HDM User Guide
HDM User Guide
Audience
This documentation is intended for:
• Network planners.
• Field technical support and servicing engineers.
• Server administrators working with the G3 Server.
Conventions
The following information describes the conventions used in the documentation.
Command conventions
Convention Description
Boldface Bold text represents commands and keywords that you enter literally as shown.
Italic Italic text represents arguments that you replace with actual values.
[] Square brackets enclose syntax choices (keywords or arguments) that are optional.
Braces enclose a set of required syntax choices separated by vertical bars, from which
{ x | y | ... }
you select one.
Square brackets enclose a set of optional syntax choices separated by vertical bars,
[ x | y | ... ]
from which you select one or none.
Asterisk marked braces enclose a set of required syntax choices separated by vertical
{ x | y | ... } *
bars, from which you select a minimum of one.
Asterisk marked square brackets enclose optional syntax choices separated by vertical
[ x | y | ... ] *
bars, from which you select one choice, multiple choices, or none.
The argument or keyword and argument combination before the ampersand (&) sign
&<1-n>
can be entered 1 to n times.
GUI conventions
Convention Description
Window names, button names, field names, and menu items are in Boldface. For
Boldface
example, the New User window opens; click OK.
Multi-level menus are separated by angle brackets. For example, File > Create >
>
Folder.
Symbols
Convention Description
An alert that calls attention to important information that if not understood or followed
WARNING! can result in personal injury.
An alert that calls attention to important information that if not understood or followed
CAUTION: can result in data loss, data corruption, or damage to hardware or software.
Convention Description
i
Manage fans ············································································································································ 33
Resource summary ·········································································································································· 34
Set resource usage alarm thresholds ······································································································ 34
View CUPS information···························································································································· 36
System settings ················································································································································ 37
Configure boot options ····························································································································· 37
Switch the partitioning mode ···················································································································· 39
Configuration ································································································· 1
Network ······························································································································································ 1
General restrictions and guidelines for network configuration ··································································· 1
View dedicated network port information ··································································································· 1
Configure the dedicated network port ········································································································ 2
View shared network port information ········································································································ 5
Configure the shared network port ············································································································· 6
Configure DNS ··········································································································································· 9
Set the network port mode ······················································································································· 11
Configure LLDP········································································································································ 12
Configure Wi-Fi settings ··························································································································· 13
NTP ·································································································································································· 15
Configure NTP settings ···························································································································· 15
Configure remote services ············································································· 1
Access services ················································································································································· 1
View services and user sessions ··············································································································· 1
Edit an access service ······························································································································· 2
Remote console ················································································································································· 5
Restrictions and guidelines ························································································································ 5
Launch a KVM or H5 KVM remote console ······························································································· 6
Operate the server from KVM ···················································································································· 8
Operate the server from H5 KVM············································································································· 13
Operate the server from VNC ·················································································································· 18
Configure the VNC login password ·········································································································· 19
Remote media mounting ·································································································································· 20
Mount remote media ································································································································ 21
Disable remote media ······························································································································ 22
SNMP ······························································································································································· 23
Remote O&M ······························································································· 25
Logs ································································································································································· 25
Manage the event log······························································································································· 25
Manage the operation log ························································································································ 26
Download log ··········································································································································· 28
SOL connection················································································································································ 30
Screenshots & videos ······································································································································ 30
Enable video recording ···························································································································· 30
Play and manage videos ·························································································································· 31
View BSoD screenshots··························································································································· 32
Alarm settings ·················································································································································· 33
Manage alert policies ······························································································································· 33
Manage alert emails ································································································································· 35
Manage SNMP traps ································································································································ 36
Manage syslog settings···························································································································· 38
Configure system diagnosis ····················································································································· 42
Configuration ···················································································································································· 43
Restrictions and guidelines ······················································································································ 44
Export HDM, BIOS, or RAID configuration······························································································· 44
Import HDM, BIOS, or RAID configuration ······························································································· 44
Restore HDM settings ······························································································································ 46
Update firmware ··············································································································································· 47
Firmware update restrictions and guidelines···························································································· 49
Firmware update workflow ······················································································································· 50
ii
Prerequisites for firmware update ············································································································ 51
Update HDM firmware······························································································································ 51
Update BIOS firmware ····························································································································· 54
Update CPLD firmware ···························································································································· 56
Update drive backplane firmware············································································································· 58
Update PCIe switch board firmware········································································································· 59
Update power supply firmware················································································································· 60
Update LCD firmware······························································································································· 62
Update GPUCPLD firmware ···················································································································· 64
Update GPUFPGA firmware ···················································································································· 65
Update FANMCU firmware ······················································································································ 67
Update the REPO for firmware update ···································································································· 68
Update PMem 200 firmware ···················································································································· 70
Restart HDM ············································································································································ 72
Restart CPLD ··········································································································································· 72
Switch over between primary and backup HDM firmware images ··························································· 73
POST codes ····················································································································································· 73
View POST codes ···································································································································· 73
Manage the intelligent security bezel ··············································································································· 74
Manage service USB devices ·························································································································· 75
Users & Security ···························································································· 1
User accounts ···················································································································································· 1
View local user information ························································································································ 1
Configure the password policy for local users···························································································· 2
Configure privileges for custom users ········································································································ 3
Manage local user accounts ······················································································································ 5
User roles and privileges matrix ················································································································· 9
Configure LDAP settings ·························································································································· 13
Manage LDAP role groups ······················································································································· 15
Configure AD authentication ···················································································································· 16
Manage AD groups ·································································································································· 17
Configure two-factor authentication ········································································································· 19
Security ···························································································································································· 20
Configure firewall ····································································································································· 20
Manage an SSL certificate ······················································································································· 24
Configure PFR ········································································································································· 28
Configure the security tip for login············································································································ 29
Security modules·············································································································································· 31
View TPM/TCM status ····························································································································· 31
Unified control································································································ 1
Add devices························································································································································ 1
View device information ····································································································································· 2
Access HDM ······················································································································································ 3
Perform power actions ······································································································································· 3
Launch an H5 KVM remote console ·················································································································· 4
Delete devices···················································································································································· 5
Common operations ······················································································ 1
Configure virtual media ······································································································································ 1
Mount images through a Windows CIFS server························································································· 1
Mount images through a Linux CIFS server······························································································· 3
Import HDM configuration ·································································································································· 6
Import HDM user accounts ························································································································ 6
Import SNMP trap settings ······················································································································· 11
Set up a syslog server······································································································································ 13
Set up a Linux syslog server based on UDP or TCP ··············································································· 13
Set up a Linux syslog server based on TLS····························································································· 15
View rsyslog log ······································································································································· 19
Configure LDAP settings ·································································································································· 20
Install an OS············································································································································· 20
iii
Set up an LDAP server ···························································································································· 20
Configure the LDAP server ······················································································································ 36
Configure LDAP settings from HDM ········································································································ 42
Verify the LDAP configuration ·················································································································· 44
LDAP keywords········································································································································ 45
Appendix A Downloaded log files ································································ 1
iv
About HDM
Introduction
Hardware Device Management (HDM) is a remote server management system that provides the
following abundant features:
• Various management interfaces
HDM provides IPMI, HTTPS, SNMP, and Redfish, to meet various system integration
requirements.
HDM is compatible with IPMI v1.5 and IPMI v2.0 and provides a standard management
interface for standard management system integration.
• Remote maintenance
HDM provides remote access to the server through KVM (keyboard, video, and mouse)
and virtual media, enabling convenient server monitoring and management.
HDM supports out-of-band RAID monitoring and configuration to improve RAID
configuration efficiency and management capability.
HDM supports importing and exporting HDM, BIOS, or RAID configuration to improve
remote server management efficiency.
• Fault monitoring and diagnosis
HDM supports taking a screenshot or records a video upon a system crash for future
troubleshooting.
HDM supports using syslog messages, traps and emails to report alarms for
troubleshooting.
HDM provides all-round server monitoring, alarming, and event logging. It monitors server
operation, for example, CPU core temperature, voltage, and fan speed, and generates
alarms and logs if any event occurs, such as memory failure, drive failure, or power supply
failure.
HDM supports Smart Hardware Diagnosis (SHD) for component fault diagnosis, bringing
ease to fault location and faulty component replacement.
• Networking
HDM supports VLANs and the sideband technology that allows for flexible network
management.
NTP is available for time synchronization to improve time precision on the server.
HDM supports domain servers and directory servers to simplify user management and
improve security of user management.
• Security management
HDM supports primary/backup image switchover. The switchover enables startup by using
the backup image if the system crashes, which enhances system availability.
HDM provides various user interfaces to ensure user login security.
HDM supports uploading and replacing certificates to enhance data transmission security.
Platform Firmware Resiliency (PFR) is used to protect HDM from attacks.
• Smart power supply management
HDM provides power capping to precisely control the power consumption of each server,
helping arranging energy supply.
HDM supports configuring processor power states and the power supply operating mode to
achieve power saving.
1
• Unified control
HDM supports managing servers in bulk to improve efficiency.
• LCD display
A touchable 3.5-inch LCD display is optional for some H3C rack servers for the ease of
local maintenance.
The LCD display obtains server information from HDM to quickly obtain the health state of
the server.
HDM supports both Chinese and English. You click the or button to change the language
to Chinese and English, respectively.
2
SNMP management interface
Simple Network Management Protocol (SNMP) defines the standard management framework,
common communication languages, and security and access control mechanisms for device
monitoring and management in a network. It is widely used for remote management and operation
on network devices.
HDM provides SNMP-based programming interfaces. SNMP supports GET and SET operations,
and trap sending. Third-party management software can manage servers in a centralized manner
by using SNMP interfaces. The SNMP agents support SNMPv1, SNMPv2c, and SNMPv3.
An SNMP agent supports displaying the following information: system health status, hardware
status, memory and processor models, alarm reporting configuration, power statistics, asset
information, heat dissipation management, firmware version, and network management.
Applicable products
This document is applicable to the following products:
• AE100.
• H3C UniServer B5700 G3.
• H3C UniServer B5800 G3.
• H3C UniServer B7800 G3.
• H3C UniServer E3200 G3.
• H3C UniServer R2700 G3.
• H3C UniServer R2900 G3.
• H3C UniServer R4100 G3.
• H3C UniServer R4300 G3.
• H3C UniServer R4400 G3.
• H3C UniServer R4700 G3.
• H3C UniServer R4900 G3.
• H3C UniServer R4950 G3.
• H3C UniServer R5300 G3.
• H3C UniServer R6700 G3.
• H3C UniServer R6900 G3.
• H3C UniServer R8900 G3.
• H3C UniServer R4300 G5.
• H3C UniServer R4330 G5.
• H3C UniServer B5700 G5.
• H3C UniServer R4700 G5.
• H3C UniServer R4900 G5.
• H3C UniServer R4930 G5
• H3C UniServer R4950 G5.
• H3C UniServer R5300 G5.
• H3C UniServer R5500 G5.
• H3C UniServer R6900 G5.
3
Using this document
The figures of hardware options used in this document are for illustration only and might differ from
your product.
The screenshots in this document are subject to change over time.
Some data in this document is used as an example and might differ from your product.
4
Before you start
Guidelines for using HDM
• As a best practice, use a dedicated network port to manage and configure HDM.
• Do not connect HDM to the Internet.
• Do not use insecure protocols or ports.
• Audit the operation logs periodically.
HDM users
HDM supports the following types of users:
• Local users—HDM supports a maximum of 16 local users. The local access mode is suitable
for small-size scenarios such as laboratories and small- and medium-sized enterprises.
• Domain users (LDAP users and AD users)—The number of users and user permissions are
configured and managed on the domain server. This access mode is suitable for environments
with a large number of users.
FAQs
Fault diagnosis and location
HDM takes a bluescreen of death (BSoD) screenshot and video recording upon a system crash.
When the system fails and restarts, you can view the BSoD screenshot or the video for
troubleshooting.
1
Table 2 Causes and solutions for HDM Web interface access failures
2
Sign in to HDM
The following information describes the prerequisites for a successful sign-in to HDM, the default
sign-in parameters, the sign-in procedure, and global operations for all pages.
Browsers Resolution
Google Chrome 48.0 (or higher)
Minimum: 1366*768
Internet Explorer 11 (or higher)
Recommended: 1600*900 (or higher)
Mozilla Firefox 50.0 (or higher)
1
Figure 1 Connecting the server to the network (HDM dedicated network port on the R4900
G3)
You can obtain the HDM management IP address from the POST screen of the BIOS. As shown in
Figure 2, the POST screen displays the IPv4 addresses of the shared and dedicated network ports
at the upper right corner, and the IPv6 addresses at the lower left corner.
2
Figure 2 Obtaining the HDM management IP address (BIOS version 2.00.27)
Sign in to HDM
Restrictions and guidelines
By default, the session timeout is 30 minutes. If no operation is performed within 30 minutes, the
system logs you out.
After five consecutive password check failures, your account will be locked for five minutes.
For security purposes, change the default username and password at the first login, and update
your password periodically.
Procedure
1. Open the browser, and enter the HDM management IP address. This section uses Microsoft
Internet Explorer 11.0 as an example.
2. On the security certificate page that opens, click Continue to this website (not
recommended).
3
Figure 3 Security certificate confirmation page
3. On the sign-in page, enter the username and password, and then click Sign in.
If this is the first sign-in, enter the default username (admin) and password (Password@_).
The password is case sensitive.
4
Figure 4 HDM sign-in page
5
The HDM sign-in procedure is the same for blade servers and AE modules. This section uses the
procedure for blade servers as an example.
Method 1 Method 2
Sign in to OM
End
LAN
PC
Enclosure
6
Obtain OM sign-in settings
To sign in to the OM Web interface, you must obtain its management IP address and user account
information. On the first sign-in, use the default settings in Table 5.
Table 5 Default OM sign-in settings
Browsers Resolution
Google Chrome 58.0 (or higher) Recommended: 1600*900 (or higher)
Sign in to OM
1. Open the browser, and enter the OM management IP address in the format of
https://OM_ip_address.
2. On the sign-in page, enter the username and password, and then click Login.
If this is the first sign-in, enter the default username (admin) and password (Password@_).
The password is case sensitive.
Figure 6 Signing in to OM
7
Sign in to HDM
Authentication-free access
1. In the navigation pane of the OM Web interface, click Blade Servers, select the target server,
and then click Remote Consoles.
2. On the Remote Consoles tab, click the Access HDM button to sign in to HDM, as shown in
Figure 7.
If this is the first sign-in, click the Proceed to link as shown in Figure 8 to trust the webpage
that opens.
Figure 7 Authentication-free access
8
Figure 9 HDM Web interface
9
Figure 11 HDM Web interface
Global operations
You can perform the following operations on any HDM page:
10
View device information
View summary information about the device
The Dashboard presents summary information about the device, including basic information about
the device, system alarm status, device health information, and shortcuts for you to quickly access
the desirable function or feature menus.
NOTE:
The Dashboard pages on G3 and G5 servers are slightly different.
Procedure
Select Dashboard on the top navigation bar. Summary information about the device is displayed.
Figure 12 shows summary information for a G3 server. Figure 13 shows summary information for a
G5 server.
Figure 12 Summary information (G3 server)
1
Parameters
The work pane provides the following sections:
• Section 1—Displays the server status and basic information about the server.
Health status: Displays health status of the server.
− Normal—All server components are operating correctly.
− Critical, Major—A minimum of one component is experiencing issues.
UID LED: Displays the status of the UID LED on the server.
− On—The UID LED on the server is steady blue.
− Flashing—The UID LED on the server is flashing blue, indicating that the server is
upgrading firmware or the remote console for the server is launched.
− Off—The UID LED on the server is off.
Power status: Displays power status of the server.
− On—The server is powered on.
− Off—The server is powered off.
Number of alarms for each severity level
− Major—The event has serious impact on some subsystems and might result in service
interruption. Immediate action is required.
− Critical—The event might result in system crash or shutdown. Immediate action is
required.
Basic information about the server, including the following:
− Host name of the server.
− Product serial number of the server.
− Universally Unique Identifier (UUID) of the server.
− Current HDM firmware version
− Current BIOS firmware version.
− Server name. Only blade servers and AE modules support this field. By default, no
value is displayed.
− IPv4 addresses of the HDM network ports. This field displays the IPv4 addresses of
HDM dedicated and shared network ports if the network port mode is normal or
active/standby. If the network port mode is bonding, this field displays the IPv4 address
of bond port Bond0.
− MAC address of the HDM network port.
• Section 2—Displays the health status of the device components.
Normal: The component is operating correctly.
Major: The component performance is degraded significantly.
Critical: The server might shut down to prevent component damage.
Table 7 Component health status
2
Component Health status Description
• The temperature of a processor has
exceeded the critical threshold.
• An unrecoverable processor error has
occurred.
• The primary processor is absent.
• BIOS halt has occurred during POST
because of a processor error.
3
• Section 3—Provides shortcuts for you to quickly access the desirable function or feature
menus.
To access a remote console, you must first select a remote console type (KVM or H5 KVM).
For information about the KVM and H5 KVM launch modes, see "Launch a KVM or H5 KVM
remote console."
Buttons
The HDM Web interface provides buttons on the top right corner. Table 8 provides information
about the buttons.
Table 8 Buttons
The UID LED on the server is flashing blue, indicating that the server is
UID LED
upgrading firmware or the remote console for the server is launched.
The server is powered on. When you click this button, the following power
options are displayed for you to change the power status of the server.
• Force system reset—Warm reboots the server without power
cycling the server.
• Force power-off—Shuts down the server immediately by force.
This action is equivalent to pressing the power button on the server
Server power for five seconds.
• Graceful power-off—Shuts down the operating system first, and
then removes power from the server.
• Power on—Starts up the server.
• Force power-cycle—Powers off and then powers on the server.
Displays the name and login time of the current user and the number of
online users.
User
To display information about all online users, click Details.
To log out, click Logout.
4
System
View summary information
The Summary menu allows you to view information about the server, processors, memory, PCIe
modules, sensors, and other components.
The supported configurations vary by server model.
NOTE:
• HDM can display correct, complete processor, memory, and PCIe module information only after
the server completes POST.
• If the server is off, HDM displays the processor, memory, and PCIe module information obtained
at the most recent POST.
Parameters
• Product name: Server model.
• Server type: Server type.
• Part number: Part number of the server, which corresponds to the server model. This field
displays N/A if the system fails to obtain the server part number.
• Product serial number: Serial number of the server.
• Asset tag: Asset tag of the server. This field is optional. The asset tag is a string of 1 to 48
characters and can contain only letters, digits, spaces, and the following special characters: `
~!@#$%^&*()_+-=[]{}|;':\",./<>?
• Primary HDM version: Firmware version of the primary HDM image.
• Primary HDM complied at: Most recent update time of the primary HDM image.
1
• Secondary HDM version: Firmware version of the backup HDM image.
• Secondary HDM complied at: Most recent update time of the backup HDM image.
• BIOS Version: Version of the Basic Input Output System (BIOS).
• ME Version: Version of the Intel Management Engine (ME). This field is available only for
servers installed with an Intel processor.
• System board CPLD version: Version of the system board Complex Programmable Logical
Device (CPLD).
• STBCPLD version: Version of the system board STBCPLD firmware. This field is available
only for the R6700 G3 server.
• iFIST Version: Current version of the integrated Fast Intelligent Scalable Toolkit (iFIST). The
system displays N/A if HDM fails to obtain the iFIST version.
• PFR Version: Version of the PFRCPLD firmware. This field is available only for G5 servers.
Parameters
• Status: Operating status of the processor. If a processor is in abnormal state, view the fault
description to locate the errors.
• Model: Model of the processor.
• PPIN: Unique product code assigned by the manufacturer. This field displays N/A if HDM fails
to obtain the PPIN.
• Frequency: Base frequency of the processor.
• Cores: Cores of the processor.
• Threads: Number of the threads supported by the processor.
• 64 bits: Indicates whether the processor supports 64-bit computing.
• L1 cache: L1 cache of the processor.
