0% found this document useful (0 votes)
22 views752 pages

SUM UserGuide

The Supermicro Update Manager User's Guide (Revision 2.14.0) provides detailed instructions and information regarding the use of the Update Manager software, including disclaimers, limitations of liability, and a comprehensive version history. The document emphasizes that the information is subject to change and that users should refer to the official website for the most current version. Additionally, it outlines the rights of Supermicro regarding modifications to the product and the restrictions on copying the document.

Uploaded by

patrick.lenzen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views752 pages

SUM UserGuide

The Supermicro Update Manager User's Guide (Revision 2.14.0) provides detailed instructions and information regarding the use of the Update Manager software, including disclaimers, limitations of liability, and a comprehensive version history. The document emphasizes that the information is subject to change and that users should refer to the official website for the most current version. Additionally, it outlines the rights of Supermicro regarding modifications to the product and the restrictions on copying the document.

Uploaded by

patrick.lenzen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Supermicro Update Manager

(SUM)
User’s Guide

Revision 2.14.0
The information in this USER’S GUIDE has been carefully reviewed and is believed to be accurate. The
vendor assumes no responsibility for any inaccuracies that may be contained in this document, makes no
commitment to update or to keep current the information in this manual, or to notify any person
organization of the updates. Please Note: For the most up-to-date version of this manual, please see our
web site at www.supermicro.com.

Super Micro Computer, Inc. (“Supermicro”) reserves the right to make changes to the product described in
this manual at any time and without notice. This product, including software, if any, and documentation
may not, in whole or in part, be copied, photocopied, reproduced, translated or reduced to any medium or
machine without prior written consent.

DISCLAIMER OF WARRANTY ON SOFTWARE AND MATERIALS. You expressly acknowledge and agree that
use of the Software and Materials is at your sole risk. FURTHERMORE, SUPER MICRO COMPUTER INC. DOES
NOT WARRANT OR MAKE ANY REPRESENTATIONS REGARDING THE USE OR THE RESULTS OF THE USE OF
THE SOFTWARE OR MATERIALS IN TERMS OF THEIR CORRECTNESS, ACCURACY, RELIABILITY, OR
OTHERWISE. NO ORAL OR WRITTEN INFORMATION OR ADVICE GIVEN BY SUPER MICRO COMPUTER INC.
OR SUPER MICRO COMPUTER INC. AUTHORIZED REPRESENTATIVE SHALL CREATE A WARRANTY OR IN ANY
WAY INCREASE THE SCOPE OF THIS WARRANTY. SHOULD THE SOFTWARE AND/OR MATERIALS PROVE
DEFECTIVE, YOU (AND NOT SUPER MICRO COMPUTER INC. OR A SUPER MICRO COMPUTER INC.
AUTHORIZED REPRESENTATIVE) ASSUME THE ENTIRE COST OF ALL NECESSARY SERVICE, REPAIR, OR
CORRECTION.

LIMITATION OF LIABILITY. UNDER NO CIRCUMSTANCES INCLUDING NEGLIGENCE, SHALL SUPER MICRO


COMPUTER INC. BE LIABLE FOR ANY INCIDENTAL, SPECIAL, OR CONSEQUENTIAL DAMAGES THAT RESULT
FROM THE USE OR INABILITY TO USE THE SOFTWARE OR MATERIALS, EVEN IF SUPER MICRO COMPUTER
INC. OR A SUPER MICRO COMPUTER INC. AUTHORIZED REPRESENTATIVE HAS BEEN ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES.

Any disputes arising between manufacturer and customer shall be governed by the laws of Santa Clara
County in the State of California, USA. The State of California, County of Santa Clara shall be the exclusive
venue for the resolution of any such disputes. Super Micro's total liability for all claims will not exceed the
price paid for the hardware product.

Manual Revision 2.14.0

Release Date: Jan 31, 2024

Unless you request and receive written permission from Super Micro Computer, Inc., you may not copy any part of
this document.

Information in this document is subject to change without notice. Other products and companies referred to herein
are trademarks or registered trademarks of their respective companies or mark holders.

Copyright © 2013-2024 by Super Micro Computer, Inc.


All rights reserved.
Printed in the United States of America

Supermicro Update Manager User’s Guide 2


Version History
Date Rev Description
July-02-2013 1.0 1. Created this document.

1. Revised the software description of SUM and SMCIPMITool.jar in 1.2.1


July-30-2013 1.0a
OOB Usage Requirements (Remote Management Server).

1. Added in-band Usage related sections.


September-12-2013 1.1
2. Changed the command LoadFactoryDefault to LoadDefaultBiosCfg.

1. Added Get/Change DMI information capability.

2. Added multi-system usage for OOB channel.


October-02-2013 1.2
3. Eliminated the --me_type option for the UpdateBios in-band command.

4. Added support from the UpdateBios in-band command to X10 MBs.

1. Required BMC firmware image and IPMI driver to be installed for all in-
band commands except the UpdateBios command.

2. Required product key to be activated for all in-band commands except


January-06-2014 1.2a the UpdateBios command.

3. Added the summary of running multiple systems.

4. Added exit code 80. Description: Product key is not activated.

Major revision with new management command groups.

1. Added BMC Management commands: GetBmcInfo, UpdateBmc,


GetBmcCfg and ChangeBmcCfg.

2. Added System Checks commands: CheckAssetInfo, CheckSensorData and


June-09-2014 1.3 CheckSystemUtilization.

3. Added System Event Log commands: GetEventLog and ClearEventLog.

4. Added in-band-usage for ActivateProductKey command.

5. Added exit code 68. Description: Invalid BMC configuration text file.

6. Added exit code 69. Description: Invalid asset information.

Supermicro Update Manager User’s Guide 3


Date Rev Description
1. Added Application commands: TpmProvision, MountIsoImage and
UnmountIsoImage.

2. For X10 Intel® Xeon® Processor E5 v3/v4 Product Family platform, in-band
update BIOS requires the --reboot option.

3. Revised CheckSystemUtilization output message for HDD/Network.

July-31-2014 1.4 4. Revised the output message for CheckAssetInfo: Units format matches
dmidecode outoput.

5. Added exit code 36. Required device does not exist.

6. Added exit code 37. Required device does not work.

7. Added notices to exit code when using in-band command with the --
reboot option through SSH connection.

1. Added a notice for in-band UpdateBios command for jumper-less


solution: You should use default OS when multi-boot is installed.

2. Changed the TpmProvision command: cleartpm option should be used


with the --image_url option.

3. Added support for checking SFT-SUM and SFT-DCMS-SINGLE node


product keys.

4. Added a notice to the UpdateBios in-band command: The command will


disable some functions in OS, but they will be recovered after OS reboot.

February -06-2015 1.4a 5. Added a notice to in-band UpdateBios using SSH connection: Change the
timeout length for both SSH client and server site to be two times longer
than the typical time length of execution.

6. Changed the name “Product Key” to “Node Product Key.”

7. Added exit code 11. Invalid command line data.

8. Added the notice of using the CheckSensorData command output.

9. Updated the CheckAssetInfo command output: adding the CPU version


field and changing the name “Network Interface” to “Add-on Network
Interface.”

Supermicro Update Manager User’s Guide 4


Date Rev Description
10. Added Appendix C: Platform Feature Support Matrix.

11. Added the OS architecture information in the CheckSystemUtilization


command output message.

12. Added a reminder for In-band Windows driver setup.

1. Added in-band support for the BMC management commands:


GetBmcInfo, UpdateBmc, GetBmcCfg, and ChangeBmcCfg.

2. Added in-band support for the EventLog management commands:


GetEventLog and ClearEventLog.

3. Added in-band support for the CheckOOBSupport command.

4. Removed requirement of actool.

5. Removed JAVA environment requirement for all commands, except the


OOB UpdateBios and UpdateBmc commands.
July-23-2015 1.5
6. Changed the ActivateProductKey command: supports 344 bytes node
product key format.

7. Added the Key management commands: QueryProductKey,


ClearProdcutKey.

8. Added a BIOS management command: EditDmiInfo.

9. Added Appendix D Third-Party Software.

10. Added the log support when rare exceptions occurred.

11. Added exit code 12: Function access denied.

1. Supported X11 platforms.

2. Removed JAVA requirement.

3. Supported FreeBSD OS for FreeBSD 7.1 x86_64 or later.


January-28-2016 1.6
4. Supported RHEL4 OS for RHEL4u3 x86_64 or later.

5. Added auto-activation feature using credential files.

6. Added the --overwrite_cfg and --overwrite_sdr options to the UpdateBmc

Supermicro Update Manager User’s Guide 5


Date Rev Description
command.

7. The UpdateBios in-band command supported the MEDisabling feature


which has similar procedure as original jumperless procedure that requires
twice reboot.

8. Added support for MountIsoImage and TpmProvision commands from


HTTP image servers.

9. Added exit code 38: Function is not supported.

10. Added Feature Toggled On information to the CheckOOBSupport


command output.

11. Third-Party Software: Removed ipmitool/Jline. Added openssl/libcurl.

12. In-Band jumperless procedure show full log path when twice reboot is
needed.

13. Removed TAS from package. Added a TAS requirement note.

1. Renamed the TPM ISO image file to 20151217.

2. Added troubleshooting to BMC FW web server being unreachable after


BMC FW was updated.

3. Added the description of failure to install Client ME Windows driver on a


August-03-2016 1.6a
Server ME system.

4. Added the recommended usage of running the OOB UpdateBios


command.

5. Added the requirements for using an OOB network.

1. Renamed the TPM ISO image file to 20161013.

2. Added two options: --no_banner to suppress output banner messages


and --no_progress UI option to suppress output progress messages.
January-06-2017 1.6b
3. Renamed the GetDefaultBiosCfg and GetCurrentBiosCfg commands and
deprecated the old GetDefaultBiosCfgTextFile and
GetCurrentBiosCfgTextFile commands.

4. Added OOB support for the CMM management commands: GetCmmInfo,

Supermicro Update Manager User’s Guide 6


Date Rev Description
UpdateCmm, GetCmmCfg, and ChangeCmmCfg.

5. Modified the UpdateBios in-band command to not to require the --reboot


option and removed the --manual_reboot option.

1. Renamed the TPM ISO image file to TPM_1.2_20170410.

2. Added the Storage Management commands: GetRaidControllerInfo,


UpdateRaidController, GetRaidCfg, ChangeRaidCfg, GetSataInfo and
GetNvmeInfo.

3. Added support for IPv6.

4. Added the --lock option to the TpmProvision command.

5. Revised the --image_url command format to TpmProvision.

6. Added support for TAS for FreeBSD.

7. Added support for B2 and K1 platforms.

July-21-2017 1.7 8. Changed exit code 8 from "File does not exist” to “Cannot open file.”

9. No support has been provided for B9 Intel® Xeon® processor E5-2600


product family platform since SUM 1.7.0.

10. RAID related commands are only licensed to the SFT-DCMS-SINGLE key.

11. Supported Intel Atom® Processor C3000 Series platform.

12. Added the BBS boot priority function in a BIOS configuration file.

13. Added information about where the logs are stored.

14. Supported Apollo platform.

15. Added Appendix F. Using the Command Line Tool (XMLStarlet) to Edit
XML Files.

1. Added HII support for the X11 Intel® Xeon® Scalable Processors with
Intel® C620 Series Chipsets and the platforms of later versions.
October-27-2017 2.0
2. Renamed the command GetCurrentBiosCfgTextFile to GetCurrentBiosCfg.

3. Renamed the command GetDefaultBiosCfgTextFile to GetDefaultBiosCfg.

Supermicro Update Manager User’s Guide 7


Date Rev Description
4. Modified the CheckAssetInfo command to support Add-on Network
Interface and Onboard/Add-on PCI Devices.

5. Added Appendix E. How to Change BIOS Configurations in XML Files.

6. Added the --preserve_setting option to the command UpdateBios.

7. Added the TPM command options to support X11 Intel® Xeon® Scalable
Processors with Intel® C620 Series Chipsets platform.

8. Added support for H11 AMD EPYC platform.

9. Renamed the TPM ISO image file to TPM_1.3_20170802.

10. Add the --skip_unknown option to the UpdateBios command.

11. Added support for checking the SFT-DCMS-SVC-KEY node product key.

12. Supported Debian OS for Debian 7 x86_64 or later.

13. Added exit code 155 description: IPMI received invalid data.

1. Added the --skip_bbs option to the ChangeBiosCfg command.


February-02-2018 2.0a
2. The CMM related commands do not require any licenses.

1. Added the GetPsuInfo and UpdatePsu commands to manage the PSU


firmware image.

2. Added the Get TpmInfo and TpmManage commands to manage TPM.

3. Added exit code 76 - Invalid TPM provision table file.

4. Added the OEM FID feature.

August-17-2018 2.1 5. Modified gsetting note.

6. Added 7u superblade note.

7. Removed the limitation that the --overwrite_sdr and --overwrite_cfg


options must coexist for ATEN BMC FW.

8. Added the SetBiosPassword command.

9. Added exit code 13 - Invalid argument.

Supermicro Update Manager User’s Guide 8


Date Rev Description
10. Added the --rc_path option.

1. Added thread_count usage in customizing SUM configurations section for


multiple systems management.

2. Added the --tui option and introduction to TUI features.

3. Modified the “CheckAssetInfo” command console output.

4. Added BMC extension version in BMC information.

5. Added an instruction on installing a certification file to BMC FW using the


ChangeBmcCfg command.
February-20-2019 2.2
6. Updated instruction of applying credential files for auto-activation.

7. Added exit code 77 - Invalid SUMRC file.

8. Added exit code 109 - This operation is prohibited.

9. Added exit code 120 - Invalid Redfish response.

10. Added the -f option to load file contents as a password.

11. Updated Platform Feature Support Matrix.

1. Added the --show_multi_full option.

2. Added the SetBmcPassword and SetCmmPassword commands.

3. Changed the support policy of UpdatePsu.

4. Showed extra information when using the --showall option with the
May-16-2019 2.3 GetBiosInfo command.

5. Added LAN configurations notes to BMC settings update.

6. Added the --pw_file option to the SetBiosPassword command.

7. Added the --file_only option to multiple commands.

8. Added exit code 249 - Special action is required.

1. Added the usage requirement and instructions for building Linux driver.
November-19-2019 2.4
2. Added Appendix H. How to Sign a Driver in Linux.

Supermicro Update Manager User’s Guide 9


Date Rev Description
3. Added descriptions of signing a driver in Linux.

4. Added the --kcs option to the UpdateBios command.

5. Added the GetKcsPriv and SetKcsPriv commands.

6. Added Appendix I. BMC/CMM Password Rule.

7. Added the --policy and --precheck options.

8. Added the introduction to the Policy Based Update feature.

1. Removed the key management command: ClearProdcutKey.

2. Added the GetLockdownMode and SetLockdownMode commands.

3. Added Appendix J. System Lockdown Mode Matrix.

4. Added the SecureEraseDisk command.

5. Added support for the in-band mode of mountisoimage and


unmountisoimage commands.

6. Added the GetGpuInfo command.

7. Added the information for JBOD mode in RAID configuration.

8. Added the commands for PSU Management: GetPowerStatus,


June-12-2020 2.5 SetPowerAction.

9. Added the commands for Applications: RawCommand,


GetUsbAccessMode, SetUsbAccessMode.

10. Added Appendix E.6 License Requirement Setting.

11. Moved platform feature support matrix to file


PlatformFeatureSupportMatrix.

12. Renamed Appendix C. Platform Feature Support Matrix to Appendix C.


Known Limitations.

13. Added the JSON key format and the --key_file option to the
ActivateProductKey command.

14. Added the Redfish Host Interface usage to the UpdateBios, UpdateBmc,

Supermicro Update Manager User’s Guide 10


Date Rev Description
ActivateProductKey and QueryProductKey commands.

15. Added the MountFloppyImage and UnmountFloppyImage commands.

16. Added the SecureEraseRaidHdd command.

17. Added the --backup option.

18. Added the --forward option.

19. Added the information about the node product key format to the
CheckOOBSupport command.

20. Added the GetMaintenEventLog command.

21. Added the BiosRotManage and BmcRotManage commands.

22. Added the LoadDefaultBmcCfg and LoadDefaultCmmCfg commands.

23. Added the information about system’s support for RoT features to the
CheckOOBSupport command.

24. Added more options in the .sumrc file

25. Changed the example of running the QueryProductKey command.

1. Added the --overwrite_ssl option to the UpdateBMC command.

2. Added the “Not TCG/SAT3 Supported” new device type to the


SecureEraseDisk command.
October-08-2020 2.5.1
3. Updated the usage of TPM in the user’s guide.

4. Removed the --reboot option from the BmcRotManage --action


UpdateGolden command.

1. Added the GetCpldInfo and UpdateCpld commands.

2. Added the LocateServerUid command.

3. Added the GetBbpInfo, UpdateBbp, and CmmPowerStatus commands.


December-24-2020 2.6.0
4. Added the GetPMemInfo and UpdatePMem commands.

5. Updated X12 BMC/CMM Password Rules in Appendix I. BMC/CMM


Password Rule.

Supermicro Update Manager User’s Guide 11


Date Rev Description
6. Added a notice to the GetBmcCfg and ChangeBmcCfg commands.

7. Added the command ServiceCalls.

8. Added new descriptions to 1.1 Features.

9. Added the --overwrite_sdr and --overwrite_ssl options to the


UpdateCMM command.

10. Added the GetHostDump command.

11. Added the ClearMaintenEventLog command.

12. Added the --post_complete option to the commands to check POST


status after system reboot: ChangeBiosCfg, LoadDefaultBiosCfg,
ChangeDmiInfo, SetBiosPassword, ClearEventLog, SecureEraseDisk,
UpdateBios, SetLockdownMode, SetPowerAction, UpdateRaidController,
BiosRotManage and UpdateCpld.

13. Added IPv6 address usage to the MountIsoImage command.

14. Added the --controller option to the GetRaidControllerInfo and


UpdateRaidController commands.

15. Added the Redfish Host Interface usage to the GetRaidControllerInfo and
UpdateRaidController commands.

16. Added support for Broadcom 3008 and Marvell SE9230 to the
GetRaidControllerInfo command.

17. Added support for Marvell SE9230 to the UpdateRaidController


command.

18. Added the GetBladePowerStatus and SetBladePowerAction commands.

19. Added the command TimedBmcReset.

1. Updated the supported Windows version.

2. Updated the steps and descriptions of building a Linux driver.


September-03-2021 2.7.0
3. Added support for Marvell SE9230 to the GetRaidCfg and ChangeRaidCfg
commands.

Supermicro Update Manager User’s Guide 12


Date Rev Description
1. Added the commands UpdateAocNIC and GetAocNICInfo.

2. Deprecated the --policy and --precheck for UpdateBios options.

3. Added the --download option to the GetCmmCfg command.

4. Added the --upload and --update options to the ChangCmmCfg command.


December-15-2021 2.8.0
5. Added the GetSystemCfg and ChangeSystemCfg commands.

6. Added the ProfileManage command.

7. Added the introduction to the profile update feature.

8. Added the RedfishApi command.

1. Added AuthNone authentication to the in-band use of Redfish Host


Interface.

March-30-2022 2.8.1 2. Added the RemoteExec command.

3. Added Appendix K. Using SUM to Run 3rd -Party Tools.

4. Added support for HTTPS image server to the MountIsoImage command.

1. Added the UpdateGpu command.

2. Added the Attestation command.

3. Added the GetSwitchInfo, UpdateSwitch and RebootSwitch commands.

4. Added the SystemPFA and MemoryHealthCheck commands.


July-8-2022 2.9.0
5. Added the GetAipCpldInfo and UpdateAipCpld commands.

6. Added the GetGpuInfo command to X12/H12 and later platforms.

7. Added the description and option usage to the KmsManage command for
KMS OEM configurations.

1. Added the --port option for all commands.

2. Removed the --policy and --precheck options from the UpdateBios


December-8-2022 2.10.0
command.

3. Added BIOS management commands: GetScpInfo and UpdateScp.

Supermicro Update Manager User’s Guide 13


Date Rev Description
4. Supported the management commands for ARM64: GetBmcInfo,
UpdateBmc, GetScpInfo, UpdateScp, GetBiosInfo and UpdateBios.

5. Added Appendix L. Creating Firmware Updating Tar File for OpenBMC.

6. Added the CpuOnDemand command.

7. Added the GetPsysStatus and SetPsysStatus commands.

8. Added the GetFruInfo and RestoreFruInfo commands.

9. Added the remote in-band and remote Redfish host interface usages to
the BIOS/BMC management commands.

10. Added the GetBmcUserList and SetBmcUserList commands.

11. Added the ControlNVMe command.

12. Added TwinPro Management commands: GetTpCfg and ChangeTpCfg.

13. Updated the license requirement for the UpdateBios command --


preserve_setting in Appendix B.

14. Supported the In-band usage of the GetNvmeInfo command.

1. Added the MonitorCDUStatus command.

2. Added the GetMultinodeEcInfo and UpdateMultinodeEc commands.

3. Added the GetBackplaneCpldInfo and UpdateBackplaneCpld commands.

4. Added the PCIe Switch Management commands: GetPCIeSwitchInfo and


UpdatePCIeSwitch.

5. Added the GetfixedBootCfg and ChangefixedBootCfg command.


May-11-2023 2.11.0
6. Added the BootstrappingAccount command.

7. Added the --showall option to the CheckSensorData command.

8. Added the ChangeFruInfo command.

9. Added the --showall option to the GetFruInfo command.

10. Added the --dump option to the GetBmcCfg command.

Supermicro Update Manager User’s Guide 14


Date Rev Description
11. Added the --restore option to the ChangeBmcCfg command.

12. Added the SecureBootManage command.

13. Added the GetVmInfo and VmManage commands.

14. Added the RmcpManage command.

15. Added the --showall option to the GetBmcInfo command.

16. Removed the GetPsysStatus and SetPsysStatus commands.

1. Added the --precheck and --abort options to the SecureEraseRaidHdd


command.

2. Supports Delta Next GPU update on the UpdateGpu command.

3. Supports Delta Next GPU read system version on the GetGpuInfo


command.

4. Added commands GetSwitchboardCpldInfo and UpdateSwitchboardCpld.

Aug-10-2023 2.12.0 5. Added command CpldRotManage

6. Added motherboard CPLD 2 support options for command UpdateCpld

7. Added commands GetFanboardCpldInfo and UpdateFanboardCpld.

8. Added the ManageRHI command.

9. Added Test and EnableType actions to the SetBmcUserList command.

10. Added the AccountType information to the GetBmcUserList command.

Aug-25-2023 2.13.0 1. Added the DiagGpuStatus command to AMD MI250 GPU system.

1. Added the supported platform matrix to the GetGpuInfo and UpdateGpu


commands.

2. Added version information for third-party software and included third-


Jan-31-2024 2.14.0
party software: acpica, libbssh2.

3. Added items for Intel PVC, CG1 and GD2 to the GetGpuInfo and
UpdateGpu commands.

Supermicro Update Manager User’s Guide 15


Date Rev Description
4. Added the --batch_count option for multiple systems management.

5. Added the GetGpuLog command.

6. Added EnableAccount actions to the SetBmcUserList command.

7. Added the --manage_account_type and --user_status options to the


SetBmcUserList command.

Supermicro Update Manager User’s Guide 16


Contents
Version History................................................................................................................................................... 3

Contents ...........................................................................................................................................................17

1 Overview .......................................................................................................................................................38

1.1 Features .............................................................................................................................................38

1.2 Operations Requirements ..................................................................................................................42

1.2.1 OOB Usage Requirements (Remote Management Server).....................................................42

1.2.2 OOB Usage Requirements (Network) .....................................................................................43

1.2.3 OOB Usage Requirements (Managed Systems) ......................................................................43

1.2.4 In-Band Usage Requirements .................................................................................................45

1.2.5 Additional In-Band Usage Requirements ................................................................................47

1.3 Typographical Conventions ................................................................................................................49

2 Installation and Setup ...................................................................................................................................50

2.1 Installing SUM ....................................................................................................................................50

2.1.1 Linux, Windows, and FreeBSD ................................................................................................50

2.2 Setting Up OOB Managed Systems ....................................................................................................50

2.2.1 Installing the TAS Package ......................................................................................................51

2.3 Setting Up In-Band Managed Systems ...............................................................................................53

2.3.1 Building a Linux Driver ............................................................................................................53

2.3.2 Signing a Driver in Linux ..........................................................................................................53

3 Licensing Managed Systems .........................................................................................................................54

Supermicro Update Manager User’s Guide 17


3.1 Getting Node Product Keys from Supermicro ...................................................................................54

3.2 Activating Managed Systems .............................................................................................................55

3.3 Auto-Activating Managed Systems ....................................................................................................55

4 Basic User Interface ......................................................................................................................................57

4.1 Customizing SUM Configurations ....................................................................................................100

4.2 SUM Log Design ...............................................................................................................................105

4.3 Format of BIOS Settings Text File .....................................................................................................107

4.3.1 An Example of BBS Boot Priority ...........................................................................................108

4.4 BIOS Settings XML File Format .........................................................................................................110

4.5 DMI Information XML File Format ...................................................................................................113

4.6 BMC Configuration XML File Format................................................................................................115

4.6.1 Pure Redfish LAN Table in BMC Configuration .....................................................................116

4.7 RAID Configuration XML File Format ...............................................................................................119

4.8 CMM Configuration XML File Format ..............................................................................................134

4.9 TwinPro Configuration XML File Format ..........................................................................................136

4.10 TUI ..................................................................................................................................................140

4.10.1 TUI General Reminders .......................................................................................................141

4.10.2 BIOS TUI Configuration .......................................................................................................142

4.11 Redfish Host Interface....................................................................................................................151

4.11.1 Using Redfish Host Interface...............................................................................................151

4.11.2 Supported Commands ........................................................................................................151

Supermicro Update Manager User’s Guide 18


4.11.3 AuthNone Authentication ...................................................................................................152

4.12 Format of the VROC Configuration XML File .................................................................................154

4.13 Remote In-Band Mode ...................................................................................................................160

4.13.1 Remote SUM and Configurations .......................................................................................160

4.13.2 Using Remote In-Band (Remote_INB) Mode ......................................................................161

4.13.3 Using Remote Redfish Host Interface (Remote_RHI) .........................................................161

4.13.4 Console Output ...................................................................................................................161

4.13.5 Supported Commands ........................................................................................................162

4.13.6 Transferring Files.................................................................................................................163

4.14 BMC LAN Configuration XML File Format ......................................................................................165

4.15 Fixed Boot Configuration XML File Format ....................................................................................169

5 Managing a Single System...........................................................................................................................177

5.1 Key Management for a Single System .............................................................................................178

5.1.1 Activating a Single Managed System ....................................................................................178

5.1.2 Querying the Node Product Keys ..........................................................................................179

5.2 System Checks for a Single System ..................................................................................................181

5.2.1 Checking OOB Support ..........................................................................................................181

5.2.2 Checking Asset Information (OOB Only) ...............................................................................182

5.2.3 Checking Sensor Data (OOB Only) ........................................................................................193

5.2.4 Checking System Utilization (OOB Only) ...............................................................................194

5.2.5 Monitors the Host with ServiceCalls .....................................................................................197

Supermicro Update Manager User’s Guide 19


5.2.6 Monitoring and Controlling PFA of the System ....................................................................204

5.2.7 Checking Memory Health of the Managed System ..............................................................206

5.2.8 Getting and Activating Intel On Demand ..............................................................................208

5.2.9 Getting and Clearing the Chassis Intrusion Status for the Managed System .......................218

5.2.10 Managing FRU Information .................................................................................................219

5.3 Managing a Single System................................................................................................................226

5.3.1 Getting BIOS Firmware Image Information ..........................................................................226

5.3.2 Updating the BIOS Firmware Image......................................................................................231

5.3.3 Getting Current BIOS Settings ...............................................................................................234

5.3.4 Updating BIOS Settings Based on the Current BIOS Settings................................................236

5.3.5 Getting Factory BIOS Settings ...............................................................................................239

5.3.6 Updating BIOS Settings Based on the Factory Settings ........................................................240

5.3.7 Loading Factory BIOS Settings...............................................................................................240

5.3.8 Getting DMI Information ......................................................................................................241

5.3.9 Editing DMI Information .......................................................................................................242

5.3.10 Updating DMI Information..................................................................................................243

5.3.11 Setting Up BIOS Action ........................................................................................................245

5.3.12 Setting Up a BIOS Administrator Password ........................................................................246

5.3.13 Erasing the BIOS OA Key .....................................................................................................249

5.3.14 Managing BIOS RoT Functions ............................................................................................250

5.3.15 Managing Seamless Update Capsule File............................................................................254

Supermicro Update Manager User’s Guide 20


5.3.16 Getting SCP Firmware Image Information ..........................................................................257

5.3.17 Updating the SCP Firmware Image .....................................................................................258

5.3.18 Getting Fixed Boot Setting ..................................................................................................261

5.3.19 Updating the Fixed Boot Setting .........................................................................................262

5.3.20 Managing Secure Boot ........................................................................................................264

5.4 BMC Management for a Single System............................................................................................268

5.4.1 Getting BMC Firmware Image Information ..........................................................................268

5.4.2 Updating the BMC Firmware Image......................................................................................272

5.4.3 Getting BMC Settings ............................................................................................................276

5.4.4 Updating BMC Settings .........................................................................................................278

5.4.5 Installing BMC Certification ..................................................................................................280

5.4.6 Setting Up a BMC User Password .........................................................................................282

5.4.7 Getting the BMC KCS Privilege Level.....................................................................................284

5.4.8 Setting the BMC KCS Privilege Level .....................................................................................285

5.4.9 Loading Factory BMC Settings ..............................................................................................286

5.4.10 Acquiring the BMC System Lockdown Mode ......................................................................288

5.4.11 Setting the BMC System in Lockdown Mode ......................................................................290

5.4.12 Managing BMC RoT Functions ............................................................................................290

5.4.13 Setting the BMC Reset Counter ..........................................................................................292

5.4.14 Managing Remote Attestation............................................................................................295

5.4.15 Getting BMC LAN Settings...................................................................................................300

Supermicro Update Manager User’s Guide 21


5.4.16 Updating BMC LAN Settings ................................................................................................301

5.4.17 Getting the BMC User List ...................................................................................................302

5.4.18 Setting the BMC User List ...................................................................................................303

5.4.19 Bootstrapping an Account for Redfish Host Interface ........................................................306

5.4.20 Managing a RMCP Service Port ...........................................................................................307

5.5 Event Log Management for a Single System....................................................................................309

5.5.1 Getting System Event Log .....................................................................................................309

5.5.2 Clearing the System Event Log ..............................................................................................312

5.5.3 Getting System Maintenance Event Log ...............................................................................313

5.5.4 Getting Host Crash Dump Log ...............................................................................................314

5.5.5 Clearing System Maintenance Event Log ..............................................................................315

5.6 CMM Management for a Single System (OOB Only) .......................................................................316

5.6.1 Getting CMM Firmware Image Information .........................................................................316

5.6.2 Updating the CMM Firmware Image ....................................................................................317

5.6.3 Getting CMM Settings ...........................................................................................................319

5.6.4 Updating CMM Settings ........................................................................................................319

5.6.5 Setting Up a CMM User Password ........................................................................................321

5.6.6 Loading Factory CMM Settings .............................................................................................322

5.6.7 Getting BBP Firmware Image Information ............................................................................323

5.6.8 Updating the BBP Firmware Image .......................................................................................324

5.6.9 Getting Current Power Status of Blade System ....................................................................325

Supermicro Update Manager User’s Guide 22


5.6.10 Setting Power Status of Blade System ................................................................................326

5.6.11 Managing Profile Information.............................................................................................328

5.6.12 Receiving Switch Firmware Image Information ..................................................................332

5.6.13 Updating the Switch Firmware ...........................................................................................335

5.6.14 Rebooting the Switch ..........................................................................................................337

5.7 Applications for a Single System ......................................................................................................338

5.7.1 Sending an IPMI Raw Command ...........................................................................................338

5.7.2 USB Port Accessibility Control...............................................................................................339

5.7.3 Acquiring USB Port Access Mode (Inband Only) ...................................................................340

5.7.4 Dynamically Controlling USB Port Access Mode (Inband Only) ............................................341

5.7.5 Controlling the UID of the Managed System ........................................................................342

5.7.6 Booting into the ISO Image from HTTP Server......................................................................343

5.7.7 Managing KMS Server Configurations ..................................................................................345

5.7.8 Getting System Settings ........................................................................................................348

5.7.9 Updating System Settings .....................................................................................................348

5.7.10 Invoking Redfish API............................................................................................................351

5.7.11 Remote Execution ...............................................................................................................353

5.7.12 Managing Redfish Host Interface........................................................................................354

5.8 Storage Management for a Single System .......................................................................................354

5.8.1 Getting RAID Firmware Image Information ..........................................................................354

5.8.2 Updating the RAID Firmware Image .....................................................................................357

Supermicro Update Manager User’s Guide 23


5.8.3 Getting RAID Settings ............................................................................................................358

5.8.4 Updating RAID Settings .........................................................................................................359

5.8.5 Getting SATA HDD Information (OOB Only)..........................................................................360

5.8.6 Getting NVMe Information ...................................................................................................361

5.8.7 Secure Erasing Hard Disks .....................................................................................................362

5.8.8 Securely Erasing Hard Disks in RAID Controller ....................................................................369

5.8.9 Getting PMem Firmware Image Information .......................................................................381

5.8.10 Updating the PMem Firmware Image.................................................................................383

5.8.11 Getting VROC Settings.........................................................................................................384

5.8.12 Updating VROC Settings ......................................................................................................385

5.8.13 Controlling NVMe Device ....................................................................................................386

5.9 NIC Management for a Single System..............................................................................................387

5.9.1 Getting Add-On NIC Firmware Image Information ...............................................................387

5.9.2 Updating the Add-On NIC Firmware Image ..........................................................................390

5.10 PSU Management for a Single System ...........................................................................................391

5.10.1 Getting PSU Information .....................................................................................................391

5.10.2 Updating the Signed PSU Firmware Image Requested by OEM .........................................392

5.10.3 Getting Current Power Status of Managed System ............................................................393

5.10.4 Setting Power Action of Managed System .........................................................................394

5.11 TPM Management for a Single System ..........................................................................................395

5.11.1 Getting TPM Information ....................................................................................................396

Supermicro Update Manager User’s Guide 24


5.11.2 Provisioning TPM Module ...................................................................................................410

5.11.3 Enabling and Clearing TPM Module Capabilities ................................................................413

5.12 GPU Management for a Single System ..........................................................................................416

5.12.1 Getting GPU Information ....................................................................................................416

5.12.2 Updating the GPU Firmware Image ....................................................................................439

5.12.3 Diagnosing AMD MI250 GPU System Status .......................................................................453

5.12.4 Getting GPU dump log information ....................................................................................456

5.13 CPLD Management for a Single System .........................................................................................457

5.13.1 Getting CPLD Firmware Image Information ........................................................................457

5.13.2 Updating the CPLD Firmware Image ...................................................................................458

5.13.3 Managing CPLD RoT Functions ...........................................................................................459

5.13.4 Getting Switchboard CPLD Firmware Image Information...................................................461

5.13.5 Updating Switchboard CPLD Firmware Image ....................................................................463

5.13.6 Updating Fanboard CPLD Firmware Image .........................................................................466

5.13.7 Getting AOM Board CPLD Firmware Image Information ....................................................467

5.13.8 Updating AOM Board CPLD Firmware Image .....................................................................468

5.13.9 Getting Miscellaneous CPLD Firmware Image Information ................................................469

5.13.10 Updating Miscellaneous CPLD Firmware Image ...............................................................470

5.14 AIP Management of a Single System .............................................................................................471

5.14.1 Getting AIP CPLD Information .............................................................................................471

5.14.2 Updating the AIP CPLD Firmware Image.............................................................................473

Supermicro Update Manager User’s Guide 25


5.15 Profile Management for a Single Blade System .............................................................................475

5.15.1 Profile Update Rule .............................................................................................................475

5.15.2 Profile Management ...........................................................................................................477

5.15.3 Updating CMM Configurations ...........................................................................................477

5.15.4 Updating Blade Configurations ...........................................................................................478

5.16 TwinPro Management for a Single System ....................................................................................480

5.16.1 Getting TwinPro Settings ....................................................................................................480

5.16.2 Updating TwinPro Settings..................................................................................................480

5.17 CDU Management for a Single System ..........................................................................................482

5.17.1 Getting CDU Information ....................................................................................................482

5.17.2 Setting CDU Alert Setting ....................................................................................................484

5.18 Backplane Management for a Single System .................................................................................487

5.18.1 Getting Multi-Node EC Firmware Image Information ........................................................487

5.18.2 Updating the Multi-node EC Firmware Image ....................................................................488

5.18.3 Getting Backplane CPLD Firmware Information .................................................................490

5.18.4 Updating the Backplane CPLD Firmware Image .................................................................491

5.19 PCIe Switch Management for a Single System...............................................................................494

5.19.1 Getting PCIe Switch Information ........................................................................................494

5.19.2 Updating the PCIe Switch Firmware Image ........................................................................497

5.20 Virtual Media Management for a Single System ...........................................................................500

5.20.1 Providing an ISO Image as a Virtual Media through BMC and File Server ..........................501

Supermicro Update Manager User’s Guide 26


5.20.2 Removing an ISO Image as Virtual Media ...........................................................................506

5.20.3 Mounting a Floppy Image as Virtual Media from a Local Image File ..................................507

5.20.4 Unmounting a Floppy Image as Virtual Media from the Managed System........................508

5.20.5 Get Virtual Media Information from the Managed System ................................................509

5.20.6 Managing Multiple Virtual Media Devices from the Managed System ..............................513

5.21 Security Management for a Single System ....................................................................................518

5.21.1 Getting GPU External RoT (ERoT) Firmware Image Information ........................................518

5.21.2 Getting CPU ERoT Firmware Image Information ................................................................519

5.21.3 Updating CPU ERoT Firmware Image ..................................................................................520

5.21.4 Managing CPU ERoT RoT Functions ....................................................................................520

5.21.5 Managing Motherboard FPGA RoT Functions ....................................................................523

5.22 FPGA Management for a Single System.........................................................................................525

5.22.1 Getting Motherboard FPGA Firmware Image Information.................................................525

5.22.2 Updating Motherboard FPGA Firmware Image ..................................................................526

5.23 MCU Management for a Single System .........................................................................................527

5.23.1 Getting Motherboard MCU Firmware Image Information .................................................527

5.23.2 Updating Motherboard MCU Firmware Image...................................................................528

6 Managing Multiple Systems ........................................................................................................................529

6.1 Input Output Controls for Multiple Systems....................................................................................532

6.1.1 File Input ...............................................................................................................................532

6.1.2 File Output ............................................................................................................................532

Supermicro Update Manager User’s Guide 27


6.1.3 Screen Output .......................................................................................................................533

6.1.4 Log Output ............................................................................................................................539

6.2 Key Management for Multiple Systems ...........................................................................................541

6.2.1 Activating Multiple Managed Systems .................................................................................541

6.2.2 Querying Node Product Key..................................................................................................543

6.3 System Checks for Multiple System .................................................................................................544

6.3.1 Checking OOB Support ..........................................................................................................544

6.3.2 Checking Asset Information ..................................................................................................544

6.3.3 Checking Sensor Data............................................................................................................545

6.3.4 Checking System Utilization ..................................................................................................545

6.3.5 Monitors the Host with ServiceCalls .....................................................................................546

6.3.6 Monitoring and Controlling PFA of the System ....................................................................547

6.3.7 Monitoring and Checking Memory Health of the System ....................................................548

6.3.8 Getting and Activating Intel On Demand ..............................................................................549

6.3.9 Getting and Clearing the Chassis Intrusion Status for the Managed System .......................551

6.3.10 Managing FRU Information .................................................................................................552

6.4 BIOS Management for Multiple Systems .........................................................................................554

6.4.1 Getting BIOS Firmware Image Information ..........................................................................554

6.4.2 Updating the BIOS Firmware Image......................................................................................556

6.4.3 Getting Current BIOS Settings ...............................................................................................557

6.4.4 Updating BIOS Settings Based on a Current Sample Settings ...............................................558

Supermicro Update Manager User’s Guide 28


6.4.5 Getting Factory BIOS Settings ...............................................................................................560

6.4.6 Updating BIOS Settings Based on Factory Sample Settings ..................................................561

6.4.7 Loading Factory BIOS Settings...............................................................................................561

6.4.8 Getting DMI Information ......................................................................................................562

6.4.9 Editing DMI Information .......................................................................................................563

6.4.10 Updating DMI Information Based on a Sample DMI Information ......................................565

6.4.11 Setting BIOS Action .............................................................................................................567

6.4.12 Setting BIOS Administrator Password .................................................................................568

6.4.13 Managing BIOS RoT Functions ............................................................................................573

6.4.14 Managing Seamless Update Capsule File............................................................................574

6.4.15 Getting SCP Firmware Image Information ..........................................................................576

6.4.16 Updating the SCP Firmware Image .....................................................................................577

6.4.17 Getting Fixed Boot Settings.................................................................................................578

6.4.18 Updating Fixed Boot Settings ..............................................................................................578

6.4.19 Managing a Secure Boot .....................................................................................................580

6.5 BMC Management for Multiple Systems .........................................................................................582

6.5.1 Getting BMC Firmware Image Information ..........................................................................582

6.5.2 Updating the BMC Firmware Image......................................................................................583

6.5.3 Getting BMC Settings ............................................................................................................584

6.5.4 Updating BMC Settings .........................................................................................................588

6.5.5 Setting Up the BMC User Password ......................................................................................591

Supermicro Update Manager User’s Guide 29


6.5.6 Getting the BMC KCS Privilege Level.....................................................................................593

6.5.7 Setting the BMC KCS Privilege Level .....................................................................................594

6.5.8 Loading Factory BMC Settings ..............................................................................................595

6.5.9 Acquiring the BMC System Lockdown Mode Status .............................................................596

6.5.10 Setting the BMC System Lockdown Mode ..........................................................................597

6.5.11 Managing BMC RoT Functions ............................................................................................597

6.5.12 Setting the BMC Reset Counter ..........................................................................................598

6.5.13 Managing Remote Attestation............................................................................................599

6.5.14 Getting BMC LAN Settings...................................................................................................600

6.5.15 Updating BMC LAN Settings ................................................................................................601

6.5.16 Getting the BMC User List ...................................................................................................603

6.5.17 Setting the BMC User List ...................................................................................................604

6.5.18 Managing the RMCP Service Port .......................................................................................606

6.6 Event Log Management for Multiple Systems .................................................................................607

6.6.1 Getting the System Event Log ...............................................................................................607

6.6.2 Clearing System Event Log ....................................................................................................607

6.6.3 Getting the System Maintenance Event Log.........................................................................608

6.6.4 Getting Host Crash Dump Data Log ......................................................................................609

6.6.5 Clearing System Maintenance Event Log ..............................................................................610

6.7 CMM Management for Multiple Systems........................................................................................611

6.7.1 Getting CMM Image Information .........................................................................................611

Supermicro Update Manager User’s Guide 30


6.7.2 Updating the CMM Firmware Image ....................................................................................612

6.7.3 Getting CMM Settings ...........................................................................................................612

6.7.4 Updating CMM Settings ........................................................................................................613

6.7.5 Setting Up a CMM User Password ........................................................................................615

6.7.6 Loading Factory CMM Settings .............................................................................................616

6.7.7 Getting BBP Image Information ............................................................................................617

6.7.8 Updating the BBP Firmware Image .......................................................................................617

6.7.9 Getting Current Power Status of Blade System ....................................................................618

6.7.10 Setting Power Status of Blade System ................................................................................618

6.7.11 Managing Profile Information.............................................................................................620

6.7.12 Receiving Switch Firmware Image Information ..................................................................621

6.7.13 Updating the Switch Firmware ...........................................................................................622

6.7.14 Rebooting the Switch ..........................................................................................................624

6.8 Applications for Multiple Systems ...................................................................................................625

6.8.1 Sending an IPMI Raw Command ...........................................................................................625

6.8.2 Controlling the UIDs of Multiple Managed Systems .............................................................626

6.8.3 Booting into the ISO Image from HTTP Server......................................................................627

6.8.4 Managing KMS Server Configurations ..................................................................................629

6.8.5 Getting System Settings ........................................................................................................631

6.8.6 Updating System Settings .....................................................................................................632

6.8.7 Invoking Redfish API..............................................................................................................634

Supermicro Update Manager User’s Guide 31


6.8.8 Remote Execution .................................................................................................................635

6.8.9 Managing Redfish Host Interface..........................................................................................637

6.9 Storage Management for Multiple Systems ....................................................................................637

6.9.1 Getting RAID Firmware Image Information ..........................................................................637

6.9.2 Updating the RAID Firmware Image .....................................................................................638

6.9.3 Getting RAID Settings ............................................................................................................639

6.9.4 Updating RAID Settings .........................................................................................................639

6.9.5 Getting SATA HDD Information.............................................................................................641

6.9.6 Getting NVMe Information ...................................................................................................642

6.9.7 Securely Erasing Hard Disks ..................................................................................................643

6.9.8 Securely Erasing Hard Disks in RAID Controller ....................................................................644

6.9.9 Getting PMem Firmware Image Information .......................................................................647

6.9.10 Updating the PMem Firmware Image.................................................................................648

6.9.11 Getting VROC Settings.........................................................................................................649

6.9.12 Updating VROC Settings ......................................................................................................650

6.9.13 Controlling NVMe Device ....................................................................................................652

6.10 NIC Management for Multiple Systems .........................................................................................653

6.10.1 Getting Add-On NIC Firmware Image Information .............................................................653

6.10.2 Updating the Add-On NIC Firmware Image ........................................................................654

6.11 PSU Management for Multiple Systems ........................................................................................655

6.11.1 Getting PSU Information .....................................................................................................655

Supermicro Update Manager User’s Guide 32


6.11.2 Updating the Signed PSU Firmware Image Requested by OEM .........................................655

6.11.3 Getting the Current Power Status of the Managed System ...............................................656

6.11.4 Setting Power Action of Managed System .........................................................................657

6.12 TPM Management for Multiple Systems .......................................................................................658

6.12.1 Getting TPM Information ....................................................................................................658

6.12.2 Provisioning the TPM Module.............................................................................................659

6.12.3 Enabling and Clearing TPM Module Capabilities ................................................................661

6.13 GPU Management for Multiple Systems .......................................................................................664

6.13.1 Getting GPU Information ....................................................................................................664

6.13.2 Updating the GPU Firmware Image ....................................................................................665

6.13.3 Diagnosing AMD MI250 GPU System Status .......................................................................666

6.13.3 Getting GPU Dump Log Information ...................................................................................666

6.14 CPLD Management for Multiple Systems ......................................................................................668

6.14.1 Getting CPLD Firmware Image Information (Multiple Systems).........................................668

6.14.2 Updating the CPLD Firmware Image (Multiple Systems) ....................................................669

6.14.3 Managing CPLD RoT Functions (Multiple Systems) ............................................................669

6.14.4 Getting Switchboard CPLD Firmware Image Information (Multiple Systems) ...................670

6.14.5 Updating Switchboard CPLD Firmware Image (Multiple Systems) .....................................671

6.14.6 Getting Fanboard CPLD Firmware Image Information (Multiple Systems) ........................671

6.14.7 Updating Fanboard CPLD Firmware Image (Multiple Systems) ..........................................672

6.14.8 Getting AOM board CPLD Firmware Image Information ....................................................673

Supermicro Update Manager User’s Guide 33


6.14.9 Updating AOM board CPLD Firmware Image .....................................................................673

6.14.10 Getting Miscellaneous CPLD Firmware Image Information ..............................................674

6.14.11 Updating Miscellaneous CPLD Firmware Image ...............................................................675

6.15 AIP Management for Multiple Systems .........................................................................................676

6.15.1 Getting AIP CPLD Information .............................................................................................676

6.15.2 Updating the AIP CPLD Firmware Image.............................................................................677

6.16 Profile Management for Multiple Blade Systems ..........................................................................678

6.16.1 Profile Management (Multiple Systems) ............................................................................678

6.16.2 Updating CMM Configurations (Multiple Systems) ............................................................678

6.16.3 Updating System Configurations (Multiple Systems) .........................................................678

6.17 TwinPro Management for Multiple Systems .................................................................................679

6.17.1 Getting TwinPro Settings ....................................................................................................679

6.17.2 Updating TwinPro Settings..................................................................................................680

6.18 CDU Management for Multiple Systems .......................................................................................681

6.19 Backplane Management for Multiple Systems ..............................................................................682

6.19.1 Getting Multi-node EC Firmware Image Information .........................................................682

6.19.2 Updating a Multi-node EC Firmware Image........................................................................683

6.19.3 Getting Backplane CPLD Firmware Information .................................................................684

6.19.4 Updating the Backplane CPLD Firmware Image .................................................................684

6.20 Virtual Media Management for Multiple Systems ........................................................................686

6.20.1 Providing an ISO Image as a Virtual Media through BMC and File Server ..........................686

Supermicro Update Manager User’s Guide 34


6.20.2 Removing an ISO Image as a Virtual Media ........................................................................688

6.20.3 Mounting a Floppy Image Virtually from a Local Image File...............................................689

6.20.4 Unmounting a Floppy Image Virtually from the Managed System ....................................690

6.20.5 Getting Virtual Media Information .....................................................................................691

6.20.6 Managing Multiple Virtual Media Devices ..........................................................................692

6.21 Security Management for Multiple Systems .................................................................................695

6.21.1 Getting GPU External RoT (ERoT) Firmware Image Information ........................................695

6.21.2 Getting CPU ERoT Firmware Image Information ................................................................695

6.21.3 Updating CPU ERoT Firmware Image ..................................................................................696

6.21.4 Managing CPU External RoT Functions ...............................................................................697

6.21.5 Managing Motherboard FPGA RoT Functions ....................................................................698

6.22 FPGA Management for Multiple Systems ......................................................................................699

6.22.1 Getting Motherboard FPGA Firmware Image Information.................................................699

6.22.2 Updating Motherboard FPGA Firmware Image ..................................................................699

6.23 MCU Management for Multiple Systems ......................................................................................701

6.23.1 Getting Motherboard MCU Firmware Image Information .................................................701

6.23.2 Updating Motherboard MCU Firmware Image...................................................................701

Appendix A. SUM Exit Codes..........................................................................................................................703

Appendix B. Management Interface and License Requirements ..................................................................707

Appendix C. Known Limitations .....................................................................................................................713

Appendix D. Third-Party Software .................................................................................................................715

Supermicro Update Manager User’s Guide 35


Appendix E. How to Change BIOS Configurations in XML Files .....................................................................717

E.1 Numeric ..........................................................................................................................................717

E.2 CheckBox ........................................................................................................................................718

E.3 Option.............................................................................................................................................719

E.4 Password ........................................................................................................................................721

E.5 String ..............................................................................................................................................722

E.5.1 File Upload ............................................................................................................................723

E.6 License Requirement ......................................................................................................................724

Appendix F. Using the Command Line Tool (XMLStarlet) to Edit XML Files ..................................................726

F.1 Introduction ....................................................................................................................................726

F.2 Getting/Setting an XML Value (XML Element) ...............................................................................726

F.3 Getting/Setting an XML Value (XML Attribute) ..............................................................................727

Appendix G. Removing Unchanged BIOS Settings in an XML File..................................................................728

Appendix H. How to Sign a Driver in Linux ....................................................................................................730

Appendix I. BMC/CMM Password Rule ..........................................................................................................734

I.1 X11/H11 and earlier platforms including H12 non-RoT systems ....................................................734

I.2 X12/H12 and later platforms except H12 non-RoT systems ...........................................................735

I.3 CMM ................................................................................................................................................736

Appendix J. System Lockdown Mode Table ...................................................................................................737

Appendix K. Using SUM to Run 3rd -Party Tools .............................................................................................741

K.1 LAN NVM update .............................................................................................................................741

K.2 NVIDIA HGX A100 GPU firmware update package ..........................................................................742

Supermicro Update Manager User’s Guide 36


Appendix L. Creating a Firmware Updating Tar File for OpenBMC ...............................................................746

L.1 BIOS Firmware Updating Tar File for OpenBMC ..............................................................................746

L.2 Ampere SCP Firmware Updating Tar File for OpenBMC ..................................................................747

Appendix M. Component Firmware Information and Update Support Matrix .............................................748

Appendix N. Supported Platform Matrix GetGpuInfo/UpdateGpu ...............................................................749

Contacting Supermicro ..................................................................................................................................751

Supermicro Update Manager User’s Guide 37


1 Overview
The Supermicro Update Manager (SUM) can be used to manage the BIOS, BMC/CMM and RAID, SCP
firmware image update and configuration update for select Supermicro systems. In addition, system checks
as well as event log management are also supported. Moreover, special applications are also provided to
facilitate system management. To update configurations, you can edit system BIOS settings, DMI
information, BMC/CMM configurations and RAID configurations from readable text files, as well as use this
update manager to apply these configurations.

Two channels are possible for management: the OOB (Out-Of-Band) channel, i.e., communication through
the IPMI interface, and the in-band channel, i.e., communication through the local system interfaces. By
the OOB channel, most management commands (except the command “CheckSystemUtilization”) can be
executed independently of the OS on the managed system and even before the system OS is installed.

1.1 Features
⚫ Command-line interfaced (CLI) and scriptable
⚫ Independent from OS on managed systems (for OOB usage)
⚫ Operates through OOB (Out-Of-Band) and in-band methods
⚫ Supports concurrent execution of OOB commands on multiple systems through a system list file
⚫ System Checks
o Checks asset device information/health remotely
o Checks if both BIOS and BMC firmware images support OOB functions
o Checks system utilization remotely
o Checks sensor data remotely
o Sends notification of system status via e-mail
⚫ Key Management
o Activates node product keys
o Queries node product keys
⚫ BIOS Management
o Pre-checks system board ID to prevent flashing the wrong BIOS firmware image

Supermicro Update Manager User’s Guide 38


o Supports readable text files of BIOS configuration in plain text or XML format
o Supports readable DMI information text file to be edited
o Updates basic input/output system (BIOS) ROM
o Jumperless update of ME Flash Descriptor (FDT) region when locally update BIOS ROM
o Updates BIOS configurations (settings)
o Updates BIOS Administrator password
o Updates DMI information
o Supports Root-of-Trust (RoT) Management
o Erases OA key of the managed system
o Retrieves the BIOS firmware information of the managed system
o Updates the System Control Processor (SCP) firmware image
o Retrieves the System Control Processor (SCP) firmware information of the managed system
⚫ BMC Management
o Supports readable text files of BMC configuration in XML format
o Updates BMC firmware image
o Updates BMC configuration
o Updates BMC password
o Sets system lockdown mode
o Sets KCS privilege levels (remotely only)
o Supports Root-of-Trust (RoT) Management
⚫ System Event Log
o Retrieves and clears BMC and BIOS event logs
o Retrieves and clears maintenance event logs
o Downloads the system crash dump status from BMC
⚫ Remote CMM Management
o Supports readable text file of CMM configuration in XML format
o Updates CMM firmware image
o Updates CMM configuration
o Updates CMM password
o Updates BBP firmware image
o Controls the power status of CMM system
Supermicro Update Manager User’s Guide 39
⚫ Storage Management
o Retrieves RAID image information from local firmware image or remote RAID controller
o Updates RAID controller firmware image remotely
o Supports the readable text files of RAID configuration in XML format
o Updates RAID configuration remotely only
o Retrieves SATA HDD information remotely only
o Retrieves NVMe information remotely only
o Securely erases an HDD on the managed system
o Securely erases hard disks (HDD or SSD) in the LSI MegaRaid SAS 3108 RAID controller system
o Updates the PMem with the given PMem file
o Retrieves the PMem firmware image information from the local or remote firmware image file
o Supports the readable text files of VROC configuration in XML format
o Updates VROC configuration.
⚫ Applications
o Provisions/clears the trusted platform module (TPM) (remotely only)
o Gets Power status and sets power action
o Updates PSU (Power Supply Unit) firmware images and gets PSU information from the system
o Gets Graphics Processing Unit (GPU) status
o Mounts/unmounts an ISO image file from SAMBA/HTTP-shared folder (remotely only)
o Mounts/unmounts a floppy image file from a local drive
o Supports IPMI raw commands
o Supports USB Port accessibility control
o Boots into an ISO image from the image file server
o Controls the UID (User Identification) of the managed system
o Invokes Redfish API
⚫ CPLD Management
o Updates CPLD firmware images
o Gets the AOM CPLD information from the managed system.
o Updates CPLD of AOM.
o Gets the Miscellaneous CPLD information from the managed system.
o Updates Miscellaneous CPLD.
Supermicro Update Manager User’s Guide 40
⚫ AIP Management
o Only retrieves the AIP CPLD information remotely
o Updates AIP CPLD firmware images
⚫ Security Management
o Gets the CPU ERoT information from the managed system.
o Updates CPU ERoT.
o Gets the GPU ERoT information from the managed system.
o Supports Root-of-Trust (RoT) Management forCPU ERoT.
o Supports Root-of-Trust (RoT) Management for FPGA.
⚫ FPGA Management
o Gets the motherboard FPGA information from the managed system.
o Updates the FPGA of motherboard.
⚫ MCU Management
o Gets the motherboard MCU information from the managed system.
o Updates the MCU of motherboard.

Supermicro Update Manager User’s Guide 41


1.2 Operations Requirements
1.2.1 OOB Usage Requirements (Remote Management Server)

To run remote update operations, you must meet the following requirements:
System Requirements:
Environment Requirements
50 MB free disk space

Hardware 128 MB available RAM

Ethernet network interface card

Linux: Red Hat Enterprise Linux Server 4 Update 3 (x86_64) or later

Linux: CentOS 4.3 (x86_64) or later

Linux: Ubuntu 12.04 LTS (x86_64) or later

Linux: Debian 7 (x86_64) or later

Linux: SUSE Linux Enterprise Server 12 SP3 or later

Linux: Red Hat Enterprise Linux Server 7.6 (aarch64) or later: CentOS
Operating System 7.6 (aarch64) or later

Linux: Oracle 8.5 (aarch64) or later

Linux: Rocky Linux 8.5 (aarch64) or later

Linux: Debian 11.1.0 (aarch64) or later

Linux: Ubuntu Server 20.04.3 (aarch64) or later

Windows: Windows Server 2008 (x64) or later

FreeBSD: FreeBSD 11 (x86_64) or later

The software you should have in advance:


Program/Script Description
SUM The main program for SUM

Supermicro Update Manager User’s Guide 42


1.2.2 OOB Usage Requirements (Network)

The network communication protocol and ports below are required for running OOB commands.
Command Network Requirements
All OOB commands RMCP+ protocol through IPv4/IPv6 UDP with port 623.

In addition to RMCP+ protocol through IPv4/IPv6 UDP with


OOB commands UpdateBios, port 623, HTTP or HTTPS protocol through IPv4/IPv6 with the
UpdateBmc, UpdateCmm and port defined in BMC/CMM configuration is required. The
UpdateRaidController default HTTP and HTTPS ports are defined as ports 80 and
443, respectively.

1.2.3 OOB Usage Requirements (Managed Systems)

SUM can remotely manage the selected Supermicro motherboards/systems. Before use, you must activate
the node product key for the managed systems. For details, see 3 Licensing Managed Systems.
In addition, both the BMC and BIOS firmware images must meet the following requirements.

Firmware Image Requirements


X10 ATEN platform (SMT_X10): 1.52 or later

X11 ATEN platform (SMT_X11): 1.00 or later

X12 ATEN platform (SMT_X12): 1.00 or later

X13 ATEN platform (SMT_X13): 1.01 or later


BMC Version
H11 ATEN platform (SMT_H11): 1.28 or later

H12 ATEN platform (SMT_H12): 1.00 or later

H13 ATEN platform (SMT_H13): 1.01 or later

R12 OpenBMC platform: 2.9.1-v27 or later

CMM Version ATEN platform (SMT_MBIPMI): 2.45 or later

X10 Intel® Xeon® Processor E3-1200 v3 Product Family systems

BIOS Version Version 1.0 or later for select X10 Intel® Xeon® Processor E5 v3/v4
Product Family/X11/H11/X12/H12 systems

Version 1.0d or later for Ampere® Altra®/Altra® Max processor family

Supermicro Update Manager User’s Guide 43


on R12 platforms

The TpmProvision command requires TPM ISO files.


Program/Script Description
TPM_1.3_20170802.zip EFI/TPM_LOCK.ISO
Image for TPM provision.
ReleaseNote.txt
Release note for TPM ISO images usage.
TPM_Detect.ISO
Image for detecting platform and TPM version.

The CheckSystemUtilization command requires additional packages to be installed on the managed system.
Program/Script Description Privilege Requirement
TAS_1.6.0_build.200415.zip A Thin Agent Service (TAS) program to To install and execute, TAS
be installed on the managed systems. needs the root privilege of
the operating system
Collects utilization information on
running on the managed
managed system and update system.
information to BMC.

Below OS and tools are pre-requisite for TAS to be installed successfully on the managed system.
OS Supported OS List Program/Script
Windows Windows 2008 R2 SP1  .NET framework 3.5
Windows 2012 R2  smartmontools 6.5-1
Windows 2016  NVMe vendor specific driver (only required for
using the nvme function)
 Windows patch “KB3033929” (only required for
Windows Server 2008 R2 SP1)
 Intel RST CLI tool 13.2.0.1016 and 13.2.x.xxxx RSTe
driver (specify tool version to specify RSTe driver
version)
 sas3ircu 17.00.00.00
Linux RHEL 6.5/6.6/6.10  ethtool package 2.6.33
RHEL 7.0/7.1/7.5  openIpmi driver
SLES 11 SP4  smartmontools 6.5.x
Ubuntu 14.04 LTS  glibc 2.12
CentOS 6.5/6.9/6.10/7.5  storcli 1.20.15 (for LSI 3108)
 mdadm 4.0 (for RAID)
 nmcli 0.8.1
 net-tools 1.60-110.el6-2
 lsscsi 0.23-2.el6
 lsblk 2.17.2
Supermicro Update Manager User’s Guide 44
OS Supported OS List Program/Script
 sas3ircu 17.00.00.00
FreeBSD 10.1 release  smartmontools 6.5.x
11.1 release  libc 7
 storcli 1.20.15 (for LSI 3108)
 graid (starting with FreeBSD 9.1 for RAID) and
geom_raid.ko
 pciutils 3.5.2
 mfip.ko(for LSI MegaRAID SMART)
 sas3ircu 17.00.00.00
 libconfig 1.7.2

The firmware image below is pre-requisite for TAS to run successfully on the managed system.
Firmware Image Requirements
X10 ATEN platform (SMT_X10): 1.58 or later

X11 ATEN platform (SMT_X11): 1.00 or later

X12 ATEN platform (SMT_X12): 1.00 or later

BMC Version X13 ATEN platform (SMT_X13): 1.01 or later

H11 ATEN platform (SMT_H11): 1.28 or later

H12 ATEN platform (SMT_H12): 1.00 or later

H13 ATEN platform (SMT_H13): 1.01 or later

1.2.4 In-Band Usage Requirements

With the use of in-band, SUM can perform BIOS/BMC/SCP/EventLog Management functions for selected
Supermicro motherboards/systems. The managed system must meet the following requirements.
System Requirements:

Environment Requirements
Hardware 50 MB free disk space

128 MB available RAM

Firmware image X10 Intel® Xeon® Processor E3-1200 v3 Product Family select systems

BIOS Version 1.0 or later for X10 Intel® Xeon® Processor E5 v3/v4
Product Family/X11/H11/X12/H12 select systems

Supermicro Update Manager User’s Guide 45


Environment Requirements
BIOS Version 1.0d or later for Ampere® Altra®/Altra® Max processor
family on R12 platforms

Operating System Linux: Red Hat Enterprise Linux Server 4 updates 3 (x86_64) or later

Linux: CentOS 4.3 (x86_64) or later

Linux: Ubuntu 12.04 LTS (x86_64) or later

Linux: Debian 7 (x86_64) or later

Linux: SUSE Linux Enterprise Server 12 SP3 or later

Linux: Red Hat Enterprise Linux Server 7.6 (aarch64) or later

Linux: CentOS 7.6 (aarch64) or later

Linux: Oracle 8.5 (aarch64) or later

Linux: Rocky Linux 8.5 (aarch64) or later

Linux: Debian 11.1.0 (aarch64) or later

Linux: Ubuntu Server 20.04.3 (aarch64) or later

Windows: From Windows Server 2008 R2 SP1 (x64) to Windows


Server 2019

FreeBSD: FreeBSD 7.111 (x86_64) or later

Note: Though SUM can be run on Red Hat Enterprise Linux Server 4 updates 3 or later,
several OS might not be supported by hardware. For the list of supported operating systems,
please check the OS support list.

Execution Privilege Requirements:

Privilege Description
SUM Execution Privilege To execute in-band functions, SUM needs the root/Administrator
privilege of the operating system running on the managed system.

The software you should get in advance:

Supermicro Update Manager User’s Guide 46


OS Program/Script Description
Linux/Windows/FreeBSD SUM The main program for SUM

Windows driver/phymem.sys Access physical memory and IO ports

driver/pmdll64.dll

Please contact Supermicro for any necessary drivers.

Note: For Windows Server 2008 R2 and Windows 7, Windows driver requires Windows
patch #3033929.
https://docs.microsoft.com/en-us/security-updates/securityadvisories/2015/3033929
Click the link below to download the patch.
https://www.microsoft.com/en-us/download/confirmation.aspx?id=46083

1.2.5 Additional In-Band Usage Requirements

For in-band commands (except for commands “GetBiosInfo” and “UpdateBios”), the managed system must
have a BMC firmware image and an IPMI driver installed. The BMC firmware image should meet the
following requirements.
Firmware Image Requirement
X10 ATEN platform (SMT_X10): 1.19 or later

X11 ATEN platform (SMT_X11): 1.00 or later

X12 ATEN platform (SMT_X12): 1.00 or later

X13 ATEN platform (SMT_X13): 1.01 or later


BMC Version
H11 ATEN platform (SMT_H11): 1.28 or later

H12 ATEN platform (SMT_H12): 1.00 or later

H13 ATEN platform (SMT_H13): 1.01 or later

R12 OpenBMC platform: 2.9.1-v27 or later

The drivers you should get in advance:


OS Program/Script Description
Red Hat. Enterprise Linux built-in IPMI driver Sends/Receives data to/from BMC
Server 4u3 or later
(x86_64)/Ubuntu 12.04 or

Supermicro Update Manager User’s Guide 47


later (x86_64)/
FreeBSD 11 or later (x86_64)

If the Linux/FreeBSD OS does not have the built-in IPMI driver, you should install the following software:
Program/Script Description
OpenIPMI.x86_64 IPMI driver for accessing BMC through its KCS interface

Supermicro Update Manager User’s Guide 48


1.3 Typographical Conventions
This manual uses the following typographical conventions.

Courier-New font size 10 represents Command Line Interface (CLI) instructions in Linux terminal
mode.

Bold is used for keywords needing attention.

Italics is used for variables and section names.

<> encloses the parameters in the syntax description. [shell]# represents the input prompt in Linux
terminal mode.

[SUM_HOME]# represents the SUM home directory prompt in Linux terminal mode.

| A vertical bar separates the items in a list.

Supermicro Update Manager User’s Guide 49


2 Installation and Setup

2.1 Installing SUM


2.1.1 Linux, Windows, and FreeBSD

To install SUM in Linux/FreeBSD OS, follow these steps. Windows installation and usage is similar.

1. Extract the sum_x.x.x_Linux_x86_64_YYYYMMDD.tar.gz archive file.


2. Go to the extracted sum_x.x.x_Linux_x86_64 directory. Name this directory as “SUM_HOME”.
3. Run SUM in the SUM_HOME directory.

Linux Example:

[shell]# tar xzf sum_x.x.x_Linux_x64_YYYYMMDD.tar.gz

[shell]# cd sum_x.x.x_Linux_x86_64

[SUM_HOME]# ./sum

Note: It is recommended that SUM tool with SUM release package should be used
because binary files are required for certain commands.

2.2 Setting Up OOB Managed Systems


To setup OOB managed systems, follow these steps:

1. Connect the BMC/CMM to the LAN.


2. Update the BMC/CMM firmware image in the managed systems to support OOB functions (if the
current version does not support it). Note that you can use the SUM UpdateBmc/UpdateCmm
command to flash BMC/CMM firmware image even when BMC/CMM does not support OOB
functions.
3. Flash the BIOS ROM to the managed systems to support OOB functions (if the current version does
not support it). Note that you can use the SUM “UpdateBios” command (either in-band or OOB) to
Supermicro Update Manager User’s Guide 50
flash BIOS even when BIOS does not support OOB functions. However, when using an OOB channel, if
the onboard BIOS or the BIOS firmware image does not support OOB functions, the DMI information
(such as the MB serial number) might be lost after system reboot.
4. Install the TAS package on the OS of the managed system (for “CheckSystemUtilization” command
only).

2.2.1 Installing the TAS Package

The TAS package (TAS_version_build.date.zip) can be acquired from Supermicro. Only Windows, Linux, and
FreeBSD platforms are supported. To install TAS, follow below steps.

1. Copy the TAS_version_build.YYMMDD.zip package to the operation system (OS) of managed system.
2. Extract the TAS_version_build.YYMMDD.zip archive file. Three archive files will be created, e.g.,
TAS_version_build.YYMMDD_Windows.zip/Linux.tar.gz/Freebsd.tar.gz, for Windows/Linux/FreeBSD
systems. One additional readme file will be created. You can check the INSTALLATION section in the
readme file or follow the steps below.
3. Install TAS pre-requisite tools listed in 1.2.3 OOB Usage Requirements (Managed Systems).
4. For Windows systems,
a. Extract the file TAS_version_build.YYMMDD_Windows.zip
b. Select the correct system architecture. For x64 system, select folder 64.
c. Run setup.bat.
5. For Linux systems,
a. Extract the file TAS_version_build.YYMMDD_Linux.tar.gz
b. Select the correct system architecture.
c. Run install.sh.

Example: for x86_64 Linux system

[shell]# tar xzf TAS_1.5.1_build.180202_Linux.tar.gz

[shell]# cd 64bit

[shell]# ./install.sh

6. For FreeBSD systems,


Supermicro Update Manager User’s Guide 51
a. Extract the file TAS_version_build.YYMMDD_Freebsd.tar.gz
b. Run install.

Supermicro Update Manager User’s Guide 52


2.3 Setting Up In-Band Managed Systems
For Windows OS, no action is required. As a reminder, if the version of the currently installed Windows
driver is old, SUM would stop TAS/SD5, load a new driver and restart TAS/SD5. For Linux OS, no action is
required either, but if the BIOS item “Secure Boot” is enabled, the following actions must be taken to set
up the Linux in-band managed systems. The first step is to build the Linux driver, and the second step is to
sign the driver.

2.3.1 Building a Linux Driver


To build the driver, install kernel-devel for their OS, then execute “make” under the
SUM_HOME/driver/Source/Linux directory.

Syntax:

[shell]# make

2.3.2 Signing a Driver in Linux


After you have made arrangements for signing the driver (refer to Appendix H. How to Sign a Driver in Linux)
and obtain the keys to execute the command in the driver folder.

Syntax:

[shell]# /lib/modules/$(uname -r)/build/scripts/sign-file sha256 <private key

name>.priv <public key name>.der sum_bios.ko

For Kernel prior to 4.3.3, the command should run with perl.

Syntax:

[shell]# perl /lib/modules/$(uname -r)/build/scripts/sign-file sha256 <private

key name>.priv <public key name>.der sum_bios.ko

Note: To generate the keys to run the command to sign a driver, run step 5 in Appendix
H. How to Sign a Driver in Linux:
• <private key name>.priv: the generated private key file name.
• <public key name>.der: the generated public key file name.

Supermicro Update Manager User’s Guide 53


3 Licensing Managed Systems
Each node is licensed by a product key. To access most SUM functions, it is required that a managed system
activates the node product keys. To view a complete list of these functions, please refer to Appendix B.
Management Interface and License Requirements. Product key activation is not required on the
management server running SUM. The node product key is binding in the MAC address of the BMC LAN
port. Two license key formats are supported: JSON and non-JSON. The JSON format supports all types of
product keys. The non-JSON format includes these types: xxxx-xxxx-xxxx-xxxx-xxxx-xxxx for SFT-OOB-LIC
and a 344-byte ASCII string for the other node product keys.

The following sections describe the steps for activation. First, you can receive the node product keys from
Supermicro as in 3.1 Getting Node Product Keys from Supermicro. With these node product keys, you can
then activate these systems as described in 3.2 Activating Managed Systems. SUM also provided auto-
activation methods for customer usage. For this usage, please refer to 3.3 Auto-Activating Managed
Systems.

3.1 Getting Node Product Keys from Supermicro


To get node product keys from Supermicro, follow these steps:

1. Collect BMC MAC address and list them in one file, e.g., mymacs.txt.

Example:

003048001012

003048001013

003048001014

003048001015

2. Send this file (mymacs.txt) to Supermicro to obtain a node product key file (mymacs.txt.key). The
node product key file includes the MAC address and node product key.

Example:

Supermicro Update Manager User’s Guide 54


Non-JSON Format

003048001012;1111-1111-1111-1111-1111-1111-1111

003048001013;2222-2222-2222-2222-2222-2222-2222

003048001014;3333-3333-3333-3333-3333-3333-3333

JSON-Format

003048001015;{"ProductKey":{"Node":{"LicenseID":"1","LicenseName":"SFT-OOB-

LIC","CreateDate":"20200409"},"Signature":"1111111111111111111122222222222222233333333333333ab

abababababababababababbabcdcdcdcdcdcdccdcdcddcdefefefefefefefeefefefefghghghghghghghghghghgh"}}

3.2 Activating Managed Systems


To activate a single system, see 5.1.1 Activating a Single Managed System. To simultaneously activate
multiple systems, see 6.2.1 Activating Multiple Managed Systems.

3.3 Auto-Activating Managed Systems


For a new completely assembled system, its node product key can be activated while it is in production. It
is strongly recommended that node product keys should be activated in this way. Please contact your sales
representative for details.

However, in some cases, it is also possible to activate node product keys without running the command
“ActivateProductKey.” Follow these steps:

1. Collect the BMC MAC addresses of managed systems and list them in a text file, e.g., “mymacs.txt”.
2. Send this file (“mymacs.txt”) to Supermicro through your sales representative to obtain a credential
file (“cred.bin”).
3. Put the credential file in the “SUM_HOME/credential” directory on the system where the required
SUM command is run.
4. SUM will auto-activate product keys from cred.bin after license-required commands are run on the
managed systems.
Supermicro Update Manager User’s Guide 55
Note: Auto-activation is not a site license.

Supermicro Update Manager User’s Guide 56


4 Basic User Interface
SUM is a binary executable file written in the C++ language. Running this file on either Windows or
Linux/FreeBSD is similar. In this document, only the examples of running on Linux are provided. To display
the usage information, use this command:

[SUM_HOME]# ./sum

To display the usage information for each SUM command, use this syntax:

[SUM_HOME]# ./sum -h -c <command name>

Example:

[SUM_HOME]# ./sum -h -c UpdateBios

Usage Information

Options Description or usage


-h Shows help information.

-v Displays the verbose output on the screen.

<InterfaceName> (case sensitive)

Redfish_HI = Executes in-band commands using Redfish Host Interface.


-I Remote_INB = Executes in-band commands on remote systems.
Remote_RHI = Executes in-band commands using Redfish Host Interface
on remote systems.

-i <BMC/CMM IP address or host name> (case sensitive)

-l <BMC/CMM system list file name>

-u <BMC/CMM user ID>

-p <BMC/CMM user password>

-f <BMC/CMM user password file>


Reads the first line of password file as password.
-c <command name>

Supermicro Update Manager User’s Guide 57


Options Description or usage
--oi <OS IP address>

--ou <OS user ID>

--op <OS user password>

--os_key <OS private key>

--os_key_pw <OS private key password>

Number of executions in a single batch


--batch_count
(For multiple systems management only)

--version Shows version information.

<BMC/CMM/Command port(s)>
The format is "RMCP:623,HTTPS:443".
Supports these ports:
1. RMCP (for BMC/CMM OOB usage)
--port
2. HTTPS (for BMC/CMM Redfish usage)
(Will overwrite the ports in the .sumrc file)
Each command may support more optional port(s).
Please read the help message of each command.

--no_banner Hides the version and copyright banner.

--no_progress Hides the progress message.

--journal_level <set SUM journal level>


(0: silent, 1: fatal, 2: error, 3: warning, 4: information, 5: debug, 6: verbose)
--journal_path <set SUM journal path>

--rc_path <set .sumrc file path>

Shows the intermediate status of all managed systems.


--show_multi_full
(For multiple systems management only)

--remote_sum <set remote SUM path> to be executed in the remote managed system.

--remote_sum_rc <set remote .sumrc file path> to be applied to the remote managed system.

System Check
Commands Long Options
CheckOOBSupport None

CheckAssetInfo (OOB only) None

Supermicro Update Manager User’s Guide 58


System Check
Commands Long Options
CheckSensorData (OOB only) --action (Optional)

1 = Show
2 = Del
3 = GetVer
4 = SetVer

--showall (Optional)
Shows more sensor data information.

--sdr_id (Optional)
The SDR ID for delete.

--sdr_major_version (Optional)
The SDR major version.

--sdr_minor_version (Optional)
The SDR minor version.
CheckSystemUtilization (OOB only) None

(TAS thin agent is required.)

ServiceCalls --file <file name>

Monitors the host with the given XML-style file listing system
event logs and sensor data records to be monitored.

SystemPFA --action

1 = GetCurrentStatus
2 = Enabled
3 = Disabled

--reboot (Optional)
Forces the managed system to reboot or power up after
operation.

--post_complete (Optional)
Waits for the managed system POST to complete after
rebooting.

MemoryHealthCheck --action

1 = GetCurrentStatus
2 = Persistent
3 = Enable
4 = Disable
Supermicro Update Manager User’s Guide 59
System Check
Commands Long Options

--reboot (Optional)
Forces the managed system to reboot or power up after
operation.

--post_complete (Optional)
Waits for the managed system POST to complete after
rebooting.

CpuOnDemand --action

1 = GetHwInfo
2 = GetOnDemandState
3 = SetLicenseActivateCode
4 = EnablePPIN

-v
Prints extra info of CAP and registers in action 2 =
GetOnDemandState.

--cpu_id <CPU ID>


CPU ID to indicate CPU socket.

--hw_id <Hardware ID>


Hardware ID to indicate the PPIN of the CPU socket.

--hw_id_file <Hardware ID file>


Hardware ID file with the format of "BMC MAC;CPU
ID;PPIN".
--lac_file <LAC+ map file>
License file in the format of "PPIN;LAC+(s)" used in action 3 =
SetLicenseActivateCode.
--cfg_file <SDSi-agent config file>
SDSi-agent config file, only useful in action 2 =
GetOnDemandState and specifying -v.

--skip_gap <Skip gap(s)>


Skips the gap of LAC revision ID and continues provisioning.

--squash <Squash into one file>


Squashes the state reports into one file in the format of
"PPIN;State Report."

--plain_text <Output state as plain text>

Supermicro Update Manager User’s Guide 60


System Check
Commands Long Options
Prints the on-demand state as plain text.

--file <file name>


Save to file in action 1 = GetHwInfo and action 2 =
GetOnDemandState or provide license file in action 3 =
SetLicenseActivateCode.

--reboot (Optional)
Forces the managed system to reboot or power up after
operation.

--post_complete (Optional)
Waits for the managed system POST to complete after
rebooting.

--overwrite (Optional)
Overwrites the hardware ID or on-demand state report file.
ChassisIntrusion --action
1 = Status
2 = Clear
--file <file name> (Optional)
Saves the dumped FRU data to a file.
--overwrite (Optional)
Overwrites the output file.
--showall (Optional)
Gets all FRU info from the managed system.
--file_only (Optional)
Works with the --file option, and only reads FRU information
from the input dumped FRU file.
--dump (Optional)
GetFruInfo Works with the --file option, and dumps FRU data.
--dev_id <Device ID>(Optional)
Gets more FRUs from CMM.
FRU ID: [1-19] or "ALL"
1 = CMM Master
2 = CMM Middle Plane
3 = CMM Switch(A1)
4 = CMM Switch(A2)
5 = CMM Switch(B1)
6 = CMM Switch(B2)
7 = CMM PSU(A1)

Supermicro Update Manager User’s Guide 61


System Check
Commands Long Options
8 = CMM PSU(A2)
9 = CMM PSU(A3)
10 = CMM PSU(A4)
11 = CMM PSU(B1)
12 = CMM PSU(B2)
13 = CMM PSU(B3)
14 = CMM PSU(B4)
15 = CMM FAN(1)
16 = CMM FAN(2)
17 = CMM FAN(3)
18 = CMM FAN(4)
19 = CMM Slave
--file <file name>
Reads the dumped FRU file.
RestoreFruInfo --individually (Optional)
Restores each BMC with the corresponding FRU info file
individually.
ChangeFruInfo --item <item name>
Changes the FRU field of the managed system.
CT = Chassis Type
CP = Chassis Part Number
CS = Chassis Serial Number
BDT = Board Mfg. Date/Time ("YYYY/MM/DD HH:MM")
BM = Board Manufacturer
BPN = Board Product Name
BS = Board Serial Name
BP = Board Part Number
PM = Product Manufacturer
PN = Product Name
PPM = Product Part/Model Number
PV = Product Version
PS = Product Serial Number
PAT = Asset Tag
--value <assignment value>
Changes the value of the given FRU field.

Supermicro Update Manager User’s Guide 62


Key Management
Commands Long Options
ActivateProductKey --key <node product key value> (Optional)
Uses the node product key to activate the managed system.
--key_file <file name> (Optional)
Uses the node product key file to activate the managed system.

QueryProductKey None

BIOS Management
Commands Long Options
UpdateBios --file <file name>
Updates the BIOS with the given BIOS image file.

--reboot (Optional)
Forces the managed system to reboot or power up after operation.
This feature is supported since the X10 Intel® Xeon® Processor E5 v3/v4
Product Family platform.

--individually (Optional)
Individually updates each BIOS with its corresponding image file.

--flash_smbios (Optional)
Overwrites and resets the SMBIOS data. This option is used only for
specific purposes. Unless you are familiar with SMBIOS data, do not use
this option.

--preserve_nv (Optional)
Preserves the NVRAM. This option is used only for specific purposes.
Unless you are familiar with BIOS NVRAM, do not use this option. (Not
available on X12 and later systems.)

--preserve_mer (Optional)
Preserves the ME firmware region. This option is used only for specific
purposes. Unless you are familiar with ME firmware image, do not use
this option. (Not available on X12 and later RoT systems.)

--kcs (Optional)
Updates BIOS through KCS. (Support is available on platforms before X11
with OEM BMC request only and can be only used with in-band.)

--preserve_setting (Optional)
Preserves BIOS configurations. This option is used only for specific
purposes. Unless you are familiar with BIOS configurations, do not use
this option.

Supermicro Update Manager User’s Guide 63


BIOS Management
Commands Long Options

--erase_OA_key (Optional)
Erases OA key.

--backup (Optional)
Backs up the current BIOS image. (Only supported by the RoT systems.)

--forward (Optional)
Confirms the Rollback ID and upgrades to the next revision. (Only
supported by the X12/H12 and later platforms except the H12 non-RoT
systems.)

--staged <action> (Optional)


Sets action to:
1 = update: The update process will start at the next system boot.
2 = abort: Aborts the previously staged update task.
3 = getinfo: Check whether if there was any pending staged update task.

--post_complete (Optional)
Waits for the managed system's POST to complete after reboot.

--clear_password (Optional)
Clears BIOS password.

--erase_secure_boot_key (Optional)
Erases secure boot key.

--reset_boot_option (Optional)
Resets BIOS boot configurations.

--redfish (Optional)
Enables support for pure Redfish.
GetBiosInfo
--file <file name> (Optional)
Reads BIOS information from an input BIOS image file.

--individually (Optional)
Gets each BIOS with its corresponding image file individually.

--showall (Optional)
Prints the BIOS version, BIOS revision and BIOS OEM FID information.

--file_only (Optional)
Works with --file, and only reads BIOS information from the input image
file.
--extract_measurement (Optional)
Works with --file, extract BIOS image file measurement.

Supermicro Update Manager User’s Guide 64


BIOS Management
Commands Long Options

--showall (Optional)
Prints the last BMC reset time.

--redfish (Optional)
Enables support for pure Redfish.
GetDefaultBiosCfg
--file <file name> (Optional)
Saves the BIOS configuration to a file.
Prints the default factory BIOS configuration on the screen if the file-
saving function is not available.

--current_password <current password> (Optional)


Checks the current BIOS Administrator password.

--cur_pw_file <Current Password File> (Optional)


The specified file path to read current password.

--overwrite (Optional)
Overwrites the output file.
GetCurrentBiosCfg
--file <file name> (Optional)
Saves the BIOS configuration to a file.
Prints the current BIOS configuration on the screen if the file-saving
function is not available.

--current_password <current password> (Optional)


Checks the current BIOS Administrator password.

--cur_pw_file <Current Password File> (Optional)


The specified file path to read current password.

--overwrite (Optional)
Overwrites the output file.

--tui (Optional)
Edits BIOS configuration with text-based user interface.

--compact (Optional)
Generates a compact version of the BIOS configuration containing only
the settings that have been changed in the text-based user interface.
ChangeBiosCfg
--file <file name>
Updates the BIOS with the given configuration file.

--current_password <current password> (Optional)


Checks the current BIOS Administrator password.

--cur_pw_file <Current Password File> (Optional)


Supermicro Update Manager User’s Guide 65
BIOS Management
Commands Long Options
The specified file path to read the current password.

--reboot (Optional)
Forces the managed system to reboot or power up after operation.

--individually (Optional)
Updates each BIOS individually with the corresponding configuration file.

--skip_unknown (Optional)
Skips the unknown settings or menus in the BIOS configuration file.

--skip_bbs (Optional)
Skips the BBS-related menus in the BIOS configuration file.

--post_complete (Optional) Waits for the managed system's POST to


complete after reboot.
LoadDefaultBiosCfg
--current_password <current password> (Optional)
Checks the current BIOS Administrator password.

--cur_pw_file <Current Password File> (Optional)


The specified file path to read the current password.

--reboot (Optional)
Forces the managed system to reboot or power up after operation.

--post_complete (Optional)
Waits for the managed system's POST to complete after reboot.

--clear_bios_eventlog (Optional)
Clears the BIOS event log.
GetDmiInfo
--file <file name> (Optional)
Saves the DMI information to a file.
Prints the DMI information on the screen if the file-saving function is not
available.

--overwrite (Optional)
Overwrites the output file.
EditDmiInfo
--file <file name>
The DMI information file to be edited (or created if it does not exist).

--item_type <item type>


Specifies the item type.

--item_name <item name>


Specifies the item name.

Supermicro Update Manager User’s Guide 66


BIOS Management
Commands Long Options

--shn <short name>


Specifies the item in short name format.

--value <assignment value>


Assigns the value to the item.

--default
Assigns the default value to the item.

Notes:
 Either [--item_type, --item_name] or [--shn] is required.
 Either [--value] or [--default] is required.
ChangeDmiInfo
--file <file name>
Updates the DMI information with the given text file.

--reboot (Optional)
Forces the managed system to reboot or power up after operation.

--individually (Optional)
Individually updates each piece of DMI information with its corresponding
text file .

--post_complete (Optional)
Waits for the managed system's POST to complete after reboot.
SetBiosAction
--BBS <yes/no>
Shows/hides the settings related to BBS priority. Selecting yes will show
the settings related to BBS priority and selecting no will hide them.

--reboot (Optional)
Forces the managed system to reboot or power up after operation.
SetBiosPassword
--new_password <new password> (Optional)
Sets the new BIOS Administrator password.

--confirm_password <confirm password> (Optional)


Confirms the new BIOS Administrator password.

--current_password <current password> (Optional)


Checks the current BIOS Administrator password.

--reboot (Optional)
Forces the managed system to reboot or power up after operation.

--pw_file <Password File> (Optional)


The specified file path to read the new password.

Supermicro Update Manager User’s Guide 67


BIOS Management
Commands Long Options

--post_complete (Optional)
Waits for the managed system's POST to complete after reboot.

--cur_pw_file <Current Password File> (Optional)


The specified file path to read the current password.
EraseOAKey (In-band
only) --reboot (Optional)
Forces the managed system to reboot or power up after operation.
BiosRotManage
--action <action>
Sets action to:
1 = GetInfo
2 = UpdateGolden
3 = Recover
4 = DownloadEvidence

--file <file name> (Optional)


Works with --action DownloadEvidence. Saves the BIOS evidence to a file.

--overwrite (Optional)
Works with --action DownloadEvidence. Overwrites the output file.

--reboot (Optional)
Works with --action UpdateGolden and Recover. Forces the managed
system to reboot or power up after operation.

--post_complete (Optional)
Waits for the managed system’s POST to complete after reboot.

--redfish
Enables support for pure Redfish.
GetScpInfo
--file <file name>
Reads SCP information from an input SCP image file.

--file_only
Works with the --file option, and only reads SCP information from the
input image file.

Supermicro Update Manager User’s Guide 68


UpdateScp
--file <file name>
Updates SCP with the given FW image file.

--reboot
Forces the managed system to reboot or power up after operation.

--post_complete (Optional)
Waits for the managed system’s POST to complete after reboot.

--individually (Optional)
Updates each SCP with its corresponding firmware file individually.
SecureBootManage
--action <action>
Sets action to:
1 = Status
2 = Enable
3 = Disable
4 = Showdatabases
5 = UploadCertificate
6 = ResetAllKeysToDefault
7 = DeleteAllKeys
8 = DeletePK
--file_type <file type> (Optional)
Selects the type of secure boot key.
The format of <file type> is “PK”, “KEK”, “db”, “dbr”, “dbt” or “dbx” (case
sensitive).
--file (Optional)
Uploads secure boot key in the format of PEM.
--individually (Optional)
Updates each system secure boot keys individually with the
corresponding secure boot key.
--reboot (Optional)
Forces the managed system to reboot or power up after operation.
--post_complete (Optional)
Waits for the managed system's POST to complete after reboot.
GetFixedBootCfg --file <file name> (Optional)
Saves the configuration to a file.
Prints the BIOS fixed boot order configuration on screen if the file-saving
function is not available.
--redfish
Gets the BIOS fixed boot order with the pure Redfish solution.
--overwrite (Optional)
Overwrites the output file.
ChangeFixedBootCfg
--file <file name>
Updates the BIOS fixed boot order with the given configuration file.

Supermicro Update Manager User’s Guide 69


--redfish
Updates the BIOS fixed boot order with the pure Redfish solution.
--reboot (Optional)
Forces the managed system to reboot or power up after operation.
--individually (Optional)
Updates each fixed BIOS boot configuration with the corresponding
configuration file individually.
--post_complete (Optional)
Waits for the managed system’s POST to complete after reboot.

BMC Management
Commands Long Options
UpdateBmc
--file <file name>
Updates the BMC with the given BMC file.
--individually (Optional)
Updates each BMC with its corresponding image file individually.
--overwrite_cfg (Optional)
Overwrites the current BMC configuration using the factory default
values in the given BMC image file.
--overwrite_sdr (Optional)
Overwrites current BMC SDR data.
For AMI BMC FW, it must use the --overwrite_cfg option as well.
--overwrite_ssl (Optional)
Overwrites current BMC SSL configuration. (Only supported by X12/H12
and later platforms except for H12 non-RoT systems.)

--backup (Optional)
Backs up the current BMC image. (Only supported by the RoT systems.)

--forward (Optional)
Confirms the Rollback ID and upgrades to the next revision. (Only
supported by X12/H12 and later platforms except for H12 non-RoT
systems.)

--boot_check (Optional)
Checks if BMC boots up in 16 minutes after update. (Only supported on
X12/H12 and later platforms except the H12 non-RoT systems.)

--redfish
Enables support for pure Redfish.
GetBmcInfo
--file <file name> (Optional)
Reads the BMC information from an input BMC image file.
--individually (Optional)
Supermicro Update Manager User’s Guide 70
BMC Management
Commands Long Options
Gets each BMC with its corresponding image file individually.
--file_only (Optional)
Works with --file, and only reads BMC information from the input image
file.
--extract_measurement (Optional)
Works with --file, extracts BMC image file measurement.

--redfish
Enables support for pure Redfish.

--showall
Work with the --showall option to display all information.
GetBmcCfg
--file <file name> (Optional)
Saves the configuration to a file.
Prints the BMC configuration on screen if the file-saving function is not
available.
--dump (Optional)
Dumps read-only BMC configuration file.
--overwrite (Optional)
Overwrites the output file.
--sample_file (Optional)
Creates BMC configuration using the format from the sample file.
--action (Optional)
Sets the action of each XML table. Acceptable option: None or Change.
ChangeBmcCfg
--file <file name>
Updates the BMC with the given configuration file.
--restore (Optional)
Restores the BMC configuration with the corresponding read-only
configuration file.

--individually (Optional)
Updates each BMC with the corresponding configuration file individually.

--skip_unknown (Optional)
Skips the unknown tables or settings in the BMC configuration file.
SetBmcPassword
--user_id <user ID>
Enters the BMC user ID.
--new_password <new password>
Sets the new BMC user password.
--confirm_password <confirms password>
Confirms the new BMC user password.

Supermicro Update Manager User’s Guide 71


BMC Management
Commands Long Options

--pw_file <password file>


The specified file path to read the new BMC user password.
GetKcsPriv None

SetKcsPriv (OOB only)


--priv_level <KCS privilege level>
Sets KCS privilege with level.
1 = Call Back
2 = User
3 = Operator
4 = Administrator
GetLockdownMode None

SetLockdownMode
--reboot
Forces the managed system to reboot or power up after operation.
--lock <yes/no>
<yes/no> Locks/Unlocks the managed system.
--post_complete (Optional)
Waits for the managed system’s POST to complete after rebooting.
LoadDefaultBmcCfg
--reboot (Optional)
Forces the managed system to reboot or power up after operation.

--clear_user_cfg
Clears user configuration.

--preserve_user_cfg
Preserves user configuration.

--load_unique_password
Loads the unique BMC password.

--load_default_password
Loads the default BMC password.
--redfish
Enables support for pure Redfish.
BmcRotManage
--action <action>
Sets action to:
1 = GetInfo
2 = UpdateGolden
3 = Recover
4 = DownloadEvidence

--file <file name> (Optional)


Works with --action DownloadEvidence. Saves the BMC evidence to a

Supermicro Update Manager User’s Guide 72


BMC Management
Commands Long Options
file.

--overwrite (Optional)
Works with --action DownloadEvidence. Overwrites the output file.
--redfish

Enables support for pure Redfisht.


TimedBmcReset
--immediate <immediately>(Optional)
Reset BMC immediately.
--delay <BMC reset delay time> (Optional)
Delay reset time.
Note: Delay time must be set within 1 to 60 minutes.
Attestation
--action <action>
Sets action to:
Dump
List
Download
Delete
GetInfo
Comapre

--file <file name> (Optional)


File name for the measurement file on managed system or local storage.

--ref <file name> (Optional)


Reference measurement file for comparison. (Only supported with the
Compare action)
--overwrite (Optional)
Overwrites the downloaded or extracted file.

--showall (Optional)
Prints all information from the measurement file. (Only supported with
the GetInfo action)

--item <item name> (Optional)


Prints the specified item for the measurement file. (Only supported with
the GetInfo action)

--file_only (Optional)
Gets information from the local measurement file. (Required option for
the GetInfo action)

--root_cert <file name> (Optional)


Inputs the public certificate of Root CA to verify the certificate chain in
measurement file. (Only supported with the GetInfo action)

Supermicro Update Manager User’s Guide 73


BMC Management
Commands Long Options

--extract_certs <file name> (Optional)


Extracts endpoint certificate chain from the local measurement file.
(Only supported with the GetInfo action)
--nonce <nonce> (Optional)
Specify nonce for action Dump.
--type (Optional)
Specifies the dump type for the Dump action.
Supported types: MB
GetBmcUserList
None
SetBmcUserList
--action <action>
Sets action to:
1 = Add
2 = Del
3 = Level
4 = SetPwd
5 = Test
6 = EnableType
7 = EnableAccount

--user_id <user ID (Optional)


The BMC user ID.

--user_name (Optional)
The BMC username.

--user_password <user password> (Optional)


The BMC user password.

--user_privilege <user privilege> (Optional)


For privilege level:
Administrator: 4
Operator: 3
User: 2
Callback: 1
No Access: 15
No Access is not supported after X11/H11 platform.

--account_type <account type> (Optional)


Supported account types for BMC management.
0 = SNMP

--account_type_status <account type status> (Optional)

Supermicro Update Manager User’s Guide 74


BMC Management
Commands Long Options
Manages account type status.
0 = Disable
1 = Enable

--ap <authentication protocol> (Optional)


The authentication protocol.
0 = MD5
1 = SHA

--pp <private protocol> (Optional)


The authentication protocol.
0 = DES
1 = AES

--ak <authentication key> (Optional)


The authentication key.

--user_status (Optional)
Manages the BMC user status.
0 = Disable
1 = Enable

--pk <private key> (Optional)


The private key.

--manage_account_type <manage account type> (Optional)


Manages account type status.
The format is "SNMP:Enable,Redfish:Disable".
Supported account type:
1. Redfish
2. SNMP
BootStrappingAccount
--action <action>
Sets action to:
1 = CreateAccount
2 = DeleteAccount
3 = CheckAccount
--user_name <user name> (Optional)
Deletes bootstrapping account with user name.
RmcpManage
--action <action>
Sets RMCP status with:
Supermicro Update Manager User’s Guide 75
BMC Management
Commands Long Options
1 = GetInfo
2 = Enable
3 = Disable
--port <port> (Optional)
Command optional port(s).
The format of <port> is “RMCP:623” or “623”.
List of optional port(s) for the command :
1. RMCP (for RMCP service port)

System Event Log


Commands Long Options
GetEventLog
--file <file name> (Optional)
Saves the event log to a file.
Prints the event log on screen if the file-saving function is not available.

--overwrite (Optional)
Overwrites the output file.

--raw_data (Optional)
Prints the raw data of each event log.
ClearEventLog
--current_password <current password> (Optional)
Checks the current BIOS Administrator password.

--cur_pw_file <Current Password File> (Optional)


The specified file path to read the current password.
--reboot (Optional)
Forces the managed system to reboot or power up after operation.
--post_complete (Optional)
Waits for the managed system's POST to complete after reboot.
--clear_bmc_eventlog (Optional)
Only clears the BMC event log.
--clear_bios_eventlog (Optional)
Only clears the BIOS event log.
GetMaintenEventLog
--st <start time> (Optional)
Enters the start time YYYYMMDD.
--et <end time> (Optional)
Enters the end time YYYYMMDD.
--file <file name>(Optional)
Saves the maintenance event log to a file.
Prints the maintenance event log on screen if the file-saving function is
not available.

Supermicro Update Manager User’s Guide 76


System Event Log
Commands Long Options

--count <maintenance log count >(Optional)


Enters the log count.
If the count is equal to zero, the entire maintenance event log will
display.
--overwrite (Optional)
Overwrites the output file.
ClearMaintenEventLog None

GetHostDump
--action <action>
Sets action to:
1 = CreateDump
2 = DeleteDump
3 = DirectDump
--file <file name> (Optional)
Saves the crash dump data to a file.
--overwrite (Optional)
Overwrites the output file.

