur de câble SAS 4. Guide de trajet des câbles 5. Connecteur du câble de signal 6. Connecteur du câble d'alimentation 7. Loquet d'acheminement de câbles 8. Carte de distribution d'alimentation 9. Loquet de fixation des câbles Figure 46. Vue frontale du fond de panier de huit disques durs 1. Connecteurs de disques durs (8) 92Figure 47. Vue arrière du fond de panier de huit disques durs 1. Connecteur SAS B 2. Connecteur SAS A 3. Connecteur d'alimentation du fond de panier 4. Connecteur de signal du fond de panier Figure 48. Retrait et installation du fond de panier de huit disques durs 1. Fond de panier de disques durs 2. Pattes de dégagement (2) 3. Crochets du châssis (4) 93Figure 49. Schéma de câblage : fond de panier de huit disques durs 1. Carte système 2. Fond de panier de disques durs 3. Connecteur de câble SAS B 4. Connecteur de câble SAS A 5. Connecteur du câble d'alimentation 6. Connecteur du câble de signal 7. Loquet d'acheminement de câbles 8. Carte de distribution d'alimentation 9. Loquet de fixation des câbles Installation du fond de panier des disques durs PRÉCAUTION: La plupart des réparations ne peuvent être effectuées que par un technicien de maintenance agréé. N'effectuez que les opérations de dépannage et les petites réparations autorisées par la documentation de votre produit et suivez les instructions fournies en ligne ou par téléphone par l'équipe de maintenance et d'assistance technique. Tout dommage causé par une réparation non autorisée par Dell est exclu de votre garantie. Consultez et respectez les consignes de sécurité fournies avec votre produit. 1. Utilisez les crochets à la base du châssis comme guide pour aligner le fond de panier des disques durs. 2. Enfoncez le fond de panier des disques durs jusqu'à ce que les pattes de dégagement s'enclenchent. 3. Branchez le(s) câble(s) de données SAS/SATA/SSD, de transmission et d'alimentation au fond de panier. 4. Installez les disques durs à leur emplacement d'origine. 5. Refermez le système. 6. Rebranchez le système à la prise secteur et mettez-le sous tension, ainsi que les périphériques qui y sont connectés. 7. Le cas échéant, installez le cadre avant. 94Assemblage du panneau de commande Retrait du panneau de commande PRÉCAUTION: La plupart des réparations ne peuvent être effectuées que par un technicien de maintenance agréé. N'effectuez que les opérations de dépannage et les petites réparations autorisées par la documentation de votre produit et suivez les instructions fournies en ligne ou par téléphone par l'équipe de maintenance et d'assistance technique. Tout dommage causé par une réparation non autorisée par Dell est exclu de votre garantie. Consultez et respectez les consignes de sécurité fournies avec votre produit. 1. Retirez le cadre avant s'il est installé. 2. Éteignez le système et les périphériques connectés, puis débranchez le système de la prise secteur et des périphériques. 3. Ouvrez le système. PRÉCAUTION: Ne forcez pas lorsque vous retirez le panneau de commande, vous pourriez endommager les connecteurs. 4. Libérez les pattes de verrouillage du panneau de commande en inclinant vers le haut et vers l'extérieur du système. Pour un système de disques durs remplaçables à chaud de 2,5 pouces, retirez la vis (située en bas du châssis) qui fixe le panneau de commande au châssis. Figure 50. Retrait et installation du panneau de commande : système de quatre disques durs 1. Encoches (6) 952. Pattes de verrouillage (6) 3. Panneau de commande Figure 51. Retrait et installation du panneau de commande : système de huit disques durs 1. Panneau de commande 2. Encoches (4) 3. Câble du connecteur LCD 4. Vis 5. Pattes de verrouillage (4) Installation du panneau de commande PRÉCAUTION: La plupart des réparations ne peuvent être effectuées que par un technicien de maintenance agréé. N'effectuez que les opérations de dépannage et les petites réparations autorisées par la documentation de votre produit et suivez les instructions fournies en ligne ou par téléphone par l'équipe de maintenance et d'assistance technique. Tout dommage causé par une réparation non autorisée par Dell est exclu de votre garantie. Consultez et respectez les consignes de sécurité fournies avec votre produit. 1. Insérez le câble du panneau de commande à travers l'e logement du châssis, le cas échéant. 96PRÉCAUTION: Afin d'éviter d'endommager le voyant d'alimentation, ne forcez pas outre mesure. 2. Alignez les pattes de verrouillage du panneau de commande avec les encoches du châssis puis inclinez le panneau de commande jusqu'à ce qu'il s'enclenche. S'il est correctement installé, le panneau de commande est au même niveau que le panneau avant. REMARQUE: Pour un système de huit disques durs de 2,5 pouces, serrez la vis qui fixe le panneau de commande au bas du châssis. 3. Refermez le système. 4. Rebranchez le système et les périphériques à leur source d'alimentation, puis mettez-les sous tension. 5. Le cas échéant, installez le cadre avant. Retrait du module du panneau de commande PRÉCAUTION: La plupart des réparations ne peuvent être effectuées que par un technicien de maintenance agréé. N'effectuez que les opérations de dépannage et les petites réparations autorisées par la documentation de votre produit et suivez les instructions fournies en ligne ou par téléphone par l'équipe de maintenance et d'assistance technique. Tout dommage causé par une réparation non autorisée par Dell est exclu de votre garantie. Consultez et respectez les consignes de sécurité fournies avec votre produit. 1. Retirez le cadre avant s'il est installé. 2. Éteignez le système et les périphériques connectés, puis débranchez le système de la prise secteur et des périphériques. 3. Ouvrez le système. 4. Retirez le panneau de commande du châssis. 5. Retirez la ou les vis fixant le panneau de commande au châssis. 6. Pour un système de disques durs de 3,5 pouces connectés par câble : a) Retirez la ou les vis fixant le panneau à voyants au châssis. b) Retirez le panneau à voyants. PRÉCAUTION: Ne forcez pas lorsque vous retirez le panneau de commande, vous pourriez endommager les connecteurs. 7. Retirez tous les câbles connectant le module du panneau de commande au châssis. 97Figure 52. Retrait et installation du module du panneau de commande : système de disques durs de 3,5 pouces connectés par câble 1. Module du panneau de commande 2. Vis du module du panneau de commande (2) 3. Câble du connecteur du module du panneau de commande 4. Câble du connecteur USB 5. Panneau de commande 6. Vis du panneau à voyants (2) 7. Panneau à voyants 98Figure 53. Retrait et installation du module du panneau de commande : système de disques durs de 3,5 pouces enfichables à chaud 1. Module du panneau de commande 2. Vis (2) 3. Câble du connecteur du module du panneau de commande 4. Câble du connecteur USB 5. Panneau de commande 99Figure 54. Retrait et installation du module du panneau de commande : système de disques durs de 2,5 pouces 1. Module du panneau de commande 2. Vis (2) 3. Câble du connecteur du module du panneau de commande 4. Câble du connecteur LCD 5. Panneau de commande Installation du module du panneau de commande PRÉCAUTION: La plupart des réparations ne peuvent être effectuées que par un technicien de maintenance agréé. N'effectuez que les opérations de dépannage et les petites réparations autorisées par la documentation de votre produit et suivez les instructions fournies en ligne ou par téléphone par l'équipe de maintenance et d'assistance technique. Tout dommage causé par une réparation non autorisée par Dell est exclu de votre garantie. Consultez et respectez les consignes de sécurité fournies avec votre produit. 1. Pour un système de disques durs de 3,5 pouces connectés par câble : a) Insérez le panneau à voyant dans le logement correspondant du châssis. b) Fixez le panneau à voyants à l'aide des vis. 2. Insérez le module du panneau de commande dans le logement du châssis et alignez les deux trous du module du panneau de commande avec les trous correspondants sur le châssis. 3. Fixez le module du panneau de commande à l'aide des vis. 4. Branchez tous les câbles applicables à l'ensemble du module panneau de commande. 5. Refermez le système. 6. Installez le panneau de commande. 7. Rebranchez le système et les périphériques à leur source d'alimentation, puis mettez-les sous tension. 8. Le cas échéant, installez le cadre avant. 100Module VGA REMARQUE: Le système à 8 disques durs est le seul à posséder un module VGA sur le panneau avant. Retrait du module VGA PRÉCAUTION: La plupart des réparations ne peuvent être effectuées que par un technicien de maintenance agréé. N'effectuez que les opérations de dépannage et les petites réparations autorisées par la documentation de votre produit et suivez les instructions fournies en ligne ou par téléphone par l'équipe de maintenance et d'assistance technique. Tout dommage causé par une réparation non autorisée par Dell est exclu de votre garantie. Consultez et respectez les consignes de sécurité fournies avec votre produit. REMARQUE: Cette procédure s'applique seulement au système 8 disques durs. 1. Retirez le cadre avant s'il est installé. 2. Éteignez le système et les périphériques qui y sont connectés, puis débranchez le système de la prise secteur et déconnectez-le des périphériques. 3. Ouvrez le système. PRÉCAUTION: Le connecteur du module d'affichage est un connecteur ZIF (force d'insertion nulle). Assurez-vous que l'onglet de verouillage sur le connecteur est relâché avant le retrait et l'insertion. L'onglet de verrouillage doit être engagé après l'insertion. 4. Débranchez le câble du module d'affichage de la carte du panneau de commande. 5. Retirez le panneau de commande. 6. Déconnectez le câble du module VGA du module VGA. 7. À l'aide d'un tournevis cruciforme No. 2, retirez la vis qui fixe le module VGA au châssis. 8. Faites glisser le module VGA en dehors du châssis. Figure 55. Retrait et installation du module VGA 1011. panneau de commande 2. câble du module d'affichage 3. vis (haut) 4. câble du module VGA 5. vis (bas) 6. module VGA Installation du module VGA REMARQUE: Cette procédure s'applique seulement au système 8 disques durs. PRÉCAUTION: La plupart des réparations ne peuvent être effectuées que par un technicien de maintenance agréé. N'effectuez que les opérations de dépannage et les petites réparations autorisées par la documentation de votre produit et suivez les instructions fournies en ligne ou par téléphone par l'équipe de maintenance et d'assistance technique. Tout dommage causé par une réparation non autorisée par Dell est exclu de votre garantie. Consultez et respectez les consignes de sécurité fournies avec votre produit. 1. Poussez le module VGA en position dans le châssis et alignez le trou de vis fileté du module VGA sur le trou de vis du châssis. 2. À l'aide d'un tournevis cruciforme no. 2, replacez la vis (au bas du châssis) qui fixe le module VGA au châssis. 3. Réinstallez le panneau de commande. 4. Connectez le câble du module VGA au module VGA. PRÉCAUTION: Le connecteur du module d'affichage est un connecteur ZIF (force d'insertion nulle). Assurez-vous que l'onglet de verouillage sur le connecteur est relâché avant le retrait et l'insertion. L'onglet de verrouillage doit être engagé après l'insertion. 5. Branchez le câble du module d'affichage sur la carte du panneau de commande. 6. Refermez le système. 7. Le cas échéant, installez le cadre avant. 8. Rebranchez le système à la prise secteur et mettez-le sous tension, ainsi que les périphériques qui y sont connectés. Carénage de la carte de distribution d'alimentation Retrait du carénage de la carte de distribution d'alimentation PRÉCAUTION: La plupart des réparations ne peuvent être effectuées que par un technicien de maintenance agréé. N'effectuez que les opérations de dépannage et les petites réparations autorisées par la documentation de votre produit et suivez les instructions fournies en ligne ou par téléphone par l'équipe de maintenance et d'assistance technique. Tout dommage causé par une réparation non autorisée par Dell est exclu de votre garantie. Consultez et respectez les consignes de sécurité fournies avec votre produit. PRÉCAUTION: Ne mettez jamais sous tension un système à deux processeurs sans un carénage de carte d'alimentation. Le système peut surchauffer, ce qui pourrait entraîner une perte de performances. 1. Éteignez le système et les périphériques connectés, puis débranchez le système de la prise secteur et des périphériques. 2. Ouvrez le système. 3. Extrayez la carte de distribution d'alimentation (PDB) du système. 102Figure 56. Retrait et installation du carénage PDB 1. Support du ventilateur 2. Pattes du carénage PDB (2) 3. Carénage PDB 4. Flèche sur le carénage PDB Installation du carénage de la carte de distribution d'alimentation PRÉCAUTION: La plupart des réparations ne peuvent être effectuées que par un technicien de maintenance agréé. N'effectuez que les opérations de dépannage et les petites réparations autorisées par la documentation de votre produit et suivez les instructions fournies en ligne ou par téléphone par l'équipe de maintenance et d'assistance technique. Tout dommage causé par une réparation non autorisée par Dell est exclu de votre garantie. Consultez et respectez les consignes de sécurité fournies avec votre produit. REMARQUE: Pour une installation du carénage de distribution d'alimentation dans le châssis, assurez-vous que les câbles à l'intérieur du système sont acheminés via le loquet de fixation de câbles. 1. Alignez le carénage PDB avec la baie de ventilateur numéroté et la flèche comme guide. 2. Abaissez le carénage PDB dans le châssis afin que les deux pattes du carénage PDB reposent sur le support de ventilateur. Lorsqu'il est correctement installé, le carénage PDB est au même niveau que le support du bloc d'alimentation et la flèche du carénage s'aligne avec la flèche du support du bloc d'alimentation. 3. Refermez le système. 4. Rebranchez le système à la prise secteur et mettez-le sous tension, ainsi que les périphériques qui y sont connectés. 103Carte de distribution d'alimentation Retrait de la carte de distribution d'alimentation PRÉCAUTION: La plupart des réparations ne peuvent être effectuées que par un technicien de maintenance agréé. N'effectuez que les opérations de dépannage et les petites réparations autorisées par la documentation de votre produit et suivez les instructions fournies en ligne ou par téléphone par l'équipe de maintenance et d'assistance technique. Tout dommage causé par une réparation non autorisée par Dell est exclu de votre garantie. Consultez et respectez les consignes de sécurité fournies avec votre produit. REMARQUE: La carte de distribution d'alimentation est présente uniquement sur les systèmes prenant en charge les blocs d'alimentation redondants. 1. Retirez le cadre avant s'il est installé. 2. Éteignez le système et les périphériques connectés, puis débranchez le système de la prise secteur et des périphériques. 3. Ouvrez le système. 4. Retirez les blocs d'alimentation du système. 5. Retirez le carénage PDB. 6. Débranchez de la carte système les câbles de la carte de distribution de l'alimentation. 7. Débranchez le câble du ventilateur. 8. Retirez les deux vis fixant la carte de distribution d'alimentation au châssis, puis extrayez la carte. Figure 57. Retrait et installation de la carte de distribution d'alimentation 1041. Vis (2) 2. Câbles du bloc d'alimentation vers la carte système (3) 3. Câble du bloc d'alimentation vers le fond de panier de disques durs 4. Picots (2) 5. Carte de distribution d'alimentation 6. Connecteur du câble de ventilateur Installation de la carte de distribution d'alimentation PRÉCAUTION: La plupart des réparations ne peuvent être effectuées que par un technicien de maintenance agréé. N'effectuez que les opérations de dépannage et les petites réparations autorisées par la documentation de votre produit et suivez les instructions fournies en ligne ou par téléphone par l'équipe de maintenance et d'assistance technique. Tout dommage causé par une réparation non autorisée par Dell est exclu de votre garantie. Consultez et respectez les consignes de sécurité fournies avec votre produit. 1. Alignez la carte de distribution d'alimentation avec les picots du châssis. 2. Insérez les deux vis qui fixent la carte de distribution d'alimentation au châssis. 3. Branchez les câbles de distribution d'alimentation à la carte système et le connecteur du câble du ventilateur à la carte de distribution d'alimentation. 4. Installez le carénage PDB. 5. Refermez le système. 6. Rebranchez le système à la prise secteur et mettez-le sous tension, ainsi que les périphériques qui y sont connectés. Carte système Retrait de la carte système PRÉCAUTION: La plupart des réparations ne peuvent être effectuées que par un technicien de maintenance agréé. N'effectuez que les opérations de dépannage et les petites réparations autorisées par la documentation de votre produit et suivez les instructions fournies en ligne ou par téléphone par l'équipe de maintenance et d'assistance technique. Tout dommage causé par une réparation non autorisée par Dell est exclu de votre garantie. Consultez et respectez les consignes de sécurité fournies avec votre produit. PRÉCAUTION: Si vous utilisez le module TPM (Trusted Program Module) avec une clé de cryptage, il est possible que vous soyez invité à créer une clé de restauration lors de l'installation du système ou d'un programme. Assurezvous de créer et stocker de manière sûre cette clé de restauration Si vous remplacez cette carte système, vous devrez fournir la clé de restauration lorsque vous redémarrerez le système ou le programme avant de pouvoir accéder aux données cryptées de vos disques durs. 1. Mettez le système et les périphériques qui y sont connectés hors tension, puis débranchez le système de la prise secteur. 2. Retirez le cadre avant s'il est installé. 3. Ouvrez le système. 4. Retirez les composants suivants : a) Carénage de refroidissement b) Carénage PDB c) Barrettes de mémoire d) Cartes d'extension et cartes de montage pour cartes d'extension 105e) Carte contrôleur de stockage intégrée AVERTISSEMENT: Le radiateur et le processeur restent chauds au toucher pendant quelques temps après l'arrêt du système. Laissez refroidir le radiateur et le processeur avant de les manipuler. f) Dissipateur de chaleur/cache de dissipateur de chaleur et processeur/cache de processeur g) Carte contrôleur de stockage intégrée h) Module SD interne double i) Support de carte d'extension REMARQUE: Il est recommandé de supprimer la carte de distribution d'alimentation avant de retirer la carte système du châssis. 5. Débranchez tous les câbles de la carte système. PRÉCAUTION: Ne vous servez pas d'une barrette de mémoire, d'un processeur ou de tout autre composant pour soulever l'assemblage de la carte système. 6. Retirez le neuf vis de la carte système et faites glisser la carte système vers l'avant du système. 7. Faites glisser la carte système vers l'avant du système. Figure 58. Retrait et installation de la carte système 1. Vis (9) 2. Carte système Installation de la carte système PRÉCAUTION: La plupart des réparations ne peuvent être effectuées que par un technicien de maintenance agréé. N'effectuez que les opérations de dépannage et les petites réparations autorisées par la documentation de votre produit et suivez les instructions fournies en ligne ou par téléphone par l'équipe de maintenance et d'assistance technique. Tout dommage causé par une réparation non autorisée par Dell est exclu de votre garantie. Consultez et respectez les consignes de sécurité fournies avec votre produit. 1. Déballez le nouvel assemblage de la carte système. 2. Transférez les composants suivants sur la nouvelle carte système : 106a) Le(s) dissipateur(s) de chaleur/cache(s) de dissipateur de chaleur et le(s) processeur(s)/cache(s) de processeur b) Les barrettes de mémoire et caches correspondants PRÉCAUTION: Ne vous servez pas d'une barrette de mémoire, d'un processeur ou de tout autre composant pour soulever l'assemblage de la carte système. PRÉCAUTION: Veillez à ne pas endommager le bouton d'identification du système lors de la remise en place de la carte système dans le châssis. 3. Maintenez et alignez la carte système par ses bords puis alignez-la à l'arrière du châssis. 4. Abaissez la carte système et alignez les trous de vis avec les picots du châssis jusqu'à ce qu'il soit fermement enclenché. 5. Serrez les vis de la carte système pour fixer la carte système au châssis. 6. Réinstallez les éléments suivants : a) Support de carte d'extension b) Cartes de montage pour cartes d'extension c) Cartes d'extension d) Carte contrôleur de stockage intégrée e) Barrettes de mémoire f) Module SD interne double g) Carénage PDB h) Carénage de refroidissement 7. Rebranchez tous les câbles à la carte système. REMARQUE: Assurez-vous que les câbles à l'intérieur du système soient acheminés de manière sécurisée à l'aide des loquets de fixation de câbles. 8. Refermez le système. 9. Rebranchez le système à la prise secteur et mettez-le sous tension, ainsi que les périphériques qui y sont connectés. 10. Importez votre licence iDRAC Enterprise (nouvelle et déjà existante). Pour plus d'informations, reportez-vous au iDRAC7 User's Guide (Guide d'utilisation iDRAC7) sous Software → Systems Management → Dell Remote Access Controllers (Logiciel Gestion de systèmes Contrôleurs d'accès à distance Dell) à l'adresse support.dell.com/ manuals. 1071084 Dépannage du système La sécurité en priorité, pour vous et votre système PRÉCAUTION: La plupart des réparations ne peuvent être effectuées que par un technicien de maintenance agréé. N'effectuez que les opérations de dépannage et les petites réparations autorisées par la documentation de votre produit et suivez les instructions fournies en ligne ou par téléphone par l'équipe de maintenance et d'assistance technique. Tout dommage causé par une réparation non autorisée par Dell est exclu de votre garantie. Consultez et respectez les consignes de sécurité fournies avec votre produit. Dépannage des échecs de démarrage du système • Si vous démarrez le système en mode d'amorçage BIOS après l'installation du système d'exploitation à partir du Gestionnaire de démarrage UEFI, le système se bloquera. L'inverse est également vrai. Vous devez démarrer en utilisant le même mode de démarrage que celui avec lequel vous avez installé le système d'exploitation. • Pour tous les autres problèmes de démarrage, notez les messages du système qui apparaissent à l'écran. Dépannage des connexions externes Avant de procéder au dépannage de tout périphérique externe, assurez-vous que tous les câbles externes sont correctement fixés aux connecteurs externes de votre système. Dépannage du sous-système vidéo 1. Vérifiez les branchements du moniteur (prise secteur et raccordement au système). 2. Vérifiez le câblage de l'interface vidéo entre le système et le moniteur. 3. Exécutez le test de diagnostic approprié. Si les tests aboutissent, le problème n'est pas lié au matériel vidéo. Si les tests échouent, reportez-vous à la section Obtention d'aide. Dépannage d'un périphérique USB Effectuez les étapes suivantes pour dépanner un clavier/une souris USB. Pour tous les autres périphériques USB, passez à l'étape 7. 1. Débranchez un court instant du système les câbles du clavier ou de la souris, puis reconnectez-les. 2. Connectez le clavier ou la souris aux ports USB situés sur le côté opposé du système. 3. Si l'incident est résolu, redémarrez le système, accédez au programme de configuration du système et vérifiez que les ports USB défectueux sont activés. 4. Remplacez le clavier ou la souris par un périphérique équivalent en état de marche. 5. Si le problème est résolu, remplacez le périphérique (clavier ou souris) défectueux. 1096. Si le problème persiste, passez à l'étape suivante pour dépanner les autres périphériques USB reliés au système. 7. Mettez hors tension tous les périphériques USB et déconnectez-les du système. 8. Redémarrez le système et, si votre clavier fonctionne, entrez dans le programme de configuration du système. Vérifiez que tous les ports USB sont activés dans l'écran Integrated Devices (Périphériques intégrés), dans les options du programme de configuration du système. Si votre clavier ne fonctionne pas, vous pouvez également utiliser l'accès distant. Si le système n'est pas accessible, réinitialisez le cavalier NVRAM_CLR à l'intérieur de votre système et restaurez les paramètres par défaut du BIOS. 9. Reconnectez et remettez sous tension les périphériques USB un par un. 10. Si un périphérique provoque un problème similaire, mettez-le hors tension, remplacez le câble USB si nécessaire, puis remettez le périphérique sous tension. Si toutes les tentatives de dépannage échouent, reportez-vous à la section Obtention d'aide. Dépannage d'un périphérique d'E/S série 1. Mettez hors tension le système et les périphériques connectés au port série. 2. Remplacez le câble d'interface série par un câble fiable, puis mettez le système et le périphérique série sous tension. Si vous avez résolu le problème, remplacez le câble d'interface par un câble réputé fiable. 3. Mettez hors tension le système et le périphérique série, puis remplacez ce dernier par un périphérique similaire. 4. Mettez sous tension le système et le périphérique série. Si le problème persiste, reportez-vous à la section Obtention d'aide. Dépannage d'une carte réseau 1. Exécutez le test de diagnostic approprié. 2. Redémarrez le système et consultez les messages éventuels concernant le contrôleur de carte réseau. 3. Vérifiez le voyant approprié du connecteur de carte réseau : – Si le voyant de liaison ne s'allume pas, vérifiez tous les branchements. – Si le voyant d'activité ne s'allume pas, les fichiers des pilotes réseau sont peut-être endommagés ou manquants. Retirez et réinstallez les pilotes, le cas échéant. Reportez-vous à la documentation de votre carte réseau. – Le cas échéant, modifiez le paramètre d'autonégociation. – Utilisez un autre connecteur sur le commutateur ou le concentrateur. 4. Assurez-vous que les pilotes appropriés sont installés et que les protocoles sont liés. Reportez-vous à documentation de votre carte réseau. 5. Entrez dans le programme de configuration du système, et confirmez que les ports de la carte réseau sont activés dans l'écran Périphériques intégrés. 6. Assurez-vous que les cartes réseau, les concentrateurs et les commutateurs du réseau sont tous configurés sur la même vitesse de transmission de données et en recto-verso. Reportez-vous à la documentation de chaque périphérique réseau. 7. Vérifiez que tous les câbles réseau sont du type approprié et qu'ils ne dépassent pas la longueur maximale. Si toutes les tentatives de dépannage échouent, reportez-vous à la section Obtention d'aide. 110Dépannage d'un système mouillé PRÉCAUTION: La plupart des réparations ne peuvent être effectuées que par un technicien de maintenance agréé. N'effectuez que les opérations de dépannage et les petites réparations autorisées par la documentation de votre produit et suivez les instructions fournies en ligne ou par téléphone par l'équipe de maintenance et d'assistance technique. Tout dommage causé par une réparation non autorisée par Dell est exclu de votre garantie. Consultez et respectez les consignes de sécurité fournies avec votre produit. 1. Mettez le système et les périphériques connectés hors tension, puis débranchez le système de la prise secteur. 2. Ouvrez le système. 3. Désassemblez les composants du système : – Disques durs – Fond de panier des disques durs – Clé de mémoire USB – Carénage de refroidissement – Cartes d'extension – Bloc(s) d'alimentation – Ventilateurs de refroidissement – Processeur(s) et dissipateur(s) de chaleur – Barrettes de mémoire 4. Laissez sécher le système pendant au moins 24 heures. 5. Réinstallez les composants retirés à l'étape 3. 6. Refermez le système. 7. Mettez sous tension le système et les périphériques qui y sont connectés. Si le système ne démarre pas normalement, reportez-vous à la section Obtention d'aide. 8. Si le système démarre normalement, arrêtez-le et réinstallez les cartes d'extension que vous avez retirées. 9. Exécutez le test de diagnostic approprié. Si les tests échouent, reportez-vous à la section Obtention d'aide. Dépannage d'un système endommagé PRÉCAUTION: La plupart des réparations ne peuvent être effectuées que par un technicien de maintenance agréé. N'effectuez que les opérations de dépannage et les petites réparations autorisées par la documentation de votre produit et suivez les instructions fournies en ligne ou par téléphone par l'équipe de maintenance et d'assistance technique. Tout dommage causé par une réparation non autorisée par Dell est exclu de votre garantie. Consultez et respectez les consignes de sécurité fournies avec votre produit. 1. Mettez le système et les périphériques connectés hors tension, puis débranchez le système de la prise secteur. 2. Ouvrez le système. 3. Assurez-vous que les composants suivants sont correctement installés : – Carénage de refroidissement – Cartes d'extension – Bloc(s) d'alimentation – Ventilateurs de refroidissement 111– Processeur(s) et dissipateur(s) de chaleur – Barrettes de mémoire – Supports de disque dur – Fond de panier des disques durs 4. Vérifiez que tous les câbles sont connectés correctement. 5. Refermez le système. 6. Exécutez les tests de la carte système qui se trouvent dans les diagnostics du système. Si les tests échouent, reportez-vous à la section Obtention d'aide. Dépannage de la pile du système PRÉCAUTION: La plupart des réparations ne peuvent être effectuées que par un technicien de maintenance agréé. N'effectuez que les opérations de dépannage et les petites réparations autorisées par la documentation de votre produit et suivez les instructions fournies en ligne ou par téléphone par l'équipe de maintenance et d'assistance technique. Tout dommage causé par une réparation non autorisée par Dell est exclu de votre garantie. Consultez et respectez les consignes de sécurité fournies avec votre produit. REMARQUE: Si le système est hors tension pendant une longue période (des semaines ou des mois), la NVRAM peut perdre ses informations de configuration du système. Cette situation est provoquée par une pile défectueuse. 1. Entrez de nouveau l'heure et la date dans le programme de configuration du système. 2. Mettez le système hors tension et débranchez-le de la prise secteur pendant au moins une heure. 3. Rebranchez le système à la prise secteur et mettez-le sous tension. 4. Accédez à la configuration du système. Si la date et l'heure sont incorrectes dans la configuration du système, vérifiez si le SEL affiche des messages de pile système. Si le problème n'est pas résolu, reportez-vous à la section Obtention d'aide. REMARQUE: Il se peut que certains logiciels fassent accélérer ou ralentir l'heure du système. Si le système semble fonctionner normalement hormis l'heure se trouvant dans la configuration du système, le problème provient peut- être du logiciel plutôt que d'une batterie défectueuse. Dépannage des blocs d'alimentation PRÉCAUTION: La plupart des réparations ne peuvent être effectuées que par un technicien de maintenance agréé. N'effectuez que les opérations de dépannage et les petites réparations autorisées par la documentation de votre produit et suivez les instructions fournies en ligne ou par téléphone par l'équipe de maintenance et d'assistance technique. Tout dommage causé par une réparation non autorisée par Dell est exclu de votre garantie. Consultez et respectez les consignes de sécurité fournies avec votre produit. 1. Réinstallez le bloc d'alimentation en procédant d'abord à son retrait, puis à sa réinstallation. REMARQUE: Après avoir installé un bloc d'alimentation, patientez quelques secondes pour laisser au système le temps de le reconnaître et de déterminer s'il fonctionne correctement. 2. Si le problème persiste, reportez-vous à la section Obtention d'aide. 112Dépannage des problèmes de refroidissement PRÉCAUTION: La plupart des réparations ne peuvent être effectuées que par un technicien de maintenance agréé. N'effectuez que les opérations de dépannage et les petites réparations autorisées par la documentation de votre produit et suivez les instructions fournies en ligne ou par téléphone par l'équipe de maintenance et d'assistance technique. Tout dommage causé par une réparation non autorisée par Dell est exclu de votre garantie. Consultez et respectez les consignes de sécurité fournies avec votre produit. Assurez-vous qu'aucune des conditions suivantes n'existe : • Retrait du capot du système, du carénage de refroidissement, de la plaque de recouvrement EMI, du cache de barrette de mémoire ou de plaque de recouvrement arrière. • La température ambiante est trop élevée. • La circulation de l'air extérieur est bloquée. • Retrait ou panne de l'un des ventilateurs de refroidissement. • Les consignes d'installation de la carte d'extension n'ont pas été respectées. Dépannage des ventilateurs de refroidissement PRÉCAUTION: La plupart des réparations ne peuvent être effectuées que par un technicien de maintenance agréé. N'effectuez que les opérations de dépannage et les petites réparations autorisées par la documentation de votre produit et suivez les instructions fournies en ligne ou par téléphone par l'équipe de maintenance et d'assistance technique. Tout dommage causé par une réparation non autorisée par Dell est exclu de votre garantie. Consultez et respectez les consignes de sécurité fournies avec votre produit. 1. Ouvrez le système. 2. Remettez en place le ventilateur ou le câble d'alimentation du ventilateur. 3. Si le ventilateur fonctionne correctement, fermez le système. Si le problème persiste, reportez-vous à la section Obtention d'aide. Dépannage de la mémoire système PRÉCAUTION: La plupart des réparations ne peuvent être effectuées que par un technicien de maintenance agréé. N'effectuez que les opérations de dépannage et les petites réparations autorisées par la documentation de votre produit et suivez les instructions fournies en ligne ou par téléphone par l'équipe de maintenance et d'assistance technique. Tout dommage causé par une réparation non autorisée par Dell est exclu de votre garantie. Consultez et respectez les consignes de sécurité fournies avec votre produit. 1. Si le système est opérationnel, lancez les tests de diagnostic adéquats. Reportez-vous à la section Utilisation des diagnostics système pour connaître les tests de diagnostic disponibles. Si les diagnostics indiquent une panne, suivez les instructions fournies par le programme de diagnostic. 2. Si le système n'est pas opérationnel, mettez-le hors tension ainsi que ses périphériques connectés, puis débranchez-le de sa source d'alimentation. Patientez au moins 10 secondes, puis reconnectez le système à sa source d'alimentation. 3. Mettez le système et les périphériques qui y sont connectés sous tension, puis notez les messages qui s'affichent à l'écran. Si un message d'erreur indiquant une panne de module de mémoire s'affiche, passez à l'étape 12. 4. Entrez dans le programme de configuration du système et vérifiez les paramètres de mémoire du système. Modifiez-les si nécessaire. 113Si un problème persiste, bien que les paramètres de la mémoire correspondent à la mémoire installée, passez à l'étape 12. 5. Mettez le système et les périphériques qui y sont connectés hors tension, puis débranchez le système de la prise secteur. 6. Ouvrez le système. 7. Vérifiez les canaux de mémoire et assurez-vous que l'installation des barrettes est correcte. 8. Remboîtez les barrettes de mémoire dans leurs supports. 9. Refermez le système. 10. Accédez à la configuration du système et vérifiez le paramètre de la mémoire système. Si le problème persiste, passez à l'étape suivante. 11. Ouvrez le système. 12. Si un test de diagnostic ou un message d'erreur indique une panne d'un module de mémoire spécifique, installez un module qui fonctionne à la place du module défectueux. 13. Pour dépanner une barrette de mémoire défectueuse non identifiée, remplacez la barrette du premier logement de barrette DIMM par une autre de même type et de même capacité. Si un message d'erreur s'affiche à l'écran, il peut s'agir d'un problème lié au type des DIMM installées, d'une installation incorrecte des DIMM ou de DIMM défectueuse(s). Suivez les instructions qui s'affichent à l'écran pour résoudre le problème. Pour de plus amples informations, reportez-vous aux consignes générales d'installation des modules de mémoire. 14. Refermez le système. 15. Pendant l'amorçage du système, observez les voyants de diagnostic du panneau avant et les messages d'erreur qui s'affichent. 16. Si le problème de mémoire est toujours indiqué, répétez les étapes 12 à 15 pour chaque module de mémoire installé. Si le problème persiste alors que vous avez vérifié toutes les barrettes de mémoire, reportez-vous à la section Obtention d'aide. Dépannage d'une clé USB interne PRÉCAUTION: La plupart des réparations ne peuvent être effectuées que par un technicien de maintenance agréé. N'effectuez que les opérations de dépannage et les petites réparations autorisées par la documentation de votre produit et suivez les instructions fournies en ligne ou par téléphone par l'équipe de maintenance et d'assistance technique. Tout dommage causé par une réparation non autorisée par Dell est exclu de votre garantie. Consultez et respectez les consignes de sécurité fournies avec votre produit. 1. Entrez dans le programme de configuration du système et assurez-vous qu’USB key port (Port de clé USB) est activé depuis l'écran Integrated Devices (Périphériques intégrés). 2. Mettez le système et les périphériques connectés hors tension, puis débranchez le système de la prise secteur. 3. Ouvrez le système. 4. Identifiez la clé USB et remettez-la en place. 5. Refermez le système. 6. Mettez le système et les périphériques qui y sont connectés sous tension, puis vérifiez que la clé USB fonctionne correctement. 7. Si le problème persiste, répétez les étapes 2 et 3. 8. Insérez une autre clé USB en état de marche. 9. Refermez le système. 114Si le problème n'est pas résolu, reportez-vous à la section Obtention d'aide. Dépannage d'une carte SD PRÉCAUTION: La plupart des réparations ne peuvent être effectuées que par un technicien de maintenance agréé. N'effectuez que les opérations de dépannage et les petites réparations autorisées par la documentation de votre produit et suivez les instructions fournies en ligne ou par téléphone par l'équipe de maintenance et d'assistance technique. Tout dommage causé par une réparation non autorisée par Dell est exclu de votre garantie. Consultez et respectez les consignes de sécurité fournies avec votre produit. REMARQUE: Certaines cartes SD sont équipées d'un commutateur physique de protection contre écriture. Si le commutateur de protection contre écriture est allumé, il est impossible d'écrire sur la carte SD. 1. Accédez à la configuration du système et vérifiez qu'Internal SD Card Port (Port de la carte SD interne) est activé. 2. Mettez le système et les périphériques qui y sont connectés hors tension, puis débranchez le système de la prise secteur. 3. Ouvrez le système. PRÉCAUTION: Si l'option Internal SD Card Redundancy (Redondance de la carte SD interne) est réglée sur le mode Mirror (Miroir) dans l'écran Integrated Devices (Périphériques intégrés) de la configuration du système, vous devez suivre les instructions décrites aux étapes 4 à 7 pour éviter toute perte de données. REMARQUE: Lorsqu'une panne de carte SD survient, le contrôleur de module SD interne double la signale au système. Lors du redémarrage suivant, le système affiche un message indiquant la panne. 4. Si l'option Internal SD Card Redundancy (Redondance de la carte SD interne) est réglée sur Disabled (Désactivé), remplacez la carte SD défectueuse par une nouvelle. 5. Si la carte SD 1 a échoué, retirez la carte du logement de carte SD 1. Si la carte SD 2 a échoué, installez une nouvelle carte SD dans le logement de carte SD 2, puis passez à l'étape 7. 6. Retirez la carte se trouvant dans le logement de carte SD 2 et insérez-la dans le logement de carte SD 1. 7. Insérez la nouvelle carte SD dans le logement de carte SD 2. 8. Refermez le système. 9. Rebranchez le système à la prise secteur et mettez-le sous tension, ainsi que les périphériques qui y sont connectés. 10. Accédez à la configuration du système et assurez-vous que les modes Internal SD Card Port (Port de carte SD interne) et Internal SD Card Redundancy (Redondance de la carte SD interne) sont activés. 11. Vérifiez que la carte SD fonctionne correctement. Si le problème persiste, reportez-vous à la section Obtention d'aide. Dépannage d'un lecteur optique PRÉCAUTION: La plupart des réparations ne peuvent être effectuées que par un technicien de maintenance agréé. N'effectuez que les opérations de dépannage et les petites réparations autorisées par la documentation de votre produit et suivez les instructions fournies en ligne ou par téléphone par l'équipe de maintenance et d'assistance technique. Tout dommage causé par une réparation non autorisée par Dell est exclu de votre garantie. Consultez et respectez les consignes de sécurité fournies avec votre produit. 1. Utilisez un autre CD ou DVD. 2. Accédez au programme de configuration du système et vérifiez que le contrôleur SATA intégré et le port du lecteur SATA sont activés. 3. Exécutez le test de diagnostic approprié. 1154. Mettez le système et les périphériques qui y sont connectés hors tension, puis débranchez le système de la prise secteur. 5. Ouvrez le système. 6. Retirez le cadre avant. 7. Vérifiez que le câble d'interface est correctement branché sur le lecteur optique et le contrôleur. 8. Vérifiez que le câble d'alimentation est bien connecté au lecteur. 9. Refermez le système. Si le problème n'est pas résolu, reportez-vous à la section Obtention d'aide. Dépannage d'une unité de sauvegarde sur bande PRÉCAUTION: La plupart des réparations ne peuvent être effectuées que par un technicien de maintenance agréé. N'effectuez que les opérations de dépannage et les petites réparations autorisées par la documentation de votre produit et suivez les instructions fournies en ligne ou par téléphone par l'équipe de maintenance et d'assistance technique. Tout dommage causé par une réparation non autorisée par Dell est exclu de votre garantie. Consultez et respectez les consignes de sécurité fournies avec votre produit. 1. Essayez d'utiliser une autre cartouche de bande. 2. Assurez-vous que les pilotes de périphérique de l'unité de sauvegarde sur bande sont correctement installés et configurés. Consultez la documentation du lecteur de bande pour plus d'informations à propos des pilotes de périphérique. 3. Réinstallez le logiciel de sauvegarde sur bande en suivant la procédure indiquée dans sa documentation. 4. Vérifiez que le câble d'interface du lecteur de bande est correctement branché au port externe de la carte contrôleur. 5. Assurez-vous que la carte contrôleur est correctement installée : a) Mettez le système et les périphériques connectés hors tension, puis débranchez le système de la prise secteur. b) Ouvrez le système. c) Repositionnez la carte contrôleur dans le logement de carte d'extension. d) Refermez le système. e) Mettez sous tension le système et les périphériques qui y sont connectés. 6. Exécutez le test de diagnostic approprié. Si vous ne parvenez pas à résoudre le problème, reportez-vous à la section Obtention d'aide. Dépannage d'un disque dur PRÉCAUTION: La plupart des réparations ne peuvent être effectuées que par un technicien de maintenance agréé. N'effectuez que les opérations de dépannage et les petites réparations autorisées par la documentation de votre produit et suivez les instructions fournies en ligne ou par téléphone par l'équipe de maintenance et d'assistance technique. Tout dommage causé par une réparation non autorisée par Dell est exclu de votre garantie. Consultez et respectez les consignes de sécurité fournies avec votre produit. PRÉCAUTION: Cette procédure de dépannage peut détruire les données stockées sur le disque dur. Avant de poursuivre, sauvegardez tous les fichiers présents sur le disque dur. 1. Exécutez le test de diagnostic approprié. Pour plus d'informations, reportez-vous à la section Utilisation des diagnostics système. 116Selon les résultats du test de diagnostic, effectuez les étapes appropriées de la procédure ci-dessous. 2. Si le système est doté d'un contrôleur RAID et si les disques durs sont configurés dans une matrice RAID, procédez comme suit : a) Redémarrez le système et appuyez sur la touche durant le redémarrage du système pour exécuter le Lifecycle Controller, exécutez ensuite l'assistant de configuration de matériel pour vérifier la configuration RAID. Reportez-vous à la documentation du Lifecycle Controller ou à l'aide en ligne pour des informations sur la configuration RAID. b) Assurez-vous que les disques durs ont été correctement configurés pour la matrice RAID. c) Mettez le disque dur hors ligne, puis réinsérez-le. d) Quittez l'utilitaire de configuration et laissez le système d'exploitation démarrer. 3. Assurez-vous que les pilotes de périphérique pour votre carte contrôleur sont correctement installés et configurés. Pour en savoir plus, reportez-vous à la documentation sur le système d'exploitation. 4. Redémarrez le système et accédez au programme de configuration du système. 5. Vérifiez que le contrôleur est activé et que les lecteurs apparaissent dans le programme de configuration du système. Si le problème persiste, essayez de dépanner les cartes d'expansion ou reportez-vous à la section Obtention d'aide. Dépannage d'un contrôleur de stockage PRÉCAUTION: La plupart des réparations ne peuvent être effectuées que par un technicien de maintenance agréé. N'effectuez que les opérations de dépannage et les petites réparations autorisées par la documentation de votre produit et suivez les instructions fournies en ligne ou par téléphone par l'équipe de maintenance et d'assistance technique. Tout dommage causé par une réparation non autorisée par Dell est exclu de votre garantie. Consultez et respectez les consignes de sécurité fournies avec votre produit. REMARQUE: Pour dépanner un contrôleur SAS ou PERC, reportez-vous à sa documentation et à celle du système d'exploitation. 1. Exécutez le test de diagnostic approprié. Pour plus d'informations, reportez-vous à la section Utilisation des diagnostics système. 2. Mettez le système et les périphériques qui y sont connectés hors tension, puis débranchez le système de la prise secteur. 3. Ouvrez le système. 4. Vérifiez que les cartes d'extension installées sont conformes aux consignes d'installation correspondantes. 5. Vérifiez que chaque carte d'extension est correctement insérée dans son connecteur. 6. Refermez le système. 7. Rebranchez le système à la prise secteur et mettez-le sous tension, ainsi que les périphériques qui y sont connectés. 8. Si le problème n'est pas résolu, éteignez le système et les périphériques qui y sont connectés, puis débranchez le système de la prise secteur. 9. Ouvrez le système. 10. Retirez toutes les cartes d'extension du système. 11. Refermez le système. 12. Rebranchez le système à la prise secteur et mettez-le sous tension, ainsi que les périphériques qui y sont connectés. 13. Exécutez le test de diagnostic approprié. Pour plus d'informations, reportez-vous à la section Utilisation des diagnostics système. Si le test échoue, reportez-vous à la section Obtention d'aide. 14. Pour chaque carte d'extension retirée à l'étape 10, effectuez les opérations suivantes : 117a. Mettez le système et les périphériques qui y sont connectés hors tension, puis débranchez le système de la prise secteur. b. Ouvrez le système. c. Réinstallez une des cartes d'extension. d. Refermez le système. e. Exécutez le test de diagnostic approprié. Pour plus d'informations, reportez-vous à la section Utilisation des diagnostics système. Si les tests échouent, reportez-vous à la section Obtention d'aide. Dépannage des cartes d'extension PRÉCAUTION: La plupart des réparations ne peuvent être effectuées que par un technicien de maintenance agréé. N'effectuez que les opérations de dépannage et les petites réparations autorisées par la documentation de votre produit et suivez les instructions fournies en ligne ou par téléphone par l'équipe de maintenance et d'assistance technique. Tout dommage causé par une réparation non autorisée par Dell est exclu de votre garantie. Consultez et respectez les consignes de sécurité fournies avec votre produit. REMARQUE: Pour dépanner une carte d'extension, consultez sa documentation et celle du système d'exploitation. 1. Exécutez le test de diagnostic approprié. 2. Mettez le système et les périphériques connectés hors tension, puis débranchez le système de la prise secteur. 3. Ouvrez le système. 4. Vérifiez que chaque carte d'extension est correctement insérée dans son connecteur. 5. Refermez le système. 6. Si le problème n'est pas résolu, éteignez le système et les périphériques qui y sont connectés, puis débranchez le système de la prise secteur. 7. Ouvrez le système. 8. Retirez toutes les cartes d'extension du système. 9. Refermez le système. 10. Exécutez le test de diagnostic approprié. Si les tests échouent, reportez-vous à la section Obtention d'aide. 11. Pour chaque carte d'extension retirée à l'étape 8, effectuez les opérations suivantes : a) Mettez le système et les périphériques connectés hors tension, puis débranchez le système de la prise secteur. b) Ouvrez le système. c) Réinstallez une des cartes d'extension. d) Refermez le système. e) Exécutez le test de diagnostic approprié. Si un problème est toujours signalé, reportez-vous à la section Obtention d'aide. Dépannage des processeurs PRÉCAUTION: La plupart des réparations ne peuvent être effectuées que par un technicien de maintenance agréé. N'effectuez que les opérations de dépannage et les petites réparations autorisées par la documentation de votre produit et suivez les instructions fournies en ligne ou par téléphone par l'équipe de maintenance et d'assistance technique. Tout dommage causé par une réparation non autorisée par Dell est exclu de votre garantie. Consultez et respectez les consignes de sécurité fournies avec votre produit. 1181. Exécutez le test de diagnostic approprié. 2. Mettez le système et les périphériques connectés hors tension, puis débranchez le système de la prise secteur. 3. Ouvrez le système. 4. Vérifiez que le processeur et le dissipateur de chaleur sont correctement installés. 5. Refermez le système. 6. Exécutez le test de diagnostic approprié. Si un problème est toujours signalé, reportez-vous à la section Obtention d'aide. 1191205 Utilisation des diagnostics du système Si vous rencontrez un problème avec le système, exécutez les diagnostics du système avant de contacter l'assistance technique de Dell. L'exécution des diagnostics du système permet de tester le matériel du système sans équipement supplémentaire ou risque de perte de données. Si vous ne pouvez pas résoudre vous-même le problème, le personnel de maintenance ou d'assistance peut utiliser les résultats des diagnostics pour vous aider à résoudre le problème. Dell Online Diagnostics Dell Online Diagnostics est une suite autonome de programmes de diagnostic ou de modules de tests qui vous permet d'exécuter des tests de diagnostic sur des systèmes Dell dans un environnement de production tout en optimisant le temps de disponibilité de vos systèmes. Online Diagnostics vous permet d'exécuter des tests de diagnostic sur les châssis et les composants de stockage tels que les disques durs, la mémoire physique et les cartes d'interface réseau. Vous pouvez utiliser l'interface utilisateur graphique (IUG) ou l'interface de ligne de commande (CLI) pour exécuter des tests de diagnostic sur le matériel découvert par Online Diagnostics sur votre système. Pour obtenir plus d'informations sur l'utilisation des diagnostics, reportez-vous au Dell Online PowerEdge Diagnostics User’s Guide (Guide d'utilisation de Dell PowerEdge Diagnostics) sous Software → Serviceability Tools (Outils de services logiciels) à l'adresse support.dell.com/manuals. Diagnostics du système intégré Dell REMARQUE: Également connu sous le nom de diagnostics ePSA (Enhanced Pre-boot System Assessment). Les diagnostics du système intégré offrent un ensemble d'options pour des périphériques ou des groupes de périphériques particuliers, vous permettant : • d'exécuter des tests automatiquement ou dans un mode interactif • de répéter des tests • d'afficher ou d'enregistrer les résultats des tests • d'exécutez des tests complets pour introduire des options de test supplémentaires afin d'offrir des informations supplémentaires sur le ou les périphériques déféctueux • d'afficher des messages d'état vous indiquant si les tests ont réussi • d'afficher les messages d'erreur indiquant les problèmes rencontrés au cours des tests Quand utiliser les diagnostics intégrés du système Si un composant ou un périphérique important dans le système ne fonctionne pas correctement, l'exécution des diagnostics intégrés du système peut indiquer un dysfonctionnement du composant. Exécution des diagnostics intégrés du système Le programme de diagnostics intégrés du système s'exécute à partir de l'écran Dell Lifecycle Controller. 121PRÉCAUTION: Utilisez les diagnostics intégrés du système pour tester uniquement votre système. L'utilisation de ce programme avec d'autres systèmes peut entraîner des résultats invalides ou des messages d'erreur. 1. Au démarrage du système, appuyez sur . 2. Utilisez les touches fléchées vers le haut et vers le bas pour sélectionner System Utilities (Utilitaires système) → Launch Dell Diagnostics (Lancer les diagnostics Dell). La fenêtre ePSA Pre-boot System Assessment (Évaluation du système au pré-amorçage ePSA) s'affiche, répertoriant tous les périphériques détectés dans le système. Le diagnostic démarre l'exécution des tests sur tous les périphériques détectés. Commandes du diagnostic du système Menu Description Configuration Affiche la configuration et les informations relatives à la condition de tous les périphériques détectés. Results (Résultats) Affiche les résultats de tous les tests exécutés. System Health (Intégrité du système) Propose un aperçu de la performance du système actuel. Event Log (Journal d'événements) Affiche un journal daté des résultats de tous les tests exécutés sur le système. Il est affiché si au moins une description d'un évènement est enregistrée. Pour obtenir plus d'informations sur les diagnostics intégrés du système, reportez-vous au Dell Enhanced Pre-boot System Assessment User Guide (Guide de l'utilisateur de l'évaluation améliorée du système de pré-amorçage Dell) à l'adresse support.dell.com/manuals. 1226 Cavaliers et connecteurs Paramètres des cavaliers de la carte système Pour obtenir des informations sur la réinitialisation du cavalier du mot de passe afin de désactiver un mot de passe, reportez-vous à la section Désactivation d'un mot de passe oublié. Tableau 5. Paramètres des cavaliers de la carte système Cavalier Réglage Description PWRD_EN (par défaut) La fonction de mot de passe est activée (broches 2–4). La fonction de mot de passe est désactivée (broches 4-6). L'accès local à la carte iDRAC sera déverrouillé lors du prochain cycle de mise sous tension CA. NVRAM_CLR (par défaut) Les paramètres de configuration sont conservés au démarrage du système (broches 3-5). Les paramètres de configuration sont effacés au prochain démarrage du système (broches 1-3). 123Connecteurs de la carte système Figure 59. Connecteurs et cavaliers de la carte système Élément Connecteur Description 1 INT_STORAGE Connecteur de la carte contrôleur de stockage 2 ID_BTN Bouton d'identification du système 3 CMA_JACK Connecteur d'identification du système 4 USB 2 Connecteur USB 5 USB 1 Connecteur USB 6 IO_RISER2 Connecteur de la carte de montage 2 7 NIC2 Connecteur réseau 8 NIC1 Connecteur réseau 9 VGA Connecteur vidéo 10 COM Connecteur série 11 IO_RISER1 Connecteur de la carte de montage 1 12 CPU2 Support du processeur 2 13 FAN6 Connecteur du ventilateur de refroidissement 14 FAN5 Connecteur du ventilateur de refroidissement 124Élément Connecteur Description 15 B1, B4, B2, B5, B3, B6 Supports de barrette de mémoire 16 FAN4 Connecteur du ventilateur de refroidissement 17 FAN3 Connecteur du ventilateur de refroidissement 18 PWR_CONN_1 Connecteur d'alimentation à 8 broches 19 FAN2 Connecteur du ventilateur de refroidissement 20 A1, A4, A2, A5, A3, A6 Supports de barrette de mémoire 21 BP_SIG Connecteur de signal du fond de panier 22 PWR_CONN_2 Connecteur d'alimentation à 24 broches 23 CPU1 Support du processeur 1 24 PDB_CONN Connecteur de la carte de distribution de l'alimentation 25 BATTERY Connecteur de la batterie 26 CTRL_PNL_MB Connecteur d'interface du panneau de commande 27 SATA_A-D Connecteur SATA A-D 28 SATA_E Connecteur SATA E 29 SAS_A Connecteur SAS A 30 (FP_USB) Connecteur USB du panneau avant 31 IDSDM Connecteur du module SD interne double 32 SAS_B Connecteur SAS B Désactivation d'un mot de passe oublié Les fonctionnalités logicielles de protection du système comprennent un mot de passe du système et un mot de passe de configuration. Le cavalier de mot de passe permet d'activer ou de désactiver ces mots de passe et d'effacer le(s) mot(s) de passe utilisé(s). PRÉCAUTION: Reportez-vous à la section «Protection contre les décharges électrostatiques» des consignes de sécurité livrées avec votre système. 1. Mettez le système et les périphériques qui y sont connectés hors tension, puis débranchez le système de la prise secteur. 2. Ouvrez le système. 3. Retirez la fiche du cavalier de mot de passe. 4. Refermez le système. Les mots de passe existants ne sont pas désactivés (effacés) tant que le système démarre avec les mots de passe supprimés. Toutefois, avant d'attribuer un nouveau mot de passe du système et/ou de configuration, vous devez installer la fiche du cavalier. REMARQUE: Si vous attribuez un nouveau mot de passe système et/ou de configuration alors que la fiche du cavalier est retirée, le système désactive les nouveaux mots de passe lors du prochain démarrage. 1255. Mettez le système et les périphériques qui y sont connectés hors tension, puis débranchez le système de la prise secteur. 6. Ouvrez le système. 7. Installez la fiche de cavalier sur le cavalier du mot de passe. 8. Refermez le système. 9. Attribuez un nouveau mot de passe système et/ou de configuration. 1267 Caractéristiques techniques Processeur Type de processeur Un ou deux processeurs Intel Xeon de la famille E5-2400 Bus d'extension Type de bus Carte PCI Express 2ème et 3ème génération Logements d'extension dotés de cartes de montage : Carte de montage 1 (Logement 1) Une liaison demi-hauteur, demi-longueur x4 (pour un processeur) ou une liaison demi-hauteur, demi-longueur x16 (pour deux processeurs) Carte de montage 2 (Logement 2) une liaison pleine hauteur, demi-longueur x16 Mémoire Architecture Barrettes DIMM DDR3 800 MT/s, 1 066 MT/s, 1 333 MT/s ou 1 600 MT/s avec registre, sans tampon ou à ECC à charge réduite Prise en charge ECC avancée ou opération de mémoire optimisée. Supports de barrette de mémoire Douze à 240 broches Capacités de la barrette de mémoire Barrettes RDIMM 2 Go (simple rangée), 4 Go (simple et double rangée), 8 Go (double rangée) et 16 Go (double rangée) Barrettes UDIMM 2 Go (simple rangée) et 4 Go (simple et double rangée) RAM minimale 2 Go avec un processeur 4 Go avec deux processeurs RAM maximale 96 Go avec un processeur 192 Go avec deux processeurs Lecteurs Disques durs Systèmes à quatre disques durs Jusqu'à quatre disques durs connectés par câble de 3,5 pouces 127Lecteurs Jusqu'à quatre disques durs SAS, SATA ou Nearline SAS de 3,5 pouces, remplaçables à chaud ou Jusqu'à quatre disques durs SAS, SATA, SAS SSD, SATA SSD ou Nearline SAS de 2,5 pouces, remplaçables à chaud REMARQUE: Les systèmes à quatre disques durs prennent en charge le logiciel RAID. Pour en savoir plus sur le logiciel RAID, reportez-vous à la documentation du PERC (Contrôleur RAID Dell PowerEdge) à l'adresse suivante : support.dell.com/ manuals. Systèmes à huit disques durs Jusqu'à huit disques durs SAS, SATA, SAS SSD, SATA SSD ou Nearline SAS remplaçables à chaud de 2,5 pouces dans les emplacements du disque dur 0 à 7. Lecteur optique Un lecteur SATA DVD-ROM ou DVD+/-RW ultramince. REMARQUE: Les périphériques DVD sont uniquement des périphériques de données. Connecteurs Arrière Carte réseau Deux 10/100/1000 Mbit/s Série Connecteur DTE à 9 broches, compatible 16550 USB Deux connecteurs à 4 broches, compatibles USB 2.0 Vidéo Connecteur VGA à 15 broches iDRAC7 Une carte Ethernet 1 GbE en option Carte vFlash externe Un logement de carte mémoire flash avec la carte iDRAC Enterprise REMARQUE: Le logement de la carte est disponible uniquement si la licence iDRAC7 Enterprise est installée sur votre système. Avant USB Deux connecteurs à 4 broches, compatibles USB 2.0 Vidéo Connecteur VGA à 15 broches Interne USB Un connecteur à 4 broches, compatible USB 2.0 Double module SD interne Deux logements pour carte mémoire flash, en option, avec le module interne SD (Secure Digital) 128Connecteurs REMARQUE: Un logement de carte est réservé à la redondance. Vidéo Type de vidéo Matrox G200 intégré avec iDRAC7 Mémoire vidéo 16 Mo partagés avec la mémoire d'application iDRAC Conditions environnementales REMARQUE: Pour en savoir plus sur les mesures d'exploitation liées à différentes configurations particulières, rendez-vous sur dell.com/environmental_datasheets. Température de stockage De -40 à 65 °C (–40 °à 149 °F) avec un gradient thermique maximal de 20 °C par heure. Température de fonctionnement standard Fonctionnement continu: 10 à 35 °C avec une humidité relative (HR) de 10 à 80 %, avec point de condensation maximum à 26 °C. Réduction maximale admissible de la température sèche à 1 °C/300 mètres au-dessus de 900 mètres (1 °F tous les 550 pieds). Fonctionnement dans la plage de température étendue REMARQUE: Lorsque le système fonctionne dans la plage de température étendue, ses performances peut s'en voir affectées. REMARQUE: En cas de fonctionnement dans la plage de température étendue, des avertissements de température ambiante peuvent être reportés sur l'écran LCD et dans le journal des événements système. ≤10 % des heures de fonctionnement annuelles De 5 °C à 40 °C entre 5 et 85 % d'humidité relative, avec un point de condensation de 26 °C. REMARQUE: Si le système se trouve hors de la plage de températures de fonctionnement standard (10 °C à 35 °C), il peut réduire sa température de fonctionnement à 5 °C ou l'augmenter jusqu'à 40 °C pendant un maximum de 10 % de ses heures de fonctionnement annuelles. Pour les températures comprises entre 35 °C et 40 °C, la réduction maximale autorisée de la température sèche est de 1 °C tous les 175 m au-dessus de 950 m (1 °F tous les 319 pieds). ≤1 % des heures de fonctionnement annuelles De -5 à 45 °C entre 5 et 90 % d'humidité relative, avec un point de condensation de 26 °C. 129Conditions environnementales REMARQUE: Si le système se trouve hors de la plage de températures de fonctionnement standard (10 à 35 °C), il peut réduire sa température de fonctionnement à -5 °C ou l'augmenter jusqu'à 45 °C pendant un maximum de 1 % de ses heures de fonctionnement annuelles. Pour les températures comprises entre 40 et 45 °C, la réduction maximale autorisée de la température sèche est de 1 °C par 125 m au-dessus de 950 m (1 °F tous les 228 pieds). Restrictions de la température étendue de fonctionnement • N'effectuez pas de démarrage à froid en dessous de 5 °C. • Autorisez la dégradation des performances du processeur. • Les blocs d'alimentation non redondants ne sont pas pris en charge. • Les cartes de périphériques non qualifiées par Dell et/ou les cartes de périphériques ne sont pas prises en charge. 1308 Messages système Messages LCD REMARQUE: Seulement applicable si votre système a un affichage d'écran LCD. Les messages affichés sur l'écran LCD sont des messages textes brefs qui renvoient à des événements enregistrés dans le journal des événements système (SEL). Pour plus d'informations sur le SEL et sur les paramètres de configuration de la gestion du système, reportez-vous à la documentation du logiciel de gestion des systèmes. REMARQUE: Si votre système ne démarre pas, maintenez le bouton de l'ID système enfoncé pendant au moins 5 secondes jusqu'à ce que le code d'erreur s'affiche sur l'écran LCD. Prenez le code en note, puis consultez la section Messages d'erreur du système. Affichage des messages sur l'écran LCD Si une erreur du système survient, l'écran LCD devient orange. Appuyez sur le bouton Sélectionner pour afficher une liste des messages d'erreur ou de conditions. Utilisez les boutons de gauche et de droite pour surligner un numéro d'erreur, puis appuyez sur le bouton Sélectionner pour afficher l'erreur. Suppression des messages affichés sur l'écran LCD Pour les pannes associées aux capteurs, telles que la température, la tension, les ventilateurs, etc. le message affiché sur l'écran LCD est automatiquement supprimé lorsque le capteur retourne à un état normal. Pour les autres types de pannes, vous devez supprimer le message affiché sur l'écran : • Clear the SEL (Effacer le journal d'événements système) : vous pouvez effectuer cette tâche à distance, mais vous perdrez alors la totalité de l'historique des événements système. • Power cycle (Cycle d'alimentation) : mettez le système hors tension et débranchez-le de la prise secteur. Attendez environ 10 secondes, puis rebranchez le câble d'alimentation et redémarrez le système. Messages d'erreur du système Le système affiche des messages d'erreur pour informer l'utilisateur qu'un incident s'est produit. Les messages qui s'affichent sur cet écran se rapportent aux événements consignés dans le journal d'événements du système (SEL).Pour plus d'informations sur ce journal et sur la configuration des paramètres de gestion du système, consultez la documentation du logiciel de gestion des systèmes. Certains messages sont également affichés sous une forme abrégée sur l'écran LCD du système, si le système comprend cette fonctionnalité. REMARQUE: Les messages d'erreur LCD suivants s'affichent sous format simple. Reportez-vous à la section Menu de configuration pour sélectionner le format dans lequel les messages sont affichés. 131REMARQUE: Si vous recevez du système un message qui n'est pas répertorié dans la liste ci-dessous, vérifiez la documentation de l'application que vous utilisiez au moment où le message est apparu. Vous pouvez aussi vous reporter à la documentation du système d'exploitation pour obtenir une explication du message et l'action conseillée. REMARQUE: Dans certains messages, un composant système particulier est identifié par nom (« »), numéro de composant (« ») or emplacement (« baie »). Code d'erreur Informations des messages AMP0302 Message The system board current is greater than the upper warning threshold. (Le courant de la carte système est supérieur au seuil d'avertissement maximal.) Détails Le courant de la carte système ne se trouve pas dans les limites optimales. Action 1. Vérifiez la règle d'alimentation du système. 2. Vérifiez les pannes liées à l'alimentation dans les journaux du système. 3. Vérifiez les modifications de configuration du système. 4. Si le problème persiste, reportez-vous à la section Obtention d'aide. AMP0303 Message The system board current is greater than the upper critical threshold. (Le courant de la carte système est supérieur au seuil critique maximal.) Message sur l'écran LCD System board current is outside of range. (Le courant de la carte système ne se trouve pas dans les limites.) Détails Le courant de la carte système ne se trouve pas dans les limites optimales. Action 1. Vérifiez la règle d'alimentation du système. 2. Vérifiez les pannes liées à l'alimentation dans les journaux du système. 3. Vérifiez les modifications de configuration du système. 4. Si le problème persiste, reportez-vous à la section Obtention d'aide. ASR0000 Message The watchdog timer expired. (Le registre d'horloge de la surveillance a expiré.) Détails Le système d'exploitation ou une application n'a pas réussi à communiquer au cours du délai imparti. Action Vérifiez le journal des événements du système d'exploitation, de l'application, du matériel et du système pour trouver des événements de l'exception. ASR0001 Message The watchdog timer reset the system. (Le registre d'horloge de la surveillance a réinitialisé le système.) Détails Le système d'exploitation ou une application n'a pas réussi à communiquer au cours du délai imparti. Le système a été réinitialisé. 132Code d'erreur Informations des messages Action Vérifiez le journal des événements du système d'exploitation, de l'application, du matériel et du système pour trouver des événements de l'exception. ASR0002 Message The watchdog timer powered off the system. (Le registre d'horloge de la surveillance a mis le système hors tension.) Détails Le système d'exploitation ou une application n'a pas réussi à communiquer au cours du délai imparti. Le système a été mis hors tension. Action Vérifiez le journal des événements du système d'exploitation, de l'application, du matériel et du système pour trouver des événements de l'exception. ASR0003 Message The watchdog timer power cycled the system. (Le registre d'horloge de la surveillance a coupé puis rétabli l'alimentation du système.) Détails Le système d'exploitation ou une application n'a pas réussi à communiquer au cours du délai imparti. L'alimentation du système a été coupée puis rétablie. Action Vérifiez le journal des événements du système d'exploitation, de l'application, du matériel et du système pour trouver des événements de l'exception. BAT0002 Message The system board battery has failed. (Défaillance de la pile de la carte système.) Message sur l'écran LCD The system board battery has failed. Check battery. (La pile de la carte système est défectueuse. Vérifiez la pile.) Détails La pile de la carte système est manquante ou défectueuse. Action Reportez-vous à la section Obtention d'aide. BAT0017 Message The battery has failed. (Défaillance de la batterie .) Message sur l'écran LCD The battery has failed. Check battery. (La batterie est défaillante. Vérifiez la batterie.) Détails La batterie est soit manquante, défectueuse ou incapable de charger suite à des problèmes thermiques. Action Vérifiez les ventilateurs du système. Si le problème persiste, reportez-vous à la section Obtention d'aide. CPU0000 Message CPU has an internal error (IERR). (L'UC est confrontée à une erreur interne (IERR).) Message sur l'écran LCD CPU has an internal error (IERR). (L'UC est confrontée à une erreur interne (IERR).) Détails Le journal des événements système et les journaux du système d'exploitation peuvent indiquer que l'exception est externe au processeur. 133Code d'erreur Informations des messages Action Examinez le journal des événements système et les journaux du système d'exploitation. Si le problème persiste, reportez-vous à la section Obtention d'aide. CPU0001 Message CPU has a thermal trip (over-temperature) event. (Événement de déclenchement thermique de l'UC (surchauffe).) Message sur l'écran LCD CPU has a thermal trip. Check CPU heat sink. (Déclenchement thermique de l'UC . Vérifiez le dissipateur de chaleur de l'UC.) Détails La température du processeur a augmenté au delà des limites opérationnelles. Action Cherchez une panne de ventilateur dans les journaux. Si aucune panne de ventilateur n'est détectée, vérifiez la température d'entrée (si elle est disponible) et réinstallez le dissipateur de chaleur du processeur. Si le problème persiste, reportez-vous à la section Obtention d'aide. CPU0005 Message CPU configuration is unsupported. (Configuration de l'UC non prise en charge.) Message sur l'écran LCD CPU configuration is unsupported. Check CPU or BIOS revision. (Configuration de l'UC non prise en charge. Vérifiez l'UC ou la révision du BIOS.) Détails Le système est incapable de démarrer ou risque de fonctionner dans un état dégradé. Action Examinez les caractéristiques techniques des types de processeurs pris en charge. CPU0010 Message CPU is throttled. (Les performances de l'UC sont réduites.) Détails Les performances de l'UC sont réduites suite à des conditions thermiques ou d'alimentation. Action Examinez les journaux système pour détecter des exceptions d'alimentation ou thermiques. CPU0023 Message CPU is absent. (L'UC est absente.) Message sur l'écran LCD CPU is absent. Check CPU. (L'UC est absente.Vérifiez l'UC.) Action Vérifiez l'installation du processeur. Réinsérez le processeur, si ce dernier est présent. CPU0204 Message CPU voltage is outside of range. (La tension de l'UC ne se trouve pas dans les limites.) Message sur l'écran LCD CPU voltage is outside of range. Re-seat CPU. (La tension de l'UC ne se trouve pas dans les limites.) 134Code d'erreur Informations des messages Détails Les tensions ne se trouvant pas dans les limites autorisées peuvent endommager les composants électroniques ou provoquer la mise hors tension du système. Action 1. Mettez le système hors tension puis supprimez l'alimentation d'entrée pendant une minute. 2. Vérifiez que le processeur est correctement inséré. 3. Réappliquez la puissance d'entrée et allumez le système. 4. Si le problème persiste, reportez-vous à la section Obtention d'aide. CPU0700 Message CPU initialization error detected. (Détection d'une erreur d'initialisation de l'UC .) Message sur l'écran LCD CPU initialization error detected. Power cycle system. (Détection d'une erreur d'initialisation de l'UC . Coupez puis rétablissez l'alimentation du système.) Détails Le BIOS du système n'a pas réussi à initialiser le processeur. Action 1. Mettez le système hors tension puis supprimez l'alimentation d'entrée pendant une minute. 2. Vérifiez que le processeur est correctement inséré. 3. Réappliquez la puissance d'entrée et allumez le système. 4. Si le problème persiste, reportez-vous à la section Obtention d'aide. CPU0701 Message CPU protocol error detected. (Détection d'une erreur de protocole de l'UC .) Message sur l'écran LCD CPU protocol error detected. Power cycle system. (Détection d'une erreur de protocole de l'UC . Coupez puis rétablissez l'alimentation du système.) Détails Le journal des événements système et les journaux du système d'exploitation peuvent indiquer que l'exception est externe au processeur. Action 1. Contrôlez les journaux du système et du système d'exploitation pour détecter des exceptions. Si aucune exception n'est détectée, continuez. 2. Mettez le système hors tension puis supprimez l'alimentation d'entrée pendant une minute. 3. Vérifiez que le processeur est correctement inséré. 4. Réappliquez la puissance d'entrée et allumez le système. 5. Si le problème persiste, reportez-vous à la section Obtention d'aide. CPU0702 Message CPU bus parity error detected. (Détection d'une erreur de parité du bus de l'UC.) 135Code d'erreur Informations des messages Message sur l'écran LCD CPU bus parity error detected. Power cycle system. (Détection d'une erreur de parité du bus de l'UC. Coupez puis rétablissez l'alimentation du système.) Détails Le journal des événements système et les journaux du système d'exploitation peuvent indiquer que l'exception est externe au processeur. Action 1. Contrôlez les journaux du système et du système d'exploitation pour détecter des exceptions. Si aucune exception n'est détectée, continuez. 2. Mettez le système hors tension puis supprimez l'alimentation d'entrée pendant une minute. 3. Vérifiez que le processeur est correctement inséré. 4. Réappliquez la puissance d'entrée et allumez le système. 5. Si le problème persiste, reportez-vous à la section Obtention d'aide. CPU0703 Message CPU bus initialization error detected. (Détection d'une erreur d'initialisation du bus de l'UC.) Message sur l'écran LCD CPU bus initialization error detected. Power cycle system. (Détection d'une erreur d'initialisation du bus de l'UC. Coupez puis rétablissez l'alimentation du système.) Détails Le journal des événements système et les journaux du système d'exploitation peuvent indiquer que l'exception est externe au processeur. Action 1. Contrôlez les journaux du système et du système d'exploitation pour détecter des exceptions. Si aucune exception n'est détectée, continuez. 2. Mettez le système hors tension puis supprimez l'alimentation d'entrée pendant une minute. 3. Vérifiez que le processeur est correctement inséré. 4. Réappliquez la puissance d'entrée et allumez le système. 5. Si le problème persiste, reportez-vous à la section Obtention d'aide. CPU0704 Message CPU machine check error detected. (Détection d'une erreur de vérification de l'ordinateur de l'UC .) Message sur l'écran LCD CPU machine check error detected. Power cycle system. (Détection d'une erreur de vérification de l'ordinateur de l'UC . Coupez puis rétablissez l'alimentation du système.) Détails Le journal des événements système et les journaux du système d'exploitation peuvent indiquer que l'exception est externe au processeur. Action 1. Contrôlez les journaux du système et du système d'exploitation pour détecter des exceptions. Si aucune exception n'est détectée, continuez. 2. Mettez le système hors tension puis supprimez l'alimentation d'entrée pendant une minute. 3. Vérifiez que le processeur est correctement inséré. 4. Réappliquez la puissance d'entrée et allumez le système. 136Code d'erreur Informations des messages 5. Si le problème persiste, reportez-vous à la section Obtention d'aide. VENTILATEUR0000 Message CPU temperature is less than the lower warning threshold. (La température de l'UC est inférieure au seuil d'avertissement minimal.) Détails La vitesse du ventilateur en fonction est hors d'atteinte. Action Retirez puis installez de nouveau le bloc d'alimentation. Si le problème persiste, reportez-vous à la section Obtention d'aide. VENTILATEUR0001 Message CPU temperature is less than the lower warning threshold. (La température de l'UC est inférieure au seuil d'avertissement minimal.) Message sur l'écran LCD Les rotations par minute du ventilateur sont hors d'atteinte. Vérifiez le ventilateur. Détails La vitesse du ventilateur en fonction est hors d'atteinte. Action Retirez puis installez de nouveau le ventilateur. Si le problème persiste, reportez-vous à la section Obtention d'aide. VENTILATEUR1201 Message La redondance du ventilateur est perdue. Message sur l'écran LCD La redondance du ventilateur est perdue. Vérifiez les ventilateurs. Détails Le ventilateur est tombé en panne. Action Enlevez et réinstallez les ventilateurs qui sont en panne ou installez des ventilateurs supplémentaires. HWC1001 Message The is absent. ( est manquant.) Message sur l'écran LCD The is absent. Check hardware. ( est manquant. Vérifiez le matériel.) Détails Le périphérique manquant peut être nécessaire pour un fonctionnement correct. Les fonctionnalités du système peuvent être dégradées. Action Réinstallez ou rebranchez le matériel. HWC2003 Message Le câble de stockage nom n'est pas branché, ou n'est pas branché correctement. Message sur l'écran LCD Câble de stockage ou panne d'interconnexion. Vérifiez la connexion. Détails Le câble peut être nécessaire pour un fonctionnement correct. Les fonctionnalités du système peuvent être dégradées. Action Vérifiez si le câble est présent, ensuite réinstallez-le ou reconnectez-le. 137Code d'erreur Informations des messages HWC2005 Message Le câble de la carte système n'est pas connecté ou n'est pas correctement connecté. Message sur l'écran LCD La connexion du câble de la carte système est en panne. Vérifiez la connexion. Détails Le câble peut être nécessaire pour un fonctionnement correct. Les fonctionnalités du système peuvent être dégradées. Action Vérifiez si le câble est présent, ensuite réinstallez-le ou reconnectez-le. MEM0000 Message Persistent correctable memory errors detected on a memory device at location(s) . (Détection d'erreurs de la mémoire permanente corrigibles sur un périphérique mémoire de l'emplacement .) Détails Il s'agit d'un premier indicateur d'une éventuelle erreur non corrigible future. Action Réinsérez les barrettes de mémoire. Si le problème persiste, reportez-vous à la section Obtention d'aide. MEM0001 Message Multi-bit memory errors detected on a memory device at location(s) . (Détection d'erreurs de mémoire multi-bits sur un périphérique mémoire de l'emplacement .) Message sur l'écran LCD Multi-bit memory error on . Re-seat memory. (Erreur de mémoire multi-bits sur .) Détails La barrette de mémoire a été victime d'une erreur non corrigible. Les performances du système peuvent être dégradées. Par conséquent, le système d'exploitation et/ou les applications peuvent tomber en panne. Action Réinsérez les barrettes de mémoire. Si le problème persiste, reportez-vous à la section Obtention d'aide. MEM0007 Message Unsupported memory configuration; check memory device at location . (Configuration de mémoire non prise en charge, vérifiez le périphérique mémoire à l'emplacement .) Message sur l'écran LCD Unsupported memory configuration. Check memory . (Configuration de mémoire non prise en charge. Vérifiez la mémoire de .) Détails La mémoire n'est peut-être pas insérée ou configurée correctement ou est défectueuse. La taille de la mémoire est réduite. Action Vérifiez la configuration de la mémoire. Réinsérez les barrettes de mémoire. Si le problème persiste, reportez-vous à la section Obtention d'aide. MEM0701 Message Correctable memory error rate exceeded for . (Seuil d'erreurs de mémoire corrigibles dépassé pour .) 138Code d'erreur Informations des messages Détails La mémoire peut ne pas être opérationnelle. Il s'agit d'un premier indicateur d'une éventuelle erreur non corrigible future. Action Réinsérez les barrettes de mémoire. Si le problème persiste, reportez-vous à la section Obtention d'aide . MEM0702 Message Correctable memory error rate exceeded for . (Seuil d'erreurs de mémoire corrigibles dépassé pour .) Message sur l'écran LCD Correctable memory error rate exceeded for . Re-seat memory. (Seuil d'erreurs de mémoire corrigibles dépassé pour . Réinsérez la mémoire.) Détails La mémoire peut ne pas être opérationnelle. Il s'agit d'un premier indicateur d'une éventuelle erreur non corrigible future. Action Réinsérez les barrettes de mémoire. Si le problème persiste, reportez-vous à la section Obtention d'aide. MEM1205 Message Memory mirror redundancy is lost. Check memory device at location(s) . (La redondance de la mise en miroir de la mémoire est perdue. Vérifiez les périphériques mémoire sur .) Message sur l'écran LCD Memory mirror lost on . Power cycle system. (La mise en miroir de la mémoire est perdue sur . Coupez puis rétablissez l'alimentation du système.) Détails La mémoire peut être mal insérée, mal configurée ou défectueuse. Action Vérifiez la configuration de la mémoire. Réinsérez les barrettes de mémoire. Si le problème persiste, reportez-vous à la section Obtention d'aide. MEM1208 Message Memory spare redundancy is lost. Check memory device at location . (La redondance de la mémoire de secours est perdue. Vérifiez les périphériques mémoire sur .) Message sur l'écran LCD Memory spare lost on . Power cycle system. (La mémoire de secours est perdue sur . Coupez puis rétablissez l'alimentation du système.) Détails La mémoire de secours n'est plus disponible. Action Réinsérez les barrettes de mémoire. Si le problème persiste, reportez-vous à la section Obtention d'aide. MEM8000 Message Correctable memory error logging disabled for a memory device at location . (Désactivation de la journalisation des erreurs de la mémoire permanente corrigeable pour un périphérique mémoire de l'emplacement .) 139Code d'erreur Informations des messages Message sur l'écran LCD SBE log disabled on . Re-seat memory. (Désactivation du journal des erreurs portant sur un seul bit sur . Réinsérez la mémoire.) Détails Les erreurs sont corrigées mais ne sont plus reportées dans le journal. Action Examinez les journaux du système pour détecter les exceptions de mémoire. Réinstallez la mémoire sur l'emplacement . PCI1302 Message A bus time-out was detected on a component at bus devicefunction . (Détection d'une expiration du délai du bus sur un composant du bus du périphérique de la fonction .) Détails Les performances du système peuvent être dégradées. Le périphérique ne répond pas à une transaction. Action Coupez puis rétablissez l'alimentation, mettez à jour les pilotes du composant. Si le périphérique est amovible, réinstallez le périphérique. PCI1304 Message An I/O channel check error was detected. (Détection d'une erreur de vérification du canal d'E/S.) Message sur l'écran LCD I/O channel check error detected. Power cycle system. (Détection d'une erreur de vérification du canal d'E/S. Coupez puis rétablissez l'alimentation système.) Action Coupez puis rétablissez l'alimentation, mettez à jour les pilotes du composant. Si le périphérique est amovible, réinstallez le périphérique. PCI1308 Message A PCI parity error was detected on a component at bus devicefunction . (Détection d'une erreur de parité PCI sur un composant du bus du périphérique de la fonction .) Message sur l'écran LCD PCI parity error on bus device function . Power cycle system. (Erreur de parité PCI sur le bus le périphérique la fonction .) Détails Les performances du système peuvent être dégradées, le périphérique PCI ou le système peut ne pas fonctionner. Action Coupez puis rétablissez l'alimentation, mettez à jour les pilotes du composant. Si le périphérique est amovible, réinstallez le périphérique. PCI1320 Message A bus fatal error was detected on a component at bus devicefunction . (Détection d'une erreur fatale de bus sur un composant du bus du périphérique de la fonction .) 140Code d'erreur Informations des messages Message sur l'écran LCD Bus fatal error on bus device function . Power cycle system. (Erreur fatale de bus sur le bus le périphérique la fonction .) Détails Les performances du système peuvent être dégradées ou le système peut ne pas fonctionner. Action Coupez puis rétablissez l'alimentation, mettez à jour les pilotes du composant. Si le périphérique est amovible, réinstallez le périphérique. PCI1342 Message A bus time-out was detected on a component at slot . (Détection d'une expiration de délai de bus sur un composant du logement .) Détails Les performances du système peuvent être dégradées ou le système peut ne pas fonctionner. Action Coupez puis rétablissez l'alimentation, mettez à jour les pilotes du composant. Si le périphérique est amovible, réinstallez le périphérique. PCI1348 Message A PCI parity error was detected on a component at slot . (Détection d'une erreur de parité PCI sur un composant du logement .) Message sur l'écran LCD PCI parity error on slot . Re-seat PCI card. (Erreur de parité PCI du logement . Réinsérez le PCI.) Détails Les performances du système peuvent être dégradées ou le système peut ne pas fonctionner. Action Coupez puis rétablissez l'alimentation, mettez à jour les pilotes du composant. Si le périphérique est amovible, réinstallez le périphérique. PCI1360 Message A bus fatal error was detected on a component at slot . (Détection d'une erreur fatale de bus sur un composant du logement .) Message sur l'écran LCD Bus fatal error on slot . Re-seat PCI card. (Erreur fatale de bus du logement . Réinsérez la carte PCI.) Détails Les performances du système peuvent être dégradées ou le système peut ne pas fonctionner. Action Coupez puis rétablissez l'alimentation, mettez à jour les pilotes du composant. Si le périphérique est amovible, réinstallez le périphérique. PDR0001 Message Fault detected on drive . (Panne détectée dans le lecteur .) Message sur l'écran LCD Fault detected on drive . Check drive. (Panne détectée dans le lecteur . Vérifiez le lecteur.) Détails Le contrôleur a détecté une panne du disque et a mis le disque hors ligne. 141Code d'erreur Informations des messages Action Retirez puis réinsérez le disque en panne. Si le problème persiste, reportez-vous à la section Obtention d'aide. PDR1016 Message Drive is removed from disk drive bay . (Retrait du lecteur de la baie de lecteur de disque dur .) Message sur l'écran LCD Drive removed from disk drive bay . Check drive. (Retrait du lecteur de la baie de lecteur de disque dur . Vérifiez le lecteur.) Détails Le contrôleur a détecté que le lecteur avait été retiré. Action Vérifiez l'installation du lecteur. Réinsérez le lecteur défectueux. Si le problème persiste, reportez-vous à Obtention d'aide. PST0128 Message No memory is detected. (Pas de mémoire détectée.) Message sur l'écran LCD No memory is detected. Inspect memory devices. (Pas de mémoire détectée. Contrôlez les périphériques mémoire.) Détails Le BIOS du système n'a pas été capable de détecter la mémoire dans le système. Action Réinsérez les barrettes de mémoire. Si le problème persiste, reportezvous à la section Obtention d'aide. PST0129 Message Memory is detected, but is not configurable. (Mémoire détectée, mais non configurable.) Message sur l'écran LCD Memory is detected, but is not configurable. Check memory devices. (Mémoire détectée, mais non configurable. Vérifiez les périphériques mémoire.) Détails Le BIOS du système a détecté la mémoire mais a été incapable de configurer la mémoire pour le fonctionnement du système. Action Comparez l'installation de la mémoire du système avec les configurations de mémoire du système prises en charge. PSU0001 Message Power supply failed. (Panne du bloc d'alimentation .) Message sur l'écran LCD PSU failed. Check PSU. (Panne du bloc d'alimentation . Vérifiez le bloc d'alimentation.) Action Retirez puis installez de nouveau le bloc d'alimentation. Si le problème persiste, reportez-vous à la section Obtention d'aide. PSU0002 Message A predictive failure detected on power supply . (Détection d'une panne prévisible sur le bloc d'alimentation .) Message sur l'écran LCD Predictive failure on PSU . Check PSU. (Panne prévisible sur le bloc d'alimentation . Vérifiez le bloc d'alimentation.) 142Code d'erreur Informations des messages Détails Les performances du système et la redondance de l'alimentation peuvent être dégradées ou perdues. Action Retirez puis installez de nouveau le bloc d'alimentation lors du prochain entretien. Si le problème persiste, reportez-vous à la section Obtention d'aide. PSU0003 Message The power input for power supply is lost. (Perte de l'entrée d'alimentation du bloc d'alimentation .) Message sur l'écran LCD Power input for PSU is lost. Check PSU cables. (Perte de l'entrée d'alimentation du bloc d'alimentation . Vérifiez le bloc d'alimentation.) Détails Le bloc d'alimentation est installé correctement mais une source d'alimentation n'est pas connectée ou n'est pas fonctionnelle. Action Vérifiez que la source d'alimentation est liée au bloc d'alimentation. Vérifiez que la source d'alimentation est conforme aux spécifications de fonctionnement du bloc d'alimentation. PSU0006 Message Power supply type mismatch. (Non correspondance du type de bloc d'alimentation .) Message sur l'écran LCD Power supply is incorrectly configured. Check PSU. (Le bloc d'alimentation n'est pas configuré correctement. Vérifiez le bloc d'alimentation.) Détails Les blocs d'alimentation doivent être de même type d'alimentation et de puissance. Action Installez des blocs d'alimentation correspondants et vérifiez la configuration à utiliser dans ce manuel. PSU0016 Message Power supply is absent. (Le bloc d'alimentation est manquant.) Message sur l'écran LCD PSU is absent. Check PSU. (Le bloc d'alimentation est manquant. Vérifiez le bloc d'alimentation.) Détails Le bloc d'alimentation a été retiré ou est défectueux. Action 1. Retirez puis installez de nouveau le bloc d'alimentation. 2. Vérifiez que les câbles et les composants du sous-système ne sont pas endommagés. 3. Si le problème persiste, reportez-vous à la section Obtention d'aide. PSU0031 Message Cannot communicate with power supply . (Impossible de communiquer avec le bloc d'alimentation .) 143Code d'erreur Informations des messages Message sur l'écran LCD Cannot communicate with PSU . Re-seat PSU. (Impossible de communiquer avec le bloc d'alimentation . Réinsérez le bloc d'alimentation.) Détails Le bloc d'alimentation peut fonctionner, toutefois le contrôle du bloc d'alimentation sera dégradé. Les performances du système peuvent être dégradées. Action Retirez puis installez de nouveau le bloc d'alimentation. Si le problème persiste, reportez-vous à la section Obtention d'aide. PSU0032 Message The temperature for power supply is in a warning range. (La température pour l'alimentation est dans une plage d'avertissement). Détails Les performances du système peuvent être dégradées. Action Vérifiez l'environnement de fonctionnement système, notamment le débit d'air et la température d'entrée. Vérifiez les journaux du système pour les pannes de température et de composant thermique. PSU0033 Message The temperature for power supply is outside of the allowable range. (La température pour l'alimentation est en dehors de la plage autorisée). Message sur l'écran LCD PSU temperature outside of range. Check PSU. (La température du PSU est en dehors de la plage. Vérifiez le PSU). Détails Les performances du système peuvent être dégradées. Action Vérifiez l'environnement de fonctionnement système, notamment le débit d'air et la température d'entrée. Recherchez une panne de température et de composant thermique dans les journaux du système. PSU0034 Message An under voltage fault detected on power supply . (Un défaut de sous-tension a été détecté sur l'alimentation ). Message sur l'écran LCD An under voltage fault detected on PSU . Check power source. (Un défaut de sous-tension a été détecté sur le PSU . Vérifiez l'alimentation.) Détails Cette panne peut être le résultat d'un problème électrique lié aux câbles ou aux composants d'un sous-système dans le système. Action 1. Retirez puis installez de nouveau le bloc d'alimentation. 2. Vérifiez que les câbles et les composants du sous-système ne sont pas endommagés. 3. Si le problème persiste, reportez-vous à Getting Help (Obtention d'aide). PSU0035 Message An over voltage fault detected on power supply . (Un défaut de surtension a été détecté sur l'alimentation ). 144Code d'erreur Informations des messages Message sur l'écran LCD Over voltage fault on PSU . Check PSU. (Un défaut de surtension sur le PSU . Vérifiez le PSU). Action Vérifiez l'alimentation. Installez de nouveau le bloc d'alimentation. Si le problème persiste, reportez-vous à la section Obtention d'aide. PSU0036 Message An over current fault detected on power supply . (Un défaut de surintensité a été détecté sur l'alimentation ). Message sur l'écran LCD An over current fault detected on PSU . Check PSU. (Un défaut de surintensité a été détecté sur le PSU . Vérifiez le PSU). Détails Cette panne peut être le résultat d'un problème électrique lié aux câbles ou aux composants d'un sous-système dans le système. Action 1. Retirez puis installez de nouveau le bloc d'alimentation. 2. Vérifiez que les câbles et les composants du sous-système ne sont pas endommagés. 3. Si le problème persiste, reportez-vous à la section Obtention d'aide. PSU0037 Message Fan failure detected on power supply . (Une panne de ventilateur a été détectée sur l'alimentation .) Message sur l'écran LCD Fan failure detected on PSU . Check PSU. (Une panne de ventilateur a été détectée sur le . Vérifiez le PSU). Action Vérifiez s'il y a un blocage de ventilateur. Si le problème persiste, reportezvous à la section Obtention d'aide. PSU0076 Message A power supply wattage mismatch is detected; power supply is rated for watts. (Un déséquilibre de la puissance d'alimentation a été détecté ; l'alimentation est évaluée pour watts.) Message sur l'écran LCD PSU wattage mismatch; PSU = watts (Déséquilibre de puissance du PSU ; PSU = watts) Détails Les blocs d'alimentation doivent être de même type d'alimentation et de puissance. Action Installez les alimentations appariées et révisez ce manuel pour une configuration correcte. PSU1201 Message Power supply redundancy is lost. (Perte de la redondance du bloc d'alimentation.) Détails Le bloc d'alimentation tentera de fonctionner dans un état dégradé. Les performances du système et la redondance de l'alimentation peuvent être dégradées ou perdues. Action Vérifiez l'alimentation. Installez de nouveau le bloc d'alimentation. Si le problème persiste, reportez-vous à la section Obtention d'aide. 145Code d'erreur Informations des messages PSU1204 Message The power supplies are not redundant. Insufficient resources to maintain normal operations. (Les blocs d'alimentation ne sont pas redondants. Il n'y a pas suffisamment de ressources pour conserver un fonctionnement normal.) Message sur l'écran LCD PSU redundancy degraded. Check PSU cables. (Dégradation de la redondance du bloc d'alimentation. Vérifiez les câbles du bloc d'alimentation.) Détails Le mode de fonctionnement de l'alimentation n'est pas redondant à cause d'une exception de bloc d'alimentation, d'un changement de bloc d'alimentation ou d'alimentation du système. Action Examinez le journal des événements pour détecter des pannes de bloc d'alimentation. Vérifiez la configuration du système et la consommation électrique. PWR1004 Message The system performance degraded because power capacity has changed. (Dégradation des performances du système à cause d'une modification des capacités d'alimentation.) Détails Le système peut s'éteindre ou fonctionner dans un état dégradé. Action Examinez le journal des événements pour détecter des pannes de blocs d'alimentation. Vérifiez la configuration du système et la consommation électrique puis mettez à niveau ou installez les blocs d'alimentation en conséquence. PWR1005 Message The system performance degraded because the user-defined power capacity has changed. (Dégradation des performances du système à cause de la modification des capacités d'alimentation définies par l'utilisateur.) Détails Les paramètres d'alimentation définis par l'utilisateur ont affecté le fonctionnement du système. Action Si cela n'est pas prévu, vérifiez les modifications de configuration du système et les politiques d'alimentation. PWR1006 Message The system halted because system power exceeds capacity. (Arrêt du système car la puissance du système dépasse la capacité.) Message sur l'écran LCD System power demand exceeds capacity. System halted. (La demande de puissance du système dépasse la capacité. Arrêt du système.) Détails Arrêt du système car la puissance du système dépasse la capacité. Action Vérifiez la configuration du système, mettez à niveau les blocs d'alimentation ou réduisez la consommation de la puissance du système. RFM1008 Message Failure detected on Removable Flash Media . (Détection d'une erreur sur le support flash amovible .) Message sur l'écran LCD Removable Flash Media failed. Check SD Card. (Panne du support flash amovible . Vérifiez la carte SD). 146Code d'erreur Informations des messages Détails Une erreur est signalée au cours d'une lecture ou écriture de la carte SD. Action Réinitialisez le support flash. Si le problème persiste, reportez-vous à la section Obtention d'aide. RFM1014 Message Removable Flash Media is write protected. (Le support flash amovible est protégé en écriture.) Message sur l'écran LCD Removable Flash Media is write protected. Check SD Card. (Le support flash amovible est protégé en écriture. Vérifiez la carte SD.) Détails La carte est protégée en écriture par un loquet sur la carte SD. Une carte protégée en écriture ne peut pas être utilisée. Action Si cela n'est pas prévu, retirez le support et désactivez la protection en écriture. RFM1201 Message Internal Dual SD Module redundancy lost. (Perte de la redondance du module SD double interne.) Message sur l'écran LCD Internal Dual SD Module redundancy is lost. Check SD Card. (Perte de la redondance du module SD double interne. Vérifiez la carte SD.) Détails Une ou les deux cartes SD ne fonctionnent pas correctement. Action Reportez-vous à la section Obtention d'aide. RFM2001 Message Internal Dual SD Module is absent. (Le module SD double interne est manquant.) Message sur l'écran LCD Internal Dual SD Module is absent. Check SD Card. (Le module SD double interne est manquant. Vérifiez la carte SD.) Détails Le module de la carte SD n'est pas détecté ou n'est pas installé. Action Si cela n'est pas prévu, réinstallez le module de la carte SD. RFM2002 Message Internal Dual SD Module is offline. (Le module SD double interne est hors ligne.) Détails Le module de la carte SD est installé mais peut être mal installé ou mal configuré. Action Réinstallez le module de la carte SD. RFM2004 Message Failure detected on Internal Dual SD Module . (Détection d'une panne sur le module SD double interne .) Message sur l'écran LCD Internal Dual SD Module is failed. Check SD Card. (Panne du module SD double interne . Vérifiez la carte SD.) Détails Le module de la carte SD est installé mais n'est pas correctement configuré ou ne réussit pas à s'initialiser. 147Code d'erreur Informations des messages Action Réinstallez le module de la carte SD et retirez puis réinstallez les cartes SD. RFM2006 Message Internal Dual SD Module is write protected. (Le module SD double interne est protégé en écriture.) Détails Le module est protégé en écriture. Les modifications ne peuvent être écrites sur le support. Action Si cela n'est pas prévu, retirez le support et désactivez la protection en écriture. SEC0031 Message The chassis is open while the power is on. (Le châssis est ouvert alors que le système est sous tension.) Message sur l'écran LCD Intrusion detected. Check chassis cover. (Intrusion détectée. Vérifiez le capot du châssis.) Détails Le châssis est ouvert. Les performances du système peuvent être dégradées et la sécurité compromise. Action Fermez le châssis. Vérifiez les journaux système. SEC0033 Message The chassis is open while the power is off. (Le châssis est ouvert alors que le système est hors tension.) Message sur l'écran LCD Intrusion detected. Check chassis cover. (Intrusion détectée. Vérifiez le capot du châssis.) Détails Le châssis a été ouvert alors que le système est hors tension. La sécurité du système peut avoir été compromise. Action Fermez le châssis et vérifiez l'inventaire du matériel. Vérifiez les journaux système. SEL0006 Message All event logging is disabled. (Désactivation de la journalisation de tous les événements.) Détails Ce message s'affiche lorsque la journalisation de tous les événements a été désactivée par l'utilisateur. Action Si cela n'est pas prévu, activez de nouveau la journalisation. SEL0008 Message Log is full. (Le journal est plein.) Détails Lorsque le journal est plein, les événements supplémentaires ne sont pas écrits dans le journal. Les événements plus anciens peuvent être écrasés et perdus. Ce message peut également s'afficher si l'utilisateur désactive la journalisation des événements. Action Sauvegardez et effacez le journal. SEL0012 Message Could not create or initialize the system event log. (Impossible de créer ou d'initialiser le journal des événements système.) 148Code d'erreur Informations des messages Détails Si le journal des événements système n'arrive pas à s'initialiser, l'état de la plateforme et les événements ne peuvent pas être enregistrés. Certains logiciels de gestion ne rapportent pas les exceptions de plateforme. Action Redémarrez le contrôleur de gestion ou le contrôleur iDRAC. Coupez puis rétablissez l'alimentation du système. Si le problème persiste, contactez le service d'assistance. SEL1204 Message An unknown system hardware failure detected. (Détection d'une panne d'un matériel du système inconnue.) Message sur l'écran LCD Unknown system hardware failure. (Panne d'un matériel du système inconnue.) Détails Si le journal des événements système n'arrive pas à s'initialiser, l'état de la plateforme et les événements ne peuvent pas être enregistrés. Certains logiciels de gestion ne rapportent pas les exceptions de plateforme. Action Configurez à nouveau le système sur la configuration minimale prise en charge. Si le problème persiste, contactez le service d'assistance. TMP0118 Message The system inlet temperature is less than the lower warning threshold. (La température d'entrée du système est inférieure au seuil d'avertissement minimal.) Message sur l'écran LCD System inlet temperature is outside of range. (La température d'entrée du système ne se trouve pas dans les limites.) Détails La température de l'air ambiant est trop froide. Action Vérifiez l'environnement du système d'exploitation. TMP0119 Message The system inlet temperature is less than the lower critical threshold. (La température d'entrée du système est inférieure au seuil critique minimal.) Message sur l'écran LCD System inlet temperature is outside of range. (La température d'entrée du système ne se trouve pas dans les limites.) Détails La température de l'air ambiant est trop froide. Action Vérifiez l'environnement du système d'exploitation. TMP0120 Message The system inlet temperature is greater than the upper warning threshold. (La température d'entrée du système est supérieure au seuil d'avertissement maximal.) Message sur l'écran LCD System inlet temperature is outside of range. (La température d'entrée du système ne se trouve pas dans les limites.) Détails La température de l'air ambiant est trop chaude ou un ou plusieurs ventilateurs sont en panne. 149Code d'erreur Informations des messages Action Vérifiez l'environnement du système d'exploitation et examinez le journal des événements pour détecter des pannes de ventilateur. TMP0121 Message The system inlet temperature is greater than the upper critical threshold. (La température d'entrée du système est supérieure au seuil critique maximal.) Message sur l'écran LCD System inlet temperature is outside of range. Check Fans. (La température d'entrée du système ne se trouve pas dans les limites. Vérifiez les ventilateurs.) Détails La température de l'air ambiant est trop chaude ou un ou plusieurs ventilateurs sont en panne. Action Vérifiez l'environnement du système d'exploitation et examinez le journal des événements pour détecter des pannes de ventilateur. VLT0204 Message The system board voltage is outside of the allowable range. (La tension de la carte système se trouve en dehors des limites autorisées.) Message sur l'écran LCD System board voltage is outside of range. (La tension de la carte système se trouve en dehors des limites.) Détails Le matériel du système a détecté une surtension ou une sous-tension. Si des exceptions de tension multiple surviennent de manière consécutive, le système peut s'arrêter en mode de prévention de défaillance. Action 1. Examinez les journaux des événements pour détecter des exceptions d'alimentation. 2. Configurez à nouveau le système sur la configuration minimale, configurez puis réinstallez les câbles du système. 3. Si le problème persiste, reportez-vous à la section Obtention d'aide. Messages d'avertissement Un message d'avertissement vous alerte des éventuels problèmes et invites auxquels vous devez répondre avant que le système ne poursuive sa tâche. Par exemple, avant de formater un disque dur, un message vous avertit que vous pouvez perdre toutes les données se trouvant sur le disque dur. Les messages d'avertissement interrompent généralement la tâche et demande que vous répondiez en saisissez o (oui) ou n (non). REMARQUE: Les messages d'avertissement sont générés par l'application ou par le système d'exploitation. Pour en savoir plus, consultez la documentation fournie avec le système d'exploitation ou l'application. Messages de diagnostic Les utilitaires de diagnostic du système peuvent créer des messages si vous exécutez des tests de diagnostic sur le système. Reportez-vous à Running The Embedded System Diagnostics (Exécution des diagnostics intégrés du système) pour obtenir plus d'informations sur les diagnostics du système. 150Messages d'alerte Le logiciel de gestion des systèmes génère des messages d'alertes pour votre système. Les messages d'alerte comprennent des messages d'informations, d'états, d'avertissements et de panne relatifs à l'état du lecteur, de la température, du ventilateur et de l'alimentation. Pour obtenir plus d'information, reportez-vous à la documentation du logiciel de gestion des systèmes. 1511529 Obtention d'aide Contacter Dell REMARQUE: Si vous ne disposez pas d'une connexion Internet, les informations de contact figurent sur la facture d'achat, le borderau de colisage, la facture le catalogue des produits Dell. Dell propose diverses options d'assistance et de maintenance en ligne et téléphonique. Ces options varient en fonction du pays et du produit et certains services peuvent ne pas être disponibles dans votre région Pour contacter le service commercial, technique ou client de Dell : 1. Visitez le site support.dell.com. 2. Sélectionnez la catégorie d'assistance. 3. Si vous ne résidez pas aux Etats-Unis, sélectionnez le code pays au bas de la page support.dell.com ou sélectionnez Tout pour afficher d'autres choix. 4. Sélectionnez le lien de service ou d'assistance approprié. 153 Systèmes Dell™ PowerEdge™ T610 Manuel du propriétaireRemarques, précautions et avertissements REMARQUE : Une REMARQUE indique des informations importantes qui peuvent vous aider à mieux utiliser votre ordinateur. PRÉCAUTION : Une PRÉCAUTION indique un risque de dommage matériel ou de perte de données en cas de non-respect des instructions. AVERTISSEMENT : Un AVERTISSEMENT vous avertit d'un risque d'endommagement du matériel, de blessure corporelle ou de mort. ____________________ Les informations contenues dans ce document sont sujettes à modification sans préavis. © 2008-2009 Dell Inc. Tous droits réservés. La reproduction de ces documents de quelque manière que ce soit sans l'autorisation écrite de Dell Inc. est strictement interdite. Marques mentionnées dans ce document : Dell, le logo DELL et PowerEdge sont des marques de Dell Inc. ; Microsoft, Windows, Windows Server et MS DOS sont des marques ou des marques déposées de Microsoft Corporation aux États-Unis et/ou dans d'autres pays. D'autres marques commerciales et noms de marque peuvent être utilisés dans ce document pour faire référence aux entités se réclamant de ces marques et de ces noms ou de leurs produits. Dell Inc. dénie tout intérêt propriétaire vis-à-vis des marques commerciales et des noms de marque autres que les siens. Septembre 2009 Rév. A03Table des matières 3 Table des matières 1 À propos du système . . . . . . . . . . . . . . . . 13 Fonctions du système accessibles au démarrage . . . 13 Voyants et fonctions du panneau avant . . . . . . . . . 14 Fonctionnalités de l'écran LCD . . . . . . . . . . . . . 17 Écran d'accueil . . . . . . . . . . . . . . . . . . . 19 Menu Configuration . . . . . . . . . . . . . . . . 19 Menu Affichage . . . . . . . . . . . . . . . . . . 20 Codes des voyants de disques durs RAID . . . . . . . 21 Voyants et fonctions du panneau arrière . . . . . . . . 23 Codes du voyant d'alimentation . . . . . . . . . . . . 25 Codes des voyants de NIC . . . . . . . . . . . . . . . . 27 Messages d'état affichés sur l'écran LCD . . . . . . . 27 Affichage des messages d'état . . . . . . . . . . 28 Effacement des messages d'état affichés sur l'écran LCD . . . . . . . . . . . . . . 28 Messages système . . . . . . . . . . . . . . . . . . . 45 Messages d'avertissement . . . . . . . . . . . . . . . 68 Messages de diagnostic . . . . . . . . . . . . . . . . 68 Messages d'alerte . . . . . . . . . . . . . . . . . . . . 68 Autres informations utiles . . . . . . . . . . . . . . . 684 Table des matières 2 Utilisation du programme de configuration du système et du gestionnaire de démarrage UEFI Boot Manager . . . . . . . 71 Choisir le mode d'amorçage du système . . . . . . . . 71 Accès au programme de configuration du système . . . . . . . . . . . . . . . . . . . . . . . . 72 Réponse aux messages d'erreur . . . . . . . . . . 72 Utilisation des touches de navigation du programme de configuration du système . . . . . 73 Options de configuration du système . . . . . . . . . . 74 Écran principal . . . . . . . . . . . . . . . . . . . 74 Écran des paramètres de la mémoire . . . . . . . 77 Écran des paramètres du processeur . . . . . . . 78 Écran des paramètres SATA (SATA Settings) . . . 79 Ecran des paramètres d'amorçage . . . . . . . . 79 Écran Integrated Devices (Périphériques intégrés) . . . . . . . . . . . . . . 81 Écran PCI IRQ Assignments (Affectations des IRQ PCI) . . . . . . . . . . . . . 82 Écran Serial Communication (Communications série) . . . . . . . . . . . . . . 83 Écran Embedded Server Management (Gestion de serveur intégrée) . . . . . . . . . . . 84 Écran de gestion de l'alimentation (Power Management) . . . . . . . . . . . . . . . 85 Écran System Security (Sécurité du système) . . . 86 Écran Exit (Quitter) . . . . . . . . . . . . . . . . . 88 Entering the UEFI Boot Manager (Accès au gestionnaire d'amorçage de l'UEFI) . . . . . . . . . . . 89 Utilisation des touches de navigation du gestionnaire d'amorçage UEFI . . . . . . . . . . . 89 Écran de gestionnaire d'amorçage de l'UEFI . . . 90Table des matières 5 UEFI Boot Settings Screen (Écran des paramètres d'amorçage de l'UEFI) . . . . . . . . 90 Écran des utilitaires du système . . . . . . . . . . 91 Mot de passe système et mot de passe de configuration . . . . . . . . . . . . . . . . . . . . . 91 Utilisation du mot de passe système . . . . . . . . 91 Utilisation du mot de passe de configuration . . . 94 Utilitaire de configuration iDRAC . . . . . . . . . . . . 96 Accès à l'utilitaire de configuration iDRAC . . . . 96 3 Installation des composants du système . . . . . . . . . . . . . . . . . . . . . . . 97 Outils recommandés . . . . . . . . . . . . . . . . . . 97 À l'intérieur du système . . . . . . . . . . . . . . . . . 98 Cadre avant . . . . . . . . . . . . . . . . . . . . . . . 99 Retrait du cadre avant . . . . . . . . . . . . . . . 99 Installation du cadre avant . . . . . . . . . . . . . 99 Ouverture et fermeture du système . . . . . . . . . . . 100 Ouverture du système . . . . . . . . . . . . . . . 100 Fermeture du système . . . . . . . . . . . . . . . 102 Disques durs . . . . . . . . . . . . . . . . . . . . . . . 102 Retrait d'un cache de disque dur . . . . . . . . . 103 Installation d'un cache de disque dur . . . . . . . 104 Retrait d'un disque dur remplaçable à chaud . . . 104 Installation d'un disque dur remplaçable à chaud . . . . . . . . . . . . . . . . . . . . . . . 105 Retrait d'un disque dur installé dans un support . . . . . . . . . . . . . . . . . . . . . 106 Installation d'un disque dur dans un support . . . 1066 Table des matières Blocs d'alimentation . . . . . . . . . . . . . . . . . . 108 Retrait d'un bloc d'alimentation . . . . . . . . . . 108 Installation d'un bloc d'alimentation . . . . . . . . 109 Retrait d'un cache de bloc d'alimentation . . . . . 110 Installation d'un cache de bloc d'alimentation . . . . 110 Dispositif antibasculement . . . . . . . . . . . . . . . 110 Retrait du dispositif antibasculement . . . . . . . 110 Installation du dispositif antibasculement . . . . . 111 Carénage de refroidissement . . . . . . . . . . . . . . 112 Retrait du carénage de refroidissement . . . . . . 112 Installation du carénage de refroidissement . . . 113 Ventilateurs . . . . . . . . . . . . . . . . . . . . . . . 114 Retrait d'un module de ventilation . . . . . . . . . 114 Installation d'un module de ventilation . . . . . . 115 Module SD interne . . . . . . . . . . . . . . . . . . . . 116 Installation du module SD interne . . . . . . . . . 116 Retrait du module SD interne . . . . . . . . . . . . 118 Carte flash SD interne . . . . . . . . . . . . . . . . . . 119 Installation d'une carte Flash SD interne . . . . . 119 Retrait d'une carte Flash SD interne . . . . . . . . 119 Module USB interne . . . . . . . . . . . . . . . . . . . 120 Retrait du module USB interne . . . . . . . . . . . 120 Installation du module USB interne . . . . . . . . 121 Clé de mémoire USB interne . . . . . . . . . . . . . . 123 Carte iDRAC6 (Integrated Dell Remote Access Controller 6) Enterprise (en option) . . . . . . . . . . . 124 Installation de la carte iDRAC6 Enterprise . . . . . 124 Retrait de la carte iDRAC6 Enterprise . . . . . . . 126Table des matières 7 Support VFlash (en option) . . . . . . . . . . . . . . . 127 Clé matérielle de carte NIC . . . . . . . . . . . . . . . 127 Lecteurs optiques et lecteurs de bande . . . . . . . . 129 Retrait d'un lecteur optique ou d'un lecteur de bande . . . . . . . . . . . . . . . . . . 129 Installation d'un lecteur optique ou d'un lecteur de bande . . . . . . . . . . . . . . . 130 Carte contrôleur de stockage intégrée . . . . . . . . . 134 Retrait d'un contrôleur de stockage intégré . . . . 134 Installation d'un contrôleur de stockage intégré . . . . . . . . . . . . . . . . 136 Retrait du support de stabilisation de carte d'extension . . . . . . . . . . . . . . . . 137 Installation du support de stabilisation de carte d'extension . . . . . . . . . . . . . . . . 137 Batterie RAID . . . . . . . . . . . . . . . . . . . . . . 138 Retrait d'une batterie RAID . . . . . . . . . . . . 138 Installation d'une batterie RAID . . . . . . . . . . 139 Cartes d'extension . . . . . . . . . . . . . . . . . . . 140 Consignes d'installation des cartes d'extension . . . . . . . . . . . . . . . 140 Installation d'une carte d'extension . . . . . . . . 141 Retrait d'une carte d'extension . . . . . . . . . . 144 Mémoire système . . . . . . . . . . . . . . . . . . . . 145 Consignes générales pour l'installation des modules de mémoire . . . . . . . . . . . . . 145 Recommandations spécifiques pour chaque mode . . . . . . . . . . . . . . . . . 146 Installation de modules de mémoire . . . . . . . . 150 Retrait de modules de mémoire . . . . . . . . . . 1538 Table des matières Processeurs . . . . . . . . . . . . . . . . . . . . . . . 154 Retrait d'un processeur . . . . . . . . . . . . . . 154 Installation d'un processeur . . . . . . . . . . . . 157 Batterie du système . . . . . . . . . . . . . . . . . . . 158 Remplacement de la batterie du système . . . . . 158 Assemblage du panneau de commande (procédure réservée à la maintenance) . . . . . . . . . . . . . . . 161 Retrait de l'assemblage du panneau de commande . . . . . . . . . . . . . . . . . . . 161 Installation de l'assemblage du panneau de commande . . . . . . . . . . . . . . . . . . . 164 Fond de panier SAS (procédure réservée à la maintenance) . . . . . . . . 165 Retrait du fond de panier SAS . . . . . . . . . . . 165 Installation du fond de panier SAS . . . . . . . . . 168 Carte de distribution de l'alimentation (procédure réservée à la maintenance) . . . . . . . . 169 Retrait de la carte de distribution de l'alimentation . . . . . . . . . . . . . . . . . . 169 Installation de la carte de distribution de l'alimentation . . . . . . . . . . . . . . . . . . 170 Carte système (maintenance uniquement) . . . . . . . 171 Retrait de la carte système . . . . . . . . . . . . . 172 Installation de la carte système . . . . . . . . . . 174 4 Dépannage du système . . . . . . . . . . . . . 177 La sécurité avant tout - pour vous et votre ordinateur . . . . . . . . . . . . . . . . . . . . 177 Dépannage des échecs de démarrage du système . . . 177Table des matières 9 Dépannage des connexions externes . . . . . . . . . 178 Dépannage du sous-système vidéo . . . . . . . . . . . 178 Dépannage d'un périphérique USB . . . . . . . . . . . 178 Dépannage d'un périphérique d'E/S série . . . . . . . 179 Dépannage d'une carte NIC . . . . . . . . . . . . . . . 180 Dépannage d'un système mouillé . . . . . . . . . . . . 181 Dépannage d'un système endommagé . . . . . . . . . 182 Dépannage de la pile du système . . . . . . . . . . . . 183 Dépannage des blocs d'alimentation . . . . . . . . . . 183 Dépannage des problèmes de refroidissement du système . . . . . . . . . . . . . 184 Dépannage d'un ventilateur . . . . . . . . . . . . . . . 185 Dépannage de la mémoire système . . . . . . . . . . . 186 Dépannage d'une carte SD interne . . . . . . . . . . . 188 Dépannage d'une clé de mémoire USB interne . . . . 189 Dépannage d'un lecteur optique . . . . . . . . . . . . 190 Dépannage d'une unité de sauvegarde sur bande . . . 191 Dépannage d'un disque dur . . . . . . . . . . . . . . . 192 Dépannage d'un contrôleur de stockage . . . . . . . . 193 Dépannage des cartes d'extension . . . . . . . . . . . 194 Dépannage du/des processeur(s) . . . . . . . . . . . . 19610 Table des matières 5 Exécution des diagnostics du système . . . . . . . . . . . . . . . . . . . . . . 199 Utilisation des diagnostics du Dell™ PowerEdge™ . . . . . . . . . . . . . . . . . 199 Fonctionnalités des diagnostics du système . . . . . . 199 Quand utiliser les diagnostics du système . . . . . . . 200 Exécution des diagnostics du système . . . . . . . . . 200 Options de test des diagnostics du système . . . . . . 201 Utilisation des options de test personnalisées . . . . . 201 Sélection de périphériques à tester . . . . . . . . 201 Sélection d'options de diagnostic . . . . . . . . . 202 Visualisation des informations et des résultats . . . . . . . . . . . . . . . . . . . 202 6 Cavaliers et connecteurs . . . . . . . . . . . 203 Cavaliers de la carte système . . . . . . . . . . . . . . 203 Connecteurs de la carte système . . . . . . . . . . . . 204 Connecteurs de la carte de fond de panier SAS . . . . 207 Connecteurs de la carte de distribution de puissance . . . . . . . . . . . . . . . . . . . . . . . 208 Désactivation d'un mot de passe oublié . . . . . . . . 209 7 Obtention d'aide . . . . . . . . . . . . . . . . . . 211 Contacter Dell . . . . . . . . . . . . . . . . . . . . . . 211Table des matières 11 Glossaire . . . . . . . . . . . . . . . . . . . . . . . . . . . 213 Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22312 Table des matièresÀ propos du système 13 À propos du système Fonctions du système accessibles au démarrage Les touches suivantes permettent d'accéder à certaines fonctions au démarrage du système. Touche Description Permet d'accéder au programme de configuration du système. Voir “Utilisation du programme de configuration du système et du gestionnaire de démarrage UEFI Boot Manager”. Permet d'accéder au programme des services système (System Services), qui ouvre le programme Unified Server Configurator à partir duquel vous pouvez accéder à des utilitaires tels que les diagnostics du système. Reportez-vous à la documentation sur Unified Server Configurator pour plus d'informations. Permet d'accéder au gestionnaire d'amorçage BIOS Boot Manager ou UEFI Boot Manager, suivant la configuration de démarrage de votre système. Consultez “Utilisation du programme de configuration du système et du gestionnaire de démarrage UEFI Boot Manager”. Lance l'environnement PXE (Preboot eXecution Environment, environnement d'exécution avant démarrage). Permet d'accéder à l'utilitaire de configuration iDRAC, qui donne accès au journal d'événements du système SEL (System Event Log), ainsi qu'à la configuration de l'accès distant au système. Reportezvous à la documentation sur iDRAC pour plus d'informations. Ouvre l'utilitaire de configuration SAS. Pour plus d'informations, consultez la documentation sur votre contrôleur SAS. Permet d'accéder à l'utilitaire de configuration PERC. Pour plus d'informations, reportez-vous à la documentation sur la carte PERC. Ouvre l'utilitaire de configuration des paramètre du NIC pour l'amorçage PXE. Pour plus d'informations, reportez-vous à la documentation sur la carte NIC intégrée.14 À propos du système Voyants et fonctions du panneau avant Figure 1-1. Voyants et fonctions du panneau avant Élément Voyant, bouton ou connecteur Icône Description 1 Cadre avant Permet de couvrir les disques durs de chargement frontal du système. 2 Connecteurs USB (2) Permettent de connecter des périphériques USB au système. Les ports sont compatibles USB 2.0. 1 3 2 3 4 6 8 9 10 7 5À propos du système 15 3 Bouton NMI Ce bouton est utilisé pour la résolution de certains incidents liés aux logiciels et aux pilotes de périphériques avec certains systèmes d'exploitation. Pour l'activer, utilisez la pointe d'un trombone. Appuyez sur ce bouton uniquement si un technicien de support qualifié vous demande de le faire, ou si cela est indiqué dans la documentation du système d'exploitation. 4 Voyant et bouton d'alimentation Le voyant d'alimentation s'allume lorsque le système est sous tension. Le bouton d'alimentation contrôle la sortie du bloc d'alimentation en CC qui alimente le système. REMARQUE : Le délai nécessaire à l'affichage d'une image sur le moniteur lors de la mise sous tension du système peut aller jusqu'à 25 secondes. Ce délai varie en fonction de la quantité de mémoire installée. REMARQUE : Si vous éteignez un ordinateur utilisant un système d'exploitation compatible avec ACPI en appuyant sur le bouton d'alimentation, le système peut effectuer un arrêt normal avant que l'alimentation ne soit coupée. REMARQUE : Pour procéder à l'arrêt forcé du système, appuyez en maintenant la pression sur le bouton d'alimentation pendant 5 secondes. Élément Voyant, bouton ou connecteur Icône Description16 À propos du système 5 Bouton d'identification du système Les boutons d'identification des panneaux avant et arrière peuvent servir à identifier un système spécifique au sein d'un rack. Si l'un de ces boutons est activé, l'écran LCD du panneau avant et le voyant d'état du système (bleu) situé sur le panneau arrière clignotent jusqu'à ce que l'utilisateur appuie de nouveau sur l'un des boutons. 6 Boutons de menu LCD Permettent de naviguer dans le menu LCD du panneau de commande. 7 Écran LCD Affiche l'ID du système, des informations d'état et des messages d'erreur. L'écran LCD s'allume en bleu lorsque le système fonctionne normalement. L'écran LCD s'allume en orange lorsque le système nécessite une intervention. Il affiche alors un code d'erreur suivi d'un texte descriptif. REMARQUE : Si le système est connecté à l'alimentation en CA et qu'une erreur a été détectée, l'écran LCD s'allume en orange, que le système soit allumé ou non. 8 Lecteur optique (en option) Un ou deux lecteurs en option parmi les suivants : SATA DVD-ROM ou DVD+RW. REMARQUE : Les périphériques DVD sont uniquement des périphériques de données. 9 Lecteur de bande (en option) Un lecteur mi-hauteur, en option (installé dans une baie de lecteur) ou pleine hauteur (installé dans deux baies de lecteur). 10 verrou du cadre avant Permet de fixer le cadre avant au système. Élément Voyant, bouton ou connecteur Icône DescriptionÀ propos du système 17 Fonctionnalités de l'écran LCD L'écran LCD du système affiche des informations et messages d'état indiquant si le système fonctionne correctement ou s'il requiert une intervention. Voir “Messages d'état affichés sur l'écran LCD” pour plus d'informations sur les codes d'état spécifiques. Le rétroéclairage de l'écran LCD est de couleur bleue durant le fonctionnement normal et adopte une couleur orange en cas d'erreur. Lorsque le système est en mode veille, l'écran LCD n'est pas rétroéclairé. Pour activer le rétroé- clairage, appuyez sur le bouton Sélectionner de l'écran LCD. Le rétroéclairage de l'écran LCD reste inactif si l'affichage de messages a été désactivé via l'utilitaire iDRAC, l'écran LCD ou d'autres outils.18 À propos du système Figure 1-2. Fonctionnalités de l'écran LCD Élément Boutons Description 1 Gauche Fait revenir le curseur à l'étape précédente par incréments d'une unité. 2 Sélectionner Permet de sélectionner l'élément de menu mis en surbrillance à l'aide du curseur. 3 Droit Déplace le curseur sur l'étape suivante par incréments d'une unité. Durant le défilement des messages : • Appuyez à une reprise pour augmenter la vitesse de défilement. • Appuyez une nouvelle fois pour arrêter. • Appuyez une nouvelle fois pour rétablir la vitesse de défilement par défaut. • Appuyez une nouvelle fois pour répéter le cycle. 4 Identification du système Permet d'activer ou désactiver le mode d'identificateur du système. Appuyez rapidement pour activer ou désactiver l'identificateur du système. En cas de blocage du système durant l'exécution du POST, appuyez en maintenant la pression sur le bouton de l'ID système pendant plus de 5 secondes pour accéder au mode BIOS. 1 2 3 4À propos du système 19 Écran d'accueil L'écran d'accueil affiche les informations système que l'utilisateur peut configurer. L'affichage de cet écran a lieu durant le fonctionnement normal du système, lorsqu'aucun message d'état ou d'erreur n'est présent. Lorsque le système est en veille, le rétro-éclairage LCD s'éteint après cinq minutes d'inactivité si aucun message d'erreur n'est affiché. Appuyez sur l'un des trois boutons de navigation (Sélectionner, Gauche ou Droite) pour afficher l'écran d'accueil. Pour accéder à l'écran d'accueil à partir d'un autre menu, sélectionnez la flèche vers le haut jusqu'à ce que l'icône Accueil s'affiche, puis sélectionnez l'icône Accueil. Sur l'écran d'accueil, appuyez sur le bouton Sélectionner pour accéder au menu principal. Reportez-vous aux tableaux ci-dessous pour plus d'informations sur les sous-menus Configuration (Setup) et Affichage (View). Menu Configuration REMARQUE : Lorsque vous sélectionnez une option dans le menu Configuration, vous êtes invité à confirmer votre choix avant de continuer. Option Description DRAC Sélectionnez DHCP ou Static IP pour configurer le mode réseau. Si l'option Static IP est sélectionnée, les champs disponibles sont IP, Sous-réseau (Sub) et Passerelle (Gtw). Sélectionnez Setup DNS to (Configuration DNS) pour activer la fonction DNS et afficher les adresses de domaine. Deux entrées DNS distinctes sont disponibles.20 À propos du système Menu Affichage Définition du mode d'erreur (Set Error) Sélectionnez l'option SEL pour afficher les messages d'erreur sur l'écran LCD dans un format conforme à la description IPMI dans le journal d'événements du système (SEL). Ceci peut s'avérer utile lorsque vous essayez d'établir une correspondance entre un message de l'écran LCD et une entrée du journal SEL. Sélectionnez Simple pour afficher les messages d'erreur de l'écran LCD sous forme de description conviviale simplifiée. Voir “Messages d'état affichés sur l'écran LCD” pour obtenir la liste des messages disponibles dans ce format. Définition de l'écran d'accueil (Set Home) Sélectionnez les informations par défaut affichées sur l'écran d'accueil LCD. Voir “Menu Affichage” pour sélectionner les options et entrées d'option affichées par défaut sur l'écran d'accueil. Option Description Adresse IP DRAC Affiche les adresses IPv4 ou IPv6 des périphériques iDRAC6. Les adresses comprennent les éléments suivants : DNS (Primaire et Secondaire), Passerelle, IP et Sous-réseau (les adresses IPv6 ne comportent pas de valeur de sous-réseau). MAC Affiche les adresses MAC pour DRAC, iSCSIn ou NETn. Nom Affiche le nom d'hôte (Host), le modèle (Model) ou une chaîne définie par l'utilisateur (User String) pour le système. Numéro Affiche le numéro d'inventaire (Asset tag) ou le code de service (Service tag) du système. Alimentation Affiche la puissance de sortie du système, exprimée en BTU/h ou en Watt. Le format d'affichage peut être configuré dans le sous-menu “Set home” du menu de configuration Setup (voir “Menu Configuration”). Option DescriptionÀ propos du système 21 Codes des voyants de disques durs RAID Figure 1-3. Voyants de disque dur Temperature (Température) Affiche la température du système en degrés Celsius ou Fahrenheit. Le format d'affichage peut être configuré dans le sous-menu “Set home” du menu de configuration Setup (voir “Menu Configuration”). 1 voyant d'activité du lecteur (vert) 2 voyant d'état du lecteur (vert et orange) Option Description 1 2 1 2 Support 3,5 pouces Support 2,5 pouces22 À propos du système Codes des voyants d'état des disques (RAID uniquement) Signification Voyant vert clignotant deux fois par seconde Identification de l'unité/Préparation au retrait Éteint Lecteur prêt à être inséré ou retiré REMARQUE : À la mise sous tension du système, le voyant d'état du lecteur ne s'allume qu'une fois tous les disques durs initialisés. Lorsqu'il est éteint, l'état des disques ne permet par leur insertion ni leur retrait. Vert clignotant, puis orange, puis extinction Panne anticipée du lecteur Orange clignotant quatre fois par seconde Échec du disque Vert clignotant lentement Disque en cours de reconstruction Allumé, vert Lecteur en ligneÀ propos du système 23 Voyants et fonctions du panneau arrière Figure 1-4. Voyants et fonctions du panneau arrière 6 7 5 4 3 1 8 9 2 10 1124 À propos du système Élément Voyant, bouton ou connecteur Icône Description 1 Logements de cartes d'extension PCIe (5) Permet de connecter jusqu'à cinq cartes d'extension PCI Express (2ème génération). Permet de prendre en charge deux cartes d'extension x8 de pleine hauteur/ pleine longueur (30,99 cm [12,2 pouces]), dans les logements 2 et 3. Permet de prendre en charge trois cartes d'extension x4 de pleine hauteur/ mi-longueur, dans les logements 1, 4 et 5. 2 Bouton d'identification du système Les boutons d'identification des panneaux avant et arrière peuvent servir à identifier un système spécifique au sein d'un rack. Si l'un de ces boutons est activé, l'écran LCD du panneau avant et le voyant d'état du système (bleu) situé sur le panneau arrière clignotent jusqu'à ce que l'utilisateur appuie de nouveau sur l'un des boutons. 3 Ports Ethernet (2) connecteurs NIC 10/100/1000 intégrés. 4 Connecteur vidéo Permet de connecter un écran VGA au système. 5 Connecteur série Permet de connecter un périphérique série au système. 6 Connecteurs USB (6) Permettent de connecter des périphériques USB au système. Les ports sont compatibles USB 2.0.