SUM UserGuide
SUM UserGuide
SUM UserGuide
(SUM)
User’s Guide
Revision 2.9.0
The information in this USER’S GUIDE has been carefully reviewed and is believed to be accurate. The
vendor assumes no responsibility for any inaccuracies that may be contained in this document, makes no
commitment to update or to keep current the information in this manual, or to notify any person
organization of the updates. Please Note: For the most up-to-date version of this manual, please see our
web site at www.supermicro.com.
Super Micro Computer, Inc. (“Supermicro”) reserves the right to make changes to the product described in
this manual at any time and without notice. This product, including software, if any, and documentation
may not, in whole or in part, be copied, photocopied, reproduced, translated or reduced to any medium or
machine without prior written consent.
DISCLAIMER OF WARRANTY ON SOFTWARE AND MATERIALS. You expressly acknowledge and agree that
use of the Software and Materials is at your sole risk. FURTHERMORE, SUPER MICRO COMPUTER INC. DOES
NOT WARRANT OR MAKE ANY REPRESENTATIONS REGARDING THE USE OR THE RESULTS OF THE USE OF
THE SOFTWARE OR MATERIALS IN TERMS OF THEIR CORRECTNESS, ACCURACY, RELIABILITY, OR
OTHERWISE. NO ORAL OR WRITTEN INFORMATION OR ADVICE GIVEN BY SUPER MICRO COMPUTER INC.
OR SUPER MICRO COMPUTER INC. AUTHORIZED REPRESENTATIVE SHALL CREATE A WARRANTY OR IN ANY
WAY INCREASE THE SCOPE OF THIS WARRANTY. SHOULD THE SOFTWARE AND/OR MATERIALS PROVE
DEFECTIVE, YOU (AND NOT SUPER MICRO COMPUTER INC. OR A SUPER MICRO COMPUTER INC.
AUTHORIZED REPRESENTATIVE) ASSUME THE ENTIRE COST OF ALL NECESSARY SERVICE, REPAIR, OR
CORRECTION.
Any disputes arising between manufacturer and customer shall be governed by the laws of Santa Clara
County in the State of California, USA. The State of California, County of Santa Clara shall be the exclusive
venue for the resolution of any such disputes. Super Micro's total liability for all claims will not exceed the
price paid for the hardware product.
Unless you request and receive written permission from Super Micro Computer, Inc., you may not copy any part of
this document.
Information in this document is subject to change without notice. Other products and companies referred to herein
are trademarks or registered trademarks of their respective companies or mark holders.
4. Added support from the the UpdateBios in-band command to X10 MBs.
1. Required BMC firmware image and IPMI driver to be installed for all in-
band commands except the UpdateBios command.
2. Required product key to be activated for all in-band commands except the
January-06-2014 1.2a UpdateBios command.
5. Added exit code 68. Description: Invalid BMC configuration text file.
2. For X10 Intel® Xeon® Processor E5 v3/v4 Product Family platform, in-band
update BIOS requires the --reboot option.
July-31-2014 1.4 4. Revised the output message for CheckAssetInfo: Units format matches
dmidecode outoput.
7. Added notices to exit code when using in-band command with the --
reboot option through SSH connection.
February -06-2015 1.4a 5. Added a notice to in-band UpdateBios using SSH connection: Change the
timeout length for both SSH client and server site to be two times longer
than the typical time length of execution.
12. In-Band jumperless procedure show full log path when twice reboot is
needed.
July-21-2017 1.7 8. Changed exit code 8 from "File does not exist” to “Cannot open file.”
10. RAID related commands are only licensed to the SFT-DCMS-SINGLE key.
12. Added the BBS boot priority function in a BIOS configuration file.
15. Added Appendix F. Using the Command Line Tool (XMLStarlet) to Edit
XML Files.
1. Added HII support for the X11 Intel® Xeon® Scalable Processors with Intel®
C620 Series Chipsets and the platforms of later versions.
October-27-2017 2.0
2. Renamed the command GetCurrentBiosCfgTextFile to GetCurrentBiosCfg.
7. Added the TPM command options to support X11 Intel® Xeon® Scalable
Processors with Intel® C620 Series Chipsets platform.
11. Added support for checking the SFT-DCMS-SVC-KEY node product key.
13. Added exit code 155 description: IPMI received invalid data.
4. Showed extra information when using the --showall option with the
May-16-2019 2.3 GetBiosInfo command.
13. Added the JSON key format and the --key_file option to the
14. Added the Redfish Host Interface usage to the UpdateBios, UpdateBmc,
ActivateProductKey and QueryProductKey commands.
19. Added the information about the node product key format to the
CheckOOBSupport command.
23. Added the information about system’s support for RoT features to the
CheckOOBSupport command.
15. Added the Redfish Host Interface usage to the GetRaidControllerInfo and
UpdateRaidController commands.
16. Added support for Broadcom 3008 and Marvell SE9230 to the
GetRaidControllerInfo command.
Decemberber-15- 4. Added the --upload and --update options to the ChangCmmCfg command.
2.8.0
2021 5. Added the GetSystemCfg and ChangeSystemCfg commands.
7. Added the description and option usage to the KmsManage command for
KMS OEM configurations.
Contents ...........................................................................................................................................................14
1 Overview .......................................................................................................................................................27
5.3.4 Updating BIOS Settings Based on the Current BIOS Settings .......................................................166
5.7.1 Providing an ISO Image as a Virtual Media through BMC and File Server....................................232
5.7.3 Mounting a Floppy Image as a Virtual Media from a Local Image File .........................................238
5.7.4 Unmounting a Floppy Image as Virtual Media from the Managed System .................................239
5.7.10 Booting into the ISO Image from HTTP Server ...........................................................................245
5.8.8 Securely Erasing Hard Disks in LSI MegaRaid SAS 3108 RAID Controller ......................................270
5.10.2 Updating the Signed PSU Firmware Image Requested by OEM .................................................288
6.8.1 Providing an ISO Image as a Virtual Media through BMC and File Server....................................400
6.8.3 Mounting a Floppy Image as Virtually from a Local Image File ....................................................402
6.8.4 Unmounting a Floppy Image as Virtually from the Managed System ..........................................403
6.8.7 Booting into the ISO Image from HTTP Server .............................................................................406
6.9.8 Securely Erasing Hard Disks in LSI MegaRaid SAS 3108 RAID Controller ......................................422
6.11.2 Updating the Signed PSU Firmware Image Requested by OEM .................................................431
6.11.3 Getting the Current Power Status of the Managed System .......................................................432
Appendix F. Using the Command Line Tool (XMLStarlet) to Edit XML Files ..................................................480
I.1 X11/H11 and earlier platforms including H12 non-RoT systems ........................................................488
I.2 X12/H12 and later platforms except H12 non-RoT systems ...............................................................489
Two channels are possible for management: the OOB (Out-Of-Band) channel, i.e., communication through
the IPMI interface, and the in-band channel, i.e., communication through the local system interfaces. By
the OOB channel, most management commands (except the command “CheckSystemUtilization”) can be
executed independently of the OS on the managed system and even before the system OS is installed.
1.1 Features
Command-line interfaced (CLI) and scriptable
Independent from OS on managed systems (for OOB usage)
Operates through OOB (Out-Of-Band) and in-band methods
Supports concurrent execution of OOB commands on multiple systems through a system list file
System Checks
o Checks asset device information/health remotely
o Checks if both BIOS and BMC firmware images support OOB functions
o Checks system utilization remotely
o Checks sensor data remotely
o Sends notification of system status via e-mail
Key Management
o Activates node product keys.
o Querys node product keys.
BIOS Management
o Pre-checks system board ID to prevent flashing the wrong BIOS firmware image
To run remote update operations, you must meet the following requirements:
System Requirements:
Environment Requirements
50 MB free disk space
The network communication protocol and ports below are required for running OOB commands.
Command Network Requirements
All OOB commands RMCP+ protocol through IPv4/IPv6 UDP with port 623.
SUM can remotely manage the selected Supermicro motherboards/systems. Before use, you must activate
the node product key for the managed systems. For details, see 3 Licensing Managed Systems.
In addition, both the BMC and BIOS firmware images must meet the following requirements.
Version 1.0 or later for select X10 Intel® Xeon® Processor E5 v3/v4
Product Family/X11/H11/X12/H12 systems
The CheckSystemUtilization command requires additional packages to be installed on the managed system.
Program/Script Description Privilege Requirement
TAS_1.6.0_build.200415.zip A Thin Agent Service (TAS) program to To install and execute, TAS
be installed on the managed systems. needs the root privilege of
the operating system
Collects utilization information on running on the managed
managed system and update system.
information to BMC.
Below OS and tools are pre-requisite for TAS to be installed successfully on the managed system.
OS Supported OS List Program/Script
Windows Windows 2008 R2 SP1 .NET framework 3.5
Windows 2012 R2 smartmontools 6.5-1
Windows 2016 NVMe vendor specific driver (only required for
using the nvme function)
Windows patch “KB3033929”(only required for
Windows Server 2008 R2 SP1)
Intel RST CLI tool 13.2.0.1016 and 13.2.x.xxxx RSTe
driver (specify tool version to specify RSTe driver
version)
sas3ircu 17.00.00.00
Linux RHEL 6.5/6.6/6.10 ethtool package 2.6.33
RHEL 7.0/7.1/7.5 openIpmi driver
SLES 11 SP4 smartmontools 6.5.x
Ubuntu 14.04 LTS glibc 2.12
CentOS 6.5/6.9/6.10/7.5 storcli 1.20.15 (for LSI 3108)
mdadm 4.0 (for RAID)
nmcli 0.8.1
net-tools 1.60-110.el6-2
lsscsi 0.23-2.el6
lsblk 2.17.2
sas3ircu 17.00.00.00
The firmware image below is pre-requisite for TAS to run successfully on the managed system.
Firmware Image Requirements
X10 ATEN platform (SMT_X10): 1.58 or later
With the use of in-band, SUM can perform BIOS/BMC/EventLog Management functions for selected
Supermicro motherboards/systems. The managed system must meet the following requirements.
System Requirements:
Environment Requirements
Hardware 50 MB free disk space
Firmware image BIOS Version 3.0 or later for X9 Intel® Xeon® processor E5-2600
product family and X10 Intel® Xeon® Processor E3-1200 v3 Product
Family select systems.
BIOS Version 1.0 or later for X10 Intel® Xeon® Processor E5 v3/v4
Product Family/X11/H11/X12/H12 select systems.
Operating System Linux: Red Hat Enterprise Linux Server 4 updates 3 (x86_64) or later.
Note: Though SUM can be run on Red Hat Enterprise Linux Server 4 updates 3 or later,
several OS might not be supported by hardware. For the list of supported operating systems,
please check the OS support list.
Privilege Description
SUM Execution Privilege To execute in-band functions, SUM needs the root/Administrator
privilege of the operating system running on the managed system.
OS Program/Script Description
Linux/Windows/FreeBSD SUM The main program for SUM
driver/pmdll64.dll
Note: For Windows Server 2008 R2 and Windows 7, Windows driver requires Windows
patch #3033929.
https://docs.microsoft.com/en-us/security-updates/securityadvisories/2015/3033929
Click the link below to download the patch.
https://www.microsoft.com/en-us/download/confirmation.aspx?id=46083
For in-band commands (except for commands “GetBiosInfo” and “UpdateBios”), the managed system must
have BMC firmware image and IPMI driver installed. The BMC firmware image should meet the following
requirements.
Firmware Image Requirement
X9 ATEN platform (SMT_X9): 3.14 or later
If the Linux/FreeBSD OS does not have the built-in IPMI driver, you should install the following software:
Program/Script Description
OpenIPMI.x86_64 IPMI driver for accessing BMC through its KCS interface
Courier-New font size 10 represents Command Line Interface (CLI) instructions in Linux terminal
mode.
<> encloses the parameters in the syntax description.[shell]# represents the input prompt in Linux
terminal mode.
[SUM_HOME]# represents the SUM home directory prompt in Linux terminal mode.
Linux Example:
[shell]# cd sum_x.x.x_Linux_x86_64
[SUM_HOME]# ./sum
Note: It is recommended that SUM tool with SUM release package should be used
because binary files are required for certain commands.
The TAS package (TAS_version_build.date.zip) can be acquired from Supermicro. Only Windows, Linux and
FreeBSD platforms are supported. To install TAS, follow below steps.
1. Copy the TAS_version_build.YYMMDD.zip package to the operation system (OS) of managed system.
2. Extract the TAS_version_build.YYMMDD.zip archive file. Three archive files will be created, e.g.,
TAS_version_build.YYMMDD_Windows.zip/Linux.tar.gz/Freebsd.tar.gz, for Windows/Linux/FreeBSD
systems. One additional readme file will be created. You can check the INSTALLATION section in the
readme file or follow the steps below.
3. Install TAS pre-requisite tools listed in 1.2.3 OOB Usage Requirements (Managed Systems).
4. For Windows systems,
a. Extract the file TAS_version_build.YYMMDD_Windows.zip
b. Select the correct system architecture. For x64 system, select folder 64.
c. Run setup.bat
5. For Linux systems,
[shell]# cd 64bit
[shell]# ./install.sh
Syntax:
[shell]# make
Syntax:
For Kernel prior to 4.3.3, the command should run with perl.
Syntax:
Note: To generate the keys to run the command to sign a driver, run step 5 in Appendix
H. How to Sign a Driver in Linux:
<private key name>.priv: the generated private key file name.
<public key name>.der: the generated public key file name.
The following sections describe the steps for activation. First, you can receive the node product keys from
Supermicro as in 3.1 Getting Node Product Keys from Supermicro. With these node product keys, you can
then activate these systems as described in 3.2 Activating Managed Systems. SUM also provided auto-
activation methods for customer usage. For this usage please refer to 3.3 Auto-Activating Managed
Systems.
1. Collect BMC MAC address and list them in one file, e.g., mymacs.txt.
Example:
003048001012
003048001013
003048001014
003048001015
2. Send this file (mymacs.txt) to Supermicro to obtain a node product key file (mymacs.txt.key). The
node product key file includes the MAC address and node product key.
Example:
003048001012;1111-1111-1111-1111-1111-1111-1111
003048001013;2222-2222-2222-2222-2222-2222-2222
003048001014;3333-3333-3333-3333-3333-3333-3333
JSON-Format
003048001015;{"ProductKey":{"Node":{"LicenseID":"1","LicenseName":"SFT-OOB-
LIC","CreateDate":"20200409"},"Signature":"1111111111111111111122222222222222233333333333333ab
abababababababababababbabcdcdcdcdcdcdccdcdcddcdefefefefefefefeefefefefghghghghghghghghghghgh"}}
However, in some cases, it is also possible to activate node product keys without running the command
“ActivateProductKey.” Follow these steps:
1. Collect the BMC MAC addresses of managed systems and list them in a text file, e.g., “mymacs.txt”.
2. Send this file (“mymacs.txt”) to Supermicro through your sales representative to obtain a credential
file (“cred.bin”).
3. Put the credential file in the “SUM_HOME/credential” directory on the system where the required
SUM command is run.
4. SUM will auto-activate product keys from cred.bin after license-required commands are run on the
managed systems.
Supermicro Update Manager User’s Guide 42
Note: Auto-activation is not a site license.
[SUM_HOME]# ./sum
To display the usage information for each SUM command, use this syntax:
Example:
Usage Information
System Check
Commands Long Options
CheckOOBSupport None
Monitors the host with the given XML-style file listing system
event logs and sensor data records.
SystemPFA --action
1 = GetCurrentStatus
2 = Enabled
3 = Disabled
-I Redfish_HI (Optional)
Uses Redfish Host Interface to monitor and set the
predictive failure analysis of the system. (Only in-band usage
is supported.)
--reboot (Optional)
Forces the managed system to reboot or power up after
operation.
--post_complete (Optional)
Waits for the managed system's POST to complete after
reboot.
MemoryHealthCheck --action
1 = GetCurrentStatus
2 = Enabled
3 = Once
4 = Disabled
-I Redfish_HI (Optional)
Uses Redfish Host Interface to check memory health of the
system. (Only in-band usage is supported.)
--reboot (Optional)
Forces the managed system to reboot or power up after
operation.
--post_complete (Optional)
Waits for the managed system's POST to complete after
reboot.
QueryProductKey
-I Redfish_HI (Optional)
Uses Redfish Host Interface to query the key information. (Only in-band usage is
supported.)
BIOS Management
Commands Long Options
UpdateBios
--file <file name>
Updates the BIOS with the given BIOS image file.
-I Redfish_HI (Optional)
Uses the Redfish Host Interface for in-band updates. (Only in-band usage
is supported.)
--reboot (Optional)
Forces the managed system to reboot or power up after operation.
This feature is supported since the X10 Intel® Xeon® Processor E5 v3/v4
Product Family platform.
--individually (Optional)
Updates each BIOS with corresponding configuration file individually.
--flash_smbios (Optional)
Overwrites and resets the SMBIOS data. This option is used only for
specific purposes. Unless you are familiar with SMBIOS data, do not use
this option.
--preserve_nv (Optional)
Preserves the NVRAM. This option is used only for specific purposes.
Unless you are familiar with BIOS NVRAM, do not use this option. (Not
available on X12 and later systems.)
--preserve_mer (Optional)
Preserves the ME firmware region. This option is used only for specific
purposes. Unless you are familiar with ME firmware image, do not use
Supermicro Update Manager User’s Guide 47
BIOS Management
Commands Long Options
this option. (Not available on X12 and later RoT systems.)
--kcs (Optional)
Updates BIOS through KCS. (Support is available on platforms before X11
with OEM BMC request only, and can be only used with in-band.)
--preserve_setting (Optional)
Preserves BIOS configurations. This option is used only for specific
purposes. Unless you are familiar with BIOS configurations, do not use
this option.
--erase_OA_key (Optional)
Erases OA key.
--policy <policy XML file> (Optional) [Deprecated]
The --policy option is deprecated and will be removed. Updates the
BIOS with the given policy file. (Only supported for OOB use on multiple
systems.)
--backup (Optional)
Backs up the current BIOS image. (Only supported by the RoT systems.)
--forward (Optional)
Confirms the Rollback ID and upgrades to the next revision. (Only
supported by the X12/H12 and later platforms except the H12 non-RoT
systems.)
--post_complete (Optional)
Waits for the managed system's POST to complete after reboot.
--clear_password (Optional)
Clears BIOS password.
--erase_secure_boot_key (Optional)
Erases secure boot key.
--reset_boot_option (Optional)
Resets BIOS boot configurations.
GetBiosInfo
--file <file name> (Optional)
Reads BIOS information from an input BIOS image file.
--individually (Optional)
Gets each BIOS with corresponding configuration file individually.
--showall (Optional)
Prints the BIOS version, BIOS revision and BIOS OEM FID information.
--file_only (Optional)
Works with --file, and only reads BIOS information from the input image
file.
--extract_measurement (Optional)
Works with --file, extract BIOS image file measurement.
GetDefaultBiosCfg
--file <file name> (Optional)
Saves the BIOS configuration to a file.
Prints the default factory BIOS configuration on the screen if the file-
saving function is not available.
--overwrite (Optional)
Overwrites the output file.
GetCurrentBiosCfg
--file <file name> (Optional)
Saves the BIOS configuration to a file.
Prints the current BIOS configuration on the screen if the file-saving
function is not available.
--overwrite (Optional)
Overwrites the output file.
--tui (Optional)
Edits BIOS configuration with text-based user interface.
--compact (Optional)
Generates a compact version of the BIOS configuration containing only
the settings that have been changed in the text-based user interface.
ChangeBiosCfg
--file <file name>
Updates the BIOS with the given configuration file.
--reboot (Optional)
Forces the managed system to reboot or power up after operation.
--individually (Optional)
Updates each BIOS individually with the corresponding configuration file.
--skip_unknown (Optional)
Skips the unknown settings or menus in the BIOS configuration file.
--skip_bbs (Optional)
Skips the BBS-related menus in the BIOS configuration file.
--post_complete (Optional)
--reboot (Optional)
Forces the managed system to reboot or power up after operation.
--post_complete (Optional)
Waits for the managed system's POST to complete after reboot.
--clear_bios_eventlog (Optional)
Clears the BIOS event log.
GetDmiInfo
--file <file name> (Optional)
--overwrite (Optional)
Overwrites the output file.
EditDmiInfo
--file <file name>
The DMI information file to be edited (or created if it does not exist).
--default
Assigns the default value to the item.
Notes:
Either [--item_type, --item_name] or [--shn] is required.
Either [--value] or [--default] is required.
ChangeDmiInfo
--file <file name>
Updates the DMI information with the given text file.
--reboot (Optional)
Forces the managed system to reboot or power up after operation.
--individually (Optional)
Updates each piece of DMI information with the corresponding text file
individually.
--post_complete (Optional)
Waits for the managed system's POST to complete after reboot.
SetBiosAction
--BBS <yes/no>
Shows/hides the settings related to BBS priority. Selecting yes will show
the settings related to BBS priority and selecting no will hide them.
--reboot (Optional)
Forces the managed system to reboot or power up after operation.
--reboot (Optional)
Forces the managed system to reboot or power up after operation.
--post_complete (Optional)
Waits for the managed system's POST to complete after reboot.
--overwrite (Optional)
Works with --action DownloadEvidence. Overwrites the output file.
--reboot (Optional)
Works with --action UpdateGolden and Recover. Forces the managed
system to reboot or power up after operation.
--post_complete (Optional)
Waits for the managed system POST to complete after reboot.
-I Redfish_HI (Optional)
Uses Redfish Host Interface for in-band updates. (Only in-band usage is
supported.)
--individually (Optional)
Updates each BMC with corresponding configuration file individually.
--overwrite_cfg (Optional)
Overwrites the current BMC configuration using the factory default
values in the given BMC image file.
--overwrite_sdr (Optional)
Overwrites current BMC SDR data.
For AMI BMC FW, it must use the --overwrite_cfg option as well.
--overwrite_ssl (Optional)
Overwrites the current BMC SSL configuration. (Only supported by
X12/H12 and later platforms except for H12 non-RoT systems.)
--backup (Optional)
Backs up the current BMC image. (Only supported by the RoT systems.)
--forward (Optional)
Confirms the Rollback ID and upgrades to the next revision. (Only
supported by X12/H12 and later platforms except for H12 non-RoT
systems.)
--boot_check (Optional)
Checks if BMC boots up in 16 minutes after update. (Only supported on
X12/H12 and later platforms except for H12 non-RoT systems.)
GetBmcInfo
--file <file name> (Optional)
Reads the BMC information from the input BMC image file.
--individually (Optional)
Gets each BMC with corresponding configuration file individually.
--file_only (Optional)
Works with --file, and only reads BMC information from the input image
file.
--extract_measurement (Optional)
Works with --file, extract BMC image file measurement.
GetBmcCfg
-I Redfish_HI (Optional)
Uses Redfish Host Interface for in-band get BMC configuration. (Only in-
band usage is supported.)
--file <file name> (Optional)
Supermicro Update Manager User’s Guide 53
BMC Management
Commands Long Options
Saves the configuration to a file.
Prints the BMC configuration on screen if the file-saving function is not
available.
--overwrite (Optional)
Overwrites the output file.
ChangeBmcCfg
--file <file name>
Updates the BMC with the given configuration file.
-I Redfish_HI (Optional)
Uses Redfish Host Interface for in-band change BMC configuration. (Only
in-band usage is supported.)
--individually (Optional)
Updates each BMC with the corresponding configuration file individually.
--skip_unknown (Optional)
Skips the unknown tables or settings in the BMC configuration file.
SetBmcPassword
--user_id <user ID>
Enters the BMC user ID.
--new_password <new password>
Sets the new BMC user password.
--confirm_password <confirms password>
Confirms the new BMC user password.
--pw_file <password file>
The specified file path to read the new BMC user password.
GetKcsPriv None
SetLockdownMode
--reboot
Forces the managed system to reboot or power up after operation.
--lock <yes/no>
<yes/no> Locks/Unlocks the managed system.
--post_complete (Optional)
Waits for the managed system's POST to complete after reboot.
--clear_user_cfg
Clears the user configuration.
--preserve_user_cfg
Preserves the user configuration.
--load_unique_password
Loads the unique BMC password.
--load_default_password
Loads the default BMC password.
BmcRotManage
--action <action>
Sets action to:
1 = GetInfo
2 = UpdateGolden
3 = Recover
4 = DownloadEvidence
--overwrite (Optional)
Works with --action DownloadEvidence. Overwrites the output file.
TimedBmcReset
--immediate <immediately>(Optional)
Reset the BMC immediately.
--delay <BMC reset delay time> (Optional)
Delay reset time.
Note: Delay time must be set within 1 to 60 minutes.
Attestation
--action <action>
Sets action to:
Dump
List
Download
Delete
GetInfo
Comapre
--showall (Optional)
Prints all items from the input measurement files.
--file_only (Optional)
Works with --file, only reads measurement information from the input
measurement files.
--clear_bmc_eventlog (Optional)
Only clears the BMC event log.
--clear_bios_eventlog (Optional)
Only clears the BIOS event log.
GetMaintenEventLog
--st <start time>(Optional)
Enters the start time YYYYMMDD.
--et <end time>(Optional)
Enters the end time YYYYMMDD.
--file <file name>(Optional)
Saves the maintenance event log to a file.
Prints the maintenance event log on screen if the file-saving function is
not available.
--count <maintenance log count >(Optional)
Enters the log count.
If the count is equal to zero, the entire maintenance event log will
display.
--overwrite(Optional)
Overwrites the output file.
ClearMaintenEventLog None
GetHostDump
-I Redfish_HI (Optional)
Uses Redfish Host Interface for in-band get BMC configuration. (Only in-
band usage is supported.)
--action <action>
Sets action to:
1 = CreateDump
2 = DeleteDump
3 = DirectDump
--file <file name> (Optional)
Saves the crash dump data in a file.
--overwrite (Optional)
Overwrites the output file.
--individually (Optional)
Updates each CMM with the corresponding configuration file
individually.
--precheck (Optional)
Checks the configurations before update.
--skip_unknown (Optional)
Skips the unknown tables or settings in the CMM configuration file.
--skip_precheck (Optional)
Uploads and overwrites the existing CMM profile.
SetCmmPassword
--user_id < user ID>
Enters the CMM user ID.
--new_password <new password>
Sets the new CMM user password.
--confirm_password <confirms password>
Confirms the new CMM user password.
--pw_file <password file>
The specified file path to read the new CMM user password.
LoadDefaultCmmCfg
--clear_user_cfg
Clears user configuration.
--preserve_user_cfg
Preserves user configuration.
--load_unique_password
Loads CMM unique password.
--load_default_password
Loads CMM default password.
ProfileManage
--action <action>
Supported actions: Get, Edit, and Delete.
--overwrite
Overwrites the output file.
--showall
Gets the information of the profile associated with blade systems with
the specific profile IDs.
GetBbpInfo
--file <file name> (Optional)
Reads the BBP information from an input BBP image file.
--file_only (Optional)
Works with the option--file, and only reads BBP information from the
input image file.
UpdateBbp
--file <file name>
Updates the BBP with the given image file.
--skip_check (Optional)
Skips checking the blade power status to force a BBP update.
GetBladePowerStatus None
SetBladePowerAction
--action <action>
Sets power action with:
0 = down
1 = up
2 = cycle
3 = reset
5 = softshutdown
24 = accycle
--blade <Blade Index>
Assigns the blade index.
[A1-A14], [B1-B14] or “ALL”.
--node <Node Index> (Optional)
Applications
Commands Long Options
MountIsoImage
--image_url <URL>
The URLs to access the shared image file
SAMBA URL: 'smb://<host name or ip>/<shared point>/<file path>'
SAMBA UNC: '\\<host name or ip>\<shared point>\<file path>'
HTTP URL: 'http://<host name or ip>/<shared point>/<file path>'
--id <ID> (Optional)
The specified ID to access the shared file.
--pw <Password> (Optional)
The specified password to access the shared file.
--pw_file <Password File> (Optional)
The specified file path to read password.
UnmountIsoImage None
SetUsbAccessMode (Inband
Only) --panel <front/rear>
The panel to be set.
--enable
Dynamically enables the USB ports in the assigned panel.
--disable
Dynamically disables the USB ports in the assigned panel.
