Imm Userguide
Imm Userguide
User Guide
Note: Before using this information and the product it supports, read the general information in Appendix B, “Notices,” on page
99.
Chapter 2. Opening and using the IMM Chapter 4. Monitoring server status . . 49
Web interface . . . . . . . . . . . . 9 Viewing system status . . . . . . . . . . . 49
Accessing the IMM Web interface . . . . . . . 9 Viewing the Easy LED Diagnostics . . . . . . 52
Setting up the IMM network connection through Viewing the event logs . . . . . . . . . . 52
the Server Firmware Setup Utility . . . . . . 9 Viewing the system-event log from the Web
Logging in to the IMM . . . . . . . . . 10 interface . . . . . . . . . . . . . . 53
IMM action descriptions . . . . . . . . . . 11 Viewing event logs from the Setup Utility . . . 54
Viewing event logs without restarting the server 54
Viewing vital product data . . . . . . . . . 55
Chapter 3. Configuring the IMM . . . . 15
Setting system information . . . . . . . . . 15
Setting server timeouts . . . . . . . . . 16
Chapter 5. Performing IMM tasks . . . 57
Setting the IMM date and time . . . . . . . 17 Viewing server power and restart activity . . . . 57
Synchronizing clocks in a network. . . . . . 18 Controlling the power status of a server . . . . . 57
Disabling the USB in-band interface . . . . . 19 Remote presence. . . . . . . . . . . . . 58
Creating a login profile . . . . . . . . . . 20 Updating your IMM firmware and Java applet 59
Deleting a login profile . . . . . . . . . . 23 Enabling the remote presence function . . . . 59
Configuring the global login settings . . . . . . 23 Remote control . . . . . . . . . . . . 59
Configuring remote alert settings . . . . . . . 24 Remote control screen capture . . . . . . . 60
Configuring remote alert recipients . . . . . 24 Remote control Video Viewer view modes . . . 60
Configuring global remote alert settings . . . . 25 Remote control video color mode . . . . . . 61
Configuring SNMP alert settings . . . . . . 26 Remote control keyboard support . . . . . . 61
Configuring serial port settings . . . . . . . . 26 Remote control mouse support . . . . . . . 62
Serial-to-Telnet or SSH redirection . . . . . . . 27 Remote power control . . . . . . . . . . 64
Configuring port assignments . . . . . . . . 28 Viewing performance statistics . . . . . . . 64
Configuring network interfaces . . . . . . . . 28 Starting Remote Desktop Protocol . . . . . . 64
Configuring network protocols . . . . . . . . 31 Remote disk . . . . . . . . . . . . . 64
Configuring SNMP . . . . . . . . . . . 31 Setting up PXE network boot . . . . . . . . 66
Configuring DNS . . . . . . . . . . . 32 Updating firmware . . . . . . . . . . . . 67
Configuring Telnet . . . . . . . . . . . 33 Resetting the IMM with the Setup Utility . . . . 67
Configuring SMTP . . . . . . . . . . . 33 Managing tools and utilities with IMM and the
Configuring LDAP . . . . . . . . . . . . 33 server firmware . . . . . . . . . . . . . 68
Setting up a client to use the LDAP server . . . 33 Using IPMItool . . . . . . . . . . . . 68
Configuring LDAP client authentication . . . . 36 Using Advanced Settings Utility (ASU) . . . . 68
Configuring LDAP search attributes . . . . . 36 Other methods for managing the IMM . . . . 68
Service Location Protocol (SLP) . . . . . . . 38
Configuring security . . . . . . . . . . . 38 Chapter 6. LAN over USB. . . . . . . 71
Secure Web server and secure LDAP . . . . . 39 Potential conflicts with the LAN over USB interface 71
SSL certificate overview . . . . . . . . . 39 Configuring the LAN over USB interface manually 71
SSL server certificate management . . . . . . 40 Installing device drivers . . . . . . . . . . 71
Enabling SSL for the secure Web server . . . . 43 Installing the Windows IPMI device driver . . . 71
SSL client certificate management . . . . . . 43 Installing the LAN over USB Windows device
SSL client trusted certificate management . . . 43 driver . . . . . . . . . . . . . . . 72
Enabling SSL for the LDAP client . . . . . . 44 Installing the LAN over USB Linux device driver 73
Configuring the Secure Shell server . . . . . . 44
Generating a Secure Shell server key . . . . . 45 Chapter 7. Command-line interface . . 75
Enabling the Secure Shell server . . . . . . 45 Managing the IMM using IPMI . . . . . . . . 75
Using the Secure Shell server . . . . . . . 45 Accessing the command line. . . . . . . . . 75
Before the IMM was used in Lenovo servers, the baseboard management controller
(BMC) and basic input/output system (BIOS) were the standard
systems-management hardware and firmware. ThinkServer servers used BMC
service processors to manage the interface between systems-management software
and platform hardware. The Remote Supervisor Adapter II and Remote Supervisor
Adapter II Slimline were optional controllers for out-of-band server management.
The IMM offers several improvements over the combined functionality of the BMC
and the Remote Supervisor Adapter II:
v Choice of dedicated or shared Ethernet connection.
v One IP address for both the Intelligent Platform Management Interface (IPMI)
and the service processor interface.
v Embedded Dynamic System Analysis (DSA).
v Ability to locally or remotely update other entities without requiring a server
restart to initiate the update process.
v Remote configuration with Advanced Settings Utility (ASU).
v Capability for applications and tools to access the IMM either in-band or
out-of-band.
v Enhanced remote-presence capabilities.
This document explains how to use the functions of the IMM in a Lenovo
Thinkserver server. The IMM works with the server firmware to provide
systems-management capability for ThinkServer servers.
This document does not contain explanations of errors or messages. IMM errors
and messages are described in the Hardware Maintenance Manual that came with
your server.
If firmware and documentation updates are available, you can download them
from the Lenovo Support Web site. The IMM might have features that are not
Note: Changes are made periodically to the Lenovo Support Web site. Procedures
for locating firmware and documentation might vary slightly from what is
described in this document.
IMM features
The IMM provides the following functions:
v Around-the-clock remote access and management of your server
v Remote management independent of the status of the managed server
v Remote control of hardware and operating systems
v Web-based management with standard Web browsers
There are two types of IMM functionality: IMM Standard and IMM Premium. For
information about the type of IMM hardware in your server, see the
documentation that came with the server.
Note: The following features of the Remote Supervisor Adapter II are not in the
IMM:
v Display of server MAC addresses
v Multiple NTP server entries
v Dynamic DNS support
Note: Like the BMC, the IMM uses the standard Intelligent Platform Management
Interface (IPMI) specification.
Chapter 1. Introduction 3
Table 1. Comparison of the IMM features and combined BMC and Remote Supervisor Adapter II features in
ThinkServer servers
BMC with Remote Supervisor Adapter II
Description (TS100, TS100, TS100x, RS110, and RD120) IMM(RD210, RD220, and later)
Network connections BMC uses a network connection that is The IMM provides both BMC and Remote
shared with a server and an IP address that is Supervisor Adapter II functionality through
different from the Remote Supervisor Adapter the same network connection. One IP
II IP address. address is used for both. The user can
choose either a dedicated or a shared
Remote Supervisor Adapter II uses a network connection.
dedicated systems-management network
connection and an IP address that is different
from the BMC IP address.
Update capabilities Each server requires a unique update for One IMM firmware image can be used for
BMC and Remote Supervisor Adapter II. all of the applicable servers.
BIOS and diagnostic tools can be updated The IMM firmware, server firmware, and
in-band. Dynamic System Analysis (DSA) firmware
can be updated both in-band and
out-of-band.
Chapter 1. Introduction 5
Table 1. Comparison of the IMM features and combined BMC and Remote Supervisor Adapter II features in
ThinkServer servers (continued)
BMC with Remote Supervisor Adapter II
Description (TS100, TS100, TS100x, RS110, and RD120) IMM(RD210, RD220, and later)
Remote presence The BMC with Remote Supervisor Adapter II This feature is available only with IMM
has the following remote presence Premium.
capabilities:
In addition to the Remote Supervisor
v Graphical console redirection over LAN
Adapter II remote presence features, the
v Remote virtual diskette and CD-ROM IMM also has the following capabilities.
v High-speed remote redirection of PCI Note: The IMM requires Java Runtime
video, keyboard, and mouse Environment 1.5 or later.
v Video resolution up to 1024 x 768, at 70 Hz, v Video resolution up to 1280 x 1024, at 75
is supported Hz, is supported
v Data encryption v USB 2.0 support for virtual keyboard,
mouse, and mass storage devices
v 15-bit color depth
v Choice of either absolute or relative
mouse mode
v USB flash drive support
v Server power and reset control on the
Remote Control window
v Video on the Remote Control window can
be saved in a file
The following server operating systems have USB support, which is required for
the remote presence feature:
v Microsoft Windows® Server® 2008
v Microsoft Windows Server 2003
v Red Hat Enterprise Linux® versions 4.0 and 5.0
v SUSE Linux version 10.0
Note: The IMM Web interface does not support the double-byte character set
(DBCS) languages.
Chapter 1. Introduction 7
8 Integrated Management Module: User Guide
Chapter 2. Opening and using the IMM Web interface
The IMM combines service processor functions, a video controller, and remote
presence function (when an optional virtual media key is installed) in a single
chip. To access the IMM remotely by using the IMM Web interface, you must first
log in. This chapter describes the login procedures and the actions that you can
perform from the IMM Web interface.
