Idrac6 Enterprise for Blade Servers Version 2.2 User Guide

Total Page:16

File Type:pdf, Size:1020Kb

Idrac6 Enterprise for Blade Servers Version 2.2 User Guide Integrated Dell™ Remote Access Controller 6 (iDRAC6) Enterprise for Blade Servers Version 2.2 User Guide Notes and Cautions NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION: A CAUTION indicates potential damage to hardware or loss of data if instructions are not followed. __________________ Information in this document is subject to change without notice. © 2009 Dell Inc. All rights reserved. Reproduction of these materials in any manner whatsoever without the written permission of Dell Inc. is strictly forbidden. Trademarks used in this text: Dell, the DELL logo, OpenManage, and PowerEdge are trademarks of Dell Inc.; Microsoft, Windows, Windows Server, Internet Explorer, MS-DOS, Windows Vista, ActiveX, and Active Directory are either trademarks or registered trademarks of Microsoft Corporation in the United States and/or other countries; Red Hat and Red Hat Enterprise Linux are registered trademarks of Red Hat, Inc. in the United States and other countries; Novell and SUSE are registered trademarks of Novell, Inc. in the United States and other countries; Intel is a registered trademark of Intel Corporation in the U.S. and other countries; UNIX is a registered trademark of The Open Group in the United States and other countries; Thawte is a registered trademark of Thawte and its affiliated and subsidiaries in the United States and in foreign countries; VeriSign is a registered trademark of VeriSign, Inc. and its subsidiaries in the United States and in foreign countries; Sun and Java are trademarks or registered trademarks of Sun Microsystems, Inc. or its subsidiaries in the United States and other countries. Copyright 1998-2009 The OpenLDAP Foundation. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted only as authorized by the OpenLDAP Public License. A copy of this license is available in the file LICENSE in the top-level directory of the distribution or, alternatively, at www.OpenLDAP.org/license.html. OpenLDAP is a registered trademark of the OpenLDAP Foundation. Individual files and/or contributed packages may be copyrighted by other parties and subject to additional restrictions. This work is derived from the University of Michigan LDAP v3.3 distribution. This work also contains materials derived from public sources. Information about OpenLDAP can be obtained at www.openldap.org/. Portions Copyright 1998-2004 Kurt D. Zeilenga. Portions Copyright 1998-2004 Net Boolean Incorporated. Portions Copyright 2001-2004 IBM Corporation. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted only as authorized by the OpenLDAP Public License. Portions Copyright 1999-2003 Howard Y.H. Chu. Portions Copyright 1999-2003 Symas Corporation. Portions Copyright 1998-2003 Hallvard B. Furuseth. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that this notice is preserved. The names of the copyright holders may not be used to endorse or promote products derived from this software without their specific prior written permission. This software is provided "as is'' without express or implied warranty. Portions Copyright (c) 1992-1996 Regents of the University of Michigan. All rights reserved. Redistribution and use in source and binary forms are permitted provided that this notice is preserved and that due credit is given to the University of Michigan at Ann Arbor. The name of the University may not be used to endorse or promote products derived from this software without specific prior written permission. This software is provided "as is'' without express or implied warranty. Other trademarks and trade names may be used in this document to refer to either the entities claiming the marks and names or their products. Dell Inc. disclaims any proprietary interest in trademarks and trade names other than its own. December 2009 Contents 1 iDRAC6 Enterprise Overview . 27 IPv6 Ready Logo Certification . 28 iDRAC6 Security Features . 28 iDRAC6 Enterprise and VFlash Media . 29 Supported Platforms . 31 Supported Operating Systems . 31 Supported Web Browsers . 31 Supported Remote Access Connections . 32 iDRAC6 Ports . 32 Other Documents You May Need . 