The Lenovo ThinkServer Management Module features remote console capabilities which gives you full screen, keyboard and mouse control of the Lenovo server. It's like sitting right in front of the server and allows you to do some fancy things like configure the BIOS or install an operating system remotely. From the ASU command line, specify your activation key information as necessary. See the command options parameters in the following table. Then you can download activation keys from the Lenovo website by using a command such as the following: asu fodcfg acquirekey -kmsid [email protected]:pasword -auth DEBAAAAAAAAA -u 78704bc1234.
We're looking to purchase an entry level System X server, specifically the x3100 M4. What I've been unable to figure out is what the lowest level of IMM2 we need is in order to remote the system regardless of power state, and of course control the power state itself. The IMM2 user manual only confuses matters by stating that:
'[...]All levels provide the following:- Around-the-clock remote access and management of your server- Remote management independent of the status of the managed server- Remote control of hardware and operating systems.'
![X3550 X3550](https://www.storagereview.com/images/StorageReview-Lenovo-x3650-M5.jpg)
But on the other hand, only from IMM2 Standard (not Basic) does it feature 'Telnet and ssh CLI'
What's the right answer here?
1 Answer
For IBM System x3100 M4, You have to upgrade IMM2 from Basic to Standard, then Upgrade standard to Advance. You can refer this link for IMM2 Feature and upgrade option. http://www.redbooks.ibm.com/abstracts/tips0849.html
Not the answer you're looking for? Browse other questions tagged remote-accessibmelectrical-poweribm-xseries or ask your own question.
Component | File name | CVEs resolved in this package |
IMM2 | oem_fw_imm2_tcoe26h-3.70_anyos_noarch | CVE-2016-3706, CVE-2016-1234, CVE-2016-2177, CVE-2016-2178, CVE-2016-6313, CVE-2016-6302, CVE-2015-2179, CVE-2016-2181, CVE-2016-6306, CVE-2015-8605 |
UEFI/BIOS (1U 8869) | oem_fw_uefi_tbeg28j-2.32_anyos_32-64 | None |
UEFI/BIOS (2U 8871) | oem_fw_uefi_tceg28j-2.32_anyos_32-64 | None |
DSA | oem_fw_dsa_dsaoa8n-10.2_anyos_anycpu | None |
Emulex* | elx-lnvgy_fw_fc_16b-2.03x7-42_linux_32-64 | None |
RAID Controller M1215 | lnvgy_fw_sraidmr_1200-24.12.0-0038_linux_32-64 | None |
RAID Controller M5210 | lnvgy_fw_sraidmr_5200-24.12.0-0024_linux_32-64 | None |
HDD Update | lnvgy_fw_hdd_sas-1.22.05_linux_32-64 | None |
Other Security Fixes | None | Security vulnerabilities resolved in open source packages where there is no IMM exposure: CVE-2015-5352, CVE-2015-6563, CVE-2015-6564, CVE-2016-1908, CVE-2016-3115, CVE-2016-3075, CVE-2016-4429, CVE-2016-2774, CVE-2016-6153, CVE-2016-6304, CVE-2015-8872, CVE-2016-6263, CVE-2016-4804, CVE-2016-6318, CVE-2015-2059, CVE-2015-8948, CVE-2016-6261, CVE-2016-6262, CVE-2016-2180, CVE-2016-2182, CVE-2016-2183 |