2
• L2 cache: L2 cache of the processor.
• L3 cache: L3 cache of the processor.
• Fault description: Alarms generated for processor errors.
Parameters
Memory RAS settings
3
• ECC: Support for error-correcting code (ECC).
• Patrol Scrub: Patrol scrubbing settings. Patrol scrubbing allows a processor to automatically
search for and correct correctable memory errors at regular intervals.
• Memory RANK Sparing: Enablement status of Memory RANK Sparing, which reserves some
memory in each channel as backup in case of DIMM failures.
• SDDC: Enablement status of DRAM Single Device Data Correction (SDDC), which can correct
multiple bit errors in x4 or x8 chips.
• ADDDC: Enablement status of Adaptive Double Device Data Correction Sparing (ADDDC),
which can correct two-bit memory errors.
• Mirror Mode: Mirror mode. Options includes:
Disable—Disables memory mirroring.
Full Mirror Mode—Sets the entire 1LM memory in the system to be mirrored.
Partial Mirror Mode—Sets a part of the 1LM memory in the system to be mirrored.
Memory details (available for all DIMMs)
• Location: Processor ID, channel ID, and slot number of a DIMM.
• Status: Health status and authenticity status of a memory module. If a DIMM is in
abnormal state, view the fault description to locate the errors. The authenticity status indicates
whether the memory is vendor certified and available options include:
Vendor certified—The module has been certified.
Normal—The module has not been certified.
• Size: Capacity of the DIMM.
• Max frequency: Main frequency of the memory module.
• Generation: Generation of the DIMM.
• Vendor: DIMM manufacturer.
• Type: DIMM type.
• Rank: Rank type of the DIMM. Options include SR DIMM, DR DIMM, and QR DIMM.
• ECC: Support for error-correcting code (ECC).
• Serial number: Unique product code assigned by the manufacturer. This field displays N/A if
HDM fails to obtain the serial number.
• Part number: Part number of the DIMM. This field displays N/A if HDM fails to obtain the part
number.
• Frequency: Frequency at which the memory operates.
• Voltage: Voltage for the memory.
• Fault description: Alarms generated for DIMM errors.
4
Procedure
1. On the top navigation bar, click System.
You are placed on the Summary page.
2. Click the PCIe Modules tab to view PCIe module information.
3. To view information about a type of PCIe modules, click the corresponding tab.
Figure 17 Viewing PCIe module information
Parameters
Device list
• Slot: Slot of the PCIe module. For more information about slot locations, see the user guide for
the server.
• Status: PCIe module status, including Normal and Abnormal.
• Product name: Model of the PCIe module.
• Module vendor: Manufacturer of the PCIe module.
• Chip vendor: Chip manufacturer of the PCIe module.
• Serial number: Unique product code assigned by the manufacturer. This field displays N/A if
HDM fails to obtain the serial number.
• Part number: Part number of the PCIe module, which corresponds to the model of the PCIe
module. This field displays N/A if HDM fails to obtain the part number.
• Max speed: Maximum PCIe link rate.
• Negotiated speed: Auto-negotiated PCIe link rate.
• Max protocol: Supported latest generation of the PCIe standard.
• Negotiated protocol: Auto-negotiated generation of the PCIe standard.
• Max link width: Maximum link width supported by the PCIe slot.
• Device max link width: Maximum link width supported by the PCIe device.
• Negotiated link width: Auto-negotiated link width of the PCIe module.
• Mezzanine slot: Slot number of the mezzanine PCIe module. This field is displayed only for
blade servers.
• Processor: Processor to which the PCIe module is subordinate to. Support for this field
depends on the device model.
• Riser connector: Connector number of the riser card where the PCIe module is installed.
Network adapters
• Product name: Name of the network adapter.
• Port: Port type of the network adapter.
• Module vendor: Manufacturer of the network adapter.
5
• Chip vendor: Chip manufacturer of the network adapter.
• Mezzanine slot: Slot number of the mezzanine PCIe module. This field is displayed only for
blade servers.
• Firmware: Firmware version of the network adapter.
• Status: Network adapter health status. If a network adapter is in abnormal state, review the
event logs to locate the errors.
• Location: Physical location of the network adapter.
• Serial number: Unique product code assigned by the manufacturer. This field displays N/A if
HDM fails to obtain the serial number.
• Part number: Part number of the PCIe module, which corresponds to the model of the PCIe
module. This field displays N/A if HDM fails to obtain the part number.
• Network port: Network ports on the network adapter.
• MAC address: MAC address of the network port.
• PCIe Address: PCIe address of the network adapter, which contains the Bus:Device:Function
(BDF) information:
Bus: Bus number of the network adapter.
Device: Device number of the network adapter.
Function: Function number of the network adapter.
• Negotiated speed: Negotiated speed of the network port. This field displays N/A if HDM fails
to obtain the negotiated speed.
• Port type: Network port type. Options include Fiber and Copper.
• Port connection: Displays whether a cable is connected to the network port. Options include
Connected and Disconnected. This field displays N/A if HDM fails to obtain the connection
status.
• Fault description: Event log information about an error on the PCIe module.
• LLDP: Enablement status of LLDP for the network port. You can enable or disable LLDP as
needed. If the field is not configurable, the network port does not support LLDP. After enabling
or disabling LLDP, you must restart the server for the change to take effect.
GPUs
• Product name: Model of the GPU.
• Vendor name: Manufacturer of the GPU.
• Firmware version: Firmware version of the GPU.
• Status: GPU health status. If a GPU is in abnormal state, review the event logs to locate the
errors.
• Location: Number of the slot in which the GPU resides. For information about the slot location,
see the user guide for the server.
• Part number: Part number of the GPU, which corresponds to the model of the GPU module.
This field displays N/A if HDM fails to obtain the part number.
• Serial number: Unique product code assigned by the vendor. This field displays N/A if HDM
fails to obtain the serial number.
• Power: Current power of the GPU.
• Fault description: Event log information about an error on the PCIe module.
FC HBAs
• Product name: Model of the FC HBA.
• Vendor name: Manufacturer of the FC HBA.
• Firmware version: Firmware version of the FC HBA.
6
• Status: FC HBA health status. If an FC HBA is in abnormal state, review the event logs to
locate the errors.
• Location: Location of the FC HBA.
• WWPN: Worldwide port number (WWPN) for the network port.
• WWNN: Worldwide node name (WWNN) for the network port.
• Port connection: Displays whether a cable is connected to the network port. Options include
Connected and Disconnected. This field displays N/A if HDM fails to obtain the connection
state.
• Speed: Speed of the network port. This field displays N/A if HDM fails to obtain the speed.
• Fault description: Event log information about an error on the PCIe module.
QAT cards
• Product name: Model of the QAT card.
• Module vendor: Manufacturer of the QAT card.
• Chip vendor: Chip manufacturer of the QAT card.
• Status: QAT card health status. If a QAT card is in abnormal state, review the event logs to
locate the errors.
• Location: Number of the slot in which the QAT card resides. For information about slot
locations, see the user guide for the server.
• Part number: Part number of the QAT card, which corresponds to the model of the QAT card.
This field displays N/A if HDM fails to obtain the part number.
• Serial number: Unique product code assigned by the vendor. This field displays N/A if HDM
fails to obtain the serial number.
• Fault description: Event log information about an error on the PCIe module.
FPGA cards
• Product name: Model of the FPGA card.
• Module vendor: Manufacturer of the FPGA card.
• Status: FPGA card health status. If an FPGA card is in abnormal state, review the event logs
to locate the errors.
• Location: Number of the slot in which the FPGA card resides. For information about the slot
location, see the user guide for the server.
• Part number: Part number of the FPGA card, which corresponds to the model of the FPGA
card. This field displays N/A if HDM fails to obtain the part number.
• Serial number: Unique product code assigned by the vendor. This field displays N/A if HDM
fails to obtain the serial number.
• Fault description: Event log information about an error on the PCIe module.
7
3. Select the target component type to view the corresponding component information.
Figure 18 Viewing information about other components
Parameters
• Status: Component health status. If a component is in abnormal state, review the event logs to
locate the errors.
• Manufacturer: Manufacturer of the component.
• Part number: Part number of the component, which corresponds to the component model.
This field displays N/A if HDM fails to obtain the part number.
• Serial number: Unique product code assigned by the manufacturer. This field displays N/A if
HDM fails to obtain the serial number.
• CPLD version: Version of the CPLD firmware.
• STBCPLD version: Version of the system board STBCPLD firmware. This field is available
only for the R6700 G3 server.
• AUXCPLD version: Version of the AUXCPLD firmware. This field is available only for some
blade servers.
• PCB version: Version of the Printed Circuit Board (PCB) firmware.
• Module model: Model of the drive backplane.
• Current firmware version: Firmware version of the drive backplane.
• Current configuration file version: Configuration file version of the drive backplane.
• Bootloader version: Bootloader version of the drive backplane.
• EEPROM version (for firmware): Electrically erasable programmable read only memory
(EEPROM) version of the drive backplane.
• Fault description: Event log information about errors on the components.
8
Restrictions and guidelines
R4950 G3 and R4950 G5 servers support displaying only the average sensor readings.
HDM cannot obtain the sensor readings during restart.
Restoring HDM settings clears the sensor reading statistics.
Only linear sensors support this feature.
Procedure
1. On the top navigation bar, click System.
You are placed on the Summary page.
2. Click the Sensors tab to view the corresponding information.
3. To view sensor readings on the Sensors tab, select a sensor type and name. You can perform
the following tasks in the work pane:
To clear the history readings and start a new statistics collection period, click Restart.
To view sensor readings for the past 24 hours or past 7 days in the line chart, select Past
24 hours or Past 7 days. You can hover over the lines in the chart to view the minimum,
average, and minimum readings during the statistics collection period.
To view only the maximum, average, or minimum sensor readings, click the Max,
Avg, or Min icon, respectively.
Figure 19 Viewing the sensor reading chart
Storage
The Storage menu allows you to perform the following tasks:
• View information about storage controllers, logical drives, physical drives, and storage errors.
• Manage physical and logical drives controlled by the following storage controller in an
out-of-band manner:
RAID-LSI-9361-8i(1G)-A1-X
9
RAID-LSI-9361-8i(2G)-1-X
RAID-LSI-9361-8i(2G)
RAID-LSI-9460-8i(2G)
RAID-LSI-9460-8i(4G)
RAID-LSI-9460-16i(4G)
HBA-LSI-9440-8i
RAID-L460-M4
RAID-P5408-Mf-8i-4GB
RAID-P5408-Ma-8i-4GB
HBA-H5408-Mf-8i
RAID-LSI-9560-LP-16i-8GB
RAID-LSI-9560-LP-8i-4GB
For more compatibility information, visit the OS compatibility query tool at
http://www.h3c.com/cn/Service/Document_Software/Document_Center/Server/.
NOTE:
In HDM-2.96 and later versions, you can scan the QR code on the screen to view the function
diagram or give feedback.
10
Figure 20 Viewing storage summary information
11
Figure 21 Viewing storage controller information
Parameters
Storage controller
• Model: Model of the storage controller.
• Vendor: Vendor of the storage controller.
• Firmware version: Firmware version of the storage controller.
• Package version: Software package version of the storage controller. This field is available
only for some LSI storage controllers.
• Configuration version: Configuration version of the storage controller.
• Serial number: Serial number of the storage controller.
• WWN: SAS address of the storage controller.
• Mode: Storage controller mode.
For the LSI storage controller, supported options include RAID and JBOD.
For the PMC storage controller, supported options include RAID, HBA, Mixed, Simple
volume, and Auto volume.
• JBOD mode: Enablement status of JBOD mode in the BIOS.
12
• Connector type: Connector type supported by the storage controller.
• Data rate: Data rate supported by the connectors of the storage controller.
• Built-in cache: Capacity of the read/write cache embedded in the storage controller.
• Flash: Status of the flash card of the power fail safeguard module.
For an LSI storage controller, status options include:
− Normal—The flash card is operating correctly.
− Abnormal—The flash card is operating incorrectly.
− Absent—The flash card is not connected to the supercapacitor, not installed securely,
or not installed at all.
For a PMC storage controller, status options include:
− Normal—The flash card is operating correctly.
− Absent—The flash card of the power fail module is not securely installed or is not
installed at all.
− Abnormal_status code—The flash card is operating incorrectly. You can check the
status code to identify the exceptions that cause the flash card to enter the abnormal
state.
− Warning_status code—A warning is present on the flash card. You can check the
status code to identify the exceptions that cause the flash card to enter the warning
state.
A status code is a hexadecimal number. To identify the exceptions, convert the
hexadecimal status code into a 16-digit binary number (bit 0 to bit 15 from the right to the
left). A set bit means that the exception indicated by the bit is present. For information
about a set bit and its corresponding exception, see Table 9.
For example, if the status code is 0x500 (binary format 0000 0101 0000 0000), exceptions
indicated by bit 8 and bit 10 are present on the flash card.
Table 9 Flash card exceptions and their set bits
13
Bit# Bit state Description
Replacement is required.
14 N/A Reserved.
15 N/A Reserved.
NOTE:
The Green backup (GB) system reports several types of operation status progress and
health information.
NOTE:
The Flash and Charging status fields are available only if a power fail safeguard module is
installed. A power fail safeguard module contains a flash card and a supercapacitor. When a
system power failure occurs, this supercapacitor can provide power for a minimum of 20 seconds.
During this interval, the storage controller transfers data from memory to the flash card, where the
data remains indefinitely or until the controller retrieves the data.
14
Figure 22 Logical drive information
Parameters
• Name: Name of the logical drive, a string of 0 to 15 characters. As a best practice, use letters
and digits, and do not use special characters, such as exclamation points (!), at signs (@), and
pound signs (#). For a PMC storage controller, this field is required.
• Spans/Parity groups: Number of spans or parity groups for mixed-mode RAID (RAID 00,
RAID 10, RAID 50, or RAID 60).
• Initialization type: Select an initialization type. Options include:
No—Does not initialize the logical drive.
Fast—Initializes the first and last 8 MB of the logical drive for data write upon drive creation,
and then initializes the remaining space in background.
Full—Initializes all space in the logical drive.
• Capacity: Enter the drive capacity. The minimum capacity of a logical drive is 100 MB. If you
do not specify a capacity, the maximum capacity is used.
• Dedicated hot spare: Dedicated hot spare disks for redundancy-capable logical drives.
• Status: Status of the logical drive. Options include:
Optimal—The logical drive is operating correctly.
Degraded—Some RAID member drives have failed and require prompt replacement.
Rebuilding—The RAID array is being rebuilt to reconstruct data and recover from the
degraded state.
Offline—The logical drive is corrupt and inaccessible.
Zeroing—The logical drive is being formatted. All data will be deleted upon this action.
Scrubbing—The member drives are being scanned to maintain data continuity in the
logical drive. This field is available for logical drives with parity bits, such as RAID 5 and
RAID 6 logical drives.
Suboptimal—One member drive in the RAID 6 or RAID 60 logical drive has failed. If more
than one member drive has failed, the logical drive is placed in Degraded state. This field
is available for RAID 6 and RAID 60 logical drives.
Morphing—Data is being migrated between drives or the RAID array is changing to a new
RAID level.
15
Copying—Data is being copied from the hot spare disk back to the replacement drive of a
failed drive. When this operation is complete, the hot spare returns to the hot standby state.
• Level: RAID level.
• BootEnable: Indicates whether the logical drive is a boot drive. Support for this field depends
on the storage controller model. Options include:
True—The logical drive is a boot drive.
False—The logical drive is not a boot drive.
• Stripe size: Stripe size of each physical drive. Support for this field depends on the storage
controller model.
• Read policy: Read policy for the logical drive. Support for this field depends on the storage
controller model. Options are:
No read ahead—Disables read ahead capability.
Read ahead—Enables read ahead capability. When this capability is enabled, the
controller reads sequentially ahead of requested data and stores the additional data in
cache memory.
• Write policy: Write policy for the logical drive. Support for this field depends on the storage
controller model. Options are:
Write through—Enables the controller to send a data transfer completion signal to the
host when the drive subsystem has received all data in a transaction.
Write back—Enables the controller to send a data transfer completion signal to the host
when the controller cache receives all data in a transaction. If the storage controller is not
installed with a supercapacitor or if the supercapacitor is faulty, the Write through policy is
used.
Always write back—Enables the controller to send a data transfer completion signal to
the host when the controller cache receives all data in a transaction.
• I/O policy: I/O policy for the logical drive. Support for this field depends on the storage
controller model. Options include:
Direct—Enables the cache module to process all read and write operations of the storage
controller.
Cached—Disables the cache module from processing any read or write operations on the
storage controller.
• Drive cache: Indicates whether drive cache is enabled for the logical drive. Support for this
field depends on the storage controller model. Options include:
Unchanged—The default drive cache policy is used.
Enable—Drive cache is enabled.
Disable—Drive cache is disabled.
• Access policy: Access policy for the logical drive. Support for this field depends on the
storage controller model. Options include:
Read/Write.
Read only.
Blocked.
• Acceleration method: Status of read/write cache. Support for this field depends on the
storage controller model. Options include:
Controller Cache—Enables read/write cache.
None—Disables read/write cache.
IO Bypass—Enables the storage controller to use I/O bypass paths to enhance read/write
performance. This feature is available only on SSDs.
16
Manage physical drives
Perform this task to view information about physical drives, change drive status, create hot spare
drives, and turn on the drive UID LED.
Restrictions and guidelines
If the storage controllers or drive backplanes are not installed as expected, the physical drive
numbers might be incorrect.
If the drive status is Failed, the drive information (including the drive size, speed, and interface type)
might be inaccurate and is provided only for reference.
You cannot change the state of physical drives in Unconfigured Good (Foreign), Unconfigured Bad
(Foreign), or Online state.
When you create hot spare drives, follow these restrictions and guidelines:
• Only spare physical drives can be used as hot spare drives, and member drives of logical drive
cannot be configured to provide the hot spare service.
• Make sure the physical drive to be used is an SATA or SAS drive and its capacity is not smaller
than the minimum capacity of a member drive. The physical drive must have the same type
(SATA/SAS) as the member drives of the logical drive.
• You can create hot spares for logical drives of any RAID level, except for RAID 0.
• If an LSI storage controller is used, make sure the physical drive to use is in Unconfigured
Good state. If a PMC storage controller is used, make sure the physical drive to use is in
Ready or Hot Spare state.
Procedure
1. On the top navigation bar, click System.
2. In the left navigation pane, select Storage.
3. To view information about a physical drive that has been used for creating logical drive:
a. On the Logical view tab, select a storage controller and a logical drive.
b. Select the physical drive.
c. If an LSI storage controller is installed, you can click Change status to change the physical
drive state.
d. To set the hot spare state of a physical drive, click Edit.
− Physical drives managed by an LSI storage controller support global hot spare and
dedicated hot spare. With an LSI controller used, you can select multiple logical drives
when creating a dedicated hot spare.
− Physical drives managed by a PMC storage controller only support dedicated hot spare.
With a PMC storage controller used, you can select only one logical drive and must
repeat the creation task to specify multiple logical drives for a dedicated hot spare.
e. (Optional.) To locate the drive, enable the drive UID LED. This feature is available only for
some physical drives.
17
Figure 23 View physical drive information (logical view)
4. To view information about physical drives that are not used for creating logical drive:
a. Click the Physical view tab.
b. (Optional.) To change the physical drive state, click Change status. This feature is
available only for some physical drives.
c. (Optional.) To locate the drive, enable the drive UID LED. This feature is available only for
some physical drives.
18
Figure 24 View physical drive information (physical view)
Parameters
HDD and SSD drives
• Slot: Slot number of the physical drive.
• Drive number in BIOS: Drive number displayed in the BIOS.
• Vendor: Vendor of the physical drive.
• Model: Model of the physical drive.
• Firmware version: Firmware version of the physical drive.
• Serial number: Serial number of the physical drive.
• Status: Status of the physical drive. Options include:
If an LSI storage controller is installed, you can click Change status to change the physical
drive state.