33 2 Configuring iDRAC6 Enterprise . 37 Before You Begin . 37 Interfaces for Configuring iDRAC6 . 37 Configuration Tasks . 41 Configure the Management Station . 41 Configure iDRAC6 Networking . 41 Configure iDRAC6 Users . 42 Configure Directory Services. 42 Configure IP Filtering and IP Blocking . 42 Contents 3 Configure Platform Events . 43 Enabling or Disabling Local Configuration Access . 43 Configure iDRAC6 Services . 43 Configure Secure Sockets Layer (SSL) . 44 Configure Virtual Media. 44 Configure a VFlash Media Card. 44 Install the Managed Server Software . 44 Configure the Managed Server for the Last Crash Screen Feature . 44 Configuring Networking Using CMC Web Interface . 45 Launching iDRAC6 Web Interface From CMC . 45 Configuring Networking for iDRAC6 . 47 Viewing FlexAddress Mezzanine Card Fabric Connections . 48 FlexAddress MAC for iDRAC6 . 48 Remote Syslog . 50 Remote File Share . 51 Updating iDRAC6 Firmware . 53 Downloading the Firmware or Update Package . 54 Executing the Firmware Update . 54 Verifying the Digital Signature for Linux DUPs . 55 Using iDRAC6 Web Interface . 58 Updating iDRAC6 Firmware Using RACADM . 60 Using the DOS Update Utility . 60 Clear Your Browser’s Cache . 61 4 Contents Updating the USC Repair Package . 61 Configuring iDRAC6 For Use With IT Assistant. 61 Using iDRAC6 Configuration Utility to Enable Discovery and Monitoring. 61 Using iDRAC6 Web Interface to Enable Discovery and Monitoring . 62 Using IT Assistant to View iDRAC6 Status and Events . 64 3 Configuring the Management Station . 65 Management Station Set Up Steps . 65 Management Station Network Requirements . 65 Configuring a Supported Web Browser . 66 Opening Your Web Browser . 66 Configuring Your Web Browser to Connect to the Web Interface . 66 Adding iDRAC6 to the List of Trusted Domains . 69 Viewing Localized Versions of the Web Interface . 70 Setting the Locale in Linux . 71 Disabling the Whitelist Feature in Firefox . 72 Contents 5 Installing iDRAC6 Software on the Management Station . 72 Installing and Uninstalling RACADM on a Management Station . 73 Installing and Uninstalling RACADM on Linux . 73 Installing a Java Runtime Environment (JRE) . 73 Installing Telnet or SSH Clients . 74 Telnet with iDRAC6 . 75 Configuring the Backspace Key For Telnet Sessions . 75 SSH With iDRAC6 . 76 Installing a TFTP Server . 77 Installing Dell OpenManage IT Assistant . 78 Installing Dell Management Console . 78 4 Configuring the Managed Server . 79 Installing the Software on the Managed Server . 79 Configuring the Managed Server to Capture the Last Crash Screen . 80 Disabling the Windows Automatic Reboot Option . 81 5 Configuring iDRAC6 Enterprise Using the Web Interface . 83 Accessing the Web Interface . 84 Logging In . 84 Logging Out . 85 6 Contents Using Multiple Browser Tabs and Windows . 85 Configuring iDRAC6 NIC . 86 Configuring the Network, IPMI and VLAN Settings . 86 Configuring IP Filtering and IP Blocking . 91 Configuring Platform Events . 92 Configuring Platform Event Filters (PEF) . 93 Configuring Platform Event Traps (PET) . 94 Configuring E-Mail Alerts. 94 Configuring IPMI Over LAN . 96 Adding and Configuring iDRAC6 Users . 97 Public Key Authentication over SSH . 97 Securing iDRAC6 Communications Using SSL and Digital Certificates . 104 Secure Sockets Layer (SSL) . 105 Certificate Signing Request (CSR) . 105 Accessing the SSL Main Menu . 106 Generating a New Certificate Signing Request . 107 Uploading a Server Certificate . 108 Viewing a Server Certificate . 109 Configuring and Managing Microsoft Active Directory Certificates . 110 Configuring Active Directory (Standard Schema and Extended Schema) . 111 Viewing an Active Directory CA Certificate . 117 Enabling or Disabling Local Configuration Access. 117 Enabling Local Configuration Access . 117 Disabling Local Configuration Access . 118 Contents 7 Configuring iDRAC6 Services . 118 Updating iDRAC6 Firmware . 120 Updating iDRAC6 Firmware Using CMC . 121 iDRAC6 Firmware Rollback . 122 6 Using iDRAC6 Directory Service . 125 Using iDRAC6 With Microsoft Active Directory. 125 Prerequisites for Enabling Active Directory Authentication for iDRAC6 . 126 Supported Active Directory Authentication Mechanisms . 126 Extended Schema Active Directory Overview . 127 Extending the Active Directory Schema . 