À propos du système 25 Codes du voyant d'alimentation Un voyant placé sur le bouton d'alimentation indique si le système est alimenté et opérationnel. Les voyants des blocs d'alimentation indiquent si le système est alimenté ou si une panne d'alimentation s'est produite. • Éteint : l'alimentation C.A. n'est pas connectée. • Vert : en mode veille, un voyant vert indique qu'une source en CA valide est connectée au bloc d'alimentation et que ce dernier est opérationnel. Lorsque le système est mis sous tension, un voyant vert indique également que le bloc d'alimentation fournit une alimentation en CC au système. • Orange : indique qu'un incident lié au bloc d'alimentation s'est produit. • Voyant alternatif entre vert et orange : ce voyant indique qu'un bloc d'alimentation ajouté à chaud est incompatible avec l'autre(un bloc d'alimentation de 870 W d'une sortie à haute tension et un bloc d'alimentation de 570 W à consommation d'énergie intelligente sont installés sur le même système). Remplacez le bloc d'alimentation dont le voyant clignote par un bloc dont la capacité correspond à celle de l'autre bloc. 7 Port iDRAC6 Enterprise (en option) Port de gestion dédié pour la carte iDRAC6 Enterprise en option. 8 Logement pour support VFlash (optionnel) Permet de connecter une carte de mémoire SD pour la carte iDRAC6 Enterprise en option. 9 Bloc d'alimentation 2 (PS2) Bloc d'alimentation de 870 W ou 570 W. 10 Bloc d'alimentation 1 (PS1) Bloc d'alimentation de 870 W ou 570 W. 11 Emplacement pour câble de sécurité Permet de connecter un verrou de câble au système. Élément Voyant, bouton ou connecteur Icône Description26 À propos du système PRÉCAUTION : Lors du dépannage d'une erreur due à une non-conformité de l'alimentation électrique, remplacez uniquement l'alimentation signalée par un indicateur clignotant. L'inversion des blocs d'alimentation dans le but de les faire correspondre peut générer une erreur et entraîner l'arrêt imprévu du système. Pour passer d'une configuration haute performance (High Output) à une configuration économe (Energy Smart) ou ou vice versa, vous devez mettre le système hors tension. Figure 1-5. Voyant d'état du bloc d'alimentation 1 état du bloc d'alimentation 1À propos du système 27 Codes des voyants de NIC Figure 1-6. Codes des voyants de NIC Messages d'état affichés sur l'écran LCD Les messages de l'écran LCD consistent en une série de brefs messages textuels vous informant des événements consignés dans le journal d'événements du système (SEL). Pour plus d'informations sur ce journal et sur la configuration des paramètres de gestion du système, consultez la documentation du logiciel de gestion de systèmes. REMARQUE : Si le démarrage du système échoue, appuyez sur le bouton d'ID du système pendant au moins cinq secondes, jusqu'à ce qu'un code d'erreur s'affiche sur l'écran LCD. Notez ce code, puis reportez-vous à la section “Obtention d'aide”. 1 voyant de liaison 2 voyant d'activité Voyant Description Les voyants de liaison et d'activité sont éteints. La carte NIC n'est pas connectée au réseau. Le voyant de liaison est vert. La carte NIC est connectée à une liaison réseau valide à 1 000 Mo/s. Le voyant de liaison est orange La carte NIC est connectée à une liaison réseau valide à 10/100 Mo/s. Le voyant d'activité clignote en vert. Des données sont en cours d'envoi ou de réception sur le réseau. 1 228 À propos du système Affichage des messages d'état En cas d'erreur sur le système, l'écran LCD adopte une couleur orange. Appuyez sur le bouton Sélectionner pour afficher la liste des messages d'erreur ou d'état. Utilisez les touches fléchées vers la droite et vers la gauche pour mettre en surbrillance un numéro d'erreur et appuyez sur Sélectionner pour afficher l'erreur. Effacement des messages d'état affichés sur l'écran LCD Pour les pannes liées aux capteurs (de température, de tension, des ventilateurs, etc.), le message de l'écran LCD est supprimé automatiquement lorsque le capteur revient à la normale. Pour les autres types de pannes, une intervention de l'utilisateur est requise : • Clear the SEL (Effacer le journal d'événements du système) : cette tâche peut être effectuée à distance. Elle supprime l'historique des événements du système. • Power cycle (Mettre le système hors tension) : éteignez le système et débranchez-le de la prise secteur. Attendez environ 10 secondes, puis rebranchez le câble d'alimentation et redémarrez le système. REMARQUE : Les messages d'état LCD suivants s'affichent dans le format simple. Pour sélectionner le format auquel les messages sont affichés, Voir “Menu Configuration”. Tableau 1-1. Messages d'état affichés sur l'écran LCD Code Texte Cause Mesure corrective E1000 Erreur de tension à sécurité intégrée. Support de contact. Vérifiez si des événements critiques sont consignés dans le journal d'événements du système. Retirez l'alimentation en CA du système pendant 10 secondes ou effacez le journal d'événements du système. Si l'incident persiste, voir “Obtention d'aide”. E1114 La température ambiante a dépassé les limites autorisées. La température ambiante a atteint un niveau en dehors des limites autorisées. Voir “Dépannage des problèmes de refroidissement du système”.À propos du système 29 E1116 Mémoire désactivée, température au-dessus des limites autorisées. Mettez l'alimentation en CA hors tension. La température de la mémoire est en dehors des limites autorisées. La mémoire a été désactivée pour éviter tout endommagement des composants. Retirez l'alimentation en CA du système pendant 10 secondes ou effacez le journal d'événements du système. Voir “Dépannage des problèmes de refroidissement du système”. Si l'incident persiste, consultez le chapitre “Obtention d'aide”. E1210 Batterie de la carte mère défectueuse. Vérifiez la batterie. La batterie CMOS est manquante ou la tension est en dehors des limites autorisées. Voir “Dépannage de la pile du système”. E1211 Batterie du contrôleur RAID défectueuse. Vérifiez la batterie. La batterie RAID est manquante ou endommagée, ou bien elle ne peut pas se recharger suite à un incident lié aux conditions thermiques. Remboîtez la batterie RAID dans son connecteur. Voir “Installation d'une batterie RAID” et “Dépannage des problèmes de refroidissement du système”. E1216 Défaillance du régulateur 3,3 V. Réinstallez les cartes PCIe. Panne du régulateur de tension 3,3 V. Retirez les cartes d'extension PCIe et remboîtezles dans leur connecteur. Si l'incident persiste, voir “Dépannage des cartes d'extension”. E1229 Régulateur CPU # VCORE défectueux. Remettez en place le processeur. Panne du régulateur de tension VCORE du processeur indiqué. Remettez en place le(s) processeur(s). Voir “Dépannage du/des processeur(s)”. Si l'incident persiste, voir “Obtention d'aide”. Tableau 1-1. Messages d'état affichés sur l'écran LCD (suite) Code Texte Cause Mesure corrective30 À propos du système E122A Régulateur du processeur # VTT défectueux. Remettez en place le processeur. Panne du régulateur de tension VTT du processeur indiqué. Remettez en place le(s) processeur(s). Voir “Dépannage du/des processeur(s)”. Si l'incident persiste, voir “Obtention d'aide”. E122C Panne d'alimentation du processeur. Mettez l'alimentation en CA hors tension. Une panne d'alimentation a été détectée à la mise sous tension du ou des processeurs. Retirez l'alimentation en CA du système pendant 10 secondes ou effacez le journal d'événements du système. Si l'incident persiste, voir “Obtention d'aide”. E122D Panne du régulateur de mémoire #. Remettez en place les barrettes DIMM. Panne de l'un des régulateurs de mémoire. Remettez en place les modules de mémoire. Voir “Dépannage de la mémoire système”. E122E Panne du régulateur intégré. Support d'appel. Panne de l'un des régulateurs de tension intégrés. Retirez l'alimentation en CA du système pendant 10 secondes ou effacez le journal d'événements du système. Si l'incident persiste, voir “Obtention d'aide”. E1310 Ventilateur ## RPM au-dessus des limites. Vérifiez le ventilateur. Le RPM du ventilateur indiqué est en dehors des limites autorisées. Voir “Dépannage des problèmes de refroidissement du système”. Tableau 1-1. Messages d'état affichés sur l'écran LCD (suite) Code Texte Cause Mesure correctiveÀ propos du système 31 E1311 Module du ventilateur ## RPM au-dessus des limites. Vérifiez le ventilateur. Le RPM du ventilateur indiqué dans le module spécifié est en dehors des limites autorisées. Voir “Dépannage des problèmes de refroidissement du système”. E1313 Perte de la redondance des ventilateurs. Vérifiez les ventilateurs. Les ventilateurs du système ne sont plus redondants. Une autre panne de ventilateur pourrait provoquer une surchauffe du système. Vérifiez l'écran LCD pour obtenir d'autres messages de défilement. Voir “Dépannage d'un ventilateur”. E1410 System Fatal Error detected. Une erreur fatale du système a été détectée. Vérifiez l'écran LCD pour obtenir d'autres messages de défilement. Retirez l'alimentation en CA du système pendant 10 secondes ou effacez le journal d'événements du système. Si l'incident persiste, voir “Obtention d'aide”. E1414 La température du processeur # a dépassé les limites autorisées. Vérifiez le dissipateur de chaleur du processeur. La température du microprocesseur spécifié est en dehors des limites autorisées. Vérifiez que les dissipateurs de chaleur du processeur sont bien installés. Voir “Dépannage du/des processeur(s)” et “Dépannage des problèmes de refroidissement du système”. Tableau 1-1. Messages d'état affichés sur l'écran LCD (suite) Code Texte Cause Mesure corrective32 À propos du système E1418 Processeur # non détecté. Vérifiez que le processeur est bien inséré. Le processeur indiqué est manquant ou endommagé et la configuration du système n'est pas prise en charge. Vérifiez que le microprocesseur est bien installé. Voir “Dépannage du/des processeur(s)”. E141C Configuration du processeur non prise en charge. Vérifiez le niveau de révision de l'unité centrale ou du BIOS. La configuration des processeurs n'est pas prise en charge. Vérifiez que les processeurs sont de même type et conformes aux spécifications décrites dans le Guide de mise en route du système. E141F Erreur de protocole du processeur #. Mettez l'alimentation en CA hors tension. Le BIOS du système a renvoyé une erreur de protocole liée au processeur. Retirez l'alimentation en CA du système pendant 10 secondes ou effacez le journal d'événements du système. Si l'incident persiste, voir “Obtention d'aide”. E1420 Erreur de parité sur le bus du processeur. Mettez l'alimentation en CA hors tension. Le BIOS du système a renvoyé une erreur de parité liée au bus du processeur. Retirez l'alimentation en CA du système pendant 10 secondes ou effacez le journal d'événements du système. Si l'incident persiste, voir “Obtention d'aide”. Tableau 1-1. Messages d'état affichés sur l'écran LCD (suite) Code Texte Cause Mesure correctiveÀ propos du système 33 E1422 Erreur de vérification de la machine du processeur #. Mettez l'alimentation en CA hors tension. Le BIOS du système a renvoyé une erreur liée à la vérification du système. Retirez l'alimentation en CA du système pendant 10 secondes ou effacez le journal d'événements du système. Si l'incident persiste, voir “Obtention d'aide”. E1610 Bloc d'alimentation # (### W) manquant. Vérifiez le bloc d'alimentation. Le bloc d'alimentation indiqué a été retiré ou est inexistant sur le système. Voir “Dépannage des blocs d'alimentation”. E1614 Erreur dans le bloc d'alimentation # (### W). Vérifiez le bloc d'alimentation. Panne du bloc d'alimentation indiqué. Voir “Dépannage des blocs d'alimentation”. E1618 Panne prévisible du bloc d'alimentation # (### W). Vérifiez le PSU (bloc d'alimentation). Une panne du ventilateur du bloc d'alimentation, un cas de surchauffe ou une erreur de communication avec le bloc d'alimentation a généré un avertissement au sujet d'une panne prévisible du bloc d'alimentation. Voir “Dépannage des blocs d'alimentation”. Tableau 1-1. Messages d'état affichés sur l'écran LCD (suite) Code Texte Cause Mesure corrective34 À propos du système E161C Coupure de l'alimentation en CA du bloc d'alimentation # (### W). Vérifiez les câbles du bloc d'alimentation. Le bloc d'alimentation indiqué est connecté au système, mais l'alimentation en CA n'est plus assurée. Vérifiez la source de CA du bloc d'alimentation indiqué. Si l'incident persiste, voir “Dépannage des blocs d'alimentation”. E1620 Erreur d'alimentation en CA du bloc d'alimentation # (### W). Vérifiez les câbles du bloc d'alimentation. L'alimentation en CA du bloc d'alimentation indiqué est en dehors des limites autorisées. Vérifiez la source de CA du bloc d'alimentation indiqué. Si l'incident persiste, voir “Dépannage des blocs d'alimentation”. E1624 Perte de la redondance du bloc d'alimentation. Vérifiez les câbles du bloc d'alimentation. Le sous-système d'alimentation n'est plus redondant. Si le bloc d'alimentation restant tombe en panne, le système s'arrête. Voir “Dépannage des blocs d'alimentation”. E1626 Incompatibilité avec le bloc d'alimentation. PSU1 = ### W, PSU2 = ### W. Les blocs d'alimentation du système n'ont pas la même puissance. Vérifiez que les blocs d'alimentation installés sont de même puissance. Voir les spécifications techniques décrites dans le Guide de mise en route du système. Tableau 1-1. Messages d'état affichés sur l'écran LCD (suite) Code Texte Cause Mesure correctiveÀ propos du système 35 E1629 Alimentation requise > puissance du bloc d'alimentation. Vérifiez le bloc d'alimentation et la configuration. La configuration du système requiert plus de puissance que peuvent en produire les blocs d'alimentation, même avec basculement. Mettez le système hors tension, simplifiez la configuration matérielle ou installez des blocs d'alimentation plus puissants et redémarrez le système. E1710 Erreur de vérification du canal d'E/ S. Vérifiez & effacez le journal d'événements système. Le BIOS du système a renvoyé une erreur liée à la vérification des canaux d'E/S. Recherchez des informations complémentaires dans le journal d'événements du système, puis effacez celui-ci. Retirez l'alimentation en CA du système pendant 10 secondes ou effacez le journal d'événements du système. Si l'incident persiste, voir “Obtention d'aide”. E1711 Erreur de parité PCI sur le bus ## - Périphérique ## - Fonction ## Le BIOS du système a renvoyé une erreur de parité PCI liée à un composant résidant dans l'espace de configuration PCI du bus ##, périphérique ##, fonction ##. Retirez les cartes d'extension PCIe et remboîtezles dans leur connecteur. Si l'incident persiste, voir “Dépannage des cartes d'extension”. Erreur de parité PCI dans le logement #. Vérifiez & effacez le journal d'événements système. Le BIOS du système a renvoyé une erreur de parité PCI liée à un composant installé dans le logement indiqué. Retirez les cartes d'extension PCIe et remboîtezles dans leur connecteur. Si l'incident persiste, voir “Dépannage des cartes d'extension”. Tableau 1-1. Messages d'état affichés sur l'écran LCD (suite) Code Texte Cause Mesure corrective36 À propos du système E1712 Erreur système PCI sur le bus ## - Périph- érique ## - Fonction ## Le BIOS du système a renvoyé une erreur système PCI liée à un composant résidant dans l'espace de configuration PCI du bus ##, périphérique ##, fonction ##. Retirez les cartes d'extension PCIe et remboîtezles dans leur connecteur. Si l'incident persiste, voir “Dépannage des cartes d'extension”. E1714 Erreur inconnue. Vérifiez & effacez le journal d'événements système. Le BIOS du système a détecté une erreur système non identifiée. Recherchez des informations complémentaires dans le journal d'événements du système, puis effacez celui-ci. Retirez l'alimentation en CA du système pendant 10 secondes ou effacez le journal d'événements du système. Si l'incident persiste, voir “Obtention d'aide”. E1715 Erreur générique fatale d'E/S Vérifiez & effacez le journal d'événements système. Le BIOS du système a détecté une erreur fatale sur le système. Recherchez des informations complémentaires dans le journal d'événements du système, puis effacez celui-ci. Retirez l'alimentation en CA du système pendant 10 secondes ou effacez le journal d'événements du système. Si l'incident persiste, voir “Obtention d'aide”. Tableau 1-1. Messages d'état affichés sur l'écran LCD (suite) Code Texte Cause Mesure correctiveÀ propos du système 37 E1716 Erreur IERR liée au jeu de puces (chipset) Bus ## - Périph- érique ## - Fonction ##. Vérifiez & effacez le journal d'événements système. Le BIOS du système a signalé une erreur interne liée au jeu de puces (chipset) sur le bus ## - Périphérique ## - Fonction ##. Recherchez des informations complémentaires dans le journal d'événements du système, puis effacez celui-ci. Retirez l'alimentation en CA du système pendant 10 secondes ou effacez le journal d'événements du système. Si l'incident persiste, voir “Obtention d'aide”. E1717 Erreur interne liée au processeur #. Vérifiez & effacez le journal d'événements système. Le BIOS du système a détecté que le processeur indiqué présentait une erreur interne. Recherchez des informations complémentaires dans le journal d'événements du système, puis effacez celui-ci. Retirez l'alimentation en CA du système pendant 10 secondes ou effacez le journal d'événements du système. Si l'incident persiste, voir “Obtention d'aide”. E171F Erreur fatale PCIe sur le bus ## - Périphérique ## - Fonction ## Le BIOS du système a renvoyé une erreur fatale PCIe liée à un composant résidant dans l'espace de configuration PCI du bus ##, périphérique ##, fonction ##. Retirez les cartes d'extension PCIe et remboîtezles dans leur connecteur. Si l'incident persiste, voir “Dépannage des cartes d'extension”. Tableau 1-1. Messages d'état affichés sur l'écran LCD (suite) Code Texte Cause Mesure corrective38 À propos du système E1810 Disque dur ## défectueux. Vérifiez & effacez le journal d'événements système. Une défaillance du disque dur indiqué s'est produite. Voir “Dépannage d'un disque dur”. E1812 Disque dur ## retiré. Vérifiez le lecteur. Le disque dur indiqué a été retiré du système. Ce message s'affiche uniquement à titre d'information. E1A14 Défaillance du câble SAS A. Vérifiez la connexion. Le câble SAS A est manquant ou endommagé. Rebranchez le câble dans le connecteur. Si l'incident persiste, remplacez le câble. Si l'incident persiste, voir “Obtention d'aide”. E1A15 Défaillance du câble SAS B. Vérifiez la connexion. Le câble SAS B est manquant ou endommagé. Rebranchez le câble dans le connecteur. Si l'incident persiste, remplacez le câble. Si l'incident persiste, voir “Obtention d'aide”. E1A1D Câble USB du panneau de commande non détecté. Vérifiez le câble. Le câble USB du panneau de commande est manquant ou endommagé. Rebranchez le câble dans le connecteur. Si l'incident persiste, remplacez le câble. Si l'incident persiste, voir “Obtention d'aide”. Tableau 1-1. Messages d'état affichés sur l'écran LCD (suite) Code Texte Cause Mesure correctiveÀ propos du système 39 E2010 Mémoire non détectée. Inspectez les barrettes DIMM. Aucune mémoire n'a été détectée dans le système. Installez ou remettez en place les barrettes de mémoire. Voir les sections “Installation de modules de mémoire” ou “Dépannage de la mémoire système”. E2011 Échec de la configuration de mémoire. Vérifiez les barrettes DIMM. Mémoire détectée mais non configurable. Erreur détectée lors de la configuration de la mémoire. Voir “Dépannage de la mémoire système”. E2012 Mémoire configurée mais inutilisable. Vérifiez les barrettes DIMM. Mémoire configurée mais inutilisable. Voir “Dépannage de la mémoire système”. E2013 Le BIOS ne permet pas l'écriture miroir de la mémoire. Vérifiez les barrettes DIMM. Le BIOS du système n'est pas parvenu à copier son image flash dans la mémoire. Voir “Dépannage de la mémoire système”. E2014 Panne de la RAM du CMOS. Mettez l'alimentation en CA hors tension. Échec du CMOS. La RAM du CMOS ne fonctionne pas correctement. Retirez l'alimentation en CA du système pendant 10 secondes ou effacez le journal d'événements du système. Si l'incident persiste, voir “Obtention d'aide”. Tableau 1-1. Messages d'état affichés sur l'écran LCD (suite) Code Texte Cause Mesure corrective40 À propos du système E2015 Échec du contrôleur DMA. Mettez l'alimentation en CA hors tension. Échec du contrôleur DMA. Retirez l'alimentation en CA du système pendant 10 secondes ou effacez le journal d'événements du système. Si l'incident persiste, voir “Obtention d'aide”. E2016 Échec du contrôleur d'interruptions. Mettez l'alimentation en CA hors tension. Échec du contrôleur d'interruptions. Retirez l'alimentation en CA du système pendant 10 secondes ou effacez le journal d'événements du système. Si l'incident persiste, voir “Obtention d'aide”. E2017 Échec de rafraîchissement du temporisateur. Mettez l'alimentation en CA hors tension. Échec de rafraîchissement du temporisateur. Retirez l'alimentation en CA du système pendant 10 secondes ou effacez le journal d'événements du système. Si l'incident persiste, voir “Obtention d'aide”. E2018 Échec de l' horloge programmable. Mettez l'alimentation en CA hors tension. Échec du temporisateur d'intervalle programmable. Retirez l'alimentation en CA du système pendant 10 secondes ou effacez le journal d'événements du système. Si l'incident persiste, voir “Obtention d'aide”. Tableau 1-1. Messages d'état affichés sur l'écran LCD (suite) Code Texte Cause Mesure correctiveÀ propos du système 41 E2019 Erreur de parité. Mettez l'alimentation en CA hors tension. Erreur de parité. Retirez l'alimentation en CA du système pendant 10 secondes ou effacez le journal d'événements du système. Si l'incident persiste, voir “Obtention d'aide”. E201A Échec de la puce Super E/S. Mettez l'alimentation en CA hors tension. Échec de la puce Super E/S. Retirez l'alimentation en CA du système pendant 10 secondes ou effacez le journal d'événements du système. Si l'incident persiste, voir “Obtention d'aide”. E201B Contrôleur du clavier défectueux. Mettez l'alimentation en CA hors tension. Échec du contrôleur de clavier. Retirez l'alimentation en CA du système pendant 10 secondes et redémarrez ce dernier. Si l'incident persiste, voir “Obtention d'aide”. E201C Échec d'initialisation SMI. Mettez l'alimentation en CA hors tension. Échec d'initialisation SMI (System Management Interrupt). Retirez l'alimentation en CA du système pendant 10 secondes ou effacez le journal d'événements du système. Si l'incident persiste, voir “Obtention d'aide”. E201D Échec du test d'arrêt. Mettez l'alimentation en CA hors tension. Échec du test d'arrêt du BIOS. Retirez l'alimentation en CA du système pendant 10 secondes ou effacez le journal d'événements du système. Si l'incident persiste, voir “Obtention d'aide”. Tableau 1-1. Messages d'état affichés sur l'écran LCD (suite) Code Texte Cause Mesure corrective42 À propos du système E201E Échec du test mémoire pendant l'autotest de démarrage. Vérifiez les barrettes DIMM. Échec du test mémoire pendant l'auto-test de démarrage du BIOS. Voir “Dépannage de la mémoire système”. Si l'incident persiste, voir “Obtention d'aide”. E2020 Échec de configuration du processeur. Vérifiez le message affiché sur l'écran. Échec de configuration du processeur. Vérifiez si l'écran affiche des messages d'erreur spécifiques. Voir “Dépannage du/des processeur(s)”. E2021 Configuration de la mémoire incorrecte. Consultez le guide d'utilisation. Configuration de la mémoire incorrecte. Vérifiez si l'écran affiche des messages d'erreur spécifiques. Voir “Dépannage de la mémoire système”. E2022 Echec général pendant l'auto-test de démarrage. Vérifiez le message affiché sur l'écran. Échec général après le test vidéo. Vérifiez si l'écran affiche des messages d'erreur spécifiques. E2023 Le BIOS ne permet pas l'écriture miroir de la mémoire. Vérifiez les barrettes DIMM. Le BIOS système n'est pas parvenu à activer la mise en miroir de la mémoire en raison d'une défaillance d'un module de mémoire d'une configuration incorrecte. Voir “Dépannage de la mémoire système”. Tableau 1-1. Messages d'état affichés sur l'écran LCD (suite) Code Texte Cause Mesure correctiveÀ propos du système 43 E2110 Erreur multibits détectée sur la barrette DIMM ##. Remettez en place la barrette DIMM. Une erreur multi-bits (MBE) liée à la barrette de mémoire située dans l'emplacement “##” s'est produite. Voir “Dépannage de la mémoire système”. E2111 Le journal des erreurs portant sur un seul bit (SBE) est désactivé sur la barrette DIMM ##. Remettez en place la barrette DIMM. Le BIOS du système a désactivé la consignation des erreurs de mémoire portant sur un seul bit (SBE) jusqu'au prochain redé- marrage du système. “ ## ” représente le module de mémoire indiqué par le BIOS. Retirez l'alimentation en CA du système pendant 10 secondes ou effacez le journal d'événements du système. Si l'incident persiste, voir “Dépannage de la mémoire système”. E2113 Mise en miroir de la mémoire désactivée sur les barrettes DIMM ## & ##. Mettez l'alimentation en CA hors tension. Le BIOS du système a désactivé la mise en miroir de la mémoire car il a détecté qu'une moitié du miroir contenait un nombre d'erreurs trop important. “## & ##” représente la paire de modules de mémoire indiquée par le BIOS. Retirez l'alimentation en CA du système pendant 10 secondes ou effacez le journal d'événements du système. Si l'incident persiste, voir “Dépannage de la mémoire système”. I1910 Intrusion détectée. Vérifiez le capot du châssis. Le capot du système a été retiré. Ce message s'affiche uniquement à titre d'information. Tableau 1-1. Messages d'état affichés sur l'écran LCD (suite) Code Texte Cause Mesure corrective44 À propos du système I1911 Le journal de l'écran LCD est plein. Reportez-vous au journal d'événements du système pour vérifier toutes les erreurs. Les messages à afficher dépassent la capacité de l'écran LCD. L'écran LCD ne peut afficher que dix messages d'erreur à la suite. Le onzième message permet à l'utilisateur de vérifier le journal d'événements du système pour plus de détails sur ces derniers. Vérifiez le journal d'événements du système pour plus de détails. Retirez l'alimentation en CA du système pendant 10 secondes ou effacez le journal d'événements du système. I1912 Le journal d'événements du système est plein. Vérifiez & effacez le journal d'événements système. Le journal d'événements du système est plein et n'est plus en mesure d'enregistrer d'autres événements. Vérifiez le journal d'événements du système pour plus de détails, puis effacez-le. W1228 Capacité de la batterie du contrôleur RAID < 24h. Ce message avertit qu'il reste moins de 24 heures de charge à la batterie RAID. Chargez complètement la batterie RAID pendant plus de 24 heures. Si l'incident persiste, remplacez la pile RAID. Voir “Installation d'une batterie RAID”. W1627 Alimentation requise > puissance du bloc d'alimentation. Vérifiez le bloc d'alimentation et la configuration. La configuration du système requiert plus de puissance que peut en produire le bloc d'alimentation. Mettez le système hors tension, simplifiez la configuration matérielle ou installez des blocs d'alimentation plus puissants et redémarrez le système. Tableau 1-1. Messages d'état affichés sur l'écran LCD (suite) Code Texte Cause Mesure correctiveÀ propos du système 45 Messages système Le système affiche des messages d'erreur pour informer l'utilisateur qu'un incident s'est produit. REMARQUE : Si vous recevez un message du système qui n'est pas répertorié dans le tableau, vérifiez la documentation de l'application que vous utilisiez au moment où le message est apparu. Vous pouvez aussi vous référer à la documentation du système d'exploitation pour obtenir une explication du message et l'action conseillée. W1628 Dégradation des performances. Vérifiez la configuration du bloc d'alimentation et du système. La configuration du système requiert plus de puissance que peut en produire le bloc d'alimentation, mais peut démarrer en cas de basculement. Mettez le système hors tension, simplifiez la configuration matérielle ou installez des blocs d'alimentation plus puissants et redémarrez le système. REMARQUE : Pour obtenir le nom complet d'une abréviation ou connaître la signification d'un sigle utilisé dans cette Table, reportez-vous à la section “Glossaire”. Tableau 1-1. Messages d'état affichés sur l'écran LCD (suite) Code Texte Cause Mesure corrective46 À propos du système Tableau 1-2. Messages système Message Cause Mesure corrective Mode ECC avancé 128 bits désactivé. Pour permettre l'activation du mode ECC avancé 128 bits, les barrettes DIMM doivent être installées par paires. Les paires doivent correspondre en termes de taille, de vitesse et de technologie. L'option ECC avancée a été activée dans le BIOS, mais n'est plus valable en raison d'une configuration de mémoire non prise en charge pouvant être due à une défaillance ou au retrait d'un module de mémoire. Le paramètre de configuration ECC avancée a été désactivé. Recherchez les autres messages concernant la défaillance d'un module de mémoire. Reconfigurez les modules de mémoire pour les besoins du mode ECC avancé. Voir “Mémoire système”. Alerte ! Mode mémoire ECC avancé désactivé. La configuration de la mémoire ne prend pas en charge le mode mémoire ECC avancé. Le mode mémoire ECC avancé a été activé dans le programme de configuration du système, mais la configuration actuelle ne prend pas en charge ce mode. Un module de mémoire est peut-être défaillant. Assurez-vous que les modules de mémoire sont installés dans une configuration qui prend en charge le mode mémoire ECC avancé. Consultez les autres messages du système afin d'obtenir plus d'informations quant aux causes éventuelles. Pour plus d'informations sur la configuration de la mémoire, voir “Consignes générales pour l'installation des modules de mémoire”. Si le problème persiste, consultez la rubrique “Dépannage de la mémoire système”.À propos du système 47 Alerte ! Aucune réponse de la carte iDRAC6. Redémarrage en cours. La carte iDRAC6 ne répond à aucune communication du BIOS, soit en raison d'un fonctionnement défaillant, soit parce que l'initialisation n'est pas arrivée à son terme. Le système va redémarrer. Patientez le temps que le système redémarre. Alerte ! Aucune réponse de la carte iDRAC6. La puissance nécessaire excède peut-être la capacité du bloc d'alimentation. Alerte ! Si vous poursuivez l'amorçage du système, vous acceptez le risque que celui-ci soit mis hors tension sans préavis. Le module iDRAC6 s'est bloqué. Le module iDRAC6 a été réinitialisé à distance alors que le système était en cours de démarrage. Le délai nécessaire à l'initialisation de la configuration iDRAC6 à la suite d'une reprise de l'alimentation C.A. est plus long qu'en temps normal. Retirez l'alimentation en CA du système pendant 10 secondes ou effacez le journal d'événements du système. Tableau 1-2. Messages système (suite) Message Cause Mesure corrective48 À propos du système Alerte ! Node Interleaving disabled! Memory configuration does not support Node Interleaving. La configuration de la mémoire ne prend pas en charge l'entrelacement des nœuds, ou bien celui-ci n'est plus pris en charge en raison d'un changement intervenu dans la configuration (défaillance d'un module de mémoire, par exemple). Le système fonctionne, mais sans imbrication des nœuds. Les barrettes de mémoire doivent être installées dans une configuration prenant en charge l'entrelacement des nœuds. Consultez les autres messages du système afin d'obtenir plus d'informations quant aux causes éventuelles. Pour plus d'informations sur la configuration de la mémoire, voir “Consignes générales pour l'installation des modules de mémoire”. Si le problème persiste, consultez la rubrique “Dépannage de la mémoire système”. Alerte ! La puissance nécessaire est supérieure à la puissance du bloc d'alimentation. Vérifiez la configuration du bloc d'alimentation et du système. Alerte ! Si vous poursuivez l'amorçage du système, vous acceptez le risque que celui-ci soit mis hors tension sans préavis. Il se peut que la configuration système des processeurs, des modules de mémoire et des cartes d'extension ne soit pas prise en charge par les blocs d'alimentation. Si la mise à niveau d'un composant du système vient d'être effectuée, rétablissez la configuration antérieure. Si l'amorçage du système s'effectue sans émettre cet avertissement, cela indique que les composants ayant été remplacés ne sont pas pris en charge par ce bloc d'alimentation. Si des blocs d'alimentation à consommation intelligente (Energy Smart) sont installés, remplacez-les par des blocs d'alimentation haute performance (High Output) afin de pouvoir utiliser les composants. Voir “Blocs d'alimentation”. Tableau 1-2. Messages système (suite) Message Cause Mesure correctiveÀ propos du système 49 Alerte ! Redundant memory disabled! Memory configuration does not support redundant memory. La mise en miroir de la mémoire a été activée dans le programme de configuration du système, mais la configuration actuelle ne prend pas en charge la redondance de la mémoire. Un module de mémoire est peut-être défaillant. Recherchez la présence éventuelle de défaillances affectant les modules de mémoire. Voir “Dépannage de la mémoire système”. Réinitialisez les paramètres de la mémoire, le cas échéant. Voir “Utilisation du programme de configuration du système et du gestionnaire de démarrage UEFI Boot Manager”. Alerte ! Erreur fatale du système lors de l'amorçage précé- dent. Une erreur a provoqué le redémarrage du système. Consultez les autres messages du système afin d'obtenir plus d'informations quant aux causes éventuelles. Mode BIOS constructeur détecté. Le mode constructeur (MANUFACTURING MODE) va être désactivé avant le prochain amorçage. Redé- marrage du système requis pour permettre le fonctionnement normal. Le système est en mode Constructeur. Redémarrez le système pour désactiver le mode Constructeur. La tentative de mise à jour du BIOS a échoué. La tentative de mise à jour à distance du BIOS a échoué. Faites une nouvelle tentative de mise à jour du BIOS. Si l'incident persiste, voir “Obtention d'aide”. Tableau 1-2. Messages système (suite) Message Cause Mesure corrective50 À propos du système Attention ! Le cavalier NVRAM_CLR est installé sur la carte système. Le cavalier NVRAM_CLR est installé dans le paramètre d'initialisation. Le CMOS a été initialisé. Placez le cavalier NVRAM_CLR sur la position par défaut (broches 3 et 5). Voir figure 6-1 pour identifier son emplacement. Redémarrez le système et entrez à nouveau dans les paramètres du BIOS. Voir “Utilisation du programme de configuration du système et du gestionnaire de démarrage UEFI Boot Manager”. Unité centrale configurée sur la fréquence minimale. La vitesse du processeur peut être définie intentionnellement sur une valeur plus faible afin de réduire la consommation. Si ce paramètre n'a pas été défini intentionnellement, recherchez la présence éventuelle d'autres messages du système pouvant indiquer les causes de l'incident. Unité centrale x installée sans mémoire. La présence de modules de mémoire est requise, mais ceux-ci ne sont pas installés dans les logements de mémoire correspondant au processeur indiqué. Installez des modules de mémoire pour le processeur. Voir “Mémoire système”. Tableau 1-2. Messages système (suite) Message Cause Mesure correctiveÀ propos du système 51 Des unités centrales ayant des capacités de mémoire cache différentes ont été détectées. Des processeurs non compatibles entre eux ont été installés sur le système. Assurez-vous que tous les processeurs présentent des caractéristiques identiques en termes de capacité de mémoire cache, nombre de cœurs et fréquence d'alimentation. Assurez-vous que les processeurs sont correctement installés. Voir “Processeurs”. Des unités centrales ayant un nombre de cœurs différent ont été détectées. Le système s'est arrêté. Des unités centrales équipées de processeurs différents ont été détectées. Le système s'est arrêté. Des unités centrales présentant des fréquences d'alimentation différentes ont été détectées. Le système s'est arrêté. Tableau 1-2. Messages système (suite) Message Cause Mesure corrective52 À propos du système Le mode d'amorçage UEFI est actuellement défini. Assurezvous que vous disposez de supports amorçables compatibles. Si nécessaire, modifiez le mode d'amorçage via le programme de configuration du système. L'amorçage du système a échoué car le mode d'amorçage UEFI est activé dans le programme BIOS alors que le paramètre défini dans le système d'exploitation est autre que le mode UEFI. Assurez-vous que le mode d'amorçage est correctement défini et que le support d'amorçage approprié est disponible. Voir “Utilisation du programme de configuration du système et du gestionnaire de démarrage UEFI Boot Manager”. Réduction de la mémoire disponible Barrettes de mémoire défectueuses ou mal installées. Remettez en place les modules de mémoire. Voir “Dépannage de la mémoire système”. La configuration DIMM doit être définie conformé- ment à chaque unité centrale. Configuration de mémoire non valide sur un système biprocesseur. La configuration des modules de mémoire doit être identique entre les processeurs. Assurez-vous que la configuration des barrettes de mémoire est valide. Voir “Consignes générales pour l'installation des modules de mémoire”. NICx et NICy intégrés : OS NIC=, Management Shared NIC= L'interface NIC du système d'exploitation est définie dans le programme BIOS. L'interface d'administration NIC partagée est définie via les outils de gestion. Vérifiez les paramètres NIC dans le logiciel de gestion du système ou dans le programme de configuration du système. Si un problème est indiqué, consultez la rubrique “Dépannage d'une carte NIC”. Tableau 1-2. Messages système (suite) Message Cause Mesure correctiveÀ propos du système 53 Erreur 8602 : Défaillance du périphérique auxiliaire Vérifiez que la souris et le clavier sont correctement reliés aux connecteurs appropriés. Le câble de la souris ou du clavier n'est pas correctement connecté. Remettez en place le câble de la souris ou du clavier. Clavier ou souris défectueux/-se. Assurez-vous du bon fonctionnement de la souris ou du clavier. Voir “Dépannage d'un périphérique USB”. Défaillance du composant Gate A20 Contrôleur du clavier défectueux ; carte système défectueuse. Voir “Obtention d'aide”. Défaillance générale Le système d'exploitation ne peut pas exécuter la commande. Ce message est habituellement suivi d'informations spécifiques. Notez ces informations et prenez les mesures adéquates pour résoudre l'incident. Informations de configuration non valides. Veuillez exécuter le programme SETUP. Une configuration système non valide a provoqué un arrêt du système. Exécutez le programme de configuration du système et vérifiez les paramètres en cours. Voir “Utilisation du programme de configuration du système et du gestionnaire de démarrage UEFI Boot Manager”. Carte PCIe non valide détectée dans le logement Internal_Storage. Le système s'est arrêté, car une carte d'extension PCIe non valide est installée dans l'emplacement dédié au contrôleur de stockage. Retirez la carte d'extension PCIe installée dans l'emplacement réservé et remplacez-la par le contrôleur de stockage intégré. Consultez “Carte contrôleur de stockage intégrée”. Tableau 1-2. Messages système (suite) Message Cause Mesure corrective54 À propos du système Défaillance du contrôleur de clavier Contrôleur du clavier défectueux ; carte système défectueuse. Voir “Obtention d'aide”. Défaillance du câble de données du clavier Défaillance de touche du clavier Le connecteur du câble du clavier n'est pas branché correctement ou le clavier est défectueux. Remettez le câble du clavier en place. Si l'incident persiste, voir “Dépannage d'un périphérique USB”. Défaillance du fusible de clavier Surtension détectée au niveau du connecteur de clavier. Voir “Obtention d'aide”. Le clavier local risque de ne pas fonctionner correctement, car tous les ports USB accessibles à l'utilisateur sont désactivés. Si vous utilisez un clavier en local, effectuez un cycle d'amorçage du système et accé- dez au programme de configuration de celui-ci afin de modifier les paramètres. Les ports USB sont désactivés dans le BIOS système. Mettez le système hors tension, puis de nouveau sous tension au moyen du bouton d'alimentation, puis accédez au programme de configuration du système pour activer les ports USB nécessaires. Voir “Accès au programme de configuration du système”. Mode Constructeur détecté Le système est en mode Constructeur. Redémarrez le système pour désactiver le mode Constructeur. Tableau 1-2. Messages système (suite) Message Cause Mesure correctiveÀ propos du système 55 Nombre maximal de rangées dépassé. La barrette DIMM suivante a été désactivée : x Configuration de mémoire non valide. Le système fonctionne, mais le module de mémoire spécifié a été désactivé. Assurez-vous que la configuration des barrettes de mémoire est valide. Voir “Consignes générales pour l'installation des modules de mémoire”. Erreur sur la ligne d'adressage mémoire à adresse, valeur lue = valeur, valeur prévue = valeur Barrettes de mémoire défectueuses ou mal installées. Voir “Dépannage de la mémoire système”. Erreur logique de configuration Dword à adresse, valeur lue = valeur, valeur prévue = valeur Barrettes de mémoire défectueuses ou mal installées. Voir “Dépannage de la mémoire système”. Avertissement sur l'initialisation de la mémoire : la capacité mémoire peut être réduite Configuration de mémoire non valide. Le système fonctionne, mais avec une capacité mémoire inférieure à la capacité physiquement disponible. Assurez-vous que la configuration des barrettes de mémoire est valide. Voir “Consignes générales pour l'installation des modules de mémoire”. Erreur de parité de mémoire à adresse, valeur lue = valeur, valeur prévue = valeur Barrettes de mémoire défectueuses ou mal installées. Voir “Dépannage de la mémoire système”. Tableau 1-2. Messages système (suite) Message Cause Mesure corrective56 À propos du système Erreur de lecture/écriture en mémoire à adresse, valeur lue = valeur, valeur prévue = valeur Barrettes de mémoire défectueuses ou mal installées. Voir “Dépannage de la mémoire système”. Mémoire configurée sur la fréquence minimale. La fréquence de la mémoire peut être définie intentionnellement sur une valeur plus faible afin de réduire la consommation. Si ce paramètre n'a pas été défini intentionnellement, recherchez la présence éventuelle d'autres messages du système pouvant indiquer les causes de l'incident. Il se peut que la configuration actuelle de la mémoire prenne en charge uniquement la fréquence minimale. Assurez-vous que la configuration de la mémoire prend en charge les fréquences plus élevées. Voir “Consignes générales pour l'installation des modules de mémoire”. Tests de mémoire interrompus suite à la pression sur une touche. Test de la mémoire interrompu à l'aide de la barre d'espacement lors de l'autotest de démarrage. Ce message s'affiche uniquement à titre d'information. Erreur de ligne MEMTEST détectée sur x Configuration de mémoire non valide. Des barrettes de mémoire incompatibles sont installées. Assurez-vous que la configuration des barrettes de mémoire est valide. Voir “Consignes générales pour l'installation des modules de mémoire”. Tableau 1-2. Messages système (suite) Message Cause Mesure correctiveÀ propos du système 57 Mode miroir désactivé. Pour la mise en miroir, les barrettes DIMM doivent être installées par paires. Les paires doivent correspondre en termes de taille, de vitesse et de technologie. La configuration de la mémoire n'est pas conforme aux paramètres du BIOS. Le paramètre de configuration BIOS a été désactivé. Configurez à nouveau les modules de mémoire pour les besoins du mode de mise en miroir. Voir “Mémoire système”. Aucun périph- érique d'amorçage n'est disponible. Sous-système du lecteur optique ou du disque dur défectueux ou manquant ; disque dur défectueux ou manquant ; aucune clé USB amorçable installée. Utilisez une clé USB, un lecteur optique ou un disque dur amorçable. Si l'incident persiste, voir “Dépannage d'un lecteur optique”, “Dépannage d'un périph- érique USB” et “Dépannage d'un disque dur”Dépannage d'une carte SD interne. Voir “Utilisation du programme de configuration du système et du gestionnaire de démarrage UEFI Boot Manager” pour plus d'informations sur la définition de la séquence d'amorçage. Tableau 1-2. Messages système (suite) Message Cause Mesure corrective58 À propos du système Secteur d'amorce non détecté sur le disque dur Paramètres incorrects dans le programme de configuration du système ; système d'exploitation introuvable sur le disque dur. Vérifiez les paramètres de configuration du disque dur dans le programme de configuration du système. Voir “Utilisation du programme de configuration du système et du gestionnaire de démarrage UEFI Boot Manager”. Si nécessaire, installez le système d'exploitation sur le disque dur. Consultez la documentation du système d'exploitation. Absence de signal d'horloge - interruption Carte système défectueuse. Voir “Obtention d'aide”. L'installation du BIOS PCI a échoué Un échec de la somme de contrôle du BIOS du périphérique PCIe (ROM d'option) est détecté lors de la duplication miroir. Connexion incorrecte des câbles de carte(s) d'extension ; carte(s) d'extension défectueuse(s) ou mal installée(s). Remettez la ou les cartes d'extension en place. Vérifiez que tous les câbles sont fermement raccordés aux cartes d'extension. Si l'incident persiste, voir “Dépannage des cartes d'extension”. Erreur d'initialisation PCIe : largeur de liaison requise = x, largeur de liaison réelle = y. Carte PCIe défectueuse ou mal installée dans le support spécifié. Remettez la carte PCIe en place dans le logement indiqué. Voir “Dépannage des cartes d'extension”. Si l'incident persiste, consultez le chapitre “Obtention d'aide”. Tableau 1-2. Messages système (suite) Message Cause Mesure correctiveÀ propos du système 59 Erreur de configuration Plug-andPlay Une erreur s'est produite lors de l'initialisation d'un périphérique PCIe ; la carte système est défectueuse. Installez le cavalier NVRAM_CLR dans la position libre (broches 1 et 3) et redémarrez le système. Voir figure 6-1 pour identifier son emplacement. Si l'incident persiste, voir “Dépannage des cartes d'extension”. Barrette DIMM quadri-rangée détectée à la suite d'une barrette à rangée simple ou double dans le support. Configuration de mémoire non valide. Assurez-vous que la configuration des barrettes de mémoire est valide. Voir “Consignes générales pour l'installation des modules de mémoire”. Erreur de lecture Le secteur demandé est introuvable Le système d'exploitation ne peut pas lire le disque dur, le lecteur optique ou le périphérique USB, l'ordinateur n'a pas trouvé un secteur spécifique sur le disque ou le secteur demandé est défectueux. Remettez en place le support optique, le support USB ou le périphérique USB. Vérifiez que les câbles USB, du fond de panier SAS/SATA ou du lecteur optique sont correctement connectés. Voir “Dépannage d'un périphérique USB”, “Dépannage d'un lecteur optique” ou “Dépannage d'un disque dur” pour vérifier si les lecteurs installés dans votre système sont adaptés. Périphérique du port SATA x non trouvé Aucun périphérique n'est connecté au port SATA spécifié. Ce message s'affiche uniquement à titre d'information. Tableau 1-2. Messages système (suite) Message Cause Mesure corrective60 À propos du système Erreur d'autodétection de périphérique SATA sur le port x Erreur de configuration de périphérique SATA sur le port x Erreur de périph- érique SATA sur le port x Le périphérique connecté au port SATA spécifié est défectueux. Remplacez le périphérique défectueux. Secteur non trouvé Erreur de recherche L'opération de recherche a échoué Disque dur, périphérique USB ou support USB défectueux. Remplacez le support USB ou le périphérique. Assurezvous que les câbles USB ou du fond de panier SAS sont correctement connectés. Voir “Dépannage d'un périphérique USB” ou “Dépannage d'un disque dur” pour plus d'informations sur le(s) lecteur(s) installé(s) dans le système. L'arrêt a échoué Erreur système générale. Voir “Obtention d'aide”. La quantité de mémoire système a été modifiée Ajout ou suppression de mémoire ; module de mémoire défectueux. Si vous venez d'ajouter ou de supprimer de la mémoire, ce message s'affiche uniquement pour information. Vous pouvez ne pas en tenir compte. Dans le cas contraire, vérifiez le journal d'événements du système pour identifier les erreurs détectées et remplacez le module de mémoire défectueux. Voir “ Dépannage de la mémoire système ”. Tableau 1-2. Messages système (suite) Message Cause Mesure correctiveÀ propos du système 61 Les barrettes DIMM suivantes doivent correspondre en termes de géométrie : x,x,... Configuration de mémoire non valide. Les modules de mémoire spécifiés ne correspondent pas du point de vue de la taille, du nombre de rangées ou du nombre de canaux de données. Assurez-vous que la configuration des barrettes de mémoire est valide. Voir “Consignes générales pour l'installation des modules de mémoire”. Les barrettes DIMM suivantes doivent correspondre en termes de nombre de rangées : x,x,... Les barrettes DIMM suivantes doivent correspondre en termes de taille : x,x,... Les barrettes DIMM suivantes doivent correspondre en termes de taille et géométrie : x,x,... Les barrettes DIMM suivantes doivent correspondre en termes de taille et nombre de rangées : x,x,... Tableau 1-2. Messages système (suite) Message Cause Mesure corrective62 À propos du système Capteur thermique non détecté sur x Une barrette de mémoire sans capteur thermique est installée dans le logement indiqué de la mémoire. Remettez en place le module de mémoire. Voir “Mémoire système”. Horloge arrêtée Batterie ou puce défectueuse. Voir “Dépannage de la pile du système”. Horloge non réglée - veuillez exécuter le programme SETUP Paramètres d'heure ou de date incorrects ; batterie du système défectueuse. Vérifiez les paramètres d'heure et de date. Voir “Utilisation du programme de configuration du système et du gestionnaire de démarrage UEFI Boot Manager”. Si le problème persiste, remplacez la batterie du système. Voir “Batterie du système”. Échec du compteur de temporisation 2 Carte système défectueuse. Voir “Obtention d'aide”. Opération de configuration TPM effectuée. Le système va être réinitialisé. Une commande de configuration TPM a été saisie. Le système va redémarrer et exécuter la commande. Ce message s'affiche uniquement à titre d'information. Tableau 1-2. Messages système (suite) Message Cause Mesure correctiveÀ propos du système 63 Opération de configuration TPM en attente. Appuyez sur (I) pour Ignorer, ou sur (M) - Modifier pour valider cette modification et réinitialiser le système. AVERTISSEMENT : Toute modification peut engendrer un problème de sécurité. Ce message s'affiche lors du redémarrage du système après la saisie d'une commande de configuration TPM. Une intervention de l'utilisateur est nécessaire pour continuer. Entrez l'option (I) ou (M) pour poursuivre. TPM failure Une fonction TPM (Trusted Platform Module) a échoué. Voir “Obtention d'aide”. Impossible de lancer l'image des services système. Le système s'est arrêté. L'arrêt du système s'est produit après une pression sur la touche F10 car l'image System Services est endommagée dans le micrologiciel du système, ou elle a été perdue suite au remplacement de la carte système. Il se peut que la mémoire flash de la carte iDRAC6 Enterprise soit altérée. Redémarrez le système et mettez à jour le référentiel Unified Server Configurator au niveau le plus récent afin de restaurer toutes les fonctionnalités. Reportez-vous à la documentation sur Unified Server Configurator pour plus d'informations. Restaurez la mémoire Flash en téléchargeant la version la plus récente depuis le site support.dell.com. Consultez le guide d'utilisation de la carte iDRAC6 pour obtenir des instructions concernant le remplacement sur site de la mémoire flash. Tableau 1-2. Messages système (suite) Message Cause Mesure corrective64 À propos du système Interruption imprévue en mode protégé Modules de mémoire mal installés ou contrôleur de clavier/souris défectueux. Remettez en place les modules de mémoire. Voir “Dépannage de la mémoire système”. Si l'incident persiste, consultez le chapitre “Obtention d'aide”. Combinaison d'UC non prise en charge Instruction d'UC non prise en charge détectée Le ou les processeurs ne sont pas pris en charge par le système. Installez un processeur ou une combinaison de processeurs pris(e) en charge. Voir “Processeurs”. Barrette DIMM non prise en charge détectée. La barrette DIMM suivante a été désactivée : x Configuration de mémoire non valide. Le système fonctionne, mais le module de mémoire spécifié a été désactivé. Assurez-vous que la configuration des barrettes de mémoire est valide. Voir “Consignes générales pour l'installation des modules de mémoire”. Configuration de mémoire non prise en charge. Noncorrespondance de barrettes DIMM détectée entre les logements : x,x,... Configuration de mémoire non valide. Les modules de mémoire installés dans les logements spécifiés ne correspondent pas. Assurez-vous que la configuration des barrettes de mémoire est valide. Voir “Consignes générales pour l'installation des modules de mémoire”. Tableau 1-2. Messages système (suite) Message Cause Mesure correctiveÀ propos du système 65 Mémoire inutilisée détectée. Les barrettes DIMM installées dans le logement suivant sont indisponibles en cas de configuration en miroir ou en mode ECC avancé 128 bits : x,x,x La configuration de la mémoire n'est pas optimale pour la mise en miroir ou le mode de mémoire ECC avancé. Les modules contenus dans les logements spécifiés sont inutilisés. Configurez à nouveau la mémoire pour les besoins de la mise en miroir ou du mode ECC avancé, ou changez le mode de mémoire en sélectionnant l'option Optimized (Optimisé) dans l'écran de configuration du BIOS. Voir “Mémoire système”. Avertissement : une erreur fatale a provoqué la réinitialisation du système. Veuillez consulter le journal d'événements du système. Une erreur fatale a provoqué le redémarrage du système. Reportez-vous aux informations qui ont été consignées dans le journal d'événements du système (SEL) lorsque cette erreur s'est produite. Si le journal signale que des composants sont défectueux, reportez-vous à la section correspondante de la rubrique “Dépannage du système”. Avertissement : le panneau de commande n'est pas installé. Le panneau de commande n'est pas installé ou son câble n'est pas correctement connecté. Installez le panneau de commande, ou vérifiez le câblage entre le module d'affichage, la carte du panneau de commande et la carte système. Voir “Assemblage du panneau de commande (procé- dure réservée à la maintenance)”. Tableau 1-2. Messages système (suite) Message Cause Mesure corrective66 À propos du système Avertissement : Aucune mise à jour du micrologiciel chargée pour le processeur n La mise à jour du micrologiciel a échoué. Mettez le micrologiciel du BIOS à jour. Voir “Obtention d'aide”. Avertissement : La puissance nécessaire est supérieure à la puissance du bloc d'alimentation. Vérifiez la configuration du bloc d'alimentation et du système. Avertissement : Dégradation des performances. UC et mémoire configurées sur les fréquences minimales conformé- ment à la puissance du bloc d'alimentation. Le système va redémarrer. Il se peut que la configuration système des processeurs, des modules de mémoire et des cartes d'extension ne soit pas prise en charge par les blocs d'alimentation. Si la mise à niveau d'un composant du système vient d'être effectuée, rétablissez la configuration antérieure. Si l'amorçage du système s'effectue sans émettre cet avertissement, cela indique que les composants ayant été remplacés ne sont pas pris en charge par ce bloc d'alimentation. Si des blocs d'alimentation à faible consommation (Energy Smart) sont installés, remplacez-les par des blocs d'alimentation haute performance (High Output) afin de pouvoir utiliser les composants. Voir “Blocs d'alimentation”. Tableau 1-2. Messages système (suite) Message Cause Mesure correctiveÀ propos du système 67 Avertissement : Non-concordance des blocs d'alimentation. Perte de redondance du bloc d'alimentation. Vérifiez le PSU (bloc d'alimentation). Un bloc d'alimentation haute performance et un bloc à consommation d'énergie intelligente sont installés simultanément sur le même système. Installez au choix deux blocs d'alimentation haute performance ou à consommation d'énergie intelligente sur le système. Vous pouvez également n'activer qu'un seul bloc d'alimentation sur le système jusqu'à ce que vous disposiez de deux blocs d'alimentation de type identique. Voir “Dépannage des blocs d'alimentation”. Avertissement : Configuration de mémoire non prise en charge détectée. La configuration de mémoire n'est pas optimale. La configuration de mémoire recommandée est : Configuration de mémoire non valide. Le système fonctionne, mais de façon restreinte. Assurez-vous que la configuration des barrettes de mémoire est valide. Voir “Consignes générales pour l'installation des modules de mémoire”. Si l'incident persiste, consultez le chapitre “Dépannage de la mémoire système”. Erreur d'écriture Erreur d'écriture sur l'unité sélectionnée Périphérique USB, support USB, assemblage du lecteur optique, disque dur ou soussystème de disque dur défectueux. Remplacez le support USB ou le périphérique. Assurezvous que les câbles USB, du fond de panier SAS ou SATA sont correctement branchés. Voir “Dépannage d'un périphérique USB”, “Dépannage d'une carte SD interne”, “Dépannage d'un lecteur optique” et “Dépannage d'un disque dur”. Tableau 1-2. Messages système (suite) Message Cause Mesure corrective68 À propos du système Messages d'avertissement Un message d'avertissement signale un problème possible et vous demande une réponse avant de laisser le système poursuivre son exécution. Par exemple, lorsque vous lancez le formatage d'une unité, un message vous avertit que vous risquez de perdre toutes les données qu'elle contient. Les messages d'avertissement interrompent la tâche en cours et vous demandent de répondre en tapant y (pour oui) ou n (pour non). REMARQUE : Les messages d'avertissement sont générés par l'application ou par le système d'exploitation. Pour plus d'informations, consultez la documentation fournie avec le système d'exploitation ou l'application. Messages de diagnostic Les utilitaires de diagnostic du système peuvent générer des messages si vous exécutez des tests de diagnostic sur votre système. Voir “Exécution des diagnostics du système” pour plus d'informations sur les diagnostics du système. Messages d'alerte Le logiciel de gestion de systèmes génère des messages d'alerte. Ils comprennent des messages d'informations, d'état, d'avertissement et de panne concernant les lecteurs, la température, les ventilateurs et l'alimentation. Pour plus d'informations, reportez-vous à la documentation du logiciel de gestion des systèmes. Autres informations utiles AVERTISSEMENT : Consultez les informations sur la sécurité et les réglementations fournies avec votre système. Les informations sur la garantie se trouvent soit dans ce document, soit à part. REMARQUE : Pour obtenir le nom complet d'une abréviation ou connaître la signification d'un sigle utilisé dans cette Table, reportez-vous à la section “Glossaire”. Tableau 1-2. Messages système (suite) Message Cause Mesure correctiveÀ propos du système 69 • La documentation fournie avec le rack indique comment installer le système dans un rack. • Le document Guide de mise en route présente les caractéristiques du système, les procédures de configuration et les spécifications techniques. • Tous les supports fournis avec le système contenant de la documentation et des outils permettant de configurer et de gérer le système, y compris les supports du système d'exploitation, du logiciel de gestion du système, des mises à jour système et des composants système que vous avez achetés avec le système. REMARQUE : Vérifiez toujours si des mises à jour sont disponibles sur le site support.dell.com et lisez-les en premier, car elles remplacent souvent les informations contenues dans les autres documents.70 À propos du systèmeUtilisation du programme de configuration du système et du gestionnaire de démarrage UEFI Boot Manager 71 Utilisation du programme de configuration du système et du gestionnaire de démarrage UEFI Boot Manager Le programme de configuration du système est le programme du BIOS qui vous permet de gérer le matériel et de spécifier les options au niveau du BIOS. Vous pouvez à partir du programme de configuration du système : • Changer les configurations de la NVRAM après l'ajout ou la suppression de matériel • Afficher la configuration matérielle du système • Activer ou désactiver les périphériques intégrés • Définir les seuils de gestion de l'alimentation et de la performance • Gérer la sécurité du système Choisir le mode d'amorçage du système Le programme de configuration du système vous permet de spécifier le mode d'amorçage pour l'installation du système d'exploitation : • Le mode d'amorçage du BIOS (par défaut) est l'interface standard d'amorçage au niveau du BIOS. • Le mode d'amorçage de l'UEFI est une interface d'amorçage améliorée de 64 bits basée sur des spécifications UEFI et superposée au système du BIOS. Voir “Entering the UEFI Boot Manager (Accès au gestionnaire d'amorçage de l'UEFI)” pour plus d'informations sur l'interface. 72 Utilisation du programme de configuration du système et du gestionnaire de démarrage UEFI Boot Manager La sélection du mode de démarrage s'effectue dans le champ Mode d'amorçage (Boot Mode) de l'écran Paramètres d'amorçage (Boot Settings) du programme de configuration du système. Voir “Ecran des paramètres d'amorçage”. Une fois que le mode d'amorçage est spécifié, le système démarre dans ce mode et vous pouvez ainsi installer votre système d'exploitation à partir de ce mode. Dès lors, vous devez démarrer le système au même mode d'amorçage (BIOS ou UEFI) pour accéder au système d'exploitation installé. Toute tentative de démarrage du système d'exploitation à partir de l'autre mode d'amorçage provoque l'arrêt immédiat du système. REMARQUE : Les systèmes d'exploitation doivent être compatibles avec l'UEFI (par exemple, Microsoft ® Windows Server ® 2008 version 64 bits) pour être installés à partir du mode d'amorçage UEFI. Les systèmes d'exploitation 32 bits et DOS ne prennent pas en charge l'UEFI et ne peuvent être installés qu'à partir du mode d'amorçage du BIOS. Accès au programme de configuration du système 1 Allumez ou redémarrez le système. 2 Appuyez sur immédiatement après le message suivant : = System Setup REMARQUE : Le système ne répond pas tant que le clavier USB n'est pas actif. Si le système d'exploitation commence à se charger alors que vous n'avez pas encore appuyé sur , laissez-le finir de démarrer, puis arrêtez-le et réessayez. Réponse aux messages d'erreur Si un message d'erreur s'affiche quand le système démarre, prenez-en note. Voir “Messages système” pour obtenir une explication du message, ainsi que des suggestions pour corriger les erreurs. REMARQUE : Après l'installation d'une mise à niveau de la mémoire, il est normal que votre système affiche, lors de son premier démarrage, un message signalant que la taille de la mémoire du système a changé.Utilisation du programme de configuration du système et du gestionnaire de démarrage UEFI Boot Manager 73 Utilisation des touches de navigation du programme de configuration du système REMARQUE : Pour la plupart des options, les modifications effectuées sont enregistrées, mais ne prennent effet qu'au redémarrage du système. Touches Action Flèche vers le haut ou Le curseur passe au champ précédent. Flèche vers le bas ou Le curseur passe au champ suivant. Barre d'espacement, <+>, <–>, flèche vers la gauche ou vers la droite Permet de faire défiler les paramètres disponibles pour un champ. Dans certains champs, vous pouvez également saisir la valeur appropriée. <Échap> Permet de quitter le programme de configuration du système et de redémarrer le système si des modifications ont été apportés. Affiche le fichier d'aide du programme de configuration du système.74 Utilisation du programme de configuration du système et du gestionnaire de démarrage UEFI Boot Manager Options de configuration du système Écran principal Figure 2-1. Écran principal du programme de configuration du système REMARQUE : les options disponibles du programme de configuration du système varient en fonction de la configuration du système. REMARQUE : Les valeurs par défaut sont répertoriées sous l'option correspondante, le cas échéant. Option Description System Time (Heure système) Définit l'heure de l'horloge interne du système. System Date (Date système) Définit la date du calendrier interne du système. Paramètres de la mémoire Affiche des informations relatives à la mémoire installée. Voir “Écran des paramètres de la mémoire”.Utilisation du programme de configuration du système et du gestionnaire de démarrage UEFI Boot Manager 75 Paramètres du processeur Affiche des informations relatives aux microprocesseurs (vitesse, taille de la mémoire cache, etc.). Voir “Écran des paramètres du processeur”. SATA Settings (Paramètres SATA) Affiche un écran permettant d'activer ou désactiver le contrôleur et les ports SATA intégrés. Voir “Écran des paramètres SATA (SATA Settings)”. Paramètres d'amorçage Affiche un écran permettant de spécifier le mode d'amorçage (BIOS ou UEFI). Pour le mode BIOS, vous pouvez spécifier les périphériques d'amorçage. Voir “Ecran des paramètres d'amorçage”. Integrated Devices (Périphériques intégrés) Affiche un écran permettant d'activer ou désactiver les contrôleurs de périphérique et les ports intégrés, et de spécifier les fonctionnalités et options associées. Voir “Écran Integrated Devices (Périphériques intégrés)”. PCI IRQ Assignment (Affectation d'IRQ PCI) Affiche un écran permettant de modifier l'IRQ affectée à chaque périphérique intégré du bus PCI, ainsi qu'à toutes les cartes d'extension nécessitant une IRQ. Voir “Écran PCI IRQ Assignments (Affectations des IRQ PCI)”. Serial Communication (Communication série) Affiche un écran permettant d'activer ou désactiver les ports série et de spécifier les fonctionnalités et options associées. Voir “Écran Serial Communication (Communications série)”. Embedded Server Management (Gestion de serveur intégré) Affiche un écran permettant de configurer les options de l'écran LCD du panneau avant et de définir une chaîne affichée sur cet écran. Voir “Écran Embedded Server Management (Gestion de serveur intégrée)”. Gestion de l'alimentation Permet de gérer la consommation d'énergie des processeur(s), des ventilateurs et des modules de mémoire au moyen de paramètres prédéfinis ou personnalisés. Voir “Écran de gestion de l'alimentation (Power Management)”. Option Description76 Utilisation du programme de configuration du système et du gestionnaire de démarrage UEFI Boot Manager System Security (Sécurité du système) Affiche un écran permettant de configurer les fonctions du mot de passe système et du mot de passe de configuration. Voir “Écran System Security (Sécurité du système)”, “Utilisation du mot de passe système” et “Utilisation du mot de passe de configuration” pour plus d'informations. Keyboard NumLock (Verr Num clavier) (Option par défaut : On [Activé]) Détermine si le système démarre en mode VERR NUM s'il est équipé d'un clavier à 101 ou 102 touches (cette option ne s'applique pas aux claviers à 84 touches). Report Keyboard Errors (consignation des erreurs clavier) (Option par défaut : Report [Consigner]) Active ou désactive la consignation des erreurs liées au clavier pendant l'autotest de démarrage. Sélectionnez Report pour les systèmes hôtes équipés de claviers. Sélectionnez Do Not Report (Ne pas consigner) pour supprimer tous les messages d'erreur liés au clavier ou à son contrôleur pendant l'autotest de démarrage. Ce paramètre n'affecte pas le fonctionnement du clavier lui-même, s'il est connecté au système. F1/F2 Prompt on Error (Invite F1/F2 en cas d'erreur) (Option par défaut : Enabled [Activé]) Permet au système d'arrêter les erreurs pendant le POST, ce qui permet à l'utilisateur d'observer les évènements qui peuvent passer inaperçus pendant le POST. L'utilisateur peut sélectionner F1 pour continuer ou F2 pour accéder au programme de configuration du système. PRÉCAUTION : Si vous désactivez cette option, le système ne s'arrête pas lorsqu'une erreur se produit pendant le POST. Toutes les grandes erreurs seront affichées et enregistrées dans le journal des évènements système. Option DescriptionUtilisation du programme de configuration du système et du gestionnaire de démarrage UEFI Boot Manager 77 Écran des paramètres de la mémoire Option Description System Memory Size Affiche la quantité de mémoire système. System Memory Type Affiche le type de la mémoire système. System Memory Speed Affiche la vitesse de la mémoire système. Video Memory Affiche la quantité de mémoire vidéo. System Memory Testing (Option par défaut : Enabled [Activé]) Indique si la mémoire système doit être testée à chaque amorçage. Les options disponibles sont Enabled (Activé) et Disabled (Désactivé). Mode de fonctionnement de la mémoire Si la configuration de la mémoire le permet, ce champ affiche le type de fonctionnement de la mémoire. Lorsque le mode Optimiseur (Optimizer Mode) est défini, les contrôleurs de mémoire s'exécutent de façon indépendante afin d'optimiser les performances de la mémoire. Lorsque l'option Mirror Mode (Mode miroir) est sélectionnée la mémoire de mise en miroir est activée. Lorsque le mode de fonctions ECC avancés (Advanced ECC Mode) est activé, deux contrôleurs sont fusionnés en mode 128 bits pour former une configuration ECC multi-bits avancée. Pour plus d'informations sur les modes de fonctionnement de la mémoire, voir “Mémoire système”. Node Interleaving (Entrelacement de nœuds) (Option par défaut : Disabled [Désactivé]) Lorsque ce champ est activé (Enabled), l'entrelacement de la mémoire est pris en charge si une configuration de mémoire symétrique est installée. Si le champ est désactivé (Disabled), le système prend en charge les configurations de mémoire asymétriques NUMA (Non-Uniform Memory Architecture).78 Utilisation du programme de configuration du système et du gestionnaire de démarrage UEFI Boot Manager Écran des paramètres du processeur Option Description 64-bit Indique si les processeurs installés prennent en charge les extensions 64 bits. Core Speed Affiche la vitesse d'horloge du processeur. Bus Speed Affiche la vitesse de bus du processeur. Logical Processor (Processeur logique) (Option par défaut : Enabled [Activé]) Sur les processeurs prenant en charge la technologie SMT (Simultaneous Multi-Threading), chaque cœur de processeur prend en charge jusqu'à deux processeurs logiques. Si ce champ est défini sur la valeur Activé (Enabled) le BIOS consigne les données relatives aux deux processeurs logiques. Si la valeur Désactivé (Disabled) est définie, la surveillance du BIOS ne s'applique qu'à un seul processeur logique. Virtualization Technology (Option par défaut : Disabled [Désactivé]) REMARQUE : Désactivez cette fonction si le système n'est pas censé exécuter des logiciels de virtualisation. L'option Enabled (Activé) permet aux logiciels de virtualisation d'utiliser la technologie de virtualisation intégrée au processeur. Execute Disable (Désactivation de l'exécution) (Option par défaut : Enabled [Activé]) Active ou désactive la technologie de protection mémoire (Execute Disable Memory Protection Technology). Nombre de cœurs par processeur (Option par défaut :Tout) Si la valeur Tous [All] est définie, le nombre maximal de cœurs de chaque processeur est activé. Turbo Mode (Mode Turbo) Si la technologie Turbo Boost est prise en charge par les processeurs, cette option permet d'activer ou désactiver le mode Turbo (Turbo Mode). États C (C States) (Option par défaut : Enabled [Activé]) Lorsque l'option Enabled (Activé) est sélectionnée, le processeur peut fonctionner dans tous les états d'alimentation disponibles. Processor X ID (ID processeur X) Affiche la série, le modèle, la taille du cache de niveau 2 et de niveau 3, ainsi que le nombre de cœurs de chaque processeur.Utilisation du programme de configuration du système et du gestionnaire de démarrage UEFI Boot Manager 79 Écran des paramètres SATA (SATA Settings) Ecran des paramètres d'amorçage Option Description Embedded SATA (SATA intégré) (Mode ATA - valeur par défaut) Le mode ATA active le contrôleur SATA intégré. La valeur Off désactive le contrôleur. Port A (Option par défaut : Auto) Le mode Auto active la prise en charge du BIOS pour le périphérique connecté au port SATA “A”. La valeur Off désactive la prise en charge du BIOS pour le périphérique. Port B (Option par défaut : Off [Désactivé]) Le mode Auto active la prise en charge du BIOS pour le périphérique connecté au port SATA “B”. La valeur Off désactive la prise en charge du BIOS pour le périphérique. Option Description Mode d'amorçage (BIOS par défaut) PRÉCAUTION : La permutation du mode d'amorçage empêche le démarrage du système si le système d'exploitation n'a pas été installé selon le même mode d'amorçage. Si le système d'exploitation prend en charge l'interface UEFI (Unified Extensible Firmware Interface), vous pouvez définir cette option sur UEFI. La configuration du champ dans le BIOS prend en charge les systèmes d'exploitation non UEFI. REMARQUE : La configuration du champ dans l'UEFI désactive les champs Boot Séquence (Séquence d'amorçage) Hard-Disk Drive Sequence,(Séquence des disques durs) et USB Flash Drive Emulation Type (Type d'émulation lecteur flash USB).80 Utilisation du programme de configuration du système et du gestionnaire de démarrage UEFI Boot Manager Boot Sequence (Séquence d'amorçage) Si le mode d'amorçage (Boot Mode ) est défini sur BIOS, ce champ indique au système l'emplacement des fichiers du système d'exploitation nécessaires au démarrage. Si le Boot Mode (Mode d'amorçage) est défini dans l' UEFI, vous pouvez accéder à l'utilitaire du gestionnaire d'amorçage de l'UEFI en redémarrant le système et en appuyant sur F11 lorsque vous y êtes invité. Hard-Disk Drive Sequence Détermine l'ordre dans lequel le BIOS recherche une image amorçable sur les disques durs au démarrage du système. USB Flash Drive Emulation Type (Option par défaut : Auto) Détermine le type d'émulation pour le lecteur flash USB. L'option Hard disk (Disque dur) permet au lecteur flash USB de fonctionner comme un disque dur. L'option Floppy (Lecteur de disquettes) permet au lecteur flash USB de se comporter comme un lecteur de disquettes amovible. L'option Auto choisit automatiquement le type d'émulation. L'option Auto choisit automatiquement le type d'émulation approprié pour le périphérique, à l'exception de ceux installés dans le logement de carte SD. Tout périphérique installé dans le logement de carte SD émule automatiquement un disque dur. Si vous installez dans ce logement un périphérique configuré en tant que lecteur de disquette amovible, vous devez sélectionner l'option Floppy (Lecteur de disquettes) pour définir le type d'émulation. Boot Sequence Retry (Option par défaut : Disabled [Désactivé]) Si ce champ est activé et si le système n'a pas démarré correctement, ce dernier effectue une nouvelle tentative 30 secondes plus tard. Option DescriptionUtilisation du programme de configuration du système et du gestionnaire de démarrage UEFI Boot Manager 81 Écran Integrated Devices (Périphériques intégrés) Option Description Integrated SAS/RAID Controller (Contrôleur SAS/RAID intégré) (Option par défaut : Enabled [Activé]) Active ou désactive le contrôleur de stockage intégré. User Accessible USB Ports (Option par défaut : All Ports On [Tous ports activés]) Active ou désactive les ports USB auxquels l'utilisateur peut accéder. Les options disponibles sont All Ports On (Tous ports activés), Only Back Ports On (Ports arrière activés) et All Ports Off (Tous ports désactivés). Internal USB Port (Port USB interne) (Option par défaut : On [Activé]) Active ou désactive le port USB interne. Internal SD Card Port (Port de carte SD interne) Active ou désactive le port de carte SD interne. NIC1 et NIC2 intégrés Active ou désactive l'interface du système d'exploitation des deux cartes réseau intégrées. (Il est également possible d'accéder aux cartes NIC via le contrôleur de gestion du système). Embedded Gb NICx (Option par défaut : NIC 1 = Enabled with PXE [Activé avec PXE], NIC 2: Enabled) Active ou désactive les cartes NIC intégrées. Les options disponibles sont Enabled (Activé), Enabled with PXE (Activé avec PXE), Enabled with iSCSI Boot (Activé avec amorçage iSCSI) et Disabled (Désactivé). Le support PXE permet au système de démarrer à partir du réseau. MAC Address Affiche l'adresse MAC de la carte NIC. Capability Detected Affiche les fonctionnalités du LOM et la clé matérielle sur le NIC (s'il est installé). REMARQUE : Certaines fonctionnalités LOM peuvent nécessiter une clé matérielle sur le NIC.82 Utilisation du programme de configuration du système et du gestionnaire de démarrage UEFI Boot Manager Écran PCI IRQ Assignments (Affectations des IRQ PCI) OS Watchdog Timer (Temporisateur de surveillance du système d'exploitation) (Option par défaut : Disabled [Désactivé]) Définit un temporisateur qui surveille l'activité du système d'exploitation et aide à sa restauration si le système cesse de répondre. Lorsque la valeur Activé (Enabled) est définie, le système d'exploitation est autorisé à initialiser le temporisateur. Si l'option Disabled (Désactivé) est sélectionnée, le temporisateur n'est pas initialisé. REMARQUE : Cette fonction est utilisable uniquement avec les systèmes d'exploitation prenant en charge les implémentations WDAT de la spécification ACPI (Advanced Configuration and Power Interface) 3.0b. I/OAT DMA Engine (Option par défaut : Disabled [Désactivé]) Active ou désactive la technologie d'accélération des E/S (si disponible). Embedded Video Controller (Contrôleur vidéo intégré) (Option par défaut : Enabled [Activé]) Active ou désactive la prise en charge du BIOS pour le contrôleur vidéo intégré. REMARQUE : Ce champ ne peut être désactivé que si une carte graphique supplémentaire est installée. Si ce champ est désactivé, certaines fonctionnalités d'accès distant, telles que la gestion virtuelle KVM, sont indisponibles. Option Description Utilisez les touches <+> et <-> pour associer manuellement une valeur d'IRQ à un périphérique donné, ou sélectionnez la valeur par défaut, Default, pour laisser le BIOS sélectionner une valeur d'IRQ au démarrage du système. Option DescriptionUtilisation du programme de configuration du système et du gestionnaire de démarrage UEFI Boot Manager 83 Écran Serial Communication (Communications série) Option Description Serial Communication (Option par défaut : On without Console Redirection [Activé sans redirection de console]) Permet d'indiquer si les périphériques de communication série (Serial Device 1 et Serial Device 2) sont activés dans le BIOS. La redirection via la console BIOS peut également être activée et l'adresse de port utilisée peut être spécifiée. Les options disponibles sont : On without Console Redirection (Activé sans redirection de console), On with Console Redirection via COM1 (Activé avec redirection de console via COM1), On with Console Redirection via COM2 (Activé avec redirection de console via COM2) et Off (Désactivé). Serial Port Address (Par défaut : Serial Device 1=COM1, Serial Device2=COM2) Définit les adresses de port série correspondant aux deux périphériques série. REMARQUE : Seul le périphérique série 2 (Serial Device 2) peut être associé aux connectivités SOL (Serial Over LAN). Pour utiliser la redirection de console via les connectivités SOL, attribuez la même adresse de port à la redirection de console et au périphérique série. External Serial Connector (Connecteur série externe) Indique quel élément a accès au connecteur série externe pour les communications série (COM1, COM2 ou Remote Access Device [Périphérique d'accès distant]). REMARQUE : Seul le périphérique série 2 (Serial Device 2) peut être associé aux connectivités SOL (Serial Over LAN). La configuration du connecteur série externe en périphérique série 1 permet l'utilisation indépendante du périphérique série 1 tandis que le périphérique série 2 peut être utilisé pour SOL. Failsafe Baud Rate (Option par défaut : 115200) Indique si le débit de la ligne de secours est utilisé pour la redirection de console. Le BIOS tente de déterminer automatiquement le débit. Le débit de la ligne de secours est appliqué uniquement en cas d'échec de cette tentative. Ce débit ne doit pas être modifié.84 Utilisation du programme de configuration du système et du gestionnaire de démarrage UEFI Boot Manager Écran Embedded Server Management (Gestion de serveur intégrée) Remote Terminal Type (Option par défaut : VT100/VT220) Configure le type de terminal de la console distante. Sélectionnez VT100/VT220 ou ANSI. Redirection After Boot (Option par défaut : Enabled [Activé]) Active ou désactive la redirection de la console après le démarrage du système d'exploitation. Option Description Options de l'écran LCD frontal Les options sont User Defined String (Chaîne définie par l'utilisateur), Model Number (Numéro de modèle) ou None (Aucun. Si l'écran LCD est configuré sur une option autre que ces trois choix, l'option sera définie sur “Advanced” (avancée) dans le BIOS. Dans ce cas, il est impossible de modifier l'option dans le BIOS sauf si l'option est redéfinie sur User Defined String (Chaîne définie par l'utilisateur), Model Number (Numéro de modèle) ou None (Aucun) via un autre utilitaire de configuration LCD (tel que l'utilitaire de configuration iDRAC ou le menu du panneau LCD). Chaîne LCD définie par l'utilisateur Vous pouvez entrer le nom du système ou un autre identificateur pour qu'il s'affiche sur l'écran du module LCD. Option DescriptionUtilisation du programme de configuration du système et du gestionnaire de démarrage UEFI Boot Manager 85 Écran de gestion de l'alimentation (Power Management) Option Description Gestion de l'alimentation Les options possibles sont OS Control (Contrôle du système d'exploitation), Active Power Controller (contrôleur de l'alimentation configuré en actif), Custom (personnalisé) ou Maximum Performance (Performance maximale). Pour toutes les options autres que Custom (Personnalisée), le BIOS préconfigure les paramètres d'alimentation de cet écran comme ceci : Le paramètre OS Control définit la puissance de l'unité centrale sur la valeur OS DBPM, l'alimentation du ventilateur sur Minimum Power et celle de la mémoire sur Maximum Performance. Lorsque ce paramètre est actif, toutes les informations relatives aux performances des processeurs sont transmises par le BIOS système au système d'exploitation pour les besoins du contrôle. Le système d'exploitation définit les performances des processeurs sur la base de l'utilisation de ces derniers. Le paramètre Active Power Controller définit la puissance de l'unité centrale sur la valeur System DBPM, l'alimentation du ventilateur sur Minimum Power et celle de la mémoire sur Maximum Performance. Dans cette configuration, les performances du processeur sont contrôlée par le BIOS système. Maximum Performance (performance maximale) définit tous les champs sur l'option Maximum Performance (performance maximale). Si vous sélectionnez Custom (Personnalisé), vous pouvez configurer chaque option indépendamment. L’alimentation du processeur et la gestion des performances. Les options sont OS DBPM (DBPM?du système d'exploitation), System DBPM (DBPM du système), Maximum Performance (performance maximale) ou Minimum Power (Alimentation minimale). L’alimentation du ventilateur et la gestion des performances. Les options sont Maximum Performance (Performance maximale) et Minimum Power Alimentation minimale).86 Utilisation du programme de configuration du système et du gestionnaire de démarrage UEFI Boot Manager Écran System Security (Sécurité du système) Gestion de l'alimentation et des performances de la mémoire Les options disponibles sont Maximum Performance, une fréquence spécifiée, ou la valeur Minimum Power. Option Description System Password Affiche l'état actuel de fonction de la protection par mot de passe et permet l'assignation et la vérification d'un nouveau mot de passe système. REMARQUE : Pour plus d'informations, voir “Utilisation du mot de passe système”. Setup Password Limite l'accès au programme de configuration du système à l'aide d'un mot de passe de configuration. REMARQUE : Pour plus d'informations, voir “Utilisation du mot de passe système”. Password Status (Option par défaut : Unlocked ([Non verrouillé]) Lorsque le Setup Password (Mot de passe de configuration) est affecté et ce champ est Locked, (Verrouillé), le mot de passe système ne peut être ni modifié ni désactivé au démarrage du système. Pour plus d'informations, voir “Utilisation du mot de passe système”. TPM Security (Option par défaut : Off [Désactivé]) Définit les modalités de déclaration de la puce TPM (Trusted Platform Module) dans le système. Lorsque l'option Off (Désactivé) est sélectionnée, la présence de la puce TPM n'est pas signalée au système d'exploitation. Si l'option On with Pre-boot Measurements (Activé avec mesures pré-amorçage), le système signale la présence de la puce TPM au système d'exploitation et conserve les mesures pré-amorçage dans la puce pendant le POST. Lorsque l'option On without Pre-boot Measurements (Activé sans mesures pré-amorçage) est sélectionnée, le système signale la présence de la puce TPM au système d'exploitation et ignore les mesures pré-amorçage. Option DescriptionUtilisation du programme de configuration du système et du gestionnaire de démarrage UEFI Boot Manager 87 TPM Activation (Option par défaut :No Change [pas de changement]) Lorsque l'option Activate (Activer) est sélectionnée, la puce TPM est activée par défaut. Lorsque l'option Deactivate (Désactiver) est sélectionnée, la puce TPM est désactivée. L'état No Change (Pas de changement) ne lance aucune action. L'état de fonctionnement de la puce TPM reste inchangé (tous les paramètres utilisateur correspondants sont conservés). REMARQUE : lorsque le champ TPM Security (Sécurité TPM) est défini sur Off (Désactivé), ce champ est uniquement accessible en lecture. TPM Clear (Option par défaut : No) PRÉCAUTION : l'effacement de la puce TPM entraîne la perte de toutes les clés de cryptage qu'elle contient. Cette option empêche le démarrage du système d'exploitation. Si les clés de cryptage ne peuvent pas être restaurées, des données risquent d'être perdues. Vous devez donc impérativement créer une copie de sauvegarde des clés TPM avant d'activer cette option. Si l'option Yes,(Qui) est sélectionnée, le contenu intégral des clés TPM est effacé. REMARQUE : lorsque le champ TPM Security (Sécurité TPM) est défini sur Off (Désactivé), ce champ est uniquement accessible en lecture. Power Button (Option par défaut : Enabled [Activé]) Si l'option Enabled, (Activé) est sélectionnée, le bouton d'alimentation peut mettre le système sous tension et hors tension. Sur un système d'exploitation compatible ACPI, le système effectue un arrêt normal avant que l'alimentation ne soit coupée. Si vous sélectionnez Disabled (Désactivé), le bouton sert uniquement à mettre le système sous tension. Option Description88 Utilisation du programme de configuration du système et du gestionnaire de démarrage UEFI Boot Manager Écran Exit (Quitter) Appuyez sur pour quitter le programme de configuration du système. L'écran Exit affiche les options suivantes : • Save Changes and Exit (Enregistrer les modifications et quitter) • Discard Changes and Exit (Annuler les modifications et quitter) • Return to Setup (Revenir au programme de configuration) NMI Button (Bouton NMI) (Option par défaut : Disabled [Désactivé]) PRÉCAUTION : Appuyez sur ce bouton uniquement si un technicien de support qualifié vous demande de le faire, ou si cela est préconisé dans la documentation du système d'exploitation. Lorsque vous appuyez sur ce bouton, le système d'exploitation s'arrête et affiche un écran de diagnostic. Active ou désactive la fonction NMI. AC Power Recovery (Option par défaut : Last [Dernier]) Détermine le comportement du système au retour de l'alimentation secteur. L'option Last (Dernier) indique que le système doit revenir au même état qu'avant la coupure d'alimentation. Avec l'option On (Marche), le système démarre dès que l'alimentation en CA est rétablie. Avec l'option Off (Éteint), le système s'arrête dès que l'alimentation en CA est rétablie. AC Power Recovery Delay (Délai de restauration de l'alimentation) Détermine le délai au bout duquel le redémarrage du système a lieu après restauration de l'alimentation. Les options disponibles sont Immediate, Random (valeur aléatoire comprise entre 30 et 240 secondes) ou une valeur définie par l'utilisateur comprise entre 30 et 240 secondes. Option DescriptionUtilisation du programme de configuration du système et du gestionnaire de démarrage UEFI Boot Manager 89 Entering the UEFI Boot Manager (Accès au gestionnaire d'amorçage de l'UEFI) REMARQUE : Les systèmes d'exploitation doivent être compatibles avec une version UEFI 64 bits (comme par exemple Microsoft ® Windows Server ® 2008 version x64) pour pouvoir être installés à partir du mode d'amorçage UEFI. L'installation des systèmes d'exploitation DOS et 32 bits est possible uniquement à partir du mode d'amorçage sur le BIOS. REMARQUE : Le mode d'amorçage (Boot Mode) doit être configuré sur UEFI dans le programme de configuration du système pour permettre l'accès au gestionnaire d'amorçage UEFI. Le gestionnaire d'amorçage UEFI vous permet de : • Ajouter, supprimer et organiser les options d'amorçage • Accéder au programme de configuration du système et aux options d'amorçage BIOS sans nécessiter de redémarrage 1 Allumez ou redémarrez le système. 2 Appuyez sur dès que vous avez vu le message suivant : = Gestionnaire d'amorçage UEFI REMARQUE : Le système ne répond pas tant que le clavier USB n'est pas actif. Si le système d'exploitation commence à se charger alors que vous n'avez pas encore appuyé sur , laissez-le finir de démarrer, puis arrêtez-le et réessayez. Utilisation des touches de navigation du gestionnaire d'amorçage UEFI Touches Action Touche vers le haut Revient au champ précédent et le sélectionne. Flèche vers le bas Accède au champ suivant et le sélectionne. Barre d'espace, , <+>, <–>, Permet de faire défiler les paramètres disponibles pour un champ. <Échap> Régénère l'écran du gestionnaire d'amorçage UEFI, ou retourne à cet écran à partir des autres écrans de programme. Affiche l'aide sur le gestionnaire d'amorçage UEFI.90 Utilisation du programme de configuration du système et du gestionnaire de démarrage UEFI Boot Manager Écran de gestionnaire d'amorçage de l'UEFI UEFI Boot Settings Screen (Écran des paramètres d'amorçage de l'UEFI) Option Description Continuer Le système tente d'effectuer successivement l'amorçage sur différentes unités en commençant par la première de la liste. En cas d'échec de l'amorçage, le système poursuit l'opération en sélectionnant l'entrée suivante de la liste d'amorçage, jusqu'à ce que le démarrage aboutisse ou qu'aucune autre option ne soit disponible. Affiche la liste des options d'amorçage disponibles (marquées par des astérisques). Sélectionnez l'option d'amorçage souhaitée et appuyez sur Entrée. REMARQUE : Si vous procédez à l'ajout à chaud d'un périphérique de démarrage, appuyez sur pour régénérer la liste des options d'amorçage. Paramètres d'amorçage de l'UEFI Vous permet d'ajouter, supprimer, activer ou désactiver les options d'amorçage, de modifier l'ordre des options d'amorçage ou de lancer une option d'amorçage à exécution unique. Utilitaires du système Vous permet d'accéder au programme de configuration du système, aux services système et aux options d'amorçage au niveau du BIOS. Option Description Ajout d'options d'amorçage Ajoute une nouvelle option d'amorçage. Suppression d'une option d'amorçage Supprime une option d'amorçage existante. Activation/désactivation de l'option d'amorçage Désactive et active une option d'amorçage dans la liste des options d'amorçage. Modifier l'ordre d'amorçage (Change Boot Order) Modifie l'ordre de la liste d'option d'amorçage. One-Time Boot From File (Amorçage en un temps à partir du fichier) Définit une option d'amorçage en un temps qui ne figure pas sur la liste des options d'amorçage.Utilisation du programme de configuration du système et du gestionnaire de démarrage UEFI Boot Manager 91 Écran des utilitaires du système Mot de passe système et mot de passe de configuration REMARQUE : En cas d'oubli du mot de passe, consultez la rubrique “Désactivation d'un mot de passe oublié”. À la livraison de l'ordinateur, la fonction de protection du système par mot de passe n'est pas activée dans le BIOS. PRÉCAUTION : Personne ne peut accéder aux données enregistrées sur votre système si le système est en cours de fonctionnement et sans surveillance. Utilisation du mot de passe système Quand un mot de passe système est attribué, le système vous invite à entrer le mot de passe après le déploiement du système.Seul les systèmes dotés de mots de passe peuvent accéder pleinement au système. Attribution d'un mot de passe système Avant d'attribuer un mot de passe système, accédez au programme de configuration du système et vérifiez l'option System Password (Mot de passe système). Option Description Configuration du système Accède au programme de configuration du système sans redémarrage. Services du système Redémarre le système et donne accès au configurateur du serveur unifié qui vous permet d'exécuter les utilitaires tels que les diagnostics du système. BIOS Boot Manager (Gestionnaire d'amorçage du BIOS) Donne accès à la liste des options d'amorçage au niveau du BIOS sans redémarrage. Cette option vous permet de basculer aisément en mode d'amorçage BIOS lorsque vous devez effectuer le démarrage à partir d'un périphérique contenant un système d'exploitation non compatible avec UEFI, tel qu'un support DOS amorçable contenant un logiciel de diagnostics. Redémarrer le système Redémarre le système.92 Utilisation du programme de configuration du système et du gestionnaire de démarrage UEFI Boot Manager Si un mot de passe système est assigné, le System Password (Mot de passe du système) est Enabled (Activé). Si l'option Password Status (Statut du mot de passe) est Unlocked (déverrouillée), vous pouvez changer le mot de passe système. Si l'option Locked (verrouillé) est sélectionnée, vous ne pouvez pas changer le mot de passe système. La désactivation du cavalier de mot de passe, situé sur la carte système, définit l'option System Password (Mot de passe du système) sur Disabled, (Désactivé) et vous ne pouvez pas changer ou saisir un nouveau mot de passe système. Si aucun mot de passe système n'est attribué et si le cavalier de mot de passe de la carte système est en position d'activation, l'option System Password (Mot de passe système) est définie sur Not Enabled (Non activé) et le Password Status (État du mot de passe) est Unlocked (Non verrouillé). Pour attribuer un mot de passe système : 1 Vérifiez que l'option Password Status (Etat du mot de passe) est Unlocked (Non verrouillée). 2 Sélectionnez System Password (Mot de passe système) et appuyez sur . 3 Saisissez le nouveau mot de passe système. Le mot de passe peut contenir jusqu'à 32 caractères. Lorsque vous appuyez sur la touche, un espace réservé apparaît dans le champ. Le mot de passe ne tient pas compte de la différence entre majuscules et minuscules. Pour supprimer un caractère, appuyez sur la touche ou sur la touche fléchée vers la gauche. REMARQUE : Pour quitter le champ sans attribuer de mot de passe, appuyez sur pour passer à un autre champ, ou bien appuyez sur <Échap> à tout moment avant la fin de l'étape 5. 4 Appuyez sur . 5 Pour confirmer le mot de passe, saisissez-le une seconde fois et appuyez sur . L'option System Password (Mot de passe système) passe à Enabled (Activé). Quittez le programme de configuration et commencez à utiliser le système.Utilisation du programme de configuration du système et du gestionnaire de démarrage UEFI Boot Manager 93 6 Vous pouvez redémarrer le système immédiatement pour activer la protection par mot de passe ou simplement continuer à travailler. REMARQUE : La protection par mot de passe ne prend effet que lorsque vous redémarrez le système. Protection de l'ordinateur à l'aide d'un mot de passe système REMARQUE : si vous avez attribué un mot de passe de configuration (voir “Utilisation du mot de passe de configuration”, à la page 94), le système l'accepte également comme mot de passe système. Lorsque l'option Password Status (Etat du mot de passe) est Unlocked (Désactivée), vous avez la possibilité de laisser la protection par mot de mot de passe activée ou désactivée. Pour laisser la protection par mot de passe activée : 1 Démarrez le système ou redémarrez-le en appuyant sur . 2 Saisissez le mot de passe et appuyez sur . Pour désactiver la protection par mot de passe : 1 Démarrez le système ou redémarrez-le en appuyant sur . 2 Saisissez le mot de passe et appuyez sur . Si l'option Password Status (État du mot de passe) est Locked (Verrouillée), vous devez taper le mot de passe et appuyer sur lorsque le système vous y invite pour redémarrer l'ordinateur. Si vous saisissez un mot de passe incorrect, le système affiche un message et vous invite à recommencer. Vous disposez de trois tentatives pour entrer le bon mot de passe. Au bout de trois tentatives infructueuses, le système affiche un message d'erreur signalant qu'un blocage du système s'est produit et que l'arrêt de celui-ci doit être effectué manuellement au moyen du bouton d'alimentation. Même si vous avez éteint et redémarré le système, le message d'erreur continue à s'afficher jusqu'à ce que le bon mot de passe soit entré. REMARQUE : Vous pouvez combiner l'utilisation des paramètres Password Status (État du mot de passe), System Password (Mot de passe système) et Setup Password (Mot de passe de configuration) pour mieux protéger le système contre toute modification non autorisée.94 Utilisation du programme de configuration du système et du gestionnaire de démarrage UEFI Boot Manager Modification d'un mot de passe du système 1 Pour accéder au programme de configuration du système, appuyez sur pendant l'autotest de démarrage. 2 Sélectionnez l'écran System Security (Sécurité du système). 3 Vérifiez que l'option Password Status (État du mot de passe) est Unlocked.(Non verrouillée) 4 Tapez le nouveau mot de passe système dans les deux champs du mot de passe. Le champ System Password (Mot de passe du système) a la valeur Not Enabled (Non activé) si le mot de passe est supprimé. Désactivation du mot de passe système Si le mot de passe système est déjà défini, vous pouvez le désactiver en saisissant le mot de passe pendant le POST et en appuyant sur , ou vous pouvez entrer dans le programme de configuration du système et appuyer sur deux fois si vous êtes dans le menu du mot de passe système. Utilisation du mot de passe de configuration Attribution d'un mot de passe de configuration Vous ne pouvez attribuer un mot de passe de configuration que si l'option Setup Password (Mot de passe de configuration) est Not Enabled (Non activée). Pour attribuer un mot de passe de configuration, sélectionnez l'option Setup Password (Mot de passe de configuration) et appuyez sur la touche <+> ou <–>. Le système vous invite à entrer et à confirmer le mot de passe. REMARQUE : le mot de passe de configuration peut être identique à celui du système. Si les deux mots de passe sont différents, le mot de passe de configuration peut être utilisé à la place du mot de passe système, Le mot de passe système ne peut pas être utilisé à la place du mot de passe de configuration. Le mot de passe peut contenir jusqu'à 32 caractères. Lorsque vous appuyez sur la touche, un espace réservé apparaît dans le champ.Utilisation du programme de configuration du système et du gestionnaire de démarrage UEFI Boot Manager 95 Le mot de passe ne tient pas compte de la différence entre majuscules et minuscules. Pour supprimer un caractère, appuyez sur la touche ou sur la touche fléchée vers la gauche. Une fois le mot de passe confirmé, le paramètre Setup Password (Mot de passe de configuration) prend la valeur Enabled (Activé). La prochaine fois que vous accéderez au programme de configuration, le système vous demandera d'entrer le mot de passe de configuration. La modification du mot de passe de configuration prend effet immédiatement (il n'est pas nécessaire de redémarrer le système). Fonctionnement du système avec un mot de passe de configuration activé Si l'option Setup Password (Mot de passe de configuration) a la valeur Enabled (Activé), vous devez entrer ce mot de passe avant de modifier la plupart des options de configuration du système. Si vous n'entrez pas le bon mot de passe au bout de trois essais, vous pouvez visualiser les écrans de configuration du système mais vous ne pouvez y apporter aucune modification. La seule exception est la suivante : si l'option System Password (Mot de passe système) n'est pas Enabled (Activée) et n'est pas verrouillée via l'option Password Status (Etat du mot de passe), vous pouvez attribuer un mot de passe système. Vous ne pouvez ni désactiver ni changer un mot de passe système existant. REMARQUE : il est possible de combiner l'utilisation des options Password Status (État du mot de passe) et Setup Password (Mot de passe de configuration) pour empêcher toute modification du mot de passe système. Suppression ou modification d'un mot de passe de configuration existant 1 Accédez au programme de configuration du système et sélectionnez l'option System Security (Sécurité du système). 2 Mettez en surbrillance l'option Setup Password (Mot de passe de configuration) et appuyez sur pour accéder à la fenêtre du mot de passe de configuration. Appuyez sur deux fois pour effacer le mot de passe de configuration existant. Le paramètre prend la valeur Not Enabled (Non activé). 3 Si vous souhaitez attribuer un nouveau mot de passe de configuration, suivez les étapes décrites dans la section “Attribution d'un mot de passe de configuration”.96 Utilisation du programme de configuration du système et du gestionnaire de démarrage UEFI Boot Manager Utilitaire de configuration iDRAC L'utilitaire de configuration iDRAC est un environnement de configuration de prédémarrage vous permettant d'afficher et de définir les paramètres de la carte iDRAC6 et du serveur géré. L'utilitaire de configuration iDRAC vous permet de : • Configurer, activer ou désactiver le réseau local iDRAC6 via le port dédié de la carte iDRAC6 Enterprise ou les cartes NIC intégrées. • D'activer ou de désactiver IPMI sur le LAN. • D'activer une destination d'interruption d'événements sur plate-forme (PET) LAN. • De connecter ou de déconnecter les périphériques Virtual Media • De changer le nom et le mot de passe de l'utilisateur administratif et de gérer les privilèges de l'utilisateur. • D'afficher les messages du journal des événements système (SEL) ou d'effacer les messages du journal. Pour plus d'informations sur l'utilisation de la carte iDRAC6, consultez sa documentation et celle des applications de gestion de systèmes. Accès à l'utilitaire de configuration iDRAC 1 Allumez ou redémarrez le système. 2 Appuyez sur lorsque vous y êtes invité pendant le POST. Si le système d'exploitation commence à se charger alors que vous n'avez pas encore appuyé sur , laissez le démarrage s'exécuter jusqu'à son terme, puis redémarrez le système et effectuez une nouvelle tentative.Installation des composants du système 97 Installation des composants du système REMARQUE : Les procédures et les figures décrites dans ce chapitre supposent que votre système est configuré en tour. S'il est configuré en rack, ignorez toute étape demandant de le poser sur le côté et de faire pivoter ses pieds. Outils recommandés • Clé du verrou du système • Tournevis cruciformes n° 1 et n° 2 • Bracelet antistatique • Tournevis Torx T1098 Installation des composants du système À l'intérieur du système Figure 3-1. À l'intérieur du système 1 3 5 14 2 6 15 9 10 8 7 16 17 13 11 12 4Installation des composants du système 99 Cadre avant Le cadre est muni d'un verrou qui permet de limiter l'accès aux disques durs. Vous devez retirer ce cadre avant de retirer ou d'installer ces lecteurs. Retrait du cadre avant 1 Poussez le levier dans le sens de la flèche jusqu'à ce que le cadre se dégage du haut du châssis (voir figure 3-2). 2 Retirez le cadre en le tirant par le haut et en dégageant ses pattes des fentes de fixation du châssis (voir figure 3-2). Installation du cadre avant 1 Emboîtez les pattes du cadre dans les fentes de fixation correspondantes du châssis. Voir figure 3-2. 2 Appuyez fermement sur le haut du cadre pour l'emboîter sur le châssis, jusqu'à ce que le levier s'enclenche. 3 Verrouillez le cadre à l'aide de la clé du système. 1 capot du système 2 carénage de refroidissement 3 logements de cartes d'extension PCIe (5) 4 cache du dissipateur de chaleur (configuration monoprocesseur) 5 baies d'alimentation (2) 6 barrettes de mémoire (jusqu'à 12 au total, 6 par processeur) 7 dissipateur de chaleur et processeur (1 ou 2) 8 stabilisateurs (4) 9 module USB interne 10 disques durs SAS ou SATA (jusqu'à 8) 11 panneau de commande 12 lecteur de bande (en option) 13 lecteur optique (en option) 14 module SD interne (en option) 15 carte contrôleur de stockage intégrée 16 dispositif antibasculement 17 pile RAID (en option)100 Installation des composants du système Figure 3-2. Retrait et installation du cadre avant Ouverture et fermeture du système AVERTISSEMENT : Demandez toujours de l'aide avant de soulever le système. N'essayez pas de le soulever seul, car vous risqueriez de vous blesser. Ouverture du système 1 À moins que vous n'installiez un composant enfichable à chaud tel qu'un disque dur ou un bloc d'alimentation, vous devez arrêter le système et les périphériques connectés, puis le débrancher de la prise secteur et des périphériques. 2 Retirez le cadre avant. Voir “Retrait du cadre avant”. 3 Faites pivoter les pieds du système vers l'intérieur. Voir figure 3-3. 4 Couchez le système sur le côté comme indiqué dans la figure 3-3. 1 cadre avant 2 levier 3 fentes d'insertion (2) 4 pattes du cadre (2) 4 2 1 3Installation des composants du système 101 5 Tournez le verrou du loquet d'éjection du capot dans le sens inverse des aiguilles d'une montre pour le déverrouiller. Voir figure 3-3. 6 Tirez le loquet d'éjection du capot, puis faites pivoter ce bord du capot pour le dégager du système. Voir figure 3-3. 7 Saisissez le capot de chaque côté et soulevez-le avec précaution pour le retirer du système. Figure 3-3. Ouverture et fermeture du système 1 loquet d'éjection du capot 2 verrou du loquet d'éjection du capot 3 capot du système 4 pieds (4) 4 3 1 2102 Installation des composants du système Fermeture du système 1 Vérifiez que tous les câbles internes sont connectés et pliés de manière à ne pas entraver la fermeture du capot. 2 Vérifiez qu'il ne reste ni outils ni pièces détachées à l'intérieur de l'ordinateur. 3 Réinstallez le capot du système : a Emboîtez le bord inférieur du capot, opposé au loquet d'éjection, dans les fentes de fixation du châssis. b Descendez le capot vers le châssis. c Emboîtez le bord du capot muni du loquet dans le châssis jusqu'à ce qu'il s'enclenche. d Verrouillez le capot en tournant le verrou du loquet dans le sens des aiguilles d'une montre. 4 Redressez le système et posez-le (sur ses pieds) sur une surface plane et stable. 5 Faites pivoter les pieds du système vers l'extérieur. 6 Réinstallez le cache avant. Voir “Installation du cadre avant”. 7 Reconnectez les périphériques, le cas échéant, puis branchez le système sur la prise secteur. 8 Mettez le système et les périphériques connectés sous tension. Disques durs Suivant le type de châssis et de fond de panier dont votre système est équipé, celui-ci peut adopter l'une des configurations suivantes : • Huit baies d'unités 2,5 pouces • Huit baies de lecteur de 3,5 pouces Tous les châssis acceptent les disques durs SAS et SATA remplaçables à chaud et le châssis pour baie 2,5 pouces prend également en charge les disques durs SSD remplaçables à chaud sur les systèmes équipés de contrôleurs PERC intégrés.Installation des composants du système 103 Toutes les unités sont installées à l'avant du système et connectées à la carte système par l'intermédiaire du fond de panier SAS. Les disques durs sont fournis dans des supports de lecteur spéciaux remplaçables à chaud, qui s'encastrent dans les baies de disques durs. PRÉCAUTION : Avant de retirer ou d'installer un lecteur pendant que le système est en cours de fonctionnement, reportez-vous à la documentation relative à la carte contrôleur de stockage pour vérifier que la configuration de l'adaptateur hôte lui permet de prendre en charge le retrait et l'insertion de lecteurs à chaud. PRÉCAUTION : Pendant le formatage du lecteur, vous ne devez pas éteindre ni redémarrer le système. Cela risquerait d'endommager le lecteur. REMARQUE : Utilisez uniquement des unités ayant été testées et approuvées pour une utilisation avec la carte de fond de panier SAS. Lorsque vous formatez un disque dur à haute capacité, prévoyez suffisamment de temps pour que le formatage s'exécute entièrement. N'oubliez pas que le formatage d'un disque dur haute capacité peut prendre plusieurs heures. Configurations de disques mixtes SAS/SATA Les configurations mixtes comprenant des unités SAS et SATA sont autorisées. Dans cette configuration, deux unités SAS doivent être installées dans les emplacements 0 et 1 uniquement. Vous pouvez installer jusqu'à six lecteurs SATA dans les autres logements. Les configurations mixtes à lecteurs SAS et SATA de 2,5 et 3,5 pouces sont également prises en charge, mais uniquement par les châssis à baies de 3,5 pouces. Dans ce type de configuration, vous devez utiliser deux lecteurs SAS de 2,5 pouces de 10000 tpm installés dans des adaptateurs de 3,5 pouces et les placer uniquement dans les logements de disque dur 0 et 1. Les disques durs restants doivent être de format 3,5 pouces et de type SAS ou SATA. Retrait d'un cache de disque dur PRÉCAUTION : Pour assurer un refroidissement correct du système, vous devez installer un cache sur toutes les baies de disque dur inoccupées. 1 Retirez le cadre avant. Voir “Retrait du cadre avant”. 2 Saisissez la partie avant du cache de disque dur, exercez une pression sur le levier d'éjection situé sur la partie droite, puis extrayez le cache de la baie. Voir figure 3-4.104 Installation des composants du système Figure 3-4. Retrait et installation d'un cache de disque dur Installation d'un cache de disque dur Alignez le cache de disque dur avec la baie d'unité et insérez-le dans la baie jusqu'à ce que le levier d'éjection se mette en place en émettant un déclic. Retrait d'un disque dur remplaçable à chaud PRÉCAUTION : Afin d'éviter toute perte de données, vérifiez que votre système d'exploitation prend en charge le retrait et l'installation de lecteurs à chaud. Consultez la documentation de votre système d'exploitation pour plus d'informations. 1 Retirez le cadre avant. Voir “Retrait du cadre avant”. 2 Préparez le retrait de l'unité à partir du logiciel de gestion RAID. Attendez que les voyants du support de disque dur indiquent que le lecteur peut être retiré en toute sécurité. Pour plus d'informations sur le retrait d'un lecteur enfichable à chaud, voir la documentation de votre contrôleur. 1 cache de disque dur 3,5 pouces 2 cache de disque dur 2,5 pouces 3 loquet d'éjection 3 1 2 3Installation des composants du système 105 Si le lecteur était en ligne, le voyant d'activité/panne vert clignote lors de la procédure de mise hors tension. Quand les deux voyants sont éteints, vous pouvez retirer l'unité. 3 Appuyez sur le bouton situé à l'avant du support d'unité et mettez la poignée du support en position ouverte afin de débloquer l'unité. Voir figure 3-5. 4 Faites glisser le disque de la baie. 5 Insérez un cache d'unité dans la baie vacante. Voir “Installation d'un cache de disque dur”. PRÉCAUTION : Pour assurer un refroidissement correct du système, vous devez installer un cache sur toutes les baies de disque dur inoccupées. 6 Installez le cadre avant. Voir “Installation du cadre avant”. Installation d'un disque dur remplaçable à chaud PRÉCAUTION : Lorsque vous installez un disque dur, assurez-vous que les lecteurs adjacents ne sont pas en cours d'installation. Si vous insérez un support de disque dur et tentez d'en verrouiller la poignée alors qu'un support de disque dur voisin n'est que partiellement installé, vous risquez d'endommager le ressort de protection de ce dernier et de le rendre inutilisable. PRÉCAUTION : Vérifiez que votre système d'exploitation prend en charge l'installation à chaud de disques durs. Consultez la documentation fournie avec le système d'exploitation. 1 Retirez le cadre avant. Voir “Retrait du cadre avant”. 2 Si la baie est fermée par un cache, retirez-le. Voir “ Installation d'un cache de disque dur ”.106 Installation des composants du système Figure 3-5. Installation d'un disque dur remplaçable à chaud 3 Installez le disque dur remplaçable à chaud. a Appuyez sur le bouton situé à l'avant du support d'unité et mettez la poignée en position ouverte. b Insérez le support de disque dans la baie jusqu'à ce qu'il touche le fond de panier. c Refermez la poignée pour maintenir le disque dur en place. 4 Réinstallez le cache avant. Voir “Installation du cadre avant”. Retrait d'un disque dur installé dans un support Retirez les vis situées sur les rails coulissants du support de disque dur, puis retirez le disque dur. Voir figure 3-6. Installation d'un disque dur dans un support 1 Insérez le disque dur dans le support, connecteur vers l'arrière. Voir figure 3-6. 2 Alignez les trous de vis du disque dur sur ceux de l'arrière du support. 1 bouton de verrouillage 2 poignée du support 2 1Installation des composants du système 107 Si la position est correcte, l'arrière du disque dur arrive au même niveau que l'arrière du support. 3 Fixez le disque dur sur le support à l'aide des quatre vis. Figure 3-6. Installation d'un disque dur dans un support 1 support du disque dur 2 vis (4) 3 disque dur 4 trou de vis SAS 1 3 2 4108 Installation des composants du système Blocs d'alimentation Votre système prend en charge les modules d'alimentation suivants : • Alimentation 570 W à consommation d'énergie intelligente • Alimentation optionnelle 870 W à haute performance REMARQUE : La puissance maximale est indiquée sur l'étiquette du bloc d'alimentation. REMARQUE : Les installations mixtes comprenant une alimentation haute performance et une alimentation à consommation intelligente ne sont pas en prises charge par le système. Si le système contient un seul bloc d'alimentation, celui-ci doit être installé dans la première baie. PRÉCAUTION : En cas de configuration non redondante, le cache de bloc d'alimentation doit être installé dans la deuxième baie pour assurer un refroidissement correct du système. Voir “Installation d'un cache de bloc d'alimentation”. Retrait d'un bloc d'alimentation PRÉCAUTION : Si le dépannage concerne une erreur liée à la non-conformité de l'alimentation électrique, remplacez uniquement le bloc d'alimentation signalé par un indicateur clignotant. L'inversion des blocs d'alimentation dans le but de les faire correspondre peut générer une erreur et entraîner l'arrêt imprévu du système. Pour passer d'une configuration haute performance (High Output) à une configuration économe (Energy Smart) ou ou vice versa, vous devez mettre le système hors tension. REMARQUE : Vous devrez peut-être débloquer et relever le passe-câbles, s'il gêne le retrait du bloc d'alimentation. Pour plus d'informations sur le passe-câbles, reportez-vous à la documentation relative au rack. 1 Débranchez le câble de la source d'alimentation électrique et du bloc à retirer, puis détachez les câbles de la bande Velcro. 2 Appuyez sur le loquet de dégagement et retirez le bloc d'alimentation du châssis. Voir figure 3-7.Installation des composants du système 109 Figure 3-7. Retrait et installation d'un bloc d'alimentation Installation d'un bloc d'alimentation 1 Si votre système est équipé de blocs d'alimentation redondants, vérifiez que les deux blocs sont de même type et de même puissance de sortie maximale. REMARQUE : La puissance de sortie maximale d'un bloc d'alimentation (en watts) est marquée près du centre de l'étiquette du bloc. 2 Faites glisser le bloc d'alimentation dans le châssis jusqu'à ce qu'il se mette en place complètement et que le loquet de dégagement se positionne correctement. Voir figure 3-7. REMARQUE : Si vous avez débloqué le bras de gestion des câbles à l'étape 2 de la procédure précédente, réenclenchez-le. Pour plus d'informations sur le passe-câbles, reportez-vous à la documentation relative au rack. 1 poignée du bloc d'alimentation 2 bande Velcro 3 loquet d'éjection 1 2 3110 Installation des composants du système 3 Connectez le câble d'alimentation au bloc d'alimentation et branchez son autre extrémité sur une prise secteur. PRÉCAUTION : Lors du branchement du câble d'alimentation, fixez celui-ci à l'aide de la bande Velcro. REMARQUE : Après avoir installé un nouveau bloc d'alimentation à chaud, patientez quelques secondes pour permettre au système de le reconnaître et de vérifier qu'il fonctionne correctement. Le voyant d'état du bloc d'alimentation est vert si le bloc fonctionne normalement (voir figure 1-5). Retrait d'un cache de bloc d'alimentation Si vous installez un deuxième bloc d'alimentation, retirez le cache présent dans la baie en insérant le doigt dans le trou central et en tirant fort. PRÉCAUTION : Si un seul bloc d'alimentation est installé, vous devez installer un cache sur la baie vide pour assurer un refroidissement correct du système. Retirez le cache uniquement si vous installez un second bloc d'alimentation. Installation d'un cache de bloc d'alimentation REMARQUE : Le cache de bloc d'alimentation ne doit être installé que sur la seconde baie d'alimentation. Pour installer le cache de bloc d'alimentation, alignez-le sur la baie d'alimentation, puis insérez-le dans le châssis jusqu'à ce qu'il se mette en place en émettant un déclic. Dispositif antibasculement Retrait du dispositif antibasculement 1 Mettez le système et les périphériques connectés hors tension, puis débranchez le système de la prise secteur et des périphériques. 2 Ouvrez le système. Voir “Ouverture du système”. 3 Appuyez sur la patte de dégagement, puis soulevez le dispositif antibasculement pour l'extraire des fentes du châssis. Voir figure 3-8.Installation des composants du système 111 Figure 3-8. Retrait et installation du dispositif antibasculement Installation du dispositif antibasculement 1 Emboîtez le bord du dispositif antibasculement dans les fentes du châssis jusqu'à ce que la patte de dégagement se verrouille. Voir figure 3-8. 2 Refermez le système. Voir “Fermeture du système”. 3 Redressez le système et posez-le (sur ses pieds) sur une surface plane et stable. 4 Reconnectez les périphériques, le cas échéant, puis branchez le système sur la prise secteur. 5 Mettez le système et les périphériques connectés sous tension. 1 languette de dégagement 2 dispositif antibasculement 3 fentes du châssis 1 2 3112 Installation des composants du système Carénage de refroidissement Retrait du carénage de refroidissement AVERTISSEMENT : Les barrettes de mémoire et les dissipateurs de chaleur restent chauds un certain temps après la mise hors tension du système. Laissezles refroidir avant de les manipuler. PRÉCAUTION : Ne faites jamais fonctionner le système si le carénage de refroidissement a été retiré. Le système pourrait surchauffer rapidement et s'arrêter, entraînant une perte de données. 1 Mettez le système et les périphériques connectés hors tension, puis débranchez le système de la prise secteur et des périphériques. 2 Ouvrez le système. Voir “Ouverture du système”. 3 Retirez le dispositif antibasculement des cartes d'extension. Voir “Retrait du dispositif antibasculement”. 4 Actionnez le loquet d'éjection du carénage de refroidissement dans le sens de la flèche et maintenez-le dans cette position, puis soulevez le carénage pour l'extraire du châssis en le tenant par les ergots. Voir figure 3-9.Installation des composants du système 113 Figure 3-9. Installation et retrait du carénage de refroidissement Installation du carénage de refroidissement 1 Descendez doucement le carénage dans le châssis, en emboîtant ses bords dans les rails d'alignement du châssis. Vérifiez qu'aucun câble n'est coincé sous le dispositif antibasculement, puis appuyez sur ce dernier jusqu'à ce que loquet d'éjection s'enclenche. Voir figure 3-9. 2 Retirez le dispositif antibasculement des cartes d'extension. Voir “Installation du dispositif antibasculement”. 3 Refermez le système. Voir “Fermeture du système”. 4 Redressez le système et posez-le (sur ses pieds) sur une surface plane et stable. 5 Reconnectez les périphériques, le cas échéant, puis branchez le système sur la prise secteur. 6 Mettez le système et les périphériques connectés sous tension. 1 ergots (2) 2 loquet d'éjection 3 carénage de refroidissement 2 1 3 1114 Installation des composants du système Ventilateurs Votre système est équipé d'un ou de deux modules de ventilation, contenant chacun deux ventilateurs, montés sous le carénage de refroidissement. Un deuxième module de refroidissement est facultatif et assure la redondance des modules de ventilation. Retrait d'un module de ventilation AVERTISSEMENT : Les ventilateurs peuvent continuer à tourner quelque temps après l'arrêt du système. Laissez-les s'arrêter avant de les manipuler. PRÉCAUTION : Pour le refroidissement correct du système, au moins un module de ventilation doit être installé en permanence dans le logement extérieur du carénage (voir figure 3-10). 1 Mettez le système et les périphériques connectés hors tension, puis débranchez le système de la prise secteur et des périphériques. 2 Ouvrez le système. Voir “Ouverture du système”. 3 Retirez le dispositif antibasculement des cartes d'extension. Voir “Retrait du dispositif antibasculement”. 4 Retirez le carénage de refroidissement (voir “Retrait du carénage de refroidissement”), puis retournez-le. 5 Poussez les pattes de dégagement du module de ventilation, puis faites glisser le module pour l'extraire du carénage de refroidissement. Voir figure 3-10.Installation des composants du système 115 Figure 3-10. Retrait et installation d'un module de ventilation Installation d'un module de ventilation PRÉCAUTION : Ne faites jamais fonctionner votre système sans avoir installé au moins un module de ventilation. Si vous n'en installez qu'un seul, insérez-le dans le logement extérieur du carénage de refroidissement. 1 Tenez le module de ventilation de remplacement par les pattes de dégagement, puis alignez celles-ci sur les fentes de fixation du carénage de refroidissement. 2 Insérez le module dans le carénage de refroidissement jusqu'à ce que ses pattes de dégagement se verrouillent. Voir figure 3-10. 1 pattes de dégagement (2) 2 module de ventilation 3 carénage de refroidissement 4 logement de module de ventilation extérieur 2 3 1 4 1116 Installation des composants du système 3 Installez le carénage de ventilation. Voir “Installation du carénage de refroidissement”. 4 Retirez le dispositif antibasculement des cartes d'extension. Voir “Installation du dispositif antibasculement”. 5 Refermez le système. Voir “Fermeture du système”. 6 Redressez le système et posez-le (sur ses pieds) sur une surface plane et stable. 7 Reconnectez les périphériques, le cas échéant, puis branchez le système sur la prise secteur. 8 Mettez le système et les périphériques connectés sous tension. Module SD interne Installation du module SD interne 1 Mettez le système et les périphériques connectés hors tension, puis débranchez le système de la prise secteur. 2 Ouvrez le système. Voir “Ouverture du système”. 3 Retirez le dispositif antibasculement des cartes d'extension. Voir “Retrait du dispositif antibasculement”. 4 Retirez le carénage de ventilation. Voir “Retrait du carénage de refroidissement”. 5 Positionnez le module de sorte que les pattes situées sous le plateau se mettent en place sur les crochets du châssis, puis abaissez le bord opposé de la carte afin de mettre celle-ci en place. Voir figure 3-11.Installation des composants du système 117 Figure 3-11. Installation du module SD interne 6 Reliez le connecteur du module SD interne au connecteur J_SDCARD de la carte système à l'aide du câble du module. Voir figure 6-1 pour identifier l'emplacement du connecteur sur la carte système. 1 languette de dégagement 2 connecteur du câble du module SD interne 3 loquet 4 carte flash SD 5 logement de la carte SD (connecteur SD) 6 module SD interne 7 crochets de retenue (2) 6 7 4 1 2 3 5118 Installation des composants du système 7 Installez le carénage de ventilation. Voir “Installation du carénage de refroidissement”. 8 Retirez le dispositif antibasculement des cartes d'extension. Voir “Installation du dispositif antibasculement”. 9 Refermez le système. Voir “Fermeture du système”. 10 Redressez le système et posez-le (sur ses pieds) sur une surface plane et stable. 11 Reconnectez les périphériques, le cas échéant, puis branchez le système sur la prise secteur. 12 Mettez le système et les périphériques connectés sous tension. Retrait du module SD interne 1 Mettez le système et les périphériques connectés hors tension, puis débranchez le système de la prise secteur. 2 Ouvrez le système. Voir “Ouverture du système”. 3 Retirez le dispositif antibasculement des cartes d'extension. Voir “Retrait du dispositif antibasculement”. 4 Retirez le carénage de ventilation. Voir “Retrait du carénage de refroidissement”. 5 Débranchez le câble reliant le module SD interne à la carte système de ces périphériques. 6 Levez le loquet fixant le module SD interne au châssis, puis extrayez le module du châssis. Voir figure 3-11. 7 Installez le carénage de ventilation. Voir “Installation du carénage de refroidissement”. 8 Retirez le dispositif antibasculement des cartes d'extension. Voir “Installation du dispositif antibasculement”. 9 Refermez le système. Voir “Fermeture du système”. 10 Redressez le système et posez-le (sur ses pieds) sur une surface plane et stable. 11 Reconnectez les périphériques, le cas échéant, puis branchez le système sur la prise secteur. 12 Mettez le système et les périphériques connectés sous tension.Installation des composants du système 119 Carte flash SD interne Installation d'une carte Flash SD interne REMARQUE : Pour utiliser une carte SD avec le système, vérifiez que le port correspondant est activé dans le programme de configuration du système. Voir “Utilisation du programme de configuration du système et du gestionnaire de démarrage UEFI Boot Manager”. 1 Mettez le système et les périphériques connectés hors tension, puis débranchez le système de la prise secteur et des périphériques. 2 Ouvrez le système. Voir “Ouverture du système”. 3 Repérez le connecteur de carte SD sur le module SD interne puis, l'étiquette étant orientée vers le haut, insérez l'extrémité de la carte munie de contacts dans le logement. Voir figure 3-11. REMARQUE : Le logement est muni d'un détrompeur qui permet de s'assurer que la carte sera insérée dans le bon sens. 4 Exercez une pression sur la carte jusqu'à ce que qu'elle se mette en place. 5 Refermez le système. Voir “Fermeture du système”. 6 Redressez le système et posez-le (sur ses pieds) sur une surface plane et stable. 7 Reconnectez les périphériques, le cas échéant, puis branchez le système sur la prise secteur. 8 Mettez le système et les périphériques connectés sous tension. Retrait d'une carte Flash SD interne 1 Mettez le système et les périphériques connectés hors tension, puis débranchez le système de la prise secteur. 2 Ouvrez le système. Voir “Ouverture du système”. 3 Identifiez le logement de carte SD sur le module SD interne, appuyez sur la carte afin de la déverrouiller, puis retirez-la. 4 Refermez le système. Voir “Fermeture du système”. 5 Redressez le système et posez-le (sur ses pieds) sur une surface plane et stable.120 Installation des composants du système 6 Reconnectez les périphériques, le cas échéant, puis branchez le système sur la prise secteur. 7 Mettez le système et les périphériques connectés sous tension. Module USB interne Retrait du module USB interne 1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise secteur. 2 Ouvrez le système. Voir “Ouverture du système”. 3 Retirez le dispositif antibasculement des cartes d'extension. Voir “Retrait du dispositif antibasculement”. 4 Retirez le carénage de ventilation. Voir “Retrait du carénage de refroidissement”. 5 Débranchez le câble du module USB interne du connecteur de la carte système, puis retirez-le du passe-câbles du châssis. Voir figure 3-12. 6 Soulevez la patte de dégagement, puis faites glisser le module USB interne afin de l'extraire des fentes du châssis. Voir figure 3-12. 7 Installez le carénage de ventilation. Voir “Installation du carénage de refroidissement”. 8 Retirez le dispositif antibasculement des cartes d'extension. Voir “Installation du dispositif antibasculement”. 9 Refermez le système. Voir “Fermeture du système”. 10 Redressez le système et posez-le (sur ses pieds) sur une surface plane et stable. 11 Reconnectez les périphériques, le cas échéant, puis branchez le système sur la prise secteur. 12 Mettez le système et les périphériques connectés sous tension.Installation des composants du système 121 Figure 3-12. Retrait et installation du module USB interne Installation du module USB interne 1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise secteur. 1 fentes du châssis 2 passe-câbles 3 pattes du module 4 clé de mémoire USB 5 connecteur de câble 6 module USB interne 7 patte de dégagement du module 5 2 7 6 1 3 4122 Installation des composants du système 2 Ouvrez le système. Voir “Ouverture du système”. 3 Retirez le dispositif antibasculement des cartes d'extension. Voir “Retrait du dispositif antibasculement”. 4 Retirez le carénage de ventilation. Voir “Retrait du carénage de refroidissement”. 5 Insérez les pattes du module USB interne dans les fentes du châssis, puis faites-les coulisser jusqu'à ce que la patte de dégagement du module se verrouille. Voir figure 3-12. 6 Passez le câble du module USB interne dans les passe-câbles du châssis, puis branchez-le sur le connecteur INT_USB de la carte système. Voir figure 6-1 pour identifier l'emplacement des connecteurs. 7 Installez le carénage de ventilation. Voir “Installation du carénage de refroidissement”. 8 Retirez le dispositif antibasculement des cartes d'extension. Voir “Installation du dispositif antibasculement”. 9 Refermez le système. Voir “Fermeture du système”. 10 Redressez le système et posez-le (sur ses pieds) sur une surface plane et stable. 11 Reconnectez les périphériques, le cas échéant, puis branchez le système sur la prise secteur. 12 Mettez le système et les périphériques connectés sous tension.Installation des composants du système 123 Clé de mémoire USB interne Une clé de mémoire USB optionnelle installée à l'intérieur de votre système peut être utilisée comme unité de démarrage, clé de sécurité ou périphérique de stockage de masse. Le connecteur USB doit être activé via l'option Internal USB Port (Port USB interne) accessible sur l'écran Integrated Devices (périphériques intégrés) du programme de configuration du système. Voir “Utilisation du programme de configuration du système et du gestionnaire de démarrage UEFI Boot Manager”. Pour pouvoir démarrer le système à partir d'une clé de mémoire USB, vous devez stocker une image d'amorçage sur cette dernière et ajouter la clé à la séquence d'amorçage définie dans le programme de configuration du système. REMARQUE : Le système prend en charge les clés de mémoire USB ayant les dimensions maximales suivantes : 24 mm (0,95 pouce) de large, 79 mm (3,1 pouces) de long et 8,6 mm (0,34 pouce) d'épaisseur. 1 Mettez le système et les périphériques connectés hors tension, puis débranchez le système de la prise secteur et des périphériques. 2 Ouvrez le système. Voir “Ouverture du système”. 3 Identifiez le connecteur USB du module USB interne, puis insérez-y la clé de mémoire USB. Voir figure 3-12. 4 Refermez le système. Voir “Fermeture du système”. 5 Redressez le système et posez-le (sur ses pieds) sur une surface plane et stable. 6 Reconnectez les périphériques, le cas échéant, puis branchez le système sur la prise secteur. 7 Mettez le système et les périphériques connectés sous tension.124 Installation des composants du système Carte iDRAC6 (Integrated Dell Remote Access Controller 6) Enterprise (en option) La carte iDRAC6 Enterprise disponible en option fournit un ensemble de fonctionnalités avancées pour la gestion à distance du système. Installation de la carte iDRAC6 Enterprise 1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise secteur et des périphériques. 2 Ouvrez le système. Voir “Ouverture du système”. 3 Retirez le dispositif antibasculement des cartes d'extension. Voir “Retrait du dispositif antibasculement”. 4 Retirez le carénage de ventilation. Voir “Retrait du carénage de refroidissement”. 5 Retirez l'obturateur de prise en plastique qui protège le port iDRAC6 Enterprise sur le panneau arrière du système. Voir “Voyants et fonctions du panneau arrière” pour localiser le port. 6 Retirez la carte SD VFlash (si elle est installée) de la carte iDRAC6 Enterprise. Voir “Support VFlash (en option)”. 