Академический Документы
Профессиональный Документы
Культура Документы
System
02
Date
2015-02-13
Notice
The purchased products, services and features are stipulated by the contract made between Huawei and the
customer. All or part of the products, services and features described in this document may not be within the
purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information,
and recommendations in this document are provided "AS IS" without warranties, guarantees or representations
of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute a warranty of any kind, express or implied.
Website:
http://www.huawei.com
Email:
support@huawei.com
Issue 02 (2015-02-13)
Contents
Contents
1 Overview.........................................................................................................................................1
1.1 Introduction to iBMC.....................................................................................................................................................2
1.2 System Design................................................................................................................................................................3
2 Functions.........................................................................................................................................4
2.1 Various Management Interfaces.....................................................................................................................................6
2.1.1 Standard IPMI 1.5 or IPMI 2.0 Interface.....................................................................................................................6
2.1.2 CLI...............................................................................................................................................................................8
2.1.3 HTTPS Interface..........................................................................................................................................................9
2.1.4 SNMP Interface.........................................................................................................................................................10
2.2 Fault Detection and Alarm Management......................................................................................................................12
2.2.1 Fault Detection..........................................................................................................................................................12
2.2.2 System Running Recorder.........................................................................................................................................12
2.2.3 Startup Self-Check Code...........................................................................................................................................13
2.2.4 Event Management....................................................................................................................................................14
2.2.5 Fault Reporting..........................................................................................................................................................15
2.3 Virtual KVM and Virtual Media..................................................................................................................................16
2.3.1 Virtual KVM..............................................................................................................................................................17
2.3.2 Virtual Media.............................................................................................................................................................18
2.4 HTTPS-based Visualization Management Interface....................................................................................................20
2.4.1 Viewing System Information.....................................................................................................................................20
2.4.2 Querying System Information...................................................................................................................................21
2.4.3 Real-Time Monitoring...............................................................................................................................................22
2.4.4 Device Location.........................................................................................................................................................25
2.5 Breakdown Screenshot and Breakdown Video............................................................................................................25
2.5.1 Breakdown Screenshot..............................................................................................................................................25
2.5.2 Breakdown Video......................................................................................................................................................26
2.6 Screen Snapshot and Screen Video..............................................................................................................................27
2.6.1 Screen Snapshot.........................................................................................................................................................27
2.6.2 Screen Video..............................................................................................................................................................29
2.7 Domain Management and Directory Service...............................................................................................................30
2.7.1 Domain Management................................................................................................................................................30
2.7.2 Directory Service.......................................................................................................................................................31
Issue 02 (2015-02-13)
ii
Contents
3 Technical Specifications.............................................................................................................50
Issue 02 (2015-02-13)
iii
Figures
Figures
Figure 1-1 System architecture................................................................................................................................3
Figure 2-1 iBMC management interfaces................................................................................................................6
Figure 2-2 System running recorder......................................................................................................................12
Figure 2-3 Downloading black box data...............................................................................................................13
Figure 2-4 Startup self-check code page................................................................................................................13
Figure 2-5 System Events page.............................................................................................................................14
Figure 2-6 SNMP trap configuration page............................................................................................................16
Figure 2-7 SMTP configuration page....................................................................................................................16
Figure 2-8 Remote console....................................................................................................................................17
Figure 2-9 Virtual KVM in iBMC.........................................................................................................................18
Figure 2-10 Virtual media in the iBMC................................................................................................................19
Figure 2-11 Entering the iBMC IP address...........................................................................................................20
Figure 2-12 iBMC login page................................................................................................................................20
Figure 2-13 Overview page...................................................................................................................................21
Figure 2-14 Firmware Version page......................................................................................................................22
Figure 2-15 System Hardware page......................................................................................................................22
Figure 2-16 Real-time data page............................................................................................................................23
Figure 2-17 Sensor page........................................................................................................................................24
Figure 2-18 Device Location page.........................................................................................................................25
Figure 2-19 Rule of the breakdown screenshot.....................................................................................................25
Figure 2-20 Breakdown screenshot.......................................................................................................................26
Figure 2-21 Video playback console.....................................................................................................................27
Figure 2-22 Obtaining screen snapshots................................................................................................................28
Figure 2-23 Enabling/Disabling the screen video function...................................................................................29
Figure 2-24 Video playback console.....................................................................................................................30
Figure 2-25 Configuring DNS parameters............................................................................................................31
Figure 2-26 Host Name page.................................................................................................................................31
Figure 2-27 Directory service work process..........................................................................................................32
Figure 2-28 LDAP User page................................................................................................................................33
Figure 2-29 Firmware Upgrade page.....................................................................................................................34
Figure 2-30 Firmware Upgrade page.....................................................................................................................35
Figure 2-31 Power Control....................................................................................................................................36
Issue 02 (2015-02-13)
iv
Figures
Issue 02 (2015-02-13)
Tables
Tables
Table 2-1 Operating environment of clients..........................................................................................................10
Table 2-2 System event parameters.......................................................................................................................15
Table 2-3 OSs not supporting mouse synchronization (The OSs include, but not limited to the OSs in the table)
................................................................................................................................................................................18
Table 2-4 Threshold sensor parameters.................................................................................................................24
Table 2-5 Encryption algorithms...........................................................................................................................44
Issue 02 (2015-02-13)
vi
1 Overview
Overview
Issue 02 (2015-02-13)
1 Overview
Dual-image backup
iBMC provides software dual-image backups, which allows software to restart from the
backup image when a failure occurs. This feature enhances system security.
