Intel Remote Management Module 4 and Integrated BMC Web Console User Guide
Intel Remote Management Module 4 and Integrated BMC Web Console User Guide
Intel Remote Management Module 4 and Integrated BMC Web Console User Guide
Revision 2.8
July 2014
Intel Server Boards and Systems Marketing
Revision History
Revision History
Date
ii
February 2011
Revision
Number
1.0
December 2011
2.0
December 2011
2.1
January 2012
2.2
March 2012
2.3
May 2012
2.4
August 2012
2.5
December 2012
2.6
July 2013
2.7
July 2014
2.8
Modifications
After second review. Screen captures updated.
Renamed document and added Intel Server Boards and Systems Based on
Intel Xeon Processor E5-4600/2600/2400/1600/1400 Product Families.
Update for new speed POR.
Added AXXRMM4R.
Added S1200V3RP.
Revision 2.8
Disclaimers
Disclaimers
INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE,
EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS IS GRANTED BY
THIS DOCUMENT. EXCEPT AS PROVIDED IN INTEL'S TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS,
INTEL ASSUMES NO LIABILITY WHATSOEVER AND INTEL DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY,
RELATING TO SALE AND/OR USE OF INTEL PRODUCTS INCLUDING LIABILITY OR WARRANTIES RELATING TO
FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY PATENT, COPYRIGHT OR
OTHER INTELLECTUAL PROPERTY RIGHT.
A "Mission Critical Application" is any application in which failure of the Intel Product could result, directly or
indirectly, in personal injury or death. SHOULD YOU PURCHASE OR USE INTEL'S PRODUCTS FOR ANY SUCH
MISSION CRITICAL APPLICATION, YOU SHALL INDEMNIFY AND HOLD INTEL AND ITS SUBSIDIARIES,
SUBCONTRACTORS AND AFFILIATES, AND THE DIRECTORS, OFFICERS, AND EMPLOYEES OF EACH, HARMLESS
AGAINST ALL CLAIMS COSTS, DAMAGES, AND EXPENSES AND REASONABLE ATTORNEYS' FEES ARISING OUT OF,
DIRECTLY OR INDIRECTLY, ANY CLAIM OF PRODUCT LIABILITY, PERSONAL INJURY, OR DEATH ARISING IN ANY
WAY OUT OF SUCH MISSION CRITICAL APPLICATION, WHETHER OR NOT INTEL OR ITS SUBCONTRACTOR WAS
NEGLIGENT IN THE DESIGN, MANUFACTURE, OR WARNING OF THE INTEL PRODUCT OR ANY OF ITS PARTS.
Intel may make changes to specifications and product descriptions at any time, without notice. Designers must not
rely on the absence or characteristics of any features or instructions marked "reserved" or "undefined". Intel
reserves these for future definition and shall have no responsibility whatsoever for conflicts or incompatibilities
arising from future changes to them. The information here is subject to change without notice. Do not finalize a
design with this information.
The products described in this document may contain design defects or errors known as errata which may cause
the product to deviate from published specifications. Current characterized errata are available on request.
Contact your local Intel sales office or your distributor to obtain the latest specifications and before placing your
product order.
Copies of documents which have an order number and are referenced in this document, or other Intel literature,
may be obtained by calling 1-800-548-4725, or go to: http://www.intel.com/design/literature.
Intel, Pentium, Itanium, and Xeon are trademarks or registered trademarks of Intel Corporation.
*Other brands and names may be claimed as the property of others.
Copyright Intel Corporation 2014. All rights reserved.
Revision 2.8
iii
Table of Contents
Table of Contents
1. Introduction ........................................................................................................................................ 1
1.1
1.2
Terminology ................................................................................................................................... 1
1.3
1.4
1.5
Warranty Information.................................................................................................................. 6
Intel RMM4 Lite and Intel Dedicated Server Management NIC ................................... 7
2.1.1
Intel Server Boards and Systems Based on Intel Xeon Processor
E5-4600/2600/2400/1600/1400 (V1&V2), S1200V3RP and S1200BTL Product Families . 7
2.1.2
Intel Server Boards and Systems Based on Intel Xeon Processor E5-2600 V3 --S2600WT, S2600KP, S2600TP and S2600CW .................................................................................... 8
2.2
2.3
2.3.1
Intel Server Boards and Systems Based on Intel Xeon Processor
E5-4600/2600/2400/1600/1400 (v1&v2), S1200V3RP and S1200BTL Product Families .. 9
2.3.2
Intel Server Boards and Systems Based on Intel Xeon Processor E5-2600 V3 --S2600WT, S2600KP, S2600TP and S2600CW ..................................................................................10
3. Hardware Installations and Initial Configuration .................................................................... 11
3.1
3.2
3.3
Installation ....................................................................................................................................11
3.3.1
3.3.2
Installation of the Intel Dedicated Server Management NIC on Intel Xeon
Processor E5-4600/2600/2400/1600/1400 (v1&v2), S1200V3RP and S1200BTL Product
Families 14
3.3.3
Intel Dedicated Server Management NIC on Intel Server Boards and Systems
Based on Intel Xeon Processor E5-2600 V3 --- S2600WT, S2600KP, S2600TP and
S2600CW ........................................................................................................................................................29
4. Configuring the Integrated BMC Web Console and Intel RMM4......................................... 32
4.1
Configuring the Server Management NIC using BIOS Setup on S1200BTL ............33
4.2
Configuring the Server Management NIC using BIOS Setup on Intel Server
Boards and Systems Based on Intel Xeon Processor E5-4600/2600/2400/1600/1400
(v1&v2) and S1200V3RP Product Families..............................................................................................34
4.3
Configuring the Server Management NIC using BIOS Setup on Intel Server
Boards and Systems Based on Intel Xeon Processor E5-2600 V3 --- S2600WT, S2600KP,
S2600TP and S2600CW ................................................................................................................................36
iv
Revision 2.8
4.4
(IDA)
Table of Contents
Configuring the Server Management NIC using the Intel Deployment Assistant
40
4.5
Configuring the Server Management NIC using the Intel System Configuration
Utility (SysConfig) .............................................................................................................................................49
4.5.1
4.5.2
4.5.3
5.2
Logging In......................................................................................................................................51
5.3
Navigation .....................................................................................................................................52
5.4
5.5
6.2
6.3
6.3.1
6.3.2
6.3.3
6.3.4
6.3.5
6.4
7.1.1
7.1.2
7.1.3
7.1.4
7.1.5
CPU Information Page on Intel Server Boards and Systems Based on Intel Xeon
Processor E5-4600/2600/2400/1600/1400 (v1&v2) Product Families and S1200V3RP
Product Family ..............................................................................................................................................77
7.1.6
7.2
7.2.1
7.2.2
7.2.3
Revision 2.8
Table of Contents
7.3
7.3.1
Configuration Tab.......................................................................................................................86
Network or IPv4 Network Page ..............................................................................................86
7.3.2
IPv6 Page on Intel Server Boards and Systems Based on Intel Xeon Processor
E5-4600/2600/2400/1600/1400 (v1&v2) Product Families, S1200V3RP and Intel Server
Boards and Systems Based on Intel Xeon Processor E5-2600 V3 --- S2600WT, S2600KP,
S2600TP and S2600CW ............................................................................................................................89
7.3.3
7.3.4
7.3.5
7.3.6
VLAN Page on Intel Server Boards and Systems Based on Intel Xeon Processor
E5-4600/2600/2400/1600/1400 (v1&v2) Product Families, S1200V3RP Product Family
and Intel Server Boards and Systems Based on Intel Xeon Processor E5-2600 V3 --S2600WT, S2600KP, S2600TP and S2600CW ..................................................................................96
7.3.7
7.3.8
7.3.9
7.3.10
7.3.11
7.3.12
7.3.13 Node Manager Power Polices Page on Intel Server Boards and Systems Based on
Intel Xeon Processor E5-4600/2600/2400/1600/1400 (v1&v2) Product Families and
S1200V3RP, Intel Server Boards and Systems Based on Intel Xeon Processor E5-2600
V3 --- S2600WT, S2600KP, S2600TP and S2600CW .................................................................. 116
7.4
7.4.1
7.4.2
7.4.3
Virtual Front Panel Page on Intel Server Boards and Systems Based on Intel
vi
Revision 2.8
List of Figures
List of Figures
Figure 1: Intel RMM4 Lite .................................................................................................................................... 7
Figure 2: Intel Dedicated Server Management NIC .................................................................................... 8
Figure 3: Installing the Intel RMM4 Lite on Intel Server Boards .........................................................13
Figure 4: Attaching the Bracket to the Intel Dedicated Server Management NIC Module ..........15
Figure 5: Attaching the Cable to the Intel Dedicated Server Management NIC Module ..............16
Figure 6: Adding the Intel Dedicated Server Management NIC Module in the Intel Server
System R1000BTL and R1000RP Families ..........................................................................................16
Figure 7: Adding the Intel Dedicated Server Management NIC Module in the Intel Server
System R2000IP Family .............................................................................................................................17
Figure 8: Adding the Intel Dedicated Server Management NIC Module in the Intel Server
System R2000LH2/R200LT2....................................................................................................................17
Figure 9: Adding the Intel Dedicated Server Management NIC Module in the Intel Server
System R1000BB and R2000BB Families, R1000SP Family, or R1000GZ/GL and
R2000GZ/GL Families .................................................................................................................................18
Figure 10: Adding the Intel Dedicated Server Management NIC Module in the Intel Server
System R1000EP Family ............................................................................................................................19
Figure 11: Attaching the Bracket to the Intel Dedicated Server Management NIC Module .......20
Figure 12: Installing the Intel Dedicated Server Management NIC Module in the Intel Server
System R2000FP Family or R2000SC Family .....................................................................................21
Figure 13: Attaching the Bracket to the Intel Dedicated Server Management NIC Module .......22
Figure 14: Adding the Intel Dedicated Server Management NIC Module in the Intel Server
System P4000BTL and P4000RP Families ..........................................................................................24
Figure 15: Adding the Intel Dedicated Server Management NIC Module in the Intel Server
System P4000CP Family, P4000FP Family, P4000GP Family, P4000SC Family, or P4000M
Chassis .............................................................................................................................................................24
Figure 16: Adding the Intel Dedicated Server Management NIC Module in the Intel Server
System P4000CR Family or P4000IP Family ......................................................................................25
Figure 17. Installation of P4000S and P4000M Chassis EMI Bracket Cover ....................................26
Figure 18. Installation of P4000L Chassis EMI Bracket Cover ...............................................................27
Figure 19: Attaching the Bracket to the Intel Dedicated Server Management NIC Module .......27
Figure 20: Mounting the Intel Dedicated Server Management NIC Module to the PCI Slot
Bracket .............................................................................................................................................................28
Revision 2.8
vii
List of Figures
Figure 21: Adding the Intel Dedicated Server Management NIC Module on a Third-party
Chassis .............................................................................................................................................................29
Figure 22: Intel Dedicated Server Management NIC on Intel Server S2600WT............................30
Figure 23: Intel Dedicated Server Management NIC on Intel Server S2600KP and S2600TP .31
Figure 24: Intel Dedicated Server Management NIC on Intel Server S2600CW ...........................31
Figure 25: Server Management BMC LAN Configuration on S1200BTL .........................................34
Figure 26: Server Management BMC LAN Configuration on Intel Server Boards and Systems
Based on Intel Xeon Processor E5-4600/2600/2400/1600/1400 (v1&v2) and
S1200V3RP Product Families ..................................................................................................................36
Figure 27: Server Management BMC LAN Configuration on PCSD Platforms Based on Intel
S2600WT, S2600KP, S2600TP and S2600CW Product Families ................................................38
Figure 28: Server Management User Configuration on PCSD Platforms Based on Intel
S2600WT, S2600KP, S2600TP and S2600CW Product Families ................................................39
Figure 29: IDA Configure Server: Communication Options Window ...................................................40
Figure 30: IDA Configure Server: Communication Options Window No Intel Dedicated Server
Management NIC Installed ........................................................................................................................41
Figure 31: IDA Configure Server: Configure LAN Channel 3 (Intel RMM4 DMN) IP Address from
a DHCP Server Window ..............................................................................................................................42
Figure 32: IDA Configure Server: Configure LAN Channel 3 (Intel RMM4 DMN) Static IP
Address Window...........................................................................................................................................43
Figure 33: IDA Configure Server: Set Up Users Window .........................................................................44
Figure 34: IDA Configure Server: Edit User Information Window.........................................................45
Figure 35: IDA Configure Server: Apply Configuration Window ...........................................................46
Figure 36: IDA Configure Server: Applying Configuration Progress Window ...................................47
Figure 37: IDA Configure Server: Restart Server ........................................................................................48
Figure 38: Internet Explorer 8* Displaying Encryption Key Length .....................................................50
Figure 39: Intel Integrated BMC Web Console Login Page....................................................................51
Figure 40: Integrated BMC Web Console Home Page ..............................................................................52
Figure 41: Launching the Online Help ...........................................................................................................54
Figure 42: Logging Out of Integrated BMC Web Console Step 1 ......................................................55
Figure 43: Logging Out of Integrated BMC Web Console Step 2 ......................................................55
Figure 44: Remote Control Console Redirection Page.............................................................................56
