hit counter script
Dell iDRAC6 User Manual

Dell iDRAC6 User Manual

Remote access controller 6
Hide thumbs Also See for iDRAC6:
Table of Contents

Advertisement

Integrated Dell
Remote
Access Controller 6 (iDRAC6)
Enterprise for Blade Servers
Version 2.1
User Guide

Advertisement

Table of Contents
loading

Summary of Contents for Dell iDRAC6

  • Page 1 ™ Integrated Dell Remote Access Controller 6 (iDRAC6) Enterprise for Blade Servers Version 2.1 User Guide...
  • Page 2 Other trademarks and trade names may be used in this document to refer to either the entities claiming the marks and names or their products. Dell Inc. disclaims any proprietary interest in trademarks and trade names other than its own.
  • Page 3: Table Of Contents

    ....iDRAC6 Security Features ....iDRAC6 Enterprise and vFlash Media ..Supported Platforms .
  • Page 4 CMC Web Interface ....Launching iDRAC6 Web Interface From the CMC ....
  • Page 5 Enable Discovery and Monitoring ..Using iDRAC6 Web Interface to Enable Discovery and Monitoring ....
  • Page 6 ....Installing a TFTP Server ....Installing Dell OpenManage IT Assistant ..Installing Dell Management Console .
  • Page 7 ....Configuring IPMI Over LAN ....Adding and Configuring iDRAC6 Users ..Securing iDRAC6 Communications Using SSL and Digital Certificates .
  • Page 8 Extending the Active Directory Schema ..Active Directory Schema Extensions ..Overview of iDRAC6 Schema Extensions ..Active Directory Object Overview ..
  • Page 9 Certificate ..... . Using Active Directory to Log In to iDRAC6 ..Using Active Directory Single Sign-On .
  • Page 10 Configuring Active Directory Users for Smart Card Logon ....iDRAC6 Login Scenarios with TFA and SSO ..Viewing the Configuration and Health of the Managed Server .
  • Page 11 ......iDRAC6 ..... . .
  • Page 12 ....Configuring the Management Station ..Configuring Console Redirection and Virtual Media in iDRAC6 Web Interface ..Opening a Console Redirection Session ..
  • Page 13 ....13 Configuring the vFlash Media Card for Use With iDRAC6 ..Installing a vFlash Media Card .
  • Page 14 ... . Testing E-mail Alerting ....Testing iDRAC6 SNMP Trap Alert Feature ..Configuring iDRAC6 Network Properties .
  • Page 15 ....Configuring IP Blocking ....Configuring iDRAC6 Telnet and SSH Services Using Local RACADM ..
  • Page 16 SM-CLP Examples ....Server Power Management ... SEL Management ....
  • Page 17 Operating System Shell Options ..19 Using iDRAC6 Configuration Utility ......
  • Page 18 Error Messages ....Viewing iDRAC6 Log ....Viewing System Information .
  • Page 19 racreset ......racresetcfg ......serveraction .
  • Page 20 ..... . . remoteimage ..... . B iDRAC6 Enterprise Property Database Group and Object Definitions .
  • Page 21 cfgOobSnmp ..... . . cfgOobSnmpAgentCommunity (Read/Write) ....cfgOobSnmpAgentEnable (Read/Write) .
  • Page 22 cfgIPv6Address2 (Read Only) ... cfgIPv6DNSServersFromDHCP6 (Read/Write) ....cfgIPv6DNSServer1 (Read/Write) ..cfgIPv6DNSServer2 (Read/Write) .
  • Page 23 cfgIPv6Address10 (Read Only) ... cfgIPv6Addr11PrefixLength (Read Only) ..cfgIPv6Addr11Length (Read Only) ..cfgIPv6Address11 (Read Only) ... cfgIPv6Addr12PrefixLength (Read Only) .
  • Page 24 cfgSessionManagement ....cfgSsnMgtConsRedirMaxSessions (Read/Write) ....cfgSsnMgtWebserverTimeout (Read/Write) .
  • Page 25 cfgServerPowerPeakPowerConsumption (Read Only) ..... cfgServerPowerPeakPowerTimestamp (Read Only) ..... cfgServerPowerConsumptionClear (Write Only) .
  • Page 26 ifcRacManagedNodeOs ....ifcRacMnOsHostname (Read Only) ..ifcRacMnOsOsName (Read Only) ..cfgRacSecurity .
  • Page 27 cfgIpmiPef ......cfgIpmiPefName (Read Only) ... . cfgIpmiPefIndex (Read/Write) .
  • Page 28 cfgIpmiSol ..... . . cfgIpmiSolEnable (Read/Write) ..cfgIpmiSolBaudRate (Read/Write) ..cfgIpmiSolMinPrivilege (Read/Write) .
  • Page 29: Idrac6 Enterprise Overview

    CMC fails. The chassis provides access to iDRAC6 devices through its LCD display, local console connections, and its Web interface. Each blade in a chassis has an iDRAC6. A total of 16 blades can be installed in the M1000e.
  • Page 30: Ipv6 Ready Logo Certification

    CMC and iDRAC6 communication delays. The delays may cause unpredictable chassis behavior such as CMC displays that iDRAC6 is offline even though it is operating properly. This could cause other unpredictable behavior. The iDRAC6 network interface is disabled by default. It must be configured before iDRAC6 is accessible.
  • Page 31: Idrac6 Enterprise And Vflash Media

    Configurable client IP address range for clients connecting to iDRAC6 iDRAC6 Enterprise and vFlash Media iDRAC6 Enterprise provides an SD slot for vFlash Media. New features added in this release are remote RACADM, IPv6, FlexAddress MAC for iDRAC6, Smart Card based Two Factor Authentication (TFA), Single Sign–On, WS–MAN, SMASH CLP , Remote Syslog, Remote File Share,...
  • Page 32 Table 1-1. iDRAC6 Feature List (continued) Feature iDRAC6 Enterprise vFlash Media Shared/Failover Network Modes IPv4 VLAN Tagging IPv6 Dynamic DNS Dedicated NIC Security and Authentication Role-based Authorization Local Users Active Directory Two-factor Authentication Single sign-on SSL Encryption Remote Management and Remediation...
  • Page 33: Supported Platforms

    = Supported; =Not Supported Supported Platforms For the latest supported platforms, see iDRAC6 Readme file and the Dell Systems Software Support Matrix available at support.dell.com/manuals and on the Dell Systems Management Tools and Documentation DVD that was shipped with your system.
  • Page 34: Supported Operating Systems

    • Support for IPMI utilities, such as IPMItool and ipmish iDRAC6 Ports Table 1-3 lists the ports on which iDRAC6 listens for connections. Table 1-4 identifies the ports that iDRAC6 uses as a client. This information is required when opening firewalls for remote access to an iDRAC6.
  • Page 35: Other Documents You May Need

    LDAPS for global catalog (GC) Other Documents You May Need In addition to this User Guide, the following documents provide additional information about the setup and operation of iDRAC6 in your system: • iDRAC6 online help provides information about using the Web interface.
  • Page 36 The Dell Systems Software Support Matrix provides information about the • various Dell systems, the operating systems supported by these systems, and the Dell OpenManage™ components that can be installed on these systems. • The Dell OpenManage Installation and Security User's Guide provides complete information on installation procedures and step–by–step...
  • Page 37 The following system documents are also available to provide more information about the system in which iDRAC6 is installed: • The safety instructions that came with your system provide important safety and regulatory information. For additional regulatory information, see the Regulatory Compliance home page at www.dell.com/regulatory_compliance.
  • Page 38 Enterprise Overview...
  • Page 39: Configuring Idrac6 Enterprise

    Configuring iDRAC6 Enterprise This section provides information about how to establish access to iDRAC6 and to configure your management environment to use iDRAC6. Before You Begin Gather the following items prior to configuring iDRAC6: • Dell Chassis Management Controller Firmware User Guide •...
  • Page 40 The local RACADM CLI is available after you have installed the operating system and the Dell OpenManage software on the managed server. Table 2-1 describes these interfaces. For greater security, access to iDRAC6 configuration through iDRAC6 Configuration Utility or Local RACADM CLI can be disabled by means of a RACADM command (see "RACADM Subcommand Overview") or from the...
  • Page 41 Interface Description Chassis LCD Panel The LCD panel on the chassis containing iDRAC6 can be used to view the high-level status of the servers in the chassis. During initial configuration of the CMC, the configuration wizard allows you to enable DHCP configuration of iDRAC6 networking.
  • Page 42 IPMI defines a standard way for embedded management subsystems, such as iDRAC6, to communicate with other embedded systems and management applications. You can use iDRAC6 Web interface, SM-CLP , or RACADM commands to configure IPMI Platform Event Filters (PEF) and Platform Event Traps (PET).
  • Page 43: Configuration Tasks

    CMC initial configuration. Once the chassis is deployed, the LCD panel cannot be used to reconfigure iDRAC6. NOTE: The LCD panel can be used only to enable DHCP to configure iDRAC6 network. If you want to assign static addresses, you must use iDRAC6 Configuration Utility or the CMC Web interface.
  • Page 44: Configure Idrac6 Users

    • Remote and local RACADM — See "cfgLanNetworking" Configure iDRAC6 Users Set up the local iDRAC6 users and permissions. iDRAC6 holds a table of sixteen local users in firmware. You can set usernames, passwords, and roles for these users. NOTE: <, >, and \ are not allowed in usernames or passwords.
  • Page 45: Configure Platform Events

    "Enabling or Disabling Local Configuration Access." For cfgRacTuning commands, see "cfgRacTuning." Configure iDRAC6 Services Enable or disable iDRAC6 network services — such as Telnet, SSH, and the Web server interface — and reconfigure ports and other service parameters. •...
  • Page 46: Configure Secure Sockets Layer (Ssl)

    — See "Using the Virtual Media Command Line Interface Utility" Configure the Managed Server for the Last Crash Screen Feature Set up the managed server so that iDRAC6 can capture the screen image after an operating system crash or freeze.
  • Page 47: Configuring Networking Using The Cmc Web Interface

    2 In the system tree, select Servers. The Servers Status screen appears. 3 Click the Launch iDRAC6 GUI icon for the server you want to manage. You can also launch iDRAC6 Web interface for a single server using the Servers list in the system tree: 1 Log in to the CMC Web interface.
  • Page 48 In this context, "the same account" means that the user has the same login name and password for CMC as for iDRAC6. A user who has the same login name but a different password will not be recognized as a valid user.
  • Page 49: Configuring Networking For Idrac6

    Configuring Networking for iDRAC6 1 Click System→ Remote Access→ iDRAC6. 2 Click the Network/Security tab: To enable or disable Serial Over LAN: Click Serial Over LAN. The Serial Over LAN screen appears. Select the Enable Serial Over LAN check box. You may also change the Baud Rate and Channel Privilege Level Limit settings.
  • Page 50: Viewing Flexaddress Mezzanine Card Fabric Connections

    Configuration of the FlexAddress feature is performed using the CMC Web interface. For more information on the FlexAddress feature and its configuration, see the Dell Chassis Management Controller User Guide and the Chassis Management Controller (CMC) Secure Digital (SD) Card Technical Specification document.
  • Page 51: Flexaddress Mac For Idrac6

    MAC address for iDRAC6s in a chassis. The chassis–assigned MAC address is stored in the CMC non–volatile memory and is sent to iDRAC6 during iDRAC6 boot or if you change the settings in the CMC FlexAddress page.
  • Page 52: Remote Syslog

    CMC RACADM subcommands. Remote Syslog iDRAC6 Remote Syslog feature allows you to remotely write the RAC log and the System Event Log (SEL) to an external syslog server. You can read all logs from the entire server farm from a central log.
  • Page 53: Remote File Share

    NOTE: The severity levels defined by the Remote Syslog protocol differ from the standard IPMI System Event Log (SEL) severity levels. Hence all iDRAC6 Remote Syslog entries are reported in the syslog server with severity level as Notice. The following example shows the configuration objects and the RACADM command usage to change remote syslog settings: racadm config –g cfgRemoteHosts –o...
  • Page 54 CDROM. Remote file share supports only .IMG and .ISO image file formats. Remote file sharing can be enabled through the remote Web interface: 1 Open a supported Web browser window. 2 Log in to iDRAC6 Web interface. 3 Select System→ Remote File Share tab. The Remote File Share screen is displayed.
  • Page 55: Updating Idrac6 Firmware

    Download the firmware from support.dell.com. The firmware image is available in several different formats to support the different update methods available. To update iDRAC6 firmware using iDRAC6 Web interface or SM-CLP , or to recover iDRAC6 using the CMC Web interface, download the binary image, packaged as a self-extracting archive.
  • Page 56: Executing The Firmware Update

    SHA1 and MD5 keys for the SSL certificate. Because the keys are different from those in the open Web browser, all browser windows that are connected to iDRAC6 must be closed after the firmware update is complete. If the browser windows are not closed, an Invalid Certificate error message is displayed.
  • Page 57: Verifying The Digital Signature For Linux Dups

    --import <Public Key Filename> NOTE: You must have your private key to complete the process. 3 To prevent a distrusted-key warning, change the trust level for the Dell Public GPG key. Enter the following command: gpg --edit-key 23B66A9D Within the GPG key editor, enter fpr.
  • Page 58 Update Package and its associated signature file for verification. By default, the signature file has the same name as the DUP filename with a .sign extension. For example, iDRAC6 firmware image has an associated .sign file (IDRAC_FRMW_LX_2.0.BIN.sign), which is included in the self-extracting archive with the firmware image (IDRAC_FRMW_LX_2.0.BIN).
  • Page 59 (Linux Systems Group) <linux- security@dell.com>" not changed gpg: Total number processed: 1 gpg: unchanged: 1 3 Set the GPG trust level for the Dell public key, if you haven’t done so previously. Enter the following command: gpg --edit-key 23B66A9D At the command prompt, enter the following commands: trust Enter 5, then press <Enter>...
  • Page 60: Using Idrac6 Web Interface

    NOTE: The firmware update, by default, retains the current iDRAC6 settings. During the update process, you have the option to reset iDRAC6 configuration to the factory defaults. If you set the configuration to the factory defaults, external network access will be disabled when the update completes. You must enable and configure the network using iDRAC6 Configuration Utility.
  • Page 61: Updating Idrac6 Firmware Using Racadm

    Configuration Utility during BIOS POST or through the CMC. 6 By default, the Preserve Configuration option is enabled (checked) to preserve the current settings on iDRAC6 after an upgrade. If you do not want the settings to be preserved, clear the Preserve Configuration check box.
  • Page 62: Using The Dos Update Utility

    This option is used to update the firmware without preserving any configuration information. You should not use this option unless explicitly told to do so by a Dell Support Representative, because it deletes all of your existing iDRAC6 configuration information such as IP addresses, users, and passwords.
  • Page 63: Clear Your Browser's Cache

    Using iDRAC6 Configuration Utility to Enable Discovery and Monitoring To set up iDRAC6 for IPMI discovery and sending alert traps at iDRAC6 Configuration Utility level, restart your managed server (blade) and observe its power-up using the iKVM and either a remote monitor and console keyboard or a Serial over LAN (SOL) connection.
  • Page 64: Using Idrac6 Web Interface To Enable Discovery And Monitoring

    4 Toggle LAN Alert Enabled to On using the spacebar. 5 Enter the IP address of your Management Station into Alert Destination 1. 6 Enter a name string into iDRAC6 Name with a consistent naming convention across your data center. The default is iDRAC6-{ Service Tag }.
  • Page 65 You can now send a test trap by clicking the Send link in the Test Trap column. Dell highly recommends that for security purposes you create a separate User for IPMI commands with its own user name, IPMI over LAN privileges, and password: 1 In the system tree, select System→...
  • Page 66: Using It Assistant To View Idrac6 Status And Events

    RAC group. This is due to the fact that iDRAC6 uses IPMI discovery as opposed to SNMP . iDRAC6 error and warning traps can now be seen in the primary Alert Log of IT Assistant. They will show up in the Unknown category, but the trap description and severity will be accurate.
  • Page 67: Station

    7 Install Dell Management Console (DMC) (optional). Management Station Network Requirements To access iDRAC6, the management station must be on the same network as the CMC RJ45 connection port labeled "GB1". It is possible to isolate the CMC network from the network the managed server is on, so that your management station may have LAN access to iDRAC6 but not to the managed server.
  • Page 68: Configuring A Supported Web Browser

    Web browsers for use with iDRAC6 Web interface. Opening Your Web Browser iDRAC6 Web interface is designed to be viewed in a supported Web browser at a minimum screen resolution of 800 pixels wide by 600 pixels high. In order to view the interface and access all features, ensure that your resolution is set to at least 800 by 600 pixels and/or resize your browser, as needed.
  • Page 69 5 Select Medium-Low from the drop-down menu and click Reset. Click OK to confirm. You will need to re-enter the Custom Level dialog by clicking its button. 6 Then, scroll down to the section labeled ActiveX controls and plug-ins and check each setting, as different versions of IE have differing settings in Medium-Low state: •...
  • Page 70 • Allow paste operations via script: Enable • Scripting of Java applets: Enable 7 Select Tools→ Internet Options→ Advanced. 8 Make sure the following items are checked or unchecked: In the Browsing section: • Always send URLs as UTF-8: checked •...
  • Page 71: Adding Idrac6 To The List Of Trusted Domains

    Adding iDRAC6 to the List of Trusted Domains When you access iDRAC6 Web interface through the Web browser, you may be prompted to add iDRAC6 IP address to the list of trusted domains if the IP address is missing from the list. When completed, click Refresh or relaunch the Web browser to establish a connection to iDRAC6 Web interface.
  • Page 72: Setting The Locale In Linux