127 Active Directory Schema Extensions. 127 Overview of iDRAC6 Schema Extensions. 128 Active Directory Object Overview . 128 Accumulating Privileges Using Extended Schema. 130 Configuring Extended Schema Active Directory to Access iDRAC6 . 131 Installing the Dell Extension to the Active Directory Users and Computers Snap-In . 137 Adding iDRAC6 Users and Privileges to Active Directory . 138 Configuring Microsoft Active Directory With Extended Schema Using iDRAC6 Web Interface . 140 Configuring Active Directory With Extended Schema Using RACADM . 142 8 Contents Standard Schema Active Directory Overview . 144 Single Domain Versus Multiple Domain Scenarios . 146 Configuring Standard Schema Active Directory to Access iDRAC6 . 147 Configuring Active Directory With Standard Schema Using iDRAC6 Web Interface . 147 Configuring Active Directory With Standard Schema Using RACADM . 150 Testing Your Configurations . 153 Enabling
Recommended publications
  • Restoration Onto Different Hardware (PDF)
    Restoration onto different Hardware Quick and easy system restore with O&O DiskImage Table of contents System restoration using boot media ...................................................................................... 1 Restoration onto different hardware ....................................................................................... 2 Limitations when restoring onto different hardware ................................................................................................................. 3 Automatic update............................................................................................................................... ............................................. 3 Manual adaptation .......................................................................................................................................................................... 4 Enable automatic adaptation on changed hardware (M.I.R.) .................................................................................................... 4 Assistance when error messages occur during booting .......................................................... 7 I System restoration using boot media Disks where you save your private and business data can be quickly imaged and restored in the event of a crash or hardware damage. Creating an image of your entire computer or the system partition is also very easy. To restore an image of a Windows system, you’ll need to start O&O DiskImage directly from a bootable medium *. *Note You’ll need to
    [Show full text]
  • Ubuntu Kung Fu
    Prepared exclusively for Alison Tyler Download at Boykma.Com What readers are saying about Ubuntu Kung Fu Ubuntu Kung Fu is excellent. The tips are fun and the hope of discov- ering hidden gems makes it a worthwhile task. John Southern Former editor of Linux Magazine I enjoyed Ubuntu Kung Fu and learned some new things. I would rec- ommend this book—nice tips and a lot of fun to be had. Carthik Sharma Creator of the Ubuntu Blog (http://ubuntu.wordpress.com) Wow! There are some great tips here! I have used Ubuntu since April 2005, starting with version 5.04. I found much in this book to inspire me and to teach me, and it answered lingering questions I didn’t know I had. The book is a good resource that I will gladly recommend to both newcomers and veteran users. Matthew Helmke Administrator, Ubuntu Forums Ubuntu Kung Fu is a fantastic compendium of useful, uncommon Ubuntu knowledge. Eric Hewitt Consultant, LiveLogic, LLC Prepared exclusively for Alison Tyler Download at Boykma.Com Ubuntu Kung Fu Tips, Tricks, Hints, and Hacks Keir Thomas The Pragmatic Bookshelf Raleigh, North Carolina Dallas, Texas Prepared exclusively for Alison Tyler Download at Boykma.Com Many of the designations used by manufacturers and sellers to distinguish their prod- ucts are claimed as trademarks. Where those designations appear in this book, and The Pragmatic Programmers, LLC was aware of a trademark claim, the designations have been printed in initial capital letters or in all capitals. The Pragmatic Starter Kit, The Pragmatic Programmer, Pragmatic Programming, Pragmatic Bookshelf and the linking g device are trademarks of The Pragmatic Programmers, LLC.