Figure 45: Remote Console ...............................................................................................................................57
Figure 46: Remote Console Main Window ...................................................................................................58
Figure 47: Remote Console Control Bar .......................................................................................................59
viii
Revision 2.8
List of Figures
ix
List of Figures
Figure 74: Server Health Event Log Page on Intel Server Boards and Systems Based on Intel
Xeon Processor E5-4600/2600/2400/1600/1400 (v1&v2) Product Families .......................82
Figure 75: Server Health Event Log Page on S1200V3RP and Intel Server Boards and Systems
Based on Intel Xeon Processor E5-2600 V3 --- S2600WT, S2600KP, S2600TP and
S2600CW ........................................................................................................................................................83
Figure 76: Server Health Power Statistics Page on S1200BTL, S1200V3RP and Intel Server
Boards and Systems Based on Intel Xeon Processor E5-2600 V3 --- S2600WT, S2600KP,
S2600TP and S2600CW ............................................................................................................................84
Figure 77: Server Health Power Statistic Page on Intel Server Boards and Systems Based on
Intel Xeon Processor E5-4600/2600/2400/1600/1400 (v1&v2) Product Families ............85
Figure 78: Configuration Network Settings Page on S1200BTL Platforms ......................................86
Figure 79: Configuration IPv4 Network Settings Page .............................................................................87
Figure 80: Configuration IPv6 Page ................................................................................................................89
Figure 81: Configuration User List Page .......................................................................................................91
Figure 82: Configuration Users Add User Page ..........................................................................................92
Figure 83: Configuration Users Modify User Page.....................................................................................92
Figure 84: Configuration Login Security Settings Page on S1200BTL Platforms ...........................93
Figure 85: Configuration Login Security Settings Page on Intel Server Boards and Systems
Based on Intel Xeon Processor E5-4600/2600/2400/1600/1400 (v1&v2) Product
Families, S1200V3RP Product Family and Intel Server Boards and Systems Based on Intel
Xeon Processor E5-2600 V3 --- S2600WT, S2600KP, S2600TP and S2600CW ..................94
Figure 86: Configuration LDAP Settings Page.............................................................................................95
Figure 87: Configuration VLAN Settings on Intel Server Boards and Systems Based on Intel
Xeon Processor E5-4600/2600/2400/1600/1400 (v1&v2) Product Families, S1200V3RP
and Intel Server Boards and Systems Based on Intel Xeon Processor E5-2600 V3 --S2600WT, S2600KP, S2600TP and S2600CW Product Family ..................................................96
Figure 88: Configuration SSL Upload Page..................................................................................................98
Figure 89: Configuration Remote Session Page on S1200BTL Platforms.........................................99
Figure 90: Configuration Remote Session Page on Intel Server Boards and Systems Based on
Intel Xeon Processor E5-4600/2600/2400/1600/1400 (v1&v2) Product Families ......... 100
Figure 91: Configuration Remote Session Page on S1200V3RP Product Family ........................ 102
Figure 92: Configuration Remote Session Page on Intel Server Boards and Systems Based on
Intel Xeon Processor E5-2600 V3 --- S2600WT, S2600KP, S2600TP and S2600CW .... 104
Figure 93: Configuration Mouse Mode Setting Page on S1200BTL Platforms ............................. 105
Revision 2.8
List of Figures
Figure 94: Configuration Mouse Mode Setting Page on Intel Server Boards and Systems Based
on Intel Xeon Processor E5-4600/2600/2400/1600/1400 (v1&v2) Product Families and
S1200V3RP Product Family .................................................................................................................. 106
Figure 95: Configuration Mouse Mode Setting Page on Intel Server Boards and Systems Based
on Intel Xeon Processor E5-2600 V3 --- S2600WT, S2600KP, S2600TP and S2600CW108
Figure 96: KVM Window with Mouse Other Mode Selected on Intel Server Boards and
Systems Based on Intel Xeon Processor E5-4600/2600/2400/1600/1400 (v1&v2)
Product Families and S1200V3RP Product Family ........................................................................ 109
Figure 97: Configuration Keyboard Macros Page ................................................................................... 110
Figure 98: Configuration Alerts Page on S1200BTL Platforms .......................................................... 112
Figure 99: Configuration Alerts Page on Intel Server Boards and Systems Based on Intel
Xeon Processor E5-4600/2600/2400/1600/1400 (v1&v2) Product Families, S1200V3RP
and Intel Server Boards and Systems Based on Intel Xeon Processor E5-2600 V3 --S2600WT, S2600KP, S2600TP and S2600CW ............................................................................... 113
Figure 100: Configuration Alert Email Page ............................................................................................. 115
Figure 101: Configuration Node Manager Page on Intel Server Boards and Systems Based on
Intel Xeon Processor E5-4600/2600/2400/1600/1400 (v1&v2) Product Families,
S1200V3RP and Intel Server Boards and Systems Based on Intel Xeon Processor E52600 V3 --- S2600WT, S2600KP, S2600TP and S2600CW ....................................................... 116
Figure 102: Configuration Node Manager Page with Use Policy Suspend Period Selected..... 118
Figure 103: Remote Control Console Redirection Page ....................................................................... 119
Figure 104: Remote Control Server Power Control Page on S1200BTL Platforms .................... 120
Figure 105: Remote Control Server Power Control Page on Intel Server Boards and Systems
Based on Intel Xeon Processor E5-4600/2600/2400/1600/1400 (v1&v2) Product
Families......................................................................................................................................................... 121
Figure 106: Remote Control Server Power Control Page on S1200V3RP and Intel Server
Boards and Systems Based on Intel Xeon Processor E5-2600 V3 --- S2600WT, S2600KP,
S2600TP and S2600CW ......................................................................................................................... 122
Figure 107: Remote Control Virtual Front Panel Page on Intel Server Boards and Systems
Based on Intel Xeon Processor E5-4600/2600/2400/1600/1400 (v1&v2) Product
Families, S1200V3RP and Intel Server Boards and Systems Based on Intel Xeon
Processor E5-2600 V3 --- S2600WT, S2600KP, S2600TP and S2600CW ........................... 123
Revision 2.8
xi
List of Tables
List of Tables
Table 1: Terminology ............................................................................................................................................ 1
Table 2: Intel Server Boards RMM4 Lite Connector Locations.............................................................12
Table 3: Intel Rack Server Systems Intel Dedicated Server Management NIC Connector
Locations .........................................................................................................................................................14
Table 4: Intel Multi Node Server Systems ...................................................................................................21
Table 5: Intel Rack Optimized Server Systems..........................................................................................22
Table 6: Intel Pedestal Server Systems Chassis Mounted Intel Dedicated Server
Management NIC Connector Locations ................................................................................................23
Table 7: Intel Pedestal Server Systems with Chassis Mounted Intel Dedicated Server
Management NIC Installation of EMI Bracket Cover ......................................................................26
Table 8: Intel Server Boards RMM4 NIC Connectors ...............................................................................29
Table 9: Integrated BMC Web Console Home Page Tabs .......................................................................52
Table 10: Horizontal Toolbar Buttons ...........................................................................................................53
Table 11: System Information Details ...........................................................................................................67
Table 12: Server Health Sensor Readings Options ...................................................................................80
Table 13: Server Health Event Log Options on S1200BTL Platforms ................................................81
Table 14: Configuration IPv4 Network Settings Options ........................................................................87
Table 15: Configuration IPv6 Network Settings Options ........................................................................90
Table 16: Configuration LDAP Settings Options ........................................................................................95
Table 17: Configuration VLAN Settings Options........................................................................................97
Table 18: Configuration Remote Session Options ....................................................................................99
Table 19: Configuration Remote Session Options ................................................................................. 101
Table 20: Configuration Remote Session Options on S1200V3RP Product Family ................... 102
Table 21: Configuration Remote Session Options ................................................................................. 104
Table 22: Macro Non-printable Key Names ............................................................................................. 111
Table 23: Configuration Alerts Options ..................................................................................................... 112
Table 24: Configuration Alert Email Options ........................................................................................... 115
Table 25: Configuration Node Manager Options .................................................................................... 116
Table 26: Remote Control Power Control Options on S1200BTL Platforms ................................ 120
Table 27: Remote Control Power Control Options on Intel Server Boards and Systems Based
on Intel Xeon Processor E5-4600/2600/2400/1600/1400 (v1&v2) Product Families ... 121
Table 28: Remote Control Power Control Options on S1200V3RP Product Family .................. 122
Table 29: Remote Control Virtual Front Panel Options........................................................................ 123
xii
Revision 2.8
1.
Introduction
Introduction
This User Guide describes how to use the Intel Remote Management Module 4 (Intel RMM4)
and the Integrated BMC Web Console. It provides an overview of the features of the Web
Console and the RMM4 module along with instructions on how to set up and operate the Intel
RMM4.
The Intel Integrated BMC Web Console provides both exceptional stability and permanent
availability independent of the present state of the servers operating system. As a system
administrator, you can use the Intel Integrated BMC Web Console to gain locationindependent remote access to respond to critical incidents and to undertake necessary
maintenance.
Designed to work with the Baseboard Management Controller (BMC), the Intel RMM4 is a
small form-factor mezzanine card that enables remote KVM (Keyboard, Video, and Mouse)
and media redirection on your server system, from the built-in Web Console, from anywhere,
at any time.
1.1
Target Audience
This User Guide is intended for system technicians who are responsible for monitoring their
server systems with the Intel Integrated BMC Web Console. As a system administrator, you
can use the Intel Integrated BMC Web Console to gain location-independent remote access to
respond to critical incidents. You can use the Intel RMM4 to install, update, and monitor your
operating system.
1.2
Terminology
The following table lists the terminology used in this document and the description.
Table 1: Terminology
Word/Acronym
Definition
ARP
BMC
DHCP
DNS
EWS
ICMP
Intel ASMI
Intel RMM4
IPMI
KVM
LAN
Revision 2.8
Introduction
Word/Acronym
1.3
Definition
LDAP
MAC
MII
NIC
OOB
SDR
TCP/IP
UDP
Safety Information
WARNING
Before working with your Intel RMM4 server product whether you are using this guide or
any other resource as a reference pay close attention to the safety instructions. You must
adhere to the assembly instructions in this guide to ensure and maintain compliance with
existing product certifications and approvals. Use only the described regulated
components specified in this guide. Use of other products/components will void the UL
listing and other regulatory approvals of the product and will most likely result in
noncompliance with product regulations in the region(s) in which the product is sold.
WARNINGS
System power on/off: The server power button DOES NOT turn off the system power or
Intel RMM4 power. To remove power from the Intel RMM4 you must unplug the server AC
power cord from the wall outlet. Make sure the AC power cord is unplugged before you
open the chassis to add or remove the Intel RMM4.
Hazardous conditions, devices and cables: Hazardous electrical conditions may be
present on power, telephone, and communication cables. Turn off the server and
disconnect the power cord, telecommunications systems, networks, and modems attached
to the server before opening it. Otherwise, personal injury or equipment damage can
result.
Electrostatic discharge (ESD) and ESD protection: ESD can damage disk drives, boards,
and other parts. We recommend that you perform all procedures in this chapter only at an
ESD workstation. If one is not available, provide some ESD protection by wearing an
antistatic wrist strap attached to chassis groundany unpainted metal surfaceon your
server when handling parts.
ESD and handling boards: Always handle boards carefully. They can be extremely
sensitive to ESD. Hold boards only by their edges. After removing a board from its
protective wrapper or from the server, place the board component side up on a grounded,
static free surface. Use a conductive foam pad if available but not the board wrapper. Do
not slide board over any surface.
Installing or removing jumpers: A jumper is a small plastic encased conductor that slips
2
Revision 2.8
Introduction
over two jumper pins. Some jumpers have a small tab on top that you can grip with your
fingertips or with a pair of fine needle nosed pliers. If your jumpers do not have such a tab,
take care when using needle nosed pliers to remove or install a jumper; grip the narrow
sides of the jumper with the pliers, never the wide sides. Gripping the wide sides can
damage the contacts inside the jumper, causing intermittent problems with the function
controlled by that jumper. Take care to grip with, but not squeeze, the pliers or other tools
you use to remove a jumper, or you may bend or break the pins on the board.
Safety Cautions
Read all caution and safety statements in this document before performing any of the
instructions. See also Intel Server Boards and Server Chassis Safety Information at
http://www.intel.com/support/motherboards/server/sb/cs-010770.htm.
SAFETY STEPS: Whenever you remove the chassis covers to access the inside of the
system, follow these steps:
1.
2.
3.
