Solved

ibm x3500/x3560 imm eject cd tray

Posted on 2011-02-27
3
2,011 Views
Last Modified: 2012-05-11
Is it possible to eject the physical cd/dvd tray from the IMM?

I've got a remote server with a bootable CD in the tray, and I can't seem to override the disc and boot to an image I have mounted via the IMM.
0
Comment
Question by:snowdog_2112
3 Comments
 
LVL 34

Expert Comment

by:Michael-Best
ID: 34999804
Enter the BIOS and change the boot order to boot from the CD first.
0
 
LVL 1

Accepted Solution

by:
martgin earned 500 total points
ID: 35007319
No its not possible to eject cd from the IMM.
I sometimes let the machine boot to the Operating System (OS) and issue an eject from the OS
Then reboot, mount media from the IMM.
But you obviously must have an OS installed for that to be possible.

Also normally when you set CD-rom boot, it normally mounts the IMM CD 1st, then the local CD 2nd.

Updating your UEFI and IMM might also help resolve this.

If your CD is UEFI based (like Windows 2008 64 bit or Windows 2008 R2 64 bit or SLES 11 64 bit) or ServerGuide CD (the 64 bit one), you can press F1 -> boot options -> Boot from file and point to the remotely mounted media /boot/efi folder, point it to the bootx64.efi (or other .efi file). But this only works with UEFI enabled OS / CD/ DVD. It will not work with a legacy cd (like vmware or any windows 32 bit or most linux release).
0
 

Author Comment

by:snowdog_2112
ID: 35023023
The IMM .iso I wanted to boot is the vmware esxi 4.1 installer.

I had it set to boot from CD first, and it booted to the physical disc in the drive, and then never booted over to the .iso mounted in the IMM.

The problem I had was there was no OS to boot into and eject from within the OS.

In the end I had to get hands on the server to hit the button.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Power to 2.5 inch hard disk 3 50
sudden electricity fuse blew and server not working 6 64
Server Room Hardware 5 87
Raid 6 or Raid 10? 19 126
Great sound, comfort and fit, excellent build quality, versatility, compatibility. These are just some of the many reasons for choosing a headset from Sennheiser.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…
You have products, that come in variants and want to set different prices for them? Watch this micro tutorial that describes how to configure prices for Magento super attributes. Assigning simple products to configurable: We assigned simple products…

930 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now