LocateServerUid
--action <action>
Sets action to:
1 = GetStatus
2 = On
3 = Off
SetHttpBoot
--current_password <current password> (Optional)
Checks the current BIOS Administrator password.
--post_complete (Optional)
Waits for the managed system's POST to complete after reboot.
GetSystemCfg
--file <file name>
Saves the configuration to a file.
--download
Downloads the current Blade system configuration file accessible for
profile update from the CMM.
--overwrite
--upload
Uploads the Blade system configuration file to the CMM for profile
update.
--skip_precheck (Optional)
Uploads and overwrites the existing CMM profile.
--reboot
Forces the managed system to reboot or power up after operation.
--skip_unknown
Skips the unknown settings or menus in the system configuration file.
--skip_bbs
Skips the BBS-related menus in the BIOS configuration file.
--precheck
Supermicro Update Manager User’s Guide 64
Applications
Commands Long Options
Checks the configuration before the update.
--post_complete
Waits for the managed system to POST complete after reboot.
-I Redfish_HI (Optional)
Uses Redfish Host Interface to query the firmware information. (Only
available for in-band usage.)
--file <file name>
Outputs the result to a file.
--overwrite
Overwrites the output file.
--individually
Reads the request body from the particular file. (Only available for OOB
usage on multiple systems.)
--request <HTTP method>
HTTP method (GET, POST, or PATCH)
--retry <Number>
Number of retry times. The default value is 3.
RemoteExec
-I Remote_INB
Manages the remote Linux systems and executes commands with in-
band usage.
--remote_cmd <Remote command>
Enters the commands to be executed on remote Linux systems.
Storage Management
-I Redfish_HI (Optional)
Uses Redfish Host Interface for in-band updates.
--reboot (Optional)
Forces the managed system to reboot or power up after operation.
--post_complete (Optional)
Waits for the managed system's POST to complete after reboot.
GetRaidCfg
--file <file name> (Optional)
Saves the configuration to a file.
Prints the RAID configuration on screen if the file-saving function is not
available.
--overwrite (Optional)
Overwrites the output file.
--controller <Controller> (Optional)
<Broadcom/Marvell> Vendor of RAID controller.
ChangeRaidCfg
--file <file name>
Updates the RAID with the given configuration file.
--individually (Optional)
Updates each RAID with the corresponding configuration file
individually.
--sync (Optional)
Supermicro Update Manager User’s Guide 67
Storage Management
Commands Long Options
Shows the current progress of the secure-erase operation of the LSI
MegaRaid SAS 3108 RAID controller.
UpdatePMem
-I Redfish_HI (Optional)
Uses Redfish Host Interface for in-band update.
--file <file name> (Optional)
Updates the PMem with the given PMem firmware file.
--reboot (Optional)
Forces the managed system to reboot or power up after operation.
--restore_default_fw (Optional)
Updates the PMem with BIOS built-in PMem firmware.
--file_only (Optional)
Works with --file, and only reads PMem information from the input
image file.
GetVROCCfg
-I Redfish_HI (Optional)
--file <file name> (Optional)
Saves the configuration to a file.
Prints the VROC configuration on the screen if the file-saving function is
not available.
--overwrite (Optional)
Overwrites the output file.
ChangeVROCCfg
-I Redfish_HI (Optional)
--file <file name>
Updates the VROC with the given configuration file.
--individually (Optional)
Updates each VROC key with the corresponding configuration file
individually.
-I Redfish_HI (Optional)
Uses the Redfish Host Interface for in-band updates.
--post_complete (Optional)
Waits for the managed system's POST to complete after reboot.
ChangeVROCCfg
-I Redfish_HI (Optional)
--file <file name>
Updates the VROC with the given configuration file.
--individually (Optional)
Updates each VROC key with the corresponding configuration file
individually.
PSU Management
Commands Long Options
GetPsuInfo None
UpdatePsu
--file <file name>
PSU firmware file
--address
PSU module address in HEX format (The PSU module slave address is
Supermicro Update Manager User’s Guide 69
obtained from the command GetPSUInfo.)
GetPowerStatus
None
SetPowerAction
--action <action>
Sets power action with:
0 = up
1 = down
2 = cycle
3 = reset
4 = softshutdown
5 = reboot
--interval <time interval> (Optional)
Sets the power cycle interval in seconds.
--post_complete (Optional)
Waits for the managed system's POST to complete after reboot.
TPM Management
Commands Long Options
TpmProvision (OOB only)
--reboot
Forces the managed system to reboot or power up after operation.
--image_url <URL>
The URLs to access the shared image file.
SAMBA URL: 'smb://<host name or ip>/<shared point>/<file path>'
SAMBA UNC: '\\<host name or ip>\<shared point>\<file path>'
HTTP URL: 'http://<host name or ip>/<shared point>/<file path>'
--lock <yes>
Locks the TPM module.
--id <ID> (Optional)
The specified ID to access the shared file.
--pw <Password> (Optional)
The specified password to access the shared file.
--pw_file <Password File> (Optional)
The specified file path to read password.
--cleartpm (Optional)
Clears the ownership of the TPM module and restores the relevant TPM
BIOS settings.
GetTpmInfo
--showall (Optional)
Prints the NV data and the capability flags (if applicable) of the trusted
platform module.
GPU Management
Commands Long Options
GetGpuInfo --showall
Prints the FRU information on GPU baseboard of the managed system.
-I Redfish_HI (Optional)
Uses the Redfish Host Interface for in-band updates.
UpdateGPU --file <file name>
Updates the CEC/FPGA with the given GPU CEC/FPGA firmware file.
--item <item name>
FW item type of GPU firmware:
0 = CEC
1 = FPGA
-I Redfish_HI (Optional)
Uses the Redfish Host Interface for in-band updates.
CPLD Management
Commands Long Options
Supermicro Update Manager User’s Guide 71
GetCpldInfo -I Redfish_HI (Optional)
Uses Redfish Host Interface to query the firmware information. (Only in-
band usage is supported.)
--individually (Optional)
Gets each CPLD with corresponding configuration file individually.
--file <file name> (Optional)
Reads the CPLD information from an input CPLD image file.
--file_only (Optional)
Works with --file, and only reads CPLD information from the input image
file.
--extract_measurement (Optional)
Works with --file, extract CPLD image file measurement.
UpdateCpld --file <file name>
Updates the CPLD with the given CPLD image file.
--reboot
Forces the managed system to reboot or power up after operation.
-I Redfish_HI (Optional)
Uses Redfish Host Interface for in-band update.
--individually (Optional)
Updates each CPLD with corresponding configuration file individually.
--post_complete (Optional)
Waits for the managed system's POST to complete after reboot.
AIP Management
Commands Long Options
GetAipCpldInfo (OOB only) None
[2]
When a file is uploaded to BIOS relayed by BMC, after reboot SUM will keep polling if the file is updated to BIOS
successfully. If SUM can’t receive “success” within the confirmed_timeout seconds, SUM will stop polling and show a
message indicating that the file is “being updated”. In this case, it denotes that the system requires more time to boot
up. The confirm_timeout can be increased to make sure SUM receives a “success” message before timeout.
[3]
SUM can limit its maximum concurrent executing count to avoid system overloading. The thread count in the .sumrc
file can be adjusted to protect the system from overloading when SUM multiple node mode is executed. For example,
if the thread count is set to 50, SUM will execute 50 working threads simultaneously.
[4]
You cannot access any cache files on mounted file systems with the command ServiceCalls. Please make sure the
[5]
The https port setting will be applied to OOB Redfish and Redfish Host Interface usage.
[6]
The certificate file only supports X.509 in PEM and DER formats.
There are three ways to specify the .sumrc file: command option --rc_path (highest priority), .sumrc file in
the current directory (intermediate priority) and .sumrc in the user home directory (lowest priority). A user
can rename sumrc.sample file to “.sumrc” in the current directory or move the file to the user home
directory and rename to .sumrc based on user’s requirements. Note that a .sumrc sample configuration file
is bundled with SUM release package. An example is provided below.
# Please copy this file to the SUM execution directory or user home directory and rename to .sumrc
# replace ':' with '-' when file name contains an IPv6 address.
#ipv6_file_name_switch = 0
# set certificate file for verifying customized signed RoT firmware images
#certificate = /home/administrator/cert/public.cert
The syntax “name=value” is the parameter name defined by SUM and value is the parameter value that can
be configured. If a parameter value is illegal, SUM will ignore it. By default, all the parameters in .sumrc are
inactivated and “#” in front of the line may be removed to activate a parameter configuration.
Note: In Windows, please copy the SUM configuration file and rename it to .sumrc by
Command Prompt.
"Custom"
"Custom"
A setup submenu is quoted by brackets. Setup items are next to the setup submenu.
A variable (of one setup item) always stays on the left side of the "=" character.
A value (of one variable) always stays on the right side of the "=" character.
Annotated options (of one variable) are shown after "//" and "*" indicates the default option.
A dependency (if available) will be separated from an option command by eight spaces. It indicates
that the variable is visible and configurable when other variable(s) are set to a designated value.
In this example, the “Power Technology” item in the “CPU Power Management configuration” submenu is
currently set to 01 for Energy Efficient (the default setting) and can be set to 00 for Disabled or 02 for
Customer. The “EIST” variable is equal to 01 for Enabled (the default setting) and can be set to 00 when the
“Power Technology” variable is set to 02 for Custom.
If the desired changes are limited to the “Power Technology” configuration, delete all except the two lines:
Power Technology=01
You can remove unnecessary menu items (or variables) and their values still remain the
same after an update.
If all menu items are removed (or the file becomes empty), no configurations are
changed.
The Setup submenu is required for setting up the items.
On platforms before X11 Intel® Xeon® Scalable Processors with Intel® C620 Series Chipsets, the
“SetBiosAction” command is required to execute with the --BBS option set to yes, to activate the BIOS
settings related to BBS Boot Priority.
In this example, “HDD Boot Order #1” is currently set to 0000 for INTEL SSDSC2BB120G6 and “HDD Boot
Order #2” is set to 0001 for SEAGATE ST3500418AS. Boot orders could be swapped after changing BIOS
configuration with the setting modified as below.
Notes:
The settings of boot orders should not be the same except Disabled.
GetDefaultBiosCfg command does not support these BBS settings for platforms before
X11 Intel® Xeon® Scalable Processors with Intel® C620 Series Chipsets.
<BiosCfg>
<Menu name="IPMI">
<Menu name="System Event Log">
<Information>
<Help><![CDATA[Press <Enter> to change the SEL event log
configuration.]]></Help>
</Information>
<Subtitle>Enabling/Disabling Options</Subtitle>
<Setting name="SEL Components" selectedOption="Enabled" type="Option">
<Information>
<AvailableOptions>
<Option value="0">Disabled</Option>
<Option value="1">Enabled</Option>
</AvailableOptions>
<DefaultOption>Enabled</DefaultOption>
<Help><![CDATA[Change this to enable or disable all features of System
Event Logging during boot.]]></Help>
</Information>
</Setting>
<Subtitle></Subtitle>
<Subtitle>Erasing Settings</Subtitle>
<Setting name="Erase SEL" selectedOption="No" type="Option">
<Information>
<AvailableOptions>
<Option value="0">No</Option>
<Option value="1">Yes, On next reset</Option>
<Option value="2">Yes, On every reset</Option>
</AvailableOptions>
<DefaultOption>No</DefaultOption>
<Help><![CDATA[Choose options for erasing SEL.]]></Help>
In this example XML file, the setting “SEL Components” is enclosed in menu “System Event Log.” The
setting configuration will take effect only when <WorkIf> enclosure is evaluated as true (in this case, the
setting “BMC Support” is not equal to 0). If the setting value is modified in XML file and <WorkIf> enclosure
is evaluated as false, the warning messages will indicate that the changes will not take effect. Besides, if the
Moreover, two or more settings in the XML file might refer to the same variable in the BIN file. In this
scenario, those setting values are expected to be consistent. For example, the setting “Quiet Boot” in the
menu “Setup” -> “Advanced” -> “Boot Feature” and the setting “Quiet Boot” in the menu “Setup” -> “Boot”
are actually two different settings (different settings can have the same name). They even refer to the
same variable in the BIN file. If the setting values in these two questions are conflicted in the XML file, SUM
will then throw an exception. For more details on usages, see Appendix E. How to Change BIOS
Configurations in XML Files.
Notes:
[System]
// Byte Order :
// 33 22 11 00 55 44 77 66 88 99 AA BB CC DD EE FF
A DMI type is quoted by brackets. DMI information items are next to the DMI type.
The name of a DMI information item is always followed by its short name.
The item name and its short name stays at the left side of the “=” character.
A short name is always enclosed by brackets.
A value (of one information item) always stays at the right side of the “=” character.
String values are enclosed by double quotation marks.
$DEFAULT$ signature without double quotation marks is used to load default value for a string-valued
item.
There is no default value for non-string-value items.
Do not use quotation marks for non-string-value items.
In this example, the “Version” DMI item belongs to the “System” DMI type with short name SYVS. It is
string-value by “A Version” and can be changed to any other string value. For the “Serial Number” item, its
value is set as $DEFAULT$. After updating the DMI information, the item value of the “Serial Number” will
be reset to factory default. The UUID item is a specially formatted hex-value item. Its value meanings are
explained next to it.
Notes:
You can remove unnecessary DMI items so that its value will not be changed after an
update.
The DMI type is required for DMI items.
Each item can be identified either by its short name or by the combination of its item
type and item name.
Any line begins with “//” will be ignored.
A version number is included at the beginning of every DMI.txt file. This version
number should not be modified because it is generated by SUM according to the BIOS
of the managed system for DMI version control.
<?xml version="1.0"?>
<BmcCfg>
<!--You can remove unnecessary elements so that-->
<!--their values will not be changed after update-->
<StdCfg Action="None">
<!--Supported Action:None/Change-->
<!--Standard BMC configuration tables-->
<FRU Action="Change">
<!--Supported Action:None/Change-->
<Configuration>
<!--Configuration for FRU data-->
<BoardMfgName>Supermicro</BoardMfgName>
<!--string value, 0~16 characters-->
</Configuration>
</FRU>
</StdCfg>
<OemCfg Action="Change">
<!--Supported Action:None/Change-->
<!--OEM BMC configuration tables-->
<ServiceEnabling Action="Change">
<!--Supported Action:None/Change-->
<Configuration>
<!--Configuration for ServiceEnabling-->
<HTTP>Enable</HTTP>
<!--Enable/Disable-->
</Configuration>
</ServiceEnabling>
</OemCfg>
</BmcCfg>
In this example, the Action is None for the StdCfg table. As such, SUM will skip updating the element
BoardMfgName of the table FRU. On the other hand, SUM will try to update the value as Enable for the
HTTP element of the ServiceEnabling table in the OemCfg table.
Notes:
Child tables or configurable elements can be deleted to skip updates for these tables or
configuration elements.
Child tables or configurable elements cannot be without parents.
The XML version line and the root table should not be deleted.
For using tools to edit XML files, please refer to Appendix F. Using the Command Line
Tool (XMLStarlet) to Edit XML Files.
To create a logical volume, the RAIDInfo action should be “Change” and the RAID action should be
“Create”. The “PhysicalDriveList” field must contain all drive IDs for RAID creation and the “ArrayID”
field should be set to “-1.”
To delete a logical volume, the RAIDinfo action should be “Change,” the RAID action should be
“Delete” and assigned the corresponding logical drive ID or “ALL” to the “DeletingLogicalDriveList”
field.
To delete all arrays built in the RAID controller, the RAIDinfo action should be “ClearAll.”
To change RAID configuration, you have to delete the original RAID and create a new RAID with the
“Level,” “Span” and “PhysicalDriveList” fields properly modified.
To create a logical drive, the RAIDInfo action should be “Change” and the RAID action should be
“Create.” The “ArrayID” field should be set to “0.”
To delete a logical drive, the RAIDinfo action should be “Change”, the RAID action should be “Delete”
and assigned the corresponding “LogicalDrive DriveID” to “LogicalDriveDeleteID.”
To rebuild a logical drive, the RAIDinfo action should be “Change,” the RAID action should be “Rebuild”
and assigned the corresponding “LogicalDrive DriveID” to “LogicalDriveRebuildID.”
To import a logical drive, the RAIDinfo action should be “Change,” the RAID action should be “Import”
and assigned the corresponding “LogicalDrive DriveID” to “LogicalDriveImportID.”
Notes:
Example:
To create an array:
Create a RAID 10 array with Span 2 and 4 HDDs and “ArrayID” field can be set to “-1”:
For array ID, “-1” will be used when no array exists. This setting enables a dummy array table for you
to create the first array. Note that for the creation action, “ArrayID” is meaningless and array ID will
be generated after the array is created.
<RAIDInfo Action="Change">
<RAID Action="Create" ArrayID="-1">
<Level>RAID10</Level>
<Span>2</Span>
<PhysicalDriveList>0,1,2,3</PhysicalDriveList>To create
two or more arrays:
<RAIDInfo Action="Change">
Array 1
<RAID Action="Create" ArrayID="-1">
<Level>RAID10</Level>
<Span>2</Span>
<PhysicalDriveList>0,1,2,3</PhysicalDriveList>
Array 2
<RAID Action="Create" ArrayID="-1">
<Level>RAID10</Level>
Locate HDDs:
Locate HDD1/HDD2/HDD3 in “Array0”. LEDs of HDD1/HDD2/HDD3 will be lighted.
<RAIDInfo Action="Change">
<RAID Action="Locate" ArrayID="0">
<LocatingPhysicalDriveIDList>1,2,3</LocatingPhysicalDriveIDList>
Unlocate HDDs:
Unlocate HDD1/HDD4 in “Array0”. LEDe of HDD1/HDD4 will be dimmed.
<RAIDInfo Action="Change">
<RAID Action="Unlocate" ArrayID="0">
<UnlocatePhysicalDriveIDList>1,4</UnlocatePhysicalDriveIDList>
<LogicalDriveName><![CDATA[dummy]]></LogicalDriveName>
To delete a logical drive:
Delete logical drive 0.
<RAIDInfo Action="Change">
<RAID Action="Delete" ArrayID="0">
<Configuration>
<LogicalDriveDeleteID>0</LogicalDriveDeleteID>
To import a logical drive:
Import logical drive 0.
<RAIDInfo Action="Change">
<RAID Action="Import" ArrayID="0">
<Configuration>
<LogicalDriveImportID>0</LogicalDriveImportID>
To rebuild a logical drive:
Rebuild logical drive 0.
<RAIDInfo Action="Change">
<RAID Action="Rebuild" ArrayID="0">
<Configuration>
<LogicalDriveRebuildID>0</LogicalDriveRebuildID>
Note: A system needs to reboot after importing logical drives for the changes to take effect.
<?xml version="1.0"?>
<CmmCfg>
<!--You can remove unnecessary elements so that-->
<!--their values will not be changed after update-->
<StdCfg Action="None">
<!--Supported Action:None/Change-->
<!--Standard Cmm configuration tables-->
<SOL Action="Change">
<!--Supported Action:None/Change-->
<Configuration>
<!--Configuration for SOL properties-->
<Access>Enable</Access>
<!--Enable/Disable-->
</Configuration>
</SOL>
</StdCfg>
<OemCfg Action="Change">
<!--Supported Action:None/Change-->
<!--OEM Cmm configuration tables-->
<ServiceEnabling Action="Change">
<!--Supported Action:None/Change-->
<Configuration>
<!--Configuration for ServiceEnabling-->
<HTTP>Enable</HTTP>
<!--Enable/Disable-->
</Configuration>
</ServiceEnabling>
</OemCfg>
</CmmCfg>
Notes:
Child tables or configurable elements can be deleted to skip updates for these tables or
configuration elements.
Child tables or configurable elements cannot be without parents.
The XML version line and the root table should not be deleted.
For using tools to edit XML files, please refer to Appendix F. Using the Command Line
Tool (XMLStarlet) to Edit XML Files.
Easy Operation
With the visual menu, information display is more intuitive than an XML file. Users can make changes
without learning rules. For example, when a function is disabled, all the dependent settings become invalid
or meaningless. TUI will then hide the settings accordingly.
Real-Time Feedback
SUM with TUI allows a user to check input format settings in real time and get feedback immediately. For
example, when a data constraint violation occurs, an error message pops up in TUI. Users can find out
about errors without waiting for the execution to be completed.
GUI-Free Environment
In practice, GUI packages are usually not installed on most Unix-like servers. TUI provides an interactive
interface on text-based system without GUI packages.
For optimized display, SUM automatically configures your terminal settings. Refer to the table below
to see if the related environment variables are changed accordingly.
After you finish using TUI, your original terminal settings will be automatically restored. If restoration
fails, locate and run the shell script “restore_terminal_config.sh” under the current working directory.
The execution command as below:
Windows:
On Windows, please adjust font size by yourself if the font size is too small to operate.
On FreeBSD, when running on local terminal with vt driver (default driver after FreeBSD 11), SUM
changes the font to tui.fnt when entering TUI, and changes the font to default font when exiting TUI.
You can rename or remove the file ExternalData/tui.fnt to disable this behavior.
External/tui.fnt is converted from terminus-u12n.bdf by vtfontcvt, check Appendix D for the license.
SUM with TUI simulates a BIOS setup design and its display dimension is set to 30 rows by 100 columns. If
SUM fails to resize the terminal with the current terminal settings, it will try to change font type and font
size for optimized display. The commands to change terminal dimensions on different operating systems
are listed in the table below.
Notes:
When you first enter the SUM BIOS Setup Utility, the “Main” root menu setup appears on screen. Press the
arrow keys <RIGHT> and <LEFT> to navigate between menu tabs.
A “+” symbol before an option on a menu indicates that a sub-menu can be expanded for further
configuration. To change a setting value, you can press the keys <+> and <->. Or you can press the <Enter>
key to call up a dialog box for configuration.
Some functions are allowed to be enabled or disabled. To change the setting, press the <Enter> key to call
up a dialog box. Press the <UP> and <DOWN> arrow keys to make a selection. To disable a function, select
Unchecked. To enable a function, select Checked.
A value may be limited due to the BIOS. You can press the number keys to enter the desired value, or press
the <+> and <-> keys to adjust your value within the range. If an input value is incorrect, a warning message
appears on screen.
For general help information, press the <F1> key. A message box appears.
To load the previous values to all configurations, press the <F2> key. A message appears for confirmation.
To return all configurations to the default values, press the <F3> key. A message appears for confirmation.
Go to Security, select Administrator Password and press the <Enter> key to set a password. Note the
following when you set a password:
If you have already set passwords in your BIOS, a series of three asterisks on the Security page
indicates that a password is created (see the figure below).
The password length may vary depending on the BIOS you use. For example, the length of the
password can be from 3 to 20 characters long (see the figure below).
Two methods are available to exit the SUM BIOS configuration TUI.
To exit the TUI without saving any configurations, press the <ESC> key. A message appears on the
screen for confirmation. Note that this only works on the root menu. You will be returned to the
previous menu when you press the <ESC> key in submenus.
Since SUM 2.5.0, some commands support Redfish Host Interface on X12/H12 and later platforms except
the H12 non-RoT system.
Notes:
• The Redfish Host Interface is not be enabled by default in Linux. To enable the Redfish
Host Interface in Linux, enable_RHI.sh in the SUM release package under the /script
folder.
• For SUSE12 system, if the Redfish Host Interface is still not working after RHI.sh is
enabled, you can execute SuSE12 _Firewall_WhiteList.sh in the SUM release package
under /script/SUSE to add the Redfish Host Interface to the firewall whitelist.
Syntax:
Different than the standard in-band operation, the <username> and <password> are needed to access the
managed system.
Currently, the following commands support Redfish Host Interface for in-band usage: UpdateBios,
UpdateBmc, ActivateProductKey, QueryProductKey, BiosRotManage, BmcRotManage,
UpdateRaidController ,GetRaidControllerInfo, UpdateAocNIC, GetAocNICInfo, GetCpldInfo, UpdateCpld,
GetPMemInfo and UpdatePMem.
In-Band:
Supermicro_BIOS.rom
Supermicro_BMC.rom
1111-1111-1111-1111-1111-1111
-file log.tgz
Since SUM 2.8.1, SUM has supported AuthNone authentication for use on the in-band Redfish Host
Interface. As a BMC OEM feature, AuthNone authentication requires the OEM BMC firmware to function
properly. You can execute all SUM commands supporting -I Redfish_HI without a BMC username and a
password .
Syntax:
Example:
Child tables or configurable elements can be deleted to skip the updates for these
tables or configuration elements.
Child tables or configurable elements must stick to the parent tables.
The XML version line and the root table should not be deleted.
For using tools to edit XML files, please refer to Appendix F. Using the Command Line
Tool (XMLStarlet) to Edit XML Files.
Supported RAID level is variant to VROC key on the motherboard. Supported RAID
level:
Supermicro Description RAID Support
PN
AOC- Intel SSD Only RAID 0/1/10/5
VROCINTMOD Upgrade
module
AOC- Standard RAID 0/1/10
VROCSTNMOD Upgrade
module
AOC- Premium RAID 0/1/10/5
VROCPREMOD Upgrade
module
For Intel PCIe Gen3 x8 SSDs, an Intel VROC hardware key is not required to use RAID 0,
while a hardware key is required to use RAID 0/1/5/10 for most SSDs.
For details on VROC key, please refer to Supermicro website:
https://www.supermicro.com/en/products/accessories/addon/AOC-
VROCxxxMOD.php
<?xml version="1.0"?>
<VROCCfg>
<!--Supermicro Update Manager 2.7.0 (2021/08/16)-->
<!--File generated at 2021-08-17_13:34:48-->
<PhysicalDriveInfo>
<Information>
<!--Physical hard drive information, this region is read only.-->
<DriveCount>2</DriveCount>
<PhysicalDrive VROCId="25362e54-a291-5a0f-a3e7-71ec761b4838">
<!--This VROCId is used to identify drive-->
<DriveStatus>Enabled</DriveStatus>
<!--Physical drive status, string value-->
<Temperature>37</Temperature>
<!--Physical drive temperature in degree C, integer value-->
<Capacity>2980</Capacity>
<!--Physical drive capacity in Gigabyte, integer value-->
<ModelName>INTEL SSDPE2KE032T8</ModelName>
<!--Physical drive model name, string value-->
<SerialNumber>PHLN1175029U3P2BGN</SerialNumber>
<!--Physical drive serial number, string value-->
<CapableSpeed>32Gb/s</CapableSpeed>
<!--Physical drive capable speed value, string value-->
<PredictedFail>false</PredictedFail>
<!--Physical drive predicted fail, string value-->
</PhysicalDrive>
<PhysicalDrive VROCId="bdca9ec7-74db-5d30-8e77-3438be52141a">
<!--This VROCId is used to identify drive-->
<DriveStatus>Enabled</DriveStatus>
<!--Physical drive status, string value-->
<Temperature>36</Temperature>
To create a volume:
Create a RAID 1 volume with both SSDs and “VROCId” field should be set to “-1”:
The setting enables a dummy volume table for you to create the volume. Note that for the creation
action, “VROCId” is meaningless and VROC ID will be generated after the volume is created.
<Volume Action="None" VROCId="-1">
<!--Supported Action:None/Delete/Create-->
<!--This VROCId is used to identify volume-->
<Configuration>
<Name>Dummy</Name>
<!--Volume name, string value; length limit = 15 characters--
>
<!--Only used for "Create" action-->
Syntax:
sum -I Remote_INB --oi <OS IP address> -ou <OS user ID> --op <OS user password>
Different than the standard in-band operation, it is required to enter the user name and password of the
desired system in order to access it remotely.
Example:
Remote In-Band:
1. For in-band usage, do not use the -l, -i, -u, -p and -f options.
2. For in-band usage, supported commands and their node product key requirement might be different
(see Appendix B. Management Interface and License Requirements).
3. A Linux driver might be required for in-band usage. For details, please see 2.3 Setting Up In-Band
Managed Systems. If a Linux driver is required and you are executing SUM in this server for the first
time, you have to copy and paste the OS specific driver file "sum_bios.ko" under the
SUM_HOME/driver directory to the SUM_HOME directory. For example, if the OS is RHEL 5.x. execute
[SUM_HOME]# cp ./driver/RHL5_x86_64/sum_bios.ko ./
To activate systems individually, follow these steps by using the command “ActivateProductKey”.