Unplug all AC power cords from the system or from wall outlets.
4.
Label and disconnect all cables connected to I/O connectors or ports on the back
of the system.
5.
6.
A microprocessor and heat sink may be hot if the system has been running. Also, there may
be sharp pins and edges on some board and chassis parts. Contact should be made with
care. Consider wearing protective gloves.
Wichtige Sicherheitshinweise
Lesen Sie zunchst smtliche Warn- und Sicherheitshinweise in diesem Dokument, bevor Sie
eine der Anweisungen ausfhren. Beachten Sie hierzu auch die Sicherheitshinweise zu IntelServerplatinen und -Servergehusen auf der Ressourcen-CD oder unter
http://www.intel.com/support/motherboards/server/sb/cs-010770.htm.
SICHERHEISMASSNAHMEN: Immer wenn Sie die Gehuseabdeckung abnehmen um an
das Systeminnere zu gelangen, sollten Sie folgende Schritte beachten:
Revision 2.8
1.
2.
3.
4.
Auf der Rckseite des Systems beschriften und ziehen Sie alle Anschlukabel von
den I/O Anschlssen oder Ports ab.
5.
Introduction
vermeiden.
6.
Schalten Sie das System niemals ohne ordnungsgem montiertes Gehuse ein.
Der Mikroprozessor und der Khler sind mglicherweise erhitzt, wenn das System in
Betrieb ist. Auerdem knnen einige Platinen und Gehuseteile scharfe Spitzen und
Kanten aufweisen. Arbeiten an Platinen und Gehuse sollten vorsichtig ausgefhrt werden.
Sie sollten Schutzhandschuhe tragen.
Resource CD
/ http://www.intel.com/support/motherboards/server/sb/cs-010770.htm Intel
Server Boards and Server Chassis Safety InformationIntel
Consignes de scurit
Lisez attention toutes les consignes de scurit et les mises en garde indiques dans ce
document avant de suivre toute instruction. Consultez Intel Server Boards and Server Chassis
Safety Information sur le CD Resource CD ou bien rendez-vous sur le site
http://www.intel.com/support/motherboards/server/sb/cs-010770.htm
CONSIGNES DE SCURIT -Lorsque vous ouvrez le botier pour accder lintrieur du
systme, suivez les consignes suivantes:
1.
2.
3.
Dbranchez tous les cordons dalimentation c.a. du systme et des prises murales.
4.
Identifiez et dbranchez tous les cbles relis aux connecteurs dE-S ou aux accs
derrire le systme.
5.
6.
Revision 2.8
1.
Introduction
2.
3.
4.
Identifique y desconecte todos los cables enchufados a los conectores E/S o a los
puertos situados en la parte posterior del sistema.
5.
6.
AVVERTENZA: Italiano
PASSI DI SICUREZZA: Qualora si rimuovano le coperture del telaio per accedere allinterno
del sistema, seguire i seguenti passi:
1.
2.
3.
Togliere tutte le spine dei cavi del sistema dalle prese elettriche.
4.
5.
6.
1.4
Support Information
If you encounter an issue with your Intel RMM4, follow these steps to obtain support:
1. Visit the following Intel Support website at http://www.intel.com/p/en_US/support.
This web page provides 24x7 support when you need to get the latest and most
complete technical support information on all Intel Enterprise Server and Storage
Platforms. Information available at the support site includes:
Revision 2.8
Introduction
Server and chassis accessory parts list for ordering upgrades or spare parts.
2. If you are still unable to obtain a solution for your issue, you can contact Intel customer
support at the following website: http://www.intel.com/support/feedback.htm.
1.5
Warranty Information
Revision 2.8
2.
This section gives you an overview of the Intel RMM4 and highlights significant benefits of its
features.
2.1
2.1.1
The Intel RMM4 is comprised of up to two boards Intel RMM4 Lite and the optional Intel
Dedicated Server Management NIC (DMN).
The Intel RMM4 Lite is a small board that unlocks advanced KVM and remote media
management features on the RGMII interface when installed on Intel Server Boards. It
provides an increased level of manageability over the basic server management available to
the server board. It works as an integrated solution on your server system.
After the Intel RMM4 Lite has been installed, the advanced management features are
available through both the optional Intel Dedicated Server Management NIC, if installed, and
all of the on-board Integrated BMC-shared NIC ports.
If the optional Intel Dedicated Server Management NIC is installed, the NIC is dedicated to the
Intel RMM4 advanced management features traffic along with all other standard server
management traffic. The host system is unaware of this NIC.
If the optional Intel Dedicated Server Management NIC is not used, the traffic can go through
any of the on-board Integrated BMC-shared NIC ports and will share network bandwidth with
the host system.
Revision 2.8
2.1.2
These platforms have a Dedicated Server Management NIC (DMN) on-board so only the Intel
RMM4 Lite is required to access the advanced management features.
The Intel RMM4 Lite is a small board that unlocks advanced management features on the
RGMII interface when installed on Intel Server Boards. It provides an increased level of
manageability over the basic server management available to the server board. It works as an
integrated solution on your server system. (Refer to Figure 1: Intel RMM4 Lite)
After the Intel RMM4 Lite has been installed, the advanced management features are
available through both on-board Intel Dedicated Server Management NIC, and all of the onboard Integrated BMC-shared NIC ports.
2.2
The Intel RMM4 add-on offers convenient, remote KVM access and control through LAN or
Internet. It captures, digitizes, and compresses video and transmits it with keyboard and
mouse signals to and from a remote computer. Remote access and control software runs in
the Integrated Baseboard Management Controller, utilizing expanded capabilities enabled by
the Intel RMM4 hardware.
Key features of the Intel RMM4 add-on card are:
KVM redirection from either the RMM4 NIC or the baseboard NIC used for
management traffic; up to two simultaneous KVM sessions.
Revision 2.8
2.3
The Intel RMM4 enables Java* based Remote Console (KVM) and media connections. During
Remote Console connections the keyboard, video, and mouse of the console system operate
as if you were at the server where the Intel RMM4 is connected. The Intel RMM4 has been
validated using the operating systems listed in the following sub sections.
2.3.1
2.3.1.1
Server System
Refer to the platform supported OS list for the current list of OSes supported on the managed
server. The following operating systems were supported at the time of the writing of this
document.
2.3.1.2
Client System
Revision 2.8
2.3.2
2.3.2.1
Refer to the platform supported OS list for the current list of OSes supported on the managed
server. The following operating systems were supported at the time of the writing of this
document.
Microsoft Windows Server 2008* R2 SP1
Microsoft Windows Server 2012* R2
Red Hat* Enterprise Linux 6.5 x64
Red Hat* Enterprise Linux 7.0 x64
SUSE* Enterprise Linux 11 SP3 x64
SUSE* Enterprise Linux 12 x64
VMware ESXi 5.5U1
CentOS 6.5
CentOS 7.0
Ubuntu 14.04
2.3.2.2
Client System
10
Revision 2.8
3.
This section guides you on the hardware installations and initial configuration.
3.1
Carefully read the Safety Information provided at the beginning of this manual before working
with your server product.
3.2
3.3
Installation
1) For Intel Server Boards and Systems Based on Intel Xeon Processor
E5-4600/2600/2400/1600/1400 (v1&v2), S1200V3RP and S1200BTL Product
Families, the Intel RMM4 has multiple packages:
Revision 2.8
11
RMM4 Rack Optimized edition (A1UJPRMM4IOM) for Intel Server Boards S1600JP
which contains the following components (Note: For advanced management features
functionality, this also requires the AXXRMM4LITE to be added):
o A PCI Express* rIOM riser
o A rIOM carrier board to provide a Dedicated RMM4 NIC port and a connector
supporting the Intel I/O modules
o Associated mounting hardware (screws, standoff, and brackets)
2) For Intel Server Boards and Systems Based on Intel Xeon Processor E5-2600 V3 --S2600WT, S2600KP, S2600TP and S2600CW , the Intel RMM4 has only one package:
The installation will vary between the chassis configurations. The following sections provide
installation instructions.
Caution: Intel RMM4 Lite and RMM4 DMN are NOT hot-swappable. Before removing or
replacing them, you must follow these steps:
1. First take the server out of service.
2. Turn off the system by pressing the power button.
3. Unplug the AC power cord from the system or wall outlet.
4. Wait for at least 10 seconds before installing the module.
12
Revision 2.8
S1200V3RPL S1200V3RPO
S1200V3RPM
J4B1
S2400BB
J3A2
S1400FP
J3D1
S1400SP
J4D2
S1600JP2/S1600JP4
J6A2
S2400EP
J1E1
S2400GP
J2B3
S2400LP
J7F2
S2400SC
J3D1
S2600CO
J1B1
S2600CP
J1B2
S2600GZ/S2600GL
J3B2
S2600IP
J2B1
S2600JF
J1A2
S2600WP
J1A2
S4600LH2/S4600LT2
J44
W2600CR
J2B1
S2600KP
J12
S2600WT
J2B2
S2600TP
J1A2
S2600CW
J1C1
13
3.3.2
For Intel Server Boards and Systems Based on Intel Xeon Processor
E5-4600/2600/2400/1600/1400 (v1&v2), S1200V3RP and S1200BTL Product Families, the
Intel Dedicated Server Management NIC module need to be installed.
The installation will vary between the chassis configurations. The following sections provide
installation instructions.
Installation of the Intel Dedicated Server Management NIC on an Intel Rack
Server System
3.3.2.1
Most Intel Rack Server Systems allow the Intel Dedicated Server Management NIC module to
be mounted to the chassis. Table 3 lists all Intel Rack Server Systems that support a chassis
mounted Intel Dedicated Server Management NIC module. Use the following steps when
installing the Intel Dedicated Server Management NIC module on those server systems:
Note: For the next steps see your specific Intel Server Systems Technical Product Specification
and Intel Server Systems Service Guide for more details. Table 3 lists the section and figure
describing the installation for that specific system.
Table 3: Intel Rack Server Systems Intel Dedicated Server Management NIC Connector Locations
Intel Server
System
Section
Figure
J5C1
Yes
3.3.2.1.1
Figure 6
J3B2
No
3.3.2.1.2
Figure 9
R1000EP Family
J2B1
No
3.3.2.1.3
Figure 10
R1000RP Family
J5C1
Yes
3.3.2.1.1
Figure 6
R1000SP Family
J3B2
No
3.3.2.1.2
Figure 9
R2000FP Family
J1D2
3.3.2.1.4
Figure 12
R2000IP Family
J3A1
Yes
3.3.2.1.1
Figure 7
J53
No
3.3.2.1.1
Figure 8
R2000SC Family
J1C7
3.3.2.1.4
Figure 12
R1000GZ/GL Family
R2000GZ/GL Family
J2A1
No
3.3.2.1.2
Figure 9
R1000BTL Family
R1000BB Family
R2000BB Family
R2000LH2/R200LT2
3.3.2.1.1
1. Ensure that AC power has been removed from the system and that you have waited at
least 30 seconds after removing power.
14
Revision 2.8
2. Push out and remove the metal cover on the chassis where the NIC RJ-45 receptacle will
align.
Caution: Carefully remove the metal cover with pliers; directly removing it with fingers has
a potential risk.
3. Attach the metal fastening bracket to the Intel Dedicated Server Management NIC module
as shown in Figure 4.
Figure 4: Attaching the Bracket to the Intel Dedicated Server Management NIC Module
4. Attach the cable to the cable connector on the Intel Dedicated Server Management NIC
module as shown in Figure 5.
Caution: Take care when attaching or removing this cable. Mishandling the cable could
cause damage.
Revision 2.8
15
Figure 5: Attaching the Cable to the Intel Dedicated Server Management NIC Module
5. Attach the cable to the cable connector on the Intel Dedicated Server Management NIC
module. Mount the NIC module to the back of the chassis and secure the metal fastening
bracket with two screws. This will align the RJ-45 with the opening in the chassis. Attach
the cable to the RMM4 NIC connector, as specified in Table 3, on the server board.
Caution: Take care when attaching or removing this cable. Mishandling the cable could
cause damage.
Figure 6: Adding the Intel Dedicated Server Management NIC Module in the Intel Server System
R1000BTL and R1000RP Families
16
Revision 2.8
Figure 7: Adding the Intel Dedicated Server Management NIC Module in the Intel Server System
R2000IP Family
Figure 8: Adding the Intel Dedicated Server Management NIC Module in the Intel Server System
R2000LH2/R200LT2
Revision 2.8
17
3.3.2.1.2
Installing the Dedicated NIC on Intel Server System R1000BB and R2000BB
Families, R1000SP Family, or R1000GZ/GL and R2000GZ/GL Families
1. Ensure that AC power has been removed from the system and that you have waited at
least 30 seconds after removing power.
2. Push out and remove the metal cover on the chassis where the NIC RJ-45 receptacle will
align.
Caution: Carefully remove the metal cover with pliers; directly removing it with fingers has
a potential risk.
