INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL® PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY
ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS IS GRANTED BY THIS DOCUMENT. EXCEPT AS PROVIDED IN
INTEL'S TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS, INTEL ASSUM ES NO LIABILIT Y WHA T SOEVER, AND INTE L DISCLAIMS
ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/OR USE OF INTEL PRODUCTS INCLUDING LIABILITY OR WARRANTIES
RELATING T O FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY PATENT, COPYRIGHT OR OTHER
INTELLECTUAL PROPERTY RIGHT . Intel products are not intended for use in medical, life saving, life sustaining applications.
Intel may make changes to specifications and product descriptions at any time, without notice.
Designers must not rely on the absence or characteristics of any features or instructions marked "reserved" or "undefined." Intel reserves these for
future definition and shall have no responsibility whatsoever for conflicts or incompatibilities arising from future changes to the m.
Contact your local Intel sales office or your distributor to obtain the latest specifications and before placing your product order.
Copies of documents which have an order number and are referenced in this document, or other Intel literature, may be obtained by calling 1-800-
548-4725, or by visiting Intel's website at http://www.intel.com.
AlertVIEW, AnyPoint, AppChoice, BoardWatch, BunnyPeople, CablePort, Celeron, Chips, CT Connect, CT Media, Dialogic, DM3, EtherExpress,
ETOX, FlashFile, i386, i486, i960, iCOMP, InstantIP, Intel, Intel logo, Intel386, Intel486, Intel740, IntelDX2, IntelDX4, IntelSX2, Intel Create & Share,
Intel GigaBlade, Intel InBusiness, Intel Inside, Intel Inside logo, Intel NetBurst, Intel NetMerge, Intel NetStructure, Intel Play, Intel Play logo, Intel
SingleDriver, Intel SpeedStep, Intel StrataFlash, Intel TeamStation, Intel Xeon, Intel XScale, IPLink, Itanium, LANDesk, LanRover, MCS, MMX, MMX
logo, Optimizer logo, OverDrive, Paragon, PC Dads, PC Parents, PDCharm, Pentium, Pentium II Xeon, Pentium III Xeon, Performance at Your
Command, RemoteExpress, Shiva, SmartDie, Solutions960, Sound Mark, StorageExpress, The Computer Inside., The Journey Inside,
TokenExpress, Trillium, VoiceBrick, Vtune, and Xircom are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United
States and other countries.
March 2004015Changes related to V4.11b frimware verison
March 2004014
October 2003010
April 2003005V3 .00a Release
Changes related to V4.11h firmware
Added new BIST events for RTC and FRU checking.
Added new Chassis Slot event for IPMI capable
Added information on /etc/version checking
Added infomation on chassis FRU validity checking.
Changes related to V4.11c firmware
Added rdate feature information
Changes related to V4.11a firmware version
Changes to Software Update section
Slotcontrol description
Changes to Heatlh Event Strings
Changes related to V4.0x firmware version
New Password Reset Implementation
PSInhibit
Power Sequencing Policies
Updated Warranty and Customer Support information.
12Technical Product Specification
1.0Introduction
1.1Overview
The Intel® NetStructureTM ZT 7102 is a 3U, single-slot Chassis Management Module (CMM)
intended for use with PICMG* 2.1 , 2.16, and 2. 9-compl iant sy stems (the Compact PCI* Hot Swap,
Packet Switching Backplane, and System Management specifications, respectively). This
document details the features and specifications of the ZT 7102.
The ZT 7102 plugs into a dedicated slot in compatible systems. It provides centralized
management and alarming for up to 21 node and/or fabric slots as well as for system power
supplies and fans. The ZT 7102 may be paired with a backup for use in high-availability
applications.
The ZT 7102 is a special purpose single board computer with its own CPU, memory, PCI bus,
operating system, and peripherals. The ZT 7102 monitors and configures Intelligent Platform
Management Interface (IPMI)-based components in the chassis. When thresholds such as
temperature and voltage are crossed or a failure occurs, the CMM captures these events, stores
them in an event log, sends SNMP traps, and drives the Telco alarm relays and alarm LEDs. The
CMM can query FRU information (such as serial number, model number, manufacture date, etc.),
detect presence of components (such as fan tray, CPU board, etc.), and perform health monitoring
of each component. In addition, the CMM controls the power-up sequencing of each node board
and the power to each slot via the BD_SEL# signal.
Intel® NetStructureTMZT 7102 Chassis Manage ment Module
Introduction
The ZT 7102 can also be used at a limited degree to manage non-IPMI based chassis components.
1.2ZT 7102 Features
• High-density 3U X 1-slot form factor
• Compatible with PICMG* 2.1, 2.16, and 2.9-compliant chassis and components
• Monitors via the Intelligent Platform Management Bus (IPMB) protocol
• Provides isolated IPMB signals for each slot for maximum security and reliability
• Manage through the command line interface, SNMP v1/v3, or Remote Procedure Call (RPC)
• Hot-add/hot-swap support for IPMI-based, field-replaceable components
• µDB15 Telco Alarm Interface at the front panel
• Critical, Major, and Minor alarm LEDs at the front panel
• CMM status and hot swap LEDs at the front panel
• Monitors backplane voltages and status for up to eight power supplies
• Monitors system temperature sensors
• Monitors system fan tray presence
• Monitors tachometers for up to 16 system fans
• Monitors sensors on PICMG 2.9 compliant single board computers
• Power state control for single board compute blades
Intel® NetStructureTMZT 7102 Chassis Manage ment Module
1.3Terms Used in This Document
Table 1. Glossary
AcronymDescription
CMMChassis Management Module
CLICommand Line Interface
FRUField Replaceable Unit
IPMIIntelligent Platform Management Interface
IPMBIntelligent Platform Management Bus
MIBManagement Information Base
MIB IIRFC1213 - A standard Management Information Base for Network Management
SELSystem Event Log
SBCSingle Board Computer
SNMPSimple Network Management Protocol
SNMP v.1SNMP version 1
SNMP v.3SNMP version 3
SDRSensor Data Record
Intel® NetStructureTMZT 7102 Chassis Manage ment Module
Hardware Specifications
2.0Hardware Specifications
2.1Overview
The chassis management module (CMM) is intended to operate as a chassis management building
block in a CompactPCI chassis. The CMM uses a unique backplane interface pinout and requires a
dedicated slot within the chassis.
Caution: The ZT 7102 plugs into a dedicated chass is management slot. Syst em components w ill be damaged
if a standard 3U board is plugged into the chassis management slot.
Intelligent Platform Management Buses (IPMBs) are the primary management connection between
components. A unique star topology radiating from the CMMs is used to provide reliability,
flexibility and security. In some cases, direct logic is used to support non-intelligent devices and to
eliminate active components on the backplane and chassis.
The CMM provides 30 master/slave two-wire serial bus (2WSB) interfaces. The 2WSBs are
electrically equivalent to I2C*. As such, all outputs are open drain, so they are driven low and
passively pulled high. The 2WSB interfaces support multi-master operation on the bus, however
they do not support being the target of a read transaction from another master device. The 2WSB
interfaces are used by the CMM as IPMBs or non-intelligent management busses. Refer to the
individual sections for specific usage information. The 2WSB interfaces are used for:
• Up to 21 general-purpose slots (21 independent 2WSBs, 2WSB_S0 - 2SB_S20)
• Power supplies (two buses, 2WSB_PS0 and 2WSB_PS1 )
• Fan trays (one bus, 2WSB_FT)
• Chassis sensors (one bus, 2WS B_ CS )
• Chassis FRU mo dules (two indep endent buses, 2WSB_CF0 and 2WSB_CF1)
• Redundant CMM link (one bus for bi-directional communication, 2WSB_RCMM)
The slots are connected to the CMM via an IPMB defined in the PICMG* 2.9 specification. The
CMM also has connections for BD_SEL# and HEAL THY# signals to each slot. Each slot has an
independent IPMB, BD_SEL#, and HEALTHY#. The CMM supports up to 21 general-purpose
node slots.
The IPMB is used for IP MI management communication between the CMM and the board in the
slot. Each board that is to be managed by the CMM is required to support the IPMB as a
management channel.
BD_SEL# is used in CompactPCI slots to control board power and to detect board presence. The
CMM provides a bi-directional open drain driver for each BD_SEL#. The board installed in the
slot provides a pull-up resistor (1.2 KΩ ± 5% per PICMG* 2.0). The CMM provides a weak
pulldown resistor (and a diode clamp ). When not asserted , BD_SEL# can be read to determine if a
board is present in the slot. If BD_SEL# is high, a board is present. If BD_SEL# is not asserted a
board is not present. Asserting BD_SEL# allows the board to power up.
HEALTHY# is an input to the CMM. The CMM provides a pull-up resistor. The board in the slot
asserts HEALTHY# based on board power being good and optionally other board-specific
requirements. BD_SEL# must be asserted for HEALTHY# to be asserted. When BD_SEL# is
asserted, and a board is removed, HEALTHY# will be deasserted.
18Technical Product Specification
Intel® NetStructureTMZT 7102 Chassis Manage ment Module
2.3.2Chassis Sensor Connections
Chassis sensors are connected to the CMM via one two-wire serial bus.
2.3.3Chassis FRU Device Connections
Chassis sensors are connected to the CMM via one two-wire serial bus. The CMM provides two
2WSB interfaces for chassis FRU modules. Each chassis FRU module is on a dedicated 2WSB in
order to provide redundant access to vital chassis information (e.g., the physical location of the
chassis). The backplane FRU storage device used MUST be an Atmel* AT24C16 or other
24C16-compatible device.
2.3.4Redundancy
The CMM supports redundant operation with automatic failover under hardware or software
control. The following hardware interfaces exist for the support of redundancy and automatic
failover:
• Cross-connected CMM present inputs (PRES_I#) and outputs (PRES_O#)
• Cross-connected CMM healthy inputs (HLY_I#) and outputs (HLY_O#)
• Cross-connected negotiation inputs (NEG_I) and outputs (NEG_O)
Hardware Specifications
The active CMM monitors its PRES_I# and HL Y_I# inputs to determine if it has a healthy, standby
CMM. The active CMM deasserts its HLY_O# output to trigger a failover to the standby CMM.
The cross-connected negotiation signals are used to assure that only one CMM is active at a time.
At anytime, the standby CMM can trigger a failover by driving its NEG_O output low.
2.4Power Modules
Power supply sleds are connected to the CMM via two IPMBs. Each power supply sled connects to
one IPMB. Multiple power supplies can share a single IPMB. The CMM also provides independent
DEG#, FAIL#, and INH# signals as defined in PICMG* 2.11 for up to eight power supplies. The
CMM will communicate with intelligent supplies via the IPMBs. Non-intelligent supplies are
supported via the DEG# (degrade), FAIL# (fail), and INH# (inhibit) signals.
The CMM uses INH# rather than EN# t o control the power supplies. The EN# pin is grounded on
the backplane to signal to a power supply when it is fully seated in its connector.
2.5Fan Modules
Fan trays are connected to the CMM via one two-wire serial bus (2WSB). Intelligent fan trays
communicate with the CMM via the IPMB. To support non-intelligent fan trays, the CMM also
provides independent fan tachometer input s for up to 16 fans, fan t ray pr esen t inputs for up to four
fan trays, and four fan speed outputs (four buffered copies of a single PWM). Non-intelligent fan
trays are monitored and controlled via the fan tachometer inputs and the fan speed output.
The following features are found on the faceplate of the ZT 7102:
T able 2. Faceplate Features
FeaturePurpose
Minor, Major, and Critical Alarm
LEDs
Alarm Cutoff (ACO) push button
Telco Alarm I nterface (µDB15
connector)
COM Port (RJ-45 connector)
Ethernet Port (RJ-45 with LEDs)
CMM Status LED
Hot Swap LED
Ejector with hot swap switch
Intel® NetStructureTMZT 7102 Chassis Manage ment Module
Hardware Specifications
These LEDs indicate the presence of various event-triggered alarms.
The LEDs function as follows:
Off = no alarm triggered.
Amber = alarm triggered.
Blinking = alarm cutoff (ACO) is activated.
This push button toggles the ACO state. When ACO is activated, the
active alarm LEDs blink and all of the alarm relays are deactivated. This
button does not clear alarms.
The ZT 7102 can be reset by pressing and holding the ACO button for
about five seconds.
This interface relays alarm signals to off-board equipment. Contact Intel
for a compatible cable (µDB15 to standard DB15). See Appendix G,
“Customer Support.” for details.
This serial port may be used to access the CMM's Command Line
Interface (CLI).
This port provides an out-of-band 10/100 Ethernet connection. The
port's integrated LEDs function as follows:
Yellow: Off = 10 Mbit
On = 100 Mbit
Green: Off = No Link
On = Link
Blinking = Ac tivity
This LED indicates CMM status as follows:
Green = power is on and the board is acting as the master (active)
CMM.
Blinking green = power is on and the board is acting as the backup
(standby) CMM.
Red = the CMM needs attention (a critical problem exists).
This LED indicates when it is safe to remove the CMM from a live
(powered-on) chassis. The LED functions as follows:
Off = the CMM is not ready to be removed from a live chassis.
Blue = the CMM is ready to be removed from a live chassis.
The ejector functions as a handle and a lever for installing or removing
the CMM. The ejector incorporates a switch that tells the CMM when the
board is about to be removed from a system.
In a compatible enclosure, the ZT 7102 occupies a single 3U CMM slot. Mechanical dimensions
are shown in Figure 4 and outlined in Table 3.
Table 3. Board Dimensions and Weight
PCB Dimensions:100 mm x 160 mm x 1.6 mm
Board Dimensions:3U x 4HP (one slot)
Weight:7.7 ounces w/ 128 Mbyte SODIMM
2.7.2PCB Dimensions
Figure 4. PCB Dimensions
2.8Connectors
As shown in Figure 5, the ZT 7102 includes several connectors to interface to application-specific
devices. A brief description of each connector is given in Table 4 below. A detailed descr iption and
pinout for the backplane connectors is given in the following sections.
Table 4. Connector Assignments
ConnectorFunction
J1, Table 5Backplane Connector (110-pin, 2mm x 2 mm, female)
J2, Table 6Backplane Connector (55-pin, 2 mm x 2 mm, female)
J3, Table 7Backplane Connector (55-pin, 2 mm x 2 mm, female)
J4Connector reserved for test.
JA1, Table 10Ethernet Connector (RJ-45, 8-pin)
J6, Table 11Serial Port (RJ-45, 8-pin)
J1 is a 110-contact, 2 mm x 2 mm female CompactPCI form-factor connector (AMP 352152-1).
See Table 5 for pin definitions and Figure 6, “Backplane Connectors - Pin Locations” on page 23
for relative pin placement.
NOTE: # Designates a low true signal. All signals interface to medium length pins on the backplane.
GROUND
SHIELD
2.8.2J2 Backplane Connector
J2 is a 55- contact, 2 mm x 2 mm female CompactPCI* form-factor connector (AMP* 352115-1).
See Table 6 for pin definitions and Figure 6 for relative pin placement.
CS_SDA1ODChassis Sensor IMPI data
CF_SCL[0..1]2ODChassis FRU IMPI clock
CF_SDA[0..1]2ODChassis FRU IMPI data
R_SCL1ODRedundant CMM serial clock
R_SDA1ODRedundant CMM serial data
N_HLY#[1..21]21INode Healthy (0 = Node is healthy)
N_BDS#[1..21]21
SwTx(+/-)2I/O10/100 Ethernet To Switch
SwRx(+/-)2I/O10/100 Ethernet From Switch
FANTK[0..15]16IFan Tach Inputs
FANPWM[0..3]4OFan Speed Control (3.3 V = ON)
FANP#[0..3]4IFan tray present (3.3 V = fan tray is missing)
PDEG#[0..7]8IPower supply degrade
PFAIL#[0..7]8IPower supply fail
PINH#[0..7]8OPower supply inhibit
STx1OSer ial transmit
SRx1ISerial receive
SCTS1ISerial clear to send
SRTS1OSerial request to send
SDSR1ISerial data set ready
OD
I/O
Node Board Select (5 V = Node is present, drive to 0
to turn node on)
26Technical Product Specification
Table 9. Pin Descriptions (Sheet 2 of 2)
NameCountTypeDescription
SDTR1OSerial data terminal ready
SRI1ISerial ring indicator
SCD1ISerial carrier detect
RpTx(+-)2I/O10/100 Ethernet To rear panel
RpRx(+-)2I/O10/100 Ethernet From rear panel
NEG_O1ONegotiate output to other CMM
NEG_I1INegotiate input from other CMM
HLY_O#1OHealthy output to other CMM
HLY_I#1IHealthy input from other CMM
PRES_I#1IOther CMM is present (0V)
PRES_O#1OGrounded on CMM.