    1024 pixels wide may be necessary in order to view all features. iDRAC6 Web interface is designed to work with localized keyboards for the specific language variants listed above. Some features of iDRAC6 Web interface, such as Console Redirection, may require additional steps to access certain functions/letters.
  • Page 73: Disabling The Whitelist Feature In Firefox

    If enabled, the whitelist feature requires you to install a console redirection viewer for each iDRAC6 you visit, even though the viewer versions are identical. To disable the whitelist feature and avoid unnecessary plugin installations, perform the following steps: 1 Open a Firefox Web browser window.
  • Page 74: Installing Idrac6 Software On The Management Station

    Your system includes the Dell Systems Management Tools and Documentation DVD. This DVD includes the following components: • DVD root - Contains the Dell Systems Build and Update Utility, which provides server setup and system installation information • SYSMGMT - Contains the systems management software products including Dell OpenManage Server Administrator •...
  • Page 75: Uninstalling Racadm

    You can also use the Java console viewer with Firefox if you install a JRE and configure the console viewer in iDRAC6 Web interface before you launch the viewer. See "Configuring Console Redirection and Virtual Media in iDRAC6 Web Interface"...
  • Page 76: Installing Telnet Or Ssh Clients

    Installing Telnet or SSH Clients By default, iDRAC6 Telnet service is disabled and the SSH service is enabled. Since Telnet is an insecure protocol, you should use it only if you cannot install an SSH client or your network connection is otherwise secured.
  • Page 77: Configuring The Backspace Key For Telnet Sessions

    SSH is enabled by default on iDRAC6. You can use free programs like PuTTY or OpenSSH on a management station to connect to the managed server’s iDRAC6. When an error occurs during the login procedure, the SSH client issues an error message.
  • Page 78 4 Telnet sessions and 4 SSH sessions simultaneously. However, only one of those 8 potential sessions may use SM-CLP . That is, iDRAC6 supports only one SM-CLP session at a time. The session timeout is controlled by the cfgSsnMgtSshIdleTimeout property as described in "iDRAC6 Enterprise Property Database Group and Object Definitions."...
  • Page 79: Installing A Tftp Server

    Protocol (FTP). It is used with the SM-CLP and RACADM command line interfaces to transfer files to and from iDRAC6. The only times when you need to copy files to or from iDRAC6 are when you update iDRAC6 firmware or install certificates on iDRAC6. If you choose to use SM-CLP or RACADM when you perform these tasks, a TFTP server must be running on a computer iDRAC6 can access by IP number or DNS name.
  • Page 80: Installing Dell Management Console

    It is a Web–based GUI, which is installed on a management station in a networked environment. You can install DMC from the Dell Management Console DVD or download and install it from the Dell website at www.dell.com/openmanage.
  • Page 81: Server

    Installing the Software on the Managed Server The Dell management software includes the following features: • RACADM CLI — Allows you to configure and administer iDRAC6. It is a powerful tool for scripting configuration and management tasks. • Server Administrator — Is required to use iDRAC6 last-crash-screen feature.
  • Page 82: Configuring The Managed Server To Capture The Last Crash Screen

    Configuring the Managed Server to Capture the Last Crash Screen iDRAC6 can capture the last crash screen so that you can view it in the Web interface to help troubleshoot the cause of the managed server crash. Follow these steps to enable the last crash screen feature.
  • Page 83: Disabling The Windows Automatic Reboot Option

    Disabling the Windows Automatic Reboot Option To ensure that iDRAC6 can capture the last crash screen, disable the Automatic Reboot option on managed servers running Windows Server or ® Windows Vista 1 Open the Windows Control Panel and double-click the System icon.
  • Page 84 Configuring the Managed Server...
  • Page 85: Using The Web Interface

    Configuring iDRAC6 Enterprise Using the Web Interface iDRAC6 provides a Web interface that enables you to configure iDRAC6 properties and users, perform remote management tasks, and troubleshoot a remote (managed) system for problems. You would typically use the Web interface to perform your daily system management tasks. This chapter provides information about how to perform common systems management tasks with iDRAC6 Web interface and provides links to related information.
  • Page 86: Accessing The Web Interface

    Logging In ® ® You can log in as either an iDRAC6 user or as a Microsoft Active Directory user. The default user name and password are root and calvin, respectively. You must have been granted Login to iDRAC privilege by the administrator to log in to iDRAC6.
  • Page 87: Logging Out

    Closing any one tab expires all iDRAC6 Web interface tabs. Also, if a user logs in with Power User privileges on one tab, and then logs in as Administrator on another tab, both open tabs then have Administrator privileges.
  • Page 88: Configuring Idrac6 Nic

    NOTE: Most DHCP servers require a server to store a client identifier token in its reservations table. The client (iDRAC6, for example) must provide this token during DHCP negotiation. iDRAC6 supplies the client identifier option using a one-byte interface number (0) followed by a six-byte MAC address.
  • Page 89 NIC from the DHCP server. It also deactivates the IP Address, Subnet Mask, and Gateway fields. IP Address Allows you to enter or edit a static IP address for iDRAC6 NIC. To change this setting, deselect the DHCP Enable option. Subnet Mask Allows you to enter or edit a subnet mask for iDRAC6 NIC.
  • Page 90 Router Advertisement messages. NOTE: iDRAC6 does not allow you to save the settings if you enter an IPv6 Address consisting of more than eight groups. Prefix Length Configures the prefix length of the IPv6 address. It can be a value between 1 and 128 inclusive.
  • Page 91 Table 5-2. Network Settings (continued) Setting Description Gateway Configures the static IPv6 gateway for the iDRAC6 NIC. To change this setting, you must first disable Autoconfiguration Enable by deselecting the associated checkbox. Use DHCPv6 to Enable DHCP to obtain IPv6 DNS server addresses by selecting obtain DNS Server the Use DHCPv6 to obtain DNS Server addresses checkbox.
  • Page 92: Configuring Ip Filtering And Ip Blocking

    NIC to be reset, which may cause a brief loss in connectivity. Configuring IP Filtering and IP Blocking NOTE: You must have Configure iDRAC6 privilege to perform the following steps. 1 Click System→ Remote Access→ iDRAC6. 2 Click the Network/Security tab. The Network screen appears.
  • Page 93 Settings Description IP Range Enabled Enables the IP Range checking feature, which defines a range of IP addresses that can access iDRAC6. The default is Disabled. IP Range Address Determines the acceptable IP subnet address. The default is 192.168.1.0. IP Range Subnet Defines the significant bit positions in the IP address.
  • Page 94: Configuring Platform Events

    Network Configuration Page Configuring Platform Events Platform event configuration provides a mechanism for configuring iDRAC6 to perform selected actions on certain event messages. The actions include no action, reboot system, power cycle system, power off system, and generate an alert (Platform Event Trap [PET] and/or e-mail).
  • Page 95: Configuring Platform Event Filters (Pef)

    NOTE: Configure platform event filters before you configure the platform event traps or e-mail alert settings. 1 Log in to iDRAC6 Web interface. 2 Click System, and then click the Alert Management tab. The Platform Events screen appears. 3 Select the Generate Alert option beside each event for which you want an alert to be generated.
  • Page 96: Configuring E-Mail Alerts

    The Community String value indicates the community string to use in a Simple Network Management Protocol (SNMP) alert trap sent from iDRAC6. SNMP alert traps are transmitted by iDRAC6 when a platform event occurs. The default setting for the Community String is Public.
  • Page 97: Configuring Ipmi Over Lan

    You may specify up to four email alert destinations. Configuring IPMI Over LAN 1 Log in to iDRAC6 Web interface. 2 Configure IPMI over LAN: Click System→ Remote Access→ iDRAC6, and then click the Network/Security tab. The Network screen appears. Click IPMI Settings.
  • Page 98: Adding And Configuring Idrac6 Users

    Configure IP filtering and blocking settings as needed in the Advanced Settings page. Adding and Configuring iDRAC6 Users To manage your system with iDRAC6 and maintain system security, create unique users with specific administrative permissions (or role-based authority). To add and configure iDRAC6 users, perform the following steps: NOTE: You must have Configure iDRAC permission to perform the following steps.
  • Page 99 When Checked, indicates that the user’s access to iDRAC6 is enabled. When Unchecked, user access is disabled. User Name Specifies an iDRAC6 user name with up to 16 characters. Each user must have a unique user name. NOTE: User names on iDRAC6 cannot include the / (forward slash) or .
  • Page 100 Table 5-11. Other Privilege Property Description iDRAC6 Group Specifies the user’s maximum iDRAC6 user privilege as one of the following: Administrator, Power User, Guest User, Custom, or None. See Table 5-12 for iDRAC6 Group permissions. Login to iDRAC6 Enables the user to log in to iDRAC6.
  • Page 101: Securing Idrac6 Communications Using Ssl And Digital Certificates

    Table 5-12. iDRAC6 Group Permissions (continued) User Group Permissions Granted Custom Selects any combination of the following permissions: Login to iDRAC6, Configure iDRAC6, Configure Users, Clear Logs, Execute Server Control Commands, Access Console Redirection, Access Virtual Media, Test Alerts, Execute Diagnostic Commands None No assigned permissions Table 5-13.
  • Page 102: Secure Sockets Layer (Ssl)

    Secure Sockets Layer (SSL) iDRAC6 includes a Web server that is configured to use the industry-standard SSL security protocol to transfer encrypted data over a network. Built upon public-key and private-key encryption technology, SSL is a widely accepted technology for providing authenticated and encrypted communication between clients and servers to prevent eavesdropping across a network.
  • Page 103: Accessing The Ssl Main Menu

    After the CA approves the CSR and sends the certificate, upload the certificate to iDRAC6 firmware. The CSR information stored on iDRAC6 firmware must match the information contained in the certificate, that is, the certificate must have been generated in response to the CSR created by iDRAC6.
  • Page 104: Generating A New Certificate Signing Request

    Each new CSR overwrites any previous CSR data stored in the firmware. The CSR in the firmware must match the certificate returned from the CA. Otherwise, iDRAC6 will not accept the certificate. 1 On the SSL screen, select Generate a New Certificate Signing Request (CSR) and click Next.
  • Page 105: Uploading A Server Certificate

    The File Path value displays the file path of the certificate you are uploading. You must enter the file path, which includes the full path and the complete file name and file extension. 3 Click Apply. 4 Click the appropriate button to continue. See Table 5-18. Configuring iDRAC6 Enterprise Using the Web Interface...
  • Page 106: Viewing A Server Certificate

    Description Print Prints the View Server Certificate values that appear on the screen. Refresh Reloads the View Server Certificate screen. Go Back to SSL Main Menu Return to the SSL Main Menu screen. Configuring iDRAC6 Enterprise Using the Web Interface...
  • Page 107: Configuring And Managing Active Directory Certificates

    Test Settings Allows you to test the Active Directory configuration using the settings you specified. Kerberos Keytab Allows you to upload the Kerberos Keytab to iDRAC6. For Upload information on how to create a keytab file, see "Enabling Kerberos Authentication".
  • Page 108: Configuring Active Directory (Standard Schema And Extended Schema)

    LDAP over Secure Socket Layer (SSL) while connecting to Active Directory. By default, iDRAC6 provides strong security by using the CA certificate loaded in iDRAC6 to validate the SSL server certificate of the domain controllers during SSL handshake. Certificate validation can be disabled for testing purposes.
  • Page 109 Smart Card operation. However, Windows Vista supports such usage. Enable Single Sign-on Select this option if you want to log into iDRAC6 without entering your domain user authentication credentials, such as user name and password. If you enable Single Sign–on (SSO) and then logout, you can log back in using SSO.
  • Page 110 (FQDN) of the Domain Controllers. NOTE: Configuration of at least one of the 3 Domain Controller addresses is required. iDRAC6 attempts to connect to each of the configured addresses in order until a successful connection is made. If Extended Schema is selected, the addresses represent the domain controllers where iDRAC6 device object and the Association objects are located.
  • Page 111 Group Domain: Specifies the group domain type where the Role Group resides. Group Privilege: Specifies the group privilege level. These settings will be displayed only if iDRAC6 has been configured for use with a Standard Active Directory Schema. Table 5-24. Role Group Privileges...
  • Page 112 Login to iDRAC Custom Selects any combination of the following permissions: Login to iDRAC, Configure iDRAC, Configure Users, Clear Logs, Execute Server Control Commands, Access Console Redirection, Access Virtual Media, Test Alerts, Execute Diagnostic Commands Configuring iDRAC6 Enterprise Using the Web Interface...
  • Page 113: Viewing An Active Directory Ca Certificate

    The default setting for local configuration access is Enabled. Enabling Local Configuration Access 1 Click System→ Remote Access→ iDRAC6→ Network/Security→Services. 2 Under Local Configuration, click to Uncheck the Disable iDRAC6 local USER Configuration Updates to enable access. 3 Click Apply.
  • Page 114: Configuring Idrac6 Services

    Configuring iDRAC6 Services NOTE: To modify these settings, you must have Configure iDRAC6 permission. NOTE: When you apply changes to services, the changes take effect immediately. Existing connections may be terminated without warning. NOTE: There is a known issue with the Telnet client supplied with Microsoft Windows.
  • Page 115 HTTP Port Number The port on which iDRAC6 listens for a browser connection. The default is 80. HTTPS Port Number The port on which iDRAC6 listens for a secure browser connection. The default is 443. Table 5-28. SSH Settings Setting...
  • Page 116: Updating Idrac6 Firmware

    NOTE: The firmware update, by default, retains the current iDRAC6 settings. During the update process, you have the option to reset iDRAC6 configuration to the factory defaults. If you set the configuration to the factory defaults, external network access will be disabled when the update completes. You must enable and configure the network using iDRAC6 Configuration Utility or the CMC Web interface.
  • Page 117 In the default settings, the LAN is disabled. You will not be able to log in to iDRAC6 Web interface. You will have to reconfigure the LAN settings using the CMC Web interface or iKVM using iDRAC6 Configuration Utility during BIOS POST.
  • Page 118: Updating Idrac6 Firmware Using The Cmc

    3 Click Chassis in the system tree. 4 Click the Update tab. The Firmware Update screen appears. 5 Select iDRAC6 or iDRAC6s of the same model to update by selecting the Update Targets check box. 6 Click the Apply iDRAC6 Enterprise Update button below iDRAC6 component list.
  • Page 119 On successful completion, it shows that the process completed successfully. If the firmware rollback is successful, iDRAC6 will reset automatically. To continue working with iDRAC6 through the web interface, close the current browser and reconnect to iDRAC6 using a new browser window.
  • Page 120 Configuring iDRAC6 Enterprise Using the Web Interface...
  • Page 121: Active Directory

    Microsoft Active Directory service software, you can configure the software to provide access to iDRAC6, allowing you to add and control iDRAC6 user privileges to your existing users in your Active Directory software. NOTE: Using Active Directory to recognize iDRAC6 users is supported on the ®...
  • Page 122: Prerequisites For Enabling Active Directory Authentication For Idrac6

    Supported Active Directory Authentication Mechanisms You can use Active Directory to define user access on iDRAC6 through two methods: you can use the extended schema solution, which Dell has customized to add Dell-defined Active Directory objects. Or, you can use the standard schema solution, which uses Active Directory group objects only.
  • Page 123: Extended Schema Active Directory Overview

    Directory Schema" and "Installing the Dell Extension to the Active Directory Users and Computers Snap-In." For further details on extending the schema for iDRAC6 and installing the Active Directory Users and Computers MMC Snap-in, see the Dell OpenManage Installation and Security User’s Guide available on support.dell.com/manuals.
  • Page 124: Overview Of Idrac6 Schema Extensions

    Active Directory Object Overview For each physical iDRAC6 device on the network that you want to integrate with Active Directory for Authentication and Authorization, create at least one Association Object and one iDRAC6 Device Object. You can create multiple Association Objects, and each Association Object can be linked to as many users, groups of users, or iDRAC6 Device Objects as required.
  • Page 125 The Dell extension to the ADUC MMC Snap-in only allows associating the Privilege Object and iDRAC6 Objects from the same domain with the Association Object. The Dell extension does not allow a group or an iDRAC6 object from other domains to be added as a product member of the Association Object.
  • Page 126: Accumulating Privileges Using Extended Schema

    The figure shows two Association Objects—A01 and A02. User1 is associated to iDRAC2 through both association objects. Therefore, User1 has accumulated privileges that are the result of combining the privileges set for objects Priv1 and Priv2 on iDRAC2. Using iDRAC6 With Microsoft Active Directory...
  • Page 127: Configuring Extended Schema Active Directory To Access Idrac6

