Monday, 21 January 2013

How To: Set up the Intel Remote Management Module (RMM)

We install the Intel Remote Management Module (RMM) into all of our Intel server based deploys. If deploying a Tier 1 box we install theirs and make sure the KVM over IP option is enabled (license purchased).

Having out-of-band management access to a server can save critical time in the event of a server problem. We no longer need to jump in a vehicle and run down to our client’s site or have someone on-site for our remote clients.

Out of the box the RMM needs to be properly configured.

Once the server has been assembled and all of its components have had their firmware updated (Intel Download Site) we configure our RMM via the server board’s BIOS.

  1. Turn the server on and F2 into the BIOS.
  2. Server Management Tab.
  3. BMC LAN Configuration
  4. Set the IP for the RMM
    1. In the shop we leave it DHCP so that we can remote into the server while here.
    2. Client’s site we tend to plug directly into the Internet and give it a static IP.
  5. Set the BMC DHCP Host Name
    1. Convention is a bit goofy (no special characters).
    2. image
  6. Choose User ID and hit [Enter]
    1. Choose User3
      • image
    2. Privilege: Administrator
    3. User Status: Enabled
    4. Set the user name: JungleJim
    5. Set the user password: Icanacc3ssthis (x2)
  7. We end up with this.
    • image
  8. F10 to save settings and reboot the server.

If using DHCP then check the network’s DHCP Server console for the IP that the RMM has picked up.

Open a browser and navigate to the RMM IP.

image

Log on with the credentials set. Barring two left thumbs we should be able to log in.

image

Once in we are able to launch the KVM over IP, reset the server’s power, power it up or down, and check the server’s current status.

The cost on the Intel units and Tier 1 equivalents will cover one on-site visit.

We believe that an RMM/iLO Advanced/iDRAC Enterprise and other remote management module should be a part of _every_ server configuration.

Philip Elder
MPECS Inc.
Microsoft Small Business Specialists
Co-Author: SBS 2008 Blueprint Book

Windows Live Writer

15 comments:

Unknown said...

I have the card and network interface card on the server installed but still cant access the cards (both network leds are solid green)
ive tryed updating the biso (as suggested by intel) but cant seem to get any further with that
the error desplayed is it cant find the biso info and closes
I know this posts old but any help would be good

Its a Intel SR1500PAL

Unknown said...

I have the cards installed on my server but still cant access it via the web (both network card led's are solid green,
intel suggested updating the hardware but i cant seem to get any of there media to work, there deployment Cd just says there's nothing to update,Any ideas what im doing wrong or help would be good.

the servers A Intel SR1500PAL

Philip Elder Cluster MVP said...

Oliver,

The RMM module and its dedicated NIC are set up correctly? All ribbons are seated correctly?

Do you see the RMM option listed in the BIOS as per this blog post?

Put the uEFI based update files on a flash drive. Boot into the EFI shell and run the update.nsh file. Follow the instructions.

If the RMM module is there it will get an update as well though some older models required an independent firmware update.

Unknown said...

Hi Philip, sorry for the late response
they are installed both cards but the nic isn't seen in the server, My cards did not arrive with any ribbon cables, there dosnt seem to be any room for the serial calble on this chassie on were it's located, unless it needs one of the pci ones, I hadn't tryed that yet with the uefi boot mode ill let you know later on, cheers

Unknown said...

Hi Philip, sorry for the late response
they are installed both cards but the nic isn't seen in the server, My cards did not arrive with any ribbon cables, there dosnt seem to be any room for the serial calble on this chassie on were it's located, unless it needs one of the pci ones, I hadn't tryed that yet with the uefi boot mode ill let you know later on, cheers

Unknown said...

I have also updated the Bios and BMC now, still no diffrence.

Unknown said...

the cards i have in this system are the RMM2 also, i didnt mention this

Philip Elder Cluster MVP said...

Oliver,

It's been quite a while but IIRC the RMM2 required a separate update process to the mainboard and its components.

Management may be via GUI/CMD too. It's been a _long_ time since we've dealt this one.

Unknown said...

ill try the command line tool later on, having to install 2008 R2 as 2012 isnt fully compatible on this server. (as the RMM2 kira tool wont open correct on 2012),
ive spoken to the supplier of the card they may replace it.
Im unable to fine the "psetup utility" as mentiond in the manual have you still got program at all?

thanks for your help so far

Unknown said...

thanks for the message!, I've got to the stage of resetting the user password but it says "could not reset the device to factory settings. Device authentication failed"

command I put was kiratool defaults -u -p

the commands for this are here to help-
https://downloadmirror.intel.com/19523/eng/README.txt

Unknown said...

Got it working! how do you go about generating the SSL for these cards theres not much how to guides for it the CRS file thats been made needs validating but what with?, or is there away to removce that as java dosnt allow the remote session

Philip Elder Cluster MVP said...

The CSR may not meet current requirements.

We add the "site" IP to the Java console security section's whitelist.

For the more finicky setups we have a Win7 VM with Java 5 or 6 on it to connect without the pain newer browsers and Java require.

Unknown said...

Ahh thanks for your help!, ill try that later on

Unknown said...

ive tryed using a older java but not on a Vm- that ill try later, any idea how to remove the SSL from the KVM side of things? or does it have to a domain thats public on it?

Philip Elder Cluster MVP said...

Oliver,

Uncheck the USE SSL option (or FORCE SSL). All of our RMMs were HTTP.