Ready/Unconfigured Good—The physical drive has been initialized or has not been
configured, and it is available for RAID configuration and hot spare setting. The status
name depends on the storage controller model.
Unconfigured Bad—The physical drive is in abnormal state. To use the physical drive,
you must change the physical drive state to Unconfigured Good. If an error has occurred
on the physical drive, you will fail to change the physical drive state. In this case, you need
to replace the faulty drive.
19
Unconfigured Good (Foreign)—The physical drive has residual RAID information. After
you clear residual RAID information, the physical drive state changes to Unconfigured
Good.
Unconfigured Bad (Foreign)—The physical drive has residual RAID information. After
you clear residual RAID information, the physical drive state changes to Unconfigured
Bad.
Optimal/Online—The physical drive is already used to create a RAID. The status name
depends on the storage controller model.
Offline—The physical drive is disabled.
Rebuilding—The physical drive is being used in RAID rebuilding.
Hot spare—The physical drive is already used as a hot spare.
JBOD—The physical drive is a passthrough drive, which can be used directly in the OS
without RAID building.
Failed—The physical drive failed.
Predict_Fail/PFA—The physical drive is analyzing possible failures. The status name
depends on the storage controller model.
Raw—A new physical drive or a physical drive in Unconfigured good state is uninitialized.
Normal—The physical drive is used as a common hard disk for storage. It is not used for
other purposes.
Copyback—Data is being copied from the hot spare disk back to the replacement drive of
a failed drive. When this operation is complete, the hot spare returns to the hot standby
state. This field is available only for a physical drive attached to an LSI storage controller.
• Rebuilding progress: Rebuilding progress of the physical drive in RAID rebuilding. This field
is displayed for a physical drive only when the drive is in Rebuilding state.
• Type: Interface speed, interface type, and drive type of the physical drive. This field displays
the negotiated speed, instead of the interface speed, for some storage controllers.
• Capacity: Capacity of the physical drive.
• Remaining life: Remaining drive life in percent. This field is available only for the following
drives when the drives are attached to an LSI storage controller that supports out-of-band
RAID configuration:
Intel SSD S4610 drives.
Intel SSD S4600 drives.
Intel SSD S4510 drives.
Intel SSD S4500 drives.
Intel SSD S3520 drives.
Micron SSD 5200 drives.
Samsung SSD drives.
• UID LED: Drive UID LED status. You can click this field to manage the drive UID LED. This
field is available only when the drive is directly connected to the drive backplane.
• Hot spare status: Hot spare status of a physical drive. When a member of a logical drive fails,
a hot spare can replace the faulty member to store data. The supported hot spare status varies
by the storage controller type.
Global hot spare—Acts as the spare for all qualified logical drives managed by an LSI
storage controller. After the faulty drive recovers, data will be transmitted back to the drive
from the hot spare, and the hot spare continues to operate in global hot spare state.
Dedicated hot spare—Acts as the spare for the specified logical drives. After the faulty
drive recovers, data will be transmitted back to the drive from the hot spare, and the hot
spare continues to operate in dedicated spare state.
NVMe drives
20
• Product name: Product name of the NVMe drive.
• Vendor: Manufacturer of the NVMe drive.
• Status: NVMe drive status:
Normal—The NVMe drive is operating correctly.
Abnormal—A bus uncorrectable error, bus fatal error, or PCIe err error has occurred on
the NVMe drive.
Spare space below threshold—The available space in the NVMe drive has fallen below
the threshold.
Temperature anomaly—The NVMe drive temperature is above the upper threshold or
below the lower threshold.
Subsystem degraded—The NVMe subsystem reliability has been degraded because of
storage media or internal errors.
Read-only mode—The NVMe drive has been placed in read only mode.
Cache failed—The volatile memory backup device has failed.
• Firmware version: Firmware version of the NVMe drive. This field displays N/A if HDM does
not support displaying the firmware version of the NVMe drive.
• Serial number: Serial number of the NVMe drive.
• Model: Model of the NVMe drive.
• Interface type: Interface type of the NVMe drive.
• Capacity: Capacity of the NVMe drive.
• Physical location—NVMe drive slot number.
• Slot number—NVMe drive slot number or PCIe slot number assigned to the drive by the
system.
• Max speed—Maximum speed supported by the NVMe drive.
• Percentage drive life used: Estimate of the percentage of NVMe subsystem life used. The
value can be greater than 100.
• UID LED: Drive UID LED status. You can click this field to manage the drive UID LED. This
field is available only when the drive is directly connected to the drive backplane.
Power management
Power on or power off the server
CAUTION:
The force power-off, force system reset, and force power-cycle actions might cause corruption or
loss of data. When you perform these actions, make sure you fully understand their impact on the
services.
Procedure
1. On the top navigation bar, click System.
2. In the left navigation pane, select Power Management.
3. Click the Power status tab to view the current power status of the server.
4. To change the power status, click the desired action.
5. Select whether to enable or disable the physical power button as needed. This button is
available only for G5 servers (blade servers excluded).
21
Figure 25 Powering on or powering off the server
Parameters
• Force system reset: Warm reboots the server without power cycling the server.
• Force power-off: Shuts down the server immediately by force. This action is equivalent to
pressing the power button on the server for five seconds.
• Graceful power-off: Shuts down the operating system first, and then removes power from the
server.
• Power on: Starts up the server.
• Force power-cycle: Powers off and then powers on the server.
• Disable physical power button: Controls the physical power button. With the power button
disabled, users cannot use the physical power button to manage the power status of the
server.
22
Figure 26 View power supply information
23
Parameters
• Power mode: Role of the power supply. Options include Active and Standby. The active
power supplies provide power normally and the standby power supplies provide low power
output.
• Power input: Input power of the power supply
• Current status: Status of the power supply. If a power supply is in abnormal state, review the
event logs to locate the errors.
• Slot number: Number of the slot in which the power supply resides.
• Vendor: Manufacturer of the power supply.
• Model: Model of the power supply.
• Serial number: Unique code assigned by the manufacturer.
• Firmware version: Firmware version of the power supply.
• Rated power: Rated power of the power supply.
• Input voltage: Input voltage of the power supply.
• Output voltage: Output voltage of the power supply.
• Power input mode: Power input mode. Options include:
No input: The power supply is not connected to the power source.
AC: The power supply is connected to an AC power source.
HVDC: The power supply is connected to a high-voltage DC power source. The voltage is
in the range of 192 V to 400 V.
LVDC: The power supply is connected to a low-voltage DC power source. The voltage is in
the range of 12 V to 72 V.
• Supported power input modes: Power input modes supported by the power supply. Options
include:
AC: The power supply supports only the AC input mode.
AC or DC: The power supply supports both the AC and DC input modes.
DC: The power supply supports only the DC input mode.
Unknown: HDM has failed to obtain the power supply information.
• Fault description: Event log information about power supply errors.
24
Active/standby—Allows active power supplies to mainly provide power. In this mode, you
must specify a minimum of one active power supply and a minimum of one standby power
supply. If an active power supply fails, a standby power supply becomes active to supply
power. If an actual power consumption of the active power supply exceeds 62% of its
maximum rated power consumption, a standby power supply becomes active to supply
power. The active/standby switchover will not be performed after the power consumption of
the original active power supply drops.
6. Click OK.
Figure 28 Setting the power supply operating mode
Parameters
Fault description: Event log information about power supply errors.
25
Figure 29 Configuring automatic power-on
Parameters
Fault description: Event log information about power supply errors.
26
To view only the maximum, average, or minimum power consumption, click the Max,
Avg, or Min icon, respectively.
Figure 30 Viewing power consumption information
27
2. In the left navigation pane, select Power Management.
3. In the work pane, click the Power Consumption tab.
4. Click the icon in the Power alarming section.
5. In the dialog box that opens, enable power alarming and then specify the alarm threshold.
6. Click OK.
Figure 32 Configuring power alarming
28
Restrictions and guidelines
CAUTION:
Server shutdown upon a power capping failure causes service interruption. To use this function,
make sure you understand the impact.
The blade servers and AE modules do not support system board power capping configuration.
Only the R5500 G5 server supports GPU power capping configuration.
Power capping is at the expense of system performance. Select the power cap value carefully to
avoid undesirable decrease in performance.
To avoid GPU power capping configuration invalidity, make sure the GPU driver is installed in the
OS before configuring GPU power capping settings.
HDM cannot obtain the server power consumption statistics during restart.
Restoring the HDM settings clears the power consumption statistics.
Procedure
1. On the top navigation bar, click System.
2. In the left navigation pane, select Power Management.
3. In the work pane, click the Power Consumption tab.
4. Click the icon in the System board power capping or GPU power capping section.
5. In the dialog box that opens, enable power capping, set the power cap value, and then set the
action to take upon a power capping failure.
6. Click OK.
29
Figure 33 Configuring power capping
30
Procedure
1. On the top navigation bar, click System.
2. In the left navigation pane, select Power Management.
3. Click the Processor Power States tab.
4. Click Advanced Settings.
5. Adjust the preferred P-state or T-state value and then click OK.
The available state values vary by processor model.
6. Select the power supply performance mode, and then click Save. The performance mode
options include:
Performance—Indicates the performance first mode.
Balanced—Indicates the balanced performance and power consumption mode.
Power—Automatically adapts the speed and energy consumption of the processors to
processor usage. This mode reduces the total consumption and has little or no impact on
the performance.
7. Restart the server for the configuration to take effect.
Figure 34 Configuring power saving
Parameters
• P-state: Defines the operating frequency of processors. A smaller P-state value represents a
higher operating frequency, which translates to higher performance and higher power
consumption.
• T-state: Defines the duty cycle of processors. A smaller T-state value represents a higher duty
cycle, which translates to higher performance and higher power consumption.
Thermal management
View status and readings of temperature sensors
HDM presents temperature data in both heatmap and table formats to help you monitor the cooling
performance of the server.
• The temperature heatmaps use colors between green and red to show the temperature
distribution inside the server chassis in 2D and 3D views and use circles to represent sensors.
Green indicates 0°C (32°F). As the temperature gets higher, the color gets warmer until it
changes to red. With the temperature heatmaps, you can quickly identify the component that is
in a poor cooling condition.
• The temperature sensor table displays the temperature reading, status, and coordinates of
each sensor.
31
Restrictions and guidelines
The temperature heatmaps do not display sensors whose reading is negative.
NOTE:
In HDM-2.96 and later versions, you can scan the QR code on the screen to view the functional
diagram or give feedback.
Procedure
1. On the top navigation bar, click System.
2. In the left navigation pane, select Thermal Management.
3. View the temperature heatmap and sensor list.
Figure 35 Viewing status and readings of temperature sensors
Parameters
• Status: Temperature status of a component:
Normal—The temperature is normal, between the lower and upper minor thresholds
(exclusive). No action is required.
Minor—The temperature is between the lower major threshold (exclusive) and lower minor
threshold (inclusive) or between the upper minor threshold (inclusive) and upper major
threshold exclusive). Administrative attention is required.
Major—The temperature is between the lower critical threshold (exclusive) and lower
major threshold (inclusive) or between the upper major threshold (inclusive) and upper
critical threshold (exclusive). Immediate action is required.
Critical—The temperature is equal to or below the lower critical threshold, or it is equal to
or above the upper critical threshold. Immediate action is required.
N/A—The monitored component is not installed or the temperature sensor cannot be read.
• Reading: Current temperature. If HDM fails to read the sensor, this field displays N/A.
• Thresholds: Temperature thresholds:
32
Critical—Lower and upper critical thresholds. When the temperature reaches either
threshold, the server might automatically shut down to avoid damage to its components.
Major—Lower and upper major thresholds. If the temperature reaches either threshold,
server performance will significantly degrade.
Minor—Lower and upper minor thresholds. If the temperature reaches either threshold,
server performance will slightly degrade.
Manage fans
Perform this task to view fan information and fan errors and configure the fan speed mode.
You can adjust the fan speed mode to optimize the cooling, noise control, and energy efficiency
performance.
Restrictions and guidelines
This feature is not available for blade servers or AE modules.
Set the preferred fan speed mode
1. On the top navigation bar, click System.
2. In the left navigation pane, select Thermal Management.
3. View fan information.
4. Click Fans.
5. Select a fan speed mode.
6. Click OK.
Figure 36 Viewing fan information
33
Figure 37 Managing fans
Parameters
• Status: Operation status of the fan.
• Model: Fan model.
• Rotation speed (RPM): Current actual rotational speed.
• Rotation speed (%): Current RPM as a percentage of the rated RPM.
• Fault description: Alarms generated for fan errors.
• Silent: Enables the fans to run at the lowest speed required by heat dissipation of the server.
This mode is suitable for scenarios with high noise requirements.
• Balanced: Enables the fans to run at a higher speed to provide balanced noise control and
cooling performance.
• Powerful: Enables the fans to run at the highest possible speed. This mode is suitable for
scenarios where the server requires high cooling performance. For example, the server is busy
and key components, such as processors, are heavily loaded, or the ambient temperature
changes frequently.
• Custom: Specifies a customized fan speed level. A higher level represents a higher speed and
larger noise.
Resource summary
Set resource usage alarm thresholds
Perform this task to set the alarm thresholds for processor, memory, and disk usage.
Restrictions and guidelines
To use this feature, you must install and run FIST SMS in the operating system of the server. For
more information, see H3C Servers FIST SMS User Guide.
You cannot set the alarm threshold for the bandwidth usage from HDM. To set this alarm threshold,
use IPMI commands. For more information, see H3C HDM IPMI Basics Command Reference.
The system generates a log entry when an alarm occurs or is cleared. You can view the alarms in
the event logs.
Procedure
1. On the top navigation bar, click System.
2. In the left navigation pane, select Resource Summary.
3. Click the Resource summary tab to view the current processor usage, memory usage, disk
usage, disk partition directory, used disk space, and total partition size.
34
Figure 38 Viewing resource summary
Parameters
Drive usage threshold (%): Proportion of used disk space to the total size of the partition, disk
partition directory, used space, and total partition space.
35
View CUPS information
The Compute Usage Per Second (CUPS) feature provides real-time monitoring of processor (CPU),
memory, and I/O usage in the system. It uses the proportions of dynamic load factors for CPU,
memory, and I/O usage to indicate the type of main services running on the system. The CUPS load
factors are uncorrelated with resource usage calculated in the OS.
A higher CPU, memory, or I/O CUPS dynamic load factor indicates that main services running on
the system are compute-intensive, memory-intensive, or I/O-intensive.
Restrictions and guidelines
This feature is not available for the R4950 G3, R4330 G5, R4930 G5, R4950 G5, or R5500 G5 AMD
server.
The line chart displays the sum of the CPU, memory, and I/O CUPS load factors. To view the value
of each load factor, hover over the line in the chart. The sum is 0% if all the three load factors are
0%.
The CPU, memory, and I/O CUPS dynamic load factors are all 0% when the server is powered off
or no service runs in the operating system.
CUPS monitoring is an out-of-band function and does not consume processor resources.
Restoring HDM settings clears CUPS statistics.
The CPU and MEM CUPS dynamic load factors are uncorrelated with the CPU and MEM usage
calculated in the OS.
Procedure
1. On the top navigation bar, click System.
2. In the left navigation pane, select Resource Summary.
3. Click the CUPS tab to view CUPS information.
Figure 40 Viewing CUPS information
Parameters
• CPU CUPS dynamic load factor: Cumulative usage of CPU cores. A higher CPU CUPS
dynamic load factor indicates that main services running on the system are compute-intensive.
36
• Memory CUPS dynamic load factor: Cumulative transfer rate of the memory bus, which
does not relate to used memory. A high memory CUPS dynamic load factor indicates a high
access frequency to the memory bus. The memory usage in the OS is the total memory
capacity divided by the used memory capacity. For example, if 2GB of 8GB memory is used,
the memory usage is 25%.
• I/O CUPS dynamic load factor: I/O bandwidth usage of the PCIe bus. A higher I/O CUPS
dynamic load factor indicates that main services running on the system are I/O-intensive.
System settings
Configure boot options
You can configure the boot mode and boot device for the server to use at the next reboot in the
Boot Options or System Boot Order section.
The system boot order defines the priorities of devices that the server attempts to boot from.
Restrictions and guidelines
• If you configure boot options at the BIOS startup phase, the configuration might fail to take
effect.
• If the permanent boot options conflict with the system boot order settings, the permanent boot
options take effect.
• If the one-time boot options conflict with the system boot order settings, the one-time boot
options take effect at the next reboot.
• Only G5 servers support configuring boot options.
• You can set the system boot order only in HDM-2.11 and later.
Prerequisites
Verify that the hard disk drive supports the legacy mode if you are configuring the server to boot
from a hard disk drive in legacy mode.
Configure boot options for the next reboot
1. On the top navigation bar, click System.
2. In the left navigation pane, select System Settings.
3. Click the Boot Options tab.
4. In the System Boot Options section, select a validity period for the next boot mode and
option.
To have the settings take effect only for the next reboot, select One time.
To have the settings take effect for all subsequent reboots, select Permanent.
The Permanent option is not available for the B5700 G3, B5800 G3, B7800 G3, B5700 G5,
or AE100.
5. Select a next boot mode.
To boot to a UEFI compatible operating system, select UEFI.
To boot to a traditional operating system in Legacy BIOS compatibility mode, select
Legacy BIOS.
The AE100 does not support the legacy mode.
To use the BIOS settings at the next reboot, select No override.
6. Select the boot device for the next reboot from the Boot option list. The BIOS option is not
available if the validity period is Permanent.
To use the BIOS settings at the next reboot, select No override.
37
7. Click Save.
Figure 41 Configuring boot options for the next reboot
38
Figure 42 Setting the system boot order
Parameters
• Boot mode: Selects the boot mode for the next startup.
• Boot option: Selects the boot device for the next startup.
• Current boot mode: Displays the boot mode for the most recent startup.
• Current first boot option: Displays the first boot device for the most recent startup.
39
As a best practice, configure this feature under the guidance of the technical support.
Switch single-system mode to dual-system mode
Restrictions and guidelines
Before a partitioning mode switch, make sure the following requirements are met:
• The server is powered off, and HDM is not being updated.
• HDM, the BIOS, and all CPLD firmware of support partitioning mode configuration and are
compatible with each other.
Prerequisites
If not all firmware of the server support partitioning mode configuration, perform the following steps
to update the firmware:
1. Update HDM, the BIOS, and all CPLD firmware to versions that support partitioning mode
configuration.
2. Power off the server, and switch the positions of management modules 1 and 2.
3. Power on the server, and update HDM, the BIOS, and all CPLD firmware again to versions
that support partitioning mode configuration.
Procedure
1. On the top navigation bar, click System.
2. In the left navigation pane, select System Settings.
3. Click the Hard Partitioning tab.
4. Select the dual-system mode.
5. Enter the username and password of a user account.
Make sure the user account has the administrator or operator role or the remote control
privilege.
6. Click Save.
To have the partitioning mode configuration take effect, restart the server with its power
reconnected.
40
Figure 43 Switching single-system mode to dual-system mode
41
• All systems have the same PDBCPLD firmware version and NDCPLD firmware version.
• HDM and the BIOS of all systems support partitioning mode configuration.
• You can perform a partitioning mode switch only from HDM of management module 1.
Procedure
1. Log in to HDM of management module 1.
2. On the top navigation bar, click System.
3. In the left navigation pane, select System Settings.
4. Click the Hard Partitioning tab.
5. Select the single-system mode.
6. Enter the username and password of a user account.
Make sure the user account has the administrator or operator role or the remote control
privilege.
7. Click Save.
To have the partitioning mode configuration take effect, restart the server with its power
reconnected.
Figure 44 Switching dual-system mode to single-system mode
42
If the HDM shared network port is connected, the method for obtaining the management IP
address of the HDM shared network port varies by IP address obtaining method before the
switch.
− If the IP address was automatically assigned by the DHCP server before the switch, the
IP address remains after the switch.
− If the IP address was a static IP address before the switch, a new IP address is
automatically assigned by the DHCP server. You can obtain the new IP address from
the POST screen of the BIOS.
