Cable Routing Procedures for the Dell PowerEdge T320 & T420 Systems4IntroductionThis white paper covers recommended cable routing procedures for the Dell™ PowerEdge™ T320 & T420systems in the following racks:• PowerEdge 2410, 4210• PowerEdge 2420, 4220, 4820 (including wide and deep versions)• PowerEdge Energy Smart 4020S, 4620SIf you are using the optional cable management arm (CMA), following these procedures will allow youto extend the system from the rack for service without powering down or disconnecting the cables. Ifyou are not using the CMA, following these procedures will ensure secure attachment and strain reliefof the cables behind the system.For guidelines on how to route cables within the rack, refer to the Dell Best Practices Guide for RackEnclosure white paper. For additional details regarding potential interferences between the CMA andrear-mount power distribution units (PDUs) in Dell racks as well as general information about thirdparty rack compatibility, refer to the Dell Enterprise Systems Rail Sizing and Rack Compatibility Matrixlocated at http://content.dell.com/us/en/enterprise/d/business~solutions~engineering-docs~en/Documents~rail-rack-matrix.pdf.aspx.Section 1: Cabling a PowerEdge T320 & T420 system with a CMAThis section details how to cable the PowerEdge T320 & T420 systems using a CMA. If you are cablingthe system without the optional CMA, refer to Section 3.Follow the instructions contained in the Rack Installation Instructions in the rail kit to install the serverinto the rack. Once installed, use these instructions to install the cables. All illustrations in thefollowing sections were created using a PowerEdge T320 system.NOTE: The PowerEdge T320 & T420 systems are compatible with both the PowerEdge T610 rails andCMA and the PowerEdge T620 rails and CMA.1.1. Connecting the cables to the systemAttach the CMA tray to the back of the rails as described in the CMA Installation Instructions providedin the CMA kit. Connect all applicable cables to the rear of the system and verify that all connectionsare secure. See Figure 1.