Lenovo RD550 BMC User Guide
Lenovo RD550 BMC User Guide
Lenovo RD550 BMC User Guide
User Guide
Fifth Edition (December 2020)
BMC features
BMC has the following features:
Media redirection
• Simultaneous CD or DVD redirection
• Efficient USB 2.0-based CD/DVD redirection speed at the maximum of around 20XCD. Note that the
speed varies depending on the method of communication (SSL or non-SSL). Refer to the VMedia
performance analysis matrix for further information.
• Support for USB key
• Completely secured (authenticated or encrypted) remote KVM or VMedia
Web-based configuration
• Full configuration using the Web UI
• Fail-safe firmware upgrade
• English as the currently supported language for the Web interface
• Extended node manager support
Security support
• Encrypted password for AD/LDAP server authentication
• Web port for KVM/Media redirection
Miscellaneous
• Memory test support in u-boot
• Section-based flashing support via Web
• Support for auto reboot in case of abrupt cancellation during YAFU-based firmware update
Chapter 1. Introduction 3
4 Lenovo ThinkSystem System Manager User Guide
Chapter 2. Accessing the BMC through TSM
BMC has a Web-based interface called the Lenovo ThinkSystem System Manager (TSM). Before accessing
your BMC through TSM, you need to specify how the BMC will connect to the network.
Alternatively, you can also set a static IP address by using Setup Utility:
1. Start the server. When you see <F1> System Setup, press F1 to open Setup Utility.
2. Go to Server Mgmt ➙ BMC network configuration. Specify a static IP address for the BMC.
Logging in to TSM
After acquiring the BMC IP address, you can log in to TSM over your network to manage the BMC.
Note: TSM is accessible through standard Java-enabled Web browsers with HTTPS. For secure
connection, TSM only supports HTTPS access. For example, enter https://xx.xxx.xx. xxx in the
Web browser.
Step 2. On the login page, select the language, and enter the user name and password.
Notes: The default user name and password for TSM are:
– User name: USERID
– Password: PASSW0RD (with a zero, not the letter O)
• Remember Username: Check this option to remember your login user name. If you select this
option, the browser will save your credentials internally in its memory, and when you open that
site the next time, it will auto-fill Username for you.
Menu bar
The TSM menu bar displays the following information.
• Firmware Information: displays the latest version, date, and time details.
Notes: Once you log in to the TSM WebUI, you are recommended not to use the following options:
• Refresh button of the browser
• Refresh menu of the browser
• Back and Forward options of the browser
• F5 on the keyboard
• Backspace on the keyboard
Button Description
After you click this icon, the current page will be expanded to hide the left menu
bar.
Button Description
The Dashboard page gives the overall information about the status of the device.
System Health
This section displays the health status and quantity of the following components:
• Processor (CPU)
• Memory
• Local storage
• PCI adapter
• Power supply
• Fan
• System board
• Others
A green indicator shows that the hardware component is normal. If any of the hardware components is not
operating normally, it will be marked by a red critical icon.
Click the name or quantity information of a component. You can enter the System Inventory page for more
details.
System Information
This section provides a summary of common system information, including the date and time, product
model, BMC version, and serial number.
Power Status/Control
This section provides a series of power-on or power-off options.
• Power Switch: Power on or off the server.
• FP Switch: Enable or disable the front panel.
• Remote Console Control: Access the operating system of the server.
• NMI Button: Trigger a non-maskable interrupt (NMI) event.
Network Information
This section provides a summary of the BMC management network and system network MAC addresses.
Temperature
This section provides the temperature reading and status (normal, warning, or critical) of key thermal
components.
The System Inventory page displays information about the system hardware inventory and detailed
information of active DIMM, PCIe, CPU, and other components.
Notes:
• Click in the upper right corner of a hardware section to view the detailed information of the
hardware.
• For the HDD, detailed information is available for drives (NVMe or SATA) that are connected from JSL1-9,
and M2 on JSL8. There is no detailed information when the HDD is connected from a Switch, Retimer, and
HBA/RAID card.
The Utilization page displays the current output power consumption and historical power consumption in the
past 1, 6, 12, or 24 hours. In addition, temperature, voltage, and fan speed detected by different sensors are
displayed.
The IPMI Event Log page displays a list of event logs occurred on different sensors on this device. By default,
all sensor events are listed, with the severity, common ID, sensor name, sensor type, description, status, and
event time displayed. To view specific events, you can specify the time range, or specify the event type and
sensor name to filter the events.
Notes:
– Date should be in MM/DD/YYYY format.
– By default, all log time will be displayed in BMC time zone.
• Filter by type: Select a specific event type and sensor name to view corresponding events in the selected
time period.
Notes:
– Once Filter By Date and Filter by type are selected, the list of events will be displayed with the event
ID, time stamp, severity, common ID, sensor type, sensor name, status, and description.
– For events not generated by the BMC, Severity and Common ID are displayed as N/A; for events
generated by the BMC, the event severity and message ID are displayed.
• UTC Offset: Display the current UTC offset value based on which event time stamps will be updated.
• Clear Event Logs: Delete all the event logs.
• Download Event Logs: Download the event logs.
Note: The maximum number of IPMI event log records is about 3000. When the event logs are full, the new
log entry will automatically overwrite the oldest one.
Audit Log
Click Logs & Reports ➙ Audit Log from the menu bar. The Audit Log page is displayed.
The Audit Log page displays all the audit events occurring in this device. Entries can be filtered based on
Filter By Date (Start Date and End Date).
Note: The maximum number of audit log records is 300. When the audit logs are full, the new log entry will
automatically overwrite the oldest one.
Captured BSOD
This section displays a snapshot of the blue screen captured at the time if the host system crashed since the
last reboot.
Note: The KVM service should be enabled to display the BSOD screen. The KVM service can be configured
under Settings ➙ Services ➙ KVM.
To open the Date & Time page, click Settings ➙ Date & Time.
Note: If the time zone is selected as Manual Offset, the map selection will be disabled. The time zone
settings will be reflected only after you save the settings.
Procedure
1. Select the time zone location either using the drop-down list box or the map.
2. Enable Automatic NTP Date & Time to enable or disable the use of NTP servers to automatically set
the date and time.
• In the Primary NTP Server and Secondary NTP Server fields, specify the NTP servers of the device
respectively.
Note: Secondary NTP server is an optional field. If the Primary NTP Server is not working fine, then
the Secondary NTP Server will be tried.
3. Click Save to save the settings.
LDAP/E-Directory Settings
The Lightweight Directory Access Protocol (LDAP) is an application protocol for querying and modifying
data of directory services implemented in Internet Protocol (IP) networks.
On the TSM GUI, LDAP is an Internet protocol that the BMC can use to authenticate users. If you have an
LDAP server configured on your network, you can use it as an easy way to add, manage, and authenticate
BMC users. This is done by passing login requests to your LDAP server. This means that there is no need to
define an additional authentication mechanism, when using the BMC. Since your existing LDAP server keeps
an authentication centralized, you will always know who is accessing the network resources and can easily
define the user- or group-based policies to control access.
To open the LDAP/E-Directory Settings page, click Settings ➙ External User Services ➙ LDAP/E-
Directory Settings.
Note: All the other fields can be set only after Enable LDAP/E-Directory Authentication is selected.
3. Select the encryption type for LDAP/E-Directory from the Encryption Type.
Notes:
• IPv4 and IPv6 address formats are supported.
• Configure a fully qualified domain name (FQDN) address when using StartTLS with FQDN.
6. Specify the LDAP/E-Directory port in the Port field.
Notes:
• The default port number is 389. For SSL connections, the default port number is 636.
• The value of Port ranges from 1 to 65535.
• Port 80 is blocked for TCP and UDP protocols.
7. Specify the Binding Method that is used during bind operations.
Notes:
Notes:
• A password must contain 1 to 48 characters.
• White space is not allowed.
9. Enter the Search Base. The search base allows the LDAP/E-Directory server to find which part of the
external directory tree is to be searched. This search base may be equivalent to the organization or the
group of the external directory.
Notes:
• Search Base is a string of 4 to 64 alpha-numeric characters that must start with an alphabetical
character.
• Special symbols such as dot (.), comma (,), hyphen (-), underscore (_), and equal-to (=) are allowed.
• Example: ou=login,dc=domain,dc=com
10. Select Attribute of User Login to find the LDAP/E-Directory server which attribute should be used to
identify the user.
• To delete a role group from the list, click in the upper right corner.
• To modify a role group, click its name.
• To add a role group, click a free slot.
3. On the role group configuration page, modify the existing configurations or define configurations for a
new role group.
The role group configurations are described as follows:
• Group Name: Enter the role group name. This name identifies the role group in LDAP/E-Directory.
– A group name is a string of 64 alpha-numeric characters.
– Special symbols hyphen (-) and underscore (_) are allowed.
• Group Domain: Enter the role group domain. This is the domain where the role group is located.
Chapter 7. Settings 21
– A domain name is a string of 4 to 64 alpha-numeric characters that must start with an alphabetical
character.
– Special symbols like dot (.), comma (,), hyphen (-), underscore (_), and equal-to (=) are allowed.