    [Show full text]
  • The Recovery Console Content
    The Recovery Console Content 1. Common .....................................................................................................................3 2. Invoke the Recovery Console......................................................................................3 2.1. Start from Media...................................................................................................3 2.2. Start using RIS .....................................................................................................4 2.3. Installation ............................................................................................................5 2.3.1. Attended ........................................................................................................5 2.3.2. Un-attended...................................................................................................6 2.4. Un-installation.......................................................................................................6 2.5. Windows NT 4.0 ...................................................................................................6 2.6. 64-bits ..................................................................................................................7 3. Commands..................................................................................................................7 3.1. Commands In-depth ...........................................................................................10 3.1.1. BOOTCFG...................................................................................................10
    [Show full text]
  • Enabling Serial Over LAN for a Remote Windows Text Console Using OSA Smbridge Planning / Implementation (Withdrawn Product)
    Enabling Serial Over LAN for a Remote Windows Text Console using OSA SMBridge Planning / Implementation (withdrawn product) Main Enabling Serial Over LAN for a Remote Windows Text Console using OSA SMBridge (withdrawn product) 1 SMBridge is supported on Windows and Red Hat Linux® and can be downloaded from the following URLs: http://www.ibm.com/support/docview.wss?uid=psg1MIGR-57729 -- for x236, x336, and x346 http://www.ibm.com/support/docview.wss?uid=psg1MIGR-64636 -- for other systems The OSA SMBridge User’s Guide is available from the following URL: http://www.ibm.com/support/docview.wss?uid=psg1MIGR-57816 There are two ways to use the SMBridge utility: as telnet server and as a direct command-line interface to the BMC. Only the telnet server function offers the remote text control feature. As a telnet server, SMBridge is started as a background service (for Windows) or daemon (for Linux) on a system on your network. This is typically not the server with the BMC. You initially connect to the telnet server, then from there you connect to the BMC via the server Ethernet port. This is shown in the figure below. Figure: Using SMBridge to connect remotely to a server Configuring BIOS to enable Serial Over LAN Before SMBridge can be used to manage a remote server via SOL, the BMC and BIOS of the remote server must have the following settings configured. Note: This procedure disables PXE boot on Gigabit port 1 on the server. If you plan to use PXE, you will need to connect Gigabit port 2 to your network and ensure that your remote install procedure is configured to use that port.
    [Show full text]
  • An A-Z Index of the Windows CMD Command Line
    An A-Z Index of the Windows CMD command line aaADDUSERSADDUSERS Add or list users to/from a CSV file ADmodcmd Active Directory Bulk Modify ARP Address Resolution Protocol ASSOC Change file extension associations• ASSOCIAT One step file association AT Schedule a command to run at a specific time ATTRIB Change file attributes bb BCDBOOT Create or repair a system partition BCDEDIT Manage Boot Configuration Data BITSADMIN Background Intelligent Transfer Service BOOTCFG Edit Windows boot settings BROWSTAT Get domain, browser and PDC info cc CACLS Change file permissions CALL Call one batch program from another• CERTREQ Request certificate from a certification authority CERTUTIL Utility for certification authority (CA) files and services CD Change Directory - move to a specific Folder• CHANGE Change Terminal Server Session properties CHKDSK Check Disk - check and repair disk problems CHKNTFS Check the NTFS file system CHOICE Accept keyboard input to a batch file CIPHER Encrypt or Decrypt files/folders CleanMgr Automated cleanup of Temp files, recycle bin CLEARMEM Clear memory leaks CLIP Copy STDIN to the Windows clipboard CLS Clear the screen• CLUSTER Windows Clustering CMD Start a new CMD shell CMDKEY Manage stored usernames/passwords COLOR Change colors of the CMD window• COMP Compare the contents of two files or sets of files COMPACT Compress files or folders on an NTFS partition COMPRESS Compress individual files on an NTFS partition CON2PRT Connect or disconnect a Printer CONVERT Convert a FAT drive to NTFS COPY Copy one or more files
