1.1 Web GUI Introduction

The Web GUI of the BMC is a critical component that provides an intuitive and user-friendly platform for remotely managing and monitoring server operations. This web-based interface ensures administrators can efficiently interact with the server’s BMC from anywhere.

1.1.1 Environment Setup

Before logging into the BMC Web GUI, certain environmental prerequisites must be met:

  • Network Configuration

    • Ensure the server and the device used for access are on the same network or have a valid route to connect.
  • Browser Requirements

    • Verify that the web browser used is compatible with the BMC Web GUI. Commonly supported browsers include Chrome, Firefox, Safari, and Edge.
  • BMC IP Address

    • The BMC is configured to use a dynamic IP address. You will need to retrieve the current IP address from the server’s BIOS interface:

    • Navigate to the “Server Mgmt” tab and select the BMC network configuration option.

    image-20250723152151705

  • Security Considerations

    • For security reasons, access to the BMC Web GUI is restricted to HTTPS only.

1.1.2 User Sign-In

  1. Accessing the Login Page
  • Open your web browser and type in the BMC’s IP address, obtained from the BIOS, preceded by “https://”. For example, https://[BMC-IP-Address].

  • This action will direct you to the BMC Web GUI login page.

    image-20250723152337097

  1. Selecting Language

    a. Below the login fields, select your preferred language.

    b. Select one of the multiple languages the BMC Web GUI supports, including Simplified Chinese, Traditional Chinese, and English.

    c. Choose your desired language from the dropdown menu before logging in.

  2. Entering Login Credentials:

    a. On the login page, you will be prompted to enter your username and password.

    - Default username: admin
    - Default password: admin
    

    b. After entering these credentials, click the Sign me in button to proceed.

  • Other Fields

Remember Username: Check this option to remember your login username. If you select this option, the browser will save your credentials internally and automatically fill in your username the next time you visit the site.

I Forgot My Password: If you forget your password, you can generate a new password using this link.

1.2 Web Interface Overview

This section provides an overview of the BMC Web Interface, emphasizing the functionalities and information displayed on the main interface. The primary purpose of the main interface is to offer a quick and comprehensive understanding of the current status of the BMC.

img

The BMC Web GUI is primarily divided into three sections, each offering specific functionalities and information crucial for server management.

1. Top Menu Bar

Functionality: The top menu bar is designed for receiving and viewing server messages, setting BMC global configurations, and accessing the BIOS configuration interface. This area serves as a quick access point for important notifications and system adjustments.

Function Icon Detailed Description
Message img Displays received messages.
Notification img Displays received notifications.
Language img Sets the board language.
Bios Interface img Opens a new window or popup to configure BIOS settings.
Dashboard Expansion img Shows/Hides limited dashboard widgets.
2FA img Enables/Disables two-factor authentication.
Synchronization img On/Off to synchronize with latest Sensor and event Log updates.
Refresh img Reloads the current page.
Profile img Sets the user profile.

2. Server Version Information

This section of the interface displays the current version information for various server components.

The version information window provides a quick overview of the server’s hardware and firmware status, ensuring that administrators are immediately aware of the current versions and operational status.

3. Function Menu Bar

The menu bar displays the following:

Version Information, including the latest version, date, and time details. Power control status, shown as Host Online. To change the power control status, click the Host Online link.

  • Dashboard

  • Sensor

  • System Inventory

  • FRU Information

  • Logs & Reports

  • One-Click Log Collection

  • Settings

  • Remote Control

  • Image Redirection

  • Power Control

  • Maintenance

  • Sign Out

1.3 Sensors Information

1.3.1 FRU Information

img

The FRU (Field Replaceable Unit) Information interface in the BMC Web GUI is accessed by clicking on the FRU Information option in the left-hand function bar. This feature allows users to view electronic label information for the motherboard and other components, providing detailed FRU data.

Structure and Functionality of the FRU Information Interface. The FRU information is divided into four main sections, each offering specific insights:

Information Category Description
Available FRU Devices Details about each FRU device: FRU Device ID FRU Device Name
Chassis Information Information related to the server’s chassis:
- Chassis Information
- Area Format Version
- Chassis Type
- Chassis Part Number
- Chassis Serial Number
- Chassis Extra
Board Information Data about the server’s mainboard:
- Board Information Area Format Version
- Language
- Manufacture Date Time
- Board Manufacturer
- Board Product Name
- Board Serial Number
- Board Part Number
- FRU File ID Board Extra
Product Information Comprehensive details about the product:
- Product Information Area
- Format Version
- Language
- Product Manufacturer
- Product Name
- Product Part Number
- Product Version
- Product Serial Number
- Asset Tag FRU File ID
- Product Extra

1.3.2 Sensor Information

The Sensor Information panel in the BMC Web GUI provides a detailed overview of the current status and readings from various sensors within the server. Accessing and understanding this data is essential for maintaining the server’s health and performance.

Accessing the Sensor Information Panel

To Access the panel:

Click on the Sensor button located on the left side of the BMC Web GUI

1.3.2.1 Introduction to Sensor Interface

This will lead you to the Sensor Information interface, which is essential for real-time monitoring of sensor status.

1.3.2.2 Sensor Information Interface Layout

The Sensor Information interface is divided into four distinct sections, each providing specific types of sensor data:

1. Critical Sensors

img

This section displays the status of critical sensors, highlighting any that have exceeded their thresholds or are showing abnormal readings. It’s a focal point for quickly identifying potential issues that require immediate attention.

2. Discrete Sensor States

img

This section Shows the status of discrete sensors, particularly focusing on those that are offline. It is crucial for identifying sensors that are not functioning or are disconnected.

3. Normal Sensors

img

Displays the actual readings from various sensors. These readings include data such as temperature, fan speeds, voltage levels, and more. The section provides a comprehensive view of the real-time operating conditions of the server.

4. Disabled Sensors

img

Lists sensors that are currently not in operation or are disabled. This section helps in identifying which sensors are not contributing to the monitoring process and may need reactivation or maintenance.

1.3.2.3 Detailed Sensor Information

Accessing and Viewing Sensor Details

To view detailed information about a specific sensor, simply click on the desired sensor listed in the Sensor Information panel. This action will lead you to a dedicated detail page for that sensor.