– Example: cn=manager,ou=login,dc=domain,dc=com
• Group Privilege: Enter the role group privilege. This is the level of privilege to be assigned for this role
group.
In TSM application, Active Directory allows you to configure the Active Directory server settings. The
displayed table shows any configured role groups and the available slots. You can modify, add, or delete role
groups from here. A group domain can be the AD domain or a trusted domain. A group name should
correspond to the name of an actual AD group.
To open the Active directory Settings page, click Settings ➙ External User Services ➙ Active Directory
Settings.
Notes:
• To view the page, you must be at least a user.
• To modify or add a group, you must be an administrator.
The fields of the Active directory Settings page are explained below.
• General Settings: Configure general active directory settings, including whether to enable active directory
authentication, secret username, secret password, and user domain name.
• Role Groups: Modify the configuration of a configured role group, click a free slot to add a role group, or
delete a role group.
Note: If you have enabled active directory authentication, enter the required information to access the
Active Directory server.
3. Specify the user name of an administrator of the Active Directory server.
Notes:
Notes:
• Password is a string of 6 to 127 characters.
• White space is not allowed.
5. Specify the User Domain Name field, for example, MyDomain.com.
6. Configure IP addresses in Domain Controller Server Address1, Domain Controller Server Address2,
and Domain Controller Server Address3.
Notes:
• At least one domain controller server address must be configured.
• IPv4 and IPv6 address formats are supported.
7. Click Save to save the settings.
• To delete a role group from the list, click in the upper right corner.
• To modify a role group, click its name.
• To add a role group, click a free slot.
3. On the role group configuration page, modify the existing configurations or define configurations for a
new role group.
The role group configurations are described as follows:
• Group Name: Enter the role group name. This name identifies the role group in Active Directory.
– A group name is a string of 64 alpha-numeric characters.
– Special symbols hyphen (-) and underscore (_) are allowed.
• Group Domain: Enter the role group domain. This is the domain where the role group is located.
– A domain name is a string of 255 alpha-numeric characters.
– Special symbols hyphen (-), underscore (_), and dot (.) are allowed.
• Group Privilege: Enter the role group privilege. This is the level of privilege to be assigned for this role
group.
• KVM Access: This field provides access to KVM for AD authenticated role group users
• VMedia Access: This field provides access to VMedia for AD authenticated role group users.
4. Click Save.
Chapter 7. Settings 23
RADIUS Settings
RADIUS is a modular, high performance, and feature-rich RADIUS suite including server, clients,
development libraries, and numerous additional RADIUS-related utilities.
On the TSM GUI, the RADIUS Settings page is used to set the RADIUS authentication
To open the RADIUS Settings page, click Settings ➙ External User Services ➙ RADIUS Settings.
Note: All the other fields can be set only after Enable RADIUS Authentication is selected.
3. Specify the RADIUS server address.
Notes:
• The default port number is 1812.
• The value of Port ranges from 1 to 65535.
• Port 80 is blocked for TCP and UDP protocols.
5. Specify the RADIUS server secret.
Notes:
• A secret must contain 4 to 32 characters.
• White space is not allowed.
6. Select or clear the check box of Enable KVM Access to enable or disable KVM access. This option
provides access to KVM for RADIUS authenticated users.
7. Select or clear the check box of Enable VMedia Access to enable or disable VMedia access. This
option provides access to VMedia for RADIUS authenticated users.
8. Click Save to save the settings.
# dictionary.adtest
VENDOR ADTest 58
# Standard attribute
BEGIN-VENDOR ADTest
ATTRIBUTE ADTest-group 1 string
END-VENDOR ADTest
vim dictionary
(Add this line)
$INCLUDE dictionary.adtest
• Add users:
vim users
(Add the content below)
Note: These fields will not allow more than 127 characters. '#' is not allowed.
3. Click Save to save the settings.
To open the KVM Mouse Settings page, click Settings ➙ KVM Mouse Settings.
The fields of the KVM Mouse Settings page are explained below.
• Relative Positioning (Linux): Relative mode sends the calculated relative mouse position displacement
to the server.
• Absolute Positioning (Windows): The absolute position of the local mouse is sent to the server. This
mode is recommended for Windows or later Linux releases.
• Other Mode (SLES-11 OS Installation): This option sends the calculated displacement from the local
mouse in the center position to the server.
• Save: Save the configuration.
Chapter 7. Settings 25
Supported operating systems for mouse modes
Table 2. Supported operating systems for mouse modes
To open the Remote Log Settings page, click Settings ➙ Remote Log Settings.
The fields of the Remote Log Settings page are explained below.
• Remote Log: Check this option to enable the function of saving logs in a remote machine.
• Port Type: This field is available if Remote Log is enabled. UDP and TCP port types are supported.
• Remote Log Server: This field specifies the address of the remote server to log system events, which
supports the IP address (IPv4 or IPv6) and FQDN formats.
• Remote Server Port: This field specifies the port to log system events.
Note: If the port number is set to 0, the default port will be used, which is port 514.
To open the Media Redirection page, click Settings ➙ Media Redirection Settings.
General Settings
This section is used to configure general media settings.
To open the General Settings page, click Settings ➙ Media Redirection Settings ➙ General Settings.
Remote Media Support: Select or clear this check box to enable or disable remote media support.
On selecting the individual media types, its respective configurations will be displayed. You can configure
different settings for different remote media types. Alternatively, the same configurations can be applied to
both media types by using the check box of Same settings for Harddisk Images.
The following page shows the configurations for different media types.
Note: A path must be alpha-numeric and only the following special characters are allowed:
backward slash (\), forward slash (/), hyphen (-), underscore (_), dot (.), and colon (:).
• Share Type for Harddisk: Select nfs or cifs.
• Domain Name, Username, and Password: If the share type is Samba (CIFS), enter user credentials to
authenticate on the server.
• Retry Interval: Enter the retry interval to reconnect RMedia. The value ranges from 15 (default) to 30.
• Retry Count: Enter the retry count to reconnect RMedia. The value ranges from 3 (default) to 6.
• Save: Save the settings.
Note: For RMedia share types, we support the following NFS and CIFS mount protocols, for mounting
remote image share paths to the BMC.
Protocol Versions
NFS NFSv2, NFSv3, NFSv4
CIFS SMBv1, SMBv2.1
To open the VMedia Instance Settings page, click Settings ➙ Media Redirection Settings ➙ VMedia
Instance Settings.
The fields of the VMedia Instance Settings page are explained below.
• Remote CD/DVD device instances: Number of CD/DVD devices supported for virtual media redirection.
• Remote Hard disk instances: Number of hard disk devices supported for virtual media redirection.
• Remote KVM CD/DVD device instances: Number of remote KVM CD/DVD devices supported for virtual
media redirection.
• Remote KVM Hard disk instances: Number of remote KVM hard disk devices supported for virtual
media redirection.
• Power Save Mode: Select this check box to enable power save mode for the BMC.
Chapter 7. Settings 27
• Save: Save the settings.
Remote Session
This section is used to configure remote session settings.
To open the Remote Session page, click Settings ➙ Media Redirection Settings ➙ Remote Session.
Note: Upon clicking Save after enabling or disabling KVM Single Port Application, the opened remote
KVM viewer will automatically close.
Active Redirections
This section is used to display the active redirected media, which are redirected via JViewer, VMAPP,
H5Viewer, LMedia, RMedia, or VMCLI. Information like Media Type, Media Instance, Client Type, Image
Name, Redirection Status, and Client IP will be displayed.
To open the Active Redirections page, click Settings ➙ Media Redirection Settings ➙ Active
Redirections.
Network Settings
This section is used to configure the network settings for the available LAN channels.
Network IP Settings
This section is used to configure network IP settings.
To open the Network IP Settings page, click Settings ➙ Network Settings ➙ Network IP Settings.
Notes:
– An IP address consists of 4 numbers separated by dots, as in “xxx.xxx.xxx.xxx”.
– Each number ranges from 0 to 255.
– The first number must not be 0.
– If DHCP is selected, current IPv4 address, IPv4 subnet, and IPv4 gateway are displayed.
– If First DHCP, then static IP address is selected, current IPv4 address, IPv4 subnet, and IPv4
gateway are displayed. You can also configure IPv4 Address, IPv4 Subnet, and IPv4 Gateway if
necessary.
• Enable IPv6: This option is used to enable or disable IPv6 support for the selected interface.
• Enable IPv6 DHCP: If this option is enabled, an IPv6 address is dynamically configured using DHCP.
• IPv6 Index, IPv6 Address, Subnet Prefix Length, and IPv6 Gateway: These fields need to be manually
configured when Enable IPv6 DHCP is disabled.
Notes:
– IPv6 Index: Configure a static IPv6 index for the device, for example, 0.
– IPv6 Address: Configure a static IPv6 address for the device, for example, 2004::2010.
Chapter 7. Settings 29
– Subnet Prefix Length: Specify the subnet prefix length for the IPv6 settings. The value ranges from 0
to 128.
– IPv6 Gateway: Specify an IPv6 gateway for the selected interface.
• Enable VLAN: This option is used to enable or disable VLAN support for the selected interface.
• VLAN ID and VLAN Priority: These fields need to be manually configured when Enable VLAN is enabled.