Asset management
iBMC facilitates asset management.
l
Issue 02 (2015-02-13)
Security management
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
1 Overview
The KVM module implements remote keyboard and mouse control. When the KVM
module receives video data from x86 systems over the video graphics array (VGA) port,
it compresses the video data and sends the compressed data to a remote KVM client over
the network. When the KVM module receives keyboard and mouse data from the remote
KVM client, it transmits the data to x86 systems by using a simulated USB keyboard and
mouse device.
iBMC uses a system running recorder (black box) to receive data from x86 systems over
the Peripheral Component Interconnect Express (PCIe) interface and to export the recorded
information.
iBMC communicates with x86 systems through a local PC interface to implement IPMI
management.
iBMC provides GE interfaces, through which remote management is performed over the
network using IPMI and HTTPS.
iBMC uses sensors to monitor the temperature and voltage of servers. It also intelligently
manages the fan modules and power supply units (PSUs) of servers.
iBMC supports the network controller sideband interface (NC-SI) technology and VLAN
function, which allow more flexible management networking.
Issue 02 (2015-02-13)
2 Functions
Functions
iBMC not only monitors servers, but also provides diversified alarms and detailed logs.
For example, the logs contain the CPU core temperatures, voltages, fan speed, PSU faults,
and bus faults. In addition, the iBMC allows you to query the information about CPUs,
memory, and hard disks.
When a server breaks down, iBMC automatically saves the last information displayed on
the screen, which is used for fault identification. iBMC allows a third party to set regular
or periodical tasks for capturing screenshots, which requires no manual intervention and
saves maintenance time.
2 Functions
Issue 02 (2015-02-13)
2 Functions
ipmitool interfaces:
Interfaces:
open
imb
lan
lanplus
l
Issue 02 (2015-02-13)
ipmitool parameters:
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
2 Functions
Parameters:
-h
This help
-V
Show version information
-v
Verbose (can use multiple times)
-c
Display output in comma separated format
-d N
Specify a /dev/ipmiN device to use (default=0)
-I intf
Interface to use
-H hostname
Remote host name for LAN interface
-p port
Remote RMCP port [default=623]
-U username
Remote session username
-f file
Read remote session password from file
-S sdr
Use local file for remote SDR cache
-a
Prompt for remote password
-e char
Set SOL escape character
-C ciphersuite
Cipher suite to be used by lanplus interface
-k key
Use Kg key for IPMIv2 authentication
-y hex_key
Use hexadecimal-encoded Kg key for IPMIv2
authentication
-L level
Remote session privilege level
[default=ADMINISTRATOR] Append a '+' to use name/privilege lookup in
RAKP1
-A authtype
Force use of auth type NONE, PASSWORD, MD2, MD5 or
OEM
-P password
Remote session password
-E
Read password from IPMI_PASSWORD environment
variable
-K
Read kgkey from IPMI_KGKEY environment variable
-m address
Set local IPMB address
-b channel
Set destination channel for bridged request
t
address
Bridge request to remote target address
-B channel
Set transit channel for bridged request (dual
bridge)
-T address
Set transit address for bridge request (dual
bridge)
-l lun
Set destination lun for raw commands
-o oemtype
Setup for OEM (use 'list' to see available OEM
types)
-O seloem
Use file for OEM SEL event descriptions
ipmitool commands:
Commands:
raw
i2c
response
spd
lan
chassis
power
event
mc
sdr
sensor
fru
gendev
locators sdr
sel
pef
sol
tsol
LAN
Issue 02 (2015-02-13)
2 Functions
For example, to query all the local users on iBMC, run the following command:
BT-based ipmitool command: ipmitool user list
LAN-based ipmitool command: ipmitool -H *.*.*.* -I lanplus -U <user name> -P
<password> user list 1
H: Enter the IP address of the iBMC network port after H.
