0% found this document useful (0 votes)
21 views31 pages

SCV 1 5

The document provides an overview of Dell's Secured Component Verification (SCV) application, which allows users to verify that a Dell PowerEdge server matches its factory configuration. The SCV application validates the system's components against a certificate generated during assembly and provides a report of matches and mismatches. New features in recent versions include support for additional operating systems, server models, and remote validation capabilities.

Uploaded by

Dan Segui
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
Download as pdf or txt
0% found this document useful (0 votes)
21 views31 pages

SCV 1 5

The document provides an overview of Dell's Secured Component Verification (SCV) application, which allows users to verify that a Dell PowerEdge server matches its factory configuration. The SCV application validates the system's components against a certificate generated during assembly and provides a report of matches and mismatches. New features in recent versions include support for additional operating systems, server models, and remote validation capabilities.

Uploaded by

Dan Segui
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 31

Dell Secured Component Verification Version

1.5,1.5.1,1.6,1.7 and 1.8


Reference Guide for Servers and Chassis

May 2023
Rev. A00
Notes, cautions, and warnings

NOTE: A NOTE indicates important information that helps you make better use of your product.

CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid
the problem.

WARNING: A WARNING indicates a potential for property damage, personal injury, or death.

© 2023 Dell Inc. or its subsidiaries. All rights reserved. Dell Technologies, Dell, and other trademarks are trademarks of Dell Inc. or its
subsidiaries. Other trademarks may be trademarks of their respective owners.
Contents

Chapter 1: Overview...................................................................................................................... 5
New features added............................................................................................................................................................5
SCV 1.8............................................................................................................................................................................. 5
SCV 1.7............................................................................................................................................................................. 5
SCV 1.6............................................................................................................................................................................. 5
SCV 1.5.1.......................................................................................................................................................................... 5
SCV 1.5.............................................................................................................................................................................6
Secured Component Verification.....................................................................................................................................6
System Requirements.........................................................................................................................................................6
Supported Systems....................................................................................................................................................... 7
Components Supported..................................................................................................................................................... 9
URIs Supported.................................................................................................................................................................. 10

Chapter 2: Secured Component Verification on WinPE................................................................. 11


Creating an ISO image to run SCV using WinPE.........................................................................................................11
Adding SCV to Custom ISO Image................................................................................................................................ 12
Running SCV on WinPE.................................................................................................................................................... 12
How to check SCV logs using WinPE........................................................................................................................... 14

Chapter 3: Secured Component Verification on Linux.................................................................. 15


Running SCV on Linux...................................................................................................................................................... 15
How to check SCV logs using Linux.............................................................................................................................. 17

Chapter 4: Secured Component Verification on Windows Server 2019 and 2022...........................18


Installing SCVApp on Windows Server 2019 and 2022.............................................................................................18
Running SCV on Windows Server 2019 and 2022..................................................................................................... 21

Chapter 5: Running Secured Component Verification (SCV) remotely......................................... 24


Running SCV remotely on Windows Server 2019 and 2022................................................................................... 24
Running SCV remotely on WinPE..................................................................................................................................24
Running SCV remotely on Linux.................................................................................................................................... 25

Chapter 6: SCV Command Details................................................................................................26


Get information on how to run SCV............................................................................................................................. 26
Get information about scv validatesysteminventory command............................................................................. 27
Connecting remotely to a management console and validating inventory.......................................................... 27
Connecting remotely to a management console with a specific port and validating inventory.....................28
Ensuring component location match and validating inventory...............................................................................28
Get SCV Version................................................................................................................................................................29
Displaying certificate identifier value on console or redirecting it to a file......................................................... 29

Chapter 7: Return Codes............................................................................................................. 30

Chapter 8: Getting help............................................................................................................... 31

Contents 3
Contacting Dell................................................................................................................................................................... 31
Support documents and resources................................................................................................................................31
Documentation feedback................................................................................................................................................. 31

4 Contents
1
Overview
This section provides an overview about Secured Component Verification (SCV) and the system requirements for running the
application on the system.
Topics:
• New features added
• Secured Component Verification
• System Requirements
• Components Supported
• URIs Supported

New features added


This section provides the list of new features added in the following releases:
● SCV 1.8
● SCV 1.7
● SCV 1.6
● SCV 1.5.1
● SCV 1.5

SCV 1.8
Following features were added or updated in this release:
● Support for new profile for cloud platforms that do not share hard drives.
● Support for extractcert command.

