Configuring GX7 to deliver SNMP traps

Similar documents
BMC User Guide. May 2018




IPMI View User Guide

FWA-6510 function Setting Introduction

IPMI Configuration Guide

iris-2400 Web GUI iris-2400 Web GUI IEI iman Web-based Graphics User Interface (GUI) User Manual Page i Rev May 8, 2014

Dell OpenManage Baseboard Management Controller. User s Guide. support.dell.com

Management Console User s Guide (AST 2500 Chipset)

Introduction to Intelligent Platform Management Interface (IPMI)

Configuring Platform Event Filters

Configuring Communication Services

Riverbed Technology, Inc. 199 Fremont Street San Francisco, CA Phone Fax

Rack Management Controller. User Manual

The Discovery Wizard now provides the ability to create SNMP Setups that can be selected for individual discoveries. An SNMP Setup specifies:

DCMI Conformance Test Suite (DCTS for Linux) User Guide. Rev

Hardware Events Alerting on Dell Servers IPMI PET Applied

Supermicro Utility (IPMICFG) User s Guide

IPMI Configuration Guide

Configuring Platform Event Filters

USER MANUAL SNMP-RC210 SNMP WEB MANAGEMENT CARD. bxterra.com

Chassis Display Tasks

Configuring ARP attack protection 1

Configuring Platform Event Filters

LAN Interface TCW120B

OmniVista 3.5 Discovery Help

Contents. Table of Contents

NVIDIA DGX-1. DU _v15 May User Guide

Release Notes Schroff Firmware Part Number 99-W D For the 6-Slot Zephyr Chassis Fan Tray

Chapter 3 Managing System Settings

NVIDIA DGX-1. DU _v12 November User Guide

rx2660 Management Processor Setup

Configuring ARP attack protection 1

System Management Module User's Guide

TITLE: Device Server Configuration/Installation Manual

Peplink SD Switch User Manual. Published on October 25th, 2018

GIGABYTE Remote Management Console User s Guide. Version: 1.0

ilo MP Utilities ilo MP

DCMI Data Center Manageability Interface Specification v1.0, Revision 1.0. Addenda, Errata, and Clarifications

AST2500 ibmc Configuration Guide

-Page 1 of 7 -

Contents. Table of Contents

-Page 1 of 21 -

B-SX600 SERIES MPS1 Printserver Manual. Ver

SEI DC-UPS Power Management Package Users Manual

Using the Web Graphical User Interface

TFC-1600MM Media Conversion System. Management Configuring Guide

Habanero BMC Configuration Guide

Nexans Switch Basic Configurator Version 4.14P or later

Microsoft RemoteFX Error Code 43 Identification and Workaround for the PowerEdge C410x

Utilization of Agilent s Remote Management Cards RMC Plus L/LS 1.0 (N2521A-AT1/N2521A-AT3) in Intel s. Performance Appliance Platform.

Cyclone Microsystems PCIe Chassis Monitor User s Manual P/N CM026

BMC v User Manual

McAfee SIEM HA Receivers

Cisco RF Switch Firmware Command Reference Guide

EGW1-IA3-MB User s Manual

CONFIGURING SYSTEM EVENT ALERT NOTIFICATIONS FOR EMC KAZEON RUNNING ON INTEL PLATFORM

1. IPMI OS Drivers and Open Source Software

rx2800i4 Management Processor Setup

HPE ilo IPMI User Guide

Managed Ethernet Switch User s Manual

User s Guide. SNMPWEBCARD Firmware Version Revision 3

High-Performance Computing Clusters with IPMI

User Manual Network Interface

The features and functions of the D-Link Smart Managed Switch can be configured through the web-based management interface.

AXIS T85 PoE+ Network Switch Series. AXIS T8524 PoE+ Network Switch. AXIS T8516 PoE+ Network Switch. User Manual

H3C Firewall Devices. High Availability Configuration Guide (Comware V7) Hangzhou H3C Technologies Co., Ltd.