    [Show full text]
  • A Records, 244–245, 279 -A Switch in Nbtstat, 190 in Netstat, 186 AAS Deployment Package, 710 .Aas Extension, 712 Abstract
    22_InsideWin_Index 13/3/03 9:50 AM Page 1269 Index A A records, 244–245, 279 ACEs (Access Control Entries) -a switch access masks in, 568–570 in Nbtstat, 190 command-line tools for, 572–576 in Netstat, 186 for cumulative permissions, 577 AAS deployment package, 710 for deny permissions, 578 .aas extension, 712 inheritance in, 579–580, 725–728 Abstract classes, 299–300 object ownership in, 572 Accelerated Graphics Port (AGP) adapters, 164 viewing and modifying, 570–571 Access Control Entries. See ACEs (Access ACKs in DHCP, 101–102 Control Entries) ACL Editor, 570, 723 Access control lists (ACLs) Advanced view in Active Directory security, 732–734 for inheritance, 578, 581 objects in, 339 for ownership, 572 in security descriptors, 559 for special permissions, 723–724 Access Control Settings window, 728 Edit view, 725–726 Access masks for permissions inheritance, 578 in ACEs, 568–570 blocking, 579 in DSOs, 733 settings for, 581 Access requests in Kerberos, 621 viewings, 582 Access rights. See also Permissions ACLs (access control lists) in Active Directory security in Active Directory security, 732–734 delegation, 729–732 objects in, 339 types of, 724–725 in security descriptors, 559 for group policies, 682 ACPI (Advanced Configuration and Power Access tokens Interface) contents of, 560–561 compatibility of, 23–28, 148–149 local, 559 kernel version for, 135 SIDs in, 559, 561, 581 for PnP,17, 147–149 ACCM (Asynchronous-Control- ACPIEnable option, 149 Character-Map), 1124 Activation Account domain upgrades, 496–498 in IA64, 130 BDC, 494–496 in installation, 49–50 PDC, 490–493 unattended setup scripts for, 95 Account lockout policies Active Directory, 238 in domain design, 429 bulk imports and exports in, 353–356 in password security, 593–594 DNS deployment in, 242–243 Account logons, auditing, 647 DNS integration in, 238–239 Account management, auditing, 511, 648 dynamic updates, 244–245 Accounts in domain migration.
    [Show full text]
  • Description of the Windows XP Recovery Console Page 1 of 7
    Page 1 of 7 Description of the Windows XP Recovery Console This article was previously published under Q314058 Article ID : 314058 For a Microsoft Windows 2000 version of this article, see 229716 (http://support.microsoft.com/kb/229716/). Last Review : May 7, 2007 Revision : 3.1 On This Page INTRODUCTION MORE INFORMATION Starting the Windows Recovery Console Using the Command Console Restrictions and limitations of the Recovery Console Available commands INTRODUCTION This article describes the functionality and limitations of the Windows Recovery Console. If your Microsoft Windows XP-based computer does not start correctly or if it does not start at all, you can use the Windows Recovery Console to help you recover your system software. This article discusses the following topics: • How to start the Windows Recovery Console. • How to use the Command Console. • Restrictions and limitations of the Windows Recovery Console. • The commands that are available in the Windows Recovery Console. MORE INFORMATION When you use the Windows Recovery Console, you can obtain limited access to the NTFS file system, FAT, and FAT32 volumes without starting the Windows graphical user interface (GUI). In the Windows Recovery Console, you can: • Use, copy, rename, or replace operating system files and folders. • Enable or disable service or device startup the next time that start your computer. • Repair the file system boot sector or the Master Boot Record (MBR). • Create and format partitions on drives. Note Only an administrator can obtain access to the Windows Recovery Console so that unauthorized users cannot use any NTFS volume. Starting the Windows Recovery Console To start the Windows Recovery Console, use one of the following methods: • Use the Windows Setup floppy disks or the Windows CD-ROM to start your computer.
