Idrac9 Lifecycle Controller v30 Series Users Guide en Us
Idrac9 Lifecycle Controller v30 Series Users Guide en Us
(iDRAC9)
Version 3.00.00.00 User's Guide
October 2018
Rev. A03
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your product.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid
the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
Copyright © 2017 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its
subsidiaries. Other trademarks may be trademarks of their respective owners.
Contents
Chapter 1: Overview.....................................................................................................................15
Benefits of using iDRAC with Lifecycle Controller.................................................................................................... 15
Key features........................................................................................................................................................................ 16
New in this release.............................................................................................................................................................18
How to use this guide....................................................................................................................................................... 19
Supported web browsers................................................................................................................................................. 19
Supported OS and Hypervisors................................................................................................................................ 19
iDRAC licenses ...................................................................................................................................................................19
Types of licenses.......................................................................................................................................................... 19
Methods for acquiring licenses................................................................................................................................ 20
License operations...................................................................................................................................................... 20
Licensed features in iDRAC9...........................................................................................................................................21
Interfaces and protocols to access iDRAC................................................................................................................. 26
iDRAC port information....................................................................................................................................................28
Other documents you may need................................................................................................................................... 29
Contacting Dell.................................................................................................................................................................. 30
Accessing documents from Dell support site............................................................................................................. 30
Contents 3
Chapter 3: Setting up managed system....................................................................................... 42
Setting up iDRAC IP address..........................................................................................................................................42
Setting up iDRAC IP using iDRAC settings utility................................................................................................ 43
Setting up iDRAC IP using the CMC web interface............................................................................................45
Enabling provisioning server..................................................................................................................................... 46
Configuring servers and server components using Auto Config..................................................................... 46
Using hash passwords for improved security........................................................................................................51
Modifying local administrator account settings.........................................................................................................53
Setting up managed system location........................................................................................................................... 53
Setting up managed system location using web interface................................................................................53
Setting up managed system location using RACADM........................................................................................53
Setting up managed system location using iDRAC settings utility..................................................................54
Optimizing system performance and power consumption......................................................................................54
Modifying thermal settings using iDRAC web interface.................................................................................... 54
Modifying thermal settings using RACADM......................................................................................................... 55
Modifying thermal settings using iDRAC settings utility....................................................................................59
Setting up management station.................................................................................................................................... 60
Accessing iDRAC remotely........................................................................................................................................60
Configuring supported web browsers.......................................................................................................................... 60
Configuring Internet Explorer...................................................................................................................................60
Configuring Mozilla Firefox........................................................................................................................................ 61
Configuring web browsers to use virtual console............................................................................................... 62
Viewing localized versions of web interface.........................................................................................................65
Updating device firmware............................................................................................................................................... 65
Updating firmware using iDRAC web interface....................................................................................................67
Updating device firmware using RACADM........................................................................................................... 68
Scheduling automatic firmware updates............................................................................................................... 69
Updating firmware using CMC web interface...................................................................................................... 70
Updating firmware using DUP.................................................................................................................................. 70
Updating firmware using remote RACADM........................................................................................................... 71
Updating firmware using Lifecycle Controller Remote Services...................................................................... 71
Updating CMC firmware from iDRAC..................................................................................................................... 71
Viewing and managing staged updates........................................................................................................................72
Viewing and managing staged updates using iDRAC web interface............................................................... 72
Viewing and managing staged updates using RACADM.................................................................................... 72
Rolling back device firmware.......................................................................................................................................... 72
Rollback firmware using iDRAC web interface..................................................................................................... 73
Rollback firmware using CMC web interface........................................................................................................73
Rollback firmware using RACADM.......................................................................................................................... 73
Rollback firmware using Lifecycle Controller........................................................................................................74
Rollback firmware using Lifecycle Controller-Remote Services...................................................................... 74
Recovering iDRAC....................................................................................................................................................... 74
Backing up server profile................................................................................................................................................. 74
Backing up server profile using iDRAC web interface........................................................................................ 75
Backing up server profile using RACADM............................................................................................................. 75
Scheduling automatic backup server profile......................................................................................................... 75
Importing server profile....................................................................................................................................................76
Importing server profile using iDRAC web interface........................................................................................... 77
Importing server profile using RACADM................................................................................................................ 77
4 Contents
Restore operation sequence..................................................................................................................................... 77
Monitoring iDRAC using other Systems Management tools...................................................................................78
Support Server Configuration Profile (SCP) — Import and Export ....................................................................78
Secure Boot Configuration from BIOS Settings (F2)...............................................................................................78
Contents 5
Uploading custom signing certificate......................................................................................................................97
Downloading custom SSL certificate signing certificate ..................................................................................98
Deleting custom SSL certificate signing certificate............................................................................................98
Configuring multiple iDRACs using RACADM.............................................................................................................98
Disabling access to modify iDRAC configuration settings on host system.........................................................99
6 Contents
Using public key authentication for SSH..............................................................................................................122
Chapter 9: Configuring iDRAC for Single Sign-On or smart card login........................................ 147
Prerequisites for Active Directory Single Sign-On or smart card login.............................................................. 147
Registering iDRAC as a computer in Active Directory root domain.............................................................. 147
Generating Kerberos keytab file.............................................................................................................................148
Creating Active Directory objects and providing privileges.............................................................................148
Configuring iDRAC SSO login for Active Directory users...................................................................................... 148
Configuring iDRAC SSO login for Active Directory users using web interface.......................................... 149
Configuring iDRAC SSO login for Active Directory users using RACADM.................................................. 149
Configuring iDRAC smart card login for local users................................................................................................ 149
Uploading smart card user certificate.................................................................................................................. 149
Uploading trusted CA certificate for smart card............................................................................................... 149
Configuring iDRAC smart card login for Active Directory users.......................................................................... 150
Enabling or disabling smart card login........................................................................................................................ 150
Enabling or disabling smart card login using web interface.............................................................................150
Enabling or disabling smart card login using RACADM..................................................................................... 151
Enabling or disabling smart card login using iDRAC settings utility................................................................151
Contents 7
Setting event alerts using RACADM..................................................................................................................... 154
Setting alert recurrence event..................................................................................................................................... 154
Setting alert recurrence events using RACADM................................................................................................154
Setting alert recurrence events using iDRAC web interface.......................................................................... 154
Setting event actions..................................................................................................................................................... 155
Setting event actions using web interface..........................................................................................................155
Setting event actions using RACADM..................................................................................................................155
Configuring email alert, SNMP trap, or IPMI trap settings................................................................................... 155
Configuring IP alert destinations............................................................................................................................155
Configuring email alert settings..............................................................................................................................157
Configuring WS Eventing.............................................................................................................................................. 159
Configuring Redfish Eventing.......................................................................................................................................159
Monitoring chassis events.............................................................................................................................................159
Monitoring chassis events using the iDRAC web interface............................................................................ 159
Monitoring chassis events using RACADM......................................................................................................... 159
Alerts message IDs.......................................................................................................................................................... 160
8 Contents
Chapter 13: Monitoring and managing power.............................................................................. 174
Monitoring power.............................................................................................................................................................174