SCV 1.7
Following features were added or updated in this release:
● Support for SLES 15 SP4.
● Support for 16th generation PowerEdge servers.

SCV 1.6
Following features were added or updated in this release:
● Support for Red Hat Enterprise Linux 9.0.

SCV 1.5.1
Following features were added or updated in this release:
● Support for PowerEdge cloud servers.
● Support for PowerEdge Modular servers and Chassis (MX series).

Overview 5
SCV 1.5
Following features were added or updated in this release:
● Support for SCVTools.
● Support for Red Hat Enterprise Linux 8.x.
● Support for SCVApp for Windows Server 2019 and 2022.

Secured Component Verification


Secured Component Verification (SCV) is a supply chain assurance offering that enables you to verify that the PowerEdge
server you have received matches what was manufactured in the factory. In order to validate components, a certificate
containing the unique system component IDs is generated during factory assembly process. This certificate is signed in the Dell
factory and is stored in the system, later used by the SCV application. The SCV application validates the system inventory
against the SCV certificate.
The application generates a validation report detailing the inventory matches and mismatches against the SCV certificate. It also
verifies the certificate and Chain of Trust along with the Proof of Possession of the SCV Private key. Current implementation
supports direct ship customers and does not include VAR or Part Replacement scenarios.
SCV Application performs the following functions:
● Downloads the SCV Certificate that is stored in the system through Dell Technology APIs and verifies the SCV certificate
and issuer.
● Validates the SCV private key that is paired to the SCV public key in SCV certificate.
● Collects the current inventory of the system.
NOTE: For the list of system components supported, see the section Components Supported.
● Compares current system inventory against the inventory in the SCV certificate.
● Any modification of the components that are captured in the certificate will be identified as a "Mismatch".
Notes:
● SCV validates the virtual network ports as well. In systems with NPAR/NPAReP cards, run the SCV Application before
enabling them.
● Ensure that the TPM is enabled before running the SCV application. SCV supports TPM version 2.0.
● Ensure that you run the SCV application before mapping any storage devices to the system.
● In modular systems, ensure that the FlexAddress is disabled before running the SCV application.
● If internal and iDRAC USB ports are disabled, the SCV validation fails.
● Ensure that any drive which is removed from the system registers in iDRAC or any other iDRAC interface before running the
SCV validation or it will report incorrect data in the SCV output.
● SCV requires USB NIC communication for in-band validation. Do not disable the USB NIC while running the SCV operation.
● In SCV 1.5 with 1.0 certificate, one of the TPM component(ECC) entry reports as 'Match' with expected details as
'Unknown', while the detected details display all the information. This is an expected behavior because 1.0 certificate does
not include ECC information.

System Requirements
Category Requirement
Supported Operating Systems WinPE 10.x, Red Hat Enterprise Linux 9.0, Red Hat Enterprise
Linux 8.6, Red Hat Enterprise Linux 7.x, SUSE Linux
Enterprise Server 15 SP4, Windows Server 2019 and Windows
Server 2022.
SCV Tools SCV 1.5,1.5.1,1.6,1.7 or 1.8
Firmware versions iDRAC 5.10.30.00 and later versions
OME-M 2.00.00 and later versions
PowerEdge BIOS 2.14.2 and later versions

Licenses required Secured Component Verification License

6 Overview
NOTE: Red Hat Enterprise Linux 7.x is not supported by SCV 1.6 and later versions.

NOTE: In SCV version 1.5, TPM mismatch is displayed while validating components on a server with an older iDRAC and
BIOS firmware. Before performing SCV, ensure that the iDRAC firmware is upgraded to version 5.10.30.00, and BIOS
firmware is upgraded to version 2.14.2 or any later versions.

Supported Systems
NOTE: PowerEdge C4140, PowerEdge C6420, PowerEdge C6520, and PowerEdge C6525 are only supported with SCV
1.5.1 and later versions.

