Server Manual MGT Console User Guide Ami v1.x
Server Manual MGT Console User Guide Ami v1.x
Server Manual MGT Console User Guide Ami v1.x
User's Guide
Rev. 1.0
Copyright
© 2021 GIGA-BYTE TECHNOLOGY CO., LTD. All rights reserved.
The trademarks mentioned in this manual are legally registered to their respective owners.
Disclaimer
Information in this manual is protected by copyright laws and is the property of GIGABYTE.
Changes to the specifications and features in this manual may be made by GIGABYTE
without prior notice. No part of this manual may be reproduced, copied, translated, transmitted, or
published in any form or by any means without GIGABYTE's prior written permission.
Documentation Classifications
In order to assist in the use of this product, GIGABYTE provides the following types of documentation:
User Manual: detailed information & steps about the installation, configuration and use this
product (motherboard), covering hardware, BIOS and BMC firmware.
Service Guide: detailed information & steps about the installation, configuration and use of
this product (server barebones), covering hardware & BIOS
Quick Installation Guide: a short guide with visual diagrams that you can reference easily for
installation purposes
Please see the support section of the online product page to check the current availability of these
documents
http://www.gigabyte.com
For GIGABYTE distributors and resellers, additional sales & marketing materials are available from our
reseller portal:
http://reseller.b2b.gigabyte.com
For further information & technical assistance, please contact your GIGABYTE sales representative.
You may also message GIGABYTE server directly by email, Facebook or twitter
Email: [email protected]
Facebook: https://www.facebook.com/gigabyteserver
Twitter: https://twitter.com/GIGABYTEServer
Table of Contents
Chapter 1 Getting Started................................................................................................5
1-1 Software Requirement...................................................................................... 5
1-2 Gigabyte Management Console Network Configuration................................... 6
1-3 Log In Gigabyte Management Console............................................................. 7
1-3-1 Required Browser Settings:.......................................................................................9
1-4 Quick Button and Logged-in User................................................................... 10
1-5 Help................................................................................................................. 11
1-6 Menu Bar......................................................................................................... 11
Chapter 2 Enter Gigabyte Management Console..........................................................13
2-1 Dashboard....................................................................................................... 13
2-2 Sensor............................................................................................................. 14
2-2-1 Sensor Detail...........................................................................................................15
2-3 System Inventory............................................................................................ 17
2-3-1 CPU Inventory.........................................................................................................17
2-3-2 DIMM Inventory.......................................................................................................18
2-3-3 PCI Inventory...........................................................................................................18
2-3-4 HDD Inventory.........................................................................................................19
2-3-5 NIC Inventory...........................................................................................................19
2-3-6 GPU Inventory.........................................................................................................20
2-4 FRU Information.............................................................................................. 22
2-5 Logs & Reports............................................................................................... 24
2-5-1 IPMI Event Log........................................................................................................24
2-5-2 System Log..............................................................................................................26
2-5-3 Audit Log.................................................................................................................27
2-5-4 Video Log................................................................................................................28
2-6 Settings........................................................................................................... 29
2-6-1 Captured BSOD ......................................................................................................29
2-6-2 Date & Time.............................................................................................................30
2-6-3 External User Services............................................................................................31
2-6-4 KVM Mouse Settings...............................................................................................42
2-6-5 Log Settings.............................................................................................................44
2-6-6 Media Redirection Settings......................................................................................47
2-6-7 Network Settings.....................................................................................................54
2-6-8 NVMe MI Management............................................................................................61
2-6-9 PAM Order Settings.................................................................................................63
2-6-10 Platform Event Filter................................................................................................64
2-6-11 Services...................................................................................................................73
-3-
2-6-12 SMTP Settings.........................................................................................................77
2-6-13 SSL Settings............................................................................................................80
2-6-14 System Firewall.......................................................................................................85
2-6-15 User Management...................................................................................................95
2-6-16 Video Recording....................................................................................................100
2-6-17 Fan Policy..............................................................................................................109
2-6-18 Power Consumption.............................................................................................. 111
2-7 Remote Control............................................................................................. 103
2-8 Images Redirection....................................................................................... 109
2-8-1 Remote Media.......................................................................................................110
2-9 Power Control................................................................................................111
2-10 Maintenance Group....................................................................................... 112
2-10-1 Backup Configuration............................................................................................113
2-10-2 Firmware Image Location......................................................................................115
2-10-3 Firmware Update...................................................................................................116
2-10-4 HPM Firmware Update..........................................................................................122
2-10-5 Firmware Information.............................................................................................125
2-10-6 Preserve Configuration..........................................................................................126
2-10-7 Restore Configuration............................................................................................131
2-10-8 Restore Factory Defaults.......................................................................................132
2-10-9 System Administrator.............................................................................................133
2-10-10 Sign Out.................................................................................................................134
-4-
Chapter 1 Getting Started
1-1 Software Requirement
• Client machine with 8GB RAM.
• If the client machine has 4GB RAM, there will be lag in Video/keyboard/mouse
functionality.
•
Supported Browsers
• Chrome latest version.
• IE 11 and above.
• Firefox (with limited support).
Note: It is advisable to use Chrome or IE for H5Viewer, since Firefox has its own
memory limitations
• Username: admin
• Password: Refer to unique MB serial number.
NOTE!
If your motherboard / server version is older than G9 (upgrade version), then use the
following login:
Username:admin
Password: password
This serial number can be found on the serial number sticker located on the motherboard of
every GIGABYTE server motherboard and system. The unique pre-programmed password will
be the last 11 characters of the serial number. For example, for the below serial number, the
password will be “JG4P6400027
Please see the reference guide below / attached for where to find locations of this sticker
according to product / model type.
Products that have been implemented with this change will be indicated as version G9 on the
“Upgrade Version” sticker located on the motherboard / motherboard anti-static packaging /
server chassis / server packaging
User Information
The logged-in user information shows the logged-in user, his/her privilege and the four quick
buttons allowing you to perform the following functions:
Getting Started - 10 -
1-5 Help
Help - The Help icon (?) is Located at the top right of the each page in Web GUI. Click this help
icon to view more detailed field descriptions.
- 11 - Getting Started
This page intentionally left blank
Getting Started - 12 -
Chapter 2 Enter Gigabyte Management Console
2-1 Dashboard
The Dashboard page gives the overall information about the status of a device.
To open the Dashboard page, click Dashboard from the menu bar. It displays the following:
Dashboard
A brief description of the Dashboard page is given below.
BMC Up Time
It indicates the Power On time.
Pending Deassertions
It lists the all pending events incurred by various sensors and occupied/available space in logs
can be viewed. To know about the pending events details, click the More info link. This navigates
to the Event Log page.
Access Logs
A graphical representation of all events incurred by various sensors and occupied/available space
in logs can be viewed, if you click on the More info link, you can view the Audit Log page.
Sensor Monitoring
It lists all the critical sensors on the device. If you click on any list sensor, you can view the
Sensor detail page with the Sensor information and Sensor Events details.
- 13 - Gigabyte Server Management Console
2-2 Sensor
The Sensor Readings page displays all the sensor related information.
To open the Sensor Readings page, click Sensor from the menu. Click on any sensor to show
more information about that particular sensor, including thresholds and a graphical representation
of all associated events.
A sample screenshot of Sensor Readings page is shown below.
In this Sensor Reading page, Live readings for all the available sensors with details like Sensor
Name, Status, Current Reading and Behavior will be appeared, else you can choose the sensor
type that you want to display from the list. Some examples for sensors are Temperature Sensors,
Fan Sensors, Watchdog Sensors and Voltage Sensors etc.