On this detailed page, extensive information about the selected sensor is displayed, including its current operational status, various parameters, and any unique specifications.

img

  • Customizing Sensor Thresholds

For general sensors, the detailed interface allows adjustment of various sensor threshold parameters. Administrators can modify several threshold levels, including:

  - Upper Non-Recoverable

  - Upper Critical

  - Upper Non-Critical

  - Lower Non-Critical

  - Lower Critical

  - Lower Non-Recoverable
  • Practical Application

Adjusting these thresholds is vital for preemptive alerts and ensuring that sensors are operating within safe and optimal ranges.

img

If the synchronization button in the top menu bar is active, accessing the detail interface for a general sensor will enable a graphing feature. This feature provides a line graph depicting the sensor’s data over time. It serves as a visual tool for quickly assessing the sensor’s performance.

1.3.2.4 Modifying Sensor Thresholds

Accessing Sensor Thresholds Modification Interface

In the Sensor Details interface, locate and click on the Change Thresholds button. This action will redirect you to the Sensor Thresholds interface.

img

Sensor Thresholds Interface

  • The Sensor Thresholds interface displays each sensor’s name along with its threshold values.

  • Users can view and modify thresholds for each sensor, including upper and lower warning and critical limits.

  • Thresholds not applicable or unavailable for a sensor are marked as “NA”.

Retaining Threshold Values


At the bottom of the interface, the Retain Threshold Values checkbox is provided.

*Note:* If this option is not selected, threshold adjustments will be temporary, reverting to default upon BMC reboot or power loss.

1.4 Server Information

BMC provides various logging functions that are crucial for system diagnosis, monitoring, and security. Logs are divided into different types, each with a specific purpose.

Accessing BMC Logs

To view these logs, navigate to the BMC web interface:

  1. From the left-side functional panel, click on Logs & Reports.

  2. A dropdown menu will appear, listing the following types of logs available for viewing:

    img

1.4.1 IPMI Event Log

This page displays a list of event logs generated by the various sensors on this device. Double-click a record to view its details. You can use the sensor type or sensor name filters to view specific events, or sort the list of entries by clicking on any column header.

To open the Event Log page, click Logs & Reports > Event Log from the menu bar. A sample screenshot of the Event Log page is shown below.

img

The Event Log page consists of the following Fields:

  • Filter By Date: Filtering can be done by selecting Start Date and End Date using Calendar.

    *Note:* Date should be in MM/DD/YYYY format.

    By default, all log time will be displayed in BMC time zone.

  • Filter By Type: The category could be either All Events, System Event Records, OEM Event Records, BIOS Generated Events, SMI Handler Events, System Management Software Events, System Software - OEM Events, Remote Console Software Events, Terminal Mode Remote Console software Events.

    *Note:* Once the Filter By Date and Filter type are selected, the list of events will be displayed with the Event ID, Timestamp, Sensor Type, Sensor Name, and Description.

  • UTC Offset: Displays the current UTC Offset value based on which event Timestamps will be updated. Navigational arrows can be used to selectively access different pages of the Event Log.

  • Event Log Statistics: Displays the statistical graph for the selected date.

  • Clear Event Logs: To delete all the event logs.

  • Download Event Logs: To download the event logs.

Procedure

  1. From the Filter By Date field, select the time period by Start Date and End Date using Calendar for the event categories. The events will be displayed according to the selected date.

  2. From the Filter By Type field, select the Type of the event and Sensor name to view the events for the date. The events will be displayed based on the selected time period.

  3. To clear all events from the list, click Clear All Event Logs.

  4. To download the event logs, click Download Event Logs.

    *Note:* When Clear All Event Logs action is performed, there might be some events present even after clearing those events are generated after performing clear operation which can be verified using its timestamp.

1.4.2 System Log

System Log page will display all the system events occurred in this device that has been already configured.

*Note:* Logs have to be configured under Settings > Log Settings in order to display any entries.

To open the Event Log page, click Logs & Reports > System Log from the menu bar.

img

Procedure

To view System Log, click the System Log tab to view all system events. Entries can be filtered based on Filter By Date (Start Date and End Date) and Event Category like Alert, Critical, Error, Notification, Warning, Debug, Emergency, and Information.

1.4.3 Audit Log

Audit Log page will display all the system events occurred in this device that has been already configured.

*Note:* Logs have to be configured under Settings > Log Settings > Advanced Log Settings in order to display any entries.

To open the Event Log page, click Logs & Reports > Audit Log from the menu bar.

img

1.4.4 Video Log

The video log page will record the configured system events in the device in a video format that has been already configured.

*Note:* Video Trigger Settings should be enabled, to display the Video Log page. Video Trigger Settings can be configured under Settings > Video Recording > Auto Video Settings > Video Trigger Settings.

  1. To open the Video Log page, click Logs & Reports > Video Log from the menu bar. A sample screenshot of Video Log page is shown below.

    img

  2. After clicking on the video event, the video conversation box will pop up.

  3. Play the current video. In this interface, you can choose to download or delete the current video log.

    image-20250624135156743

*Note:* Video playback or download is allowed only if the file size is less than 40MB. Due to browser memory restrictions, browsers cannot store or process data larger than approximately 40MB. If the file size exceeds 40MB, the user will be notified with a message to use the Java Player application.

The video data may not display properly if the browser’s zoom in/out settings are changed during video playback. To download a video, you need to wait for the video buffering to complete before downloading.

1.4.5 SOL Video Log

The SOL Video log page will record configured system events through SOL.

*Note:* SOL Trigger Settings should be enabled to display the SOL Log page. SOL Trigger Settings can be configured under Settings > Video Recording > SOL Settings > SOL Trigger Settings. SOL Configurations can set the baud rate of the serial port.

To open the Video Log page, click Logs & Reports > SOL Log from the menu bar. A sample screenshot of SOL Log page is shown below.

image-20250624135502015

  • S. No - The serial number

  • File Name - The video filename.

  • File Information - Day, date, and time of video upload.

  • Download - To download the selected video.

  • Delete - To delete the selected video.

*Note:* The timestamp displayed in the file information represents last modified time, and it will be updated (if the file is modified) when the webpage is refreshed.

1.5 Power Control

It is used to control power on the WEB. A sample screenshot of service management is shown below.

image-20250624135556821

The power control consists of the following items:

  • Power Off: Power on the chassis.

  • Power On: Power off the chassis.

  • Power Cycle: Power off the chassis and power on the chassis.

  • Hard Reset: Restart the chassis.

  • ACPI Shutdown: Soft power off the chassis.

1.6 BMC Settings

The BMC Settings section in the BMC web interface is a centralized location for accessing and modifying a wide range of configuration settings for the BMC.