NOTE: Before running SCV version 1.5.1 on PowerEdge C6420, PowerEdge C6520, or PowerEdge C6525, ensure that the
iDRAC firmware is updated to version 5.10.50.00 or any later versions.
● PowerEdge C4140
● PowerEdge C6420
● PowerEdge C6520
● PowerEdge C6525
● PowerEdge C6600
● PowerEdge C6620
● PowerEdge M640
● PowerEdge MX7000 Chassis
● PowerEdge MX740c
● PowerEdge MX750c
● PowerEdge MX760c
● PowerEdge MX840c
● PowerEdge R240
● PowerEdge R250
● PowerEdge R340
● PowerEdge R350
● PowerEdge R440
● PowerEdge R450
● PowerEdge R540
● PowerEdge R550
● PowerEdge R640
● PowerEdge R6415
● PowerEdge R650
● PowerEdge R6515
● PowerEdge R6525
● PowerEdge R660
● PowerEdge R660xs
● PowerEdge R6615
● PowerEdge R6625
● PowerEdge R740
● PowerEdge R740xd
● PowerEdge R740xd2
● PowerEdge R7415
● PowerEdge R7425
● PowerEdge R750
● PowerEdge R750xa
● PowerEdge R7515
● PowerEdge R7525
● PowerEdge R760
● PowerEdge R760xa
● PowerEdge R760xd2
● PowerEdge R760xs

Overview 7
● PowerEdge R7615
● PowerEdge R7625
● PowerEdge R860
● PowerEdge R940
● PowerEdge R940xa
● PowerEdge R960
● PowerEdge T140
● PowerEdge T150
● PowerEdge T340
● PowerEdge T350
● PowerEdge T440
● PowerEdge T550
● PowerEdge T560
● PowerEdge T640
● PowerEdge XE2420
● PowerEdge XE8545
● PowerEdge XE8640
● PowerEdge XE9640
● PowerEdge XE9680
● PowerEdge XR11
● PowerEdge XR12
● PowerEdge XR2
● PowerEdge XR4520c
● PowerEdge XR5610
● PowerEdge XR7620
● PowerEdge XR8610t
● PowerEdge XR8620t
● Dell XC Core XC450
● Dell XC Core XC650
● Dell XC Core XC6520
● Dell XC Core XC740xd2
● Dell XC Core XC750
● Dell XC Core XC750xa
● Dell XC Core XC7525
● Dell XC Core XC940 System
● Dell XC Series XC940 Appliance
● Dell XC Core XCXR2
● Dell Precision 7960 Rack
● OEMR R240
● OEMR R340
● OEMR R440
● OEMR R450
● OEMR R540
● OEMR R550
● OEMR XL R640
● OEMR R650
● OEMR R650xs
● OEMR R6515
● OEMR R6525
● OEMR R740xd
● OEMR R740xd2
● OEMR R750
● OEMR R750xa
● OEMR R750xs
● OEMR R7515
● OEMR R7525

8 Overview
● OEMR R840
● OEMR R940xa
● OEMR T140
● OEMR T150
● OEMR T340
● OEMR T350
● OEMR T440
● OEMR T550
● OEMR XL T640
● OEMR XR11
● OEMR XR12
● VxRail E660F
● VxRail S670

Components Supported
Components supported for Rack, Tower and Cloud servers
Baseboard
Processor
Memory
Power supply
Hard drive
Network card
iDRAC
TPM
System Information
PCIe add-on cards

Components supported for Modular Chassis


Enclosure Controller
Fan
Open Manage Enterprise Modular
ChassisRCP
PowerSupply
IOModule
M2Drive

NOTE: Direct attached NVMe PCIe SSD will not be shown in PCIe slot. Check the HDD list to get the PCIe SSD.

NOTE: When there are no devices present for a component, the SCV inventory displays one 'Unknown' entry .

NOTE: The SCV inventory displays details only for those devices of a component that are present in the system.