7 Installez la carte iDRAC6 Enterprise: a Inclinez la carte de façon à insérer le connecteur RJ-45 dans le trou du châssis prévu pour le port iDRAC6 Enterprise. Pour identifier l'emplacement du trou, voir figure 1-4. b Alignez le bord avant de la carte sur les deux picots de fixation en plastique avant, situés près du connecteur iDRAC6 de la carte système. Voir figure 6-1 pour identifier l'emplacement du connecteur. c Appuyez sur la carte jusqu'à ce qu'elle se mette correctement en place. Voir figure 3-13. Lorsque l'avant de la carte est en place, les pattes des picots en plastique bloquent le bord de la carte. 8 Installez le carénage de ventilation. Voir “Installation du carénage de refroidissement”. 9 Retirez le dispositif antibasculement des cartes d'extension. Voir “Installation du dispositif antibasculement”.Installation des composants du système 125 10 Refermez le système. Voir “Fermeture du système”. 11 Redressez le système et posez-le (sur ses pieds) sur une surface plane et stable. 12 Reconnectez les périphériques, le cas échéant, puis branchez le système sur la prise secteur. 13 Mettez le système et les périphériques connectés sous tension. Figure 3-13. Installation et retrait de la carte iDRAC6 Enterprise 1 carte iDRAC6 Enterprise 2 logement pour support VFlash 3 carte SD VFlash 4 port Ethernet RJ-45 (sous la carte) 5 emplacements des picots de fixation (2) 6 pattes des picots de fixation (2) 7 connecteur de la carte Enterprise iDRAC6 3 5 1 7 2 6 4126 Installation des composants du système Retrait de la carte iDRAC6 Enterprise 1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise secteur et des périphériques. 2 Ouvrez le système. Voir “Ouverture du système”. 3 Retirez le dispositif antibasculement des cartes d'extension. Voir “Retrait du dispositif antibasculement”. 4 Retirez le carénage de ventilation. Voir “Retrait du carénage de refroidissement”. 5 Retirez la carte de support VFlash (le cas échéant) de la carte iDRAC6 Enterprise. Voir “Support VFlash (en option)”. 6 Retirez le câble Ethernet (s'il est installé) de la carte iDRAC6 Enterprise. 7 Retirez la carte iDRAC6 Enterprise : a Tirez légèrement vers l'arrière les deux pattes bleues à l'avant de la carte, puis dégagez délicatement la carte des picots de fixation. Voir figure 3-13. b Lorsque la carte se dégage des picots, le connecteur situé sous la carte est désengagé du connecteur de la carte système. c Faites glisser la carte par l'arrière du système jusqu'à ce que le connecteur RJ-45 soit dégagé hors du panneau arrière, puis soulevez la carte pour l'extraire du système. Voir figure 3-13. 8 Installez l'obturateur de prise en plastique dans le trou prévu pour le port iDRAC6 Enterprise situé à l'arrière du système. 9 Installez le carénage de ventilation. Voir “Installation du carénage de refroidissement”. 10 Retirez le dispositif antibasculement des cartes d'extension. Voir “Installation du dispositif antibasculement”. 11 Refermez le système. Voir “Fermeture du système”. 12 Redressez le système et posez-le (sur ses pieds) sur une surface plane et stable. 13 Reconnectez les périphériques, le cas échéant, puis branchez le système sur la prise secteur. 14 Mettez le système et les périphériques connectés sous tension.Installation des composants du système 127 Support VFlash (en option) Le support VFlash optionnel est une carte SD (Secure Digital) qui peut être utilisée avec la carte iDRAC6 Enterprise disponible en option. Voir “Carte iDRAC6 (Integrated Dell Remote Access Controller 6) Enterprise (en option)”. 1 Identifiez le logement de la carte VFlash à l'arrière du système, puis insérez-y le bord de la carte SD muni de broches de contact (étiquette tournée vers le centre du système). Voir “Voyants et fonctions du panneau arrière” pour localiser l'emplacement. REMARQUE : Le logement est muni d'un détrompeur qui permet de s'assurer que la carte sera insérée dans le bon sens. 2 Appuyez sur la carte pour qu'elle s'emboîte dans le connecteur. Pour procéder au retrait de la carte, appuyez sur celle-ci pour la débloquer, puis l'extraire de son logement. Clé matérielle de carte NIC Les fonctions iSCSI et d'autres fonctionnalités prévues pour les cartes réseau intégrées du système sont activées par l'installation d'une clé matérielle de la carte réseau en option dans le connecteur ISCSI_KEY de la carte système. REMARQUE : Lorsque de nouvelles fonctionnalités seront prises en charge pour les cartes NIC, vous devrez (le cas échéant) remplacer la clé matérielle d'origine par une autre clé plus récente. 1 Mettez le système et les périphériques connectés hors tension, puis débranchez le système de la prise secteur et des périphériques. 2 Ouvrez le système. Voir “Ouverture du système”.128 Installation des composants du système 3 Repérez le connecteur ISCSI_KEY sur la carte système. Voir la figure 6-1. 4 Insérez la clé matérielle NIC dans le connecteur approprié de la carte. Voir figure 3-14. Figure 3-14. Retrait et installation d'une clé matérielle de la carte réseau 5 Refermez le système. Voir “Fermeture du système”. 6 Redressez le système et posez-le (sur ses pieds) sur une surface plane et stable. 7 Reconnectez les périphériques, le cas échéant, puis branchez le système sur la prise secteur. 8 Mettez le système et les périphériques connectés sous tension. 1 clé matérielle de la carte réseau 2 connecteur ISCSI_KEY 1 2Installation des composants du système 129 Lecteurs optiques et lecteurs de bande Vous pouvez installer un ou deux lecteurs optiques, un lecteur de bande mihauteur ou un lecteur de bande pleine hauteur dans les deux baies de lecteur de 5,25 pouces de votre système. Retrait d'un lecteur optique ou d'un lecteur de bande 1 Mettez le système et les périphériques connectés hors tension, puis débranchez le système de la prise secteur et des périphériques. 2 Ouvrez le système. Voir “Ouverture du système”. 3 Retirez le dispositif antibasculement des cartes d'extension. Voir “Retrait du dispositif antibasculement”. 4 Retirez le carénage de ventilation. Voir “Retrait du carénage de refroidissement”. 5 Débranchez le câble d'alimentation et le câble de données de l'arrière du lecteur. Voir figure 3-15. 6 Poussez le loquet d'éjection de lecteur dans le sens de la flèche pour dégager les vis à épaulement. Voir figure 3-15. 7 Retirez le lecteur de la baie. 8 Si vous installez un autre lecteur dans la baie, voir “Installation d'un lecteur optique ou d'un lecteur de bande”. En cas de retrait définitif du lecteur, installez un cache dans la baie de lecteur vide. Insérez-le dans la baie jusqu'à ce que le loquet d'éjection du lecteur se verrouille. Voir figure 3-15. 9 Réinstallez le carénage de ventilation. Voir “Installation du carénage de refroidissement”. 10 Replacez le dispositif antibasculement des cartes d'extension. Voir “Installation du dispositif antibasculement”. 11 Refermez le système. Voir “Fermeture du système”. 12 Redressez le système et posez-le (sur ses pieds) sur une surface plane et stable. 13 Reconnectez les périphériques, le cas échéant, puis branchez le système sur la prise secteur. 14 Mettez le système et les périphériques connectés sous tension.130 Installation des composants du système Figure 3-15. Retrait et installation d'un lecteur optique ou d'un lecteur de bande Installation d'un lecteur optique ou d'un lecteur de bande 1 Déballez le lecteur et préparez-le en vue de son installation. Pour obtenir des instructions, consultez la documentation fournie avec le lecteur. Si vous installez un lecteur de bande SAS, votre système doit contenir une carte d'extension SAS interne (voir “Installation d'une carte d'extension”). Vous ne pouvez pas connecter un lecteur de bande au contrôleur de stockage intégré. Si vous installez un lecteur de bande SCSI, votre système doit contenir une carte contrôleur SCSI (voir “Installation d'une carte d'extension”). 1 lecteur 2 vis d'alignement du lecteur (3) 3 logements des vis de la baie de lecteur 4 loquet d'éjection de lecteur 5 câbles du lecteur 5 1 2 4 3Installation des composants du système 131 Vous devez configurer le lecteur de bande comme indiqué dans sa documentation, en respectant les consignes suivantes : a Chaque périphérique relié à un adaptateur hôte SCSI doit posséder un ID SCSI unique (0 à 7 pour les périphériques SCSI étroits, 0 à 15 pour les périphériques SCSI larges). Définissez l'ID SCSI du lecteur de façon à éviter tout conflit avec les autres périphériques partageant le même bus. Pour toute information concernant les ID SCSI par défaut, consultez la documentation du lecteur. REMARQUE : Les numéros d'ID SCSI ne doivent pas forcément être attribués dans un certain ordre. En outre, il n'est pas impératif de suivre l'ordre des numéros d'identification des périphériques lors de la connexion du câble. b La logique SCSI requiert que les deux périphériques situés aux deux extrémités d'une chaîne SCSI soient dotés d'une terminaison et que tous les périphériques intermédiaires n'en aient pas. De ce fait, vous activez la terminaison du lecteur de bande s'il s'agit du dernier élément d'une chaîne de périphériques (ou d'un périphérique unique) connecté au contrôleur SCSI. 2 Mettez le système et les périphériques connectés hors tension, puis débranchez le système de la prise secteur et des périphériques. 3 Ouvrez le système. Voir “Ouverture du système”. 4 Retirez le dispositif antibasculement des cartes d'extension. Voir “Retrait du dispositif antibasculement”. 5 Retirez le carénage de ventilation. Voir “Retrait du carénage de refroidissement”. 6 Pour retirer un ancien lecteur ou un cache de lecteur, actionnez le loquet d'éjection dans le sens de la flèche pour dégager les vis à épaulement, puis retirez le lecteur ou le cache de la baie en le faisant coulisser. Voir figure 3-15. 7 Retirez les trois vis à épaulement de l'ancien lecteur ou du cache de lecteur. Voir figure 3-16. 8 Fixez une des vis à épaulement dans la rangée de trous du haut, et les deux autres dans celle du bas. Voir figure 3-16.132 Installation des composants du système Figure 3-16. Installation des vis à épaulement d'un lecteur optique ou d'un lecteur de bande 9 Insérez délicatement le lecteur dans la baie, en emboîtant ses vis d'alignement dans les fentes de la baie. Le loquet d'éjection de lecteur se verrouille lorsque le lecteur est inséré à fond. Voir figure 3-15. 10 Branchez le câble d'alimentation SATA, SAS ou SCSI sur le lecteur. Vérifiez que les câbles sont correctement insérés dans leurs serre-câbles respectifs. 11 Rattachez le câble de données et vérifiez la connexion des câbles : • Si vous installez un lecteur optique ou un lecteur de bande SATA, branchez le câble relié au connecteur SATA du lecteur sur celui de la carte système. Pour identifier l'emplacement des connecteurs SATA de la carte système, voir figure 6-1. • Si vous installez un lecteur de bande SAS, branchez le câble relié au connecteur SAS_0 de la carte d'extension SAS sur le lecteur de bande. Pour installer une carte d'extension SAS, voir “Installation d'une carte d'extension”. 1 vis (3) 1Installation des composants du système 133 • Si vous installez un lecteur de bande SCSI, branchez le câble d'interface SCSI livré avec le kit du lecteur sur la carte contrôleur d'extension SCSI et sur le lecteur. Pour installer la carte d'extension SCSI, voir “Installation d'une carte d'extension”. 12 Réinstallez le carénage de ventilation. Voir “Installation du carénage de refroidissement”. 13 Replacez le dispositif antibasculement des cartes d'extension. Voir “Installation du dispositif antibasculement”. 14 Refermez le système. Voir “Fermeture du système”. 15 Redressez le système et posez-le (sur ses pieds) sur une surface plane et stable. 16 Reconnectez les périphériques, le cas échéant, puis branchez le système sur la prise secteur. 17 Mettez le système et les périphériques connectés sous tension. 18 (Facultatif) Testez le lecteur à l'aide des diagnostics système. Voir “Exécution des diagnostics du système”.134 Installation des composants du système Carte contrôleur de stockage intégrée La carte système de votre ordinateur est munie d'un logement réservé à l'installation d'un contrôleur de stockage intégré. Ce dernier sert de soussystème de stockage aux disques durs internes. Le contrôleur prend en charge les disques SAS et SATA et permet d'inclure les disques durs dans des configurations RAID, selon la prise en charge permise par la version du contrôleur de stockage installée sur votre système. Retrait d'un contrôleur de stockage intégré 1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise secteur et des périphériques. 2 Ouvrez le système. Voir “Ouverture du système”. 3 Retirez le dispositif antibasculement des cartes d'extension. Voir “Retrait du dispositif antibasculement”. 4 Débranchez les câbles de données de la carte de stockage. Voir figure 3-17. Pour débrancher un câble, appuyez sur les loquets bleus situés de part et d'autre de son connecteur, puis détachez le câble du connecteur de la carte. 5 Retirez la carte du logement de carte de stockage. a Écartez le guide-carte bleu du coin supérieur de la carte et maintenezle dans cette position pour déverrouiller la carte. b Tenez la carte de stockage par son bord, puis tirez-la délicatement pour l'extraire de son connecteur, puis des guide-cartes. Voir figure 3-17. PRÉCAUTION : Le fait de déconnecter le câble de batterie RAID d'une carte PERC peut entraîner une perte de données si le voyant “dirty cache” est allumé. Le voyant indique que les données sont toujours conservées dans la mémoire cache du contrôleur et n'ont pas été effacées lors de l'arrêt du système. 6 Le cas échéant, débranchez le câble de la batterie RAID de la carte. Voir figure 3-17.Installation des composants du système 135 Figure 3-17. Retrait et installation du contrôleur de stockage intégré 1 câbles de données 2 connecteur de câble de la batterie RAID (carte PERC uniquement) 3 carte contrôleur de stockage intégrée 4 guide-carte (2) 1 2 3 4136 Installation des composants du système Installation d'un contrôleur de stockage intégré REMARQUE : Branchez les câbles en respectant le nom de connecteur marqué sur chaque câble. Les câbles ne fonctionnent pas correctement s'ils sont inversés. 1 Le cas échéant, installez la batterie RAID (voir “Installation d'une batterie RAID”), puis branchez son câble sur le connecteur de la carte. Voir figure 3-17. 2 Installez le contrôleur de stockage intégré dans le logement de carte de stockage de la carte système. Pour identifier le logement de carte de stockage, voir figure 6-1. a En tenant la carte par les bords, positionnez-la de façon à aligner son connecteur sur le connecteur de carte de stockage de la carte système. b Faites descendre la carte le long des guide-cartes, puis insérez fermement son connecteur dans le connecteur de carte de stockage, jusqu'à ce que la carte s'enclenche et que le guide-carte bleu en plastique se verrouille sur le coin supérieur de la carte. 3 Connectez la carte de stockage au fond de panier SAS. a Branchez le connecteur SAS_0 du câble de données SAS sur le connecteur SAS_0 blanc de la carte SAS, et le connecteur SAS_1 sur le connecteur SAS_1 noir de la carte. Voir figure 3-17. b Branchez le connecteur de câble SAS A sur le connecteur SAS A du fond de panier. c Passez le câble SAS B par le passe-câbles situé à l'intérieur du châssis, puis branchez le connecteur de câble SAS B sur le connecteur SAS B du fond de panier. Voir figure 3-25. 4 Retirez le dispositif antibasculement des cartes d'extension. Voir “Installation du dispositif antibasculement”. 5 Refermez le système. Voir “Fermeture du système”. 6 Redressez le système et posez-le (sur ses pieds) sur une surface plane et stable. 7 Reconnectez les périphériques, le cas échéant, puis branchez le système sur la prise secteur. 8 Mettez le système et les périphériques connectés sous tension. 9 Installez tous les pilotes de périphériques requis pour la carte, comme indiqué dans sa documentation.Installation des composants du système 137 Retrait du support de stabilisation de carte d'extension Le support de stabilisation de carte stabilise la carte de stockage intégrée et toute carte d'extension dans les slots 2 et 3. 1 Eteignez le système, incluant tout périphérique connecté, et débranchez le système de la prise électrique et des périphériques. 2 Ouvrez le système. voir "Ouverture du système." 3 Retirez le stabilisateur de carte d'extension. voir "Retrait du dispositif antibasculement." 4 Déconnectez les câbles de données de la carte de stockage intégrée. Voir figure 3-17. Pour déconnecter un câble, pressez les deux clips bleus de chaque côté du connecteur et dégagez-le du connecteur de la carte. 5 Retirez la carte de stockage intégrée. voir "Retrait d'un contrôleur de stockage intégré." PRÉCAUTION : Déconnecter le câble de batterie RAID d'une carte PERC peut causer des pertes de données si la DEL "dirty cache" sur la carte est allumée. La DEL indique que des données sont toujours en cache dans la mémoire du contrôleur et que ces données n'ont pas été nettoyées quand le système à été éteint. 6 Si possible et nécessaire, déconnectez le câble de la batterie RAID de la carte de stockage intégrée. Voir figure 3-17. 7 Si il y a lieu, retirez toute carte d'extension installée dans les slot 2 ou 3 et déconnectez tout câble connecté. voir "Retrait d'une carte d'extension." 8 Tirez sur le loquet de dégagement bleu sur le support de stabilisation de carte d'extension et glissez-le vers le haut, puis sortez-le du châssis. Voir figure 3-27. Installation du support de stabilisation de carte d'extension 1 Placez les quatre trous sur le stabilisateur de carte d'extension sur les quatre guides métalliques du châssis, et glissez le support vers le bas jusqu'à ce que le loquet de dégagement s'enclenche. Voir figure 3-27. 2 Si nécessaire, installez les cartes d'extension sur les slots 2 et 3 et reconnectez les câbles concernés. voir "Installation d'une carte d'extension."138 Installation des composants du système 3 Si nécessaire, reconnectez le câble de batterie RAID à la carte de stockage interne. Voir figure 3-17. 4 Installez la carte contrôleur de stockage intégrée. voir "Installation d'un contrôleur de stockage intégré." 5 Reconnectez les câbles de données de la carte de stockage intégrée. Voir figure 3-17. 6 Installez le stabilisateur de carte. voir "Installation du dispositif antibasculement." 7 Fermez le système. voir "Fermeture du système." 8 Placez le système debout, sur ses patins sur une surface plane et stable. 9 Rattachez tout périphérique, puis connectez le système à la prise électrique. 10 Allumez le système et tout périphérique attaché. Batterie RAID Retrait d'une batterie RAID Les informations de cette section concernent uniquement les systèmes équipés de la carte contrôleur PERC disponible en option. 1 Retirez la carte du contrôleur de stockage intégrée. Voir “Retrait d'un contrôleur de stockage intégré”. 2 Débranchez le câble de la batterie RAID du connecteur de la carte de stockage intégrée. Appuyez sur la patte du connecteur du câble de batterie RAID, puis retirez délicatement le connecteur du câble de celui de la carte de stockage. Voir figure 3-18. 3 Tirez la patte d'éjection du support de batterie, puis dégagez ce dernier des fentes du châssis. Voir figure 3-18. 4 Extrayez la batterie RAID de son support en écartant délicatement les deux pattes qui l'y fixent. Voir figure 3-18.Installation des composants du système 139 Figure 3-18. Retrait et installation d'une batterie RAID Installation d'une batterie RAID 1 Insérez la batterie RAID dans le support prévu à cet effet. Voir figure 3-18. 2 Insérez le support de batterie, avec la batterie RAID installée, dans les fentes prévues à cet effet jusqu'à ce que le loquet d'éjection du support se verrouille. Voir figure 3-18. 3 Branchez le câble de la batterie sur le connecteur de la carte de stockage intégrée (voir figure 3-17), puis remettez en place le contrôleur de stockage intégré. Voir “Installation d'un contrôleur de stockage intégré”. 1 connecteur du câble de la batterie 2 batterie RAID 3 pattes du support de batterie (2) 4 fentes d'insertion pour le support de la batterie (2) 5 support de la batterie 6 patte d'éjection du support de batterie 5 3 2 4 1 6140 Installation des composants du système Cartes d'extension La carte système prend en charge jusqu'à cinq cartes d'extension PCIe Generation 2 : • Deux cartes lien PCIe x8 pleine hauteur, pleine longueur (12,2 pouces, logements 2 et 3) • Trois cartes PCIe x4 pleine hauteur, mi-longueur (logements 1, 4 et 5) Pour identifier les logements, reportez-vous à la section figure 6-1. Consignes d'installation des cartes d'extension Tenez compte des informations suivantes concernant les logements de cartes d'extension : • Les logements de cartes d'extension ne permettent pas le remplacement à chaud. • Les cartes d'extension PCI Express de génération 1 et 2 sont prises en charge dans tous les logements. • Même si, physiquement, les logements 1, 4 et 5 sont des connecteurs PCIe x8, ils fonctionnent uniquement en tant que logements liens PCIe x4. • Les logements 2 et 3 prennent en charge les cartes d'extension pleine longueur, et les logements 1, 4 et 5 des cartes mi-longueur. • Le système prend en charge jusqu'à deux cartes d'extension SAS ou PERC (en plus du contrôleur de stockage intégré) pour la gestion des lecteurs de bande internes ou du stockage externe. PRÉCAUTION : Afin d'assurer le bon refroidissement du système, seuls deux des cinq cartes d'extension peuvent avoir une consommation électrique supérieure à 15 W (au maximum 25 W par carte), contrôleur de stockage non inclus. • Le tableau 3-1 inclut un guide d'installation des cartes d'extension visant à assurer un refroidissement et un ajustement mécanique corrects. Il convient d'abord d'installer, dans le logement indiqué, les cartes d'extension dont le niveau de priorité est le plus élevé. Il convient d'installer toutes les autres cartes d'extension dans l'ordre de priorité des cartes et des logements concernés.Installation des composants du système 141 Tableau 3-1. Ordre d'installation des cartes d'extension 1. Au maximum 2 cartes de n'importe quel type dont la consommation électrique maximale dépasse 15 W. 2. Consultez la documentation sur la carte d'extension pour vous assurer que la puissance maximale ne dépasse pas 15 W. Installation d'une carte d'extension REMARQUE : Avant toute installation d'une carte d'extension, voir “Consignes d'installation des cartes d'extension”. 1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise secteur et des périphériques. 2 Ouvrez le système. Voir “Ouverture du système”. 3 Retirez le dispositif antibasculement des cartes d'extension. Voir “Retrait du dispositif antibasculement”. 4 Si vous installez une nouvelle carte, retirez la plaque de recouvrement. REMARQUE : Conservez cette plaque au cas où il soit nécessaire de retirer la carte d'extension. L'installation d'une plaque de ce type sur un logement vide est obligatoire pour que le système reste conforme à l'homologation FCC (Federal Communications Commission). Ces plaques empêchent la poussière et les impuretés de pénétrer dans le système, et facilitent le refroidissement et la ventilation de ce dernier. 5 Préparez la carte en vue de son installation. Priorité de la carte Type de carte Priorité du logement Max. Autorisé Carte de 25 W ? 1 Contrôleur PERC 5/E 4,5 2 O 2 Contrôleur PERC 6/E 3,2,5,4,1 2 O 3 Carte NIC 10 Go 4,5,1,2,3 2 O 4 Toutes les autres cartes de stockage Dell 3,2,4,5,1 2 O 5 Cartes de stockage autres que Dell 4,5,1,2,3 5 1 N 2 6 Toutes les autres cartes NIC 4,5,1,2,3 5 1 N 2142 Installation des composants du système Consultez la documentation de la carte pour obtenir des informations sur sa configuration, la réalisation des connexions internes ou le paramétrage approprié pour votre ordinateur. 6 Ouvrez le loquet de la carte d'extension situé à côté de l'emplacement approprié. Voir figure 3-19. 7 Si vous installez une carte d'extension pleine longueur (logements 2 et 3 uniquement), insérez le bord de la carte dans le guide-carte. Voir figure 3-19. 8 Insérez la carte dans le connecteur approprié de la carte système et appuyez fermement. Vérifiez que la patte métallique de la carte s'est emboîtée dans la fente prévue à cet effet. Voir figure 3-19. 9 Fermez le loquet de la carte d'extension pour maintenir celle-ci en place dans le système. PRÉCAUTION : Ne faites pas passer les câbles des cartes au-dessus ni derrière celles-ci. Ils pourraient gêner la fermeture du capot ou endommager le matériel. 10 Connectez tous les câbles requis pour la nouvelle carte. Consultez la documentation fournie avec la carte pour obtenir des informations sur la connexion des câbles. 11 Retirez le dispositif antibasculement des cartes d'extension. Voir “Installation du dispositif antibasculement”. 12 Refermez le système. Voir “Fermeture du système”. 13 Redressez le système et posez-le (sur ses pieds) sur une surface plane et stable. 14 Reconnectez les périphériques, le cas échéant, puis branchez le système sur la prise secteur. 15 Mettez le système et les périphériques connectés sous tension. 16 Installez tous les pilotes de périphériques requis pour la carte, comme indiqué dans sa documentation.Installation des composants du système 143 Figure 3-19. Retrait et installation d'une carte d'extension 1 loquet de la carte d'extension 2 carte d'extension 3 patte de la carte d'extension 4 fente d'insertion de la patte de la carte d'extension 5 connecteur de carte d'extension 6 guide de carte d'extension 6 5 1 3 4 2144 Installation des composants du système Retrait d'une carte d'extension 1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise secteur et des périphériques. 2 Ouvrez le système. Voir “Ouverture du système”. 3 Retirez le dispositif antibasculement des cartes d'extension. Voir “Retrait du dispositif antibasculement”. 4 Débranchez tous les câbles connectés à la carte d'extension. 5 Retirez la carte d'extension : a Ouvrez le loquet de la carte d'extension situé à côté de l'emplacement approprié. Voir figure 3-19. b Tenez la carte d'extension par les coins supérieurs et retirez-la doucement du connecteur. 6 Si vous retirez la carte définitivement, installez une plaque de recouvrement sur le logement vide. REMARQUE : L'installation d'une plaque de ce type sur un logement vide est obligatoire pour que le système reste conforme à l'homologation FCC (Federal Communications Commission). Ces plaques empêchent la poussière et les impuretés de pénétrer dans le système, et facilitent le refroidissement et la ventilation de ce dernier. 7 Retirez le dispositif antibasculement des cartes d'extension. Voir “Installation du dispositif antibasculement”. 8 Refermez le système. Voir “Fermeture du système”. 9 Redressez le système et posez-le (sur ses pieds) sur une surface plane et stable. 10 Reconnectez les périphériques, le cas échéant, puis branchez le système sur la prise secteur. 11 Mettez le système et les périphériques connectés sous tension. 12 Désinstallez le pilote de la carte pour le supprimer du système d'exploitation.Installation des composants du système 145 Mémoire système Votre système prend en charge les barrettes de mémoire DDR3 à registres (RDIMM) ou ECC sans tampon (UDIMM). Les barrettes de mémoire à simple ou double rangée de connexions peuvent être de 1067 ou 1333 MHz, et celles à quadruple rangée de connexions, de 1067 MHz. Le système comporte 12 connecteurs de mémoire, divisés en deux jeux de six connecteurs (un jeu pour chaque processeur). Chaque jeu de six connecteurs est organisé en trois canaux de deux connecteurs par canal. Le premier emplacement de chaque canal est identifié par des leviers d'éjection de couleur blanche. La capacité mémoire prise en charge par votre système varie en fonction du type et de la taille des modules de mémoire utilisés : • Jusqu'à 96 Go au total pour les RDIMM à simple et double rangée de connexions de 2 Go, de 4 Go et de 8 Go (s'il y en a). • Jusqu'à 96 Go au total pour les RDIMM à quadruple rangée de connexions. • Les barrettes UDIMM de 1 Go et 2 Go sont prises en charge jusqu'à un total de 24 Go. Consignes générales pour l'installation des modules de mémoire Pour optimiser les performances du système, observez les consignes générales suivantes lorsque vous configurez la mémoire du système. REMARQUE : Les configurations de mémoire qui ne respectent pas les consignes ci-dessous peuvent empêcher le démarrage du système ou toute sortie vidéo. • Les barrettes RDIMM et UDIMM ne peuvent pas être associées. • Tous les canaux comportant des barrettes de mémoire doivent, à l'exception des canaux inutilisés, posséder des configurations identiques. • Dans un système biprocesseur, la configuration de mémoire des deux processeurs doit être identique. • Des barrettes de mémoire de tailles différentes peuvent être associées dans un canal de mémoire (par exemple, 2 Go et 4 Go), mais tous les canaux utilisés doivent avoir une configuration identique.146 Installation des composants du système • Pour le mode Optimiseur, les modules de mémoire sont installés dans l'ordre numérique des emplacements, en commençant par le numéro A1 ou B1. • Pour le Memory Mirroring (Mise en miroir de la mémoire) ou le mode Advanced ECC (Fonctions ECC avancées), les deux connecteurs les plus éloignés du processeur ne sont pas utilisés et les barrettes de mémoire sont installées à partir du connecteur A2 ou B2 et dans ordre suivant : A2, A3, A5 et A6. • Le mode Advanced ECC (Fonctions ECC avancées) requiert des barrettes de mémoire utilisant des largeurs de périphérique DRAM x4 ou x8. • La vitesse de la mémoire sur chaque canal dépend de la configuration choisie : – Pour les modules de mémoire à rangée simple ou double : • Un canal comportant un seul module de mémoire prend en charge jusqu'à 1 333 MHz. • Un canal comportant deux modules de mémoire prend en charge jusqu'à 1 067 MHz. – Pour les modules de mémoire quadri-rangées : • Un canal comportant un seul module de mémoire prend en charge jusqu'à 1 067 MHz. • Un canal comportant deux modules de mémoire prend en charge jusqu'à 800 MHz, quelle que soit la vitesse des modules. • Si plusieurs modules de mémoire quadri-rangées sont combinés à des modules à rangée simple ou double, les modules quadri-rangées doivent être installés dans les emplacements munis de leviers d'éjection. • Si les modules de mémoire installés ont des vitesses différentes, ils fonctionnent à la vitesse du/des modèles de mémoire le(s) plu(s) lent(s). Recommandations spécifiques pour chaque mode Trois canaux de mémoire sont alloués à chaque processeur. Le nombre de canaux et de configurations d'allocation dépend du mode de mémoire sélectionné.Installation des composants du système 147 Prise en charge du mode ECC avancé (Lockstep) Dans cette configuration, les deux canaux situés le plus près du processeur sont combinés en un canal unique de 128 bits. Ce mode autorise la prise en charge SDDC à la fois sur les modules de mémoire x4 et x8. Les barrettes de mémoire doivent être de même taille, vitesse et technologie dans les logements correspondants. Prise en charge de la mise en miroir de la mémoire Le système prend en charge la mise en miroir de la mémoire si des barrettes de mémoire identiques sont installées dans les deux canaux les plus proches du processeur (la mémoire ne doit pas être installée dans le canal le plus éloigné). La mise en miroir doit être activée dans le programme de configuration du système. Dans une configuration en miroir, la mémoire système totale disponible équivaut à la moitié de la mémoire physique totale installée. Mode Optimiseur (canal indépendant) Avec ce mode, les trois canaux contiennent des barrettes de mémoire identiques. Ce mode permet d'exploiter une capacité mémoire totale plus élevée, mais ne prend pas en charge les configurations SDDC comprenant des modules de mémoire x8. Il prend également en charge une configuration minimale à canal unique d'une barrette de mémoire de 1 Go par processeur. Le tableau 3-2 et le tableau 3-3 illustrent des exemples de configuration de mémoire conformes aux recommandations relatives à la mémoire décrites dans la présente section. Les exemples présentent des configurations de barrettes identiques ainsi que la mémoire physique et la mémoire disponible. 148 Installation des composants du système Ces tableaux ne détaillent pas les configurations de modules mixtes ou quadri-rangées, ni les considérations relatives à la vitesse pour chaque configuration. Tableau 3-2. Exemples de configuration de mémoire RDIMM à simple et double rangée (par processeur) Mode de mémoire Taille du module de mémoire Emplacements pour modules de mémoire Monoprocesseur Biprocesseur 1 4 2 5 3 6 Mémoire physique (Go) Mémoire disponible (Go) Mémoire physique (Go) Mémoire disponible (Go) Optimiseur 2 Go X X X X X X X X X X X X X X X X X X 2 4 6 4 8 12 tous 4 8 12 8 16 24 tous 4 Go X X X X X X X X X X X X X X X X X X 4 8 12 8 16 24 tous 8 16 24 16 32 48 tous 8 Go 1 X X X X X X X X X X X X X X X X X X 8 16 24 16 32 48 tous 16 32 48 32 64 96 tous Fonctions ECC avancées 2 2 Go libre X X X X X X 4 8 tous 8 16 tous 4 Go libre X X X X X X 8 16 tous 16 32 tous 8 Go 1 libre X X X X X X 16 32 tous 32 64 tousInstallation des composants du système 149 1. Si disponible. 2. Requiert des barrettes de mémoire x4 ou x8. Mise en miroir 2 Go libre X X X X X X 4 8 2 4 8 16 4 8 4 Go libre X X X X X X 8 16 4 8 16 32 8 16 8 Go 1 libre X X X X X X 16 32 8 16 32 64 16 32 Tableau 3-3. Exemples de configuration de mémoire UDIMM (par processeur) Mode de mémoire Taille du module de mémoire Emplacements pour modules de mémoire Monoprocesseur Biprocesseur 1 4 2 5 3 6 Mémoire physique (Go) Mémoire disponible (Go) Mémoire physique (Go) Mémoire disponible (Go) Optimiseur 1 Go X X X X X X X X X X X X X X X X 1 2 3 4 6 tous 2 4 6 8 12 tous 2 Go X X X X X X X X X X X X X X X X 2 4 6 8 12 tous 4 8 12 16 24 tous Tableau 3-2. Exemples de configuration de mémoire RDIMM à simple et double rangée (par processeur) (suite) Mode de mémoire Taille du module de mémoire Emplacements pour modules de mémoire Monoprocesseur Biprocesseur 1 4 2 5 3 6 Mémoire physique (Go) Mémoire disponible (Go) Mémoire physique (Go) Mémoire disponible (Go)150 Installation des composants du système 1. Requiert des barrettes de mémoire x4 ou x8. Installation de modules de mémoire AVERTISSEMENT : les barrettes de mémoire restent chaudes un certain temps après la mise hors tension du système. Laissez-les refroidir avant de les manipuler. Tenez-les par les bords en évitant de toucher leurs composants. PRÉCAUTION : Pour assurer un refroidissement correct du système, vous devez installer un cache de barrette de mémoire sur chaque connecteur mémoire vide. Ne retirez un cache que si vous envisagez d'installer une barrette de mémoire à sa place. 1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise secteur et des périphériques. Ouvrez le système. Voir “Ouverture du système”. 2 Retirez le dispositif antibasculement des cartes d'extension. Voir “Retrait du dispositif antibasculement”. 3 Retirez le carénage de ventilation. Voir “Retrait du carénage de refroidissement”. 4 Repérez les logements de mémoire. Voir figure 6-1. Fonctions ECC avancées 1 1 Go libre X X X X X X 2 4 tous 4 8 tous 2 Go libre X X X X X X 4 8 tous 8 16 tous Mise en miroir 1 Go libre X X X X X X 2 4 1 2 4 8 2 4 2 Go libre X X X X X X 4 8 2 4 8 16 4 8 Tableau 3-3. Exemples de configuration de mémoire UDIMM (par processeur) (suite) Mode de mémoire Taille du module de mémoire Emplacements pour modules de mémoire Monoprocesseur Biprocesseur 1 4 2 5 3 6 Mémoire physique (Go) Mémoire disponible (Go) Mémoire physique (Go) Mémoire disponible (Go)Installation des composants du système 151 5 Retirez les caches des connecteurs sur lesquels vous envisagez d'installer des barrettes de mémoire : Appuyez sur les pattes d'éjection situées de part et d'autre du connecteur en les écartant pour éjecter le cache de barrette de mémoire. Voir figure 3-20. REMARQUE : Conservez les caches retirés pour usage ultérieur. 6 Tenez chaque barrette de mémoire par les bords, sans toucher la partie centrale. Figure 3-20. Installation et retrait d'un module de mémoire 1 module de mémoire 2 pattes d'éjection du support de module de mémoire (2) 3 détrompeur 2 1 3152 Installation des composants du système 7 Alignez le connecteur latéral de la barrette avec le détrompeur du support, puis insérez la barrette dans le support. REMARQUE : Le détrompeur permet d'insérer le module dans le bon sens. 8 Appuyez sur la barrette de mémoire avec les pouces jusqu'à ce que le loquet des pattes d'éjection du connecteur se verrouille. Si le module de mémoire est installé correctement, les pattes d'éjection s'alignent avec celles des autres logements contenant des modules de mémoire. 9 Répétez la procédure décrite de l'étape 5 à l'étape 8 pour installer les modules restants. Voir la tableau 3-2 ou la tableau 3-3. 10 Installez le carénage de ventilation. Voir “Installation du carénage de refroidissement”. 11 Retirez le dispositif antibasculement des cartes d'extension. Voir “Installation du dispositif antibasculement”. 12 Refermez le système. Voir “Fermeture du système”. 13 Redressez le système et posez-le (sur ses pieds) sur une surface plane et stable. 14 Reconnectez les périphériques, le cas échéant, puis branchez le système sur la prise secteur. 15 Mettez le système et les périphériques connectés sous tension. 16 Appuyez sur pour accéder au programme de configuration du système et vérifiez le paramètre System Memory (Mémoire système) dans l'écran principal du programme System Setup. La valeur indiquée reflète la modification effectuée par le système, prenant en compte la mémoire qui vient d'être installée. 17 Si la valeur est inexacte, il est possible qu'un ou plusieurs modules soient mal installés. Recommencez la procédure décrite de l'étape 5 à l'étape 8 en vérifiant que les modules de mémoire sont correctement emboîtés dans leurs supports. 18 Exécutez le test de mémoire des diagnostics du système. Voir “Exécution des diagnostics du système”.Installation des composants du système 153 Retrait de modules de mémoire AVERTISSEMENT : les barrettes de mémoire restent chaudes un certain temps après la mise hors tension du système. Laissez-les refroidir avant de les manipuler. Tenez-les par les bords en évitant de toucher leurs composants. PRÉCAUTION : Pour assurer un refroidissement correct du système, vous devez installer un cache de barrette de mémoire sur chaque connecteur mémoire vide. Installez un cache si vous retirez une barrette de mémoire que vous n'envisagez pas de remplacer. 1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise secteur et des périphériques. 2 Ouvrez le système. Voir “Ouverture du système”. 3 Retirez le dispositif antibasculement des cartes d'extension. Voir “Retrait du dispositif antibasculement”. 4 Retirez le carénage de ventilation. Voir “Retrait du carénage de refroidissement”. 5 Repérez les logements de mémoire. Voir figure 6-1. 6 Poussez les pattes d'éjection situées de part et d'autre du logement vers le bas et vers l'extérieur pour extraire le module de mémoire. Voir figure 3-20. PRÉCAUTION : Veillez à manipuler chaque module de mémoire en le tenant uniquement par les bords et en évitant tout contact avec les composants du module. 7 Remplacez les barrettes de mémoire retirées par des caches pour assurer un refroidissement correct du système. Pour les informations d'installation, voir “ Installation de modules de mémoire ”. 8 Installez le carénage de ventilation. Voir “Installation du carénage de refroidissement”. 9 Retirez le dispositif antibasculement des cartes d'extension. Voir “Installation du dispositif antibasculement”. 10 Refermez le système. Voir “Fermeture du système”. 11 Redressez le système et posez-le (sur ses pieds) sur une surface plane et stable. 12 Reconnectez les périphériques, le cas échéant, puis branchez le système sur la prise secteur. 13 Mettez le système et les périphériques connectés sous tension.154 Installation des composants du système Processeurs Retrait d'un processeur AVERTISSEMENT : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Avant de commencer cette procédure, lisez les consignes de sécurité fournies avec le système. 1 Avant de mettre à niveau votre système, téléchargez la dernière version du BIOS du système à partir du site support.dell.com. Ensuite, suivez les instructions contenues dans le fichier compressé que vous avez téléchargé pour installer la mise à jour. 2 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise secteur et des périphériques. 3 Ouvrez le système. Voir “Ouverture du système”. 4 Retirez le dispositif antibasculement des cartes d'extension. Voir “Retrait du dispositif antibasculement”. 5 Retirez le carénage de ventilation. Voir “Retrait du carénage de refroidissement”. AVERTISSEMENT : Le dissipateur de chaleur et le processeur restent chauds un certain temps après la mise hors tension du système. Laissez le dissipateur de chaleur et le processeur refroidir avant de les manipuler. PRÉCAUTION : Ne retirez jamais le dissipateur de chaleur d'un processeur si vous n'avez pas l'intention de retirer le processeur lui-même. Le dissipateur de chaleur est indispensable pour maintenir les conditions de température adéquates. 6 Ouvrez un des loquets de fixation du dissipateur de chaleur. Pour ce faire, appuyez sur l'extrémité du loquet, écartez-le latéralement du dissipateur, puis soulevez-le. Voir figure 3-21. 7 Attendez 30 secondes pour que le dissipateur de chaleur se détache du processeur. 8 Ouvrez l'autre loquet de fixation du dissipateur. 9 Séparez doucement le dissipateur de chaleur du processeur, puis posez-le à l'envers (face enduite de pâte thermique vers le haut).Installation des composants du système 155 Figure 3-21. Installation et retrait d'un dissipateur de chaleur AVERTISSEMENT : La pression exercée pour maintenir le processeur dans son support est très forte. Si vous ne maintenez pas fermement le levier d'éjection, il risque de se redresser brusquement. 10 Placez fermement votre pouce sur le levier d'éjection du support de processeur et déverrouillez ce levier. Faites pivoter le levier de 90 degrés vers le haut. Voir figure 3-22. 11 Faites basculer le cadre de protection du processeur vers le haut afin de dégager l'accès au processeur. Voir figure 3-22. PRÉCAUTION : Veillez à ne pas tordre les broches du support ZIF lors du retrait du processeur. Vous risqueriez d'endommager définitivement la carte système. 1 dissipateur de chaleur 2 loquet de fixation du dissipateur de chaleur (2) 1 2156 Installation des composants du système 12 Sortez le processeur et laissez le levier relevé afin de pouvoir installer le nouveau processeur. Si vous retirez définitivement un deuxième processeur, vous devez installer un cache de processeur et un cache de dissipateur de chaleur dans le support CPU2 pour assurer un refroidissement correct du système. La procédure d'installation des caches est similaire à celle d'un processeur. Voir “Installation d'un processeur”. Figure 3-22. Installation et retrait d'un processeur 1 levier d'éjection du support 2 cadre de protection du processeur 3 repère (2) 4 encoche du processeur (2) 5 support ZIF 6 processeur 6 5 1 2 4 3Installation des composants du système 157 Installation d'un processeur AVERTISSEMENT : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Avant de commencer cette procédure, lisez les consignes de sécurité fournies avec le système. REMARQUE : Dans une configuration monoprocesseur, le support CPU1 doit être utilisé. 1 Si vous installez un deuxième processeur pour la première fois, retirez les caches du dissipateur de chaleur et du processeur sur le support de processeur libre. Le retrait de caches s'effectue de façon similaire au retrait d'un processeur. Voir “Retrait d'un processeur”. 2 Déballez le nouveau processeur. Si le processeur a été précédemment installé sur un système, nettoyez entièrement la pâte thermique à l'aide d'un chiffon non pelucheux. 3 Alignez le processeur sur les repères du support ZIF. Voir figure 3-22. 4 Installez le processeur dans le support. PRÉCAUTION : Un positionnement incorrect du processeur peut entraîner des dommages irréversibles de la carte système ou du processeur. Prenez garde à ne pas tordre les broches du support. a Le levier d'éjection du support de processeur étant placé en position ouverte, alignez le processeur sur les clés du support et mettez précautionneusement le processeur en place dans le support. PRÉCAUTION : Ne forcez pas lorsque vous mettez le processeur en place. S'il est positionné correctement, il s'insère dans le support très facilement. b Fermez le cadre de protection du processeur. c Abaissez le levier d'éjection jusqu'à ce qu'il s'enclenche. 5 Installez le dissipateur de chaleur. a À l'aide d'un chiffon propre et non pelucheux, retirez la pâte thermique qui recouvre le dissipateur de chaleur. PRÉCAUTION : La présence de pâte thermique en quantité excessive peut engendrer un contact avec le support de processeur et la contamination de celui-ci.158 Installation des composants du système b Ouvrez le paquet de pâte thermique fourni avec le kit du processeur, puis appliquez-en une petite quantité (la taille d'un ongle) au milieu de la partie supérieure du nouveau processeur. c Placez le dissipateur de chaleur sur le processeur. Voir figure 3-21. d Fermez les deux loquets de fixation du dissipateur de chaleur. Voir figure 3-21. 6 Installez le carénage de ventilation. Voir “Installation du carénage de refroidissement”. 7 Retirez le dispositif antibasculement des cartes d'extension. Voir “Installation du dispositif antibasculement”. 8 Refermez le système. Voir “Fermeture du système”. 9 Redressez le système et posez-le (sur ses pieds) sur une surface plane et stable. 10 Reconnectez les périphériques, le cas échéant, puis branchez le système sur la prise secteur. 11 Mettez le système et les périphériques connectés sous tension. 12 Appuyez sur pour accéder au programme de configuration du système et vérifier que les informations relatives au processeur correspondent bien à la nouvelle configuration. Voir “Accès au programme de configuration du système”. 13 Exécutez les diagnostics du système pour vérifier que le nouveau processeur fonctionne correctement. Reportez-vous à la section “Exécution des diagnostics du système” pour plus d'informations concernant l'exécution des diagnostics. Batterie du système Remplacement de la batterie du système AVERTISSEMENT : une batterie neuve peut exploser si elle est mal installée. Remplacez la batterie par une autre de type identique ou d'un type équivalent recommandé par le fabricant. Reportez-vous aux consignes de sécurité pour obtenir des informations complémentaires. 1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise secteur et des périphériques.Installation des composants du système 159 2 Ouvrez le système. Voir “Ouverture du système”. 3 Retirez le dispositif antibasculement des cartes d'extension. Voir “Retrait du dispositif antibasculement”. 4 Retirez le carénage de ventilation. Voir “Retrait du carénage de refroidissement”. 5 Retirez la carte du contrôleur de stockage intégrée. Voir “Retrait d'un contrôleur de stockage intégré”. 6 Retirez le dispositif antibasculement des cartes d'extension : Relevez le levier d'éjection bleu et faites glisser le dispositif antibasculement des cartes d'extension pour l'extraire du châssis. Voir figure 3-27. PRÉCAUTION : Ne tirez pas sur le câble du panneau de commande pour en débrancher le connecteur. Vous risqueriez de l'endommager. 7 Déconnectez le câble du panneau de commande relié à la carte système (voir figure 3-24). a Appuyez sur les pattes métalliques situées de chaque côté du connecteur du câble. b Retirez doucement le connecteur du support. 8 Soulevez l'extrémité débranchée du câble du panneau de commande pour accéder au support de pile. PRÉCAUTION : Pour ne pas endommager le connecteur de batterie, maintenez-le en place lorsque vous installez ou retirez une batterie. 9 Retirez la batterie du système. a Maintenez le connecteur de batterie en place en appuyant fermement sur le côté positif du connecteur. b Appuyez sur la batterie dans la direction du pôle positif, puis extrayez la batterie des pattes de fixation situées du côté négatif du connecteur.160 Installation des composants du système Figure 3-23. Remplacement de la batterie du système 10 Installez la nouvelle batterie. a Maintenez le connecteur de batterie en place en appuyant fermement sur le côté positif du connecteur. b Tenez la batterie en plaçant le “+” vers le haut et faites-la glisser sous les pattes de fixation situées du côté positif du connecteur. c Appuyez sur la batterie pour l'engager dans le connecteur. 11 Rebranchez le câble du panneau de commande sur le connecteur CTRL_PNL de la carte système. 12 Retirez le dispositif antibasculement des cartes d'extension. Emboîtez les logements du support sur le guidage métallique situé sur le châssis et faites glisser le loquet vers le bas jusqu'à ce que la patte de dégagement s'enclenche. Voir figure 3-27. 13 Installez la carte du contrôleur de stockage intégré. Voir “Installation d'un contrôleur de stockage intégré”. 14 Installez le carénage de ventilation. Voir “Installation du carénage de refroidissement”. 15 Retirez le dispositif antibasculement des cartes d'extension. Voir “Installation du dispositif antibasculement”. 1 côté positif du connecteur de batterie 2 batterie du système 3 côté négatif du connecteur de batterie 2 3 1Installation des composants du système 161 16 Refermez le système. Voir “Fermeture du système”. 17 Redressez le système et posez-le (sur ses pieds) sur une surface plane et stable. 18 Reconnectez les périphériques, le cas échéant, puis branchez le système sur la prise secteur. 19 Mettez le système et les périphériques connectés sous tension. 20 Accédez au programme de configuration du système pour vérifier que la batterie fonctionne correctement. Voir “Accès au programme de configuration du système”. 21 Entrez la date et l'heure correctes dans les champs Time (Heure) et Date du programme de configuration du système, puis spécifiez les autres paramètres de configuration système. 22 Quittez le programme de configuration du système. Assemblage du panneau de commande (procédure réservée à la maintenance) Retrait de l'assemblage du panneau de commande AVERTISSEMENT : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Avant de commencer cette procédure, lisez les consignes de sécurité fournies avec le système. 1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise secteur et des périphériques. 2 Ouvrez le système. Voir “Ouverture du système”. 3 Retirez le dispositif antibasculement des cartes d'extension. Voir “Retrait du dispositif antibasculement”. 4 Retirez le carénage de ventilation. Voir “Retrait du carénage de refroidissement”. 5 Retirez la carte du contrôleur de stockage intégrée. Voir “Retrait d'un contrôleur de stockage intégré”.162 Installation des composants du système 6 Retirez le dispositif antibasculement des cartes d'extension : Relevez le levier d'éjection bleu et faites glisser le dispositif antibasculement des cartes d'extension pour l'extraire du châssis. Voir figure 3-27. PRÉCAUTION : Ne tirez pas sur le câble du panneau de commande pour en débrancher le connecteur. Vous risqueriez de l'endommager. 7 Déconnectez le câble du panneau de commande relié à la carte système (voir figure 3-24). a Appuyez sur les pattes métalliques situées de chaque côté du connecteur du câble. b Retirez doucement le connecteur du support. 8 Retirez le capot externe de la partie supérieure du châssis afin d'accéder à l'autre vis du panneau de commande. a À l'aide d'un tournevis cruciforme n°2, retirez de l'arrière du système les deux vis cruciformes à tête hexagonale qui fixent le capot externe. b Appuyez fermement sur le bord avant du capot et poussez légèrement ce dernier vers l'arrière du système. Voir figure 3-24. c Retirez le capot en tirant le bord supérieur, puis le bord inférieur en extrayant les crochets métalliques des fentes de fixation du châssis. Voir figure 3-24. 9 À l'aide d'un tournevis Torx T10, retirez les vis du panneau de commande qui fixent ce dernier au châssis. Voir figure 3-24. 10 Extrayez l'assemblage du panneau de commande, câble compris, du châssis. Voir figure 3-24. 11 Retirez le câble du panneau de commande de la carte du panneau. Voir figure 3-24.Installation des composants du système 163 Figure 3-24. Retrait et installation du panneau de commande 1 vis du panneau de commande (2) 2 pattes du capot 3 capot externe du châssis 4 vis du capot (2) 5 câble du panneau de commande 6 assemblage du panneau de commande 5 3 4 6 1 2164 Installation des composants du système Installation de l'assemblage du panneau de commande AVERTISSEMENT : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Avant de commencer cette procédure, lisez les consignes de sécurité fournies avec le système. 1 Connectez le câble du panneau de commande à la carte du panneau de commande. Voir figure 3-24. 2 Insérez l'assemblage du panneau de commande, câble en premier, dans le châssis. Voir figure 3-24. Emboîtez doucement l'assemblage du panneau de commande dans le châssis jusqu'à ce qu'il touche l'avant de ce dernier. 3 Replacez la vis Torx sur la partie supérieure du châssis. Voir figure 3-24. 4 Installez le capot externe sur la partie supérieure du châssis. a Insérez les pattes du capot dans les fentes situées sur la partie supérieure du châssis. Voir figure 3-24. b Accrochez le bord supérieur du capot sur celui du châssis. Voir figure 3-24. c Faites glisser le capot vers l'avant du système. Voir figure 3-24. d Replacez les deux vis cruciformes à tête hexagonale à l'arrière du système pour fixer le capot au châssis. 5 Replacez la vis Torx à l'avant du système pour fixer l'assemblage du panneau de commande au châssis. Voir figure 3-24. 6 Branchez le câble du panneau de commande sur le connecteur CTRL_PNL de la carte système. Voir figure 6-1 pour identifier l'emplacement des connecteurs. 7 Retirez le dispositif antibasculement des cartes d'extension. Emboîtez les logements du support sur le guidage métallique situé sur le châssis et faites glisser le loquet vers le bas jusqu'à ce que la patte de dégagement s'enclenche. Voir figure 3-27. 8 Installez le carénage de ventilation. Voir “Installation du carénage de refroidissement”. 9 Retirez le dispositif antibasculement des cartes d'extension. Voir “Installation du dispositif antibasculement”.Installation des composants du système 165 10 Refermez le système. Voir “Fermeture du système”. 11 Redressez le système et posez-le (sur ses pieds) sur une surface plane et stable. 12 Reconnectez les périphériques, le cas échéant, puis branchez le système sur la prise secteur. 13 Mettez le système et les périphériques connectés sous tension. Fond de panier SAS (procédure réservée à la maintenance) Retrait du fond de panier SAS AVERTISSEMENT : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Avant de commencer cette procédure, lisez les consignes de sécurité fournies avec le système. 1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise secteur et des périphériques. 2 Ouvrez le système. Voir “Ouverture du système”. 3 Retirez le dispositif antibasculement des cartes d'extension. Voir “Retrait du dispositif antibasculement”. 4 Retirez le carénage de ventilation. Voir “Retrait du carénage de refroidissement”. 5 Retirez tous les disques durs. Voir “Retrait d'un disque dur remplaçable à chaud”. REMARQUE : Notez les baies dans lesquelles les disques durs étaient installés afin de pouvoir y replacer les lecteurs plus tard. 6 Déconnectez les câbles suivants du fond de panier (voir figure 3-25) : • câble SAS A • câble SAS B • Câble d'alimentation du fond de panier166 Installation des composants du système 7 Débranchez les câbles qui passent par-dessus l'encoche de la carte de fond de panier. Voir figure 3-25. a Débranchez le câble du module USB interne de la carte système. Voir “Retrait du module USB interne”. b Débranchez les câbles SAS A et SAS B de la carte de stockage intégrée. Voir “Retrait d'un contrôleur de stockage intégré”. c Débranchez les câbles d'alimentation des lecteurs optiques ou des lecteurs de bande internes, s'il y a lieu. Voir “Retrait d'un lecteur optique ou d'un lecteur de bande”. d Tirez les câbles et dégagez-les de l'encoche de la carte de fond de panier. PRÉCAUTION : Vous ne pourrez débrancher le câble de transmission du fond de panier qu'après avoir retiré le fond de panier. En retirant le fond de panier, évitez de tirer trop fort sur le câble. Vous risqueriez de l'endommager. 8 Retirez le fond de panier SAS : a Tirez sur le plot d'éjection bleu du fond de panier. Voir figure 3-25. b Tout en tirant le plot d'éjection, faites glisser le fond de panier vers le haut. c Écartez la carte de fond de panier de l'avant du système jusqu'à ce que ses fentes de fixation se dégagent des pattes du châssis, puis retirez-la. 9 Débranchez le câble de transmission du fond de panier. Voir figure 3-25.Installation des composants du système 167 Figure 3-25. Retrait et installation du fond de panier SAS 1 câbles passés par l'encoche du fond de panier 2 plot d'éjection du fond de panier 3 encoche du fond de panier 4 câble SAS A 5 fente de fixation (8) 6 câble SAS B 7 câble d'alimentation du fond de panier 8 fond de panier SAS 9 câble de transmission du fond de panier 10 disque dur 8 2 3 10 6 7 9 5 4 1168 Installation des composants du système Installation du fond de panier SAS AVERTISSEMENT : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Avant de commencer cette procédure, lisez les consignes de sécurité fournies avec le système. 1 Branchez le câble de transmission sur le fond de panier. Voir figure 3-25. 2 Placez le fond de panier SAS de sorte que les pattes métalliques du châssis s'emboîtent à fond dans ses fentes de fixation. Voir figure 3-25. 3 Faites glisser le fond de panier vers le bas jusqu'à ce que le plot d'éjection s'enclenche. 4 Rebranchez les câbles qui passaient par l'encoche de la carte de fond de panier. a Branchez le câble du module USB interne sur le connecteur INT_USB de la carte système. b Branchez les câbles SAS A et SAS B sur la carte de stockage intégrée. Voir “Installation d'un contrôleur de stockage intégré”. c Branchez les câbles d'alimentation sur les lecteurs optiques ou les lecteurs de bande internes, s'il y a lieu. Voir “Installation d'un lecteur optique ou d'un lecteur de bande”. 5 Reconnectez les câbles suivants sur le fond de panier (voir figure 3-25) : • câble SAS A • câble SAS B • Câble d'alimentation du fond de panier 6 Installez les disques durs dans le système. Voir “Installation d'un disque dur remplaçable à chaud”. REMARQUE : Réinstallez chaque disque dur dans sa baie d'origine. 7 Installez le carénage de ventilation. Voir “Installation du carénage de refroidissement”. 8 Retirez le dispositif antibasculement des cartes d'extension. Voir “Installation du dispositif antibasculement”. 9 Refermez le système. Voir “Fermeture du système”. 10 Redressez le système et posez-le (sur ses pieds) sur une surface plane et stable.Installation des composants du système 169 11 Reconnectez les périphériques, le cas échéant, puis branchez le système sur la prise secteur. 12 Mettez le système et les périphériques connectés sous tension. Carte de distribution de l'alimentation (procédure réservée à la maintenance) Retrait de la carte de distribution de l'alimentation AVERTISSEMENT : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Avant de commencer cette procédure, lisez les consignes de sécurité fournies avec le système. 1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise secteur et des périphériques. 2 Retirez les blocs d'alimentation. Voir “Retrait d'un bloc d'alimentation”. 3 Ouvrez le système. Voir “Ouverture du système”. 4 Retirez le dispositif antibasculement des cartes d'extension. Voir “Retrait du dispositif antibasculement”. 5 Retirez le carénage de ventilation. Voir “Retrait du carénage de refroidissement”. 6 Débranchez les câbles des connecteurs de la carte de distribution de l'alimentation suivants (voir figure 6-3) : • J_DVD_TAPE_PWR • J_BP_PWR • J_BB_PWR1 • J_BB_PWR2 • J_BB_SIG Si vous envisagez de réinstaller la carte de distribution de l'alimentation, laissez en place les câbles branchés sur la carte système, le fond de panier SAS et les lecteurs optiques ou lecteurs de bande en option. 170 Installation des composants du système 7 Tirez le plot d'éjection bleu et maintenez-le, puis faites glisser la carte vers le haut. Écartez l'assemblage de la carte du châssis jusqu'à ce que ses fentes de fixation se dégagent des pattes du châssis, puis retirez la carte. Voir figure 3-26. Figure 3-26. Retrait et installation de la carte de distribution de l'alimentation Installation de la carte de distribution de l'alimentation AVERTISSEMENT : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Avant de commencer cette procédure, lisez les consignes de sécurité fournies avec le système. 1 Placez la carte de distribution de l'alimentation de sorte que les pattes du châssis s'emboîtent à fond dans ses fentes de fixation. Voir figure 3-26. 1 plot de dégagement 2 câbles de la carte de distribution de l'alimentation (5) 3 fentes de fixation 4 assemblage de la carte de distribution de l'alimentation 1 3 2 4Installation des composants du système 171 2 Faites glisser la carte vers le bas jusqu'à ce que le plot d'éjection bleu se verrouille. 3 Branchez les cinq câbles sur les connecteurs de la carte de distribution de l'alimentation suivants (voir figure 6-3) : • J_DVD_TAPE_PWR • J_BP_PWR • J_BB_PWR1 • J_BB_PWR2 • J_BB_SIG 4 Installez le carénage de ventilation. Voir “Installation du carénage de refroidissement”. 5 Retirez le dispositif antibasculement des cartes d'extension. Voir “Installation du dispositif antibasculement”. 6 Refermez le système. Voir “Fermeture du système”. 7 Installez les blocs d'alimentation. Voir “Installation d'un bloc d'alimentation”. 8 Redressez le système et posez-le (sur ses pieds) sur une surface plane et stable. 9 Reconnectez les périphériques, le cas échéant, puis branchez le système sur la prise secteur. 10 Mettez le système et les périphériques connectés sous tension. Carte système (maintenance uniquement) AVERTISSEMENT : Le dissipateur de chaleur peut chauffer au cours d'une utilisation normale. Pour éviter tout risque de brûlure, laissez refroidir suffisamment le système avant de retirer la carte système. PRÉCAUTION : Si vous utilisez la puce TPM (Trusted Platform Module) avec un programme de cryptage, il est possible que vous soyez invité à créer une clé de récupération lors de l'installation du système ou d'un programme. Vous devez créer cette clé et la conserver dans un endroit sûr. Si vous êtes un jour amené à remplacer la carte système, vous devrez fournir cette clé lors du redémarrage du système ou du programme afin de pouvoir accéder aux données cryptées qui se trouvent sur le ou les disques durs.172 Installation des composants du système Retrait de la carte système AVERTISSEMENT : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Avant de commencer cette procédure, lisez les consignes de sécurité fournies avec le système. 1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise secteur et des périphériques. 2 Ouvrez le système. Voir “Ouverture du système”. 3 Retirez le dispositif antibasculement des cartes d'extension. Voir “Retrait du dispositif antibasculement”. 4 Retirez le carénage de ventilation. Voir “Retrait du carénage de refroidissement”. 5 Retirez la clé matérielle de la carte réseau, le cas échéant. Voir figure 6-1 pour identifier l'emplacement du connecteur ISCSI_KEY. 6 Retirez la carte du contrôleur de stockage intégrée. Voir “Retrait d'un contrôleur de stockage intégré”. 7 Le cas échéant, retirez toutes les cartes d'extension et tous les câbles associés. Voir “Retrait d'une carte d'extension”. 8 Le cas échéant, retirez la carte iDRAC6 Enterprise. Voir “Retrait de la carte iDRAC6 Enterprise”. 9 Retirez les barrettes de mémoire et les caches. Voir “Retrait de modules de mémoire”. REMARQUE : Lorsque vous retirez chaque barrette de mémoire, notez son emplacement afin de pouvoir ensuite la réinstaller correctement. AVERTISSEMENT : le processeur et le dissipateur de chaleur peuvent être très chauds. Laissez-les refroidir avant de les manipuler. 10 Retirez tout dissipateur de chaleur, processeur ou cache de dissipateur de chaleur installé. Voir “Retrait d'un processeur”. 11 Retirez le fond de panier SAS du système. Voir “Retrait du fond de panier SAS”.Installation des composants du système 173 12 Retirez le support du dispositif antibasculement. Relevez le levier d'éjection bleu et faites glisser le dispositif antibasculement des cartes d'extension pour l'extraire du châssis. Voir figure 3-27. 13 Débranchez les câbles des connecteurs J_BB_SIG, J_BB_PWR1 et J_BB_PWR1 de la carte de distribution de l'alimentation. Voir figure 6-3 pour identifier l'emplacement des connecteurs. 14 Selon la configuration de votre ordinateur, déconnectez les câbles suivants de la carte système. Voir figure 6-1 pour identifier l'emplacement des connecteurs. • Trois câbles d'alimentation reliés aux connecteurs J_PWR1, J_PWR2 et J_PDB • Câble du panneau de commande relié au connecteur CTRL_PNL • Câble(s) SATA relié(s) au(x) connecteur(s) SATA • Câble du fond de panier SAS relié au connecteur BP_PWR • Câble du module SD interne relié au connecteur J_SDCARD • Câble du module USB interne relié au connecteur INT_USB 15 Écartez doucement les câbles situés trop près de la carte système. 16 Retirez la carte système du châssis. a Tirez le plot d'éjection bleu de la carte système et maintenez-le. Voir figure 3-27. b Tout en tirant le plot d'éjection, faites glisser la carte système vers l'avant du système. Voir figure 3-27. AVERTISSEMENT : Ne soulevez pas la carte système par les loquets des barrettes de mémoire ni par aucun de ses composants. c Tenez la carte système par les deux ergots bleus, situés près des deux supports de processeur (un seul ergot apparaît sur la figure 3-27). d Soulevez légèrement la carte système pour dégager les crochets métalliques du châssis de ses fentes de fixation. e Inclinez le bord à connecteurs de la carte système vers le haut, puis extrayez la carte du châssis. Voir figure 3-27.174 Installation des composants du système Figure 3-27. Retrait et installation de la carte système Installation de la carte système AVERTISSEMENT : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Avant de commencer cette procédure, lisez les consignes de sécurité fournies avec le système. 1 Déballez la nouvelle carte système et ôtez la plaquette insérée dans le support de barrette de mémoire. 2 Retirez le cadre avant. Voir “Retrait du cadre avant”. 3 Retirez les étiquettes de la plaque, puis apposez-les sur le châssis, sous les baies de disque dur (orientation en tour) ou à droite des baies (orientation en rack). 1 loquet d'éjection 2 support du dispositif antibasculement 3 fente de fixation de la carte système 4 plot d'éjection de la carte système 5 connecteurs de la carte système 6 ergot de la carte système (2) 7 carte système 1 2 4 6 7 3 5Installation des composants du système 175 4 Installez la carte système dans le châssis : AVERTISSEMENT : Ne soulevez pas la carte système par les loquets des barrettes de mémoire, ni par le dissipateur de chaleur du processeur ou aucun de ses composants. a Tenez la carte système par les deux ergots bleus, situés près des deux supports de processeur (un seul ergot apparaît sur la figure 3-27). b Inclinez le bord à connecteurs de la carte système, puis introduisez la carte dans le châssis. c Faites descendre les fentes de fixation de la carte vers les crochets métalliques du châssis. d Tenez la carte système par ses ergots, puis faites-la glisser vers l'arrière du châssis, en insérant les connecteurs dans les ouvertures du châssis. Voir figure 3-27. Le plot d'éjection bleu se verrouille lorsque la carte système est insérée à fond. 5 En fonction de votre configuration, branchez les câbles ci-dessous, que vous aviez retirés à l'étape “Retrait de la carte système”. Voir figure 6-1 pour identifier l'emplacement des connecteurs. • Trois câbles d'alimentation à relier aux connecteurs J_PWR1, J_PWR2 et J_PDB • Câble du panneau de commande à relier au connecteur CRTL_PNL • Câble(s) SATA à relier au(x) connecteur(s) SATA • Câble du fond de panier SAS à relier au connecteur BP_PWR • Câble du module SD interne à relier au connecteur J_SDCARD • Câble du module USB interne à relier au connecteur INT_USB 6 Installez le fond de panier SAS. Voir “Installation du fond de panier SAS”. 7 Installez tout processeur, dissipateur de chaleur et cache de processeur ou de dissipateur de chaleur que vous aviez retiré. Voir “Installation d'un processeur”. 8 Installez les barrettes de mémoire sur leurs connecteurs initiaux, ainsi que tout cache de barrette de mémoire que vous aviez retiré. Voir “Installation de modules de mémoire”.176 Installation des composants du système 9 Le cas échéant, installez la carte iDRAC6 Enterprise. Voir “Installation de la carte iDRAC6 Enterprise”. 10 Retirez le dispositif antibasculement des cartes d'extension. Emboîtez les logements du support sur le guidage métallique situé sur le châssis et faites glisser le loquet vers le bas jusqu'à ce que la patte de dégagement s'enclenche. Voir figure 3-27. 11 Installez la carte du contrôleur de stockage intégré. Voir “Installation d'un contrôleur de stockage intégré”. 12 Installez les cartes d'extension et les câbles associés, le cas échéant. Voir “Installation d'une carte d'extension”. 13 Installez la clé matérielle de la carte réseau, si vous l'aviez retirée. Voir figure 6-1 pour identifier l'emplacement du connecteur ISCSI_KEY. 14 Installez le carénage de ventilation. Voir “Installation du carénage de refroidissement”. 15 Retirez le dispositif antibasculement des cartes d'extension. Voir “Installation du dispositif antibasculement”. 16 Refermez le système. Voir “Fermeture du système”. 17 Redressez le système et posez-le (sur ses pieds) sur une surface plane et stable. 18 Reconnectez les périphériques, le cas échéant, puis branchez le système sur la prise secteur. 19 Mettez le système et les périphériques connectés sous tension.Dépannage du système 177 Dépannage du système La sécurité avant tout - pour vous et votre ordinateur AVERTISSEMENT : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Avant de commencer cette procédure, lisez les consignes de sécurité fournies avec le système. Dépannage des échecs de démarrage du système En cas de blocage au démarrage du système avant un visionnage vidéo ou l'affichage d'un message sur l'écran LCD, notamment après l'installation d'un système d'exploitation ou la reconfiguration des paramètres matériels de votre système, procédez aux vérifications d'état suivantes. • Si le démarrage du système a lieu en mode BIOS après l'installation d'un système d'exploitation en mode d'amorçage UEFI, le système se bloque. La situation inverse produit les mêmes effets. L'amorçage doit être effectué sur le même mode que celui de l'installation du système d'exploitation. Voir “Utilisation du programme de configuration du système et du gestionnaire de démarrage UEFI Boot Manager”. • Une configuration incorrecte de la mémoire peut provoquer un blocage au démarrage du système et l'absence de sortie vidéo. Voir “Mémoire système”. Pour tous les problèmes de démarrage, notez les messages qui s'affichent sur l'écran LCD ainsi que les messages système qui s'affichent sur le moniteur. Pour plus d'informations, voir les sections “Messages d'état affichés sur l'écran LCD” et “Messages système”.178 Dépannage du système Dépannage des connexions externes Avant de procéder au dépannage d'une unité externe, assurez-vous que tous les câbles externes sont correctement fixés aux connecteurs externes de votre système. Reportez-vous aux sections figure 1-1 et figure 1-4 pour identifier les connecteurs des panneaux avant et arrière du système. Dépannage du sous-système vidéo 1 Vérifiez les branchements du moniteur (prise secteur et raccordement au système). 2 Vérifiez le câblage de l'interface vidéo entre le système et le moniteur. 3 Essayez d'utiliser un moniteur réputé en bon état de marche. 4 Exécutez le test de diagnostic en ligne approprié. Voir “Utilisation des diagnostics du Dell™ PowerEdge™”. Si les tests aboutissent, l'incident n'est pas lié au matériel vidéo. Si les tests échouent, voir “Obtention d'aide”. Dépannage d'un périphérique USB 1 Pour dépanner un clavier et/ou une souris USB, procédez comme suit. Pour tous les autres périphériques USB, reportez-vous à la section étape 2. a Débranchez brièvement du système les câbles du clavier ou de la souris, puis reconnectez-les. b Connectez le clavier ou la souris aux ports USB situés sur le côté opposé du système. Si l'incident est résolu, redémarrez le système, accédez au programme de configuration du système et vérifiez que les ports USB défectueux sont activés. c Remplacez le clavier ou la souris par un périphérique équivalent en état de marche. Si le problème est résolu, remplacez le clavier ou la souris défectueux/-se. Si le problème persiste, passez à l'étape suivante pour dépanner les autres périphériques USB reliés au système.Dépannage du système 179 2 Mettez hors tension tous les périphériques USB et déconnectez-les du système. 3 Redémarrez le système puis, si le clavier fonctionne, ouvrez le programme de configuration du système. Vérifiez que tous les ports USB sont activés. Voir “Écran Integrated Devices (Périphériques intégrés)”. Si votre clavier ne fonctionne pas, vous pouvez également procéder par accès distant. 4 Reconnectez et remettez sous tension un par un les périphériques USB. 5 Si un périphérique est à nouveau à l'origine du même problème, mettez-le hors tension, remplacez le câble USB, puis remettez le périphérique sous tension. Si le problème persiste, remplacez le périphérique. Si toutes les mesures de dépannage restent sans effets, reportez-vous à la section “Obtention d'aide”. Dépannage d'un périphérique d'E/S série 1 Éteignez le système et les périphériques connectés au port série. 2 Remplacez le câble d'interface série par un câble en état de marche, puis mettez le système et le périphérique série sous tension. Si l'incident est résolu, remplacez le câble d'interface. 3 Mettez le système et le périphérique série hors tension, puis remplacez ce dernier par un périphérique similaire. 4 Mettez le système et le périphérique série sous tension. Si l'incident est résolu, remplacez le périphérique série. Si l'incident persiste, voir “Obtention d'aide”.180 Dépannage du système Dépannage d'une carte NIC 1 Exécutez le test de diagnostic en ligne approprié. Voir “Utilisation des diagnostics du Dell™ PowerEdge™”. 2 Redémarrez le système et consultez les messages éventuels qui concernent le contrôleur de carte NIC. 3 Observez le voyant approprié du connecteur réseau. Voir “Codes du voyant d'alimentation”. • Si le voyant de connexion ne s'allume pas, vérifiez tous les branchements. • Si le voyant d'activité ne s'allume pas, les fichiers des pilotes réseau sont peut-être altérés ou manquants. • Utilisez un autre connecteur sur le commutateur ou le concentrateur. Si vous utilisez une carte réseau au lieu d'une carte intégrée, consultez la documentation fournie avec celle-ci. 4 Vérifiez que les pilotes appropriés sont installés et que les protocoles sont liés. Consultez la documentation de la carte NIC. 5 Ouvrez le programme de configuration du système et vérifiez que les ports de carte NIC sont activés. Voir “Écran Integrated Devices (Périphériques intégrés)”. 6 Vérifiez que les cartes, les concentrateurs et les commutateurs du réseau sont tous réglés sur la même vitesse de transmission des données. Reportez-vous à la documentation de chaque périphérique réseau. 7 Vérifiez que la vitesse et le mode duplex de l'ensemble du câble réseau sont de type normal et que les câbles ne dépassent pas la longueur maximale. Si toutes les mesures de dépannage restent sans effets, reportez-vous à la section “Obtention d'aide”.Dépannage du système 181 Dépannage d'un système mouillé AVERTISSEMENT : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Avant de commencer cette procédure, lisez les consignes de sécurité fournies avec le système. 1 Mettez le système et les périphériques connectés hors tension, puis débranchez le système de la prise secteur. 2 Ouvrez le système. Voir “Ouverture du système”. 3 Retirez les composants suivants du système, le cas échéant. Voir “Installation des composants du système”. • Carénage de refroidissement • Disques durs • Cartes SD • Clés USB • clé matérielle de la carte réseau • Module SD interne • Cartes d'extension • Carte de stockage intégrée • carte iDRAC6 Enterprise • Blocs d'alimentation • Processeurs et dissipateurs de chaleur • Modules de mémoire 4 Laissez le système sécher complètement pendant au moins 24 heures. 5 Réinstallez les processeurs, les dissipateurs de chaleur, les modules de mémoire, les blocs d'alimentation et les carénages de refroidissement. 6 Refermez le système. Voir “Fermeture du système”. 7 Redressez le système et posez-le sur ses pieds sur une surface plane et stable, rebranchez le système à la prise secteur et mettez-le sous tension ainsi que les périphériques connectés. Si le système ne démarre pas normalement, voir “Obtention d'aide”.182 Dépannage du système 8 Si le système démarre normalement, arrêtez-le et réinstallez les cartes d'extension que vous avez retirées. Voir “Installation des composants du système”. 9 Exécutez le test de diagnostic en ligne approprié. Voir “Utilisation des diagnostics du Dell™ PowerEdge™”. Si les tests échouent, voir “Obtention d'aide”. Dépannage d'un système endommagé AVERTISSEMENT : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Avant de commencer cette procédure, lisez les consignes de sécurité fournies avec le système. 1 Mettez le système et les périphériques connectés hors tension, puis débranchez le système de la prise secteur. 2 Ouvrez le système. Voir “Ouverture du système”. 3 Assurez-vous que les composants suivants sont correctement installés : • Cartes d'extension • Blocs d'alimentation • Ventilateurs • Processeurs et dissipateurs de chaleur • Modules de mémoire • Supports de disque dur • Carénage de refroidissement 4 Vérifiez que tous les câbles sont correctement connectés. 5 Refermez le système. Voir “Fermeture du système”. 6 Redressez le système et posez-le sur ses pieds sur une surface plane et stable, rebranchez le système à la prise secteur et mettez-le sous tension ainsi que les périphériques connectés. 7 Lancez les tests de la carte système dans les diagnostics du système. Voir le chapitre “Exécution des diagnostics du système”. Si les tests échouent, voir “Obtention d'aide”.Dépannage du système 183 Dépannage de la pile du système 1 Entrez de nouveau l'heure et la date dans le programme de configuration du système. Voir “Utilisation du programme de configuration du système et du gestionnaire de démarrage UEFI Boot Manager”. 2 Mettez le système hors tension et débranchez-le de la prise électrique pendant au moins une heure. 3 Rebranchez le système à la prise secteur et mettez-le sous tension. 4 Accédez au programme de configuration du système. Si la date et l'heure du programme de configuration du système ne sont pas correctes, remplacez la batterie. Voir “Batterie du système “. AVERTISSEMENT : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Avant de commencer cette procédure, lisez les consignes de sécurité fournies avec le système. Si l'incident persiste lorsque vous remplacez la batterie, voir “Obtention d'aide”. Dépannage des blocs d'alimentation PRÉCAUTION : Le système ne peut fonctionner que si au moins un bloc d'alimentation est installé. Si vous faites fonctionner le système avec un seul bloc d'alimentation pendant une période prolongée sans installer de protecteur sur la baie d'alimentation PS2, une surchauffe du système risque de se produire. 1 Identifiez le bloc d'alimentation défectueux en observant l'indicateur d'état correspondant. Voir “Codes du voyant d'alimentation”. PRÉCAUTION : Si le dépannage concerne une erreur liée à la non-conformité de l'alimentation électrique, remplacez uniquement le bloc d'alimentation signalé par un indicateur clignotant. L'inversion des blocs d'alimentation dans le but de les faire correspondre peut générer une erreur et entraîner l'arrêt imprévu du système. Pour passer d'une configuration haute performance (High Output) à une configuration économe (Energy Smart) ou ou vice versa, vous devez mettre le système hors tension. 2 Remboîtez les blocs d'alimentation en les retirant et en les réinstallant. Voir “Retrait d'un bloc d'alimentation” et “Installation d'un bloc d'alimentation”.184 Dépannage du système REMARQUE : Après avoir installé un bloc d'alimentation, patientez plusieurs secondes pour laisser au système le temps de le reconnaître et pour déterminer s'il fonctionne correctement. Le voyant d'alimentation s'allume en vert si le bloc d'alimentation fonctionne normalement. Si le problème persiste, remplacez le bloc d'alimentation défectueux par un bloc de type identique. 3 Si l'incident persiste, voir “Obtention d'aide”. Dépannage des problèmes de refroidissement du système AVERTISSEMENT : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Avant de commencer cette procédure, lisez les consignes de sécurité fournies avec le système. Vérifiez qu'aucune des conditions suivantes n'est présente : • Le capot du système, le carénage de refroidissement, le cache du lecteur, le cache des barrettes de mémoire, le cache du bloc d'alimentation ou la plaque de recouvrement arrière sont retirés. • Le cache du dissipateur de chaleur est retiré (configurations à un seul processeur). • La température ambiante est trop élevée. Voir le Getting Started Guide (Guide de mise en route) pour le niveau de température requis pour votre système d'exploitation. • La circulation de l'air extérieur est bloquée. • Un des ventilateurs a été retiré ou est en panne. Voir “ Dépannage d'un ventilateur ”. • Les instructions d'installation de la carte d'extension n'ont pas été respectées. Consultez “Consignes d'installation des cartes d'extension”.Dépannage du système 185 Dépannage d'un ventilateur AVERTISSEMENT : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Avant de commencer cette procédure, lisez les consignes de sécurité fournies avec le système. 1 Localisez le ventilateur défectueux affiché par l'écran LCD (voir “Messages d'état affichés sur l'écran LCD”) ou le logiciel de diagnostic. 2 Mettez le système et les périphériques connectés hors tension, puis débranchez le système de la prise secteur. 3 Ouvrez le système. Voir “Ouverture du système”. 4 Retirez le dispositif antibasculement des cartes d'extension. Voir “Retrait du dispositif antibasculement”. 5 Retirez le carénage de refroidissement et retournez-le. Voir “Retrait du carénage de refroidissement”. 6 Retirez puis réinstallez le module de ventilation. Voir “Ventilateurs”. 7 Réinstallez le carénage de ventilation. Voir “Installation du carénage de refroidissement”. 8 Replacez le dispositif antibasculement des cartes d'extension. Voir “Installation du dispositif antibasculement”. 9 Refermez le système. Voir “Fermeture du système”. 10 Redressez le système et posez-le sur ses pieds sur une surface plane et stable, rebranchez le système à la prise secteur et mettez-le sous tension ainsi que les périphériques connectés. 11 Si l'incident n'est pas résolu, installez un nouveau module de ventilation. Voir “Ventilateurs”. Si le nouveau ventilateur ne fonctionne pas, voir “Obtention d'aide”.186 Dépannage du système Dépannage de la mémoire système AVERTISSEMENT : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Avant de commencer cette procédure, lisez les consignes de sécurité fournies avec le système. REMARQUE : Une configuration incorrecte de la mémoire peut provoquer un blocage au démarrage du système et l'absence de sortie vidéo. Consultez la rubrique “Consignes générales pour l'installation des modules de mémoire” et vérifiez que la configuration de la mémoire est conforme aux instructions applicables. 1 Si le système fonctionne, exécutez le test des diagnostics en ligne approprié. Voir “Utilisation des diagnostics du Dell™ PowerEdge™”. Si les diagnostics indiquent une panne, suivez les instructions fournies par le programme de diagnostic. 2 Si le système n'est pas opérationnel, mettez-le hors tension ainsi que les périphériques connectés, puis débranchez le système de la source d'alimentation. Patientez au moins 10 secondes, puis rebranchez le système sur l'alimentation. 3 Mettez le système et les périphériques connectés sous tension, puis notez les messages qui s'affichent à l'écran ou sur le panneau LCD. Si un message d'erreur indique qu'une barrette de mémoire présente une défaillance, consultez la rubrique étape 17. 4 Accédez au programme de configuration du système et vérifiez le paramètre de la mémoire système. Voir “Écran des paramètres de la mémoire”. Modifiez les paramètres de la mémoire, le cas échéant. Si les paramètres de la mémoire correspondent à la mémoire installée mais que l'indication d'un problème persiste, consultez la rubrique étape 17. 5 Mettez le système et les périphériques connectés hors tension, puis débranchez le système de la prise secteur. 6 Ouvrez le système. Voir “Ouverture du système”. 7 Retirez le dispositif antibasculement des cartes d'extension. Voir “Retrait du dispositif antibasculement”. 8 Retirez le carénage de ventilation. Voir “Retrait du carénage de refroidissement”.Dépannage du système 187 9 Vérifiez les circuits de mémoire et assurez-vous que l'installation des barrettes est correcte. Voir “Consignes générales pour l'installation des modules de mémoire”. 10 Remboîtez les barrettes de mémoire dans leurs supports. Voir “Installation de modules de mémoire”. 11 Réinstallez le carénage de ventilation. Voir “Installation du carénage de refroidissement”. 12 Replacez le dispositif antibasculement des cartes d'extension. Voir “Installation du dispositif antibasculement”. 13 Refermez le système. Voir “Fermeture du système”. 14 Redressez le système et posez-le sur ses pieds sur une surface plane et stable, rebranchez le système à la prise secteur et mettez-le sous tension ainsi que les périphériques connectés. 15 Pendant l'amorçage du système, observez l'apparition de messages d'erreur sur l'écran LCD. 16 Accédez au programme de configuration du système et vérifiez le paramètre de la mémoire système. Voir “Écran des paramètres de la mémoire”. Si l'incident persiste, passez à l'étape suivante. 17 Mettez le système et les périphériques connectés hors tension, puis débranchez le système de la source d'alimentation. 18 Ouvrez le système. Voir “Ouverture du système”. 19 Retirez le dispositif antibasculement des cartes d'extension. Voir “Retrait du dispositif antibasculement”. 20 Retirez le carénage de ventilation. Voir “Retrait du carénage de refroidissement”. 21 Si un test de diagnostic ou un message d'erreur indique qu'une barrette de mémoire est défectueuse, repositionnez-la en l'échangeant avec une autre, ou bien remplacez-la.. 22 Pour dépanner une barrette de mémoire défectueuse non spécifiée, remplacez la barrette de mémoire du premier logement de barrette de mémoire par une barrette de même type et de même capacité. Voir “Installation de modules de mémoire”.188 Dépannage du système 23 Réinstallez le carénage de ventilation. Voir “Installation du carénage de refroidissement”. 24 Replacez le dispositif antibasculement des cartes d'extension. Voir “Installation du dispositif antibasculement”. 25 Refermez le système. Voir “Fermeture du système”. 26 Redressez le système et posez-le sur ses pieds sur une surface plane et stable, rebranchez le système à la prise secteur et mettez-le sous tension ainsi que les périphériques connectés. 27 Pendant l'amorçage du système, guettez l'apparition de messages d'erreur sur l'écran LCD. 28 Si l'incident persiste, recommencez la procédure décrite de l'étape 17 à l'étape 27 pour chaque barrette installée. Si l'incident persiste alors que vous avez vérifié toutes les barrettes de mémoire, voir “Obtention d'aide”. Dépannage d'une carte SD interne AVERTISSEMENT : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Avant de commencer cette procédure, lisez les consignes de sécurité fournies avec le système. 1 Ouvrez le programme de configuration du système et vérifiez que le port correspondant à la carte SD est activé. Voir “Écran Integrated Devices (Périphériques intégrés)”. 2 Mettez le système et les périphériques connectés hors tension, puis débranchez le système de la prise secteur. 3 Ouvrez le système. Voir “Ouverture du système”. 4 Remettez en place le câble du module SD interne. Consultez “Installation du module SD interne”. 5 Localisez la carte SD et remettez-la en place. Voir “Retrait d'une carte Flash SD interne” et “Installation d'une carte Flash SD interne”. 6 Refermez le système. Voir “Fermeture du système”.Dépannage du système 189 7 Redressez le système et posez-le sur ses pieds sur une surface plane et stable, rebranchez le système, mettez-le sous tension, ainsi que les périphériques connectés, puis vérifiez si la carte SD marche. 8 Si l'incident persiste, répétez les étapes étape 2 et étape 3. 9 Insérez une autre carte SD en état de marche. 10 Refermez le système. Voir “Fermeture du système”. 11 Redressez le système et posez-le sur ses pieds sur une surface plane et stable, rebranchez le système, mettez-le sous tension, ainsi que les périphériques connectés, puis vérifiez si la carte SD marche. Si le problème persiste, voir “Obtention d'aide”. Dépannage d'une clé de mémoire USB interne AVERTISSEMENT : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Avant de commencer cette procédure, lisez les consignes de sécurité fournies avec le système. 1 Accédez au programme de configuration du système et vérifiez que le port correspondant à la carte USB interne est activé. Voir “Écran Integrated Devices (Périphériques intégrés)”. 2 Mettez le système et les périphériques connectés hors tension, puis débranchez le système de la prise secteur. 3 Ouvrez le système. Voir “Ouverture du système”. 4 Localisez la clé USB interne et remettez-la en place. Voir “Clé matérielle de carte NIC”. 5 Refermez le système. Voir “Fermeture du système”. 6 Redressez le système et posez-le sur ses pieds sur une surface plane et stable, rebranchez le système, mettez-le sous tension ainsi que les périphériques, puis vérifiez que la clé de mémoire USB interne marche. 7 Si l'incident persiste, répétez les étapes étape 2 et étape 3. 8 Insérez une autre clé USB fiable. 9 Refermez le système. Voir “Fermeture du système”.190 Dépannage du système 10 Redressez le système et posez-le sur ses pieds sur une surface plane et stable, rebranchez le système, mettez-le sous tension ainsi que les périphériques, puis vérifiez que la clé USB interne marche. Si le problème persiste, voir “Obtention d'aide”. Dépannage d'un lecteur optique AVERTISSEMENT : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Avant de commencer cette procédure, lisez les consignes de sécurité fournies avec le système. 1 Essayez d'utiliser un autre DVD ou CD. 2 Assurez-vous que les pilotes correspondant au lecteur optique sont installés et configurés correctement. 3 Accédez au programme de configuration du système et vérifiez que le contrôleur SATA intégré et les ports du lecteur SATA sont activés. Voir “Accès au programme de configuration du système”. 4 Exécutez le test de diagnostic en ligne approprié. Voir “Utilisation des diagnostics du Dell™ PowerEdge™”. 5 Mettez le système et les périphériques connectés hors tension, puis débranchez le système de la prise secteur. 6 Ouvrez le système. Voir “Ouverture du système”. 7 Vérifiez que le câble d'interface du lecteur de CD est fermement raccordé au lecteur et à la carte système. Consultez “Lecteurs optiques et lecteurs de bande”. 8 Vérifiez que le câble d'alimentation est correctement emboîté au lecteur et à la carte de distribution de l'alimentation. 9 Refermez le système. Voir “Fermeture du système”. 10 Redressez le système et posez-le sur ses pieds sur une surface plane et stable, rebranchez le système à la prise secteur et mettez-le sous tension ainsi que les périphériques connectés. Si l'incident n'est pas résolu, voir “Obtention d'aide”.Dépannage du système 191 Dépannage d'une unité de sauvegarde sur bande AVERTISSEMENT : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Avant de commencer cette procédure, lisez les consignes de sécurité fournies avec le système. 1 Essayez d'utiliser une autre cartouche de bande. 2 Assurez-vous que les pilotes correspondant au lecteur de bande sont installés et configurés correctement. Reportez-vous à la documentation du lecteur de bande pour plus d'informations sur les pilotes de périphériques. 3 Réinstallez le logiciel de sauvegarde sur bande en suivant les instructions de sa documentation. 4 Si vous possédez un lecteur de bande externe, vérifiez que son câble d'interface est correctement emboîté dans le port externe de la carte contrôleur. Pour les lecteurs de bande internes, vérifiez les connexions du câble : a Mettez le système et les périphériques connectés hors tension, puis débranchez le système de la prise secteur. b Ouvrez le système. Voir “Ouverture du système”. c Repositionnez la carte contrôleur dans son logement d'extension. d Vérifiez que le câble d'interface du lecteur de bande est connecté au lecteur de bande et au connecteur de la carte de contrôleur (SAS ou SCSI) ou au connecteur SATA de la carte système. e Vérifiez que le câble d'alimentation est correctement emboîté au lecteur et à la carte de distribution de l'alimentation. f Refermez le système. Voir “Fermeture du système”. g Redressez le système et posez-le sur ses pieds sur une surface plane et stable, rebranchez le système à la prise secteur et mettez-le sous tension ainsi que les périphériques connectés. 5 Si vous utilisez un lecteur de bande SCSI, vérifiez qu'il est associé à un ID SCSI unique et qu'il est doté ou non d'une terminaison, selon le câble d'interface utilisé pour sa connexion. Consultez la documentation du lecteur de bande pour savoir comment configurer l'ID SCSI et activer ou désactiver la terminaison.192 Dépannage du système 6 Exécutez les diagnostics en ligne appropriés. Voir “Utilisation des diagnostics du Dell™ PowerEdge™ Si vous ne parvenez pas à résoudre l'incident, consultez le chapitre “Obtention d'aide”. Dépannage d'un disque dur AVERTISSEMENT : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Avant de commencer cette procédure, lisez les consignes de sécurité fournies avec le système. PRÉCAUTION : cette procédure de dépannage risque de supprimer les données stockées sur le disque dur. Avant de continuer, créez une copie de sauvegarde de tous les fichiers qui se trouvent sur le disque dur. 1 Exécutez le test de diagnostic en ligne approprié. Voir “Utilisation des diagnostics du Dell™ PowerEdge™”. Procédez comme suit, selon les résultats du test de diagnostic. 2 Retirez le cadre. Voir “Retrait du cadre avant”. 3 Si les disques durs sont paramétrés en matrice RAID, effectuez les opérations suivantes : a Redémarrez le système et lancez l'utilitaire de configuration de l'adaptateur hôte en appuyant sur dans le cas d'un contrôleur PERC, ou sur dans le cas d'un contrôleur SAS. Consultez la documentation fournie avec l'adaptateur hôte pour obtenir des informations sur cet utilitaire. b Assurez-vous que les disques durs ont été correctement configurés pour la matrice RAID. c Mettez le disque dur hors ligne et remboîtez-le. Voir “Retrait d'un disque dur remplaçable à chaud”. d Quittez l'utilitaire de configuration et laissez le système d'exploitation démarrer.Dépannage du système 193 4 Assurez-vous que les pilotes requis pour la carte contrôleur sont installés et configurés correctement. Consultez la documentation du système d'exploitation pour plus d'informations. 5 Redémarrez le système et lancez le programme de configuration du système, en vous assurant que le contrôleur est activé et que les unités sont visibles dans ce programme. Voir “ Utilisation du programme de configuration du système et du gestionnaire de démarrage UEFI Boot Manager ”. Si l'incident persiste, voir “Dépannage d'un contrôleur de stockage”. Dépannage d'un contrôleur de stockage REMARQUE : Pour dépanner un contrôleur SAS ou PERC, reportez-vous également à sa documentation et à celle du système d'exploitation. 1 Exécutez le test de diagnostic en ligne approprié. Voir “Utilisation des diagnostics du Dell™ PowerEdge™”. 2 Accédez au programme de configuration du système et vérifiez que le contrôleur SAS ou PERC est activé. Voir “Utilisation du programme de configuration du système et du gestionnaire de démarrage UEFI Boot Manager”. 3 Redémarrez le système et appuyez sur la séquence de touches permettant d'ouvrir l'utilitaire de configuration approprié : • pour un contrôleur SAS • pour un contrôleur PERC Consultez la documentation du contrôleur pour obtenir des informations sur les paramètres de configuration. 4 Vérifiez les paramètres de configuration, corrigez-les au besoin et redémarrez le système. AVERTISSEMENT : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Avant de commencer cette procédure, lisez les consignes de sécurité fournies avec le système. 5 Mettez le système et les périphériques connectés hors tension, puis débranchez le système de la prise secteur. 6 Ouvrez le système. Voir “Ouverture du système”.194 Dépannage du système 7 Retirez le dispositif antibasculement des cartes d'extension. Voir “Retrait du dispositif antibasculement”. 8 Vérifiez que la carte contrôleur est correctement emboîtée dans le connecteur de la carte système. Voir “Carte contrôleur de stockage intégrée”. 9 Si vous disposez d'un contrôleur PERC à mémoire cache sur batterie, assurez-vous que la batterie RAID est correctement connectée et, le cas échéant, que le module de mémoire est en place sur la carte PERC. 10 Vérifiez que le câblage entre le fond de panier SAS et le contrôleur de stockage intégré est correct. Voir “Installation d'un contrôleur de stockage intégré” et figure 6-2. Vérifiez que les câbles sont correctement connectés au contrôle de stockage et au fond de panier SAS. 11 Retirez le dispositif antibasculement des cartes d'extension. Voir “Installation du dispositif antibasculement”. 12 Refermez le système. Voir “Fermeture du système”. 13 Redressez le système et posez-le sur ses pieds sur une surface plane et stable, rebranchez le système à la prise secteur et mettez-le sous tension ainsi que les périphériques connectés. Si l'incident persiste, voir “Obtention d'aide”. Dépannage des cartes d'extension AVERTISSEMENT : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Avant de commencer cette procédure, lisez les consignes de sécurité fournies avec le système. REMARQUE : Pour dépanner une carte d'extension, reportez-vous à sa documentation et à celle du système d'exploitation. 1 Exécutez le test de diagnostic en ligne approprié. Voir “Utilisation des diagnostics du Dell™ PowerEdge™”. 2 Mettez le système et les périphériques connectés hors tension, puis débranchez le système de la prise secteur.Dépannage du système 195 3 Ouvrez le système. Voir “Ouverture du système”. 4 Retirez le dispositif antibasculement des cartes d'extension. Voir “Retrait du dispositif antibasculement”. 5 Vérifiez que les cartes d'extension installées sont conformes aux recommandations d'installation correspondantes. Consultez “Consignes d'installation des cartes d'extension”. 6 Vérifiez que chaque carte d'extension est correctement insérée dans son connecteur. Voir “Installation d'une carte d'extension”. 7 Retirez le dispositif antibasculement des cartes d'extension. Voir “Installation du dispositif antibasculement”. 8 Refermez le système. Voir “Fermeture du système”. 9 Redressez le système et posez-le sur ses pieds sur une surface plane et stable, rebranchez le système à la prise secteur et mettez-le sous tension ainsi que les périphériques connectés. 10 Mettez le système et les périphériques connectés hors tension, puis débranchez le système de la prise secteur. 11 Ouvrez le système. Voir “Ouverture du système”. 12 Retirez le dispositif antibasculement des cartes d'extension. Voir “Retrait du dispositif antibasculement”. 13 Retirez toutes les cartes d'extension du système. Voir “Installation d'une carte d'extension”. 14 Retirez le dispositif antibasculement des cartes d'extension. Voir “Installation du dispositif antibasculement”. 15 Refermez le système. Voir “Fermeture du système”. 16 Redressez le système et posez-le sur ses pieds sur une surface plane et stable, rebranchez le système à la prise secteur et mettez-le sous tension ainsi que les périphériques connectés. 17 Exécutez le test de diagnostic en ligne approprié. Si les tests échouent, voir “Obtention d'aide”. 196 Dépannage du système 18 Pour chaque carte d'extension retirée à l'étape étape 13, effectuez les opérations suivantes : a Mettez le système et les périphériques connectés hors tension, puis débranchez le système de la prise secteur. b Retirez le dispositif antibasculement des cartes d'extension. Voir “Retrait du dispositif antibasculement”. c Ouvrez le système. Voir “Ouverture du système”. d Réinstallez une des cartes d'extension. e Retirez le dispositif antibasculement des cartes d'extension. Voir “Installation du dispositif antibasculement”. f Refermez le système. Voir “Fermeture du système”. g Exécutez le test de diagnostic approprié. Si les tests échouent, voir “Obtention d'aide”. Dépannage du/des processeur(s) AVERTISSEMENT : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Avant de commencer cette procédure, lisez les consignes de sécurité fournies avec le système. 1 Exécutez le test de diagnostic en ligne approprié. Voir “Utilisation des diagnostics du Dell™ PowerEdge™”. 2 Mettez le système et les périphériques connectés hors tension, puis débranchez le système de la prise secteur. 3 Ouvrez le système. Voir “Ouverture du système”. 4 Retirez le dispositif antibasculement des cartes d'extension. Voir “Retrait du dispositif antibasculement”. 5 Retirez le carénage de ventilation. Voir “Retrait du carénage de refroidissement”. 6 Vérifiez que chaque processeur et chaque dissipateur de chaleur est installé correctement. Voir “Installation d'un processeur”. 7 Installez le carénage de ventilation. Voir “Installation du carénage de refroidissement”.Dépannage du système 197 8 Retirez le dispositif antibasculement des cartes d'extension. Voir “Installation du dispositif antibasculement”. 9 Refermez le système. Voir “Fermeture du système”. 10 Redressez le système et posez-le sur ses pieds sur une surface plane et stable, rebranchez le système à la prise secteur et mettez-le sous tension ainsi que les périphériques connectés. 11 Exécutez le test de diagnostic en ligne approprié. Si le système est équipé d'un seul processeur et si le problème persiste, voir “Obtention d'aide”. 12 Dans le cas de systèmes multiprocesseurs, mettez hors tension le système et les périphériques connectés, puis débranchez le système de la prise électrique. 13 Ouvrez le système. Voir “Ouverture du système”. 14 Retirez le dispositif antibasculement des cartes d'extension. Voir “Retrait du dispositif antibasculement”. 15 Retirez le carénage de ventilation. Voir “Retrait du carénage de refroidissement”. PRÉCAUTION : Veillez à ne pas tordre les broches du support ZIF lors du retrait du processeur. Vous risqueriez d'endommager définitivement la carte système. 16 Retirez le processeur 2. Voir “Retrait d'un processeur”. 17 Installez le carénage de ventilation. Voir “Installation du carénage de refroidissement”. 18 Retirez le dispositif antibasculement des cartes d'extension. Voir “Installation du dispositif antibasculement”. 19 Refermez le système. Voir “Fermeture du système”. 20 Redressez le système et posez-le sur ses pieds sur une surface plane et stable, rebranchez le système à la prise secteur et mettez-le sous tension ainsi que les périphériques connectés. 21 Exécutez le test de diagnostic en ligne approprié. En cas d'échec du test, le processeur est défectueux. Voir “Obtention d'aide “. 22 Mettez le système et les périphériques connectés hors tension, puis débranchez le système de la prise secteur.198 Dépannage du système 23 Ouvrez le système. Voir “Ouverture du système”. 24 Retirez le dispositif antibasculement des cartes d'extension. Voir “Retrait du dispositif antibasculement”. 25 Retirez le carénage de ventilation. Voir “Retrait du carénage de refroidissement”. 26 Échangez le processeur 1 avec celui que vous avez retiré à l'étape 16. Voir “Installation d'un processeur”. 27 Recommencez la procédure décrite de l'étape 17 à l'étape 21. Si l'incident persiste alors que vous avez testé les deux processeurs, cela veut dire que la carte système est défectueuse. Voir “Obtention d'aide “. Exécution des diagnostics du système 199 Exécution des diagnostics du système Si vous rencontrez des problèmes lorsque vous utilisez le système, lancez les diagnostics avant de demander une assistance technique. Le but des diagnostics est de tester le matériel du système sans nécessiter d'équipement supplémentaire et sans risque de perte de données. Si vous ne réussissez pas à corriger le problème, le personnel de service et de support peut s'aider des résultats des tests de diagnostic pour vous aider à le résoudre. Utilisation des diagnostics du Dell™ PowerEdge™ Pour diagnostiquer un incident, commencez par utiliser les diagnostics en ligne, Dell PowerEdge Diagnostics. Ces derniers comprennent divers programmes de diagnostic ou modules de test pour le châssis et les composants de stockage (disques durs, mémoire physique, ports de communication, NIC, CMOS, etc.). Si vous ne parvenez toujours pas à identifier la cause du problème, utilisez les diagnostics du système. Les fichiers requis pour exécuter PowerEdge Diagnostics sur les systèmes Microsoft® Windows® et Linux sont disponibles sur le site support.dell.com, ainsi que sur les CD fournis avec le système. Pour plus d'informations sur l'utilisation des diagnostics, consultez le document Dell PowerEdge Diagnostics User's Guide (Dell PowerEdge Diagnostics - Guide d'utilisation). Fonctionnalités des diagnostics du système Les diagnostics du système contiennent des menus et des options permettant de tester des groupes de périphériques ou des périphériques particuliers. Ces options permettent d'effectuer les opérations suivantes : • Lancer un ou plusieurs tests. • Définir l'ordre des tests. • Répéter des tests.200 Exécution des diagnostics du système • Afficher, imprimer et enregistrer les résultats des tests. • Interrompre temporairement un test quand une erreur est détectée ou l'arrêter lorsqu'une limite d'erreur définie par l'utilisateur est atteinte. • Afficher des messages d'aide qui décrivent brièvement chaque test et ses paramètres. • Afficher des messages d'état qui vous indiquent si les tests ont abouti. • Afficher des messages d'erreur qui vous indiquent si des problèmes sont survenus pendant les tests. Quand utiliser les diagnostics du système Lorsqu'un composant ou un périphérique important du système ne fonctionne pas normalement, cela peut provenir de la défaillance d'un composant. Tant que le processeur et les périphériques d'entrée/de sortie du système fonctionnent, vous pouvez utiliser les diagnostics pour faciliter l'identification du problème. Exécution des diagnostics du système Le programme des diagnostics du système est exécuté à partir du menu des services du système iDRAC6 Express. PRÉCAUTION : N'utilisez les diagnostics que sur ce système. Leur utilisation sur d'autres systèmes peut entraîner des résultats erronés ou générer des messages d'erreur. 1 Au démarrage du système, appuyez sur . 2 Dans le menu des services système (System Services), sélectionnez Diagnostics. 3 Sélectionnez l'option Launch Diagnostics. 4 Dans le menu principal Diagnostics, sélectionnez Run Diags, ou MpMemory si vous effectuez un dépannage de la mémoire. Le menu Diagnostics vous permet de lancer tous les tests ou uniquement certains, ou encore de quitter les diagnostics du système.Exécution des diagnostics du système 201 Options de test des diagnostics du système Cliquez sur l'option de test voulue dans l'écran Main Menu (Menu principal). Utilisation des options de test personnalisées Lorsque vous sélectionnez l'option Custom Test (Test personnalisé) dans l'écran Main Menu (Menu principal), la fenêtre Customize (Personnaliser) s'affiche. Elle permet de sélectionner les périphériques à tester, de choisir des options de test spécifiques et de visualiser les résultats obtenus. Sélection de périphériques à tester La partie gauche de la fenêtre Customize (Personnaliser) répertorie les périphériques qui peuvent être testés. Cliquez sur le signe (+) en regard d'un périphérique ou d'un module pour visualiser ses composants. Cliquez sur le signe (+) en regard d'un composant pour visualiser les tests disponibles. Si vous cliquez sur un périphérique et non sur ses composants, tous les composants de ce périphérique sont sélectionnés pour le test. Si une entrée est grisée et que vous souhaitez exécuter le test correspondant, sélectionnez cette entrée et appuyez sur la barre d'espace. REMARQUE : Après avoir sélectionné tous les périphériques et composants à tester, sélectionnez All Devices (Tous les périphériques) et cliquez sur Run Tests (Exécuter les tests). Option de test Fonction Express Test (Test rapide) Effectue une vérification rapide du système. Cette option exécute les tests de périphériques qui ne requièrent pas d'action de l'utilisateur. Extended Test (Test complet) Effectue une vérification plus complète du système. Ce test peut prendre plus d'une heure. Custom Test (Test personnalisé) Teste un périphérique particulier. Information Affiche les résultats des tests.202 Exécution des diagnostics du système Sélection d'options de diagnostic Dans la zone Options de diagnostics (Diagnostics Options), sélectionnez le ou les tests que vous souhaitez appliquer à un périphérique. • Non-Interactive Tests Only (Tests non interactifs uniquement) : cette option permet d'exécuter uniquement les tests ne nécessitant aucune intervention de l'utilisateur. • Quick Tests Only (Tests rapides uniquement) : cette option permet d'exécuter uniquement les tests rapides sur le périphérique sélectionné. • Show Ending Timestamp (Afficher l'heure de fin) : cette option permet d'ajouter un horodatage au journal de test. • Test Iterations (Nombre d'itérations) : cette option sélectionne le nombre de fois où le test est exécuté. • Continue on Failure (Poursuite en cas d'échec) : cette option permet de continuer l'exécution du test sans intervention de l'utilisateur, dans le cas où l'un des tests a échoué. • Log output file pathname (Chemin du journal de sortie) : cette option permet de définir la disquette ou la clé de mémoire USB sur laquelle est sauvegardé le journal de test. Ce fichier ne peut pas être enregistré sur le disque dur. Visualisation des informations et des résultats Les onglets suivants de la fenêtre Customize (Personnaliser) contiennent des informations sur les tests et les résultats. • Results (Résultats) : indique le test exécuté et son résultat. • Errors (Erreurs) : affiche les erreurs qui se sont produites pendant le test. • Help (Aide) : affiche des informations sur le périphérique, le composant ou le test sélectionné. • Configuration : affiche des informations de base concernant la configuration du périphérique sélectionné. • Parameters (Paramètres) : affiche les paramètres que vous pouvez définir pour le test à exécuter.Cavaliers et connecteurs 203 Cavaliers et connecteurs AVERTISSEMENT : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Avant de commencer cette procédure, lisez les consignes de sécurité fournies avec le système. Cavaliers de la carte système Pour plus d'informations sur la réinitialisation du cavalier de mot de passe, consultez la section “Désactivation d'un mot de passe oublié”. Tableau 6-1. Réglages des cavaliers de la carte mère Cavalier Paramètre Description PWRD_EN (par défaut) La fonction de mot de passe est activée (broches 2-4). La fonction de mot de passe est désactivée et l'accès local à iDRAC6 est déverrouillé au prochain cycle d'alimentation en CA. (broches 4-6). NVRAM_CLR (par défaut) Les paramètres de configuration sont conservés au démarrage du système (broches 3-5). Les paramètres de configuration sont effacés au prochain démarrage du système (broches 1-3).204 Cavaliers et connecteurs Connecteurs de la carte système AVERTISSEMENT : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Avant de commencer cette procédure, lisez les consignes de sécurité fournies avec le système. Figure 6-1. Connecteurs et cavaliers de la carte système 17 1 15 14 12 13 10 5 2 4 8 6 7 3 19 18 16 11 9Cavaliers et connecteurs 205 Tableau 6-2. Connecteurs et cavaliers de la carte système Élément Connecteur Description 1 Emplacement 1 Emplacement 2 Emplacement 3 Emplacement 4 Emplacement 5 Lien x4 de connecteur PCIe x 8 (emplacement 1) Lien x8 de connecteur PCIe x 8 (emplacement 2) Lien x8 de connecteur PCIe x 8 (emplacement 3) Lien x4 de connecteur PCIe x 8 (emplacement 4) Lien x5 de connecteur PCIe x 8 (emplacement 5) 2 B1 B4 B2 B5 B3 B6 Emplacement de barrette de mémoire B1 (levier d'éjection blanc) Emplacement de barrette de mémoire B4 Emplacement de barrette de mémoire B2 (levier d'éjection blanc) Emplacement de barrette de mémoire B5 Emplacement de barrette de mémoire B3 (levier d'éjection blanc) Emplacement de barrette de mémoire B6 3 Carte iDRAC6 Connecteur de la carte Enterprise iDRAC6 4 CPU2 Processeur 2 5 CPU1 Processeur 1 6 J_PDB Connecteur d'alimentation 7 J_PWR1 Connecteur d'alimentation 8 J_PWR2 Connecteur d'alimentation 9 BP_PWR Connecteur d'alimentation du fond de panier206 Cavaliers et connecteurs 10 A1 A4 A2 A5 A3 A6 Emplacement de barrette de mémoire A1 (levier d'éjection blanc) Emplacement de barrette de mémoire A4 Emplacement de barrette de mémoire A2 (levier d'éjection blanc) Emplacement de barrette de mémoire A5 Emplacement de barrette de mémoire A3 (levier d'éjection blanc) Emplacement de barrette de mémoire A6 11 INT_USB Connecteur de module USB interne 12 J_SDCARD Connecteur de module SD interne 13 SATA_B Connecteur SATAB 14 SATA_A Connecteur SATA A 15 CTRL_PNL Connecteur du panneau de commande 16 BATTERIE Pile du système 17 Clé_ISCSI clé matérielle de la carte réseau 18 INT_STORAGE SAS Connecteur du contrôleur de stockage intégré 19 PWRD_EN NVRAM_CLR Cavalier d'activation du mot de passe Cavalier d'effacement NVRAM Tableau 6-2. Connecteurs et cavaliers de la carte système (suite) Élément Connecteur DescriptionCavaliers et connecteurs 207 Connecteurs de la carte de fond de panier SAS AVERTISSEMENT : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Avant de commencer cette procédure, lisez les consignes de sécurité fournies avec le système. Figure 6-2. Connecteurs du fond de panier SAS 1 connecteurs du disque dur 0-3 2 connecteurs du disque dur 4-7 3 connecteur câbles SAS B 4 connecteur J_BP_PWR 5 connecteur J_SIG_BB_BP 6 connecteur câble SAS A Avant ( baie de disque dur avant) Arrière 1 2 6 3 4 5208 Cavaliers et connecteurs Connecteurs de la carte de distribution de puissance AVERTISSEMENT : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Avant de commencer cette procédure, lisez les consignes de sécurité fournies avec le système. Figure 6-3. Connecteurs de la carte de distribution de puissance 1 connecteur J_PWR2 2 connecteur J_PWR1 3 connecteur J_BP_PWR 4 connecteur J_DVD_TAPE_PWR 5 connecteur J_BB_SIG 6 connecteur J_BB_PWR2 7 connecteur J_BB_PWR1 Avant 3 2 1 5 7 4 6Cavaliers et connecteurs 209 Désactivation d'un mot de passe oublié Les fonctionnalités logicielles de protection du système comprennent un mot de passe système et un mot de passe de configuration, qui sont présentés en détail à la section “Utilisation du programme de configuration du système et du gestionnaire de démarrage UEFI Boot Manager”. Le cavalier de protection du mot de passe permet d'activer ou de désactiver les fonctions du mot de passe système et d'effacer le(s) mot(s) de passe utilisé(s). AVERTISSEMENT : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Avant de commencer cette procédure, lisez les consignes de sécurité fournies avec le système. 1 Mettez le système et les périphériques connectés hors tension, puis débranchez le système de la prise secteur. 2 Ouvrez le système. Voir “Ouverture du système”. 3 Retirez le dispositif antibasculement des cartes d'extension. Voir “Retrait du dispositif antibasculement”. 4 Retirez la carte du contrôleur de stockage intégrée. Voir “Retrait d'un contrôleur de stockage intégré”. 5 Retirez le dispositif antibasculement des cartes d'extension : Relevez le levier d'éjection bleu et faites glisser le dispositif antibasculement des cartes d'extension pour l'extraire du châssis. Voir figure 3-27. 6 Mettez le cavalier PWRD_EN en position désactivée (broches 4 et 6). Voir figure 6-1 pour identifier l'emplacement du cavalier de mot de passe (“ PWRD_EN ”) sur la carte mère. 7 Retirez le dispositif antibasculement des cartes d'extension. Emboîtez les logements du support sur le guidage métallique situé sur le châssis et faites glisser le loquet vers le bas jusqu'à ce que la patte de dégagement s'enclenche. Voir figure 3-27. 8 Installez la carte du contrôleur de stockage intégré. Voir “Installation d'un contrôleur de stockage intégré”. 9 Retirez le dispositif antibasculement des cartes d'extension. Voir “Installation du dispositif antibasculement”.210 Cavaliers et connecteurs 10 Refermez le système. Voir “Fermeture du système”. 11 Rebranchez le système et les périphériques sur les prises secteur, puis allumez le système. Pour que les mots de passe existants soient désactivés (effacés), le système doit démarrer avec la fiche du cavalier de mot de passe retirée. Toutefois, avant d'attribuer un nouveau mot de passe du système et/ou de configuration, vous devez placer le cavalier sur la position d'activation. REMARQUE : Si vous attribuez un nouveau mot de passe système et/ou de configuration alors que la fiche du cavalier est encore sur la position de désactivation, le système désactivera les nouveaux mots de passe à son prochain démarrage. 12 Mettez le système et les périphériques connectés hors tension, puis débranchez le système de la prise secteur. 13 Ouvrez le système. Voir “Ouverture du système”. 14 Retirez le dispositif antibasculement des cartes d'extension. Voir “Retrait du dispositif antibasculement”. 15 Mettez le cavalier PWRD_EN en position activée (broches 2 et 4). 16 Replacez le dispositif antibasculement des cartes d'extension : Emboîtez les logements du support sur le guidage métallique situé sur le châssis et faites glisser le loquet vers le bas jusqu'à ce que la patte de dégagement s'enclenche. Voir figure 3-27. 17 Retirez la carte du contrôleur de stockage intégrée. Voir “Installation d'un contrôleur de stockage intégré”. 18 Replacez le dispositif antibasculement des cartes d'extension. Voir “Installation du dispositif antibasculement”. 19 Refermez le système. Voir “Fermeture du système”. 20 Rebranchez le système et les périphériques sur les prises secteur, puis allumez le système. 21 Attribuez un nouveau mot de passe système et/ou de configuration. Pour attribuer un nouveau mot de passe à l'aide du programme de configuration du système, reportez-vous à la section “Attribution d'un mot de passe système”.Obtention d'aide 211 Obtention d'aide Contacter Dell Aux États-Unis, appelez le 800-WWW-DELL (800-999-3355). REMARQUE : si vous ne disposez pas d'une connexion Internet active, vous pouvez utiliser les coordonnées figurant sur votre preuve d'achat, votre bordereau de livraison, votre facture ou encore sur le catalogue des produits Dell. Dell offre plusieurs options de service et de support en ligne et par téléphone. Leur disponibilité variant d'un pays à l'autre, il est possible que certains services ne soient pas proposés dans votre région. Pour contacter Dell pour des questions ayant trait aux ventes, au support technique ou au service client : 1 Rendez-vous sur le site support.dell.com. 2 Sélectionnez l'option appropriée dans le menu déroulant Choose A Country/Region (Choisissez un pays ou une région) situé au bas de la page. 3 Cliquez sur l'onglet Contact Us (Contactez-nous) en haut de la page. 4 Sélectionnez le lien correspondant au service ou au support requis. 5 Choisissez la méthode de contact qui vous convient. 