2. On the HDM sign-in page, enter the default username (admin) and password (Password@_).
The password is case-sensitive.
43
Configuration
Network
IMPORTANT:
The HDM dedicated network port is not available for the AE100 or blade servers.
You can log in to HDM from the HDM dedicated network port or the HDM shared network port.
The dedicated network port can process only HDM management traffic. By default, the dedicated
network port uses IPv4 address 192.168.1.2/24 and obtains an IPv6 address from the DHCP
server.
The shared network port transmits HDM management traffic and server data traffic simultaneously.
By default, the shared network port automatically obtains its IP address through DHCP.
1
Figure 45 Viewing information about the dedicated network port
Parameters
• Port state: This field is available only when the network port mode is active/standby. Options
include:
Active—The port is connected and in active state.
Disconnected—The port is disconnected.
• Port connection: Displays whether a cable is connected to the port. Options include:
Disconnected—The port is disconnected.
Active—The port is connected and is in active state.
2
To manually configure static IP address settings, clear Automatic IP obtaining, and then
enter an IPv4 address, subnet mask, and default gateway address.
The default IP address of the HDM dedicated network port is 192.168.1.2/24. A gateway
address of 0.0.0.0 indicates that no default gateway is specified.
5. Click Save.
Figure 46 Configuring IPv4 settings
3
Figure 47 Configuring IPv6 settings
4
View shared network port information
You can perform the following tasks:
• Enable or disable Network Controller Sideband Interface (NCSI).
• View information about the shared network port, including port name, MAC address, IP
addresses, VLAN settings, and port connection state when NCSI is enabled.
Procedure
1. On the top navigation bar, click Configuration.
You are placed on the Network page.
2. Click the Shared Port tab.
3. Enable or disable NCSI as needed, and then click OK in the dialog box that opens.
HDM restarts for the configuration to take effect, and the current session is disconnected.
If you enabled NCSI, you can re-log in to HDM to view information about the shared
network port or configure the shared network port.
If you disabled NCSI, the shared network port is inaccessible.
Figure 49 Viewing information about the shared network port
Parameters
• Port state: This field is available only when the network port mode is active/standby. Options
include:
Active—The port is connected and in active state.
Disconnected—The port is disconnected.
Standby—The port is connected and in standby state.
• Connection Information: Displays connection information about shared network ports,
including automatic shared port selection state, network adapter type, and network port
connection state. This field is not available when no network adapter is installed or the installed
network adapters do not support NCSI. Options include:
Disconnected—The port is disconnected.
Connected—The port is connected but is not in active state.
Active—The port is connected and is in active state.
5
Configure the shared network port
Perform this task to configure the IPv4 address, IPv6 address, and VLAN settings of the shared
network port, change the shared network port, or enable automatic shared port selection when
NCSI is enabled.
You can specify a port as the shared network port or enable automatic shared port selection for the
system to select a port automatically.
The change of the shared network port does not require reconfiguring port network settings. All the
network settings except for the IP address obtained through DHCP continue to take effect after the
change. If the IP address of the HDM shared port is obtained through DHCP, the DHCP server
re-assigns an IP address to the shared network port after you change it.
Restrictions and guidelines
See "General restrictions and guidelines for network configuration."
The AE module and blade servers do not support VLAN configuration or changing the shared
network port.
If the network port mode is active/standby, any IP configuration on the shared network port will be
synchronized to the other shared network ports and the dedicated network port.
If you disable automatic shared port selection and do not specify an interface as the shared port, the
system uses the shared port specified before you enabled the feature. Make sure the port is in up
state. If the port is in down state, HDM will be inaccessible.
To avoid network errors, do not enable both automatic shared port selection and the active/standby
mode.
All sLOM, mLOM, FLOM, and OCP network adapters, and NCSI-capable PCIe network adapters
support automatic shared port selection.
Before importing a configuration file to edit network port selection and network port mode, make
sure the file content is intact and correct.
Prerequisites
Verify that the shared network port is physically connected to the network.
Verify that the shared network port is in Active state if the network port mode is active/standby.
Verify that the network interface to be used as the shared network port is in up state before
manually changing the shared network port.
Enable the LAN function
1. On the top navigation bar, click Configuration.
You are placed on the Network page.
2. Click the Shared Port tab.
3. Click Configure.
4. Enable the LAN function, and then click Save.
Figure 50 Enabling the LAN function
6
Configure IPv4 settings
1. On the top navigation bar, click Configuration.
You are placed on the Network page.
2. Click the Shared Port tab.
3. Click Configure.
4. Select Enable for IPv4 to enable IPv4 network service.
5. Configure IPv4 address settings for the port:
To use the IP address automatically assigned by a DHCP server, select Automatic IP
obtaining. This is the default setting.
To manually configure static IP address settings, clear Automatic IP obtaining, and then
enter an IPv4 address, subnet mask, and default gateway address.
A gateway of 0.0.0.0 indicates that no default gateway is specified.
6. Click Save.
Figure 51 Configuring IPv4 settings
7
Figure 52 Configuring IPv6 settings
8
4. Select Enable for Auto-selection.
5. Click Save.
Figure 54 Enabling automatic shared port selection
Configure DNS
To enable access to HDM by using a domain name instead of the management IP address of HDM,
configure DNS.
Restrictions and guidelines
If all network ports use static IP addresses, specify the IP addresses of DNS servers manually.
If you are manually specifying IPv6 addresses of DNS servers, specify global IPv6 addresses.
Set a host name for HDM
1. On the top navigation bar, click Configuration.
You are placed on the Network page.
2. Click the DNS tab.
3. In the Set host name area, use either of the following methods to configure the host name of
HDM:
To manually configure the host name, select Manual and enter a host name in the Host
name field.
The host name is a string of 1 to 48 characters. Hyphens (-) are allowed. However, the
string cannot start or end with a hyphen (-).
To enable HDM to automatically set the host name, select Auto.
9
The Host name field will be automatically populated with a host name, which is the
combination of HDM and the serial number of the server.
4. Click Save.
Figure 55 Setting a host name
10
You can specify a maximum of three DNS servers. The priorities of DNS servers 1, 2, and
3 are in descending order.
If you select IPv4 (Auto) or IPv6 (Auto), select Host name or DHCP Client FQDN from
the Dynamic registration field and select the network port for registration info obtaining.
The Domain suffix field will be automatically populated, and HDM will search for DNS
servers automatically.
The Obtain registration info via field is available only when both the dedicated and
shared network ports use an IP address assigned by the DHCP server.
5. Click Save.
11
Procedure
1. On the top navigation bar, click Configuration.
You are placed on the Network page.
2. Click the Port Modes tab.
3. In the work pane, select a network port mode.
4. Click Save.
Figure 56 Setting the network port mode
Configure LLDP
The Link Layer Discovery Protocol (LLDP) is a standard link layer protocol that allows network
devices from different vendors to discover neighbors and exchange system and configuration
information.
Perform this task to enable the server to send LLDP frames. You can also view information about
the received LLDP frames on the page.
Procedure
1. On the top navigation bar, click Configuration.
You are placed on the Network page.
2. Click the LLDP tab.
3. Select Enable, and then click Save.
4. View information about the received LLDP frames.
The list displays information about all connected devices of the server. If a device is
unreachable or does not support sending LLDP frames, the corresponding fields display N/A.
12
Figure 57 Configuring LLDP
Parameters
• Network port: Network port of the server that receives LLDP frames.
• Switch MAC address: MAC address of the connected switch.
• Switch system name: System name of the connected switch.
• Port number: Number of the connected switch port.
• Port info: Information about the connected switch port, port name for example.
• VLAN ID: ID of the VLAN to which the server port belongs.
13
4. Click Save.
Figure 58 Configuring Wi-Fi settings
Parameters
• Wi-Fi Status: Enablement status of the Wi-Fi feature.
• Device status: Presence status of the USB Wi-Fi adapter.
• Wi-Fi name (SSID): Name of the wireless network, a case-sensitive string of 1 to 31
characters. Only letters, digits, dots (.), hyphens (-), and underscores (_) are allowed. This field
is required. By default, the name is the product name_last 10 characters of the device SN
format.
• Encryption mode: Whether to enable network encryption. By default, the network is not
encrypted.
• Wi-Fi password: Password of the wireless network, a case-sensitive string of 8 to 63
characters. Only letters, digits, spaces, and special characters `~!@#$%^&*()_+-=[]\{}|;':,./<>?
are allowed. This field is required if the encryption mode is Encrypted.
• Idle timeout: Maximum idle period before the network is shut down, in the range of 0 to 200
hours. 0 indicates that wireless network will not be shut down. By default, the value is 1. A
network is considered idle if no online clients exist.
• Wi-Fi IP address: IP address of the wireless network. By default, the IP address is
192.168.199.1. The subnet mask is fixed to 255.255.255.0. The IP address cannot belong to
the same subnet as the IP address of the HDM dedicated or shared network port.
14
• IP range: IPv4 address range for IP address assignment to online clients. Make sure the IP
address range is in the same subnet as the Wi-Fi IP address. The subnet mask is fixed to
255.255.255.0.
• No.: Number of an online client. The system allows a maximum of two clients to come online at
the same time.
• Client MAC address: MAC address of an online client.
• Client IP address: IPv4 address of an online client.
• Host name: Host name of an online client.
NTP
Network Time Protocol (NTP) is a protocol used to synchronize system clocks of devices on a
network.
Use this feature to obtain the correct system date and time from an NTP server.
You can manually specify one primary NTP server, one secondary NTP server, and one tertiary
NTP server. When synchronizing time with NTP, HDM first uses the primary NTP server. If the
primary NTP server is not available, HDM uses the secondary NTP server. If neither the primary nor
secondary server is available, HDM uses the tertiary NTP server.
With HDM, you can also choose to obtain NTP server settings from the DHCP server when all
manually specified NTP servers are unavailable. If the DHCP server is not available, HDM uses the
system date and time obtained in the most recent successful NTP time synchronization or uses the
local system date and time.
15
only when the primary NTP server fails, and uses the tertiary NTP server only when both the
primary and secondary NTP servers fail.
By default, the primary NTP server address is 1.cn.pool.ntp.org, the secondary NTP server
address is 2.cn.pool.ntp.org, and the tertiary server address is not specified.
6. Click Save.
HDM attempts to synchronize time.
Figure 60 Configuring NTP settings
Parameters
NTP sync interval: Set the interval at which HDM synchronizes time from the NTP server. By
default, the interval is 3600 seconds. The value range is 600 to 2592000 seconds. This setting
takes effect only when NTP is configured.
16
Configure remote services
Access services
View services and user sessions
Restrictions and guidelines
The available services vary by server model.
Procedure
1. In the navigation pane, select Remote Services > Services.
The service list page opens.
2. In the work pane, click View for an access service to view its detailed information, as shown in
Figure 61.
Figure 61 Viewing access service entries
3. In the session list that opens, perform either of the following tasks, as shown in Figure 62:
To close a session, click Delete for the session.
To return to the previous page, click Close.
Figure 62 Viewing access services
1
Parameters
• Name: Name of the service.
HDM provides the following services:
CD-Media—Access to the virtual CDs and DVDs.
FD-Media—Access to the virtual floppy disk drives.
HD-Media—Access to the virtual disk drives and USB.
iHDT—Debugging through Hardware Debug Tool (HDT). This service is available only for
the R4950 G5 and R5500 G5 AMD servers.
IPMI—Remote Management Control Protocol (RMCP) or RMCP+ connections to HDM.
KVM—Access to the server from a remote console.
Remote_XDP—Remote debugging and diagnosis through XDP. This service is available
only for the R2700 G3, R2900 G3, R4300 G3, R4400 G3, R4700 G3, R4900 G3, R5300
G3, R6700 G3, R4300 G5, R4700 G5, R4900 G5, R5300 G5, and B5700 G5 servers.
SNMP—SNMP access to HDM.
SSH—SSH access to HDM.
Telnet—Telnet access to HDM.
VNC—Access to the server from a Virtual Network Computing (VNC) client.
Web—Access to the HDM Web interface.
• Status: Status of the service. Options include:
Disabled.
Enabled.
• Network ports: HDM network ports that can be used for the service.
eth0—Shared port.
eth1—HDM dedicated port.
both—Both shared and HDM dedicated ports.
Bond0—HDM Bond port.
• Insecure service port: Port used for unencrypted communication of the service.
• Secure service port: Port used for encrypted communication of the service.
• Idle timeout: Idle timeout time of the user session, in minutes. A user session automatically
disconnects when it times out.
• Maximum sessions: Maximum number of sessions supported for the service.
• Session ID: ID that identifies the session among HDM user sessions. An asterisk (*) mark
indicates that the session was established by using the IP address with which the client
accesses the current Web interface.
• Session type: Protocol type or service type of the session.
• User ID: ID of the user account in the user list on the Users & Security > User Accounts
page. 0 indicates that the user is neither a local user nor a domain user.
• Username: Username of the user account.
• IP address: IP address of the user using the service.
• User role: User role of the user account, which represents a set of access privileges.
2
If you change the default secure or insecure service port of a service, follow these guidelines when
you use that service:
• If you change the default IPMI insecure service port number (623), you must use the -p
parameter to explicitly specify the port number when you execute an IPMI command.
• If you change the default secure or insure Web service port number, you must explicitly specify
the Web service port when you access HDM from a Web browser. The HDM URL address
format is https://ip_address:secure-port.
• You can disable the insecure Web service port for users to access HDM only from the secure
Web service port. When the insecure Web service port is disabled, you cannot access H5 KVM
in unencrypted mode.
• If you change the default Remote_XDP service port number (6868), you must also update the
port number change to the OpenIPC client in the installation directory\OpenIPC\Config\SKX\
SKX_ASD_JTAG.xml directory. The installation directory argument represents the installation
directory of the OpenIPC client.
Changing the settings of a service restarts the service. During the restart, the service is unavailable.
Before enabling the iHDT service, make sure the server is powered on.
Procedure
1. In the navigation pane, select Remote Services > Services.
2. In the work pane, click Edit for the target service.
3. Edit service parameters, as shown in Figure 63.
3
Figure 63 Editing an access service
4
Service Default insecure port Default secure port
IPMI 623 N/A
KVM 7578 7582
Remote_XDP 6868 N/A
SNMP 161 N/A
SSH N/A 22
Telnet 23 N/A
VNC 5900 N/A
Web 80 443
• Idle timeout: Set the session idle timeout time for the service. You can set the timeout for Web,
KVM, SSH, Telnet, and VNC services. The SSH and Telnet services use the same idle timeout
time. If you set an idle timeout for both SSH and Telnet, the most recent configuration takes
effect.
Table 11 Timeout value ranges and default timeout settings of services
Service name Timeout value range (in minutes) Default timeout (in minutes)
Web 5 to 120 30
KVM 5 to 30 30
SSH 1 to 30 10
Telnet 1 to 30 10
VNC 5 to 30 10
Remote console
You can manage the server and install an operating system (OS) from a remote console.
HDM supports a maximum of four remote control sessions. If you establish the first session, you are
the primary user. All subsequent remote console users are secondary users and must obtain
access permissions from the primary user.
HDM supports KVM, H5 KVM, and VNC remote consoles. This section describes how to use KVM
and H5 KVM remote consoles and configure the VNC login password.
5
Launch a KVM or H5 KVM remote console
Restrictions and guidelines
Do not use KVM and H5 KVM at the same time or start the remote console in multiple browsers on
one PC.
For security purposes, grant full permission to a trustworthy secondary user when you close the
remote console session as the primary user.
Granting full permission to a secondary user removes the full permission from the primary user.
Then, the primary user has only the read-only permission.
The primary user can grant full permission to any secondary user when closing the KVM window. If
the primary user does not grant full permission in 10 seconds, the permissions of secondary users
remain unchanged.
The UID LED of the server flashes if a remote console is active.
Prerequisites
Before you can launch a remote control console, you must perform the following tasks:
• Make sure your user account has the remote control privilege. If you do not have the remote
control privilege, contact the administrator.
• To launch the KVM console, make sure your user account has the KVM extended privilege. To
launch the H5 KVM console, make sure your account has the Web and KVM extended
privileges. If you do not have the Web or KVM privilege, contact the administrator.
Procedure
1. In the navigation pane, select Remote Services > Remote Console, as shown in Figure 64.
Figure 64 Entering remote console page
2. (Optional.) Click Configure, select a launch mode for KVM and H5 KVM, and then click OK.
3. Launch a remote console:
To launch the KVM remote console, click Start KVM.
To launch the H5 KVM remote console, click Start H5 KVM.
Encrypted modes transmit encrypted data and provide better security performance.
Unencrypted modes transmit unencrypted data and provide higher transmission speed.
The remote console sign-in page opens.
6
Figure 65 Remote console sign-in page
4. For a shared mode, wait for the access authorization from the primary user if you are not the
first access user, as shown in Figure 4.
Figure 66 Waiting for remote console access authorization
If you are the primary user, you might need to grant access permissions to other users, as
shown in Figure 5.
7
Figure 67 Authorizing remote console access
Parameters
• Dedicated mode: Includes Encrypted dedicated mode and Unencrypted dedicated mode.
A dedicated mode allows for only one remote console session and grants the user with the full
access permission. You can launch the remote console successfully in dedicated mode only if
no other user is using the remote console.
• Shared mode: Includes Encrypted shared mode and Unencrypted shared mode. A shared
mode allows for a primary session and multiple secondary sessions. If you are the first access
user, the system assigns you with the full access permission. If you are a secondary user, the
granted permission is decided by the primary user as follows:
If you are granted full access permission, you can display information and configure the
server.
If you are granted read-only permission, you can only view videos and screenshots, and
record videos. You cannot perform any configuration tasks.
If your access is denied, the KVM window closes.
If the primary user does not respond in 30 seconds, you are granted read-only permission.
WARNING!
The Force Power-Off and Graceful Power-Off options only put the server in standby mode by
removing power from most circuits. To maintain the server with all power removed, you must
remove all power cords from the server.
8
Power menu option Purpose
Force System Reset Warm reboots the server without power cycling the server.
Shuts down the server immediately by force. This action is equivalent to
Force Power-Off pressing the power button on the server for five seconds to put the
server in standby mode.
Shuts down the operating system first, and then removes power from
Graceful Power-Off
the server to put it in standby mode.
Power On Starts up the server.
Force Power-Cycle Powers off and then powers on the server.
3. Use the power icon in the lower right corner of the console to verify the power state of the
server.
If the server is up, the icon is in green ( ).
If the server is down, the icon is in red ( ).
Capture the screen
1. Select Options > Capture Screen from the top menu bar.
2. In the dialog box that opens, select the screenshot file storage path, enter the file name, and
then click Save, as shown in Figure 6.
Figure 68 Capturing the screen
Record a video
1. Select Video Record > Settings from the top menu bar.
2. Set the video recording parameters, as shown in Figure 7:
Video Length.
Video to be Saved.
Normalized video resolution to 1024 × 768.
9
Figure 69 Setting video recording parameters
10
Figure 70 Mounting a virtual storage medium
3. To unmount a virtual storage medium, access the medium tab, and click Disconnect.
Quit the remote console
To quit the remote console and disconnect from HDM, use one of the following methods:
• Click the close button of the remote console window.
• Click Logout on the HDM Web interface.
The KVM idle timeout does not take effect if a virtual medium is mounted through the remote
console.
Configure the peripherals in the KVM console
• To configure keyboard settings, select the Keyboard menu from the top menu bar, and then
select the desired menu option.
• To configure the mouse settings, select the Mouse menu from the top menu bar, and then
select the desired menu option.
11
Mouse menu option Task
Mouse Calibration Calibrates the mouse location in relative mouse mode.
The mouse mode is used to calculate the current location of the mouse.
Options include:
• Absolute mouse mode—Calculates the mouse location according to
the screen's absolute coordinates.
• Relative mouse mode—Calculates the mouse location according to
the offset of the mouse movement.
• Other mouse mode—Calculates the mouse location according to the
distance from the mouse to the screen center.