To set up the IMM network connection through the Setup Utility, complete the
following steps:
1. Turn on the server.
To access the IMM through the IMM Web interface, complete the following steps:
1. Open a Web browser. In the address or URL field, type the IP address or host
name of the IMM server to which you want to connect.
2. Type your user name and password in the IMM Login window. If you are
using the IMM for the first time, you can obtain your user name and password
from your system administrator. All login attempts are documented in the
event log. Depending on how your system administrator configured the user
ID, you might need to enter a new password.
3. On the Welcome Web page, select a timeout value from the drop-down list in
the field that is provided. If your browser is inactive for that number of
minutes, the IMM logs you off the Web interface.
You can click the View Configuration Summary link, which is in the top-right
corner on most pages, to quickly view the configuration of the IMM.
Note: The available fields in the System Settings page are determined by the
accessed remote server.
3. In the Name field in the IMM Information area, type the name of the IMM.
Use the Name field to specify a name for the IMM in this server. The name is
included with e-mail and SNMP alert notifications to identify the source of the
alert.
Note: Your IMM name (in the Name field) and the IP host name of the IMM
(in the Hostname field on the Network Interfaces page) do not
automatically share the same name because the Name field is limited to
16 characters. The Hostname field can contain up to 63 characters. To
minimize confusion, set the Name field to the nonqualified portion of
the IP host name. The nonqualified IP host name consists of up to the
first period of a fully qualified IP host name. For example, for the fully
qualified IP host name imm1.us.company.com, the nonqualified IP host
name is imm1. For information about your host name, see “Configuring
network interfaces” on page 28.
4. In the Contact field, type the contact information. For example, you can specify
the name and phone number of the person to contact if there is a problem with
this server. You can type a maximum of 47 characters in this field.
5. In the Location field, type the location of the server. Include in this field
sufficient detail to quickly locate the server for maintenance or other purposes.
You can type a maximum of 47 characters in this field.
6. Scroll to the bottom of the page and click Save.
Note: The IMM date and time setting affects only the IMM clock, not the server
clock. The IMM real-time clock and the server clock are separate,
independent clocks and can be set to different times. To synchronize the
IMM clock with the server clock, go to the Network Time Protocol area of
the page and set the NTP server host name or IP address to the same server
host name or IP address that is used to set the server clock. See
“Synchronizing clocks in a network” on page 18 for more information.
Alerts that are sent by e-mail and SNMP use the real-time clock setting to time
stamp the alerts. The clock settings support Greenwich mean time (GMT) offsets
and daylight saving time (DST) for added ease-of-use for administrators who are
managing systems remotely over different time zones. You can remotely access the
event log even if the server is turned off or disabled.
To verify the date and time settings of the IMM, complete the following steps:
1. Log in to the IMM where you want to set the IMM date and time values. For
more information, see Chapter 2, “Opening and using the IMM Web interface,”
on page 9.
2. In the navigation pane, click System Settings and scroll down to the IMM
Date and Time area, which shows the date and time when the Web page was
generated.
3. To override the date and time settings and to enable daylight saving time (DST)
and Greenwich mean time (GMT) offsets, click Set IMM Date and Time.
4. In the Date field, type the numbers of the current month, day, and year.
5. In the Time field, type the numbers that correspond to the current hour,
minutes, and seconds in the applicable entry fields. The hour (hh) must be a
The IMM NTP feature provides a way to synchronize the IMM real-time clock with
the time that is provided by an NTP server. You can specify the NTP server that is
to be used, specify the frequency with which the IMM is synchronized, enable or
disable the NTP feature, and request immediate time synchronization.
The NTP feature does not provide the extended security and authentication that
are provided through encryption algorithms in NTP Version 3 and NTP Version 4.
The IMM NTP feature supports only the Simple Network Time Protocol (SNTP)
without authentication.
To set up the IMM NTP feature settings, complete the following steps:
1. Log in to the IMM on which you want to synchronize the clocks in the
network. For more information, see Chapter 2, “Opening and using the IMM
Web interface,” on page 9.
2. In the navigation pane, click System Settings and scroll down to the IMM
Date and Time area.
3. Click Set IMM Date and Time.
4. Under Network Time Protocol (NTP), you can select from the following
settings:
NTP auto-synchronization service
Use this selection to enable or disable automatic synchronization of the
IMM clock with an NTP server.
NTP server host name or IP address
Use this field to specify the name of the NTP server to be used for
clock synchronization.
NTP update frequency
Use this field to specify the approximate interval (in minutes) between
synchronization requests. Enter a value between 3 - 1440 minutes.
Synchronize Clock Now
Click this button to request an immediate synchronization instead of
waiting for the interval time to lapse.
5. Click Save.
If you disable the USB in-band interface, also disable the watchdog
timeouts to prevent the server from restarting unexpectedly. For more
information, see “Setting server timeouts” on page 16.
The USB in-band interface, or LAN over USB, is used for in-band communications
to the IMM. To prevent any application that is running on the server from
requesting the IMM to perform tasks, you must disable the USB in-band interface.
For more information about LAN over USB, see Chapter 6, “LAN over USB,” on
page 71.
Note: The ASU works with a disabled USB in-band interface if an IPMI device
driver is installed.
If you try to use systems-management applications while the in-band interface
is disabled, they might not work.
4. Click Save.
To enable the USB device driver interface after it has been disabled, clear the Do
not allow commands on USB interface check box and click Save.
Notes:
1. The USB in-band interface is also called "LAN over USB" and is described in
more detail in Chapter 6, “LAN over USB,” on page 71.
2. When you attempt a network installation of some Linux distributions, the
installation might fail if the IMM USB in-band interface is enabled. For more
information, see http://rhn.redhat.com/errata/RHBA-2009-0127.html.
3. If you are performing a network installation that does not contain the update
on the Red Hat Web site described in the preceding note 2, you must disable
the USB in-band interface before you perform the installation and enable it
after the installation is complete.
4. For information about the configuration of the LAN over USB interface, see
“Configuring the LAN over USB interface manually” on page 71.
Certain login profiles are shared with the IPMI user IDs, providing a single set of
local user accounts (username/password) that work with all of the IMM user
interfaces, including IPMI. Rules that pertain to these shared login profiles are
described in the following list:
v IPMI user ID 1 is always the null user.
v IPMI user ID 2 maps to login ID 1, IPMI user ID 3 maps to login ID 2, and so
on.
v The IMM default user is set to USERID and PASSW0RD (with a zero, not the letter
O) for IPMI user ID 2 and login ID 1.
For example, if a user is added through IPMI commands, that user information is
also available for authentication through the Web, Telnet, SSH, and other interfaces.
Conversely, if a user is added on the Web or other interfaces, that user information
is available for starting an IPMI session.
Because the user accounts are shared with IPMI, certain restrictions are imposed to
provide a common ground between the interfaces that use these accounts. The
following list describes IMM and IPMI login profile restrictions:
v IPMI allows a maximum of 64 user IDs. The IMM IPMI implementation allows
only 12 user accounts.
v IPMI allows anonymous logins (null user name and null password), but the
IMM does not.
v IPMI allows multiple user IDs with the same user names, but the IMM does not.
v IPMI requests to change the user name from the current name to the same
current name return an invalid parameter completion code because the
requested user name is already in use.
v The maximum IPMI password length for the IMM is 16 bytes.
v The following words are restricted and are not available for use as local IMM
user names:
– immroot
– nobody
– ldap
– lighttpd
– sshd
– daemon
– immftp
Important: By default, the IMM is configured with one login profile that
enables remote access using a login user ID of USERID and a
password of PASSW0RD (the 0 is a zero, not the letter O). To avoid a
potential security exposure, change this default login profile during
the initial setup of the IMM.
3. Click Add User. An individual profile is displayed.
4. In the Login ID field, type the name of the profile.
You can type a maximum of 16 characters in the Login ID field. Valid
characters are uppercase and lowercase letters, numbers, periods, and
underscores.
Note: This password is used with the login ID to grant remote access to the
IMM.
6. In the Confirm password field, type the password again.
7. In the Authority Level area, select one of the following options to set the access
rights for this login ID:
Supervisor
The user has no restrictions.
Read Only
The user has read-only access only and cannot perform actions such as
file transfers, power and restart actions, or remote presence functions.
Custom
If you select the Custom option, you must select one or more of the
following custom authority levels:
v User Account Management: A user can add, modify, or delete users
and change the global login settings in the Login Profiles page.
v Remote Console Access: A user can access the remote console.
v Remote Console and Virtual Media Access: A user can access both
the remote console and the virtual media feature.
v Remote Server Power/Restart Access: A user can access the
power-on and restart functions for the remote server. These functions
are available in the Power/Restart page.
v Ability to Clear Event Logs: A user can clear the event logs.
Everyone can look at the event logs, but this particular permission is
required to clear the logs.
v Adapter Configuration - Basic: A user can modify configuration
parameters in the System Settings and Alerts pages.
v Adapter Configuration - Networking & Security: A user can modify
configuration parameters in the Security, Network Protocols,
Network Interface, Port Assignments, and Serial Port pages.
Note: To return the login profiles to the factory defaults, click Clear
Login Profiles.