CMM Management (OOB Only)


Commands Long Options
UpdateCmm
--file <file name>
Updates the CMM with the given image file.
--individually (Optional)
Updates each CMM with its corresponding image file individually.
--overwrite_cfg (Optional)
Overwrites the current CMM configurations, including network settings
using the factory default values in the given CMM image file. This might
cause the IPMI connection to be lost.
--overwrite_sdr (Optional)
Overwrites the current CMM SDR data. (Only supported by the “CSE-
947HE2C-R2K05JBOD” system.)
--overwrite_ssl (Optional)
Overwrites the current CMM SSL configuration. (Only supported by the
“CSE-947HE2C-R2K05JBOD” system.)
--backup (Optional)
Backs up the current CMM image. (Only supported by the RoT systems.)
GetCmmInfo
--file <file name> (Optional)
Reads the CMM information from an input CMM image file.
--individually (Optional)
Supermicro Update Manager User’s Guide 77
CMM Management (OOB Only)
Commands Long Options
Gets each CMM with its corresponding image file individually.
--showall (Optional)
Prints BIOS, BMC, and ARM SUM information of the managed Blade
system.
--file_only (Optional)
Works with option --file, and only reads CMM information from the
input image file.
GetCmmCfg
--file <file name> (Optional)
Saves the configuration to a file.
Prints the CMM configuration on screen if the file-saving function is not
available.
--download (Optional)
Downloads the current CMM configuration file that supports profile
update from CMM.
--profile_repo (Optional)
Downloads existing CMM profile from CMM.
--overwrite (Optional)
Overwrites the output file.
--action <action> (Optional)
Sets the action for each XML table. Acceptable options: None or Change.
ChangeCmmCfg
--file <file name>
Updates the CMM with the given configuration file.
--upload (Optional)
Uploads the CMM configuration file to CMM for updating profiles.
--update <update rule> (Optional)
Updates the CMM configurations with the existing profile on CMM.
Supported update rule: [Apply]

--individually (Optional)
Updates each CMM with the corresponding configuration file
individually.
--precheck (Optional)
Checks the configuration before update.

--skip_unknown (Optional)
Skips the unknown tables or settings in the CMM configuration file.
--skip_precheck (Optional)
Uploads and overwrites the existing CMM profile.
SetCmmPassword
--user_id < user ID>
Enters the CMM user ID.

Supermicro Update Manager User’s Guide 78


CMM Management (OOB Only)
Commands Long Options

--new_password <new password>


Sets the new CMM user password.
--confirm_password <confirms password>
Confirms the new CMM user password.
--pw_file <password file>
The specified file path to read the new CMM user password.
LoadDefaultCmmCfg
--clear_user_cfg
Clears user configuration.

--preserve_user_cfg
Preserves user configuration.

--load_unique_password
Loads CMM unique password.

--load_default_password
Loads CMM default password.
ProfileManage
--action <action>
Supported actions: Get, Edit, and Delete.

--file <file name> (Optional)


Saves the profile list to a file.
Prints the profile list on the screen if the file-saving function is not
available.

--file_id <file ID> (Optional)


Gets and edits profile information or deletes the profile on CMM with
the specific file ID.

--profile_name <profile name> (Optional)


Edits the profile name of the specified profile on CMM with the specific
file ID.

--profile_description <profile description> (Optional)


Edits the profile description of the specified profile on CMM with the
specific file ID.

--schedule_update_time <schedule update time> (Optional)


Edits the scheduled update time of the specified profile on CMM with
the specific file ID
Format: [YYYY-MM-DD_HH:MM]

--overwrite
Overwrites the output file.
Supermicro Update Manager User’s Guide 79
CMM Management (OOB Only)
Commands Long Options

--showall
Gets the profile association information between the specified profile
and selected Blade systems with a specific profile ID.
GetBbpInfo
--file <file name> (Optional)
Reads the BBP information from an input BBP image file.
--file_only (Optional)
Works with the option--file, and only reads BBP information from the
input image file.
UpdateBbp
--file <file name>
Updates the BBP with the given image file.
--skip_check (Optional)
Skips the Blade power status check to force update BBP.
GetBladePowerStatus None

SetBladePowerAction
--action <action>
Sets power action with:
0 = down
1 = up
2 = cycle
3 = reset
5 = softshutdown
24 = accycle
--blade <Blade Index>
Assigns the blade index.
[A1-A14], [B1-B14] or “ALL”.
--node <Node Index> (Optional)
Assigns node index.
[1-4]

Applications
Commands Long Options
RawCommand --raw <raw command>
Input hex-value commands
GetUsbAccessMode (Inband None
Only)

Supermicro Update Manager User’s Guide 80


Applications
Commands Long Options
SetUsbAccessMode (Inband
Only) --panel <front/rear>
The panel to be set.
--enable
Dynamically enables the USB ports in the assigned panel.
--disable
Dynamically disables the USB ports in the assigned panel.
LocateServerUid
--action <action>
Sets action to:
1 = GetStatus
2 = On
3 = Off
SetHttpBoot
--current_password <current password> (Optional)
Checks the current BIOS Administrator password.

--cur_pw_file <Current Password File> (Optional)


The specified file path to read current password.
--file <file name>
Uploads the TLS certificate in the formats of .cer, .der, .crt, or .pem.
--boot_name <boot description>
Description for HTTP boot.
--boot_lan <boot lan port>
Enter the LAN port for HTTP boot.
--reboot
Forces the managed system to reboot or power up after operation.
--boot_clean
Cleans all HTTP boot options.
--disable_hostname_check
Disable checking whether the host name of the TLS certificate matches
the host name provided by the remote server for HTTPS boot.
--image_url <URL>
The URL to access the shared image file. URL format: 'http://<IPv4 or
IPv6>/<shared point>/<file path>' or 'https://<IPv4 or IPv6>/<shared
point>/<file path>'
--post_complete (Optional)
Waits for the managed system's POST to complete after reboot.
KmsManage
--current_password <current password> (Optional)
Checks the current BIOS Administrator password.

--cur_pw_file <Current Password File> (Optional)

Supermicro Update Manager User’s Guide 81


Applications
Commands Long Options
The specified file path to read the current password.
--server_ip <server IP address> (Optional)
Enters KMS server IP address.
--second_server_ip <second server IP address> (Optional)
Enters second KMS server IP address.
--port <port> (Optional)
Command optional port(s).
The format of <port> is “TCP:5696” or “5696”.
TCP is served as a the KMS server port.
--time_out <time out> (Optional)
Enters KMS server connecting time-out.
--time_zone <time zone> (Optional)
Enters correct time zone GMT+.
--client_username <client username> (Optional)
Enters client identity: UserName.
--client_password <client password> (Optional)
Enters client identity: Password.
--ca_cert <CA certificate file name> (Optional)
Uploads a CA certificate from the file.
--client_cert <client certificate file name> (Optional)
Uploads client certificate from the file.
--pvt_key <private key file name> (Optional)
Uploads client private key from the file.
--pvt_key_pw <private key password> (Optional)
Enters client private key password.
--file <file name> (Optional)
When the --action GetInfo option is specified, saves the OEM
configuration to a file. Otherwise, updates the OEM settings with the
given configuration file.
--overwrite (Optional)
Overwrites the output file.
--individually (Optional)
Updates the OEM settings of each BIOS with its corresponding
configuration file individually.

--action <action> (Optional)


Sets a KMS manage action to:
1 = GetInfo
2 = Probe

Supermicro Update Manager User’s Guide 82


Applications
Commands Long Options
3 = DeleteCA
4 = DeleteCert
5 = DeletePvtKey
6 = DeleteAll
--reboot (Optional)
Forces the managed system to reboot or power up after operation.

--post_complete (Optional)
Waits for the managed system's POST to complete after reboot.
GetSystemCfg
--file <file name>
Saves the configuration to a file.

--current_password <current password>


Checks the current BIOS Administrator password.

--download
Downloads the current Blade system configuration file accessible for
profile update from the CMM.

--file_id <file ID>


Downloads existing Blade system profile from CMM with specific file ID.

--overwrite
Overwrites the output file.

--dev_id <Device ID>


Selects blade index and node ID.
Blade index: [A1-A14] or [B1-B14]
Node ID: [1-4]
Format: [A1_1]
--cur_pw_file <Current password file>
The specified file path to read the BIOS Administrator password.

--action
Sets the action for each XML table. Acceptable options: None or Change.
ChangeSystemCfg
--file <file name>
Updates the managed system with the given configuration file.

--current_password <current password>


Checks the current BIOS Administrator password.

--upload
Uploads the Blade system configuration file to the CMM for updating
profiles.

Supermicro Update Manager User’s Guide 83


Applications
Commands Long Options

--file_id <file ID>


Assigns the profile ID using the ProfileManage command.

--update <update rule>


Updates the Blade system configurations with the existing system profile
on the CMM.
Supported update rules: [Apply] or [Deploy]

--skip_precheck (Optional)
Uploads and overwrites the existing CMM profile.

--reboot
Forces the managed system to reboot or power up after operation.

--dev_id <Device ID>


Assigns a blade index and a node ID.
Blade index: [A1-A14] or [B1-B14]
Node ID: [1-4]
Format: [A1], [A1_1] or [ALL] for all blade nodes

--skip_unknown
Skips the unknown settings or menus in the system configuration file.

--skip_bbs
Skips the BBS-related menus in the BIOS configuration file.

--precheck
Checks the configuration before the update.

--post_complete
Waits for the managed system’s to POST complete after rebooting.

--cur_pw_file <Current password file>


The specified file path to read BIOS Administrator password.

--skip_invalid
Skips the invalid settings or menus in the BIOS configuration file.
RedfishApi
-v
Verbose output: prints the response header.

--file <file name>


Outputs the result to a file.

--overwrite
Overwrites the output file.

--individually
Supermicro Update Manager User’s Guide 84
Applications
Commands Long Options

Reads the request body from the file individually. (Only support for
Multiple systems OOB usage) --request <HTTP method>
HTTP method (GET, POST, or PATCH)

--data <Request body>


Request body.

--retry <Number>
Number of retry times. The default value is 3.
RemoteExec
-I Remote_INB
Manages the remote Linux systems and executes commands with in-
band usage.
--remote_cmd <Remote command>
Enters the commands to be executed on a remote system.

--file <file name>


Transfers the file(s) to a remote system.
ManageRHI
--action <action>
Sets action to:
1 = GetConnection
2 = SetConnection

--type <type> (Optional)


Set USB connection
Supported connection type string:
0 = RNDIS
1 = CDC_ECM

(Input type string will be converted to above type number)

Storage Management
Commands Long Options
GetRaidControllerInfo
--file <file name> (Optional)
Reads the RAID controller firmware information from an input RAID
image file.
--controller <Controller> (Optional)
<Broadcom/Marvell> Vendor of RAID controller.
--dev_id <Device ID> (Optional)
RAID controller device ID.
--file_only (Optional)
Works with --file, and only reads RAID controller information from the

Supermicro Update Manager User’s Guide 85


Storage Management
Commands Long Options
input image file.
UpdateRaidController
--file <file name>
Updates the RAID controller with the given RAID image file.
--controller <Controller>
<Broadcom/Marvell> Vendor of RAID controller.
--dev_id <Device ID>
Device ID of RAID controller.
--reboot (Optional)
Forces the managed system to reboot or power up after operation.
--post_complete (Optional)
Waits for the managed system's POST to complete after reboot.
GetRaidCfg
--file <file name> (Optional)
Saves the configuration to a file.
Prints the RAID configuration on screen if the file-saving function is not
available.
--overwrite (Optional)
Overwrites the output file.
--controller <Controller> (Optional)
<Broadcom/Marvell> Vendor of RAID controller.
ChangeRaidCfg
--file <file name>
Updates the RAID with the given configuration file.

--individually (Optional)
Updates each RAID with the corresponding configuration file
individually.--controller <Controller> (Optional)
<Broadcom/Marvell> Vendor of RAID controller.
GetSataInfo (OOB only) None

GetNvmeInfo (OOB only)


--dev_id <Device ID> (Optional)
NVMe device controller ID.
Prints all NVMe information on the screen if the file-saving function is
not available.
SecureEraseDisk
--current_password <current password> (Optional)
Checks the current BIOS Administrator password.

--cur_pw_file <Current Password File> (Optional)


The specified file path to read current password.
--file <file name>
HDD serial number mapping file.
--reboot (Optional)

Supermicro Update Manager User’s Guide 86


Storage Management
Commands Long Options
Forces the managed system to reboot or power up after operation.
--precheck (Optional)
Only displays HDD status.
--action <action> (Optional)
Sets secure erase action to:
1 = SetPassword
2 = SecurityErase
3 = SecurityErasePWD
4 = SecurityErasePSID
5 = ChangePassword
6 = ClearPassword
--post_complete (Optional)
Waits for the managed system's POST to complete after reboot.
SecureEraseRaidHdd
--dev_id <Device ID>
A RAID controller ID for secure erase.
--enc_id <Enclosure ID>
Enclosure ID list or “ALL” in the RAID controller for secure erase.
--dsk_id <Disk ID>
Disk ID list or “ALL” in the RAID controller for secure erase.

--tsk_id <Task ID> (Optional)


Accesses the progress of secure erase.

--precheck (Optional)
Shows the details of all disk ID list in the RAID controller.

--abort (Optional)
Aborts the secure-erase operation.

--sync (Optional)
Shows the current progress of the secure-erase operation inRAID
controller.
--type <Type> (Optional)
Vendor/Mode of RAID controller to do secure erase action:
Broadcom IR mode = BRCM_IR
Broadcom IT mode = BRCM_IT
UpdatePMem
--file <file name> (Optional)
Updates PMem with the given PMem firmware file.

--reboot (Optional)
Forces the managed system to reboot or power up after operation.

--restore_default_fw (Optional)
Updates the PMem with BIOS built-in PMem firmware.
Supermicro Update Manager User’s Guide 87
Storage Management
Commands Long Options

--current_password <current password> (Optional)


Checks the current BIOS Administrator password.

--cur_pw_file <Current Password File> (Optional)


The specified file path to read the current password.
--post_complete (Optional)
Waits for the managed system's POST to complete after reboot.
GetPMemInfo
--file <file name> (Optional)
Reads the PMem information from an input PMem image file.

--file_only (Optional)
Works with --file, and only reads PMem information from the input
image file.
GetVROCCfg
--file <file name> (Optional)
Saves the configuration to a file.
Prints the VROC configuration on screen if the file-saving function is not
available.
--overwrite (Optional)
Overwrites the output file.
ChangeVROCCfg
--file <file name>
Updates the VROC with the given configuration file.

--individually (Optional)
Updates each VROC key with the corresponding configuration file
individually.
ControlNVMe
--action <action>
Sets action to:
1 = Locate
2 = StopLocate
3 = Insert
4 = Remove
--dev_id
The NVMe controller ID can be found using the GetNvmeInfo command.
--group_id
The NVMe device group ID can be found using the GetNvmeInfo
command.
--slot
The NVMe slot number can be found using the GetNvmeInfo command.

NIC Management

Supermicro Update Manager User’s Guide 88


Commands Long Options
GetAocNICInfo
--file <file name> (Optional)
Reads the AOC NIC firmware information from an input AOC_NIC image
file.
--dev_id <DEVICE_ID> (Optional)
AOC NIC device ID list.
--file_only (Optional)
Works with the --file option, and only reads AOC-NIC information from
the input image file.
UpdateAocNIC
--file <file name>
Updates AOC NIC with the given add-on NIC file.
--reboot
Forces the managed system to reboot or power up after operation.
--dev_id <Device ID>
Devce ID of AOC NIC.
--post_complete (Optional)
Waits for the managed system's POST to complete after reboot.

PSU Management
Commands Long Options
GetPsuInfo None

UpdatePsu
--file <file name>
PSU firmware file
--address
PSU module address in HEX format (Gets PSU module slave address from
the GetPSUInfo command. )
GetPowerStatus None

SetPowerAction
--action <action>
Sets power action with:
0 = up
1 = down
2 = cycle
3 = reset
4 = softshutdown
5 = reboot
6 = accycle

--interval <time interval> (Optional)


Sets the power cycle interval in seconds.
Supermicro Update Manager User’s Guide 89
PSU Management
Commands Long Options
--post_complete (Optional)
Waits for the managed system's POST to complete after reboot.

TPM Management
Commands Long Options
TpmProvision (OOB only) --reboot
Forces the managed system to reboot or power up after operation.
--image_url <URL>
The URLs to access the shared image file.
SAMBA URL: 'smb://<host name or ip>/<shared point>/<file path>'
SAMBA UNC: '\\<host name or ip>\<shared point>\<file path>'
HTTP URL: 'http://<host name or ip>/<shared point>/<file path>'
--lock <yes>
Locks the TPM module.
--id <ID> (Optional)
The specified ID to access the shared file.
--pw <Password> (Optional)
The specified password to access the shared file.
--pw_file <Password File> (Optional)
The specified file path to read password.
--cleartpm (Optional)
Clears the ownership of the TPM module and restores the relevant TPM
BIOS settings.
GetTpmInfo --current_password <current password> (Optional)
Checks the current BIOS Administrator password.
--showall (Optional)
Prints the NV data and the capability flags (if applicable) of the trusted
platform module. (Only supported for Intel platforms)
--cur_pw_file <Current password file> (Optional)
The specified file path to read the current password.
TpmManage --reboot (Optional)
Forces the managed system to reboot or power up after operation.
--clear_and_enable_dtpm_txt (Optional)
Clears dTPM ownership and activates dTPM/TXT.
--clear_dtpm (Optional)
Clears dTPM ownership and disables dTPM for TPM 1.2.
Clears dTPM ownership for TPM 2.0.
--enable_txt_and_dtpm (Optional)
Enables TXT and dTPM.
--clear_and_enable_dtpm (Optional)
Clears dTPM ownership, disables dTPM (for TPM 1.2 only) and activates
dTPM.
--disable_dtpm (Optional)
Disables dTPM.
--disable_txt (Optional)
Disables TXT.
--provision (Optional)
Launches the trusted platform module provision procedure.

Supermicro Update Manager User’s Guide 90


TPM Management
Commands Long Options
--table_default (Optional)
Uses the default TPM provision table.
--table <table name> (Optional)
Uses the given customized TPM provision table file.
--post_complete (Optional)
Waits for the managed system’s POST to complete after rebooting.

GPU Management
Commands Long Options
GetGpuInfo
--showall
Prints the FRU information on the GPU baseboard of the managed
system.
--showoam (Optional)
Prints the FRU information on GPU baseboard of the managed system.
(Only supports on X11/H11 with HGX2 system and Intel Gaudi 2 system.)
--file <file name> (Optional)
Reads the GPU information from an input GPU image file.

--file_only (Optional)
Works with the --file option and only reads the GPU information from
the input image file.
UpdateGPU --file <file name>
Updates the GPU firmware file that matches the FW item types.
--item <item name>
FW item types of GPU firmware:
0 = CEC
1 = FPGA
2 = HGX_H100
3 = PVC_IFWI
4 = PVC_PSCBIN
5 = PVC_UBB_CPLD
6 = PVC_RETIMER
7 = PVC_AMC
8 = GAUDI_SPI
9 = GAUDI_OAM_CPLD
10 = GAUDI_RETIMER
11 = GAUDI_UBB_CPLD
12 = H100_FPGA
13 = MGX_GPU
14 = MI300X
--dev_id <Device ID> (Optional)
Retrieved Device ID with the GetGPUInfo command.
Supermicro Update Manager User’s Guide 91
GPU Management
Commands Long Options
For SPI-FW, use the device address.
--reboot (Optional)
Forces the managed system to reboot or power up after operation.
--post_complete (Optional)
Waits for the managed system's POST to complete after reboot.
DiagGpuStatus
--dev_id <Device ID List> (Optional)
The device ID list of GPU on the managed system..
GetGpuLog --file <file name>
Saves the GPU log to a file.
--item <item name>
Item type of GPU:
1 = HGX_H100
--overwrite
Overwrites the output file.

CPLD Management
Commands Long Options
GetCpldInfo --individually (Optional)
Gets each CPLD with its corresponding image file individually.
--file <file name> (Optional)
Reads the CPLD information from an input CPLD image file.
--file_only (Optional)
Works with the –file option , and only reads CPLD information from the
input image file.
--extract_measurement (Optional)
Works with the --file option, and extract CPLD image file measurements.
UpdateCpld --file <file name>
Updates the CPLD with the given CPLD image file.
--reboot
Forces the managed system to reboot or power up after operation.
--individually (Optional)
Updates each CPLD with its corresponding image file individually.
--post_complete (Optional)
Waits for the managed system’s POST to complete after rebooting.
--index <number> (Optional)
Updates the CPLD with the given index. The default value is empty, and
the first CPLD will be updated.
CpldRotManage --action <action>
Sets action to:
1 = GetInfo
2 = UpdateGolden

Supermicro Update Manager User’s Guide 92


--remote_sum <Remote SUM path> (Optional)
Specifies the remote SUM path for Remote In-Band mode usage.
GetSwitchboardCpldInfo --remote_sum <Remote SUM path> (Optional)
Specifies the remote SUM path for Remote In-Band mode usage.
UpdateSwitchboardCpld --file <file name>
Updates the Main or Side Switchboard CPLD with the given image file.
--reboot
Forces the managed system to reboot or power up after operation.
--type
Sets action to:
1 = Main
2 = Left
3 = Right
--individually (Optional)
Updates each CPLD Switch Board with its corresponding image file
individually.
--index (Optional)
Sets the CPLD index. The default value is 1, and the index count starts
from 1.
--remote_sum <Remote SUM path> (Optional)
Specifies the remote SUM path for Remote In-Band mode usage.
--post_complete (Optional)
Waits for the managed system’s POST to complete after rebooting.
GetFanBoardCpldInfo None

UpdateFanboardCpld --file <file name>


Updates the Fanboard CPLD with the given Fanboard CPLD image file.
--type
Sets action to:
1 = Front
2 = Rear
or the corresponding Fanboard ID number.
--individually (Optional)
Updates each Fanboard CPLD with its corresponding image file
individually.
--index (Optional)
Set the CPLD index. The default value is 1, and the index count starts
from 1.
GetAomboardCpldInfo None

UpdateAomboardCpld --file <file name>


Updates the AOM board with the given FW image file.
--individually (Optional)
Updates each AOM board CPLD with its corresponding image file
individually.
--dev_id <Device ID> (Optional)
Supermicro Update Manager User’s Guide 93
Updates the AOM board CPLD with the given AOM device ID. The default
value is empty, and the CPLD for the first AOM board will be updated.
GetMiscCpldInfo None

UpdateMiscCpld --file <file name>


Updates the motherboard miscellaneous CPLD with the given FW image
file.
--reboot
Forces the managed system to reboot or power up after operation.
--individually
Updates each motherboard miscellaneous CPLD with its corresponding
image file individually.

AIP Management
Commands Long Options
GetAipCpldInfo (OOB only) None

UpdateAipCpld (OOB only) --file <file name>


Updates the CPLD of AIP with the given FW image file.
--individually (Optional)
Updates each AIP CPLD with its corresponding image file individually.

TwinPro Management
Commands Long Options
GetTpCfg
--file <file name> (Optional)
Saves the configuration to a file.
Prints the TwinPro configuration on the screen if the file-saving function
is not available.
--overwrite (Optional)
Overwrites the output file.
ChangeTpCfg
--file <file name>
Updates the TwinPro configuration with the given configuration file.

--individually (Optional)
Updates each TwinPro configuration with its corresponding
configuration file individually.

Supermicro Update Manager User’s Guide 94


CDU Management
Commands Long Options
MonitorCDUStatus
--file <file name> (Optional)
For action 1 = GetStatus
Prints the status on screen if the file-saving function is not available.
For action 2 = SetCfg
Sets the CDU Alert option.
Monitors the host with the given JSON file listing device and sensor data
records to be monitored. –action
Sets CDU action with:
1 = GetStatus
2 = SetCfg
--overwrite (Optional)
Overwrites the output file.

Backplane Management
Commands Long Options
GetMultinodeEcInfo
--file <file name> (Optional)
Reads the multi-node EC information from an input multi-node EC image
file.
--file_only (Optional)
Works with the –file option, and only reads multi-node EC information
from the input image file.
UpdateMultinodeEc
--file <file name>
Updates the multi-node EC with the given multi-node EC image file.
GetBackplaneCpldInfo None

UpdateBackplaneCpld --manual_ejected
Confirmed that all drives on backplane have been ejected manually.
--file <file name> (Optional)
Updates the Backplane CPLD with the given FW image file.

--index <number> (Optional)


Updates the specific Backplane CPLD with the given index.

--update_list <item list> (Optional)


Updates multiple backplane CPLDs with one command, using a comma
(“,”) to distinguish between items.
Item list example: 1:CPLD.jed,2:CPLD.jed…
--individually (Optional)
Updates each backplane CPLD with its corresponding image file
individually.
--dev_id <Device ID> (Optional)
Sets the CPLD index. The default value is 1.

Supermicro Update Manager User’s Guide 95


VM Management
Commands Long Options
MountIsoImage
--image_url <URL>
The URLs to access the shared image file.
SAMBA URL: 'smb://<host name or ip>/<shared point>/<file path>'
SAMBA UNC: '\\<host name or ip>\<shared point>\<file path>'
HTTP URL: 'http://<host name or ip>/<shared point>/<file path>'
--id <ID> (Optional)
The specified ID to access the shared file.
--pw <Password> (Optional)
The specified password to access the shared file.
--pw_file <Password File> (Optional)
The specified file path to read the password.
--redfish (Optional)
Enables support for pure Redfish.
UnmountIsoImage
--redfish (Optional)
Enables support for pure Redfish.
MountFloppyImage --file <file name>
Mounts the specified binary floppy file to the managed system.
UnmountFloppyImage None

GetVmInfo
--dev_id <Device ID> (Optional)
Uses the specified device ID to get virtual media information.
The supported device ID: [1-3]
VmManage
--action <action>
Sets action to:
1 = Enable
2 = Disable
3 = Mount
4 = Unmount
--port <port> (Optional)
Command optional port(s)
The format is "VM:623" or "623."
Command optional port(s) list:
1. VM (for virtual media port)
--image_url <URL> (Optional)
The URLs to access the shared image file.
SAMBA URL: 'smb://<host name or ip>/<shared point>/<file path>'
SAMBA UNC: '\\<host name or ip>\<shared point>\<file path>'
HTTP URL: 'http://<host name or ip>/<shared point>/<file path>'
--id <ID> (Optional)

Supermicro Update Manager User’s Guide 96


VM Management
Commands Long Options
The specified ID to access the shared file.
--pw <Password> (Optional)
The specified password to access the shared file.
--pw_file <Password File> (Optional)
The specified file path to read the password.
--dev_id <Device ID> (Optional)
The specified device ID to manage virtual media device.
The supported device ID: [1-3]
--verify_cert (Optional)
Verifies the SSL certificate. (Only supported for HTTPS protocol.)
--accept_self_signed (Optional)
Accepts the self-signed certificate. (Only supported for HTTPS protocol.)

Security Management
Commands Long Options
GetGPUERoTInfo None

GetCPUERoTInfo None

UpdateCPUERoT --file <file name>


Updates the CPU ERoT with the given FW image file.
--individually (Optional)
Updates each CPU ERoT with corresponding image file individually.
CpuERotManage
--action <action>
Sets action to:
1 = GetInfo
2 = UpdateGolden
3 = Recover
FpgaRotManage
--action <action>
Sets action to:
1 = GetInfo
2 = UpdateGolden

FPGA Management
Commands Long Options
GetMotherboardFpgaInfo None
UpdateMotherboardFpga
--file <file name>
Updates the motherboard FPGA with the given FPGA image file.
--reboot
Forces the managed system to reboot or power up after operation.

Supermicro Update Manager User’s Guide 97


FPGA Management
Commands Long Options

--individually (Optional)
Updates each motherboard FPGA with corresponding image file
individually.

MCU Management
Commands Long Options
GetMotherboardMcuInfo None
UpdateMotherboardMcu
--file <file name>
Updates the motherboard MCU with the given image file.
--reboot
Forces the managed system to reboot or power up after operation.

--post_complete (Optional)
Waits for the managed system’s POST to complete after reboot.

Notes:

• During execution, DO NOT remove the AC power on the managed system.


• DO NOT flash BMC and BIOS firmware images at the same time.
• To execute SUM, use either the relative path method, e.g., ./sum or absolute path
method, e.g., /opt/sum_x.x.x_Linux_x64/sum in script file or shell command line.
• In Windows, use “double quotes” to enclose a parameter when needed.
• DO NOT update firmware image and configuration at the same managed system
concurrently by in-band and OOB method.
• Before running the OOB UpdateBios command, it is recommended that the managed
system is shut down first.
• By default, the command options are case insensitive. For in-band usage, simply ignore
the -l, -i, -u, -p and -f options.
• Use the -p option or -f option to assign a password. These two options cannot be used
together.
• For concurrent execution of OOB commands for managing multiple systems, use the -l
option. For details on how to manage multiple systems, refer to 6 Managing Multiple
Systems (OOB Only).
• When a command is executed, it will be recorded in sum.log. In addition, when rare
exceptions occur in BMC/CMM/RAID configurations get/set commands, timestamp logs
will be created. If the “/var/log/supermicro/SUM” folder exists, the logs will be stored
there. Otherwise, they are stored in the same folder as $PWD in Unix-like OS or %cd% in
Windows.
• For the --reboot option in OOB usage, if target OS does support software shutdown and

Supermicro Update Manager User’s Guide 98


install X-window on RedHat OS, system will be forced to be powered off and then
powered up. Please make sure that data is saved before the sum command is run. The
Red Hat version decides if the software shutdown support can be enabled in console
prompt.
If the system is configured to hibernate or sleep, the system may hang up when a server
is rebooted. To avoid such a situation, run the following command in the target
OS/system before you start to update BIOS:
gsettings set org.gnome.settings-daemon.plugins.power power-
button-action nothing
• With the --post_complete option, the system will wait until the managed system POST is
complete so that the managed system will be ready for the next OOB action.If you see
"Warning: The managed system xxx.xxx.xxx.xxx POST complete check is timeout after
xxx seconds", please manually check if POST completes already. If the system POST
actually completes already, please consult Supermirco to support. If the system POST
does not complete, it may just need more time. Please extend the post_timeout
configuration in .sumrc.

Supermicro Update Manager User’s Guide 99


4.1 Customizing SUM Configurations
Starting from SUM 2.1.0, two methods allow you to customize execution configurations, command options
and .sumrc file. A command option is prior to a .sumrc file. In other words, a parameter in .sumrc file will
be overwritten by a parameter in a command option. The default configuration will be applied only when
nothing is assigned or valid in command option and .sumrc. The following table summarizes the
configurable parameters:
Setting Name Setting Value Sample Description Customized
Methods
[1]
journal_level 0: silent, Sets the journal Both command
1: fatal, level. options
2: error, and .sumrc file
3: warning,
4: information,
5: debug, 6: verbose
[1]
journal_path Linux: Sets the journal Both command
~/journal/supermicro/sum/ output path. option
When the journal and .sumrc file
[1]
Windows: level is set to 0
%HomePath%\journal\supermicro\sum\ (silent), this
parameter will be
invalid.
[1] [2]
confirm_timeout 300 Sets the .sumrc file only
confirm flag
polling timeout.
The unit is
second.
[1]
udp_timeout 240 Sets the checking .sumrc file only
timeout for udp
connection in
seconds. The
value should be
between 1 and
240, inclusive.
[1] [3]
thread_count 50 Set the thread .sumrc file only
count
[1]
multi_retry_count 2 Set retry count .sumrc file only
for using multiple
systems
execution.
[1]
ipv6_file_name_switch 0: disable, Replace ':' with '-' .sumrc file only
1: enable when the file
name contains an
Supermicro Update Manager User’s Guide 100
Setting Name Setting Value Sample Description Customized
Methods
IPv6 address.
[1] [4]
cache_path %WorkingDirectory% Sets the cache .sumrc file only
file path of
ServiceCalls.
[1] [5]
https_port 443 Sets managed .sumrc file only
system https
port.
[6]
certificate None Sets certificate .sumrc file only
files to verify the
customized and
signed RoT
firmware images.
[1]
rmcp_port 623 Set managed Both command
system RMCP option
port for and .sumrc file
CMM/BMC
connection.
[1]
post_timeout 1200 Set post .sumrc file only
complete polling
timeout.
[1]
config_default_action none Set the default Both command
action of XML options
config file that and .sumrc file
GetBmcCfg and
GetCmmCfg
generated.
Acceptable value
(case insensitive):
none, change.
[1]
hostinterface_enable on Set the host .sumrc file only
interface enable
by SUM.
[1]
Network_controller RNDIS Set Redfish Host .sumrc file only
Interface USB
connection to
CDC_ECM or
RNDIS.
[1] [7]
max_upload_speed 1000 Set the .sumrc file only
maximum upload
speed for
uploading
firmware file in
multiple node
mode. Speed is
measured in
Supermicro Update Manager User’s Guide 101
Setting Name Setting Value Sample Description Customized
Methods
Mbit/s. Default
value is 1000
Mbps.
[1]
Default configuration value

[2]
When a file is uploaded to BIOS relayed by BMC, after reboot SUM will keep polling if the file is updated to BIOS
successfully. If SUM can’t receive “success” within the confirmed_timeout seconds, SUM will stop polling and show a
message indicating that the file is “being updated”. In this case, it denotes that the system requires more time to boot
up. The confirm_timeout can be increased to make sure SUM receives a “success” message before timeout.

[3]
SUM can limit its maximum concurrent executing count to avoid system overloading. The thread_count in
the .sumrc file can be adjusted to protect the system from overloading when SUM multiple node mode is executed.
For example, if the thread count is set to 50, SUM will execute 50 working threads simultaneously.

[4]
You cannot access any cache files on mounted file systems with the command ServiceCalls. Please make sure the

target path is not in a mounted directory.

[5]
The https port setting will be applied to OOB Redfish and Redfish Host Interface usage.

[6]
The certificate file only supports X.509 in PEM and DER formats.

[7]
When the setting value is 0, the upload speed is not limited.

There are three ways to specify the .sumrc file: command option --rc_path (highest priority), .sumrc file in
the current directory (intermediate priority) and .sumrc in the user home directory (lowest priority). A user
can rename sumrc.sample file to “.sumrc” in the current directory or move the file to the user home
directory and rename to .sumrc based on user’s requirements. Note that a .sumrc sample configuration file
is bundled with SUM release package. An example is provided below.

# Please copy this file to SUM execution directory or user home directory and rename to .sumrc
# The SUM execution directory will be read first and the user home directory will be the second priority
# Please remove "#" to activate a customized configuration

# set SUM journal level


# 0: silent, 1: fatal, 2: error, 3: warning, 4: information, 5: debug, 6: verbose
Supermicro Update Manager User’s Guide 102
#journal_level = 0

# set SUM journal path


# the following is an example path
#journal_path = /home/administrator/journal/supermicro/test

# set cache file path for ServiceCalls


#cache_path = /home/administrator/cache/supermicro/test

# set confirm flag polling timeout


# the unit is second
#confirm_timeout = 300

# sets the checking timeout for udp connection in seconds.


# the value should be between 1 and 240, inclusive.
#udp_timeout = 240

# set thread count for multiple systems usage


#thread_count = 50

# set retry count for multiple systems usage


#multi_retry_count = 2

# replace ':' with '-' when file name contains IPv6 address.
#ipv6_file_name_switch = 0

# set managed system https port


#https_port = 443

# set managed system RMCP port for CMM/BMC connection


#rmcp_port = 623

# set post complete polling timeout


#post_timeout = 1200

# set certificate file for verifying customized signed firmware images


#certificate = /home/administrator/cert/public.cert

# set the default action of XML config file that GetBmcCfg and GetCmmCfg generated
# Acceptable value (case insensitive): none, change
#config_default_action = none

# set the host interface enable by SUM


#hostinterface_enable = on

# set Redfish Host Interface USB connection to CDC_ECM or RNDIS


#Network_controller = RNDIS

Supermicro Update Manager User’s Guide 103


# set the maximum upload speed for uploading firmware file in multiple node mode. Speed is measured
in Mbit/s. Default value is 1000 Mbps
#max_upload_speed = 1000
The syntax “name=value” is the parameter name defined by SUM and value is the parameter value that can
be configured. If a parameter value is illegal, SUM will ignore it. By default, all the parameters in .sumrc are
inactivated and “#” in front of the line may be removed to activate a parameter configuration.

Note: In Windows, please copy the SUM configuration file and rename it to .sumrc by
Command Prompt.

Supermicro Update Manager User’s Guide 104


4.2 SUM Log Design
While SUM commands are executed, log messages can be recorded for issue tracking and replication.
Types of logs are detailed in this section.

 Command usage history


When executing a SUM command, the executed command with options from console will be logged
to a sum.log file automatically. The root cause of an issue may result from the previously executed
command(s). History of command usages correlates combinations of executed commands, which also
makes issue investigation easier.
 Critical error log
When SUM encounters a critical error, the critical error message will be logged automatically. Just like
system error logs, the critical error messages are always notable and require further actions.
 Multiple-system log
When executing SUM command with multiple system modes (with the --l option), a multiple system
log will be generated automatically. The log summarizes all the running results for multiple systems.
Running status (FAILED or SUCCESS), executing time and exit codes can be reviewed in this log.
 Command execution journal
The journal is to record the footprint messages during the process of command execution. The
severity levels rank from zero to six. The lowest level 0 (silent) generates no messages while the
highest level 6 (verbose) generates the most messages. In addition to severity level, this journal is
tagged with functional categories, for example, GENERIC, CURL and so on. Category GENERIC means
messages do not fit to any particular category while category CURL includes message related curl
library. With a functional category tag, journal can be filtered quickly, and issue can be identified
efficiently.
By default, this journal is disabled (severity level 0) and it can be enabled by --journal_level option
(higher priority) or .sumrc configuration (lower priority). Similarly, this journal will be created at the
user home directory by default. Besides, if the output path is assigned in --journal_path option (higher
priority) or .sumrc configuration (lower priority), the output path will be replaced.

Supermicro Update Manager User’s Guide 105


The following table summarizes the properties of four sorts of logs.

Types of logs/ properties Activation Output path priorities


1. Defined by the option --journal_path. The log exists
inside the subfolder named as “History” in the
folder path defined by the option.
Command usage history Always activated
--journal_path.
2. “/var/log/supermicro/SUM”.
3. $PWD in Linux or %cd% in Windows.
1. Defined by the option --journal_path. The log exists
inside the subfolder named as “Critical” in the
folder path defined by the option.
Critical error log Always activated
--journal_path.
2. /var/log/supermicro/SUM.
3. $PWD in Linux or %cd% in Windows.
1. Defined by the option --journal_path. The log exists
inside the subfolder named as “Multiple” in the
folder path defined by the option.
Multiple system log Always activated
--journal_path.
2. /var/log/supermicro/SUM.
3. The same directory as multiple list file.
1. Defined by the option --journal_path. The log exists
in the folder path defined by the option.
Command execution Activated by --journal_path.
journal configuration 2. Defined by .sumrc in the home directory.
3. ~/journal/supermicro/sum/ in Linux or
%HomePath%\journal\supermicro\sum\ in Windows.

Supermicro Update Manager User’s Guide 106


4.3 Format of BIOS Settings Text File
This file format is only supported on platforms before X11 Intel® Xeon® Scalable Processors with Intel®
C620 Series Chipsets.

It is designed to display the BIOS setup menu in text format for easier configurations.

Each setup item consists of a variable, a value, options and dependency (if available). The example below
shows how BIOS settings are displayed.

[Advanced|CPU Configuration|CPU Power Management Configuration]

Power Technology=01 // 00 (Disabled), *01 (Energy Efficient), 02 (Custom)

EIST=01 // 00 (Disabled), *01 (Enabled) Power Technology =

"Custom"

Turbo Mode=01 // 00 (Disabled), *01 (Enabled) Power Technology =

"Custom" and EIST = "Enabled"

C1E Support=01 // 00 (Disabled), *01 (Enabled) Power Technology =

"Custom"

⚫ A setup submenu is quoted by brackets. Setup items are next to the setup submenu.
⚫ A variable (of one setup item) always stays on the left side of the "=" character.
⚫ A value (of one variable) always stays on the right side of the "=" character.
⚫ Annotated options (of one variable) are shown after "//" and "*" indicates the default option.
⚫ A dependency (if available) will be separated from an option command by eight spaces. It indicates
that the variable is visible and configurable when other variable(s) are set to a designated value.

In this example, the “Power Technology” item in the “CPU Power Management configuration” submenu is
currently set to 01 for Energy Efficient (the default setting) and can be set to 00 for Disabled or 02 for
Customer. The “EIST” variable is equal to 01 for Enabled (the default setting) and can be set to 00 when the
“Power Technology” variable is set to 02 for Custom.

If the desired changes are limited to the “Power Technology” configuration, delete all except the two lines:

[Advanced|CPU Configuration|CPU Power Management Configuration]

Supermicro Update Manager User’s Guide 107


Power Technology=01

// 00 (Disable), *01 (Energy Efficient), 02 (Custom)

Notes:

• You can remove unnecessary menu items (or variables) and their values still remain the
same after an update.
• If all menu items are removed (or the file becomes empty), no configurations are
changed.
• The Setup submenu is required for setting up the items.

4.3.1 An Example of BBS Boot Priority

On platforms before X11 Intel® Xeon® Scalable Processors with Intel® C620 Series Chipsets, the
“SetBiosAction” command is required to execute with the --BBS option set to yes, to activate the BIOS
settings related to BBS Boot Priority.

This is an example of the boot order:

[Boot|Hard Disk Drive BBS Priorities]

HDD Boot Order #1=0000 // *0000 (INTEL SSDSC2BB120G6), 0001

(SEAGATE ST3500418AS), 0002 (Disabled)

HDD Boot Order #2=0001 // 0000 (INTEL SSDSC2BB120G6), *0001

(SEAGATE ST3500418AS), 0002 (Disabled)

In this example, “HDD Boot Order #1” is currently set to 0000 for INTEL SSDSC2BB120G6 and “HDD Boot
Order #2” is set to 0001 for SEAGATE ST3500418AS. Boot orders could be swapped after changing BIOS
configuration with the setting modified as below.

[Boot|Hard Disk Drive BBS Priorities]

HDD Boot Order #1=0001 // *0000 (INTEL SSDSC2BB120G6), 0001

(SEAGATE ST3500418AS), 0002 (Disabled)

Supermicro Update Manager User’s Guide 108


HDD Boot Order #2=0000 // 0000 (INTEL SSDSC2BB120G6), *0001

(SEAGATE ST3500418AS), 0002 (Disabled)

The device is mapped with the boot order. Please note that after BIOS configurations are changed, the
boot order indices (0000 and 0001 are boot order indices in the example above) and the mapped devices
may be different. In this example, after ChangeBiosCfg took effect, GetCurrentBiosCfg will have the
configuration as below:

[Boot|Hard Disk Drive BBS Priorities]

HDD Boot Order #1=0000 // *0000 (SEAGATE ST3500418AS), 0001

(INTEL SSDSC2BB120G6), 0002 (Disabled)

HDD Boot Order #2=0001 // 0000 (SEAGATE ST3500418AS), *0001

(INTEL SSDSC2BB120G6), 0002 (Disabled)

Notes:

• The settings of boot orders should not be the same except Disabled.
• GetDefaultBiosCfg command does not support these BBS settings for platforms before
X11 Intel® Xeon® Scalable Processors with Intel® C620 Series Chipsets.

Supermicro Update Manager User’s Guide 109


4.4 BIOS Settings XML File Format
This file format is supported on platforms X11 Intel® Xeon® Scalable Processors with Intel® C620 Series
Chipsets and later platforms.

For easier configurations, the BiosCfg.xml file is designed to display the BIOS setup menu in XML format. An
example below shows how this file demonstrates BIOS setup settings. Each setting consists of a default
value and a current value.

<BiosCfg>
<Menu name="IPMI">
<Menu name="System Event Log">
<Information>
<Help><![CDATA[Press <Enter> to change the SEL event log
configuration.]]></Help>
</Information>
<Subtitle>Enabling/Disabling Options</Subtitle>
<Setting name="SEL Components" selectedOption="Enabled" type="Option">
<Information>
<AvailableOptions>
<Option value="0">Disabled</Option>
<Option value="1">Enabled</Option>
</AvailableOptions>
<DefaultOption>Enabled</DefaultOption>
<Help><![CDATA[Change this to enable or disable all features of System
Event Logging during boot.]]></Help>
</Information>
</Setting>
<Subtitle></Subtitle>
<Subtitle>Erasing Settings</Subtitle>
<Setting name="Erase SEL" selectedOption="No" type="Option">
<Information>
<AvailableOptions>
<Option value="0">No</Option>
<Option value="1">Yes, On next reset</Option>
<Option value="2">Yes, On every reset</Option>

Supermicro Update Manager User’s Guide 110


</AvailableOptions>
<DefaultOption>No</DefaultOption>
<Help><![CDATA[Choose options for erasing SEL.]]></Help>
<WorkIf><![CDATA[ 0 != SEL Components ]]></WorkIf>
</Information>
</Setting>
</Menu>
</Menu>
</BiosCfg>

⚫ The XML version is shown in the first line.


⚫ The root table name is “BiosCfg”. Its name tag pairs are <BiosCfg> and </BiosCfg>. All configurations
of the root table are enclosed in between this name tag pair.
⚫ The name tag pair <BiosCfg> is the root of all configurations and <Menu> is the only type of name tag
pairs extending from <BiosCfg>.
⚫ Each name tag pair <Menu> encloses name tag pairs <Menu>, <Information>, <Setting>, <Subtitle>
and <Text>.
⚫ <Information> is designed to display the name tag pairs <Help> and <WorkIf>. In addition, the setting-
specific information is listed. For example, <Setting> with the attribute “name” as “Option” has
<AvailableOptions> and <DefaultOption> to indicate the selectable and default options, respectively.
Any modification in the <Information> enclosure is unnecessary and NEVER takes effect.
⚫ <Setting> is the only configurable part in the XML configuration. There are five supported setting
types: “Option,” “CheckBox,” “Numeric,” “String” and “Password.” There are various <Setting>
enclosures depending on the setting type. For instance, the accepted values for the setting ‘Option’ in
<SelectedOption> enclosure are listed in <AvailableOptions> enclosure and any other setting values
will cause exception thrown.
⚫ <Subtitle> and <Text> are designed to indicate what is coming up next in the configuration.
⚫ <Help> is designed to provide more explanations for menus and settings.
⚫ <WorkIf> is designed to determine if the setting modification will take effect or not. If <WorkIf>
enclosure is not shown, it implies the modified setting value will always take effect.

In this example XML file, the setting “SEL Components” is enclosed in menu “System Event Log.” The
setting configuration will take effect only when <WorkIf> enclosure is evaluated as true (in this case, the
Supermicro Update Manager User’s Guide 111
setting “BMC Support” is not equal to 0). If the setting value is modified in XML file and <WorkIf> enclosure
is evaluated as false, the warning messages will indicate that the changes will not take effect. Besides, if the
setting value in <SelectedOption> enclosure is neither “Enabled” nor “Disabled,” an exception will be
thrown.

Moreover, two or more settings in the XML file might refer to the same variable in the BIN file. In this
scenario, those setting values are expected to be consistent. For example, the setting “Quiet Boot” in the
menu “Setup” -> “Advanced” -> “Boot Feature” and the setting “Quiet Boot” in the menu “Setup” -> “Boot”
are actually two different settings (different settings can have the same name). They even refer to the
same variable in the BIN file. If the setting values in these two questions are conflicted in the XML file, SUM
will then throw an exception. For more details on usages, see Appendix E. How to Change BIOS
Configurations in XML Files.

Notes:

• Unchanged settings can be deleted to skip the update.


• The XML version line and the root <BiosCfg> should not be deleted.
• The XML configuration contains extended ASCII characters, i.e., © , ® and µ . It is
REQUIRED to use a text editor that supports extended ASCII characters (ISO-8859-1
encoding). Otherwise, the extended ASCII characters might be lost after they are
saved. It is suggested that Notepad++ in Windows and Vim in Linux could be used to
view and edit the XML configuration.
• If garbled characters appear when viewing and editing the XML configurations with
vim, it is likely that vim is incorrectly detecting the file's encoding. It is suggested that
the setting into ~/.vimrc: set fileencodings=latin1,ucs-bom,utf-8,gb18030 should be
added.
• For using tools to edit XML files, please refer to Appendix F. Using the Command Line
Tool (XMLStarlet) to Edit XML Files.

Supermicro Update Manager User’s Guide 112


4.5 DMI Information XML File Format
DMI.txt is designed to display the supported editable DMI items in text format for easier update. An
example below shows how this file demonstrates the DMI information items. Each item consists of an item
name, a short name, a value, and comments.

[System]

Version {SYVS} = "A Version" // string value

Serial Number {SYSN} = $DEFAULT$ // string value

UUID {SYUU} = 00112233-4455-6677-8899-AABBCCDDEEFF // 4-2-

2-2-6 formatted 16-byte hex values

// Bytes[ 0-3 ]: The low field of the timestamp

// Bytes[ 4-5 ]: The middle field of the timestamp

// Bytes[ 6-7 ]: The high field of the timestamp (multiplexed with

// the version number)

// Bytes[ 8-9 ]: The clock sequence (multiplexed with the variant)

// Bytes[10-15]: The spatially unique node identifier

// Byte Order :

// UUID {00112233-4455-6677-8899-AABBCCDDEEFF} is stored as

// 33 22 11 00 55 44 77 66 88 99 AA BB CC DD EE FF

⚫ A DMI type is quoted by brackets. DMI information items are next to the DMI type.
⚫ The name of a DMI information item is always followed by its short name.
⚫ The item name and its short name stays at the left side of the “=” character.
⚫ A short name is always enclosed by brackets.
⚫ A value (of one information item) always stays at the right side of the “=” character.
⚫ String values are enclosed by double quotation marks.
⚫ $DEFAULT$ signature without double quotation marks is used to load default value for a string-valued
item.
⚫ There is no default value for non-string-value items.
⚫ Do not use quotation marks for non-string-value items.

Supermicro Update Manager User’s Guide 113


⚫ The value type is always shown after a value and begins with "//" (two slashes).
⚫ The value meanings for a non-string-value item are listed next to the item.

In this example, the “Version” DMI item belongs to the “System” DMI type with short name SYVS. It is
string-value by “A Version” and can be changed to any other string value. For the “Serial Number” item, its
value is set as $DEFAULT$. After updating the DMI information, the item value of the “Serial Number” will
be reset to factory default. The UUID item is a specially formatted hex-value item. Its value meanings are
explained next to it.

Notes:

• You can remove unnecessary DMI items so that its value will not be changed after an
update.
• The DMI type is required for DMI items.
• Each item can be identified either by its short name or by the combination of its item
type and item name.
• Any line begins with “//” will be ignored.
• A version number is included at the beginning of every DMI.txt file. This version
number should not be modified because it is generated by SUM according to the BIOS
of the managed system for DMI version control.

Supermicro Update Manager User’s Guide 114


4.6 BMC Configuration XML File Format
The BMC configuration file is designed to display the supported and editable BMC configuration elements
in XML format for an easier update process. An example below shows how this file demonstrates the BMC
configurable elements.

<?xml version="1.0"?>
<BmcCfg>
<!--You can remove unnecessary elements so that-->
<!--their values will not be changed after update-->
<StdCfg Action="None">
<!--Supported Action:None/Change-->
<!--Standard BMC configuration tables-->
<FRU Action="Change">
<!--Supported Action:None/Change-->
<Configuration>
<!--Configuration for FRU data-->
<BoardMfgName>Supermicro</BoardMfgName>
<!--string value, 0~16 characters-->
</Configuration>
</FRU>
</StdCfg>
<OemCfg Action="Change">
<!--Supported Action:None/Change-->
<!--OEM BMC configuration tables-->
<ServiceEnabling Action="Change">
<!--Supported Action:None/Change-->
<Configuration>
<!--Configuration for ServiceEnabling-->
<HTTP>Enable</HTTP>
<!--Enable/Disable-->
</Configuration>
</ServiceEnabling>
</OemCfg>
</BmcCfg>

Supermicro Update Manager User’s Guide 115


⚫ The XML version is shown in the first line.
⚫ The root table name is “BmcCfg.” Its name tag pair is <BmcCfg> and </BmcCfg>. All information
belonging to the root table is enclosed between this name tag pair.
⚫ There could be two direct children for the root table: “StdCfg” and “OemCfg.”
⚫ “StdCfg” and “OemCfg” could have child tables.
⚫ Configurable elements are listed in the “Configuration” field of each child table.
⚫ Each configurable element has a name tag pair. The element value is enclosed by its name tag pair.
⚫ Comments could be given following any element or table name tag. Each comment is enclosed by “<!-
-“ and “-->” tags. The supported usage of each element and table are shown in its following
comments.
⚫ Configuration tables could have an “Action” attribute. Supported actions are shown in the comments.
If the action is “None,” all the configurations and children of this table will be skipped.
⚫ Configuration tables could contain more table specific attributes in case needed.

In this example, the Action is None for the StdCfg table. As such, SUM will skip updating the element
BoardMfgName of the table FRU. On the other hand, SUM will try to update the value as Enable for the
HTTP element of the ServiceEnabling table in the OemCfg table.

4.6.1 Pure Redfish LAN Table in BMC Configuration

Since SUM 2.12.0, the “GetBmcCfg” and “ChangeBmcCfg” commands with OOB and Redfish Host Interface
usages support pure Redfish LAN table in BMC configuration on X12 and later platforms. If the LAN version
of Redfish API is greater than or equal to 1.6.3, SUM will support pure Redfish LAN table in BMC
configuration. To check LAN version of Redfish API, please use Redfish API
(/redfish/v1/Managers/1/EthernetInterfaces/1) with HTTP method “GET” and find the “@odata.type” field
in the response data. The LAN version of Redfish API is 1.6.3 as the following example.

Supermicro Update Manager User’s Guide 116


Here are the XPath differences between IPMI LAN table and pure Redfish LAN table in BMC configuration.
• General Setting
IPMI LAN Table Pure Redfish LAN Table

/BmcCfg/OemCfg/LAN/Configuration/LanMode
/BmcCfg/OemCfg/LAN/Configuration/LanInterface
/BmcCfg/OemCfg/LAN/Configuration/ShareLan

/BmcCfg/OemCfg/LAN/Configuration/MacAddr /BmcCfg/OemCfg/LAN/Information/MacAddress

/BmcCfg/OemCfg/LAN/Configuration/VLAN_Enable /BmcCfg/OemCfg/LAN/Configuration/VLANEnable

/BmcCfg/OemCfg/LAN/Configuration/VLAN_ID /BmcCfg/OemCfg/LAN/Configuration/VLANId

• IPv4 Setting
IPMI LAN Table Pure Redfish LAN Table

/BmcCfg/OemCfg/LAN/Configuration/IPv4/Configur /BmcCfg/OemCfg/LAN/Configuration/IPv4/Configura
ation/IPSrc tion/DHCPEnabled

/BmcCfg/OemCfg/LAN/Configuration/IPv4/Configur /BmcCfg/OemCfg/LAN/Configuration/IPv4/Configura
ation/IPAddr tion/Address

/BmcCfg/OemCfg/LAN/Configuration/IPv4/Configur /BmcCfg/OemCfg/LAN/Configuration/IPv4/Configura
ation/DefaultGateWayAddr tion/Gateway

/BmcCfg/OemCfg/LAN/Configuration/IPv4/Configur /BmcCfg/OemCfg/LAN/Configuration/IPv4/Configura
ation/DNSAddr tion/IPv4StaticNameServer1

/BmcCfg/OemCfg/LAN/Configuration/IPv4/Configur /BmcCfg/OemCfg/LAN/Configuration/IPv4/Configura
ation/DNSAddr2 tion/IPv4StaticNameServer2

• IPv6 Setting
IPMI LAN Table Pure Redfish LAN Table

/BmcCfg/OemCfg/LAN/Configuration/Dynami /BmcCfg/OemCfg/LAN/Configuration/IPv6/Configuration/
cIPv6/Configuration/AutoConfiguration DynamicIPv6/Configuration/IPv6AutoConfigEnabled

/BmcCfg/OemCfg/LAN/Configuration/Dynami /BmcCfg/OemCfg/LAN/Configuration/IPv6/Configuration/
cIPv6/Configuration/DHCPv6Mode DynamicIPv6/Configuration/OperatingMode

/BmcCfg/OemCfg/LAN/Configuration/StaticIP /BmcCfg/OemCfg/LAN/Configuration/IPv6/Configuration/I
v6/Configuration/DNSv6Mode Pv6UseDNSServers

Supermicro Update Manager User’s Guide 117


IPMI LAN Table Pure Redfish LAN Table

/BmcCfg/OemCfg/LAN/Configuration/StaticIP /BmcCfg/OemCfg/LAN/Configuration/IPv6/Configuration/I
v6/Configuration/IPv6StaticNameServer Pv6StaticNameServer1

Notes:

• Child tables or configurable elements can be deleted to skip updates for these tables or
configuration elements.
• Child tables or configurable elements cannot be without parents.
• The XML version line and the root table should not be deleted.
• For using tools to edit XML files, please refer to Appendix F. Using the Command Line
Tool (XMLStarlet) to Edit XML Files.

Supermicro Update Manager User’s Guide 118


4.7 RAID Configuration XML File Format
The RAID configuration file displays editable RAID configuration elements in XML format for easier update.
The example below shows how the RAID configurable elements are presented in this file.

⚫ The XML version is shown in the first line.


⚫ The root table name is “RAIDCfg.” <RAIDCfg> and </RAIDCfg> are its tag pair. All information in the
root table is enclosed between this tag pair.
⚫ There could be three child tags for the root table: “Information” and “BroadcomRAIDController” and
“MarvellRAIDController.”
⚫ “Information,” “BroadcomRAIDController” and “MarvellRAIDController” could have child tables.
⚫ Configurable elements are listed in the “Configuration” field of each child table.
⚫ Each configurable element has a tag pair. The element value is enclosed by its tag pair.
⚫ Comments may be given following any element or table tag. Each comment is enclosed by the
“<!-” and “-->” tags. The supported usage of each element and table are shown in the comments that
follow.
⚫ Configuration tables may have “Action” attributes. Supported actions are shown in the comments. If
the action is “None,” all configuration and child tables of this table will be skipped.
⚫ Configuration tables may contain more table specific attributes when needed.

For Broadcom controller uses “BroadcomRAIDController” table:

⚫ To create a logical volume, the RAIDInfo action should be “Change” and the RAID action should be
“Create.” The “PhysicalDriveList” field must contain all drive IDs for RAID creation and the “ArrayID”
field should be set to “-1.”
⚫ To delete a logical volume, the RAIDinfo action should be “Change,” the RAID action should be
“Delete” and assigned the corresponding logical drive ID or “ALL” to the “DeletingLogicalDriveList”
field.
⚫ To delete all arrays built in the RAID controller, the RAIDinfo action should be “ClearAll.”
⚫ To change RAID configuration, you must delete the original RAID and create a new RAID with the
“Level,” “Span” and “PhysicalDriveList” fields properly modified.

Supermicro Update Manager User’s Guide 119


⚫ To enable the HDD LED in a RAID controller, add the drive ID to the “LocatingPhysicalDriveIDList” field
and set the RAID action to “Locate.”
⚫ To disable the HDD LED in a RAID controller, add the drive ID to the “UnlocatePhysicalDriveIDList”
field and set the RAID action to “Unlocate.”

For Marvell controller uses “MarvellRAIDController” table:

⚫ To create a logical drive, the RAIDInfo action should be “Change” and the RAID action should be
“Create.” The “ArrayID” field should be set to “0.”
⚫ To delete a logical drive, the RAIDinfo action should be “Change”, the RAID action should be “Delete”
and assigned the corresponding “LogicalDrive DriveID” to “LogicalDriveDeleteID.”
⚫ To rebuild a logical drive, the RAIDinfo action should be “Change,” the RAID action should be “Rebuild”
and assigned the corresponding “LogicalDrive DriveID” to “LogicalDriveRebuildID.”
⚫ To import a logical drive, the RAIDinfo action should be “Change,” the RAID action should be “Import”
and assigned the corresponding “LogicalDrive DriveID” to “LogicalDriveImportID.”

Notes:

• Child tables or configurable elements can be deleted to skip updating.


• Child tables or configurable elements must stick to the parent tables.
• The XML version line and the root table should not be deleted.
• Supported RAID levels on the Broadcom controller: 0/1/5/6/10/50/60.
• Supported span values on the Broadcom controller:
RAID Level Span Value Minimum Number of Physical HDDs
0 1 1
1 1 2
5 1 3
6 1 3
10 2 or 4 4
50/60 3 or 4 6
• The number of physical hard drives must be a multiple of the "Span" value on the
Broadcom controller.
• Marvell controller only supports RAID level 1.
• Marvell controller on AOC-SLG2-2TM2 supports up to two drives.
• For using tools to edit XML files, please refer to Appendix F. Using the Command Line
Tool (XMLStarlet) to Edit XML Files.

Example:
Supermicro Update Manager User’s Guide 120
<?xml version="1.0"?>
<RAIDCfg>
<Information>
<TotalRaidController>2</TotalRaidController>
</Information>
<BroadcomRAIDController Action="Change" DeviceID="0" DeviceName="AVAGO
3108 MegaRAID">
<!--Supported Action:None/Change-->
<ControllerProperties Action="None">
<!--Supported Action:None/Change-->
<Configuration>
<BiosBootMode>Stop on Error</BiosBootMode>
<!--RAID controller BIOS boot mode, enumerated string value-->
<!--Supported values: Stop on Error/Pause on Error/Ignore
Errors/Safe Mode on Error-->
<JbodMode>Disable</JbodMode>
<!--RAID controller JBOD mode, enumerated string value-->
<!--Supported values: Enable/Disable-->
</Configuration>
</ControllerProperties>
<RAIDInfo Action="Change">
<!--Supported Action:None/Change/ClearAll-->
<RAID Action="None" ArrayID="-1">
<!--Supported Action:None/Add/Delete/Create/Locate/Unlocate-->
<Information>
<PhysicalDriveCount>0</PhysicalDriveCount>
<!--Total number of physical drives in this RAID-->
<LogicalDriveCount>0</LogicalDriveCount>
<!--Total number of logical drives in this RAID-->
<LocatedPhysicalDriveList></LocatedPhysicalDriveList>
<!--located physical drives-->
<FreeSize>0</FreeSize>
<!--Free size of RAID, unit: MB-->

Supermicro Update Manager User’s Guide 121


<LogicalDriveInfo></LogicalDriveInfo>
</Information>
<Configuration>
<!--For each field, default support Create/Add actions if not
specially commented-->
<Level>RAID0</Level>
<!--RAID level, enumerated string value-->
<!--Supported values:
RAID0/RAID1/RAID5/RAID6/RAID10/RAID50/RAID60-->
<!--Only used for "Create" action-->
<Span>1</Span>
<!--PD span value, integer value-->
<!--For RAID 0/1/5/6, valid value is 1-->
<!--For RAID 10, valid value is 2 or 4-->
<!--For RAID 50/60, valid value is 3 or 4-->
<!--Only used for "Create" action-->
<PhysicalDriveList></PhysicalDriveList>
<!--Number of physical hard drive must be multiple of "Span"
value-->
<!--Physical drive ID list of this RAID, integer values
separated by comma.-->
<!--Can not use physical hard drive which present in other
RAID.-->
<!--Can not use "Error" status physical HDD.-->
<!--Can not use repeated physical hard drive ID in same RAID.-
->
<!--Physical hard drive ID can not use negative number.-->
<!--Physical hard drive count can't be more than 32.-->
<!--For RAID0, minimum number of physical HDD is 1.-->
<!--For RAID1, minimum number of physical HDD is 2.-->
<!--For RAID5, minimum number of physical HDD is 3.-->
<!--For RAID6, minimum number of physical HDD is 3.-->
<!--For RAID10, minimum number of physical HDD is 4.-->
<!--For RAID50, minimum number of physical HDD is 6.-->
<!--For RAID60, minimum number of physical HDD is 6.-->

Supermicro Update Manager User’s Guide 122


<!--Only used for "Create" action.-->
<NewLogicalCount>1</NewLogicalCount>
<!--Number of new Logical drive to be created/added-->
<!--Integer value, valid value from 1 to 16-->
<!--Can not run "Add" action when RAID has no any physical
hard drive.-->
<!--Only used for "Create" and "Add" action-->
<PercentageToUsed>100</PercentageToUsed>
<!--Percentage to use, integer value between 1 and 100.-->
<!--Only used for "Create" and "Add" action-->
<StripSize>256KB</StripSize>
<!--Strip size of each logical drive-->
<!--Enumerated integer value, unit is Byte-->
<!--Valid value: 64KB/128KB/256KB/512KB/1MB-->
<!--Default value: 256KB-->
<!--Only used for "Create" and "Add" action-->
<LogicalDriveName></LogicalDriveName>
<!--Name of logical drive, string value-->
<!--Maximum length: 15, empty string is accepted-->
<!--Only used for "Create" and "Add" action-->
<LogicalDriveReadPolicy>No Read Ahead</LogicalDriveReadPolicy>
<!--Read policy of logical drive, enumerated string value-->
<!--Possible values: No Read Ahead/Always Read Ahead-->
<!--Default value: No Read Ahead-->
<!--The value in this field does not indicate current setting,
it is the reference value for configuring purpose only-->
<!--Only used for "Create" and "Add" action-->
<LogicalDriveWritePolicy>Write Back</LogicalDriveWritePolicy>
<!--Write policy of logical drive, enumerated string value-->
<!--Possible values: Write Through/Write Back/Write Back With
BBU-->
<!--Default value: Write Back-->
<!--The value in this field does not indicate current setting,
it is the reference value for configuring purpose only-->

Supermicro Update Manager User’s Guide 123


<!--Only used for "Create" and "Add" action-->
<LogicalDriveIoPolicy>Direct IO</LogicalDriveIoPolicy>
<!--IO policy of logical drive, enumerated string value-->
<!--Possible values: Direct IO/Cached IO-->
<!--Default value: Direct IO-->
<!--The value in this field does not indicate current setting,
it is the reference value for configuring purpose only-->
<!--Only used for "Create" and "Add" action-->
<AccessPolicy>Read Write</AccessPolicy>
<!--Access policy of logical drive, enumerated string value-->
<!--Possible values: Read Write/Read Only/Blocked-->
<!--Default value: Read Write-->
<!--The value in this field does not indicate current setting,
it is the reference value for configuring purpose only-->
<!--Only used for "Create" and "Add" action-->
<DiskCachePolicy>UnChanged</DiskCachePolicy>
<!--Cache policy of logical drive, enumerated string value-->
<!--Possible values: UnChanged/Enable/Disable-->
<!--Default value: UnChanged-->
<!--The value in this field does not indicate current setting,
it is the reference value for configuring purpose only-->
<!--Only used for "Create" and "Add" action-->
<InitState>No Init</InitState>
<!--Initial state of logical drive, enumerated string value-->
<!--Possible values: No Init/Quick Init/Full Init-->
<!--Default value: No Init-->
<!--The value in this field does not indicate current setting,
it is the reference value for configuring purpose only-->
<!--Only used for "Create" and "Add" action-->
<DeletingLogicalDriveList></DeletingLogicalDriveList>
<!--Logical drive ID list for deleting, integer values
separated by comma-->
<!--Logical drive for deleting can not use negative number-->
<!--Logical drive for deleting should be physical hard drive
of this RAID-->

Supermicro Update Manager User’s Guide 124


<!--Can not use repeated physical hard drive ID in same RAID.-
->
<!--All logical physical hard drives of RAID will be deleted
when fill "ALL"-->
<!--Can not run "Delete" action when RAID has no any physical
hard drive.-->
<!--Only used for "Delete" action.-->
<LocatingPhysicalDriveIDList></LocatingPhysicalDriveIDList>
<!--Physical drive ID list for locating: integer values
separated by comma-->
<!--Physical drive for locating can not use negative number-->
<!--Physical drive for locating should be physical hard drive
of this RAID-->
<!--All physical hard drives of RAID will be located when fill
"ALL"-->
<!--Can not use repeated physical hard drive ID in same RAID.-
->
<!--Can not run "Locate" action when RAID has no any physical
hard drive.-->
<!--Only used for "Locate" action-->
<UnlocatePhysicalDriveIDList></UnlocatePhysicalDriveIDList>
<!--Physical drive ID list for unlocating: integer values
separated by comma-->
<!--Physical drive for unlocating can not use negative number-
->
<!--Physical drive for unlocating should be physical hard
drive of this RAID-->
<!--All physical hard drives of RAID will be unlocated when
fill "ALL"-->
<!--Can not use repeated physical hard drive ID in same RAID.-
->
<!--Can not run "Unlocate" action when RAID has no any
physical hard drive.-->
<!--Only used for "Unlocate" action-->
</Configuration>
</RAID>
</RAIDInfo>
</RAIDController>
<MarvellRAIDController Action="Change" DeviceID="0">

Supermicro Update Manager User’s Guide 125


<!--Supported Action:None/Change-->
<ControllerProperties>
<Information>
<Controller>Marvell</Controller>
<!--RAID controller-->
<ControllerName>MRVL Storage System</ControllerName>
<!--RAID controller name-->
<ControllerSpeed>5.0 GT/s</ControllerSpeed>
<!--RAID controller speed-->
<ControllerStatus>OK</ControllerStatus>
<!--RAID controller status-->
<ChipRevision>a1</ChipRevision>
<!--RAID controller chip revision-->
<ControllerPCIeLinkWidth>2x Width</ControllerPCIeLinkWidth>
<!--RAID controller PCIe link width-->
<RomVersion>0.0.21.1005</RomVersion>
<!--RAID controller rom version-->
<LoaderVersion>2.1.0.1009</LoaderVersion>
<!--RAID controller loader version-->
<LegacyBIOSVersion>1.0.0.1031</LegacyBIOSVersion>
<!--RAID controller legacy BIOS version-->
<UEFIAHCIDriverVersion>1.1.21.1002</UEFIAHCIDriverVersion>
<!--RAID controller UEFI AHCI driver version-->
<I2CProtocolVersion>0.0.0.20</I2CProtocolVersion>
<!--RAID controller I2C protocol version-->
<PN></PN>
<!--RAID controller PN-->
<AOCVersion></AOCVersion>
<!--RAID controller AOC version-->
<SerialNumber></SerialNumber>
<!--RAID controller serial number-->
<FirmwareVersion></FirmwareVersion>

Supermicro Update Manager User’s Guide 126


<!--RAID controller firmware version-->
<Batch></Batch>
<!--RAID controller batch-->
</Information>
</ControllerProperties>
<PhysicalDriveInfo>
<Information>
<!--Physical hard drive information, this region is read only.--
>
<DriveCount>2</DriveCount>
<PhysicalDrive DriveID="0">
<EnclosureID>0</EnclosureID>
<!--Enclosure ID, string value-->
<DriveStatus>OK</DriveStatus>
<!--Physical drive alive status, enumerated string value-->
<!--Possible values: OK/Warning-->
<Temperature>46</Temperature>
<!--Physical drive temperature in degree C, integer value-->
<Capacity>480</Capacity>
<!--Physical drive capacity in Gigabyte, integer value-->
<ModelName>Micron_5300_MTFDDAV480TDS</ModelName>
<!--Physical drive model name, string value-->
<Revision> D3MU001</Revision>
<!--Physical drive firmware revision, string value-->
<SerialNumber>ABCDE</SerialNumber>
<!--Physical drive serial number, string value-->
<LinkSpeed>6</LinkSpeed>
<!--Physical drive link speed value, string values-->
<!--Unit is Gb/s-->
<FirmwareConfiguredState>OK</FirmwareConfiguredState>
<!--Firmware status of physical drive.-->
<PredictedFail>false</PredictedFail>

Supermicro Update Manager User’s Guide 127


<!--Physical drive predicted fail-->
<!--Possible values: true/false-->
</PhysicalDrive>
<PhysicalDrive DriveID="1">
<EnclosureID>1</EnclosureID>
<!--Enclosure ID, string value-->
<DriveStatus>OK</DriveStatus>
<!--Physical drive alive status, enumerated string value-->
<!--Possible values: OK/Warning-->
<Temperature>47</Temperature>
<!--Physical drive temperature in degree C, integer value-->
<Capacity>480</Capacity>
<!--Physical drive capacity in Gigabyte, integer value-->
<ModelName>Micron_5300_MTFDDAV480TDS</ModelName>
<!--Physical drive model name, string value-->
<Revision> D3MU001</Revision>
<!--Physical drive firmware revision, string value-->
<SerialNumber>ABCDE</SerialNumber>
<!--Physical drive serial number, string value-->
<LinkSpeed>6</LinkSpeed>
<!--Physical drive link speed value, string values-->
<!--Unit is Gb/s-->
<FirmwareConfiguredState>OK</FirmwareConfiguredState>
<!--Firmware status of physical drive.-->
<PredictedFail>false</PredictedFail>
<!--Physical drive predicted fail-->
<!--Possible values: true/false-->
</PhysicalDrive>
</Information>
</PhysicalDriveInfo>
<RAIDInfo Action="Change">
<!--Supported Action:None/Change-->

Supermicro Update Manager User’s Guide 128


<RAID Action="None" ArrayID="0">
<!--Supported Action:None/Delete/Create/Rebuild/Import-->
<Information>
<PhysicalDriveCount>2</PhysicalDriveCount>
<!--Total number of physical drives in this RAID-->
<LogicalDriveCount>1</LogicalDriveCount>
<!--Total number of logical drives in this RAID-->
<LogicalDrive DriveID="0">
<DriveStatus>OK</DriveStatus>
<!--Logical drive alive status-->
<!--Possible values: OK/Warning-->
<Capacity>447</Capacity>
<!--Logical drive capacity, integer value-->
<!--Unit is GB-->
<RaidLevelQualifier>RAID1</RaidLevelQualifier>
<!--RAID level qualifier of logical drive, enumerated value-
->
<!--Possible values: RAID1-->
<LDStripSize>64K</LDStripSize>
<!--Strip size of logical drive, enumerated value-->
<!--Unit is Byte-->
<!--Possible values: 32K/64K-->
<PD0Registered>Yes</PD0Registered>
<!--Physical drive #0 registered-->
<!--Possible values: Yes/No-->
<PD1Registered>Yes</PD1Registered>
<!--Physical drive #1 registered-->
<!--Possible values: Yes/No-->
<FirmwareState>Optimal</FirmwareState>
<!--Firmware state for this RAID, enumerated string value-->
<!--Possible values:
Offline/Foreign/Degraded/Rebuilding/Optimal-->
<Name>SuperFuck</Name>

Supermicro Update Manager User’s Guide 129


<!--Name of logical drive, string value-->
</LogicalDrive>
</Information>
<Configuration>
<!--For each field, default support Create actions if not
specially commented-->
<Level>RAID1</Level>
<!--RAID level, enumerated string value-->
<!--Only supported value: RAID1-->
<!--Only used for "Create" action-->
<StripSize>32K</StripSize>
<!--Strip size of each logical drive-->
<!--Enumerated integer value, unit is Byte-->
<!--Valid value: 32K/64K-->
<!--Default value: 64K-->
<!--Only used for "Create" action-->
<LogicalDriveName><![CDATA[]]></LogicalDriveName>
<!--Name of logical drive, string value-->
<!--Maximum length: 15-->
<!--Should not contains space and double quote-->
<!--Only used for "Create" action-->
<LogicalDriveDeleteID>0</LogicalDriveDeleteID>
<!--Delete virtual drive ID, integer value-->
<!--ID number should be LogicalDrive DriveID-->
<!--Should not set bigger than LogicalDrive DriveID-->
<!--Only used for "Delete" action-->
<LogicalDriveImportID>0</LogicalDriveImportID>
<!--Import virtual drive ID, integer value-->
<!--ID number should be LogicalDrive DriveID-->
<!--Should not set bigger than LogicalDrive DriveID-->
<!--Only used for "Import" action-->
<LogicalDriveRebuildID>0</LogicalDriveRebuildID>

Supermicro Update Manager User’s Guide 130


<!--Rebuild virtual drive ID, integer value-->
<!--ID number should be LogicalDrive DriveID-->
<!--Should not set bigger than LogicalDrive DriveID-->
<!--Only used for "Rebuild" action-->
</Configuration>
</RAID>
</RAIDInfo>
</Marvell9230RAIDController>
</RAIDCfg>

For Broadcom controller:

⚫ To create an array:
Create a RAID 10 array with Span 2 and 4 HDDs and “ArrayID” field can be set to “-1”:
For array ID, “-1” will be used when no array exists. This setting enables a dummy array table for you
to create the first array. Note that for the creation action, “ArrayID” is meaningless and array ID will
be generated after the array is created.
<RAIDInfo Action="Change">
<RAID Action="Create" ArrayID="-1">
<Level>RAID10</Level>
<Span>2</Span>
<PhysicalDriveList>0,1,2,3</PhysicalDriveList>To create
two or more arrays:
<RAIDInfo Action="Change">
Array 1
<RAID Action="Create" ArrayID="-1">
<Level>RAID10</Level>
<Span>2</Span>
<PhysicalDriveList>0,1,2,3</PhysicalDriveList>
Array 2
<RAID Action="Create" ArrayID="-1">
<Level>RAID10</Level>

Supermicro Update Manager User’s Guide 131


<Span>2</Span>
<PhysicalDriveList>4,5,6,7</PhysicalDriveList>
⚫ To delete logical drives:
Delete logical drive 0 and 1 from “Array0”.
<RAIDInfo Action="Change">
<RAID Action="Delete" ArrayID="0">
<DeletingLogicalDriveList>0,1</DeletingLogicalDriveList>
⚫ To delete an array:
Use “ALL” to delete every logical drive from “Array0.” After this, “Array0” will be:
<RAIDInfo Action="Change">
<RAID Action="Delete" ArrayID="0">
<DeletingLogicalDriveList>ALL</DeletingLogicalDriveList>
⚫ To delete all arrays:
Use “ClearAll” to delete every array. After this, every array will disappear.
<RAIDInfo Action="ClearAll">

⚫ Locate HDDs:
Locate HDD1/HDD2/HDD3 in “Array0”. LEDs of HDD1/HDD2/HDD3 will be lighted.
<RAIDInfo Action="Change">
<RAID Action="Locate" ArrayID="0">

<LocatingPhysicalDriveIDList>1,2,3</LocatingPhysicalDriveIDList>
⚫ Unlocate HDDs:
Unlocate HDD1/HDD4 in “Array0”. LEDe of HDD1/HDD4 will be dimmed.
<RAIDInfo Action="Change">
<RAID Action="Unlocate" ArrayID="0">

<UnlocatePhysicalDriveIDList>1,4</UnlocatePhysicalDriveIDList>

For Marvell controller:

⚫ To create a logical drive:


<RAIDInfo Action="Change">

Supermicro Update Manager User’s Guide 132


<RAID Action="Create" ArrayID="0">
<Configuration>
<Level>RAID1</Level>
<StripSize>32K</StripSize>

<LogicalDriveName><![CDATA[dummy]]></LogicalDriveName>
⚫ To delete a logical drive:
Delete logical drive 0.
<RAIDInfo Action="Change">
<RAID Action="Delete" ArrayID="0">
<Configuration>

<LogicalDriveDeleteID>0</LogicalDriveDeleteID>
⚫ To import a logical drive:
Import logical drive 0.
<RAIDInfo Action="Change">
<RAID Action="Import" ArrayID="0">
<Configuration>
<LogicalDriveImportID>0</LogicalDriveImportID>
⚫ To rebuild a logical drive:
Rebuild logical drive 0.
<RAIDInfo Action="Change">
<RAID Action="Rebuild" ArrayID="0">
<Configuration>
<LogicalDriveRebuildID>0</LogicalDriveRebuildID>

Note: A system needs to reboot after importing logical drives for the changes to take effect.

Supermicro Update Manager User’s Guide 133


4.8 CMM Configuration XML File Format
The CMM configuration file contains CMM configuration elements in XML format for an easier update
process. An example below shows how this file demonstrates the CMM configurable elements.

<?xml version="1.0"?>
<CmmCfg>
<!--You can remove unnecessary elements so that-->
<!--their values will not be changed after update-->
<StdCfg Action="None">
<!--Supported Action:None/Change-->
<!--Standard Cmm configuration tables-->
<SOL Action="Change">
<!--Supported Action:None/Change-->
<Configuration>
<!--Configuration for SOL properties-->
<Access>Enable</Access>
<!--Enable/Disable-->
</Configuration>
</SOL>
</StdCfg>
<OemCfg Action="Change">
<!--Supported Action:None/Change-->
<!--OEM Cmm configuration tables-->
<ServiceEnabling Action="Change">
<!--Supported Action:None/Change-->
<Configuration>
<!--Configuration for ServiceEnabling-->
<HTTP>Enable</HTTP>
<!--Enable/Disable-->
</Configuration>
</ServiceEnabling>
</OemCfg>
</CmmCfg>

Supermicro Update Manager User’s Guide 134


⚫ The version of the xml file is shown in the first line.
⚫ The root table name is “CmmCfg.” Its name tag pairs are <CmmCfg> and </CmmCfg>. All information
of the root table is enclosed in this name tag pair.
⚫ “StdCfg” and “OemCfg” could be two child tables for the root table.
⚫ “StdCfg” and “OemCfg” could have child tables.
⚫ Configurable elements are listed in the “Configuration” field in each child table.
⚫ Each configurable element has a name tag pair. The element value is enclosed in its name tag pair.
⚫ Comments could be given following any element or table name tag. Each comment is enclosed in the
tags “<!--” and “-->”. The use of each element and table is shown in its following comments.
⚫ Configuration tables could have “Action” attribute. Supported actions are shown in the comments. If
action is “None,” all the configurations and children of this table will be skipped.
⚫ Configuration tables could contain more specific table attributes in case they are needed.
In this example, the Action is None for the StdCfg table. As such, SUM will skip updating the element Access
of the table SOL. On the other hand, SUM will try to update the value as Enable for the HTTP element of
the ServiceEnabling table in the OemCfg table.

Notes:

• Child tables or configurable elements can be deleted to skip updates for these tables or
configuration elements.
• Child tables or configurable elements cannot be without parents.
• The XML version line and the root table should not be deleted.
• For using tools to edit XML files, please refer to Appendix F. Using the Command Line
Tool (XMLStarlet) to Edit XML Files.

Supermicro Update Manager User’s Guide 135


4.9 TwinPro Configuration XML File Format
The TwinPro configuration file is designed to display the supported and editable TwinPro configuration
elements in XML format for an easier update process. An example below shows how this file demonstrates
the TwinPro configurable elements.

<?xml version="1.0"?>
<TwinProCfg>
<TwinProInfo>
<!--Twin Pro information, this region is read only.-->
<Information>
<!--Twin Pro information, this region is read only.-->
<MicroCloudSystem>False</MicroCloudSystem>
<ConfigId>2</ConfigId>
<!--Config ID-->
<NodeA>
<Power>Active</Power>
<!--Node power, string value-->
<IP>172.31.54.15</IP>
<!--Node IP, string value-->
<IPv6></IPv6>
<!--Node IPv6, string value, only for Micro Cloud system-->
<Watts>262W</Watts>
<!--Node watts, string value-->
<Current>21.3A</Current>
<!--Node Current, string value-->
<CPU1Temp>33C</CPU1Temp>
<!--Node CPU1 Temperature, string value-->
<CPU2Temp>28C</CPU2Temp>
<!--Node CPU2 Temperature, string value-->
<SystemTemp>23C</SystemTemp>
<!--Node system Temperature, string value-->
<NodePN></NodePN>
<!--Node PN, string value-->
<NodeSN>HM227S012083</NodeSN>
<!--Node SN, string value-->

Supermicro Update Manager User’s Guide 136


</NodeA>
<NodeB>
<Power>Active</Power>
<!--Node power, string value-->
<IP>172.31.36.228</IP>
<!--Node IP, string value-->
<IPv6></IPv6>
<!--Node IPv6, string value, only for Micro Cloud system-->
<Watts>294W</Watts>
<!--Node watts, string value-->
<Current>24.1A</Current>
<!--Node Current, string value-->
<CPU1Temp>31C</CPU1Temp>
<!--Node CPU1 Temperature, string value-->
<CPU2Temp>29C</CPU2Temp>
<!--Node CPU2 Temperature, string value-->
<SystemTemp>20C</SystemTemp>
<!--Node system Temperature, string value-->
<NodePN></NodePN>
<!--Node PN, string value-->
<NodeSN>HM227S012108</NodeSN>
<!--Node SN, string value-->
</NodeB>
</Information>
</TwinProInfo>
<CurrentNodeInfo Action="Change" Node="A">
<!--Supported Action:None/Change-->
<!--NodeId is current node ID-->
<Information>
<BackPlaneRevision>1.00</BackPlaneRevision>
<!--BPN Revision-->
<MCUVersion>0.12</MCUVersion>
<!--MCU Version-->
</Information>
<Configuration>
<SystemName>SystemName</SystemName>
<!--System name, string value; length limit = 20 characters-->

Supermicro Update Manager User’s Guide 137


<SystemPN>SystemPN</SystemPN>
<!--System PN, string value; length limit = 24 characters-->
<SystemSN>SystemSN</SystemSN>
<!--System SN, string value; length limit = 24 characters-->
<ChassisPN>ChassisPN</ChassisPN>
<!--Chassis PN, string value; length limit = 24 characters-->
<ChassisSN>ChassisSN</ChassisSN>
<!--Chassis SN, string value; length limit = 24 characters-->
<BackPlanePN>BackPlanePN</BackPlanePN>
<!--BackPlane PN, string value; length limit = 24 characters-->
<BackPlaneSN>BackPlaneSN</BackPlaneSN>
<!--BackPlane SN, string value; length limit = 24 characters-->
<NodePN>NodePN</NodePN>
<!--Node PN, string value; length limit = 24 characters-->
<NodeSN>NodeSN</NodeSN>
<!--Node SN, string value; length limit = 24 characters-->
<ChassisLocation>00 00 00 00 00</ChassisLocation>
<!--Chassis Location, Hex value-->
<!--5 bytes, use spaces to separate-->
<BackPlaneLocation>N/A</BackPlaneLocation>
<!--FatTwin only, Valid value: Right/Left-->
<!--Locations other than Right/Left, please fill in Hex vale.-->
<!--Will be skipped if value is N/A-->
</Configuration>
</CurrentNodeInfo>
</TwinProCfg>

⚫ The XML version is shown in the first line.


⚫ The root table name is “TwinProCfg.” Its name tag pair is <TwinProCfg> and </TwinProCfg>. All
information belonging to the root table is enclosed between this name tag pair.
⚫ There could be two direct children for the root table: “TwinProInfo” and “CurrentNodeInfo.”
⚫ “TwinProInfo” and “CurrentNodeInfo” could have child tables.
⚫ Configurable elements are listed in the “Configuration” field of each child table.
⚫ Each configurable element has a name tag pair. The element value is enclosed by its name tag pair.

Supermicro Update Manager User’s Guide 138


⚫ Comments could be given to the following element or table name tag. Each comment is enclosed by
“<!--“ and “-->” tags. The supported usages of each element and table are shown in the following
comments.
⚫ Configuration tables could have an “Action” attribute. Supported actions are shown in the comments.
If the action is “None,” all the configurations and children of this table will be skipped.

Configuration tables could contain more specific table attributes in case they are needed.

In this example, in the TwinProInfo table, we can see the system has two nodes and both nodes are Active.
From the CurrentNodeInfo table, the current node being configured is NodeA.

Notes:

• Child tables or configurable elements can be deleted to skip updates.


• Child tables or configurable elements cannot exist without parents.
• The XML version line and the root table should not be deleted.
• For details on using tools to edit XML files, please refer to Appendix F. Using the
Command Line Tool (XMLStarlet) to Edit XML Files.

Supermicro Update Manager User’s Guide 139


4.10 TUI
SUM 2.2.0 or later supports the text-based user interface (TUI) to make the edits of the settings more user-
friendly, providing nice visibility, intuitive and lower learning curve. System configurations can be easily
rendered with TUI like BIOS configurations. It supports the operating systems Linux, Windows and FreeBSD.
Some of the features are:

 Easy Operation

With the visual menu, information display is more intuitive than an XML file. Users can make changes
without learning rules. For example, when a function is disabled, all the dependent settings become invalid
or meaningless. TUI will then hide the settings accordingly.

 Real-Time Feedback

SUM with TUI allows a user to check input format settings in real time and get feedback immediately. For
example, when a data constraint violation occurs, an error message pops up in TUI. Users can find out
about errors without waiting for the execution to be completed.

 GUI-Free Environment

In practice, GUI packages are usually not installed on most Unix-like servers. TUI provides an interactive
interface on text-based system without GUI packages.

 Automatic Configuration of Terminal Settings

Terminal settings are automatically configured to ensure display quality.

Supermicro Update Manager User’s Guide 140


4.10.1 TUI General Reminders

Note the following information before using TUI.

• The TUI feature is not supported by any terminal multiplexer.


• Do not resize the terminal display while executing a command with --TUI option.

• For optimized display, SUM automatically configures your terminal settings. Refer to the table below
to see if the related environment variables are changed accordingly.

Operating System Environment Variables Variable Values


Windows code page 437 (US English)
Linux TE141inuxnux
FreeBSD TE141inuxnux

After you finish using TUI, your original terminal settings will be automatically restored. If
restoration fails, locate and run the shell script “restore_terminal_config.sh” under the current
working directory. The execution command is shown below:

Linux and FreeBSD:

[shell]# source restore_terminal_config.sh

Windows:

X:\working directory> restore_terminal_config.bat

• On Windows, please adjust font size by yourself if the font size is too small to operate.

• TUI does not support mouse operation.

• On FreeBSD, when running on local terminal with vt driver (default driver after FreeBSD 11), SUM
changes the font to tui.fnt when entering TUI, and changes the font to default font when exiting TUI.
You can rename or remove the file ExternalData/tui.fnt to disable this behavior.
• External/tui.fnt is converted from terminus-u12n.bdf by vtfontcvt, check Appendix D for the license.

Supermicro Update Manager User’s Guide 141


4.10.2 BIOS TUI Configuration

4.10.2.1 TUI Display

SUM with TUI simulates a BIOS setup design and its display dimension is set to 30 rows by 100 columns. If
SUM fails to resize the terminal with the current terminal settings, it will try to change font type and font
size for optimized display. The commands to change terminal dimensions on different operating systems
are listed in the table below.

Operating System OS Command to Change Terminal Dimensions


Windows mode con lines=30 cols=100
Linux stty cols 100 rows 30
FreeBSD (sc driver) Local host: Change console video mode by vidcontrol command
(vt driver) Local host: Change console font by vidcontrol -f command.
Remote console: stty cols 100 rows 30
Terminal dimensions are automatically changed so that some settings are changed as well.

Notes:

• The command “GetCurrentBiosCfg” is supported. For details on running the


GetCurrentBiosCfg command, please refer to 5.3.3 Getting Current BIOS Settings.
• Some settings and requirements may vary on different BIOS systems where TUI is run.

Supermicro Update Manager User’s Guide 142


4.10.2.2 How to Use

 Using Arrow Keys

When you first enter the SUM BIOS Setup Utility, the “Main” root menu setup appears on screen. Press the
arrow keys <RIGHT> and <LEFT> to navigate between menu tabs.

Supermicro Update Manager User’s Guide 143


 Setting Values

A “+” symbol before an option on a menu indicates that a sub-menu can be expanded for further
configuration. To change a setting value, you can press the keys <+> and <->. Or you can press the <Enter>
key to call up a dialog box for configuration.

Supermicro Update Manager User’s Guide 144


 Using a Check Box to Enable/Disable a Function

Some functions are allowed to be enabled or disabled. To change the setting, press the <Enter> key to call
up a dialog box. Press the <UP> and <DOWN> arrow keys to make a selection. To disable a function, select
Unchecked. To enable a function, select Checked.

Supermicro Update Manager User’s Guide 145


 Setting Numeric Values

A value may be limited due to the BIOS. You can press the number keys to enter the desired value or press
the <+> and <-> keys to adjust your value within the range. If an input value is incorrect, a warning message
appears on screen.

Supermicro Update Manager User’s Guide 146


4.10.2.3 Getting General Help

For general help information, press the <F1> key. A message box appears.

4.10.2.4 Loading Previous Values

To load the previous values to all configurations, press the <F2> key. A message appears for confirmation.

4.10.2.5 Loading Optimized Values

To return all configurations to the default values, press the <F3> key. A message appears for confirmation.

Supermicro Update Manager User’s Guide 147


4.10.2.6 Setting a Password

Go to Security, select Administrator Password and press the <Enter> key to set a password. Note the
following when you set a password:

 If you have already set passwords in your BIOS, a series of three asterisks on the Security page
indicates that a password is created (see the figure below).
 The password length may vary depending on the BIOS you use. For example, the length of the
password can be from 3 to 20 characters long (see the figure below).

Supermicro Update Manager User’s Guide 148


4.10.2.7 Exiting the TUI

Two methods are available to exit the SUM BIOS configuration TUI.

• To exit the TUI without saving any configurations, press the <ESC> key. A message appears on the
screen for confirmation. Note that this only works on the root menu. You will be returned to the
previous menu when you press the <ESC> key in submenus.

Supermicro Update Manager User’s Guide 149


• To save the configurations and exit the TUI, press the <F4> key. A message appears on the screen for
confirmation.

Supermicro Update Manager User’s Guide 150


4.11 Redfish Host Interface
Redfish Host Interface can be used by software running on a computer system to access the Redfish Service
used to manage the computer system. For details on Redfish Host Interface, refer to the Redfish Host
Interface Specification by DMTF.

Since SUM 2.5.0, some commands support Redfish Host Interface on X12/H12 and later platforms except
the H12 non-RoT system.

Notes:
• The Redfish Host Interface is not enabled by default in Linux. To enable the Redfish
Host Interface in Linux/FreeBSD, Linux_enable_RHI.sh and FreeBSD_setup_RHI.sh in
the SUM release package under the /script folder.
• For SUSE12 system, if the Redfish Host Interface is still not working after
Linux_enable_RHI.sh is enabled, you can execute SuSE12 _Firewall_WhiteList.sh in the
SUM release package under /script/SUSE to add the Redfish Host Interface to the
firewall whitelist.

4.11.1 Using Redfish Host Interface

Syntax:

sum -I Redfish_HI -u <username> -p <password> -c <command>

Different from the standard in-band operation, you need <username> and <password> to access the
managed system.

4.11.2 Supported Commands

Currently, the following commands support Redfish Host Interface for in-band usage: ActivateProductKey,
QueryProductKey, SystemPFA, MemoryHealthCheck, CpuOnDemand, ChassisIntrusion, GetBiosInfo,
UpdateBios, BiosRotManage, GetScpInfo, UpdateScp, GetFixedBootCfg, ChangeFixedBootCfg,
SecureBootManage, GetBmcInfo, UpdateBmc, GetBmcCfg, ChangeBmcCfg, GetBmcLANCfg,
ChangeBmcLANCfg, LoadDefaultBmcCfg, BmcRotManage, GetBmcUserList, SetBmcUserList, Attestation,

Supermicro Update Manager User’s Guide 151


BootStrappingAccount, RmcpManage, GetHostDump, GetEventLog, GetRaidControllerInfo,
UpdateRaidController, SecureEraseRaidHdd, GetVROCCfg, ChangeVROCCfg,UpdatePMem, GetPMemInfo,
GetPowerStatus, SetPowerAction, RedfishApi, GetGpuInfo, UpdateGpu, DiagGpuStatus, GetCpldInfo,
UpdateCpld, UpdateSwitchboardCpld, UpdateFanboardCpld, GetSwitchboardCpldInfo, GetMiscCpldInfo,
GetAomboardCpldInfo, UpdateAomboardCpld, UpdateAocNIC, GetAocNICInfo, GetMultinodeEcInfo,
UpdateMultinodeEc, GetCpuERotInfo, UpdateCpuERot, CpuERotManage, GetGpuERotInfo, FpgaRotManage,
GetMotherboardFpgaInfo, UpdateMotherboardFpga, GetMotherboardMcuInfo, UpdateMotherboardMcu

Example:

In-Band:

[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p PASSWORD -c UpdateBios --file

Supermicro_BIOS.rom

[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p PASSWORD -c UpdateBmc --file

Supermicro_BMC.rom

[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p PASSWORD -c ActivateProductKey --key

1111-1111-1111-1111-1111-1111

[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p PASSWORD -c QueryProductKey

[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p PASSWORD -c GetHostDump --action 1 -

-file log.tgz

4.11.3 AuthNone Authentication

Since SUM 2.8.1, SUM has supported AuthNone authentication for use on the in-band Redfish Host
Interface. As a BMC OEM feature, AuthNone authentication requires the OEM BMC firmware to function
properly. You can execute all SUM commands supporting -I Redfish_HI without a BMC username and a
password.

Syntax:

Supermicro Update Manager User’s Guide 152


sum -I Redfish_HI -c <command>

Example:

[SUM_HOME]# ./sum -I Redfish_HI -c BmcRotManage --action GetInfo

Supermicro Update Manager User’s Guide 153


4.12 Format of the VROC Configuration XML File
The VROC configuration file displays editable VROC configuration elements in XML format for an easier
update. The example below shows how the VROC configurable elements are demonstrated in this file.

⚫ The XML version is shown in the first line.


⚫ The root table name is “VROCCfg. ” <VROCCfg> and </VROCCfg> are its tag pair. All information in the
root table is enclosed between this tag pair.
⚫ There could be two child tags for the root table: “PhysicalDriveInfo” and “VolumeInfo.”
⚫ The “PhysicalDriveInfo” and “VolumeInfo” root tables could have child tables.
⚫ Configurable elements are listed in the “Configuration” fields in each child table.
⚫ Each configurable element has a tag pair. The element value is enclosed by its tag pair.
⚫ Comments may be given following any element or table tag. Each comment is enclosed by the
“<!-” and “-->” tags. The supported usage of each element and table are shown in the comments that
follow.
⚫ Configuration tables may have “Action” attributes. Supported actions are shown in the comments. If
the action is “None, ” all configuration and child tables of this table will be skipped.
⚫ Configuration tables may contain more table specific attributes when needed.
⚫ To create a logical volume, the VolumeInfo action should be “Change” and the Volume action should
be “Create.” The “PhysicalDriveList” field must contain all VROC IDs or serial numbers for VROC
creation and the “VROCId” field should be set to “-1.”
⚫ To delete a logical volume, the VolumeInfo action should be “Change,” the Volume action should be
“Delete,” and the corresponding VROC ID should be specified.
⚫ To delete all arrays built in the VROC controller, the VolumeInfo action should be “ClearAll.” If the
action is “ClearAll,” the VROC ID is irrelevant.
⚫ To change the VROC configuration, you have to delete the original VROC controller and create a new
VROC controller with the modified “Name,” “Level,” “PhysicalDriveList,” “StripSize,” and “Capacity”
fields.