Monitoring performance index of CPU, memory, and input output modules using web interface........ 174
Monitoring performance index for of CPU, memory, and input output modules using RACADM......... 175
Setting warning threshold for power consumption................................................................................................. 175
Setting warning threshold for power consumption using web interface..................................................... 175
Executing power control operations........................................................................................................................... 175
Executing power control operations using web interface................................................................................175
Executing power control operations using RACADM........................................................................................176
Power capping.................................................................................................................................................................. 176
Power capping in Blade servers............................................................................................................................. 176
Viewing and configuring power cap policy...........................................................................................................176
Configuring power supply options................................................................................................................................177
Configuring power supply options using web interface.................................................................................... 177
Configuring power supply options using RACADM............................................................................................178
Configuring power supply options using iDRAC settings utility......................................................................178
Enabling or disabling power button............................................................................................................................. 178
Multi-Vector Cooling.......................................................................................................................................................178
Contents 9
Monitoring backplane using iDRAC settings utility........................................................................................... 203
Viewing storage device topology................................................................................................................................ 203
Managing physical disks................................................................................................................................................ 203
Assigning or unassigning physical disk as global hot spare.............................................................................203
Converting a physical disk to RAID or non-RAID mode................................................................................... 204
Instant Erase Secured Physical Disk.................................................................................................................... 205
Rebuild Physical Disk................................................................................................................................................206
Managing virtual disks................................................................................................................................................... 206
Creating virtual disks................................................................................................................................................206
Editing virtual disk cache policies..........................................................................................................................208
Deleting virtual disks................................................................................................................................................ 208
Checking virtual disk consistency......................................................................................................................... 209
Initializing virtual disks............................................................................................................................................. 209
Encrypting virtual disks............................................................................................................................................ 210
Assigning or unassigning dedicated hot spares..................................................................................................210
Managing virtual disks using web interface.........................................................................................................212
Managing virtual disks using RACADM.................................................................................................................213
Managing controllers...................................................................................................................................................... 214
Configuring controller properties........................................................................................................................... 214
Importing or auto importing foreign configuration............................................................................................ 216
Clearing foreign configuration................................................................................................................................ 218
Resetting controller configuration......................................................................................................................... 218
Switching the controller mode............................................................................................................................... 219
12 Gbps SAS HBA adapter operations................................................................................................................. 220
Monitoring predictive failure analysis on drives.................................................................................................220
Controller operations in non-RAID mode or HBA mode................................................................................... 221
Running RAID configuration jobs on multiple storage controllers..................................................................221
Manage Preserved cache........................................................................................................................................ 221
Managing PCIe SSDs...................................................................................................................................................... 221
Inventorying and monitoring PCIe SSDs..............................................................................................................222
Preparing to remove PCIe SSD............................................................................................................................. 223
Erasing PCIe SSD device data............................................................................................................................... 224
Managing enclosures or backplanes...........................................................................................................................225
Configuring backplane mode.................................................................................................................................. 225
Viewing universal slots.............................................................................................................................................228
Setting SGPIO mode................................................................................................................................................ 228
Set Enclosure Asset Tag......................................................................................................................................... 229
Set Enclosure Asset Name..................................................................................................................................... 229
Choosing operation mode to apply settings............................................................................................................. 229
Choosing operation mode using web interface..................................................................................................229
Choosing operation mode using RACADM..........................................................................................................230
Viewing and applying pending operations................................................................................................................. 230
Viewing, applying, or deleting pending operations using web interface...................................................... 230
Viewing and applying pending operations using RACADM.............................................................................. 231
Storage devices — apply operation scenarios......................................................................................................... 231
Blinking or unblinking component LEDs.....................................................................................................................232
Blinking or unblinking component LEDs using web interface......................................................................... 232
Blinking or unblinking component LEDs using RACADM................................................................................. 233
10 Contents
Chapter 17: Configuring and using virtual console..................................................................... 236
Supported screen resolutions and refresh rates..................................................................................................... 236
Configuring virtual console........................................................................................................................................... 237
Configuring virtual console using web interface................................................................................................237
Configuring virtual console using RACADM........................................................................................................237
Previewing virtual console............................................................................................................................................ 237
Launching virtual console..............................................................................................................................................237
Launching virtual console using web interface.................................................................................................. 238
Launching virtual console using a URL................................................................................................................ 238
Disabling warning messages while launching virtual console or virtual media using Java or ActiveX
plug-in...................................................................................................................................................................... 238
Using virtual console viewer.........................................................................................................................................239
HTML5 based virtual console.................................................................................................................................239
Synchronizing mouse pointers................................................................................................................................241
Passing all keystrokes through virtual console for Java or ActiveX plug-in............................................... 242
Contents 11
Launching virtual media without using virtual console.................................................................................... 263
Adding virtual media images................................................................................................................................... 264
Viewing virtual device details................................................................................................................................. 264
Resetting USB........................................................................................................................................................... 264
Mapping virtual drive................................................................................................................................................265
Unmapping virtual drive...........................................................................................................................................266
Setting boot order through BIOS................................................................................................................................266
Enabling boot once for virtual media......................................................................................................................... 266
12 Contents
Managing remote file share.................................................................................................................................... 287
Configuring remote file share using web interface...........................................................................................288
Configuring remote file share using RACADM...................................................................................................289
Deploying operating system using virtual media..................................................................................................... 289
Installing operating system from multiple disks................................................................................................. 289
Deploying embedded operating system on SD card...............................................................................................290
Enabling SD module and redundancy in BIOS.................................................................................................... 290
Contents 13
Active Directory.............................................................................................................................................................. 303
Single Sign-On................................................................................................................................................................. 305
Smart card login.............................................................................................................................................................. 305
Virtual console................................................................................................................................................................. 306
Virtual media.................................................................................................................................................................... 308
vFlash SD card................................................................................................................................................................. 310
SNMP authentication..................................................................................................................................................... 310
Storage devices................................................................................................................................................................ 311
iDRAC Service Module.................................................................................................................................................... 311
RACADM............................................................................................................................................................................313
Permanently setting the default password to calvin.............................................................................................. 313
Miscellaneous....................................................................................................................................................................314
14 Contents
1
Overview
The Integrated Dell Remote Access Controller (iDRAC) is designed to make you more productive as a system administrator
and improve the overall availability of Dell EMC servers. iDRAC alerts you to system issues, helps you to perform remote
management, and reduces the need for physical access to the system.
iDRAC with Lifecycle Controller technology is part of a larger data center solution that increases availability of business critical
applications and workloads. The technology allows you to deploy, monitor, manage, configure, update, and troubleshoot Dell
EMC systems from any location without using any agents or an operating system.