Mouse mode recommendations for server operating systems:
• Use absolute mouse mode in Windows 2008, Windows 2012,
Mouse Mode Redhat 6.5, Redhat 7.0, CentOS 6.5, CentOS 7.1, Ubuntu 12.04,
Ubuntu 15.04, SLES 11, and SLES 13.
• Use relative mouse mode for versions lower than Redhat 6, CentOS
6, or Fedora 14.
• Use other mouse mode in SLES 11 installation interface.
• Use absolute mouse mode in any operating systems that are not
mentioned above.
IMPORTANT:
• As a best practice, do not change the mouse mode frequently.
• The Show Cursor feature will be enabled automatically if you
change the mouse mode from relative or other to absolute.
12
Use keyboard buttons
The remote console provides the following keyboard buttons at the bottom right:
• Num—Equivalent to pressing the Num key on the keyboard.
• Caps—Equivalent to pressing the Caps key on the keyboard.
• Scroll—Equivalent to pressing the Scroll key on the keyboard.
WARNING!
The Force Power Off and Graceful Power Off options only put the server in standby mode by
removing power from most circuits. To maintain the server with all power removed, you must
remove all power cords from the server.
13
Power menu option Purpose
Shuts down the server immediately by force. This action is equivalent to
Force Power Off pressing the power button on the server for five seconds to put the
server in standby mode.
Shuts down the operating system first, and then removes power from
Graceful Power Off
the server to put it in standby mode.
Power On Starts up the server.
Power Cycle Powers off and then powers on the server.
3. Use the power icon in the upper left corner of the console to verify the power state of the
server.
If the server is up, the icon is in green ( ).
If the server is down, the icon is in red ( ).
Record a video
1. Select Video Record > Record Settings from the top menu bar.
Figure 71 Selecting record settings
14
Figure 72 Setting video recording parameters
15
Figure 73 Capturing the screen
• To perform Send Keys operations, select the Send Keys menu from the top menu bar, and
then select the desired menu option.
16
Send Keys menu option Description
Perform an action equivalent to pressing and releasing the Ctrl, Alt,
Ctrl+Alt+Del
and Delete keys simultaneously on the keyboard.
Perform an action equivalent to pressing and releasing the left
Left Windows Key
Windows key on the keyboard.
Perform an action equivalent to pressing and releasing the right
Right Windows Key
Windows key on the keyboard.
Perform an action equivalent to pressing and releasing the context
Context Menu Key
menu key on the keyboard.
Perform an action equivalent to pressing and releasing the PrScrn key
Print Screen Key
on the keyboard.
• To define and use hot keys, select the Hot Keys menu from the top menu bar, and then select
Add Hot Keys.
• To configure the mouse settings, select the Mouse menu from the top menu bar, and then
select the desired menu option.
IMPORTANT:
• As a best practice, do not change the mouse mode frequently.
• The Show Client Cursor feature will be enabled automatically if you
change the mouse mode from other to absolute.
17
• SCR—Performs an action equivalent to pressing the Scroll key on the keyboard.
2. In the window that opens, enter the VNC password (the default is root), and then click OK, as
shown in Figure 13.
18
Figure 75 Authenticating to VNC server
A VNC session is established between the VNC client and VNC server. The VNC client
displays the server screen.
You can view the established VNC session from the Remote Services > Services page of
HDM. The IP address for the VNC session is the IP address of the VNC client.
Figure 76 VNC session information
19
Figure 77 Configuring VNC
20
Mount remote media
Perform this task to mount remote media to the server's operating system.
Prerequisites
Before you configure remote media image mounting, perform the following tasks:
1. Verify that the image files to be mounted are in correct format.
A CD/DVD image file must use the .iso extension, and a disk image file (for example, floppy
disk, HDD or SSD) must use the .img or .ima extension.
A floppy disk image file cannot exceed 1.44 MB.
2. Make sure the number of CD/DVD image files, floppy image files, and disk image files each in
the source directory on the NFS or CIFS server does not exceed 60.
3. Make sure your user account has the administrator or operator role or the remote media
privilege. If the account is neither an administrator nor an operator, and does not have the
remote media privilege, contact the administrator to obtain the privilege.
4. Make sure the desired virtual media services have been enabled for your user account. If they
are not enabled, contact the administrator. You can use CD-Media and HD-Media to mount
two image files and use FD-Media to mount only one media.
Procedure
1. Set up the image mounting environment. For more information, see "Configure virtual media."
2. In the navigation pane, select Remote Services > Virtual Media, as shown in Figure 16.
Figure 78 Accessing the remote media mounting page
IMPORTANT:
If remote media mounting has already been enabled, the media settings cannot be modified
unless you stop all remote media mountings.
21
Figure 79 Configuring media mounting settings
Parameters
• Media type: Type of the remote media, including CD/DVD, floppy, and disk (which includes
both HDD and SSD).
• Status: Remote media mounting status, including Started and Not started. Common reasons
for the Not started status include the following:
Opening error—The image file is invalid.
Connection in use—The maximum number of mounting sessions has reached.
Connection lost—The virtual media service has failed.
Access error—The virtual media service is not enabled.
Session terminated—The virtual media session is terminated.
• Session index: Index of the remote media mounting session.
22
SNMP
Simple Network Management Protocol (SNMP) is an Internet protocol used for remote
management and operations. It allows users to manage devices of different vendors with different
physical characteristics and interconnection technologies in the network through NMS. For example,
monitor device status, collect statistics, and perform troubleshooting.
Perform this task to configure SNMP settings, including SNMP version, read-only community string,
and read/write community string.
Restrictions and guidelines
The SNMP SET operation is not supported if the read/write community string is empty.
The read/write community string cannot be the same as the read-only community string.
The read/write community string and read-only community string are displayed in ciphertext format
from the Web interface.
Procedure
1. In the navigation pane, select Remote Services > SNMP.
2. In the work pane, configure SNMP settings:
a. Select an SNMP version.
b. Select whether to enable the long community string feature.
c. Select Edit read-only community string or Edit read/write community string, and enter
or delete the read-only or read/write community string.
3. Click Save.
23
Figure 81 Configuring SNMP settings
Parameters
• SNMP version: Select an SNMP version available for SNMP GET and SET operations.
Options include v1 and v2c. SNMP v3 is supported by default.
• Long community string: Select whether to enable the long community string feature. This
feature is disabled by default.
If you enable the long community string feature, the value range for the community strings is
16 to 32 characters. If you disable the long community string feature, the value range for the
community strings is 1 to 32 characters. You can leave the read/write community string empty,
regardless of whether the long community string feature is enabled.
• Read-only community string: Enter the read-only community string for security
authentication. By default, this field is empty but the default read-only SNMP community string
is rocommstr.
• Read/write community string: Enter the read/write community string for security
authentication. By default, no read/write SNMP community string is specified.
Remarks
The Read-only community string and Read/write community string fields can contain only
letters, digits, and special characters`~!@$%^&*()_+-=[]{}|:,./?
24
Remote O&M
Logs
Manage the event log
Perform this task to configure the event log policy, view, download, or clear event logs.
Restrictions and guidelines
When the event log reaches the maximum size (3639), logging action on new events depends on
the event log policy.
After all event log entries are deleted, the system automatically generates a log entry that records
the deletion.
Procedure
1. On the top navigation bar, click Remote O&M.
You are placed on the Logs page.
2. On the Event Log tab, select an event log policy from the Log policy field.
3. In the work pane, use one of the following methods to filter events:
Select a severity level of the events.
Select a sensor type.
Select or customize a period when the events generated.
Enter your keywords.
4. To filter events based on keywords, enter the keywords, and then click the query icon .
5. To clear all specified filter criteria, click Reset.
6. To save event log entries to a .csv file, click Save.
7. To delete all event log entries, click Delete all.
The deleted event log entries cannot be restored.
25
Figure 82 Managing the event log
Parameters
• Stop logging at full storage: The system stops logging on new events when the event log fills
up.
• Overwrite oldest entries at full storage: The system overwrites oldest entries with new log
entries when the event log fills up.
• ID: Event number. Events are numbered in chronological order. By default, the events in the
event list are sorted by event number in ascending order.
• Timestamp: Date and time when the event was logged.
• Alert status: Alarm status of the event. Cleared means that the event alarm has been cleared.
Triggered means that the event is to be resolved.
• Severity: Severity level of the event.
Info—The event does not adversely affect the system. No action is required. Examples of
informational events include expected state change events and alarm removed events.
Minor—The event has minor impacts on the system. Prompt action is required to avoid an
escalation in severity.
Major—The event might cause part of the system to fail and result in service interruption.
Immediate action is required.
Critical—The event might result in system outage or power failure. Immediate action is
required.
• Event code: Event code that identifies a system event in HDM.
• Recommended action: Actions recommended for a system event.
26
• Configuration log entries record user configuration operations as well as their results.
Restrictions and guidelines
After all operation log entries are deleted, the system automatically generates a log entry that
records the deletion.
Procedure
1. On the top navigation bar, click Remote O&M.
You are placed on the Logs page.
2. Click the Operation Log tab.
3. In the work pane, select a sensor type or a severity level to filter events as follows:
To display the events generated by sensors of a particular type, select that sensor type
from the All types list.
To display the events of a particular level, select that severity from the All severities list.
4. To save operation log entries to a .csv file, click Save.
5. To delete all operation log entries, click Delete All.
The deleted log entries cannot be restored. Please use this feature with caution.
After the deletion, the system generates a log deletion log message.
Figure 83 Managing the operation log
Parameters
• ID: Event number. Events are numbered in chronological order. By default, the events in the
event list are sorted by event number in ascending order. The system can display a maximum
of 1000 event log entries.
• Timestamp: Date and time when the event was logged.
• Interface type: Type of the interface through which the operation was performed.
• IP address: User IP address.
• Host name: HDM host name.
• Description: Description of the log entry.
27
Download log
Perform this task to download Smart Diagnosis System (SDS) logs of the server. The SDS log
includes BMC event log, BMC operation log, device information, operating parameters, and internal
diagnostic information.
By decoding the collected SDS logs, users can comprehensively locate and analyze issues that
occur to the server.
To decode SDS logs, contact Technical Support. As a best practice, add contact information at log
downloading.
NOTE:
In HDM-2.96 and later versions, you can scan the QR code on the screen to view the functional
diagram or give feedback.
28
Figure 84 Downloading log
4. (Optional.) Add contact information, including the name, phone number, and email address.
5. Click Download log to download the log. This page displays a progress bar.
Figure 85 Downloading the log
29
6. Save the displayed log entries to an .sds file on the local server.
SOL connection
Perform this task to select the serial port to connect to when the SOL feature is enabled.
Prerequisites
Before setting the SOL connection mode, make sure the SOL feature is disabled.
Procedure
1. On the top navigation bar, click Remote O&M .
2. In the left navigation pane, select SOL Connection.
3. In the work pane, select a serial port from the SOL connection mode field.
4. Click Save.
Figure 86 Setting the SOL connection
Parameters
• BIOS/OS: Connects to the BIOS or OS serial port.
• RAID: Connects to the serial port of the mezzanine storage controller.
• Smart Ethernet adapter: Connects to the serial port of the smart network adapter. Only some
smart network adapters support serial port connection.
30
Procedure
1. On the top navigation bar, click Remote O&M
2. In the left navigation pane, select Screenshots & Videos.
3. In the work pane, click Configure.
4. In the dialog box that opens, enable video recording.
5. Set the video length. The value range is 15 to 255 seconds.
6. Select types of events to be recorded: crash, restart, or shutdown.
Crash event recording is available for Windows and Linux operating systems.
7. Click Save.
Figure 87 Configuring video recording
31
Figure 88 Playing videos
32
Alarm settings
Use this feature to perform the following operations:
• Configure alert policies on the server when an error occurs, including NMI control and MCA
policy.
• Send emails, SNMP traps, or syslog messages to notify the concerned server administrative
staff members of server events for prompt action.
• Configure system diagnosis for the server.
NOTE:
In HDM-2.96 and later versions, you can scan the QR code on the screen to view the function
diagram or give feedback.
33
Figure 90 Enabling NMI debug
34
Figure 91 Setting the MCA policy
35
Figure 92 Setting up SMTP for alert emails
36
f. Select severity levels.
6. Click OK.
Figure 93 Configuring SNMP trap settings
37
Figure 94 Configuring SNMP trap server settings
6. Click Save.
7. (Optional.) Click Test in a server entry to send a test email.
Parameters
• Node mode: Specifies the OID of an SNMP node as the ID of a trap event. This is the default
mode.
• Event mode (recommended): Specifies the OID of the SNMP node that is in a mapping
relationship with a trap event as the ID of the event. Information provided by this mode is more
accurate.
• SNMP version: Select an SNMP version. Options include SNMPv1, SNMPv2c, and SNMPv3.
• Choose trap v3 user: Select the username used by the system to send SNMPv3 traps.
• System location: Enter the location of the server, a string of up to 31 characters.
• Contact: Enter contact information, a string of up to 31 characters.
• Trap community: Enter the trap community string for authentication on the manager. The
value range is 1 to 31 characters. The default value is public.
• Severity levels: Select the severity levels. Options include Major + Critical, Minor + Major +
Critical, and All.
• No.: Entry number. You can specify a maximum of eight servers, one server in each entry. This
field cannot be edited.
• Status: Indicates whether trap notification is enabled for the specified server.
• Server address: IP or domain address of the destination host.
• Server port: Enter the port number at which the destination host receives SNMP traps. The
value range is 1 to 65535. The default port number is 162.
Remarks
The System location, Contact, and Trap community fields can contain only letters, digits, and the
following special characters:
`~!@$%^&*()_+-=[]{}|:,./?
38
• Sensor information including sensor name, reading, and state.
• Host serial port information including BIOS boot and OS serial port information.
Restrictions and guidelines
The alarm log server settings restore to the default after you change the alarm log notification
settings.
Prerequisites
Before enabling syslog notification, make sure an alarm log server is available.
Configure syslog notification settings
1. On the top navigation bar, click Remote O&M.
2. In the left navigation pane, select Alarm Settings.
3. Click the Syslog Settings tab.
4. In the Alarm log notification section, click Configure, and then perform the following tasks:
a. Enable alarm log notification.
b. Select an alarm log server identifier.
c. Select a transmission protocol.
If you select TLS, you must select an authentication mode, and upload the CA certificate,
local certificate, and private key file.
d. Click OK.
Figure 95 Configuring syslog notification settings
5. In the Alarm log server settings section, click Edit in a server entry, and then perform the
following tasks:
a. Enable the server.
b. Edit the IP address and port number of the alarm log server as needed.
c. Select the types of logs to be reported.
39
d. Click OK.
Figure 96 Configuring alarm log server settings
40
Configure host serial port settings
1. On the top navigation bar, click Remote O&M.
2. In the left navigation pane, select Alarm Settings.
3. Click the Syslog Settings tab.
4. In the Host Serial Port Settings section, click Configure, and then perform the following
tasks:
a. Enable serial port log.
b. Select a transmission protocol.
c. Enter the IP address and port number of an alarm log server.
d. Click OK.
Figure 98 Configuring host serial port settings
Parameters
• Alarm log host ID: Select an alarm log server identifier. Options include Host name, System
board serial number, Asset tag, and Product serial number.
• Transmission protocol: Select the transmission protocol used for syslog message
transmission. Options include:
TCP—A connection-oriented protocol that requires establishing connection between the
sender and the receiver before data transmission.
UDP—A message-oriented protocol that does not require establishing connection between
the sender and the receiver before data transmission.
TLS—A connection-oriented protocol and provides privacy and data integrity between the
sender and the receiver.
• Authentication mode: Select an authentication mode. Options include:
One-way authentication: Authenticates only the alarm log server.
Two-way authentication: Authenticates both the alarm log server and the client used for
HDM login.
• CA certificate: Upload a CA certificate in PEM format to authenticate packets sent by the
alarm log server.
• Local certificate: Upload a local certificate in PEM format whose information will be carried in
packets sent to the alarm log server by HDM for the server to authenticate the client used for
HDM login.
• Private key: Upload a private key file in PEM format to decrypt the local certificate.
41
• No.: Entry number. You can specify a maximum of eight servers, one server in each entry. This
field cannot be edited.
• Server address: Enter the IP address or domain name of the destination host. The default IP
address is 127.0.0.1. A domain name cannot exceed 48 characters.
• Server port: Enter the port number at which the destination host receives syslog messages.
The value range is 1 to 65535. The default port number is 514.
• Log type: Types of logs to be reported. Options include Operation log, Event log, and
Security log.
• Interval: Specify the interval at which sensor information is reported, in the range of 10 to
2592000 seconds.
42
Figure 99 Viewing system diagnosis
4. Click Configure.
5. In the dialog box that opens, enable minimum configuration startup or select the diagnosis
isolation mode, as shown in Figure 38.
Figure 100 Configuring system diagnosis
6. Click OK.
7. Restart the server. The configured minimum configuration startup or diagnosis isolation mode
will take effect immediately upon the restart.
Parameters
Diagnosis isolation: Select the diagnosis isolation mode. Options include:
• Disable—Disables diagnosis isolation.
• Diagnose only—Examines components for errors that cause the startup failure, and then
displays the diagnosis result.
• Diagnose and isolate—Examines components for errors that cause the startup failure,
displays the diagnosis result, and then isolates the failed components.
Configuration
Perform this task to import and export HDM, BIOS, or RAID configuration, and restore HDM
settings.
43
Restrictions and guidelines
Export HDM, BIOS, or RAID configuration
Restrictions and guidelines
Make sure the storage controllers have been initialized before you export the RAID configuration.
PMC storage controllers do not support RAID configuration export.
Make sure the logical drives attached to the storage controllers are in normal state and no
expansion, migration, rebuilding, or erasing task is being performed before you export the RAID
configuration.
Procedure
1. On the top navigation bar, click Remote O&M.
2. In the left navigation pane, select Manage Configuration.
3. In the Export configuration section, select the target configuration type from the Select type
field.
4. Click Export.
Figure 101 Exporting HDM, BIOS, or RAID configuration
44
To avoid import failure, make sure the other users are not operating the server from HDM before
you import configuration.
To avoid import failure, when you modify the configuration file, make sure the configurations are
valid.
Make sure you have deleted all the comment statements in the configuration file before the import.
If the password in the configuration to be imported is empty and the configuration is from a different
server, you must add the password manually. The new password will take effect after the import.
PMC storage controllers do not support RAID configuration import.
Restrictions and guidelines for importing HDM configuration
Make sure the server model in the configuration file to import is consistent with the actual server
model.
Make sure the bonding mode setting in the configuration file to import is consistent with the bonding
mode setting on the target server.
The import operation does not affect HDM configurations that are not covered by the configuration
file to import.
If the imported HDM configuration includes network settings, HDM restarts automatically after the
import for the configuration to take effect. If the imported HDM configuration does not include
network settings, the configuration takes effect immediately after the import.
If the configuration to be imported includes HDM management IP settings, you cannot access HDM
by using the current management IP address after the import. If a static IP address is imported, the
IP address becomes the management address. If a DHCP-assigned address is imported, the server
obtains a new IP address from the DHCP server and uses the address as the management address,
and the address obtaining method changes to DHCP.
Restrictions and guidelines for importing BIOS configuration
Make sure the server model and hardware configuration (for example, storage controller and drive
configuration) in the configuration file is consistent with the actual configuration.
For the imported BIOS configuration to take effect, restart the server after the import.
Restrictions and guidelines for importing RAID configuration
Make sure the server is powered on and the storage controller is in RAID mode before you import
RAID configuration.
Make sure the server model and hardware configuration (for example, storage controller and drive
configuration) in the configuration file is consistent with the actual configuration.
To avoid import failure, clear existing RAID configuration from the BIOS before you import RAID
configuration.
After a RAID configuration import, it takes about 40 seconds for the imported file to take effect.