TrueNAS X-SeriesUnifiedStorageArray Basic Setup Guide. December 2017 Edition

Quick Start Guide for Standalone EAP

OEM FRU TECHNICAL WHITE PAPER

Using the Web Graphical User Interface

ProSAFE 8-Port 10-Gigabit Web Managed Switch Model XS708Ev2 User Manual

ETH002-2 Relays at 16A Technical Documentation

C H A P T E R Commands Cisco SFS Product Family Command Reference OL

Release Notes Schroff Firmware Part Number Intelligent Shelf Alarm Panel (ISAP-II)

HOME AUTOMATION, INC. Model 93A00-1. Serial Server. User s Manual

ProSAFE 8-Port and 16-Port 10-Gigabit Ethernet Web Managed Switch Models XS708Ev2 and XS716E User Manual

Chassis Tasks. Viewing Cards on a Chassis CHAPTER

8-port mk2 user s guide v port mk2

EAP150 EAP150. Long Range Ceiling Mount Access Point PRODUCT OVERVIEW

SNMP Commands CHAPTER

EAP150 EAP150. Long Range Ceiling Mount Access Point PRODUCT OVERVIEW

ThinkServer Management Module User Guide

DrayTek Vigor Technical Specifications. PPPoE, PPTP, DHCP client, static IP, L2TP*, Ipv6. Redundancy. By WAN interfaces traffic volume

System Management Module User's Guide

AST2500 ibmc Configuration Guide

DGS-1510 Series Gigabit Ethernet SmartPro Switch Web UI Reference Guide. Figure 9-1 Port Security Global Settings window

Oct 2007 Version 1.01

Portal configuration commands

EAP150 EAP150. Long Range Ceiling Mount Access Point PRODUCT OVERVIEW

Powered by Accton. ES Port Gigabit Web-Smart Switch. Management Guide.

Section 3 - Configuration. Enable Auto Channel Scan:

User Manual ASMB-BMC. ASMB Server Board BMC Function Application for Single Unit

BiAdmin can be installed by running the setup.exe program in the directory ioprint\utils\biadmin\disk1 on the Chase Research CD-ROM.

NePort Series User Manual

8-Port Gigabit Ethernet Smart Managed Plus Switch with 2-Port 10G/Multi-Gig Uplinks User Manual

Out-of-Band Management

Baseboard Management Controller Messages

DGS-1510 Series Gigabit Ethernet SmartPro Switch Web UI Reference Guide

Transcription:

Configuring GX7 to deliver SNMP traps Introduction This document defines a method for manually configuring the GX7 to provide hardware diagnostic data via SNMP trap notifications for the configured trap receivers. The data is provided by the Baseboard Management Controller (BMC) on the GX7 motherboard. The BMC is managed via the Intelligent Platform Management Interface (IPMI). The system utiltity 'ipmitool' is used to configure the BMC and retrieve available data. The document focuses on enabling a remote trap receiver to receive SNMP notifications when any of the fan sensors that are monitored by the BMC violates a threshold. A number of steps must be completed to enable SNMP notifications to be processed by a remote trap receiver: 1. Configure the BMC 2. Configure the BMC LAN 3. Configure an alert destination 4. Configure the event filtering policy table 5. Configure the event filtering table 6. Validating an SNMP notification is generated A detailed description of these steps is provided by this document. Limitations Any customization applied to BMC configuration may not persist through upgrades to the BMC firmware. In the event that the BMC firmware is upgraded, the customization may need to be reapplied. The GX7 supports the following traps for this procedure: trapovertemperaturewarning (Over Upper Non Critical threshold) trapovertemperaturecritical (Over Upper critical threshold) trapovertemperaturewarningcleared trapovertemperaturecleared trapunderanalogvoltagecritical (Under Lower critical threshold) trapoveranalogvoltagecritical (Over Upper critical threshold) trapunderanalogvoltagecriticalcleared trapoveranalogvoltagecriticalcleared trapfancriticalunderspeed (Under lower critical threshold) trapfancriticalunderspeedcleared trapwatchdogreset (System reset) trapwatchdogpowerdown (System power down) trapwatchdogpowercycle (System power cycle) BMC firmware that shows a BMC LAN MAC address of 00:11:09:5b:7e:42 must be programmed to contain a unique BMC LAN MAC address. Please see the 'Configuring the BMC' section for further details. For all other GX7 systems, the BMC LAN MAC address must not be programmed.