Note: Four DIMM Temp sensors are deployed for monitoring the DIMM temperature on the
system. Users must take notice that the live reading of each DIMM Temp sensor indicates the
temperature of a DIMM group, not the temperature of a specific DIMM.
Note:For Illustrative Purpose, a sample screenshot of Sensor detail page with Change
Thresholds option is shown and explained below.
Note: Widgets are little gadgets, which provide real time information about a particular
sensor. User can track a sensor's behavior over a specific amount of time at specific
intervals.The result will be displayed as a line graph in the widget. The session will not
expire, until the widgets gets a live data of the last widget that is kept opened.
For the selected sensor, this widget gives a dynamic representation of the readings for
The threshold states could be Lower Non-critical - going low, Lower Non-critical - going high,
Lower Critical - going low, Lower Critical - going high, Lower Non-recoverable - going low, Lower
Non-recoverable - going high, Upper Non-critical - going low, Upper Non-critical - going high,
Upper Critical - going low, Upper Critical - going high, Upper Non-recoverable - going low, Upper
Non-recoverable - going high.
A graphical view of these events (Number of Entries vs. Thresholds) can be viewed as shown in
the Sensor Readings page screenshot.
A screenshot displaying the menu items under System Inventory is shown below.
The following fields are displayed here for the selected device:
A screenshot displaying the menu items under Logs & Reports is shown below.
Filter By Date: Filtering can be done by selecting Start Date and End Date.
Note:Date should be in MM/DD/YYYY format.
By default, all log time will be displayed in BMC time zone.
Filter By Type: The category could be either All Events, System Event Records, OEM Event
Records, BIOS Generated Events, SMI Handler Events, System Management Software Events,
System Software - OEM Events, Remote Console software Events, Terminal Mode Remote
Console software Events.
Note:Once the Filter By Date and Filter type are selected, the list of events will
be displayed with the Event ID, Time Stamp, Sensor Type, Sensor Name and
Description.
Event Log Statistics: Displays the statistical graph for the selected date.
Clear Event Logs: To delete all the event logs.
Download Event Logs: To download the event logs.
Procedure
1. From the Filter By Date field, select the time period by Start Date and End Date using
Calendar for the event categories.
2. From the Filter By Type field, select the Type of the event and Sensor name to view the
events for the date. The events will be displayed based on the selected time period.
3. To clear all events from the list, click Clear All Event Logs.
4. To download the event logs, click Download Event Logs.
To view System Log, click the System Log tab to view all system events. Entries can be filtered
based on Filter By Date (Start Date and End Date) and Event Category like Alert, Critical, Error,
Notification, Warning, Debug, Emergency and Information.
To open the Event Log page, click Logs & Reports > Audit Log from the menu bar.
A sample screenshot of Audit Log page is shown below.
To view Audit Log, click the Audit Log tab to view all audit events for this device.
Click on the Video Log entry to view the Video. A sample screenshot of Video Log - Video page is
shown below.
Video will be allowed to play/download only if file size is lesser than 40MB. Browsers
have various memory restrictions, due to this browser cannot store and process data
greater than 40MB (approximately). If file size is greater than 40MB, user will be notified
with a message to use Java player Application.
Note: KVM service should be enabled to display the BSOD screen. KVM Service can be
config¬ured under Settings->Services->KVM.
Note:If the timezone is selected as Manual Offset, the map selection will be disabled.
The Time¬Zone settings will be reflected only after saving the settings.
Note: Secondary NTP server is optional field. If the Primary NTP server is not working
fine, then the Secondary NTP Server will be used.
Procedure
1. In the LDAP/E-Directory Settings page, click General Settings. A sample screenshot of
General LDAP Settings page is given below.
6. Specify the Bind DN that is used during bind operation, which authenticates the client to
the server.
8. Enter the Search Base. The Search base allows the LDAP server to find which part of
the external directory tree to be searched. The search base may be something equivalent
to the organization, group of external directory.
9. Select Attribute of User Login to find the LDAP/E-Directory server which attribute should
be used to identify the user.
10. Select CA Certificate File from the Browse field to identify the certificate of the trusted
CA certs.
11. Select the CA Certificate File to find the client certificate filename.
12. Select Private Key to find the client private key filename.
3. In the Group Name field, enter the name that identifies the role group.
5. In the Group Privilege field, enter the level of privilege (User, Administrator, Operator,
None) to assign to this role group.
6. Select one or both of the required options
• KVM Access
• VMedia Access
7. Click Save to save the new role group and return to the Role Group List.
Active Directory allows you to configure the Active Directory Server Settings. The displayed table
shows any configured Role Groups and the available slots. You can modify, add or delete role
groups from here. Group domain can be the AD domain or a trusted domain. Group Name should
correspond to the name of an actual AD group.
Note: To view the page, you must be at least a User and to modify or add a group, you must be
an Administrator.
General Settings: This option is used to configure Active Directory General Settings. Options
are Enable Active Directory Authentication, Secret User Name, Secret Password, User Domain
name, and up to three Domain Controller Server Addresses.
Role Groups: To add a new role group to the device. Alternatively, double click on a free slot to
add a role group.
2. In the Active Directory Settings page, check or uncheck the Enable Active directory
Authentication check box to enable or disable Active Directory Authentication
respectively.
Note:If you have enabled. Active Directory Authentication, enter the required information
to access the Active Directory server.
3. Specify the Secret user name and password in the Secret User Name and Secret
Password fields respectively.
Note: Secret username/password for AD is not mandatory. When secret username &
password is empty, Authentication fails will be always treated as Invalid Password error.
For Invalid Password error PAM will not try other Authentication Methods. So it is
recommended to keep AD in the last location in PAM order.
User Name is a string of 1 to 64 alpha-numeric characters.
It must start with an alphabetical character.
It is case-sensitive.
Special characters like comma, period, colon, semicolon, slash, backslash, square
brackets,
Blank space is not allowed, angle brackets, pipe, equal, plus, asterisk, question mark,
4. Specify the Domain Name for the user in the User Domain Name field. E.g. MyDomain.
com
5. Configure IP addresses in Domain Controller Server Address1, Domain Controller
Server Address2 and Domain Controller Server Address3
Note: IP address of Active Directory server: At least one Domain Controller Server
Address must be configured. IP Address made of 4 numbers separated by dots as in
“xxx.xxx.xxx.xxx”.
Each number ranges from 0 to 255.
First number must not be 0.
Domain Controller Server Addresses will supports IPv4 Address format and IPv6
Address format.
6. Click Save to save the entered settings and return to Active Directory Settings page.
Role Groups
To open Role Group page, click Settings > External User Settings > Active Directory > Role
Groups from the menu bar. A sample screenshot of Role Groups page is shown below.
2. In the Group Name field, enter the name that identifies the role group in the Active
Directory.
Note: Role Group Name is a string of 64 alpha-numeric characters.
Special symbols hyphen and underscore are allowed.
3. In the Group Domain field, enter the domain where the role group is located.
Note: Domain Name is a string of 255 alpha-numeric characters. - Special symbols
hyphen, underscore and dot are allowed.
4. In the Group Privilege field, enter the level of privilege to assign to this role group.
Gigabyte Server Management Console - 39 -
5. Select the required options
• KVM Access
• VMedia Access
6. Click Save to add the new role group and return to the Role Group List.
To Delete a Role Group
1. In the Role Groups Page, select the row that you wish to delete
2. Click Delete Role Group.
RADIUS Settings
RADIUS is a modular, high performance and feature-rich RADIUS suite including server, clients,
development libraries and numerous additional RADIUS related utilities.