Notes:
– VLAN ID: The value ranges from 1 to 4094, and 0 and 4095 are reserved IDs. VLAN ID cannot be
changed without resetting the VLAN configuration.
– VLAN Priority: The value ranges from 0 to 7.
• Save: Save the settings.
To open the Network Bond Configuration page, click Settings ➙ Network Settings ➙ Network Bond
Configuration.
The fields of the Network Bond Configuration page are explained below.
• Enable Bonding: This option is used to enable or disable bonding for the network interfaces.
Note: If VLAN is enabled for either slave interface, then bonding cannot be enabled. VLAN can be
disabled under Settings ➙ Network Settings ➙ Network IP Settings.
• Auto Configuration: This option is used to enable or disable automatic interface configuration.
Notes:
– If this option is enabled, all the services will restart automatically.
– If this option is disabled, the interfaces in service can be configured via IPMI commands.
• Bond Interface: This option is used to configure bonding for the network interfaces.
Note: A minimum of two network interfaces is required to enable network bonding for the device.
• Bond Mode: This field displays the network bonding mode and cannot be configured.
• Save: Save the settings.
To open the Network Link Configuration page, click Settings ➙ Network Settings ➙ Network Link
Configuration.
The fields of the Network Link Configuration page are explained below.
• LAN Interface: Select the required network interface from the list for which the link speed and duplex
mode are to be configured.
• Auto Negotiation: This option is enabled to allow the device to perform automatic configuration to
achieve the best possible mode of operation (speed and duplex) over a link.
Note: The Link Speed and Duplex Mode will be active only when Auto Negotiation is disabled.
Note: Link speed of 1000 Mbps is not applicable when Auto Negotiation is disabled.
• Duplex Mode: This field could be either Half Duplex or Full Duplex.
• NCSI Interface: The NCSI interface status could be either Enabled or Disabled for the selected LAN
interface.
• Save: Save the settings.
DNS Configuration
The Domain Name System (DNS) is a distributed hierarchical naming system for computers, services, or any
resource connected to the Internet or a private network. It associates the information with domain names
assigned to each of the participants. Most importantly, it translates domain names meaningful to humans
into the numerical (binary) identifiers associated with networking equipment for the purpose of locating and
addressing these devices worldwide.
The DNS Configuration page is used to manage the DNS settings of the device.
To open the DNS Configuration page, click Settings ➙ Network Settings ➙ DNS Configuration.
Note: A host name consists of 1 to 64 alpha-numeric characters and must not start or end with a hyphen
(-). Special characters hyphens (-) and underscores (_) are allowed. IE browsers won’t work correctly if any
part of the host name contains underscores (_).
Note: The Hostname method should be selected if the DHCP server does not support option 81, and the
Hostname method does not support an IPv6 domain interface.
TSIG Configuration
• Both: Select this check box to modify TSIG authentication for both interfaces.
• share & dedicated TSIG Configuration
Chapter 7. Settings 31
– TSIG Authentication Enabled: Select this check box to enable TSIG authentication while registering
DNS via nsupdate. Separate TSIG files can be uploaded for each LAN interface.
– Current TSIG Private File: Display the information of the current TSIG private file along with its
uploaded date and time, which is read-only.
– New TSIG Private File: Browse and navigate to the TSIG private file.
• Domain Setting: Select whether the domain interface will be configured manually or automatically.
– Automatic: If you select Automatic, specify the domain interface. The domain name cannot be
configured as it will be done automatically.
– Manual: If you select Manual, specify the domain name of the device.
Note: If you select Automatic, it displays the Domain Interface option. If you select Manual, it displays
Domain name.
• Domain Interface or Domain name: Specify the domain interface or domain name of the device.
Notes:
– IPv4 and IPv6 address formats are supported.
– IPv4 addresses should be given in dotted decimal representation.
– IPv6 addresses are supported and must be global unicast addresses.
• Save: Save the settings.
To open the Sideband Interface (NC-SI) page, click Settings ➙ Network Settings ➙ Sideband Interface
(NC-SI).
The fields of the Sideband Interface (NC-SI) page are explained below.
• NCSI Mode:
– If you select Auto Failover Mode, the NCSI interface and other settings will be configured
automatically.
– If you select Manual Switch Mode, you are allowed to configure the below settings.
• NCSI Interface: Select the NSCI interface for which you need to configure NCSI settings.
• Package ID: Select the package ID to be configured for the selected interface.
• Channel Number: Select the channel number to be configured for the selected interface.
• Save: Save the settings.
To open the PAM Order page, click Settings ➙ PAM Order Settings.
Procedure
Step 1. Select the required PAM module and click and drag the required PAM module. It can be moved up
or down to change its arrangement order.
Step 2. Click Save to save any changes.
Note: Whenever the configuration is modified, the Web server will be restarted automatically. The
logged-in session will be logged out.
To open the Platform Event Filters page, click Settings ➙ Platform Event Filters.
The fields of the Platform Event Filters page are explained below.
• “Event Filters” on page 33
• “Alert Policies” on page 35
• “LAN Destinations” on page 35
Event Filters
A PEF implementation is recommended to provide at least 40 entries in the event filter table. A subset of
these entries should be pre-configured for common system failure events, such as over-temperature, power
system failure, and fan failure events. Remaining entries can be made available for events configured through
OEM or system management software. Note that individual entries can be tagged as being reserved for
system use, so this ratio of pre-configured entries to runtime configurable entries can be reallocated if
necessary.
To open the Event Filters page, click Settings ➙ Platform Event Filters ➙ Event Filters.
By default, 15 event filter entries are configured among the 40 available slots.
• Select All to view available configured and unconfigured slots.
• Select Configured or Unconfigured to view available configured or unconfigured slots.
• To delete an event filter entry from the list, click in the upper right corner.
• To modify a configured event filter entry, click the entry to enter the Event Filter Configuration page and
then modify its configurations.
Chapter 7. Settings 33
• To add an event filter entry, select a free slot to open the Event Filter Configuration page and then set its
configurations.
• Enable this filter: Select this check box to enable the PEF settings.
• Event Severity to trigger: Select any one of the event severities from the list.
• Event Filter Action Alert: This option is enabled by default, which means to enable the PEF alert action.
• Power Action: Select a desired power action.
• Alert Policy Group Number: Configure the number of alert policies.
Note: Alert policies can be configured under Settings ➙ Platform Event Filters ➙ Alert Policies.
• Raw Data: Select this check box to fill the Generator ID with raw data.
• The Generator ID 1 field is used to give raw generator ID1 data value.
• The Generator ID 2 field is used to give raw generator ID2 data value.
Note: In the raw data fields, prefix the value with '0x' to specify a hexadecimal value.
• Generator Type:
– Select Slave if events were generated from IPMB.
– Select Software if events were generated from system software.
• Slave Address/Software ID: Specify the corresponding I2C slave address or system software ID.
• Select the particular Channel Number that event messages were received over. Alternatively, select 0 if
the event messages were received via the system interface, primary IPMB, or internally generated by the
BMC.
• Choose the corresponding IPMB Device LUN if events were generated by IPMB.
• Select the Sensor type of sensors that will trigger the event filter action.
• Sensor name: Select the particular sensor from the sensor list.
• Choose Event Options to be either all events or sensor-specific events.
• The Event trigger field is used to give Event/Reading type value, ranging from 0 to 255.
• The Event Data 1 AND Mask field is used to indicate wildcarded or compared bits, ranging from 0 to 255.
• The Event Data 1 Compare 1 and Event Data 1 Compare 2 fields are used to indicate whether each bit
position’s comparison is an exact comparison or not. Both values range from 0 to 255.
• Event Data 2 AND Mask: similar to Event Data 1 AND Mask
• Event Data 2 Compare 1 and Event Data 2 Compare 2: similar to Event Data 1 Compare 1 and Event
Data 1 Compare 2 respectively
• Event Data 3 AND Mask: similar to Event Data 1 AND Mask
• Event Data 3 Compare 1 and Event Data 3 Compare 2: similar to Event Data 1 Compare 1 and Event
Data 1 Compare 2 respectively
Click Save to save the changes and return to the event filter list.
To open the Alert Policies page, click Settings ➙ Platform Event Filters ➙ Alert Policies.
By default, all configured alert policies and available slots are displayed, and a maximum of 60 slots are
available.
• To delete an alert policy from the list, click in the upper right corner.
• To modify a configured alert policy, click the policy to enter the alert policy configuration page and then
modify its configurations.
• To add an alert policy, select a free slot to open the alert policy configuration page and then set its
configurations.
• Policy Group Number: Select a policy number that was configured in the event filter table.
• Enable this alert: Select this check box to enable the policy settings.
• Policy Action: Select any one of the policy set values (0–4) from the list.
– 0: Always send alert to this destination.
– 1: If alert to previous destination was successful, do not send alert to this destination. Proceed to next
entry in this policy set.
– 2: If alert to previous destination was successful, do not send alert to this destination. Do not process
any more entries in this policy set.
– 3: If alert to previous destination was successful, do not send alert to this destination. Proceed to next
entry in this policy set that is to a different channel.
– 4: If alert to previous destination was successful, do not send alert to this destination. Proceed to next
entry in this policy set that is to a different destination type.
• LAN Channel: Select a particular channel from the available channel list.