    [Show full text]
  • A-Z List of Windows CMD Commands — Also Included CMD Commands Commands PDF PDF
    A-Z List Of Windows CMD Commands — Also Included CMD Com... https://techlog360.com/all-windows-cmd-commands/?preview_id=43... A-Z List Of Windows CMD Commands — Also Included CMD Commands Commands PDF PDF Sabarinath CMD Commands Function A addusers Used to add and list users in a CSV file admodcmd Used for bulk modifying contents in an active directory Address Resolution Protocol is used to map IP address to arp the hardware address assoc Used to change associations for file extensions associat One step file association at Run a command at a specific time atmadm Display connection info of the ATM adapter attrib Used to change file attributes B bcdboot Used to create and repair a system partition bcdedit Used to manage boot configuration data Used to manage the Background Intelligent Transfer bitsadmin Service bootcfg Used to edit boot configuration in Windows break Enable/Disable break capability (CTRL+C) in CMD C cacls Used to change permissions of files call Used one batch program to call another certreq Used to request a certificate from a certification authority certutil Manage Certification Authority files and services cd Used to change folder (directory) or go to a specific one change Used to change terminal services chcp Displays the number of active console code page chdir Same as cd command chkdsk Used to check and repair issues in the disk chkntfs Used to check the NTFS file system choice Accept user input (via keyboard) to a batch file cipher Used to encrypt/decrypt files and folder cleanmgr Used clean temp files and recycle
    [Show full text]
  • How to Install and Use the Recovery Console in Windows XP Page 1 of 5
    KB307654 - How to install and use the Recovery Console in Windows XP Page 1 of 5 Knowledge Base How to install and use the Recovery Console in Windows XP PSS ID Number: 307654 Article Last Modified on 7/14/2004 The information in this article applies to: Microsoft Windows XP Professional Microsoft Windows XP Home Edition This article was previously published under Q307654 SUMMARY To recover your operating system when your computer does not start correctly or does not start at all, you may want to install and use the Windows Recovery console. However, Microsoft recommends this method of system recovery for advanced users only. Also, learn about the Recovery Console command prompt, command actions, rules, how to remove the Recovery Console, and how to install it during an unattended installation. IN THIS TASK INTRODUCTION MORE INFORMATION How to install the Recovery Console How to use the Recovery Console How to use the Recovery Console command prompt Command actions Recovery Console rules How to delete the Recovery Console How to install Recovery Console during an unattended installation REFERENCES INTRODUCTION Microsoft recommends that you use the Recovery Console only after Safe mode and other startup options do not work. The Recovery Console is recommended only if you are an advanced user who can use basic commands to identify and locate problem drivers and files. Additionally, you must be an administrator to use the Recovery Console. Back to the top MORE INFORMATION How to install the Recovery Console You can install the Recovery Console on your computer to make it available if you cannot restart Windows.
    [Show full text]
  • Freeway® Server-Resident Application (SRA) Programmer Guide
    Freeway ® Server-Resident Application (SRA) Programmer Guide DC 900-1325I Protogate, Inc. 12225-R World Trade Drive San Diego, CA 92128 March 2011 Protogate, Inc. 12225 World Trade Drive, Suite R San Diego, CA 92128 (858) 451-0865 Freeway Server-Resident Application (SRA) Programmer Guide © 2000 - 2011 Protogate, Inc. All rights reserved Printed in the United States of America This document can change without notice. Protogate, Inc. accepts no liability for any errors this document might contain. Freeway® is a registered trademark of Protogate, Inc. All other trademarks and trade names are the properties of their respective holders. Contents List of Figures 7 Preface 9 1Introduction 15 1.1 Freeway Server-Resident Applications (SRAs)................ 15 1.2 Overview of Example SRA Types....................... 16 1.2.1Basic SRA Configuration......................... 18 1.2.2Protocol Converter Configuration.................... 18 1.2.3NON-API Client Interface........................ 21 1.2.4Message Filtering SRA.......................... 22 2 Server-Resident Application Software Development 23 2.1 SRA Development Environment....................... 23 2.1.1Freeway Disk Partitions......................... 24 2.1.2Software Development Directory Structure............... 25 2.2 Files Provided for Building the SRA ..................... 27 2.2.1Example Filter SRA............................ 27 2.2.2Loopback Test Programs......................... 28 2.3 Creating a New SRA Development Environment.............. 30 2.3.1Create the SRA Development Directory................. 30 2.3.2Edit the SRA source files......................... 31 2.3.3Build the SRA binary files........................ 33 2.4 Running the SRA ............................... 34 2.5 Customizing the SRA............................. 36 2.6 Relocating Your SRA Files........................... 37 2.7 Starting the SRA at Freeway Boot-up..................... 39 2.7.1Main SRA Startup File (rc.startsra)..................