    2 Extend the Active Directory Users and Computers Snap-in (see "Installing the Dell Extension to the Active Directory Users and Computers Snap-In"). 3 Add iDRAC6 users and their privileges to Active Directory (see "Adding iDRAC6 Users and Privileges to Active Directory").
  • Page 128 • LDIF script file If you use the LDIF script file, the Dell organizational unit will not be added to the schema. The LDIF files and Dell Schema Extender are located on your Dell Systems Management Tools and Documentation DVD in the following respective directories: •...
  • Page 129 1.2.840.113556.1.8000.1280.1.1.1.5 Table 6-3. dellRacDevice Class 1.2.840.113556.1.8000.1280.1.7.1.1 Description Represents the Dell iDRAC6 device. iDRAC6 must be configured as delliDRACDevice in Active Directory. This configuration enables iDRAC6 to send Lightweight Directory Access Protocol (LDAP) queries to Active Directory. Class Type Structural Class...
  • Page 130 Table 6-6. dellPrivileges Class 1.2.840.113556.1.8000.1280.1.1.1.4 Description Used as a container Class for the Dell Privileges (Authorization Rights). Class Type Structural Class SuperClasses User Attributes dellRAC4Privileges Table 6-7. dellProduct Class 1.2.840.113556.1.8000.1280.1.1.1.5 Description The main class from which all Dell products are derived.
  • Page 131 1.2.840.113556.1.8000.1280.1.1.2.7 TRUE TRUE if the user has Server Reset Boolean (LDAPTYPE_BOOLEAN rights on the device. 1.3.6.1.4.1.1466.115.121.1.7) dellIsConsoleRedirectUser 1.2.840.113556.1.8000.1280.1.1.2.8 TRUE TRUE if the user has Console Boolean (LDAPTYPE_BOOLEAN Redirection rights on the device. 1.3.6.1.4.1.1466.115.121.1.7) Using iDRAC6 With Microsoft Active Directory...
  • Page 132 1.2.840.113556.1.4.905) dellAssociationObjectMembers forward link dellAssociationMembers 1.2.840.113556.1.8000.1280.1.1.2.14 FALSE List of Distinguished Name (LDAPTYPE_DN 1.3.6.1.4.1.1466.115.121.1.12) dellAssociationObjectMembers that This belong to this Product. attribute is the backward link to the dellProductMembers linked attribute. Link ID: 12071 Using iDRAC6 With Microsoft Active Directory...
  • Page 133: Active Directory Users And Computers Snap-In

    Installing the Administrator Pack You must install the Administrator Pack on each system that is managing the Active Directory iDRAC6 Objects. If you do not install the Administrator Pack, you cannot view the Dell iDRAC6 Object in the container. See "Opening the Active Directory Users and Computers Snap-In" for more information.
  • Page 134: Adding Idrac6 Users And Privileges To Active Directory

    2 Select New→ Dell Remote Management Object Advanced. The New Object window appears. 3 Enter a name for the new object. The name must be identical to iDRAC6 name that you will enter in Step A of "Configuring Active Directory With Extended Schema Using iDRAC6 Web Interface."...
  • Page 135 (see Table 5-11). Creating an Association Object NOTE: iDRAC6 Association Object is derived from Group and its scope is set to Domain Local. 1 In the Console Root (MMC) window, right-click a container.
  • Page 136: Extended Schema Using Idrac6 Web Interface

    2 Enter iDRAC6 devices or iDRAC6 device group name and click OK. 3 In the Properties window, click Apply and click OK. Click the Products tab to add one iDRAC6 device connected to the network that is available for the defined users or user groups. You can add multiple iDRAC6 devices to an Association Object.
  • Page 137 You can choose from the list, and then you only need to enter the user name. 11 In the Timeout field, enter the number of seconds you want iDRAC6 to wait for Active Directory responses. 12 Enter the Domain Controller Server Address. You can enter up to three...
  • Page 138: Configuring Active Directory With Extended Schema Using Racadm

    18 Scroll to the bottom of the screen and click Test Settings. The Test Active Directory Settings screen appears. 19 Enter your iDRAC6 user name and password, and then click Start Test. The test results and the test log displays. For additional information, see "Testing Your Configurations."...
  • Page 139 Firmware SSL Certificate" for additional information. racadm sslcertdownload -t 0x1 -f < RAC SSL certificate > 2 If DHCP is enabled on iDRAC6 and you want to use the DNS provided by the DHCP server, enter the following RACADM command: racadm config -g cfgLanNetworking -o...
  • Page 140: Overview

    <secondary DNS IP address> 4 If you want to configure a list of user domains so that you only need to enter the user name during log in to iDRAC6 Web interface, enter the following command: racadm config -g cfgUserDomain -o cfgUserDomainName <fully qualified domain name or...
  • Page 141 On the Active Directory side, a standard group object is used as a role group. A user who has iDRAC6 access will be a member of the role group. To give this user access to a specific iDRAC6 card, the role group name and its domain name need to be configured on the specific iDRAC6 card.
  • Page 142: Single Domain Versus Multiple Domain Scenarios

    In this single domain scenario, any group type is supported. If all of the login users and role groups, or any of the nested groups, are from multiple domains, then Global Catalog server addresses are required to be configured on iDRAC6.
  • Page 143: Configuring Standard Schema Active Directory To Access Idrac6

    Directory Users and Computers Snap-in. 2 Create a group or select an existing group. The name of the group and the name of this domain must be configured on iDRAC6 by using either the Web interface or RACADM (see "Configuring Active Directory With Standard Schema Using iDRAC6 Web Interface"...
  • Page 144 You can choose from the list, and then you only need to enter the user name. 13 In the Timeout field, enter the number of seconds you want iDRAC6 to wait for Active Directory responses. 14 Enter the Domain Controller Server Address. You can enter up to three...
  • Page 145 And, in this multiple domain case, only the Universal Group can be used. If you use iDRAC6 Web GUI to configure Active Directory, you need to enter a Global Address even though the user and group are in the same domain.
  • Page 146: Configuring Active Directory With Standard Schema Using Racadm

    NOTE: You must have a DNS server configured properly on iDRAC6 to support Active Directory log in. Navigate to the Network screen (click System→ Remote Access→ iDRAC6, and then click the Network/Security→ Network tab) to configure DNS server(s) manually or use DHCP to get DNS server(s).
  • Page 147 NOTE: At least one of the 3 addresses is required to be configured. iDRAC6 attempts to connect to each of the configured addresses one-by-one until a successful connection is made. With Standard Schema, these are the addresses of the domain controllers where the user accounts and the role groups are located.
  • Page 148: Testing Your Configurations

    Firmware SSL Certificate" for additional information. racadm sslcertdownload -t 0x1 -f < RAC SSL certificate > 2 If DHCP is enabled on iDRAC6 and you want to use the DNS provided by the DHCP server, enter the following RACADM commands: racadm config -g cfgLanNetworking -o...
  • Page 149: Enabling Ssl On A Domain Controller

    After you finish configuring settings in iDRAC6 Web interface, click Test Settings at the bottom of the screen. You will be required to enter a test user's name (for example, username@domain.com) and password to run the test. Depending on your configuration, it may take some time for all of the test steps to complete and display the results of each step.
  • Page 150: Certificate

    If the Active Directory Server is set to authenticate the client during an SSL session initialization phase, you need to upload iDRAC6 Server certificate to the Active Directory Domain controller as well. This additional step is not required if the Active Directory does not perform a client authentication during an SSL session’s...
  • Page 151: Using Active Directory To Log In To Idrac6

    6 Click Finish and click OK. Using Active Directory to Log In to iDRAC6 You can use Active Directory to log in to iDRAC6 using one of the following methods: • Web interface •...
  • Page 152: Using Active Directory Single Sign-On

    3 In the system tree, select System→ Remote Access→ iDRAC6→ Network/Security→ Network. In the Network page, verify whether the DNS iDRAC6 Name is correct and matches with the name used for iDRAC6 fully qualified domain name. 4 In the system tree, select System→ Remote Access→ iDRAC6→...
  • Page 153 9 Select the Active Directory Enabled check box. 10 Select Enable Single Sign-on if you want to log into iDRAC6 directly after logging into your workstation without entering your domain user authentication credentials, such as user name and password.
  • Page 154: Logging Into Idrac6 Using Single Sign-On

    Frequently Asked Questions Active Directory Log In Issues It takes nearly 4 minutes to log into iDRAC6 using Active Directory Single Sign–On. The normal Active Directory Single Sign–On login usually takes less than 10 seconds but it may take nearly 4 minutes to log into iDRAC6 using Active Directory Single Sign–On if you have specified the Preferred DNS Server and...
  • Page 155 User is a member of that Group. Now if I try to log in to iDRAC6 using the User present in the child domain, Active Directory Single Sign-On login fails. This may be because of the wrong Group type. There are two kinds of Group types in the Active Directory server: •...
  • Page 156 For example, use servername.example.com and not example.com. What should I check if I cannot log in to iDRAC6 using Active Directory? First, diagnose the problem using the Test Settings feature. For directions, see "My Active Directory log in failed. What do I do?"...
  • Page 157 1 Ensure that you use the correct user domain name during a log in and not the NetBIOS name. 2 If you have a local iDRAC6 user account, log in to iDRAC6 using your local credentials. 3 Check the following settings: Navigate to the Active Directory Configuration and Management screen.
  • Page 158: Active Directory Certificate Validation

    SSL handshake. Why does iDRAC6 enable certificate validation by default? iDRAC6 enforces strong security to ensure the identity of the domain controller that iDRAC6 connects to. Without certificate validation, a hacker could spoof a domain controller and hijack the SSL connection. If you choose to trust all the domain controllers in your security boundary without certificate validation, you can disable it through the GUI or the CLI.
  • Page 159: Miscellaneous

    Does iDRAC6 always use LDAP over SSL? Yes. All the transportation is over secure port 636 and/or 3269. During test settings, iDRAC6 does a LDAP CONNECT only to help isolate the problem, but it does not do an LDAP BIND on an insecure connection.
  • Page 160 Using iDRAC6 With Microsoft Active Directory...
  • Page 161: Authentication

    The Remote Access Information screen appears. 4 Click the Network/Security tab. Select Network and verify whether the DNS iDRAC6 Name is correct and matches with the name used for iDRAC6 fully qualified domain name. Select the Active Directory tab. The Active Directory Configuration and Management summary screen appears.
  • Page 162 "Enabling Kerberos Authentication". Clear the Enable Smart–Card Login option to disable the TFA Smart Card logon feature. The next time you login to iDRAC6 GUI, you are prompted for ® ® a Microsoft...
  • Page 163: Logging Into Idrac6 Using Active Directory Smart Card Authentication

    Troubleshooting the Smart Card Logon in iDRAC6 Use the following tips to help you debug an inaccessible Smart Card: It takes nearly 4 minutes to log into iDRAC6 using Active Directory Smart Card login. The normal Active Directory Smart Card login usually takes less than 10...
  • Page 164 Unable to Log into iDRAC6 as an Active Directory User • If you cannot log into iDRAC6 as an Active Directory user, try to log into iDRAC6 without enabling the Smart Card logon. You can disable the Smart Card logon through racadm using the following command: racadm config –g cfgSmartCard –o...
  • Page 165 (through Remote or Telnet/SSH RACADM): racadm config -g cfgRacTuning –o cfgRacTuneTimeZoneOffset <offset value in minutes>. For example, if the system time is GMT -6 (US CST) and time is 2PM, set the iDRAC6 time to GMT time " "...
  • Page 166 Configuring Smart Card Authentication...
  • Page 167: Enabling Kerberos Authentication

    Kerberos to support two types of authentication mechanisms— Active Directory single sign-on and Active Directory Smart Card logins. For single-sign on login, iDRAC6 uses the user credentials cached in the operating system after the user has logged in using a valid Active Directory account.
  • Page 168: Prerequisites For Single Sign-On And Active Directory Authentication Using Smart Card

    Windows Server Kerberos KDC service. The keytab obtained from the ktpass utility is made available to iDRAC6 as a file upload and is enabled to be a kerberized service on the network. Since iDRAC6 is a device with a non-Windows operating system, run the ktpass utility—part of Microsoft Windows—on the Domain Controller...
  • Page 169 <password> +DesOnly -out c:\krbkeytab NOTE: If you find any issues with the iDRAC6 user the keytab file is created for, create a new user and a new keytab file. If the same keytab file which was initially created is again executed, it will not configure correctly.
  • Page 170: Using Smart Card

    Active Directory login. Also ensure that you have enabled the Active Directory logon setting. You must also enable the iDRAC6 to be a kerberized service by uploading a valid keytab file obtained from the Active Directory root domain, to iDRAC6.
  • Page 171: Configuring Active Directory Users For Smart Card Logon

    1 Log into your system using a valid Active Directory account. 2 Provide the iDRAC6 name in the address bar of your browser in the following format: https://idracname.domainname.com (for example, https://idrac–test.domain.com). NOTE: Depending on your browser settings, you may be prompted to download and install single sign-on plug-in when using this feature for the first time.
  • Page 172: Idrac6 Login Scenarios With Tfa And Sso

    Active Directory user attempting to log in iDRAC6 Login Scenarios with TFA and SSO When you login to iDRAC6 from the CMC Web GUI, iDRAC6 displays the following login screens options for various TFA and SSO enablement combinations, with different versions of iDRAC/iDRAC6 and CMC: •...
  • Page 173: Health Of The Managed Server

    Click System→ Properties tab→ System Summary to obtain information about the Main System Enclosure and iDRAC6. Main System Enclosure System Information This section of iDRAC6's Web interface provides the following basic information about the managed server: • Description — The model number or name of the managed server •...
  • Page 174: Integrated Dell Remote Access Controller 6 - Enterprise

    Card Type — Displays the model name of the installed storage card Auto Recovery This section of iDRAC6 Web interface details the current mode of operation of the Auto Recovery feature of the managed server as set by Open Manage Server Administrator: •...
  • Page 175 NOTE: The IPv4 protocol option is enabled by default. • DHCP Enabled — Enabled if iDRAC6 is set to fetch its IP address and associated info from a DHCP server • IP Address — Displays the IP address associated with iDRAC6 (not the managed server) •...
  • Page 176: Wwn/Mac

    Launching CMC Web GUI from iDRAC6 directs your search with the same IP address format. For example, if you open iDRAC6 Web GUI with an IPv6 address format, the CMC Web page will also open with a valid IPv6 address.
  • Page 177: Batteries

    Batteries The Batteries screen displays the status of the system board coin-cell battery that maintains the Real-Time Clock (RTC) and CMOS configuration data storage of the managed system. Temperatures The Temperatures screen displays the status and readings of the on–board ambient temperature probe.
  • Page 178: Post

    NOTE: Power and Amperage are measured in AC. The CPU screen reports the health of each CPU on the managed server. This health status is a roll-up of a number of individual thermal, power, and functional tests. POST The Post Code screen displays the last system post code (in hexadecimal) prior to booting the operating system of the managed server.
  • Page 179: Power Monitoring And Power Management

    Device (CPLD) present in the blade server. Updates to CPLD devices are available at the Dell Support website at support.dell.com under the System Firmware or System Board sections. Dell recommends that you update your blade server with the latest CPLD firmware version. The current CPLD firmware version is displayed in the iDRAC6 Web GUI.
  • Page 180: Power Monitoring

    See "Executing Power Control Operations on the Server." Power Monitoring iDRAC6 monitors the power consumption in PowerEdge servers continuously. iDRAC6 calculates the following power values and provides the information through its Web interface or RACADM CLI: • Cumulative System Power •...
  • Page 181 • Reading: The current power consumption in AC Amps Power Tracking Statistics and Peak Statistics • Statistic: – Cumulative System Power displays the current cumulative energy consumption (in kWh) for the server. The value represents the total energy used by the system. You can reset this value to 0 by clicking Reset at the end of the table row.
  • Page 182: Power Budgeting

    AC power consumptions a system under heavy workload will present to the datacenter. Before a server powers up, iDRAC6 provides CMC with its power envelope requirement. It may request a smaller power envelope after the server is powered up based on the actual power consumed by the server. If the power...
  • Page 183: Viewing Power Budget

    NOTE: To perform power management actions, you must have Administrative privilege. 1 Log in to iDRAC6 Web interface. 2 In the system tree, select System. 3 Click the Power Management tab, and then click Power Budget. The Power Budget screen appears.
  • Page 184 Using the Web Interface 1 Log in to iDRAC6 Web interface. 2 In the system tree, select System. 3 Click the Power Management tab, and then click Power Budget. The Power Budget screen appears. 4 Click Power Budget Threshold. NOTE: Power budget threshold is read-only and cannot be enabled or configured in iDRAC6.
  • Page 185: Power Control

    Power Control iDRAC6 enables you to remotely perform a power-on, power off, reset, graceful shutdown, non-masking interruption (NMI), or power cycle. Use the Power Control screen to perform an orderly shutdown through the operating system when rebooting and powering on or off.
  • Page 186 – Reset System (warm boot) reboots the system without powering off. This option is disabled if the system is already powered off. – Power Cycle System (cold boot) powers off and then reboots the system. This option is disabled if the system is already powered off. 5 Click Apply.
  • Page 187: Serial Over Lan

    1 Configure Serial Over LAN in BIOS (disabled by default) 2 Configure iDRAC6 for Serial over LAN 3 Select a method to initialize Serial Over LAN (SSH, Telnet, SOL Proxy, or IPMI Tool)
  • Page 188: Configuring Serial Over Lan In Idrac6 Web Gui

    Port Address is COM1. 5 Ensure that the Failsafe Baud Rate is identical to SOL baud rate that is configured on iDRAC6. The default value for both the failsafe baud rate and the iDRAC6 s SOL baud rate setting is 115.2 kbps.
  • Page 189 Over LAN screen. 6 Change the configuration on the Serial Over LAN Configuration Advanced Settings screen, if necessary. Dell recommends using the default values. Advanced Settings allows you to adjust SOL performance by changing the Character Accumulate Interval and Character Send Threshold values.
  • Page 190 Specifies the number of characters per SOL data packet. As soon Threshold as the number of characters accepted by iDRAC6 is equal to or greater than the Character Send Threshold value, iDRAC6 starts transmitting SOL data packets that contain numbers of characters equal to or less than the Character Send Threshold value.
  • Page 191: Using Serial Over Lan (Sol)

    The SSH or Telnet console that you use should be able to interpret and respond to the data arriving from the managed server's serial port. The serial port usually attaches to a shell that emulates an ANSI- or VT100/VT220–terminal.
  • Page 192: Model For The Sol Proxy