In Web GUI, this page is used to set the RADIUS Authentication.
To open RADIUS Settings page, click Settings > External User Settings > RADIUS Settings
from the menu bar. A sample screenshot of RADIUS Settings page is shown below.
Procedure
1. Enable the RADIUS Authentication check box to authenticate the RADIUS.
2. Click Advanced RADIUS Settings. This opens the Radius Authorization window as
shown below.
Note: For Authorization Purpose, configure the Radius user with Vendor Specific
Attribute in Server side.
Example: 1
testadmin Auth-Type: =PAP, Cleartext-Password:=”admin”
Auth-Type: =PAP, Vendor-Specific= ”H=4 ”
Example: 2
test operator Auth-Type: = PAP, Cleartext-Password:= “operator”
Auth-Type: =PAP, Vendor-Specific= ”H=3 ”
If you change the Vendor-Specific value in server then you should change the same
values in this page.
3. Click Save to save the changes made.
Procedure
1. Choose either of the following as your requirement:
• Set mode to Absolute
Note: Applicable for all Windows versions, versions above RHEL6, and versions above
FC14
• Set mode to Relative
Note: Applicable for all Linux versions, versions less than RHEL6, and versions less
than FC14
• Mode to Other Mode
This page is used to configure the log policy for the event log. The fields are as follows.
Enable System Log: This field is to enable or disable the System Logs.
Location: Specifies the Location for system logs, whether it should be preserved in a Local Log
or on a Remote Log.
Note: Local file resides at /var/log/
File Size: This field is to specify the size of the file in bytes if the selected log type is local.
Note: Size ranges from 3 to 65535. Log files are rotated when they grow bigger than
size bytes mentioned, with regards for the last rotation time interval (1 minute).
Remote Log Server: This field is to specify the Remote server address to log the system events.
Note: Server address will support the following:
IPv4 address format.
FQDN (Fully qualified domain name) format.
Remote Server Port: This field is to specify the Remote Server port address to log the system
events.
Note: Remote Log Server and Remote Server Port options will be available only when
Remote Log is enabled.
Gigabyte Server Management Console - 45 -
Enable Audit Log: To enable or disable the audit log.
Save: To save the current changes.
Procedure
1. In the System Log field, enable or disable the option.
2. Select the Log type: Local Log or Remote Log.
3. If Local log is selected, enter the file size in the File Size field and rotate count in the
Rotate Count field.
Note: If Remote log is selected, the fields file size and rotate count need not be
mentioned.
4. If remote log is selected specify the Server Address of the remote server, where the
system events are logged.
5. In the Audit Log field, check or uncheck the Enable option as desired.
6. Click Save to save the changes.
1. MODLOAD imudp
2. UDPSERVER 514
General Settings
This option is used to configure General Media Settings.
To open General Media Settings section, click Settings > Media Redirection Settings > General
Settings.
Remote Media Support: To enable or disable Remote Media support, check/uncheck the ‘Enable’
check box.
If it is selected, then the following Remote Media types will be displayed.
• Mount CD/DVD
• Mount Harddisk
On selecting the individual media types, its respective configurations will be displayed. You can
configure different settings for different Remote Media types. A sample screenshot of General
Settings page is shown below.
Procedure
1. Select the number of Floppy devices, CD/DVD devices, Harddisk devices and Remote
KVM Floppy, CD/DVD and Hard disk Devices from the respective drop-down list.
Note: Maximum of four devices can be added in Floppy, CD/DVD and Harddisk drives.
Remote Session
In BMC Web, this page is used to configure Remote Session configuration settings. “KVM Single
Port Application” is enabled by default. On disabling, “KVM Single Port Application”, “Encrypt
H5Viewer KVM packets” will be enabled by default. On enabling “KVM Single Port Application”,
“Encrypt H5Viewer KVM packets” will be disabled if it is enabled already.
To open Remote Session page, click Settings > Media Redirection Settings > Remote
Session from the menu bar.
A sample screenshot of Remote Session page is shown below.
Note: If “Allow Non-Secure communication for KVM/Media” in the PRJ option is enabled,
then KVM/Media can use non-secure communication. i.e. The KVM or Media Encryption
will be able to disable.
If KVM Encryption is disabled, the KVM session will use the Non-Secure port which has
been configured in Settings -> Services Page.
Keyboard Language: This option is used to select the keyboard supported languages.
Retry Count: This option is used to retry the redirection session for certain number of attempts.
Retry Time Interval(Seconds): This option is used to give time interval for each attempts.
Server Monitor OFF Feature Status: To enable/disable Server Monitor OFF. If this option is
enabled, you can Lock or Unlock the Local host monitor from the remote KVM window. If this
option is disabled, you cannot Lock or Unlock the Local host monitor from the remote KVM
window.
Automatically OFF Server Monitor, When KVM Launches: To enable/disable Automatically
OFF Server Monitor, When KVM Launches.
Save: To save the current changes.
Note: It will automatically close the existing remote redirection either KVM or Virtual
media sessions on Single Port enable/Disable.
Note: Installation of Operating System on the servers via BMC CD ISO image over
remote KVM may take 1 to 2 hours.
Procedure
1. Check or uncheck the KVM Single Port Application option to enable Single Port
Application support in BMC.
2. Choose the Keyboard Language from the list of keyboard supported languages.
3. Enter a value in the Retry Count field to set the number of attempts for retrying the
redirection session.
4. Enter a value in the Retry Time Interval (Seconds) field to give time interval for each
attempts.
5. Check the Server Monitor OFF Feature Status check box to enable Local Monitor ON/
- 52 - Gigabyte Server Management Console
OFF command during runtime.
6. Check the Automatically OFF Server Monitor, When KVM Launches check box to
automatically Lock the local monitor during H5Viewer launch.
7. Click Save to save the current changes.
Active Redirections
This page displays a list of Media which are being redirected currently. It shows current status
and other basic information about the Media.
Note: Local/Remote Media connection will use loopback socket for communication. So
‘~’ symbol will be displayed for loopback ip(127.0.0.1 (or) ::1 ) in media session information
page.
Procedure
1. Check Enable LAN to enable LAN support for the selected interface.
2. Select the LAN Interface to be configured.
3. Check Enable IPv4 to enable IPv4 support for the selected interface.
4. Check Enable IPv4 DHCP to dynamically configure IPv4 address using DHCP.
5. If the field is disabled, enter the IPv4 Address, IPv4 Subnet Mask and IPv4 Default
Gateway in the respective fields.
6. In IPv6 Configuration, if you wish to enable the IPv6 settings, check Enable IPv6.
7. If the IPv6 setting is enabled, enable or disable the option Enable IPv6 DHCP.
8. If the field is disabled, enter the IPv6 Address, Subnet Prefix length and IPv6 Index in
the given field.
9. In VLAN Configuration, if you wish to enable the VLAN settings, check Enable LAN.
10. Enter the VLAN ID in the specified field.
11. 11. Enter the VLAN Priority in the specified field.
12. Click Save to save the entries.
Registration Method
Options to register the BMC are through NS Update or DHCP Client FQDN or Hostname.
TSIG Configuration
Both: Check this option to modify TSIG authentication for both interfaces.
Eth 0&1:
• TSIG Authentication Enabled: Check this box to enable TSIG authentication while
registering DNS via nsupdate. Separate TSIG files can be uploaded for each LAN
interface.
• Current TSIG Private File: The information of Current TSIG private file along with
its uploaded date/time will be displayed (readonly).
• New TSIG Private File: Browse and navigate to the TSIG private file.
Note: TSIG file should be of private type.
Domain Setting: Select whether the domain interface will be configured manually or
automatically.