Supermicro Update Manager User’s Guide 154


Notes:

• Child tables or configurable elements can be deleted to skip the updates for these
tables or configuration elements.
• Child tables or configurable elements must stick to the parent tables.
• The XML version line and the root table should not be deleted.
• For using tools to edit XML files, please refer to Appendix F. Using the Command Line
Tool (XMLStarlet) to Edit XML Files.
• Supported RAID level is variant to VROC key on the motherboard. Supported RAID
level:
Supermicro PN Description RAID Support
AOC-VROCINTMOD Intel SSD Only Upgrade module RAID 0/1/10/5
AOC-VROCSTNMOD Standard Upgrade module RAID 0/1/10
AOC-VROCPREMOD Premium Upgrade module RAID 0/1/10/5
• For Intel PCIe Gen3 x8 SSDs, an Intel VROC hardware key is not required to use RAID 0,
while a hardware key is required to use RAID 0/1/5/10 for most SSDs.
• For details on VROC key, please refer to Supermicro website:
https://www.supermicro.com/en/products/accessories/addon/AOC-
VROCxxxMOD.php

Supermicro Update Manager User’s Guide 155


Example:

<?xml version="1.0"?>
<VROCCfg>
<!--Supermicro Update Manager 2.7.0 (2021/08/16)-->
<!--File generated at 2021-08-17_13:34:48-->
<PhysicalDriveInfo>
<Information>
<!--Physical hard drive information, this region is read only.-->
<DriveCount>2</DriveCount>
<PhysicalDrive VROCId="25362e54-a291-5a0f-a3e7-71ec761b4838">
<!--This VROCId is used to identify drive-->
<DriveStatus>Enabled</DriveStatus>
<!--Physical drive status, string value-->
<Temperature>37</Temperature>
<!--Physical drive temperature in degree C, integer value-->
<Capacity>2980</Capacity>
<!--Physical drive capacity in Gigabyte, integer value-->
<ModelName>INTEL SSDPE2KE032T8</ModelName>
<!--Physical drive model name, string value-->
<SerialNumber>PHLN1175029U3P2BGN</SerialNumber>
<!--Physical drive serial number, string value-->
<CapableSpeed>32Gb/s</CapableSpeed>
<!--Physical drive capable speed value, string value-->
<PredictedFail>false</PredictedFail>
<!--Physical drive predicted fail, string value-->
</PhysicalDrive>
<PhysicalDrive VROCId="bdca9ec7-74db-5d30-8e77-3438be52141a">
<!--This VROCId is used to identify drive-->
<DriveStatus>Enabled</DriveStatus>
<!--Physical drive status, string value-->
<Temperature>36</Temperature>

Supermicro Update Manager User’s Guide 156


<!--Physical drive temperature in degree C, integer value-->
<Capacity>1490</Capacity>
<!--Physical drive capacity in Gigabyte, integer value-->
<ModelName>INTEL SSDPE2KE016T8</ModelName>
<!--Physical drive model name, string value-->
<SerialNumber>PHLN0355033D1P6AGN</SerialNumber>
<!--Physical drive serial number, string value-->
<CapableSpeed>32Gb/s</CapableSpeed>
<!--Physical drive capable speed value, string value-->
<PredictedFail>false</PredictedFail>
<!--Physical drive predicted fail, string value-->
</PhysicalDrive>
</Information>
</PhysicalDriveInfo>
<VolumeInfo Action="Change">
<!--Supported Action:None/Change/ClearAll-->
<Volume Action="None" VROCId="-1">
<!--Supported Action:None/Delete/Create-->
<!--This VROCId is used to identify volume-->
<Information>
<Encrypted>false</Encrypted>
<!--Encryption status of this volume-->
<BlockSize>0</BlockSize>
<!--Block size (Bytes), integer value-->
</Information>
<Configuration>
<Name></Name>
<!--Volume name, string value; length limit = 15 characters-->
<!--Only used for "Create" action-->
<Level>RAID0</Level>
<!--RAID level, string value-->
<!--Valid value: RAID0/RAID1/RAID5/RAID10-->

Supermicro Update Manager User’s Guide 157


<!--Only used for "Create" action-->
<PhysicalDriveList></PhysicalDriveList>
<!--Physical drive list, string value-->
<!--Only used for "Create" action-->
<StripSize>0</StripSize>
<!--Strip size (KB), integer value-->
<!--Valid value: -->
<!--4/8/16/32/64/128 for RAID0-->
<!--64 for RAID1-->
<!--4/8/16/32/64/128 for RAID5-->
<!--4/8/16/32/64/128 for RAID10-->
<!--Only used for "Create" action-->
<Capacity>0</Capacity>
<!--Capacity size (MB), integer value-->
<!--Only used for "Create" action-->
</Configuration>
</Volume>
</VolumeInfo>
</VROCCfg>

⚫ To create a volume:
Create a RAID 1 volume with both SSDs and “VROCId” field should be set to “-1”:
The setting enables a dummy volume table for you to create the volume. Note that for the creation
action, “VROCId” is meaningless and VROC ID will be generated after the volume is created.
<Volume Action="None" VROCId="-1">
<!--Supported Action:None/Delete/Create-->
<!--This VROCId is used to identify volume-->
<Configuration>
<Name>Dummy</Name>
<!--Volume name, string value; length limit = 15 characters--
>
<!--Only used for "Create" action-->

Supermicro Update Manager User’s Guide 158


<Level>RAID0</Level>
<!--RAID level, string value-->
<!--Valid value: RAID0/RAID1/RAID5/RAID10-->
<!--Only used for "Create" action-->
<PhysicalDriveList>PHLN0355033D1P6AGN, 25362e54-a291-5a0f-
a3e7-71ec761b4838</PhysicalDriveList>
<!--Physical drive list, string value-->
<!--Only used for "Create" action-->
<StripSize>64</StripSize>
<!--Strip size (KB), integer value-->
<!--Valid value: -->
<!--4/8/16/32/64/128 for RAID0-->
<!--64 for RAID1-->
<!--4/8/16/32/64/128 for RAID5-->
<!--4/8/16/32/64/128 for RAID10-->
<!--Only used for "Create" action-->
<Capacity>1024</Capacity>
<!--Capacity size (MB), integer value-->
<!--Only used for "Create" action-->
</Configuration>
</Volume>
⚫ To delete volume “b8e7131f-a72e-5c2f-a069-977648b74b67”:
<Volume Action="Change" VROCId="b8e7131f-a72e-5c2f-a069-
977648b74b67">
</Volume>
⚫ To delete all volumes:
Use “ClearAll” to delete every volume. After this, every volume will disappear.
<VolumeInfo Action="Change">

Supermicro Update Manager User’s Guide 159


4.13 Remote In-Band Mode
In SUM 2.10.0, you can remotely run in-band commands on a remote system/multiple systems in Remote
In-Band mode.

Notes:
• To run commands in this mode, make sure the remote managed system meet the
requirements in 1.2.4 In-Band Usage Requirements.
• In addition, if the remote managed system is FreeBSD, the sudo command must be
installed by using "pkg install sudo."
• Since SUM 2.8.1, the RemoteExec command can be used to send files and execute shell
commands on a remote system by using the Remote In-Band mode.

4.13.1 Remote SUM and Configurations

To execute Remote In-Band commands on a remote system, the path to the remote SUM executable must
be specified. The remote SUM path can be specified in three ways. The priority applies from high to low.
Firstly, use the --remote_sum command option to specify the path to the remote SUM executable when
executing Remote In-Band commands, which only accept absolute paths. Secondly, rename the
remoteSumrc.sample file to “.remoteSumrc,” copy it to supermicro/sum_remote_inband under the remote
managed system's user home directory, and pre-define the SUM path. See the below example.

# set remote SUM path for Remote In-Band usage


remote_sum_path = /root/supermicro/sum_remote_inband/sum

If none of the above methods are used, SUM will look for the remote SUM in the default path in
supermicro/sum_remote_inband under the user home directory in the remote managed system.

In addition, to execute Remote In-Band commands with customized execution configurations, refer to 4.1
Customizing SUM Configurations. The only difference is that you use the --remote_rc_file instead of --
rc_file if you choose to use the command option to specify the .sumrc file for a remotely managed system.

Supermicro Update Manager User’s Guide 160


4.13.2 Using Remote In-Band (Remote_INB) Mode

Syntax:

sum -I Remote_INB --oi <OS IP address> -ou <OS user ID> [--op <OS user password>

| -os_key <OS private key> -os_key_pw <OS private key password>] -c <command>

Different than the standard in-band operation, entering the username and password of the desired system
is required in order to access it remotely.

4.13.3 Using Remote Redfish Host Interface (Remote_RHI)

Syntax:

sum -I Remote_RHI -u <username> -p <password> --oi <OS IP address> -ou <OS

username> [--op <OS password> | --os_key <OS private key> --os_key_pw <OS

private key password>] -c <command>

For commands or managed systems that require the use of Redfish Host Interface (see 4.11 Redfish Host
Interface), both the BMC and OS username and password of the remote system are needed.

4.13.4 Console Output

The console output contains the following information when executing Remote In-Band commands. The
console output outside the equal signs is SUM that runs the Remote In-Band commands, while the console
output inside the equal signs is from the remote managed system.

Supermicro Update Manager (for UEFI BIOS) 2.10.0 (2022/11/17) (x86_64)

Copyright(C) 2013-2022 Super Micro Computer, Inc. All rights reserved.

Start Remote In-Band execution on 192.168.34.56:

================================================================================

Console Output from the Remote Managed System 192.168.34.56

Supermicro Update Manager User’s Guide 161


================================================================================

End Remote In-Band execution on 192.168.34.56.

4.13.5 Supported Commands

Currently, the available commands for this usage include:

BIOS Management:

GetBiosInfo, UpdateBios, GetDefaultBiosCfg, GetCurrentBiosCfg, ChangeBiosCfg, LoadDefaultBiosCfg,


SetBiosPassword, GetDmiInfo, ChangeDmiInfo, EditDmiInfo, EraseOAKey, BiosRotManage,
SecureBootManage

BMC Management:

GetBmcInfo, UpdateBmc, GetBmcCfg, ChangeBmcCfg, GetBmcLANCfg, ChangeBmcLANCfg,


SetBmcPassword, GetKcsPriv, GetLockdownMode, LoadDefaultBmcCfg, BmcRotManage, TimedBmcReset,
Attestation

Applications:

RemoteExec

Example:

Remote In-Band:

[SUM_HOME]# ./sum -I Remote_INB --oi 192.168.34.57 --ou root --op 111111 -c

RemoteExec --remote_cmd "ls /tmp/ -l | grep test.sh" --file test.sh

Remote In-Band through Redfish Host Interface:

[SUM_HOME]# ./sum -I Remote_RHI -u ADMIN -p Password --oi 192.168.34.57 --ou

root --op 111111 -c GetBmcInfo --remote_sum /root/sum

Supermicro Update Manager User’s Guide 162


4.13.6 Transferring Files

When executing Remote In-Band commands that involve file transfer, SUM creates a new file (randomly
named by 8 characters) in the sum_remote_inband/yyyy-mm-dd_hh-mm-ss folder under the user directory
on the remotely managed system for management access. In the meantime, the sum.log file is also created.
See 4.2 SUM Log Design for details. The log file will be saved on the managing system to the
remote_inband/yyyy-mm-dd_hh-mm-ss_suffix with an IP address. The below provides an example of
running a Remote In-Band command to transfer files with the --file <file> command option.

[SUM_HOME]# ./sum -I Remote_INB --oi 192.168.34.56 --ou root --op 111111 -c

<command> --file <file> --remote_sum /root/sum

The console output contains the following information.

Supermicro Update Manager (for UEFI BIOS) 2.10.0 (2022/11/18) (x86_64)

Copyright(C) 2013-2022 Super Micro Computer, Inc. All rights reserved.

Start Remote In-Band execution on 192.168.34.56:

[When the command involves uploading --file <file> to the remote managed system]
Sending file '<file>' to '/root/sum_remote_inband/2022-11-18_14-09-

58/hraaqvGG.txt' on 192.168.34.56.

============================================================================

Supermicro Update Manager (for UEFI BIOS) 2.10.0 (2022/11/14) (x86_64)

Copyright(C) 2013-2022 Super Micro Computer, Inc. All rights reserved.

File "/root/sum_remote_inband/2022-11-18_14-09-58/hraaqvGG.txt" is updated.

============================================================================

[When the command involves downloading --file <file> from the remote managed system]
Getting file '<file>' from '/root/sum_remote_inband/2022-11-18_14-09-

58/hraaqvGG.txt' on 192.168.34.56.

Supermicro Update Manager User’s Guide 163


Getting file 'remote_inband/2022-11-18_14-10-08_192.168.34.56/sum.log' from

'/root/sum_remote_inband/2022-11-18_14-09-58/sum.log' on 192.168.34.56.

End Remote In-Band execution on 192.168.34.56.

Supermicro Update Manager User’s Guide 164


4.14 BMC LAN Configuration XML File Format
The BMC LAN configuration file is designed to display the supported and editable BMC LAN configuration
elements in XML format for an easier update process. An example below shows how this file demonstrates
the BMC LAN configurable elements.

<?xml version="1.0"?>
<BmcLANCfg>
<!--You can remove unnecessary elements so that-->
<!--their values will not be changed after update-->
<LAN Action="None">
<!--Supported Action:None/Change-->
<Information>
<!--Information for LAN properties-->
<SpeedMbps>1000</SpeedMbps>
<Duplex>Full Duplex</Duplex>
</Information>
<Configuration>
<!--Configuration for LAN properties-->
<!--Will be skipped in OOB usage mode if BMC doesn't support.-->
<IPProtocolStatus>Dual</IPProtocolStatus>
<!--IPv4/IPv6/Dual-->
<!--The value shall indicate which IP protocol can be accessed.-->
<LanMode>Share</LanMode>
<!--Dedicated/Share/Failover-->
<!--Changing this setting may cause the LAN to be unavailable.-->
<MacAddr>3C:EC:EF:C6:22:D9</MacAddr>
<!--X:X:X:X:X:X-->
<!--Will be skipped in OOB usage mode.-->
<!--If IPSrc in IPv4 table is DHCP, changing MacAddr will make IPAddr in
IPv4 table change.-->
<Link></Link>
<!--Auto Negotiation/10M Half Duplex/10M Full Duplex/100M Half Duplex/100M
Full Duplex-->
<!--Link can only be updated if LanMode is Dedicated.-->
<!--Link will be empty if LanMode is Shared.-->

Supermicro Update Manager User’s Guide 165


<!--Will be skipped if empty.-->
<HostName></HostName>
<!--BMC host name-->
<!--string value; length limit = 63 characters-->
<?Note Will be skipped in multiple system usage without --individually
option.?>
<CommunityString>public</CommunityString>
<!--string value; length limit = 18 characters-->
<VLAN_Enable>Disable</VLAN_Enable>
<!--Enable/Disable-->
<!--Changing this setting may cause the LAN to be unavailable.-->
<VLAN_ID>1</VLAN_ID>
<!--Integer value is in [1-4094].-->
<!--0 and 4095 for special purposes.-->
<!--When VLAN enabled, 0 is prohibited.-->
<!--When VLAN disabled, value will not be changed.-->
<!--Changing this setting may cause the LAN to be unavailable.-->
<RMCP_Port>623</RMCP_Port>
<!--[1-65535]-->
<!--In OOB usage, default RMCP port is 623.-->
<!--If the RMCP port is updated, please configure the 'rmcp_port'
in .sumrc file for OOB BMC connection.-->
<IPv4 Action="Change">
<!--Supported Action:None/Change-->
<Configuration>
<!--Configuration for IPv4 properties-->
<!--Will be skipped in OOB usage mode if BMC doesn't support.-->
<IPSrc>DHCP</IPSrc>
<!--Static/DHCP-->
<IPAddr>192.168.34.56</IPAddr>
<!--X.X.X.X-->
<!--Each field is an integer in [0-255].-->
<?Note Will be skipped in multiple system usage without --individually
option.?>
<SubNetMask>255.255.224.0</SubNetMask>
<!--X.X.X.X-->
<!--Each field is an integer in [0-255].-->

Supermicro Update Manager User’s Guide 166


<?Note Will be skipped in multiple system usage without --individually
option.?>
<DefaultGateWayAddr>10.184.7.254</DefaultGateWayAddr>
<!--X.X.X.X-->
<!--Each field is an integer in [0-255].-->
<?Note Will be skipped in multiple system usage without --individually
option.?>
<DNSAddr>1.1.1.1</DNSAddr>
<!--X.X.X.X-->
<!--Each field is an integer in [0-255].-->
<!--Will be skipped if empty.-->
<DNSAddr2>2.2.2.2</DNSAddr2>
<!--X.X.X.X-->
<!--Each field is an integer in [0-255].-->
<!--DNSAddr2 is read-only.-->
</Configuration>
</IPv4>
</Configuration>
</LAN>
</BmcLANCfg>

Supermicro Update Manager User’s Guide 167


⚫ The XML version is shown in the first line.
⚫ The root table name is “BmcLANCfg.” Its name tag pair is <BmcLANCfg> and </BmcLANCfg>. All
information belonging to the root table is enclosed between this name tag pair.
⚫ Configurable elements are listed in the “Configuration” field of each child table.
⚫ Each configurable element has a name tag pair. The element value is enclosed by its name tag pair.
⚫ Comments could be given following any element or table name tag. Each comment is enclosed by the
“<!--“ and “-->” tags. The supported usage of each element and table are shown in its following
comments.
⚫ Configuration tables may have an “Action” attribute. Supported actions are shown in the comments.
If the action is “None,” all the configurations and children of this table will be skipped.
⚫ Configuration tables may contain more table specific attributes if needed.

In this example, the Action is None for the LAN table. As such, SUM will skip updating the element
IPProtocolStatus, LanMode, MacAddr. Link, HostName, CommunityString, VLAN_Enable, VLAN_ID,
RMCP_Port of the table LAN. On the other hand, SUM will try to update the value for the IPSrc element of
the IPv4 table.

Notes:

• Child tables or configurable elements can be deleted to skip updates for these tables or
configuration elements.
• Child tables or configurable elements cannot be without parents.
• The XML version line and the root table should not be deleted.
• For using tools to edit XML files, please refer to Appendix F. Using the Command Line
Tool (XMLStarlet) to Edit XML Files.

Supermicro Update Manager User’s Guide 168


4.15 Fixed Boot Configuration XML File Format
The fixed boot configuration is used to power on/off a boot device and to change the boot device order on
X13 and later platforms. An example below shows how this file demonstrates the fixed boot configurable
elements.

<?xml version="1.0" encoding="ISO-8859-1" standalone="yes"?>


<FixedBootCfg>
<!--Supermicro Update Manager 2.10.0 (2022/12/19)-->
<!--File generated at 2023-01-06_14:30:43-->
<!--Boot mode selected UEFI-->
<Menu name="Fixed Boot Order">
<Setting name="Boot Option #1" selectedOption="UEFI Hard Disk:UEFI OS"
type="Option">
<Information>
<AvailableOptions>
<Option>UEFI Hard Disk:UEFI OS (SATA,Port:0)</Option>
<Option>UEFI CD/DVD</Option>
<Option>UEFI USB Hard Disk</Option>
<Option>UEFI USB CD/DVD</Option>
<Option>UEFI USB Key</Option>
<Option>UEFI USB Floppy</Option>
<Option>UEFI USB Lan</Option>
<Option>UEFI Network:(B4/D0/F0) UEFI PXE IPv4 Intel(R) Ethernet
Controller X550(MAC:3cecefcb33c6)</Option>
<Option>UEFI AP:UEFI: Built-in EFI Shell</Option>
<Option>Disabled</Option>
</AvailableOptions>
<DefaultOption>UEFI Hard Disk:UEFI OS (SATA,Port:0)</DefaultOption>
</Information>
</Setting>
<Setting name="Boot Option #2" selectedOption="UEFI CD/DVD" type="Option">
<Information>
<AvailableOptions>
<Option>UEFI Hard Disk:UEFI OS (SATA,Port:0)</Option>
<Option>UEFI CD/DVD</Option>

Supermicro Update Manager User’s Guide 169


<Option>UEFI USB Hard Disk</Option>
<Option>UEFI USB CD/DVD</Option>
<Option>UEFI USB Key</Option>
<Option>UEFI USB Floppy</Option>
<Option>UEFI USB Lan</Option>
<Option>UEFI Network:(B4/D0/F0) UEFI PXE IPv4 Intel(R) Ethernet
Controller X550(MAC:3cecefcb33c6)</Option>
<Option>UEFI AP:UEFI: Built-in EFI Shell</Option>
<Option>Disabled</Option>
</AvailableOptions>
<DefaultOption>UEFI CD/DVD</DefaultOption>
</Information>
</Setting>
<Setting name="Boot Option #3" selectedOption="UEFI USB Hard Disk"
type="Option">
<Information>
<AvailableOptions>
<Option>UEFI Hard Disk:UEFI OS (SATA,Port:0)</Option>
<Option>UEFI CD/DVD</Option>
<Option>UEFI USB Hard Disk</Option>
<Option>UEFI USB CD/DVD</Option>
<Option>UEFI USB Key</Option>
<Option>UEFI USB Floppy</Option>
<Option>UEFI USB Lan</Option>
<Option>UEFI Network:(B4/D0/F0) UEFI PXE IPv4 Intel(R) Ethernet
Controller X550(MAC:3cecefcb33c6)</Option>
<Option>UEFI AP:UEFI: Built-in EFI Shell</Option>
<Option>Disabled</Option>
</AvailableOptions>
<DefaultOption>UEFI USB Hard Disk</DefaultOption>
</Information>
</Setting>
<Setting name="Boot Option #4" selectedOption="UEFI USB CD/DVD"
type="Option">
<Information>
<AvailableOptions>
<Option>UEFI Hard Disk:UEFI OS (SATA,Port:0)</Option>

Supermicro Update Manager User’s Guide 170


<Option>UEFI CD/DVD</Option>
<Option>UEFI USB Hard Disk</Option>
<Option>UEFI USB CD/DVD</Option>
<Option>UEFI USB Key</Option>
<Option>UEFI USB Floppy</Option>
<Option>UEFI USB Lan</Option>
<Option>UEFI Network:(B4/D0/F0) UEFI PXE IPv4 Intel(R) Ethernet
Controller X550(MAC:3cecefcb33c6)</Option>
<Option>UEFI AP:UEFI: Built-in EFI Shell</Option>
<Option>Disabled</Option>
</AvailableOptions>
<DefaultOption>UEFI USB CD/DVD</DefaultOption>
</Information>
</Setting>
<Setting name="Boot Option #5" selectedOption="UEFI USB Key" type="Option">
<Information>
<AvailableOptions>
<Option>UEFI Hard Disk:UEFI OS (SATA,Port:0)</Option>
<Option>UEFI CD/DVD</Option>
<Option>UEFI USB Hard Disk</Option>
<Option>UEFI USB CD/DVD</Option>
<Option>UEFI USB Key</Option>
<Option>UEFI USB Floppy</Option>
<Option>UEFI USB Lan</Option>
<Option>UEFI Network:(B4/D0/F0) UEFI PXE IPv4 Intel(R) Ethernet
Controller X550(MAC:3cecefcb33c6)</Option>
<Option>UEFI AP:UEFI: Built-in EFI Shell</Option>
<Option>Disabled</Option>
</AvailableOptions>
<DefaultOption>UEFI USB Key</DefaultOption>
</Information>
</Setting>
<Setting name="Boot Option #6" selectedOption="UEFI USB Floppy"
type="Option">
<Information>
<AvailableOptions>
<Option>UEFI Hard Disk:UEFI OS (SATA,Port:0)</Option>

Supermicro Update Manager User’s Guide 171


<Option>UEFI CD/DVD</Option>
<Option>UEFI USB Hard Disk</Option>
<Option>UEFI USB CD/DVD</Option>
<Option>UEFI USB Key</Option>
<Option>UEFI USB Floppy</Option>
<Option>UEFI USB Lan</Option>
<Option>UEFI Network:(B4/D0/F0) UEFI PXE IPv4 Intel(R) Ethernet
Controller X550(MAC:3cecefcb33c6)</Option>
<Option>UEFI AP:UEFI: Built-in EFI Shell</Option>
<Option>Disabled</Option>
</AvailableOptions>
<DefaultOption>UEFI USB Floppy</DefaultOption>
</Information>
</Setting>
<Setting name="Boot Option #7" selectedOption="UEFI USB Lan" type="Option">
<Information>
<AvailableOptions>
<Option>UEFI Hard Disk:UEFI OS (SATA,Port:0)</Option>
<Option>UEFI CD/DVD</Option>
<Option>UEFI USB Hard Disk</Option>
<Option>UEFI USB CD/DVD</Option>
<Option>UEFI USB Key</Option>
<Option>UEFI USB Floppy</Option>
<Option>UEFI USB Lan</Option>
<Option>UEFI Network:(B4/D0/F0) UEFI PXE IPv4 Intel(R) Ethernet
Controller X550(MAC:3cecefcb33c6)</Option>
<Option>UEFI AP:UEFI: Built-in EFI Shell</Option>
<Option>Disabled</Option>
</AvailableOptions>
<DefaultOption>UEFI USB Lan</DefaultOption>
</Information>
</Setting>
<Setting name="Boot Option #8" selectedOption="UEFI Network:(B4/D0/F0) UEFI
PXE IPv4 Intel(R) Ethernet Controller X550(MAC:3cecefcb33c6)" type="Option">
<Information>
<AvailableOptions>
<Option>UEFI Hard Disk:UEFI OS (SATA,Port:0)</Option>

Supermicro Update Manager User’s Guide 172


<Option>UEFI CD/DVD</Option>
<Option>UEFI USB Hard Disk</Option>
<Option>UEFI USB CD/DVD</Option>
<Option>UEFI USB Key</Option>
<Option>UEFI USB Floppy</Option>
<Option>UEFI USB Lan</Option>
<Option>UEFI Network:(B4/D0/F0) UEFI PXE IPv4 Intel(R) Ethernet
Controller X550(MAC:3cecefcb33c6)</Option>
<Option>UEFI AP:UEFI: Built-in EFI Shell</Option>
<Option>Disabled</Option>
</AvailableOptions>
<DefaultOption>UEFI Network:(B4/D0/F0) UEFI PXE IPv4 Intel(R) Ethernet
Controller X550(MAC:3cecefcb33c6)</DefaultOption>
</Information>
</Setting>
<Setting name="Boot Option #9" selectedOption="UEFI Hard Disk:UEFI OS
(SATA,Port:0)" type="Option">
<Information>
<AvailableOptions>
<Option>UEFI Hard Disk:UEFI OS (SATA,Port:0)</Option>
<Option>UEFI CD/DVD</Option>
<Option>UEFI USB Hard Disk</Option>
<Option>UEFI USB CD/DVD</Option>
<Option>UEFI USB Key</Option>
<Option>UEFI USB Floppy</Option>
<Option>UEFI USB Lan</Option>
<Option>UEFI Network:(B4/D0/F0) UEFI PXE IPv4 Intel(R) Ethernet
Controller X550(MAC:3cecefcb33c6)</Option>
<Option>UEFI AP:UEFI: Built-in EFI Shell</Option>
<Option>Disabled</Option>
</AvailableOptions>
<DefaultOption>UEFI AP:UEFI: Built-in EFI Shell</DefaultOption>
</Information>
</Setting>
</Menu>
<Menu name="UefiHardDiskBBSPriorities">

Supermicro Update Manager User’s Guide 173


<Setting name="UEFIHardDisk #1" selectedOption="UEFI OS (SATA,Port:0)"
type="Option">
<Information>
<AvailableOptions>
<Option>UEFI OS (SATA,Port:0)</Option>
<Option>Disabled</Option>
</AvailableOptions>
<DefaultOption>UEFI OS (SATA,Port:0)</DefaultOption>
</Information>
</Setting>
</Menu>
<Menu name="UefiApplicationBootPriorities">
<Setting name="UEFIAP #1" selectedOption="UEFI: Built-in EFI Shell"
type="Option">
<Information>
<AvailableOptions>
<Option>UEFI: Built-in EFI Shell</Option>
<Option>Disabled</Option>
</AvailableOptions>
<DefaultOption>UEFI: Built-in EFI Shell</DefaultOption>
</Information>
</Setting>
</Menu>
<Menu name="UefiNetworkBBSPriorities">
<Setting name="UEFINetwork #1" selectedOption="(B4/D0/F1) UEFI PXE IPv4
Intel(R) Ethernet Controller X550(MAC:3cecefcb33c7)" type="Option">
<Information>
<AvailableOptions>
<Option>(B4/D0/F0) UEFI PXE IPv4 Intel(R) Ethernet Controller
X550(MAC:3cecefcb33c6)</Option>
<Option>(B4/D0/F1) UEFI PXE IPv4 Intel(R) Ethernet Controller
X550(MAC:3cecefcb33c7)</Option>
<Option>Disabled</Option>
</AvailableOptions>
<DefaultOption>(B4/D0/F0) UEFI PXE IPv4 Intel(R) Ethernet Controller
X550(MAC:3cecefcb33c6)</DefaultOption>
</Information>

Supermicro Update Manager User’s Guide 174


</Setting>
<Setting name="UEFINetwork #2" selectedOption="(B4/D0/F0) UEFI PXE IPv4
Intel(R) Ethernet Controller X550(MAC:3cecefcb33c6)" type="Option">
<Information>
<AvailableOptions>
<Option>(B4/D0/F0) UEFI PXE IPv4 Intel(R) Ethernet Controller
X550(MAC:3cecefcb33c6)</Option>
<Option>(B4/D0/F1) UEFI PXE IPv4 Intel(R) Ethernet Controller
X550(MAC:3cecefcb33c7)</Option>
<Option>Disabled</Option>
</AvailableOptions>
<DefaultOption>(B4/D0/F1) UEFI PXE IPv4 Intel(R) Ethernet Controller
X550(MAC:3cecefcb33c7)</DefaultOption>
</Information>
</Setting>
</Menu>
</FixedBootCfg>
⚫ The XML version is shown in the first line.
⚫ The root table name is “FixedBootCfg.” Its name tag pair is < FixedBootCfg > and </FixedBootCfg >. All
information belonging to the root table is enclosed between this name tag pair.
⚫ There could be several menus in FixedBootCfg, depending on your managed system’s boot device.
⚫ Configurable elements are listed in the “<Setting>” field of each child table.
⚫ Each name tag pair <Menu> encloses name tag pairs <Menu>, <Information>, <Setting>.
⚫ <Information> shows the setting-specific information. For example, <Setting> with the attribute
“name” as “Option” has <AvailableOptions> and <DefaultOption> to indicate the selectable and
default options, respectively. Any modification in the <Information> enclosure is unnecessary and
NEVER takes effect.
⚫ Change setting you can modify after # number or change selectedOption <Setting
name="UEFINetwork #2" selectedOption="(B4/D0/F0) UEFI PXE IPv4 Intel(R) Ethernet Controller
X550(MAC:3cecefcb33c6)" type="Option">
⚫ Comments could be given to the following element or table name tag. Each comment is enclosed by
“<!--“ and “-->” tags.

For more details on usages, refer Appendix E. How to Change BIOS Configurations in XML Files -E.3 Option

Supermicro Update Manager User’s Guide 175


After changes, save the XML file and then execute the command “ChangeFixedBootCfg” with --reboot
option, and the change will take effect after reboot.

Notes:

• Unchanged settings can be deleted to skip the update.


• The XML version line and the <FixedBootCfg> root should not be deleted.
• The On/Off boot device can be modified in the <xxxxxBBSPriorities> <setting> menu;
but if the boot device is on the boot order list, you cannot disable it, it should be
disabled in boot order first. Later you can disable it in the <xxxxxBBSPriorities>
<setting> menu.
• If more than one device is listed on the <xxxxxBBSPriorities> <setting> menu, you can
change the order to change the boot order as well. For example, the two UEFINetwork
devices in the “UefiNetworkBBSPriorities” menu change their orders after the "Fixed
Boot Order" menu in <setting selectedOption=UEFI Network> option shows the device
of the first priority that you change in the “UefiNetworkBBSPriorities” menu. But you
cannot change the UEFI Network display device in the "Fixed Boot Order" menu
directly.
• In FixedBootCfg, ignore the <WorkIf> setting because there is no <WorkIf> in
Configuration.
• For using tools to edit XML files, please refer to Appendix F. Using the Command Line
Tool (XMLStarlet) to Edit XML Files.

Supermicro Update Manager User’s Guide 176


5 Managing a Single System
In this chapter, we describe basic user operations for managing a single system, either through the OOB
channel or, if applicable, through the in-band channel. In-band channel usage is similar to OOB usage
except for several differences:

1. For in-band usage, do not use the -l, -i, -u, -p and -f options.
2. For in-band usage, supported commands and their node product key requirement might be different
(see Appendix B. Management Interface and License Requirements).
3. A Linux driver might be required for in-band usage. For details, please see 2.3 Setting Up In-Band
Managed Systems. If a Linux driver is required and you are executing SUM in this server for the first
time, you have to copy and paste the OS specific driver file "sum_bios.ko" under the
SUM_HOME/driver directory to the SUM_HOME directory. For example, if the OS is RHEL 5.x. execute.

[SUM_HOME]# cp ./driver/RHL5_x86_64/sum_bios.ko ./

Supermicro Update Manager User’s Guide 177


5.1 Key Management for a Single System
5.1.1 Activating a Single Managed System

To activate systems individually, follow these steps by using the command “ActivateProductKey”.

1. Obtain a node product key from Supermicro. See 3.1 Getting Product Keys from Supermicro.
2. Use the following SUM command.

Syntax:
sum [[-i <IP or host name> | -I Redfish_HI] -u <username> -p <password>] -c

ActivateProductKey [--key <nodeproductkey> | --key_file <file name>]

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c ActivateProductKey --

key 1111-1111-1111-1111-1111-1111

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c ActivateProductKey --key

'{"ProductKey":{"Node":{"LicenseID":"1","LicenseName":"SFT-OOB-

LIC","CreateDate":"20200409"},"Signature":"1111111111111111111122222222222222233333333333333ab

abababababababababababbabcdcdcdcdcdcdccdcdcddcdefefefefefefefeefefefefghghghghghghghghghgh"}}'

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c ActivateProductKey --

key_file mymacs.txt.key

In-Band:

[SUM_HOME]# ./sum -c ActivateProductKey --key 1111-1111-1111-1111-1111-1111

[SUM_HOME]# ./sum -c ActivateProductKey --key

'{"ProductKey":{"Node":{"LicenseID":"1","LicenseName":"SFT-OOB-

LIC","CreateDate":"20200409"},"Signature":"1111111111111111111122222222222222233333333333333ab

abababababababababababbabcdcdcdcdcdcdccdcdcddcdefefefefefefefeefefefefghghghghghghghghghgh"}}'

Supermicro Update Manager User’s Guide 178


[SUM_HOME]# ./sum -c ActivateProductKey --key_file mymacs.txt.key

[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p PASSWORD -c ActivateProductKey --key

1111-1111-1111-1111-1111-1111

[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p PASSWORD -c ActivateProductKey --

key_file mymacs.txt.key

Notes:
• A node product key in JSON format must be put in single quotation marks.
• When activating a key in JSON format in Windows, the JSON key string cannot contain
any spaces.
• For details on the format of a product key file (mymacs.txt.key), see 3.1 Getting
Product Keys from Supermicro.

5.1.2 Querying the Node Product Keys

To query the node product keys activated in the managed system, use the “QueryProductKey” command.

Syntax:
sum [[-i <IP or host name> | -I <Redfish_HI>] -u <username> -p <password>] -c

QueryProductKey

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c QueryProductKey

In-Band:

[SUM_HOME]# ./sum -c QueryProductKey

[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p PASSWORD -c QueryProductKey

Supermicro Update Manager User’s Guide 179


The console output contains the information below. Each line is a node product key that has been activated
in the managed system. In each line, the first field is the key name. All keys have extra fields describing the
detailed attributes if available.

SFT-OOB-LIC

SFT-DCMS-SINGLE , invoice: X8800693687A, creation date: 2019/12/03

SFT-SPM-LIC , invoice: X8800693688A, creation date: 2019/12/04

SFT-DCMS-SVC-KEY, invoice: X8800693689A, creation date: 2019/12/04

Number of product keys: 4

Supermicro Update Manager User’s Guide 180


5.2 System Checks for a Single System
5.2.1 Checking OOB Support

Use the “CheckOOBSupport” command to check if both BIOS and BMC firmware images support OOB
functions.

Notes:
• If your BMC does not support OOB functions, you can update the BMC firmware image
using the SUM “UpdateBmc” command.
• To update the BIOS in the managed system to support OOB functions, you can use the
SUM “UpdateBios” command (either in-band or OOB) to flash BIOS even when BIOS
does not support OOB functions. For details, see 5.3.2 Updating the BIOS Firmware
Image. However, when using OOB channel, if the onboard BIOS or the BIOS firmware
image does not support OOB functions, the DMI information, such as MB serial
number, might get lost after system reboot.
• If Feature Toggled On is No, all licensed features will be turned OFF and Node Product
Key Activated will be N/A.

Known Limitations:

• If we roll back BIOS from OOB-supported version to non-supported version, the information for “BIOS
build date” and “OOB support in BIOS” fields will not be changed accordingly.

Syntax:

sum [-i <IP or host name> -u <username> -p <password>] -c CheckOOBSupport

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c CheckOOBSupport

In-band:

[SUM_HOME]# ./sum -c CheckOOBSupport

Supermicro Update Manager User’s Guide 181


The console output contains the following information.

[KEY]

Node Product Key Format..........JSON

Node Product Key Activated.......OOB

SFT-DCMS-SVC-KEY Activated...Yes

SFT-SDDC-SINGLE Activated....Yes

Feature Toggled On...............YES

[BMC]

BMC FW Version...................02.41

BMC Supports OOB BIOS Config.....Yes

BMC Supports OOB DMI Edit........Yes

[BIOS]

BIOS Board ID....................0660

BIOS Build Date..................2013/9/18

BIOS Supports OOB BIOS Config....Yes

BIOS Supports OOB DMI Edit.......Yes

[SYSTEM]

System Supports RoT Feature......Yes

5.2.2 Checking Asset Information (OOB Only)

Use the “CheckAssetInfo” command to check the asset information for the managed system. On X11 Intel®
Xeon® Scalable Processors with Intel® C620 Series Chipsets and later platforms, the add-on devices are
displayed by the riser cards to which they are connected.

Syntax:

sum -i <IP or host name> -u <username> -p <password> -c CheckAssetInfo

Supermicro Update Manager User’s Guide 182


Example:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c CheckAssetInfo

The console output is different on different platforms. Examples are provided below.

On platforms before X11 Intel® Xeon® Scalable Processors with Intel® C620 Series Chipsets

Supermicro Update Manager (for UEFI BIOS) 2.2.0 (2018/12/27) (x86_64)

Copyright(C)2018 Super Micro Computer, Inc. All rights reserved.

System

======

Product Name: SuperPN

Product PartModel Number: SYS-1028U-E1CR4+-1-WM001

Version: 0123456789

Serial Number: SuperSN

UUID: 00000000-0000-0000-0000-0CC47A3A4094

Baseboard

=========

Product Name: SuperBPN

Version: 1.00

Serial Number: CM144S013179

CPU ===

[CPU(1)]

Family: Intel® Xeon® processor

Manufacturer: Intel(R) Corporation

Version: Intel(R) Genuine processor

Current Speed: 1800 MHz

Enabled Cores: 12

Supermicro Update Manager User’s Guide 183


Total Cores: 12

CPU ID: 52 06 05 00 ff fb eb bf

[CPU(2)] N/A

Memory

======

[MEM(1)] N/A

[MEM(2)] N/A

[MEM(3)] N/A

[MEM(4)] N/A [MEM(5)] N/A

[MEM(6)] N/A

[MEM(7)] N/A

[MEM(8)] N/A

[MEM(9)] N/A

[MEM(10)] N/A

[MEM(11)]

Locator: P1-DIMMF1

Manufacturer: SK Hynix

Manufacturing Date (YY/WW): 14/05

Part Number: HMA41GR7MFR4N-TFT1

Serial Number: 101E19A4

Size: 8192 MB

Current Speed: 2133 MHz

[MEM(12)] N/A

[MEM(13)] N/A

[MEM(14)] N/A

[MEM(15)] N/A

[MEM(16)] N/A

[MEM(17)] N/A

[MEM(18)] N/A

[MEM(19)] N/A
Supermicro Update Manager User’s Guide 184
[MEM(20)] N/A

[MEM(21)] N/A

[MEM(22)] N/A

[MEM(23)] N/A

[MEM(24)] N/A

Add-on Network Interface

====================================

[NIC(1)]

Device Class: Network controller

Device Subclass: Ethernet controller

Vendor: Intel Corporation (ID:8086)

Subvendor: Super Micro Computer, Inc. (ID:15D9)

Device Name: (ID:1583)

Subsystem Name: (ID:0000)

Serial Number: VA168S018887

Part Number: AOC-S40G-i2Q

MAC Address1: 0CC47A1971AA

Current Speed: 1000Mb/s

MAC Address2: 0CC47A1971AB

Current Speed: 1000Mb/s

Slot Location: 1

Slot Type: SBX3 (Riser)

Add-on PCI Device


Supermicro Update Manager User’s Guide 185
====================================

[Device(1)]

Device Class: Network controller

Device Subclass: Ethernet controller

Vendor: Intel Corporation (ID:8086)

Subvendor: Super Micro Computer, Inc. (ID:15D9)

Device Name: (ID:1583)

Subsystem Name: (ID:0000)

Slot Location: 1

Slot Type: SBX3 (Riser)

Onboard Network Interface

====================================

[NIC(1)]

Device Class: Network controller

Device Subclass: Ethernet controller

Vendor: Intel Corporation (ID:8086)

Subvendor: Super Micro Computer, Inc. (ID:15D9)

Device Name: (ID:1528)

Subsystem Name: AOC-UR-i2XT (ID:085D)

Serial Number: N/A

Part Number: N/A

MAC Address: N/A

Device Status of LAN1: Enabled

Device Type of LAN1: Ethernet

Reference Designation of LAN1: Intel Ethernet X540 #1

Supermicro Update Manager User’s Guide 186


Device Status of LAN2: Enabled

Device Type of LAN2: Ethernet

Reference Designation of LAN2: Intel Ethernet X540 #2

Onboard PCI Device

====================================

[Device(1)]

Device Class: Display controller

Device Subclass: VGA controller (VGA compatible controller)

Vendor: ASPEED Technology Inc. (ID:1A03)

Subvendor: Super Micro Computer, Inc. (ID:15D9)

Device Name: (ID:2000)

Subsystem Name: (ID:091C)

Device Status of Video1: Enabled

Device Type: Video

Reference Designation of Video1: ASPEED Video AST2500

[Device(2)]

Device Class: Network controller

Device Subclass: Ethernet controller

Vendor: Intel Corporation (ID:8086)

Subvendor: Super Micro Computer, Inc. (ID:15D9)

Device Name: (ID:1528)

Subsystem Name: AOC-UR-i2XT (ID:085D)

Device Status of LAN1: Enabled

Device Type of LAN1: Ethernet

Reference Designation of LAN1: Intel Ethernet X540 #1

Supermicro Update Manager User’s Guide 187


Device Status of LAN2: Enabled

Device Type of LAN2: Ethernet

Reference Designation of LAN2: Intel Ethernet X540 #2

System Network Interface

====================================

[LAN(1)]

MAC Address: 0CC47A3A4094

Current Speed: 1000Mb/s

[LAN(2)]

MAC Address: 0CC47A3A4095

Current Speed: 1000Mb/s

IPMI Network Interface

====================================

[IPMI]

MAC Address: 0CC47A685A67

On X11 Intel® Xeon® Scalable Processors with Intel® C620 Series Chipsets and later platforms, output of
add-on sections is different from previous example. The example is shown below.

Add-on Network Interface

====================================

[[[SXB3 (Riser)]]]

[[Onboard]]

[NIC(1)]

Device Class: Network controller

Device Subclass: Ethernet controller

Vendor: (ID:1528)

Subvendor: AOC-UR-i4XT (ID:0847)

Device Name: Intel Corporation (ID:8086)

Supermicro Update Manager User’s Guide 188


Subsystem Name: Super Micro Computer, Inc. (ID:15D9)

Serial Number: OA182S021066

Part Number: AOC-UR-i4XT

MAC Address1: AC1F6B0FEA62

Current Speed1: 0Mb/s

MAC Address1: AC1F6B0FEA63

Current Speed1: 0Mb/s

Slot Number: Onboard

Slot Designation: SXB3

[NIC(2)]

Device Class: Network controller

Device Subclass: Ethernet controller

Vendor: (ID:1528)

Subvendor: AOC-UR-i4XT (ID:0847)

Device Name: Intel Corporation (ID:8086)

Subsystem Name: Super Micro Computer, Inc. (ID:15D9)

Serial Number: OA182S021066

Part Number: AOC-UR-i4XT

MAC Address2: AC1F6B0FEA64

Current Speed2: 1000Mb/s

MAC Address2: AC1F6B0FEA65

Current Speed2: 0Mb/s

Slot Number: Onboard


Supermicro Update Manager User’s Guide 189
Slot Designation: SXB3

[[AOC(1)]]

[NIC(1)]

Device Class: Network controller

Device Subclass: Ethernet controller

Vendor: (ID:1583)

Subvendor: (ID:0000)

Device Name: Intel Corporation (ID:8086)

Subsystem Name: Super Micro Computer, Inc. (ID:15D9)

Serial Number: VA168S018887

Part Number: AOC-S40G-i2Q

MAC Address1: 0CC47A1971AA

Current Speed1: 0Mb/s

MAC Address1: 0CC47A1971AB

Current Speed1: 0Mb/s

Slot Number: 1

Slot Designation: AOC-UR-i4XT SLOT1 PCI-E 3.0 X8

Add-on PCI Device

====================================

[[[SXB3 (Riser)]]]

[[Onboard]]

[Device(1)]

Device Class: Network controller


Supermicro Update Manager User’s Guide 190
Device Subclass: Ethernet controller

Vendor: (ID:1528)

Subvendor: AOC-UR-i4XT (ID:0847)

Device Name: Intel Corporation (ID:8086)

Subsystem Name: Super Micro Computer, Inc. (ID:15D9)

Slot Number: Onboard

Slot Designation: SXB3

[Device(2)]

Device Class: Network controller

Device Subclass: Ethernet controller

Vendor: (ID:1528)

Subvendor: AOC-UR-i4XT (ID:0847)

Device Name: Intel Corporation (ID:8086)

Subsystem Name: Super Micro Computer, Inc. (ID:15D9)

Slot Number: Onboard

Slot Designation: SXB3

[[AOC(1)]]

[Device(1)]

Device Class: Network controller

Device Subclass: Ethernet controller

Vendor: (ID:1583)

Subvendor: (ID:0000)

Device Name: Intel Corporation (ID:8086)

Subsystem Name: Super Micro Computer, Inc. (ID:15D9)

Supermicro Update Manager User’s Guide 191


Slot Number: 1

Slot Designation: AOC-UR-i4XT SLOT1 PCI-E 3.0 X8

Notes:
• Items supported only since X10 Intel® Xeon® Processor E5 v3/v4 Product Family
platform and selected systems are: System: Version, UUID, CPU, BaseBoard, Memory,
and Add-on Network Interface.
• Items supported only since X11 Intel® Xeon® Scalable Processors with Intel® C620
Series Chipsets platform and selected systems: Onboard Network Interface, Add-on PCI
Device, and Onboard PCI Device.
• Items generally supported are: System: Product Name, Serial Number, System Network
Interface, and IPMI Network Interface.
• Current Speed in Network Interface requires TAS installation in the managed system.
• For riser card chips, its device information will be listed in the add-on card section and
under the label “Onboard.”

Supermicro Update Manager User’s Guide 192


5.2.3 Checking Sensor Data (OOB Only)

Use the “CheckSensorData” command to check the sensor data for the managed system.

Notes:
• Supported sensors vary from different motherboards and firmware images.
• Network add-on card temperature can be retrieved from some X10 or later systems.
• For PS and Chassis Intrusion sensors, the “Reading” field is only used to debug. You
only need to check if the “Status” field shows “OK.”

Syntax:

sum -i <IP or host name> -u <username> -p <password> -c CheckSensorData

Example:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c CheckSensorData

For CPU temperature sensor, the console output contains the following information.

Status | (#)Sensor | Reading | Low Limit | High Limit |

------ | --------- | ------- | --------- | ---------- |

OK | (4) CPU Temp | 48C/118F | N/A | 97C/207F |

Supermicro Update Manager User’s Guide 193


5.2.4 Checking System Utilization (OOB Only)

Use the “CheckSystemUtilization” command to check the device utilization status for the managed system.

Notes:
• This command requires a TAS agent to collect the system statuses. If a TAS agent is not
installed on the managed system, the system statuses will be shown as N/A.
• The OS of the managed system must be booted for the TAS agent to collect the real-
time device utilization.
• This command is supported since X10 platforms and select systems.

Syntax:

sum -i <IP or host name> -u <username> -p <password> -c CheckSystemUtilization

Example:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c

CheckSystemUtilization

The console output contains the following information.

Time
====
Last Sample Time: 2014-05-16_17:16:02

OS
==
OS Name: RedHatEnterpriseServer
OS Version: 6.4 x86_64

CPU
===
CPU Utilization: 2.74 %

Memory
======
Memory Utilization: 8 %

Supermicro Update Manager User’s Guide 194


LSI(1)
======
HDD Name: /dev/sdb
Slot number: 1
SMART Status: Ok

HDD(1)
======
HDD name: /dev/sda
SMART Status: Ok
Serial number: Z2AABXL3
Total Partitions: 2
[Partition(1)]
Partition Name: /dev/sda1
Utilization: N/A
Used Space: N/A
Total Space: 17.58 GB
[Partition(2)]
Partition Name: /dev/sda2
Utilization: 22.01 %
Used Space: 3.62 GB
Total Space: 17.30 GB

RSTe(1)
======
Volume name: /dev/md126
Controller name: Intel RSTe
Numbers of Drives: 2
[HDD(1)]
HDD name: /dev/sdc
SMART Status: Ok
[HDD(2)]
HDD name: /dev/sdd

Supermicro Update Manager User’s Guide 195


SMART Status: Ok

Network
=======
Total Devices: 2
[NIC(1)]
Device Name: eth0
Utilization: <1 %
Status: up
[NIC(2)]
Device Name: eth1
Utilization: 0 %
Status: down

Notes:
 RAID Device type LSI, RSTe and NVMe shows only if they have been installed on the host
machine.
 When RSTe Device is installed on the host machine, normal Hard Disk type (HDD)
information will not display.

Supermicro Update Manager User’s Guide 196


5.2.5 Monitors the Host with ServiceCalls

Use the “ServiceCalls” command to check the system event log and sensor data record of the managed
system with the ServiceCalls configuration file. After the execution, the recipients assigned in the file will
receive SEL and SDR reports by e-mail.

Syntax:

sum [-i <IP or host name> -u <username> -p <password>] -c ServiceCalls --file

<servicecalls XML file>

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c ServiceCalls --file

servicecalls_sample.xml

In-Band:

[SUM_HOME]# ./sum -c ServiceCalls --file servicecalls_sample.xml

5.2.5.1 ServiceCalls XML File Format

A ServiceCalls XML file is composed of several nodes, and each node is explained below. For a complete
example of a ServiceCalls XML file, you can find one file names as “servicecalls_sample.xml” bundled in the
SUM release package.

• SMTP Server Node - <SMTPServer> (Required)


To fill out your e-mail server information, SMTP server information is required. The sub-node

ServerURI is the full SMTP URI, and ServerPort is the SMTP port on your SMTP server, which along

with SMTP SSL and SMTP STARTTLS are supported by SUM. SUM is known to support ports 25, 465
and 587. Also,you need to provide the sender’s information such as their e-mail address, ID, and
password for e-mails.
• Trigger Items Node - <Trigger_Items>

Supermicro Update Manager User’s Guide 197


You can select the trigger item types you plan to monitor. There are three sub-nodes:
SDR_Trigger_Items, SEL_Trigger_Items and HW_Event_Alert.
o SDR_Trigger_Items
SDR (Sensor Data Records) records information of types and numbers of sensors in the managed
platform. You can enable or disable this function.
o SEL_Trigger_Items
There are three types of events detected by the managed system in the SEL (System Event Log):
critical, warning, and information. Types of SEL events include “Disk SMART failure”, “CATERR”,
“Uncorrectable ECC”, “Bus Fatal Error”, and so on.The SEL items are all listed in
“servicecalls_example.xml”. To decide how an SEL node is to be monitored, you can set it to
“Trigger” or “Skip”.
o HW_Event_Alert
HW-related events on the managed system, including SDR and SEL, are monitored. Types of SDR
events are “FAN mode” and “Power Unit Status”. Types of SEL events include “Memory”, “Drive
Slot,” “Bus Fatal Error,” “DIMM Error,” and so on. If “Notification” is set to “Enable” and the
receipient’s e-mail address (“RecipientEmail”) is genunine and correct, the status of HW events
will be sent to the recipient’s e-mail address. The default “RecipientEmail” e-mail is
[email protected]”.
• Recipient Information node - <Recipient_Information> (Required)
This section allows user to fill out the recipient’s information, such as his/her name (“Name”) and
his/her title (“Role”) in each node and set the recipient’s e-mail addresss in the node to receive alerts
classified as non-HW events.
• Customer Information node - <Customer_Information>
You can fill out the information of the customer applying for ServiceCalls service, such as name and
company.
• Site Location Information node - <Site_Location_Information>
You can mention where the managed system is located. Besides company name and address, the
contact information can be filled out for further action.

Supermicro Update Manager User’s Guide 198


Notes:

 Only the contents of each attribution and node can be edited.


 The content of attribution must be quoted with double quotes.
 The SMTP URI in the content of <ServerURL > requires an SMTP scheme. If SMTP is set,
it should be “smtp://<SMTP server path>.” If SMTP SSL is set, it should be
“smtps://<SMTP server path>.”
 If the SMTP scheme is “smtps”, please make sure your SMTP server’s SSL is open, and
the certification is not expired.

5.2.5.2 Email Format

The e-mail content includes:

• Subject Line
Contains Event ID, function name, the managed system BMC/CMM IP, and the summary of the host.
• Body
o E-mail Function: It is “SUM Service Calls” in this example.
o Host IP: The BMC/CMM IP address of the managed system.
o Event ID: The 32 bytes of GUID.
o Event Source: The OS IP address of the managing system.
 Problematic Items:

Supermicro Update Manager User’s Guide 199


If SEL and SDR trigger items are problematic, they will be categorized in this group. For SEL problems,
each item includes index, severity, timestamps, sensor type and description. The value [NEW] is used
to indicate this item is new.
○ User-Defined Event Email:
The SEL problem consists of three severity levels: “critical,” “warning” and “information," which
is defined by SUM. The SDR items exceeding their thresholds will be treated as problematic
items.

○ HW Event Alert Email:


HW-related events of SEL and SDR all appear as “Critical.”

 Recovered Items (Last Check):


This section contains the SEL and SDR items previously marked as problematic items but later
recovered in the last check.

 Summary:

Supermicro Update Manager User’s Guide 200


The number of both problematic and recovered items are shown in the Summary.

 Additional Items:
User-Defined Event Email and HW Event Alert Email are different, but both include status, timestamps,
sensor type, reading, and threshold.
○ User-Defined Event Email: This section contains the normal status of SDR items.

○ HW Event Alert Email: This section contains both SEL and SDR items, including Problematic and
non-Problematic events.

 Device Info:

Supermicro Update Manager User’s Guide 201


This section displays BMC or CMM hardware information including “Motherboard,” “System,” and
“Product Key” on the managed system. Note that the device configuration determines what
information from the managed system you obtain.

Note: Both node product keys, “SFT-DCMS-SINGLE” and “SFT-DCMS-SVC-KEY,” are required
to execute this command.

 Site Location Info:

The location where the managed system is located.


 Customer Info:

The customer who owns the managed system.

5.2.5.3 Cache File

Supermicro Update Manager User’s Guide 202


After running the ServiceCalls command, a file named “.servicecalls.cache.db” will be generated under the
execution folder. We implement database to manage the SEL/SDR/HW events. The cache file is designed to
update the events status of host. The file will be read every time the command executed and compare the
the events’ status of the current with those in the file. If events status is recovered or generated, we will
update the file and send E-mail with the latest status at the end of execution.You can change the cache file
location in the .sumrc file. For details, see 4.1 Customizing SUM Configurations. The execution history,
including e-mail contents and e-mail sender/recipient information, are saved in a database file for SUM
internal reference. If you remove the database file, a new one will be generated after the command is
executed again. Note that all previous problematic events will be treated as new events.
Known Limitations:

• SUM cannot access cache files on mounted file systems.

Supermicro Update Manager User’s Guide 203


5.2.6 Monitoring and Controlling PFA of the System

Use the “SystemPFA”command to monitor and set the predictive failure analysis function of BIOS on the
managed system.

Syntax:

sum [-i <IP or host name> | -I Redfish_HI] -u <username> -p <password> -c

SystemPFA --action <action>] [--reboot] [--post_complete]

Option Commands Descriptions

--action Sets action to:

1 = GetCurrentStatus

2 = Enabled

3 = Disabled

Example:

OOB:

1. [SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c SystemPFA --

action GetCurrentStatus

The console output contains the following information.

The current system PFA is Disabled

2. [SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c SystemPFA --

action Enabled --reboot --post_complete

The console output contains the following information.

...........

The system PFA is set to Enabled.


Supermicro Update Manager User’s Guide 204
Status: The managed system 192.168.34.56 is rebooting.

..........................Done

Status: The managed system 192.168.34.56 is waiting for POST complete

........................

..................................................

..................................................

..................................................

......

Status: The managed system 192.168.34.56 is POST completed

In-Band:

[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p PASSWORD -c SystemPFA --action

Disabled --reboot

Note: This command is only available on X13 and later platforms.

Supermicro Update Manager User’s Guide 205


5.2.7 Checking Memory Health of the Managed System

Use the “MemoryHealthCheck” command to access the function in BIOS to check memory health of the
managed system.

Syntax:

sum [-i <IP or host name> | -I Redfish_HI] -u <username> -p <password> -c

MemoryHealthCheck --action <action> --reboot [--post_complete]

Option Commands Descriptions

--action Sets action to:

1 = GetCurrentStatus

2 = Persistent

3 = Enable

4 = Disable

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c MemoryHealthCheck --

action GetCurrentStatus

The current memory health checking is Disabled

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c MemoryHealthCheck --

action Persistent --reboot --post_complete

The console output contains the following information.

....

Supermicro Update Manager User’s Guide 206


The memory health checking is set to Persistent.

Status: The managed system 192.168.34.56 is rebooting.

.........................Done

Status: The managed system 192.168.34.56 is waiting for POST complete

.........................

..................................................

..................................................

..................................................

..................................................

..................................................

..................................................

..................................................

...................

Status: The managed system 192.168.34.56 is POST completed

Status: Getting event logs from 192.168.34.56.

ID| Time Stamp | Sensor Number | Sensor Type | Description

18| 01/20/2022 08:33:10 | #0FF (System Firmware Progress) | System Firmware

Progress | Progress: CPU 1 Advanced Memory Test finished

Supermicro Update Manager User’s Guide 207


17| 01/20/2022 08:32:13 | #0FF (System Firmware Progress) | System Firmware

Progress | Progress: CPU 1 Advanced Memory Test started

In-Band:

[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p PASSWORD -c MemoryHealthCheck --

action Enable --reboot

5.2.8 Getting and Activating Intel On Demand

The CpuOnDemand command is designed to support Intel® On Demand Capabilities (abbreviated as IOD)
on Intel® Xeon SPR (Sapphire Rapids) and later CPUs and activates additional features during the lifetime of
the selected Xeon CPUs. To check if your hardware settings meet the requirements and to learn more
about the features, see the DCL 1(Dear Customer Letter) for each SKU in different product bundles.

IOD requires interaction with Supermicro tools and Intel®. The following section describes the flow in
general.

5.2.8.1 CpuOnDemand Flow

1. Ensure your CPU2 is compatible with IOD and run the GetHwInfo command to get hardware
information, e.g., PPIN and CPU Socket index.
2. Provide PPIN and system asset information to Supermicro to get a LAC+ file.
See Table 2 for product features.
3. Apply the LAC+ file and run the SetLicenseActivateCode command to provision CPU.
4. Run the GetOnDemandState command to get a state report file.
5. Send the state report file back to Supermicro in order to send it back to Intel®.

1
Downloading DCL (Dear Customer Letter) requires an Intel® RDC (Resource & Documentation Center) account.
2
For On Demand Capabilities-supported CPU SKUs, please contact your sales representative.

Supermicro Update Manager User’s Guide 208


Figure 1 - CpuOnDemand Flow

SKU Intel On Demand


Intel MMID Product Short Name
Type Product Suite

Communications &
Storage Suite 4

XCC 99AV1T CSS4 QAT 4 Devices

DLB 4 Devices

DSA 4 Devices

Analytics Suite 4

XCC 99AV1V AMS4 IAX 4 Devices

DSA 4 Devices

Communications &
Storage Suite 2
MCC 99AV1Z CSS2
QAT 2 Devices

DLB 2 Devices

Supermicro Update Manager User’s Guide 209


Analytics Suite 1
MCC 99AV1R AMS1
IAX 1 Devices

ALL 99AV1P SGX512 SGX 512GB

Table 2 - Intel SPR CPU IOD-Supported product names and short names.

Supermicro Update Manager User’s Guide 210


5.2.8.2 Using the CpuOnDemand Command

The CpuOnDemand command provides the following actions to collaborate with the On-Demand
Capabilities-enabled CPU on the managed system.

Command Options Descriptions

--action Sets action to:

1 = GetHwInfo

2 = GetOnDemandState

3 = SetLicenseActivateCode

4 = EnablePPIN

1. Syntax of GetHwInfo:

sum [-i <IP or host name> | -I Redfish_HI] -u <username> -p <password> -c

CpuOnDemand --action GetHwInfo [--cpu_id <cpu_socket_id>] [--file <

hw_id_file_name>] [--overwrite]

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p ADMIN -c CpuOnDemand --action

GetHwInfo --cpu_id 0 --file hwidfile.txt

The console output contains the following information.

Hardware type | Index | ID type | Hardware ID | Vendor | SDSi

Enabled

CPU | 0 | PPIN | AABBCCDD00112233 | GenuineIntel | YES

File "hwidfile.txt" is created.

The format of "hwidfile.txt" is <BMC_MAC>;<CPU_ID>;<PPIN> as an example below:

00:30:48:00:10:12;0;AABBCCDD00112233

Supermicro Update Manager User’s Guide 211


This file could be used in the GetOnDemandState action with the option of --hw_id_file.

INB:

[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p ADMIN -c CpuOnDemand --action

GetHwInfo --file hwidfile.txt

The console output contains the following information.

Hardware type | Index | ID type | Hardware ID | Vendor | SDSi Enabled

CPU | 0 | PPIN | AABBCCDD00112233 | GenuineIntel | YES

File "hwidfile.txt" is created.cd

The content of “hwidfile.txt” contains the following information:

00:30:48:00:10:12;0;AABBCCDD00112233

2. Syntax of GetOnDemandState:

sum [-i <IP or host name> | -I Redfish_HI] -u <username> -p <password> -c

CpuOnDemand --action GetOnDemandState [--cpu_id <cpu_socket_id> | --hw_id

<hw_id> | --hw_id_file <hw_id_file_name>] [ [--file <StateReport>] [-v] [--

squash] [--overwrite] | --plain_text ]

Example:

OOB:

a. [SUM_HOME]# ./sum -I 192.168.34.56 -u ADMIN -p ADMIN -c CpuOnDemand --action

GetOnDemandState --cpu_id 0 --file StateReport.json

The console output contains the following information.

Start reading the state report on CPU 0 of 192.168.34.56 system...

.................

Supermicro Update Manager User’s Guide 212


State Report has been successfully saved to the file <StateReport__

AABBCCDD00112233.json>.

The content of “StateReport__AABBCCDD00112233.json” contains the following information:


{
"hardwareComponentData" :
[
{
"hardwareId" :
{
"type" : "PPIN",
"value" : "AABBCCDD00112233"
},
"hardwareType" : "CPU",
"stateCertificate" :
{
"pendingCapabilityActivationPayloadCount" : 0,
"value" : “AaaaaBbbbbCcccc"
}
}
],
"objectId" : "496E74656C5F5F5352",
"syntaxVersion" : "1.0",
"timestamp" : "2022-09-08T14:16:03+0800"
}

b. [SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p ADMIN -c CpuOnDemand --action

GetOnDemandState --cpu_id 0 --file StateReport.txt --squash

The console output contains the following information.

Start reading the state report on CPU 0 of 192.168.34.56 system...

.................

State Report has been successfully saved to the file <StateReport.txt>.

The content of “StateReport.txt” contains the following information:

Supermicro Update Manager User’s Guide 213


AABBCCDD00112233;{"hardwareComponentData":[{"hardwareId":{"type":"PPIN","value":

"AABBCCDD00112233"},"hardwareType":"CPU","stateCertificate":{"pendingCapabilityA

ctivationPayloadCount":0,"value":"AaaaaBbbbbCcccc”}}],"objectId":"496E74656C5F5F

5352","syntaxVersion":"1.0","timestamp":"2022-09-22T15:28:48+0800"}

c. [SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p ADMIN -c CpuOnDemand --action

GetOnDemandState --cpu_id 0 --plain_text

The console output contains the following information.

Start reading the state report on CPU 0 of 192.168.34.56 system...

NVRAM capacity: 4024 B.

NVRAM used: 292 B (7.26%).

User message:

- SDSi license auth failure count = 0

- SDSi license auth failure treshold = 2

- SDSi license key auth failure = 0

- SDSi license key auth failure treshold = 2

- SDSi updates available = 2

- SDSi updates treshold = 2

Currently active:

- SGX 512 EPC

Active after reboot:

In-Band:

[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p ADMIN -c CpuOnDemand --action

GetOnDemandState --hw_id AABBCCDD00112233 --file DebugStateReport.json -v

The console output contains the following information.


Supermicro Update Manager User’s Guide 214
Start reading the state report on CPU 0 of 169.254.3.254 system...

.................

Debug State Report has been successfully saved to the file <

DebugStateReport.json>.

3. Syntax of SetLicenseActivateCode:

sum [-i <IP or host name> | -I Redfish_HI] -u <username> -p <password> -c

CpuOnDemand --action SetLicenseActivateCode --lac_file <LAC+.txt>] [--reboot] [-

-post_complete]

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p ADMIN -c CpuOnDemand --action

SetLicenseActivateCode --lac_file LAC+_ AABBCCDD00112233.txt --reboot

The format of “LAC+_ AABBCCDD00112233.txt” is “<PPIN>;<LAC+ structure>” as an example below:

AABBCCDD00112233;{"LACPlus":[…]}

The console output contains the following information.


....

Start writing new LAC+ file on CPU 1 of 192.168.34.56 system...

...

New LAC+ file has been set successfully and is pending activation.

Status: The managed system 192.168.34.56 is rebooting.

.....................................Done

WARNING: Without option --post_complete, please manually confirm the managed

system is POST complete before executing next action.

Supermicro Update Manager User’s Guide 215


In-Band:

[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p ADMIN -c CPUOnDemand --action

SetLicenseActivateCode --lac_file LAC+_AABBCCDD00112233.txt --reboot

The console output contains the following information.

Start writing new LAC+ file on CPU 0 of 169.254.3.254 system...

...

New LAC+ file has been set successfully and is pending activation.

Status: The managed system 169.254.3.254 is rebooting.

System reboot command issued.

4. Syntax of EnablePPIN:

sum [-i <IP or host name> | -I Redfish_HI] -u <username> -p <password> -c

CpuOnDemand --action EnablePPIN --reboot [--post_complete]

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p ADMIN -c CpuOnDemand --action

EnablePPIN --reboot --post_complete

Example:

The managed system 192.168.34.56 is rebooting.

...

..................................Done

................

Supermicro Update Manager User’s Guide 216


..................................................

....................

The PPIN Control is set for 192.168.34.56

Status: The managed system 192.168.34.56 is waiting for POST complete

....................

Status: The managed system 10.184.16.102 is POST completed

INB:

[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p ADMIN -c CpuOnDemand --action

EnablePPIN --reboot

Supermicro Update Manager User’s Guide 217


5.2.9 Getting and Clearing the Chassis Intrusion Status for the Managed
System

Use the “ChassisIntrusion” command to get and clear the status of the chassis intrusion sensor. If a
hardware intrusion is detected, the status will be “Hardware Intrusion”. Otherwise, it will be “Normal”. This
command can be used to either get the status or set the status to “Normal”.

Syntax:

sum [[-i <IP or host name> | -I Redfish_HI] -u <username> -p <password>] -c ChassisIntrusion --action
<action>

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c ChassisIntrusion --

action Status

The console output contains the following information:

Managed system................localhost

Intrusion Sensor..........Normal

In-Band:

[SUM_HOME]# sudo ./sum -c ChassisIntrusion --action Clear

The console output contains the following information:

Chassis intrusion has already been cleared.

Supermicro Update Manager User’s Guide 218


5.2.10 Managing FRU Information

5.2.10.1 Getting FRU Information

Use the "GetFruInfo" command to get or dump FRU information on the managed system and read FRU
information from the local FRU file.

Notes:

• The "--dev_id" option only supports CMM.


• The "--showall" option can support CMM and X13DEG-OAD.

Syntax:

sum [-i <IP or host name>] -u <username> -p <password> -c GetFruInfo [--file

<filename> [--dump] | [--file_only]] [--overwrite] [--dev_id <Device ID>] | [--

showall]

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c GetFruInfo --file

dumpedFile --dump --overwrite

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c GetFruInfo --dev_id

1,2

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c GetFruInfo --showall

The console output contains the following information:

FRU information

===================

[CMM Master]

Mfg. Date: 2017/04/05 11:35

Supermicro Update Manager User’s Guide 219


Board Manufacturer: Supermicro

Board Product Name: Chassis Management Module

Board Serial Number:

Board Part Number: MBB-CMM-003

Manufacturer Name: Supermicro

Product Name: Chassis Management Module

Product Part Number: MBM-CMM-003

Product Version: 1

Product Serial Number:

Asset Tag:

[CMM Middle Plane]

Mfg. Date: 2017/10/30 14:24

Board Manufacturer: Supermicro

Board Product Name: MidPlane

Board Serial Number: GB196S006132

Board Part Number: BPN-SB-J610

Manufacturer Name: Supermicro

Product Name: MidPlane

Product Part Number: BPN-SB-J610

Product Version: 1.00

Supermicro Update Manager User’s Guide 220


Product Serial Number: GB196S006132

Asset Tag:

In-Band:

[SUM_HOME]# ./sum -c GetFruInfo --file dumpedFile --file_only

The console output contains the following information:

Mfg. Date: 2021/08/30 18:01

Board Manufacturer: Supermicro

Board Product Name:

Board Serial Number: WM218S011157

Board Part Number:

Manufacturer Name:

Product Name:

Product Part Number:

Product Version:

Product Serial Number:

Asset Tag:

5.2.10.2 Restoring FRU Information

Use the “RestoreFruInfo” command to restore the FRU information on the managed system.

Syntax:

sum [-i <IP or host name>] -u <username> -p <password> -c RestoreFruInfo --file

<filename>

OOB:
Supermicro Update Manager User’s Guide 221
[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c RestoreFruInfo --file

dumpedFile

The console output contains the following information:

RestoreFruInfo command is Completed.

Mfg. Date: 2021/08/30 18:01

Board Manufacturer: Supermicro

Board Product Name:

Board Serial Number: WM218S011157

Board Part Number:

Manufacturer Name:

Product Name:

Product Part Number:

Product Version:

Product Serial Number:

Asset Tag:

In-Band:

[SUM_HOME]# ./sum -c RestoreFruInfo --file dumpedFile

The console output contains the following information:

RestoreFruInfo command is Completed.

Mfg. Date: 2021/08/30 18:01

Board Manufacturer: Supermicro

Supermicro Update Manager User’s Guide 222


Board Product Name:

Board Serial Number: WM218S011157

Board Part Number:

Manufacturer Name:

Product Name:

Product Part Number:

Product Version:

Product Serial Number:

Asset Tag:

5.2.10.3 Changing FRU Information

Use the “ChangeFruInfo” command to change the FRU information on the managed system.

Syntax:

sum [-i <IP or host name>] -u <username> -p <password> -c ChangeFruInfo --item

<item name> --value <assignment value>

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c ChangeFruInfo --item

CT --value 0x01

The console output contains the following information:

ChangeFruInfo command is completed.

Chassis Type: 01

Chassis Part Number:

Chassis Serial Number:

Supermicro Update Manager User’s Guide 223


Mfg. Date: 2021/08/30 18:01

Board Manufacturer: Supermicro

Board Product Name:

Board Serial Number: WM218S011157

Board Part Number:

Manufacturer Name:

Product Name:

Product Part Number:

Product Version:

Product Serial Number:

Asset Tag:

In-Band:

[SUM_HOME]# ./sum -c ChangeFruInfo --item CT --value 0x01

The console output contains the following information:

ChangeFruInfo command is completed.

Chassis Type: 01

Chassis Part Number:

Chassis Serial Number:

Mfg. Date: 2021/08/30 18:01

Board Manufacturer: Supermicro

Board Product Name:

Supermicro Update Manager User’s Guide 224


Board Serial Number: WM218S011157

Board Part Number:

Manufacturer Name:

Product Name:

Product Part Number:

Product Version:

Product Serial Number:

Asset Tag:

Supermicro Update Manager User’s Guide 225


5.3 Managing a Single System
5.3.1 Getting BIOS Firmware Image Information

Use the “GetBiosInfo” command to get the BIOS firmware image information from the managed system as
well as the local BIOS firmware image (with the --file option).

OOB and In-Band Syntax:

sum [[-i <IP or host name> | -I Redfish_HI] -u <username> -p <password>] -c

GetBiosInfo [--file <filename> [--file_only]] [--showall] [--extract_measurement]

Remote In-Band Syntax:

sum [-I Remote_INB | -I Remote_RHI -u <username> -p <password>] --oi <OS IP

address> --ou <OS username> [--op <OS password> | --os_key <OS private key>

--os_key_pw <OS private key password>] -c GetBiosInfo [--file <filename> [--

file_only]] [--showall] [--extract_measurement] [--remote_sum <remote sum path>]

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c GetBiosInfo --file

Supermicro_BIOS_signed.rom

The console output contains the following information when secure flash is signed from a local BIOS image.

Managed system...........192.168.34.56

Board ID.............0660

BIOS build date......2012/10/17

Local BIOS image file.... Supermicro_BIOS_signed.rom

Board ID.............0988

BIOS build date......2018/5/7

FW image.............Signed

Signed Key.......SecureFlash

Supermicro Update Manager User’s Guide 226


In-Band:

[SUM_HOME]# ./sum -c GetBiosInfo --file Supermicro_BIOS_signed.rom --file_only

The console output contains the following information when RoT is signed from a local BIOS image.

Local BIOS image file....Supermicro_BIOS_signed.rom

Board ID.............1B6A

BIOS build date......2021/01/12

FW image.............Signed

Signed Key.......RoT

[SUM_HOME]# ./sum -c GetBiosInfo --file Supermicro_BIOS.rom --showall

The console output contains the following information.

Managed system:

Board ID.............0660

BIOS build date......2012/10/17

BIOS version.........1.0

BIOS revision........1.8

Local BIOS image file....Supermicro_BIOS.rom

Board ID.............1B4A

BIOS build date......2021/03/11

FW image.............Signed

Signed Key.......RoT

BIOS version.........1.0a

BIOS revision........5.22

FW global version: 0

RC version: 20.P80

SPS version: 4.4.4.53

CPU signature: 00 06 06 a4

Description: IceLakeServer L0

Version: 0B000280

Supermicro Update Manager User’s Guide 227


CPU signature: 00 06 06 a5

Description: IceLakeServer C0

Version: 0C0002B0

CPU signature: 00 06 06 a6

Description: IceLakeServer D0

Version: 0D000260

............

BIOS build date: 2021/03/11

BIOS version: 1.0a

UUID: 936B704B-2D82-EB11-9FAD-0CC47AFBDDC6

PMEM version: 02.02.00.1553

BIOS unique name: BIOS_X12SPI-1B4A_20210311_1.0a_STDsp.bin

[SUM_HOME]# ./sum -c GetBiosInfo --file Supermicro_BIOS.rom --file_only --

extract_measurement

The console output contains the following information.

Local BIOS image file...................Supermicro_BIOS.rom

Board ID............................1B6A

BIOS build date.....................2022/05/27

FW image............................Signed

Signed Key......................RoT

Measurement.....................FB0DC09383104F49834E2E903F46F365259CB598

6D97F0F3D9DB5945E0D0DFD59F8511F6857E915B414A1B9A30071EF5D99018144033DCC80464B951

E555402B

Remote In-Band:

[SUM_HOME]# ./sum -I Remote_INB --oi 192.168.34.57 --ou root --op 111111 -c

GetBiosInfo --remote_sum /root/sum

Remote In-Band through Redfish Host Interface:

[SUM_HOME]# ./sum -I Remote_RHI -u ADMIN -p PASSWORD --oi 192.168.34.57 --ou

root --op 111111 -c GetBiosInfo --remote_sum /root/sum

Supermicro Update Manager User’s Guide 228


The console output contains the following information.

Supermicro Update Manager (for UEFI BIOS) 2.10.0 (2022/11/02) (x86_64)

Copyright(C) 2013-2022 Super Micro Computer, Inc. All rights reserved.

Start Remote In-Band execution on 192.168.34.57:

================================================================================

Supermicro Update Manager (for UEFI BIOS) 2.10.0 (2022/11/02) (x86_64)

Copyright(C) 2013-2022 Super Micro Computer, Inc. All rights reserved.

Reading BIOS flash ..................... (100%)

Managed system:

Board ID............................1A07

BIOS build date.....................2021/05/25

================================================================================

Getting file 'remote_inband/2022-11-03_17-38-55_192.168.34.57/sum.log' from

'/root/sum_remote_inband/2022-11-03_17-37-49/sum.log' on 192.168.34.57.

End Remote In-Band execution on 192.168.34.57.

The SecureFlash-signed key of the local BIOS image displays the following information:

Type Description
Signed Secure flash is signed by Super Micro Computer, Inc.
Signed(U) Secure flash is NOT signed by Super Micro Computer, Inc., but an unknown
authority.
(Not shown) The “FW image” field is not shown because of no secure flash being signed in
the image.

Supermicro Update Manager User’s Guide 229


A RoT-signed key of the local BIOS image displays the following information:

Type Description
Signed RoT is signed by Super Micro Computer, Inc.
Signed(C) RoT is verified by the specified certificate.
Signed(U) RoT is NOT signed by Super Micro Computer, Inc. but by an unknown
authority.
Verification failed The RoT signing in the image cannot be verified because the image is
corrupted or incomplete.

Notes:
 BIOS secure flash and RoT signed information are supported.
 The PMem firmware version in this section is the BIOS built-in PMem firmware.

Supermicro Update Manager User’s Guide 230


5.3.2 Updating the BIOS Firmware Image

Use the “UpdateBios” command with the BIOS firmware image Supermicro_BIOS.rom or bios_image.tar for
OpenBMC to run SUM to update the managed system.

OOB and In-Band Syntax:

sum [[-i <IP or host name> | -I Redfish_HI] -u <username> -p <password>] -c

UpdateBios --file <filename> [options…]

Remote In-Band Syntax:

sum [-I Remote_INB | -I Remote_RHI -u <username> -p <password>] --oi <OS IP

address> --ou <OS username> [--op <OS password> | --os_key <OS private key>

--os_key_pw <OS private key password>] -c UpdateBios --file <filename> [--

remote_sum <remote sum path>] [options…]

Option Commands Descriptions


--reboot Forces the managed system to reboot or power up after operation.
--flash_smbios Overwrites and resets the SMBIOS data.
--preserve_mer Preserves the ME firmware region.
--preserve_nv Preserves the NVRAM.
--kcs Updates BIOS through KCS. (Support is available on platforms before X11
with OEM BMC request only and can be only used with in-band usage.)
--preserve_setting Preserves BIOS configurations.
--erase_OA_key Erases the OA key.
--backup Backs up the current BIOS image. (Only supported by RoT systems.)
--forward Confirms the Rollback ID and upgrades to the next revision. (Only supported
by X12/H12 and later platforms except for H12 non-RoT systems.)
--staged <action> Sets action to:
1 = update: The Update process will start at the next system boot.
2 = abort: Aborts the previous staged update task.
3 = getinfo: Check if there was any pending staged update task.
--post_complete Waits for the managed system POST to complete after reboot.
--clear_password Clears the BIOS password.
--erase_secure_boot_key Erases the secure boot key.
--reset_boot_option Resets the BIOS boot configurations.

Supermicro Update Manager User’s Guide 231


Notes:

 Before performing the OOB UpdateBios command, it is recommended to shut down


the managed system first.
 When performing an in-band UpdateBios command, SUM will disable watchdog and
unload the me/mei driver from the OS if it exists.
 With the Server ME embedded on the Supermicro system, you may encounter a
problem executing the “UpdateBios” in-band SUM command when the Client ME
driver (MEIx64) is installed on the Windows platform. To prevent the system from
hanging, you need to remove the driver before updating BIOS. The steps are displayed
upon detection.
 When using an SSH connection to run the UpdateBios in-band command, the SSH
timeout on both the client and server sides should be adjusted to avoid a broken pipe
during command execution. Typical execution time is within 30 minutes. Timeout value
should be longer than 30 minutes.
 If the updated BIOS FDT (Flash Descriptor Table) is different from the current BIOS FDT
or if ME protection needs to be disabled when the UpdateBios in-band command is
executed, a warning message stating the necessary actions is displayed.
 When multiple boots are installed, use the default boot OS to run this command so
that when FDT is different, the jumper-less solution can continue updating BIOS after
the first reboot.
 OOB UpdateBios command has not been supported for MBs that implemented client
ME such as X13SAx series, X12SAE, X12SCA-(5)F, X11SAE-F, X11SAT-F, X11SSZ-
(Q)F/LN4F, X11SBA-(LN4)F and C7-series.
 Signed BIOS update is supported.
 X12/H12 RoT platforms support staged update only if both BMC and CPLD support it as
well.
 For some X12/H12 RoT platforms, BIOS can only be updated while the system is
powered off. In this case, the --reboot option is required. Therefore, for in-band BIOS
updates, SUM will power off the system after uploading BIOS image to start the update
process. The system will be powered on automatically after the BIOS update has
completed.
 For X12/H12 and later RoT platforms, in-band BIOS updates can only be done through
the Redfish Host Interface. For details, refer to 4.10 Redfish Host Interface.
 The --backup option backs up the current BIOS image on the managed system, not the
BIOS file to be updated.
 The --backup option is only supported by X12/H12 and later RoT platforms.
 Due to a known GRUB2 loader issue, the system may not be able to boot and may hang
up after BIOS update is upgraded. If the o GRUB2 loader version is not the lastest,
please downgrade the BIOS to the previous version and upgrade the GRUB2 loader to
the latest version. Then perform a BIOS upgrade to the target BIOS again. For more

Supermicro Update Manager User’s Guide 232


details, please refer to the FAQ on the Supermicro website
https://www.supermicro.com/support/faqs/faq.cfm?faq=33400.
 OpenBMC only accepts tar firmare files for BIOS firmware updates. Please refer to the
appendix L.1 BIOS Firmware Updating Tar File for OpenBMC for creating a tar file
firmware image.

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c UpdateBios --file

Supermicro_BIOS.rom --reboot

In-Band:

[SUM_HOME]# ./sum -c UpdateBios --file Supermicro_BIOS.rom --reboot

In-Band through KCS:

[SUM_HOME]# ./sum -c UpdateBios --file Supermicro_BIOS.rom --kcs --reboot

In-Band through Redfish Host Interface:

[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p PASSWORD -c UpdateBios --file

Supermicro_BIOS.rom --reboot

Remote In-Band:

[SUM_HOME]# ./sum -I Remote_INB --oi 192.168.34.56 --ou root --op 111111 -c

UpdateBios --file Supermicro_BIOS.rom --reboot --remote_sum /root/sum

Remote In-Band through Redfish Host Interface:

[SUM_HOME]# ./sum -I Remote_RHI -u ADMIN -p PASSWORD --oi 192.168.34.56 --ou

root --op 111111 -c UpdateBios --file Supermicro_BIOS.rom --reboot --remote_sum

/root/sum

Notes:

 The OOB usage of this function is available when the BMC node product key is
activated.
 The in-band usage of this function does not require node product key activation.
 The firmware image can be successfully updated only when the board ID of the

Supermicro Update Manager User’s Guide 233


firmware image and the managed system are the same.
 You have to reboot or power up the managed system for the changes to take effect.
 When using an OOB channel, if the onboard BIOS or the BIOS firmware image does not
support OOB functions, the DMI information (such as the motherboard serial number)
might be lost after system reboot.
 DO NOT flash the BIOS and BMC firmware images at the same time.
 The --preserve_nv and --flash_smbios options cannot be used at the same time.
 The --flash_smbios option is used to erase and restore SMBIOS information as factory
default values. Unless you are familiar with SMBIOS data, do not use this option.
 The --preserve_nv option is used to preserve BIOS NVRAM data. Unless you are
familiar with BIOS NVRAM, do not use this option.
 The --preserve_mer option is used to preserve the ME firmware region. Unless you are
familiar with the ME firmware region, do not use this option.
 The --preserve_setting option requires an SFT-OOB-LIC key (both OOB and In-Band),
and it is only supported on X11 Intel® Xeon® Scalable Processors with Intel® C620
Series Chipsets and later platforms. The preserved setting configurations will be listed
in a preserved_settings.log. Another way to know which BIOS setting is preserved is to
run the GetCurrentBioscfg and GetDefaultBioscfg commands after BIOS is updated.
Compare the two files and the different values between these two files are the
preserved settings.
 Firmware verification to update the BMC is supported. SUM prevents the BMC from
being updated with unauthorized firmware.
 In-band usage through KCS is only supported on non-Redfish platforms (before X11
platforms) with an OEM BMC request only. It is not generally supported on a standard
BMC.

5.3.3 Getting Current BIOS Settings

Use the “GetCurrentBiosCfg” command to execute SUM to get the current BIOS settings from the managed
system and save it in the USER_SETUP.file.

Supermicro Update Manager User’s Guide 234


Notes:

 This BIOS configuration file is synchronized to the BMC from the BIOS when the system
reboots or powers up.
 If the customer has flashed the BMC firmware image, this function will not work until
the managed system is first rebooted or powered up.
 X11 Intel® Xeon® Scalable Processors with Intel® C620 Series Chipsets and newer
platforms support HII. The current BIOS settings will be generated as XML and plain
text formats for HII and DAT, respectively.
 The XML file of the BIOS configuration contains extended ASCII characters. Please use
ISO 8859-1 encoding to view the BIOS configuration XML file.
 SUM 2.2.0 or later supports text-based user interface (TUI). For details, refer to 4.9
TUI.
 SUM 2.7.0 or later supports generating a compact version of the BIOS configuration file
for TUI using the “--compact” option to remove the unchanged BIOS settings. To view
an example of a compact configuration file, refer to Appendix G. Removing Unchanged
BIOS Settings in an XML File.
 TUI does not support Remote In-band usage.

OOB and In-Band Syntax:

sum [-i <IP or host name> -u <username> -p <password>] -c GetCurrentBiosCfg --

file <USER_SETUP.file> [[--current_password <current password>] | [--cur_pw_file

<current password file path>]] [--overwrite] [--tui [--compact]]

Remote In-Band Syntax:

sum -I Remote_INB --oi <OS IP address> --ou <OS username> [--op <OS password> |

--os_key <OS private key> --os_key_pw <OS private key password>] -c

GetCurrentBiosCfg --file <USER_SETUP.file> [[--current_password <current

password>] | [--cur_pw_file <current password file path>]] [--overwrite] [--

remote_sum <remote sum path>]

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c GetCurrentBiosCfg --

file USER_SETUP.file --overwrite

Supermicro Update Manager User’s Guide 235


In-Band:

[SUM_HOME]# ./sum -c GetCurrentBiosCfg --file USER_SETUP.file --overwrite

Remote In-Band:

[SUM_HOME]# ./sum -I Remote_INB --oi 192.168.34.56 --ou root --op 111111 -c

GetCurrentBiosCfg --file USER_SETUP.file --overwrite --remote_sum /root/sum

5.3.4 Updating BIOS Settings Based on the Current BIOS Settings

1. Follow the steps in 5.3.3 Getting Current BIOS Settings.


2. Edit the item/variable values in the user setup text file USER_SETUP.file to the desired values as
illustrated in 4.3 Format of BIOS Settings Text File (for DAT) or 4.4 Format of BIOS Settings XML File
(for HII).
3. Remove unchanged settings/menus in the BIOS configuration file. Note that this step is optional. For
details, see Appendix G. Removing Unchanged BIOS Settings in an XML File.
4. Use the “ChangeBiosCfg” command with the updated file USER_SETUP.file to run SUM to update the
BIOS configuration.

Notes:

 The editable BIOS configuration items may be changed for different BIOS versions.
Please make sure the BIOS configurations are consistent with the BIOS version on the
managed system.
 The uploaded configuration will only take effect after a system reboot or power up.
 For HII, when the new BIOS firmware image is flashed, there may be conflicts between
the BIOS configuration file and the latest BIOS configuration in the managed system. The
current BIOS configuration file should be re-downloaded, re-modified and then updated.
 When hardware resources or settings are changed, a previously downloaded BIOS
configuration file may become outdated. When a BIOS configuration file is inconsistent
with the latest BIOS configuration in the managed system, using the options --
skip_unknown and --skip_bbs (both options are only supported in HII) may solve the
problem.
For instance, when an AOC has been removed from the managed system, the BIOS
configuration for the related menus or settings may become invalid. The option --
skip_unknown is designed to skip all invalid menus and settings in the latest BIOS
configuration in the managed system.
In another example, when a hard disk device is changed, the option string in the Option
setting in the BBS related menus may become invalid as well. The --skip_bbs option is

Supermicro Update Manager User’s Guide 236


designed to skip all BBS related menus. The “related BBS menu” is defined as owning
“Priorities” in its name and “Boot” for its parent menu.
 For X11 Intel® Xeon® Scalable Processors with Intel® C620 Series Chipsets and later
platforms, the same boot device may be presented with slightly varied boot strings.
BIOS/SUM concludes that the boot type and port location can be used for identification.
For example, a UEFI boot device mounted at port 0 can be represented as “UEFI P0:
Hard disk A0001,” “UEFI P0: Hard disk A0002” and “UEFI P0.” “A0001” and “A0002” can
be two identical hard disks with different serial numbers, and there is no boot device
information in the default BIOS configuration for “UEFI P0.” When SUM can’t match the
whole boot option string, it will try to match the substring before the first colon. For
example, “UEFI P0: Hard disk A0001” matches “UEFI P0: Hard disk A0002” and “UEFI
P0.”
 The BIOS configuration XML file contains extended ASCII characters. Use ISO 8859-1
encoding to view and save BIOS configurations in an XML file.
 From SUM 2.5.0, a BIOS configuration tagged with "<LicenseRequirement>" requires the
SFT-DCMS-SINGLE node product key to change the BIOS setting. Please refer to
Appendix E.6 License Requirement Setting for more details.

Syntax:
sum [-i <IP or host name> -u <username> -p <password>] -c ChangeBiosCfg --file

<USER_SETUP.file> [[--current_password <current password>] | [--cur_pw_file

<current password file path>]] [--reboot]

Syntax:
sum -I Remote_INB --oi <OS IP address> --ou <OS username> [--op <OS password> |

--os_key <OS private key> --os_key_pw <OS private key password>] -c

ChangeBiosCfg --file <USER_SETUP.file> [[--current_password <current password>]

| [--cur_pw_file <current password file path>]] [--reboot] [--remote_sum <remote

sum path>]

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c ChangeBiosCfg --file

USER_SETUP.file --reboot

Supermicro Update Manager User’s Guide 237


In-Band:

[SUM_HOME]# ./sum -c ChangeBiosCfg --file USER_SETUP.file --reboot

Remote In-Band:

[SUM_HOME]# ./sum -I Remote_INB --oi 192.168.34.56 --ou root --op 111111 -c

ChangeBiosCfg --file USER_SETUP.file --reboot --remote_sum /root/sum

Supermicro Update Manager User’s Guide 238


5.3.5 Getting Factory BIOS Settings

Use the “GetDefaultBiosCfg” command to execute SUM to get the default factory BIOS settings from the
managed system and save it in the USER_SETUP.file file.

OOB and In-Band Syntax:

sum [-i <IP or host name> -u <username> -p <password>] -c GetDefaultBiosCfg --

file <USER_SETUP.file> [[--current_password <current password>] | [--cur_pw_file

<current password file path>]] [--overwrite]

Remote In-Band Syntax:

sum -I Remote_INB --oi <OS IP address> --ou <OS username> [--op <OS password> |

--os_key <OS private key> --os_key_pw <OS private key password>] -c

GetDefaultBiosCfg --file <USER_SETUP.file> [[--current_password <current

password>] | [--cur_pw_file <current password file path>]] [--overwrite] [--

remote_sum <remote sum path>]

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c GetDefaultBiosCfg --

file USER_SETUP.txt --overwrite

In-Band:

[SUM_HOME]# ./sum -c GetDefaultBiosCfg --file USER_SETUP.file --overwrite

Remote In-Band:

[SUM_HOME]# ./sum -I Remote_INB --oi 192.168.34.56 --ou root --op 111111-c

GetDefaultBiosCfg --file USER_SETUP.file --overwrite --remote_sum /root/sum

Supermicro Update Manager User’s Guide 239


5.3.6 Updating BIOS Settings Based on the Factory Settings

1. Follow the steps in 5.3.5 Getting Factory BIOS Settings.


2. Follow steps 2 to 4 in 5.3.4 Updating BIOS Settings Based on the Current BIOS Settings.

5.3.7 Loading Factory BIOS Settings

Use the “LoadDefaultBiosCfg“ command to execute SUM to reset the BIOS settings of the managed system
to the factory default settings.

Note: The uploaded configuration will take effect only after a reboot or power up.

OOB and In-Band Syntax:

sum [-i <IP or host name> -u <username> -p <password>] -c LoadDefaultBiosCfg [[-

-current_password <current password>] | [--cur_pw_file <current password file

path>]] [--reboot]

Remote In-Band Syntax:

sum -I Remote_INB --oi <OS IP address> --ou <OS username> [--op <OS password> |

--os_key <OS private key> --os_key_pw <OS private key password>] -c

LoadDefaultBiosCfg [[--current_password <current password>] | [--cur_pw_file

<current password file path>]] [--reboot] [--remote_sum <remote sum path>]

Example:
OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c LoadDefaultBiosCfg --

reboot

In-Band:

[SUM_HOME]# ./sum -c LoadDefaultBiosCfg --reboot

Remote In-Band:

Supermicro Update Manager User’s Guide 240


[SUM_HOME]# ./sum -I Remote_INB --oi 192.168.34.56 --ou root --op 111111 -c

LoadDefaultBiosCfg --reboot --remote_sum /root/sum

5.3.8 Getting DMI Information

Use the “GetDmiInfo” command to execute SUM to get the current supported editable DMI information
from the managed system and save it in the DMI.txt file.

Notes:
 This DMI file is synchronized to BMC from BIOS when the system reboots or powers up.
 If the customer has flashed a BMC firmware image, this function will not work until the
managed system is first rebooted or powered up.
 The supported editable DMI items could vary from BIOS to BIOS. SUM will only show
supported items.

OOB and In-Band Syntax:

sum [-i <IP or host name> -u <username> -p <password>] -c GetDmiInfo --file

<DMI.txt> [--overwrite]

Remote In-Band Syntax:

sum -I Remote_INB --oi <OS IP address> --ou <OS username> [--op <OS password> |

--os_key <OS private key> --os_key_pw <OS private key password>] -c GetDmiInfo -

-file <DMI.txt> [--overwrite] [--remote_sum <remote sum path>]

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c GetDmiInfo --file

DMI.txt --overwrite

In-Band:

[SUM_HOME]# ./sum -c GetDmiInfo --file DMI.txt --overwrite

Remote In-Band:

Supermicro Update Manager User’s Guide 241


[SUM_HOME]# ./sum -I Remote_INB --oi 192.168.34.56 --ou root --op 111111 -c

GetDmiInfo --file DMI.txt --overwrite --remote_sum /root/sum

5.3.9 Editing DMI Information

There are two ways to edit DMI information for the managed system. You can either execute the
EditDmiInfo command or manually edit the received DMI.txt file.

Manually Editing

1. Follow the steps in 5.3.8 Getting DMI Information to get the DMI information text file (DMI.txt).
2. Replace the item values in the DMI.txt file with the desired values illustrated in 4.5 Format of DMI
Information Text File.
3. Remove the unchanged items in the text file. Note that this step is optional.

Note: The supported editable DMI items may be changed for different BIOS versions. The
version variable of the DMI.txt file must be the same as that from the managed system and
should not be edited.

Executing the EditDmiInfo Command

The EditDmiInfo command will only update (or add) the specified DMI item in the specified DMI.txt file.
When you edit from an empty file, a new file will be created. You can specify a DMI item using [--item_type,
--item_name] options or using --shn option with the item’s short name. The editable item type, item name
and item short name can be found in the DMI.txt file. To get a DMI.txt file, follow the steps in 5.3.8
Getting DMI Information.

Syntax:

OOB and In-Band Syntax:

sum [-i <IP or host name> -u <username> -p <password>] -c EditDmiInfo --file

<DMI.txt> [--item_type <Item Type> --item_name <Item Name> | --shn <Item Short

Name>] [--value <Item Value> | --default]

Remote In-Band Syntax:

Supermicro Update Manager User’s Guide 242


sum -I Remote_INB --oi <OS IP address> --ou <OS username> [--op <OS password> |

--os_key <OS private key> --os_key_pw <OS private key password>] -c EditDmiInfo

--file <DMI.txt> [--item_type <Item Type> --item_name <Item Name> | --shn <Item

Short Name>] [--value <Item Value> | --default] [--remote_sum <remote sum path>]

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c EditDmiInfo --file

DMI.txt --item_type "System" --item_name "Version" --value "1.02"

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c EditDmiInfo --file

DMI.txt --shn SYVS --value "1.02"

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c EditDmiInfo --file

DMI.txt --shn SYVS --default

In-Band:

[SUM_HOME]# ./sum -c EditDmiInfo --file DMI.txt --shn SYVS --value 1.01

Remote In-Band:

[SUM_HOME]# ./sum -I Remote_INB --oi 192.168.34.56 --ou root --op 111111 -c

EditDmiInfo --file DMI.txt --shn SYVS --value 1.01 --remote_sum /root/sum

5.3.10 Updating DMI Information

1. Follow the steps in 5.3.9 Editing DMI Information to prepare the edited DMI.txt file for updating DMI
information.
2. Use the “ChangeDmiInfo” command with the edited DMI.txt file to run SUM to update the DMI
information.

Notes:

• The supported editable DMI items may be changed for different BIOS versions. The
version variable of the DMI.txt file must be the same as that from the managed system
and should not be edited.

Supermicro Update Manager User’s Guide 243


• The uploaded information will only take effect after a system reboots or powers up.

OOB and In-Band Syntax:

sum [-i <IP or host name> -u <username> -p <password>] -c ChangeDmiInfo --file

<DMI.txt> [--reboot]

Remote In-Band Syntax:

sum -I Remote_INB --oi <OS IP address> --ou <OS username> [--op <OS password> |

--os_key <OS private key> --os_key_pw <OS private key password>] -c

ChangeDmiInfo --file <DMI.txt> [--reboot] [--remote_sum <remote sum path>]

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c ChangeDmiInfo --file

DMI.txt --reboot

In-Band:

[SUM_HOME]# ./sum -c ChangeDmiInfo --file DMI.txt --reboot

Remote In-Band:

[SUM_HOME]# ./sum -I Remote_INB --oi 192.168.34.56 --ou root --op 111111 -c

ChangeDmiInfo --file DMI.txt --reboot

Supermicro Update Manager User’s Guide 244


5.3.11 Setting Up BIOS Action

Use the “SetBiosAction” command to execute SUM to show or hide the settings related to BBS priority.

Note: The uploaded configurations will take effect only after the system is rebooted or
powered up.