I: Enter a transmission protocol after I. lan indicates non-encryption. lanplus indicates
encryption.
U: Enter the local user name after U.
P: Enter the password for a local user after P.
2.1.2 CLI
iBMC offers the easy-to-use CLI and supports two basic commands: ipmcget and ipmcset.
iBMC uses these two commands to remotely manage servers. You can log in to iBMC over SSH
and Telnet to run the two commands.
l
Issue 02 (2015-02-13)
2 Functions
You can quickly set parameters and query tasks on the UI.
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
2 Functions
iBMC monitors the OS startup, OS operations, and DVD-ROM drive or FDD mapping
over a remote console.
Open Internet Explorer, enter the IPv4 or IPv6 address or domain name of the iBMC network
port in the address box, and press Enter. The login page is displayed. Enter a local user account
or LDAP domain account to log in to the iBMC Web.
Table 2-1 lists the OSs, browsers, and Java runtime environment (JRE) supported by the iBMC
Web.
Configuration Requirement
OS
Web browser
JRE
Automatically manages the network. Administrators can search and modify information,
identify and diagnose network problems, plan for capacity, and generate reports on network
nodes using the SNMP platform.
Issue 02 (2015-02-13)
10
2 Functions
Combines simple request-reply mode and active notification mode and provides a timeout
and retransmission mechanism.
Few packet types and simple packet format, which facilitates resolution and
implementation.
iBMC provides SNMP interfaces. SNMP provides operations including Get, Set, and Trap,
enabling third-party software to manage servers in a centralized manner by using the SNMP
interfaces. The SNMP agent supports SNMPv1, v2c, and v3. Only SNMPv3 is enabled by
default. Different community names are used for the Get and Set operations for SNMPv1 and
SNMPv2c. SNMPv3 supports Message Digest Algorithm 5 (MD5) or Secure Hash Algorithm
(SHA) for authorization and Data Encryption Standard (DES) or Advanced Encryption Standard
(AES) for encryption. The security user name and login user name are the same. The SNMPv3
security user shares the same set of local user names with the web-based UI, CLI, SMASH-CLP,
and IPMI LAN interfaces. The password of the SNMPv3 security user must contain at least eight
characters.
The SNMP agent interface supports query of the following information: system health status,
system health events, hardware status, memory and CPU models, alarm reporting configuration,
local user and domain account (LDAP) configuration, power statistics, asset information, heat
dissipation management, firmware version, network management, power capping, and DNS.
SNMP interface application scenario:
l
You can use the third-party MIB tool, such as MG-SOFT MIB Browser, and CLI tool to perform
operations on each MIB node over SNMP, usually for testing or temporary remote management
and maintenance for servers.
l
Network management software compiles and imports SNMP MIB definition files. Using the
network management software, you can manage servers over SNMP interfaces, set trigger scripts
for important information, and re-map trap events. Huawei network management software is
connected to command management software, such as CA, IBM System Director, and HP SIM.
l
Network management software supports various integrated management plug-ins for different
server vendors. The plug-in can receive operation commands from the network management
software, query and set iBMC information over the SNMP interface, and send back the
information to the network management software for display in the format defined by the
interface. Huawei has developed plug-ins for VMware vCenter and Microsoft System Center.
Issue 02 (2015-02-13)
11
2 Functions
CPU hardware faults (CAT ERROR, self-checking failures, and configuration errors)
High temperature faults (for air intake vents, CPUs, DIMMs, and PSUs)
Fan faults
PSU faults (AC/DC input lost, high temperatures, and fan module faults for PSUs)
Memory faults (number of correctable ECC errors exceeds the threshold, high
temperatures, and configuration errors)
System breakdown
Issue 02 (2015-02-13)
12
2 Functions
Application scenario 1
When kernel panic occurs, the registered black box automatically records the kernel stack
information and saves the location information to a DDR using a DDR controller over a PCIe
interface. Only 16 MB data can be saved. After the system restarts, a system-side location tool
reads and analyzes the location information in the DDR over the PCIe interface. Even if the
system cannot be started, iBMC can export the information from the DDR (as shown in Figure
2-3)and analyzes the information using a dedicated analysis tool. Currently, the location
information can be exported only to the OS and analyzed using the hwkbox analysis tool.