• Destination Selector: Select a particular destination from the configured destination list.
Note: LAN destinations have to be configured under Settings ➙ Platform Event Filters ➙ LAN
Destinations.
• Event Specific Alert String: Specify an event-specific alert string.
• Alert String Key: Specify which string is to be sent for this alert policy entry.
Click Save to save the changes and return to the alert policy list.
LAN Destinations
This section is used to configure the LAN destinations of PEF configuration.
Chapter 7. Settings 35
To open the LAN Destinations page, click Settings ➙ Platform Event Filters ➙ LAN Destinations.
By default, all LAN destination slots are displayed, and a maximum of 15 slots are available.
• Click to send sample alerts to the configured destination. Note that test alerts can be sent only with
enabled SMTP configuration. This can be done under Settings ➙ SMTP Settings. Make sure that the
SMTP server address and port numbers are configured properly.
• LAN Channel: Displays the LAN channel number for the selected slot, which is read-only.
• LAN Destination: Displays the destination number of the selected slot, which is read-only.
• Destination Type: Destination type can be either an SNMP Trap or an E-mail alert.
• SNMP Destination Address: If Destination Type is SNMP Trap, then provide the IP address of the
system that will receive the alert. IPv4 and IPv6 address formats are supported.
• BMC User Name: If Destination Type is E-Mail, then choose the user to whom the e-mail alert has to be
sent.
Note: The e-mail address for the user has to be configured under Settings ➙ User Management.
• Email Subject and Email Message: These fields must be configured if e-mail alert is chosen as the
destination type. An e-mail will be sent to the configured e-mail address of the user in case of any severity
events with a subject specified in subject field and will contain the message field’s content as the e-mail
body. These fields are not applicable for AMI-Format e-mail users.
Click Save to save the changes and return to the LAN destination list.
Services
This section lists services running on the BMC and provides the current status and other basic information
about each service. Only an administrator user can modify a service.
Notes:
Notes:
– Services mapping to disabled interfaces will not work.
– Media and KVM interfaces are read-only when the single port is enabled. To change the interfaces,
disable the feature of KVM Single Port Application.
• Secure Port: secure port for the service. Port value ranges from 1 to 65535. Default port configurations
for different services are as follows:
– Web: 443
– KVM: 7582
– CD media: 5124
– HD media: 5127
– SSH: 22
Notes:
– Port 80 is blocked for TCP and UDP protocols. To view the port listening status on various feature
settings, see “Port listening status on various feature settings” on page 37.
– Media and KVM interfaces are read-only when the single port is enabled. To change the interfaces,
disable the feature of KVM Single Port Application.
• Timeout: session timeout value of the service.
– Web and KVM timeout value ranges from 300 to 1800 seconds.
– Web timeout will be ignored if there is any ongoing KVM session.
– SSH timeout value ranges from 60 to 1800 seconds.
– Timeout value should be in multiples of 60 seconds.
• Maximum Sessions: maximum number of allowed sessions for the service.
Server Single port Single port Only KVM Only Media Both KVM and
enabled disabled encryption encryption Media
enabled enabled encryption
enabled
Adviser (video 7578 (LP) 7578 (LP) 7578 (LP) 7578 (LP) 7578 (LP)
server) 7578 (EO) 7582 (EO) 7578 (EO) 7582 (EO)
Cdserver 5120 (LP) 5120 (LP) 5120 (LP) 5120 (LP) 5120 (LP)
5120 (EO) 5120 (EO) 5124 (EO) 5124 (EO)
Hdserver 5123 (LP) 5123 (LP) 5123 (LP) 5123 (LP) 5123 (LP)
5123 (EO) 5123 (EO) 5127 (EO) 5127 (EO)
Notes:
• LP indicates loopback and EO indicates exposed outside.
Chapter 7. Settings 37
• The adviser will always be listening to loopback as well as KVM-configured interfaces as mentioned in the
above table, so that the H5Viewer client can connect to the video server.
• The media servers will be listening to loopback as well as configured interfaces as mentioned in the above
table, so that the LMedia/RMedia and H5Viewer/JViewer client can connect to the media servers.
Step 1. On the Settings page, click in the same row as the service for which you want to modify its
configurations.
The Service Configuration page is displayed.
Step 2. Modify the service configurations as required.
Step 1. On the Settings page, click in the same row as the service for which you want to view or
terminate its active sessions.
The Service Sessions page is displayed, which displays the information about active sessions.
Notes: The default user ID ranges for the supported PAM modules are as follows:
– LDAP/E-Directory user: 2000–2999
– Active Directory user: 3000–3999
– RADIUS user: 4000–4999
• Client IP: IP address already configured for the active session.
• Privilege: access privilege of the user.
Step 2. Select a slot and click to terminate the particular session of the service.
SMTP Settings
Simple Mail Transfer Protocol (SMTP) is an Internet standard for e-mail transmission across IP networks.
This section allows you to configure the SMTP settings of the device.
If the SMTP server does not support any of the above authentication types, the user will get an error
message stating, Authentication type is not supported by SMTP Server.
• Primary Username: Enter the user name required to access SMTP accounts.
– A user name is string of 4 to 64 alpha-numeric characters that must start with an alphabetical
character.
– Special characters like dot (.), at sign (@), hyphen (-), and underscore (_) are supported. Others are not
allowed.
• Primary Password: Enter the password for the SMTP user.
– A password must be 4 to 64 characters long.
– White space is not allowed.
• Primary SMTP SSLTLS Enable: Enable or disable the SMTP SSLTLS protocol.
• Primary SMTP STARTTLS Enable: This option is available only when Primary SMTP SSLTLS Enable is
not selected.
– Upload SMTP CA Certificate File: file that contains the certificate of the trusted CA certs. The
CACERT key file should be of pem type.
– Upload SMTP Certificate File: Client certificate filename. The CERT key file should be of pem type.
– Upload SMTP Private Key: Client private key filename. The SMTP key file should be of pem type.
Note: To enable STARTTLS support, the primary SMTP support option should be enabled.
• Secondary SMTP Support: It lists the secondary SMTP server configuration. It is an optional field. If the
primary SMTP server is not working fine, then it tries with secondary SMTP server configuration.
Note: Options of Secondary SMTP Support are same as those of Primary SMTP Support.
• Save: Save the settings.
Chapter 7. Settings 39
SSL Settings
The Secure Socket Layer (SSL) protocol was created by Netscape to ensure secure transactions between
Web servers and browsers. The protocol uses a third party, a Certificate Authority (CA), to identify one end or
both ends of the transactions.
This section is used to configure an SSL certificate into the BMC. Using this, the device can be accessed in a
secured mode.
Generate CSR
The fields of the Generate CSR page are explained below.
• To download a CSR, click the Download CSR link.
• Common Name (CN): common name for which the certificate is to be generated.
– It contains a maximum of 64 alpha-numeric characters.
– Special characters ‘#’ and ‘$’ are not allowed.
• Organization (O): name of the organization for which the certificate is to be generated.
– It contains a maximum of 64 alpha-numeric characters.
– Special characters ‘#’ and ‘$’ are not allowed.
• Organization Unit (OU): section or unit of the organization for which certificate is to be generated.
– It contains a maximum of 64 alpha-numeric characters.
– Special characters ‘#’ and ‘$’ are not allowed.
• City or Locality (L): city or locality of the organization.
– It contains a maximum of 128 alpha-numeric characters.
– Special characters ‘#’ and ‘$’ are not allowed.
• State or Province (ST): state or province of the organization.
– It contains a maximum of 128 alpha-numeric characters.
– Special characters ‘#’ and ‘$’ are not allowed.
• Country (C): country code of the organization.
– Only two characters are allowed.
– Special characters are not allowed.
• Email Address: e-mail address of the organization.
Download CSR
Note: Clicking the Download button allows you to obtain the service data for your system. Normally you
would do this only at the request of support personnel.
Procedure
Step 1. Specify the CSR download type, which can be PEM or DER.
Step 2. Click Download.
Procedure
Step 1. Click Choose File and choose a new signed certificate (in DER format).
Alternatively, paste the file content in the blank area.
Step 2. Click Upload.
Chapter 7. Settings 41
• Key Length: key length bit value of the certificate.
• Save: Generate the new SSL certificate.
Procedure
Step 1. Specify the download type, which can be PEM or DER.
Step 2. Click Download.
System Firewall
This section allows you to configure the firewall settings. The firewall rule can be set for an IP or range of IP
addresses or port numbers. To view this page, you must at least be an operator. Only administrators can add
or delete a firewall.
After you have configured firewall settings, all the configured firewall settings will be displayed on the Existing
Firewall Settings page. To view this page, you must at least be an operator. Only administrators can add or
delete a firewall.
Existing IP Rules
A blank page will be opened if you did not add anything in Add IP Rule. If there is no IP rule, add an IP rule by
clicking the Add IP Rule link.
After you have configured IP rules, all the configured IP rules will be displayed on the Existing IP Rules page.
To view this page, you must at least be an operator. Only administrators can add or delete an IP rule.
Notes:
• An IP address consists of 4 numbers separated by dots, as in “xxx.xxx.xxx.xxx”.
• Each number ranges from 0 to 255.