3. Mount the NIC module to the Intel Server System board and secure it to the standoffs
with two screws.
Figure 9: Adding the Intel Dedicated Server Management NIC Module in the Intel Server System
R1000BB and R2000BB Families, R1000SP Family, or R1000GZ/GL and R2000GZ/GL Families
4. Replace the chassis cover, attach the AC power, and connect a network cable to the Intel
Dedicated Server Management NIC module.
18
Revision 2.8
3.3.2.1.3
1. Ensure that AC power has been removed from the system and that you have waited at
least 30 seconds after removing power.
2. Push out and remove the metal cover on the chassis where the NIC RJ-45 receptacle will
align.
Caution: Carefully remove the metal cover with pliers; directly removing it with fingers has
a potential risk.
3. Insert and fit the metal adapter into the position as shown in Figure 10. Secure the adapter
with two screws as shown (see letter B).
4. Position the module over the server board, fit the front of the module into the back panel
slot, and then attach the module to the server board connector. Secure the module with
the one screw as shown (see letter C).
Figure 10: Adding the Intel Dedicated Server Management NIC Module in the Intel Server System
R1000EP Family
Revision 2.8
19
3.3.2.1.4
1. Ensure that AC power has been removed from the system and that you have waited at
least 30 seconds after removing power.
2. Attach the metal fastening bracket to the Intel Dedicated Server Management NIC module.
Figure 11: Attaching the Bracket to the Intel Dedicated Server Management NIC Module
3. Remove the Filler Panel and Retention Device. See A in Figure 12.
4. Secure the metal fastening bracket with the NIC module to the PCI slot bracket with two
screws as shown in B of Figure 12. This will align the RJ-45 with the opening in the PCI slot
bracket.
5. Fasten the bracket with one screw as shown in C of Figure 12.
20
Revision 2.8
Figure 12: Installing the Intel Dedicated Server Management NIC Module in the Intel Server
System R2000FP Family or R2000SC Family
6. Connect one end of the cable to the connector on the Intel Dedicated Server Management
NIC module as shown in D of Figure 12.
7. Connect the opposite end of the cable to the Intel Dedicated Server Management NIC
connector on the Server board as shown in E of Figure 12.
3.3.2.2
The Intel Multi Node Server Systems have unique Intel Dedicated Server Management NIC
solutions. The NIC is located on the rIOM carrier modules. See your specific Intel Server
System Technical Product Specification (TPS) and Server Guides for details. These Intel Multi
Node Systems are listed in Table 4.
Table 4: Intel Multi Node Server Systems
Intel Server System
H2000JF
H2000LP
H2000WP
3.3.2.3
The Intel Rack Optimized Server Systems have unique Intel Dedicated Server Management
NIC solutions. The NIC is located on the rIOM carrier modules. See your specific Intel Server
System Technical Product Specification (TPS) and Server Guides for details. These Intel Rack
Optimized Server Systems are listed in Table 5.
Revision 2.8
21
3.3.2.4
Most Intel Pedestal Server Systems allow the Intel Dedicated Server Management NIC
module to be mounted to the chassis. Table 6 lists all Intel Pedestal Server Systems that
support a chassis mounted Intel Dedicated Server Management NIC module. Use the
following steps when installing the Intel Dedicated Server Management NIC module on those
server systems:
1. Ensure that AC power has been removed from the system and that you have waited at
least 10 seconds after removing power.
2. Attach the metal fastening bracket to the Intel Dedicated Server Management NIC module.
Figure 13: Attaching the Bracket to the Intel Dedicated Server Management NIC Module
Note: For the next two steps see your specific Intel Server Systems Technical Product
Specification and Intel Server Systems Service Guide for more details. Table 6 lists the figure
showing the installation for that specific system.
3. Push out and remove the metal cover on the chassis where the NIC RJ-45 receptacle will
align.
Caution: Carefully remove the metal cover with pliers; directly removing it with fingers has
a potential risk.
22
Revision 2.8
4. Attach the cable to the cable connector on the Intel Dedicated Server Management NIC
module. Mount the NIC module to the back of the chassis and secure the metal fastening
bracket with two screws. This will align the RJ-45 with the opening in the chassis. Attach
the cable to the RMM4 NIC connector, as specified in Table 6, on the server board.
Caution: Take care when attaching or removing this cable. Mishandling the cable could
cause damage.
Table 6: Intel Pedestal Server Systems Chassis Mounted Intel Dedicated Server Management NIC
Connector Locations
Intel Server
System
Revision 2.8
Figure
P4000BTL Family
J5C1
Figure 14
P4000CR Family
J3A1
Figure 16
P4000CP Family
J1C7
Figure 15
P4000FP Family
J1D2
Figure 15
P4000GP Family
J1B2
Figure 15
P4000IP Family
J3A1
Figure 16
P4000RP Family
J5C1
Figure 14
P4000SC Family
J1C7
Figure 15
S2400GP/P4000M Chassis
J1B2
Figure 15
S2400SC/P4000M Chassis
J1C7
Figure 14
S2600CO/P4000M Chassis
J1B3
Figure 15
S2600CP/P4000M Chassis
J1C1
Figure 15
23
Figure 14: Adding the Intel Dedicated Server Management NIC Module in the Intel Server System
P4000BTL and P4000RP Families
Figure 15: Adding the Intel Dedicated Server Management NIC Module in the Intel Server System
P4000CP Family, P4000FP Family, P4000GP Family, P4000SC Family, or P4000M Chassis
24
Revision 2.8
Figure 16: Adding the Intel Dedicated Server Management NIC Module in the Intel Server System
P4000CR Family or P4000IP Family
Revision 2.8
25
5. Add the EMI bracket cover using the two thumb screws as shown in Figure 17 or Figure 18
per Table 7.
Table 7: Intel Pedestal Server Systems with Chassis Mounted Intel Dedicated Server Management
NIC Installation of EMI Bracket Cover
Intel Server
System
Figure
P4000BTL Family
Figure 17
P4000CR Family
Figure 18
P4000CP Family
Figure 17
P4000FP Family
Figure 17
P4000GP Family
Figure 17
P4000IP Family
Figure 18
P4000SC Family
Figure 17
P4000M Chassis
Figure 17
P4000S Chassis
Figure 17
Figure 17. Installation of P4000S and P4000M Chassis EMI Bracket Cover
26
Revision 2.8
6. Replace the chassis cover, attach the AC power, and connect a network cable to the Intel
Dedicated Server Management NIC module.
3.3.2.5
Use the following steps when installing the Intel Dedicated Server Management NIC module
on a Third-party pedestal chassis:
1. Ensure that AC power has been removed from the system and that you have waited at
least 10 seconds after removing power.
2. Attach the metal fastening bracket to the Intel Dedicated Server Management NIC module.
Figure 19: Attaching the Bracket to the Intel Dedicated Server Management NIC Module
Revision 2.8
27
3. Secure the metal fastening bracket with the NIC module to the PCI slot bracket with two
screws as shown in Figure 20. This will align the RJ-45 with the opening in the PCI slot
bracket.
Figure 20: Mounting the Intel Dedicated Server Management NIC Module to the PCI Slot Bracket
4. Attach the cable to the cable connector on the Intel Dedicated Server Management NIC
module as shown in Figure 21 (A).
5. Mount the PCI slot bracket with the NIC module to the third-party chassis and secure the
PCI slot bracket with the screw as shown in Figure 15 (B).
6. Attach the cable to the RMM4 NIC connector (J5C1) on the server board as shown in Figure
21 (C).
Caution: Take care when attaching or removing this cable. Mishandling the cable could
cause damage.
28
Revision 2.8
Figure 21: Adding the Intel Dedicated Server Management NIC Module on a Third-party Chassis
Table 8: Intel Server Boards RMM4 NIC Connectors
Intel Server
Board
S1200BTL
J5C1
S2400BB
J3B2
S1400FP
J1D2
S1400SP
J3B2
S2400EP
J2B1
S2400GP
J1B2
S2400SC
J1C7
S2600CO
J1B3
S2600CP
J1C1
S2600GZ/S2600GL
J2A1
S2600IP
J3A1
S4600LH2/S4600LT2
W2600CR
J53
J3A1
3.3.3
For Intel Server Boards and Systems Based on Intel Xeon Processor E5-2600 V3 --S2600WT, S2600KP, S2600TP and S2600CW, the Intel Dedicated Server Management NIC
Revision 2.8
29
has been built on-board. User does not need to install Intel Dedicated Server Management
NIC module manually.
The Intel Dedicated Server Management NIC has its own single separate Dedicated
Management port NIC. Port location is varying by platforms, following sections provide the
detail port location on each platforms.
3.3.3.1
Figure 22: Intel Dedicated Server Management NIC on Intel Server S2600WT
30
Revision 2.8
3.3.3.2
Figure 23: Intel Dedicated Server Management NIC on Intel Server S2600KP and S2600TP
3.3.3.3
Figure 24: Intel Dedicated Server Management NIC on Intel Server S2600CW
Revision 2.8
31
4.
This section discusses using the Server Utilities to enable your system to use the Integrated
BMC Web Console or the Intel RMM4 from a new unconfigured state to an operational one.
When first powered on, by default, the Server Management BMC LAN and the Intel RMM4
have a static IP address of 0.0.0.0.
The Server Management BMC LAN and the Intel RMM4 can be configured in multiple ways:
Note: You can download the IDA and SYSCFG software from the following links:
Two steps are necessary before Server Management BMC LAN or the Intel RMM4 can be used:
1. One or both LAN channels must be configured as either DHCP or static addresses.
2. At least one user must be enabled to use the LAN channels.
32
Revision 2.8
4.1
Revision 2.8
33
4.2
34
a.
b.
If configuring your Intel RMM4, scroll down to Intel(R) RMM4 IPV4 LAN configuration
> IP source and then select either Static or Dynamic.
c.
Revision 2.8
If configuring your Server Management BMC LAN, scroll to Baseboard LAN IPv6
configuration > IP source and then select Enabled.
1.
b.
If configuring your Intel RMM4, scroll down to Intel(R) RMM4 IPv6 LAN configuration
> IP source and then select either Static or Dynamic.
c.
If Static is selected, configure the IPV6 address, Gateway IPV6, and IPV6 Prefix
Length as needed.
5. Scroll down to User ID. Select the user that you want to use.
6. Scroll down to User status. Select Enabled.
7. Scroll down to User name. Change the name as needed. Note that you cannot change
anonymous or root.
8. Scroll down to User password. Change the password. Note that you need to enter the
password twice.
9. When you finish configuring the LAN addresses and user information for the server, press
<F10> and select save and exit. Your server will reboot with the new LAN settings.
Revision 2.8
35
Figure 26: Server Management BMC LAN Configuration on Intel Server Boards and Systems Based
on Intel Xeon Processor E5-4600/2600/2400/1600/1400 (v1&v2) and S1200V3RP Product Families
4.3
36
a.
b.
Revision 2.8
c.
If configuring your Server Management BMC LAN, scroll to Baseboard LAN IPv6
configuration > IP source and then select Enabled.
1.
b.
If configuring your Intel RMM4, scroll down to Dedicated Management LAN IPv6
Configuration > IP source and then select either Static or Dynamic.
c.
If Static is selected, configure the IPV6 address, Gateway IPV6, and IPV6 Prefix
Length as needed.
Revision 2.8
37
Figure 27: Server Management BMC LAN Configuration on PCSD Platforms Based on Intel
S2600WT, S2600KP, S2600TP and S2600CW Product Families
38
Revision 2.8
Figure 28: Server Management User Configuration on PCSD Platforms Based on Intel S2600WT,
S2600KP, S2600TP and S2600CW Product Families
Revision 2.8
39
4.4
The following section explains how to use the IDA to configure the on-board NIC1 and/or the
RMM4 NIC for use with the Integrated BMC Web Console and the Intel RMM4. The example
shows how to configure LAN Channel 3 (Intel RMM4 NIC).
WARNING
If you need to configure both LAN Channel 1 and LAN channel 3 (Intel Dedicated Server
Management NIC), ensure that they are configured with different subnets.
Note: When the Intel Dedicated Server Management NIC is not installed, because the RMM4
Lite has no dedicated NIC, the LAN Channel 3 is not displayed. The user can access the RMM4
Lite advance features from LAN channel 1 (on-board NIC1). See Figure 30. (Only apply to Intel
Server Boards and Systems Based on Intel Xeon Processor E5-4600/2600/2400/1600/1400
(V1&V2), S1200V3RP and S1200BTL Product Families)
1. Select the channel to be configured.
Revision 2.8
Revision 2.8
41
If IP Address from a DHCP server is selected, configure the DHCP Host Name as
shown in Figure 31.
b.
If Static IP Address is selected, configure the IP address, Subnet Mask, and Gateway
as shown in Figure 32.