8. In the Configure SNMPv3 User area, select the check box if the user should
have access to the IMM by using the SNMPv3 protocol. After you click the
check box, the configuration settings for SNMPv3 appear. Use following fields
to configure the SNMPv3 settings for the user profile:
Authentication Protocol
Use this field to specify either HMAC-MD5 or HMAC-SHA as the
authentication protocol. These are hash algorithms used by the
SNMPv3 security model for the authentication. The password for the
Linux account will be used for authentication. If you choose None,
authentication protocol is not used.
Privacy Protocol
Data transfer between the SNMP client and the agent can be protected
using encryption. The supported methods are DES and AES. Privacy
protocol is valid only if the authentication protocol is set to either
HMAC-MD5 or HMAC-SHA.
Privacy Password
Use this field to specify the encryption password.
Confirm Privacy Password
Use this field to confirm the encryption password.
After you configure a remote alert recipient, the IMM sends an alert to that
recipient through a network connection when any event selected from the
Monitored Alerts group occurs. The alert contains information about the nature of
the event, the time and date of the event, and the name of the system that
generated the alert.
Note: If the SNMP Agent or SNMP Traps fields are not set to Enabled, no SNMP
traps are sent. For information about these fields, see “Configuring SNMP”
on page 31.
Note: If you have not configured an alert recipient profile, the profile does not
appear in the remote alert recipients list.
Complete the following steps to set the number of times that the IMM attempts to
send an alert:
1. Log in to the IMM on which you want to set remote alert attempts. For more
information, see Chapter 2, “Opening and using the IMM Web interface,” on
page 9.
2. In the navigation pane, click Alerts and scroll down to the Global Remote
Alert Settings area.
Use these settings to define the number of remote alert attempts and the length
of time between the attempts. The settings apply to all configured remote alert
recipients.
Remote alert retry limit
Use the Remote alert retry limit field to specify the number of
additional times that the IMM attempts to send an alert to a recipient.
The IMM does not send multiple alerts; additional alert attempts occur
only if there is a failure when the IMM attempts to send the initial
alert.
Complete the following steps to select the type or types of alerts that are sent to
SNMP:
1. Log in to the IMM on which you want to set remote alert attempts. For more
information, see Chapter 2, “Opening and using the IMM Web interface,” on
page 9.
2. In the navigation pane, click Alerts and scroll down to the SNMP Alerts
Settings area.
3. Select the type or types of alerts. The remote alerts are categorized by the
following levels of severity:
v Critical
v Warning
v System
4. Scroll to the bottom of the page and click Save.
Serial port 1 (COM1) is used for IPMI Serial over LAN (SOL). COM1 is
configurable only through the IPMI interface.
COM2 is used for serial redirection through Telnet or SSH. COM2 is not
configurable through the IPMI interface. On rack-mounted and tower servers,
COM2 is an internal COM port with no external access.
Both serial ports use 8 data bits, null parity, and 1 stop bit. A baud rate choice of
9600, 19200, 38400, 57600, 115200, and 230400 is available.
You can configure the serial redirection and command-line interface for the COM2
port in the IMM.
Note: If you select CLI with user defined keystroke sequences, you must
define the key sequence.
After the serial redirection starts, it continues until the user types the exit key
sequence. When the exit key sequence is typed, serial redirection stops and the
user is returned to command mode in the Telnet or SSH session. Use this field
to specify the exit key sequence.
5. Click Save.
Example session
telnet 192.168.70.125 (Press Enter.)
Connecting to 192.168.70.125...
username: USERID (Press Enter.)
password: ******** (Press Enter.)
system> console 1 (Press Enter.)
All traffic from COM2 is now routed to the Telnet session. All traffic from the
Telnet or SSH session is routed to COM2.
ESC Q
Type the exit key sequence to return to the command-line interface. In this
example, press Esc and then type q.
Back to LegacyCLI console....
4. Click Save.
Note: Disabling the Ethernet interface prevents all access to the IMM from the
external network.
4. If you want to use a Dynamic Host Configuration Protocol (DHCP) server
connection, enable it by clicking either of the following choices in the DHCP
field:
v Enabled - Obtain IP config from DHCP server
v Try DHCP server. If it fails, use static IP config.
The default setting is Try DHCP server. If it fails, use static IP config.
Note: Do not enable DHCP unless you have an accessible, active, and
configured DHCP server on your network. When DHCP is used, the
automatic configuration overrides any manual settings.
If you want to assign a static IP address to the IMM, select Disabled - Use
static IP configuration.
If DHCP is enabled, the host name is assigned as follows:
v If the Hostname field contains an entry, the IMM DHCP support requests
that the DHCP server use this host name.
v If the Hostname field does not contain an entry, the IMM DHCP support
requests that the DHCP server assigns a unique host name to the IMM.
5. Type the IP host name of the IMM in the Hostname field.
You can enter a maximum of 63 characters in this field, which represents the
IP host name of the IMM. The host name defaults to IMMA, followed by the
IMM burned-in media access control (MAC) address.
Note: The IP host name of the IMM (the Hostname field) and IMM name (the
Name field on the System page) do not automatically share the same
name, because the Name field is limited to 15 characters but the
Hostname field can contain up to 63 characters. To minimize confusion,
set the Name field to the nonqualified portion of the IP host name. The
nonqualified IP host name consists of up to the first period of a fully
qualified IP host name. For example, for the fully qualified IP host
name imm1.us.company.com, the nonqualified IP host name is imm1.
For information about your host name, see “Setting system
information” on page 15.
If you enabled DHCP, go to step 12 on page 30.
If you have not enabled DHCP, continue with step 6.
6. In the IP address field, type the IP address of the IMM. The IP address must
contain four integers from 0 - 255 with no spaces and separated by periods.
7. In the Subnet mask field, type the subnet mask that is used by the IMM. The
subnet mask must contain four integers from 0 - 255 with no spaces or
consecutive periods and separated by periods.
The default setting is 255.255.255.0.
To automatically detect the duplex type, set the Auto Negotiate field to
Yes, which is the default value.
Maximum Use the Maximum transmission unit field to specify the maximum size
transmission of a packet (in bytes) for your network interface. For Ethernet, the valid
unit maximum transmission unit (MTU) range is 60 - 1500. The default value
for this field is 1500.
Locally Enter a physical address for the IMM in the Locally administered MAC
administered address field. If a value is specified, the locally administered address
MAC address overrides the burned-in MAC address. The locally administered address
must be a hexadecimal value from 000000000000 through FFFFFFFFFFFF.
This value must be in the form xx:xx:xx:xx:xx:xx where x is a number 0 -
9. The IMM does not support the use of a multicast address. The first
byte of a multicast address is an odd number (the least significant bit is
set to 1). Therefore, the first byte must be an even number.
Burned-in MAC The burned-in MAC address is a unique physical address that is
address assigned to this IMM by the manufacturer. The address is a read-only
field.
1
Mb equals approximately 1 000 000 bits.
Note: You can also configure the IMM network connection through the Setup
Utility. For more information, see “Setting up the IMM network connection
through the Server Firmware Setup Utility” on page 9.
Changes to the network protocol settings require that the IMM be restarted for the
changes to take effect. If you are changing more than one protocol, you can wait
until all of the protocol changes have been made and saved before you restart the
IMM.
Configuring SNMP
You can use the SNMP agent to collect information and to control the server. The
IMM can also be configured to send SNMP alerts to the configured host names or
IP addresses.
Notes:
1. The IMM provides two Management Information Base (MIB) files for use with
SNMP applications. The MIB files are included in the IMM firmware update
packages.
2. IMM supports the SNMPv1 and SNMPv3 standards.
Note: If you enabled the SNMPv3 agent, you must configure SNMPv3
settings for active login profiles for the interaction between the
SNMPv3 manager and SNMPv3 agent to work correctly. You can
configure these settings at the bottom of the individual login profile
settings on the Login Profiles page (see “Creating a login profile” on
page 20 for more information). Click the link for the login profile to
configure, scroll to the bottom of the page and then click the Configure
SNMPv3 User check box.
4. Select Enabled in the SNMP traps field to forward alerts to SNMP
communities on your network. To enable the SNMP agent, the following
criteria must be met:
Configuring DNS
To configure the Domain Name System (DNS), complete the following steps:
1. Log in to the IMM where you want to configure DNS. For more information,
see Chapter 2, “Opening and using the IMM Web interface,” on page 9.
2. In the navigation pane, click Network Protocols and scroll down to the
Domain Name System (DNS) area of the page.
3. If a DNS server (or servers) is available on your network, select Enabled in the
DNS field. The DNS field specifies whether you use a DNS server on your
network to translate host names into IP addresses.
4. If you enabled DNS, in the DNS server IP address fields, specify the IP
addresses of up to three DNS servers on your network. Each IP address must
contain integers from 0 - 255, separated by periods.
5. Scroll to the bottom of the page and click Save.
6. In the navigation pane, click Restart IMM to activate the changes.
Configuring SMTP
To specify the IP address or host name of the Simple Mail Transfer Protocol
(SMTP) server, complete the following steps:
1. Log in to the IMM where you want to configure SMTP. For more information,
see Chapter 2, “Opening and using the IMM Web interface,” on page 9.
2. In the navigation pane, click Network Protocols and scroll down to the SMTP
area of the page.