GA01ILocation Address
CMM_SEL#1I
GND14ICMM GND
IPMB_PWR8ICM M Power
BP_12V, BP_N12V,
BP_5V, and
BP_3.3V
RPMAC#1IRear panel major alarm clear
RPMIC#1IRear panel minor alarm clear
RPCR#1ORear panel critical alarm relay
RPMAR#1ORear panel major alarm relay
RPMIR#1ORear panel minor alarm relay
VIO1I
RES18NCNo Connect on Backplane
TOTAL220
4IMonitor backplane power 12,-12,5,3.3
Intel® NetStructureTMZT 7102 Chassis Manage ment Module
Hardware Specifications
Tells CMM it has been seated. (Backplane grounds
this pin)
Backplane IO voltage (may not be present in non-PCI
system)
2.8.5JA1 Ethernet Port
JA1 is an RJ -45 Etherne t port providing 10 Mbit (10BASE -T) and 100 Mbit (100BASE-TX)
protocols. JA1 connects to the CMM's LAN 0 Ethernet channel. A second Ethern et channel, LAN1,
is only available at the backplane.
Two LEDs are located in the RJ-45 Ethernet connector:
• Yellow indicates speed
• Green indicates a link/activity
See Table 10 for JA1 Ethernet port pin definitions.
1TX+
2TX3RX+
4,5Unused pair; terminated on ZT 7102
6RX7Unused pair; terminated on ZT 7102
2.8.6J6 Serial Port
J6 is an RJ-45 connector providing a front-panel RS-232 serial port interface. Serial port signals are
also directed out connector J1 to the backplane. See Table 11 f or J6 serial port pin definitions.
Table 11. J6 Serial Port Pinout
Pin#FunctionDescription
1SRTSSerial Request To Send
2SDTRSerial Data Terminal Ready
3STxSerial Transmit
4GNDGround
5GNDGround
6SRxSerial Receive
7SDSRSerial Data Set Ready
8SCTSSerial Clear to Send
-SRISerial Ring Indicator (not utilized)
-SCDSerial Carrier Detect (not utilized)
2.8.7J7 Telco Alarm Connector
J7 is a µ DB-15 connector providing a front-panel telco alarm interface. See Table 12 for J7 Telco
alarm connector pin definitions. Contact Intel for information about obtaining a compatible
µDB-15 to DB-15 cable. Contact information is located in Appendix G, “Customer Support”.
For additional information on the Telco Alarm Connector, refer to the Wiring Telco Alarm Connectors Application Note posted at the following location:
Intel® NetStructureTMZT 7102 Chassis Manage ment Module
Table 12. J7 Telco Alarm Connector Pinout
Pin #FunctionDescription
1AMIR+MinorReset +
2AMIR-MinorReset 3AMAR+MajorReset +
4AMAR-MajorReset 5ACNOCriticalAlarm - NO
6ACNCCriticalAlarm - NC
7ACCOMCriticalA larm - COM
8AMINOMinorAlarm - NO
9AMINCMinorAlarm - NC
10AMINCOMMinorAlarm - COM
11AMANOMajorAlarm - NO
12AMANCMajorAlarm - NC
13AMACOMMajorAlarm - COM
14APRCOPwrAlarm - NO
15APRCOMPwrAlarm - COM
-GNDNot Utilized
COM=Common
NO=Normally Open
NC=Normally Closed
Hardware Specifications
2.9Electrical and Environment al
The ZT 7102 requires +5 VDC ±5% @ 1.8 A typical. CMM power comes from the backplane's
IPMI_PWR rail; other voltages are derived as needed.
Caution: The processor core temperature must never exceed 100° C under any condition of ambient
temperature or usage. This may result in permanent damage to the processor.
2.9.1CMM Power
CMM power comes from the backplane’s 5 V power (IPMI_PWR). See Table 13 for available
voltages.
Table 13. CMM Power Availability
VoltageMaximum CurrentWhere Used
5100 mAMiscellaneous components that cannot use 3.3 V.
The ZT 7102 features a power controller with power ramp circuitry to allow the board’s voltages to
be ramped in a controlled fashion. The power ramp cir cuitry eliminates large voltage or current
spikes caused by hot swapping boards. Controlled voltage ramping is a requirement of the
CompactP CI* Hot Swap Specification, PICMG* 2.1, Version 2.0.
Fault current sensing is also provided. When a board fault (short circuit) or overcurrent condition is
detected, the hot swap controller automatically removes power from the CMM component s, and
the Status LED on the faceplate illuminates red (see Table 3, “Face Plate” on page 20). Fault
protection activates when the current exceeds 10 A for longer than 10 ms.
2.9.3Operating Temperature
The ZT 7102 processor can operate between +5° C and approximately +65° C ambient. It is the
users' responsibility to ensure that the ZT 7102 is installed in a chassis capable of supplying
adequate airflow. The maximum power dissipation of the processor is 15 W (10 W typical).
External airflow must be provided at all times.
Caution: The processor core temperature must never exceed 100° C under any condition of ambient
temperature or usage. This may result in permanent damage to the processor.
2.9.4Reliability
MTBF: 479,000 hours at 40° Celsius
MTTR: Three minutes (based on hot-swap board replacement), plus system startup
2.9.5Absolute Maximum Ratings
See Table 14 for absolute maximum ratings.
Note: These are stress ratings only. Do not operate the ZT 7102 at these maximums. See Section 2.9.6,
“DC Operating Characteristics” on page 31 for operating conditions.
Table 14. Absolute Maximum Ratings
Signal or CharacteristicRange
Supply Voltage, V
Storage Temperature-40° to +85° Celsius
Operating Temperature+5° to +65° Celsius
Non-Condensing Relative Humidity<95% at 40° Celsius
CC
5 V ±5% with 50 mV maximum ripple
30Technical Product Specification
Intel® NetStructureTMZT 7102 Chassis Manage ment Module
2.9.6DC Operating Characteristics
T a ble 15. DC Operating Characteristics
SignalRange
Hardware Specifications
Supply Voltage, V
Supply Current, I
CC
CC
2.10Onboard Switches
The ZT 7102 contains a push-button switch on the faceplate and one bank of DIP switches on the
component side of the board. See Table 16 for switch identification and functions. Factory defa ult
switch settings are shown in Figure 7.
Note: Where switches are referenced in this chapter, “SWx” refers to the switch number and “-N” refers
to the switch segment (SW1-2 indicates “switch number 1, segment 2”).
Table 16. Switch Cross Reference Table
SwitchFunction
S1, “S1 (Alarm Cutoff and Board Reset)” on page32 Alarm Cutoff and Board Reset
SW1-1, “SW1-1 (Password Reset)” on page 32Reset Password
SW1-2Reserved
SW1-3Reserved
SW1-4Reserved
4.85 V minimum to 5.25 V maximum
1.8 A average (with 733 MHz processor and 32 Mbyte of SDRAM. Peak
(short duration) power supply current may be significantly higher (up to
50%) and varies depending upon the application.
See Figure 7 for the default switch configuration.
The following topics provide a detailed description of each switch.
2.10.1.1S1 (Alarm Cutoff and Board Reset)
S1 is a push button at the faceplate of the ZT 7102. S1 toggles the CMM's alarm cutoff (ACO)
state. When ACO is activated, the active alarm LEDs blink and the alarm relays are deactivated.
This button does not clear alarms.
The Alarm Cutoff feature automatically cancels itself under the following conditions:
• When the ACO is engaged for more than 10 minutes without an active alarm present. This
prevents the ACO from being accidentally left engaged after an alarm is cleared).
• When the ACO is engaged for more than x minutes, ev en if an active alarm is present ( x can be
set in the Command Line Interface with the Data item keyword AlarmTimeOut, see Table 23,
“dataitem (-d) Keywords for All Locations” on page 58).
In addition to its ACO function, S1 is used to reset the CMM by pressing and holding the button for
about five seconds. Reset is discussed in more detail in Section 4.0, “CMM Redundancy,
Synchronization and Failover” on page 39.
2.10.1.2SW1-1 (Password Reset)
Closing this switch resets the CMM's root logon password. Use this feature if you forget your
password or want to restore the default root password for other reasons. For more information
about resetting to the default root password, refer to Section 9.0, “Resettin g the Password” on
page 63.
Table 17. SW1-1 Functions
SW1-1Function
Open [default]Does not reset the CMM's root password at reboot.
ClosedResets the CMM's root password at reboot.
2.11Processor and Chipset
The Intel® IOP310 chipset contains two devices, the Intel® 80200 processor and the Intel® 80312
I/O companion chip. The 733 MHz 80200 processor features 32 Kbit data and instruction caches.
The 80312 companion chip provides a memory controller and a PCI interface for the CMM's
Ethernet controllers. Appendix E, “Datasheet Reference” contains a link to the datasheet for the
chipset.
The ZT 7102 uses the Intel
microarchitecture, this chipset combines high performance processing with ultra-low power
consumption.
®
IOP310 I/O proc e ssor chipset. Based on Intel XScale®
32Technical Product Specification
2.12Memory
The ZT 7102 includes 128 Mbytes of SDRAM on a Small Outline Dual Inline Memor y Module
(SODIMM). The SODIMM used is 16 Mbits x 72 PC133 unbuffered SDRAM with ECC on a
144-pin module.
2.12.1Removing the SODI MM
The following instructions cover the mechanical aspects of removing the SODIMM from a
ZT 7102.
1. T ake the necess ary precaution s to protect the ZT 7102 and the SODIMM from static discharge.
2. Locate the SODIMM socket. Refer to Table 4, “Connector Assignments” on page 22 for the
socket's location.
3. Press outward on the clips at either end of the SODIMM socket (press both clips at the same
time) until the module ejects from the slot and tilts upward.
4. Pull the SODIMM away from the socket.
2.12.2Installing Memory
Intel® NetStructureTMZT 7102 Chassis Manage ment Module
Hardware Specifications
The following instructions cover the mechanical aspects of installing the SODIMM in a ZT 7102.
1. T ake the neces sary precautions to protect the Z T 7102 an d the SODIMM from s tatic discharge.
2. Hold the SODIMM at an angle and push it into the SODIMM socket. Refer to Table 4,
“Connector Assignments” on page 22 for the socket's location.
3. Align the notches on the ends of the module with the matching bumps on the latches and
gently push the module down until it clicks in place.
2.13Flash
The ZT 7102 uses an on-board 64 Mbyte flash memory device.
2.14Dual Ethernet Controllers
The ZT 7102 uses two Intel®82559 Fast Ethernet Controllers. The 82559 consists of both the
Media Access Controller (MAC) and the physical layer (PHY) interface combined into a single
component solution.
The CMM provides an RJ-45 connector on the faceplate to connect to out-of-band 10/100 LAN0.
This connector is labeled with the Ethernet icon (refer to “Face Plate” on page 20). Care should be
taken not to confuse the RJ-45 Ethernet port with the RJ-45 serial port that is next to it. (Note that
the Ethern et port has integrated speed and activity LEDs).
2.15Serial I/O
The ZT 7102 provides an RS-232 compatible RJ-45 serial port connector on the faceplate. Serial
port signals are also available for rear panel access.
The ZT 7102’s alarm relay circuits are capable of carrying 60 VDC or 1 A, wit h a maximum ra ting
of 30 VAC.
2.16.2Opto Inputs
The ZT 7102 accepts timed pulse inputs for clearing Minor and Major alarm states (there is no
reset for the Critical state). Reset is accomplished by asserting a voltage differential from 3.3 V to
48 V for between 200 and 300 ms. The acceptable voltage range is from 0 to 48 VDC continuous
(handles up to 60 VDC at a 50 percent duty cycle). The current drawn by a reset input should not
exceed 12 mA.
Caution: Do not apply more than 60 V (maximum) to any pin or combination of pins on the CMM's J7 Telco
Alarm connector.
2.17Real Time Clock
A Dallas Semiconductor* DS1307 Serial Real-Time Clock allows the ZT 7102 to keep track of
time for accurate event logging. The DS1307 features 56 bytes of nonvolatile SRAM, a 100-year
calendar, and battery backup.
The Real-Time Clock keeps time in UTC only. If the time is set for a different time zone, as in the
example below, the difference will be automatically calculated giving the UTC equivalent. In this
example, the time will be set 8 hours ahead of the local time.
To set the real-time clock, enter the correct date and time in the following format:
setdate 'Thu Apr 01 09:04:29 PST 2004'
The above command would set the time and date to the following:
Thu Apr 1 17:04:29 UTC 2004
Note: The real-time clock should be set to current date and time out of the box.
2.18Networ k Time Synchronization
The CMM supports the RFC 868 Time Protocol. This allows the CMM to be configured to retrieve
the date and time from a server over a TCP/IP network using the rd ate command. To properly
configure time synchronization using the RFC 868 Time Protocol, follow the steps below.
Enable RFC 868 Time Protocol on a Linux/Unix Host (server):
• In general this depends upon the OS and version. Please consult your OS documentation.
• The easiest way to enable this service is to use the OS GUI to enable the "time" server. This is
part of inetd/xinetd.
34Technical Product Specification
Enable RFC 868 Time Protocol on CMM (client):
1. Create file "/etc/rdate.cfg".
2. Edit file "/etc/rdate.cfg" with a valid host name or IP address of an enabled RFC 868 Time
Protocol server.
3. Reboot the CMM, and check the new date (use "date") to make sure it is identical to the RFC
868 Time Protocol server (use "busybox rdate -p <host name or IP>".
4. This file will only be preserved during upgrades to same or newer versions.
Note: Since rdate is executed during CMM boot, it is possible that on a chassis powerup the CMM may
not be able to sync up with a server if the network path to it is through the backplane Ethernet port.
For proper network time synchronization during CMM boot, the CMM should be able to contact
the time server through the front Ethernet port.
2.19Watchdog Timer
The ZT 7102 uses a Maxim* MAX6374KA-T watchdog timer to supervise processor activity.
When the software fails to strobe the watchdog within a set period (once every second), the
watchdog alerts the CMM's Complex Programmable Logic Device (CPLD), which resets the CPU.
Intel® NetStructureTMZT 7102 Chassis Manage ment Module
Hardware Specifications
2.20Battery Backup
The CMM contains a CR 1025 onboard battery to retain certain functions such as the real time
clock, even when no standb y power to the board is present. I f it becomes apparent that the time and
date no longer stay current, then the battery should be replaced. The battery should only be
replaced with a lithium CR 1025 or equivalent. After the battery is replaced, use the setdate
command to set the time correctly. See Section 2.17, “Real Time Clock” on page 34 for
information on setting the time and date.
Note: Date and time are critical to the operation of the CMM because health events are stamped with this
information. Always ensure the date and time of the CMM are kept current.
2.20.1Replacing the Battery
1. Slide the battery out from the battery retention clip.
2. Slide the new battery into the clip with the positive (+) side up. The metal arm of the retention
clip should rest on top of the positive side of the battery.
T a ble 18. Battery Characteristics
CharacteristicDescription
Battery Voltage:3 V
Battery Capacity:30 mAh
Real-Time Clock Requirements:300 uA typical, 500 uA maximum (Vbat = 3 V, Vcc = 0 V)
Real-Time Clock Data Retention:
Electrochemical Construction:Long-life lithium with solid-state polycarbon monofluoride cathode.
11.4 years typical/6.8 years minimum (not powered). When powered,
RTC takes its power from +5v, not battery.
Caution: The ZT 7102 contains a lithium battery. Do not disassemble or recharge th e battery. Do not dispose
of the battery in fire. When the battery is replaced, the same type or an equivalent type
recommended by the manufacturer must be used. Used batteries must be disposed of according to
the manufacturer's instructions.
2.21Running Your System Without A CMM
In CMM-based systems, the CMM controls power to the general-purpose slots in accordance with
the PICMG* 2.1 specification. PICMG* 2.1 defines the power control signals (BD_SEL#) as
pulled up on general-purpose boards. When the BD_SEL# signals are not asserted (grounded) by
external means, the general-purpose boards will not power up . Therefo re, to operate a CMM-b ased
system without a CMM board, BD_SEL# must be grounded at each slot on the backplane.
Your system may have jumpers at each slot on the backplane to ground BD_SEL#. Inserting the
BD_SEL# jumper will allo w the n ode slot to po wer up regardl ess of the CMM. Node slots with t he
BD_SEL# jumper installed canno t be managed using the CMM. Refer to system-specific
documentation for more information about running the system with or without a CMM board.
36Technical Product Specification
Intel® NetStructureTMZT 7102 Chassis Manage ment Module
3.0Software Specifications
3.1Operating System
Software Specification s
The CMM runs a customized version of embedded BlueCat* Linux* 4.0 on an Intel® 80200
processor with Intel XScale
the web at http://www.lynuxworks.com
®
technology. Development support for BlueCat Linux* is avail able on
.