212 Obtention d'aideGlossaire 213 Glossaire A: ampère. ACPI : acronyme de “Advanced Configuration and Power Interface”, interface de configuration et d'alimentation avancée. Interface standard qui permet au système d'exploitation de contrôler les paramètres relatifs à la configuration et à la gestion de l'alimentation. adaptateur hôte : contrôleur permettant de mettre en œuvre les communications entre le bus du système et le périphérique (généralement de stockage). adresse MAC : adresse de contrôle d'accès aux supports. Numéro de matériel unique attribué à chaque périphérique sur un réseau. adresse mémoire : emplacement spécifique dans la RAM du système, généralement exprimé sous forme de nombre hexadécimal. ANSI : acronyme de “American National Standards Institute”, institut des normes nationales américaines. Principal organisme dédié au développement des normes technologiques spécifiques des États-Unis. bande de parité : dans les matrices RAID, elle permet la répartition des disques durs contenant des données de parité. bootable media (support amorçable) : un support amorçable est une disquette, une clé mémoire USB ou un support optique permettant de démarrer le système sans l'utilisation des disques durs. BTU : acronyme de “British Thermal Unit”, unité thermique britannique. bus : chemin d'informations entre les différents composants du système. Le système contient un bus d'extension qui permet au processeur de communiquer avec les contrôleurs des différents périphériques connectés au système. Il contient également un bus d'adresse et un bus de données pour les communications entre le microprocesseur et la RAM. bus d'extension : votre système contient un bus d'extension qui permet au processeur de communiquer avec les contrôleurs des périphériques (NIC, etc.). bus local : sur les systèmes dotés de capacités d'extension du bus local, certains périphériques (comme l'adaptateur vidéo) peuvent être conçus pour fonctionner beaucoup plus vite que sur un bus d'extension traditionnel. Voir aussi bus. C : Celsius. CA : courant alternatif.214 Glossaire carte d'extension : carte supplémentaire (par exemple un adaptateur SCSI ou une carte NIC) qui doit être enfichée dans un connecteur d'extension sur la carte système de l'ordinateur. Une carte d'extension ajoute des fonctions spéciales au système en fournissant une interface entre le bus d'extension et un périphérique. Carte SD : carte de mémoire flash numérique sécurisée. carte système : principale carte à circuits imprimés du système, cette carte contient généralement la plupart des composants intégrés de votre système : processeur, mémoire vive (RAM), contrôleurs de périphériques et processeurs de mémoire ROM. Elle est également appelée planaire ou carte mère. carte vidéo : circuit logique qui gère les fonctions vidéo de l'ordinateur (en association avec le moniteur). Il peut s'agir d'une carte d'extension installée dans un connecteur ou de circuits intégrés à la carte système. cavalier : petit composant d'une carte à circuits imprimés et comprenant au moins deux broches. Des fiches de plastique contenant un fil s'emboîtent sur les broches. Ce fil relie les broches et ferme un circuit, offrant un moyen simple et réversible de changer le câblage de la carte. CC : courant continu. clé de mémoire : périphérique de stockage portatif à mémoire flash, intégré à un connecteur USB. clé de mémoire USB : voir clé de mémoire. cm : centimètre. COMn : nom de périphérique désignant les ports série du système. Il est possible que certains ports COM soient virtuels (par exemple, votre système peut être équipé de deux ports COM, mais d'un seul connecteur physique). connecteur d'extension : connecteur situé sur la carte système ou la carte de montage et permettant d'installer une carte d'extension. contrôleur : puce ou carte d'extension qui contrôle le transfert des données entre le processeur et la mémoire ou entre le processeur et un périphérique. CPU : acronyme de “Central Processing Unit”, unité centrale de traitement. Voir processeur. DDR : acronyme de “Double Data Rate”, double débit de données. Technologie de barrette de mémoire qui permet de doubler potentiellement le débit des données en transférant celles-ci à la fois durant les phases ascendantes et descendantes d'un cycle d'horloge. DEL : diode électroluminescente. Dispositif électronique qui s'allume lorsqu'il est traversé par un courant.Glossaire 215 DHCP : acronyme de “Dynamic Host Configuration Protocol”. Méthode permettant d'affecter automatiquement une adresse IP à un système client. diagnostics : ensemble complet de tests destinés au système. DIMM : acronyme de “Dual In-Line Memory Module”, module de mémoire à double rangée de connexions. Voir aussi module de mémoire. DNS : acronyme de “Domain Name System”, système de noms de domaines. Méthode de conversion des noms de domaines Internet (par exemple www.dell.com) en adresses IP (par exemple 208.77.188.166). DRAM : acronyme de “Dynamic Random-Access Memory”, mémoire vive dynamique. Normalement, la mémoire vive d'un système est composée entièrement de puces DRAM. DVD acronyme de “digital versatile disc” (disque numérique polyvalent) ou de “digital video disc” (disque vidéo numérique). E/S : entrée/sortie. Un clavier est un périphérique d'entrée et une imprimante est un périphérique de sortie. En général, l'activité d'E/S peut être différenciée de l'activité de calcul. ECC : acronyme de “Error Checking and Correction”, vérification et correction d'erreurs. EMI : acronyme de “ElectroMagnetic Interference”, interférence électromagnétique. ESD : acronyme de “Electrostratic Discharge”, décharge électrostatique. ESM : acronyme de “Embedded Server Management”, gestion de serveur intégrée. Voir iDRAC. F : Fahrenheit. FAT: acronyme de “File allocation table”, table d'allocation des fichiers. Structure de système de fichiers utilisée par MS-DOS® pour organiser le stockage des fichiers et assurer son suivi. Les systèmes d'exploitation Microsoft® Windows® offrent la possibilité d'utiliser une structure de système de fichiers FAT. Fibre Channel : interface réseau à haut débit utilisée principalement avec les périphériques de stockage en réseau. fichier read-only : fichier accessible en lecture seule, qui ne peut être ni modifié, ni effacé. FTP : acronyme de “File Transfert Protocol”, protocole de transfert de fichiers. g : gramme. G : gravité. Gb : gigabit ; 1 024 mégabits, soit 1 073 741 824 bits.216 Glossaire Go : giga-octet ; 1 024 méga-octets, soit 1 073 741 824 octets. La mesure est souvent arrondie à 1 000 000 000 octets lorsqu'elle fait référence à la capacité d'un disque dur. Hz : hertz. iDRAC, iDRAC6 : acronyme de “Integrated Dell Remote Access Controller”, contrôleur d'accès à distance intégré de Dell. Matériel et solution logicielle de gestion de systèmes offrant des fonctions de gestion à distance, de restauration de système bloqué et de régulateur de puissance pour les systèmes Dell™ PowerEdge™. iDRAC6 désigne une mise en oeuvre spécifique d'iDRAC. informations de configuration du système : données stockées en mémoire afin d'indiquer au système quel est le matériel installé et quelle configuration doit être utilisée. IP : acronyme de “Internet Protocol”, protocole Internet. IPv6 : acronyme de “Internet Protocol” version 6. IPX : acronyme de “Internet package exchange”. IRQ : Interrupt ReQuest (demande d'interruption). Signal indiquant que des données vont être envoyées ou reçues par un périphérique, et envoyé au processeur par une ligne d'IRQ. Chaque connexion avec un périphérique doit avoir un numéro d'IRQ. Deux périphériques peuvent avoir la même IRQ, mais vous ne pouvez pas les utiliser simultanément. iSCSI : “Internet SCSI” (voir SCSI). Protocole permettant d'établir des communications avec les périphériques SCSI sur un réseau ou sur Internet. K : kilo, 1 000. Kb : kilobit ; 1 024 bits. Kbps : kilobits par seconde. kg : kilogramme : 1 000 grammes. kHz : kilohertz. Ko : kilo-octet ; 1 024 octets. KVM : acronyme de “Keyboard/Video/Mouse”, ensemble clavier/moniteur/souris. Le terme KVM désigne un commutateur qui permet de sélectionner le système correspondant à la sortie vidéo affichée et auquel s'applique l'utilisation du clavier et de la souris. lame : module équipé d'un processeur, de mémoire et d'un disque dur. Ces modules sont montés dans une baie qui dispose de blocs d'alimentations et de ventilateurs.Glossaire 217 LAN : acronyme de “Local Area Network”, réseau local. Un LAN se limite normalement à un bâtiment ou à un groupe de bâtiments proches, où tout le l'équipement est relié par des câbles réservés au réseau LAN. LCD : acronyme de “Liquid Crystal Display”, écran à cristaux liquides. LOM : acronyme de “LAN on motherboard” (LAN inclus sur la carte mère). Également référencé sous le terme : carte NIC intégrée (embedded NIC). LVD : acronyme de “Low Voltage Differential”, différentiel à basse tension. m : mètre. mA : milliampère. mAh : milliampères à l'heure. Mb : mégabit, soit 1 048 576 bits. Mbps : mégabits par seconde. MBR : acronyme de “Master Boot Record”, enregistrement d'amorçage principal. mémoire : zone de stockage des données de base du système. Un ordinateur peut disposer de différentes sortes de mémoire, par exemple intégrée (RAM et ROM) et ajoutée sous forme de barrettes DIMM. mémoire cache : zone de mémoire rapide contenant une copie des données ou des instructions et permettant d'accélérer leur extraction. mémoire flash : type de puce électronique qui peut être programmée et reprogrammée à l'aide d'un logiciel. mémoire système : voir RAM. mémoire vidéo : la plupart des cartes vidéo contiennent des puces de mémoire qui viennent s'ajouter à la RAM du système. L'espace mémoire vidéo installé affecte surtout le nombre de couleurs affichables par un programme (si les pilotes vidéo et la capacité de moniteur sont adéquats). MHz : mégahertz. mise en miroir : type de mise en redondance des données qui utilise un ensemble de disques physiques ou de barrettes de mémoire pour stocker des données et un ou plusieurs ensembles de disques ou de barrettes de mémoire supplémentaires pour stocker des copies de données. Cette fonction est assurée par un logiciel. Voir également répartition et RAID. mm : millimètre. Mo : méga-octet, soit 1 048 576 octets. La mesure est souvent arrondie à 1 000 000 octets lorsqu'elle fait référence à la capacité d'un disque dur.218 Glossaire mode graphique : mode vidéo qui peut être défini par le nombre de pixels horizontaux x, le nombre de pixels verticaux y et le nombre de couleurs z. module de mémoire : petite carte de circuits qui contient des puces de mémoire vive dynamique et se connecte à la carte système. ms : milliseconde. NAS : Acronyme de “Network Attached Storage”, stockage réseau. Le NAS est l'un des concepts utilisés pour l'implémentation du stockage partagé sur un réseau. Les systèmes NAS ont leurs propres systèmes d'exploitation, matériel intégré, et leurs propres logiciels optimisés pour répondre à des besoins spécifiques en termes de stockage. NIC : acronyme de “Network Interface Controller”. Dispositif intégré ou installé sur un système afin de permettre sa connexion à un réseau. NMI : acronyme de “NonMaskable Interrupt”, interruption non masquable. Un matériel envoie une NMI pour signaler des erreurs matérielles au processeur. ns : nanoseconde. numéro de service : code à barres qui se trouve sur le système et permet de l'identifier lorsque vous appelez le support technique de Dell. numéro d'inventaire : code individuel attribué à un système, normalement par un administrateur, à des fins de sécurité ou de suivi. NVRAM : acronyme de “Non-Volatile Random-Access Memory”, mémoire vive rémanente. Mémoire qui ne perd pas son contenu lorsque le système est mis hors tension. La NVRAM est utilisée pour conserver la date, l'heure et les informations de configuration du système. panneau de commande : partie du système sur laquelle se trouvent des voyants et les contrôles (bouton d'alimentation, voyant d'alimentation, etc.). parité : informations redondantes associées à un bloc de données. partition : vous pouvez partager un disque dur en plusieurs sections physiques appelées partitions, avec la commande fdisk. Chaque partition peut contenir plusieurs disques logiques. Après un partitionnement, vous devez formater chaque disque logique avec la commande format. PCIe : acronyme de “Peripheral Component Interconnect Express”, interconnexion de composants périphériques Express. Norme pour l'implémentation des bus locaux. PDU : acronyme de “Power Distribution Unit”, unité de distribution électrique. Source d'alimentation dotée de plusieurs prises de courant qui fournit l'alimentation électrique aux serveurs et aux systèmes de stockage d'un rack. périphérique : matériel interne ou externe connecté à un système (lecteur de disquette, clavier, etc.).Glossaire 219 pilote : voir Pilote de périphérique. pilote de périphérique : programme qui permet au système d'exploitation ou à un autre programme de communiquer correctement avec un périphérique donné. pixel : point sur un écran vidéo. Les pixels sont disposés en lignes et en colonnes afin de créer une image. Une résolution vidéo, par exemple 640 x 480, indique le nombre de pixels en largeur et en hauteur. port en amont : port sur un commutateur ou un concentrateur réseau, qui sert à le relier à un autre commutateur ou concentrateur sans utiliser de câble croisé. port série : port d'E-S hérité, équipé d'un connecteur à 9 broches, qui permet de transférer les données bit par bit et sert le plus souvent à relier un modem au système. POST: acronyme de “Power-On Self-Test”, auto-test de démarrage. Au démarrage du système, ce programme teste différents composants (RAM, disques durs, etc.) avant le chargement du système d'exploitation. processeur : circuit de calcul principal du système, qui contrôle l'interprétation et l'exécution des fonctions mathématiques et logiques. Un logiciel écrit pour un processeur doit souvent être révisé pour fonctionner sur un autre processeur. CPU est un synonyme de processeur. programme de configuration du système : programme qui fait partie du BIOS et permet de configurer le matériel du système et de personnaliser son fonctionnement en paramétrant diverses fonctions telles que la protection par mot de passe. Le programme de configuration du système étant stocké dans la mémoire vive rémanente, tous les paramètres définis demeurent inchangés tant qu'ils ne sont pas modifiés manuellement. PSU : acronyme de “Power supply unit”, bloc d'alimentation. PXE : acronyme de “Preboot eXecution Environment”, environnement d'exécution avant démarrage. La fonction PXE permet de démarrer un système (sans disque dur ni disquette amorçable) à partir d'un réseau local. QPI : acronyme de “QuickPath Interconnect”, interconnexion par voie rapide. Interface de bus entre processeurs, ainsi qu'entre les processeurs et la puce IOH. RAID : acronyme de “Redundant Array of Independent Disks”, matrice redondante de disques indépendants. Méthode de mise en redondance des données. Les niveaux RAID les plus utilisés sont les niveaux RAID 0, RAID 1, RAID 5, RAID 6, RAID 10, RAID 50 et RAID 60. Voir aussi mise en miroir et répartition. RAM : acronyme de “Random-Access Memory”, mémoire vive. Zone principale de stockage temporaire du système pour les instructions d'un programme et les données. Toutes les informations stockées dans la RAM sont perdues lorsque vous éteignez le système.220 Glossaire RDIMM : module de mémoire DDR3 enregistré. readme : fichier texte fourni avec un logiciel ou un matériel, et qui contient des informations complétant ou mettant à jour la documentation. remplaçable à chaud : permet de remplacer un périphérique (généralement un disque dur, un bloc d'alimentation ou un ventilateur interne) lorsque le système hôte est mis sous tension et est en cours d'exécution. résolution vidéo : une résolution vidéo, par exemple 800 x 600, indique le nombre de pixels en largeur et en hauteur. Pour afficher un programme à une résolution graphique spécifique, vous devez installer les pilotes vidéo appropriés et votre moniteur doit prendre en charge cette résolution. ROM : acronyme de “Read-Only Memory”, mémoire morte. La ROM contient des programmes essentiels au fonctionnement du système. Une puce de mémoire ROM conserve les informations qu'elle contient même lorsque le système est mis hors tension. Le programme qui lance la routine d'amorçage et l'autotest de démarrage de l'ordinateur sont des exemples de code résidant dans la ROM. ROMB : acronyme de “RAID on Motherboard”, fonction RAID incluse sur la carte mère. SAN : acronyme de “Storage Area Network”, réseau de stockage. Architecture de réseau qui permet à des périphériques de stockage reliés à un réseau à distance d'apparaître comme étant connectés localement à un serveur. SAS : acronyme de “Serial-Attached SCSI”. SATA : acronyme de “Serial Advanced Technology Attachment”, connexion par technologie série avancée. Interface standard entre la carte système et les périphériques de stockage. sauvegarde : copie d'un programme ou de données. Par précaution, il convient de sauvegarder régulièrement le(s) disque(s) dur(s) du système. SCSI : acronyme de “Small Computer System Interface”, interface pour petits systèmes informatiques. Interface de bus d'entrée-sortie. SDDC : acronyme de “Single Service Data Correction”. SDRAM : acronyme de “Synchronous Dynamic Random-Access Memory”, mémoire vive dynamique synchrone. sec : seconde. SMART: acronyme de “Self-Monitoring Analysis and Reporting Technology”, technologie de prévision des défaillances des lecteurs de disque. Cette technologie permet aux disques durs de signaler les erreurs et les pannes au BIOS du système, puis d'afficher un message d'erreur sur l'écran.Glossaire 221 SMP : acronyme de “Symmetric MultiProcessing”, multi-traitement symétrique. Se dit d'un système qui dispose de plusieurs processeurs reliés par un lien haut débit géré par un système d'exploitation où tous les processeurs ont les mêmes priorités d'accès au système d'E/S. SNMP : acronyme de “Simple Network Management Protocol”, protocole de gestion de réseau simple. Interface standard qui permet au gestionnaire du réseau de surveiller et de gérer les stations de travail à distance. SSD : acronyme de “Solid-state drive”, disque électronique. striping (répartition des données) : méthode qui consiste à écrire des données sur au moins trois disques d'une matrice en utilisant uniquement une partie de l'espace disponible sur chacun. L'espace occupé par une bande (“stripe”) est le même sur chaque disque. Un disque virtuel peut utiliser plusieurs bandes sur le même jeu de disques d'une matrice. Voir aussi guarding, mise en miroir et RAID. TCP/IP : acronyme de “Transmission Control Protocol/Internet Protocol”. température ambiante : température de l'endroit ou de la pièce où se trouve le système. terminaison : certains périphériques (par exemple à chaque extrémité d'un câble SCSI) doivent être dotés d'une terminaison pour empêcher les réflexions et les signaux parasites sur le câble. Lorsque de tels périphériques sont connectés en série, il est parfois nécessaire d'activer ou de désactiver leur terminaison en modifiant le réglage des cavaliers ou des commutateurs installés ou en modifiant des paramètres à l'aide du logiciel de configuration approprié. To : téraoctet ; 1 024 gigaoctets ou 1 099 511 627 776 octets. La mesure est souvent arrondie à 1 000 000 000 000 octets lorsqu'elle fait référence à la capacité d'un disque dur. TOE : acronyme de “TCP/IP Offload Engine”, moteur de décentralisation TCP/IP. UDIMM : module de mémoire DDR3 non enregistrée (sans tampon). UEFI : acronyme de “Unified Extensible Firmware Interface”. UPS : acronyme de “Uninterruptible Power Supply”, onduleur. Unité, alimentée par batterie, qui fournit automatiquement l'alimentation du système en cas de coupure de courant. USB : acronyme de “Universal Serial Bus”, bus série universel. Un connecteur USB permet de relier divers périphériques compatibles avec la norme USB (souris, claviers, etc.). Les périphériques USB peuvent être branchés et débranchés pendant que le système est en fonctionnement. utilitaire : programme qui sert à gérer les ressources du système (mémoire, disques durs, imprimantes, etc.).222 Glossaire V: Volt. VCA : Volts en courant alternatif. VCC : Volts en courant continu. virtualisation : possibilité de partager, via un logiciel, les ressources d'un ordinateur unique avec de multiples environnements. Un système physique donné peut apparaître pour l'utilisateur sous la forme d'une multitude de systèmes virtuels qui peuvent héberger plusieurs systèmes d'exploitation. W: Watt. WH : Watt/heure. XML : acronyme de “Extensible Markup Language”. Le langage XML sert à créer des formats communs d'information, puis à partager le format et les données sur le Web, les intranets, etc. ZIF : acronyme de “Zero insertion force”, force d'insertion nulle.Index 223 Index A alimentation voyants, 14, 25 Assemblage du panneau de commande Caractéristiques, 14 assemblage du panneau de commande fonctionnalités de l'écran LCD, 17 installation, 164 retrait, 161 assistance contacter Dell, 211 avertissement messages, 68 B barrettes de mémoire (DIMM) configuration, 145 configurations RDIMM, 148 configurations UDIMM, 141 installation, 150 retrait, 153 batterie (RAID) installation, 139 retrait, 138 batterie du système remplacement, 158 batterie RAID installation, 139 retrait, 138 blocs d'alimentation dépannage, 183 installation, 109 retrait, 108 voyants, 25 C Cache Bloc d'alimentation, 110 Disque dur, 103-105 Cache de bloc d'alimentation, 110 Cache de lecteur Installation, 104 Retrait, 103-105 cadre avant installation, 99 retrait, 99 caractéristiques du système accès, 13 carte de contrôleur de stockage retrait, 134 carte de contrôleur de stockage intégré224 Index installation, 136 retrait, 134, 136 carte de distribution de l'alimentation installation, 170 retrait, 169 carte iDRAC6 Enterprise installation, 124 retrait, 126 carte SD interne dépannage, 188 installation, 119 retrait, 119 carte SD VFlash installation, 127 carte système cavaliers, 203 connecteurs, 204 installation, 174 retrait, 172 cartes d'extension, 140 dépannage, 194 installation, 141 retrait, 144 Cartes d'extension PCIe Voir Cartes d'extension. cartes NIC dépannage, 180 clavier dépannage, 178 clé de mémoire USB dépannage, 189 installation, 123 retrait, 123 clé matérielle de la carte réseau, 127 clé USB interne dépannage, 189 configuration mot de passe, 94 connecteurs carte de distribution de l'alimentation, 208 fond de panier SAS, 207 NIC, 23 panneau arrière, 23 port série, 23 USB, 14, 23 vidéo, 14, 23 Consignes Installation de cartes d'extension, 140 consignes installation de mémoire, 145 contacter Dell, 211 contrôleur de stockage dépannage, 193 contrôleur de stockage intégré Voir contrôleur de stockage. contrôleur SAS Voir contrôleur de stockage. coordonnées téléphoniques, 211Index 225 D Dell contacter, 211 démarrage accès aux fonctions du système, 13 Dépannage Lecteur optique, 190 dépannage blocs d'alimentation, 183 carte NIC, 180 carte SD interne, 188 cartes d'extension, 194 clavier, 178 clé USB interne, 189 connexions externes, 178 contrôleur de stockage, 193 disque dur, 192 échec de démarrage du système, 177 lecteur de bande, 191 mémoire, 186 pile (système), 183 processeur, 196 refroidissement du système, 184 système endommagé, 182 système mouillé, 181 ventilateurs, 185 vidéo, 178 diagnostics utilisation de Dell PowerEdge Diagnostics, 199 DIMM Voir barrettes de mémoire. dispositif antibasculement installation, 111 retrait, 110 Disque dur Support de lecteur, 106 disque dur dépannage, 192 retrait, 104 disques durs configurations mixtes, 103 installation, 105 disques durs SSD, 102 dissipateur de chaleur, 155 E échec de démarrage du système, 177 écran LCD fonctionnalités, 17 F fermeture du système, 102 fonctionnalités du panneau arrière, 23 fond de panier voir fond de panier SAS. fond de panier SAS installation, 168 retrait, 165226 Index G garantie, 68 I Installation Cache de disque dur, 104 Protecteur de ventilation, 113 installation assemblage du panneau de commande, 164 barrettes de mémoire (DIMM), 150 batterie (RAID), 139 batterie RAID, 139 blocs d'alimentation, 109 cadre avant, 99 carte de contrôleur de stockage intégré, 136 carte de distribution de l'alimentation, 170 carte iDRAC6 Enterprise, 124 carte SD interne, 119 carte SD VFlash, 127 carte système, 174 cartes d'extension, 141 clé de mémoire USB, 123 dispositif antibasculement, 111 disque dur dans un support, 106 disques durs, 105 fond de panier SAS, 168 lecteur de bande, 130 lecteur optique, 130 module SD interne, 116 module USB interne, 121 processeur, 157 Integrated Dell Remote Access Controller Voir carte iDRAC6 Enterprise. L lecteur de bande dépannage, 191 installation, 130 retrait, 129 lecteur de DVD. Voir disque optique. Lecteur optique Dépannage, 190 lecteur optique installation, 130 retrait, 129 LOM (LAN-on-motherboard) Voir Cartes NIC. M mémoire dépannage, 186 messages avertissement, 68 écran LCD, 27 messages d'erreur, 72 système, 45 messages d'erreur, 72 microprocesseurIndex 227 Voir processeur. mise à niveau processeur, 154 mode d'amorçage, 71 mode d'amorçage BIOS, 71 mode d'amorçage UEFI, 71 mode de mise en miroir de la mémoire, 147 mode mémoire ECC avancé, 147 mise en miroir, 147 optimiseur, 147 mode mémoire ECC avancé, 147 mode optimiseur de mémoire, 147 module SD interne installation, 116 retrait, 118 module USB interne installation, 121 retrait, 120 mot de passe configuration, 94 désactivation, 209 système, 91 N NIC Connecteurs, 23 voyants, 27 numéros de téléphone, 211 O ouverture du système, 100 P Panneau avant, caractéristiques, 14 panneau LCD menus, 19 PDU Voir carte de distribution de l'alimentation pile (système) dépannage, 183 port série connecteur, 23 POST accès aux fonctions du système, 13 processeur dépannage, 196 installation, 157 mise à niveau, 154 retrait, 154 programme de configuration du système options de mémoire, 77 options de sécurité du système, 84-86 options des communications série, 82-83 options des périphériques intégrés, 81228 Index options du processeur, 78 touches, 72 protecteur de ventilation installation, 113 retrait, 112 protection du système, 84-86, 93 PSU Voir bloc d'alimentation. R refroidissement du système dépannage, 184 remplacement batterie du système, 158 remplacement à chaud blocs d'alimentation, 108 disques durs, 102 Retrait Barrettes de mémoire, 153 Cache de disque dur, 103-105 Disques durs, 104 retrait assemblage du panneau de commande, 161 batterie (RAID), 138 batterie RAID, 138 blocs d'alimentation, 108 cadre avant, 99 carte de contrôleur de stockage intégré, 134 carte de distribution de l'alimentation, 169 carte iDRAC6 Enterprise, 126 carte SD interne, 119 carte système, 172 cartes d'extension, 144 clé de mémoire USB, 123 dispositif antibasculement, 110 disque dur installé dans un support, 106 fond de panier SAS, 165 lecteur de bande, 129 lecteur optique, 129 module SD interne, 118 module USB interne, 120 processeur, 154 protecteur de ventilation, 112 ventilateurs, 114 S sécurité, 177 sécurité TPM, 84-86 support de lecteur disque dur, 106 système fermeture, 102 messages, 45 mot de passe, 91 ouverture, 100 système mouillé dépannage, 181 systèmes endommagés dépannage, 182Index 229 U UEFI Boot Manager accès, 89 écran de configuration UEFI, 90 écran des utilitaires système, 91 écran principal, 90 USB Connecteurs du panneau arrière, 23 Connecteurs du panneau avant, 14 utilitaire de configuration iDRAC, 96 V ventilateur dépannage, 185 ventilateurs retrait, 114 vidéo connecteur, 23 dépannage, 178 voyants carte NIC, 27 panneau arrière, 23 panneau avant, 14 voyants d'alimentation, 14, 25230 Index Dell™ PowerEdge™ R905 Manuel du propriétaireRemarques, avis et précautions REMARQUE : Une REMARQUE indique des informations importantes qui peuvent vous aider à mieux utiliser votre ordinateur. AVIS : Un AVIS vous avertit d'un risque de dommage matériel ou de perte de données et vous indique comment éviter le problème. PRÉCAUTION : Une PRÉCAUTION indique un risque potentiel d'endommagement du matériel, de blessure corporelle ou de mort. ____________________ Les informations contenues dans ce document peuvent être modifiées sans préavis. © 2007-2009 Dell Inc. Tous droits réservés. La reproduction de ce document de quelque manière que ce soit sans l'autorisation écrite de Dell Inc. est strictement interdite. Marques utilisées dans ce document : Dell, le logo DELL, PowerEdge et Dell OpenManage sont des marques de Dell Inc. ; AMD, AMD Opteron et les combinaisons de ces deux termes sont des marques d'Advanced Micro Devices, Inc. ; Microsoft, Windows, Windows Server et MS-DOS sont des marques ou des marques déposées de Microsoft Corporation aux États-Unis et/ou dans d'autres pays. D'autres marques et noms de marques peuvent être utilisés dans ce document pour faire référence aux entités se réclamant de ces marques et de ces noms ou à leurs produits. Dell Inc. dénie tout intérêt propriétaire vis-à-vis des marques et des noms de marque autres que les siens. Septembre 2009 P/N HX574 Rév. A02Sommaire 3 Sommaire 1 À propos du système . . . . . . . . . . . . . . . . 11 Autres informations utiles . . . . . . . . . . . . . . . 11 Fonctions du système accessibles au démarrage . . . 12 Voyants et caractéristiques du panneau avant . . . . . 14 Codes des voyants de disques durs . . . . . . . . 16 Voyants et caractéristiques du panneau arrière . . . . 18 Connexion de périphériques externes . . . . . . . 19 Codes du voyant d'alimentation . . . . . . . . . . . . 19 Codes des voyants de NIC . . . . . . . . . . . . . . . . 21 Messages d'état affichés sur l'écran LCD . . . . . . . 22 Résolution des incidents décrits par les messages d'état de l'écran LCD . . . . . . . . 36 Effacement des messages d'état affichés sur l'écran LCD . . . . . . . . . . . . . . . . . . . 36 Messages système . . . . . . . . . . . . . . . . . . . 37 Messages d'avertissement . . . . . . . . . . . . . . . 47 Messages de diagnostic . . . . . . . . . . . . . . . . 47 Messages d'alerte . . . . . . . . . . . . . . . . . . . . 474 Sommaire 2 Utilisation du programme de configuration du système . . . . . . . . . . . . . . . . . . . . . . . 49 Accès au programme de configuration du système . . . . . . . . . . . . . . . . . . . . . . . . 49 Réponse aux messages d'erreur . . . . . . . . . . 50 Utilisation du programme de configuration du système . . . . . . . . . . . . . . . . . . . . . 50 Options de configuration du système . . . . . . . . . . 51 Écran principal . . . . . . . . . . . . . . . . . . . 51 Écran Memory Information (Informations sur la mémoire) . . . . . . . . . . . . . . . . . . . . . 54 Écran CPU Information (Informations sur le processeur) . . . . . . . . . . . . . . . . . . . 56 Écran Integrated Devices (Périphériques intégrés) . . . . . . . . . . . . . . 57 Écran Serial Communication (Communication série) . . . . . . . . . . . . . . . 59 Écran System Security (Sécurité du système) . . . 60 Écran Exit (Quitter) . . . . . . . . . . . . . . . . . 63 Mot de passe système et mot de passe de configuration . . . . . . . . . . . . . . . . . . . . . 63 Utilisation du mot de passe système . . . . . . . . 64 Utilisation du mot de passe de configuration . . . 67 Désactivation d'un mot de passe oublié . . . . . . . . 69 Configuration du contrôleur BMC . . . . . . . . . . . . 69 Accès au module de configuration BMC . . . . . 69 Options du module de configuration du contrôleur BMC . . . . . . . . . . . . . . . . . . 70Sommaire 5 3 Installation des composants du système . . . . . . . . . . . . . . . . . . . . . . . 71 Outils recommandés . . . . . . . . . . . . . . . . . . 72 À l'intérieur du système . . . . . . . . . . . . . . . . . 72 Retrait et réinstallation du cadre avant en option . . . 74 Ouverture et fermeture du système . . . . . . . . . . . 75 Ouverture du système . . . . . . . . . . . . . . . 75 Fermeture du système . . . . . . . . . . . . . . . 77 Ventilateurs . . . . . . . . . . . . . . . . . . . . . . . 77 Retrait d'un ventilateur . . . . . . . . . . . . . . . 77 Réinstallation d'un ventilateur . . . . . . . . . . . 79 Assemblage du protecteur de ventilation . . . . . . . 79 Retrait de l'assemblage du protecteur de ventilation . . . . . . . . . . . . . . . . . . . . 79 Réinstallation de l'assemblage du protecteur de ventilation . . . . . . . . . . . . . . . . . . . . 81 Blocs d'alimentation . . . . . . . . . . . . . . . . . . 81 Retrait d'un bloc d'alimentation . . . . . . . . . . 81 Réinstallation d'un bloc d'alimentation . . . . . . 82 Module d'extension processeurs (PEM) . . . . . . . . 83 Retrait du module PEM ou de son boîtier . . . . . 83 Réinstallation du module PEM ou de son boîtier . . . . . . . . . . . . . . . . . . . . 87 Cartes d'extension . . . . . . . . . . . . . . . . . . . 87 Consignes d'installation des cartes d'extension . 87 Installation d'une carte d'extension . . . . . . . . 89 Retrait d'une carte d'extension . . . . . . . . . . 91 Carte de montage . . . . . . . . . . . . . . . . . . . . 926 Sommaire Retrait de la carte de montage . . . . . . . . . . . 92 Réinstallation de la carte de montage . . . . . . . 94 Carte RAC . . . . . . . . . . . . . . . . . . . . . . . . 94 Installation d'une carte RAC en option . . . . . . . 94 Clé de mémoire USB interne (en option) . . . . . . . . 96 Installation de la clé de mémoire USB interne en option . . . . . . . . . . . . . . . . . . . . . . 98 Clé TOE/iSCSI (en option) . . . . . . . . . . . . . . . . 99 Carte mémoire SD . . . . . . . . . . . . . . . . . . . . 101 Carte réseau fille . . . . . . . . . . . . . . . . . . . . 101 Installation de la carte réseau fille . . . . . . . . . 101 Retrait de la carte réseau fille . . . . . . . . . . . 104 Mémoire système . . . . . . . . . . . . . . . . . . . . 105 Consignes générales pour l'installation des barrettes de mémoire . . . . . . . . . . . . . 105 Installation de barrettes de mémoire . . . . . . . 109 Retrait de barrettes de mémoire . . . . . . . . . . 111 Processeurs . . . . . . . . . . . . . . . . . . . . . . . 113 Retrait d'un processeur . . . . . . . . . . . . . . 113 Installation d'un processeur . . . . . . . . . . . . 116 Installation d'un lecteur optique . . . . . . . . . . . . 118 Disques durs . . . . . . . . . . . . . . . . . . . . . . . 120 Avant de commencer . . . . . . . . . . . . . . . . 121 Configuration du périphérique d'amorçage . . . . 122 Retrait d'un cache de lecteur . . . . . . . . . . . 122 Installation d'un cache de lecteur . . . . . . . . . 123 Retrait d'un disque dur enfichable à chaud . . . . 123Sommaire 7 Installation d'un disque dur enfichable à chaud . . . . . . . . . . . . . . . . . . . . . . . 124 Réinstallation d'un disque dur dans un support . . . . . . . . . . . . . . . . . . . . . 125 Cartes contrôleurs SAS . . . . . . . . . . . . . . . . . 127 Retrait d'une carte contrôleur SAS . . . . . . . . 127 Installation d'une carte contrôleur SAS . . . . . . 127 Installation de la batterie de la carte contrôleur RAID SAS . . . . . . . . . . . . . . . . . . . . . . 129 Connexion d'un lecteur de bande SAS externe . . . . 129 Connexion d'un périphérique de stockage Fibre Channel externe . . . . . . . . . . . . . . . . . . 130 Pile du système . . . . . . . . . . . . . . . . . . . . . 131 Remplacement de la pile du système . . . . . . . 131 Assemblage du panneau de commande . . . . . . . . 133 Retrait du panneau de commande . . . . . . . . . 133 Installation du panneau de commande . . . . . . 136 Commutateur d'intrusion du châssis . . . . . . . . . . 136 Retrait du commutateur d'intrusion du châssis . . 136 Installation du commutateur d'intrusion du châssis . . . . . . . . . . . . . . . . . . . . . 137 Fond de panier SAS . . . . . . . . . . . . . . . . . . . 138 Retrait du fond de panier SAS . . . . . . . . . . . 138 Installation d'un fond de panier SAS . . . . . . . 142 Carte adaptatrice pour les périphériques . . . . . . . 143 Retrait d'une carte adaptatrice pour les périphériques . . . . . . . . . . . . . . . . . . . 143 Remplacement d'une carte adaptatrice pour les périphériques . . . . . . . . . . . . . . . . . . 1458 Sommaire Carte adaptatrice pour les ventilateurs . . . . . . . . . 146 Retrait d'une carte adaptatrice pour les ventilateurs . . . . . . . . . . . . . . . . . . . 146 Installation d'une carte adaptatrice pour les ventilateurs . . . . . . . . . . . . . . . . . . . 148 Carte système . . . . . . . . . . . . . . . . . . . . . . 149 Retrait de la carte système . . . . . . . . . . . . . 149 Installation de la carte système . . . . . . . . . . 152 Carte de distribution de l'alimentation . . . . . . . . . 154 Retrait de la carte de distribution de l'alimentation . . . . . . . . . . . . . . . . . . . . 154 Installation de la carte de distribution de l'alimentation . . . . . . . . . . . . . . . . . . . . 156 Carte du module d'extension processeurs . . . . . . . 156 Retrait de la carte du module PEM . . . . . . . . . 156 Remplacement de la carte du module PEM . . . . 158 4 Dépannage du système . . . . . . . . . . . . . 161 La sécurité d'abord, pour vous et pour le système . . . 161 Routine de démarrage . . . . . . . . . . . . . . . . . . 161 Vérification des incidents simples liés à l'alimentation . . . . . . . . . . . . . . . . . . . . . 162 Vérification du matériel . . . . . . . . . . . . . . . . . 163 Dépannage des connexions externes . . . . . . . 163 Dépannage du sous-système vidéo . . . . . . . . 163 Dépannage du clavier ou de la souris . . . . . . . 164 Dépannage des incidents liés aux E/S série . . . . . . 166 Dépannage d'un périphérique d'E/S série . . . . . 167 Dépannage d'un périphérique USB . . . . . . . . 167Sommaire 9 Dépannage d'un NIC . . . . . . . . . . . . . . . . . . 169 Dépannage d'un système mouillé . . . . . . . . . . . . 170 Dépannage d'un système endommagé . . . . . . . . . 171 Dépannage de la pile du système . . . . . . . . . . . . 172 Dépannage des blocs d'alimentation . . . . . . . . . . 173 Dépannage des problèmes de refroidissement du système . . . . . . . . . . . . . . . . . . . . . . . . 174 Dépannage d'un ventilateur . . . . . . . . . . . . 174 Dépannage de la mémoire système . . . . . . . . . . . 176 Dépannage d'un lecteur optique . . . . . . . . . . . . 178 Dépannage d'un disque dur . . . . . . . . . . . . . . . 179 Dépannage d'un contrôleur SAS ou RAID SAS . . . . . 181 Dépannage d'un lecteur de bande SAS externe . . . . 183 Dépannage des cartes d'extension . . . . . . . . . . . 184 Dépannage des microprocesseurs . . . . . . . . . . . 186 5 Exécution des diagnostics du système 189 Utilisation de Dell PowerEdge Diagnostics . . . . . . 189 Fonctionnalités des diagnostics du système . . . . . . 189 Quand utiliser les diagnostics du système . . . . . . . 190 Exécution des diagnostics du système . . . . . . . . . 190 Options de test des diagnostics du système . . . . . . 19110 Sommaire Utilisation des options de test personnalisées . . . . . 191 Sélection de périphériques à tester . . . . . . . . 191 Sélection d'options de diagnostic . . . . . . . . . 192 Visualisation des informations et des résultats . . . . . . . . . . . . . . . . . . . . 192 6 Cavaliers et connecteurs . . . . . . . . . . . 193 Cavaliers de la carte système . . . . . . . . . . . . . . 193 Désactivation d'un mot de passe oublié . . . . . . . . 194 Connecteurs de la carte système . . . . . . . . . . . . 195 Connecteurs de la carte du module d'extension processeurs . . . . . . . . . . . . . . . . . . . . . . . 198 Connecteurs de la carte de fond de panier SAS . . . . 199 Carte adaptatrice SAS 2,5 pouces pour les périphériques . . . . . . . . . . . . . . . . . 201 7 Obtention d'aide . . . . . . . . . . . . . . . . . . 203 Contacter Dell . . . . . . . . . . . . . . . . . . . . . . 203 Glossaire . . . . . . . . . . . . . . . . . . . . . . . . . . . 205 Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219À propos du système 11 À propos du système Cette section décrit les caractéristiques essentielles au fonctionnement du système (matériel, micrologiciel et interface logicielle). Les connecteurs situés sur les panneaux avant et arrière du système permettent au système de bénéficier d'une connectivité optimale et de nombreuses possibilités d'extension. Le micrologiciel, le système d'exploitation et les applications gèrent le système ainsi que l'état des composants. Ils vous alertent lorsqu'un incident survient. Les informations concernant l'état du système peuvent être transmises par les éléments suivants : • Voyants des panneaux avant et arrière • Messages d'état affichés sur l'écran LCD • Messages du système • Messages d'avertissement • Messages de diagnostic • Messages d'alerte Cette section décrit chaque type de message, répertorie les causes possibles et les mesures à prendre pour résoudre les problèmes indiqués. Les voyants et les caractéristiques du système sont présentés dans cette section. Autres informations utiles PRÉCAUTION : Le document Product Information Guide (Guide d'information sur le produit) contient d'importantes informations se rapportant à la sécurité et aux réglementations. Les informations sur la garantie se trouvent soit dans ce document, soit à part. • Les documents Rack Installation Guide (Guide d'installation du rack) et Rack Installation Instructions (Instructions d'installation du rack) fournis avec la solution rack décrivent l'installation du système. • Le document Getting Started Guide (Guide de mise en route) décrit les caractéristiques du système, les procédures de configuration et les spécifications techniques.12 À propos du système • Les CD fournis avec le système contiennent des documents et des outils relatifs à la configuration et à la gestion du système. • La documentation des logiciels de gestion de systèmes contient des informations sur les fonctionnalités, l'installation et l'utilisation de base de ces logiciels, ainsi que sur la configuration requise. • La documentation du système d'exploitation indique comment installer (au besoin), configurer et utiliser le système d'exploitation. • La documentation fournie avec les composants achetés séparément contient des informations permettant de configurer et d'installer ces options. • Des mises à jour sont parfois fournies avec le système. Elles décrivent les modifications apportées au système, aux logiciels ou à la documentation. REMARQUE : Vérifiez toujours si des mises à jour sont disponibles sur le site support.dell.com et lisez-les en premier, car elles remplacent souvent les informations contenues dans les autres documents. • Si des notes d'édition ou des fichiers lisez-moi (readme) sont fournis, ils contiennent des mises à jour de dernière minute apportées au système ou à la documentation, ou bien des informations techniques avancées destinées aux utilisateurs expérimentés ou aux techniciens. Fonctions du système accessibles au démarrage Le tableau 1-1 décrit certaines touches pouvant être utilisées lors du démarrage pour accéder aux fonctions du système. Si le système d'exploitation commence à se charger alors que vous n'avez pas encore appuyé sur la touche voulue, laissez-le finir de démarrer, puis arrêtez-le et réessayez.À propos du système 13 Tableau 1-1. Touches d'accès aux fonctions du système Touche(s) Description Permet d'accéder au programme de configuration du système. Voir “Utilisation du programme de configuration du système”, à la page 49. Ouvre le menu principal de la partition d'utilitaires, qui permet d'accéder aux diagnostics du système. Voir “Exécution des diagnostics du système”, à la page 190. Permet d'accéder à l'écran de sélection d'un périphérique d'amorçage. Permet d'accéder à l'environnement PXE (Preboot eXecution Environment, environnement d'exécution avant démarrage). Ouvre l'utilitaire de gestion du contrôleur BMC (BaseBoard Management Controller), qui permet d'accéder au journal d'événements du système (SEL) et de configurer la carte d'accès distant (RAC). Voir le document BMC User's Guide (Contrôleur BMC - Guide d'utilisation) pour plus d'informations sur la configuration et l'utilisation de ce contrôleur. Permet d'accéder à l'utilitaire d'amorçage PERC. Consultez le document User's Guide (Guide d'utilisation) de la carte PERC pour plus d'informations. Si un contrôleur SAS est installé, cette combinaison de touches permet d'accéder à l'utilitaire de configuration SAS. Consultez le document User's Guide (Guide d'utilisation) de la carte SAS pour plus d'informations. Cette option s'affiche uniquement si le support PXE a été activé dans le programme de configuration du système (voir “Écran Integrated Devices (Périphériques intégrés)”, à la page 57) ou si l'amorçage iSCSI est activé. Cette combinaison de touches permet de configurer les paramètres du NIC pour l'amorçage PXE. Pour plus d'informations, consultez la documentation du NIC intégré.14 À propos du système Voyants et caractéristiques du panneau avant La figure 1-1 présente les boutons, les voyants et les connecteurs situés derrière le cadre de rack (en option) sur le panneau avant. Figure 1-1. Voyants et caractéristiques du panneau avant Tableau 1-2. Connecteurs et caractéristiques du panneau avant Numéro Composant Icône Description 1 Voyant et bouton d'alimentation Le bouton d'alimentation contrôle la sortie du bloc d'alimentation en CC qui alimente le système. REMARQUE : Si vous éteignez un ordinateur utilisant un système d'exploitation conforme ACPI en appuyant sur le bouton d'alimentation, le système peut effectuer un arrêt normal avant que l'alimentation ne soit coupée. Si le système d'exploitation n'est pas conforme ACPI, une pression sur ce bouton met immédiatement l'ordinateur hors tension. 1 2 3 4 5 6 7 8À propos du système 15 2 Bouton NMI Ce bouton est utilisé pour la résolution de certains incidents liés aux logiciels et aux pilotes de périphériques avec certains systèmes d'exploitation. Pour l'activer, utilisez la pointe d'un trombone. Appuyez sur ce bouton uniquement si un technicien de support qualifié vous demande de le faire, ou si cela est préconisé dans la documentation du système d'exploitation. 3 Bouton d'identification du système Les boutons d'identification des panneaux avant et arrière peuvent servir à identifier un système spécifique au sein d'un rack. Si l'un de ces boutons est activé, les voyants d'état du système (bleus) situés sur les panneaux avant et arrière clignotent jusqu'à ce que l'utilisateur appuie de nouveau sur l'un des boutons. 4 Écran LCD Affiche l'ID du système, des informations d'état et des messages d'erreur. L'écran LCD s'allume lorsque le système fonctionne normalement. Les logiciels de gestion de systèmes, tout comme les boutons d'identification situés à l'avant et à l'arrière du système, peuvent faire clignoter l'écran LCD en bleu pour identifier un système spécifique. L'écran LCD s'allume en orange lorsqu'un incident lié à un bloc d'alimentation, un ventilateur, un disque dur ou à la température s'est produit et requiert une intervention de l'utilisateur. REMARQUE : Si le système est connecté à l'alimentation en CA et si une erreur a été détectée, l'écran LCD s'allume en orange, que le système soit allumé ou non. Tableau 1-2. Connecteurs et caractéristiques du panneau avant (suite) Numéro Composant Icône Description16 À propos du système Codes des voyants de disques durs Les supports de disque dur comprennent un voyant d'activité et un voyant d'état. Voir figure 1-2. Figure 1-2. Voyants des disques durs 5 Connecteurs USB (2) Permettent de connecter des périphériques compatibles USB 2.0 au système. 6 Connecteur vidéo Permet de connecter un moniteur au système. 7 Disques durs (en option) Cinq lecteurs 3,5 pouces ou huit lecteurs 2,5 pouces. 8 Lecteur optique (en option) Lecteur optique slim (en option) REMARQUE : Les périphériques DVD sont uniquement des périphériques de données. 1 Voyant d'état du lecteur (vert et orange) – Requiert l'utilisation d'un contrôleur RAID matériel. 2 Voyant d'activité du lecteur (vert) Tableau 1-2. Connecteurs et caractéristiques du panneau avant (suite) Numéro Composant Icône Description 1 2À propos du système 17 Le tableau 1-3 répertorie les codes des voyants de disques durs connectés à une carte contrôleur avec fonction RAID (carte PERC6i, par exemple). Ces codes varient en fonction des événements affectant les lecteurs du système. Par exemple, si un disque dur tombe en panne, la séquence “Échec du disque” apparaît. Lorsque vous avez sélectionné le lecteur à retirer, la séquence “Préparation au retrait” apparaît, suivie de la séquence “Lecteur prêt à être inséré ou retiré”. Une fois le lecteur de rechange installé, la séquence indiquant que le lecteur est en cours de préparation apparaît, suivie de la séquence “Lecteur en ligne”. Tableau 1-3. Codes des voyants de disques durs connectés à une carte contrôleur RAID Signification Comportement du voyant d'état Identification de l'unité/ Préparation au retrait Voyant vert clignotant deux fois par seconde Lecteur prêt à être inséré ou retiré Éteint REMARQUE : À la mise sous tension du système, le voyant d'état du lecteur ne s'allume qu'une fois tous les disques durs initialisés. Lorsqu'il est éteint, l'état des disques ne permet par leur insertion ni leur retrait. Panne anticipée du lecteur Voyant vert clignotant, puis orange, puis extinction Échec du disque Voyant orange clignotant quatre fois par seconde Disque en cours de reconstruction Voyant vert clignotant lentement Lecteur en ligne Voyant vert fixe Reconstruction arrêtée Voyant vert clignotant pendant trois secondes, puis orange pendant trois secondes, puis extinction pendant six secondes18 À propos du système Voyants et caractéristiques du panneau arrière La figure 1-3 présente les boutons, les voyants et les connecteurs situés sur le panneau arrière du système. Figure 1-3. Voyants et caractéristiques du panneau arrière 1 Connecteur vidéo 2 Connecteur série 3 Connecteurs USB (2) 4 Connecteur de NIC intégré NIC2 5 Connecteur de NIC intégré NIC1 6 Contrôleur d'accès distant (en option) 7 Logements de cartes d'extension (7) 8 Connecteur de NIC intégré NIC3 9 Connecteur de NIC intégré NIC4 10 Bloc d'alimentation 2 11 Voyant d'état du système 12 Bouton d'identification du système 13 Bloc d'alimentation 1 7 2 1 3 10 4 5 6 13 12 11 8 9À propos du système 19 Connexion de périphériques externes Appliquez les consignes suivantes lorsque vous connectez des périphériques externes au système : • La plupart des périphériques doivent être reliés à un connecteur spécifique et requièrent l'installation de pilotes pour pouvoir fonctionner correctement. Les pilotes sont généralement fournis avec le système d'exploitation ou avec le périphérique lui-même. Consultez la documentation du périph- érique pour obtenir des instructions spécifiques sur l'installation et la configuration. • Connectez toujours les périphériques externes lorsque le système est éteint. Ensuite, allumez les périphériques externes avant le système, à moins que la documentation du périphérique ne stipule le contraire. Pour plus d'informations sur chaque connecteur, voir “Cavaliers et connecteurs”, à la page 193. Pour plus d'informations sur l'activation, la désactivation et la configuration des ports d'E/S et des connecteurs, voir “Utilisation du programme de configuration du système”, à la page 49. Codes du voyant d'alimentation Le bouton d'alimentation du panneau avant contrôle la mise sous tension des blocs d'alimentation du système. Le voyant d'alimentation peut fournir des informations sur l'état de l'alimentation (voir figure 1-1). Le tableau 1-4 répertorie les codes du voyant du bouton d'alimentation. Les voyants des blocs d'alimentation indiquent si le système est alimenté en électricité et permettent de détecter une éventuelle panne d'alimentation (voir figure 1-4 et tableau 1-5). Tableau 1-4. Voyants du bouton d'alimentation Voyant Fonction Allumé Indique que le système est alimenté en électricité et opérationnel. Clignotant Le système est en cours de démarrage ou d'arrêt. Éteint Indique que le système n'est pas alimenté en électricité.20 À propos du système Figure 1-4. Voyants des blocs d'alimentation Tableau 1-5. Voyants des blocs d'alimentation Voyant Fonction État du bloc d'alimentation Un voyant vert indique que le bloc d'alimentation fonctionne normalement. Panne du bloc d'alimentation Un voyant orange indique qu'un incident lié au bloc d'alimentation s'est produit. État de l'alimentation en CA Un voyant vert indique qu'une source de courant alternatif valide est reliée au bloc d'alimentation. 1 État du bloc d'alimentation (sortie en CC opérationnelle) 2 Panne du bloc d'alimentation 3 État de l'alimentation en CA (entrée en CA opérationnelle) 1 2 3À propos du système 21 Codes des voyants de NIC Chaque NIC du panneau arrière est équipé d'un voyant qui fournit des informations sur l'activité du réseau et l'état du lien. Voir figure 1-5. Le tableau 1-6 répertorie les codes des voyants de NIC. Figure 1-5. Voyants de NIC 1 Voyant de lien 2 Voyant d'activité Tableau 1-6. Codes des voyants de NIC Voyant Code du voyant Les voyants de lien et d'activité sont éteints. Le NIC n'est pas connecté au réseau. Le voyant de lien est vert. Le NIC est connecté à un périphérique valide sur le réseau. Le voyant d'activité clignote en orange. Des données sont en cours d'envoi ou de réception sur le réseau. 1 222 À propos du système Messages d'état affichés sur l'écran LCD L'écran LCD du panneau de commande affiche des messages d'état indiquant si le système fonctionne correctement ou s'il requiert une intervention. Il s'allume en bleu en cas de fonctionnement normal et en orange si une erreur est détectée. Dans ce dernier cas, il affiche un message comprenant un code d'état suivi d'un texte descriptif. Le tableau 1-7 répertorie les messages d'état qui peuvent s'afficher sur l'écran LCD et indique leur cause probable. Les messages qui s'affichent sur cet écran se rapportent aux événements consignés dans le journal d'événements du système (SEL). Pour plus d'informations sur ce journal et sur la configuration des paramètres de gestion du système, consultez la documentation du logiciel de gestion de systèmes. PRÉCAUTION : La plupart des réparations ne peuvent être effectuées que par un technicien de service agréé. Vous devez uniquement procéder aux dépannages et réparations simples autorisés dans le manuel de votre produit, ou selon les directives du service et du support en ligne ou téléphonique. Les dommages causés par des interventions de maintenance non autorisées par Dell ne sont pas couverts par votre garantie. Consultez et respectez les consignes de sécurité livrées avec le produit. REMARQUE : Si le démarrage du système échoue, appuyez sur le bouton d'ID du système pendant au moins cinq secondes, jusqu'à ce qu'un code d'erreur s'affiche sur l'écran LCD. Notez ce code, puis reportez-vous à la section “Obtention d'aide”, à la page 203.À propos du système 23 Tableau 1-7. Messages d'état affichés sur l'écran LCD Message affiché sur la ligne 1 Message affiché sur la ligne 2 Causes Mesures correctives N/A NOM DU SYSTÈME Chaîne de 62 caractères pouvant être définie par l'utilisateur dans le programme de configuration du système. Ce nom s'affiche dans les cas suivants : • Le système est sous tension. • Le système est hors tension et des erreurs intervenues pendant le POST sont affichées. Ce message est affiché uniquement pour information. Vous pouvez modifier la chaîne système dans le programme de configuration du système. Voir “Utilisation du programme de configuration du système”, à la page 49. E1000 FAILSAFE, Call Support voir “Obtention d'aide”, à la page 203. E1114 Temp Ambient La température ambiante du système est en dehors des limites autorisées. voir “Dépannage des problèmes de refroidissement du système”, à la page 174. E1210 CMOS Batt La pile CMOS est manquante ou la tension est en dehors des limites autorisées. voir “Dépannage de la pile du système”, à la page 172. E1211 ROMB Batt La batterie RAID est manquante ou endommagée, ou bien elle ne peut pas se recharger suite à un incident lié aux conditions thermiques. Réinstallez la batterie RAID. Voir “Installation de la batterie de la carte contrôleur RAID SAS”, à la page 129 et “Dépannage des problèmes de refroidissement du système”, à la page 174.24 À propos du système E12nn n PwrGd Panne du régulateur de tension indiqué. voir “Obtention d'aide”, à la page 203. E1229 CPU n VCORE Panne du régulateur de tension VCORE du processeur n. voir “Obtention d'aide”, à la page 203. E122A CPU n VTT La tension VTT du processeur n a dépassé les limites autorisées. voir “Obtention d'aide”, à la page 203. E122D CPU n VDDIO La tension VDDIO du processeur n a dépassé les limites autorisées. voir “Obtention d'aide”, à la page 203. E122E CPU n VDDA La tension VDDA du processeur n a dépassé les limites autorisées. voir “Obtention d'aide”, à la page 203. E122F 2.5V PwrGd Panne du régulateur de tension 2,5 V. voir “Obtention d'aide”, à la page 203. E1231 1.2V HTCORE PwrGd Panne du régulateur de tension HTCORE 1,2 V. voir “Obtention d'aide”, à la page 203. E1232 VDD 12V PSn PwrGd Le bloc d'alimentation indiqué est en panne ou a été retiré de la baie alors que le système était allumé. Si le bloc d'alimentation a été retiré, réinsérez-le dans la baie et reconnectez-le à l'alimentation. En cas de panne des composants, voir “Obtention d'aide”, à la page 203. E123B LOM Mezz PwrGd Panne du régulateur de tension pour la carte réseau fille. Mettez le système hors tension et rallumez-le ou effacez le journal d'événements. Si l'incident persiste, voir “Obtention d'aide”, à la page 203. Tableau 1-7. Messages d'état affichés sur l'écran LCD (suite) Message affiché sur la ligne 1 Message affiché sur la ligne 2 Causes Mesures correctivesÀ propos du système 25 E123C Planar LOM PwrGd Panne du régulateur de tension pour le NIC intégré. Mettez le système hors tension et rallumez-le ou effacez le journal d'événements. Si l'incident persiste, voir “Obtention d'aide”, à la page 203. E1310 RPM Fan nn Le nombre de tours par minute du ventilateur indiqué est en dehors des limites autorisées. voir “Dépannage des problèmes de refroidissement du système”, à la page 174. E1313 Fan Redundancy Panne d'un ou de plusieurs ventilateur(s). La redondance des ventilateurs n'est plus assurée. voir “Dépannage des problèmes de refroidissement du système”, à la page 174. Tableau 1-7. Messages d'état affichés sur l'écran LCD (suite) Message affiché sur la ligne 1 Message affiché sur la ligne 2 Causes Mesures correctives26 À propos du système E1414 CPU n Thermtrip La température du microprocesseur spécifié est en dehors des limites autorisées et celui-ci s'est arrêté. voir “Dépannage des problèmes de refroidissement du système”, à la page 174. Si l'incident persiste, assurez-vous que les dissipateurs de chaleur du microprocesseur sont correctement installés. Voir “Dépannage des microprocesseurs”, à la page 186. REMARQUE : L'écran LCD continue à afficher ce message jusqu'à ce que le câble d'alimentation du système soit débranché puis rebranché à la source d'alimentation en CA, ou jusqu'à ce que le journal d'événements soit effacé à l'aide de Server Assistant ou de BMC Management Utility. Voir le document Dell OpenManage Baseboard Management Controller User's Guide (Contrôleur BMC Dell OpenManage - Guide d'utilisation) pour plus d'informations sur ces utilitaires. E1418 CPU n Presence Le processeur indiqué est manquant ou endommagé, ou bien la configuration du système n'est pas prise en charge. voir “Dépannage des microprocesseurs”, à la page 186. Tableau 1-7. Messages d'état affichés sur l'écran LCD (suite) Message affiché sur la ligne 1 Message affiché sur la ligne 2 Causes Mesures correctivesÀ propos du système 27 E141C CPU Mismatch La configuration des processeurs n'est pas prise en charge. Vérifiez que les processeurs sont de même type et conformes aux spécifications décrites dans le document Getting Started Guide (Guide de mise en route) du système. E141F CPU Protocol Le BIOS du système a renvoyé une erreur de protocole liée au processeur. voir “Obtention d'aide”, à la page 203. E1420 CPU Bus PERR Le BIOS du système a renvoyé une erreur de parité liée au bus du processeur. voir “Obtention d'aide”, à la page 203. E1421 CPU Init Le BIOS du système a renvoyé une erreur d'initialisation du processeur. voir “Obtention d'aide”, à la page 203. E1422 CPU Machine Chk Le BIOS du système a renvoyé une erreur liée à la vérification du système. voir “Obtention d'aide”, à la page 203. E1610 PS n Missing Le bloc d'alimentation indiqué a été retiré, ou bien il est installé de façon incorrecte. voir “Dépannage des blocs d'alimentation”, à la page 173. E1614 PS n Status Le bloc d'alimentation indiqué est défectueux ou mal installé. voir “Dépannage des blocs d'alimentation”, à la page 173. E1618 PS n Predictive La tension du bloc d'alimentation est en dehors des limites autorisées ; le bloc d'alimentation indiqué est défectueux ou mal installé. voir “Dépannage des blocs d'alimentation”, à la page 173. Tableau 1-7. Messages d'état affichés sur l'écran LCD (suite) Message affiché sur la ligne 1 Message affiché sur la ligne 2 Causes Mesures correctives28 À propos du système E161C PS n Input Lost La source d'alimentation du bloc d'alimentation indiqué est indisponible ou en dehors des limites autorisées. Vérifiez la source de CA du bloc d'alimentation indiqué. Si l'incident persiste, voir “Dépannage des blocs d'alimentation”, à la page 173. E1620 PS n Input Range La source d'alimentation du bloc d'alimentation indiqué est indisponible ou en dehors des limites autorisées. Vérifiez la source de CA du bloc d'alimentation indiqué. Si l'incident persiste, voir “Dépannage des blocs d'alimentation”, à la page 173. E1624 PS Redundancy La redondance des blocs d'alimentation n'est plus assurée. Si le bloc d'alimentation restant tombe en panne, le système s'arrêtera. Voir “Dépannage des blocs d'alimentation”, à la page 173. E1625 PS AC Current La source d'alimentation est en dehors des limites autorisées. Vérifiez la source d'alimentation en CA. E1710 I/O Channel Chk Le BIOS du système a renvoyé une erreur liée à la vérification des canaux d'E/S. Voir “Obtention d'aide”, à la page 203. Tableau 1-7. Messages d'état affichés sur l'écran LCD (suite) Message affiché sur la ligne 1 Message affiché sur la ligne 2 Causes Mesures correctivesÀ propos du système 29 E1711 PCI PERR Bnn Dnn Fnn PCI PERR Slot n Le BIOS du système a renvoyé une erreur de parité PCI liée à un composant résidant dans l'espace de configuration PCI du bus nn, périph- érique nn, fonction nn. Le BIOS du système a renvoyé une erreur de parité PCI liée à un composant résidant dans le logement PCI n. Retirez la carte d'extension PCI indiquée et remboîtez-la dans son connecteur. Si l'incident persiste, voir “Dépannage des cartes d'extension”, à la page 184. Si aucune procédure de dépannage ne permet de résoudre l'incident, voir “Obtention d'aide”, à la page 203. E1712 PCI SERR Bnn Dnn Fnn PCI SERR Slot n Le BIOS du système a renvoyé une erreur système PCI liée à un composant résidant dans l'espace de configuration PCI du bus nn, périph- érique nn, fonction nn. Le BIOS du système a renvoyé une erreur système PCI liée à un composant résidant dans le logement n. Retirez la carte d'extension PCI indiquée et remboîtez-la dans son connecteur. Si l'incident persiste, voir “Dépannage des cartes d'extension”, à la page 184. Si aucune procédure de dépannage ne permet de résoudre l'incident, voir “Obtention d'aide”, à la page 203. E1714 Unknown Err Le BIOS du système a détecté une erreur système non identifiée. Voir “Obtention d'aide”, à la page 203. Tableau 1-7. Messages d'état affichés sur l'écran LCD (suite) Message affiché sur la ligne 1 Message affiché sur la ligne 2 Causes Mesures correctives30 À propos du système E171F PCIE Fatal Err Bnn Dnn Fnn PCIE Fatal Err Slot n Le BIOS du système a renvoyé une erreur fatale PCIe liée à un composant résidant dans l'espace de configuration PCI du bus nn, périphérique nn, fonction n. Le BIOS du système a renvoyé une erreur fatale PCIe liée à un composant résidant dans le logement n. Retirez la carte d'extension PCI indiquée et remboîtez-la dans son connecteur. Si l'incident persiste, voir “Dépannage des cartes d'extension”, à la page 184. Si aucune procédure de dépannage ne permet de résoudre l'incident, voir “Obtention d'aide”, à la page 203. E1810 HDD nn Fault Le disque dur indiqué est défectueux. voir “Dépannage d'un disque dur”, à la page 179. E1811 HDD nn Rbld Abrt Le disque dur indiqué a arrêté la reconstruction avant la fin de l'opération. voir “Dépannage d'un disque dur”, à la page 179. E1812 HDD nn Removed Le disque dur indiqué a été retiré du système. Ce message s'affiche uniquement à titre d'information. E1914 DRAC5 Conn2 Cbl Le câble du contrôleur DRAC 5 est manquant ou mal inséré. Reconnectez le câble. Voir “Carte RAC”, à la page 94. E1A14 SAS Cable A Le câble SAS A est mal inséré, manquant ou endommagé. Vérifiez la connexion du câble au niveau du fond de panier SAS. Voir “Connecteurs de la carte de fond de panier SAS”, à la page 199. Tableau 1-7. Messages d'état affichés sur l'écran LCD (suite) Message affiché sur la ligne 1 Message affiché sur la ligne 2 Causes Mesures correctivesÀ propos du système 31 E1A15 SAS Cable B Le câble SAS B est mal inséré, manquant ou endommagé. Vérifiez la connexion du câble au niveau du fond de panier SAS. Voir “Connecteurs de la carte de fond de panier SAS”, à la page 199. E1A1C LOM Mezz Missing La carte réseau fille est manquante. Installez la carte réseau fille ou remboîtez-la dans le connecteur. E2010 No Memory Aucune mémoire n'est installée dans le système. Installez des barrettes de mémoire. Voir “Mémoire système”, à la page 105. E2011 Mem Config Err Mémoire détectée mais non configurable. Erreur détectée lors de la configuration de la mémoire. Vérifiez la configuration de la mémoire et réinstallez les barrettes de mémoire, si nécessaire. Voir “Mémoire système”, à la page 105. voir “Dépannage de la mémoire système”, à la page 176. E2012 Unusable Memory Mémoire configurée mais inutilisable. Échec du sous-système de mémoire. voir “Dépannage de la mémoire système”, à la page 176. E2013 Shadow BIOS Fail Le BIOS du système n'est pas parvenu à copier son image flash dans la mémoire. voir “Dépannage de la mémoire système”, à la page 176. E2014 CMOS Fail Échec du CMOS. La RAM du CMOS ne fonctionne pas correctement. voir “Obtention d'aide”, à la page 203. E2015 DMA Controller Échec du contrôleur DMA. voir “Obtention d'aide”, à la page 203. Tableau 1-7. Messages d'état affichés sur l'écran LCD (suite) Message affiché sur la ligne 1 Message affiché sur la ligne 2 Causes Mesures correctives32 À propos du système E2016 Int Controller Échec du contrôleur d'interruptions. voir “Obtention d'aide”, à la page 203. E2017 Timer Fail Échec de rafraîchissement du temporisateur. voir “Obtention d'aide”, à la page 203. E2018 Prog Timer Échec du temporisateur d'intervalle programmable. voir “Obtention d'aide”, à la page 203. E2019 Parity Error Erreur de parité. voir “Obtention d'aide”, à la page 203. E201A SIO Err Échec de la puce super E/S. voir “Obtention d'aide”, à la page 203. E201B Kybd Controller Échec du contrôleur du clavier. voir “Obtention d'aide”, à la page 203. E201C SMI Init Échec d'initialisation SMI (System Management Interrupt). voir “Obtention d'aide”, à la page 203. E201D Shutdown Test Échec du test d'arrêt du BIOS. voir “Obtention d'aide”, à la page 203. E201E POST Mem Test Échec du test mémoire pendant l'auto-test de démarrage du BIOS. voir “Dépannage de la mémoire système”, à la page 176. Si l'incident persiste, voir “Obtention d'aide”, à la page 203. Tableau 1-7. Messages d'état affichés sur l'écran LCD (suite) Message affiché sur la ligne 1 Message affiché sur la ligne 2 Causes Mesures correctivesÀ propos du système 33 E201F DRAC Config Échec de la configuration du contrôleur d'accès distant (RAC). Vérifiez si l'écran affiche des messages d'erreur spécifiques. Assurez-vous que la carte RAC et les câbles correspondants sont correctement emboîtés dans les connecteurs appropriés. Voir “Carte RAC”, à la page 94. Si l'incident persiste, reportez-vous à la documentation de la carte RAC. E2020 CPU Config Échec de configuration du processeur. Vérifiez si l'écran affiche des messages d'erreur spécifiques. E2021 Memory Population Configuration de la mémoire incorrecte. L'ordre d'insertion des barrettes de mémoire est incorrect. Vérifiez si l'écran affiche des messages d'erreur spécifiques. Voir “Dépannage de la mémoire système”, à la page 176. E2022 POST Fail Échec général après le test vidéo. Vérifiez si l'écran affiche des messages d'erreur spécifiques. E2110 MBE DIMM nn & nn L'une des barrettes DIMM du groupe “nn & nn” présente une erreur de mémoire multi-bits (MBE). voir “Dépannage de la mémoire système”, à la page 176. Tableau 1-7. Messages d'état affichés sur l'écran LCD (suite) Message affiché sur la ligne 1 Message affiché sur la ligne 2 Causes Mesures correctives34 À propos du système E2111 SBE Log Disable DIMM nn Le BIOS du système a désactivé la consignation des erreurs de mémoire portant sur un seul bit (SBE) jusqu'au prochain redémarrage du système. “nn” représente la barrette DIMM indiquée par le BIOS. voir “Dépannage de la mémoire système”, à la page 176. E2112 Mem Spare DIMM nn Le BIOS du système a activé la mémoire de réserve car il a détecté un nombre d'erreurs trop important. “nn” représente la barrette DIMM indiquée par le BIOS. voir “Dépannage de la mémoire système”, à la page 176. I1910 Intrusion Le capot du système a été retiré. Ce message s'affiche uniquement à titre d'information. I1911 >3 ERRs Chk Log Les messages à afficher dépassent la capacité de l'écran LCD. L'écran LCD ne peut afficher que trois messages d'erreur à la suite. Le quatrième message indique que la capacité de l'écran est à son maximum. Vérifiez le journal d'événements du système pour plus de détails. I1912 SEL Full Le journal d'événements du système est saturé et ne peut plus consigner aucun événement. Supprimez des événements du journal. Tableau 1-7. Messages d'état affichés sur l'écran LCD (suite) Message affiché sur la ligne 1 Message affiché sur la ligne 2 Causes Mesures correctivesÀ propos du système 35 I1915 Video Off (L'écran LCD affiche un arrièreplan bleu ou orange.) La vidéo a été désactivée par l'utilisateur du contrôleur RAC. Ce message s'affiche uniquement à titre d'information. I1916 Video Off in nn (L'écran LCD affiche un arrièreplan bleu ou orange.) La vidéo sera désactivée dans nn secondes par l'utilisateur du contrôleur RAC. Ce message s'affiche uniquement à titre d'information. W1228 ROMB Batt < 24hr Ce message avertit qu'il reste moins de 24 heures de charge à la batterie RAID. Remplacez la batterie RAID. Voir “Installation de la batterie de la carte contrôleur RAID SAS”, à la page 129. REMARQUE : Pour obtenir le nom complet d'une abréviation ou d'un sigle utilisé dans ce tableau, voir le “Glossaire”, à la page 205. Tableau 1-7. Messages d'état affichés sur l'écran LCD (suite) Message affiché sur la ligne 1 Message affiché sur la ligne 2 Causes Mesures correctives36 À propos du système Résolution des incidents décrits par les messages d'état de l'écran LCD Le code et le texte affichés sur l'écran LCD permettent souvent d'identifier une panne précise pouvant facilement être corrigée. Par exemple, le code E0708 PROC_1_Presence indique qu'aucun microprocesseur n'est installé dans le support 1. En outre, il est possible de déterminer la cause de l'incident si plusieurs erreurs de même type surviennent. Par exemple, si vous recevez une série de messages indiquant plusieurs incidents liés à la tension, le problème peut être lié à une panne d'un bloc d'alimentation. Effacement des messages d'état affichés sur l'écran LCD Pour les pannes liées aux capteurs (de température, de tension, des ventilateurs, etc.), le message de l'écran LCD est supprimé automatiquement lorsque le capteur revient à la normale. Par exemple, l'écran LCD affiche un message indiquant que la température d'un composant n'est pas conforme aux limites acceptables, puis supprime ce message lorsque la température redevient normale. Pour les autres types de pannes, une intervention de l'utilisateur est requise : • Clear the SEL (Effacer le journal d'événements du système) : cette tâche peut être effectuée à distance. Elle supprime l'historique des événements du système. • Power cycle (Mettre le système hors tension) : éteignez le système et débranchez-le de la prise secteur. Attendez environ 10 secondes, puis rebranchez le câble d'alimentation et redémarrez le système. Ces interventions permettent d'effacer les messages d'erreur. Les voyants d'état et l'écran LCD reviennent à l'état normal. Les messages réapparaîtront dans les conditions suivantes : • Le capteur est revenu à l'état normal mais a de nouveau subi une panne et une nouvelle entrée a été créée dans le journal. • Le système a été réinitialisé et de nouvelles erreurs ont été détectées. • Une panne a été détectée sur une autre source correspondant au même message.À propos du système 37 Messages système Le système affiche des messages d'erreur pour informer l'utilisateur qu'un incident s'est produit. Le tableau 1-8 répertorie les messages qui peuvent s'afficher et indique leur cause probable, ainsi que les mesures correctives appropriées. REMARQUE : Si vous recevez un message du système qui n'est pas répertorié dans le tableau 1-8, vérifiez la documentation de l'application que vous utilisiez au moment où le message est apparu. Vous pouvez aussi vous reporter à la documentation du système d'exploitation pour obtenir une explication du message et l'action conseillée. PRÉCAUTION : La plupart des réparations ne peuvent être effectuées que par un technicien de service agréé. Vous devez uniquement procéder aux dépannages et réparations simples autorisés dans le manuel de votre produit, ou selon les directives du service et du support en ligne ou téléphonique. Les dommages causés par des interventions de maintenance non autorisées par Dell ne sont pas couverts par votre garantie. Consultez et respectez les consignes de sécurité livrées avec le produit. Tableau 1-8. Messages système Message Causes Mesures correctives Alert! Node Interleaving disabled! Memory configuration does not support Node Interleaving. La configuration de la mémoire ne prend pas en charge l'imbrication de nœuds. Le système fonctionne, mais de façon restreinte. Les barrettes de mémoire doivent être installées dans une configuration prenant en charge l'imbrication des nœuds. Voir “Consignes générales pour l'installation des barrettes de mémoire”, à la page 105. Si l'incident persiste, voir “Dépannage de la mémoire système”, à la page 176. Attempting to update Remote Configuration. Please wait... Une requête de configuration à distance a été détectée et est en cours de traitement. Attendez que le processus se termine.38 À propos du système BIOS Manufacturing mode detected. MANUFACTURING MODE will be cleared before the next boot. System reboot required for normal operation. Le système est en mode assemblage. Redémarrez le système pour lui faire quitter le mode assemblage. BIOS Update Attempt Failed! La tentative de mise à jour à distance du BIOS a échoué. Faites une nouvelle tentative de mise à jour du BIOS. Si l'incident persiste, voir “Obtention d'aide”, à la page 203. Caution! NVRAM_CLR jumper is installed on system board. Le cavalier NVRAM_CLR est installé. Le CMOS a été initialisé. Retirez le cavalier NVRAM_CLR. Voir figure 6-1 pour identifier l'emplacement des cavaliers. CPUs with different cache sizes detected! Des microprocesseurs possédant des tailles de mémoire cache différentes sont installés. Vérifiez que tous les microprocesseurs ont une taille de mémoire cache identique et qu'ils sont correctement installés. Voir “Processeurs”, à la page 113. Decreasing available memory Barrette(s) de mémoire défectueuse(s) ou mal installée(s). voir “Dépannage de la mémoire système”, à la page 176. Error: Incorrect memory configuration CPU n La configuration du groupe de barrettes DIMM associé au processeur n est incorrecte, ce qui a provoqué l'arrêt du système. Pour plus d'informations sur la configuration de la mémoire, voir “Consignes générales pour l'installation des barrettes de mémoire”, à la page 105. Si l'incident persiste, voir “Dépannage de la mémoire système”, à la page 176. Tableau 1-8. Messages système (suite) Message Causes Mesures correctivesÀ propos du système 39 !*** Error: Remote Access Controller initialization failure *** RAC virtual USB devices may not be available... Échec de l'initialisation du contrôleur d'accès distant (DRAC). Assurez-vous que le contrôleur DRAC est correctement installé. Voir “Installation d'une carte RAC en option”, à la page 94. Gate A20 failure Contrôleur du clavier défectueux ; carte système défectueuse. voir “Obtention d'aide”, à la page 203. General failure Le système d'exploitation ne peut pas exécuter la commande. Ce message est habituellement suivi d'informations spécifiques. Notez ces informations et prenez les mesures adéquates pour résoudre l'incident. HyperTransport error caused a system reset: HyperTransport device Please check the system event log for details. Une erreur fatale a provoqué le redémarrage du système. Reportez-vous aux informations qui ont été consignées dans le journal d'événements système lorsque cette erreur s'est produite. Si le journal signale que des composants sont défectueux, reportez-vous à la section correspondante du chapitre “Dépannage du système”, à la page 161. Invalid NVRAM configuration, resource reallocated Le système a détecté et corrigé un conflit de ressources. Aucune action n'est requise. Invalid PCIe card found in the Internal Storage slot! Le système s'est arrêté car une carte d'extension PCIe non valide est installée dans l'emplacement dédié au contrôleur de stockage. Retirez la carte d'extension PCIe installée dans l'emplacement réservé et remplacez-la par un contrôleur SAS. Tableau 1-8. Messages système (suite) Message Causes Mesures correctives40 À propos du système Keyboard Controller failure Contrôleur du clavier défectueux ; carte système défectueuse. voir “Obtention d'aide”, à la page 203. Manufacturing mode detected Le système est en mode assemblage. Redémarrez le système pour lui faire quitter le mode assemblage. Memory address line failure at address, read value expecting value Barrette(s) de mémoire défectueuse(s) ou mal installée(s). voir “Dépannage de la mémoire système”, à la page 176. Memory double word logic failure at address, read value expecting value Memory odd/even logic failure at address, read value expecting value Memory write/read failure at address, read value expecting value Memory tests terminated by keystroke. Test de la mémoire interrompu à l'aide de la barre d'espacement lors de l'auto-test de démarrage. Ce message s'affiche uniquement à titre d'information. Tableau 1-8. Messages système (suite) Message Causes Mesures correctivesÀ propos du système 41 No boot device available Sous-système du lecteur optique ou du disque dur défectueux ou manquant ; disque dur défectueux ou manquant ; aucune disquette d'amorçage dans le lecteur A. Utilisez une disquette, un CD ou un disque dur amorçable. Si l'incident persiste, voir “Dépannage d'un lecteur optique”, à la page 178 et “Dépannage d'un disque dur”, à la page 179. Voir “Utilisation du programme de configuration du système”, à la page 49 pour plus d'informations sur la définition de la séquence d'amorçage. No boot sector on hard drive Paramètres incorrects dans le programme de configuration du système ; système d'exploitation introuvable sur le disque dur. Vérifiez les paramètres de configuration du disque dur dans le programme de configuration du système. Voir “Utilisation du programme de configuration du système”, à la page 49. Si nécessaire, installez le système d'exploitation sur le disque dur. Consultez la documentation du système d'exploitation. No timer tick interrupt Carte système défectueuse. voir “Obtention d'aide”, à la page 203. Optical drive not found Le câble n'est pas connecté correctement, ou bien le lecteur est manquant. voir “Dépannage d'un lecteur optique”, à la page 178. Tableau 1-8. Messages système (suite) Message Causes Mesures correctives42 À propos du système PCIe Degraded Link Width Error: Embedded Bus#nn/Dev#nn/Func n Expected Link Width is n Actual Link Width is n Carte PCIe défectueuse ou mal installée dans le support spécifié. Remboîtez la carte PCIe dans le support dont le numéro est indiqué. Voir “Installation d'une carte d'extension”, à la page 89. Si l'incident persiste, voir “Obtention d'aide”, à la page 203. PCIe Fatal Error caused a system reset: Slot n -ou- Embedded Bus#nn/Dev#nn/Func n Please check the system event log for details. Carte PCIe défectueuse ou mal installée dans le support spécifié. Remboîtez la carte PCIe dans le support dont le numéro est indiqué. Voir “Installation d'une carte d'extension”, à la page 89. Si l'incident persiste, voir “Obtention d'aide”, à la page 203. PCI BIOS failed to install Un échec de la somme de contrôle du BIOS du périphérique PCI (ROM d'option) est détecté lors de la duplication miroir. Connexion incorrecte d'un câble de carte d'extension ; carte d'extension défectueuse ou mal installée. Remboîtez les cartes d'extension et les câbles associés dans leur connecteur. Si l'incident persiste, voir “Dépannage des cartes d'extension”, à la page 184. Tableau 1-8. Messages système (suite) Message Causes Mesures correctivesÀ propos du système 43 Plug & Play Configuration Error Erreur d'initialisation d'un périphérique PCI ; carte système défectueuse. Installez la fiche du cavalier NVRAM_CLR et redémarrez le système. Voir figure 6-1 pour identifier l'emplacement des cavaliers. Si l'incident persiste, voir “Dépannage des cartes d'extension”, à la page 184. Read fault Requested sector not found Le système d'exploitation ne peut pas lire le disque dur, l'ordinateur n'a pas trouvé un secteur spécifique sur le disque ou le secteur demandé est défectueux. Remplacez la disquette. Assurez-vous que les câbles du disque dur ou du lecteur de disquette sont correctement connectés. Voir “Dépannage d'un lecteur optique”, à la page 178 ou “Dépannage d'un disque dur”, à la page 179. Remote Access Controller cable error or incorrect card in the RAC slot. Les câbles de la carte RAC sont déconnectés, ou bien celle-ci a été installée dans un logement d'extension incorrect. Vérifiez que les câbles de la carte RAC sont correctement connectés et que celle-ci est installée dans le logement d'extension approprié. Voir “Carte RAC”, à la page 94. Remote Access Controller not installed in the RAC slot. La carte RAC est installée dans un logement d'extension incorrect. Vérifiez que la carte RAC est installée dans le logement d'extension approprié. Voir “Carte RAC”, à la page 94. Remote configuration update attempt failed Le système n'est pas parvenu à traiter la demande de configuration à distance. Faites une nouvelle tentative. Tableau 1-8. Messages système (suite) Message Causes Mesures correctives44 À propos du système ROM bad checksum = address Carte d'extension défectueuse ou mal installée. Remboîtez les cartes d'extension dans leur logement. Vérifiez que tous les câbles sont correctement enfichés dans les cartes d'extension. Si l'incident persiste, voir “Dépannage des cartes d'extension”, à la page 184. Sector not found Seek error Seek operation failed Disque dur défectueux. voir “Dépannage d'un disque dur”, à la page 179. Shutdown failure Échec du test d'arrêt. voir “Dépannage de la mémoire système”, à la page 176. The amount of system memory has changed Ajout ou suppression de mémoire ; barrette de mémoire défectueuse. Si vous venez d'ajouter ou de supprimer de la mémoire, ce message s'affiche uniquement pour information. Vous pouvez ne pas en tenir compte. Dans le cas contraire, vérifiez le journal d'événements du système pour identifier les erreurs détectées et remplacez la barrette de mémoire défectueuse. Voir “Dépannage de la mémoire système”, à la page 176. This system supports only Opteron n series processors. Le ou les microprocesseurs ne sont pas pris en charge par le système. Installez un microprocesseur ou une combinaison de microprocesseurs pris en charge. Voir “Installation d'un processeur”, à la page 116. Time-of-day clock stopped Pile ou puce défectueuse. voir “Dépannage de la pile du système”, à la page 172. Tableau 1-8. Messages système (suite) Message Causes Mesures correctivesÀ propos du système 45 Time-of-day not set - please run SETUP program Paramètres d'heure ou de date incorrects ; pile du système défectueuse. Vérifiez les paramètres de l'heure et de la date. Voir “Utilisation du programme de configuration du système”, à la page 49. Si l'incident persiste, remplacez la pile du système. Voir “Pile du système”, à la page 131. Timer chip counter 2 failed Carte système défectueuse. voir “Obtention d'aide”, à la page 203. TPM failure Une fonction TPM (Trusted Platform Module) a échoué. voir “Obtention d'aide”, à la page 203. Unsupported CPU combination Unsupported CPU stepping detected Le ou les microprocesseurs ne sont pas pris en charge par le système. Installez un microprocesseur ou une combinaison de microprocesseurs pris en charge. Voir “Installation d'un processeur”, à la page 116. Utility partition not available Vous avez appuyé sur la touche pendant l'auto-test de démarrage, mais le disque dur utilisé pour l'amorçage ne contient aucune partition d'utilitaires. Créez une partition d'utilitaires sur le disque dur d'amorçage. Reportez-vous aux CD fournis avec le système. Warning: Following faulty DIMMs are disabled: CPUn: DIMM n CPUn: DIMM n Total memory size is reduced. Les barrettes de mémoire utilisées par le processeur n sont défectueuses ou mal installées. voir “Dépannage de la mémoire système”, à la page 176. Tableau 1-8. Messages système (suite) Message Causes Mesures correctives46 À propos du système Warning! No microcode update loaded for processor n La mise à jour du microcode a échoué. Mettez le micrologiciel du BIOS à jour. Si l'incident persiste, voir “Obtention d'aide”, à la page 203. Warning: One or more faulty DIMMs found on CPUn Les barrettes de mémoire utilisées par le processeur n sont défectueuses ou mal installées. voir “Dépannage de la mémoire système”, à la page 176. Warning: The installed memory configuration is not optimal. For more information on valid memory configurations, please see the system documentation on the technical support web site. Configuration de mémoire non valide. Le système fonctionne, mais de façon restreinte. Assurez-vous que la configuration des barrettes de mémoire est valide. Voir “Consignes générales pour l'installation des barrettes de mémoire”, à la page 105. Si l'incident persiste, voir “Dépannage de la mémoire système”, à la page 176. Write fault Write fault on selected drive Lecteur optique, disque dur ou sous-système de disque dur défectueux. voir “Dépannage d'un lecteur optique”, à la page 178 ou “Dépannage d'un disque dur”, à la page 179. REMARQUE : Pour obtenir le nom complet d'une abréviation ou d'un sigle utilisé dans ce tableau, voir le “Glossaire”, à la page 205. Tableau 1-8. Messages système (suite) Message Causes Mesures correctivesÀ propos du système 47 Messages d'avertissement Un message d'avertissement signale un problème possible et vous demande une réponse avant de laisser le système poursuivre son exécution. Par exemple, lorsque vous lancez le formatage d'une disquette, un message vous avertit que vous allez perdre toutes les données qu'elle contient. Les messages d'avertissement interrompent la tâche en cours et vous demandent de répondre en tapant y (pour oui) ou n (pour non). REMARQUE : Ces messages sont générés par l'application ou par le système d'exploitation. Pour plus d'informations, consultez la documentation fournie avec le système d'exploitation ou l'application. Messages de diagnostic Lorsque vous lancez des tests sur le système, les utilitaires de diagnostic génèrent des messages. Voir “Exécution des diagnostics du système”, à la page 189 pour plus d'informations sur les diagnostics du système. Messages d'alerte Les logiciels de gestion de systèmes génèrent des messages d'alerte. Ils comprennent des messages d'informations, d'état, d'avertissement et de panne concernant l'état des lecteurs, de la température, des ventilateurs et de l'alimentation. Pour plus d'informations, reportez-vous à la documentation de ce logiciel.48 À propos du systèmeUtilisation du programme de configuration du système 49 Utilisation du programme de configuration du système Après avoir installé le système, lancez le programme de configuration pour vous familiariser avec la configuration et les paramètres facultatifs disponibles. Notez ces informations pour pouvoir vous y reporter ultérieurement. Vous pouvez utiliser le programme de configuration du système pour : • Modifier les informations de configuration stockées dans la mémoire vive rémanente après l'ajout, la modification ou le retrait de matériel • Définir ou modifier les options que l'utilisateur peut sélectionner, par exemple l'heure et la date du système • Activer ou désactiver les périphériques intégrés • Corriger les incohérences éventuelles entre le matériel installé et les paramètres de configuration Accès au programme de configuration du système 1 Allumez ou redémarrez le système. 2 Appuyez sur immédiatement après le message suivant : F2 = System Setup Si le système d'exploitation commence à se charger alors que vous n'avez pas encore appuyé sur , laissez-le finir de démarrer, puis arrêtez-le et réessayez. REMARQUE : Pour arrêter le système correctement, consultez la documentation du système d'exploitation.50 Utilisation du programme de configuration du système Réponse aux messages d'erreur Vous pouvez accéder au programme de configuration du système en répondant à certains messages d'erreur. Si un message d'erreur s'affiche quand le système démarre, prenez-en note. Avant d'accéder au programme de configuration du système, voir “Messages système”, à la page 37 pour trouver une explication du message et des suggestions de correction. REMARQUE : Il est normal qu'un message d'erreur s'affiche lorsque vous redémarrez le système après avoir installé une extension de mémoire. Utilisation du programme de configuration du système Le tableau 2-1 répertorie les touches utilisées pour afficher ou modifier les informations du programme de configuration du système, et pour quitter ce programme. Tableau 2-1. Touches de navigation du programme de configuration du système Touches Action Dans le menu principal, permet de sélectionner une option associée à un sous-menu tel que Memory Information (Informations sur la mémoire). Flèche vers le haut ou Le curseur passe au champ précédent. Flèche vers le bas ou Le curseur passe au champ suivant. Barre d'espacement, <+>, <–>, flèche vers la gauche ou vers la droite Permet de faire défiler les paramètres disponibles pour un champ. Dans certains champs, vous pouvez également taper la valeur appropriée. <Échap> À partir du menu principal : Quitte le programme de configuration et redémarre le système si des changements (autres que la modification de la date et de l'heure) que vous souhaitez sauvegarder ont été apportés. Si aucune modification n'a été effectuée, l'amorçage du système reprend. À partir d'un sous-menu, retourne au menu principal du programme.Utilisation du programme de configuration du système 51 REMARQUE : Pour la plupart des options, les modifications effectuées sont enregistrées mais ne prennent effet qu'au redémarrage du système. Options de configuration du système Écran principal Lorsque vous accédez au programme de configuration du système, son écran principal apparaît (voir figure 2-1). Figure 2-1. Écran principal du programme de configuration du système Affiche l'aide du programme de configuration du système. Tableau 2-1. Touches de navigation du programme de configuration du système (suite) Touches Action52 Utilisation du programme de configuration du système Le tableau 2-2 répertorie les options et les descriptions des champs qui apparaissent dans l'écran principal du programme de configuration du système. Pour plus d'informations, voir “Options de l'écran System Security (Sécurité du système)”, à la page 60. REMARQUE : Les options disponibles varient en fonction de la configuration du système. REMARQUE : Les valeurs par défaut sont répertoriées sous l'option correspondante, le cas échéant. Tableau 2-2. Options du programme de configuration du système Option Description System Time Définit l'heure de l'horloge interne du système. System Date Définit la date du calendrier interne du système. Memory Information Affiche des informations relatives à la mémoire installée. Voir “Écran Memory Information (Informations sur la mémoire)”, à la page 54. CPU Information Affiche des informations relatives aux microprocesseurs (vitesse, taille de la mémoire cache, etc.). Voir “Écran CPU Information (Informations sur le processeur)”, à la page 56. Boot Sequence Définit l'ordre des périphériques à partir desquels l'ordinateur tente de s'initialiser. Les options disponibles peuvent inclure un lecteur de disquette, un lecteur de CD, les disques durs et le réseau. REMARQUE : Le démarrage du système à partir d'un périphérique externe connecté à une carte SAS n'est pas pris en charge. Voir le site support.dell.com pour obtenir les informations les plus récentes concernant le démarrage à partir de périphériques externes. Hard-Disk Drive Sequence Détermine l'ordre dans lequel le BIOS recherche une image amorçable sur les disques durs au démarrage du système. Utilisation du programme de configuration du système 53 USB Flash Drive Emulation Type (Option par défaut : Auto) Détermine le type d'émulation pour le lecteur flash USB. L'option Hard disk (Disque dur) permet au lecteur flash USB de fonctionner comme un disque dur. L'option Floppy (Lecteur de disquette) permet au lecteur flash USB de se comporter comme un lecteur de disquette amovible. L'option Auto choisit automatiquement le type d'émulation approprié pour le périphérique, à l'exception de ceux installés dans le logement de carte SD. Tout périphérique installé dans le logement de carte SD émule automatiquement un disque dur. Si vous installez dans ce logement un périphérique configuré en tant que lecteur de disquette amovible, vous devez sélectionner l'option Floppy (Lecteur de disquette) pour définir le type d'émulation. Boot Sequence Retry Si ce champ est activé et si le système n'a pas démarré correctement, ce dernier effectue une nouvelle tentative 30 secondes plus tard. Integrated Devices Voir “Écran Integrated Devices (Périphériques intégrés)”, à la page 57. PCI IRQ Assignment Affiche un écran permettant de modifier l'IRQ affectée à chaque périphérique intégré du bus PCI, ainsi qu'à toutes les cartes d'extension nécessitant une IRQ. Serial Communication (Option par défaut : Off [Désactivé]) Voir “Écran Serial Communication (Communication série)”, à la page 59. Embedded Server Management Affiche un écran permettant de configurer les options de l'écran LCD du panneau avant et de définir une chaîne affichée sur cet écran. System Security Affiche un écran permettant de configurer les fonctions du mot de passe système et du mot de passe de configuration. Voir “Écran System Security (Sécurité du système)”, à la page 60, “Utilisation du mot de passe système”, à la page 64 et “Utilisation du mot de passe de configuration”, à la page 67 pour plus d'informations. Tableau 2-2. Options du programme de configuration du système (suite) Option Description54 Utilisation du programme de configuration du système Écran Memory Information (Informations sur la mémoire) Le tableau 2-3 répertorie les options et les descriptions des champs qui apparaissent dans l'écran Memory Information (Informations sur la mémoire). Keyboard NumLock (Option par défaut : On [Activé]) Détermine si le système démarre en mode VERR NUM s'il est équipé d'un clavier à 101 ou 102 touches (cette option ne s'applique pas aux claviers à 84 touches). Report Keyboard Errors (Option par défaut : Report [Signaler]) Active ou désactive la consignation des erreurs liées au clavier pendant l'auto-test de démarrage. Sélectionnez Report (Signaler) pour les systèmes hôtes équipés de claviers. Sélectionnez Do Not Report (Ne pas signaler) pour supprimer tous les messages d'erreur liés au clavier ou à son contrôleur pendant l'auto-test de démarrage. Ce paramètre n'affecte pas le fonctionnement du clavier lui-même, s'il est connecté au système. Tableau 2-3. Écran Memory Information (Informations sur la mémoire) Option Description System Memory Size Affiche la quantité de mémoire système. System Memory Type Affiche le type de la mémoire système. System Memory Speed Affiche la vitesse de la mémoire système. Video Memory Affiche la quantité de mémoire vidéo. System Memory Testing Cette option détermine si la mémoire système est testée à chaque démarrage. Les options disponibles sont Enabled (Activé) et Disabled (Désactivé). Redundant Memory (Option par défaut : Disabled [Désactivé]) Active ou désactive la fonction de mémoire redondante. Lorsque le champ Node Interleaving (Imbrication des nœuds) est activé, la fonction de mémoire redondante est désactivée. Tableau 2-2. Options du programme de configuration du système (suite) Option DescriptionUtilisation du programme de configuration du système 55 Node Interleaving (Option par défaut : Disabled [Désactivé]) Lorsque ce champ est activé, l'imbrication de mémoire est prise en charge si une configuration de mémoire symétrique est installée. Si ce champ est défini sur Disabled (Désactivé), le système peut prendre en charge l'accès mémoire NUMA (Non-Uniform Memory Architecture [Architecture mémoire non uniforme]). REMARQUE : Si vous utilisez la fonction de mémoire redondante, le champ Node Interleaving (Imbrication de nœuds) doit être défini sur Disabled (Désactivé). Memory Optimizer Technology (Option par défaut : Enabled [Activé]) Définit le comportement des deux contrôleurs DRAM pour l'optimisation de la mémoire. Lorsque l'option Enabled (Activé) est utilisée, les deux contrôleurs fonctionnent en mode parallèle 64 bits afin d'améliorer les performances de la mémoire (avec code de correction pour les erreurs portant sur un seul bit). Si l'option Disabled (Désactivé) est sélectionnée, les contrôleurs fonctionnent ensemble et utilisent le mode 128 bits avec code de correction avancé pour les erreurs multi-bits. Low Power Mode (Option par défaut : Disabled [Désactivé]) Active ou désactive le mode d'économie d'énergie pour la mémoire. Si l'option Disabled (Désactivé) est sélectionnée, la mémoire fonctionne à sa vitesse maximale. Si l'option Enabled (Activé) est sélectionnée, la mémoire fonctionne à vitesse réduite afin d'économiser de l'énergie. Tableau 2-3. Écran Memory Information (Informations sur la mémoire) (suite) Option Description56 Utilisation du programme de configuration du système Écran CPU Information (Informations sur le processeur) Le tableau 2-4 répertorie les options et les descriptions des champs qui apparaissent dans l'écran CPU Information (Informations sur le processeur). Tableau 2-4. Écran CPU Information (Informations sur le processeur) Option Description 64-bit Indique si le ou les processeurs installés prennent en charge les extensions 64 bits. Core Speed Affiche la vitesse d'horloge du ou des processeurs. Bus Speed Affiche la vitesse de bus du ou des processeurs. Virtualization Technology (Option par défaut : Enabled [Activé]) REMARQUE : Désactivez cette fonction si le système n'est pas censé exécuter des logiciels de virtualisation. S'affiche si le ou les processeurs prennent en charge la technologie Virtualization. L'option Enabled (Activé) permet aux logiciels de virtualisation d'utiliser cette technologie intégrée au processeur. Cette fonction peut être utilisée uniquement par les logiciels compatibles. Demand-Based Power Management (Option par défaut : Disabled [Désactivé]) Active ou désactive la gestion de l'alimentation en fonction de la demande. Si cette option est activée, les tables d'état des performances du processeur sont envoyées au système d'exploitation. Si l'un des processeurs ne prend pas en charge la gestion de l'alimentation en fonction de la demande, le champ est en lecture seule et défini sur Disabled (Désactivé). Processor X ID Affiche le numéro de modèle du processeur. Un sous-menu affiche la quantité de mémoire cache de niveau 2 (L2) et le nombre de coeurs.Utilisation du programme de configuration du système 57 Activation de la technologie AMD PowerNow!™ La technologie AMD PowerNow! contrôle les performances du processeur du système en réglant automatiquement sa fréquence de fonctionnement et sa tension en fonction de la tâche exécutée. Elle permet d'économiser une quantité considérable d'énergie lorsqu'une application ne requiert pas des performances optimales. Ainsi, le processeur fonctionne à sa vitesse maximale lorsque cela est nécessaire, mais la fonction d'économie d'énergie est utilisée autant que possible. REMARQUE : La prise en charge d'AMD PowerNow! dépend du système d'exploitation installé et de sa version. Désactivez AMD PowerNow! si votre système d'exploitation ne le prend pas totalement en charge. Consultez la documentation de votre système d'exploitation pour plus d'informations. Pour désactiver AMD PowerNow!, accédez au programme de configuration du système et désactivez l'option Demand-Based Power Management (Gestion de l'alimentation en fonction de la demande) dans l'écran CPU Information (Informations sur le processeur). Écran Integrated Devices (Périphériques intégrés) Le tableau 2-5 répertorie les options et les descriptions des champs qui apparaissent dans l'écran Integrated Devices (Périphériques intégrés). Tableau 2-5. Options de l'écran Integrated Devices (Périphériques intégrés) Option Description Integrated SAS/RAID Controller (Option par défaut : Enabled [Activé]) Active ou désactive le contrôleur SAS intégré. Optical Drive Controller (Option par défaut : On [Activé]) Active ou désactive le contrôleur de lecteur optique intégré. User Accessible USB Ports (Option par défaut : All Ports On [Tous ports activés]) Active ou désactive les ports USB du système qui sont accessibles à l'utilisateur. Les options disponibles sont All Ports On (Tous ports activés), Only Back Ports On (Ports arrière activés) et All Ports Off (Tous ports désactivés).58 Utilisation du programme de configuration du système Internal USB Port (Option par défaut : On [Activé]) Active ou désactive le port USB interne du système. SD Card Port Active ou désactive le port de carte SD interne du système. REMARQUE : Ce port est réservé à un hyperviseur, s'il est installé. Embedded Gb NICx (Option par défaut : NIC 1 = Enabled with PXE [Activé avec PXE], autres NIC = Enabled [Activé]) Active ou désactive les NIC intégrés. Les options disponibles sont Enabled (Activé), Enabled with PXE (Activé avec PXE), Enabled with iSCSI Boot (Activé avec amorçage iSCSI) et Disabled (Désactivé). Le support PXE permet au système de démarrer à partir du réseau. Les modifications prennent effet après le redémarrage du système. MAC Address Affiche l'adresse MAC du NIC 10/100/1000 intégré. L'utilisateur ne peut pas modifier la valeur de ce champ. Capability Detected Affiche les capacités du NIC fournies par la clé matérielle NIC installée dans le support TOE_KEY de la carte système. REMARQUE : Certaines fonctions peuvent nécessiter l'installation d'un pilote supplémentaire. Tableau 2-5. Options de l'écran Integrated Devices (Périphériques intégrés) (suite) Option DescriptionUtilisation du programme de configuration du système 59 Écran Serial Communication (Communication série) Le tableau 2-6 répertorie les options et les descriptions des champs qui apparaissent dans l'écran Serial Communication (Communication série). Tableau 2-6. Options de l'écran Serial Communication (Communication série) Option Description Serial Communication (Option par défaut : On without Console Redirection [Activé sans redirection de console]) Les options disponibles sont : On without Console Redirection (Activé sans redirection de console), On with Console Redirection via COM1 (Activé avec redirection de console via COM1), On with Console Redirection via COM2 (Activé avec redirection de console via COM2) et Off (Désactivé). External Serial Connector (Option par défaut : COM1) Indique quel élément a accès au connecteur série externe pour les communications série (COM1, COM2 ou Remote Access Device [Périphérique d'accès distant]). Failsafe Baud Rate (Option par défaut : 115200) Affiche le débit de la ligne de secours utilisée pour la redirection de console lorsque le débit (en bauds) ne peut pas être négocié automatiquement avec le terminal distant. Ce débit ne doit pas être modifié. Remote Terminal Type (Option par défaut : VT100/VT220) Sélectionnez VT100/VT220 ou ANSI. Redirection After Boot (Option par défaut : Enabled [Activé]) Active ou désactive la redirection de console pour le BIOS après le démarrage du système d'exploitation.60 Utilisation du programme de configuration du système Écran System Security (Sécurité du système) Le tableau 2-7 répertorie les options et les descriptions des champs qui apparaissent dans l'écran System Security (Sécurité du système). Tableau 2-7. Options de l'écran System Security (Sécurité du système) Option Description System Password Affiche l'état actuel de la fonction de protection par mot de passe et permet d'attribuer et de confirmer un nouveau mot de passe système. REMARQUE : voir “Utilisation du mot de passe système”, à la page 64 pour obtenir des instructions sur l'attribution, l'utilisation ou la modification d'un mot de passe système existant. Setup Password Restreint l'accès au programme de configuration du système, tout comme le mot de passe système protège l'accès à ce dernier. REMARQUE : voir “Utilisation du mot de passe de configuration”, à la page 67 pour plus d'instructions sur l'attribution, l'utilisation ou la modification d'un mot de passe de configuration existant. Password Status Si l'option Setup Password (Mot de passe de configuration) est définie sur Enabled (Activé), le mot de passe système ne peut pas être modifié ni désactivé au démarrage du système. Pour empêcher toute modification du mot de passe système, définissez un mot de passe de configuration à l'aide de l'option Setup Password (Mot de passe de configuration), puis paramétrez Password Status (État du mot de passe) sur Locked (Verrouillé). Le mot de passe système ne peut alors plus être changé via l'option System Password (Mot de passe système). Il est également impossible de le désactiver au démarrage du système en appuyant sur . Pour déverrouiller le mot de passe système, entrez le mot de passe de configuration dans le champ Setup Password et paramétrez Password Status (État du mot de passe) sur Unlocked (Non verrouillé). Il redevient alors possible de désactiver le mot de passe système au démarrage en appuyant sur , puis de le modifier en utilisant l'option System Password (Mot de passe système).Utilisation du programme de configuration du système 61 TPM Security (Option par défaut : Off [Désactivé]) REMARQUE : La fonction TPM n'est pas disponible en Chine. Définit les modalités de déclaration de la puce TPM (Trusted Platform Module) dans le système. Lorsque l'option Off (Désactivé) est sélectionnée, la présence de la puce TPM n'est pas signalée au système d'exploitation. Lorsque l'option On with Pre-boot Measurements (Activée avec mesures pré-amorçage) est sélectionnée, le système signale la présence de la puce TPM au système d'exploitation et stocke les mesures pré-amorçage dans cette puce lors de l'auto-test de démarrage, conformément aux normes du Trusted Computing Group. Lorsque l'option On without Pre-boot Measurements (Activé sans mesures pré-amorçage) est sélectionnée, le système signale la présence de la puce TPM au système d'exploitation mais n'effectue aucune mesure pré-amorçage. TPM Activation Modifie l'état de fonctionnement de la puce TPM. Lorsque l'option Activate (Activer) est sélectionnée, la puce TPM est activée par défaut. Lorsque l'option Deactivate (Désactiver) est sélectionnée, la puce TPM est désactivée. L'état No Change (Pas de changement) ne lance aucune action. L'état de fonctionnement de la puce TPM reste inchangé (tous les paramètres utilisateur correspondants sont conservés). REMARQUE : Lorsque le champ TPM Security (Sécurité TPM) est défini sur Off (Désactivé), ce champ est uniquement accessible en lecture. Tableau 2-7. Options de l'écran System Security (Sécurité du système) (suite) Option Description62 Utilisation du programme de configuration du système TPM Clear (Option par défaut : No) AVIS : L'effacement de la puce TPM entraîne la perte de toutes les clés de cryptage qu'elle contient. Cette opération empêche le démarrage du système d'exploitation. Si les clés de cryptage ne peuvent pas être restaurées, des données risquent d'être perdues. Vous devez donc impérativement créer une copie de sauvegarde des clés TPM avant d'activer cette option. Si l'option Yes (Oui) est sélectionnée, le contenu intégral des clés TPM est effacé. REMARQUE : Lorsque le champ TPM Security (Sécurité TPM) est défini sur Off (Désactivé), ce champ est uniquement accessible en lecture. Power Button (Option par défaut : Enabled [Activé]) Active ou désactive la fonction de mise hors tension du bouton d'alimentation. Lorsque cette option est activée, le bouton d'alimentation a le comportement suivant : • Avec un système d'exploitation compatible ACPI, le système effectue un arrêt normal avant que l'alimentation ne soit coupée. • Avec un système d'exploitation non compatible ACPI, une pression sur ce bouton met immédiatement le système hors tension. Si vous sélectionnez Disabled (Désactivé), le bouton sert uniquement à mettre le système sous tension. REMARQUE : Il est toujours possible d'allumer le système à l'aide du bouton d'alimentation, même si l'option Power Button (Bouton d'alimentation) est définie sur Disabled (Désactivé). NMI Button AVIS : Appuyez sur ce bouton uniquement si un technicien de support qualifié vous demande de le faire, ou si cela est préconisé dans la documentation du système d'exploitation. Lorsque vous appuyez dessus, le système d'exploitation s'arrête et affiche un écran de diagnostic. Active ou désactive la fonction NMI. Tableau 2-7. Options de l'écran System Security (Sécurité du système) (suite) Option DescriptionUtilisation du programme de configuration du système 63 Écran Exit (Quitter) Une fois que vous avez appuyé sur Échap pour quitter le programme de configuration du système, l'écran Exit (Quitter) affiche les options suivantes : • Save Changes and Exit (Enregistrer les modifications et quitter) • Discard Changes and Exit (Annuler les modifications et quitter) • Return to Setup (Revenir au programme de configuration) Mot de passe système et mot de passe de configuration AVIS : Les mots de passe offrent simplement une fonction de sécurité de base protégeant les données du système. Si vos données nécessitent une protection plus importante, prenez des mesures supplémentaires (cryptage des données, etc.). AVIS : Il est très facile d'accéder aux données stockées sur le système si vous laissez celui-ci sans surveillance alors que vous n'avez pas défini de mot de passe système. Si l'ordinateur n'est pas verrouillé, une personne non autorisée peut aussi déplacer le cavalier d'activation du mot de passe et désactiver ce dernier. À la livraison de l'ordinateur, le mot de passe système n'est pas activé. Si votre système doit impérativement être protégé, ne l'utilisez qu'après avoir activé la protection par mot de passe. AC Power Recovery (Option par défaut : Last [Dernier]) Détermine le comportement du système au retour de l'alimentation secteur. L'option Last (Dernier) indique que le système doit revenir au même état qu'avant la coupure d'alimentation. Avec l'option On (Marche), le système démarre dès que l'alimentation en CA est rétablie. Avec l'option Off (Arrêt), il reste hors tension quand l'alimentation en CA est rétablie. Tableau 2-7. Options de l'écran System Security (Sécurité du système) (suite) Option Description64 Utilisation du programme de configuration du système Vous ne pouvez changer ou supprimer un mot de passe que si vous le connaissez (voir “Suppression ou modification d'un mot de passe système existant”, à la page 66). Si vous avez oublié votre mot de passe, vous ne pourrez pas faire fonctionner le système ni modifier sa configuration tant qu'un technicien de maintenance qualifié n'aura pas désactivé et effacé les mots de passe en déplaçant le cavalier approprié sur la carte mère. Cette procédure est décrite dans la section “Désactivation d'un mot de passe oublié”, à la page 194. Utilisation du mot de passe système Si un mot de passe système est défini, seuls ceux qui le connaissent ont accès au système. Si le paramètre System Password (Mot de passe système) est réglé sur Enabled (Activé), le mot de passe doit être entré au démarrage de l'ordinateur. Attribution d'un mot de passe système Avant d'attribuer un mot de passe système, accédez au programme de configuration du système et vérifiez l'option System Password (Mot de passe système). Si un mot de passe système est attribué, le paramètre System Password a la valeur Enabled (Activé). Si Password Status (État du mot de passe) indique Unlocked (Non verrouillé), vous pouvez modifier le mot de passe système. Si Password Status indique Locked (Verrouillé), vous ne pouvez pas modifier ce mot de passe. Si le mot de passe système est désactivé par la position d'un cavalier, l'état est Disabled. Il est alors impossible d'entrer ce mot de passe et de le modifier. Si aucun mot de passe système n'est attribué et si le cavalier de mot de passe de la carte système est sur la position activée (réglage par défaut), l'option System Password (Mot de passe système) est définie sur Not Enabled (Non activé) et le champ Password Status (État du mot de passe) indique Unlocked (Non verrouillé). Pour attribuer un mot de passe système : 1 Vérifiez que l'option Password Status (État du mot de passe) est définie sur Unlocked (Non verrouillé). 2 Sélectionnez System Password (Mot de passe système) et appuyez sur . Utilisation du programme de configuration du système 65 3 Tapez le nouveau mot de passe système. Le mot de passe peut contenir jusqu'à 32 caractères. Les caractères entrés ne sont pas affichés dans le champ ; ils sont remplacés (y compris les espaces) par des caractères génériques. Le mot de passe ne tient pas compte de la différence entre majuscules et minuscules. Cependant, certaines combinaisons de touches ne sont pas valides. Pour supprimer un caractère lors de l'entrée de votre mot de passe, appuyez sur la touche ou sur la touche fléchée vers la gauche. REMARQUE : Pour quitter le champ sans attribuer de mot de passe, appuyez sur pour passer à un autre champ, ou bien appuyez sur <Échap> à tout moment avant la fin de l'étape 5. 4 Appuyez sur . 5 Pour confirmer le mot de passe, tapez-le une seconde fois et appuyez sur . L'option System Password (Mot de passe système) prend la valeur Enabled (Activé). Quittez le programme de configuration en sauvegardant et commencez à utiliser le système. 6 Vous pouvez redémarrez le système immédiatement pour activer la protection par mot de passe, ou simplement continuer à travailler. REMARQUE : La protection par mot de passe ne prend effet que lorsque vous redémarrez le système. Protection de l'ordinateur à l'aide d'un mot de passe système REMARQUE : Si vous avez attribué un mot de passe de configuration (voir “Utilisation du mot de passe de configuration”, à la page 67), le système l'accepte également comme mot de passe système. Lorsque le paramètre Password Status (État du mot de passe) a la valeur Unlocked (Non verrouillé), vous pouvez activer ou désactiver la protection par mot de passe. Pour laisser la protection par mot de passe activée : 1 Démarrez le système ou redémarrez-le en appuyant sur . 2 Tapez le mot de passe et appuyez sur .66 Utilisation du programme de configuration du système Pour désactiver la protection par mot de passe : 1 Démarrez le système ou redémarrez-le en appuyant sur . 2 Tapez le mot de passe et appuyez sur . Si l'option Password Status (État du mot de passe) a la valeur Locked (Verrouillé) lorsque vous allumez ou redémarrez le système (en appuyant sur ), tapez votre mot de passe et appuyez sur à l'invite. Une fois que vous avez tapé le mot de passe système correct et appuyé sur , le système fonctionne normalement. Si vous entrez un mot de passe incorrect, le système affiche un message et vous invite à recommencer. Vous disposez de trois tentatives pour entrer le bon mot de passe. Après une troisième tentative infructueuse, le système indique qu'il va s'arrêter. L'affichage de ce message peut vous alerter du fait qu'une personne a essayé d'utiliser le système à votre insu. Même si vous avez éteint et redémarré le système, le message d'erreur continue à s'afficher jusqu'à ce que le bon mot de passe soit entré. REMARQUE : Vous pouvez combiner l'utilisation des paramètres Password Status (État du mot de passe), System Password (Mot de passe système) et Setup Password (Mot de passe de configuration) pour mieux protéger le système contre toute modification non autorisée. Suppression ou modification d'un mot de passe système existant 1 À l'invite, appuyez sur pour désactiver le mot de passe système existant. S'il vous est demandé d'entrer le mot de passe de configuration, contactez votre administrateur réseau. 2 Pour accéder au programme de configuration du système, appuyez sur pendant l'auto-test de démarrage. 3 Sélectionnez le champ System Security (Sécurité du système) pour vérifier que l'option Password Status (État du mot de passe) est définie sur Unlocked (Non verrouillé). 4 À l'invite, entrez le mot de passe système.Utilisation du programme de configuration du système 67 5 Vérifiez que l'option System Password (Mot de passe système) est définie sur Not Enabled (Non activé). Si tel est le cas, le mot de passe système a été supprimé. Si l'option System Password (Mot de passe système) est définie sur Enabled (Activé), appuyez sur pour redémarrer le système, puis recommencez les étapes 2 à 5. Utilisation du mot de passe de configuration Lisez les sections suivantes pour attribuer ou modifier le mot de passe de configuration. Attribution d'un mot de passe de configuration Un mot de passe de configuration ne peut être attribué (ou modifié) que lorsque l'option Setup Password (Mot de passe de configuration) est définie sur Not Enabled (Non activé). Pour attribuer un mot de passe de configuration, sélectionnez l'option Setup Password (Mot de passe de configuration) et appuyez sur la touche <+> ou <–>. Le système vous invite à entrer et à confirmer le mot de passe. Si vous utilisez un caractère non autorisé, le système émet un signal sonore. REMARQUE : Le mot de passe de configuration peut être identique à celui du système. Si les deux mots de passe sont différents, le mot de passe de configuration peut être utilisé à la place du mot de passe système, mais l'opération inverse n'est pas possible. Le mot de passe peut contenir jusqu'à 32 caractères. Les caractères entrés ne sont pas affichés dans le champ ; ils sont remplacés (y compris les espaces) par des caractères génériques. Le mot de passe ne tient pas compte de la différence entre majuscules et minuscules. Cependant, certaines combinaisons de touches ne sont pas valides. Si vous entrez l'une de ces combinaisons, le système émet un signal sonore. Pour supprimer un caractère lors de l'entrée de votre mot de passe, appuyez sur la touche ou sur la touche fléchée vers la gauche.68 Utilisation du programme de configuration du système Une fois le mot de passe confirmé, le paramètre Setup Password (Mot de passe de configuration) prend la valeur Enabled (Activé). La prochaine fois que vous accéderez au programme de configuration, le système vous demandera d'entrer le mot de passe de configuration. La modification du mot de passe de configuration prend effet immédiatement (il n'est pas nécessaire de redémarrer le système). Fonctionnement du système avec un mot de passe de configuration activé Si le champ Setup Password (Mot de passe de configuration) est défini sur Enabled (Activé), vous devez entrer ce mot de passe pour modifier la plupart des options définies dans le programme de configuration du système. Une invite de saisie s'affiche lorsque vous accédez au programme de configuration du système. Si vous n'entrez pas le bon mot de passe au bout de trois essais, vous pouvez visualiser les écrans de configuration du système mais vous ne pouvez y apporter aucune modification. La seule exception est la suivante : si le champ System Password (Mot de passe système) n'est pas défini sur Enabled (Activé) et n'est pas verrouillé par l'option Password Status (État du mot de passe), vous pouvez attribuer un mot de passe système. REMARQUE : Il est possible de combiner l'utilisation des options Password Status (État du mot de passe) et Setup Password (Mot de passe de configuration) pour empêcher toute modification du mot de passe système. Suppression ou modification d'un mot de passe de configuration existant 1 Accédez au programme de configuration du système et sélectionnez l'option System Security (Sécurité du système). 2 Sélectionnez l'option Setup Password (Mot de passe de configuration), appuyez sur pour accéder à la fenêtre appropriée, et appuyez sur deux fois pour effacer le mot de passe en cours. Le paramètre prend la valeur Not Enabled (Non activé). 3 Si vous souhaitez attribuer un nouveau mot de passe de configuration, suivez les étapes décrites dans la section “Attribution d'un mot de passe de configuration”, à la page 67.Utilisation du programme de configuration du système 69 Désactivation d'un mot de passe oublié voir “Désactivation d'un mot de passe oublié”, à la page 194. Configuration du contrôleur BMC Le contrôleur BMC (Baseboard Management Controller) permet de configurer, contrôler et restaurer les systèmes à distance. Il offre les fonctionnalités suivantes : • Utilisation du NIC intégré au système • Consignation des incidents et alertes SNMP • Accès au journal d'événements du système et à l'état des capteurs • Contrôle des fonctions du système, y compris la mise sous tension et hors tension • Fonctionnement indépendant de l'état d'alimentation du système ou de son système d'exploitation • Redirection de la console de texte pour la configuration du système, les utilitaires à interface texte et les consoles du système d'exploitation REMARQUE : Pour accéder à distance au contrôleur BMC à l'aide du NIC intégré, vous devez connecter le réseau au NIC1 intégré. Pour plus d'informations sur l'utilisation du contrôleur BMC, consultez sa documentation et celle des applications de gestion de systèmes. Accès au module de configuration BMC 1 Allumez ou redémarrez le système. 2 Appuyez sur lorsque vous y êtes invité après l'auto-test de démarrage. Si le système d'exploitation commence à se charger alors que vous n'avez pas encore appuyé sur , laissez-le finir de démarrer, puis arrêtez-le et réessayez.70 Utilisation du programme de configuration du système Options du module de configuration du contrôleur BMC Pour plus d'informations concernant les options du module de configuration du contrôleur BMC et du port EMP (port de gestion d'urgence), consultez le document BMC User's Guide (Contrôleur BMC - Guide d'utilisation).Installation des composants du système 71 Installation des composants du système Cette section décrit l'installation des composants suivants : • Cadre avant • Capot du système • Modules de ventilation • Assemblage du protecteur de ventilation • Blocs d'alimentation • Module d'extension processeurs (PEM) • Cartes d'extension • Carte de montage • Carte RAC • Clé de mémoire USB interne • Clé TOE/iSCSI • Carte mémoire SD • Carte réseau fille • Mémoire système • Processeurs • Lecteur optique • Disques durs • Carte contrôleur SAS • Batterie RAID • Lecteur de bande SAS externe • Périphérique Fibre Channel externe • Pile du système • Assemblage du panneau de commande 72 Installation des composants du système • Commutateur d'intrusion du châssis • Carte de fond de panier SAS • Carte adaptatrice pour les périphériques • Carte adaptatrice pour les ventilateurs • Carte système • Carte de distribution de l'alimentation • Carte du module d'extension processeurs Outils recommandés Vous pouvez avoir besoin des éléments suivants pour exécuter les procédures décrites dans cette section : • Clé du verrou du système • Tournevis cruciforme n°2 • Tournevis Torx T10 • Petit tournevis plat • Bracelet anti-statique À l'intérieur du système PRÉCAUTION : La plupart des réparations ne peuvent être effectuées que par un technicien de service agréé. Vous devez uniquement procéder aux dépannages et réparations simples autorisés dans le manuel de votre produit, ou selon les directives du service et du support en ligne ou téléphonique. Les dommages causés par des interventions de maintenance non autorisées par Dell ne sont pas couverts par votre garantie. Consultez et respectez les consignes de sécurité livrées avec le produit. Dans la figure 3-1, le cadre, le capot du système, le module d'extension processeurs et l'assemblage du protecteur de ventilation ont été retirés pour montrer l'intérieur du système. AVIS : Ne retirez pas l'assemblage du protecteur de ventilation lorsque le système est allumé. Ce dispositif doit impérativement être installé afin de diriger le flux d'air produit par les ventilateurs.Installation des composants du système 73 Figure 3-1. À l'intérieur du système 1 Modules de ventilation (4) 2 Barrettes de mémoire (16) 3 Dissipateur de chaleur/Processeur (2) 4 Carte de montage 5 Assemblage du protecteur de ventilation 6 Module d'extension processeurs 7 Carte réseau fille 8 Logements de cartes d'extension (7) 9 Carte contrôleur SAS 10 Carte RAC en option 7 5 8 2 1 6 9 3 4 1074 Installation des composants du système La carte système contient les circuits de contrôle du système et d'autres composants électroniques. Les processeurs et les barrettes de mémoire sont installés sur la carte système et sur le module d'extension processeurs (Processor Expansion Module ou “PEM”) disponible en option. Les baies de disque dur peuvent accueillir huit disques 2,5 pouces, ou bien cinq disques SAS 3,5 pouces. Tous ces disques sont disponibles en option. Les disques durs sont reliés à une carte contrôleur SAS ou à une carte contrôleur RAID SAS en option avec mémoire cache alimentée par batterie, via un fond de panier SAS. Le support de lecteur amovible peut accueillir un lecteur optique en option. Retrait et réinstallation du cadre avant en option 1 Ouvrez le verrou situé sur le côté gauche du cadre. 2 Faites pivoter le côté gauche du cadre pour l'écarter du panneau avant. 3 Décrochez la partie droite du cadre et retirez-le. Figure 3-2. Retrait et réinstallation du cadre avant en option 1 Cadre 2 Verrou 2 1Installation des composants du système 75 Pour réinstaller le cadre en option, accrochez sa partie droite sur le châssis, puis remboîtez le cache sur le système. Fermez le verrou pour verrouiller le cadre. Voir figure 3-2. Ouverture et fermeture du système PRÉCAUTION : La plupart des réparations ne peuvent être effectuées que par un technicien de service agréé. Vous devez uniquement procéder aux dépannages et réparations simples autorisés dans le manuel de votre produit, ou selon les directives du service et du support en ligne ou téléphonique. Les dommages causés par des interventions de maintenance non autorisées par Dell ne sont pas couverts par votre garantie. Consultez et respectez les consignes de sécurité livrées avec le produit. PRÉCAUTION : Demandez toujours de l'aide avant de soulever le système. N'essayez pas de le soulever seul, car vous risqueriez de vous blesser. Ouverture du système 1 Sauf si vous installez un composant enfichable à chaud tel qu'un ventilateur ou un disque dur, vous devez arrêter le système et les périphériques connectés, puis le débrancher de la prise secteur et des périphériques. 2 Tournez le verrou du loquet de fermeture dans le sens inverse des aiguilles d'une montre. Voir figure 3-3. 3 Soulevez le loquet situé sur la partie supérieure du système puis faites glisser le capot vers l'arrière. Voir figure 3-3. 4 Saisissez le capot de chaque côté et soulevez-le doucement pour le retirer du système.76 Installation des composants du système Figure 3-3. Retrait et réinstallation du capot 1 Loquet 2 Verrou du loquet de fermeture 3 Crochets du châssis 2 1 3Installation des composants du système 77 Fermeture du système 1 Soulevez le loquet du capot. 2 Alignez le capot avec les bords gauche et droit du système. Décalez-le légèrement vers l'arrière de façon que les plots situés sur le bord interne du capot s'alignent sur les crochets. Voir figure 3-3. 3 Rabattez le capot sur le châssis et refermez le loquet. 4 Tournez le verrou du loquet de fermeture dans le sens des aiguilles d'une montre pour verrouiller le capot. Ventilateurs Ce système est équipé de quatre ventilateurs enfichables à chaud, qui sont connectés directement à la carte système. AVIS : Les numéros attribués aux ventilateurs permettent au logiciel de gestion de système d'identifier celui qui doit être remplacé en cas de panne. Retrait d'un ventilateur PRÉCAUTION : La plupart des réparations ne peuvent être effectuées que par un technicien de service agréé. Vous devez uniquement procéder aux dépannages et réparations simples autorisés dans le manuel de votre produit, ou selon les directives du service et du support en ligne ou téléphonique. Les dommages causés par des interventions de maintenance non autorisées par Dell ne sont pas couverts par votre garantie. Consultez et respectez les consignes de sécurité livrées avec le produit. REMARQUE : La procédure de retrait est la même pour tous les modules de ventilation. 1 Ouvrez le système. Voir “Ouverture du système”, à la page 75. 2 Appuyez sur les deux loquets situés en haut du ventilateur puis retirez celui-ci. Voir figure 3-4.78 Installation des composants du système Figure 3-4. Retrait et réinstallation d'un ventilateur 1 Ventilateur 2 Loquets (2) 3 Connecteur d'alimentation du ventilateur 4 Connecteur d'alimentation de la baie du ventilateur 5 FAN4 6 FAN2 7 FAN1 8 FAN3 1 2 3 4 8 6 5 7Installation des composants du système 79 Réinstallation d'un ventilateur REMARQUE : La procédure d'installation est la même pour tous les ventilateurs. 1 Vérifiez que la poignée du ventilateur est relevée et enfoncez ce dernier sur le support jusqu'à ce qu'il soit correctement emboîté. Abaissez la poignée du ventilateur jusqu'à ce que vous entendiez un déclic. Voir figure 3-4. 2 Refermez le système. Voir “Fermeture du système”, à la page 77. Assemblage du protecteur de ventilation Retrait de l'assemblage du protecteur de ventilation AVIS : Ne faites pas fonctionner le système si l'assemblage du protecteur de ventilation a été retiré. Ce dispositif doit impérativement être installé afin de diriger le flux d'air produit par les ventilateurs. 1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise secteur. 2 Ouvrez le système. Voir “Ouverture du système”, à la page 75. 3 Retirez le module d'extension processeurs (PEM). Voir “Retrait du module PEM ou de son boîtier”, à la page 83. 4 Saisissez les coins du protecteur de ventilation et soulevez l'assemblage pour le retirer. Voir figure 3-5.80 Installation des composants du système Figure 3-5. Retrait et réinstallation de l'assemblage du protecteur de ventilation 1 Assemblage du protecteur de ventilation 2 Rivets (4) 3 Plots d'alignement (4) 1 3 2Installation des composants du système 81 Réinstallation de l'assemblage du protecteur de ventilation 1 Abaissez doucement le protecteur de ventilation dans le système. Les rivets situés aux quatre coins du protecteur de ventilation doivent s'emboîter dans les plots d'alignement correspondants de la carte système. Voir figure 3-5. 2 Appuyez doucement sur l'assemblage du protecteur de ventilation jusqu'à ce qu'il soit correctement emboîté. Lorsqu'il est correctement installé, le haut du protecteur de ventilation est au même niveau que les baies de ventilateur. Blocs d'alimentation Le système prend en charge deux blocs d'alimentation, le second servant de source d'alimentation redondante enfichable à chaud. AVIS : Le système est en mode redondant uniquement si deux blocs d'alimentation sont installés et connectés à une source de courant alternatif. Si vous installez certains composants tiers (cartes PCI, par exemple) non testés ou non pris en charge par Dell, il est possible que les blocs d'alimentation ne soient pas redondants avec certaines tensions en entrée. AVIS : Le système risque de surchauffer si vous l'utilisez pendant une période prolongée alors qu'un seul bloc d'alimentation est installé. Retrait d'un bloc d'alimentation 1 Débranchez le câble branché sur la source d'alimentation et sur le bloc à retirer. Retirez les câbles des boucles d'insertion. 2 Appuyez sur le loquet du levier d'éjection, puis ouvrez ce levier et retirez le bloc d'alimentation du châssis. Voir figure 3-6. REMARQUE : Vous devrez peut-être débloquer et relever le bras de gestion des câbles, s'il gêne le retrait du bloc d'alimentation. Pour plus d'informations sur le bras de gestion des câbles, reportez-vous au document Rack Installation Guide (Guide d'installation du rack). 82 Installation des composants du système Figure 3-6. Retrait et réinstallation d'un bloc d'alimentation Réinstallation d'un bloc d'alimentation 1 Tout en maintenant le levier ouvert, insérez le nouveau bloc d'alimentation dans le châssis jusqu'à ce que le levier touche le châssis. Voir figure 3-6. 2 Refermez le levier d'éjection jusqu'à ce que le bloc d'alimentation soit positionné correctement. Le levier doit alors s'enclencher derrière le loquet. Voir figure 3-6. REMARQUE : Si vous avez débloqué le bras de gestion des câbles à l'étape 2 de la procédure précédente, ré-enclenchez-le. Pour plus d'informations sur le bras de gestion des câbles, reportez-vous au document Rack Installation Guide (Guide d'installation du rack). 3 Enfichez le câble d'alimentation sur le bloc d'alimentation et branchez son autre extrémité sur une prise secteur. 1 Bloc d'alimentation 2 Levier d'éjection 3 Loquet du levier d'éjection 3 1 2Installation des composants du système 83 AVIS : Lorsque vous connectez le câble d'alimentation, faites-le passer dans la boucle du serre-câble. REMARQUE : Après avoir installé un nouveau bloc d'alimentation dans un système équipé de deux modules, patientez quelques secondes pour que le système reconnaisse ce module et détermine son état. Le voyant du bloc d'alimentation s'allume en vert si ce dernier fonctionne normalement (voir figure 1-4). Module d'extension processeurs (PEM) Le système peut être utilisé avec deux types de modules d'extension processeurs. • Si le système contient quatre processeurs, le module d'extension comprend une carte équipée de deux supports de processeur et de 16 supports mémoire. • Si le système contient deux processeurs, le boîtier du module d'extension contient une chicane d'air. AVIS : Le boîtier du module d'extension processeurs doit être installé dans un système biprocesseur afin d'assurer une ventilation correcte à l'intérieur du système. Retrait du module PEM ou de son boîtier PRÉCAUTION : La plupart des réparations ne peuvent être effectuées que par un technicien de service agréé. Vous devez uniquement procéder aux dépannages et réparations simples autorisés dans le manuel de votre produit, ou selon les directives du service et du support en ligne ou téléphonique. Les dommages causés par des interventions de maintenance non autorisées par Dell ne sont pas couverts par votre garantie. Consultez et respectez les consignes de sécurité livrées avec le produit. 1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise secteur. 2 Ouvrez le système. Voir “Ouverture du système”, à la page 75. 3 Soulevez la poignée du module PEM jusqu'à ce que le module sorte entièrement du châssis. Voir figure 3-7.84 Installation des composants du système Figure 3-7. Installation et retrait d'un module PEM AVIS : Utilisez vos deux mains pour retirer le module PEM du châssis. 1 Module d'extension processeurs 2 Poignée 3 Broches de guidage (6) 4 Fentes (6) 2 3 1 4Installation des composants du système 85 4 Sortez le module PEM du châssis en le soulevant. 5 Si le module PEM retiré contient quatre processeurs, retournez-le doucement et faites pivoter la poignée pour la fermer avant de placer le module PEM sur un plan de travail. Voir figure 3-8. Figure 3-8. Module PEM en position de maintenance 1 Module PEM 2 Protecteur de ventilation 3 Poignée en position de maintenance 1 2 386 Installation des composants du système Pour accéder à la carte du module PEM, retirez le protecteur de ventilation. Voir figure 3-9. Figure 3-9. Retrait et installation du protecteur de ventilation du module PEM 1 Protecteur de ventilation 2 Plots d'alignement (4) 3 Rivets (4) 2 3 1Installation des composants du système 87 Réinstallation du module PEM ou de son boîtier 1 Réinstallez le protecteur de ventilation. 2 Tournez le module PEM de façon à placer la carte interne (systèmes à quatre processeurs) ou la chicane d'air (systèmes biprocesseurs) vers le bas. 3 Ouvrez complètement la poignée du module PEM. 4 Alignez les trois broches de guidage situées de chaque côté du module PEM avec les fentes correspondantes, sur les côtés du châssis. Voir figure 3-7. 5 Insérez le module PEM dans le système et tournez la poignée jusqu'à ce que le module soit entièrement emboîté dans le châssis. Cartes d'extension Consignes d'installation des cartes d'extension La carte système peut accueillir jusqu'à huit cartes d'extension PCI-Express (PCIe). Voir figure 3-10. • Tous les logements peuvent accueillir des cartes pleine hauteur et demilongueur. • Vous pouvez utiliser jusqu'à deux cartes 25 W. Toutes les autres doivent être des cartes 15 W. • Les emplacements 1, 2, 5, 6 et 7 sont des logements d'extension PCIe x4. • Les emplacements 3 et 4 sont des logements d'extension PCIe x8. • Un logement d'extension (INTERNAL_STORAGE) est réservé à la carte contrôleur SAS du système. • Si vous disposez d'une carte d'accès distant (RAC), vous devez l'installer dans le logement dédié RAC_CONN. Voir “Carte RAC”, à la page 94.88 Installation des composants du système Figure 3-10. Logements d'extension 1 PCIE_X4_7 2 PCIE_X4_6 3 PCIE_X4_5 4 PCIE_X8_4 5 PCIE_X8_3 6 PCIE_X4_2 7 PCIE_X4_1 8 INT_ STORAGE 9 RAC_CONN Arrière du système Avant du système 1 2 3 4 5 6 7 8 9Installation des composants du système 89 Installation d'une carte d'extension PRÉCAUTION : La plupart des réparations ne peuvent être effectuées que par un technicien de service agréé. Vous devez uniquement procéder aux dépannages et réparations simples autorisés dans le manuel de votre produit, ou selon les directives du service et du support en ligne ou téléphonique. Les dommages causés par des interventions de maintenance non autorisées par Dell ne sont pas couverts par votre garantie. Consultez et respectez les consignes de sécurité livrées avec le produit. 1 Déballez la carte d'extension et préparez-la en vue de son installation. Pour obtenir des instructions, consultez la documentation fournie avec la carte. 2 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise secteur. 3 Ouvrez le système. Voir “Ouverture du système”, à la page 75. 4 Si vous ajoutez une nouvelle carte, sélectionnez le logement d'extension approprié. Voir “Consignes d'installation des cartes d'extension”, à la page 87. 5 Ouvrez le dispositif de fixation des cartes d'extension et retirez la plaque de recouvrement. Voir figure 3-11. 6 Installez la carte d'extension : a En tenant la carte par les bords, positionnez-la en alignant son connecteur latéral avec le connecteur d'extension correspondant de la carte système. AVIS : Si vous installez une carte contrôleur RAID SAS, n'appuyez pas sur son module mémoire. b Insérez le connecteur latéral de la carte dans le support approprié jusqu'à ce que la carte soit correctement emboîtée. c Fermez le dispositif de fixation des cartes d'extension. Voir figure 3-11.90 Installation des composants du système Figure 3-11. Installation ou retrait d'une carte d'extension 7 Connectez tous les câbles requis sur la carte d'extension. • Si vous installez une carte RAC, voir “Carte RAC”, à la page 94. • Si vous installez une carte contrôleur SAS, voir “Installation d'une carte contrôleur SAS”, à la page 127. 8 Refermez le système. Voir “Fermeture du système”, à la page 77. 1 Carte d'extension 2 Dispositif de fixation des cartes d'extension 3 Connecteur latéral 3 2 1Installation des composants du système 91 Retrait d'une carte d'extension PRÉCAUTION : La plupart des réparations ne peuvent être effectuées que par un technicien de service agréé. Vous devez uniquement procéder aux dépannages et réparations simples autorisés dans le manuel de votre produit, ou selon les directives du service et du support en ligne ou téléphonique. Les dommages causés par des interventions de maintenance non autorisées par Dell ne sont pas couverts par votre garantie. Consultez et respectez les consignes de sécurité livrées avec le produit. 1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise secteur. 2 Ouvrez le système. Voir “Ouverture du système”, à la page 75. 3 Déconnectez tous les câbles de la carte. 4 Retirez la carte d'extension : a Ouvrez le dispositif de fixation des cartes d'extension. Voir figure 3-11. b Tenez la carte d'extension par les coins et retirez-la doucement de son connecteur. 5 Si vous retirez la carte définitivement, installez une plaque de recouvrement métallique sur le logement vide et refermez le dispositif de fixation des cartes d'extension. REMARQUE : L'installation d'une plaque de recouvrement sur les emplacements d'extension vides est obligatoire pour que le système reste conforme à l'homologation FCC (Federal Communications Commission). Ces plaques empêchent la poussière et les impuretés de pénétrer dans le système, dont elles facilitent également le refroidissement et la ventilation. 6 Refermez le système. Voir “Fermeture du système”, à la page 77.92 Installation des composants du système Carte de montage Deux cartes de montage sont disponibles pour votre système : • Une carte de montage 2P (deux processeurs) • Une carte de montage 4P (quatre processeurs) Figure 3-12. Cartes de montage Retrait de la carte de montage PRÉCAUTION : La plupart des réparations ne peuvent être effectuées que par un technicien de service agréé. Vous devez uniquement procéder aux dépannages et réparations simples autorisés dans le manuel de votre produit, ou selon les directives du service et du support en ligne ou téléphonique. Les dommages causés par des interventions de maintenance non autorisées par Dell ne sont pas couverts par votre garantie. Consultez et respectez les consignes de sécurité livrées avec le produit. 1 Carte de montage 4P 2 Carte de montage 2P 2 1Installation des composants du système 93 1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise secteur. 2 Ouvrez le système. Voir “Ouverture du système”, à la page 75. 3 Retirez le module PEM. Voir “Retrait du module PEM ou de son boîtier”, à la page 83. 4 Pour retirer la carte de montage, soulevez les deux loquets de fixation correspondants jusqu'à ce que la carte sorte de son support. Soulevez ensuite la carte pour l'extraire du châssis. Voir figure 3-13. Figure 3-13. Installation ou retrait d'une carte de montage 3 2 1 494 Installation des composants du système Réinstallation de la carte de montage 1 Le cas échéant, déposez les capuchons de protection des connecteurs sur la carte de montage. 2 Ouvrez les deux loquets de retenue sur la carte de montage, et orientez la carte comme indiqué sur la figure 3-13. 3 En maintenant la carte de montage par les loquets de retenue, alignez-la sur les deux ergots de guidage de la carte système, en s'assurant que la carte est orientée bien droit en haut et en bas. 4 Abaissez bien verticalement la carte de montage, en engageant à fond les ergots de guidage dans les trous correspondants de la carte de montage. Voir figure 3-13. 5 Fermez les deux loquets de fixation simultanément jusqu'à ce qu'ils soient en position horizontale et maintiennent la carte de montage en place. 6 Réinstallez le module PEM. Voir “Réinstallation du module PEM ou de son boîtier”, à la page 87. 7 Refermez le système. Voir “Fermeture du système”, à la page 77. 8 Reconnectez le système et les périphériques sur leur source d'alimentation. Carte RAC Installation d'une carte RAC en option PRÉCAUTION : La plupart des réparations ne peuvent être effectuées que par un technicien de service agréé. Vous devez uniquement procéder aux dépannages et réparations simples autorisés dans le manuel de votre produit, ou selon les directives du service et du support en ligne ou téléphonique. Les dommages causés par des interventions de maintenance non autorisées par Dell ne sont pas couverts par votre garantie. Consultez et respectez les consignes de sécurité livrées avec le produit. 1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise secteur. 1 Carte de montage 2 Loquets de fixation (2) 3 Support de la carte de montage 4 Plots de guidage (2)Installation des composants du système 95 2 Ouvrez le système. Voir “Ouverture du système”, à la page 75. 3 Retirez l'obturateur de prise en plastique du panneau arrière du système. Voir figure 1-3. 4 Retirez temporairement la carte contrôleur de stockage du logement INTERNAL_STORAGE : a Déconnectez tous les câbles de la carte. b Tenez la carte contrôleur de stockage par les coins et retirez-la doucement de son connecteur. 5 Installez la carte RAC dans le logement RAC_CONN : a Placez la carte RAC de sorte que son connecteur de NIC s'insère dans l'ouverture appropriée du panneau arrière. Voir figure 3-14. b Positionnez la carte en alignant son connecteur latéral avec le connecteur correspondant de la carte système. c Enfoncez le connecteur latéral sur le connecteur de carte d'extension jusqu'à ce que la carte soit correctement emboîtée. 6 Connectez le câble de gestion (50 broches) et le câble MII (44 broches) fournis avec la carte RAC sur cette dernière (voir figure 3-14), puis sur les deux connecteurs correspondants de la carte système (voir figure 6-1). Figure 3-14. Connecteurs de la carte RAC 1 2 396 Installation des composants du système 7 Réinstallez la carte contrôleur de stockage. 8 Reconnectez tous les câbles à la carte contrôleur de stockage. 9 Refermez le système. Voir “Fermeture du système”, à la page 77. 10 Rebranchez le système et les périphériques sur leur source d'alimentation, puis allumez-les. 11 Accédez au programme de configuration du système et vérifiez que le paramètre de la séquence d'amorçage a été modifié pour prendre en compte la présence de la carte RAC. Voir “Utilisation du programme de configuration du système”, à la page 49. 