    Model for the SOL Proxy Telnet Client (port 623) ← → WAN connection ← → SOL Proxy ← → iDRAC6 server When the SOL Proxy communicates with the Telnet client on a management station, it uses the TCP/IP protocol. However, SOL proxy communicates with the managed server's iDRAC6 over the RMCP/IPMI/SOL protocol, which is a UDP-based protocol.
  • Page 193: Using Sol Over Putty

    If a SOL session is not closed successfully in the utility, more SOL sessions may not be available. The way to resolve this situation is to terminate the command line console in the Web GUI under System→ Remote Access→ iDRAC6→ Network/Security→ Sessions.
  • Page 194: Using Sol Over Openssh With Linux

    Follow the escape sequence properly to reach iDRAC6 command line console. Quit the SOL session (refer to "Disconnecting SOL session in iDRAC6 Command Line Console" to close an active SOL session). Using SOL over IPMItool The Dell Systems Management Tools and Documentation DVD provides the IPMItool which can be installed on various operating systems.
  • Page 195: Opening Sol With Sol Proxy

    4 To quit a SOL session from IPMItool, press <~> and <.> (press the tilde and period keys in sequence, one after the other). Try more than once since iDRAC6 may be busy to accept the keys. The SOL session will close. NOTE: If a user does not terminate the SOL session correctly, enter the following command to reboot iDRAC.
  • Page 196 BMC Management Utilities are installed in the following directory on Windows operating systems: C:\Program Files\Dell\SysMgt\bmc — (32–bit operating system) C:\Program Files (x86)\Dell\SysMgt\bmc — (64–bit operating system) The installation program copies the files to the following locations on Linux Enterprise Operating Systems: /etc/init.d/SOLPROXY.cfg...
  • Page 197 3 Locate DSM_BMU_SOLProxy in the list of services and right-click to start the service. Depending on the console you use, there are different steps for accessing SOL Proxy. Throughout this section, the management station where the SOL Proxy is running is referred as the SOL Proxy Server. For Linux The SOL Proxy will start automatically during system startup.
  • Page 198 1 Select option 1 in the main menu. 2 Enter iDRAC6 IP Address of the remote managed system. 3 Provide iDRAC6 Username and Password for iDRAC6 on the managed system. iDRAC6 username and password must be assigned and stored in iDRAC6 non-volatile storage.
  • Page 199 NOTE: If required, extend SOL session duration to infinite by changing the Telnet Timeout value to zero in iDRAC6 Web GUI under System→ Remote Access→ iDRAC6→ Network/Security→ Services. 4 Provide the IPMI encryption key if it was configured in the iDRAC.
  • Page 200: Operating System Configuration

    SOL Proxy. NOTE: If a user does not terminate the SOL session correctly, issue the following command to reboot iDRAC. Allow iDRAC6 1-2 minutes to complete booting. Refer to "RACADM Subcommand Overview" for more details. racadm racreset Operating System Configuration Complete the steps below to configure generic Unix-like operating systems.
  • Page 201 4:2345:respawn:/sbin/migetty tty1 5:2345:respawn:/sbin/migetty tty1 6:2345:respawn:/sbin/migetty tty1 # Run xdm in runlevel 5 x:5:respawn:/etc/X11/prefdm -nodaemon ______________________________________________________________ Example of modified /etc/inittab: ______________________________________________________________ # inittab This file describes how the INIT process should set up the system in a certain run-level. SKIP this part of file # Run gettys in standard runlevels 1:2345:respawn:/sbin/migetty tty1 2:2345:respawn:/sbin/migetty tty1...
  • Page 202 vc/1 vc/2 vc/3 vc/4 SKIP the rest of file ______________________________________________________________ Example of modified /etc/securetty: ______________________________________________________________ Console ttyS0 vc/1 vc/2 vc/3 vc/4 SKIP the rest of file ______________________________________________________________ 3 Edit the /boot/grub/grub.conf or /boot/grub/menu.list file to add boot options for SOL: Comment out the graphical display lines in the various Unix-like operating systems: •...
  • Page 203 NOTE: /boot/grub/grub.conf in Red Hat Enterprise Linux 5 is a symbolic link to /boot/grub/menu.list. You can change the settings in either one of them. Example of original /boot/grub/grub.conf in RHEL 5: ______________________________________________________________ # grub.conf generated by anaconda # Note that you do not have to return grub after making changes to this # file # NOTICE: You have a /boot partition.
  • Page 204 # NOTICE: You have a /boot partition. This means that all kernel and initrd paths are relative to /boot/, root (hd0,0) kernel /vmlinux-version ro root= /dev/VolGroup00/LogVol00 initrd /initrd-version.img #boot=/dev/sda default=0 timeout=5 #splashimage=(hd0,0)/grub/splash.xpm/gz hiddenmenu # Redirect the OS boot via SOL title Red Hat Enterprise Linux 5 SOL redirection root (hd0,0) kernel /vmlinuz-2.6.18-8.el5 ro root=...
  • Page 205: Windows 2003 Enterprise

    initrd /boot/initrd-2.6.16.46-0.12-bigsmp ______________________________________________________________ Example of modified /boot/grub/menu.list in SLES 10: ______________________________________________________________ #Modified by YaST2. Last modification on Sat Oct 11 21:52:09 UTC 2008 Default 0 Timeout 8 #gfxmenu (hd0.5)/boot/message ###Don't change this comment - YaST2 identifier: Original name: linux### title SUSE Linux Enterprise Server 10 SP1 SOL redirection root (hd0,5) kernel /boot/vmlinux-2.6.16-46-0.12-bigsmp root= /dev/disk/by-id/scsi-35000c5000155c resume=/dev/sda5...
  • Page 206 Example of original bootcfg setting: ______________________________________________________________ Boot Loader Settings -------------------- timeout:30 default:multi(0)disk(0)rdisk(0)partition(1)\WINDOWS Boot Entries ------------ Boot entry ID: Os Friendly Name: Winodws Server 2003, Enterprise Path: multi(0)disk(0)rdisk(0)partition(1)\WINDOWS OS Load Options: /nonexecute=optout /fastdetect /usepmtimer /redirect ______________________________________________________________ Example of modified bootcfg setting: ______________________________________________________________ Boot Loader Settings --------------------...
  • Page 207: Using Gui Console Redirection

    This section provides information about using iDRAC6 console redirection feature. Overview iDRAC6 console redirection feature enables you to remotely access local consoles in graphic or text mode, allowing you to control one or more iDRAC6-enabled systems from a single location.
  • Page 208: Supported Screen Resolutions And Refresh Rates

    2 If you are using Firefox or want to use the Java Viewer with Internet Explorer, install a Java Runtime Environment (JRE). See "Installing a Java Runtime Environment (JRE)." 3 Dell recommends that you configure your monitor display resolution to 1280x1024 pixels. NOTE:...
  • Page 209: Configuring Console Redirection And Virtual Media In Idrac6 Web Interface

    Configuring Console Redirection and Virtual Media in iDRAC6 Web Interface To configure console redirection in iDRAC6 Web interface, perform the following steps: 1 Click System and then click the Console/Media tab. 2 Click Configuration to open the Configuration screen. 3 Configure the console redirection properties. Table 12-2 describes the settings for console redirection.
  • Page 210 Choose USC/Diags if your server is not running on a Windows or Linux operating system. NOTE: You must select USC/Diags in HyperV, Dell Diagnostics, or USC. The default is Windows. Console Plug-In Type for IE When using Internet Explorer on a Windows operating...
  • Page 211: Opening A Console Redirection Session

    Saves any new settings made to the console redirection Opening a Console Redirection Session When you open a console redirection session, the Dell Virtual KVM (vKVM) Viewer Application (iDRACView) starts and the remote system’s desktop appears in the viewer. Using iDRACView, you can control the remote system’s mouse and keyboard functions from your local management station.
  • Page 212 If your client runs on an operating system other than Windows, then you must use the Java Viewer. If you are accessing iDRAC6 using Internet Explorer while running on a Windows operating system, you may choose either Active-X or Java as the plug-in type.
  • Page 213: Using The Video Viewer

    If one or more Security Alert windows appear in the following steps, read the information in the window and click Yes to continue. The management station connects to iDRAC6 and the remote system’s desktop appears in the iDRACView. 4 Two mouse pointers appear in the viewer window: one for the remote system and one for your local system.
  • Page 214 Table 12-6. Viewer Menu Bar Selections Menu Item Item Description Video Pause Temporarily pauses console redirection. Resume Resumes console redirection. Refresh Redraws the viewer screen image. Capture Captures the current remote system screen to a .bmp Current Screen file on Windows or a .png file on Linux. A dialog box is displayed that allows you to save the file to a specified location.
  • Page 215 Synchronizes the cursor so that the mouse on the Cursor client is redirected to the mouse on the server. Hide Local Only the cursor from the KVM will be displayed. Cursor Dell recommends this setting when running USC in a vKVM. Using GUI Console Redirection...
  • Page 216 Table 12-6. Viewer Menu Bar Selections (continued) Menu Item Item Description Options Color Mode Allows you to select a color depth to improve performance over the network. For example, if you are installing software from virtual media, you can choose the lowest color depth, so that less network bandwidth is used by the console viewer leaving more bandwidth for transferring data from the media.
  • Page 217: Synchronizing The Mouse Pointers

    Linux before you launch the viewer. See "Configuring Console Redirection and Virtual Media in iDRAC6 Web Interface" for help with configuration. The operating system’s default mouse settings are used to control the mouse arrow in iDRAC6 Console Redirection screen. Disabling or Enabling Local Console You can configure iDRAC6 to disallow iKVM connections using iDRAC6 Web interface.
  • Page 218: Frequently Asked Questions

    Is there a time delay No, once a local video turn ON request is received by when turning on the iDRAC6 the video is turned on instantly. local video? Can the local user also Yes, a local user can use the local RACADM CLI to turn off turn off the video? the video.
  • Page 219 What privileges are Any user with iDRAC6 configuration privileges can turn the needed for an iDRAC6 local console on or off. user to turn on or off the local server video?
  • Page 220 Windows 2000 operating system? Why doesn’t the The Dell BIOS is emulating the mouse driver as a PS/2 mouse sync in DOS mouse. By design, the PS/2 mouse uses relative position for when performing the mouse pointer, which causes the lag in syncing. iDRAC6...
  • Page 221 Table 12-7. Using Console Redirection: Frequently Asked Questions (continued) Question Answer Why doesn’t the Num When accessed through iDRAC6, the Num Lock indicator Lock indicator on my on the management station does not necessarily coincide management station with the state of the Num Lock on the remote server. The...
  • Page 222 Using GUI Console Redirection...
  • Page 223: Card For Use With Idrac6

    Use With iDRAC6 The vFlash media card is a Secure Digital (SD) card that plugs into the optional iDRAC6 Enterprise card slot at the back corner of the system. It provides storage space that behaves like a common USB Flash Key device.
  • Page 224: Removing A Vflash Media Card

    The ManagedStore.IMG and ManagedStore.ID files seen on the vFlash GUI page are not visible on the host server's operating system but are on the SD card. To disable, clear the vFlash Enable check box. 7 Click Apply. Configuring the vFlash Media Card for Use With iDRAC6...
  • Page 225: Formatting The Vflash Media Card

    5 Ensure that vFlash is disabled. Clear the vFlash Enable check box. 6 In the vFlash Drive section, enter the path to the image file or click Browse to navigate to its location on your system. Configuring the vFlash Media Card for Use With iDRAC6...
  • Page 226: Viewing The Vflash Key Size

    If you upload a bootable image, you can boot the server to that image. Currently iDRAC6 does not support .iso image through vFlash. The only image that is currently supported is .img like bootable floppy image. iDRAC6 emulates the vFlash device as a floppy device to the BIOS/operating system.
  • Page 227: Resetting The Vflash Media Card

    If a card is not present, the following message is displayed: ERROR: Unable to perform the requested operation Ensure that a SD Card is inserted. Configuring the vFlash Media Card for Use With iDRAC6...
  • Page 228 Configuring the vFlash Media Card for Use With iDRAC6...
  • Page 229: Configuring And Using Virtual Media

    Configuring and Using Virtual Media Overview The Virtual Media feature, accessed through the console redirection viewer, provides the managed server access to media connected to a remote system on the network. Figure 14-1 shows the overall architecture of Virtual Media. Figure 14-1.
  • Page 230: Windows-Based Management Station

    Using Virtual Media, administrators can remotely boot their managed servers, install applications, update drivers, or even install new operating systems remotely from the virtual CD/DVD and diskette drives. NOTE: Virtual media requires a minimum available network bandwidth of 128 Kbps. Virtual media defines two devices for the managed server’s operating system and BIOS: a floppy disk device and an optical disk device.
  • Page 231: Linux-Based Management Station

    Depending on your version of Internet Explorer, a custom security setting for ActiveX may be required: 1 Start Internet Explorer. 2 Click Tools→ Internet Options, and then click the Security tab. 3 Under Select a Web content zone to specify its security settings, click to select the desired zone.
  • Page 232: Configuring Virtual Media

    Configuring Virtual Media 1 Log in to iDRAC6 Web interface. 2 Click System→ Console/Media→ Configuration. 3 In the Virtual Media section, select values for the settings. See Table 14-2 for information on Virtual Media configuration values. 4 Click Apply to save your settings.
  • Page 233: Running Virtual Media

    The Console Viewer window application must remain active while you access the virtual media. 1 Open a supported Web browser on your management station. 2 Log in to iDRAC6 Web interface. 3 Click the Console/Media tab. The Console Redirection and Virtual Media screen appears.
  • Page 234 In other words, iDRAC6 supports same media (Read only) redirection to two different iDRAC6 blades. But with an USB media, you will not be able to attach to two iDRAC6 blades. iDRAC6 displays a warning message indicating the same.
  • Page 235: Disconnecting Virtual Media

    The media is connected and the Status window is updated. 10 Click Close. Disconnecting Virtual Media 1 Select Media→ Virtual Media Wizard. The Media Redirection Wizard appears. 2 Click Disconnect next to the media you wish to disconnect. The media is disconnected and the Status window is updated. 3 Click Close.
  • Page 236: Installing Operating Systems Using Virtual Media

    Installing Operating Systems Using Virtual Media This section describes a manual, interactive method to install the operating system on your management station that may take several hours to complete. A scripted operating system installation procedure using Virtual Media may take fewer than 15 minutes to complete. See "Deploying the Operating System"...
  • Page 237 Why? link between the server and the Virtual Drive. If the Virtual Media configuration settings are changed in iDRAC6 Web interface or by local RACADM commands, any connected media is disconnected when the configuration change is applied.
  • Page 238 Why? installation procedure may require an extended amount of time to access iDRAC6 Web interface due to network latency. While the installation window does not indicate the installation progress, the installation procedure is in progress.
  • Page 239 How can I make my USB key Search support.dell.com for the Dell Boot Utility, a bootable? Windows program you can use to make your Dell USB key bootable. You can also boot with a Windows 98 startup disk and copy system files from the startup disk to your USB key.
  • Page 240 1. In step 3, read the result of the grep command and locate the device name that is given to the Dell Virtual Floppy. Ensure that you are attached and connected to the Virtual Floppy Drive.
  • Page 241: Using The Racadm Command Line Interface

    The RACADM command line interface (CLI) provides access to iDRAC6 management features on the managed server. RACADM provides access to most of the features on iDRAC6 Web interface. RACADM can be used in scripts to ease configuration of multiple servers, instead of using the Web interface, which, is more useful for interactive management.
  • Page 242: Racadm Subcommands

    CAUTION: The latest iDRAC6 firmware supports only the latest RACADM version. You may encounter errors if you use an older version of RACADM to query iDRAC6 with the latest firmware. Install the RACADM version shipped with your latest Dell™ OpenManage™ DVD media.
  • Page 243 Table 15-1. RACADM Subcommands (continued) Command Description gettracelog Displays iDRAC6 trace log. If used with -i, the command displays the number of entries in iDRAC6 trace log. help Lists iDRAC6 subcommands. help <subcommand> Lists usage statement for the specified subcommand.
  • Page 244: Supported Racadm Interfaces

    Forces iDRAC6 to send an e-mail over iDRAC6 NIC. testtrap Forces iDRAC6 to send an SNMP alert over iDRAC6 NIC. traceroute Traces the network path of routers that packets take as they are forwarded from your system to a destination IPv4 address.
  • Page 245 Table 15-2. RACADM Subcommand Interface Support (continued) Subcommand Telnet/SSH Local RACADM Remote RACADM getconfig getniccfg getraclog getractime getsel getssninfo getsvctag getsysinfo gettracelog help ifconfig krbkeytabupload localconredirdisable netstat ping ping6 racdump racreset racresetcfg remoteimage serveraction Using the RACADM Command Line Interface...
  • Page 246: Using Local Racadm Commands

    Table 15-2. RACADM Subcommand Interface Support (continued) Subcommand Telnet/SSH Local RACADM Remote RACADM setniccfg sshpkauth sslcertdownload sslcertupload sslcertview sslcsrgen (can only generate, not download) sslkeyupload testemail testtrap traceroute traceroute6 usercertupload usercertview version vmdisconnect vmkey = Supported; =Not supported Using local RACADM Commands You run RACADM commands locally (on the managed server) from a command prompt or shell prompt.
  • Page 247: Using The Racadm Utility To Configure Idrac6

    The command displays the syntax and command-line options for the subcommand. Using the RACADM Utility to Configure iDRAC6 This section describes how to use RACADM to perform various iDRAC6 configuration tasks. Displaying Current iDRAC6 Settings The RACADM getconfig subcommand retrieves current configuration settings from iDRAC6.
  • Page 248: Managing Idrac6 Users With Racadm