Syntax:

sum [-i <IP or host name> -u <username> -p <password>] -c SetBiosAction --BBS

<yes/no> [--reboot]

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c SetBiosAction --BBS

yes --reboot

In-Band:

[SUM_HOME]# ./sum -c SetBiosAction --BBS no --reboot

Supermicro Update Manager User’s Guide 245


5.3.12 Setting Up a BIOS Administrator Password

Use the “SetBiosPassword” command to execute SUM to update the BIOS Administrator password.

OOB and In-Band Syntax:

sum [-i <IP or host name> -u <username> -p <password>] -c SetBiosPassword [[--

current_password <current password>] | [--cur_pw_file <current password file

path>]] [[--new_password <new password> --confirm_password <confirm password>] |

[--pw_file <password file path>]] [--reboot]

Remote In-Band Syntax:

sum -I Remote_INB --oi <OS IP address> --ou <OS username> [--op <OS password> |

--os_key <OS private key> --os_key_pw <OS private key password>] -c

SetBiosPassword [[--current_password <current password>] | [--cur_pw_file

<current password file path>]] [[--new_password <new password> --

confirm_password <confirm password>] | [--pw_file <password file path>]] [--

reboot] [--remote_sum <remote sum path>]

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c SetBiosPassword

--new_password 123456 --confirm_password 123456 --current_password 654321 --

reboot

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c SetBiosPassword

--pw_file passwd.txt --reboot

In-Band:

[SUM_HOME]# ./sum -c SetBiosPassword --new_password 123456 --confirm_password

123456 --reboot

[SUM_HOME]# ./sum -c SetBiosPassword --pw_file passwd.txt --cur_file

cur_passwd.txt --reboot

Supermicro Update Manager User’s Guide 246


passwd.txt:

BiosPassword

cur_passwd.txt

CurBiosPassword

Remote In-Band:

[SUM_HOME]# ./sum -I Remote_INB --oi 192.168.34.56 --ou root --op 111111 -c

SetBiosPassword --new_password 123456 --confirm_password 123456 --reboot --

remote_sum /root/sum

[SUM_HOME]# ./sum -I Remote_INB --oi 192.168.34.56 --ou root --op 111111 -c

SetBiosPassword --pw_file passwd.txt --cur_file cur_passwd.txt --reboot --

remote_sum /root/sum

passwd.txt:

BiosPassword

cur_passwd.txt

CurBiosPassword

Supermicro Update Manager User’s Guide 247


Notes:

 The OA keys will be erased only after the system is rebooted or powered up.
 OOB and multi-OOB usages are only available on X12/H12 and later platforms if BMC
support is also present.

Supermicro Update Manager User’s Guide 248


5.3.13 Erasing the BIOS OA Key

Use the “EraseOAKey” command to execute SUM to erase the BIOS OA key.

Notes:

 The OA keys will be erased only after the system is rebooted or powered up.
 This command only supports in-band usage.

In-Band Syntax:

sum -c EraseOAKey [--reboot]

Remote In-Band Syntax:

sum -I Remote_INB --oi <OS IP address> --ou <OS username> [--op <OS password> |

--os_key <OS private key> --os_key_pw <OS private key password>] -c EraseOAKey

[--reboot] [--remote_sum <remote sum path>]

Example:

In-Band:

[SUM_HOME]# ./sum -c EraseOAKey --reboot

Remote In-Band:

[SUM_HOME]# ./sum -I Remote_INB --oi 192.168.34.56 --ou root --op 111111 -c

EraseOAKey --reboot --remote_sum /root/sum

Supermicro Update Manager User’s Guide 249


5.3.14 Managing BIOS RoT Functions

The “BiosRotManage” command supports the following features on RoT systems of X12 and later platforms:

• Getting Information on BIOS


Use the “BiosRotManage” command with the “--action GetInfo” option to retrieve information on
active BIOS, backed-up BIOS and Golden BIOS.
• Updating the Golden BIOS Image
Use the “BiosRotManage” command with the “--action UpdateGolden” option to replace the golden
image with an active BIOS image.
• Recovering BIOS
Use the “BiosRotManage” command with the “--action Recover” option to recover BIOS from the
backup image or the golden image. By priority, the managed system recovers BIOS from the backup
image. If the backup image is corrupted, it will then try to recover from the golden image.
• Downloading BIOS Evidence
Use the “BiosRotManage” command with the “--action DownloadEvidence” option to download BIOS
evidence.

Notes:

 To perform the “UpdateGolden” or “Recover” actions, it is necessary to power off the


system and use the --reboot option.
 Use the “GetMaintenEventLog” command to check the results after the system is
powered on. For details, see 5.5.3 Getting System Maintenance Event Log.
 To execute the “Recover” and “DownloadEvidence” commands, the SFT-DCMS-SINGLE
license is required.
 This command is supported by OOB use and in-band usage is restricted to the Redfish
host interface only.
 The “DownloadEvidence” action is only available after automatic or manual BIOS
recovery.
 The BIOS evidence is a compressed gzip file.
OOB and In-Band Syntax:

sum [-i <IP or host name> | -I Redfish_HI] -u <username> -p <password> -c

BiosRotManage --action <action> [--file <evidence.bin.gz>] [--overwrite] [--

reboot]

Supermicro Update Manager User’s Guide 250


Remote In-Band Syntax:

sum -I Remote_RHI -u <username> -p <password> --oi <OS IP address> --ou <OS

username> [--op <OS password> | --os_key <OS private key> --os_key_pw <OS

private key password>] -c BiosRotManage --action <action> [--file

<evidence.bin.gz>] [--overwrite] [--reboot] [--remote_sum <remote sum path>]

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c BiosRotManage --

action UpdateGolden --reboot

The console output contains the following information.

.....

Note: System will be powered off shortly to continue the process. Please wait

for thesystem to power on again, then check the Maintenance Event log for

results.

Warning: Please wait for the system to power on again. Do not remove AC power

before the system reboots.

..................................................

..................................................

..................................................

.............

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c BiosRotManage --

action DownloadEvidence --file evidence.bin.gz

The console output contains the following information.

.....

Start generating BIOS evidence.

Supermicro Update Manager User’s Guide 251


....................Done

Start downloading BIOS evidence............Done

BIOS evidence file "evidence.bin.gz" is created.

In-Band through Redfish Host Interface:

[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p PASSWORD -c BiosRotManage --action

GetInfo

The console output contains the following information.

Managed system...........169.254.3.254

BIOS build date................2020/06/08

Backup BIOS build date.........2020/05/05

Golden BIOS build date.........2020/06/08

Remote In-Band through Redfish Host Interface:

[SUM_HOME]# ./sum -I Remote_RHI -u ADMIN -p PASSWORD --oi 192.168.34.56 --ou

root --op 111111 -c BiosRotManage --action GetInfo --remote_sum /root/sum

The console output contains the following information.

Supermicro Update Manager (for UEFI BIOS) 2.10.0 (2022/11/09) (x86_64)

Copyright(C) 2013-2022 Super Micro Computer, Inc. All rights reserved.

Start Remote In-Band execution on 192.168.34.56:

================================================================================

Supermicro Update Manager (for UEFI BIOS) 2.10.0 (2022/11/07) (x86_64)

Copyright(C) 2013-2022 Super Micro Computer, Inc. All rights reserved.

Managed system.....................192.168.34.57

BIOS build date................2022/10/24 Ver 1.0a

Supermicro Update Manager User’s Guide 252


Backup BIOS build date.........2022/10/24 Ver 1.0a

Golden BIOS build date.........2022/10/24 Ver 1.0a

================================================================================

Getting file 'remote_inband/2022-11-09_13-37-10_192.168.34.56/sum.log' from

'/root/sum_remote_inband/2022-11-09_13-37-05/sum.log' on 192.168.34.56.

End Remote In-Band execution on 192.168.34.56.

Supermicro Update Manager User’s Guide 253


5.3.15 Managing Seamless Update Capsule File

On Seamless-supported platforms, BIOS firmware image format is a combination of many parts of capsule
block. With the Seamless Update feature, you can update only one or some parts of capsule block
seamlessly, without the complete updating process.

Notes:

 Seamless Update feature only supported on X13 RoT platform or later.


 This command is only available on SUM 2.9.0 or later.

• Seamless Update Feature in UpdateBios Command

OOB and In-Band Syntax:

sum <-i <IP or host name> | -I Redfish_HI> -u <username> -p <password> -c

UpdateBios --file <CAPSULE_FILE.bin> [--staged update] [--reboot] [--

post_complete]

Remote In-Band Syntax:

sum -I Remote_RHI -u <username> -p <password> --oi <OS IP address> --ou <OS

username> [--op <OS password> | --os_key <OS private key> --os_key_pw <OS

private key password>] -c UpdateBios --file <CAPSULE_FILE.bin> [--staged update]

[--reboot] [--post_complete] [--remote_sum <remote sum path>]

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c UpdateBios --file

CAPSULE_FILE.bin --reboot --post_complete

In-Band:

[SUM_HOME]# ./sum -I Redfish_HI -c UpdateBios --file CAPSULE_FILE.bin

Remote In-Band:
Supermicro Update Manager User’s Guide 254
[SUM_HOME]# ./sum -I Remote_RHI -u ADMIN -p PASSWORD --oi 192.168.34.56 --ou

root --op 111111 -c UpdateBios --file CAPSULE_FILE.bin --remote_sum /root/sum

Updating a capsule file employs the same command as updating a full BIOS file. There are certain rules to
keep in mind while using this function:

1. There is anti-rollback mechanism to prevent users from downgrading capsule files based on the
package versions.
2. If users see the “layout ID mismatch” error message, it means that users need to update the full BIOS
image that has the same layout ID with the desired capsule to update into the motherboard.
3. If users see the “Invalid Capsule file” error message, users need to get the correct capsule file
designed for that specific platform type, such as: capsule designed for X13 can’t be used on other
platforms.
4. Some options will be ignored when updating a capsule file, including --backup, --preserve_setting, --
flash_smbios, --erase_OA_key, --clear_password, --erase_secure_boot_key, and --reset_boot_option.

• Getting capsule information in GetBiosInfo command

OOB and In-Band Syntax:

sum <-i <IP or host name> | -I Redfish_HI> -u <username> -p <password> -u

<username> -p <password> -c GetBiosInfo --file <CAPSULE_FILE.bin> [--showall]

Remote In-Band Syntax:

sum -I Remote_RHI -u <username> -p <password> --oi <OS IP address> --ou <OS

username> [--op <OS password> | --os_key <OS private key> --os_key_pw <OS

private key password>] -c GetBiosInfo --file <CAPSULE_FILE.bin> [--showall]

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c GetBiosInfo --file

CAPSULE_FILE.bin --showall

Supermicro Update Manager User’s Guide 255


In-Band:

[SUM_HOME]# ./sum -I Redfish_HI -c GetBiosInfo --file CAPSULE_FILE.bin

Remote In-Band:

[SUM_HOME]# ./sum -I Remote_INB --oi 192.168.34.56 --ou root --op 111111 -c

GetBiosInfo --file CAPSULE_FILE.bin

Remote In-Band through Redfish Host Interface:

[SUM_HOME]# ./sum -I Remote_RHI -u ADMIN -p ADMIN --oi 192.168.34.56 --ou root -

-op 111111 -c GetBiosInfo --file CAPSULE_FILE.bin

You can get capsule information using GetBiosInfo command with input capsule file. Besides, when
motherboard support Seamless Update (X13 or later platform), you can also get all the capsule blocks
information on managed system by using the --showall option. You can have some variation outputs
by:

1. Executing the GetBiosInfo command with the --file CAPSULE_FILE.bin --file_only options will show
capsule information of the local file.
2. Executing the GetBiosInfo command with the --file BIOS_FILE.bin --showall --file_only options will
show all the capsule information supported by the current local BIOS file.
3. Executing the GetBiosInfo command in OOB or in-band Redfish_HI mode with the --file CAPSULE
_FILE.bin option on the managed system should show the corresponding capsule information on
managed system.
4. Executing the GetBiosInfo command in OOB or in-band Redfish_HI mode with the --showall option on
the managed system should show all types of capsule information supported by managed system.

Supermicro Update Manager User’s Guide 256


5.3.16 Getting SCP Firmware Image Information

Use the “GetScpInfo” command to get the System Control Processor (SCP) firmware image information
from the managed system.

Syntax:

sum [[-i <IP or host name> | -I Redfish_HI] -u <username> -p <password>] -c

GetScpInfo

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c GetScpInfo

The console output contains the following information.

Managed system..........................192.168.34.56

SCP version.....................2.0a

In-Band:

[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p ADMIN -c GetScpInfo

The console output contains the following information.

Managed system..........................169.254.3.254

SCP version.....................2.0a

Supermicro Update Manager User’s Guide 257


5.3.17 Updating the SCP Firmware Image

Use the “UpdateScp” command with SCP firmware image scp_image.tar to run SUM to update the
managed system.

Notes:

 BMC only accepts the tar firmware file for SCP firmware updates. To create a .tar
firmware image, refer to the Appendix L.2 Ampere SCP Firmware Updating Tar File for
OpenBMC.
 When using an SSH connection to run the UpdateScp in-band command, the SSH
timeout on both client and server side should be adjusted to avoid a broken pipe during
command execution. Typical execution time is within 30 minutes. Timeout value should
be longer than 30 minutes.
 SCP can only be updated while the system is powered off. In this case, the --reboot
option is required. Therefore, for in-band SCP updates, SUM will power off the system
after uploading an SCP image to start the update process. The system will be powered
on automatically after the SCP update is completed.
 In-band SCP updates can only be done through the Redfish Host Interface. For details,
refer to 4.10 Redfish Host Interface.

Syntax:

sum [[-i <IP or host name> | -I Redfish_HI] -u <username> -p <password>] -c

UpdateScp --file <filename> --reboot

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c UpdateScp --file

scp_image.tar --reboot

The console output contains the following information.

Managed system.....................192.168.34.56

SCP FW version.................2.0a

Local SCP image file...............scp_image.tar

Status: Start updating SCP for 192.168.34.56

Supermicro Update Manager User’s Guide 258


************************************WARNING*************************************

Do not remove AC power from the server.

********************************************************************************

Powering off target system............Done

Uploading FW...Done

Updating FW.....................................................

............Done

Powering up target system............Done

Status: SCP is updated for 192.168.34.56

In-Band:

[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p PASSWORD -c UpdateScp --file

scp_image.tar --reboot

The console output contains the following information.

Managed system.....................169.254.3.254

SCP FW version.................2.0a

Local SCP image file...............scp_image.tar

Status: Start updating SCP for 169.254.3.254

************************************WARNING*************************************

Do not remove AC power from the server.

********************************************************************************

Uploading FW...Done

Supermicro Update Manager User’s Guide 259


Note: System will be powered off shortly to continue the update process.

Warning: Please wait for the system to power on again. This may take several

minutes. Do not remove AC power before system reboot.

Supermicro Update Manager User’s Guide 260


5.3.18 Getting Fixed Boot Setting
Use the “GetFixedBootCfg” command to get the fixed boot order configuration of the managed system.

Note: The Get Fixed Boot Configuration command only supports X13 platforms or later.

OOB and In-Band Syntax:

sum [[-i <IP or host name> | -I Redfish_HI] -u <username> -p <password>] -c

GetFixedBootCfg [--file <filename>] [--overwrite] --redfish

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p ADMIN -c GetFixedBootCfg

--redfish --file FixedBootCfg.xml --overwrite

In-Band:

[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p ADMIN -c GetFixedBootCfg --redfish

--file FixedBootCfg.xml --overwrite

Supermicro Update Manager User’s Guide 261


5.3.19 Updating the Fixed Boot Setting

1. Follow the steps in 5.3.18 Getting Fixed Boot Setting.

2. Edit the item/variable values in the user setup text file USER_SETUP.file to the desired values as
illustrated in 4.15 Fixed Boot Configuration XML File Format.

3. Use the “ChangeFixedBootCfg” command with the updated file USER_SETUP.file to run SUM to update
the Fixed Boot configuration.

Notes:

• Unchanged settings can be deleted to skip the update.


• The XML version line and the <FixedBootCfg> should not be deleted.
• The On/Off boot device can be modified in the <xxxxxBBSPriorities> <setting> menu,
but if the boot device is on the boot order list you cannot disable it. You need to
change the BBSPriorities for the device and then you can disable it in the menu
<xxxxxBBSPriorities> <setting>.
• If more than one device is listed on the menu <xxxxxBBSPriorities> <setting>, you can
change the order to change the boot order list. For example, two UEFINetwork devices
in the “UefiNetworkBBSPriorities” menu change their orders after the "Fixed Boot
Order" menu in the <setting selectedOption=UEFI Network> option shows the device of
first priority that you change in the “UefiNetworkBBSPriorities” menu. But you cannot
change UEFI Network display device in the"Fixed Boot Order" menu directly.
• The change will take effect after the managed system is rebooted.

Syntax:
sum [-i <IP or host name>| -I Redfish_HI -u <username> -p <password>] -c

ChangeFixedBootCfg --file <USER_SETUP.file> [--reboot] --redfish

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c ChangeFixedBootCfg --

file USER_SETUP.file --redfish --reboot

In-Band:

Supermicro Update Manager User’s Guide 262


[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p ADMIN -c ChangeFixedBootCfg --

redfish --file USER_SETUP.file --reboot

Supermicro Update Manager User’s Guide 263


5.3.20 Managing Secure Boot

Use the “SecureBootManage” command to manage secure boot. This command can be used to get or set
secure the boot status to “Enabled/Disabled,” and it can be also used to upload or delete secure boot keys.

• Getting secure boot status


Use the “SecureBootManage” command with the “--action Status” option to get system secure boot
status from BMC Redfish API.
• Setting secure boot status
Use the “SecureBootManage” command with the “--action Enable/Disable” option to set system
secure boot pending status through BMC Redfish API. This requires a system reboot to take effect.
• Showing databases
Use the “SecureBootManage” command with the “--action ShowDatabases” option and “--file_type ”
option to get the information of specified system secure boot keys through BMC Redfish API.
Without “--file_type ” option, it will show the number of all system secure boot keys.
• Uploading certificate:
Use the “SecureBootManage” command with the “--action UploadCertificate” option, “--file_type ”
option and “--file” option to upload system secure boot key through BMC Redfish API.
• Reseting all keys to default
Use the “SecureBootManage” command with the “--action ResetAllKeysToDefault” option to reset all
system secure boot keys to default through BMC Redfish API.
• Deleting all keys
Use the “SecureBootManage” command with the “--action DeleteAllKeys” option to delete all keys of
system secure boot through BMC Redfish API.
• Deleting PK
Use the “SecureBootManage” command with the “--action DeletePK” option to delete PK of system
secure boot through BMC Redfish API.

Supermicro Update Manager User’s Guide 264


Notes:

 This command is only available on X13/H13 and later platforms.


 2020.3 Redfish schema.
 The SFT-DCMS-SINGLE license is required.
 This command is only available for Redfish usage.
 You have to reboot or power up the system for the BIOS changes to take effect.
 The argument of “--file_type” option is “PK,” “KEK,” “db,” “dbr,” “dbt” or “dbx” (case
sensitive).
 The “--file” option” only supports PEM files.

OOB and In-Band Syntax:

sum [-i <IP or host name> | -I Redfish_HI] -u <username> -p <password> -c

SecureBootManage --redfish --action <action> [--file_type <file type>] [--file

<CertificateFile>] [--reboot [--post_complete]]

Remote In-Band Syntax:

sum -I Remote_RHI -u <username> -p <password> --oi <OS IP address> --ou <OS

username> [--op <OS password> | --os_key <OS private key> --os_key_pw <OS

private key password>] -c SecureBootManage --redfish --action <action> [--

file_type <file type>] [--file <CertificateFile>] [--reboot [--post_complete]]

[--remote_sum <remote sum path>]

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c SecureBootManage --

redfish --action Enable

The console output contains the following information.

....

Status: Secure boot has already been enabled.

Supermicro Update Manager User’s Guide 265


Note: You have to reboot or power up the system for the BIOS changes to take

effect.

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c SecureBootManage --

redfish --action UploadCertificate --file_type KEK --file CertificateFile.pem

The console output contains the following information.

Status: Certificate has already been uploaded.

Note: You have to reboot or power up the system for the BIOS changes to take

effect

In-Band:

[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p PASSWORD -c SecureBootManage --

redfish --action ShowDatabases

The console output contains the following information.

.......

Managed system............................10.184.16.102
Number of Platform Keys(PK)...........1
Number of Key Exchange Keys(KEK)......0
Number of Authorized Signatures(db)...0
Number of OS Recovery Signatures(dbr).0
Number of Authorized Timestamps(dbt)..0
Number of Forbidden Signatures(dbx)...0

Remote In-Band through Redfish Host Interface:

[SUM_HOME]# ./sum -I Remote_RHI -u ADMIN -p PASSWORD --oi 192.168.34.56 --ou

root --op 111111 -c BiosRotManage --action GetInfo --remote_sum /root/sum

The console output contains the following information.

Supermicro Update Manager (for UEFI BIOS) 2.11.0 (2023/04/12) (x86_64)

Copyright(C) 2013-2023 Super Micro Computer, Inc. All rights reserved.


Supermicro Update Manager User’s Guide 266
Start Remote In-Band execution on 192.168.34.56:

================================================================================

Supermicro Update Manager (for UEFI BIOS) 2.11.0 (2023/04/12) (x86_64)

Copyright(C) 2013-2023 Super Micro Computer, Inc. All rights reserved.

....

Managed system................192.168.34.57

Secure boot status........Disabled

================================================================================

Getting file 'remote_inband/2023-04-12_13-37-10_192.168.34.56/sum.log' from

'/root/sum_remote_inband/2023-04-12_13-37-05/sum.log' on 192.168.34.56.

End Remote In-Band execution on 192.168.34.56.

Supermicro Update Manager User’s Guide 267


5.4 BMC Management for a Single System
5.4.1 Getting BMC Firmware Image Information

Use the “GetBmcInfo” command to get the BMC firmware image information from the managed system as
well as the BMC firmware image.

OOB and In-Band Syntax:

sum [[-i <IP or host name> | -I Redfish_HI] -u <username> -p <password>] -c

GetBmcInfo [--file <filename> [--file_only] [--extract_measurement]

Remote In-Band Syntax:

sum [-I Remote_INB | -I Remote_RHI -u <username> -p <password>] --oi <OS IP

address> --ou <OS username> [--op <OS password> | --os_key <OS private key> --

os_key_pw <OS private key password>] -c GetBmcInfo [--file <filename> [--

file_only] [--extract_measurement] [--remote_sum <remote sum path>]

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c GetBmcInfo --file

Supermicro_BMC.rom

In-Band:

[SUM_HOME]# ./sum -c GetBmcInfo --file Supermicro_BMC.rom

The console output contains the following information when the local BMC image is non-RoT signed.

Managed system............localhost

BMC type..............X11_ATEN_AST2500_2

BMC version...........12.63.00

BMC ext. version......01 00 00

Local BMC image file......Supermicro_BMC.rom

BMC type..............X11_ATEN_AST2500_2
Supermicro Update Manager User’s Guide 268
BMC version...........12.63.00

FW image..............Signed

Signed Key........NonRoT

[SUM_HOME]# ./sum -c GetBmcInfo --file Supermicro_ROT_BMC.rom --file_only

The console output contains the following information when the local BMC image is RoT signed.
Local BMC image file...... Supermicro_ROT_BMC.rom

BMC UFFN..............BMC_X12AST2600-ROT-5201MS_20210317_01.00.00_STDsp.bin

BMC type..............X12_RoT_ATEN_AST2600

BMC version...........01.00.00

FW image..............Signed

Signed Key........RoT

[SUM_HOME]# ./sum -c GetBmcInfo --file Supermicro_ROT_BMC.rom --file_only --

extract_measurement

The console output contains the following information.

Local BMC image file.....BMC_X12AST2600-ROT-6202MS_20220624_01.02.33_STDsd.bin

BMC UFFN.............BMC_X12AST2600-ROT-6202MS_20220624_01.02.33_STDsd.bin

BMC type.............X12_RoT_ATEN_AST2600_2

BMC version..........01.02.33

BMC build date.......2022/06/24

FW image.............Signed

Signed Key.......RoT

Measurement......CE772709B937E6F256A09B9CEDFB9F7F4195B19143543964FD00C90

0BD73F1F36743724B34392B06D4D1D5542CFA0619C32AF960B93A3973A4F2101762A8698D

[SUM_HOME]# ./sum -c GetBmcInfo --file Supermicro ROT BMC.rom --showall

The console output contains the following information.

Local BMC image file..... BMC_X12AST2600-ROT-5201MS_20230204_09.20.72_BETsp.bin

BMC UFFN.............BMC_X12AST2600-ROT-5201MS_20230204_09.20.72_BETsp.bin

BMC type.............X12_RoT_ATEN_AST2600

Supermicro Update Manager User’s Guide 269


BMC version..........09.20.72

BMC ext. version.....11 00 00 (beta_P)

BMC build date.......2023/02/04

BMC last reset time..2023-03-22T08:20:04Z

Remote In-Band:

[SUM_HOME]# ./sum -I Remote_INB --oi 192.168.34.57 --ou root --op 111111 -c

GetBmcInfo --file Supermicro_BMC.rom

Remote In-Band through Redfish Host Interface:

[SUM_HOME]# ./sum -I Remote_RHI -u ADMIN -p PASSWORD --oi 192.168.34.57 --ou

root --op 111111 -c GetBmcInfo --file Supermicro_BMC.rom

The console output contains the following information when the local BMC image is non-RoT signed.

Supermicro Update Manager (for UEFI BIOS) 2.10.0 (2022/11/02) (x86_64)

Copyright(C) 2013-2022 Super Micro Computer, Inc. All rights reserved.

Start Remote In-Band execution on 192.168.34.57:

================================================================================

Supermicro Update Manager (for UEFI BIOS) 2.10.0 (2022/11/02) (x86_64)

Copyright(C) 2013-2022 Super Micro Computer, Inc. All rights reserved.

Managed system............localhost

BMC type..............X11_ATEN_AST2500_2

BMC version...........12.63.00

BMC ext. version......01 00 00

Local BMC image file......Supermicro_BMC.rom

BMC type..............X11_ATEN_AST2500_2

BMC version...........12.63.00

FW image..............Signed

Signed Key........NonRoT

================================================================================

Supermicro Update Manager User’s Guide 270


Getting file 'remote_inband/2022-11-03_17-38-55_192.168.34.57/sum.log' from

'/root/sum_remote_inband/2022-11-03_17-37-49/sum.log' on 192.168.34.57.

End Remote In-Band execution on 192.168.34.57.

Non-RoT signed key of a local BMC image displays the following information:

Type Description
Signed The key is signed by Super Micro Computer, Inc.
Signed(U) The key is NOT signed by Super Micro Computer, Inc., but by an unknown
authority.
Verification failed The signed information in the image cannot be verified, because the image is
corrupted or incomplete.
(Not shown) The “FW image” field is not shown because of no signed information in the
image.
RoT-signed key of a local BMC image displays the following information:

Type Description
Signed RoT is signed by Super Micro Computer, Inc.
Signed(C) RoT is verified by the specified certificate.
Signed(U) RoT is NOT signed by Super Micro Computer, Inc. but by an unknown
authority.
Verification failed The RoT signing in the image cannot be verified because the image is
corrupted or incomplete.

Note: For the platforms after X11 Intel® Xeon® Scalable Processors with Intel® C620 Series
Chipsets, three-digit version numbers of BMC are supported.

Supermicro Update Manager User’s Guide 271


5.4.2 Updating the BMC Firmware Image

Use the “UpdateBmc” command with BMC firmware image Supermicro_BMC.rom or bmc_image.tar for
OpenBMC to run SUM to update the managed system.

Notes:

 BMC will be reset after updating.


 BMC configurations will be preserved by default after updating unless --overwrite_cfg
option is used.
 DO NOT flash BIOS and BMC firmware images at the same time.
 The “UpdateBmc” command does not support AMI BMC FW. For OOB “UpdateBmc”
usage, please use SUM version 1.4.2.
 The --overwrite_cfg option overwrites the current BMC configuration using the factory
default values in the given BMC image file.
 The --overwrite_sdr option overwrites current BMC SDR data. For AMI BMC FW, it is
also required to use the --overwrite_cfg option.
 Signed BMC update is supported.
 For X12/H12 and later platforms except H12 non-RoT systems, in-band update BMC can
only be done through Redfish Host Interface. For details, refer to 4.10 Redfish Host
Interface.
 The --backup option backs up the current BMC image on the managed system, not the
BMC file updated to the managed system.
 The --backup option only supported by the X12/H12 and later RoT platforms.
 The --skip_unknown option is designed to skip all invalid tables and settings in the latest
BMC configuration in the managed system.
 For details on updating BMC firmware with preservation of BMC settings, please refer to
5.4.2.1 Updating BMC Firmware with BMC Settings Preservation.

OOB and In-Band Syntax:

sum [[-i <IP or host name> | -I Redfish_HI] -u <username> -p <password>] -c

UpdateBmc --file <filename> [--overwrite_cfg] [--overwrite_sdr] [--backup] [--

forward] [--overwrite_ssl]

Remote In-Band Syntax:

sum [-I Remote_INB | -I Remote_RHI -u <username> -p <password>] --oi <OS IP

address> --ou <OS username> [--op <OS password> | --os_key <OS private key> --

Supermicro Update Manager User’s Guide 272


os_key_pw <OS private key password>] -c UpdateBmc --file <filename> [--

overwrite_cfg] [--overwrite_sdr] [--backup] [--forward] [--overwrite_ssl] [--

remote_sum <remote sum path>]

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c UpdateBmc --file

Supermicro_BMC.rom

In-Band:

[SUM_HOME]# ./sum -c UpdateBmc --file Supermicro_BMC.rom

[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p PASSWORD -c UpdateBmc --file

Supermicro_BMC.rom

Remote In-Band:

[SUM_HOME]# ./sum -I Remote_INB --oi 192.168.34.56 --ou root --op 111111 -c

UpdateBmc --file Supermicro_BMC.rom

5.4.2.1 Updating BMC Firmware with Preservation of BMC Settings

To update BMC firmware with preservation of settings and avoid setting backward compatibility, follow
these steps.

1. Update the BMC to the latest firmware while preserving the BMC configuration. By default, when the
UpdateBmc command is executed without the --overwrite_cfg option, the BMC configurations are
preserved.
Command Mode Command Usage

Inband ./sum -c UpdateBmc --file bmc.bin

OOB ./sum -i <BMC IP> -u <BMC username> -p <BMC password> -c UpdateBmc --file
bmc.bin

Supermicro Update Manager User’s Guide 273


2. Dump NEW BMC configuration after the BMC firmware is updated.
Command Mode Command Usage

Inband ./sum -c GetBmcCfg --file bmccfg.xml --overwrite

OOB ./sum -i <BMC IP> -u <BMC username> -p <BMC password> -c GetBmcCfg --file
bmccfg.xml --overwrite

3. Modify the BMC configuration file.

Supermicro Update Manager User’s Guide 274


For example, modify the field <LanInterface> under <LAN> table from "Failover" to "Dedicated" in BMC
configuration file.

4. Change the BMC configuration with the modified configuration file.


Command Mode Command Usage

Inband ./sum -c ChangeBmcCfg --file bmccfg.xml --overwrite

OOB ./sum -i <BMC IP> -u <BMC username> -p <BMC password> -c ChangeBmcCfg --


file bmccfg.xml

Supermicro Update Manager User’s Guide 275


5.4.3 Getting BMC Settings

Use the “GetBmcCfg” command to execute SUM to get the current BMC settings from the managed system
and save it in the BMCCfg.xml file or save it in the BMCCfg.bin file by the “--dump” option.

Notes:
• Received tables/elements might not be identical between two managed systems. Only
supported tables/elements for the managed system will be received.
• For in-band and OOB usages, note that the file formats for getting BMC settings may be
different. Be careful not to misuse them.
• SUM gets/changes syslog table in BMC configuration through HTTPS so that syslog
information in BMC configuration will be lost if HTTPS is disabled.
• For OOB operation, if BMC supports the account lockout configuration, the <Account>
table will replace the <UserManagement> table.
• Since SUM 2.12.0, SUM supports pure Redfish LAN table in BMC configuration. For more
details, refer to 4.6.1 Pure Redfish LAN Table in BMC Configuration.

OOB and In-Band Syntax:

sum [-i <IP or host name> -u <username> -p <password>] -c GetBmcCfg --file

<BMCCfg.xml|BMCCfg.bin> [--dump] [--overwrite]

Remote In-Band Syntax:

sum -I Remote_INB --oi <OS IP address> --ou <OS username> [--op <OS password> |

--os_key <OS private key> --os_key_pw <OS private key password>] -c GetBmcCfg --

file <BMCCfg.xml|BMCCfg.bin> [--dump] [--overwrite]

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c GetBmcCfg --file

BMCCfg.xml --overwrite

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c GetBmcCfg --file

BMCCfg.bin --dump --overwrite

In-Band:

Supermicro Update Manager User’s Guide 276


[SUM_HOME]# ./sum -c GetBmcCfg --file BMCCfg.xml --overwrite

[SUM_HOME]# ./sum -c GetBmcCfg --file BMCCfg.bin --dump --overwrite

Remote In-Band:

[SUM_HOME]# ./sum -I Remote_INB --oi 192.168.34.56 --ou root --op 111111 -c

GetBmcCfg --file BMCCfg.xml --overwrite

[SUM_HOME]# ./sum -I Remote_INB --oi 192.168.34.56 --ou root --op 111111 -c

GetBmcCfg --file BMCCfg.bin --dump --overwrite

5.4.3.1 Generating BMC Settings Format Based on Sample File

Configurations in BMC firmware can have various XML formats across different versions. To get the

configuration of an older BMC firmware from the managed system, use the GetBmcCfg command and
specify the table format with the “--sample_file” option.

The “--sample_file” option only supports for X13/H13 or later platforms.

Notes:

 The tables/elements received may vary between two managed systems. Only the
supported tables/elements for the managed system will be received.
 For in-band, Redfish host interface and OOB usages, note that the file formats for
getting BMC settings may be different. Ensure that the sample file source aligns with the
current command execution mode.
 When you use the –sample_file option, do not remove table fields in the sample file. If
the table version in the sample file cannot be recognized, the table will not be
generated.

OOB and In-Band Syntax:

sum [{-i <IP or host name> | -I Redfish_HI} -u <username> -p <password>] -c

GetBmcCfg --file <BMCCfg.xml> [--overwrite] [--sample_file <config_format.xml>]

Remote In-Band Syntax:

sum {-I Remote_INB | -I Remote_RHI -u <username> -p <password>} --oi <OS IP

address> --ou <OS username> [--op <OS password> | --os_key <OS private key> --

Supermicro Update Manager User’s Guide 277


os_key_pw <OS private key password>] -c GetBmcCfg --file <BMCCfg.xml> [--

overwrite] [--sample_file <config_format.xml>]

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c GetBmcCfg --file

BMCCfg.xml –overwrite --sample_file config_format.xml

In-Band:

[SUM_HOME]# ./sum -c GetBmcCfg --file BMCCfg.xml --overwrite --sample_file

config_format.xml

Remote In-Band:

[SUM_HOME]# ./sum -I Remote_INB --oi 192.168.34.56 --ou root --op 111111 -c

GetBmcCfg --file BMCCfg.xml --overwrite

[SUM_HOME]# ./sum -I Remote_INB --oi 192.168.34.56 --ou root --op 111111 -c

GetBmcCfg --file BMCCfg.xml --overwrite --sample_file config_format.xml

5.4.4 Updating BMC Settings

1. Follow the steps in 5.4.3 Getting BMC settings.


2. Edit the configurable element values in the BMC configuration text file BMCCfg.xml to the desired
values as illustrated in 4.6 Format of BMC Configuration Text File.
3. Skip unchanged tables in the text file by setting the Action attribute as “None” Note that this step is
optional.
4. Remove unchanged tables/elements in the text file. Note that this step is optional.

Use the “ChangeBmcCfg” command with the updated BMCCfg.xml file to run SUM to update the BMC
configuration or restore it with the BMCCfg.bin file by the "--restore" option.

OOB and In-Band Syntax:

Supermicro Update Manager User’s Guide 278


sum [-i <IP or host name> -u <username> -p <password>] -c ChangeBmcCfg --file

<BMCCfg.xml|BMCCfg.bin> [--restore]

Remote In-Band Syntax:

sum -I Remote_INB --oi <OS IP address> --ou <OS username> [--op <OS password> |

--os_key <OS private key> --os_key_pw <OS private key password>] -c ChangeBmcCfg

--file <BMCCfg.xml|BMCCfg.bin> [--restore]

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c ChangeBmcCfg --file

BMCCfg.xml

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c ChangeBmcCfg --file

BMCCfg.bin --restore

In-Band:

[SUM_HOME]# ./sum -c ChangeBmcCfg --file BMCCfg.xml

[SUM_HOME]# ./sum -c ChangeBmcCfg --file BMCCfg.bin --restore

Remote In-Band:

[SUM_HOME]# ./sum -I Remote_INB --oi 192.168.34.56 --ou root --op 111111 -c

ChangeBmcCfg --file BMCCfg.xml

[SUM_HOME]# ./sum -I Remote_INB --oi 192.168.34.56 --ou root --op 111111 -c

ChangeBmcCfg --file BMCCfg.bin --restore

Supermicro Update Manager User’s Guide 279


Notes: Pay attention to the following when modifying content inside the XML element
<LAN>.
• The connection could be broken if the LAN configuration is changed.
• For in-band operation, all data of the <Configurations> element inside the <LAN>
element is configurable.
• For OOB operation, if Redfish is not supported, all configurations inside the <LAN>
element are read only.
• For OOB operation, the configurations of the <DynamicIPv6> element and the
<StaticIPv6> element are read only.
• For OOB operation, if BMC supports the account lockout configuration, the <Account>
table will replace the <UserManagement> table.
• Since SUM 2.12.0, SUM supports pure Redfish LAN table in BMC configuration. For
more details, please refer to 4.6.1 Pure Redfish LAN Table in BMC Configuration.

5.4.5 Installing BMC Certification


To enhance security, SUM supports identity certification, which allows a user to upload a certification file
to the BMC. The example below shows how a certificate file and key should be set up in the BMC
configuration file.

<Certification Action="Change">

<!--Supported Action:None/Change-->

<Information>

<CertStartDate>Jul 27 00:00:00 2018 GMT</CertStartDate>

<CertEndDate>Jul 27 00:00:00 2021 GMT</CertEndDate>

</Information>

<Configuration>

<!--Configurations for BMC certifications-->

<CertFile>/home/test/cert.pem</CertFile>

<!--string value; path to file-->

Supermicro Update Manager User’s Guide 280


<PrivKeyFile>/home/test/key.pem</PrivKeyFile>

<!--string value; path to file-->

<!--BMC will be reset after uploading this file-->

</Configuration>

</Certification>

• To set the value in <CertFile></CertFile>


a file path(/home/test/) follow by a filename(cert.pem)
• To set the value in < PrivKeyFile ></ PrivKeyFile >
a file path(/home/test/) follow by a filename(key.pem)

Supermicro Update Manager User’s Guide 281


5.4.6 Setting Up a BMC User Password

Use the “SetBmcPassword” command to execute SUM to update BMC user password.

OOB and In-Band Syntax:

sum [-i <IP or host name> -u <username> -p <password>] -c SetBmcPassword

[--user_id <user ID>] [[--new_password <new password> --confirm_password

<confirm password>] | [--pw_file <password file path>]]

Remote In-Band Syntax:

sum -I Remote_INB --oi <OS IP address> --ou <OS username> [--op <OS password> |

--os_key <OS private key> --os_key_pw <OS private key password>] -c

SetBmcPassword [--user_id <user ID>] [[--new_password <new password> --

confirm_password <confirm password>] | [--pw_file <password file path>]] [--

remote_sum <remote sum path>]

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c SetBmcPassword

--user_id 3 --new_password 12345678 --confirm_password 12345678

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c SetBmcPassword

--pw_file passwd.txt

In-Band:

[SUM_HOME]# ./sum -c SetBmcPassword --new_password 12345678 --confirm_password

12345678

[SUM_HOME]# ./sum -c SetBmcPassword --user_id 3 --pw_file passwd.txt

passwd.txt:

BmcPasswordString

Supermicro Update Manager User’s Guide 282


Remote In-Band:

[SUM_HOME]# ./sum -I Remote_INB --oi 192.168.34.56 --ou root --op 111111 -c

SetBmcPassword --user_id 3 --pw_file passwd.txt

passwd.txt:

BmcPasswordString

Note: Without the --user_id option, the user ID is set to 2 (as Administrator) by default.

Supermicro Update Manager User’s Guide 283


5.4.7 Getting the BMC KCS Privilege Level

Use the “GetKcsPriv” command to execute SUM to get the current BMC KCS privilege level from the
managed system.

OOB and In-Band Syntax:

sum [-i <IP or host name> -u <username> -p <password>] -c GetKcsPriv

Remote In-Band Syntax:

sum -I Remote_INB --oi <OS IP address> --ou <OS username> [--op <OS password> |

--os_key <OS private key> --os_key_pw <OS private key password>] -c GetKcsPriv

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c GetKcsPriv

In-Band:

[SUM_HOME]# ./sum -c GetKcsPriv

Remote In-Band:

[SUM_HOME]# ./sum -I Remote_INB --oi 192.168.34.56 --ou root --op 111111 -c

GetKcsPriv

The console output contains the following information.

Managed system................192.168.34.56

KCS Privilege Level.......4 (Administrator)

Supermicro Update Manager User’s Guide 284


5.4.8 Setting the BMC KCS Privilege Level

Use the “SetKcsPriv” command to execute SUM to set the BMC KCS privilege level.

Syntax:

sum [-i <IP or host name> -u <username> -p <password>] -c SetKcsPriv --

priv_level <KCS privilege level>

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c SetKcsPriv

--priv_level ‘Call Back’

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c SetKcsPriv

--priv_level 1

Notes:

• SUM only supports the following KCS privileges: Call Back, User, Operator and
Administrator.
 This command only supports OOB usage.
 The BMC KCS privilege can be set through a numeric ID or a name.

Supermicro Update Manager User’s Guide 285


5.4.9 Loading Factory BMC Settings

Since November 2019, Supermicro has implemented a new security feature for the BMC firmware stack on
all new X10, X11, X12 H11, H12, and all future generation Supermicro products. Supermicro will no longer
use the default password “ADMIN” for new devices or systems. All such systems are shipped with a
“Unique Pre-Programmed Password” for user admin on every hardware device with BMC.

For more information about the implementation of a BMC unique password and how to locate it, please
refer to the BMC Unique Password Guide.

Use the “LoadDefaultBmcCfg” command to execute SUM to reset the BMC of the managed system to the
factory default. Allowed option combinations depend on the managed system state. Unsupported option
combinations will be denied.

Reset Reset Reset ADMIN Password


Network Users info FRU
Option: N N N Preserved
--preserve_user_cfg
Option: N Y N ADMIN
--clear_user_cfg with
--load_default_password
Option: N Y N Unique Password
--clear_user_cfg with
--load_unique_password

Syntax:

sum [-i <IP or host name> -u <username> -p <password>] -c LoadDefaultBmcCfg [--

preserve_user_cfg] [--clear_user_cfg [--load_unique_password | --

load_default_password]]

Remote In-Band Syntax:

sum -I Remote_INB --oi <OS IP address> --ou <OS username> [--op <OS password> |

--os_key <OS private key> --os_key_pw <OS private key password>] -c

LoadDefaultBmcCfg [--preserve_user_cfg] [--clear_user_cfg [--

load_unique_password | --load_default_password]] [--remote_sum <remote sum path>]

Supermicro Update Manager User’s Guide 286


OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c LoadDefaultBmcCfg --

preserve_user_cfg

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c LoadDefaultBmcCfg --

clear_user_cfg --load_unique_password

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c LoadDefaultBmcCfg --

clear_user_cfg --load_default_password

In-Band:

[SUM_HOME]# ./sum -c LoadDefaultBmcCfg --preserve_user_cfg [--reboot]

[SUM_HOME]# ./sum -c LoadDefaultBmcCfg --clear_user_cfg --load_unique_password

[--reboot]

[SUM_HOME]# ./sum -c LoadDefaultBmcCfg --clear_user_cfg --load_default_password

[--reboot]

Remote In-Band:

[SUM_HOME]# ./sum -I Remote_INB --oi 192.168.34.56 --ou root --op 111111 -c

LoadDefaultBmcCfg --preserve_user_cfg [--reboot]

Notes:

• The --load_unique_password option only supports systems installed with a BMC unique
password.
 This command will not reset any network settings.

Supermicro Update Manager User’s Guide 287


5.4.10 Acquiring the BMC System Lockdown Mode

When the System Lockdown Mode is enabled on a managed system, neither setting configurations nor
updating firmware is not allowed in this mode. To learn about the managed system status, use the
“GetLockdownMode” command.

OOB and In-Band Syntax:

sum [-i <IP or host name> -u <username> -p <password>] -c GetLockdownMode

Remote In-Band Syntax:

sum -I Remote_INB --oi <OS IP address> --ou <OS username> [--op <OS password> |

--os_key <OS private key> --os_key_pw <OS private key password>] -c

GetLockdownMode [--remote_sum <remote sum path>]

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c GetLockdownMode

The console output contains the following information.

Managed system................192.168.34.56

System Lockdown...........No

In-Band:

[SUM_HOME]# ./sum -c GetLockdownMode

Remote In-Band:

[SUM_HOME]# ./sum -I Remote_INB --oi 192.168.34.56 --ou root --op 111111 -c

GetLockdownMode

The console output contains the following information.

Managed system................localhost

Supermicro Update Manager User’s Guide 288


System Lockdown...........No

Supermicro Update Manager User’s Guide 289


5.4.11 Setting the BMC System in Lockdown Mode

Use the “SetLockdownMode” command to execute SUM to set the BMC system in Lockdown Mode.

Syntax:

sum [-i <IP or host name> -u <username> -p <password>] -c SetLockdownMode --lock

<yes/no> --reboot

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c SetLockdownMode

--lock <yes/no> --reboot

5.4.12 Managing BMC RoT Functions

The “BmcRotManage” command supports the following features on RoT systems of X12 and later
platforms:

• Getting Information on BMC


Use the “BmcRotManage” command with the “--action GetInfo” option to retrieve information on
active BMC, backed-up BMC and Golden BMC.
• Updating the Golden Image
Use the “BmcRotManage” command with the “--action UpdateGolden” option to replace the golden
image with an active BMC firmware.
• Recovering BMC
Use the “BmcRotManage” command with the “--action Recover” option to recover BMC from the
backup image or the golden image. By priority, the managed system recovers BMC from the backup
image. If the backup image is corrupted, it will then recover from the golden image.
• Downloading BMC Evidence:
Use the “BmcRotManage” command with the “--action DownloadEvidence” option to download BMC
evidence.

Supermicro Update Manager User’s Guide 290


Notes:

 BMC will be disconnected while updating the golden image and recovering the
firmware. Use the “GetMaintenEventLog” command to check the result afterwards.
For details, see 5.5.3 Getting System Maintenance Event Log.
 To execute the “Recover” and “DownloadEvidence” commands, the SFT-DCMS-SINGLE
license is required.
 This command is only available for OOB and in-band usages restricted to the Redfish
host interface.
 The “DownloadEvidence” action is only available after automatic or manual BMC
recovery.
 The BMC evidence is a compressed gzip file.

OOB and In-Band Syntax:

sum [-i <IP or host name> | -I Redfish_HI] -u <username> -p <password> -c

BmcRotManage --action <action> [--file <evidence.bin.gz>] [--overwrite]

Remote In-Band Syntax:

sum [-i <IP or host name> | -I Redfish_HI] -u <username> -p <password> -c

BmcRotManage --action <action> [--file <evidence.bin.gz>] [--overwrite] [--

remote_sum <remote sum path>]

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c BmcRotManage --action

GetInfo

The console output contains the following information.

Managed system.....................192.168.34.56

BMC version....................09.10.19

Backup BMC version.............00.10.08

Golden BMC version.............09.10.19

Supermicro Update Manager User’s Guide 291


[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c BmcRotManage --action

DownloadEvidence --file evidence.bin.gz

The console output contains the following information.

.....

Start generating BMC evidence.

....................Done

Start downloading BMC evidence............Done

BMC evidence file "evidence.bin.gz" is created.

In-Band:

[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p PASSWORD -c BmcRotManage --action

UpdateGolden

The console output contains the following information.

..........
Status: System is backing up current FW as golden image and BMC will be offline
for 6 minutes.
........................................
........................................
Done
Status: Please check Maintenance Event log for result.
Remote In-Band through Redfish Host Interface:

[SUM_HOME]# ./sum -I Remote_RHI -u ADMIN -p PASSWORD --oi 192.168.34.56 --ou

root --op 111111 -c BmcRotManage --action UpdateGolden

5.4.13 Setting the BMC Reset Counter

To set the BMC reset counter, use the “TimedBmcReset” command.

Supermicro Update Manager User’s Guide 292


OOB and In-Band Syntax:

sum [-i <IP or host name> -u <username> -p <password>] -c TimedBmcReset --delay

<BMC reset delay time> | --immediate

Remote In-Band Syntax:

sum -I Remote_INB --oi <OS IP address> --ou <OS username> [--op <OS password> |

--os_key <OS private key> --os_key_pw <OS private key password>] -c

TimedBmcReset --delay <BMC reset delay time> | --immediate

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c TimedBmcReset --delay

10

The console output contains the following information.

The BMC will be reset after 10 minute.

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c TimedBmcReset --

immediate

The console output contains the following information.

The BMC will be reset immediately.

In-Band:

[SUM_HOME]# ./sum -c TimeBmcReset --delay 20

Remote In-Band:

[SUM_HOME]# ./sum -I Remote_INB --oi 192.168.34.56 --ou root --op 111111 -c

TimeBmcReset --delay 20

Supermicro Update Manager User’s Guide 293


The console output contains the following information.

The BMC will be reset 20 minutes later.

Note: This command is not available on X12 and H12 RoT platforms.

Supermicro Update Manager User’s Guide 294


5.4.14 Managing Remote Attestation

As a security mechanism, remote attestation provides a digital signature and allows users to manage
measurement files on managed systems as well as local measurement files with confidence. A
measurement file is a collection of states of the managed system, such as firmware version, firmware
measurement, configuration data and hardware information. When a measurement file generated by
managed system, a digital signature will be signed with the managed system’s Device Attestation Key. Use
the “Attestation” command to manage these files, six functions can be used with this command as follows:

• Dumping Measurement Files


Use the “--action Dump” option to create and download a measurement file from the managed
system, then save it as a local measurement file.
o The --file option is optional for the Dump action. Without the --file option, the measurement file
will be saved with the same file name as that on the managed system. In Windows OS, the
character ‘:’ will be replaced by ‘-’ to save it in a valid filename.
o The --nonce option is available with the Dump action. Without the --nonce input, SUM will use
the current OS time of the manage system as the default nonce. When the managed system
generates measurement files, the nonce will be written into the files. Thus, whenever a
measurement file generates, the digital signature should not be reproduced if the managed
system states was not changed.

• Listing the Existing Measurement Files


Use the “--action List” option to list existing measurement files on the managed system.

• Downloading Existing Measurement Files


Use the “--action Download” option to download an existing measurement file on the managed
system.
o Use the --file option to specify the measurement file on managed system.

• Deleting Existing Measurement Files


Use the “--action Delete” option to delete an existing measurement file on the managed system.
o Use the --file option to specify the measurement file on managed system.
Supermicro Update Manager User’s Guide 295
• Getting Information from Local Measurement Files
Use the “--action GetInfo” option to get information from local measurement files.
o The GetInfo is only available for in-band usage and requires the --file and --file_only option.
o Both --item and --showall options are only available for the GetInfo action and cannot be used at
the same time.
o The --root_cert option is only available for the GetInfo action.
o The --extract_cert option is only available for the GetInfo action.

• Comparing managed system or local measurement file with a referenced measurement file
Use the “--action Compare” option to compare managed system status or local measurement file with
a referenced measurement file.
o The action Compare requires --ref option, use the --ref option to specify the local referenced
measurement file, the action Compare will dump a latest measurement from managed system
and compare it with the local referenced measurement file.
o Use the --file option to specify a local measurement file, the action Compare will compare the
local measurement file with the local referenced measurement file, to check the local
measurement and the referenced measurement are not both tampered, action Compare will
still dump a latest measurement from managed system and check the certificate chain and
signature states for the measurement files.
o The --nonce option is also available with the Compare action; the nonce will be written into the
latest measurement from managed system. Without the --nonce input, SUM will use the current
OS time of the manage system as the default nonce.

OOB and In-Band Syntax:

sum [<-i <IP or host name> | -I Redfish_HI> -u <username> -p <password>] -c

Attestation --action <action> [--file <filename>] [--ref <filename>] [--

overwrite] [--item <item name>] [--showall] [--file_only] [--nonce <nonce>]

Remote In-Band Syntax:


Supermicro Update Manager User’s Guide 296
sum -I Remote_RHI -u <username> -p <password> --oi <OS IP address> --ou <OS

username> [--op <OS password> | --os_key <OS private key> --os_key_pw <OS

private key password>] -c Attestation --action <action> [--file <filename>] [--

ref <filename>] [--overwrite] [--item <item name>] [--showall] [--file_only] [--

nonce <nonce>] [--remote_sum <remote sum path>]

Note: This command is only available for OOB and in-band usage restricted to the Redfish
host interface when managing measurement files on the managed system.

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c Attestation --action

Dump --file measurement.bin --overwrite --nonce MY_NONCE_XXXX

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c Attestation --action

Dump

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c Attestation --action

List

In-Band:

[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p PASSWORD -c Attestation --action

Download --file measurement.bin

[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p PASSWORD -c Attestation --action

Delete --file measurement.bin

[SUM_HOME]# ./sum -c Attestation --action GetInfo --file_only --file

measurement.bin

Remote In-Band:

[SUM_HOME]# ./sum -I Remote_INB --oi 192.168.34.56 --ou root --op 111111 -c

Attestation --action Download --file measurement.bin

Supermicro Update Manager User’s Guide 297


Remote In-Band through Host Interface:

[SUM_HOME]# ./sum -I Remote_RHI -u ADMIN -p PASSWORD --oi 192.168.34.56 --ou

root --op 111111 -c Attestation --action Download --file measurement.bin

The console output contains the following information.


Measurement..............measurement.bin

Nonce................2022-04-12T11:20:25+08:00

Signature............Signed

Certificate Chain....Verified

[SUM_HOME]# ./sum -c Attestation --action GetInfo --file_only --file

measurement.bin --extract_cert chain.pem

The console output contains the following information.


Measurement..............measurement.bin

Nonce................2022-04-12T11:20:25+08:00

Signature............Signed

Certificate Chain....Verified

Device Identity Certificate PEM chain file "chain.pem" is created.

[SUM_HOME]# ./sum -c Attestation --action GetInfo --file_only --file

measurement.bin --item BMC_ACT_FW_VER

The console output contains the following information.


Measurement..............measurement.bin

Nonce................2022-04-12T11:20:25+08:00

Signature............Signed

Certificate Chain....Verified

Item: BMC_ACT_MEAS

Description: BMC Firmware Measurement

Value: A30CFFC59284658300654B8CDD5144B7C8CCDF3540B52EAF98FE0B7A3A8A4BB1E7FEA

2D89FC9F7BB701B35C1DDD53B43E08751F483573DB75E9F3D5653B0871A
Supermicro Update Manager User’s Guide 298
[SUM_HOME]# ./sum -c Attestation --action GetInfo --file_only --file

measurement.bin --showall

The console output contains the following format information to shows all items in the measurement file.
Item: <Item Name>

Description: <Item Description>

Value: <Item Value>

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c Attestation --action

Compare --ref reference_measurement.bin

The local measurement signature displays the following information:

Type Description
Signed The measurement file signature is signed by the Device Attestation Key and
verified by the Device Attestation Public Key from the measurement file.
Verification failed The measurement file signature cannot be verified by the Device Attestation
Public Key from the measurement file.
The Certificate Chain of a local measurement file displays the following information:

Type Description
Verified The Device Identity Certificate Chain in a measurement file is verified back to
the Root CA. The Device Attestation Certificate is verified by the Device
Identity Certificate.
Verification failed The Device Identity Certificate Chain in a measurement file cannot be verified
back to the Root CA, or the Device Attestation Certificate cannot be verified by
the Device Identity Certificate.
Root Certificates of local measurement files display the following information:

Type Description
Matched The Root CA Certificate matches with the input certificate file.
Mismatched The Root CA Certificate does not match with the input certificate file.

Supermicro Update Manager User’s Guide 299


5.4.15 Getting BMC LAN Settings

Use the “GetBmcLANCfg” command to execute SUM to get the current BMC LAN settings from the
managed system and save them in the BMCLANCfg.xml file.hey

Notes:
• The received tables/elements might not be identical between two managed systems.
Only supported tables/elements for the managed system will be received.
• For in-band and OOB usages, note that the file formats for getting BMC LAN settings
may be different. Be careful not to misuse them.

Syntax:

sum [[-i <IP or host name> | -I Redfish_HI] -u <username> -p <password>] -c

GetBmcLANCfg --file <BMCLANCfg.xml> [--overwrite]

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c GetBmcLANCfg --file

BMCCfg.xml --overwrite

In-Band:

[SUM_HOME]# ./sum -c GetBmcLANCfg --file BMCLANCfg.xml --overwrite

[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p PASSWORD -c GetBmcLANCfg --file

BMCLANCfg.xml --overwrite

Supermicro Update Manager User’s Guide 300


5.4.16 Updating BMC LAN Settings

1. Follow the steps in 5.4.15 Getting BMC LAN Settings.


2. Edit the configurable element values in the BMC LAN configuration text file BMCLANCfg.xml to the
desired values described as those in 4.13 BMC LAN Configuration XML File Format.
3. Skip the unchanged tables in the text file by setting the Action attribute to “None.” Note that this step
is optional.
4. Remove unchanged tables/elements in the text file. Note that this step is optional.

Use the “ChangeBmcLANCfg” command with the updated BMCLANCfg.xml file to run SUM to update the
BMC LAN configuration.

Syntax:

sum [[-i <IP or host name> | -I Redfish_HI] -u <username> -p <password>] -c

ChangeBmcLANCfg --file <BMCLANCfg.xml>

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c ChangeBmcLANCfg --

file BMCLANCfg.xml

In-Band:

[SUM_HOME]# ./sum -c ChangeBmcLANCfg --file BMCLANCfg.xml

[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p PASSWORD -c ChangeBmcLANCfg --file

BMCLANCfg.xml --overwrite

Note: Pay attention to the following when modifying content inside the XML element
<LAN>:
• The connection could be broken if the LAN configuration is changed.
• For in-band operation, all data of the <Configurations> element inside the <LAN>
element is configurable.
• For OOB operation, if Redfish is not supported, all configurations inside the <LAN>
element are read only.
• For OOB operation, the configurations of the <DynamicIPv6> element and the

Supermicro Update Manager User’s Guide 301


<StaticIPv6> element are read only.

5.4.17 Getting the BMC User List

Use the “GetBmcUserList” command to get the current BMC user list from the managed system.

Syntax:

sum -i <IP or host name> -u <username> -p <password>] -c GetBmcUserList

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c GetBmcUserList

Before X12/H12 platforms:

X12/H12 and later platforms:

In-Band:

[SUM_HOME]# ./sum -c GetBmcUserList

Notes:

 "Account Types" is not supported on platforms before X12/H12.


 "Account Types" is only supported for OOB usage.

Supermicro Update Manager User’s Guide 302


5.4.18 Setting the BMC User List

Use the “SetBmcUserList” command to set the current BMC user list from the managed system.

• Add new BMC user


Use the “SetBmcUserList” command with the “--action Add” option to add a new BMC user.
• Delete the BMC user
Use the “SetBmcUserList” command with the “--action Del” option to delete a BMC user.
• Change BMC user privilege
Use the “SetBmcUserList” command with the “—action Level” option to change a BMC user privilege.
• Change BMC user password
Use the “SetBmcUserList” command with the “--action SetPwd” option to change a BMC user
password.
• Test BMC user login
Use the “SetBmcUserList” command with the “--action Test” option to verify a BMC user login.
• Enable BMC user type
Use the “SetBmcUserList” command with the “--action EnableType” option to activate a BMC user
type.
• Enable BMC user status
Use the “SetBmcUserList” command with the “--action EnableAccount” option to activate a BMC user
status.

Notes:

 “No Access,” a user privilege, is not supported on platforms after X11/H11.


 The “--action EnableType” and “--action EnableAccount” is not supported on platforms
before X12/H12.

Syntax:

sum -i <IP or host name> -u <username> -p <password> -c SetBmcUserList --action

add --user_id <userid> --user_name <username> --user_password <userpassword> --

Supermicro Update Manager User’s Guide 303


user_privilege <userprivilege> [--user_status <status>] [--manage_account_type

<type:status>]

sum [-I Redfish_HI -u <username> -p <password>] -c SetBmcUserList --action add -

-user_id <userid> --user_name <username> --user_password <userpassword> --

user_privilege <userprivilege> [--user_status <status>] [--manage_account_type

<type:status>]

sum [-i <IP or host name> -u <username> -p <password>] -c SetBmcUserList --

action <action> --user_id <userid> [--user_name <username>] [--user_password

<userpassword>] [--user_privilege <userprivilege>]

sum {-i <IP or host name> | -I Redfish_HI} -u <username> -p <password> -c

SetBmcUserList --action Test --user_name <username> --user_password

<userpassword>

sum {-i <IP or host name> | -I Redfish_HI} -u <username> -p <password> -c

SetBmcUserList --action EnableType --user_id <userid> {--account_type <type> --

account_type_status <status> | --manage_account_type <type:status>} [--ap

<protocol> --pp <protocol> --ak <key> --pk <key>]

sum {-i <IP or host name> | -I Redfish_HI} -u <username> -p <password> -c

SetBmcUserList --action EnableAccount --user_id <userid> --user_status <status>

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c SetBmcUserList --

action add --user_id 3 --user_name NAME3 --user_password PASSWORD3 --

user_privilege 3 --user_status Disable --manage_account_type

SNMP:Enable,Redfish:Disable --ap SHA --pp DES --ak AKEY3 --pk PKEY3

Supermicro Update Manager User’s Guide 304


[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c SetBmcUserList --

action Del --user_id 3

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c SetBmcUserList --

action Level --user_privilege 3

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c SetBmcUserList --

action SetPwd --user_id 3 --user_password PASSWORD3

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c SetBmcUserList --

action Test --user_name NAME3 --user_password PASSWORD3

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c SetBmcUserList --

action EnableType --user_id 3 --account_type SNMP --account_type_status Enable -

-ap SHA --pp DES --ak AKEY3 --pk PKEY3

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c SetBmcUserList --

action EnableType --user_id 3 --manage_account_type SNMP:Enable,Redfish:Disable

--ap SHA --pp DES --ak AKEY3 --pk PKEY3

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c SetBmcUserList --

action EnableAccount --user_id 3 --user_status Disable

In-Band:

[SUM_HOME]# ./sum -c SetBmcUserList --action 1 --user_id 3 --user_name NAME3 --

user_password PASSWORD3 --user_privilege 3

[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p PASSWORD -c SetBmcUserList –action 1

--user_id 3 --user_name NAME3 --user_password PASSWORD3 --user_privilege 3 --

user_status Disable --manage_account_type SNMP:Enable,Redfish:Disable --ap SHA -

-pp DES --ak AKEY3 --pk PKEY3

[SUM_HOME]# ./sum -c SetBmcUserList --action 2 --user_id 3

[SUM_HOME]# ./sum -c SetBmcUserList --action 3 --user_id 3 --user_privilege 3

Supermicro Update Manager User’s Guide 305


[SUM_HOME]# ./sum -c SetBmcUserList --action 4 --user_id 3 --user_password

PASSWORD3

[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p PASSWORD -c SetBmcUserList --action

5 --user_name NAME3 --user_password PASSWORD3

[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p PASSWORD -c SetBmcUserList --action

6 --user_id 3 --account_type SNMP --account_type_status Enable --ap SHA --pp DES

--ak AKEY3 --pk PKEY3

[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p PASSWORD -c SetBmcUserList --action

6 --user_id 3 --manage_account_type SNMP:Enable,Redfish:Disable --ap SHA --pp

DES --ak AKEY3 --pk PKEY3

[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p PASSWORD -c SetBmcUserList --action

7 --user_id 3 --user_status Disable

5.4.19 Bootstrapping an Account for Redfish Host Interface

Use the BootStrappingAccount command to get a random account for Redfish Host Interface or delete an
existing bootstapping account.

Notes:
• Administrator privileges are needed to delete a bootstrapping account.
• The function of deleting or checking an account is only available for using -I Redfish_HI.
System reboot or BMC reset will automatically delete a bootstrapping account.
• Only local in-band usage is supported.
• Only two bootstrapping accounts are supported.
• To delete a bootstrapping account, the user name must be put into single quotation
marks on Linux systems or double quotation marks on Windows systems.
• When the executing -I Redfish_HI mode without the -u and -p parameters in the
absence of an existing boot strapping account, SUM immediately creates a boot
strapping account to proceed with the command procedures.

Syntax:

Supermicro Update Manager User’s Guide 306


sum [-I Redfish_HI -u <username> -p <password>] -c BootStrappingAccount --action

<action> [--user_name <username>]

Example:

In-Band:

[SUM_HOME]# ./sum -c BootStrappingAccount --action 1

[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p ADMIN -c BootStrappingAccount --

action 1

[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p ADMIN -c BootStrappingAccount --

action 3

[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p ADMIN -c BootStrappingAccount --

action 2 --user_name 'xxxxxxxxxxxxxxx'

5.4.20 Managing a RMCP Service Port


Use the “RmcpManage” command to get RMCP information and manage a RMCP service port.

Syntax:
sum [-i <IP or host name> | -I Redfish_HI] -u <username> -p <password> -c
RmcpManage --action <GetInfo|Enable|Disable> [--port <port>]

Example:

OOB:
[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c RmcpManage --action
GetInfo
The console output contains the following information.
Managed system................192.168.34.56
RMCP Status....................Enable
RMCP Port......................623

Supermicro Update Manager User’s Guide 307


[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c RmcpManage --action
Enable --port RMCP:623
[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c RmcpManage --action
Enable --port 623

In-Band:
[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p ADMIN -c RmcpManage --action Enable
--port RMCP:623
[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p ADMIN -c RmcpManage --action Enable
--port 623

Supermicro Update Manager User’s Guide 308


5.5 Event Log Management for a Single System
5.5.1 Getting System Event Log

Use the “GetEventLog” command to execute SUM to show the current system event log (including both
BIOS and BMC event log) from the managed system. With the --file option, the event log can be saved in
the EventLog.txt file.

Syntax:

sum [[-i <IP or host name> | -I Redfish_HI] -u <username> -p <password>] -c

GetEventLog [--file <EventLog.txt>] [--overwrite] [--raw_data] [--redfish] [--

no_banner]

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c GetEventLog

The console output contains the following information.

Event:1 Time:11/20/2022 16:58:35 Type:System

Assertion: #0FF (System)| Event = Dedicated LAN Link Up

Event:2 Time:11/20/2022 16:58:45 Type:Power Supply

Assertion: PS1 Status| Event = Presence detected

Event:3 Time:11/20/2022 16:58:46 Type:Voltage

Assertion: CPU_VCCIN| Event = Lower Critical - going low

Reading = 0.89 V, Threshold = 1.20 V

Supermicro Update Manager User’s Guide 309


Event:4 Time:11/20/2022 16:58:46 Type:Voltage

Assertion: CPU_VCCIN| Event = Lower Non-recoverable - going low

Reading = 0.89 V, Threshold = 1.20 V

Event:5 Time:11/20/2022 17:01:33 Type:OS Boot

Assertion: #000 (OS Boot)| Event = C: Boot completed

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c GetEventLog --

raw_data

The console output contains the following information.

SEL( 1) 01 00 02 BB 5C 7A 63 20 00 04 D0 FF 6F A3 01 FF

SEL( 2) 02 00 02 C5 5C 7A 63 20 00 04 08 C8 6F F0 FF FF

SEL( 3) 03 00 02 C6 5C 7A 63 20 00 04 02 13 01 52 34 47

SEL( 4) 04 00 02 C6 5C 7A 63 20 00 04 02 13 01 54 34 47

SEL( 5) 05 00 02 6D 5D 7A 63 41 00 04 1F 00 6F 01 FF FF

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c GetEventLog --redfish

The console output contains the following information.

Event ID Created Time Sensor Type Severity Message

-------- ------------ ----------- -------- -------

1 | 2024-01-09T18:29:09Z | System NIC | OK | [LAN-0005] Dedicated LAN Link Up

2 | 2024-01-09T18:32:01Z | System NIC | OK | [LAN-0003] System NIC (1) Link Up

3 | 2024-01-09T18:33:47Z | Power Supply | OK | [PWR-0000] PS2 Status, Power

Supply Installed

Supermicro Update Manager User’s Guide 310


In-band:

[SUM_HOME]# ./sum -c GetEventLog --file EventLog.txt --no_banner --overwrite

[SUM HOME]# ./sum -I Redfish_HI -u ADMIN -p PASSWORD -c GetEventLog --raw_data -

-file EventLog.tx

Supermicro Update Manager User’s Guide 311


5.5.2 Clearing the System Event Log

Use the “ClearEventLog” command to execute SUM to clear the event log (both BMC and BIOS event logs)
in the managed system.

Notes:

 Both the BIOS and BMC event logs in BMC will be cleared immediately.
 The BIOS event log in BIOS will be cleared only after system reboot.

Syntax:

sum [-i <IP or host name> -u <username> -p <password>] -c ClearEventLog [[--

current_password <current password>] | [--cur_pw_file <current password file

path>]] [--reboot] [--clear_bmc_eventlog] [--clear_bios_eventlog]

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c ClearEventLog --

reboot

In-band:

[SUM_HOME]# ./sum -c ClearEventLog --reboot

Supermicro Update Manager User’s Guide 312


5.5.3 Getting System Maintenance Event Log

Use the “GetMaintenEventLog” command to have SUM show the managed system’s current maintenance
event logs (including both BIOS and BMC maintenance event logs). Both --st and --et options are used to
show logs at the specified time. With the “--count” option, the GetMaintenEventLog command can show
the specified number of logs. With the “--file” option, the maintenance event log can be saved in a
MaintenEventLog.txt file.

Syntax:

sum [-i <IP or host name> -u <username> -p <password>] -c GetMaintenEventLog [--

st <start time> --et <end time>] [--count <log count>] [--file <

MaintenEventLog.txt> [--overwrite]]

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c GetMaintenEventLog --

st 20200601 --et 20200602 --count 5 --file MaintenEventLog.txt --overwrite

In-band:

[SUM_HOME]# ./sum -c GetMaintenEventLog --file MaintenEventLog.txt --overwrite

Supermicro Update Manager User’s Guide 313


5.5.4 Getting Host Crash Dump Log
Use the “GetHostDump” command to have SUM show the managed system’s crash dump file. This function
is only available on H12 RoT and X12 2600 and later platforms.
• Creating and downloading the host crash dump data
Use the GetHostDump command with the “--action CreateDump” option to create the managed
system’s crash dump file and download it from BMC.
• Deleting the host crash dump data on BMC
Use the GetHostDump command with the “--action DeleteDump” option to delete a crash dump file
on BMC.
• Directly downloading the host crash dump data from BMC
Use the GetHostDump command with the “--action DirectDump” option to download the managed
system’s crash dump file from BMC. If the crash dump file does not exist, SUM will show the warning
message “No dump messages exist, please create a dump message first.”

Notes:

 The downloaded file is a compressed file and save it in .tgz format.


 The “--file” option is required for both “--action CreateDump” and “--action
DirectDump” options.
 The “--action CreateDump” option is not available on H12 RoT platforms.

Syntax:

sum [[-i <IP or host name> | -I Redfish_HI] -u <username> -p <password>] -c

GetHostDump --action <actiondump> [--file <HostDump.tgz>] [--overwrite]

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c GetHostDump --action

CreateDump --file HostDump.tgz --overwrite

In-band:

Supermicro Update Manager User’s Guide 314


[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p PASSWORD -c GetHostDump --action 1 -

-file log.tgz

5.5.5 Clearing System Maintenance Event Log

Use the “ClearMaintenEventLog” command to execute SUM to clear the maintenance event log in the
managed system.

Syntax:

sum [-i <IP or host name> -u <username> -p <password>] -c ClearMaintenEventLog

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c ClearMaintenEventLog

In-band:

[SUM_HOME]# ./sum -c ClearMaintenEventLog

Supermicro Update Manager User’s Guide 315


5.6 CMM Management for a Single System (OOB Only)
The CMM provides total remote control of individual Blade server nodes, power supplies, power fans, and
networking switches. The controller is a separate processor, allowing all monitoring and control functions
to operate flawlessly regardless of CPU operation or system power-on status.

Note: Three models of 7U SuperBlade CMMs, including SBM-CMM-001, BMB-CMM-002


(mini-CMM) and SBM-CMM-003 are no longer supported.

5.6.1 Getting CMM Firmware Image Information

Use the “GetCmmInfo” command to get the CMM firmware image information from the managed system
as well as the CMM firmware image.

Syntax:

sum [-i <IP or host name> -u <username> -p <password>] -c GetCmmInfo [--file

<filename> [--file_only]]

Example:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c GetCmmInfo --file

Supermicro_CMM.rom

The console output contains the following information.

Managed system...........192.168.34.56

CMM type.............MicroCMM

CMM version..........09.01

ARM SUM version......1.0.0 (2021/12/10) (ARM)

Local CMM image file.....Supermicro_CMM.rom

CMM type.............MicroCMM

CMM version..........09.10

Supermicro Update Manager User’s Guide 316


The following information is displayed only when the command “GetCmmInfo” is

executed with the option “--showall”.

Blade ID: B6

==============

Node ID: 1

Board model..........BH12SSi

Status...............Normal

BMC IP...............10.146.175.59

BIOS version.........2.3a

BIOS build date......2021/09/14

BMC version..........75.00.06

ARM SUM version......1.0.0 (2021/12/10) (ARM)

5.6.2 Updating the CMM Firmware Image

Use the “UpdateCmm” command with the CMM firmware image Supermicro_CMM.rom to update the
managed system.

Notes:

 CMM will be reset after updating.


 CMM configurations will be preserved after updating unless the --overwrite_cfg option
is used.
 DO NOT flash BIOS and BMC firmware images at the same time.
 For OOB UpdateCmm usage, please use SUM version 1.6.2 or later.
 The --overwrite_cfg option overwrites the current CMM configurations, including
network settings using factory default values in the given CMM firmware image. This
might cause the IPMI connection to be lost.
 The --overwrite_sdr option overwrites the current CMM SDR data. Currently this option
is only supported by the JBOD CMM system “CSE-947HE2C-R2K05JBOD.” Other CMM
systems with this option won’t take effect.
 The --overwrite_ssl option overwrites the current CMM SSL configuration. Currently this
option is only supported by the JBOD CMM system “CSE-947HE2C-R2K05JBOD.” Other
CMM systems with this option won’t take effect.
 If the CMM FW web server becomes unreachable after CMM FW is updated, use the

Supermicro Update Manager User’s Guide 317


ipmitool to troubleshoot. Follow these steps:
a. Reset CMM.
$ ipmitool -H ${CMM_IP} -U {CMM_USER} -P {CMM_PASSWD} raw 0x30 0x34 0x05.
b. Wait for three minutes and then check if the CMM web is reachable. If it is
reachable, the troubleshooting is done.
c. If the CMM web is still unreachable, load the CMM factory defaults.
(Note: All CMM settings except LAN/FRU will be LOST.)
$ ipmitool -H ${CMM_IP} -U {CMM_USER} -P {CMM_PASSWD} raw 0x30 0x33 0x14
d. Wait for three minutes and check the CMM web again.
 To update the “CSE-946ED-R2KJBOD” and “CSE-947HE2C-R2K05JBOD” JBOD systems,
use the UpdateCmm command.

Syntax:

sum [-i <IP or host name> -u <username> -p <password>] -c UpdateCmm --file

<filename> [--overwrite_cfg] [--overwrite_sdr] [--overwrite_ssl]

Example:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c UpdateCmm --file

Supermicro_CMM.rom

Supermicro Update Manager User’s Guide 318


5.6.3 Getting CMM Settings

Use the “GetCmmCfg” command to execute SUM to get the current CMM settings from the managed
system and save them in the CMMCfg.xml file.

Notes:

 Received tables/elements might not be identical between two managed systems. Only
tables/elements supported for the managed system will be received.
 Configuration files in XML can be downloaded from CMM through the --download
option. The feature is supported by 64MB CMM AST2400 only. For details, please refer
to 5.15 Profile Management for a Single Blade System.

Syntax:

sum -i <IP or host name> -u <username> -p <password> -c GetCmmCfg [--file

<CmmCfg.xml>] [--overwrite] [--download [--profile_repo]]

Example:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c GetCmmCfg --file

CmmCfg.xml --overwrite

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c GetCmmCfg --download

--file CmmCfg.xml --overwrite

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c GetCmmCfg --download

--profile_repo --file CmmCfg_Cache.xml --overwrite

5.6.4 Updating CMM Settings

1. Follow the steps in 5.6.3 Getting CMM settings.


2. Edit the configurable element values in the CMM configuration file CMMCfg.xml to the desired values
as illustrated in 4.8 CMM Configuration Text File Format.
3. Set the Action attribute as “None” to skip the unchanged tables in the text file. Note that this step is
optional.
4. Remove unchanged tables/elements in the text file. Note that this step is optional.
Supermicro Update Manager User’s Guide 319
5. Use the command ChangeCmmCfg with the updated CMMCfg.xml file to run SUM to update the CMM
configuration.
Syntax:

sum -i <IP or host name> -u <username> -p <password> -c ChangeCmmCfg --file

<CmmCfg.xml>

sum -i <IP or host name> -u <username> -p <password> -c ChangeCmmCfg {[--upload

--file <CmmCfg.xml>] | [--update Apply|Deploy]}

Example:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c ChangeCmmCfg --file

CmmCfg.xml

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c ChangeCmmCfg --upload

--file CmmCfg.xml

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c ChangeCmmCfg --update

Apply

Notes:

 The connection might be lost if the LAN configuration is changed.


 The CMM configuration can be changed through the --upload option. Please use the
GetCmmCfg command with option --download to obtain the CMM configuration file.
The feature is supported by 64MB CMM AST2400 only.
 Please use the --skip_precheck option to upload and overwrite the existing CMM profile.
 The Update action “Apply” updates CMM immediately with a CMM profile.
 For immediate update, if the scheduled update time in CMM profile expires, CMM
configuration will be updated immediately.
 For scheduled updates, if the scheduled update time in CMM profile is in the future,
CMM configuration will be updated at the scheduled update time. For details, please
refer to 5.15 Profile Management for a Single Blade System.
 The --skip_unknown option is designed to skip all invalid tables and settings in the latest
CMM configuration in the managed system.

Supermicro Update Manager User’s Guide 320


5.6.5 Setting Up a CMM User Password

Use the “SetCmmPassword” command to execute SUM to update the CMM user password.

Syntax:

sum [-i <IP or host name> -u <username> -p <password>] -c SetCmmPassword

[--user_id <user ID>] [[--new_password <new password> --confirm_password

<confirm password>] | [--pw_file <password file path>]]

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c SetCmmPassword

--user_id 3 --new_password 12345678 --confirm_password 12345678

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c SetCmmPassword

--pw_file passwd.txt

In-Band:

[SUM_HOME]# ./sum -c SetCmmPassword --new_password 12345678 --confirm_password

12345678

[SUM_HOME]# ./sum -c SetCmmPassword --user_id 3 --pw_file passwd.txt

passwd.txt:

CmmPasswordString

Note: Without the --user_id option, the user ID is set to 2 (as Administrator) by default.

Supermicro Update Manager User’s Guide 321


5.6.6 Loading Factory CMM Settings

Use the “LoadDefaultCmmCfg” command to have SUM reset the CMM settings of the managed system to
the factory defaults. Allowed option combinations depend on the managed system state. The unsupported
options will be denied. For more detailed information of unique passwords, see 5.4.9 Loading Factory BMC
Settings.

Option Reset Reset Reset ADMIN Password


Network Users info FRU
--preserve_user_cfg N N N Preserved

--clear_user_cfg with N Y N ADMIN

--load_default_password

--clear_user_cfg with N Y N Unique Password

--load_unique_password

Syntax:

sum -i <IP or host name> -u <username> -p <password> -c LoadDefaultCmmCfg --

preserve_user_cfg

sum -i <IP or host name> -u <username> -p <password> -c LoadDefaultCmmCfg --

clear_user_cfg --load_unique_password

sum -i <IP or host name> -u <username> -p <password> -c LoadDefaultCmmCfg --

clear_user_cfg --load_default_password

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c LoadDefaultCmmCfg --

preserve_user_cfg

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c LoadDefaultCmmCfg --

clear_user_cfg --load_unique_password

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c LoadDefaultCmmCfg --

clear_user_cfg --load_default_password

Supermicro Update Manager User’s Guide 322


Notes:

• The --load_unique_password option only supports systems installed with a CMM unique
password.
 This command will not reset any network settings.

5.6.7 Getting BBP Firmware Image Information

Use the “GetBbpInfo” command to get the BBP firmware image and its information from the managed
system.

Syntax:

sum [-i <IP or host name> -u <username> -p <password>] -c GetBbpInfo [--file

<filename> [--file_only]]

Example:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c GetBbpInfo --file

BBP.bin

The console output contains the following information.

Managed system...........172.30.143.96
BBP version..........01.08
Local BBP image file.....BBP_EC_2019-03-14_1901.47v1.08.bin
BBP version..........01.08

Supermicro Update Manager User’s Guide 323


5.6.8 Updating the BBP Firmware Image

Use the “UpdateBbp” command with the BBP firmware image BBP.bin to update the BBP of managed
system.

Syntax:

sum [-i <IP or host name> -u <username> -p <password>] -c UpdateBbp --file

<filename> [--skip_check]

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c UpdateBbp --file

BBP.rom

Note: It is recommended that all system units be turned off by the CmmPowerStatus
command. If you need to update BBP while system units are powered on, please make sure
that enough power is being provided, and then use the --skip_check option to force BBP to
update. If the power is insufficient while updating BBP, the blade system may shut down.

Supermicro Update Manager User’s Guide 324


5.6.9 Getting Current Power Status of Blade System

Use the “GetBladePowerStatus” command to get the current power status of the blade system.

Syntax:

sum [-i <IP or host name> -u <username> -p <password>] -c GetBladePowerStatus

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c GetBladePowerStatus

The console output contains the following information:

Blade | Node | Power

------------|---------|----------

Blade A1 | Node 1 | On

Blade A2 | Node 1 | On

Blade A3 | Node 1 | On

Blade A4 | Node 1 | On

Blade A5 | Node 1 | On

Blade A6 | Node 1 | On

Blade A7 | Node 1 | On

Blade A8 | Node 1 | On

Blade A9 | Node 1 | On

Blade A10 | Node 1 | On

Supermicro Update Manager User’s Guide 325


5.6.10 Setting Power Status of Blade System

SUM supports blade power status management. You can apply power action to the whole blade system, a
single blade, or a node through the specified option. For example, to apply power action to the whole
blade system, you only need to assign a power action. To apply a power action to the specified single blade
system, you must assign a power action and the --blade option with index. To apply power action to a
specified node of a blade system, you must assign a power action and the --blade and --node options with
index.

Syntax:

sum [-i <IP or host name> -u <username> -p <password>] -c SetBladePowerAction --

action <action> --blade <Blade Index> [--node <Node Index>]

Option Commands Descriptions


--action Sets power action with:

0 = down

1 = up

2 = cycle

3 = reset

5 = softshutdown

24 = accycle

--blade Assigns blade index.


[A1-A14], [B1-B14] or “ALL”

--node (optional) Assigns node index.


[1-4]

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c SetBladePowerAction

--action down --blade ALL

Supermicro Update Manager User’s Guide 326


[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c SetBladePowerAction

--blade A1 --action reset

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c SetBladePowerAction

--blade A1 --node 1 --action softshutdown

Supermicro Update Manager User’s Guide 327


5.6.11 Managing Profile Information

Use the “ProfileManage” command to manage the profile information on the managed system.

Option Commands Descriptions


--action Sets action to:

Get = Get Profile List

Edit = Edit Profile Info

Delete = Delete Profile

Syntax:

sum [-i <IP or host name> -u <username> -p <password>] -c ProfileManage --action

<action> [--file <filename> [--overwrite]] [--file_id] [--profile_name] [--

profile_description] [--schedule_update_time][-showall]

Example:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c ProfileManage --

action Get

The console output contains the following information.

Managed system...........192.168.34.56

Profile ID: 1

==============

Profile Type: Cmm

Profile Name: cmmcfg.xml

Profile Description: For_CMM

Schedule Update Time: 2021-09-07_14:28

Supermicro Update Manager User’s Guide 328


Profile ID: 2

==============

Profile Type: System

Profile Name: systemcfg.xml

Profile Description: For_Blade_A1

Schedule Update Time: 2021-09-07_14:28

The following information is displayed only when the command “GetCmmInfo” is

executed with the option “--showall”.

Managed system...........10.146.161.179

Profile ID: 1

==============

Profile Type: System

Profile Name: systemcfg_TEST.xml

Profile Description: TEST

Schedule Update Time: 2022-09-20_15:44

Profile Association:

Blade: B6 Node: 1 Status: Waiting for scheduling update

Blade: B6 Node: 2 Status: Waiting for receiving profile

Blade: B6 Node: 3 Status: Waiting for receiving profile

Blade: B6 Node: 4 Status: Waiting for receiving profile

Blade: B10 Node: 1 Status: Waiting for scheduling update

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c ProfileManage --

action Edit --file_id 2 --profile_description 'For_Blade_A2'

The console output contains the following information.

Supermicro Update Manager User’s Guide 329


Profile ID "2" is edited.

Profile ID: 2

==============

Profile Type: System

Profile Name: systemcfg.xml

Profile Description: For_Blade_A2

Schedule Update Time: 2021-09-07_14:28

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c ProfileManage --

action Delete --file_id 2

The console output contains the following information.

Profile ID "2" is deleted.

Supermicro Update Manager User’s Guide 330


Notes:

• To download the current CMM configuration file or CMM profile, please use the
GetCmmCfg command with the --download option. For details, please refer to 5.6.3
Getting CMM Settings.
• To upload the CMM configuration file, please use the ChangeCmmCfg command with
the --upload option. For details, please refer to 5.6.4 Updating CMM Settings (Single
System).
• To update the CMM configuration, please use the ChangeCmmCfg command with the --
update option. For details, please refer to 5.6.4 Updating CMM Settings (Single
System).
• To download the current system configuration file or system profile, please use the
GetSystemCfg command with the --download option. For details, please refer to 5.7.12
Getting System Settings.
• To upload the system configuration file, please use the ChangeSystemCfg command with
the --upload option. For details, please refer to 5.7.13 Updating System Settings.

Supermicro Update Manager User’s Guide 331


5.6.12 Receiving Switch Firmware Image Information

Use the “GetSwitchInfo” command to get the switch firmware image information as well as the local switch
firmware image (with the --file option) from the managed system.

Syntax:

sum [-i <IP or host name> -u <username> -p <password>] -c GetSwitchInfo [--

dev_id <Device ID>] [--file <filename> [--file_only]]

Notes:

 SBM-25G-P10 and BMB-25G-P10 are the same switch module.


 The --file option is used to parse SBM-25G-P10/BMB-25G-P10/MBM-XEM-002/MBM-
GEM-004/SBM-25G-100 firmware image.

Example:

In-Band:

[SUM_HOME]# ./sum -c GetSwitchInfo --file Supermicro_Switch.bin --file_only

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c GetSwitchInfo

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c GetSwitchInfo --

dev_id A1,A2

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c GetSwitchInfo --file

Supermicro_Switch.bin

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c GetSwitchInfo --

dev_id A1,A2 --file Supermicro_Switch.bin

The console output contains the following information.

Supermicro Update Manager User’s Guide 332


Local switch image file..Supermicro_Switch.bin
Module name..........BMB-25G-P10
Switch version.......1.0.0.21

Managed system...........192.168.34.56
[Switch A1]
==============
Switch IP............192.168.34.100
Switch type..........25G Pass-thru Module
Module name..........SBM-25G-P10 (P1)
Switch version.......1.0.0.21
Power Status.........On
Status...............Normal
[Switch A2]
==============
Switch IP............192.168.34.101
Switch type..........25G Pass-thru Module
Module name..........SBM-25G-P10 (P1)
Switch version.......1.0.0.8
Power Status.........On
Status...............Normal
[Switch B1]
==============
Switch IP............192.168.34.102
Switch type..........25G Pass-thru Module
Module name..........SBM-25G-P10 (P1)
Switch version.......1.0.0.21
Power Status.........On
Status...............Normal
[Switch B2]
==============
Switch IP............192.168.34.103
Switch type..........25G Pass-thru Module
Module name..........SBM-25G-P10 (P1)
Switch version.......1.0.0.21

Supermicro Update Manager User’s Guide 333


Power Status.........On
Status...............Normal

Supermicro Update Manager User’s Guide 334


5.6.13 Updating the Switch Firmware

Use the “UpdateSwitch” command with the switch firmware image Supermicro_Switch.bin to update the
managed switch.

Notes:

 SBM-25G-P10 and BMB-25G-P10 are the same switch module.


 This command is only available for switch modules SBM-25G-P10/BMB-25G-P10/MBM-
XEM-002/MBM-GEM-004/SBM-25G-100.
 The firmware version of switch module SBM-25G-100/BMB-25G-P10 must be equal to
or greater than 1.0.0.10.
 The firmware version of switch module MBM-XEM-002 must be equal to or greater than
2.2.1.34.
 The firmware version of switch module MBM-GEM-004 must be equal to or greater than
1.3.0.8.
 The firmware version of switch module SBM-25G-100 must be equal to or greater than
1.4.0.11.
 The switch module must be rebooted to take effect.
 Without the --reboot option, the switch module will not restart after the UpdateSwitch
command is executed. To reboot the switch module, execute the RebootSwitch
command.
 To update switch firmware through CMM IP and switch device ID, you can use the --
dev_id, --switch_user, and --switch_pw options.
 Please use the GetSwitchInfo command to get the switch device ID.

Syntax:

sum [-i <Switch IP or switch host name> -u <Switch username> -p <Switch

password>] -c UpdateSwitch --file <filename> [--reboot]

sum -i <CMM IP or CMM host name> -u <CMM username> -p <CMM password> -c

UpdateSwitch --file <filename> --dev_id <Switch device ID> --swtich_user <Switch

username> --switch_pw <Switch password> [--reboot]

Supermicro Update Manager User’s Guide 335


Example:

[SUM_HOME]# ./sum -i 192.168.34.100 -u ADMIN -p PASSWORD -c UpdateSwitch --file

Supermicro_Switch.bin --reboot

[SUM_HOME]# ./sum -i 192.168.34.100 -u ADMIN -p PASSWORD -c UpdateSwitch --file

Supermicro_Switch.bin --dev_id A1 --switch_user ADMIN --switch_pw ADMIN --reboot

Supermicro Update Manager User’s Guide 336


5.6.14 Rebooting the Switch

Use the “RebootSwitch” command to reboot the managed switch.

Notes:

 SBM-25G-P10 and BMB-25G-P10 are the same switch module.


 This command is only available for the switch modules: SBM-25G-P10/BMB-25G-
P10/MBM-XEM-002/MBM-GEM-004/SBM-25G-100.
 The firmware version of the switch module SBM-25G-100/BMB-25G-P10 must be equal
to or greater than 1.0.0.10.
 The firmware version of the switch module MBM-XEM-002 must be equal to or greater
than 2.2.1.34.
 The firmware version of the switch module MBM-GEM-004 must be equal to or greater
than 1.3.0.8.
 The firmware version of the switch module SBM-25G-100 must be equal to or greater
than 1.4.0.11.
 To reboot the managed switch through a CMM IP and a switch device ID, you can use
the --dev_id, --switch_user, and --switch_pw options.
 Please use the GetSwitchInfo command to get the switch device ID.

Syntax:

sum [-i <Switch IP or switch host name> -u <Switch username> -p <Switch

password>] -c RebootSwitch

sum -i <CMM IP or CMM host name> -u <CMM username> -p <CMM password> -c

RebootSwitch --dev_id <Switch Device ID> --swtich_user <Switch username> --

switch_pw <Switch password>

Example:

[SUM_HOME]# ./sum -i 192.168.34.100 -u ADMIN -p PASSWORD -c RebootSwitch

[SUM_HOME]# ./sum -i 192.168.34.100 -u ADMIN -p PASSWORD -c RebootSwitch --

dev_id A1 --switch_user ADMIN --switch_pw

Supermicro Update Manager User’s Guide 337


5.7 Applications for a Single System
5.7.1 Sending an IPMI Raw Command

Use the “RawCommand” command to send an IPMI raw command to the target system.

Syntax:

sum [-i <IP or host name> -u <username> -p <password>] -c RawCommand --raw <raw

command>

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c RawCommand --raw '06

01'

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c RawCommand --raw

'0x06 0x01'

In-band:

[SUM_HOME]# ./sum -c RawCommand --raw '06 01'

[SUM_HOME]# ./sum -c RawCommand --raw '0x06 0x01'

The console output contains the following information.

00

20 01 09 95 02 BF 7C 2A 00 7A 09 00 10 00 00

Note: A raw command must be in double quotation marks.

Supermicro Update Manager User’s Guide 338


5.7.2 USB Port Accessibility Control

In order to prevent security data from being leaked and unauthorized operations through USB ports, since
X12, SUM has supported inband USB port accessibility control for front and rear panels. Currently, SUM
does not support USB port accessibility control for AMD platforms. Front panel means the USB ports are
connected to a 19-pin USB header on motherboard and usually is accessible in front of a system. In
contrast, rear panel means the built-in USB ports on motherboard and usually is accessible in the rear of a
system. For formal USB port position definition, please refer to “PLD” (Physical Location of Device) in ACPI
specification. USB port accessibility can be configured by BIOS configuration during POST. BIOS settings
“Front USB Port(s)” and “Rear USB Port(s)” are for front and rear panels, respectively.

Three options are provided:

 Enabled: A USB port is statically enabled or disabled by BIOS during POST, and it can’t be dynamically
enabled or disabled in the running operating system.
 Disabled: A USB port is statically enabled or disabled by BIOS during POST.
 Enabled (Dynamically): A USB port access mode can be dynamically switched and taken effect
immediately in the running operating system.

The USB port accessibility in the running operating system can be accessed by running the command
“GetUsbAccessMode” (see 5.7.7 Getting USB Port Access Mode (Inband only) ), or switched by running the
command “SetUsbAccessMode” (see 5.7.8 Dynamic Control USB Port Access Mode (Inband only)). The
mapping releatationship between BIOS setting options and access mode(s) in the running operating system
are summarized in the following table.

BIOS Setting Options for USB Ports Access Mode(s) in the Running Dynamic Control in the
Operating System Running Operating System
Enabled Statically enabled No

Disabled Statically disabled No

Enabled (Dynamically) Dynamically enabled/disabled Yes

Supermicro Update Manager User’s Guide 339


5.7.3 Acquiring USB Port Access Mode (Inband Only)

Use the inband command “GetUsbAccessMode” command to get USB access mode in the running
operating system. Currently, SUM supports for dynamically disabling/enabling both front and rear panel
USB ports. There are four USB port access modes:

 Dynamically Enabled: A USB port is dynamically enabled.


 Dynamically Disabled: A USB port is dynamically disabled.
 Statically Enabled: A USB port is enabled by BIOS during POST, and it cannot be dynamically disabled
in the running operating system.
 Statically Disabled: A USB port is disabled by BIOS during POST, and it cannot be dynamically enabled
in the running operating system.

Syntax:

sum -c GetUsbAccessMode

Example:

In-Band:

[SUM_HOME]# ./sum -c GetUsbAccessMode

The console output contains the following information.

[USB access mode]

REAR panel....................dynamic enabled

FRONT panel...................static disabled

Supermicro Update Manager User’s Guide 340


5.7.4 Dynamically Controlling USB Port Access Mode (Inband Only)

Only when “Front USB Port(s)” or “Rear USB Port(s)” is set to “Enabled (Dynamic)” in the BIOS
configurations is the command “SetUsbAccessMode” allowed to dynamically enable/disable the USB port
access mode.

Syntax:

sum -c SetUsbAccessMode --panel <front/rear> --disable

sum -c SetUsbAccessMode --panel <front/rear> --enable

Example:

In-Band:

[SUM_HOME]# ./sum -c setUsbAccessMode --panel front --disable

The console output contains the following information.

[USB access mode]

FRONT panel....................dynamic disabled

Note: For some systems, a plugged-in USB 3.0 device cannot be used after the port is
dynamically disabled and enabled again. When the device cannot be used after the port is
dynamically enabled, SUM will output a message “USB 3.0 device may need to be manually
unplugged and plugged for use” to bring this to the user’s attention.

Supermicro Update Manager User’s Guide 341


5.7.5 Controlling the UID of the Managed System

The UID is a unit identifier button for easy system location in large stack configurations. Use the
“LocateServerUid” command to control the UID. When the UID is enabled, the blue LED on both the front
and rear of the chassis will be illuminated.

Option Commands Descriptions


--action Sets action to:

1 = GetStatus

2 = On

3 = Off

Syntax:

sum [-i <IP or host name> -u <username> -p <password>] -c LocateServerUid --

action <action>

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c LocateServerUid --

action 3

The console output contains the following information.

UID of the managed system is turned off.

In-Band:

[SUM_HOME]# ./sum -c LocateServerUid --action GetStatus

The console output contains the following information.

Managed system................localhost

UID status................Off

Supermicro Update Manager User’s Guide 342


5.7.6 Booting into the ISO Image from HTTP Server

Use the “SetHttpBoot” command to download an ISO image from the HTTP server and boot into the ISO
image.

Syntax:

sum [-i <IP or host name> -u <username> -p <password>] -c SetHttpBoot [[--

current_password <current password>] | [--cur_pw_file <current password file

path>]] [--boot_lan <boot lan port>] [--boot_name <boot description>] --

image_url <URL> [--reboot] [--file <file name>]

sum [-i <IP or host name> -u <username> -p <password>] -c SetHttpBoot --

boot_clean [--reboot]

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c SetHttpBoot --

boot_name bootDescription --image_url http://192.168.12.78/iso/efishell.iso --

reboot

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c SetHttpBoot --

boot_lan 2 --boot_name bootDescription --file TLS.crt --image_url

https://[1234:ab5:0:c678:9012:345d:6e78:9f0a]/iso/efishell.iso --reboot

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c SetHttpBoot --

boot_clean --reboot

In-band:

[SUM_HOME]# ./sum SetHttpBoot --boot_name bootDescription --image_url

http://192.168.12.78/iso/efishell.iso --reboot

[SUM_HOME]# ./sum -c SetHttpBoot --boot_lan 2 --boot_name bootDescription --file

TLS.crt --image_url

https://[1234:ab5:0:c678:9012:345d:6e78:9f0a]/iso/efishell.iso --reboot

Supermicro Update Manager User’s Guide 343


[SUM_HOME]# ./sum -c SetHttpBoot --boot_clean --reboot

Notes:

 HTTPS boot needs to provide the clients with a valid TLS certificate signed by a trusted
Certificatio Authority.
 Due to BIOS limitations, if an HTTP boot option exists in the BIOS configuration, please
use the --boot_clean option to clean the HTTP boot option and then reset HTTP the
boot option.
 When you execute the SetHttpBoot command on the FreeBSD 12 system, you may
boot into FreeBSD instead of efishell.iso because of startup.nsh in the system. To
prevent from it, you can delete startup.nsh or rename the startup.nsh file.