Procedure
1. On the top navigation bar, click Remote O&M.
2. In the left navigation pane, select Manage Configuration.
3. In the Import configuration section, select HDM from the Select type field.
4. Select the target configuration file, and then click Import.
5. In the confirmation dialog box that opens, click OK.
45
Figure 102 Importing HDM, BIOS, or RAID configuration
Procedure
1. On the top navigation bar, click Remote O&M.
2. In the left navigation pane, select Manage Configuration.
3. In the Restore HDM settings section, perform one of the following tasks:
To restore HDM to the default settings, click Restore default settings.
To restore HDM to the factory defaults (if any), click Restore factory defaults.
4. In the confirmation dialog box that opens, click OK.
HDM restarts after the settings are restored.
46
Figure 103 Restoring HDM settings
Update firmware
You can update the firmware of HDM, BIOS, CPLD, power supplies, LCD, REPO, GPUFPGA,
FANMCU, or PMem 200. REPO firmware includes storage controller firmware, network adapter
firmware, and drive firmware. Table 12 shows server models and the firmware types that they
support.
Table 12 Server models and supported firmware types
47
• HDM
• BIOS
• CPLD
R5300 G3 • PSU
• GPUCPLD
• BPCPLD
• REPO
• HDM
• BIOS
• CPLD
• DBCPLD
R6700 G3
• STBCPLD
• LCD
• BPCPLD
• REPO
• HDM
• BIOS
• CPLD
• PDBCPLD
R6900 G3
• NDCPLD
• BPCPLD
• LCD
• REPO
• HDM
• BIOS
• CPLD
• BPCPLD
R8900 G3 • PDBCPLD
• NDCPLD
• PDBSCPLD
• LCD
• REPO
• HDM
• BIOS
B7800 G3 • CPLD
• AUXCPLD
• REPO
• HDM
• BIOS
• CPLD
• BPCPLD
R4330 G5
• PSU
• LCD
• PFRCPLD
• PMem 200
• R4700 G5 • HDM
• R4900 G5 • BIOS
• R4930 G5 • CPLD
• R4950 G5 • BPCPLD
• R4300 G5 • PSU
48
• LCD
• PFRCPLD
• REPO
• PMem 200
• HDM
• BIOS
• CPLD
• BPCPLD
• PSU
R5300 G5
• PFRCPLD
• OCPCPLD
• GPUFPGA
• REPO
• PMem 200
• HDM
• BIOS
• CPLD
• BPCPLD
• PFRCPLD
R5500 G5
• PSWCPLD
• PSU
• FANMCU
• REPO
• PMem 200
• HDM
• BIOS
• CPLD
• DBCPLD
• BPCPLD
R6900 G5 • PSU
• LCD
• PFRCPLD
• REPO
• OCPCPLD
• PMem 200
• HDM
• BIOS
• CPLD
B5700 G5
• PFRCPLD
• REPO
• PMem 200
49
Only one user can update firmware at a time. If multiple users attempt to update firmware, only the
one who first started the update can perform this operation. When you successfully start a firmware
update, HDM automatically disables all other webpages and signs out all the other users. The
signed-out users can sign in again only after the update is finished.
Firmware update might fail if the update image file does not contain a vendor signature or is corrupt.
In this situation, obtain the desired firmware image file and try again.
For the firmware to be updated successfully, do not perform the following tasks from the Web
interface during the update process:
• Change network settings, including dedicated and shared network ports, VLAN, network port
mode, network adapter, DNS, and Wi-Fi settings.
• Configure remote services.
• Configure NTP settings.
• Configure user and security settings, including access service, firewall, and SSL.
• Set the server power status or change power capping settings.
• Perform the following remote operation and maintenance tasks:
Perform NMI control.
Import or export configuration.
Restore HDM settings.
Restart HDM.
Perform primary/backup switchover.
Restart CPLD.
If CPLD update fails, the server will become unavailable. If the server cannot be accessed, contact
Technical Support.
The following remote console menus are not available during the update:
• Keyboard menu in the KVM console.
• Send Keys and Hot Keys menus in the H5 KVM console.
NOTE:
In HDM-2.96 and later versions, you can scan the QR code on the screen to view the function
diagram or give feedback.
50
Figure 104 Firmware update workflow
51
Prerequisites
See "Prerequisites for firmware update."
Procedure
1. On the top navigation bar, click Remote O&M.
2. In the left navigation pane, select Update Firmware.
The page as shown in Figure 43 opens.
Figure 105 Firmware update
52
4. In the work pane, perform the following tasks:
a. Select an image upload method.
− If you select Local, select HDM as the firmware type. Then, browse to the update
image file and select it.
− If you select TFTP, enter the IP address of the interface used for file upload and enter
the image name. Then, select HDM as the firmware type. The image name must
include the suffix and cannot exceed 45 characters in length.
b. Select the HDM restart method after the update is complete. You can have HDM
automatically restart when the update is complete or manually restart HDM later.
c. (Optional.) To remove all user-configured settings after you update HDM firmware, enable
the Restore factory default option.
d. Click Next.
CAUTION:
The Restore factory defaults option removes all user configured settings and restore factory
defaults when HDM starts up with the new firmware. If the firmware does not have factory
defaults, the system restores the default settings of the firmware. When you select this option,
make sure you understand its impact on the services.
5. HDM will verify the signature information of the firmware image file. If the signature information
passes the verification, HDM will open the firmware information verification page. Verify that
the current partition version of image in use, current partition version of image to update, and
image file version are correct, and then click Next as shown in Figure 45.
The firmware update starts and the system displays the update progress.
Figure 107 Verifying firmware information
53
b. In the left navigation pane, select Summary.
c. In the Device information section of the work pane, verify that the HDM firmware is
updated.
54
Figure 108 Uploading firmware image
CAUTION:
The Forcedly restore option restores the factory defaults (if any) or default settings of the
BIOS. Before you select this option, make sure the server has entered the OS or has been
powered off. Otherwise, BIOS exceptions might occur. When you select this option, make sure
you understand its impact on the services.
5. HDM will verify the signature information of the firmware image file. If the signature information
passes the verification, HDM will open the firmware information verification page. Verify that
55
the current image version and image file version are correct as shown in Figure 47, and then
click Next.
The firmware update starts and the system displays the update progress.
Figure 109 Verifying firmware information
56
Figure 110 Uploading firmware image
6. Perform the corresponding task based on the device model to have the new CPLD firmware
version take effect. For more information, see the firmware update guide for the server.
57
Update drive backplane firmware
This task applies to R2700 G3, R4300 G3, R4700 G3, R4900 G3, R4950 G3, R5300 G3, R6700 G3,
R6900 G3, R8900 G3, B5800 G3, and all G5 servers except the B5700 G5.
Restrictions and guidelines
An update operation updates only drive backplanes supported by the uploaded BPCPLD image file.
To update the firmware after a drive backplane replacement, first power on the server for the newly
installed drive backplane to be identified.
If the update fails for a drive backplane, the system will try again. A maximum of three update
attempts are allowed for each drive backplane.
You can try to start a new update after the current update fails. If multiple updates fail, contact the
technical support to use a different method to update the firmware.
For more restrictions and guidelines, see "Firmware update restrictions and guidelines."
Prerequisites
See "Prerequisites for firmware update."
Procedure
1. On the top navigation bar, click Remote O&M.
2. In the left navigation pane, select Update Firmware.
3. In the Update Firmware section, click Update Firmware.
The firmware image file upload page as shown in Figure 50 opens.
Figure 112 Uploading firmware image
58
5. Select the drive backplanes to update, verify that the current image version and image file
version are correct as shown in Figure 51, and then click Next.
Figure 113 Verifying firmware information
6. If the server is powered on, power off the server. The firmware update starts nine seconds
after the server is powered off.
7. After the update finishes, restart HDM to make the new BPCPLD take effect.
59
Figure 114 Uploading firmware image
6. If the server is powered on, power off the server. The firmware update starts nine seconds
after the server is powered off.
7. After the update finishes, restart the server with the power cords reconnected to make the new
firmware take effect.
60
cannot supply power to the server. Make sure a minimum of one power supply is present and the
power supply can provide power to the system board during the update process.
Before the update, make sure the present power supplies are operating correctly.
For the R5500 G5, the system board and GPU modules use different sets of power supplies, which
must be updated separately.
Power supply firmware supports the following update methods:
• Immediate update—Start immediately once the new firmware image version is verified.
To avoid power supply errors, do not power on or power off the server or disconnect any power
supply during the update.
• Update after server power-off—Start nine seconds after the server is powered off.
To avoid power supply errors, do not power on the server or disconnect any power supply
during the update.
The firmware update method is determined by the image file. Before the update, contact Technical
Support to identify the update method.
The update process might take a long time.
If the update fails for a power supply, the power supply might fail to operate.
For more restrictions and guidelines, see "Firmware update restrictions and guidelines."
Prerequisites
See "Prerequisites for firmware update."
Procedure
1. On the top navigation bar, click Remote O&M.
2. In the left navigation pane, select Update Firmware.
3. In the Update Firmware section, click Update Firmware.
The firmware image file upload page as shown in Figure 54 opens.
Figure 116 Uploading firmware image
61
− If you select TFTP, enter the IP address of the interface used for image upload and
enter the image name. Then, select PSU as the firmware type. The image name must
include the suffix.
b. Click Next. HDM will verify the signature information of the firmware image file. If the
signature information passes the verification, HDM will open the firmware information
verification page.
5. Verify that the current image version and image file version are correct as shown in Figure 55,
and then click Next.
The Present field indicates whether a power supply is present.
Figure 117 Verifying firmware information
6. The server starts the update immediately or after the server is powered off depending on the
update method of the new firmware image.
To view the update result for each power supply, access the Operation Log page.
The new firmware takes effect automatically after the update finishes.
62
Procedure
1. On the top navigation bar, click Remote O&M.
2. In the left navigation pane, select Update Firmware.
3. In the Update Firmware section, click Update Firmware.
The firmware image file upload page as shown in Figure 56 opens.
Figure 118 Uploading firmware image
63
Figure 119 Verifying firmware information
64
Figure 120 Uploading firmware image
6. After the update, for the new firmware to take effect, power cycle the server with the power
cords reconnected.
65
This feature is available only for specific GPUs. If multiple GPUs are present, the operation updates
only GPUs supported by the uploaded GPUFPGA image.
This feature is available only when the server is powered on. During the update process, do not
power off or remove power from the server. If you do so, the update might fail or GPUs might fail to
be identified.
If the update fails for a GPU, the system retries. The system allows a maximum of two retries.
For more restrictions and guidelines, see "Firmware update restrictions and guidelines."
Prerequisites
See "Prerequisites for firmware update."
Procedure
1. On the top navigation bar, click Remote O&M.
2. In the left navigation pane, select Update Firmware.
3. In the Update Firmware section, click Update Firmware.
The firmware image file upload page as shown in Figure 60 opens.
Figure 122 Uploading firmware image
66
Figure 123 Verifying firmware information
6. After the update, for the new firmware to take effect, power cycle the server.
67
b. Click Next. HDM will verify the signature information of the firmware image file. If the
signature information passes the verification, HDM will open the firmware information
verification page.
Figure 124 Updating FANMCU firmware
5. Select the fans to update, verify that the current image version and image file version are
correct, and then click Next.
Figure 125 Verifying the firmware update configuration
6. The firmware takes effect immediately after the firmware update is complete.
68
If the server does not support iFIST, you cannot upload the REPO for firmware update in the HDM.
For the new firmware to take effect after REPO update, iFIST of the server is required. Make sure
the iFIST version is compatible with the current HDM version. For information about the
compatibility between HDM and iFIST, see HDM release notes or iFIST release notes.
At the first restart after REPO update from HDM, the server will automatically enter iFIST to make
the new firmware of server components take effect. During the process for the new firmware to take
effect in iFIST, do not restart the server or reconnect its power cords. After the new firmware takes
effect, the server automatically restarts again with boot options configured before the update.
Make sure the REPO image file to be uploaded does not exceed 300 MB, and the MD5 file does not
exceed 1024 bytes.
When you download the REPO image file, the MD5 file and REPO image file will be downloaded in
a package.
As a best practice, configure HDM to use the Local image upload method to upload the REPO
firmware image.
For more restrictions and guidelines, see "Firmware update restrictions and guidelines."
Prerequisites
For information about how to download and use the REPO image file, see the REPO user guide for
the server.
See "Prerequisites for firmware update."
Procedure
1. On the top navigation bar, click Remote O&M.
2. In the left navigation pane, select Update Firmware.
3. In the Update Firmware section, click Update Firmware.
4. In the work pane, perform the following tasks:
a. Select an image upload method.
− If you select Local, select REPO as the firmware type. Browse to the update image file
and select it. Then, browse to upload the MD5 file for the REPO as needed. HDM will
use the MD5 file to check the integrity of the REPO.
− If you select TFTP, enter the IP address of the interface used for image upload and
enter the image name, which must include the suffix. Select REPO as the firmware type.
Then, enter the name of the MD5 file for the REPO as needed, which must include the
suffix. HDM will use the MD5 file to check the integrity of the REPO.
b. Select the method to reboot the server after the update is complete.
You can have the server automatically restart immediately. Alternatively, you can choose
Restart the Server Manually to manually restart the server.
c. Select the components to update in the Update Options field.
− To update only the components of lower versions than the version to be updated, select
Update Only Components of Lower Versions.
− To update all the components to the version to be updated, select Forcedly Update.
d. Click Next.
69
Figure 126 Updating the REPO for firmware update
5. Verify that the firmware update configuration is correct, and then click Next.
The firmware update starts and the system displays the update progress.
Figure 127 Verifying the firmware update configuration
6. If you selected automatic restart, the server automatically restarts and enters iFIST after the
update to make the new firmware take effect.
If you selected manual restart, manually restart the server. The server automatically enters
iFIST to make the new firmware take effect.
7. Access the Operation Log page from HDM to view the firmware update result.
70
This feature is available only when the BIOS boot mode is UEFI.
For more restrictions and guidelines, see "Firmware update restrictions and guidelines."
Prerequisites
See "Prerequisites for firmware update."
Procedure
1. On the top navigation bar, click Remote O&M.
2. In the left navigation pane, select Update Firmware.
3. In the Update Firmware section, click Update Firmware.
The firmware image file upload page as shown in Figure 128 opens.
Figure 128 Updating firmware image
71
Figure 129 Verifying firmware information
6. If you selected manual restart, manually restart the server. The server automatically enters
iFIST to make the new firmware take effect.
If you selected automatic restart, the server automatically restarts and enters iFIST after the
update to make the new firmware take effect.
Restart HDM
You can restart HDM to have the new firmware image take effect after a firmware update or when
HDM is malfunctioning.
When HDM restarts, all HDM user sessions are closed. These sessions will be automatically
re-established after HDM starts up.
HDM restart does not remove the HDM configuration.
Restrictions and guidelines
Do not power on, power off, or power cycle the server during an HDM restart operation. Doing so
might cause malfunctioning of some HDM features or operating system errors.
Procedure
1. On the top navigation bar, click Remote O&M.
2. In the left navigation pane, select Update Firmware.
The page as shown in Figure 43 opens.
3. In the Restart Firmware section, click Restart HDM, and then click OK to confirm the
operation.
Restart CPLD
You can restart CPLD to have the new CPLD or PFRCPLD firmware image take effect after a
firmware update.
Restarting CPLD is supported by R2700 G3, R2900 G3, R4400 G3, R4700 G3, R4900 G3, R5300
G3, and all G5 servers except the B5700 G5.
Restrictions and guidelines
You can restart CPLD only when the server is powered off.
Restarting CPLD will cause HDM to restart immediately.
72
Procedure
1. On the top navigation bar, click Remote O&M.
2. In the left navigation pane, select Update Firmware.
The page as shown in Figure 43 opens.
3. In the Restart Firmware section, click Restart CPLD and then click OK to confirm the
operation.
POST codes
The system generates power-on self-test (POST) codes to record its state in each phase of server
startup. For more information about POST codes, contact Technical Support.
73
Figure 130 POST codes
Parameters
• POST code of current phase—POST code for the current startup phase of the system.
• POST results—All POST codes generated during the current or the most recent startup of the
system.
74
Figure 131 Security bezel control settings
Parameters
• Decorative LEDs: Includes the following options: Bright, Soft, and Off. If you enable the
decorative LEDs, select Soft as a best practice to decrease power consumption.
• Health status sync: Enables the decorative LEDs to flash based on the server health status.
To use this feature, make sure the Server status sync option is selected. For more
information, see the user guide for the server.
75
The page that opens displays the status of the service USB device.
3. Select whether to enable the service USB device.
4. Select whether to enable auto SDS log downloading.
5. Click Save.
6. If the service USB device is operating, wait for the operation to end and then reconnect the
service USB device for the settings to take effect.
Figure 132 Managing USB devices
Parameters
• Status: Status of the service USB device. Options include Present, Absent, and Operating.
• Auto SDS log downloading: With this feature enabled, the service USB device automatically
downloads SDS logs to its Sds_And_SmartTest/ServiceUdisk directory when you connect the
device to a server.
76
Users & Security
User accounts
Configure user accounts, including local users, LDAP users, and AD groups, to control access to
HDM. You can also enable 2FA authentication to authenticate HDM users through static and
dynamic passwords.
Parameters
• User ID: ID of the user.
• Username: Name of the user.
• Access to HDM: Whether the user can access the HDM Web interface.
• User role: Role of the user, which determines the network access privileges of the user.
Administrator—The user has read and write permissions to all features.
Operator—The user has read permission to all features and has write permission to some
features.
User—The user has read-only permission.
CustomRoleN—The user has the privileges specified for the custom role by an
administrator user. The system supports a maximum of five custom user roles.
1
None—The user does not have network access permissions. This role is for special use.
Do not assign the role to any users.
• Email: Email address at which the user is contacted.
2
Parameters
• Complexity check: Disable or enable password complexity check.
If this feature is disabled, passwords must meet the following basic complexity
requirements:
− 2 to 20 characters in length.
− Case sensitive. Valid characters are letters, digits, spaces, and the following special
characters: ` ~ ! @ # $ % ^ & * ( ) _ + - = [ ] \ { } | ; ' : " , . / < > ?
If this feature is enabled, passwords must meet the following enhanced complexity
requirements:
− 8 to 20 characters in length.
− Case sensitive. Valid characters are the same as those supported when complexity
check is disabled.
− Must contain characters from at least two of the following categories: uppercase letters,
lowercase letters, and digits.
− Must contain at least one space or special character.
− Must not be identical to the username or the reverse of the username.
− Must meet the old password reuse requirement.
• Maximum password age: Maximum number of days that a password can be used. When a
password is about to expire, HDM prompts the user to change the password. The password of
the default administrator will not expire.
• Password history count: Number of unique passwords that a user must create before an old
password can be reused.
• Account lockout threshold: Number of consecutive login failures that will cause a user
account to be locked.
• Account lockout duration: Amount of time before a locked account can be used again.
3
Figure 135 Configuring privileges for custom users
Parameters
• User roles: User role that represents a set of network and service access privileges.
• CustomRoleN: Name of the custom user role. The system supports a maximum of five
custom user roles. By default, a custom user role has only the information query privilege. You
can edit a custom user role name as needed. A name is a case-sensitive string of 1 to 16
characters, and supports only letters, digits, dots (.), hyphens (-), underscores (_), and at signs
(@).
• User accounts: Specify the privilege to manage local users, LDAP users, and AD groups,
configure two-factor authentication, import and export configurations, and perform unified
control.
• Basic configuration: Specify the privilege to manage asset tags, network configuration, NTP
configuration, SNMP configuration, and alarm settings (SMTP settings, SNMP trap settings,
syslog settings, and emergence diagnosis), event log, operation log, video replay, and
intelligent security bezel.
• Security: Specify the privilege to configure access services, firewall, SSL certificate, PFR, and
security tip for login settings.
• Remote control: Specify the privilege to manage storage configuration (RAID configuration
and physical drive management), system resource monitoring, hard partitioning configuration,
KVM, H5 KVM, password settings for VNC client login, system boot options, UID LED, SOL
connection mode, and MCA policy. The privilege for power control and mounting media images
are not included.