    Use caution when using the racresetcfg command, as all configuration parameters are reset to the original defaults. Any previous changes are lost. NOTE: If you are configuring a new iDRAC6 or if you ran the racadm racresetcfg command, the only current user is root with the password calvin. NOTE: Users can be enabled and disabled over time.
  • Page 249: Adding An Idrac6 User

    Adding an iDRAC6 User To add a new user to iDRAC6, perform the following steps: 1 Set the user name. 2 Set the password. 3 Set the Login to iDRAC6 user privilege. 4 Enable the user. Example The following example describes how to add a new user named "John" with a "123456"...
  • Page 250: Removing An Idrac6 User

    The following example shows how to test the e-mail alert feature to ensure that iDRAC6 can properly send e-mail alerts across the network.
  • Page 251: Testing Idrac6 Snmp Trap Alert Feature

    (-i 2 is for the index entry #2 in the e–mail alert table) NOTE: Before you test iDRAC6 SNMP trap alerting feature, ensure that the SNMP and trap settings are configured correctly. See the testtrap and testemail subcommand descriptions to configure these settings. See "Configuring Platform Event Traps (PET)"...
  • Page 252: Configuring Ipmi Over Lan

    -g cfgLanNetworking -o cfgDNSDomainName MYDOMAIN NOTE: If cfgNicEnable is set to 0, iDRAC6 LAN is disabled even if DHCP is enabled. Configuring IPMI Over LAN 1 Configure IPMI over LAN by entering the following command: racadm config -g cfgIpmiLan -o cfgIpmiLanEnable 1...
  • Page 253 2 Set the IPMI LAN channel encryption key, if required, using a command such as the following: NOTE: iDRAC6 IPMI supports the RMCP+ protocol. See the IPMI 2.0 specifications for more information. racadm config -g cfgIpmiLan -o cfgIpmiEncryptionKey <key>...
  • Page 254: Configuring Pef

    <id> is the user’s unique ID. Configuring PEF You can configure the action you wish iDRAC6 to take for each platform alert. Table 15-4 lists the possible actions and the value to identify them in RACADM. Table 15-4. Platform Event Action...
  • Page 255: Configuring Pet

    racadm config -g cfgIpmiPef -o cfgIpmiPefAction -i < index > < action-value > where <index> is the PEF index (Table 5-8), and <action-value> is a value from Table 15-4. For example, to enable PEF to reboot the system and send an IPMI alert when a processor critical event is detected, enter the following command: racadm config -g cfgIpmiPef -o cfgIpmiPefAction -i 9 2...
  • Page 256 Configuring E-mail Alerts 1 Enable global alerts by entering the following command: racadm config -g cfgIpmiLan -o cfgIpmiLanAlertEnable 1 2 Enable e-mail alerts by entering the following commands: racadm config -g cfgEmailAlert -o cfgEmailAlertEnable -i < index > <0|1> where <index> is the e-mail destination index and 0 disables the e-mail alert or 1 enables the alert.
  • Page 257: Configuring Ip Filtering (Ip Range)

    Configuring IP Filtering (IP Range) IP address filtering (or IP Range Checking) allows iDRAC6 access only from clients or management workstations whose IP addresses are within a user-specified range. All other login requests are denied. IP filtering compares the IP address of an incoming login to the IP address range that is specified in the following cfgRacTuning properties: •...
  • Page 258: Configuring Ip Filtering

    Configuring IP Filtering To configure IP filtering in the Web interface, follow these steps: 1 Click System→ Remote Access→ iDRAC6→ Network/Security. 2 On the Network screen, click Advanced Settings. 3 Select the IP Range Enabled checkbox and enter the IP Range Address and IP Range Subnet Mask.
  • Page 259: Configuring Ip Blocking

    When login attempts are refused from the client IP address, some SSH clients may display the following message: ssh exchange identification: Connection closed by remote host. See "iDRAC6 Enterprise Property Database Group and Object Definitions" for a complete list of cfgRacTune properties. Using the RACADM Command Line Interface...
  • Page 260 "Log In Retry Restriction (IP Blocking) Properties" lists the user-defined parameters. Table 15-6. Log In Retry Restriction (IP Blocking) Properties Property Definition cfgRacTuneIpBlkEnable Enables the IP blocking feature. When consecutive failures (cfgRacTuneIpBlkFailCount) from a single IP address are encountered within a specific amount of time (cfgRacTuneIpBlkFailWindow), all further attempts to establish a session from that address are rejected for a certain time span...
  • Page 261: Configuring Idrac6 Telnet And Ssh Services Using Local Racadm

    To disable the Telnet or SSH service, change the value from 1 to 0: racadm config -g cfgSerial -o cfgSerialTelnetEnable 0 racadm config -g cfgSerial -o cfgSerialSshEnable 0 Enter the following command to change the Telnet port number on iDRAC6: racadm config -g cfgRacTuning -o cfgRacTuneTelnetPort <new port number>...
  • Page 262: Remote And Ssh/Telnet Racadm

    NOTE: If the system from where you are accessing the remote system does not have an iDRAC6 certificate in its default certificate store, a message is displayed when you type a RACADM command. Security Alert: Certificate is invalid - Name on Certificate is invalid or does not match site name Continuing execution.
  • Page 263: Remote Racadm Usage

    -r 192.168.0.120 -u root -p calvin getsysinfo racadm -i -r 192.168.0.120 getsysinfo If the HTTPS port number of iDRAC6 has been changed to a custom port other than the default port (443), the following syntax must be used: racadm -r <iDRAC6 IP Address>:<port> -u <username> -p <password>...
  • Page 264: Using An Idrac6 Configuration File

    You can use the RACADM getconfig subcommand to generate a configuration file containing the current values from iDRAC6. You can then edit the file and use the RACADM config -f subcommand to load the file back into iDRAC6, or to copy the configuration to other iDRAC6s.
  • Page 265: Configuration File Syntax

    This group name must be specified before any of the objects in that group. Objects that do not include an associated group name generate an error. The configuration data is organized into groups as defined in "iDRAC6 Enterprise Property Database Group and Object Definitions."...
  • Page 266 If the parser encounters an indexed group, it is the value of the anchored object that differentiates the various indexes. The parser reads in all of the indexes from iDRAC6 for that group. Any objects within that group are simple modifications when iDRAC6 is configured.
  • Page 267: Modifying Idrac6 Ip Address In A Configuration File

    RACs being managed. New users are added to the first available index. A configuration file that parses and runs correctly on one iDRAC6 may not run correctly on another if all indexes are full and you must add a new user.
  • Page 268: Loading The Configuration File Into Idrac6

    NOTE: To verify the syntax only and not update iDRAC6 database, add the -c option to the config subcommand. Errors in the configuration file are flagged with the line number and a message that explains the problem.
  • Page 269 4 For each iDRAC6 you want to configure: Log in to the managed server and start a command prompt. If you want to reconfigure iDRAC6 from the default settings, enter the following command: racadm racreset...
  • Page 270 Using the RACADM Command Line Interface...
  • Page 271: Sm-Clp Command Line Interface

    For more information on these specifications, see the Distributed Management Task Force (DMTF) website at www.dmtf.org. iDRAC6 SM-CLP is a protocol driven by the DMTF and SMWG to provide standards for systems management CLI implementations. Many efforts are driven by a defined SMASH architecture that is targeted as a foundation for more standardized systems management set of components.
  • Page 272: System Management With Sm-Clp

    System Management With SM-CLP iDRAC6 SM-CLP enables you to manage the following system features from a command line: • Server Power Management — Turn on, shutdown, or reboot the system • System Event Log (SEL) Management — Display or clear the SEL records •...
  • Page 273: Sm-Clp Features

    The following is the syntax of the SM-CLP command line: <verb> [<options>] [<target>] [<properties>] Table 16-1 provides a list of the verbs iDRAC6 CLI supports, the syntax of each command, and a list of the options the verb supports. Table 16-1. Supported SM-CLP CLI Verbs...
  • Page 274 Shuts down a target. –examine, –force, –help, –output, Syntax: –version, –wait stop [ options ] [ target ] version Displays the version attributes of a target. –examine, –help, –output, –version Syntax: version [ options ] Using iDRAC6 Enterprise SM-CLP Command Line Interface...
  • Page 275 -output format=<text | clpcsv | keyword | clpxml> -o format=<text | clpcsv | keyword | clpxml> -source Specifies the location of an image in a load command. Syntax: –source <URI> -version, -v Displays the SMASH–CLP version number. Using iDRAC6 Enterprise SM-CLP Command Line Interface...
  • Page 276: Navigating The Map Address Space

    The root target is represented by a slash (/) or a backslash (\). It is the default starting point when you log in to iDRAC6. Navigate down from the root using the cd verb.
  • Page 277: Using The -Level Option

    The following example shows how to output the contents of the SEL in XML: show -l all -output format=clpxml /admin1/system1/logs1/log1 iDRAC6 SM-CLP Examples The following subsections provide examples on how to login to iDRAC6 using the SSH interface and start an SM-CLP session to perform the following operations: •...
  • Page 278: Server Power Management

    MAP Target Navigation Table 16-5 provides examples of using the cd verb to navigate the MAP . In all examples, the initial default target is assumed to be /. Using iDRAC6 Enterprise SM-CLP Command Line Interface...
  • Page 279 Viewing the ->show -d targets,properties,verbs /admin1/system1/logs1/log1 Might return: Targets: record1/ record2/... Properties: OverwritePolicy=7 LogState=4 CurrentNumberOfRecords=60 MaxNumberOfRecords=512 ElementName=Record Log 1 HealthState=5 EnabledState=2 RequestedState=12 EnabledDefault=2 TransitioningToState=12 InstanceID=DCIM: SEL Log OperationalStatus={2} Verbs: show exit version help Using iDRAC6 Enterprise SM-CLP Command Line Interface...
  • Page 280 Associations:LogManagesRecord= >/admin1/system1/logs1/log1 Properties: RecordData=*0.0.65*4 2*1245152621*65 65*4*31*0*true*111*1*255*255* RecordFormat= *IPMI_SensorNumber.IPMI_OwnerLUN.IPMI_OwnerID*I PMI_RecordID*IPMIRecordType*IPMI_TimeStamp*IPMI _GeneratorID*IPMI_EvMRev*IPMI_SensorType*IPMI_S ensorNumber*IPMI_AssertionEvent*IPMI_EventType* IPMI_EventData1*IPMI_EventData2*IPMI_EventData3 *IANA* Description=:0:Assert:OEM specific ElementName=DCIM System Event Log Entry InstanceID=DCIM:SEL LOG:4 LogInstanceID=idrac:Unknown:Unknown SEL Log LogName=DCIM System Event Log Entry RecordID=DCIM:SEL LOG:4 CreationTimeStamp=20090616114341.000000+000 Using iDRAC6 Enterprise SM-CLP Command Line Interface...
  • Page 281 ->cd system1 log records ->cd logs1 ->cd log1 show is equivalent to ->cd admin1/system1/logs1/log1 ->show Display current target ->cd . Move up one level ->cd .. Exit the shell ->exit Using iDRAC6 Enterprise SM-CLP Command Line Interface...
  • Page 282: Updating Idrac6 Firmware Using Sm-Clp

    Updating iDRAC6 Firmware Using SM-CLP To update iDRAC6 firmware using SM-CLP , you must know the TFTP URI for the Dell update package. Follow these steps to update the firmware using SM-CLP: 1 Log in to iDRAC6 using Telnet or SSH.
  • Page 283: Using The Ws-Man Interface

    Additionally, Dell has defined a number of model and profile extensions that provide interfaces for additional capabilities. The data available through WS-MAN is provided by the iDRAC6 instrumentation interface mapped to the DMTF profiles and Dell extension profiles.
  • Page 284: Supported Cim Profiles

    USB devices. Physical Asset Defines CIM classes for representing the physical aspect of the managed elements. iDRAC6 uses this profile to represent the host server’s and its component’s FRU information, as well as the physical topology. SM CLP Admin Domain Defines CIM classes for representing CLP’s configuration.
  • Page 285 Defines CIM classes for representing a DNS client in a managed system. Record Log Defines CIM classes for representing different type of logs. iDRAC6 uses this profile to represent the System Event Log (SEL) and iDRAC6 RAC Log. Software Inventory Defines CIM classes for inventory of installed or available software.
  • Page 286 Table 17-1. Supported CIM Profiles (continued) Dell Virtual Media Defines CIM and Dell extension classes for configuring iDRAC6 Virtual Media. Extends USB Redirection Profile. Dell OS Deployment Defines CIM and Dell extension classes for representing the configuration of OS Deployment features. It extends the management capability of referencing profiles by adding the capability to support OS deployment activities by manipulating OS Deployment features provided by the service processor.
  • Page 287: Deploying Your Operating System Using Ivmcli

    The Integrated Virtual Media Command Line Interface (iVMCLI) utility is a command-line interface that provides virtual media features from the management station to iDRAC6 in the remote system. Using iVMCLI and scripted methods, you can deploy your operating system on multiple remote systems in your network.
  • Page 288: Creating A Bootable Image File

    Before you deploy your image file to the remote systems, ensure that a supported system can boot from the file. To test the image file, transfer the image file to a test system using iDRAC6 Web user interface and then reboot the system.
  • Page 289: Deploying The Operating System

    The following procedure provides a high-level overview for deploying the operating system on targeted remote systems. 1 List iDRAC6 IP addresses of the remote systems that will be deployed in the ip.txt text file, one IP address per line. 2 Insert a bootable operating system CD or DVD into the client media drive.
  • Page 290: Line Interface Utility

    IP addresses from the specified file and runs the iVMCLI utility once for each line. If the argument to the -r option is not a filename, then it should be the address of a single iDRAC6. In this case, the -r works as described for the iVMCLI utility.
  • Page 291: Installing The Ivmcli Utility

    Users without administrator privileges can add the sudo command as a prefix to the iVMCLI command line (or to the iVMCLI script) to obtain access to iDRAC6 in the remote system and run the utility. Installing the iVMCLI Utility...
  • Page 292: Command Line Options

    -r <iDRAC-IP-address>[:<iDRAC-SSL-port>] This parameter provides iDRAC6 IP address and SSL port, which the utility needs to establish a Virtual Media connection with the target iDRAC6. If you enter an invalid IP address or DDNS name, an error message displays and the command terminates.
  • Page 293 The <iDRAC-user-name> must have the following attributes: • Valid user name • iDRAC6 Virtual Media User permission If iDRAC6 authentication fails, an error message displays and the command terminates. iDRAC6 User Password -p <iDRAC-user-password> This parameter provides the password for the specified iDRAC6 user.
  • Page 294 Omit this parameter from the command line if you are not virtualizing floppy media. If an invalid value is detected, an error message displays and the command terminates. CD/DVD Device or Image File -c {< device-name > | < image-file >} where <device-name>...
  • Page 295: Ivmcli Operating System Shell Options

    When this parameter is included in the command line, iVMCLI will use an SSL-encrypted channel to transfer data between the management station and iDRAC6 in the remote system. If this parameter is not included in the command line, the data transfer is not encrypted.
  • Page 296 The latter technique is useful in script programs, as it allows the script to proceed after a new process is started for the iVMCLI command (otherwise, the script would block until the iVMCLI program terminates). When multiple iVMCLI instances are started in this way, and one or more of the command instances must be manually terminated, use the operating system-specific facilities for listing and terminating processes.
  • Page 297: Using Idrac6 Configuration Utility

    Using iDRAC6 Configuration Utility Overview iDRAC6 Configuration Utility is a pre-boot configuration environment that allows you to view and set parameters for iDRAC6 and for the managed system. Specifically, you can: • View the firmware revision numbers for iDRAC6 and primary backplane firmware •...
  • Page 298: Starting Idrac6 Configuration Utility

    Configuration Utility initially or after resetting iDRAC6 to the default settings. 1 At the keyboard connected to iDRAC6 KVM console, press <Print Screen> to display iDRAC6 KVM On Screen Configuration and Reporting (OSCAR) menu. Use <Up Arrow> and <Down Arrow> to highlight the slot containing your server, then press <Enter>.
  • Page 299: Idrac6 Lan

    On and Off. iDRAC6 LAN is disabled in the default configuration. The LAN must be enabled to permit the use of iDRAC6 facilities, such as the Web interface, Telnet/SSH access to the SM-CLP command line interface, console redirection, and virtual media.
  • Page 300: Lan Parameters

    Register iDRAC6 Select On to register iDRAC6 name in the DNS service. Select Name Off if you do not want users to locate iDRAC6 name in DNS. iDRAC6 Name If Register iDRAC Name is set to On, press <Enter> to edit the Current DNS iDRAC Name text field.
  • Page 301 Ethernet IP Address If the IP Address Source is set to DHCP , this field displays the IP address obtained from DHCP . If the IP Address Source is set to Static, enter the IP address you want to assign to iDRAC6. The default is 192.168.0.120. Subnet Mask If the IP Address Source is set to DHCP , this field displays the subnet mask address obtained from DHCP .
  • Page 302 DHCP . If the IP Address Source is set to Static, enter the IP address of the default gateway. IPv6 Link-local This is the non-editable IPv6 Link-local Address of iDRAC6 Address network interface. IPv6 Address 2-15 This is the non-editable IPv6 Address 2...IPv6 Address 15 of iDRAC6 network interface.
  • Page 303: Virtual Media Configuration

    This field will be read-only if an SD card of a size larger than 256 MB is not present on iDRAC6 Express card slot. NOTE: Dell-branded vFlash media is required for the vFlash partition. Smart Card/SSO Press <Enter> to select Enabled or Disabled. This option configures the Smart Card Logon feature.
  • Page 304: System Services