Several products work with the iDRAC and Lifecycle Controller to simplify and streamline IT operations. Following are some of
the tools:
● Dell management plug-in for VMware vCenter
● Dell Repository Manager
● Dell management packs for Microsoft System Center Operations Manager (SCOM) and Microsoft System Center
Configuration Manager (SCCM)
● BMC Bladelogic
● Dell OpenManage Essentials/OpenManage Enterprise
● Dell OpenManage Power Center
iDRAC is available in the following variants:
● iDRAC Basic — Available by default for 200-500 series servers
● iDRAC Express — Available by default on all 600 and higher series of rack or tower servers, and all blade servers
● iDRAC Enterprise — Available on all server models
Topics:
• Benefits of using iDRAC with Lifecycle Controller
• Key features
• New in this release
• How to use this guide
• Supported web browsers
• iDRAC licenses
• Licensed features in iDRAC9
• Interfaces and protocols to access iDRAC
• iDRAC port information
• Other documents you may need
• Contacting Dell
• Accessing documents from Dell support site
Overview 15
Key features
The key features of iDRAC include:
NOTE: Some of the features are available only with iDRAC Enterprise license. For information on the features available for a
license, see iDRAC licenses on page 19.
Inventory and Monitoring
● View managed server health.
● Inventory and monitor network adapters and storage subsystem (PERC and direct attached storage) without any operating
system agents.
● View and export system inventory.
● View sensor information such as temperature, voltage, and intrusion.
● Monitor CPU state, processor automatic throttling, and predictive failure.
● View memory information.
● Monitor and control power usage.
● Support for SNMPv3 gets and alerts.
● For blade servers: launch Management Module web interface, view OpenManage Enterprise (OME) Modular information, and
WWN/MAC addresses.
NOTE: CMC provides access to iDRAC through the M1000E Chassis LCD panel and local console connections. For more
information, see Chassis Management Controller User's Guide available at https://www.dell.com/cmcmanuals.
● View network interfaces available on host operating systems.
● iDRAC9 provides improved monitoring and management functionality with Quick Sync 2. You need OpenManage Mobile app
configured in your Android or iOS mobile device.
Deployment
● Manage vFlash SD card partitions.
● Configure front panel display settings.
● Manage iDRAC network settings.
● Configure and use virtual console and virtual media.
● Deploy operating systems using remote file share, virtual media, and VMCLI.
● Enable auto-discovery.
● Perform server configuration using the export or import XML or JSON profile feature through RACADM, WSMan
and Redfish. For more information, see Lifecycle Controller Remote Services Quick Start Guide available at https://
www.dell.com/idracmanuals.
● Configure persistence policy for virtual addresses, initiator, and storage targets.
● Remotely configure storage devices attached to the system at run-time.
● Perform the following operations for storage devices:
○ Physical disks: Assign or unassign physical disk as a global hot spare.
○ Virtual disks:
■ Create virtual disks.
■ Edit virtual disks cache policies.
■ Check virtual disk consistency.
■ Initialize virtual disks.
■ Encrypt virtual disks.
■ Assign or unassign dedicated hot spare.
■ Delete virtual disks.
○ Controllers:
■ Configure controller properties.
■ Import or auto-import foreign configuration.
■ Clear foreign configuration.
■ Reset controller configuration.
■ Create or change security keys.
○ PCIe SSD devices:
■ Inventory and remotely monitor the health of PCIe SSD devices in the server.
■ Prepare the PCIe SSD to be removed.
■ Securely erase the data.
○ Set the backplane mode (unified or split mode).
16 Overview
○ Blink or unblink component LEDs.
○ Apply the device settings immediately, at next system reboot, at a scheduled time, or as a pending operation to be
applied as a batch as part of the single job.
Update
● Manage iDRAC licenses.
● Update BIOS and device firmware for devices supported by Lifecycle Controller.
● Update or rollback iDRAC firmware and Lifecycle Controller firmware using a single firmware image.
● Manage staged updates.
● Back up and restore server profile.
● Access iDRAC interface over direct USB connection.
● Configure iDRAC using Server Configuration Profiles on USB device.
Maintenance and Troubleshooting
● Perform power-related operations and monitor power consumption.
● Optimize system performance and power consumption by modifying the thermal settings.
● No dependency on OpenManage Server Administrator for generation of alerts.
● Log event data: Lifecycle and RAC logs.
● Set email alerts, IPMI alerts, remote system logs, WS Eventing logs, Redfish event, and SNMP traps (v1, v2c, and v3) for
events and improved email alert notification.
● Capture last system crash image.
● View boot and crash capture videos.
● Out-of-band monitor and alert the performance index of CPU, memory, and I/O modules.
● Configure warning threshold for inlet temperature and power consumption.
● Use iDRAC Service Module to:
○ View operating system information.
○ Replicate Lifecycle Controller logs to operating system logs.
○ Automatic system recovery options.
○ Enable or disable status of Full Power Cycle for all System components except the PSU.
○ Remotely hard-reset iDRAC
○ Enable in-band iDRAC SNMP alerts
○ Access iDRAC using host OS (experimental feature)
○ Populate Windows Management Instrumentation (WMI) information.
○ Integrate with SupportAssist collection. This is applicable only if iDRAC Service Module Version 2.0 or later is installed.
○ Prepare to remove NVMe PCIe SSD.
● Generate SupportAssist collection in the following ways:
○ Automatic — Using iDRAC Service Module that automatically invokes the OS Collector tool.
Dell Best Practices regarding iDRAC
● iDRACs are intended to be on a separate management network; they are not designed nor intended to be placed on or
connected to the internet. Doing so could expose the connected system to security and other risks for which Dell is not
responsible.