3.2Command Line Interface (CLI)
The Command Line Interface (CLI) connects to and communicates with the intelligent
management devices of the chassis, boards and the CMM itself. The CLI is an IPMI-based library
of commands that can be accessed directly or through a higher-level management application.
Administrators can access the CLI through Telnet or the CMM's serial port. Using the CLI, users
can access information about the current state of the system including current sensor values,
threshold settings, recent events, and overall chassis health.
3.3SNMP/UDP
The chassis management modul e supports both queries and traps on SNMP v1 or v3. The SNMP
version can be configured through the CLI interface. The default is for SNMP v1. A MIB for the
entire platform is included with the CMM.
Along with SNMP traps, the CMM sends UDP alerts to port 10000. The content of these UDP
alerts is the same as the SNMP traps.
3.4Remote Procedure Call (RPC) Interface
In addition to the console command-line interface, the CMM can be administered by custom
remote applications via remote procedure calls (RPC).
3.5Ethernet Interfaces
Eth1 is the Ethernet port going to the backplane on the CMM. Eth1 should remain static at all
times. It is through this port that synchronization will be attempted initially. For synchronization to
occur on eth1, both Ethernet switches must be pres ent in the chassis.
Eth1:1 is a an IP address used to connect to the active CMM at any time through the chassis
backplane and therefore should remain static. Eth1:1 is a static alias of eth1 defined in the
/etc/ifcfg-eth1 file as STATICIP2. Because this IP address is synced between the two CMMs, it
should only be changed on the active CMM. See Section 7.3.1, “Setting IP Address Properties” on
page 54 on how to set the eth1:1 IP address.
Eth0 is the Ethernet interface on the front of the CMM that can connect to an external or private
management network through a s witch or t hrough a cro ssov er to the ot her CMM. Thi s is used i f no
Ethernet switches are available in the chassis. Eth0 can be set to static or DHCP.
In a platform containing redundant CMMs, upon initial power up, both CMMs will have identical
IP addresses on all of their Ethernet interfaces. The s tandby CMM will automatically decr ement its
IP address on Eth1 by 1 so t hat s yn chronization can occur; however, the user must change these IP
addresses upon initial login so that an address conflict does NOT occur and synchronization and
failover can operate correctly. See Section 7.3.1, “Setting IP Address Properties” on page 54 for
further information and instructions on changing the IP addresses. See Section 4.0, “CMM
Redundancy, Synchronization and Failover” on page 39 for further information regarding
synchronization, failover, and redundancy.
3.6Sensor Event Logs (SEL)
The chassis management module utilizes a dual domain for hosting the sensor event logs (SEL) of
the chassis components and boards used in the platform. With the dual domain architecture, some
SEL files are stored locally on the CMM in /etc/cmm, and some SEL files are stored on the
individual blades.
For the CMM, backplane, and chassis components, the CMM stores the SELs locally on the CMM
in /etc/cmm.
3.6.1CMM SEL Architecture
The SEL files stored locally on the CMM in /etc/cmm have a maximum size of 8 Kbytes. If a SEL
becomes full, the CMM will wrap the SEL to the beginning, and all previous SEL entries will be
cleared.
3.6.2Satellite Management Controller (SMC) Boards
For a board inserted into the platform acting as a satellite management controller (SMC), the CMM
will also store the SEL file locally. Some SMC-based boards may also contain their own SEL.
Health events generated from SMC-based boards will be stored in the SEL on the CMM as well as
on the SMC board if a SEL exists. When the command is issued to get the SEL from an
SMC-based board, the CMM will always retrieve the SEL file stored locally on the CMM in
/etc/cmm.
3.6.3Baseboard Management Controller (BMC) Boards
For boards inserted into the system acting as a baseboard management controller (BMC), the SEL
file will be stored on that particular board. All health events will be logged in the SEL on that
board. When the command is issued to get the SEL from the board, the CMM will retrieve the
entire SEL via IPMB from that board.
3.6.4Retrieving a SEL
The CLI can be used to retrieve the SEL for a location. To retrieve the SEL for a particular
location, issue the following get command:
cmmget -l [location] -d SEL
Where location is the component you wish to retrieve the SEL for (cmm, chassis, bladeN).
38Technical Product Specification
Intel® NetStructureTMZT 7102 Chassis Manage ment Module
CMM Redundancy, Synchronization and Failover
4.0CMM Redundancy, Synchronization and
Failover
4.1Overview
The CMM supports redundant operation with automatic failover in chassis using redundant CMM
slots. In systems where two CMMs are present, one acts as the active chassis manager and the other
as standby. Both CMMs monitor each other, and either can trigger a failover if necessary.
Data is always synchronized from the active CMM to the standby CMM whenever any changes
occur. Exis ting data o n the standby CMM is over written. A f ull synchronization b etween the active
and standby CMM occurs on initial power up or insertion of a new CMM. See Table 19, “CMM
Synchronization” on page 40 for a list of data items that are synchronized between the active and
standby CMM.
4.2Hardware Redundancy Specification
The following hardware interfaces exist for the support of redundancy and automatic failover:
• Cross-connected CMM present inputs (PRES_I#) and outputs (PRES_O#)
• Cross-connected CMM health inputs (HLY_I#) and outputs (HLY_O#)
• Cross-connected negotiation inputs (NEG_I) and outputs (NEG_O)
The active CMM monitors its PRES_I# and HLY_I# inputs to determine if it has a healthy standby
CMM. The active CMM deasserts its HLY_O# output to trigger a failover to the standby CMM.
The cross-connected negotiation signals are used to assure that only one CMM is active at a time.
At any time, the standby CMM can trigger a failover by driving its NEG_O output low.
4.3Synchronization
To ensure data on the standby CMM matches the data on the active CMM, the active CMM
synchronizes its data with the standby CMM, overwriting any existing data on the standby CMM.
The CMMs will initially fully synchronize data from the active to the standby CMM approximately
30 seconds after the CMMs boot (which can take up to 2 minutes total for both CMM boot and
synchronization). An insertion of a new CMM will also cause a full synchronization from the
active to the newly inserted standby, which also takes 2 minutes. Partial synchronization will also
occur any time files are modified or touched via the Linux* “touch” command. Date and time are
synched every hour.
Note: During synchronization, the LEDs on the standby CMM may blink on and off as the healthevents
that were logged in the SEL are synchronized.
The following items are synchronized between CMMs. During a full synchronization, all of these
files and data are synchronized. A change to any of these files results in that file being sy nche d.
The active CMM overwrites these files on the standby CMM.
/etc/cmm.cfgCMM’s main configuration fileEthernet
/etc/passwdPassword fileEthernet
/etc/shadowPassword fileEthernet
/etc/cmm/sel_*All SEL files except the CMM SEL filesEthernet
/etc/cmm/*.binAll SDR FilesEthernet
/etc/cmm/*.sifAll SIF FilesEthernet
/etc/cmm/DroneList.cfgDrone mode compatible formsEthernet
/etc/cmm/PWMMap.cfgPWM Fanspeed MappingEthernet
/etc/cmm/SlotLayout.cfgChassis slot layout configurationEthernet
/etc/var/snmpd.confSNMP configuration filesEthernet
/etc/snmpd.confSNMP configuration filesEthernet
/home/scriptsEntire user scripts areaEthernet
date and timeDate and timeIPMB
IP Address SettingsCMM eth1, eth1:1, and eth0 IP address settingsIPMB
Blade power statesStatus of blade power statesIPMB
Power Supply Inhibit StatesStatus of power supplies that are inhibited by the CMMIPMB
Warning:The /.rhosts file is used for synchronization and should NEVER be modified.
4.3.1Synchronization Requirements
For synchronization to occur:
• The CMMs must be able to communicate with each other over their dedicated IPMB. The
CMMs use a heartbeat via their dedicated IPMB to determine if they can communicate with
each other over IPMB.
• An Ethernet connection must exist between the two CMMs. The CMMs must be able to ping
each other via Ethernet for synchr onization to b e succes sful. This can be a connection through
the Ethernet switches in the chassis, which requires both switches to be present in the chassis.
A connection can occur through an external Ethernet switch conn ected to the front ports of the
CMM pair, or alternatively, the connection can be a crossover cable connecting the two front
ports of the CMM pair. If synchronization fails on Eth1, it will be attempted on Eth0. If the
CMMs cannot successfully ping each other via Eth0 or Eth1, synchronization cannot occur.
A failure of synchronization to occur will result in a health event being logged in the chassis SEL,
however this will not inhibit a failover from occurring.
40Technical Product Specification
Intel® NetStructureTMZT 7102 Chassis Manage ment Module
4.4CMM Failover
Once information is synchronized between the redundant CMMs, the active CMM will constantly
monitor its own health as well as the health of the standby CMM. In the event of one of the
scenarios listed in the sections that follow, the active CMM will automatically fail over to the
standby CMM so that no management functionality is lost at any time.
4.4.1Scenarios That Force a Failover
The following scenarios cause a failover as long as the s tandby CMM is operational:
• The active CMM is pulled out of the chassis.
• The active CMM’s HEALTHY# signal is deasserted.
• A reboot command is issued to the active CMM.
• The front panel reset button on the active CMM is pushed in for more than five seconds.
• The internal synchronization code version of the active CMM is less than that of the standby
CMM.
4.4.2Scenarios That Prevent Failover
CMM Redundancy, Synchronization and Failover
The following are reasons a failover cannot occur:
• The active CMM cannot communicate with the standby CMM via their IPMB bus.
• Not all data has been completely synchronized between the CMMs.
To determine the active CMM, use the CLI command:
cmmget –d redundancy
Eth1:1 will always point to the active CMM, which will allow you to access the active CMM
through the chassis at all times.
4.4.3Scenarios That Failover to a Healthier Standby CMM
The scenarios listed below can only cause a failover if the standby CMM is in a healthier state than
the active CMM. The health of the CMM is determined by computing a CMM health score, which
is equal to the sum of the weights of the following active conditions. A CMM health score is
determined for each CMM whenever any of these conditions occur on the active CMM. The CMM
health score is composed of the sum of the weights of any of the three conditions listed below. Ea ch
condition has a default weight of 1 assigned to it, causing all conditions to have equal importance
in causing failover.
To determine if a failover is necessary when one of these conditions occurs, the active CMM
computes its CMM health score, and r eques t s the health score of the standby CMM. If the score of
the standby CMM is LESS than the score of the active CMM, a failover will occur. If a failover
does not occur, the Chassis SEL will contain an entry indicating the reason failover did not occur.
1. SNMPTrapAddress1 ping failure:
A condition is asserted and a health score is computed if the active CMM cannot ping its first
SNMP trap address as defined in the SNMPTrapAddress1 setting. Only a ping failure of the
first SNMP trap address (SNMPTrapAddress1) can cause the condition to assert.
SNMPtrapaddress2 through SNMPtrapaddress5 do not perform this ping test.
Note: The frequency of the ping to the first trap address can vary from one second to approximately 20
seconds.
2. Unhealthy Ethernet Switch:
A condition is asserted and a health score is computed if the active CMM’s corresponding
Ethernet switch is not healthy or not present. The switch health is determined by the state of
the HEALTHY# hardware signal coming from the Ethernet switch. Refer to the chassis
specification to see which switch corresponds to the CMM. If both CMMs have unhealthy
switches or are not present in the chassis, then a failover can still occur based on other failover
conditions depending on the CMM health scores.
3. Critical events on the active CMM:
A condition occurs if the active CMM has critical events for any of the CMM sensors (not
chassis or blade sensors). Critical events are events associated with crossing an upper o r lower
nonrecoverable threshold of a sensor. If both CMMs have critical CMM events, then the
number of major and minor CMM events is examined to decide if a failover should occur. The
number of major events is compared, and if they are equ al, the number of minor e vents is used.
4.4.4Scenarios That Failover to an Equally Healthy CMM
The following conditions will cause a failover only if the health score of the standby CMM is equal
to that of the active CMM:
1. The ejector latch on the active CMM is opened.
2. A manual failover is executed on the active CMM.
4.4.5Failover Timing
Times required to detect different possible failover conditions and perform data synchronization
vary. For example, detecting network connection loss can take up to approximately 20 seconds.
Complete synchronization typically takes 7 to 30 seconds to occur, assuming both CMMs are fully
booted and a healthy Ethernet network connection and IPMB connection exist between the two
CMMs). Synchronization with a newly inse rted CMM can take two minutes, since a n ewly inserted
CMM needs that time to boot and initialize.
Once the CMM data is initially synchronized, failover happens instantaneously at the hardware
level. However, the CMM software requires some time to initialize various components following
a failover. Software-based remote management applications accessing the CMM will need to
reconnect to the newly active CMM. The newly active CMM may respond with unexpected errors
while initializing.
4.4.6Manual Failover
The following command can be issued to the active CMM to cause a failover manually to the
standby CMM:
cmmset -l cmm -d failover -v 1
A manual failover can only be initiated on the active CMM. A failover will only occur if the
standby CMM is at least as healthy as the active CMM. Once the command executes, the former
standby CMM immediately becomes the active CMM.
If the failover could not occur, the CLI will indicate the reason why the failover could not occur,
and a SEL event will be recorded.
42Technical Product Specification
Intel® NetStructureTMZT 7102 Chassis Manage ment Module
CMM Installation and Removal
5.0CMM Installation and Removal
This chapter describes the steps necessary to install and set up the ZT 7102 Chassis Management
Module (CMM). It includes instructions on unpacking, installing, and removing the CMM. Some
systems may come with the CMM(s) already installed.
Caution: The ZT 7102 plugs into a dedicated chassis management slot. System components will be damaged
if a standard 3U board is plugged into the chassis management slot.
5.1Unpacking
Check the shipping carton for damage. If the shipping carton and contents are damaged, notify
Intel Customer Support. Retain the shipping carton and packing material for inspection by the
carrier. Obtain authorization before returning any product to Intel. Refer to Appendix G, “ Customer
Support” for assistance information.
Caution: This board must be protected from static discharge and physical shock. Never remove any of the
socketed parts except at a static-free workstation. Use the anti-static bag shipped with the product
to handle the board. Wear a wrist strap grounded through one of the system's ESD Ground jacks
when servicing system components.
5.2Connectivity
The ZT 7102 is intended to be installed as the CMM in a system's Chassis Management Slot.
Where two Chassis Management Slots are available in a system, two CMMs may be installed.
(They will automatically negotiate for active and standby roles.)
The ZT 7102 is designed to operate in a backplane providing CompactPCI-style 2 mm hard metric
connectors to the board's J1, J2, and J3 backplane interfaces. The backplane's CMM interfaces are
specific to the CMM and do not support other 3U CompactPCI boards. See Section 2. 8,
“Connectors” on page22 for connector descriptions and pinouts.
5.3Installing the CMM
The following instructions cover the mechanical aspects of installing the ZT 7102 CMM in a
compatible system. For a better understanding of what happens when a CMM is absent from a
system, see “Removing the CMM” on page 44.
Warning:When the system is plugged in, high voltages are present on the backplane. Do not reach into the
enclosure.
Warning:Static electricity can damage electronic components. Wear a wrist strap grounded through one of
the system's ESD ground jacks when servicing system components.
1. Take the necessary precautions to protect the ZT 7102 from static discharge. System power
does not need to be off to install a CMM board.
2. Locate the system's dedicated CMM slot and remove the filler panel or existing CMM (see
3. Prepare the new/replacement CMM by opening its ejector handle (refer to Figure 8).
4. Carefully align the edges of the board with the card guides in the CMM slot. It may be helpful
to look into the enclosure to verify correct alignment of the rails in the guides.
5. Taking care to k eep th e boar d align ed in th e gu ides, slide the board in until the injector/ejector
mechanism engages the retention bar.
6. Simultaneously push in the board and rotate the ejector handle to its clo sed position (rotate
inward) to seat the backplane connectors.
7. If system power is on, the CMM will boot and it s Statu s LED will light gr een (active CMM) or
blink green (standby CMM).
8. Screw in the board retention screw to anchor the board in the chassis. This screw is located at
the opposite end of the faceplate from the ejector handle. Refer to Figure 3, “Face Plate” on
page 20 for the screw's location.
9. Use the CMM's Command Line Interface (CLI) to configure the CMM.
Figure 8. Ejector Handle Operation
5.4Removing the CMM
Note: The CMM should only be removed when the blue hot swap LED is lit.
In CMM-based sy ste ms, the CMM controls p ower to every slot in the system via BD_SEL#. If a
system's only CMM is removed, all the boards in the system lose power. When hot swapping a
CMM, it performs a controlled shutdown of itself but not the other boards in the system. Therefore,
you should ensure that the entire system is in a “safe” state before removing the CMM. The CMM's
hot swap LED will not light while other boards in the system are powered on.