1. Obtain a node product key from Supermicro. See 3.1 Getting Product Keys from Supermicro.
2. Use the following SUM command.
Syntax:
sum [[-i <IP or host name> | -I Redfish_HI] -u <username> -p <password>] -c
Example:
OOB:
key 1111-1111-1111-1111-1111-1111
'{"ProductKey":{"Node":{"LicenseID":"1","LicenseName":"SFT-OOB-
LIC","CreateDate":"20200409"},"Signature":"1111111111111111111122222222222222233333333333333ab
abababababababababababbabcdcdcdcdcdcdccdcdcddcdefefefefefefefeefefefefghghghghghghghghghgh"}}'
key_file mymacs.txt.key
In-Band:
'{"ProductKey":{"Node":{"LicenseID":"1","LicenseName":"SFT-OOB-
LIC","CreateDate":"20200409"},"Signature":"1111111111111111111122222222222222233333333333333ab
abababababababababababbabcdcdcdcdcdcdccdcdcddcdefefefefefefefeefefefefghghghghghghghghghgh"}}'
1111-1111-1111-1111-1111-1111
key_file mymacs.txt.key
Notes:
• A node product key in JSON format must be put in single quotation marks.
• When activating a key in JSON format in Windows, the JSON key string cannot contain
any spaces.
• For details on the format of a product key file (mymacs.txt.key), see 3.1 Getting
Product Keys from Supermicro.
To query the node product keys activated in the managed system, use the “QueryProductKey” command.
Syntax:
sum [[-i <IP or host name> | -I <Redfish_HI>] -u <username> -p <password>] -c
QueryProductKey
Example:
OOB:
In-Band:
SFT-OOB-LIC
Use the “CheckOOBSupport” command to check if both BIOS and BMC firmware images support OOB
functions.
Notes:
• If your BMC does not support OOB functions, you can update the BMC firmware image
using the SUM “UpdateBmc” command.
• To update the BIOS in the managed system to support OOB functions, you can use the
SUM “UpdateBios” command (either in-band or OOB) to flash BIOS even when BIOS
does not support OOB functions. For details, see 5.3.2 Updating the BIOS Firmware
Image. However, when using OOB channel, if the onboard BIOS or the BIOS firmware
image does not support OOB functions, the DMI information, such as MB serial
number, might get lost after system reboot.
• If Feature Toggled On is No, all licensed features will be turned OFF and Node Product
Key Activated will be N/A.
Known Limitations:
• If we roll back BIOS from OOB-supported version to non-supported version, the information for “BIOS
build date” and “OOB support in BIOS” fields will not be changed accordingly.
Syntax:
Example:
OOB:
In-band:
[KEY]
SFT-DCMS-SVC-KEY Activated...Yes
[BMC]
BMC FW Version...................02.41
[BIOS]
[SYSTEM]
Use the “CheckAssetInfo” command to check the asset information for the managed system. On X11 Intel®
Xeon® Scalable Processors with Intel® C620 Series Chipsets and later platforms, the add-on devices are
displayed by the riser cards to which they are connected.
Syntax:
Example:
Supermicro Update Manager User’s Guide 131
[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c CheckAssetInfo
The console output is different on different platforms. Examples are provided below.
On platforms before X11 Intel® Xeon® Scalable Processors with Intel® C620 Series Chipsets
System
======
Version: 0123456789
UUID: 00000000-0000-0000-0000-0CC47A3A4094
Baseboard
=========
Version: 1.00
CPU ===
[CPU(1)]
Enabled Cores: 12
Total Cores: 12
[CPU(2)] N/A
Memory
======
[MEM(1)] N/A
[MEM(2)] N/A
[MEM(3)] N/A
[MEM(6)] N/A
[MEM(7)] N/A
[MEM(8)] N/A
[MEM(9)] N/A
[MEM(10)] N/A
[MEM(11)]
Locator: P1-DIMMF1
Manufacturer: SK Hynix
Size: 8192 MB
[MEM(12)] N/A
[MEM(13)] N/A
[MEM(14)] N/A
[MEM(15)] N/A
[MEM(16)] N/A
[MEM(17)] N/A
[MEM(18)] N/A
[MEM(19)] N/A
[MEM(20)] N/A
Supermicro Update Manager User’s Guide 133
[MEM(21)] N/A
[MEM(22)] N/A
[MEM(23)] N/A
[MEM(24)] N/A
====================================
[NIC(1)]
Slot Location: 1
====================================
Supermicro Update Manager User’s Guide 134
[Device(1)]
Slot Location: 1
====================================
[NIC(1)]
====================================
[Device(1)]
[Device(2)]
====================================
[LAN(1)]
[LAN(2)]
====================================
[IPMI]
On X11 Intel® Xeon® Scalable Processors with Intel® C620 Series Chipsets and later platforms, output of
add-on sections is different from previous example. The example is shown below.
====================================
[[[SXB3 (Riser)]]]
[[Onboard]]
[NIC(1)]
Vendor: (ID:1528)
[NIC(2)]
Vendor: (ID:1528)
[NIC(1)]
Vendor: (ID:1583)
Subvendor: (ID:0000)
Slot Number: 1
====================================
[[[SXB3 (Riser)]]]
[[Onboard]]
[Device(1)]
[Device(2)]
Vendor: (ID:1528)
[[AOC(1)]]
[Device(1)]
Vendor: (ID:1583)
Subvendor: (ID:0000)
Slot Number: 1
Supermicro Update Manager User’s Guide 140
Slot Designation: AOC-UR-i4XT SLOT1 PCI-E 3.0 X8
Notes:
• Items supported only since X10 Intel® Xeon® Processor E5 v3/v4 Product Family
platform and selected systems are: System: Version, UUID, CPU, BaseBoard, Memory,
and Add-on Network Interface.
• Items supported only since X11 Intel® Xeon® Scalable Processors with Intel® C620
Series Chipsets platform and selected systems: Onboard Network Interface, Add-on PCI
Device, and Onboard PCI Device.
• Items generally supported are: System: Product Name, Serial Number, System Network
Interface, and IPMI Network Interface.
• Current Speed in Network Interface requires TAS installation in the managed system.
• For riser card chips, its device information will be listed in the add-on card section and
under the label “Onboard.”
Use the “CheckSensorData” command to check the sensor data for the managed system.
Notes:
• Supported sensors vary from different motherboards and firmware images.
• Network add-on card temperature can be retrieved from some X10 or later systems.
• For PS and Chassis Intrusion sensors, the “Reading” field is only used to debug. You
only need to check if the “Status” field shows “OK.”
Syntax:
Example:
For CPU temperature sensor, the console output contains the following information.
Use the “CheckSystemUtilization” command to check the device utilization status for the managed system.
Notes:
• This command requires a TAS agent to collect the system statuses. If a TAS agent is not
installed on the managed system, the system statuses will be shown as N/A.
• The OS of the managed system must be booted for the TAS agent to collect the real-
time device utilization.
• This command is supported since X10 platforms and select systems.
Syntax:
Example:
CheckSystemUtilization
Time
====
Last Sample Time: 2014-05-16_17:16:02
OS
==
OS Name: RedHatEnterpriseServer
OS Version: 6.4 x86_64
CPU
===
CPU Utilization: 2.74 %
Memory
======
Memory Utilization: 8 %
HDD(1)
======
HDD name: /dev/sda
SMART Status: Ok
Serial number: Z2AABXL3
Total Partitions: 2
[Partition(1)]
Partition Name: /dev/sda1
Utilization: N/A
Used Space: N/A
Total Space: 17.58 GB
[Partition(2)]
Partition Name: /dev/sda2
Utilization: 22.01 %
Used Space: 3.62 GB
Total Space: 17.30 GB
RSTe(1)
======
Volume name: /dev/md126
Controller name: Intel RSTe
Numbers of Drives: 2
[HDD(1)]
HDD name: /dev/sdc
SMART Status: Ok
[HDD(2)]
HDD name: /dev/sdd
Network
=======
Total Devices: 2
[NIC(1)]
Device Name: eth0
Utilization: <1 %
Status: up
[NIC(2)]
Device Name: eth1
Utilization: 0 %
Status: down
Notes:
RAID Device type LSI, RSTe and NVMe shows only if they have been installed on the host
machine.
When RSTe Device is installed on the host machine, normal Hard Disk type (HDD)
information will not display.
Use the “ServiceCalls” command to check the system event log and sensor data record of the managed
system with the ServiceCalls configuration file. After the execution, the recipients assigned in the file will
receive SEL and SDR reports by e-mail.
Syntax:
Example:
OOB:
servicecalls_sample.xml
In-Band:
A ServiceCalls XML file is composed of several nodes, and each node is explained below. For a complete
example of a ServiceCalls XML file, you can find one file names as “servicecalls_sample.xml” bundled in the
SUM release package.
ServerURI is the full SMTP URI, and ServerPort is the SMTP port on your SMTP server, which along
with SMTP SSL and SMTP STARTTLS are supported by SUM. SUM is known to support ports 25, 465
and 587. Also,you need to provide the sender’s information such as their e-mail address, ID, and
password for e-mails.
• Trigger Items Node - <Trigger_Items>
• Subject Line
Contains Event ID, function name, the managed system BMC/CMM IP, and the summary of the host.
• Body
o E-mail Function: It is “SUM Service Calls” in this example.
o Host IP: The BMC/CMM IP address of the managed system.
o Event ID: The 32 bytes of GUID.
o Event Source: The OS IP address of the managing system.
Problematic Items:
Summary:
Additional Items:
User-Defined Event Email and HW Event Alert E-mail are different, but both include status,
timestamps, sensor type, reading, and threshold.
○ User-Defined Event E-mail: This section contains the normal status of SDR items.
○ HW Event Alert E-mail: This section contains both SEL and SDR items, including Problematic and
non-Problematic events.
Device Info:
Note: Both node product keys, “SFT-DCMS-SINGLE” and “SFT-DCMS-SVC-KEY,” are required
to execute this command.
Use the “SystemPFA”command to monitor and set the predictive failure analysis function of BIOS on the
managed system.
Syntax:
1 = GetCurrentStatus
2 = Enabled
3 = Disabled
Example:
OOB:
action GetCurrentStatus
...........
..........................Done
........................
..................................................
..................................................
..................................................
......
In-Band:
Disabled --reboot
Use the “MemoryHealthCheck” command to access the function in BIOS to check memory health of the
managed system.
Syntax:
1 = GetCurrentStatus
2 = Enabled
3 = Once
4 = Disabled
Example:
OOB:
action GetCurrentStatus
....
.........................Done
.........................
..................................................
..................................................
..................................................
..................................................
..................................................
..................................................
..................................................
...................
In-Band:
Use the “GetBiosInfo” command to get the BIOS firmware image information from the managed system as
well as the local BIOS firmware image (with option --file).
Syntax:
Example:
OOB:
Supermicro_BIOS_signed.rom
The console output contains the following information when secure flash is signed from local BIOS image.
Managed system...........192.168.34.56
Board ID.............0660
Board ID.............0988
FW image.............Signed
Signed Key.......SecureFlash
In-Band:
The console output contains the following information when RoT is signed from local BIOS image.
Board ID.............1B6A
Supermicro Update Manager User’s Guide 158
BIOS build date......2021/01/12
FW image.............Signed
Signed Key.......RoT
Managed system:
Board ID.............0660
BIOS version.........1.0
BIOS revision........1.8
Board ID.............1B4A
FW image.............Signed
Signed Key.......RoT
BIOS version.........1.0a
BIOS revision........5.22
FW global version: 0
RC version: 20.P80
CPU signature: 00 06 06 a4
Description: IceLakeServer L0
Version: 0B000280
CPU signature: 00 06 06 a5
Description: IceLakeServer C0
Version: 0C0002B0
CPU signature: 00 06 06 a6
Description: IceLakeServer D0
Version: 0D000260
UUID: 936B704B-2D82-EB11-9FAD-0CC47AFBDDC6
extract_measurement
Board ID............................1B6A
FW image............................Signed
Signed Key......................RoT
Measurement.....................FB0DC09383104F49834E2E903F46F365259CB598
6D97F0F3D9DB5945E0D0DFD59F8511F6857E915B414A1B9A30071EF5D99018144033DCC80464B951
E555402B
Type Description
Signed Secure flash is signed by Super Micro Computer, Inc.
Signed(U) Secure flash is NOT signed Super Micro Computer, Inc., but by unknown
authority.
(Not shown) The “FW image” field is not shown because of no secure flash signed in the
image.
Type Description
Signed RoT is signed by Super Micro Computer, Inc.
Signed(C) RoT is verified by the specified certificate.
Notes:
BIOS secure flash and RoT signed information are supported.
The PMem firmware version in this section is the BIOS built-in PMem firmware version.
Use the “UpdateBios” command with the Supermicro_BIOS.rom BIOS firmware image to run SUM to
update the managed system.
Syntax:
Notes:
OOB:
Supermicro_BIOS.rom --reboot
In-Band:
Supermicro_BIOS.rom –reboot
Notes:
The OOB usage of this function is available when the BMC node product key is
activated.
The in-band usage of this function does not require node product key activation.
The firmware image can be successfully updated only when the board ID of the
firmware image and the managed system are the same.
You have to reboot or power up the managed system for the changes to take effect.
When using an OOB channel, if the onboard BIOS or the BIOS firmware image does not
support OOB functions, the DMI information, such as the motherboard serial number,
might be lost after system reboot.
DO NOT flash BIOS and BMC firmware images at the same time.
The --preserve_nv and --flash_smbios options cannot be used at the same time.
The --flash_smbios option is used to erase and restore SMBIOS information as factory
default values. Unless you are familiar with SMBIOS data, do not use this option.
The --preserve_nv option is used to preserve BIOS NVRAM data. Unless you are
familiar with BIOS NVRAM, do not use this option.
The --preserve_mer option is used to preserve ME firmware region. Unless you are
familiar with ME firmware region, do not use this option.
The --preserve_setting option requires SFT-OOB-LIC key (both OOB and In-Band) and it
is only supported on X11 Intel® Xeon® Scalable Processors with Intel® C620 Series
Chipsets and later platforms. The preserved setting configurations will be listed in a
Use the “GetCurrentBiosCfg” command to execute SUM to get the current BIOS settings from the managed
system and save it in USER_SETUP.file.
Notes:
This BIOS configuration file is synchronized to the BMC from the BIOS when the system
reboots or powers up.
If the customer has flashed BMC firmware image, this function will not work until the
managed system is first rebooted or powered up.
X11 Intel® Xeon® Scalable Processors with Intel® C620 Series Chipsets and newer
platforms support HII. The current BIOS settings will be generated as XML and plain
text formats for HII and DAT respectively.
The XML file of BIOS configuration contains extended ASCII characters. Please use ISO
8859-1 encoding to view BIOS configuration XML file.
SUM 2.2.0 or later supports text-based user interface. For details, refer to 4.9 TUI.
SUM 2.7.0 or later supports generating a compact version of BIOS configuration file for
TUI using “--compact” option to remove the unchanged BIOS settings. To view an
example of a compact configuration file, refer to Appendix G. Removing Unchanged
BIOS Settings in an XML File.
Syntax:
Example:
In-Band:
Notes:
The editable BIOS configuration items may be changed for different BIOS versions.
Please make sure the BIOS configurations are consistent with the BIOS version on the
managed system.
The uploaded configuration will only take effect after a system reboot or power up.
For HII, when the new BIOS firmware image is flashed, there may be conflicts between
the BIOS configuration file and the latest BIOS configuration in the managed system. The
current BIOS configuration file should be re-downloaded, re-modified and then updated.
When hardware resources or settings are changed, a previously downloaded BIOS
configuration file may become outdated. When a BIOS configuration file is inconsistent
with the latest BIOS configuration in the managed system, using the options --
skip_unknown and --skip_bbs (both options are only supported in HII) may solve the
problem.
For instance, when an AOC has been removed from the managed system, the BIOS
configuration for the related menus or settings may become invalid. The option --
skip_unknown is designed to skip all invalid menus and settings in the latest BIOS
configuration in the managed system.
In another example, when a hard disk device is changed, the option string in the Option
setting in the BBS related menus may become invalid as well. The --skip_bbs option is
Syntax:
sum [-i <IP or host name> -u <username> -p <password>] -c ChangeBiosCfg --file
Example:
OOB:
USER_SETUP.file --reboot
In-Band:
Use the “GetDefaultBiosCfg” command to execute SUM to get the default factory BIOS settings from the
managed system and save it in the USER_SETUP.file file.
Syntax:
Example:
OOB:
In-Band:
Use the “LoadDefaultBiosCfg“ command to execute SUM to reset the BIOS settings of the managed system
to the factory default settings.
Note: The uploaded configuration will take effect only after a reboot or power up.
Syntax:
path>]] [--reboot]
Example:
OOB:
reboot
In-Band:
Use the “GetDmiInfo” command to execute SUM to get the current supported editable DMI information
from the managed system and save it in the DMI.txt file.
Notes:
This DMI file is synchronized to BMC from BIOS when the system reboots or powers up.
If the customer has flashed BMC firmware image, this function will not work until the
managed system is first rebooted or powered up.
The supported editable DMI items could vary from BIOS to BIOS. SUM will only show
supported items.
Syntax:
<DMI.txt> [--overwrite]
Example:
OOB:
DMI.txt --overwrite
In-Band:
There are two ways to edit DMI information for the managed system. You can either execute the
EditDmiInfo command or manually edit the received DMI.txt file.
Manually Editing
1. Follow the steps in 5.3.8 Getting DMI Information to get the DMI information text file (DMI.txt).
2. Replace the item values in the DMI.txt file with the desired values illustrated in 4.5 Format of DMI
Information Text File.
3. Remove the unchanged items in the text file. Note that this step is optional.
The EditDmiInfo command will only update (or add) the specified DMI item in the specified DMI.txt file.
When you edit from an empty file, a new file will be created. You can specify a DMI item using [--item_type,
--item_name] options or using --shn option with the item’s short name. The editable item type, item name
and item short name can be found in the DMI.txt file. To get a DMI.txt file, follow the steps in 5.3.8
Getting DMI Information.
Syntax:
<DMI.txt> --item_type <Item Type> --item_name <Item Name> --value <Item Value>
Example:
OOB:
In-Band:
1. Follow the steps in 5.3.9 Editing DMI Information to prepare the edited DMI.txt file for updating DMI
information.
2. Use the “ChangeDmiInfo” command with the edited DMI.txt file to run SUM to update the DMI
information.
Notes:
The supported editable DMI items may be changed for different BIOS versions. The
version variable of the DMI.txt file must be the same as that from the managed system
and should not be edited.
The uploaded information will only take effect after a system reboots or powers up.
X9DRL-3F/-iF MB does not support DMI related functions.
Syntax:
<DMI.txt> [--reboot]
Example:
OOB:
DMI.txt --reboot
In-Band:
Use the “SetBiosAction” command to execute SUM to show or hide the settings related to BBS priority.
Note: The uploaded configurations will take effect only after the system is rebooted or
powered up.
Syntax:
<yes/no> [--reboot]
Example:
OOB:
yes --reboot
In-Band:
Use the “SetBiosPassword” command to execute SUM to update BIOS Administrator password.
Syntax:
Example:
OOB:
reboot
In-Band:
123456 --reboot
cur_passwd.txt --reboot
passwd.txt:
BiosPassword
cur_passwd.txt
CurBiosPassword
The OA keys will be erased only after the system is rebooted or powered up.
OOB and multi-OOB usages are only available on X12/H12 and later platforms if BMC
support is also present.
Use the “EraseOAKey” command to execute SUM to erase the BIOS OA key.
Notes:
The OA keys will be erased only after the system is rebooted or powered up.
OOB and multi-OOB usages are only supported on X12/H12 and later platforms if BMC
supports.
Syntax:
Example:
OOB:
In-Band:
The “BiosRotManage” command supports the following features on RoT systems of X12 and later platforms:
Notes:
reboot]
OOB:
.....
Note: System will be powered off shortly to continue the process. Please wait
for thesystem to power on again, then check the Maintenance Event log for
results.
Warning: Please wait for the system to power on again. Do not remove AC power
..................................................
..................................................
..................................................
.............
.....
....................Done
GetInfo
Managed system...........169.254.3.254
On Seamless-supported platforms, BIOS firmware image format is a combination of many parts of capsule
block. With the Seamless Update feature, you can update only one or some parts of capsule block
seamlessly, without the complete updating process.
Notes:
Syntax:
post_complete]
Example:
OOB:
In-Band:
Updating a capsule file employs the same command as updating a full BIOS file. There are certain rules to
keep in mind while using this function:
1. There is anti-rollback mechanism to prevent users from downgrading capsule files based on the
package versions.
Syntax:
Example:
OOB:
CAPSULE_FILE.bin --showall
In-Band:
You can get capsule information using GetBiosInfo command with input capsule file. Besides, when
motherboard support Seamless Update (X13 or later platform), you can also get all the capsule blocks
information on managed system by using the --showall option. You can have some variation outputs
by:
1. Executing the GetBiosInfo command with the --file CAPSULE_FILE.bin --file_only options will show
capsule information of the local file.
2. Executing the GetBiosInfo command with the --file BIOS_FILE.bin --showall --file_only options will
show all the capsule information supported by the current local BIOS file.
Use the “GetBmcInfo” command to get the BMC firmware image information from the managed system as
well as the BMC firmware image.
Syntax:
Example:
OOB:
Supermicro_BMC.rom
In-Band:
The console output contains the following information when the local BMC image is non-RoT signed.
Managed system............localhost
BMC type..............X11_ATEN_AST2500_2
BMC version...........12.63.00
BMC type..............X11_ATEN_AST2500_2
BMC version...........12.63.00
FW image..............Signed
Signed Key........NonRoT
BMC UFFN..............BMC_X12AST2600-ROT-5201MS_20210317_01.00.00_STDsp.bin
BMC type..............X12_RoT_ATEN_AST2600
BMC version...........01.00.00
FW image..............Signed
Signed Key........RoT
extract_measurement
BMC UFFN.............BMC_X12AST2600-ROT-6202MS_20220624_01.02.33_STDsd.bin
BMC type.............X12_RoT_ATEN_AST2600_2
BMC version..........01.02.33
FW image.............Signed
Signed Key.......RoT
Measurement......CE772709B937E6F256A09B9CEDFB9F7F4195B19143543964FD00C90
0BD73F1F36743724B34392B06D4D1D5542CFA0619C32AF960B93A3973A4F2101762A8698D
Non-RoT signed key of a local BMC image displays the following information:
Type Description
Signed The key is signed by Super Micro Computer, Inc.
Signed(U) The key is NOT signed by Super Micro Computer, Inc., but by an unknown
authority.
Verification failed The signed information in the image cannot be verified, because the image is
corrupted or incomplete.
(Not shown) The “FW image” field is not shown because of no signed information in the
image.
RoT-signed key of a local BMC image displays the following information:
Type Description
Note: For the platforms after X11 Intel® Xeon® Scalable Processors with Intel® C620 Series
Chipsets, three-digit version numbers of BMC are supported.
Use the “UpdateBmc” command with BMC firmware image Supermicro_BMC.rom to run SUM to update
the managed system.
Notes:
Syntax:
forward] [--overwrite_ssl]
Example:
OOB:
Supermicro_BMC.rom
In-Band:
Supermicro_BMC.rom
Use the “GetBmcCfg” command to execute SUM to get the current BMC settings from the managed system
and save it in the BMCCfg.xml file.hey
Notes:
Received tables/elements might not be identical between two managed systems. Only
supported tables/elements for the managed system will be received.
For in-band and OOB usages, note that the file formats for getting BMC settings may be
different. Be careful not to misuse them.
SUM gets/changes syslog table in BMC configuration through HTTPS so that syslog
information in BMC conguration will be lost if HTTPS is disabled.
For OOB operation, if BMC supports the account lockout configuration, the <Account>
table will replace the <UserManagement> table.
Syntax:
<BMCCfg.xml> [--overwrite]
Example:
OOB:
BMCCfg.xml --overwrite
In-Band:
Use the “ChangeBmcCfg” command with the updated BMCCfg.xml file to run SUM to update the BMC
configuration.
Syntax:
<BMCCfg.xml>
Example:
OOB:
BMCCfg.xml
In-Band:
Notes: Pay attention to the following when modifying content inside the XML element
<LAN>.
The connection could be broken if the LAN configuration is changed.
For in-band operation, all data of the <Configurations> element inside the <LAN>
element is configurable.
For OOB operation, if Redfish is not supported, all configurations inside the <LAN>
element are read only.
For OOB operation, the configurations of the <DynamicIPv6> element and the
<StaticIPv6> element are read only.
For OOB operation, if BMC supports the account lockout configuration, the <Account>
table will replace the <UserManagement> table.
<Certification Action="Change">
<!--Supported Action:None/Change-->
<Information>
</Information>
<Configuration>
<CertFile>/home/test/cert.pem</CertFile>
<PrivKeyFile>/home/test/key.pem</PrivKeyFile>
</Configuration>
</Certification>
Use the “SetBmcPassword” command to execute SUM to update BMC user password.
Syntax:
Example:
OOB:
--pw_file passwd.txt
In-Band:
12345678
passwd.txt:
BmcPasswordString
Note: Without the option --user_id, the user ID is set to 2 (as Administrator) by default.
Use the “GetKcsPriv” command to execute SUM to get the current BMC KCS privilege level from the
managed system.
Syntax:
Example:
OOB:
In-Band:
Managed system................192.168.34.56
Use the “SetKcsPriv” command to execute SUM to set the BMC KCS privilege level.
Syntax:
Example:
OOB:
--priv_level 1
Notes:
• SUM only supports the following KCS privileges: Call Back, User, Operator and
Administrator.
This command only supports OOB usage.
The BMC KCS privilege can be set through a numberic ID or a name.
Since November 2019, Supermicro has implemented a new security feature for the BMC firmware stack on
all new X10, X11, X12 H11, H12, and all future generation Supermicro products. Supermicro will no longer
use the default password “ADMIN” for new devices or systems. All such systems are shipped with a
“Unique Pre-Programmed Password” for user admin on every hardware device with BMC.
For more information about the implementation of a BMC unique password and how to locate it, please
refer to the BMC Unique Password Guide.
Use the “LoadDefaultBmcCfg” command to execute SUM to reset the BMC of the managed system to the
factory default. Allowed option combinations depend on the managed system state. Unsupported option
combinations will be denied.
Syntax:
preserve_user_cfg
clear_user_cfg --load_unique_password
clear_user_cfg --load_default_password
OOB:
preserve_user_cfg
clear_user_cfg --load_unique_password
clear_user_cfg --load_default_password
In-Band:
[--reboot]
[--reboot]
Notes:
• The --load_unique_password option only supports systems installed with a BMC unique
password.
This command will not reset any network settings.
When the System Lockdown Mode is enabled on a managed system, neither setting configurations nor
updating firmware is not allowed in this mode. To learn about the managed system status, use the
“GetLockdownMode” command.
Syntax:
Example:
OOB:
Managed system................192.168.34.56
System Lockdown...........No
In-Band:
Managed system................localhost
System Lockdown...........No
Use the “SetLockdownMode” command to execute SUM to set the BMC system in Lockdown Mode.
Syntax:
<yes/no> --reboot
Example:
OOB:
The “BmcRotManage” command supports the following features on RoT systems of X12 and later
platforms:
BMC will be disconnected while updating the Golden image and recovering the
firmware. Use the “GetMaintenEventLog” command to check the result afterwards.
For details, see 5.5.3 Getting System Maintenance Event Log.
To execute the “Recover” and “DownloadEvidence” commands, the SFT-DCMS-SINGLE
license is required.
This command is only available for OOB and in-band usages restricted to the Redfish
host interface.
The “DownloadEvidence” action is only available after automatic or manual BMC
recovery.
The BMC evidence is a compressed gzip file.
Syntax:
Example:
OOB:
GetInfo
Managed system.....................192.168.34.56
BMC version....................09.10.19
.....
In-Band:
UpdateGolden
..........
Status: System is backing up current FW as golden image and BMC will be offline
for 6 minutes.
........................................
........................................
Done
Status: Please check Maintenance Event log for result.
Syntax:
Example:
OOB:
10
immediate
In-Band:
Note: This command is not available on X12 and H12 RoT platforms.