Application scenario 2
The third-party application records a maximum of 2 MB run logs to the iBMC DDR using a
write interface of the black box. When the application is faulty, the system reads and analyzes
the run logs using a read interface on the black box or iBMC. This facilitates fault location.
Figure 2-3 Downloading black box data
Issue 02 (2015-02-13)
13
2 Functions
8B-6B-F6-CD-D5-BB-C6-18-E8-85-5C-D7-68-68-52-9A
B1-67-47-A2-EC-CB-52-F9-D8-D4-74-0A-E9-23-7A-C4
FE-28-74-A7-1C-F3-C2-0C-E5-BF-D0-BC-88-05-22-1B
71-E9-AE-F1-E3-0C-BB-83-FD-10-BA-53-3B-86-B0-40
System events are recorded in files in real time. When 2000 events are recorded, automatic
backup occurs. Only one backup file can be saved. If there are more than one file, the old backup
file is automatically deleted.
The System Events page allows you to query, sort, filter, and clear all system events, as shown
in Figure 2-5.
Issue 02 (2015-02-13)
14
2 Functions
Description
Severity
Indicates the severity level of the event. Values: OK, Minor, Major, and
Critical
Generation time
Sensor
Event
description
Event source
State
Indicates the current status of the event. Values: Generated and Cleared
Issue 02 (2015-02-13)
15
2 Functions
Issue 02 (2015-02-13)
16
2 Functions
Mouse synchronization: Ensure that the remote OSs support mouse synchronization. Table
2-3 lists the OSs that do not support mouse synchronization.
Exclusive and collaborative modes: Both parties in collaborative mode can operate a remote
server at the same time. To ensure security, use the exclusive mode.
Operating environment: To enable the virtual KVM function, the browser, OS, and JRE
versions on the client must meet the software requirements listed in Table 2-1.
Combination key: allows users to customize any six-key combination for sending
commands.
Encryption: The AES128 CBC encryption algorithm is adopted for video, keyboard, and
control command data.
For OSs that cannot provide the position of the mouse in absolute mode, the virtual KVM does
not support the mouse synchronization function.
Issue 02 (2015-02-13)
17
2 Functions
Table 2-3 OSs not supporting mouse synchronization (The OSs include, but not limited to the
OSs in the table)
OS Not Supporting Mouse Synchronization
SUSE Linux Enterprise Server 11 Service Pack 1 for x86 (32-Bit)
SUSE Linux Enterprise Server 11 Service Pack 1 for Intel EM64T (64-Bit)
When receiving data from a remote client, iBMC compresses the data and transmits the
compressed data to the local client over a network. The local client console decompresses
the data received and displays the data on the local client.
The virtual KVM console captures local mouse and keyboard events and transmits the
events to a remote client over a network. iBMC simulates the local keyboard and mouse to
transmit the events to a remote server service system over the USB channel.
Issue 02 (2015-02-13)
18
2 Functions
iBMC exchanges data with hosts through USB 2.0 channels. The virtual media provides the
following functions:
l
Virtualizing devices
The PC or image file on a client is mapped to a connected server. Then the server can detect
the client as a USB device.
The following can be virtualized:
FDD
DVD-ROM drive
An FDD can be virtualized along with other devices.
Issue 02 (2015-02-13)
19
2 Functions
The port number is optional. If the port number is not 80 or the sslport port number is not 443, you must
enter the port number after the IP address. For a method of changing the port number, see 2.11.4 Service
Management.
Step 2 On the login page, enter the user name and password or select a domain if a domain account is
used, and click Log In, as shown in Figure 2-12.
Figure 2-12 iBMC login page
----End
Issue 02 (2015-02-13)
20
2 Functions
Firmware Version
The firmware version information includes the iBMC, BIOS, U-Boot and CPLD versions, as
well as baseboard PCB versions, baseboard IDs, baseboard manufacturers, baseboard models,
and baseboard serial numbers. See Figure 2-14.
Issue 02 (2015-02-13)
21
2 Functions
System Hardware
The system hardware information includes the configured number and maximum number of key
system components, and component models. Figure 2-15 shows the System Hardware page.