• The first number must not be 0.
3. (Optional) Enter the end value of the IP range in the IP Range End field.
4. Select Enable Timeout to enable firewall rules with timeout.
5. Enter Start Date and Start Time to start the respective firewall rule effect from this date and time.
6. Enter End Date and End Time to end the respective firewall rule effect from this date and time.
7. Determine the rule to Block or Allow.
8. Click Save to save the settings.
Chapter 7. Settings 43
Port Firewall Rules
Click System Firewall ➙ Port Firewall Rules.
After you have configured port rules, all the configured port rules will be displayed on the Existing Port Rules
page. To view this page, you must at least be an operator. Only administrators can add or delete a port rule.
Notes:
• The port number ranges from 1 to 65535.
• Port 80 is blocked for TCP and UDP protocols.
3. (Optional) Enter the end value of the port range in the Port Range End field.
4. Specify the Protocol for the configured port or port range.
5. Specify the affected Network Type for the particular port or port ranges.
6. Select Enable Timeout to enable firewall rules with timeout.
7. Enter Start Date and Start Time to start the respective firewall rule effect from this date and time.
8. Enter End Date and End Time to end the respective firewall rule effect from this date and time.
9. Determine the rule to Block or Allow.
10. Click Save to save the rule.
User Management
This section allows you to view the current list of user slots for the server.
By default, currently configured users for each LAN channel are displayed, and a maximum of 15 users are
available, including the default administrator and anonymous users. Each slot displays the channel ID, user
ID, user name, access privilege, and network privilege of the user.
Note: By default, the complex password policy is enabled under Global Setting. To change the setting,
click Global Setting, disable Password Complex, and then click Save.
Notes:
• It is advised that the anonymous user's privilege and password should be modified immediately as a
security measure.
• To modify or add a user, you must have administrator privileges.
Notes:
– The Password field is mandatory and should have a minimum of 8 characters when the SNMP status is
enabled.
– This field will not allow more than 16 or 20 characters based on the value of the Password size.
– If Password Complex is enabled under Global Setting, follow the rules below:
1. No other characters, in particular, spaces or white-space characters, are allowed.
2. At least one letter must be contained.
3. At least one number must be contained.
4. At least two of the following types must be contained:
– An upper-case letter
– A lower-case letter
– A special character
5. A password may have no more than 2 consecutive instances of the same character.
6. A password must not be the same as an associated user ID or the user ID in a reverse order.
7. A password must contain a minimum of 8 and a maximum of 20 characters.
8. BMC prevents duplicated passwords.
Chapter 7. Settings 45
• Enable User Access: Check the boxes to enable network access for the user. Upon enabling, the
corresponding IPMI messaging privilege will be assigned to the user.
Note: It is recommended that the IPMI messaging option should be enabled as well if user is created
through IPMI.
• Privilege(Channel 1) and Privilege(Channel 8): Select the privilege assigned to the user which could be
Administrator, Operator, User, OEM, or None.
• KVM Access: Select this check box to assign the KVM privilege for the user.
• VMedia Access: Select this check box to assign the VMedia privilege for the user.
Note: The term VMedia represents H5Viewer, JViewer, VMapp, and VMCLI clients.
It is recommended that the privileges support to KVM and VMedia should be provided only to the Admin
user and shouldn’t be provided to User and Operator privilege level users. The Admin user can provide the
privilege support to User and Operator privilege level users at their own risk.
VMedia privilege only restricts initiating or starting media redirection. If a device is already being
redirected and attached to the host, then it will be visible as a normal device in the host. Hence, it will be
accessible to all the KVM sessions, including sessions for KVM privilege only as well.
While modifying the KVM and VMedia access by logged in User, it will prompt you with the alert message
to log out the current session to reflect the changes.
• SNMP Access: Select this check box to enable SNMP access for the user.
– SNMP Access level: Select the SNMP access level for the user.
– SNMP Authentication Protocol: Select an SNMP authentication protocol for the user.
Note: The Password field is mandatory whenever the authentication protocol is changed.
– SNMP Privacy Protocol: Select the encryption algorithm to be used for the SNMP settings.
• Email Format: Specify the format for sending e-mail. Two types of formats are available:
– AMI-Format: The subject of this mail format is Alert from (your Hostname). The mail content includes
sensor information such as sensor type and description.
– FixedSubject-Format: This format displays the specific subject and message configured for e-mail
alerts for the specified user.
• Email ID: Enter the e-mail ID for the user. If the user forgets the password, a new password will be mailed
to this e-mail ID.
Notes:
– The SMTP server must also be configured for this option.
– The maximum allowed size for Email ID is 64 bytes, including user name and domain name.
• Existing SSH Key: If available, the uploaded SSH key information will be displayed, which is read-only.
• Upload SSH Key: Click Browse and select the SSH key file.
Click Save to save the changes and return to the user list.
On the System Location page, specify the contact number, rack name, and location information about the
system, and then click Save to save the configuration.
To open the Account Lockout Policy page, click Settings ➙ Account Lockout Policy.
The fields of the Account Lockout Policy page are explained below.
• Enable Lockout Policy: Select this check box to enable the account lockout policy.
• Attempt Times: Specify the number of incorrect attempts before the account is locked out.
• Reset Time (Min): Enter a value between 0 and 10922. The value 0 indicates that the account resets till
the BMC goes through a power cycle.
• Lockout Time (Min): Enter a value between 30 and 10922, or 0. The value 0 indicates that the account
lockout terminates till the BMC goes through a power cycle.
• Click Account Lockout Policy to save the policy.
IPMI Configuration
This section provides IPMI configuration.
Chapter 7. Settings 47
To open the IPMI Configuration page, click Settings ➙ IPMI Configuration.
• To immediately enable IPMI LAN (IPv4), select Enable IPMI LAN (IPv4).
• To immediately enable IPMI LAN (IPv6), select Enable IPMI LAN (IPv6).
• Click Save to save the configuration.
Note: The default settings for the IPMI configuration vary depending on customers’ configuration.
The Remote Control page allows you to implement remote control on the device. The various options of
remote control are given below.
• “H5Viewer” on page 49
• “JViewer” on page 55
• “Serial Over LAN” on page 64
The system and browser requirements for remote control are given below.
System Requirements
• Client machine with 8 GB RAM.
• If the client machine has 4 GB RAM or lower, there will be lag in video/keyboard/mouse/media redirection
functionality.
Supported Browsers
• Chrome latest version
• IE11 and above
• Firefox (with limited support)
Note: It is advisable to use Chrome or IE for H5Viewer, since Firefox has its own memory limitations.
In Microsoft Windows operating systems, IPv4 addresses are valid location identifiers in Uniform Naming
Convention (UNC) path names. However, the colon (:) is an invalid character in a UNC path name. Thus, the
use of IPv6 addresses is also invalid in UNC names.
For this reason, in the IE browser, IPv6 addresses should be given in the format of literal IPv6 addresses in
UNC path names.
Example:
For Web, 2001-db8-85a3-8d3-1319-8a2e-370-7348.ipv6-literal.net:85,
where IP is 2001:db8:85a3:8d3:1319:8a2e:370:7348 and port is 85.
Launch H5Viewer
On the Remote Control page, click Launch H5Viewer.
Video
This menu contains the following sub menu items:
Resume Video: This option is used to resume the console redirection when the session is paused.
Refresh Video: This option can be used to update the display shown in the console redirection window.
Host Display:
• Display ON: If you disable this option, that is, enable Display OFF, the display will be shown on the
screen in console redirection.
• Display OFF: If you enable this option, the server display will be blank but you can view the screen in
console redirection.
Capture Screen: This option helps to take the screenshot of the host screen and save it in the client’s
system.
Mouse
Show Client Cursor: This menu item can be used to show or hide the local mouse cursor on the remote
client system.
Mouse Mode: This option handles mouse emulation from local window to remote screen using any of the
following methods. Only administrators have the right to configure this option.
• Absolute Mouse Mode: The absolute position of the local mouse is sent to the server if this option is
selected.
• Relative Mouse Mode: The relative mode sends the calculated relative mouse position displacement to
the server if this option is selected.
• Other Mouse Mmode: This mouse mode sets the client cursor in the middle of the client system and will
send the deviation to the host. This mouse mode is specific for SUSE Linux installation.
Note: Users are advised to use Linux version of OS except SUSE 11.4 with BMC to avoid mouse sync
issues in absolute mouse mode.
The client cursor will be hidden always. If you want to enable it, use Alt+C to access the menu.
Options
Zoom:
• Normal: By default this option is selected.
• Zoom In: This option is used for increasing the screen size. This zoom varies from 100% to 150% with an
interval of 10%.
• Zoom Out: This option is used for decreasing the screen size. This zoom varies from 100% to 50% with
an interval of 10%.
Bandwidth: This option determines the bandwidth. You can select Auto Detect, 256 Kbps, 512 Kbps, 1
Mbps, 10 Mbps, or 100 Mbps.
Compression mode: This option helps to compress the video data transfer to the specific mode.
Video quality list: This list allows you to choose a video quality.
Keyboard
Keyboard Layout: This feature is fully compatible when the host and client have the same keyboard
language layout. If the client and host language layouts differ, some special characters will not be
compatible.