3. In the SMTP Server Host Name or IP address field, type the host name of the
SMTP server. Use this field to specify the IP address or, if DNS is enabled and
configured, the host name of the SMTP server.
4. Scroll to the bottom of the page and click Save.
5. In the navigation pane, click Restart IMM to activate the changes.
Configuring LDAP
Using a Lightweight Directory Access Protocol (LDAP) server, the IMM can
authenticate a user by querying or searching an LDAP directory on an LDAP
server, instead of going through its local user database. Then, the IMM can
remotely authenticate any user access through a central LDAP server. This requires
LDAP client support on the IMM. You can also assign authority levels according to
information that is found on the LDAP server.
You can also use LDAP to assign users and IMMs to groups and perform group
authentication, in addition to the normal user (password check) authentication. For
example, an IMM can be associated with one or more groups, and a user would
pass group authentication only if the user belongs to at least one group that is
associated with the IMM.
Note: The port number for each server is optional. If the field is left blank,
the default value of 389 is used for nonsecured LDAP connections. For
secured connections, the default is 636. You must configure at least
one LDAP server.
You can configure the following parameters:
Root DN
This is the distinguished name (DN) of the root entry of the directory tree
on the LDAP server (for example, dn=mycompany,dc=com). This DN is
used as the base object for all searches.
UID Search Attribute
When the selected binding method is Anonymously or w/ Configured
Credentials, the initial bind to the LDAP server is followed by a search
request that is aimed at retrieving specific information about the user,
including the user’s DN, login permissions, and group membership. This
search request must specify the attribute name that is used to represent
user IDs on that server. This attribute name is configured here.
Important: If you give a user the ability to modify basic, networking, and
security-related IMM configuration parameters, consider giving
this same user the ability to restart the IMM (bit position 10).
Otherwise, a user might be able to change parameters (for
example, the IP address of the IMM) but cannot make them
take effect.
Configuring security
| Use the general procedure in this section to configure security for the IMM Web
| server, for the connection between the IMM and an LDAP server. If you are not
| familiar with the use of SSL certificates, read the information in “SSL certificate
| overview” on page 39.
Use the following general tasks list to configure the security for the IMM:
1. Configure the Secure Web server:
a. Disable the SSL server. Use the HTTPS Server Configuration for Web
Server area on the Security page.
b. Generate or import a certificate. Use the HTTPS Server Certificate
Management area on the Security page (see “SSL server certificate
management” on page 40).
c. Enable the SSL server. Use the HTTPS Server Configuration for Web
Server area on the Security page (see “Enabling SSL for the secure Web
server” on page 43).
2. Configure SSL security for LDAP connections:
Note: Changes to the SSL client configuration take effect immediately and do
not require a restart of the IMM.
You can configure the IMM to use SSL support for two types of connections: secure
server (HTTPS) and secure LDAP connection (LDAPS). The IMM takes on the role
of SSL client or SSL server depending on the type of connection. The following
table shows that the IMM acts as an SSL server for secure Web server connections.
The IMM acts as an SSL client for secure LDAP connections.
Table 5. IMM SSL connection support
Connection type SSL client SSL server
Secure Web server Web browser of the user IMM Web server
(HTTPS) (For example: Microsoft Internet Explorer)
Secure LDAP IMM LDAP client An LDAP server
connection (LDAPS)
You can view or change the SSL settings from the Security page. You can enable or
disable SSL and manage the certificates that are required for SSL.
For more complete security, you can use a certificate that is signed by a certificate
authority. To obtain a signed certificate, use the SSL Certificate Management page
The function of the certificate authority is to verify the identity of the IMM. A
certificate contains digital signatures for the certificate authority and the IMM. If a
well-known certificate authority issues the certificate or if the certificate of the
certificate authority has already been imported into the Web browser, the browser
can validate the certificate and positively identify the IMM Web server.
The IMM requires a certificate for the secure Web server and one for the secure
LDAP client. Also, the secure LDAP client requires one or more trusted certificates.
The trusted certificate is used by the secure LDAP client to positively identify the
LDAP server. The trusted certificate is the certificate of the certificate authority that
signed the certificate of the LDAP server. If the LDAP server uses self-signed
certificates, the trusted certificate can be the certificate of the LDAP server itself.
Additional trusted certificates must be imported if more than one LDAP server is
used in your configuration.
Country
Use this field to indicate the country where the IMM is physically
located. This field must contain the 2-character country code.
State or Province
Use this field to indicate the state or province where the IMM is
physically located. This field can contain a maximum of 30
characters.
City or Locality
Use this field to indicate the city or locality where the IMM is
physically located. This field can contain a maximum of 50
characters.
Organization Name
Use this field to indicate the company or organization that owns
the IMM. When this is used to generate a certificate-signing
request, the issuing certificate authority can verify that the
organization that is requesting the certificate is legally entitled to
claim ownership of the given company or organization name. This
field can contain a maximum of 60 characters.
IMM Host Name
Use this field to indicate the IMM host name that currently
appears in the browser Web address bar.
Make sure that the value that you typed in this field exactly
matches the host name as it is known by the Web browser. The
browser compares the host name in the resolved Web address to
the name that appears in the certificate. To prevent certificate
warnings from the browser, the value that is used in this field
must match the host name that is used by the browser to connect
to the IMM. For example, if the address in the Web address bar is
http://mm11.xyz.com/private/main.ssi, the value that is used for
the IMM Host Name field must be mm11.xyz.com. If the Web
address is http://mm11/private/main.ssi, the value that is used
must be mm11. If the Web address is http://192.168.70.2/private/
main.ssi, the value that is used must be 192.168.70.2.
This certificate attribute is generally referred to as the common
name.
This field can contain a maximum of 60 characters.
Organizational Unit
Use this field to indicate the unit within the company or
organization that owns the IMM. This field can contain a
maximum of 60 characters.
Surname
Use this field for additional information, such as the surname of a
person who is responsible for the IMM. This field can contain a
maximum of 60 characters
Given Name
Use this field for additional information, such as the given name of
a person who is responsible for the IMM. This field can contain a
maximum of 60 characters.
Initials
Use this field for additional information, such as the initials of a
person who is responsible for the IMM. This field can contain a
maximum of 20 characters.
DN Qualifier
Use this field for additional information, such as a distinguished
name qualifier for the IMM. This field can contain a maximum of
60 characters.
Certificate-Signing request attributes
The following fields are optional unless they are required by your selected
certificate authority:
Challenge Password
Use this field to assign a password to the certificate-signing
request. This field can contain a maximum of 30 characters.
Unstructured Name
Use this field for additional information, such as an unstructured
name that is assigned to the IMM. This field can contain a
maximum of 60 characters.
5. After you complete the information, click Generate CSR. The new encryption
keys and certificate are generated. This process might take several minutes.
6. Click Download CSR and then click Save to save the file to your workstation.
The file that is produced when you create a certificate-signing request is in
DER format. If your certificate authority expects the data in some other
format, such as PEM, you can convert the file by using a tool such as
OpenSSL (http://www.openssl.org). If the certificate authority asks you to
copy the contents of the certificate-signing request file into a Web browser
window, PEM format is usually expected.
The command for converting a certificate-signing request from DER to PEM
format using OpenSSL is similar to the following example:
The procedure for generating the private encryption key and certificate for the SSL
client is the same as the procedure for the SSL server, except that you use the SSL
Client Certificate Management area of the Security Web page instead of the SSL
Server Certificate Management area. If you want to use a self-signed certificate for
the SSL client, see “Generating a self-signed certificate” on page 40. If you want to
use a certificate authority signed certificate for the SSL client, see “Generating a
certificate-signing request” on page 40.
Secure Shell users are authenticated by exchanging user ID and password. The
password and user ID are sent after the encryption channel is established. The user
ID and password pair can be one of the 12 locally stored user IDs and passwords,
or they can be stored on an LDAP server. Public key authentication is not
supported.
When you request a new server key, both a Rivest, Shamir, and Adelman key and
a DSA key are created to allow access to the IMM from an SSH version 2 client.
For security, the Secure Shell server private key is not backed up during a
configuration save and restore operation.
To create a new Secure Shell server key, complete the following steps:
1. In the navigation pane, click Security.
2. Scroll to the Secure Shell (SSH) Server area and make sure that the Secure
Shell server is disabled. If it is not disabled, select Disabled in the SSH Server
field and then click Save.
3. Scroll to the SSH Server Key Management area.
4. Click Generate SSH Server Private Key. A progress window opens. Wait for
the operation to be completed.
Note: You can enable the Secure Shell server only if a valid Secure Shell server
private key is installed.
Important: Security page settings are not saved with the backup operation and
cannot be restored with the restore operation.
The configuration information that is saved under this procedure does not include
the server firmware configuration settings or any IPMI settings that are not
common with the non-IMPI user interfaces.
Note: The security settings on the Security page are not restored by the
restore operation. To modify security settings, see “Secure Web server
and secure LDAP” on page 39.
7. After you receive a confirmation that the restore process is complete, in the
navigation pane, click Restart IMM; then, click Restart.
8. Click OK to confirm that you want to restart the IMM.
9. Click OK to close the current browser window.
10. To log in to the IMM again, start the browser, and follow your regular login
process.
Restoring defaults
Use the Restore Defaults link to restore the default configuration of the IMM, if
you have Supervisor access.