  1. In the BMC web interface, click on the Settings button located in the functional menu on the left side.

  2. This action will open a group menu that displays various configurable options and settings.

    image-20250624135711675

Features

  • Comprehensive Configuration: This interface allows you to adjust and set most of the BMC’s configurations, tailoring the controller to your specific needs and preferences.

  • Information Retrieval: This section also provides access to essential information about the BMC and the server it manages.

1.6.1 Captured BSOD

This page displays a snapshot of the blue screen captured if the host system crashed since the last reboot.

A screenshot of Captured BSOD is shown below.

image-20250624135750538

*Note:* KVM service should be enabled to display the BSOD screen. KVM Service can be configured under Settings > Services > KVM.

1.6.2 Date & Time

This field is used to set the date and time on the BMC. A sample screenshot of Date & Time is shown below.

image-20250624135957676

The Date & Time section consists of the following fields:

  • Configure Date & Time: Displays Time zone list containing the UTC offset along with the locations and Navigational line to select the location which can be used to display the exact local time.

  • Select Time Zone: This field is used to set the date and time on the BMC.

*Note:* Based on the manual selection of GMT or ETC/GMT, time zone alone will be changed and date & time will remain the same.

NTP Settings

  • Automatic NTP Date & Time: To automatically synchronize Date and Time with the NTP Server.

  • Primary NTP Server: To configure a primary NTP server to use when automatically setting the date and time.

    • Supported formats: IPv4 Address format. IPv6 Address format. Domain name format allowed ‘A-Z’, ‘a-z’, ‘0-9’, dash (-), underscore (_) and dot(.) characters
  • Secondary NTP Server: To configure a secondary NTP server to use when automatically setting the date and time.

    • Supported formats: IPv4 Address format. IPv6 Address format. Domain name format allows ‘A-Z’, ‘a-z’, ‘0-9’, dash (-), underscore (_) and dot(.) characters

PTP Settings

  • Automatic PTP Date & Time: To enable/disable the use of PTP servers to automatically set the date and time.

  • PTP Interface: To configure a PTP server interface to use when automatically setting the date and time.

  • PTP Preset: To configure a PTP Preset type to use when automatically setting the date and time.

  • PTP Transport: To configure a PTP Transport type to use when automatically setting the date and time.

  • PTP Ipmode: To configure a PTP Ipmode type to use when automatically setting the date and time.

  • PTP Unicast IP: To configure a Unicast IP and server to use when the IP mode is set to unicast for automatically setting the date and time.

  • PTP Delay Mechanism: To configure a PTP Delay Mechanism type to use when automatically setting the date and time.

  • PTP Inbound Latency: To configure an Inbound latency of the server to use when automatically setting the date and time.

  • PTP Outbound Latency: To configure a PTP outbound latency server to use when automatically setting the date and time.

  • PTP Priority1: To configure a priority of PTP clock to use when automatically setting the date and time.

    • PTP Max. Master Capacity: To configure a max. master capacity of the PTP clock to use when automatically setting the date and time.

    • Panic Mode: To configure a PTP clock to not reset if jump is more than 1 second, use when automatically setting the date and time.

  • Save: To save the settings.

*Note:* If the time zone is selected to Manual Offset, the map selection will be disabled. The Time-Zone settings will take effect only after saving.

If Automatic Date & Time is disabled, users need to select the time manually; otherwise, the time will not change.

Procedure

  1. Select the timezone location either using drop down or the map.

  2. Enable the Automatic Date & Time option to enable/disable the use of NTP servers for automatically setting the date and time.

    • In the Primary NTP Server and Secondary NTP Server fields, specify the device’s NTP servers, respectively.

    *Note:* The Secondary NTP server is an optional field. If the Primary NTP server is not working properly, then the Secondary NTP Server will be used.

  3. Enable Automatic PTP Date & Time to enable/disable the use of PTP servers to automatically set the date and time.

    a. Enter the Interface, Preset, Transport, Ipmode, Unicast IP, Delay Mechanism, Inbound Latency, Outbound Latency, Priority1, Max. Master capacity, and Log request delay details in their corresponding fields.

    b. Enable or disable Panic Mode to prevent resetting when the time jump is more than 1 second during automatic date and time setting.

  4. Click the Save button to save the settings.

1.6.3 External User Services

1.6.3.1 LDAP/E-Directory Settings

The Lightweight Directory Access Protocol (LDAP)/E-Directory Settings are application protocols for querying and modifying data in directory services implemented on Internet Protocol (IP) networks.

In the MegaRAC GUI, LDAP is an Internet protocol that the MegaRAC® card can use to authenticate users. If you have an LDAP server configured on your network, you can use it as an easy way to add, manage, and authenticate MegaRAC® card users. This is done by passing login requests to your LDAP server. This means there is no need to define an additional authentication mechanism when using the MegaRAC card. Since your existing LDAP server centralizes authentication, you will always know who is accessing network resources and can easily define user- or group-based policies to control access.

To open the External User Services page, click Settings > External User Services from the menu bar. A sample screenshot of External User Services page is shown below.

image-20250624140102241

To open the LDAP/E-DIRECTORY Settings page, click Settings > External User Services > LDAP/E-Directory Settings from the menu bar.

A sample screenshot of External User Services page is shown below.

image-20250624140154108

  • General Settings: To configure LDAP/E-Directory settings, use the following options: Enable LDAP/E-Directory Authentication, IP Address, Port, and Search Base.

  • Role Groups: To add a new role group to the device. Alternatively, double-click on a free slot to add a role group.

*Note:* It is recommended to enable LDAP configuration from the General Settings page; otherwise, an error message will pop up stating LDAP configuration is not enabled when trying to create or view LDAP role groups.

Procedure

Entering the details in the General LDAP/E-Directory Settings Page.

  1. In the LDAP/E-Directory Settings page, click General Settings. A sample screenshot of General LDAP Settings page is given below.

image-20250624140233018

  1. Click Enable LDAP/E-Directory Authentication to enable LDAP/E-Directory Settings.

*Note:* During login prompt, use username to login as an LDAP Group member.

  1. Select the encryption type for LDAP/E-Directory from the Encryption Type.

*Note:* Configure proper port number, when SSL is enabled.

  1. Select the Common Name Type as IP Address.

  2. Enter the IP address of the LDAP server in the Server Address field.

*Note:*

  • An IP Address consists of 4 numbers separated by dots, as in “xxxxxxxx.xxx”.

  • Each Number ranges from 0 to 255.

  • First Number must not be 0.

  • Supports IPv4 Address format and IPv6 Address format.