If a redundant CMM is available, the CMM being removed automatically fails over to the standby
CMM if it is active when the ejector latch is opened. If the active CMM is being removed, the
CMM status light will begin to blink indicating that a failover has occurred. The other CMM’s
status light will be solid green. If a failover does not occur, check the Chassis SEL to see why a
failover cannot occur. In a redundant system, the CMM's removal does not cause a loss of system
power or an interruption in service (you must still wait for the blue hot swap LED to light be fore
removing the CMM).
If the CMM loses power or is removed suddenly, the CMM's flash memory could become
corrupted. If this happens, restore the board to operation using the instructions in “Updating
Software” on page 127.
44Technical Product Specification
Intel® NetStructureTMZT 7102 Chassis Manage ment Module
CMM Installation and Removal
Note: Removing the CMM before safely shutting it down is highly discouraged. Corruption of the flash
could occur if the CMM is yanked suddenly during a flash operation.
To remove the ZT 7102 CMM from a system:
Note: Take the necessary precautions to protect the ZT 7102 from static discharge. System power does
not need to be off to remove a CMM board. However, other boards in the system should be shut
down.
1. Unscrew the board retention screw that fastens the board to the enclosure. This screw is
located at the opposite end of the faceplate from the ejector handle. Refer to Figure 3, “Face
Plate” on pag e 20 for the screw's location.
2. If system power is off or the CMM's blue hot swap LED is o n, proceed to the ne xt step . If n ot,
the CMM needs to be in a “safe” state before it can be removed. Signal the CMM that it is
about to be removed by partially unlatching its ejector. Do not fully open the ejector as this
levers the board out of the encl osure and breaks its backplane connection before the board can
shut down properly.
3. Wait for the blue hot swap LED to light. It will take a few seconds to light up. The LED will
not light if other boards in the system a re powered on. Refer to Figure 3, “Face Plate” on
page 20 for the LED's location.
4. Open the ejector handle fully, rotating it outward until the board disengages from the
backplane (refer to Figure 8for ejector handle instructions).
5. Slide the board evenly out of the enclosure.
6. Install a replacement CMM or cov er the em pty slot with a filler panel to m aintain th e s ystem’s
shielding and cooling performa nce.
The CMM provides for a Built-In Self Test (BIST). The test will be run automatically after
power-up or front-panel reset. This test will detect flash corruption as well as other critical
hardware failures.
Results for the BIST are displayed on the console through the serial port during boot time. Results
of BIST will also be available through the CLI if the OS successfully boots.
If the BIST detects a fatal error, the CMM will not be allowed to function as an active CMM.
6.1BIST Test Flow
The following state diagram shows the order of the tests RedBoot* runs following a power-up or
front-panel reset. On every state before reaching active CMM, if there is an error , RedBoot will log
the error event into the EEPROM, route the error message to the serial port, and continue booting.
If the execution hangs before the OS loads due to the nature of the erro r , the CMM h angs. If th e OS
successfully boots, it will alert users to any errors that occurred during boot.
Intel® NetStructureTMZT 7102 Chassis Manage ment Module
Built-In Self Test
Figure 9. BIST Flow Chart
BlueCat*
oaded (activ
CMM)
IPMB
Bus Test
Image
ower U
Reset
BlueCat
Image
Image
Memory Test
FPGA,
DS1307, NIC
*Other names and brands may be claimed as the property of others.
The BIST is broken down into stages consisting of groups of tests run at serious times throughout
the boot process. Table 20 shows the different BIST stages and the tests associated with each st age:
T able 20. BIST Implementation
Boot-BISTEarly-BISTMid-BISTLate-BIST
RedBoot image
checksum
FPGA image checksumFPGA version checkIPMB bus test
Base memory test
6.2Boot-BIST
The codes in Boot-BIST will be executed at the very early stage of the RedBoot bootstrap, which is
just before the FPGA programming and memory module initialization. Boot-BIST will perform
checksum checking over the RedBoot image and the FPGA image. Checksum errors will be
detected if there is a mismatch of between the calculated checksum and the stored checksum in FIS
directory.
Boot-BIST will also perform a Base Memory Test for the first 1 Mbyte of memory. Whenever there
is an error, BIST will inform the user by prompting a warning message through the console
terminal and log the event to event-log area.
6.3Early-BIST
The early BIST stage will extend the reset timeout period on the watchdog timer (MAX6374) by
strobing GPIO7 on FPGA1. This prevents any possible hardware reset during the BIST process.
The watchdog timer will be enabled after the ADM1026 GPIO initialization, and disabled once it
reaches the RedBoot console. The OS will enable the watchdog timer again and start the strobing
thread at the kernel level.
Strobe watchdog timer to
extend timeout period
Extended memory testBlueCat image checks um
DS1307 RTC test
Local PCI bus / NIC
presence test
6.4Mid-BIST
Mid-BIST will be started just after some basic modules init ializatio n, such as flash and zlib
compression. In this stage of BIST, the Extended Memory Test will be performed to scan and
diagnose the possible bit errors in the memory. It starts scanning from 1 MByte to the maximum
available memory size on the board. It will not test the memory below 1 MByt e because p ortion of
RedBoot has already loaded and resided on it. The memory test includes: the walking ones test,
32-bit address test, and 32-bit inverse address test. Furthermore, vol ta ge and temp eratur e ratings
will be verified to lie within the hardware tolerable ranges. The FPGA firmware version will be
checked and will alert if an older version of an FPGA image has been detected. Also, system date
and time will be read out from the real time clock and displayed through the console terminal. NIC
presence is also checked here. NIC self-test is not performed here because it is performed in the
existing NIC driver module.
48Technical Product Specification
6.5Late-BIST
Late-BIST involves disabling the watchdog timer to indicate a successful boot of RedBoot. It will
also verify the checksum of the OS image stored in the FIS directory before proceeding with the
boot script execution.
Figure 10 shows at which times during the boot cycle the various stages of BIST are performed.
Figure 10. Timing of BIST Stages
Intel® NetStructureTMZT 7102 Chassis Manage ment Module
Built-In Self Test
HAL initialization
(processor, cache,
serial port)
Boot-BIST
FPGA
programming
Memory
paramet e rs
initialization
Early-BIST
Module
initialization
(flash, zlib, ide)
Mid-BIST
Module
initialization
(ethernet interface)
Late-BIST
Display copyright
banner, and
execute boot script
Done
6.6Event Log Area and Event Management
Errors detected by the BIST are stored in an event log. The event-log area is designed to have 269
entries. Each entry is 14 bytes. The event-log area is located in EEPROM on the CMM. The BIST
can place entries into the event log until it becomes full. Once full, any new entries will be lost. The
BIST event log is cleared by the OS once the OS logs any BIST errors into the SEL.
At OS start-up, the CMM will read the contents of BIST results in the reserved event log area and
store the errors as entries in the CMM SEL. This will allow the CMM application to take the
appropriate action based upon the SEL events as a result of RedBoot BIST tests. If there is not
enough space to log the events in the CMM SEL, no results are logged to the CMM SEL.
The BIST event log will be erased only after the event log is stored into the CMM SEL. Event
strings for BIST events are listed in Section 11.0, “Health Event Strings” on page 67.
6.7OS Flash Corruption Detection and Recovery Design
The OS is responsible for flash content integrity at runtime. Flash monitoring under the OS
environment can be divided into two parts: monitoring static images and monitoring dynamic
images.
Static images refer to the RedBoot image, FPGA image and BlueCat image in flash. These images
should not change throughout the lifetime of the CMM unless they are purposely updated or
corrupted. The CRC for these files are written into flash when the images are uploaded.
Dynamic image refers to the OS Flash File System (JFFS2). This image will dynamically change
throughout the runtime of the OS.
6.7.1Monitoring the Static Images
A static test is run at specified time intervals during CMM operation. The interval is specified on
the command line in the CMM startup script. The default interval is 24 hours. A value of zero will
turn off the test. The static test will read each static image (RedBoot, FPGA, BlueCat), calculate the
image checksum, and compare with the checksum in the RedBoot configuration area (FIS). If the
check sum test fails, the error will be logged to the CMM SEL.
6.7.2Monitoring the Dynamic Images
For monitoring the dynamic images, the CMM leverages the corruption det ect ion ab ility from the
JFFS(2) flash file system. At OS start-up, the CMM executes an initialization script to mount the
JFFS(2) flash partitions (/etc and /home). If a flash corruption is detected, an event will be logged
to the CMM SEL.
During normal OS operation, flash corruption during file access can also be detected by the
JFFS(2) and/or the flash driver. If a flash corruption is detected, an event will be logged to the
CMM SEL.
6.7.3CMM Failover
If during normal OS operation a critical error occurs on the active CMM, such as for a flash
corruption, the standby CMM will be checked to see if it is in a healthier state. If the standby CMM
is in a healthier state, then a failover will occur.
50Technical Product Specification
6.8BIST Test Descriptions
6.8.1Flash Checksum Test
This test is targeted to verify the RedBoot image and FPGA image are not corrupted.This test will
calculate the CRC32 checksum from the RedBoot image, and then compare with the image
checksum stored in the FIS directory. If one mismatches another, BIST will switch to the backup
image. If checksum mismatch was found from the FPGA image, BIST will load the backup image
to program the FPGA device.
6.8.2Base Memory Test
This test will write the data pattern of 55AA55AA into every 4-byte of memory below 1 Mbyte. Its
objective is to verify wire connectivity of address and data pins between the memory module and
the processor. The test will write the data pattern into the complete first 1 Mbyte, then verify the
written data pattern by reading them out from the memory module. If the data pattern mismatches,
the test will log the error event into event-log area and route error message to serial port.
6.8.3Extended Memory Tests
Intel® NetStructureTMZT 7102 Chassis Manage ment Module
Built-In Self Test
6.8.3.1Walking Ones Test
This test is targeted to verify the data bus wiring by testing the bus one bit at a time. The data bus
passes the test if each data bit can be set to 0 and 1 independently of the other data bits.
6.8.3.232-Bit Address Test
This test is targeted to verify the address bus wiring. The smallest set of addresses that will cover
all possible combinations is the set of “power-of-two” addresses. These addresses are analog ou s to
the set of data values used in the walking 1's test. The corresponding memory locations are 0001h,
0002h, 0004h, 0008h, 0010h, 0020 h, and so on. In addition, ad dress 0000 h must also be tested . The
possibility of overlapping locations makes the address bus test harder to implement. After writing
to one of the addresses, we must check that none of the others has been overwritten.
Note that not all of the address lines can be tested in this way. Part of the address-the left most
bits-selects the memory chip itself. Another part-the right most bits-may not be significant if the
data bus width is greater than eight bits. These extra bits will remain constant throughout the test
and reduce the number of test addresses. For example, if the processor has 32 address bits, it can
address up t o 4 Gbytes of memory. If we want to test a 128 Kbyte block of memor y, the 15
most-significant address bits will remain constant. In that case, only the 17 rightmost bits of the
address bus can actually be tested. (128 K is 1/32,768th of the total 4 Gbyte address space.)
To confirm that no two memory locations overlap, first write some initial data value at each
power-of-two offset within the device. Then a new value is written-an inverted copy of the initial
value, to the first test offset. It is then verified that the initial data value is still stored at every other
power-of-two offset. If a location is found, other than the one just written, that contains the new
data value, you have found a problem with the current address bit. If no overlapping is found, the
procedure is repeated for each of the remaining offsets.
6.8.3.332-Bit Inverse Address Test
This test is similar to the 32-bit address test except the addresses are tested in the inverse direction.
The test helps identify a broader scope of possible addressing errors inherent in memory modules.
This test is targeted to verify the correct FPGA image programmed into both FPGA chips. This test
will display the FPGA version on both FPGAs. Both versions should be the same, or the user will
be prompted with a warning message. If the programmed version is older than the expected, user
will be prompted to upgrade to the latest FPGA image.
6.8.5DS1307 RTC Test
This test is targeted to verify the functionality of DS1307 RTC chip. This test will display the
date/time settings from the RTC and validate the readings. If any readings found to be non-BCD
format, user will be prompted with warning message. This test will also capture current time, sleep
a while, then compare the previously captured time and new time. If they differ, it means th e RTC
is working. Otherwise, user will be prompted with warning message.
6.8.6NIC Presence/Local PCI Bus Test
This test generates the PCI bus transaction by scanning the PCI buses availab le on the bo ard. This
test will detect the two Ethernet devices and verify each device has the valid Vendor ID and Device
ID in the PCI configuration space. NIC inter nal s elf-tes t will not be performed here, as the self-test
will be executed when loading the Ethernet driver.
6.8.7OS Image Checksum Test
This test is targeted to verify the OS image stored in the flash is not corrupted. This test will
calculate the CRC32 checksum from the OS image, then com pare with the imag e check sum s tored
in the FIS directory. If one mismatches the other, BIST will log an error event to the event-log area
and route the error message to serial port.
6.8.8CRC32 Checksum
CRC32 is the 32-bit version of Cyclic Redundant Check technique designed to ensure the bits’
validity and integrity within the data.
It first generates the diffusion table, which consists of 256 entries of double-word; each entry is
known as a unique diffusion code. The checks um calcul at ion i s start ed by fetc hing t he firs t by te in
data buffer , exclusive-OR with the temporary checksu m value. The resulting value will be AND-ed
with 0xFF to restrict an index from 0 to 255 (decimal). Th at index will be used to fetch a new
diffusion code from the table. Next, the newly fetched diffusion code will be exclusive-OR with the
most significant 24 bits of the temporary checksum value (effectively 8 bits left-shifting the
checksum value). The resulting value is the new temporary checksum value. The calculation
process is repeated until the last byte in the data buffer. The final temporary checksum value
becomes the final checksum value.
6.8.9IPMB Bus Busy/Not Re ady Test
This test identifies any potential FPGA lockup before loading BlueC a t. If the FPGA is d etected to
be locked up, an event indicating which bus actually failed will be logged into the Event log.
52Technical Product Specification
Intel® NetStructureTMZT 7102 Chassis Manage ment Module
7.0CMM Connection and Setup
7.1CLI Overview
The Command Line Interface (CLI) connects to and communicates with the intelligent
management devices of the chassis , boards, and the CMM itself. The CLI is an IPMI-based library
of commands that can be accessed directly or through a higher-level management application.
Administrators can access the CLI through Telnet or the CMM's serial port. Using the CLI, users
can access information about the current state of the system including current sensor values,
threshold settings, recent events, and overall chassis health.
Note: Commands should always be issued to the CLI on the active CMM. The standby CMM can only
respond to commands to the CMM location.
7.2Connecting to the CLI
The CMM provides two connections on its front panel (see Figure 3, “Face Plate” on page 20)
CMM Connection and Setup
• An Ethernet connection via an RJ-45 connector
• An RS-232 serial port interface also via an RJ-45 connector
Either of these interfaces can be used to log into the CMM, as well as the Ethernet interface
provided through the backplane of a chassis. Use Telnet to log into the CMM over a Ethernet
connection, or use a terminal application or serial console over the RS-232 interface.
If logging in for the first time to set up IP add resses, u se the serial po rt console interface to per form
configuration.
7.2.1Connecting through a Console
Connect an RS-232 serial cable with an RJ-45 connector to the serial console port on the front of
the CMM. Set your terminal application settings as follows:
• Baud – 115200
• Data Bits – 8
• Parity – None
• Stop Bits – 1
• Flow Control – Xon/Xoff or none
Connect using your terminal application.
7.2.2Telnet into the CMM
T o telnet into the CMM, poi nt your cons ole or telnet appl ication to the IP address of the CMM you
wish to telnet to. If you wish to telnet to the active CMM through the backplane, you can point the
telnet application to the Eth1:1 IP address.
Using an FTP client, FTP to the IP address of the CMM you wish to transfer files to or from.
7.3Initial Setup - Logging in for the First Time
The default username for the cmm is root. The default password is cmmrootpass.
At the login prompt, enter the username: root
When prompted for the password, enter: cmmrootpass
The root password can be changed using the passwd command. For information on resetting the
CMM password back to default, refer to Section 9.0, “Resetting the Password” on page63.
7.3.1Setting IP Address Properties
By default, the CMM assigns IP addresses statically. Eth0, the front panel Ethernet port, is
configured with the static IP address 10.90.90.91. Eth1, the Ethernet port to the backplane, is
configured with a static IP address of 192.168.100.92. Eth1:1, an alias of Eth1 is used to always
point to and be active on the active CMM, is configured with a st at ic IP address of 192.168.100.93.