3. You can also select Enable Serial Over LAN and Configure Alert on these screens.
Figure 31: IDA Configure Server: Configure LAN Channel 3 (Intel RMM4 DMN)
IP Address from a DHCP Server Window
42
Revision 2.8
Figure 32: IDA Configure Server: Configure LAN Channel 3 (Intel RMM4 DMN)
Static IP Address Window
Revision 2.8
43
4. (Optional) Set up the users by selecting the User Name and then clicking Edit.
The Edit User Data window is displayed.
Notes:
44
You cannot login to the Integrated BMC Web Console or RMM4 Remote Console as an
Anonymous User. You must modify the existing users.
Enable and edit the username/passwords; set the privilege for the users as shown
below.
Revision 2.8
Revision 2.8
45
46
Revision 2.8
Revision 2.8
47
48
Revision 2.8
4.5
This section describes the basic commands needed to configure the RMM4 using SysConfig
commands. This utility is supported in EFI, Linux*, and Microsoft Windows*. The commands
are the same for all versions. At a minimum, you need to configure the following settings:
Note: The examples in the following sections use the Intel Dedicated Server Management NIC
LAN channel 3. If you are not using the Intel Dedicated Server Management NIC, substitute
the appropriate channel number. For NIC1 it will be channel 1. For NIC2 it will be channel 2.
If needed, enable the Serial Over LAN (SOL) on LAN Channel 3 by typing:
syscfg /sole 3 Enable Admin BAUD_RATE RETRY_COUNT
RETRY_INTERVAL_IN_MILLISECONDS
Revision 2.8
49
5.
The Intel RMM4 module features remote KVM access and control through LAN or Internet.
The Intel Integrated BMC Web Console is part of the standard BMC firmware / Server
Management Software. The Integrated BMC Web Console feature is used to access the remote
KVM.
This section describes both the interfaces and how to use them. The interfaces are accessed
using TCP/IP protocol.
5.1
For initial setup information, refer to Chapter 4. Before you log in, you must enable the
intended user. The examples in this chapter use user root, but other usernames and
passwords could be used.
The Intel RMM4 enabled advanced features may be accessed using a standard Java* enabled
web browser. You may use the HTTP protocol or a secure encrypted connection from the
HTTPS configurable in the embedded web server.
50
Revision 2.8
In order to use the Remote Console (KVM) window of your managed server, Java* Runtime
Environment (JRE) Version 6 Update 22 or higher must be installed.
Note: The Web Console is designed for a screen size of 1280 pixels by 1024 pixels or larger. In
smaller screens, the browser displays slider controls to enable the user to see the full content
of each web page.
5.2
Logging In
Enter the configured IP address of the Intel RMM4 or your configured BMC on-board NIC into
your web browser. In order to use a secure connection, type https://<IPaddress>/. This will
take you to the Intel Integrated BMC Web Console module login page as shown in Figure 39.
Username = root
Password = superuser
Click the Login button (shown in Figure 39) to view the home page.
After the initial login, system administrators may change passwords, create new users, and
have full control over access to the RMM4 enabled advanced features.
Note: The username and password are case sensitive. Any username and password can be
used (except anonymous).
Revision 2.8
51
5.3
Navigation
After successful login to the Integrated BMC Web Console module, the Integrated BMC Web
Console home page appears as shown in Figure 40.
The top horizontal toolbar within the Integrated BMC Web Console home page has four tabs.
Click these tabs to get specific system information and perform tasks as shown in the
following table.
Table 9: Integrated BMC Web Console Home Page Tabs
Tab
Function
Click this tab to access general information about the server. The tab automatically opens
the System Information page:
System Information
FRU Information
CPU Information (only on Intel Server Boards and Systems Based on Intel Xeon
Processor E5-4600/2600/2400/1600/1400 (v1&v2) Product Families)
DIMM Information
Click this tab for access to the sensors and event log. The tab automatically opens the
Sensor Readings page:
Sensor Readings
Event Log
Power Statistics
52
Revision 2.8
Tab
Function
Click this tab to configure various settings for the server. The tab automatically opens the
Network configuration page:
Network/IPv4 Network
IPv6 Network (only on Intel Server Boards and Systems Based on Intel Xeon
Processor E5-4600/2600/2400/1600/1400 (v1&v2) Product Families)
Users
Login
LDAP
VLAN (only on Intel Server Boards and Systems Based on Intel Xeon Processor E54600/2600/2400/1600/1400 (v1&v2) Product Families)
SSL
Remote Session
Mouse Mode
Keyboard Macros
Alerts
Alert Email
Node Manager (only on Intel Server Boards and Systems Based on Intel Xeon
Processor E5-4600/2600/2400/1600/1400 (v1&v2) Product Families)
Click this tab for access to the remote console and to control the power state of the server:
Console Redirection
Server Power Control
Virtual Front Panel (only on Intel Server Boards and Systems Based on Intel Xeon
Processor E5-4600/2600/2400/1600/1400 (v1&v2) Product Families)
The four tabs on the horizontal menu allow you to navigate within the Integrated BMC Web
Console. Each of these tabs contains a secondary menu on the left edge of the browser
window. For detailed information on the specific functions of secondary menu item see
Chapter 7.
The top horizontal toolbar also has the Logout, Refresh, and Help buttons. Click these
buttons to perform tasks as shown in the following table.
Table 10: Horizontal Toolbar Buttons
Button
Function
Click this button to end the current Web Console session. Note that a remote console (KVM)
window, if active, will be closed when you log out. After logging out, the Web Console will return to
the Login screen.
Click this button to refresh the current web page, including any data shown on the page.
Note: Using the web browsers refresh/reload button or pressing the function key <F5> to do a
refresh/reload is not supported for reloading the Web Console pages. Using either of them can
cause unexpected results.
Click this button to view a brief description of the current page in a frame at the right side of the
browser window. Close the Help frame by clicking the X in the upper right corner of the frame or
by clicking the HELP button again.
Click this button to view the Intel copyright information and a statement about the use of open
source code.
Revision 2.8
53
5.4
Online Help
The Web Console user interface provides specific online help for each page. For additional
information on a certain topic or group of options, click the
button on the top
horizontal toolbar to view the online help as shown in Figure 41. The right Help frame is
visible only when the online Help is being accessed.
54
Revision 2.8
5.5
Logging Out
Click the
button to log out the current user and revert to a new login screen as shown
in Figure 42 and Figure 43.
Note: Automatic Timeout If there is no user activity detected by the Web Console for 30
minutes, the current session will be automatically terminated. If the user has an open KVM
remote console window, the web session will not automatically timeout. The next action
attempted by the user after the automatic timeout will inform the user of the need to login
again for continued access to the Web Console.
Revision 2.8
55
6.
The Remote Console is the redirected keyboard, video, and mouse of the remote host system
where the Intel RMM4 module is installed. To use the Remote Console window of your
managed host system, the browser must include a Java* Runtime Environment plug-in. If the
browser has no Java* support, such as with a small handheld device, the user can maintain the
remote host system using the administration forms displayed by the browser.
Starting the Remote Console opens a new window to display the screen content of the host
system. The Remote Console acts as if the administrator were sitting directly in front of the
screen of the remote system. This means the keyboard and mouse can be used in the usual
way.
6.1
The Remote Console is the redirected keyboard, video, and mouse of the remote host system
where the Intel RMM4 module is installed. Launch the remote console KVM redirection
window from this page.
Note: If you are using Microsoft Windows Internet Explorer*, the Smart Screen is enabled, and
the system is on a network with no direct connectivity to the internet, it may take an extremely
long time to open a KVM window.
Click the Launch Console button to launch the redirection console and manage the server
remotely.
When the Launch Console button is clicked, a pop-up window is displayed to download the
Java* Network Launch Protocol, jviewer.jnlp file. This in turn downloads the standalone Java*
application implementing the Remote Console.
56
Revision 2.8
Both Microsoft Internet Explorer* and Mozilla Firefox* browsers are supported.
Notes:
Java* Runtime Environment (JRE, Version 6 Update 22 or higher) must be installed on
the client before the launch of a JNLP file.
The client browser must allow pop-up windows from the Integrated BMC Web Console
IP address.
The Remote Console window is a Java* Applet that establishes TCP connections to the
Integrated BMC Web Console. The protocol that is used to run these connections is a unique
KVM protocol and not HTTP or HTTPS. This protocol uses ports #7578 for KVM, #5120 for
CDROM media redirection, and #5123 for Floppy/USB media redirection. Your local network
environment must permit these connections to be made, that is, your firewall and, in case you
have a private internal network, your NAT (Network Address Translation) settings have to be
configured accordingly.
Revision 2.8
57
6.2
Main Window
Starting the Remote Console opens an additional window as shown in Figure 46.
It displays the screen content of your remote server. The Remote Console behaves as if you
were located at the remote server. The responsiveness may be slightly delayed depending on
the bandwidth and latency of the network between Integrated BMC Web Console and Remote
Console. Enabling KVM and/or media encryption on the Configuration > Remote Session web
page will degrade performance as well.
The Remote Console window always shows the remote screen in its optimal size. This means it
will adapt its size to the size of the remote screen initially and after the screen resolution of
the remote screen has been changed. However, you can always resize the Remote Console
window in your local window as usual.
58
Revision 2.8
6.3
The upper part of the Remote Console window contains a control bar. Using its elements you
can see the status of the Remote Console and influence the local Remote Console settings.
The following sub sections describe the tasks you can perform within each control.
Pause Redirection. Temporarily pauses the redirection of keyboard, video, and mouse.
The Remote Console window stops being updated. Keyboard shortcut is Alt+P.
Full Screen. Toggles windowed/full screen mode of the Remote Console. Shortcut is
Alt+F.
Revision 2.8
59
Hold Ctrl/Alt/Windows* keys. Allows simulation by holding down these special keys
on the remote keyboard. On the local keyboard these special keys are processed by
the local OS and not passed on to the remote OS.
6.3.2.1
The Remote Console supports the following keyboard language layouts: English, Dutch,
French, German, Italian, Russian, and Spanish.
60
Revision 2.8
In order for local key strokes to be interpreted correctly at the remote end, the client OS, the
target OS, and the Remote Console must all be configured for the same language layout.
The Remote Console Java* application reversely translates local key strokes based on the
selected language layout. If there is a mismatch, sometimes it works fine anyway, otherwise it
mostly works except for a few mistranslated or unresponsive keys and in some mismatched
configurations most of the keys are mishandled.
6.3.2.1.1
The Remote Console supports the Windows* default keyboard variants for the supported
languages.
In Windows*, the language is the current Language Bar setting (initially configured in Control
Panel > Regional and Language Options > Languages > Text Services and Input Languages).
If you are using one of the supported language keyboards, you dont have to manually select
the language in the Remote Console because any Language Bar changes can be detected
automatically and immediately. Manually setting the language would typically be useful if you
are using a keyboard close but not identical to one of the supported ones.
6.3.2.1.2
The Remote Console supports the Linux* default keyboard variants for supported languages,
except Russian, where it is the Russian Winkeys variant. The Dutch layout is Belgium in
Linux*.
In Linux* you typically select the language at the login screen; it can also be changed with the
locale command but not while an application, such as the Remote Console, is running. There
is also an OS keyboard layout that can be changed independently of the language. If the OS
keyboard layout does not match the OS language setting, you may need to manually select
the Remote Console layout.
On the other hand, with Linux* Java*, there is less reverse translation required by the
application than in Microsoft Windows* and is more likely that a mismatched configuration
will work anyway.
6.3.2.2
Soft Keyboard
Revision 2.8
61
The Soft Keyboard window is displayed and closed either by selecting the Keyboard > Soft
Keyboard > Show checkbox or by the Alt+S shortcut.
Buttons clicked on the Soft Keyboard window get sent as key strokes to the remote target.
The Soft Keyboard is also a convenient way to see the exact layouts supported for the local
keyboards because they are the same.
The Soft Keyboard language layout follows the local keyboard language setting when the
default Keyboard > Soft Keyboard > Follow Local option is selected. This can be manually
overridden by selecting a language.
Note: The Soft Keyboard keystrokes get retranslated by the remote target OS just like the
local physical keystrokes and are subject to the same mismatched configuration issues.
62
Revision 2.8
Figure 54: Remote Console Mouse Menu on Intel Server Boards and Systems Based on Intel Xeon
Processor E5-4600/2600/2400/1600/1400 (v1&v2) Product Families
Figure 55: Remote Console Mouse Menu Mode Selection on Intel Server Boards and Systems
Based on Intel Xeon Processor E5-4600/2600/2400/1600/1400 (v1&v2) Product Families
Show Cursor. This option toggles the cursor display in the Remote Console window. It
does not affect the remote system cursor. Shortcut is Alt+C.
Mouse Calibration. This option is used to detect the threshold and acceleration
settings on the remote system and set the local clients mouse settings accordingly. It
only applies when in Relative Mouse Mode, selected on the web page Configuration >
Mouse Mode. Absolute Mouse Mode does not require calibration. Shortcut is Alt+T.