• Automatic - If you Select Automatic, the Domain Name cannot be configured as it
will be done automatically. The field will be disabled.
• Manual - If the Domain setting is chosen as Manual, then specify the domain name
of the device.
Note: If you select “Automatic” it displays the Domain Interface option. If
you select “Manual” it displays “Domain name”.
Procedure
1. In Domain Name Service Configuration, Enable DNS Service.
• Check the option DNS Enabled to enable all the DNS Service Configurations.
2. Choose the Host Name Setting either Automatic or Manual.
Note: If you choose Automatic, you need not enter the Host Name and if you choose
Manual, you need to enter the Host Name.
3. Enter the Host Name in the given field if you have chosen Manual Configuration.
4. Under Register BMC, choose the BMC’s network port to register with DNS settings.
Check Register BMC option to register with DNS settings.
• Nsupdate - Choose Nsupdate option to register with DNS server using nsupdate
application.
• DHCP Client FQDN - Choose DHCP Client FQDN option to register with DNS
Server using DHCP option 81.
• Hostname - Choose Hostname option to register with DNS server using DHCP
option 12.
Note: Hostname option should be selected, if the DHCP client FQDN option is not
supported by DHCP server.
5. Check Both option to modify TSIG authentication for both interfaces (eth0&1).
6. In Eth 0&1 TSIG Configuration, Check TSIG Authentication Enabled option to enable/
disable TSIG authentication while registering DNS via nsupdate.
• The current file name will be displayed in Current TSIG Private file info field.
• To view a new one, click New TSIG private file to browse and navigate to the TSIG
private file.
7. In the Domain Settings,
• Select the domain settings (Automatic or Manual).
• Enter the Domain Name in the given field if the option “Manual” is being selected in
domain settings field.
- 59 - Gigabyte Server Management Console
8. In Domain Name Server Setting,
• Select the DNS Name Server Setting.
• Choose the IP Priority, either IPv4 or IPv6.
• Enter the DNS Server address.
9. In DNS Server1, DNS Server2 and DNS Server3, enter the server addresses to be
configured for the BMC.
10. Click Save to save the entries.
In selecting any particular NVMe SSD, the corresponding NVMe SSD Subsystem Information,
Port Information, Subsystem Health Status Poll and Set Health Status Change will be displayed.
Click on 'Clear All' button to clear all Composite Controller Status Flags at a time under
'Subsystem Health Status Poll' information tab.
Click on 'Clear' button to clear individual Composite Controller Status Flags under 'Set Health
Status Change' information tab.
On selecting any particular NVMe SSD, the corresponding SSD's Product Information will be
displayed. It displays detailed information like IPMI Version, Product Name, Part Model, Product
Version etc.. of the NVMe SSD. On Click of 'Multi Record Informaion' tab NVMe MultiRecord and
NVMe PCIe Port MultiRecord will be displayed.
The fields of Setttings > PAM Ordering page are explained below.
PAM Module: It shows the list of available PAM modules supported in BMC.
Note: It is recommended to not to keep same username for different PAM modules.
If Authentication fails, the reason of fail could be invalid User or Invalid Password.
If Radius Authentication fails, we can't differentiate whether it is invalid user or invalid
password. So it is always treated as Invalid username error and PAM will try other
Authentication Methods.
If AD contains secret username & password as empty, Authentication fails will be always
treated as Invalid Password error. For Invalid Password error PAM will not try other
Authentication Methods. So it is recommended to keep AD in the last location in PAM
order.
Procedure
1. Select the required PAM module and click and drag the required PAM module. It can be
moved UP or DOWN to change its arrangement order.
2. Click Save to save any changes made.
Note: Whenever the configuration is modified, the web server will be restarted
automatically. Logged-in session will be logged out.
Procedure
1. Click the Event Filters section to configure the event filters in the available slots.
2. To Add an Event Filter entry, select a free section to open the Event Filter entry page. A
sample screenshot of Event Filter Configuration page is shown below.
• In the Event Generator section, choose the event generator as Slave Address - if
event was generated from IPMB. Otherwise as System Software ID - if event was
generated from system software.
• In the Slave Address/Software ID field, specify corresponding I2C Slave Address
or System Software ID.
• Choose the particular Channel Number that event message was received over.
Or choose ‘0’ if the event message was received via the system interface, primary
IPMB, or internally generated by the BMC.
• Choose the corresponding IPMB Device LUN if event generated by IPMB.
• Select the Sensor Type of sensor that will trigger the event filter action.
• In the SensorName field, choose the particular sensor from the sensor list.
• Choose Event Option to be either All Events or Sensor Specific Events.
• In the Sensor Events field, choose the type of event levels.
• Event Trigger field is used to give Event/Reading type value.
Note: Value ranges from 1 to 255.
• Event Data 1 AND Mask field is used to indicate wildcarded or compared bits.
Note: Value ranges from 1 to 255.
• Event Data 1 Compare 1 & Event Data 1 Compare 2 fields are used to indicate
whether each bit position’s comparison is an exact comparison or not.
Note: Value ranges from 1 to 255.
• Event Data 2 AND Mask field is similar to Event Data 1 AND Mask.
• Event Data 2 Compare 1 & Event Data 2 Compare 2 fields are similar to Event
Data 1 Compare 1 and Event Data 1 Compare 2 respectively.
• Event Data 3 AND Mask field is similar to Event Data 1 AND Mask.
• Event Data 3 Compare 1 & Event Data 3 Compare 2 fields are similar to Event
Data 1 Compare 1 and Event Data 1 Compare 2 respectively.
3. Click Save to save the changes and return to event filter list.
4. Click Delete to delete the existing filter.
The fields of Platform Event Filter - Alert Policies section are explained below.
Policy Group Number: Displays the Policy number of the configuration.
Enable this alert: To enable or disable the policy settings.
Policy Action: To choose any one of the Policy set values (0-5) from the list.
0 - Always send alert to this destination.
1 - If alert to previous destination was successful, do not send alert to this destination. Proceed to
next entry in this policy set.
2 - If alert to previous destination was successful, do not send alert to this destination. Do not
process any more entries in this policy set.
3 - If alert to previous destination was successful, do not send alert to this destination. Proceed to
next entry in this policy set that is to a different channel.
4 - If alert to previous destination was successful, do not send alert to this destination. Proceed to
next entry in this policy set that is to a different destination type.
LAN Channel: To choose a particular channel from the available channel list.
Destination Selector: To choose a particular destination from the configured destination list.
Note:LAN Destination has to be configured - under Settings->Platform Event Filters
>LAN Destinations.
Procedure
1. In the Alert Policies Section, select the slot for which you have to configure the Alert
policy. That is, In the Alert Policies page, if you have chosen Alert Policy Group Number
as 4, you have to configure the 4th slot (the slot with Policy Number 4) in the Alert Policy
Tab.
- 68 - Gigabyte Server Management Console
2. Select the slot and click on the empty slot to open the Alert Policies page as shown in
the screenshot below.
8. Enable Event Specific Alert String, if the Alert policy entry is Event Specific.
9. In the Alert String Key field, choose any one value that is used to look up the Alert
String to send for this Alert Policy entry.
Note: Using Web UI, Alert strings cannot be configured but option for Event Specific
alert strings can be enabled/disabled. There is an option to select only the alert string
keys, but alert strings has to be configured using IPMI Command (Set PEF Config
Parameter 'Alert String").
10. Click Save to save the new alert policy and return to Alert Policy list.
11. Click Delete to delete a configuration.
The fields of Platform Event Filters - LAN Destinations are explained below.
Select any empty slot to configure LAN Destinations.