    Save and Exit to apply the new settings. LAN User Configuration The LAN user is iDRAC6 administrator account, which is root by default. Press <Enter> to display the LAN User Configuration submenu. When you have finished configuring the LAN user, press <Esc> to return to the previous menu.
  • Page 305 The remote provisioning server sends the user credentials to have iDRAC6 create a user account with these credentials. Once the user account is created, a remote console can establish WSMAN...
  • Page 306: Reset To Default

    Reset to Default Use the Reset to Default menu item to reset all of iDRAC6 configuration items to the factory defaults. This may be required, for example, if you have forgotten the administrative user password or if you want to reconfigure iDRAC6 from the default settings.
  • Page 307: System Event Log Menu

    Enter a specific record number to jump to that record. Press <Esc> to exit the System Event Log. NOTE: You can only clear the SEL in iDRAC6 Configuration Utility or in iDRAC6 Web interface. To clear the SEL, select Clear System Event Log and press <Enter>.
  • Page 308 Using iDRAC6 Configuration Utility...
  • Page 309: Recovering And Troubleshooting The Managed System

    Damage due to servicing that is not authorized by Dell™ is not covered by your warranty. Read and follow the safety instructions that came with the product.
  • Page 310: Trouble Indicators

    A user has activated the locator ID for this server. Recovering and Troubleshooting the Managed System...
  • Page 311: Hardware Trouble Indicators

    See "Viewing the Last System Crash Screen." Alert Messages on the Server Status See "Checking the Server Status Screen Screen in the LCD for Error Messages." Messages in iDRAC6 Log See "Viewing iDRAC6 Log." Recovering and Troubleshooting the Managed System...
  • Page 312: Problem Solving Tools

    • Managing power on a remote system Checking the System Health When you log in to iDRAC6 Web interface, the first screen displayed describes the health of the system components. Table 20-3 describes the meaning of the system health indicators.
  • Page 313: Checking The System Event Log (Sel)

    Click any component on the Health screen to see information about the component. Sensor readings are displayed for batteries, temperatures, voltages, and power monitoring, helping to diagnose some types of problems. iDRAC6 and CMC information screens provide useful current status and configuration information. Checking the System Event Log (SEL) The SEL Log screen displays messages for events that occur on the managed server.
  • Page 314: Checking The Post Codes

    NOTE: The last crash screen feature must be configured in the Server Administrator and in iDRAC6 Web interface. See "Configuring the Managed Server to Capture the Last Crash Screen" for instructions on configuring this feature. The Last Crash Screen screen displays the most recent crash screen, which includes information about the events that occurred before the system crash.
  • Page 315: Viewing The Most Recent Boot Sequences

    Boot Capture screen. Playback of the boot screens occurs at a rate of 1 frame per second. iDRAC6 records fifty frames during boot time. Table 20-7 lists the available control actions.
  • Page 316: Checking The Server Status Screen For Error Messages

    Table 20-7. Boot Capture Options (continued) Button/Option Description Save As Creates a compressed .zip file that contains all boot capture images of the current sequence. The user must have administrator privileges to perform this action. Previous Screen Takes you to previous screen, if any, in the replay console. Play Starts the screenplay from current screen in the replay console.
  • Page 317 Table 20-8. Server Status Screen (continued) Severity Message Cause Warning System Board System Level: Current crossed a warning Current sensor for System Board, threshold warning event Critical System Board System Level: Current crossed a failure Current sensor for System Board, threshold failure event Critical...
  • Page 318 Critical System Board OS Watchdog: iDRAC6 watchdog timer Watchdog sensor for System expired and no action is set Board, timer expired was asserted Critical System Board OS Watchdog:...
  • Page 319 Table 20-8. Server Status Screen (continued) Severity Message Cause Critical System Board OS Watchdog: iDRAC6 watchdog detected Watchdog sensor for System that the system has crashed Board, power cycle was asserted (timer expired because no response was received from Host) and the action is set to...
  • Page 320 Table 20-8. Server Status Screen (continued) Severity Message Cause Non-Recoverable CPU Bus PERR: Processor sensor, The processor bus PERR transition to non-recoverable entered a non-recoverable state was asserted Non-Recoverable CPU Init Err: Processor sensor, The processor initialization transition to non-recoverable entered a non-recoverable state was asserted Non-Recoverable CPU Machine Chk: Processor...
  • Page 321 Table 20-8. Server Status Screen (continued) Severity Message Cause Critical PCIE Fatal Err: Critical Event Fatal error is detected on the sensor, bus fatal error was asserted PCIE bus Critical Chipset Err: Critical Event Chip error is detected sensor, PCI PERR was asserted Warning Mem ECC Warning: Memory Correctable ECC errors have...
  • Page 322 Critical POST Err: POST sensor, BIOS POST memory test BIOS POST memory test failed failure Critical POST Err: POST sensor, Dell Remote Access Controller Dell remote access controller configuration failure configuration failed Critical POST Err: POST sensor, CPU configuration failure...
  • Page 323 (Mezz <location>) was asserted Critical LinkT/FlexAddr: Link Tuning Failed to obtain linking tuning sensor, failed to get link tuning or or FlexAddress information flex address data from from BMC/iDRAC6 BMC/iDRAC6 was asserted Recovering and Troubleshooting the Managed System...
  • Page 324: Viewing Idrac6 Log

    (<location>) Viewing iDRAC6 Log iDRAC6 Log is a persistent log maintained in iDRAC6 firmware. The log contains a list of user actions (such as log in, log out, and security policy changes) and alerts issued by iDRAC6. The log gets erased after iDRAC6 firmware update.
  • Page 325: Viewing System Information

    The Clear Log button only appears if you have Clear Logs permission. Save As Opens a pop-up window that enables you to save iDRAC6 Log to a directory of your choice. NOTE: If you are using Internet Explorer and encounter a problem when...
  • Page 326: Identifying The Managed Server In The Chassis

    The PowerEdge M1000e chassis holds up to sixteen servers. To locate a specific server in the chassis, you can use iDRAC6 Web interface to turn on a blue flashing LED on the server. When you turn on the LED, you can specify the number of seconds that you want the LED to flash to ensure that you can reach the chassis while the LED is still flashing.
  • Page 327: Managing Power On A Remote System

    Prints the content of the routing table. ping Verifies that the destination IP address is reachable from iDRAC6 <IP Address> with the current routing-table contents. A destination IP address must be entered in the field to the right of this option. An Internet control message protocol (ICMP) echo packet is sent to the destination IP address based on the current routing-table contents.
  • Page 328 NOTE: You must have Execute Server Action Commands permission to perform power management actions. See "Adding and Configuring iDRAC6 Users" for help configuring user permissions. 1 Click System, then click the Power Management→ Power Control tab. 2 Select a Power Control Operation, for example Reset System (warm boot).
  • Page 329: Troubleshooting And Frequently Asked Questions

    <Ctrl><E>. • Watch for the IP address which displays during BIOS POST. • Select the "Dell CMC" console in the OSCAR to log in to CMC through a local serial connection. CMC RACADM commands can be issued from this connection. See the Dell Chassis Management Controller Administrator Reference Guide for a complete list of CMC RACADM subcommands.
  • Page 330 Table 20-13. Frequently Asked Questions/Troubleshooting (continued) Question Answer For example: $ racadm getniccfg -m server-1 DHCP Enabled IP Address = 192.168.0.1 Subnet Mask = 255.255.255.0 Gateway = 192.168.0.1 From local RACADM: Enter the following command at a command prompt: racadm getsysinfo From the LCD: On the Main Menu, highlight Server and press the check button.
  • Page 331 The CMC IP address is displayed on the CMC Summary screen. From the iKVM: • Select the "Dell CMC" console in the OSCAR to log in to the CMC through a local serial connection. CMC RACADM commands can be issued from this connection. See the Dell...
  • Page 332 Click Tools→ Internet Options→ Security→ Trusted sites. iDRAC6 Web Click Sites and enter the IP address or the DNS name of iDRAC6. interface, Click Add. an ActiveX Click Custom Level.
  • Page 333 • The video riser card is missing or improperly connected. but there is no Also, look for error messages in iDRAC6 log from iDRAC6 Web POST or no video interface or from the LCD. at all.
  • Page 334 Recovering and Troubleshooting the Managed System...
  • Page 335: Help

    CAUTION: The latest iDRAC6 firmware supports only the latest RACADM version. You may encounter errors if you use an older version of RACADM to query iDRAC6 with the latest firmware. Install the RACADM version shipped with your latest Dell™ OpenManage™ DVD media.
  • Page 336: Config

    • telnet/ssh RACADM Description The config subcommand allows you to set iDRAC6 configuration parameters individually or to batch them as part of a configuration file. If the data is different, that iDRAC6 object is written with the new value. RACADM Subcommand Overview...
  • Page 337 Option Description The -f <filename> option causes config to read the contents of the file specified by <filename> and configure iDRAC6. The file must contain data in the format specified in "Configuration File Syntax" on page 265. The -p, or password, option directs config to delete the password entries contained in the config file -f <filename>...
  • Page 338: Getconfig

    Table A-4. getconfig Subcommand Options Option Description The -f <filename> option directs getconfig to write the entire iDRAC6 configuration to a configuration file. This file can then be used for batch configuration operations using the config subcommand. NOTE: The -f option does not create entries for the cfgIpmiPet and cfgIpmiPef groups.
  • Page 339 RACADM CLI transport failures If errors are not encountered, this subcommand displays the contents of the specified configuration. NOTE: See "iDRAC6 Enterprise Property Database Group and Object Definitions" for information on the group and object to be used with this command. Examples •...
  • Page 340: Getssninfo

    -f myrac.cfg Saves all group configuration objects from iDRAC6 to myrac.cfg. • racadm getconfig -h Displays a list of the available configuration groups on iDRAC6. • racadm getconfig -u root Displays the configuration properties for the user named root.
  • Page 341 Synopsis racadm getssninfo [-A] [-u < username > | *] Description The getssninfo command returns a list of users that are connected to iDRAC6. The summary information provides the following information: • Username • IP address (if applicable) • Session type (for example, SSH or Telnet) •...
  • Page 342: Getsysinfo

    Definition getsysinfo Displays information related to iDRAC6. Synopsis racadm getsysinfo [-d] [-s] [-w] [-A] [-4] [-6] Description The getsysinfo subcommand displays information related to iDRAC6, the managed server, and the watchdog configuration. Supported Interfaces • Local RACADM • Remote RACADM •...
  • Page 343 Eliminates the printing of headers/labels. –4 Displays iDRAC6 IPv4 information. –6 Displays iDRAC6 IPv6 information. Output The getsysinfo subcommand displays information related to iDRAC6, the managed server, and the watchdog configuration. Sample Output RAC Information: RAC Date/Time = Fri Aug 14 18:08:33 2009 Firmware Version = 02.20...
  • Page 344 IPv4 settings: Enabled Current IP Address = 10.35.0.64 Current IP Gateway = 10.35.0.1 Current IP Netmask = 255.255.255.0 DHCP Enabled Current DNS Server 1 = 10.32.60.4 Current DNS Server 2 = 10.32.60.5 DNS Servers from DHCP IPv6 settings: Enabled Current IP Address 1 = :: Current IP Gateway = ::...
  • Page 345 Current IP Address 14 = :: Current IP Address 15 = :: DNS Servers from DHCPv6 = 0 Current DNS Server 1 = :: Current DNS Server 2 = :: System Information: System Model System BIOS Version BMC Firmware Version = 02.20 Service Tag Host Name...
  • Page 346: Getractime

    = 0 seconds Restrictions The Hostname and OS Name fields in the getsysinfo output display accurate information only if Dell OpenManage Server Administrator is installed on the managed server. If it is not installed on the managed server, these fields may ®...
  • Page 347: Setniccfg

    Synopsis racadm getractime [-d] Description With no options, the getractime subcommand displays the time in a common readable format. With the -d option, getractime displays the time in the format, yyyymmddhhmmss.mmmmmms , which is the same format returned by the ®...
  • Page 348 -s [< ipAddress > < netmask > < gateway >] racadm setniccfg -o [< ipAddress > < netmask > < gateway >] Description The setniccfg subcommand sets iDRAC6 IP address. • The -d option enables DHCP for the NIC (default is DHCP enabled).
  • Page 349: Getniccfg

    Table A-12 describes the getniccfg subcommand. Table A-12. getniccfg Subcommand Definition getniccfg Displays the current IP configuration for iDRAC6. Synopsis racadm getniccfg Description The getniccfg subcommand displays the current NIC settings. Sample Output The getniccfg subcommand will display an appropriate error message if the operation is not successful.
  • Page 350: Getsvctag

    IP Address 13 = :: IP Address 14 = :: IP Address 15 = :: NOTE: IPv6 information is displayed only if iDRAC6 supports IPv6. Supported Interfaces • Local RACADM (returns only IPv4 information) • Remote RACADM • telnet/ssh RACADM getsvctag Table A-13 describes the getsvctag subcommand.
  • Page 351: Racreset

    Subcommand Definition racreset Resets iDRAC6. NOTE: When you issue a racreset subcommand, iDRAC6 may require up to two minutes to return to a usable state. Synopsis racadm racreset Description The racreset subcommand issues a reset to iDRAC6. The reset event is written into iDRAC6 log.
  • Page 352: Racresetcfg

    NOTE: This command deletes your current iDRAC6 configuration, disables DHCP, and resets iDRAC6 configuration to the default settings. After reset, the default name and password are root and calvin, respectively, and the IP address is 192.168.0.120 plus the number of the slot the server inhabits in the chassis.
  • Page 353: Getraclog

    Synopsis racadm serveraction < action > Description The serveraction subcommand enables users to perform power management operations on the host system. Table A-17 describes the serveraction power control options. Table A-17. serveraction Subcommand Options String Definition <action> Specifies the action. The <action> string options are: •...
  • Page 354 [-A] [-o] [-c count ] [-s start- record ] [-m] Description The getraclog -i command displays the number of entries in iDRAC6 log. NOTE: If no options are provided, the entire log is displayed. The following options allow the getraclog command to read entries: Table A-19.
  • Page 355: Clrraclog

    RACADM clrraclog Synopsis racadm clrraclog Description The clrraclog subcommand removes all existing records from iDRAC6 log. A new single record is created to record the date and time when the log was cleared. getsel Table A-20 describes the getsel command.
  • Page 356 racadm getsel [-E] [-R] [-A] [-o] [-c count ] [-s count ] [-m] Description The getsel -i command displays the number of entries in the SEL. The following getsel options (without the -i option) are used to read entries. NOTE: If no arguments are specified, the entire log is displayed.
  • Page 357: Clrsel

    • telnet/ssh RACADM clrsel Synopsis racadm clrsel Description The clrsel command removes all existing records from the System Event Log (SEL). Supported Interfaces • Local RACADM • Remote RACADM • telnet/ssh RACADM gettracelog Table A-22 describes the gettracelog subcommand. Table A-22. gettracelog Command Definition gettracelog -i...
  • Page 358 Table A-23. gettracelog Subcommand options Option Description Displays the number of entries in the iDRAC trace log. Displays one screen at a time and prompts the user to continue (similar to the UNIX more command). Displays the output in a single line. specifies the number of records to display.
  • Page 359: Sslcsrgen

    sslcsrgen Table A-24 describes the sslcsrgen subcommand. Table A-24. sslcsrgen Subcommand Description sslcsrgen Generates and downloads an SSL certificate signing request (CSR) from the RAC. Synopsis racadm sslcsrgen [-g] [-f < filename >] racadm sslcsrgen -s Description The sslcsrgen subcommand can be used to generate a CSR and download the file to the client’s local file system.
  • Page 360: Sslcertupload

    Table A-26 describes the sslcertupload subcommand. Table A-26. sslcertupload Subcommand Description sslcertupload Uploads a custom SSL server or CA certificate from the client to iDRAC6. Synopsis racadm sslcertupload -t < type > [-f < filename >] RACADM Subcommand Overview...
  • Page 361: Sslcertdownload

    Options Table A-27 describes the sslcertupload subcommand options. Table A-27. sslcertupload Subcommand Options Option Description Specifies the type of certificate to upload, either the CA certificate or server certificate. 1 = server certificate 2 = CA certificate Specifies the file name of the certificate to be uploaded. If the file is not specified, the sslcert file in the current directory is selected.
  • Page 362: Sslcertview

    Local RACADM • Remote RACADM sslcertview Table A-30 describes the sslcertview subcommand. Table A-30. sslcertview Subcommand Description sslcertview Displays the SSL server or CA certificate that exists on iDRAC6. Synopsis racadm sslcertview -t < type > [-A] RACADM Subcommand Overview...
  • Page 363 Country Code (CC) : US State (S) : Texas Locality (L) : Round Rock Organization (O) : Dell Inc. Organizational Unit (OU) : Remote Access Group Common Name (CN) : iDRAC default certificate Issuer Information: Country Code (CC) : US...
  • Page 364: Testemail

    Jul 8 16:21:56 2005 GMT Jul 7 16:21:56 2010 GMT Supported Interfaces • Local RACADM • Remote RACADM • telnet/ssh RACADM testemail Table A-32 describes the testemail subcommand. Table A-32. testemail configuration Subcommand Description testemail Tests iDRAC6 e-mail alerting feature. RACADM Subcommand Overview...
  • Page 365 -i < index > Description Sends a test e-mail from iDRAC6 to a specified destination. Prior to executing the testemail command, ensure that the SMTP server is configured and the specified index in the RACADM cfgEmailAlert group is enabled and configured properly.
  • Page 366: Testtrap

    -i < index > Description The testtrap subcommand tests iDRAC6 SNMP trap-alerting feature by sending a test trap from iDRAC6 to a specified destination trap listener on the network. Before you execute the testtrap subcommand, ensure that the specified index in the RACADM cfgIpmiPet group is configured properly.
  • Page 367: Vmdisconnect