Mouse Mode. This option is only available on Intel Server Boards and Systems Based
on Intel Xeon Processor E5-4600/2600/2400/1600/1400 (v1&v2) Product Families.
See Figure 54. This allows you to select the mouse mode being used. You can select
Absolute, Relative, or Other as shown in Figure 55. For a description of these modes,
see Section 7.3.9. Note that the functionality of this option is the same as changing
then saving the mode on the Mouse Mode page. Any selections that you make will be
saved for the next time when the remote console window is opened.
63
3. Use number pad '+' or '-' keys to change the threshold settings until both cursors go out of
sync.
4. Detect the first reading at which the cursors go out of sync.
5. After the reading is detected, use Alt-T to save the threshold value.
6. In this step, the mouse acceleration settings on the remote server will be discovered. The
local mouse cursor is displayed in red color and the remote cursor is part of the remote
video screen. Both cursors will be out of sync in the beginning.
7. Use number pad '+' or '-' keys to change the acceleration settings in steps of 1, or use Alt'+' or Alt-'-' keys to change the acceleration settings in steps of 0.1 until both cursors are in
sync.
8. Detect the first reading at which the cursors are in sync.
9. After the reading is detected, use Alt-T to save the acceleration value.
64
Revision 2.8
This menu option allows starting/stopping remote media redirection. The first two options
allow you to redirect either a local CDROM/DVD drive or else an ISO image on your local client
file system as a virtual CDROM device on the remote system. The third option allows you to
redirect either a local floppy drive or local USB key drive. The fourth option allows you to
redirect a floppy or USB Key .img file on your local client file system as a virtual floppy device
on the remote system.
Note: When trying to attach a local floppy or local USB key drive, if it is in use by the operating
system or any other application it will fail to attach.
With Microsoft Windows 2008*, Microsoft Windows Vista*, Microsoft Windows 2008* R2, and
Microsoft Windows 7* if a Windows Explorer* GUI is opened after the USB Key has been
installed in the local system, you may not be able to attach the USB Key as remote media.
With Microsoft Windows 2003* and Microsoft Windows XP* if a Windows Explorer* GUI is
opened after the USB Key has been installed in the local system and you then browse through
the USB Key, you may not be able to attach the USB Key as remote media.
The virtual devices act just like any other CDROM/DVD or floppy on the remote system. They
can be read, written (assuming they are not read-only), and booted. The pair of virtual devices
only appears on the remote OS or BIOS setup menus when some media redirection is active.
The virtual devices persist across remote system resets and power up/downs. They do not
disappear from the remote system until the checkboxes are unchecked in the Remote Console
window.
Note: The virtual devices are not limited to normal floppy/CDROM sizes and will be as large as
the device or file being redirected. A USB Key drive is redirected as a virtual floppy device
rather than a USB device to allow the loading of custom device drivers during remote OS
installation which may require a floppy drive.
There is only one virtual CDROM and one virtual floppy device on the remote system allowed
so only one local item of each type can be redirected at a time. Only one Remote Console
window can be doing media redirection at any given time.
6.4
The status line at the bottom of the Remote Console screen shows the console state as shown
in Figure 58. When you navigate the menu options, the status line provides a more detailed
definition of each option.
Revision 2.8
65
7.
This chapter gives you a detailed description of each Integrated BMC Web Console page. It is
organized in sections corresponding to the four tabs in the horizontal menu. Within each
section, each menu on the left side is illustrated and described in detail.
Notes:
The first menu item for each tab is the default page that appears when the tab is
selected.
Similar information about each page is available in the Web Console by clicking the
HELP button at the right side of the horizontal menu.
When the Web Console is working on current user request, a busy indicator bar
appears as shown in Figure 59.
7.1
Not all of the following sections are used by or directly related to the RMM4 enabled
features but have been added here for completeness.
The System Information tab contains general information about the system as explained in
the following sub sections.
Click the System Information tab to select the various pages. By default, the Integrated BMC
Web Console home page opens the System Information page.
66
Revision 2.8
The System Information page has the following information about the server.
Table 11: System Information Details
Information
Details
RMM Status
BMC FW Rev
Boot FW Rev
Revision 2.8
67
Figure 61: System Information Page on Intel Server Boards and Systems Based on Intel Xeon
Processor E5-4600/2600/2400/1600/1400 (v1&v2) Product Families
On S1200V3RP Product Family the Baseboard Serial Number is added to display along with
the Overall System Health indication. See Figure 62 for details. These are a general indication
of the system heath:
68
Revision 2.8
On Intel Server Boards and Systems Based on Intel Xeon Processor E5-2600 V3 --S2600WT, S2600KP, S2600TP and S2600CW the Baseboard Serial Number is added to
display along with the Overall System Health indication. See Figure 63 for details. These are a
general indication of the system heath:
Revision 2.8
69
Figure 63: System Information Page on Intel Server Boards and Systems Based on Intel Xeon
Processor E5-2600 V3 --- S2600WT, S2600KP, S2600TP and S2600CW
70
Revision 2.8
The System Debug Log page can be used to collect system debug information on S1200BTL
systems. See Figure 65 for details.
From the System Debug Log page you can run the System Debug Log dump.
Click the Generate Log button. It may take some time for the debug information to be
collected.
Revision 2.8
71
After the debug log dump is finished, you can click the debug log filename to save the results
as a .zip file on your client system. The file can then be sent to your system manufacturer or an
Intel support engineer for analysis.
Figure 65: System Information System Debug Log Page on S1200BTL Platforms
A list of data that may be captured using this feature includes but is not limited to:
72
Platform sensor readings This includes all readable sensors that can be accessed
by the BMC FW and have associated SDRs populated in the SDR repository. This does
not include any event-only sensors. (All BIOS sensors and some BMC and ME sensors
are event-only, meaning that they are not readable using an IPMI Get Sensor Reading
command but rather are used just for event logging purposes.)
SEL The current SEL contents are saved in both hexadecimal and text format.
CPU/memory register data useful for diagnosing the cause of the following system
errors: CATERR, ERR[2], SMI timeout, PERR, and SERR The debug data is saved and
timestamped for the last three occurrences of the error conditions.
o
MSR registers
Integrated Memory Controller (iMC) and Integrated I/O (IIO) module registers
Revision 2.8
System Debug Log Page on Intel Server Boards and Systems Based on Intel
Xeon Processor E5-4600/2600/2400/1600/1400 (v1&v2) Product Families
and S1200V3RP Product Family
7.1.3.2
The System Debug Log page can be used to collect system debug information on Intel Server
Boards and Systems Based on Intel Xeon Processor E5-4600/2600/2400/1600/1400
(v1&v2) Product Families and S1200V3RP Product Family. See Figure 66 for details.
Click the Generate Log button. It may take some time for the debug information to be
collected.
After the debug log dump is finished, you can click the debug log filename to save the results
as a .zip file on your client system. The file can then be sent to your system manufacturer or an
Intel support engineer for analysis.
Figure 66: System Information System Debug Log Page on Intel Server Boards and Systems Based
on Intel Xeon Processor E5-4600/2600/2400/1600/1400 (v1&v2) Product Families and S1200V3RP
Product Family
A list of data that may be captured using this feature includes but is not limited to:
Platform sensor readings This includes all readable sensors that can be accessed
by the BMC FW and have associated SDRs populated in the SDR repository. This does
not include any event-only sensors. (All BIOS sensors and some BMC and ME sensors
are event-only, meaning that they are not readable using an IPMI Get Sensor Reading
command but rather are used just for event logging purposes.)
SEL The current SEL contents are saved in both hexadecimal and text format.
Revision 2.8
73
CPU/memory register data useful for diagnosing the cause of the following system
errors: CATERR, ERR[2], SMI timeout, PERR, and SERR The debug data is saved and
timestamped for the last three occurrences of the error conditions.
o
MSR registers
Integrated Memory Controller (iMC) and Integrated I/O (IIO) module registers
SMBIOS table data The entire SMBIOS table is captured from the last boot.
System memory map The system memory map is provided by BIOS on the current
boot. This includes the EFI memory map and the Legacy (E820) memory map
depending on the current boot.
Capture of power supply data and power supply asset information Power supply
vendors are adding the capability to store debug data within the power supply itself.
The platform debug feature provides a means to capture this data for each installed
power supply. The data can be analyzed by Intel for failure analysis and possibly
provided to the power supply vendor as well. The BMC gets this data from the power
supplies by using PMBus* manufacturer-specific commands.
POST code sequence for the two most recent boots This is a best-effort data
collection by the BMC as the BMC real-time response cannot guarantee that all POST
codes are captured.
Support for multiple debug files The platform debug feature provides the ability to
save data to two separate files that are encrypted with different passwords.
7.1.3.3
System Debug Log file can be viewed by Intel engineers and Intel partners.
System and BMC Debug Log file is strictly for viewing by Intel engineers and
may contain additional BMC log messages and other debug data that Intel
firmware developers deem useful in addition to the data specified above.
System Debug Log Page on Intel Server Boards and Systems Based on Intel
Server Boards and Systems Based on Intel Xeon Processor E5-2600 V3 --S2600WT, S2600KP, S2600TP and S2600CW
The System Debug Log page can be used to collect system debug information on Intel Server
Boards and Systems Based on Intel Xeon Processor E5-2600 V3 --- S2600WT, S2600KP,
S2600TP and S2600CW. See Figure 67 for details.
Click the Generate Log button. It may take some time for the debug information to be
collected.
After the debug log dump is finished, you can click the debug log filename to save the results
as a .zip file on your client system. The file can then be sent to your system manufacturer or an
Intel support engineer for analysis.
74
Revision 2.8
Figure 67: System Information System Debug Log Page on Intel Server Boards and Systems Based
on Intel Xeon Processor E5-2600 V3 --- S2600WT, S2600KP, S2600TP and S2600CW
Revision 2.8
75
76
Revision 2.8
7.1.5
The CPU Information page displays information on the processors that are installed on Intel
Server Boards and Systems Based on Intel Xeon Processor E5-4600/2600/2400/1600/1400
(v1&v2) Product Families and S1200V3RP Product Family. See Figure 69 for details.
Revision 2.8
77
7.1.6
The Current Users page shows users currently logged in to the BMC via the embedded web
server, IPMI 1.5, or IPMI 2.0 session.
Web sessions over a secure socket layer (SSL) are denoted by "Secure" in parentheses.
The number of active KVM sessions opened by a "Web" user is noted in parentheses after the
KVM notation.
78
Revision 2.8
7.2
The Server Health tab shows you data related to the server's health, such as sensor readings,
the event log, and power statistics as explained in the following sub sections.
Click the Server Health tab to select the various pages. By default, this tab opens the Sensor
Readings page.
Figure 71: Server Health Sensor Readings Page (Thresholds not Displayed)
Revision 2.8
79
Task
Refresh button
80
Revision 2.8
Task
Revision 2.8
81
Figure 74: Server Health Event Log Page on Intel Server Boards and Systems Based on Intel Xeon
Processor E5-4600/2600/2400/1600/1400 (v1&v2) Product Families
On S1200V3RPand Intel Server Boards and Systems Based on Intel Xeon Processor
E5-2600 V3 --- S2600WT, S2600KP, S2600TP and S2600CW Product Families there is an
indicator towards the top of the page that gives an indication of how full the Event Log is. In
addition towards the bottom of the page a selection is added that allows you to select going
to another page of the recorded events. The selection is plus and/or minus two pages from
the current page and a selection to go to the first and/or the last page of events.
82
Revision 2.8
Figure 75: Server Health Event Log Page on S1200V3RP and Intel Server Boards and Systems Based
on Intel Xeon Processor E5-2600 V3 --- S2600WT, S2600KP, S2600TP and S2600CW
Revision 2.8
83
Figure 76: Server Health Power Statistics Page on S1200BTL, S1200V3RP and Intel Server Boards
and Systems Based on Intel Xeon Processor E5-2600 V3 --- S2600WT, S2600KP, S2600TP and
S2600CW
84
Revision 2.8
Figure 77: Server Health Power Statistic Page on Intel Server Boards and Systems Based on Intel
Xeon Processor E5-4600/2600/2400/1600/1400 (v1&v2) Product Families
Revision 2.8
85
7.3
Configuration Tab
The Configuration tab is used to configure various settings such as IPv4 Network, Users Login,
LDAP SSL, Remote Session, Mouse Mode, Keyboard Macros, Alerts, and Alert Email as
discussed in the following subsections. In addition, Intel Server Boards and Systems Based on
Intel Xeon Processor E5-4600/2600/2400/1600/1400 (v1&v2) Product Families IPv6, VLAN,
and Node Manager can also be configured.
Click the Configuration tab to select the various pages. By default, this tab opens the Network
Settings page or the IPv4 Network page.
7.3.1
The Network or IPv4 settings page is used to configure the IPv4 network settings for the
server management LAN interface to the BMC controller. See Figure 78 or Figure 79 for
details.