Attention: When you click Restore Defaults, you will lose all the modifications
that you made to the IMM.
Restarting IMM
Use the Restart IMM link to restart the IMM. You can perform this function only if
you have Supervisor access. Any Ethernet connections are temporarily dropped.
You must log in again to use the IMM Web interface.
From the Easy LED Diagnostics page, you can view the name, color, and status of
any LEDs that are lit on a server.
From the Vital Product Data (VPD) page, you can view the vital product data.
To view the system health and environmental information of the server, complete
the following steps:
1. Log in to the IMM. For more information, see Chapter 2, “Opening and using
the IMM Web interface,” on page 9.
2. In the navigation pane, click System Status to view a dynamically-generated
update of the overall health of the server.
The status of your server determines the message that is shown at the top of
the System Health Summary page. One of the following symbols is displayed:
v A solid green circle and the phrase Server is operating normally
v Either a red circle that contains an X or a yellow triangle that contains an
exclamation point and the phrase One or more monitored parameters are
abnormal
If the monitored parameters are operating outside normal ranges, a list of the
specific abnormal parameters is displayed on the System Health Summary
page.
3. Scroll down to the Temperature area in the Environmentals section of the page,
which includes temperature, voltage, and fan speed information.
The IMM tracks the current temperature readings and threshold levels for
system components such as microprocessors, system board, and hard disk drive
backplane. When you click a temperature reading, a new window opens.
Note: The hard shutdown alert is sent only if a soft shutdown alert has
not yet been sent.
For more information about selecting alert options, see “Configuring
SNMP alert settings” on page 26.
The IMM generates a non-critical, critical, or fatal event when the
threshold is reached, and generates any shutdown actions, if they are
required.
Non-critical
If the IMM indicates that this threshold has been reached, a
warning event is generated.
Critical
If the IMM indicates that this threshold has been reached, a
critical event is generated.
Fatal If the IMM indicates that this threshold has been reached, a
critical event is generated.
5. Scroll down to the Fan Speeds (% of max) area. The IMM Web interface
displays the running speed of the server fans (expressed in a percentage of the
maximum fan speed). If you click a fan reading, a new window opens.
You receive a fan alert when the fan speeds drop to an unacceptable level or
when the fans stop. You must select the Critical Alerts check box in the SNMP
Alerts Settings area of the Alerts page for the alert to be sent.
For more information about selecting alert options, see “Configuring SNMP
alert settings” on page 26.
6. Scroll down to the View Latest OS Failure Screen area. Click View OS Failure
Screen to access an image of the operating-system-failure screen that was
captured when the server stopped functioning.
Note:
To access and view the Easy LED Diagnostics, complete the following steps:
1. Log in to the IMM. For more information, see Chapter 2, “Opening and using
the IMM Web interface,” on page 9.
2. In the navigation pane, click Easy LED Diagnostics to view the recent history
of events on the server.
3. Scroll down to view the complete contents of the Easy LED Diagnostics.
Note: If an LED is not lit on the server, the Color column of the Easy LED
Diagnostics table indicates that the LED Color is Not Applicable.
To access and view the event log, complete the following steps:
1. Log in to the IMM. For more information, see Chapter 2, “Opening and using
the IMM Web interface,” on page 9.
2. In the navigation pane, click Event Log to view the recent history of events on
the server.
3. Scroll down to view the complete contents of the event log. The events are
given the following levels of severity:
Informational
This severity level is assigned to an event of which you should take
note.
Warning
This severity level is assigned to an event that might affect server
performance.
Error This severity level is assigned to an event that needs immediate
attention.
The IMM Web interface distinguishes warning events with the letter W on a
yellow background in the severity column and error events with the letter E on
a red background.
4. Click Save Log as Text File to save the contents of the event log as a text file.
Click Reload Log to refresh the display of the event log. Click Clear Log to
delete the contents of the event log.
To view the POST event log or system-event log, complete the following steps:
1. Turn on the server.
If you have installed Portable or Installable Dynamic System Analysis (DSA), you
can use it to view the system-event log (as the IPMI event log), the IMM event log
(as the ASM event log), the operating-system event logs, or the merged DSA log.
You can also use DSA Preboot to view these logs, although you must restart the
server to use DSA Preboot. To install Portable DSA, Installable DSA, or DSA
Preboot or to download a DSA Preboot CD image, go to http://www.lenovo.com/
support or complete the following steps:
Note: Changes are made periodically to the Lenovo Web site. The actual procedure
might vary slightly from what is described in this document.
1. steps.
If IPMItool is installed in the server, you can use it to view the system-event log.
Most recent versions of the Linux operating system come with a current version of
IPMItool.
You can view the IMM event log through the Event Log link in the IMM Web
interface.
The following table describes the methods that you can use to view the event logs,
depending on the condition of the server. The first two conditions generally do not
require that you restart the server.
To view the server component vital product data, complete the following steps:
1. Log in to the IMM. For more information, see Chapter 2, “Opening and using
the IMM Web interface,” on page 9.
2. In the navigation pane, click Vital Product Data to view the status of the
hardware and software components on the server.
3. Scroll down to view the following VPD readings:
Machine level VPD
The vital product data for the server appears in this area. For viewing
VPD, the machine-level VPD includes a universal unique identifier
(UUID).
IMM VPD
You can view the IMM firmware, server firmware, and Dynamic
System Analysis firmware VPD for the remote-managed server in this
area.
Table 10. IMM, UEFI, and DSA firmware vital product data
Field Function
Firmware type Indicates the type of firmware code.
Version string Indicates the version of the firmware code.
Release date Indicates when the firmware was released.
Note: Some features are available only on servers running a supported Microsoft
Windows operating system.
Note: The counter is reset to zero each time the IMM subsystem is cleared
to factory defaults.
Power-on hours
This field shows the total number of hours that the server has been turned
on.
Note: Select the following options only in case of an emergency, or if you are
offsite and the server is nonresponsive.
1. Log in to the IMM. For more information, see Chapter 2, “Opening and using
the IMM Web interface,” on page 9.
2. In the navigation pane, click Power/Restart. Scroll down to the Server
Power/Restart Control area.
3. Click one of the following options:
Power on server immediately
Turn on the server and start the operating system.
Power on server at specified time
Turn on the server at a specified time and start the operating system.
Power off server immediately
Turn off the server without shutting down the operating system.
Shut down OS and then power off server
Shut down the operating system and then turn off the server.
Shut down OS and then restart server
Restart the operating system.
Restart the server immediately
Turn off and then turn on the server immediately without first shutting
down the operating system.
Schedule Daily/Weekly Power and Restart Actions
Shut down the operating system, turn off the server at a specified daily or
weekly time (with or without restarting the server), and turn on the server
at a specified daily or weekly time.
A confirmation message is displayed if you select any of these options, and you
can cancel the operation if it was selected accidentally.
Remote presence
Notes:
1. The IMM remote presence function is available only in IMM Premium.
2. The remote control feature available only through the IMM Web interface. You
must log in to the IMM with a user ID that has Supervisor access to use any of
the remote control features.
You can use the remote presence function, or remote control feature in the IMM
Web interface, to view and interact with the server console. You can also assign to
the server a CD or DVD drive, diskette drive, USB flash drive, or disk image that
is on your computer.
For more information about updating IMM firmware, see “Updating firmware” on
page 67.
Remote control
The remote control feature of IMM consists of two Java applications in two
separate windows:
Video Viewer
The Video Viewer uses a remote console for remote systems management.
A remote console is an interactive graphical user interface (GUI) display of
the server, viewed on your computer. You see on your monitor exactly
what is on the server console, and you have keyboard and mouse control
of the console.
Virtual Media Session
The Virtual Media Session window lists all of the drives on the client that
can be mapped as remote drives. It allows you to map ISO and diskette
image files as virtual drives. Each mapped drive can be marked as
read-only. The CD and DVD drives and ISO images are always read-only.
Close both the Video Viewer window and the Virtual Media Session window when
you are finished using the Remote Control feature.
Notes:
1. Do not close the Virtual Media Session window if a remote disk is currently
mapped. See “Remote disk” on page 64 for instructions about closing and
unmapping a remote disk.
2. If you have mouse or keyboard problems when you use Remote Control, see
the help that is available from the Remote Control page in the Web interface.
3. If you use the remote console to change settings for the IMM in the Setup
Utility program, the server might restart the IMM and you lose the remote
console and the login session. After a short delay, you can log in to the IMM
again with a new session, start the remote console again, and exit the Setup
Utility program.
Note: Screen capture images are saved as JPG or JPEG file types.
Use the Video Viewer Macros menu item to create and edit customized buttons
that can be used to send key strokes to the server.
When the Video Viewer is in single cursor mode, you cannot use the mouse to
switch to another window or otherwise click outside the KVM client window,
because there is no local cursor. To disable single cursor mode, press the defined
termination key. To view the defined termination key, or change the termination
key, click Tools ^ Session Options ^ Mouse.
Remote disk
From the Virtual Media Session window, you can assign to the server a CD or
DVD drive, a diskette drive, or a USB flash drive that is on your computer, or you
can specify a disk image on your computer for the server to use. You can use the
drive for functions such as restarting (booting) the server, updating code, installing
new software on the server, and installing or updating the operating system on the
server. You can use the Remote Control feature to access the remote disk. Drives
and disk images are displayed as USB drives on the server.