Configuring the BMC A convenient method to configure the BMC LAN is to run the script attached to the technote on to the GX7 system. The script is:./snmp-notification.sh -t static -i 9.55.196.135 -n 255.255.0.0 -g 9.55.196.1 -I 9.55.196.25 -M 00:D0:C9:B7:AC:3E This script configures the following options: Option Setting IP address 9.55.196.135 Netmask 255.255.0.0 Gateway 9.55.196.1 IP address of alert destination 9.55.196.25 MAC address of alert destination 00:D0:C9:B7:AC:3E The script has the following arguments: #./snmp-notification.sh -h snmp-notifications.sh [-h] [-t <srctype>] [-i <sourceip>] [-m <sourcemac>] [-n <netmask>] [-g <default gateway IP>] [-c <channel>] -I <destinationips> -M <destinationmacs> -h Print this usage information. -c <channel number>. Default is 4 -t <static or dhcp>. If static, <sourceip> is required. -i <sourceip> where sourceip has format x.x.x.x -m <sourcemac> where sourcemac has format x:x:x:x:x:x. Only use this option if your BMC MAC adddress is set to 00:11:09:5b:7e:42 -n <netmask> where netmask has format x.x.x.x -g <default gateway IP> where default gateway IP has format x.x.x.x -I <destinationips> A comma separated list of IP addresses where each destinationip has format x.x.x.x -M <destinationmacs> A comma separated list of MAC addresses where each destinationmac has format x:x:x:x:x:x The BMC MAC address must only be programmed if it contains a factory default value 00:11:09:5b:7e:42, otherwise, it must not be programmed. To check your BMC LAN MAC address run the following command: # ipmitool lan print Set in Progress : Set Complete Auth Type Support : NONE MD2 MD5 PASSWORD Auth Type Enable : Callback : NONE MD2 MD5 PASSWORD : User : NONE MD2 MD5 PASSWORD : Operator : NONE MD2 MD5 PASSWORD : Admin : NONE MD2 MD5 PASSWORD : OEM : IP Address Source : Static Address IP Address : 0.0.0.0 Subnet Mask : 255.255.255.0 MAC Address : 00:11:09:5b:7e:42

Please refer to the list of GX7 BMC LAN MAC addresses attached to this technote. The BMC LAN MAC address should be set according to the Chassis Serial number. The Chassis Serial number is determined by running the following command: # ipmitool fru print 0 Chassis Type : Main Server Chassis Chassis Part Number : AdvanTech Chassis Serial : TPA1234567 Board Mfg Date : Fri May 14 15:49:00 2010 Board Mfg : AMI Board Product : AdvanTech Board Serial : 1234567 Board Part Number : AdvanTech-1234567 Product Manufacturer : AdvanTech Product Name : FWA-6500 Product Part Number : AdvanTech Product Version : 2.0 Product Serial : 1234567 Product Asset Tag : 1234567 In the event that your Chassis Serial number is not present in the list, contact IBM support. If you do not want to use the script, the following sections provide detailed descriptions of each BMC configuration stage. Configuring the BMC LAN To enable SNMP traps to be sent the BMC LAN interface must be configured. It is possible to configure the LAN interface statically or via DHCP. The following subset provides enough data to enable the user to understand how to configure their BMC LAN: ipmitool lan help ipmitool lan set help ipmitool lan print ipmitool lan set 4 ipsrc <type> ipmitool lan set 4 ipaddr <x.x.x.x> ipmitool lan set 4 macaddr <x:x:x:x:x:x> Show the available lan commands Show the available commands for configuring the LAN Print the current LAN configuration Set the LAN type to 'static' or 'dhcp' Set the BMC LAN IP address to x.x.x.x Set the BMC LAN mac address The BMC LAN is always channel 4. At a minimum it is necessary to configure the IP channel address and netmask. It is likely that a default gateway IP needs to be set. The user should also ensure that the snmp value is set to public. The other BMC LAN fields are defaulted to suitable value. Here are some examples of configuring the BMC LAN: # ipmitool lan set 4 ipsrc dhcp # ipmitool lan set 4 snmp public Setting LAN SNMP Community String to public # ipmitool lan print Set in Progress : Set Complete