    Table A-36. cfg e-mail Alert Commands Action Command Enable the alert racadm config -g cfgIpmiPet -o cfgIpmiPetAlertEnable -i 1 1 Set the destination racadm config -g cfgIpmiPet -o e-mail IP address cfgIpmiPetAlertDestIpAddr -i 1 192.168.0.110 View the current test trap racadm getconfig -g cfgIpmiPet -i settings <index>...
  • Page 368: Clearasrscreen

    The vmdisconnect subcommand enables iDRAC6 user to disconnect all active virtual media sessions. The active virtual media sessions can be displayed in iDRAC6 Web interface or by using the RACADM getsysinfo subcommand. Supported Interfaces • Local RACADM • Remote RACADM •...
  • Page 369: Fwupdate

    The fwupdate subcommand allows users to update the firmware on iDRAC6. The user can: • Check the firmware update process status • Update iDRAC6 firmware from a TFTP server by providing an IP address and optional path • Rollback to the standby firmware RACADM Subcommand Overview...
  • Page 370 This option may be used along with the -g or -p options. At the end of the update, iDRAC6 performs a soft reset. The status option returns the current status of where you are in the update process.
  • Page 371: Krbkeytabupload

    (specified by the -d option) on the TFTP server at a specific IP address (specified by the -a option). After the image file is downloaded from the TFTP server, the update process begins. When completed, iDRAC6 is reset. • racadm fwupdate -s This option reads the current status of the firmware update.
  • Page 372: Vmkey

    Example racadm krbkeytabupload -f c:\keytab\krbkeytab.tab Supported Interfaces • Remote RACADM • Local RACADM vmkey Synopsis racadm vmkey [ reset ] Description The vmkey subcommand resets the virtual media key to the default size of 256MB. Legal Values reset = Resets the key to the default size (256 MB) Supported Interfaces •...
  • Page 373: Coredump

    Supported Interfaces • Remote RACADM • Local RACADM • ssh/telnet RACADM NOTE: To use this command, you must have Administrator privilege. Table A-42 describes the arp command. Table A-42. arp Command Command Definition Displays the contents of the ARP table. ARP table entries cannot be added or deleted.
  • Page 374: Coredumpdelete

    The coredump information is cleared with the coredumpdelete subcommand. • Another critical condition occurs on iDRAC6. In this case, the coredump information will be relative to the last critical error that occurred. See the coredumpdelete subcommand for more information about clearing the coredump.
  • Page 375: Ifconfig

    NOTE: If a coredumpdelete command is issued and a coredump is not currently stored in iDRAC6, the command will display a success message. This behavior is expected. See the coredump subcommand for more information on viewing a coredump.
  • Page 376: Netstat

    Table A-47. ping Subcommand Definition ping Verifies that the destination IP address is reachable from iDRAC6 with the current routing-table contents. A destination IP address is required. An ICMP echo packet is sent to the destination IP address based on the current routing-table contents.
  • Page 377: Ping6

    Table A-48. ping6 Subcommand Definition ping6 Verifies that the destination IPv6 address is reachable from iDRAC6 with the current routing-table contents. A destination IPv6 address is required. An ICMP echo packet is sent to the destination IPv6 address based on the current routing-table contents.
  • Page 378: Traceroute

    Table A-49. racdump racdump Displays status and general iDRAC6 information. Synopsis racadm racdump Description The racdump subcommand provides a single command to get dump, status, and general iDRAC6 board information. The following information is displayed when the racdump subcommand is processed: •...
  • Page 379: Traceroute6

    Synopsis racadm traceroute < IPv4 address > racadm traceroute 192.168.0.1 traceroute to 192.168.0.1 (192.168.0.1), 30 hops max, 40 byte packets 1 192.168.0.1 (192.168.0.1) 0.801 ms 0.246 ms 0.253 ms Description Traces a route using IPv4 to a destination on the network. Supported Interfaces •...
  • Page 380: Remoteimage

    Description Traces a route using IPv6 to a destination on the network. Supported Interfaces • Remote RACADM • telnet/ssh RACADM remoteimage NOTE: To use this command, you must have Administrator permission. Table A-52 describes the remoteimage subcommand. Table A-52. remoteimage Subcommand Definition remoteimage...
  • Page 381 Description Connects, disconnects, or deploys a media file on a remote server. Supported Interfaces • Local RACADM • Remote RACADM • telnet/ssh RACADM RACADM Subcommand Overview...
  • Page 382 RACADM Subcommand Overview...
  • Page 383: Database Group And Object Definitions

    Definitions iDRAC6 property database contains the configuration information for iDRAC6. Data is organized by associated object, and objects are organized by object group. The IDs for the groups and objects that the property database supports are listed in this section.
  • Page 384: Idracinfo

    This system component provides a complete set of remote management functions for Dell PowerEdge servers. Description A text description of the RAC type. idRacVersionInfo (Read Only) Legal Values String of up to 63 ASCII characters. iDRAC6 Enterprise Property Database Group and Object Definitions...
  • Page 385: Idracbuildinfo (Read Only)

    A string containing the current product build version. idRacName (Read Only) Legal Values String of up to 15 ASCII characters. Default iDRAC Description A user assigned name to identify this controller. idRacType (Read Only) Legal Values Product ID Default iDRAC6 Enterprise Property Database Group and Object Definitions...
  • Page 386: Cfgoobsnmp

    Description Identifies the remote access controller type as iDRAC6. cfgOobSnmp This group contains parameters to configure the SNMP agent and trap capabilities of the iDRAC. One instance of the group is allowed. The following subsections describe the objects in this group.
  • Page 387: Cfglannetworking

    One instance of the group is allowed. All objects in this group will require iDRAC6 NIC to be reset, which may cause a brief loss in connectivity. Objects that change iDRAC6 NIC IP address settings will close all active user sessions and require users to reconnect using the updated IP address settings.
  • Page 388: Cfgdnsdomainname (Read/Write)

    Description Specifies that iDRAC6 DNS domain name should be assigned from the network DHCP server. cfgDNSDomainName (Read/Write) Legal Values String of up to 254 ASCII characters. At least one of the characters must be alphabetic. Characters are restricted to alphanumeric, hyphens, and periods.
  • Page 389: Cfgdnsregisterrac (Read/Write)

    Specifies that the DNS server IP addresses should be assigned from the DHCP server on the network. cfgDNSServer1 (Read/Write) Legal Values A string representing a valid IP address. For example: 192.168.0.20. Default 0.0.0.0 iDRAC6 Enterprise Property Database Group and Object Definitions...
  • Page 390: Cfgdnsserver2 (Read/Write)

    1 (TRUE) 0 (FALSE) Default Description Enables or disables iDRAC6 network interface controller. If the NIC is disabled, the remote network interfaces to iDRAC6 will no longer be accessible, and iDRAC6 will only be available through the local RACADM interface.
  • Page 391: Cfgnicipaddress (Read/Write)

    A string representing a valid subnet mask. For example: 255.255.255.0. Default 255.255.255.0 Description The subnet mask used for static assignment of iDRAC6 IP address. This property is only valid if cfgNicUseDhcp is set to 0 (FALSE). cfgNicGateway (Read/Write) NOTE: This parameter is only configurable if the cfgNicUseDhcp parameter is set to 0 (FALSE).
  • Page 392: Cfgnicusedhcp (Read/Write)

    Specifies whether DHCP is used to assign iDRAC6 IP address. If this property is set to 1 (TRUE), then iDRAC6 IP address, subnet mask, and gateway are assigned from the DHCP server on the network. If this property is set to 0 (FALSE), the static IP address, subnet mask, and gateway is assigned from the cfgNicIpAddress, cfgNicNetmask, and cfgNicGateway properties.
  • Page 393: Cfgnicvlanenable (Read Only)

    (Read Only) NOTE: VLAN settings can be configured through the CMC Web Interface. iDRAC6 displays only the current VLAN settings and you cannot modify the settings from iDRAC6. Legal Values 1 (TRUE) 0 (FALSE) Default Description Enables or disables the VLAN capabilities of iDRAC6 from CMC.
  • Page 394: Cfgipv6Url

    Specifies the VLAN Priority for the network VLAN configuration in CMC. This property is only valid if cfgNicVLanEnable is set to 1 (enabled). cfgIPv6URL This group specifies properties used to configure the iDRAC6 IPv6 URL. cfgIPv6URLstring (Read Only) Legal Values A string of up to 80 characters.
  • Page 395: Cfgipv6Address1 (Read/Write)

    (Read/Write) Legal Values A string representing a valid IPv6 entry. Default Description iDRAC6 gateway IPv6 address. cfgIPv6PrefixLength (Read/Write) Legal Values 1-128 Default Description The prefix length for iDRAC6 IPv6 address 1. iDRAC6 Enterprise Property Database Group and Object Definitions...
  • Page 396: Cfgipv6Autoconfig (Read/Write)

    A string representing a valid IPv6 entry. Default Description iDRAC6 IPv6 link local address. cfgIPv6Address2 (Read Only) Legal Values A string representing a valid IPv6 entry. Default Description An iDRAC6 IPv6 address. iDRAC6 Enterprise Property Database Group and Object Definitions...
  • Page 397: Cfgipv6Dnsserver1 (Read/Write)

    A string representing a valid IPv6 entry. Default Description An IPv6 DNS server address. cfgIPv6DNSServer2 (Read/Write) Legal Values A string representing a valid IPv6 entry. Default Description An IPv6 DNS server address. iDRAC6 Enterprise Property Database Group and Object Definitions...
  • Page 398: Cfgipv6Dnsserver2 (Read/Write)

    Default Description An IPv6 DNS server address. cfgIPv6Addr2PrefixLength (Read Only) Legal Values 1-128 Default Description The prefix length for iDRAC6 IPv6 address 2. cfgIPv6LinkLockPrefixLength (Read Only) Legal Values 1-128 Default cfgTotalnumberofextended IP (Read/Write) Legal Values 1-256 iDRAC6 Enterprise Property Database Group and Object Definitions...
  • Page 399: Cfgipv6Addr3Prefixlength (Read Only)

    Legal Values 1-128 Default <blank> cfgIPv6Addr3Length (Read Only) Legal Values 1-40 Default <blank> cfgIPv6Address3 (Read Only) Legal Values String representing a valid IPv6 entry. Default <blank> cfgIPv6Addr4PrefixLength (Read Only) Legal Values 1-128 Default iDRAC6 Enterprise Property Database Group and Object Definitions...
  • Page 400: Cfgipv6Addr4Length (Read Only)

    String representing a valid IPv6 entry. Default <blank> cfgIPv6Addr5PrefixLength (Read Only) Legal Values 1-128 Default cfgIPv6Addr5Length (Read Only) Legal Values 1-40 Default <blank> cfgIPv6Address5 (Read Only) Legal Values String representing a valid IPv6 entry. iDRAC6 Enterprise Property Database Group and Object Definitions...
  • Page 401: Cfgipv6Addr6Prefixlength (Read Only)

    Legal Values 1-128 Default cfgIPv6Addr6Length (Read Only) Legal Values 1-40 Default <blank> cfgIPv6Address6 (Read Only) Legal Values String representing a valid IPv6 entry. Default <blank> cfgIPv6Addr7PrefixLength (Read Only) Legal Values 1-128 Default iDRAC6 Enterprise Property Database Group and Object Definitions...
  • Page 402: Cfgipv6Addr7Length (Read Only)

    String representing a valid IPv6 entry. Default <blank> cfgIPv6Addr8PrefixLength (Read Only) Legal Values 1-128 Default cfgIPv6Addr8Length (Read Only) Legal Values 1-40 Default <blank> cfgIPv6Address8 (Read Only) Legal Values String representing a valid IPv6 entry. iDRAC6 Enterprise Property Database Group and Object Definitions...
  • Page 403: Cfgipv6Addr9Prefixlength (Read Only)

    Legal Values 1-128 Default cfgIPv6Addr9Length (Read Only) Legal Values 1-40 Default <blank> cfgIPv6Address9 (Read Only) Legal Values String representing a valid IPv6 entry. Default <blank> cfgIPv6Addr10PrefixLength (Read Only) Legal Values 1-128 Default iDRAC6 Enterprise Property Database Group and Object Definitions...
  • Page 404: Cfgipv6Addr10Length (Read Only)

    String representing a valid IPv6 entry. Default <blank> cfgIPv6Addr11PrefixLength (Read Only) Legal Values 1-128 Default cfgIPv6Addr11Length (Read Only) Legal Values 1-40 Default <blank> cfgIPv6Address11 (Read Only) Legal Values String representing a valid IPv6 entry. iDRAC6 Enterprise Property Database Group and Object Definitions...
  • Page 405: Cfgipv6Addr12Prefixlength (Read Only)

    Legal Values 1-128 Default cfgIPv6Addr12Length (Read Only) Legal Values 1-40 Default <blank> cfgIPv6Address12 (Read Only) Legal Values String representing a valid IPv6 entry. Default <blank> cfgIPv6Addr13PrefixLength (Read Only) Legal Values 1-128 Default iDRAC6 Enterprise Property Database Group and Object Definitions...
  • Page 406: Cfgipv6Addr13Length (Read Only)

    String representing a valid IPv6 entry. Default <blank> cfgIPv6Addr14PrefixLength (Read Only) Legal Values 1-128 Default cfgIPv6Addr14Length (Read Only) Legal Values 1-40 Default <blank> cfgIPv6Address14 (Read Only) Legal Values String representing a valid IPv6 entry. iDRAC6 Enterprise Property Database Group and Object Definitions...
  • Page 407: Cfgipv6Addr15Prefixlength (Read Only)

    This group provides configuration information about the users who are allowed to access the RAC through the available remote interfaces. Up to 16 instances of the user group are allowed. Each instance represents the configuration for an individual user. iDRAC6 Enterprise Property Database Group and Object Definitions...
  • Page 408: Cfguseradminindex (Read Only)

    4 (Administrator) 15 (No access) Default 4 (User 2) 15 (All others) Description The maximum privilege on the IPMI LAN channel. cfgUserAdminPrivilege (Read/Write) Legal Values 0x00000000 to 0x000001ff, and 0x0 Default 0x00000000 iDRAC6 Enterprise Property Database Group and Object Definitions...
  • Page 409 The user is not allowed to access 0x00000000 iDRAC6. The user may only login to 0x00000001 iDRAC6 and view iDRAC6 and server configuration information. The user may login to iDRAC6 0x00000001 + 0x00000002 = 0x00000003 and change configuration. iDRAC6 Enterprise Property Database Group and Object Definitions...
  • Page 410: Cfguseradminusername (Read/Write)

    Legal Values A string of up to 20 ASCII characters. Default (blank) Description The password for this user. User passwords are encrypted and cannot be seen or displayed after the property is written. iDRAC6 Enterprise Property Database Group and Object Definitions...
  • Page 411: Cfguseradminenable (Read/Write)

    This group contains parameters to configure the RAC e-mail alerting capabilities. The following subsections describe the objects in this group. Up to four instances of this group are allowed. cfgEmailAlertIndex (Read Only) Legal Values 1–4 iDRAC6 Enterprise Property Database Group and Object Definitions...
  • Page 412: Cfgemailalertenable (Read/Write)

    E-mail address format, with a maximum length of 64 ASCII characters. Default (blank) Description The e-mail address of the alert source. cfgEmailAlertCustomMsg (Read/Write) Legal Values A string of up to 32 characters. iDRAC6 Enterprise Property Database Group and Object Definitions...
  • Page 413: Cfgsessionmanagement

    (Read/Write) Legal Values 1 – 2 Default Description Specifies the maximum number of console redirection sessions allowed on iDRAC6. cfgSsnMgtWebserverTimeout (Read/Write) Legal Values 60 – 10800 Default 1800 iDRAC6 Enterprise Property Database Group and Object Definitions...
  • Page 414: Cfgssnmgtsshidletimeout (Read/Write)

    Warning: Session no longer valid, may have timed out After the message appears, the system returns you to the shell that generated the Secure Shell session. cfgSsnMgtTelnetTimeout (Read/Write) Legal Values 0 (No timeout) 60 – 10800 iDRAC6 Enterprise Property Database Group and Object Definitions...
  • Page 415: Cfgserial

    One instance of the group is allowed. The following subsections describe the objects in this group. cfgSerialSshEnable (Read/Write) Legal Values 1 (TRUE) 0 (FALSE) Default Description Enables or disables the secure shell (SSH) interface on iDRAC6. iDRAC6 Enterprise Property Database Group and Object Definitions...
  • Page 416: Cfgserialtelnetenable (Read/Write)

    (Read/Write) Legal Values 1 (TRUE) 0 (FALSE) Default Description Enables or disables the Telnet console interface on iDRAC6. cfgRemoteHosts This group provides properties that allow configuration of the SMTP server for e-mail alerts. cfgRhostsSmtpServerIpAddr (Read/Write) Legal Values A string representing a valid SMTP server IP address. For example: 192.168.0.56.
  • Page 417: Cfgrhostsfwupdateipaddr (Read/Write)

    A string representing a valid IP address. Default 0.0.0.0 Description Specifies the network TFTP server IP address that is used for TFTP iDRAC6 firmware update operations. cfgRhostsFwUpdatePath (Read/Write) Legal Values A string with a maximum length of 255 ASCII characters.
  • Page 418: Cfgrhostssyslogenable (Read/Write)

    Enables or disables remote syslog. cfgRhostsSyslogPort (Read/Write) Legal Values 0 — 65535 Default Description Remote syslog port number. cfgRhostsSyslogServer1 (Read/Write) Legal Values String from 0 to 511 characters. Default <blank> Description Name of remote syslog server. iDRAC6 Enterprise Property Database Group and Object Definitions...
  • Page 419: Cfgrhostssyslogserver2 (Read/Write)