Supermicro Update Manager User’s Guide 344


5.7.7 Managing KMS Server Configurations

Use the “KmsManage” command to change the KMS server configurations, upload TLS certificates and test
the connection to the KMS server. The command only works on the X12/H12 and later platforms. Since
SUM 2.9.0, users can save and configure the specific OEM functions for KMS features by using the [--file]
option.

Syntax:

sum [-i <IP or host name> -u <username> -p <password>] -c KmsManage

[[--current_password <current password>] | [--cur_pw_file <current password

filename>]] [options…]

Option Augment Description


--server_ip <server IP address> Enters a KMS server IP address.
--second_server_ip <second server IP> Enters a second KMS server IP address.
--port <port> Enters an optional command port(s).
The format of <port> is “TCP:5696” or “5696”.
TCP is for KMS server port.
--time_out <time out> Enters a KMS server connection time-out.
--time_zone <time zone> Enters a correct time zone.
--client_username <client username> Enters a client identity: UserName.
--client_password <client password> Enters a client identity: Password.
--ca_cert <CA certificate Uploads a CA certificate from the file.
filename>
--client_cert <client certificate Uploads a client certificate from the file.
filename>
--pvt_key <client private key> Uploads a client private key from the file.
--pvt_key_pw <private key Uploads a client private key from the file.
password>
--file <file name> When the “--action GetInfo” option is specified, save the
OEM configurations to a file. Otherwise, update the OEM
settings with the given configuration file.
--action <action> Sets the KMS management action to:
1 = GetInfo: Check the current KMS configurations.
2 = Probe: Test the connection to the specified KMS server.
3 = DeleteCA: Delete a CA certificate.
4 = DeleteCert: Delete a client certificate.
5 = DeletePvtKey: Delete a client private key.
6 = DeleteAll: Delete all certificates and keys.
Supermicro Update Manager User’s Guide 345
Option Augment Description
--reboot N/A Forces the managed system to reboot or power up after
operation.
--post_complete N/A Wait for the managed system POST to complete after
reboot.

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c KmsManage --server_ip

192.168.12.78 --port 5659 --ca_cert ca.crt --client_cert client.crt --pvt_key

private.key --action Probe --reboot

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c KmsManage --server_ip

192.168.12.78 --port TCP:5659 --ca_cert ca.crt --client_cert client.crt --

pvt_key private.key --action Probe --reboot

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c KmsManage --action

DeleteAll --reboot

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c KmsManage --action

GetInfo

In-band:

[SUM_HOME]# ./sum -c KmsManage -server_ip 192.168.12.78 --port 5659 --ca_cert

ca.crt --client_cert client.crt --pvt_key private.key --action Probe --reboot

[SUM_HOME]# ./sum -c KmsManage --server_ip 192.168.12.78 --port TCP:5659 --

ca_cert ca.crt --client_cert client.crt --pvt_key private.key --action Probe --

reboot

[SUM_HOME]# ./sum -c KmsManage --action DeleteAll --reboot

[SUM_HOME]# ./sum -c KmsManage --action GetInfo

Supermicro Update Manager User’s Guide 346


The console output contains the following information.

Managed system.....................192.168.34.56

KMS Server IP..................192.168.12.78

Second KMS Server IP...........192.168.12.79

KMS TCP Port Number............5696

KMS Time Out...................3

KMS TimeZone...................GMT+0

Client UserName................user123

Client Password................******

KMS TLS Certificate

CA Certificate.................Uploaded

Client Certifcate..............Uploaded

Client Private Key.............Uploaded

KMS Server Probe Status........KMS function works normally

Notes:

 To establish a TLS connection and enable the KMS service, it is required to provide the
KMS server with the valid TLS certificates and private key. Please use the “--ca_cert”, “-
-client_cert” and “--pvt_key” options or use the “ChangeBiosCfg” command to upload
the required files. For details, see E.5.1 File Upload.
 The “--action Probe” option is used to test the connection to the KMS server and
requires a system reboot. Wait for the system POST to complete after reboot, and then
use the “--action GetInfo” option to check the probe status. See the “KMS Server Probe
Status” in the console output example above.

Supermicro Update Manager User’s Guide 347


5.7.8 Getting System Settings

Use the “GetSystemCfg” command to execute SUM to get the current system settings from the managed
system and save them in the SystemCfg.xml file. System settings include BIOS settings and BMC settings.

Notes:

 The tables/elements from the managed systems might not be identical. Only
tables/elements supported by the managed systems will be accessed.
 A configuration file in XML can be downloaded from CMM through the --download
option. The feature is only supported by 64MB CMM AST2400.
 For details on profile update, please refer to 5.15 Profile Update for a Single Blade
System.

Syntax:

sum [-i <IP or host name> -u <username> -p <password>] -c GetSystemCfg --file

<SystemCfg.xml> [--overwrite] [[--download] [--file_id]]

Example:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c GetSystemCfg --file

SystemCfg.xml --overwrite

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c GetSystemCfg --file

SystemCfg.xml --download --dev_id A1_1

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c GetSystemCfg --file


SystemCfg_Cache.xml --download --file_id 2

5.7.9 Updating System Settings

1. Follow the steps in 5.7.12 Getting System Settings.


2. Edit the configurable element values in the system configuration file SystemCfg.xml.See the steps in
5.3.4 Updating BIOS Settings Based on the Current BIOS Settings and 5.4.4 Updating BMC Settings.
3. Use the command ChangeSystemCfg with the updated SystemCfg.xml file to run SUM to update the
system configuration.
Syntax:

Supermicro Update Manager User’s Guide 348


sum [-i <BMC IP or host name> -u <username> -p <password>] -c ChangeSystemCfg --

file <SystemCfg.xml> [--reboot [--post_complete]]

sum -i <CMM IP or host name> -u <username> -p <password> -c ChangeSystemCfg {[--

update Apply|Deploy --dev_id <Device ID> --file_id <file ID> --reboot] | [--

upload --file SystemCfg.xml]}

Example:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c ChangeSystemCfg --

file SystemCfg.xml

[SUM_HOME]#./sum -i 192.168.34.56 -u ADMIN -p ADMIN -c ChangeSystemCfg --upload

--file SystemCfg.xml

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c ChangeSystemCfg --

update Apply --dev_id A1_1,B11_2,A10 --file_id 2 --reboot

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c ChangeSystemCfg --

update Apply --dev_id ALL --file_id 2 --reboot

Notes:

 The connection might be lost if the LAN configuration is changed.


 To update a profile, please refer to 5.6.11 Managing profile Information.
 You can use the option --upload to change the CMM configuration. You can also use the
GetCmmCfg command with the --download option to obtain the CMM configuration file.
You should use the GetCmmCfg command with the --download option to get the
uploaded file. The feature is supported by 64MB CMM AST2400 only.
 Please use the --skip_precheck option to upload and overwrite the existing system
profile.
 The --reboot and --post_complete options are required for BMC OOB usage.
 Use the ProfileManage command to check the profile list before update.
 You can use the update action “Apply” to immediately update the existing Blade system
with the system profile.
 You can use the update action “Deploy” to update the existing and replaced Blade

Supermicro Update Manager User’s Guide 349


systems with the system profiles.
 For immediate update, if the scheduled update time in the system profile expires, the
system configuration will be updated immediately.
 For scheduled update, if the scheduled update time in system profile is in the future, the
system configuration will be updated at the scheduled update time.
 For details on profile update, please refer to 5.15 Profile Management for a Single Blade
System.
 The --skip_unknown option is used to skip all invalid menus, tables and settings in the
latest system configuration in the managed system.

Supermicro Update Manager User’s Guide 350


5.7.10 Invoking Redfish API
Use the “RedfishApi” command to invoke any Redfish API and display the response on screen.

Syntax:

sum [[-i <IP or host name>] | [-I Redfish_HI]] -u <username> -p <password> -c

RedfishApi --api <api path> [-v] [--request <http method>] [--file <file name>

[--overwrite]] [--data <request body>] [--retry <number>]

Option Augment Description


--api <api path> Redfish API path.
-v N/A Displays the response header.
--request <http method> The HTTP method should be one of the following: GET,
POST, or PATCH. The default setting is GET.
--file <file name> Output the response to file instead of printing on screen.
--overwrite N/A Overwrite the output file.
--data <request body> The request body for the POST and PATCH methods.
There are two usages:
 Supplies the body in string directly. Note that the
special character should be escaped.
 Stores the body in a text file and supplies the file
name. Note that you need to prepend an at character
(@) to the file name, e.g., “--data @body.txt.”
--retry <number> Number of retry times. The default value is 3.

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c RedfishApi --api

/redfish/v1/TaskService

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c RedfishApi --request

PATCH --api /redfish/v1/TaskService --data "{\"ServiceEnabled\":true}"

Supermicro Update Manager User’s Guide 351


[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c RedfishApi --request

PATCH --api /redfish/v1/TaskService -v --retry 1 --data @body.txt --file

response.txt --overwrite

In-Band:

[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p PASSWORD -c RedfishApi --api

/redfish/v1/TaskService

[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p PASSWORD -c RedfishApi --request

PATCH --api /redfish/v1/TaskService --data "{\"ServiceEnabled\":true}"

[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p PASSWORD -c RedfishApi --request

PATCH --api /redfish/v1/TaskService -v --retry 1 --data @body.txt --file

response.txt --overwrite

Supermicro Update Manager User’s Guide 352


5.7.11 Remote Execution
Use the “RemoteExec” command to send files and execute shell commands on a remote system.

Syntax:

sum -I Remote_INB --oi <OS ip or host name> --ou <OS username> [--op <OS

password> | -os_key <OS private key> -os_key_pw <OS private key password>] -c

RemoteExec --remote_cmd <shell command> [--file <file name>]

Example:

Remote In-Band:

[SUM_HOME]# ./sum -I Remote_INB --oi 192.168.34.57 --ou root --op 111111 -c

RemoteExec --remote_cmd "ls /tmp/ -l | grep test.sh" --file test.sh

[SUM_HOME]# ./sum -I Remote_INB --oi 192.168.34.57 --ou root --os_key privatekey

--os_key_pw privatekey_password -c RemoteExec --remote_cmd "ls /tmp/ -l | grep

test.sh" --file test.sh

Notes:

 The file will be copied to the path "/tmp/" in remote Linux systems.
 The stderr in the remote Linux system will be redirected to stdout.
 For use with approved third-party tools, please refer to Appendix K. Using SUM to Run
3rd -Party Tools.

Supermicro Update Manager User’s Guide 353


5.7.12 Managing Redfish Host Interface
Use the “ManageRHI” command to switch USB connection to the CDC-ECM or RNDIS mode.

Syntax:
sum [-i <IP or host name> -u <username> -p <password>] -c ManageRHI --action
<GetConnection | SetConnection> [--type <RNDIS | CDC_ECM>]

Example:
OOB:
[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c ManageRHI --action
GetConnection
[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c ManageRHI --action
SetConnection
--type RNDIS
In-band:
[SUM_HOME]# ./sum -c ManageRHI --action GetConnection
[SUM_HOME]# ./sum -c ManageRHI --action SetConnection --type CDC_ECM

5.8 Storage Management for a Single System


5.8.1 Getting RAID Firmware Image Information

Use the “GetRaidControllerInfo” command to get the RAID firmware image information from the managed
system or the RAID firmware image.

Syntax:

sum [[-i <IP or host name> | -I Redfish_HI] -u <username> -p <password>] -c

GetRaidControllerInfo [--file <filename> [--file_only]] [--controller <Broadcom

or Marvell>] [--dev_id <controller_id>]

Example:

Supermicro Update Manager User’s Guide 354


OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c GetRaidControllerInfo

--file RAID.rom

In-band:

[SUM_HOME]# ./sum -c GetRaidControllerInfo --file RAID.rom

[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p PASSWORD -c GetRaidControllerInfo --

file RAID.rom --controller Broadcom --dev_id 0

The console output contains the following information.

Managed System........................ 192.168.34.56

Device ID............................. Device 0

Product Name.......................... AVAGO 3108 MegaRAID

Serial................................ N/A

Package............................... 24.18.0-0021

Firmware Version...................... 4.670.00-6500

BIOS Version.......................... 6.34.01.0_4.19.08.00_0x06160200

Boot Block Version.................... 3.07.00.00-0003

Local RAID Firmware Image File........ AVAGO_3108_4.680.00-8290.rom

Product Name.......................... AVAGO 3108 MegaRAID

Package............................... 24.21.0-0028

Firmware Version...................... 4.680.00-8290

BIOS Version.......................... 6.36.00.2_4.19.08.00_0x06180202

Boot Block Version.................... 3.07.00.00-0003

In-band:

[SUM_HOME]# ./sum -c GetRaidControllerInfo --file RAID.rom --file_only

The console output contains the following information.


Supermicro Update Manager User’s Guide 355
Local RAID Firmware Image File........ AVAGO_3108_4.680.00-8290.rom

Product Name.......................... AVAGO 3108 MegaRAID

Package............................... 24.21.0-0028

Firmware Version...................... 4.680.00-8290

BIOS Version.......................... 6.36.00.2_4.19.08.00_0x06180202

Boot Block Version.................... 3.07.00.00-0003

Notes:

• For X11 platforms, the “GetRaidControllerInfo” command only supports Broadcom 3108.
• For X12 and later platforms, the “GetRaidControllerInfo” command only supports
Broadcom 3108, 3808, 3816, 3908, 3916, and Marvell SE9230.

Supermicro Update Manager User’s Guide 356


5.8.2 Updating the RAID Firmware Image

Use the command UpdateRaidController with RAID firmware image RAID.rom to update the managed
system.

Notes:

• For X11 platforms, the “UpdateRaidController” command only supports Broadcom 3108.
• For X12 and later platforms, the “UpdateRaidController” command only supports
Broadcom 3108, 3808, 3816, 3908, 3916, and Marvell SE9230.
• Broadom 3108 is supported by the following firmware images:
o RAID firmware image of version 4.650.00-8095 and later.
o For X10 Intel® Xeon® Processor E5 v3/v4 Product Family platform, BMC firmware
images of version REDFISH 3.52 and later.
o For X11 Intel® Xeon® Processor E3-1200 v5 Product Family platform, BMC
firmware images of version ATEN X11 1.33 and later.
o For X11 Intel® Xeon® Scalable Processors with Intel® C620 Series Chipsets
platform, BMC firmware images of version ATEN X11DP 1.10 and later.
o Supported on X12 and later platforms.

Syntax:

sum [[-i <IP or host name> | -I Redfish_HI] -u <username> -p <password>] -c

UpdateRaidController --file <filename> --controller <Broadcom or Marvell> --

dev_id <RAID controller device ID> [--reboot]

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c UpdateRaidController

--controller Broadcom --dev_id 0 --file RAID.rom --reboot

In-band:

[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p PASSWORD -c UpdateRaidController --

controller Marvell --dev_id 0 --file RAID.rom --reboot

Supermicro Update Manager User’s Guide 357


5.8.3 Getting RAID Settings

Use the “GetRaidCfg” command to execute SUM to get the current RAID settings from the managed system
and save it in the RAIDCfg.xml file.

Notes:

 The received tables/elements between the two managed systems might not be
identical. Only the supported tables/elements for the managed system will be received.

 The SUM cannot get or change the RAID configurations of JBOD mode setting under the
Controller Properties in an in-band enviroment.

Syntax:

sum [-i <IP or host name> -u <username> -p <password>] -c GetRaidCfg --file

<RAIDCfg.xml> [--overwrite]

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c GetRaidCfg --file

RAIDCfg.xml --overwrite

In-band:

[SUM_HOME]# ./sum -c GetRaidCfg --file RAIDCfg.xml --overwrite

Supermicro Update Manager User’s Guide 358


5.8.4 Updating RAID Settings

1. Follow the steps in 5.8.3 Getting RAID Settings.


2. Edit the configurable element values in the RAID configuration text file RAIDCfg.xml as illustrated in
4.7 RAID Configuration XML File format.
3. Set the Action attribute as “None” to skip the unchanged tables in the text file. Note that this step is
optional.
4. Remove the unchanged tables/elements in the text file. Note that this step is optional.
5. Use the “ChangeRaidCfg” command with the updated RAIDCfg.xml file to run SUM to update the RAID
configuration.

Syntax:

sum [-i <IP or host name> -u <username> -p <password>] -c ChangeRaidCfg --file

<RAIDCfg.xml>

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c ChangeRaidCfg --file

RAIDCfg.xml

In-band:

[SUM_HOME]# ./sum -c ChangeRaidCfg --file RAIDCfg.xml

Supermicro Update Manager User’s Guide 359


5.8.5 Getting SATA HDD Information (OOB Only)

Use the “GetSataInfo” command to get the current SATA HDD information under on-board AHCI controller
from the managed system.

Syntax:

sum -i <IP or host name> -u <username> -p <password> -c GetSataInfo

Example:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c GetSataInfo

The console output contains the following information.

SATA HDD Information

====================

[HDD(0)]

Controller Name: PCH SATA

Configuration Type: AHCI

Slot ID: 0

Slot Populated: Yes

Model Name: INTEL SSDSC2BB120G4

Serial Number: PHWL542502J2120LGN

HDD Firmware Version: D201037

S.M.A.R.T. Supported: Yes

Supermicro Update Manager User’s Guide 360


5.8.6 Getting NVMe Information

Use the “GetNvmeInfo” command to get the current NVMe information from the managed system.

Syntax:

sum -i <IP or host name> -u <username> -p <password> -c GetNvmeInfo [--dev_id

<device_id> ]

Example:

[SUM_HOME]# ./sum -i 192.168.3.4 -u ADMIN -p PASSWORD -c GetNvmeInfo --dev_id 0

The console output contains the following information.

NVMe Device information


=======================
[NVMe Controller(1)]
Device ID: 0
[Group(1)]
Group ID: 0
[NVMe SSD(1)]
Slot: 0
Temperature: 37 degree C
Device Class: Mass storage controller
Device SubClass: Non-Volatile memory controller
Device Program Interface: NVM express
Vendor Name: Samsung Electronics Co., Ltd.
Serial Number: S1NONYAF800079
Model Number: MZWEI400HAGM-0003
Port 0 Max Link Speed: 8 GT/s
Port 0 Max Link Width: x4
Port 1 Max Link Speed: N/A
Port 1 Max Link Width: N/A
Initial Power Requirement: 10 Watts
Max Power Requirement: 25 Watts
Located Status: Not Located

Supermicro Update Manager User’s Guide 361


5.8.7 Secure Erasing Hard Disks

Use the “SecureEraseDisk” command to have SUM securely erase an HDD on the managed system. After a
secure erase is complete, the HDD is formatted, and its password is cleared. An HDD without a password
installed can be securely erased directly without a password or PSID. It is recommended that an HDD
password should be immediately installed after the HDD is securely erased. The “SecureEraseDisk”
command can be used to install the HDD password if no passwords are installed on the HDD.

Currently, SUM supports the secure-erase feature in three security modes: TCG, SAT3 and Not TCG/SAT3
Supported. The supported actions of SecureEraseDisk command are shown in the following table.

Security Mode Action Description


TCG Supported SetPassword Sets an HDD password
ChangePassword Changes the HDD password
ClearPassword Clears the HDD password
SecurityErase Erases a device without an HDD password installed.
If an HDD password is installed, the device cannot be erased.
SecurityErasePWD Erases a device with an HDD password.
SecurityErasePSID Erases a device with PSID.
SAT3 Supported SetPassword Sets up an HDD password.
ChangePassword Changes the HDD password
ClearPassword Clears the HDD password
SecurityErase Erases a device without an HDD password installed.
If an HDD password is installed, a device cannot be erased.
SecurityErasePWD Erases a device with an HDD password.
An HDD password must be installed before secure erase.
Not TCG/SAT3 SecurityErase Erases a device without an HDD password installed.
Supported If an HDD password is installed, a device cannot be erased.
The SecureEraseDisk command needs two format types of input files for different types of secure erase:

 PSID.txt: serial number;PSID. Note that a PSID can be found on the sticker of a TCG device.

 Password.txt: serial number; password; new_password. Note that the “new_password” is required
for the action ChangePassword. This field is optional for other actions.

SUM maps the PSID and password to the target HDD on the managed system automatically based on serial
numbers. The following is an example of PSID.txt and Password.txt:

Assume there is a system installed with one SAT3 supported device and one TCG supported device:
Security Serial Number PSID Password New

Supermicro Update Manager User’s Guide 362


Mode Password
SAT3 9XF4AF7M N/A 123456 111111
TCG W472TJXH HR1MJDCKLH4CD88ELEGDUE5J4UA3QGZZ 123456 111111
PSID.txt
W472TJXH; HR1MJDCKLH4CD88ELEGDUE5J4UA3QGZZ

Password.txt
9XF4AF7M; 123456; 111111

W472TJXH; 123456; 111111

5.8.7.1 Execution Modes

The SecureEraseDisk command has two execution modes: Action Mode and Pre-check Mode.
 Action Mode: Action mode supports the following actions, requiring the managed system to be
reboot for changes to take effect.
○ SetPassword: Sets an HDD password.
○ ChangePassword: Changes the HDD password.
○ ClearPassword: Clears the HDD password.
○ SecurityErase: Securely erases the HDD with no password installed.
○ SecurityErasePWD: Securely erases the HDD with the installed HDD password.
○ SecurityErasePSID: Securely erases the HDD with a PSID.
 Pre-check Mode shows the information below.
○ HDD Password Status: Shows if a password is installed on the HDD.
○ Security Mode: Shows the security mode that HDD supports and indicates supported actions by
the device.
○ TCG Device Type: Shows the device type for the TCG supported HDD.
○ Applicable Actions: Shows the actions which can be executed on the HDD.
○ Estimated Execution Time for Secure Erase: Shows the estimated execution time for securely
erasing one or more HDDs on the managed system.
○ No Matched HDDs: This type of information is recorded in a text file named PreCheckFile. No
matched HDDs could be a result of failed matches between HDDs in the serial number mapping
file and the managed system.
It is recommended that the pre-check mode should be run before a secure erase. Note that some types of
HDDs take a longer time to be securely erased, and an HDD can only be securely erased after another erase
task is finished.

Supermicro Update Manager User’s Guide 363


5.8.7.2 Securely Erasing an HDD

1. Run the command to check the HDD supported actions and get the erase time. The file “PreCheckfile”
will be created, whichincludes all unmapped hard disks. Note that the PSID.txt is only supported by
TGC devices.
./sum -i IP -u ADMIN -p PASSWORD -c SecureEraseDisk --file PSID.txt --

precheck

./sum -i IP -u ADMIN -p PASSWORD -c SecureEraseDisk --file Password.txt --

precheck

Managed system............192.168.34.56

[HDD]

Serial Number ..................9XF4AF7M

Password Status ................NOT INSTALLED

Security Mode ..................SAT3 Supported

Applicable Action..............SetPassword

..............SecurityErase

[HDD]

Serial Number..................W472TJXH

Password Status................NOT INSTALLED

Security Mode..................TCG Supported

TCG Device Type................TCG-Enterprise

Applicable Action..............SetPassword

..............SecurityErase

Estimated security erase time......2 Minutes

Please check PreCheckFile for the mismatched HDDs.

2. Run the command based on the precheck result to securely erase an HDD. The action SecurityErase
can accept both PSID.txt and Password.txt as an input file.
./sum -i IP -u ADMIN -p PASSWORD -c SecureEraseDisk --file PSID.txt --action

SecurityErasePSID --reboot

Supermicro Update Manager User’s Guide 364


./sum -i IP -u ADMIN -p PASSWORD -c SecureEraseDisk --file Password.txt --

action SecurityErasePWD --reboot

3. The monitoring result of the managed system appears.

After the task is complete, use the SUM GetCurrentBiosCfg command to check the result through
BIOS configurations. Find the status code in the configuration file in xml format by “Last Status Code.”
A status code of zero indicates the previous task was successful.
For details on the “GetCurrentBiosCfg” command, see 5.3.3 Getting Current BIOS Settings.
5.8.7.3 Setting an HDD Password
1. Run the command to check the HDD supported actions. Note that another password cannot be
assigned to an HDD with a password already installed. The file “PreCheckfile” will be created, which
includes all unmapped HDDs.
./sum -i IP -u ADMIN -p PASSWORD -c SecureEraseDisk --file Password.txt --

precheck

Managed system............192.168.34.56

[HDD]

Serial Number ..................9XF4AF7M

Password Status ................NOT INSTALLED

Security Mode ..................SAT3 Supported

Applicable Action..............SetPassword

..............SecurityErase

[HDD]

Serial Number..................W472TJXH

Password Status................NOT INSTALLED

Security Mode..................TCG Supported

TCG Device Type................TCG-Enterprise

Applicable Action..............SetPassword

Supermicro Update Manager User’s Guide 365


..............SecurityErase

Estimated security erase time......2 Minutes

Please check the PreCheckFile for the mismatched HDDs.

2. Run the command to set an HDD password.

./sum -i IP -u ADMIN -p PASSWORD -c SecureEraseDisk --file Password.txt --

action SetPassword --reboot

3. The monitoring result of the managed system appears.

4. After the task is complete, to check the execution result, run the SUM GetCurrentBiosCfg command
(see 5.3.3 Getting Current BIOS Settings), and then type Text = “Last Status Code” to find the status
code in the BIOS configurations.
A status code of zero indicates the previous task was successful. For non-zero status codes, please
refer to Appendix D - Status Codes in UEFI Specification 2.8.

Syntax:

sum [-i <IP or host name> -u <username> -p <password>] -c SecureEraseDisk [[--

current_password <current password>] | [--cur_pw_file <current password file path>]] --file


<filename> [[--action <action> --reboot] | [--precheck]]

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c SecureEraseDisk --

file Password.txt --precheck

Supermicro Update Manager User’s Guide 366


[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c SecureEraseDisk --

file Password.txt --action SetPassword --reboot

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c SecureEraseDisk --

file Password.txt --action SecurityErase --reboot

In-Band:

[SUM_HOME]# ./sum -c SecureEraseDisk --file PSID.txt --precheck

[SUM_HOME]# ./sum -c SecureEraseDisk --file Password.txt --action


SecurityErasePWD --reboot

[SUM_HOME]# ./sum -c SecureEraseDisk --file PSID.txt --action SecurityErasePSID


--reboot

The console output for --precheck option contains the following information.

Managed system............192.168.34.56
[HDD]
Serial Number ..................S45RNE0M600194
Password Status ................NOT INSTALLED
Security Mode ..................SAT3 Supported
Applicable Action..............SetPassword
..............SecurityErase
[HDD]
Serial Number..................W472TJXH
Password Status................INSTALLED
Security Mode..................TCG Supported
TCG Device Type................TCG-Enterprise
Applicable Action..............SecurityErasePWD
..............SecurityErasePSID
..............ChangePassword
..............ClearPassword
Estimated security erase time......33 Minutes
Please check PreCheckFile for the mismatched HDDs.

Supermicro Update Manager User’s Guide 367


Notes:

 A Password/PSID file follows the CSV format with; (a semicolon).


 The SecureEraseDisk command requires either of the --action or --precheck options.
 By default, the NVMe vendor’s driver will be loaded by BIOS to provide more
information, but when loaded, the storage cannot be securely erased by BIOS. The user
needs to switch to the native AMI driver manually by changing the BIOS setting “NVMe
Firmware Source” to “AMI Native Support.” If there is no “NVMe Firmware Source”
setting under BIOS configuration, please try to change the BIOS setting “Onboard
NVMe Option ROM” to “Disabled.”
 An HDD without a password installed can be securely erased without a password or a
PSID, so it is recommended that a password be assigned to the hard disk.
 Another password cannot be assigned to the HDD with a password installed by
SetPassword action.
 Some BIOS may be in the Security Mode: “NONE.” This is the same as “Not TCG/SAT3
Supported.”
 There are limitations for some BIOS:
o TCG supported devices can only be securely erased by the command
“SecurityErasePSID.”
o SAT3 supported devices can only be securely erased by the command
“SecurityErasePWD,” and the HDD password has to be installed before the HDD is
erased.
o Some BIOS might not support security features for “Not TCG/SAT3 Supported”
device.
 The estimated time length for securely erasing an HDD:
o 500GB SATA HDD: 98 minutes
o 128GB SSD: 2 minutes
o 512GB NVMe: a few seconds
 The SecureEraseDisk command is supported by the following platforms:
o X11 2nd Generation Intel® Xeon® Scalable Processors with Intel® C620 Series
Chipsets
o X11 8th/9th Generation Intel® CoreTMi3/Pentium®/Celeron® Processor, X11
Intel® Xeon® E-2100 Processor and X11 Intel® Xeon® E-2200 Processor with Intel®
C246/C242 chipset
o H11 AMD EPYC
o X12/H12 and later platforms

Supermicro Update Manager User’s Guide 368


5.8.8 Securely Erasing Hard Disks in RAID Controller

Use the “SecureEraseRaidHdd” command to execute SUM to securely erase hard disks (HDD or SSD) in the
target RAID controller system and poll the erasing status asynchronously or synchronously.

Syntax:

1. sum -i <IP or host name> -u <username> -p <password> -c SecureEraseRaidHdd

--precheck

2. sum -i <IP or host name> -u <username> -p <password> -c SecureEraseRaidHdd

--dev_id <device_id> --enc_id <enclosure id> --dsk_id <disk id> [--sync] [--type

<BRCM_IT|BRCM_IR>]

3. sum -i <IP or host name> -u <username> -p <password> -c SecureEraseRaidHdd

--tsk_id <task id> [--sync]

To securely erase HDDs in the RAID controller system, follow these steps.

1. Execute the “GetRaidCfg” command to confirm the JBOD mode of the RAID controller system is in
“Disabled” state, and the disks to be erased in the RAID controller system are in “Unconfigured good
drive” state. After checking, you can decide your target physical disk ID(s) based on the configuration
in the RAID controller system. Also, you can use --precheck option to see the model, manufacturer
and ID of RAID card, enclosure ID, disk ID, and the F/W state and Secure-Erase support on each disk.

Syntax:

sum -i <IP or host name> -u <username> -p <password> -c SecureEraseRaidHdd

--precheck

Example:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c SecureEraseRaidHdd

--precheck

Supermicro Update Manager User’s Guide 369


The console output contains the following information.

Supermicro Update Manager (for UEFI BIOS) 2.12.0 (2023/06/13) (x86_64)

Copyright(C) 2013-2023 Super Micro Computer, Inc. All rights reserved.

Dev_ID Enc_ID Dsk_ID Manufacturer Model FW Status Support Erase Status

------ ------ ------ ------------ --------------- ---------------------------- --------------------

0 0 0 Broadcom SAS 3808 Unconfigured good drive Yes

0 0 1 Broadcom SAS 3808 Unconfigured good drive Yes

0 0 2 Broadcom SAS 3808 Unconfigured good drive Yes

2. Follow the rule below to erase your target physical disk(s) listed in the RAID controller system.

Syntax:

sum -i <IP or host name> -u <username> -p <password> -c SecureEraseRaidHdd

--dev_id <device_id> --enc_id <enclosure id> --dsk_id <disk id> [--sync] [--type

<BRCM_IT|BRCM_IR>]

Example:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c SecureEraseRaidHdd

--dev_id 0 --enc_id 0,1 --dsk_id 0,1,2,3

The console output contains the following information.

Supermicro Update Manager (for UEFI BIOS) 2.6.0 (2021/04/29) (x86_64)

Copyright(C) 2013-2022 Super Micro Computer, Inc. All rights reserved.

Supermicro Update Manager User’s Guide 370


Warning: Please make sure the F/W State of each disk is in "Unconfigured good

drive" state.

Otherwise, please

1 Delete your virtual disk(VD) if any.

Or

(2) Disable JBOD mode if set before.

Checking FW state of each disk...

The F/W STATE of EACH DISK :

[--dev_id:--enc_id:--dsk_id] : F/W State

[ 0: 0: 0] : Unconfigured good drive

[ 0: 0: 1] : Unconfigured good drive

[ 0: 0: 2] : Configured-drive is online

[ 0: 0: 3] : Configured-drive is online

[ 0: 1: 0] : Unconfigured good drive

[ 0: 1: 1] : Unconfigured good drive

********************************<<<<<ERROR>>>>>*********************************

ExitCode = 153
Description = IPMI execution on non-supported device
Program Error Code = 440.21
Error message:
The F/W state:
Enclosure ID: 0 Disk ID: 2
Enclosure ID: 0 Disk ID: 3
are not allowed to be securely erased.

Supermicro Update Manager User’s Guide 371


Instruction:
Please check the F/W state of unallowed disks and try again.

********************************************************************************

SUM will check the firmware state of each target disk first. If the status is not “Unconfigured good drive,”
the execution will stop. After double-checking the target disks’ firmware state and running the same
command again, the output will list results of all target disks with their task IDs and messages. There are
three types of result messages for different HW/FW situations. The result levels are from good to bad and
marked in blue, orange, and red colors.

Situation
Result
Messages Secure
Erase RAID Controller Configured Target Disk Firmware State
of Secure BMC Error Response
Erase Already JBOD Mode as VD
Started
“Start
polling NO Disabled NO NO Unconfigured good drive
progress.”
“Already
started
YES Disabled NO NO Unconfigured good drive
polling
progress.”
“Action
F/W State is not
not
“Unconfigured good drive”
allowed.
(Ex.: Unconfigured Bad
Please
NO Enabled YES YES Drive./Drive is exposed and
check the
controlled by a host./ The
controller
configured drive is
or disk
online…etc)
status.”

Supermicro Update Manager User’s Guide 372


The following table lists RAID cards supported by Secure-Erase in SUM:

Model Controller

AOC-S3108L-H8iR(-16DD) Broadcom SAS 3108

AOC-SLG3-2H8M2 Broadcom SAS 3408

AOC-S3808L-L8iR Broadcom SAS 3808

AOC-S3816L-L16iR Broadcom SAS 3816

AOC-S3908L-H8iR(-16DD/-32DD) Broadcom SAS 3908

AOC-S3916L-H16iR(-32DD) Broadcom SAS 3916

AOC-S3808L-L8iT1 Broadcom SAS 3808

AOC-S3816L-L16iT1 Broadcom SAS 3816

If the target disk is accepted for secure erase or it is being securely erased, there will be a task ID. If the
target disk is not allowed for secure erase, there is no task ID. Please remember the task ID(s) for further
polling status purpose.

You can also poll the erasing status right after issuing the command by appending --sync option after the
command “SecureEraseRaidHdd”.

Example:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c SecureEraseRaidHdd

--dev_id 0 --enc_id ALL --dsk_id 0,1,2,3 --sync

Notes:

• The Secure-Erase function for IT/HBA RAID controller is only supported with OEM
firmware.
• For Windows, the argument value can be put into either double quotation marks or
not, .e.g., --enc_id “ALL” or --enc_id ALL.

Supermicro Update Manager User’s Guide 373


The console output contains the following information.

Supermicro Update Manager (for UEFI BIOS) 2.6.0 (2021/04/29) (x86_64)

Copyright(C) 2013-2022 Super Micro Computer, Inc. All rights reserved.

Warning: Please make sure the F/W State of each disk is in "Unconfigured good

drive".

Otherwise, please

(1) Delete your virtual disk(VD) if any.

Or

(2) Disable JBOD mode if set before.

Checking FW state of each disk...

The F/W STATE of EACH DISK :

[--dev_id:--enc_id:--dsk_id] : F/W State

[ 0: 0: 0] : Unconfigured good drive

[ 0: 0: 1] : Unconfigured good drive

[ 0: 0: 2] : Unconfigured good drive

[ 0: 0: 3] : Unconfigured good drive

[ 0: 1: 0] : Unconfigured good drive

[ 0: 1: 1] : Unconfigured good drive

................................

SECURE ERASE RESPONSE :

[--dev_id:--enc_id:--dsk_id:--tsk_id] : MESSAGE

Supermicro Update Manager User’s Guide 374


[ 0: 0: 0: 1] : Already started polling progress.

[ 0: 0: 1: 2] : Already started polling progress.

[ 0: 0: 2: 3] : Start polling progress.

[ 0: 0: 3: 4] : Start polling progress.

[ 0: 1: 0: 5] : Start polling progress.

[ 0: 1: 1: 6] : Start polling progress.

Secure-Erase progress is starting...

-------------------------RAID Controller Task Service-------------------------

Tsk | Raid | Enc | Dsk | Progress | State | Start Time | Elapsed |

1 | 0 | 0 | 0 | 72% | Running | 12:53:43 | |

2 | 0 | 0 | 1 | 73% | Running | 12:54:17 | |

3 | 0 | 0 | 2 | 4% | Running | 14:32:47 | |

4 | 0 | 0 | 3 | 4% | Running | 14:32:55 | |

5 | 0 | 1 | 0 | 4% | Running | 14:33:17 | |

6 | 0 | 1 | 1 | 4% | Running | 14:33:25 | |

Polling progress...

3. Execute the “SecureEraseRaidHdd” command with the --tsk_id option below to check the erasing
status of target disk(s) in the RAID system.

Syntax:

sum -i <IP or host name> -u <username> -p <password> -c SecureEraseRaidHdd

--tsk_id <task id> [--sync]

Supermicro Update Manager User’s Guide 375


Example:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c SecureEraseRaidHdd

--tsk_id 1,2,3,4,5,6 --sync

The console output contains the following information.

Supermicro Update Manager (for UEFI BIOS) 2.6.0 (2021/04/29) (x86_64)

Copyright(C) 2013-2022 Super Micro Computer, Inc. All rights reserved.

-------------------------RAID Controller Task Service-------------------------

Tsk | Raid | Enc | Dsk | Progress | State | Start Time | Elapsed |

1 | 0 | 0 | 0 | 74% | Running | 12:53:43 | |

2 | 0 | 0 | 1 | 75% | Running | 12:54:17 | |

3 | 0 | 0 | 2 | 8% | Running | 14:32:47 | |

4 | 0 | 0 | 3 | 8% | Running | 14:32:55 | |

5 | 0 | 1 | 0 | 7% | Running | 14:33:17 | |

6 | 0 | 1 | 1 | 7% | Running | 14:33:25 | |

Polling progress...

If the task status becomes “Completed,” the start and elapsed time of task will appear on the console
output.

Example:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c SecureEraseRaidHdd

--tsk_id 1,2,3,4,5,6 --sync

The console output contains the following information.

Supermicro Update Manager User’s Guide 376


Supermicro Update Manager (for UEFI BIOS) 2.6.0 (2021/04/29) (x86_64)

Copyright(C) 2013-2022 Super Micro Computer, Inc. All rights reserved.

-------------------------RAID Controller Task Service-------------------------

Tsk | Raid | Enc | Dsk | Progress | State | Start Time | Elapsed |

1 | 0 | 0 | 0 | 100% | Completed | 12:53:43 | 02:44:13 |

2 | 0 | 0 | 1 | 100% | Completed | 12:54:17 | 02:44:13 |

3 | 0 | 0 | 2 | 100% | Completed | 14:32:47 | 02:45:13 |

4 | 0 | 0 | 3 | 100% | Completed | 14:32:55 | 02:45:13 |

5 | 0 | 1 | 0 | 100% | Completed | 14:33:17 | 02:46:13 |

6 | 0 | 1 | 1 | 100% | Completed | 14:33:25 | 02:46:13 |

Secure-Erase progress Done.

To abort secure erase HDDs action of the target disk(s) in the RAID controller system, follow these two
steps as below.

1. Execute the “SecureEraseRaidHdd” command to erase the target disk(s) in the RAID system.

2. Execute the “SecureEraseRaidHdd” command with --abort option below to stop the currently erasing
target disk(s) in the RAID system.

Syntax:

sum -i <IP or host name> -u <username> -p <password> -c SecureEraseRaidHdd

--dev_id <device_id> --enc_id <enclosure id> --dsk_id <disk id> --abort

Example:

Supermicro Update Manager User’s Guide 377


[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c SecureEraseRaidHdd

--dev_id 0 --enc_id 0 --dsk_id 2,3 –-abort

The console output contains the following information.

Example:

Supermicro Update Manager (for UEFI BIOS) 2.12.0 (2023/06/15) (x86_64)

Copyright(C) 2013-2023 Super Micro Computer, Inc. All rights reserved.

Warning : Please make sure the F/W state of each disk is in "Unconfigured good

drive".

Otherwise, please

(1) Delete your virtual disk(VD) if any.

Or

(2) Disable JBOD mode if set before.

Checking the F/W state of each disk...

....The F/W STATE of EACH DISK :

[--dev_id:--enc_id:--dsk_id] : F/W State

[ 0: 0: 2] : Unconfigured good drive

[ 0: 0: 3] : Unconfigured good drive

Start aborting securely erasing each disk...

.......Finish aborting Secure-Erase progress.

Example:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c SecureEraseRaidHdd

Supermicro Update Manager User’s Guide 378


--dev_id 0 --enc_id 0 --dsk_id 0,1 –-abort

The console output contains the following information.

Supermicro Update Manager (for UEFI BIOS) 2.12.0 (2023/06/13) (x86_64)

Copyright(C) 2013-2023 Super Micro Computer, Inc. All rights reserved.

....Warning : Please make sure the F/W state of each disk is in "Unconfigured

good drive".

Otherwise, please

(1) Delete your virtual disk(VD) if any.

Or

(2) Disable JBOD mode if set before.

Checking the F/W state of each disk...

The F/W STATE of EACH DISK :

[--dev_id:--enc_id:--dsk_id] : F/W State

[ 0: 0: 0] : Unconfigured good drive

[ 0: 0: 1] : Unconfigured good drive

Start aborting securely erasing each disk...

********************************<<<<<ERROR>>>>>*********************************

ExitCode = 120

Description = Invalid Redfish response

Program Error Code = 440.24

Supermicro Update Manager User’s Guide 379


Error message:

The following disk list fail to abort for Secure Erase action.

The list format is [--dev_id:--enc_id:--dsk_id]

1. [0:0:1]

********************************************************************************

SUM will check the list of target disk(s) for aborting process and display the success prompt when all the
target disks can be successfully aborted. When the target disk(s) cannot execute abort action, SUM will
show the list of the target disk(s) to notify user.

Note: The SecureEraseRaidHdd command is supported on X12/H12 and later


platforms.

Supermicro Update Manager User’s Guide 380


5.8.9 Getting PMem Firmware Image Information

Use the “GetPMemInfo” command to get the PMem firmware image information from the managed
system as well as the local PMem firmware image (with the --file option).

Syntax:

sum [[-i <IP or host name> | -I Redfish_HI] -u <username> -p <password>] -c

GetPMemInfo [--file <filename> [--file_only]]

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c GetPMemInfo

The console output contains the following information.

Managed system................192.168.34.56

PMem version..............2.2.0.1464

In-Band:

[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p PASSWORD -c GetPMemInfo --file

PMem.bin

The console output contains the following information.

Managed system................169.254.3.254
PMem version..............2.2.0.1464
Local PMem image file.........PMem.bin
PMem version..............2.2.0.1469

[SUM_HOME]# ./sum -c GetPMemInfo --file PMem.bin --file_only

The console output contains the following information.

Local PMem image file..........PMem.bin


PMem version...............2.2.0.1469

Supermicro Update Manager User’s Guide 381


Notes:

 This command is available on X12 3rd Gen Intel® Xeon® Scalable processors with Intel®
C621A Series Chipsets and later platforms.
 The PMem firmware version retrieved from the “GetPMemInfo” command is the
running PMem firmware version.
 For more detailed usages of PMem, please contact the technical support of
Supermicro.

Supermicro Update Manager User’s Guide 382


5.8.10 Updating the PMem Firmware Image

Use the “UpdatePMem” command with the PMem firmware image PMem.bin to run SUM to update the
PMem of managed system.

Syntax:

sum [[-i <IP or host name> | -I Redfish_HI] -u <username> -p <password>] -c

UpdatePMem [[--file <filename>] | [--restore_default_fw]] [[--current_password <current

password>] | [--cur_pw_file <current password file path>]] [--reboot]

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c UpdatePMem --file

PMem.bin --reboot

In-Band:

[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p PASSWORD -c UpdatePMem --file

PMem.bin --reboot

[SUM_HOME]# ./sum -c UpdatePMem --restore_default_fw --reboot

Notes:

 This command is available on the X12 3rd Gen Intel® Xeon® Scalable processors with
Intel® C621A Series Chipsets and later platforms.
 For more detailed usages of PMem, please contact the technical support of
Supermicro.

Supermicro Update Manager User’s Guide 383


5.8.11 Getting VROC Settings

Use the “GetVROCCfg” command to execute SUM to get the current VROC settings from the managed
system and save it in the VROC.cfg.xml file.

Notes:

 The received tables/elements between the two managed systems might not be
identical. Only the supported tables/elements for the managed system will be received.

 To use the “GetVROCCfg” command, ensure that the “NVME Mode Switch” in the BIOS
settingis set to “VMD.” .

 Host software in target system OS is required for VROC related commands.

 To use VROC related commands, the target system must boot into the OS.

 VROC related commands have been tested on Red Hat Enterprise Linux 8.1.

Syntax:

sum [<-i <IP or host name> | -I <Redfish_HI>> -u <username> -p <password>] -c

GetVROCCfg [--file <VROC.cfg.xml> [--overwrite]]

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c GetVROCCfg --file

VROC.cfg.xml --overwrite

In-band:

[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p PASSWORD -c GetVROCCfg --file

VROC.cfg.xml --overwrite

Supermicro Update Manager User’s Guide 384


5.8.12 Updating VROC Settings

1. Follow the steps in 5.8.11 Getting VROC Settings.


2. Edit the configurable element values in the VROC configuration XML file VROC.cfg.xml as illustrated in
4.11 Format of the VROC Configuration XML File.
3. Set the Action attribute as “None” to skip the unchanged tables in the XML file. Note that this step is
optional.
4. Remove the unchanged tables/elements in the XML file. Note that this step is optional.
5. Use the “ChangeVROCCfg” command with the updated VROC.cfg.xml file to run SUM to update the
VROC configuration.

Syntax:

sum [<-i <IP or host name> | -I <Redfish_HI>> -u <username> -p <password>] -c

ChangeVROCCfg --file <VROC.cfg.xml>

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c ChangeVROCCfg --file

VROC.cfg.xml

In-band:
[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p PASSWORD -c ChangeVROCCfg --file
VROC.cfg.xml

Supermicro Update Manager User’s Guide 385


5.8.13 Controlling NVMe Device

Use the “ControlNvme” command to locate, insert or remove an NVMe device. You can use the
GetNVMeInfo command to retrieve the required parameters, including device ID, group ID and slot number.
Please see 5.8.6 Getting NVMe Informantion for details. This command supports four actions:

• Locate: locates the device by turning on its LED light.


• StopLocate: stops locating the device by turning off its LED light.
• Insert: inserts the device.
• Remove: removes the device.

Syntax:

sum [-i <IP or host name> -u <username> -p <password>] -c ControlNvme --action

<action> --dev_id <device ID> --group_id <group ID> --slot <slot number>

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.3.4 -u ADMIN -p PASSWORD -c ControlNVMe --action

Locate --dev_id 0 --group_id 0 --slot 0

In-band:

[SUM_HOME]# ./sum -i 192.168.3.4 -c ControlNVMe --action Remove --dev_id 0 --

group_id 0 --slot 1

Supermicro Update Manager User’s Guide 386


5.9 NIC Management for a Single System
5.9.1 Getting Add-On NIC Firmware Image Information

Use the “GetAocNICInfo” command to get the add-on NIC firmware information from the managed system
as well as the add-on NIC local firmware image (with the --file option).

Syntax:

sum [[-i <IP or host name> | -I Redfish_HI] -u <username> -p <password>] -u

<username> -p <password>] -c GetAocNICInfo [--file <filename>] [--file_only] [--

dev_id <add-on NIC device ID >]

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c GetAocNICInfo --file

AOC_NIC.bin

In-Band:

[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p PASSWORD -c GetAocNICInfo --file

AOC_NIC.bin --dev_id 1,2,3

The console output contains the following information.

Add-on Network Interface Card Information


=========================================
Managed system........... 192.168.34.56
AOC NIC ID...............[1]
[General]
AOC NIC Description..NIC device (riser:RSC-W2-66G4)
AOC NIC Manufacturer.Supermicro
AOC NIC Model........AOC-S100GC-i2C
AOC NIC S/N..........WA214S004412
AOC NIC Part Number..AOC-S100GC-i2C
AOC NIC DeviceType...Simulated

Supermicro Update Manager User’s Guide 387


AOC NIC FW version...3.00 (N:06008A7A)
[PCIeInterface]
PCIe Type............Gen4
Maximum PCIe Type....Gen4
Lanes In Use.........16
Maximum Lanes........16

AOC NIC ID...............[2]


[General]
AOC NIC Description..NIC device (riser:RSC-W2-66G4)
AOC NIC Manufacturer.Supermicro
AOC NIC Model........AOC-S100GC-i2C
AOC NIC S/N..........WA20CS001831
AOC NIC Part Number..AOC-S100GC-i2C
AOC NIC DeviceType...Simulated
AOC NIC FW version...3.00 (N:06008A7A)
[PCIeInterface]
PCIe Type............Gen4
Maximum PCIe Type....Gen4
Lanes In Use.........16
Maximum Lanes........16

AOC NIC ID...............[3]


[General]
AOC NIC Description..NIC device (riser:RSC-WR-6)
AOC NIC Manufacturer.Supermicro
AOC NIC Model........AOC-STG-b2T
AOC NIC S/N..........HA209S003222
AOC NIC Part Number..AOC-STG-b2T
AOC NIC DeviceType...Simulated
AOC NIC FW version...20.8.157.0
[PCIeInterface]
PCIe Type............Gen3
Maximum PCIe Type....Gen4
Lanes In Use.........8

Supermicro Update Manager User’s Guide 388


Maximum Lanes........8

Local AOC NIC image file.AOC_NIC.bin


AOC NIC FW version...2.40 (N:04A075E6)

In-Band:

[SUM_HOME]# ./sum -c GetAocNICInfo --file AOC_NIC.bin --file_only

Local AOC NIC image file.AOC_NIC.bin


AOC NIC FW version...2.40 (N:04A075E6)

Note: This command is only available on X12/H12 and later platforms.

Supermicro Update Manager User’s Guide 389


5.9.2 Updating the Add-On NIC Firmware Image

Use the “UpdateAocNIC” command with add-on NIC firmware image AOC_NIC.bin to update the managed
system.

Syntax:

sum [-i <IP or host name> | -I Redfish_HI] -u <username> -p <password> -c

UpdateAocNIC --file <filename> --dev_id <add-on NIC device ID> --reboot [--

post_complete]

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c UpdateAocNIC --file

AOC_NIC.bin --dev_id 1 --reboot --post_complete

In-band:

[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p PASSWORD -c UpdateAocNIC --file

AOC_NIC.bin --dev_id 1 --reboot

Notes:

• This command is only available on X12/H12 and later platforms.


• Use the “GetAocNICInfo” command to check the existing device IDs on the managed
system.
• For information on updatable Add-On NIC card chipsets, refer to the package file,
“PlatformFeatureSupportMatrix.pdf” or consult with SMCI technical support.

Supermicro Update Manager User’s Guide 390


5.10 PSU Management for a Single System
5.10.1 Getting PSU Information

Use the “GetPsuInfo” command to get the current PSU information from the managed system.

Syntax:

sum [-i <IP or host name> -u <username> -p <password>] -c GetPsuInfo

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c GetPsuInfo

In-Band:

[SUM_HOME]# ./sum -c GetPsuInfo

The console output contains the following information.

[Module 1](SlaveAddress = 0x78)


PWS Module Number: PWS-605P-1H
PWS Serial Number: P605A0E39B07611
PWS Revision: REV1.1
PMBus Revision: 0x8B22
Status: [STATUS OK](00h)
AC Input Voltage: 122.00 V
AC Input Current: 0.46 A
DC 12V Output Voltage: 12.38 V
DC 12V Output Current: 4.50 A
Temperature 1: 25 C
Temperature 2: 53 C
Fan 1: 2688 RPM
Fan 2: N/A
DC 12V Output Power: 55 W
AC Input Power: 55 W

Supermicro Update Manager User’s Guide 391


5.10.2 Updating the Signed PSU Firmware Image Requested by OEM

Use the “UpdatePsu” command with a signed PSU firmware image requested by OEM and the PSU slave
address to run SUM to update the managed system.

Syntax:

sum [-i <IP or host name> -u <username> -p <password>] -c UpdatePsu --file

<filename> --address <PSU slave address>

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c UpdatePsu --file

Supermicro_PSU.x0 --address 0x80

In-Band:

[SUM_HOME]# ./sum -c UpdatePsu --file Supermicro_PSU.x0 --address 0x80

Notes:

 During PSU firmware updating process, the updated PSU will be powered off. To use
this command, the system needs to connect to at least two PSUs.
 Slave address of the PSU that needs to be updated can be found by executing the
“GetPsuInfo” command.
 The updated PSU will be rebooted automatically when firmware update completes.
 PSU updated on the system with LCMC is only supported on X11 Intel® Xeon® Scalable
Processors with Intel® C620 Series Chipsets and later platforms.

Supermicro Update Manager User’s Guide 392


5.10.3 Getting Current Power Status of Managed System

Use the “GetPowerStatus” command to get the current power status of the managed system.

Syntax:

sum [-i <IP or host name> -u <username> -p <password>] -c GetPowerStatus

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c GetPowerStatus

The console output contains the following information.

Managed system................192.168.34.56

Power status..............On

In-Band:

[SUM_HOME]# ./sum -c GetPowerStatus

The console output contains the following information.

Managed system................localhost

Power status..............On

Supermicro Update Manager User’s Guide 393


5.10.4 Setting Power Action of Managed System

Use the “SetPowerAction” command to set the type of power action of the managed system.

Syntax:

sum [-i <IP or host name> -u <username> -p <password>] -c SetPowerAction --

action <action> --blade [<Blade_Index> | ALL] [--node <Node Index>]

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c SetPowerAction --

action up

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c SetPowerAction --

action 0

In-Band:

[SUM_HOME]# ./sum -c SetPowerAction --action up

[SUM_HOME]# ./sum -c SetPowerAction --action 0

The console output contains the following information.

Proceeding to power up the managed system.

Supermicro Update Manager User’s Guide 394


5.11 TPM Management for a Single System
Before X11 Intel® Xeon® Scalable Processors with Intel® C620 Series Chipsets, the “TpmProvision”
command can be executed to enable TPM module capabilities and clear TPM module capabilities for the
managed system.

For X11 Intel® Xeon® Scalable Processors with Intel® C620 Series Chipsets and later platforms, through OTA
TPM technologies, the “GetTpmInfo” and “TpmManage” commands can be executed to receive TPM
information and manage TPM, respectively. Since SUM 2.2.0, SUM has two implementations for OTA TPM
management: Intel OTA and Supermicro OTA. Depending on product design, either solution is
implemented for the managed system. Supported OTA solution can be obtained on the output of the
“GetTpmInfo” command. For more detailed information, please contact technical support.

The detailed information of TPM features is listed in the tables below.

Management Interface Supported Node Product Key Required on the


Command Managed System (SFT-OOB-LIC, or
Out-Of-Band In-Band SFT-DCMS-SINGLE)
(Remote) (Local)
TpmProvision Yes No Required
GetTpmInfo (Supermicro OTA) Yes Yes Required
GetTpmInfo (Intel OTA) Yes Yes Required
TpmManage (Supermicro OTA) Yes Yes Required
TpmManage (Intel OTA) Yes Yes Required

HW & FW Compatibility
Without BMC With BMC

Before X11 Intel® X11 Intel® Xeon® Scalable


SUM (OOB & In-Band) Platform supported
Solution Feature Xeon® Scalable Processors with Intel® C620
listed in the “With
Processors with Series Chipsets and later
BMC columns”
Intel® C620 Series platforms
Chipsets platforms

TpmProvision No Yes No
GetTpmInfo (Supermicro OTA) No No Yes
GetTpmInfo (Intel OTA) No No Yes
TpmManage (Supermicro OTA) No No Yes
TpmManage (Intel OTA) No No Yes

Supermicro Update Manager User’s Guide 395


5.11.1 Getting TPM Information

On X11 Intel® Xeon® Scalable Processors with Intel® C620 Series Chipsets and later platforms, use the
“GetTpmInfo” command to get the TPM module information from the managed system.

Syntax:

sum [-i <IP or host name> -u <username> -p <password>] -c GetTpmInfo [--showall]

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c GetTpmInfo --showall

In-Band:

[SUM_HOME]# ./sum -c GetTpmInfo --showall

The console output contains the following information when installing the TPM 1.2 module.

Supermicro Update Manager (for UEFI BIOS) 2.1.0 (2018/02/09) (x86_64)

Copyright(C)2018 Super Micro Computer, Inc. All rights reserved.

Query through Supermicro OTA

TPM Information

================

TXT Support: Yes

TPM Support: dTPM supported

TXT Status: Disabled

dTPM Status: Enabled

fTPM Status: Disabled

TPM Version: TPM 1.2

TPM Provisioned: Yes

TPM Ownership: No

TPM PS NV Index write-protected: No

Supermicro Update Manager User’s Guide 396


TPM AUX NV Index write-protected: No

TPM PO NV Index write-protected: No

TPM Locked: Yes

The following information is displayed only when the command “GetTpmInfo” is

executed with the option “--showall”. Only the Supermicro OTA solution supports

the option “--showall”.

TPM 1.2 PS NV index LCP Definition

===================================

[NV Public Data]

Tag: 0x0018

NV index: 0x50000001

ReadSizeOfSelect: 0x0003

ReadPCRSelect[0]: 0x00

ReadPCRSelect[1]: 0x00

ReadPCRSelect[2]: 0x00

ReadLocalityAtRelease: 0x1F

ReadDigestAtRelease:

00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

00 00 00 00

WriteSizeOfSelect: 0x0003

WritePCRSelect[0]: 0x00

WritePCRSelect[1]: 0x00

WritePCRSelect[2]: 0x00

WriteLocalityAtRelease: 0x1F

WriteDigestAtRelease:

00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

00 00 00 00

Supermicro Update Manager User’s Guide 397


Tag1: 0x0017

Attributes: 0x00002000

bReadSTClear: 0x00

bWriteSTClear: 0x00

bWriteSDefine: 0x01

LCP Policy:

00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

00 00 00 00 00 00 00 00 00 00 00 00 00 20 32 63

66 33 65 39 E1 00 00 00 00 00 00 00 10 0E 39 02

00 00 00 00 88 78

TPM 1.2 AUX NV index LCP Definition

===================================

[NV Public Data]

Tag: 0x0018

NV index: 0x50000003

ReadSizeOfSelect: 0x0003

ReadPCRSelect[0]: 0x00

ReadPCRSelect[1]: 0x00

ReadPCRSelect[2]: 0x00

ReadLocalityAtRelease: 0x1F

ReadDigestAtRelease:

00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

00 00 00 00

WriteSizeOfSelect: 0x0003

WritePCRSelect[0]: 0x00

WritePCRSelect[1]: 0x00

WritePCRSelect[2]: 0x00

WriteLocalityAtRelease: 0x18

Supermicro Update Manager User’s Guide 398


WriteDigestAtRelease:

00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

00 00 00 00

Tag1: 0x0017

Attributes: 0x00000000

bReadSTClear: 0x00

bWriteSTClear: 0x00

bWriteSDefine: 0x00

LCP Policy:

00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

TPM 1.2 PPI NV index LCP Definition

===================================

[NV Public Data]

Tag: 0x0018

NV index: 0x50010000

ReadSizeOfSelect: 0x0003

ReadPCRSelect[0]: 0x00

ReadPCRSelect[1]: 0x00

ReadPCRSelect[2]: 0x00

ReadLocalityAtRelease: 0x1F

ReadDigestAtRelease:

00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

00 00 00 00

Supermicro Update Manager User’s Guide 399


WriteSizeOfSelect: 0x0003

WritePCRSelect[0]: 0x00

WritePCRSelect[1]: 0x00

WritePCRSelect[2]: 0x00

WriteLocalityAtRelease: 0x1F

WriteDigestAtRelease:

00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

00 00 00 00

Tag1: 0x0017

Attributes: 0x00000001

bReadSTClear: 0x00

bWriteSTClear: 0x00

bWriteSDefine: 0x00

LCP Policy:

00 00 00 00 00 00 00 00 00 00

TPM 1.2 Capability Flags

========================

[Volatile Flags]

deactivated: 0

disableForceClear: 0

physicalPresence: 0

physicalPresenceLock: 1

bGlobalLock: 0

[Permanent Flags]

disable: 0

ownership: 1

deactivated: 0

readPubEK: 1

Supermicro Update Manager User’s Guide 400


disableOwnerClear: 0

allowMaintenance: 0

physicalPresenceLifetimeLock: 0

physicalPresenceHWEnable: 0

physicalPresenceCMDEnable: 1

FIPS: 0

enableRevokeEK: 0

nvLocked: 1

tpmEstablished: 0

The console output contains the following information when installing the TPM 2.0 module.

Supermicro Update Manager (for UEFI BIOS) 2.1.0 (2018/02/09) (x86_64)

Copyright(C)2018 Super Micro Computer, Inc. All rights reserved.

Query through Supermicro OTA

TPM Information

================

TXT Support: Yes

TPM Support: dTPM supported

TXT Status: Enabled

dTPM Status: Enabled

fTPM Status: Disabled

TPM Version: TPM 2.0

TPM Provisioned: Yes

TPM Ownership: No

TPM PS NV Index write-protected: No

TPM AUX NV Index write-protected: No

TPM PO NV Index write-protected: No

Supermicro Update Manager User’s Guide 401


The following information is displayed only when the GetTpmInfo is executed with

option “--showall”. Only Supermicro OTA solution supports option “--showall”.

TPM 2.0 PS NV index LCP Definition

==========================

[NV Public Data]

NvIndex: 0x01C10103

NameAlg: SHA256

Attributes: 0x62040408

PPWrite: 0

OWNERWrite: 0

AuthWrite: 0

PolicyWrite: 1

Counter: 0

Bits: 0

Extend: 0

PolicyDelete: 1

WriteLocked: 0

WriteAll: 0

WriteDefine: 0

WriteStClear: 0

GlobalLock: 0

PPRead: 0

OwnerRead: 0

AuthRead: 1

PolicyRead: 0

NoDA: 1

Orderly: 0

ClearStClear: 0

ReadLocked: 0

Written: 1

Supermicro Update Manager User’s Guide 402


PolicyRead: 0

PlatformCreate: 1

ReadStClear: 0

AuthPolicy Digest:

C0 01 C8 00 02 10 D0 FA A4 F4 F4 F8 A7 8E F4 F8

26 4E 6F 85 55 34 0D 2F 04 18 0F 8C F1 10 FF DD

Name:

00 0B 40 7B A7 8D 90 B7 CF 3A A5 3C 0B 83 6D AE

A7 2A E6 B5 67 15 32 BD 4E EF E4 04 E3 7E A4 EB

B0 19

LCP Policy:

00 03 0B 00 01 00 00 00 00 00 00 00 00 00 00 00

00 00 00 00 00 00 02 00 00 00 00 00 C8 00 08 30

00 00 08 00 00 00 00 00 00 00 00 00 00 00 00 00

00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

00 00 00 00 00 00

TPM 2.0 AUX NV index LCP Definition

===========================

[NV Public Data]

NvIndex: 0x01C10102

NameAlg: SHA256

Attributes: 0x62044408

PPWrite: 0

OWNERWrite: 0

AuthWrite: 0

PolicyWrite: 1

Counter: 0

Bits: 0

Extend: 0

Supermicro Update Manager User’s Guide 403


PolicyDelete: 1

WriteLocked: 0

WriteAll: 0

WriteDefine: 0

WriteStClear: 1

GlobalLock: 0

PPRead: 0

OwnerRead: 0

AuthRead: 1

PolicyRead: 0

NoDA: 1

Orderly: 0

ClearStClear: 0

ReadLocked: 0

Written: 1

PolicyRead: 0

PlatformCreate: 1

ReadStClear: 0

AuthPolicy Digest:

EF 9A 26 FC 22 D1 AE 8C EC FF 59 E9 48 1A C1 EC

53 3D BE 22 8B EC 6D 17 93 0F 4C B2 CC 5B 97 24

Name:

00 0B 87 7A 0A B0 02 23 4B C3 A3 61 5C 81 9A BF

20 C3 0A 5F 2A F9 3F B6 DC 13 F3 B9 B0 59 90 F4

5A FB

LCP Policy:

00 00 00 00 11 09 17 20 07 B0 00 00 00 02 00 00

00 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00

CA D5 6B 67 FD 9A 84 36 B6 69 0B 50 8F 34 95 94

Supermicro Update Manager User’s Guide 404


95 AD 11 69 8A 2D 9A DE 0F 3D F5 DF A3 6A 0A 5C

00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

00 00 00 00 00 00 00 00

TPM 2.0 SGX NV index LCP Definition

===========================

[NV Public Data]

NvIndex: 0x01C10104

NameAlg: SHA256

Attributes: 0x62040404

PPWrite: 0

OWNERWrite: 0

AuthWrite: 1

PolicyWrite: 0

Counter: 0

Bits: 0

Extend: 0

PolicyDelete: 1

WriteLocked: 0

WriteAll: 0

WriteDefine: 0

WriteStClear: 0

GlobalLock: 0

PPRead: 0

OwnerRead: 0

AuthRead: 1

PolicyRead: 0

NoDA: 1

Orderly: 0

ClearStClear: 0

Supermicro Update Manager User’s Guide 405


ReadLocked: 0

Written: 1

PolicyRead: 0

PlatformCreate: 1

ReadStClear: 0

AuthPolicy Digest:

B7 5C E1 94 6F 78 DF 8B AA 42 69 18 DB 09 31 80

17 E6 B3 8D 04 8C 95 4E 05 C2 C4 F3 4B D4 40 60

Name:

00 0B 3E CE D2 44 B7 B3 E8 33 3D A2 A8 C5 5E 9A

40 22 02 E1 C4 45 E8 D3 5D EE 0F C5 EE 17 8A 05

54 53

LCP Policy:

01 00 00 00 00 00 00 00

TPM 2.0 PPI NV index LCP Definition

===========================

[NV Public Data]

NvIndex: 0x01C10105

NameAlg: SHA256

Attributes: 0x42040409

PPWrite: 1

OWNERWrite: 0

AuthWrite: 0

PolicyWrite: 1

Counter: 0

Bits: 0

Extend: 0

PolicyDelete: 1

WriteLocked: 0

Supermicro Update Manager User’s Guide 406


WriteAll: 0

WriteDefine: 0

WriteStClear: 0

GlobalLock: 0

PPRead: 0

OwnerRead: 0

AuthRead: 1

PolicyRead: 0

NoDA: 1

Orderly: 0

ClearStClear: 0

ReadLocked: 0

Written: 0

PolicyRead: 0

PlatformCreate: 1

ReadStClear: 0

AuthPolicy Digest:

B7 5C E1 94 6F 78 DF 8B AA 42 69 18 DB 09 31 80

17 E6 B3 8D 04 8C 95 4E 05 C2 C4 F3 4B D4 40 60

Name:

00 0B 5B 53 B9 80 E7 36 D4 C3 3B 85 A6 A2 BB 7A

A5 F6 D3 10 1C EB D3 17 7D 69 8E D1 84 51 02 E2

D0 1B

TPM 2.0 PO NV index LCP Definition

==========================

[NV Public Data]

NvIndex: 0x01C10106

NameAlg: SHA256

Attributes: 0x2204000A

Supermicro Update Manager User’s Guide 407


PPWrite: 0

OWNERWrite: 1

AuthWrite: 0

PolicyWrite: 1

Counter: 0

Bits: 0

Extend: 0

PolicyDelete: 0

WriteLocked: 0

WriteAll: 0

WriteDefine: 0

WriteStClear: 0

GlobalLock: 0

PPRead: 0

OwnerRead: 0

AuthRead: 1

PolicyRead: 0

NoDA: 1

Orderly: 0

ClearStClear: 0

ReadLocked: 0

Written: 1

PolicyRead: 0

PlatformCreate: 0

ReadStClear: 0

AuthPolicy Digest:

22 03 0B 7E 0B B1 F9 D5 06 57 57 1E E2 F7 FC E1

EB 91 99 0C 8B 8A E9 77 FC B3 F1 58 B0 3E BA 96

Name:

00 0B 8D D1 B6 DE A2 9D 5B 82 D7 1B 04 84 83 D6

Supermicro Update Manager User’s Guide 408


A9 BF DE B1 A9 34 46 AA 96 09 FF D6 AF BE BC 95

7C 19

LCP Policy:

00 03 0B 00 01 00 00 00 00 00 00 00 00 00 00 00

00 00 00 00 00 00 02 00 00 00 00 00 C8 00 08 30

00 00 08 00 00 00 00 00 00 00 00 00 00 00 00 00

00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

00 00 00 00 00 00

Notes:

 This command is supported on X11 Intel® Xeon® Scalable Processors with Intel® C620
Series Chipsets or later platforms.
 The field “TPM Locked” in “TPM Information” section is only for TPM 1.2.
 The “Capability Flags” section is only for TPM 1.2.
 The --showall option is optional for the GetTpmInfo command.
 The “PS NV INDEX LCP Definition,” “AUX NV INDEX LCP Definition,” “PPI NV INDEX LCP
Definition” and “Capability Flags” sections are displayed when the --showall option is
assigned.
 This command will query TPM module information through Intel OTA or Supermicro
OTA.

Supermicro Update Manager User’s Guide 409


5.11.2 Provisioning TPM Module

On X11 Intel® Xeon® Scalable Processors with Intel® C620 Series Chipsets and later platforms, Use the
“TpmManage” command to execute SUM to enable TPM module capabilities for the managed system.
Before executing the command, the TPM module should be installed on the managed system.

Syntax:

sum [-i <IP or host name> -u <username> -p <password>] -c TpmManage --provision

[options…]

Option Commands Descriptions


--reboot Forces the managed system to reboot or power up after operation.
--provision Launches the trusted platform module provision procedure.
--table_default Uses the default TPM provision table.
--table <file name> Uses the customized TPM provision table.
Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c TpmManage --provision

--table_default --reboot

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c TpmManage --provision

--table Tpm12Prov.bin --reboot

In-Band:

[SUM_HOME]# ./sum -c TpmManage --provision --table_default --reboot

[SUM_HOME]# ./sum -c TpmManage --provision --table Tpm12Prov.bin --reboot

Notes:

 This command is supported on X11 Intel® Xeon® Scalable Processors with Intel® C620
Series Chipsets or later platforms.
 The system may be rebooted several times during provisioning.
 Please execute the GetTpmInfo command to obtain OTA supported type before doing
TPM provision.
 The TPM module will have been locked when the provisioning procedure is completed.
 Executing the TpmManage command with the --table_default option will execute TPM

Supermicro Update Manager User’s Guide 410


provisioning with the default TPM provision table created by BIOS.
 Executing the TpmManage command with the --table option will execute TPM
provisioning with customized TPM provision table created by user.
 The --reboot option is required by the TPM provision procedure for OOB Intel OTA
solutions.
 For TPM provision use with in-band Intel OTA, please follow these steps to complete
TPM provision.
a. Execute the “TpmManage” command with the “--clear_and_enable_dtpm” and “-
-reboot” options to enable TPM.
b. Execute the “TpmManage” command with the “--provision” option to do TPM
provision and then reboot the managed system manually.
c. Execute the “TpmManage” command with the “--enable_txt_and_dtpm” and “--
reboot” options to enable TPM and TXT.

On platforms before X11 Intel® Xeon® Scalable Processors with Intel® C620 Series Chipsets, use the
“TpmProvision” command to execute SUM to enable TPM module capabilities for the managed system.
Before executing the command, the TPM module should be installed on the managed system.
Syntax:

sum -i <IP or host name> -u <username> -p <password> -c TpmProvision --image_url

<URL> --reboot --lock <yes> [[--id <id for URL> --pw <password for URL>] | [--

id <id for URL> --pw_file <password file path>]]

Example:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c TpmProvision --

image_url 'smb://192.168.35.1/MySharedPoint/MyFolder' --id smbid --pw smbpasswd

--reboot --lock yes

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c TpmProvision --

image_url 'http://192.168.35.1/MySharedPoint/MyFolder' --id smbid --pw smbpasswd

--reboot --lock yes

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c TpmProvision --

image_url '\\192.168.35.1\MySharedPoint\MyFolder\' --id smbid --pw_file

smbpasswd.txt --reboot --lock yes

Supermicro Update Manager User’s Guide 411


smbpasswd.txt:

smbpasswd

Notes:

 The TpmProvision command is supported from the X10 Intel® Xeon® Processor E5 v3/v4
Product Family to the X11 Intel® Xeon® Scalable Processors with Intel® C620 Series
Chipsets platforms.
 The TPM ISO images are not included in the SUM package. This ISO image can be
acquired from Supermicro. Each SUM release could require different ISO images as
noted in SUM release notes. Please acquire correct TPM_version_YYYYMMDD.zip, unzip
the zip file and get TPM ISO images for usage.
 With TPM ISO images, TPM capabilities can be enabled or cleared.
 The BIOS will be rebooted several times during provisioning.
 To clear TPM capability, see 5.10.3 Enabling and Clearing TPM Module Capabilities.
 Space is prohibited for a SAMBA password. SUM will check the TPM module status on
the managed system. If it is not installed or it has malfunctioned, the exit code 36/37
will be returned respectively. If the TPM is locked, the exit code 37 will be returned.
 The --cleartpm option clears the ownership of the TPM module.
 The --lock yes option locks the TPM module.
 SUM will stop TPM provision procedures if the CPU or platform does not support Intel
Trusted Execution Technology (Intel TXT).

Supermicro Update Manager User’s Guide 412


5.11.3 Enabling and Clearing TPM Module Capabilities

On platforms after X11 Intel® Xeon® Scalable Processors with Intel® C620 Series Chipsets, use the
“TpmManage” command with the options in the following table to provide TPM module capabilities from
the managed system.

Option Commands Descriptions


--reboot (optional) Forces the managed system to reboot.
--clear_and_enable_dtpm_txt Clears dTPM ownership and activates dTPM/TXT.
--clear_dtpm Clears dTPM ownership and disables dTPM for TPM 1.2.
Clears dTPM ownership for TPM 2.0.
--enable_txt_and_dtpm Enables TXT and dTPM.
--clear_and_enable_dtpm Clears dTPM ownership, disables dTPM (for TPM 1.2 only) and activates
dTPM.
--disable_dtpm Disables dTPM.
--disable_txt Disables TXT.
Syntax:

sum -i <IP or host name> -u <username> -p <password> -c TpmManage [options…]

[--reboot]

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c TpmManage

--clear_and_enable_dtpm_txt --reboot

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c TpmManage

--clear_dtpm --reboot

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c TpmManage

--enable_txt_and_dtpm --reboot

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c TpmManage

--clear_and_enable_dtpm --reboot

Supermicro Update Manager User’s Guide 413


[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c TpmManage

--disable_dtpm --reboot

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c TpmManage

--disable_txt --reboot

In-Band:

[SUM_HOME]# ./sum -c TpmManage --clear_and_enable_dtpm_txt --reboot

[SUM_HOME]# ./sum -c TpmManage --clear_dtpm --reboot

[SUM_HOME]# ./sum -c TpmManage --enable_txt_and_dtpm --reboot

[SUM_HOME]# ./sum -c TpmManage --clear_and_enable_dtpm --reboot

[SUM_HOME]# ./sum -c TpmManage --disable_dtpm --reboot

[SUM_HOME]# ./sum -c TpmManage --disable_txt --reboot

Notes:

 The “--clear_and_enable_dtpm_txt” and “--enable_txt_and_dtpm” options cannot be


used when TPM is not provisioned.
 The “--disable_dtpm” option cannot be used when TXT is enabled.
 Please execute the “GetTpmInfo” command to obtain the OTA supported type before
using TPM.
 The “--reboot” option is optional for in-band usage. If executing a command without
this option, the managed system will not reboot. Then SUM will remind the user to
reboot manually.
 The options of each use are mutually exclusive.

Supermicro Update Manager User’s Guide 414


On platforms before X11 Intel® Xeon® Scalable Processors with Intel® C620 Series Chipsets, use the
“TpmProvision” command with the “--cleartpm” and “--reboot” options to clear TPM module capabilities
from the managed system. For usage of the “--image_url” option, refer to the notes in 5.10.2 Provisioning
TPM Module.
Syntax:

sum -i <IP or host name> -u <username> -p <password> -c TpmProvision --image_url

<URL> [--id <id for URL> --pw <password for URL>] --cleartpm --reboot

Example:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c TpmProvision --

image_url 'smb://192.168.35.1/MySharedPoint/MyFolder' --id smbid --pw smbpasswd

--cleartpm --reboot

Note: The TpmProvision command is supported from the X10 Intel® Xeon® Processor E5
v3/v4 Product Family to the X11 Intel® Xeon® Scalable Processors with Intel® C620 Series
Chipsets platform.

Supermicro Update Manager User’s Guide 415


5.12 GPU Management for a Single System
5.12.1 Getting GPU Information

Use the “GetGpuInfo” command to get the current GPU information from the managed system.

Single System

sum -i <IP or host name> -u <username> -p <password> -c GetGpuInfo [--


OOB show_all] [--showoam <oam id>] [--file <filename>]

sum [-I Redfish_HI -u <username> -p <password>] -c GetGpuInfo [--show_all] [--


showoam <oam id>]
In-Band for Intel Gaudi2:

sum -c GetGpuInfo [--show_all] [--file <filename>] [--showoam <oam id>]

Remote sum -I Remote_INB --oi <IP address> --ou <username> --op <password> -c
In-Band GetGpuInfo [--show_all] [--showoam <oam id>] [--file <filename>]

Multiple Systems

sum -l <system list file> [-u <username> -p <password>] -c GetGpuInfo [--


OOB showoam <oam id>] [--file <filename>]

Remote sum -I Remote_INB -l <system list file> -c GetGpuInfo [--show_all] [--showoam


In-Band <oam id>] [--file <filename>]

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c GetGpuInfo

In-Band:

[SUM_HOME]# ./sum -c GetGpuInfo

In-Band:

[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p PASSWORD -c GetGpuInfo

⚫ The console output contains the following information of the managed system with add-on GPU
cards installed.

Supermicro Update Manager User’s Guide 416


GPU information

===================

[GPU(1)]

Brand : NVIDIA

Location : 2

Model : Tesla P100-PCIE-12GB

Serial Number : 0325117155632

Part Number : 15F7-893-A1

Firmware Version : 86.00.4D.00.03

GPU GUID : df5f42692dc92dc40e301b746505f5ae

Board Part Number : 900-2H400-0010-000

InfoROM Version : H400.0202.00.01

Memory Vendor : S

Temperature(C) : 1 degreeC

 The console output contains the following information for HGX system on X12/H12 systems.

HGX information

===================

CEC Version....................3.9

FPGA Version...................2.A5

[GPU(1)]

Brand : NVIDIA

Supermicro Update Manager User’s Guide 417


Location : 0

Model : NVIDIA A100-SXM4-80GB

Part Number : 20B2-895-A1

Firmware Version : 92.00.45.00.05

GPU GUID : 74f76243ff58e56784bed8928ff4ff71

InfoROM Version : G506.0210.00.03

Temperature(C) : 32 degreeC

[GPU(2)]

Brand : NVIDIA

Location : 0

Model : NVIDIA A100-SXM4-80GB

Part Number : 20B2-895-A1

Firmware Version : 92.00.45.00.05

GPU GUID : fbec45bdd281d823c9b30edf38379387

InfoROM Version : G506.0210.00.03

Temperature(C) : 29 degreeC

[GPU(3)]

Brand : NVIDIA

Location : 0

Supermicro Update Manager User’s Guide 418


Model : NVIDIA A100-SXM4-80GB

Part Number : 20B2-895-A1

Firmware Version : 92.00.45.00.05

GPU GUID : e34eb0db342be31e5e15855f2e91a00b

InfoROM Version : G506.0210.00.03

Temperature(C) : 30 degreeC

[GPU(4)]

Brand : NVIDIA

Location : 0

Model : NVIDIA A100-SXM4-80GB

Part Number : 20B2-895-A1

Firmware Version : 92.00.45.00.05

GPU GUID : 06f4a98a2223e016230a396678a546c1

InfoROM Version : G506.0210.00.03

Temperature(C) : 32 degreeC

[GPU(5)]

Brand : NVIDIA

Location : 0

Model : NVIDIA A100-SXM4-80GB

Supermicro Update Manager User’s Guide 419


Part Number : 20B2-895-A1

Firmware Version : 92.00.45.00.05

GPU GUID : 37ed231dc89f1f68194c3b9b4ed2f78b

InfoROM Version : G506.0210.00.03

Temperature(C) : 33 degreeC

[GPU(6)]

Brand : NVIDIA

Location : 0

Model : NVIDIA A100-SXM4-80GB

Part Number : 20B2-895-A1

Firmware Version : 92.00.45.00.05

GPU GUID : 4f64a3e7fc36c95cf0b1e2811571fa8e

InfoROM Version : G506.0210.00.03

Temperature(C) : 29 degreeC

[GPU(7)]

Brand : NVIDIA

Location : 0

Model : NVIDIA A100-SXM4-80GB

Part Number : 20B2-895-A1

Supermicro Update Manager User’s Guide 420


Firmware Version : 92.00.45.00.05

GPU GUID : 4afc961d2be7063faff75e72fe828c04

InfoROM Version : G506.0210.00.03

Temperature(C) : 29 degreeC

[GPU(8)]

Brand : NVIDIA

Location : 0

Model : NVIDIA A100-SXM4-80GB

Part Number : 20B2-895-A1

Firmware Version : 92.00.45.00.05

GPU GUID : fd2a3f33649568183bb50a08fec1b5b4

InfoROM Version : G506.0210.00.03

Temperature(C) : 32 degreeC

[HGX Delta System Temperature]

[HBM]

Reading Temperature : 36 degreeC

HBM 1 Temperature : 36 degreeC

HBM 2 Temperature : 33 degreeC

HBM 3 Temperature : 33 degreeC

Supermicro Update Manager User’s Guide 421


HBM 4 Temperature : 35 degreeC

HBM 5 Temperature : 35 degreeC

HBM 6 Temperature : 33 degreeC

HBM 7 Temperature : 33 degreeC

HBM 8 Temperature : 36 degreeC

[NVLink Switch]

Reading Temperature : 31 degreeC

NVLink SW 1 Temperature : 30 degreeC

NVLink SW 2 Temperature : 29 degreeC

NVLink SW 3 Temperature : 31 degreeC

NVLink SW 4 Temperature : 31 degreeC

NVLink SW 5 Temperature : 31 degreeC

NVLink SW 6 Temperature : 30 degreeC

[PCI Switch]

Reading Temperature : 57 degreeC

PCI SW 1 Temperature : 24 degreeC

PCI SW 2 Temperature : 57 degreeC

PCI SW 3 Temperature : 57 degreeC

PCI SW 4 Temperature : 55 degreeC

PCI SW 5 Temperature : 56 degreeC

[GPU Board]

Supermicro Update Manager User’s Guide 422


Reading Temperature : 36 degreeC

GPU Board 1 Temperature : 36 degreeC

GPU Board 2 Temperature : 26 degreeC

[PLX]

Reading Temperature : 68 degreeC

PLX 1 Temperature : 63 degreeC

PLX 2 Temperature : 68 degreeC

PLX 3 Temperature : 68 degreeC

PLX 4 Temperature : 64 degreeC

[Pump]

Pump Temperature : 0 degreeC

 The console output contains the following information for the HGX H100 system on X13/H13 systems.

Managed system.................192.168.34.56

HGX Model..................HGX H100 8-GPU

HMC

version................HGX-22.10-1-rc31

ERoT version...........00.02.0120.0000_n00

FPGA

version................2.0E

ERoT version...........00.02.0120.0000_n00

PCIe Switch

Supermicro Update Manager User’s Guide 423


version................1.7.5F

ERoT version...........00.02.0120.0000_n00

GPU SXM [1]

version................96.00.61.00.01

ERoT version...........00.02.0120.0000_n00

GPU SXM [2]

version................96.00.61.00.01

ERoT version...........00.02.0120.0000_n00

GPU SXM [3]

version................96.00.61.00.01

ERoT version...........00.02.0120.0000_n00

GPU SXM [4]

version................96.00.61.00.01

ERoT version...........00.02.0120.0000_n00

GPU SXM [5]

version................96.00.61.00.01

ERoT version...........00.02.0120.0000_n00

GPU SXM [6]

version................96.00.61.00.01

ERoT version...........00.02.0120.0000_n00

GPU SXM [7]

Supermicro Update Manager User’s Guide 424


version................96.00.61.00.01

ERoT version...........00.02.0120.0000_n00

GPU SXM [8]

version................96.00.61.00.01

ERoT version...........00.02.0120.0000_n00

NVSwitch [0]

version................96.10.35.00.01

ERoT version...........00.02.0120.0000_n00

NVSwitch [1]

version................96.10.35.00.01

ERoT version...........00.02.0120.0000_n00

NVSwitch [2]

version................96.10.35.00.01

ERoT version...........00.02.0120.0000_n00

NVSwitch [3]

version................96.10.35.00.01

ERoT version...........00.02.0120.0000_n00

PCIe Retimer [0]

version................1.31.X

PCIe Retimer [1]

version................1.31.X

Supermicro Update Manager User’s Guide 425


PCIe Retimer [2]

version................1.31.X

PCIe Retimer [3]

version................1.31.X

PCIe Retimer [4]

version................1.31.X

PCIe Retimer [5]

version................1.31.X

PCIe Retimer [6]

version................1.31.X

PCIe Retimer [7]

version................1.31.X

HGX information

===================

[GPU(1)]

Location : 1

Model : H100 80GB HBM3

Serial Number : 1655022001438

Part Number : 2330-885-A1

Firmware Version : 96.00.46.00.0E

Temperature(C) : 43 degreeC

Supermicro Update Manager User’s Guide 426


//** Please refer to Note 2 **//

[HGX Delta System Temperature]

[HBM]

Reading Temperature : 34 degreeC

HBM 1 Temperature : 34 degreeC

HBM 2 Temperature : 30 degreeC

HBM 3 Temperature : 32 degreeC

HBM 4 Temperature : 34 degreeC

HBM 5 Temperature : 34 degreeC

HBM 6 Temperature : 31 degreeC

HBM 7 Temperature : 31 degreeC

HBM 8 Temperature : 34 degreeC

//** Please refer to Note 3 **//

⚫ The console output contains the following information of the managed system with Intel Gaudi2
GPU cards installed.

Managed system..........................localhost

Habana UBB CPLD version.............000A0A02

Habana OAM CPLD version

Device Id(0)

Version.....................0F

Configration ID.............01

Supermicro Update Manager User’s Guide 427


Device Id(1)

Version.....................0F

Configration ID.............01

Device Id(2)

Version.....................0F

Configration ID.............01

Device Id(3)

Version.....................0F

Configration ID.............01

Device Id(4)

Version.....................0F

Configration ID.............01

Device Id(5)

Version.....................0F

Configration ID.............01

Supermicro Update Manager User’s Guide 428


Device Id(6)

Version.....................0F

Configration ID.............01

Device Id(7)

Version.....................0F

Configration ID.............01

SPI Firmware Version:

Device ID.......................b3:00.0

OAM ID......................0

Serial Number...............AM27043716

Module ID...................6

Firmware [SPI] Version......Preboot version hl-gaudi2-


1.10.0-fw-43.2.0-sec-4 (May 17 2023 - 20:08:22)

Device ID.......................cc:00.0

OAM ID......................1

Serial Number...............AM30032490

Module ID...................4

Firmware [SPI] Version......Preboot version hl-gaudi2-


1.10.0-fw-43.2.0-sec-4 (May 17 2023 - 20:08:22)

Supermicro Update Manager User’s Guide 429


Device ID.......................b4:00.0

OAM ID......................2

Serial Number...............AM27043737

Module ID...................7

Firmware [SPI] Version......Preboot version hl-gaudi2-


1.10.0-fw-43.2.0-sec-4 (May 17 2023 - 20:08:22)

Device ID.......................cd:00.0

OAM ID......................3

Serial Number...............N/A

Module ID...................N/A

Firmware [SPI] Version......Preboot version hl-gaudi2-1.9.0-


fw-42.0.1-sec-3 (Mar 06 2023 - 23:23:58)

Device ID.......................1a:00.0

OAM ID......................4

Serial Number...............N/A

Module ID...................N/A

Firmware [SPI] Version......Preboot version hl-gaudi2-1.9.0-


fw-42.0.1-sec-3 (Mar 06 2023 - 23:23:58)

Supermicro Update Manager User’s Guide 430


Device ID.......................19:00.0

OAM ID......................5

Serial Number...............AM30032493

Module ID...................2

Firmware [SPI] Version......Preboot version hl-gaudi2-


1.10.0-fw-43.2.0-sec-4 (May 17 2023 - 20:08:22)

Device ID.......................43:00.0

OAM ID......................6

Serial Number...............AM30032518

Module ID...................0

Firmware [SPI] Version......Preboot version hl-gaudi2-


1.10.0-fw-43.2.0-sec-4 (May 17 2023 - 20:08:22)

Device ID.......................44:00.0

OAM ID......................7

Serial Number...............AM27043781

Module ID...................1

Firmware [SPI] Version......Preboot version hl-gaudi2-


1.10.0-fw-43.2.0-sec-4 (May 17 2023 - 20:08:22)

Supermicro Update Manager User’s Guide 431


⚫ The console output contains the following information of the managed system with NVIDIA GH200
GPU cards installed.

Managed system.................192.168.34.56

GPU information

===================

[GPU(0)]

Location : 0

GPU Vendor : NVIDIA

Model : GH200 480GB

Serial Number : 1642723000173

Part Number : 2342-888-A1

Firmware Version : 96.00.84.00.02

PCIe Type : Gen4

Max PCIe Type : Gen5

Lanes In Use : 1

Max Lanes : 1

UUID : 3949b757-be6b-568c-88f4-5a833404cb8c

Max Speed : 1980 MHz

Min Speed : 345 MHz

Operating Speed : 690 MHz

Supermicro Update Manager User’s Guide 432


⚫ The console output contains the following information of the managed system with AMD MI300X
GPU cards installed.

Managed system.................196.168.34.56

Model..........................AMD Instinct MI300X UBB

SMC

version................t28_v2.11.0.32

SMC FPGA

version................T28_S_v0.0C.0.73803c2d

UBB Bundle

version................BKC_X23.44.09.76

GPU IFWI

version................vBRP018G_85284

Retimers

version................v2_8_76

OAM RM

version................v4_0_9

ROT

version................aa04

UBB FPGA

version................v0.21.2.a657321d

Supermicro Update Manager User’s Guide 433


Multiple Systems OOB:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c GetGpuInfo

SList.txt:

192.168.34.56

192.168.34.57

Remote In-Band

⚫ The console output contains the following information of the managed system with Intel Gaudi2
GPU cards installed.

Managed system..........................localhost

Habana UBB CPLD version.............000A0A02

Habana OAM CPLD version

Device Id(0)

Version.....................0F

Configration ID.............01

Device Id(1)

Version.....................0F

Configration ID.............01

Device Id(2)

Version.....................0F

Configration ID.............01

Supermicro Update Manager User’s Guide 434


Device Id(3)

Version.....................0F

Configration ID.............01

Device Id(4)

Version.....................0F

Configration ID.............01

Device Id(5)

Version.....................0F

Configration ID.............01

Device Id(6)

Version.....................0F

Configration ID.............01

Device Id(7)

Version.....................0F

Configration ID.............01

SPI Firmware Version:

Supermicro Update Manager User’s Guide 435


Device ID.......................b3:00.0

OAM ID......................0

Serial Number...............AM27043716

Module ID...................6

Firmware [SPI] Version......Preboot version hl-gaudi2-


1.10.0-fw-43.2.0-sec-4 (May 17 2023 - 20:08:22)

Device ID.......................cc:00.0

OAM ID......................1

Serial Number...............AM30032490

Module ID...................4

Firmware [SPI] Version......Preboot version hl-gaudi2-


1.10.0-fw-43.2.0-sec-4 (May 17 2023 - 20:08:22)

Device ID.......................b4:00.0

OAM ID......................2

Serial Number...............AM27043737

Module ID...................7

Firmware [SPI] Version......Preboot version hl-gaudi2-


1.10.0-fw-43.2.0-sec-4 (May 17 2023 - 20:08:22)

Device ID.......................cd:00.0

Supermicro Update Manager User’s Guide 436


OAM ID......................3

Serial Number...............N/A

Module ID...................N/A

Firmware [SPI] Version......Preboot version hl-gaudi2-1.9.0-


fw-42.0.1-sec-3 (Mar 06 2023 - 23:23:58)

Device ID.......................1a:00.0

OAM ID......................4

Serial Number...............N/A

Module ID...................N/A

Firmware [SPI] Version......Preboot version hl-gaudi2-1.9.0-


fw-42.0.1-sec-3 (Mar 06 2023 - 23:23:58)

Device ID.......................19:00.0

OAM ID......................5

Serial Number...............AM30032493

Module ID...................2

Firmware [SPI] Version......Preboot version hl-gaudi2-


1.10.0-fw-43.2.0-sec-4 (May 17 2023 - 20:08:22)

Device ID.......................43:00.0

OAM ID......................6

Supermicro Update Manager User’s Guide 437


Serial Number...............AM30032518

Module ID...................0

Firmware [SPI] Version......Preboot version hl-gaudi2-


1.10.0-fw-43.2.0-sec-4 (May 17 2023 - 20:08:22)

Device ID.......................44:00.0

OAM ID......................7

Serial Number...............AM27043781

Module ID...................1

Firmware [SPI] Version......Preboot version hl-gaudi2-


1.10.0-fw-43.2.0-sec-4 (May 17 2023 - 20:08:22)

If the “Status” field of a managed system is SUCCESS, the GPU information of the managed system will be
shown in the “Execution Message” section of the managed system in the created log file.

Notes:

 For more details on support, please refer to the following links.


o Supermicro - Qualified Platform List for NVIDIA vGPU
o Supported GPU System Model
o GetGpuInfo/UpdateGpu supported platform matrix
 This part has omitted the same GPU information with a different index.
 This part has omitted the temperature information of FPGA, PCI Switch, PLX, ReTimer
and NVSwitch.
 On Intel PVC system, igsc must be installed to communicate with PVC_IFWI and
PVC_PSCBIN devices.
 On Intel Gaudi2 system, Habana libraries (hl-fw-loader and hl-smi) with ubuntu version
20.04 are required.

Supermicro Update Manager User’s Guide 438


5.12.2 Updating the GPU Firmware Image

Use the “UpdateGpu” command with the CEC/FPGA/HGX_H100/H100_FPGA/Intel_Gaudi2/Intel PVC of


GPU firmware image to update the GPU firmware of a managed system by SUM.

Single System

sum -i <IP or host name> -u <username> -p <password> -c UpdateGpu


--item
OOB <CEC|FPGA|HGX_H100|H100_FPGA|PVC_RETIMER|GAUDI_RETIMER|PVC_AMC|PVC_
UBB_CPLD|MGX_GPU> --file <filename> [--reboot] [--post_complete] [--
dev_id <device ID>]

sum -I Redfish_HI -u <username> -p <password> -c UpdateGpu –item


<CEC|FPGA|HGX_H100|H100_FPGA|PVC_RETIMER|GAUDI_RETIMER|PVC_AMC|GAUD
I_UBB_CPLD > --file <filename> [--reboot] [--post_complete] [--
dev_id <device ID>]
In-Band
sum -c UpdateGpu –dev_id <device_id> --item < GAUDI_OAM_CPLD|
GAUDI_SPI|PVC_IFWI|PVC_PSCBIN > --file <filename> [--reboot] [--
dev_id <device ID>]

sum -I Remote_INB –oi <IP address> --ou <username> --op <password>


-c UpdateGpu –-dev_id <device_id> --item
Remote In-band <GAUDI_OAM_CPLD|GAUDI_UBB_CPLD|GAUDI_SPI|PVC_IFWI|PVC_PSCBIN > --
file <filename> [--reboot] –remote_sum <remote sum_location> [--
dev_id <device ID>]

Multiple Systems

Sum -l <system list file> [-u <username> -p <password>] -c


UpdateGpu –item
OOB <CEC|FPGA|HGX_H100|H100_FPGA|PVC_RETIMER|GAUDI_RETIMER|PVC_AMC|PVC_
UBB_CPLD|MGX_GPU> --file <filename> [--reboot] [--post_complete] [-
-dev_id <device ID>]

sum -I Remote_INB -l <system list file> -c UpdateGpu -–dev_id


<device_id> --item
Remote In-band <GAUDI_OAM_CPLD|GAUDI_UBB_CPLD|PVC_IFWI|PVC_PSCBIN|GAUDI_SPI> --
file <filename> [--reboot] –remote_sum <remote sum_location> [--
dev_id <device ID>]

Example:

Example:

OOB:

Supermicro Update Manager User’s Guide 439


[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c UpdateGpu --file

GPU_CEC.bin --item CEC

The console output contains the following information.

Managed system................192.168.34.56

HGX Model................HGX A100

CEC version................4.0

FPGA version................3.03

Local GPU CEC image file......GPU_CEC.bin

Status: Start updating CEC for 192.168.34.56

************************************WARNING****************************

Do not remove AC power from the server.

************************************************************************

Uploading GPU CEC FW...Done

Updating GPU CEC


FW ...>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>Done

Status: GPU CEC is updated for 192.168.34.56

Note: You have to reboot or power up the system for the changes to take
effect

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c UpdateGpu --file

NVDIA_HGX_H100.pkg --item HGX_H100 --reboot --post_complete

Managed system.................192.168.34.56

Supermicro Update Manager User’s Guide 440


HGX Model..................HGX H100 8-GPU

HMC

version................HGX-22.10-1-rc31

ERoT version...........00.02.0120.0000_n00

//** Please refer to Note 2 **//

Local GPU image file.........../home/user/GPU/nvfw_HGX-

H100x8_0002_221216.1.0_prod-signed.fwpkg

Status: Start updating HGX H100 for 192.168.34.56

************************************WARNING*************************************

Do not remove AC power from the server.

********************************************************************************

Uploading HGX H100 FW...............................

................Done

Updating HGX H100 FW...>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>Done

....................................

Status: HGX H100 is updated for 192.168.34.56

Supermicro Update Manager User’s Guide 441


Status: The managed system 192.168.34.56 is rebooting.

..................................................

..........................Done

Status: The managed system 192.168.34.56 is waiting for POST complete

.............

Status: MemoryInitializationStarted

...........

..........................................

Status: PCIResourceConfigStarted

........

..................

Status: The managed system 192.168.34.56 is POST completed

OOB:

Supermicro Update Manager User’s Guide 442


[SUM_HOME]./sum -c updategpu -i 192.168.34.56 -u ADMIN -p ADMIN --item

PVC_Retimer --dev_id 3 --file pt516_x16_reversed_v2_7_0.bin

Managed system................. 192.168.34.56

PVC Retimer Version...........2.7.0

PVC Retimer image file......... /UBB_FW/Retimer/pt516_x16_reversed_v2_7_0.bin

Status: Start updating PVC Retimer for 192.168.34.56

************************************WARNING*************************************

Do not remove AC power from the server.