12 Quittez le programme de configuration du système et redémarrez l'ordinateur. Lorsque le système démarre, le message Remote Access Controller Detected (Contrôleur d'accès distant détecté) s'affiche, ainsi que des informations concernant la ROM d'option et le micrologiciel de la carte RAC. Appuyez sur pour accéder à l'écran de configuration de la carte RAC. Consultez la documentation de cette dernière pour plus d'informations sur sa configuration et son utilisation. Clé de mémoire USB interne (en option) La carte système comprend un connecteur USB qui peut être utilisé avec une clé de mémoire flash USB (voir figure 6-1). Cette clé peut être utilisée de différentes façons (périphérique d'amorçage, clé de sécurité ou périphérique de stockage). Pour que vous puissiez utiliser le connecteur USB interne, l'option Internal USB Port (Port USB interne) doit être activée dans l'écran Integrated Devices (Périphériques intégrés) du programme de configuration du système. Pour pouvoir démarrer le système à partir d'une clé de mémoire USB, vous devez stocker une image d'amorçage sur cette dernière et ajouter la clé à la séquence d'amorçage définie dans le programme de configuration du 1 Connecteur de NIC RJ-45 de la carte RAC 2 Connecteur du câble MII (44 broches) 3 Connecteur du câble de gestion (50 broches)Installation des composants du système 97 système. Voir “Utilisation du programme de configuration du système”, à la page 49. Pour obtenir les instructions permettant de créer un fichier d'amorçage sur la clé de mémoire USB, consultez la documentation fournie avec cette dernière.98 Installation des composants du système Installation de la clé de mémoire USB interne en option PRÉCAUTION : La plupart des réparations ne peuvent être effectuées que par un technicien de service agréé. Vous devez uniquement procéder aux dépannages et réparations simples autorisés dans le manuel de votre produit, ou selon les directives du service et du support en ligne ou téléphonique. Les dommages causés par des interventions de maintenance non autorisées par Dell ne sont pas couverts par votre garantie. Consultez et respectez les consignes de sécurité livrées avec le produit. 1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise secteur. 2 Ouvrez le système. Voir “Ouverture du système”, à la page 75. 3 Identifiez le connecteur USB sur la carte système (voir figure 6-1). 4 Insérez la clé de mémoire USB dans le connecteur USB approprié de la carte. Voir figure 3-15. Figure 3-15. Installation d'une clé de mémoire USB 5 Refermez le système. Voir “Ouverture du système”, à la page 75. 6 Rebranchez le système sur la prise secteur et redémarrez-le. 1 Clé de mémoire USB 2 Connecteur de clé de mémoire USB 1 2Installation des composants du système 99 7 Accédez au programme de configuration du système et vérifiez que la clé USB a été détectée. Voir “Utilisation du programme de configuration du système”, à la page 49. Clé TOE/iSCSI (en option) Le moteur TOE, les fonctions iSCSI et d'autres fonctionnalités qui seront disponibles à l'avenir pour les NIC intégrés du système sont activés via l'installation d'une clé de NIC matérielle (en option) dans le connecteur TOE_KEY de la carte système. PRÉCAUTION : La plupart des réparations ne peuvent être effectuées que par un technicien de service agréé. Vous devez uniquement procéder aux dépannages et réparations simples autorisés dans le manuel de votre produit, ou selon les directives du service et du support en ligne ou téléphonique. Les dommages causés par des interventions de maintenance non autorisées par Dell ne sont pas couverts par votre garantie. Consultez et respectez les consignes de sécurité livrées avec le produit. REMARQUE : Pour que le moteur TOE fonctionne correctement, les éléments de support du système d'exploitation correspondant doivent être installés, ainsi que le pack SNP (Scalable Network Pack) de Microsoft® . REMARQUE : Lorsque de nouvelles fonctionnalités seront prises en charge pour le NIC, vous devrez remplacer la clé matérielle TOE/iSCSI d'origine par une autre plus récente. 1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise secteur. 2 Ouvrez le système. Voir “Ouverture du système”, à la page 75. 3 Identifiez le connecteur de clé TOE/iSCSI sur la carte système (voir figure 6-1). Si une carte d'extension est installée dans le logement 7, il est possible que vous deviez la retirer. Voir “Retrait d'une carte d'extension”, à la page 91. 4 Insérez la clé TOE/iSCSI dans le connecteur approprié de la carte. Voir figure 3-16. 100 Installation des composants du système Figure 3-16. Installation d'une clé TOE/iSCSI 5 Le cas échéant, réinstallez la carte d'extension dans le logement 7. Voir “Installation d'une carte d'extension”, à la page 89. 6 Refermez le système. Voir “Ouverture du système”, à la page 75. 7 Rebranchez le système sur la prise secteur et redémarrez-le. 1 Clé TOE/iSCSI 2 Connecteur de clé TOE/iSCSI 1 2Installation des composants du système 101 Carte mémoire SD Vous pouvez installer une carte mémoire SD (en option) dans un connecteur de la carte système. PRÉCAUTION : La plupart des réparations ne peuvent être effectuées que par un technicien de service agréé. Vous devez uniquement procéder aux dépannages et réparations simples autorisés dans le manuel de votre produit, ou selon les directives du service et du support en ligne ou téléphonique. Les dommages causés par des interventions de maintenance non autorisées par Dell ne sont pas couverts par votre garantie. Consultez et respectez les consignes de sécurité livrées avec le produit. 1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise secteur. 2 Ouvrez le système. Voir “Ouverture du système”, à la page 75. 3 Repliez à fond la charnière sur la carte SD. 4 Insérez la carte SD dans le support de carte SD, étiquette sur la carte vers le haut, ergot de guidage sur le support à gauche de la carte. 5 Trouvez le connecteur de carte SD sur la carte système. Voir figure 6-1. 6 Maintenez l'ensemble de carte SD étiquette à l'opposé de la paroi du châssis, et insérez le connecteur de carte SD dans le connecteur sur la carte système. 7 Refermez le système. Voir “Ouverture du système”, à la page 75. 8 Rebranchez le système sur la prise secteur et redémarrez-le. Carte réseau fille La carte réseau fille fournit deux NIC qui viennent s'ajouter aux deux NIC intégrés à la carte système. Installation de la carte réseau fille PRÉCAUTION : La plupart des réparations ne peuvent être effectuées que par un technicien de service agréé. Vous devez uniquement procéder aux dépannages et réparations simples autorisés dans le manuel de votre produit, ou selon les directives du service et du support en ligne ou téléphonique. Les dommages causés par des interventions de maintenance non autorisées par Dell ne sont pas couverts par votre garantie. Consultez et respectez les consignes de sécurité livrées avec le produit.102 Installation des composants du système 1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise secteur. 2 Ouvrez le système. Voir “Ouverture du système”, à la page 75. 3 Si des cartes d'extension sont installées dans les logements 6 et 7, retirezles temporairement afin d'installer la carte. Voir “Retrait d'une carte d'extension”, à la page 91. 4 Placez la carte de sorte que ses connecteurs de NIC se trouvent face à l'ouverture appropriée du panneau arrière. Voir figure 3-17. Figure 3-17. Installation et retrait d'une carte réseau fille 5 Redressez la carte de façon que les découpes situées sur ses côtés s'insèrent dans les deux picots de support. Voir figure 3-17. 1 Picot de fixation (2) 2 Connecteur de carte réseau fille 3 Orifices pour les picots de fixation (2) 4 Carte réseau fille 5 Picot de support 6 Découpe 5 4 1 2 6 3Installation des composants du système 103 6 Repoussez légèrement la carte vers l'arrière. Alignez le bord avant de la carte NIC avec les deux picots de fixation avant en plastique, qui se trouvent à côté du connecteur de la carte système. Appuyez sur le côté de la carte jusqu'à ce qu'elle soit correctement emboîtée. Voir figure 3-17. Lorsque l'avant de la carte est en place, le picot de plastique se referme sur son rebord.104 Installation des composants du système 7 Le cas échéant, réinstallez les cartes d'extension dans les logements 6 et 7. Voir “Installation d'une carte d'extension”, à la page 89. 8 Refermez le système. Voir “Ouverture du système”, à la page 75. 9 Rebranchez le système sur la prise secteur et redémarrez-le. Retrait de la carte réseau fille PRÉCAUTION : La plupart des réparations ne peuvent être effectuées que par un technicien de service agréé. Vous devez uniquement procéder aux dépannages et réparations simples autorisés dans le manuel de votre produit, ou selon les directives du service et du support en ligne ou téléphonique. Les dommages causés par des interventions de maintenance non autorisées par Dell ne sont pas couverts par votre garantie. Consultez et respectez les consignes de sécurité livrées avec le produit. 1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise secteur. 2 Ouvrez le système. Voir “Ouverture du système”, à la page 75. 3 Si des cartes d'extension sont installées dans les logements 6 et 7, retirezles temporairement afin d'enlever le NIC. Voir “Retrait d'une carte d'extension”, à la page 91. 4 Tirez doucement les deux pattes bleues des picots de fixation situées sur l'avant de la carte et soulevez doucement le bord de la carte NIC pour la dégager des picots. Lorsque la carte se dégage des picots, le connecteur situé sous la carte NIC est extrait de la carte système. 5 Faites glisser la carte vers l'arrière pour la dégager des deux picots de support et soulevez-la pour la retirer du système.Installation des composants du système 105 Mémoire système Vous pouvez ajouter de la mémoire supplémentaire au système (maximum autorisé : 128 Go pour les systèmes biprocesseur ou 256 Go pour les systèmes quadriprocesseur). Pour ce faire, installez des paires de barrettes de mémoire de 512 Mo, 1 Go, 2 Go, 4 Go ou 8 Go. Les barrettes de 8 Go seront prises en charge lorsqu'elles seront disponibles. Les barrettes de mémoires DDR-II à registres et cadencées à 667 MHz sont prises en charge dans toutes les capacités. Les barrettes de 2 Go et de 4 Go (selon disponibilité) cadencées à 800 Mhz sont également prises en charge mais avec certaines restrictions, dans des configurations spécifiques. Seize supports mémoire se trouvent sur la carte système, sous l'assemblage du protecteur de ventilation. Dans les systèmes quadriprocesseur, seize supports supplémentaires se trouvent dans le module PEM. Chaque processeur dispose de deux canaux de mémoire organisés en groupes de quatre emplacements mémoire. Le système prend en charge l'architecture NUMA (Non-Uniform Memory Architecture). Chaque processeur dispose d'un contrôleur de mémoire qui lui est propre, ainsi que d'une mémoire locale qui permet de réduire les temps d'accès ; il peut également accéder à la mémoire d'un autre processeur. Cette architecture améliore les performances du système si le système d'exploitation installé la prend en charge. AVIS : Pour activer l'architecture NUMA, ouvrez le programme de configuration du système et désactivez l'option Node Interleaving (Imbrication de nœuds). Voir “Utilisation du programme de configuration du système”, à la page 49. Consignes générales pour l'installation des barrettes de mémoire Pour optimiser les performances du système, observez les consignes suivantes lorsque vous configurez la mémoire système. • Les barrettes de mémoire doivent être installées deux par deux, en commençant par les deux premiers supports de chaque groupe. Ces supports sont équipés de leviers de fixation blancs. • Toutes les barrettes doivent être de vitesse et de technologie identiques. Les deux barrettes de chaque paire doivent être de la même taille.106 Installation des composants du système La mémoire peut être installée dans une configuration comprenant deux processeurs (voir tableau 3-1) ou quatre processeurs (voir tableau 3-2). Tableau 3-1. Exemples de configurations de mémoire pour un système biprocesseur Mémoire système totale Barrettes de mémoire – Nombre, taille et vitesse Emplacement des barrettes de mémoire 2 Go Quatre ; 512 Mo ; 667 MHz A1, A2, B1, B2 4 Go Quatre ; 1 Go ; 667 MHz A1, A2, B1, B2 4 Go Huit ; 512 Mo ; 667 MHz A1, A2, A3, A4, B1, B2, B3, B4 6 Go Douze ; 512 Mo ; 667 MHz A1, A2, A3, A4, A5, A6, B1, B2, B3, B4, B5, B6 8 Go Quatre ; 2 Go ; 667 MHz A1, A2, B1, B2 8 Go Huit ; 1 Go ; 667 MHz A1, A2, A3, A4, B1, B2, B3, B4 16 Go Quatre ; 4 Go ; 667 MHz A1, A2, B1, B2 16 Go Seize ; 1 Go ; 667 MHz A1, A2, A3, A4, A5, A6, A7, A8, B1, B2, B3, B4, B5, B6, B7, B8 16 Go Huit ; 2 Go ; 667 MHz A1, A2, A3, A4, B1, B2, B3, B4 24 Go Douze ; 2 Go ; 667 MHz A1, A2, A3, A4, A5, A6, B1, B2, B3, B4, B5, B6 32 Go Quatre ; 8 Go ; 667 MHz A1, A2, B1, B2 32 Go Huit ; 4 Go ; 667 MHz A1, A2, A3, A4, B1, B2, B3, B4 32 Go Seize ; 2 Go ; 667 MHz A1, A2, A3, A4, A5, A6, A7, A8, B1, B2, B3, B4, B5, B6, B7, B8 48 Go Douze ; 4 Go ; 667 MHz A1, A2, A3, A4, A5, A6, B1, B2, B3, B4, B5, B6 64 Go Huit ; 8 Go ; 667 MHz A1, A2, A3, A4, B1, B2, B3, B4 96 Go Douze ; 8 Go ; 667 MHz A1, A2, A3, A4, A5, A6, B1, B2, B3, B4, B5, B6 128 Go Seize ; 8 Go ; 667 MHz A1, A2, A3, A4, A5, A6, A7, A8, B1, B2, B3, B4, B5, B6, B7, B8Installation des composants du système 107 Tableau 3-2. Exemples de configurations de mémoire pour un système quadriprocesseur Mémoire système totale Barrettes de mémoire – Nombre, taille et vitesse Emplacement des barrettes de mémoire 4 Go Huit ; 512 Mo ; 667 MHz A1, A2, B1, B2, C1, C2, D1, D2 8 Go Huit ; 1 Go ; 667 MHz A1, A2, B1, B2, C1, C2, D1, D2 16 Go Huit ; 2 Go ; 667 MHz A1, A2, B1, B2, C1, C2, D1, D2 16 Go Huit ; 2 Go ; 800 MHz* A1, A2, B1, B2, C1, C2, D1, D2 24 Go Vingt-quatre ; 1 Go ; 667 MHz A1, A2, A3, A4, A5, A6, B1, B2, B3, B4, B5, B6, C1, C2, C3, C4, C5, C6, D1, D2, D3, D4, D5, D6 32 Go Huit ; 4 Go ; 667 MHz A1, A2, B1, B2, C1, C2, D1, D2 32 Go Huit ; 4 Go ; 800 MHz* A1, A2, B1, B2, C1, C2, D1, D2 32 Go Seize ; 2 Go ; 667 MHz A1, A2, A3, A4, B1, B2, B3, B4, C1, C2, C3, C4, D1, D2, D3, D4 32 Go Seize ; 2 Go ; 800 MHz* A1, A2, A3, A4, B1, B2, B3, B4, C1, C2, C3, C4, D1, D2, D3, D4 32 Go Trente-deux ; 1 Go ; 667 MHz A1, A2, A3, A4, A5, A6, A7, A8, B1, B2, B3, B4, B5, B6, B7, B8, C1, C2, C3, C4, C5, C6, C7, C8, D1, D2, D3, D4, D5, D6, D7, D8 48 Go Vingt-quatre ; 2 Go, 667 MHz A1, A2, A3, A4, A5, A6, B1, B2, B3, B4, B5, B6, C1, C2, C3, C4, C5, C6, D1, D2, D3, D4, D5, D6 64 Go Huit ; 8 Go ; 667 MHz A1, A2, B1, B2, C1, C2, D1, D2 64 Go Seize ; 4 Go ; 667 MHz A1, A2, A3, A4, B1, B2, B3, B4, C1, C2, C3, C4, D1, D2, D3, D4 64 Go Seize ; 4 Go ; 800 MHz* A1, A2, A3, A4, B1, B2, B3, B4, C1, C2, C3, C4, D1, D2, D3, D4 * Les barrettes de 2 Go et 4 Go cadencées à 800 MHz seront prises en charge lorsqu'elles seront disponibles. Les barrettes cadencées à 800 MHz sont limitées à quatre par processeur. Si plus de quatre barrettes sont installées pour chaque processeur, le système limite leur vitesse de fonctionnement à 667 MHz.108 Installation des composants du système 64 Go Trente-deux ; 2 Go ; 667 MHz A1, A2, A3, A4, A5, A6, A7, A8, B1, B2, B3, B4, B5, B6, B7, B8, C1, C2, C3, C4, C5, C6, C7, C8, D1, D2, D3, D4, D5, D6, D7, D8 96 Go Vingt-quatre ; 4 Go ; 667 MHz A1, A2, A3, A4, A5, A6, B1, B2, B3, B4, B5, B6, C1, C2, C3, C4, C5, C6, D1, D2, D3, D4, D5, D6 128 Go Seize ; 8 Go ; 667 MHz A1, A2, A3, A4, B1, B2, B3, B4, C1, C2, C3, C4, D1, D2, D3, D4 128 Go Trente-deux ; 4 Go ; 667 MHz A1, A2, A3, A4, A5, A6, A7, A8, B1, B2, B3, B4, B5, B6, B7, B8, C1, C2, C3, C4, C5, C6, C7, C8, D1, D2, D3, D4, D5, D6, D7, D8 192 Go Vingt-quatre ; 8 Go ; 667 MHz A1, A2, A3, A4, A5, A6, B1, B2, B3, B4, B5, B6, C1, C2, C3, C4, C5, C6, D1, D2, D3, D4, D5, D6 256 Go Trente-deux ; 8 Go ; 667 MHz A1, A2, A3, A4, A5, A6, A7, A8, B1, B2, B3, B4, B5, B6, B7, B8, C1, C2, C3, C4, C5, C6, C7, C8, D1, D2, D3, D4, D5, D6, D7, D8 Tableau 3-2. Exemples de configurations de mémoire pour un système quadriprocesseur (suite) Mémoire système totale Barrettes de mémoire – Nombre, taille et vitesse Emplacement des barrettes de mémoire * Les barrettes de 2 Go et 4 Go cadencées à 800 MHz seront prises en charge lorsqu'elles seront disponibles. Les barrettes cadencées à 800 MHz sont limitées à quatre par processeur. Si plus de quatre barrettes sont installées pour chaque processeur, le système limite leur vitesse de fonctionnement à 667 MHz.Installation des composants du système 109 Installation de barrettes de mémoire PRÉCAUTION : La plupart des réparations ne peuvent être effectuées que par un technicien de service agréé. Vous devez uniquement procéder aux dépannages et réparations simples autorisés dans le manuel de votre produit, ou selon les directives du service et du support en ligne ou téléphonique. Les dommages causés par des interventions de maintenance non autorisées par Dell ne sont pas couverts par votre garantie. Consultez et respectez les consignes de sécurité livrées avec le produit. PRÉCAUTION : Les barrettes DIMM restent chaudes un certain temps après la mise hors tension du système. Laissez-les tiédir avant de les manipuler. Tenez-les par les bords en évitant de toucher leurs composants. 1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise secteur. 2 Ouvrez le système. Voir “Ouverture du système”, à la page 75. 3 Retirez le module PEM (configurations quadriprocesseur) ou le boîtier PEM (configurations biprocesseur). Voir “Retrait du module PEM ou de son boîtier”, à la page 83. 4 Retirez l'assemblage du protecteur de ventilation : – Si vous installez des barrettes de mémoire sur la carte système, voir “Retrait de l'assemblage du protecteur de ventilation”, à la page 79. – Si vous installez des barrettes de mémoire dans le module PEM, voir figure 3-9. 5 Repérez les supports mémoire. Voir figure 6-1 ou figure 6-2. 6 Appuyez sur les dispositifs d'éjection du support de barrette de mémoire, puis écartez-les (voir figure 3-18) pour pouvoir insérer la barrette dans le support. 7 Tenez chaque barrette de mémoire par les bords, sans toucher la partie centrale.110 Installation des composants du système Figure 3-18. Installation et retrait d'une barrette de mémoire 8 Alignez le connecteur latéral de la barrette avec le détrompeur du support, puis insérez la barrette dans le support. REMARQUE : Le détrompeur permet de s'assurer que la barrette sera insérée dans le bon sens. 9 Appuyez sur la barrette de mémoire avec les pouces tout en relevant les dispositifs d'éjection avec les index pour verrouiller la barrette de mémoire dans le support. Si la barrette de mémoire est installée correctement, les dispositifs d'éjection s'alignent avec ceux des autres supports contenant des barrettes de mémoire. 10 Répétez la procédure décrite de l'étape 6 à l'étape 9 pour installer les barrettes restantes. Voir tableau 3-1 ou tableau 3-2. 1 Barrette de mémoire 2 Dispositifs d'éjection (2) 3 Détrompeur 2 1 3Installation des composants du système 111 11 Réinstallez l'assemblage du protecteur de ventilation : – Si vous installez des barrettes de mémoire sur la carte système, voir “Réinstallation de l'assemblage du protecteur de ventilation”, à la page 81. – Si vous installez des barrettes de mémoire dans le module PEM, voir figure 3-9. 12 Réinstallez le module PEM. Voir “Réinstallation du module PEM ou de son boîtier”, à la page 87. 13 Refermez le système. Voir “Fermeture du système”, à la page 77. 14 Démarrez le système, appuyez sur pour accéder au programme de configuration du système et vérifiez le paramètre System Memory (Mémoire système) dans l'écran principal. La valeur indiquée doit déjà avoir été modifiée par le système pour prendre en compte la mémoire qui vient d'être installée. 15 Si la valeur est fausse, il est possible qu'une ou plusieurs barrettes soient mal installées. Recommencez la procédure décrite de l'étape 2 à l'étape 14 en vérifiant que les barrettes de mémoire sont correctement emboîtées dans leurs supports. 16 Exécutez le test de mémoire des diagnostics du système. Voir “Exécution des diagnostics du système”, à la page 189. Retrait de barrettes de mémoire PRÉCAUTION : La plupart des réparations ne peuvent être effectuées que par un technicien de service agréé. Vous devez uniquement procéder aux dépannages et réparations simples autorisés dans le manuel de votre produit, ou selon les directives du service et du support en ligne ou téléphonique. Les dommages causés par des interventions de maintenance non autorisées par Dell ne sont pas couverts par votre garantie. Consultez et respectez les consignes de sécurité livrées avec le produit. PRÉCAUTION : Les barrettes DIMM restent chaudes un certain temps après la mise hors tension du système. Laissez-les tiédir avant de les manipuler. Tenez-les par les bords en évitant de toucher leurs composants. 1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise secteur. 2 Ouvrez le système. Voir “Ouverture du système”, à la page 75.112 Installation des composants du système 3 Retirez le module PEM. Voir “Retrait du module PEM ou de son boîtier”, à la page 83. 4 Retirez l'assemblage du protecteur de ventilation : – Si vous retirez des barrettes de mémoire de la carte système, voir “Retrait de l'assemblage du protecteur de ventilation”, à la page 79. – Si vous retirez des barrettes de mémoire du module PEM, voir figure 3-9. 5 Repérez les supports mémoire. Voir figure 6-1. 6 Poussez les dispositifs d'éjection situés de chaque côté du support vers le bas et vers l'extérieur pour extraire la barrette de mémoire. Voir figure 3-18. Tenez chaque barrette de mémoire par les bords, sans toucher la partie centrale. 7 Réinstallez l'assemblage du protecteur de ventilation : – Si vous retirez des barrettes de mémoire de la carte système, voir “Réinstallation de l'assemblage du protecteur de ventilation”, à la page 81. – Si vous retirez des barrettes de mémoire du module PEM, voir figure 3-9. 8 Réinstallez le module PEM. Voir “Réinstallation du module PEM ou de son boîtier”, à la page 87. 9 Refermez le système. Voir “Fermeture du système”, à la page 77.Installation des composants du système 113 Processeurs Le système peut prendre en charge deux ou quatre processeurs. Pour tirer parti des futures options en matière de vitesse et des nouvelles fonctionnalités émergentes, vous pouvez mettre les processeurs existants à niveau. Chaque processeur et sa mémoire cache interne sont contenus dans une matrice LGA (Land Grid Array) installée dans un support situé sur la carte système ou le module d'extension processeurs. AVIS : Tous les processeurs doivent avoir la même fréquence d'horloge et la même tension de cœur. Retrait d'un processeur PRÉCAUTION : La plupart des réparations ne peuvent être effectuées que par un technicien de service agréé. Vous devez uniquement procéder aux dépannages et réparations simples autorisés dans le manuel de votre produit, ou selon les directives du service et du support en ligne ou téléphonique. Les dommages causés par des interventions de maintenance non autorisées par Dell ne sont pas couverts par votre garantie. Consultez et respectez les consignes de sécurité livrées avec le produit. 1 Avant de mettre le système à niveau, téléchargez la version du BIOS système la plus récente disponible sur le site support.dell.com. 2 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise secteur. 3 Ouvrez le système. Voir “Ouverture du système”, à la page 75. 4 Retirez le module PEM. Voir “Retrait du module PEM ou de son boîtier”, à la page 83. 5 Retirez l'assemblage du protecteur de ventilation : – Si vous retirez un processeur installé sur la carte système, voir “Retrait de l'assemblage du protecteur de ventilation”, à la page 79. – Si vous retirez un processeur installé dans le module PEM, voir figure 3-9. PRÉCAUTION : Le processeur et le dissipateur de chaleur chauffent énormément. Laissez le processeur tiédir avant de le manipuler. AVIS : Lorsque vous retirez le dissipateur de chaleur, il est possible que le processeur y reste collé et sorte de son support. C'est pourquoi il est recommandé de retirer le dissipateur de chaleur quand le processeur est tiède.114 Installation des composants du système AVIS : Ne retirez jamais le dissipateur de chaleur d'un processeur si vous n'avez pas l'intention de retirer le processeur lui-même. Le dissipateur de chaleur est indispensable pour maintenir les conditions de température adéquates. 6 Desserrez l'une des vis de fixation du dissipateur de chaleur. Voir figure 3-19. Figure 3-19. Retrait et installation du dissipateur de chaleur 7 Attendez 30 secondes pour que le dissipateur de chaleur se détache du processeur. 8 Desserrez l'autre vis de fixation du dissipateur de chaleur. 1 Dissipateur de chaleur 2 Vis de fixation du dissipateur de chaleur (2) 2 1Installation des composants du système 115 9 Si le dissipateur de chaleur ne s'est pas détaché du processeur, faites-le doucement tourner dans le sens des aiguilles d'une montre, puis dans l'autre sens jusqu'à ce qu'il se décolle. Ne tirez pas sur le dissipateur de chaleur pour l'arracher du processeur. 10 Soulevez le dissipateur de chaleur pour le retirer du processeur et retournez-le avant de le poser. 11 À l'aide d'un chiffon propre et non pelucheux, retirez la pâte thermique qui recouvre la surface du cadre de protection du processeur. 12 Relevez le levier d'éjection de 90 degrés jusqu'à ce que le processeur sorte de son support. Voir figure 3-20. Figure 3-20. Retrait et installation du processeur 1 Levier d'éjection 2 Processeur 3 Cadre de protection du processeur 4 Détrompeurs (2) 5 Support 2 4 5 1 3116 Installation des composants du système 13 Ouvrez le cadre de protection du processeur puis retirez le processeur de son support. Laissez le levier relevé afin de pouvoir installer le nouveau processeur. AVIS : Veillez à ne pas tordre les broches du support lors du retrait du processeur. Vous risqueriez d'endommager définitivement le support et la carte système. Installation d'un processeur 1 Déballez le nouveau processeur. 2 Alignez le processeur avec les deux détrompeurs du support. Voir figure 3-20. 3 Si vous installez un processeur dans un support vide, procédez comme suit : a Retirez le cache recouvrant le support. b Relevez le levier d'éjection de 90 degrés. Voir figure 3-20. c Relevez le cadre de protection du processeur. Voir figure 3-20. 4 Installez le processeur dans le support. AVIS : Le fait de remettre le système sous tension alors que le processeur est mal positionné risque de provoquer des dommages irréparables, à la fois pour le processeur et pour la carte système. a Si ce n'est déjà fait, redressez complètement le levier d'éjection. b Une fois que vous avez aligné le processeur sur les détrompeurs, insérez-le doucement dans le support. AVIS : Ne forcez pas lorsque vous mettez le processeur en place. S'il est positionné correctement, il s'insère dans le support très facilement. c Fermez le cadre de protection du processeur. Voir figure 3-20. d Abaissez le levier d'éjection du support jusqu'à ce qu'il s'enclenche et verrouille le processeur. Voir figure 3-20.Installation des composants du système 117 5 Installez le dissipateur de chaleur. REMARQUE : Si aucun nouveau dissipateur de chaleur n'est fourni, utilisez celui que vous avez retiré à l'étape 10. a Si un nouveau dissipateur de chaleur vous a été fourni avec le kit du processeur, retirez le feuillet de protection de la couche de pâte thermique déjà appliquée sur le dessus du dissipateur. Voir figure 3-19. Si le kit a été livré sans dissipateur de chaleur, appliquez une nouvelle couche de pâte thermique : • À l'aide d'un chiffon propre et non pelucheux, retirez la pâte thermique qui recouvre le dissipateur de chaleur. • Ouvrez le paquet de pâte thermique fourni avec le kit du processeur et appliquez-en une couche uniforme sur le dessus du processeur. b Placez le dissipateur de chaleur sur le processeur. Voir figure 3-19. c Appuyez sur le dissipateur de chaleur et serrez les deux vis de fixation jusqu'à ce que vous sentiez une résistance. Voir figure 3-19. 6 Réinstallez l'assemblage du protecteur de ventilation : – Si vous ajoutez un processeur à la carte système, voir “Réinstallation de l'assemblage du protecteur de ventilation”, à la page 81. – Si vous ajoutez un processeur au module PEM, voir figure 3-9. 7 Réinstallez le module PEM. Voir “Réinstallation du module PEM ou de son boîtier”, à la page 87. 8 Refermez le système. Voir “Fermeture du système”, à la page 77. 9 Redémarrez le système. Lorsque le système démarre, il détecte la présence du ou des nouveau(x) processeur(s) et modifie automatiquement les informations du programme de configuration du système. 10 Appuyez sur pour accéder au programme de configuration du système et vérifier que les informations relatives au processeur correspondent bien à la nouvelle configuration. voir “Utilisation du programme de configuration du système”, à la page 49 pour obtenir les instructions d'utilisation du programme de configuration du système.118 Installation des composants du système 11 Exécutez les diagnostics du système pour vérifier que le nouveau processeur fonctionne correctement. voir “Exécution des diagnostics du système”, à la page 189 pour plus d'informations concernant l'exécution des diagnostics. Installation d'un lecteur optique Il est possible de monter un lecteur optique slim (en option) sur un plateau qui s'installe dans le panneau avant et se connecte au contrôleur de la carte système par l'intermédiaire du fond de panier SAS. REMARQUE : Les périphériques DVD sont uniquement des périphériques de données. 1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise secteur. 2 Retirez le cadre. Voir “Retrait et réinstallation du cadre avant en option”, à la page 74. 3 Pour retirer le support de lecteur, tirez le loquet d'éjection vers l'avant et faites glisser le support hors du châssis. Voir figure 3-19. 4 Retirez du support la plaque de recouvrement du lecteur optique : a Desserrez la vis du loquet maintenant le lecteur optique ou la plaque de recouvrement. Voir figure 3-21. b Retirez le loquet. c Soulevez la plaque de recouvrement.Installation des composants du système 119 Figure 3-21. Installation d'un lecteur optique dans le support 1 Support du lecteur optique 2 Lecteur optique 3 Carte d'interface 4 Rivets de plastique (2) 5 Loquet 6 Vis moletée 1 6 3 5 4 2120 Installation des composants du système 5 Installez le nouveau lecteur optique dans le support. Voir figure 3-21. Les plots du support doivent s'engager dans les trous correspondants, sur le côté du lecteur. 6 Fixez la carte d'interface sur l'arrière du support, à l'aide des deux rivets de plastique. Voir figure 3-21. 7 Réinstallez le loquet et serrez la vis moletée. 8 Insérez le support contenant le lecteur jusqu'à ce que le plateau s'enclenche. Voir figure 3-19. 9 Réinstallez le cadre avant, le cas échéant. Voir “Retrait et réinstallation du cadre avant en option”, à la page 74. 10 Rebranchez le système et les périphériques sur les prises secteur. Disques durs Le système peut accueillir un maximum de huit disques durs SAS 2,5 pouces ou de cinq disques durs SAS 3,5 pouces. Tous les disques sont connectés à la carte système par l'intermédiaire d'une carte de fond de panier SAS. Voir “Fond de panier SAS”, à la page 138 pour plus d'informations sur ces options. Les systèmes équipés d'un contrôleur RAID SAS (en option) prennent en charge les lecteurs enfichables à chaud.La figure 3-22 indique les numéros d'identification des lecteurs. Installation des composants du système 121 Figure 3-22. ID des disques durs Avant de commencer AVIS : Avant de tenter de retirer ou d'installer un lecteur pendant que le système est en cours de fonctionnement, reportez-vous à la documentation de la carte contrôleur RAID SAS (en option) pour vérifier que la configuration de l'adaptateur hôte lui permet de prendre en charge le retrait et l'insertion de lecteurs à chaud. REMARQUE : Il est recommandé d'utiliser uniquement des lecteurs testés et approuvés pour une utilisation avec la carte de fond de panier SAS. ID 3 ID 2 ID 1 ID 0 ID 4 ID 3 ID 2 ID 1 ID 0 ID 4 ID 5 ID 6 ID 7122 Installation des composants du système Il vous faudra peut-être utiliser des programmes autres que ceux fournis avec le système d'exploitation pour partitionner et formater les disques durs. AVIS : Pendant le formatage du lecteur, vous ne devez pas éteindre ni redémarrer le système. Cela risquerait d'endommager le lecteur. Lorsque vous formatez un disque dur à haute capacité, prévoyez suffisamment de temps pour que le formatage s'exécute entièrement. De longs délais de formatage sont normaux pour ces lecteurs. Configuration du périphérique d'amorçage Si vous envisagez de démarrer le système à partir d'un disque dur, celui-ci doit être relié au contrôleur principal (d'amorçage). L'ordre de démarrage spécifié dans le programme de configuration du système détermine le périphérique utilisé pour l'amorçage du système. Le programme de configuration du système contient des options qui sont utilisées par le système pour rechercher les périphériques de démarrage installés. Voir “Utilisation du programme de configuration du système”, à la page 49 pour plus d'informations sur le programme de configuration du système. Retrait d'un cache de lecteur AVIS : Pour assurer un refroidissement correct du système, vous devez installer un cache sur toutes les baies de disque dur inoccupées. Si vous retirez un support de disque dur du système et ne le réinstallez pas immédiatement, installez un cache sur l'emplacement vide. 1 Retirez le cadre. Voir “Retrait et réinstallation du cadre avant en option”, à la page 74. 2 Pour éjecter un cache, passez le doigt sous son extrémité carénée et appuyez sur le loquet. 3 Tirez les extrémités du cache vers l'extérieur jusqu'à ce qu'il soit complètement dégagé.Installation des composants du système 123 Installation d'un cache de lecteur Le cache de lecteur est muni d'un détrompeur permettant de s'assurer qu'il sera correctement inséré dans la baie. Pour installer un cache de lecteur, insérez et faites pivoter le côté avec détrompeur dans la baie de lecteur. Appuyez de manière égale sur l'autre côté du cache jusqu'à ce qu'il soit correctement emboîté. Retrait d'un disque dur enfichable à chaud 1 Retirez le cadre. Voir “Retrait et réinstallation du cadre avant en option”, à la page 74. 2 Préparez le disque au retrait à l'aide du logiciel de gestion RAID. Attendez que les voyants du support indiquent que le disque peut être retiré en toute sécurité. Consultez la documentation du contrôleur RAID SAS pour plus d'informations sur le retrait d'un lecteur enfichable à chaud. Si le lecteur était en ligne, le voyant d'activité/panne vert clignote lors de la procédure de mise hors tension. Quand les deux voyants sont éteints, vous pouvez retirer le lecteur. 3 Ouvrez la poignée du support pour déverrouiller le disque. Voir figure 3-23. 4 Extrayez le disque de la baie. 5 Si vous ne remplacez pas le disque dur par un autre ou si vous ne le remettez pas en place, installez un cache sur la baie vide. Voir “Installation d'un cache de lecteur”, à la page 123. AVIS : Pour assurer un refroidissement correct du système, vous devez installer un cache sur toutes les baies de disque dur inoccupées.124 Installation des composants du système Figure 3-23. Retrait et installation d'un disque dur enfichable à chaud Installation d'un disque dur enfichable à chaud AVIS : Lorsque vous installez un disque dur, assurez-vous que les lecteurs adjacents ne sont pas en cours d'installation. Si vous insérez un support de disque dur et tentez d'en verrouiller la poignée alors qu'un support de disque dur voisin n'est que partiellement installé, vous risquez d'endommager le ressort de protection de ce dernier et de le rendre inutilisable. AVIS : Certains systèmes d'exploitation ne prennent pas en charge les disques durs enfichables à chaud. Consultez la documentation fournie avec le système d'exploitation. 1 Disque dur 2 Support de disque 3 Poignée d'éjection du support 3 1 2Installation des composants du système 125 1 Retirez le cadre. Voir “Retrait et réinstallation du cadre avant en option”, à la page 74. 2 Si la baie est fermée par un cache, retirez-le. Voir “Retrait d'un cache de lecteur”, à la page 122. 3 Installez le disque dur enfichable à chaud. a Ouvrez la poignée du support de disque dur. b Insérez le support de disque dans la baie jusqu'à ce qu'il touche le fond de panier. c Refermez la poignée pour maintenir le disque dur en place. 4 Réinstallez le cadre avant, le cas échéant. Voir “Retrait et réinstallation du cadre avant en option”, à la page 74. Réinstallation d'un disque dur dans un support Pour retirer un disque dur installé dans un support, retirez les quatre vis situées sur les rails coulissants du support, puis retirez le disque. Pour installer un nouveau disque dur dans le support, procédez comme suit : 1 Insérez le disque dur dans le support, connecteur vers l'arrière. Voir figure 3-24. 2 Si vous installez un lecteur 3,5 pouces, faites correspondre le trou situé sous l'arrière du disque dur avec celui marqué “SAS” sur le support. Si la position est correcte, l'arrière du disque dur arrive au même niveau que l'arrière du support. 3 Fixez le disque dur sur le support à l'aide des quatre vis. Voir figure 3-24.126 Installation des composants du système Figure 3-24. Installation d'un disque dur dans un support 1 Vis (4) 2 Support de disque 3 Disque dur 1 3 2Installation des composants du système 127 Cartes contrôleurs SAS Retrait d'une carte contrôleur SAS PRÉCAUTION : La plupart des réparations ne peuvent être effectuées que par un technicien de service agréé. Vous devez uniquement procéder aux dépannages et réparations simples autorisés dans le manuel de votre produit, ou selon les directives du service et du support en ligne ou téléphonique. Les dommages causés par des interventions de maintenance non autorisées par Dell ne sont pas couverts par votre garantie. Consultez et respectez les consignes de sécurité livrées avec le produit. 1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise secteur. 2 Ouvrez le système. Voir “Ouverture du système”, à la page 75. 3 Débranchez le(s) câble(s) de données de la carte contrôleur. 4 Si vous retirez un contrôleur RAID SAS avec mémoire cache alimentée par batterie, déconnectez le câble de la batterie RAID enfiché sur la carte. 5 Retirez la carte du logement d'extension. voir “Retrait d'une carte d'extension”, à la page 91. Installation d'une carte contrôleur SAS PRÉCAUTION : La plupart des réparations ne peuvent être effectuées que par un technicien de service agréé. Vous devez uniquement procéder aux dépannages et réparations simples autorisés dans le manuel de votre produit, ou selon les directives du service et du support en ligne ou téléphonique. Les dommages causés par des interventions de maintenance non autorisées par Dell ne sont pas couverts par votre garantie. Consultez et respectez les consignes de sécurité livrées avec le produit. 1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise secteur. 2 Ouvrez le système. Voir “Ouverture du système”, à la page 75. 3 Installez la carte contrôleur dans le logement d'extension INTERNAL_STORAGE. Pour obtenir des instructions concernant l'installation de la carte, voir “Installation d'une carte d'extension”, à la page 89.128 Installation des composants du système 4 Connectez la carte au fond de panier SAS. a Enfichez le connecteur du câble de données SAS marqué “Controller 0” dans le connecteur blanc de la carte. Enfichez ensuite le connecteur “Controller 1” dans le connecteur noir de la carte. Voir figure 3-25. b Faites passer le câble de données SAS et le câble SATA reliés à la carte intercalaire de périphérique sous le coin inférieur droit de la carte système (selon l'orientation de la figure 6-1), et faites passer les câbles par les clips de câble du côté intérieur du châssis. c Faites passer le câble de données SAS dans les clips de guidage situés sur la paroi interne du châssis. Enfichez le connecteur "BKPLN A" dans le connecteur SAS A du fond de panier, puis enfichez le connecteur "BKPLN B" dans le connecteur SAS B du fond de panier. Figure 3-25. Installation d'un contrôleur RAID SAS 1 3 2 4 5Installation des composants du système 129 Installation de la batterie de la carte contrôleur RAID SAS Installez la pile RAID dans le support en plastique correspondant qui se trouve à l'intérieur du châssis. Enfichez le câble de la batterie dans le connecteur situé sur la carte contrôleur RAID SAS, à côté de la barrette de mémoire RAID. Voir figure 3-25. Connexion d'un lecteur de bande SAS externe Cette sous-section décrit le raccordement d'un lecteur de bande SAS externe et d'une carte contrôleur SAS externe (en option). PRÉCAUTION : La plupart des réparations ne peuvent être effectuées que par un technicien de service agréé. Vous devez uniquement procéder aux dépannages et réparations simples autorisés dans le manuel de votre produit, ou selon les directives du service et du support en ligne ou téléphonique. Les dommages causés par des interventions de maintenance non autorisées par Dell ne sont pas couverts par votre garantie. Consultez et respectez les consignes de sécurité livrées avec le produit. 1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise secteur. 2 Ouvrez le système. Voir “Ouverture du système”, à la page 75. 3 Mettez-vous à la terre en touchant une partie métallique non peinte à l'arrière de l'ordinateur, puis déballez le lecteur. 4 Déballez le lecteur de bande et la carte contrôleur. 5 Installez la carte contrôleur SAS externe dans un logement d'extension. Voir “Installation d'une carte d'extension”, à la page 89. 6 Enfichez le câble d'interface sur le lecteur de bande. 7 Enfichez l'autre extrémité du câble d'interface dans le connecteur SAS externe situé sur le support de la carte contrôleur. 8 Branchez le câble d'alimentation du lecteur de bande sur une prise secteur. 9 Refermez le système. Voir “Fermeture du système”, à la page 77. 1 Support de la batterie RAID 2 Batterie RAID 3 Câble de la batterie RAID 4 Câble de données SAS 5 Carte contrôleur RAID SAS130 Installation des composants du système 10 Rebranchez le système et les périphériques sur les prises secteur, puis allumez-les. 11 Effectuez une sauvegarde sur bande et un test de vérification de l'unité, en suivant les instructions de la documentation correspondante. Connexion d'un périphérique de stockage Fibre Channel externe Cette sous-section décrit le raccordement de périphériques Fibre Channel externes et d'un adaptateur HBA Fibre Channel (en option). PRÉCAUTION : La plupart des réparations ne peuvent être effectuées que par un technicien de service agréé. Vous devez uniquement procéder aux dépannages et réparations simples autorisés dans le manuel de votre produit, ou selon les directives du service et du support en ligne ou téléphonique. Les dommages causés par des interventions de maintenance non autorisées par Dell ne sont pas couverts par votre garantie. Consultez et respectez les consignes de sécurité livrées avec le produit. 1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise secteur. 2 Ouvrez le système. Voir “Ouverture du système”, à la page 75. 3 Mettez-vous à la terre en touchant une surface métallique non peinte à l'arrière du système, déballez le lecteur et comparez les réglages des cavaliers et commutateurs avec ceux décrits dans la documentation du lecteur. 4 Installez l'adaptateur HBA Fibre Channel dans un logement d'extension. Voir “Installation d'une carte d'extension”, à la page 89. 5 Enfichez l'extrémité du câble Fibre Channel dans le connecteur situé sur le support de l'adaptateur HBA. 6 Refermez le système. Voir “Fermeture du système”, à la page 77. 7 Rebranchez le système et les périphériques sur les prises secteur, puis allumez-les.Installation des composants du système 131 Pile du système La pile du système est une pile bouton de 3,0 volts (V). Remplacement de la pile du système PRÉCAUTION : La plupart des réparations ne peuvent être effectuées que par un technicien de service agréé. Vous devez uniquement procéder aux dépannages et réparations simples autorisés dans le manuel de votre produit, ou selon les directives du service et du support en ligne ou téléphonique. Les dommages causés par des interventions de maintenance non autorisées par Dell ne sont pas couverts par votre garantie. Consultez et respectez les consignes de sécurité livrées avec le produit. PRÉCAUTION : Une pile neuve peut exploser si elle est mal installée. Remplacez la pile par une autre de type identique ou d'un type équivalent recommandé par le fabricant. Mettez les piles usagées au rebut selon les instructions du fabricant. Consultez le document System Information Guide (Guide d'information sur le système) pour obtenir des informations supplémentaires. 1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise secteur. 2 Ouvrez le système. Voir “Ouverture du système”, à la page 75. 3 Retirez le module PEM. Voir “Retrait du module PEM ou de son boîtier”, à la page 83. 4 Retirez l'assemblage du protecteur de ventilation. Voir “Retrait de l'assemblage du protecteur de ventilation”, à la page 79. 5 Repérez le support de la pile. Voir figure 6-1. AVIS : Si vous sortez la pile de son support avec un objet non pointu, prenez garde de ne pas toucher la carte système. Vérifiez que l'objet est inséré entre la pile et son support avant de tenter d'extraire la pile. Sinon, vous risquez d'endommager la carte système en arrachant le support ou en brisant des éléments de circuit sur la carte système. AVIS : Pour ne pas endommager le connecteur de pile, maintenez-le en place lorsque vous installez ou retirez une pile. 6 Retirez la pile du système. Voir figure 3-26. a Maintenez le connecteur de pile en place en appuyant fermement sur le côté positif du connecteur. 132 Installation des composants du système b Tout en continuant à appuyer, poussez la pile vers le côté positif et extrayez-la des pattes de fixation du côté négatif du connecteur. Figure 3-26. Remplacement de la pile du système AVIS : Pour ne pas endommager le connecteur de pile, maintenez-le en place lorsque vous installez ou retirez une pile. 7 Installez la nouvelle pile. a Maintenez le connecteur de pile en place en appuyant fermement sur le côté positif du connecteur. b Tenez la pile en plaçant le “+” vers le haut et faites-la glisser sous les pattes de fixation situées du côté positif du connecteur. c Appuyez sur la pile pour l'engager dans le connecteur. 8 Réinstallez l'assemblage du protecteur de ventilation. Voir “Réinstallation de l'assemblage du protecteur de ventilation”, à la page 81. 9 Réinstallez le module PEM. Voir “Réinstallation du module PEM ou de son boîtier”, à la page 87. 10 Refermez le système. Voir “Fermeture du système”, à la page 77. 11 Rebranchez le système sur la prise secteur et allumez-le, ainsi que les périphériques connectés. 1 Côté positif du connecteur de pile 2 Pile du système 3 Côté négatif du connecteur de pile 2 3 1Installation des composants du système 133 12 Accédez au programme de configuration du système pour vérifier que la pile fonctionne correctement. Voir “Utilisation du programme de configuration du système”, à la page 49. 13 Entrez l'heure et la date exactes dans les champs Time (Heure) et Date du programme de configuration du système. 14 Quittez le programme de configuration du système. 15 Pour tester la pile qui vient d'être installée, éteignez le système et débranchez-le de la prise secteur pendant au moins une heure. 16 Une heure plus tard, rebranchez le système sur la prise secteur et allumezle. 17 Accédez au programme de configuration du système et, si l'heure et la date sont toujours incorrectes, consultez la section “Obtention d'aide”, à la page 203 pour savoir comment obtenir une assistance technique. Assemblage du panneau de commande Retrait du panneau de commande PRÉCAUTION : La plupart des réparations ne peuvent être effectuées que par un technicien de service agréé. Vous devez uniquement procéder aux dépannages et réparations simples autorisés dans le manuel de votre produit, ou selon les directives du service et du support en ligne ou téléphonique. Les dommages causés par des interventions de maintenance non autorisées par Dell ne sont pas couverts par votre garantie. Consultez et respectez les consignes de sécurité livrées avec le produit. 1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise secteur. 2 Ouvrez le système. Voir “Ouverture du système”, à la page 75. 3 Déconnectez le câble de données du panneau de commande en le retirant du connecteur dans lequel il est enfiché, sur la carte du panneau de commande. Voir figure 3-27. 4 En cas de remplacement du câble de données du panneau de commande, débranchez le câble du connecteur de la carte système (voir figure 6-1),, et sortez le câble des guides sur le châssis. 5 Déconnectez le câble du module d'affichage de la carte du panneau de commande. Voir figure 3-27.134 Installation des composants du système 6 Retirez les trois vis Torx qui fixent la carte du panneau de commande au châssis, puis retirez cette carte.Installation des composants du système 135 7 Retirez le module d'affichage : a Insérez le bout d'un trombone dans l'orifice situé sur le côté droit du module d'affichage, puis retirez doucement l'étiquette. b Retirez les deux vis Torx qui fixent le module d'affichage au châssis. 8 Retirez le module d'affichage. Figure 3-27. Retrait et installation du panneau de commande 1 Module d'affichage 2 Câble du module d'affichage 3 Carte du panneau de commande 4 Câble de la carte du panneau de commande 5 Vis de la carte du panneau de commande (3) 6 Étiquette du module d'affichage 7 Vis du module d'affichage (2) 3 4 5 6 7 1 2 136 Installation des composants du système Installation du panneau de commande 1 Insérez le module d'affichage du panneau de commande dans l'ouverture du châssis et fixez-le à l'aide des deux vis Torx. 2 Collez l'étiquette du panneau de commande sur le module d'affichage. 3 Installez la carte du panneau de commande dans le châssis et fixez-la à l'aide des trois vis Torx. Voir figure 3-27. 4 Enfichez le câble du module d'affichage dans la carte du panneau de commande. Voir figure 3-27. 5 Si le câble de données du panneau de commande n'est pas déjà branché sur la carte système, branchez ce câble au connecteur de panneau de commande sur la carte. Voir figure 6-1. 6 Enfichez le câble du panneau de commande dans la carte du panneau de commande, puis acheminez-le dans les guide-câbles du châssis. 7 Refermez le système. Voir “Fermeture du système”, à la page 77. 8 Réinstallez le cadre avant, le cas échéant. Voir “Retrait et réinstallation du cadre avant en option”, à la page 74. 9 Rebranchez le système sur la prise secteur et allumez-le, ainsi que les périphériques connectés. Commutateur d'intrusion du châssis Retrait du commutateur d'intrusion du châssis PRÉCAUTION : La plupart des réparations ne peuvent être effectuées que par un technicien de service agréé. Vous devez uniquement procéder aux dépannages et réparations simples autorisés dans le manuel de votre produit, ou selon les directives du service et du support en ligne ou téléphonique. Les dommages causés par des interventions de maintenance non autorisées par Dell ne sont pas couverts par votre garantie. Consultez et respectez les consignes de sécurité livrées avec le produit. 1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise secteur. 2 Ouvrez le système. Voir “Ouverture du système”, à la page 75. 3 Déconnectez le câble du commutateur d'intrusion enfiché sur la carte système. Voir figure 3-28.Installation des composants du système 137 4 Tirez doucement sur le commutateur d'intrusion pour le dégager de son clip. Figure 3-28. Retrait et installation du commutateur d'intrusion du châssis Installation du commutateur d'intrusion du châssis 1 Enfichez le câble du commutateur d'intrusion dans le connecteur approprié de la carte système. Voir figure 3-28. 2 Insérez le commutateur dans l'ouverture du châssis et appuyez dessus doucement jusqu'à ce qu'il soit correctement emboîté. Voir figure 3-28. 3 Refermez le système. Voir “Fermeture du système”, à la page 77. 1 Commutateur d'intrusion 2 Câble du commutateur d'intrusion 1 2138 Installation des composants du système 4 Rebranchez le système sur la prise secteur et allumez-le, ainsi que les périphériques connectés. Fond de panier SAS Retrait du fond de panier SAS PRÉCAUTION : La plupart des réparations ne peuvent être effectuées que par un technicien de service agréé. Vous devez uniquement procéder aux dépannages et réparations simples autorisés dans le manuel de votre produit, ou selon les directives du service et du support en ligne ou téléphonique. Les dommages causés par des interventions de maintenance non autorisées par Dell ne sont pas couverts par votre garantie. Consultez et respectez les consignes de sécurité livrées avec le produit. 1 Retirez le cadre, le cas échéant. Voir “Retrait et réinstallation du cadre avant en option”, à la page 74. 2 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise secteur. 3 Ouvrez le système. Voir “Ouverture du système”, à la page 75. 4 Retirez le module PEM. Voir “Retrait du module PEM ou de son boîtier”, à la page 83. 5 Retirez l'assemblage du protecteur de ventilation. Voir “Retrait de l'assemblage du protecteur de ventilation”, à la page 79. AVIS : Pour éviter d'endommager les lecteurs et le fond de panier, retirez du système les lecteurs SAS et le support du lecteur optique avant d'enlever le fond de panier. AVIS : Avant de retirer chaque disque dur, notez son numéro d'emplacement et étiquetez-le temporairement afin de pouvoir ensuite le réinstaller au même endroit. 6 Retirez tous les disques durs SAS. Voir “Retrait d'un disque dur enfichable à chaud”, à la page 123. 7 Pour retirer le support du lecteur optique, tirez le loquet d'éjection vers l'avant et extrayez le support du châssis. Voir figure 3-23. AVIS : Lorsque vous débranchez le câble du panneau de commande, maintenez la languette d'extraction blanche située près du connecteur correspondant afin d'éviter d'endommager le fond de panier SAS ou le câble.Installation des composants du système 139 8 Si vous retirez un fond de panier pour lecteurs 3,5 pouces, débranchez le câble du panneau de commande enfiché dans le connecteur situé à l'avant du fond de panier. Voir figure 3-29. 9 Déconnectez les câbles d'alimentation et de données SAS enfichés dans l'arrière du fond de panier SAS. 10 Retirez le fond de panier SAS du système : a Si vous retirez un fond de panier pour lecteurs 2,5 pouces, poussez la patte de fixation bleue vers l'avant du système, puis soulevez le fond de panier. Voir figure 3-29. Si vous retirez un fond de panier pour lecteurs 3,5 pouces, tirez le plot de fixation bleu pour l'écarter de l'avant du système, puis soulevez le fond de panier. Voir figure 3-30. b Lorsque le fond de panier est au niveau le plus haut possible, tirez-le vers l'arrière du système pour le dégager des crochets de fixation. c Retirez la carte du système, en prenant garde de ne pas endommager les composants situés sur celle-ci. d Posez le fond de panier SAS sur un plan de travail, face vers le bas.140 Installation des composants du système Figure 3-29. Retrait et installation d'un fond de panier SAS 2,5 pouces 1 Câble SAS A 2 Câble SAS B 3 Câble d'alimentation du fond de panier 4 Patte de fixation 2 4 3 1Installation des composants du système 141 Figure 3-30. Retrait et installation d'un fond de panier SAS 3,5 pouces 1 Plot de fixation 2 Fond de panier SAS 3 Connecteur du câble du panneau de commande 4 Fentes de fixation (7) 5 Fente d'alignement 5 4 3 1 2142 Installation des composants du système Installation d'un fond de panier SAS 1 Installez le fond de panier SAS : a Insérez doucement le fond de panier dans le système, en prenant garde de ne pas endommager ses composants. b Positionnez la fente d'alignement (au bas du fond de panier) sur le plot d'alignement situé au fond du châssis. Voir figure 3-30. c Emboîtez les fentes de fixation du fond de panier sur les crochets correspondants du châssis. d Abaissez le fond de panier jusqu'à ce que le plot de fixation bleu s'enclenche. 2 Enfichez le câble SAS, le câble d'interface et le câble d'alimentation dans le fond de panier SAS. 3 Enfichez le câble du panneau de commande dans l'avant du fond de panier SAS. 4 Remettez les disques durs SAS à leur emplacement d'origine. Voir “Disques durs”, à la page 120. 5 Installez le support du lecteur optique. Réinstallez le support dans la baie de lecteur et appuyez sur le loquet d'éjection. Voir figure 3-19. 6 Réinstallez l'assemblage du protecteur de ventilation. Voir “Réinstallation de l'assemblage du protecteur de ventilation”, à la page 81. 7 Réinstallez le module PEM. Voir “Réinstallation du module PEM ou de son boîtier”, à la page 87. 8 Refermez le système. Voir “Fermeture du système”, à la page 77. 9 Rebranchez le système sur la prise secteur et allumez-le, ainsi que les périphériques connectés.Installation des composants du système 143 Carte adaptatrice pour les périphériques Retrait d'une carte adaptatrice pour les périphériques PRÉCAUTION : Toute procédure d'installation nécessitant le retrait du capot du système doit être effectuée uniquement par des techniciens de maintenance qualifiés. Consultez le document Product Information Guide (Guide d'information sur le produit) pour obtenir des informations complètes sur les consignes de sécurité, les interventions dans l'ordinateur et la protection contre les décharges électrostatiques. 1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise secteur. 2 Ouvrez le système. Voir “Ouverture du système”, à la page 75. 3 Retirez le module PEM. Voir “Retrait du module PEM ou de son boîtier”, à la page 83. 4 Retirez l'assemblage du protecteur de ventilation. Voir “Retrait de l'assemblage du protecteur de ventilation”, à la page 79. 5 Déconnectez le câble de données SAS et le câble d'alimentation enfichés dans l'arrière du fond de panier SAS. Voir figure 3-29 ou figure 3-30. 6 Retirez le câble d'alimentation du dessus de la carte adaptatrice pour les périphériques. Voir figure 3-31. AVIS : Lorsque vous débranchez le câble du panneau de commande, maintenez la languette d'extraction située près du connecteur correspondant afin d'éviter d'endommager la carte adaptatrice ou le câble. 7 Retirez le câble du panneau de commande du connecteur dans lequel il est enfiché, à l'arrière de la carte adaptatrice. Voir figure 3-31. 8 Retirez le câble d'interface planaire du connecteur dans lequel il est enfiché, à l'arrière de la carte adaptatrice. 9 Retirez le câble SATA du connecteur dans lequel il est enfiché, à l'arrière de la carte adaptatrice.144 Installation des composants du système Figure 3-31. Retrait et installation de la carte adaptatrice pour les périphériques 1 Câble d'alimentation (connecté au fond de panier) 2 Câble du panneau de commande 3 Câble d'alimentation (connecté à la carte de distribution de l'alimentation) 4 Câble d'interface planaire 5 Patte de fixation 3 1 2 4 5Installation des composants du système 145 10 Retirez la carte adaptatrice pour les périphériques : a Appuyez sur la patte de fixation bleue et soulevez la carte. Voir figure 3-31. b Lorsque la carte est au niveau le plus haut possible, tirez-la vers l'arrière du système pour la dégager des crochets de fixation. c Retirez la carte du système, en prenant garde de ne pas endommager les composants situés sur celle-ci. d Posez la carte adaptatrice sur un plan de travail, face vers le bas. Remplacement d'une carte adaptatrice pour les périphériques 1 Installez la carte adaptatrice pour les périphériques : a Insérez doucement la carte adaptatrice dans le système, en prenant garde de ne pas endommager ses composants. Voir figure 3-31. b Positionnez la fente d'alignement (au bas de la carte adaptatrice) sur le plot d'alignement situé au fond du châssis. c Emboîtez les fentes de fixation de la carte adaptatrice sur les crochets correspondants du châssis. d Abaissez la carte jusqu'à ce que la patte de fixation bleue s'enclenche. 2 Enfichez le câble SATA, le câble d'interface planaire et le câble du panneau de commande dans l'arrière de la carte adaptatrice. Voir figure 3-31. 3 Enfichez le câble d'alimentation sur le dessus de la carte adaptatrice. 4 Reconnectez le câble SAS et le câble d'alimentation du fond de panier à l'arrière du fond de panier SAS. Voir figure 3-29 ou figure 3-30. 5 Réinstallez l'assemblage du protecteur de ventilation. Voir “Réinstallation de l'assemblage du protecteur de ventilation”, à la page 81. 6 Réinstallez le module PEM. Voir “Réinstallation du module PEM ou de son boîtier”, à la page 87. 7 Refermez le système. Voir “Fermeture du système”, à la page 77. 8 Rebranchez le système sur la prise secteur et allumez-le, ainsi que les périphériques connectés.146 Installation des composants du système Carte adaptatrice pour les ventilateurs Retrait d'une carte adaptatrice pour les ventilateurs PRÉCAUTION : La plupart des réparations ne peuvent être effectuées que par un technicien de service agréé. Vous devez uniquement procéder aux dépannages et réparations simples autorisés dans le manuel de votre produit, ou selon les directives du service et du support en ligne ou téléphonique. Les dommages causés par des interventions de maintenance non autorisées par Dell ne sont pas couverts par votre garantie. Consultez et respectez les consignes de sécurité livrées avec le produit. 1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise secteur. 2 Ouvrez le système. Voir “Ouverture du système”, à la page 75. AVIS : Pour éviter d'endommager les lecteurs et le fond de panier, retirez du système les lecteurs SAS et le support du lecteur optique avant d'enlever le fond de panier. Avant de retirer chaque disque dur, notez son numéro d'emplacement et étiquetez-le temporairement afin de pouvoir ensuite le réinstaller au même endroit. 3 Pour retirer le support du lecteur optique, tirez le loquet d'éjection vers l'avant et extrayez le support du châssis. Voir figure 3-23. 4 Retirez les ventilateurs 1 et 3 ou 2 et 4, selon la carte adaptatrice à remplacer. Voir “Retrait d'un ventilateur”, à la page 77. 5 Retirez le fond de panier SAS (systèmes avec disques durs 3,5 pouces) ou la carte adaptatrice pour les périphériques (systèmes avec disques durs 2,5 pouces). Voir “Fond de panier SAS”, à la page 138 ou “Carte adaptatrice pour les périphériques”, à la page 143. 6 Retirez les deux vis, puis enlevez la carte adaptatrice pour les ventilateurs. Voir figure 3-32.Installation des composants du système 147 Figure 3-32. Retrait et installation d'une carte adaptatrice pour les ventilateurs 1 Vis (2) 2 Carte adaptatrice pour les ventilateurs 3 Pattes (2) 4 Fentes (2) 2 4 3 1148 Installation des composants du système Installation d'une carte adaptatrice pour les ventilateurs 1 Insérez les deux pattes de fixation de la carte adaptatrice dans les fentes correspondantes, sur le côté de la baie de ventilateurs. Voir figure 3-32. 2 Fixez la carte adaptatrice à l'aide des deux vis. 3 Réinstallez le fond de panier SAS (systèmes avec disques durs 3,5 pouces) ou la carte adaptatrice pour les périphériques (systèmes avec disques durs 2,5 pouces). Voir “Fond de panier SAS”, à la page 138 ou “Carte adaptatrice pour les périphériques”, à la page 143. 4 Installez les ventilateurs. Voir “Réinstallation d'un ventilateur”, à la page 79. 5 Installez le support du lecteur optique. Réinstallez le support dans la baie de lecteur et appuyez sur le loquet d'éjection. Voir figure 3-19. 6 Remettez les disques durs SAS à leur emplacement d'origine. Voir “Installation d'un disque dur enfichable à chaud”, à la page 124. 7 Refermez le système. Voir “Fermeture du système”, à la page 77. 8 Rebranchez le système sur la prise secteur et allumez-le, ainsi que les périphériques connectés.Installation des composants du système 149 Carte système Retrait de la carte système PRÉCAUTION : La plupart des réparations ne peuvent être effectuées que par un technicien de service agréé. Vous devez uniquement procéder aux dépannages et réparations simples autorisés dans le manuel de votre produit, ou selon les directives du service et du support en ligne ou téléphonique. Les dommages causés par des interventions de maintenance non autorisées par Dell ne sont pas couverts par votre garantie. Consultez et respectez les consignes de sécurité livrées avec le produit. 1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise secteur. 2 Ouvrez le système. Voir “Ouverture du système”, à la page 75. 3 Retirez le module PEM. Voir “Retrait du module PEM ou de son boîtier”, à la page 83. 4 Retirez l'assemblage du protecteur de ventilation. Voir “Retrait de l'assemblage du protecteur de ventilation”, à la page 79. 5 Retirez toutes les cartes d'extension, ainsi que la carte contrôleur SAS. Voir “Retrait d'une carte d'extension”, à la page 91. 6 Le cas échéant, déconnectez puis retirez la carte RAC. 7 Le cas échéant, retirez la clé de mémoire USB et la carte SD. 8 Le cas échéant, retirez la clé TOE/iSCSI. 9 Retirez la carte de montage. Voir “Retrait de la carte de montage”, à la page 92. 10 Retirez la carte réseau fille. Voir “Retrait de la carte réseau fille”, à la page 104. 11 Retirez tous les câbles enfichés sur la carte système. 12 Retirez le compartiment de la batterie RAID : a Relevez le levier puis soulevez doucement le compartiment de la batterie. Voir figure 3-33. b Soulevez le compartiment de la batterie pour le retirer du côté du châssis. 150 Installation des composants du système Figure 3-33. Retrait et installation du compartiment de la batterie RAID 13 Retirez la carte système : a Tirez sur le plot de fixation bleu situé au milieu de la carte système, puis faites glisser cette dernière vers l'avant du châssis jusqu'à ce qu'elle bute. Voir figure 3-34. b Saisissez la carte système en la tenant par les dissipateurs de chaleur ou la carte de montage. Ne tenez pas les coins de la carte car vous risqueriez de la tordre. c Soulevez la carte système doucement et sans à-coups pour la dégager de tous les crochets de fixation. d Continuez à soulever la carte système pour la retirer du châssis. 1 Compartiment de la batterie RAID 2 Patte d'éjection 3 Pattes de fixation (2) 4 Fentes de fixation (2) 2 1 3 4Installation des composants du système 151 Figure 3-34. Retrait et installation de la carte système 1 Plot de fixation 2 Carte système 3 Crochet de fixation 1 2 3152 Installation des composants du système Installation de la carte système 1 Transférez les processeurs et les dissipateurs de chaleur sur la nouvelle carte système. Voir “Retrait d'un processeur”, à la page 113 et “Installation d'un processeur”, à la page 116. 2 Retirez les barrettes de mémoire de l'ancienne carte et installez-les sur la nouvelle, aux mêmes emplacements. Voir “Retrait de barrettes de mémoire”, à la page 111 et “Installation de barrettes de mémoire”, à la page 109. 3 Transférez la carte de montage sur la nouvelle carte système. Voir “Retrait de la carte de montage”, à la page 92 et “Réinstallation du module PEM ou de son boîtier”, à la page 87. 4 Installez la nouvelle carte système : a Tenez la carte système par les dissipateurs de chaleur et faites descendre son côté droit dans le châssis. b Faites doucement descendre le côté gauche de la carte dans le châssis. REMARQUE : Vérifiez que les câbles d'alimentation reliés à la carte de distribution de l'alimentation ne gênent pas l'installation de la carte lors de son insertion dans le châssis. c Relevez légèrement l'avant de la carte système et posez-la de façon qu'elle repose totalement sur le fond du châssis. d Vérifiez que tous les crochets de fixation situés au fond du châssis sont correctement insérés dans les fentes de fixation correspondantes de la carte système. Voir figure 3-34. e Poussez la carte système vers l'arrière du châssis jusqu'à ce que le plot de fixation bleu s'enclenche. 5 Le cas échéant, réinstallez la clé USB interne, la carte SD et la clé TOE/iSCSI. 6 Installez le compartiment de la batterie RAID : a Insérez les deux pattes de fixation situées sur le compartiment de la batterie dans les fentes correspondantes, sur le côté du châssis. Voir figure 3-33. b Appuyez sur le compartiment de la batterie pour le mettre en place. Installation des composants du système 153 7 Branchez les câbles dans l'ordre indiqué ci-dessous (voir figure 6-1 et figure 6-3 pour identifier l'emplacement des connecteurs sur la carte système et sur le fond de panier SAS) : • Trois câbles de distribution de l'alimentation • Câble d'alimentation SAS (à enficher sur le connecteur d'alimentation du fond de panier SAS) • Câble du commutateur d'intrusion du châssis • Câble d'interface SATA 8 Installez toutes les cartes d'extension. Voir “Installation d'une carte d'extension”, à la page 89. 9 Réinstallez la carte contrôleur SAS. Voir “Installation d'une carte contrôleur SAS”, à la page 127. 10 Le cas échéant, reconnectez le câble de la batterie RAID sur la carte contrôleur SAS. 11 Le cas échéant, réinstallez et connectez la carte RAC. Voir “Installation d'une carte RAC en option”, à la page 94. 12 Réinstallez la carte réseau fille. Voir “Installation de la carte réseau fille”, à la page 101. 13 Installez le support du lecteur optique. Réinstallez le support dans la baie de lecteur et appuyez sur le loquet d'éjection. Voir figure 3-19. 14 Remettez les disques durs SAS à leur emplacement d'origine. Voir “Installation d'un disque dur enfichable à chaud”, à la page 124. 15 Réinstallez la carte de montage. 16 Réinstallez l'assemblage du protecteur de ventilation. Voir “Réinstallation de l'assemblage du protecteur de ventilation”, à la page 81. 17 Réinstallez le module PEM. 18 Refermez le système. Voir “Fermeture du système”, à la page 77. 19 Rebranchez le système sur la prise secteur et allumez-le, ainsi que les périphériques connectés. 20 Réinstallez le cadre. Voir “Retrait et réinstallation du cadre avant en option”, à la page 74.154 Installation des composants du système Carte de distribution de l'alimentation Retrait de la carte de distribution de l'alimentation PRÉCAUTION : La plupart des réparations ne peuvent être effectuées que par un technicien de service agréé. Vous devez uniquement procéder aux dépannages et réparations simples autorisés dans le manuel de votre produit, ou selon les directives du service et du support en ligne ou téléphonique. Les dommages causés par des interventions de maintenance non autorisées par Dell ne sont pas couverts par votre garantie. Consultez et respectez les consignes de sécurité livrées avec le produit. 1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise secteur. 2 Ouvrez le système. Voir “Ouverture du système”, à la page 75. 3 Retirez les blocs d'alimentation. Voir “Retrait d'un bloc d'alimentation”, à la page 81. 4 Retirez la carte système. Voir “Retrait de la carte système”, à la page 149. 5 Retirez les sept vis de fixation de la carte. Voir figure 3-35. 6 Soulevez la carte de distribution de l'alimentation pour la retirer du châssis.Installation des composants du système 155 Figure 3-35. Retrait et installation de la carte de distribution de l'alimentation 1 Fentes de fixation (3) 2 Carte de distribution de l'alimentation 3 Vis (7) 4 Pattes de fixation (3) 1 4 3 2156 Installation des composants du système Installation de la carte de distribution de l'alimentation 1 Alignez les trois fentes de fixation de la carte de distribution de l'alimentation avec les trois pattes correspondantes situées au fond du châssis. Voir figure 3-35. 2 Fixez la carte à l'aide des sept vis. 3 Installez la carte système. Voir la procédure décrite de l'étape 4 à l'étape 14 dans la section “Installation de la carte système”. 4 Installez les blocs d'alimentation. Voir “Réinstallation d'un bloc d'alimentation”, à la page 82. 5 Refermez le système. Voir “Fermeture du système”, à la page 77. 6 Rebranchez le système sur la prise secteur et allumez-le, ainsi que les périphériques connectés. Carte du module d'extension processeurs Retrait de la carte du module PEM 1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise secteur. 2 Ouvrez le système. Voir “Ouverture du système”, à la page 75. 3 Retirez le module PEM. Voir “Retrait du module PEM ou de son boîtier”, à la page 83. 4 Retirez le protecteur de ventilation du module PEM. Voir figure 3-9. 5 Retirez la carte du module PEM : a Tirez sur le plot de fixation bleu situé au centre de la carte du module PEM, puis faites glisser cette dernière vers l'avant du boîtier du module PEM jusqu'à ce qu'elle bute. Voir figure 3-34. b Soulevez la carte pour la retirer du boîtier du module PEM.Installation des composants du système 157 Figure 3-36. Retrait et installation de la carte du module PEM 1 Plot de fixation 2 Carte du module PEM 3 Boîtier du module PEM 4 Fentes de fixation 5 Crochets de fixation 2 1 3 4 5158 Installation des composants du système Remplacement de la carte du module PEM 1 Installez la nouvelle carte du module PEM : a Faites descendre la carte dans le boîtier du module PEM. b Vérifiez que la carte est totalement parallèle avec le fond du boîtier du module PEM et que tous les crochets de fixation situés au fond du boîtier passent dans les fentes de fixation de la carte. Voir figure 3-34. c Poussez la carte vers l'arrière du boîtier jusqu'à ce que le plot de fixation bleu s'enclenche. 2 Transférez les processeurs et les dissipateurs de chaleur sur la nouvelle carte du module PEM. Voir “Retrait d'un processeur”, à la page 113 et “Installation d'un processeur”, à la page 116. 3 Retirez les barrettes de mémoire de l'ancienne carte et installez-les sur la nouvelle, aux mêmes emplacements. Voir “Retrait de barrettes de mémoire”, à la page 111 et “Installation de barrettes de mémoire”, à la page 109. 4 Réinstallez le protecteur de ventilation du module PEM. Voir figure 3-9. 5 Réinstallez le module PEM dans le châssis du système.Installation des composants du système 159160 Installation des composants du systèmeDépannage du système 161 Dépannage du système La sécurité d'abord, pour vous et pour le système Pour effectuer certaines des procédures décrites ici, vous devez retirer le capot du système et intervenir à l'intérieur. Lorsque vous intervenez sur le système, suivez strictement les opérations décrites dans ce guide ou dans une autre documentation accompagnant le système. PRÉCAUTION : La plupart des réparations ne peuvent être effectuées que par un technicien de service agréé. Vous devez uniquement procéder aux dépannages et réparations simples autorisés dans le manuel de votre produit, ou selon les directives du service et du support en ligne ou téléphonique. Les dommages causés par des interventions de maintenance non autorisées par Dell ne sont pas couverts par votre garantie. Consultez et respectez les consignes de sécurité livrées avec le produit. Routine de démarrage Écoutez et observez le système pendant la procédure de démarrage, pour repérer les symptômes décrits tableau 4-1. Tableau 4-1. Indications fournies par la procédure de démarrage Symptôme Action L'écran LCD du panneau avant affiche un message d'état ou d'erreur. voir “Messages d'état affichés sur l'écran LCD”, à la page 22. Un message d'erreur est affiché sur le moniteur. voir “Messages système”, à la page 37. Messages d'alerte du logiciel de gestion de systèmes. Consultez la documentation du logiciel de gestion de systèmes. Comportement du voyant d'alimentation du moniteur. voir “Dépannage du sous-système vidéo”, à la page 163. Comportement des voyants du clavier. voir “Dépannage du clavier ou de la souris”, à la page 164.162 Dépannage du système Vérification des incidents simples liés à l'alimentation 1 Si le voyant d'alimentation situé sur le panneau avant du système ou sur les blocs d'alimentation n'indique pas que le système est alimenté en électricité, vérifiez que les câbles d'alimentation sont correctement emboîtés sur les blocs d'alimentation. 2 Si le système est connecté à un module PDU ou à un onduleur, éteignez ce dernier puis rallumez-le. 3 Si le module PDU ou l'onduleur ne reçoit pas de courant, branchez-le sur une autre prise secteur. Si l'incident persiste, essayez d'utiliser un autre module PDU ou onduleur. 4 Rebranchez le système sur la prise secteur et allumez-le. Si le système ne fonctionne toujours pas normalement, voir “Dépannage des blocs d'alimentation”, à la page 173. Comportement du voyant d'activité du lecteur de CD USB. voir “Dépannage d'un périphérique USB”, à la page 167. Comportement du voyant d'activité du lecteur de CD. voir “Dépannage d'un lecteur optique”, à la page 178. Comportement du voyant d'activité du disque dur. voir “Dépannage d'un disque dur”, à la page 179. Un bruit inhabituel de raclement ou de grincement constant se produit lorsque vous accédez à un disque. voir “Obtention d'aide”, à la page 203. Tableau 4-1. Indications fournies par la procédure de démarrage (suite) Symptôme ActionDépannage du système 163 Vérification du matériel Cette section contient les procédures de dépannage des périphériques externes directement connectés au système, comme le moniteur, le clavier ou la souris. Avant de suivre l'une de ces procédures, voir “Dépannage des connexions externes”, à la page 163. Dépannage des connexions externes Le plus souvent, les incidents liés au système, au moniteur et aux autres périphériques (comme une imprimante, un clavier, une souris ou un autre périphérique externe) sont causés par des câbles mal raccordés ou débranchés. Vérifiez que tous les câbles externes sont correctement enfichés dans les connecteurs externes correspondants. Voir “Voyants et caractéristiques du panneau avant”, à la page 14 et “Voyants et caractéristiques du panneau arrière”, à la page 18 pour identifier les connecteurs des panneaux avant et arrière du système. Dépannage du sous-système vidéo Incident • Le moniteur ne fonctionne pas correctement. • La mémoire vidéo est défectueuse. Action 1 Vérifiez les branchements du moniteur (prise secteur et raccordement au système). 2 Déterminez si le système contient une carte d'extension équipée d'un connecteur de sortie vidéo. Si tel est le cas, le câble du moniteur doit être branché sur le connecteur de la carte d'extension, et non sur le connecteur vidéo intégré du système. Pour vérifier que le moniteur est relié au connecteur approprié, mettez le système hors tension, attendez une minute, puis reliez le moniteur à l'autre connecteur vidéo. Remettez ensuite le système sous tension.164 Dépannage du système 3 Vérifiez si des moniteurs sont reliés à la fois au connecteur vidéo avant et au connecteur vidéo arrière du système Le système prend en charge un seul moniteur, qui doit être connecté soit à l'avant, soit à l'arrière du système. Si un moniteur est connecté au panneau avant, le connecteur vidéo arrière est désactivé. Si deux moniteurs sont reliés au système, déconnectez-en un. Si l'incident persiste, passez à l'étape suivante. 4 Exécutez le test de diagnostic en ligne approprié. Voir “Utilisation de Dell PowerEdge Diagnostics”, à la page 189. Si le test aboutit, l'incident n'est pas lié au matériel vidéo. Si le test échoue, voir “Obtention d'aide”, à la page 203. Dépannage du clavier ou de la souris Incident • Un message système signale un incident lié à la souris et/ou au clavier. • Le clavier et/ou la souris ne fonctionne pas correctement ou pas du tout. Action 1 Déconnectez du système le câble du clavier et celui de la souris, attendez une dizaine de secondes, puis reconnectez-les. Si l'incident persiste, passez à l'étape suivante. 2 Essayez de connecter le clavier/la souris aux ports USB situés sur le côté opposé du système. Par exemple, si vous utilisez les ports USB avant, essayez d'utiliser les ports USB arrière. Si l'incident persiste, passez à l'étape suivante. Si l'incident est résolu, redémarrez le système, accédez au programme de configuration du système et vérifiez que les ports USB défectueux sont activés. Si les ports sont activés mais ne fonctionnent pas, voir “Obtention d'aide”, à la page 203. 3 Remplacez le clavier ou la souris qui ne fonctionne pas par un clavier ou une souris fiable. Si l'incident est résolu, remplacez le clavier ou la souris. Dépannage du système 165 4 Si d'autres périphériques USB sont enfichés dans les ports situés près de ceux utilisés pour le clavier et la souris, éteignez ces périphériques et déconnectez-les du système. Si une surtension se produit sur un autre périphérique USB, le clavier et la souris peuvent cesser de fonctionner. Si le clavier et la souris ne fonctionnent toujours pas alors que vous avez déconnecté les autres périphériques USB, redémarrez le système. Si l'incident persiste, passez à l'étape suivante. Si le clavier et la souris sont de nouveau fonctionnels, reconnectez les autres périphériques USB et allumez-les, un à la fois. Vérifiez si l'un de ces périphériques provoque le même incident et remplacez-le, le cas échéant. 5 Si vous pouvez accéder au système via une connexion à distance, utilisez un hôte distant pour accéder au programme de configuration du système et activer les ports USB. Si vous ne disposez pas d'une connexion à distance, passez à l'étape suivante. Si l'activation des ports USB ne résout pas le problème, voir “Obtention d'aide”, à la page 203. 6 Si vous ne pouvez pas accéder au système via une connexion à distance, utilisez la procédure suivante pour régler le cavalier NVRAM_CLR du système et restaurer les paramètres par défaut du BIOS. PRÉCAUTION : La plupart des réparations ne peuvent être effectuées que par un technicien de service agréé. Vous devez uniquement procéder aux dépannages et réparations simples autorisés dans le manuel de votre produit, ou selon les directives du service et du support en ligne ou téléphonique. Les dommages causés par des interventions de maintenance non autorisées par Dell ne sont pas couverts par votre garantie. Consultez et respectez les consignes de sécurité livrées avec le produit. a Éteignez le système et les périphériques connectés, puis débranchez le système de la source d'alimentation. b Ouvrez le système. Voir “Ouverture du système”, à la page 75. c Identifiez le cavalier NVRAM_CLR sur la carte système (voir “Cavaliers de la carte système”, à la page 193) et mettez-le sur la position d'activation. d Refermez le système. Voir “Fermeture du système”, à la page 77.166 Dépannage du système e Rebranchez le système sur la prise secteur, ainsi que les périphériques, puis redémarrez-le. Si le clavier et la souris fonctionnent correctement, passez à l'étape suivante. Si le clavier et la souris ne fonctionnent toujours pas correctement, voir “Obtention d'aide”, à la page 203. f Recommencez l'étape 2 et l'étape b. g Placez le cavalier NVRAM_CLR sur la position de désactivation. h Refermez le système. i Rebranchez le système sur la prise secteur et allumez-le, ainsi que les périphériques connectés. j Accédez au programme de configuration du système et redéfinissez les paramètres du BIOS dont la valeur par défaut a été rétablie. Veillez à ne désactiver aucun port USB. Dépannage des incidents liés aux E/S série Incident • Un message d'erreur indique un problème lié à un port série. • Un périphérique connecté à un port série ne fonctionne pas correctement. Action 1 Accédez au programme de configuration du système et vérifiez que le port série est activé et correctement configuré pour l'application concernée. Voir “Utilisation du programme de configuration du système”, à la page 49. 2 Si l'incident affecte uniquement une application particulière, consultez sa documentation pour connaître la configuration requise pour les différents ports. 3 Exécutez le test de diagnostic en ligne approprié. Voir “Utilisation de Dell PowerEdge Diagnostics”, à la page 189. Si l'incident persiste alors que les tests ont abouti, voir “Dépannage d'un périphérique d'E/S série”.Dépannage du système 167 Dépannage d'un périphérique d'E/S série Incident • Le périphérique connecté au port série ne fonctionne pas correctement. Action 1 Éteignez le système et les périphériques connectés au port série. 2 Remplacez le câble d'interface série par un câble fiable, puis allumez le système et le périphérique série. Si l'incident est résolu, remplacez le câble d'interface. 3 Éteignez le système et le périphérique série, puis remplacez ce dernier par un périphérique similaire. 4 Allumez le système et le périphérique série. Si l'incident est résolu, remplacez le périphérique série. Voir “Obtention d'aide”, à la page 203. Si l'incident persiste, voir “Obtention d'aide”, à la page 203. Dépannage d'un périphérique USB Incident • Un message du système indique un problème de périphérique USB. • Un ou plusieurs périphériques USB ne fonctionnent pas correctement. Action 1 Si l'incident affecte un seul périphérique USB, effectuez la procédure suivante. Si plusieurs périphériques USB sont concernés, passez à l'étape 2. a Éteignez le périphérique USB, déconnectez le câble USB du système pendant quelques secondes, puis reconnectez-le. b Redémarrez le système, accédez au programme de configuration du système et vérifiez que tous les ports USB sont activés. Voir “Utilisation du programme de configuration du système”, à la page 49.168 Dépannage du système c Éteignez le périphérique USB et remplacez son câble d'interface par un câble fiable. Allumez le périphérique. Si l'incident est résolu, remplacez le câble d'interface. d Éteignez le périphérique USB, branchez-le sur un autre port USB du système et rallumez-le. Si le périphérique USB fonctionne, le port USB du système est probablement défectueux. Sinon, le périphérique USB est défectueux et doit être remplacé. Voir “Obtention d'aide”, à la page 203. 2 Éteignez tous les périphériques USB et déconnectez-les du système, à l'exception du clavier et de la souris USB. 3 Redémarrez le système et reconnectez les périphériques USB. Si l'incident est résolu, il était probablement lié à une surtension intervenue sur l'un de ces périphériques USB. Si l'incident persiste, essayez d'identifier le périphérique défectueux en testant différentes configurations USB. Si l'incident persiste, passez à l'étape suivante. 4 Modifiez le réglage du cavalier NVRAM_CLR pour rétablir le paramétrage par défaut du BIOS. Utilisez la procédure suivante. PRÉCAUTION : La plupart des réparations ne peuvent être effectuées que par un technicien de service agréé. Vous devez uniquement procéder aux dépannages et réparations simples autorisés dans le manuel de votre produit, ou selon les directives du service et du support en ligne ou téléphonique. Les dommages causés par des interventions de maintenance non autorisées par Dell ne sont pas couverts par votre garantie. Consultez et respectez les consignes de sécurité livrées avec le produit. a Éteignez le système et les périphériques connectés, puis débranchez le système de la source d'alimentation. b Ouvrez le système. Voir “Ouverture du système”, à la page 75. c Identifiez le cavalier NVRAM_CLR sur la carte système (voir Figure 6-1) et mettez-le sur la position d'activation. d Refermez le système. Voir “Fermeture du système”, à la page 77.Dépannage du système 169 e Rebranchez le système sur la prise secteur, ainsi que les périphériques, puis redémarrez-le. Si tous les périphériques USB sont opérationnels, passez à l'étape suivante. Si les périphériques USB ne fonctionnent toujours pas, voir “Obtention d'aide”, à la page 203. f Recommencez l'étape 2 et l'étape b. g Placez le cavalier NVRAM_CLR sur la position de désactivation. h Refermez le système. i Rebranchez le système sur la prise secteur, ainsi que les périphériques, puis redémarrez-le. j Accédez au programme de configuration du système et redéfinissez les paramètres du BIOS dont la valeur par défaut a été rétablie. Veillez à ne désactiver aucun port USB. Voir “Utilisation du programme de configuration du système”, à la page 49. Si l'incident persiste, voir “Obtention d'aide”, à la page 203. Dépannage d'un NIC Incident • Le NIC ne parvient pas à communiquer avec le réseau. Action 1 Exécutez le test de diagnostic en ligne approprié. Voir “Exécution des diagnostics du système”, à la page 189. 2 Observez le voyant approprié du connecteur de NIC. Voir “Codes des voyants de NIC”, à la page 21. • Si le voyant de lien ne s'allume pas, vérifiez toutes les connexions des câbles. • Si le voyant d'activité ne s'allume pas, les fichiers des pilotes réseau sont peut-être altérés ou manquants. Désinstallez puis réinstallez les pilotes, le cas échéant. Consultez la documentation du NIC.170 Dépannage du système • Si possible, modifiez le paramétrage de négociation automatique. • Utilisez un autre connecteur sur le commutateur ou le concentrateur. Si vous utilisez une carte réseau au lieu d'un NIC intégré, consultez la documentation fournie avec celle-ci. 3 Vérifiez que les pilotes appropriés sont installés et que les protocoles sont liés. Consultez la documentation du NIC. 4 Accédez au programme de configuration du système et vérifiez que les interfaces réseau sont activées. Voir “Utilisation du programme de configuration du système”, à la page 49. 5 Vérifiez que les NIC, les concentrateurs et les commutateurs du réseau sont tous réglés sur la même vitesse de transmission des données. Consultez la documentation du matériel réseau. 6 Vérifiez que tous les câbles réseau sont du type approprié et qu'ils ne dépassent pas la longueur maximum. Voir le câblage réseau requis dans le document Getting Started Guide (Guide de mise en route). Dépannage d'un système mouillé Incident • Système mouillé. • Excès d'humidité. Action PRÉCAUTION : La plupart des réparations ne peuvent être effectuées que par un technicien de service agréé. Vous devez uniquement procéder aux dépannages et réparations simples autorisés dans le manuel de votre produit, ou selon les directives du service et du support en ligne ou téléphonique. Les dommages causés par des interventions de maintenance non autorisées par Dell ne sont pas couverts par votre garantie. Consultez et respectez les consignes de sécurité livrées avec le produit. 1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise secteur. 2 Ouvrez le système. Voir “Ouverture et fermeture du système”, à la page 75.Dépannage du système 171 3 Retirez toutes les cartes d'extension du système. Voir “Retrait d'une carte d'extension”, à la page 91. 4 Laissez le système sécher complètement pendant au moins 24 heures. 5 Refermez le système. Voir “Ouverture et fermeture du système”, à la page 75. 6 Rebranchez le système sur la prise secteur et allumez-le, ainsi que les périphériques connectés. Si le système ne démarre pas normalement, voir “Obtention d'aide”, à la page 203. 7 Si le système démarre normalement, arrêtez-le et réinstallez les cartes d'extension que vous avez retirées. Voir “Installation d'une carte d'extension”, à la page 89. 8 Exécutez le test de diagnostic en ligne approprié. Voir “Utilisation de Dell PowerEdge Diagnostics”, à la page 189. Si le test échoue, voir “Obtention d'aide”, à la page 203. Dépannage d'un système endommagé Incident • Le système est tombé ou a été endommagé. Action PRÉCAUTION : La plupart des réparations ne peuvent être effectuées que par un technicien de service agréé. Vous devez uniquement procéder aux dépannages et réparations simples autorisés dans le manuel de votre produit, ou selon les directives du service et du support en ligne ou téléphonique. Les dommages causés par des interventions de maintenance non autorisées par Dell ne sont pas couverts par votre garantie. Consultez et respectez les consignes de sécurité livrées avec le produit. 1 Ouvrez le système. Voir “Ouverture et fermeture du système”, à la page 75. 2 Assurez-vous que les composants suivants sont correctement installés : • Cartes d'extension • Blocs d'alimentation • Ventilateurs172 Dépannage du système • Processeurs et dissipateurs de chaleur • Barrettes de mémoire • Connexions des supports de lecteurs sur la carte de fond de panier 3 Vérifiez que tous les câbles sont correctement connectés. 4 Refermez le système. Voir “Ouverture et fermeture du système”, à la page 75. 5 Lancez les tests System board (Carte système) des diagnostics du système. Voir “Utilisation de Dell PowerEdge Diagnostics”, à la page 189. Si les tests échouent, voir “Obtention d'aide”, à la page 203. Dépannage de la pile du système Incident • Un message du système indique un problème de pile. • Le programme de configuration du système perd les informations. • La date et l'heure du système se dérèglent constamment. REMARQUE : Si le système reste éteint longtemps (pendant des semaines ou des mois), la NVRAM peut perdre les informations de configuration. Cette situation est causée par une pile défectueuse. Action 1 Entrez de nouveau l'heure et la date dans le programme de configuration du système. Voir “Utilisation du programme de configuration du système”, à la page 49. 2 Éteignez et débranchez le système de la prise secteur pendant au moins une heure. 3 Rebranchez le système sur la prise secteur et allumez-le. 4 Accédez au programme de configuration du système. Si la date et l'heure du programme de configuration du système ne sont pas correctes, remplacez la pile. Voir “Pile du système”, à la page 131. Si l'incident persiste lorsque vous remplacez la pile, voir “Obtention d'aide”, à la page 203.Dépannage du système 173 REMARQUE : Certains logiciels peuvent provoquer une accélération ou un ralentissement de l'heure système. Si le système semble fonctionner normalement à l'exception de l'heure qui est conservée dans le programme de configuration du système, l'incident peut être causé par un logiciel plutôt que par une pile défectueuse. Dépannage des blocs d'alimentation Incident • Les voyants d'état du système sont orange. • Les voyants de panne des blocs d'alimentation sont orange. • L'écran LCD du panneau avant indique qu'un incident lié aux blocs d'alimentation s'est produit. Action 1 Déterminez l'emplacement du bloc d'alimentation défectueux. Le voyant de panne du bloc d'alimentation est allumé. Voir “Codes du voyant d'alimentation”, à la page 19. AVIS : Les blocs d'alimentation sont enfichables à chaud. Le système ne peut fonctionner que si au moins un bloc d'alimentation est installé ; il est en mode redondant si deux blocs d'alimentation sont installés. Ne retirez et ne remplacez qu'un seul bloc d'alimentation à la fois dans un système sous tension. Le système risque de surchauffer si vous l'utilisez pendant une période prolongée avec un seul bloc d'alimentation. 2 Retirez le bloc d'alimentation défectueux. Voir “Blocs d'alimentation”, à la page 81. 3 Retirez et réinstallez le bloc d'alimentation pour vous assurer qu'il est bien en place. Voir “Blocs d'alimentation”, à la page 81. REMARQUE : Après avoir installé un nouveau bloc d'alimentation, patientez plusieurs secondes pour laisser au système le temps de le reconnaître et de déterminer s'il fonctionne correctement. Le voyant d'alimentation s'allume en vert si le bloc d'alimentation fonctionne normalement. Voir “Codes du voyant d'alimentation”, à la page 19. Si l'incident persiste, voir “Obtention d'aide”, à la page 203.174 Dépannage du système Dépannage des problèmes de refroidissement du système Incident • Le logiciel de gestion de systèmes a émis un message d'erreur concernant les ventilateurs. Action Vérifiez qu'aucune des conditions suivantes n'est présente : • Le capot du système, le protecteur de ventilation, un cache de lecteur ou une plaque de recouvrement avant ou arrière a été retiré. • La température ambiante est trop élevée. • La circulation de l'air extérieur est bloquée. • Les câbles à l'intérieur du système gênent la ventilation. • Un ventilateur a été retiré ou est en panne. Voir “Dépannage d'un ventilateur”, à la page 174. Dépannage d'un ventilateur Incident • Le voyant d'état du système est orange. • Le logiciel de gestion de systèmes a émis un message d'erreur concernant les ventilateurs. • L'écran LCD du panneau avant indique un incident au niveau du ventilateur. • Le voyant d'état d'un ventilateur indique que celui-ci est défectueux.Dépannage du système 175 Action PRÉCAUTION : La plupart des réparations ne peuvent être effectuées que par un technicien de service agréé. Vous devez uniquement procéder aux dépannages et réparations simples autorisés dans le manuel de votre produit, ou selon les directives du service et du support en ligne ou téléphonique. Les dommages causés par des interventions de maintenance non autorisées par Dell ne sont pas couverts par votre garantie. Consultez et respectez les consignes de sécurité livrées avec le produit. 1 Exécutez le test de diagnostic en ligne approprié. Voir “Utilisation de Dell PowerEdge Diagnostics”, à la page 189. 2 Ouvrez le système. Voir “Ouverture et fermeture du système”, à la page 75. PRÉCAUTION : Les ventilateurs sont enfichables à chaud. Pour maintenir un refroidissement adéquat lorsque le système est sous tension, remplacez les ventilateurs un à la fois. 3 Repérez le ventilateur défectueux identifié par l'écran LCD ou par les logiciels de diagnostic, ou bien le voyant de ventilateur qui clignote en orange. Pour connaître le numéro d'identification de chaque ventilateur, voir Figure 3-4. 4 Vérifiez que le câble d'alimentation du ventilateur défectueux est correctement inséré dans son connecteur. Dans le cas d'un ventilateur enfichable à chaud, retirez le ventilateur et remboîtez-le dans son logement. Voir “Ventilateurs”, à la page 77. REMARQUE : Patientez 30 secondes pour laisser au système le temps de reconnaître le ventilateur et de déterminer s'il fonctionne normalement. 5 Si l'incident persiste, installez un nouveau ventilateur. Voir “Ventilateurs”, à la page 77. Si le nouveau ventilateur fonctionne normalement, refermez le système. Voir “Ouverture et fermeture du système”, à la page 75. Si le nouveau ventilateur ne fonctionne pas, voir “Obtention d'aide”, à la page 203.176 Dépannage du système Dépannage de la mémoire système Incident • Barrette de mémoire défectueuse. • Carte système défectueuse. • L'écran LCD du panneau avant indique qu'un incident lié à la mémoire système s'est produit. Action PRÉCAUTION : La plupart des réparations ne peuvent être effectuées que par un technicien de service agréé. Vous devez uniquement procéder aux dépannages et réparations simples autorisés dans le manuel de votre produit, ou selon les directives du service et du support en ligne ou téléphonique. Les dommages causés par des interventions de maintenance non autorisées par Dell ne sont pas couverts par votre garantie. Consultez et respectez les consignes de sécurité livrées avec le produit. 1 Si le système fonctionne, exécutez le test des diagnostics en ligne approprié. Voir “Utilisation de Dell PowerEdge Diagnostics”, à la page 189. Si les diagnostics indiquent une panne, suivez les instructions fournies par le programme de diagnostic. Si l'incident persiste ou si le système ne fonctionne toujours pas, passez à l'étape suivante. 2 Éteignez le système et les périphériques connectés, puis débranchez le système de la prise secteur et appuyez sur le bouton d'alimentation. Rebranchez ensuite le système sur la prise secteur. 3 Allumez le système et les périphériques connectés. Pendant que le système redémarre, notez les messages qui s'affichent à l'écran. Si la quantité de mémoire système détectée pendant l'auto-test de démarrage ne correspond pas à la mémoire installée, ou si un message d'erreur relatif à la mémoire s'affiche, passez à l'étape 4. Si un message d'erreur indique qu'une barrette de mémoire est en panne, passez à l'étape 11. 4 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise secteur. 5 Ouvrez le système. Voir “Ouverture et fermeture du système”, à la page 75.Dépannage du système 177 6 Vérifiez les bancs de mémoire et assurez-vous que l'installation des barrettes de mémoire est correcte. Voir “Consignes générales pour l'installation des barrettes de mémoire”, à la page 105. Si les connecteurs mémoire sont remplis correctement, passez à l'étape suivante. 7 Remboîtez les barrettes de mémoire dans leurs supports. Voir “Installation de barrettes de mémoire”, à la page 109. 8 Refermez le système. Voir “Ouverture et fermeture du système”, à la page 75. 9 Rebranchez le système sur la prise secteur et allumez-le, ainsi que les périphériques connectés. 10 Accédez au programme de configuration du système et vérifiez le paramètre de la mémoire système. Voir “Utilisation du programme de configuration du système”, à la page 49. Si la quantité de mémoire installée ne correspond toujours pas au paramètre System Memory, passez à l'étape suivante. 11 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise secteur. 12 Ouvrez le système. Voir “Ouverture et fermeture du système”, à la page 75. REMARQUE : Il existe plusieurs configurations possibles pour les barrettes de mémoire. Voir “Consignes générales pour l'installation des barrettes de mémoire”, à la page 105. 13 Si un test de diagnostic ou un message d'erreur indique qu'une barrette de mémoire est défectueuse, repositionnez-la en l'échangeant avec une autre, ou bien remplacez-la. Vous pouvez également échanger la barrette installée dans le support 1 avec une autre barrette fiable (de même type et de même capacité). Voir “Installation de barrettes de mémoire”, à la page 109. 14 Refermez le système. Voir “Ouverture et fermeture du système”, à la page 75. 15 Rebranchez le système sur la prise secteur et allumez-le, ainsi que les périphériques connectés. 16 Pendant l'amorçage du système, observez les voyants de diagnostic du panneau avant et guettez l'apparition de messages d'erreur.178 Dépannage du système 17 Si l'incident persiste, recommencez la procédure décrite de l'étape 11 à l'étape 16 pour chaque barrette installée. Si l'incident persiste alors que vous avez vérifié toutes les barrettes de mémoire, voir “Obtention d'aide”, à la page 203. Dépannage d'un lecteur optique Incident • Le système ne peut pas lire les données d'un CD ou d'un DVD placé dans le lecteur. • Le voyant du lecteur optique ne clignote pas au démarrage du système. REMARQUE : Les périphériques DVD sont uniquement des périphériques de données. Action PRÉCAUTION : La plupart des réparations ne peuvent être effectuées que par un technicien de service agréé. Vous devez uniquement procéder aux dépannages et réparations simples autorisés dans le manuel de votre produit, ou selon les directives du service et du support en ligne ou téléphonique. Les dommages causés par des interventions de maintenance non autorisées par Dell ne sont pas couverts par votre garantie. Consultez et respectez les consignes de sécurité livrées avec le produit. 1 Essayez un autre CD ou DVD fiable. 2 Accédez au programme de configuration du système et vérifiez que le contrôleur IDE du lecteur est activé. Voir “Utilisation du programme de configuration du système”, à la page 49. 3 Exécutez le test de diagnostic en ligne approprié. Voir “Utilisation de Dell PowerEdge Diagnostics”, à la page 189. 4 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise secteur. 5 Ouvrez ou retirez le cadre. Voir “Retrait et réinstallation du cadre avant en option”, à la page 74. 6 Ouvrez le système. Voir “Ouverture et fermeture du système”, à la page 75. 7 Vérifiez que le câble d'interface est correctement enfiché dans le lecteur optique et dans la carte latérale.Dépannage du système 179 8 Refermez le système. Voir “Ouverture et fermeture du système”, à la page 75. 9 Rebranchez le système sur la prise secteur et allumez-le, ainsi que les périphériques connectés. Si l'incident persiste, voir “Obtention d'aide”, à la page 203. Dépannage d'un disque dur Incident • Erreur de pilote de périphérique. • Un ou plusieurs disques durs ne sont pas reconnus par le système. Action PRÉCAUTION : La plupart des réparations ne peuvent être effectuées que par un technicien de service agréé. Vous devez uniquement procéder aux dépannages et réparations simples autorisés dans le manuel de votre produit, ou selon les directives du service et du support en ligne ou téléphonique. Les dommages causés par des interventions de maintenance non autorisées par Dell ne sont pas couverts par votre garantie. Consultez et respectez les consignes de sécurité livrées avec le produit. AVIS : Cette procédure de dépannage risque de supprimer les données stockées sur le disque dur. Avant de continuer, créez une copie de sauvegarde de tous les fichiers qui se trouvent sur le disque dur. 1 Exécutez le test de diagnostic en ligne approprié. Voir “Utilisation de Dell PowerEdge Diagnostics”, à la page 189. Procédez comme suit, selon les résultats du test de diagnostic. 2 Retirez le cadre. Voir “Retrait et réinstallation du cadre avant en option”, à la page 74. 3 Si l'incident concerne plusieurs disques durs, passez à l'étape 8. S'il concerne un seul disque dur, passez à l'étape suivante. 4 Mettez le système hors tension, remboîtez le disque dur dans son logement et redémarrez le système.180 Dépannage du système 5 Si le système contient une carte contrôleur RAID SAS, effectuez les opérations suivantes. a Redémarrez le système et appuyez sur pour ouvrir l'utilitaire de configuration de l'adaptateur hôte. Consultez la documentation fournie avec la carte contrôleur pour obtenir des informations sur cet utilitaire. b Assurez-vous que le disque dur a été configuré correctement. c Quittez l'utilitaire de configuration et laissez le système d'exploitation démarrer. 6 Assurez-vous que les pilotes requis pour la carte contrôleur sont installés et configurés correctement. Consultez la documentation du système d'exploitation pour plus d'informations. AVIS : Si le système contient une carte contrôleur RAID SAS, ne tenez pas compte de l'étape suivante. 7 Si le système contient une carte contrôleur SAS sans option RAID, retirez le disque dur et échangez-le avec un disque fiable installé dans une autre baie. Si l'incident est résolu, réinstallez le disque dur dans la baie d'origine. Voir “Installation d'un disque dur enfichable à chaud”, à la page 124. Si le disque dur fonctionne correctement dans la baie d'origine, il se peut que des incidents liés au support de lecteur surviennent par intermittence. Remplacez ce support. Voir “Obtention d'aide”, à la page 203. Si le disque dur fonctionne correctement dans une autre baie, mais pas dans sa baie d'origine, un connecteur du fond de panier SAS est défectueux. Voir “Obtention d'aide”, à la page 203. 8 Vérifiez la connexion des câbles à l'intérieur du système : a Éteignez le système et les périphériques connectés, puis débranchez-le de la prise secteur. b Ouvrez le système. Voir “Ouverture et fermeture du système”, à la page 75. c Vérifiez le câblage entre le fond de panier SAS et la carte contrôleur. Voir “Installation d'une carte contrôleur SAS”, à la page 127.Dépannage du système 181 d Vérifiez que les câbles de données sont correctement emboîtés dans leurs connecteurs. e Vérifiez que le connecteur d'alimentation du fond de panier SAS est correctement emboîté dans son connecteur. f Refermez le système. Voir “Ouverture et fermeture du système”, à la page 75. g Rebranchez le système sur la prise secteur et allumez-le, ainsi que les périphériques connectés. Si l'incident persiste, voir “Obtention d'aide”, à la page 203. Dépannage d'un contrôleur SAS ou RAID SAS REMARQUE : Pour dépanner un contrôleur SAS ou RAID SAS, reportez-vous également à sa documentation et à celle du système d'exploitation. Incident • Un message d'erreur signale un incident lié au contrôleur SAS ou RAID SAS. • Le contrôleur SAS ou RAID SAS ne fonctionne pas correctement ou pas du tout. Action PRÉCAUTION : La plupart des réparations ne peuvent être effectuées que par un technicien de service agréé. Vous devez uniquement procéder aux dépannages et réparations simples autorisés dans le manuel de votre produit, ou selon les directives du service et du support en ligne ou téléphonique. Les dommages causés par des interventions de maintenance non autorisées par Dell ne sont pas couverts par votre garantie. Consultez et respectez les consignes de sécurité livrées avec le produit. 1 Exécutez le test de diagnostic en ligne approprié. Voir “Utilisation de Dell PowerEdge Diagnostics”, à la page 189. 2 Accédez au programme de configuration du système et vérifiez que le contrôleur SAS ou RAID SAS est activé. Voir “Utilisation du programme de configuration du système”, à la page 49.182 Dépannage du système 3 Redémarrez le système et appuyez sur pour ouvrir l'utilitaire de configuration. Consultez la documentation du contrôleur pour obtenir des informations sur les paramètres de configuration. 4 Vérifiez les paramètres de configuration, corrigez-les au besoin et redémarrez le système. Si l'incident persiste, passez à l'étape suivante. 5 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise secteur. 6 Ouvrez le système. Voir “Ouverture et fermeture du système”, à la page 75. 7 Vérifiez que la carte contrôleur est correctement emboîtée dans le connecteur INTERNAL STORAGE de la carte système. Voir “Installation d'une carte contrôleur SAS”, à la page 127. 8 Si le système est équipé d'un contrôleur RAID SAS, vérifiez que les composants suivants sont correctement installés et connectés : • Barrette de mémoire • Batterie RAID 9 Vérifiez que le fond de panier est correctement relié au contrôleur SAS. Voir “Fond de panier SAS”, à la page 138. 10 Refermez le système. Voir “Ouverture et fermeture du système”, à la page 75. 11 Rebranchez le système sur la prise secteur et allumez-le, ainsi que les périphériques connectés. Si l'incident persiste, procédez comme suit : • Si le système est équipé d'un contrôleur SAS, voir “Obtention d'aide”, à la page 203. • Si le système est équipé d'un contrôleur RAID, remplacez la batterie RAID. Voir “Installation de la batterie de la carte contrôleur RAID SAS”, à la page 129. Si le remplacement de la batterie ne résout pas l'incident, voir “Obtention d'aide”, à la page 203.Dépannage du système 183 Dépannage d'un lecteur de bande SAS externe Incident • Lecteur de bande défectueux • Cartouche défectueuse • Logiciel de sauvegarde sur bande ou pilote du lecteur de bande manquant ou altéré • Contrôleur SAS défectueux Action 1 Retirez la cartouche que vous utilisiez lorsque l'incident s'est produit, et remplacez-la par une autre cartouche fiable. 2 Assurez-vous que les pilotes correspondant au lecteur de bande sont installés et configurés correctement. 3 Exécutez les diagnostics en ligne appropriés. Voir “Utilisation de Dell PowerEdge Diagnostics”, à la page 189. 4 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise secteur. PRÉCAUTION : La plupart des réparations ne peuvent être effectuées que par un technicien de service agréé. Vous devez uniquement procéder aux dépannages et réparations simples autorisés dans le manuel de votre produit, ou selon les directives du service et du support en ligne ou téléphonique. Les dommages causés par des interventions de maintenance non autorisées par Dell ne sont pas couverts par votre garantie. Consultez et respectez les consignes de sécurité livrées avec le produit. 5 Ouvrez le système. Voir “Ouverture et fermeture du système”, à la page 75. 6 Vérifiez que la carte contrôleur est correctement emboîtée dans le connecteur de la carte système. 7 Vérifiez que le câble d'interface/d'alimentation en CC du lecteur de bande est connecté au lecteur de bande et à la carte contrôleur. 8 Refermez le système. Voir “Ouverture et fermeture du système”, à la page 75. 9 Rebranchez le système sur la prise secteur et allumez-le, ainsi que les périphériques connectés.184 Dépannage du système 10 Si l'incident persiste, consultez la documentation du lecteur de bande pour obtenir des instructions de dépannage supplémentaires. 11 Réinstallez le logiciel de sauvegarde sur bande en suivant les instructions de sa documentation. 12 Si vous ne parvenez pas à résoudre l'incident, voir “Obtention d'aide”, à la page 203. Dépannage des cartes d'extension REMARQUE : Pour dépanner une carte d'extension, reportez-vous également à sa documentation et à celle du système d'exploitation. Incident • Un message d'erreur signale un incident lié à une carte d'extension. • La carte d'extension ne fonctionne pas correctement ou pas du tout. Action PRÉCAUTION : La plupart des réparations ne peuvent être effectuées que par un technicien de service agréé. Vous devez uniquement procéder aux dépannages et réparations simples autorisés dans le manuel de votre produit, ou selon les directives du service et du support en ligne ou téléphonique. Les dommages causés par des interventions de maintenance non autorisées par Dell ne sont pas couverts par votre garantie. Consultez et respectez les consignes de sécurité livrées avec le produit. 1 Exécutez le test de diagnostic en ligne approprié. Voir “Exécution des diagnostics du système”, à la page 189. 2 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise secteur. 3 Ouvrez le système. Voir “Ouverture et fermeture du système”, à la page 75. 4 Vérifiez que chaque carte d'extension est correctement emboîtée dans son connecteur. Voir “Cartes d'extension”, à la page 87. 5 Refermez le système. Voir “Ouverture et fermeture du système”, à la page 75. 6 Rebranchez le système sur la prise secteur et allumez-le, ainsi que les périphériques connectés.Dépannage du système 185 Si l'incident persiste, passez à l'étape suivante. 7 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise secteur. 8 Ouvrez le système. Voir “Ouverture et fermeture du système”, à la page 75. 9 Retirez toutes les cartes d'extension du système. Voir “Retrait d'une carte d'extension”, à la page 91. 10 Refermez le système. Voir “Ouverture et fermeture du système”, à la page 75. 11 Rebranchez le système sur la prise secteur et allumez-le, ainsi que les périphériques connectés. 12 Exécutez le test de diagnostic en ligne approprié. Si le test échoue, voir “Obtention d'aide”, à la page 203. 13 Pour chaque carte d'extension retirée à l'étape 9, effectuez les opérations suivantes : a Éteignez le système et les périphériques connectés, puis débranchez-le de la prise secteur. b Ouvrez le système. Voir “Ouverture et fermeture du système”, à la page 75. c Réinstallez une des cartes d'extension. Voir “Installation d'une carte d'extension”, à la page 89. d Refermez le système.voir “Ouverture et fermeture du système”, à la page 75. e Exécutez le test de diagnostic approprié. Si le test échoue, voir “Obtention d'aide”, à la page 203.186 Dépannage du système Dépannage des microprocesseurs Incident • Un message d'erreur signale un incident lié au processeur. • L'écran LCD du panneau avant indique qu'un incident lié aux processeurs ou à la carte système s'est produit. • Un dissipateur de chaleur n'est pas installé pour chaque processeur. Action PRÉCAUTION : La plupart des réparations ne peuvent être effectuées que par un technicien de service agréé. Vous devez uniquement procéder aux dépannages et réparations simples autorisés dans le manuel de votre produit, ou selon les directives du service et du support en ligne ou téléphonique. Les dommages causés par des interventions de maintenance non autorisées par Dell ne sont pas couverts par votre garantie. Consultez et respectez les consignes de sécurité livrées avec le produit. 1 Exécutez le test de diagnostic en ligne approprié. Voir “Utilisation de Dell PowerEdge Diagnostics”, à la page 189. 2 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise secteur. 3 Ouvrez le système. Voir “Ouverture et fermeture du système”, à la page 75. 4 Vérifiez que chaque processeur et chaque dissipateur de chaleur est installé correctement. Voir “Retrait d'un processeur”, à la page 113. 5 Refermez le système. Voir “Ouverture et fermeture du système”, à la page 75. 6 Rebranchez le système sur la prise secteur et allumez-le, ainsi que les périphériques connectés. 7 Exécutez le test de diagnostic en ligne approprié. Si le test échoue ou si l'incident persiste, passez à l'étape suivante. 8 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise secteur.Dépannage du système 187 9 Ouvrez le système. Voir “Ouverture et fermeture du système”, à la page 75. 10 Remplacez le processeur 1 par un autre de même type. Voir “Retrait d'un processeur”, à la page 113 et “Installation d'un processeur”, à la page 116. 11 Refermez le système. Voir “Ouverture et fermeture du système”, à la page 75. 12 Exécutez le test de diagnostic en ligne approprié. Si les tests réussissent, remplacez le processeur 1. Voir “Obtention d'aide”, à la page 203. Si le test échoue, voir “Obtention d'aide”, à la page 203.188 Dépannage du systèmeExécution des diagnostics du système 189 Exécution des diagnostics du système Si vous rencontrez des difficultés lors de l'utilisation du système, lancez les diagnostics avant de demander une assistance technique. Le but des diagnostics est de tester le matériel du système sans nécessiter d'équipement supplé- mentaire et sans risque de perte de données. Si vous ne réussissez pas à corriger le problème, le personnel de service et de support peut s'aider des résultats des tests de diagnostic. Utilisation de Dell PowerEdge Diagnostics Pour diagnostiquer un incident, commencez par utiliser les diagnostics en ligne, Dell™ PowerEdge™ Diagnostics. Ces derniers comprennent divers modules de test pour le châssis et les composants de stockage (disques durs, mémoire physique, ports de communication et d'impression, NIC, CMOS, etc.). Si vous ne parvenez toujours pas à identifier l'incident, utilisez les diagnostics du système. Les fichiers requis pour exécuter PowerEdge Diagnostics sur les systèmes Microsoft® Windows® et Linux sont disponibles sur le site support.dell.com, ainsi que sur les CD fournis avec le système. Pour plus d'informations sur l'utilisation des diagnostics, consultez le document Dell PowerEdge Diagnostics User's Guide (Dell PowerEdge Diagnostics - Guide d'utilisation). Fonctionnalités des diagnostics du système Les diagnostics du système contiennent des menus et des options permettant de tester des groupes de périphériques ou des périphériques particuliers. Ces options permettent d'effectuer les opérations suivantes : • Lancer un ou plusieurs tests. • Définir l'ordre des tests. • Répéter des tests. • Afficher, imprimer et enregistrer les résultats des tests.190 Exécution des diagnostics du système • Interrompre temporairement un test quand une erreur est détectée ou l'arrêter lorsqu'une limite d'erreur définie par l'utilisateur est atteinte. • Afficher des messages d'aide qui décrivent brièvement chaque test et ses paramètres. • Afficher des messages d'état qui vous indiquent si les tests ont abouti. • Afficher des messages d'erreur qui vous indiquent si des incidents sont survenus pendant les tests. Quand utiliser les diagnostics du système Le fait qu'un composant ou un périphérique important du système ne fonctionne pas normalement peut être le symptôme d'une panne. Tant que le processeur et les périphériques d'entrée/sortie du système (moniteur et clavier) fonctionnent, vous pouvez utiliser les diagnostics pour faciliter l'identification de l'incident. Exécution des diagnostics du système Les diagnostics du système s'exécutent à partir de la partition d'utilitaires du disque dur. AVIS : N'utilisez les diagnostics que sur ce système. Leur utilisation sur d'autres systèmes peut entraîner des résultats non valides ou générer des messages d'erreur. De plus, n'utilisez que le programme fourni avec le système (ou une mise à jour). 1 À l'amorçage du système, appuyez sur pendant l'auto-test de démarrage. 2 Dans le menu principal de la partition d'utilitaires, sélectionnez Run System Diagnostics (Exécuter les diagnostics du système), ou sélectionnez Run Memory Diagnostics (Exécuter les diagnostics de la mémoire) si vous cherchez à identifier un incident lié à la mémoire. Quand vous lancez les diagnostics du système, un message s'affiche, indiquant qu'ils sont en cours d'initialisation. Ensuite, le menu Diagnostics s'affiche. Ce menu vous permet de lancer tous les tests ou uniquement certains, ou encore de quitter les diagnostics du système. REMARQUE : Avant de lire le reste de cette section, lancez les diagnostics du système pour voir l'utilitaire à l'écran.Exécution des diagnostics du système 191 Options de test des diagnostics du système Cliquez sur l'option de test voulue dans la fenêtre Main Menu (Menu principal). Le Tableau 5-1 contient une brève explication sur les options de test disponibles. Utilisation des options de test personnalisées Lorsque vous sélectionnez l'option Custom Test (Test personnalisé) dans l'écran Main Menu (Menu principal), la fenêtre Customize (Personnaliser) s'affiche. Elle permet de sélectionner les périphériques à tester, de choisir des options de test spécifiques et de visualiser les résultats obtenus. Sélection de périphériques à tester La partie gauche de la fenêtre Customize (Personnaliser) répertorie les périphériques qui peuvent être testés. Ceux–ci sont regroupés par type ou par module, selon l'option sélectionnée. Cliquez sur le signe (+) en regard d'un périphérique ou d'un module pour visualiser ses composants. Cliquez sur (+) sur un composant pour visualiser les tests disponibles. Si vous cliquez sur un périphérique et non sur ses composants, tous les composants de ce périph- érique sont sélectionnés pour le test. Tableau 5-1. Options de test des diagnostics du système Option de test Fonction Express Test (Test rapide) Effectue une vérification rapide du système. Cette option exécute les tests de périphériques qui ne requièrent pas d'action de l'utilisateur. Elle permet d'identifier rapidement la source de l'incident. Extended Test (Test complet) Effectue une vérification plus complète du système. Ce test peut prendre plus d'une heure. Custom Test (Test personnalisé) Teste un périphérique particulier. Information Affiche les résultats des tests.192 Exécution des diagnostics du système Sélection d'options de diagnostic Le champ Diagnostics Options (Options de diagnostic) permet de sélectionner la façon dont le périphérique sera testé. Vous pouvez définir les options suivantes : • Non-Interactive Tests Only (Tests non-interactifs uniquement) : cette option permet d'exécuter uniquement les tests ne nécessitant aucune intervention de l'utilisateur. • Quick Tests Only (Tests rapides uniquement) : cette option permet d'exécuter uniquement les tests rapides sur le périphérique sélectionné. Les tests étendus ne seront pas lancés si vous sélectionnez cette option. • Show Ending Timestamp (Afficher l'heure de fin) : cette option permet d'ajouter un horodatage au journal de test. • Test Iterations (Nombre d'itérations) : cette option sélectionne le nombre de fois où le test est exécuté. • Log output file pathname (Emplacement du fichier de sortie) : cette option permet d'indiquer l'emplacement où le journal de test doit être sauvegardé. Visualisation des informations et des résultats Les onglets de la fenêtre Customize (Personnaliser) contiennent des informations sur les tests et les résultats. Les onglets suivants sont disponibles : • Results (Résultats) : indique le test exécuté et son résultat. • Errors (Erreurs) : affiche les erreurs qui se sont produites pendant le test. • Help (Aide) : affiche des informations sur le périphérique, le composant ou le test sélectionné. • Configuration : affiche des informations de base concernant la configuration du périphérique sélectionné. • Parameters (Paramètres): le cas échéant, cet onglet affiche les paramètres que vous pouvez définir pour le test à exécuter.Cavaliers et connecteurs 193 Cavaliers et connecteurs Cette section contient des informations spécifiques sur les cavaliers du système. Elle contient également des informations générales sur les cavaliers et les commutateurs et décrit les connecteurs des différentes cartes du système. Cavaliers de la carte système La figure 6-1 présente l'emplacement des cavaliers de configuration sur la carte système. Le Tableau 6-1 répertorie les réglages des cavaliers. Tableau 6-1. Réglages des cavaliers de la carte système Cavalier Réglage Description PWRD_EN (par défaut) La fonction de mot de passe est activée. (Broches 2-4) La fonction de mot de passe est désactivée. (Broches 4-6) NVRAM_CLR (par défaut) Les paramètres de configuration sont conservés au démarrage du système. (Broches 3-5) Les paramètres de configuration sont effacés au prochain démarrage du système. (Broches 1-3)194 Cavaliers et connecteurs Désactivation d'un mot de passe oublié Les fonctionnalités logicielles de protection du système comprennent un mot de passe système et un mot de passe de configuration, qui sont présentés en détail dans la section “Utilisation du programme de configuration du système”, à la page 49. Le cavalier de mot de passe active ces fonctions ou les désactive, et efface le(s) mot(s) de passe utilisé(s). PRÉCAUTION : La plupart des réparations ne peuvent être effectuées que par un technicien de service agréé. Vous devez uniquement procéder aux dépannages et réparations simples autorisés dans le manuel de votre produit, ou selon les directives du service et du support en ligne ou téléphonique. Les dommages causés par des interventions de maintenance non autorisées par Dell ne sont pas couverts par votre garantie. Consultez et respectez les consignes de sécurité livrées avec le produit. 1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise secteur. 2 Ouvrez le système. Voir “Ouverture et fermeture du système”, à la page 75. 3 Déplacez le cavalier du mot de passe sur les broches 2-4 pour effacer le mot de passe. voir figure 6-1 pour identifier l'emplacement du cavalier de mot de passe sur la carte système. 4 Refermez le système. 5 Rebranchez le système et les périphériques sur les prises secteur, puis allumez le système. Pour que les mots de passe existants soient désactivés (effacés), le système doit démarrer avec la fiche du cavalier de mot de passe retirée. Toutefois, avant d'attribuer un nouveau mot de passe du système et/ou de configuration, vous devez réinstaller la fiche du cavalier. REMARQUE : Si vous attribuez un nouveau mot de passe du système et/ou de configuration alors que la fiche de cavalier est encore retirée, le système désactive les nouveaux mots de passe à son prochain démarrage.Cavaliers et connecteurs 195 6 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise secteur. 7 Ouvrez le système. Voir “Ouverture et fermeture du système”, à la page 75. 8 Déplacez le cavalier du mot de passe sur les broches 4-6 pour restaurer la protection par mot de passe. 9 Refermez le système. 10 Rebranchez le système et les périphériques sur les prises secteur, puis allumez le système. 11 Attribuez un nouveau mot de passe système et/ou de configuration. Pour attribuer un nouveau mot de passe à l'aide du programme de configuration du système, voir “Attribution d'un mot de passe système”, à la page 64. Connecteurs de la carte système voir figure 6-1 et Tableau 6-2 pour obtenir la description et l'emplacement des connecteurs situés sur la carte système.196 Cavaliers et connecteurs Figure 6-1. Connecteurs de la carte système 1 12 11 10 2 3 4 5 6 8 9 16 15 13 17 20 21 22 18, 19 14 7 23Cavaliers et connecteurs 197 Tableau 6-2. Connecteurs de la carte système Libellé du connecteur Description 1 PCIE_Xn_n Logements d'extension PCIe (7) 2 INT_STORAGE Connecteur pour carte contrôleur SAS 3 RAC_CONN Connecteur pour carte RAC 4 RAC_CONN2 Connecteur pour le câble de la carte RAC (40 broches) 5 INT_SD Connecteur pour carte SD 6 RAC_CONN1 Connecteur pour carte RAC 7 INT_USB Connecteur USB interne 8 SATA Connecteur pour contrôleur SATA 9 CONTROL_PANEL Connecteur pour le câble du panneau de commande 10 An Connecteurs de barrettes de mémoire (8) 11 CPU1 Support du processeur 1 12 PWR_3.3Stby_Cntrl Connecteur pour le signal de la carte de distribution de l'alimentation 13 GROUND Connecteur pour le signal de la carte de distribution de l'alimentation 14 12V Connecteur d'alimentation 12V 15 CONN_Jn Connecteur pour carte de montage (5) 16 CPU2 Support du processeur 2 17 Bn Connecteurs de barrettes de mémoire (8) 18 PWRD_EN Cavalier du mot de passe 19 NVRAM_CLR Cavalier de configuration 20 Intrusion Detection Connecteur pour le commutateur d'intrusion 21 LOM Mezzanine Card Connecteur pour carte réseau fille 22 BATTERY Connecteur pour la pile bouton de 3V 23 TOE KEY Connecteur pour clé TOE/iSCSI REMARQUE : Pour obtenir le nom complet d'une abréviation ou d'un sigle utilisé dans ce tableau, voir le “Glossaire”, à la page 205.198 Cavaliers et connecteurs Connecteurs de la carte du module d'extension processeurs voir figure 6-2 et Tableau 6-3 pour obtenir la description et l'emplacement des connecteurs situés sur la carte du module PEM. Figure 6-2. Connecteurs de la carte du module d'extension processeurs Tableau 6-3. Connecteurs de la carte du module d'extension processeurs Libellé du connecteur Description 1 Cn Connecteurs de barrettes de mémoire (8) 2 Dn Connecteurs de barrettes de mémoire (8) 3 CPU4 Support du processeur 4 4 CONN_Jn Connecteur pour carte de montage (5) 5 CPU3 Support du processeur 3 REMARQUE : Pour obtenir le nom complet d'une abréviation ou d'un sigle utilisé dans ce tableau, voir le “Glossaire”, à la page 205. 3 2 4 5 1Cavaliers et connecteurs 199 Connecteurs de la carte de fond de panier SAS La figure 6-3 montre l'emplacement des connecteurs sur la carte de fond de panier. Figure 6-3. Connecteurs de la carte de fond de panier SAS 1 Interface de données 2 Panneau de commande (à l'avant de la carte) 3 Alimentation 4 SAS B 5 Fente d'alignement pour l'installation 6 Alimentation SAS A 3 4 2 1 5 6200 Cavaliers et connecteurs Figure 6-4. Connecteurs de la carte de fond de panier SAS - Option 2,5 pouces 1 SAS B 2 SAS A 3 Alimentation du fond de panier 3 2 1Cavaliers et connecteurs 201 Carte adaptatrice SAS 2,5 pouces pour les périphériques En plus du fond de panier, les systèmes équipés de lecteurs 2,5 pouces sont dotés d'une carte adaptatrice pour les périphériques. Figure 6-5. Connecteurs de la carte adaptatrice SAS pour les périphériques 1 Panneau de commande 2 Alimentation 3 Alimentation (vers le fond de panier) 4 Interface de données 1 2 3 4202 Cavaliers et connecteursObtention d'aide 203 Obtention d'aide Contacter Dell Aux États-Unis, appelez le 800-WWW-DELL (800-999-3355). REMARQUE : Si vous ne disposez pas d'une connexion Internet active, vous pouvez utiliser les coordonnées figurant sur votre preuve d'achat, votre bordereau de livraison, votre facture ou encore sur le catalogue des produits Dell. Dell fournit plusieurs options de service et de support en ligne et par télé- phone. Leur disponibilité variant d'un pays à l'autre, il est possible que certains services ne soient pas proposés dans votre région. Pour contacter Dell pour des questions ayant trait aux ventes, au support technique ou au service clientèle : 1 Rendez-vous sur le site support.dell.com. 2 Sélectionnez l'option appropriée dans le menu déroulant Choose A Country/Region (Choisissez un pays ou une région) situé au bas de la page. 3 Cliquez sur Contact Us (Nous contacter) sur la gauche de la page. 4 Sélectionnez le lien correspondant au service ou au support requis. 