Figure 2-15 System Hardware page
22
2 Functions
Real-Time Data
Figure 2-16 shows the history lines of real-time data for items including CPU usage, memory
bandwidth usage, and air intake vent temperature. The CPU usage and memory bandwidth usage
are measured every minute and the air intake vent temperature is measured every 10 minutes.
This allows users to view the data in real time and understand the service running status.
Figure 2-16 Real-time data page
Sensor
The Sensor page displays all sensor information, as shown in Figure 2-17. Table 2-4 describes
sensor parameters.
Issue 02 (2015-02-13)
23
2 Functions
Issue 02 (2015-02-13)
Parameter
Description
Sensor
Name of a sensor
Current value
Unit
Lower critical
The system generates a critical alarm when the sensor value exceeds
this threshold.
Lower major
The system generates a major alarm when the sensor value exceeds
this threshold.
Lower minor
The system generates a minor alarm when the sensor value exceeds
this threshold.
Upper minor
The system generates a minor alarm when the sensor value exceeds
this threshold.
Upper major
The system generates a major alarm when the sensor value exceeds
this threshold.
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
24
2 Functions
Parameter
Description
Upper critical
The system generates a critical alarm when the sensor value exceeds
this threshold.
iBMC stores a maximum of three breakdown screenshots. The oldest screenshot will be
overwritten when a new screenshot is created.
Issue 02 (2015-02-13)
25
2 Functions
You can choose Events and Logs > Remote System Screen > Last Screen to view
screenshots, as shown in Figure 2-20.
Figure 2-20 Breakdown screenshot
Issue 02 (2015-02-13)
26
2 Functions
27
2 Functions
from a local client and view screens of all inspected servers using Secure File Transfer Protocol
(SFTP).
Compared with the virtual KVM, the screen snapshot does not need login over HTTPS. You
can obtain screen snapshots by using the CLI. The CLI allows scripts to be executed, which
facilitates automatic server inspection. You can also obtain current system screen snapshots on
the WebUI.
Parameter description
When the wakeup parameter is used, the system takes a screenshot for the current information
and is woken up from the Screen Saver mode.
Usage guidelines
After the printscreen command is executed, iBMC automatically saves the screenshot as the
screen.jpg file to the tmp directory. You need to load the file to a client that supports viewing .jpg
files over FTP or SFTP before viewing the screenshot.
Issue 02 (2015-02-13)
28
2 Functions
Issue 02 (2015-02-13)
29
2 Functions
Log in to iBMC WebUI using the domain name, and open the DNS tab. See Figure 2-25.
NOTE
Domain Name System (DNS) is an Internet service. The DNS maps easy-to-remember domain names
and IP addresses. This helps you easily access the network.
2.
The UI shown in Figure 2-25 enables you to set DNS bound network port and methods of
obtaining DNS information. Click OK to save the settings.
3.
Set Domain Name, Primary DNS Server, and Secondary DNS Server if Manually
Obtain DNS Information is selected.
Issue 02 (2015-02-13)
30
2 Functions
----End
Issue 02 (2015-02-13)
31
2 Functions
To ensure security, LDAP supports only LDAPS that uses the SSL encryption algorithm and
allows you to modify LDAPS port information. Plain text-based LDAP is not supported. To
ensure the authenticity of an LDAP server, LDAP supports certificate authentication for servers
and you can import the root CA certificate of the LDAP server into iBMC for verification. Set
the domain controller address to the user name of the root CA certificate because the consistency
of the two needs to be checked during authentication.
Figure 2-27 Directory service work process
LDAP is a protocol for accessing online directory services over an IP network. LDAP directories can help
store any types of data, such as email addresses and mail routing information, so that you can query the
information conveniently.
View or set the LDAP user information on the LDAP User page, as shown in Figure 2-28.
Issue 02 (2015-02-13)
32
2 Functions
On the LDAP User page, you can perform the following operations:
l
Issue 02 (2015-02-13)
33
2 Functions
Issue 02 (2015-02-13)
34
2 Functions
Graceful Power Off: powers off a server. iBMC sends an ACPI interrupt to the OS. If the
OS supports the ACPI interrupt, iBMC shuts down the OS (ends all running processes) and
then powers off the device. If the OS does not support the ACPI interrupt, iBMC powers
off the device forcibly after the graceful power-off timeout period ends. The result is the
same as the operation that you press the power button on the front panel of the server.
Forcibly Power Off: powers off a server without waiting for the response from the OS.