BMC User Name: If Destination type is Email Alert, then choose the user to whom the email
alert has to be sent. Email address for the user has to be configured under Settings-->User
Management.
Email Subject & Email Message: These fields must be configured if email alert is chosen as
destination type. An email will be sent to the configured email address of the user in case of
any severity events with a subject specified in subject field and will contain the message field’s
content as the email body. These fields are not applicable for ‘AMI- Format’ email users.
Note: User should be configured under Settings-->User Management
Save: To add a new entry to the device. Alternatively, double click on a free slot.
Delete: To delete the selected configured LAN Destination.
Procedure
1. In the LAN Destinations section, choose the number of slots to be configured. This
should be the same number of slot that you have selected in the Alert Policies -
Destination Selector field. That is if you have chosen the Destination Selector as 4 in the
Alert Policies page of Alert Policies tab, then you have to configure the 4th slot of LAN
Destination page.
2. Select the slot and click on the empty slot. This opens the LAN Destination entry.
To open Services page, click Settings > Services from the menu bar. A sample screenshot of
Services page is shown below.
Secure Port: Used to configure secure port number for the service.
• Web default port is 443
Both KVM
O n l y K V M Only Media
Single port Single port and Media
encryption encryption
enabled disabled encryption
enabled enabled
enabled
Adviser 7578 (LP) 7578 (LP) 7578(LP) 7578(LP)
7578 (LP)
(video server) 7578 (EO) 7578 (EO) 7578 (EO) 7582 (EO)
5120 (LP) 5120 (LP) 5120 (LP) 5120 (LP)
Cdserver 5120 (LP)
5120 (EO) 5120 (EO) 5124 (EO) 5124 (EO)
5122 (LP) 5122 (LP) 5122 (LP) 5122 (LP)
Fdserver 5122 (LP)
5122 (EO) 5122 (EO) 5126 (EO) 5126 (EO)
5123 (LP) 5123 (LP) 5123 (LP) 5123 (LP)
Hdserver 5123 (LP)
5123 (EO) 5123 (EO) 5127 (EO) 5127 (EO)
Timeout: Displays the session timeout value of the service. For web, SSH and telnet service,
user can configure the session timeout value.
Note: Web timeout value ranges from 300 to 1800 seconds.
KVM timeout value ranges from 300 to 1800 seconds.
SSH and Telnet timeout value ranges from 60 to 1800 seconds.
SSH and Telnet timeout value ranges from 60 to 1800 seconds.
SSH and telnet service will be using the same timeout value. If you configure SSH
timeout value, it will be applied to telnet service also and vice versa.
Maximum Sessions: Displays the maximum number of allowed sessions for the service.
Active Sessions: To view the current active sessions for the service.
3. Select a slot and click Terminate icon ( ) to terminate the particular session of the service.
To modify the existing services:
4. Select a slot and click Edit icon ( ) to modify the configuration of the service.
Note: Whenever the configuration is modified, the service will be restarted automatically.
User has to close the existing opened session for the service if needed.
2. This opens the Service Configuration screen as shown in the screenshot below.
5. Choose any one of the available interfaces from the Interface Name drop-down list.
6. Enter the Nonsecure port number in the Non-secure Port field.
7. Enter the Secure Port Number in the Secure Port field.
8. Enter the timeout value in the Timeout field.
Note: The values in the Maximum Sessions field cannot be modified.
9. Click Save to save all changes you have made, else click Cancel to exit.
If the SMTP server does not support any one of the above authentication types, the user will get
an error message stating “Authentication type is not supported by SMTP Server.”
Primary SMTP STARTTLS Enable: To enable STARTTLS support for the SMTP Client.
• Upload SMTP CA Certificate File: File that contains the certificate of the trusted
CA certs. CACERT key file should be of pem type,LOGIN
• Upload SMTP Certificate File: Client certificate filename. CERT key file should be
of pem type.
• Upload SMTP Private Key: Client private key filename. SMTP key file should be of
pem type.
Note: To enable STARTTLS support, the respective SMTP support option should be
enabled.
Secondary SMTP Support: It lists the Secondary SMTP Server configuration. It is an optional
field. If the Primary SMTP server is not working fine, then it uses Secondary SMTP Server
configuration.
Note: Options of Secondary SMTP Support are same as Primary SMTP Support.
5. Enter IP address of the SMTP Server in the Primary Server IP field. It is a mandatory
field.
6. Enter the Primary SMTP Port in the specified field.
7. Enter the Primary Secure SMTP Port in the specified field.
8. Enable the check box Primary SMTP Authentication if you want to authenticate SMTP
Server.
9. Enter your Primary User name and Primary Password in the respective fields.
10. Enable the check box Primary SMTP SSLTLS Enable to send data through secure Port.
Note: If this option is selected, STARTTLS option and Normal Port will be hidden.
11. Check the Secondary SMTP Support option to enable Secondary SMTP support for the
BMC.
12. Enter the Secondary Server Name, Secondary Server IP, Secondary SMTP Port and
Secure Port values in the respective fields.
13. Enable the check box SMTP Server Authentication if you want to authenticate SMTP
Server.
14. Enter your Secondary User name and Password in the respective fields.
15. Enable the check box Secondary SMTP SSLTLS to send data through secure Port.
Note: If this option is selected, STARTTLS option and Normal Port will be hidden.
• Upload SSL Certificate option is used to upload the certificate and private key file
into the BMC.
• Generate SSL Certificate option is used to generate the SSL certificate based on
configuration details.
• View SSL Certificate option is used to view the uploaded SSL certificate in
readable format.
The fields of SSL Settings - Generate SSL Certificate are explained below.
Common Name(CN): Common name for which certificate is to be generated.
• Maximum length of 64 characters.
• It is a string of alpha-numeric characters.
• Special characters ‘#’ and ‘$’ are not allowed.
Organization(O): Organization name for which the certificate is to be generated.
• Maximum length of 64 characters.
• It is a string of alpha-numeric characters.
• Special characters ‘#’ and ‘$’ are not allowed.
Organization Unit(OU): Over all organization section unit name for which certificate is to be
generated.
• Maximum length of 64 characters.
• It is a string of alpha-numeric characters.
• Special characters ‘#’ and ‘$’ are not allowed.
Basic Information: This section displays the basic information about the uploaded SSL
certificate. It displays the following fields:
• Version Serial Number
• Signature Algorithm
• Public Key
• Issuer Common Name(CN)
• Issuer Organization(O)
• Issuer Organization Unit(OU)
• Issuer City or Locality(L)
• Issuer State or Province(ST)
• Issuer Country(C)
• Issuer E-mail Address
• Valid From
• Valid Till
The Existing Firewall Settings page allows you to remove any particular Existing Firewall
Settings.
• Block All: The blocked incoming IP’s and Port’s can be viewed.
• Flush All: To flush all the system firewall rules (Read-Only).
• Select Timeout to enable or disable firewall rules with timeout.
• Time Out :The respective firewall rule effect Start Time, End Date, Start Time, End Time will
be displayed.
• Delete: To Delete the system firewall rules.
1. Select Block All to block all the incoming IP’s and Port’s.
2. Select Flush All to flush all the system firewall rules.
3. Select Timeout to enable or disable firewall rules with timeout.
4. Enter Start Time to start the respective firewall rule effect from this time.
5. Enter End Time to end the respective firewall rule effect from this time.
Note: The time should be in the dd-mm-yy:hh-mm format.
6. Click Save to save the changes made else click Cancel to go back to the previous
screen.
The Existing IP Rules page allows you to remove any particular Existing IP Rules.