Configure the FQDN address when using StartTLS with FQDN.

  1. Specify the LDAP Port in the Port field.

*Note:* Default Port is 389. For SSL connections, default port is 636. The Port value ranges from 1 to 65535.

  1. Specify the Bind DN that is used during bind operation, which authenticates the client to the server.

*Note:*

  • Bind DN is a string of 4 to 253 alphanumeric characters.

  • It must start with an alphabetical character.

  • Special Symbols like dot(.), comma(,), hyphen(-), underscore(_equal-to(=) are allowed.

  • Example: cn=manager,ou=login, dc=domain,dc=com

  1. Enter the password in the Password field.

*Note:*

  • Password must be at least 1 character long.

  • White space is not allowed.

  • This field does not allow more than 48 characters.

  1. Enter the Search Base. The Search Base tells the LDAP server which part of the external directory tree to search. The Search Base may correspond to an organization or a group in the external directory.
  • Example: ou=login,dc=domain,dc=com.

*Note:*

  • Search base is a string of 4 to 253 alphanumeric characters.

  • It must start with an alphabetical character.

  • Special Symbols like dot(.), comma(,), hyphen(-), underscore(_), equal-to(=) are allowed.

  1. Select Attribute of User Login to specify which LDAP/E-Directory server attribute should be used to identify the user.

*Note:* It only supports cn or uid.

  1. Select CA Certificate File from the Browse field to identify the certificate of the trusted CA certs.

  2. Select the Certificate File to find the client certificate filename.

  3. Select Private Key to find the client private key filename.

*Note:* All the 3 files are required, when SSL or StartTLS is enabled.

  1. Click Save to save the settings.

To Add a New Role Group

  1. In the LDAP/E-Directory Settings Page, Click Role Groups and select a blank row.

*Note:* It is recommended to Enable LDAP configuration from configure general settings page; otherwise, an error message will pop-up stating “LDAP configuration is not enabled” when trying to create or view LDAP role groups.

  1. Click Add Role Group, or alternatively, double-click on the blank row to open the Add Role group Page as shown in the screenshot below.

    image-20250624140429182

  2. In the Group Name field, enter the name that identifies the role group.

*Note:*

  • Maximum size of Role Group Name is 255 bytes.

  • Special symbols hyphen and underscore are allowed.

  1. In the Group Domain field. Enter the Role Group Domain where the role group is located.
  • Example: cn=manager,ou=login, dc=domain,dc=com.

*Note:*

  • Maximum size of Group Domain Name is 255 bytes.

  • It must start with an alphabetical character.

  • Special Symbols like dot(.), comma(,), hyphen(-), underscore(_), equal-to(=) are allowed.

  1. In the Group Privilege field, enter the level of privilege (User, Administrator, Operator, None) to assign to this role group.

  2. Select the required options or both.

    ² KVM Access

    ² VMedia Access

*Note:* VMedia privilege is not applicable for LMedia and RMedia clients.

  1. Click Save to save the new role group and return to the Role Group List.

1.6.3.2 Active Directory Settings

An Active Directory is a directory structure used on Microsoft Windows-based computers and servers to store information and data about networks and domains. Active Directory (sometimes referred to as AD) performs a variety of functions, including providing information about objects. It also helps organize these objects for easy retrieval and access, allows access by end users and administrators, and enables administrators to set security for the directory.

In the MegaRAC SP-X application, Active Directory allows you to configure the Active Directory Server settings. The displayed table shows any configured role groups and their available slots. You can modify, add, or delete role groups from here. The group domain can be either the AD domain or a trusted domain. The group name should correspond to the name of an actual AD group.

*Note:* To view the page, you must have at least User-level access; to modify or add a group, you must be an Administrator.

To open Active Directory Settings page, click Settings > External User Settings > Active Directory from the menu bar. A sample screenshot of Active Directory Settings page is shown below.

image-20250624140624593

  • General Settings: This option is used to configure Active Directory General Settings. The available options are Enable Active Directory Authentication, Secret User Name, Secret Password, User Domain Name, and up to three Domain Controller Server Addresses.

  • Role Groups: To add a new role group to the device. Alternatively, double-click on a free slot to add a role group.

*Note:* It is recommended to Enable AD configuration from the configure general settings page; otherwise an error message will pop-up stating AD configuration is not enabled when trying to create/view AD role groups.

Procedure

Entering the Details in General Active Directory Settings Page

  1. Click on General Settings to open the General Active Directory Settings Page.

    image-20250624140718482

  2. In the Active Directory Settings page, check or uncheck the Enable Active directory Authentication check box to enable or disable Active Directory Authentication respectively.

*Note:* If you have enabled Active Directory Authentication, enter the required information to access the Active Directory server.

  1. SSL: Check or uncheck to enable or disable SSL.

  2. Specify the Secret user name and password in the Secret UserName and Secret Password fields, respectively.

*Note:*

  • Secret username/password for AD is not mandatory. When secretusername & password is empty, Authentication fails will always be treatedas Invalid Password errors. For Invalid Password errors PAM will not tryother Authentication Methods.

  • User Name is a string of 1 to 64 alphanumeric characters.

  • It must start with an alphabetical character.

  • It is case-sensitive.

  • Special characters like comma, period, colon, semicolon, slash,backslash, square brackets, angle brackets, pipe, equal, plus, asterisk,question mark, ampersand, double quotes, space are not allowed.

  • Password must be at least 6 character long and will not allow more than127 characters.

  • White space is not allowed.

  1. Specify the Domain Name for the user in the User Domain Name field. (e.g., MyDomain.com)

  2. Configure IP addresses in Domain Controller Server Address1, Domain Controller Server Address2, and Domain Controller Server Address3.

*Note:*

IP address of Active Directory server: At least one Domain ControllerServer Address must be configured.

  • IP Address made of 4 numbers separated by dots as in “xxx.xxx.xxxxxx”.

  • Each number ranges from 0 to 255.

  • First number must not be 0.

  • Domain Controller Server Addresses will support IPv4 Address format and IPv6 Address format.

  1. Click Save to save the entered settings and return to the Active Directory Settings page.

    image-20250624140849487

  • Role Group Name: The name that identifies the role group in the Active Directory.

    *Note:*

    • Maximum size of Role Group Name is 255 bytes.

    • Special symbols hyphen and underscore are allowed.

  • Group Domain: The domain where the role group is located.

    *Note:*

    • Maximum size of Group Domain Name is 255 bytes.