    [Show full text]
  • Disk Subsystems
    Wolf.C07.qxd 5/28/03 3:11 PM Page 211 7 Disk Subsystems With disks and memory, quite a bit can go wrong, but the good news is that normally a problem can be pinpointed very quickly. Aside from hardware failures and disk corrup- tion giving you headaches, the threat of a virus must always be considered as well. The core of system operation revolves around its data, which normally resides on a hard disk. Whether or not you have fault-tolerant disks in place on your servers, odds are that you cannot afford to have such protection on all of your managed workstations. Disk failures are inevitable. This chapter will help you to quickly diagnose the source of a disk failure and in turn repair the problem. In addition to describing the multitude of disk management and diagnostic tools at your disposal, this chapter also shows you the most common disk errors and faults, and proven procedures for resolving them. Windows Server 2003/XP Disk Architecture 101 Before jumping headfirst into the pool of disk troubleshooting, let’s first test the water. Resolving faults and repairing disk-related problems does require some knowledge of the basics. In this section, you will not read the dry information on the guts of hard disks (a proven tranquilizer for IT professionals). Instead, this section quickly reviews Microsoft disk terminology, including • Basic and dynamic disks • Master Boot Record • Boot sector • boot.ini file • Master File Table • GPT disks 211 Wolf.C07.qxd 5/28/03 3:11 PM Page 212 212 Chapter 7 Disk Subsystems Basic and Dynamic Disks Basic disks are the disk type that you have come to know and love when working with Microsoft products.
    [Show full text]
  • An AZ Index of the Windows XP Command Line
    An A-Z Index of the Windows XP command line ADDUSERS Add or list users to/from a CSV file ARP Address Resolution Protocol ~ ASSOC Change file extension associations ASSOCIAT One step file association AT Schedule a command to run at a later time ATTRIB Change file attributes b BOOTCFG Edit Windows boot settings BROWSTAT Get domain, browser and PDC info c CACLS Change file permissions ~ CALL Call one batch program from another ~ CD Change Directory - move to a specific Folder CHANGE Change Terminal Server Session properties CHKDSK Check Disk - check and repair disk problems CHKNTFS Check the NTFS file system CHOICE Accept keyboard input to a batch file CIPHER Encrypt or Decrypt files/folders CleanMgr Automated cleanup of Temp files, recycle bin CLEARMEM Clear memory leaks CLIP Copy STDIN to the Windows clipboard. ~ CLS Clear the screen CLUSTER Windows Clustering CMD Start a new CMD shell ~ COLOR Change colors of the CMD window COMP Compare the contents of two files or sets of files COMPACT Compress files or folders on an NTFS partition COMPRESS Compress individual files on an NTFS partition CON2PRT Connect or disconnect a Printer CONVERT Convert a FAT drive to NTFS. ~ COPY Copy one or more files to another location CSCcmd Client-side caching (Offline Files) CSVDE Import or Export Active Directory data d ~ DATE Display or set the date Dcomcnfg DCOM Configuration Utility DEFRAG Defragment hard drive ~ DEL Delete one or more files DELPROF Delete NT user profiles DELTREE Delete a folder and all subfolders DevCon Device Manager Command Line Utility
    [Show full text]