As a security mechanism, remote attestation provides a digital signature and allows users to manage
measurement files on managed systems as well as local measurement files with confidence. A
measurement file is a collection of states of the managed system, such as firmware version, firmware
measurement, configuration data and hardware information. When a measurement file generated by
managed system, a digital signature will be signed with the managed system’s Device Attestation Key. Use
the “Attestation” command to manage these files, six functions can be used with this command as follows:
• Comparing managed system or local measurement file with a referenced measurement file
Use the “--action Compare” option to compare managed system status or local measurement file with
a referenced measurement file.
o The action Compare requires --ref option, use the --ref option to specify the local referenced
measurement file, the action Compare will dump a latest measurement from managed system
and compare it with the local referenced measurement file.
o Use the --file option to specify a local measurement file, the action Compare will compare the
local measurement file with the local referenced measurement file, to check the local
measurement and the referenced measurement are not both tampered, action Compare will
still dump a latest measurement from managed system and check the certificate chain and
signature states for the measurement files.
o The --nonce option is also available with the Compare action, the nonce will be written into the
latest measurement from managed system. Without the --nonce input, SUM will use the current
OS time of the manage system as the default nonce.
Syntax:
Example:
OOB:
Dump
List
In-Band:
measurement.bin
Nonce................2022-04-12T11:20:25+08:00
Signature............Signed
Certificate Chain....Verified
Nonce................2022-04-12T11:20:25+08:00
Signature............Signed
Certificate Chain....Verified
Nonce................2022-04-12T11:20:25+08:00
Signature............Signed
Certificate Chain....Verified
Item: BMC_ACT_MEAS
Value: A30CFFC59284658300654B8CDD5144B7C8CCDF3540B52EAF98FE0B7A3A8A4BB1E7FEA
2D89FC9F7BB701B35C1DDD53B43E08751F483573DB75E9F3D5653B0871A
measurement.bin --showall
The console output contains the following format information to shows all items in the measurement file.
Item: <Item Name>
Type Description
Signed The measurement file signature is signed by the Device Attestation Key and
verified by the Device Attestation Public Key from the measurement file.
Verification failed The measurement file signature cannot be verified by the Device Attestation
Public Key from the measurement file.
The Certificate Chain of a local measurement file displays the following information:
Type Description
Verified The Device Identity Certificate Chain in a measurement file is verified back to
the Root CA. The Device Attestation Certificate is verified by the Device
Identity Certificate.
Verification failed The Device Identity Certificate Chain in a measurement file cannot be verified
back to the Root CA, or the Device Attestation Certificate cannot be verified by
the Device Identity Certificate.
Root Certificates of local measurement files display the following information:
Type Description
Matched The Root CA Certificate matches with the input certificate file.
Mismatched The Root CA Certificate does not match with the input certificate file.
Use the “GetEventLog” command to execute SUM to show the current system event log (including both
BIOS and BMC event log) from the managed system. With the --file option, the event log can be saved in
the EventLog.txt file.
Syntax:
<EventLog.txt>] [--overwrite]
Example:
OOB:
EventLog.txt --overwrite
In-band:
Use the “ClearEventLog” command to execute SUM to clear the event log (both BMC and BIOS event log) in
the managed system.
Notes:
Both BIOS and BMC event log in BMC will be cleared immediately.
BIOS event log in BIOS will be cleared only after system reboot.
Syntax:
Example:
OOB:
reboot
In-band:
reboot
Use the “GetMaintenEventLog” command to have SUM show the managed system’s current maintenance
event logs (including both BIOS and BMC maintenance event logs). Both --st and --et options are used to
show logs at the specified time. With the “--count” option, the GetMaintenEventLog command can show
the specified number of logs. With the “--file” option, the maintenance event log can be saved in a
MaintenEventLog.txt file.
Syntax:
st <start time> --et <end time>] [--count <log count>] [--file <
MaintenEventLog.txt> [--overwrite]]
Example:
OOB:
In-band:
Notes:
Syntax:
Example:
OOB:
In-band:
-file log.tgz
Use the “ClearMaintenEventLog” command to execute SUM to clear the maintenance event log in the
managed system.
Syntax:
Example:
OOB:
In-band:
Use the “GetCmmInfo” command to get the CMM firmware image information from the managed system
as well as the CMM firmware image.
Syntax:
<filename> [--file_only]]
Example:
Supermicro_CMM.rom
Managed system...........192.168.34.56
CMM type.............MicroCMM
CMM version..........09.01
CMM type.............MicroCMM
CMM version..........09.10
Blade ID: B6
==============
Node ID: 1
Board model..........BH12SSi
Status...............Normal
BMC IP...............10.146.175.59
BIOS version.........2.3a
BMC version..........75.00.06
Use the “UpdateCmm” command with the CMM firmware image Supermicro_CMM.rom to update the
managed system.
Notes:
Syntax:
Example:
Supermicro_CMM.rom
Use the “GetCmmCfg” command to execute SUM to get the current CMM settings from the managed
system and save them in the CMMCfg.xml file.
Notes:
Received tables/elements might not be identical between two managed systems. Only
tables/elements supported for the managed system will be received.
Configuration files in XML can be downloaded from CMM through the --download
option. The feature is supported by 64MB CMM AST2400 only. For details, please refer
to 5.14 Profile Update for a Single Blade System.
Syntax:
Example:
CmmCfg.xml –overwrite
<CmmCfg.xml>
Example:
CmmCfg.xml
--file CmmCfg.xml
Apply
Notes:
Use the “SetCmmPassword” command to execute SUM to update the CMM user password.
Syntax:
Example:
OOB:
--pw_file passwd.txt
In-Band:
12345678
passwd.txt:
CmmPasswordString
Note: Without the --user_id option, the user ID is set to 2 (as Administrator ) by default.
Use the “LoadDefaultCmmCfg” command to have SUM reset the CMM settings of the managed system to
the factory defaults. Allowed option combinations depend on the managed system state. The unsupported
options will be denied. For more detailed information of unique passwords, see 5.4.9 Loading Factory BMC
Settings.
--load_default_password
--load_unique_password
Syntax:
preserve_user_cfg
clear_user_cfg --load_unique_password
clear_user_cfg --load_default_password
OOB:
preserve_user_cfg
clear_user_cfg --load_unique_password
clear_user_cfg --load_default_password
• The --load_unique_password option only supports systems installed with a CMM unique
password.
This command will not reset any network settings.
Use the “GetBbpInfo” command to get the BBP firmware image and its information from the managed
system.
Syntax:
<filename> [--file_only]]
Example:
BBP.bin
Managed system...........172.30.143.96
BBP version..........01.08
Local BBP image file.....BBP_EC_2019-03-14_1901.47v1.08.bin
BBP version..........01.08
Use the “UpdateBbp” command with the BBP firmware image BBP.bin to update the BBP of managed
system.
Syntax:
<filename> [--skip_check]
Example:
OOB:
BBP.rom
Note: It is recommended that all system units be turned off by the CmmPowerStatus
command. If you need to update BBP while system units are powered on, please make sure
that enough power is being provided, and then use the --skip_check option to force BBP to
update. If the power is insufficient while updating BBP, the blade system may shut down.
Use the “GetBladePowerStatus” command to get the current power status of the blade system.
Syntax:
Example:
OOB:
------------|---------|----------
Blade A1 | Node 1 | On
Blade A2 | Node 1 | On
Blade A3 | Node 1 | On
Blade A4 | Node 1 | On
Blade A5 | Node 1 | On
Blade A6 | Node 1 | On
Blade A7 | Node 1 | On
Blade A8 | Node 1 | On
Blade A9 | Node 1 | On
SUM supports blade power status management. You can apply power action to the whole blade system, a
single blade, or a node through the specified option. For example, to apply power action to the whole
blade system, you only need to assign a power action. To apply a power action to the specified single blade
system, you must assign a power action and the --blade option with index. To apply power action to a
specified node of a blade system, you must assign a power action and the --blade and --node options with
index.
Syntax:
0 = down
1 = up
2 = cycle
3 = reset
5 = softshutdown
24 = accycle
Example:
OOB:
Use the “ProfileManage” command to manage the profile information on the managed system.
Syntax:
profile_description] [--schedule_update_time][-showall]
Example:
action Get
Managed system...........192.168.34.56
Profile ID: 1
==============
==============
Managed system...........10.146.161.179
Profile ID: 1
==============
Profile Association:
Profile ID: 2
==============
• To download the current CMM configuration file or CMM profile, please use the
GetCmmCfg command with the --download option. For details, please refer to 5.6.3
Getting CMM Settings.
• To upload the CMM configuration file, please use the ChangeCmmCfg command with
the --upload option. For details, please refer to 5.6.4 Updating CMM Settings (Single
System).
• To update the CMM configuration, please use the ChangeCmmCfg command with the --
update option. For details, please refer to 5.6.4 Updating CMM Settings (Single
System).
• To download the current system configuration file or system profile, please use the
GetSystemCfg command with the –download option. For details, please refer to 5.7.12
Getting System Settings.
• To upload the system configuration file, please use the ChangeSystemCfg command with
the --upload option. For details, please refer to 5.7.13 Updating System Settings.
Use the command “GetSwitchInfo” to receive the switch firmware image and its information from the
managed system.
Syntax:
Notes:
Example:
In-Band:
OOB:
dev_id A1,A2
Supermicro_Switch.bin
Managed system...........192.168.34.56
[Switch A1]
==============
Switch IP............192.168.34.100
Switch type..........25G Pass-thru Module
Module name..........SBM-25G-P10 (P1)
Switch version.......1.0.0.21
Power Status.........On
Status...............Normal
[Switch A2]
==============
Switch IP............192.168.34.101
Switch type..........25G Pass-thru Module
Module name..........SBM-25G-P10 (P1)
Switch version.......1.0.0.8
Power Status.........On
Status...............Normal
[Switch B1]
==============
Switch IP............192.168.34.102
Switch type..........25G Pass-thru Module
Module name..........SBM-25G-P10 (P1)
Switch version.......1.0.0.21
Power Status.........On
Status...............Normal
[Switch B2]
==============
Switch IP............192.168.34.103
Switch type..........25G Pass-thru Module
Use the “UpdateSwitch” command with the switch firmware image Supermicro_Switch.bin to update the
managed switch.
Notes:
Syntax:
Example:
Supermicro_Switch.bin --reboot
Notes:
Syntax:
RebootSwitch
Example:
Use the “MountIsoImage” command to mount an ISO image as a virtual media to the managed system
through SAMBA/HTTP/HTTPS server. Since SUM 2.5.0, SUM has a new rule of using new special charaters
for virtual media. For more details, see the tables below.
https://<hostname or IP>
Syntax:
image_url <URL> [[--id <id for URL> --pw <password for URL>] | [--id <id for
Example:
OOB:
smbpasswd
smbpasswd
smbpasswd
--pw_file smbpasswd.txt
pw smbpasswd
--pw_file smbpasswd.txt
smbpasswd.txt
smbpasswd.txt
smbpasswd.txt:
smbpasswd
In-band:
smbpasswd
smbpasswd
smbpasswd
smbpasswd.txt
smbpasswd.txt
smbpasswd.txt:
smbpasswd
Use the “UnmountIsoImage” command to remove ISO image as a virtual media from the managed system.
Syntax:
Example:
OOB:
In-Band:
Use the “MountFloppyImage” command to have SUM mount a binary floppy image to the managed system
virtually.
Syntax:
--file <filename>
Example:
OOB:
file Floppy.img
In-band:
.................
Use the “UnmountFloppyImage” command to execute SUM to virtually remove a binary floppy image from
the managed system .
Syntax:
Example:
OOB:
In-band:
Use the “RawCommand” command to send an IPMI raw command to the target system
Syntax:
sum [-i <IP or host name> -u <username> -p <password>] -c RawCommand --raw <raw
command>
Example:
OOB:
01'
'0x06 0x01'
In-band:
00
20 01 09 95 02 BF 7C 2A 00 7A 09 00 10 00 00
In order to prevent security data from being leaked and unauthorized operations through USB ports, since
X12, SUM has supported inband USB port accessibility control for front and rear panels. Currently, SUM
does not support USB port accessibility control for AMD platforms. Front panel means the USB ports are
connected to a 19-pin USB header on motherboard and usually is accessible in front of a system. In
constrast, rear panel means the built-in USB ports on motherboard and usually is accessible in the rear of a
system. For formal USB port position definition, please refer to “PLD” (Physical Location of Device) in ACPI
specifiation. USB port accessibility can be configured by BIOS configuration during POST. BIOS settings
“Front USB Port(s) ” and “Rear USB Port(s)” are for front and rear panels, respectively.
Enabled: A USB port is statically enabled or disabled by BIOS during POST, and it can’t be dynamically
enabled or disabled in the running operating system.
Disabled: A USB port is statically enabled or disabled by BIOS during POST.
Enabled (Dynamically): A USB port access mode can be dynamically switched and taken effect
immediately in the running operating system.
The USB port accessibility in the running operating system can be accessed by running the command
“GetUsbAccessMode” (see 5.7.7 Getting USB Port Access Mode (Inband only) ), or switched by running the
command “SetUsbAccessMode” (see 5.7.8 Dynamic Control USB Port Access Mode (Inband only)). The
mapping releatationship between BIOS setting options and access mode(s) in the running operating system
are summarized in the following table.
BIOS Setting Options for USB Ports Access Mode(s) in the Running Dynamic Control in the
Operating System Running Operating System
Enabled Statically enabled No
Use the inband command “GetUsbAccessMode” command to get USB access mode in the running
operating system. Currently, SUM supports for dynamically disabling/enabling both front and rear panel
USB ports. There are four USB port access modes:
Syntax:
sum -c GetUsbAccessMode
Example:
In-Band:
Only when “Front USB Port(s)” or “Rear USB Port(s)” is set to “Enabled (Dynamic)” in the BIOS
configurations is the command “SetUsbAccessMode” allowed to dynamically enable/disable the USB port
access mode.
Syntax:
Example:
In-Band:
Note: For some systems, a plugged-in USB 3.0 device cannot be used after the port is
dynamically disabled and enabled again. When the device cannot be used after the port is
dynamically enabled, SUM will output a message “USB 3.0 device may need to be manually
unplugged and plugged for use” to bring this to the user’s attention.
The UID is a unit identifier button for easy system location in large stack configurations. Use the
“LocateServerUid” command to control the UID. When the UID is enabled, the blue LED on both the front
and rear of the chassis will be illuminated.
1 = GetStatus
2 = On
3 = Off
Syntax:
action <action>
Example:
OOB:
action 3
In-Band:
Managed system................localhost
UID status................Off
Use the “SetHttpBoot” command to download an ISO image from the HTTP server and boot into the ISO
image.
Syntax:
boot_clean [--reboot]
Example:
OOB:
reboot
https://[1234:ab5:0:c678:9012:345d:6e78:9f0a]/iso/efishell.iso --reboot
boot_clean --reboot
In-band:
http://192.168.12.78/iso/efishell.iso --reboot
TLS.crt --image_url
https://[1234:ab5:0:c678:9012:345d:6e78:9f0a]/iso/efishell.iso --reboot
Notes:
HTTPS boot needs to provide the clients with a valid TLS certificate signed by a trusted
Certificatio Authority.
Due to BIOS limitations, if an HTTP boot option exists in the BIOS configuration, please
use the --boot_clean option to clean the HTTP boot option and then reset HTTP the
boot option.
When you execute the SetHttpBoot command on the FreeBSD 12 system, you may
boot into FreeBSD instead of efishell.iso because of startup.nsh in the system. To
prevent from it, you can delete startup.nsh or rename the startup.nsh file.
Use the “KmsManage” command to change the KMS server configurations, upload TLS certificates and test
the connection to the KMS server. The command only works on the X12/H12 and later platforms. Since
SUM 2.9.0, users can save and configure the specific OEM functions for KMS features by using the [--file]
option.
Syntax:
filename>]] [options…]
Example:
OOB:
DeleteAll --reboot
GetInfo
In-band:
Managed system.....................192.168.34.56
KMS TimeZone...................GMT+0
Client Password................******
CA Certificate.................Uploaded
Client Certifcate..............Uploaded
Notes:
To establish a TLS connection and enable the KMS service, it is required to provide the
KMS server with the valid TLS certificates and private key. Please use the “--ca_cert”, “-
-client_cert” and “--pvt_key” options or use the “ChangeBiosCfg” command to upload
the required files. For details, see E.5.1 File Upload.
The “--action Probe” option is used to test the connection to the KMS server, and
requires a system reboot. Wait for the system POST to complete after reboot, and then
use the “--action GetInfo” option to check the probe status. See the “KMS Server Probe
Status” in the console output example above.
Use the “GetSystemCfg” command to execute SUM to get the current system settings from the managed
system and save them in the SystemCfg.xml file. System settings include BIOS settings and BMC settings.
Notes:
The tables/elements from the managed systems might not be identical. Only
tables/elements supported by the managed systems will be acessed.
An configuration file in XML can be downloaded from CMM through the --download
option. The feature is only supported by 64MB CMM AST2400.
For details on profile update, please refer to 5.14 Profile Update for a Single Blade
System.
Syntax:
Example:
SystemCfg.xml --overwrite
update Apply|Deploy --dev_id <Device ID> --file_id <file ID> --reboot] | [--
Example:
file SystemCfg.xml
--file SystemCfg.xml
Notes:
Syntax:
RedfishApi --api <api path> [-v] [--request <http method>] [--file <file name>
Example:
OOB:
/redfish/v1/TaskService
response.txt --overwrite
In-Band:
/redfish/v1/TaskService
response.txt --overwrite
Syntax:
sum -I Remote_INB --oi <OS ip or host name> --ou <OS username> [--op <OS
password> | -os_key <OS private key> -os_key_pw <OS private key password>] -c
Example:
Remote In-Band:
Notes:
The file will be copied to the path "/tmp/" in remote Linux systems.
The stderr in the remote Linux system will be redirected to stdout.
For use with approved third party tools, please refer to Appendix K. Using SUM to Run
3rd -Party Tools.
Use the “GetRaidControllerInfo” command to get the RAID firmware image information from the managed
system or the RAID firmware image.
Syntax:
Example:
OOB:
--file RAID.rom
In-band:
Serial................................ N/A
Package............................... 24.18.0-0021
Package............................... 24.21.0-0028
In-band:
Package............................... 24.21.0-0028
Notes:
• For X11 platforms, the “GetRaidControllerInfo” command only supports Broadcom 3108.
• For X12 and later platforms, the “GetRaidControllerInfo” command only supports
Broadcom 3008, 3108, 3908, 3916, and Marvell SE9230.
Use the command UpdateRaidController with RAID firmware image RAID.rom to update the managed
system.
Notes:
• For X11 platforms, the “UpdateRaidController” command only supports Broadcom 3108.
• For X12 and later platforms, the “UpdateRaidController” command only supports
Broadcom 3108, 3908, 3916, and Marvell SE9230.
• Broadom 3108 is supported by the following firmware images:
o RAID firmware image of version 4.650.00-8095 and later.
o For X10 Intel® Xeon® Processor E5 v3/v4 Product Family platform, BMC firmware
images of version REDFISH 3.52 and later.
o For X11 Intel® Xeon® Processor E3-1200 v5 Product Family platform, BMC
firmware images of version ATEN X11 1.33 and later.
o For X11 Intel® Xeon® Scalable Processors with Intel® C620 Series Chipsets
platform, BMC firmware images of version ATEN X11DP 1.10 and later.
o Supported on X12 and later platforms.
Syntax:
Example:
OOB:
In-band:
Use the “GetRaidCfg” command to execute SUM to get the current RAID settings from the managed system
and save it in the RAIDCfg.xml file.
Notes:
The received tables/elements between the two managed systems might not be
identical. Only the supported tables/elements for the managed system will be received.
The SUM cannot get or change the RAID configurations of JBOD mode setting under the
Controller Properties in an in-band enviroment.
Syntax:
<RAIDCfg.xml> [--overwrite]
Example:
OOB:
RAIDCfg.xml --overwrite
In-band:
Syntax:
<RAIDCfg.xml>
Example:
OOB:
RAIDCfg.xml
In-band:
Use the “GetSataInfo” command to get the current SATA HDD information under on-board AHCI controller
from the managed system.
Syntax:
Example:
====================
[HDD(0)]
Slot ID: 0
Use the “GetNvmeInfo” command to get the current NVMe information from the managed system.
Syntax:
<device_id> ]
Example:
Use the “SecureEraseDisk” command to have SUM securely erase an HDD on the managed system. After a
secure erase is complete, the HDD is formatted and its password is cleared. An HDD without a password
installed can be securely erased directly without a password or PSID. It is recommended that an HDD
password should be immediately installed after the HDD is securely erased. The “SecureEraseDisk”
command can be used to install the HDD password if no passwords are installed on the HDD.
Currently, SUM supports the secure-erase feature in three security modes: TCG, SAT3 and Not TCG/SAT3
Supported. The supported actions of SecureEraseDisk command are shown in the following table.
PSID.txt: serial number;PSID. Note that a PSID can be found on the sticker of a TCG device.
Password.txt: serial number; password; new_password. Note that the “new_password” is required
for the action ChangePassword. This field is optional for other actions.
SUM maps the PSID and password to the target HDD on the managed system automatically based on serial
numbers. The following is an example of PSID.txt and Password.txt:
Password.txt
9XF4AF7M; 123456; 111111
The SecureEraseDisk command has two execution modes: Action Mode and Pre-check Mode
Action Mode: Action mode supports the following actions, requiring the managed system to be
reboot for changes to take effect.
○ SetPassword: Sets an HDD password.
○ ChangePassword: Changes the HDD password
○ ClearPassword: Clears the HDD password
○ SecurityErase: Securely erases the HDD with no password installed.
○ SecurityErasePWD: Securely erases the HDD with the installed HDD password.
○ SecurityErasePSID: Securely erases the HDD with a PSID.
Pre-check Mode shows the information below.
○ HDD Password Status: Shows if a password is installed on the HDD.
○ Security Mode: Shows the security mode that HDD supports and indicates supported actions by
the device.
○ TCG Device Type: Shows the device type for the TCG supported HDD.
○ Applicable Actions: Shows the actions which can be executed on the HDD.
○ Estimated Execution Time for Secure Erase: Shows the estimated execution time for securely
erasing one or more HDDs on the managed system.
○ No Matched HDDs: This type of information is recorded in a text file named PreCheckFile. No
matched HDDs could be a result of failed matches between HDDs in the serial number mapping
file and the managed system.
1. Run the command to check the HDD supported actions and get the erase time. The file “PreCheckfile”
will be created, whichincludes all unmapped hard disks. Note that the PSID.txt is only supported by
TGC devices.
./sum -i IP -u ADMIN -p PASSWORD -c SecureEraseDisk --file PSID.txt --
precheck
precheck
Managed system............192.168.34.56
[HDD]
Applicable Action..............SetPassword
..............SecurityErase
[HDD]
Serial Number..................W472TJXH
Applicable Action..............SetPassword
..............SecurityErase
2. Run the command based on the precheck result to securely erase an HDD. The action SecurityErase
can accept both PSID.txt and Password.txt as an input file.
Supermicro Update Manager User’s Guide 265
./sum -i IP -u ADMIN -p PASSWORD -c SecureEraseDisk --file PSID.txt --action
SecurityErasePSID --reboot
After the task is complete, use the SUM GetCurrentBiosCfg command to check the result through
BIOS configurations. Find the status code in the configuration file in xml format by “Last Status Code.”
A status code of zero indicates the previous task was successful.
For details on the “GetCurrentBiosCfg” command, see 5.3.3 Getting Current BIOS Settings.
5.8.7.3 Setting a HDD Password
1. Run the command to check the HDD supported actions. Note that another password cannot be
assigned to an HDD with a password already installed. The file “PreCheckfile” will be created, which
includes all unmapped HDDs.
./sum -i IP -u ADMIN -p PASSWORD -c SecureEraseDisk --file Password.txt --
precheck
Managed system............192.168.34.56
[HDD]
Applicable Action..............SetPassword
..............SecurityErase
[HDD]
Serial Number..................W472TJXH
Applicable Action..............SetPassword
..............SecurityErase
4. After the task is complete, to check the execution result, run the SUM GetCurrentBiosCfg command
(see 5.3.3 Getting Current BIOS Settings), and then type Text = “Last Status Code” to find the status
code in the BIOS configurations.
A status code of zero indicates the previous task was successfull. For non-zero status codes, please
refer to Appendix D - Status Codes in UEFI Specification 2.8.
Syntax:
Example:
OOB:
In-Band:
The console output for --precheck option contains the following information.
Managed system............192.168.34.56
[HDD]
Serial Number ..................S45RNE0M600194
Password Status ................NOT INSTALLED
Security Mode ..................SAT3 Supported
Applicable Action..............SetPassword
..............SecurityErase
[HDD]
Serial Number..................W472TJXH
Password Status................INSTALLED
Security Mode..................TCG Supported
TCG Device Type................TCG-Enterprise
Applicable Action..............SecurityErasePWD
..............SecurityErasePSID
..............ChangePassword
..............ClearPassword
Estimated security erase time......33 Minutes
Please check PreCheckFile for the mismatched HDDs.
Use the “SecureEraseRaidHdd” command to execute SUM to securely erase hard disks (HDD or SSD) in the
target LSI MegaRaid SAS 3108 RAID controller system and poll the erasing status asynchronously or
synchronously.
Syntax:
To securely erase HDDs in the LSI MegaRaid SAS 3108 RAID controller system, follow these steps .
1. Execute the “GetRaidCfg” command to confirm the JBOD mode of the LSI MegaRaid SAS 3108 RAID
controller system is in “Disabled” state, and the disks to be erased in the LSI MegaRaid SAS 3108 RAID
controller system are in “Unconfigured good drive” state. After checking, you can decide your target
physical disk ID(s) based on the configuration in the LSI MegaRaid SAS 3108 RAID controller system.
2. Follow the rule below to erase your target physical disk(s) listed in the LSI MegaRaid SAS 3108 RAID
controller system.
Syntax:
Example:
Warning: Please make sure the F/W State of each disk is in "Unconfigured good
drive" state.
Otherwise, please
Or
[ 0: 0: 2] : Configured-drive is online
[ 0: 0: 3] : Configured-drive is online
********************************<<<<<ERROR>>>>>*********************************
ExitCode = 153
Description = IPMI execution on non-supported device
Program Error Code = 440.21
********************************************************************************
SUM will check the firmware state of each target disk first. If the status is not “Unconfigured good drive,”
the execution will stop. After double-checking the target disks’ firmware state and running the same
command again, the output will list results of all target disks with their task IDs and messages. There are
three types of result messages for different HW/SW situations. The result levels are from good to bad and
marked in blue, orange, and red colors.
Situation
Result LSI
Messages Secure MegaRaid
Erase SAS 3108 Configured Target Disk Firmware State
of Secure BMC Error Response
Erase Already RAID as VD
Started Controller
JBOD Mode
“Start
polling NO Disabled NO NO Unconfigured good drive
progress.”
“Already
started
YES Disabled NO NO Unconfigured good drive
polling
progress.”
“Action NO Disabled NO YES Unconfigured good drive
not Drive is exposed and
allowed. NO Enabled NO NO
controlled by a host.
Please
check the
controller The configured drive is
NO Disabled YES NO
or disk online.
status.”
You can also poll the erasing status right after issuing the command by appending --sync option after the
command “SecureEraseRaidHdd”.
Example:
Note: For Windows, the argument value can be put into either double quotation marks or
not, .e.g., --enc_id “ALL” or --enc_id ALL.
Warning: Please make sure the F/W State of each disk is in "Unconfigured good
drive".
Otherwise, please
Or
................................
[--dev_id:--enc_id:--dsk_id:--tsk_id] : MESSAGE
1 | 0 | 0 | 0 | 72% | Running |
2 | 0 | 0 | 1 | 73% | Running |
4 | 0 | 0 | 3 | 4% | Running |
5 | 0 | 1 | 0 | 4% | Running |
6 | 0 | 1 | 1 | 4% | Running |
Polling progress...
3. Excute the “SecureEraseRaidHdd” command with the --tsk_id option below to check the erasing
status of target disk(s) in the LSI MegaRaid SAS 3108 RAID system.