On initial power up of a chassis with two CMMs, both CMMs will have the same IP addresses
assigned by default. When the chassis is powered up, the standby CMM automatically decrements
its eth1 IP address by one less than the active CMM.
Example:
1. A dual CMM Chassis is powered up.
2. Active CMM is assigned IP address of 192.168.100.92 to Eth1 on the active CMM.
3. Standby CMM is assigned IP address of 192.168.100.91 to Eth1 on the standby CMM.
At this point, the static IP addresses must be changed to appropriate values for their network
configuration. Ensure tha t the two CMMs do no t contain duplicate IP add resses on Eth0 and eth1 to
avoid address conflicts on the network.
eth0 can also be set using DHCP. eth1, and eth1:1 will always remain static.
Note: eth0 should always be set to a different subnet than eth1. Failure to set eth0 to a different subnet
than eth1 will cause network errors on the CMM and redundancy will be lost.
Note: A DHCP server must be present on the network for the CMM to get a valid IP address. The
network reload command will refresh the IP addresses on both network interfaces.
54Technical Product Specification
Intel® NetStructureTMZT 7102 Chassis Manage ment Module
CMM Connection and Setup
7.3.1.1Setting IP Information (IP Address, Netmask, and Gateway)
Eth0
1. Open the /etc/ifcfg-eth0 file using the vi editor
2. Ensure the BOOTPROTO variable is set to static.
Note: Linux is case sensitive, so ensure that the BOOTPROTO variable is entered in lower case letters in
the step above.
3. Set the STATICIP variable to the IP address you want to assign to that interface.
4. Set the NETMASK variable to the appropriate netmask for your network.
5. Set the GATEWAY variable to the appropriate value for the gateway on your network
6. To activate the changes, at the user prompt, type:
/etc/rc.d/network reload
Eth1 and Eth1:1
Note: Eth1 and Eth1:1 are static IP addresses only. They do not support DHCP.
1. Open the /etc/ifcfg-eth1 file using the vi editor
2. Set the STATICIP1 variable to the IP address you want to assign to that interface.
3. Set the STATICIP2 variable to the IP address you want to assign to the active CMM on the
network. This value should ONL Y be set on the active CMM, as it will be synchronized to and
overwritten on the standby CMM.
4. Set the NETMASK variable to the appropriate netmask for your network.
5. Set the GATEWAY variable to the appr opriate value for the gateway on your network.
6. To activate the changes, at the user prompt, type:
/etc/rc.d/network reload
Note: The Eth1:1 address should only be changed on the active CMM. The new address will be
synchronized to the standby CMM automatically when the /etc/rc.d/network reload command is
executed.
7.3.1.2Setting Eth0 to DHCP
1. Using the vi editor, change the BOOTPROTO variable in the /etc/ifcfg-eth0 file to dhcp.
Note: Linux is case sensitive, so ensure that the BOOTPROTO variable is entered in lower case letters in
the step above.
2. To activate the changes, the user can reboot the CMM, or at the user prompt, type:
/etc/rc.d/network reload
Note: eth1 and eth1:1 should not be set to dhcp. The BOOTPROTO variable does not exist in th ese files.
The hostname of the CMM is a logical name that is used to identify a particular CMM. This name
is shown at login time and advertised to any DNS servers on a network.
To change the hostname:
1. Using the vi editor, change the HOSTNAME variable in /etc/HOSTNAME to the desired
name.
2. To activate the changes, at the user prompt, type: /etc/rc.d/network reload
Note: Executing network r eload also causes the network interfaces to reload their IP ad dresses. If DHCP
is being used on a network interface, then it is possible that the IP address on that interface will
change.
7.3.3Setting Auto-Logout Time Limit
For security purposes, the CMM automatically lo gs the user out of the current console session after
15 minutes (900 seconds). This auto-logout time can be changed by editing /etc/profile and
changing the TMOUT value to the desired setting. The timeout (TMOUT) value is set in seconds
(900 seconds is the default). A setting of TMOUT=0 will disable the automatic logout. This can
also be set at the command line, however doing so at the command line will not be persistent across
a reboot of the CMM.
7.3.4Rebooting the CMM
To reboot the CMM, type the reboot command in the CLI. Telnet sessions will h ave to be
reestablished after the CMM is rebooted.
Do not use the “init 0” or “init 6” command to reboot the CMM as problems may result.
56Technical Product Specification
Intel® NetStructureTMZT 7102 Chassis Manage ment Module
Command Line Interface (CLI) Syntax and Arguments
8.0Command Line Interface (CLI) Syntax and
Arguments
The command line interface on the CMM supports two types of commands: cmmgets and
cmmsets. Cmmgets are used to query for information, whereas cmmsets are used to write
information.
8.1cmmget and cmmset syntax
The syntax for calling the CLI from the command line is as follows:
Where cmmget and cmmset are the CLI executables. The par ameters can be in any order. The CLI
is case insensitive, except for the executable name. Parameters shown in brackets are optional.
Any attribute value that contains a space must be enclosed in quotes. This happens often when
specifying targets. For example, to get the current value of a sensor called Brd Temp on the CMM,
the command would be:
cmmget –l cmm –t “Brd Temp” –d current
8.2Help Parameter: -h
If the Help parameter is given, then the rest of the parameters are ignored, and the help text is
output to the user.
8.3Location Parameter: -l
The Location parameter is the location in the system that the user is executing the cmmget or
cmmset on. If no location is given then the default location is the CMM. The Location keywords
are shown in the following table.
Table 21. Location (-l) Keywords
KeywordFunction
cmmThe Chassis Management Module.
bladeN
systemThe entire platform.
chassisChassis specific items excluding the boards (such as fan trays and power supplies).
fantrayNOne of the fan trays in the system. N refers to the number of the fan tray in the system.
powersupplyN
One of the CPU boards in the chassis. N refers to the chassis slot number into which
the CPU board is inserted. Refer to the chassis documentation for slot information.
(Only works with IPMI power supplies.) One of the power supplies in the system
where N is a number between 1-8.
If no location parameter is given, then the default is CMM.
The Target parameter is the sensor or variable that the cmmget or cmmset acts on. The Target
keywords are shown in the following table.
Note: If the target is not specified, then it is assumed that Dataitem is an attribute of Location.
T able 22. Target (-t) Keywords
KeywordDescription
fru
SDR Sensors
noneSame as not entering a target.
Used to query the FRU or individual FRU fields for a specific location. For more
information on querying a component’s FRU and individual FRU fields, see Section 16.0,
“Obtaining FRU Information” on page 89.
The sensor name as defined in its Sensor Data Record (SDR) for that component. Sensor
names can be retrieved for an IPMI based location using the ListTargets Dataitem.
8.5Dataitem Parameter: -d
The Dataitem parameter is the Target or Location attribute that the user is getting or setting.
Dataitem must be given for every CLI command. The Dataitem keywords are shown in the
following table.
Table 23. dataitem (-d) Keywords for All Locations (Sheet 1 of 2)
Data ItemDescription
Used to configure user defined actions when events occur.
currentThe current value of a sensor.GetN/A
healthReturns the health of the location and if any events exist.GetN/A
healthevents
listdataitems
listtargets
presence
selReturns a location's System Event Log.GetN/A
This dataitem is used with a target (–t) p arameter specified
sensor and a value (-v) parameter. When an event
happens for that particular sensor, then the script defined
in the –v parameter will be executed. The script to be
executed must be located in the /home/scripts directory on
the CMM and the /home/scripts path should be omitted
when specifying the script. See Section 18.0, “CMM
Scripting” on page 93 for more information.
Returns the specific health events that are occurring on
the location if any exist.
Used to find the data items available on a location.
The output lists dataitems that the location supports.
Used to find what sensors or targets are available on the
location. This is the list of sensors defined by the SDR for
that particular location.
Used to find out if a particular location is occupied or
present in the chassis. This can be blades or intelligent fan
trays.
Get/
Set
Valid filename
of a script that
resides in
Both
/home/scripts
none
GetN/A
GetN/A
GetN/A
GetN/A
Valid Set
Values:
58Technical Product Specification
Intel® NetStructureTMZT 7102 Chassis Manage ment Module
Command Line Interface (CLI) Syntax and Arguments
Table 23. dataitem (-d) Keywords for All Locations (Sheet 2 of 2)
All thresholds of a sensor. This includes lower
non-recoverable, lower critical, lower non-critical, upper
non-critical, upper critical, and upper non-recoverable.
Used to query individual thresholds for a value based
sensor, such as temperature or voltage.
Used to trigger a script based on event code of a health
event. Refer to Section 18.0, “CMM Scripting” on page 93
T a ble 24. dataitem (-d) Keywords for System location
Data ItemDescription
Output:
Critical: CritList
Major: MajList
unhealthylocations
Minor: MinList
where each list is a list of locations having that level of
health events (space separated).
In the output, PSn refers to PowerSupplyN (i.e., PS1 =
PowerSupply1, PS2 = PowerSupply2, etc.)
Get/
Set
GetN/A
GetN/A
The event code
Set
of the event
Get/
Set
GetN/A
Val id Set
Values:
Valid Set
Values
Table 25. dataitem (-d) Keywords for BladeN Locations
Data ItemDescription
Used to add IPMI capable drone mode compatible
ignorespcirst
powerstate
blades to the list of recognized drone mode boards. For
further information on drone mode see Section 14.0,
“Drone Mode SBC Support” on page 85.
Used to query or control the power state of a board. This
is also used to reset a board.
Table 26. dataitem (-d) Keywords for Chassis Location
Data ItemDescription
Used to set or query the fan speed of all the fans in
the system as a percentage of their full speed. Some
fan trays may prevent the fan speed from going to
zero. Querying the fan speed does not show actual
fanspeed, but reflects what the CMM fan speed output
fanspeed
healthyrampuptime
location
maxpowerupattempts
psinhibit[1..8]Us ed to inhibit the power supplies in the chassis.Both
slotinfo
is set to as a percentage of the actual full fan speed.
See Section 17.0, “Fan Control and Monitoring” on
page 91 for further i n fo rmation .
Note: In case of a temperature upper threshold
violation, the fans will be automatically set by the
CMM to run at full speed until the violation deasserts.
Used to set or query the value configured in the CMM
for the maximum amount of time the CMM will wait for
the HEALTHY # hardware signal to be asserted by an
SBC.
Used to set or query the location field in the chassis
FRU.
Used to set or query the value for the maximum
number of tries the CMM will attempt to power up a
board during the power sequencing loop.
Queries chassis slot layout information. This will tell
the user what slots are system slots, peripheral slots,
or busless slots. It will also show which slots are
occupied by blades.
Get/
Set
Both
Both
Both
Both
GetN/A
Valid Set Value s:
100 (default)
80
0
2 (default)
through 60
in seconds
Location String of
up to 16
characters
“ -1” (Default)
0
through
2000000000
1 - Enable
0- Inhibit
Table 27. dataitem (-d) Keywords for CMM Location (Sheet 1 of 2)
Data ItemDescription
Used to engage the Alarm Cutoff (ACO) or get its value.
alarmcutoff
alarmtimeout
criticalled
minorled
majorled
Ethernet
When engaged, the ACO silences active alarms and
blinks the alarm LEDs on the CMM. This Dataitem is
only valid when used with the CMM as the location.
Used to set the Alarm Cutoff timeout value (in minutes)
or get its value. This is the length of time the CMM waits
before automatically canceling an engaged ACO (if the
user fails to cancel it manually). A value of 0 disables the
timeout. This dataitem is only valid when used with the
CMM as the location.
Used to turn on or off the critical, major and minor LEDs. Set
Used to change to the eth0 direction to either the front
panel or the rear panel IO card.
Get/
Set
Both
Both
Both
Valid Set
Values:
1 - Set cut off
0 - Unset cut
off
Number of
minutes:
0-1000.
Value of 0
disables the
timeout.
1 - Turn On
LED
0 - Turn Off
LED
front (default)
rear
60Technical Product Specification
Intel® NetStructureTMZT 7102 Chassis Manage ment Module
Command Line Interface (CLI) Syntax and Arguments
Table 27. dataitem (-d) Keywords for CMM Location (Sheet 2 of 2)
Data ItemDescription
Used only from the active CMM to failover to the standby
failover
redundancy
versionThe version of the CMM software. GetN/A
snmptrapcommunitySet or query the SNMP trap community string.Both
snmpenableSets or queries the SNMP trap enabled status.Both
snmptrapaddress[1..5]
snmptrapport
snmptrapversionSets or queries the SNMP trap version.Both
update
CMM. This command will only successfully execute if
the standby CMM is in a healthy enough state to accept
a failover.
Used to query CMM redundancy information. Indicates
CMM(s) presence, which CMM is active, which CMM is
stand by, and which one the user is logged into.
The IP address of the machines receiving SNMP traps
from the CMM.
Sets or queries the TCP/IP port that the SNMP trap will
be sent from.
Used with the cmmget command to update the CMM
firmware on the CMM.
The syntax of the command is: cmmset -l cmm -d update
-v [Update Package path and filename] [force]
[overwrit e ] [ftp : s e r ver:user:pa ss word]
Refer toChapter 25.0, “Updating Software” for more info.
Get/
Set
Set1 - Failover
GetN/A
Valid SNMP
community
name:
public (default)
Enable
(default)
Disable
IP Address in
the form:
Both
x.x.x.x
Valid port
number:
Both
0-65536
162 (default)
V1(default)
V3
Starts the
update of the
Set
firmware on
that CMM.
Valid Set
Values:
8.6Value Parameter: -v
The Value parameter specifies the new value for a Dataitem. This parameter is r equired for all
cmmset commands and is only used for cmmset commands. Valid value parameters are shown in
with their corresponding data items in the data item tables listed above.
8.7Sample CLI Operations
Sample CLI Operations can be found in Appendix D, “Example CLI Comm ands”.
The CLI includes an executable script (cmmdump) that is used to generate a system status report
for use in communicating system health and configuration information to technical support
personnel. This is useful in helping technical support successfu lly trou bleshoot any issues that may
be affecting the system. Cmmdump outputs system information to the screen by default or to a file.
To send the output to a file use the following command:
cmmdump > [filename]
The filename should refer to a file that is in a valid directory (i.e., /home/cmmdump.txt). The file
can then be retrieved off the CMM using FTP (see Section 7.2.3, “FTP Into the CMM” on
page 54).
62Technical Product Specification
Intel® NetStructureTMZT 7102 Chassis Manage ment Module
Resetting the Password
9.0Resetting the Password
It may become necessary to reset the CMM password to its default of cmmrootpass. The CMM has
an onboard dip switch labeled SW1-1 to perform this action. See Section 2.10, “Onboard
Switches” on page 31 for the location of the switch. Setting the sw itch and power ing up th e CMM
will cause the password to reset to its default. The CMM then must be removed, and the switch
must be turned off again.
9.1Resetting the Password in a Single CMM System
For non-redundant systems that contain only a single CMM, resetting the password requires
removing the CMM. This causes any boards that are power controlled by the CMM to power off.
1. If necessary, safely shut down and power off boards being power controlled by the CMM.
2. Remove the CMM from the system.
3. Turn on the dip switch SW1-1. The dip switch has a label indicating which way is on.
4. Reinsert the CMM into the system and allow the CMM to fully boot into Bluecat Linux*.
5. Once at the login prompt, the password should now be reset to its default of cmmrootpass.
6. Log in to the CMM to ensure the password was reset.
7. Remove the CMM from the system.
8. Turn off dip switch SW-1 by moving it back to its original off position.
9. Reinsert the CMM into the system and allow the CMM to fully boot into Bluecat Linux.
10. Log in to the CMM and operate as normal.
9.2Resetting the Password in a Dual CMM System
In redundant systems containing dual CMMs - one active, one standby - the password should be
reset on the standby CMM. Once reset to its default, the default password will synchronize itself to
the active CMM. This prevents the need to perform the reset on both CMMs and a failover.
1. Open the ejector latch on the standby CMM and wait for the blue hot swap LED to illuminate,
indicating the CMM is safe to remove from the system.
2. A health event will occur on the active CMM indicating redundancy has been lost. A SEL
entry will be recorded, and a trap will be sent out.
3. Remove the standby CMM from the chassis.
4. Turn on the dip switch SW1-1. The dip switch has a label indicating which way is on.
5. Reinsert the CMM into the system and allow the CMM to fully boot into Bluecat Linux.
6. A health event will occur indicating that the passwords on both CMMs h a ve been reset an d
was synched from the standby CMM.
7. Once at the login prompt, the password should now be reset to its default of cmmrootpass.
8. Login to the active CMM to ensure the password was reset.
9. Open the ejector latch on the standby CMM and wait for the blue hot swap LED to illuminate,
indicating the CMM is safe to remove from the system.