● Along with locating iDRACs on a separate management subnet, users should isolate the management subnet/vLAN with
technologies such as firewalls, and limit access to the subnet/vLAN to authorized server administrators.
Secure Connectivity
Securing access to critical network resources is a priority. iDRAC implements a range of security features that includes:
● Custom signing certificate for Secure Socket Layer (SSL) certificate.
● Signed firmware updates.
● User authentication through Microsoft Active Directory, generic Lightweight Directory Access Protocol (LDAP) Directory
Service, or locally administered user IDs and passwords.
● Two-factor authentication using the Smart–Card logon feature. The two-factor authentication is based on the physical
smart card and the smart card PIN.
● Single Sign-On and Public Key Authentication.
● Role-based authorization, to configure specific privileges for each user.
● SNMPv3 authentication for user accounts stored locally in the iDRAC. It is recommended to use this, but it is disabled by
default.
● User ID and password configuration.
● Default login password modification.
Overview 17
● Set user passwords and BIOS passwords using one-way hash format for improved security.
● FIPS 140-2 Level 1 capability.
● Support for TLS 1.2, 1.1, and 1.0. To enhance security, default setting is TLS 1.1 and higher.
● SMCLP and web interfaces that support 128 bit and 40-bit encryption (for countries where 128 bit is not acceptable), using
the TLS 1.2 standard.
NOTE: To ensure a secure connection, Dell recommends using TLS 1.1 and higher.
● Session time-out configuration (in seconds).
● Configurable IP ports (for HTTP, HTTPS, SSH, Telnet, Virtual Console, and Virtual Media).
NOTE: Telnet does not support SSL encryption and is disabled by default.
● Secure Shell (SSH) that uses an encrypted transport layer for higher security.
● Login failure limits per IP address, with login blocking from that IP address when the limit is exceeded.
● Limited IP address range for clients connecting to iDRAC.
● Dedicated Gigabit Ethernet adapter available on rack and tower servers (additional hardware may be required).
18 Overview
How to use this guide
The contents of this user's guide enable you to perform various tasks using:
● iDRAC web interface — Only the task-related information is provided here. For information about the fields and options, see
the iDRAC Online Help that you can access from the web interface.
● RACADM — The RACADM command or the object that you must use is provided here. For more information, see the iDRAC
RACADM CLI Guide available at https://www.dell.com/idracmanuals.
● iDRAC Settings Utility — Only the task-related information is provided here. For information about the fields and options,
see the iDRAC Settings Utility Online Help that you can access when you click Help in the iDRAC Settings GUI (press <F2>
during boot, and then click iDRAC Settings on the System Setup Main Menu page).
● Redfish — Only the task-related information is provided here. For information about the fields and options, see the iDRAC
Redfish API Guide available at www.api-marketplace.com.
iDRAC licenses
iDRAC features are available based on the type of the license. Depending on the system model, iDRAC Basic or iDRAC Express
license is installed by default. iDRAC Enterprise license is available as an upgrade and can be purchased anytime. Only licensed
features are available in the interfaces that enable you to configure or use iDRAC. For more information, see Licensed features
in iDRAC9.
Types of licenses
iDRAC Basic or iDRAC Express are the standard licenses available by default on your system. iDRAC Enterprise license includes
all the licensed features and can be purchased at any time. The types of Enterprise license offered are:
● 30-day evaluation—Evaluation licenses are duration-based and the timer runs when power is applied to the system. This
license cannot be extended.
● Perpetual—The license is bound to the Service Tag and is permanent.
Following table lists the default license available in the 14th generation servers:
Overview 19
Table 1. Default License
iDRAC Basic License iDRAC Express License
● PowerEdge R4XX ● PowerEdge C41XX
● PowerEdge R5XX ● PowerEdge FC6XX
● PowerEdge T4XX ● PowerEdge R6XX
● PowerEdge R64XX
● PowerEdge R7XX
● PowerEdge R74XX
● PowerEdge R74XX
● PowerEdge R8XX
● PowerEdge R9XX
● PowerEdge R9XX
● PowerEdge T6XX
● Dell Precision Rack R7920
NOTE: The default license available with PowerEdge C64XX systems is Basic Plus. The Basic Plus license was custom made
for C64XX systems.
NOTE: The default license available with PowerEdge M6XX systems is Express for Blades.
NOTE: To manage licenses or to purchase new licenses, go to the License Self-Service Portal
License operations
Before you perform the license management tasks, ensure that you acquire the licenses. For more information, see the Methods
for acquiring licenses.
NOTE: If you have purchased a system with all the licenses pre-installed, then license management is not required.
You can perform the following licensing operations using iDRAC, RACADM, WSMan, Redfish and Lifecycle Controller-Remote
Services for one-to-one license management, and Dell License Manager for one-to-many license management:
● View — View the current license information.
● Import — After acquiring the license, store the license in a local storage and import it into iDRAC using one of the supported
interfaces. The license is imported if it passes the validation checks.
NOTE: Although you can export the factory-installed license, you cannot import it. To import the license, download the
equivalent license from the Digital Locker or retrieve it from the email you received when you purchased the license.
NOTE: After importing the license, you need to re-login to the iDRAC. This is applicable only for iDRAC web interface.
● Export — Exports the installed license. For more information, see the iDRAC Online Help.
● Delete — Deletes the license. For more information, see the iDRAC Online Help.
● Learn More — Learn more about an installed license, or the licenses available for a component installed in the server.
NOTE: For the Learn More option to display the correct page, ensure that *.dell.com is added to the list of Trusted
Sites in the Security Settings. For more information, see the Internet Explorer help documentation.
For one-to-many license deployment, you can use Dell License Manager. For more information, see Dell License Manager User's
Guide available at https://www.dell.com/esmmanuals.