Syntax:
Example:
1 | 0 | 0 | 0 | 74% | Running |
2 | 0 | 0 | 1 | 75% | Running |
3 | 0 | 0 | 2 | 8% | Running |
5 | 0 | 1 | 0 | 7% | Running |
6 | 0 | 1 | 1 | 7% | Running |
Polling progress...
If the task status becomes “Completed,” the start and elapsed time of task will appear on the console
output.
Example:
Use the ”GetPMemInfo” command to get the PMem firmware image information from the managed
system as well as the local PMem firmware image (with the --file option).
Syntax:
Example:
OOB:
Managed system................192.168.34.56
PMem version..............2.2.0.1464
In-Band:
PMem.bin
Managed system................169.254.3.254
PMem version..............2.2.0.1464
Local PMem image file.........PMem.bin
PMem version..............2.2.0.1469
This command is available on X12 3rd Gen Intel® Xeon® Scalable processors with Intel®
C621A Series Chipsets and later platforms.
The PMem firmware version retrieved from the “GetPMemInfo” command is the
running PMem firmware version.
For more detailed usages of PMem, please contact the technical support of
Supermicro.
Use the “UpdatePMem” command with the PMem firmware image PMem.bin to run SUM to update the
PMem of managed system.
Syntax:
Example:
OOB:
PMem.bin --reboot
In-Band:
PMem.bin --reboot
Notes:
This command is available on the X12 3rd Gen Intel® Xeon® Scalable processors with
Intel® C621A Series Chipsets and later platforms.
For more detailed usages of PMem, please contact the technical support of
Supermicro.
Use the “GetVROCCfg” command to execute SUM to get the current VROC settings from the managed
system and save it in the VROC.cfg.xml file.
Notes:
The received tables/elements between the two managed systems might not be
identical. Only the supported tables/elements for the managed system will be received.
“NVME Mode Switch” in BIOS setting needs to set to “VMD” in order to use
“GetVROCCfg” command.
Target system needs to boot into OS in order to use VROC related commands.
VROC related commands been tested on Red Hat Enterprise Linux 8.1.
Syntax:
Example:
OOB:
VROC.cfg.xml --overwrite
In-band:
VROC.cfg.xml --overwrite
Syntax:
Example:
OOB:
VROC.cfg.xml
In-band:
[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p PASSWORD -c ChangeVROCCfg --file
VROC.cfg.xml
Use the “GetAocNICInfo” command to get the add-on NIC firmware information from the managed system
as well as the add-on NIC local firmware image (with the --file option).
Syntax:
Example:
OOB:
AOC_NIC.bin
In-Band:
In-Band:
Use the “UpdateAocNIC” command with add-on NIC firmware image AOC_NIC.bin to update the managed
system.
Syntax:
UpdateAocNIC --file <filename> --dev_id <add-on NIC device ID> --reboot [--
post_complete]
Example:
OOB:
In-band:
Notes:
Use the “GetPsuInfo” command to get the current PSU information from the managed system.
Syntax:
Example:
OOB:
In-Band:
Use the “UpdatePsu” command with a signed PSU firmware image requested by OEM and the PSU slave
address to run SUM to update the managed system.
Syntax:
Example:
OOB:
In-Band:
Notes:
During PSU firmware updating process, the updated PSU will be powered off. To use
this command, the system needs to connect to at least two PSUs.
Slave address of the PSU that needs to be updated can be found by executing the
“GetPsuInfo” command.
The updated PSU will be rebooted automatically when firmware update completes.
PSU updated on the system with LCMC is only supported on X11 Intel® Xeon® Scalable
Processors with Intel® C620 Series Chipsets and later platforms.
Use the “GetPowerStatus” command to get the current power status of the managed system.
Syntax:
Example:
OOB:
Managed system................192.168.34.56
Power status..............On
In-Band:
Managed system................localhost
Power status..............On
Use the “SetPowerAction” command to set the type of power action of the managed system.
Syntax:
Example:
OOB:
action up
action 0
In-Band:
For X11 Intel® Xeon® Scalable Processors with Intel® C620 Series Chipsets and later platforms, through OTA
TPM technologies, the “GetTpmInfo” and “TpmManage” commands can be executed to receive TPM
information and manage TPM, respectively. Since SUM 2.2.0, SUM has two implementations for OTA TPM
management: Intel OTA and Supermicro OTA. Depending on product design, either solution is
implemented for the managed system. Supported OTA solution can be obtained on the output of the
“GetTpmInfo” command. For more detailed information, please contact technical support.
The detailed information of TPM features are listed in the tables below.
HW & FW Compatibility
Without BMC With BMC
TpmProvision No Yes No
GetTpmInfo (Supermicro OTA) No No Yes
GetTpmInfo (Intel OTA) No No Yes
TpmManage (Supermicro OTA) No No Yes
TpmManage (Intel OTA) No No Yes
On X11 Intel® Xeon® Scalable Processors with Intel® C620 Series Chipsets and later platforms, use the
“GetTpmInfo” command to get the TPM module information from the managed system.
Syntax:
Example:
OOB:
In-Band:
The console output contains the following information when installing the TPM 1.2 module.
TPM Information
================
TPM Ownership: No
executed with the option “--showall”. Only the Supermicro OTA solution supports
===================================
Tag: 0x0018
NV index: 0x50000001
ReadSizeOfSelect: 0x0003
ReadPCRSelect[0]: 0x00
ReadPCRSelect[1]: 0x00
ReadPCRSelect[2]: 0x00
ReadLocalityAtRelease: 0x1F
ReadDigestAtRelease:
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00
WriteSizeOfSelect: 0x0003
WritePCRSelect[0]: 0x00
WritePCRSelect[1]: 0x00
WritePCRSelect[2]: 0x00
WriteLocalityAtRelease: 0x1F
WriteDigestAtRelease:
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00
Attributes: 0x00002000
bReadSTClear: 0x00
bWriteSTClear: 0x00
bWriteSDefine: 0x01
LCP Policy:
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 20 32 63
66 33 65 39 E1 00 00 00 00 00 00 00 10 0E 39 02
00 00 00 00 88 78
===================================
Tag: 0x0018
NV index: 0x50000003
ReadSizeOfSelect: 0x0003
ReadPCRSelect[0]: 0x00
ReadPCRSelect[1]: 0x00
ReadPCRSelect[2]: 0x00
ReadLocalityAtRelease: 0x1F
ReadDigestAtRelease:
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00
WriteSizeOfSelect: 0x0003
WritePCRSelect[0]: 0x00
WritePCRSelect[1]: 0x00
WritePCRSelect[2]: 0x00
WriteLocalityAtRelease: 0x18
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00
Tag1: 0x0017
Attributes: 0x00000000
bReadSTClear: 0x00
bWriteSTClear: 0x00
bWriteSDefine: 0x00
LCP Policy:
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
===================================
Tag: 0x0018
NV index: 0x50010000
ReadSizeOfSelect: 0x0003
ReadPCRSelect[0]: 0x00
ReadPCRSelect[1]: 0x00
ReadPCRSelect[2]: 0x00
ReadLocalityAtRelease: 0x1F
ReadDigestAtRelease:
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00
WritePCRSelect[0]: 0x00
WritePCRSelect[1]: 0x00
WritePCRSelect[2]: 0x00
WriteLocalityAtRelease: 0x1F
WriteDigestAtRelease:
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00
Tag1: 0x0017
Attributes: 0x00000001
bReadSTClear: 0x00
bWriteSTClear: 0x00
bWriteSDefine: 0x00
LCP Policy:
00 00 00 00 00 00 00 00 00 00
========================
[Volatile Flags]
deactivated: 0
disableForceClear: 0
physicalPresence: 0
physicalPresenceLock: 1
bGlobalLock: 0
[Permanent Flags]
disable: 0
ownership: 1
deactivated: 0
readPubEK: 1
allowMaintenance: 0
physicalPresenceLifetimeLock: 0
physicalPresenceHWEnable: 0
physicalPresenceCMDEnable: 1
FIPS: 0
enableRevokeEK: 0
nvLocked: 1
tpmEstablished: 0
The console output contains the following information when installing the TPM 2.0 module.
TPM Information
================
TPM Ownership: No
==========================
NvIndex: 0x01C10103
NameAlg: SHA256
Attributes: 0x62040408
PPWrite: 0
OWNERWrite: 0
AuthWrite: 0
PolicyWrite: 1
Counter: 0
Bits: 0
Extend: 0
PolicyDelete: 1
WriteLocked: 0
WriteAll: 0
WriteDefine: 0
WriteStClear: 0
GlobalLock: 0
PPRead: 0
OwnerRead: 0
AuthRead: 1
PolicyRead: 0
NoDA: 1
Orderly: 0
ClearStClear: 0
ReadLocked: 0
Written: 1
PlatformCreate: 1
ReadStClear: 0
AuthPolicy Digest:
C0 01 C8 00 02 10 D0 FA A4 F4 F4 F8 A7 8E F4 F8
26 4E 6F 85 55 34 0D 2F 04 18 0F 8C F1 10 FF DD
Name:
00 0B 40 7B A7 8D 90 B7 CF 3A A5 3C 0B 83 6D AE
A7 2A E6 B5 67 15 32 BD 4E EF E4 04 E3 7E A4 EB
B0 19
LCP Policy:
00 03 0B 00 01 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 02 00 00 00 00 00 C8 00 08 30
00 00 08 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00
===========================
NvIndex: 0x01C10102
NameAlg: SHA256
Attributes: 0x62044408
PPWrite: 0
OWNERWrite: 0
AuthWrite: 0
PolicyWrite: 1
Counter: 0
Bits: 0
Extend: 0
WriteLocked: 0
WriteAll: 0
WriteDefine: 0
WriteStClear: 1
GlobalLock: 0
PPRead: 0
OwnerRead: 0
AuthRead: 1
PolicyRead: 0
NoDA: 1
Orderly: 0
ClearStClear: 0
ReadLocked: 0
Written: 1
PolicyRead: 0
PlatformCreate: 1
ReadStClear: 0
AuthPolicy Digest:
EF 9A 26 FC 22 D1 AE 8C EC FF 59 E9 48 1A C1 EC
53 3D BE 22 8B EC 6D 17 93 0F 4C B2 CC 5B 97 24
Name:
00 0B 87 7A 0A B0 02 23 4B C3 A3 61 5C 81 9A BF
20 C3 0A 5F 2A F9 3F B6 DC 13 F3 B9 B0 59 90 F4
5A FB
LCP Policy:
00 00 00 00 11 09 17 20 07 B0 00 00 00 02 00 00
00 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00
CA D5 6B 67 FD 9A 84 36 B6 69 0B 50 8F 34 95 94
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00
===========================
NvIndex: 0x01C10104
NameAlg: SHA256
Attributes: 0x62040404
PPWrite: 0
OWNERWrite: 0
AuthWrite: 1
PolicyWrite: 0
Counter: 0
Bits: 0
Extend: 0
PolicyDelete: 1
WriteLocked: 0
WriteAll: 0
WriteDefine: 0
WriteStClear: 0
GlobalLock: 0
PPRead: 0
OwnerRead: 0
AuthRead: 1
PolicyRead: 0
NoDA: 1
Orderly: 0
ClearStClear: 0
Written: 1
PolicyRead: 0
PlatformCreate: 1
ReadStClear: 0
AuthPolicy Digest:
B7 5C E1 94 6F 78 DF 8B AA 42 69 18 DB 09 31 80
17 E6 B3 8D 04 8C 95 4E 05 C2 C4 F3 4B D4 40 60
Name:
00 0B 3E CE D2 44 B7 B3 E8 33 3D A2 A8 C5 5E 9A
40 22 02 E1 C4 45 E8 D3 5D EE 0F C5 EE 17 8A 05
54 53
LCP Policy:
01 00 00 00 00 00 00 00
===========================
NvIndex: 0x01C10105
NameAlg: SHA256
Attributes: 0x42040409
PPWrite: 1
OWNERWrite: 0
AuthWrite: 0
PolicyWrite: 1
Counter: 0
Bits: 0
Extend: 0
PolicyDelete: 1
WriteLocked: 0
WriteDefine: 0
WriteStClear: 0
GlobalLock: 0
PPRead: 0
OwnerRead: 0
AuthRead: 1
PolicyRead: 0
NoDA: 1
Orderly: 0
ClearStClear: 0
ReadLocked: 0
Written: 0
PolicyRead: 0
PlatformCreate: 1
ReadStClear: 0
AuthPolicy Digest:
B7 5C E1 94 6F 78 DF 8B AA 42 69 18 DB 09 31 80
17 E6 B3 8D 04 8C 95 4E 05 C2 C4 F3 4B D4 40 60
Name:
00 0B 5B 53 B9 80 E7 36 D4 C3 3B 85 A6 A2 BB 7A
A5 F6 D3 10 1C EB D3 17 7D 69 8E D1 84 51 02 E2
D0 1B
==========================
NvIndex: 0x01C10106
NameAlg: SHA256
Attributes: 0x2204000A
OWNERWrite: 1
AuthWrite: 0
PolicyWrite: 1
Counter: 0
Bits: 0
Extend: 0
PolicyDelete: 0
WriteLocked: 0
WriteAll: 0
WriteDefine: 0
WriteStClear: 0
GlobalLock: 0
PPRead: 0
OwnerRead: 0
AuthRead: 1
PolicyRead: 0
NoDA: 1
Orderly: 0
ClearStClear: 0
ReadLocked: 0
Written: 1
PolicyRead: 0
PlatformCreate: 0
ReadStClear: 0
AuthPolicy Digest:
22 03 0B 7E 0B B1 F9 D5 06 57 57 1E E2 F7 FC E1
EB 91 99 0C 8B 8A E9 77 FC B3 F1 58 B0 3E BA 96
Name:
00 0B 8D D1 B6 DE A2 9D 5B 82 D7 1B 04 84 83 D6
7C 19
LCP Policy:
00 03 0B 00 01 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 02 00 00 00 00 00 C8 00 08 30
00 00 08 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00
Notes:
This command is supported on X11 Intel® Xeon® Scalable Processors with Intel® C620
Series Chipsets or later platforms.
The field “TPM Locked” in “TPM Information” section is only for TPM 1.2.
The “Capability Flags”section is only for TPM 1.2.
The --showall option is optional for the GetTpmInfo command.
The “PS NV INDEX LCP Definition,” “AUX NV INDEX LCP Definition,” “PPI NV INDEX LCP
Definition” and “Capability Flags” sections will be displayed when the option
--showall is assigned.
This command will query TPM module information through Intel OTA or Supermicro
OTA.
On X11 Intel® Xeon® Scalable Processors with Intel® C620 Series Chipsets and later platforms, Use the
“TpmManage” command to execute SUM to enable TPM module capabilities for the managed system.
Before executing the command, the TPM module should be installed on the managed system.
Syntax:
[options…]
OOB:
--table_default --reboot
In-Band:
Notes:
This command is supported on X11 Intel® Xeon® Scalable Processors with Intel® C620
Series Chipsets or later platforms.
The system may be rebooted several times during provisioning.
Please execute the GetTpmInfo command to obtain OTA supported type before doing
TPM provision.
The TPM module will have been locked when the provisioning procedure is completed.
Executing the TpmManage command with the --table_default option will execute TPM
On platforms before X11 Intel® Xeon® Scalable Processors with Intel® C620 Series Chipsets, use the
“TpmProvision” command to execute SUM to enable TPM module capabilities for the managed system.
Before executing the command, the TPM module should be installed on the managed system.
Syntax:
<URL> --reboot --lock <yes> [[--id <id for URL> --pw <password for URL>] | [--
Example:
smbpasswd
Notes:
The TpmProvision command is supported from the X10 Intel® Xeon® Processor E5 v3/v4
Product Family to the X11 Intel® Xeon® Scalable Processors with Intel® C620 Series
Chipsets platforms.
The TPM ISO images are not included in the SUM package. This ISO image can be
acquired from Supermicro. Each SUM release could require different ISO images as
noted in SUM release notes. Please acquire correct TPM_version_YYYYMMDD.zip, unzip
the zip file and get TPM ISO images for usage.
With TPM ISO images, TPM capabilities can be enabled or cleared.
The BIOS will be rebooted several times during provisioning.
To clear TPM capability, see 5.10.3 Enabling and Clearing TPM Module Capabilities.
Space is prohibited for a SAMBA password. SUM will check the TPM module status on
the managed system. If it is not installed or it has malfunctioned, the exit code 36/37
will be returned respectively. If the TPM is locked, the exit code 37 will be returned.
The --cleartpm option clears the ownership of the TPM module.
The --lock yes option locks the TPM module.
SUM will stop TPM provision procedures if the CPU or platform does not support Intel
Trusted Execution Technology (Intel TXT).
On platforms after X11 Intel® Xeon® Scalable Processors with Intel® C620 Series Chipsets, use the
“TpmManage” command with the options in the following table to provide TPM module capabilities from
the managed system.
[--reboot]
Example:
OOB:
--clear_and_enable_dtpm_txt --reboot
--clear_dtpm --reboot
--enable_txt_and_dtpm --reboot
--clear_and_enable_dtpm --reboot
--disable_dtpm --reboot
--disable_txt --reboot
In-Band:
Notes:
<URL> [--id <id for URL> --pw <password for URL>] --cleartpm --reboot
Example:
--cleartpm --reboot
Note: The TpmProvision command is supported from the X10 Intel® Xeon® Processor E5
v3/v4 Product Family to the X11 Intel® Xeon® Scalable Processors with Intel® C620 Series
Chipsets platform.
Use the “GetGpuInfo” command to get the current NVIDIA GPU information from the managed system.
Syntax:
Example:
OOB:
In-Band:
In-Band:
The console output contains the following information of the managed system with GPU installed.
o X11/H11 and earlier platforms
GPU information
===================
[GPU(1)]
Slot: 00
Primary temperature: 40 C
Power consumption: 26 W
GPU information
===================
[GPU(1)]
Brand : NVIDIA
Location : 2
Memory Vendor : S
Temperature(C) : 1 degreeC
• The console output contains the following information for HGX2 system.
GPU information
===================
[HGX2 Baseboard(1)]
Baseboard ID: 00
Baseboard ID: 01
• The console output contains the following information for HGX system.
HGX information
===================
CEC Version....................3.9
FPGA Version...................2.A5
[GPU(1)]
Location : 0
Temperature(C) : 32 degreeC
[GPU(2)]
Brand : NVIDIA
Location : 0
Temperature(C) : 29 degreeC
[GPU(3)]
Brand : NVIDIA
Temperature(C) : 30 degreeC
[GPU(4)]
Brand : NVIDIA
Location : 0
Temperature(C) : 32 degreeC
[GPU(5)]
Brand : NVIDIA
Location : 0
Temperature(C) : 33 degreeC
[GPU(6)]
Brand : NVIDIA
Location : 0
Temperature(C) : 29 degreeC
[GPU(7)]
Brand : NVIDIA
Location : 0
Temperature(C) : 29 degreeC
[GPU(8)]
Brand : NVIDIA
Location : 0
Temperature(C) : 32 degreeC
[HBM]
[NVLink Switch]
[PCI Switch]
[PLX]
[Pump]
Notes:
Use the “UpdateGpu” command with the CEC/FPGA of GPU firmware image to update the GPU firmware of
a managed system by SUM.
Syntax:
Example:
OOB:
Managed system................192.168.34.56
CEC version................4.0
FPGA version................3.03
************************************WARNING****************************
************************************************************************
Note: You have to reboot or power up the system for the changes to take
effect
In-band:
Notes:
Use the “GetCpldInfo” command to get the CPLD firmware image information from the managed system as
well as the local CPLD firmware image (with the --file option).
Syntax:
Example:
OOB:
Managed system............192.168.34.56
CPLD version..........F1.00.BD
CPLD signed...........Signed
In-Band:
Managed system...........192.168.34.56
CPLD version.........F1.00.BD
CPLD signed..........Signed
Local CPLD image file....CPLD.bin
CPLD version.........F1.00.CD
FW image.............Signed
Signed Key.......RoT
--extract_measurement
Managed system...........192.168.34.56
CPLD version.........F0.09.46
CPLD signed..........Signed
CPLD version.........F0.0D.5A
FW image.............Signed
Signed Key.......RoT
Measurement......7F3095B7E9ABC6F982719F7A293C68A02373C2BF5C6B7C160D5E980
D90E79708932E6F577B74814C244B81D76F2925F1F456E734CFE67AA8E9CA57C4DA894757
Type Description
Signed RoT is signed by Super Micro Computer, Inc.
Signed(U) RoT is NOT signed by Super Micro Computer, Inc. but by an unknown
authority.
Verification failed The RoT signing in the image cannot be verified because the image is
corrupted or incomplete.
Note: This command is only available on RoT systems of X12/H12 and later platforms.
Use the “UpdateCpld” command with the CPLD firmware image CPLD.bin to run SUM to update the CPLD
of a managed system.
Syntax:
Example:
OOB:
CPLD.bin --reboot
In-Band:
CPLD.bin --reboot
Notes:
This command is only available on RoT systems of X12/H12 and later platforms.
The system needs to be powered off while updating the CPLD firmware.
Use the “GetAipCpldInfo” command to get the current AIP (AI Processor) CPLD information from the
managed system installed with AIP.
Syntax:
Example:
OOB:
====================
Managed system..........................192.168.34.56
[AIP Device 1]
[AIP Device 2]
[AIP Device 3]
[AIP Device 4]
[AIP Device 5]
[AIP Device 6]
[AIP Device 7]
[AIP Device 8]
Use the “UpdateAipCpld” command with the given AIP (AI Processor) CPLD firmware image to run SUM to
update the AIP CPLD firmware of a managed system installed with AIP.
Syntax:
<filename>
Example:
OOB:
AIP_CPLD.bin
Managed system.....................192.168.34.56
AIP FW version.................1A;1A;1A;1A;1A;1A;1A;1A
************************************WARNING*************************************
Uploading FW.......Done
Updating FW...>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>Done
..................................................
..................................................
..................................................
..................................................
.............................................Done
Use the ProfileManage command to edit and get the existing profile information from CMM. Note that
there is a space limit on Profiles. Once the space is full, use the ProfileManage command to delete
unnecessary profiles and upload new profiles. Each profile name on CMM is unique. Different profiles with
the same profile names cannot exist on CMM at the same time.
Commands Descriptions
ProfileManage • Gets and edits profile information or deletes the profile on CMM.
• Provides profile association information between specified profile
and the selected Blade systems.
SUM supports two update actions, apply and deploy. The update actions should be paired with the
scheduled update time in the profile to update the managed system.
The update the “Apply”action can be used to update the existing Blade systems at either scheduled time
or immediately. You can also use the update the “Deploy” action to update the Blade systems that have
One Blade system only accepts one single update rule. The new rule always replaces the older rule.
Deploy Past time Immediately updates the Blade systems that have been
existing or replaced.
Deploy Future time Updates the Blade systems that have been existing or
replaced at scheduled time.
1. Execute the ProfileManage command with the --Action Get option to get the existing profile list on
CMM. For more details, please refer to 5.6.11 Managing profile Information (Single System).
3. Execute the ProfileManage command with the --Action Edit, --file_id and [--profile_name/ --
profile_description/ --schedule_update_time] options to edit existing profile information on CMM. For
more details, please refer to 5.6.11 Managing profile Information (Single System).
4. Execute ProfileManage command with the --Action Get option again to check whether the profile
information is changed. For more details, please refer to 5.6.11 Managing profile Information (Single
System).
1. Execute the ProfileManage command with the --Action Get option to get the existing profile list on CMM
to check if any profile is available for update. For more details, please refer to 5.6.11 Managing profile
Information (Single System).
2. Execute the GetCmmCfg command with the --Download option to download the current CMM
configuration file for profile update. For more details, please refer to 5.6.3 Getting CMM Settings (Single
System).
3. Edit the CMM configuration file to set the unique profile name, edit profile description and schedule
update time.
4. Execute the ChangeCmmCfg command with the --Upload option to upload the local CMM configuration
file to CMM. For more details, please refer to 5.6.4 Updating CMM Settings (Single System).
6. Execute the ChangeCmmCfg command with the --Update option to update the selected CMM
configuration the profile. For more details, please refer to 5.6.4 Updating CMM Settings (Single
System).
7. Execute the ProfileManage command with the --Action Get, --file_id <profile ID> and --showall options
to check whether the task is executed. For more details, please refer to 5.6.11 Managing profile
Information (Single System).
Note: Use the ProfileManage command to upload the profile information to CMM, which
can be updated. Please refer to 5.6.7 Managing profile Information (Single System).
1. Execute the ProfileManage command with the --Action Get option to get the existing profile list on
CMM to check if any profile is available for update. For more details, please refer to 5.6.11 Managing
profile Information (Single System).
2. Execute the GetSystemCfg command with the --Download option to download the current system
configuration file.
3. Edit the system configuration file to set an unique profile name, profile description, and scheduled
update time.
4. Execute the ChangeSystemCfg command with the --Upload option to upload the local system
configuration file to CMM. For more details, please refer to 5.7.12 Getting System Settings.
6. Execute the ChangeSystemCfg command with the --Update and --dev_id options to update the
system configuration to the Blade system through CMM by the selected profile. For more details,
please refer to 5.7.13 Updating System Settings.
7. Execute the ProfileManage command with the --Action Get, --file_id <profile ID> and --showall
options to check whether the task is executed. For more details, please refer to 5.6.11 Managing
profile Information (Single System).
Note: Use the ProfileManage command to upload the profile information to CMM, which
can be updated later. Please refer to 5.6.7 Managing profile Information (Single System).
Syntax:
options]
The managed systems should be enumerated row-by-row in the system list file. Two formats are supported
for general commands as follows.
Format 1: BMC_IP_or_HostName
Options -u and -p should be specified in the command line for Format 1. By contrast, options -u and -p can
be removed from the command line for Format 2. In addition, the Username/Password in the system list
file overwrites the options -u and -p in the command line.
Example:
--overwrite
SList.txt:
192.168.34.56
For the first managed system 192.168.35.56, SUM applies -u ADMIN and -p PASSWORD to the command
line to execute the GetDmiInfo command. On the other hand, for the second managed system
192.168.34.57, SUM adopts the username (ADMIN1) and password (PASSWORD1) in SList.txt to execute
the GetDmiInfo command. Two executions are run concurrently and the execution status/results can be
referenced in 6.1.2 File Output, 6.1.3 Screen Output and 6.1.4 Log Output.
For the usage of commands that take input files as arguments, such as the UpdateBios command, see 6.1.1
File Input for its usage.
Notes:
Repeated managed system IPs or names in system list file are not allowed.
SUM limits its maximum concurrent executing count to avoid system overloading. The
default thread count in the .sumrc file is 50. For more details on usages, see 4.1
Customizing SUM Configurations.
SUM uses the input file specified in the command line (through --file option) to manage multiple systems.
Example:
Supermicro_BIOS.rom
SList.txt:
192.168.34.56
192.168.34.57
In this example, SUM uses the input file Supermicro_BIOS.rom specified in the command line to
concurrently update BIOS for both managed systems 192.168.34.56 and 192.168.34.57 enumerated in the
SList.txt file.
Note: SUM only supports single input files for managed systems in one command.
When SUM outputs files for managed systems, each managed system has one individual output file. The
individual output file names are those specified in the command line (through --file option) appended by “.”
and the “BMC/CMM_IP_or_Hostname,” which is obtained from the system list file.
Example:
SList.txt:
192.168.34.56
192.168.34.57
When SUM begins the execution for the managed systems, progress output will be continuously updated
to a log file created when SUM is invoked.
When the SUM finishes execution, the final execution status for each managed system will be shown on
the screen output row-by-row. Each row consists of “System Name,” “Elapsed,” “Status” and “Exit Code.”
“System name” is the “BMC/CMM_IP_or_Hostname” from the system list file. “Elapsed” is the time
elapsed when the command is executed. “Status” is provided as indicator: “WAITING,” “RUNNING,”
“RETRY,” “SUCCESS,” or “FAILED.” The status summary will be shown before and after the status list. After
listing the final status, SUM will exit and return the exit code of the concurrent executions.
You can also press the <ENTER> key to see the current execution status before the program is finished. The
format of the current status is the same as the final status, but only shows the status of the managed
systems at the stage of either “RUNNING” or “RETRY.” To see the current execution status of all managed
systems, use the --show_multi_full option.