10. A health event will occur on the active CMM indicating redundancy has been lost. A SEL
entry will be recorded, and a trap will be sent out.
11. Remove the standby CMM from the chassis.
12. Turn off the dip switch SW1-1.
13. Reinsert the CMM into the system and allow the CMM to fully boot into Bluecat Linux.
14. The password can now be set on the active CMM and it will get synched to the standby CMM
and the CMM can now be operated normally.
64Technical Product Specification
Intel® NetStructureTMZT 7102 Chassis Manage ment Module
10.0Sensor Types
The CMM provides access to and can log events from different IPMI sensor types. These sensors
can be threshold based sensors or discrete sensors, depending on the type of reading and events
they generate. For more information on sensors and sensor types, refer to the Intelligent Platform Management Interface Specification v1.5.
10.1Threshold-Based Sensors
Threshold based sensor s are sensors that generate or change an event status based on comparing a
current value to a threshold value for a given hardware monitor device. Examples of threshold
based sensors are temperature, voltage, and fan tachometer sensors.
10.1.1Threshold-Based Sensor Events
Threshold-based sens ors gener ate ev ents when a curr ent value for a device becomes greater than or
less than a given threshold value. The IPMI specification defines six thresholds that can be
assigned to a given sensor. The sensor will generate an event when its current reading goes above
or below any of these thresholds. The severi ty of the e vent generated depends o n which thr eshold is
crossed. These six thresholds and their associated event severity are as follows:
Discrete sensors are sensors that have a predefined set of states. An examples of a discrete sensor
would be board presence, where a board is either present or not present.
10.2.1Discrete Sensor Events
Discrete sensors can generate events on state changes. The severity of the event is determined by
the CMM. Discrete sensor events for the CMM are located in the next section, Chapter 11.0,
Intel® NetStructureTMZT 7102 Chassis Manage ment Module
11.0Health Event Strings
This section describes the health event strings that are associated with CMM events and includes
the syntax and severity of these strings. Refer to Section 10.0, “Sens or Types” on page 65 for more
information on the different types of sensors.
Note: For this section, “health event” (two words) refers to any event that is ge nerated that reports the
health of a sensor. “healthevents” (all one word) refers specifically to the “healthevents” dataitem
or the output of that dataitem (healthevents query).
11.1Syntax of Health Event Strings
Health event string is a string that is associated with the particular health event occurring. Active
events are displayed in a healthevents query using the following command i n the CLI:
Active health events are also returned when healthevents queries are executed over SNMP. In
addition, all health events are logged in the SEL and sent out as SNMP Traps.
Health Event Strings
Note: SEL entries and SNMP traps do not include the severity of the event. Only healthevents query
results display the severity of an event.
11.1.1“healthevents” Query Event Syntax
The following is the syntax of a string returned by a healthevents query for an associated active
health event. The \n represents newline characters (seen as <0A> in SNMP queries).
• Timestamp is in the format: [Day] [Month] [Date] [HH:MM:SS] [Year]. For example,
Thu Dec 11 22:20:03 2003
• Severity is either Minor, Major, or Critical.
• SDR Sensor Name is the name given to the sensor in the Sensor Data Record (SDR).
• Health Event Strings are listed in Section 11.4, “List of Possible Health Event Strings” on
page 70.
11 .1 .2SEL Event Syntax
The following is the syntax of each SEL entry for an as sociated health event. The \n represents
newline characters and the \t represents tab characters.
• Timestamp is in the format: [Day] [Month] [Date] [HH:MM:SS] [Year]. For example,
Thu Dec 11 22:20:03 2003
• ChassisLocation is the chassis location information recorded in the chassis FRU.
• ChassisSN is the chassis serial number recorde in the chassis FRU.
• Location is the location where the sensor generating the event is located (i.e., CMM)
• SDR Sensor Name is the name given to the sensor in the Sensor Dat a Record (SDR) .
• Health Event Strings are listed in Section 11.4, “List of Possible Health Event Strings” on
page 70.
11.2Sensor Targets
Available sensors for a location can be retrieved with the listtargets dataitem argument of the
cmmget command. To view a list of sensor targets on the cmm using the listtargets command:
cmmget -l cmm -d listtargets
The CMM lists the following sensors that can be queried for health events:
Table 28. CMM Sensor Targets
Sensor TargetDescription
Brd TempBoard Temperature Sensor
+1.5V+1.5 Volt Sensor
+2.5V+2.5 Volt Sensor
+3.3V+3.3 Volt Sensor
+5V+5 Volt Sensor
Eth0 InterfaceEth0 LAN Sensor
Eth1 InterfaceEth1 LAN Sensor
Eth1:1 InterfaceEth1:1 LAN Sens or
TASensor1Telco Alarm Input Sensor 1
TASensor2Telco Alarm Input Sensor 2
BISTBuilt-in Self Tes t Sens or Type
For complete lists of sensors on other components (i.e., voltage sensors on blade1), refer to the
corresponding Technical Product Specification for that product.
68Technical Product Specification
Intel® NetStructureTMZT 7102 Chassis Manage ment Module
11.3Healthevents Queries
Healthevents queries, whether done from the CLI or through SNMP, output the same event strings
and syntax for active events. This section explains the various types of outpu t that are retrieved
from healthevents queries. For more information on using the healthevents dataitem, refer to
Section 8.0, “Command Line Interface (CLI) Syntax and Arguments” on page 57.
11.3.1HealthEvents Queries for Individual Sensors
Executing a healthevents query on a particular sensor targ et returns all active healthevents for that
sensor target in a concatenated string. One sensor may have multiple events. For example, r unn ing
the following healthevents query on the CMM BIST sensor:
cmmget -l cmm -t BIST -d healthevents
might return multiple events that are active on the BIST sensor in a concatenated string like this :
Mon Feb 2 19:51:05 2004
Major Event : BIST RTC Not Working
Mon Feb 2 19:51:09 2004
Major Event : BIST Both Ethernet interfaces are not working.
Health Event Strings
11 .3 .2HealthEvent s Queri es for All Se nsors on a Location
Executing a healthevents query on the “cmm” location in the CLI without a target specified
(cmmget -l cmm -d healthevents) returns all the healthevents for all CMM sensors in a concatenated
string. This includes all BIST, LAN, Telco Alarm, Voltage, and Temp sensors on the CMM. This
ability to retrieve all healthevents on a location also applies to the chassis, bladeN, FantrayN and
powersup plyN* locat ions.
* - PowersupplyN healthevents are dependent on the presenc e of IPMI-com pliant power supplies.
The “pwr supply N” target on the chassis location is used for querying non-IPMI capabilities of
power supplies (i.e., Failure Detected). Querying the healthevents on the chassis location will
return all active events for all “pwr supply N” targets.
The CMM’s SNMP interface provides a “cmm” target that can be found in the listtargets ouput.
This target is used to execute healthevents queries for all active events on the CMM. Since each
OID in the MIB requires a target on the location, the “cmm” target was implemented in SNMP to
give the user the ability to do a healthevents query of the cmm location equivalent to the CLI
command “cmmget -l cmm -d healthevents”. Similar SNMP-specific targets also exist for chassis
and bladeN that allow users to retrieve all active events for that location. Refer to Section 19.0,
“SNMP” on pag e 97 for more information on SNMP.
11.3.3No Active Events
When a healthevents query is executed in the CLI on a target that doesn’t have active events a
string will be returned that is a single line string with no timestamp or severity. Only this string will
be returned and won’t be concatenated with any other strings. For example, doing a healthevents
query from the CLI of a location or target that doesn’t have any active healthevents will return the
following string:
“[T a rget] has no problems.” - i.e., “chassis has no problems” or “temp sn sr 1 has no problems”
Executing a healthevents query through SNMP on a target with no active events returns different
values than the CLI does. When a healthevents query is executed in SNMP on:
• A location target (i.e., in SNMP, the cmm target on the cmm location) that has no active
events, the value returned is a zero length string.
• An individual sensor (i.e., the +3.3V sensor on the CMM) that has no active events, the value
returned is a null value.
Note: Attempting to execute a healthevents query on the “FRU” target will return a “CLI Invalid Data
Item Error.” string since “FRU” is not a sensor.
11.3.4Not Present or Non-IPMI Locations
Doing a healthevents query of a blade or powersupply , or a tar get on a blade or powersupply, that is
not present or non-IPMI compliant will return one of the following:
“BPM Blade Not Present.” - if querying an empty blade slot.
“BPM Non IPMI Blade.” - if querying a blade that is present but doesn’t support IPMI.
“Power Supply Not Present.” - if querying an empty power supply slot or a power supply that
doesn’t support IPMI.
11.4List of Possible Health Event Strings
Table 29 through Table 40 list possible event strings for se nsor s on the CMM, chassis , fa n tray, and
powersupply. Each event will log an entry in the SEL and generate an SNMP Trap, and can be
retrieved through a healthevents query on a target or location. Locations and sensor names are
listed as well.
The event severity is not displayed in the SEL entry or the SNMP trap. The severity of the event
(Minor, Major, or Critical) is displayed in a healthevents query while the event is active. OK
HealthEvents are displayed in healthevents queries for only a limited time when they are asserted.
For each event, the event code is listed in base 10 format for use with event scripting, which is
documented in Section 18.0, “CMM Scripting” on page 93.
The table for threshold-based sensors is common to other threshold-based sensors on other
components (e.g., voltage, temp, current).
70Technical Product Specification
Intel® NetStructureTMZT 7102 Chassis Manage ment Module
Table 31. BIST Event Strings (BIST) (Sheet 1 of 2)
Event StringEvent CodeEvent Severity
“Boot is Successfu l.”112OK
“Event-log area full.”113Critical
“RedBoot image corrupted.”114Major
“Backup RedBoot image corrupted.”115Critical
“FPGA image corrupted. Using backup image.”116Major
“Backup FPGA image corrupted.”117Critical
“OS image corrupted.”118Critical
“Base memory test failed.”119Critical
“Extended memory test failed.”120Critical
“FPGA1 firmware outdated.”121Minor
“FPGA2 firmware outdated.”122Minor
“FPGA 1+2 version mismatched.”123Minor
“RTC date is invalid.”124Major
“RTC time is invalid.”125Major
“RTC is not working.”126Critical
“One of the Ethernet interfaces is not working.”127Minor
“Both Ethernet interfaces are not working.”128Major
“CMM Boot.”129OK
“IPMB bus [0-29] busy/not ready.”130 - 159Major
“Software update successful.”160OK
“Update of RedBoot failed.”161Critical
“Update of FPGA failed.”162Critical
“Update of Bluecat OS failed.”163Critical
“Update of /etc failed.”164Critical
“Restore of /etc files failed.”165Critical
“Software update failed.”166Critical
“Standby CMM has completed FPGA re-programming.”179OK
“FPGA re-programmed 2 times and no further lockup detected.”180Minor
“FPGA re-programmed 3 times and no further lockup detected.”181Minor
“FPGA re-programming has failed.”182Critical
“FPGA re-programmed more than 3 times and lockup still detected.”183Critical
“Dynamic FLASH image corruption detected.”184Critical
“Static Redboot image is corrupt.”185Critical
“Static OS image is corrupt.”186Critical
“Static FPGA image is corrupt.”187Critical
“Primary FRU unreadable - using Secondary"188Minor
72Technical Product Specification
Intel® NetStructureTMZT 7102 Chassis Manage ment Module
T able 31. BIST Event Strings (BIST) (Sheet 2 of 2)
Event StringEvent CodeEvent Severity
"FRU unreadable!"189Critical
"RTC battery power lost."190Critical
"I2C failure while reading RTC."191Critical
"Primary FRU is corrupted."272Major
"Secondary FRU is corrupted."273Major
"FRU is corrupted!"274Critical
T able 32. Telco Alarm Sensor Event Strings (TASensor[1,2])
Event StringEvent CodeEvent Severity
“asserted.”96Major
“deasserted.”97O K
\
T able 33. LAN Sensor Event Strings (Eth[0,1,1:1] Interface)
Health Event Strings
Event StringEvent CodeEvent Severity
“Duplicate IP address detected on the network.”84Major
“Duplicate IP address corrected.”85OK
"Blade Removed"192OK
“Blade Presence Detected”193OK
"Blade Deasserted HEALTHY#"194OK
"Blade Asserted HEALTHY#"195OK
“Blade Failed HEALTHY# After Maximum Attempts”196OK
“Blade Powered On”197OK
“Blade Powered Off”198OK
“Blade Reset”199OK
“Blade set to Offline”200OK
“Blade set to Active”201OK
“Blade is not IPMI capable”202OK
"Blade is IPMI capable"203OK
"Regained"208OK
"Established"209OK
"Lost due to switch failure"210Major
"Lost due to unhealthy signal"211Major
"Lost due to failed network connectivity between the CMM and the
Primary SNMP trap destination (SNMPTrapAddress1)."
"Lost due to CMM removal"213Major
"Lost due to CMM reboot"214Major
"Lost due to critical event on the CMM"215Major
"Lost due to inability to communicate with the other CMM over its
management bus."
"Lost due to incompatible firmware versions on the CMMs. Please
"Failover occurred."217OK
"Failover occurred because of switch failure."218OK
"Failover occurred because of failed network connectivity between
the CMM and the Primary SNMP trap destination."
"Failover occurred because of critical CMM health events."220OK
"Failover occurred because of a bad hardware signal from the other
CMM."
"Failover occurred because it was forced by the user."222OK
212Major
216Major
239Major
219OK
221OK
74Technical Product Specification
Intel® NetStructureTMZT 7102 Chassis Manage ment Module
Health Event Strings
T able 38. CMM Failover Event Strings (CMM Failover)
Event StringEvent CodeEvent Severity
"Failover occurred because the other CMM rebooted."223OK
"Failover cannot occur because the other CMM has a bad switch."22 4OK
"Failover cannot occur because the other CMM has lost network
connectivity with its Primary SNMP trap destination."
"Failover cannot occur because the other CMM has critical health
events."
"Failover cannot occur because the other CMM is not responding
over its management bus."
"Failover cannot occur because the critical items have not been
synced."
“Failover cannot occur because the other CMM has a bad hardware
signal.”
“Failover occurred because the active CMM had older firmware than
the newly active CMM.”
225OK
226OK
227OK
228OK
229OK
240OK
Note: In the CMM Redundancy and Failover event strings, the phrases “bad switch” and “switch failure”
refer to the switch that is associated with that CMM having deasserted its HEALTHY# signal. The
“bad hardware signal” refers to the CMM itself having deasserted its HEALTHY# signal.
"Could not copy the /etc/CMM.cfg file to the standby CMM."230OK
"Could not copy the /etc/passwd and /etc/shadow files to the standby
CMM."
“Default password files synced to active CMM. Passwords have been
reset to default.”
"Could not copy the /etc/sel_* files to the standby CMM."233OK
"Could not copy the /etc/snmpd.conf and /etc/var/snmpd.conf files to
the standby CMM."
"Could not copy the SDR file to the standby CMM."235OK
"Could not copy the /etc/scripts directory to the standby CMM."236OK
"All files successfully synced."237OK
T able 40. Chassis Sensor Event Strings
Event StringEvent CodeEvent Severity
“No PCI connectivity record found in chassis FRU information.”256Crit ical
“cmm.sif file not found. Cannot scan CMM sensors.”257Critical
“chassis.sif file not found. Cannot scan Chassis sensors.”258Critical
Intel® NetStructureTMZT 7102 Chassis Manage ment Module
Slot Power Control
12.0Slot Power Control
The chassis management module controls power to the node and fabric slots of a chassis using the
BD_SEL# and HEALTHY# hardware signals. The CMM can power up, power down, and reset a
board in a particular slot, as well as to place a slot into an of fline mo de. The CMM can also be u sed
to query the power state of a board at any time.
12.1Difference between a Board’s HEALTHY# Signal and a
Board’s Health
Confusion may arise as to the difference between the HEALTHY# hardware signal coming from a
board and the board’s health retrieved using the CLI command :
cmmget -l bladeN -d health
A board’s HEALTHY# signal is a PICMG-specified hardware signal on the CompactPCI
connector . The PIC MG 2.0 specificat ion de fines HEALTHY# to be a signal generated by a board’s
hot swap control logic. A t a minimum, HEALTHY# should be asserted by the hot swap control
when all of the voltages are good. Additional logic may be implemented above this to generate the
HEAL THY# signal. The CMM uses the HEALTHY# hardware signal to determine when a board is
powered up completely.
The board’s health, as returned by the CLI command listed above, is used to determine whether
there are any active health events occurring on a particular board, such as temperature or voltage
violations.
12.2Slot Power-Up Sequence
The CMM constantly polls the status of the BD_SEL# lines coming from the node and fabric slots.