Procedures
1. Select the Existing IP Rules you want to remove.
2. Click on Delete to remove the selected Existing IP Rules.
Procedures
1. Click Settings > System Firewall > IP Address Firewall Rules > Add New IP Rule to
add a new IP or range of IP address.
The Existing Port Rules page allows you to remove any particular Existing Port Rules.
The fields of System Firewall - Existing Port Rules page are explained below.
Port Single (or) Range Start - To configure the Port or Range of Port Addresses.
Port Range End - To configure the Port or Range of Port Addresses.
Protocol - This field specifies the protocols for the configured Port or Port Ranges.
Network Type - This field specifies the affected network type for the particular Port or Port
Ranges.
Enable Timeout - To enable or disable firewall rules with timeout.
Start Date - The respective firewall rule effect will start from this time.
Start Time - The respective firewall rule will start from this time.
End Date - The respective firewall rule effect will end on this date.
End Time - The respective firewall rule will end at this time.
Rule - To indicate Allow or Block status.
Delete - To delete the entry to the firewall rules list.
2. In the Add new rule for Port window, enter the port number or a range of port numbers
in the Port Single (or) Range Start field.
3. Enter the end value in the Port Range End field.
4. Select the Protocol to be either TCP or UDP or Bot.
5. Select the Network Type. It may be IPv4 or IPv6 or Both.
6. Select Timeout to enable or disable firewall rules with timeout.
7. Enter Start Time to start the respective firewall rule effect from this time.
8. Enter Start Date to start the respective firewall rule effect from this date.
9. Enter End Date to end the respective firewall rule effect on this date.
10. Enter End Time to end the respective firewall rule effect at this time.
Note: The time should be in the YYYY/MM/DD:hh-mm format.
Click user icon ( ) and select any free slot to add a new user from the User Management main
page.
Note: The Free slots are shown as “Disabled” in all columns for the slot.
The fields of User Management page are explained below.
05 ENQ (enquiry)
06 ACK (acknowledge)
08 BS ‘\b’ (backspace)
0E SO (shift out)
0F SI (shift in)
18 CAN (cancel)
19 EM (end of medium)
19 EM (end of medium)
1A SUB (substitute)
1B ESC (escape)
1C FS (file separator)
1D GS (group separator)
1E RS (record separator)
1F US (unit separator)
20 SPACE
7F DEL
10. Choose the SNMP Access level option for user from the SNMP Access level (SHA or
MD5) drop-down list. Either it can be Read Only or Read Write.
11. Choose the SNMP Authentication Protocol (SHA or MD5) to use for SNMP settings
from the drop down list.
Note: Password field is mandatory, if Authentication protocol is changed.
12. Choose the Encryption algorithm to use for SNMP settings from the SNMP Privacy
protocol (AES or DES) drop-down list.
13. In the Email ID field, enter the email ID of the user. If the user forgets the password, the
new password will be mailed to the configured email address.
Note: SMTP Server must be configured to send emails.
Email Format: Two types of formats are available:
• AMI-Format: The subject of this mail format is ‘Alert from (your Host name)’. The
mail content shows sensor information, ex: Sensor type and Description.
• Fixed-Subject Format: This format displays the message according to user's
setting. You must set the subject and message for email alert.
14. In the Upload SSH Key field, click Browse and select the SSH key file.
Note: SSH key file should be of pub type.
15. Click Save to save the new user and return to the users list.
Procedure
1. Check the events to be enabled.
2. To set particular Date and Time Event, check the option Date and Time Event.
a) Choose the month, day and year from the Date field
b) Enter/Choose the Time in hh:mm format in the respective fields.
Note: KVM service should be enabled to perform auto-video recording. The date and
time should be in advance to the system date and time.
3. Click Pre-Event Video Recording to edit the Pre-Event video recording configurations.
A sample screenshot of Pre-Event Video Recordings page is shown as below.
a) To set video quality, select ranges (very low, low, high, average and normal) from
Video Quality drop-down list.
b) To set compression mode, select modes (high, normal, low, no) from Compression
Mode drop-down list.
c) To set number of frames per second, select frames/sec (1-4) from Frames Per
Gigabyte Server Management Console - 102 -
Second drop-down list.
d) To set duration of video, select second (10-60) from Video Duration drop-down list.
e) Click Save to save the changes made on the Pre-Event Video Recording.
1. Check Record Video to Remote Server to enable the Remote Video Support.
Note: By default, video files will be stored in local path of BMC. If remote video support
is enabled, then the video files will be stored only in remote path, not within BMC.
Post-Event
Post-Event video recording files will be named as shown below.
video_dump_<Hostname>_%Y%m%dT%H%M%S.dat.
File Count and Duration for Pre and Post Event Recordings are as shown in the below table:
Auto Video Recording (Post Pre-Event Video
Event) Recording(only for Crash/reset
event)
Time Limits 20 seconds or 5.5MB video Default-10sec, but can be
allowed if Local Storage. configurable up to 60sec.
300 seconds recording allowed if
Remote Storage (Remote Path).
Video File Count Local Storage: 2 (After 2, if video 1 if local storage/3 if remote
recording starts, the oldest video storage. (Once Max file count
file among the two files will be reached, will Delete Old video file
replaced with the new video) to store new file.)
Remote Storage: maximum
configured dump value of video
files for Remote Storage.
Procedure
1. Check the events to be enabled to configure which event on the page will trigger the SOL
video recording option to start.
2. To set particular Date and Time Event, check the option Date and Time Event.
a) Choose the month, day and year from the Date field
b) Enter the Time in hh:mm:ss format in the respective fields.
Note: The date and time should be in advance to the system date and time.
JAVA SOL
This page allows you to download JAVA SOL. A sample screenshot of JAVA SOL is given below.
Note: A compatible JRE must be installed in the system prior to the launch of JNLP file.
Supported Browsers
• Chrome latest version.
• IE 11 and above.
• Firefox (with limited support).
Note: It is advisable to use Chrome or IE for H5Viewer, since Firefox has its own
memory limitations.
To open Remote Control page, click Remote Control from the menu bar. A sample screenshot of
the Remote Control page is shown below.
A detailed description of the menu items are given on the next page.
Right Ctrl Key: This menu item can be used to act as the right-side <CTRL> key when in
Console Redirection.
Right Alt Key: This menu item can be used to act as the right-side <ALT> key when in Console
Redirection.
Right Windows Key: This menu item can be used to act as the right-side <WIN> key when in
Console Redirection.
Left Ctrl Key: This menu item can be used to act as the left-side <CTRL> key when in Console
Redirection.
Left Alt Key: This menu item can be used to act as the left-side <ALT> key when in Console
Redirection.
Left Windows Key: This menu item can be used to act as the left-side <WIN> key when in
Console Redirection. You can also decide how the key should be pressed: Hold Down or Press
and Release.
Ctrl+Alt+Del: This menu item can be used to act as if you depressed the <CTRL>, <ALT> and
<DEL> keys down simultaneously on the server that you are redirecting.
Left Windows Key: This menu item can be used to act as the left-side <WIN> key when in
Console Redirection. You can also decide how the key should be pressed: Hold Down or Press
and Release.
Right Windows Key: This menu item can be used to act as the right-side <WIN> key when in
Console Redirection.
Context Menu Key: This menu item can be used to act as the context menu key, when in
Console Redirection.
Print Screen Key: This menu item can be used to act as the print screen key, when in Console
Redirection.
Hot Keys: This menu is used to add the user configurable shortcut keys to invoke in the host
machine. The configured key events are saved in the BMC.
This menu contains the following sub menu items:
• Add Hot Keys - This menu is used to enable macros. Click Add to macros.