Send Keys
This option is used to key items. This menu contains the following sub menu items:
• Hold Down
• Press and Release
Hold Down
• Right Ctrl Key: This menu item can be used to act as the right-side <CTRL> key in console redirection.
• Right Alt Key: This menu item can be used to act as the right-side <ALT> key in console redirection.
• Right Windows Key: This menu item can be used to act as the right-side <WIN> key in console
redirection.
• Left Ctrl Key: This menu item can be used to act as the left-side <CTRL> key in console redirection.
• Left Alt Key: This menu item can be used to act as the left-side <ALT> key in console redirection.
• Left Windows Key: This menu item can be used to act as the left-side <WIN> key in console redirection.
You can also decide how the key should be pressed: Hold Down or Press and Release.
• Ctrl+Alt+Del: This menu item can be used to act as if you depressed the <CTRL>, <ALT>, and <DEL>
keys down simultaneously on the server that you are redirecting.
• Left Windows Key: This menu item can be used to act as the left-side <WIN> key in console redirection.
You can also decide how the key should be pressed: Hold Down or Press and Release.
• Right Windows Key: This menu item can be used to act as the right-side <WIN> key in console
redirection.
• Context Menu Key: This menu item can be used to act as the context menu key in console redirection.
• Print Screen Key: This menu item can be used to act as the print screen key in console redirection.
Hot Keys
This menu is used to add the user configurable shortcut keys to invoke in the host machine. The configured
key events are saved in the BMC.
• Add Hot Keys: This menu is used to enable macros. Click Add to macros.
Record Settings: This option is used to set video record duration and video compression value. Video
Length should be in the range of 1 to 1800 seconds. Video Compression should be in the range of 0.1 (low
image quality) to 0.9. (high image quality).
Normalized video resolution to 1024 X 768: Host video will be scaled to 1024 x 768 in the recorded video
file.
• Enabling this option improves client-side video recording performance in H5Viewer.
• Disable this option to record video at the same resolution as host video. The host video capture depends
on client system performance. If this option is disabled, the recorded video file may have inconsistency.
(for example, recorded video file duration may not be the same as the configured value).
Note: The maximum video file size allowed is around 40 MB. If the video file size reaches its maximum size
limit, the recorded file is downloaded and recording will be in progress until the configured video recording
time is reached. The video file is saved as video_date-month-year_hr-min-sec_partno in client-side video
recording.
Users have to take care of saving the video files in different browsers.
When H5Viewer focus is lost and if video recording is in progress, the recording will be stopped with a
notification message and the recorded video file will be discarded.
Due to browser limitations, the set timeout or set interval will be delayed from specified time of interval when
the browser window loses focus. Hence, the video server will not send the video packets to H5Viewer and so
the video recording will be stopped.
Power
The power options are to perform any power cycle operation. Click the required option to perform the
following operation.
Reset Server: To reboot the system without powering off (warm boot).
Power Cycle Server: To first power off, and then reboot the system (cold boot).
Active Users
Click this option to display the active users and their system IP addresses.
Active KVM Session can be terminated when there are multiple KVM Session From Master [FULL Privilege
KVM Session].
Quick buttons
The upper right of the H5Viewer window displays all the quick buttons. These quick buttons allow you to
perform the below functions by clicking them.
Button Description
This quick button will show or hide the notification drop-down menu, which
contains the list of notifications displayed by H5Viewer.
This quick button is used to display the current host monitor status.
• If the icon is in green, the host monitor is unlocked.
• If the icon is in red, the host monitor is locked.
This quick button is used to display the current server power status.
• If the icon is in green, the server status is powered on.
• If the icon is in red, the server status is powered off.
Click the button to toggle between immediate host power-off and power-on.
Some of these buttons provide the same functionality of the menu items under Send Keys ➙ Hold Down.
Select any of the menu items, and the corresponding status bar button will be highlighted in green color.
Similarly by clicking the buttons will toggle the selection status of the corresponding menu item.
Notes: Due to Web browser-related security concerns, this feature has the following limitations:
• Host LED status will be synced with client LED status, only if the user presses any key in the client
keyboard when the H5Viewer window is in focus.
• Client keyboard LED status cannot be updated.
KVM sharing
TSM stack supports multiple KVM redirection sessions, with only one full-permission JViewer or H5Viewer
session at a time. With full permission in JViewer or H5Viewer, the user can control the KVM redirection,
while the other JViewer or H5Viewer users can only view the video redirected from the server without
intervention.
When the first user launches JViewer or H5Viewer, the user will get full permission to control the host during
KVM redirection. When another JViewer or H5Viewer session is launched, the video server will send a KVM
sharing permission request packet to the current session, for the new requesting session.
Once the requesting session is authenticated, a packet containing the information such as the client IP or
host name and user name of the newly authenticated or logged in user, will be sent to the current session.
Clicking the button in the dialog box will trigger the specified action:
• Full Permission: When this button is clicked, the requesting session will receive full access permission,
and the current (full permission) session will have a partial KVM access permission only.
• Partial Permission: When this button is clicked, the requesting session will receive partial permission and
can only view server display (video only).
• Block Privilege Request:
– Partial Permission: Once this option is selected, both the newly requesting session and active partially
privileged session will get partial permission as auto response and can only view server display. Further
requests will be served by the auto response mechanism.
– No Permission: Once this option is selected, both the newly requesting session and active partially
privileged session access will be denied as auto response. Further requests will be served by the auto
response mechanism.
Launch JViewer
This is an OS-independent plug-in which can be used in Windows as well as Linux with the help of Java
Runtime Environment (JRE). JRE should be installed in the client’s system.
Note: It is recommended to use openJDK 8 or any later LTS version. IcedTea-Web launch applications may
work inconsistently when JDK 11 or a later version is used. The Web launch dialog may freeze and become
unresponsive. Visit https://icedtea.classpath.org/wiki/IcedTea-Web#Filing_bugs for further information.
In some earlier versions of JRE 1.7, TLS v1 protocol will be enabled by default. Users need to manually
enable TLS v1.2 protocol support from the Java configuration panel for proper JViewer functionality.
The console redirection menu bar consists of the following menu items:
• Video
• Keyboard
• Mouse
• Options
• Media
• Keyboard Layout
• Video Record
• Power
• Active Users
• Help
Video
This menu contains the following sub menu items:
Resume Redirection: This option is used to resume the console redirection when the session is paused.
Refresh Video: This option can be used to update the display shown in the console redirection window.
Capture Screen: This option helps to take the screenshot of the host screen and save it in the client’s
system.
Compression mode: This option helps to compress the video data transfer to the specific mode.
Video quality list: This list allows you to choose a video quality.
Low Bandwidth Mode: This option is used to control the video packet dataflow in the network.
Full Screen: This option is used to view the console redirection in full screen mode (Maximize). This menu is
enabled only when both the client and host resolution are same.
Keyboard
This menu contains the following sub menu items:
Hold Right Ctrl Key: This menu item can be used to act as the right-side <CTRL> key in console redirection.
Hold Right Alt Key: This menu item can be used to act as the right-side <ALT> key in console redirection.
Hold Left Ctrl Key: This menu item can be used to act as the left-side <CTRL> key in console redirection.
Hold Left Alt Key: This menu item can be used to act as the left-side <ALT> key in console redirection.
Left Windows Key: This menu item can be used to act as the left-side <WIN> key in console redirection.
You can also decide how the key should be pressed: Hold Down or Press and Release.
Right Windows Key: This menu item can be used to act as the right-side <WIN> key in console redirection.
You can also decide how the key should be pressed: Hold Down or Press and Release.
Ctrl+Alt+Del: This menu item can be used to act as if you depressed the <CRTL>, <ALT>, and <DEL> keys
down simultaneously on the server that you are redirecting.
Context menu: This menu item can be used to act as the context menu key in console redirection.
Hot Keys: This menu is used to add the user configurable shortcut keys to invoke in the host machine. The
configured key events are saved in the BMC.
Full Keyboard Support: Enable this option to provide full keyboard support. This option is used to trigger
the Ctrl and Alt keys directly to host from the physical keyboard.
Mouse
Show Cursor: This menu item can be used to show or hide the local mouse cursor on the remote client
system.
Mouse Calibration: This menu item can be used only if the mouse mode is relative.
In this step, the mouse threshold settings on the remote server will be discovered. The local mouse cursor is
displayed in red color and the remote cursor is part of the remote video screen. Both the cursors will be
synchronized in the beginning. Use the ‘+’ or ‘-’ key to change the threshold settings until both the cursors
go out of sync. Detect the first reading on which cursors go out of sync. Once this is detected, use ‘ALT-T’ to
save the threshold value.
Show Host Cursor: This option is used to enable or disable the visibility of the host cursor. Specific video
drivers should be installed in the host for this feature to work.
Mouse Mode: This option handles mouse emulation from local window to remote screen using any of the
following methods. Only administrators have the right to configure this option.
• Absolute mouse mode: The absolute position of the local mouse is sent to the server if this option is
selected.
• Relative mouse mode: The relative mode sends the calculated relative mouse position displacement to
the server if this option is selected.
• Other mouse mode: This mouse mode sets the client cursor in the middle of the client system and will
send the deviation to the host. This mouse mode is specific for SUSE Linux installation and accessing
mouse in the UEFI screen.