    • Special symbols hyphen, underscore and dot are allowed.

  • Group Privilege: The level of privilege to assign to this role group.

  • KVM Access: To provide access to KVM for AD authenticated role group user.

  • VMedia Access: To provide access to VMedia for AD authenticated role group user.

To Add a New Role Group

  1. In the Active Directory Settings page, select a Role Group and click Add Role Group, or alternatively, double-click the blank row to open the Add Role group Page as shown in the screenshot below.
    image-20250625135252616.

*Note:* It is recommended to Enable AD configuration from the configure general settings page; otherwise, an error message will pop-up stating AD configuration is not enabled when trying to create/view AD role groups.

  1. In the Group Name field, enter the name that identifies the role group in the Active Directory.

*Note:*

  • Maximum size of Role Group Name is 255 bytes.

  • Special symbols hyphen and underscore are allowed.

  1. In the Group Domain field, enter the domain where the role group is located.

*Note:*

  • Maximum size of Group Domain Name is 255 bytes.

  • Special symbols hyphen, underscore and dot are allowed.

  1. In the Group Privilege field, enter the level of privilege to assign to this role group.

  2. Select the required options

  • KVM Access

  • VMedia Access

*Note:* VMedia privilege is not applicable for LMedia and RMedia clients.

  1. Click Save to add the new role group and return to the Role Group List.

To Delete a Role Group

  1. In the Role Groups page, select the row that you wish to delete.

  2. Click Delete Role Group.

1.6.3.3 RADIUS Settings

RADIUS is a modular, high-performance, and feature-rich suite that includes a server, clients, development libraries, and numerous additional RADIUS-related utilities.

In the MegaRAC GUI, this page is used to set RADIUS authentication.

To open the RADIUS Settings page, click Settings > External User Settings > RADIUS Settings from the menu bar. A sample screenshot of the RADIUS Settings page is shown below.

image-20250625135334838

General RADIUS Settings

image-20250625135433862

  • Enable RADIUS Authentication: Option to enable/disable RADIUS authentication.

  • Server Address: The IP address of the RADIUS server.

*Note:*

  • IP Address (Both IPv4 and IPv6 format).

  • FQDN (Fully Qualified Domain Name) format.

Port: The RADIUS Port number.

*Note:*

  • Default Port is 1812.

  • Port value ranges from 1 to 65535.

  • Secret: The Authentication Secret for the RADIUS server.

*Note:*

  • This field does not allow more than 31 characters.

  • The Secret must be at least 4 characters long.

  • Whitespace is not allowed.

  • Enable KVM Access: This field provides access to KVM for RADIUS-authenticated users.

  • Enable VMedia Access: This field provides access to VMedia for the RADIUS-authenticated users.

  • Save: To save the settings.

Procedure

  1. Enable the RADIUS Authentication check box to authenticate the RADIUS.

  2. Click Advanced RADIUS Settings. This opens the Radius Authorization window as shown below.
    image-20250625135514973

*Note:*

  • It does not allow more than 127 characters. Special characters like ‘;’ and ‘#’ are not allowed.

  • It is recommended to enable the Radius configuration from the configure general RADIUS settings page; otherwise, error message will pop-up stating Radius configuration is not enabled when trying to create/view Advanced RADIUS Settings.

For authorization purposes, configure the Radius user with a Vendor-Specific Attribute on the server side.

Example: 1

testadmin Auth-Type :=PAP,Cleartext-Password:= “admin”

Auth-Type :=PAP, Vendor-Specific=“H=4”

Example: 2

testoperator Auth-Type := PAP, Cleartext-Password := “operator”

Auth-Type :=PAP, Vendor-Specific=“H=3”

If you change the Vendor-Specific value in the server, you should also update the corresponding values on this page.

  1. Click Save to save the changes made.

1.6.4 Service Management

It is used to set service information on the BMC. A sample screenshot of the service management is shown below.

image-20250625135632047

The service management consists of the following items:

  • web

  • kvm

  • cd-media

  • hd-media

  • ssh

  • watchdog

    • (Click the edit button in the “watchdog” column to enter the “watchdog” configuration interface (the interface is as follows). The default state of the watchdog is inactive. If the watchdog is set to the active state, it will monitor the BMC in real time.)

    image-20250625135717931

1.6.5 Network Configuration

This section is used to configure the network settings for the available LAN channels.

*Note:* Changing the IP settings of the management ports will disconnect the network.

1.6.5.1 Network IP Settings

This section is used to configure the network IP settings.

To open the Network IP Settings page, click Settings > Network Settings > Network IP Settings.

image-20250625135756441

  • Enable LAN: Enables or disables the LAN settings.

  • LAN Interface: Selects the LAN interface to be configured.

  • MAC Address: Displays the read-only MAC Address of the selected interface.

  • Enable IPv4: Enables or disables the IPv4 settings for the selected interface.

  • Enable IPv4 DHCP: Enables or disables the IPv4 DHCP support for the selected interface. If you disable the IPv4 DHCP support, then static IP address is selected, configure the static IPv4 Address, IPv4 Subnet, and IPv4 Gateway.

*Notes:*

  • An IP address consists of 4 numbers separated by dots (e.g., “xxx.xxx.xxx.xxx”).

  • Each number ranges from 0 to 255.

  • The first number must not be 0.

  • Enable IPv6: Enables or disables the IPv6 configuration settings.

    image-20250625135851689

  • Enable IPv6 DHCP: Enables or disables the IPv6 DHCP support for the selected interface. It dynamically configures IPv6 address using DHCP (Dynamic Host Configuration Protocol).

*Note:* Disable this Enable IPv6 DHCP field and enter the values in following fields such as IPv6 Index, IPv6 Address, Subnet Prefix Length, and IPv6 Gateway.

  • IPv6 Index: Specify a static IPv6 index to be configured to the device. E.g.: 0

  • IPv6 Address: Specify a static IPv6 address to be configured to the device. E.g.: 2004::2010.

  • Subnet Prefix Length: Specify the subnet prefix length for the IPv6 settings. The value ranges from 0 to 128.

  • IPv6 Gateway: Specify an IPv6 default gateway for the IPv6 settings.

  • Enable VLAN: Enables or disables the VLAN support for the selected interface.
    image-20250625135931340

  • VLAN ID: Value ranges from 2 to 4094. VLAN ID 0, 1 & 4095 are reserved VLAN IDs.

  • VLAN Priority: Value ranges from 0 to 7. 7 is the highest priority for VLAN.

  • Save: Save the entries.