5 Choisissez la méthode de contact qui vous convient.204 Obtention d'aideGlossaire 205 Glossaire Cette section définit ou identifie les termes techniques, abréviations et sigles utilisés dans la documentation fournie avec le système. A : Ampère(s). ACPI : Acronyme de “Advanced Configuration and Power Interface”. Interface standard qui permet au système d'exploitation de contrôler les paramètres relatifs à la configuration et à la gestion de l'alimentation. adaptateur hôte : Carte assurant la communication entre le bus du système et le contrôleur d'un périphérique. Les sous-systèmes de contrôleurs de disque dur comprennent des circuits d'adaptateur hôte intégrés. Pour ajouter un bus d'extension SCSI au système, vous devez installer ou raccorder l'adaptateur hôte adéquat. adresse MAC : Adresse de contrôle d'accès aux supports. L'adresse MAC identifie le matériel du système de manière unique sur un réseau. adresse mémoire : Emplacement spécifique dans la RAM du système, généralement exprimé sous forme de nombre hexadécimal. ANSI : Acronyme de “American National Standards Institute”, institut des normes nationales américaines. Principal organisme dédié au développement des normes technologiques spécifiques des États-Unis. application : Logiciel conçu pour effectuer une tâche spécifique ou une série de tâches. Les applications s'exécutent à partir du système d'exploitation. ASCII : Acronyme de “American Standard Code for Information Interchange”, code des normes américaines pour l'échange d'informations. barrette de mémoire : Petite carte de circuits qui contient des puces de mémoire vive dynamique et se connecte à la carte système. BIOS : Acronyme de “Basic Input/Output System”, système d'entrées/sorties de base. Le BIOS du système contient des programmes stockés sur une puce de mémoire flash. Le BIOS contrôle : • les communications entre le processeur et les périphériques, • diverses fonctions, comme les messages du système. bit : Plus petite unité d'information interprétée par le système. BMC : Acronyme de “Baseboard Management Controller”, contrôleur de gestion de la carte mère. BTU : Acronyme de “British Thermal Unit”, unité thermique britannique.206 Glossaire bus : Chemin d'informations entre les différents composants du système. Le système contient un bus d'extension qui permet au processeur de communiquer avec les contrôleurs des différents périphériques connectés au système. Il contient également un bus d'adresse et un bus de données pour les communications entre le microprocesseur et la RAM. bus d'extension : Votre système contient un bus d'extension qui permet au processeur de communiquer avec les contrôleurs des périphériques (NIC, etc.). bus local : Sur les systèmes dotés de capacités d'extension du bus local, certains périphériques (comme l'adaptateur vidéo) peuvent être conçus pour fonctionner beaucoup plus vite que sur un bus d'extension traditionnel. Voir aussi bus. C : Celsius. CA : Courant alternatif. carte d'extension : Carte supplémentaire (par exemple un adaptateur SCSI ou un NIC) qui doit être enfichée dans un connecteur d'extension sur la carte système. Une carte d'extension ajoute des fonctions spéciales au système en fournissant une interface entre le bus d'extension et un périphérique. carte système : Principale carte à circuits imprimés du système. Cette carte contient généralement la plupart des composants intégrés du système : processeur, RAM, contrôleurs des périphériques et puces de mémoire morte. carte vidéo : Circuit logique qui gère les fonctions vidéo de l'ordinateur (en association avec le moniteur). Il peut s'agir d'une carte d'extension installée dans un connecteur ou de circuits intégrés à la carte système. cavalier : Petit composant d'une carte à circuits imprimés et comprenant au moins deux broches. Des fiches de plastique contenant un fil s'emboîtent sur les broches. Ce fil relie les broches et ferme un circuit, offrant un moyen simple et réversible de changer le câblage de la carte. CC : Courant continu. CD : Disque compact. Les lecteurs de CD utilisent une technologie optique pour lire les données sur les CD. cm : Centimètre(s). CMOS : Acronyme de “Complementary Metal-Oxide Semiconductor”, semi-conducteur à oxyde de métal complémentaire. code sonore : Message de diagnostic généré par le système, sous la forme d'une série de signaux sonores émis par le haut-parleur. Par exemple, un bip suivi d'un second puis d'une rafale de trois bips, correspond au code 1-1-3. COMn : Nom de périphérique permettant de désigner les ports série du système.Glossaire 207 combinaison de touches : Commande exécutée lorsque l'utilisateur appuie sur plusieurs touches en même temps (exemple : ). composant : Dans le contexte de l'interface DMI, un composant est un élément compatible DMI, comme un système d'exploitation, un ordinateur, une carte d'extension ou un périphérique. Chaque composant est constitué de groupes et d'attributs définis comme caractéristiques de ce composant. connecteur d'extension : Connecteur situé sur la carte système ou la carte de montage et permettant d'installer une carte d'extension. contrôleur : Puce qui contrôle le transfert des données entre le processeur et la mémoire ou entre le processeur et un périphérique. coprocesseur : Circuit qui libère le processeur principal de certaines tâches de traitement. Par exemple, un coprocesseur mathématique se charge des opérations de calcul. CPU : Acronyme de “Central Processing Unit”, unité centrale de traitement. Voir processeur. DDR : Acronyme de “Double Data Rate”, double débit de données. Technologie des barrettes de mémoire permettant de doubler le débit. DEL : Diode électro-luminescente. Dispositif électronique qui s'allume lorsqu'il est traversé par un courant. DHCP : Acronyme de “Dynamic Host Configuration Protocol”. Méthode permettant d'affecter automatiquement une adresse IP à un système client. diagnostics : Ensemble complet de tests destinés au système. DIMM : Acronyme de “Dual In-Line Memory Module”, module de mémoire à double rangée de connexions. Voir aussi barrette de mémoire. DIN : Acronyme de “Deutsche Industrie Norm”, norme de l'industrie allemande. disquette amorçable : Disquette utilisée pour démarrer le système si celui-ci ne peut pas être initialisé à partir du disque dur. disquette système : voir disquette amorçable. DMA : Acronyme de “Direct Memory Access”, accès direct à la mémoire. Un canal DMA permet à certains types de transferts de données entre la RAM et un périph- érique de ne pas transiter par le processeur. DMI : Acronyme de “Desktop Management Interface”, interface de gestion de bureau. L'interface DMI permet de gérer les logiciels et matériels du système en recueillant des informations sur ses composants, comme le système d'exploitation, la mémoire, les périphériques, les cartes d'extension et le numéro d'inventaire.208 Glossaire DNS : Acronyme de “Domain Name System”, système de noms de domaines. Méthode de conversion des noms de domaines Internet (par exemple www.dell.com) en adresses IP (par exemple 143.166.83.200). DRAM : Acronyme de “Dynamic Random-Access Memory”, mémoire vive dynamique. Normalement, la mémoire vive d'un système est composée entièrement de puces DRAM. DVD : Acronyme de “Digital Versatile Disc”, disque numérique polyvalent. E/S : Entrée/sortie. Un clavier est un périphérique d'entrée et une imprimante est un périphérique de sortie. En général, l'activité d'E/S peut être différenciée de l'activité de calcul. ECC : Acronyme de “Error Checking and Correction”, vérification et correction d'erreurs. EEPROM : Acronyme de “Electronically Erasable Programmable Read-Only Memory”, mémoire morte reprogrammable électroniquement. EMC : Acronyme de “Electromagnetic Compatibility”, compatibilité électromagné- tique. EMI : Acronyme de “ElectroMagnetic Interference”, interférence électromagnétique. ERA : Acronyme de “Embedded Remote Access”, accès distant intégré. L'ERA permet de gérer à distance (“hors-bande”) le serveur de votre réseau à l'aide d'un contrôleur d'accès à distance. ESD : Acronyme de “Electrostratic Discharge”, décharge électrostatique. ESM : Acronyme de “Embedded Server Management”, gestion de serveur intégrée. F : Fahrenheit. FAT: Acronyme de “File allocation table”, table d'allocation des fichiers. Structure du système de fichiers utilisée par MS-DOS pour organiser et suivre le stockage des fichiers. Les systèmes d'exploitation Microsoft® Windows® offrent la possibilité d'utiliser une structure de système de fichiers FAT. fichier read-only : Fichier accessible uniquement en lecture, qui ne peut être ni modifié, ni effacé. formater : Préparer un disque dur ou une disquette pour le stockage de fichiers. Un formatage inconditionnel efface toutes les données stockées sur le disque. FSB : Acronyme de “Front Side Bus”, bus frontal. Le FSB est le chemin des données et l'interface physique entre le processeur et la mémoire principale (RAM). ft : Foot (pied). FTP : Acronyme de “File Transfert Protocol”, protocole de transfert de fichiers. g : Gramme(s).Glossaire 209 G : Gravité. Gb : Gigabit(s) ; 1 024 mégabits, soit 1 073 741 824 bits. Go : Giga-octet(s) ; 1 024 méga-octets, soit 1 073 741 824 octets. La mesure est souvent arrondie à 1 000 000 000 octets lorsqu'elle fait référence à la capacité d'un disque dur. groupe : Dans le contexte de l'interface DMI, un groupe est une structure de données qui définit les informations courantes, ou attributs, d'un composant gérable. guarding : Type de redondance de données qui utilise un groupe de disques physiques pour stocker les données, et un disque supplémentaire pour stocker les informations de parité. Voir également mise en miroir, striping et RAID. h : Hexadécimal. Système de numération en base 16, souvent utilisé en programmation pour identifier les adresses mémoire de RAM et d'E/S du système pour les périph- ériques. Les chiffres hexadécimaux sont souvent suivis d'un h lorsqu'ils apparaissent dans du texte. Hz : Hertz. ID : Identification. IDE : Acronyme de “Integrated Drive Electronics”. Interface standard entre la carte système et les périphériques de stockage. informations de configuration du système : Données stockées en mémoire afin d'indiquer au système quel est le matériel installé et quelle configuration doit être utilisée. IP : Acronyme de “Internet Protocol”, protocole Internet. IPX : Acronyme de “Internet package exchange”. IRQ : Interrupt ReQuest (demande d'interruption). Signal indiquant que des données vont être envoyées ou reçues par un périphérique, et envoyé au processeur par une ligne d'IRQ. Chaque liaison avec un périphérique doit avoir un numéro d'IRQ. Deux périphériques peuvent avoir la même IRQ, mais vous ne pouvez pas les utiliser simultanément. K : Kilo, 1 000. Kb : Kilobit(s) ; 1 024 bits. Kbps : Kilobits par seconde. kg : Kilogramme(s) : 1 000 grammes. kHz : Kilohertz. KMM : Acronyme de “Keyboard/Monitor/Mouse”, ensemble clavier/moniteur/souris. Ko : Kilo-octet(s) ; 1 024 octets.210 Glossaire Ko/s : Kilo-octets par seconde. KVM : Acronyme de “Keyboard/Video/Mouse”, ensemble clavier/moniteur/souris. Le terme KVM désigne un commutateur qui permet de sélectionner le système correspondant à la sortie vidéo affichée et auquel s'applique l'utilisation du clavier et de la souris. lame : Module équipé d'un processeur, de mémoire et d'un disque dur. Ces modules sont montés dans une baie qui dispose d'alimentations et de ventilateurs. LAN : Acronyme de “Local Area Network”, réseau local. Un LAN se limite normalement à un bâtiment ou à un groupe de bâtiments proches, où tout l'équipement est relié par des fils réservés au réseau LAN. lb : Livres (poids). LCD : Acronyme de “Liquid Crystal Display”, écran à cristaux liquides. Linux : Système d'exploitation “Open Source” similaire à UNIX® et pouvant être utilisé sur une grande diversité de plates-formes matérielles. Linux est un logiciel libre et gratuit. Certaines distributions plus complètes, accompagnées de support technique et de formation, sont payantes et disponibles chez des distributeurs tels que Red Hat® Software. LVD : Acronyme de “Low Voltage Differential”, différentiel à basse tension. m : Mètre(s). mA : Milliampère(s). mAh : Milliampères à l'heure. Mb : Mégabit(s), soit 1 048 576 bits. Mbps : Mégabits par seconde. MBR : Acronyme de “Master Boot Record”, enregistrement d'amorçage principal. mémoire : Zone de stockage des données de base du système. Un ordinateur peut disposer de différentes sortes de mémoire, intégrée (RAM et ROM) ou ajoutée sous forme de barrettes DIMM. mémoire cache : Zone de mémoire rapide contenant une copie des données ou des instructions et permettant d'accélérer leur extraction. Quand un programme demande des données qui se trouvent dans la mémoire cache, l'utilitaire de mise en mémoire cache du disque peut extraire les données plus vite de la RAM que du disque même. mémoire cache interne du processeur : Mémoire cache d'instructions et de données intégrée au processeur. mémoire conventionnelle : Les 640 premiers kilo-octets de la RAM. La mémoire conventionnelle est présente dans tous les systèmes. Sauf s'ils ont été conçus de façon particulière, les programmes MS-DOS® sont limités à cette mémoire de base.Glossaire 211 mémoire flash : Type de puce EEPROM pouvant être reprogrammée à partir d'un utilitaire stocké sur disquette alors qu'elle est en place dans le système. La plupart des puces EEPROM ne peuvent être reprogrammées qu'avec un équipement de programmation spécial. mémoire système : voir RAM. mémoire vidéo : La plupart des cartes vidéo VGA et SVGA contiennent des puces de mémoire qui viennent s'ajouter à la RAM du système. La quantité de mémoire vidéo installée affecte principalement le nombre de couleurs pouvant être affiché par un programme (ce qui dépend aussi du pilote vidéo et du moniteur). MHz : Mégahertz. mise en miroir : Type de mise en redondance des données qui utilise un ensemble de disques physiques pour stocker les données et un ou plusieurs ensembles de disques supplémentaires pour stocker des copies des données. Cette fonction est assurée par un logiciel. Voir aussi guarding, mise en miroir intégrée, striping et RAID. mise en miroir intégrée : Mise en miroir physique simultanée de deux disques. Cette fonction intégrée est assurée par le matériel du système. Voir aussi mise en miroir. mm : Millimètre(s). Mo : Méga-octet(s), soit 1 048 576 octets. La mesure est souvent arrondie à 1 000 000 octets lorsqu'elle fait référence à la capacité d'un disque dur. Mo/s : Méga-octets par seconde. mode graphique : Mode vidéo qui peut être défini par le nombre de pixels horizontaux x, le nombre de pixels verticaux y et le nombre de couleurs z. mode protégé : Mode d'exploitation qui permet aux systèmes d'exploitation de mettre en oeuvre les éléments et fonctions suivants : • Espace d'adresse mémoire de 16 Mo à 4 Go • Traitement multitâche • Mémoire virtuelle (cette méthode permet d'augmenter la mémoire adressable en utilisant le disque dur) Les systèmes d'exploitation Windows 2000 et UNIX 32 bits s'exécutent en mode protégé. En revanche, cela n'est pas possible pour MS-DOS. ms : Milliseconde(s). MS-DOS® : Microsoft Disk Operating System. NAS : Acronyme de “Network Attached Storage”, stockage réseau. Le NAS est l'un des concepts utilisés pour l'implémentation du stockage partagé sur un réseau. Les systèmes NAS ont leurs propres systèmes d'exploitation, matériel intégré, et leurs propres logiciels optimisés pour répondre à des besoins spécifiques en termes de stockage.212 Glossaire NIC : Acronyme de “Network Interface Controller”. Dispositif intégré ou installé sur un système afin de permettre sa connexion à un réseau. NMI : Acronyme de “NonMaskable Interrupt”, interruption non masquable. Un matériel envoie une NMI pour signaler des erreurs matérielles au processeur. ns : Nanoseconde(s). NTFS : Option du système de fichiers NT dans le système d'exploitation Windows 2000. numéro de service : Code à barres qui se trouve sur le système et permet de l'identifier lorsque vous appelez le support technique de Dell. numéro d'inventaire : Code individuel attribué à un système, normalement par un administrateur, à des fins de sécurité ou de suivi. NVRAM : Acronyme de “Non-Volatile Random-Access Memory”, mémoire vive rémanente. Mémoire qui ne perd pas son contenu lorsque le système est mis hors tension. La NVRAM est utilisée pour conserver la date, l'heure et les informations de configuration du système. panneau de commande : Pièce du système sur laquelle se trouvent des voyants et les contrôles (bouton d'alimentation, voyant d'alimentation, etc.). parité : Informations redondantes associées à un bloc de données. partition : Vous pouvez partager un disque dur en plusieurs sections physiques appelées partitions, avec la commande fdisk. Chaque partition peut contenir plusieurs disques logiques. Après un partitionnement, vous devez formater chaque disque logique avec la commande format. PCI : Acronyme de “Peripheral Component Interconnect”, interconnexion de composants périphériques. Norme pour l'implémentation des bus locaux. PDU : Acronyme de “Power Distribution Unit”, unité de distribution électrique. Source d'alimentation dotée de plusieurs prises de courant qui fournit l'alimentation électrique aux serveurs et aux systèmes de stockage d'un rack. périphérique : Matériel interne ou externe connecté à un système (lecteur de disquette, clavier, etc.). PGA : Acronyme de “Pin Grid Array”, matrice de broches. Type de support permettant le retrait de la puce du processeur. pile de secours : Pile qui conserve dans une région spécifique de la mémoire les informations sur la configuration du système, la date et l'heure, lorsque vous éteignez le système.Glossaire 213 pilote de périphérique : Programme qui permet au système d'exploitation ou à un autre programme de communiquer correctement avec un périphérique ou un matériel donné. Certains pilotes de périphériques, comme les pilotes réseau, doivent être chargés par le fichier config.sys ou en tant que programmes résidant en mémoire (en général par le fichier autoexec.bat). D'autres, comme le pilote vidéo, se chargent lorsque vous démarrez le programme pour lequel ils sont conçus. pilote vidéo : Programme qui permet aux applications exécutées en mode graphique et aux systèmes d'exploitation d'afficher les données avec la résolution et le nombre de couleurs voulus. Le pilote vidéo doit correspondre à la carte vidéo installée. pixel : Point sur un écran vidéo. Les pixels sont disposés en lignes et en colonnes afin de créer une image. Une résolution vidéo, par exemple 640 x 480, indique le nombre de pixels en largeur et en hauteur. port en amont : Port sur un commutateur ou un concentrateur réseau, qui sert à le relier à un autre commutateur ou concentrateur sans utiliser de câble croisé. port série : Port d'E-S, utilisé le plus souvent pour connecter un modem au système. Normalement, vous pouvez identifier un port série grâce à son connecteur à 9 broches. POST: Acronyme de “Power-On Self-Test”, auto-test de démarrage. Au démarrage du système, ce programme teste différents composants (RAM, disques durs, etc.) avant le chargement du système d'exploitation. processeur : Circuit de calcul principal du système, qui contrôle l'interprétation et l'exécution des fonctions mathématiques et logiques. Un logiciel écrit pour un processeur doit souvent être révisé pour fonctionner sur un autre processeur. CPU est un synonyme de processeur. programme de configuration du système : Programme qui fait partie du BIOS et permet de configurer le matériel du système et de personnaliser son fonctionnement en paramétrant diverses fonctions telles que la protection par mot de passe. Le programme de configuration du système étant stocké dans la mémoire vive rémanente, tous les paramètres définis demeurent inchangés tant qu'ils ne sont pas modifiés manuellement. PS/2 : Personal System/2. PXE : Acronyme de “Preboot eXecution Environment”, environnement d'exécution avant démarrage. La fonction PXE permet de démarrer un système (sans disque dur ni disquette amorçable) à partir d'un réseau local. RAC : Acronyme de “Remote Access Controller”, contrôleur d'accès à distance. RAID : Acronyme de “Redundant Array of Independent Disks”, matrice redondante de disques indépendants. Méthode de mise en redondance des données. Les types de RAID les plus fréquents sont les RAID 0, 1, 5, 10 et 50. Voir aussi guarding, mirroring et striping. 214 Glossaire RAM : Acronyme de “Random-Access Memory”, mémoire vive. Zone principale de stockage temporaire du système pour les instructions d'un programme et les données. Toutes les informations stockées dans la RAM sont perdues lorsque vous éteignez le système. RAS : Acronyme de “Remote Access Service”, service d'accès à distance. Sous Microsoft Windows, ce service permet d'accéder à un réseau distant à l'aide d'un modem. readme : Fichier texte fourni avec un logiciel ou un matériel, et qui contient des informations complétant ou mettant à jour la documentation. répertoire : Les répertoires permettent de conserver des fichiers apparentés sur un disque en les organisant hiérarchiquement dans une structure en “arborescence inversée”. Chaque disque possède un répertoire “racine”. Les répertoires supplémentaires qui partent du répertoire racine sont appelés sous-répertoires. Ces derniers peuvent contenir d'autres répertoires, formant une sous-arborescence. résolution vidéo : Une résolution vidéo, par exemple 800 x 600, indique le nombre de pixels en largeur et en hauteur. Pour afficher une application dans une résolution vidéo donnée, vous devez installer les pilotes vidéo appropriés. En outre, la résolution voulue doit être prise en charge par le moniteur. ROM : Acronyme de “Read-Only Memory”, mémoire morte. La ROM contient des programmes essentiels au fonctionnement du système. Ces informations sont conservées lorsque le système est mis hors tension. Le programme qui lance la routine d'amorçage et l'auto-test de démarrage de l'ordinateur sont des exemples de code résidant dans la ROM. ROMB : Acronyme de “RAID on Motherboard”, fonction RAID incluse sur la carte mère. routine d'amorçage : Programme qui initialise la mémoire et les périphériques matériels, puis charge le système d'exploitation au démarrage du système. À moins que le système d'exploitation ne réponde pas, vous pouvez redémarrer le système (faire un démarrage à chaud) en appuyant sur . Sinon, vous devez appuyer sur le bouton de réinitialisation ou éteindre puis rallumer le système. rpm : Tours par minute. RTC : Acronyme de “Real-Time Clock”, horloge temps réel. SAS : Acronyme de “Serial-Attached SCSI”. SATA : Acronyme de “Serial Advanced Technology Attachment”, connexion par technologie série avancée. Interface standard entre la carte système et les périphériques de stockage.Glossaire 215 sauvegarde : Copie d'un programme ou de données. Par précaution, il convient de sauvegarder régulièrement le disque dur du système. Avant de modifier la configuration du système, il est conseillé de sauvegarder les fichiers de démarrage importants du système d'exploitation. SCSI : Acronyme de “Small Computer System Interface”, interface pour petits systèmes informatiques. Interface de bus d'E/S autorisant des transmissions de données plus rapides que les ports standard. SDRAM : Acronyme de “Synchronous Dynamic Random-Access Memory”, mémoire vive dynamique synchrone. sec : Seconde(s). SMART: Acronyme de “Self-Monitoring Analysis and Reporting Technology”, technologie de prévision des défaillances des lecteurs de disque. Cette technologie permet aux disques durs de signaler les erreurs et les pannes au BIOS du système, puis d'afficher un message d'erreur sur l'écran. SMP : Acronyme de “Symmetric MultiProcessing”, multi-traitement symétrique. Se dit d'un système qui dispose de plusieurs processeurs reliés par un lien haut débit géré par un système d'exploitation où tous les processeurs ont les mêmes priorités d'accès au système d'E/S. SNMP : Acronyme de “Simple Network Management Protocol”, protocole de gestion de réseau simple. Interface standard qui permet au gestionnaire du réseau de surveiller et de gérer les stations de travail à distance. spanning (concaténation) : Cette méthode permet de combiner l'espace non alloué de plusieurs disques en un seul volume logique, ce qui permet une utilisation plus efficace de l'espace et des lettres de lecteur sur les systèmes équipés de plusieurs disques. striping (répartition des données) : Méthode qui consiste à écrire des données sur au moins trois disques d'une matrice en utilisant uniquement une partie de l'espace disponible sur chacun. L'espace occupé par une bande (“stripe”) est le même sur chaque disque. Un disque virtuel peut utiliser plusieurs bandes sur le même jeu de disques d'une matrice. Voir aussi guarding, mise en miroir et RAID. SVGA : Acronyme de “Super Video Graphics Array”, super matrice graphique vidéo. VGA et SVGA sont des normes de cartes graphiques offrant une résolution et un nombre de couleurs supérieurs à ceux des normes précédentes. system.ini : Fichier de démarrage du système d'exploitation Windows. Au démarrage de Windows, le système d'exploitation consulte le fichier system.ini afin de déterminer les options à utiliser dans l'environnement Windows. Le fichier system.ini contient notamment la définition des pilotes vidéo, souris et clavier installés pour Windows.216 Glossaire système “sans tête” : Système ou périphérique qui fonctionne sans moniteur, souris ni clavier. Habituellement, les systèmes sans tête sont gérés via un réseau à l'aide d'un navigateur Internet. TCP/IP : Acronyme de “Transmission Control Protocol/Internet Protocol”. température ambiante : Température de l'endroit ou de la pièce où se trouve le système. terminaison : Certains périphériques (par exemple à chaque extrémité d'une chaîne SCSI) doivent être dotés d'une terminaison pour empêcher les réflexions et les signaux parasites sur le câble. Lorsque de tels périphériques sont connectés en série, il est parfois nécessaire d'activer ou de désactiver leur terminaison en modifiant le réglage des cavaliers ou des commutateurs de ces périphériques ou en modifiant des paramètres à l'aide du logiciel de configuration approprié. TOE : Acronyme de “TCP/IP Offload Engine”, moteur de décentralisation TCP/IP. UNIX : Universal Internet Exchange. UNIX est un système d'exploitation écrit en langage C. Il est le précurseur de Linux. UPS : Acronyme de “Uninterruptible Power Supply”, onduleur. Unité, alimentée par batterie, qui fournit automatiquement l'alimentation du système en cas de coupure de courant. USB : Acronyme de “Universal Serial Bus”, bus série universel. Un connecteur USB permet de relier divers périphériques compatibles avec la norme USB (souris, claviers, etc.). Les périphériques USB peuvent être branchés et débranchés pendant que le système est en fonctionnement. utilitaire : Programme qui sert à gérer les ressources du système (mémoire, disques durs, imprimantes, etc.). UTP : Acronyme de “Unshielded Twisted Pair”, paire torsadée non blindée. Type de câblage utilisé pour relier un ordinateur à une ligne téléphonique. V: Volt(s). VCA : Volts en courant alternatif. VCC : Volts en courant continu. VGA : Acronyme de “Video Graphics Array”, matrice graphique vidéo. VGA et SVGA sont des normes de cartes graphiques offrant une résolution et un nombre de couleurs supérieurs à ceux des normes précédentes. volume de disque simple : Volume d'espace disponible sur un disque physique dynamique. W: Watt(s). WH : Wattheure(s).Glossaire 217 win.ini : Fichier de démarrage du système d'exploitation Windows. Au démarrage de Windows, le système d'exploitation consulte le fichier win.ini afin de déterminer les options à utiliser dans l'environnement Windows. Ce fichier comprend généralement aussi des sections qui contiennent les paramètres facultatifs pour les programmes Windows installés sur le disque dur. Windows 2000 : Système d'exploitation Microsoft Windows complet et intégré qui ne requiert pas MS-DOS et fournit des performances avancées en matière de système d'exploitation, une facilité d'utilisation accrue, des fonctions de collaboration améliorées ainsi qu'un système simplifié de navigation et de gestion des fichiers. Windows Powered : Se dit d'un système d'exploitation Windows conçu pour les systèmes NAS (stockage relié au réseau) et dédié au service des fichiers pour les clients réseau. Windows Server 2003 : Ensemble de technologies Microsoft permettant l'intégration de logiciels via l'utilisation de services Web XML. Ces services sont de petites applications réutilisables écrites en XML, qui permettent de transférer des données entre des sources qui ne sont pas connectées par un autre moyen. XML : Acronyme de “Extensible Markup Language”. Le langage XML sert à créer des formats communs d'information, puis à partager le format et les données sur le Web, les intranets, etc. ZIF : Acronyme de “Zero insertion force”, force d'insertion nulle.218 GlossaireIndex 219 Index A Alerte, messages, 47 Assemblage du panneau de commande Installation, 136 Retrait, 133 Avertissement, messages, 47 B Barrettes de mémoire (DIMM) Configuration, 105 Dépannage, 176 Installation, 109 Retrait, 111 Batterie (RAID) Dépannage, 181 Installation, 129 Batterie RAID, 129 Blocs d'alimentation Dépannage, 173 Réinstallation, 82 Retrait, 81 BMC Configuration, 69 Module de configuration, 13 C Cache de lecteur Installation, 123 Retrait, 122 Cadre, 74 Capot Fermeture, 77 Ouverture, 75 Carte adaptatrice pour les ventilateurs Installation, 148 Retrait, 146 Carte contrôleur SAS Installation, 127 Retrait, 127 Carte de distribution de l'alimentation Installation, 156 Retrait, 154 Carte de fond de panier SAS Connecteurs, 199 Installation, 142 Retrait, 138 Carte RAC Connecteurs, 95 Installation, 94 Logement d'extension, 87 Port système, 18 Carte réseau fille220 Index Installation, 101 Retrait, 104 Carte SD Installation, 101 Carte système Cavaliers, 193 Connecteurs, 195 Installation, 152, 158 Retrait, 149 Cartes d'extension Contrôleur SAS, 127 Dépannage, 184 Installation, 89 Retrait, 91 Cavaliers (carte système), 193 Clavier Dépannage, 164 Commutateur d'intrusion du châssis Installation, 137 Retrait, 136 Connecteurs Carte de fond de panier SAS, 199 Carte système, 195 Module PEM, 198 Panneau arrière, 19 Panneau avant, 14 Consignes Installation de cartes d'extension, 87 Installation de mémoire, 105 Contacter Dell, 203 Contrôleur d'accès distant Voir Carte RAC. Contrôleur RAID Dépannage, 181 Contrôleur SAS Batterie RAID, 129 Dépannage, 181 Coordonnées téléphoniques, 203 D Dell Coordonnées, 203 Démarrage, touches accessibles, 12 Dépannage Batterie (RAID), 181 Blocs d'alimentation, 173 Carte contrôleur RAID SAS, 181 Cartes d'extension, 184 Clavier, 164 Connexions externes, 163 Disque dur, 179 Incidents liés à l'alimentation, 162 Lecteur de bande, 183 Lecteur optique, 178 Mémoire, 176 NIC, 169 Périphérique d'E/S série, 167 Périphérique USB, 167 Pile (du système), 172 Processeurs, 186 Refroidissement du système, 174 Routine de démarrage, 161Index 221 Système endommagé, 171 Système mouillé, 170 Ventilateurs, 174 Vidéo, 163 Diagnostics Contexte d'utilisation, 190 messages, 47 Options de test, 191 Options de test avancées, 191 DIMM Voir Barrettes de mémoire. Disque dur SAS Voir Disques durs (SAS/SATA). Disque dur SATA Voir Disques durs (SAS/SATA). Disques durs (SAS/SATA) Codes des voyants, 16 Dépannage, 179 ID, 120 Installation, 124 Périphérique d'amorçage, 122 Retrait, 123 Support de lecteur, 126 Disques durs enfichables à chaud, 120 Dissipateur de chaleur, 114 E Écrans du programme de configuration du système Écran principal, 51 Informations sur la mémoire, 54 Périphériques intégrés, 57 Sécurité du système, 60 I Installation, 114 Assemblage du panneau de commande, 136 Barrettes de mémoire, 109 Batterie RAID, 129 Cache de disque dur, 123 Carte adaptatrice pour les ventilateurs, 148 Carte d'extension, 89 Carte de distribution de l'alimentation, 156 Carte de fond de panier SAS, 142 Carte RAC, 94 Carte réseau fille, 101 Carte SD, 101 Clé de mémoire USB, 98 Commutateur d'intrusion du châssis, 137 Contrôleur SAS, 127 Disques durs, 124 Dissipateur de chaleur, 114 Lecteur optique, 118 Processeur, 113, 115 L Lecteur de bande (externe) Connexion, 129 Dépannage, 183 Lecteur de CD/DVD222 Index Voir Lecteur optique. Lecteur optique Dépannage, 178 Installation, 118 Support de lecteur, 118-119 Logements Voir Logements d'extension. Logements d'extension, 87 M Maintenance Assemblage du panneau de commande, 133 Carte adaptatrice pour les ventilateurs, 146 Carte de distribution de l'alimentation, 154 Carte système, 149 Commutateur d'intrusion du châssis, 136 Messages Alerte, 47 Avertissement, 47 Codes des voyants de disque durs, 16 Diagnostic, 47 Écran LCD, 22 Système, 37 Microprocesseur Voir Processeur. Module d'extension processeurs Voir Module PEM. Module PEM Connecteurs, 198 Réinstallation, 87 Retrait, 83 Mot de passe de configuration Définition, 67 Modification, 68 Utilisation, 67 Mot de passe système Définition, 64 Modification, 66 Suppression, 66 Utilisation, 64 Mots de passe Configuration, 67 Désactivation, 194 Système, 64 N NIC Connecteurs du panneau arrière, 18 Dépannage, 169 Voyants, 21 Numéros de téléphone, 203 O Outils nécessaires, 72 Outils recommandés, 72Index 223 P Panneau arrière, caractéristiques, 18 Panneau avant, caractéristiques, 14 Périphérique d'amorçage Configuration, 122 Périphérique d'E/S série Dépannage, 167 Périphérique de stockage Fibre Channel, 130 Périphérique USB Connecteurs du panneau arrière, 18 Connecteurs du panneau avant, 14 Dépannage, 167 Pile du système Dépannage, 172 Remplacement, 131 PowerNow!, 57 Processeur Dépannage, 186 Installation, 115 Remplacement, 113 Programme de configuration du système Accès, 49 Options, 51 Options relatives aux communications série, 59 Touches de navigation, 50 Protecteur de ventilation Réinstallation, 81 Retrait, 79 R Refroidissement du système Dépannage, 174 Réinstallation Bloc d'alimentation, 82 Module PEM, 87 Protecteur de ventilation, 81 Ventilateur, 79 Remplacement Batterie RAID, 129 Pile du système, 131 Processeur, 113 Retrait Assemblage du panneau de commande, 133 Barrettes de mémoire, 111 Bloc d'alimentation, 81 Cache de disque dur, 122 Cadre, 74 Capot, 75 Carte adaptatrice pour les ventilateurs, 146 Carte d'extension, 91 Carte de distribution de l'alimentation, 154 Carte de fond de panier SAS, 138 Carte réseau fille, 104 Carte système, 149 Commutateur d'intrusion du châssis, 136 Contrôleur SAS, 127224 Index Disques durs, 123 Module PEM, 83 Protecteur de ventilation, 79 Ventilateur, 77 S Sécurité, 161 Support Contacter Dell, 203 Support de lecteur Disque dur, 124 Lecteur optique, 118 Support ZIF, 113 Système Fermeture, 77 Ouverture, 75 Système mouillé Dépannage, 170 Système, messages, 37 T Touches Démarrage, 12 Fonctions de la carte RAC, 13 Programme de configuration du système, 49 Touches accessibles pendant l'auto-test de démarrage, 12 V Ventilateur Dépannage, 174 Réinstallation, 79 Retrait, 77 Vidéo Connecteur du panneau arrière, 18 Connecteur du panneau avant, 14 Dépannage, 163 Voyants Alimentation, 19 Disque dur, 16 NIC, 21 Panneau arrière, 18 Panneau avant, 14 w w w . d e l l . c o m | s u p p o r t . d e l l . c o m Systèmes Dell™ PowerEdge™ 1900 Manuel du propriétaireRemarques, avis et précautions REMARQUE : une REMARQUE indique des informations importantes qui peuvent vous aider à mieux utiliser votre ordinateur. AVIS : un AVIS vous avertit d'un risque de dommage matériel ou de perte de données et vous indique comment éviter le problème. PRÉCAUTION : une PRÉCAUTION indique un risque potentiel d'endommagement du matériel, de blessure corporelle ou de mort. ____________________ Les informations contenues dans ce document peuvent être modifiées sans préavis. © 2006 Dell Inc. Tous droits réservés. La reproduction de ce document de quelque manière que ce soit sans l'autorisation écrite de Dell Inc. est strictement interdite. Marques utilisées dans ce document : Dell, le logo DELL, Inspiron, Dell Precision, Dimension, OptiPlex, Latitude, PowerEdge, PowerVault, PowerApp, PowerConnect, XPS et Dell OpenManage sont des marques de Dell Inc. ; Intel, Pentium, Xeon et Celeron sont des marques déposées de Intel Corporation ; Microsoft et Windows sont des marques déposées de Microsoft Corporation ; EMC est une marque déposée d'EMC Corporation. Tous les autres noms de marques et marques commerciales utilisés dans ce document se rapportent aux sociétés propriétaires des marques et des noms de ces produits. Dell Inc. décline tout intérêt dans l'utilisation des marques déposées et des noms de marques ne lui appartenant pas. Mars 2006Sommaire 3 Sommaire 1 Présentation du système Autres informations utiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Fonctions du système accessibles au démarrage . . . . . . . . . . . . . . . 10 Voyants et caractéristiques du panneau avant . . . . . . . . . . . . . . . . . 11 Voyants et caractéristiques du panneau arrière . . . . . . . . . . . . . . . . 13 Connexion de périphériques externes . . . . . . . . . . . . . . . . . . . 14 Codes des voyants de NIC . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 Messages d'état affichés sur l'écran LCD. . . . . . . . . . . . . . . . . . . . 15 Résolution des incidents décrits par les messages d'état de l'écran LCD . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 Suppression des messages d'état de l'écran LCD . . . . . . . . . . . . . 22 Messages système . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 Messages d'avertissement . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 Messages de diagnostic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 Messages d'alerte . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 2 Utilisation du programme de configuration du système Accès au programme de configuration du système. . . . . . . . . . . . . . . 31 Réponse aux messages d'erreur . . . . . . . . . . . . . . . . . . . . . . 32 Utilisation du programme de configuration du système . . . . . . . . . . 32 Options du programme de configuration du système . . . . . . . . . . . . . . 33 Écran principal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 Écran CPU Information (Informations sur le processeur) . . . . . . . . . 36 Écran Integrated Devices (Périphériques intégrés) . . . . . . . . . . . . 37 Écran Serial Communication (Communication série) . . . . . . . . . . . 38 Écran System Security (Sécurité du système) . . . . . . . . . . . . . . . 38 Écran Exit (Quitter) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 394 Sommaire Mot de passe du système et mot de passe de configuration . . . . . . . . . . 40 Utilisation du mot de passe du système . . . . . . . . . . . . . . . . . . 40 Utilisation du mot de passe de configuration. . . . . . . . . . . . . . . . 42 Désactivation d'un mot de passe oublié . . . . . . . . . . . . . . . . . . . . 43 Configuration du contrôleur BMC . . . . . . . . . . . . . . . . . . . . . . . . 43 Accès au module de configuration BMC . . . . . . . . . . . . . . . . . . 44 Options du module de configuration du contrôleur BMC . . . . . . . . . 44 3 Installation des composants du système Outils recommandés . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 Ouverture et fermeture du système . . . . . . . . . . . . . . . . . . . . . . . 46 Retrait du cadre. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46 Installation du cadre . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47 Ouverture du système. . . . . . . . . . . . . . . . . . . . . . . . . . . . 47 Fermeture du système . . . . . . . . . . . . . . . . . . . . . . . . . . . 47 Bloc d'alimentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 Retrait du bloc d'alimentation . . . . . . . . . . . . . . . . . . . . . . . 49 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50 Installation du bloc d'alimentation . . . . . . . . . . . . . . . . . . . . . 51 Ventilateurs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52 Retrait et installation d'un ventilateur . . . . . . . . . . . . . . . . . . . 53 Retrait et installation du protecteur de ventilation . . . . . . . . . . . . . 54 Cartes d'extension . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 Installation d'une carte d'extension . . . . . . . . . . . . . . . . . . . . 57 Retrait d'une carte d'extension. . . . . . . . . . . . . . . . . . . . . . . 58 Disques durs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59 Retrait d'un disque dur . . . . . . . . . . . . . . . . . . . . . . . . . . . 59 Installation d'un disque dur. . . . . . . . . . . . . . . . . . . . . . . . . 62 Unité interne de sauvegarde sur bande . . . . . . . . . . . . . . . . . . . . . 66 Retrait d'une unité SCSI interne de sauvegarde sur bande . . . . . . . . 66 Installation d'une unité SCSI interne de sauvegarde sur bande . . . . . . 68 Lecteur optique. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70 Retrait d'un lecteur optique. . . . . . . . . . . . . . . . . . . . . . . . . 70 Installation d'un lecteur optique . . . . . . . . . . . . . . . . . . . . . . 71Sommaire 5 Lecteur de disquette . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72 Retrait du lecteur de disquette . . . . . . . . . . . . . . . . . . . . . . . 72 Installation du lecteur de disquette dans son support . . . . . . . . . . . 73 Installation du lecteur de disquette. . . . . . . . . . . . . . . . . . . . . 74 Pile du système. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75 Remplacement de la pile du système. . . . . . . . . . . . . . . . . . . . 75 Protecteur de ventilation . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76 Retrait du protecteur de ventilation . . . . . . . . . . . . . . . . . . . . 76 Installation du protecteur de ventilation . . . . . . . . . . . . . . . . . . 77 Supports de ventilateur . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78 Retrait du support de ventilateur central . . . . . . . . . . . . . . . . . . 78 Réinstallation du support de ventilateur central . . . . . . . . . . . . . . 78 Retrait du support de ventilateur arrière . . . . . . . . . . . . . . . . . . 79 Réinstallation du support de ventilateur arrière . . . . . . . . . . . . . . 79 Mémoire . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80 Consignes générales pour l'installation des barrettes de mémoire . . . . 81 Configurations de mémoire entraînant une dégradation des performances . . . . . . . . . . . . . . . . . . . . 82 Prise en charge d'une mémoire de réserve . . . . . . . . . . . . . . . . 82 Prise en charge de la mise en miroir de la mémoire . . . . . . . . . . . . 82 Installation de barrettes de mémoire . . . . . . . . . . . . . . . . . . . . 82 Retrait de barrettes de mémoire . . . . . . . . . . . . . . . . . . . . . . 84 Installation d'une carte RAC. . . . . . . . . . . . . . . . . . . . . . . . . . . 85 Activation du moteur TOE sur le NIC intégré . . . . . . . . . . . . . . . . . . 87 Microprocesseur. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87 Remplacement d'un processeur . . . . . . . . . . . . . . . . . . . . . . 87 Carte contrôleur fille RAID SAS . . . . . . . . . . . . . . . . . . . . . . . . . 91 Remplacement de la pile d'une carte contrôleur fille RAID SAS. . . . . . 91 Retrait de la carte contrôleur fille RAID SAS . . . . . . . . . . . . . . . 93 Installation d'une carte contrôleur fille RAID SAS . . . . . . . . . . . . . 946 Sommaire Configuration du lecteur d'amorçage . . . . . . . . . . . . . . . . . . . . . . 94 Assemblage du panneau de commande (maintenance uniquement). . . . . . 94 Retrait de l'assemblage du panneau de commande . . . . . . . . . . . . 94 Installation de l'assemblage du panneau de commande . . . . . . . . . 96 Carte système (maintenance uniquement) . . . . . . . . . . . . . . . . . . . 96 Retrait de la carte système . . . . . . . . . . . . . . . . . . . . . . . . . 96 Installation de la carte système. . . . . . . . . . . . . . . . . . . . . . . 99 4 Dépannage du système La sécurité d'abord, pour vous et pour le système . . . . . . . . . . . . . . 101 Routine de démarrage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101 Vérification du matériel . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102 Résolution des conflits d'attribution d'IRQ . . . . . . . . . . . . . . . . 102 Dépannage des connexions externes . . . . . . . . . . . . . . . . . . 103 Dépannage du sous-système vidéo . . . . . . . . . . . . . . . . . . . 103 Dépannage du clavier . . . . . . . . . . . . . . . . . . . . . . . . . . 104 Dépannage de la souris. . . . . . . . . . . . . . . . . . . . . . . . . . 104 Dépannage des fonctions d'E-S de base . . . . . . . . . . . . . . . . . . . 105 Dépannage d'un périphérique d'E-S série . . . . . . . . . . . . . . . . 105 Dépannage d'un périphérique USB . . . . . . . . . . . . . . . . . . . 106 Dépannage d'un NIC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106 Dépannage d'un système mouillé . . . . . . . . . . . . . . . . . . . . . . . 107 Dépannage d'un système endommagé . . . . . . . . . . . . . . . . . . . . 108 Dépannage de la pile du système . . . . . . . . . . . . . . . . . . . . . . . 108 Dépannage du bloc d'alimentation . . . . . . . . . . . . . . . . . . . . . . 109 Dépannage des incidents de refroidissement du système . . . . . . . . . . 110 Dépannage d'un ventilateur . . . . . . . . . . . . . . . . . . . . . . . 110Sommaire 7 Dépannage de la mémoire système . . . . . . . . . . . . . . . . . . . . . . 111 Dépannage d'un lecteur de disquette . . . . . . . . . . . . . . . . . . . . . 113 Dépannage d'un lecteur optique . . . . . . . . . . . . . . . . . . . . . . . 114 Dépannage d'un lecteur de bande SCSI externe . . . . . . . . . . . . . . . 115 Dépannage d'un disque dur . . . . . . . . . . . . . . . . . . . . . . . . . . 116 Dépannage d'une carte contrôleur SAS ou d'une carte contrôleur fille RAID SAS . . . . . . . . . . . . . . . . . . . 117 Dépannage des cartes d'extension . . . . . . . . . . . . . . . . . . . . . . 119 Dépannage des microprocesseurs . . . . . . . . . . . . . . . . . . . . . . 120 5 Exécution des diagnostics du système Utilisation des diagnostics de Server Administrator . . . . . . . . . . . . . 123 Fonctionnalités des diagnostics du système . . . . . . . . . . . . . . . . . 123 Quand utiliser les diagnostics du système . . . . . . . . . . . . . . . . . . 124 Exécution des diagnostics du système . . . . . . . . . . . . . . . . . . . . 124 Options de test des diagnostics du système. . . . . . . . . . . . . . . . . . 124 Utilisation des options de test personnalisées . . . . . . . . . . . . . . . . 125 Sélection de périphériques à tester . . . . . . . . . . . . . . . . . . . 125 Sélection d'options de diagnostic . . . . . . . . . . . . . . . . . . . . 125 Visualisation des informations et des résultats . . . . . . . . . . . . . 125 6 Cavaliers et connecteurs Cavaliers de la carte système . . . . . . . . . . . . . . . . . . . . . . . . . 127 Connecteurs de la carte système . . . . . . . . . . . . . . . . . . . . . . . 129 Désactivation d'un mot de passe oublié . . . . . . . . . . . . . . . . . . . 1318 Sommaire 7 Obtention d'aide Assistance technique . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133 Services en ligne . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134 Service AutoTech . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134 Service d'état des commandes automatisé . . . . . . . . . . . . . . . 135 Service de support technique . . . . . . . . . . . . . . . . . . . . . . 135 Service Dell de formation et de certification pour les entreprises. . . . . . 135 Incidents liés à votre commande . . . . . . . . . . . . . . . . . . . . . . . 135 Informations produit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135 Renvoi d'articles pour une réparation sous garantie ou un remboursement sous forme de crédit. . . . . . . . . . . . . . . . . . 136 Avant d'appeler . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136 Contacter Dell . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138 Glossaire . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157 Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167Présentation du système 9 Présentation du système Cette section décrit les caractéristiques essentielles au fonctionnement du système (matériel, micrologiciel et interface logicielle). Les connecteurs situés sur les panneaux avant et arrière permettent au système de bénéficier d'une connectivité optimale et de nombreuses possibilités d'extension. Le micrologiciel, le système d'exploitation et les applications gèrent le système ainsi que l'état des composants. Ils vous alertent lorsqu'un incident survient. Les informations concernant l'état du système peuvent être transmises par les éléments suivants : • Voyants des panneaux avant et arrière • Messages du système • Messages d'avertissement • Messages de diagnostic • Messages d'alerte Cette section décrit chaque type de message, répertorie les causes possibles et les mesures à prendre pour résoudre les incidents indiqués. Les voyants et les caractéristiques du système sont présentés dans cette section. Autres informations utiles PRÉCAUTION : le Guide d'informations sur le produit contient d'importantes informations se rapportant à la sécurité et aux réglementations. Les informations sur la garantie se trouvent soit dans ce document, soit à part. • Le Guide de mise en route décrit les caractéristiques du système, les procédures de configuration et les spécifications techniques. • Les CD fournis avec le système contiennent des documents et des outils relatifs à la configuration et à la gestion du système. • La documentation du logiciel de gestion de systèmes comprend des renseignements sur les fonctionnalités, les spécifications, l'installation et le fonctionnement de base du logiciel. • La documentation du système d'exploitation indique comment installer (au besoin), configurer et utiliser le système d'exploitation.10 Présentation du système • La documentation fournie avec les composants achetés séparément contient des informations permettant de configurer et d'installer ces options. • Des mises à jour sont parfois fournies avec le système. Elles décrivent les modifications apportées au système, aux logiciels ou à la documentation. REMARQUE : vérifiez toujours si des mises à jour sont disponibles sur le site support.dell.com et lisez-les en premier, car elles remplacent souvent les informations contenues dans les autres documents. • Des notes de version ou des fichiers lisez-moi (readme) sont parfois fournis ; ils contiennent des mises à jour de dernière minute apportées au système ou à la documentation, ou des documents de référence technique avancés destinés aux utilisateurs expérimentés ou aux techniciens. Fonctions du système accessibles au démarrage Le tableau 1-1 décrit certaines touches pouvant être utilisées lors du démarrage pour accéder aux caractéristiques du système. Si le système d'exploitation commence à se charger alors que vous n'avez pas encore appuyé sur la touche voulue, laissez-le finir de démarrer, puis arrêtez-le et réessayez. Tableau 1-1. Touches d'accès aux fonctions du système Touche(s) Description Permet d'accéder au programme de configuration du système. Voir “Utilisation du programme de configuration du système”, page 31. Ouvre la partition d'utilitaires, qui permet d'exécuter les diagnostics. Voir “Exécution des diagnostics du système”, page 124. Permet d'accéder à l'écran qui permet de sélectionner un périphérique d'amorçage. Lance l'environnement PXE (Preboot eXecution Environment, environnement d'exécution avant démarrage). Ouvre l'utilitaire de gestion du contrôleur BMC (BaseBoard Management Controller), qui permet d'accéder au journal d'événements du système (SEL). Reportez-vous à la documentation du contrôleur BMC pour plus d'informations sur la configuration et l'utilisation de ce contrôleur. Ouvre l'utilitaire de configuration SAS. Reportez-vous au guide d'utilisation du contrôleur SAS en option pour plus d'informations. Cette combinaison de touches permet également de configurer les niveaux de RAID matériel 0 et 1. Ouvre l'utilitaire de configuration RAID, qui permet de configurer une carte contrôleur fille RAID SAS en option. Pour plus d'informations, consultez la documentation de la carte RAID. Cette combinaison de touches permet également de configurer les niveaux de RAID matériel 0, 1, 5 et 10. Cette option s'affiche uniquement si le support PXE est activé dans le programme de configuration du système (voir “Écran Integrated Devices (Périphériques intégrés)”, page 37). La combinaison de touches permet de configurer les paramètres du NIC pour le démarrage PXE. Pour plus d'informations, consultez la documentation du NIC intégré. Si vous utilisez le contrôleur DRAC (Dell Remote Access Controller) en option, cette combinaison de touches permet d'accéder aux paramètres de configuration correspondants. Consultez le guide d'utilisation du contrôleur DRAC pour plus d'informations sur la configuration et l'utilisation de ce contrôleur. Présentation du système 11 Voyants et caractéristiques du panneau avant La figure 1-1 présente les boutons, les voyants et les connecteurs situés derrière le cadre du panneau avant. Le tableau 1-2 contient la description de ces différents composants. Figure 1-1. Voyants et caractéristiques du panneau avant Tableau 1-2. Composants du panneau avant Numéro Composant Icône Description 1 Voyant d'activité du disque dur Ce voyant d'activité vert clignote lorsque les disques durs sont en cours d'utilisation. 2 Voyant et bouton d'alimentation Le voyant d'alimentation est fixe quand le système est allumé. Le bouton d'alimentation contrôle la sortie du bloc d'alimentation en CC qui alimente le système. REMARQUE : si vous éteignez un ordinateur utilisant un système d'exploitation conforme ACPI en appuyant sur le bouton d'alimentation, le système peut effectuer un arrêt normal avant que l'alimentation ne soit coupée. Si le système d'exploitation n'est pas conforme ACPI, une pression sur le bouton d'alimentation l'éteint immédiatement. 10 11 2 7 3 5 6 9 4 1 812 Présentation du système 3 Bouton NMI Utilisé pour la résolution de certains incidents liés aux logiciels et aux pilotes de périphériques avec certains systèmes d'exploitation. Pour l'activer, utilisez la pointe d'un trombone. Utilisez-le uniquement si un technicien de support qualifié vous demande de le faire, ou si cela est préconisé dans la documentation du système d'exploitation. 4 Bouton d'identification du système Les boutons d'identification des panneaux avant et arrière peuvent servir à identifier un système spécifique au sein d'un rack. Si on appuie sur un de ces boutons, l'écran LCD du panneau avant et le voyant bleu d'état du système situé sur le panneau arrière clignotent jusqu'à ce que l'utilisateur appuie de nouveau sur l'un des boutons. 5 Écran LCD Affiche l'ID du système, des informations d'état et des messages d'erreur. L'écran LCD est bleu lorsque le système fonctionne normalement. Les logiciels de gestion de systèmes, tout comme les boutons d'identification situés à l'avant et à l'arrière du système, peuvent faire clignoter l'écran LCD en bleu pour identifier un système spécifique. L'écran LCD s'allume en orange lorsque le système nécessite une intervention. Il affiche alors un code d'erreur suivi d'un texte descriptif. REMARQUE : si le système est connecté à l'alimentation en CA et si une erreur a été détectée, l'écran LCD s'allume en orange, que le système soit allumé ou non. 6 Connecteurs USB (2) Permettent de connecter des périphériques compatibles USB 2.0 au système. 7 Connecteur vidéo Permet de connecter un moniteur au système. 8 Lecteur optique Lecteur optique (en option). 9 Unité de sauvegarde sur bande Unité de sauvegarde sur bande mi-hauteur (en option – peut nécessiter un contrôleur, en option également). 10 Lecteur de disquette Lecteur de disquette (en option). 11 Disques durs Six baies pour disques durs SATA ou SAS de 3,5 pouces. Tableau 1-2. Composants du panneau avant (suite) Numéro Composant Icône DescriptionPrésentation du système 13 Voyants et caractéristiques du panneau arrière La figure 1-2 présente les boutons, les voyants et les connecteurs situés sur le panneau arrière du système. Figure 1-2. Voyants et caractéristiques du panneau arrière 1 Logements de cartes d'extension (6) 2 Connecteur d'accès distant (en option) 3 Voyant d'état du système 4 Bouton d'identification du système 5 Connecteur du voyant d'état du système 6 Connecteur de NIC 7 Connecteurs USB (4) 8 Bloc d'alimentation 9 Connecteur vidéo 10 Connecteur série 1 5 8 6 10 4 7 3 2 914 Présentation du système Connexion de périphériques externes Appliquez les consignes suivantes lorsque vous connectez des périphériques externes au système : • La plupart des périphériques doivent être reliés à un connecteur spécifique et requièrent l'installation de pilotes pour pouvoir fonctionner correctement. Les pilotes sont généralement fournis avec le système d'exploitation ou avec le périphérique lui-même. Consultez la documentation du périphérique pour obtenir des instructions spécifiques sur l'installation et la configuration. • Avant de connecter un périphérique externe, mettez toujours le système hors tension. Le périphérique doit également être éteint. Ensuite, allumez les périphériques externes avant le système, à moins que la documentation du périphérique ne stipule le contraire. Pour plus d'informations sur l'activation, la désactivation et la configuration des ports d'E-S et des connecteurs, voir “Utilisation du programme de configuration du système”, page 31. Codes des voyants de NIC Le connecteur réseau du panneau arrière est équipé d'un voyant qui fournit des informations sur l'activité du réseau et l'état de la connexion. Voir la figure 1-3. Le tableau 1-3 répertorie les codes des voyants de NIC. Figure 1-3. Voyants de NIC 1 Voyant de lien 2 Voyant d'activité Tableau 1-3. Codes des voyants de NIC Voyant Code du voyant Les voyants de lien et d'activité sont éteints. Le NIC n'est pas connecté au réseau. Le voyant de lien est vert. Le NIC est connecté à un périphérique valide sur le réseau. Le voyant d'activité clignote en orange. Des données sont en cours d'envoi ou de réception sur le réseau. 1 2Présentation du système 15 Messages d'état affichés sur l'écran LCD L'écran LCD du panneau de commande affiche des messages d'état indiquant si le système fonctionne correctement ou s'il requiert une intervention. Il s'allume en bleu en cas de fonctionnement normal et en orange si une erreur est détectée. Dans ce dernier cas, il affiche un message comprenant un code d'état suivi d'un texte descriptif. Chaque message de diagnostic affiché sur l'écran LCD est associé à une priorité. Les messages prioritaires sont affichés avant les autres. Le tableau 1-4 répertorie les messages d'état qui peuvent s'afficher sur l'écran LCD et indique leur cause probable. Les messages de l'écran LCD se rapportent aux événements enregistrés dans le journal d'événements du système. Pour plus d'informations sur ce journal et sur la configuration des paramètres de gestion du système, consultez la documentation du logiciel de gestion de systèmes. PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Reportez-vous au Guide d'informations sur le produit pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l'ordinateur et la protection contre les décharges électrostatiques. REMARQUE : si le démarrage du système échoue, appuyez sur le bouton d'ID du système pendant au moins cinq secondes, jusqu'à ce qu'un code d'erreur s'affiche sur l'écran LCD. Notez ce code, puis reportez-vous à la section “Obtention d'aide”, page 133. Tableau 1-4. Messages d'état affichés sur l'écran LCD Code Texte Causes Actions correctrices N/A SYSTÈME NAME Chaîne de 62 caractères pouvant être définie par l'utilisateur dans le programme de configuration du système. Ce nom s'affiche dans les cas suivants : • Le système est sous tension. • Le système est hors tension et des erreurs POST sont affichées. Ce message est affiché uniquement pour information. Vous pouvez modifier la chaîne système dans le programme de configuration du système. Voir “Utilisation du programme de configuration du système”, page 31. E1000 FAILSAFE, Call Support Voir “Obtention d'aide”, page 133. E1114 Temp Ambient La température ambiante du système est en dehors des limites autorisées. Voir “Dépannage des incidents de refroidissement du système”, page 110.16 Présentation du système E1116 Temp Memory La température de la mémoire est en dehors des limites autorisées. La mémoire a été désactivée pour éviter tout endommagement des composants. Voir “Dépannage des incidents de refroidissement du système”, page 110. E1210 CMOS Batt La pile CMOS est manquante ou la tension est en dehors des limites autorisées. Voir “Dépannage de la pile du système”, page 108. E1211 ROMB Batt La pile RAID est manquante ou endommagée, ou bien elle ne peut pas se recharger suite à un incident lié aux conditions thermiques. Réinstallez la pile RAID. Voir “Remplacement de la pile d'une carte contrôleur fille RAID SAS”, page 91 et “Dépannage des incidents de refroidissement du système”, page 110. E12nn XX PwrGd Panne du régulateur de tension indiqué. Voir “Obtention d'aide”, page 133. E1229 CPU n VCORE Panne du régulateur de tension VCORE du processeur n. Voir “Obtention d'aide”, page 133. E122B 0.9V Over Voltage Le régulateur de tension 0,9 V a dépassé les limites autorisées. Voir “Obtention d'aide”, page 133. E122C CPU Power Fault Une panne du régulateur de tension a été détectée lors de l'activation du ou des régulateur(s) du processeur. Voir “Obtention d'aide”, page 133. E1310 RPM Fan nn Le nombre de tours par minute du ventilateur indiqué est en dehors des limites autorisées. Voir “Dépannage des incidents de refroidissement du système”, page 110. E1410 CPU n IERR Le microprocesseur indiqué renvoie une erreur système. Pour obtenir les informations les plus récentes sur le système, voir le document Information Update Tech Sheet (Fiche technique de mise à jour des informations), qui est accessible à partir du site support.dell.com. Si l'incident persiste, voir “Obtention d'aide”, page 133. Tableau 1-4. Messages d'état affichés sur l'écran LCD (suite) Code Texte Causes Actions correctricesPrésentation du système 17 E1414 CPU n Thermtrip La température du microprocesseur spécifié est en dehors de limites autorisées et celui-ci s'est arrêté. Voir “Dépannage des incidents de refroidissement du système”, page 110. Si l'incident persiste, assurez-vous que les dissipateurs de chaleur du microprocesseur sont correctement installés. Voir “Dépannage des microprocesseurs”, page 120. REMARQUE : l'écran LCD continue à afficher ce message jusqu'à ce que le cordon d'alimentation du système soit débranché puis rebranché à la source d'alimentation en CA, ou jusqu'à ce que le journal d'événements (SEL) soit vidé à l'aide de Server Assistant ou de BMC Management Utility. Consultez le document Dell OpenManage Baseboard Management Controller User's Guide (Guide d'utilisation du contrôleur BMC Dell OpenManage) pour plus d'informations concernant ces utilitaires. E1418 CPU n Presence Le processeur indiqué est manquant ou endommagé et la configuration du système n'est pas prise en charge. Voir “Dépannage des microprocesseurs”, page 120. E141C CPU Mismatch La configuration des processeurs n'est pas prise en charge par Dell. Vérifiez que les processeurs sont de même type et conformes aux spécifications techniques du microprocesseur (voir le Guide de mise en route du système). E141F CPU Protocol Le BIOS du système a renvoyé une erreur de protocole liée au processeur. Voir “Obtention d'aide”, page 133. E1420 CPU Bus PERR Le BIOS du système a renvoyé une erreur de parité liée au bus du processeur. Voir “Obtention d'aide”, page 133. E1421 CPU Init Le BIOS du système a renvoyé une erreur d'initialisation du processeur. Voir “Obtention d'aide”, page 133. E1422 CPU Machine Chk Le BIOS du système a renvoyé une erreur liée à la vérification du système. Voir “Obtention d'aide”, page 133. E1618 PS n Predictive La tension du bloc d'alimentation est en dehors des limites autorisées. Le bloc d'alimentation indiqué est défectueux ou mal installé. Voir “Dépannage du bloc d'alimentation”, page 109. Tableau 1-4. Messages d'état affichés sur l'écran LCD (suite) Code Texte Causes Actions correctrices18 Présentation du système E161C PS n Input Lost La source d'alimentation du bloc d'alimentation indiqué est indisponible ou en dehors des limites autorisées. Vérifiez la source d'alimentation du bloc d'alimentation indiqué. Si l'incident persiste, voir “Dépannage du bloc d'alimentation”, page 109. E1620 PS n Input Range La source d'alimentation du bloc d'alimentation indiqué est indisponible ou en dehors des limites autorisées. Vérifiez la source d'alimentation du bloc d'alimentation indiqué. Si l'incident persiste, voir “Dépannage du bloc d'alimentation”, page 109. E1710 I/O Channel Chk Le BIOS du système a renvoyé une erreur liée à la vérification des canaux d'E-S. Voir “Obtention d'aide”, page 133. E1711 PCI PERR Bnn Dnn Fnn PCI PERR Slot n Le BIOS du système a renvoyé une erreur de parité PCI liée à un composant résidant dans l'espace de configuration PCI du bus nn, périphérique nn, fonction nn. Le BIOS du système a renvoyé une erreur de parité PCI liée à un composant installé dans le logement PCI n. Retirez et réinstallez les cartes d'extension PCI. Si l'incident persiste, voir “Dépannage des cartes d'extension”, page 119. Si l'incident persiste, la carte système est défectueuse. Voir “Obtention d'aide”, page 133. E1712 PCI SERR Bnn Dnn Fnn PCI SERR Slot n Le BIOS du système a renvoyé une erreur système PCI liée à un composant résidant dans l'espace de configuration PCI du bus nn, périphérique nn, fonction nn. Le BIOS du système a renvoyé une erreur système PCI liée à un composant installé dans le logement n. Retirez et réinstallez les cartes d'extension PCI. Si l'incident persiste, voir “Dépannage des cartes d'extension”, page 119. Si l'incident persiste, la carte système est défectueuse. Voir “Obtention d'aide”, page 133. E1714 Unknown Err Le BIOS du système a détecté une erreur système non identifiée. Voir “Obtention d'aide”, page 133. E171F PCIE Fatal Err Bnn Dnn Fnn PCIE Fatal Err Slot n Le BIOS du système a renvoyé une erreur fatale PCIe liée à un composant résidant dans l'espace de configuration PCI du bus nn, périphérique nn, fonction nn. Le BIOS du système a renvoyé une erreur fatale PCIe liée à un composant installé dans le logement n. Retirez et réinstallez les cartes d'extension PCI. Si l'incident persiste, voir “Dépannage des cartes d'extension”, page 119. Si l'incident persiste, la carte système est défectueuse. Voir “Obtention d'aide”, page 133. Tableau 1-4. Messages d'état affichés sur l'écran LCD (suite) Code Texte Causes Actions correctricesPrésentation du système 19 E1913 CPU & Firmware Mismatch Le micrologiciel du contrôleur BMC ne prend pas en charge le processeur. Mettez à jour le micrologiciel du contrôleur BMC. Voir le document BMC User's Guide (Guide d'utilisation du contrôleur BMC) pour plus d'informations sur la configuration et l'utilisation de ce contrôleur. E2010 No Memory Aucune mémoire n'est installée dans le système. Installez de la mémoire. Voir “Mémoire”, page 80. E2011 Mem Config Err Mémoire détectée mais non configurable. Erreur détectée lors de la configuration de la mémoire. Voir “Dépannage de la mémoire système”, page 111. E2012 Unusable Memory Mémoire configurée mais inutilisable. Échec du sous-système de mémoire. Voir “Dépannage de la mémoire système”, page 111. E2013 Shadow BIOS Fail Le BIOS du système n'est pas parvenu à copier son image flash dans la mémoire. Voir “Dépannage de la mémoire système”, page 111. E2014 CMOS Fail Échec du CMOS. La RAM CMOS ne fonctionne pas correctement. Voir “Obtention d'aide”, page 133. E2015 DMA Controller Échec du contrôleur DMA. Voir “Obtention d'aide”, page 133. E2016 Int Controller Échec du contrôleur d'interruptions. Voir “Obtention d'aide”, page 133. E2017 Timer Fail Échec de rafraîchissement du temporisateur. Voir “Obtention d'aide”, page 133. E2018 Prog Timer Échec du temporisateur d'intervalle programmable. Voir “Obtention d'aide”, page 133. E2019 Parity Error Erreur de parité. Voir “Obtention d'aide”, page 133. E201A SIO Err Échec SIO. Voir “Obtention d'aide”, page 133. E201B Kybd Controller Échec du contrôleur du clavier. Voir “Obtention d'aide”, page 133. E201C SMI Init Échec d'initialisation SMI (System Management Interrupt). Voir “Obtention d'aide”, page 133. E201D Shutdown Test Échec du test d'arrêt du BIOS. Voir “Obtention d'aide”, page 133. E201E POST Mem Test Échec du test mémoire pendant l'auto-test de démarrage du BIOS. Voir “Dépannage de la mémoire système”, page 111. Si l'incident persiste, voir “Obtention d'aide”, page 133. Tableau 1-4. Messages d'état affichés sur l'écran LCD (suite) Code Texte Causes Actions correctrices20 Présentation du système E201F DRAC Config Échec de la configuration du contrôleur DRAC (Dell Remote Access Controller). Vérifiez si l'écran affiche des messages d'erreur spécifiques. Assurez-vous que les câbles et les connecteurs du contrôleur DRAC sont correctement emboîtés. Si l'incident persiste, consultez la documentation du contrôleur DRAC. E2020 CPU Config Échec de configuration du processeur. Vérifiez si l'écran affiche des messages d'erreur spécifiques. E2021 Memory Population Configuration de mémoire incorrecte. L'ordre d'insertion des barrettes de mémoire est incorrect. Vérifiez si l'écran affiche des messages d'erreur spécifiques. Voir “Dépannage de la mémoire système”, page 111. E2022 POST Fail Échec général après le test vidéo. Vérifiez si l'écran affiche des messages d'erreur spécifiques. E2110 MBE DIMM nn & nn L'une des barrettes DIMM du groupe “nn & nn” présente une erreur de mémoire multibits (MBE). Voir “Dépannage de la mémoire système”, page 111. E2111 SBE Log Disable DIMM nn Le BIOS du système a désactivé la consignation des erreurs de mémoire portant sur un seul bit (SBE) jusqu'au prochain redémarrage du système. “nn” représente la barrette DIMM indiquée par le BIOS. Voir “Dépannage de la mémoire système”, page 111. E2112 Mem Spare DIMM nn Le BIOS du système a réservé la mémoire car il a détecté un nombre d'erreurs trop important. “nn & nn” représente la paire de barrettes DIMM indiquée par le BIOS. Voir “Dépannage de la mémoire système”, page 111. E2113 Mem Mirror DIMM nn & nn Le BIOS du système a désactivé la mise en miroir de la mémoire car il a détecté qu'une moitié du miroir contenait un nombre d'erreurs trop important. “nn & nn” représente la paire de barrettes DIMM indiquée par le BIOS. Voir “Dépannage de la mémoire système”, page 111. E2118 Fatal NB Mem CRC L'une des connexions du soussystème de mémoire FB-DIMM a échoué en amont. Voir “Dépannage de la mémoire système”, page 111. Tableau 1-4. Messages d'état affichés sur l'écran LCD (suite) Code Texte Causes Actions correctricesPrésentation du système 21 Résolution des incidents décrits par les messages d'état de l'écran LCD Si l'écran LCD affiche un seul message, recherchez le code correspondant dans le tableau 1-4 et suivez la procédure décrite. Le code affiché sur l'écran LCD permet souvent d'identifier une panne précise pouvant facilement être corrigée. Par exemple, si le code E0780 MISSING CPU 1 s'affiche, cela signifie qu'aucun microprocesseur n'est installé dans le support 1. En outre, il est possible de déterminer la cause de l'incident si plusieurs erreurs de même type surviennent. Par exemple, si vous recevez une série de messages indiquant plusieurs incidents liés à la tension, le problème peut être lié à une défaillance d'un bloc d'alimentation. E2119 Fatal SB Mem CRC L'une des connexions du sous-système de mémoire FB-DIMM a échoué en aval. Voir “Dépannage de la mémoire système”, page 111. I1910 Intrusion Le capot du système a été retiré. Ce message s'affiche uniquement à titre d'information. I1911 >3 ERRs Chk Log Les messages à afficher dépassent la capacité de l'écran LCD. L'écran LCD ne peut afficher que trois messages d'erreur à la suite. Le quatrième message indique que la capacité de l'écran est à son maximum. Vérifiez le journal d'événements du système pour plus de détails. I1912 SEL Full Le journal d'événements du système est saturé et ne peut plus contenir d'événements. Supprimez des événements du journal. W1228 ROMB Batt < 24hr Ce message avertit qu'il reste moins de 24 heures de charge à la pile RAID. Remplacez la pile RAID. Voir “Remplacement de la pile d'une carte contrôleur fille RAID SAS”, page 91. REMARQUE : pour obtenir le nom complet d'une abréviation ou d'un sigle utilisé dans ce tableau, voir le “Glossaire”, page 157. Tableau 1-4. Messages d'état affichés sur l'écran LCD (suite) Code Texte Causes Actions correctrices22 Présentation du système Suppression des messages d'état de l'écran LCD Pour les pannes liées aux capteurs (de température, de tension, des ventilateurs, etc.), le message de l'écran LCD est supprimé automatiquement lorsque le capteur revient à la normale. Par exemple, l'écran LCD affiche un message indiquant que la température d'un composant n'est pas conforme aux limites acceptables, puis supprime ce message lorsque la température redevient normale. Pour les messages suivants, une intervention de l'utilisateur est requise : • Clear the SEL (Vider le journal d'événements du système) : cette tâche doit être effectuée à partir du logiciel de gestion du système. L'historique des événements du système sera perdu. • Power cycle (Mettre le système hors tension) : mettez le système hors tension et débranchez-le de la prise de courant. Attendez environ 10 secondes, puis rebranchez le câble d'alimentation et redémarrez le système. Ces interventions permettent d'effacer les messages d'erreur. Les voyants d'état et l'écran LCD reviennent à l'état normal. Les messages d'erreur réapparaîtront dans les conditions suivantes : • Le capteur est revenu à l'état normal mais a de nouveau subi une panne, ayant pour effet de créer une nouvelle entrée dans le journal. • Une nouvelle erreur est détectée. • Une panne a été détectée sur une autre source correspondant au même message. Messages système Le système affiche des messages d'erreur pour informer l'utilisateur qu'un incident s'est produit. Le tableau 1-5 répertorie les messages qui peuvent s'afficher et indique leur cause probable, ainsi que les mesures correctives appropriées. REMARQUE : si vous recevez un message du système qui n'est pas répertorié dans le tableau 1-5, vérifiez la documentation de l'application que vous utilisiez au moment où le message est apparu. Vous pouvez aussi vous reporter à la documentation du système d'exploitation pour obtenir une explication du message et l'action conseillée. PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Consultez le Guide d'informations sur le produit pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l'ordinateur et la protection contre les décharges électrostatiques.Présentation du système 23 Tableau 1-5. Messages système Message Causes Actions correctrices Alert! Redundant memory disabled! Memory configuration does not support redundant memory. Les barrettes de mémoire installées ne sont pas du même type ni de la même taille ; une ou plusieurs barrettes de mémoire sont défectueuses. Vérifiez que toutes les barrettes de mémoire sont du même type et de la même taille et qu'elles sont correctement installées. Voir “Mémoire”, page 80. Si l'incident persiste, voir “Dépannage de la mémoire système”, page 111. Attempting to update Remote Configuration. Please wait... Une requête de configuration à distance a été détectée et est en cours de traitement. Attendez que le processus se termine. BIOS Update Attempt Failed! La tentative de mise à jour à distance du BIOS a échoué. Réessayez de mettre le BIOS à jour. Si l'incident persiste, voir “Obtention d'aide”, page 133. Caution! NVRAM_CLR jumper is installed on system board. Le cavalier NVRAM_CLR est installé. Le CMOS a été initialisé. Retirez le cavalier NVRAM_CLR Voir la figure 6-1 pour identifier son emplacement. CPUs with different cache sizes detected! Des microprocesseurs possédant des tailles de mémoire cache différentes sont installés. Vérifiez que tous les microprocesseurs ont une taille de mémoire cache identique et qu'ils sont correctement installés. Voir “Microprocesseur”, page 87. Decreasing available memory Barrette(s) de mémoire défectueuse(s) ou mal installée(s). Voir “Dépannage de la mémoire système”, page 111. DIMM pairs must be matched in size, speed, and technology. The following DIMM pair is mismatched: DIMM x and DIMM y. Barrettes DIMM incompatibles ; barrette(s) de mémoire défectueuse(s) ou mal installée(s). Vérifiez que toutes les paires de barrettes de mémoire sont du même type et de la même taille et qu'elles sont correctement installées. Voir “Mémoire”, page 80. Si l'incident persiste, voir “Dépannage de la mémoire système”, page 111. DIMMs must be populated in sequential order beginning with slot 1. The following DIMM is electrically isolated: DIMM x. L'emplacement de la barrette DIMM indiquée n'est pas accessible. Les barrettes DIMM doivent être installées en respectant l'ordre des numéros d'emplacement. Installez 2, 4, ou 8 barrettes l'une après l'autre, en commençant par le logement 1. Voir “Mémoire”, page 80. DIMMs should be installed in pairs. Pairs must be matched in size, speed, and technology. Barrettes DIMM incompatibles ; barrette(s) de mémoire défectueuse(s) ou mal installée(s). Le fonctionnement du système risque d'être altéré et de présenter une protection ECC réduite. Seule la mémoire installée dans le canal 0 sera accessible. Vérifiez que toutes les paires de barrettes de mémoire sont du même type et de la même taille et qu'elles sont correctement installées. Voir “Mémoire”, page 80. Si l'incident persiste, voir “Dépannage de la mémoire système”, page 111.24 Présentation du système Dual-rank DIMM paired with Single-rank DIMM - The following DIMM/rank has been disabled by BIOS: DIMM x Rank y Barrettes DIMM incompatibles ; barrette(s) de mémoire défectueuse(s). Le système a détecté qu'une barrette DIMM à double rangée de connexions a été installée avec une barrette à une seule rangée de connexions. La seconde rangée de la première barrette sera désactivée. Vérifiez que toutes les paires de barrettes de mémoire sont du même type et de la même taille et qu'elles sont correctement installées. Voir “Mémoire”, page 80. Si l'incident persiste, voir “Dépannage de la mémoire système”, page 111. Diskette drive n seek failure Mauvais paramètres de configuration dans le programme de configuration du système. Lancez le programme de configuration du système pour corriger les paramètres. Voir “Utilisation du programme de configuration du système”, page 31. Lecteur de disquette défectueux ou mal installé. Remplacez la disquette. Si l'incident persiste, voir “Dépannage d'un lecteur de disquette”, page 113. Câble d'interface du lecteur de disquette ou câble d'alimentation débranché. Réinsérez le câble d'interface du lecteur de disquette ou le câble d'alimentation. Voir “Dépannage d'un lecteur de disquette”, page 113. Diskette read failure Disquette défectueuse ou mal insérée. Remplacez la disquette. Si l'incident persiste, voir “Dépannage d'un lecteur de disquette”, page 113. Diskette subsystem reset failed Disquette défectueuse ou mal insérée. Remplacez la disquette. Si l'incident persiste, voir “Dépannage d'un lecteur de disquette”, page 113. Drive not ready Disquette manquante ou mal insérée dans le lecteur. Remplacez la disquette. Si l'incident persiste, voir “Dépannage d'un lecteur de disquette”, page 113. Error: Incorrect memory configuration. DIMMs must be installed in pairs of matched memory size, speed, and technology. Barrettes DIMM incompatibles ; barrette(s) de mémoire défectueuse(s) ou mal installée(s). Vérifiez que toutes les paires de barrettes de mémoire sont du même type et de la même taille et qu'elles sont correctement installées. Voir “Mémoire”, page 80. Si l'incident persiste, voir “Dépannage de la mémoire système”, page 111. Error: Memory failure detected. Memory size reduced. Replace the faulty DIMM as soon as possible. Barrettes de mémoire défectueuses ou mal installées. Voir “Dépannage de la mémoire système”, page 111. Tableau 1-5. Messages système (suite) Message Causes Actions correctricesPrésentation du système 25 !!*** Error: Remote Access Controller initialization failure*** RAC virtual USB devices may not be available... Échec de l'initialisation du contrôleur DRAC. Assurez-vous que le contrôleur DRAC est correctement installé. Voir “Installation d'une carte RAC”, page 85. FBD training error: The following branch has been disabled: Branch x Le circuit indiqué (paire de canaux) contient des barrettes DIMM qui ne sont pas compatibles entre elles. Vérifiez que vous utilisez uniquement des barrettes de mémoire certifiées par Dell. Nous vous recommandons d'acheter les kits d'extension de mémoire directement sur le site www.dell.com ou de contacter votre représentant commercial Dell à cet effet. Gate A20 failure Contrôleur du clavier défectueux ; carte système défectueuse. Voir “Obtention d'aide”, page 133. General failure Le système d'exploitation ne peut pas exécuter la commande. Ce message est habituellement suivi d'informations spécifiques. Notez ces informations et prenez les mesures adéquates pour résoudre l'incident. Invalid NVRAM configuration, resource re-allocated Le système a détecté et corrigé un conflit de ressources. Aucune action n'est requise. Keyboard Controller failure Contrôleur du clavier défectueux ; carte système défectueuse. Voir “Obtention d'aide”, page 133. Manufacturing mode detected Le système est en mode assemblage. Redémarrez le système pour lui faire quitter le mode assemblage. MEMBIST failure - The following DIMM/rank has been disabled by BIOS: DIMM x Rank y Barrette(s) de mémoire défectueuse(s). Voir “Dépannage de la mémoire système”, page 111. Memory address line failure at address, read value expecting value Barrette(s) de mémoire défectueuse(s) ou mal installée(s). Voir “Dépannage de la mémoire système”, page 111. Memory double word logic failure at address, read value expecting value Memory odd/even logic failure at address, read value expecting value Memory write/read failure at address, read value expecting value Tableau 1-5. Messages système (suite) Message Causes Actions correctrices26 Présentation du système Memory tests terminated by keystroke. Test de la mémoire interrompu lors du POST par une pression de la barre espace. Ce message s'affiche uniquement à titre d'information. No boot device available Sous-système du lecteur optique, de disquette ou de disque dur défectueux ou manquant ; disque dur défectueux ou manquant ; aucune disquette de démarrage dans l'unité A. Utilisez une disquette, un CD ou un disque dur amorçable. Si l'incident persiste, voir “Dépannage d'un lecteur de disquette”, page 113, “Dépannage d'un lecteur optique”, page 114 et “Dépannage d'un disque dur”, page 116. Voir “Utilisation du programme de configuration du système”, page 31 pour plus d'informations sur la définition de la séquence d'amorçage. No boot sector on hard drive Paramètres incorrects dans le programme de configuration du système ; système d'exploitation introuvable sur le disque dur. Vérifiez les paramètres de configuration du disque dur dans le programme de configuration du système. Voir “Utilisation du programme de configuration du système”, page 31. Si nécessaire, installez le système d'exploitation sur le disque dur. Consultez la documentation du système d'exploitation. No timer tick interrupt Carte système défectueuse. Voir “Obtention d'aide”, page 133. Northbound merge error - The following DIMM has been disabled by BIOS: DIMM x Le barrette DIMM indiquée n'a pas pu établir de liaison de données avec le contrôleur de mémoire. Voir “Dépannage de la mémoire système”, page 111. Not a boot diskette La disquette ne contient pas de système d'exploitation. Utilisez une disquette amorçable. PCIe Degraded Link Width Error: Embedded Bus#nn/Dev#nn/Funcn Expected Link Width is n Actual Link Width is n Carte PCIe défectueuse ou mal installée dans le support spécifié. Réinstallez la carte PCIe dans le numéro de support spécifié. Voir “Cartes d'extension”, page 56. Si l'incident persiste, voir “Obtention d'aide”, page 133. PCIe Degraded Link Width Error: Slot n Expected Link Width is n Actual Link Width is n Carte PCIe défectueuse ou mal installée dans le support spécifié. Réinstallez la carte PCIe dans le numéro de support spécifié. Voir “Cartes d'extension”, page 56. Si l'incident persiste, voir “Obtention d'aide”, page 133. Tableau 1-5. Messages système (suite) Message Causes Actions correctricesPrésentation du système 27 PCIe Training Error: Embedded Bus#nn/Dev#nn/Funcn PCIe Training Error: Slot n Carte PCIe défectueuse ou mal installée dans le support spécifié. Réinstallez la carte PCIe dans le numéro de support spécifié. Voir “Cartes d'extension”, page 56. Si l'incident persiste, voir “Obtention d'aide”, page 133. PCI BIOS failed to install Un échec de la somme de contrôle du périphérique BIOS PCI (ROM d'option) est détecté lors de la duplication miroir. Câbles de carte(s) d'extension mal branchés ; carte d'extension défectueuse ou mal installée. Réinstallez les cartes PCIe dans leur logement. Vérifiez que tous les câbles sont fermement raccordés aux cartes d'extension. Si l'incident persiste, voir “Dépannage des cartes d'extension”, page 119. Plug & Play Configuration Error Erreur d'initialisation d'un périphérique PCI ; carte système défectueuse. Installez la fiche du cavalier NVRAM_CLR et redémarrez le système Voir la figure 6-1 pour identifier son emplacement. Si l'incident persiste, voir “Dépannage des cartes d'extension”, page 119. Read fault Requested sector not found Le système d'exploitation ne peut pas lire la disquette ou le disque dur, l'ordinateur n'a pas trouvé un secteur particulier sur le disque ou le secteur demandé est défectueux. Remplacez la disquette. Assurez-vous que les câbles du lecteur de disquette et du disque dur sont correctement connectés. Voir “Dépannage d'un périphérique USB”, page 106, “Dépannage d'un lecteur de disquette”, page 113 ou “Dépannage d'un disque dur”, page 116. Remote configuration update attempt failed Le système n'est pas parvenu à traiter la requête de configuration à distance. Faites une nouvelle tentative. ROM bad checksum = address Carte d'extension mal installée ou défectueuse. Réinstallez les cartes PCIe dans leur logement. Vérifiez que tous les câbles sont fermement raccordés aux cartes d'extension. Si l'incident persiste, voir “Dépannage des cartes d'extension”, page 119. SATA port n hard disk drive not found Les câbles SATA ne sont pas connectés correctement, ou bien le lecteur est introuvable. Voir “Dépannage d'un disque dur”, page 116. Sector not found Seek error Seek operation failed Lecteur de disquette ou disque dur défectueux. Voir “Dépannage d'un lecteur de disquette”, page 113 ou “Dépannage d'un disque dur”, page 116. Shutdown failure Échec du test d'arrêt. Voir “Dépannage de la mémoire système”, page 111. Tableau 1-5. Messages système (suite) Message Causes Actions correctrices28 Présentation du système The amount of system memory has changed Ajout ou suppression de mémoire, ou barrette de mémoire défectueuse. Si vous venez d'ajouter ou de supprimer de la mémoire, ce message s'affiche uniquement pour information et peut être ignoré. Dans le cas contraire, vérifiez le journal d'événements du système pour identifier les erreurs détectées et remplacez la barrette de mémoire défectueuse. Voir “Dépannage de la mémoire système”, page 111. The following DIMM pair is not compatible with the memory controller: DIMM x et DIMM y Les barrettes DIMM indiquées sont incompatibles avec le système. Vérifiez que vous utilisez uniquement des barrettes de mémoire certifiées par Dell. Nous vous recommandons d'acheter les kits d'extension de mémoire directement sur le site www.dell.com ou de contacter votre représentant commercial Dell à cet effet. The following DIMMs are not compatible: DIMM x et DIMM y Les barrettes DIMM indiquées sont incompatibles avec le système. Utilisez exclusivement des barrettes FB-DIMM1 avec ECC. Nous vous recommandons d'acheter les kits d'extension de mémoire directement sur le site www.dell.com ou de contacter votre représentant commercial Dell à cet effet. Time-of-day clock stopped Pile ou puce défectueuse. Voir “Dépannage de la pile du système”, page 108. Time-of-day not set - please run SETUP program Mauvais paramètres d'heure ou de date ; pile du système défectueuse. Vérifiez les paramètres de l'heure et de la date. Voir “Utilisation du programme de configuration du système”, page 31. Si l'incident persiste, remplacez la pile du système. Voir “Pile du système”, page 75. Timer chip counter 2 failed Carte système défectueuse. Voir “Obtention d'aide”, page 133. Unsupported CPU combination Unsupported CPU stepping detected Le ou les microprocesseurs ne sont pas pris en charge par le système. Installez un microprocesseur ou une combinaison de microprocesseurs pris en charge. Voir “Microprocesseur”, page 87. Utility partition not available Vous avez appuyé sur la touche pendant le POST, mais il n'y a pas de partition d'utilitaires sur le disque dur d'amorçage. Créez une partition d'utilitaires sur le disque dur d'amorçage. Reportez-vous aux CD fournis avec le système. Warning! No microcode update loaded for processor n La mise à jour du micrologiciel a échoué. Mettez le BIOS à jour. Voir “Obtention d'aide”, page 133. Tableau 1-5. Messages système (suite) Message Causes Actions correctricesPrésentation du système 29 Warning: Embedded RAID firmware is not present! Le micrologiciel RAID intégré ne répond pas. Lisez la documentation du contrôleur RAID pour obtenir des informations sur l'installation et la mise à jour du micrologiciel RAID. Warning: Embedded RAID error! Le micrologiciel RAID intégré renvoie une erreur. Voir “Dépannage d'une carte contrôleur SAS ou d'une carte contrôleur fille RAID SAS”, page 117. Lisez la documentation du contrôleur RAID pour obtenir des informations sur l'installation et la mise à jour du micrologiciel RAID. Warning: The current memory configuration is not optimal. Dell recommends a population of 2, 4, or 8 DIMMs. DIMMs should be populated sequentially starting in slot 1. Le système a détecté une configuration autorisée mais non optimale des barrettes DIMM (par exemple : 1 DIMM, 6 DIMM, 4 DIMM dans les logements 1, 2, 5 et 6). Le système pourra accéder à l'intégralité de la mémoire, mais ses performances ne seront pas optimales. Installez 2, 4, ou 8 barrettes l'une après l'autre, en commençant par le logement 1. Voir “Mémoire”, page 80. Write fault Write fault on selected drive Disquette ou disque dur défectueux ; défaillance du soussystème du lecteur optique/de disquette/de disque dur. Voir “Dépannage d'un lecteur de disquette”, page 113, “Dépannage d'un lecteur optique”, page 114 ou “Dépannage d'un disque dur”, page 116. REMARQUE : pour obtenir le nom complet d'une abréviation ou d'un sigle utilisé dans ce tableau, voir le “Glossaire”, page 157. Tableau 1-5. Messages système (suite) Message Causes Actions correctrices30 Présentation du système Messages d'avertissement Un message d'avertissement signale un incident possible et vous demande une réponse avant de laisser le système poursuivre son exécution. Par exemple, lorsque vous lancez le formatage d'une disquette, un message vous avertit que vous allez perdre toutes les données qu'elles contient. Les messages d'avertissement interrompent la tâche en cours et vous demandent de répondre en tapant y (pour oui) ou n (pour non). REMARQUE : ces messages sont générés par l'application ou par le système d'exploitation. pour plus d'informations, consultez la documentation fournie avec le système d'exploitation ou l'application. Messages de diagnostic Les diagnostics du système peuvent afficher un ou plusieurs messages d'erreur. Ceux-ci ne sont pas traités dans la présente section. Prenez note du message sur une copie de la liste de vérification des diagnostics (voir “Obtention d'aide”, page 133), puis suivez les instructions de cette section pour obtenir une assistance technique. Messages d'alerte Le logiciel de gestion de systèmes génère des messages d'alerte système. Ils comprennent des messages d'informations, d'état, d'avertissement et de panne concernant les conditions des lecteurs, de la température, des ventilateurs et de l'alimentation. Pour des informations supplémentaires, consultez la documentation du logiciel de gestion de systèmes.Utilisation du programme de configuration du système 31 Utilisation du programme de configuration du système Après avoir installé le système, lancez le programme de configuration pour vous familiariser avec la configuration et les paramètres facultatifs disponibles. Notez les informations contenues dans la configuration pour pouvoir vous y reporter ultérieurement. Vous pouvez utiliser le programme de configuration du système pour : • Modifier les informations de configuration stockées dans la mémoire vive rémanente après l'ajout, la modification ou le retrait de matériel • Définir ou modifier les options que l'utilisateur peut sélectionner, par exemple l'heure et la date du système • Activer ou désactiver les périphériques intégrés • Corriger les incohérences éventuelles entre le matériel installé et les paramètres de configuration Accès au programme de configuration du système 1 Allumez ou redémarrez le système. 2 Appuyez sur immédiatement après le message suivant : = System Setup Si le système d'exploitation commence à se charger alors que vous n'avez pas encore appuyé sur , laissez-le finir de démarrer, puis arrêtez-le et réessayez. REMARQUE : pour arrêter correctement le système, consultez la documentation du système d'exploitation.32 Utilisation du programme de configuration du système Réponse aux messages d'erreur Vous pouvez accéder au programme de configuration du système en répondant à certains messages d'erreur. Si un message d'erreur s'affiche quand le système démarre, prenez-en note. Avant d'accéder au programme de configuration du système, voir “Messages système”, page 22 pour trouver une explication du message et des suggestions de correction. REMARQUE : il est normal qu'un message d'erreur s'affiche lorsque vous redémarrez le système après avoir installé une extension de mémoire. Utilisation du programme de configuration du système Le tableau 2-1 répertorie les touches utilisées pour afficher ou modifier les informations affichées dans les écrans du programme de configuration du système, et pour quitter ce programme. REMARQUE : pour la plupart des options, les modifications effectuées sont enregistrées mais ne prennent effet qu'au redémarrage du système. Tableau 2-1. Touches de navigation du programme de configuration du système Touches Action Flèche vers le haut ou Le curseur passe au champ précédent. Flèche vers le bas ou Le curseur passe au champ suivant. Barre d'espacement, <+>, <–>, flèche vers la gauche ou vers la droite Permet de faire défiler les options disponibles pour un champ. Vous pouvez également taper la valeur appropriée dans certains champs. <Échap> Quitte le programme et redémarre le système si des changements ont été effectués. Ouvre le fichier d'aide du programme de configuration du système.Utilisation du programme de configuration du système 33 Options du programme de configuration du système Écran principal Lorsque vous accédez au programme de configuration du système, son écran principal apparaît (voir la figure 2-1). Figure 2-1. Écran principal du programme de configuration du système Le tableau 2-2 répertorie les options et les descriptions des champs qui apparaissent dans l'écran principal du programme de configuration du système. REMARQUE : les options disponibles varient en fonction de la configuration du système. REMARQUE : les valeurs par défaut sont répertoriées sous le paramètre correspondant, le cas échéant.34 Utilisation du programme de configuration du système Tableau 2-2. Options du programme de configuration du système Option Description System Time (Heure système) Réinitialise l'heure de l'horloge interne du système. System Date (Date système) Réinitialise la date du calendrier interne du système. Memory Information (Informations sur la mémoire) Affiche des informations relatives à la mémoire système, vidéo et redondante, y compris la taille, le type et la vitesse des barrettes de mémoire, la taille de la mémoire vidéo, l'option de test de la mémoire système, l'état de la mémoire redondante et le filtre d'analyse réseau (snoop). REMARQUE : lorsqu'il est activé, le filtre d'analyse réseau peut optimiser ou réduire les performances de certaines applications. Par défaut, l'option correspondante est désactivée. CPU Information (Informations sur le processeur) Affiche des informations relatives aux microprocesseurs (vitesse, taille de la mémoire cache, etc.). Pour activer ou désactiver la technologie Hyper-Threading, modifiez le paramètre de l'option Logical Processor (Processeur logique). Voir le tableau 2-3. SATA Port X (Port SATA n) Affiche le type et la capacité du lecteur SATA connecté au port n de la carte système. Boot Sequence (Séquence d'amorçage) Détermine l'ordre dans lequel le système recherche les périphériques d'amorçage pendant le démarrage du système. Les options disponibles sont le lecteur de disquette, le lecteur de CD, les disques durs et le réseau. REMARQUE : le démarrage du système à partir d'un périphérique externe connecté à une carte SAS ou SCSI n'est pas pris en charge. Voir le site support.dell.com pour obtenir les informations les plus récentes concernant le démarrage à partir de périphériques externes. Hard-Disk Drive Sequence (Séquence des disques durs) Indique l'ordre dans lequel les disques durs sont configurés. Sous DOS et les systèmes d'exploitation similaires, le premier disque dur est le lecteur C: amorçable. USB Flash Drive Type (Type de lecteur Flash USB) Auto (option par défaut) Détermine le type d'émulation pour le lecteur flash USB. L'option Hard disk (Disque dur) permet au lecteur flash USB de se comporter comme un disque dur. L'option Floppy (Lecteur de disquette) permet au lecteur flash USB de se comporter comme un lecteur de disquette amovible. L'option Auto choisit automatiquement le type d'émulation. Integrated Devices (Périphériques intégrés) Voir “Écran Integrated Devices (Périphériques intégrés)”, page 37. PCI IRQ Assignment (IRQ affectées aux périphériques PCI) Affiche un écran permettant de modifier l'IRQ affectée à chaque périphérique intégré du bus PCI, ainsi qu'à toutes les cartes d'extension nécessitant une IRQ. Serial Communication (Communication série) Affiche un écran permettant de configurer une communication série, un connecteur série externe, le débit de la ligne de secours, le type de terminal distant et les paramètres de redirection après amorçage.Utilisation du programme de configuration du système 35 Embedded Server Management (Gestion de serveur intégrée) Affiche un écran permettant de configurer les options de l'écran LCD du panneau avant et de définir une chaîne affichée sur cet écran. System Security (Sécurité du système) Affiche un écran permettant de configurer le mot de passe du système ainsi que les fonctions de mot de passe. Pour plus d'informations, voir “Utilisation du mot de passe du système”, page 40 et “Utilisation du mot de passe de configuration”, page 42. Keyboard NumLock (Touche Verr Num) On (Activé, valeur par défaut) Détermine si le système démarre en mode Verr Num s'il est équipé d'un clavier à 101 ou 102 touches (cette option ne s'applique pas aux claviers à 84 touches). Report Keyboard Errors (Signaler les erreurs de clavier) Report (Signaler, option par défaut) Active ou désactive la consignation des erreurs liées au clavier pendant l'autotest de démarrage. Sélectionnez Report (Signaler) pour les systèmes hôtes équipés de claviers. Sélectionnez Do Not Report (Ne pas signaler) pour supprimer tous les messages d'erreur liés au clavier ou à son contrôleur pendant l'auto-test de démarrage. Ce paramètre n'affecte pas le fonctionnement du clavier lui-même, s'il est connecté au système. Asset Tag (Numéro d'inventaire) Affiche le numéro d'inventaire du système, s'il existe. Ce numéro peut être défini par le client. Tableau 2-2. Options du programme de configuration du système (suite) Option Description36 Utilisation du programme de configuration du système Écran CPU Information (Informations sur le processeur) Le tableau 2-3 répertorie les options et les descriptions des champs qui apparaissent dans l'écran CPU Information (Informations sur le processeur). Tableau 2-3. Écran CPU Information (Informations sur le processeur) Option Description 64-bit Technology (Technologie 64 bits) Indique si le ou les processeurs installés prennent en charge les extensions Intel 64 bits. Core Speed (Vitesse d'horloge) Affiche la vitesse d'horloge du ou des processeurs. Bus Speed (Vitesse du bus) Affiche la vitesse de bus du ou des processeurs. Logical Processor (Processeur logique) Enabled (Activé, option par défaut) Indique si les processeurs prennent en charge la fonction HyperThreading. L'option Enabled (Activé) permet au système d'exploitation d'utiliser tous les processeurs logiques. Si l'option Disabled (Désactivé) est sélectionnée, seul le premier processeur logique de chaque processeur installé est utilisé par le système d'exploitation. Virtualization Technology (Technologie Virtualization) Disabled (Désactivé, option par défaut) S'affiche si le ou les processeurs prennent en charge la technologie Virtualization. L'option Enabled (Activé) permet aux logiciels de virtualisation d'utiliser cette technologie intégrée au processeur. Cette fonction peut être utilisée uniquement par les logiciels compatibles. Adjacent Cache Line Prefetch (Prélecture de la ligne adjacente dans la mémoire cache) Enabled (Activé, option par défaut) Active ou désactive l'utilisation optimale de l'accès séquentiel à la mémoire. Désactivez cette option pour les applications utilisant un accès aléatoire à la mémoire. Hardware Prefetcher (Service Prefetcher pour le matériel) Enabled (Activé, option par défaut) Active ou désactive le service Prefetcher pour le matériel. Demand-Based Power Management (Gestion de l'alimentation en fonction de la demande) Disabled (Désactivé, option par défaut) Active ou désactive la gestion de l'alimentation en fonction de la demande. Si cette option est activée, les tables d'état des performances du processeur sont envoyées au système d'exploitation. Si l'un des processeurs ne prend pas en charge la gestion de l'alimentation en fonction de la demande, le champ est en lecture seule et est défini sur Disabled (Désactivé). Processor X ID (ID Processeur X) Affiche la série et le numéro de modèle de chaque processeur. Un sous-menu affiche la vitesse d'horloge du processeur, la quantité de mémoire cache de niveau 2 et le nombre de noyaux.Utilisation du programme de configuration du système 37 Écran Integrated Devices (Périphériques intégrés) Le tableau 2-4 répertorie les options et les descriptions des champs qui apparaissent dans l'écran Integrated Devices (Périphériques intégrés). Tableau 2-4. Options de l'écran Integrated Devices (Périphériques intégrés) Option Description Integrated SAS Controller (Contrôleur SAS intégré) Enabled (Activé, option par défaut) Active ou désactive le contrôleur SAS intégré. Cette option s'affiche uniquement si un contrôleur SAS est installé. Integrated RAID Controller (Contrôleur RAID intégré) Enabled (Activé, option par défaut) Active ou désactive le contrôleur RAID intégré. Cette option s'affiche uniquement si un contrôleur RAID SAS est installé. Embedded SATA (SATA intégré) Off (Désactivé, option par défaut) Permet de paramétrer le contrôleur SATA intégré sur Off (Désactivé) ou sur ATA Mode (Mode ATA). IDE CD-ROM Controller (Contrôleur de lecteur de CD-ROM IDE) Auto (option par défaut) Active le contrôleur IDE intégré. L'option Auto active tous les canaux du contrôleur IDE intégré si ceux-ci sont connectés à des périphériques IDE. Diskette Controller (Contrôleur de lecteur de disquette) Auto (option par défaut) Active ou désactive le contrôleur du lecteur de disquette. Si l'option Auto est sélectionnée, le système désactive le contrôleur pour pouvoir prendre en charge une carte contrôleur installée dans un logement d'extension. Les autres options disponibles sont Read-Only (Lecture seule) et Off (Désactivé). Si vous sélectionnez Read-Only, le lecteur ne peut pas être utilisé pour écrire des données. User Accessible USB Ports (Ports USB accessibles aux utilisateurs) All Ports On (Tous ports activés, option par défaut) Active ou désactive les ports USB du système qui sont accessibles à l'utilisateur. Les options disponibles sont All Ports On (Tous ports activés), Only Back Ports On (Ports arrières activés) et All Ports Off (Tous ports désactivés). Embedded Gb NIC (NIC Gigabit intégré) Enabled with PXE (Activé avec PXE, option par défaut) Active ou désactive le NIC intégré du système. Les options disponibles sont Enabled without PXE (Activé sans PXE), Enabled with PXE (Activé avec PXE) et Disabled (Désactivé). Le support PXE permet au système de démarrer à partir du réseau. Les modifications prennent effet après le redémarrage du système. MAC Address (Adresse MAC) Affiche l'adresse MAC du NIC 10/100/1000 intégré. L'utilisateur ne peut pas modifier la valeur de ce champ. TOE Capability (Fonctionnalité TOE) Affiche l'état de la fonctionnalité TOE (TCP/IP Offload Engine, moteur de décentralisation TCP/IP) pour le NIC.38 Utilisation du programme de configuration du système Écran Serial Communication (Communication série) Le tableau 2-5 répertorie les options et les descriptions des champs qui apparaissent dans l'écran Serial Communication (Communication série). Écran System Security (Sécurité du système) Le tableau 2-6 répertorie les options et les descriptions des champs qui apparaissent dans l'écran System Security (Sécurité du système). Tableau 2-5. Options de l'écran Serial Communication (Communication série) Option Description Serial Communication (Communication série) Off (Désactivé, option par défaut) Les options disponibles sont On with Console Redirection (Activé avec redirection de console) via COM2 et Off (Désactivé). Failsafe Baud Rate (Débit de la ligne de secours) 57600 (option par défaut) Affiche le débit de la ligne de secours utilisée pour la redirection de console lorsque le débit (en bauds) ne peut pas être négocié automatiquement avec le terminal distant. Ce débit ne doit pas être modifié. Remote Terminal Type (Type de terminal distant) VT 100/VT 220 (option par défaut) Sélectionnez VT 100/VT 220 ou ANSI. Redirection After Boot (Redirection après démarrage) Enabled (Activé, option par défaut) Active ou désactive la redirection de console pour le BIOS après le démarrage du système d'exploitation. Tableau 2-6. Options de l'écran System Security (Sécurité du système) Option Description System Password (Mot de passe du système) Affiche l'état actuel de la fonction de protection par mot de passe et permet d'attribuer et de vérifier un nouveau mot de passe système. REMARQUE : voir “Utilisation du mot de passe du système”, page 40 pour obtenir des instructions sur l'attribution, l'utilisation ou le changement d'un mot de passe système existant. Setup Password (Mot de passe de configuration) Restreint l'accès au programme de configuration du système, tout comme le mot de passe système protège l'accès à ce dernier. REMARQUE : voir “Utilisation du mot de passe de configuration”, page 42 pour plus d'instructions sur l'attribution, l'utilisation ou la modification d'un mot de passe de configuration existant.Utilisation du programme de configuration du système 39 Écran Exit (Quitter) Une fois que vous avez appuyé sur <Échap> pour quitter le programme de configuration du système, l'écran Exit (Quitter) affiche les options suivantes : • Save Changes and Exit (Enregistrer les modifications et quitter) • Discard Changes and Exit (Annuler les modifications et quitter) • Return to Setup (Retourner au programme de configuration) Password Status (État du mot de passe) Si l'option Setup Password (Mot de passe de configuration) est définie sur Enabled (Activé), le mot de passe du système ne peut pas être modifié ni désactivé au démarrage du système. Pour empêcher la modification du mot de passe du système, définissez un mot de passe de configuration à l'aide de l'option Setup Password, puis paramétrez Password Status (État du mot de passe) sur Locked (Verrouillé). Le mot de passe du système ne peut alors plus être changé via l'option System Password (Mot de passe du système). Il est également impossible de le désactiver au démarrage du système en appuyant sur . Pour déverrouiller le mot de passe du système, entrez le mot de passe de configuration dans le champ Setup Password (Mot de passe de configuration) et paramétrez Password Status (État du mot de passe) sur Unlocked (Non verrouillé). Il redevient alors possible de désactiver le mot de passe du système au démarrage en appuyant sur , puis de le modifier en utilisant l'option System Password (Mot de passe du système). Power Button (Bouton d'alimentation) Ce bouton met le système sous et hors tension. • Si vous éteignez un ordinateur utilisant un système d'exploitation conforme ACPI en appuyant sur le bouton d'alimentation, le système peut effectuer un arrêt normal avant que l'alimentation ne soit coupée. • Si le système d'exploitation n'est pas conforme ACPI, une pression sur le bouton d'alimentation l'éteint immédiatement. Ce bouton est activé dans le programme de configuration du système. Si vous sélectionnez “Disabled” (Désactivé), le bouton sert uniquement à mettre le système sous tension. REMARQUE : il est toujours possible d'allumer le système à l'aide du bouton d'alimentation, même si l'option Power Button (Bouton d'alimentation) a la valeur Disabled (Désactivé). NMI Button (Bouton NMI) AVIS : utilisez ce bouton uniquement si un technicien de support qualifié vous demande de le faire, ou si cela est préconisé dans la documentation du système d'exploitation Lorsque vous appuyez dessus, le système d'exploitation s'arrête et affiche un écran de diagnostic. Cette option permet d'activer (On) ou de désactiver (Off) la fonction NMI. AC Power Recovery (Retour de l'alimentation secteur) Last (Dernier, option par défaut) Détermine la réaction de l'ordinateur lorsqu'il est à nouveau alimenté en CA. L'option Last (Dernier) indique que le système doit revenir au même état qu'avant la coupure d'alimentation. Avec l'option On (Marche), le système démarre dès que l'alimentation en CA est rétablie. Avec l'option Off (Arrêt), il reste hors tension quand l'alimentation en CA est rétablie. Tableau 2-6. Options de l'écran System Security (Sécurité du système) (suite) Option Description40 Utilisation du programme de configuration du système Mot de passe du système et mot de passe de configuration AVIS : les mots de passe offrent simplement une fonction de sécurité de base protégeant les données du système. Si vos données nécessitent une protection plus importante, prenez des mesures supplémentaires (cryptage des données, etc.). AVIS : il est très facile d'accéder aux données stockées sur le système si vous laissez celui-ci sans surveillance alors que vous n'avez pas défini de mot de passe du système. Si l'ordinateur n'est pas verrouillé, une personne non autorisée peut aussi déplacer le cavalier d'activation du mot de passe et effacer celui-ci. À la livraison de l'ordinateur, le mot de passe du système n'est pas activé. Si vos données doivent impérativement être protégées, n'utilisez le système que lorsque vous avez activé la protection par mot de passe du système. Vous ne pouvez changer ou supprimer que les mots de passe que vous connaissez (voir “Suppression ou modification d'un mot de passe du système existant”, page 42). Si vous avez oublié votre mot de passe, vous ne pourrez pas faire fonctionner le système ni modifier sa configuration tant qu'un technicien de maintenance qualifié n'aura pas effacé les mots de passe en déplaçant le cavalier approprié sur la carte système. Voir “Désactivation d'un mot de passe oublié”, page 43. Utilisation du mot de passe du système Si un mot de passe du système est défini, seuls ceux qui le connaissent ont accès au système. Si le paramètre System Password (Mot de passe du système) est réglé sur Enabled (Activé), le mot de passe doit être entré au démarrage de l'ordinateur. Attribution d'un mot de passe du système Avant d'attribuer un mot de passe du système, accédez au programme de configuration du système et vérifiez l'option System Password (Mot de passe du système). Si un mot de passe du système est attribué, l'option System Password a la valeur Enabled (Activé). Si le paramètre Password Status (État du mot de passe) indique Unlocked (Non verrouillé), vous pouvez modifier le mot de passe du système. Si Password Status (État du mot de passe) indique Locked (Verrouillé), vous ne pouvez pas modifier ce mot de passe. Si le mot de passe du système est désactivé par la position d'un cavalier, l'état est Disabled (Désactivé). Il est alors impossible d'entrer ce mot de passe et de le modifier. Si aucun mot de passe du système n'est attribué et si le cavalier de mot de passe de la carte système est sur la position activée (réglage par défaut), l'option System Password (Mot de passe du système) est définie sur Not Enabled (Désactivé) et le champ Password Status (État du mot de passe) indique Unlocked (Non verrouillé). Pour attribuer un mot de passe du système : 1 Vérifiez que l'option Password Status (État du mot de passe) a la valeur Unlocked (Non verrouillé). 2 Sélectionnez System Password (Mot de passe du système) et appuyez sur . 3 Tapez le nouveau mot de passe du système. Le mot de passe peut contenir jusqu'à 32 caractères. Les caractères entrés ne sont pas affichés dans le champ, ils sont remplacés (y compris les espaces) par des caractères de substitution.Utilisation du programme de configuration du système 41 L'attribution du mot de passe ne tient pas compte de la différence entre majuscules et minuscules. Cependant, certaines combinaisons de touches ne sont pas valides. Si vous entrez une de ces combinaisons, un message d'erreur s'affiche. Pour supprimer un caractère lors de l'entrée de votre mot de passe, appuyez sur la touche ou sur la touche fléchée vers la gauche. REMARQUE : pour quitter le champ sans attribuer de mot de passe, appuyez sur . Vous passerez alors au champ suivant, ou appuyez sur <Échap> à tout moment avant la fin de l'étape 5. 4 Appuyez sur . 5 Pour confirmer votre mot de passe, tapez-le une seconde fois et appuyez sur . L'option System Password (Mot de passe du système) prend la valeur Enabled (Activé). Quittez le programme de configuration en sauvegardant et commencez à utiliser le système. 6 Vous pouvez redémarrez le système immédiatement pour activer la protection par mot de passe, ou simplement continuer à travailler. REMARQUE : la protection par mot de passe ne prend effet que lorsque vous redémarrez le système. Protection de l'ordinateur à l'aide d'un mot de passe du système REMARQUE : si vous avez attribué un mot de passe de configuration (voir “Utilisation du mot de passe de configuration”, page 42), le système l'accepte également comme mot de passe système. Lorsque le paramètre Password Status (État du mot de passe) a la valeur Unlocked (Non verrouillé), vous pouvez activer ou désactiver la protection par mot de passe. Pour laisser la protection par mot de passe activée : 1 Démarrez le système ou redémarrez-le en appuyant sur . 2 Tapez le mot de passe et appuyez sur . Pour désactiver la protection par mot de passe : 1 Démarrez le système ou redémarrez-le en appuyant sur . 2 Tapez le mot de passe et appuyez sur . Si l'option Password Status (État du mot de passe) a la valeur Locked (Verrouillé) lorsque vous allumez ou redémarrez le système (en appuyant sur ), tapez votre mot de passe et appuyez sur à l'invite du système. Une fois que vous avez tapé le mot de passe du système correct et appuyé sur , le système fonctionne normalement. Si vous entrez un mot de passe incorrect, le système affiche un message et vous invite à entrer de nouveau votre mot de passe. Vous disposez de trois tentatives pour entrer le bon mot de passe. Après une troisième tentative infructueuse, le système indique qu'il va s'arrêter. L'affichage de ce message peut vous alerter du fait qu'une personne a essayé d'utiliser le système à votre insu. Même si vous avez éteint et redémarré le système, le message d'erreur continue à s'afficher jusqu'à ce que le bon mot de passe soit entré. REMARQUE : vous pouvez combiner l'utilisation des paramètres Password Status (État du mot de passe), System Password (Mot de passe du système) et Setup Password (Mot de passe de configuration) pour mieux protéger le système contre toute modification non autorisée.42 Utilisation du programme de configuration du système Suppression ou modification d'un mot de passe du système existant 1 À l'invite, appuyez sur pour désactiver le mot de passe système existant. S'il vous est demandé d'entrer le mot de passe de configuration, contactez votre administrateur réseau. 2 Pour ouvrir le programme de configuration du système, appuyez sur pendant l'auto-test de démarrage. 3 Sélectionnez le champ System Security (Sécurité du système) pour vérifier que l'option Password Status (État du mot de passe) est définie sur Unlocked (Non verrouillé). 4 À l'invite, entrez le mot de passe du système. 5 Vérifiez que l'option System Password (Mot de passe du système) est définie sur Not Enabled (Non activé). Si tel est le cas, le mot de passe du système a été supprimé. Si l'option System Password (Mot de passe du système) est définie sur Enabled (Activé), appuyez sur pour redémarrer le système, puis recommencez les étapes 2 à 5. Utilisation du mot de passe de configuration Attribution d'un mot de passe de configuration Un mot de passe de configuration ne peut être attribué (ou modifié) que lorsque l'option Setup Password (Mot de passe de configuration) est définie sur Not Enabled (Désactivé). Pour attribuer un mot de passe de configuration, sélectionnez l'option Setup Password (Mot de passe de configuration) et appuyez sur <+> ou sur <–>. Le système vous invite à entrer et à vérifier le mot de passe. Si vous tapez un caractère non autorisé, un message d'erreur s'affiche. REMARQUE : le mot de passe de configuration peut être identique à celui du système. Si les deux mots de passe sont différents, le mot de passe de configuration peut être utilisé à la place du mot de passe du système, mais pas l'inverse. Le mot de passe peut contenir jusqu'à 32 caractères. Les caractères entrés ne sont pas affichés dans le champ, ils sont remplacés (y compris les espaces) par des caractères de substitution. L'attribution du mot de passe ne tient pas compte de la différence entre majuscules et minuscules. Cependant, certaines combinaisons de touches ne sont pas valides. Si vous entrez une de ces combinaisons, un message d'erreur s'affiche. Pour supprimer un caractère lors de l'entrée de votre mot de passe, appuyez sur la touche ou sur la touche fléchée vers la gauche. Une fois le mot de passe vérifié, le paramètre Setup Password (Mot de passe de configuration) prend la valeur Enabled (Activé). La prochaine fois que vous accéderez au programme de configuration, le système vous demandera d'entrer le mot de passe de configuration. La modification du mot de passe de configuration prend effet immédiatement (il n'est pas nécessaire de redémarrer le système).Utilisation du programme de configuration du système 43 Fonctionnement du système avec un mot de passe de configuration activé Si le paramètre Setup Password (Mot de passe de configuration) a la valeur Enabled (Activé), vous devez entrer ce mot de passe pour modifier la plupart des options de configuration du système. Une invite de saisie s'affiche lorsque vous accédez au programme de configuration du système. Si vous n'entrez pas le bon mot de passe au bout de trois essais, vous pouvez visualiser les écrans de configuration du système mais vous ne pouvez y apporter aucune modification. La seule exception est la suivante : si le paramètre System Password (Mot de passe du système) n'a pas la valeur Enabled (Activé) et n'est pas verrouillé par l'option Password Status (État du mot de passe), vous pouvez attribuer un mot de passe du système. Cependant, vous ne pouvez pas désactiver ni modifier un mot de passe existant. REMARQUE : il est possible de combiner l'utilisation des options Password Status (État du mot de passe) et Setup Password (Mot de passe de configuration) pour empêcher toute modification du mot de passe système. Suppression ou modification d'un mot de passe de configuration existant 1 Ouvrez le programme de configuration du système et sélectionnez l'option System Security (Sécurité du système). 2 Sélectionnez l'option Setup Password (Mot de passe de configuration), appuyez sur pour accéder à la fenêtre appropriée, et appuyez sur deux fois pour effacer le mot de passe en cours. Le paramètre prend la valeur Not Enabled (Non activé). 3 Si vous souhaitez attribuer un nouveau mot de passe de configuration, suivez les étapes décrites dans la section “Attribution d'un mot de passe de configuration”, page 42. Désactivation d'un mot de passe oublié Voir “Désactivation d'un mot de passe oublié”, page 131. Configuration du contrôleur BMC Le contrôleur BMC permet de configurer, contrôler et restaurer les systèmes à distance. Il offre les fonctionnalités suivantes : • Utilisation du port série système et du NIC intégré • Consignation des incidents et alertes SNMP • Accès au journal d'événements du système et à l'état du capteur • Contrôle des fonctions du système, y compris la mise sous tension et hors tension • Support indépendant de l'état d'alimentation ou de fonctionnement du système • Redirection de la console de texte pour la configuration du système, les utilitaires à interface texte et les consoles du système d'exploitation Pour plus d'informations sur l'utilisation du contrôleur BMC, consultez la documentation des applications BMC et de gestion des systèmes.44 Utilisation du programme de configuration du système Accès au module de configuration BMC 1 Allumez ou redémarrez le système. 2 À l'invite qui s'affiche après l'auto-test de démarrage, appuyez sur . Si le système d'exploitation commence à se charger alors que vous n'avez pas encore appuyé sur , laissez-le finir de démarrer, puis arrêtez-le et réessayez. Options du module de configuration du contrôleur BMC Pour plus d'informations concernant les options du module de configuration du contrôleur BMC et du port EMP (port de gestion d'urgence), consultez le document BMC User's Guide (Guide d'utilisation du contrôleur BMC).Installation des composants du système 45 Installation des composants du système Cette section décrit l'installation des composants suivants : • Bloc d'alimentation • Ventilateurs • Cartes d'extension • Disques durs • Lecteurs optiques, lecteurs de bande et de disquette • Pile du système • Mémoire système • Carte RAC • Microprocesseurs • Carte contrôleur fille RAID SAS • Assemblage du panneau de commande • Carte système Outils recommandés Vous pouvez avoir besoin des éléments suivants pour exécuter les procédures décrites dans cette section : • Clés du système • Tournevis cruciforme n°2 • Tournevis Torx T10 • Bracelet anti-statique46 Installation des composants du système Ouverture et fermeture du système Le système est protégé par un capot et un cadre. Vous devez retirer ces derniers pour accéder aux lecteurs et autres composants internes, afin de mettre le système à niveau ou de le dépanner, par exemple. Retrait du cadre 1 Ouvrez le verrou situé sur la droite du cadre. Voir la figure 3-1. 2 Tout en maintenant le cadre, poussez le loquet de fermeture situé sur sa partie supérieure vers la gauche. 3 Faites pivoter le haut du cadre pour l'écarter du panneau avant. 4 Dégagez la partie inférieure du cadre et retirez celui-ci. Voir la figure 3-1. Figure 3-1. Installation et retrait du cadre 1 Loquet du cadre 2 Cadre 3 Point d'attache du cadre (2) 4 Verrou du cadre 1 2 3 4Installation des composants du système 47 Installation du cadre 1 Insérez les crochets du cadre dans leurs points d'attache, au bas du panneau avant du système. Voir la figure 3-1. 2 Emboîtez le cadre sur le panneau avant du système. 3 Verrouillez le cadre. Ouverture du système PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Reportez-vous au Guide d'informations sur le produit pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l'ordinateur et la protection contre les décharges électrostatiques. PRÉCAUTION : demandez toujours de l'aide avant de soulever le système. N'essayez pas de le soulever seul car vous risqueriez de vous blesser. 1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant et déconnectez-le des périphériques. 2 Disposez le système sur un plan de travail stable, de sorte que ses pieds soit placés au dessus du vide. 3 Le cas échéant, retirez le verrou Kensington de l'arrière du châssis. 4 Pour retirer le capot du système, tournez le dispositif de verrouillage dans le sens inverse des aiguilles d'une montre. Voir la figure 3-2. 5 Soulevez la trappe située sur la partie supérieure du système. Voir la figure 3-2. 6 Saisissez le capot de chaque côté et soulevez-le doucement pour le retirer du système. Fermeture du système 1 Soulevez le loquet du capot. 2 Placez le capot sur le haut du système et inclinez-le légèrement vers l'arrière pour le dégager des crochets en J du châssis, de sorte qu'il repose totalement à plat sur ce dernier. Voir la figure 3-2. 3 Rabattez le loquet pour fermer le capot. 4 Verrouillez le capot en tournant le verrou dans le sens des aiguilles d'une montre. Voir la figure 3-2. 5 Le cas échéant, réinstallez le verrou Kensington à l'arrière du châssis. Voir la figure 1-2 pour identifier l'emplacement approprié. 6 Redressez le système et posez-le (sur ses pieds) sur une surface plane et stable. 7 Reconnectez les périphériques, le cas échéant, puis branchez le système sur une prise électrique.48 Installation des composants du système Figure 3-2. Installation et retrait du capot 1 Verrou du loquet de fermeture 2 Capot du système 3 Crochets du châssis 4 Loquet 3 1 2 4Installation des composants du système 49 Bloc d'alimentation Le système prend en charge un bloc d'alimentation d'une puissance de sortie de 800 W. AVIS : vous devez installer un cache sur la baie de bloc d'alimentation vide pour assurer un refroidissement correct du système. Retrait du bloc d'alimentation 1 Éteignez le système et tous les périphériques connectés. 2 Débranchez le câble d'alimentation de la prise électrique, déconnectez-le du bloc d'alimentation et retirez-le de son support. 3 Ouvrez le système. Voir “Ouverture du système”, page 47. 4 Retirez les ventilateurs de la baie d'extension et des processeurs (FAN1, FAN2 et FAN3). Voir “Retrait et installation d'un ventilateur”, page 53. 5 Retirez le support de ventilateur central. Voir “Retrait du support de ventilateur central”, page 78. 6 Débranchez les câbles d'alimentation des composants suivants, le cas échéant (voir la figure 6-2 pour identifier l'emplacement des connecteurs) : • Connecteur PWR1 de la carte système • Connecteur PWR2 de la carte système • Connecteur PWR CTRL de la carte système • Disques durs • Lecteur de disquette • Lecteur optique • Unité de sauvegarde sur bande • Clips de fixation des câbles (sur le châssis, voir la figure 3-3)50 Installation des composants du système 7 Retirez les quatre vis fixant le bloc d'alimentation sur le panneau arrière. Voir la figure 3-3. 8 Faites glisser le bloc d'alimentation hors du système. Figure 3-3. Installation et retrait du bloc d'alimentation 2 3 1 4 1 Support de fixation du câble d'alimentation 2 Vis (4) 3 Bloc d'alimentation 4 Clips de fixation de câble (3)Installation des composants du système 51 Installation du bloc d'alimentation 1 Faites glisser le bloc d'alimentation dans le châssis jusqu'à ce qu'il soit complètement emboîté. Voir la figure 3-3. 2 Installez les quatre vis pour fixer le bloc d'alimentation au panneau arrière du système. 3 Connectez les câbles d'alimentation aux composants suivants, le cas échéant (voir la figure 6-2 pour identifier l'emplacement des connecteurs) : • Connecteur PWR1 de la carte système • Connecteur PWR2 de la carte système • Connecteur PWR CTRL de la carte système • Disques durs • Lecteur de disquette • Lecteur optique • Unité de sauvegarde sur bande • Clips de fixation des câbles (sur le châssis, voir la figure 3-3) 4 Réinstallez le support de ventilateur central. Voir “Réinstallation du support de ventilateur central”, page 78. 5 Réinstallez les ventilateurs de la baie d'extension et du processeur (FAN1, FAN2 et FAN3). Voir “Retrait et installation d'un ventilateur”, page 53. 6 Refermez le système. Voir “Fermeture du système”, page 47. 7 Branchez le câble d'alimentation sur le bloc d'alimentation et sur la prise électrique.52 Installation des composants du système Ventilateurs Le système contient six ventilateurs enfichables à chaud : • Un pour la baie d'extension (FAN1) • Un pour chaque processeur (FAN2 et FAN3) • Trois pour les barrettes de mémoire, répartis comme suit : – Un sur le protecteur de ventilation de la mémoire (FAN4) – Deux à l'arrière du système (FAN5 et FAN6) AVIS : en cas de panne, les numéros attribués aux ventilateurs permettent au logiciel de gestion du système de vous indiquer quel ventilateur doit être remplacé. La figure 3-4 montre les emplacements et les numéros d'identification des ventilateurs. Figure 3-4. Ventilateurs 1 Ventilateur des cartes d'extension (FAN1) 2 Ventilateur du processeur (FAN2) 3 Ventilateur du processeur (FAN3) 4 Ventilateur des barrettes de mémoire (FAN4) 5 Ventilateur des barrettes de mémoire (FAN5) 6 Ventilateur des barrettes de mémoire (FAN6) 3 1 2 4 5 6Installation des composants du système 53 Retrait et installation d'un ventilateur PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Reportez-vous au Guide d'informations sur le produit pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l'ordinateur et la protection contre les décharges électrostatiques. 1 Ouvrez le système. Voir “Ouverture du système”, page 47. 2 Appuyez sur les loquets de fermeture situés sur la partie supérieure du ventilateur et soulevez ce dernier pour le retirer de son support. Voir la figure 3-5. AVIS : ne retirez pas plus d'un ventilateur à la fois. Ne faites pas fonctionner le système trop longtemps si vous avez retiré un ventilateur. Une surchauffe pourrait provoquer un arrêt du système et entraîner la perte de données. 3 Pour remettre un ventilateur en place, alignez son connecteur avec celui de la carte système, puis insérez-le dans son support. Le ventilateur démarre une fois inséré dans le connecteur. 4 Refermez le système. Voir “Fermeture du système”, page 47. Figure 3-5. Installation et retrait d'un ventilateur sur un support 1 2 4 3 1 Loquets de fermeture du ventilateur (2) 2 Ventilateur 3 Support de ventilateur central 4 Connecteur du ventilateur sur la carte système54 Installation des composants du système Retrait et installation du protecteur de ventilation PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Reportez-vous au Guide d'informations sur le produit pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l'ordinateur et la protection contre les décharges électrostatiques. AVIS : ne retirez jamais le protecteur de ventilation de la mémoire sans mettre le système hors tension au préalable. Le système pourrait surchauffer et s'arrêter, entraînant une perte de données. 1 Ouvrez le système. Voir “Ouverture du système”, page 47. 2 Détachez le support de ventilateur du protecteur de ventilation. Pour ce faire, appuyez sur les loquets bleus situés de chaque côté du support, puis relevez ce dernier. Voir la figure 3-6. REMARQUE : ne retirez pas le protecteur de ventilation du système lors de cette étape. 3 Pour retirer le ventilateur de son support, appuyez sur les poignées d'éjection situées sur la partie supérieure du ventilateur puis tirez le ventilateur hors du support. Voir la figure 3-6. AVIS : ne retirez pas plus d'un ventilateur à la fois. Ne faites pas fonctionner le système trop longtemps si vous avez retiré un ventilateur. Une surchauffe pourrait provoquer un arrêt du système et entraîner la perte de données. 4 Remettez le ventilateur en place. 5 Faites pivoter le support du ventilateur vers le protecteur de ventilation, puis appuyez légèrement sur les pattes latérales pour les emboîter dans les emplacements correspondants du loquet. 6 Refermez le système. Voir “Fermeture du système”, page 47.Installation des composants du système 55 Figure 3-6. Retrait et installation du ventilateur du protecteur de ventilation 1 Ventilateur 2 Loquets de fermeture du ventilateur (2) 3 Protecteur de ventilation 4 Loquet du support de ventilateur (2) 5 Support du ventilateur 1 3 2 5 456 Installation des composants du système Cartes d'extension Le système contient 6 logements pour cartes d'extension : 1 logement mi-longueur (emplacement 1) et 5 logements pleine longueur (emplacements 2 à 6). Ceux-ci sont configurés de la façon suivante : • Emplacements 1 et 2 : PCI-X 64 bits à 133 MHz (3,3 V). Ces logements peuvent accueillir des cartes PCI à 133, 100, 66 et 33 MHz, ainsi que des cartes PCI-X. • Emplacement 3 : PCIe x8. • Emplacements 4, 5 et 6 : PCIe x4. REMARQUE : la carte contrôleur SAS en option prenant en charge 4 disques SAS ou SATA doit être installée uniquement dans l'emplacement 4. La figure 3-7 montre l'agencement des logements d'extension. Figure 3-7. Logements d'extensionInstallation des composants du système 57 Installation d'une carte d'extension PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Reportez-vous au Guide d'informations sur le produit pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l'ordinateur et la protection contre les décharges électrostatiques. 1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant. 2 Ouvrez le système. Voir “Ouverture du système”, page 47. 3 Si vous installez une carte d'extension pleine longueur, retirez le dispositif antibasculement : a Relevez l'extrémité du dispositif antibasculement vers l'avant du système. Voir la figure 3-8. b Tirez le dispositif antibasculement vers le haut pour l'extraire du système. 4 Ouvrez le taquet de fixation en plastique, situé vers l'arrière de l'emplacement vide. Voir la figure 3-8. Figure 3-8. Installation et retrait de cartes d'extension 1 Dispositif antibasculement 2 Carte d'extension 3 Taquet de fixation des cartes d'extension 4 Guide d'alignement 2 3 1 458 Installation des composants du système 5 Retirez la plaque de recouvrement de l'emplacement que vous allez utiliser. REMARQUE : conservez cette plaque au cas où vous devriez retirer la carte d'extension. L'installation d'une plaque de ce type sur un emplacement vide est obligatoire pour que le système reste conforme à l'homologation FCC (Federal Communications Commission). Ces plaques empêchent en outre la poussière et les impuretés de pénétrer dans le système et facilitent le refroidissement et la ventilation. 6 Alignez la carte d'extension avec les guides d'alignement, puis insérez-la fermement dans le connecteur jusqu'à ce qu'elle soit correctement emboîtée. REMARQUE : vérifiez que le support de la carte d'extension est également inséré dans l'emplacement de fixation situé à l'arrière du bâti des cartes d'extension. 7 Fermez le taquet de fixation des cartes. Voir la figure 3-8. 8 Le cas échéant, réinstallez le dispositif antibasculement : a Insérez les deux pattes rondes du dispositif dans les fentes correspondantes. Voir la figure 3-8. b Faites pivoter l'extrémité du dispositif antibasculement vers l'avant du système, jusqu'à ce que le loquet s'emboîte contre le châssis. 9 Connectez les câbles internes ou externes sur la carte d'extension, le cas échéant. 10 Refermez le système. Voir “Fermeture du système”, page 47. 11 Branchez le cordon d'alimentation sur le bloc d'alimentation et sur la prise électrique. Retrait d'une carte d'extension PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Reportez-vous au Guide d'informations sur le produit pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l'ordinateur et la protection contre les décharges électrostatiques. 1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant. 2 Ouvrez le système. Voir “Ouverture du système”, page 47. 3 Si vous retirez une carte d'extension pleine longueur, retirez le dispositif antibasculement : a Relevez l'extrémité du dispositif antibasculement vers l'avant du système. Voir la figure 3-8. b Tirez le dispositif antibasculement vers le haut pour l'extraire du système. 4 Déconnectez les câbles internes ou externes reliés à la carte d'extension, le cas échéant. 5 Ouvrez le taquet de fixation des cartes situé près de l'emplacement. Voir la figure 3-8. 6 Saisissez la carte d'extension et dégagez-la doucement du connecteur. 