Use this information to troubleshoot issues when managing devices.
Ensure that all ports that are appropriate for management are open on the network and firewalls. For information about port requirements, see Port availability.
Ensure that the minimum required firmware is installed on each server that you want to manage using XClarity Administrator. For information about firmware requirements, see Supported firmware.
Log in to the management web interface for the server using the RECOVERY_ID user account,
Click
.Click the CIM Over HTTPS tab, and ensure that Enable CIM Over HTTPS is selected.
For ThinkSystem SR635 and SR655 servers:
Ensure that an operating system is installed, and that the server was booted to the OS, mounted bootable media, or efishell at least once so that XClarity Administrator can collect inventory for those servers.
Ensure that IPMI over LAN is enabled. IPMI over LAN is disabled by default on these servers and must be manually enabled before the servers can be managed. To enable IPMI over LAN using TSM, click
. You might need to restart the server to activate the change.If the device's server certificate is signed by an external certificate authority, ensure that the certificate authority certificate and any intermediate certificates are imported into the XClarity Administrator trust store (see Deploying customized server certificates to managed devices.
When the device is managed by XClarity Administrator, the management controller is put into centralized user management. This means that the user accounts that are defined in the XClarity Administrator internal or external authentication server are also used to log in to the management controller. A new local user account named RECOVERY_ID is created while all other local accounts are disabled on the management controller.
Converged, NeXtScale, and System x servers
Log in to the management web interface for the server using the RECOVERY_ID user account.
Click
.Click Global Login Settings. The Global Login Settings dialog is displayed.
Click the General tab.
Select Local first, then LDAP for the user-authentication method, and click OK.
Delete and re-create any local user accounts (other than the RECOVERY_ID user account).
Attempt to manage the chassis again using the Force management option to clean up any remaining CIM subscriptions from the previous management attempt.
Chassis
Log in to the management CLI for the chassis from an SSH session using the RECOVERY_ID user account.
Run the following command to disable centralized user management and allow you to authenticate to the management controller and other chassis components using local user accounts.
fsmcm –off –T mm[p]
Attempt to manage the chassis again using the Force management option to clean up any remaining CIM subscriptions from the previous management attempt.
Ensure that SSH is enabled on the switch.
If set, ensure that the enable
password that is used
to enter Privileged Exec Mode on the switch is correct.