• Remote media: Specify the privilege to configure virtual media configuration, media mounting
from the KVM console, and media mounting from the H5 KVM console.
• Power control: Specify the privilege to manage power configuration, physical power supply
button control, NMI control, and fan settings.
• Maintenance: Specify the privilege to manage the drive UID LED, BSoD screenshots, video
replay, firmware update, HDM settings restoration, HDM primary/backup switchover, HDM
restart, CPLD restart, and service USB device settings.
• Information query: Specify the information viewing privilege for a user. For an administrator
user, this privilege allows the user to view information about all users. For a non-administrator
user, this privilege allows the user to view its own information.
• Password modification: Specify the privilege to modify the local user's own password and
SSH key.
4
Manage local user accounts
Restrictions and guidelines
You cannot modify the username of a user in a session or delete such a user.
You cannot delete a user in a session.
Prerequisites
Make sure you signed in with the administrator role.
Add a user account
1. On the top navigation bar, click Users & Security.
2. In the left navigation pane, select User Accounts.
3. Click Add.
4. In the dialog box that opens, configure the user parameters.
5
Figure 136 Adding a user account
5. Click OK.
Edit a user account
You cannot edit the username of a user with sessions.
To edit a user account:
1. On the top navigation bar, click Users & Security.
2. In the left navigation pane, select User Accounts.
6
3. Click Edit in the user account entry.
4. In the dialog box that opens, configure the user parameters.
Figure 137 Editing a user account
5. Click OK.
7
Delete a user account
1. On the top navigation bar, click Users & Security.
2. In the left navigation pane, select User Accounts.
3. Click Delete in the user account entry.
4. In the dialog box that opens, click OK.
Parameters
• User ID: ID of the user.
• Username: Specify a username for the user account. The username is a case-sensitive string
of 1 to 16 characters. Valid characters are letters, digits, dots (.), hyphens (-), underscores (_),
and at signs (@).
• Password: Specify a password for the user account, which must comply with the password
policy described in "Configure the password policy for local users."
• Confirm: Enter the password again for confirmation.
• Access to HDM: Select Enable to enable the user to access HDM through the Web or IPMI
interface. If you do not enable user access, the user cannot access HDM through the Web or
IPMI interface.
• User role: Select a user role, which represents a set of network and service access privileges.
Available user roles include:
Administrator—The user has read and write permissions to all features.
Operator—The user has read permission to all features and has write permission to some
features.
User—The user has read-only permission.
CustomRoleN—The user has the privileges specified for the custom role by an
administrator user. The system supports a maximum of five custom user roles.
None—The user does not have network access permissions. This role is for special use.
Do not assign the role to any users.
• Available interfaces: Select the Web and IPMI access privileges for the user as needed.
Web and IPMI access are authorized to administrators and operators by default and cannot be
revoked.
• SNMP extended privileges: Select whether to grant the user with SNMP extended privileges.
To grant the privileges, you must enable user access to HDM and the user password must
contain a minimum of eight characters. If you select SNMP extended privileges, select a
privilege from the SNMP v3 R/W permission field. Options include:
Read: The user has read-only permission. This enables the user to perform GET
operations and receive traps.
Read/Write: The user has read-and-write permission. This enables the user to perform
GET and SET operations and receive traps.
• SNMP v3 authProtocol: Select the SNMP v3 authentication protocol. Options include SHA
and MD5. The default protocol is SHA.
• SNMP v3 privProtocol: Select the SNMP v3 privacy protocol. Options include DES and AES.
The default protocol is DES.
• Email address: Enter the email address at which the user is contacted. The address cannot
exceed 63 characters. You can use the address to retrieve the password for the user account.
To send alert emails to a user, you must specify an email address in the user account for that
user. Alert emails are configurable from the Alarm Settings menu.
• SSH key: Upload an SSH key for the user to access the HDM CLI. At access attempts, the
user must also enter the password for the key if a password was specified during key
generation on the HDM CLI client. If no password was specified, the user can directly log in to
the HDM CLI.
8
In the current software version, RSA, ECDSA, and ED25519 keys are supported. The length of
an SSH key varies by key format.
For RSA SSH keys, the length can be 1024, 2048, or 4096 bytes.
For ECDSA SSH keys, the length can be 256, 384, or 521 bytes.
For ED25519 SSH keys, the length can only be 256 bytes.
9
Configure services √ √ ×
Configure the firewall √ √ ×
Configure SSL √ √ ×
PFR √ √ ×
Security tip for login √ √ ×
Remote console
10
event log entries)
Save operation log in CSV format √ × ×
Configure advanced settings for video
√ × ×
replay (download and play videos)
Update firmware √ × ×
Restore HDM settings √ × ×
Restart HDM √ × ×
Change between the primary and
√ × ×
backup HDM images
Restart CPLD √ × ×
Manage service USB device settings √ × ×
Information query
11
View LDAP settings √ √ √
View AD settings √ √ √
View SNMP settings √ √ √
View alarm settings √ √ √
View service information √ √ √
View firewall settings √ √ √
View PFR settings √ √ √
View the SSL certificate √ √ √
View UID LED status √ √ √
View system boot options √ √ √
View SOL connection mode
√ √ √
information
View virtual media information √ √ √
View intelligent security bezel settings √ √ √
View service USB device settings √ √ √
View the security tip for login √ √ √
Display power status √ √ √
View two-factor authentication
√ √ √
settings
View the security module status √ √ √
View power information √ √ √
Display power configuration
√ √ √
(operating mode and power-on policy)
12
Configure LDAP settings
Lightweight Directory Access Protocol (LDAP) enables you to efficiently access and maintain
distributed directory information services over an IP network.
You can enable LDAP authentication and access to HDM with the user accounts in LDAP role
groups on the LDAP server.
Prerequisites
Before configuring LDAP settings, make sure an LDAP server is available. For more information,
see "Set up an LDAP server."
Procedure
1. On the top navigation bar, click Users & Security.
2. In the left navigation pane, select User Accounts.
3. Click the Domain Users tab.
Figure 138 Domain Users tab
13
Figure 139 Configuring LDAP parameters
6. Click OK.
Parameters
• Encryption type: Select the encryption type.
No encryption—Establishes an unencrypted connection with the LDAP server.
SSL—Establishes an SSL encrypted connection with the LDAP server.
• Common name type: IP address or domain name.
• Server address: IPv4 address, IPv6 address, or domain name of the LDAP server.
• Port number: LDAP service port number, in the range of 1 to 65535. For an SSL connection,
the port number is 636 by default. For the remaining types of connections, the port number is
389 by default. Make sure the port number is unique among all services.
• Bind DN: DN information of the LDAP user that is bound to the LDAP server and HDM. The
maximum length is 255 bytes. The DN information includes the following comma-separated
items:
CN—User login name.
UID—User ID.
14
OU—Organizational units in ascending order of levels.
DC—Name of the domain to which the user belongs.
• Password: Directory password of the LDAP user.
• Search base: Search base (directory) of the LDAP user in the bind DN on the LDAP server.
The maximum length is 255 bytes.
• User identification method: User identification method used by the LDAP server. Supported
methods are CN and UID. The user identification method must be consistent with LDAP user
information in the bind DN.
6. Click OK.
Edit a role group
1. On the top navigation bar, click Users & Security.
2. In the left navigation pane, select User Accounts.
3. Click the Domain Users tab.
4. In the LDAP Settings section, click the Edit link in the role group entry that you want to
modify.
5. Modify the parameters.
15
Figure 141 Editing a role group
6. Click OK.
Delete a role group
1. On the top navigation bar, click Users & Security.
2. In the left navigation pane, select User Accounts.
3. Click the Domain Users tab.
4. In the LDAP Settings section, click Delete in the role group entry that you want to delete.
Parameters
• Role group ID: ID of the role group.
• Role group name: Name of an existing role group on the LDAP server.
• Role group domain: Search base (directory) of the role group on the LDAP server. The
maximum length is 255 bytes.
• Role group privileges: Network privileges of the group.
Configure AD authentication
Perform this task to enable users to access HDM by using the username and password of user
accounts in a valid Active Directory (AD) group configured on the AD server.
Prerequisites
Before configuring AD settings, make sure an AD server is available.
Procedure
1. On the top navigation bar, click Users & Security.
2. In the left navigation pane, select User Accounts.
3. Click the Domain Users tab.
4. In the Active Directory section, click Settings.
5. Select Enable or Disable for AD authentication. If you select Enable, configure AD
authentication parameters as needed.
16
Figure 142 Configuring AD authentication parameters
6. Click OK.
Parameters
• Secret username: Enter the username used for logging in to the AD servers, a string of up to
64 characters. The username can contain only digits, letters, or both and must start with a
letter. The username is optional.
• Secret password: Enter the password used for logging in to the AD servers, a string of 6 to 96
characters. The password is optional.
• User domain name: Enter the user domain name.
• Domain controller address: Enter the IP address or domain name of an AD server. Domain
controller address 1 is required.
Manage AD groups
Perform this task to add, edit, or delete AD groups.
Add an AD group
1. On the top navigation bar, click Users & Security.
2. In the left navigation pane, select User Accounts.
3. Click the Domain Users tab.
4. In the Active Directory section, click Add role groups.
5. In the dialog box that opens, configure AD group parameters.
17
Figure 143 Adding an AD group
6. Click OK.
Edit an AD group
1. On the top navigation bar, click Users & Security.
2. In the left navigation pane, select User Accounts.
3. Click the Domain Users tab.
4. In the Active Directory section, click Edit for the target AD group from the AD group list.
5. In the dialog box that opens, edit AD group parameters.
Figure 144 Editing an AD group
6. Click OK.
Delete an AD group
1. On the top navigation bar, click Users & Security.
2. In the left navigation pane, select User Accounts.
3. Click the Domain Users tab.
18
4. In the Active Directory section, click Delete for the target AD group from the AD group list.
Parameters
• Role group ID: ID of the AD group.
• Group name: Name of an existing group on the AD server, a string of 1 to 64 characters. Only
digits, letters, underscores (_), and hyphens (-) are allowed.
• Group domain: Name of the domain to which the group belongs, a string of 1 to 255
characters. Only digits, letters, underscores (_), hyphens (-), and dots (.) are allowed.
• Group privileges: Network privileges of the group.
CAUTION:
Use this feature with caution. Enabling two-factor authentication might affect HDM login.
19
SNMPv3 No Yes
SOL Yes Yes
Procedure
1. On the top navigation bar, click Users & Security.
2. In the navigation pane, select User Accounts.
3. Click the Two-Factor Authentication tab.
4. Configure two-factor authentication:
a. Enable Two-factor authentication.
b. Enter the OTP server address, service port, and shared key.
Figure 145 Configuring two-factor authentication
5. Click Save.
Parameters
• OTP server address: Enter the IPv4 or domain address of the OTP server.
• Service port: Enter the service port number of the OTP server. The default is 1812.
• Shared key: Enter the shared key configured when you add the HDM management IP address
to the OTP server. The shared key is a case-sensitive string of 1 to 64 characters. Only letters,
digits, and special characters `~!@$%^&*()_+-=[]\{}|;':",./? are allowed.
Security
Configure firewall
The firewall protects HDM from attacks based on firewall rules that identify accesses to be
permitted or blocked.
If HDM cannot be accessed due to improper firewall settings, you can restore the HDM default
settings from the BIOS to clear the firewall rules. For more information, see the BIOS user guide for
the server.
Types of firewall rules and their priority order
You can create the following firewall rules:
20
• Blacklist rules—Block accesses to the HDM server from specific IP addresses or MAC
addresses. You can configure a blacklist rule to take effect in the specified time range.
• Whitelist rules—Permit accesses to the HDM server from specific IP addresses of MAC
addresses. You can configure a whitelist rule to take effect in the specified time range.
The blacklist rules take precedence over the whitelist rules.
Manage blacklist rules
Use blacklist rules to block accesses from the specified IP addresses and MAC addresses.
Restrictions and guidelines
• You must specify an IP address/IP range, a MAC address, or both for a blacklist rule.
• The time range settings take effect based on the system time in the HDM server and use the
same time zone as HDM. To identify the current time in the HDM server, navigate to
Dashboard > Summary.
• If you create multiple blacklist rules with the same content, the system displays only one of
them.
Add a blacklist rule
1. On the top navigation bar, click Users & Security.
2. In the left navigation pane, select Security.
3. In the Blacklist rules section, click Add New Rules.
Figure 146 Adding a blacklist rule
4. In the dialog box that opens, enter an IP address/IP range, a MAC address, or both, and set
the time range during which the rule takes effect. By default, no validity period is set and the
rule is valid permanently.
21
Figure 147 Configuring blacklist rule parameters
5. Click OK.
Delete a blacklist rule
1. On the top navigation bar, click Users & Security.
2. In the left navigation pane, select Security.
3. In the Blacklist rules section, click Delete for the target rule.
4. In the dialog box that opens, click OK.
Edit a blacklist rule
1. On the top navigation bar, click Users & Security.
2. In the left navigation pane, select Security.
3. In the Blacklist rules section, click Edit for the target rule.
4. In the dialog box that opens, edit the rule as needed.
Figure 148 Editing a blacklist rule
5. Click OK.
Manage whitelist rules
Use whitelist rules to permit accesses from the specified IP addresses and MAC addresses.
Restrictions and guidelines
22
• First add the IP address and MAC address of the local device to the whitelist before adding
any other whitelist rules. If you do not do so, HDM cannot be accessed from the local device.
• If whitelist rules exist, only devices whose addresses have been added to the whitelist can
access HDM.
• When you delete a whitelist rule, make sure you fully understand the impact of the operation.
• You must specify an IP address/IP range, a MAC address, or both for a whitelist rule.
• The time range settings take effect based on the system time in the HDM server and use the
same time zone as HDM.
• If you create multiple whitelist rules with the same content, the system displays only one of
them.
Add a whitelist rule
1. On the top navigation bar, click Users & Security.
2. In the left navigation pane, select Security.
3. In the Whitelist rules section, click Add New Rules.
4. In the dialog box that opens, enter an IP address/IP range, a MAC address, or both, and set
the time range during which the rule takes effect. By default, no validity period is set and the
rule is valid permanently.
Figure 149 Adding a whitelist rule
5. Click OK.
Delete a whitelist rule
1. On the top navigation bar, click Users & Security.
2. In the left navigation pane, select Security.
3. In the Whitelist rules section, click Delete for the target rule.
4. In the dialog box that opens, click OK.
Edit a whitelist rule
1. On the top navigation bar, click Users & Security.
2. In the left navigation pane, select Security.
3. In the Whitelist rules section, click Edit for the target rule.
4. In the dialog box that opens, edit the rule as needed.
23
Figure 150 Editing a whitelist rule
5. Click OK.
24
Upload an SSL certificate and key to HDM
Prerequisites
Before you upload an SSL certificate, perform the following tasks:
• Make sure you signed in with the administrator or operator role, or a user account that has the
privilege to configure security settings.
• Identify the date and time in HDM on the Dashboard > Summary page, and verify that the
HDM system time is in the validity period of the certificate. If the HDM system time is not in the
validity period of the certificate, SSL authentication will fail.
• Make sure the certificate file and the private key files are in PEM format.
Procedure
1. On the top navigation bar, click Users & Security.
2. In the left navigation pane, select Security.
3. Click the SSL Certificate tab.
4. Click Upload SSL.
5. Examine information about the current certificate and private key to decide whether a new set
of certificate and private key is needed:
Current certificate uploaded at—Date and time when the current certificate was
uploaded.
Current private key uploaded at—Date and time when the current private key was
uploaded.
6. Click Browse next to the New certificate field, and then select an SSL certificate file.
7. Click Browse next to the New private key field, and then select a private key file.
8. Click OK.
After the certificate is uploaded, your user session will be disconnected. The HDM server will
use the new SSL certificate for authentication during subsequent sign ins.
Figure 152 Uploading an SSL certificate and key
25
9. If you uploaded an SSL certificate generated by yourself, verify that the corresponding root
certificate already exists in the client browser. This section uses IE 11.0 to illustrate how to
view and add the root certificate of the certification authority to the browser.
a. Open the IE browser.
b. From the toolbar, click Tools. Then, select Internet options.
c. In the dialog box that opens, click the Content tab and then click Certificates.
d. Click the Trusted Root Certification Authorities tab to view the trusted root certification
authorities and root certificate expiration date.
e. If the certification authority is not in the list, click Import to import the root certificate.
Figure 153 Viewing and adding the root certificate
26
Figure 154 Configuring the certificate parameters.
6. Click OK.
7. In the confirmation dialog box that opens, click OK.
If the certificate is generated, you receive a success result message.
The HDM server will use the new SSL certificate for authentication during subsequent sign-ins.
Parameters
• Common name (CN): Full domain name of the HDM server, a string of 1 to 64 characters.
Only letters, digits, spaces, underscores (_), hyphens (-), and dots (.) are allowed. The
common name cannot be a digits-only string.
• Organization (O): Name of the organization that owns the HDM server, a string of 1 to 64
characters. Only letters, digits, spaces, underscores (_), hyphens (-), dots (.), and commas (,)
are allowed. The organization name cannot be a digits-only string.
• Organizational Unit (OU): Name of the unit that owns the HDM server in the organization, a
string of 1 to 64 characters. Only letters, digits, spaces, underscores (_), hyphens (-), and dots
(.) are allowed. The organizational unit name cannot be a digits-only string.
• Locality (L): City or county where the HDM server resides, a string of 1 to 128 characters.
Only letters, digits, spaces, underscores (_), hyphens (-), and dots (.) are allowed. The locality
name cannot be a digits-only string.
• State or province (ST): State or province where the HDM server resides, a string of 1 to 128
characters. Only letters, digits, spaces, underscores (_), hyphens (-), and dots (.) are allowed.
The state or province name cannot be a digits-only string.
• Country (C): Country or region where the HDM server resides. The country/region is
represented as a two-letter code.
27
• Email address: Email address at which the HDM server owner can be contacted.
• Validity period: Validity period of the SSL certificate, in the range of 1 to 5475 days.
• Key length: Key length of the certificate.
• Basic information: Basic information about the current SSL certificate.
Version—Version number of the certificate.
Serial number—Serial number of the certificate. This number is assigned by the certificate
authority (CA).
Signature algorithm—Signature algorithm of the certificate.
Public key—Public key information of the certificate.
• Issued by: Certificate authority that issued the certificate.
• Validity: Validity period of the certificate.
Issued at—First valid day of the certificate.
Expires at—Expiration day of the certificate.
• Issued to: Entity to whom the certificate is issued.
Configure PFR
Platform Firmware Resiliency (PFR) is a technology used to protect HDM from attacks. If PFR is
enabled, PFR will verify the HDM firmware image when HDM starts.
• If the primary HDM firmware image passes the verification, HDM starts with the primary image.
• If the primary HDM firmware image is damaged, PFR verifies the backup HDM firmware image.
If the backup image passes the verification, HDM starts with the backup image.
• If both the primary and backup HDM firmware images are damaged, but the damage to the
primary image does not affect HDM start, HDM starts with the primary image.
Hardware and feature compatibility
Only the G5 series server supports this feature.
Software version and feature compatibility
This feature is supported only in HDM-2.13 and later.
Restrictions and guidelines
• You can update a damaged firmware image to correct it.
• Enabling PFR extends the startup time of HDM.
Procedure
1. On the top navigation bar, click Users & Security.
2. In the navigation pane, select Security.
3. Click the PFR tab.
4. Select whether to enable HDM to start with the backup image upon primary image damage.
28
Figure 155 PFR tab
Parameters
• Enablement status: Enablement status of PFR.
• Current firmware status: Result of the verification on HDM firmware images during this
startup.
• Start with the backup image upon primary image damage: Select whether HDM can start
with the backup firmware image. This feature is disabled by default. With this feature enabled,
HDM can start with the backup firmware image if the primary image fails the verification but the
backup image passes the verification.