86
Revision 2.8
WARNING
Each network controller must be on a different subnet than all other controllers used for
management traffic.
WARNING
When LAN failover is enabled, the system administrator must ensure that each network
controller connection, which can be seen by the BMC, has connectivity to the same networks.
If there is a loss of functionality on the primary network controller channel, it will randomly
failover to any of the other network controller channels that are connected and seen by the
BMC.
The following table lists the options available in this page.
Table 14: Configuration IPv4 Network Settings Options
Option
Enable LAN Failover
Revision 2.8
Task
Used to enable LAN Failover (only available on Intel Server Boards and Systems Based on Intel
Xeon Processor E5-4600/2600/2400/1600/1400 (v1&v2) Product Families).
87
Used to select the channel on which you want to configure the network settings.
Lists the LAN Channels available for server management. The LAN channels describe the
physical NIC connection on the server.
Intel(R) RMM (BMC LAN Channel 3) is the add-in RMM4 Dedicated Management NIC.
Baseboard Mgmt (BMC LAN Channel 1) is the on-board, shared NIC configured for
management and shared with the operating system.
Baseboard Mgmt 2 (BMC LAN Channel 2) is the second on-board, shared NIC configured
for management and shared with the operating system.
MAC Address
IP Address
Subnet Mask
If configuring a static IP, enter the requested address, subnet mask, and gateway in the given
fields.
Gateway
If configuring a dynamic IP, enter the Primary and Secondary DNS servers.
88
Revision 2.8
7.3.2
IPv6 Page on Intel Server Boards and Systems Based on Intel Xeon
Processor E5-4600/2600/2400/1600/1400 (v1&v2) Product Families,
S1200V3RP and Intel Server Boards and Systems Based on Intel Xeon
Processor E5-2600 V3 --- S2600WT, S2600KP, S2600TP and S2600CW
The IPv6 settings page is used to enable and configure the IPv6 network settings. You can also
enable and configure LAN Failover on this page. See Figure 80 for details.
WARNING
Each network controller must be on a different subnet than all other controllers used for
management traffic.
WARNING
When LAN failover is enabled, the system administrator must ensure that each network
controller connection, which can be seen by the BMC, has connectivity to the same networks.
If there is a loss of functionality on the primary network controller channel, it will randomly
failover to any of the other network controller channels that are connected and seen by the
BMC.
The following table lists the options available in this page.
Revision 2.8
89
Task
Used to enable LAN Failover.
Used to select the channel on which you want to configure the network settings.
Lists the LAN Channels available for server management. The LAN channels describe the
physical NIC connection on the server.
Intel(R) RMM (BMC LAN Channel 3) is the add-in RMM4 Dedicated Management NIC.
Baseboard Mgmt (BMC LAN Channel 1) is the on-board, shared NIC configured for
management and shared with the operating system.
Baseboard Mgmt 2 (BMC LAN Channel 2) is the second on-board, shared NIC
configured for management and shared with the operating system.
MAC Address
Used to enable IPv6 on the channel selected in the LAN Channel drop-down box.
IP Address
If configuring a static IP, enter the requested address and gateway in the given fields.
Gateway
The IP Address and Gateway are 128-bit fields made of eight hexadecimal numbers
separated by colons as in "xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx".
'xxxx' ranges from 0 to FFFF.
First 'xxxx' must not be 0.
One or more consecutive groups of zero value may be replaced with a single empty group
using two consecutive colons (::).
Save button
90
Revision 2.8
This page allows the operator to configure the IPMI users and privileges for this server:
Revision 2.8
91
To modify a user, select a user in the list and click Modify User. This allows you to change the
Password, Enable Access, and change Network Privileges as shown in Figure 83.
92
Revision 2.8
For Intel Server Boards and Systems Based on Intel Xeon Processor E54600/2600/2400/1600/1400 (v1&v2) Product Families and S1200V3RP Product Family you
can also force the interface to HTTP Secure mode by selecting the Force HTTPS Enable
checkbox. See Figure 85 for details.
In addition the Web Session Timeout that locks the web session after a specified time of
inactivity can be changed from the default 30 minutes (1800 seconds) by entering a new value
for how long to wait before locking out the web session.
Click the Save button to save any changes.
Revision 2.8
93
Figure 85: Configuration Login Security Settings Page on Intel Server Boards and Systems Based on
Intel Xeon Processor E5-4600/2600/2400/1600/1400 (v1&v2) Product Families, S1200V3RP
Product Family and Intel Server Boards and Systems Based on Intel Xeon Processor E5-2600 V3 -- S2600WT, S2600KP, S2600TP and S2600CW
94
Revision 2.8
Task
Check this box to enable LDAP authentication, then enter the required information to
access the LDAP server.
Port
IP Address
Searchbase
Bind Password
The authentication password for the LDAP server; the password must be at least four
characters long.
Bind DN
The Distinguished Name of the LDAP server, for example, "cn=Manager, dc=my-domain,
dc=com".
Save button
Revision 2.8
95
7.3.6 VLAN Page on Intel Server Boards and Systems Based on Intel Xeon
Processor E5-4600/2600/2400/1600/1400 (v1&v2) Product Families,
S1200V3RP Product Family and Intel Server Boards and Systems Based on
Intel Xeon Processor E5-2600 V3 --- S2600WT, S2600KP, S2600TP and
S2600CW
On Intel Server Boards and Systems Based on Intel Xeon Processor
E5-4600/2600/2400/1600/1400 (v1&v2) Product Families, S1200V3RP Product Family and
Intel Server Boards and Systems Based on Intel Xeon Processor E5-2600 V3 --- S2600WT,
S2600KP, S2600TP and S2600CW this page is used to enable and configure the VLAN private
network settings on the selected server management LAN channels.
Figure 87: Configuration VLAN Settings on Intel Server Boards and Systems Based on Intel Xeon
Processor E5-4600/2600/2400/1600/1400 (v1&v2) Product Families, S1200V3RP and Intel Server
Boards and Systems Based on Intel Xeon Processor E5-2600 V3 --- S2600WT, S2600KP, S2600TP
and S2600CW Product Family
96
Revision 2.8
Task
Used to select the channel on which you want to configure the network settings.
Lists the LAN Channels available for VLAN. The LAN channel describes the physical NIC
connection on the server.
Intel(R) RMM (BMC LAN Channel 3) is the add-in RMM4 NIC.
Baseboard Mgmt (BMC LAN Channel 1) is the on-board, shared NIC configured for
management and shared with the operating system.
Baseboard Mgmt 2 (BMC LAN Channel 2) is the second on-board, shared NIC
configured for management and shared with the operating system.
Enable VLAN
Used to enable VLAN for the LAN channel selected in the drop-down box.
VLAN ID (1 4094)
VLAN Priority (0 7)
Save button
Revision 2.8
97
First upload the SSL certificate and then the device will prompt to upload the privacy key. If
either of the files is invalid, the device will notify. A notification will be displayed on successful
upload. On successful upload, the device will prompt to reboot. If you want to reboot, click Ok.
Or click Cancel to cancel the reboot operation.
First upload the SSL certificate and then the device will prompt to upload the privacy key.
Click the Upload button. On successful upload, a notification appears.
98
Revision 2.8
7.3.8
Use this page to configure various settings for the remote sessions.
7.3.8.1
Use this page to enable/disable encryption on KVM or Media during a redirection session and
to select USB Key Emulation Type. Figure 89 shows the details for an S1200BTL system.
The following table lists the options allowing you to enable or disable encryption on KVM or
media data, and the USB Key Emulation type selection used during a redirection session.
Table 18: Configuration Remote Session Options
Option
Task
Enable/Disable encryption on KVM or Media data during a redirection session.
Revision 2.8
99
Only needs to be configured if there is NAT (Network Address Translation) or port forwarding
on your network between the client side (web browser and JViewer application) and the BMC
side.
Enter the browser-side port number (1024-65535) for each of the redirection services
(remote KVM, virtual CDROM, and virtual USB/Floppy) that the JVIewer client should use.
If left blank, JViewer assumes no translation and uses the BMCs standard ports: 7578, 5120,
5123 (unencrypted) or else 7582, 5124, 5127 (encrypted) for remote KVM, virtual CDROM,
and virtual USB/Floppy, respectively.
The client-side IP address and http/https port numbers are supplied automatically by the
browser and do not need to be configured.
Save button
7.3.8.2
Remote Session Page on Intel Server Boards and Systems Based on Intel
Xeon Processor E5-4600/2600/2400/1600/1400 (v1&v2) Product Families
Figure 90: Configuration Remote Session Page on Intel Server Boards and Systems Based on Intel
Xeon Processor E5-4600/2600/2400/1600/1400 (v1&v2) Product Families
100
Revision 2.8
The following table lists the options that can be used to configure the settings used during a
redirection session.
Table 19: Configuration Remote Session Options
Option
Task
Disable or select encryption mode on KVM or Media data during a redirection session.
Choose any one from the supported encryption techniques (None, Stunnel*, RC4, or AES).
Keyboard/Mouse Only
Note: This option has the least performance impact while still encrypting the most important
data.
Enable/Disable encryption of Media data during a redirection session.
Media Encryption
Port Forwarding
Only needs to be configured if there is NAT (Network Address Translation) or port forwarding
on your network between the client side (web browser and JViewer application) and the BMC
side.
Enter the browser-side port number (1024-65535) for each of the redirection services
(remote KVM, virtual CDROM, and virtual USB/Floppy) that the JVIewer client should use.
If left blank, JViewer assumes no translation and uses the BMCs standard ports: 7578, 5120,
5123 (unencrypted) or else 7582, 5124, 5127 (encrypted) for remote KVM, virtual CDROM,
and virtual USB/Floppy, respectively.
The client-side IP address and http/https port numbers are supplied automatically by the
browser and do not need to be configured.
Save button
7.3.8.3
On an S1200V3RP Product Family system you can select the encryption mode and separately
enable or disable the keyboard or mouse and media encryption. The ports used for Port
Forwarding can also be selected. There is also a selection for enabling Serial Over LAN on the
various LAN ports. See Figure 91 for details.
Revision 2.8
101
The following table lists the options that can be used to configure the settings used during a
redirection session.
Table 20: Configuration Remote Session Options on S1200V3RP Product Family
Option
Task
Disable or select encryption mode on KVM or Media data during a redirection
session.
Choose any one from the supported encryption techniques (None, Stunnel*, RC4,
or AES)
Note: KVM and Media encryption are enabled by default.
Note: Disabling encryption can improve performance of KVM or Media redirection.
If KVM Encryption is set to None, the Keyboard and Mouse data can still be
encrypted using Blowfish encryption.
Keyboard/Mouse Only
Note: This option has the least performance impact while still encrypting the most
important data.
Enable/Disable encryption of Media data during a redirection session.
Media Encryption
102
Revision 2.8
Option
Task
Save button
7.3.8.4
Remote Session Page Intel Server Boards and Systems Based on Intel Xeon
Processor E5-2600 V3 --- S2600WT, S2600KP, S2600TP and S2600CW
On Intel Server Boards and Systems Based on Intel Xeon Processor E5-2600 V3 --S2600WT, S2600KP, S2600TP and S2600CW , the Remote Session is combined under KVM &
Media. You can select the encryption mode and separately enable or disable the keyboard or
mouse and media encryption. The ports used for Port Forwarding can also be selected. See
Figure 90 for details.
Revision 2.8
103
Figure 92: Configuration Remote Session Page on Intel Server Boards and Systems Based on Intel
Xeon Processor E5-2600 V3 --- S2600WT, S2600KP, S2600TP and S2600CW
The following table lists the options that can be used to configure the settings used during a
redirection session.
Table 21: Configuration Remote Session Options
Option
Task
Disable or select encryption mode on KVM or Media data during a redirection session.
Choose any one from the supported encryption techniques (None, Stunnel*, RC4, or AES).
Keyboard/Mouse Only
Note: This option has the least performance impact while still encrypting the most important
data.
Enable/Disable encryption of Media data during a redirection session.
Media Encryption
Default Ports
Only needs to be configured if there is NAT (Network Address Translation) or port forwarding
on your network between the client side (web browser and JViewer application) and the BMC
side.
Enter the browser-side port number (1024-65535) for each of the redirection services
(remote KVM, virtual CDROM, and virtual USB/Floppy) that the JVIewer client should use.
JViewer assumes no translation and uses the BMCs standard ports: 7578, 5120, 5123
(unencrypted) or else 7582, 5124, 5127 (encrypted) for remote KVM, virtual CDROM, and
virtual USB/Floppy, respectively.
The client-side IP address and http/https port numbers are supplied automatically by the
browser and do not need to be configured.
Save button
104
Revision 2.8
Absolute Mode. Select Absolute Mode to have the absolute position of the local
mouse sent to the server. Use this mode for Microsoft Windows* OS.
Relative Mode. Select Relative Mode to have the calculated relative mouse position
displacement sent to the server. Use this mode for Linux* OS.
