Table Of Contents
Maintenance Tasks
Configuring Basic System Information
Viewing System Information
Naming Your InfiniBand Switch
Defining a Device Location
Defining a Technical Support Resource
Configuring System Global Settings
Configuring System Operation Mode
Enabling InfiniBand Counter Reset
Configuring Date and Time Properties
Configuring the Date and Time
Assigning NTP Servers
Viewing Files in the File System
Deleting Files in the File System
Installing Software Images
Importing Configuration Files and Image Files with FTP or SCP
Exporting Configuration Files and Log Files with FTP or SCP
Customizing the Boot Configuration
Backing Up the Running Configuration File
Saving a Configuration File
Rebooting the Device
Configuring Basic Services
Assigning a DNS Server
Enabling or Disabling the FTP Access
Enabling or Disabling the Telnet Access
Assigning a Syslog Server
Assigning an Authentication Method
Configuring HTTP and HTTPS
Viewing RADIUS Servers
Viewing and Configuring RADIUS Server Properties
Adding RADIUS Servers
Deleting RADIUS Servers
Viewing TACACS Servers
Viewing and Configuring TACACS Server Properties
Adding TACACS Servers
Deleting TACACS Servers
Viewing Authentication Failures
Viewing Diagnostic Test Results
Viewing Card POST Test Results
Viewing Fan POST Test Results
Viewing Power Supply POST Test Results
Viewing FRU Errors
Maintenance Tasks
This chapter describes the Chassis Manager maintenance tasks and contains these sections:
•
Configuring Basic System Information
•
Configuring System Global Settings
•
Configuring Date and Time Properties
•
Viewing Files in the File System
•
Installing Software Images
•
Importing Configuration Files and Image Files with FTP or SCP
•
Exporting Configuration Files and Log Files with FTP or SCP
•
Customizing the Boot Configuration
•
Backing Up the Running Configuration File
•
Saving a Configuration File
•
Rebooting the Device
•
Configuring Basic Services
•
Viewing RADIUS Servers
•
Viewing TACACS Servers
•
Viewing Authentication Failures
•
Viewing Diagnostic Test Results
Configuring Basic System Information
Basic system information includes the name of your device, the location of your device, and support resources.
Note
SFS Server Switch product configurations with TopspinOS release 2.3.x and higher use a 128-bit MD5-based hashing scheme to store passwords.
Viewing System Information
To view basic system information, follow these steps:
Step 1
Expand Maintenance in the Tree frame.
Step 2
Select the System Information branch.
The System Information display appears in the View frame. Table 4-1 describes the fields in this table.
Table 4-1 System Information Fields
Field
|
Description
|
Description
|
Description of the chassis and the image that runs on the chassis.
|
System Uptime
|
Amount of time that the chassis has run since the last boot.
|
Last Change Made At
|
Date and time that a user last changed the running configuration.
|
Last Config Saved At
|
Date and time that a user last saved the running configuration as the startup configuration.
|
System Name
|
Configurable name for your Server Switch.
|
Location
|
Configurable location of your Server Switch.
|
Support Contact
|
Configurable support information for your Server Switch.
|
Rack Locator UID (select chassis only)
|
Unique rack-locator ID.
|
Naming Your InfiniBand Switch
To assign a hostname to your device, follow these steps:
Step 1
Expand Maintenance in the Tree frame.
Step 2
Select the System Information branch.
The System Information display appears in the View frame.
Step 3
In the System Name field, type the name that you want to assign to the device, and then click Apply.
Defining a Device Location
To add a physical device location description to your switch, follow these steps:
Step 1
Expand Maintenance in the Tree frame.
Step 2
Select the System Information branch.
The System Information display appears in the View frame.
Step 3
In the Location field, type the name location of your device, and then click Apply.
Defining a Technical Support Resource
The technical support e-mail address that you define appears in the System frame when you refresh or restart Chassis Manager. To define a technical support resource, follow these steps:
Step 1
Expand Maintenance in the Tree frame.
Step 2
Select the System Information branch.
The System Information display appears in the View frame.
Step 3
In the Support Contact field, type the e-mail address of your technical support provider, and then click Apply.
Configuring System Global Settings
Global configuration includes the system operating mode and the InfiniBand counter reset.
Configuring System Operation Mode
To configure your Server Switch to deny changes to SRP configuration and preserve VFrame-authorized configurations, set the system operating mode to VFrame Managed. Change the system operation mode by doing the following:
Step 1
Expand Maintenance in the Tree frame.