This option has the same result as the operation that you hold down the power button on
the front panel of the server.
Restart: indicates cold reset. iBMC can reset the system through the southbridge directly,
without the need of powering off the OS.
Graceful Reboot: powers off and then powers on the server. iBMC shuts down the OS and
then power off the server. iBMC powers off the server forcibly after the graceful poweroff timeout period ends, and then powers on the server.
NMI: sends a non-maskable interrupt (NMI) to the OS to collect kernel stack information
and sends the information to the console, which is used for identifying the causes of system
exceptions.
Issue 02 (2015-02-13)
35
2 Functions
Event log: logs information about a power capping failure in the system event file. This
function is enabled by default.
Power off: iBMC forcibly powers off the server within 15s.
Issue 02 (2015-02-13)
36
2 Functions
In the navigation tree, choose PS Management > Power History. The power history user
interface (UI) is displayed, as shown in Figure 2-34.
iBMC collects and saves the system power every 10 minutes. The Power History page displays
the recent power history in a line chart. To view the power statistics in recent periods, click Last
Week or Last Day. To refresh the line charts and tables, click Recollect. To download historical
power information, click Download.
On this page, you can view the recent device power changes and understand the device running
status in a certain period.
Issue 02 (2015-02-13)
37
2 Functions
38
2 Functions
exceeds 1 MB, the earliest data will be overwritten. When the system breaks down or restarts,
you can export and view the serial port information from iBMC.
Figure 2-36 Recording system serial port information
39
2 Functions
2.
Log in to the BIOS and change the password of user 2, which is an administrator by default.
3.
Log in to the OS on the local device and use a third-party tool (for example, IPMItool) to
set a new password through BT channels.
4.
Set a new password for a blade server by using the management module (MM).
Issue 02 (2015-02-13)
40
2 Functions
Issue 02 (2015-02-13)
41
2 Functions
Issue 02 (2015-02-13)
42
2 Functions
Issue 02 (2015-02-13)
43
2 Functions
Integrity: The data integrity is ensured using cryptographic methods during transmission
and storage. For example, you can use the hash function to perform data check for security.
Non-repudiation: A user that performs one operation can be accurately located. The user
cannot deny his or her operation.
Application Scenario
Function
Digital
signature
Encryption
Issue 02 (2015-02-13)
44
2 Functions
Encryption
Algorithm
Application Scenario
Function
Encryption
DES 64
Encryption
HMAC-MD5-96
SNMPv3 authentication
Authentication
HMAC-SHA1-96
Authentication
SHA256
Integrity and
encryption
Issue 02 (2015-02-13)
45
2 Functions
The page for configuring network port auto-adaptation allows you to query the network port
mode and set port parameters. If the network port is in auto-adaptation mode, you can specify
a host network port as the sideband network port, which is network port 1 by default, as shown
in Figure 2-44.
2.12.2 NC-SI
NS-CI enables the management system and the host system to share a physical network port on
the host using the NC-SI technology, implementing management and service handling,
simplifying networking, and reducing ports on the switch. Preferentially considering the service
data, the maximum bandwidth for data management is 100 Mbit/s. For the security purpose,
divide the management and service in different network segments using the VLAN technology.
Issue 02 (2015-02-13)
46
2 Functions
2.12.3 IPv6
iBMC supports IPv6 to ensure sufficient IP addresses because the IPv4 address is insufficient.
iBMC supports the Web, Telnet, SSH, and SNMP interfaces, which support IPv6. Physical
Issue 02 (2015-02-13)
47
2 Functions
channels using the dedicated management network port and the shared network port (NC-SI)
also support IPv6.
Figure 2-47 IPv6 address configuration screen
Manually set the IPv6 address or obtain it from a iBMC DHCP server.
Issue 02 (2015-02-13)
48
2 Functions
Issue 02 (2015-02-13)
49
3 Technical Specifications
Technical Specifications
Component
Specifications
Supported products
RH1288A V2, RH2288A V2, RH1288 V3, RH2288 V3, RH2288H V3,
RH8100 V3, XH622 V3, XH628 V3, CH121 V3, CH140 V3, CH220
V3, CH222 V3, and CH242 V3
KVM
Network port
Virtual media
User interface
l IPMI LAN/BT
l SNMP
l CLI
Security feature
l User management
l Role authentication
l Data encryption
l Scenario-based login restriction
l Account security
l SSL certificate management
Issue 02 (2015-02-13)
50