7 Si vous retirez la carte définitivement, remettez la plaque de recouvrement métallique sur le logement vide. REMARQUE : pour maintenir la certification FCC du système, vous devez installer des plaques de recouvrement sur les logements vides des cartes d'extension. Ces plaques empêchent en outre la poussière et les impuretés de pénétrer dans le système et facilitent le refroidissement et la ventilation. Installation des composants du système 59 8 Le cas échéant, réinstallez le dispositif antibasculement : a Insérez les deux pattes rondes du dispositif dans les fentes correspondantes. Voir la figure 3-8. b Faites pivoter l'extrémité du dispositif antibasculement vers l'avant du système, jusqu'à ce que le loquet s'enclenche contre le châssis. 9 Fermez le taquet de fixation des cartes. Voir la figure 3-8. 10 Refermez le système. Voir “Fermeture du système”, page 47. 11 Branchez le cordon d'alimentation sur le bloc d'alimentation et sur la prise électrique. Disques durs Retrait d'un disque dur PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Reportez-vous au Guide d'informations sur le produit pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l'ordinateur et la protection contre les décharges électrostatiques. 1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant. 2 Retirez le cadre. Voir “Retrait du cadre”, page 46. 3 Ouvrez le système. Voir “Ouverture du système”, page 47. 4 Retirez les ventilateurs de la baie d'extension et du processeur (FAN1, FAN2 et FAN3). Voir “Retrait et installation d'un ventilateur”, page 53. 5 Déconnectez les câbles reliés à la carte système, la carte contrôleur SAS ou la carte contrôleur fille RAID SAS, puis écartez-les de façon à dégager les ventilateurs centraux. 6 Retirez le support de ventilateur central. Voir “Retrait du support de ventilateur central”, page 78. 7 Déconnectez les câbles d'alimentation et d'interface reliés aux disques durs installés dans la baie de lecteurs.60 Installation des composants du système 8 Retirez la baie de disque dur. Voir la figure 3-9. a Desserrez les quatre vis qui fixent la baie au système. b Faites glisser la baie hors du système. Figure 3-9. Retrait et installation de la baie de disque dur 1 2 4 3 1 Vis (4) 2 Baie de lecteur 3 Câble d'alimentation 4 Câble d'interfaceInstallation des composants du système 61 9 Retirez le lecteur de la baie de disque dur. Voir la figure 3-10. a Desserrez les quatre vis qui fixent le disque dur dans la baie. b Extrayez le disque dur de la baie. Figure 3-10. Retrait et installation d'un disque dur 1 Baie de lecteur 2 Vis (4) 3 Disque dur 1 2 362 Installation des composants du système Installation d'un disque dur PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Reportez-vous au Guide d'informations sur le produit pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l'ordinateur et la protection contre les décharges électrostatiques. 1 Déballez le lecteur (et la carte contrôleur, le cas échéant), puis préparez-le en vue de son installation. REMARQUE : pour obtenir des instructions, consultez la documentation fournie avec le lecteur. 2 Installez le disque dur dans la baie (voir la figure 3-10) : a Insérez le disque dur dans la baie, en veillant à ce que l'arrière du lecteur soit du même côté que l'arrière de la baie. b Installez les quatre vis qui fixent le disque dur dans la baie. 3 Installez la baie de disque dur. Voir la figure 3-9. a Insérez la baie dans le système jusqu'à ce qu'elle touche ce dernier. b Installez les quatre vis qui fixent la baie au système. 4 Selon la configuration utilisée pour les disques durs, procédez comme suit pour connecter les câbles d'interface et d'alimentation des disques durs : • Si vous utilisez jusqu'à deux disques SATA, insérez les câbles dans les deux connecteurs SATA de la carte système. Le connecteur SATA_A est bleu et le connecteur SATA_B noir. Faites passer les câbles dans le bâti du ventilateur central. Voir la figure 3-11 pour identifier l'emplacement des connecteurs et savoir comment acheminer les câbles.Installation des composants du système 63 Figure 3-11. Configuration comprenant 2 disques durs (SATA intégré à la carte système) • Si votre configuration comprend jusqu'à 4 disques SAS ou SATA configurés en RAID 0 ou 1, connectez les câbles à une carte contrôleur SAS en option (voir “Cartes d'extension”, page 56) installée dans le logement d'extension 4 (PCIE_X4_4). Enfichez ensuite le câble du voyant d'activité du disque dur dans le connecteur de la carte système et dans celui de la carte d'extension. Faites passer les câbles dans le bâti du ventilateur central. Voir la figure 3-12. REMARQUE : la carte contrôleur SAS en option prenant en charge 4 disques SAS ou SATA dans une configuration RAID et représentée figure 3-12 doit être installée uniquement dans l'emplacement 4 (PCIE_X4_4). La carte contrôleur fille RAID SAS intégrée en option représentée figure 3-13 ne doit être installée que dans le logement INT_STORAGE de la carte système. Voir la figure 6-2 pour identifier l'emplacement des connecteurs. 4 5 3 6 2 1 1 Bâti du ventilateur central 2 Connecteur du câble d'alimentation 3 Connecteur du câble d'interface du disque dur 4 Connecteur d'interface du disque dur 5 Connecteur SATA_A 6 Connecteur SATA_B64 Installation des composants du système Figure 3-12. Configuration comprenant 4 disques durs (carte contrôleur SAS) 1 Support de ventilateur central 2 Logement d'extension 4 (PCIE_X4_4) 3 Connecteur de voyant d'activité de disque dur (sur la carte système) 4 Connecteur de voyant d'activité de disque dur (sur la carte système) 5 Connecteur SAS1 6 Connecteur de câble d'interface de disque dur 7 Connecteur de câble d'alimentation 3 4 6 7 5 2 1Installation des composants du système 65 • Pour une configuration comprenant jusqu'à 6 disques SAS ou SATA configurés en RAID 0, 1, 5 ou 10, connectez les câbles à une carte contrôleur fille RAID SAS installée dans le logement PCI intégré (INT_STORAGE). Faites passer les câbles dans le bâti du ventilateur central. Voir la section “Installation d'une carte contrôleur fille RAID SAS”, page 94 et la figure 6-2 pour identifier l'emplacement du logement PCI intégré. REMARQUE : la carte contrôleur SAS en option prenant en charge 4 disques SAS ou SATA dans une configuration RAID et représentée figure 3-12 doit être installée uniquement dans l'emplacement 4 (PCIE_X4_4). La carte contrôleur fille RAID SAS intégrée en option représentée figure 3-13 ne doit être installée que dans le logement INT_STORAGE de la carte système. Voir la figure 6-2 pour identifier l'emplacement des connecteurs. Figure 3-13. Configuration comprenant 6 disques durs (carte contrôleur fille RAID SAS) 5 2 6 7 3 4 1 1 Connecteur de voyant d'activité de disque dur (HD_ACT_CARD, sur la carte système) 2 Connecteur de pile de la carte contrôleur fille RAID SAS 3 Connecteur SASx (2) 4 Connecteur de câble pour le voyant d'activité du disque dur 5 Bâti du ventilateur central 6 Connecteur du câble d'interface du disque dur 7 Connecteur d'alimentation du disque dur66 Installation des composants du système 5 Remettez en place le support de ventilateur central. Voir “Réinstallation du support de ventilateur central”, page 78. 6 Réinstallez les ventilateurs de la baie d'extension et du processeur (FAN1, FAN2 et FAN3). Voir “Retrait et installation d'un ventilateur”, page 53. 7 Refermez le système. Voir “Fermeture du système”, page 47. 8 Remettez le cadre en place, si vous l'avez retiré précédemment. Voir “Installation du cadre”, page 47. 9 Branchez le cordon d'alimentation sur le bloc d'alimentation et sur la prise électrique. Unité interne de sauvegarde sur bande Le système prend en charge une unité SCSI interne de sauvegarde sur bande (en option). Retrait d'une unité SCSI interne de sauvegarde sur bande PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Reportez-vous au Guide d'informations sur le produit pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l'ordinateur et la protection contre les décharges électrostatiques. 1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant. 2 Retirez le cadre avant, s'il est installé. Voir “Retrait du cadre”, page 46. 3 Ouvrez le système. Voir “Ouverture du système”, page 47. 4 Le cas échéant, déconnectez les câbles reliés à la carte contrôleur fille RAID SAS ou à la carte contrôleur SAS, puis écartez-les de façon à dégager les ventilateurs centraux. Voir “Retrait de la carte contrôleur fille RAID SAS”, page 93 ou “Retrait d'une carte d'extension”, page 58. 5 Déconnectez le câble de l'unité SCSI de sauvegarde sur bande de la carte contrôleur SCSI en option, puis écartez-le de façon à dégager les ventilateurs centraux. Voir la figure 3-14. 6 Retirez les ventilateurs du support central. Voir “Retrait et installation d'un ventilateur”, page 53. 7 Retirez le support de ventilateur central. Voir “Retrait du support de ventilateur central”, page 78. 8 Poussez le loquet de fermeture situé sur la partie supérieure de la baie de périphériques vers la droite. Éjectez ensuite partiellement l'unité de sauvegarde sur bande de la baie. Voir la figure 3-14. 9 Débranchez le câble SCSI connecté à l'arrière de l'unité de bande. 10 Retirez l'unité de sauvegarde sur bande du système. 11 Si vous ne remettez pas l'unité en place et si vous ne la remplacez pas, installez une plaque de recouvrement sur le logement vide. Si vous remplacez l'unité, voir “Installation d'une unité SCSI interne de sauvegarde sur bande”, page 68. 12 Remettez en place le support de ventilateur central. Voir “Réinstallation du support de ventilateur central”, page 78. Installation des composants du système 67 13 Réinstallez les ventilateurs sur le support central. Voir “Retrait et installation d'un ventilateur”, page 53. 14 Le cas échéant, reconnectez les câbles sur la carte contrôleur fille RAID SAS ou la carte contrôleur SCSI. Voir “Installation d'une carte contrôleur fille RAID SAS”, page 94. 15 Refermez le système. Voir “Fermeture du système”, page 47. 16 Remettez le cadre en place, si vous l'avez retiré précédemment. Voir “Installation du cadre”, page 47. Figure 3-14. Installation et retrait d'un lecteur optique ou d'une unité de sauvegarde sur bande mi-hauteur 1 Câble ruban SCSI 2 Câble d'alimentation 3 Loquet de fermeture 4 Baie de périphériques 5 Lecteur optique ou unité de sauvegarde sur bande mi-hauteur 1 4 2 3 568 Installation des composants du système Installation d'une unité SCSI interne de sauvegarde sur bande Cette section décrit la configuration et l'installation d'une unité SCSI interne de sauvegarde sur bande. PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Reportez-vous au Guide d'informations sur le produit pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l'ordinateur et la protection contre les décharges électrostatiques. 1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant. 2 Retirez le cadre avant, s'il est installé. Voir “Retrait du cadre”, page 46. 3 Ouvrez le système. Voir “Ouverture du système”, page 47. 4 Le cas échéant, déconnectez les câbles reliés à la carte contrôleur fille RAID SAS ou à la carte d'extension, puis écartez-les de façon à dégager les ventilateurs centraux. Voir “Retrait de la carte contrôleur fille RAID SAS”, page 93. 5 Retirez les ventilateurs du support central. Voir “Retrait et installation d'un ventilateur”, page 53. 6 Retirez le support de ventilateur central. Voir “Retrait du support de ventilateur central”, page 78. 7 Déballez l'unité de bande (et la carte contrôleur, le cas échéant). Configurez l'unité comme indiqué dans sa documentation, en respectant les consignes suivantes : a Chaque périphérique raccordé à un adaptateur à l'hôte SCSI doit avoir un numéro d'ID SCSI unique (les périphériques SCSI étroits utilisent les ID 0 à 7 ; les périphériques SCSI larges utilisent les ID 0 à 15). Définissez l'ID SCSI du lecteur de façon à éviter tout conflit avec les identificateurs des autres périphériques partageant le même bus. Pour toute information concernant les ID SCSI par défaut, consultez la documentation du lecteur. REMARQUE : les numéros d'ID SCSI ne doivent pas forcément être attribués dans l'ordre et les périphériques ne doivent pas forcément être connectés au câble dans l'ordre de leur numéro d'identification. b La logique SCSI requiert que les deux périphériques situés aux deux extrémités d'une chaîne SCSI soient dotés d'une terminaison et que tous les périphériques intermédiaires n'en aient pas. De ce fait, vous activez la terminaison de l'unité de bande s'il s'agit du dernier périphérique d'une chaîne de périphériques (ou d'un périphérique unique) connectée au contrôleur SCSI. Installation des composants du système 69 8 Si une carte contrôleur est fournie avec le lecteur, installez-la. Voir “Cartes d'extension”, page 56. 9 Retirez la plaque de recouvrement de la baie de l'unité de sauvegarde sur bande, le cas échéant : a Poussez le loquet de fermeture situé sur la partie supérieure de la baie de périphériques vers la droite. Tirez la plaque de recouvrement vers le haut pour la dégager du système. b Retirez la plaque de recouvrement. 10 Si les vis de montage ne sont pas fixées au lecteur, installez-les. 11 Insérez la nouvelle unité de bande aux trois quarts dans le logement correspondant de la baie de périphériques. Les vis de montage doivent s'insérer dans les emplacements appropriés du rail. 12 Branchez le câble d'interface SCSI (fourni dans le kit d'installation) sur l'unité. Voir la figure 3-14. 13 Remettez en place le support de ventilateur central. Voir “Réinstallation du support de ventilateur central”, page 78. 14 Branchez le câble d'interface SCSI sur le connecteur correspondant de la carte contrôleur SCSI en option. 15 Branchez le câble d'alimentation sur le connecteur correspondant de l'unité. 16 Emboîtez complètement l'unité de bande dans la baie, jusqu'à ce que le loquet s'enclenche. 17 Réinstallez les ventilateurs sur le support central. Voir “Retrait et installation d'un ventilateur”, page 53. 18 Le cas échéant, reconnectez les câbles sur la carte contrôleur fille RAID SAS ou la carte d'extension. Voir “Installation d'une carte contrôleur fille RAID SAS”, page 94. 19 Refermez le système. Voir “Fermeture du système”, page 47. 20 Remettez le cadre avant en place, si vous l'avez retiré précédemment. Voir “Installation du cadre”, page 47. 21 Rebranchez le système et les périphériques sur le secteur, puis remettez-les sous tension. 22 Terminez la configuration de l'unité de sauvegarde sur bande SCSI en suivant les consignes de la documentation correspondante. 23 Effectuez une sauvegarde sur bande et un test de vérification de l'unité, en suivant les instructions de la documentation correspondante.70 Installation des composants du système Lecteur optique Retrait d'un lecteur optique PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Reportez-vous au Guide d'informations sur le produit pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l'ordinateur et la protection contre les décharges électrostatiques. 1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant. 2 Retirez le cadre avant, s'il est installé. Voir “Retrait du cadre”, page 46. 3 Ouvrez le système. Voir “Ouverture du système”, page 47. 4 Le cas échéant, déconnectez les câbles reliés à la carte contrôleur SAS (voir la figure 3-12) ou à la carte contrôleur fille RAID SAS (voir la figure 3-13), puis écartez-les de façon à dégager les ventilateurs centraux. 5 Déconnectez le câble de l'unité SCSI de sauvegarde sur bande de la carte contrôleur SCSI en option, puis écartez-le de façon à dégager les ventilateurs centraux. Voir la figure 3-14. 6 Retirez les ventilateurs du support central. Voir “Retrait et installation d'un ventilateur”, page 53. 7 Retirez le support de ventilateur central. Voir “Retrait du support de ventilateur central”, page 78. 8 Poussez le loquet de fermeture situé sur la partie supérieure de la baie de périphériques vers la droite. Tirez partiellement le lecteur optique hors de la baie. Voir la figure 3-14. 9 Retirez le câble ruban et le cordon d'alimentation de l'arrière du lecteur optique. 10 Retirez le lecteur optique de la baie. 11 Remplacez le lecteur optique ou installez une plaque de recouvrement sur le logement vide. 12 Remettez en place le support de ventilateur central. Voir “Réinstallation du support de ventilateur central”, page 78. 13 Réinstallez les ventilateurs sur le support central. Voir “Retrait et installation d'un ventilateur”, page 53. 14 Le cas échéant, reconnectez les câbles sur la carte contrôleur SAS (voir la figure 3-12) ou la carte contrôleur fille RAID SAS (voir la figure 3-13). 15 Refermez le système. Voir “Fermeture du système”, page 47. 16 Remettez le cadre en place, si vous l'avez retiré précédemment. Voir “Installation du cadre”, page 47. 17 Rebranchez le système et les périphériques sur leurs prises électriques.Installation des composants du système 71 Installation d'un lecteur optique PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Reportez-vous au Guide d'informations sur le produit pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l'ordinateur et la protection contre les décharges électrostatiques. 1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant. 2 Retirez le cadre avant, s'il est installé. Voir “Retrait du cadre”, page 46. 3 Ouvrez le système. Voir “Ouverture du système”, page 47. 4 Retirez la plaque de recouvrement de la baie de périphériques, le cas échéant. a Poussez le loquet de fermeture situé sur la partie supérieure de la baie de périphériques vers la droite. Tirez la plaque de recouvrement vers le haut pour la dégager du système. b Retirez la plaque de recouvrement. 5 Le cas échéant, déconnectez les câbles reliés à la carte contrôleur SAS (voir la figure 3-12) ou à la carte contrôleur fille RAID SAS (voir la figure 3-13), puis écartez-les de façon à dégager les ventilateurs centraux. 6 Retirez les ventilateurs du support central. Voir “Retrait et installation d'un ventilateur”, page 53. 7 Retirez le support de ventilateur central. Voir “Retrait du support de ventilateur central”, page 78. 8 Si les vis de montage ne sont pas fixées au lecteur, installez-les. 9 Insérez le nouveau lecteur optique aux trois quarts dans le logement correspondant de la baie de périphériques. Les vis de montage doivent s'insérer dans les emplacements appropriés du rail. Voir la figure 3-14. 10 Insérez l'une des extrémités du câble ruban dans le connecteur IDE de la carte système (voir la figure 6-2) et l'autre dans le connecteur situé à l'arrière du lecteur optique. 11 Insérez le câble P5 du bloc d'alimentation dans le connecteur d'alimentation CD ou bien à l'arrière du lecteur optique. 12 Emboîtez complètement le lecteur dans la baie, jusqu'à ce que le loquet s'enclenche. 13 Remettez en place le support de ventilateur central. Voir “Réinstallation du support de ventilateur central”, page 78. 14 Réinstallez les ventilateurs sur le support central. Voir “Réinstallation du support de ventilateur central”, page 78. 15 Le cas échéant, reconnectez le câble de l'unité SCSI de sauvegarde sur la carte contrôleur SCSI en option. Voir la figure 3-14. 16 Le cas échéant, reconnectez les câbles sur la carte contrôleur SAS (voir la figure 3-12) ou la carte contrôleur fille RAID SAS (voir la figure 3-13). 17 Refermez le système. Voir “Fermeture du système”, page 47. 18 Remettez le cadre en place, si vous l'avez retiré précédemment. Voir “Installation du cadre”, page 47. 19 Rebranchez le système et les périphériques sur leurs prises électriques.72 Installation des composants du système Lecteur de disquette Retrait du lecteur de disquette PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Reportez-vous au Guide d'informations sur le produit pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l'ordinateur et la protection contre les décharges électrostatiques. 1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant. 2 Retirez le cadre avant, s'il est installé. Voir “Retrait du cadre”, page 46. 3 Ouvrez le système. Voir “Ouverture du système”, page 47. 4 Déconnectez le cordon d'alimentation et le câble ruban de l'arrière du lecteur de disquette. 5 Dégagez le support du lecteur de disquette de la partie supérieure de la baie. a Appuyez sur la patte de plastique située sur le côté du support, jusqu'à ce qu'elle se dégage de la butée métallique. b Poussez le support vers l'arrière et soulevez-le pour le retirer du châssis. Voir la figure 3-15. Figure 3-15. Installation et retrait du lecteur de disquette 1 Lecteur de disquette 2 Câble ruban du lecteur de disquette 3 Cordon d'alimentation du lecteur de disquette 4 Support du lecteur de disquette 5 Patte de dégagement 6 Butée métallique 7 Pattes de la baie de lecteur 1 2 3 5 6 7 4Installation des composants du système 73 Installation du lecteur de disquette dans son support Insérez le lecteur de disquette dans le support, connecteurs vers l'arrière. Alignez les trous des deux éléments et serrez les trois vis cruciformes. Voir la figure 3-16. Figure 3-16. Installation du lecteur de disquette dans le support 1 Lecteur de disquette 2 Vis (3) 3 Patte de plastique 4 Support du lecteur de disquette 4 2 1 374 Installation des composants du système Installation du lecteur de disquette PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Reportez-vous au Guide d'informations sur le produit pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l'ordinateur et la protection contre les décharges électrostatiques. 1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant. 2 Retirez le cadre avant, s'il est installé. Voir “Retrait du cadre”, page 46. 3 Ouvrez le système. Voir “Ouverture du système”, page 47. 4 Si un câble ruban pour lecteur de disquette est déjà connecté à la carte système, passez à l'étape suivante. Dans le cas contraire, procédez comme suit : a Le cas échéant, déconnectez les câbles reliés à la carte contrôleur SAS (voir la figure 3-12) ou à la carte contrôleur fille RAID SAS (voir la figure 3-13), puis écartez-les de façon à dégager les ventilateurs centraux. b Retirez les ventilateurs du support central. Voir “Retrait et installation d'un ventilateur”, page 53. c Retirez le support de ventilateur central. Voir “Retrait du support de ventilateur central”, page 78. 5 Pour retirer la plaque recouvrant la baie du lecteur de disquette, écartez légèrement le ressort et soulevez la plaque. 6 Installez le support du lecteur de disquette dans le système : a Alignez les encoches situées au bas du support avec les pattes de la baie de périphériques, puis emboîtez le support dans ces dernières. b Poussez le support vers la façade du système jusqu'à ce que son loquet de plastique se mette en place. 7 Insérez l'une des extrémités du câble ruban dans le connecteur marqué “FLOPPY” sur la carte système (voir la figure 6-2), et l'autre dans le connecteur situé à l'arrière du lecteur de disquette. 8 Insérez le câble P4 du bloc d'alimentation dans le connecteur situé à l'arrière du lecteur de disquette. 9 Le cas échéant, réinstallez les composants retirés à l'étape 4 : a Remettez en place le support de ventilateur central. Voir “Réinstallation du support de ventilateur central”, page 78. b Réinstallez les ventilateurs sur le support central. Voir “Retrait et installation d'un ventilateur”, page 53 c Le cas échéant, reconnectez les câbles sur la carte contrôleur SAS (voir la figure 3-12) ou la carte contrôleur fille RAID SAS (voir la figure 3-13). 10 Refermez le système. Voir “Fermeture du système”, page 47. 11 Remettez le cadre en place, si vous l'avez retiré précédemment. Voir “Installation du cadre”, page 47. 12 Rebranchez le système et les périphériques sur leurs prises électriques.Installation des composants du système 75 Pile du système Remplacement de la pile du système PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Reportez-vous au Guide d'informations sur le produit pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l'ordinateur et la protection contre les décharges électrostatiques. 1 Accédez au programme de configuration du système et notez les paramètres sélectionnés dans les différents écrans. Voir “Utilisation du programme de configuration du système”, page 31. 2 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant. 3 Ouvrez le système. Voir “Ouverture du système”, page 47. 4 Identifiez l'emplacement de la pile en vous reportant à la figure 6-2. Retirez autant de cartes d'extension que nécessaire (en commençant par le logement PCI 6) pour pouvoir accéder facilement à la pile. Voir “Retrait d'une carte d'extension”, page 58. 5 Retirez la pile du système. AVIS : pour ne pas endommager le connecteur de pile, vous devez le maintenir en place lorsque vous installez ou retirez une pile. a Maintenez le connecteur de pile en place en appuyant fermement sur le côté positif du connecteur. Voir la figure 3-17. b Tout en continuant à appuyer, poussez la pile vers le côté positif et extrayez-la des pattes de fixation du côté négatif du connecteur. Figure 3-17. Remplacement de la pile du système 1 Côté positif du connecteur 2 Pile du système 3 Côté négatif du connecteur 2 3 176 Installation des composants du système 6 Installez la nouvelle pile (voir la figure 3-17) : a Maintenez le connecteur de pile en place en appuyant fermement sur le côté positif du connecteur. b Tenez la pile en plaçant le “+” vers le haut et faites-la glisser sous les pattes de fixation situées du côté positif du connecteur. c Appuyez sur la pile pour l'engager dans le connecteur. 7 Remettez en place toutes les cartes d'extension retirées à l'étape 4. Voir “Cartes d'extension”, page 56. 8 Refermez le système. Voir “Fermeture du système”, page 47. 9 Rebranchez le système à la prise de courant et allumez-le, ainsi que les périphériques connectés. 10 Accédez au programme de configuration du système pour vérifier que la pile fonctionne correctement. 11 Dans l'écran principal, sélectionnez System Time (Heure système) pour entrer l'heure et la date correctes. 12 Redéfinissez toutes les informations qui ne sont plus affichées sur les écrans de configuration du système, puis quittez le programme de configuration. 13 Pour tester la nouvelle pile, voir “Dépannage de la pile du système”, page 108. Protecteur de ventilation Le protecteur de ventilation produit un flux d'air qu'il dirige sur les barrettes de mémoire du système au moyen d'un ventilateur enfichable à chaud. Pour retirer le protecteur de ventilation, il n'est pas nécessaire d'enlever également le ventilateur. Retrait du protecteur de ventilation PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Reportez-vous au Guide d'informations sur le produit pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l'ordinateur et la protection contre les décharges électrostatiques. 1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant. AVIS : ne retirez jamais le protecteur de ventilation de la mémoire sans mettre le système hors tension au préalable. Le système pourrait surchauffer et s'arrêter, entraînant une perte de données. 2 Ouvrez le système. Voir “Ouverture du système”, page 47. 3 Pour retirer le protecteur de ventilation, écartez les loquets bleus pour les dégager de leur patte de fixation. Voir la figure 3-18. 4 Soulevez le protecteur de ventilation pour dégager le connecteur de la carte système, puis retirez-le du système. Voir la figure 3-18. PRÉCAUTION : les barrettes DIMM restent chaudes un certain temps après la mise hors tension du système. Laissez-les tiédir avant de les manipuler. Tenez-les par les bords en évitant de toucher leurs composants.Installation des composants du système 77 Figure 3-18. Installation et retrait des supports de ventilateur et du protecteur de ventilation Installation du protecteur de ventilation Pour installer le protecteur de ventilation, alignez les rails situés sur son côté droit avec les guides situés sur la paroi droite du châssis. Abaissez doucement le protecteur de ventilation dans le système jusqu'à ce que le connecteur du ventilateur s'enclenche et que le loquet se mette en place. Voir la figure 3-18. AVIS : ne faites jamais fonctionner le système si le protecteur de ventilation de la mémoire a été retiré. Le système pourrait surchauffer et s'arrêter, entraînant une perte de données. 1 Loquet de fermeture du support de ventilateur central (2) 2 Loquet du protecteur de ventilation (gauche) 3 Protecteur de ventilation 4 Loquet du protecteur de ventilation (droit) 5 Loquet de fermeture du support de ventilateur arrière 6 Support de ventilateur arrière 7 Support de ventilateur central 8 Encoche du châssis 8 2 6 5 4 1 3 778 Installation des composants du système Supports de ventilateur Retrait du support de ventilateur central PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Reportez-vous au Guide d'informations sur le produit pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l'ordinateur et la protection contre les décharges électrostatiques. 1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant. 2 Ouvrez le système. Voir “Ouverture du système”, page 47. 3 Le cas échéant, déconnectez les câbles reliés à la carte contrôleur fille RAID SAS ou à la carte d'extension installée dans le support de la baie d'extension, puis écartez-les de façon à dégager les ventilateurs centraux. Voir “Retrait de la carte contrôleur fille RAID SAS”, page 93. 4 Retirez les ventilateurs du support central. Voir “Retrait et installation d'un ventilateur”, page 53. 5 Appuyez sur les loquets bleus situés de chaque côté du support de ventilateur central. Soulevez le support et retirez-le du système. Voir la figure 3-18. Si le support ne se dégage pas complètement, appuyez doucement dessus lorsque vous débloquez ses loquets. Réinstallation du support de ventilateur central 1 Alignez les rails situés de chaque côté du support de ventilateur avec ceux des parois du châssis. Insérez le support dans le système jusqu'à ce les loquets s'enclenchent. 2 Réinstallez les ventilateurs sur le support. Voir “Retrait et installation d'un ventilateur”, page 53. 3 Le cas échéant, reconnectez les câbles sur la carte contrôleur fille RAID SAS ou la carte d'extension. Voir “Installation d'une carte contrôleur fille RAID SAS”, page 94. 4 Refermez le système. Voir “Fermeture du système”, page 47. 5 Rebranchez le système à la prise de courant et allumez-le, ainsi que les périphériques connectés.Installation des composants du système 79 Retrait du support de ventilateur arrière PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Reportez-vous au Guide d'informations sur le produit pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l'ordinateur et la protection contre les décharges électrostatiques. 1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant. 2 Ouvrez le système. Voir “Ouverture du système”, page 47. 3 Retirez le protecteur de ventilation des barrettes de mémoire. Voir “Retrait du protecteur de ventilation”, page 76. 4 Retirez les ventilateurs du support arrière. Voir “Retrait et installation d'un ventilateur”, page 53. 5 Pour retirer le support de ventilateur arrière, appuyez sur le loquet bleu situé contre la paroi arrière du châssis, puis faites glisser le support vers le haut. Voir la figure 3-18. Réinstallation du support de ventilateur arrière 1 Emboîtez les bords gauche et droit du support dans les guides correspondants, à l'intérieur du panneau arrière du châssis. Voir la figure 3-18. 2 Abaissez le support dans le système jusqu'à ce que les deux pattes en haut du support s'emboîtent dans les orifices situés sur le panneau arrière du système. 3 Remettez en place le protecteur de ventilation des barrettes de mémoire. Voir “Installation du protecteur de ventilation”, page 77. AVIS : ne faites jamais fonctionner le système si le protecteur de ventilation de la mémoire a été retiré. Le système pourrait surchauffer et s'arrêter, entraînant une perte de données. 4 Réinstallez les ventilateurs sur le support. Voir “Retrait et installation d'un ventilateur”, page 53. 5 Refermez le système. Voir “Fermeture du système”, page 47. 6 Rebranchez le système à la prise de courant et allumez-le, ainsi que les périphériques connectés.80 Installation des composants du système Mémoire Vous pouvez ajouter de la mémoire supplémentaire au système (maximum autorisé : 16 Go). Pour ce faire, installez des barrettes FB-DIMM à 533 MHz ou 667 MHz (selon disponibilité) par paires de 256 Mo, 512 Mo, 1 Go ou 2 Go. Les emplacements mémoire se trouvent sur la carte système, sous le protecteur de ventilation. Voir la figure 6-2. AVIS : si vous retirez les barrettes de mémoire d'origine du système lors d'une mise à niveau, distinguez-les bien de toute nouvelle barrette. Utilisez uniquement des barrettes FB-DIMM à 533 ou 667 MHz (selon disponibilité). Les emplacements mémoire sont organisés sur la carte système en deux circuits égaux (0 et 1). Voir la figure 3-19. Chaque circuit est composé de deux canaux : • Le canal 0 et le canal 1 font partie du circuit 0. • Le canal 2 et le canal 3 font partie du circuit 1. Chacun de ces canaux comprend deux logements DIMM : • Le canal 0 contient les barrettes DIMM_1 et DIMM_5. • Le canal 1 contient les barrettes DIMM_2 et DIMM_6. • Le canal 2 contient les barrettes DIMM_3 et DIMM_7. • Le canal 3 contient les barrettes DIMM_4 et DIMM_8. Le premier logement DIMM de chaque canal est équipé de pattes d'éjection blanches.Installation des composants du système 81 Figure 3-19. Logements DIMM Consignes générales pour l'installation des barrettes de mémoire Pour optimiser les performances du système, observez les consignes suivantes lorsque vous configurez la mémoire système. • Utilisez uniquement des barrettes FB-DIMM certifiées. Ces dernières peuvent être à simple ou à double rangée de connexions. Les barrettes marquées “1R” sont des barrettes à une seule rangée de connexions, tandis que la mention “2R” identifie les barrettes à double rangée de connexions. • Vous devez installer au moins deux barrettes FB-DIMM identiques. • Les barrettes DIMM doivent être insérées en suivant l'ordre des numéros des logements (du moins élevé au plus élevé). • Les barrettes FB-DIMM doivent être installées par paires de taille, vitesse et technologie identiques. Leur nombre total doit être de deux, quatre ou huit. Pour optimiser les performances du système, toutes les barrettes doivent être de taille, vitesse et technologie identiques. • La mise en miroir de la mémoire et l'utilisation d'une mémoire de réserve requièrent 8 barrettes FB-DIMM de même taille, vitesse et technologie. • Ces deux fonctionnalités ne peuvent pas être implémentées en même temps.82 Installation des composants du système Configurations de mémoire entraînant une dégradation des performances Une mémoire dont la configuration n'est pas conforme aux consignes ci-dessus peut entraîner une dégradation des performances du système. Ce dernier peut alors afficher un message d'avertissement au démarrage pour indiquer que la configuration de la mémoire n'est pas optimale. Prise en charge d'une mémoire de réserve Le système prend en charge l'utilisation d'une mémoire de réserve s'il est équipé de huit barrettes de mémoire identiques. La mémoire de réserve doit être activée via le programme de configuration du système. Elle peut être utilisée uniquement si la mise en miroir de la mémoire n'est pas activée. Cette fonctionnalité permet d'allouer quatre rangées DIMM au banc de réserve (première rangée des logements DIMM 1 à 4). La capacité totale des quatre DIMM est allouée à la mémoire de réserve pour les barrettes à une seule rangée de connexions, et seulement la moitié si vous utilisez des barrettes à double rangée de connexions. Le tableau 3-1 indique comment cette fonction répartit la mémoire disponible et la mémoire de réserve pour chaque combinaison de barrettes (à simple et à double rangée de connexions). Prise en charge de la mise en miroir de la mémoire Le système prend en charge la mise en miroir de la mémoire s'il est équipé de huit barrettes de mémoire identiques. La mise en miroir doit être activée via le programme de configuration du système. Elle peut être utilisée uniquement si la mémoire de réserve n'est pas activée. Dans une configuration en miroir, seule la moitié de la mémoire système installée est disponible. Installation de barrettes de mémoire PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Reportez-vous au Guide d'informations sur le produit pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l'ordinateur et la protection contre les décharges électrostatiques. 1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant. 2 Ouvrez le système. Voir “Ouverture du système”, page 47. 3 Retirez le protecteur de ventilation des barrettes de mémoire. Voir “Retrait du protecteur de ventilation”, page 76. Tableau 3-1. Configurations pour l'utilisation d'une mémoire de réserve Barrettes DIMM Taille/Type Mémoire totale Disponible Réserve 8 256 Mo, simple rangée de connexions 2 Go 1 Go 1 Go 512 Mo, simple rangée de connexions 4 Go 2 Go 2 Go 1 Go, simple rangée de connexions 8 Go 4 Go 4 Go 2 Go, simple rangée de connexions 16 Go 8 Go 8 Go 2 Go, double rangée de connexions 16 Go 12 Go 4 GoInstallation des composants du système 83 AVIS : ne retirez jamais le protecteur de ventilation de la mémoire sans mettre le système hors tension au préalable. Le système pourrait surchauffer et s'arrêter, entraînant une perte de données. 4 Repérez les emplacements mémoire sur la carte système. Voir la figure 6-2. PRÉCAUTION : les barrettes DIMM restent chaudes un certain temps après la mise hors tension du système. Laissez-les tiédir avant de les manipuler. Tenez-les par les bords en évitant de toucher leurs composants. 5 Appuyez sur les dispositifs d'éjection du support de barrette de mémoire, puis écartez-les (voir la figure 3-20) pour pouvoir insérer la barrette dans le support. Figure 3-20. Installation et retrait d'une barrette de mémoire 6 Alignez le connecteur latéral de la barrette avec le détrompeur du support, puis insérez la barrette dans le support. REMARQUE : les détrompeurs permettent de s'assurer que la barrette sera insérée dans le bon sens. 7 Appuyez sur la barrette de mémoire avec les pouces tout en relevant les dispositifs d'éjection avec les index pour verrouiller la barrette dans son support. Si la barrette de mémoire est installée correctement, les dispositifs d'éjection s'alignent avec ceux des autres supports contenant des barrettes de mémoire. 8 Recommencez la procédure de l'étape 3 à l'étape 7, pour installer les barrettes restantes. 9 Réinstallez le protecteur de ventilation de la mémoire. Voir “Retrait et installation du protecteur de ventilation”, page 54. AVIS : ne faites jamais fonctionner le système si le protecteur de ventilation de la mémoire a été retiré. Le système pourrait surchauffer et s'arrêter, entraînant une perte de données. 10 Refermez le système. Voir “Fermeture du système”, page 47. 1 Barrette de mémoire 2 Dispositifs d'éjection (2) 3 Support 4 Détrompeur 2 1 3 484 Installation des composants du système 11 Rebranchez le système à la prise de courant et allumez-le, ainsi que les périphériques connectés. 12 (Facultatif) Appuyez sur pour accéder au programme de configuration du système et vérifiez le paramètre System Memory (Mémoire système) affiché dans l'écran principal. La valeur indiquée doit déjà avoir été modifiée par le système pour prendre en compte la mémoire qui vient d'être installée. 13 Si la valeur est fausse, il est possible qu'un ou plusieurs barrettes soient mal installées. Répétez la procédure de l'étape 2 à l'étape 12, en vérifiant que les barrettes de mémoire sont correctement emboîtées dans leurs supports. 14 Exécutez le test de mémoire des diagnostics du système. Voir “Exécution des diagnostics du système”, page 123. Retrait de barrettes de mémoire PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Reportez-vous au Guide d'informations sur le produit pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l'ordinateur et la protection contre les décharges électrostatiques. 1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant. 2 Ouvrez le système. Voir “Ouverture du système”, page 47. 3 Retirez le protecteur de ventilation des barrettes de mémoire. Voir “Retrait du protecteur de ventilation”, page 76. AVIS : ne retirez jamais le protecteur de ventilation de la mémoire sans mettre le système hors tension au préalable. Le système pourrait surchauffer et s'arrêter, entraînant une perte de données. 4 Repérez les emplacements mémoire sur la carte système. Voir la figure 6-2. PRÉCAUTION : les barrettes DIMM restent chaudes un certain temps après la mise hors tension du système. Laissez-les tiédir avant de les manipuler. Tenez-les par les bords en évitant de toucher leurs composants. 5 Poussez les dispositifs d'éjection situés de chaque côté du support vers le bas et vers l'extérieur pour extraire la barrette de mémoire. Voir la figure 3-20. 6 Réinstallez le protecteur de ventilation de la mémoire. Voir “Retrait et installation du protecteur de ventilation”, page 54. AVIS : ne faites jamais fonctionner le système si le protecteur de ventilation de la mémoire a été retiré. Le système pourrait surchauffer et s'arrêter, entraînant une perte de données. 7 Refermez le système. Voir “Fermeture du système”, page 47. 8 Branchez le cordon d'alimentation sur le bloc d'alimentation et sur la prise électrique.Installation des composants du système 85 Installation d'une carte RAC PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Reportez-vous au Guide d'informations sur le produit pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l'ordinateur et la protection contre les décharges électrostatiques. 1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant. 2 Ouvrez le système. Voir “Ouverture du système”, page 47. 3 Retirez le protecteur de ventilation. Voir “Retrait et installation du protecteur de ventilation”, page 54. 4 Retirez l'obturateur de prise du panneau arrière du système. Voir la figure 3-21. Figure 3-21. Installation d'une carte RAC 1 Picot arrière 2 Découpe du connecteur de NIC 3 Carte RAC 4 Connecteur 2 de la carte 5 Connecteur 1 de la carte 6 Support de la baie d'extension 7 Picots et clips latéraux (2) 8 Encoche latérale 8 4 5 6 2 1 3 786 Installation des composants du système 5 Placez la carte RAC de sorte que son connecteur de NIC s'insère dans l'ouverture appropriée du panneau arrière. Voir la figure 3-21. 6 Fixez la carte au support de la baie d'extension : a Positionnez la carte RAC sur le support de la baie d'extension, de façon que le picot de plastique situé à l'arrière du support s'insère dans l'encoche située sur le bord de la carte. b Enfoncez doucement le bord arrière de la carte sur les deux picots jusqu'à ce que les clips de fixation se referment sur le bord de la carte. Voir la figure 3-21. 7 Enfichez les câbles rubans dans les connecteurs de la carte RAC (voir la figure 3-21) et dans les connecteurs correspondants de la carte système (voir la figure 6-2) : AVIS : lorsque vous enfichez des câbles sur la carte système, prenez garde à ne pas endommager les composants adjacents. Veillez tout particulièrement à ne pas pousser ni tordre les condensateurs situés près des connecteurs. a Branchez un câble sur le connecteur 1 de la carte RAC et sur le connecteur RAC_CONN1 de la carte système. b Branchez le second câble sur le connecteur 2 de la carte RAC et sur le connecteur RAC_CONN2 de la carte système. 8 Réinstallez le protecteur de ventilation. Voir “Installation du protecteur de ventilation”, page 77. AVIS : ne faites jamais fonctionner le système si le protecteur de ventilation de la mémoire a été retiré. Le système pourrait surchauffer et s'arrêter, entraînant une perte de données. 9 Fermez le système. Voir “Fermeture du système”, page 47. 10 Rebranchez le système à la prise de courant et allumez-le, ainsi que les périphériques connectés. 11 Accédez au programme de configuration du système et vérifiez que le paramètre de la carte RAC a été modifié pour prendre en compte la présence de la nouvelle carte. Voir “Utilisation du programme de configuration du système”, page 31. Consultez la documentation de la carte RAC pour plus d'informations sur sa configuration et son utilisation.Installation des composants du système 87 Activation du moteur TOE sur le NIC intégré Pour activer le moteur TOE (TCP/IP Offload Engine, moteur de décentralisation TCP/IP) sur le NIC intégré du système, installez la clé matérielle TOE dans le connecteur TOE_KEY de la carte système (voir la figure 6-2). Pour obtenir les instructions d'installation des logiciels TOE, consultez la documentation fournie avec la clé matérielle. Microprocesseur Pour tirer parti des futures options en matière de vitesse et des nouvelles fonctionnalités émergentes, vous pouvez ajouter un second processeur ou mettre le(s) processeur(s) existant(s) à niveau. Chaque processeur et sa mémoire cache interne sont contenus dans une matrice LGA (Land Grid Array), installée dans un support ZIF de la carte système. Remplacement d'un processeur PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Reportez-vous au Guide d'informations sur le produit pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l'ordinateur et la protection contre les décharges électrostatiques. 1 Avant de mettre le système à niveau, téléchargez la version du BIOS système la plus récente disponible à l'adresse support.dell.com. 2 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant. 3 Ouvrez le système. Voir “Ouverture du système”, page 47. 4 Retirez les ventilateurs du support central. Voir “Retrait et installation d'un ventilateur”, page 53. 5 Retirez le support de ventilateur central. Voir “Retrait du support de ventilateur central”, page 78. AVIS : il se peut que le processeur reste attaché au dissipateur de chaleur et se désolidarise de son support lors vous retirez le dissipateur. C'est pourquoi il est recommandé de retirer le dissipateur de chaleur quand le processeur est encore tiède. AVIS : ne retirez jamais le dissipateur de chaleur d'un processeur si vous n'avez pas l'intention de retirer le processeur lui-même. Le dissipateur de chaleur est indispensable pour maintenir les conditions de température adéquates. 6 Appuyez sur la patte bleue située à l'extrémité de l'un des leviers de fixation du dissipateur de chaleur, puis relevez ce levier de 90 degrés. Voir la figure 3-22.88 Installation des composants du système Figure 3-22. Installation et retrait du dissipateur de chaleur 7 Patientez 30 secondes, le temps que le dissipateur de chaleur se détache du processeur. 8 Ouvrez l'autre levier de fixation du dissipateur de chaleur. 9 Si le dissipateur de chaleur ne s'est pas détaché du processeur, faites-le doucement tourner dans le sens des aiguilles d'une montre, puis dans l'autre sens jusqu'à ce qu'il se détache. Ne tirez pas sur le dissipateur de chaleur pour l'arracher du processeur. 10 Soulevez le dissipateur de chaleur pour le dégager du processeur et mettez-le de côté. 1 Dissipateur de chaleur 2 Levier de fixation du dissipateur de chaleur (2) 3 Loquet du levier de fixation 1 2 3Installation des composants du système 89 11 Relevez le levier d'éjection de 90 degrés jusqu'à ce que le processeur sorte de son support. Voir la figure 3-23. 12 Relevez le cadre de protection pour dégager le processeur. Figure 3-23. Installation et retrait d'un processeur 13 Sortez le processeur et laissez le levier relevé afin de pouvoir installer le nouveau processeur. AVIS : veillez à ne pas tordre les broches du support ZIF lors du retrait du processeur. Vous risqueriez d'endommager définitivement la carte système. 14 Déballez le nouveau processeur. 15 Alignez le processeur avec les repères du support ZIF. Voir la figure 3-23. 16 Installez le processeur dans le support. AVIS : un mauvais positionnement risquerait d'endommager définitivement la carte système ou le processeur lorsque vous remettrez le système sous tension. Lorsque vous insérez le processeur dans le support, prenez garde à ne pas tordre les broches de ce dernier. a Si ce n'est déjà fait, redressez le levier d'éjection. b Une fois le processeur aligné sur les repères, insérez-le doucement dans le support, en vous assurant que toutes les broches correspondent bien aux trous appropriés du support. 1 Repère (2) 2 Support ZIF 3 Processeur 4 Levier d'éjection 5 Cadre de protection du processeur 5 1 3 2 490 Installation des composants du système AVIS : ne forcez pas lorsque vous mettez le processeur en place. S'il est positionné correctement, il s'insère dans le support très facilement. c Lorsque le processeur est parfaitement positionné dans le connecteur, abaissez le levier d'éjection jusqu'à ce qu'il s'enclenche, verrouillant le processeur dans le connecteur. Voir la figure 3-23. d Fermez le cache du processeur. Voir la figure 3-23. 17 Installez le dissipateur de chaleur. a À l'aide d'un chiffon propre et non pelucheux, retirez la graisse qui recouvre le dissipateur de chaleur. REMARQUE : si aucun nouveau dissipateur de chaleur n'est fourni, utilisez celui que vous avez retiré à l'étape 10. b Retirez la feuille de protection qui recouvre la couche de graisse thermique se trouvant sur le dessus du processeur. Si la graisse thermique n'a pas été préappliquée sur le processeur, ouvrez le paquet de graisse fourni avec le kit du processeur et appliquez-en une couche régulière sur le dessus du processeur. c Placez le dissipateur de chaleur sur le processeur. Voir la figure 3-22. d Verrouillez l'un des deux leviers de fixation du dissipateur de chaleur. Voir la figure 3-22. e Verrouillez l'autre levier de fixation. 18 Réinstallez le support de ventilateur central. Voir “Réinstallation du support de ventilateur central”, page 78. 19 Réinstallez les ventilateurs sur le support central. Voir “Retrait et installation d'un ventilateur”, page 53. 20 Fermez le système. Voir “Fermeture du système”, page 47. 21 Rebranchez le système à la prise de courant et allumez-le, ainsi que les périphériques connectés. Lorsque le système démarre, il détecte la présence du nouveau processeur et modifie automatiquement les informations du programme de configuration du système. 22 Appuyez sur pour accéder au programme de configuration du système et vérifier que les informations relatives au processeur correspondent bien à la nouvelle configuration. Voir “Utilisation du programme de configuration du système”, page 31 pour obtenir les instructions d'utilisation du programme de configuration du système. 23 Exécutez les diagnostics du système pour vérifier que le nouveau processeur fonctionne correctement. Voir “Exécution des diagnostics du système”, page 123 pour obtenir des informations sur l'exécution des diagnostics et la résolution des incidents liés au processeur.Installation des composants du système 91 Carte contrôleur fille RAID SAS Le logement INT STORAGE est réservé à l'installation d'une carte contrôleur fille RAID SAS. Voir la figure 3-7. La carte contrôleur fille RAID SAS (en option) peut prendre en charge jusqu'à 6 disques durs SAS ou SATA et permet de les inclure dans une configuration RAID 0, 1, 5 ou 10. Pour plus d'informations, reportez-vous à la documentation fournie avec la carte. Remplacement de la pile d'une carte contrôleur fille RAID SAS 1 Débranchez le câble de la pile enfiché sur la carte contrôleur fille RAID SAS. Pour ce faire, dégagez la patte se trouvant sur le connecteur de câble de la carte puis retirez le câble. Voir la figure 3-24. 2 Faites passer le connecteur dans l'orifice situé sur le support de la baie d'extension. Retirez ensuite la pile du support. Voir la figure 3-24. 3 Insérez la nouvelle pile dans la baie en vous assurant qu'elle est correctement alignée et insérée dans les encoches. Voir la figure 3-24. 4 Faites passer le connecteur du câble dans l'orifice et connectez le câble de la pile à la carte contrôleur fille RAID SAS. Voir la figure 3-24.92 Installation des composants du système Figure 3-24. Remplacement de la pile d'une carte contrôleur fille RAID SAS 1 Patte de dégagement du connecteur 2 Orifice pour le câble de la pile RAID 3 Câble de la pile RAID 4 Support de la baie d'extension 5 Baie de la pile 6 Pile RAID 7 Carte contrôleur fille RAID SAS 8 Câble du voyant d'activité de disque dur 9 Connecteur de câble pour le voyant d'activité du disque dur 4 5 9 1 6 2 7 8 3Installation des composants du système 93 Retrait de la carte contrôleur fille RAID SAS 1 Le cas échéant, déconnectez le câble de la pile RAID. Pour ce faire, ouvrez la patte située sur le connecteur de câble de la carte contrôleur fille RAID SAS. Voir la figure 3-25. 2 Retirez le câble du voyant d'activité de disque dur, qui est enfiché sur la carte contrôleur fille RAID SAS. 3 Poussez les rails de plastique vers l'extérieur puis tirez doucement les bords de la carte jusqu'à ce que son connecteur se dégage de la carte système. Voir la figure 3-25. Pour remplacer la pile de la carte contrôleur fille RAID SAS, voir “Remplacement de la pile d'une carte contrôleur fille RAID SAS”, page 91. Figure 3-25. Installation et retrait de la carte contrôleur fille RAID SAS 6 1 3 8 2 5 7 4 1 Carte contrôleur fille RAID SAS 2 Câble de la pile RAID (RAID SAS uniquement) 3 Logement pour carte contrôleur fille RAID SAS (INT_STORAGE) 4 Connecteur de voyant d'activité de disque dur (HD_ACT_CARD, sur la carte système) 5 Rails coulissants (2) 6 Connecteur RAID SAS 0 7 Connecteur de câble pour le voyant d'activité du disque dur 8 Connecteur RAID SAS 194 Installation des composants du système Installation d'une carte contrôleur fille RAID SAS 1 Tenez la carte fille par les bords et alignez-la avec les rails coulissants situés sur le support de la baie d'extension. Voir la figure 3-25. REMARQUE : lorsque vous enfoncez la carte contrôleur fille RAID SAS dans le connecteur, appuyez uniquement sur les bords de la carte, sans toucher la barrette DIMM ni le support DIMM de la carte fille. 2 Insérez la carte dans les rails coulissants et poussez-la jusqu'à ce que son connecteur latéral s'insère dans le logement INT STORAGE de la carte système. Voir la figure 3-7 et la figure 3-25. 3 Insérez le câble de la pile dans le connecteur correspondant de la carte contrôleur fille RAID SAS. Voir la figure 3-24. 4 Insérez le câble du voyant d'activité de disque dur dans la carte contrôleur fille RAID SAS et dans la carte système (connecteur HD_ACT_CARD). Voir la figure 3-25 et la figure 6-2. Pour remplacer la pile de la carte contrôleur fille RAID SAS, voir “Remplacement de la pile d'une carte contrôleur fille RAID SAS”, page 91. Configuration du lecteur d'amorçage L'ordre des périphériques de démarrage est défini dans le programme de configuration du système. Voir “Utilisation du programme de configuration du système”, page 31. Assemblage du panneau de commande (maintenance uniquement) Retrait de l'assemblage du panneau de commande PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Reportez-vous au Guide d'informations sur le produit pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l'ordinateur et la protection contre les décharges électrostatiques. 1 Retirez le cadre avant, s'il est installé. Voir “Retrait du cadre”, page 46. 2 Mettez le système hors tension, y compris les périphériques connectés, puis débranchez-le de la prise de courant et des périphériques. 3 Ouvrez le système. Voir “Ouverture du système”, page 47. 4 Retirez le capot supérieur du système : a Retirez la vis de fixation du panneau, située en haut et à l'arrière du système. b Faites coulisser le panneau vers l'arrière jusqu'à ce qu'il se dégage des crochets du châssis. Soulevez-le pour le retirer. 5 Déconnectez le câble du module d'affichage de la carte du panneau de commande. Voir la figure 3-26. 6 Retirez les trois vis qui fixent la carte du panneau de commande au châssis, puis retirez la carte. Voir la figure 3-26.Installation des composants du système 95 7 Débranchez le câble connecté à l'arrière du panneau de commande. Voir la figure 3-26. AVIS : ne tirez pas sur le câble pour le dégager de son connecteur. Vous risqueriez de l'endommager. a Appuyez sur les pattes métalliques situées de chaque côté du connecteur du câble. b Retirez doucement le connecteur de son support. 8 Retirez le module d'affichage : a Insérez le bout d'un trombone dans l'orifice situé sur le côté droit du module d'affichage, puis retirez doucement l'étiquette. b À l'aide d'un tournevis Torx T10, retirez les deux vis qui fixent le module d'affichage au châssis. c Retirez le module d'affichage. Figure 3-26. Retrait de l'assemblage du panneau de commande 1 Vis (3) 2 Carte du panneau de commande 3 Câble du panneau de commande 4 Châssis du système 5 Câble du module d'affichage 6 Module d'affichage 7 Vis du module d'affichage (2) 8 Étiquette du module d'affichage 6 5 4 2 3 7 8 196 Installation des composants du système Installation de l'assemblage du panneau de commande 1 Insérez le module d'affichage du panneau de commande dans l'ouverture du châssis et fixez-le à l'aide des deux vis Torx. 2 Collez l'étiquette du panneau de commande sur le module d'affichage. 3 Installez la carte du panneau de commande dans le châssis et fixez-la à l'aide des trois vis cruciformes. Voir la figure 3-26. 4 Connectez le câble du module d'affichage à la carte du panneau de commande. Voir la figure 3-26. 5 Connectez le câble du panneau de commande à la carte du panneau de commande. Voir la figure 3-26. 6 Refermez le système. Voir “Fermeture du système”, page 47. 7 Le cas échéant, réinstallez le panneau supérieur de la tour : a Placez le panneau sur le haut du système et décalez-le légèrement pour qu'il s'emboîte dans les crochets du châssis. b Faites glisser le panneau vers l'avant pour le refermer. c Réinstallez la vis de fixation en haut et à l'arrière du système. 8 Rebranchez le système à la prise de courant et allumez-le, ainsi que les périphériques connectés. 9 Remettez le cadre en place, si vous l'avez retiré précédemment. Voir “Installation du cadre”, page 47. Carte système (maintenance uniquement) Retrait de la carte système PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Reportez-vous au Guide d'informations sur le produit pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l'ordinateur et la protection contre les décharges électrostatiques. PRÉCAUTION : demandez toujours de l'aide avant de soulever le système. N'essayez pas de le soulever seul car vous risqueriez de vous blesser. 1 Retirez le cadre avant, s'il est installé. Voir “Retrait du cadre”, page 46. 2 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant. 3 Déconnectez tous les câbles de l'avant et de l'arrière du système. 4 Ouvrez le système. Voir “Ouverture du système”, page 47. 5 Déconnectez tous les câbles reliés aux cartes d'extension qui sont installées dans le support de la baie d'extension. 6 Retirez tous les ventilateurs. Voir “Retrait et installation d'un ventilateur”, page 53 et “Retrait et installation du protecteur de ventilation”, page 54. 7 Retirez le protecteur de ventilation de la mémoire. Voir “Retrait du protecteur de ventilation”, page 76.Installation des composants du système 97 8 Retirez les supports de ventilateur central et arrière. Voir “Retrait du support de ventilateur central”, page 78 et “Retrait du support de ventilateur arrière”, page 79. 9 Retirez toutes les cartes d'extension installées dans la baie d'extension. Voir “Retrait d'une carte d'extension”, page 58. 10 Le cas échéant, retirez la carte contrôleur fille RAID SAS du connecteur correspondant sur la carte système : a Poussez les rails de plastique vers l'extérieur puis tirez doucement les bords de la carte jusqu'à ce que son connecteur se dégage du support. b Retirez la carte contrôleur fille RAID SAS du support de la baie d'extension et mettez-la de côté pour la réinstaller ultérieurement. 11 Si le système est équipé d'une carte RAC, déconnectez les câbles reliant cette dernière à la carte système.Laissez la carte RAC connectée au support de la baie d'extension. Appuyez sur les pattes métalliques situées de chaque côté du connecteur de câble de la carte RAC. Retirez doucement ce connecteur de son support. 12 Retirez le support de la baie d'extension : a Tirez vers l'intérieur le loquet situé à gauche du support, contre la paroi du châssis, tout en soulevant le plot situé à l'arrière du système. b Tirez le support doucement vers l'avant pour le dégager des pattes du châssis, puis soulevez-le pour le retirer. 13 Retirez la clé TOE, le cas échéant. Voir la figure 6-2. 14 Débranchez tous les câbles des connecteurs situés sur le bord avant de la carte système. PRÉCAUTION : les barrettes DIMM restent chaudes un certain temps après la mise hors tension du système. Laissez-les tiédir avant de les manipuler. Tenez-les par les bords en évitant de toucher leurs composants. 15 Retirez les barrettes de mémoire. Voir “Retrait de barrettes de mémoire”, page 84. 16 Retirez le ou les processeurs. Voir “Remplacement d'un processeur”, page 87.98 Installation des composants du système 17 Pour retirer la carte système, procédez comme suit : a Soulevez le plot de fixation et saisissez l'avant du plateau de la carte système. Faites doucement coulisser la carte système vers l'avant du système pour la dégager des crochets du châssis. Voir la figure 3-27. b Poussez la carte vers l'arrière du système, puis inclinez son côté gauche vers le haut et utilisez les poignées pour soulever la carte et l'extraire du châssis. Voir la figure 3-27. Figure 3-27. Retrait de la carte système 1 Carte système 2 Poignées de la carte système (3) 3 Crochets du châssis 4 Plot de fixation 4 1 2 3Installation des composants du système 99 Installation de la carte système PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Reportez-vous au Guide d'informations sur le produit pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l'ordinateur et la protection contre les décharges électrostatiques. 1 Déballez la nouvelle carte. 2 Installez-la. a Tenez la carte système par son bord avant et par les poignées. Voir la figure 3-27. b Abaissez doucement la carte système dans le châssis en inclinant légèrement le côté contenant les logements DIMM, pour éviter que la carte ne touche les rails des parois du châssis. Assurezvous que les connecteurs d'E-S figurant sur le bord arrière de la carte s'insèrent sous le rebord situé sur l'intérieur du panneau arrière du châssis. Lorsque la carte est correctement positionnée, les pattes du châssis s'insèrent dans les encoches correspondantes de la carte. c Faites glisser le plateau de la carte système vers l'arrière du châssis, jusqu'à ce que le plot de fixation s'enclenche. 3 Rebranchez les câbles d'alimentation sur les connecteurs PWR1, PWR2 et PWR CTRL de la carte système. Voir la figure 6-2. 4 Réinstallez le ou les processeurs. Voir “Remplacement d'un processeur”, page 87. 5 Réinstallez les barrettes de mémoire. Voir “Installation de barrettes de mémoire”, page 82. 6 Rebranchez tous les câbles sur les connecteurs situés sur le bord avant de la carte système. 7 Réinstallez la clé TOE, le cas échéant. Voir la figure 6-2. 8 Réinstallez le support de la baie d'extension : a Alignez le support de la baie d'extension avec les pattes situées sur la carte système et sur la paroi du châssis. Poussez doucement le support pour l'enclencher sur les pattes. b Poussez doucement le support vers l'arrière du châssis jusqu'à ce que le loquet de gauche et le plot arrière s'enclenchent.100 Installation des composants du système 9 Installez toutes les cartes d'extension. Voir “Cartes d'extension”, page 56. 10 Le cas échéant, réinstallez la carte contrôleur fille RAID SAS. Voir “Installation d'une carte contrôleur fille RAID SAS”, page 94. 11 Si le système est équipé d'une carte RAC, branchez les câbles sur les connecteurs correspondants de la carte système. Voir “Installation d'une carte RAC”, page 85. 12 Réinstallez les supports de ventilateur central et arrière. Voir “Réinstallation du support de ventilateur central”, page 78 et “Réinstallation du support de ventilateur arrière”, page 79. 13 Installez le protecteur de ventilation des barrettes de mémoire. Voir “Installation du protecteur de ventilation”, page 77. AVIS : ne faites jamais fonctionner le système si le protecteur de ventilation de la mémoire a été retiré. Le système pourrait surchauffer et s'arrêter, entraînant une perte de données. 14 Installez tous les ventilateurs. Voir “Retrait et installation d'un ventilateur”, page 53. 15 Reconnectez tous les câbles sur les cartes d'extension. 16 Refermez le système. Voir “Fermeture du système”, page 47. 17 Reconnectez tous les câbles à l'avant et à l'arrière du système. 18 Rebranchez le système à la prise de courant et allumez-le, ainsi que les périphériques connectés. 19 Remettez le cadre en place, si vous l'avez retiré précédemment. Voir “Installation du cadre”, page 47.Dépannage du système 101 Dépannage du système La sécurité d'abord, pour vous et pour le système Pour effectuer certaines des procédures décrites ici, vous devez retirer le capot du système et intervenir à l'intérieur. Lorsque vous intervenez sur le système, suivez strictement les opérations décrites dans ce guide ou dans une autre documentation accompagnant le système. PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Avant de commencer toute intervention, reportez-vous au Guide d'informations sur le produit pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l'ordinateur et la protection contre les décharges électrostatiques. Routine de démarrage Écoutez et observez le système pendant la procédure de démarrage, pour repérer les symptômes décrits dans le tableau 4-1. Tableau 4-1. Indications fournies par la procédure de démarrage Symptôme Action L'écran LCD du panneau avant affiche un message d'état ou d'erreur. Voir “Messages d'état affichés sur l'écran LCD”, page 15. Un message d'erreur est affiché sur le moniteur. Voir “Messages système”, page 22. Messages d'alerte du logiciel de gestion de systèmes. Consultez la documentation du logiciel de gestion de systèmes. Comportement du voyant d'alimentation du moniteur. Voir “Dépannage du sous-système vidéo”, page 103. Comportement des voyants du clavier. Voir “Dépannage du clavier”, page 104. Comportement du voyant d'activité du lecteur de disquette USB. Voir “Dépannage d'un périphérique USB”, page 106. Comportement du voyant d'activité du lecteur de CD USB. Voir “Dépannage d'un périphérique USB”, page 106. Comportement du voyant d'activité du lecteur de disquette. Voir “Dépannage d'un lecteur de disquette”, page 113. Comportement du voyant d'activité du lecteur de CD. Voir “Dépannage d'un lecteur optique”, page 114. Comportement du voyant d'activité du disque dur. Voir “Dépannage d'un disque dur”, page 116. Un bruit inhabituel de raclement ou de grincement constant se produit lorsque vous accédez à un disque. Voir “Obtention d'aide”, page 133.102 Dépannage du système Vérification du matériel Cette section contient les procédures de dépannage des périphériques externes directement connectés au système, comme le moniteur, le clavier ou la souris. Avant de suivre l'une de ces procédures, voir “Dépannage des connexions externes”, page 103. Résolution des conflits d'attribution d'IRQ La plupart des périphériques PCI peuvent partager une IRQ avec un autre périphérique ; cependant, les deux périphériques concernés ne peuvent pas fonctionner simultanément. Pour éviter ce type de conflit, consultez la documentation de chaque périphérique PCI pour obtenir ses spécifications d'IRQ. Les affectations des IRQ sont répertoriées dans le tableau 4-2. Tableau 4-2. Affectations par défaut des IRQ Ligne IRQ Affectation IRQ0 Horloge du système IRQ1 Contrôleur du clavier IRQ2 Contrôleur d'interruption 1, pour activer les IRQ 8 à 15 IRQ3 Port série 2 (COM2 et COM4) IRQ4 Port série 1 (COM1 et COM3) IRQ5 Contrôleur d'accès à distance IRQ6 Contrôleur du lecteur de disquette IRQ7 Réservé IRQ8 Horloge temps réel IRQ9 Fonctions ACPI (pour la gestion de l'alimentation) IRQ10 Disponible IRQ11 Disponible IRQ12 Port de souris PS/2, sauf si celle-ci est désactivée dans le programme de configuration du système IRQ13 Coprocesseur mathématique IRQ14 Contrôleur du lecteur de CD IDE IRQ15 DisponibleDépannage du système 103 Dépannage des connexions externes Le plus souvent, les problèmes du système, du moniteur et des autres périphériques (comme une imprimante, un clavier, une souris ou un autre périphérique externe) sont causés par des câbles mal raccordés ou déboîtés. Vérifiez que tous les câbles externes sont fermement raccordés aux connecteurs correspondants. Voir la figure 1-1 pour identifier les connecteurs du panneau avant et la figure 1-2 pour ceux du panneau arrière. Dépannage du sous-système vidéo Incident • Le moniteur ne fonctionne pas correctement. • La mémoire vidéo est défectueuse. Action 1 Vérifiez les connexions du moniteur à l'alimentation et au système. 2 Déterminez si le système contient une carte d'extension équipée d'un connecteur de sortie vidéo. Si tel est le cas, le câble du moniteur doit être branché sur le connecteur de la carte d'extension, et non sur le connecteur vidéo intégré du système. Pour vérifier que le moniteur est relié au connecteur approprié, mettez le système hors tension, attendez une minute, puis reliez le moniteur à l'autre connecteur vidéo. Remettez ensuite le système sous tension. 3 Déterminez si des moniteurs sont reliés à la fois au connecteur vidéo avant et au connecteur vidéo arrière. Le système prend en charge un seul moniteur, qui doit être connecté soit à l'avant, soit à l'arrière. Si un moniteur est connecté au panneau avant, le connecteur vidéo arrière est désactivé. Si deux moniteurs sont reliés au système, déconnectez-en un. Si l'incident persiste, passez à l'étape suivante. 4 Exécutez le test de diagnostic en ligne approprié. Voir “Utilisation des diagnostics de Server Administrator”, page 123. Si les tests aboutissent, l'incident n'est pas lié au matériel vidéo. Si les tests échouent, voir “Obtention d'aide”, page 133.104 Dépannage du système Dépannage du clavier Incident • Un message d'erreur du système signale un incident lié au clavier. • Le clavier ne fonctionne pas correctement. Action 1 Accédez au programme de configuration du système et vérifiez que les ports USB sont activés. Voir “Utilisation du programme de configuration du système”, page 31. 2 Examinez le clavier et son câble pour voir s'ils sont endommagés. 3 Remplacez le clavier défectueux par un clavier fiable. Si l'incident est résolu, remplacez le clavier défectueux. Voir “Obtention d'aide”, page 133. 4 Exécutez le test de diagnostic en ligne approprié. Voir “Utilisation des diagnostics de Server Administrator”, page 123. Si l'incident persiste, voir “Obtention d'aide”, page 133. Dépannage de la souris Incident • Un message d'erreur du système signale un incident lié à la souris. • La souris ne fonctionne pas correctement. Action 1 Exécutez le test de diagnostic en ligne approprié. Voir “Utilisation des diagnostics de Server Administrator”, page 123. Si le test échoue, passez à l'étape suivante. 2 Examinez la souris et son câble pour voir s'ils sont endommagés. Si la souris n'est pas endommagée, passez à l'étape 4. Si la souris est endommagée, passez à l'étape suivante. 3 Remplacez la souris défectueuse par une souris qui fonctionne. Si l'incident est résolu, remplacez la souris défectueuse. Voir “Obtention d'aide”, page 133. 4 Accédez au programme de configuration du système et vérifiez que le port USB est activé. Voir “Utilisation du programme de configuration du système”, page 31. Si l'incident persiste, voir “Obtention d'aide”, page 133.Dépannage du système 105 Dépannage des fonctions d'E-S de base Incident • Un message d'erreur signale un incident lié à un port série. • Un périphérique connecté à un port série ne fonctionne pas correctement. Action 1 Ouvrez le programme de configuration du système et vérifiez que le port série est activé et correctement configuré pour l'application en cours. Voir “Utilisation du programme de configuration du système”, page 31. 2 Si l'incident affecte uniquement une application particulière, consultez sa documentation pour connaître la configuration requise des différents ports. 3 Exécutez le test de diagnostic en ligne approprié. Voir “Utilisation des diagnostics de Server Administrator”, page 123. Si l'incident persiste alors que le test a abouti, voir “Dépannage d'un périphérique d'E-S série”, page 105. Dépannage d'un périphérique d'E-S série Incident • Le périphérique connecté au port série ne fonctionne pas correctement. Action 1 Éteignez le système et les périphériques connectés au port série. 2 Remplacez le câble d'interface série par un câble en état de fonctionnement, puis allumez le système et le périphérique série. Si l'incident est résolu, remplacez le câble d'interface. Voir “Obtention d'aide”, page 133. 3 Éteignez le système et le périphérique série et remplacez ce dernier par un périphérique similaire. 4 Allumez le système et le périphérique série. Si l'incident est résolu, remplacez le périphérique série. Voir “Obtention d'aide”, page 133. Si l'incident persiste, voir “Obtention d'aide”, page 133.106 Dépannage du système Dépannage d'un périphérique USB Incident • Un message du système signale un incident lié à un périphérique USB. • Un périphérique connecté à un port USB ne fonctionne pas correctement. Action 1 Accédez au programme de configuration du système et vérifiez que les ports USB sont activés. Voir “Utilisation du programme de configuration du système”, page 31. 2 Éteignez le système et tous les périphériques USB. 3 Déconnectez les périphériques USB, puis raccordez le périphérique défectueux à l'autre connecteur USB. 4 Allumez le système et le périphérique reconnecté. Si l'incident est résolu, le connecteur USB est peut-être défectueux. Voir “Obtention d'aide”, page 133. 5 Si possible, remplacez le câble d'interface par un câble qui fonctionne. Si l'incident est résolu, remplacez le câble d'interface. Voir “Obtention d'aide”, page 133. 6 Éteignez le système et le périphérique USB et remplacez ce dernier par un périphérique similaire. 7 Allumez le système et le périphérique USB. Si l'incident est résolu, remplacez le périphérique USB. Voir “Obtention d'aide”, page 133. Si l'incident persiste, voir “Obtention d'aide”, page 133. Dépannage d'un NIC Incident • Le NIC ne parvient pas à communiquer avec le réseau. Action 1 Exécutez le test de diagnostic en ligne approprié. Voir “Utilisation des diagnostics de Server Administrator”, page 123. 2 Observez le voyant approprié du connecteur de NIC. • Si le voyant de lien ne s'allume pas, vérifiez toutes les connexions des câbles. • Si le voyant d'activité ne s'allume pas, les fichiers des pilotes réseau sont peut-être altérés ou manquants. Retirez et réinstallez les pilotes le cas échéant. Consultez la documentation du NIC.Dépannage du système 107 • Si possible, modifiez le paramétrage de négociation automatique. • Utilisez un autre connecteur sur le commutateur ou le concentrateur. Si vous utilisez une carte réseau au lieu d'un NIC intégré, consultez la documentation fournie avec celle-ci. 3 Vérifiez que les pilotes appropriés sont installés et que les protocoles sont liés. Consultez la documentation du NIC. 4 Accédez au programme de configuration du système et vérifiez que les interfaces réseau sont activées. Voir “Utilisation du programme de configuration du système”, page 31. 5 Vérifiez que les NIC, les concentrateurs et les commutateurs du réseau sont tous réglés sur la même vitesse de transmission des données. Consultez la documentation du matériel réseau. 6 Vérifiez que tous les câbles réseau sont du type approprié et qu'ils ne dépassent pas la longueur maximum. Dépannage d'un système mouillé Incident • Système mouillé. • Excès d'humidité. Action PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Avant de commencer toute intervention, reportez-vous au Guide d'informations sur le produit pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l'ordinateur et la protection contre les décharges électrostatiques. 1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant. 2 Ouvrez le système. Voir “Ouverture du système”, page 47. 3 Retirez toutes les cartes d'extension du système. Voir “Retrait d'une carte d'extension”, page 58. 4 Laissez le système sécher complètement pendant au moins 24 heures. 5 Refermez le système. Voir “Fermeture du système”, page 47. 6 Rebranchez le système à la prise de courant et allumez-le, ainsi que les périphériques connectés. Si le système ne démarre pas normalement, voir “Obtention d'aide”, page 133. 7 Si le système démarre normalement, arrêtez-le et réinstallez les cartes d'extension que vous avez retirées. Voir “Cartes d'extension”, page 56. 8 Exécutez le test de diagnostic en ligne approprié. Voir “Utilisation des diagnostics de Server Administrator”, page 123. Si les tests échouent, voir “Obtention d'aide”, page 133.108 Dépannage du système Dépannage d'un système endommagé Incident • Le système est tombé ou a été endommagé. Action PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Avant de commencer toute intervention, reportez-vous au Guide d'informations sur le produit pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l'ordinateur et la protection contre les décharges électrostatiques. 1 Ouvrez le système. Voir “Ouverture du système”, page 47. 2 Assurez-vous que les composants suivants sont correctement installés : • Cartes d'extension • Blocs d'alimentation • Ventilateurs • Processeurs et dissipateurs de chaleur • Barrettes de mémoire 3 Vérifiez que tous les câbles sont correctement connectés. 4 Refermez le système. Voir “Fermeture du système”, page 47. 5 Lancez les tests System board (Carte système) des diagnostics du système. Voir “Exécution des diagnostics du système”, page 123. Si les tests échouent, voir “Obtention d'aide”, page 133. Dépannage de la pile du système Incident • Un message du système signale un incident lié à la pile. • Le programme de configuration du système perd les informations. • La date et l'heure du système se dérèglent constamment. REMARQUE : si le système reste éteint longtemps (pendant des semaines ou des mois), la NVRAM peut perdre ses informations de configuration. Cette situation est causée par une pile défectueuse. Dépannage du système 109 Action 1 Entrez de nouveau l'heure et la date dans le programme de configuration du système. Voir “Utilisation du programme de configuration du système”, page 31. 2 Éteignez et débranchez le système de la prise électrique pendant au moins une heure. 3 Rebranchez le système sur la prise de courant et allumez-le. 4 Accédez au programme de configuration du système. Si la date et l'heure du programme de configuration du système ne sont pas correctes, remplacez la pile. Voir “Remplacement de la pile du système”, page 75. Si l'incident persiste lorsque vous remplacez la pile, voir “Obtention d'aide”, page 133. REMARQUE : certains logiciels peuvent provoquer une accélération ou un ralentissement de l'heure système. Si le système semble fonctionner normalement à l'exception de l'heure qui est conservée dans le programme de configuration du système, l'incident peut être causé par un logiciel plutôt que par une pile défectueuse. Dépannage du bloc d'alimentation Incident • Le bouton d'alimentation est vert clignotant, mais le système ne se met pas sous tension. Action 1 Vérifiez le branchement des câbles insérés dans les connecteurs PWR1, PWR2 et PWR CTRL de la carte système. Voir la figure 6-2. 2 Remplacez le bloc d'alimentation défectueux par un nouveau bloc d'alimentation. Voir “Retrait du bloc d'alimentation”, page 49 et “Installation du bloc d'alimentation”, page 51. Si l'incident persiste, voir “Obtention d'aide”, page 133. Incident • Le bouton d'alimentation n'est pas vert clignotant et le système ne se met pas sous tension. Action 1 Vérifiez que le câble d'alimentation est bien connecté entre le bloc d'alimentation et la prise électrique. 2 Si vous avez un onduleur, assurez-vous qu'il est correctement raccordé au bloc d'alimentation et à la prise électrique. 3 Retirez et réinstallez le bloc d'alimentation pour vous assurer qu'il est bien en place. Voir “Retrait du bloc d'alimentation”, page 49 et “Installation du bloc d'alimentation”, page 51. Si l'incident persiste, retirez le bloc d'alimentation défectueux. Voir “Retrait du bloc d'alimentation”, page 49. 4 Installez un nouveau bloc d'alimentation. Voir “Retrait du bloc d'alimentation”, page 49 et “Installation du bloc d'alimentation”, page 51. Si l'incident persiste, consultez le chapitre “Obtention d'aide”, page 133”.110 Dépannage du système Dépannage des incidents de refroidissement du système Incident • Le logiciel de gestion de systèmes a émis un message d'erreur concernant les ventilateurs. Action Vérifiez qu'aucune des conditions suivantes n'est présente : • Le capot du système, le protecteur de ventilation, un cache de lecteur ou une plaque de recouvrement avant ou arrière a été retiré. • La température ambiante est trop élevée. • La circulation de l'air extérieur est bloquée. • Les câbles à l'intérieur du système gênent l'aération. • Un des ventilateurs a été retiré ou est en panne. Voir “Dépannage d'un ventilateur”, page 110. Dépannage d'un ventilateur Incident • Le voyant d'état du système est orange. • Le logiciel de gestion de systèmes a émis un message d'erreur concernant les ventilateurs. • L'écran LCD du panneau avant signale un incident au niveau du ventilateur. Action PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Avant de commencer toute intervention, reportez-vous au Guide d'informations sur le produit pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l'ordinateur et la protection contre les décharges électrostatiques. 1 Exécutez le test de diagnostic approprié. Voir “Utilisation des diagnostics de Server Administrator”, page 123. 2 Ouvrez le système. Voir “Ouverture du système”, page 47. PRÉCAUTION : les ventilateurs sont enfichables à chaud. Pour maintenir un refroidissement adéquat lorsque le système est sous tension, remplacez les ventilateurs un à la fois. 3 Identifiez le ventilateur défectueux indiqué par l'écran LCD ou le logiciel de diagnostic. Pour connaître le numéro d'identification de chaque ventilateur, voir la figure 3-4. 4 Vérifiez la connexion du ventilateur en le retirant puis en le réinsérant dans son support. Voir “Retrait et installation d'un ventilateur”, page 53. REMARQUE : patientez 30 secondes pour laisser au système le temps de reconnaître le ventilateur et de déterminer s'il fonctionne normalement.Dépannage du système 111 5 Si l'incident persiste, installez un nouveau ventilateur. Voir “Retrait et installation d'un ventilateur”, page 53. Si le nouveau ventilateur fonctionne normalement, refermez le système. Voir “Fermeture du système”, page 47. Si le nouveau ventilateur ne fonctionne pas, voir “Obtention d'aide”, page 133. Dépannage de la mémoire système Incident • Barrette de mémoire défectueuse. • Carte système défectueuse. • L'écran LCD du panneau avant indique qu'un incident lié à la mémoire système s'est produit. Action PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Avant de commencer toute intervention, reportez-vous au Guide d'informations sur le produit pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l'ordinateur et la protection contre les décharges électrostatiques. 1 Exécutez le test de diagnostic en ligne approprié. Voir “Utilisation des diagnostics de Server Administrator”, page 123. 2 Allumez le système et les périphériques connectés. Si aucun message d'erreur n'apparaît, passez à l'étape suivante. Si un message d'erreur apparaît, passez à l'étape 11. 3 Accédez au programme de configuration du système et vérifiez le paramètre de la mémoire système. Voir “Utilisation du programme de configuration du système”, page 31. Si la quantité de mémoire installée correspond au paramètre de mémoire système, passez à l'étape 11. 4 Retirez le cadre. Voir “Retrait du cadre”, page 46. 5 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant. 6 Ouvrez le système. Voir “Ouverture du système”, page 47. 7 Remettez les barrettes de mémoire dans leurs supports. Voir “Installation de barrettes de mémoire”, page 82. 8 Refermez le système. Voir “Fermeture du système”, page 47. 9 Rebranchez le système à la prise de courant et allumez-le, ainsi que les périphériques connectés.112 Dépannage du système 10 Accédez au programme de configuration du système et vérifiez le paramètre de la mémoire système. Voir “Utilisation du programme de configuration du système”, page 31. Si l'espace mémoire installé ne correspond pas au paramètre de mémoire système, effectuez les opérations suivantes : a Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant. b Ouvrez le système. Voir “Ouverture du système”, page 47. c Retirez le protecteur de ventilation des barrettes de mémoire. Voir “Retrait du protecteur de ventilation”, page 76. d Remplacez la barrette de mémoire installée dans le support 1 par une autre de même capacité. Voir “Installation de barrettes de mémoire”, page 82. e Réinstallez le protecteur de ventilation de la mémoire. AVIS : ne faites jamais fonctionner le système si le protecteur de ventilation de la mémoire a été retiré. Le système pourrait surchauffer et s'arrêter, entraînant une perte de données. f Refermez le système. Voir “Fermeture du système”, page 47. g Rebranchez le système à la prise de courant et allumez-le, ainsi que les périphériques connectés. h Au démarrage du système, observez l'écran du moniteur et les voyants du clavier. 11 Effectuez les opérations suivantes : a Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant. b Ouvrez le système. Voir “Ouverture du système”, page 47. c Retirez le protecteur de ventilation des barrettes de mémoire. Voir “Retrait du protecteur de ventilation”, page 76. d Recommencez la procédure, de l'étape d à l'étape h (dans l'étape 10), pour chaque barrette de mémoire installée. Si l'incident persiste, voir “Obtention d'aide”, page 133.Dépannage du système 113 Dépannage d'un lecteur de disquette Incident • Un message d'erreur signale un incident lié au lecteur de disquette. Action PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Avant de commencer toute intervention, reportez-vous au Guide d'informations sur le produit pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l'ordinateur et la protection contre les décharges électrostatiques. 1 Accédez au programme de configuration du système et vérifiez que le lecteur de disquette est configuré correctement. Voir “Utilisation du programme de configuration du système”, page 31. 2 Retirez le cadre. Voir “Retrait du cadre”, page 46. 3 Exécutez le test de diagnostic en ligne approprié. Voir “Utilisation des diagnostics de Server Administrator”, page 123. 4 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant. 5 Ouvrez le système. Voir “Ouverture du système”, page 47. 6 Vérifiez que le câble d'interface du lecteur de disquette est fermement raccordé au lecteur de disquette et à la carte système. 7 Vérifiez que le câble d'alimentation est bien connecté au lecteur. 8 Refermez le système. Voir “Fermeture du système”, page 47. 9 Rebranchez le système à la prise de courant et allumez-le, ainsi que les périphériques connectés. 10 Exécutez le test de diagnostic en ligne approprié pour vérifier que le lecteur de disquette fonctionne correctement. 11 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant. 12 Ouvrez le système. Voir “Ouverture du système”, page 47. 13 Retirez toutes les cartes d'extension du système. Voir “Retrait d'une carte d'extension”, page 58. 14 Refermez le système. Voir “Fermeture du système”, page 47. 15 Rebranchez le système à la prise de courant et allumez-le, ainsi que les périphériques connectés. 16 Exécutez le test de diagnostic en ligne approprié pour vérifier que le lecteur de disquette fonctionne correctement. Si les tests réussissent, il est possible qu'une carte d'extension soit en conflit avec la logique du lecteur de disquette ou qu'elle soit défectueuse. Passez à l'étape suivante. Si les tests échouent, voir “Obtention d'aide”, page 133. 17 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant.114 Dépannage du système 18 Ouvrez le système. Voir “Ouverture du système”, page 47. 19 Réinstallez l'une des cartes d'extension retirées à l'étape 13. Voir “Cartes d'extension”, page 56. 20 Refermez le système. Voir “Fermeture du système”, page 47. 21 Rebranchez le système à la prise de courant et allumez-le, ainsi que les périphériques connectés. 22 Exécutez le test de diagnostic en ligne approprié pour vérifier que le lecteur de disquette fonctionne correctement. 23 Recommencez la procédure de l'étape 17 à l'étape 22, jusqu'à ce que toutes les cartes d'extension soient réinstallées ou que l'une des cartes fasse échouer les tests. Si l'incident persiste, voir “Obtention d'aide”, page 133. Dépannage d'un lecteur optique Incident • Le système ne peut pas lire les données d'un CD ou d'un DVD placé dans le lecteur. • Le voyant du lecteur optique ne clignote pas au démarrage du système. Action PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Avant de commencer toute intervention, reportez-vous au Guide d'informations sur le produit pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l'ordinateur et la protection contre les décharges électrostatiques. 1 Retirez le cadre. Voir “Retrait du cadre”, page 46. 2 Essayez un autre CD ou DVD fonctionnel. 3 Accédez au programme de configuration du système et vérifiez que le contrôleur IDE du lecteur est activé. Voir “Utilisation du programme de configuration du système”, page 31. 4 Exécutez le test de diagnostic en ligne approprié. Voir “Utilisation des diagnostics de Server Administrator”, page 123. 5 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant. 6 Ouvrez le système. Voir “Ouverture du système”, page 47. 7 Vérifiez que le câble d'interface est correctement connecté au lecteur optique et au contrôleur. 8 Vérifiez que le câble d'alimentation est bien connecté au lecteur. 9 Refermez le système. Voir “Fermeture du système”, page 47. 10 Rebranchez le système à la prise de courant et allumez-le, ainsi que les périphériques connectés. Si l'incident persiste, voir “Obtention d'aide”, page 133.Dépannage du système 115 Dépannage d'un lecteur de bande SCSI externe Incident • Lecteur de bande défectueux. • Cartouche défectueuse. • Logiciel de sauvegarde sur bande ou pilote du lecteur de bande manquant ou altéré. • Contrôleur SCSI défectueux. Action 1 Retirez la cartouche que vous utilisiez lorsque l'incident s'est produit, et remplacez-la par une autre dont vous êtes certain qu'elle fonctionne. 2 Assurez-vous que les pilotes SCSI nécessaires sont installés et configurés correctement. 3 Réinstallez le logiciel de sauvegarde sur bande en suivant les instructions de sa documentation d'accompagnement. 4 Vérifiez que le câble d'interface/alimentation en CC du lecteur de bande est connecté au lecteur de bande et au contrôleur SCSI. 5 Vérifiez que le lecteur de bande est associé à un ID SCSI unique et qu'il est doté ou non d'une terminaison, selon le câble d'interface utilisé pour le branchement du lecteur. Consultez la documentation du lecteur de bande pour savoir comment configurer l'ID SCSI et activer ou désactiver la terminaison. 6 Exécutez les diagnostics en ligne appropriés. Voir “Utilisation des diagnostics de Server Administrator”, page 123. 7 Ouvrez ou retirez le cadre. Voir “Retrait du cadre”, page 46. 8 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant. PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Avant de commencer toute intervention, reportez-vous au Guide d'informations sur le produit pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l'ordinateur et la protection contre les décharges électrostatiques. 9 Ouvrez le système. Voir “Ouverture du système”, page 47. 10 Vérifiez que la carte contrôleur SCSI est correctement emboîtée dans son connecteur. Voir “Cartes d'extension”, page 56. 11 Refermez le système. Voir “Fermeture du système”, page 47. 12 Rebranchez le système à la prise de courant et allumez-le, ainsi que les périphériques connectés. 13 Si l'incident n'est pas résolu, consultez la documentation du lecteur de bande pour obtenir des instructions de dépannage supplémentaires. 14 Si vous ne parvenez pas à résoudre l'incident, voir “Obtention d'aide”, page 133 pour savoir comment obtenir une assistance technique.116 Dépannage du système Dépannage d'un disque dur Incident • Erreur de pilote de périphérique. • Un ou plusieurs disques durs ne sont pas reconnus par le système. Action PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Avant de commencer toute intervention, reportez-vous au Guide d'informations sur le produit pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l'ordinateur et la protection contre les décharges électrostatiques. AVIS : cette procédure de dépannage risque de détruire les données stockées sur le disque dur. Avant de continuer, créez une copie de sauvegarde de tous les fichiers qui se trouvent sur le disque dur. 1 Exécutez le test des diagnostics en ligne approprié. Voir “Utilisation des diagnostics de Server Administrator”, page 123. Procédez comme suit, selon les résultats du test de diagnostic. 2 Retirez le cadre. Voir “Retrait du cadre”, page 46. 3 Si l'incident concerne plusieurs disques durs, passez à l'étape 7. S'il concerne un seul disque dur, passez à l'étape suivante. 4 Mettez le système hors tension, retirez et réinstallez le disque dur, puis redémarrez le système. Voir “Retrait d'un disque dur”, page 59 et “Installation d'un disque dur”, page 62. 5 Si le système est équipé d'une carte contrôleur fille RAID SAS, effectuez les opérations suivantes. a Redémarrez le système et appuyez sur pour ouvrir l'utilitaire de configuration de l'adaptateur à l'hôte. Reportez-vous à la documentation fournie avec l'adaptateur à l'hôte pour obtenir des informations sur cet utilitaire. b Assurez-vous que le disque dur a été correctement configuré pour une utilisation en RAID. c Quittez l'utilitaire de configuration et laissez le système d'exploitation démarrer. 6 Assurez-vous que les pilotes requis pour la carte contrôleur SAS ou la carte contrôleur fille RAID SAS sont installés et configurés correctement. Reportez-vous à la documentation du système d'exploitation pour de plus amples informations.Dépannage du système 117 7 Vérifiez les connexions des câbles à l'intérieur du système : a Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant. b Ouvrez le système. Voir “Ouverture du système”, page 47. c Vérifiez la connexion des câbles reliant le ou les disque(s) dur(s) et le contrôleur (voir la figure 3-11 pour les connecteurs SATA de la carte système, la figure 3-12 pour une carte d'extension SAS ou la figure 3-13 pour une carte contrôleur fille RAID SAS). d Vérifiez que les câbles SAS ou SATA sont correctement insérés dans leurs connecteurs. e Refermez le système. Voir “Fermeture du système”, page 47. f Rebranchez le système à la prise de courant et allumez-le, ainsi que les périphériques connectés. Si l'incident persiste, voir “Obtention d'aide”, page 133. Dépannage d'une carte contrôleur SAS ou d'une carte contrôleur fille RAID SAS REMARQUE : lorsque vous dépannez une carte contrôleur fille RAID SAS, consultez également la documentation du système d'exploitation et de la carte. Incident • Un message d'erreur signale un incident lié à la carte contrôleur SAS ou à la carte contrôleur fille RAID SAS. • La carte contrôleur SAS ou la carte contrôleur fille RAID SAS ne fonctionne pas correctement ou pas du tout. Action PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Avant de commencer toute intervention, reportez-vous au Guide d'informations sur le produit pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l'ordinateur et la protection contre les décharges électrostatiques. 1 Exécutez le test de diagnostic en ligne approprié. Voir “Utilisation des diagnostics de Server Administrator”, page 123. 2 Accédez au programme de configuration du système et vérifiez que la carte contrôleur SAS ou la carte contrôleur fille RAID SAS est activée. Voir “Utilisation du programme de configuration du système”, page 31.118 Dépannage du système 3 Redémarrez le système et appuyez sur la séquence de touches permettant d'ouvrir l'utilitaire de configuration approprié : • pour une carte contrôleur SAS • pour une carte contrôleur fille RAID SAS Reportez-vous à la documentation du contrôleur pour obtenir des informations sur les paramètres de configuration. 4 Vérifiez les paramètres de configuration, corrigez-les au besoin et redémarrez le système. Si l'incident persiste, passez à l'étape suivante. 5 Retirez le cadre. Voir “Retrait du cadre”, page 46. 6 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant. 7 Ouvrez le système. Voir “Ouverture du système”, page 47. 8 Vérifiez que la carte contrôleur est correctement insérée dans le connecteur de la carte système. Si le système contient une carte contrôleur d'extension SAS, voir “Cartes d'extension”, page 56. Si le système contient une carte contrôleur fille RAID SAS, voir “Carte contrôleur fille RAID SAS”, page 91. 9 Si le système est équipé d'une carte contrôleur fille RAID SAS, vérifiez que les composants RAID suivants sont correctement installés et connectés : • Barrette de mémoire • Pile 10 Vérifiez le câblage entre le ou les disque(s) dur(s) et la carte contrôleur SAS ou la carte contrôleur fille RAID SAS. Voir la figure 3-12 (carte contrôleur SAS) ou la figure 3-13 (carte contrôleur fille RAID SAS). 11 Vérifiez que les câbles SAS ou SATA sont correctement insérés dans leurs connecteurs. 12 Vérifiez que le câble du voyant d'activité du disque dur est correctement installé. Voir la figure 3-12 (carte contrôleur SAS) ou la figure 3-13 (carte contrôleur fille RAID SAS). 13 Refermez le système. Voir “Fermeture du système”, page 47. 14 Rebranchez le système à la prise de courant et allumez-le, ainsi que les périphériques connectés. Si l'incident persiste, procédez comme suit : • Si le système est équipé d'une carte contrôleur SAS, voir “Obtention d'aide”, page 133. • Si le système est équipé d'une carte contrôleur fille RAID SAS, remplacez la pile de cette dernière. Voir “Remplacement de la pile d'une carte contrôleur fille RAID SAS”, page 91. Si le remplacement de la pile ne résout pas l'incident, voir “Obtention d'aide”, page 133.Dépannage du système 119 Dépannage des cartes d'extension REMARQUE : lorsque vous dépannez une carte d'extension, consultez la documentation du système d'exploitation et de la carte d'extension. Incident • Un message d'erreur signale un incident lié à une carte d'extension. • La carte d'extension fonctionne mal ou ne fonctionne pas. Action PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Avant de commencer toute intervention, reportez-vous au Guide d'informations sur le produit pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l'ordinateur et la protection contre les décharges électrostatiques. 1 Exécutez le test de diagnostic en ligne approprié. Voir “Utilisation des diagnostics de Server Administrator”, page 123. 2 Ouvrez ou retirez le cadre. Voir “Retrait du cadre”, page 46. 3 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant. 4 Ouvrez le système. Voir “Ouverture du système”, page 47. 5 Vérifiez que chaque carte d'extension est insérée à fond dans son connecteur. Voir “Cartes d'extension”, page 56. 6 Refermez le système. Voir “Fermeture du système”, page 47. 7 Rebranchez le système à la prise de courant et allumez-le, ainsi que les périphériques connectés. Si l'incident persiste, passez à l'étape suivante. 8 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant. 9 Ouvrez le système. Voir “Ouverture du système”, page 47. 10 Retirez toutes les cartes d'extension du système. Voir “Retrait d'une carte d'extension”, page 58. 11 Refermez le système. Voir “Fermeture du système”, page 47. 12 Rebranchez le système à la prise de courant et allumez-le, ainsi que les périphériques connectés. 13 Exécutez le test de diagnostic en ligne approprié. Si les tests échouent, voir “Obtention d'aide”, page 133. 14 Pour chaque carte d'extension retirée à l'étape 10, effectuez les opérations suivantes : a Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant. b Ouvrez le système. Voir “Ouverture du système”, page 47. c Réinstallez une des cartes d'extension. d Refermez le système. Voir “Fermeture du système”, page 47. e Exécutez le test de diagnostic approprié. Si les tests échouent, voir “Obtention d'aide”, page 133.120 Dépannage du système Dépannage des microprocesseurs Incident • Un message d'erreur signale un incident lié au processeur. • L'écran LCD du panneau avant indique qu'un incident lié aux processeurs ou à la carte système s'est produit. • Un dissipateur de chaleur n'est pas installé pour chaque processeur. Action PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Avant de commencer toute intervention, reportez-vous au Guide d'informations sur le produit pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l'ordinateur et la protection contre les décharges électrostatiques. 1 Si possible, exécutez le test des diagnostics en ligne approprié. Voir “Utilisation des diagnostics de Server Administrator”, page 123. 2 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant. 3 Ouvrez le système. Voir “Ouverture du système”, page 47. 4 Vérifiez que chaque processeur et chaque dissipateur de chaleur est installé correctement. Voir “Remplacement d'un processeur”, page 87. 5 Refermez le système. Voir “Fermeture du système”, page 47. 6 Rebranchez le système à la prise de courant et allumez-le, ainsi que les périphériques connectés. 7 Si possible, exécutez le test des diagnostics en ligne approprié. Si les tests échouent ou si l'incident persiste, passez à l'étape suivante. 8 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant. 9 Ouvrez le système. Voir “Ouverture du système”, page 47. 10 Si le système est équipé de deux processeurs, retirez le processeur 2 et laissez le processeur 1 installé. Voir “Remplacement d'un processeur”, page 87. Pour identifier l'emplacement des processeurs, voir la figure 6-2. Si un seul processeur est installé, voir “Obtention d'aide”, page 133.Dépannage du système 121 11 Refermez le système. Voir “Fermeture du système”, page 47. 12 Rebranchez le système à la prise de courant et allumez-le, ainsi que les périphériques connectés. 13 Exécutez le test de diagnostic en ligne approprié. Si les tests réussissent, remplacez le processeur 2. Voir “Obtention d'aide”, page 133. 14 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant. 15 Ouvrez le système. Voir “Ouverture du système”, page 47. 16 Remplacez le processeur 1 par le processeur 2 ou par un autre de même capacité. Voir “Remplacement d'un processeur”, page 87. 17 Refermez le système. Voir “Fermeture du système”, page 47. 18 Exécutez le test de diagnostic en ligne approprié. Si les tests réussissent, remplacez le processeur 1. Voir “Obtention d'aide”, page 133.122 Dépannage du systèmeExécution des diagnostics du système 123 Exécution des diagnostics du système Si vous rencontrez des difficultés lors de l'utilisation du système, lancez les diagnostics avant de demander une assistance technique. Le but des diagnostics est de tester le matériel du système sans nécessiter d'équipement supplémentaire et sans risque de perte de données. Si vous ne réussissez pas à corriger l'incident, le personnel de service et de support peut s'aider des résultats des tests de diagnostic. Utilisation des diagnostics de Server Administrator Pour évaluer un incident du système, commencez par utiliser les diagnostics en ligne de Server Administrator. Si vous n'arrivez pas à identifier l'incident, utilisez les diagnostics du système. Pour accéder aux diagnostics en ligne, ouvrez une session sur la page d'accueil de Server Administrator, puis cliquez sur l'onglet Diagnostics. Pour des informations sur l'utilisation des diagnostics, consultez l'aide en ligne. Pour plus de détails, reportez-vous au document Server Administrator User's Guide (Guide d'utilisation de Server Administrator). Fonctionnalités des diagnostics du système Les diagnostics du système contiennent des menus et des options permettant de tester des groupes de périphériques ou des périphériques particuliers. Ces options permettent de : • Lancer un ou plusieurs tests. • Définir l'ordre des tests. • Répéter des tests. • Afficher, imprimer et enregistrer les résultats des tests. • Interrompre temporairement un test quand une erreur est détectée ou l'arrêter lorsqu'une limite d'erreur définie par l'utilisateur est atteinte. • Afficher des messages d'aide qui décrivent brièvement chaque test et ses paramètres. • Afficher des messages d'état qui vous indiquent si les tests se sont effectués. • Afficher des messages d'erreur qui vous indiquent si des incidents sont survenus pendant les tests.124 Exécution des diagnostics du système Quand utiliser les diagnostics du système Le fait qu'un composant ou un périphérique important du système ne fonctionne pas normalement peut être le symptôme d'une panne. Tant que le processeur et les périphériques d'entrée-sortie du système (le moniteur, le clavier et le lecteur de disquette) fonctionnent, vous pouvez utiliser les diagnostics pour faciliter l'identification de l'incident. Exécution des diagnostics du système Les diagnostics du système s'exécutent à partir de la partition d'utilitaires du disque dur. AVIS : n'utilisez les diagnostics que sur le système. Leur utilisation sur d'autres systèmes peut entraîner des résultats non valides ou générer des messages d'erreur. De plus, n'utilisez que le programme fourni avec le système (ou une mise à jour). 1 Au démarrage du système, appuyez sur pendant le POST. 2 Dans le menu principal de la partition d'utilitaires, sélectionnez Run System Diagnostics (Exécuter les diagnostics du système), ou sélectionnez Run Memory Diagnostics (Exécuter les diagnostics de la mémoire) si vous cherchez à identifier un incident lié à la mémoire. Quand vous lancez les diagnostics du système, un message s'affiche, indiquant qu'ils sont en cours d'initialisation. Ensuite, le menu Diagnostics s'affiche. Ce menu vous permet de lancer tous ou certains tests, ou encore de quitter les diagnostics du système. REMARQUE : avant de lire le reste de cette section, lancez les diagnostics du système pour voir l'utilitaire à l'écran. Options de test des diagnostics du système Cliquez sur l'option de test voulue dans la fenêtre Main Menu (Menu principal). Le tableau 5-1 contient une brève explication sur les options de test disponibles. Tableau 5-1. Options de test des diagnostics du système Option de test Fonction Express Test (Test rapide) Effectue une vérification rapide du système. Cette option exécute les tests de périphériques qui ne requièrent pas d'action de l'utilisateur. Utilisez-la pour identifier rapidement la source de l'incident. Extended Test (Test complet) Effectue une vérification plus complète du système. Ce test peut prendre plus d'une heure. Custom Test (Test personnalisé) Teste un périphérique particulier. Information Affiche les résultats des tests.Exécution des diagnostics du système 125 Utilisation des options de test personnalisées Lorsque vous sélectionnez l'option Custom Test (Test personnalisé) dans l'écran Main Menu (Menu principal), la fenêtre Customize (Personnaliser) s'affiche. Elle permet de sélectionner les périphériques à tester, de choisir des options de test spécifiques et de visualiser les résultats obtenus. Sélection de périphériques à tester La partie gauche de la fenêtre Customize (Personnaliser) répertorie les périphériques qui peuvent être testés. Ceux–ci sont regroupés par type ou par module, selon l'option sélectionnée. Cliquez sur le signe (+) en regard d'un périphérique ou d'un module pour visualiser ses composants. Cliquez sur (+) sur un composant pour visualiser les tests disponibles. Si vous cliquez sur un périphérique et non sur ses composants, tous les composants de ce périphérique sont sélectionnés pour le test. Sélection d'options de diagnostic Le champ Diagnostics Options (Options de diagnostic) permet de sélectionner la façon dont le périphérique sera testé. Vous pouvez définir les options suivantes : • Non-Interactive Tests Only (Tests non-interactifs uniquement) : cette option permet d'exécuter uniquement les tests ne nécessitant aucune intervention de l'utilisateur. • Quick Tests Only (Tests rapides uniquement) : cette option permet d'exécuter uniquement les tests rapides sur le périphérique sélectionné. Les tests étendus ne seront pas lancés si vous sélectionnez cette option. • Show Ending Timestamp (Afficher l'heure de fin) : cette option permet d'ajouter un horodatage au journal de test. • Test Iterations (Nombre d'itérations) : cette option sélectionne le nombre de fois où le test est exécuté. • Log output file pathname (Emplacement du fichier de sortie) : cette option permet d'indiquer l'emplacement où le journal de test doit être sauvegardé. Visualisation des informations et des résultats Les onglets de la fenêtre Customize (Personnaliser) contiennent des informations sur les tests et les résultats. Les onglets suivants sont disponibles : • Results (Résultats) : indique le test exécuté et son résultat. • Errors (Erreurs) : affiche les erreurs qui se sont produites pendant le test. • Help (Aide) : affiche des informations sur le périphérique, le composant ou le test sélectionné. • Configuration : affiche des informations de base concernant la configuration du périphérique sélectionné. • Parameters (Paramètres) : le cas échéant, cet onglet affiche les paramètres que vous pouvez définir pour le test à exécuter.126 Exécution des diagnostics du systèmeCavaliers et connecteurs 127 Cavaliers et connecteurs Cette section contient des informations spécifiques concernant les cavaliers du système. Elle décrit également les connecteurs se trouvant sur les cartes du système. Cavaliers de la carte système PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Consultez le Guide d'informations sur le produit pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l'ordinateur et la protection contre les décharges électrostatiques. La figure 6-1 indique l'emplacement des cavaliers de configuration sur la carte système. Le tableau 6-1 répertorie les paramètres de ces cavaliers. REMARQUE : pour accéder aux cavaliers, retirez les ventilateurs centraux et leur support. Voir “Retrait et installation d'un ventilateur”, page 53 et “Retrait du support de ventilateur central”, page 78.128 Cavaliers et connecteurs Figure 6-1. Cavaliers de la carte système Tableau 6-1. Réglages des cavaliers de la carte système Cavalier Réglage Description PWRD_EN (par défaut) La fonction de mot de passe est activée. La fonction de mot de passe est désactivée. NVRAM_CLR (par défaut) Les paramètres de configuration stockés dans la mémoire vive rémanente sont conservés à chaque démarrage du système. Les paramètres de configuration stockés dans la mémoire vive rémanente sont effacés au prochain redémarrage du système.Cavaliers et connecteurs 129 Connecteurs de la carte système PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Consultez le Guide d'informations sur le produit pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l'ordinateur et la protection contre les décharges électrostatiques. Voir la figure 6-2 et le tableau 6-2 pour obtenir la description et l'emplacement des connecteurs de la carte système. Figure 6-2. Connecteurs de la carte système 12 3 5 20 19 18 17 14 1 2 4 7 8 9 15 10 16 11 6 13 22 21130 Cavaliers et connecteurs Tableau 6-2. Connecteurs de la carte système Numéro Connecteur Description 1 PCIE_X4_6 Connecteur PCIe x4 (emplacement 6) 2 PCIE_X4_5 Connecteur PCIe x4 (emplacement 5) 3 PCIE_X4_4 Connecteur PCIe x4 (emplacement 4) 4 PCIE_X8_3 Connecteur PCIe x8 (emplacement 3) 5 PCIX_2 Connecteurs PCI-X 64 bits (emplacement 2) 6 PCIX_1 Connecteurs PCI-X 64 bits (emplacement 1) 7 INT_STORAGE Connecteur de carte contrôleur fille RAID SAS 8 RAC_CONN Connecteur du contrôleur d'accès à distance (RAC) 9 RAC_MII_CONN Connecteur RAC MII 10 DIMMn Connecteurs de barrette de mémoire (8), numérotés en fonction de la priorité d'installation (voir “Mémoire”, page 80) 11 FANn Connecteur d'alimentation du ventilateur (6) 12 CPU1 Connecteur du processeur 1 13 CPU2 Connecteur du processeur 2 14 PWRn Connecteur du bloc d'alimentation (2) 15 SATA_x Connecteurs SATA (4) 16 PWR_CTRL Connecteur du bloc d'alimentation 17 FLOPPY Connecteur de lecteur de disquette 18 IDE Connecteur de CD-ROM 19 CONTROL_PANEL Connecteur du panneau de commande 20 BATTERY Connecteur pour la pile bouton de 3 V 21 TOE_KEY Clé de moteur TOE (TCP/IP Offload Engine) 22 HD_ACT_CARD Connecteur du voyant d'activité du disque dur pour la carte contrôleur fille RAID SAS et la carte contrôleur SASCavaliers et connecteurs 131 Désactivation d'un mot de passe oublié Le cavalier de mot de passe situé sur la carte système permet d'activer ou de désactiver les fonctions du mot de passe système et d'effacer le(s) mot(s) de passe utilisé(s). PRÉCAUTION : seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot du système pour accéder aux composants internes. Consultez le Guide d'informations sur le produit pour obtenir des informations détaillées sur les consignes de sécurité, les interventions dans l'ordinateur et la protection contre les décharges électrostatiques. 1 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant. 2 Retirez le cadre, s'il est installé. Voir “Retrait du cadre”, page 46. 3 Ouvrez le système. Voir “Ouverture du système”, page 47. 4 Notez l'emplacement des câbles connectés à la carte contrôleur fille RAID SAS, puis déconnectez les câbles de cette dernière et écartez-les du support de ventilateur central. 5 Retirez les ventilateurs du support central. Voir “Retrait et installation d'un ventilateur”, page 53. 6 Retirez le support de ventilateur central. Voir “Retrait du support de ventilateur central”, page 78. 7 Retirez la fiche du cavalier de mot de passe. Voir la figure 6-1 pour repérer l'emplacement du cavalier de mot de passe sur la carte système. 8 Remettez en place le support de ventilateur central (voir “Réinstallation du support de ventilateur central”, page 78) et les ventilateurs correspondants. 9 Reconnectez les câbles de la carte contrôleur fille RAID SAS. 10 Refermez le système. Voir “Fermeture du système”, page 47. 11 Connectez le système à sa source d'alimentation électrique, puis mettez-le sous tension. Pour que les mots de passe existants soient désactivés (effacés), le système doit démarrer avec la fiche du cavalier de mot de passe retirée. Toutefois, avant d'attribuer un nouveau mot de passe du système et/ou de configuration, vous devez réinstaller la fiche du cavalier. REMARQUE : si vous attribuez un nouveau mot de passe du système et/ou de configuration alors que la fiche de cavalier est encore retirée, le système désactive les nouveaux mots de passe à son prochain démarrage. 12 Éteignez le système et les périphériques connectés, puis débranchez-le de la prise de courant. 13 Ouvrez le système. 14 Recommencez la procédure, de l'étape 4 à l'étape 6. 15 Remettez la fiche du cavalier PASSWD sur sa position d'origine pour activer la protection par mot de passe. 16 Remettez en place le support de ventilateur central et les ventilateurs, puis reconnectez les câbles appropriés sur la carte contrôleur fille RAID SAS. 17 Fermez le système, rebranchez-le à la prise de courant et allumez-le. 18 Attribuez un nouveau mot de passe du système et/ou de configuration. Pour attribuer un nouveau mot de passe à l'aide du programme de configuration du système, voir “Utilisation du mot de passe du système”, page 40.132 Cavaliers et connecteursObtention d'aide 133 Obtention d'aide Assistance technique Si vous avez besoin d'assistance pour un incident technique, effectuez les opérations suivantes : 1 Suivez les procédures de la section “Dépannage du système”. 2 Exécutez les diagnostics du système et notez toutes les informations obtenues. 3 Faites une copie de la Liste de vérification des diagnostics et complétez-la. 4 Pour vous aider lors des procédures d'installation et de dépannage, utilisez toute la gamme de services en ligne proposés par Dell sur le site support.dell.com. Pour plus d'informations, voir “Services en ligne”, page 134. 5 Si les étapes précédentes n'ont pas résolu l'incident, appelez Dell pour obtenir une assistance technique. REMARQUE : passez votre appel à partir d'un téléphone qui se trouve près du système pour que le support technique puisse vous guider dans l'accomplissement des opérations nécessaires. REMARQUE : il se peut que le système de code de service express de Dell ne soit pas disponible dans votre pays. Lorsque le système téléphonique automatisé de Dell vous le demande, entrez votre code de service express pour acheminer directement votre appel vers le personnel de support compétent. Si vous ne disposez pas d'un code de service express, ouvrez le dossier Dell Accessories (Accessoires Dell), double-cliquez sur l'icône Express Service Code (Code de service express) et suivez les indications. Pour obtenir des instructions sur l'utilisation du service de support technique, voir “Service de support technique”, page 135 et “Avant d'appeler”, page 136. REMARQUE : certains des services suivants ne sont pas disponibles partout en dehors des États-Unis. Appelez votre représentant Dell local pour obtenir des informations sur leur disponibilité.134 Obtention d'aide Services en ligne Vous pouvez accéder au site Dell Support à l'adresse support.dell.com. Sélectionnez votre région sur la page WELCOME TO DELL SUPPORT (Bienvenue dans le service de support de Dell) et donnez les détails requis pour accéder aux outils d'aide et aux informations. Vous pouvez contacter Dell électroniquement aux adresses suivantes : • World Wide Web www.dell.com/ www.dell.com/ap/ (région Asie/Pacifique uniquement) www.dell.com/jp (Japon uniquement) www.euro.dell.com (Europe uniquement) www.dell.com/la (pays d'Amérique latine) www.dell.ca (Canada uniquement) • Protocole de transfert de fichiers (FTP) anonyme ftp.dell.com/ Connectez-vous en tant que user:anonymous (utilisateur : anonyme), et indiquez votre adresse e-mail comme mot de passe. • Service de support électronique support@us.dell.com apsupport@dell.com (région Asie/Pacifique uniquement) support.jp.dell.com (Japon uniquement) support.euro.dell.com (Europe uniquement) • Service de devis électronique apmarketing@dell.com (région Asie/Pacifique uniquement) sales_canada@dell.com (Canada uniquement) Service AutoTech Le service de support technique automatisé de Dell, “AutoTech”, fournit des réponses préenregistrées aux questions les plus fréquentes des clients de Dell concernant leurs systèmes informatiques portables et de bureau. Quand vous appelez AutoTech, utilisez votre téléphone à touches pour choisir les sujets qui correspondent à vos questions. Le service AutoTech est disponible 24 heures sur 24, 7 jours sur 7. Vous pouvez aussi accéder à ce service via le service de support technique. Consultez les informations de contact de votre région.Obtention d'aide 135 Service d'état des commandes automatisé Pour vérifier l'état de vos commandes de produits Dell™, vous pouvez visiter le site Web support.dell.com ou appeler le service d'état des commandes automatisé. Un message préenregistré vous invite à entrer les informations concernant votre commande afin de la localiser et de vous informer. Consultez les informations de contact de votre région. Service de support technique Le service de support technique Dell est disponible 24 heures sur 24, 7 jours sur 7, pour répondre à vos questions concernant le matériel Dell. Notre équipe de support technique utilise des diagnostics assistés par ordinateur pour répondre plus rapidement et plus efficacement à vos questions. Pour contacter le service de support technique de Dell, voir “Avant d'appeler”, page 136 puis reportez-vous aux informations de contact de votre région. Service Dell de formation et de certification pour les entreprises Des formations et certifications Dell Enterprise sont disponibles. Pour plus d'informations, consultez le site www.dell.com/training. Ce service n'est disponible que dans certains pays. Incidents liés à votre commande Si vous avez un problème avec votre commande, comme des pièces manquantes, des mauvaises pièces ou une facturation erronée, contactez le service clientèle de Dell. Ayez votre facture ou votre bordereau d'emballage à portée de main lorsque vous appelez. Consultez les informations de contact de votre région. Informations produit Si vous avez besoin d'informations à propos d'autres produits disponibles chez Dell, ou si vous désirez passer une commande, consultez le site Web de Dell à l'adresse www.dell.com. Pour trouver le numéro de téléphone à appeler pour parler à un spécialiste des ventes, consultez les informations de contact de votre région.136 Obtention d'aide Renvoi d'articles pour une réparation sous garantie ou un remboursement sous forme de crédit Préparez comme indiqué ci-après tous les articles à renvoyer, que ce soit pour un renvoi ou un remboursement sous forme de crédit : 1 Appelez Dell pour obtenir un numéro d'autorisation de renvoi du matériel et écrivez-le lisiblement et bien en vue sur l'extérieur de la boîte. Pour trouver le numéro de téléphone à appeler, consultez les informations de contact de votre région. 2 Joignez une copie de votre facture et une lettre décrivant la raison du renvoi. 3 Joignez une copie de la liste de vérification des diagnostics indiquant les tests que vous avez effectués et les messages d'erreur générés par les Diagnostics du système. 4 Joignez tous les accessoires qui font partie du matériel renvoyé (comme les câbles d'alimentation, les médias comme les disquettes et les CD, et les guides) s'il s'agit d'un retour pour crédit. 