20 Overview
License component state or condition and available operations
The following table provides the list of license operations available based on the license state or condition:
Overview 21
Table 3. Licensed features in iDRAC9
Feature iDRAC9 iDRAC9 iDRAC9 Express for iDRAC9 Enterprise
Basic Express Blades
Network Time Protocol No Yes Yes Yes
Connectivity
Shared NIC (LOM) Yes Yes N/A Yes 1
Dedicated NIC 2 Yes Yes Yes Yes 2
VLAN tagging Yes Yes Yes Yes
IPv4 Yes Yes Yes Yes
IPv6 Yes Yes Yes Yes
DHCP Yes Yes Yes Yes
DHCP with zero touch No No No Yes
Dynamic DNS Yes Yes Yes Yes
OS pass-through Yes Yes Yes Yes
iDRAC Direct -Front panel USB Yes Yes Yes Yes
Connection View Yes Yes Yes Yes
NFS v4 Yes Yes Yes Yes
SMB2 with NTLMv1 and Yes Yes Yes Yes
NTLMv2
Security
Role-based authority Yes Yes Yes Yes
Local users Yes Yes Yes Yes
SSL encryption Yes Yes Yes Yes
IP blocking No Yes Yes Yes
Directory services (AD, LDAP) No No No Yes
Two-factor authentication No No No Yes
(smart card)
Single sign-On No No No Yes
PK authentication (for SSH) No Yes Yes Yes
FIPS 140-2 Yes Yes Yes Yes
Secure UEFI boot - certificate Yes Yes Yes Yes
management
Lock down mode No No No Yes
Customizable Security Policy Yes Yes Yes Yes
Banner - login page
iDRAC Quick Sync 2 - optional Yes Yes Yes Yes
auth for read operations
iDRAC Quick Sync 2 - add Yes Yes Yes Yes
mobile device number to LCL
Remote Presence
Power control Yes Yes Yes Yes
Boot control Yes Yes Yes Yes
22 Overview
Table 3. Licensed features in iDRAC9
Feature iDRAC9 iDRAC9 iDRAC9 Express for iDRAC9 Enterprise
Basic Express Blades
Serial-over-LAN Yes Yes Yes Yes
Virtual Media No No Yes Yes
Virtual Folders No No No Yes
Remote File Share No No No Yes
HTML5 access to Virtual No No Yes Yes
Console
Virtual Console No No Yes Yes
VNC connection to OS No No No Yes
Quality/bandwidth control No No No Yes
Virtual Console collaboration No No No Yes
(up to six simultaneous users)
Virtual Console chat No No No Yes 2,3
Health Monitoring
Overview 23
Table 3. Licensed features in iDRAC9
Feature iDRAC9 iDRAC9 iDRAC9 Express for iDRAC9 Enterprise
Basic Express Blades
Update
Auto-update No No No Yes
24 Overview
Table 3. Licensed features in iDRAC9
Feature iDRAC9 iDRAC9 iDRAC9 Express for iDRAC9 Enterprise
Basic Express Blades
NOTE: After performing part replacement on RAID hardware, once the process is complete for replacing firmware and
configuration, Lifecycle Logs reports double part replacement entries which is expected behavior.
optional)
Overview 25
Table 3. Licensed features in iDRAC9
Feature iDRAC9 iDRAC9 iDRAC9 Express for iDRAC9 Enterprise
Basic Express Blades
Enhanced Logging in Lifecycle Yes Yes Yes Yes
Controller Log
NOTE: Using more than one interface at the same time may generate unexpected results.
iDRAC Settings Utility Use the iDRAC Settings utility to perform pre-OS operations. It has a subset of the features that are
(F2) available in iDRAC web interface along with other features.
To access iDRAC Settings utility, press <F2> during boot and then click iDRAC Settings on the
System Setup Main Menu page.
Lifecycle Controller Use Lifecycle Controller to perform iDRAC configurations. To access Lifecycle Controller, press
(F10) <F10> during boot and go to System Setup > Advanced Hardware Configuration > iDRAC
Settings. For more information, see Lifecycle Controller User’s Guide available at dell.com/
idracmanuals.
iDRAC Web Interface Use the iDRAC web interface to manage iDRAC and monitor the managed system. The browser
connects to the web server through the HTTPS port. Data streams are encrypted using 128-bit
SSL to provide privacy and integrity. Any connection to the HTTP port is redirected to HTTPS.
Administrators can upload their own SSL certificate through an SSL CSR generation process to
26 Overview
Table 4. Interfaces and protocols to access iDRAC (continued)
Interface or Protocol Description
secure the web server. The default HTTP and HTTPS ports can be changed. The user access is
based on user privileges.
OpenManage NOTE: This interface is only available for MX platforms.
Enterprise (OME)
Modular Web Interface In addition to monitoring and managing the chassis, use the OME-Modular web interface to:
● View the status of a managed system
● Update iDRAC firmware
● Configure iDRAC network settings
● Log in to iDRAC web interface
● Start, stop, or reset the managed system
● Update BIOS, PERC, and supported network adapters
For more information, see the OME - Modular for PowerEdge MX7000 Chassis User's Guide
available at https://www.dell.com/openmanagemanuals.
In addition to monitoring and managing the chassis, use the CMC web interface to:
● View the status of a managed system
● Update iDRAC firmware
● Configure iDRAC network settings
● Log in to iDRAC web interface
● Start, stop, or reset the managed system
● Update BIOS, PERC, and supported network adapters
Server LCD Panel/ Use the LCD on the server front panel to:
Chassis LCD Panel ● View alerts, iDRAC IP or MAC address, user programmable strings.
● Set DHCP
● Configure iDRAC static IP settings.
For blade servers, the LCD is on the chassis front panel and is shared between all the blades.
To reset iDRAC without rebooting the server, press and hold the System Identification button for
16 seconds.
NOTE: LCD panel is only available with rack or tower systems that support front bezel. For blade
servers, the LCD is on the chassis front panel and is shared between all the blades.
RACADM Use this command-line utility to perform iDRAC and server management. You can use RACADM
locally and remotely.
● Local RACADM command-line interface runs on the managed systems that have Server
Administrator installed. Local RACADM communicates with iDRAC through its in-band IPMI host
interface. Since it is installed on the local managed system, users are required to log in to the
operating system to run this utility. A user must have a full administrator privilege or be a root
user to use this utility.
● Remote RACADM is a client utility that runs on a management station. It uses the out-of-band
network interface to run RACADM commands on the managed system and uses the HTTPs
channel. The –r option runs the RACADM command over a network.
● Firmware RACADM is accessible by logging in to iDRAC using SSH. You can run the firmware
RACADM commands without specifying the iDRAC IP, user name, or password.
● You do not have to specify the iDRAC IP, user name, or password to run the firmware RACADM
commands. After you enter the RACADM prompt, you can directly run the commands without
the racadm prefix.
iDRAC RESTful API and The Redfish Scalable Platforms Management API is a standard defined by the Distributed
Redfish Management Task Force (DMTF). Redfish is a next-generation systems management interface
standard, which enables scalable, secure, and open server management. It is a new interface that
uses RESTful interface semantics to access data that is defined in model format to perform out-
Overview 27
Table 4. Interfaces and protocols to access iDRAC
Interface or Protocol Description
of-band systems management. It is suitable for a wide range of servers ranging from stand-alone
servers to rack mount and bladed environments and for large scale cloud environments.