29
Figure 156 Configuring the security tip for login
30
Figure 157 Security tip at login
Security modules
View TPM/TCM status
Trusted Platform Module (TPM) is a microchip embedded in the system board. It stores encryption
information (such as encryption keys) for authenticating server hardware and software. Trusted
Cryptography Module (TCM) is a trusted computing platform-based hardware module with
protected storage space, which enables the platform to implement password calculation. For
information about the TPM/TCM module, see the user guide for the server.
Restrictions and guidelines
This feature is available only in HDM-2.14 and later.
Procedure
1. On the top navigation bar, click Users & Security.
31
2. In the navigation pane, select Security Modules.
3. On the tab that opens, you can view TPM or TCM status. This field displays N/A if both the
TPM and TCM are not supported.
Figure 158 Viewing TPM or TCM status
32
Unified control
Use unified control to manage a maximum of 10 devices in bulk. You can perform the following
tasks:
• Add devices
• View device information
• Access HDM
• Perform power actions
• Launch an H5 KVM remote console
• Delete devices
Add devices
Perform this task to add devices one by one or in bulk.
Restrictions and guidelines
The specified IP range can contain a maximum of 255 IP addresses.
If the specified IP range contains IP addresses of over 10 devices, the system adds the 10 devices
whose information is obtained first.
If you change the HDM login username or password of a device after you add it for unified control,
the device will become inaccessible from the unified control interface.
Only one user can add devices at a time.
Procedure
1. In the navigation pane, select Unified Control.
Figure 159 Unified control page
1
Figure 160 Adding devices
Parameters
• Start IP: Enter the HDM management IP address or the start IP address of the HDM
management IP range. Only IPv4 addresses are supported. This field is required.
• End IP: Enter the end HDM management IP address. Only IPv4 addresses are supported.
This field is optional.
• Username: Enter a username for HDM login. As a best practice, enter the username of an
administrator user. If you enter the username of a non-administrator user, some functions will
be unavailable.
• Password: Enter the password for HDM login.
Parameters
• IP: HDM management IP address of the server.
• Health status: Health status of the server.
Normal—All server components are operating correctly.
Critical, Major, or Minor—A minimum of one component is experiencing
issues.
2
• Power status: Power status of the server.
On—The server is powered on.
Off—The server is powered off.
• UID LED: Status of the UID LED.
On—The UID LED of the server is steady blue.
Off—The UID LED of the server is off.
Flashing—The UID LED of the server is flashing blue. The server is updating firmware
or the remote console is launched.
Access HDM
Perform this task to access the HDM interface of a specific server.
Prerequisites
Make sure the specified user account for the device has the privilege to access HDM. The user
privileges are determined by the user role.
Procedure
1. In the navigation pane, select Unified Control.
2. Click the IP address link of the target server.
The HDM interface for the server opens, as shown in Figure 100.
Figure 162 HDM interface for the specified server
3
Prerequisites
Make sure the specified user account for the device has the administrator, operator, or power
control role.
To avoid operation failure, make sure the other users are not performing any power actions.
Procedure
1. In the navigation pane, select Unified Control.
2. Identify the entry for the target server.
3. Select a power action for the server as shown in Figure 101.
To warm reboot the server without power cycling the server, select Force system reset.
To shut down the server immediately by force, select Force power-off. This action is
equivalent to pressing the power button on the server for five seconds.
To shut down the operating system first, and then remove power from the server, select
Graceful power-off.
To start up the server, select Power on.
To power off and then power on the server, select Force power-cycle.
Figure 163 Performing power actions
4
Figure 164 Remote console for a secondary user
Delete devices
To avoid operation failure, make sure the other users are not performing device deletion actions
before you delete devices.
To delete devices:
1. In the navigation pane, select Unified Control.
2. Select one or multiple servers.
3. Click Delete devices.
4. In the dialog box that opens, click OK.
Figure 165 Deleting devices
5
Common operations
This section introduces common operations in HDM configuration.
1
Figure 167 Configuring file sharing settings
c. Select a Read/Write permission for each user from the Permission Level column.
Figure 168 Adding a user
2
3. Access HDM and configure media mounting settings.
a. On the top navigation bar, click Remote Services.
b. In the left navigation pane, select Virtual Media.
c. In the work pane, click Settings.
d. In the dialog box that opens, enable remote media.
e. Select CD/DVD as the media type.
f. Specify the IP address of the CIFS server and IMAGE2 as the source path. In this example,
the server address is 192.168.32.48.
g. Select CIFS as the shared file system.
h. Enter the username and password for access to the shared image file.
Figure 169 Configuring media mounting settings
4. Click OK.
The Virtual Media page displays mounted images.
Figure 170 Virtual Media page
3
Install and configure Samba
1. Execute the yum –y install samba samba-common samba-client command to install
Samba.
The samba-common and samba-client keyword represent the Samba server and Samba
client, respectively. As a best practice, specify both keywords to install both the server and the
client.
2. Execute the yum list installed | grep samba command to verify that both the Samba
server and Samba client have been installed successfully.
3. Execute the testparm command to verify that Samba is configured correctly as shown in
Figure 109.
Figure 171 Verifying Samba parameters
4. Execute the systemctl start smb command to start the Samba service and execute the
systemctl status smb command to verify that the service operates correctly.
5. Disable the firewall and disable SELinux.
systemctl stop firewalld
getenforce
setenforce 0
6. Execute the pdbedit –L command to verify that Samba users exist. If no user exists,
execute the smbpasswd -a username command to add a user. In this example, the
username is ldt.
4
Make sure the added user already exists in the server OS. To view existing users in the OS,
execute the cat /etc/passwd command.
Figure 172 Adding a Samba user
8. Edit the /etc/samba/smb.conf configuration file to create a shared file path. In this example,
the path is /test.
vi /etc/samba/smb.conf
[mnt]
comment = /mnt dir
path = /test
9. Execute the systemctl restart smb command to restart Samba.
10. Upload the file to share to the path. In this example, the file is named test.iso.
Mount an image to HDM
1. Access HDM.
2. On the top navigation bar, click Remote Services.
3. In the left navigation pane, select Virtual Media.
4. In the work pane, click Settings.
5. In the dialog box that opens, enable remote media.
a. Select CD/DVD as the media type.
b. Specify the IP address of the Samba server and /mnt as the source path. In this example,
the server address is 10.99.205.165.
c. Select CIFS as the shared file system.
5
d. Enter the username and password of a Samba user.
e. (Optional.) Enter a domain name.
Figure 174 Configuring media mounting settings
6. Click OK.
The Virtual Media page displays mounted images.
Figure 175 Virtual Media page
6
Figure 176 Searching for user account information
2. To edit the password of an existing user, delete the comment statement for the user, and then
set the new password.
To retain the password of an existing user, leave the password field for the user empty.
If the complexity check field displays 1 in Figure 114, make sure the password you enter meet
the complexity requirements.
Figure 177 Configuring a new password
3. To add a new user account, delete the comment statement for the user, and then specify the
username and password.
The username and password fields are required for a new user account.
If the complexity check field displays 1 in Figure 114, make sure the password you enter meet
the complexity requirements.
7
Figure 178 Deleting the comment statement
4. To configure the role of a user and enable access to HDM, set the User role and Access to
HDM fields, respectively. For supported options of the fields, see Table 14.
Figure 180 Configuring user privileges
8
Table 14 Configurable item description
Item Description
Privileges of custom user roles 1 through 5. Each role custom field
displays the decimal number equivalent of an 9-bit binary number,
where each bit represents a privilege as follows:
• Bit 0—Remote control.
• Bit 1—Remote media.
• Bit 2—Security configuration.
• Bit 3—User account configuration.
role customrole 1 through 5 • Bit 4—Basic configuration.
• Bit 5—Power control.
• Bit 6—Maintenance.
• Bit 7—Information query.
• Bit 8—Password modification.
The bit value indicates the enablement status of a privilege as follows:
• 1—Enabled.
• 0—Disabled.
User ID User ID, in the range of 2 to 16. A user ID must be unique.
Specify the role of the user.
• 2—User.
• 3—Operator.
• 4—Administrator.
• 6—CustomRole 1.
User role
• 7—CustomRole 2.
• 8—CustomRole 3.
• 9—CustomRole 4.
• 10—CustomRole 5.
• 15—None.
Access to HDM Enter 0 or 1 to disable or enable access to HDM.
WEB Enter 0 or 1 to disable or enable the Web extended privilege.
IPMI Enter 0 or 1 to disable or enable the IPMI extended privilege.
9
Figure 181 Importing the configuration file
7. To verify the configuration, re-sign in to HDM after HDM restarts and access the Users &
Security > User Accounts page to view HDM user accounts.
Figure 182 Re-signing in to HDM
10
Figure 183 Viewing user accounts
11
Figure 185 Modifying SNMP trap server settings
Item Description
SnmpEnable Enter 0 or 1 to disable or enable SNMP trap notification.
Enter an SNMP trap mode. Options include:
Trap Mode • 0—Node mode.
• 1—Event mode.
Enter an SNMP version. Options include:
• 0—v1.
Version
• 1—v2c.
• 2—v3.
V3_User Enter a username used by the system to send SNMPv3 traps.
Location Enter the location of the server, a string of up to 31 bytes.
Contact Enter contact information, a string of up to 31 bytes.
12
Item Description
Enter the trap community string for authentication on the manager. The
Trap_Community
value range is 1 to 31 characters. The default value is public.
Severity levels of SNMP traps. Options include:
• 0—Minor + Major + Critical.
AlarmSendLevel
• 1—Major + Critical.
• 2—All.
Enter the port number at which the destination host receives SNMP
Port-Port_8
traps. The value range is 1 to 65535. The default port number is 162.
13
Figure 187 Opening the configuration file
NOTE:
• The $template RemoteLogs directive instructs rsyslog daemon to collect and write all
remote messages to distinct files stored in the /var/log directory.
• The *.* ?RemoteLogs directive indicates that the RemoteLogs template will be used to
receive all log messages.
• The & ~ directive instructs rsyslog daemon to stop writing messages to local files, and to
write messages only to the messages.log directory.
14
4. Configure syslog settings on the HDM Web interface.
a. Sign in to the HDM Web interface.
b. On the top navigation bar, click Remote O&M.
c. In the left navigation pane, select Alarm Settings.
d. Click the Syslog Settings tab.
e. In the Syslog notification settings section, select Enable for Syslog notification, select
host name as the syslog server identifier, select UDP as the transmission protocol, and
then click OK.
Figure 190 Configuring syslog notification settings
e. In the Syslog server settings section, click Edit for a syslog server. Configure the syslog
server parameters, and then click OK.
Make sure you specify the OS IP address of the server instead of the HDM management
address.
Figure 191 Configuring syslog server parameters
15
• Two-way authentication—Authenticates both the syslog server and the client used for HDM
login.
Prerequisites
Install the OS on the server. Rsyslog is installed on the OS by default.
Procedure
1. Download the rsyslog-gnutls package for TLS transmission.
If the server is connected to the network, use the sudo yum install -y
rsyslog-gnutls or apt command to download the package.
If the server is disconnected from the network, obtain the package from the OS image, as
shown in Figure 130.
Figure 192 Obtaining the rsyslog-gnutls package from the OS image
3. Generate a self-signed CA certificate. Right-click on the desktop, select Open Terminal, and
then perform the following tasks:
a. Generate a private key file in PEM format.
# cd /root/Desktop
# mkdir tls
# cd tls
# mkdir server
# mkdir client
# openssl genrsa -out cakey.pem 2048
16
b. Generate a root certificate signing request (CSR) file.
# openssl req -new -key cakey.pem -out ca.csr -subj
"/C=CN/ST=myprovice/L=mycity/O=myorganization/OU=mygroup/CN=myCA"
c. Generate a self-signed root certificate.
# openssl x509 -req -days 365 -sha1 -extensions v3_ca -signkey cakey.pem -in ca.csr
-out cacert.pem
4. Generate a private key and certificate for the server. Right-click on the desktop, select Open
Terminal, and then perform the following tasks:
a. Generate a private key file.
# cd server
# openssl genrsa -out key.pem 2048
b. Generate a certificate request file. This section uses IP address 172.16.18.48 (OS IP
address of the server) as an example.
# openssl req -new -key key.pem -out server.csr -subj
"/C=CN/ST=myprovice/L=mycity/O=myorganization/OU=mygroup/CN=172.16.18.48"
c. Use the root certificate to issue the server certificate.
# openssl x509 -req -days 365 -sha1 -extensions v3_req -CA ../cacert.pem
-CAkey ../cakey.pem -CAserial ca.srl -CAcreateserial -in server.csr -out cert.pem
d. Use the CA certificate to verify the server certificate.
# openssl verify -CAfile ../cacert.pem cert.pem
5. Generate a private key and certificate for the client. Right-click on the desktop, select Open
Terminal, and then perform the following tasks:
a. Generate a private key file.
# cd ../client
# openssl genrsa -out key.pem 2048
b. Generate a certificate request file. This section uses IP address 172.16.20.168 as an
example.
# openssl req -new -key key.pem -out client.csr -subj
"/C=CN/ST=myprovice/L=mycity/O=myorganization/OU=mygroup/CN=172.16.20.168"
c. Use the root certificate to issue the client certificate.
# openssl x509 -req -days 365 -sha1 -extensions v3_req -CA ../cacert.pem
-CAkey ../cakey.pem -CAserial ../server/ca.srl -CAcreateserial -in client.csr -out
cert.pem
d. Use the CA certificate to verify the client certificate.
# openssl verify -CAfile ../cacert.pem cert.pem
6. Configure the rsyslog.conf configuration file.
a. Leave TCP and UDP settings unchanged, and modify the marked lines as shown in Figure
132.
17
Figure 194 Configuring the configuration file
18
Figure 195 Configuring syslog notification settings
g. Configure the alarm log server parameters, and then click OK.
Figure 196 Configuring alarm log server parameters
19
Figure 197 Viewing rsyslog log
Install an OS
Install Windows Server 2012 R2 Datacenter. For more information, see H3C Servers Operating
System Installation Guide.
20
3. Click Manage in the upper right corner and select Add Roles and Features.
4. In the window that opens, click Next.
Figure 199 Add Roles and Features wizard
5. Select Role-based or feature-based installation as the installation type, and then click Next.
21
Figure 200 Selecting an installation type
6. Select Select a server from the server pool, select the current server as the destination
server, and then click Next.
Figure 201 Selecting the destination server
22
7. Select DNS server as the server role, and then click Next.
Figure 202 Selecting the server role
23
9. On the DNS Server tab, click Next.
10. Verify that the server configuration is correct, and then click Install.
Install Active Directory Domain Services on the server
1. Repeat steps 1 to 6 in DNS server installation.
2. On the Server Roles tab, select Active Directory Domain Services, and then click Next.
Figure 204 Selecting the server role
24
Figure 205 Selecting the features of the server
25
2. In the dialog box that opens, click Promote this server to a domain controller in the Action
column to open the AD DS configuration wizard.
Figure 207 All Servers Task Details dialog box
3. Select Add a new forest, enter an Active Directory domain name in the Root domain name
field, for example, hdmldap, and then click Next.
Figure 208 Active Directory Domain Services configuration wizard
26
4. On the Domain Controller Options tab, enter the password for the domain controller, and
then click Next.
Figure 209 Domain Controller Options menu
5. Click Next as instructed until you enter the Paths tab. Specify the location of the AD DS
database, log files, and SYSVOL, and then click Next.
27
Figure 210 Configuring Active Directory paths
6. Click Next as instructed until you enter the Prerequisites Check tab, and then click Install.
The OS automatically restarts after the installation is complete.
28
Figure 211 Prerequisites Check menu
29
Figure 212 Selecting the server role
30
6. On the Role Services tab, select Certification Authority and Certification Authority Web
Enrollment, and then click Next.
Figure 214 Selecting role services for AD CS
31
Figure 215 Selecting role services for the Web server
2. In the dialog box that opens, click Configure Active Directory Certificate Services on the
server in the Action column to open the AD CS configuration wizard.
32
Figure 217 All Servers Task Details dialog box
4. On the Role Services tab, select Certificate Authority and Certificate Authority Web
Enrollment, and then click Next.
33
Figure 219 Selecting role services
5. On the Setup Type tab, select Enterprise CA, and then click Next.
6. On the CA Type tab, select Root CA, and then click Next.
7. On the Private Key tab, select Create a new private key, and then click Next.
8. Select RSA as the cryptographic provider, 2048 as the key length, and SHA1 as the hash
algorithm, and then click Next.
34
Figure 220 Specifying the cryptographic options
35
10. Enter a validity period, and then click Next. The default validity period is 5 years.
11. On the Certificate Database tab, specify the database locations, and then click Next.
Figure 222 Specifying the database locations
12. Verify that the configuration is correct, and then click Configure.
After the configuration is complete, restart the server to make the configuration take effect.
36
Figure 223 Active Directory Users and Computers window
3. Right-click hdmldap.com in the left navigation pane, and select New > Organizational Unit.
Figure 224 Right-clicking a domain name
37
4. In the dialog box that opens, enter an organizational unit name, for example, company, and
then click OK.
First-level organizational unit company is created successfully.
Figure 225 Creating a first-level organizational unit
5. To create a second-level organizational unit for the first-level organizational unit, right-click
company, and select New > Organizational Unit.
6. In the dialog box that opens, enter an organizational unit name, for example, product, and
then click OK.
Second-level organizational unit product is created successfully.
38
Figure 226 Creating a second-level organizational unit
39
Figure 227 Creating a role group
Creating a user
You can create a user for an organizational unit of any level.
To create a user:
1. Right-click an organizational unit and select New > User. This section takes second-level
organizational unit product as an example.
2. In the dialog box that opens, configure the user settings as required, and then click Next.
The usernames in the User logon name and User logon name (pre-Windows 2000) fields
will be used for HDM login.
40
Figure 228 Creating a user
3. Set the password, cancel the User must change password at next logon option, and click
Next.
The password will be used for HDM login.
Figure 229 Setting the password
41
4. Verify that the user configuration is correct, and click Finish.
Add a user to a role group
You can add a user to a role group by configuring the role group or configuring the user. This
section configures the user as an example.
To add a user to a user group:
1. Right-click the target user, for example, user1, and select Add to a group.
2. In the dialog box that opens, enter a role group name, for example, group1, and then click OK.
Figure 230 Selecting a role group
42
Figure 231 Configuring the LDAP parameters
6. Click OK.
Add a role group
1. On the top navigation bar, click Users & Security.
2. In the left navigation pane, select User Accounts.
3. Click the Domain Users tab.
4. In the LDAP Settings section, click Add role groups.
5. Configure the role group parameters, as shown in Figure 170.
6. Click OK.
43
Figure 232 Adding a role group
44
Figure 233 Signing in to HDM
LDAP keywords
Keyword Full name Description
Domain name. For example, domain name example.com can be
dc Domain component
translated into dc=example,dc=com.
uid User ID ID of a user.
Container of Active Directory that can manage Active Directory
ou Organizational unit
objects such as users and groups.
45
Appendix A Downloaded log files
Level 1 Level 2 File name Description
dump_end Dump end time
HDM_SDS_DUMP_DUP_01 Dump encryption information
dump HDM_SDS_DUMP_DUP_02 Dump encryption information
HDM_SDS_DUMP_DUP_03 Dump encryption information
HDM_SDS_DUMP_DUP_04 Dump encryption information
*.sbe Internal record for event log
event
*.csv Internal record for event log
hdm pack.info SDS log compression information
auth HDM login authentication information
operate Operation log
sdmmc0p4 log
update Update log
visible Audit log
board_cfg System board or mainboard information
hdm.json HDM configuration
bios.json BIOS configuration
raid.json RAID configuration
firmware_version System firmware version information
FruInfo FRU information
dcpmm_info DCPMM information
gpu_info GPU information
hardware.info Hardware information
static
hardware_info Hardware information
net_cfg Net configuration
PCIe_arguments_table PCIe device configuration information
CPLD register values of node board and
Pdb_Node_dump_info power supply board on R6900 G3 and
R8900 G3