Absolute Mode. Select Absolute Mode to have the absolute position of the local
mouse sent to the server. Use this mode for Microsoft Windows* and newer Red Hat*
Linux versions (RHEL 6.x).
Relative Mode. Select Relative Mode to have the calculated relative mouse position
displacement sent to the server. Use this mode for other Linux* versions such as SUSE*
(SLES) and older versions of Red Hat* (RHEL 5.x). For best results, server OS mouse
Revision 2.8
105
Figure 94: Configuration Mouse Mode Setting Page on Intel Server Boards and Systems Based on
Intel Xeon Processor E5-4600/2600/2400/1600/1400 (v1&v2) Product Families and S1200V3RP
Product Family
On Intel Server Boards and Systems Based on Intel Xeon Processor E5-2600 V3 --S2600WT, S2600KP, S2600TP and S2600CW, the Redirection Console handles mouse
emulation from local window to remote screen in either of three methods. Figure 94 shows
the details.
106
Absolute Mode. Select Absolute Mode to have the absolute position of the local
mouse sent to the server. Use this mode for Microsoft Windows* and newer Red Hat*
Linux versions (RHEL 6.x).
Relative Mode. Select Relative Mode to have the calculated relative mouse position
displacement sent to the server. Use this mode for other Linux* versions such as SUSE*
(SLES) and older versions of Red Hat* (RHEL 5.x). For best results, server OS mouse
Intel order number H54847-001
Revision 2.8
Revision 2.8
107
Figure 95: Configuration Mouse Mode Setting Page on Intel Server Boards and Systems Based on
Intel Xeon Processor E5-2600 V3 --- S2600WT, S2600KP, S2600TP and S2600CW
7.3.9.1
This mode should only be used for a SLES* 11 OS installation, and after this has been
completed, the Mouse Mode Setting should be changed to the suggested Relative Mode for
use within the SLES* 11 OS.
In this mode, the KVM window will be maximized to the full screen. Note that the windows
resizing button in the top right corner is grayed out.
To use the mouse within the KVM window you must press Alt-C. The first time that Alt-C is
pressed the mouse will appear close to the center of the window. Pressing Alt-C after that will
switch between using the mouse within the KVM window and using the mouse on your host
system. The mouse in the KVM window will remain in the last position that it was at when the
operation is switched between the KVM Window, to the host system, and then back to the
KVM window. There is a reminder of using Alt-C key in the Remote Console control bar to the
left of the keyboard macros. See Figure 96 for details. During installation, the mouse response
in the KVM is slow. This is normal and expected.
Note: If the top bar of the KVM window is double clicked, the window will be resized. If this
occurs, because there is no resize window button, the operator can use the Remote Console
Control Bar to select Video and then perform a Full Screen (or press Alt-F) operation to go to
the full screen mode.
108
Revision 2.8
Figure 96: KVM Window with Mouse Other Mode Selected on Intel Server Boards and Systems
Based on Intel Xeon Processor E5-4600/2600/2400/1600/1400 (v1&v2) Product Families and
S1200V3RP Product Family
Revision 2.8
109
This makes it convenient to quickly do oft repeated typing as well as execute key combos that
are not possible directly from the local client keyboard. Alt and Win key combos such as
Ctrl+Alt+Del are interpreted by the local client OS and are not passed through to the remote
target OS. However, a macro can be set up to take care of this.
Each button can optionally be given a short mnemonic name. If this field is blank, the key
sequence itself will also be used as the button label.
You must save changes before they take effect. If a Remote Console session is open at that
time, you will not see the changes until that session is closed and a new session is opened.
7.3.10.1
Key Sequences
110
Revision 2.8
A + indicates keep the previous keys pressed while holding down the next key, whereas a -
indicates release all previous keys first before pressing the next key. A * inserts a one second
pause in the key sequence.
Key names are either a printable character such as a, 5, @, and so on or else one of the nonprintable keys in the table below. Names in parentheses are aliases for the same key. Numeric
keypad keys are prefixed with NP_.
A plain '*' indicates a pause. Use '\*' for the actual '*' key. The '\' key must also be escaped as
'\\'.
Note: The key sequences are sent to the target as scan codes that get interpreted by the target
OS, so they will be affected by modifiers such as Num Lock as well as the target OS keyboard
language setting.
Table 22: Macro Non-printable Key Names
Revision 2.8
Shift (LShift)
RShift
Ctrl (LCtrl)
RCtrl
Alt (LAlt)
RAlt (AltGr)
Win (LWin)
RWin
Enter
Esc
F1 - F12
Bksp
Tab
CapsLk
Space
Ins
Del
Home
End
PgUp
PgDn
Context (Menu)
Up
Left
Down
Right
NumLk
NP_Div
NP_Mult
NP_Minus
NP_Plus
NP_0 - NP_9
NP_Dec
NP_Enter
PrtSc (SysRq)
ScrLk
Pause (Break)
111
7.3.11
Alerts Page
Use this page to configure which system events an alert should be sent for and the destination
for the alerts. Up to two destinations can be selected for each LAN channel. Figure 98 shows
the details for an S1200BTL system.
The following table lists the options allowing you to select the events that alerts should be
sent on and selection of where the alerts are to be sent.
Table 23: Configuration Alerts Options
Option
Task
Select either SNMP along with the IP address or email address that the alert
will be sent to. Up to two destinations can be selected for each LAN channel.
112
Revision 2.8
Option
Task
Save button
Globally Enable Platform Event Filtering: This can be used to prevent sending alerts
until you have fully specified your desired alerting policies.
Log Event on Filter Action: This can be used to enable or disable the logging of an
event into the System Event Log when a Filter Action is taken.
Figure 99: Configuration Alerts Page on Intel Server Boards and Systems Based on Intel Xeon
Processor E5-4600/2600/2400/1600/1400 (v1&v2) Product Families, S1200V3RP and Intel Server
Boards and Systems Based on Intel Xeon Processor E5-2600 V3 --- S2600WT, S2600KP, S2600TP
and S2600CW
Revision 2.8
113
114
Revision 2.8
7.3.12
The following table lists the options allowing you to configure the parameters for Alert Emails.
Table 24: Configuration Alert Email Options
Option
LAN Channel
Task
Select either the BMC or RMM4 to configure the destination.
The IP address of the remote SMTP mail server that the alert emails will be sent to.
SMTP Server IP
Sender Address
Local Hostname
The sender address string to be put in the "From:" field of outgoing alert emails.
The hostname of the local machine that is generating the alert. It is put into the outgoing alert
email.
The Local Hostname is a string of maximum 31 alpha-numeric characters.
Space and special characters are not allowed.
Save button
Revision 2.8
115
7.3.13
Node Manager Power Polices Page on Intel Server Boards and Systems
Based on Intel Xeon Processor E5-4600/2600/2400/1600/1400 (v1&v2)
Product Families and S1200V3RP, Intel Server Boards and Systems
Based on Intel Xeon Processor E5-2600 V3 --- S2600WT, S2600KP,
S2600TP and S2600CW
Figure 101: Configuration Node Manager Page on Intel Server Boards and Systems Based on Intel
Xeon Processor E5-4600/2600/2400/1600/1400 (v1&v2) Product Families, S1200V3RP and Intel
Server Boards and Systems Based on Intel Xeon Processor E5-2600 V3 --- S2600WT, S2600KP,
S2600TP and S2600CW
The following table lists the options allowing you to view, add, and edit the Node Manager
Power Policies.
Table 25: Configuration Node Manager Options
Option
Node Manager Power Policies
116
Task
This table lists the currently configured policies. Selecting an item from the table will
populate the editable fields in the settings section below.
Revision 2.8
Policy Number
In the policy table, policy numbers with an asterisk (*) are policies set externally using a
non-platform domain. Changing parameters on these policies will not affect their
triggers, trigger limits, reporting periods, correction timeouts, or aggressive CPU
throttling settings.
Check this box if the policy is to be enabled immediately.
Check this box to enable a system shutdown if the policy is exceeded and cannot be
corrected within the correction timeout period.
The operating system will be given 30 seconds to shut down gracefully. If the system
is still not shut down after 30 seconds, the BMC will initiate an immediate shutdown.
Check this box to enable the node manager to send a platform event message to the
BMC when a policy is exceeded.
Power Limit
Suspend periods are repeatable by day-of-week. Start and stop times are designated
in 24-hour format, in increments of 6 minutes. To specify a suspended period crossing
midnight, two suspend periods must be used.
For all policies set through this page, the following default values will be applied:
Revision 2.8
117
Figure 102: Configuration Node Manager Page with Use Policy Suspend Period Selected
118
Revision 2.8
7.4
The Remote Control tab helps you perform the following remote operations on the server:
Console redirection
Server power control
Click the Launch Console button to launch the redirection console and manage the server
remotely.
Note: Java* Runtime Environment (JRE - Version 6 Update 22 or higher) must be installed on
the client before launch of JNLP file.
Revision 2.8
119
Figure 104: Remote Control Server Power Control Page on S1200BTL Platforms
Task
Reset Server
Graceful Shutdown
Power ON Server
Select option to immediately power off the host, and then power it back on after one second.
Note: All power control actions are done through the BMC and are immediate actions. It is suggested to gracefully shut down the
operating system using the KVM interface or other interface before initiating power actions.
120
Revision 2.8
Figure 105: Remote Control Server Power Control Page on Intel Server Boards and Systems Based
on Intel Xeon Processor E5-4600/2600/2400/1600/1400 (v1&v2) Product Families
Table 27: Remote Control Power Control Options on Intel Server Boards and Systems Based on
Intel Xeon Processor E5-4600/2600/2400/1600/1400 (v1&v2) Product Families
Option
Reset Server
Force-Enter BIOS Setup
Power OFF Server
Graceful Shutdown
Task
Select option to hard reset the host without powering off.
Check this option to enter into the BIOS setup after resetting the server.
Select option to immediately power off the host.
Select option to soft power off the host.
Power ON Server
Select option to immediately power off the host, and then power it back on after one second.
Revision 2.8
121
Note: All power control actions are done through the BMC and are immediate actions.
On an S1200V3RP and Intel Server Boards and Systems Based on Intel Xeon Processor E52600 V3 --- S2600WT, S2600KP, S2600TP and S2600CW system you have an additional
option Force-enter BIOS Setup on a Power On. See Figure 106 and Table 28 for details.
For the Graceful OS Shutdown to function properly the OS must be ACPI aware and be
configured to do the shutdown without operator intervention. After a Graceful Shutdown has
been requested, if the system does not shut down as requested, the command cannot be
executed again for five minutes.
Figure 106: Remote Control Server Power Control Page on S1200V3RP and Intel Server Boards and
Systems Based on Intel Xeon Processor E5-2600 V3 --- S2600WT, S2600KP, S2600TP and
S2600CW
Table 28: Remote Control Power Control Options on S1200V3RP Product Family
Option
Task
Reset Server
Check this option to enter into the BIOS setup after resetting the server.
Graceful Shutdown
122
Revision 2.8
Option
Task
Power ON Server
Check this option to enter into the BIOS setup after powering on the server.
Select option to immediately power off the host, and then power it back on after one second.
Note: All power control actions are done through the BMC and are immediate actions.
Virtual Front Panel Page on Intel Server Boards and Systems Based on
Intel Xeon Processor E5-4600/2600/2400/1600/1400 (v1&v2) Product
Families, S1200V3RP and Intel Server Boards and Systems Based on
Intel Xeon Processor E5-2600 V3 --- S2600WT, S2600KP, S2600TP and
S2600CW
7.4.3
On Intel Server Boards and Systems Based on Intel Xeon Processor E54600/2600/2400/1600/1400 (v1&v2) Product Families and S1200V3RP Product Family this
page can be used just like the systems front panel.
Figure 107: Remote Control Virtual Front Panel Page on Intel Server Boards and Systems Based on
Intel Xeon Processor E5-4600/2600/2400/1600/1400 (v1&v2) Product Families, S1200V3RP and
Intel Server Boards and Systems Based on Intel Xeon Processor E5-2600 V3 --- S2600WT,
S2600KP, S2600TP and S2600CW
Revision 2.8
Task
The Power button is used to power on or power off.
123
Reset Button
The Reset button is used to reset the server while system is ON.
Chassis ID Button
When the Chassis ID button is pressed, the chassis ID LED changes to solid on.
If the button is pressed again, the chassis ID LED turns off.
NMI Button
Power LED
The Power LED shows the system power status. If the Power LED is green, the system is ON. If the
Power LED is grey, the system is OFF.
Status LED
The Status LED reflects the system status LED status and it is automatically in sync with the BMC
every 60 seconds. This reflects the System Status LED.
Chassis ID LED
The Chassis ID LED shows the current system chassis ID status. If the Chassis ID LED is blue, the
Chassis ID is indefinite ON. If the Chassis ID LED is grey, the Chassis ID is OFF.
124
Revision 2.8