********************************************************************************

Uploading PVC Retimer FW...Done

Updating PVC Retimer FW...>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>Done

Status: PVC Retimer is updated for 192.168.34.56

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c UpdateGpu --file

MI300X.pldm --item MI300X --reboot

Supermicro Update Manager User’s Guide 443


Managed system................. 192.168.34.68

Model..........................AMD Instinct MI300X UBB

SMC

version................t28_v2.11.0.32

SMC FPGA

version................T28_S_v0.0C.0.73803c2d

UBB Bundle

version................BKC_X23.44.09.76

GPU IFWI

version................vBRP018G_85284

Retimers

version................v2_8_76

OAM RM

version................v4_0_9

ROT

version................aa04

UBB FPGA

version................v0.21.2.a657321d

Local GPU MI300X image file.............MI300X.pldm

GPU MI300X image file version.......BKC_X23.44.09

Supermicro Update Manager User’s Guide 444


Status: Start updating MI300X for 192.168.34.68

************************************WARNING*************************************

Do not remove AC power from the server.

********************************************************************************

Uploading MI300X FW......................

..................................................

..................................................

.........................Done

Updating MI300X

FW...>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>Done

Status: The managed system 192.168.34.56 is rebooting.

..................................................

......................Done

WARNING: Without option --post_complete, please manually confirm the managed

system is POST complete before executing next action.

Supermicro Update Manager User’s Guide 445


In-band:

[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p PASSWORD -c UpdateGpu --file

GPU_FPGA.bin --item FPGA

[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p PASSWORD -c UpdateGpu --file

NVDIA_HGX_H100.pkg --item HGX_H100 --reboot

[SUM_HOME]# ./sum -c updategpu --dev_id 1 --file

HL225_PFR_20230427_0F_644A7EDA_production.signed_cfg0.svf --item GAUDI_OAM_CPLD

Start to Update firmware of the Habana OAM CPLD

..................................................

..................................................

..................................................

Done.

[SUM_HOME]# ./sum -c updategpu --item PVC_UBB_CPLD --file Etron_UBB-

SA_CPLD1_A02.jed --dev_id 0

Start to Update firmware of the Habana UBB CPLD

..................................................

..

Done.

[SUM HOME]./sum -c updategpu --item gaudi_spi --file habanalabs-firmware-odm-

1.10.0-494.amd64.deb --dev_id cc:00.0

Managed system..........................localhost

Supermicro Update Manager User’s Guide 446


Unload Habana Driver

..................................................

.........

Gaudi Write Disable Protection Enable

#### PLEASE DO NOT POWER OFF THE SYSTEM!!!

Gaudi Write Recovery Protection

Show SPI Firmware

..................................................

.. Device ID.......................19:00.0

OAM ID......................0

Serial Number...............AM30032493

Module ID...................2

Firmware [SPI] Version......Preboot version hl-gaudi2-1.10.0-fw-

43.2.0-sec-4 (May 17 2023 - 20:08:22)

Device ID.......................b3:00.0

OAM ID......................1

Serial Number...............AM27043716

Supermicro Update Manager User’s Guide 447


Module ID...................6

Firmware [SPI] Version......Preboot version hl-gaudi2-1.10.0-fw-

43.2.0-sec-4 (May 17 2023 - 20:08:22)

Device ID.......................cc:00.0

OAM ID......................3

Serial Number...............AM30032490

Module ID...................4

Firmware [SPI] Version......Preboot version hl-gaudi2-1.10.0-fw-

43.2.0-sec-4 (May 17 2023 - 20:08:22)

Device ID.......................43:00.0

OAM ID......................4

Serial Number...............AM30032518

Module ID...................0

Firmware [SPI] Version......Preboot version hl-gaudi2-1.10.0-fw-

43.2.0-sec-4 (May 17 2023 - 20:08:22)

Device ID.......................44:00.0

OAM ID......................5

Serial Number...............AM27043781

Module ID...................1

Supermicro Update Manager User’s Guide 448


Firmware [SPI] Version......Preboot version hl-gaudi2-1.10.0-fw-

43.2.0-sec-4 (May 17 2023 - 20:08:22)

Device ID.......................b4:00.0

OAM ID......................7

Serial Number...............AM27043737

Module ID...................7

Firmware [SPI] Version......Preboot version hl-gaudi2-1.10.0-fw-

43.2.0-sec-4 (May 17 2023 - 20:08:22

Remote In-band:

sum -I Remote_INB -oi 1.1.1.1 -ou root -op 1234 -c UpdateGpu –-dev_id 0 --item

PVC_UBB_CPLD --file Etron_UBB-SA_CPLD1_A02.jed --remote_sum root/sum

Start to Update firmware of the Habana UBB CPLD

..................................................

..

Done.

Multiple Systems OOB:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c UpdateGpu --item FPGA --

file GPU_FPGA.bin

SList.txt:

192.168.34.56

192.168.34.57

Supermicro Update Manager User’s Guide 449


Remote In-band:

sum -I Remote_INB -l SList.txt -c UpdateGpu --dev_id 0 --item PVC_UBB_CPLD --

file Etron_UBB-SA_CPLD1_A02.jed --remote_sum root/sum

Start to Update firmware of the Habana UBB CPLD

..................................................

..

Done.

SList.txt:

1.1.1.1 root 1234

1.1.1.2 root 4321

[SUM_HOME]# ./sum -I Remote_INB -l SList.txt -c UpdateGpu --item gaudi_spi --

file habanalabs-firmware-odm-1.10.0-494.amd64.deb --dev_id cc:00.0

Managed system..........................localhost

Unload Habana Driver

..................................................

.........Gaudi Write Disable Protection Enable

#### PLEASE DO NOT POWER OFF THE SYSTEM!!!

Gaudi Write Recovery Protection

Supermicro Update Manager User’s Guide 450


Show SPI Firmware

..................................................

.. Device ID.......................19:00.0

OAM ID......................0

Serial Number...............AM30032493

Module ID...................2

Firmware [SPI] Version......Preboot version hl-gaudi2-1.10.0-fw-

43.2.0-sec-4 (May 17 2023 - 20:08:22)

Device ID.......................b3:00.0

OAM ID......................1

Serial Number...............AM27043716

Module ID...................6

Firmware [SPI] Version......Preboot version hl-gaudi2-1.10.0-fw-

43.2.0-sec-4 (May 17 2023 - 20:08:22)

Device ID.......................cc:00.0

OAM ID......................3

Serial Number...............AM30032490

Module ID...................4

Firmware [SPI] Version......Preboot version hl-gaudi2-1.10.0-fw-

43.2.0-sec-4 (May 17 2023 - 20:08:22)

Supermicro Update Manager User’s Guide 451


Device ID.......................43:00.0

OAM ID......................4

Serial Number...............AM30032518

Module ID...................0

Firmware [SPI] Version......Preboot version hl-gaudi2-1.10.0-fw-

43.2.0-sec-4 (May 17 2023 - 20:08:22)

Device ID.......................44:00.0

OAM ID......................5

Serial Number...............AM27043781

Module ID...................1

Firmware [SPI] Version......Preboot version hl-gaudi2-1.10.0-fw-

43.2.0-sec-4 (May 17 2023 - 20:08:22)

Device ID.......................b4:00.0

OAM ID......................7

Serial Number...............AM27043737

Module ID...................7

Firmware [SPI] Version......Preboot version hl-gaudi2-1.10.0-fw-

43.2.0-sec-4 (May 17 2023 - 20:08:22SList.txt:

1.1.1.1 root 1234

Supermicro Update Manager User’s Guide 452


1.1.1.2 root 4321

The execution progress for the managed system will be continuously updated to the “Execution Message”
section of the managed system in the created log file.

Notes:

 It is only used for updating NVIDIA HGX A100 8-GPU(Delta), NVIDIA HGX H100 8-
GPU(Delta Next), Intel PVC and Intel Gaudi2 system firmware. For a comprehensive list
of supported platforms and product SKUs, refer to Appendix N.
GetGpuInfo/UpdateGpu supported platform matrix.
 This part omits the current FW and ERot version details of FPGA, PCIe Switch, GPU
SXMs, NV Switches, PCIe Retimers within the HGX H100 System.
 On the Intel PVC system, igsc must be installed to communicate with the PVC_IFWI and
PVC_PSCBIN devices.
 On the Intel Gaudi2 system, an additional add-on package
(AddOn_GD2_Linux_x86_64_YYYYMMDD.tar.gz) should be extracted in the ‘tool’
directory under the SUM installed path, please contact Supermicro for assistance in
downloading the add-on package.
 On the Intel Gaudi2 system, you must perform a power cycle for Habana driver’s “hl-
smi and hl-fw-loader” before updating the gaudi_spi firmware.
 In the device_id for gaudi_spi, it should be device address, e.g., (cc:00.0).

5.12.3 Diagnosing AMD MI250 GPU System Status

Use the “DiagGpuStatus” command to get the Power rails status of AMD MI250 GPU system of a managed
system by SUM.

Syntax:

sum [-i <IP or host name> | -I Redfish_HI] -u <username> -p <password> -c

DiagGpuStatus [--dev_id <dev_id_list>]

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c DiagGpuStatus

Supermicro Update Manager User’s Guide 453


The console output contains the following information.

AMD INSTINCT MI250

===================

[GPU(1)]

Serial Number..............PCB012345671

Power rails Status.........OK

[GPU(2)]

Serial Number..............PCB012345672

Power rails Status.........OK

[GPU(3)]

Serial Number..............PCB012345673

Power rails Status.........OK

[GPU(4)]

Serial Number..............PCB012345674

Power rails Status.........OK

[GPU(5)]

Serial Number..............PCB012345675

Power rails Status.........OK

[GPU(6)]

Serial Number..............PCB012345676

Power rails Status.........OK

Supermicro Update Manager User’s Guide 454


[GPU(7)]

Serial Number..............PCB012345677

Power rails Status.........OK

[GPU(8)]

Serial Number..............PCB012345678

Power rails Status.........OK

In-Band:

[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p PASSWORD -c DiagGpuStatus --dev_id

2,4,8

The console output contains the following information.

AMD INSTINCT MI250

===================

[GPU(2)]

Serial Number..............PCB012345672

Power rails Status.........OK

[GPU(4)]

Serial Number..............PCB012345674

Power rails Status.........OK

[GPU(8)]

Serial Number..............PCB012345678

Power rails Status.........OK

Supermicro Update Manager User’s Guide 455


5.12.4 Getting GPU dump log information

Use the “GetGpuLog” command to get the current GPU log dump file of the managed system.

Syntax:

sum [-i <IP or host name> | -I Redfish_HI] -u <username> -p <password> -c

GetGpuLog --item <HGX_H100> --file <filename> [--overwrite]

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c GetGpuLog –-item

HGX_H100 –-file log.tgz

In-band:

[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p PASSWORD -c GetGpuLog –-item

HGX_H100 –-file log.tgz

The console output contains the following information.

Creating the GPU Log file ...

.................................................................

.................................................................

.................................................................

.................................................................

.................................................................

.................................................................

The GPU Log download file is ready.

Supermicro Update Manager User’s Guide 456


File "log.tgz" is created.

5.13 CPLD Management for a Single System


5.13.1 Getting CPLD Firmware Image Information

Use the “GetCpldInfo” command to get the CPLD firmware image information from the managed system as
well as the local CPLD firmware image (with the --file option).

Syntax:

sum [[-i <IP or host name> | -I Redfish_HI] -u <username> -p <password>] -c

GetCpldInfo [--file <filename> [--file_only] [--extract_measurement]

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c GetCpldInfo

The console output contains the following information.

Managed system............192.168.34.56

Motherboard CPLD version..........F1.00.BD

In-Band:

[SUM_HOME]# ./sum -c GetCpldInfo -I Redfish_HI -u ADMIN -p ADMIN --file CPLD.bin

The console output contains the following information.

Managed system...........192.168.34.56
Motherboard CPLD version.........F1.00.BD
Local CPLD image file....CPLD.bin
CPLD version.........F1.00.CD
FW image.............Signed
Signed Key.......RoT

Supermicro Update Manager User’s Guide 457


[SUM_HOME]# ./sum -c GetCpldInfo -I Redfish_HI -u ADMIN -p ADMIN --file CPLD.bin

--extract_measurement

The console output contains the following information.

Managed system...........192.168.34.56

Motherboard CPLD version.........F0.09.46

Local CPLD image file....CPLD.bin

CPLD version.........F0.0D.5A

FW image.............Signed

Signed Key.......RoT

Measurement......7F3095B7E9ABC6F982719F7A293C68A02373C2BF5C6B7C160D5E980

D90E79708932E6F577B74814C244B81D76F2925F1F456E734CFE67AA8E9CA57C4DA894757

A RoT-signed key of a local CPLD image displays the following information:

Type Description
Signed RoT is signed by Super Micro Computer, Inc.
Signed(U) RoT is NOT signed by Super Micro Computer, Inc. but by an unknown
authority.
Verification failed The RoT signing in the image cannot be verified because the image is
corrupted or incomplete.

Note:

 This command is only available on RoT systems of X12/H12 and later platforms.
 There could be multiple motherboard CPLD on a single motherboard, their information
would be showen with indexed.

5.13.2 Updating the CPLD Firmware Image

Use the “UpdateCpld” command with the CPLD firmware image CPLD.bin to run SUM to update the
motherboard CPLD of a managed system, and use --index option to specify the CPLD index for the systems
with multiple motherboard CPLD supported. The command will update the first motherboard CPLD without
--index input.

Supermicro Update Manager User’s Guide 458


Syntax:

sum [[-i <IP or host name> | -I Redfish_HI] -u <username> -p <password>] -c

UpdateCpld --file <filename> [--index <num>] --reboot

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c UpdateCpld --file

CPLD.bin --reboot

In-Band:

[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p PASSWORD -c UpdateCpld --file

CPLD.bin --index 2 --reboot

Notes:

 This command is only available on RoT systems of X12/H12 and later platforms.
 The system needs to be powered off while updating the CPLD firmware.
 This command will update the first motherboard CPLD by default without --index input.
 DO NOT update CPLD firmware with a wrong index.

5.13.3 Managing CPLD RoT Functions

The “CpldRotManage” command supports the following features on RoT systems of X13 RoT2.0 and later
platforms:

• Getting Information on CPLD


Use the “CpldRotManage” command with the “--action GetInfo” option to retrieve information on
active CPLD and Golden CPLD.
• Updating the Golden Image
Use the “CpldRotManage” command with the “--action UpdateGolden” option to replace the golden
image with an active CPLD firmware.

OOB and In-Band Syntax:

Supermicro Update Manager User’s Guide 459


sum <-i <IP or host name> | -I Redfish_HI> -u <username> -p <password> -c

CpldRotManage --action <action>

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c CpldRotManage --

action GetInfo

The console output contains the following information.

Managed system.....................192.168.34.56

CPLD version...................F5.07.02

Golden BMC version.............F5.07.01

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c BmcRotManage --action

UpdateGolden

The console output contains the following information.

..........
Status: System is backing up current FW as golden image. Please wait for 2
minutes.
........................................
........................................
Done
Status: Please check golden FW version for result.

In-Band:

[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p PASSWORD -c BmcRotManage --action

UpdateGolden

The console output contains the following information.

Supermicro Update Manager User’s Guide 460


..........
Status: System is backing up current FW as golden image. Please wait for 2
minutes.
........................................
........................................
Done
Status: Please check golden FW version for result.

5.13.4 Getting Switchboard CPLD Firmware Image Information


The command “GetSwitchboardCpldInfo” supports the following features on CPLD RoT systems of X13/H13
and later platforms. Execute the command to get all the switchboards firmware installed on the managed
system, but for now, local switchboard firmware image information is not yet supported (with --file_only
option).
Currently, this command is only supported through redfish communication. Hence, in-band command can
only be done through the Redfish Host Interface.

OOB and In-Band RHI Syntax:

sum <-i <IP or host name> | -I Redfish_HI> -u <username> -p <password> -c

GetSwitchboardCpldInfo

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c

GetSwitchboardCpldInfo

The console output contains the following information of all switchboards CPLD that can be updated:

Managed system.....................192.168.34.56

[Main Switchboard]

Supermicro Update Manager User’s Guide 461


CPLD 1 version.............10

CPLD 2 version.............0F

[Left Switchboard]

CPLD 2 version.............32

[Right Switchboard]

CPLD 2 version.............3F

The switchboard CPLD has the following details:

Type Description
Main Switchboard It is possible to install many main switchboards.
Left Switchboard It is possible to install many left switchboards.
Left switchboard only can be displayed if the system has fully boot up.
Right Switchboard It is possible to install many right switchboards.
Right switchboard only can be displayed if the system has fully boot up.

Notes:
 Left/Right Switchboard CPLD #1 is not supported for user to get the information.
 Limitation, when the system is in the process of powering up, it is possible for this
command to fail. Please wait until system has fully boot up and try again.

Supermicro Update Manager User’s Guide 462


5.13.5 Updating Switchboard CPLD Firmware Image
The command “UpdateSwitchboardCpld” supports the following features on CPLD RoT systems of X13/H13
and later platforms. Execute the command with Switchboard CPLD image switchboard.jed to update the
managed system.

OOB and In-Band RHI Syntax:

sum <-i <IP or host name> | -I Redfish_HI> -u <username> -p <password> -c

UpdateSwitchboardCpld --file <filename> --type <type> [--index <index>] [--

reboot]

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c UpdateSwitchboardCpld

-–file Left_Switchboard_CPLD2.jed –-type Left –-index 2

The console output displays the following information:

Managed system.....................192.168.34.56

[Left Switchboard]

CPLD 2 version.............3F

Status: Start updating Switchboard CPLD for 192.168.34.56

************************************WARNING*************************************

Do not remove AC power from the server.

********************************************************************************

Supermicro Update Manager User’s Guide 463


Uploading FW...........Done

Preparing updating FW.............Done

Updating FW...>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>Done

Status: Switchboard CPLD is updated for 192.168.34.56

Note: Update done. No further action is needed for this firmware to take effect.

Notes:
 Left/Right Switchboard CPLD #1 is not supported for user to update the firmware.
 Side Switchboard CPLD (Left or Right) firmware can be used interchangeably to update,
but not for Main Switchboard as it has its own firmware.
 Reboot option is required when updating the Main Switchboard CPLD, since it can only
be updated when the system is in the power off state. Reboot option is optional when
updating Side Switchboard CPLD.
 Updating Side Switchboard CPLD requires the system to be in a fully booted up state.
 Limitation, when the system is in the process of powering up, it is possible for this
command to fail. Please wait until system has fully boot up and try again.

Getting Fanboard CPLD Firmware Image Information

Use the “GetFanboardCpldInfo” command to get the Fanboard CPLD firmware image information of
X13/H13 and later RoT platforms from the managed system.

Syntax:

sum <-i <IP or host name> | -I Redfish_HI> -u <username> -p <password> -c

GetFanboardCpldInfo

Supermicro Update Manager User’s Guide 464


Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c GetFanboardCpldInfo

Managed system...............................192.168.34.56

[Front CPLD]

Fanboard CPLD 1 version..............01

[Rear CPLD]

Fanboard CPLD 1 version..............01

In-Band Redfish Host Interface:

[SUM_HOME]# ./sum -c GetFanboardCpldInfo -I Redfish_HI -u ADMIN -p ADMIN

The console output contains the following information.

Managed system...............................192.168.34.56

[Front CPLD]

Fanboard CPLD 1 version..............01

[Rear CPLD]

Fanboard CPLD 1 version..............01

Supermicro Update Manager User’s Guide 465


The Fanboard CPLD has the following details:

Type Description
Front Fanboard The first Fanboard.
Rear Fanboard The second Fanboard.
Fanboard <num> The third or above Fanboards.

5.13.6 Updating Fanboard CPLD Firmware Image

Use the “UpdateFanboardCpld” command with the Fanboard CPLD firmware image fanboard.jed to run
SUM on CPLD RoT systems of X13/H13 and later platforms to update the Fanboard CPLD of a managed
system.

Syntax:

sum <-i <IP or host name> | -I Redfish_HI> -u <username> -p <password> -c

UpdateFanboardCpld --file <filename> --type <Fanboard_ID> [--index <CPLD_ID>]

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c UpdateFanboardCpld --

file Fanboard_CPLD.bin --type Front

In-Band Redfish Host Interface:

[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p PASSWORD -c UpdateFanboardCpld --

file Fanboard_CPLD.bin --type Rear --index 1

Supermicro Update Manager User’s Guide 466


5.13.7 Getting AOM Board CPLD Firmware Image Information

Use the “GetAomboardCpldInfo” command to get the AOM board CPLD firmware image information of
NVIDIA MGX™ systems from the managed system.

Single System

OOB sum -i <IP or host name> -u <username> -p <password> -c GetAomboardCpldInfo

In-Band sum -I Redfish_HI -u <username> -p <password> -c GetAomboardCpldInfo

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c GetAomboardCpldInfo

Managed system..........................192.168.34.56

AOM Board CPLD version..............CPLD_ID: 270000D0 Rev: 02

In-Band Redfish Host Interface:

[SUM_HOME]# ./sum -c GetAomboardCpldInfo -I Redfish_HI -u ADMIN -p ADMIN

The console output contains the following information.

Managed system..........................169.254.3.254

AOM Board CPLD version..............CPLD_ID: 270000D0 Rev: 02

Supermicro Update Manager User’s Guide 467


5.13.8 Updating AOM Board CPLD Firmware Image

Use the “UpdateAomboardCpld” command with the AOM board CPLD firmware image AOM_CPLD.jed to
run SUM on NVIDIA MGX™ systems to update the AOM board CPLD of a managed system.

Single System

sum -i <IP or host name> -u <username> -p <password> -c UpdateAomboardCpld --


OOB file <filename>

sum -I Redfish_HI -u <username> -p <password> -c UpdateAomboardCpld --file


In-Band <filename>

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c UpdateAomboardCpld --

file AOM_CPLD.jed

In-Band Redfish Host Interface:

[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p PASSWORD -c UpdateAomboardCpld --

file AOM_CPLD.jed

Supermicro Update Manager User’s Guide 468


5.13.9 Getting Miscellaneous CPLD Firmware Image Information

Use the “GetMiscCpldInfo” command to get the Miscellaneous CPLD firmware image information of
NVIDIA MGX™ systems from the managed system.

Single System

OOB sum -i <IP or host name> -u <username> -p <password> -c GetMiscCpldInfo

In-Band sum -I Redfish_HI -u <username> -p <password> -c GetMiscCpldInfo

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c GetMiscCpldInfo

Managed system..........................192.168.34.56

Misc CPLD version...................0B

In-Band Redfish Host Interface:

[SUM_HOME]# ./sum -c GetMiscCpldInfo -I Redfish_HI -u ADMIN -p ADMIN

The console output contains the following information.

Managed system..........................169.254.3.254

Misc CPLD version...................0B

Supermicro Update Manager User’s Guide 469


5.13.10 Updating Miscellaneous CPLD Firmware Image

Use the “UpdateMiscCpld” command with the AOM board CPLD firmware image MISC_CPLD.jed to run
SUM on NVIDIA MGX™ systems to update the Miscellaneous CPLD of a managed system.

Currently, no inband support for now.

Single System

sum -i <IP or host name> -u <username> -p <password> -c UpdateMiscCpld --file


OOB <filename>

sum -I Redfish_HI -u <username> -p <password> -c UpdateMiscCpld --file


In-Band <filename> --reboot

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c UpdateMiscCpld --file

MISC_CPLD.jed –reboot

In-Band:

[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p PASSWORD -c UpdateMiscCpld --file

MISC_CPLD.jed --reboot

Supermicro Update Manager User’s Guide 470


5.14 AIP Management of a Single System
5.14.1 Getting AIP CPLD Information

Use the “GetAipCpldInfo” command to get the current AIP (AI Processor) CPLD information from the
managed system installed with AIP.

Syntax:

sum -i <IP or host name> -u <username> -p <password> -c GetAipCpldInfo

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c GetAipCpldInfo

The console output contains the following information.

AIP CPLD information

====================

Managed system..........................192.168.34.56

[AIP Device 1]

AIP Model.......................Habana Gaudi HL205

AIP CPLD version................1A

[AIP Device 2]

AIP Model.......................Habana Gaudi HL205

AIP CPLD version................1A

[AIP Device 3]

AIP Model.......................Habana Gaudi HL205

Supermicro Update Manager User’s Guide 471


AIP CPLD version................1A

[AIP Device 4]

AIP Model.......................Habana Gaudi HL205

AIP CPLD version................1A

[AIP Device 5]

AIP Model.......................Habana Gaudi HL205

AIP CPLD version................1A

[AIP Device 6]

AIP Model.......................Habana Gaudi HL205

AIP CPLD version................1A

[AIP Device 7]

AIP Model.......................Habana Gaudi HL205

AIP CPLD version................1A

[AIP Device 8]

AIP Model.......................Habana Gaudi HL205

AIP CPLD version................1A

Note: This command is now only available on the SYS-420GH-TNGR system.

Supermicro Update Manager User’s Guide 472


5.14.2 Updating the AIP CPLD Firmware Image

Use the “UpdateAipCpld” command with the given AIP (AI Processor) CPLD firmware image to run SUM to
update the AIP CPLD firmware of managed systems installed with AIP.

Syntax:

sum -i <IP or host name> -u <username> -p <password> -c UpdateAipCpld --file

<filename>

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c UpdateAipCpld --file

AIP_CPLD.bin

The console output contains the following information.

Managed system.....................192.168.34.56

AIP FW version.................1A;1A;1A;1A;1A;1A;1A;1A

Local AIP image file............... AIP_CPLD.bin

Status: Start updating AIP CPLD for 192.168.34.56

************************************WARNING*************************************

Do not remove AC power from the server.

Uploading FW.......Done

Updating FW...>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>Done

Status: AIP CPLD is updated for 192.168.34.56

Update Complete, Please wait for BMC reboot, about 5 mins.

Supermicro Update Manager User’s Guide 473


..................................................

..................................................

..................................................

..................................................

..................................................

.............................................Done

Note: This command only supports the SYS-420GH-TNGR system.

Supermicro Update Manager User’s Guide 474


5.15 Profile Management for a Single Blade System
Profile update is used to manage CMM and system configurations for the Blade system and update
configuration at scheduled times. Profile update is only supported on the Blade system with 64MB CMM
AST2400. You can use the ChangeCmmCfg/ChangeSystemCfg command and the --upload option to upload
one CMM profile, up to twenty system profiles, and CMM/Blade system configurations to CMM.

Use the ProfileManage command to edit and get the existing profile information from CMM. Note that
there is a space limit on Profiles. Once the space is full, use the ProfileManage command to delete
unnecessary profiles and upload new profiles. Each profile name on CMM is unique. Different profiles with
the same profile names cannot exist on CMM at the same time.

Commands Descriptions

ProfileManage • Gets and edits profile information or deletes the profile on CMM.
• Provides profile association information between specified profile
and the selected Blade systems.

GetCmmCfg Downloads the current or repository CMM configuration from CMM.

ChangeCmmCfg • Uploads the CMM configuration to CMM.


• Updates the CMM configuration to CMM by the existing CMM
configuration on CMM.

GetSystemCfg Downloads the current or repository system configuration from CMM.

ChangeSystemCfg • Uploads the system configuration to CMM.


• Updates the system configuration to a Blade system through CMM
with the existing system configuration on CMM.

5.15.1 Profile Update Rule

SUM supports two update actions, apply and deploy. The update actions should be paired with the
scheduled update time in the profile to update the managed system.

The update the “Apply”action can be used to update the existing Blade systems at either scheduled time
or immediately. You can also use the update the “Deploy” action to update the Blade systems that have

Supermicro Update Manager User’s Guide 475


been existing or replaced. If the Blade system is busy, BMC will update the system configuration after the
ongoing task is complete. By default, the file creation time will be treated as the default value in
“ScheduledUpdateTime,” and the file can be used for immediate update.

One Blade system only accepts one single update rule. The new rule always replaces the older rule.

Update Action Scheduled Time Operation

Apply Past time Updates the Blade system immediately.

Apply Future time Updates the Blade system at scheduled time.

Deploy Past time Immediately updates the Blade systems that have been
existing or replaced.

Deploy Future time Updates the Blade systems that have been existing or
replaced at scheduled time.

For immediate update:

• Updates the existing Blade systems immediately.


• If the system is busy, it will update the configuration after the ongoing task is complete.
• If the the Blade system is either replaced or re-plugged, CMM will send the configuration to the new
Blade after the HW change, and then update the Blade configuration.

For schedule update:

• Updates the existing Blade systems at scheduled time.


• If the system is busy at scheduled time, the configuration will be updated after the ongoing task is
complete.
• If the Blade system is replaced or re-pluggd after the scheduled updatetime, CMM will send the
configuration to the new Blade after hardware change, and then update the Blade configuration.

Supermicro Update Manager User’s Guide 476


5.15.2 Profile Management

Follow the steps below to edit a profile on CMM.

1. Execute the ProfileManage command with the --Action Get option to get the existing profile list on
CMM. For more details, please refer to 5.6.11 Managing profile Information (Single System).

2. Check profile information on the list.

3. Execute the ProfileManage command with the --Action Edit, --file_id and [--profile_name/ --
profile_description/ --schedule_update_time] options to edit existing profile information on CMM. For
more details, please refer to 5.6.11 Managing profile Information (Single System).

4. Execute ProfileManage command with the --Action Get option again to check whether the profile
information is changed. For more details, please refer to 5.6.11 Managing profile Information (Single
System).

5.15.3 Updating CMM Configurations

Follow the steps below to update the CMM configuration.

1. Execute the ProfileManage command with the --Action Get option to get the existing profile list on CMM
to check if any profile is available for update. For more details, please refer to 5.6.11 Managing profile
Information (Single System).

2. Execute the GetCmmCfg command with the --Download option to download the current CMM
configuration file for profile update. For more details, please refer to 5.6.3 Getting CMM Settings (Single
System).

3. Edit the CMM configuration file to set the unique profile name, edit profile description and schedule
update time.

4. Execute the ChangeCmmCfg command with the --Upload option to upload the local CMM configuration
file to CMM. For more details, please refer to 5.6.4 Updating CMM Settings (Single System).

Supermicro Update Manager User’s Guide 477


5. Execute the ProfileManage command with the --Action Get option to get the existing profile list on
CMM, then check if the profile is uploaded successfully before update. For more details, please refer
to 5.6.11 Managing profile Information (Single System).

6. Execute the ChangeCmmCfg command with the --Update option to update the selected CMM
configuration the profile. For more details, please refer to 5.6.4 Updating CMM Settings (Single
System).

7. Execute the ProfileManage command with the --Action Get, --file_id <profile ID> and --showall options
to check whether the task is executed. For more details, please refer to 5.6.11 Managing profile
Information (Single System).

Note: Use the ProfileManage command to upload the profile information to CMM, which
can be updated. Please refer to 5.6.7 Managing profile Information (Single System).

5.15.4 Updating Blade Configurations

Follow the steps below to update the Blade system configuration.

1. Execute the ProfileManage command with the --Action Get option to get the existing profile list on
CMM to check if any profile is available for update. For more details, please refer to 5.6.11 Managing
profile Information (Single System).

2. Execute the GetSystemCfg command with the --Download option to download the current system
configuration file.

3. Edit the system configuration file to set a unique profile name, profile description, and scheduled
update time.

4. Execute the ChangeSystemCfg command with the --Upload option to upload the local system
configuration file to CMM. For more details, please refer to 5.7.12 Getting System Settings.

Supermicro Update Manager User’s Guide 478


5. Execute the ProfileManage command with the --Action Get option to get the existing profile list on
CMM to check if the profile is uploaded successfully before update. For more details, please refer to
5.6.11 Managing profile Information (Single System).

6. Execute the ChangeSystemCfg command with the --Update and --dev_id options to update the
system configuration to the Blade system through CMM by the selected profile. For more details,
please refer to 5.7.13 Updating System Settings.

7. Execute the ProfileManage command with the --Action Get, --file_id <profile ID> and --showall
options to check whether the task is executed. For more details, please refer to 5.6.11 Managing
profile Information (Single System).

Note: Use the ProfileManage command to upload the profile information to CMM, which
can be updated later. Please refer to 5.6.7 Managing profile Information (Single System).

Supermicro Update Manager User’s Guide 479


5.16 TwinPro Management for a Single System
5.16.1 Getting TwinPro Settings

Use the “GetTpCfg” command to execute SUM to get the current TwinPro settings from the managed
system and save it in the TpCfg.xml file.

OOB and In-Band Syntax:

sum [-i <IP or host name> -u <username> -p <password>] -c GetTpCfg --file

<TpCfg.xml> [--overwrite]

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c GetTpCfg --file

TpCfg.xml --overwrite

In-Band:

[SUM_HOME]# ./sum -c GetTpCfg --file TpCfg.xml --overwrite

5.16.2 Updating TwinPro Settings

1. Follow the steps in 5.16.1 Getting TwinPro settings.


2. Edit the configurable element values in the TwinPro configuration text file TpCfg.xml to the desired
values as illustrated in 4.9 Format of TwinPro Configuration Text File.
3. Skip unchanged tables in the text file by setting the Action attribute as “None”. Note that this step is
optional.
4. Remove unchanged tables/elements in the text file. Note that this step is optional.

Use the “ChangeTpCfg” command with the updated TpCfg.xml file to run SUM to update the TwinPro
configuration.

OOB and In-Band Syntax:

Supermicro Update Manager User’s Guide 480


sum [-i <IP or host name> -u <username> -p <password>] -c ChangeTpCfg --file

<TpCfg.xml>

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c ChangeTpCfg --file

TpCfg.xml

In-Band:

[SUM_HOME]# ./sum -c ChangeTpCfg --file TpCfg.xml

Supermicro Update Manager User’s Guide 481


5.17 CDU Management for a Single System
5.17.1 Getting CDU Information

Use the “MonitorCDUStatus” command to execute SUM to show the current CDU Web UI Status remotely.
With the --file option, the CDU status can be saved into an output file.

Syntax:

sum -i <IP or host name> -u <username> -p <password> -c MonitorCDUStatus --

action GetStatus|1 [--file <CDUStatus.txt>] [--overwrite]

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c MonitorCDUStatus --

action GetStatus

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c MonitorCDUStatus --

action GetStatus --file CDUStatus.txt --overwrite

The console output contains the following information.

CDU (Coolant Distribution Unit) System Status

[System Status]

CDU Status: OK

Emergency Status: OK

Operation Mode: auto

[Device Status]

Device Name Status Value Operation Time(h:m)

-------------- ------- ------- -------------------

Supermicro Update Manager User’s Guide 482


Power Top OK

Power Bottom OK

Pump Left OK 6281[RPM] 108:34

Pump Right OK 6281[RPM] 108:34

Valve Left OK 100[%]

Valve Right OK 100[%]

CDU Status OK

Sensor Module OK

Leak Detection OK

Humidity Sensor OK

Liquid Level Low

Leak (External Ch1) N/A

Leak (External Ch2) N/A

Liquid Level (External Ch1) N/A

Liquid Level (External Ch2) N/A

[Sensor Value]

Sensor Name Status Value

-------------- ------- -------

Temperature from Server Warning level 25.52[°C]

Temperature to Server Valid 42.15[°C]

Temperature from Facility Valid 23.20[°C]

Supermicro Update Manager User’s Guide 483


Temperature to Facility Valid 23.12[°C]

Temperature ambient 20.69[°C]

Pressure Server Warning level 0.230[MPa]

Pressure Facility Alert level 0.000[Ma]

Flow Rate Server Alert level 0.00[L/min]

Flow Rate Facility Alert level 0.00[L/min]

Humidity 66.20[%RH]

Dew Point OK 14.16[°C]

Heat Load -0.00[kW]

5.17.2 Setting CDU Alert Setting

Use the “MonitorCDUStatus” command to execute SUM to set CDU alert setting with the
CDU_alert_setting.json file.

Syntax:

sum -i <IP or host name> -u <username> -p <password> -c MonitorCDUStatus --

action SetCfg|2 --file < CDU_alert_setting.json file>

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c MonitorCDUStatus --

action SetCfg --file CDU_alert_setting.json

Supermicro Update Manager User’s Guide 484


5.17.2.1 Explain the JSON File Format of CDU alert setting

A CDU alert setting JSON file format is explained below. The sample file is named as
“CDU_alertsetting_sample.json” and bundled in the SUM release package.

The table lists the names on the CDU Web UI and in the JSON file.

• Device Status Table

CDU Web UI CDU sample.json CDU Web UI CDU sample.json

Leak Detection leak Sensor Module sensor

Power Top power1 Humidity Sensor humidity

Power Button power2 Liquid Level (OK) level_upper

Control Unit cunit Liquid Level (Low) level_lower

Pump Left pump1 Liquid Leak (External Ch1) leak_ext_ch1

Pump Right pump2 Liquid Leak (External Ch2) leak_ext_ch2

Valve Left valv1 Liquid Level (External Ch1) level_ext_ch1

Valve Right valv2 Liquid Level (External Ch2) level_ext_ch2

• Sensor value table

CDU Web UI CDU sample.json CDU Web UI CDU sample.json

Temperature (From Server) temp_from_server Pressure (Server) press_server

Temperature (To Server) temp_to_server Pressure (Facility) press_facility

Temperature (From Facility) temp_from_facility Flow Rate (Server) flow_server

Temperature (To Facility) temp_to_facility Flow Rate (Facility) flow_facility

You can decide whether to trap the items under “trap” in each device. The allowable value is “true” or
“false.” Regardless of the "trap" status of items, it will affect the CDU status.

Supermicro Update Manager User’s Guide 485


You can set the maximum and minimum values of alerts and warnings for Temperature, Pressure, and Flow
Rate to monitor the CDU sensors status.

For each alert and waring level min. and max. thresholds of sensors, please refer to the following table.

CDU sample.json Level Maximum Minimum


Alert 80 0
temp_from_server(°C)
Warning 80 0
Alert 80 0
temp_to_server(°C)
Warning 80 0
Alert 80 -10
temp_from_facility(°C)
Warning 80 -10
Alert 80 0
temp_to_facility(°C)
Warning 80 0
Alert 1 0
press_server(MPa)
Warning 1 0
Alert 1 0
press_facility(MPa)
Warning 1 0
Alert 150 0
flow_server(L/min)
Warning 150 0
Alert 150 0
flow_facility(L/min)
Warning 150 0

Supermicro Update Manager User’s Guide 486


5.18 Backplane Management for a Single System
5.18.1 Getting Multi-Node EC Firmware Image Information

Use the “GetMultinodeEcInfo” command to get the multi-node EC firmware image information from the
managed system as well as the local multi-node EC firmware image (with the --file option).

Syntax:

sum [[-i <IP or host name> | -I Redfish_HI] -u <username> -p <password>] -

c GetMultinodeEcInfo [--file <filename> [--file_only]]

Example:

OOB:

[SUM_HOME]# ./sum -i 192.184.11.65 -u ADMIN -p PASSWORD -c GetMultinodeEcInfo

The console output contains the following information.

Managed system............192.184.11.65

EC ID.................A7

EC version............1.20

In-Band:

[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p PASSWORD -c GetMultinodeEcInfo

The console output contains the following information.

Managed system............169.254.3.254

EC ID.................A7

EC version............1.20

Supermicro Update Manager User’s Guide 487


[SUM_HOME]# ./sum -c GetMultinodeEcInfo --file EC.bin --file_only

The console output contains the following information.

Local EC image file.......EC.bin

EC ID.................A7

EC version............1.20

5.18.2 Updating the Multi-node EC Firmware Image

Use the “UpdateMultinodeEc” command with the given multi-node EC firmware image EC.bin to run SUM
to update the multi-node EC firmware of a managed system.

Syntax:

sum <-i <IP or host name> | -I Redfish_HI> -u <username> -p <password> -c

UpdateMultinodeEc --file <filename>

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c UpdateMultinodeEc --

file EC.bin

In-Band:

[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p PASSWORD -c UpdateMultinodeEc --file

EC.bin

The console output contains the following information.

Managed system.....................169.254.3.254

EC ID..........................A7

EC version.....................1.20

Supermicro Update Manager User’s Guide 488


Local EC image file................EC.bin

EC ID..........................A7

EC Version.....................1.20

Status: Start updating Multi-node EC for 169.254.3.254

************************************WARNING*************************************

Do not remove AC power from the server.

********************************************************************************

Uploading FW...Done

Updating FW...>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>Done

Status: Multi-node EC is updated for 169.254.3.254

Note: This command can be only run on a system on node A to update EC FW for multi
nodes.

Supermicro Update Manager User’s Guide 489


5.18.3 Getting Backplane CPLD Firmware Information

Use the “GetBackplaneCpldInfo” command to get the backplane CPLD firmware information from the
backplane on managed system.

Syntax:

sum [-i <IP or host name> -u <username> -p <password>] -c GetBackplaneCpldInfo

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c GetBackplaneCpldInfo

The console output contains the following information.

Backplane CPLD information

==========================

Managed system..........................192.168.34.56

[Backplane 0]

Backplane Model.................BPN-NVMe4-217BHQ-S6

Backplane CPLD ID...............0023

Backplane CPLD Revision.........0C

In-Band:

[SUM_HOME]# ./sum -c GetBackplaneCpldInfo

The console output contains the following information.

Backplane CPLD information

==========================

Managed system..........................localhost

[Backplane 0]

Backplane Model.................BPN-NVMe4-217BHQ-S6

Backplane CPLD ID...............0023

Backplane CPLD Revision.........0C

Supermicro Update Manager User’s Guide 490


Notes:

 This command is only available on X10/H10 and later platforms with storage backplanes
installed.
 A maximum of four backplane CPLDs can be detected.

5.18.4 Updating the Backplane CPLD Firmware Image

Use the “UpdateBackplaneCpld” command with the backplane CPLD firmware image to update the
backplane CPLD firmware of a managed system by SUM.

Syntax:

sum -i <IP or host name> -u <username> -p <password> -c UpdateBackplaneCpld <--

index <0|1|2|3> --file BPN_CPLD.jed | --update_list

0:BPN_CPLD.jed[,1:Backplane_CPLD.jed]...]> --manual_ejected

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c UpdateBackplaneCpld -

-index 0 --file BPN_CPLD.jed --manual_ejected

The console output contains the following information.

Status: Start updating Backplane CPLD for 192.168.34.56

************************************WARNING****************************

Do not remove AC power from the server.

************************************************************************

Warning: All drives on backplane will be force ejected due to backplane


reset after update.
Supermicro Update Manager User’s Guide 491
Managed system.......................192.168.34.56

Backplane CPLD ID...............0023

Backplane CPLD Revision.........0C

Local CPLD image file...........BPN_CPLD.jed

Uploading FW...Done

Updating FW...>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>Don

Status: Backplane CPLD is updated for 192.168.34.56

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c


UpdateBackplaneCpld --update_list 0:BPN_CPLD.jed,1:BPN_CPLD.jed --
manual_ejected

The console output contains the following information.

Status: Start updating Backplane CPLD for 192.168.34.56

************************************WARNING****************************

Do not remove AC power from the server.

************************************************************************

Warning: All drives on backplane will be force ejected due to backplane


reset after update.

Managed system.......................192.168.34.56

Backplane CPLD ID...............0023

Supermicro Update Manager User’s Guide 492


Backplane CPLD Revision.........0C

Local CPLD image file...........BPN_CPLD.jed

Uploading FW...Done

Updating FW...>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>Don

Backplane CPLD ID...............0023

Backplane CPLD Revision.........0C

Local CPLD image file...........BPN_CPLD.jed

Uploading FW...Done

Updating FW...>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>Don

Status: Backplane CPLD is updated for 192.168.34.56

Notes:

 This command is only available on X12/H12 and later platforms with storage backplanes
installed.
 A maximum of four backplane CPLDs can be updated.

Supermicro Update Manager User’s Guide 493


5.19 PCIe Switch Management for a Single System
5.19.1 Getting PCIe Switch Information

Use the “GetPCIeSwitchInfo” command to get and read the PCIe Switch information of the managed
system and parse PCIe Switch information from the firmware file.

Syntax:

sum -c GetPCIeSwitchInfo [--file <filename> [--file_only]]

Example:

In-Band:

[SUM_HOME]# ./sum -c GetPCIeSwitchInfo

In-Band:

[SUM_HOME]# ./sum -c GetPCIeSwitchInfo --file fw_file.img --file_only

• The console output contains the following information for the Broadcom chipset on the H12DGQ-NT6
system.

Managed system..........................localhost

PCIe Switch Device Vendor............... Broadcom

Device ID(0)

Device Name.........................SwitchPlx0

Pex Cfg Version.....................1209

Device ID(1)

Device Name.........................SwitchPlx1

Pex Cfg Version.....................1209

Device ID(2)
Supermicro Update Manager User’s Guide 494
Device Name.........................SwitchPlx2

Pex Cfg Version.....................3407

Device ID(3)

Device Name.........................SwitchPlx3

Pex Cfg Version.....................3407

Local Firmware File.................... H12DGQ_NT6_1207_PWR.bin

PCIe Switch Device Vendor...............Broadcom

Pex Cfg Version.....................1207

• The console output contains the following information for the Microchip chipset on a X12DSC-6
motherboard that includes AOM-S3616-S/AOM-SADPT-S.

Managed system..........................localhost

PCIe Switch Device Vendor...............Microchip

Device ID(0)

Device Name.....................switchtec0

FW Version......................3.60 B049

CFG CRC.........................d9bd7434

Local Firmware File....................MCH036B360049_20201210.fwimg

PCIe Switch Device Vendor...............Microchip

Generation..........................GEN4

Supermicro Update Manager User’s Guide 495


Type................................CFG

Version.............................3.60 B049

Image Length........................267768 bytes

CRC.................................101a194c

Secure Version......................00000000

Notes:

 This command is available on H12DGQ-NT6 with Broadcom PCIe Switch Gen4 Series
chipsets and X12DSC-6 with Microchip PCIe Switch Gen4 Series chipsets platforms.
 On the H12DGQ-NT6 platform with Broadcom PCIe Switch Gen4 Series chipsets, find
the readme.txt in the “SUM/driver/broadcom/PlxSdk” folder to load the device driver.
 On the X12DSC-6 platform with Microchip PCIe Switch Gen4 Series chipsets, download
the SDK from Microsemi and follow the instructions on the website to load the device
driver.

Supermicro Update Manager User’s Guide 496


5.19.2 Updating the PCIe Switch Firmware Image

Use the “UpdatePCIeSwitch” command with the PCIe Switch firmware image to update the PCIe Switch
firmware of a managed system.

Syntax:

sum -c UpdatePCIeSwitch --dev_id <index> --file <filename>

Example:

In-band:

[SUM_HOME]# ./sum -c UpdatePCIeSwitch --file fw_file.img --dev_id 0

• The console output contains the following information for a Broadcom chipset on an H12DGQ-NT6
system.

Managed system..........................localhost

PCIe Switch Device Vendor...............Broadcom

Device ID(0)

Device Name.........................SwitchPlx0

Pex Cfg Version.....................1207

Local Firmware File......................H12DGQ_NT6_1209_PWR.bin

PCIe Switch Device Vendor................Broadcom

Pex Cfg Version......................1209

Update firmware progress Started ...

Writing Firmware ........................(100%)

Update firmware progress Finished.

Supermicro Update Manager User’s Guide 497


Update firmware success.

• The console output contains the following information for Microchip chipset on X12DSC-6 systems with
AOM-S3616-S/AOM-SADPT-S.

Managed system..........................localhost

PCIe Switch Device Vendor...............Microchip

Device ID(0)

Device Name.........................switchtec0

FW Version..........................3.60 B049

CFG CRC.............................101a194c

Local Firmware File.....................MCH036B360049_20201210.fwimg

PCIe Switch Device Vendor...............Microchip

Generation..........................GEN4

Type................................CFG

Version.............................3.60 B049

Image Length........................267768 bytes

CRC.................................101a194c

Secure Version......................00000000

Update firmware progress Started ...

Writing Firmware ....................... (100%)

Supermicro Update Manager User’s Guide 498


Update firmware progress Finished.

Update firmware success.

Note: Please reboot the system to activate the updated image.

Notes:

 This command is available on H12DGQ-NT6 with Broadcom PCIe Switch Gen4 Series
chipsets and X12DSC-6 platforms with Microchip PCIe Switch Gen4 Series chipsets.
 On H12DGQ-NT6 platforms with Broadcom PCIe Switch Gen4 Series chipsets, find the
readme.txt in the “SUM/driver/broadcom/PlxSdk” folder to load the device driver.
 On X12DSC-6 platforms with Microchip PCIe Switch Gen4 Series chipsets, download
the SDK from Microsemi and follow the instructions on the website to load the device
driver.

Supermicro Update Manager User’s Guide 499


5.20 Virtual Media Management for a Single System
Starting from SUM 2.11.0 for platforms that support multiple virtual media devices, use the “GetVmInfo”
and “VmManage” commands to use virtual media features. For platforms that only support a single virtual
media device, use the “MountIsoImage,” “UnMountIsoImage,” “MountFloppyImage” and
“UnmountFloppyImage” commands to mount and unmount an image.

See the table below for the virtual media features.

Command SUM 2.11.0 and later


Platforms only support single virtual Platforms support multiple virtual
media device media devices
GetVmInfo No support Support

VmManage (Action: Support Support


Enable/Disable)

VmManage (Action: No support Support


Mount/Unmount)

MountIsoImage Support No support

UnmountIsoImage Support No support

MountFloppyImage Support No support

UnmountFloppyImage Support No support

Supermicro Update Manager User’s Guide 500


5.20.1 Providing an ISO Image as a Virtual Media through BMC and File
Server

Use the “MountIsoImage” command to mount an ISO image as a virtual media to the managed system
through a SAMBA/HTTP/HTTPS server. Since SUM 2.5.0, SUM has a new rule when using new special
characters for virtual media. For more details, see the tables below. Starting from SUM 2.11.0, this
command is only supported on the platforms that only support a single virtual media device.

HTTP/HTTPS URL Format:

HTTP/HTTPS URL http://<hostname or IP/<file path>

http://<hostname or IP>:<port number>/<file path>

https://<hostname or IP>/<file path>

https://<hostname or IP>:<port number>/<file path>

http://<hostname or IP>/<shared point>/<file path>

http://<hostname or IP>:<port number>/<shared point>/<file path>

https://<hostname or IP>/<shared point>/<file path>

https://<hostname or IP>:<port number>/<shared point>/<file path>

Share host http://<hostname or IP>

http://<hostname or IP>:<port number>

https://<hostname or IP>

https://<hostname or IP>:<port number>

Path to image <shared point>/<file path> or <file path>

Supermicro Update Manager User’s Guide 501


SAMBA URL/UNC Format:

SAMBA URL smb://<hostname or IP>/<file path>

smb://<hostname or IP>:<port number>/<file path>

smb://<hostname or IP>/<shared point>/<file path>

smb://<hostname or IP>:<port number>/<shared point>/<file path>

SAMBA UNC \\<hostname or IP>\<file path>

\\<hostname or IP>:<port number>\<file path>

\\<hostname or IP>\<shared point>\<file path>

\\<hostname or IP>:<port number>\<shared point>\<file path>

Share host <hostname or IP> or <hostname or IP>:<port number>

Path to image <shared point>/<file path> or <file path>

Allowed character classes:


• a-z
• A-Z
• 0-9
• Special characters for ID and password: ^ (a caret)
• Special characters for a shared host: - (a dash) or . (a period)
• Special character for a shared host in HTTP and SAMBA protocols in an IPv6 URL: : (a colon)
• The shared host for HTTP IPv6 address should be enclosed by square brackets: [ ]
• Special characters for path to image: @,^,-,_,., /, and \ (Note that a slash/ and a backslash \ can only
be used in a path.)
• Special characters like backslashes \ and slashes / should only be used once; repeated use (e.g., //, \\,
/\ and \/) are not allowed.
• Special character ^ (a caret) is not available for use in older versions of BMC firmware.
• The port number may not be supported in older versions of BMC firmware.
• IPv6 link-local address starts with fe80 is not allowed.

Supermicro Update Manager User’s Guide 502


Syntax:

sum [-i <IP or host name> | [-I Redfish_HI]] [-u <username> -p <password>] -c

MountIsoImage --image_url <URL> [[--id <id for URL> --pw <password for URL>] |

[--id <id for URL> --pw_file <password file path>]]

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c MountIsoImage --

image_url 'smb://192.168.35.1/MySharedPoint/MyFolder/Image.iso' --id smbid --pw

smbpasswd

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c MountIsoImage --

image_url 'smb://[2001:db8::1]/MySharedPoint/MyFolder/Image.iso' --id smbid --pw

smbpasswd

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c MountIsoImage --

image_url 'http://192.168.35.1/MySharedPoint/MyFolder/Image.iso' --id smbid --pw

smbpasswd

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c MountIsoImage --

image_url 'http://[2001:db8::1]:80/MySharedPoint/MyFolder/Image.iso' --id smbid

--pw_file smbpasswd.txt

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c MountIsoImage --

image_url 'https://192.168.35.1/MySharedPoint/MyFolder/Image.iso' --id smbid --

pw smbpasswd

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c MountIsoImage --

image_url 'https://[2001:db8::1]:80/MySharedPoint/MyFolder/Image.iso' --id smbid

--pw_file smbpasswd.txt

Supermicro Update Manager User’s Guide 503


[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c MountIsoImage --

image_url '\\192.168.35.1\MySharedPoint\MyFolder\Image.iso' --id smbid --pw_file

smbpasswd.txt

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c MountIsoImage --

image_url '\\2001:db8::1\MySharedPoint\MyFolder\Image.iso' --id smbid --pw_file

smbpasswd.txt

smbpasswd.txt:

smbpasswd

In-band:

[SUM_HOME]# ./sum -c MountIsoImage --image_url

'smb://192.168.35.1/MySharedPoint/MyFolder/Image.iso' --id smbid --pw smbpasswd

[SUM_HOME]# ./sum -c MountIsoImage --image_url

'smb://[2001:db8::1]/MySharedPoint/MyFolder/Image.iso' --id smbid --pw smbpasswd

[SUM_HOME]# ./sum -c MountIsoImage --image_url

'http://192.168.35.1/MySharedPoint/MyFolder/Image.iso' --id smbid --pw smbpasswd

[SUM_HOME]# ./sum -c MountIsoImage --image_url

'http://[2001:db8::1]:80/MySharedPoint/MyFolder/Image.iso' --id smbid --pw

smbpasswd

[SUM_HOME]# ./sum -c MountIsoImage --image_url

'https://192.168.35.1/MySharedPoint/MyFolder/Image.iso' --id smbid --pw

smbpasswd

[SUM_HOME]# ./sum -c MountIsoImage --image_url

'https://[2001:db8::1]:80/MySharedPoint/MyFolder/Image.iso' --id smbid --pw

smbpasswd

Supermicro Update Manager User’s Guide 504


[SUM_HOME]# ./sum -c MountIsoImage --image_url

'\\192.168.35.1\MySharedPoint\MyFolder\Image.iso' --id smbid --pw_file

smbpasswd.txt

[SUM_HOME]# ./sum -c MountIsoImage --image_url

'\\2001:db8::1\MySharedPoint\MyFolder\Image.iso' --id smbid --pw_file

smbpasswd.txt

smbpasswd.txt:

smbpasswd

Notes:

 Special characters for ID and password: ^ (a caret)


 Special characters for shared host: - (a dash) or . (a period)
 Special character for HTTP and SAMBA protocols in an IPv6-format URL shared host: : (a
colon)
 Share host for HTTP protocol in IPv6 format must be enclosed with square brackets ([ ])
 Special characters for path to image: @^-_./\ (/ and \ can only be used in a path)
 Special characters like backslashes \ and slashes / should only be used once; repeated
use (e.g., //, \\, /\ and \/) is not allowed.
 Special character ^ (Caret) is not available for use in older versions of BMC firmware.
 The port number may not be supported in older versions of BMC firmware.
 IPv6 link-local address starts with fe80 is not allowed.

Supermicro Update Manager User’s Guide 505


5.20.2 Removing an ISO Image as Virtual Media

Use the “UnmountIsoImage” command to remove an ISO image as virtual media from the managed system.

Starting from SUM 2.11.0, this command is only supported on platforms that support a single virtual media
device only.

Syntax:

sum [-i <IP or host name> | [-I Redfish_HI]] [-u <username> -p <password>] -c

UnmountIsoImage

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c UnmountIsoImage

In-Band:

[SUM_HOME]# ./sum -c UnmountIsoImage

Supermicro Update Manager User’s Guide 506


5.20.3 Mounting a Floppy Image as Virtual Media from a Local Image File

Use the “MountFloppyImage” command to have SUM mount a binary floppy image to the managed system
virtually. Starting from SUM 2.11.0, this command is only supported on platforms that support a single
virtual media device only.

Syntax:

sum [-i <IP or host name> -u <username> -p <password>] -c MountFloppyImage

--file <filename>

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c MountFloppyImage --

file Floppy.img

In-band:

[SUM_HOME]# ./sum -c MountFloppyImage --file Floppy.img

The console output will be as below.

Supermicro Update Manager (for UEFI BIOS) 2.5.0 (2020/02/07) (x86_64)

Copyright(C) 2013-2020 Super Micro Computer, Inc. All rights reserved.

Status: Checking node product key...

Status: The floppy image file "Floppy.img" is mounting...

.................

Status: The floppy image file "Floppy.img" is mounted successfully.

Note: The floppy image size should be 1.44MB.

Supermicro Update Manager User’s Guide 507


5.20.4 Unmounting a Floppy Image as Virtual Media from the Managed
System

Use the “UnmountFloppyImage” command to execute SUM to virtually remove a binary floppy image from
the managed system. Starting from SUM 2.11.0, this command is only supported on platforms that support
single virtual media device only.

Syntax:

sum [-i <IP or host name> -u <username> -p <password>] -c UnmountFloppyImage

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c UnmountFloppyImage

In-band:

[SUM_HOME]# ./sum -c UnmountFloppyImage

The console output will be as below.

Supermicro Update Manager (for UEFI BIOS) 2.5.0 (2020/02/07) (x86_64)

Copyright(C) 2013-2020 Super Micro Computer, Inc. All rights reserved.

Status: Checking node product key...

Status: The floppy image file is unmounting...

Status: The floppy image file is unmounted successfully.

Supermicro Update Manager User’s Guide 508


5.20.5 Get Virtual Media Information from the Managed System

For platforms that support multiple virtual media devices, use the “GetVmInfo” command to get the virtual
media information from the managed system.

Syntax:

sum [-i <IP or host name> | -I Redfish_HI] -u <username> -p <password> -c

GetVmInfo [--dev_id <device ID>]

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c GetVmInfo

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c GetVmInfo --dev_id 1

In-Band:

[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p PASSWORD -c GetVmInfo

[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p PASSWORD -c GetVmInfo --dev_id 2

The console output contains the following information if the platform is supported to manage multiple
virtual media devices.

Supermicro Update Manager (for UEFI BIOS) 2.11.0 (2023/03/23) (x86_64)

Copyright(C) 2013-2023 Super Micro Computer, Inc. All rights reserved.

Status: Start to get virtual media information.

Virtual Media Information

=============================

Supermicro Update Manager User’s Guide 509


Device 1

============

Device status: Unmounted

Media type: N/A

Connection setting: NotConnected

Image: N/A

SSL certificate verified: N/A

Self-signed certificate accepted: N/A

UserName: N/A

Device 2

============

Device status: Unmounted

Media type: N/A

Connection setting: NotConnected

Image: N/A

SSL certificate verified: N/A

Self-signed certificate accepted: N/A

UserName: N/A

Device 3

Supermicro Update Manager User’s Guide 510


============

Device status: Unmounted

Media type: N/A

Connection setting: NotConnected

Image: N/A

SSL certificate verified: N/A

Self-signed certificate accepted: N/A

UserName: N/A

The console output contains the following information if the platform is supported to manage multiple
virtual media devices and the device is mounted by iKVM. Additionally, it should be noted that if the device
is mounted by iKVM, it can only be unmounted by iKVM.

Supermicro Update Manager (for UEFI BIOS) 2.11.0 (2023/03/23) (x86_64)

Copyright(C) 2013-2023 Super Micro Computer, Inc. All rights reserved.

Status: Start to get virtual media information.

Virtual Media Information

=============================

Device 1

============

Supermicro Update Manager User’s Guide 511


Device status: Mounted

Media type: Floppy

Connection setting: Applet

Image: kvm_floppy

Supermicro Update Manager User’s Guide 512


5.20.6 Managing Multiple Virtual Media Devices from the Managed System

For platforms that support multiple virtual media devices, use the “VmManage” command with the
Mount/Unmount option to mount or unmount an image. Use the “VmManage” command with the --action
Enable/Disable option to enable or disable virtual media on all platforms. For the accepted URL format,
please refer to 5.19.1 Providing an ISO Image as a Virtual Media through BMC and File Server. This command
supports up to three virtual media devices, including ISO and floppy images. For the detailed usages, please
refer to the below.

• For the Enable/Disable Action:


Use the “--action Enable/Disable” option to enable/disable virtual media from BMC.
o The --port option is optional for the Enable/Disable action. If user provides --port option, SUM
will configure virtual media port of BMC.
• For the Mount Action:
Use the “--action Mount” option to mount an image on the image file server to specified virtual media
device of BMC.
o Use the --image_url option to specify the URL to access the shared image file.
o Use the --id option to specify the ID to access the shared image file.
o Use the --pw/--pw_file option to specify the password to access the shared image file.
o Use the --dev_id option to specify the device ID of specified device.
o The --verify_cert option is optional. If this option is used, SUM will verify SSL certificate. Only
HTTPS protocol is supported.
o The --accept_self_signed option is optional. If this option and the --verify_cert option are used,
SUM will verify the self-signed SSL certificate. Only HTTPS protocol is supported.
• For the Unmount Action:
Use the “--action Unmount” option to unmount the images from the specified virtual media device of
the BMC.
o Use the --dev_id option to specify the device ID of a specific device.

Syntax:

sum [-i <IP or host name> | -I Redfish_HI] -u <username> -p <password> -c

VmManage --action <Enable/Disable> [--port <port>]

Supermicro Update Manager User’s Guide 513


sum [-i <IP or host name> | -I Redfish_HI] -u <username> -p <password> -c

VmManage --action Mount [--dev_id <device ID>] --image_url <URL> [[--id <id for

URL> --pw [password for URL]]|[--id <id for URL> --pw_file <password file path>]]

[--verify_cert [--accept_self_signed]]

sum [-i <IP or host name> | -I Redfish_HI] -u <username> -p <password> -c

VmManage --action Unmount [--dev_id <device ID>]

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c VmManage --action

Enable --port 623

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c VmManage --action

Disable --port 623

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c VmManage --action

Mount --image_url 'smb://192.168.35.1/MySharedPoint/MyFolder/Image.iso' --id

smbid --pw smbpasswd --dev_id 1

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c VmManage --action

Mount --image_url 'smb://[2001:db8::1]/MySharedPoint/MyFolder/Image.iso' --id

smbid --pw smbpasswd --dev_id 2

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c VmManage --action

Mount --image_url 'http://192.168.35.1/MySharedPoint/MyFolder/Image.iso' --id

smbid --pw smbpasswd --dev_id 3

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c VmManage --action

Mount --image_url 'http://[2001:db8::1]:80/MySharedPoint/MyFolder/Image.iso' --

id smbid --pw_file smbpasswd.txt --dev_id 1

Supermicro Update Manager User’s Guide 514


[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c VmManage --action

Mount --image_url 'https://192.168.35.1/MySharedPoint/MyFolder/Image.iso' --id

smbid --pw smbpasswd --verify_cert --accept_self_signed --dev_id 2

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c VmManage --action

Mount --image_url 'https://[2001:db8::1]:80/MySharedPoint/MyFolder/Image.iso' --

id smbid --pw_file smbpasswd.txt --verify_cert --accept_self_signed --dev_id 3

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c VmManage --action

Mount --image_url '\\192.168.35.1\MySharedPoint\MyFolder\Image.iso' --id smbid -

-pw_file smbpasswd.txt --dev_id 1

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c VmManage --action

Mount --image_url '\\2001:db8::1\MySharedPoint\MyFolder\Image.iso' --id smbid --

pw_file smbpasswd.txt --dev_id 2

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c VmManage --action

Unmount --dev_id 1

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c VmManage --action

Unmount --dev_id ALL

smbpasswd.txt:

smbpasswd

In-band:

[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p PASSWORD -c VmManage --action Enable

--port 623

[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p PASSWORD -c VmManage --action

Disable --port 623

Supermicro Update Manager User’s Guide 515


[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p PASSWORD -c VmManage --action Mount

--image_url 'smb://192.168.35.1/MySharedPoint/MyFolder/Image.iso' --id smbid --

pw smbpasswd --dev_id 1

[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p PASSWORD -c VmManage --action Mount

--image_url 'smb://[2001:db8::1]/MySharedPoint/MyFolder/Image.iso' --id smbid --

pw smbpasswd --dev_id 2

[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p PASSWORD -c VmManage --action Mount

--image_url 'http://192.168.35.1/MySharedPoint/MyFolder/Image.iso' --id smbid --

pw smbpasswd --dev_id 3

[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p PASSWORD -c VmManage --action Mount

--image_url 'http://[2001:db8::1]:80/MySharedPoint/MyFolder/Image.iso' --id

smbid --pw_file smbpasswd.txt --dev_id 1

[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p PASSWORD -c VmManage --action Mount

--image_url 'https://192.168.35.1/MySharedPoint/MyFolder/Image.iso' --id smbid -

-pw smbpasswd --verify_cert --accept_self_signed --dev_id 2

[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p PASSWORD -c VmManage --action Mount

--image_url 'https://[2001:db8::1]:80/MySharedPoint/MyFolder/Image.iso' --id

smbid --pw_file smbpasswd.txt --verify_cert --accept_self_signed --dev_id 3

[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p PASSWORD -c VmManage --action Mount

--image_url '\\192.168.35.1\MySharedPoint\MyFolder\Image.iso' --id smbid --

pw_file smbpasswd.txt --dev_id 1

[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p PASSWORD -c VmManage --action Mount

--image_url '\\2001:db8::1\MySharedPoint\MyFolder\Image.iso' --id smbid --

pw_file smbpasswd.txt --dev_id 2

[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p PASSWORD -c VmManage --action

Unmount --dev_id 1

Supermicro Update Manager User’s Guide 516


[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p PASSWORD -c VmManage --action

Unmount --dev_id ALL

smbpasswd.txt:

smbpasswd

Notes:

 Special characters for ID and password: ^ (a caret)


 Special characters for shared host: - (a dash) or . (a period)
 Special character for HTTP and SAMBA protocols in an IPv6-format URL shared host: : (a
colon)
 Share host for HTTP protocol in IPv6 format must be enclosed with square brackets ([ ])
 Special characters for path to image: @^-_./\ (/ and \ can only be used in a path)
 Special characters like backslashes \ and slashes / should only be used once; repeated
use (e.g., //, \\, /\ and \/) is not allowed.
 IPv6 link-local address starts with fe80 is not allowed.
 The maximum ISO image is 10 GB.
 The floppy image size should be 1,474,560 bytes.
 Up to three virtual media devices are supported, including ISO and floppy images.
 If the device is mounted by iKVM, the device can only be unmounted by iKVM.

Supermicro Update Manager User’s Guide 517


5.21 Security Management for a Single System
5.21.1 Getting GPU External RoT (ERoT) Firmware Image Information

Use the “GetGpuERoTInfo” command to get the External RoT (ERoT) GPU firmware image information of
NVIDIA MGX™ systems from the managed system.

Single System

OOB sum -i <IP or host name> -u <username> -p <password> -c GetGpuERoTInfo

In-Band sum -I Redfish_HI -u <username> -p <password> -c GetGpuERoTInfo

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c GetGpuERoTInfo

Managed system..........................192.168.34.56

[GPU 0]

ERoT version....................01.03.0103.0000_n01

In-Band Redfish Host Interface:

[SUM_HOME]# ./sum -c GetGpuERoTInfo -I Redfish_HI -u ADMIN -p ADMIN

The console output contains the following information.

Managed system..........................169.254.3.254

[GPU 0]

ERoT version....................01.03.0103.0000_n01

Supermicro Update Manager User’s Guide 518


5.21.2 Getting CPU ERoT Firmware Image Information

Use the “GetCpuERoTInfo” command to get the ERoT CPU firmware image information of NVIDIA MGX™
systems from the managed system.

Single System

OOB sum -i <IP or host name> -u <username> -p <password> -c GetCpuERoTInfo

In-Band sum -I Redfish_HI -u <username> -p <password> -c GetCpuERoTInfo

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c GetCpuERoTInfo

Managed system..........................192.168.34.56

[CPU 0]

ERoT version....................01.03.0103.0000_n01

[CPU 1]

ERoT version....................01.03.0103.0000_n01

In-Band Redfish Host Interface:

[SUM_HOME]# ./sum -c GetCpuERoTInfo -I Redfish_HI -u ADMIN -p ADMIN

The console output contains the following information.

Managed system..........................169.254.3.254

[CPU 0]

ERoT version....................01.03.0103.0000_n01

[CPU 1]

ERoT version....................01.03.0103.0000_n01

Supermicro Update Manager User’s Guide 519


5.21.3 Updating CPU ERoT Firmware Image

Use the “UpdateCpuERoT” command with the CPU ERoT firmware image CPU_ERoT.fwpkg to run SUM on
NVIDIA MGX™ systems to update the CPU ERoT of a managed system.

Single System

sum -i <IP or host name> -u <username> -p <password> -c UpdateCpuERoT --


OOB file <filename>

sum -I Redfish_HI -u <username> -p <password> -c UpdateCpuERoT --file


In-Band <filename>

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c UpdateCpuERoT --file

CPU_ERoT.fwpkg

In-Band Redfish Host Interface:

[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p PASSWORD -c UpdateCpuERoT --file

CPU_ERoT.fwpkg

5.21.4 Managing CPU ERoT RoT Functions

The “CpuERotManage” command supports the following features on NVIDIA MGX™ Systems:

• Getting Information on CPU ERoT


Use the “CpuERotManage” command with the “--action GetInfo” option to retrieve information on
active ERoT CPU and Golden ERoT CPU.
• Updating the Golden Image
Use the “CpuERotManage” command with the “--action UpdateGolden” option to replace the golden
image with an active ERoT CPU firmware.
• Recovering ERoT CPU

Supermicro Update Manager User’s Guide 520


Use the “CpuERotManage” command with the “--action Recover” option to restore ERoT CPU from
either the backup image or the golden image. The managed system prioritizes recovery from the
backup image. If the backup image is corrupted, it will then recover from the golden image.

Single System

sum -i <IP or host name> -u <username> -p <password> -c CpuERotManage --action


OOB <action>

sum -I Redfish_HI -u <username> -p <password> -c CpuERotManage --action


In-Band <action>

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c CpuERotManage --

action GetInfo

The console output contains the following information.

Managed system.....................192.168.34.56

CPU ERoT 0 version.............01.03.0103.0000_n01

Golden CPU ERoT version........01.03.0103.0000_n01

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c CpuERotManage --

action UpdateGolden

The console output contains the following information.

..........
Status: System is backing up current FW as golden image. Please wait for 2
minutes.
........................................
........................................
Done
Status: Please check golden FW version for result.

Supermicro Update Manager User’s Guide 521


[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c CpuERotManage --

action Recover

The console output contains the following information.

..........
Status: System is recovering ERoT CPU firmware image. Please wait for 2 minutes.
........................................
........................................
Done
Status: Please check golden FW version for result.

In-Band:

[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p PASSWORD -c CpuERotManage --action

UpdateGolden

The console output contains the following information.

..........
Status: System is backing up current FW as golden image. Please wait for 2
minutes.
........................................
........................................
Done
Status: Please check golden FW version for result.

Supermicro Update Manager User’s Guide 522


5.21.5 Managing Motherboard FPGA RoT Functions

The “FpgaRotManage” command supports the following features on NVIDIA MGX™ Systems:

• Getting Information on Motherboard FPGA


Use the “FpgaRotManage” command with the option “--action GetInfo” to retrieve information on
active FPGA and Golden FPGA.
• Updating the Golden Image
Use the “FpgaRotManage” command with the “--action UpdateGolden” option to replace the golden
image with an active FPGA firmware.

Single System

sum -i <IP or host name> -u <username> -p <password> -c FpgaRotManage --


OOB action <action>

sum -I Redfish_HI -u <username> -p <password> -c FpgaRotManage --action


In-Band <action>

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c FpgaRotManage --

action GetInfo

The console output contains the following information.

Managed system.....................192.168.34.56

FPGA version...................0.78

Golden FPGA version............0.78

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c FpgaRotManage --

action UpdateGolden

The console output contains the following information.

Supermicro Update Manager User’s Guide 523


..........
Status: System is backing up current FW as golden image. Please wait for 2
minutes.
........................................
........................................
Done
Status: Please check golden FW version for result.

In-Band:

[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p PASSWORD -c FpgaRotManage --action

UpdateGolden

The console output contains the following information.

..........
Status: System is backing up current FW as golden image. Please wait for 2
minutes.
........................................
........................................
Done
Status: Please check golden FW version for result.

Supermicro Update Manager User’s Guide 524


5.22 FPGA Management for a Single System
5.22.1 Getting Motherboard FPGA Firmware Image Information

Use the “GetMotherboardFpgaInfo” command to get the motherboard FPGA firmware image information
of NVIDIA MGX™ systems from the managed system.

Single System

sum -i <IP or host name> -u <username> -p <password> -c


OOB GetMotherboardFpgaInfo

In-Band sum -I Redfish_HI -u <username> -p <password> -c GetMotherboardFpgaInfo

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c

GetMotherboardFpgaInfo

Managed system............................192.168.34.56

Motherboard FPGA version..............0.78

In-Band Redfish Host Interface:

[SUM_HOME]# ./sum -c GetMotherboardFpgaInfo -I Redfish_HI -u ADMIN -p ADMIN

The console output contains the following information.

Managed system............................169.254.3.254

Motherboard FPGA version..............0.78

Supermicro Update Manager User’s Guide 525


5.22.2 Updating Motherboard FPGA Firmware Image

Use the “UpdateMotherboardFpga” command with the motherboard FPGA firmware image FPGA.bin to
run SUM on NVIDIA MGX™ systems to update the motherboard FPGA of a managed system.

Single System

sum -i <IP or host name> -u <username> -p <password> -c


OOB UpdateMotherboardFpga --file <filename>

sum -I Redfish_HI -u <username> -p <password> -c UpdateMotherboardFpga -


In-Band -file <filename> --reboot

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c UpdateMotherboardFpga

--file FPGA.bin –reboot

In-Band:

[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p PASSWORD -c UpdateMotherboardFpga --

file FPGA.bin --reboot

Supermicro Update Manager User’s Guide 526


5.23 MCU Management for a Single System
5.23.1 Getting Motherboard MCU Firmware Image Information

Use the “GetMotherboardMcuInfo” command to get the motherboard MCU firmware image information
from the managed system.

Single System

sum -i <IP or host name> -u <username> -p <password> -c


OOB GetMotherboardMcuInfo

In-Band sum -I Redfish_HI -u <username> -p <password> -c GetMotherboardMcuInfo

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c GetMotherboardMcuInfo

Managed system............................192.168.34.56

Motherboard MCU version...............FF.11.07

In-Band Redfish Host Interface:

[SUM_HOME]# ./sum -c GetMotherboardMcuInfo -I Redfish_HI -u ADMIN -p ADMIN

The console output contains the following information.

Managed system............................169.254.3.254

Motherboard MCU version...............FF.11.07

Supermicro Update Manager User’s Guide 527


5.23.2 Updating Motherboard MCU Firmware Image

Use the “UpdateMotherboardMcu” command with the motherboard MCU firmware image MBD_MCU.bin
to run SUM to update the motherboard MCU of a managed system.

Single System

sum -i <IP or host name> -u <username> -p <password> -c


OOB UpdateMotherboardMcu --file <filename> --reboot [--post_complete]

sum -I Redfish_HI -u <username> -p <password> -c UpdateMotherboardMcu --


In-Band file <filename> --reboot

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c UpdateMotherboardMcu

--file MBD_MCU.bin --reboot --post_complete

In-Band:

[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p PASSWORD -c UpdateMotherboardMcu --

file MBD_MCU.bin --reboot

Supermicro Update Manager User’s Guide 528


6 Managing Multiple Systems
For managing multiple systems, SUM provides the “-l” option to concurrently execute commands on
multiple systems enumerated in a system list file.

When managing a large number of systems, the option “--batch_count” divides the systems in the list into
multiple batches for execution, and each batch will have a separate log file.

Multiple Systems OOB Syntax:

sum -l <system list file> [-u <username> -p <password>] -c <command> [command

options]

The managed systems should be enumerated row-by-row in the system list file. Two formats are supported
for general commands as follows.

Format 1: BMC_IP_or_HostName

Format 2: BMC_IP_or_HostName Username Password

Options -u and -p should be specified in the command line for Format 1. By contrast, options -u and -p can
be removed from the command line for Format 2. In addition, the Username/Password in the system list
file overwrites the options -u and -p in the command line.

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c GetDmiInfo --file DMI.txt

--overwrite

SList.txt:

192.168.34.56

192.168.34.57 ADMIN1 PASSWORD1

Supermicro Update Manager User’s Guide 529


For the first managed system 192.168.35.56, SUM applies -u ADMIN and -p PASSWORD to the command
line to execute the GetDmiInfo command. For the second managed system 192.168.34.57, SUM adopts the
username (ADMIN1) and password (PASSWORD1) in SList.txt to execute the GetDmiInfo command.
Multiple Systems Remote In-Band Syntax:

sum [-I Remote_INB | -I Remote_RHI] -l <system list file> -c <command> [command

options]

The managed systems should be enumerated row-by-row in the system list file. Two formats are supported
for Remote In-Band (Remote_INB) as follows.

Format 1: OS_IP_or_HostName OS_Username OS_Password

Format 2: OS_IP_or_HostName OS_Username OS_PrivateKey OS_Privatekey_Password

Two formats are supported for Remote Redfish Host Interface (Remote_RHI) as follows.

Format 1: OS_IP_or_HostName OS_Username OS_Password BMC_Username BMC_Password

Format 2: OS_IP_or_HostName OS_Username OS_PrivateKey OS_Privatekey_Password

BMC_Username BMC_Password

The options --oi, --ou, --op, --os_key, --os_key_pw, -u, and -p must be specified in the system list file for
Multiple Systems Remote In-band usage.

Example:

[SUM_HOME]# ./sum [-I Remote_INB | -I Remote_RHI] -l SList.txt -u ADMIN -p

PASSWORD -c GetBmcInfo

SList.txt for Remote_INB:

192.168.34.56 root 111111

192.168.34.57 root /root/pvt_key 111111

SList.txt for Remote_RHI:

192.168.34.56 root 111111 ADMIN PASSWORD

192.168.34.57 root /root/pvt_key 111111 ADMIN PASSWORD

Supermicro Update Manager User’s Guide 530


Two executions are run concurrently and the execution status/results can be referenced in 6.1.2 File
Output, 6.1.3 Screen Output and 6.1.4 Log Output.
For the use of commands that take input files as arguments, such as the UpdateBios command, see 6.1.1
File Input for its usage.

Notes:

 For the ActivateProductKey command, different formats are used. Refer to 6.2.1
Activating Multiple Managed Systems.
 For the SetBiosPassword command, different formats are used. Refer to 6.4.12 Setting
BIOS Administrator Password.
 For the RemoteExec command, different formats are used. Refer to 6.8.12 Remote
Execution.
 For the CpuOnDemand command, different formats are used. Refer to 6.3.8 Getting
and activating CpuOnDemand function for the action of 2,3 and 4.
 Repeated managed system IPs or names in system list file are not allowed.
 SUM limits its maximum concurrent executiong count to avoid system overloading. The
default thread_count in the .sumrc file is 50. For more details on usages, see 4.1
Customizing SUM Configurations.

Supermicro Update Manager User’s Guide 531


6.1 Input Output Controls for Multiple Systems
6.1.1 File Input

SUM uses the input file specified in the command line (through --file option) to manage multiple systems.

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c UpdateBios --file

Supermicro_BIOS.rom

SList.txt:

192.168.34.56

192.168.34.57

In this example, SUM uses the input file Supermicro_BIOS.rom specified in the command line to
concurrently update BIOS for both managed systems 192.168.34.56 and 192.168.34.57 enumerated in the
SList.txt file.

Note: SUM only supports single input files for managed systems in one command.

6.1.2 File Output

When SUM outputs files for managed systems, each managed system has one individual output file. The
individual output file names are those specified in the command line (through --file option) appended by “.”
and the “BMC/CMM_IP_or_Hostname,” which is obtained from the system list file.

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c GetDmiInfo --file DMI.txt

SList.txt:

192.168.34.56

192.168.34.57

Supermicro Update Manager User’s Guide 532


In this example, DMI information from the managed systems 192.168.34.56 and 192.168.34.57 is written
to files “DMI.txt.192.168.34.56” and “DMI.txt.192.168.34.57,” respectively.

6.1.3 Screen Output

When SUM begins the execution for the managed systems, progress output will be continuously updated
to a log file created when SUM is invoked.

When the SUM finishes execution, the final execution status for each managed system will be shown on
the screen output row-by-row. Each row consists of “Index”, “System Name”, “Elapsed”, “Status” and “Exit
Code.” “System name” is the “BMC/CMM_IP_or_Hostname” from the system list file. “Elapsed” is the time
elapsed when the command is executed. “Status” is provided as indicator: “WAITING”, “RUNNING”,
“SUCCESS”, “FAILED”, “INCOMPLETE”, “RETRY”, “IGNORED” or “CANCEL”. The status summary will be
shown before and after the status list. After listing the final status, SUM will exit and return the exit code of
the concurrent executions.

You can also press the <ENTER> key to see the current execution status before the program is finished. The
format of the current status is the same as the final status, but only shows the status of the managed
systems at the stage of either “RUNNING” or “RETRY.” To see the current execution status of all managed
systems, use the --show_multi_full option.

When batch managing a large number of systems using the --batch_count option, the final result on the
screen output will only show the status summary and log name of each batch. For the final status of
individual systems, please refer to the contents of 6.1.4 Log Output.

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c GetDmiInfo --file DMI.txt

--overwrite

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c GetDmiInfo --file DMI.txt

--overwrite --show_multi_full

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c GetDmiInfo --file DMI.txt

--overwrite --batch_count 2

Supermicro Update Manager User’s Guide 533


SList.txt:

192.168.34.56

192.168.34.57

192.168.34.58

Screen Output:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c GetDmiInfo --file DMI.txt

--overwrite

Supermicro Update Manager (for UEFI BIOS) 2.14.0 (2023/12/31) (x86_64)

Copyright(C)2023 Super Micro Computer, Inc. All rights reserved.

The average upload speed per thread is limited to 333 mbps on higher bandwidth

system, while the speed is limited to 2 mbps on lower bandwidth system.

Start to do GetDmiInfo for systems listed in SList.txt

Multi system log file created:

SList.txt.log_2023-12-31_15-50-43_1720460

Press ENTER to see the current execution (Index: 1~3) status:

---------------------------------Current Status---------------------------------

Executed Command:

./sum -u ***** -p ***** -l SList.txt -c GetDmiInfo --file DMI.txt --overwrite

Summary:

3 EXECUTIONS ( WAITING: 0 RUNNING: 2 SUCCESS: 1 FAILED: 0 INCOMPLETE: 0

RETRY: 0 IGNORED: 0 CANCEL: 0 )

Status List (Index: 1 ~ 3, Total: 3):

Index | System Name | Elapsed | Status | Exit Code

2 | 192.168.34.57 | 00:00:03 | RUNNING |

3 | 192.168.34.58 | 00:00:03 | RUNNING |

Summary:

3 EXECUTIONS ( WAITING: 0 RUNNING: 2 SUCCESS: 1 FAILED: 0 INCOMPLETE: 0

RETRY: 0 IGNORED: 0 CANCEL: 0 )

Supermicro Update Manager User’s Guide 534


--------------------------------------------------------------------------------

----------------------------------Final Results---------------------------------

Executed Command:

./sum -u ***** -p ***** -l SList.txt -c GetDmiInfo --file DMI.txt --overwrite

Summary:

3 EXECUTIONS ( WAITING: 0 RUNNING: 0 SUCCESS: 3 FAILED: 0 INCOMPLETE: 0

RETRY: 0 IGNORED: 0 CANCEL: 0 )

Status List:

Index | System Name | Elapsed | Status | Exit Code

1 | 192.168.34.56 | 00:00:03 | SUCCESS | 0

2 | 192.168.34.57 | 00:00:05 | SUCCESS | 0

3 | 192.168.34.58 | 00:00:05 | SUCCESS | 0

Summary:

3 EXECUTIONS ( WAITING: 0 RUNNING: 0 SUCCESS: 3 FAILED: 0 INCOMPLETE: 0

RETRY: 0 IGNORED: 0 CANCEL: 0 )

--------------------------------------------------------------------------------

Please check output message:

SList.txt.log_2023-12-31_15-50-43_1720460

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c GetDmiInfo --file DMI.txt

--overwrite --show_multi_full

Supermicro Update Manager (for UEFI BIOS) 2.14.0 (2023/12/31) (x86_64)

Copyright(C)2023 Super Micro Computer, Inc. All rights reserved.

The average upload speed per thread is limited to 333 mbps on higher bandwidth

system, while the speed is limited to 2 mbps on lower bandwidth system.

Start to do GetDmiInfo for systems listed in SList.txt

Supermicro Update Manager User’s Guide 535


Multi system log file created:

SList.txt.log_2023-12-31_15-56-06_1720460

Press ENTER to see the current execution status:

---------------------------------Current Status---------------------------------

Executed Command:

./sum -u ***** -p ***** -l SList.txt -c GetDmiInfo --file DMI.txt --overwrite

--show_multi_full

Summary:

3 EXECUTIONS ( WAITING: 0 RUNNING: 2 SUCCESS: 1 FAILED: 0 INCOMPLETE: 0

RETRY: 0 IGNORED: 0 CANCEL: 0 )

Status List:

Index | System Name | Elapsed | Status | Exit Code

1 | 192.168.34.56 | 00:00:02 | SUCCESS | 0

2 | 192.168.34.57 | 00:00:03 | RUNNING |

3 | 192.168.34.58 | 00:00:03 | RUNNING |

Summary:

3 EXECUTIONS ( WAITING: 0 RUNNING: 2 SUCCESS: 1 FAILED: 0 INCOMPLETE: 0

RETRY: 0 IGNORED: 0 CANCEL: 0 TIMEOUT: 0 )

--------------------------------------------------------------------------------

----------------------------------Final Results---------------------------------

Executed Command:

./sum -u ***** -p ***** -l SList.txt -c GetDmiInfo --file DMI.txt --overwrite

--show_multi_full

Summary:

3 EXECUTIONS ( WAITING: 0 RUNNING: 0 SUCCESS: 3 FAILED: 0 INCOMPLETE: 0

RETRY: 0 IGNORED: 0 CANCEL: 0 )

Status List:

Index | System Name | Elapsed | Status | Exit Code

1 | 192.168.34.56 | 00:00:02 | SUCCESS | 0

2 | 192.168.34.57 | 00:00:05 | SUCCESS | 0

Supermicro Update Manager User’s Guide 536


3 | 192.168.34.58 | 00:00:05 | SUCCESS | 0

Summary:

3 EXECUTIONS ( WAITING: 0 RUNNING: 0 SUCCESS: 3 FAILED: 0 INCOMPLETE: 0

RETRY: 0 IGNORED: 0 CANCEL: 0 )

--------------------------------------------------------------------------------

Please check output message:

SList.txt.log_2023-12-31_15-56-06_1720460

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c GetDmiInfo --file DMI.txt

--overwrite --batch_count 2

Supermicro Update Manager (for UEFI BIOS) 2.14.0 (2023/12/31) (x86_64)

Copyright(C)2023 Super Micro Computer, Inc. All rights reserved.

The average upload speed per thread is limited to 333 mbps on higher bandwidth

system, while the speed is limited to 2 mbps on lower bandwidth system.

Start to do GetDmiInfo for systems listed in SList.txt

Multi system log file created:

SList.txt.log_2023-12-31_15-50-43_1720460_1

Press ENTER to see the current execution (Index: 1 ~ 2) status:

Multi system log file created:

SList.txt.log_2023-12-31_15-50-43_1720460_2

Press ENTER to see the current execution (Index: 3 ~ 3) status:

---------------------------------Current Status---------------------------------

Executed Command:

./sum -u ***** -p ***** -l SList.txt -c GetDmiInfo --file DMI.txt --overwrite

Summary:

Supermicro Update Manager User’s Guide 537


1 EXECUTIONS ( WAITING: 0 RUNNING: 1 SUCCESS: 0 FAILED: 0 INCOMPLETE: 0

RETRY: 0 IGNORED: 0 CANCEL: 0 )

Status List (Index: 3 ~ 3, Total: 3):

Index | System Name | Elapsed | Status | Exit Code

3 | 192.168.34.58 | 00:00:03 | RUNNING |

Summary:

1 EXECUTIONS ( WAITING: 0 RUNNING: 1 SUCCESS: 0 FAILED: 0 INCOMPLETE: 0

RETRY: 0 IGNORED: 0 CANCEL: 0 )

--------------------------------------------------------------------------------

----------------------------------Final Results---------------------------------

Executed Command:

./sum -u ***** -p ***** -l SList.txt -c GetDmiInfo --file DMI.txt --overwrite

Summary (SList.txt.log_2023-12-31_15-50-43_1720460_1):

2 EXECUTIONS ( WAITING: 0 RUNNING: 0 SUCCESS: 2 FAILED: 0 INCOMPLETE: 0

RETRY: 0 IGNORED: 0 CANCEL: 0 )

Summary (SList.txt.log_2023-12-31_15-50-43_1720460_2):

1 EXECUTIONS ( WAITING: 0 RUNNING: 0 SUCCESS: 1 FAILED: 0 INCOMPLETE: 0

RETRY: 0 IGNORED: 0 CANCEL: 0 )

--------------------------------------------------------------------------------

Supermicro Update Manager User’s Guide 538


6.1.4 Log Output

When SUM is executed for the managed systems, a log file will be created. This log file will be continuously
updated with the execution message for every system. The log file name, which will be shown onscreen, is
the system list file name appended by “.log_”, “yyyy-mm-dd_hh-mm-ss” (date and time), “_PID” (process
ID) and “_logNumber” (if the command option --batch_count is entered). In the log file, the information of
each system is listed in the “Last Update Time”, “Execution parameters”, “Summary”, and “Status List”
sections. The “Execution Message” section only lists the . The following example shows the log file
SList.txt.log_2013-10-02_15:57:40_7370 created from the example in 6.1.3 Screen Output.

The SList.log will be saved in /var/log/supermicro/SUM if it exists. Otherwise, it will be saved in the same
folder as SList.txt.

Example:

--------------------------------Last Update Time-------------------------------

2023-12-31_15:57:47

Process finished.

------------------------------Execution parameters-----------------------------

IPMI server port: 38927

Executed Command:

./sum -l SList.txt -u ADMIN -p ***** -c GetDmiInfo --file DMI.txt --overwrite

-----------------------------------Summary-------------------------------------

2 EXECUTIONS ( WAITING: 0 RUNNING: 0 SUCCESS: 2 FAILED: 0 INCOMPLETE: 0

RETRY: 0 IGNORED: 0 CANCEL: 0 )

---------------------------------Status List-----------------------------------

Index |System Name |Start Time |End Time |Elapsed |Status

|Exit Code

1 |192.168.34.56 |10-02_15:57:40 |10-02_15:57:42 |00:00:02|SUCCESS |0

2 |192.168.34.57 |10-02_15:57:40 |10-02_15:57:47 |00:00:07|SUCCESS |0

Supermicro Update Manager User’s Guide 539


-------------------------------Execution Message-------------------------------

System Name

192.168.34.56

Message

Supermicro Update Manager (for UEFI BIOS) 2.14.0 (2023/12/31) (x86_64)

Copyright(C) 2013-2023 Super Micro Computer, Inc. All rights reserved.

File "DMI.txt.192.168.34.56" is created.

-------------------------------Execution Message-------------------------------

System Name

192.168.34.57

Message

Supermicro Update Manager (for UEFI BIOS) 2.14.0 (2023/12/31) (x86_64)

Copyright(C) 2013-2023 Super Micro Computer, Inc. All rights reserved.

File "DMI.txt.192.168.34.57" is created.

Supermicro Update Manager User’s Guide 540


6.2 Key Management for Multiple Systems
6.2.1 Activating Multiple Managed Systems

You can activate multiple systems concurrently using SUM through the -l option and the command
“ActivateProductKey.” (You should first obtain the node product keys for the managed systems. See 3.1
Getting Node Product Keys from Supermicro.)

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c ActivateProductKey [-

-key_file <mymacs.txt.key>]

The managed systems should be enumerated row-by-row in the system list file. For the ActivateProductKey
command, two formats are supported.

Format 1: BMC_IP_or_HostName Node_Product_Key

Format 2: BMC_IP_or_HostName Username Password Node_Product_Key

The “-u” and “-p” options are required to specified in the command line for Format 1. The -u and -p options
can be removed from the command line for Format 2. In addition, the Username/Password in the system
list file overwrites the -u and -p options in the command line. If the --key option is specified in the
command line, the exception will be thrown. If you use the “--key_file” option, you don’t need apply
Node_Product_Key in Format 1 or Format 2.

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c ActivateProductKey

SList.txt:

192.168.34.56 1111-1111-1111-1111-1111-1111

192.168.34.57 ADMIN1 PASSWORD1 2222-2222-2222-2222-2222-2222

Supermicro Update Manager User’s Guide 541


192.168.34.58 {"ProductKey":{"Node":{"LicenseID":"1","LicenseName":"SFT-OOB-

LIC","CreateDate":"20200409"},"Signature":"11111111111111111111222222222222222333333

33333333ababababababababababababbabcdcdcdcdcdcdccdcdcddcdefefefefefefefeefefefefghgh

ghghghghghghghgh"}}

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c ActivateProductKey --

key_file mymacs.text.key

SList.txt:

192.168.34.56

192.168.34.57 ADMIN1 PASSWORD1

For the first managed system 192.168.34.56, SUM applies -u ADMIN and -p PASSWORD to the command
line and the node product key 1111-1111-1111-1111-1111-1111 to Execute the “ActivateProductKey”
command. By contrast, for the second managed system 192.168.34.57, SUM adopts the username ADMIN1,
password PASSWORD1 and node product key 2222-2222-2222-2222-2222-2222 to Execute the
“ActivateProductKey” command. These two managed systems will be activated concurrently. The
presentation of execution status and results will be similar to 6.1.3 Screen Output and 6.1.4 Log Output.

Note: For details on the command “ActivateProductKey,” see the note in 5.1.1 Activating a
Single Managed System.

Supermicro Update Manager User’s Guide 542


6.2.2 Querying Node Product Key

To query the node product keys activated in the managed systems, use the “QueryProductKey” command.

Syntax:
sum -l < system list file > [-u <username> -p <password>] -c QueryProductKey

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c QueryProductKey

SList.txt:

192.168.34.56

192.168.34.57

If the execution “Status” field of a managed system is SUCCESS, the node product keys activated in the
managed system will be shown in the “Execution Message” section in the created log file.

Supermicro Update Manager User’s Guide 543


6.3 System Checks for Multiple System
6.3.1 Checking OOB Support

Use the “CheckOOBSupport” command to check if both BIOS and BMC firmware images support OOB
functions for the managed systems. The received information will be the same as that in 5.2.1 Checking
OOB Support (Single System).

Syntax:

sum -l < system list file > [-u <username> -p <password>] -c CheckOOBSupport

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c CheckOOBSupport

SList.txt:

192.168.34.56

192.168.34.57

If the execution “Status” field for a managed system is SUCCESS, the BIOS and BMC capabilities of the
managed system will be shown in the “Execution Message” section in the created log file.

6.3.2 Checking Asset Information

Use the “CheckAssetInfo” command to check the asset information in the managed systems. The received
information will be the same as that in 5.2.2 Checking Asset Information (OOB Only) (Single System).

Syntax:

sum -l < system list file > [-u <username> -p <password>] -c CheckAssetInfo

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c CheckAssetInfo

Supermicro Update Manager User’s Guide 544


SList.txt:

192.168.34.56

192.168.34.57

If the execution “Status” field for a managed system is SUCCESS, the asset configuration of the managed
system will be shown in the “Execution Message” section in the created log file.

6.3.3 Checking Sensor Data

Use the “CheckSensorData” command to check the sensor data of the managed systems. The message
output will be the same as that in 5.2.3 Checking Sensor Data (OOB Only) (Single System).

Syntax:

sum -l < system list file > [-u <username> -p <password>] -c CheckSensorData

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c CheckSensorData

SList.txt:

192.168.34.56

192.168.34.57

If the execution “Status” field for a managed system is SUCCESS, the sensor data of the managed system
will be shown in the “Execution Message” section in the created log file.

6.3.4 Checking System Utilization

Use the “CheckSystemUtilization” command to check the utilization status of the managed systems. The
message output will be the same as that in 5.2.4 Checking System Utilization (OOB Only) (Single System).

Syntax:

sum -l < system list file > [-u <username> -p <password>] -c

CheckSystemUtilization

Supermicro Update Manager User’s Guide 545


Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c CheckSystemUtilization

SList.txt:

192.168.34.56

192.168.34.57

If the execution “Status” field for a managed system is SUCCESS, the utilization status of the managed
system will be shown in the “Execution Message” section in the created log file.

6.3.5 Monitors the Host with ServiceCalls

Use the “ServiceCalls” command to check the system event log and sensor data record of the managed
system with the ServiceCalls configuration file. After execution, you will receive the SEL and SDR report via
e-mail. The message output will be the same as that in 5.2.5 ServiceCalls (Single System).

Syntax:

sum -l < system list file > [-u <username> -p <password>] -c ServiceCalls --file

<servicecalls XML file>

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c ServiceCalls --file

<servicecalls XML file>

SList.txt:

192.168.34.56

192.168.34.57

If the execution “Status” field for a managed system is SUCCESS, the utilization status of the managed
system will be shown in the “Execution Message” section in the created log file.

Supermicro Update Manager User’s Guide 546


6.3.6 Monitoring and Controlling PFA of the System

Use the “SystemPFA” command to monitor and set the predictive failure analysis function of BIOS on the
managed system. The message output will be the same as that in 5.2.6 Monitoring and Controlling PFA of
the System (Single System).

Syntax:

sum -l < system list file > [-u <username> -p <password>] -c SystemPFA --action

<action>] [--reboot] [--post_complete]

Option Commands Descriptions

--action Sets action to:

1 = GetCurrentStatus

2 = Enabled

3 = Disabled

Example:
[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c SystemPFA --action Enable

--reboot --post_complete

SList.txt:

192.168.34.56

192.168.34.57

If the execution “Status” field for a managed system is SUCCESS, the utilization status of the managed
system will be shown in the “Execution Message” section in the created log file.

Supermicro Update Manager User’s Guide 547


6.3.7 Monitoring and Checking Memory Health of the System

Use the “MemoryHealthCheck” command to access the function in BIOS to check memory health of the
managed system. The message output will be the same as that in 5.2.7 Checking Memory Health of the
Managed System (Single System).

Syntax:

sum -l < system list file > [-u <username> -p <password>] -c MemoryHealthCheck -

-action <action> --reboot [--post_complete]

Option Commands Descriptions

--action Sets action to:

1 = GetCurrentStatus

2 = Persistent

3 = Enable

4 = Disable

Example:
[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c MemoryHealthCheck --

action Persistent --reboot --post_complete

SList.txt:

192.168.34.56

192.168.34.57

If the execution “Status” field for a managed system is SUCCESS, the utilization status of the managed
system will be shown in the “Execution Message” section in the created log file.

Supermicro Update Manager User’s Guide 548


6.3.8 Getting and Activating Intel On Demand

Use the “CpuOnDemand” command to activate and check Intel® On Demand Capabilities of the managed
system. The message output will be the same as that in 5.2.8 Getting and activating CpuOnDemand
function (Single System).