    This group is used to configure the Active Directory user domain names. A maximum of 40 domain names can be configured at any given time. cfgUserDomainIndex (Read Only) Legal Values 1 – 40 Default <instance> iDRAC6 Enterprise Property Database Group and Object Definitions...
  • Page 420: Cfguserdomainname (Read/Write)

    (Read Only) Legal Values 1 = TRUE 0 = FALSE Default Description Represents the server power state, either ON or OFF. cfgServerPowerServerAllocation (Read Only) Legal Values String of up to 32 characters. iDRAC6 Enterprise Property Database Group and Object Definitions...
  • Page 421 String of up to 32 characters. Default (blank) Description Represents the maximum power consumed by the server until the current time. cfgServerPowerPeakPowerTimestamp (Read Only) Legal Values String of up to 32 characters. iDRAC6 Enterprise Property Database Group and Object Definitions...
  • Page 422: Cfgserverpowercapwatts (Read Only)

    (Read Only) Legal Values String of up to 32 characters. Default (blank) Description Represents the server power threshold in Watts. cfgServerPowerCapBtuhr (Read Only) Legal Values String of up to 32 characters. iDRAC6 Enterprise Property Database Group and Object Definitions...
  • Page 423: Cfgserverpowercappercent (Read Only)

    String of up to 32 characters. Default (blank) Description Represents the server power threshold in percentage. cfgRacTuning This group is used to configure various iDRAC6 configuration properties, such as valid ports and security port restrictions. cfgRacTuneHttpPort (Read/Write) Legal Values 10 – 65535 Default...
  • Page 424: Cfgractunehttpsport (Read/Write)

    Legal Values 1 (TRUE) 0 (FALSE) Default Description Enables or disables the IP Address Range validation feature of iDRAC6. cfgRacTuneIpRangeAddr Legal Values An IP address-formatted string. For example, 192.168.0.44. Default 192.168.1.1 Description Specifies the acceptable IP address bit pattern in positions determined by the 1's in the range mask property (cfgRacTuneIpRangeMask).
  • Page 425: Cfgractuneiprangemask

    Enables or disables the IP address blocking feature of the RAC. cfgRacTuneIpBlkFailCount Legal Values 2 – 16 Default Description The maximum number of login failures to occur within the window (cfgRacTuneIpBlkFailWindow) before login attempts from the IP address are rejected. iDRAC6 Enterprise Property Database Group and Object Definitions...
  • Page 426: Cfgractuneipblkfailwindow

    Defines the time span in seconds that session requests from an IP address with excessive failures are rejected. cfgRacTuneSshPort (Read/Write) Legal Values 1 – 65535 Default Description Specifies the port number used for iDRAC6 SSH interface. iDRAC6 Enterprise Property Database Group and Object Definitions...
  • Page 427: Cfgractuneconredirenable (Read/Write)

    Description Enables or disables console redirection. cfgRacTuneTelnetPort (Read/Write) Legal Values 1 – 65535 Default Description Specifies the port number used for iDRAC6 Telnet interface. cfgRacTuneConRedirEncryptEnable (Read/Write) Legal Values 1 (TRUE) 0 (FALSE) Default Description Encrypts the video in a console redirection session.
  • Page 428: Cfgractuneconredirport (Read/Write)

    Default 5901 Description Specifies the port to be used for video traffic during console redirection activity with iDRAC6. NOTE: This object requires an iDRAC6 reset before it becomes active. cfgRacTuneAsrEnable (Read/Write) Legal Values 0 (FALSE) 1 (TRUE) Default iDRAC6 Enterprise Property Database Group and Object Definitions...
  • Page 429: Cfgractunewebserverenable (Read/Write)

    1 (TRUE) Default Description Enables and disables iDRAC6 Web server. If this property is disabled, iDRAC6 will not be accessible using client Web browsers. This property has no effect on the Telnet/SSH or local RACADM interfaces. cfgRacTuneLocalServerVideo (Read/Write) Legal Values...
  • Page 430: Cfgractunetimezoneoffset (Read/Write)

    –480 (PST — Pacific Standard Time) –420 (MST — Mountain Standard Time) –360 (CST — Central Standard Time) –300 (EST — Eastern Standard Time). cfgRacTuneLocalConfigDisable (Read/Write) Legal Values 0 (Enables) 1 (Disables) Default iDRAC6 Enterprise Property Database Group and Object Definitions...
  • Page 431: Ifcracmanagednodeos

    Description Disables write access to iDRAC6 configuration data. The default is for access to be enabled. NOTE: Access can be disabled using the Local RACADM or iDRAC6 Web interface; however, once disabled, access can be re-enabled only through iDRAC6 Web interface.
  • Page 432: Cfgracsecurity

    This group is used to configure settings related to iDRAC6 SSL certificate signing request (CSR) feature. The properties in this group must be configured before generating a CSR from iDRAC6. See the RACADM sslcsrgen subcommand details for more information on generating certificate signing requests.
  • Page 433: Cfgseccsrlocalityname (Read/Write)

    A string of up to 254 characters. Default (blank) Description Specifies the CSR State Name (S). cfgSecCsrCountryCode (Read/Write) Legal Values A two-character string. Default (blank) Description Specifies the CSR Country Code (CC). iDRAC6 Enterprise Property Database Group and Object Definitions...
  • Page 434: Cfgseccsremailaddr (Read/Write)

    1024 Description Specifies the SSL asymmetric key size for the CSR. cfgRacVirtual This group contains parameters to configure iDRAC6 virtual media feature. One instance of the group is allowed. The following subsections describe the objects in this group. cfgVirMediaAttached (Read/Write)
  • Page 435: Cfgvirmediabootonce (Read/Write)

    USB CDROM/floppy drive to a USB port on the system. When the devices are attached you then can connect to the virtual devices remotely using iDRAC6 Web interface or the CLI. Setting this object to 0 will cause the devices to detach from the USB bus.
  • Page 436: Cfgvirtualfloppyemulation (Read/Write)

    Default Description Enables or disables the vFlash media key of iDRAC6. cfgVirtualFloppyEmulation (Read/Write) Legal Values 1 (TRUE) 0 (FALSE) Default Description When set to 0, the virtual floppy drive is recognized as a removable disk by Windows operating systems. Windows operating systems will assign a drive letter that is C: or higher during enumeration.
  • Page 437: Cfgipmilanprivlimit (Read/Write)

    Enables or disables global e-mail alerting. This property overrides all individual e-mail alerting enable/disable properties. cfgIpmiEncryptionKey (Read/Write) Legal Values A string of even number of hexadecimal digits from 0 to 40 characters with no spaces. iDRAC6 Enterprise Property Database Group and Object Definitions...
  • Page 438: Cfgipmipetcommunityname (Read/Write)

    This group is used to configure IPv6 platform event traps on the managed server. cfgIpmiPetIPv6Index (Read Only) Legal Values 1 – 4 Default <index value> Description Unique identifier for the index corresponding to the trap. iDRAC6 Enterprise Property Database Group and Object Definitions...
  • Page 439: Cfgipmipetipv6Alertdestipaddr

    The event filters can be used to control policies related to actions that are triggered when critical events occur on the managed server. cfgIpmiPefName (Read Only) Legal Values A string of up to 255 characters. iDRAC6 Enterprise Property Database Group and Object Definitions...
  • Page 440: Cfgipmipefindex (Read/Write)

    Specifies the index of a specific platform event filter. cfgIpmiPefAction (Read/Write) Legal Values 0 (None) 1 (Power Down) 2 (Reset) 3 (Power Cycle) Default Description Specifies the action that is performed on the managed server when the alert is triggered. iDRAC6 Enterprise Property Database Group and Object Definitions...
  • Page 441: Cfgipmipefenable (Read/Write)

    The index value of a specific platform event trap. Description Unique identifier for the index corresponding to the trap. cfgIpmiPetAlertDestIpAddr (Read/Write) Legal Values A string representing a valid IPv4 address. For example, 192.168.0.67. Default 0.0.0.0 iDRAC6 Enterprise Property Database Group and Object Definitions...
  • Page 442: Cfgipmipetalertenable (Read/Write)

    (Read/Write) Legal Values 1 (TRUE) 0 (FALSE) Default Description Enables or disables a specific trap. cfgSmartCard This group specifies properties used to support access to iDRAC6 using a smart card. cfgSmartCardLogonEnable (Read/Write) Legal Values 0 (Disabled) 1 (Enabled) Default Description Enables or disables support for access to iDRAC6 using a smart card.
  • Page 443: Cfgsmartcardcrlenable (Read/Write)

    (Read/Write) Legal Values 1 (TRUE) 0 (FALSE) Default Description Enables or disables the Certificate Revocation List (CRL). cfgActiveDirectory This group contains parameters to configure iDRAC6 Active Directory feature. cfgADSSOEnable (Read/Write) Legal Values 1 (TRUE) 0 (FALSE) Default Description Enables or disables Active Directory single sign-on authentication on iDRAC6.
  • Page 444: Cfgadracname (Read/Write)

    0 (FALSE) Default Description Enables or disables Active Directory user authentication on iDRAC6. If this property is disabled, local iDRAC6 authentication is used for user logins instead. cfgADAuthTimeout (Read/Write) NOTE: To modify this property, you must have Configure iDRAC permission.
  • Page 445: Cfgaddomaincontroller1 (Read/Write)

    254. Default No default value Description iDRAC6 uses the value you specify to search the LDAP server for user names. cfgADDomainController2 (Read/Write) Legal Values Valid IP address or a fully qualified domain name (FQDN). The maximum number of characters is 254.
  • Page 446: Cfgaddomaincontroller3 (Read/Write)

    254. Default No default value. Description iDRAC6 uses the value you specify to search the LDAP server for user names. cfgADGlobalCatalog1 (Read/Write) Legal Values Valid IP address or a fully qualified domain name (FQDN). The maximum number of characters is 254.
  • Page 447: Cfgadglobalcatalog3 (Read/Write)

    Description iDRAC6 uses the value you specify to search the Global Catalog server for user names. cfgADGlobalCatalog3 (Read/Write) Legal Values Valid IP address or a fully qualified domain name (FQDN). The maximum number of characters is 254. Default No default value.
  • Page 448: Cfgstandardschema

    <blank> Description Name of the Role Group as recorded in the Active Directory forest. cfgSSADRoleGroupDomain (Read/Write) Legal Values Any printable text string with no white space. Length is limited to 254 characters. iDRAC6 Enterprise Property Database Group and Object Definitions...
  • Page 449: Cfgssadrolegroupprivilege (Read/Write)

    Login to iDRAC6 0x00000001 Configure iDRAC6 0x00000002 Configure Users 0x00000004 Clear Logs 0x00000008 Execute Server Control Commands 0x00000010 Access Console Redirection 0x00000020 Access Virtual Media 0x00000040 Test Alerts 0x00000080 Execute Debug Commands 0x00000100 iDRAC6 Enterprise Property Database Group and Object Definitions...
  • Page 450: Cfgipmisol

    Enables or disables SOL. cfgIpmiSolBaudRate (Read/Write) Legal Values 9600, 19200, 57600, 115200 Default 115200 Description The baud rate for serial communication over LAN. cfgIpmiSolMinPrivilege (Read/Write) Legal Values 2 (User) 3 (Operator) 4 (Administrator) iDRAC6 Enterprise Property Database Group and Object Definitions...
  • Page 451: Cfgipmisolsendthreshold (Read/Write)

    (Read/Write) Legal Values 1 – 255 Default Description Specifies the typical amount of time that iDRAC6 waits before transmitting a partial SOL character data packet. This value is 1-based 5ms increments. cfgIpmiSolSendThreshold (Read/Write) Legal Values 1 – 255 Default Description The SOL threshold limit value.
  • Page 452 Enterprise Property Database Group and Object Definitions...
  • Page 453: Glossary

    Glossary Active Directory ® Active Directory is a centralized and standardized system that automates network management of user data, security, and distributed resources, and enables interoperation with other directories. Active Directory is designed especially for distributed networking environments. Abbreviation for accelerated graphics port, which is a bus specification that allows graphics cards faster access to main system memory.
  • Page 454 Abbreviation for command-line interface. Abbreviation for command-line protocol. Abbreviation for Chassis Management Controller, which is the controller interface between iDRAC6 and the managed system’s CMC. console redirection Console redirection is a function that directs a managed server’s display screen, mouse functions, and keyboard functions to the corresponding devices on a management station.
  • Page 455 Abbreviation for Distributed Management Task Force. Abbreviation for Domain Name System. Abbreviation for disk storage unit. Extended Schema A solution used with Active Directory to determine user access to iDRAC6; uses Dell-defined Active Directory objects. FQDN ® Acronym for Fully Qualified Domain Names. Microsoft Active Directory only supports FQDN of 64 bytes or fewer.
  • Page 456 Abbreviation for identifier, commonly used when referring to a user identifier (user ID) or object identifier (object ID). iDRAC6 Acronym for integrated Dell Remote Access Controller 6, the integrated System-on-Chip monitor/control system for the Dell 11G PowerEdge™ servers. Abbreviation for Internet Protocol, which is the network layer for TCP/IP.
  • Page 457 Acronym for media access control address, which is a unique address embedded in the physical components of a NIC. managed server The managed server is the system in which iDRAC6 is embedded. management station The management station is a system that remotely accesses iDRAC6.
  • Page 458 Acronym for On Screen Configuration and Reporting. OSCAR is the menu displayed by the Avocent iKVM when you press <Print Screen>. It allows you to select the CMC console or iDRAC6 console for a server installed in the CMC. Abbreviation for Peripheral Component Interconnect, which is a standard interface and bus technology for connecting peripherals to a system and for communicating with those peripherals.
  • Page 459 Acronym for random-access memory. RAM is general-purpose readable and writable memory on systems and iDRAC6. RAM disk A memory-resident program which emulates a hard drive. iDRAC6 maintains a RAM disk in its memory. Abbreviation for remote access controller. Acronym for read-only memory, which is memory from which data may be read, but to which data cannot be written.
  • Page 460 Abbreviation for secure sockets layer. standard schema A solution used with Active Directory to determine user access to iDRAC6; uses Active Directory group objects only. Abbreviation for Telelocator Alphanumeric Protocol, which is a protocol used for submitting requests to a pager service.
  • Page 461 Abbreviation for Universal Serial Bus. Abbreviation for Universal Coordinated Time. See GMT. VLAN Abbreviation for Virtual Local Area Network. Abbreviation for virtual network computing. VT-100 Abbreviation for Video Terminal 100, which is used by the most common terminal emulation programs. Abbreviation for wide area network.
  • Page 462 Glossary...
  • Page 463: Index

    Index Active Directory Certificate Signing Request. See adding DRAC 5 users, 134 configuring access to the DRAC certificates 5, 127 Active Directory, 107 logging in to the DRAC 5, 151 exporting the root CA managing certificates, 107 certificate, 149 objects, 124 SSL and digital, 101 schema extensions, 123 uploading a server certificate, 105...
  • Page 464 Local iDRAC6 users using with Active Directory, 123 for Smart Card logon, 163 configuring multiple iDRACs with RACADM, 268 configuring Smart Card Firefox Login, 161 tab behavior, 87 console redirection firewall, opening ports, 34 configuring, 209 firmware opening a session, 211...
  • Page 465 299 interface, 97 configuring virtual media, 303 starting, 298 iVMCLI, 41 iDRAC6 firmware rollback, 118 iVMCLI utility about, 287 iDRAC6 web interface, 40, 60 deploying the operating ifconfig command, diagnostics system, 289 console, 327 operating system shell iKVM options, 295...
  • Page 466 251 password, 306 configuring with RACADM, 251 configuring with the CMC Web interface, 47 configuring with the iDRAC6 configuration utility, 299 Manageability Access Point. See configuring with the Web interface, 88 managed server capturing the last crash screen, 82...
  • Page 467 OpenSSH, SSH client for post codes, viewing, 314 Linux, 77 power management operating system using SM-CLP , 278 installing (manual method), 236 using the web interface, 327 installing (scripted method), 287 property database groups OSCAR cfgActiveDirectory, 443 displaying, 298 cfgEmailAlert, 411 cfgIpmiLan, 436 cfgIpmiPef, 438-439 cfgIpmiPet, 441...
  • Page 468 RACADM subcommands disabling, 83 arp, 373 remote access connections clrraclog, 242, 355 supported, 34 clrsel, 242, 357 resetting iDRAC6 to config, 82, 242, 336 defaults, 306 coredump, 373 coredumpdelete, 374 fwupdate, 369 getconfig, 219, 242, 264, 338 getniccfg, 242, 349...
  • Page 469 See RACADM output formats, 277 power management, 278 syntax, 273 managing with SM-CLP , 278 targets, 276 managing with the iDRAC6 updating iDRAC firmware, 278 configuration using the show verb, 276 utility, 306-307 managing with the web snap-in interface, 313...
  • Page 470 229 iDRAC, 71 booting, 235 Two-factor-authentication command line, 290 TFA, 161 configuring with the iDRAC6 configuration utility, 303 configuring with the web interface, 232 installing the operating Unified Server Configurator system, 236 System Services, 304...
  • Page 471 web interface accessing, 86 browser configuration, 68 configuring ASR service, 114 configuring e-mail alerts, 96 configuring iDRAC services, 114 configuring IP blocking, 91 configuring IP filtering, 91 configuring IPMI LAN properties, 88, 97 configuring network properties, 88 configuring PEF, 95 configuring PET, 94-95, 255 configuring SOL, 97 configuring telnet service, 114...
  • Page 472 Index...

Table of Contents