Notes:
1. The following server operating systems have USB support, which is required
for the Remote Disk feature:
v Microsoft Windows Server 2008
v Microsoft Windows Server 2003
Note: If the Encrypt disk and KVM data during transmission check box was
selected before the Remote Control window was opened, the disk data is
encrypted with 3DES encryption.
The Virtual Media Session window is separate from the Video Viewer window.
The Virtual Media Session window lists all of the drives on the client that can
be mapped as remote drives. The Virtual Media Session window also allows
you to map ISO and diskette image files as virtual drives. Each mapped drive
can be marked as read-only. The CD and DVD drives and ISO images are
always read-only.
Note: A CD or DVD drive must contain media before it is mapped. If the drive is
empty, you are prompted to insert a CD or DVD into the drive.
Click the Mount Selected button to mount and map the selected drive or drives.
If you click Add Image, diskette image files and ISO image files can be added to
the list of available drives. After the diskette or ISO image file is listed in the
Virtual Media Session window, it can be mapped just like the other drives.
To unmap the drives, click the Unmount All button. Before the drives are
unmapped, you must confirm that you want the drives to be unmapped.
Note: After you confirm that you want the drives to be unmapped, all of the
drives are unmounted. You cannot unmount drives individually.
You can select a diskette image file and save the diskette image in IMM memory.
This enables the disk to remain mounted on the server so that you can access the
disk later, even after the IMM Web interface session has ended. A maximum of one
drive image can be stored on the IMM card. The drive or image contents must be
1.44 MB or smaller. To upload a diskette image file, complete the following steps:
Note: To unload the image file from memory, select the name in the RDOC
Setup window and click Delete.
Note: A CD or DVD drive must contain media before it is mapped. If the drive is
empty, you are prompted to insert a CD or DVD into the drive.
If you click Add Image, diskette image files and ISO image files can be added to
the list of available drives. After the diskette or ISO image file is listed in the
Virtual Media Session window, it can be mapped just like the other drives.
To unmap a drive, clear the Mapped check box for the drive. Before the drive is
unmapped, you must confirm that you want the drive to be unmapped.
You can select a diskette image file and save the diskette image in IMM memory.
This enables the disk to remain mounted on the server so that you can access the
disk later, even after the IMM Web interface session has ended. A maximum of one
drive image can be stored on the IMM card. The drive or image contents must be
1.44 MB or smaller. To upload a diskette image file, complete the following steps:
1. Click RDOC.
2. When the new window opens, click Upload.
3. Click Browse to select the image file that you want to use.
4. In the Name field, enter a name for the image and click OK to upload the file.
Note: To unload the image file from memory, select the name in the RDOC
Setup window and click Delete.
Note: Changes are made periodically to the Lenovo Support Web site. The actual
procedure might vary slightly from what is described in this document.
1. Download the latest firmware update applicable for the server in which the
IMM is installed:
a. Steps - Lenovo support and Downloads and Drivers
2. Log in to the IMM. For more information, see Chapter 2, “Opening and using
the IMM Web interface,” on page 9.
3. In the navigation pane, click Firmware Update.
4. Click Browse.
5. Navigate to the update package that you want to update.
Notes:
a. The server firmware cannot be updated while the server is turned off or
while the server is starting.
b. To determine the type of firmware file to use, see the update package
readme file. In most cases, the IMM can use either the EXE or BIN file to
perform the update.
6. Click Open. The file (including the full path) is displayed in the box next to
Browse.
7. To begin the update process, click Update.
A progress indicator opens as the file is transferred to temporary storage on
the IMM. A confirmation window opens when the file transfer is completed.
8. Verify that the file that is shown on the Confirm Firmware Update window is
what you intend to update. If it is not, click Cancel.
9. To complete the update process, click Continue. A progress indicator opens as
the firmware is updated. A confirmation window opens to verify that the
update was successful.
10. If you are updating the IMM firmware, click Restart IMM in the navigation
pane and then click Restart. The server firmware and DSA updates do not
require that the IMM be restarted. These updates take effect the next time that
the server is started.
11. Click OK to confirm that you want to restart the IMM.
12. Click OK to close the current browser window.
13. After the IMM restarts, log in to the IMM again to access the Web interface.
Note: After you reset the IMM, this confirmation message is displayed
immediately:
IMM reset command has been sent successfully!! Press ENTER to continue.
The IMM reset process is not yet complete. You must wait approximately
4 minutes for the IMM to reset before the IMM is functional again. If you
attempt to access sever firmware information while the server is
resetting, Unknown is displayed in the fields, and the description is Error
retrieving information from IMM.
Managing tools and utilities with IMM and the server firmware
This section describes the tools and utilities that are supported by IMM and the
server firmware. The tools that you use to manage the IMM in-band do not require
you to install device drivers. However, if you choose to use certain tools such as
IPMItool in-band, you must install the OpenIPMI drivers.
Updates and downloads for systems-management tools and utilities are available
on the Lenovo Support Web site at http://www.lenovo.com/support. To check for
updates to tools and utilities, complete the following steps.
Note: Changes are made periodically to the Lenovo Support Web site. Procedures
for locating firmware and documentation might vary slightly from what is
described in this document.
1. Steps
Using IPMItool
IPMItool provides various tools that you can use to manage and configure an IPMI
system. You can use IPMItool in-band or out-of-band to manage and configure the
IMM.
Note: If the USB in-band interface (LAN over USB) is disabled, ASU requires the
installation of IPMI device drivers.
Note: LAN over USB is also called the “USB in-band interface” in the IMM Web
interface.
Typically, the IMM IP address for the LAN over USB interface is set to a static
address of 169.254.95.118 with a subnet mask of 255.255.0.0. In the event of an IP
address collision on the network, the IMM might obtain a different IP address in
the 169.254.xxx.xxx range. The IMM first attempts to use the default static address,
169.254.95.118. If that IP address is already in use, the IMM attempts to randomly
obtain an address until it finds one that is not in use.
Because the IMM might obtain a random IP address for the LAN over USB
interface, the ASU, and DSA use the Service Location Protocol (SLP) to discover
the IMM IP address. These tools perform an SLP multicast discovery on the LAN
over USB interface. When they receive a response from the IMM, they obtain the
attributes that contain the IP address that the IMM is using for the LAN over USB
interface.
Note: A new local area connection is displayed and might state This
connection has limited or no connectivity. Ignore this message.
10. Go back to the Device Manager. Verify that Lenovo USB Remote NDIS
Network Device appears under Network Adapters.
Note: Older Linux distributions might not detect the LAN over USB interface and
might require manual configuration.
The IMM LAN over USB interface requires that the usbnet and cdc_ether device
drivers be loaded. If the device drivers have not been installed, use the modprobe
command to install them. When these device drivers are installed, the IMM USB
network interface is shown as a network device in the operating system. To
discover the name that the operating system has assigned to the IMM USB
network interface, type:
dmesg | grep -i cdc ether
Use the ifconfig command to configure the interface to have an IP address in the
range 169.254.xxx.xxx. For example:
ifconfig IMM_device_name 169.254.1.102 netmask 255.255.0.0
You can access the CLI through a Telnet or SSH session. You must be authenticated
by the IMM before you can issue any CLI commands.
Important: Change this default password during your initial configuration for
enhanced security.
The IMM also provides the following IPMI remote server management capabilities:
Command-line interface
The command-line interface provides direct access to server-management
functions through the IPMI 2.0 protocol. You can use IPMItool to issue
commands to control server power, view server information, and identify
the server. For more information about IPMItool, see “Using IPMItool” on
page 68.
Serial over LAN
To manage servers from a remote location, use IPMItool to establish a
Serial over LAN (SOL) connection. For more information about IPMItool,
see “Using IPMItool” on page 68.
Note: The number of Telnet sessions is configurable; valid values are 0, 1, and 2.
The value 0 means that the Telnet interface is disabled.
v One command is allowed per line (160-character limit, including spaces).
v There is no continuation character for long commands. The only editing function
is the Backspace key to erase the character that you just typed.
v The Up Arrow and Down Arrow keys can be used to browse through the last
eight commands. The history command displays a list of the last eight
commands, which you can then use as a shortcut to execute a command, as in
the following example:
system> history
0 ifconfig eth0
1 readlog
2 readlog
3 readlog
4 history
system> !0
-state enabled
-c dthens
-i 192.168.70.125
-g 0.0.0.0
-s 255.255.255.0
-n IMMA00096B9E003A
-r auto
-d auto
-m 1500
-b 00:09:6B:9E:00:3A
-l 00:00:00:00:00:00
system>
Utility commands
The utility commands are as follows:
v exit
v help
v history
exit command
Description
Use the exit command to log off and end the command-line interface session.
help command
Description
Use the help command to display a list of all commands with a short description
for each. You can also type ? at the command prompt.
Example
system> history
0 ifconfig eth0
1 readlog
2 readlog
3 readlog
4 history
system> ifconfig eth0
-state enabled
-c dthens
-i 192.168.70.125
-g 0.0.0.0
-s 255.255.255.0
-n IMMA00096B9E003A
-r auto
-d auto
-m 1500
-b 00:09:6B:9E:00:3A
-l 00:00:00:00:00:00
system>
Monitor commands
The monitor commands are as follows:
v clearlog
v fans
v readlog
v syshealth
v temps
v volts
clearlog command
Description
Use the clearlog command to clear the event log of the IMM or IMM. You must
have the authority to clear event logs to use this command.
fans command
Description
Use the fans command to display the speed for each of the server fans.