Boards inserted into the chassis will pull the BD_SEL# line to Vcc, indicating insertion of the
board.
12.2.1Assertion of BD_SEL#
Upon detection of board insertion, the CMM determines whether to assert BD_SEL# based on the
type of board being inserted and the type of slot the board is being inserted to.
12.2.1.1System Master Boards
For system master boards in system master slots, the CMM will always assert BD_SEL#.
12.2.1.2Peripheral Boards
For peripheral boards inserted into peripheral slots, the CMM will ONLY assert BD_SEL# if a
system master board is present for that PCI segment. If a peripheral board is inserted into a system
master slot, or into a peripheral slot in a PCI segment with no system master, the CMM will not
assert BD_SEL# for that board.
For node slots containing no PCI bus (PCI-less slo ts) as well as fabric slots, the CMM will always
assert BD_SEL#.
12.2.1.4Drone Mode Boards
For drone mode capable boards that have been added to the CMM, the CMM will always assert
BD_SEL# regardless of the type of node slot where they are inserted. For more info rmation on
drone mode and drone mode boards, see Section 1 4.0, “Drone Mode SB C Suppor t” on page 85. All
Intel SBCs are recognized as drone mode capable.
12.2.2Assertion of HEALTHY# During Power-Up
Upon assertion of BD_SEL#, the CMM will wait a minimum of two seconds for the board to assert
the HEALTHY# signal. The amount of time the CMM will wait for HEALTHY# to be asserted by
an SBC can be configured from the CMM interfaces from 2 to 60 seconds and is referred to as the
HEALTHY# ramp up time. See Section 12.5, “Power Sequencing Commands and Policies” on
page 79 for instructions on how t o set and retrieve the HEALTHY# ramp-up time.
A board should generate a HEALTHY# signal indicating all of its onboard volt ages are good per
the PICMG 2.1 R2.0 specification. Depending on the logic of the board, HEALTHY# can also be
generated by additional logic, such as from a BIST, OS boot-up, etc.
If within the defined HEALTHY# ramp-up time the CMM detects HEAL THY# being asserted, the
CMM will leave BD_SEL# asserted, and the board will go through its normal power-on sequence.
BD_SEL# will remain asserted unless the HEALTHY# signal gets deasserted for that board or the
command to power down a board is issued.
If within the defined HEALTHY# ramp-up time the CMM does not detect HEALTHY# being
asserted, the CMM will deassert BD_SEL# to that slot, and that board will not power up. If the
board remains inserted in the slot, the process will repeat on the next polling cycle of that slot. This
process will continue until either the board powers up, the board is removed from the slot, or the
maximum number of power up attempts is reached.
The maximum number of attempts the CMM will try to power on a board can be configured
through the CMM interfaces. See Section 12.5, “Power Sequencing Commands and Policies” on
page 79 for further information on how to set and retrieve the maximum power-up attempts.
12.3Obtaining the Power State of a Board
The CMM can obtain the power state information of a board at any time by issuing the following
command:
cmmget -l bladeN -d powerstate
Where N is the number of the slot in which the blad e yo u are querying resides. This command will
give information on whether the blade is present, the state of the HEALTHY# signal (asserted/
deasserted), whether the board has been powered up or not, and whether the slot is in the active or
offline mode. Output will look similar to this:
Board is present
78Technical Product Specification
Intel® NetStructureTMZT 7102 Chassis Manage ment Module
Board HEALTHY# signal is asserted
Board has been powered up by the CMM
Board is in active mode.
For further information on active and offline mode see Section 15.0, “Active vs. Offline Slots” on
page 87.
12.4Controlling the Power State of a Slot
The CMM can power a slot off, on , reset the slot, or place a slot in an offline mode. Placing a slot
in offline mode allows the CMM to ignore the state of the HEALTHY# signal from that slot.
12.4.1Powering Off a Board
The following command will power a board off:
cmmset -l bladeN -d powerstate -v poweroff
N is the number of the slot the blade to be powered down resides in. Once issued, the command
will ask for confirmation by entering “y” before continu ing.
Slot Power Control
12.4.2Powering On a Board
The following command will power a board on:
cmmset -l bladeN -d powerstate -v poweron
N is the number of the slot the blade to be reset resides in.
12.4.3Resetting a Board
The following command will reset a board:
cmmset -l bladeN -d powerstate -v reset
N is the number of the slot the blade to be reset resides in. Once issued, the command will ask for
confirmation by entering “y” before continuing.
12.5Power Sequencing Commands and Policies
The following section describes how to set and retrieve the HEALTHY# ramp up time and
maximum power up attempts for the chassis.
HEALTHY# ramp up time is used to determine the maximum amount of time the CMM will wait
for an SBC to generat e the HEALTHY# hardware sign al during the current p ower sequ encing loop .
If the amount of time defined in the healthyrampuptime expires, the CMM deasserts BD_SEL# to
the slot, and continues thro ugh the powe r up seque nce loop. For example, on initial power up, if the
healthyrampuptime is set to two seconds, a blade can be reset during its powerup sequence. If set to
60 seconds, a reset command won’t take effect until 60 seconds after power on in which time the
blade will typically be booted.
The maximum power-up attempts variable is used to configure the number of times the CMM will
attempt to power on a board during the power sequencing loop. Once the maxpowerupattempts is
exceeded for a particular board, the CMM will no longer attempt to power on the board by
asserting the BD_SEL# signal during the power sequencing loop.
Setting these variables applies to the entire chassis, not just a single board or slot.
12.5.1Retrieving the Healthy# Ramp-Up Time
Issuing the following command will retrieve the value configured in the CMM for the maximum
amount of time the CMM will wait for the HEALTHY # hardware signal to be asserted by an SBC.
cmmget -l chassis -d healthyrampuptime
This returns the time (in seconds) the CMM will wait for an SBC to generate the HEALTHY#
hardware signal for ALL node slots in the chassis. This time can range from 2 to 60 seconds. The
default is 2 seconds.
12.5.2Setting the Healthy# Ramp-Up Time
The following command can be used to set the max imum amount of time in seconds the CMM will
wait for the HEALTHY# hardware signal to be asserted all SBCs in the chassis.
cmmset -l chassis -d healthyrampuptime -v [time]
Where time is a value between 2 and 60 seconds. The default is 2 seconds.
Setting this value applies to all boards in the chassis. For every newly inserted bo ard, or every
board being powered on, the CMM will always wait the allotted healthyrampuptime, even if the
board asserts HEALTHY# before healthyrampuptime expires.
12.5.3Retrieving the Maximum Power-Up Attempts
The following command is used to retrieve the configured value for the maximum number of tries
the CMM will attempt to power up a board during the power sequencing loop.
cmmget -l chassis -d maxpowerupattempts
The default value for maxpowerupattempts is -1, and indicates an infinite number of attempts will
be made by the CMM to power up boards in the chassis. This value applies to all boards in the
chassis.
12.5.4Setting the Maximum Power-Up Attempts
The following command is used to set the value for the he maximum number of tries the CMM will
attempt to power up boards in the chassis during the power sequencing loop.
cmmset -l chassis -d maxpowerupattempts -v “[# of attempts]”
Where # of attempts is the desired number of attempts the CMM should try to power up boar ds in
the chassis enclosed in quotes. The default is a value of “ -1” and indicates the CMM will try an
infinite number of times to power up boards.
80Technical Product Specification
Intel® NetStructureTMZT 7102 Chassis Manage ment Module
Note: To set the maxpowerupattempts back to the default value of -1, you need to have a space between
the first quote and the number 1 (i.e., “ -1”).
Setting a value of “0” will cause the CMM to discontinue attempting to power up boards in the
chassis. Rebooting the chassis when the value is set to “0” will prevent the CMM from powering
up any blades in the chassis.
The maximum value that can be set for maxpowerupattempts is 2000000000.
This value applies to all boards in the chassis. Changing this value to a greater value with boards
that failed to power by reaching the previous maximum power up attempts will cause the CMM to
incrementally attempt to power up the board with the difference between the two maximums. For
example, for a board that failed to power up with a maxpowerupattempts of 5, changing the
maximumpowerupattempts to a value of 12 will cause the CMM to attempt to power up that board
an additional seven more times.
Failure of a board to power after reaching the maximum number of attempts will cause a SEL event
to be logged indicating this.
12.5.5Power Sequencing SEL Events
The following power sequencing events will cause an event to be recorded in the chassis SEL.
1. CMM detects the presence or removal of a board
Slot Power Control
Slot X Event Blade Presence Detected
Slot X Event Blade Removed
2. CMM detects the assertion/deassertion of the HEALTHY# signal from the board
Slot X Event Blade Asserted HEALTHY#
Slot X Event Blade Deasserted HEALTHY#
3. CMM detects a board has failed to power up after reaching the maximum power up attempts
Slot X Event Blade Failed HEALTHY# After Maximum Attempts
4. CMM detects the powering on or off of a board
Slot X Event Blade Powered On
Slot X Event Blade Powered Off
5. CMM detects a board has reset
Slot X Event Blade Reset
6. CMM detects a slot has been placed in offline or active
Intel® NetStructureTMZT 7102 Chassis Manage ment Module
13.0Power Supplies
13.1Power Supply Detection
Unlike blades, there is no hardware support for the detection of power supply presence. Therefore,
an additional process is used to periodically scan for the presence of IPMI power supplies.
Specifically, every five seconds, the process sends an IPMI GetDeviceID to each of the possible
power supply slots. If a r esponse is received, then it is kno wn that an I PMI power supply is pres ent.
13.2Inhibit, Degrade, and Fail Signals
The CMM and power supplies do share several hardware signals that provide some limited
functionality. These signals work with existing (non-IPMI) power supplies and are expected to
work in the same way for the IPMI power supplies. The Inhibit signal is an output from the CMM
that can be used to effectively turn off a power supply. Querying the Inhibit sig nal will indicate
whether the CMM has inhibited the supply or not. When a power supply degrades or fails, it
signals these conditions to the CMM using the Degrade and Fail inputs.
Power Supplies
The CMM can detect if any power supply is Degraded or Failed, then it can be deduced that there
is a power supply present. The new feature provided by IPMI supplies is the ability to detect the
presence of a power supply when the power supply is operating normally.
13.3Inhibiting Power Supplies
The CMM has the ability to inhibit any of the power supplies in the chassis. Each power supply can
be inhibited individually.
The state of inhibited power supplies is synchronized from the active to the standby CMM. If a
failover were to occur, the inhibited power supplies would remain inhibited.
The state of inhibited power supplies is not persistent across chassis power cycles.
13.4Precautions For Inhibiting Power Supplies
Care should be taken when inhibiting power supplies. Inhibiting certain supplies or groups of
supplies may cause the loss of po wer to po rtions of the chass is, in cluding power to the CMMs. It i s
also possible to inhibit all of the power supplies, which causes a loss of power to the entire chassis,
including the CMMs.
Once the CMMs lose power, they are no longer able to drive the INHIBIT# line to the power
supplies, which causes all of the supplies to power up again. Losing power to both CMMs is
equivalent to power cycling the chassis.
Care should be taken to prevent inhibiting all of the supplies in a chassis as well as losing power to
both CMMs so that the reset condition does not occur.
Power supplies can be inhibited through the CMM. This is accomplished using the following
command:
cmmset -l chassis -d psinhibitN -v 0
Where N is the number of the power supply that is to be inhibited.
Note: When a non-IPMI supply is inhibited, a SEL entry is logged indicatin g a failu re condition. When
the non-IPMI supply is enabled a SEL entry is logged indicating that the power supply has
recovered from a failure condition. This does not occur in cu rren t IPMI -comp liant power supplies .
13.6Enabling Power Supplies
To enable a supply which has been inhibited, issue the following command:
cmmset -l chassis -d psinhibitN -v 1
Where N is the number of the power supply that is to be enabled.
Note: When a non-IPMI supply is enabled a SEL entry is logged indicating that the power supply has
recovered from a failure condition. This is because when a non-IPMI supply is inhibited, a SEL
entry is logged indicating a failure conditi on. This does not occu r in current IPMI-com pliant power
supplies.
84Technical Product Specification
Intel® NetStructureTMZT 7102 Chassis Manage ment Module
14.0Drone Mode SBC Support
An SBC is said to be “drone mode capable” if it can be configured to ignore the PCI_RST# signal
coming from the PCI bus when inserted in a peripheral slot in a CompactPCI chassis. In this “drone
mode,” the board is operating independently of the PCI bus.
Because it is not acting as a peripheral on the PCI bus, and therefore not dependant on the system
master for correct initialization and power up, the normal methods used by the CMM for power
sequencing a peripheral boar d do not apply t o the drone bo ard in that PC I segment. Thi s allows two
things to occur for drone boards that normally wouldn’t occur for standard peripheral boards:
• A drone mode capable board can b e p owered up in a per ipheral s lot witho ut th e sys tem m aster
slot being populated and running for that particular PCI segment.
• If the system slot board is extracted/goes unhealthy, the drone mode capable boards in that
particular PCI segment should not be powered off.
14.0.1Adding a Drone Mode Capable SBC
The CMM maintains an internal table of drone mode capable SBCs. For the CMM to recognize a
drone mode capable board, it must also support IPMI 1.0 or above in addition to being able to
operate in a drone mode. To add a drone mode capable SBC to the table issue the following CLI
command, substituting the appropriate blade number for N:
Drone Mode SBC Support
cmmset -l bladeN -d IgnoresPCIRst -v 1
Once this command is issued, the CMM will send a GetDeviceID command to the blade and
retrieve its manufacturer and product ID. It then adds this information to its internal table of drone
mode capable SBCs. That drone mode capable SBC can now be configured to operate in drone
mode and placed in any node slot within the chassis thereafter.
The CMM will then treat any board whose manufacturer and product ID match the one listed in the
table as drone mode capable.
14.0.2Removing a Drone Mode Capable SBC
To remove a drone mode SBC from the internal table on the CMM, issue the following command:
cmmset -l blade5 -d IgnoresPCIRst -v 0
This removes the listing for that manufacturer and product ID from the internal table on the CMM,
and any boards matching this manufacturer and product ID thereafter will be treated as standard
CompactPCI system or peripheral boards.
Intel® NetStructureTMZT 7102 Chassis Manage ment Module
15.0Active vs. Offline Slots
A slot operating normally is in what is defined as an active mode. The CMM has the capability to
place a slot in an offline mode. In an offline mode the CMM ignores the HEALTHY # signal from
the board in terms of power s equ enci ng, and al s o d oes not s end any h ealth events that occu r on the
board. Placing a slot into offline mode allows for troubleshooting and debugging an unhealthy
board.
If the board has an IPMI controller on it that is powered by IPMB power (s tandby), the CMM can
access the IPMI controller and hardware monitors connected to it even if the board itself has
powered down. A slot in which a board goes unhealthy can be placed into the offline mode so that
the CMM can get information from the IPMI controller and hardware monito rs on the board w hich
can be used to diagnose problems with the board.
15.1Determining the State of a Slot
Slots are set by default to the active mode, which allows for normal CompactPCI operation. A
cmmget of the powerstate of a slot can be used to deter mine if a slot has been placed into an of fline
mode. See Section 12.3, “Obtaining the Power State of a Board” on page 78 for more information
on obtaining the powerstate of a slot.
Active vs. Offline Slots
15.2Setting a Slot to Offline Mode
The following command will place a slot in offline mode:
cmmset -l bladeN -d powerstate -v offline
N is the number of the slot to be placed in an offline mode.
15.3Setting a Slot to Active Mode
The following command will place a slot into the active mode for normal operation:
cmmset -l bladeN -d powerstate -v activate
N is the number of the slow to be placed into the active mode.
15.4Limitations of the Offline Mode
The CMM does not deassert BD_SEL# and power to an offline slot. Thus, when presence for an
offline slot is queried, it will return as present even with the board extracted from the slot.
Also, because the CMM does not recognize board extractions/insertions in an offline slot due to
BD_SEL# remaining asserted, the slot should be placed into active mode before a new board is
inserted into a slot in the offline mode. If this is not done, the CMM retains all of the information of
the board that was in the slot when it was placed in the offline mode.
Intel® NetStructureTMZT 7102 Chassis Manage ment Module
16.0Obtaining FRU Information
The CMM has the ability to obtain FRU information from IPMI 1.0 and higher compliant devices.
The entire FRU can be retrieved, or individual fields from the FRU.
16.1FRU Information
The FRU of an IPMI compliant device should be compliant with the “Platform Management FRU
Information Storage Definition v1.0.” In this specification, the FRU can contain information in
any, all or none of the following areas: chassis info, board info, and product info.
The CMM can query the entire FRU of a device, entire areas of a FRU, or individual fields in the
different areas of the FRU.