Redfish provides the following benefits over existing server management methods:
● Increased simplicity and usability
● High data security
● Programmable interface that can be easily scripted
● Follows widely-used standards
For iDRAC Redfish API guide, go to www.api-marketplace.com
WSMan The LC-Remote Service is based on the WSMan protocol to do one-to-many systems management
tasks. You must use WSMan client such as WinRM client (Windows) or the OpenWSMan client
(Linux) to use the LC-Remote Services functionality. You can also use Power Shell or Python to
script to the WSMan interface.
Web Services for Management (WSMan) is a Simple Object Access Protocol (SOAP)–based
protocol used for systems management. iDRAC uses WSMan to convey Distributed Management
Task Force (DMTF) Common Information Model (CIM)–based management information. The CIM
information defines the semantics and information types that can be modified in a managed system.
The data available through WSMan is provided by iDRAC instrumentation interface mapped to the
DMTF profiles and extension profiles.
For more information, see the following:
● Lifecycle Controller Remote Services Quick Start Guide available at https://www.dell.com/
idracmanuals .
● MOFs and Profiles — http://downloads.dell.com/wsman.
● DMTF website — dmtf.org/standards/profiles
SSH Use SSH to run RACADM commands. The SSH service is enabled by default on iDRAC. The SSH
service can be disabled in iDRAC. iDRAC only supports SSH version 2 with the RSA host key
algorithm. A unique 1024-bit RSA host key is generated when you power-up iDRAC for the first time.
IPMITool Use the IPMITool to access the remote system’s basic management features through iDRAC. The
interface includes local IPMI, IPMI over LAN, IPMI over Serial, and Serial over LAN. For more
information on IPMITool, see the Dell OpenManage Baseboard Management Controller Utilities
User’s Guide at dell.com/idracmanuals.
NOTE: IPMI version 1.5 is not supported.
NTLM iDRAC allows NTLM to provide authentication, integrity, and confidentiality to the users. NT LAN
Manager (NTLM) is a suite of Microsoft security protocols and it works in a Windows network.
SMB iDRAC9 supports the Server Message Block (SMB) Protocol. This is a network file sharing protocol
and the default minimum SMB version supported is 2.0, SMBv1 is no longer supported.
NFS iDRAC9 supports Network File System (NFS). This is a distributed filesystem protocol that
enables users to mount remote directories on the servers.
28 Overview
Table 5. Ports iDRAC listens for connections
Port Configurabl Maximum Encryption Level
Type Function
number e port
23 TCP TELNET Yes None
80 TCP HTTP Yes None
161 UDP SNMP Agent Yes None
443 TCP HTTPS Yes 256-bit SSL
623 UDP RMCP/RMCP+ No 128-bit SSL
5900 TCP Virtual console keyboard and mouse redirection, Yes 128-bit SSL
Virtual Media, Virtual folders, and Remote File
Share
5901 TCP VNC Yes 128-bit SSL
The following table lists the ports that iDRAC uses as a client:
NOTE: When Group Manager is enabled, iDRAC uses mDNS to communicate through port 5353. However, when it is
disabled, port 5353 is blocked by iDRAC's internal firewall and appears as open|filtered port in the port scans.
Overview 29
● The Dell Remote Access Configuration Tool User’s Guide provides information on how to use the tool to discover iDRAC
IP addresses in your network and perform one-to-many firmware updates and active directory configurations for the
discovered IP addresses.
● The Dell Systems Software Support Matrix provides information about the various Dell systems, the operating systems
supported by these systems, and the Dell OpenManage components that can be installed on these systems.
● The iDRAC Service Module User's Guide provides information to install the iDRAC Service Module.
● The Dell OpenManage Server Administrator Installation Guide contains instructions to help you install Dell OpenManage
Server Administrator.
● The Dell OpenManage Management Station Software Installation Guide contains instructions to help you install Dell
OpenManage management station software that includes Baseboard Management Utility, DRAC Tools, and Active Directory
Snap-In.
● The Dell OpenManage Baseboard Management Controller Management Utilities User’s Guide has information about the IPMI
interface.
● The Release Notes provides last-minute updates to the system or documentation or advanced technical reference material
intended for experienced users or technicians.
The following system documents are available to provide more information:
● The safety instructions that came with your system provide important safety and regulatory information. For additional
regulatory information, see the Regulatory Compliance home page at dell.com/regulatory_compliance. Warranty
information may be included within this document or as a separate document.
● The Rack Installation Instructions included with your rack solution describe how to install your system into a rack.
● The Getting Started Guide provides an overview of system features, setting up your system, and technical specifications.
● The Installation and Service Manual provides information about system features and describes how to troubleshoot the
system and install or replace system components.
Contacting Dell
NOTE: If you do not have an active Internet connection, you can find contact information on your purchase invoice, packing
slip, bill, or Dell product catalog.
Dell provides several online and telephone-based support and service options. Availability varies by country and product, and
some services may not be available in your area. To contact Dell for sales, technical support, or customer service issues, visit
https://www.dell.com/contactdell.
30 Overview
Accessing documents using product selector
You can also access documents by selecting your product.
1. Go to https://www.dell.com/support.
2. Click Browse all products.
3. Click the desired product category, such as Servers, Software, Storage, and so on.
4. Click the desired product and then click the desired version if applicable.
NOTE: For some products, you may need to navigate through the subcategories.
5. Click DOCUMENTATION.
6. Click MANUALS AND DOCUMENTS.
Overview 31
2
Logging in to iDRAC
You can log in to iDRAC as an iDRAC user, as a Microsoft Active Directory user, or as a Lightweight Directory Access Protocol
(LDAP) user. You can also log in using Single Sign-On or Smart Card.
To improve security, each system is shipped with a unique password for iDRAC, which is available on the system information
tag. This unique password improves security of iDRAC and your server. The default user name is root.
While ordering the system, you can choose to retain the legacy password—calvin—as the default password. If you choose to
retain the legacy password, the password is not available on the system information tag.
In this version, DHCP is enabled by default and iDRAC IP address is assigned dynamically.
NOTE:
● You must have Login to iDRAC privilege to log in to iDRAC.
● iDRAC GUI does not support browser buttons such as Back, Forward, or Refresh.