Note: Users are advised to use Linux version of OS except SUSE 11.4 with BMC to avoid mouse sync
issues in absolute mouse mode.
The client cursor will be hidden always. If you want to enable it, use Alt+C to access the menu.
You can see client and host cursors in JViewer if the mouse is moved faster or in circle. Mouse sync will
depend on many factors like network, client machine video packet receiving and rendering, and BMC CPU
utilization. In normal use cases, you will have better mouse sync, compared to heavy video or stress testing
scenarios. High resolution and media redirection (copy) will have direct impacts on video rendering because
the client or host cursor can be viewed while moving the cursor.
To view the supported operating systems for mouse modes, see “Supported operating systems for mouse
modes” on page 26.
Options
Bandwidth: The bandwidth usage option allows you to adjust the bandwidth. You can select one of the
following:
• Auto Detect: This option is used to detect the network bandwidth usage of the BMC automatically.
• 256 Kbps
• 512 Kbps
• 1 Mbps
• 10 Mbps
Keyboard/Mouse Encryption: This option allows you to encrypt keyboard inputs and mouse movements
sent between the connections.
Zoom:
Note: This option is available only when you launch the Java console.
• Zoom In: This option is used for increasing the screen size. This zoom varies from 100% to 150% with an
interval of 10%.
• Zoom Out: This option is used for decreasing the screen size. This zoom varies from 100% to 50% with
an interval of 10%.
Fit to Client Resolution: If the host screen resolution is greater than the client screen resolution, choose this
option to fit the host screen to the client screen. The host video will be scaled down and rendered in the KVM
Fit to Host Resolution: If the host screen resolution is smaller than the client screen resolution, choose this
option to resize the JViewer frame to the host resolution.
Send IPMI Command: This option opens the IPMI Command Dialog. Enter the raw IPMI command in the
Hexadecimal field as a hexadecimal value and click Send. The response will then be displayed.
Request Full Permission: Partially permitted sessions can use this option to request the full permission from
the existing fully permitted session.
Note: This menu option is available only for partially privileged sessions and full permission sessions will not
have this option in the menu.
Block Privilege Request: Fully privileged sessions can use this option to block incoming requests from
partially privileged sessions by setting an auto response as either Allow only Video or Deny Access.
Note: This menu option is available only for full permission sessions and partially privileged sessions will not
have this option in the menu. Either of the options can only be selected. Both options cannot be selected
together. To disable Block Privilege Request, none of the options should be selected in the menu.
If Allow only Video is selected, the slave session will be notified as “KVM Master Session blocked incoming
request” and it will always receive “Video Only” (partial permission).
If Deny Access is selected, the slave session will be notified as “KVM Master Session blocked incoming
request” and the incoming KVM session will be closed.
Note: If there are two device panels for each device, when you click Connect, the redirected device panel
will be disabled.
Unmounting a device will make the driver disconnect the device when using Auto Attach. Hence, when
unmounting one USB key, the other USB key will be disconnected and then reconnected.
The virtual media application can be launched as a standalone application from the StandAlone connection
dialog. It can also be launched from the JViewer, using the Virtual Media menu. When launched from
JViewer, this application will work like a child dialog of the JViewer.
CD/DVD: This tab can be used to start or stop the redirection of a physical DVD/CD-ROM drive and DVD/CD
image file of ISO/NRG file format.
Hard Disk/USB: This tab can be used to start or stop the redirection of a hard disk/USB key image and USB
key image such as img/ima.
Note: For redirecting hard disk drives, you should have the administrator privilege (root user in the case of
Linux clients).
For Windows 7 and above, the Web browser from which the KVM redirection will be initiated, should be
launched using the Run as Administrator option. If there are multiple instances of the Web browser open
simultaneously, ensure that all the instances are launched using the Run as Administrator option.
For a Windows client, if the logical drive of the physical drive is dismounted, the logical device is redirected
with read/write permission. Else it is redirected with read permission only. The USB/hard disk drive can be
redirected as a whole physical drive or individual logical drives.
For a MAC client, external USB hard disk redirection is only supported. The external hard disk drives should
be unmounted from the client before being redirected.
For a Linux client, fixed hard drive is redirected only as read mode. It does not support write mode. The USB/
hard disk drive will be redirected as a whole physical drive.
For hard disk image redirection, only the file extension is validated. The hard disk/USB key device or image
will be redirected to the host as it is. The BMC will not validate the hard disk medium, and the host OS will
take care of this. This is applicable for all the media redirection client applications.
If the feature Redirect Devices Always in READ and WRITE Mode is enabled, the internal hard disk drives
in the client machine will not be listed. This information will be displayed in the status bar of the virtual media
application.
If files with hidden attribute are visible in the file open dialog, the file can be opened and redirected.
If the file is not visible in the file open dialog, the user shall mention the path of the image file in the file name
field of the file open dialog and then open the image.
TSM stack media redirection supports only basic hard disk redirection.
Connection Status: This tab provides a collective view of the redirection status of various virtual media
devices.
Note: VMedia privilege only restricts initiating or starting media redirection. If a device is already being
redirected and attached to the host, then it will be visible as a normal device in the host. Hence, it will be
accessible to all the KVM sessions, including sessions for KVM privilege only as well.
Keyboard Layout
Auto Detect: This option is used to detect keyboard layout automatically. If the client and host keyboard
layouts are the same, then for all the supported physical keyboard layouts, you must select this option to
avoid typo errors. If the host and client languages differ, you can choose the host language layout in the
menu and thereby can directly use the physical keyboard.
Physical Keyboard: This feature is fully compatible when the host and client have the same keyboard
language layout. If the client and host language layouts differ, some special characters will not be
compatible.
• Host Platform: This feature contains two options: Windows and Linux. When working with a Windows
host, the Windows option should be selected. Similarly, when working with a Linux host, the Linux option
should be selected. This option should be selected properly for the physical keyboard layout cross
mapping to work properly. By default, Windows will be selected.
Soft Keyboard: This option allows you to select the keyboard layout. It will show the dialog as similar to the
Windows on-screen keyboard. If the client and host languages are different, you can select the soft keyboard
that corresponds to the host keyboard layout from the list shown in JViewer, and use it to avoid typo errors.
Note: Different Linux systems follow different keyboard layouts. Therefore, the soft keyboard displayed uses
the standard windows keyboard layout irrespective of the host OS.
Note: Soft keyboard is applicable only for the JViewer application, not for other applications in the client
system.
Video Record
This menu contains the following sub menu items:
Settings: This option is used to set the settings for video recording.
Note: Before you start recording, you have to enter the settings.
Power
The power options are to perform any power cycle operation. Click the required option to perform the
following operation.
Reset Server: To reboot the system without powering off (warm boot).
Power Cycle Server: To first power off, and then reboot the system (cold boot).
Active Users
Click this option to display the active users and their system IP addresses.
Help
JViewer: displays the copyright and version information.
Quick buttons
The lower right of console redirection windows displays all the quick buttons. These quick buttons allow you
to perform the below functions by clicking them.
Note: This option is available only when you launch the Java console.
Button Description
This key is used to play the console redirection after being paused.
This button is used to view the console redirection in full screen mode.
Note: Set your client system resolution same as the host system resolution so
that you can view the server in full screen.
These quick buttons will pop up a virtual media where you can configure the
media.
Button Description
This quick button is used to show or hide the mouse cursor on the remote client
system.
The host keyboard LED status will be synchronized with the client keyboard, the lock indicators in the
JViewer status bar, and the JViewer soft keyboard.
The client keyboard’s LED status before launching JViewer, or before the JViewer gains focus, will be set
back to the client when the focus is lost from the JViewer, or when the JViewer is closed.
Note: For Macintosh OS X clients, the client keyboard LED sync will not work as the OS does not allow user
applications to alter the keyboard LED status. However, the keyboard lock indicators on the JViewer status
bar, and the JViewer soft keyboard lock status will sync with the host keyboard LED status.
In the case of latest Linux distributions used as the host, the keyboard LED sync will not work if the lock
status is changed using the host physical keyboard directly. However, the sync will work if the LED status is
changed using the on-screen keyboard available in the host OS.
Opening a child dialog in JViewer will cause the focus shift out of JViewer. The client keyboard’s LED status
before launching JViewer, or the JViewer gains focus, will be set back to the client in this case.
The Image Redirection page is used to configure the images into BMC for redirection. This can be done by
mounting the images from the remote system.
Remote Media
Click Image Redirection ➙ Remote Images.
The displayed table shows remote images available to the BMC. You can start redirection or clear the images
on this page.
Notes: A maximum of 4 images can be added for each image type, depending on your configuration.
To configure the images, you need to enable remote media support in Settings ➙ Media Redirection ➙
General Settings.
To start or stop redirection and to delete an image, you must have administrator privileges.
Field description
The image list displays the following fields:
• Media Type: Displays the type of media such as CD/DVD and Hard disk.
• Media Instance: Displays the total number of media instances.
• Image Name: Displays the default recovery image name on the server.
• Redirection Status: Displays the status of the media.
• Connected Server Session Index: Displays the media server session index.