The command provides the following actions:

Option Commands Descriptions

--action Sets action to:

1 = GetHwInfo

2 = GetOnDemandState

3 = SetLicenseActivateCode

4 = EnablePPIN

1. The syntax of GetHwInfo:


sum -l <system list file> [-u <username> -p <password>] -c CpuOnDemand --action

GetHwInfo [--file < mlist_hw_id_file_name>] [--overwrite]

The format of the system list file is the same as that explained in 6. Managing Multiple Systems.
For the output of --file, the format is the same as that explained in 5.2.8.2 CpuOnDemand command usage

2. The syntax of GetOnDemandState:

sum -l <system list file> [-u <username> -p <password>] -c CpuOnDemand --action

GetOnDemandState [[--file <StateReport>] [[-v] | [--squash]] [--overwrite] | --

plain_text ]

The system list file is another format that requires PPIN appended in each row. If the system has more than
one CPU, one row only allows one PPIN so that system should have multiple lines to indicate different
PPINs. There are two formats supported.

Format 1: BMC_IP_or_HostName PPIN

Supermicro Update Manager User’s Guide 549


Format 2: BMC_IP_or_HostName Username Password PPIN

The “-u” and “-p” options are required to specified in the command line for Format 1. The -u and -p options
can be removed from the command line for Format 2. In addition, the Username/Password in the system
list file overwrites the -u and -p options in the command line.

Example:

[SUM_HOME]# ./sum -l SList.txt -c CpuOnDemand --action GetOnDemandState --file

mlist_report.txt

SList.txt:

192.168.34.56 AABBCCDD00112233

192.168.34.57 ADMIN1 PASSWORD1 EEFFGGHH00112233

192.168.34.57 ADMIN1 PASSWORD1 EEFFGGHH00445566

3. The syntax of SetLicenseActivateCode:


sum -l <system list file> [-u <username> -p <password>] -c CpuOnDemand --action

SetLicenseActivateCode --lac_file <LAC+.txt> [--reboot] [--post_complete]

The format of the system list file is the same as that explained in action 2 = GetOnDemandState.
Format 1: BMC_IP_or_HostName PPIN

Format 2: BMC_IP_or_HostName Username Password PPIN

4. The syntax of EnablePPIN:


sum -l <system list file> [-u <username> -p <password>] -c CpuOnDemand --action

EnablePPIN --reboot [--post_complete]

The format of the system list file is the same as that explained in action 1 = GetHwInfo.

Supermicro Update Manager User’s Guide 550


6.3.9 Getting and Clearing the Chassis Intrusion Status for the Managed
System

Use the “ChassisIntrusion” command to get and clear the status of the chassis intrusion sensor. If a
hardware intrusion is detected, the status will be “Hardware Intrusion”; otherwise, it will be “Normal.” This
command can be used to get the status or clear the status to “Normal”. The message output will be the
same as that in 5.2.9. Getting and Clearing the chassis intrusion status for the manahed system.

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c ChassisIntrusion --

action <action>

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c ChassisIntrusion --action

Status

SList.txt:

192.168.34.56

192.168.34.57

If the “Status” field for execution of a managed system is SUCCESS, the chassis intrusion information of the
managed system will be shown in the “Execution Message” section of the managed system in the created
log file.

Supermicro Update Manager User’s Guide 551


6.3.10 Managing FRU Information

6.3.10.1 Getting FRU Information

Use the “GetFruInfo” command to get or dump the FRU information on the managed system and read FRU
information from the local FRU file. The message output will be the same as that in 5.2.9.1 Getting FRU
information (Single System).

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c GetFruInfo [--file

<filename> [--dump] | [--file_only]] [--overwrite] [--dev_id <Device ID>] | [--

showall]

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c GetFruInfo --file

dumpedFile --dump

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c GetFruInfo --dev_id 1,2

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c GetFruInfo --showall

SList.txt:

192.168.34.56

192.168.34.57

If you execute the GetFruInfo command for 192.168.34.56 and 192.168.34.57, SUM will create
dumpedFile.192.168.34.56 and dumpedFile.192.168.34.57, respectively.

Supermicro Update Manager User’s Guide 552


6.3.10.2 Restoring FRU Information

Use the “RestoreFruInfo” command to restore the FRU information on the managed system. The message
output will be the same as that in 5.2.9.2 Restoring FRU information (Single System).

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c RestoreFruInfo --file

<filename> [--individually]

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c RestoreFruInfo --file

dumpedFile --individually

SList.txt:

192.168.34.56

192.168.34.57

If you want to restore 192.168.34.56 and 192.168.34.57, you need to provide two files:
dumpedFile.192.168.34.56 and dumpedFile.192.168.34.57. Then set the --file argument with the
“dumpedFile” file name. With the --individually option, SUM searches for dumpedFile.192.168.34.56 and
dumpedFile.192.168.34.57 to restore 192.168.34.56 and 192.168.34.57, respectively.

6.3.10.3 Changing FRU Information

Use the “ChangeFruInfo” command to change the FRU information on the managed system. The message
output will be the same as that in 5.2.10.3 Changing FRU Information (Single System).

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c ChangeFruInfo --item

<item name> --value <assignment value>

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c ChangeFruInfo --item CT -

-value 0x01
Supermicro Update Manager User’s Guide 553
SList.txt:

192.168.34.56

192.168.34.57

6.4 BIOS Management for Multiple Systems


6.4.1 Getting BIOS Firmware Image Information

Use the “GetBiosInfo” command to get the BIOS firmware image information from the managed systems as
well as the input BIOS firmware image. The message output will be the same as that in 5.3.1 Getting BIOS
Image Information (Single System).

Multiple Systems OOB Syntax:

sum -l <system list file> [-u <username> -p <password>] -c GetBiosInfo [--file

<filename> [--showall]

Multiple Systems Remote In-Band Syntax:

Sum [-I Remote_INB | -I Remote_RHI] -l <system list file> -c GetBiosInfo [--file

<filename> [--showall] [--remote_sum <remote sum path>]

Example:

Multiple Systems OOB:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c GetBiosInfo --file

Supermicro_BIOS.romSList.txt:

192.168.34.56

192.168.34.57

Multiple Systems Remote In-Band:

[SUM_HOME]# ./sum -I Remote_INB -l SList.txt -c GetBiosInfo --file

Supermicro_BIOS.rom

Supermicro Update Manager User’s Guide 554


SList.txt:

192.168.34.56 OS_Username OS_PASSWD

192.168.34.57 OS_Username OS_PrivateKey OS_Pvtkey_Password

Note: If the “Status” field for execution of a managed system is SUCCESS, the BIOS
information of the managed system will be shown in its “Execution Message” section in the
created log file.

Supermicro Update Manager User’s Guide 555


6.4.2 Updating the BIOS Firmware Image

Use the “UpdateBios” command with the BIOS firmware image Supermicro_BIOS.rom or bios_image.tar for
OpenBMC to update managed systems. For detailed usage notes of the “UpdateBios” command, see the
usage notes in 5.3.2 Updating the BIOS Image (Single System).

Multiple Systems OOB Syntax:

sum -l <system list file> [-u <username> -p <password>] -c UpdateBios --file

<filename> [options…]

Multiple Systems Remote In-Band Syntax:

sum [-I Remote_INB | -I Remote_RHI] -l <system list file> [-u <username> -p

<password>] -c UpdateBios --file <filename> [--remote_sum <remote sum path>]

[options…]

Option Commands Descriptions

--reboot Forces the managed systems to reboot.

--flash_smbios Overwrites SMBIOS data.

--preserve_mer Preserves ME firmware region.

--preserve_nv Preserves NVRAM.

--preserve_setting Preserves setting configurations.

--backup Backs up the current BIOS image. (Only supported by the RoT systems.)

--forward Confirms the Rollback ID and upgrades to the next revision. (Only supported by
the X12/H12 and later platforms except the H12 non-RoT systems.)

Example:

Multiple System OOB:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c UpdateBios --file

Supermicro_BIOS.rom

Supermicro Update Manager User’s Guide 556


SList.txt:

192.168.34.56

192.168.34.57

Multiple Systems Remote In-Band:

[SUM_HOME]# ./sum -I Remote_INB -l SList.txt -c UpdateBios --file

Supermicro_BIOS.rom

SList.txt:

192.168.34.56 OS_Username OS_PASSWD

192.168.34.57 OS_Username OS_PrivateKey OS_Pvtkey_Password

The execution progress for the managed system will be continuously updated to the “Execution Message”
section of the managed system in the created log file.

6.4.3 Getting Current BIOS Settings

Use the “GetCurrentBiosCfg” command to get the current BIOS settings from the managed systems and
save it in the output files individually for each managed system enumerated in the system list file. For
details on the “GetCurrentBiosCfg” command, see 5.3.3 Getting Current BIOS Settings (Single System).

Multiple Systems OOB Syntax:

sum -l <system list file> [-u <username> -p <password>] -c GetCurrentBiosCfg --

file <USER_SETUP.file> [[--current_password <current password>] | [--cur_pw_file

<current password file path>]] [--overwrite]

Multiple Systems Remote In-Band Syntax:

sum -I Remote_INB -l <system list file> -c GetCurrentBiosCfg --file

<USER_SETUP.file> [[--current_password <current password>] | [--cur_pw_file

<current password file path>]] [--overwrite] [--remote_sum <remote sum path>]

Example:

Multiple Systems OOB:

Supermicro Update Manager User’s Guide 557


[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c GetCurrentBiosCfg --file

USER_SETUP.file

SList.txt:

192.168.34.56

192.168.34.57

Multiple Systems Remote In-Band:

[SUM_HOME]# ./sum -I Remote_INB -l SList.txt -c GetCurrentBiosCfg --file

USER_SETUP.file

SList.txt:

192.168.34.56 OS_Username OS_PASSWD current_password

192.168.34.57 OS_Username OS_PrivateKey OS_Pvtkey_Password current_password

If the execution “Status” field for a managed system (e.g., 192.168.34.56) is SUCCESS, its current settings
are stored in its output file, e.g., USER_SETUP.file.192.168.34.56. The option --overwrite is used to force
the overwrite of the existing file, e.g., USER_SETUP.file.192.168.34.56, if the output file already exists.

6.4.4 Updating BIOS Settings Based on a Current Sample Settings

1. Select one managed system as the golden sample for current BIOS settings.
2. Follow the steps in 5.3.3 Getting Current BIOS Settings for that system.
3. Edit the item/variable values in the user setup file USER_SETUP.file to the desired values as illustrated
in 4.3 Format of BIOS Settings Text File (for DAT) or 4.4 Format of BIOS Settings XML File (for HII).
4. Remove unchanged items/variables in the text file. Note that this step is optional.
5. Use the ChangeBiosCfg command with the modified USER_SETUP.file to update the BIOS
configurations for managed systems.

Notes:

 Use the --individually option to update each managed system with the corresponding
configuration file.
 For details on the “ChangeBiosCfg” command, see the note in 5.3.4 Updating BIOS
Settings Based on the Current BIOS Settings (Single System).

Supermicro Update Manager User’s Guide 558


Multiple Systems OOB Syntax:

sum -l <system list file> [-u <username> -p <password>] -c ChangeBiosCfg --file

<USER_SETUP.file> [[--current_password <current password>] | [--cur_pw_file

<current password file path>]] [--reboot] [--individually]

Multiple Systems Remote In-Band Syntax:

sum -I Remote_INB -l <system list file> -c ChangeBiosCfg --file

<USER_SETUP.file> [[--current_password <current password>] | [--cur_pw_file

<current password file path>]] [--reboot] [--individually] [--remote_sum <remote

sum path>]

Example:

Multiple Systems OOB:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c ChangeBiosCfg --file

USER_SETUP.file --reboot

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c ChangeBiosCfg --file

USER_SETUP.file --reboot --individually

SList.txt:

192.168.34.56

192.168.34.57

Multiple Systems Remote In-Band:

[SUM_HOME]# ./sum -I Remote_INB -l SList.txt -c ChangeBiosCfg --file

USER_SETUP.file --reboot

SList.txt:

192.168.34.56 OS_Username OS_PASSWD current_password

192.168.34.57 OS_Username OS_PrivateKey OS_Pvtkey_Password current_password

If you want to update 192.168.34.56 and 192.168.34.57, you need to provide two files:
USER_SETUP.file.192.168.34.56 and USER_SETUP.file.192.168.34.57. Then set the --file argument with the
Supermicro Update Manager User’s Guide 559
“USER_SETUP.file” file name. With the --individually option, SUM searches for
USER_SETUP.file.192.168.34.56 and USER_SETUP.file.192.168.34.57 to update 192.168.34.56 and
192.168.34.57, respectively.

6.4.5 Getting Factory BIOS Settings

Use the “GetDefaultBiosCfg” command to get the default factory BIOS settings from the managed systems
and save it in the output files individually for each managed system enumerated in the system list file.

Multiple Systems OOB Syntax:

sum -l <system list file> [-u <username> -p <password>] -c GetDefaultBiosCfg --

file <USER_SETUP.file> [[--current_password <current password>] | [--cur_pw_file

<current password file path>]] [--overwrite]

Multiple Systems Remote In-Band Syntax:

Sum -I Remote_INB -l <system list file> -c GetDefaultBiosCfg --file

<USER_SETUP.file> [[--current_password <current password>] | [--cur_pw_file

<current password file path>]] [--overwrite] [--remote_sum <remote sum path>]

Example:

Multiple Systems OOB:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c GetDefaultBiosCfg --file

USER_SETUP.file

SList.txt:

192.168.34.56

192.168.34.57

Multiple Systems Remote In-Band:

[SUM_HOME]# ./sum -I Remote_INB -l SList.txt -c GetDefaultBiosCfg --file

USER_SETUP.file

Supermicro Update Manager User’s Guide 560


SList.txt:

192.168.34.56 OS_Username OS_PASSWD current_password

192.168.34.57 OS_Username OS_PrivateKey OS_Pvtkey_Password current_password

If the execution “Status” field for a managed system (e.g., 192.168.34.56) is SUCCESS, its default settings
are saved in its output file, e.g., USER_SETUP.file.192.168.34.56. The --overwrite option is used to force
overwrite the existing file, e.g., USER_SETUP.file.192.168.34.56, if the output file already exists.

6.4.6 Updating BIOS Settings Based on Factory Sample Settings

1. Select one managed system as the golden sample for factory default BIOS settings.
2. Follow the steps in 5.3.5 Getting Factory BIOS Settings for that system.
3. Follow steps 3 to 5 in 6.4.4 Updating BIOS Settings Based on a Current Sample Settings.

6.4.7 Loading Factory BIOS Settings

Use the “LoadDefaultBiosCfg” command to reset the BIOS settings of the managed systems to the factory
default settings.

Note: The uploaded configurations will only take effect after the managed systems reboot
or power up.

Multiple Systems OOB Syntax:

sum -l <system list file> [-u <username> -p <password>] -c LoadDefaultBiosCfg

[[--current_password <current password>] | [--cur_pw_file <current password file

path>]] [--reboot]

Multiple Systems Remote In-Band Syntax:

sum -I Remote_INB -l <system list file> -c LoadDefaultBiosCfg [[--

current_password <current password>] | [--cur_pw_file <current password file

path>]] [--reboot] [--remote_sum <remote sum path>]

Example:

Multiple Systems OOB:

Supermicro Update Manager User’s Guide 561


[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c LoadDefaultBiosCfg --

reboot

SList.txt:

192.168.34.56

192.168.34.57

Multiple Systems Remote In-Band:

[SUM_HOME]# ./sum -I Remote_INB -l SList.txt -c LoadDefaultBiosCfg --reboot

SList.txt:

192.168.34.56 OS_Username OS_PASSWD current_password

192.168.34.57 OS_Username OS_PrivateKey OS_Pvtkey_Password current_password

6.4.8 Getting DMI Information

Multiple Systems OOB Syntax:

sum -l <system list file> [-u <username> -p <password>] -c GetDmiInfo --file

<DMI.txt> [--overwrite]

Multiple Systems Remote In-Band Syntax:

sum -I Redish_HI -l <system list file> -c GetDmiInfo --file <DMI.txt> [--

overwrite] [--remote_sum <remote sum path>]

Example:

Multiple Systems OOB:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c GetDmiInfo --file DMI.txt

--overwrite

SList.txt:

192.168.34.56

192.168.34.57

Multiple Systems Remote In-Band:

Supermicro Update Manager User’s Guide 562


[SUM_HOME]# ./sum -I Remote_INB -l SList.txt -c GetDmiInfo --file DMI.txt --

overwrite

SList.txt:

192.168.34.56 OS_Username OS_PASSWD

192.168.34.57 OS_Username OS_PrivateKey OS_Pvtkey_Password

If the execution “Status” field for a managed system (e.g., 192.168.34.56) is SUCCESS, its DMI settings are
saved in its output file, e.g., DMI.txt.192.168.34.56. The option --overwrite is used to force overwrite of the
existing file, e.g., DMI.txt.192.168.34.56.

6.4.9 Editing DMI Information

Use the “EditDmiInfo” command to edit the editable DMI items. For details on the “EditDmiInfo” command,
refer to 5.3.9 Editing DMI Information (Single System).

Multiple Systems OOB Syntax:

sum -l <system list file> [-u <username> -p <password>] -c EditDmiInfo --file

<DMI.txt> [--item_type <Item Type> --item_name <Item Name> | --shn <Item Short

Name>] [--value <Item Value> | --default]

Multiple Systems Remote In-Band Syntax:

sum -I Remote_INB -l <system list file> -c EditDmiInfo --file <DMI.txt> [--

item_type <Item Type> --item_name <Item Name> | --shn <Item Short Name>] [--

value <Item Value> | --default] [--remote_sum <remote sum path>]

Example:

Multiple Systems OOB:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c EditDmiInfo --file

DMI.txt --item_type "System" --item_name "Version" --value "1.01"

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c EditDmiInfo --file

DMI.txt --shn SYVS --value "1.01"

Supermicro Update Manager User’s Guide 563


[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c EditDmiInfo --file

DMI.txt --shn SYVS --default

SList.txt:

192.168.34.56

192.168.34.57

Multiple Systems Remote In-Band:

[SUM_HOME]# ./sum -I Remote_INB -l SList.txt -c EditDmiInfo --file DMI.txt --shn

SYVS --default

SList.txt:

192.168.34.56 OS_Username OS_PASSWD

192.168.34.57 OS_Username OS_PrivateKey OS_Pvtkey_Password

If the execution “Status” field for a managed system (e.g., 192.168.34.56) is “SUCCESS”, its edited DMI
information is updated in its output file, e.g. DMI.txt.192.168.34.56.

Supermicro Update Manager User’s Guide 564


6.4.10 Updating DMI Information Based on a Sample DMI Information

1. Select one managed system as the golden sample for DMI information.
2. Follow the steps in 5.3.9 Editing DMI Information to prepare the edited DMI.txt file for updating DMI
information.
3. Use the “ChangeDmiInfo” command with the edited DMI.txt file to update the DMI information for
the managed systems.

Notes:

 The uploaded information will only take effect after the managed systems reboot or
power up.
 Use the --individually option to update each managed system with the corresponding
configuration file.
 For detailed usage notes of the command “ChangeDmiInfo,” see 5.3.10 Updating DMI
Information.

Multiple Systems OOB Syntax:

sum -l <system list file> [-u <username> -p <password>] -c ChangeDmiInfo --file

<DMI.txt> [--reboot] [--individually]

Multiple Systems Remote In-Band Syntax:

Sum -I Remote_INB -l <system list file> -c ChangeDmiInfo --file <DMI.txt> [--

reboot] [--individually] [--remote_sum <remote sum path>]

Example:

Multiple Systems OOB:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c ChangeDmiInfo --file

DMI.txt --reboot

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c ChangeDmiInfo --file

DMI.txt --reboot --individually

Supermicro Update Manager User’s Guide 565


SList.txt:

192.168.34.56

192.168.34.57

Multiple Systems Remote In-Band:

[SUM_HOME]# ./sum -I Remote_INB -l SList.txt -c ChangeDmiInfo --file DMI.txt --

reboot

SList.txt:

192.168.34.56 OS_Username OS_PASSWD

192.168.34.57 OS_Username OS_PrivateKey OS_Pvtkey_Password

If you want to update 192.168.34.56 and 192.168.34.57, you need to provide two files
DMI.txt.192.168.34.56 and DMI.txt.192.168.34.57. Then set the --file argument with the DMI.txt” file name.
With the --individually option, SUM searches for DMI.txt.192.168.34.56 and DMI.txt.192.168.34.57 to
update 192.168.34.56 and 192.168.34.57, respectively.

Supermicro Update Manager User’s Guide 566


6.4.11 Setting BIOS Action

Use the “SetBiosAction” command to show or hide BBS priority related settings.

Note: The uploaded configurations will only take effect after the managed systems reboot
or power up.

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c SetBiosAction --BBS

<yes/no> [--reboot]

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c SetBiosAction --BBS yes


--reboot

SList.txt:
192.168.34.56
192.168.34.57

Supermicro Update Manager User’s Guide 567


6.4.12 Setting BIOS Administrator Password

Use the “SetBiosPassword” command to update a BIOS Administrator password. The information will be
the same as that in 5.3.12 Setting Up a BIOS Administrator Password.

Multiple Systems OOB Syntax:

sum -l <system list file> [-u <username> -p <password>] -c SetBiosPassword

[[[--new_password <new password> --confirm_password <confirm password>] | --

pw_file <password file path>] [--current_password <current password> | --

cur_pw_file <current password file path>]] [--reboot]

The managed systems should be enumerated row by row in the system list file. For the “SetBiosPassword”
command from SUM 2.10.0, the system list file format is fixed for specific commands. Note that the
New_BIOS_Password and Current_Password fields are both REQUIRED. If the managed system has been
installed with a BIOS Administrator password, this field should be filled with the current BIOS Administrator
password. If the managed system has no BIOS Administrator password installed, users should still fill this
field with empty value. Two formats are supported as follows:

Format 1: BMC_IP_or_HostName New_BIOS_Password Current_BIOS_Password

Format 2: BMC_IP_or_HostName Username Password New_BIOS_Password

Current_BIOS_Password

For format 1, it is required to specify both “-u” and “-p” options in the command line.
For format 2, options “-u” and “-p” are optional in the command line. In this case, the Username/Password
in the system list file overwrites the options “-u” and “-p” in the command line.

Multiple Systems Remote In-Band Syntax:

sum -I Remote_INB -l <system list file> -c SetBiosPassword [[[--new_password

<new password> --confirm_password <confirm password>] | --pw_file <password file

path>] [--current_password <current password> | --cur_pw_file <current password

file path>]] [--reboot] [--remote_sum <remote sum path>]

Two formats are supported for Multiple Remote In-Band as follow:


Supermicro Update Manager User’s Guide 568
Format 1: BMC_IP_or_HostName New_BIOS_Password Current_BIOS_Password

Format 2: BMC_IP_or_HostName Username Password New_BIOS_Password

Current_BIOS_Password

SUM supports flexible usage to set and check the BIOS Administrator password when managing multiple
systems as follows.

If you want to set a different new password for each system, you can specify a New_Password
corresponding to each system for Format 1 or Format 2 without using option “--new_password” or “--
pw_file”. If you assign option “--new_password” or “--pw_file” in command line, the option value will
overwrite the value in system list file.

If you want to assign a different current BIOS Administrator password for current password checking, you
can specify a Current_BIOS_Password corresponding to each system for Format 1 or Format 2 without
using option “--current_password” or “--cur_pw_file”. If you assign option “--current_password” and “--
cur_pw_file” in command line, the option value will overwrite the value in system list file.

Example:

SList.txt:

192.168.34.56 new_ pwd_11 current_pwd_11

192.168.34.57 ADMIN1 PASSWORD1 new_pwd_22 current_pwd_22

To specify new password and current password corresponding to each system, you can use the example
below with system list file SList.txt.

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c SetBiosPassword

System BMC User BMC Password New BIOS Password Current BIOS Password

192.168.34.56 ADMIN ADMIN new_ pwd_11 current_pwd_11

192.168.34.57 ADMIN1 PASSWORD1 new_pwd_22 current_pwd_22

Supermicro Update Manager User’s Guide 569


To assign the same new password and current password with options --new_password and --
current_password for every system in the system list file SList.txt, you can use the following example.

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c SetBiosPassword --

new_password 12345678 --confirm_password 12345678 --current_password 654321

System BMC User BMC Password New BIOS Password Current BIOS Password

192.168.34.56 ADMIN ADMIN 12345678 654321

192.168.34.57 ADMIN1 PASSWORD1 12345678 654321

Supermicro Update Manager User’s Guide 570


SList.txt:

192.168.34.56 ADMIN3 PASSWORD3 new_ pwd_55 current_pwd_55

192.168.34.57 ADMIN4 PASSWORD4 new_ pwd_66 current_pwd_66

passwd.txt:

NewBiosPasswordString

Current_passwd.txt:

CurrentBiosPasswordString

To assign the same new password and current password with options --pw_file and --cur_pw_file for every
system in the system list file SList.txt, you can use the following example. In this case, options “-u” and “-p”
are optional.

[SUM_HOME]# ./sum -l SList.txt -c SetBiosPassword --pw_file passwd.txt --

cur_pw_file current_passwd.txt

System BMC User BMC Password New BIOS Password Current BIOS Password

192.168.34.56 ADMIN3 PASSWORD3 NewBiosPasswordString current_pwd_55

192.168.34.57 ADMIN4 PASSWORD4 NewBiosPasswordString current_pwd_66

Supermicro Update Manager User’s Guide 571


Notes:

 The new uploaded password will only take effect after the managed systems reboot or
power up.
 The SetBiosPassword command supports CSV format in the system list file. The CSV
format uses spaces to separate values and double quotes to enclose values.
 To clear the BIOS Administrator password with the system list file, press the spacebar
twice to skip entering the BIOS_new_passowrd. The format should be like this:
BMC_IP_or_HostName Current_Password
BMC_IP_or_HostName Username Password Current_Password
 For systems with no BIOS Administrator password installed, MUST leave one space
symbol right after the New_BIOS_Password. The system list file format should be like
this:
BMC_IP_or_HostName New_BIOS_Password
BMC_IP_or_HostName Username Password New_BIOS_Password

Supermicro Update Manager User’s Guide 572


6.4.13 Managing BIOS RoT Functions

Use the “BiosRotManage” command to manage RoT fuctions. For details, see 5.3.14 Managing BIOS RoT
Functions (Single System).

Multiple Systems OOB Syntax:

sum -l <system list file> [-u <username> -p <password>] -c BiosRotManage --

action <action> [--file <evidence.bin.gz>] [--overwrite] [--reboot]

Multiple Systems Remote In-Band Syntax:

sum -I Remote_RHI -l <system list file> -c BiosRotManage --action <action> [--

file <evidence.bin.gz>] [--overwrite] [--reboot] [--remote_sum <remote sum path>]

Example:

Multiple Systems OOB:


[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c BiosRotManage --action
UpdateGolden --reboot

SList.txt:
192.168.34.56
192.168.34.57

Multiple Systems Remote In-Band through Redfish Host Interface:


[SUM_HOME]# ./sum -I Remote_RHI -l SList.txt -c BiosRotManage --action
UpdateGolden --reboot

SList.txt:
192.168.34.56 OS_Username OS_PASSWD BMC_Username BMC_PASSWD
192.168.34.57 OS_Username OS_PrivateKey OS_Pvtkey_Password BMC_Username
BMC_PASSWD

Supermicro Update Manager User’s Guide 573


6.4.14 Managing Seamless Update Capsule File

• Seamless Update feature in UpdateBios command

Use the “UpdateBios” command with --file <CAPSULE_FILE.bin> to update capsule file to a managed system.
For details, see 5.3.15 Seamless Update Capsule File (Single System).

Multiple Systems OOB Syntax:

sum -l <system list file> -u <username> -p <password> -c UpdateBios --file

<CAPSULE_FILE.bin> [--staged update] [--reboot] [--post_complete]

Multiple Systems Remote In-Band Syntax:

sum -I Remote_RHI -l <system list file> -c UpdateBios --file <CAPSULE_FILE.bin>

[--staged update] [--reboot] [--post_complete] [--remote_sum <remote sum path>]

Example:

Multiple Systems OOB:


[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c UpdateBios --file
CAPSULE_FILE.bin --reboot --post_complete

SList.txt:
192.168.34.56
192.168.34.57

Multiple Systems Remote In-Band through Redfish Host Interface:


[SUM_HOME]# ./sum -I Remote_RHI -l SList.txt -c UpdateBios --file
CAPSULE_FILE.bin --reboot --post_complete

SList.txt:
192.168.34.56 OS_Username OS_PASSWD BMC_Username BMC_PASSWD
192.168.34.57 OS_Username OS_PrivateKey OS_Pvtkey_Password BMC_Username
BMC_PASSWD

Supermicro Update Manager User’s Guide 574


• Getting capsule information in GetBiosInfo command

Use the “GetBiosInfo” command with --file <CAPSULE_FILE.bin> to get capsule information on a managed
system and local capsule file. For details, see 5.3.15 Seamless Update Capsule File (Single System).

Multiple Systems OOB Syntax:

sum -l <system list file> -u <username> -p <password> -c GetBiosInfo --file

<CAPSULE_FILE.bin> [--showall]

Multiple Systems Remote In-Band Syntax:

sum -I Remote_RHI -l <system list file> -u <username> -p <password> -c

GetBiosInfo --file <CAPSULE_FILE.bin> [--showall] [--remote_sum <remote sum

path>]

Example:

Multiple Systems OOB:


[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c GetBiosInfo --file
CAPSULE_FILE.bin --showall

SList.txt:
192.168.34.56
192.168.34.57

Multiple Systems Remote In-Band through Redfish Host Interface

:
[SUM_HOME]# ./sum -I Remote_RHI -l SList.txt -c GetBiosInfo --file
CAPSULE_FILE.bin --showall

Slist.txt:
192.168.34.56 OS_Username OS_PASSWD BMC_Username BMC_PASSWD
192.168.34.57 OS_Username OS_PrivateKey OS_Pvtkey_Password BMC_Username
BMC_PASSWD

Supermicro Update Manager User’s Guide 575


6.4.15 Getting SCP Firmware Image Information

Use the “GetScpInfo” command to get the SCP firmware image information from the managed systems as
well as the input SCP firmware image. The message output will be the same as that in 5.3.16 Getting SCP
Image Information (Single System).

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c GetScpInfo

Example:

[SUM_HOME]# ./sum -l Slist.txt -u ADMIN -p PASSWORD -c GetScpInfo

Slist.txt:

192.168.34.56

192.168.34.57

Note: If the execution “Status” field of a managed system is SUCCESS, the BIOS information
of the managed system will be shown in its “Execution Message” section in the created log
file.

Supermicro Update Manager User’s Guide 576


6.4.16 Updating the SCP Firmware Image

Use the “UpdateScp” command with the SCP firmware image scp_image.tar to update managed systems.
For details on the “UpdateScp” command, see the usage notes in 5.3.17 Updating the SCP Image (Single
System).

Syntax:
sum -l <system list file> [-u <username> -p <password>] -c UpdateScp --file

<filename> --reboot

Example:

[SUM_HOME]# ./sum -l Slist.txt -u ADMIN -p PASSWORD -c UpdateScp --file

scp_image.tar

Slist.txt:

192.168.34.56

192.168.34.57

The execution progress for the managed system will be continuously updated to the “Execution Message”
section of the managed system in the created log file.

Supermicro Update Manager User’s Guide 577


6.4.17 Getting Fixed Boot Settings

Use the “GetFixedBootCfg” command to get the current Fixed Boot settings from the managed systems
and save them in the output files individually for each managed system enumerated in the system list file.
For details on the “GetFixedBootCfg” command, see 5.3.18 Getting Fixed Boot Setting (Single System).

Multiple Systems OOB Syntax:

sum -l <system list file> [-u <username> -p <password>] -c GetFixedBootCfg --

file <USER_SETUP.file> [--overwrite] --redfish

Example:

Multiple Systems OOB:

[SUM_HOME]# ./sum -l Slist.txt -u ADMIN -p PASSWORD -c GetFixedBootCfg --file

USER_SETUP.file --overwrite --redfish

Slist.txt:

192.168.34.56

192.168.34.57

If the execution “Status” field for a managed system (e.g., 192.168.34.56) is SUCCESS, its current settings
are stored in its output file, e.g., USER_SETUP.file.192.168.34.56. The --overwrite option is used to force
the overwrite of the existing file, e.g., USER_SETUP.file.192.168.34.56, if the output file already exists.

6.4.18 Updating Fixed Boot Settings

To update the fixed boot settings, follow these steps:

1. Select one managed system as the golden sample for the current fixed boot settings.
2. Follow the steps in 5.3.19 Updating Fixed Boot Setting for that system.
3. Edit the item/variable values in the user setup file USER_SETUP.file to the desired values as illustrated
in 4.15 Fixed Boot Configuration XML File Format.

Supermicro Update Manager User’s Guide 578


4. Use the ChangeFixedBootCfg command with the modified USER_SETUP.file to update the fixed boot
configurations for managed systems.

Note: Use the --individually option to update each managed system with the corresponding
configuration file.

Multiple Systems OOB Syntax:

sum -l <system list file> [-u <username> -p <password>] -c ChangeFixedBootCfg --

file <USER_SETUP.file> [--reboot] [--individually] --redfish

Example:

Multiple Systems OOB:

[SUM_HOME]# ./sum -l Slist.txt -u ADMIN -p PASSWORD -c ChangeFixedBootCfg --file

USER_SETUP.file --reboot --redfish

[SUM_HOME]# ./sum -l Slist.txt -u ADMIN -p PASSWORD -c ChangeFixedBootCfg --file

USER_SETUP.file --reboot --individually --redfish

Slist.txt:

192.168.34.56

192.168.34.57

If you want to update 192.168.34.56 and 192.168.34.57, you need to provide two files:
USER_SETUP.file.192.168.34.56 and USER_SETUP.file.192.168.34.57. Then set the --file argument with the
“USER_SETUP.file” file name. With the --individually option, SUM searches for
USER_SETUP.file.192.168.34.56 and USER_SETUP.file.192.168.34.57 to update 192.168.34.56 and
192.168.34.57, respectively.

Supermicro Update Manager User’s Guide 579


6.4.19 Managing a Secure Boot

Use the “SecureBootManage” command to manage a secure boot. This command can be used to get or set
secure boot status to “Enabled/Disabled” and also to upload or delete secure boot keys.

For details, see 5.3.18 Managing secure boot (Single System).

Multiple Systems OOB Syntax:

sum -l <system list file> [-u <username> -p <password>] -c SecureBootManage --

redfish --action <action> [--file_type <file type>] [--file <CertificateFile>

[--individually]] [--reboot [--post_complete]]

Multiple Systems Remote In-Band Syntax:

sum -I Remote_RHI -l <system list file> -c SecureBootManage --redfish --action

<action> [--file_type <file type>] [--file <CertificateFile>] [--individually]

[[--reboot [--post_complete]]

Example:

Multiple Systems OOB:


[SUM_HOME]# ./sum -l Slist.txt -u ADMIN -p PASSWORD -c SecureBootManage --
redfish --action UploadCertificate --file_type PK --file CertificateFile.pem --
individually --reboot --post_complete

Slist.txt:
192.168.34.56
192.168.34.57

Multiple Systems Remote In-Band through Redfish Host Interface:


[SUM_HOME]# ./sum -I Remote_RHI -l Slist.txt -c SecureBootManage --redfish --
action UploadCertificate --file_type PK --file CertificateFile.pem --
individually --reboot --post_complete

Slist.txt:
192.168.34.56 OS_Username OS_PASSWD BMC_Username BMC_PASSWD

Supermicro Update Manager User’s Guide 580


192.168.34.57 OS_Username OS_PrivateKey OS_Pvtkey_Password BMC_Username
BMC_PASSWD

Supermicro Update Manager User’s Guide 581


6.5 BMC Management for Multiple Systems
6.5.1 Getting BMC Firmware Image Information

Use the “GetBmcInfo” command to get the BMC firmware image information from the managed systems
as well as the input BMC firmware image. The information will be the same as that in 5.4.1 Getting BMC
Image Information (Single System).

Syntax for Getting BMC Firmware Image Information from Multiple Systems through OOB:

sum -l <system list file> [-u <username> -p <password>] -c GetBmcInfo [--file

<filename>] [--file_only] [--extract_measurement] [--showall]

Syntax for Getting BMC Firmware Image Information from Multiple Systems Remote In-Band:

sum [-I Remote_INB | -I Remote_RHI] -l <system list file> -c GetBmcInfo [--file

<filename>] [--file_only] [--extract_measurement] [--remote_sum <remote sum

path>] [--showall]

Example:

Multiple Systems OOB:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c GetBmcInfo --file

Supermicro_BMC.rom

SList.txt:

192.168.34.56

192.168.34.57

Multiple Systems Remote In-Band:

[SUM_HOME]# ./sum -I Remote_INB -l SList.txt -c GetBmcInfo --file

Supermicro_BMC.rom

SList.txt:

192.168.34.56 OS_Username OS_PASSWD

192.168.34.57 OS_Username OS_PrivateKey OS_Pvtkey_Password


Supermicro Update Manager User’s Guide 582
[SUM_HOME]# ./sum -I Remote_RHI -l SList.txt -c GetBmcInfo --file

Supermicro_BMC.rom

SList.txt:

192.168.34.56 OS_Username OS_PASSWD BMC_Username BMC_PASSWD

192.168.34.57 OS_Username OS_PrivateKey OS_Pvtkey_Password BMC_Username

BMC_PASSWD

If the “Status” field for the execution of a managed system is SUCCESS, the BMC information of the
managed system will be shown in the “Execution Message” section of the managed system in the created
log file.

6.5.2 Updating the BMC Firmware Image

Use the “UpdateBmc” command with BMC firmware image Supermicro_BMC.rom or bmc_image.tar for
OpenBMC to update managed systems. For details on the “UpdateBmc” command, see the usage notes in
5.4.2 Updating the BMC Image (Single System).

Syntax for Updating BMC Firmware Images on Multiple Systems through OOB:

sum -l <system list file> [-u <username> -p <password>] -c UpdateBmc --file

<filename> [--overwrite_cfg] [--overwrite_sdr] [--backup] [--forward] [--

overwrite_ssl]

Syntax for Updating the BMC Firmware Images on Multiple Systems through Remote In-Band:

sum [-I Remote_INB | -I Remote_RHI] -l <system list file> -c UpdateBmc --file

<filename> [--overwrite_cfg] [--overwrite_sdr] [--backup] [--forward] [--

overwrite_ssl] [--remote_sum <remote sum path>]

Supermicro Update Manager User’s Guide 583


Example:
Multiple Systems OOB:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c UpdateBmc --file

Supermicro_BMC.rom

SList.txt:

192.168.34.56

192.168.34.57

Multiple Systems Remote In-Band:

[SUM_HOME]# ./sum -I Remote_INB -l SList.txt -c UpdateBmc --file

Supermicro_BMC.rom

SList.txt:

192.168.34.56 OS_Username OS_PASSWD

192.168.34.57 OS_Username OS_PrivateKey OS_Pvtkey_Password

[SUM_HOME]# ./sum -I Remote_RHI -l SList.txt -c UpdateBmc --file

Supermicro_BMC.rom

SList.txt:

192.168.34.56 OS_Username OS_PASSWD BMC_Username BMC_PASSWD

192.168.34.57 OS_Username OS_PrivateKey OS_Pvtkey_Password BMC_Username

BMC_PASSWD

The execution progress for the managed system will be continuously updated to the “Execution Message”
section of the managed system in the created log file.

6.5.3 Getting BMC Settings

Use the “GetBmcCfg” command to get or dump the current BMC settings from the managed systems and
save it in the output files individually for each managed system enumerated in the system list file. For
details on the “GetBmcCfg” command, see the usage notes in 5.4.3 Getting BMC Settings (Single System).

Syntax for Getting the BMC Settings on Multiple Systems through OOB:

Supermicro Update Manager User’s Guide 584


sum -l <system list file> [-u <username> -p <password>] -c GetBmcCfg --file <

BMCCfg.xml|BMCCfg.bin> [--dump] [--overwrite]

Syntax for Getting the BMC Settings on Multiple Systems through Remote In-Band:

Sum [-I Remote_INB | -I Remote_RHI] -l <system list file> -c GetBmcCfg --file <

BMCCfg.xml|BMCCfg.bin> [--dump] [--overwrite]

Example:

Multiple Systems OOB:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c GetBmcCfg --file

BMCCfg.xml --overwrite

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c GetBmcCfg --file

BMCCfg.bin --dump --overwrite

SList.txt:

192.168.34.56

192.168.34.57

Multiple Systems Remote In-Band:

[SUM_HOME]# ./sum -I Remote_INB -l SList.txt -c GetBmcCfg --file BMCCfg.xml --

overwrite

[SUM_HOME]# ./sum -I Remote_INB -l SList.txt -c GetBmcCfg --file BMCCfg.bin --

dump --overwrite

SList.txt:

192.168.34.56 OS_Username OS_PASSWD

192.168.34.57 OS_Username OS_PrivateKey OS_Pvtkey_Password

Multiple Systems Remote In-Band through Host Interface:

[SUM_HOME]# ./sum -I Remote_RHI -l SList.txt -c GetBmcCfg --file BMCCfg.xml --

overwrite

Supermicro Update Manager User’s Guide 585


[SUM_HOME]# ./sum -I Remote_RHI -l SList.txt -c GetBmcCfg --file BMCCfg.bin --

dump --overwrite

SList.txt:

192.168.34.56 OS_Username OS_PASSWD BMC_Username BMC_PASSWD

192.168.34.57 OS_Username OS_PrivateKey OS_Pvtkey_Password BMC_Username

BMC_PASSWD

If the execution “Status” field for a managed system (e.g., 192.168.34.56) is SUCCESS, its current settings
will be stored in its output file, e.g., BMCCfg.xml.192.168.34.56 or BMCCfg.bin.192.168.34.56. The option -
-overwrite is used to force the overwrite the existing file, e.g., BMCCfg.xml.192.168.34.56 or
BMCCfg.xml.192.168.34.56.

6.5.3.1 Generating BMC Settings Format Based on Sample File

Use the “GetBmcCfg” command with “--sample_file” option to generate BMC configuration based on the
format in the sample file for each managed system enumerated in the system list file. For details on the
“GetBmcCfg” command, see the usage notes in 5.4.3.1 Generating BMC Settings Format Based on Sample
File (Single System).

Syntax for Getting the BMC Settings on Multiple Systems through OOB:

sum -l <system list file> [-u <username> -p <password>] -c GetBmcCfg --file <

BMCCfg.xml> [--overwrite] [--sample_file <config_format.xml>]

Syntax for Getting the BMC Settings on Multiple Systems through Remote In-Band:

Sum [-I Remote_INB | -I Remote_RHI] -l <system list file> -c GetBmcCfg --file <

BMCCfg.xml > [--overwrite] [--sample_file <config_format.xml>]

Example:

Multiple Systems OOB:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c GetBmcCfg --file

BMCCfg.xml --overwrite --sample_file config_format.xml

Supermicro Update Manager User’s Guide 586


SList.txt:

192.168.34.56

192.168.34.57

Multiple Systems Remote In-Band:

[SUM_HOME]# ./sum -I Remote_INB -l SList.txt -c GetBmcCfg --file BMCCfg.xml --

overwrite --sample_file config_format.xml

SList.txt:

192.168.34.56 OS_Username OS_PASSWD

192.168.34.57 OS_Username OS_PrivateKey OS_Pvtkey_Password

Multiple Systems Remote In-Band through Host Interface:

[SUM_HOME]# ./sum -I Remote_RHI -l SList.txt -c GetBmcCfg --file BMCCfg.xml --

overwrite

SList.txt:

192.168.34.56 OS_Username OS_PASSWD BMC_Username BMC_PASSWD

192.168.34.57 OS_Username OS_PrivateKey OS_Pvtkey_Password BMC_Username

BMC_PASSWD

If the execution “Status” field for a managed system (e.g., 192.168.34.56) is SUCCESS, its current settings
will be stored in its output file, e.g., BMCCfg.xml.192.168.34.56. The option --overwrite is used to force the
overwrite the existing file, e.g., BMCCfg.xml.192.168.34.56 or BMCCfg.xml.192.168.34.56.

Supermicro Update Manager User’s Guide 587


6.5.4 Updating BMC Settings

1. Select one managed system as the golden sample for current BMC settings.
2. Follow the steps in 5.4.3 Getting BMC Settings for the managed system.
3. Edit the configurable element values in the BMC configuration text file BMCCfg.xml to the desired
values as illustrated in 4.6 Format of BMC Configuration Text File.
4. Skip unchanged tables in the text file by setting Action attribute as “None.” Note that this step is
optional.
5. Remove unchanged tables/elements in the text file. Note that this step is optional.
6. Use the “ChangeBmcCfg” command with the modified BMCCfg.xml file to update the BMC
configurations for multiple systems.

Notes:

 Some table settings cannot be applied to each managed system uniformly, e.g., FRU
and LAN configurations. You might need to change its table action to “None” in step 4
or remove tables/elements in step 5.
 LAN “IPAddress” field will be skipped in multiple system usage.
 Use the --individually option to update each managed system with the corresponding
configuration file.
 For detailed usage notes of the “ChangeBmcCfg” command, see the usage notes in
5.4.4 Updating BMC Settings (Single System).

Syntax for Updating the BMC Settings on Multiple Systems through OOB:

sum -l <system list file> [-u <username> -p <password>] -c ChangeBmcCfg --file

<BMCCfg.xml|BMCCfg.bin > [--restore] [--individually]

Multiple Systems Remote In-Band Syntax:

sum -I Remote_INB -l <system list file> -c ChangeBmcCfg --file

<BMCCfg.xml|BMCCfg.bin > [--restore] [--individually] [--remote_sum <remote sum

path>]

Example:

Supermicro Update Manager User’s Guide 588


Multiple Systems OOB:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c ChangeBmcCfg --file

BMCCfg.xml

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c ChangeBmcCfg --file

BMCCfg.bin --restore

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c ChangeBmcCfg --file

BMCCfg.xml --individually

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c ChangeBmcCfg --file

BMCCfg.bin --restore --individually

SList.txt:

192.168.34.56

192.168.34.57

Multiple Systems Remote In-Band:

[SUM_HOME]# ./sum -I Remote_INB -l SList.txt -c ChangeBmcCfg --file BMCCfg.xml -

-individually

[SUM_HOME]# ./sum -I Remote_INB -l SList.txt -c ChangeBmcCfg --file BMCCfg.bin -

-restore --individually

SList.txt:

192.168.34.56 OS_Username OS_PASSWD

192.168.34.57 OS_Username OS_PrivateKey OS_Pvtkey_Password

If the execution “Status” field for a managed system is SUCCESS, its BMC settings are updated.

If you want to update 192.168.34.56 and 192.168.34.57, you need to provide two files
BMCCfg.xml.192.168.34.56 and BMCCfg.xml.192.168.34.57. Then set the argument --file with the
BMCCfg.xml file name. With the option --individually, SUM searches for BMCCfg.xml.192.168.34.56 and
BMCCfg.xml.192.168.34.57 to update 192.168.34.56 and 192.168.34.57 respectively.
If you want to restore 192.168.34.56 and 192.168.34.57, you need to provide two files:
BMCCfg.bin.192.168.34.56 and BMCCfg.bin.192.168.34.57. Then set the argument --file with the

Supermicro Update Manager User’s Guide 589


BMCCfg.bin file name. With the --individually option, SUM searches for BMCCfg.bin.192.168.34.56 and
BMCCfg.bin.192.168.34.57 to restore 192.168.34.56 and 192.168.34.57 respectively.

Supermicro Update Manager User’s Guide 590


6.5.5 Setting Up the BMC User Password

Use the “SetBmcPassword” command to execute SUM to update the BMC user password. The information
will be the same as that in 5.4.6 Setting Up a BMC User Password (Single System).

Multiple Systems OOB Syntax:

sum -l <system list file> [-u <username> -p <password>] -c SetBmcPassword [--

user_id <user ID>] [[--new_password <new password> --confirm_password <confirm

password>] | [--pw_file <password file path>]]

The managed systems should be enumerated row by row in the system list file. For the “SetBmcPassword”
command, two formats are supported.

Format 1: BMC_IP_or_HostName New_Password

Format 2: BMC_IP_or_HostName Username Password New_Password

The “-u” and “-p” options are required to specify in the command line for Format 1. The options “-u” and “-
p” can be removed from the command line for Format 2. In addition, the Username/Password in the
system list file overwrites the options “-u” and “-p” in the command line.

Multiple Systems Remote In-Band Syntax:

sum -I Remote_INB -l <system list file> [-u <username> -p <password>] -c

SetBmcPassword [--user_id <user ID>] [[--new_password <new password> --

confirm_password <confirm password>] | [--pw_file <password file path>]] [--

remote_sum <remote sum path>]

The managed systems should be enumerated row by row in the system list file. For the “SetBmcPassword”
command, two formats are supported.

Format 1: BMC_IP_or_HostName New_Password

Format 2: BMC_IP_or_HostName Username Password New_Password

Supermicro Update Manager User’s Guide 591


When using either the “--new_password” or “--pw_file” options, you don’t need to include New_Password
for Format 1 or Format 2, and the same new password will apply to each system specified in the system list
file. If you want to set a different new password for each system, you can specify a New_Password
corresponding to each system for Format 1 or Format 2 without using the “--new_password” and “--
pw_file” options.

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c SetBmcPassword

SList.txt:

192.168.34.56 12345678

192.168.34.57 ADMIN1 PASSWORD1 87654321

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c SetBmcPassword


--new_password 12345678 --confirm_password 12345678

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c SetBmcPassword


--user_id 3 --pw_file passwd.txt

SList.txt:
192.168.34.56
192.168.34.57

passwd.txt:

BmcPasswordString

Supermicro Update Manager User’s Guide 592


6.5.6 Getting the BMC KCS Privilege Level

Use the “GetKcsPriv” command to execute SUM to get the current BMC KCS privilege level from the
managed systems.

Syntax for Getting the BMC KCS Privilege Levels from Multiple Systems through OOB:

sum -l <system list file> [-u <username> -p <password>] -c GetKcsPriv

Syntax for Getting the BMC KCS Privilege Levels from Multiple Systems through Remote In-Band:

sum -I Remote_INB -l <system list file> -c GetKcsPriv [--remote_sum <remote sum

path>]

Example:

Multiple Systems OOB:


[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c GetKcsPriv

SList.txt:
192.168.34.56
192.168.34.57

Multiple Systems Remote In-Band:


[SUM_HOME]# ./sum -I Remote_INB -l SList.txt -c GetKcsPriv

SList.txt:
192.168.34.56 OS_Username OS_PASSWD
192.168.34.57 OS_Username OS_PrivateKey OS_Pvtkey_Password

Supermicro Update Manager User’s Guide 593


6.5.7 Setting the BMC KCS Privilege Level

Use the “SetKcsPriv” command to execute SUM to set the BMC KCS privilege level. The information will be
the same as that in 5.4.8 Setting the BMC KCS Privilege Level (Single System).

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c SetKcsPriv

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c SetKcsPriv --privi_level


‘Call Back’

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c SetKcsPriv --privi_level


1

SList.txt:
192.168.34.56
192.168.34.57

Supermicro Update Manager User’s Guide 594


6.5.8 Loading Factory BMC Settings

Use the “LoadDefaultBmcCfg” command to execute SUM to reset the BMC of the managed system to the
factory default. For details, see 5.4.9 Loading Factory BMC Settings (Single System).

Syntax for Resetting BMC of Multiple Systems through OOB:

sum -l <system list file> [-u <username> -p <password>] -c LoadDefaultBmcCfg [--

preserve_user_cfg] [--clear_user_cfg [--load_unique_password | --

load_default_password]]

Syntax for Resetting BMC of Multiple Systems through Remote In-Band:

sum -I Remote_INB -l <system list file> -c LoadDefaultBmcCfg [--

preserve_user_cfg] [--clear_user_cfg [--load_unique_password | --

load_default_password]] [--remote_sum <remote sum path>]

Example:

Multiple Systems OOB:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c LoadDefaultBmcCfg --

preserve_user_cfg

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c LoadDefaultBmcCfg --

clear_user_cfg --load_unique_password

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c LoadDefaultBmcCfg --

clear_user_cfg --load_default_password

SList.txt:
192.168.34.56
192.168.34.57

Multiple Systems Remote In-Band:

Supermicro Update Manager User’s Guide 595


[SUM_HOME]# ./sum -I Remote_INB -l SList.txt -c LoadDefaultBmcCfg --

clear_user_cfg --load_default_password

SList.txt:
192.168.34.56 OS_Username OS_PASSWD
192.168.34.57 OS_Username OS_PrivateKey OS_Pvtkey_Password

6.5.9 Acquiring the BMC System Lockdown Mode Status

Use the “GetLockdownMode” command to execute SUM to get the current BMC system lockdown mode
status of the managed systems.

Syntax for Getting the BMC System Lockdown Mode Status of Multiple Systems through OOB:

sum -l <system list file> [-u <username> -p <password>] -c GetLockdownMode

Syntax for Getting the BMC System Lockdown Mode Status of Multiple Systems Remote In-Band :

sum -I Remote_INB -l <system list file> -c GetLockdownMode [--remote_sum <remote

sum path>]

Example:

Multiple Systems OOB:


[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c GetLockdownMode

SList.txt:
192.168.34.56
192.168.34.57

Multiple Systems Remote In-Band:


[SUM_HOME]# ./sum -I Remote_INB -l SList.txt -c GetLockdownMode

SList.txt:
192.168.34.56 OS_Username OS_PASSWD
192.168.34.57 OS_Username OS_PrivateKey OS_Pvtkey_Password

Supermicro Update Manager User’s Guide 596


6.5.10 Setting the BMC System Lockdown Mode

Use the “SetLockdownMode” command to execute SUM to set the BMC system lockdown mode. For
details, see 5.4.10 Setting the BMC System Lockdown Mode (Single System).

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c SetLockdownMode --

lock <yes/no> --reboot

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c SetLockdownMode --lock


<yes/no> --reboot

SList.txt:
192.168.34.56
192.168.34.57

6.5.11 Managing BMC RoT Functions

Use the “BmcRotManage” command to manage RoT functions. For details, see 5.4.11 Managing BMC RoT
Functions (Single System).

Managing RoT Functions on Multiple Systems through OOB:

sum -l <system list file> [-u <username> -p <password>] -c BmcRotManage --action

<action> [--file <evidence.bin.gz>] [--overwrite]

Managing RoT Functions on Multiple Systems through Remote In-Band:

sum -I Remote_RHI -l <system list file> -c BmcRotManage --action <action> [--

file <evidence.bin.gz>] [--overwrite] [--remote_sum <remote sum path>]

Example:

Multiple Systems OOB:


[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c BmcRotManage --action
UpdateGolden

Supermicro Update Manager User’s Guide 597


SList.txt:
192.168.34.56
192.168.34.57

Multiple Systems Remote In-Band through Redfish Host Interface:


[SUM_HOME]# ./sum -I Remote_RHI -l SList.txt -c BmcRotManage --action
UpdateGolden

SList.txt:
192.168.34.56 OS_Username OS_PASSWD BMC_Username BMC_PASSWD
192.168.34.57 OS_Username OS_PrivateKey OS_Pvtkey_Password BMC_Username
BMC_PASSWD

6.5.12 Setting the BMC Reset Counter

To set the BMC reset counter, use the “TimedBmcReset” command. For details, see 5.3.13 Setting the
BMC Reset Counter.

Syntax for Setting the BMC Reset Counters on Multiple Systems through OOB:

sum -l <system list file> [-u <username> -p <password>] -c Attestation --action

<action> [--file <filename>] [--overwrite]

Syntax for Setting the BMC Reset Counters on Multiple Systems through Remote In-Band:

sum -I Remote_RHI -l <system list file> -c Attestation --action <action> [--file

<filename>] [--overwrite] [--remote_sum <remote sum path>]

Example:

Multiple Systems OOB:


[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c Attestation --action Dump
--file measurement.bin --overwrite

SList.txt:
192.168.34.56
192.168.34.57

Multiple Systems Remote In-Band through Redfish Host Interface:

Supermicro Update Manager User’s Guide 598


[SUM_HOME]# ./sum -I Remote_RHI -l SList.txt -c Attestation --action Dump --file
measurement.bin --overwrite

SList.txt:
192.168.34.56 OS_Username OS_PASSWD BMC_Username BMC_PASSWD
192.168.34.57 OS_Username OS_PrivateKey OS_Pvtkey_Password BMC_Username
BMC_PASSWD

6.5.13 Managing Remote Attestation

As a security mechanism, remote attestation provides a digital signature and allows users to Use the
“Attestation” command to manage measurement files on the managed systems as well as and local
measurement files with confidence. For details, see 5.4.14 Managing Remote Attestation.

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c Attestation --action

<action> [--file <filename>] [--overwrite]

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c Attestation --action Dump


--file measurement.bin --overwrite

SList.txt:
192.168.34.56
192.168.34.57

Supermicro Update Manager User’s Guide 599


6.5.14 Getting BMC LAN Settings

Use the “GetBmcLANCfg” command to get the current BMC LAN settings from the managed systems and
save them in separate files for each managed system enumerated in the system list file. For details on the
“GetBmcLANCfg” command, see the usage notes in 5.4.15 Getting BMC LAN Settings.

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c GetBmcLANCfg --file <

BMCLANCfg.xml > [--overwrite]

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c GetBmcLANCfg --file

BMCLANCfg.xml --overwrite

SList.txt:

192.168.34.56

192.168.34.57

If the execution “Status” field for a managed system (e.g., 192.168.34.56) is SUCCESS, its current settings
will be saved in an output file, e.g., BMCLANCfg.xml.192.168.34.56. The --overwrite option is used to
overwrite the existing file, e.g., BMCLANCfg.xml.192.168.34.56.

Supermicro Update Manager User’s Guide 600


6.5.15 Updating BMC LAN Settings

1. Select one managed system as the golden sample for current BMC LAN settings.
2. Follow the steps in 5.4.15 Getting BMC LAN Settings for the managed system.
3. Edit the configurable element values in the BMC LAN configuration text file BMCLANCfg.xml to the
desired values as illustrated in 4.13 BMC LAN Configuration XML File Format.
4. Set the Action attribute as “None” to skip the unchanged tables in the text file. Note that this step is
optional.
5. Remove the unchanged tables/elements in the text file. Note that this step is optional.
6. Use the “ChangeBmcLANCfg” command with the modified BMCLANCfg.xml file to update the BMC
LAN configurations for multiple systems.
7. The IPv4 settings IPAddr, SubNetmask, DefaultGateWayAddr in the IPv4 table cannot be applied to
each managed system.
8. Use the --individually option to update each managed system with the corresponding configuration
file.

Note: For details on the “ChangeBmcLANCfg” command, see the usage notes in 5.4.16
Updating BMC LAN Settings.

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c ChangeBmcLANCfg --

file <BMCLANCfg.xml> [--individually]

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c ChangeBmcLANCfg --file

BMCLANCfg.xml

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c ChangeBmcLANCfg --file

BMCLANCfg.xml --individually

SList.txt:

192.168.34.56

192.168.34.57

Supermicro Update Manager User’s Guide 601


If the execution “Status” field for a managed system is SUCCESS, its BMC LAN settings are updated.

If you want to update 192.168.34.56 and 192.168.34.57 with the corresponding configuration file, you
need to provide two files: BMCLANCfg.xml.192.168.34.56 and BMCLANCfg.xml.192.168.34.57. Then set the
--file argument with the BMCLANCfg.xml file name. With the --individually option, SUM searches for
BMCCfg.xml.192.168.34.56 and BMCLANCfg.xml.192.168.34.57 to update 192.168.34.56 and
192.168.34.57, respectively.

Supermicro Update Manager User’s Guide 602


6.5.16 Getting the BMC User List

Use the “GetBmcUserList” command to get the current BMC user list from multiple managed systems. For
details, see 5.4.17 Get BMC User List.

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c GetBmcUserList

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c GetBmcUserList

SList.txt:

192.168.34.56

192.168.34.57

If the execution “Status” field for a managed system is SUCCESS, get the list of

BMC users of the managed system.

Notes:

 "Account Types" is not supported before X12/H12 platforms.


 "Account Types" is only supported OOB usage.

Supermicro Update Manager User’s Guide 603


6.5.17 Setting the BMC User List

Use the “SetBmcUserList” command to set the current BMC user list from multiple managed systems. For
details, see 5.4.18 Setting the BMC User List.

Notes:

 “No Access,” a user privilege, is not supported after X11/H11 platforms.


 “--action EnableType” and “--action EnableAccount” are not supported before X12/H12
platforms

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c SetBmcUserList --

action add --user_id <userid> --user_name <username> --user_password

<userpassword> --user_privilege <userprivilege> [--user_status <status>] [--

manage_account_type <type:status>]

sum -l <system list file> [-u <username> -p <password>] -c SetBmcUserList --

action <action> --user_id <userid> [--user_name <username>] [--user_password

<userpassword>] [--user_privilege <userprivilege>]

sum -l < system list file > [-u <username> -p <password>] -c SetBmcUserList --

action Test --user_name <username> --user_password <userpassword>

sum -l < system list file > [-u <username> -p <password>] -c SetBmcUserList --

action EnableType --user_id <userid> {--account_type <type> --

account_type_status <status> | --manage_account_type <type:status>} [--ap

<protocol> --pp <protocol> --ak <key> --pk <key>]

sum -l < system list file > [-u <username> -p <password>] -c SetBmcUserList --

action EnableAccount --user_id <userid> --user_status <status>

Example:

Supermicro Update Manager User’s Guide 604


[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c SetBmcUserList --action

add --user_id 3 --user_name NAME3 --user_password PASSWORD3 --user_privilege 3 -

-user_status Disable --manage_account_type SNMP:Enable,Redfish:Disable --ap SHA

--pp DES --ak AKEY3 --pk PKEY3

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c SetBmcUserList --action

Del --user_id 3

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c SetBmcUserList --action

Level --user_privilege 3

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c SetBmcUserList --action

SetPwd --user_id 3 --user_password PASSWORD3

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c SetBmcUserList --action

Test --user_name NAME3 --user_password PASSWORD3

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c SetBmcUserList --action

EnableType --user_id 3 --account_type SNMP --account_type_status Enable --ap SHA

--pp DES --ak AKEY3 --pk PKEY3

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c SetBmcUserList --action

EnableType --user_id 3 --manage_account_type SNMP:Enable,Redfish:Disable --ap

SHA --pp DES --ak AKEY3 --pk PKEY3

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c SetBmcUserList --action

EnableAccount --user_id 3 --user_status Disable

SList.txt:

192.168.34.56

192.168.34.57

Supermicro Update Manager User’s Guide 605


If the execution “Status” field for a managed system is SUCCESS, its BMC user

lists are set.

6.5.18 Managing the RMCP Service Port

Use the “RmcpManage” command to get RMCP information and manage RMCP service port. For details,
see 5.4.20 Managing RMCP Service Port.

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c RmcpManage --action

<GetInfo|Enable|Disable> [--port <port>]

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p ADMIN -c RmcpManage --action

Enable --port RMCP:623

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p ADMIN -c RmcpManage --action

Enable --port 623

SList.txt:

192.168.34.56

192.168.34.57

Supermicro Update Manager User’s Guide 606


6.6 Event Log Management for Multiple Systems
6.6.1 Getting the System Event Log

Use the “GetEventLog” command to show the current system event log (including both BIOS and BMC
event log) from the managed systems and save them in the output files individually for each managed
system enumerated in the system list file with the --file option. Without the --file option, you can choose to
show the event log in the execution log file instead. For detailed execution notes, see 5.5.1 Getting System
Event Log (Single System).

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c GetEventLog [--file

<EventLog.txt>] [--overwrite] [--raw_data] [--redfish] [--no_banner]

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c GetEventLog --file

EventLog.txt

SList.txt:

192.168.34.56

192.168.34.57

If the execution “Status” field for a managed system (e.g., 192.168.34.56) is SUCCESS, its event logs are
stored in its output file, e.g., EventLog.txt.192.168.34.56. The --overwrite option is used to force overwrite
of the existing file, e.g., EventLog.txt.192.168.34.56. If the --file option is not used, the event log for each
managed system will be shown in the “Execution Message” section of the managed system in the created
execution log file.

6.6.2 Clearing System Event Log

Use the “ClearEventLog” command to clear the event log (both BMC and BIOS event log) for each managed
system. For detailed execution notes, see 5.5.2 Clearing System Event Log (Single System).

Supermicro Update Manager User’s Guide 607


Syntax:

sum -l <system list file> [-u <username> -p <password>] -c ClearEventLog [[--

current_password <current password>] | [--cur_pw_file <current password file

path>]] [--reboot]

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c ClearEventLog --reboot

SList.txt:

192.168.34.56

192.168.34.57

If the execution “Status” field for a managed system is SUCCESS, its event logs are cleared.

6.6.3 Getting the System Maintenance Event Log

Use the “GetMaintenEventLog” command to have SUM show the managed system’s current maintenance
event logs (including both BIOS and BMC event logs) and use the --file option to save them in the output
files separately. Without the --file option, you can show the event log in the execution log file instead. For
details, see 5.5.3 Getting System Maintenance Event Log (Single System).

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c GetMaintenEventLog [-

-st <start time> --et <end time>] [--count <log count>] [--file <

MaintenEventLog.txt> [--overwrite]]

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c GetMaintenEventLog --st

20200601 --et 20200602 --count 5 --file MaintenEventLog.txt

SList.txt:

192.168.34.56

192.168.34.57

Supermicro Update Manager User’s Guide 608


If the “Status” field of the managed system (e.g., 192.168.34.56) shows SUCCESS, its maintenance event
logs are stored in its output file, e.g., MaintenanceEventLog.txt.192.168.34.56. The --overwrite option is
used to force to overwrite the existing file, e.g., MaintenanceEventLog.txt.192.168.34.56. If the --file option
is not used, the event logs of each managed system will be shown in its “Execution Message” section in the
created execution log file.

6.6.4 Getting Host Crash Dump Data Log

Use the “GetHostDump” command to have SUM show the managed system’s host crash dump data logs.
For details, see 5.5.4 Getting Host Crash Dump Log (Single System).

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c GetHostDump --action

<actiondump> [--file <HostDump.tgz>] [--overwrite]

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c GetHostDump --action

DeleteDump

SList.txt:

192.168.34.56

192.168.34.57

Supermicro Update Manager User’s Guide 609


6.6.5 Clearing System Maintenance Event Log

Use the “ClearMaintenEventLog” command to clear the maintenance event log for each managed system.
For details, see 5.5.5 Clearing System Maintenance Event Log (Single System).

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c ClearMaintenEventLog

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c ClearMaintenEventLog

SList.txt:

192.168.34.56

192.168.34.57

If the execution “Status” field for a managed system is SUCCESS, its maintenance event logs are cleared.

Supermicro Update Manager User’s Guide 610


6.7 CMM Management for Multiple Systems
The CMM provides total remote control of individual Blade server nodes, power supplies, power fans, and
networking switches. The controller is a separate processor, allowing all monitoring and control functions
operate flawlessly regardless of CPU operation or system power-on status.

Note: Three models of 7U SuperBlade CMMs, including SBM-CMM-001, BMB-CMM-002


(mini-CMM) and SBM-CMM-003 are no longer supported.

6.7.1 Getting CMM Image Information

Use the “GetCmmInfo” command to get the CMM firmware image from the managed systems as well as
the input CMM firmware image. The information will be the same as that in 5.6.1 Receiving CMM
Firmware Image Information (Single System).

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c GetCmmInfo [--file

<filename>]

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c GetCmmInfo --file

Supermicro_CMM.rom

SList.txt:

192.168.34.56

192.168.34.57

If the Status field for a managed system shows “SUCCESS,” the CMM information of the managed system
will be shown in the “Execution Message” section of the managed system in the created log file.

Supermicro Update Manager User’s Guide 611


6.7.2 Updating the CMM Firmware Image

Use the “UpdateCmm” command with the CMM firmware image Supermicro_CMM.rom to update the
managed systems. For details on the “UpdateCmm” command, see the notes in 5.6.2 Updating the CMM
Firmware Image (Single System).

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c UpdateCmm --file

<filename> [--overwrite_cfg] [--overwrite_sdr] [--overwrite_ssl]

Example:
[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c UpdateCmm --file

Supermicro_CMM.rom

SList.txt:

192.168.34.56

192.168.34.57

The execution progress of the system will be continuously updated in the “Execution Message” section of
the managed system in the created log file.

6.7.3 Getting CMM Settings

Use the “GetCmmCfg” command to get the current CMM settings from managed systems and save it in the
output files individually for each managed system enumerated in the system list file. For details on the
“GetCmmCfg” command, see the notes in 5.6.3 Getting CMM Settings (Single System).

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c GetCmmCfg --file <

CmmCfg.xml > [--overwrite]

sum -l <system list file> -u <username> -p <password> -c GetCmmCfg --file <

CmmCfg.xml> [--overwrite] [--download [--profile_repo]]

Example:

Supermicro Update Manager User’s Guide 612


[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c GetCmmCfg --file

CmmCfg.xml --overwrite

SList.txt:

192.168.34.56

192.168.34.57

If the Status field of the managed system (e.g., 192.168.34.56) shows SUCCESS, its current settings are
stored in its output file, e.g., CMMCfg.xml.192.168.34.56. The --overwrite option is used to force the
overwrite of the existing file, e.g., CMMCfg.xml.192.168.34.56.

Note: For details on profile updates, please refer to 6.16 Profile Update for Multiple Blade
Systems.

6.7.4 Updating CMM Settings

1. Select one managed system as the golden sample for the current CMM settings.
2. Follow the steps in 5.6.3 Getting CMM settings.
3. Edit the configurable element values in the CMM configuration text file CMMCfg.xml to the desired
values as illustrated in 4.8 Format of CMM Configuration Text File.
4. Set the Action attribute as “None” to skip unchanged tables in the text file. Note that this step is
optional.
5. Remove unchanged tables/elements in the text file. Note that this step is optional.
6. Use the “ChangeCmmCfg” command with the modified CMMCfg.xml file to update the CMM
configurations for multiple systems.

Notes:

 Some table settings cannot be applied to each managed system uniformly, e.g., LAN
configurations. You might need to change its table action to “None” in step 4 or
remove tables/elements in step 5.
 LAN “IPAddress” field will be skipped in multiple system usage.
 Use the --individually option to update each managed system with the corresponding
configuration file.
 For details on the “ChangeCmmCfg” command, see the notes in 5.6.4 Updating CMM
Settings (Single System).
 For details on profile update, please refer to 6.16 Profile Update for Multiple Blade

Supermicro Update Manager User’s Guide 613


Systems.

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c ChangeCmmCfg --file

<CMMCfg.xml> [--individually]

sum -i <system list file> [-u <username> -p <password>] -c ChangeCmmCfg {[--

upload --file <CmmCfg.xml>] | [--update Apply|Deploy]}

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c ChangeCmmCfg --file

CMMCfg.xml

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c ChangeCmmCfg --file

CMMCfg.xml --individually

SList.txt:

192.168.34.56

192.168.34.57

If the Status field of a managed system shows “SUCCESS,” its CMM settings are updated.
In the example, if you want to update 192.168.34.56 and 192.168.34.57, you need to provide two files:
CMMCfg.xml.192.168.34.56 and CMMCfg.xml.192.168.34.57, and then Then name the --file argument as
“CMMCfg.xml.” With the --individually option, SUM searches for CMMCfg.xml.192.168.34.56 and
CMMCfg.xml.192.168.34.57 to update 192.168.34.56 and 192.168.34.57, respectively.

Supermicro Update Manager User’s Guide 614


6.7.5 Setting Up a CMM User Password

Use the “SetCmmPassword” command to execute SUM to update a CMM user password.

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c SetCmmPassword [--

user_id <user ID>] [[--new_password <new password> --confirm_password <confirm

password>] | [--pw_file <password file path>]]

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c SetCmmPassword


--new_password 12345678 --confirm_password 12345678

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c SetCmmPassword


--user_id 3 --pw_file passwd.txt

SList.txt:
192.168.34.56
192.168.34.57

passwd.txt:

CmmPasswordString

Supermicro Update Manager User’s Guide 615


6.7.6 Loading Factory CMM Settings

Use the “LoadDefaultCmmCfg” command to have SUM reset the CMM of the managed system to the
factory default. For details, see 5.6.6 Loading Factory CMM Settings (Single System).

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c LoadDefaultCmmCfg --

preserve_user_cfg

sum -l <system list file> [-u <username> -p <password>] -c LoadDefaultCmmCfg --

clear_user_cfg --load_unique_password

sum -l <system list file> [-u <username> -p <password>] -c LoadDefaultCmmCfg --

clear_user_cfg --load_default_password

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c LoadDefaultCmmCfg --

preserve_user_cfg

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c LoadDefaultCmmCfg --

clear_user_cfg --load_unique_password

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c LoadDefaultCmmCfg --

clear_user_cfg --load_default_password

SList.txt:
192.168.34.56
192.168.34.57

Supermicro Update Manager User’s Guide 616


6.7.7 Getting BBP Image Information

Use the “GetBbpInfo” command to get the BBP firmware image from the managed systems as well as the
input BBP firmware image. The information will be the same as that in 5.6.7 Getting BBP Firmware Image
Information (Single System).

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c GetBbpInfo [--file

<filename>]

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c GetBbpInfo --file BBP.bin

SList.txt:

192.168.34.56

192.168.34.57

If the Status field for a managed system shows “SUCCESS”, the BBP information of the managed system will
be shown in the “Execution Message” section of the managed system in the created log file.

6.7.8 Updating the BBP Firmware Image

Use the “UpdateBbp” command with the BBP firmware image BBP.bin to update managed systems. For
details on the command “UpdateBbp,” see the notes in 5.6.8 Updating the BBP Firmware Image (Single
System).

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c UpdateBbp --file

<filename> [--skip_check]

Example:
[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c UpdateBbp --file BBP.bin

Supermicro Update Manager User’s Guide 617


SList.txt:

192.168.34.56

192.168.34.57

The execution progress of the system will be continuously updated in the “Execution Message” section of
the managed system in the created log file.

6.7.9 Getting Current Power Status of Blade System

Use the “GetBladePowerStatus” command to get the current power status of the blade system. See 5.5.9
Getting Current Power Status of Blade System (Single System).

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c GetBladePowerStatus

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c GetBladePowerStatus

SList.txt:

192.168.34.56

192.168.34.57

If the Status field for a managed system shows “SUCCESS,” the power status of the blade system will be
shown in the “Execution Message” section of the managed system in the created log file.

6.7.10 Setting Power Status of Blade System

Use the “SetBladePowerAction” command to set the current power status of the blade system. See 5.5.10
Setting Power Status of Blade System (Single System).

Syntax:

sum [-i <IP or host name> -u <username> -p <password>] -c SetBladePowerAction --

action <action> --blade <Blade Index> [--node <Node Index>]

Supermicro Update Manager User’s Guide 618


Option Commands Descriptions
--action (optional) Sets power action with:

0 = down

1 = up

2 = cycle

3 = reset

5 = softshutdown

24 = accycle

--blade Sets blade index.


[A1-A14], [B1-B14] or “ALL”

--node (optional) Sets node index.

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c SetBladePowerAction

--action down --blade ALL

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c SetBladePowerAction

--blade ALL --action reset

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c SetBladePowerAction

--blade A1 --node 1 --action softshutdown

SList.txt:

192.168.34.56

192.168.34.57

If the execution “Status” field for a managed system is SUCCESS, the console output of the managed
system will be shown in the “Execution Message” section of the managed system in the created log file.

Supermicro Update Manager User’s Guide 619


6.7.11 Managing Profile Information

Use the “ProfileManage” command to manage profile information on the CMM. The information will be
the same as that in 5.6.7 Managing profile Information (Single System).

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c ProfileManage --

action <action> [--file <filename>]

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c ProfileManage --action

Get --file Profile.xml

SList.txt:

192.168.34.56

192.168.34.57

If the Status field for a managed system shows “SUCCESS,” the profile information of the managed system
will be shown in the “Execution Message” section in the created log file.

Supermicro Update Manager User’s Guide 620


6.7.12 Receiving Switch Firmware Image Information

Use the “GetSwitchInfo” command to get the switch firmware image information as well as the local switch
firmware image (with the --file option) from the managed system. For details, see 5.6.12 Receiving Switch
Firmware Image Information (Single System).

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c GetSwitchInfo [--

dev_id <Device ID>] [--file <filename>]

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c GetSwitchInfo

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c GetSwitchInfo --dev_id

A1,A2 --file Supermicro_Switch.bin

SList.txt:

192.168.34.56

192.168.34.57

Supermicro Update Manager User’s Guide 621


6.7.13 Updating the Switch Firmware

Use the “UpdateSwitch” command with the Supermicro_Switch.bin switch firmware image to update the
managed switch. The information is the same as that in 5.6.13 Updating the Switch Firmware.

Syntax:

sum -l <switch list file> [-u <Switch username> -p <Switch password>] -c

UpdateSwitch --file <filename> [--reboot] [--individually]

sum -l <system list file> [-u <username> -p <password>] -c UpdateSwitch --file

<filename> [--dev_id <Switch device ID> --switch_user <Switch username> --

switch_pw <Switch password>] [--reboot] [--individually]

Example:

[SUM_HOME]# ./sum -l SwitchList.txt -u ADMIN -p PASSWORD -c UpdateSwitch --file

Supermicro_Switch.bin --reboot

[SUM_HOME]# ./sum -l SwitchList.txt -u ADMIN -p PASSWORD -c UpdateSwitch --file

Supermicro_Switch.bin --reboot --individually

SwitchList.txt:

192.168.34.100

192.168.34.101

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c UpdateSwitch --file

Supermicro_Switch.bin --dev_id A1 --switch_user ADMIN --switch_pw ADMIN --reboot

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c UpdateSwitch --file

Supermicro_Switch.bin --dev_id A1 --switch_user ADMIN --switch_pw ADMIN --reboot

--individually

SList.txt:

192.168.34.100

192.168.34.101

Supermicro Update Manager User’s Guide 622


For --inidividually option usage, if you want to update 192.168.34.100 and 192.168.34.101, you need to
provide two files Supermicro_Switch.bin.192.168.34.100 and Supermicro_Switch.bin.192.168.34.101. Then
set the --file argument with the “Supermicro_Switch.bin” filename. With the --individually option, SUM
searches for Supermicro_Switch.bin.192.168.34.100 and Supermicro_Switch.bin.192.168.34.100 to update
192.168.34.100 and 192.168.34.101 respectively.

Supermicro Update Manager User’s Guide 623


6.7.14 Rebooting the Switch

Use the “RebootSwitch” command to reboot the managed switch. The information will be the same as that
in 5.6.14 Rebooting the Switch.

Syntax:

sum -l <switch list file> [-u <Switch username> -p <Switch password>] -c

RebootSwitch

sum -l <system list file> [-u <username> -p <password>] -c RebootSwitch [--

dev_id <Switch device ID> --switch_user <Switch username> --switch_pw <Switch

password>]

Example:

[SUM_HOME]# ./sum -l SwitchList.txt -u ADMIN -p PASSWORD -c RebootSwitch

SwitchList.txt:

192.168.34.100

192.168.34.101

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c RebootSwitch --dev_id A1

--switch_user ADMIN --switch_pw ADMIN

SList.txt:

192.168.34.100

192.168.34.101

Supermicro Update Manager User’s Guide 624


6.8 Applications for Multiple Systems
6.8.1 Sending an IPMI Raw Command

Use the “RawCommand” command to send IPMI raw command.

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c RawCommand --raw

<raw command>

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c RawCommand --raw '06 01'

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c RawCommand --raw '0x6

0x01'

SList.txt:

192.168.34.56

192.168.34.57

If the execution “Status” field for a managed system is SUCCESS, the console output of the managed
system will be shown in the “Execution Message” section of the managed system in the created log file.

Note: A raw command must be quoted.

Supermicro Update Manager User’s Guide 625


6.8.2 Controlling the UIDs of Multiple Managed Systems

Use the “LocateServerUid” command to control the UIDs. For details, see 5.7.9 Controlling the UID of the
Managed System (Single System).

Option Command Description


--action Sets action to:

1 = GetStatus

2 = On

3 = Off

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c LocateServerUid --

action <action>

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c LocateServerUid --action

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c LocateServerUid --action

GetStatusSList.txt:

192.168.34.56

192.168.34.57

If the execution “Status” field for a managed system is SUCCESS, the console output of the managed
system will be shown in the “Execution Message” section of the managed system in the created log file.

Supermicro Update Manager User’s Guide 626


6.8.3 Booting into the ISO Image from HTTP Server

Use the “SetHttpBoot” command to download ISO images from multiple servers and boot into the ISO
image. For details, see 5.7.10 Booting into the ISO Image from HTTP Server (Single System).

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c SetHttpBoot [[--

current_password <current password>] | [--cur_pw_file <current password file

path>]] [--boot_lan <boot lan port>] [--boot_name <boot description>] --

image_url <URL> [--reboot] --file <file name>

sum -l <system list file> [-u <username> -p <password>] -c SetHttpBoot --

boot_clean [--reboot]

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c SetHttpBoot --boot_name

bootDescription --image_url http://192.168.12.78/iso/efishell.iso --reboot

[SUM_HOME]# ./sum -i SList.txt -u ADMIN -p PASSWORD -c SetHttpBoot --boot_lan 2

--boot_name bootDescription --file TLS.crt --image_url

https://[1234:ab5:0:c678:9012:345d:6e78:9f0a]/iso/efishell.iso --reboot

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c SetHttpBoot --boot_clean

--reboot

SList.txt:

192.168.34.56

192.168.34.57

If the execution “Status” field for a managed system is SUCCESS, the console output of the managed
system will be shown in the “Execution Message” section of the managed system in the created log file.

Supermicro Update Manager User’s Guide 627


Notes:

 HTTPS boot needs to provide the clients with a valid TLS certificate signed by a trusted
certification authority.
 Due to BIOS limitations, if an HTTP boot option exists in the BIOS configuration, please
use the option “--boot_clean” to clean the HTTP boot option and then reset the HTTP
boot option.
 When you execute the SetHttpBoot command on the FreeBSD 12 system, you may
boot into FreeBSD instead of efishell.iso because of startup.nsh in the system. To
prevent from it, you can delete startup.nsh or rename the file name.

Supermicro Update Manager User’s Guide 628


6.8.4 Managing KMS Server Configurations

Use the “KmsManage” command to change the KMS server configurations, upload TLS certificates and test
the connection to the KMS server. The command is only available on X12/H12 and later platforms. For
details on the console output and command usage, see 5.7.11 Managing KMS Server Configurations (Single
System).

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c KmsManage

[[--current_password <current password>] | [--cur_pw_file <current password

filename>]]

[option …]

Option Augument Descriptions


--server_ip <server IP address> Enters a KMS server IP address.
--second_server_ip <second server IP> Enters a second KMS server IP address.
--port <port> Command optional port(s).
The format of <port> is “TCP:5696” or “5696”.
TCP is for KMS server port.
--time_out <time out> Enters a KMS server connection time-out.
--time_zone <time zone> Enters a correct time zone.
--client_username <client username> Enters a client identity: UserName.
--client_password <client password> Enters a client identity: Password.
--ca_cert <CA certificate Uploads a CA certificate from the file.
filename>
--client_cert <client certificate Uploads a client certificate from the file.
filename>
--pvt_key <client private key> Uploads a client private key from the file.
--pvt_key_pw <private key Uploads a client private key from the file.
password>
--file <file name> When the --action GetInfo option is specified, save the
OEM configuration to a file. Otherwise, update the OEM
settings with the given configuration file.
--action <action> Sets the KMS management action to:
1 = GetInfo: Check the current KMS configurations.
2 = Probe: Test the connection to the specified KMS
server.
3 = DeleteCA: Delete a CA certificate.

Supermicro Update Manager User’s Guide 629


Option Augument Descriptions
4 = DeleteCert: Delete a client certificate.
5 = DeletePvtKey: Delete a client private key.
6 = DeleteAll: Delete all certificates and keys.
--reboot N/A Forces the managed system to reboot or power up after
operation.
--post_complete N/A Waits for the managed system POST to complete after
reboot.

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c KmsManage --server_ip

192.168.12.78 --port 5659 --ca_cert ca.crt --client_cert client.crt --pvt_key

private.key --action Probe --reboot

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c KmsManage --server_ip

192.168.12.78 --port TCP:5659 --ca_cert ca.crt --client_cert client.crt --

pvt_key private.key --action Probe --reboot

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c KmsManage --action

GetInfo

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c KmsManage --action

DeleteAll --reboot

SList.txt:

192.168.34.56

192.168.34.57

If the “Status” field for a managed system shows SUCCESS, the console output of the managed system will
be shown in the “Execution Message” section of the managed system in the created log file.

Supermicro Update Manager User’s Guide 630


6.8.5 Getting System Settings

Use the “GetSystemCfg” command to get the current system settings from the managed systems and save
them in the output files individually for each managed system enumerated in the system list file. For details
on the “GetSystemCfg” command, see the notes in 5.7.12 Getting System Settings.

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c GetSystemCfg --file

<SystemCfg.xml> [--overwrite] [[--download] [--file_id]]

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c GetSystemCfg --file

SystemCfg.xml --overwrite

SList.txt:

192.168.34.56

192.168.34.57

If the Status field of the managed system (e.g., 192.168.34.56) shows SUCCESS, its current settings are
stored in its output file, e.g., SystemCfg.xml.192.168.34.56. The --overwrite option is used to force an
existing file to be overwritten , e.g., SystemCfg.xml.192.168.34.56.

Note: For details on profile update, please refer to 6.16 Profile Update for Multiple Blade
Systems.

Supermicro Update Manager User’s Guide 631


6.8.6 Updating System Settings

1. Follow the steps in 5.7.13 Updating System Settings.


2. Use the “ChangeSystemCfg” command with the modified SystemCfg.xml file to update the system
configurations for multiple systems.

Notes:

 For BMC configuration, some table settings cannot be applied to each managed system
uniformly, e.g., LAN configurations. You might need to change its table action to
“None” in BMC configuration file.
 For more details, please refer to 5.3.4 Updating BIOS Settings Based on the Current
BIOS Settings and 5.4.4 Updating BMC Settings.
 Use the --individually option to update each managed system with the corresponding
configuration file concurrently.
 For details on the “ChangeSystemCfg” command, see the notes in 5.7.13 Updating
System Settings.
 For details on profile update, please refer to 6.16 Profile Update for Multiple Blade
Systems.

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c ChangeSystemCfg --

file <SystemCfg.xml> [--reboot [--post_complete]]

sum -l <system list file> [-u <username> -p <password>] -c ChangeSystemCfg {[--

update Apply|Deploy --dev_id <Device ID> --file_id <file ID> --reboot] | [--

upload --file SystemCfg.xml]}

Example:

[SUM_HOME]# ./sum -l <system list file> [-u <username> -p <password>] -c

ChangeSystemCfg --file SystemCfg.xml

[SUM_HOME]# ./sum -l <system list file> [-u <username> -p <password>] -c

ChangeSystemCfg --file SystemCfg.xml --individually

Supermicro Update Manager User’s Guide 632


[SUM_HOME]#./sum -l <system list file> [-u <username> -p <password>] -c

ChangeSystemCfg --upload --file SystemCfg.xml

[SUM_HOME]# ./sum -l <system list file> [-u <username> -p <password>] -c

ChangeSystemCfg --update Apply --dev_id A1_1,B11_2,A10 --file_id 2 --reboot

[SUM_HOME]# ./sum -l <system list file> [-u <username> -p <password>] -c

ChangeSystemCfg --update Apply --dev_id ALL --file_id 2 --reboot

SList.txt:

192.168.34.56

192.168.34.57

If the Status field of a managed system shows “SUCCESS”, its system settings are updated.

If you want to update 192.168.34.56 and 192.168.34.57, you need to provide two files
SystemCfg.xml.192.168.34.56 and SystemCfg.xml.192.168.34.57, and then rename the --file argument as
“SystemCfg.xml.” With the --individually option, SUM searches for SystemCfg.xml.192.168.34.56 and
SystemCfg.xml.192.168.34.57 to update 192.168.34.56 and 192.168.34.57 respectively.

Supermicro Update Manager User’s Guide 633


6.8.7 Invoking Redfish API
Use the “RedfishApi” command to invoke any Redfish API and display the response on screen. For details,
please see 5.7.10 Invoke Redfish API.

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c RedfishApi --api <api

path> [-v] [--request <http method>] [--file <file name> [--overwrite]] [--data

<request body>] [--retry <number>][--individually]

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c RedfishApi --request

PATCH --api /redfish/v1/TaskService -v --retry 1 --data @body.txt --file

response.txt --overwrite --individually

SList.txt:

192.168.34.56

192.168.34.57

If you want to invoke a Redfish API to 192.168.34.56 and 192.168.34.57, and you want them to use
different request body, you need to provide two files body.txt.192.168.34.56 and body.txt.192.168.34.57,
and then specify --data argument as “@body.txt.” With the --individually option, SUM searches for
body.txt.192.168.34.56 and body.txt.192.168.34.57 as the request body sending to 192.168.34.56 and
192.168.34.57 respectively.

Supermicro Update Manager User’s Guide 634


6.8.8 Remote Execution

Use the “RemoteExec” command to secure copy the file and execute shell commands on remote Linux
systems. For details, see 5.7.15 Remote Execute(Single System).

Syntax:

sum -I Remote_INB -l Slist.txt -c RemoteExec --remote_cmd <shell command> [--

file <file name>]

The managed systems should be enumerated row by row in the system list file. For the ”RemoteExec”
command, three formats are supported. The system list file should be like this:

Format 1: OS_IP_or_HostName

Format 2: OS_IP_or_HostName OS_Username OS_Password

Format 3: OS_IP_or_HostName OS_Username OS_Privatekey OS_Privatekey_Password

Use any of the formats when one of these conditions occurs:

o Format 1 Slist.txt:

a). Hosts by different names or IP addresses share the same OS username and password.

b). Hosts by different names or IP addresses share the same OS password, privatekey, and privatekey
password.

o Format 2 Slist.txt: Each host has its OS username and password.

o Format 3 Slist.txt: Each host has its own OS username, privatekey, and privatekey password.

Example:

Remote In-Band:

[SUM_HOME]# ./sum -I Remote_INB -l Slist.txt -c RemoteExec --remote_cmd "ls

/tmp/ -l | grep test.sh" --file test.sh

Supermicro Update Manager User’s Guide 635


SList.txt:

192.168.34.56

192.168.34.57

[SUM_HOME]# ./sum -I Remote_INB -l Slist.txt -c RemoteExec --remote_cmd "ls

/tmp/ -l | grep test.sh" --file test.sh

SList.txt:

192.168.34.56

192.168.34.57

[SUM_HOME]# ./sum -I Remote_INB -l Slist.txt -c RemoteExec --remote_cmd "ls

/tmp/ -l | grep test.sh" --file test.sh

SList.txt:

192.168.34.56 root 111111

192.168.34.57 root 111111

[SUM_HOME]# ./sum -I Remote_INB -l Slist.txt -c RemoteExec --remote_cmd "ls

/tmp/ -l | grep test.sh" --file test.sh

SList.txt:

192.168.34.56 privatekey1 privatekey1_password

192.168.34.57 privatekey2 privatekey2_password

If the execution “Status” field of the managed system shows SUCCESS, the console output of the managed
system will be shown in the “Execution Message” section of the managed system in the created log file.

Notes:

 The file will be copied to the path "/tmp/" in remote Linux systems.
 The stderr on the remote Linux system will be redirected to stdout.

Supermicro Update Manager User’s Guide 636


6.8.9 Managing Redfish Host Interface

Use the “ManageRHI” command to switch Redfish Host Interface USB connection to the CDC-ECM or RNDIS
mode. For details, please see 5.7.12 Managing Redfish Host Interface

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c ManageRHI --action

<GetConnection | SetConnection> [--type <RNDIS | CDC_ECM>]

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c ManageRHI --action

GetConnection

SList.txt:

192.168.34.56

192.168.34.57

6.9 Storage Management for Multiple Systems


6.9.1 Getting RAID Firmware Image Information

Use the “GetRaidControllerInfo” command to get the RAID firmware image information from the managed
systems as well as the input RAID firmware image. The information will be the same as that in 5.8.1
Getting RAID Firmware Image Information (Single System).

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c GetRaidControllerInfo

[--controller <Broadom or Marvell>] [--dev_id <controller_id>] [--file

<filename>]

Example:

Supermicro Update Manager User’s Guide 637


[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c GetRaidControllerInfo --

file RAID.rom

SList.txt:

192.168.34.56

192.168.34.57

If the execution “Status” field for a managed system is SUCCESS, the RAID information of the managed
system will be shown in the “Execution Message” section of the managed system in the created log file.

6.9.2 Updating the RAID Firmware Image

Use the “UpdateRaidController” command with the RAID firmware image RAID.rom to update multiple
systems. For details on using the “UpdateRaidController” command, see the usage notes in 5.8.2 Updating
the RAID Firmware Image (OOB Only) (Single System).

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c UpdateRaidController

--controller <Broadom or Marvell> --dev_id <controller_id> --file <filename>

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c UpdateRaidController

--controller Broadcom --dev_id 0 --file Supermicro_RAID.rom

SList.txt:

192.168.34.56

192.168.34.57

The execution progress for the managed system will be continuously updated in the “Execution Message”
section of the managed system in the created log file.

Supermicro Update Manager User’s Guide 638


6.9.3 Getting RAID Settings

Use the “GetRaidCfg” command to get the current RAID settings from managed systems and save them
separately for each managed system enumerated in the system list file. For details on using the
“GetRaidCfg” command, see the usage notes in 5.8.3 Getting RAID Settings (Single System).

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c GetRaidCfg --file <

RAIDCfg.xml > [--overwrite]

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c GetRaidCfg --file

RAIDCfg.xml --overwrite

SList.txt:

192.168.34.56

192.168.34.57

If the execution “Status” field for a managed system (e.g., 192.168.34.56) is SUCCESS, its current settings
are stored in its output file, e.g. RAIDCfg.xml.192.168.34.56. The --overwrite option is used to force the
overwrite of the existing file, e.g., RAIDCfg.xml.192.168.34.56.

6.9.4 Updating RAID Settings

1. Select one managed system as the golden sample for current RAID settings.
2. Follow the steps in 5.8.3 Getting RAID Settings.
3. Edit the configurable element values in the RAID configuration text file RAIDCfg.xml as illustrated in
4.7 Format of the RAID Configuration Text File.
4. Set Action attribute as “None” to skip the unchanged tables in the text file. Note that this step is
optional.
5. Remove the unchanged tables/elements in the text file. Note that this step is optional.
6. Use the “ChangeRaidCfg” command with the modified RAIDCfg.xml file to update the RAID
configurations for multiple systems.

Supermicro Update Manager User’s Guide 639


Notes:

 Some table settings cannot be uniformly applied to each managed system. You might
need to change its table action to “None” in step 4 or remove the tables/elements in
step 5.
 Use the “--individually” option to update each managed system with the corresponding
configuration file concurrently.
 For details on the “ChangeRaidCfg” command, see the usage notes in 5.8.4 Updating
RAID Settings (Single System).

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c ChangeRaidCfg --file

<RAIDCfg.xml> [--individually]

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c ChangeRaidCfg --file

RAIDCfg.xml

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c ChangeRaidCfg --file

RAIDCfg.xml --individually

SList.txt:

192.168.34.56

192.168.34.57

If the execution “Status” field for a managed system is SUCCESS, its RAID settings are updated.

If you want to update 192.168.34.56 and 192.168.34.57, you need to provide two files
RAIDCfg.xml.192.168.34.56 and RAIDCfg.xml.192.168.34.57, and then rename the --file argument as
“RAIDCfg.xml.” With the --individually option, SUM searches for RAIDCfg.xml.192.168.34.56 and
RAIDCfg.xml.192.168.34.57 to update 192.168.34.56 and 192.168.34.57 respectively.

Supermicro Update Manager User’s Guide 640


6.9.5 Getting SATA HDD Information

Use the “GetSataInfo” command to get the SATA HDD information from the managed systems. The
information will be the same as that in 5.8.5 Getting SATA HDD Information (OOB Only) (Single System).

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c GetSataInfo

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c GetSataInfo

SList.txt:

192.168.34.56

192.168.34.57

If the execution “Status” field for a managed system is SUCCESS, the SATA HDD information of the
managed system will be shown in the console.

Supermicro Update Manager User’s Guide 641


6.9.6 Getting NVMe Information

Use the “GetNvmeInfo” command to get the NVMe information from managed systems. The information
will be the same as that in 5.8.6 Getting NVMe Information (Single System).

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c GetNvmeInfo [ --

dev_id <device_id> ]

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c GetNvmeInfo

SList.txt:

192.168.34.56

192.168.34.57

If the execution “Status” field for a managed system is SUCCESS, the NVMe information of the managed
system will be shown on the console.

Supermicro Update Manager User’s Guide 642


6.9.7 Securely Erasing Hard Disks

Use the “SecureEraseDisk” command to execute SUM to erase the HDD on the managed system. For
details, see 5.8.7 Secure Erasing Hard Disks (Single System).

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c SecureEraseDisk --

file <filename> [[--current_password <current password>] | [--cur_pw_file

<current password file path>]] [--action <action> --reboot] [--precheck]

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c SecureEraseDisk --file

psid.txt --precheck

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c SecureEraseDisk --file

psid.txt --action SetPassword --reboot

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c SecureEraseDisk --file

psid.txt --action SecurityErase --reboot

SList.txt:
192.168.34.56
192.168.34.57

If the execution “Status” field of a managed system is SUCCESS, the pre-check result of the managed
system will be shown in the “Execution Message” section of the managed system in the created log file.

Supermicro Update Manager User’s Guide 643


6.9.8 Securely Erasing Hard Disks in RAID Controller

Use the “SecureEraseRaidHdd” command to execute SUM to securely erase hard disks (HDD or SSD) in the
target RAID storage controller system and poll the erasing status asynchronously or synchronously. For
details, see 5.8.8 Securely Erasing Hard Disks in RAID Controller (Single System).

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c SecureEraseRaidHdd

--dev_id <device_id> --enc_id <enclosure id> --dsk_id <disk id> [[--abort] | [--

sync]]

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c SecureEraseRaidHdd

--dev_id 0 --enc_id 0,1,2 --dsk_id 0,3,4

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c SecureEraseRaidHdd

--dev_id 0 --enc_id ALL --dsk_id ALL --sync

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c SecureEraseRaidHdd

--dev_id 0 --enc_id ALL --dsk_id 0,1,2 --abort

SList.txt:
192.168.34.56
192.168.34.57

If the execution “Status” field of a managed system is SUCCESS, the summary of securely erasing or
aborting result of the managed system will be shown in the “Execution Message” section of the managed
system in the created log file.

Supermicro Update Manager User’s Guide 644


To check the erasing status, get the task ID(s) existing in the log file created from securely erasing and use
the “SecureEraseRaidHdd” command appended with the --tsk_id option.

Syntax:

[SUM_HOME]# ./sum -l <system list file> -u ADMIN -p PASSWORD -c

SecureEraseRaidHdd

--tsk_id <task id>

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c SecureEraseRaidHdd

--tsk_id 1,2,3

If the execution “Status” field for a managed system shows SUCCESS, the erasing status of the RAID
Controller systems will be shown in the “Execution Message” section of the managed system in the created
log file.

To check the disk(s) information in the managed system, use the “SecureEraseRaidHdd” command
appended with the --precheck option.