Video
This menu contains the following sub menu items:
Pause Video: This option is used for pausing Console Redirection.
Resume Video: This option is used to resume the Console Redirection when the session is
paused.
Refresh Video: This option can be used to update the display shown in the Console Redirection
window.
Host Display
Display on: If you disable this option, the display will be shown on the screen in Console
Redirection
Display off: If you enable this option, the server display will be blank but you can view the screen
in Console Redirection. If you disable this option, the display will be back in the server screen.
Capture Screen: This option helps to take the screenshot of the host screen and save it in the
client’s system.
Mouse
Show Client Cursor: This menu item can be used to show or hide the local mouse cursor on the
remote client system.
Mouse Mode: This option handles mouse emulation from local window to remote screen using
either of the two methods. Only ‘Administrator’ has the right to configure this option.
• Absolute mouse mode: The absolute position of the local mouse is sent to the
server if this option is selected.
• Relative mouse mode: The Relative mode sends the calculated relative mouse
position displacement to the server if this option is selected.
• Other mouse mode: This mouse mode sets the client cursor in the middle of the
client system and will send the deviation to the host. This mouse mode is specific
for SUSE Linux installation.
Note: Client cursor will be hidden always. If you want to enable, use Alt + C to access
the menu.
Options
The Bandwidth Usage option allows you to adjust the bandwidth. You can select one of the
following options:
- 107 - Gigabyte Server Management Console
Block Privilege Request: To enable or disable the access privilege of the user.
Keyboard/Mouse Encryption: This option allows you to encrypt keyboard inputs and mouse
movements sent between the connections.
0 Best Quality - 7: This option allows you to adjust the screen resolution.
Power
The power options are to perform any power cycle operation. Click on the required option to
perform the following operation:
Reset Server: To reboot the system without powering off (warm boot).
Immediate Shutdown: To perform Power OFF Immediately.
Orderly Shutdown: To Power OFF the server in proper order.
Power ON Server: To Power ON the server.
Active Users
Click this option to display the active users and their system ip address.
Active KVM Session can be terminated when there are multiple KVM Session from Master [FULL
Privilege KVM Session].
Help
Click this option to get more information About H5Viewer. The KVM Remote Console utility
version and plugin version will be displayed.
Zoom 100%
Displays the zoom percentage. Users can click Options from the menu bar and then select Zoom
In or Zoom Out to adjust the zoom percentage.
Power ON/OFF
Click this option to Power ON/OFF the server.
Note: More than one image can be configured for each image type. At maximum 4
images can be configurable.
To configure the image, you need to enable Remote Media support under
Settings->Media Redirection - > General Settings.
To start/stop redirection and to delete an image, you must have Administrator Privileges.
Free slots are denoted by “~”
Procedure
1. To Start/Stop Redirection and configure remote media images, click (Start/Stop icon)
and make sure Remote Media Support option is enabled.
Note: The Start Redirection button is active only for VMedia enabled users.
2. Select a configured slot and click (Start/Stop icon) to start the remote media redirection.
It is a toggle button, if the image is successfully redirected, then click (Start/Stop icon) to
stop the remote media redirection.
Note: Redirection needs to be stopped to clear the image.
Procedure
Select an action and click Perform Action to proceed with the selected action.
Note: During Execution you will be asked to confirm your choice. Upon confirmation, you
will be informed about the status after few minutes.
Note: It is advisable to use Chrome or IE for H5Viewer, since Firefox has its own
memory limitations.
Procedure
1. Click Check All to backup the selected configuration items. The Backup Configuration
page will appear as shown above screenshot.
2. Click Download Config to save the backup file to the client system.
3. Cick OK to perform the backup action. The Backup file will be saved in the client system.
4. Click Cancel to cancel the backup process.
6. Even after all this step has been done and still facing error of timeout:
a) Check with /etc/xinetd.d/tftp file and uncomment the EOF (Remove the ‘#’
before the EOF alone).
b) Restart the server.
TFTP Image Name: Full Source path with filename of the firmware image is stored on TFTP
Server.
TFTP Retry Count: Number of times to be retried in case a transfer failure occurs. Retry count
ranges from 0 to 255.
Save: To save the configured settings.
Procedure
1. Select the Image Location Type (Web Upload during flash/ TFTP Server).
2. If the protocol selected is TFTP, enter the IP address of the server in the TFTP Server
Address field.
3. Enter the TFTP Image Name in the given field
4. Enter the TFTP Retry Count value.
5. Click Save to save the changes.
Warning: Please note that after entering update mode widgets, other web pages
and services will not work. All open widgets will be closed automatically. If upgrade
process is cancelled in the middle of the wizard, the device will be reset.
Note: The firmware upgrade process is a crucial operation. Make sure that the chances
of a power or con¬nectivity loss are minimal when performing this operation.
Once you enter into Update Mode and choose to cancel the firmware flash operation,
the BMC must be reset. This means that you must close the Internet browser and log
back onto the BMC before you can perform any other types of operations.
Once Firmware upgrade using web is started, the regular IPMI command will not be
allowed for safety concern if Enable IPMI Command handling during flashing support is
disabled in project configuration.
To configure, choose ‘Firmware Image Location’ under Maintenance. To open Firmware Update
page, click Maintenance > Firmware Update from the menu bar.
This wizard takes you through the process of AMI based firmware upgradation. The protocol
information to be used for firmware image transfer during this update is as follows:
Note: All configuration items will be preserved/overwrite as default during the restore
configuration operation.
Procedure
1. Click Preserve all Configuration to preserve all configuration.
2. Click Browse to select firmware image. The Firmware update undergoes the following
steps:
a) Closing all active client requests
b) Preparing Device for Firmware Upgrade
c) Uploading Firmware Image
Note: A file upload pop-up will be displayed for http/https but in the case of tftp files, the
file is automatically uploaded displaying the status of upload.
d) Browse and select the Firmware image to flash and click Upload.
e) Click Start firmware update start the Firmware Update. A warning message will be
prompted you to proceed further.
f) Click OK to start the Firmware Update. The sample screenshot is shown below
g) Verifying Firmware Image
If flashing is required for all images, please select the following checkbox:
This wizard takes you through the process of AMI based firmware upgradation. The protocol
information to be used for firmware image transfer during this update is as follows:
Note: All configuration items will be preserved/overwrite as default during the restore
configuration operation.
Procedure
1. Click Preserve all Configuration to preserve all configuration.
2. Click Browse to select firmware image. The Firmware update undergoes the following
steps:
Gigabyte Server Management Console - 122 -
a) Closing all active client requests
b) Preparing Device for Firmware Upgrade
c) Uploading Firmware Image
Note: A file upload pop-up will be displayed for http/https but in the case of tftp files, the
file is automatically uploaded displaying the status of upload.
d) Browse and select the Firmware image to flash and click Upload.
e) Click Start firmware update start the Firmware Update. A warning message will be
prompted you to proceed further.
f) Click OK to start the Firmware Update. The sample screenshot is shown below.
If flashing is required for all images, please select the following checkbox:
If only few module versions are different, those modules will be flashed.
- 123 - Gigabyte Server Management Console
Note: Only selected sections of the firmware will be updated. Other sections are
skipped. Before starting flash operation, you are advised to verify the compatibility
between image sections.
Note: The HPM Firmware Update page will be disabled and you will not be able to
perform any other tasks until firmware upgrade is completed and the device is rebooted.
You can now follow the instructions presented in the subsequent pages to successfully
update the card's firmware. The device will reset if update is canceled. The device will
also reset upon successful completion of firmware update.