1.6.5.2 Network Link Configuration

This section is used to configure the network link.

To open the Network Link Configuration page, click Settings > Network Settings > Network Link Configuration.

image-20250625140020618

  • LAN Interface: Select the required network interface from the list to configure its link speed and duplex mode.

  • Auto Negotiation: Enable to allow the device to automatically configure the best possible mode of operation (speed and duplex) over a link.

  • Link Speed: Link speed will list all the supported capabilities of the network interface. It can be 10/100/1000 Mbps.

*Note:* Link speed of 1000 Mbps is not applicable when Auto Negotiation is OFF.

  • Duplex Mode: This field could be either Half Duplex or Full Duplex.

  • NCSI Interface: The NCSI interface status could be either Enabled or Disabled for the selected LAN interface.

  • Save: Save the settings.

1.6.5.3 DNS Configuration

The Domain Name System (DNS) is a distributed, hierarchical naming system for computers, services, or any resources connected to the Internet or a private network. It associates information with the domain names assigned to each participant. Most importantly, it translates human-readable domain names into numerical (binary) identifiers used by networking equipment to locate and address devices worldwide.

This section is used to manage the DNS settings of a device.

To open the DNS Configuration page, click Settings > Network Settings > DNS Configuration.

image-20250625140127866

Domain Name Service Configuration

  • DNS Enabled: Enables or disables all the DNS service configurations.

  • mDNS Enabled: Enables or disables the multicast DNS.

  • Host Name Setting: Choose either Automatic or Manual setting.

  • Host Name: Displays the host name of the device.

    • If the Host setting is set to Manual, specify the host name of the device.

*Notes:*

  • Value ranges from 1 to 64 alphanumeric characters.

  • Special character ‘-’(hyphen) is allowed.

  • It must not start or end with a ‘-’(hyphen).

  • The underscore (_) character and double hyphen (–) character are not a legal character for use in host names.

BMC Registration Settings

image-20250625140226785

  • BMC Interface: Options to register the BMC through the interfaces (eth0&eth1).

  • Register BMC: Register the BMC through the registration method.

  • Registration Method: Options to register the BMC through Nsupdate or DHCP Client FQDN or Hostname.

TSIG Configuration

image-20250625140259177

  • Both: Check this option to modify TSIG authentication for both interfaces.

  • Eth 0&1:

    • TSIG Authentication Enabled: Check this box to enable TSIG authentication when registering DNS via nsupdate. Separate TSIG files can be uploaded for each LAN interface.

    • Current TSIG Private File Information: Information abput the current TSIG private file, along with its upload date and time, will be displayed (read only).

    • New TSIG Private File: Browse and navigate to the TSIG private file.

      image-20250625140333900

  • Domain Setting: Select whether the domain interface will be configured manually or automatically.

    • Automatic: If you select Automatic, the Domain Name cannot be configured as it will be done automatically.

    • Manual: If you select Manual, specify the domain name of the device.

*Notes:*

  • If you select Automatic, it displays the Domain Interface option. If you select Manual, it displays Domain name.

  • Domain name must be a string of 4 to 253 alphanumeric characters. (254 characters are allowed only if the last byte is dot.)

  • Domain name must start with a letter and end with a letter or digit. (Must contain at least one dot character) Only letters, digits, dot, and hyphen are allowed.

  • Domain Name Server Setting:

    • Automatic - If you select Automatic, the DNS Interface option should be explained.
      image-20250625140412071

    • Manual - Specify the DNS (Domain Name System) server address to be configured for the BMC.

  • IP Priority:

    • IPv4: 2x IPv4 DNS servers and 1x IPv6 DNS server will be used.

    • IPv6: 2x IPv6 DNS servers and 1x IPv4 DNS server will be used.

*Note:* This does not apply to Manual configuration.

  • DNS Server 1, 2, & 3:

Specify the DNS (Domain Name System) server address to be configured for the BMC.

*Notes:*

  • IPv4 addresses should be given in dotted decimal representation.

  • IPv6 addresses are supported and must be global unicast addresses.

  • DNS server addresses support the following formats:

- _IPv4 address format._
- _IPv6 address format._
  • Save: Save the entered changes.

1.7 Remote Management

The “Remote Control” includes two functions: KVM and SOL, KVM is mainly used to remotely access the x86 system through the WEB, while SOL is mainly to access x86 BIOS configuration information through the WEB .The WEB UI is shown as follows.

image-20250625140450969

1.7.1 KVM

Launch H5Viewer

The system and browser requirements for Remote Control are given below.

System Requirements

Client machine with 8GB RAM.

If the client machine has 4GB RAM or lower, there will be lag in Video/Keyboard/ Mouse/Media redirection functionality.

Supported Browsers

  • Chrome latest version

  • IE11 and above

  • Firefox (with limited support)

  • Edge

  • Safari (On Mac only)

*Note:* It is advisable to use Chrome or IE for H5Viewer, since Firefox has its own memory limitations.

To open the Remote Control page, click Remote Control from the menu bar. A detailed description of the menu items is provided below.

Open the Remote Control page, click Launch H5Viewer. A sample screenshot of the Remote KVM page is shown below.

image-20250625140533986

Procedure to Start KVM

  1. Click Launch H5Viewer to open the Remote Control KVM page.
  2. To stop the H5Viewer video redirection, click Stop KVM.

Procedure to Start/Stop Media

  1. Click Browse File to select CD Image. After selecting the image, Select/Unselect media boost option.
  2. Click Start Media to redirect the selected CD image file to the Host. A sample screenshot is shown below.

*Note:* If media boost mode is selected, processes related to media redirection will have higher priority than other processes. This will improve media performance, but other processes will have limited access to CPU cycles.

  1. To stop the CD Image redirection, click Stop Media.

    image-20250625140605863

A detailed description of menu items are provided below:

Video

This menu contains the following sub menu items:

Pause Video: This option is used for pausing Console Redirection.

Resume Video: This option is used to resume the Console Redirection when the session is paused.

Refresh Video: This option can be used to update the display shown in the Console Redirection window.

Capture Screen: This option helps to take the screenshot of the host screen and save it in the client’s system.

Mouse

Show Client Cursor: This menu item can be used to show or hide the local mouse cursor on the remote client system.

Mouse Mode: This option handles mouse emulation from the local window to the remote screen using either of the two methods. Only the Administrator has the right to configure this option.

  • Absolute mouse mode: The absolute position of the local mouse is sent to the server if this option is selected.