Step 2
Select the System Global Settings branch.
The System Global Settings display appears in the View frame.
Step 3
In the System Operation Mode field, choose either the Normal or VFrame Managed radio button, and then click Apply.
Enabling InfiniBand Counter Reset
Counters are accumulated by the port_agent when performance monitoring is enabled (by default, it is disabled). To disable automatic clearing of the counters by the port_agent, follow these steps:
Step 1
Expand Maintenance in the Tree frame.
Step 2
Select the System Global Settings branch.
The System Global Settings display appears in the View frame.
Step 3
In the Enable Counter Reset field, check the Enable check box, and then click Apply.
Configuring Date and Time Properties
An internal clock runs on your device, but we recommend that you configure your device to access a network time protocol (NTP) server to synchronize your device with your network.
Configuring the Date and Time
To configure the date and time of the internal clock on your device, follow these steps:
Step 1
Expand Maintenance in the Tree frame.
Step 2
Select the Time branch.
The Date and Time Properties display appears in the View frame.
Step 3
In the Date field, enter the date in the MM/DD/YY format.
Step 4
In the Time field, enter the time in HH:MM:SS format, and then click Apply.
Assigning NTP Servers
To configure your device to use an NTP server to synchronize your Server Switch with the network, follow these steps:
Step 1
Expand Maintenance in the Tree frame.
Step 2
Select the Time branch.
The Date and Time Properties display appears in the View frame.
Step 3
In the NTP Server 1 field, enter the IP address of the NTP server that you want your switch to use.
Step 4
(Optional) In the NTP Server 2 field, enter the IP address of the NTP server that you want your switch to use if your switch cannot access the primary NTP server.
Step 5
(Optional) In the NTP Server 3 field, enter the IP address of the NTP server that you want your switch to use if your switch cannot access the primary or secondary NTP servers.
Note
When your device cannot access a NTP server, it defaults to the onboard clock.
Viewing Files in the File System
To view device files, such as image files, log files, and configuration files, follow these steps:
Step 1
Expand Maintenance in the Tree frame.
Step 2
Select the File Management branch.
The File Management table appears in the View frame. Table 4-2 describes the fields in this table.
Table 4-2 File Management Table Field Descriptions
Field
|
Description
|
Slot ID
|
Slot of the controller card on which the file resides.
|
Name
|
Name of the file.
|
Type
|
Type of file. The following appear for selection:
• config
• log
• image
|
Size
|
Size of the file, in bytes.
|
Date
|
Most recent date and time that your device or a user updated the file.
|
Step 3
(Optional) Click Refresh to poll your switch and update your display to reflect the most current inventory of your file system.
Deleting Files in the File System
To delete files from your file system, follow these steps:
Step 1
Expand Maintenance in the Tree frame.
Step 2
Select the File Management branch.
The File Management table appears in the View frame.
Step 3
Click the radio button next to the file to delete, and then click Delete.
Installing Software Images
To install an image file, follow these steps:
Step 1
Expand Maintenance in the Tree frame.
Step 2
Select the File Management branch.
The File Management table appears in the View frame.
Note
If you have not already imported the image file to your file system, see the "Importing Configuration Files and Image Files with FTP or SCP" section.
Step 3
Click the radio button next to the image file to install, and then click Install.
A dialog box appears to verify that you want to proceed.
Note
Before you install an image, verify that you have brought up all of the cards on the chassis that you want to run the new image. Cards that run a different image from the chassis cannot pass traffic.
Note
Alert other users that you plan to install a new image to your Server Switch.
Step 4
Click OK to install the image.
A status bar appears to display the status of the installation.
Importing Configuration Files and Image Files with FTP or SCP
To import files to your Server Switch from remote devices, follow these steps:
Step 1
Expand Maintenance in the Tree frame.
Step 2
Select the File Management branch.
The File Management table appears in the View frame.
Step 3
Click Import.
The Import File window opens.
Step 4
Choose FTP or SCP from the Remote Server Type field.
Step 5
Choose a file type (Image or Configuration) from the File Type drop-down menu.
Step 6
Enter the IP address of the server that holds the file (to be imported) in the Remote IP Address field.
Step 7
Enter your user ID in the Remote User Name field to log you into the server.
Step 8
Enter your password in the Remote Password field to log you into the server.
Step 9
Enter the directory path and name of the file on the server in the Remote File Path and Name field.
Step 10
Enter the name that the file will take on your chassis in the File Name on System field.
Step 11
Click Import.