Example
system> fans
fan1 75%
fan2 80%
fan3 90%
system>
Description
Use the readlog command to display the IMM event log entries, five at a time. The
entries are displayed from the most recent to the oldest.
readlog displays the first five entries in the event log, starting with the most
recent, on its first execution, and then the next five for each subsequent call.
readlog -f resets the counter and displays the first 5 entries in the event log,
starting with the most recent.
Example
system> readlog -f
1 I SERVPROC 12/18/03 10:18:58 Remote Login Successful.
Login ID:''USERID' CLI authenticated from 192.168.70.231 (Telnet).'
2 I SERVPROC 12/18/03 10:12:22 Remote Login successful.
Login ID: ''USERID' from web browser at IP@=192.168.70.231'
3 E SERVPROC 12/18/03 10:10:37 Failure reading I2C device.
4 E SERVPROC 12/18/03 10:10:37 Environmental monitor not responding.
5 E SERVPROC 12/18/03 10:10:37 Failure reading I2C device.
system> readlog
6 E SERVPROC 12/18/03 10:09:31 Fan 2 Fault. Multiple fan failures
7 E SERVPROC 12/18/03 10:09:31 Fan 1 Fault. Single fan failure
8 I SERVPROC 12/18/03 10:09:25 Ethernet[0] Link Established at 100Mb, Full Duplex.
9 I SERVPROC 12/18/03 10:09:24 Ethernet[0] configured to do Auto Speed/Auto Duplex.
10 I SERVPROC 12/18/03 10:09:24 Ethernet[0] MAC Address currently
being used: 0x00-09-6B-CA-0C-80
system>
syshealth command
Description
Use the syshealth command to display a summary of the health of the server. The
power state, system state, restart count, and IMM software status are displayed.
Example
system> syshealth
Power On
State System on/starting UEFI
Restarts 71
system>
temps command
Description
Use the temps command to display all the temperatures and temperature
thresholds. The same set of temperatures are displayed as in the Web interface.
Example
system> temps
Temperatures are displayed in degrees Fahrenheit/Celsius
WR W T SS HS
----------------------------------------
CPU1 65/18 72/22 80/27 85/29 90/32
volts command
Description
Use the volts command to display all the voltages and voltage thresholds. The
same set of voltages are displayed as in the Web interface.
Example
system> volts
HSL SSL WL WRL V WRH WH SSH HSH
----------------------------------------------------------
5v 5.02 4.00 4.15 4.50 4.60 5.25 5.50 5.75 6.00
3.3v 3.35 2.80 2.95 3.05 3.10 3.50 3.65 3.70 3.85
12v 12.25 11.10 11.30 11.50 11.85 12.15 12.25 12.40 12.65
-5v -5.10 -5.85 -5.65 -5.40 -5.20 -4.85 -4.65 -4.40 -4.20
-3.3v -3.35 -4.10 -3.95 -3.65 -3.50 -3.10 -2.95 -2.80 -2.70
VRM1 3.45
VRM2 5.45
system>
vpd command
Syntax
vpd sys
vpd IMM
vpd biosvpd dsa
Description
Use the vpd command to display vital product data for the system (sys), IMM,
server firmware (bios), and Dynamic System Analysis Preboot (dsa). The same
information is displayed as in the Web interface.
power command
Syntax
power on
power off [-s]
power state
power cycle [-s]
Description
Use the power command to control the server power. To issue the power
commands, you must have power and restart access authority.
power on turns on the server power.
power off turns off the server power. The -s option shuts down the operating
system before the server is turned off.
power state displays the server power state (on or off) and the current state of
the server.
power cycle turns off the server power and then turns on the power. The -s
option shuts down the operating system before the server is turned off.
reset command
Syntax
reset [option]
option:
-s
Description
Use the reset command to restart the server. To use this command, you must have
power and restart access authority. The -s option shuts down the operating system
before the server is restarted.
console command
Syntax
console 1
Configuration commands
The configuration commands are as follows:
v dhcpinfo
v ifconfig
v ldap
v ntp
v passwordcfg
v portcfg
v slp
v srcfg
v ssl
v tcpcmdmode
v timeouts
v usbeth
v users
dhcpinfo command
Syntax
dhcpinfo eth0
Description
Use the dhcpinfo command to view the DHCP server-assigned IP configuration for
eth0, if the interface is configured automatically by a DHCP server. You can use the
ifconfig command to enable or disable DHCP.
Example
system> dhcpinfo eth0
-server 192.168.70.29
-n IMMA00096B9E003A
-i 192.168.70.202
-g 192.168.70.29
-s 255.255.255.0
-d linux-sp.raleigh.lenovo.com
-dns1 192.168.70.29
-dns2 0.0.0.0
-dns3 0.0.0.0
system>
Option Description
-server DHCP server that assigned the configuration
-n Assigned host name
-i Assigned IP address
-g Assigned gateway address
-s Assigned subnet mask
ifconfig command
Syntax
ifconfig eth0 [options]
options:
-state interface_state
-c config_method
-i static_ip_address
-g gateway_address
-s subnet_mask
-n hostname
-r data_rate
-d duplex_mode
-m max_transmission_unit
-l locally_administered_MAC
Description
Use the ifconfig command to configure the Ethernet interface. Type ifconfig eth0
to display the current Ethernet interface configuration. To change the Ethernet
interface configuration, type the options, followed by the values. To change the
interface configuration, you must have at least Adapter Networking and Security
Configuration authority.
Example
system> ifconfig eth0
-state enabled
-c dthens
-i 192.168.70.125
Note: The -b option in the ifconfig display is for the burned-in MAC address. The
burned-in MAC address is read-only and is not configurable.
ldap command
Syntax
ldap [options]
options:
-a loc|ldap|locId|Idloc
-b anon|client|login
-c client_dn
-d search_domain
-f group_filter
-g group_search_attr
-l string
-m login|cfg|lthenc
-n service_name
-p client_pw
-pc confirm_pw
-r root_dn
-s1ip host name/ip_addr
-s2ip host name/ip_addr
-s3ip host name/ip_addr
-s1pn port_number
-s2pn port_number
-s3pn port_number
-u search_attrib
-v off|on
-w on|off
-h
Description
Use the ldap command to display and configure the LDAP protocol configuration
parameters.
ntp command
Syntax
ntp [options]
options:
-en state
-i hostname
-f frequency
-synch
Description
Use the ntp command to display and configure the Network Time Protocol (NTP).
Example
system> ntp
-en: disabled
-f: 3 minutes
-i: not set
passwordcfg command
Syntax
passwordcfg [options]
options: {-high}|{-legacy}|{-exp|-cnt|-nul}
-legacy
-high
-exp:
-cnt:
-nul:
-h
Description
Use the passwordcfg command to display and configure the password parameters.
Option Description
-legacy Sets account security to a predefined legacy set of defaults
-high Sets account security to a predefined high set of defaults
-exp Maximum password age (0 - 365 days). Set to 0 for no expiration.
-cnt Number of previous passwords that cannot be reused (0 - 5)
-nul Allows accounts with no password (yes | no)
-h Displays the command usage and options
Example
system> passwordcfg
Security Level: Legacy
system> passwordcfg -exp 365
ok
system> passwordcfg -nul yes
ok
system> passwordcfg -cnt 5
portcfg command
Syntax
portcfg [options]
portcfg [options]
options:
-b baud_rate
-climode cli_mode
-cliauth cli_auth
Description
Use the portcfg command to configure the serial port. To change the serial port
configuration, type the options, followed by the values. To change the serial port
configuration, you must have at least Adapter Networking and Security
Configuration authority.
Example
system> portcfg
-b : 115200
-climode : 2 (CLI with user defined keystroke sequences) system>
system>
srcfg command
Syntax
srcfg [options]
options:
-exitcliseq exitcli_keyseq
Description
Use the srcfg command to configure the serial redirection. Type srcfg to display
the current configuration. To change the serial redirect configuration, type the
The following table shows the arguments for the -exitcliseq option.
Example
system> srcfg
-exitcliseq ^[Q
system>
ssl command
Syntax
ssl [options]
options:
-ce on | off
-se on | off
-h
Description
Note: Before you can enable an SSL client, a client certificate must be installed.
Use the ssl command to display and configure the Secure Sockets Layer (SSL)
parameters.
Option Description
-ce Enables or disables an SSL client
-se Enables or disables an SSL server
-h Lists usage and options
Parameters
The following parameters are presented in the option status display for the ssl
command and are output only from the command-line interface:
Server secure transport enable
This status display is read-only and cannot be set directly.
Server Web/CMD key status
This status display is read-only and cannot be set directly. Possible
command line output values are as follows:
Private Key and Cert/CSR not available
Private Key and CA-signed cert installed
Private Key and Auto-gen self-signed cert installed
Private Key and Self-signed cert installed
Private Key stored, CSR available for download
timeouts command
Syntax
timeouts [options]
options:
-o OS_watchdog_option
-l loader_watchdog_option
Description
Use the timeouts command to display the timeout values or change them. To
display the timeouts, type timeouts. To change timeout values, type the options
followed by the values. To change timeout values, you must have at least Adapter
Configuration authority.