  • Relative mouse mode: The Relative mode sends the calculated relative mouse position displacement to the server if this option is selected.

  • Other mouse mode: This mouse mode sets the client cursor in the middle of the client system and sends the deviation to the host. This mouse mode is specific for SUSE Linux installation.

*Note:* AMI MegaRAC SP-X recommends users use Linux versions of the OS, except SUSE 11.4 with BMC, to avoid mouse sync issues in absolute mouse mode.

Client cursor will be hidden always. If you want to enable, use Alt + C to access the menu.

Options

Zoom:

  • Normal: By default, this option is selected.

  • Zoom In: For increasing the screen size. This zoom varies from 100% to 150% with an interval of 10%

  • Zoom Out: For decreasing the screen size. This zoom varies from 100% to 50% with an interval of 10%

Block Privilege Request: To enable or disable the access privilege of the user.

Compression Mode: This option helps to compress the video data transfer to the selected mode.

DTC Quantization Table: This option allows you to choose the video quality.

*Note:* Specific to AST SOC.

Keyboard

Keyboard Layout: This feature is fully compatible when the host and client have the same keyboard language layout. If the host and client language layouts differ, some special characters may not be compatible.

List of Host Physical Keyboard languages supported in SPX H5Viewer.

  • English U.S.

  • German

  • Japanese

Send Keys

This option is used to configure key items. This menu contains the following submenu items.

  • Hold Down

  • Press and Release

Hold Down

This menu contains the following submenu items:

  • Right Ctrl Key: This menu item can be used to act as the right-side key when in Console Redirection.

  • Right Alt Key: This menu item can be used to act as the right-side key when in Console Redirection.

  • Right Windows Key: This menu item can be used to act as the right-side key when in Console Redirection.

  • Left Ctrl Key: This menu item can be used to act as the left-side key when in Console Redirection.

  • Left Alt Key: This menu item can be used to act as the left-side key when in Console Redirection.

  • Left Windows Key: This menu item can be used to act as the left-side key when in Console Redirection. You can also decide how the key should be pressed: Hold Down or Press and Release.

Press and Release

  • Ctrl+Alt+Del: This menu item simulates pressing the CTRL + ALT + DEL keys simultaneously on the server being redirected.

  • Left Windows Key: This menu item simulates the left-side key during Console Redirection. You can also choose how the key should be pressed: Hold Down or Press and Release.

  • Right Windows Key: This menu item simulates the right-side WIN key during Console Redirection

  • Context Menu Key: This menu item simulates the context menu key during Console Redirection.

  • Print Screen Key: This menu item simulates the Print Screen key during Console Redirection.

Hot Keys

This menu is used to add the user configurable shortcut keys to invoke in the host machine. The configured key events are saved in the BMC.

This menu contains the following sub menu item:

  • Add Hot Keys: This menu is used to enable macros. Click Add to macros.

  • Video Record

This menu contains the following sub menu items:

  • Record Video: This option is to start recording the screen.

  • Stop Recording: This option is used to stop the recording.

  • Record Settings: This option is used to set video record duration and video compression value. Video record duration value should be in the range of 1 to 1800 seconds. Video Compression value should be in the range of 0.1 (Low image quality) to 1.0 (High image quality).

Normalized video resolution to 1024 X 768 (*specific to AST SOC): Host video will be scaled to 1024 x 768 in the recorded video file. Enabling this option improves client side video recording performance in H5Viewer.

Disable this option to record video at the same resolution as the host video. The host video capture depends on the client system’s performance. If this option is disabled, the recorded video file may have inconsistencies. (i.e., Recorded video file duration may not be the same as configured value).

*Note:* The maximum video file size allowed is approximately 40 MB. When the video file size reaches this limit, the recorded file is downloaded, and recording will continue until the configured video recording time is reached. The video file is saved on the client side as date ‐month‐year hr‐min‐ sec part no.

Users are responsible for saving video files when using different browsers. When H5Viewer focus is lost and if video recording is in progress, the recording will be stopped with a notification message and the recorded video file will be discarded.

Due to browser limitations, Set Timeout/Set Interval may be delayed from their specified interval when the browser window loses focus. As a result, the video server will not send video packets to H5Viewer, and video recording will stop.

Power

The power options are used to perform power cycle operations. Click the desired option to carry out the selected operation.

  • Reset Server: To reboot the system without powering off (warm boot).

  • Immediate Shutdown: To perform Power OFF Immediately.

  • Orderly Shutdown: To Power OFF the server in proper order.

  • Power ON Server: To Power ON the server.

  • Power Cycle Serve: First, Power OFF the system, then reboot it (cold boot).

Active Users

Click this option to display the active users and their system ip address.

Active KVM Session can be terminated when there are multiple KVM Session from Master [FULL Privilege KVM Session].

Help

Click this option to get more information About H5Viewer. The KVM Remote Console utility version and plugin version will be displayed.

Quick Buttons

  • Quick Buttons: The upper right of the H5Viewer window displays all the quick buttons. These quick buttons allow you to perform the functions below.
Quick Buttons Descriptions
image-20250625140734672 This quick button will show / hide notifications dropdown menu, which contains the list of notifications displayed by H5Viewer.
image-20250625140817670 It shows the current zoom value in percentage.
image-20250625140909987 This quick button is used to display the current host monitor status. If the icon is in green color, the host monitor is unlocked. If the icon is in red color, the host monitor is locked. By clicking the button, host monitor status can be toggled.
image-20250625140945785 This quick button is used to display the current server power status. If the icon is in green color, the server status is powered on. If the icon is in red color, the server status is powered off. Click to toggle the host power on or off instantly.

Status Bar Buttons

status_barbuttons

Num/Caps/Scroll lock buttons are LED status buttons that denotes the current status of Num/Caps/ Scroll lock in the host.

Keyboard LED Sync

When H5Viewer is launched, the keyboard lock status and the corresponding LEDs on the host machine should be in sync with the client machine. That is, if Num Lock, Caps Lock, or Scroll Lock is enabled or disabled on the client machine, the same should be reflected on the host machine.

*Note:*

Client Side Limitations

Due to web browser related security concerns, this feature has the following limitations:

Host LED status will be synced with client LED status, only if user presses any key in client keyboard when H5Viewer window is in focus.

Client keyboard LED status cannot be updated from web browsers.

Host Side Limitations

In some Linux hosts, when the host is booted into text mode, CAPS LOCK LED status will not be updated properly. CAPS LOCK LED will not turn ON/OFF while changing the CAPS lock status in the host OS.