NOTE: For information on recommended characters for user names and passwords, see Recommended characters in user
names and passwords on page 125.
To change the default password, see Changing the default login password on page 39.
32 Logging in to iDRAC
NOTE: In addition to Active Directory, openLDAP, openDS, Novell eDir, and Fedora-based directory services are supported.
NOTE: LDAP authentication with OpenDS is supported. The DH key must be larger than 768 bits.
5. For an LDAP user, in the Username and Password fields, enter your LDAP user name and password. Domain name is not
required for LDAP login. By default, This iDRAC is selected in the drop-down menu.
6. Click Submit. You are logged in to iDRAC with the required user privileges.
If you log in with Configure Users privileges and the default account credentials, and if the default password warning feature
is enabled, the Default Password Warning page is displayed allowing you to easily change the password.
2. Insert the smart card into the reader and click Login.
A prompt is displayed for the smart card’s PIN. A password is not required.
3. Enter the Smart Card PIN for local smart card users.
You are logged in to the iDRAC.
NOTE: If you are a local user for whom Enable CRL check for Smart Card Logon is enabled, iDRAC attempts
to download the certificate revocation list (CRL) and checks the CRL for the user's certificate. The login fails if the
certificate is listed as revoked in the CRL or if the CRL cannot be downloaded for some reason.
Logging in to iDRAC 33
Logging in to iDRAC as an Active Directory user using a smart card
Before you log in as an Active Directory user using smart card, ensure that you:
● Upload a Trusted Certificate Authority (CA) certificate (CA-signed Active Directory certificate) to iDRAC.
● Configure the DNS server.
● Enable Active Directory login.
● Enable smart card login.
To log in to iDRAC as an Active Directory user using smart card:
1. Log in to iDRAC using the link https://[IP address].
The iDRAC Login page is displayed prompting you to insert the smart card.
NOTE: If the default HTTPS port number (port 443) is changed, type: https://[IP address]:[port number]
where, [IP address] is the iDRAC IP address and [port number] is the HTTPS port number.
If the smart card user is present in Active Directory, an Active Directory password is not required.
iDRAC logs you in with appropriate Microsoft Active Directory privileges, using your credentials that were cached in the
operating system when you logged in using a valid Active Directory account.
34 Logging in to iDRAC
Accessing iDRAC using remote RACADM
You can use remote RACADM to access iDRAC using RACADM utility.
For more information, see the iDRAC RACADM CLI Guide available at https://www.dell.com/idracmanuals.
If the management station has not stored the iDRAC’s SSL certificate in its default certificate storage, a warning message is
displayed when you run the RACADM command. However, the command is executed successfully.
NOTE: The iDRAC certificate is the certificate iDRAC sends to the RACADM client to establish the secure session. This
certificate is either issued by a CA or self-signed. In either case, if the management station does not recognize the CA or
signing authority, a warning is displayed.
2. Find the location of the default CA certificate bundle on the management station. For example, for RHEL5 64 bit, it
is /etc/pki/tls/cert.pem.
3. Append the PEM formatted CA certificate to the management station CA certificate.
For example, use the cat command: cat testcacert.pem >> cert.pem
4. Generate and upload the server certificate to iDRAC.
Logging in to iDRAC 35
Table 7. Possible values for system status (continued)
Host System Lifecycle Controller (LC) Real Time Status Overall Status
● Lifecycle Controller
Unified Server
Configurator
● Server has halted at F1/F2
error prompt because of a
POST error
● Server has halted at
F1/F2/F11 prompt because
there are no bootable
devices available
● Server has entered F2
setup menu
● Server has entered F11
Boot Manager menu
1. Read/Write: Read Only
2. User Privilege: Login User
3. License Required: iDRAC Express or iDRAC Enterprise
4. Dependency: None
ssh username@<domain>
or
ssh username@<IP_address>
Remote RACADM 4
36 Logging in to iDRAC
Table 8. Multiple iDRAC sessions (continued)
Interface Number of Sessions
Telnet - 2
Serial - 1
NOTE: For PowerEdge C6420, M640, and FC640, the default password is calvin.
NOTE: Resetting iDRAC to the factory default settings reverts the default password to the one that the server was
shipped with.
If you have forgotten the password and do not have access to the system information tag, there are a few methods to reset the
password locally or remotely.
WARNING: Resetting iDRAC to default all, resets the iDRAC to the factory defaults.
Logging in to iDRAC 37
Resetting default password using local RACADM
1. Log in to the host OS installed on the system.
2. Access the local RACADM interface.
3. Follow the instructions in Changing the default login password using RACADM on page 39.
38 Logging in to iDRAC
Changing the default login password
The warning message that allows you to change the default password is displayed if:
● You log in to iDRAC with Configure User privilege.
● The default password warning feature is enabled.
● The default iDRAC user name and password are provided on the system information tag.
A warning message is also displayed when you log in to iDRAC using SSH, Telnet, remote RACADM, or the Web interface. For
Web interface, SSH, and Telnet, a single warning message is displayed for each session. For remote RACADM, the warning
message is displayed for each command.
NOTE: For information on recommended characters for user names and passwords, see Recommended characters in user
names and passwords on page 125.
NOTE: Continue is enabled only if the passwords entered in the New Password and Confirm Password fields match.
For information about the other fields, see the iDRAC Online Help.
where, <index> is a value from 1 to 16 (indicates the user account) and <password> is the new user defined password.
NOTE: The index for the default account is 2.
For more information, see the iDRAC RACADM CLI Guide available at https://www.dell.com/idracmanuals.
NOTE: For information on recommended characters for user names and passwords, see Recommended characters in user
names and passwords on page 125.
Logging in to iDRAC 39
Enabling or disabling default password warning
message
You can enable or disable the display of the default password warning message. To do this, you must have Configure Users
privilege.
IP Blocking
You can use IP blocking to dynamically determine when excessive login failures occur from an IP address and block or prevent
the IP address from logging into the iDRAC9 for a preselected time span. IP blocking includes:
● The number of allowable login failures.
● The timeframe in seconds when these failures must occur.
● The amount of time, in seconds, when the IP address is prevented from establishing a session after the total allowable
number of failures is exceeded.
As consecutive login failures accumulate from a specific IP address, they are tracked by an internal counter. When the user logs
in successfully, the failure history is cleared and the internal counter is reset.