A status bar appears to display the progress of the file transfer.
Exporting Configuration Files and Log Files with FTP or SCP
To export files from your Server Switch to remote devices, follow these steps:
Step 1
Expand Maintenance in the Tree frame.
Step 2
Select the File Management branch.
The File Management table appears in the View frame.
Step 3
Click the radio button of the file that you want to export.
Step 4
Click Export.
The Export File window opens with the name of the file to export in the File Name on System field.
Step 5
Choose FTP or SCP from the Remote Server Type field.
Step 6
Enter the IP address of the server to which you want to export the file in the Remote IP Address field.
Step 7
Enter your user ID in the Remote User Name field to log you into the server.
Step 8
Enter your password in the Remote Password field to log you into the server.
Step 9
Enter the directory path and filename for the file on the server, in the Remote File Path and Name field.
Step 10
Click Export.
A status bar appears to display the progress of the file transfer.
Customizing the Boot Configuration
Customize the boot configuration to follow these steps:
•
View the image that the switch will boot during the next reboot.
•
Delete the startup configuration.
•
Overwrite the startup configuration with another configuration file in your file system.
To customize the boot configuration, follow these steps:
Step 1
Expand Maintenance in the Tree frame.
Step 2
Select the Boot Configuration branch.
The Boot Configuration display appears in the View frame.
Step 3
(Optional) From the Image Source For Next Reboot drop-down menu, choose the image that you want the Server Switch to boot when it reboots.
Step 4
(Optional) Click the Overwrite startup configuration with radio button, and then choose a configuration from the drop-down menu to replace the current startup configuration file.
Note
To overwrite your startup configuration with your running configuration, see the "Backing Up the Running Configuration File" section.
Step 5
(Optional) Click the Delete startup configuration radio button to configure your Server Switch to use the factory-default startup configuration.
Step 6
Click Apply.
Backing Up the Running Configuration File
To back up your running configuration file, follow these steps:
Step 1
Expand Maintenance in the Tree frame.
Step 2
Select the Backup Configuration branch.
The Backup Configuration display appears in the View frame.
Step 3
Enter a filename in the Save Configuration As field.
Chassis Manager saves running configurations in the configuration directory that you specify.
Note
Enter startup-config in this field if you want to save the running configuration as the startup configuration.
Step 4
Click Save.
Step 5
Optionally, click the File Management branch to verify that your file appears in the file system.
Saving a Configuration File
To back up your running configuration as your startup configuration (and to the standby controller on your chassis with a dual-controller chassis), follow these steps:
Step 1
Expand Maintenance in the Tree frame.
Step 2
Select the Save Config branch.
The Save Config display appears in the View frame.
Step 3
Click Save Config.
Rebooting the Device
When you reboot your device, Chassis Manager gives you the option to reboot either with or without saving your configuration. If you choose to reboot but not save, any differences between your running configuration file and startup configuration file are not saved after the reboot.
To reboot your Server Switch with Chassis Manager, follow these steps:
Step 1
Expand Maintenance in the Tree frame.
Step 2
Select the Reboot branch.
The Reboot display appears in the View frame.
Step 3
Click Reboot.
Configuring Basic Services
Configure basic services to facilitate remote access to your device.
Assigning a DNS Server
To assign a DNS server to your device, follow these steps:
Step 1
Expand Maintenance in the Tree frame.
Step 2
Expand Services in the Tree frame.
Step 3
Select the General branch.
The System Services display appears in the View frame.
Step 4
In the Server 1 field, enter the IP address of the primary DNS server that you want to use.
Step 5
(Optional) In the Server 2 field, enter the IP address of the DNS server to use if your device cannot access the primary DNS server.
Step 6
In the Domain field, enter the domain to which you want your switch to belong, and then click Apply.
Enabling or Disabling the FTP Access
To enable FTP transfers to and from your device, follow these steps:
Step 1
Expand Maintenance in the Tree frame.
Step 2
Expand Services in the Tree frame.
Step 3
Select the General branch.
The System Services display appears in the View frame.
Step 4
In the FTP Server field, check (enable) or uncheck (disable) the Enable check box, and then click Apply.
Enabling or Disabling the Telnet Access
To enable Telnet access to your device, follow these steps:
Step 1
Expand Maintenance in the Tree frame.
Step 2
Expand Services in the Tree frame.
Step 3
Select the General branch.
The System Services display appears in the View frame.
Step 4
In the Telnet Server field, check (enable) or uncheck (disable) the Enable check box, and then click Apply.