Auth Type Support : NONE MD2 MD5 PASSWORD Auth Type Enable : Callback : NONE MD2 MD5 PASSWORD : User : NONE MD2 MD5 PASSWORD : Operator : NONE MD2 MD5 PASSWORD : Admin : NONE MD2 MD5 PASSWORD : OEM : IP Address Source : DHCP Address IP Address : 9.55.196.235 Subnet Mask : 255.255.255.0 MAC Address : 00:11:09:5b:7e:42 SNMP Community String : public IP Header : TTL=0x00 Flags=0x00 Precedence=# ipmitool lan set 4 ipsrc dhcp skippy:~ # ipmitool lan set 4 snmp public Setting LAN SNMP Community String to public skippy:~ # ipmitool lan print Set in Progress : Set Complete Auth Type Support : NONE MD2 MD5 PASSWORD Auth Type Enable : Callback : NONE MD2 MD5 PASSWORD : User : NONE MD2 MD5 PASSWORD : Operator : NONE MD2 MD5 PASSWORD : Admin : NONE MD2 MD5 PASSWORD : OEM : IP Address Source : DHCP Address IP Address : 9.55.196.235 Subnet Mask : 255.255.255.0 MAC Address : 00:11:09:5b:7e:42 SNMP Community String : public IP Header : TTL=0x00 Flags=0x00 Precedence=0x00 TOS=0x00 BMC ARP Control : ARP Responses Enabled, Gratuitous ARP Disabled Gratituous ARP Intrvl : 5.0 seconds Default Gateway IP : 9.55.196.1 Default Gateway MAC : 00:00:00:00:00:00 Backup Gateway IP : 0.0.0.0 Backup Gateway MAC : 00:00:00:00:00:00 802.1q VLAN ID : Disabled 802.1q VLAN Priority : 0 RMCP+ Cipher Suites : 1,2,3,6,7,8,11,12,0 Cipher Suite Priv Max : aaaaaaaaaaaaaaa : X=Cipher Suite Unused : c=callback : u=user : o=operator : a=admin : O=OEM 0x00 TOS=0x00 BMC ARP Control : ARP Responses Enabled, Gratuitous ARP Disabled Gratituous ARP Intrvl : 5.0 seconds Default Gateway IP : 9.55.196.1 Default Gateway MAC : 00:00:00:00:00:00 Backup Gateway IP : 0.0.0.0 Backup Gateway MAC : 00:00:00:00:00:00 802.1q VLAN ID : Disabled 802.1q VLAN Priority : 0 RMCP+ Cipher Suites : 1,2,3,6,7,8,11,12,0 Cipher Suite Priv Max : aaaaaaaaaaaaaaa : X=Cipher Suite Unused : c=callback : u=user

: o=operator : a=admin : O=OEM Once the BMC LAN is configured it is possible to configure SNMP alert destinations. Configuring an Alert Destination The GX7 alert destination channel is always 4. Alert destinations 1-4 can be used as SNMP destinations. The following commands configure alert destination 1: ipmitool lan alert help ipmitool lan alert print Show the LAN alert configuration commands Print all of the alert destination configuration data ipmitool lan alert print 4 1 Print the alert destination for channel 4 index 1 ipmitool lan alert 4 1 ipaddr <x.x.x.x> ipmitool lan alert 4 1 macaddr <x:x:x:x:x:x> ipmitool lan alert 4 1 gateway default ipmitool lan alert 4 1 type pet ipmitool lan alert set 4 1 ack off ipmitool lan alert set 4 1 retry 5 ipmitool lan alert set 4 1 time 30 Set the alert destination IP address to x.x.x.x Set the alert destination MAC address to x:x:x:x:x:x Set the gateway to be used by the alert destination Set the destination type as pet or oem Set acknowledgement off Set retries to 5 (only used if ack is on) Set time between retries to 30 seconds (only used if ack is on) Here are some examples that show how alert destination 1 is configured: #<command> # ipmitool lan alert 4 1 ipaddr 9.55.196.20 #<command> # ipmitool lan alert 4 1 macaddr 11:22:33:44:55:66 #<command> # ipmitool lan alert 4 1 gateway default #<command> # ipmitool lan alert 4 1 type pet #<command> # ipmitool lan alert print 4 1 Alert Destination : 1 Alert Acknowledge : Unacknowledged Destination Type : PET Trap Retry Interval : 0 Number of Retries : 0 Alert Gateway : Default Alert IP Address : 192.168.1.1 Events that are configured to generate traps can now be sent to the alert destination. Configuring the Event Filter Policy Table The event filter policy provides a means of designating which sensors should generate an SNMP trap notification and the alert destination to send them too. The commands that must be run are:

ipmitool pef help ipmitool raw 0x4 0x12 0x1 0x1 ipmitool raw 0x4 0x12 0x9 0x1 0x10 0x41 0x00 ipmitool pef list Show all of the event filtering commands Enable event filtering Byte 4: Index into the event filtering table Byte 6: Use channel 4 alert destination 1 List the events configured to trigger SNMP trap notifications At a minimum, event filtering must be enabled, the PEF policy must be modified to use a configured alert destination and the event filtering table must contain entries pertinent to the SNMP notifications that the user wishes to observe. Configuring the Event Filter Table The BMC provides means for up to 16 events to result in an SNMP notification. The only way to manipulate some of the PEF configuration is via the ipmitool raw command. The following commands enable traps on the set of sensors that the GX7 supports: ipmitool raw 0x04 0x12 0x06 0x02 0xc0 0x1 0x1 0x10 0x20 0xff 0x04 0x40 0x10 0x04 0 0 0 0 0 0 0 0 0 0 ipmitool raw 0x04 0x12 0x06 0x02 0xc0 0x01 0x01 0x10 0x20 0xff 0x04 0x42 0x01 ipmitool raw 0x04 0x12 0x06 0x03 0xc0 0x01 0x01 0x10 0x20 0xff 0x04 0x5a 0x01 ipmitool raw 0x04 0x12 0x06 0x04 0xc0 0x01 0x01 0x10 0x20 0xff 0x04 0x5b 0x01 ipmitool raw 0x04 0x12 0x06 0x05 0xc0 0x01 0x01 0x10 0x20 0xff 0x04 0x61 0x01 ipmitool raw 0x04 0x12 0x06 0x06 0xc0 0x01 0x01 0x10 0x20 0xff 0x04 0x62 0x01 Enable traps on system fan1 Enable traps on system fan2 Enable traps on power supply 1 fan 1. 0 indicates supply is removed or faulty Enable traps on power supply 1 fan 2. 0 indicates supply is removed, off, or faulty Enable traps on power supply 2 fan 1. 0 indicates supply is removed, off or faulty Enable traps on power supply 2 fan 2. 0 indicates supply is removed or faulty The configuration can be confirmed: # ipmitool pef list 1 active, pre-configured 0x11 Fan 64 Critical Threshold 2 active, pre-configured 0x11 Fan 66 Critical Threshold 3 active, pre-configured 0x11 Fan 90 Critical Threshold 4 active, pre-configured 0x11 Fan 91 Critical Threshold 5 active, pre-configured 0x11 Fan 97 Critical Threshold

6 active, pre-configured 0x11 Fan 98 Critical Threshold 7 inactive 8 inactive 9 inactive 10 inactive 11 inactive 12 inactive 13 inactive 14 inactive 15 inactive 16 inactive Validating SNMP Notification The easiest way to validate the operation of traps is to remove the redundant power supply. The following command is also useful: ipmitool sel list List system events. This should be run prior to and after removing the power supply to establish an event got raised locally on the system under test Provided the network configuration is correct, the SNMP notification should be viewable in the alert destination SNMP trap receiver. An event will also be present in the event list.