Example:
--overwrite
--overwrite --show_multi_full
SList.txt:
192.168.34.56
192.168.34.57
Screen Output:
--overwrite
SList.txt.log_2019-04-11_15-50-43_5228
---------------------------------Current Status---------------------------------
Executed Command:
Summary:
Status List:
Summary:
--------------------------------------------------------------------------------
----------------------------------Final Results---------------------------------
Executed Command:
Summary:
Status List:
Summary:
--overwrite --show_multi_full
SList.txt.log_2019-04-11_15-56-06_6563
---------------------------------Current Status---------------------------------
Executed Command:
--show_multi_full
Summary:
Status List:
Summary:
--------------------------------------------------------------------------------
----------------------------------Final Results---------------------------------
Executed Command:
--show_multi_full
Summary:
Status List:
Summary:
--------------------------------------------------------------------------------
When SUM is executed for the managed systems, a log file will be created. This log file will be continuously
updated with the execution message for every system. The log file name, which will be shown onscreen, is
the system list file name appended by “.log_”, “yyyy-mm-dd_hh-mm-ss” (date and time) and “_PID”
(process ID). In the log file, the information of each system is listed in the “Last Update Time”, “Execution
parameters”, “Summary”, and “Status List” sections. The “Execution Message” section only lists the . The
following example shows the log file SList.txt.log_2013-10-02_15:57:40_7370 created from the example in
6.1.3 Screen Output.
The SList.log will be saved in /var/log/supermicro/SUM if it exists. Otherwise, it will be saved in the same
folder as SList.txt.
Example:
2013-10-02_15:57:47
Process finished.
------------------------------Execution parameters-----------------------------
Executed Command:
-----------------------------------Summary-------------------------------------
---------------------------------Status List-----------------------------------
System Name |Start Time |End Time |Elapsed |Status |Exit Code
-------------------------------Execution Message-------------------------------
System Name
192.168.34.56
Supermicro Update Manager (for UEFI BIOS) 1.2.0 (2013/10/02) Copyright (C) 2013
-------------------------------Execution Message-------------------------------
System Name
192.168.34.57
Message
Supermicro Update Manager (for UEFI BIOS) 1.2.0 (2013/10/02) Copyright (C) 2013
You can activate multiple systems concurrently using SUM through the -l option and the command
“ActivateProductKey.” (You should first obtain the node product keys for the managed systems. See 3.1
Getting Node Product Keys from Supermicro.)
Syntax:
-key_file <mymacs.txt.key>]
The managed systems should be enumerated row-by-row in the system list file. For the ActivateProductKey
command, two formats are supported.
The “-u” and “-p” options are required to specified in the command line for Format 1. The -u and -p options
can be removed from the command line for Format 2. In addition, the Username/Password in the system
list file overwrites the -u and -p options in the command line. If the --key option is specified in the
command line, the exception will be thrown. If you use the “--key_file” option, you don’t need apply
Node_Product_Key in Format 1 or Format 2.
Example:
SList.txt:
192.168.34.56 1111-1111-1111-1111-1111-1111
LIC","CreateDate":"20200409"},"Signature":"11111111111111111111222222222222222333333
33333333ababababababababababababbabcdcdcdcdcdcdccdcdcddcdefefefefefefefeefefefefghgh
ghghghghghghghgh"}}
key_file mymacs.text.key
SList.txt:
192.168.34.56
For the first managed system 192.168.34.56, SUM applies -u ADMIN and -p PASSWORD to the command
line and the node product key 1111-1111-1111-1111-1111-1111 to Execute the “ActivateProductKey”
command. By contrast, for the second managed system 192.168.34.57, SUM adopts the username ADMIN1,
password PASSWORD1 and node product key 2222-2222-2222-2222-2222-2222 to Execute the
“ActivateProductKey” command. These two managed systems will be activated concurrently. The
presentation of execution status and results will be similar to 6.1.3 Screen Output and 6.1.4 Log Output.
Note: For details on the command “ActivateProductKey,” see the note in 5.1.1 Activating a
Single Managed System.
To query the node product keys activated in the managed systems, use the “QueryProductKey” command.
Syntax:
sum -l < system list file > [-u <username> -p <password>] -c QueryProductKey
Example:
SList.txt:
192.168.34.56
192.168.34.57
If the execution “Status” field of a managed system is SUCCESS, the node product keys activated in the
managed system will be shown in the “Execution Message” section in the created log file.
Use the “CheckOOBSupport” command to check if both BIOS and BMC firmware images support OOB
functions for the managed systems. The received information will be the same as that in 5.2.1 Checking
OOB Support (Single System).
Syntax:
sum -l < system list file > [-u <username> -p <password>] -c CheckOOBSupport
Example:
SList.txt:
192.168.34.56
192.168.34.57
If the execution “Status” field for a managed system is SUCCESS, the BIOS and BMC capabilities of the
managed system will be shown in the “Execution Message” section in the created log file.
Use the “CheckAssetInfo” command to check the asset information in the managed systems. The received
information will be the same as that in 5.2.2 Checking Asset Information (OOB Only) (Single System).
Syntax:
sum -l < system list file > [-u <username> -p <password>] -c CheckAssetInfo
Example:
192.168.34.56
192.168.34.57
If the execution “Status” field for a managed system is SUCCESS, the asset configuration of the managed
system will be shown in the “Execution Message” section in the created log file.
Use the “CheckSensorData” command to check the sensor data of the managed systems. The message
output will be the same as that in 5.2.3 Checking Sensor Data (OOB Only) (Single System).
Syntax:
sum -l < system list file > [-u <username> -p <password>] -c CheckSensorData
Example:
SList.txt:
192.168.34.56
192.168.34.57
If the execution “Status” field for a managed system is SUCCESS, the sensor data of the managed system
will be shown in the “Execution Message” section in the created log file.
Use the “CheckSystemUtilization” command to check the utilization status of the managed systems. The
message output will be the same as that in 5.2.4 Checking System Utilization (OOB Only) (Single System).
Syntax:
CheckSystemUtilization
SList.txt:
192.168.34.56
192.168.34.57
If the execution “Status” field for a managed system is SUCCESS, the utilization status of the managed
system will be shown in the “Execution Message” section in the created log file.
6.3.5 ServiceCalls
Use the “ServiceCalls” command to check the system event log and sensor data record of the managed
system with the ServiceCalls configuration file. After execution, you will receive the SEL and SDR report via
e-mail. The message output will be the same as that in 5.2.5 ServiceCalls (Single System).
Syntax:
sum -l < system list file > [-u <username> -p <password>] -c ServiceCalls --file
Example:
SList.txt:
192.168.34.56
192.168.34.57
If the execution “Status” field for a managed system is SUCCESS, the utilization status of the managed
system will be shown in the “Execution Message” section in the created log file.
Use the “SystemPFA” command to monitor and set the predictive failure analysis function of BIOS on the
managed system. The message output will be the same as that in 5.2.6 Monitoring and Controlling PFA of
the System (Single System).
Syntax:
sum -l < system list file > [-u <username> -p <password>] -c SystemPFA --action
1 = GetCurrentStatus
2 = Enabled
3 = Disabled
Example:
[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c SystemPFA --action Enable
--reboot --post_complete
SList.txt:
192.168.34.56
192.168.34.57
If the execution “Status” field for a managed system is SUCCESS, the utilization status of the managed
system will be shown in the “Execution Message” section in the created log file.
Use the “MemoryHealthCheck” command to access the function in BIOS to check memory health of the
managed system. The message output will be the same as that in 5.2.7 Checking Memory Health of the
Managed System (Single System).
Syntax:
sum -l < system list file > [-u <username> -p <password>] -c MemoryHealthCheck -
1 = GetCurrentStatus
2 = Enabled
3 = Once
4 = Disabled
Example:
[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c MemoryHealthCheck --
SList.txt:
192.168.34.56
192.168.34.57
If the execution “Status” field for a managed system is SUCCESS, the utilization status of the managed
system will be shown in the “Execution Message” section in the created log file.
Use the “GetBiosInfo” command to get the BIOS firmware image information from the managed systems as
well as the input BIOS firmware image. The message output will be the same as that in 5.3.1 Getting BIOS
Image Information (Single System).
Syntax:
<filename> [--showall]
Example:
Supermicro_BIOS.rom
SList.txt:
192.168.34.56
192.168.34.57
Note: If the execution “Status” field of a managed system is SUCCESS, the BIOS information
of the managed system will be shown in its “Execution Message” section in the created log
file.
Use the “UpdateBios” command with the BIOS firmware image Supermicro_BIOS.rom to update managed
systems. For detailed usage notes of the “UpdateBios” command, see the usage notes in 5.3.2 Updating
the BIOS Image (Single System).
<filename> [options…]
--policy <policy The --policy option is deprecated and will be removed. Updates the BIOS
filename> based on the given policy file.
--precheck The --precheck option is deprecated and will be removed. Works with the
option –policy. Note that this option only shows the parsing results without
updating BIOS.
--backup Backs up the current BIOS image. (Only supported by the RoT systems.)
--forward Confirms the Rollback ID and upgrades to the next revision. (Only supported by
the X12/H12 and later platforms except the H12 non-RoT systems.)
Example:
Supermicro_BIOS.rom
SList.txt:
192.168.34.56
192.168.34.57
The execution progress for the managed system will be continuously updated to the “Execution Message”
section of the managed system in the created log file.
Use the “GetCurrentBiosCfg” command to get the current BIOS settings from the managed systems and
save it in the output files individually for each managed system enumerated in the system list file. For
details on the command “GetCurrentBiosCfg”, see 5.3.3 Getting Current BIOS Settings (Single System).
Syntax:
Example:
SList.txt:
192.168.34.56
192.168.34.57
If the execution “Status” field for a managed system (e.g., 192.168.34.56) is SUCCESS, its current settings
are stored in its output file, e.g., USER_SETUP.file.192.168.34.56. The option --overwrite is used to force
the overwrite of the existing file, e.g., USER_SETUP.file.192.168.34.56, if the output file already exists.
1. Select one managed system as the golden sample for current BIOS settings.
2. Follow the steps in 5.3.3 Getting Current BIOS Settings for that system.
3. Edit the item/variable values in the user setup file USER_SETUP.file to the desired values as illustrated
in 4.3 Format of BIOS Settings Text File (for DAT) or 4.4 Format of BIOS Settings XML File (for HII).
4. Remove unchanged items/variables in the text file. Note that this step is optional.
5. Use the ChangeBiosCfg command with the modified USER_SETUP.file to update the BIOS
configurations for managed systems.
Use the --individually option to update each managed system with the corresponding
configuration file.
For details on the “ChangeBiosCfg” command, see the note in 5.3.4 Updating BIOS
Settings Based on the Current BIOS Settings (Single System).
Syntax:
Example:
USER_SETUP.file --reboot
SList.txt:
192.168.34.56
192.168.34.57
If you want to update 192.168.34.56 and 192.168.34.57, you need to provide two files
USER_SETUP.file.192.168.34.56 and USER_SETUP.file.192.168.34.57. Then set the --file argument with the
“USER_SETUP.file” file name. With the --individually option, SUM searches for
USER_SETUP.file.192.168.34.56 and USER_SETUP.file.192.168.34.57 to update 192.168.34.56 and
192.168.34.57 respectively.
Use the “GetDefaultBiosCfg” command to get the default factory BIOS settings from the managed systems
and save it in the output files individually for each managed system enumerated in the system list file.
Syntax:
Example:
USER_SETUP.file
SList.txt:
192.168.34.56
192.168.34.57
If the execution “Status” field for a managed system (e.g., 192.168.34.56) is SUCCESS, its default settings
are saved in its output file, e.g., USER_SETUP.file.192.168.34.56. The --overwrite option is used to force
overwrite the existing file, e.g., USER_SETUP.file.192.168.34.56, if the output file already exists.
1. Select one managed system as the golden sample for factory default BIOS settings.
2. Follow the steps in 5.3.5 Getting Factory BIOS Settings for that system.
3. Follow steps 3 to 5 in 6.4.4 Updating BIOS Settings Based on a Current Sample Settings.
Use the “LoadDefaultBiosCfg” command to reset the BIOS settings of the managed systems to the factory
default settings.
Note: The uploaded configurations will only take effect after the managed systems reboot
or power up.
Syntax:
path>]] [--reboot]
reboot
SList.txt:
192.168.34.56
192.168.34.57
Use the “GetDmiInfo” command to get the current supported editable DMI information from the managed
systems and save it in the output files individually for each managed system enumerated in the system list
file. For detailed usage notes of the command “GetDmiInfo,” see 5.3.8 Getting DMI Information (Single
System).
Syntax:
<DMI.txt> [--overwrite]
Example:
--overwrite
SList.txt:
192.168.34.56
192.168.34.57
If the execution “Status” field for a managed system (e.g., 192.168.34.56) is SUCCESS, its DMI settings are
saved in its output file, e.g., DMI.txt.192.168.34.56. The option --overwrite is used to force overwrite of the
existing file, e.g., DMI.txt.192.168.34.56.
Use the “EditDmiInfo” command to edit the editable DMI items. For details on the “EditDmiInfo” command,
refer to 5.3.9 Editing DMI Information (Single System).
Syntax:
<DMI.txt> --item_type <Item Type> --item_name <Item Name> --value <Item Value>
Example:
SList.txt:
192.168.34.56
192.168.34.57
If the execution “Status” field for a managed system (e.g. 192.168.34.56) is “SUCCESS”, its edited DMI
information are updated in its output file, e.g. DMI.txt.192.168.34.56.
1. Select one managed system as the golden sample for DMI information.
Notes:
The uploaded information will only take effect after the managed systems reboot or
power up.
Use the --individually option to update each managed system with the corresponding
configuration file.
For detailed usage notes of the command “ChangeDmiInfo,” see 5.3.10 Updating DMI
Information.
Syntax:
Example:
DMI.txt --reboot
SList.txt:
192.168.34.56
192.168.34.57
If you want to update 192.168.34.56 and 192.168.34.57, you need to provide two files
DMI.txt.192.168.34.56 and DMI.txt.192.168.34.57. Then set the --file argument with the DMI.txt” file
name. With the --individually option, SUM searches for DMI.txt.192.168.34.56 and DMI.txt.192.168.34.57
to update 192.168.34.56 and 192.168.34.57 respectively.
Use the “SetBiosAction” command to show or hide BBS priority related settings.
Note: The uploaded configurations will only take effect after the managed systems reboot
or power up.
Syntax:
<yes/no> [--reboot]
Example:
SList.txt:
192.168.34.56
192.168.34.57
Use the “SetBiosPassword” command to update a BIOS Administrator password. The information will be
the same as that in 5.3.12 Setting Up a BIOS Administrator Password.
Syntax:
The managed systems should be enumerated row by row in the system list file. For the “SetBiosPassword”
command, two formats are supported. Note that the Current_Password field is optional. If the managed
system has been installed with a BIOS Administrator password, this field should be filled with the current
BIOS Administrator password. The system list file should be like this:
[Current_BIOS_Password]
It is required to specify both “-u” and “-p” options in the command line for Format 1. The options “-u” and
“-p” can be removed from the command line for Format 2. In addition, the Username/Password in the
system list file overwrites the options “-u” and “-p” in the command line. When using either the “--
new_password” or “--pw_file” options, you don’t need to include New_Password for Format 1 or Format 2,
and the same new password will apply to each system specified in the system list file. If you want to set a
different new password for each system, you can specify a New_Password corresponding to each system
for Format 1 or Format 2 without using the “--new_password” and “--pw_file” options.
Example:
--pw_file passwd.txt
SList.txt:
192.168.34.56
192.168.34.57
passwd.txt:
NewBiosPasswordString
Current_passwd.txt:
CurrentBiosPasswordString
The new uploaded password will only take effect after the managed systems reboot or
power up.
The SetBiosPassword command supports CSV format in the system list file. The CSV
format uses spaces to separate values and double quotes to enclose values.
To clear the BIOS Administrator password with the system list file, press the spacebar
twice to skip entering the BIOS_new_passowrd. The format should be like this :
BMC_IP_or_HostName Current_Password
BMC_IP_or_HostName Username Password Current_Password
Use the “BiosRotManage” command to manage RoT fuctions. For details, see 5.3.14 Managing BIOS RoT
Functions (Single System).
Syntax:
Example:
SList.txt:
192.168.34.56
192.168.34.57
Use the “UpdateBios” command with --file <CAPSULE_FILE.bin> to update capsule file to managed system.
For details, see 5.3.15 Seamless Update Capsule File (Single System).
Syntax:
Example:
SList.txt:
192.168.34.56
192.168.34.57
Use the “GetBiosInfo” command with --file <CAPSULE_FILE.bin> to get capsule information on managed
system and local capsule file. For details, see 5.3.15 Seamless Update Capsule File (Single System).
Syntax:
<CAPSULE_FILE.bin> [--showall]
Example:
SList.txt:
192.168.34.56
192.168.34.57
Use the “GetBmcInfo” command to get the BMC firmware image information from the managed systems
as well as the input BMC firmware image. The information will be the same as that in 5.4.1 Getting BMC
Image Information (Single System).
Syntax:
Example:
Supermicro_BMC.rom
SList.txt:
192.168.34.56
192.168.34.57
If the execution ”Status” field for a managed system is SUCCESS, the BMC information of the managed
system will be shown in the “Execution Message” section of the managed system in the created log file.
Use the “UpdateBmc” command with BMC firmware image Supermicro_BMC.rom to update managed
systems. For detailed usage notes of the “UpdateBmc” command, see the usage notes in 5.4.2 Updating
the BMC Image (Single System).
Syntax:
overwrite_ssl]
Supermicro_BMC.rom
SList.txt:
192.168.34.56
192.168.34.57
The execution progress for the managed system will be continuously updated to the “Execution Message”
section of the managed system in the created log file.
Use the “GetBmcCfg” command to get the current BMC settings from the managed systems and save it in
the output files individually for each managed system enumerated in the system list file. For detailed usage
notes of the “GetBmcCfg” command, see the usage notes in 5.4.3 Getting BMC Settings (Single System).
Syntax:
sum -l <system list file> [-u <username> -p <password>] -c GetBmcCfg --file <
Example:
BMCCfg.xml --overwrite
SList.txt:
192.168.34.56
192.168.34.57
If the execution “Status” field for a managed system (e.g., 192.168.34.56) is SUCCESS, its current settings
will be stored in its output file, e.g., BMCCfg.xml.192.168.34.56. The option --overwrite is used to force the
overwrite the existing file, e.g., BMCCfg.xml.192.168.34.56.
1. Select one managed system as the golden sample for current BMC settings.
2. Follow the steps in 5.4.3 Getting BMC Settings for the managed system.
3. Edit the configurable element values in the BMC configuration text file BMCCfg.xml to the desired
values as illustrated in 4.6 Format of BMC Configuration Text File.
4. Skip unchanged tables in the text file by setting Action attribute as “None.” Note that this step is
optional.
5. Remove unchanged tables/elements in the text file. Note that this step is optional.
6. Use the “ChangeBmcCfg” command with the modified BMCCfg.xml file to update the BMC
configurations for multiple systems.
Notes:
Some table settings cannot be applied to each managed system uniformly, e.g., FRU
and LAN configurations. You might need to change its table action to “None” in step 4
or remove tables/elements in step 5.
LAN “IPAddress” field will be skipped in multiple system usage.
Use the --individually option to update each managed system with the corresponding
configuration file.
For detailed usage notes of the “ChangeBmcCfg” command, see the usage notes in
5.4.4 Updating BMC Settings (Single System).
Syntax:
<BMCCfg.xml> [--individually]
Example:
BMCCfg.xml
BMCCfg.xml --individually
192.168.34.56
192.168.34.57
If the execution “Status” field for a managed system is SUCCESS, its BMC settings are updated.
If you want to update 192.168.34.56 and 192.168.34.57, you need to provide two files
BMCCfg.xml.192.168.34.56 and BMCCfg.xml.192.168.34.57. Then set the argument --file with the
BMCCfg.xml file name. With the option --individually, SUM searches for BMCCfg.xml.192.168.34.56 and
BMCCfg.xml.192.168.34.57 to update 192.168.34.56 and 192.168.34.57 respectively.
Use the “SetBmcPassword” command to execute SUM to update the BMC user password. The information
will be the same as that in 5.4.6 Setting Up a BMC User Password (Single System).
Syntax:
The managed systems should be enumerated row by row in the system list file. For the “SetBmcPassword”
command, two formats are supported.
The “-u” and “-p” options are required to specify in the command line for Format 1. The options “-u” and “-
p” can be removed from the command line for Format 2. In addition, the Username/Password in the
system list file overwrites the options “-u” and “-p” in the command line. When using either the “--
new_password” or “--pw_file” options, you don’t need to include New_Password for Format 1 or Format 2,
and the same new password will apply to each system specified in the system list file. If you want to set a
different new password for each system, you can specify a New_Password corresponding to each system
for Format 1 or Format 2 without using the “--new_password” and “--pw_file” options.
Example:
SList.txt:
192.168.34.56 12345678
SList.txt:
192.168.34.56
192.168.34.57
passwd.txt:
BmcPasswordString
Use the “GetKcsPriv” command to execute SUM to get the current BMC KCS privilege level from the
managed systems.
Syntax:
Example:
SList.txt:
192.168.34.56
192.168.34.57
Use the “SetKcsPriv” command to execute SUM to set the BMC KCS privilege level. The information will be
the same as that in 5.4.8 Setting the BMC KCS Privilege Level (Single System).
Syntax:
Example:
SList.txt:
192.168.34.56
192.168.34.57
Use the “LoadDefaultBmcCfg” command to execute SUM to reset the BMC of the managed system to the
factory default. For details, see 5.4.9 Loading Factory BMC Settings (Single System).
Syntax:
preserve_user_cfg
clear_user_cfg --load_unique_password
clear_user_cfg --load_default_password
Example:
preserve_user_cfg
clear_user_cfg --load_unique_password
clear_user_cfg --load_default_password
SList.txt:
192.168.34.56
192.168.34.57
Use the “GetLockdownMode” command to execute SUM to get the current BMC system lockdown mode
status of the managed systems.
Syntax:
Example:
SList.txt:
192.168.34.56
192.168.34.57
Use the “SetLockdownMode” command to execute SUM to set the BMC system lockdown mode. For
details, see 5.4.10 Setting the BMC System Lockdown Mode (Single System).
Syntax:
Example:
SList.txt:
192.168.34.56
192.168.34.57
Use the “BmcRotManage” command to manage RoT functios. For details, see 5.4.11 Managing BMC RoT
Functions (Single System).
Syntax:
Example:
SList.txt:
192.168.34.56
192.168.34.57
To set the BMC reset counter, use the “TimedBmcReset” command. For details, see 5.3.13 Setting the
BMC Reset Counter.
Syntax:
Example:
SList.txt:
192.168.34.56
192.168.34.57
As a security mechanism, remote attestation provides a digital signature and allows users to Use the
“Attestation” command to manage measurement files on the managed systems as well as and local
measurement files with confidence. For details, see 5.4.14 Managing Remote Attestation.
Syntax:
Example:
SList.txt:
192.168.34.56
192.168.34.57
Use the “GetEventLog” command to show the current system event log (including both BIOS and BMC
event log) from the managed systems and save them in the output files individually for each managed
system enumerated in the system list file with the --file option. Without the --file option, you can choose to
show the event log in the execution log file instead. For detailed execution notes, see 5.5.1 Getting System
Event Log (Single System).
Syntax:
<EventLog.txt>] [--overwrite]
Example:
EventLog.txt
SList.txt:
192.168.34.56
192.168.34.57
If the execution “Status” field for a managed system (e.g. 192.168.34.56) is SUCCESS, its event logs are
stored in its output file, e.g., EventLog.txt.192.168.34.56. The --overwrite option is used to force overwrite
of the existing file, e.g., EventLog.txt.192.168.34.56. If the --file option is not used, the event log for each
managed system will be shown in the “Execution Message” section of the managed system in the created
execution log file.
Use the “ClearEventLog” command to clear the event log (both BMC and BIOS event log) for each managed
system. For detailed execution notes, see 5.5.2 Clearing System Event Log (Single System).
path>]] [--reboot]
Example:
SList.txt:
192.168.34.56
192.168.34.57
If the execution “Status” field for a managed system is SUCCESS, its event logs are cleared.
Use the “GetMaintenEventLog” command to have SUM show the managed system’s current maintenance
event logs (including both BIOS and BMC event logs), and use the --file option to save them in the output
files separately. Without the --file option, you can show the event log in the execution log file instead. For
details, see 5.5.3 Getting System Maintenance Event Log (Single System).
_5.5.3_Getting_System
Syntax:
-st <start time> --et <end time>] [--count <log count>] [--file <
MaintenEventLog.txt> [--overwrite]]
Example:
192.168.34.56
192.168.34.57
If the “Status” field of the managed system (e.g., 192.168.34.56) shows SUCCESS, its maintenance event
logs are stored in its output file, e.g., MaintenanceEventLog.txt.192.168.34.56. The --overwrite option is
used to force to overwrite the existing file, e.g., MaintenanceEventLog.txt.192.168.34.56. If the --file option
is not used, the event logs of each managed system will be shown in its “Execution Message” section in the
created execution log file.
Use the “GetHostDump” command to have SUM show the managed system’s host crash dump data logs.
For details, see 5.5.4 Getting Host Crash Dump Log (Single System).
Syntax:
Example:
DeleteDump
SList.txt:
192.168.34.56
192.168.34.57
Use the “ClearMaintenEventLog” command to clear the maintenance event log for each managed system.
For details, see 5.5.5 Clearing System Maintenance Event Log (Single System).
Syntax:
Example:
SList.txt:
192.168.34.56
192.168.34.57
If the execution “Status” field for a managed system is SUCCESS, its maintenance event logs are cleared.
Use the “GetCmmInfo” command to get the CMM firmware image from the managed systems as well as
the input CMM firmware image. The information will be the same as that in 5.6.1 Receiving CMM
Firmware Image Information (Single System).
Syntax:
<filename>]
Example:
Supermicro_CMM.rom
SList.txt:
192.168.34.56
192.168.34.57
If the Status field for a managed system shows “SUCCESS,” the CMM information of the managed system
will be shown in the “Execution Message” section of the managed system in the created log file.
Use the “UpdateCmm” command with the CMM firmware image Supermicro_CMM.rom to update the
managed systems. For details on the “UpdateCmm” command, see the notes in 5.6.2 Updating the CMM
Firmware Image (Single System).
Syntax:
Example:
[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c UpdateCmm --file
Supermicro_CMM.rom
SList.txt:
192.168.34.56
192.168.34.57
The execution progress of the system will be continuously updated in the “Execution Message” section of
the managed system in the created log file.
Use the “GetCmmCfg” command to get the current CMM settings from managed systems and save it in the
output files individually for each managed system enumerated in the system list file. For details on the
“GetCmmCfg” command, see the notes in 5.6.3 Getting CMM Settings (Single System).
Syntax:
sum -l <system list file> [-u <username> -p <password>] -c GetCmmCfg --file <
Example:
CmmCfg.xml --overwrite
SList.txt:
192.168.34.56
192.168.34.57
If the Status field of the managed system (e.g., 192.168.34.56) shows SUCCESS, its current settings are
stored in its output file, e.g., CMMCfg.xml.192.168.34.56. The --overwrite option is used to force the
overwrite of the existing file, e.g., CMMCfg.xml.192.168.34.56.
Note: For details on profile update, please refer to 6.16 Profile Update for Multiple Blade
Systems.
1. Select one managed system as the golden sample for the current CMM settings.
2. Follow the steps in 5.6.3 Getting CMM settings.
3. Edit the configurable element values in the CMM configuration text file CMMCfg.xml to the desired
values as illustrated in 4.8 Format of CMM Configuration Text File.
4. Set the Action attribute as “None” to skip unchanged tables in the text file. Note that this step is
optional.
5. Remove unchanged tables/elements in the text file. Note that this step is optional.
6. Use the “ChangeCmmCfg” command with the modified CMMCfg.xml file to update the CMM
configurations for multiple systems.
Notes:
Some table settings cannot be applied to each managed system uniformly, e.g., LAN
configurations. You might need to change its table action to “None” in step 4 or
remove tables/elements in step 5.
LAN “IPAddress” field will be skipped in multiple system usage.