5 Renvoyez l'équipement dans son emballage d'origine (ou un équivalent). Vous êtes responsable des frais d'envoi. Vous devez aussi assurer les produits retournés et assumer les risques de pertes en cours d'expédition. Les envois en port dû ne sont pas acceptés. Si l'un des éléments décrits ci-dessus manque à l'envoi, ce dernier sera refusé à l'arrivée et vous sera renvoyé. Avant d'appeler REMARQUE : ayez votre code de service express à portée de main quand vous appelez. Le code permet au système d'assistance téléphonique automatisé de Dell de diriger votre appel plus efficacement. N'oubliez pas de remplir la Liste de vérification des diagnostics. Si possible, allumez le système avant d'appeler Dell pour obtenir une assistance technique et utilisez un téléphone qui se trouve à côté ou à proximité de l'ordinateur. On vous demandera de taper certaines commandes et de relayer certaines informations détaillées pendant les opérations ou d'essayer d'autres opérations de dépannage qui ne sont possibles que sur le système informatique même. N'oubliez pas de vous munir de la documentation de l'ordinateur. PRÉCAUTION : avant d'intervenir sur les composants de l'ordinateur, consultez les consignes de sécurité qui se trouvent dans votre Guide d'informations sur le produit.Obtention d'aide 137 Liste de vérification des diagnostics Nom : Date : Adresse : Numéro de téléphone : Code de maintenance (code à barres à l'arrière de l'ordinateur) : Code de service express : Numéro d'autorisation de renvoi de matériel (fourni par un technicien de support de Dell) : Système d'exploitation et version : Périphériques : Cartes d'extension : Êtes-vous connecté à un réseau ? Oui Non Réseau, version et carte de réseau : Programmes et versions : Consultez la documentation du système d'exploitation pour déterminer le contenu des fichiers de démarrage du système. Si possible, imprimez chaque fichier. Sinon, notez le contenu de chaque fichier avant d'appeler Dell. Message d'erreur, code sonore ou code de diagnostic : Description de l'incident et procédures de dépannage effectuées :138 Obtention d'aide Contacter Dell Vous pouvez contacter Dell électroniquement en allant sur les sites Web suivants : • www.dell.com • support.dell.com (support technique) Vous trouverez les adresses Web spécifiques à votre pays dans la section correspondant du tableau ci-dessous. REMARQUE : les numéros d'appel gratuits ne peuvent être utilisés que dans le pays pour lequel ils sont mentionnés. REMARQUE : dans certains pays, un support technique spécifique a été mis en place pour les ordinateurs Dell™ XPS™. Dans ce cas, un numéro de téléphone spécifique est indiqué pour les pays participants. Si vous ne trouvez aucun numéro de téléphone spécifique pour les systèmes XPS, vous pouvez contacter le service technique Dell. Votre appel sera réacheminé vers le service compétent. Pour contacter Dell, utilisez les adresses électroniques, les numéros de téléphone et les codes indiqués dans le tableau suivant. Si vous avez besoin d'assistance pour connaître les indicatifs à utiliser, contactez un standardiste local ou international. REMARQUE : les coordonnées indiquées étaient correctes au moment de l'impression de ce document, mais peuvent avoir été modifiées. Pays (ville) Indicatif d'accès international - Indicatif du pays Indicatif de la ville Nom du service ou zone de service Site web et adresse e-mail Indicatifs de zone, numéros locaux et numéros d'appel gratuit Afrique du Sud (Johannesburg) Indicatif d'accès international : 09/091 Indicatif du pays : 27 Indicatif de la ville : 11 Site Web : support.euro.dell.com Par E-mail : dell_za_support@dell.com File d'appel Gold 011 709 7713 Support technique 011 709 7710 Service clientèle 011 709 7707 Ventes 011 709 7700 Fax 011 706 0495 Standard 011 709 7700Obtention d'aide 139 Allemagne (Langen) Indicatif d'accès international : 00 Indicatif du pays : 49 Indicatif de la ville : 6103 Site Web : support.euro.dell.com Par E-mail : tech_support_central_europe@dell.com Support technique pour XPS 069 9792 7222 Support technique pour les autres systèmes Dell 069 9792-7200 Service clientèle auprès du grand public et des PME/PMI 0180-5-224400 Service clientèle pour le segment global 06103 766-9570 Service clientèle pour les comptes privilégiés 06103 766-9420 Service clientèle pour les grandes entreprises 06103 766-9560 Service clientèle pour les comptes publics 06103 766-9555 Standard 06103 766-7000 Amérique Latine Support technique clientèle (Austin, Texas, USA) 512 728-4093 Service clientèle (Austin, Texas, USA) 512 728-3619 Fax (support technique et service clientèle) (Austin, Texas, USA) 512 728-3883 Ventes (Austin, Texas, USA.) 512 728-4397 Ventes par fax (Austin, Texas, USA) 512 728-4600 ou 512 728-3772 Anguilla Support général numéro vert : 800-335-0031 Antigua et Barbuda Support général 1-800-805-5924 Antilles néerlandaises Support général 001-800-882-1519 Argentine (Buenos Aires) Indicatif d'accès international : 00 Indicatif du pays : 54 Indicatif de la ville : 11 Site Web : www.dell.com.ar Par E-mail : us_latin_services@dell.com E-mail (ordinateurs de bureau et portables) : la-techsupport@dell.com E-mail (serveurs et produits de stockage EMC ® ) : la_enterprise@dell.com Service clientèle numéro vert : 0-800-444-0730 Support technique numéro vert : 0-800-444-0733 Services de support technique numéro vert : 0-800-444-0724 Ventes 0-810-444-3355 Aruba Support général numéro vert : 800-1578 Pays (ville) Indicatif d'accès international - Indicatif du pays Indicatif de la ville Nom du service ou zone de service Site web et adresse e-mail Indicatifs de zone, numéros locaux et numéros d'appel gratuit140 Obtention d'aide Australie (Sydney) Indicatif d'accès international : 0011 Indicatif du pays : 61 Indicatif de la ville : 2 Site Web : support.ap.dell.com Par E-mail : support.ap.dell.com/contactus Support général 13DELL-133355 Autriche (Vienne) Indicatif d'accès international : 900 Indicatif du pays : 43 Indicatif de la ville : 1 Site Web : support.euro.dell.com Par E-mail : tech_support_central_europe@dell.com Ventes au grand public et aux PME/PMI 0820 240 530 00 Fax pour le grand public et aux PME/PMI 0820 240 530 49 Service clientèle auprès du grand public et des PME/PMI 0820 240 530 14 Service clientèle auprès des comptes privilégiés/ des grandes entreprises 0820 240 530 16 Support pour XPS 0820 240 530 81 Support technique pour les autres systèmes Dell (grand public et PME/PMI) 0820 240 530 17 Support auprès des comptes privilégiés/ des grandes entreprises 0660 8779 Standard 0820 240 530 00 Bahamas Support général numéro vert : 1-866-278-6818 Belgique (Bruxelles) Indicatif d'accès international : 00 Indicatif du pays : 32 Indicatif de la ville : 2 Site Web : support.euro.dell.com Support technique pour XPS 02 481 92 96 Support technique pour les autres systèmes Dell 02 481 92 88 Support technique par fax 02 481 92 95 Service clientèle 02 713 15 65 Ventes aux grandes entreprises 02 481 91 00 Fax 02 481 92 99 Standard 02 481 91 00 Bermudes Support général 1-800-342-0671 Bolivie Support général numéro vert : 800-10-0238 Pays (ville) Indicatif d'accès international - Indicatif du pays Indicatif de la ville Nom du service ou zone de service Site web et adresse e-mail Indicatifs de zone, numéros locaux et numéros d'appel gratuitObtention d'aide 141 Brésil Indicatif d'accès international : 00 Indicatif du pays : 55 Indicatif de la ville : 51 Site Web : www.dell.com/br Support clientèle, support technique 0800 90 3355 Support technique par fax 51 481 5470 Service clientèle par fax 51 481 5480 Ventes 0800 90 3390 Brunei Indicatif du pays : 673 Support technique (Penang, Malaisie) 604 633 4966 Service clientèle (Penang, Malaisie) 604 633 4888 Ventes aux particuliers (Penang, Malaisie) 604 633 4955 Canada (North York, Ontario) Indicatif d'accès international : 011 État des commandes en ligne : www.dell.ca/ostatus AutoTech (support technique automatisé Matériel et Garantie) numéro vert : 1-800-247-9362 Service clientèle (petites entreprises et activités professionnelles à domicile) numéro vert : 1-800-847-4096 Service clientèle (moyennes et grandes entreprises, pouvoirs publics) numéro vert : 1-800-326-9463 Service clientèle (imprimantes, projecteurs, téléviseurs, ordinateurs de poche, lecteurs audio numériques et périphériques sans fil) numéro vert : 1-800-847-4096 Support de garantie du matériel (petites entreprises et activités professionnelles à domicile) numéro vert : 1-800-906-3355 Support de garantie du matériel (moyennes et grandes entreprises, pouvoirs publics) numéro vert : 1-800-387-5757 Support de garantie du matériel (imprimantes, projecteurs, téléviseurs, ordinateurs de poche, lecteurs audio numériques et périphériques sans fil) 1-877-335-5767 Ventes (Petites entreprises et activités professionnelles à domicile) numéro vert : 1-800-387-5752 Ventes (moyennes et grandes entreprises, pouvoirs publics) numéro vert : 1-800-387-5755 Ventes de pièces détachées et de services étendus 1 866 440 3355 Chili (Santiago) Indicatif du pays : 56 Indicatif de la ville : 2 Ventes et support clientèle numéro vert : 1230-020-4823 Pays (ville) Indicatif d'accès international - Indicatif du pays Indicatif de la ville Nom du service ou zone de service Site web et adresse e-mail Indicatifs de zone, numéros locaux et numéros d'appel gratuit142 Obtention d'aide Chine (Xiamen) Indicatif du pays : 86 Indicatif de la ville : 592 Site Web de support technique : support.dell.com.cn E-mail du support technique : cn_support@dell.com E-mail du service clientèle : customer_cn@dell.com Support technique par fax 592 818 1350 Support technique (Dell™ Dimension™ et Inspiron) numéro vert : 800 858 2968 Support technique (OptiPlex™, Latitude™ et Dell Precision™) numéro vert : 800 858 0950 Support technique (serveurs et stockage) numéro vert : 800 858 0960 Support technique (projecteurs, PDA, commutateurs, routeurs, etc.) numéro vert : 800 858 2920 Support technique (imprimantes) numéro vert : 800 858 2311 Service clientèle numéro vert : 800 858 2060 Service clientèle par fax 592 818 1308 Grand public et PME/PMI numéro vert : 800 858 2222 Division des comptes privilégiés numéro vert : 800 858 2557 Comptes de grandes entreprises - GCP numéro vert : 800 858 2055 Comptes clés des grandes entreprises numéro vert : 800 858 2628 Comptes de grandes entreprises - Nord numéro vert : 800 858 2999 Comptes grandes entreprises - administrations et éducation Nord numéro vert : 800 858 2955 Comptes de grandes entreprises - Est numéro vert : 800 858 2020 Comptes grandes entreprises - administrations et éducation Est numéro vert : 800 858 2669 Comptes grandes entreprises - Queue Team numéro vert : 800 858 2572 Comptes de grandes entreprises - Sud numéro vert : 800 858 2355 Comptes grandes entreprises - Ouest numéro vert : 800 858 2811 Comptes grandes entreprises - Pièces détachées numéro vert : 800 858 2621 Colombie Support général 980-9-15-3978 Pays (ville) Indicatif d'accès international - Indicatif du pays Indicatif de la ville Nom du service ou zone de service Site web et adresse e-mail Indicatifs de zone, numéros locaux et numéros d'appel gratuitObtention d'aide 143 Corée (Séoul) Indicatif d'accès international : 001 Indicatif du pays : 82 Indicatif de la ville : 2 Par E-mail : krsupport@dell.com Élément pris en charge numéro vert : 080-200-3800 Support (Dimension, PDA, composants électroniques et accessoires) numéro vert : 080-200-3801 Ventes numéro vert : 080-200-3600 Fax 2194-6202 Standard 2194-6000 Costa Rica Support général 0800-012-0435 Danemark (Copenhague) Indicatif d'accès international : 00 Indicatif du pays : 45 Site Web : support.euro.dell.com Support technique pour XPS 7010 0074 Support technique pour les autres systèmes Dell 7023 0182 Service clientèle (relationnel) 7023 0184 Service clientèle auprès du grand public et des PME/PMI 3287 5505 Standard (relationnel) 3287 1200 Fax du standard (Relations clientèle) 3287 1201 Standard (grand public et PME/PMI) 3287 5000 Fax du standard (grand public et PME/PMI) 3287 5001 Dominique Support général numéro vert : 1-866-278-6821 Équateur Support général numéro vert : 999-119 Espagne (Madrid) Indicatif d'accès international : 00 Indicatif du pays : 34 Indicatif de la ville : 91 Site Web : support.euro.dell.com Grand public et PME/PMI Support technique 902 100 130 Service clientèle 902 118 540 Ventes 902 118 541 Standard 902 118 541 Fax 902 118 539 Grandes entreprises Support technique 902 100 130 Service clientèle 902 115 236 Standard 91 722 92 00 Fax 91 722 95 83 Pays (ville) Indicatif d'accès international - Indicatif du pays Indicatif de la ville Nom du service ou zone de service Site web et adresse e-mail Indicatifs de zone, numéros locaux et numéros d'appel gratuit144 Obtention d'aide États-Unis (Austin, Texas) Indicatif d'accès international : 011 Indicatif du pays : 1 Service d'état des commandes automatisé numéro vert : 1-800-433-9014 AutoTech (ordinateurs portables et de bureau) numéro vert : 1-800-247-9362 Support Garantie et matériel (téléviseurs, imprimantes et projecteurs Dell) pour les clients Relationship numéro vert : 1-877-459-7298 Support aux consommateurs pour XPS - Amérique numéro vert : 1-800-232-8544 Support pour les particuliers (activités à domicile et bureau domestique) pour tous les autres produits Dell numéro vert : 1-800-624-9896 Service clientèle numéro vert : 1-800-624-9897 Clients du Programme d'achat employé numéro vert : 1-800-695-8133 Site Web des services financiers : www.dellfinancialservices.com Services financiers (leasing/prêts) numéro vert : 1-877-577-3355 Services financiers (Comptes privilégiés Dell [DPA]) numéro vert : 1-800-283-2210 Entreprises Service clientèle et support technique numéro vert : 1-800-456-3355 Clients du Programme d'achat employé numéro vert : 1-800-695-8133 Support imprimantes, projecteurs, PDA et lecteurs MP3 numéro vert : 1-877-459-7298 Service public (administration, éducation, santé) Service clientèle et support technique numéro vert : 1-800-456-3355 Clients du Programme d'achat employé numéro vert : 1-800-695-8133 Ventes Dell numéro vert : 1-800-289-3355 ou numéro vert : 1-800-879-3355 Points de vente Dell (ordinateurs Dell recyclés) numéro vert : 1-888-798-7561 Ventes de logiciels et de périphériques numéro vert : 1-800-671-3355 Ventes de pièces détachées numéro vert : 1-800-357-3355 Service étendu et ventes sous garantie numéro vert : 1-800-247-4618 Fax numéro vert : 1-800-727-8320 Services Dell pour les sourds, les malentendants ou les personnes ayant des difficultés d'élocution numéro vert : 1-877-DELLTTY (1-877-335-5889) Pays (ville) Indicatif d'accès international - Indicatif du pays Indicatif de la ville Nom du service ou zone de service Site web et adresse e-mail Indicatifs de zone, numéros locaux et numéros d'appel gratuitObtention d'aide 145 Finlande (Helsinki) Indicatif d'accès international : 990 Indicatif du pays : 358 Indicatif de la ville : 9 Site Web : support.euro.dell.com Par E-mail : fi_support@dell.com Support technique 0207 533 555 Service clientèle 0207 533 538 Standard 0207 533 533 Ventes, moins de 500 employés 0207 533 540 Fax 0207 533 530 Ventes, plus de 500 employés 0207 533 533 Fax 0207 533 530 France (Paris, Montpellier) Indicatif d'accès international : 00 Indicatif du pays : 33 Indicatif de la ville : (1) (4) Site Web : support.euro.dell.com Grand public et PME/PMI Support technique pour XPS 0825 387 129 Support technique pour les autres systèmes Dell 0825 387 270 Service clientèle 0825 823 833 Standard 0825 004 700 Standard (appels extérieurs à la France) 04 99 75 40 00 Ventes 0825 004 700 Fax 0825 004 701 Télécopieur (appels extérieurs à la France) 04 99 75 40 01 Grandes entreprises Support technique 0825 004 719 Service clientèle 0825 338 339 Standard 01 55 94 71 00 Ventes 01 55 94 71 00 Fax 01 55 94 71 01 Grèce Indicatif d'accès international : 00 Indicatif du pays : 30 Site Web : support.euro.dell.com Support technique 00800-44 14 95 18 Support technique Gold 00800-44 14 00 83 Standard 2108129810 Standard – Service Gold 2108129811 Ventes 2108129800 Fax 2108129812 Grenade Support général numéro vert : 1-866-540-3355 Pays (ville) Indicatif d'accès international - Indicatif du pays Indicatif de la ville Nom du service ou zone de service Site web et adresse e-mail Indicatifs de zone, numéros locaux et numéros d'appel gratuit146 Obtention d'aide Guatemala Support général 1-800-999-0136 Guyane Support général numéro vert : 1-877-270-4609 Hong Kong Indicatif d'accès international : 001 Indicatif du pays : 852 Site Web : support.ap.dell.com E-mail du support technique : HK_support@Dell.com Support technique (Dimension et Inspiron) 2969 3188 Support technique (OptiPlex, Latitude et Dell Precision) 2969 3191 Support technique (PowerApp™, PowerEdge™, PowerConnect™ et PowerVault™) 2969 3196 Service clientèle 3416 0910 Comptes grandes entreprises 3416 0907 Programmes comptes internationaux 3416 0908 Division moyennes entreprises 3416 0912 Division petites entreprises et activités professionnelles à domicile 2969 3105 Îles Caïmans Support général 1-800-805-7541 Îles Turks et Caicos Support général numéro vert : 1-866-540-3355 Îles vierges britanniques Support général numéro vert : 1-866-278-6820 Îles vierges (États-Unis) Support général 1-877-673-3355 Inde Par E-mail : india_support_desktop@dell.com india_support_notebook@dell.com india_support_Server@dell.com Support technique 1600338045 et 1600448046 Ventes (comptes grandes entreprises) 1600 33 8044 Ventes (grand public et PME/PMI) 1600 33 8046 Pays (ville) Indicatif d'accès international - Indicatif du pays Indicatif de la ville Nom du service ou zone de service Site web et adresse e-mail Indicatifs de zone, numéros locaux et numéros d'appel gratuitObtention d'aide 147 Irlande (Cherrywood) Indicatif d'accès international : 00 Indicatif du pays : 353 Indicatif de la ville : 1 Site Web : support.euro.dell.com Par E-mail : dell_direct_support@dell.com Ventes Ventes en Irlande 01 204 4444 Dell Outlet 1850 200 778 HelpDesk des commandes en ligne 1850 200 778 Service clientèle Service clientèle auprès des particuliers 01 204 4014 Service clientèle auprès des PME/PMI 01 204 4014 Service clientèle auprès des grandes entreprises 1850 200 982 Support technique Support technique pour XPS 1850 200 722 Support technique pour les autres systèmes Dell 1850 543 543 Service à domicile – Demandes de support technique 1850 200 889 Général Ventes/Télécopieur 01 204 0103 Standard 01 204 4444 Support technique du Royaume-Uni (au RU uniquement) 0870 908 0800 Service clientèle au Royaume-Uni (au RU uniquement) 0870 906 0010 Service clientèle entreprises (depuis le Royaume-Uni uniquement) 0870 907 4499 Ventes au Royaume-Uni (au RU uniquement) 0870 907 4000 Pays (ville) Indicatif d'accès international - Indicatif du pays Indicatif de la ville Nom du service ou zone de service Site web et adresse e-mail Indicatifs de zone, numéros locaux et numéros d'appel gratuit148 Obtention d'aide Italie (Milan) Indicatif d'accès international : 00 Indicatif du pays : 39 Indicatif de la ville : 02 Site Web : support.euro.dell.com Grand public et PME/PMI Support technique 02 577 826 90 Service clientèle 02 696 821 14 Fax 02 696 821 13 Standard 02 696 821 12 Grandes entreprises Support technique 02 577 826 90 Service clientèle 02 577 825 55 Fax 02 575 035 30 Standard 02 577 821 Jamaïque Support technique général (appel à partir de la Jamaïque uniquement) 1-800-682-3639 Pays (ville) Indicatif d'accès international - Indicatif du pays Indicatif de la ville Nom du service ou zone de service Site web et adresse e-mail Indicatifs de zone, numéros locaux et numéros d'appel gratuitObtention d'aide 149 Japon (Kawasaki) Indicatif d'accès international : 001 Indicatif du pays : 81 Indicatif de la ville : 44 Site Web : support.jp.dell.com Support technique (serveurs) numéro vert : 0120-198-498 Support technique à l'extérieur du Japon (serveurs) 81-44-556-4162 Support technique (Dimension et Inspiron) numéro vert : 0120-198-226 Support technique à l'extérieur du Japon (Dimension et Inspiron) 81-44-520-1435 Support technique (Dell Precision, OptiPlex et Latitude) numéro vert : 0120-198-433 Support technique à l'extérieur du Japon (Dell Precision, OptiPlex et Latitude) 81-44-556-3894 Support technique (PDA, projecteurs, imprimantes, routeurs) numéro vert : 0120-981-690 Support technique (PDA, projecteurs, imprimantes, routeurs) 81-44-556-3468 Service Faxbox 044-556-3490 Service d'état des commandes automatisé 24 heures sur 24 044-556-3801 Service clientèle 044-556-4240 Division Ventes aux entreprises (jusqu'à 400 salariés) 044-556-1465 Division Ventes aux comptes privilégiés (plus de 400 employés) 044-556-3433 Ventes secteur public (agences gouvernementales, établissements d'enseignement et institutions médicales) 044-556-5963 Global Segment Japon 044-556-3469 Particulier 044-556-1760 Standard 044-556-4300 La Barbade Support général 1-800-534-3066 Luxembourg Indicatif d'accès international : 00 Indicatif du pays : 352 Site Web : support.euro.dell.com Élément pris en charge 342 08 08 075 Ventes au grand public et aux PME/PMI +32 (0)2 713 15 96 Ventes aux grandes entreprises 26 25 77 81 Service clientèle +32 (0)2 481 91 19 Fax 26 25 77 82 Pays (ville) Indicatif d'accès international - Indicatif du pays Indicatif de la ville Nom du service ou zone de service Site web et adresse e-mail Indicatifs de zone, numéros locaux et numéros d'appel gratuit150 Obtention d'aide Macao Indicatif du pays : 853 Support technique numéro vert : 0800 105 Service client (Xiamen, Chine) 34 160 910 Ventes aux particuliers (Xiamen, China) 29 693 115 Malaisie (Penang) Indicatif d'accès international : 00 Indicatif du pays : 60 Indicatif de la ville : 4 Site Web : support.ap.dell.com Support technique (Dell Precision, OptiPlex et Latitude) numéro vert : 1 800 880 193 Support technique (Dimension, Inspiron, incidents électroniques et accessoires) numéro vert : 1 800 881 306 Support technique (PowerApp, PowerEdge, PowerConnect et PowerVault) numéro vert : 1800 881 386 Service clientèle numéro vert : 1800 881 306 (option 6) Ventes aux particuliers numéro vert : 1 800 888 202 Ventes aux grandes entreprises numéro vert : 1 800 888 213 Mexique Indicatif d'accès international : 00 Indicatif du pays : 52 Support technique clientèle 001-877-384-8979 ou 001-877-269-3383 Ventes 50-81-8800 ou 01-800-888-3355 Service clientèle 001-877-384-8979 ou 001-877-269-3383 Groupe principal 50-81-8800 ou 01-800-888-3355 Montserrat Support général numéro vert : 1-866-278-6822 Nicaragua Support général 001-800-220-1006 Norvège (Lysaker) Indicatif d'accès international : 00 Indicatif du pays : 47 Site Web : support.euro.dell.com Support technique pour XPS 815 35 043 Support technique pour les autres produits Dell 671 16882 Suivi clientèle 671 17575 Service clientèle auprès du grand public et des PME/PMI 23162298 Standard 671 16800 Standard par fax 671 16865 Pays (ville) Indicatif d'accès international - Indicatif du pays Indicatif de la ville Nom du service ou zone de service Site web et adresse e-mail Indicatifs de zone, numéros locaux et numéros d'appel gratuitObtention d'aide 151 Nouvelle-Zélande Indicatif d'accès international : 00 Indicatif du pays : 64 Site Web : support.ap.dell.com Par E-mail : support.ap.dell.com/contactus Support général 0800 441 567 Panama Support général 001-800-507-0962 Pays-Bas (Amsterdam) Indicatif d'accès international : 00 Indicatif du pays : 31 Indicatif de la ville : 20 Site Web : support.euro.dell.com Support technique pour XPS 020 674 45 94 Support technique pour les autres systèmes Dell 020 674 45 00 Support technique par fax 020 674 47 66 Service clientèle auprès du grand public et des PME/PMI 020 674 42 00 Suivi clientèle 020 674 43 25 Ventes au grand public et aux PME/PMI 020 674 55 00 Ventes relationnelles 020 674 50 00 Ventes par fax au grand public et aux PME/PMI 020 674 47 75 Ventes relationnelles par fax 020 674 47 50 Standard 020 674 50 00 Standard par fax 020 674 47 50 Pays du Pacifique et du Sud-Est de l'Asie Support technique, service clientèle et ventes (Penang, Malaisie) 604 633 4810 Pérou Support général 0800-50-669 Pologne (Varsovie) Indicatif d'accès international : 011 Indicatif du pays : 48 Indicatif de la ville : 22 Site Web : support.euro.dell.com Par E-mail : pl_support_tech@dell.com Téléphone du service clientèle 57 95 700 Service clientèle 57 95 999 Ventes 57 95 999 Télécopie du service clientèle 57 95 806 Télécopie de la réception 57 95 998 Standard 57 95 999 Porto Rico Support général 1-800-805-7545 Pays (ville) Indicatif d'accès international - Indicatif du pays Indicatif de la ville Nom du service ou zone de service Site web et adresse e-mail Indicatifs de zone, numéros locaux et numéros d'appel gratuit152 Obtention d'aide Portugal Indicatif d'accès international : 00 Indicatif du pays : 351 Site Web : support.euro.dell.com Support technique 707200149 Service clientèle 800 300 413 Ventes 800 300 410 ou 800 300 411 ou 800 300 412 ou 21 422 07 10 Fax 21 424 01 12 République dominicaine Support général 1-800-148-0530 République tchèque (Prague) Indicatif d'accès international : 00 Indicatif du pays : 420 Site Web : support.euro.dell.com Par E-mail : czech_dell@dell.com Support technique 22537 2727 Service clientèle 22537 2707 Fax 22537 2714 Support technique par fax 22537 2728 Standard 22537 2711 Pays (ville) Indicatif d'accès international - Indicatif du pays Indicatif de la ville Nom du service ou zone de service Site web et adresse e-mail Indicatifs de zone, numéros locaux et numéros d'appel gratuitObtention d'aide 153 Royaume-Uni (Bracknell) Indicatif d'accès international : 00 Indicatif du pays : 44 Indicatif de la ville : 1344 Site Web : support.euro.dell.com Par E-mail : dell_direct_support@dell.com Site Web du service clientèle : support.euro.dell.com/uk/en/ECare/form/home.asp Ventes Ventes au grand public et aux PME/PMI 0870 907 4000 Ventes aux entreprises et au secteur public 01344 860 456 Service clientèle Service clientèle auprès du grand public et des PME/PMI 0870 906 0010 Service clientèle auprès des grandes entreprises 01344 373 185 Service clientèle des comptes privilégiés (de 500 à 5 000 employés) 0870 906 0010 Service clientèle des comptes globaux 01344 373 186 Service clientèle des comptes gouvernementaux centralisés 01344 373 193 Service clientèle pour le gouvernement local et le secteur de l'enseignement 01344 373 199 Service clientèle pour le secteur médical 01344 373 194 Support technique Support technique pour XPS 0870 366 4180 Support technique (grandes entreprises/comptes privilégiés/PAD [+ de 1000 employés]) 0870 908 0500 Général Support technique pour les autres produits 0870 908 0800 Télécopieur petites entreprises et activités professionnelles à domicile 0870 907 4006 Salvador Support général 01-899-753-0777 Saint-Kitts-et-Nevis Support général numéro vert : 1-877-441-4731 Saint-Vincent-et-les-Grenadines Support général numéro vert : 1-877-270-4609 Sainte Lucie Support général 1-800-882-1521 Pays (ville) Indicatif d'accès international - Indicatif du pays Indicatif de la ville Nom du service ou zone de service Site web et adresse e-mail Indicatifs de zone, numéros locaux et numéros d'appel gratuit154 Obtention d'aide Singapour (Singapour) Indicatif d'accès international : 005 Indicatif du pays : 65 REMARQUE : les numéros de téléphone indiqués dans cette section doivent être utilisés uniquement à Singapour et en Malaisie. Site Web : support.ap.dell.com Support technique (Dimension, Inspiron, incidents électroniques et accessoires) numéro vert : 1 800 394 7430 Support technique (OptiPlex, Latitude et Dell Precision) numéro vert : 1 800 394 7488 Support technique (PowerApp, PowerEdge, PowerConnect et PowerVault) numéro vert : 1 800 394 7478 Service clientèle numéro vert : 1 800 394 7430 (option 6) Ventes aux particuliers numéro vert : 1 800 394 7412 Ventes aux grandes entreprises numéro vert : 1 800 394 7419 Slovaquie (Prague) Indicatif d'accès international : 00 Indicatif du pays : 421 Site Web : support.euro.dell.com Par E-mail : czech_dell@dell.com Support technique 02 5441 5727 Service clientèle 420 22537 2707 Fax 02 5441 8328 Support technique par fax 02 5441 8328 Standard (ventes) 02 5441 7585 Suède (Upplands Vasby) Indicatif d'accès international : 00 Indicatif du pays : 46 Indicatif de la ville : 8 Site Web : support.euro.dell.com Support technique pour XPS 0771 340 340 Support technique pour les autres produits Dell 08 590 05 199 Suivi clientèle 08 590 05 642 Service clientèle auprès du grand public et des PME/PMI 08 587 70 527 Support du programme d'achats pour employés (EPP, Employee Purchase Program) 020 140 14 44 Support technique par fax 08 590 05 594 Ventes 08 590 05 185 Pays (ville) Indicatif d'accès international - Indicatif du pays Indicatif de la ville Nom du service ou zone de service Site web et adresse e-mail Indicatifs de zone, numéros locaux et numéros d'appel gratuitObtention d'aide 155 Suisse (Genève) Indicatif d'accès international : 00 Indicatif du pays : 41 Indicatif de la ville : 22 Site Web : support.euro.dell.com Par E-mail : Tech_support_central_Europe@dell.com Support technique pour XPS 0848 33 88 57 Support technique (grand public et PME/PMI) pour tous les autres produits Dell 0844 811 411 Support technique (grandes entreprises) 0844 822 844 Service clientèle (grand public et PME/PMI) 0848 802 202 Service clientèle (grandes entreprises) 0848 821 721 Fax 022 799 01 90 Standard 022 799 01 01 Taïwan Indicatif d'accès international : 002 Indicatif du pays : 886 Site Web : support.ap.dell.com Par E-mail : ap_support@dell.com Support technique (OptiPlex, Latitude, Inspiron, Dimension, composants électroniques et accessoires) numéro vert : 00801 86 1011 Support technique (PowerApp, PowerEdge, PowerConnect et PowerVault) numéro vert : 00801 60 1256 Service clientèle numéro vert : 00801 60 1250 (option 5) Ventes aux particuliers numéro vert : 00801 65 1228 Ventes aux grandes entreprises numéro vert : 00801 651 227 Thaïlande Indicatif d'accès international : 001 Indicatif du pays : 66 Site Web : support.ap.dell.com Support technique (OptiPlex, Latitude et Dell Precision) numéro vert : 1800 0060 07 Support technique (PowerApp, PowerEdge, PowerConnect et PowerVault) numéro vert : 1800 0600 09 Service clientèle numéro vert : 1800 006 007 (option 7) Ventes aux grandes entreprises numéro vert : 1800 006 009 Ventes aux particuliers numéro vert : 1800 006 006 Trinité-et-Tobago Support général 1-800-805-8035 Uruguay Support général numéro vert : 000-413-598-2521 Venezuela Support général 8001-3605 Pays (ville) Indicatif d'accès international - Indicatif du pays Indicatif de la ville Nom du service ou zone de service Site web et adresse e-mail Indicatifs de zone, numéros locaux et numéros d'appel gratuit156 Obtention d'aideGlossaire 157 Glossaire Cette section définit ou identifie les termes techniques, abréviations et sigles utilisés dans la documentation fournie avec le système. A : Ampère(s). ACPI : Acronyme de “Advanced Configuration and Power Interface”. Interface standard qui permet au système d'exploitation de contrôler les paramètres relatifs à la configuration et à la gestion de l'alimentation. adresse MAC : Adresse de contrôle d'accès aux supports. L'adresse MAC identifie le matériel du système de manière unique sur un réseau. adresse mémoire : Emplacement précis, exprimé normalement en nombre hexadécimal, dans la RAM du système. ANSI : Acronyme de “American National Standards Institute”, institut des normes nationales américaines. Principal organisme dédié au développement des normes technologiques spécifiques des États-Unis. application : Logiciel conçu pour effectuer une tâche spécifique ou une série de tâches. Les applications s'exécutent à partir du système d'exploitation. ASCII : Acronyme de “American Standard Code for Information Interchange”, code des normes américaines pour l'échange d'informations. barrette de mémoire : Petite carte de circuits, contenant des puces de mémoire, qui se connecte à la carte système. BIOS : Acronyme de “Basic Input/Output System”, système d'entrées/sorties de base. Le BIOS du système contient des programmes stockés sur une puce de mémoire flash. Le BIOS contrôle les fonctions suivantes : • Les communications entre le processeur et les périphériques • Diverses fonctions, comme les messages du système bit : Plus petite unité d'information interprétée par le système. BMC : Acronyme de “Baseboard Management Controller”, contrôleur de gestion de la carte de base. BTU : Acronyme de “British Thermal Unit”, unité thermique britannique. bus : Chemin d'informations entre les différents composants du système. Le système contient un bus d'extension qui permet au microprocesseur de communiquer avec les contrôleurs des différents périphériques connectés au système. Il contient également un bus d'adresse et un bus de données pour les communications entre le microprocesseur et la RAM. bus d'extension : Votre système contient un bus d'extension qui permet au processeur de communiquer avec les contrôleurs des périphériques, comme les NIC. bus frontal : Chemin des données et interface physique entre le microprocesseur et la mémoire principale (RAM). bus local : Sur les systèmes à bus local, certains matériels (comme l'adaptateur vidéo) peuvent être conçus pour fonctionner beaucoup plus vite que sur un bus d'extension traditionnel. Voir aussi bus. C : Celsius. CA : Courant alternatif. cache interne du processeur : Mémoire cache d'instructions et de données intégrée au processeur. carte d'extension : Carte supplémentaire (par exemple un adaptateur SCSI ou un NIC) qui se branche dans un connecteur d'extension sur la carte système de l'ordinateur. Une carte adaptateur ajoute des fonctions spéciales au système en fournissant une interface entre le bus d'extension et un périphérique.158 Glossaire carte hôte : Carte assurant la communication entre le bus du système et le contrôleur d'un périphérique. Les contrôleurs de disque dur disposent de circuits de carte hôte. Pour ajouter un bus SCSI au système, vous devez installer ou raccorder la carte hôte adéquate. carte système : La carte système contient en général la plupart des composants intégrés à votre système, comme le processeur, la RAM, des contrôleurs et divers circuits de ROM. carte vidéo : Circuits qui assurent les fonctions vidéo de l'ordinateur (en association avec le moniteur). Il peut s'agir d'une carte d'extension installée dans un connecteur, ou de circuits intégrés sur la carte système. cavalier : Petit composant pour carte à circuits imprimés, disposant de deux ou plusieurs broches. Des fiches en plastique contenant un fil s'engagent sur les broches. Ce fil relie les broches et ferme un circuit, offrant un moyen simple et réversible de changer le câblage de la carte. CC : Courant continu. CD : Disque compact. Les lecteurs de CD utilisent une technologie optique pour lire les données sur les CD. cm : Centimètres. CMOS : Acronyme de “Complementary Metal-Oxide Semiconductor”, semi-conducteur d'oxyde métallique supplémentaire. COMn : Nom de périphérique permettant de désigner les ports série du système. combinaison de touches : Commande qui se fait en appuyant sur plusieurs touches en même temps (par exemple ). composant : Dans le contexte de l'interface DMI, il s'agit d'un élément compatible DMI, comme un système d'exploitation, un ordinateur, une carte d'extension ou un périphérique. Chaque composant est constitué de groupes et d'attributs, définis comme caractéristiques de ce composant. connecteur d'extension : Connecteur situé sur la carte système ou la carte de montage, auquel se branche une carte d'extension. contrôleur : Circuit qui contrôle le transfert des données entre le microprocesseur et la mémoire ou entre le microprocesseur et les périphériques. coprocesseur : Circuit qui libère le processeur principal de certaines tâches de traitement. Par exemple, un coprocesseur mathématique se charge du traitement numérique. CPU : Acronyme de “Central Processing Unit”, unité centrale de traitement. Voir processeur. DDR : Acronyme de “Double Data Rate”, double débit de données. Technologie des barrettes de mémoire permettant de doubler le débit. définition graphique : Indique le nombre de pixels en largeur et le nombre de pixels en hauteur, par exemple 640 x 480. Pour afficher dans une résolution graphique donnée, vous devez installer les pilotes vidéo appropriés et votre moniteur doit accepter cette résolution. DHCP : Acronyme de “Dynamic Host Configuration Protocol”. Méthode permettant d'affecter automatiquement une adresse IP à un système client. diagnostics : Série de nombreux tests pour le système. DIMM : Acronyme de “Dual In-Line Memory Module”, barrette de mémoire à double rangée de connexions. Voir aussi barrette de mémoire. DIN : Acronyme de “Deutsche Industrie-Norm”, norme de l'industrie allemande. disquette d'amorçage : Disquette utilisée pour démarrer le système si celui-ci ne peut pas être initialisé à partir du disque dur. disquette système : Voir disquette d'amorçage. DMA : Acronyme de “Direct Memory Access”, accès direct à la mémoire. Un canal DMA permet le transfert direct de certains types de données entre la RAM et un périphérique, sans passer par le processeur.Glossaire 159 DMI : Acronyme de “Desktop Management Interface”, interface de gestion de bureau. L'interface DMI permet de gérer les logiciels et matériels du système en recueillant des informations sur ses composants, comme le système d'exploitation, la mémoire, les périphériques, les cartes d'extension et le numéro d'inventaire. DNS : Acronyme de “Domain Name System”, système de noms de domaines. Méthode de conversion des noms de domaines Internet (par exemple www.dell.com) en adresses IP (comme 143.166.83.200). DRAM : Acronyme de “Dynamic Random-Access Memory”, mémoire vive dynamique. Normalement, la mémoire vive d'un système est composée entièrement de puces DRAM. DVD : Acronyme de “Digital Versatile Disc”, disque numérique polyvalent. ECC : Acronyme de “Error Checking and Correction”, vérification et correction d'erreur. EEPROM : Acronyme de “Electronically Erasable Programmable Read-Only Memory”, mémoire morte reprogrammable électroniquement. EMC : Acronyme de “Electromagnetic Compatibility”, compatibilité électromagnétique. EMI : Acronyme de “ElectroMagnetic Interference”, interférence électromagnétique. ERA : Acronyme de “Embedded Remote Access”, accès distant intégré. L'ERA permet de gérer à distance (“hors-bande”) le serveur de votre réseau à l'aide d'une carte contrôleur d'accès à distance. E-S : Entrée/sortie. Un clavier est un périphérique d'entrée et une imprimante est un périphérique de sortie. En général, l'activité d'E-S peut être différenciée de l'activité de calcul. ESD : Acronyme de “Electrostratic Discharge”, décharge électrostatique. ESM : Acronyme de “Embedded Server Management”, gestion de serveur intégrée. étiquette de service : Code à barres se trouvant sur le système, et permettant de l'identifier lorsque vous appelez le support technique de Dell. F : Fahrenheit. FAT: Acronyme de “File allocation table”, table d'allocation des fichiers. Structure du système de fichiers utilisée par MS-DOS pour organiser et suivre le stockage des fichiers. Le système d'exploitation Microsoft® Windows® permet d'utiliser une structure de système de fichiers FAT. FBD : Acronyme de “Fully Buffered Dual In-Line Memory Module”, barrette DIMM avec tampon intégral. fichier readme : Fichier texte fourni avec un logiciel ou un matériel, et qui contient des informations complétant ou mettant à jour la documentation. fichier read-only : Fichier en lecture seule, qui ne peut être ni modifié, ni effacé. fichier system.ini : Fichier de démarrage du système d'exploitation Windows. Quand vous lancez Windows, il consulte le fichier system.ini pour déterminer une variété d'options pour l'environnement d'exploitation Windows. Entre autres, le fichier system.ini indique les pilotes vidéo, souris et clavier qui sont installés pour Windows. fichier win.ini : Fichier de démarrage du système d'exploitation Windows. Quand vous lancez Windows, le système consulte le fichier win.ini pour déterminer une variété d'options pour l'environnement d'exploitation Windows. Ce fichier comprend aussi des sections qui contiennent les paramètres facultatifs pour les programmes Windows installés sur le disque dur. formater : Préparer un lecteur de disque dur ou une disquette à stocker des fichiers. Un formatage inconditionnel efface toutes les données stockées sur le disque. ft : Foot (pied). FTP : Acronyme de “File Transfert Protocol”, protocole de transfert de fichiers. g : Gramme(s). G : Gravité. Gb : Gigabit : 1024 mégabits ou 1 073 741 824 bits. Go : Go, 1024 Mo ou 1 073 741 824 octets. Quand on parle de stockage sur disque dur, la mesure est souvent arrondie à 1 000 000 000 octets.160 Glossaire groupe : Dans le contexte de l'interface DMI, un groupe est une structure de données qui définit les informations courantes, ou attributs, d'un composant gérable. guarding : Type de redondance de données qui utilise un groupe de disques physiques pour stocker les données, et un disque supplémentaire pour stocker les informations de parité. Voir également mise en miroir, striping et RAID. h : Hexadécimal. Système de numération en base 16, souvent utilisé en programmation pour identifier les adresses mémoire de RAM et d'E-S du système pour les périphériques. Dans le texte, les chiffres hexadécimaux sont souvent suivis d'un h. hot plug (enfichage à chaud) : Caractéristique permettant de remplacer un composant du système lorsque ce dernier est en cours de fonctionnement. Hz : Hertz. ID : Identification. IDE : Acronyme de “Integrated Drive Electronics”. Interface standard entre la carte système et les périphériques de stockage. informations de configuration du système : Données stockées en mémoire, qui informent un système sur la manière dont le matériel est installé et dont le système doit être configuré pour fonctionner. IP : Acronyme de “Internet Protocol”, protocole Internet. IPX : Acronyme de “Internet package exchange”. IRQ : Interrupt ReQuest (demande d'interruption). Un signal indiquant que des données vont être envoyées ou reçues par un périphérique, et envoyé au microprocesseur par une ligne d'IRQ. Chaque liaison avec un périphérique doit avoir un numéro d'IRQ. Deux périphériques peuvent avoir la même IRQ, mais vous ne pouvez pas les utiliser simultanément. K : Kilo, 1000. Kb : Kilobit, 1024 bits. Kbps : Kilobits par seconde. kg : Kilogramme, 1000 grammes. kHz : Kilohertz. KMM : Acronyme de “Keyboard/Monitor/Mouse”, ensemble clavier/moniteur/souris. Ko : Kilo-octet, 1024 octets. Ko/s : Kilo-octets par seconde. KVM : Commutateur KVM. Le terme KVM désigne un commutateur qui permet de sélectionner le système à partir duquell'image est affichée et pour lequel le clavier et la souris sont utilisés. lame : Module équipé d'un processeur, de mémoire et d'un disque dur. Ces modules sont montés dans une baie qui dispose d'alimentations et de ventilateurs. LAN : Réseau local. Un LAN se limite normalement à un bâtiment ou à un groupe de bâtiments proches, où tout l'équipement est relié par des fils réservés au réseau LAN. lb : Livre (poids). LCD : Écran à cristaux liquides. LED : Acronyme de “Light-Emitting Diode”, diode luminescente. Composant électronique qui s'allume lorsqu'il est traversé par un courant. LGA : Acronyme de “Land Grid Array”, matrice LGA. Type de support de microprocesseur. Contrairement aux PGA, ce type de connexion n'utilise pas des broches mais des contacteurs qui permettent d'augmenter le nombre de connexions sur le microprocesseur. Linux : Système d'exploitation similaire à UNIX et pouvant être utilisé sur une grande diversité de platesformes matérielles. Linux est un logiciel libre et gratuit. Certaines distributions plus complètes, accompagnées de support technique et de formation, sont payantes et disponibles chez des distributeurs comme Red Hat Software (www.redhat.com). LVD : Acronyme de “Low Voltage Differential”, différentiel à basse tension. m : Mètre(s). mA : Milliampère(s). mAh : Milliampère à l'heure. Mb : Mégabit, soit 1 048 576 bits. Mbps : Mégabits par seconde.Glossaire 161 MBR : Acronyme de “Master Boot Record”, enregistrement d'amorçage principal. mémoire : Zone de stockage des données de base du système. Un ordinateur peut disposer de différentes sortes de mémoire, intégrée (RAM et ROM) ou ajoutée sous forme de barrettes DIMM. mémoire cache : Zone de mémoire rapide contenant une copie des données ou des instructions pour les récupérer plus vite. Quand un programme demande des données qui se trouvent dans le cache, l'utilitaire de mise en mémoire cache du disque peut extraire les données plus vite de la RAM que du disque même. mémoire conventionnelle : Les premiers 640 Ko de la RAM. La mémoire conventionnelle est présente dans tous les systèmes. Sauf s'ils ont été conçus de façon particulière, les programmes MS-DOS® sont limités à cette mémoire de base. mémoire flash : Type d'EEPROM pouvant être reprogrammée en place dans le système, à partir d'un utilitaire sur disquette. La plupart des EEPROM ne peut être reprogrammée qu'avec un équipement spécial. mémoire système : Voir RAM. mémoire vidéo : La plupart des cartes vidéo VGA et SVGA contiennent de la mémoire, différente de la RAM du système. La mémoire vidéo installée affecte surtout le nombre de couleurs affichables (ce qui dépend aussi du pilote vidéo et du moniteur). MHz : Mégahertz. mise en miroir : Redondance de données qui utilise un ensemble de disques physiques pour stocker les données et un ou plusieurs ensembles de disques supplémentaires pour stocker des copies des données. Cette fonction est en général assurée par un logiciel. Voir également guarding, mise en miroir intégrée, striping et RAID. mise en miroir intégrée : Mise en miroir physique de deux disques. Cette fonction intégrée est assurée par le matériel du système. Voir aussi mise en miroir. mm : Millimètre. Mo : Méga-octet, soit 1 048 576 octets. Quand on parle de stockage sur disque dur, la mesure est souvent arrondie à 1 000 000 octets. Mo/s : Mégaoctets par seconde. mode graphique : Mode vidéo qui peut être défini par le nombre de pixels horizontaux x , le nombre de pixels verticaux y et le nombre de couleurs z. mode protégé : Mode d'exploitation qui permet aux systèmes d'exploitation de mettre en oeuvre les éléments et fonctions suivants : • Espace d'adresse mémoire de 16 Mo à 4 Go • Traitement multitâche • De la mémoire virtuelle, une méthode pour augmenter la mémoire adressable en utilisant le lecteur de disque dur Les systèmes d'exploitation Windows 2000 et UNIX 32 bits s'exécutent en mode protégé. En revanche, cela n'est pas le cas pour MS-DOS. ms : Milliseconde. MS-DOS® : Microsoft Disk Operating System. NAS : Acronyme de “Network Attached Storage”, stockage réseau. Le NAS est l'un des concepts utilisés pour l'implémentation du stockage partagé sur un réseau. Les systèmes NAS ont leurs propres systèmes d'exploitation, matériel intégré, et leurs propres logiciels optimisés pour répondre à des besoins spécifiques en termes de stockage. NIC : Acronyme de “Network Interface Controller”. Carte réseau intégrée ou installée sous forme de carte d'extension, pour relier le système à un réseau. NMI : Acronyme de “NonMaskable Interrupt”, interruption non masquable. Un matériel envoie une NMI pour signaler au microprocesseur des erreurs matérielles. ns : Nanoseconde. NTFS : Option du système de fichiers NT dans le système d'exploitation Windows 2000. numéro d'inventaire : Code individuel attribué à un système, normalement par un administrateur, à des fins de sécurité ou de suivi. NVRAM : Mémoire vive rémanente. Mémoire qui ne perd pas son contenu lorsque le système est mis hors tension. La NVRAM est utilisée pour conserver la date, l'heure et la configuration du système.162 Glossaire panneau de commande : Partie du système qui porte les voyants et contrôles, comme le commutateur d'alimentation et le voyant d'alimentation. parité : Informations redondantes associées à un bloc de données. partition : Vous pouvez partager un disque dur en plusieurs sections physiques appelées partitions, avec la commande fdisk. Chaque partition peut contenir plusieurs disques logiques. Après un partitionnement, vous devez formater chaque disque logique avec la commande format. PCI : Acronyme de “Peripheral Component Interconnect”, interconnexion de composants périphériques. Norme pour l'implémentation des bus locaux. PDU : Acronyme de “Power Distribution Unit”, unité de distribution électrique. Source d'alimentation dotée de plusieurs prises de courant qui fournit l'alimentation électrique aux serveurs et aux systèmes de stockage d'un rack. périphérique : Matériel interne ou externe, connecté à un système, comme une imprimante, un lecteur de disquette ou un clavier. PGA : Acronyme de “Pin Grid Array”, matrice de broches. Type de support de microprocesseur qui permet de retirer le microprocesseur. pile de sauvegarde : Pile qui conserve dans une région spécifique de la mémoire les informations sur la configuration du système, la date et l'heure, lorsque vous éteignez le système. pilote de périphérique : Programme qui permet au système d'exploitation ou à un autre programme de communiquer correctement avec un périphérique ou un matériel donné. Certains pilotes de périphériques, comme les pilotes réseau, doivent être chargés par le fichier config.sys ou comme programmes résidant en mémoire (en général par le fichier autoexec.bat). D'autres, comme le pilote vidéo, se chargent lorsque vous démarrez le programme pour lequel ils sont conçus. pilote vidéo : Programme qui permet aux applications et systèmes d'exploitation en mode graphique, d'afficher avec une résolution et le nombre de couleurs désirées. Le pilote vidéo doit correspondre à la carte vidéo installée. pixel : Point sur un écran vidéo. Les pixels sont disposés en rangées et en colonnes afin de créer une image. Une résolution vidéo, par exemple 640 x 480, indique le nombre de pixels en largeur et le nombre de pixels en hauteur. port en amont : Port sur un commutateur ou un concentrateur réseau, qui sert à le relier à un autre commutateur ou concentrateur, sans utiliser de câble croisé. port série : Port d'E-S, utilisé le plus souvent pour connecter un modem au système. Normalement, vous pouvez identifier un port série sur le système grâce à son connecteur à 9 broches. POST: Acronyme de “Power-On Self-Test”, auto-test de démarrage. Quand vous allumez le système, avant que le système d'exploitation ne se charge, ce programme teste différents composants dont la RAM, les lecteurs de disque et le clavier. processeur : Circuit de calcul principal du système, qui contrôle l'interprétation et l'exécution des fonctions mathématiques et logiques. Un logiciel écrit pour un microprocesseur doit souvent être révisé pour fonctionner sur un autre microprocesseur. CPU est un synonyme de microprocesseur. programme de configuration du système : Programme basé sur le BIOS et permettant de configurer le matériel du système et de personnaliser son fonctionnement, en paramétrant des fonctions telles que la protection par mot de passe et la gestion d'énergie. Comme le programme de configuration du système est stocké dans la mémoire vive rémanente, tous les paramètres restent effectifs jusqu'à ce que vous les changiez. PS/2 : Personal System/2.Glossaire 163 PXE : Acronyme de “Preboot eXecution Environment”, environnement d'exécution avant démarrage. La fonction PXE permet de démarrer un système (sans disque dur ni disquette amorçable) à partir d'une unité réseau. RAC : Acronyme de “Remote Access Controller”, contrôleur d'accès à distance. RAID : Acronyme de “Redundant Array of Independent Disks”, matrice redondante de disques indépendants. Technologie permettant la mise en redondance des données. Les types de RAID les plus fréquents sont les RAID : 0, 1, 5, 10 et 50. Voir aussi guarding, mise en miroir et striping. RAM : Acronyme de “Random-Access Memory”, mémoire vive. Zone principale de stockage temporaire du système pour les instructions d'un programme et les données. Toutes les informations stockées dans la RAM sont perdues lorsque vous éteignez le système. RAS : Acronyme de “Remote Access Service”, service d'accès à distance. Sous Microsoft Windows, ce service permet d'accéder à un réseau distant à l'aide d'un modem. répertoire : Les répertoires permettent de conserver des fichiers apparentés sur un disque en les organisant hiérarchiquement dans une structure en “arborescence inversée”. Chaque disque possède un répertoire “racine”. Les répertoires supplémentaires qui partent du répertoire racine sont appelés sous-répertoires. Ces derniers peuvent contenir d'autres répertoires, formant une sous-arborescence. ROM : Acronyme de “Read-Only Memory”, mémoire morte. La ROM contient les programmes essentiels au fonctionnement du système. Ces informations sont conservées lorsque le système est mis hors tension. Le programme qui lance la procédure d'amorçage et l'auto-test de démarrage de l'ordinateur sont des exemples de code en ROM. ROMB : Acronyme de “RAID on Motherboard”, fonction RAID incluse sur la carte mère. routine d'amorçage : Programme qui initialise la mémoire et les périphériques matériels, puis charge le système d'exploitation. À moins que le système d'exploitation ne réponde pas, vous pouvez redémarrer (faire un démarrage à chaud) le système en appuyant sur . Sinon, vous devez appuyer sur le bouton de réinitialisation ou éteindre puis rallumer le système. rpm : Tours par minute. RTC : Acronyme de “Real-Time Clock”, horloge temps réel. SAS : Acronyme de “Serial-Attached SCSI”. SATA : Acronyme de “Serial Advanced Technology Attachment”, connexion par technologie série avancée. Interface standard entre la carte système et les périphériques de stockage. sauvegarde : Copie d'un programme ou de données. Par précaution, il convient de sauvegarder régulièrement le disque dur du système. Avant de modifier la configuration du système, il est conseillé de sauvegarder les fichiers de démarrage importants du système d'exploitation. SCSI : Acronyme de “Small Computer System Interface”, interface système pour micro-ordinateur. Interface de bus d'E-S avec des transmissions de données plus rapides que les ports de modem standard. SDRAM : Acronyme de “Synchronous Dynamic RandomAccess Memory”, mémoire vive dynamique synchrone. sec : Seconde(s). SEL : Acronyme de “System Event Log”, journal des événements système. Utilisé par le logiciel de gestion de systèmes pour enregistrer les événements et les erreurs système. 164 Glossaire SMART: Acronyme de “Self-Monitoring Analysis and Reporting Technology”, technologie de prévision des défaillances des lecteurs de disque. Cette technologie permet aux lecteurs de disque dur de signaler les erreurs et les pannes au BIOS du système puis d'afficher un message d'erreur sur l'écran. SMP : Multiprocesseur symétrique. Se dit d'un système qui dispose de plusieurs processeurs reliés par un lien haut débit géré par un système d'exploitation où tous les processeurs ont les mêmes priorités d'accès au système d'E-S. SNMP : Acronyme de “Simple Network Management Protocol”, protocole de gestion de réseau simple. Interface standard qui permet au gestionnaire du réseau de surveiller et de gérer les stations de travail à distance. spanning (concaténation) : Dans ce mode, les volumes de disques attachés sont combinés ensemble et vus par le système d'exploitation comme un disque unique. L'espace disponible est ainsi mieux utilisé. striping (répartition des données) : Méthode de répartition des données sur trois ou plusieurs disques, en utilisant une quantité donnée d'espace sur chacun. L'espace occupé par une bande (“stripe”) est le même sur chaque disque. Un disque virtuel peut utiliser plusieurs bandes sur le même jeu de disques. Voir également guarding, mise en miroir et RAID. SVGA : Acronyme de “Super Video Graphics Array”, super matrice graphique vidéo. VGA et SVGA sont des normes de cartes graphiques. Leur résolution et le nombre de couleurs possibles sont supérieurs à celles des normes précédentes. système “sans tête” : Système ou périphérique qui fonctionne sans moniteur, souris ni clavier. Habituellement, les systèmes sans tête sont gérés par le réseau à l'aide d'un navigateur Internet. TCP/IP : Acronyme de “Transmission Control Protocol/Internet Protocol”. température ambiante : Température de l'endroit ou de la pièce où se trouve le système. terminaison : Certains périphériques (par exemple à chaque extrémité d'une chaîne SCSI) doivent être dotés d'une terminaison pour empêcher les réflexions et les signaux parasites sur le câble. Lorsque de tels périphériques sont connectés en série, vous pourrez avoir à activer ou désactiver leur terminaison (si elle est intégrée), en déplaçant un cavalier ou des commutateurs sur chaque périphérique, ou en modifiant ses paramètres dans le logiciel de configuration. TOE : Acronyme de “TCP/IP Offload Engine”, moteur de décentralisation TCP/IP. Améliore les performances des transferts de données sur les réseaux IP en permettant au système d'exploitation de décentraliser l'ensemble du trafic TCP/IP vers un élément matériel spécifique de la carte réseau, tout en laissant les décisions de contrôle TCP/IP au serveur hôte. UNIX : Universal Internet Exchange. UNIX est un système d'exploitation écrit en langage C. Il est le précurseur de Linux. UPS : Acronyme de “Uninterruptible Power Supply”, alimentation sans interruption. Unité, alimentée par batterie, qui fournit automatiquement l'alimentation du système en cas de coupure de courant. USB : Un connecteur USB permet de relier divers périphériques compatibles avec la norme USB, comme des souris, claviers, imprimantes, haut-parleurs, etc. Les périphériques USB peuvent être branchés et débranchés pendant que le système est en fonctionnement. utilitaire : Programme qui sert à gérer les ressources du système (mémoire, disques durs, imprimantes, etc.). UTP : Acronyme de “Unshielded Twisted Pair”, paire torsadée non blindée. Type de câblage utilisé pour relier un ordinateur à une ligne téléphonique. V : Volt(s). VCA : Volts en courant alternatif. VCC : Volts en courant continu.Glossaire 165 VGA : Acronyme de “Video Graphics Array”, matrice graphique vidéo. VGA et SVGA sont des normes de cartes graphiques. Leur résolution et le nombre de couleurs possibles sont supérieurs à celles des normes précédentes. volume de disque simple : Volume d'espace disponible sur un disque physique dynamique. W : Watt(s). WH : Wattheure(s). Windows 2000 : Système d'exploitation Microsoft Windows complet et intégré qui ne requiert pas MS-DOS et qui fournit des performances avancées en matière de système d'exploitation, une facilité d'utilisation accrue, une fonctionnalité de groupe de travail améliorée ainsi qu'un système de navigation et de gestion de fichiers simplifié. Windows Powered : Se dit d'un système d'exploitation Windows conçu pour les systèmes NAS (stockage relié au réseau). Il est dédié au service des fichiers pour les clients sur le réseau. Windows Server 2003 : Ensemble de technologies Microsoft qui permet l'intégration logicielle en utilisant les services Web XML. Ces derniers sont de petites applications écrites en XML réutilisables, qui permettent de communiquer des données entre des sources qui ne sont pas connectées autrement. XML : Acronyme de “Extensible Markup Language”. Le langage XML sert à créer des formats communs d'information, puis à partager le format et les données sur le Web, les intranets, etc. ZIF : Acronyme de “Zero insertion force”, force d'insertion nulle.166 GlossaireIndex 167 Index A Alerte, messages, 30 Assistance contacter Dell, 138 Auto-test de démarrage accès aux caractéristiques du système, 10 Avertissement, messages, 30 B Baie de périphériques lecteur optique, 70 unité de sauvegarde sur bande, 68 Banc de réserve, 82 Bloc d'alimentation dépannage, 109 installation, 51 retrait, 49 BMC. Voir Contrôleur BMC. Bouton d'identification du système, 12 Bouton NMI, 12 C Cadre (rack) installation, 47 Cadre (tour) installation, 47 Capot fermeture, 47 ouverture, 47 Caractéristiques panneau arrière, 13 panneau avant, 11 Caractéristiques du système accès, 10 Carte contrôleur fille RAID SAS dépannage, 117 remplacement de la pile, 91 Carte RAC installation, 85 Carte système cavaliers, 127 connecteurs, 129 installation, 99 retrait, 96 Cartes d'extension dépannage, 119 installation, 57 retrait, 58 Cavaliers carte système, 127 Clavier dépannage, 104 Configuration lecteur d'amorçage, 94 mémoire, 81 Configuration du système accès, 31, 44 options, 33 touches de navigation, 32 Configuration, mot de passe attribution, 42 modification, 43 utilisation, 42 Connecteurs carte système, 129 Connexion de périphériques externes, 14 Consignes d'installation des barrettes de mémoire, 81 Contrôleur BMC Contrôleur RAID. Voir Carte contrôleur fille RAID SAS. Contrôleur SAS. Voir Carte contrôleur fille SAS.168 Index 168 Index D Dell contacter, 138 Démarrage accès aux caractéristiques du système, 10 Dépannage bloc d'alimentation, 109 carte contrôleur fille RAID SAS, 117 cartes d'extension, 119 clavier, 104 connexions externes, 103 disque dur, 116 lecteur de bande, 115 lecteur de CD, 114 lecteur de disquette, 113 mémoire, 111 microprocesseurs, 120 NIC, 106 périphérique d'E-S série, 105 périphérique USB, 106 pile du système, 108 procédure de démarrage, 101 refroidissement du système, 110 souris, 104 système endommagé, 108 système mouillé, 107 ventilateurs, 110 vidéo, 103 Diagnostics liste de vérification, 137 options de test, 124 quand les utiliser, 124 DIMM installation, 82 logements, 80 retrait, 84 Disques durs, 59 dépannage, 116 installation, 62 retrait, 59 E Écran LCD configuration, 35 Écrans de configuration du système informations sur le processeur, 36 périphériques intégrés, 37 principal, 33 redirection de console, 38 sécurité du système, 38 F Fermeture du système, 47 G Garantie, 9 I Installation bloc d'alimentation, 51 cadre, 47 carte RAC, 85 carte système, 99 cartes d'extension, 57 disques durs, 62 lecteur de disquette, 74 lecteur optique, 71 mémoire, 82 mémoire, consignes, 81 panneau de commande, 96 pile du système, 75 pile RAID, 91 processeur, 87 protecteur de ventilation, 77 support de la baie d'extension, 99 support de ventilateur arrière, 79 support de ventilateur central, 78 unité de sauvegarde sur bande, 68 Installation à chaud blocs d'alimentation, 49 ventilateurs, 53 IRQ affectations, 102 configuration, 34 conflits, 102Index 169 L Lecteur d'amorçage configuration, 94 Lecteur de bande dépannage, 115 Lecteur de CD dépannage, 114 Lecteur de disquette dépannage, 113 installation, 74 retrait, 72 support de disque, 73 Lecteur optique installation, 71 retrait, 70 Logements d'extension, 56 Logements d'extension PCIe/PCI-X, 56 M Matériel requis, 45 Mémoire canaux, 80 consignes d'installation, 81 dépannage, 111 installation, 82 mise en miroir, 82 organisation des logements, 81 réserve, 82 retrait de barrettes DIMM, 84 voies, 80 Messages alerte, 30 avertissement, 30 écran d'état LCD, 15 système, 22 Messages d'erreur gestion de systèmes, 22 LCD, 15 Messages d'état gestion de systèmes, 22 LCD, 15 Messages d’erreur, 32 Microprocesseur dépannage, 120 réinstallation, 87 Mise en miroir de la mémoire, 82 Mot de passe configuration, 42 désactivation, 131 système, 40 N NIC dépannage, 106 voyants, 14 Numéro d'inventaire, 35 O Options configuration du processeur, 36 configuration du système, 33 périphériques intégrés, 37 sécurité du système, 38 Ouverture du système, 47 P Panneau de commande installation, 96 retrait, 94 Périphérique d'E-S série dépannage, 105 Périphérique USB dépannage, 106 Périphériques externes connexion, 14 Pile, 75 carte contrôleur fille RAID SAS, 91 dépannage de la pile de la carte RAID, 117 dépannage de la pile du système, 108 système, 75 Processeur réinstallation, 87 Protecteur de ventilation installation, 77 retrait, 76170 Index 170 Index R Refroidissement du système dépannage, 110 Retrait bloc d'alimentation, 49 carte système, 96 cartes d'extension, 58 disques durs, 59 lecteur de disquette, 72 lecteur optique, 70 mémoire, 84 panneau de commande, 94 processeur, 87 protecteur de ventilation, 76 support de la baie d'extension, 97 support de ventilateur arrière, 79 support de ventilateur central, 78 unité de sauvegarde sur bande, 66 ventilateurs, 53 S Sécurité, 101 Sécurité du système, 35, 41 Séquence d'amorçage, 34 Souris dépannage, 104 Support de disque lecteur de disquette, 73 Support de la baie d'extension installation, 99 retrait, 97 Support du ventilateur arrière, 79 central, 78 protecteur de ventilation, 54 Système endommagé dépannage, 108 Système mouillé dépannage, 107 Système, messages, 22 Système, mot de passe attribution, 40 modification, 42 suppression, 42 utilisation, 40 U Unité de sauvegarde sur bande installation, 68 retrait, 66 V Ventilateurs, 52 dépannage, 110 installation et retrait, 53 numéros, 52 protecteur de ventilation, 54 retrait et installation, 53 Vérification du matériel, 102 Vidéo dépannage, 103 Voyants LCD, 15 NIC, 14 panneau arrière, 13 panneau avant, 11 Systèmes Dell PowerEdge M620 Manuel du propriétaire Modèle réglementaire: HHB Type réglementaire: HHB003Remarques, précautions et avertissements REMARQUE: Une REMARQUE indique des informations importantes qui peuvent vous aider à mieux utiliser l'ordinateur. PRÉCAUTION: Une PRÉCAUTION indique un risque de dommage matériel ou de perte de données et vous indique comment éviter le problème. AVERTISSEMENT: Un AVERTISSEMENT indique un risque d'endommagement du matériel, de blessure corporelle ou de mort. Les informations que contient ce document sont sujettes à modification sans préavis. © 2012 Dell Inc. Tous droits réservés. La reproduction de ce document, de quelque manière que ce soit, sans l'autorisation écrite de Dell Inc. est strictement interdite. Marques commerciales utilisées dans ce document : Dell™, le logo Dell, Dell Precision™, OptiPlex™, Latitude™, PowerEdge™, PowerVault™, PowerConnect™, OpenManage™, EqualLogic™, Compellent™, KACE™, FlexAddress,™ Force10™ et Vostro™ sont des marques de Dell Inc. Intel®, Pentium®, Xeon®, Core® et Celeron® sont des marques déposées d'Intel Corporation aux États-Unis et dans d'autres pays. AMD® est une marque déposée, et AMD Opteron™, AMD Phenom™ et AMD Sempron™ sont des marques commerciales d'Advanced Micro Devices, Inc. Microsoft®, Windows®, Windows Server®, Internet Explorer®, MS-DOS®, Windows Vista® et Active Directory® sont des marques ou des marques déposées de Microsoft Corporation aux États-Unis et/ou dans d'autres pays. Red Hat® et Red Hat® Enterprise Linux® sont des marques déposées de Red Hat, Inc. aux États-Unis et/ou d'autres pays. Novell® et SUSE® sont des marques déposées de Novell Inc. aux États-Unis et dans d'autres pays. Oracle® est une marque déposée d'Oracle Corporation et/ou de ses filiales. Citrix®, Xen®, XenServer® et XenMotion® sont des marques ou des marques déposées de Citrix Systems, Inc. aux États-Unis et/ou dans d'autres pays. VMware®, Virtual SMP®, vMotion®, vCenter® et vSphere® sont des marques ou des marques déposées de VMware, Inc. aux États-Unis ou dans d'autres pays. IBM® est une marque déposée d'International Business Machines Corporation. D'autres marques et noms commerciaux peuvent être utilisés dans cette publication pour faire référence aux entités se réclamant de ces marques et noms ou à leurs produits. Dell Inc. rejette tout intérêt exclusif dans les marques et noms ne lui appartenant pas. 2012 – 03 Rev. A01Table des matières Remarques, précautions et avertissements..............................................................................2 Chapitre 1: À propos du système.................................................................................................7 Voyants et fonctions du panneau avant...................................................................................................................7 Utilisation de lecteurs de disquette ou de DVD/CD USB..........................................................................................7 Fonctionnalités du disque dur...................................................................................................................................8 Autres informations utiles.........................................................................................................................................9 Chapitre 2: Utilisation du gestionnaire de configuration du système et d'amorçage......11 Choix du mode d'amorçage du système.................................................................................................................11 Accès à la configuration du système.....................................................................................................................12 Réponse aux messages d'erreur.....................................................................................................................12 Utilisation des touches de navigation de la configuration du système...........................................................12 Options de configuration du système.....................................................................................................................13 Écran principal System Setup (Configuration du système)..............................................................................13 Écran System BIOS (BIOS du système)...........................................................................................................13 Écran System Information (Informations sur le système)................................................................................14 Écran Memory Settings (Paramètres de la mémoire)......................................................................................14 Écran Processor Settings (Paramètres du processeur)..................................................................................15 Écran SATA Settings (Paramètres SATA)........................................................................................................16 Écran Boot Settings (Paramètres d'amorçage)...............................................................................................16 Écran Integrated Devices (Périphériques intégrés)........................................................................................17 Écran Serial Communications (Communications série)...................................................................................18 Écran System Profile Settings (Paramètres du profil du système)..................................................................19 Écran System Security (Sécurité du système).................................................................................................20 Paramètres divers............................................................................................................................................21 Fonctionnalités de mot de passe du système et de mot de passe de configuration..............................................21 Attribution d'un mot de passe système et/ou de configuration.......................................................................22 Protection du système à l'aide d'un mot de passe système............................................................................23 Suppression ou modification d'un mot de passe système et/ou de configuration existant............................23 Utilisation du système avec un mot de passe de configuration activé............................................................24 Accès au Gestionnaire d'amorçage UEFI...............................................................................................................24 Utilisation des touches de navigation du Gestionnaire d'amorçage...............................................................25 Écran Boot Manager (Gestionnaire d'amorçage)............................................................................................25 Menu UEFI Boot (Amorçage UEFI)...................................................................................................................26 Gestion intégrée du système..................................................................................................................................26 Utilitaire de configuration iDRAC............................................................................................................................26Accès à l'utilitaire de configuration iDRAC......................................................................................................26 Chapitre 3: Installation des composants des serveurs lames..............................................29 Outils recommandés...............................................................................................................................................29 Retrait et installation d'un serveur lame.................................................................................................................29 Retrait du serveur lame....................................................................................................................................29 Installation du serveur lame.............................................................................................................................30 Ouverture et fermeture d'un serveur lame.............................................................................................................31 Ouverture d'un serveur lame...........................................................................................................................31 Fermeture d'un serveur lame...........................................................................................................................32 À l'intérieur d'un serveur lame...............................................................................................................................32 Carénage de refroidissement.................................................................................................................................32 Retrait du carénage de refroidissement..........................................................................................................33 Installation du carénage de refroidissement...................................................................................................34 Mémoire système...................................................................................................................................................34 Consignes générales pour l'installation des barrettes de mémoire................................................................35 Consignes spécifiques à chaque mode...........................................................................................................37 Exemples de configurations de mémoire.........................................................................................................38 Retrait de barrettes de mémoire......................................................................................................................40 Installation de barrettes de mémoire...............................................................................................................41 Cartes mezzanine associées aux modules d'E/S....................................................................................................42 Consignes d'installation d'une carte mezzanine..............................................................................................42 Retrait d'une carte mezzanine.........................................................................................................................43 Installation d'une carte mezzanine..................................................................................................................44 Carte de gestion de montage..................................................................................................................................44 Remplacement de la carte SD..........................................................................................................................44 Clé USB interne................................................................................................................................................45 Carte SD vFlash.......................................................................................................................................................46 Remplacement de la carte SD vFlash..............................................................................................................46 Connecteur de la carte réseau fille/carte de montage LOM..................................................................................47 Retrait de la carte réseau fille/carte de montage LOM....................................................................................47 Installation de la carte réseau fille/carte de montage LOM............................................................................48 Processeurs............................................................................................................................................................48 Retrait d'un processeur....................................................................................................................................49 Installation d'un processeur............................................................................................................................53 Disques durs...........................................................................................................................................................54 Consignes d'installation des disques durs.......................................................................................................54 Retrait d'un disque dur.....................................................................................................................................54 Installation d'un disque dur..............................................................................................................................55 Procédure d'arrêt pour le dépannage d'un disque dur....................................................................................56 Configuration du lecteur d'amorçage..............................................................................................................56 Retrait d'un disque dur installé dans un support de disque dur......................................................................56Installation d'un disque dur dans un support...................................................................................................57 Fond de panier du disque dur.................................................................................................................................57 Retrait du fond de panier du disque dur...........................................................................................................57 Installation du fond de panier des disques durs..............................................................................................58 Carte système.........................................................................................................................................................59 Retrait de la carte système..............................................................................................................................59 Installation de la carte système.......................................................................................................................60 Pile de secours NVRAM.........................................................................................................................................61 Remplacement de la pile de secours de la NVRAM........................................................................................61 Carte contrôleur de stockage.................................................................................................................................62 Retrait de la carte contrôleur de stockage......................................................................................................62 Installation de la carte contrôleur de stockage...............................................................................................63 Chapitre 4: Dépannage du système..........................................................................................65 La sécurité en priorité, pour vous et votre système...............................................................................................65 Dépannage de la mémoire système.......................................................................................................................65 Dépannage des disques durs.................................................................................................................................66 Dépannage des périphériques USB ......................................................................................................................66 Dépannage d'une carte SD interne........................................................................................................................67 Dépannage des processeurs..................................................................................................................................67 Dépannage de la carte système du serveur lame..................................................................................................68 Dépannage de la pile de secours de la NVRAM....................................................................................................68 Chapitre 5: Utilisation des diagnostics du système................................................................69 Dell Online Diagnostics...........................................................................................................................................69 Diagnostics du système intégré Dell......................................................................................................................69 Quand utiliser les diagnostics intégrés du système........................................................................................69 Exécution des diagnostics intégrés du système..............................................................................................69 Exécution des diagnostics intégrés du système depuis un support externe...................................................70 Commandes du diagnostic du système............................................................................................................70 Chapitre 6: Cavaliers et connecteurs........................................................................................71 Paramètres des cavaliers de la carte système......................................................................................................71 Connecteurs de la carte système...........................................................................................................................72 Désactivation d'un mot de passe oublié.................................................................................................................73 Chapitre 7: Caractéristiques techniques..................................................................................75 Chapitre 8: Messages système..................................................................................................79 Messages d'état affichés sur l'écran LCD.............................................................................................................79 Affichage des messages sur l'écran LCD........................................................................................................79 Suppression des messages affichés sur l'écran LCD......................................................................................79Messages d'erreur du système..............................................................................................................................79 Messages d'avertissement..................................................................................................................................156 Messages de diagnostic.......................................................................................................................................156 Messages d'alerte................................................................................................................................................156 Chapitre 9: Obtention d'aide.....................................................................................................157 Contacter Dell.......................................................................................................................................................1571 À propos du système Voyants et fonctions du panneau avant Figure 1. Voyants et fonctions du panneau avant 1. bouton d'éjection de la poignée 2. disques durs (2) 3. voyant d'état/d'identification 4. connecteurs USB (2) 5. bouton d'alimentation du serveur lame Utilisation de lecteurs de disquette ou de DVD/CD USB Le serveur lame est équipé de ports USB sur l'avant qui vous permettent de connecter un lecteur de disquette USB, un lecteur flash USB, un lecteur de DVD/CD USB, un clavier ou une souris. Les lecteurs USB peuvent être utilisés pour configurer le serveur lame. REMARQUE: Votre serveur lame prend en charge uniquement les lecteurs USB 2.0 de la marque Dell. Utilisez le plateau de stockage externe en option pour poser le lecteur lorsqu'il est utilisé. 7REMARQUE: Si vous souhaitez démarrer le système à partir du lecteur USB, connectez ce dernier, redémarrez le système, puis accédez à la configuration du système et placez le lecteur en tête de la liste des séquences d'amorçage. Le périphérique USB est affiché dans l'écran de définition de la séquence d'amorçage uniquement s'il est attaché au système avant d'avoir exécuté la configuration du système. Vous pouvez également sélectionner le périphérique à utiliser pour la séquence d'amorçage en cours en appuyant sur pendant le démarrage du système Fonctionnalités du disque dur Votre système prend en charge deux disques durs SAS ou SATA de 2,5 pouces. REMARQUE: Un serveur lame ne peut pas contenir à la fois des disques durs de type SAS et SATA. Les disques durs sont connectés au fond de panier des disques durs à l'intérieur du serveur lame. Sur les serveurs lames qui ne contiennent pas de disque, tous les logements des disques durs doivent contenir des caches de disque dur et le fond de panier de disques durs doit toujours être installé afin de garantir une ventilation suffisante du système. Les voyants du disque dur affichent différents schémas en fonction des événements se produisant dans le système. REMARQUE: Chaque baie de disque dur de chaque serveur lame doivent contenir soit un disque dur, soit un cache. Figure 2. Fonctionnalités du disque dur 1. voyant d'activité du disque dur (vert) 2. voyant d'état du disque dur (vert et orange) REMARQUE: Si le disque dur est en mode Advanced Host Controller Interface (AHCI), le voyant de l'état (sur la droite) ne fonctionne pas et reste éteint. Code du voyant d'état du disque État Voyant vert clignotant deux fois par seconde Identification du disque/préparation au retrait Éteint Disque prêt pour insertion ou retrait REMARQUE: Le voyant d'état des disques reste éteint jusqu'à ce que tous les disques soient initialisés après la mise sous tension du système. Il n'est pas possible d'insérer ou de retirer des disques au cours de cette période. 8Code du voyant d'état du disque État Vert clignotant, puis orange, puis extinction Panne de disque prévue Orange clignotant quatre fois par seconde Disque en panne Vert clignotant lentement Disque en cours de reconstruction Vert fixe Disque en ligne Voyant vert clignotant pendant trois secondes, orange pendant trois secondes et extinction pendant six secondes Reconstruction annulée Autres informations utiles AVERTISSEMENT: Reportez-vous aux informations concernant la sécurité et les réglementations livrées avec votre système. Les informations sur la garantie peuvent être incluses dans ce document ou bien dans un document séparé. • Le Getting Started Guide (Guide de mise en route) présente les fonctionnalités du système, les procédures de configuration et les spécifications techniques. • Le Rack Installation Instructions (Instructions d'installation en rack), fournie avec le rack, indique comment installer le système en rack. • Le Dell PowerEdge M1000e Enclosure Owner’s Manual (Manuel du propriétaire du châssis Dell PowerEdge M1000e) fournit des informations sur les caractéristiques du châssis et décrit comment réparer le châssis, installer ou remplacer les composants de ce dernier. • La documentation relative aux applications de gestion des systèmes Dell fournit des informations sur l'installation et l'utilisation du logiciel de gestion des systèmes. • Tous les supports fournis avec le système contiennent de la documentation et des outils permettant de configurer et de gérer le système, notamment les supports du système d'exploitation, du logiciel de gestion du système, des mises à jour système et des composants système que vous avez achetés avec le système. REMARQUE: Vérifiez toujours si des mises à jour sont disponibles sur le site support.dell.com/manuals et lisez-les en premier, car elles remplacent souvent les informations que contiennent les autres documents. 9102 Utilisation du gestionnaire de configuration du système et d'amorçage La configuration du système vous permet de gérer le matériel du système et de définir les options au niveau du BIOS. Les touches suivantes permettent d'accéder à certaines fonctions au démarrage du système : Touche Description Permet d'accéder à la configuration du système. Permet d'accéder aux services système, qui ouvrent le Dell Lifecycle Controller 2 (LC2). Le Dell LC2 vous permet d'accéder à des utilitaires tels que les diagnostics intégrés du système. Pour plus d'informations, reportez-vous à la documentation relative au Dell LC2. Permet d'accéder au gestionnaire d'amorçage BIOS ou UEFI selon la configuration de démarrage de votre système. Permet de lancer l'amorçage PXE (Preboot eXecution Environment). À partir de la configuration du système, vous pouvez effectuer les tâches suivantes : • Modifier les paramètres NVRAM après l'ajout ou la suppression de matériel • Afficher la configuration matérielle du système • Activer ou désactiver les périphériques intégrés • Définir les seuils de gestion de l'alimentation et des performances • Gérer la sécurité du système Vous pouvez accéder à la configuration du système à l'aide : • du navigateur graphique standard, activé par défaut • du navigateur de texte, activé à l'aide de Console Redirection (Redirection de la console) Pour activer Console Redirection (Redirection de la console), dans System Setup(Configuration du système), sélectionnez System BIOS (BIOS du système) → écran Serial Communication (Communications série) → Serial Communication (Communications série), sélectionnez On with Console Redirection(Activé avec la console de redirection). REMARQUE: Par défaut, le texte d'aide pour le champ sélectionné est affiché dans le navigateur graphique. Pour afficher le texte d'aide dans le navigateur de texte, vous devez appuyer sur la touche . Choix du mode d'amorçage du système System Setup (Configuration du système) vous permet de spécifier le mode d'amorçage pour l'installation du système d'exploitation : • Le mode d'amorçage du BIOS (par défaut) est l'interface standard d'amorçage au niveau du BIOS. • Le mode d'amorçage de l'UEFI est une interface d'amorçage améliorée de 64 bits basée sur des spécifications UEFI et superposée au système du BIOS. 11Vous devez sélectionner le mode d'amorçage dans le champ Boot Mode (Mode d'amorçage) de l'écran Boot Settings (Paramètres d'amorçage) dans System Setup (Configuration du système). Une fois le mode d'amorçage spécifié, le système démarre dans le mode spécifié et vous pouvez procéder à l'installation de votre système d'exploitation depuis ce mode. Ensuite, vous devez redémarrer le système à l'aide du même mode d'amorçage (BIOS ou UEFI) pour accéder au système d'exploitation installé. Si vous essayez de démarrer le système à partir d'un autre mode d'amorçage provoque le blocage du système au démarrage. REMARQUE: Les systèmes d'exploitation doivent être compatibles avec l'UEFI afin d'être installés depuis le mode d'amorçage UEFI. Les systèmes d'exploitation DOS et 32 bits ne prennent pas en charge l'UEFI et ne peuvent être installés qu'à partir du mode d'amorçage BIOS. REMARQUE: Pour obtenir les dernières informations sur les systèmes d'exploitation pris en charge, rendez-vous sur le site dell.com/ossupport. Accès à la configuration du système 1. Allumez ou redémarrez le système. 2. Appuyez sur dès que vous avez vu le message suivant : = System Setup (Configuration du système) Si le système d'exploitation commence à se charger alors que vous n'avez pas encore appuyé sur , attendez que le système finisse de démarrer, puis redémarrez-le et réessayez. Réponse aux messages d'erreur Si un message d'erreur est affiché pendant le démarrage du système, prenez note du message. Reportez-vous à la section Messages d'erreur du système de ce manuel pour obtenir une explication et des suggestions afin de corriger les erreurs. REMARQUE: Il est normal qu'un message s'affiche lorsque vous redémarrez le système après avoir installé une mise à niveau de mémoire. Utilisation des touches de navigation de la configuration du système Touches Action Flèche vers le haut Permet de revenir au champ précédent. Flèche vers le bas Permet de passer au champ suivant. Vous permet de saisir une valeur dans le champ sélectionné (le cas échéant) ou de suivre le lien dans le champ. Barre d'espacement Permet d'étendre ou de réduire la liste déroulante, le cas échéant. <Échap> Permet de passer à la page précédente jusqu'à ce que vous voyiez l'écran principal. Appuyez sur <Échap> dans l'écran principal vous permet de quitter la configuration du système. Un message vous invite à enregistrer tous les changements non enregistrés. Permet d'afficher le fichier d'aide de la configuration du système. REMARQUE: Pour la plupart des options, les modifications effectuées sont enregistrées mais ne prennent effet qu'au redémarrage du système. 12Options de configuration du système Écran principal System Setup (Configuration du système) REMARQUE: Appuyez sur pour réinitialiser les paramètres du BIOS ou de l'UEFI à leur paramètre par défaut. Élément de menu Description System BIOS (BIOS du système) Cette option est utilisée pour afficher et configurer les paramètres du BIOS. iDRAC Settings (Paramètres iDRAC) Cette option est utilisée pour afficher et configurer les paramètres iDRAC. Device Settings (Paramètres du périphérique) Cette option est utilisée pour afficher et configurer les paramètres du périphérique. Écran System BIOS (BIOS du système) REMARQUE: Les options de configuration du système varient en fonction de la configuration du système. REMARQUE: Les valeurs par défaut sont répertoriées sous l'option correspondante dans les sections suivantes, le cas échéant. Élément de menu Description iDRAC Settings (Paramètres iDRAC) Cette option est utilisée pour afficher et configurer les paramètres iDRAC. Device Settings (Paramètres du périphérique) Cette option est utilisée pour afficher et configurer les paramètres du périphérique. Informations système Permet d'afficher les informations sur le système telles que le nom du modèle du système, la version du BIOS, numéro de service, etc. Memory Settings (Paramètres de la mémoire) Permet d'afficher les informations et les options relatives à la mémoire installée. Processor settings (Paramètres du processeur) Permet d'afficher les informations et les options relatives au processeur telles que la vitesse, la taille du cache, etc. SATA Settings (Paramètres SATA) Permet d'afficher les options permettant d'activer ou de désactiver le contrôleur et les ports SATA intégrés. Boot Settings (Paramètres d'amorçage) Permet d'afficher les options pour indiquer le mode d'amorçage (BIOS ou UEFI). Vous permet de modifier les paramètres d'amorçage UEFI et BIOS. Integrated Devices (Périphériques intégrés) Permet d'afficher les options permettant d'activer ou de désactiver les contrôleurs de périphérique et les ports intégrés, et de spécifier les fonctionnalités et options associées. Serial Communication (Communications série) Permet d'afficher les options permettant d'activer ou de désactiver les ports série et de spécifier les fonctionnalités et options associées. 13Élément de menu Description System Profile Settings (Paramètres du profil du système) Permet d'afficher les options permettant de modifier les paramètres de gestion de l'alimentation du processeur, la fréquence de la mémoire, etc. System Security (Sécurité du système) Permet d'afficher les options permettant de configurer les paramètres de sécurité du système tels que le mot de passe du système, le mot de passe de configuration la sécurité TPM, etc. Cela permet également d'activer ou de désactiver la prise en charge pour la mise à jour BIOS locale et le bouton d'alimentation du système. Paramètres divers Permet d'afficher les options permettant de modifier la date du système, l'heure, etc. Écran System Information (Informations sur le système) Élément de menu Description System Model Name (Nom du modèle du système) Affiche le nom du modèle du système. System BIOS Version (Version du BIOS du système) Affiche la version du BIOS installée sur le système. System Service Tag (Numéro de service du système) Affiche le numéro de service du système. System Manufacturer (Fabricant du système) Affiche le nom du fabricant du système. System Manufacturer Contact Information (Coordonnées du fabricant du système) Affiche les coordonnées du fabricant du système. Écran Memory Settings (Paramètres de la mémoire) Élément de menu Description System Memory Size (Taille de la mémoire système) Indique la taille de la mémoire installée dans le système. System Memory Type (Type de mémoire système) Indique le type de mémoire installée dans le système. System Memory Speed (Vitesse de la mémoire système) Indique la vitesse de la mémoire système. System Memory Voltage (Tension de la mémoire système) Indique la tension de la mémoire système. Video Memory (Mémoire vidéo) Affiche la quantité de mémoire vidéo disponible. System Memory Testing (Test de la mémoire système) Indique si les tests de la mémoire système sont exécutés pendant l'amorçage du système. Les options sont Enabled (Activé) et Disabled (Désactivé).Par défaut, l'option System Memory Testing (Test de la mémoire système) est réglée sur Disabled (Désactivé). Memory Operating Mode (Mode de fonctionnement de la mémoire) Indique le mode de fonctionnement de la mémoire. Les options disponibles dépendant de la configuration de la mémoire du système sont Optimizer Mode (Mode optimisé), Advanced ECC Mode (Mode ECC avancé), Mirror Mode (Mode miroir), Spare Mode (Mode réserve) et Spare with Advanced ECC Mode (Mode 14Élément de menu Description réserve et ECC avancé). Par défaut, l'option Memory Operating Mode (Mode de fonctionnement de la mémoire) est réglée sur Optimizer Mode (Mode optimisé). Node Interleaving (Entrelacement de nœuds) Si ce champ est réglé sur Enabled (Activé), l'entrelacement de nœuds est pris en charge si une configuration de mémoire symétrique est installée. Si le champ est réglé sur Disabled (Désactivé); le système prend en charge des configurations de mémoire (asymétriques) d'architecture de la mémoire non uniforme (NUMA). Par défaut, l'option Node Interleaving (Entrelacement de nœuds) est réglée sur Disabled (Désactivé). Écran Processor Settings (Paramètres du processeur) Élément de menu Description Logical Processor (Processeur logique) Vous permet d'activer ou de désactiver les processeurs logiques et d'activer le nombre de processeurs logiques. Si l'option Logical Processor (Processeur logique) est réglée sur Enabled (Activé); le BIOS affiche tous les processeurs logiques. Si cette option est réglée sur Disabled (Désactivé), le BIOS n'affiche qu'un processeur logique par cœur. Par défaut, l'option Logical Processor (Processeur logique) est réglée sur Enabled (Activé). QPI Speed (Vitesse QPI) Vous permet de régler les paramètres de débit de données QuickPath Interconnect. Par défaut, l'option QPI Speed (Vitesse QPI) est réglée sur Maximum data rate (Débit de données maximal). REMARQUE: L'option QPI Speed (Vitesse QPI) est affichée uniquement lorsque les deux processeurs sont installés. Alternate RTID (Requestor Transaction ID) Setting (Paramètre RTID alterné) Vous permet d'attribuer plus de RTID au support à distance augmentant ainsi la performance du cache entre les supports ou de travailler en mode normal pour NUMA. Par défaut, Alternate RTID (Requestor Transaction ID) Setting (Paramètre RTID alterné) est réglé sur Disabled (Désactivé). Virtualization Technology (Technologie de virtualisation) Vous permet d'activer ou de désactiver les capacités matérielles supplémentaires fournies par la technologie de virtualisation. Par défaut, l'option Virtualization Technology (Technologie de virtualisation) est réglée sur Enabled (Désactivé). Adjacent Cache Line Prefetch (Prérécupération de la ligne de mémoire cache adjacente) Vous permet d'optimiser le système pour des applications nécessitant une utilisation élevée de l'accès séquentiel de la mémoire. Par défaut, l'option Adjacent Cache Line Prefetch (Prérécupération de la ligne de mémoire cache adjacente) est réglée sur Enabled (Activé). Vous pouvez désactiver cette option pour des applications nécessitant une utilisation élevée à un accès aléatoire à la mémoire. Hardware Prefetcher (Prérécupérateur de matériel) Vous permet d'activer ou de désactiver le prérécupérateur de matériel. Par défaut, l'option Hardware Prefetcher (Prérécupérateur de matériel) est réglée sur Enabled (Activé). DCU Streamer Prefetcher (Prérécupération du dévideur d'antémémoire de données) Vous permet d'activer ou de désactiver le prérécupérateur du dévideur d'antémémoire de données. Par défaut, l'option DCU Streamer Prefetcher (Prérécupération du dévideur d'antémémoire de données) est réglée sur Enabled (Activé). 15Élément de menu Description DCU IP Prefetcher (Prérécupération de l'adresse IP de l'antémémoire de données) Vous permet d'activer ou de désactiver le prérécupérateur du dévideur d'antémémoire de données. Par défaut, l'option DCU IP Prefetcher (Prérécupération de l'adresse IP de l'antémémoire de données) est réglée sur Enabled (Activé). Execute Disable (Exécution de la désactivation) Vous permet d'activer ou de désactiver la technologie de protection mémoire d'exécution de la désactivation. Par défaut, l'option Execute Disable (Exécution de la désactivation) est réglée sur Enabled (Activé). Number of Cores per Processor (Nombre de cœurs par processeur) Vous permet de contrôler le nombre de cœurs disponibles pour chaque processeur. Par défaut, l'option Number of Cores per Processor (Nombre de cœurs par processeur) est réglée sur All (Tous). Processor 64-bit Support (Prise en charge des processeurs 64 bits) Indique si le ou les processeurs prennent en charge les extensions 64 bits. Processor Core Speed (Vitesse du cœur du processeur) Affiche la fréquence maximale du cœur du processeur. Processor Bus Speed (Vitesse de bus du processeur) Affiche la vitesse de bus des processeurs. REMARQUE: L'option de la vitesse de bus du processeur est affichée uniquement lorsque les deux processeurs sont installés. Processor X Family -ModelStepping (Famille, modèle et numéro de série du processeur X) Affiche la famille et le numéro du modèle de chaque processeur. Un sous-menu indique la vitesse du cœur, la taille de la mémoire cache et le nombre de cœurs des processeurs. Écran SATA Settings (Paramètres SATA) Élément de menu Description Embedded SATA (SATA intégré) Permet au disque SATA intégrée d'être réglé sur les modes Off (Éteint), ATA, AHCI ou RAID. Par défaut, la fonction, Embedded SATA (SATA intégré) est réglée sur AHCI. Port A Auto permet une prise en charge du BIOS pour le périphérique fixé au port SATA A. Off (Éteint) désactive la prise en charge du BIOS pour le périphérique. Par défaut, Port A est réglé sur Auto. Port B Auto permet une prise en charge du BIOS pour le périphérique fixé au port SATA B. Off (Éteint) désactive la prise en charge du BIOS pour le périphérique. Par défaut, Port B est réglé sur Auto. Écran Boot Settings (Paramètres d'amorçage) Élément de menu Description Boot Mode (Mode d'amorçage) Vous permet de définir le mode d'amorçage du système. PRÉCAUTION: La permutation du mode d'amorçage peut empêcher le démarrage du système si le système d'exploitation n'a pas été installé selon le même mode d'amorçage. Si le système d'exploitation prend en charge l'UEFI, vous pouvez définir cette option sur UEFI. Le réglage de ce champ sur BIOS permet la compatibilité avec des systèmes 16Élément de menu Description d'exploitation non UEFI. Par défaut, l'option Boot Mode (Mode d'amorçage) est réglée sur BIOS. REMARQUE: Le réglage de ce champ sur UEFI désactive le menu BIOS Boot Settings (Paramètres d'amorçage du BIOS). Le réglage de ce champ sur BIOS désactive le menu UEFI Boot Settings (Paramètres d'amorçage UEFI). Boot Sequence Retry (Réexécution de la séquence d'amorçage) Vous permet d'activer ou de désactiver la fonction de réexécution de la séquence d'amorçage. Si ce champ est activé et que le système n'arrive pas a démarré, ce dernier ré- exécute la séquence d'amorçage après 30 secondes. Par défaut, l'option Boot Sequence Retry (Réexécution de la séquence d'amorçage) est réglée sur Disabled (Désactivé). BIOS Boot Settings (Paramètres d'amorçage BIOS) Vous permet d'activer ou de désactiver les options d'amorçage du BIOS. REMARQUE: Cette option est activée uniquement si le mode d'amorçage est le BIOS. UEFI Boot Settings (Paramètres d'amorçage UEFI) Vous permet d'activer ou de désactiver les options d'amorçage de l'UEFI. REMARQUE: Cette option est activée uniquement si le mode d'amorçage est l'UEFI. One-Time Boot (Amorçage ponctuel) Vous permet d'activer ou de désactiver l'amorçage ponctuel depuis un périphérique sélectionné. Écran Integrated Devices (Périphériques intégrés) Élément de menu Description Integrated RAID controller (Contrôleur RAID intégré) Vous permet d'activer ou de désactiver le contrôleur RAID intégré. Par option, l'option Integrated RAID Controller (Contrôleur RAID intégré) est réglée sur Enabled (Activé). User Accessible USB Ports (Ports USB accessibles à l'utilisateur) Vous permet de définir les ports USB accessibles à l'utilisateur. La sélection de All Ports Off (Tous les ports désactivés) désactive tous les ports USB. Par défaut, l'option User Accessible USB Ports (Ports USB accessibles à l'utilisateur) est réglée sur All Ports On (Tous les ports activés). Internal USB Port (Port USB interne) Vous permet d'activer ou de désactiver le port interne USB. Par défaut, l'option Internal USB Port (Port USB interne) est réglée sur On (Activé). Internal SD Card Redundancy (Redondance de la carte SD interne) Lorsque l'option est réglée sur le mode Mirror (Miroir), les données sont écrites sur les deux cartes SD. Si l'une des cartes tombe en panne, les données sont écrites sur la carte SD active. Les données depuis cette carte sont copiées sur la carte SD de remplacement au prochain démarrage. Internal SD Card Port (Port de carte SD interne) Active ou désactive le port de la carte SD interne du système. Integrated Network Card 1 (Carte réseau intégrée 1) Vous permet d'activer ou de désactiver la carte réseau intégrée. Par défaut, l'option Integrated Network Card 1 (Carte réseau intégrée 1) est réglée sur Enabled (Activé). 17Élément de menu Description OS Watchdog Timer (Temporisateur de surveillance du système d'exploitation) Vous permet d'activer ou de désactiver le temporisateur de surveillance du système d'exploitation. Lorsque ce champ est activé, le système d'exploitation initialise le temporisateur et ce dernier aide à la récupération du système d'exploitation. Par défaut, l'option OS Watchdog Timer (Temporisateur de surveillance du système d'exploitation) est réglée sur Disabled (Désactivé). Embedded Video Controller (Contrôleur vidéo intégré) Vous permet d'activer ou de désactiver Embedded Video Controller (Contrôleur vidéo intégré). Par défaut, le contrôleur vidéo intégré est réglé sur Enabled (Activé). SR-IOV Global Enable (Activation des périphériques SR-IOV avec la commande globale) Vous permet d'activer ou de désactiver la configuration du BIOS des périphériques SR-IOV (Single Root I/O Virtualization). Par défaut, l'option SR-IOV Global Enable (Activation des périphériques SR-IOV avec la commande globale) est réglée sur Disabled (Désactivé) Slot Disablement (Désactivation des emplacements) La fonction Slot Disablement (Désactivation des emplacements) contrôle la configuration des cartes mezzanine installées dans les emplacements spécifiés. Seuls les emplacements de cartes mezzanine présents dans le système sont contrôlables. Écran Serial Communications (Communications série) Élément de menu Description Serial Communication (Communications série) Vous permet d'activer les options COM port (Port COM) ou Console Redirection (Redirection de console). Serial Port Address (Adresse de port série) Vous permet de définir l'adresse de port pour les périphériques série. Par défaut, l'option Serial Port Address (Adresse de port série) est réglée sur COM1. REMARQUE: Seul le périphérique série 2 (Serial Device 2) peut être associé aux connectivités SOL (Serial Over LAN). Pour utiliser la redirection de console par SOL, configurez la même adresse de port pour la redirection de console et le périphérique série. Failsafe Baud Rate (Débit en bauds de la ligne de secours) Affiche le débit en bauds de la ligne de secours pour la redirection de console. Le BIOS tente de déterminer le débit en bauds automatiquement. Ce débit est utilisé uniquement si la tentative échoue et la valeur ne doit pas être modifiée. Par défaut, l'option Failsafe Baud Rate (Débit en bauds de la ligne de secours) est réglée sur 11520. Remote Terminal Type (Type du terminal distant) Vous permet de définir le type de terminal de console distant. Par défaut, l'option Remote Terminal Type (Type du terminal distant) est réglée sur VT 100/VT220. Redirection After Boot (Redirection après démarrage) Vous permet d'activer ou de désactiver la redirection de console du BIOS lorsque le système d'exploitation est en cours de chargement. Par défaut, l'option Redirection After Boot (Redirection après démarrage) est réglée sur Enabled (Activé). 18Écran System Profile Settings (Paramètres du profil du système) Élément de menu Description System Profile (Profil du système) Vous permet de régler le profil du système. Si vous réglez l'option System Profile (Profil du système) sur un mode autre que Custom (Personnalisé), le BIOS définit automatiquement le reste des options. Vous ne pouvez que modifier le reste des options si le mode est réglé sur Custom (Personnalisé). Par défaut, l'option System Profile (Profil du système) est réglée sur Performance Per Watt Optimized (DAPC) [Performance par watt optimisée (DAPC)]. DAPC correspond à Dell Active Power Controller (Contrôleur de l'alimentation actif Dell). REMARQUE: Les paramètres suivants ne sont disponibles que lorsque System Profile (Profil du système) est réglé sur Custom (Personnalisé). CPU Power Management (Gestion de l'alimentation de l'UC) Vous permet de régler la gestion de l'alimentation de l'UC. Par défaut, l'option CPU Power Management (Gestion de l'alimentation de l'UC) est réglée sur System DBPM (DAPC) [Modulation biphasée différentielle du système (DAPC)]. DBPM correspond à DemandBased Power Management (Gestion de l'alimentation en fonction de la demande). Memory Frequency (Fréquence de la mémoire) Vous permet de définir la fréquence de la mémoire. Par défaut, l'option Memory Frequency (Fréquence de la mémoire) est réglée sur Maximum Performance (Performances maximales). Turbo Boost Vous permet d'activer ou de désactiver le processeur pour faire fonctionner le mode turbo boost. Par défaut, l'option Turbo Boost est réglée sur Enabled (Activé). C1E Vous permet d'activer et de désactiver le processeur pour basculer à un état de performances minimales lorsqu'il est inactif. Par défaut, l'option C1E est réglée sur Enabled (Activé). C States (États C) Vous permet d'activer ou de désactiver le processeur pour fonctionner avec tous les états d'alimentation disponibles. Par défaut, l'option C States (États C) est réglée sur Enabled (Activé). Monitor/Mwait Vous permet d’activer les instructions Monitor/Mwait dans le processeur. Par défaut, l’option Moniteur/Mwait est réglée sur Enabled (Activé) pour tous les profils du système, sauf Custom (Personnalisé). REMARQUE: Cette option peut être désactivée uniquement si l’option C States (États C) du mode Custom (Personnalisé) est désactivée. REMARQUE: Lorsque C States (États C) est activée dans le mode Custom (Personnalisé), la modification du paramètres Monitor/Mwait n’a aucune incidence sur l’alimentation ou les performances du système. Memory Patrol Scrub (Vérification et correction d'erreur de la mémoire) Vous permet de définir la fréquence de vérification et de correction d'erreur de la mémoire. Par défaut, l'option Memory Patrol Scrub (Vérification et correction d'erreur de la mémoire) est réglée sur Standard. Memory Refresh Rate (Taux de rafraîchissement de la mémoire) Vous permet de régler le taux de rafraîchissement de la mémoire. Par défaut, l'option Memory Refresh Rate (Taux de rafraîchissement de la mémoire) est réglée sur 1x. 19Élément de menu Description Memory Operating Voltage (Tension de fonctionnement de la mémoire) Vous permet de régler la sélection de tension des barrettes DIMM. Lorsque l'option est réglée sur Auto, le système règle la tension du système à un paramètre optimal basé sur la capacité des barrettes DIMM ainsi que le nombre de barrettes DIMM installées. Par défaut, l'option Memory Operating Voltage (Tension de fonctionnement de la mémoire) est réglée sur Auto. Écran System Security (Sécurité du système) Élément de menu Description Intel AES-NI L'option Intel AES-In améliore la vitesse des applications en réalisant un cryptage et un décryptage à l'aide de la norme de cryptage avancé, réglée sur Enabled (Activé) par défaut. System Password (Mot de passe du système) Vous permet de définir le mot de passe du système. Cette option est en lecture seule si le cavalier du mot de passe n'est pas installé sur le système. Setup Password (Mot de passe de configuration) Vous permet de définir le mot de passe de configuration. Cette option est en lecture seule si le cavalier du mot de passe n'est pas installé sur le système. Password Status (État du mot de passe) Vous permet de verrouiller le mot de passe du système. Par défaut, l'option Password Status (État du mot de passe) est réglée sur Unlocked (Déverrouillé). TPM Security (Sécurité TPM) Vous permet de contrôler le mode de signalement du module TPM (Trusted Platform Module). Par défaut, l'option TPM Security est réglée sur Off (Désactivé). Vous ne pouvez que modifier TPM Status (Condition TPM), TPM Activation (Activation de la puce TPM) et les champs Intel TXT que si le champ TPM Status (Condition TPM) est réglé sur On with Pre-boot Measurements (Activé avec les mesures de pré-amorçage) ou On without Pre-boot Measurements (Activé sans mesures pré-amorçage). TPM Activation (Activation de la puce TPM) Vous permet de modifier l'état opérationnel du module TPM. Par défaut, l'option TPM Activation (Activation de la puce TPM) est réglée sur No Change (Aucun changement). Condition TPM Affiche la condition du module TPM. TPM Clear (Effacement TPM) PRÉCAUTION: L'effacement du module TPM entraîne une perte de toutes les clés du module TPM. La perte des clés du module TPM peut affecter le démarrage du système d'exploitation. Vous permet d'effacer tous les contenus du module TPM. Par défaut, l'option TPM Clear (Effacement TPM) est réglée sur No (Non). Intel TXT Vous permet d'activer ou de désactiver la technologie Intel Trusted Execution Technology. Pour activer Intel TXT, l'option Virtualization Technology (Technologie de virtualisation) doit être activée et l'option TPM Security (Sécurité TPM) doit être activée avec les mesures de pré-amorçage. Par défaut, l'option Intel TXT est réglée sur Off (Désactivé). BIOS Update Control (Contrôle de la mise à jour du BIOS) Vous permet de mettre à jour le BIOS en utilisant des utilitaires flash basés sur des environnements DOS ou UEFI. Pour les environnements ne nécessitant aucune mise à jour BIOS locale, il est recommandé de régler ce champ sur Limited (Limité). Par défaut, l'option Local BIOS Update Support (Prise en charge de la mise à jour du BIOS locale) est réglée sur Unlocked (Déverrouillé). 20Élément de menu Description REMARQUE: Les mises à jour du BIOS utilisant Dell Update Package ne sont pas concernées par cette option. Power Button (Bouton d'alimentation) Vous permet d'activer ou de désactiver le bouton d'alimentation sur l'avant du système. Par défaut l'option Power Button (Bouton d'alimentation) est réglée sur Enabled (Activé). AC Power Recovery Delay (Délai de restauration de l'alimentation) Vous permet de définir le temps de réaction du système une fois l'alimentation restaurée dans le système. Par défaut, l'option AC Power Recovery (Restauration de l'alimentation) est réglée sur Last (Dernière). Paramètres divers Élément de menu Description System Time (Heure système) Vous permet de régler l'heure sur le système. System Date (Date système) Vous permet de régler la date sur le système. Asset Tag (Numéro d'inventaire) Affiche le numéro d'inventaire et vous permet de le modifier à des fins de sécurité et de suivi. Keyboard NumLock (Verr Num clavier) Vous permet de définir si le système démarre avec la fonction Verr Num activée ou désactivée. Par défaut, Keyboard NumLock (Verr Num clavier) est réglé sur On (Activé). REMARQUE: Ce champ ne s'applique pas aux claviers à 84 touches. Report Keyboard Errors (Signaler les erreurs de clavier) Vous permet de définir si les messages d'erreur de clavier sont signalés pendant le démarrage du système. Par défaut, le champ Report Keyboard Errors (Signaler les erreurs de clavier) est réglé sur Report (Signaler). F1/F2 Prompt on Error (Invite F1/F2 en cas d'erreur) Vous permet d'activer ou de désactiver l'invite F1/F2 en cas d'erreur. Par défaut, F1/F2 Prompt on Error (Invite F1/F2 en cas d'erreur) est réglé sur Enabled (Activé). In-System Characterization (Caractérisation dans le système) Ce champ permet d'activer ou de désactiver In-System Characterization (Caractérisation dans le système). Par défaut, In-System Characterization (Caractérisation dans le système) est réglé sur Enabled (Activé). Fonctionnalités de mot de passe du système et de mot de passe de configuration Vous pouvez créer un mot de passe du système et un mot de passe de configuration pour protéger le système. Pour activer la création du mot de passe du système et du mot de passe de configuration, le cavalier de mot de passe doit être activé. Pour obtenir plus d'informations sur les paramètres du cavalier du mot de passe, reportez-vous à la section Paramètres du cavalier de la carte système. System Password (Mot de passe du système) Il s'agit du mot de passe que vous devez saisir pour ouvrir une session sur le système. 21Setup Password (Mot de passe de configuration) Il s'agit du mot de passe que vous devez saisir pour accéder et effectuer les modifications sur les paramètres du BIOS ou UEFI de votre système. PRÉCAUTION: Les fonctionnalités de mot de passe assurent la sécurité de base des données de votre système. PRÉCAUTION: N'importe qui peut accéder aux données enregistrées sur votre système si celui-ci est en cours de fonctionnement et sans surveillance. REMARQUE: Votre système est fourni avec la fonction de mot de passe du système et de configuration désactivée. Attribution d'un mot de passe système et/ou de configuration REMARQUE: La cavalier de mot de passe active ou désactive les fonctions de mot de passe du système et de mot de passe de configuration. Pour obtenir des informations sur les paramètres du cavalier de mot de passe, reportezvous à la section Paramètres du cavalier de la carte système. Vous pouvez attribuer un nouveau System Password (Mot de passe du système) et/ou Setup Password (Mot de passe de configuration) ou modifier un System Password (Mot de passe du système) et/ou un Setup Password (Mot de passe de configuration) déjà existant lorsque le paramètre du cavalier du mot de passe est activé et que l'option Password Status (État du mot de passe) est Unlocked (Déverrouillé). Si Password Status (État du mot de passe) est Locked (Verrouillé), vous ne pouvez pas modifier le mot de passe du système et/ou le mot de passe de configuration. Si le paramètre du cavalier du mot de passe est désactivé, le mot de passe du système et le mot de passe de configuration existants sont supprimés et vous n'avez pas besoin de fournir au système un mot de passe du système pour ouvrir une session. Attribution d'un mot de passe système et/ou de configuration : 1. Pour accéder à la configuration du système, appuyez immédiatement après le démarrage ou le redémarrage sur la touche . 2. Dans System Setup Main Menu (Menu principal de la configuration du système), sélectionnez System BIOS (BIOS du système) et appuyez sur . L'écran System BIOS (BIOS du système) s'affiche. 3. Dans l'écran System BIOS (BIOS du système), sélectionnez System Security (Sécurité du système) et appuyez sur . L'écran System BIOS (BIOS du système) s'affiche. 4. Dans l'écran System Security (Sécurité du système), vérifiez que Password Status ((État du mot de passe) est réglé sur Unlocked (Déverrouillé). 5. Sélectionnez System Password (Mot de passe du système), saisissez votre mot de passe du système, puis appuyez sur ou . Utilisez les consignes suivantes pour attribuer le mot de passe du système : – Un mot de passe peut contenir au maximum 32 caractères. – Le mot de passe peut contenir des chiffres allant de 0 à 9. – Seules les minuscules sont valides, les majuscules ne sont pas autorisées. – Les caractères spéciaux suivants sont autorisés : espace, (”), (+), (,), (-), (.), (/), (;), ([), (\), (]), (`). Un message vous invite à resaisir le mot de passe du système. 6. Saisissez à nouveau le mot de passe du système entré précédemment puis cliquez sur OK. 7. Sélectionnez Setup Password (Mot de passe de configuration), saisissez votre mot de passe du système, puis appuyez sur ou . Un message vous invite à resaisir le mot de passe de configuration. 228. Saisissez à nouveau le mot de passe du de configuration entré précédemment puis cliquez sur OK. 9. Appuyez sur <Échap> pour enregistrer les modifications. REMARQUE: La protection par mot de passe ne prend effet que lorsque vous redémarrez le système. Protection du système à l'aide d'un mot de passe système REMARQUE: Si vous avez attribué un mot de passe de configuration, le système l'accepte également comme mot de passe du système alternatif. 1. Allumez ou redémarrez le système. 2. Saisissez le mot de passe, puis appuyez sur . Si Password Status (État du mot de passe) indique Locked (Verrouillé), vous devez saisir le mot de passe, puis appuyer sur lorsque le système vous y invite au redémarrage. Si un mot de passe du système incorrect est saisi, le système affiche un message et vous invite à saisir de nouveau votre mot de passe. Vous disposez de trois tentatives pour saisir le bon mot de passe. Après la troisième tentative infructueuse, le système affiche un message d'erreur indiquant que le système s'est arrêté et qu'il doit être éteint. Même après l'arrêt et le redémarrage du système, le message d'erreur continue à s'afficher tant que vous n'avez pas entré le mot de passe approprié. REMARQUE: Vous pouvez utiliser l'option Password Status (État du mot de passe) conjointement avec les options System Password (Mot de passe du système) et Setup Password (Mot de passe de configuration) pour mieux protéger le système contre toute modification non autorisée. Suppression ou modification d'un mot de passe système et/ou de configuration existant Assurez-vous de le cavalier de mot de passe est activé et que Password Status (État du mot de passe) est réglé sur Unlocked (Déverrouillé) avant d'essayer de supprimer ou modifier le mot de passe du système et/ou de configuration. Vous ne pouvez pas supprimer ou modifier un mot de passe du système ou de configuration si Password Status (État du mot de passe) est réglé sur Locked (Verrouillé). Pour supprimer ou modifier le mot de passe du système et/ou de configuration : 1. Pour accéder à la configuration du système, appuyez immédiatement après le démarrage ou le redémarrage sur la touche . 2. Dans System Setup Main Menu (Menu principal de la configuration du système), sélectionnez System BIOS (BIOS du système) et appuyez sur . L'écran System BIOS (BIOS du système) s'affiche. 3. Dans l'écran System BIOS (BIOS du système), sélectionnez System Security (Sécurité du système) et appuyez sur . L'écran System BIOS (BIOS du système) s'affiche. 4. Dans l'écran System Security (Sécurité du système), vérifiez que Password Status (État du mot de passe) est réglé sur Unlocked (Déverrouillé). 5. Sélectionnez System Password (Mot de passe du système), modifiez ou supprimer le mot de passe du système existant et appuyez sur ou . 6. Sélectionnez Setup Password (Mot de passe de configuration), modifiez ou supprimer le mot de passe de configuration existant et appuyez sur ou . 23REMARQUE: Si vous modifiez le mot de passe du système et/ou de configuration, un message vous invite à ressaisir le nouveau mot de passe. Si vous supprimer le mot de passe du système et/ou de configuration, un message vous invite à confirmer la suppression. 7. Appuyez sur <Échap> pour enregistrer les modifications. REMARQUE: Vous pouvez désactiver la sécurité du mot de passe tout en vous connectant au système. Pour ce faire, démarrez ou redémarrez le système, saisissez votre mot de passe puis appuyez sur . Utilisation du système avec un mot de passe de configuration activé Si l'option Setup Password (Mot de passe de configuration) indique Enabled (Activé), saisissez ce mot de passe avant de modifier la plupart des options de configuration du système. Si vous ne saisissez pas le bon mot de passe au bout de trois tentatives, le système affiche le message Incorrect Password! Number of unsuccessful password attempts: System Halted! Must power down. (Mot de passe incorrect ! Nombre d'essai Système arrêté ! Redémarrez le système.) Même après l'arrêt et le redémarrage du système, le message d'erreur continue à s'afficher tant que vous n'avez pas entré le mot de passe approprié. Les options suivantes font office d'exceptions : • Si l'option System Password (Mot de passe du système) n'est ni définie sur Enabled (Activé) ni verrouillée via l'option Password Status (État du mot de passe), vous pouvez attribuer un mot de passe du système. • Vous ne pouvez ni désactiver ni changer un mot de passe système existant. REMARQUE: Il est possible de combiner l'utilisation des options Password Status (État du mot de passe) et Setup Password (Mot de passe de configuration) pour empêcher toute modification du mot de passe système. Accès au Gestionnaire d'amorçage UEFI REMARQUE: Les systèmes d'exploitation doivent être compatibles avec une version UEFI 64 bits (comme par exemple Microsoft Windows Server 2008 version x64) pour pouvoir être installés à partir du mode d'amorçage UEFI. L'installation des systèmes d'exploitation DOS et 32 bits est possible uniquement à partir du mode d'amorçage sur le BIOS. Le Gestionnaire d'amorçage permet d'effectuer les opérations suivantes : • Ajouter, supprimer et organiser les options d'amorçage • Accéder à la configuration du système et aux options d'amorçage BIOS sans nécessiter de redémarrage Pour accéder au Gestionnaire d'amorçage : 1. Allumez ou redémarrez le système. 2. Appuyez sur dès l'apparition du message suivant : = UEFI Boot Manager (Gestionnaire d'amorçage UEFI) Si le système d'exploitation commence à se charger alors que vous n'avez pas encore appuyé sur , attendez que le système finisse de démarrer, puis redémarrez-le et réessayez. 24Utilisation des touches de navigation du Gestionnaire d'amorçage Touche Description Flèche vers le haut Permet de revenir au champ précédent. Flèche vers le bas Permet de passer au champ suivant. Vous permet de saisir une valeur dans le champ sélectionné (le cas échéant) ou de suivre le lien dans le champ. Barre d'espacement Permet d'étendre ou de réduire la liste déroulante, le cas échéant. <Échap> Permet de passer à la page précédente jusqu'à ce que vous voyiez l'écran principal. Appuyez sur <Échap> dans l'écran principal vous permet de quitter la configuration du système. Un message vous invite à enregistrer tous les changements non enregistrés. Permet d'afficher le fichier d'aide de la configuration du système. REMARQUE: Pour la plupart des options, les modifications effectuées sont enregistrées mais ne prennent effet qu'au redémarrage du système. Écran Boot Manager (Gestionnaire d'amorçage) Élément de menu Description Continue Normal Boot (Poursuivre le démarrage normal) Le système tente d'effectuer successivement l'amorçage sur différents périphériques en commençant par le premier dans l'ordre d'amorçage. En cas d'échec de l'amorçage, le système passe au périphérique suivant dans l'ordre d'amorçage jusqu'à ce que le démarrage réussisse ou qu'aucune autre option ne soit disponible. Menu BIOS Boot (Amorçage du BIOS) Affiche la liste des options d'amorçage du BIOS disponibles (marquées par des astérisques). Choisissez l'option d'amorçage de votre choix, puis appuyez sur . Menu UEFI Boot (Amorçage UEFI) Affiche la liste des options d'amorçage UEFI disponibles (marquées par des astérisques). Choisissez l'option d'amorçage de votre choix, puis appuyez sur . Le menu UEFI Boot (Amorçage UEFI) vous permet d'utiliser les options suivantes : Add Boot Option (Ajouter une option d'amorçage), Delete Boot Option (Supprimer une option d'amorçage) ou Boot From File (Amorçage à partir d'un fichier). Menu Driver Health (Intégrité du pilote) Affiche une liste des pilotes installés sur le système ainsi que leur état d'intégrité. Launch System Setup (Démarrer la configuration du système) Vous permet d'accéder à la configuration du système. System Utilities (Utilitaires du système) Vous permet d'accéder à l'explorateur de ficher de la mise à jour du BIOS, d'exécuter le programme Dell Diagnostics et de redémarrer le système. 25Menu UEFI Boot (Amorçage UEFI) Élément de menu Description Boot From File (Amorçage à partir d'un fichier) Définit une option d'amorçage utilisable une seule fois qui ne figure pas dans la liste des options d'amorçage. Select UEFI Boot Option (Sélectionner une option d'amorçage UEFI) Affiche la liste des options d'amorçage UEFI disponibles (marquées par des astérisques), choisissez l'option d'amorçage de votre choix, puis appuyez sur . Add Boot Option (Ajouter une option d'amorçage) Ajoute une nouvelle option d'amorçage. Delete Boot Option (Supprimer une option d'amorçage) Supprime une option d'amorçage existante. Gestion intégrée du système Le Dell Lifecycle Controller offre une gestion avancée des systèmes intégrés tout au long du cycle de vie du serveur. Le Lifecycle Controller peut être démarré pendant la séquence d'amorçage et peut fonctionner indépendamment du système d'exploitation. REMARQUE: Certaines configurations de plate-forme ne peuvent ne pas prendre en charge l'ensemble des fonctionnalités fournies de Lifecycle Controller. Pour plus d'informations sur la configuration de Lifecycle Controller, la configuration du matériel et du micrologiciel et le déploiement du système d'exploitation, voir la documentation relative à Lifecycle Controller, disponible à l'adresse support.dell.com/manuals. Utilitaire de configuration iDRAC L'utilitaire de configuration iDRAC est une interface permettant d'installer et de configurer les paramètres iDRAC utilisant l'UEFI. Vous pouvez activer ou désactiver de nombreux paramètres iDRAC à l'aide de l'utilitaire de configuration iDRAC7, par exemple : REMARQUE: Certaines des fonctionnalités mentionnées dans la liste requièrent la mise à niveau de la licence iDRAC7 Enterprise. • Configurer, activer ou désactiver le réseau local iDRAC via le port dédié de la carte iDRAC Enterprise ou la carte réseau intégrée NIC • Activer ou désactiver IPMI sur le réseau local (LAN) • Activer une destination d'interruption d'événements sur plate-forme (PET) LAN • Connecter ou déconnecter les périphériques de média virtuel Pour obtenir plus d'informations sur l'utilisation d'iDRAC7, reportez-vous au guide d'utilisation iDRAC7 à l'adresse support.dell.com/manuals. Accès à l'utilitaire de configuration iDRAC 1. Activez ou redémarrez le système géré. 2. Appuyez sur pendant l'auto-test de démarrage (POST). 263. Sur la page System Setup Main Menu (Menu principal du système de configuration), cliquez sur iDRAC Settings (Paramètres iDRAC). La page iDRAC Settings (Paramètres iDRAC) s'affiche. 27283 Installation des composants des serveurs lames Outils recommandés Vous pouvez avoir besoin des outils suivants pour réaliser les procédures décrites dans cette section : • Tournevis cruciformes n°1 et n°2 • Tournevis Torx T8 et T10 • Bracelet antistatique Retrait et installation d'un serveur lame PRÉCAUTION: La plupart des réparations ne peuvent être effectuées que par un technicien de maintenance agréé. N'effectuez que les opérations de dépannage et les petites réparations autorisées par la documentation de votre produit et suivez les instructions fournies en ligne ou par téléphone par l'équipe de maintenance et d'assistance technique. Tout dommage causé par une réparation non autorisée par Dell est exclu de votre garantie. Consultez et respectez les consignes de sécurité fournies avec votre produit. Retrait du serveur lame 1. Mettez le serveur lame hors tension en utilisant les commandes du système d'exploitation ou le module CMC. Vérifiez que la mise hors tension a bien été effectuée. Lorsqu'un serveur lame est hors tension, le voyant d'alimentation situé sur son panneau avant est éteint. 2. Avant de retirer les serveurs lames mi-hauteur 11 ou 12, rabattez l'écran LCD afin qu'il ne soit endommagé accidentellement. 3. Appuyez sur le bouton d'éjection de la poignée. 4. Tirez la poignée pour dégager le serveur lame du châssis. 5. Faites glisser le serveur lame hors du châssis. PRÉCAUTION: Réinstallez le cache du connecteur d'E/S dès qu'un serveur lame est retiré du châssis afin d'éviter d'endommager les broches de ce connecteur. 6. Installez le cache du connecteur d'E/S. PRÉCAUTION: Si vous retirez de manière permanente le serveur lame, installez un cache. Une utilisation prolongée du système sans cache peut entraîner une surchauffe du châssis. 29Figure 3. Retrait ou installation d'un serveur lame 1. poignée 2. bouton de dégagement 3. serveur lame 4. rail de guidage sur le châssis 5. rail de guidage sur le serveur lame (ou le cache) Installation du serveur lame 1. Si vous installez un nouveau serveur lame, retirez les caches de plastique protégeant les connecteurs d'E/S et mettez-les de côté pour pouvoir les réutiliser en cas de besoin. 2. Orientez le serveur lame de sorte que la poignée se trouve sur son côté gauche. 3. Si vous installez un serveur lame mi-hauteur dans les baies 11 ou 12, rabattez l'écran LCD horizontalement afin qu'il ne soit endommagé accidentellement 4. Si vous installez un serveur lame mi-hauteur dans l'une des huit baies supérieures, alignez le rail de guidage situé sur son bord supérieur pour qu'il s'insère entre les guides en plastique du châssis. Si vous installez un serveur lame mi-hauteur dans l'une des huit baies inférieures, alignez le bord du serveur lame avec le rail de guidage situé sur le fond du châssis M1000e. 5. Insérez le serveur lame dans le châssis jusqu'à ce que la poignée se mette en place. 30Ouverture et fermeture d'un serveur lame Ouverture d'un serveur lame PRÉCAUTION: La plupart des réparations ne peuvent être effectuées que par un technicien de maintenance agréé. N'effectuez que les opérations de dépannage et les petites réparations autorisées par la documentation de votre produit et suivez les instructions fournies en ligne ou par téléphone par l'équipe de maintenance et d'assistance technique. Tout dommage causé par une réparation non autorisée par Dell est exclu de votre garantie. Consultez et respectez les consignes de sécurité fournies avec votre produit. REMARQUE: L'utilisation systématique d'un tapis et d'un bracelet antistatiques est recommandée pour manipuler les composants internes du système. 1. Retirez le serveur lame du châssis. 2. Installez le cache du connecteur d'E/S. 3. Appuyez sur le bouton d'éjection et faites glisser vers le fond du serveur lame. 4. Soulevez doucement le capot et retirez-le du serveur lame. Figure 4. Ouverture et fermeture d'un serveur lame 1. cache de connecteur d'E/S 2. capot du serveur lame 3. bouton d'éjection 4. plots et encoches d'alignement du capot 31Fermeture d'un serveur lame 1. Vérifiez que vous n'avez rien oublié à l'intérieur du serveur lame. 2. Alignez les encoches situées sur les bords du châssis avec les plots d'alignement qui se trouvent sur les faces internes du capot. 3. Abaissez le capot de manière à le placer dans le châssis. 4. Faites glisser le capot jusqu'à ce qu'il s'enclenche en position. Un capot correctement en place est au même niveau que la surface du châssis. À l'intérieur d'un serveur lame Figure 5. À l'intérieur d'un serveur lame 1. gestion de la carte de montage 2. carte mezzanine en option 1 - Circuit C 3. carte mezzanine en option 2 - Circuit B 4. carte fille réseau 5. barrettes de mémoire (pour le processeur 1) 6. processeur 1 et dissipateur de chaleur 7. carénage de refroidissement 8. barrettes de mémoire (pour le processeur 2) 9. fond de panier des disques durs 10. disques durs (2) 11. processeur 2 et dissipateur de chaleur 12. barrettes de mémoire (pour le processeur 2) 13. barrettes de mémoire (pour le processeur 1) Carénage de refroidissement Le carénage de refroidissement recouvre les barrettes de mémoire et assure la ventilation du système. 32Retrait du carénage de refroidissement PRÉCAUTION: La plupart des réparations ne peuvent être effectuées que par un technicien de maintenance agréé. N'effectuez que les opérations de dépannage et les petites réparations autorisées par la documentation de votre produit et suivez les instructions fournies en ligne ou par téléphone par l'équipe de maintenance et d'assistance technique. Tout dommage causé par une réparation non autorisée par Dell est exclu de votre garantie. Consultez et respectez les consignes de sécurité fournies avec votre produit. PRÉCAUTION: Ne mettez jamais le système sous tension sans le carénage de refroidissement. Le système peut surchauffer rapidement entraînant sa mise hors tension ainsi qu'une perte de données. 1. Retirez le serveur lame du châssis. 2. Ouvrez le serveur lame. 3. Maintenez le carénage de refroidissement par les deux extrémités à proximité du châssis du serveur lame puis soulevez et retirez-le du serveur lame. Figure 6. Installation et retrait du carénage de refroidissement 1. broches sous le carénage de refroidissement (2) 2. carénage de refroidissement 3. languettes (4) 4. trous sur le dissipateur de chaleur (2) 5. emplacements sur le châssis (4) 33Installation du carénage de refroidissement PRÉCAUTION: La plupart des réparations ne peuvent être effectuées que par un technicien de maintenance agréé. N'effectuez que les opérations de dépannage et les petites réparations autorisées par la documentation de votre produit et suivez les instructions fournies en ligne ou par téléphone par l'équipe de maintenance et d'assistance technique. Tout dommage causé par une réparation non autorisée par Dell est exclu de votre garantie. Consultez et respectez les consignes de sécurité fournies avec votre produit. 1. Placez les languettes sous le carénage afin de les aligner avec les trous du dissipateur de chaleur sur le support du processeur CPU1. 2. Abaissez le carénage de refroidissement dans le système jusqu'à ce que les languettes sur les côtés du carénage s'enclenchent dans les emplacements du châssis du serveur lame et que les broches situées sous le carénage s'enclenchent dans les trous du dissipateur de chaleur. 3. Fermez le serveur lame. 4. Installez le serveur lame dans le système. Mémoire système Votre système prend en charge des barrettes de mémoire DIMM ECC DDR3 sans tampon (ECC UDIM) et des barrettes DIMM à registres (RDIMM). Il prend en charge les spécifications de tension DDR3 et DDR3L. REMARQUE: MT/s indique la vitesse de la barrette DIM en méga-transferts par seconde. La fréquence de fonctionnement de bus mémoire peut être de 1 600 MT/s, 1 333 MT/s, 1 066 MT/s ou 800 MT/s selon : • le type de barrette DIMM (UDIMM ou RDIMM) • la configuration de la barrette DIMM (nombre de rangées) • la fréquence maximale des barrettes DIMM • le nombre de barrettes installées par canal • la tension de fonctionnement de la barrette DIMM • le profil système sélectionné (par exemple, Performance Optimized [Performance optimisée], Custom [Personnalisé] ou Dense Configuration Optimized [Configuration dense optimisée]) • la fréquence maximale de la barrette DIMM prise en charge des processeurs Le tableau suivant présente les installations de mémoire et les fréquences de fonctionnement pour les configurations prises en charge. Type de barrette de mémoire Barrettes installées/canal Fréquence de fonctionnement (en MT/s) Rangées de barrettes DIMM maximales/canal 1,5 V 1,35 V ECC UDIMM 1 1 333, 1 066 et 800 1 066 et 800 Double rangée 2 1 333, 1 066 et 800 1 066 et 800 Double rangée Barrette RDIMM 1 1 600, 1 333 et 1 066 1 333 et 1 066 Double rangée 2 1 600, 1 333 et 1 066 1 333 et 1 066 Double rangée 3 1 066 et 800 Non applicable Double rangée 34Le système est composé de 24 supports de mémoire divisés en deux ensembles de 12 supports, un ensemble par processeur. Chaque ensemble est organisé en 4 canaux. Dans chaque canal, les leviers d'éjection du premier support sont blancs, ceux du second support sont noirs et ceux du troisième support sont verts. REMARQUE: Les barrettes DIMM des supports A1 à A12 sont attribuées au processeur 1 et les barrettes DIMM des supports B1 à B12 sont attribuées au processeur 2. Figure 7. Emplacement des supports de mémoire Les canaux de mémoire sont répartis comme suit : Processeur 1 canal 0 : logements A2, A6 et A10 canal 1 : logements A1, A5 et A9 canal 2 : logements A4, A8 et A12 canal 3 : logements A3, A7 et A11 Processeur 2 canal 0 : logements B2, B6 et B10 canal 1 : logements B1, B5 et B9 canal 2 : logements B4, B8 et B12 canal 3 : logements B3, B7 et B11 Consignes générales pour l'installation des barrettes de mémoire REMARQUE: Les configurations de mémoire qui ne respectent pas ces consignes peuvent empêcher le système de démarrer ou toute sortie vidéo, la manipulation au cours de la configuration de la mémoire ou le fonctionnement avec une mémoire réduite. 35Ce système prend en charge la configuration de mémoire flexible, permettant une configuration et une exécution du système depuis n'importe quelle configuration architecturale d'un jeu de puces valide. Ci-dessous se trouvent les consignes recommandées pour obtenir des performances optimales : • Les barrettes UDIMM et RDIMM ne doivent pas être mélangées. • Les barrettes DIMM DRAM x4 et x8 peuvent être mélangées. Pour obtenir plus d'informations, reportez-vous aux consignes spécifiques à chaque mode. • Deux barrettes UDIMM peuvent être installées dans un canal. • Il est possible d'installer par canal jusqu'à deux barrettes RDIMM à quatre rangées et jusqu'à trois barrettes RDIMM à double ou à simple rangée. • Remplissez les supports de barrettes DIMM uniquement si un processeur est installé. Pour les systèmes à processeur unique, les supports A1 à A12 sont disponibles. Pour les systèmes à double processeur, les supports A1 à A12 et les supports B1 à B12 sont disponibles. • Remplissez tous les supports avec les pattes de dégagement blanches en premier, puis les pattes noires et enfin les vertes. • Ne remplissez pas le troisième support de barrettes de mémoire DIMM dans un canal avec des pattes de dégagement vertes si une barrette de mémoire RDIMM à quatre rangée se trouve dans le premier support avec les pattes de dégagement blanches. • Remplissez les supports par le nombre de rangées le plus élevé dans l'ordre suivant : tout d'abord les supports avec les pattes de dégagement blanches, puis les noires et enfin les vertes. Par exemple, si vous souhaitez mélanger des barrettes DIMM à quatre rangées et à double rangée, installez les barrettes DIMM à quatre rangées dans les supports avec pattes de dégagement blanches et les barrettes à double rangée dans les supports avec pattes de dégagement noires. • Dans une configuration à deux processeurs, la configuration de la mémoire pour chaque processeur doit être identique. Par exemple, si vous remplissez le support A1 pour le processeur 1, vous devez alors remplir le support B1 pour le processeur 2, etc. • Des barrettes de mémoire de différentes tailles peuvent être mélangées tant que les autres règles de population de mémoire sont respectées (par exemple, les barrettes de mémoire de 2 Go et de 4 Go peuvent être mélangées). • Installez quatre barrettes DIMM par processeur (une barrette DIMM par canal) à la fois pour maximiser les performances. • Si les barrettes de mémoire avec différentes vitesses sont installées, elles fonctionneront à la vitesse de la/des barrette(s) de mémoire installée(s) la/les plus lente(s) plus lentement selon la configuration de la configuration des barrettes DIMM sur le système. • Installez les barrettes DIMM selon les configurations du dissipateur de chaleur du processeur suivantes. Configuration du processeur

Adresses complètes sur CD ROM,  téléphone, Fax, emails, nom du dirigeant, etc. Exports illimités ! CLIQUEZ ICI