Assigning a Syslog Server
Note
This task assumes that you have already configured the host and connected it to the InfiniBand fabric.
To assign a Syslog server to store logs from your device, follow these steps:
Step 1
Expand Maintenance in the Tree frame.
Step 2
Expand Services in the Tree frame.
Step 3
Select the General branch.
The System Services display appears in the View frame. You can use either one or two servers.
Step 4
In the Remote Syslog Server field, enter the IP address of the remote server(s) to accept messages from your device, and then click Apply.
Assigning an Authentication Method
To assign an authentication method to your device, follow these steps:
Step 1
Expand Maintenance in the Tree frame.
Step 2
Expand Services in the Tree frame.
Step 3
Select the General branch.
The System Services display appears in the View frame.
Step 4
In the Authentication Method field (under the Radius heading), click a radio button to choose a method, and then click Apply. Table 4-3 describes the radio buttons that you can choose.
Table 4-3 Authentication Methods
Radio Button
|
Description
|
local
|
Authenticates user logins with the local CLI user database only.
|
localThenRadius
|
Authenticates user logins with the local CLI user database; upon failure, authenticates with the RADIUS server.
|
radiusThenLocal
|
Authenticates user logins with the RADIUS server; upon failure, authenticates with the local CLI user database.
|
localThenTacacs
|
Authenticates user logins with the local CLI user database; upon failure, authenticates with the TACACS server.
|
tacacsThenLocal
|
Authenticates user logins with the TACACS server; upon failure, authenticates with the local CLI user database.
|
Configuring HTTP and HTTPS
To configure HTTP and HTTPS services, follow these steps:
Step 1
Expand Maintenance in the Tree frame.
Step 2
Expand Services in the Tree frame.
Step 3
Select the HTTP branch.
The System HTTP display appears in the View frame.
Step 4
(Optional) Check or uncheck the Enable check box in the Polling to enable or disable automatic polling.
Step 5
(Optional) Click a radio button in the Secure Cert Common Name field of the identifier that you want to use for security certification.
Step 6
Click Apply.
Viewing RADIUS Servers
To view the RADIUS servers that you have configured your device to use to authenticate CLI and Chassis Manager logins, follow these steps:
Step 1
Expand Maintenance in the Tree frame.
Step 2
Expand Services in the Tree frame.
Step 3
Select the Radius Servers branch.
The Radius Servers display appears in the View frame. Table 4-4 describes the fields in the Radius Servers table.
Table 4-4 Radius Servers Table Field Descriptions
Field
|
Description
|
Address
|
Displays the IP address of the RADIUS server.
|
UDP Port
|
UDP authentication port of the RADIUS server.
|
Encryption Key
|
Authentication key that the client and RADIUS server use.
|
Timeout
|
Amount of time, in seconds, in which the server must authenticate a login before the login fails.
|
Max Retries
|
Number of sequential logins that a user may perform before the server denies access to the username altogether.
|
Priority
|
Server priority for use.
|
Viewing and Configuring RADIUS Server Properties
To view and configure RADIUS servers to authenticate CLI logins, follow these steps:
Step 1
Expand Maintenance in the Tree frame.
Step 2
Expand Services in the Tree frame.
Step 3
Select the Radius Servers branch.
The Radius Servers table appears in the View frame.
Step 4
Click the radio button to the left of the server whose properties you want to view or configure, and then click Properties.
The Radius Server Properties window opens. Table 4-5 describes the fields in the Radius Server Properties window.
Table 4-5 Radius Server Properties Window Fields
Field
|
Description
|
Address field
|
Displays the IP address of the RADIUS server.
|
UDP Port field
|
UDP authentication port of the RADIUS server.
Edit this value and click Apply to configure the UDP port of the RADIUS server. The numbers to the right of the field indicate the range of integer values that this field supports.
|
Encryption Key
|
Authentication key that the client and RADIUS server use.
Enter a value and click Apply to configure the encryption key of the RADIUS server. The numbers to the right of the field indicate the range of integer values that this field supports.
|
Timeout
|
Amount of time, in seconds, in which the server must authenticate a login before the login fails.
Edit this value and click Apply to configure the timeout value of the RADIUS server. The numbers to the right of the field indicate the range of integer values that this field supports.
|
Max Retries
|
Number of sequential logins that a user may perform before the server denies access to the username.