Use the --individually option to update each managed system with the corresponding
configuration file.
For details on the “ChangeCmmCfg” command, see the notes in 5.6.4 Updating CMM
Settings (Single System).
Syntax:
<CMMCfg.xml> [--individually]
Example:
CMMCfg.xml
CMMCfg.xml --individually
SList.txt:
192.168.34.56
192.168.34.57
If the Status field of a managed system shows “SUCCESS”, its CMM settings are updated.
In the example, if you want to update 192.168.34.56 and 192.168.34.57, you need to provide two files
CMMCfg.xml.192.168.34.56 and CMMCfg.xml.192.168.34.57, and then Then name the --file argument as
“CMMCfg.xml.” With the --individually option, SUM searches for CMMCfg.xml.192.168.34.56 and
CMMCfg.xml.192.168.34.57 to update 192.168.34.56 and 192.168.34.57 respectively.
Use the “SetCmmPassword” command to execute SUM to update a CMM user password.
Syntax:
Example:
SList.txt:
192.168.34.56
192.168.34.57
passwd.txt:
CmmPasswordString
Use the “LoadDefaultCmmCfg” command to have SUM reset the CMM of the managed system to the
factory default. For details, see 5.6.6 Loading Factory CMM Settings (Single System).
Syntax:
preserve_user_cfg
clear_user_cfg --load_unique_password
clear_user_cfg --load_default_password
Example:
preserve_user_cfg
clear_user_cfg --load_unique_password
clear_user_cfg --load_default_password
SList.txt:
192.168.34.56
192.168.34.57
Use the “GetBbpInfo” command to get the BBP firmware image from the managed systems as well as the
input BBP firmware image. The information will be the same as that in 5.6.7 Getting BBP Firmware Image
Information (Single System).
Syntax:
<filename>]
Example:
SList.txt:
192.168.34.56
192.168.34.57
If the Status field for a managed system shows “SUCCESS”, the BBP information of the managed system will
be shown in the “Execution Message” section of the managed system in the created log file.
Use the “UpdateBbp” command with the BBP firmware image BBP.bin to update managed systems. For
details on the command “UpdateBbp,” see the notes in 5.6.8 Updating the BBP Firmware Image (Single
System).
Syntax:
<filename> [--skip_check]
Example:
[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c UpdateBbp --file BBP.bin
192.168.34.56
192.168.34.57
The execution progress of the system will be continuously updated in the “Execution Message” section of
the managed system in the created log file.
Use the “GetBladePowerStatus” command to get the current power status of the blade system. See 5.5.9
Getting Current Power Status of Blade System (Single System).
Syntax:
Example:
SList.txt:
192.168.34.56
192.168.34.57
If the Status field for a managed system shows “SUCCESS,” the power status of the blade system will be
shown in the “Execution Message” section of the managed system in the created log file.
Use the “SetBladePowerAction” command to set the current power status of the blade system. See 5.5.10
Setting Power Status of Blade System (Single System).
Syntax:
0 = down
1 = up
2 = cycle
3 = reset
5 = softshutdown
24 = accycle
Example:
SList.txt:
192.168.34.56
192.168.34.57
If the execution “Status” field for a managed system is SUCCESS, the console output of the managed
system will be shown in the “Execution Message” section of the managed system in the created log file.
Use the “ProfileManage” command to manage profile information on the CMM. The information will be
the same as that in 5.6.7 Managing profile Information (Single System).
Syntax:
Example:
SList.txt:
192.168.34.56
192.168.34.57
If the Status field for a managed system shows “SUCCESS,” the profile information of the managed system
will be shown in the “Execution Message” section in the created log file.
Use the command “GetSwitchInfo” to receive the switch firmware image information and switch firmware
image from the managed system. The information will be the same as that in 5.6.12 Receiving Switch
Firmware Image Information (Single System).
Syntax:
Example:
SList.txt:
192.168.34.56
192.168.34.57
Use the “UpdateSwitch” command with the Supermicro_Switch.bin switch firmware image to update the
managed switch. The information is the same as that in 5.6.13 Updating the Switch Firmware.
Syntax:
Example:
Supermicro_Switch.bin –-reboot
SwitchList.txt:
192.168.34.100
192.168.34.101
For --inidividually option usage, if you want to update 192.168.34.100 and 192.168.34.101, you need to
provide two files Supermicro_Switch.bin.192.168.34.100 and Supermicro_Switch.bin.192.168.34.101. Then
set the --file argument with the “Supermicro_Switch.bin” filename. With the --individually option, SUM
searches for Supermicro_Switch.bin.192.168.34.100 and Supermicro_Switch.bin.192.168.34.100 to update
192.168.34.100 and 192.168.34.101 respectively.
Use the “RebootSwitch” command to reboot the managed switch. The information will be the same as that
in 5.6.14 Rebooting the Switch.
Syntax:
Example:
SwitchList.txt:
192.168.34.100
192.168.34.101
Use the “MountIsoImage” command to mount an ISO image as virtual media to managed systems through
a SAMBA/HTTP/HTTPS server. For detailed “MountIsoImage” command notes, see 5.7.1 Providing an ISO
Image as a Virtual Media through BMC and File Server (Single System).
Syntax:
image_url <URL> --reboot [[--id <id for URL> --pw <password for URL>] | [--id
Example:
smbpassw
smbpasswd
smbpassw
smbpasswd.txt
SList.txt:
192.168.34.56
192.168.34.57
smbpasswd.txt:
smbpasswd
If the execution “Status” field for a managed system is SUCCESS, the Image.iso is mounted as a virtual
media to the managed system.
Use the “UnmountIsoImage” command to unmount an ISO image as a virtual media from managed system.
Syntax:
Example:
SList.txt:
192.168.34.56
192.168.34.57
If the execution “Status” field for a managed system is SUCCESS, the mounted virtual media will be
removed from the managed system.
Use the “MountFloppyImage” command to execute SUM to mount a binary floppy image virtuallyto the
managed system. For details on “MountFloppyImage”, see 5.7.3 Mounting a Floppy Image Virtually from a
Local Image File (Single System).
Syntax:
--file <filename>
Example:
Floppy.img
SList.txt:
192.168.34.56
192.168.34.57
If the execution “Status” field of the managed system is SUCCESS, the “Floppy.img” is mounted virtually to
the managed system.
Use the “UnmountFloppyImage” command to remove a binary floppy image virtually from the managed
system. For details on “UnmountFloppyImage,” see 5.7.4 Unmounting Floppy Image Virtually from the
Managed System (Single System).
Syntax:
Example:
SList.txt:
192.168.34.56
192.168.34.57
If the execution “Status” field for a managed system is SUCCESS, the virtually mounted image will be
removed from the managed system.
Syntax:
<raw command>
Example:
0x01'
SList.txt:
192.168.34.56
192.168.34.57
If the execution “Status” field for a managed system is SUCCESS, the console output of the managed
system will be shown in the “Execution Message” section of the managed system in the created log file.
Use the “LocateServerUid” command to control the UIDs. For details, see 5.7.9 Controlling the UID of the
Managed System (Single System).
1 = GetStatus
2 = On
3 = Off
Syntax:
action <action>
Example:
GetStatusSList.txt:
192.168.34.56
192.168.34.57
If the execution “Status” field for a managed system is SUCCESS, the console output of the managed
system will be shown in the “Execution Message” section of the managed system in the created log file.
Use the “SetHttpBoot” command to download ISO images from multiple servers and boot into the ISO
image. For details, see 5.7.10 Booting into the ISO Image from HTTP Server (Single System).
Syntax:
boot_clean [--reboot]
Example:
https://[1234:ab5:0:c678:9012:345d:6e78:9f0a]/iso/efishell.iso --reboot
--reboot
SList.txt:
192.168.34.56
192.168.34.57
If the execution “Status” field for a managed system is SUCCESS, the console output of the managed
system will be shown in the “Execution Message” section of the managed system in the created log file.
HTTPS boot needs to provide the clients with a valid TLS certificate signed by a trusted
certification authority.
Due to BIOS limitations, if an HTTP boot option exists in the BIOS configuration, please
use the option “--boot_clean” to clean the HTTP boot option and then reset HTTP the
boot option.
When you execute the SetHttpBoot command on the FreeBSD 12 system, you may
boot into FreeBSD instead of efishell.iso because of startup.nsh in the system. To
prevent from it, you can delete startup.nsh or rename the file name.
Use the “KmsManage” command to change the KMS server configurations, upload TLS certificates and test
the connection to the KMS server. The command is only available on X12/H12 and later platforms. For
details on the console output and command usage, see 5.7.11 Managing KMS Server Configurations (Single
System).
Syntax:
filename>]]
[option …]
Example:
GetInfo
DeleteAll --reboot
SList.txt:
192.168.34.56
192.168.34.57
If the “Status” field for a managed system shows SUCCESS, the console output of the managed system will
be shown in the “Execution Message” section of the managed system in the created log file.
Syntax:
Example:
SystemCfg.xml --overwrite
SList.txt:
192.168.34.56
192.168.34.57
If the Status field of the managed system (e.g. 192.168.34.56) shows SUCCESS, its current settings are
stored in its output file, e.g., SystemCfg.xml.192.168.34.56. The option --overwrite is used to force an
existing file to be overwritten , e.g., SystemCfg.xml.192.168.34.56.
Note: For details on profile update, please refer to 6.16 Profile Update for Multiple Blade
Systems.
Notes:
For BMC configuration, some table settings cannot be applied to each managed system
uniformly, e.g., LAN configurations. You might need to change its table action to
“None” in BMC configuration file.
For more details, please refer to 5.3.4 Updating BIOS Settings Based on the Current
BIOS Settings and 5.4.4 Updating BMC Settings.
Use the --individually option to update each managed system with the corresponding
configuration file concurrently.
For details on the “ChangeSystemCfg” command, see the notes in 5.7.13 Updating
System Settings.
For details on profile update, please refer to 6.16 Profile Update for Multiple Blade
Systems.
Syntax:
update Apply|Deploy --dev_id <Device ID> --file_id <file ID> --reboot] | [--
Example:
SList.txt:
192.168.34.56
192.168.34.57
If the Status field of a managed system shows “SUCCESS”, its system settings are updated.
If you want to update 192.168.34.56 and 192.168.34.57, you need to provide two files
SystemCfg.xml.192.168.34.56 and SystemCfg.xml.192.168.34.57, and then rename the --file argument as
“SystemCfg.xml.” With the --individually option, SUM searches for SystemCfg.xml.192.168.34.56 and
SystemCfg.xml.192.168.34.57 to update 192.168.34.56 and 192.168.34.57 respectively.
Use the “RedfishApi” command to invoke any Redfish API and display the response on screen. For details,
please see 5.7.14 Invoke Redfish API.
Syntax:
sum -l <system list file> [-u <username> -p <password>] -c RedfishApi --api <api
path> [-v] [--request <http method>] [--file <file name> [--overwrite]] [--data
Example:
SList.txt:
192.168.34.56
192.168.34.57
If you want to invoke a Redfish API to 192.168.34.56 and 192.168.34.57, and you want them to use
different request body, you need to provide two files body.txt.192.168.34.56 and body.txt.192.168.34.57,
and then specify --data argument as “@body.txt.” With the --individually option, SUM searches for
body.txt.192.168.34.56 and body.txt.192.168.34.57 as the request body sending to 192.168.34.56 and
192.168.34.57 respectively.
Use the “RemoteExec” command to secure copy the file and execute shell commands on remote Linux
systems. For details, see 5.7.15 Remote Execute(Single System).
Syntax:
os_key <OS private key> --os_key_pw <OS private key password>]] -c RemoteExec --
The managed systems should be enumerated row by row in the system list file. For the ”RemoteExec”
command, three formats are supported. The system list file should be like this:
Format 1: OS_IP_or_HostName
o Format 1 Slist.txt:
a). Hosts by different names or IP addresses share the same OS username and password.
b). Hosts by different names or IP addresses share the same OS password, privatekey, and privatekey
password.
o Format 3 Slist.txt: Each host has its own OS username, privatekey, and privatekey password.
Example:
Remote In-Band:
192.168.34.56
192.168.34.57
SList.txt:
192.168.34.56
192.168.34.57
SList.txt:
SList.txt:
If the execution “Status” field of the managed system shows SUCCESS, the console output of the managed
system will be shown in the “Execution Message” section of the managed system in the created log file.
Notes:
The file will be copied to the path "/tmp/" in remote Linux systems.
The stderr on the remote Linux system will be redirected to stdout.
Use the “GetRaidControllerInfo” command to get the RAID firmware image information from the managed
systems as well as the input RAID firmware image. The information will be the same as that in 5.8.1
Getting RAID Firmware Image Information (Single System).
Syntax:
<filename>]
Example:
file RAID.rom
SList.txt:
192.168.34.56
192.168.34.57
If the execution “Status” field for a managed system is SUCCESS, the RAID information of the managed
system will be shown in the “Execution Message” section of the managed system in the created log file.
Use the “UpdateRaidController” command with the RAID firmware image RAID.rom to update multiple
systems. For details on using the “UpdateRaidController” command, see the usage notes in 5.8.2 Updating
the RAID Firmware Image (OOB Only) (Single System).
Syntax:
SList.txt:
192.168.34.56
192.168.34.57
The execution progress for the managed system will be continuously updated in the “Execution Message”
section of the managed system in the created log file.
Use the “GetRaidCfg” command to get the current RAID settings from managed systems and save them
separately for each managed system enumerated in the system list file. For details on using the
“GetRaidCfg” command, see the usage notes in 5.8.3 Getting RAID Settings (Single System).
Syntax:
sum -l <system list file> [-u <username> -p <password>] -c GetRaidCfg --file <
Example:
RAIDCfg.xml --overwrite
SList.txt:
192.168.34.56
192.168.34.57
If the execution “Status” field for a managed system (e.g. 192.168.34.56) is SUCCESS, its current settings
are stored in its output file, e.g. RAIDCfg.xml.192.168.34.56. The option --overwrite is used to force the
overwrite of the existing file, e.g. RAIDCfg.xml.192.168.34.56.
1. Select one managed system as the golden sample for current RAID settings.
2. Follow the steps in 5.8.3 Getting RAID Settings.
3. Edit the configurable element values in the RAID configuration text file RAIDCfg.xml as illustrated in
4.7 Format of the RAID Configuration Text File.
4. Set Action attribute as “None” to skip the unchanged tables in the text file. Note that this step is
optional.
5. Remove the unchanged tables/elements in the text file. Note that this step is optional.
6. Use the “ChangeRaidCfg” command with the modified RAIDCfg.xml file to update the RAID
configurations for multiple systems.
Notes:
Some table settings cannot be uniformly applied to each managed system. You might
need to change its table action to “None” in step 4 or remove the tables/elements in
step 5.
Use the “--individually” option to update each managed system with the corresponding
configuration file concurrently.
For details on the “ChangeRaidCfg” command, see the usage notes in 5.8.4 Updating
RAID Settings (Single System).
Syntax:
<RAIDCfg.xml> [--individually]
Example:
RAIDCfg.xml
RAIDCfg.xml --individually
SList.txt:
192.168.34.56
If the execution “Status” field for a managed system is SUCCESS, its RAID settings are updated.
If you want to update 192.168.34.56 and 192.168.34.57, you need to provide two files
RAIDCfg.xml.192.168.34.56 and RAIDCfg.xml.192.168.34.57, and then rename the --file argument as
“RAIDCfg.xml.” With the --individually option, SUM searches for RAIDCfg.xml.192.168.34.56 and
RAIDCfg.xml.192.168.34.57 to update 192.168.34.56 and 192.168.34.57 respectively.
Use the “GetSataInfo” command to get the SATA HDD information from the managed systems. The
information will be the same as that in 5.8.5 Getting SATA HDD Information (OOB Only) (Single System).
Syntax:
Example:
SList.txt:
192.168.34.56
192.168.34.57
If the execution “Status” field for a managed system is SUCCESS, the SATA HDD information of the
managed system will be shown in the console.
Use the “GetNvmeInfo” command to get the NVMe information from managed systems. The information
will be the same as that in 5.8.6 Getting NVMe Information (Single System).
Syntax:
dev_id <device_id> ]
Example:
SList.txt:
192.168.34.56
192.168.34.57
If the execution “Status” field for a managed system is SUCCESS, the NVMe information of the managed
system will be shown on the console.
Use the “SecureEraseDisk” command to execute SUM to erase the HDD on the managed system. For details,
see 5.8.7 Secure Erasing Hard Disks (Single System).
Syntax:
Example:
psid.txt --precheck
SList.txt:
192.168.34.56
192.168.34.57
If the execution “Status” field of a managed system is SUCCESS, the pre-check result of the managed
system will be shown in the “Execution Message” section of the managed system in the created log file.
Use the “SecureEraseRaidHdd” command to execute SUM to securely erase hard disks (HDD or SSD) in the
target LSI MegaRaid SAS 3108 storage controller system and poll the erasing status asynchronously or
synchronously. For details, see 5.8.8 Secure Erasing Hard Disks in LSI MegaRaid SAS 3108 RAID Controller
(Single System).
Syntax:
Example:
SList.txt:
192.168.34.56
192.168.34.57
If the execution ”Status” field of a managed system is SUCCESS, the summary of securely erasing result of
the managed system will be shown in the “Execution Message” section of the managed system in the
created log file.
Note: In multiple systems, the synchronous mode is not supported. The --sync option is not
allowed to erase disk(s) on the LSI MegaRaid SAS 3108 RAID controller system.
To check the erasing status, get the task ID(s) existing in the log file created from securely erasing and Use
the “SecureEraseRaidHdd” command appended with the --tsk_id option.
Supermicro Update Manager User’s Guide 422
Syntax:
SecureEraseRaidHdd
Example:
--tsk_id 1,2,3
If the execution “Status” field for a managed system shows SUCCESS, the erasing status of the LSI
MegaRaid SAS 3108 RAID Controller systems will be shown in the “Execution Message” section of the
managed system in the created log file.
Use the “GetPMemInfo” command to get the PMem firmware image information from the managed
system as well as the input PMem firmware image. For details, see 5.8.9 Getting PMem Firmware Image
Information (Single System).
Syntax:
<filename>]
Example:
PMem.bin
SList.txt:
192.168.34.56
192.168.34.57
If the execution “Status” field for a managed system is SUCCESS, the BMC information of the managed
system will be shown in the “Execution Message” section of the managed system in the created log file.
Use the “UpdatePMem” command with a PMem firmware image PMem.bin to update the PMem of the
managed systems. For details on the command, see notes in 5.8.10 Updating the PMem Firmware Image
(Single System).
Syntax:
Example:
--reboot
SList.txt:
192.168.34.56
192.168.34.57
The execution progress for the managed system will be continuously updated to the “Execution Message”
section of the managed system in the created log file.
Use the “GetVROCCfg” command to get the current VROC settings from the managed systems and save
them separately for each managed system enumerated in the system list file. For details on using the
“GetVROCCfg” command, see the usage notes in 5.8.11 Getting VROC Settings (Single System).
Syntax:
sum -l <system list file> [-u <username> -p <password>] -c GetVROCCfg --file <
VROC.cfg.xml> [--overwrite]
Example:
VROC.cfg.xml --overwrite
SList.txt:
192.168.34.56
192.168.34.57
If the “Status” field for a managed system (e.g., 192.168.34.56) shows SUCCESS, its current settings are
stored in its output file, e.g., VROC.cfg.xml.192.168.34.56. The --overwrite option is used to force the
overwrite of the existing file, e.g., VROC.cfg.xml.192.168.34.56.
Notes:
Use the --individually option to update each managed system with the corresponding
configuration file concurrently. The --individually option is required for this command.
For details on the “ChangeVROCCfg” command, see the usage notes in 5.8.12
Updating VROC Settings (Single System).
Syntax:
<VROC.cfg.xml> --individually
Example:
VROC.cfg.xml --individually
SList.txt:
192.168.34.56
192.168.34.57
If the “Status” field for a managed system is SUCCESS, its VROC settings are updated.
If you want to update 192.168.34.56 and 192.168.34.57, you need to provide two files
VROC.cfg.xml.192.168.34.56 and VROC.cfg.xml.192.168.34.57, and then rename the --file argument as
Use the “GetAocNICInfo” command to get the add-on NIC firmware information from the managed system
as well as the add-on NIC local firmware image. The information will be the same as that in 5.9.1 Getting
Add-On NIC Firmware Image Information (Single System).
Syntax:
Example:
AOC_NIC.bin
SList.txt:
192.168.34.56
192.168.34.57
If the “Status” field for a managed system is SUCCESS, the add-on NIC information of the managed system
will be shown in the “Execution Message” section of the managed system in the created log file.
Use the “UpdateAocNIC” command with the add-on NIC firmware image AOC_NIC.bin to update the
managed system. For details, please see the usage notes in 5.9.2 Updating the Add-On NIC Firmware Image
(Single System).
Syntax:
Example:
SList.txt:
192.168.34.56
192.168.34.57
The execution results for the managed system will be the most updated in the “Execution Message”
section of the managed system in the created log file.
Use the “GetPsuInfo” command to get the current PSU information from the managed systems. The PSU
information output will be the same as that in 5.9.1 Getting PSU Information (Single System).
Syntax:
Example:
SList.txt:
192.168.34.56
192.168.34.57
If the execution “Status” field for a managed system is SUCCESS, the PSU information of the managed
system will be shown in the “Execution Message” section of the managed system in the created log file.
Use the “UpdatePsu” command with a signed PSU firmware image requested by OEM and PSU slave
address to run SUM to update the managed systems. For details on the UpdatePsu command, see the
notes in 5.9.2 Updating the Signed PSU Firmware Image Requested by OEM (Single System).
Syntax:
Example:
Note: To use “UpdatePsu” command for multiple systems, the slave addresses of PSUs that
need to be updated must be the same.
Use the “GetPowerStatus” command to get current power status of the managed system.
Syntax:
Example:
SList.txt:
192.168.34.56
192.168.34.57
If the execution “Status” field for a managed system is SUCCESS, the console output of the managed
system will be shown in the “Execution Message” section of the managed system in the created log file.
Use the “SetPowerAction” command to set the type of power action of the managed system.
Syntax:
action <action>
Example:
up
SList.txt:
192.168.34.56
192.168.34.57
If the execution “Status” field for a managed system is SUCCESS, the console output of the managed
system will be shown in the “Execution Message” section of the managed system in the created log file.
On X11 Intel® Xeon® Scalable Processors with Intel® C620 Series Chipsets and later platforms, use the
“GetTpmInfo” command to get the TPM module information from the managed system. For details on the
“GetTpmInfo” command, see the usage notes in 5.10.1 Getting TPM Information (Single System).
Syntax:
Example:
SList.txt:
192.168.34.56
192.168.34.57
If the execution “Status” field for a managed system is SUCCESS, the TPM module information of the
managed system will be shown in the “Execution Message” section of the managed system in the created
log file.
On X11 Intel® Xeon® Scalable Processors with Intel® C620 Series Chipsets and later platforms, use the
“TpmManage” command to execute SUM to enable TPM module capabilities for the managed system.
Before executing the command, the TPM module should be installed on the managed system. For details
on the “TpmManage” command, see the usage notes in 5.10.2 Provisioning TPM Module (Single System).
Syntax:
provision [options…]
Example:
--table_default --reboot
SList.txt:
192.168.34.56
192.168.34.57
If the execution “Status” field for a managed system is SUCCESS, the TPM provisioning procedure is
completed.
On platforms before X11 Intel® Xeon® Scalable Processors with Intel® C620 Series Chipsets, use the
“TpmProvision” command to enable TPM module capabilities for managed systems. Before executing the
Syntax:
image_url <URL> --reboot --lock <yes> [[--id <id for URL> --pw <password for
Example:
--lock yes
--lock yes
SList.txt:
192.168.34.56
192.168.34.57
smbpasswd.txt:
smbpasswd
If the execution “Status” field for a managed system is SUCCESS, its TPM capabilities are enabled.
On X11 Intel® Xeon® Scalable Processors with Intel® C620 Series Chipsets and later platforms, use the
“TpmManage” command with the options in the following table to provide TPM module capabilities from
the managed system. For detailes, see the usage notes in 5.10.3 Enabling and Clearing TPM Module
Capabilities (Single System).
--clear_dtpm Clears dTPM ownership and disables dTPM for TPM 1.2.
--clear_and_enable_dtpm Clears dTPM ownership, disables dTPM (for TPM 1.2 only) and activates
dTPM.
Syntax:
[--reboot]
Example:
--clear_and_enable_dtpm_txt --reboot
--clear_dtpm --reboot
--enable_txt_and_dtpm --reboot
--clear_and_enable_dtpm --reboot
--disable_dtpm --reboot
--disable_txt --reboot
SList.txt:
192.168.34.56
192.168.34.57
If the execution “Status” field for a managed system is SUCCESS, the TPM option is applied.
On platforms before X11 Intel® Xeon® Scalable Processors with Intel® C620 Series Chipsets, use the
“TpmProvision” command with options “--cleartpm and” --reboot to clear TPM module capabilities from
managed systems. For details on the “--cleartpm” option, see 5.10.3 Providing and Clearing TPM Module
Capabilities (Single System).
Syntax:
image_url <URL> [[--id <id for URL> --pw <password for URL>] | [--id <id for
Example:
reboot
cleartpm --reboot
192.168.34.56
192.168.34.57
smbpasswd.txt:
smbpasswd
If the execution “Status” field for a managed system is SUCCESS, its TPM capabilities are cleared.
Policy-Based Update (PBU) is used on updating BIOS for multiple managed systems. To run PBU, you need
to create a policy file in XML format so that a policy action is applied to each system. The policy actions
include “Update,” “Reupdate,” “OneFile” and “Ignore.”
Use the “UpdateBios” command with the BIOS firmware image Supermicro_BIOS.rom to update the
managed systems. For details on the “UpdateBios” command, see the usage notes in 5.3.2 Updating the
BIOS Image (Single System).
Syntax:
--precheck The --precheck option is deprecated and will be removed. Used with the
option --policy. The policy actions are not applied on corresponding managed
systems; this option only shows the parsing result, without execution.
policy_sample.xml --precheck
SList.txt:
192.168.34.56
192.168.34.57
policy_sample.xml:
The execution progress for the managed system will be continuously updated to the “Execution Message”
section in the log.
The policy file is in XML format. The XML root is FirmwareUpdatePolicy element. FirmwareUpdatePolicy
element contains one GeneralPolicy element, one GroupPolicy element and one IndividualPolicy element.
<FirmwareUpdatePolicy>
<GeneralPolicy>
</GeneralPolicy>
<GroupPolicy>
<Group ID="1">
</Group>
</GroupPolicy>
<IndividualPolicy>
<Individual ID="1">
</Individual>
</IndividualPolicy>
</FirmwareUpdatePolicy>
All GeneralPolicy element, Group element and IndividualPolicy element contain one BIOS element. The
BIOS element defines the policy action for this policy. For details of a policy action, refer to section 6.12.4
Policy Actions (Single System).
<GeneralPolicy>
<BIOS Policy="Ignore">
</GeneralPolicy>
Group element and Individual element contain their own key elements used as a matching rule. Any
system matching the rule will be applied to the corresponding policy action defined in BIOS element. For
details, refer to section 6.12.3 Matching Rules.
<Group ID="1">
<GroupKey>
<CustomerID></CustomerID>
<BoardProduct></BoardProduct>
<SystemProduct></SystemProduct>
</GroupKey>
<BIOS Policy="Ignore">
</BIOS>
<Group ID="2">
<Individual ID="2">
<IndividualKey>
<Address>255.255.255.255</Address>
</IndividualKey>
<BIOS Policy="Ignore">
</BIOS>
</Individual>
The following is a complete example. Users must modify some texts to provide the correct folder paths as
the file paths.