Overview 9
URIs Supported
SCV supports Application Programming Interfaces (API) to access information using an API client. For more information about
using APIs, see the iDRAC9 Redfish API guide at developer.dell.com. Following is the list of URIs and the supported methods:
● Download SCV certificates

GET: /dtapi/rest/v1/x509-certificates

Example response

{
"certificate": “<SCV_CERT_CONTENT>",
"certificate_format": "PEM",
"id": "scv_factory"
}

● Download SCV Inventory

GET : /dtapi/rest/v1/scvs/0

Example response on iDRAC

{
"description": "Dell Platform Certificate Profile for PowerEdge Servers",
"hardware_inventory": [ <ARRAY OF COMPONENT DETAILS> ],
"profile_version": "<Profile Version Number>",
"profile_name": "PowerEdge"
}

Example response on MX systems

{
"description": " Dell Platform Certificate Profile for PowerEdge Modular
Infrastructure",
"hardware_inventory": [ <ARRAY OF COMPONENT DETAILS> ],
"profile_version": "<Profile Version Number>",
"profile_name": "PowerEdge MX"
}

10 Overview
2
Secured Component Verification on WinPE
This section provides information for the following:
Topics:
• Creating an ISO image to run SCV using WinPE
• Adding SCV to Custom ISO Image
• Running SCV on WinPE
• How to check SCV logs using WinPE

Creating an ISO image to run SCV using WinPE


To create an ISO image to run SCV using WinPE:
1. Download the SCVTools from the Drivers & downloads page at https://www.dell.com/support.
2. Ensure that Windows ADK and Windows PE add-on for ADK is installed in the system for WinPE 10.x. To download and install
the files, go to https://docs.microsoft.com/en-us/windows-hardware/get-started/adk-install.
3. Run the self-extractor file for SCVTools and click Unzip to extract the files to the default location.
NOTE: To extract the files to a specified location, click on Browse and select the folder where the files need to be
extracted and click OK and then Unzip.
4. Launch command prompt and change directory to the location where the files were extracted. Run the batch file
(WinPE10.x_driverinst.bat) using command prompt to create a bootable ISO image.
NOTE: Before running the WinPE batch file, ensure that you add the patch from https://support.microsoft.com/en-
us/help/5017380. To add the patch, download the latest Servicing Stack Update (SSU) for the operating system
with the Latest Cumulative Update (LCU), to the path mentioned in the batch file and rename the SSU file as
ssu-19041.1704-x64.msu and LCU file as windows10.0-kb5018410-x64.msu.

Figure 1. Running the batch file through command prompt


5. Once the ISO image is created successfully, open the folder created with the name "WINPE10.x-%timestamp%", to find the
ISO image.

Secured Component Verification on WinPE 11


Figure 2. Confirmation of the ISO image created successfully
6. Use this ISO image to boot the SCV environment in the server.

Adding SCV to Custom ISO Image


To add SCV to a custom ISO image:
1. Download the SCVTools from the Drivers & downloads page at https://www.dell.com/support.
2. Ensure that Windows ADK and Windows PE add-on for ADK is installed in the system for WinPE 10.x. To download and install
the files, go to https://docs.microsoft.com/en-us/windows-hardware/get-started/adk-install.
3. Run the self-extractor file for SCVTools and click Unzip to extract the files to the default location.
NOTE: To extract the files to a specified location, click on Browse and select the folder where the files need to be
extracted and click OK and then Unzip.
4. Copy the following folders into the corresponding folder path in the Custom ISO image:
a. scv to X:\Dell
b. Toolkit\OpenSSL to X:\Dell\scv
c. Toolkit\DLLs to X:\windows\system32
5. After copying the files, set the path for the folder using the command set PATH=%PATH%;X:\Dell\scv;X:
\Dell\scv\openssl;
6. SCV can now be used to run validation.

Running SCV on WinPE


1. Login to iDRAC in the system where you want to run the SCV application.
2. Launch the Virtual Console and click Connect Virtual Media.
3. Click on Virtual Media and under Map CD/DVD click Browse and select the ISO image for SCV and click on Map Device
and close the window.
4. In the Virtual Console window, click on Boot and select Virtual CD/DVD/ISO and click Yes on the prompt to confirm the
new boot device.
5. Click on Power and power on the system and let it boot into the ISO image.
6. Once the system boots into the ISO image, wait for the command prompt window to load into the directory X:\Dell>
7. Navigate to X:\Dell\scv and run the command scv validateSystemInventory to start the validation process.
NOTE: While running SCV on the host, ensure that the USB NIC IP Address in iDRAC is set to the default IP Address.
Also, ensure that the first three octets of the IP address are '169.254.1.' .

NOTE: After getting 'Ready' state in racadm getremoteservicesstatus output, ensure that you wait for about
120 seconds before running the scv commands.