Supported operations
Remote Media allows you to perform various operations on the images.
• Click in the upper right corner of the page to view the brief description of this page.
• Click in the upper right corner of the list to get the latest list of images from the
remote storage server.
The Power Control page allows you to view and control the power of your server. The various options of
Power Control are given below.
• Power Off: Power off the server without first shutting down the operating system.
• Power On: Power on the server and boot the operating system.
• Power Cycle: Power off the server first and then power on the server.
• Hard Reset: Reset the server and boot the operating system.
• ACPI Shutdown: Shut down the operating system and power off the server.
• BMC Cold Reset: Restart the TSM hardware.
• BMC Warm Reset: Restart the IPMI process of TSM.
Select an action and click Perform Action to proceed with the selected action.
Note: During the execution, you will be asked to confirm your choice. Upon confirmation, you will be
informed about the status after few minutes.
The Maintenance page allows you to do maintenance tasks on the device. The menu contains the following
items:
• “Backup BMC Configuration” on page 71
• “BMC Firmware Information” on page 71
• “Download Service Data” on page 71
• “Firmware Update” on page 72
• “Restore BMC Configuration” on page 72
• “Restore Factory Defaults” on page 73
Procedure
Step 1. Click Maintenance ➙ Backup BMC Configuration.
The Backup BMC Configuration page is displayed.
Step 2. Select Check All or the particular components that need to be backed up. You will be able to save
the backup configuration file to a location of your choice. That saved file can be used to restore the
configuration when needed.
Note: Network configurations are inter-related to IPMI, hence, by default, IPMI configurations will
be selected automatically when you check the Network & Services box and vice versa.
Step 3. Click Download to download and save the configuration files backed up from the BMC to the client
system.
To open the Firmware Information page, click Maintenance ➙ BMC Firmware Information.
Active Firmware:
• Build Date: Describes the build date of the active BMC image.
• Build Time: Describes the build time of the active BMC image.
• Firmware version: Displays the firmware version of the active BMC image.
Note: Normally you would do this only at the request of support personnel.
Firmware Update
This section enables you to perform update operations on System Firmware, BP Firmware, and PSU
Firmware.
The following describes how to update the BMC firmware by using the HPM firmware update method. For
BP firmware update and PSU firmware update, follow the steps indicated by the upgrade wizard.
Notes:
• System firmware update includes UEFI, LXPM, and BMC firmware update.
• HPM firmware update indicates BMC firmware update using an image in .hpm format.
Note: While creating an HPM image with multiple components, BOOT and APP components
should be placed at the end of the configuration file.
Step 2. Click Start firmware update to load the firmware update information.
Note: All configuration items will be preserved by default during the restore configuration
operation.
Step 3. Click Proceed to update the firmware for all of the components.
Note: After entering the update mode, the widgets, other Web pages and services will not work. All
the open widgets will be automatically closed. If the upgrade is cancelled in the middle of the
wizard, the device will be reset.
Step 4. The firmware update undergoes the below steps:
Notes:
• You will not be able to perform any other tasks until firmware upgrade is completed and the
device is rebooted. You can now follow the instructions presented in the subsequent pages to
successfully update the system firmware. The device will be reset if update is canceled. The
device will also be reset upon successful completion of firmware update.
• In case of a BMC downgrade, a message may be displayed to indicate that no user settings will
be retained, depending on the target version for the downgrade.
Warning:
• After entering the restore factory widgets, other Web pages and services will not work. All open widgets
will be closed automatically. The device will reset and reboot within few minutes.
• Restoring to factory defaults will not preserve any existing configuration data. Exercise caution when
performing this operation.
Procedure
Step 1. Click Sign out from the menu bar.
A dialog box is displayed, asking you to confirm whether to log out from TSM.
YAFUFlash
Yet Another Firmware Upgrade Flash (YAFUFlash, 64 bit) is a tool used for flashing the BMC in both Linux
and Windows environments. There are two types of mediums used to flash the BMC:
• Network (out of band mode)
• USB (inband mode)
Run the following commands while launching the JViewer standalone application from the command prompt
or terminal of a client system:
Figure 9. Launching JViewer standalone application from the Windows command prompt
Notes: It is not mandatory to specify any of these arguments while launching the application from
the command prompt or terminal.
If launched from the command line with all the valid arguments mentioned above, it will be directly
launched using specified mode.
If any duplicate arguments are detected, a popup will be shown to the user regarding the
parameter repeated and the application will be terminated.
Under a manage video application, the OK button will be disabled until the user selects a file from
the table (if any).
If valid values for options -launch, and -localization or -lang are provided, the respective option will
be selected in combo box and it is disabled to avoid further modification. Else it will not be disabled
and left to user’s choice.
Either -localization or -lang parameter is supported. If both are mentioned together, then it will be
treated as duplicate parameters.
In case of PlayVideo and SaveVideo options in Manage Video App, their respective radio buttons
will be selected and other options will be disabled to prevent changes. Otherwise, the options will
not be disabled and left to user’s desire.
Step 5. To launch the application as Virtual Media App, select the Virtual Media App option from the
Application Type drop-down box, and click Launch.
Step 6. Else select the Manage Video option from the Application Type drop-down box and click Launch
to view the recorded video files as shown below.
Step 7. After selecting the required file from the lists as shown above, you can select the Play Video option
or Download Video option and click OK to play or download the recorded videos.
Windows server 2016 Ubuntu Desktop 16.04 Firefox (on Ubuntu, Windows,
Fedora)
Windows server 2012 R2 Ubuntu Desktop 14.04 Chrome (on Windows, Ubuntu,
Fedora, MAC)
• Media CD/DVD performance is getting worse if the test image includes redfish relative processes.
• On Pilot IV w/ SLES 12.1 and RHEL 7.3, some performance issues might happen if a valid Pilot- IV video
driver is not installed. Ensure that kernel update has been executed before running these combinations.
• Users are advised to use Linux version of OS except SUSE 11.4 with BMC to avoid mouse sync issues in
absolute mouse mode.
All browsers:
• To use secure H5Viewer sessions, adding an SSL certificate to the browser is mandatory.
• H5Viewer video record length (client-side video recording length set by a user) will differ from the
downloaded video file duration. The recorded video duration depends on the browser, and the amount of
host video update.
• Keyboard LED sync will not work when the host is the Linux text console.
• Clearing H5Viewer sessions will take some time when a user abruptly closes the H5Viewer window.
IE:
• To use IPv6 H5Viewer sessions in the IE browser, IPv6 addresses should be mentioned in literal format.
• When using the Japanese language, a user can change the language input method only using the mouse.
The keyboard input method switching will not work.
• If the CD media file choosing dialog is kept open, the background functionality of threads might get
affected.
Firefox:
• Only the Japanese QWERTY input method will work. The Japanese hiragana or katakana input method
will not work.
Safari:
• Keyboard LED sync will not work.
• To use secure H5Viewer sessions, adding an SSL certificate to the browser is mandatory.
Any reference to a Lenovo product, program, or service is not intended to state or imply that only that
Lenovo product, program, or service may be used. Any functionally equivalent product, program, or service
that does not infringe any Lenovo intellectual property right may be used instead. However, it is the user's
responsibility to evaluate and verify the operation of any other product, program, or service.
Lenovo may have patents or pending patent applications covering subject matter described in this
document. The furnishing of this document is not an offer and does not provide a license under any patents
or patent applications. You can send inquiries in writing to the following:
Lenovo (United States), Inc.
8001 Development Drive
Morrisville, NC 27560
U.S.A.
Attention: Lenovo Director of Licensing
LENOVO PROVIDES THIS PUBLICATION “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS
OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF NON-INFRINGEMENT,
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some jurisdictions do not allow
disclaimer of express or implied warranties in certain transactions, therefore, this statement may not apply to
you.
This information could include technical inaccuracies or typographical errors. Changes are periodically made
to the information herein; these changes will be incorporated in new editions of the publication. Lenovo may
make improvements and/or changes in the product(s) and/or the program(s) described in this publication at
any time without notice.
The products described in this document are not intended for use in implantation or other life support
applications where malfunction may result in injury or death to persons. The information contained in this
document does not affect or change Lenovo product specifications or warranties. Nothing in this document
shall operate as an express or implied license or indemnity under the intellectual property rights of Lenovo or
third parties. All information contained in this document was obtained in specific environments and is
presented as an illustration. The result obtained in other operating environments may vary.
Lenovo may use or distribute any of the information you supply in any way it believes appropriate without
incurring any obligation to you.
Any references in this publication to non-Lenovo Web sites are provided for convenience only and do not in
any manner serve as an endorsement of those Web sites. The materials at those Web sites are not part of the
materials for this Lenovo product, and use of those Web sites is at your own risk.
Any performance data contained herein was determined in a controlled environment. Therefore, the result
obtained in other operating environments may vary significantly. Some measurements may have been made
on development-level systems and there is no guarantee that these measurements will be the same on
generally available systems. Furthermore, some measurements may have been estimated through
extrapolation. Actual results may vary. Users of this document should verify the applicable data for their
specific environment.
Intel is a trademark of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Microsoft, Windows, and Windows Server are trademarks of the Microsoft group of companies.
All other trademarks are the property of their respective owners. © 2020 Lenovo