<?xml version="1.0"?>
<FirmwareUpdatePolicy>
<GeneralPolicy>
<BIOS Policy="Update">
</BIOS>
</GeneralPolicy>
<GroupPolicy>
<Group ID="1">
<GroupKey>
>
<!-- Key combine: Use AND operator to combine multiple keys. -->
<CustomerID></CustomerID>
<BoardProduct></BoardProduct>
<SystemProduct></SystemProduct>
<Unique Designation=""></Unique>
Supermicro Update Manager User’s Guide 444
<!—- Data in Unique Firmware File Name -->
of UFFN. -->
</GroupKey>
<BIOS Policy="Ignore">
</BIOS>
</Group>
<Group ID="2">
<GroupKey>
<CustomerID></CustomerID>
<BoardProduct></BoardProduct>
<SystemProduct></SystemProduct>
<Unique Designation=""></Unique>
</GroupKey>
<BIOS Policy="Ignore">
</BIOS>
</Group>
</GroupPolicy>
<IndividualPolicy>
<Individual ID="1">
<IndividualKey>
</IndividualKey>
<BIOS Policy="Ignore">
</BIOS>
</Individual>
<Individual ID="2">
<IndividualKey>
<Address>255.255.255.255</Address>
</IndividualKey>
<BIOS Policy="Ignore">
</BIOS>
</Individual>
</IndividualPolicy>
</FirmwareUpdatePolicy>
Each managed system should apply a policy action. The Individual elements, Group elements and
GeneralPolicy all contain their own policy actions. This section describles how SUM chooses the
appropriate policy action for a managed system.
When finding an appropriate policy action for a managed system, the Individual element has the highest
priority, then the Group element and finally the General element.
If the address of a managed system matches the address in IndividualKey element, then the managed
system applies the policy action of the Individual element.
If the data of a managed system matches the values in GroupKey element, then the manage system
applies the policy action of the Group element. A value is not used for comparison if it is empty. When
Supermicro Update Manager User’s Guide 446
comparing with the element values, all elements use the exact matching rule, except for the Unique
element, which applies a partial comparison with Unique Firmware File Name.
For example, in a system with Unquie Firmware File Name “BIOS_H12DSU-
1B54_20210118_2.0_STDsp,” the H12DSU-1B54 is compared with the value of Unique element, the
STD is compared with the Designation attribute.
If users want to update a system with UFFN “BIOS_H12ABC-1234-Ver-A_20210101_2.0_STDsp,” BIOS
image, and UFFN “BIOS_H12ABC-1234-Ver-B_20210110_2.0_STDsp,” but ignore the BIOS image with
UFFN “BIOS_H12ABC-1234-Special_20210120_2.0_STDsp,” they can set the Unique element with the
H12ABC-1234-Ver value.
When users only update BIOS from STD to STD, they can set the Designation attribute to “STD,” and
SUM will ignore any OEM image, and vice versa.
If a managed system does not match any Individual element or Group element, then it applies the
policy action of the General element.
Ignore: Any system matched the policy will be ignored in the updating process. No action is taken on
the system.
Update: Any system matched the policy will be updated with the newest matched BIOS image in the
target folder. The target folder path is the text of Folder element.
Reupdate: Any system matched the policy will be updated with the same build date BIOS image if the
BIOS image is available in the target folder. The target folder path is the text of Folder element.
OneFile: Any system matched the policy will be updated with the BIOS image specified in the File
element.
The “Update” and “Reupdate” rules use the value of Folder element. The “OneFile” rule uses the value of
File element. Each BIOS element has its own Folder element and File element; you can store BIOS files in
different folders.
Example
<BIOS Policy="Update">
<Folder>/home/</Folder>
<File>/home/</File>
</BIOS>
When running PBU, SUM generates a file named “record.cache” in the used folders listed in the policy file
in XML format. The cache file stores parsing result of BIOS files in the folder. This cache file can reduce the
parsing time required for next execution.
You can remove /add files to BIOS file folders; however, a cache file cannot be updated when an existing
BIOS file is changed, or a file is replaced with a different one. When this happens, SUM may get wrong BIOS
information from the cache file, and BIOS file mis-matched in update stage.
To prevent this problem, you can remove the cahce file in the folder if necessary, and SUM will rebuild the
cache again in the next run.
To remove all cache files in current folder and sub folders in Linux, you can run the following commands.
Notes:
Do not put the non BIOS image files of these sizes, including 16 Mbytes, 32 Mbytes and
64Mbytes in folders used in PBU.
A failure to parse BIOS image files will be treated as an error. And SUM treats files with
data size of 16 Mbytes, 32 Mbytes and 64 Mbytes as BIOS image files.
All occurred errors are listed in SUM. When a critical error occurs, its warning message immediately
appears. Two examples below illustrate how errors are shown on screen.
Use the “GetGpuInfo” command to get the current GPU information from the managed systems. The GPU
information output will be the same as that in 5.12.1 Getting GPU Information (Single System).
Syntax:
Example:
SList.txt:
192.168.34.56
192.168.34.57
If the “Status” field of a managed system is SUCCESS, the GPU information of the managed system will be
shown in the “Execution Message” section of the managed system in the created log file.
Use the “UpdateGpu” command with CEC/FPGA of GPU firmware image to run SUM to update the GPU
firmware of a managed system. For details, please see the usage notes in 5.12.2 Updating the GPU
Firmware Image (Single System).
Syntax:
Example:
file GPU_FPGA.bin
SList.txt:
192.168.34.56
192.168.34.57
The execution progress for the managed system will be continuously updated to the “Execution Message”
section of the managed system in the created log file.
Use the “GetCpldInfo” command to get the CPLD firmware image information from the managed system as
well as the input CPLD firmware image. For details, see 5.12.1 Getting CPLD Firmware Image Information
(Single System).
Syntax:
<filename>]
Example:
CPLD.bin
SList.txt:
192.168.34.56
192.168.34.57
If the execution “Status” field for the managed system is SUCCESS, the BMC information of the managed
system will be shown in the “Execution Message” section of the managed system in the created log file.
Use the “UpdateCpld” command with the CPLD firmware image CPLD.bin to update the CPLD of managed
systems. For details, see notes in 5.12.2 Updating the CPLD Firmware Image (Single System).
Syntax:
<filename> --reboot
Example:
CPLD.bin
SList.txt:
192.168.34.56
192.168.34.57
The execution progress for the managed system will be continuously updated to the “Execution Message”
section of the managed system in the created log file.
Use the “GetAipCpldInfo” command to get the current AIP CPLD information from the managed systems
installed with AIP. The AIP CPLD information output will be the same as that in 5.14.1 Getting AIP CPLD
Information (Single System).
Syntax:
Example:
SList.txt:
192.168.34.56
192.168.34.57
If the “Status” field of a managed system is SUCCESS, the AIP CPLD information of the managed system will
be shown in the “Execution Message” section of the managed system in the created log file.
Use the “UpdateAipCpld” command with a given AIP CPLD firmware image to run SUM to update the AIP
CPLD firmware of a managed system with AIP installed. For details, see the notes in 5.14.2 Updating the AIP
CPLD Firmware Image (Single System).
Syntax:
<filename>
Example:
AIP_CPLD.bin
SList.txt:
192.168.34.56
192.168.34.57
The execution progress for the managed system will be continuously updated to the “Execution Message”
section of the managed system in the created log file.
SUM supports profile management for multiple Blade systems. For more details, see 5.14.2 Profile
Management.
SUM supports updating CMM configurations for multiple Blade systems through the existing CMM profiles
on CMM. For more details, see 5.14.3 Updating CMM Configurations.
SUM supports updating system configurations for multiple Blade systems through the existing system
profiles on the CMM. For more details, see 5.14.4 Update Blade configurations.
0 Successful
Others Failed
2 Unknown option
3 Missing argument
4 No host IP/user/password
5 Missing option
6 Unknown command
7 Option conflict
10 Host is unknown
Notes:
When using the in-band commands with the --reboot option through SSH connection
to the managed OS, SSH connection would be closed by the managed OS when the
system starts to reboot.
Exit code 66-77 is replaced with exit code 60 62 64 65 in version 2.5.0.
[ System Checks ]
CheckOOBSupport Yes Yes Not Required
CheckAssetInfo Yes No Required
CheckSystemUtilization Yes No Required
CheckSensorData Yes No Not Required
Both SFT-DCMS-SINGLE
ServiceCalls Yes Yes and SFT-DCMS-SVC-KEY
are required.
SystemPFA Yes Yes Required
MemoryHealthCheck Yes Yes Required
[ Key Management ]
ActivateProductKey Yes Yes Not Required
QueryProductKey Yes Yes Not Required
[ BIOS Management ]
Required for remote usage
on H12 non-RoT systems
UpdateBios (without --preserve_setting) Yes Yes
and platforms before
H12/X12
UpdateBios (with --preserve_setting) Yes Yes Required
GetBiosInfo Yes Yes Not Required
GetDefaultBiosCfg Yes Yes Required
GetCurrentBiosCfg Yes Yes Required
Required
ChangeBiosCfg Yes Yes SFT-DCMS-SINGLE for
some configuration items
LoadDefaultBiosCfg Yes Yes Required
GetDmiInfo Yes Yes Required
EditDmiInfo Yes Yes Required
ChangeDmiInfo Yes Yes Required
SetBiosAction Yes Yes Required
SetBiosPassword Yes Yes Required
EraseOAKey Yes Yes Not Required
SFT-DCMS-SINGLE is
BiosRotManage Yes Yes required for Recover and
DownloadEvidence actions
[ BMC Management ]
UpdateBmc Yes Yes Not Required
GetBmcInfo Yes Yes Not Required
GetBmcCfg Yes Yes Required
ChangeBmcCfg Yes Yes Required
LoadDefaultBmcCfg Yes Yes Not Required
SetBmcPassword Yes Yes Not Required
GetLockdownMode Yes Yes SFT-DCMS-SINGLE only
SetLockdownMode Yes No SFT-DCMS-SINGLE only
GetKcsPriv Yes Yes Required
SetKcsPriv Yes No Required
SFT-DCMS-SINGLE is
BmcRotManage Yes Yes required for Recover and
DownloadEvidence actions.
Both SFT-DCMS-SINGLE
and SFT-SDDC-SINGLE are
Attestation Yes Yes
required for action
Compare.
[ System Event Log ]
GetEventLog Yes Yes Required
ClearEventLog Yes Yes Required
GetMaintenEventLog Yes Yes Not Required
GetHostDump Yes Yes SFT-DCMS-SINGLE only
ClearMaintenEventLog Yes Yes Not Required
[ CMM Management ]
UpdateCmm Yes No Not Required
GetCmmInfo Yes Yes Not Required
GetCmmCfg Yes No Not Required
ChangeCmmCfg Yes No Not Required
LoadDefaultCmmCfg Yes No Not Required
SetCmmPassword Yes No Not Required
GetBbpInfo Yes No Not Required
UpdateBbp Yes No Not Required
GetBladePowerStatus Yes No Not Required
SetBladePowerAction Yes No Not Required
ProfileManage Yes No Not Required
General Limitations
• For the --reboot option in OOB usage, if the target OS does not support software shutdown, system
will be forced to power off and on again.
• The --post_complete option is designed for the system to wait for the managed system POST to
complete and requires both BMC and BIOS. However, when the managed system lacks support
from BIOS, no futher actions from SUM will be carried out even after the managed system POST is
complete.
• All in-band commands through KCS on Windows require SD5 to be removed.
BIOS Management
• The OOB UpdateBios command is not supported on motherboards that implement client ME such
as X11SAE-F, X11SAT-F, X11SSZ-(Q)F/LN4F, X11SRM-VF, X11SBA-(LN4)F, X11SPA and X11SRi-IF. In
addition, it is not supported on C7-series platforms.
• X9DRL-iF/3F MB does not support OOB BIOS update and OOB/in-band DMI information related
commands.
• With the Server ME embedded on the Supermicro system, the execution of the in-band command
“UpdateBios” might fail when the Client ME driver (MEIx64) is installed on Windows.
• The ChangeBiosCfg command will show error messages if the current BIOS configuration is different
from the generated BIOS XML configuration file.
• BIOS XML configuration requires a text editor supporting extended ASCII characters (ISO-8859-1
encoding).
• The SW-managed JPME2 feature to update FDT in ME region is NOT supported on the following
MBs: X11DDW-L/N(T) Revision 1.10, X11DPH-T-P Revision 1.00, X11DPL-I-P Revision 1.01, X11DPU-
X(LL) Revision 1.01. Note that the earlier revisions of those four MBs are not supported either.
• A1SRi/A1SAi MB does not support OOB BIOS update.
• Prevent BIOS downgrade if the ME version of current BIOS is greater than 4.0.4.294 and the ME
version of updating BIOS is smaller than or equal to 4.0.4.294.
• Cascade Lake CPU only supports BIOS update of ME version 4.1 or higher version.
• TUI does not support mouse operation.
• OOB BIOS update on B1SA4, B11SRE and B11SCG-ZTF requires AC cycle.
• In-band BIOS update through KCS is not supported on an AMI platform.
• The format mm/dd/yy or mm/dd/yyyy is required for build date in DMI information.
• System will be powered off during BIOS update process on X12/H12 and later RoT platforms.
• The erase OA key function is not supported on the platforms before X12/H12.
• Neither updating BIOS In-band from version 1.x to 2.x, nor downgrading BIOS from version 2.x to
1.x on H12 non-RoT platforms through SMI is supported.
• BIOS updated PMem related configuration, command UpdatePMem with option --
restore_default_fw cannot be supported for BIOS after 2022/08/04.
• BIOS updated PMem related configuration, commands GetCurrentBiosCfg, GetDefaultBiosCfg and
BMC Management
• The UpdateBmc in-band command does not support the AMI BMC firmware image.
• The GetBmcCfg and ChangeBmcCfg in-band commands in Windows do not support a hostname that
exceeds 244 bytes.
• The UpdateBmc in-band command on FreeBSD OS will be slow caused by KCS driver of FreeBSD.
• The LAN table in a BMC configuration file is read-only for OOB usage if BMC does not support
Redfish.
• For in-band and OOB usages, the file formats for getting BMC settings may be different. Be careful
of not misusing them.
Applications
• MountFloppyImage and UnmountFloppyImage commands do not support the X9 platforms.
• When dynamically enabling a USB port by the SetUsbAccessMode command, USB 3.0 devices may
need to be manually unplugged and plugged back in to be available.
• The function of mounting ISO through IPv6 is not available on H12 AST2500 non-RoT platforms and
versions before X12/H12.
PSU Management
• The UpdatePsu command only supports PSU “PWS-2K04A-1R” and “PWS-2K20A-1R.”
• The UpdatePsu command does not support multiple OOB usages.
TPM Management
• The TpmProvision command does not support TPM 2.0 on Grantley.
• The TpmProvision command does not support on the platforms after Purley.
• While executing the UpdateBIOS/In-Band TpmManage commands, manual steps are required
under some special cases. Instructions will be provided to continue these commands.
GPU Management
• The GetGpuInfo command only supports NVIDIA GPU.
Key Management
• When activating JSON format key in Windows, the JSON key string cannot contain any spaces.
System Check
• You cannot access any cache files on mounted file systems with the ServiceCalls command.
E.1 Numeric
In Information, it contains the maximum value “MaxValue”/minimum value “MinValue,” default value, and
the amount to increase or decrease the value when a user requests a value change (StepSize) each time.
“numericValue” is the value that you want to apply to BIOS setting. “Help” contains the explanation to the
setting.
<Information>
<MaxValue>32767</MaxValue>
<MinValue>0</MinValue>
<StepSize>1</StepSize>
<DefaultValue>10</DefaultValue>
<Help><![CDATA[Correctable Error Threshold (1 - 32767) used for sparing,
tagging, and leaky bucket]]></Help>
</Information>
</Setting>
3. Change the “numericValue” value in “Correctable Error Threshold.” In this example, the value is
changed from 10 to 20.
type="Numeric">
4. Save the XML file and then execute the “ChangeBiosCfg” command.
E.2 CheckBox
In CheckBox, the allowed input value in “checkedStatus” would be marked as “Checked” or “Unchecked.”
“checkedStatus” is the value that you want to apply to BIOS setting. “Help” contains the explanation to the
setting.
<!--Checked/Unchecked-->
<Information>
<DefaultStatus>Checked</DefaultStatus>
<Help><![CDATA[Enable or Disable Serial Port (COM)]]></Help>
<WorkIf><![CDATA[]]></WorkIf>
</Information>
</Setting>
3. Change the “checkedStatus” value in “Serial Port 1.” In this example, the value is changed from
Checked to Unchecked.
4. Save the XML file and then execute the “ChangeBiosCfg” command.
<Information>
<AvailableOptions>
</AvailableOptions>
<DefaultOption>Do Nothing</DefaultOption>
</Information>
</Setting>
3. Change “selectedOption” from “Do Nothing” to “Erase Immediately.” Notice that there is “WorkIf”
dependency “( 0 != SMBIOS Event Log )” indicating that this setting is valid and can be modified only
when the expression is evaluated true. That is, it is required to check the current value of setting
“SMBIOS Event Log” as shown below.
<Information>
<AvailableOptions>
<Option value="0">Disabled</Option>
<Option value="1">Enabled</Option>
<DefaultOption>Enabled</DefaultOption>
</Information>
</Setting>
4. In “SMBIOS Event Log”, the selectedOption is “Disabled” which corresponds to the value 0. In other
words, it makes the expression “( 0 != SMBIOS Event Log )” false. In order to make it true, the
selectedOption should be modified to “Enabled” as shown below.
5. Save the XML file and then execute the command “ChangeBiosCfg.” After reboot, the “When Log is
Full” should be changed to “Erase Immediately.”
<Information>
<MinSize>3</MinSize>
<MaxSize>20</MaxSize>
<HasPassword>False</HasPassword>
</Information>
<NewPassword><![CDATA[]]></NewPassword>
<ConfirmNewPassword><![CDATA[]]></ConfirmNewPassword>
</Setting>
<Information>
<MinSize>0</MinSize>
<MaxSize>15</MaxSize>
<DefaultString></DefaultString>
<AllowingMultipleLine>False</AllowingMultipleLine>
<LicenseRequirement>SFT-DCMS-SINGLE</LicenseRequirement>
</Information>
<StringValue><![CDATA[255.255.255.255]]></StringValue>
</Setting>
<StringValue><![CDATA[127.0.0.1]]></StringValue>
4. Save the XML file and then execute the command “ChangeBiosCfg.”
SUM is allowed to upload files to BIOS, such as a TLS Certificate. In this case, there will be a comment <!--
file path to load file--> under <StringValue> to indicate that file path should be filled. When executing the
“ChangeBiosCfg”command, SUM will load the file from system and upload it to BIOS. The following
example is the setting of TLS upload:
<Information>
<MinSize>0</MinSize>
<MaxSize>255</MaxSize>
<DefaultString></DefaultString>
<AllowingMultipleLine>False</AllowingMultipleLine>
<LicenseRequirement>SFT-DCMS-SINGLE</LicenseRequirement>
</Information>
<StringValue><![CDATA[]]></StringValue>
</Setting>
Currently, the known BIOS feature categories requiring SFT-DCMS-SINGLE license are listed below:
• Lockdown Mode
• Security Erase related configuration
• KMIP related configuration
• PMem related configuration
• HTTP BOOT TLS certificate related configuration
Example:
<Information>
<AvailableOptions>
<Option value="0">Disabled</Option>
<Option value="1">Enabled</Option>
</AvailableOptions>
<DefaultOption>Disabled</DefaultOption>
<LicenseRequirement>SFT-DCMS-SINGLE</LicenseRequirement>
</Information>
</Setting>
Supermicro Update Manager User’s Guide 478
The supported versions and limitations are summarized in the table.
SUM 2.6.0 and Later SUM 2.5.x SUM 2.4.0 and Before
Take effect May not take effect
Managed System With Not take effect
without a warning
SFT-DCMS-SINGLE No warning message
message
Not take effect Not take effect
Managed System Without Output SFT-DCMS-SINGLE May not output SFT- Not take effect
SFT-DCMS-SINGLE license required message DCMS-SINGLE license No warning message
required message
For SUM 2.4.0 and before, none of license SFT-DCMS-SINGLE required BIOS settings can be changed
through SUM. Due to known limitation in SUM 2.5.x, even license SFT-DCMS-SINGLE is activated, SFT-
DCMS-SINGLE required BIOS settings may not be able to change through SUM. To fully support, please use
SUM 2.6.0 (or later) and pair with the feature supported BIOS. You must ensure that the activated product
key level is greater than or equal to the license requirement to change license required BIOS settings. You
can query the existed product key by QueryProductKey command, see 5.1.2 Querying the Node Product
Keys. If the activated product key level is less than the license requirement, you can activate another
product key by ActivateProductKey command, see 5.1.1 Activating a Single Managed System.
<Menu name="Advanced">
</Setting>
</Setting>
</Menu>
</Menu>
</Setting>
</Menu>
</Menu>
<Menu name="Boot">
<Setting name=" Add boot option" type="String">
<StringValue><![CDATA[]]></StringValue>
</Setting>
</Menu>
<Menu name="Security">
<NewPassword><![CDATA[]]></NewPassword>
<ConfirmNewPassword><![CDATA[]]></ConfirmNewPassword>
</Setting>
</Menu>
</BiosCfg>
The first line is an XML declaration header. SUM specifies the encoding method as ISO-8859-1. If the text
editor fails to deploy the encoding method ISO-8859-1, extended ASCII characters in a configuration file
may be lost after the file is saved.
<BiosCfg> in the second line is the BIOS configuration root. In other words, SUM only attempts to parse
child tags enclosed in <BiosCfg>. Within <BiosCfg>, the direct child tag must be <Menu>.
The <Menu> hierarchy represents the menu path in the BIOS configuration. Every setting has a menu path
and the <Menu> hierarchy structure should always match. For example, the menu path for the setting
“Quiet Boot” is “Advanced”->“Boot Feature”. If “Advanced” is removed, SUM will try to find the match for
“Quiet Boot” in the menu path “Boot Feature.” Since the menu item “Boot Feature” is not in the first level
of menu hierarchy in BIOS configuration in the managed system, an exception will be thrown.
In addition, for <Menu>, the attributes “name” and “order” (if applicable) should not be changed or
removed. If any changes are made, a setting in the menu path will fail to match and SUM will export error
messages. Similarly, for <Setting>, the attributes “name,” “order” (if applicable) and “type” should not be
changed or removed. SUM will fail to identify a setting if those are changed.
In contrast, for the settings Option, CheckBox and Numeric, you can change the current values in the
attributes “selectedOption,” “checkStatus” and “numericValue,” respectively. For the String setting, you
can change the current contents in the child tag <StringValue>. For the Password setting, you can change
the current password in the child tags <CurrentPassword> (if applicable), <NewPassword> and
<ConfirmNewPassword>.
Syntax:
[shell]# sudo yum install <utility_name>
Syntax:
[shell]# sudo mokutil --sb-state
Example:
3. Check the OS keyring. The SUM output in the example below is from a Linux system where UEFI
Secure Boot is enabled.
Syntax:
[shell]# sudo keyctl list %:.system_keyring
Example:
Example:
[ req ]
default_bits = 4096
distinguished_name = req_distinguished_name
prompt = no
string_mask = utf8only
x509_extensions = myexts
[ req_distinguished_name ]
[ myexts ]
basicConstraints=critical,CA:FALSE
keyUsage=digitalSignature
subjectKeyIdentifier=hash
authorityKeyIdentifier=keyid
Note: To create a key pair, a configuration file is needed. You can copy and paste the
example above to create and name a configuration file as "configuration_file.config." Then
modify the following variables in the configuration file.
<Your key name>: the key name
<Your e-mail>: the e-mail address
Syntax:
[shell]# sudo openssl req -x509 -new -nodes -utf8 -sha256 -days <days> -batch \
<private_key.priv>
Example:
6. Add your public key to the MOK list by using Linux mokutil.
Syntax:
[shell]# sudo mokutil --import public_key.der
Notes:
You will be asked to enter and confirm a password for this MOK enrollment request.
public_key.der: the generated public key file.
Example:
Note: The MOK management main screen will appear immediately after reboot and last for
10 seconds. Please press any key as soon as you are under MOK management. If you miss
this step, you will need to repeat step 6.
Note: You can view your enrolled key by selecting View key 0.
<space> ` ! @ # $ % ^
& * ( ) - _ = +
[ { ] } \ | ; :
‘ “ , < . > / ?
~ ` ! @ # $ % ^
& * ( ) - _ = +
[ { ] } \ | ; ,
< . > / ?
! $ % & ( ) * +
. / < = > ? @ [
\ ] ^ _ ` { | }
~ - : , ; #
[ System Checks ]
CheckOOBSupport Yes
CheckAssetInfo Yes
CheckSystemUtilization Yes
CheckSensorData Yes
ServiceCalls No
SystemPFA No
MemoryHealthCheck No
[ Key Management ]
ActivateProductKey No
QueryProductKey Yes
[ BIOS Management ]
UpdateBios (without --
No
preserve_setting)
UpdateBios (with --
No
preserve_setting)
GetBiosInfo Yes
GetDefaultBiosCfg Yes
GetCurrentBiosCfg Yes
ChangeBiosCfg No
LoadDefaultBiosCfg No
GetDmiInfo Yes
EditDmiInfo Yes
ChangeDmiInfo No
SetBiosAction No
SetBiosPassword No
EraseOAKey No
BiosRotManage No
TimedBmcReset No
[ BMC Management ]
UpdateBmc No
GetBmcInfo Yes
GetBmcCfg Yes
ChangeBmcCfg No
SetBmcPassword No
GetKcsPriv Yes
1. The file STGF2S3B3_NUP.zip on the managing system is copied to the /tmp/STGF2S3B3_NUP.zip path
on the remote system.
2. The working directory is changed to /tmp/ to access the files under /tmp/ in a relative path.
3. The “unzip -o STGF2S3B3_NUP.zip” file uncompresses and overwrites the existing files.
4. The working directory is changed to STGF2S3B3_NUP.
5. Both “chmod +x LLDP_EN.sh” and “chmod +x nvmupdate64e” files make the files executable.
6. LLDP_EN(.sh) is an update script from the vendor, nvmupdate64e is the binary to update the firmware,
and nvmupdate.cfg is the configuration file required for nvmupdate64e. The “./LLDP_EN.sh” file will
call nvmupdate64e with nvmupdate.cfg (relative path in STGF2S3B3_NUP) to update the NIC firmware.
Both packages are designated for NVIDIA HGX A100 systems with 40 or 80GB memory size GPU firmware
updating.
The script package contains scripts and config.txt. SUM would use “startup_INB.sh” and “function.sh” for
INB update usage. Also, “startup.sh” would call other NVIDIA tools and firmware version with variables
defined in “config_INB.txt”.
./sum -I Remote_INB -c RemoteExec --oi <OS_IP> --ou <OS_User> --op <OS_Password> --file
“HGXA100.tar.gz” --remote_cmd " cd /tmp/ && tar -zxvf HGXA100.tar.gz && cd HGXA100/A100_v0.5"
sleep 5
./sum -I Remote_INB -c RemoteExec --oi <OS_IP> --ou <OS_User> --op <OS_Password> --remote_cmd " cd
/tmp/HGXA100/A100_v0.5 && chmod +x functions.sh && source ./functions.sh &&
_generate_firmware_info "
sleep 5
./sum -I Remote_INB -c RemoteExec --oi <OS_IP> --ou <OS_User> --op <OS_Password> --remote_cmd " cd
/tmp/HGXA100/A100_v0.5 && ./startup_INB.sh"
# Cmd4: OOB Update for CEC or FPGA. (This command will use other SUM command, UpdateGpuFw)
./sum -i <BMC_IP> -u <BMC USER> -p <BMC_PWD> -c UpdateGpu --item <CEC | FPGA> --file <CEC | FPGA
file image path>
Note: User can also use “SUM_UpgradeGPU_MMscript.sh” under “SUM folder/script/” for
upgrading multiple GPU systems.
Europe
Address: Super Micro Computer B.V.
Het Sterrenbeeld 28, 5215 ML
's-Hertogenbosch, The Netherlands
Tel: +31 (0) 73-6400390
Fax: +31 (0) 73-6416525
Email: sales@supermicro.nl (General Information)
support@supermicro.nl (Technical Support)
rma@supermicro.nl (Customer Support)
Website: www.supermicro.nl
Asia-Pacific
Address: Super Micro Computer, Inc.
3F, No. 150, Jian 1st Rd.
Zhonghe Dist., New Taipei City 235
Taiwan (R.O.C.)
Tel: +886-(2) 8226-3990
Fax: +886-(2) 8226-3992
Email: support@supermicro.com.tw
Website: www.supermicro.com.tw