Edit this value and click Apply to configure the maximum number of retries that the RADIUS server permits. The numbers to the right of the field indicate the range of integer values that this field supports.
|
Priority
|
Server priority for use.
|
Access Requests
|
Number of authentication requests that the server has received from your device since your device booted.
|
Access Accepts
|
Number of logins to your device that the server authenticated since your device booted.
|
Access Rejects
|
Number of logins to your device that the server denied since your device booted.
|
Server Timeout
|
Number of authentications that timed out on the server since your device booted.
|
Adding RADIUS Servers
To configure a new RADIUS server on your device, follow these steps:
Step 1
Expand Maintenance in the Tree frame.
Step 2
Expand Services in the Tree frame.
Step 3
Select the Radius Servers branch.
The Radius Servers table appears in the View frame.
Step 4
Click Add.
The Add Radius Server window opens.
Note
Click Close at any time to abort this process with no changes to your device. Configurations apply only after you click Apply.
Step 5
In the Address field, enter the IP address of the server.
Step 6
(Optional) Edit the UDP Port field. The numbers to the right of the field indicate the range of integer values that this field supports.
Step 7
(Optional) Enter an encryption key in the Encryption Key field.
Step 8
(Optional) Edit the Timeout field. The numbers to the right of the field indicate the range of integer values that this field supports.
Step 9
(Optional) Edit the Max Retries field. The numbers to the right of the field indicate the range of integer values that this field supports.
Step 10
Click Apply.
Deleting RADIUS Servers
To remove a RADIUS server from your configuration, follow these steps:
Step 1
Expand Maintenance in the Tree frame.
Step 2
Expand Services in the Tree frame.
Step 3
Select the Radius Servers branch.
The Radius Servers table appears in the View frame.
Step 4
Click the radio button to the left of the server that you want to delete.
Note
Chassis Manager will not prompt you to be sure that you want to delete this server.
Step 5
Click Delete.
Viewing TACACS Servers
To view the TACACS servers that you have configured your device to use to authenticate CLI and Chassis Manager logins, follow these steps:
Step 1
Expand Maintenance in the Tree frame.
Step 2
Expand Services in the Tree frame.
Step 3
Select the Tacacs Servers branch.
The Tacacs Servers display appears in the View frame. Table 4-6 describes the fields in the Tacacs Servers table.
Table 4-6 Tacacs Servers Table Field Descriptions
Field
|
Description
|
Address
|
Displays the IP address of the TACACS server.
|
Priority
|
Server priority for use.
|
UDP Port
|
UDP authentication port of the TACACS server.
|
Encryption Key
|
Authentication key that the client and TACACS server use.
|
Timeout
|
Amount of time, in seconds, in which the server must authenticate a login before the login fails.
|
Max Retries
|
Number of sequential logins that a user may perform before the server denies access to the username.
|
Viewing and Configuring TACACS Server Properties
To view and update the TACACS servers that you have configured your device to use to authenticate CLI logins, follow these steps:
Step 1
Expand Maintenance in the Tree frame.
Step 2
Expand Services in the Tree frame.
Step 3
Select the Tacacs Servers branch.
The Tacacs Servers table appears in the View frame.
Step 4
Click the radio button to the left of the server whose properties you want to view or configure, and then click Properties.
The Tacacs Server Properties window opens. Table 4-7 describes the fields in the Tacacs Server Properties window.
Table 4-7 Tacacs Server Properties Window Fields
Fields
|
Description
|
Address
|
Displays the IP address of the TACACS server.
|
Priority
|
Server priority for use.
|
UDP Port
|
UDP authentication port of the TACACS server.
Edit this value and click Apply to configure the UDP port of the TACACS server. The numbers to the right of the field indicate the range of integer values that this field supports.
|
Encryption Key
|
Authentication key that the client and TACACS server use.
Enter a value and click Apply to configure the encryption key of the TACACS server. The numbers to the right of the field indicate the range of integer values that this field supports.
|
Timeout
|
Amount of time, in seconds, in which the server must authenticate a login before the login fails.
Edit this value and click Apply to configure the timeout value of the TACACS server. The numbers to the right of the field indicate the range of integer values that this field supports.
|
Max Retries
|
Number of sequential logins that a user may perform before the server denies access to the username.
Edit this value and click Apply to configure the maximum number of retries that the TACACS server permits. The numbers to the right of the field indicate the range of integer values that this field supports.
|
Access Requests
|
Number of authentication requests that the server has received from your device since your device booted.
|
Access Accepts
|
Number of logins to your device that the server authenticated since your device booted.
|
Access Rejects
|
Number of logins to your device that the server denied since your device booted.
|
Server Timeout
|
Number of authentications that timed out on the server since your device booted.
|
Adding TACACS Servers
To configure a new TACACS server on your device, follow these steps:
Step 1
Expand Maintenance in the Tree frame.