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c SecureEraseRaidHdd

--precheck

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c SecureEraseRaidHdd

--precheck

SList.txt:

192.168.34.56

192.168.34.57

Supermicro Update Manager User’s Guide 645


If the execution “Status” field for a managed system shows SUCCESS, the overall list of disk(s) in the RAID
Controller systems will be shown in the “Execution Message” section of the managed system in the created
log file.

Note: In multiple systems, the --sync option is not allowed with --tsk as polling the erasing
status on the RAID controller system.

Supermicro Update Manager User’s Guide 646


6.9.9 Getting PMem Firmware Image Information

Use the “GetPMemInfo” command to get the PMem firmware image information from the managed
system as well as the input PMem firmware image. For details, see 5.8.9 Getting PMem Firmware Image
Information (Single System).

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c GetPMemInfo [--file

<filename>]

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c GetPMemInfo --file

PMem.bin

SList.txt:

192.168.34.56

192.168.34.57

If the execution “Status” field for a managed system is SUCCESS, the BMC information of the managed
system will be shown in the “Execution Message” section of the managed system in the created log file.

Supermicro Update Manager User’s Guide 647


6.9.10 Updating the PMem Firmware Image

Use the “UpdatePMem” command with a PMem firmware image PMem.bin to update the PMem of the
managed systems. For details on the command, see notes in 5.8.10 Updating the PMem Firmware Image
(Single System).

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c UpdatePMem [[--file

<filename>] | [--restore_default_fw]] [[--current_password <current password>] |

[--cur_pw_file <current password file path>]] [--reboot]

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c UpdatePMem --file

PMem.bin --reboot

SList.txt:

192.168.34.56

192.168.34.57

The execution progress for the managed system will be continuously updated to the “Execution Message”
section of the managed system in the created log file.

Supermicro Update Manager User’s Guide 648


6.9.11 Getting VROC Settings

Use the “GetVROCCfg” command to get the current VROC settings from the managed systems and save
them separately for each managed system enumerated in the system list file. For details on using the
“GetVROCCfg” command, see the usage notes in 5.8.11 Getting VROC Settings (Single System).

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c GetVROCCfg --file <

VROC.cfg.xml> [--overwrite]

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c GetVROCCfg --file

VROC.cfg.xml --overwrite

SList.txt:

192.168.34.56

192.168.34.57

If the “Status” field for a managed system (e.g., 192.168.34.56) shows SUCCESS, its current settings are
stored in its output file, e.g., VROC.cfg.xml.192.168.34.56. The --overwrite option is used to force the
overwrite of the existing file, e.g., VROC.cfg.xml.192.168.34.56.

Supermicro Update Manager User’s Guide 649


6.9.12 Updating VROC Settings

1. Follow the steps in 6.9.11 Getting VROC Settings.


2. Edit the configurable element values in the VROC configuration xml file VROC.cfg.xml as illustrated in
4.11 Format of the VROC Configuration XML File.
3. Set Action attribute as “None” to skip the unchanged tables in the XML file. Note that this step is
optional.
4. Remove the unchanged tables/elements in the XML file. Note that this step is optional.
5. Use the “ChangeVROCCfg” command with the modified VROC.cfg.xml file to update the VROC
configurations for multiple systems.

Notes:

 Use the --individually option to update each managed system with the corresponding
configuration file concurrently. The --individually option is required for this command.
 For details on the “ChangeVROCCfg” command, see the usage notes in 5.8.12
Updating VROC Settings (Single System).

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c ChangeVROCCfg --file

<VROC.cfg.xml> --individually

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c ChangeVROCCfg --file

VROC.cfg.xml --individually

SList.txt:

192.168.34.56

192.168.34.57

If the “Status” field for a managed system is SUCCESS, its VROC settings are updated.

If you want to update 192.168.34.56 and 192.168.34.57, you need to provide two files
VROC.cfg.xml.192.168.34.56 and VROC.cfg.xml.192.168.34.57, and then rename the --file argument as

Supermicro Update Manager User’s Guide 650


“VROC.cfg.xml.” With the --individually option, SUM searches for VROC.cfg.xml.192.168.34.56 and
VROC.cfg.xml.192.168.34.57 to update 192.168.34.56 and 192.168.34.57 respectively.

Supermicro Update Manager User’s Guide 651


6.9.13 Controlling NVMe Device

Use the “ControlNvme” command to locate, insert or remove NVMe devices. The information will be the
same as that in 6.9.6 Getting NVMe Information (Single System).

Syntax:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c ControlNvme --action

<Action> --dev_id <device ID> --group_id <group ID> --slot <slot num>

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c ControlNvme --action

Locate --dev_id 0 --group_id 0 --slot 0

SList.txt:

192.168.34.56

192.168.34.57

Supermicro Update Manager User’s Guide 652


6.10 NIC Management for Multiple Systems
6.10.1 Getting Add-On NIC Firmware Image Information

Use the “GetAocNICInfo” command to get the add-on NIC firmware information from the managed system
as well as the add-on NIC local firmware image. The information will be the same as that in 5.9.1 Getting
Add-On NIC Firmware Image Information (Single System).

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c GetAocNICInfo [--file

<filename>] [--dev_id <add-on NIC device ID >]

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c GetAocNICInfo --file

AOC_NIC.bin

SList.txt:

192.168.34.56

192.168.34.57

If the “Status” field for a managed system is SUCCESS, the add-on NIC information of the managed system
will be shown in the “Execution Message” section of the managed system in the created log file.

Supermicro Update Manager User’s Guide 653


6.10.2 Updating the Add-On NIC Firmware Image

Use the “UpdateAocNIC” command with the add-on NIC firmware image AOC_NIC.bin to update the
managed system. For details, please see the usage notes in 5.9.2 Updating the Add-On NIC Firmware Image
(Single System).

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c UpdateAocNIC --file

<filename> --dev_id <add-on NIC device ID> --reboot [--post_complete]

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c UpdateAocNIC --file

AOC_NIC.bin --dev_id 1 --reboot --post_complete

SList.txt:

192.168.34.56

192.168.34.57

The execution results for the managed system will be the most updated in the “Execution Message”
section of the managed system in the created log file.

Supermicro Update Manager User’s Guide 654


6.11 PSU Management for Multiple Systems
6.11.1 Getting PSU Information

Use the “GetPsuInfo” command to get the current PSU information from the managed systems. The PSU
information output will be the same as that in 5.9.1 Getting PSU Information (Single System).

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c GetPsuInfo

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c GetPsuInfo

SList.txt:

192.168.34.56

192.168.34.57

If the execution “Status” field for a managed system is SUCCESS, the PSU information of the managed
system will be shown in the “Execution Message” section of the managed system in the created log file.

6.11.2 Updating the Signed PSU Firmware Image Requested by OEM

Use the “UpdatePsu” command with a signed PSU firmware image requested by OEM and PSU slave
address to run SUM to update the managed systems. For details on the UpdatePsu command, see the
notes in 5.9.2 Updating the Signed PSU Firmware Image Requested by OEM (Single System).

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c UpdatePsu --file

<filename> --address <PSU slave address>

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c UpdatePsu --file

Supermicro_PSU.x0 --address 0x80

Supermicro Update Manager User’s Guide 655


The execution progress for the managed system will be continuously updated to the “Execution Message”
section of the managed system in the created log file.

Note: To use “UpdatePsu” command for multiple systems, the slave addresses of PSUs that
need to be updated must be the same.

6.11.3 Getting the Current Power Status of the Managed System

Use the “GetPowerStatus” command to get current power status of the managed system.

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c GetPowerStatus

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c GetPowerStatus

SList.txt:

192.168.34.56

192.168.34.57

If the execution “Status” field for a managed system is SUCCESS, the console output of the managed
system will be shown in the “Execution Message” section of the managed system in the created log file.

Supermicro Update Manager User’s Guide 656


6.11.4 Setting Power Action of Managed System

Use the “SetPowerAction” command to set the type of power action of the managed system.

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c SetPowerAction --

action <action>

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c SetPowerAction --action

up

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c SetPowerAction --action 0

SList.txt:

192.168.34.56

192.168.34.57

If the execution “Status” field for a managed system is SUCCESS, the console output of the managed
system will be shown in the “Execution Message” section of the managed system in the created log file.

Supermicro Update Manager User’s Guide 657


6.12 TPM Management for Multiple Systems
6.12.1 Getting TPM Information

On X11 Intel® Xeon® Scalable Processors with Intel® C620 Series Chipsets and later platforms, use the
“GetTpmInfo” command to get the TPM module information from the managed system. For details on the
“GetTpmInfo” command, see the usage notes in 5.10.1 Getting TPM Information (Single System).

Syntax:

sum -l <system list file> [-u <username> -p <password>]-c GetTpmInfo [--showall]

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c GetTpmInfo [--showall]

SList.txt:

192.168.34.56

192.168.34.57

If the execution “Status” field for a managed system is SUCCESS, the TPM module information of the
managed system will be shown in the “Execution Message” section of the managed system in the created
log file.

Supermicro Update Manager User’s Guide 658


6.12.2 Provisioning the TPM Module

On X11 Intel® Xeon® Scalable Processors with Intel® C620 Series Chipsets and later platforms, use the
“TpmManage” command to execute SUM to enable TPM module capabilities for the managed system.
Before executing the command, the TPM module should be installed on the managed system. For details
on the “TpmManage” command, see the usage notes in 5.10.2 Provisioning TPM Module (Single System).

Option Commands Descriptions

--reboot Forces the managed system to reboot.

--provision Launches the trusted platform module provision procedure.

--table_default Uses the default TPM provision table.

--table <file name> Uses the customized TPM provision table.

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c TpmManage --image

provision [options…]

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c TpmManage -- provision

--table_default --reboot

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c TpmManage -- provision

--table Tpm12Prov.bin --reboot

SList.txt:

192.168.34.56

192.168.34.57

If the execution “Status” field for a managed system is SUCCESS, the TPM provisioning procedure is
completed.
On platforms before X11 Intel® Xeon® Scalable Processors with Intel® C620 Series Chipsets, use the
“TpmProvision” command to enable TPM module capabilities for managed systems. Before executing the

Supermicro Update Manager User’s Guide 659


command, the TPM modules should be installed on managed systems. For detailed notes of the
“TpmProvision” command, see 5.10.2 Provisioning TPM Module (Single System).

Syntax:

sum -l <system list file> [-u <username> -p <password>]-c TpmProvision --

image_url <URL> --reboot --lock <yes> [[--id <id for URL> --pw <password for

URL>] | [--id <id for URL> --pw_file <password file path>]]

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c TpmProvision --image_url

'smb://192.168.35.1/MySharedPoint/MyFolder/' --id smbid --pw smbpasswd --reboot

--lock yes

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c TpmProvision --image_url

'http://192.168.35.1/MySharedPoint/MyFolder/' --id smbid --pw smbpasswd --reboot

--lock yes

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c TpmProvision --image_url

'\\192.168.35.1\MySharedPoint\MyFolder\' --id smbid --pw_file smbpasswd.txt --

reboot --lock yes

SList.txt:

192.168.34.56

192.168.34.57

smbpasswd.txt:

smbpasswd

If the execution “Status” field for a managed system is SUCCESS, its TPM capabilities are enabled.

Supermicro Update Manager User’s Guide 660


6.12.3 Enabling and Clearing TPM Module Capabilities

On X11 Intel® Xeon® Scalable Processors with Intel® C620 Series Chipsets and later platforms, use the
“TpmManage” command with the options in the following table to provide TPM module capabilities from
the managed system. For detailes, see the usage notes in 5.10.3 Enabling and Clearing TPM Module
Capabilities (Single System).

Option Commands Descriptions

--reboot (optional) Forces the managed system to reboot.

--clear_and_enable_dtpm_txt Clears dTPM ownership and activates dTPM/TXT.

--clear_dtpm Clears dTPM ownership and disables dTPM for TPM 1.2.

Clears dTPM ownership for TPM 2.0.

--enable_txt_and_dtpm Enables TXT and dTPM.

--clear_and_enable_dtpm Clears dTPM ownership, disables dTPM (for TPM 1.2 only) and
activates dTPM.

--disable_dtpm Disables dTPM.

--disable_txt Disables TXT.

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c TpmManage [options…]

[--reboot]

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c TpmManage

--clear_and_enable_dtpm_txt --reboot

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c TpmManage

--clear_dtpm --reboot

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c TpmManage

--enable_txt_and_dtpm --reboot

Supermicro Update Manager User’s Guide 661


[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c TpmManage

--clear_and_enable_dtpm --reboot

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c TpmManage

--disable_dtpm --reboot

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c TpmManage

--disable_txt --reboot

SList.txt:

192.168.34.56

192.168.34.57

If the execution “Status” field for a managed system is SUCCESS, the TPM option is applied.

On platforms before X11 Intel® Xeon® Scalable Processors with Intel® C620 Series Chipsets, use the
“TpmProvision” command with options “--cleartpm and” --reboot to clear TPM module capabilities from
managed systems. For details on the “--cleartpm” option, see 5.10.3 Providing and Clearing TPM Module
Capabilities (Single System).

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c TpmProvision --

image_url <URL> [[--id <id for URL> --pw <password for URL>] | [--id <id for

URL> --pw_file <password file path>]] --cleartpm --reboot

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c TpmProvision --image_url

'\\192.168.35.1\MySharedPoint\MyFolder' --id smbid --pw smbpasswd --cleartpm --

reboot

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c TpmProvision --image_url

'\\192.168.35.1\MySharedPoint\MyFolder' --id smbid --pw_file smbpasswd.txt --

cleartpm --reboot

Supermicro Update Manager User’s Guide 662


SList.txt:

192.168.34.56

192.168.34.57

smbpasswd.txt:

smbpasswd

If the execution “Status” field for a managed system is SUCCESS, its TPM capabilities are cleared.

Supermicro Update Manager User’s Guide 663


6.13 GPU Management for Multiple Systems
6.13.1 Getting GPU Information

Use the “GetGpuInfo” command to get the current GPU information from the managed systems. The GPU
information output will be the same as that in 5.12.1 Getting GPU Information (Single System).

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c GetGpuInfo

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c GetGpuInfo

SList.txt:

192.168.34.56

192.168.34.57

If the “Status” field of a managed system is SUCCESS, the GPU information of the managed system will be
shown in the “Execution Message” section of the managed system in the created log file.

Supermicro Update Manager User’s Guide 664


6.13.2 Updating the GPU Firmware Image

Use the “UpdateGpu” command with CEC/FPGA/HGX_H100 of GPU firmware image to run SUM to update
the GPU firmware of a managed system. For details, please see the usage notes in 5.12.2 Updating the GPU
Firmware Image (Single System).

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c UpdateGpu --item

<CEC|FPGA|HGX_H100> --file <filename> [--reboot] [--post_complete]

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c UpdateGpu --item FPGA --

file GPU_FPGA.bin

SList.txt:

192.168.34.56

192.168.34.57

The execution progress for the managed system will be continuously updated to the “Execution Message”
section of the managed system in the created log file.

Supermicro Update Manager User’s Guide 665


6.13.3 Diagnosing AMD MI250 GPU System Status

Use the “DiagGpuStatus” command to run SUM to get the Power rails status from AMD MI250 GPU of a
managed system. For details, please see the usage notes in 5.12.3 Diagnosing AMD MI250 GPU system
status (Single System).

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c DiagGpuStatus [--

dev_id <dev_id_list>]

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c DiagGpuStatus

SList.txt:

192.168.34.56

192.168.34.57

The execution progress for the managed system will be continuously updated to the “Execution Message”
section of the managed system in the created log file.

6.13.3 Getting GPU Dump Log Information

Use the “GetGpuLog” command to run SUM to get the log dump file of a managed system. For details,
please see the usage notes in 5.12.4 Getting GPU dump log information (Single system).

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c GetGpuLog --item

<HGX_H100> --file <filename> [--overwrite]

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c GetGpuLog –-item –-file

log.tgz

Supermicro Update Manager User’s Guide 666


SList.txt:

192.168.34.56

192.168.34.57

The execution progress for the managed system will be continuously updated to the “Execution Message”
section of the managed system in the created log file.

Supermicro Update Manager User’s Guide 667


6.14 CPLD Management for Multiple Systems
6.14.1 Getting CPLD Firmware Image Information (Multiple Systems)

Use the “GetCpldInfo” command to get the CPLD firmware image information from the managed system as
well as the input CPLD firmware image. For details, see 5.12.1 Getting CPLD Firmware Image Information
(Single System).

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c GetCpldInfo [--file

<filename>]

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c GetCpldInfo --file

CPLD.bin

SList.txt:

192.168.34.56

192.168.34.57

If the execution “Status” field for the managed system is SUCCESS, the BMC information of the managed
system will be shown in the “Execution Message” section of the managed system in the created log file.

Supermicro Update Manager User’s Guide 668


6.14.2 Updating the CPLD Firmware Image (Multiple Systems)

Use the “UpdateCpld” command with the CPLD firmware image CPLD.bin to update the CPLD of managed
systems. For details, see notes in 5.12.2 Updating the CPLD Firmware Image (Single System).

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c UpdateCpld --file

<filename> --reboot

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c UpdateCpld --file

CPLD.bin

SList.txt:

192.168.34.56

192.168.34.57

The execution progress for the managed system will be continuously updated to the “Execution Message”
section of the managed system in the created log file.

6.14.3 Managing CPLD RoT Functions (Multiple Systems)

Use the “CpldRotManage” command to manage RoT functions. For details, see 5.13.3 Managing CPLD RoT
Functions (Single System).

Managing RoT Functions on Multiple Systems through OOB:

sum -l <system list file> [-u <username> -p <password>] -c BmcRotManage --action

<action>

Example:

Multiple Systems OOB:

Supermicro Update Manager User’s Guide 669


[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c CpldRotManage --action
UpdateGolden

SList.txt:
192.168.34.56
192.168.34.57

6.14.4 Getting Switchboard CPLD Firmware Image Information (Multiple


Systems)

Use the “GetSwitchboardCpldInfo” command to get all the switchboards firmware installed on the
managed system. For details, see 5.13.4 Getting Switchboard CPLD Firmware Image Information (Single
System).

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c

GetSwitchboardCpldInfo

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c GetSwitchboardCpldInfo

SList.txt:

192.168.34.56

192.168.34.57

If the execution “Status” field for the managed system is SUCCESS, the BMC information of the managed
system will be shown in the “Execution Message” section of the managed system in the created log file.

Supermicro Update Manager User’s Guide 670


6.14.5 Updating Switchboard CPLD Firmware Image (Multiple Systems)

Use the “UpdateSwitchboardCpld” command with Switchboard CPLD image switchboard.jed to update
the managed system. For details, see notes in 5.13.5 Updating Switchboard CPLD Firmware Image
(Single System).
Syntax:

sum -l <system list file> [-u <username> -p <password>] -c UpdateSwitchboardCpld

--file <filename> --type <type> [--index <index>] [--reboot]

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c UpdateSwitchboardCpld --

file Left_Switchboard_CPLD2.jed –-type Left –-index 2

SList.txt:

192.168.34.56

192.168.34.57

The execution progress for the managed system will be continuously updated to the “Execution Message”
section of the managed system in the created log file.

6.14.6 Getting Fanboard CPLD Firmware Image Information (Multiple


Systems)

Use the “GetFanboardCpldInfo” command to get the Fanboard CPLD firmware image information
of X13/H13 and later RoT platforms from the managed system. For details, see notes in 5.13.6
Updating Fanboard CPLD Firmware Image (Single System).
Syntax:

sum -l <system list file> [-u <username> -p <password>] -c GetFanboardCpldInfo

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c GetFanboardCpldInfo

Supermicro Update Manager User’s Guide 671


SList.txt:

192.168.34.56

192.168.34.57

The execution progress for the managed system will be continuously updated to the “Execution Message”
section of the managed system in the created log file.

6.14.7 Updating Fanboard CPLD Firmware Image (Multiple Systems)

Use the “UpdateFanboardCpld” command with the Fanboard CPLD firmware image fanboard.jed
to run SUM on CPLD RoT systems of X13/H13 and later platforms to update the Fanboard CPLD
of a managed system. For details, see notes in 5.13.7 Updating Fanboard CPLD Firmware Image (Single
System).
Syntax:

sum -l <system list file> [-u <username> -p <password>] -c UpdateFanboardCpld --

file <filename> --type <Fanboard_ID> [--index <CPLD_ID>]

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c UpdateFanboardCpld --file

Fanboard_CPLD.bin --type Front

SList.txt:

192.168.34.56

192.168.34.57

The execution progress for the managed system will be continuously updated to the “Execution Message”
section of the managed system in the created log file.

Supermicro Update Manager User’s Guide 672


6.14.8 Getting AOM board CPLD Firmware Image Information

Use the “GetAomboardCpldInfo” command to get the AOM board CPLD firmware image information of
NVIDIA MGX™ systems from the managed system. For details on the “GetAomboardCpldInfo” command,
please refer to 5.13.8 Getting AOM board CPLD Firmware Image Information.

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c GetAomboardCpldInfo

Example:

Multiple Systems OOB:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c GetAomboardCpldInfo

SList.txt:

192.168.34.56

192.168.34.57

The execution progress for the managed system will be continuously updated to the “Execution Message”
section of the managed system in the created log file.

6.14.9 Updating AOM board CPLD Firmware Image

Use the “UpdateAomboardCpld” command with the AOM board CPLD firmware image AOM_CPLD.jed to
run SUM on NVIDIA MGX™ systems to update the AOM board CPLD of a managed system. For details on
the “UpdateAomboardCpld” command, please refer to 5.13.9 Updating AOM board CPLD Firmware Image.

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c UpdateAomboardCpld --


file <filename>

Example:

Multiple Systems OOB:

Supermicro Update Manager User’s Guide 673


[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c UpdateAomboardCpld --file

AOM_CPLD.jed

SList.txt:

192.168.34.56

192.168.34.57

The execution progress for the managed system will be continuously updated to the “Execution Message”
section of the managed system in the created log file.

6.14.10 Getting Miscellaneous CPLD Firmware Image Information

Use the “GetMiscCpldInfo” command to get the Miscellaneous CPLD firmware image information of
NVIDIA MGX™ systems from the managed system. For details on the “GetMiscCpldInfo” command, please
refer to 5.13.10 Getting Miscellaneous CPLD Firmware Image Information.

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c GetMiscCpldInfo

Example:

Multiple Systems OOB:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c GetMiscCpldInfo

SList.txt:

192.168.34.56

192.168.34.57

The execution progress for the managed system will be continuously updated to the “Execution Message”
section of the managed system in the created log file.

Supermicro Update Manager User’s Guide 674


6.14.11 Updating Miscellaneous CPLD Firmware Image

Use the “UpdateMiscCpld” command with the AOM board CPLD firmware image MISC_CPLD.jed to run
SUM on NVIDIA MGX™ systems to update the Miscellaneous CPLD of a managed system.

Currently, no inband support for now. For details on the “UpdateMiscCpld” command, please refer to
5.13.11 Updating Miscellaneous CPLD Firmware Image.

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c UpdateMiscCpld --file

<filename>

Example:

Multiple Systems OOB:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c UpdateMiscCpld --file

MISC_CPLD.jed

SList.txt:

192.168.34.56

192.168.34.57

The execution progress for the managed system will be continuously updated to the “Execution Message”
section of the managed system in the created log file.

Supermicro Update Manager User’s Guide 675


6.15 AIP Management for Multiple Systems
6.15.1 Getting AIP CPLD Information

Use the “GetAipCpldInfo” command to get the current AIP CPLD information from the managed systems
installed with AIP. The AIP CPLD information output will be the same as that in 5.14.1 Getting AIP CPLD
Information (Single System).

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c GetAipCpldInfo

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c GetAipCpldInfo

SList.txt:

192.168.34.56

192.168.34.57

If the “Status” field of a managed system is SUCCESS, the AIP CPLD information of the managed system will
be shown in the “Execution Message” section of the managed system in the created log file.

Supermicro Update Manager User’s Guide 676


6.15.2 Updating the AIP CPLD Firmware Image

Use the “UpdateAipCpld” command with a given AIP CPLD firmware image to run SUM to update the AIP
CPLD firmware of a managed system with AIP installed. For details, see the notes in 5.14.2 Updating the
AIP CPLD Firmware Image (Single System).

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c UpdateAipCpld --file

<filename>

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c UpdateAipCpld --file

AIP_CPLD.bin

SList.txt:

192.168.34.56

192.168.34.57

The execution progress for the managed system will be continuously updated to the “Execution Message”
section of the managed system in the created log file.

Supermicro Update Manager User’s Guide 677


6.16 Profile Management for Multiple Blade
Systems
SUM supports profile update for multiple Blade systems. profile update is only supported on the Blade
system with 64MB CMM AST2400. You can use the ChangeCmmCfg/ChangeSystemCfg commands with the
--upload option to manage the CMM and Blade configurations of multiple Blade systems, upload one CMM
profile and up to twenty system profiles, and upload CMM/Blade system configurations to CMMwith. Use
the ProfileManage command to edit and get the existing profile information from CMM. Note that there is
a space limit on Profiles. Once the space is full, use the ProfileManage command to delete unnecessary
profiles, and upload new profiles. Each profile name on CMM is unique. Different profiles with the same
profile names cannot exist on CMM at the same time. For more details about the usages of profile update
and update rules, see 5.15 Profile Update for a Single Blade System.

6.16.1 Profile Management (Multiple Systems)

SUM supports profile management for multiple Blade systems. For more details, see 5.15.2 Profile
Management.

6.16.2 Updating CMM Configurations (Multiple Systems)

SUM supports updating CMM configurations for multiple Blade systems through the existing CMM profiles
on CMM. For more details, see 5.15.3 Updating CMM Configurations.

6.16.3 Updating System Configurations (Multiple Systems)

SUM supports updating system configurations for multiple Blade systems through the existing system
profiles on the CMM. For more details, see 5.15.4 Update Blade configurations.

Supermicro Update Manager User’s Guide 678


6.17 TwinPro Management for Multiple Systems
6.17.1 Getting TwinPro Settings

Use the “GetTpCfg” command to get the current TwinPro settings from the managed systems and save
them in output files individually for each managed system enumerated in the system list file. For details on
the “GetTpCfg” command, see the usage notes in 5.17.1 Getting TwinPro Settings (Single System).

Multiple Systems OOB Syntax:

sum -l <system list file> [-u <username> -p <password>] -c GetTpCfg --file <

TpCfg.xml > [--overwrite]

Example:

Multiple Systems OOB:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c GetTpCfg --file TpCfg.xml

--overwrite

SList.txt:

192.168.34.56

192.168.34.57

If the execution “Status” field for a managed system (e.g., 192.168.34.56) is SUCCESS, its current settings
will be stored in its output file, e.g., TpCfg.xml.192.168.34.56. The --overwrite option is used to force
overwrite the existing file, e.g., TpCfg.xml.192.168.34.56.

Supermicro Update Manager User’s Guide 679


6.17.2 Updating TwinPro Settings
1. Select one managed system as the golden sample for current TwinPro settings.
2. Follow the steps in 5.17.1 Getting TwinPro Settings for the managed system.
3. Edit the configurable element values in “TpCfg.xml,” a TwinPro configuration text file, to the desired
values as illustrated in 4.9 Format of TwinPro Configuration Text File.
4. Skip unchanged tables in the text file by setting Action attribute as “None.” Note that this step is
optional.
5. Remove unchanged tables/elements in the text file. Note that this step is optional.
6. Use the “ChangeTpCfg” command with the modified TpCfg.xml file to update the TwinPro
configurations for multiple systems.
Multiple Systems OOB Syntax:
sum -l <system list file> [-u <username> -p <password>] -c ChangeTpCfg --file <

TpCfg.xml> [--individually]

Example:

Multiple Systems OOB:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c ChangeTpCfg --file

TpCfg.xml

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c ChangeTpCfg --file

TpCfg.xml --individually

SList.txt:

192.168.34.56

192.168.34.57

If the execution “Status” field for a managed system is SUCCESS, its TiwnPro settings are updated.

If you want to update 192.168.34.56 and 192.168.34.57, you need to provide two files
TpCfg.xml.192.168.34.56 and TpCfg.xml.192.168.34.57. Then set the --file argument with the TpCfg.xml file
name. With the --individually option, SUM will search for TpCfg.xml.192.168.34.56 and
TpCfg.xml.192.168.34.57 to update 192.168.34.56 and 192.168.34.57, respectively.

Supermicro Update Manager User’s Guide 680


6.18 CDU Management for Multiple Systems
Use the “MonitorCDUStatus” command to access the function to show or set the current CDU Web UI
Status remotely. The message output will be the same as that in 5.18 CDU Management for a Single System.

Multiple Systems OOB Syntax:

sum -l <system list file> [-u <username> -p <password>] -c MonitorCDUStatus --

action <action> [--file <CDUStatus.txt>] [--overwrite] [--file

<CDU_alert_setting.json file>]

Option Commands Descriptions

--action Sets CDU action to:

1 = GetStatus

2 = SetCfg

Example:

Multiple Systems OOB:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c MonitorCDUStatus --action

GetStatus --file CDUStatus.txt --overwrite

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c MonitorCDUStatus --action

SetCfg --file CDU_alert_setting.json

SList.txt:

192.168.34.56

192.168.34.57

If the execution “Status” field for a managed system is SUCCESS, the CDU status

of the managed system will be shown in the “Execution Message” section in the

created log file.

Supermicro Update Manager User’s Guide 681


6.19 Backplane Management for Multiple Systems
6.19.1 Getting Multi-node EC Firmware Image Information

Use the “GetMultinodeEcInfo” command to get the multi-node EC firmware image information from the
managed system as well as the input multi-node EC firmware image. For details, see 5.19.1 Getting Multi-
node EC Firmware Image Information (Single System).

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c GetMultinodeEcInfo [-

-file <filename>]

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c GetMultinodeEcInfo

SList.txt:

192.184.11.65

192.168.34.57

If the execution “Status” field for the managed system is SUCCESS, the multi-node EC firmware image
information of the managed system will be shown in the “Execution Message” section of the managed
system in the created log file.

Supermicro Update Manager User’s Guide 682


6.19.2 Updating a Multi-node EC Firmware Image

Use the “UpdateMultinodeEc” command with the given multi-node EC firmware image EC.bin to run SUM
to update the multi-node EC firmware of managed systems. For details, see the notes in 5.19.2 Updating
the Multi-node EC Firmware Image (Single System).

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c UpdateMultinodeEc --

file <filename>

Example:

[SUM_HOmE]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c UpdateMultinodeEc --file

EC.bin

SList.txt:

192.168.34.56

192.168.34.57

The execution progress for the managed system will be continuously updated in the “Execution Message”
section of the managed system in the created log file.

Note: This command can only be operated on node A of a system to perform a multi-node
EC FW update.

Supermicro Update Manager User’s Guide 683


6.19.3 Getting Backplane CPLD Firmware Information

Use the “GetBackplaneCpldInfo” command to get the backplane CPLD firmware image information from
the managed system. For details, see 5.19.1 Getting Backplane CPLD Firmware Information (Single System).

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c GetBackplaneCpldInfo

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c GetBackplaneCpldInfo

SList.txt:

192.168.34.56

192.168.34.57

If the execution “Status” field for the managed system is SUCCESS, the BMC information of the managed
system will be shown in the “Execution Message” section of the managed system in the created log file.

6.19.4 Updating the Backplane CPLD Firmware Image

Use the “UpdateBackplaneCpld” command with the backplane CPLD firmware image to update the
backplane CPLD firmware of a managed system. For details, see 5.19.2 Updating Backplane CPLD Firmware
Image (Single System).

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c UpdateBackplaneCpld

<--index <0|1|2|3> --file BPN_CPLD.jed | --update_list

0:BPN_CPLD.jed[,1:Backplane_CPLD.jed]...]> --manual_ejected

Example:

Supermicro Update Manager User’s Guide 684


[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c UpdateBackplaneCpld --

index 0 --file BPN_CPLD.jed --manual_ejected

SList.txt:

192.168.34.56

192.168.34.57

If the execution “Status” field for the managed system is SUCCESS, the BMC information of the managed
system will be shown in the “Execution Message” section of the managed system in the created log file.

Supermicro Update Manager User’s Guide 685


6.20 Virtual Media Management for Multiple
Systems
6.20.1 Providing an ISO Image as a Virtual Media through BMC and File
Server

Use the “MountIsoImage” command to mount an ISO image as virtual media to managed systems through
a SAMBA/HTTP/HTTPS server. For details on the “MountIsoImage” command, please refer to 5.19.1
Providing an ISO Image as a Virtual Media through BMC and File Server (Single System).

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c MountIsoImage --

image_url <URL> --reboot [[--id <id for URL> --pw <password for URL>] | [--id

<id for URL> --pw_file <password file path>]]

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c MountIsoImage --image_url

'smb://192.168.35.1/MySharedPoint/MyFolder/Image.iso' --id smbid --pw smbpasswd

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c MountIsoImage --image_url

'smb://[2001:db8::1]/MySharedPoint/MyFolder/Image.iso' --id smbid --pw smbpasswd

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c MountIsoImage --image_url

'http://192.168.35.1/MySharedPoint/MyFolder/Image.iso' --id smbid --pw smbpasswd

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c MountIsoImage --image_url

'http://[2001:db8::1]:80/MySharedPoint/MyFolder/Image.iso' --id smbid --pw

smbpassw

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c MountIsoImage --image_url

'https://192.168.35.1/MySharedPoint/MyFolder/Image.iso' --id smbid --pw

smbpasswd

Supermicro Update Manager User’s Guide 686


[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c MountIsoImage --image_url

'https://[2001:db8::1]:80/MySharedPoint/MyFolder/Image.iso' --id smbid --pw

smbpassw

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c MountIsoImage --image_url

'\\192.168.35.1\MySharedPoint\MyFolder\Image.iso' --id smbid --pw_file

smbpasswd.txt

SList.txt:

192.168.34.56

192.168.34.57

smbpasswd.txt:

smbpasswd

If the execution “Status” field for a managed system is SUCCESS, the Image.iso is mounted as a virtual
media to the managed system.

Supermicro Update Manager User’s Guide 687


6.20.2 Removing an ISO Image as a Virtual Media

Use the “UnmountIsoImage” command to unmount an ISO image as a virtual media from a managed
system.

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c UnmountIsoImage

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c UnmountIsoImage

SList.txt:

192.168.34.56

192.168.34.57

If the execution “Status” field for a managed system is SUCCESS, the mounted virtual media will be
removed from the managed system.

Supermicro Update Manager User’s Guide 688


6.20.3 Mounting a Floppy Image Virtually from a Local Image File

Use the “MountFloppyImage” command to execute SUM to mount a binary floppy image virtually to the
managed system. For details on “MountFloppyImage,” please refer to 5.19.3 Mounting a Floppy Image
Virtually from a Local Image File (Single System).

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c MountFloppyImage

--file <filename>

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c MountFloppyImage --file

Floppy.img

SList.txt:

192.168.34.56

192.168.34.57

If the execution “Status” field of the managed system is SUCCESS, the “Floppy.img” is mounted virtually to
the managed system.

Supermicro Update Manager User’s Guide 689


6.20.4 Unmounting a Floppy Image Virtually from the Managed System

Use the “UnmountFloppyImage” command to remove a binary floppy image virtually from the managed
system. For details on “UnmountFloppyImage,” please refer to 5.19.4 Unmounting Floppy Image Virtually
from the Managed System (Single System).

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c UnmountFloppyImage

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c UnmountFloppyImage

SList.txt:

192.168.34.56

192.168.34.57

If the execution “Status” field for a managed system is SUCCESS, the virtually mounted image will be
removed from the managed system.

Supermicro Update Manager User’s Guide 690


6.20.5 Getting Virtual Media Information

On the platforms that support multiple virtual media devices, use the “GetVmInfo” command to get the
virtual media information from the managed system. For details on the “GetVmInfo” command, please
refer to 5.19.5 Get Virtual Media Information (Single System).

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c GetVmInfo [--dev_id

<device ID>]

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c GetVmInfo --dev_id 1

SList.txt:

192.168.34.56

192.168.34.57

If the execution “Status” field for a managed system is SUCCESS, the console output of the managed
system will be shown in the “Execution Message” section of the managed system in the created log file.

Supermicro Update Manager User’s Guide 691


6.20.6 Managing Multiple Virtual Media Devices

For platforms that support multiple virtual media devices, use the “VmManage” command with the
Mount/Unmount action to mount or unmount an image. Use the “VmManage” command with the
Enable/Disable action to enable or disable virtual media on all platforms. For details on the “VmManage”
command, please refer to 5.19.6 Manage Multiple Virtual Media Device (Single System).

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c VmManage --action

<Enable/Disable> [--port <port>]

sum -l <system list file> [-u <username> -p <password>] -c VmManage --action

Mount [--dev_id <device ID>] --image_url <URL> [[--id <id for URL> --pw

[password for URL]]|[--id <id for URL> --pwd_file <password file path>]] [--

verify_cert [--accept_self_signed]]

sum -l <system list file> [-u <username> -p <password>] -c VmManage --action

Unmount [--dev_id <device ID>]

Example:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c VmManage --action Enable

--port 623

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c VmManage --action Disable

--port 623

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c VmManage --action Mount -

-image_url 'smb://192.168.35.1/MySharedPoint/MyFolder/Image.iso' --id smbid --pw

smbpasswd --dev_id 1

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c VmManage --action Mount -

-image_url 'smb://[2001:db8::1]/MySharedPoint/MyFolder/Image.iso' --id smbid --

pw smbpasswd --dev_id 2

Supermicro Update Manager User’s Guide 692


[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c VmManage --action Mount -

-image_url 'http://192.168.35.1/MySharedPoint/MyFolder/Image.iso' --id smbid --

pw smbpasswd --dev_id 3

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c VmManage --action Mount -

-image_url 'http://[2001:db8::1]:80/MySharedPoint/MyFolder/Image.iso' --id smbid

--pw_file smbpasswd.txt --dev_id 1

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c VmManage --action Mount -

-image_url 'https://192.168.35.1/MySharedPoint/MyFolder/Image.iso' --id smbid --

pw smbpasswd --verify_cert --accept_self_signed --dev_id 2

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c VmManage --action Mount -

-image_url 'https://[2001:db8::1]:80/MySharedPoint/MyFolder/Image.iso' --id

smbid --pw_file smbpasswd.txt --verify_cert --accept_self_signed --dev_id 3

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c VmManage --action Mount -

-image_url '\\192.168.35.1\MySharedPoint\MyFolder\Image.iso' --id smbid --

pw_file smbpasswd.txt --dev_id 1

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c VmManage --action Mount -

-image_url '\\2001:db8::1\MySharedPoint\MyFolder\Image.iso' --id smbid --pw_file

smbpasswd.txt --dev_id 2

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c VmManage --action Unmount

--dev_id 1

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c VmManage --action Unmount

--dev_id ALL

SList.txt:

192.168.34.56

192.168.34.57

Supermicro Update Manager User’s Guide 693


smbpasswd.txt:

smbpasswd

If the execution “Status” field for a managed system is SUCCESS, the console output of the managed
system will be shown in the “Execution Message” section of the managed system in the created log file.

Supermicro Update Manager User’s Guide 694


6.21 Security Management for Multiple Systems
6.21.1 Getting GPU External RoT (ERoT) Firmware Image Information

Use the “GetGpuERoTInfo” command to get the ERoT GPU firmware (image information of NVIDIA MGX™
systems) from the managed system. For details on the “GetGpuERoTInfo” command, please refer to 5.22.1
Getting GPU External RoT (ERoT) Firmware Image Information.

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c GetGpuERoTInfo

Example:

Multiple Systems OOB:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c GetGpuERoTInfo

SList.txt:

192.168.34.56

192.168.34.57

The execution progress for the managed system will be continuously updated to the “Execution Message”
section of the managed system in the created log file.

6.21.2 Getting CPU ERoT Firmware Image Information

Use the “GetCpuERoTInfo” command to get the ERoT CPU firmware image information of NVIDIA MGX™
systems from the managed system. For details on the “GetCpuERoTInfo” command, please refer to 5.22.2
Getting CPU ERoT Firmware Image Information.

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c GetCpuERoTInfo

Example:

Supermicro Update Manager User’s Guide 695


Multiple Systems OOB:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c GetCpuERoTInfo

SList.txt:

192.168.34.56

192.168.34.57

The execution progress for the managed system will be continuously updated to the “Execution Message”
section of the managed system in the created log file.

6.21.3 Updating CPU ERoT Firmware Image

Use the “UpdateCpuERoT” command with the CPU ERoT firmware image CPU_ERoT.fwpkg to run SUM on
NVIDIA MGX™ systems to update the CPU ERoT of a managed system. For details on the “UpdateCpuERoT”
command, please refer to 5.22.3 Updating CPU ERoT Firmware Image

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c UpdateCpuERoT --file

<filename>

Example:

OOB:

[SUM_HOME]# ./sum -i 192.168.34.56 -u ADMIN -p PASSWORD -c UpdateCpuERoT --file

CPU_ERoT.fwpkg

In-Band Redfish Host Interface:

[SUM_HOME]# ./sum -I Redfish_HI -u ADMIN -p PASSWORD -c UpdateCpuERoT --file

CPU_ERoT.fwpkg

Multiple Systems OOB:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c UpdateCpuERoT --file

CPU_ERoT.fwpkg

Supermicro Update Manager User’s Guide 696


SList.txt:

192.168.34.56

192.168.34.57

The execution progress for the managed system will be continuously updated to the “Execution Message”
section of the managed system in the created log file.

6.21.4 Managing CPU External RoT Functions

The “CpuERotManage” command supports the following features on NVIDIA MGX™ Systems:

• Getting Information on CPU ERoT


Use the “CpuERotManage” command with the option “--action GetInfo” to retrieve information on
active ERoT CPU and Golden ERoT CPU.
• Updating the Golden Image
Use the “CpuERotManage” command with the “--action UpdateGolden” option to replace the golden
image with an active ERoT CPU firmware.
• Recovering ERoT CPU
Use the “CpuERotManage” command with the “--action Recover” option to recover ERoT CPU from
the backup image or the golden image. By priority, the managed system recovers ERoT CPU from the
backup image. If the backup image is corrupted, it will then recover from the golden image.

For details on the “CpuERotManage” command, please refer to 5.22.4 Managing CPU ERoT RoT Functions.

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c CpuERotManage --

action <action>

Example:

Multiple Systems OOB:


[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c CpuERotManage --action
UpdateGolden

Supermicro Update Manager User’s Guide 697


SList.txt:
192.168.34.56
192.168.34.57

6.21.5 Managing Motherboard FPGA RoT Functions

The “FpgaRotManage” command supports the following features on NVIDIA MGX™ Systems:

• Getting Information on Motherboard FPGA


Use the “FpgaRotManage” command with the option “--action GetInfo” to retrieve information on
active FPGA and Golden FPGA.
• Updating the Golden Image
Use the “FpgaRotManage” command with the “--action UpdateGolden” option to replace the golden
image with an active FPGA firmware.

For details on the “FpgaRotManage” command, please refer to 5.22.5 Managing Motherboard FPGA RoT
Functions.

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c FpgaRotManage --


action <action>

Example:

Multiple Systems OOB:


[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c FpgaRotManage --action
UpdateGolden

SList.txt:
192.168.34.56
192.168.34.57

Supermicro Update Manager User’s Guide 698


6.22 FPGA Management for Multiple Systems
6.22.1 Getting Motherboard FPGA Firmware Image Information

Use the “GetMotherboardFpgaInfo” command to get the motherboard FPGA firmware image information
of NVIDIA MGX™ systems from the managed system. For details on the “GetMotherboardFpgaInfo”
command, please refer to 5.21.1 Getting Motherboard FPGA Firmware Image Information.

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c

GetMotherboardFpgaInfo

Example:

Multiple Systems OOB:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c GetMotherboardFpgaInfo

SList.txt:

192.168.34.56

192.168.34.57

The execution progress for the managed system will be continuously updated to the “Execution Message”
section of the managed system in the created log file.

6.22.2 Updating Motherboard FPGA Firmware Image

Use the “UpdateMotherboardFpga” command with the motherboard FPGA firmware image FPGA.bin to
run SUM on NVIDIA MGX™ systems to update the motherboard FPGA of a managed system. For details on
the “UpdateMotherboardFpga” command, please refer to 5.21.2 Updating Motherboard FPGA Firmware
Image.

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c UpdateMotherboardFpga

--file <filename>

Supermicro Update Manager User’s Guide 699


Example:

Multiple Systems OOB:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c UpdateMotherboardFpga --

file FPGA.bin

SList.txt:

192.168.34.56

192.168.34.57

The execution progress for the managed system will be continuously updated to the “Execution Message”
section of the managed system in the created log file.

Supermicro Update Manager User’s Guide 700


6.23 MCU Management for Multiple Systems
6.23.1 Getting Motherboard MCU Firmware Image Information

Use the “GetMotherboardMcuInfo” command to get the motherboard MCU firmware image information
from the managed system. For details on the “GetMotherboardMcuInfo” command, please refer to 5.24.1
Getting Motherboard MCU Firmware Image Information.

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c GetMotherboardMcuInfo

Example:

Multiple Systems OOB:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c GetMotherboardMcuInfo

SList.txt:

192.168.34.56

192.168.34.57

The execution progress for the managed system will be continuously updated to the “Execution Message”
section of the managed system in the created log file.

6.23.2 Updating Motherboard MCU Firmware Image

Use the “UpdateMotherboardMcu” command with the motherboard MCU firmware image MBD_MCU.bin
to run SUM to update the motherboard MCU of a managed system. For details on the
“UpdateMotherboardMcu” command, please refer to 5.24.2 Updating Motherboard MCU Firmware Image.

Syntax:

sum -l <system list file> [-u <username> -p <password>] -c UpdateMotherboardMcu


--file <filename>

Example:

Supermicro Update Manager User’s Guide 701


Multiple Systems OOB:

[SUM_HOME]# ./sum -l SList.txt -u ADMIN -p PASSWORD -c UpdateMotherboardMcu --

file MBD_MCU.bin

SList.txt:

192.168.34.56

192.168.34.57

The execution progress for the managed system will be continuously updated to the “Execution Message”
section of the managed system in the created log file.

Supermicro Update Manager User’s Guide 702


Appendix A. SUM Exit Codes
Exit Code Number Description

0 Successful

Others Failed

GROUP1 (1~30) Command line parsing check failed

1 GetOpt unexpected option code

2 Unknown option

3 Missing argument

4 No host IP/user/password

5 Missing option

6 Unknown command

7 Option conflict

8 Can not open file

9 File already exists

10 Host is unknown

11 Invalid command line data

12 Function access denied

GROUP2 (31~59) Resource management error

31 File management error

32 Thread management error

33 TCP connection error

34 UDP connection error

35 Program interrupted and terminated

36 Required device does not exist

Supermicro Update Manager User’s Guide 703


37 Required device does not work

38 Function is not supported

39 FTP server reports error

40 Http connection error

GROUP3 (60~79) File parsing errors

61 Utility internal error

63 Invalid firmware flash ROM

GROUP4 (80~99) IPMI operation errors

80 Node Product key is not activated

81 Internal communication error

82 Board information mismatch

83 Does not support OOB

84 Does not support get file

85 File is not available for download

86 Required tool does not exist

87 IPMI standard error

GROUP5 (100~119) In-band operation errors

100 Cannot open driver

101 Driver input/output control failed

102 Driver report: ****execution of command failed****

103 BIOS does not support this in-band command

104 Driver report: ****file size out of range****

105 Cannot load driver

106 Driver is busy. Please try again later

Supermicro Update Manager User’s Guide 704


107 ROM chip is occupied. Please try again later

108 Kernel module verification error

109 This operation is prohibited

GROUP6 (120~199) IPMI communication errors

120 Invalid Redfish response

144 IPMI undefined error

145 IPMI connect failed

146 IPMI login failed

147 IPMI execution parameter validation failed

148 IPMI execution exception occurred

149 IPMI execution failed

150 IPMI execution exception on slave CMM or unavailable

151 IPMI execution exception on module not present

152 IPMI execution only for CMM connected

153 IPMI execution on non-supported device

154 IPMI execution only for BMC connected

155 IPMI delivered invalid data

180 IPMI command not found

181 IPMI command IP format error

182 IPMI command parameter length invalid

GROUP7 (200~) Special Group

200 System call failed

201 Invalid API response

247 Remote SSH execution failed

Supermicro Update Manager User’s Guide 705


248 Minimum SUM version is required

249 Special action is required

250 Managed firmware error

251 Rooted exception

252 Nested exception

253 Known limitation

254 Manual steps are required

Note:

• When using the in-band commands with the --reboot option through SSH connection
to the managed OS, SSH connection would be closed by the managed OS when the
system starts to reboot.

Supermicro Update Manager User’s Guide 706


Appendix B. Management Interface and
License Requirements
Management Interface Supported Node Product Key
Required on the Managed
[Group] Command
System (SFT-OOB-LIC, or
Out-Of-Band In-Band SFT-DCMS-SINGLE)
(Remote) (Local)

[System Checks]
CheckOOBSupport Yes Yes Not Required
CheckAssetInfo Yes No Required
CheckSystemUtilization Yes No Required
CheckSensorData Yes No Not Required
Both SFT-DCMS-SINGLE
ServiceCalls Yes Yes and SFT-DCMS-SVC-KEY
are required.
SystemPFA Yes Yes Required
MemoryHealthCheck Yes Yes Required
CpuOnDemand Yes Yes SFT-DCMS-SINGLE only
ChassisIntrusion Yes Yes Not required
GetFruInfo Yes Yes Required for --dump option
RestoreFruInfo Yes Yes Required
ChangeFruInfo Yes Yes Required
[Key Management]
ActivateProductKey Yes Yes Not Required
QueryProductKey Yes Yes Not Required
[BIOS Management]
Required for remote usage
on H12 non-RoT systems
UpdateBios (without --preserve_setting) Yes Yes
and platforms before
H12/X12
Required for platforms before
UpdateBios (with --preserve_setting) Yes Yes X12 Intel® Xeon® E-2300
Series
GetBiosInfo Yes Yes Not Required
GetDefaultBiosCfg Yes Yes Required
GetCurrentBiosCfg Yes Yes Required
Required
ChangeBiosCfg Yes Yes SFT-DCMS-SINGLE for
some configuration items
LoadDefaultBiosCfg Yes Yes Required
GetDmiInfo Yes Yes Required
EditDmiInfo Yes Yes Required

Supermicro Update Manager User’s Guide 707


Management Interface Supported Node Product Key
Required on the Managed
[Group] Command
System (SFT-OOB-LIC, or
Out-Of-Band In-Band SFT-DCMS-SINGLE)
(Remote) (Local)
ChangeDmiInfo Yes Yes Required
SetBiosAction Yes Yes Required
SetBiosPassword Yes Yes Required
EraseOAKey No Yes Not Required
SFT-DCMS-SINGLE is
BiosRotManage Yes Yes required for Recover and
DownloadEvidence actions
SecureBootManage Yes Yes SFT-DCMS-SINGLE only
GetFixedBootCfg Yes Yes SFT-DCMS-SINGLE only
ChangeFixedBootCfg Yes Yes SFT-DCMS-SINGLE only

Management Interface Supported Node Product Key


Required on the Managed
[Group] Command
System (SFT-OOB-LIC, or
Out-Of-Band In-Band SFT-DCMS-SINGLE)
(Remote) (Local)
No
UpdateScp Yes Not Required
(Yes for ARM64)
No
GetScpInfo Yes Not Required
(Yes for ARM64)
[BMC Management]
UpdateBmc Yes Yes Not Required
GetBmcInfo Yes Yes Not Required
GetBmcCfg Yes Yes Required
ChangeBmcCfg Yes Yes Required
LoadDefaultBmcCfg Yes Yes Not Required
SetBmcPassword Yes Yes Not Required
GetLockdownMode Yes Yes SFT-DCMS-SINGLE only
SetLockdownMode Yes No SFT-DCMS-SINGLE only
GetKcsPriv Yes Yes Required
SetKcsPriv Yes No Required
SFT-DCMS-SINGLE is
BmcRotManage Yes Yes required for Recover and
DownloadEvidence actions.

TimedBmcReset Yes Yes Not Required

Both SFT-DCMS-SINGLE
and SFT-SDDC-SINGLE are
Attestation Yes Yes
required for action
Compare.

GetBmcUserList Yes Yes Required

Supermicro Update Manager User’s Guide 708


Management Interface Supported Node Product Key
Required on the Managed
[Group] Command
System (SFT-OOB-LIC, or
Out-Of-Band In-Band SFT-DCMS-SINGLE)
(Remote) (Local)

SetBmcUserList Yes Yes Required

RmcpManage Yes Yes Required

BootStrappingAccount No Yes Not Required

[System Event Log]


GetEventLog Yes Yes Required
ClearEventLog Yes Yes Required
GetMaintenEventLog Yes Yes Not Required
GetHostDump Yes Yes SFT-DCMS-SINGLE only
ClearMaintenEventLog Yes Yes Not Required
[CMM Management]
UpdateCmm Yes No Not Required
GetCmmInfo Yes Yes Not Required
GetCmmCfg Yes No Not Required
ChangeCmmCfg Yes No Not Required
LoadDefaultCmmCfg Yes No Not Required
SetCmmPassword Yes No Not Required
GetBbpInfo Yes No Not Required
UpdateBbp Yes No Not Required
GetBladePowerStatus Yes No Not Required
SetBladePowerAction Yes No Not Required
ProfileManage Yes No Not Required
GetSwitchInfo Yes No Not Required
UpdateSwitch Yes No Not Required
RebootSwitch Yes No Not Required

Supermicro Update Manager User’s Guide 709


Management Interface Supported Node Product Key
Required on the Managed
[Group] Command
System (SFT-OOB-LIC, or
Out-Of-Band In-Band SFT-DCMS-SINGLE)
(Remote) (Local)
[Storage Management]
GetRaidControllerInfo Yes Yes SFT-DCMS-SINGLE only
UpdateRaidController Yes Yes SFT-DCMS-SINGLE only
GetRaidCfg Yes Yes SFT-DCMS-SINGLE only
ChangeRaidCfg Yes Yes SFT-DCMS-SINGLE only
GetSataInfo Yes No Required
GetNvmeInfo Yes Yes Required
SecureEraseDisk Yes Yes SFT-DCMS-SINGLE only
SecureEraseRaidHdd Yes Yes SFT-DCMS-SINGLE only
GetPMemInfo Yes Yes SFT-DCMS-SINGLE only
UpdatePMem Yes Yes SFT-DCMS-SINGLE only
GetVROCCfg Yes Yes Required
ChangeVROCCfg Yes Yes Required
[NIC Management]
GetAocNICInfo Yes Yes SFT-DCMS-SINGLE only
UpdatetAocNIC Yes Yes SFT-DCMS-SINGLE only
[Applications]
GetUsbAccessMode No Yes SFT-DCMS-SINGLE only
SetUsbAccessMode No Yes SFT-DCMS-SINGLE only
RawCommand Yes Yes Not Required
LocateServerUid Yes Yes Not Required
Required
SetHttpBoot Yes Yes SFT-DCMS-SINGLE for TLS
upload configuration
GetSystemCfg Yes Yes Required
ChangeSystemCfg Yes Yes Required
RedfishApi Yes Yes Not Required
Yes
RemoteExec No Not Required
(Remote Only)
[PSU Management]
GetPsuInfo Yes Yes Required
UpdatePsu Yes Yes SFT-DCMS-SINGLE only
GetPowerStatus Yes Yes Not Required
SetPowerAction Yes Yes Not Required

Supermicro Update Manager User’s Guide 710


Management Interface Supported Node Product Key
Required on the Managed
[Group] Command
System (SFT-OOB-LIC, or
Out-Of-Band In-Band SFT-DCMS-SINGLE)
(Remote) (Local)
[TPM Management]
TpmProvision Yes No Required
GetTpmInfo (Supermicro OTA) Yes Yes Required
GetTpmInfo (Intel OTA) Yes Yes Required
TpmManage (Supermicro OTA) Yes Yes Required
TpmManage (Intel OTA) Yes Yes Required
[GPU Management]
GetGpuInfo Yes Yes SFT-DCMS-SINGLE only
UpdateGpu Yes Yes SFT-DCMS-SINGLE only
DiagGpuStatus Yes Yes Required
GetGpuLog Yes Yes SFT-DCMS-SINGLE only
[CPLD Management]
GetCpldInfo Yes Yes Not Required
UpdateCpld Yes Yes Not Required
CpldRotManage Yes Yes Not Required
GetSwitchboardCpldInfo Yes Yes Not Required
UpdateSwitchboardCpld Yes Yes Not Required
GetFanboardCpldInfo Yes Yes Not Required
UpdateFanboardCpld Yes Yes Not Required
GetAomboardCpldInfo Yes Yes SFT-DCMS-SINGLE only
UpdateAomboardCpld Yes Yes SFT-DCMS-SINGLE only
GetMiscCpldInfo Yes Yes Not Required
UpdateMiscCpld Yes Yes Not Required
[AIP Management]
GetAipCpldInfo Yes No Not Required
UpdateAipCpld Yes No Not Required
[TwinPro Management]
GetTpCfg Yes Yes Required
ChangeTpCfg Yes Yes Required
[CDU Management]
MonitorCDUStatus Yes No Not Required
[Backplane Management]
GetMultinodeEcInfo Yes Yes Not Required
UpdateMultinodeEc Yes Yes Not Required
GetBackplaneCpldInfo Yes Yes Not Required
UpdateBackplaneCpld Yes No Not Required
[PCIeSwitch Management]
GetPCIeSwitchInfo No Yes Not Required
UpdatePCIeSwitch No Yes Not Required

Supermicro Update Manager User’s Guide 711


Management Interface Supported Node Product Key
Required on the Managed
[Group] Command
System (SFT-OOB-LIC, or
Out-Of-Band In-Band SFT-DCMS-SINGLE)
(Remote) (Local)
[VM Management]
MountIsoImage Yes Yes Required
UnmountIsoImage Yes Yes Required
MountFloppyImage Yes Yes Required
UnmountFloppyImage Yes Yes Required
GetVmInfo Yes Yes Required
VmManage Yes Yes Required
[Security Management]
GetGpuERoTInfo Yes Yes SFT-DCMS-SINGLE only
GetCpuERoTInfo Yes Yes SFT-DCMS-SINGLE only
UpdateCpuERoT Yes Yes SFT-DCMS-SINGLE only
CpuERoTManage Yes Yes SFT-DCMS-SINGLE only
FpgaRotManage Yes Yes Not Required
[FPGA Management]
GetMotherboardFpgaInfo Yes Yes Not Required
UpdateMotherboardFpga Yes Yes Not Required
[MCU Management]
GetMotherboardMcuInfo Yes Yes Not Required
UpdateMotherboardMcu Yes Yes Not Required

Supermicro Update Manager User’s Guide 712


Appendix C. Known Limitations

General Limitations
• For the --reboot option in OOB usage, if the target OS does not support software shutdown, system
will be forced to power off and on again.
• The --post_complete option is designed for the system to wait for the managed system POST to
complete and requires both BMC and BIOS. However, when the managed system lacks support
from BIOS, no futher actions from SUM will be carried out even after the managed system POST is
complete.
• There is a known limitation for --post_complete option on X11/H11 and before systems. SUM may
keep waiting for POST complete until timeout even the system has POST completed. Besides,
unexpected exception may be thrown during POST.
• All in-band commands through KCS on Windows require SD5 to be removed.

BIOS Management
• The OOB UpdateBios command is not supported on motherboards that implement client ME such
as X13SAx series, X12SAE, X12SCA-(5)F, X11SAE-F, X11SAT-F, X11SSZ-(Q)F/LN4F, X11SRM-VF,
X11SBA-(LN4)F, X11SPA and X11SRi-IF. In addition, it is not supported on C7-series platforms.
• With the Server ME embedded on the Supermicro system, the execution of the in-band command
“UpdateBios” might fail when the Client ME driver (MEIx64) is installed on Windows.
• The ChangeBiosCfg command will show error messages if the current BIOS configuration is different
from the generated BIOS XML configuration file.
• BIOS XML configuration requires a text editor supporting extended ASCII characters (ISO-8859-1
encoding).
• The SW-managed JPME2 feature to update FDT in ME region is NOT supported on the following
MBs: X11DDW-L/N(T) Revision 1.10, X11DPH-T-P Revision 1.00, X11DPL-I-P Revision 1.01, X11DPU-
X(LL) Revision 1.01. Note that the earlier revisions of those four MBs are not supported either.
• A1SRi/A1SAi MB does not support OOB BIOS update.
• Prevent BIOS downgrade if the ME version of current BIOS is greater than 4.0.4.294 and the ME
version of updating BIOS is smaller than or equal to 4.0.4.294.
• Cascade Lake CPU only supports BIOS update of ME version 4.1 or higher version.
• TUI does not support mouse operation.
• OOB BIOS update on B1SA4, B11SRE and B11SCG-ZTF requires AC cycle.
• In-band BIOS update through KCS is not supported on an AMI platform.
• The format mm/dd/yy or mm/dd/yyyy is required for build date in DMI information.
• System will be powered off during BIOS update process on X12/H12 and later RoT platforms.
• The erase OA key function is not supported on the platforms before X12/H12.
• Neither updating BIOS In-band from version 1.x to 2.x, nor downgrading BIOS from version 2.x to
1.x on H12 non-RoT platforms through SMI is supported.
• BIOS updated PMem related configuration, command UpdatePMem with option --
restore_default_fw cannot be supported for BIOS after 2022/08/04.

Supermicro Update Manager User’s Guide 713


BIOS Management
• BIOS updated PMem related configuration, commands GetCurrentBiosCfg, GetDefaultBiosCfg and
ChangBiosCfg cannot support PMem related configuration for BIOS after 2022/08/04.

BMC Management
• The UpdateBmc in-band command does not support the AMI BMC firmware image.
• The GetBmcCfg and ChangeBmcCfg in-band commands in Windows do not support a hostname that
exceeds 244 bytes.
• The UpdateBmc in-band command on FreeBSD OS will be slow caused by KCS driver of FreeBSD.
• The LAN table in a BMC configuration file is read-only for OOB usage if BMC does not support
Redfish.
• For in-band and OOB usages, the file formats for getting BMC settings may be different. Be careful
of not misusing them.

CMM Management (OOB Only)


• All CMM management commands are for OOB use only.

Applications
• When dynamically enabling a USB port with the SetUsbAccessMode command, USB 3.0 devices
may need to be manually unplugged and plugged back in to be available.

PSU Management
• The UpdatePsu command only supports PSU “PWS-2K04A-1R” and “PWS-2K20A-1R.”
• The UpdatePsu command does not support multiple OOB usages.

TPM Management
• The TpmProvision command does not support TPM 2.0 on Grantley.
• The TpmProvision command does not support on the platforms after Purley.
• While executing the UpdateBIOS/In-Band TpmManage commands, manual steps are required
under some special cases. Instructions will be provided to continue these commands.

GPU Management
• The GetGpuInfo command only supports NVIDIA GPU.

Key Management
• When activating JSON format key in Windows, the JSON key string cannot contain any spaces.

System Check
• You cannot access any cache files on mounted file systems with the ServiceCalls command.

PCIe Switch Management


• All PCIe Switch management commands are for In-Band use only.
• All PCIe Switch management commands only support H12DGQ-NT6 with Broadcom PCIe Switch
Gen4 Series chipsets and X12DSC-6 with Microchip PCIe Switch Gen4 Series chipsets platforms.

Supermicro Update Manager User’s Guide 714


VM Management
• The function of mounting ISO through IPv6 is not available on H12 AST2500 non-RoT platforms and
versions before X12/H12.
• If the device is mounted by iKVM, the device can only be unmounted by iKVM.

Appendix D. Third-Party Software


The following open-source libraries are used in SUM package:

Program Library Version License

sum simpleopt 3.5 MIT

sum pugixml 1.2 MIT

sum Libcurl 8.3.0 MIT

sum openssl 1.1.1w OpenSSL

sum CryptoPP 5.6.2 Boost 1.0

sum EDK2 EDK2 BSD


Compress/Decompress

sum Jsoncpp 1.8.4 MIT

phymem.sys/pmdll.dll phymem 2.7.0.3 CPOL

sum ncurses 6.1 MIT

sum PDCurses 3.6 MIT

ExternalData/tui.fnt Terminus Font N/A OFL 1.1

sum rapidcsv 8.6 MIT

sum UEFITool NE alpha 58/0.21.5 BSD 2-Clause

sum Sqlite 3.42.0 public domain

sum Sqlite_orm V1.6 BSD 3-Clause

sum CxxUrl V0.1 MIT

Supermicro Update Manager User’s Guide 715


Program Library Version License

sum Libssh2 1.11.0 BSD 3-Clause

sum Acpica 20191018 BSD

Supermicro Update Manager User’s Guide 716


Appendix E. How to Change BIOS
Configurations in XML Files
Five major setting types are provided as files in XML format: Numeric, CheckBox, Option, Password and
String. The “Information” included in every setting is read-only. Executing the ChangeBiosCfg command
does not affect the “information” enclosure. “Help” and “WorkIf” are two common fields in the
“Information” enclosure of all settings. “Help” describes the target setting and “WorkIf” specifies the
setting dependency. If the expression does not match the set conditions, a warning message will appear,
and the related setting will not be changed.

E.1 Numeric
In Information, it contains the maximum value “MaxValue”/minimum value “MinValue,” default value, and
the amount to increase or decrease the value when a user requests a value change (StepSize) each time.
“numericValue” is the value that you want to apply to BIOS setting. “Help” contains the explanation to the
setting.

1. Open the XML file in Notepad++ (Windows) or vim (Linux).


2. Find the setting “Correctable Error Threshold” in the XML file.

<Setting name="Correctable Error Threshold" numericValue="10" type="Numeric">

<Information>

<MaxValue>32767</MaxValue>
<MinValue>0</MinValue>

<StepSize>1</StepSize>

<DefaultValue>10</DefaultValue>

<Help><![CDATA[Correctable Error Threshold (1 - 32767) used for sparing,


tagging, and leaky bucket]]></Help>
</Information>

</Setting>

3. Change the “numericValue” value in “Correctable Error Threshold.” In this example, the value is
changed from 10 to 20.

Supermicro Update Manager User’s Guide 717


<Setting name="Correctable Error Threshold" numericValue="20"

type="Numeric">

4. Save the XML file and then execute the “ChangeBiosCfg” command.

E.2 CheckBox
In CheckBox, the allowed input value in “checkedStatus” would be marked as “Checked” or “Unchecked.”
“checkedStatus” is the value that you want to apply to BIOS setting. “Help” contains the explanation to the
setting.

1. Open the XML file in Notepad++ (Windows) or vim (Linux).


2. Find the setting “Serial Port 1” in the XML file.

<Setting name="Serial Port 1" checkedStatus="Checked" type="CheckBox">

<!--Checked/Unchecked-->

<Information>

<DefaultStatus>Checked</DefaultStatus>

<Help><![CDATA[Enable or Disable Serial Port (COM)]]></Help>

<WorkIf><![CDATA[]]></WorkIf>

</Information>
</Setting>

3. Change the “checkedStatus” value in “Serial Port 1.” In this example, the value is changed from
Checked to Unchecked.

<Setting name="Serial Port 1" checkedStatus="Unchecked" type="CheckBox">

4. Save the XML file and then execute the “ChangeBiosCfg” command.

Supermicro Update Manager User’s Guide 718


E.3 Option
In Option, you may choose one option in “AvailableOptions.” “selectedOption” is the value that you want
to apply to BIOS setting. “Help” contains the explanation to the setting. The following procedures
demonstrate how to change a setting with WorkIf dependency.

1. Open the XML file in Notepad++ (Windows) or vim (Linux).


2. Find the setting “When Log is Full” in the XML file.

<Setting name="When Log is Full" selectedOption="Do Nothing" type="Option">

<Information>

<AvailableOptions>

<Option value="0">Do Nothing</Option>

<Option value="1">Erase Immediately</Option>

</AvailableOptions>

<DefaultOption>Do Nothing</DefaultOption>

<Help><![CDATA[Choose options for reactions to a full SMBIOS Event


Log.]]></Help>

<WorkIf><![CDATA[ ( 0 != SMBIOS Event Log ) ]]></WorkIf>

</Information>

</Setting>

3. Change “selectedOption” from “Do Nothing” to “Erase Immediately.” Notice that there is “WorkIf”
dependency “(0 != SMBIOS Event Log)” indicating that this setting is valid and can be modified only
when the expression is evaluated true. That is, it is required to check the current value of setting
“SMBIOS Event Log” as shown below.

<Setting name="SMBIOS Event Log" selectedOption="Disabled" type="Option">

<Information>

<AvailableOptions>
<Option value="0">Disabled</Option>

<Option value="1">Enabled</Option>

Supermicro Update Manager User’s Guide 719


</AvailableOptions>

<DefaultOption>Enabled</DefaultOption>

<Help><![CDATA[Change this to enable or disable all features of SMBIOS Event


Logging during boot.]]></Help>

</Information>

</Setting>

4. In “SMBIOS Event Log”, the selectedOption is “Disabled” which corresponds to the value 0. In other
words, it makes the expression “(0 != SMBIOS Event Log)” false. In order to make it true, the
selectedOption should be modified to “Enabled” as shown below.

<Setting name="SMBIOS Event Log" selectedOption="Enabled" type="Option">

5. Save the XML file and then execute the command “ChangeBiosCfg.” After reboot, the “When Log is
Full” should be changed to “Erase Immediately.”

Supermicro Update Manager User’s Guide 720


E.4 Password
In Password, “NewPassword” and “ConfirmNewPassword” must be the same. The password length is
limited, as MinSize represents the minimum length and MaxSize represents the maximum length.
“HasPassword” indicates whether the password is set or not. “Help” contains the explanation to the setting.

1. Open the XML file in Notepad++ (Windows) or vim (Linux).


2. Find the setting “Administrator Password” in the XML file.
3. Change “NewPassword” and “ConfirmNewPassword” in “Administrator Password.”

<Setting name="Administrator Password" type="Password">ss

<Information>

<Help>Set Administrator Password</Help>

<MinSize>3</MinSize>

<MaxSize>20</MaxSize>

<HasPassword>False</HasPassword>

</Information>

<NewPassword><![CDATA[]]></NewPassword>

<ConfirmNewPassword><![CDATA[]]></ConfirmNewPassword>

</Setting>

4. Save the XML file and execute command “ChangeBiosCfg.”


5. After reboot, the password takes effect and “HasPassword” becomes “True.”

Supermicro Update Manager User’s Guide 721


E.5 String
In String, you can fill a string with the minimum (“MinSize”) length and maximum length (“MaxSize”). The
“AllowingMultipleLine” option indicates that you can input multiple lines in “StringValue.” The default
string value is “DefaultString.” “StringValue” is the value that you want to apply to BIOS setting. “Help”
contains the explanation to the setting.

1. Open the XML file in Notepad++ (Windows) or vim (Linux).


2. Find the setting “KMIP Server IP address” in the XML file.

<Setting name="KMIP Server IP address" type="String">

<Information>

<MinSize>0</MinSize>

<MaxSize>15</MaxSize>

<DefaultString></DefaultString>

<Help><![CDATA[Enter IPv4 address in dotted-decimal notation Example:


192.168.10.12]]></Help>

<AllowingMultipleLine>False</AllowingMultipleLine>

<LicenseRequirement>SFT-DCMS-SINGLE</LicenseRequirement>

</Information>

<StringValue><![CDATA[255.255.255.255]]></StringValue>

</Setting>

3. Change the “StringValue” in “KMIP Server IP address.”

<StringValue><![CDATA[127.0.0.1]]></StringValue>

4. Save the XML file and then execute the command “ChangeBiosCfg.”

Supermicro Update Manager User’s Guide 722


E.5.1 File Upload

SUM is allowed to upload files to BIOS, such as a TLS Certificate. In this case, there will be a comment <!--
file path to load file--> under <StringValue> to indicate that file path should be filled. When executing the
“ChangeBiosCfg”command, SUM will load the file from system and upload it to BIOS. The following
example is the setting of TLS upload:

6.23.2.1 E.5.1.1 TLS Certificate

”<Setting name=”Enroll HTTPS Boot TLS Certificate" type="String">

<Information>

<MinSize>0</MinSize>

<MaxSize>255</MaxSize>

<DefaultString></DefaultString>

<Help><![CDATA[Enroll HTTPS Boot TLS Certificate with


type .cer,.der,.crt,.pem]]></Help>

<AllowingMultipleLine>False</AllowingMultipleLine>

<LicenseRequirement>SFT-DCMS-SINGLE</LicenseRequirement>

</Information>

<StringValue><![CDATA[]]></StringValue>

<!--file path to load file-->

</Setting>

Supermicro Update Manager User’s Guide 723


E.6 License Requirement
From SUM 2.5.0, SUM supports license requirement annotation for HII BIOS configuration. When the
current BIOS supports license requirement annotation, the field “LicenseRequirement” is existed under the
BIOS setting as the following example. The BIOS setting will only take effect when the activated product
key level is greater than or equal to the license requirement.

Currently, the known BIOS feature categories requiring SFT-DCMS-SINGLE license are listed below:

• Lockdown Mode
• Security Erase related configuration
• KMIP related configuration
• PMem related configuration
• HTTP BOOT TLS certificate related configuration

Example:

<Setting name="Lockdown Mode" selectedOption="Disabled" type="Option">

<Information>

<AvailableOptions>

<Option value="0">Disabled</Option>

<Option value="1">Enabled</Option>

</AvailableOptions>

<DefaultOption>Disabled</DefaultOption>

<Help><![CDATA[Switch Lockdown Mode]]></Help>

<LicenseRequirement>SFT-DCMS-SINGLE</LicenseRequirement>

</Information>

</Setting>
Supermicro Update Manager User’s Guide 724
The supported versions and limitations are summarized in the table.

SUM 2.6.0 and later SUM 2.5.x SUM 2.4.0 and before
Take effect May not take effect
Managed System With Not take effect
without a warning
SFT-DCMS-SINGLE No warning message
message
Not take effect Not take effect
Managed System Without Output SFT-DCMS-SINGLE May not output SFT- Not take effect
SFT-DCMS-SINGLE license required message DCMS-SINGLE license No warning message
required message

For SUM 2.4.0 and before, none of license SFT-DCMS-SINGLE required BIOS settings can be changed
through SUM. Due to known limitation in SUM 2.5.x, even license SFT-DCMS-SINGLE is activated, SFT-
DCMS-SINGLE required BIOS settings may not be able to change through SUM. To fully support, please use
SUM 2.6.0 (or later) and pair with the feature supported BIOS. You must ensure that the activated product
key level is greater than or equal to the license requirement to change license required BIOS settings. You
can query the existed product key by QueryProductKey command, see 5.1.2 Querying the Node Product
Keys. If the activated product key level is less than the license requirement, you can activate another
product key by ActivateProductKey command, see 5.1.1 Activating a Single Managed System.

Supermicro Update Manager User’s Guide 725


Appendix F. Using the Command Line Tool
(XMLStarlet) to Edit XML Files
F.1 Introduction
XMLStarlet is a set of command line utilities which can be used to transform, query, validate, and edit XML
files. Two examples are in the following sections.

F.2 Getting/Setting an XML Value (XML Element)

• To get a value (SUPERMICRO) from an element from


an xpath(/BmcCfg/StdCfg/FRU/Configuration/BoardMfgName) and a filename(BMCCfg.xml),
run the command
[shell]# xmlstarlet select --template -v "/BmcCfg/StdCfg/FRU/Configuration/BoardMfgName"
BMCCfg.xml
• To set a value (SUPERMICRO) to an element
in xpath(/BmcCfg/StdCfg/FRU/Configuration/BoardMfgName) and filename(BMCCfg.xml),
run the command
[shell]# xmlstarlet edit --inplace --update "/BmcCfg/StdCfg/FRU/Configuration/BoardMfgName" --
value SUPERMICRO BMCCfg.xml

Supermicro Update Manager User’s Guide 726


F.3 Getting/Setting an XML Value (XML Attribute)

• To get the value (None) from an attribute


in xpath(/BmcCfg/StdCfg/FRU/@Action) and filename(BMCCfg.xml),
run the command
[shell]# xmlstarlet sel -t -v /BmcCfg/StdCfg/FRU/@Action BMCCfg.xml
• To set the value (None) to an attribute
in xpath(/BmcCfg/StdCfg/FRU/@Action) and filename(BMCCfg.xml),
run the command
[shell]# xmlstarlet ed -L -P -u /BmcCfg/StdCfg/FRU/@Action -v None BMCCfg.xml

Supermicro Update Manager User’s Guide 727


Appendix G. Removing Unchanged BIOS
Settings in an XML File
Not all BIOS settings are intended to be changed in each update. In SUM, the unchanged settings can be
removed from a configuration file. Metadata tags such as <Subtitle>, <Text> and <Information> are not
parsed in the “ChangeBiosCfg” command and can be removed as well. In the example below, the XML tags
are kept to a minimum:

<?xml version="1.0" encoding="ISO-8859-1" standalone="yes"?>

<BiosCfg>

<Menu name="Advanced">

<Menu name="Boot Feature">

<Setting name="Quiet Boot" checkedStatus="Checked" type="CheckBox">

</Setting>

<Setting name="Option ROM Messages" selectedOption="Force BIOS"


type="Option">

</Setting>

</Menu>

</Menu>

<Menu name="Event Logs">


<Menu name="Change SMBIOS Event Log Settings">

<Setting name="MECI" numericValue="1" type="Numeric">

</Setting>
</Menu>

</Menu>

<Menu name="Boot">

<Setting name=" Add boot option" type="String">

<StringValue><![CDATA[]]></StringValue>

</Setting>
</Menu>

<Menu name="Security">

<Setting name="Administrator Password" type="Password">

Supermicro Update Manager User’s Guide 728


<CurrentPassword><![CDATA[]]></CurrentPassword>

<NewPassword><![CDATA[]]></NewPassword>

<ConfirmNewPassword><![CDATA[]]></ConfirmNewPassword>

</Setting>

</Menu>

</BiosCfg>

The first line is an XML declaration header. SUM specifies the encoding method as ISO-8859-1. If the text
editor fails to deploy the encoding method ISO-8859-1, extended ASCII characters in a configuration file
may be lost after the file is saved.

<BiosCfg> in the second line is the BIOS configuration root. In other words, SUM only attempts to parse
child tags enclosed in <BiosCfg>. Within <BiosCfg>, the direct child tag must be <Menu>.

The <Menu> hierarchy represents the menu path in the BIOS configuration. Every setting has a menu path
and the <Menu> hierarchy structure should always match. For example, the menu path for the setting
“Quiet Boot” is “Advanced”->“Boot Feature”. If “Advanced” is removed, SUM will try to find the match for
“Quiet Boot” in the menu path “Boot Feature.” Since the menu item “Boot Feature” is not in the first level
of menu hierarchy in BIOS configuration in the managed system, an exception will be thrown.

In addition, for <Menu>, the attributes “name” and “order” (if applicable) should not be changed or
removed. If any changes are made, a setting in the menu path will fail to match and SUM will export error
messages. Similarly, for <Setting>, the attributes “name,” “order” (if applicable) and “type” should not be
changed or removed. SUM will fail to identify a setting if those are changed.

In contrast, for the settings Option, CheckBox and Numeric, you can change the current values in the
attributes “selectedOption,” “checkStatus” and “numericValue,” respectively. For the String setting, you
can change the current contents in the child tag <StringValue>. For the Password setting, you can change
the current password in the child tags <CurrentPassword> (if applicable), <NewPassword> and
<ConfirmNewPassword>.

Supermicro Update Manager User’s Guide 729


Appendix H. How to Sign a Driver in Linux
In this example, Red Hat Enterprise Linux 7 is used as the OS to illustrate the steps to sign a driver in Linux.

1. Install the following dependency utilities.

Syntax:
[shell]# sudo yum install <utility_name>

<utility_name> are listed below:


• openSSL
• kernel-devel
• mokutil
• keyutils
• perl (For Kernel version prior to 4.3.3)
2. Check if the option Secure Boot is enabled.

Syntax:
[shell]# sudo mokutil --sb-state

Example:

3. Check the OS keyring. The SUM output in the example below is from a Linux system where UEFI
Secure Boot is enabled.

Syntax:
[shell]# sudo keyctl list %:.system_keyring

Example:

Supermicro Update Manager User’s Guide 730


4. Configure the key information and follow the example below to create your own configuration file.

Example:
[ req ]

default_bits = 4096

distinguished_name = req_distinguished_name

prompt = no

string_mask = utf8only

x509_extensions = myexts

[ req_distinguished_name ]

O = <Your key name>

emailAddress = <Your Email>

[ myexts ]

basicConstraints=critical,CA:FALSE

keyUsage=digitalSignature

subjectKeyIdentifier=hash

authorityKeyIdentifier=keyid

Note: To create a key pair, a configuration file is needed. You can copy and paste the
example above to create and name a configuration file as "configuration_file.config." Then
modify the following variables in the configuration file.
• <Your key name>: the key name
• <Your e-mail>: the e-mail address

5. Generate a public and private X.509 key pair.

Syntax:
[shell]# sudo openssl req -x509 -new -nodes -utf8 -sha256 -days <days> -batch \

-config configuration_file.config -outform DER -out <public_key.der> -keyout \

<private_key.priv>

Supermicro Update Manager User’s Guide 731


Notes:

• <days>: Valid certification days, e.g., 36500.


• <public_key.der>: The generated public key file, e.g., public_driver_key.der
• <private_key.priv>: The generated private key file, e.g., private_driver_key.priv

Example:

6. Add your public key to the MOK list by using Linux mokutil.

Syntax:
[shell]# sudo mokutil --import public_key.der

Notes:

• You will be asked to enter and confirm a password for this MOK enrollment request.
• public_key.der: the generated public key file.

Example:

7. Reboot the system and enroll the key.

Note: The MOK management main screen will appear immediately after reboot and last for
10 seconds. Please press any key as soon as you are under MOK management. If you miss
this step, you will need to repeat step 6.

Supermicro Update Manager User’s Guide 732


8. Press any key to continue.

9. Select Enroll MOK.

10. Select Continue to enroll the key.

Note: You can view your enrolled key by selecting View key 0.

11. Select Yes.


12. Input the password you set.
13. Select Reboot to reboot.
14. You will finish the setup upon entering Linux OS. Next, proceed with the steps in 2.3.2 Signing a Driver
in Linux to sign your key.

Supermicro Update Manager User’s Guide 733


Appendix I. BMC/CMM Password Rule

I.1 X11/H11 and earlier platforms including H12


non-RoT systems
Since SUM 2.4.0, new password rules have been applied to X11/H11 and earlier platforms, including H12
non-RoT systems. You must use the following rules to create a BMC password.

• The password cannot be the reverse of the username.


• The password length is limited to 8 to 19 characters.
• The password must include characters from at least three of the following categories:
o Alpha a-z
o Alpha A-Z
o Numeric 0-9
o Special characters

The following table lists all supported special characters.

<space> ` ! @ # $ % ^

& * ( ) - _ = +

[ { ] } \ | ; :

‘ “ , < . > / ?

Supermicro Update Manager User’s Guide 734


I.2 X12/H12 and later platforms except H12 non-
RoT systems
Since SUM 2.6.0, new password rules have been applied to X12/H12 and later platforms except H12 non-
RoT systems. You must use the following rules to create a BMC password.

• The password cannot be reverse of or the same as user name.


• The password length is limited to 8 to 19 characters.
• The password must include characters from at least three of the following categories:
o Alpha a-z
o Alpha A-Z
o Numeric 0-9
o Special characters
The following table lists all supported special characters.

~ ` ! @ # $ % ^

& * ( ) - _ = +

[ { ] } \ | ; ,

< . > / ?

Supermicro Update Manager User’s Guide 735


I.3 CMM
Since SUM 2.4.0, new password rules have been applied to CMM. You must follow these rules to create a
CMM password.

• The password length is limited to 8 to 19 characters.


• All special characters are supported except for <space>.

The table lists all supported special characters.

! $ % & ( ) * +

. / < = > ? @ [

\ ] ^ _ ` { | }

~ - : , ; #

Supermicro Update Manager User’s Guide 736


Appendix J. System Lockdown Mode Table
Authority for System Lockdown Mode
[Group] Command
Read only

[System Checks]
CheckOOBSupport Yes
CheckAssetInfo Yes
CheckSystemUtilization Yes
CheckSensorData Yes
ServiceCalls No
SystemPFA No
MemoryHealthCheck No
CpuOnDemand No
GetFruInfo Yes
RestoreFruInfo No
ChangeFruInfo No
[Key Management]
ActivateProductKey No
QueryProductKey Yes
[BIOS Management]
UpdateBios (without --
No
preserve_setting)
UpdateBios (with --
No
preserve_setting)
GetBiosInfo Yes
GetDefaultBiosCfg Yes
GetCurrentBiosCfg Yes
ChangeBiosCfg No
LoadDefaultBiosCfg No
GetDmiInfo Yes
EditDmiInfo Yes
ChangeDmiInfo No
SetBiosAction No
SetBiosPassword No
EraseOAKey No
BiosRotManage No
TimedBmcReset No
[BMC Management]
UpdateBmc No
GetBmcInfo Yes

Supermicro Update Manager User’s Guide 737


Authority for System Lockdown Mode
[Group] Command
Read only

GetBmcCfg Yes
ChangeBmcCfg No
SetBmcPassword No
GetKcsPriv Yes
SetKcsPriv No
GetLockdownMode Yes
SetLockdownMode Yes
LoadDefaultBmcCfg No
BmcRotManage Yes
Attestation No
GetBmcUserList Yes
SetBmcUserList No
RmcpManage Yes
[System Event Log]
GetEventLog Yes
ClearEventLog No
GetMaintenEventLog Yes
ClearMaintenEventLog No
GetHostDump No
[CMM Management]
UpdateCmm No
GetCmmInfo Yes
GetCmmCfg Yes
ChangeCmmCfg No
SetCmmPassword No
LoadDefaultCmmCfg No
GetBbpInfo Yes
UpdateBbp No
GetBladePowerStatus Yes
SetBladePowerAction No
[Storage Management]
GetRaidControllerInfo Yes
UpdateRaidController No
GetRaidCfg Yes
ChangeRaidCfg No
GetSataInfo Yes
GetNvmeInfo Yes
SecureEraseRaidHdd No

Supermicro Update Manager User’s Guide 738


Authority for System Lockdown Mode
[Group] Command
Read only

SecureEraseDisk No
GetPMemInfo Yes
UpdatePMem No
GetVROCCfg Yes
ChangeVROCCfg Yes
[NIC Management]
GetAocNICInfo Yes
UpdateAocNIC No
[Applications]
MountIsoImage No
UnmountIsoImage No
MountFloppyImage No
UnmountFloppyImage No
RawCommand Yes
GetUsbAccessMode Yes
SetUsbAccessMode No
LocateServerUid Yes
SetHttpBoot No
RedfishApi Yes
RemoteExec No
[PSU Management]
GetPsuInfo Yes
UpdatePsu No
GetPowerStatus Yes
SetPowerAction Yes
[TPM Management]
TpmProvision No
GetTpmInfo (Supermicro OTA) Yes
GetTpmInfo (Intel OTA) Yes
TpmManage (Supermicro OTA) No
TpmManage (Intel OTA) No
[GPU Management]
GetGpuInfo Yes
UpdateGpu No
DiagGpuStatus Yes
GetGpuLog No
[CPLD Management]
GetCpldInfo Yes
UpdateCpld No

Supermicro Update Manager User’s Guide 739


Authority for System Lockdown Mode
[Group] Command
Read only

CpldRotManage Yes
GetSwitchboardCpldInfo Yes
UpdateSwitchboardCpld No
GetFanboardCpldInfo Yes
UpdateFanboardCpld No
GetAomboardCpldInfo Yes
UpdateAomboardCpld No
GetMiscCpldInfo Yes
UpdateMiscCpld No
[AIP Management]
GetAipCpldInfo No
UpdateAipCpld No
[TwinPro Management]
GetTpCfg Yes
ChangeTpCfg No
[CDU Management]
MonitorCDUStatus No
[Backplane Management]
GetMultinodeEcInfo Yes
UpdateMultinodeEc No
GetBackplaneCpldInfo Yes
UpdateBackplaneCpld No
[Security Management]
GetGpuERoTInfo Yes
GetCpuERoTInfo Yes
UpdateCPUERoT No
CPUERoTManage Yes
FpgaRotManage Yes
[FPGA Management]
GetMotherboardFpgaInfo Yes
UpdateMotherboardFpga No
[MCU Management]
GetMotherboardMcuInfo Yes
UpdateMotherboardMcu No

Supermicro Update Manager User’s Guide 740


Appendix K. Using SUM to Run 3rd -Party
Tools
To run SUM with a third-party tool on remote systems, execute the RemoteExec command to connect to
remote systems. For details on the RemoteExec command, see 5.7.15 Remote Execution.

K.1 LAN NVM update


Here we use LAN NVM Update Package as the example to guide you through running a third-party tool
with SUM.

./sum -I Remote_INB --oi <OS_IP> --ou <OS_User> --op <OS_Password> -c


RemoteExec --file "STGF2S3B3_NUP.zip" --remote_Cmd "cd /tmp/ && unzip -o
STGF2S3B3_NUP.zip && cd STGF2S3B3_NUP && chmod +x LLDP_EN.sh && chmod +x
nvmupdate64e && ./LLDP_EN.sh"

1. The file STGF2S3B3_NUP.zip on the managing system is copied to the /tmp/STGF2S3B3_NUP.zip path
on the remote system.
2. The working directory is changed to /tmp/ to access the files under /tmp/ in a relative path.
3. The “unzip -o STGF2S3B3_NUP.zip” file uncompresses and overwrites the existing files.
4. The working directory is changed to STGF2S3B3_NUP.
5. Both “chmod +x LLDP_EN.sh” and “chmod +x nvmupdate64e” files make the files executable.
6. LLDP_EN(.sh) is an update script from the vendor, nvmupdate64e is the binary to update the firmware,
and nvmupdate.cfg is the configuration file required for nvmupdate64e. The “./LLDP_EN.sh” file will
call nvmupdate64e with nvmupdate.cfg (relative path in STGF2S3B3_NUP) to update the NIC firmware.

Supermicro Update Manager User’s Guide 741


K.2 NVIDIA HGX A100 GPU firmware update
package
The main updating GPU firmware package consists of two particular packages. One is script package named
as A100_v1.0 and the other is vendor package named as HGX_A100_8-GPU_80G_AC_Firmware_22.05.03.

Both packages are designated for NVIDIA HGX A100 systems with 40 or 80GB memory size GPU firmware
updating.

The script package contains scripts and config.txt. SUM would use “startup_INB.sh” and “function.sh” for
INB update usage. Also, “startup.sh” would call other NVIDIA tools and firmware version with variables
defined in “config_INB.txt”.

Here is the directory tree and list of files in the A100_v1.0.

Supermicro Update Manager User’s Guide 742


Supermicro Update Manager User’s Guide 743
The vendor package is provided by NVIDIA. The latest NVIDIA released firmware package version is
22.05.03. Firmware and inband update tools are inside. Here is the directory tree and list of files in the
NVIDIA HGX A100 8-GPU Firmware 22.05.03 release package:

Supermicro Update Manager User’s Guide 744


The following commands are for INB firmware update for PEX88000, vBIOS and NVSwitch and OOB
firmware update for CEC and FPGA. Please refer to “SUM_UpgradeGPU_script.sh” or
“SUM_UpgradeGPU_MMscript.sh” script and edit “SUM_Upgrade_cfg.txt” under “SUM folder/script/” to
assign remote machine IP/User ID/Password of OS and BMC and INB and OOB folder path for the script to
execute.

• Script excerpt from “SUM_UpgradeGPU_script.sh” for upgrading single GPU system.

#Cmd1: Transfer and untar scripts/tools/firmware package

./sum -I Remote_INB -c RemoteExec --oi <OS_IP> --ou <OS_User> --op <OS_Password> --file
“HGXA100.tar.gz” --remote_cmd " cd /tmp/ && tar -zxvf HGXA100.tar.gz && cd HGXA100/A100_v0.5"

sleep 5

# Cmd2: check GPU versions

./sum -I Remote_INB -c RemoteExec --oi <OS_IP> --ou <OS_User> --op <OS_Password> --remote_cmd " cd
/tmp/HGXA100/A100_v0.5 && chmod +x functions.sh && source ./functions.sh &&
_generate_firmware_info "

sleep 5

# Cmd3: Inb Update

./sum -I Remote_INB -c RemoteExec --oi <OS_IP> --ou <OS_User> --op <OS_Password> --remote_cmd " cd
/tmp/HGXA100/A100_v0.5 && ./startup_INB.sh"

# Cmd4: OOB Update for CEC or FPGA. (This command will use other SUM command, UpdateGpuFw)

./sum -i <BMC_IP> -u <BMC USER> -p <BMC_PWD> -c UpdateGpu --item <CEC | FPGA> --file <CEC | FPGA
file image path>

Note: You can also use “SUM_UpgradeGPU_MMscript.sh” under “SUM folder/script/” for
upgrading multiple GPU systems.

Supermicro Update Manager User’s Guide 745


Appendix L. Creating a Firmware Updating
Tar File for OpenBMC
L.1 BIOS Firmware Updating Tar File for OpenBMC
The UEFI firmware update for OpenBMC uses the tar format, which includes the firmware image (*.img
format) and a MANIFEST file.

The following steps can be used to create the tar file:

1. Create a MANIFEST file with the following content:

purpose=xyz.openbmc_project.Software.Version.VersionPurpose.Host
version=[BIOS_BUILD_DATE]
ExtendedVersion=primary
MachineName=r12spd

2. Create a tar file including the firmware image and MAINFEST file:

$ tar -cvf bios_image.tar bios_image MANIFEST

Supermicro Update Manager User’s Guide 746


L.2 Ampere SCP Firmware Updating Tar File for
OpenBMC
The Ampere SCP firmware for OpenBMC uses the tar format, which includes the firmware image (*.slim
format) and a MANIFEST file.

The following steps can be used to create the tar file for installing SCP firmware:

1. Create a MANIFEST file with the following content:

purpose=xyz.openbmc_project.Software.Version.VersionPurpose.Host
version=2.06
ExtendedVersion=scp-primary
MachineName=r12spd

2. Create a tar file including the firmware image and MAINFEST file:

$ tar -cvf r12spd_atf_xxxx.tar altra_scp_signed_x.xx.xxxxx.slim MANIFEST

Supermicro Update Manager User’s Guide 747


Appendix M. Component Firmware
Information and Update Support Matrix
Command
Component
Get Information Update Firmware RoT Management

BIOS GetBiosInfo UpdateBios BiosRotManage


BMC GetBmcInfo UpdateBmc BmcRotManage
CPLD GetCpldInfo UpdateCpld CpldRotManage
CMM GetCmmInfo UpdateCmm N/A
BBP GetBbpInfo UpdateBbp N/A
PSU GetPsuInfo UpdatePsu N/A
Raid Controller GetRaidControllerInfo UpdateRaidController N/A
GPU GetGpuInfo UpdateGpu N/A
PMem GetPMemInfo UpdatePMem N/A
AOC NIC GetAocNICInfo UpdateAocNIC N/A
AIP CPLD GetAipCpldInfo UpdateAipCpld N/A
Switch GetSwitchInfo UpdateSwitch N/A
SCP GetScpInfo UpdateScp N/A
Multinode EC GetMultinodeEcInfo UpdateMultinodeEc N/A
Backplane storage CPLD GetBackplaneCpldInfo UpdateBackplaneCpld N/A
PCIe Switch GetPCIeSwitchInfo UpdatePCIeSwitch N/A
Fan board CPLD GetFanboardCpldInfo UpdateFanboardCpld N/A
PCIe Switch board CPLD GetSwitchboardCpldInfo UpdateSwitchboardCpld N/A
AOM board CPLD GetAomboardCpldInfo UpdateAomboardCpld N/A
Motherboard MISC CPLD GetMiscCpldInfo UpdateMiscCpld N/A
GetCpuERotInfo
CPU/GPU EROT UpdateCpuERot CpuERotManage
GetGpuERotInfo
Motherboard FPGA GetMotherboardFpgaInfo UpdateMotherboardFpga FpgaRotManage
Motherboard MCU GetMotherboardMcuInfo UpdateMotherboardMcu N/A

Supermicro Update Manager User’s Guide 748


Appendix N. Supported Platform Matrix
GetGpuInfo/UpdateGpu
In the table of GPU platforms mapping with Supermicro product SKUs and GetGpuIfno and UpdateGpu
supporting status. The GetGpuInfo command provides detailed GPU information, and the UpdateGpu
command allows for the firmware update of GPU components.

Platform Supermicro product SKUs GetGpuInfo UpdateGpu

Intel PVC SYS-821GV-TNR V V

Intel Gaudi 2 SYS-820GH-TNR2 V V

Nvidia H100 DeltaNext • SYS-821GE-TNHR V V


• AS-8125GS-TNHR

Nvidia A100 Delta • SYS-420GP-TNAR V V


• AS-4124GO-NART

Nvidia A100 Redstone • SYS-421GU-TNXR V X (See Note)


• SYS-420GU-TNXR
• SYS-220GQ-TNAR
• AS-2124GQ-NART

AMD MI300X • AS -8125GS-TNMR2 V V

Note: Due to BMC limitation, SUM does not support update GPU A100 Redstone now.

Supermicro Update Manager User’s Guide 749


The table below maps GPU platform function commands with the supporting matrix for In-band, OOB, or
Inband-RHI.
Platform Command mode GetGpuInfo UpdateGpu

V V
In-Band (For PVC_IFWI and (For PVC_IFWI and
PVC_PSCBIN only.) PVC_PSCBIN only.)
Intel PVC V V
(For PVC_UBB_CPLD, (For PVC_UBB_CPLD,
OOB/Inband RHI
PVC_RETIMER, and PVC_RETIMER, and PVC_AMC
PVC_AMC only) only)
V
V
(For GAUDI_SPI and
(For GAUDI_SPI,
In-Band gaudisecurity enable
GAUDI_OAM_CPLD and
(security enable is only
Intel Gaudi 2 GAUDI_UBB_CPLD only)
for production version).
V
V
OOB/Inband RHI (For GAUDI_RETIMER
(For GAUDI_RETIMER only)
only)
In-Band X X
Nvidia A100 Delta
OOB/Inband RHI V V
In-Band X X
Nvidia A100 Redstone
OOB/Inband RHI V X
Nvidia H100 Delta-Next In-Band X X
OOB/Inband RHI V V
AMD MI300X In-Band X X
OOB/Inband RHI V V

Supermicro Update Manager User’s Guide 750


Contacting Supermicro
Headquarters
Address: Super Micro Computer, Inc.
980 Rock Ave.
San Jose, CA 95131 U.S.A.
Tel: +1 (408) 503-8000
Fax: +1 (408) 503-8008
Email: [email protected] (General Information)
[email protected] (Technical Support)
Website: www.supermicro.com

Europe
Address: Super Micro Computer B.V.
Het Sterrenbeeld 28, 5215 ML
's-Hertogenbosch, The Netherlands
Tel: +31 (0) 73-6400390
Fax: +31 (0) 73-6416525
Email: [email protected] (General Information)
[email protected] (Technical Support)
[email protected] (Customer Support)
Website: www.supermicro.nl

Asia-Pacific
Address: Super Micro Computer, Inc.
3F, No. 150, Jian 1st Rd.
Zhonghe Dist., New Taipei City 235
Taiwan (R.O.C.)
Tel: +886-(2) 8226-3990
Fax: +886-(2) 8226-3992
Email: [email protected]
Website: www.supermicro.com.tw

Supermicro Update Manager User’s Guide 751


Supermicro Update Manager User’s Guide 752

You might also like