For detailed information on FRUs, please refer to the “Platform Management FRU Information
Storage Definition v1.0.”
16.2FRU Query Syntax
Obtaining FRU Information
To query FRU information, the CMM uses FRU as its target (-t) parameter. The format for
querying the FRU of a particular location is:
cmmget -l [location] -t fru -d [FRUdataitem]
Where location is the component for which the FRU information is to be retrieved from, and
FRUdataitem is the field(s) of the FRU which will be retrieved.
Table 41 lists the various FRU data items and the inform ation they retrieve.
T a ble 41. Dataitems Used With FRU Target (-t) to Obtain FRU Information (Sheet 1 of 2)
Data ItemDescription
allReturns all FRU information for the location (Not supported over SNMP)
boardall
boarddescriptionLists the desc ription field in the FRU board area for the location
boardmanufacturerLists the manufacturer field in the FRU board area for the location
boardpartnumberLists the part number field in the FRU board area for the location
boardserialnumberLists the serial number field in the FRU board area for the location
boardmanufacturedatetimeLists the manufacture date and time field in the FRU board area for the location
productall
productdescriptionLists the description field in the FRU product area for the location
productmanufacturerLists the manufacturer field in the FRU product area for the location
productmodelLists the model field in the FRU product area for the location
productpartnumberLists the part number field in the FRU product area for the location
Lists all board area FRU information for the location (Not supported over
SNMP)
Lists all product area FRU information for the location (Not supported over
SNMP)
Table 41. Dataitems Used With FRU Target (-t) to Obtain FRU Information (Sheet 2 of 2)
Data ItemDescription
productserialnumberLists the serial number field in the FRU product area for the location
productrevisionLists the revision field in the FRU product area for the location
chassisallLists all chassis area FRU information for the location
chassispartnumberLists the part number field in the FRU chassis area for the location
chassisserialnumberLists the serial number field in the FRU chassis area for the location
chassislocationLists the location field in the FRU chassis area for the location
chassistypeLists the type field in the FRU chassis area for the location
listdataitemsDisplays a list of all of the FRU dataitems that can be queried for the FRU target
16.3Chassis FRU Validity Check
Chassis FRU validity is read on a periodic basis (every 24 hrs). A reuse/redefinition of two
existing BIST FRU error messages in place when one or both of the Chassis FRU cannot be read.
When the FRU (usually primary) cannot be read, and another message for when both primary and
secondary cannot be read
"Primary FRU unreadable - using Secondary"
"FRU unreadable!"
These two error messages are now used if the chassis FRU is detected to be corrupt will be a SEL
entry and an error message will go into /home/log/error.log
90Technical Product Specification
Intel® NetStructureTMZT 7102 Chassis Manage ment Module
17.0Fan Control and Monitoring
The CMM controls the fan speeds and the fan tray LEDs. In a healthy state (no events) the LED
changes to a green color. If any of the fan t ray sensors (temperature, voltages, fan tachs) are in an
unhealthy state, the LED changes to orange.
17.1Setting Fan Speed
The factory default fan speed is 100 percent. The user can set the fan speed to 100 percent, 80
percent and 0 percent of the full speed through any of the supported interfaces. Setting the fan
speed from the CMM changes the fan speeds for all of the fans in the chassis. Setting the fan speeds
to 0 percent turns off the fans.
Note: The fan speed setting is persistent between CMM reboots.
The following command can be used to set the fan speed:
cmmset -l chassis -d fanspeed -v [100, 80, 0]
Fan Control and Monitoring
Where the value is 100 for 100 percent, 80 for 80 percent, or 0 for off.
Note: Querying fanspeed on the CMM will always reflect what the fan speed value was set to, not what
the actual fan speed is.
17.1.1Considerations for Turning Off the Fans
Some fan tray designs will not allow the fans to be turned off and will override the CMM setting
with hardware on the fan trays. The CMM cannot detect fan tray hardware that provides such an
override. Consult the fan tray or chassis documentation for further information on setting fan
speeds.
For fan trays that do not allow fans to be turned off, querying the fanspeed on the CMM after
setting it to zero will still show the fanspeed as set to zero because this is what is being output by
the CMM.
Also, setting the fan speed to 0 (off) will override the automatic fan control of the CMM.
Temperature and fan tray events will no longer cause the CMM to drive the fans to full speed.
17.2Automatic Fan Control
The CMM will drive the fans to full speed (100 percent) under any of the following conditions:
• An upper temperature threshold is violated in the platform, including blades.
• A fan tray is removed from the chassis.
• A fan tachometer crosses a lower threshold.
• A fan board controller has a failure.
The fans are also driven to full speed automatically if both CMMs are removed from the chassis.
Note: Once the CMM automatically drives the fan speeds to 100 percent because of one of the above
health events, it is still possible to set the fan speeds to 80 or 0 through the supported interfaces
(CLI, etc). Once the automatic override of the fan speeds has been deactivated by resetting the fan
speed to 80 or 0, the fans will remain at the newly set speed even after the condition that caused the
automatic override has cleared.
17.3Querying Fan Tray Sensors
To query the fan trays and fan tray sensors, use fantrayN as the location (-l) of the cmmget
command, where N is the number of the fan tray being queried. For example, to query the current
value of FANTK1 on fantray1, issue the command:
cmmget -l fantray1 -t “FANTK1” -d current
92Technical Product Specification
18.0CMM Scripting
18.1CLI Scripting
In addition to calling the CLI directly, commands can easily be called through scripts using “bash”
shell scripting. These scripts could be tailored to create a single command from several CLI
commands or to give more detailed information. For example, you may want to display all of the
fans and their speeds on the server . A script could b e written that would first call the CLI to find out
what fan trays are present. Next it would find out what fan sensors are in each fan tray. Finally it
would call the CLI to get the current speeds of each of the fans.
Scripts can be written directly on the CMM and should be saved on the CMM as a file in flash in
the /home/scripts directory.
18.1.1Script Synchronization
Script files are not synchronized automatically when copied or changed (by deleting, renaming,
altering its chown/chmod/chgrp permis si o ns , etc) in the /home/scripts directory on the active
CMM. The Linux “touch” command should be issued to the /home/scripts directory on the active
CMM to synchronize the scripts. Scripts are automatically synchronized on any full
synchronization (chassis power up, insertion of a new CMM) as well as when they are edited (i.e.,
using vi and writing the file).
Intel® NetStructureTMZT 7102 Chassis Manage ment Module
CMM Scripting
Scripts need to be deleted from both CMMs manually. Deleting a script on the active CMM does
not automatically delete the script on the standby.
Note: Scripts are always synchronized from the active CMM to the standby CMM. Adding, editing, or
modifying scripts on t he stan dby CMM should be done with caution, and will need to be manually
copied to the active CMM.
18.2Associating Scripts to Event Severity
Health events triggered on the CMM can be used to execute scripts stored locally in the
/home/scripts directory. Any level of an event can be used as a trigger: normal, minor, major, and
critical.The CLI command for associating a script with an event is:
Location is the component in the chassis that the health event is associated with.
Target is th e sensor to be t riggered on.
Action type is NormalAction, MinorAction, MajorAction, or CriticalAction based upon the
severity of the event to be triggered on.
Script is the script file or executable in the /home/scripts directory to be run including paramete rs
to be sent to the script. The script and parameters should be enclosed in quotes. The script
parameter should not include the /home/scripts path.
Note: If applicable, remember to set a script for when a sensor returns to no rmal (NormalAction). A
script will not automatically stop running when a sensor returns to a normal setting (no alarms or
events).
For example, if you wanted to run a blade powerdown script called “powerbladedown” stored in
/home/scripts when the ambient temperature triggered a major event for a blade 4, the command
would be:
In this example, the /home/scripts/bladepowerdown script or executable will be executed with “4”
as a parameter when blade4’s Ambient Temp sensor generates a major health event.
18.2.1Listing Scripts Associated With Events
The scripts that are associated with events are put into the /etc/cmm.cfg file. To display a list of
scripts associated with events, cat the /etc/cmm.cfg file.
For further information on event scripting commands and its arguments, see Section 7.0, “CMM
Connection and Setup” on page 53.
18.2.2Removing Scripts From an Associated Event
To remove scripts from occurring for an event in which they have been associated, issue the
following command:
Location is the component in the chassis that the health event is associated with.
Target is the sensor that was being triggered on.
Action type is NormalAction, MinorAction, MajorAction, or CriticalAction based upon the
severity of the event that was being triggered on.
18.3Setting Scripts for Specific Individual Events
The CMM allows scripts to be associated with specific events which may not necessarily be health
related, such as the insertion or removal of a board from the chassis. This allows any single event
that can occur on the CMM to have an associated script, or scripts with it.
18.3.1Event Codes
To allow the user to set scripts based on any event, a unique event code is assigned to each event
that can occur on the CMM. The list of events and the codes associated with each event is detailed
..
in Section 11.0, “Health Event Strings” on page 67.
94Technical Product Specification
18.4Setting Event Scripts
Setting event scripts can be done using any of the standard CMM interfaces (CLI, SNMP, RPC).
The format for the CLI command is as follows:
cmmset -l [location] -t [Sensor Name] -d EventAction -v [Event
Code]:[script to be run]
This setting gets written to the cmm.cfg file and is synced to the standby CMM. It is persistent
across boots.
18.5Slot Events
The CMM treats slot related events by assigning a sensor to each slot. These sensors will be called
"Slot X Event" where X is the slot number. These will be discrete sensors and will show up in the
chassis "listtargets" command. This allows an event script like to be associated to slot related
events like any other sensor type.
For example, to launch a script called "Notify" when blade 5 is removed, the user would execute:
Intel® NetStructureTMZT 7102 Chassis Manage ment Module
CMM Scripting
Assigning sensors t o slo t bas ed events af fects the s trings s how n in SNMP trap s and SEL entri es fo r
slot events. The SEL entry and trap messages will now reflect the following:
Slot [Blade Number] Event [Event]
Where Event will be a string such as "Blade inserted", "Slot powered off", etc.
The CMM supports the Simple Network Management Protocol (SNMP). The CMM can support
SNMP queries and send SNMP traps in v1 or v3. The SNMP interface on the CMM very closely
mirrors that of the CLI in both syntax and function.
Note: Like the CLI, SNMP commands should be issued to the active CMM. The standby CMM will only
respond to commands for using the CMM location parameter.
The following diagram sh ows th e high-l evel layo ut of th e SNMP/ MIB c omponents and the fl ow of
the data via SN MP protocol.
Figure 11. High Level SNMP/MIB Layout
Intel® NetStructureTMZT 7102 Chassis Manage ment Module
SNMP
MIB/SNMP Manager
DMM MIB
Get/
Get-next/
Set
CMM
SNMP
Agent
CMM/MIB-ll
Modules
(calls API)
CMM API
Linux*
System Call
* Other names and brands may be claimed as property of others.
The CMM comes with a text file (ZT 71 02. mib) tha t descri bes the CMM o bjects to be managed , as
well as all of the managed objects in the platform. A remote application such as an SNMP/MIB
manager can compile and read this file and utilize this information to manage the sensor devices on
CMM, chassis, and server blades currently present. The ZT 7102.mib is located in the
/usr/local/cmm directory in the CMM. Users can utilize ftp or rcp to get this file from the CMM.
19.2MIB Design
The CMM supports the following MIB II objects. The writeable objects can be set in their
respective fields in the /etc/snmpd.conf file.
T a ble 42. MIB II Objects - System Group
ObjectSyntaxSizeAccessValue
sysDscrDisplayString0..127read-only
sysObjectID
sysUpTimeDays and Timeread-onlyTime since ZT7102 began running
sysContactDisplayString0..127read-writemax. 128 bytes
sysNameDisplayString0..8read-writeDefault:”ZT 7102”
sysLocationDisplayString0..127read-only
OBJECT
IDENTIFIER
read-only
“Linux ZT 7102 2.4.2-1 #156 [DATE] armv5”
Date is the actual current date.
Detailed descriptions of the MIB ob jects can be foun d in the ZT7102.mib f ile located on the C MM.
19.2.2Querying Non-IPMI Compliant Blades and Power Supplies
Slot control is a target that is specific to SNMP that is displayed in response to a listtargets
command when used on an unoccupied slot in the chassis. This target is not available if the slot is
occupied. The Slot Control target allows the user to perform other commands against that slot
without an IPMI-compliant blade or IPMI-compliant power supply present.
19.3SNMP Agent
The SNMP agent (snmpd) listens to SNMP v1 queries (gets/sets) by default, evokes the
corresponding MIB Module to process the request, and sends the SNMP response with return data
to the SNMP/MIB manager. All SNMP “set” queries are logged in the command log file.
98Technical Product Specification
Intel® NetStructureTMZT 7102 Chassis Manage ment Module
Note: Changing IP addresses when using SNMP v3 will require a restart of the snmpd process. This is
due to SNMP v3 using the IP add ress to gen erate the encr yption keys . To restart the snmpd process
follow steps 2 through 4 in Section 19.3.2.
19.3.1Configuring the SNMP Agent Port
The SNMP agent is set up to use port 161 by default. The port can be configured to use a different
port number by adding the following line to the snmpd.conf file:
agentaddress port_number
19.3.2Configuring the Agent to Respond to SNMP v3 Requests
The agent can also be configured to respond to SNMP v3 queries, in which case it checks the
security, decodes the request, then evokes the corresponding MIB Module to process the request,
and sends the SNMP response with return data to the SNMP/MIB manager. SNMP v3 adds support
for strong authentication and private communication.
To change the SNMP agent to respond to SNMP v3 queries:
1. Copy /etc/snmpdv3.conf to /etc/snmpd.conf.
2. Find the process ID of the snmpd process by issuing the command:
SNMP
ps -ax
3. Look for the snmpd process. Th ere may be more than one, s o use the lowest proces s ID, which
is the first instance of the process. The listing will look similar to th is:
121 ? SN 0:00 /usr/sbin/snmpd -c /etc/snmpd.conf
4. Restart the snmpd agent by issuing the follo wing command:
kill -s SIGHUP [snmpd_process_id]
Where snmpd_process_id is the process ID of the snmpd process found in the step above.
19.3.3Configuring the Agent Back to SNMP v1
To reconfigure the agent back to SNMP v1, follow the same steps as above, substituting the
/etc/snmpdv1.conf for /etc/snmpdv3.conf. The rest of the process is the same.
19.3.4Setting up an SNMP v3 MIB Browser
T o manage the CMM via SNMPv3 MIB brows er/manager (mg -soft, net-snmp, etc.), the user needs
to configure the browser with the following parameters:
1. Load and compile the ZT 7102.MIB file
2. Set the SNMPv3 security parameters:
— Set SNMPv3 agent user
— At default, User: root
— Set the MD5 Authentication password: cmmrootpass
— Set the DES Encryption password: cmmrootpass
The SNMP trap utility is utilized by the CMM management software to send SNMP trap messages
to a remote application regarding any abnormal system events. When enabled, the CMM will issue
SNMP v1 traps on port 162. The C MM can also b e configured to issue SNMP v3 traps . The SNMP
trap port can also be configured. For a description of all the traps that are issued, refer to Section
11.0, “Health Event Strings” on page 67.
19.4.1Configuring the SNMP Trap Port
To configure the SNMP Trap Port to a different port number, issue the command:
cmmset -l cmm -d SNMPTrapPort -v [Port Number]
Where Port Number is the desired SNMP Trap Port number.
19.4.2Configuring the CMM to Send SNMP v3 Traps
To configure the CMM to send SNMP v3 Traps, issue the command:
cmmset -l cmm -d SNMPTrapVersion -v v3
19.4.3Configuring the CMM to Send SNMP v1 Traps
To configure the CMM to send SNMP v1 Traps, issue the command:
cmmset -l cmm -d SNMPTrapVersion -v v1
19.5Configuring and Enabling SNMP Trap Addresses
The CMM allows up to five SNMP trap addresses destinations, SNMPTrapAddress1-5. In
redundant CMM systems, SNMP Trap Address 1 MUST be set to a valid IP address on the network that the CMM can ping to at all times. This is used as a test of network connectivity as
well as being the first SNMP Trap Address.
19.5.1Configuring an SNMP Trap Address
To configure an SNMP trap address, issue the command:
cmmset -l cmm -d SNMPTrapAddressN -v [IP address]
where N is the number of the trap address from 1 to 5 that is being set, and IP address is the IP
address of the trap receiver.
19.5.2Enabling and Disabling SNMP Traps
SNMP Trap addresses are enabled by default. To disable SNMP traps, issue the command:
cmmset -l cmm -d SNMPenable -v disable
To enable SNMP trap addresses, issue the command:
cmmset -l cmm -d SNMPenable -v enable
100Technical Product Specification
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.