NOTE: An error 'Collecting System Inventory: Fail' may be displayed while performing the scv
validatesysteminventory command with -d option, if the directory path length exceeds 150 characters.

12 Secured Component Verification on WinPE


Figure 3. Running the validation command
8. Once the system runs the SCV application successfully, it should give the result Validating System Inventory:
Match

Figure 4. Running the validation command and result is successful


9. If the result shows as Validating System Inventory: Mismatch it will specify which component has mismatched
under Mismatch Inventory Summary.

Secured Component Verification on WinPE 13


Figure 5. Mismatched component expected and detected details

How to check SCV logs using WinPE


1. After running SCV in WinPE, the logs created will be stored under X:\Dell\scv\scvapp\logs
2. To check logs, navigate to the logs folder and use the command notepad SCVLog_%service-
tag%_%timestamp%.log

Figure 6. Checking logs using WinPE

14 Secured Component Verification on WinPE


3
Secured Component Verification on Linux
This section provides information for the following:
Topics:
• Running SCV on Linux
• How to check SCV logs using Linux

Running SCV on Linux


1. Download the SCVTools from the Drivers & downloads page at https://www.dell.com/support.
2. In the terminal, navigate to the directory where SCV package is downloaded and unzip the file using the command tar-
zxvf DellEMC-SCV-Web-LX-X.X.X-XXXX_XXX.tar.gz

Figure 7. Extracting SCV tools on Linux


3. Navigate to the directory SCVTools after the files have been extracted and execute the install_scv.sh script using the
command sh install_scv.sh.
NOTE: To uninstall SCV you can use the command sh uninstall_scv.sh to execute the uninstall_scv.sh script.

Figure 8. Executing the SCV installation script


4. Once SCV is installed, run the command scv validateSystemInventory to start the validation process.
NOTE: While running SCV on the host, ensure that the USB NIC IP Address in iDRAC is set to the default IP Address.
Also, ensure that the first three octets of the IP address are '169.254.1.' .

NOTE: Use the command scv help to get more information on SCV and how to run it.

Secured Component Verification on Linux 15


NOTE: After getting 'Ready' state in racadm getremoteservicesstatus output, ensure that you wait for about
120 seconds before running the scv commands.
5. Once the system runs the SCV application successfully, it should give the result Validating System Inventory:
Match

Figure 9. Running the validation command and result is successful


6. If the result shows as Validating System Inventory: Mismatch it will specify which component has mismatched
under Mismatch Inventory Summary.

Figure 10. Mismatched component expected and detected details

16 Secured Component Verification on Linux


How to check SCV logs using Linux
1. After running SCV in Linux, the logs created are stored under scvapp\logs
2. To check logs, navigate to the logs folder and use the command vi SCVLog_%service-tag%_%timestamp%.log

Figure 11. Checking logs in Linux

Secured Component Verification on Linux 17


4
Secured Component Verification on Windows
Server 2019 and 2022
This section provides information about installing and running SCVApp:
Topics:
• Installing SCVApp on Windows Server 2019 and 2022
• Running SCV on Windows Server 2019 and 2022

Installing SCVApp on Windows Server 2019 and 2022


To install SCVApp on Windows Server 2019 and 2022:
1. Download the SCV installer from the Drivers & downloads page at https://www.dell.com/support.
2. Extract the SCV installer.

Figure 12. SCV installer zip file

Figure 13. SCV installer


3. Run the application to start the InstallShield Wizard.

18 Secured Component Verification on Windows Server 2019 and 2022


Figure 14. Running SCV installer
4. Click Next and accept the License Agreement.
NOTE: While installing the SCV application, ensure that you change the installation file path location to " C:
\ProgramFiles\Dell\SCVTools" in the installation wizard.

Figure 15. InstallShield Wizard for SCVApp

Secured Component Verification on Windows Server 2019 and 2022 19


Figure 16. License Agreement for SCVApp
5. Click Install to begin the installation.

Figure 17. Ready to install SCVApp

20 Secured Component Verification on Windows Server 2019 and 2022


Figure 18. Installing SCVApp
6. After the installation is complete, click Finish to exit the InstallShield Wizard.