In such cases, H5Viewer CAPS LOCK synchronization functionality will not work properly.

Example: Typing letters in H5Viewer (after pressing CAPS LOCK) will toggle between lower to upper case inside host.

KVM Sharing

The MegaRAC SP-X stack supports N number of KVM redirection sessions, but only one full permission H5Viewer session at a time. A user with full permission in H5Viewer can control the KVM redirection, while other H5Viewer users can only view the video stream from the server without intervention.

When the first user launches H5Viewer, they receive full permission to control the host during KVM redirection. If another H5Viewer session is launched, the video server sends a KVM sharing permission request to the current session on behalf of the new requesting session.

Once the requesting session is authenticated, a packet containing information such as the client IP/hostname and the username of the newly authenticated or logged-in user will be sent to the current session. The first client displays the dialog as shown below:

!image-20250625141115908

Clicking the button in the dialog box will trigger the specified action:

  • Full Permission: When this button is clicked, the requesting session will receive full access permission, and the current session (with full permission) will be downgraded to partial KVM access.

  • Partial Permission: When this button is clicked, the requesting session will receive partial permission and can only view the server display (video only).

  • Block Privilege Request > Partial Permission: Once this option is selected, both the newly requesting session and any active session with partial privileges will automatically receive partial permission and can only view the server display. Future requests will be handled by the auto-response mechanism.

  • Block Privilege Request > No Permission: Once this option is selected, both the newly requesting session and any active session with partial privileges will automatically be denied access. Future requests will be handled by the auto-response mechanism.

  • No Permission: When this button is clicked, the requesting session will be denied access.

1.7.2 SOL

The serial over LAN (SOL) feature is very useful, and the SOL redirects the local serial interface via an IPMI session, allowing remote access to the console.

Click the Active button on the “Remote Control” interface to enter the SOL output window, and then enter the BIOS configuration interface, and the content of the BIOS configuration will be redirected to the WEB UI, as shown in the following figure.

image-20250625141208246

1.8 Server Maintenance

This function is mainly for performing maintenance tasks on the device. Click Maintenance on the left function bar to access the following interface.

image-20250625141246592

1.8.1 Firmware Update

The system upgrade function is for updating and maintaining the system. Mainly used to update BMC and BIOS. Here’s how to update via the Web.

1.8.1.1 BMC Update

Preserve Configuration

This page allows the user to configure the preserve configuration items, which will be used by the Restore Factory Defaults feature to retain the existing configuration without overwriting it with default or firmware upgrade settings.

To open Preserve Configuration page, click Maintenance > Preserve Configuration from the menu bar. A sample screenshot of the Preserve Configuration page is shown below.

image-20250625141314925

The various fields of Preserve Configuration are as follows:

  • Click here to go to Firmware Update or Restore Factory Defaults: This link will redirect to the Firmware Update or the Restore Factory Defaults page that needs to be preserved.

  • Check All: To check the entire configuration list.

  • Save: To save any changes made.

Procedure

  1. Click Firmware Update or Restore Configuration link to view the Firmware Update or the Restore Configuration page.

  2. Select the required Preserve Configuration items either individually by checking the appropriate boxes or all at once by using the Check All option.

  3. Click Save to save the changes.

Firmware Update

This wizard guides you through the firmware upgrade process. A reset of the device will automatically occur if the upgrade is completed or canceled. An option to Preserve All Configuration is available, enable it if you wish to retain your configured settings during the upgrade.

To perform Dual Firmware Update operation, click Maintenance > Firmware Update from the menu bar.

Procedure

  1. Click Browse to select firmware image.

*Note:* A file upload pop-up will be displayed for HTTP/HTTPS transfers, but in the case of TFTP files, the file is automatically uploaded with the upload status shown.

  1. Click Start Firmware Update to load the Firmware Update information. A sample screenshot is displayed below.

    img

  2. Select an Image (Inactive Image, Image 1, Image 2 or Both Image) from Image to be Updated drop-down list. The selected image will be getting flashed.

  • Image to be Updated: To update an Image (Inactive, Image 1, Image 2 or Both) to be flashed:

    • If You select an Inactive image, the Inactive image will be flashed.
    • If you select both images, then Both Image 1 and Image 2 will be flashed with the uploaded image file.
  • reboot the device after update: This option is used to reboot the device after the firmware update.

    image-20250625141437610

  1. Click Preserve All Configuration to preserve all configurations.
  • Preserve all Configuration: To preserve all configurations.

  • Edit Preserve Configuration: To modify the preserve status settings.

  1. Click Proceed to Flash, it will prompt you with a warning message. Click OK to start the Firmware update.

The Dual Firmware Update undergoes the following steps:

  1. Closing All Active Client Requests

  2. Preparing Device for Firmware Upgrade

  3. Uploading Firmware Image

  4. Verifying Firmware Image:

  • In Section Based Firmware Update, you can configure the firmware image for section based flashing. Check the required sections and click Proceed to update the firmware.

  • If flashing is required for all images, select the option Full Flash.

  • If you select Version Compare Flash option from web, the current and uploaded module versions, FMHlocation, size will be compared.

  • If the modules differ in size or location, proceed with a forced firmware upgrade.

  • If all the module versions are the same, restart the BMC, as all module versions are similar.

  • If only a few module versions differ, those modules will be flashed.

    image-20250625141510407

  1. Flashing Firmware Image

  2. Resetting the Image

1.8.1.2 BIOS Update

This wizard guides you through the process of upgrading the BIOS firmware.

To perform the BIOS Firmware Update operation, click Maintenance > Firmware Update.

image-20250625141611868

Procedure

  1. Click Browse to select BIOS Firmware Image.

*Note:* The Firmware update wizard will detect .bin and .bin_enc extensions and validate them as BIOS firmware images.

  1. Click Start Firmware Update to load the BIOS firmware image information.

  2. Click Proceed. A warning message will appear. Click OK to start the firmware update.

    image-20250625141642754

  3. Select the components from the list to flash. BIOS is mandatory, while ME and NVRAM are optional.

    image-20250625141708550

  4. Click Proceed to flash image. A confirmation message will appear. Click Cancel to cancel the update.

    image-20250625141735970

  • Click OK: Update the device immediately, the chassis will undergo a power cycle. Once the BIOS firmware update is complete, it will prompt you with the success message. Click OK to complete the process.

    image-20250625141807113

  • Click Cancel: Update the device when the chassis is powered off. It will prompt you with the notification message. Click OK to complete the process.

    image-20250625142100397