Step 2
Expand Services in the Tree frame.
Step 3
Select the Tacacs Servers branch.
The Tacacs Servers table appears in the View frame.
Step 4
Click Add.
The Add Tacacs Server window opens.
Note
Click Close at any time to abort this process with no changes to your device. Configurations apply only after you click Apply.
Step 5
In the Address field, enter the IP address of the server.
Step 6
(Optional) Edit the UDP Port field. The numbers to the right of the field indicate the range of integer values that this field supports.
Step 7
(Optional) Enter an encryption key in the Encryption Key field.
Step 8
(Optional) Edit the Timeout field. The numbers to the right of the field indicate the range of integer values that this field supports.
Step 9
(Optional) Edit the Max Retries field. The numbers to the right of the field indicate the range of integer values that this field supports.
Step 10
Click Apply.
Deleting TACACS Servers
To remove a TACACS server from your configuration, follow these steps:
Step 1
Expand Maintenance in the Tree frame.
Step 2
Expand Services in the Tree frame.
Step 3
Select the Tacacs Servers branch.
The Tacacs Servers table appears in the View frame.
Step 4
Click the radio button to the left of the server that you want to delete.
Step 5
Click Delete.
Viewing Authentication Failures
To view a log of authentication failures for your Server Switch, follow these steps:
Step 1
Expand Maintenance in the Tree frame.
Step 2
Expand Services in the Tree frame.
Step 3
Select the Authentication Failures branch.
The Authentication Failures display appears in the View frame. Table 4-8 describes the fields in this display.
Table 4-8 Authentication Failures Field Descriptions
Field
|
Description
|
CLI Access Violation Count
|
Cumulative number of failed CLI logins since the Server Switch booted.
|
CLI Last Violation Time
|
Time of the most recent failed CLI login.
|
SNMP Access Violation Count
|
Cumulative number of failed SNMP logins since the Server Switch booted.
|
SNMP Last Violation Time
|
Time of the most recent failed SNMP login.
|
HTTP Access Violation Count
|
Cumulative number of failed HTTP logins since the Server Switch booted.
|
HTTP Last Violation Time
|
Time of the most recent failed HTTP login.
|
Viewing Diagnostic Test Results
Available test results vary by hardware platform.
Viewing Card POST Test Results
To view power-on self-test results for a card, follow these steps:
Step 1
Expand Maintenance in the Tree frame.
Step 2
Expand Diagnostics in the Tree frame.
Step 3
Select the POST branch.
The POST Status table appears in the View frame. Table 4-9 describes the fields in the table.
Table 4-9 Card POST Test Status Field Descriptions
Field
|
Description
|
Card
|
Card on which the power-on self-test test ran.
|
Post Status
|
Status of the test.
|
Error Code
|
Applicable error codes that resulted from the test.
|
Viewing Fan POST Test Results
To view power-on self-test results for a fan, follow these steps:
Step 1
Expand Maintenance in the Tree frame.
Step 2
Expand Diagnostics in the Tree frame.
Step 3
Select the POST branch.
The POST Status table appears in the View frame. Table 4-10 describes the fields in the table.
Table 4-10 Fan POST Test Status Field Descriptions
Field
|
Description
|
Fan
|
Fan on which the power-on self-test ran.
|
Post Status
|
Status of the test.
|
Error Code
|
Applicable error codes that resulted from the test.
|
Viewing Power Supply POST Test Results
To view power-on self-test results for a power supply, follow these steps:
Step 1
Expand Maintenance in the Tree frame.
Step 2
Expand Diagnostics in the Tree frame.
Step 3
Select the POST branch.
The POST Status table appears in the View frame. Table 4-11 describes the fields in the table.
Table 4-11 Power Supply POST Test Status Field Descriptions
Field
|
Description
|
Power Supply
|
Power supply on which the POST test ran.
|
Post Status
|
Status of the test.
|
Error Code
|
Applicable error codes that resulted from the test.
|
Viewing FRU Errors
To view FRU errors, follow these steps:
Step 1
Expand Maintenance in the Tree frame.
Step 2
Expand Diagnostics in the Tree frame.
Step 3
Select the Fru Error branch.
The Fru Error display appears in the View frame. The display lists each FRU and any error messages that apply to the FRU.