Figure 19. SCVApp installation complete

Running SCV on Windows Server 2019 and 2022


1. Open the command prompt and navigate to the SCVTools directory/folder.
2. Run the scv validatesysteminventory command to start the validation process.
NOTE: While running SCV on the host, ensure that the USB NIC IP Address in iDRAC is set to the default IP Address.
Also, ensure that the first three octets of the IP address are '169.254.1.' .

Secured Component Verification on Windows Server 2019 and 2022 21


NOTE: 'Unable to create the scvapp directory : Failed' error is displayed when the scv validatesysteminventory
command is performed on any directory other than the directory that hosts the application.

NOTE: 'Downloading SCV Factory Certificate: Fail' error is displayed when scv validatesysteminventory
command is performed while the host firewall is enabled. To run the command successfully, ensure that you create
outbound rule for I.P. address 169.254.1.1.

NOTE: After getting 'Ready' state in racadm getremoteservicesstatus output, ensure that you wait for about
120 seconds before running the scv commands.

NOTE: An error 'Collecting System Inventory: Fail' may be displayed while performing the scv
validatesysteminventory command with -d option, if the directory path length exceeds 150 characters.

Figure 20. Running the validation command and result is successful


3. If the result is Validating System Inventory: Mismatch, it will specify which component has mismatched under
Mismatch Inventory Summary.

Figure 21. Validation and result is unsuccessful

22 Secured Component Verification on Windows Server 2019 and 2022


Figure 22. Mismatched component expected and detected details

Secured Component Verification on Windows Server 2019 and 2022 23


5
Running Secured Component Verification
(SCV) remotely
This section provides information for the following:
Topics:
• Running SCV remotely on Windows Server 2019 and 2022
• Running SCV remotely on WinPE
• Running SCV remotely on Linux

Running SCV remotely on Windows Server 2019 and


2022
1. Open the command prompt and navigate to the SCVTools directory/folder.
2. Run the scv validatesysteminventory -r <iDRAC IPv4/IPv6[] address> -u <iDRAC username> -p
<iDRAC password> command to start the validation process.

Figure 23. Running the validation command remotely on Windows and result is successful

NOTE: The above example is for running validation command in interactive mode, it does not require -u and -p
parameters.

Running SCV remotely on WinPE


1. Open the command prompt and go to the SCVTools directory/folder.
2. Run the scv validatesysteminventory -r <iDRAC IPv4/IPv6[] address> -u <iDRAC username> -p
<iDRAC password> command to start the validation process.

24 Running Secured Component Verification (SCV) remotely


Figure 24. Running the validation command remotely on WinPE and result is successful

NOTE: The above example is for running validation command in interactive mode, it does not require -u and -p
parameters.

Running SCV remotely on Linux


1. Open the command prompt and navigate to the SCVTools directory/folder.
2. Run the scv validatesysteminventory -r <iDRAC IPv4/IPv6[] address> -u <iDRAC username> -p
<iDRAC password> command to start the validation process.

Figure 25. Running the validation command remotely on Linux and result is successful

NOTE: The above example is for running validation command in interactive mode, it does not require -u and -p
parameters.

Running Secured Component Verification (SCV) remotely 25


6
SCV Command Details
This section provides information on some additional scv commands.
Topics:
• Get information on how to run SCV
• Get information about scv validatesysteminventory command
• Connecting remotely to a management console and validating inventory
• Connecting remotely to a management console with a specific port and validating inventory
• Ensuring component location match and validating inventory
• Get SCV Version
• Displaying certificate identifier value on console or redirecting it to a file

Get information on how to run SCV


Table 1. Get more information about SCV
Description Use the following command to get more information about SCV and how to run it.

Synopsis
scv help

Output

26 SCV Command Details


Get information about scv validatesysteminventory
command
Table 2. Get more information about SCV validatesysteminventory command
Description Use the following command to get more information about SCV validatesysteminventory command
and how to run it.

Synopsis
scv help validatesysteminventory

Output

Connecting remotely to a management console and


validating inventory
Table 3. Validating a specific inventory remotely
Description Use the following command to connect remotely to a specific management console IP and validate the
inventory.

Synopsis
scv validatesysteminventory -r <IPv4/IPv6 address> -u <UserName> -p
<Password>

Input ● - r — IPv4/IPv6 address


● - u— User name
● - p— Password

Output

SCV Command Details 27


Connecting remotely to a management console with a
specific port and validating inventory
Table 4. Validating inventory by using a specific port
Description Use the following command to connect to a management console IP using a specific port and validate the
inventory.