Files Preserved
SDR
Following files will be preserved:
SDR.dat: This file contains the sensor data record information that is used in IPMI.
Dependency Configurations - NIL
FRU
FRU
Following files will be preserved:
FRU.bin: This file contains the logical field replaceable unit data that are used by IPMI.
Dependency Configurations - SDR
SEL
Following files will be preserved when Delete SEL reclaim space is disabled:
SEL.dat: This file contains the system event logs that are being logged by the IPMI.
Following files will be preserved when Delete SEL reclaim space is enabled:
Selreclaiminfo.ini - The file contains the SEL repository information.
SEL folder - This folder contains the multiple files of event logs.
Dependency Configurations - IPMI
IPMI
The following files are preserved in IPMI configuration:
IPMI.conf: This file contains the IPMI configurations such as SEL rep size, SDR rep size,
interface specific, enable/disable, Primary/Secondary, IPMB Bus number etc.
Dependency Configurations - NIL
Network
To save network settings related with IPMI (LAN IP or DHCP configuration), select “IPMI” and
“Network” options simultaneously. After restore configuration, the Network Configuration will be
preserved successfully. Following files will also be preserved:
dhcp.conf: This file is to configure the host name in the FQDN format.
dns.conf: This file is used to configure the DNS registration method and DNS server for the
particular interface, hostname: This file is used to store the Hostname of the BMC.
hostname.conf: This file is used to configure the host name creation method Manual/Automatic
for the BMC.
Vlaninterfaces: This file helps to enable the vlan interface for the particular LAN interface
vlansetting.conf: This file is to store the vlan ID and Vlan priority for the particular VLAN
interface entry.
bond.conf: This file is to enable the bond interface for the specified LAN interfaces.
Interfaces: This file is to configure the IP/IPV6 addresses for the LAN interface using static/
DHCP method.
activeslave.conf: This file is to configure the active interface for the specified bond interface.
This file depends on bond.conf.
hosts: This file is used to store the host name to map the IP address.
hosts.allow: This file contains the list of hosts that has permission to access the system
hosts.deny: This file contains the list of host that does not allow accessing the system
resolv.conf: This file is used to store the nameserver and domain name for hostname
- 127 - Gigabyte Server Management Console
registration.
dhcp6c-script: This file is used to configure the domain name, DNS server IPv6 address and
NTP address.
dhcp6c.conf: This file is to configure the IPv6 parameters for the DHCPv6 clients.
ncsicfg.conf: This file is to configure the NCSI related configurations.
nsupdate.conf: This file is to configure the channel ID, package ID for the NCSI interface.
phycfg.conf: This file is to configure the link speed, duplex and MTU value for the specified
interface.
dhcp.preip_4: This file is to store the pre IPv4 address. This file will be created at runtime.
dns.conf: This file is used to configure the DNS registration method and DNS server for the
particular interface.
hostname: This file is used to store the Hostname of the BMC.
hostname.conf: This file is used to configure the host name creation method Manual/Automatic
for the BMC.
Vlaninterfaces: This file helps to enable the vlan interface for the particular LAN interface
vlansetting.conf: This file is to store the vlan ID and Vlan priority for the particular VLAN
interface entry.
bond.conf: This file is to enable the bond interface for the specified LAN interfaces.
Interfaces: This file is to configure the IP/IPV6 addresses for the LAN interface using static/
DHCP method.
activeslave.conf: This file is to configure the active interface for the specified bond interface.
This file depends on bond.conf.
hosts: This file is used to store the host name to map the IP address.
hosts.allow: This file contains the list of hosts that has permission to access the system
hosts.deny: This file contains the list of host that does not allow accessing the system
resolv.conf: This file is used to store the nameserver and domain name for hostname
registration.
dhcp6c-script: This file is used to configure the domain name, DNS server IPv6 address and
NTP address.
dhcp6c.conf: This file is to configure the IPv6 parameters for the DHCPv6 clients.
ncsicfg.conf: This file is to configure the NCSI related configurations.
nsupdate.conf: This file is to configure the channel ID, package ID for the NCSI interface.
phycfg.conf: This file is to configure the link speed, duplex and MTU value for the specified
interface.
dhcp.preip_4: This file is to store the pre IPv4 address. This file will be created at runtime.
NTP
Following files will be preserved:
ntp.conf: This file contains the NTP dameon protocol configuration parameters such as
synchronization sources, nodes and other related information
ntp.stat: This file contains the auto or manual network type protocols
adjtime: This file contains the time to synchronize the system clock
Localtime: This file is the system link to the file local time or to the correct time zone in the
system timezone directly.
Dependency Configurations - IPMI
Gigabyte Server Management Console - 128 -
SNMP
Following files will be preserved:
snmp_users.conf: This file contains the SNMP user configurations such as user name and
password encryption mechanism for the specific users.
snmpcfg.conf: This file contains the SNMP users privilege levels such as ro user and rw user.
Dependency Configurations - NIL
SSH
Following files will be preserved:
sshd_config: This file contains the keyword argument pairs of configurations such as Address
family, Accept Env, Allow, users, authorized key files etc.
ssh_host_dsa_key, ssh_host_rsa_key: These files contain the private parts of the host keys.
ssh_host_dsa_key.pub, ssh_host_rsa_key.pub: These files contain the public parts of the host
keys.
Dependency Configurations - NIL
KVM
Following files will be preserved:
vmedia.conf: This file contains the modes of media such as cd,fd,hd and enable and disable
flags for lmedia, rmedia and sd servers.
stunnel.conf: This file contains the information about the stunnel configuration. It will also contain
advisor and media server’s secure port if secure connection is enabled.
usermacro.conf: This file saves the user defined macro from the jviewer.
rmedia.conf: This file contains the image name and the remote machine information like IP
address, user name, password, domain name and share type.
Dependency Configurations - NIL
Authentication
Following files will be preserved:
activedir.conf: This file contains the configurations such as sslenable, timeout, racdomain,
adtype, adfilterdc1, adfilterdc2, adfilterdc3, username, password, and rolegroup information such
as name domain and privileges.
openLdapGroup.conf: This file contains the oprnm ldap role group information such as name
domain and privilege.
nsswitch.conf: This file contains the sources to obtain the name service information in the range
of categories and in what order
pam_withunix: This file contains the PAM Order of modules such as IPMI,LDAP, RADIUS and
UNIX.
pam_wounix: This contains the PAM Order of modules such as IPMI, LDAP and RADIUS.
group: This file contains the Linux group. It stores the group information or defines the user group
information in Linux.
passwd: This file contains the user login information for the Linux system
shadow: This file contains the encrypted password information for the clients.
Syslog
System Event Log
Web
Web Settings
Extlog
Audit Log & System Log
Redish
Redfish Audit Log
Procedure
1. Click Firmware Update or Restore Configuration link to view Firmware Update or
Restore Configuration page accordingly.
2. Select the required Preserve Configuration items by either choosing the items individually
by selecting the appropriate check boxes or by selecting all or none using Check All.
3. Click Save to save the changes.
Procedure
1. Click Preserve Configuration to redirect to Preserve Configuration page, which is used to
preserve the particular configuration not to be overwritten by the default configuration.
2. Click Restore Factory Defaults to restore the factory defaults of the device firmware
Procedure
1. Check Enable User Access to enable user access for system administrator..
2. Enable Change Password option to change the user password. This action enables the
password fields.
3. Enter the new password in the Password field.
4. Re-enter the password in the Confirm Password field.
5. Click Save to save the changes.
Click Sign Out to perform log out from the Web GUI. A Warning message will be prompted you to
proceed further, click OK to log out else Cancel to retain the Web GUI.