The following table shows the arguments for the timeout values. These values
match the graduated scale pull-down options for server timeouts on the Web
interface.
Example
system> timeouts
-o disabled
-l 3.5
system> timeouts -o 2.5
usbeth command
Syntax
usbeth [options]
options:
-en <enabled|disabled>
Description
Use the usbeth command to enable or disable the in-band LAN over USB
interface. For more information about enabling or disabling this interface, see
“Disabling the USB in-band interface” on page 19.
Example
system>usbeth
-en : disabled
system>usbeth -en enabled
ok
system>usbeth
-en : disabled
users command
Syntax
users [options]
options:
-user number
-n username
-p password
-a authority level
Description
Use the users command to access all user accounts and their authority levels and
to create new user accounts and modify existing accounts.
Example
system> users
1. USERID Read/Write
Password Expires: no expiration
2. manu Read Only
Password Expires: no expiration
3. eliflippen Read Only
Password Expires: no expiration
4. <not used>
5. jacobyackenovic custom:cel|ac
Password Expires: no expiration
system> users -7 -n sptest -p PASSW0RD -a custom:am|rca|cel|nsc|ac
ok
system> users
1. USERID Read/Write
Password Expires: no expiration
2. test Read/Write
Password Expires: no expiration
3. test2 Read/Write
Password Expires: no expiration
4. <not used>
5. jacobyackenovic custom:cel|ac
Password Expires: no expiration
6. <not used>
7. sptest custom:am|rca|cel|nsc|ac
Password Expires: no expiration
8. <not used>
9. <not used>
10. <not used>
11. <not used>
12. <not used>
system>
clearcfg command
Description
Use the clearcfg command to set the IMM configuration to its factory defaults. You
must have at least Advanced Adapter Configuration authority to issue this
command. After the configuration of the IMM is cleared, the IMM is restarted.
Description
Use the clock command to display the current date and time according to the IMM
clock and the GMT offset. You can set the date, time, GMT offset, and daylight
saving time settings.
Example
system> clock
12/12/2003 13:15:23 GMT-5:00 dst on
system> clock -d 12/31/2004
ok
system> clock
12/31/2004 13:15:30 GMT-5:00 dst on
identify command
Syntax
identify [options]
options:
-s on/off/blink
-d seconds
Description
Use the identify command to turn the chassis identify LED on or off, or to have it
flash. The -d option can be used with -s on to turn the LED on for only for the
number of seconds specified with the -d parameter. The LED then turns off after
the number of seconds elapses.
Example
system> identify
-s off
system> identify -s on -d 30
ok
system>
update command
Syntax
update -i TFTP_server_IP_address -l filename
Description
Use the update command to update the firmware on the IMM or IMM. To use this
command, you must have at least Advanced Adapter Configuration authority. The
firmware file (specified by filename) is first transferred from the TFTP server
(specified by its IP address) to the IMM or IMM and then flashed. The -v option
specifies verbose mode.
Note: Make sure that the TFTP server is running on the server from which the file
will be downloaded.
Option Description
-i TFTP server IP address
-l File name (to be flashed)
-v Verbose mode
You can solve many problems without outside assistance by using the information
available on the Lenovo support site at http://www.lenovo.com/support or by
following the troubleshooting procedures that Lenovo provides in the
documentation that is provided with your Lenovo product. The documentation
that comes with Lenovo systems also describes the diagnostic tests that you can
perform. Most systems, operating systems, and programs come with
documentation that contains troubleshooting procedures and explanations of error
messages and error codes. If you suspect a software problem, see the
documentation for the operating system or program.
Refer to the safety and warranty information that is provided with your computer
for a complete explanation of warranty terms. You must retain your proof of
purchase to obtain warranty service.
For a list of service and support phone numbers for your country or region, go to
http://www.lenovo.com/support and click Support phone list or refer to the
safety and warranty information provided with your computer.
Note: Phone numbers are subject to change without notice. If the number for your
country or region is not provided, contact your Lenovo reseller or Lenovo
marketing representative.
If possible, be at your computer when you call. Have the following information
available:
v Machine type and model
v Serial numbers of your hardware products
v Description of the problem
v Exact working of any error messages
v Hardware and software configuration information
Service methods and procedures vary by country, and some services might not be
available in all countries. International Warranty Service is delivered through the
method of service (such as depot, carry-in, or on-site service) that is provided in
the servicing country. Service centers in certain countries might not be able to
service all models of a particular machine type. In some countries, fees and
restrictions might apply at the time of service.
For technical assistance with the installation of, or questions related to, Service
Packs for your preinstalled Microsoft Windows product, refer to the Microsoft
Product Support Services Web site at http://www.support.microsoft.com/
directory/, or you can contact the Customer Support Center. Some fees might
apply.
Lenovo may have patents or pending patent applications covering subject matter
described in this document. The furnishing of this document does not give you
any license to these patents. You can send license inquiries, in writing, to:
Lenovo (United States), Inc.
1009 Think Place - Building One
Morrisville, NC 27560
U.S.A.
Attention: Lenovo Director of Licensing
The products described in this document are not intended for use in implantation
or other life support applications where malfunction may result in injury or death
to persons. The information contained in this document does not affect or change
Lenovo product specifications or warranties. Nothing in this document shall
operate as an express or implied license or indemnity under the intellectual
property rights of Lenovo or third parties. All information contained in this
document was obtained in specific environments and is presented as an
illustration. The result obtained in other operating environments may vary.
Lenovo may use or distribute any of the information you supply in any way it
believes appropriate without incurring any obligation to you.
Any references in this publication to non-Lenovo Web sites are provided for
convenience only and do not in any manner serve as an endorsement of those Web
sites. The materials at those Web sites are not part of the materials for this Lenovo
product, and use of those Web sites is at your own risk.
Trademarks
The following terms are trademarks of Lenovo in the United States, other
countries, or both:
Lenovo
The Lenovo logo
ThinkServer
Intel and Pentium are trademarks of Intel Corporation in the United States, other
countries, or both.
Microsoft, Windows, and Windows Server are trademarks of the Microsoft group
of companies.
Red Hat, the Red Hat “Shadow Man” logo, and all Red Hat-based trademarks and
logos are trademarks or registered trademarks of Red Hat, Inc., in the United
States and other countries.
Sun and Java are trademarks of Sun Microsystems, Inc. in the United States and
other countries.
Important notes
Processor speed indicates the internal clock speed of the microprocessor; other
factors also affect application performance.
CD or DVD drive speed is the variable read rate. Actual speeds vary and are often
less than the possible maximum.
When referring to processor storage, real and virtual storage, or channel volume,
KB stands for 1024 bytes, MB stands for 1 048 576 bytes, and GB stands for
1 073 741 824 bytes.
Maximum internal hard disk drive capacities assume the replacement of any
standard hard disk drives and population of all hard disk drive bays with the
largest currently supported drives that are available from Lenovo.
Some software might differ from its retail version (if available) and might not
include user manuals or all program functionality.
Notice: This mark applies only to countries within the European Union (EU) and
Norway.
Notice: This mark applies only to countries within the European Union (EU).
For California:
Das Produkt ist nicht für den Einsatz an Bildschirmarbeitsplätzen im Sinne § 2 der
Bildschirmarbeitsverordnung geeignet.
Properly shielded and grounded cables and connectors must be used in order to
meet FCC emission limits. Lenovo is not responsible for any radio or television
interference caused by using other than recommended cables and connectors or by
unauthorized changes or modifications to this equipment. Unauthorized changes
or modifications could void the user's authority to operate the equipment.
This device complies with Part 15 of the FCC Rules. Operation is subject to the
following two conditions: (1) this device may not cause harmful interference, and
(2) this device must accept any interference received, including interference that
may cause undesired operation.
This product has been tested and found to comply with the limits for Class A
Information Technology Equipment according to CISPR 22/European Standard EN
55022. The limits for Class A equipment were derived for commercial and
industrial environments to provide reasonable protection against interference with
licensed communication equipment.
Deutschland:
Das Gerät erfüllt die Schutzanforderungen nach EN 55024 und EN 55022 Klasse
A.
Nach der EN 55022: “Dies ist eine Einrichtung der Klasse A. Diese Einrichtung
kann im Wohnbereich Funkstörungen verursachen; in diesem Fall kann vom
Betreiber verlangt werden, angemessene Maßnahmen durchzuführen und dafür
aufzukommen.”
Nach dem EMVG: “Geräte dürfen an Orten, für die sie nicht ausreichend entstört
sind, nur mit besonderer Genehmigung des Bundesministers für Post und
Telekommunikation oder des Bundesamtes für Post und Telekommunikation
betrieben werden. Die Genehmigung wird erteilt, wenn keine elektromagnetischen
Störungen zu erwarten sind.” (Auszug aus dem EMVG, Paragraph 3, Abs. 4).
Dieses Genehmigungsverfahren ist nach Paragraph 9 EMVG in Verbindung mit der
entsprechenden Kostenverordnung (Amtsblatt 14/93) kostenpflichtig.
Anmerkung: Um die Einhaltung des EMVG sicherzustellen sind die Geräte, wie in
den Handbüchern angegeben, zu installieren und zu betreiben.
Index 111
112 Integrated Management Module: User Guide
Printed in USA