Synopsis
scv validatesysteminventory -r <IPv4/IPv6 address:Port> -u <UserName> -p
<Password>

Input ● - r — IPv4/IPv6 address


● - u— User name
● - p— Password

Ensuring component location match and validating


inventory
Table 5. Ensuring component location match
Description Use the following command to ensure that the component location matches while validating the inventory.
NOTE: Any component swapping will be identified as 'Mismatch' while using the --enforceorder
command.

Synopsis
scv validatesysteminventory --enforceorder

Output

28 SCV Command Details


Get SCV Version
Table 6. Get version of SCV
Description Use the following command to display the current version of SCV application.

Synopsis
scv version

Output

Displaying certificate identifier value on console or


redirecting it to a file
Table 7. Displaying or redirecting certificate identifier value
Description Use the following command to display certificate identifier value on the console or to redirect it to a file.

Synopsis
scv extractcert -r <IPv4/IPv6 address> -u <UserName> -p <Password>
-component <Component Name> -l <Location> -f <File Name>

Input ● - r — IPv4/IPv6 address


● - u— User name
● - p— Password
● - component— Component Name
● - l— Location
● - f— File Name

Output

Figure 26. Displaying certificate identifier value on console

Figure 27. Writing certificate identifier value into a file

SCV Command Details 29


7
Return Codes
Following is the list of the return codes for SCV operation:

Table 8. SCV return codes


Code Description
0 All operations were successful, and inventory matched.
1 Generic failure.
2 Another instance of SCV operation is running.
3 Permission is not appropriate for the user.
4 SCV operation failed to start, dependencies not met.
5 Certificate download failed from iDRAC.
6 Validating signature and Root of Trust Failed.
7 Validating proof of possession failed.
8 Profile not supported for the version details as specified in the certificate.
9 Profile, Subschema/utilities are tampered, profile signature mismatch.
10 Unable to collect data due to a utility failure.
11 Mismatch in the inventory.
12 Value specified is out of range. The length of argument is larger or shorter than allowed.
13 Invalid or incorrect SCV command entered. Any command or option entered is not supported on
the current interface/platform.
14 Syntax of command is incorrect.
15 Command to be executed in Factory(SSM) mode.
16 SCV doesn't have a required license installed.
17 iDRAC doesn't have enough resources (Ex:- Memory)
18 Service unavailable/busy.
19 File transfer issue (Inband).
20 Lockdown mode enabled or dependent attributes are invalid/not configured.
21 Unable to connect (Out of Band)
22 Dependency not met for a specification
23 Session related issues.
24 Failure due to invalid keys, certificate, and signing error.
25 Certificate upload failed.

30 Return Codes
8
Getting help
Topics:
• Contacting Dell
• Support documents and resources
• Documentation feedback

Contacting Dell
Dell provides several online and telephone based support and service options. If you do not have an active internet connection,
you can find contact information about your purchase invoice, packing slip, bill, or Dell product catalog. Availability varies by
country and product, and some services may not be available in your area. To contact Dell for sales, technical assistance, or
customer service issues:

Steps
1. Go to www.dell.com/support/home.
2. Select your country from the drop-down menu on the lower right corner of the page.
3. For customized support:
a. Enter your system Service Tag in the Enter your Service Tag field.
b. Click Submit.
The support page that lists the various support categories is displayed.
4. For general support:
a. Select your product category.
b. Select your product segment.
c. Select your product.
The support page that lists the various support categories is displayed.
5. For contact details of Dell Global Technical Support:
a. Click Contact Technical Support.
b. Enter your system Service Tag in the Enter your Service Tag field on the Contact Us webpage.

Support documents and resources


● The iDRAC support home page provides access to product documents, technical white papers, how-to videos, and more:
○ www.dell.com/support/idrac
● iDRAC User Guide and other manuals:
○ www.dell.com/idracmanuals
● For information about PowerEdge servers, see the documentation at:
○ www.dell.com/poweredgemanuals
● Dell Technical Support:
○ www.dell.com/support

Documentation feedback
You can rate the documentation or write your feedback on any of our Dell documentation pages and click Send Feedback to
send your feedback.

Getting help 31

You might also like