NOTE: When consecutive login attempts are refused from the client IP address, some SSH clients may display the following
message:
iDRAC.IPBlocking.FailWindow
iDRAC.IPBlocking.PenaltyTime
40 Logging in to iDRAC
1. Go to iDRAC Settings > Connectivity > Network > OS to iDRAC Pass-through.
The OS to iDRAC Pass-through page is displayed.
2. Change the State to Enabled.
3. Select any of the following options for Pass-through Mode:
● LOM — The OS to iDRAC pass-through link between the iDRAC and the host operating system is established through
the LOM or NDC.
● USB NIC — The OS to iDRAC pass-through link between the iDRAC and the host operating system is established
through the internal USB bus.
4. If you select LOM as the pass-through configuration, and if the server is connected using dedicated mode, enter the IPv4
address of the operating system.
NOTE: If the server is connected in shared LOM mode, then the OS IP Address field is disabled.
NOTE: If the VLAN is enabled on the iDRAC, the LOM-Passthrough will only function in shared LOM mode with VLAN
tagging configured on the host.
5. If you select USB NIC as the pass-through configuration, enter the IP address of the USB NIC.
The default value is 169.254.1.1. It is recommended to use the default IP address. However, if this IP address conflicts with
an IP address of other interfaces of the host system or the local network, you must change it.
Do not enter 169.254.0.3 and 169.254.0.4 IPs. These IPs are reserved for the USB NIC port on the front panel when a A/A
cable is used.
6. Click Apply.
7. Click Test Network Configuration to check if the IP is accessible and the link is established between the iDRAC and the
host operating system.
n=0 — Disabled
n=1 — Enabled
Logging in to iDRAC 41
3
Setting up managed system
If you need to run local RACADM or enable Last Crash Screen capture, install the following from the Dell Systems Management
Tools and Documentation DVD:
● Local RACADM
● Server Administrator
For more information about Server Administrator, see OpenManage Server Administrator User's Guide available at https://
www.dell.com/openmanagemanuals.
Topics:
• Setting up iDRAC IP address
• Modifying local administrator account settings
• Setting up managed system location
• Optimizing system performance and power consumption
• Setting up management station
• Configuring supported web browsers
• Updating device firmware
• Viewing and managing staged updates
• Rolling back device firmware
• Backing up server profile
• Importing server profile
• Monitoring iDRAC using other Systems Management tools
• Support Server Configuration Profile (SCP) — Import and Export
• Secure Boot Configuration from BIOS Settings (F2)
NOTE: Shared LOM is not supported on the Intel 2P X520–k bNDC 10 G if they are used in a full-height server with two
NDCs because they do not support hardware arbitration.
3. From the Failover Network drop-down menu, select one of the remaining LOMs. If a network fails, the traffic is routed
through the failover network.
For example, to route the iDRAC network traffic through LOM2 when LOM1 is down, select LOM1 for NIC Selection and
LOM2 for Failover Network.
NOTE: If you have selected Dedicated in NIC Selection drop-down menu, the option is grayed-out.
4. Under Auto Negotiation, select On if iDRAC must automatically set the duplex mode and network speed.
This option is available only for dedicated mode. If enabled, iDRAC sets the network speed to 10, 100, or 1000 Mbps based on
the network speed.
NOTE: If network teaming is configured for the host OS using the same network adapter as NIC Selection, then
the Failover Network should also be configured. NIC Selection and Failover Network should use the ports that are
configured as a part of the network team. If more than two ports are used as part of the network team, then the
Failover Network selection should be "All".
Common settings
If network infrastructure has DNS server, register iDRAC on the DNS. These are the initial settings requirements for advanced
features such as Directory services—Active Directory or LDAP, Single Sign On, and smart card.
To register iDRAC:
1. Enable Register DRAC on DNS.
2. Enter the DNS DRAC Name.
3. Select Auto Config Domain Name to automatically acquire domain name from DHCP. Else, provide the DNS Domain
Name.
2. Select Enabled option under Enable DHCP, so that DHCP can automatically assign the IP address, gateway, and subnet
mask to iDRAC. Else, select Disabled and enter the values for:
● Static IP Address
● Static Gateway
● Static Subnet Mask
3. Optionally, enable Use DHCP to obtain DNS server address, so that the DHCP server can assign the Static Preferred
DNS Server and Static Alternate DNS Server. Else, enter the IP addresses for Static Preferred DNS Server and
Static Alternate DNS Server.
6. If you are using DHCP, enable DHCPv6 to obtain DNS Server addresses to obtain Primary and Secondary DNS server
addresses from DHCPv6 server. You can configure the following if required:
● In the Static Preferred DNS Server box, enter the static DNS server IPv6 address.
● In the Static Alternate DNS Server box, enter the static alternate DNS server.
VLAN settings
You can configure iDRAC into the VLAN infrastructure. To configure VLAN settings, perform the following steps:
NOTE: On blade servers that are set as Chassis (Dedicated), the VLAN settings are read-only and can be changed only
using CMC. If the server is set in shared mode, you can configure VLAN settings in shared mode in iDRAC.
1. Under Enable VLAN ID, select Enabled.
2. In the VLAN ID box, enter a valid number from 1 to 4094.
3. In the Priority box, enter a number from 0 to 7 to set the priority of the VLAN ID.
NOTE: After enabling VLAN, the iDRAC IP is not accessible for some time.
4. Click Network.
The iDRAC Settings Network page is displayed.
5. Enable NIC.
6. Enable IPv4.
NOTE: IPv6 is not supported for auto-discovery.
7. Enable DHCP and get the domain name, DNS server address, and DNS domain name from DHCP.
NOTE: Step 7 is optional if the provisioning server IP address (step 3) is provided.
HTTP 5 or http
HTTPS 6 or https
NOTE: HTTPS certificates are not supported with Auto Config. Auto Config ignores certificate warnings.
Following list describes the required and optional parameters to pass in for the string value:
-f (Filename): name of exported Server Configuration Profile file. This is required for iDRAC firmware versions prior to
2.20.20.20.
-n (Sharename): name of network share. This is required for NFS or CIFS.
-s (ShareType): pass in either 0 for NFS, 2 for CIFS, 5 for HTTP and 6 for HTTPS. This is a mandatory field for iDRAC
firmware versions 3.00.00.00.
-i (IPAddress): IP address of the network share. This is a mandatory field.
-u (Username): username that has access to network share. This is a mandatory field for CIFS.
-p (Password): user password that has access to network share. This is a mandatory field for CIFS.
-d (ShutdownType): either 0 for graceful or 1 for forced (default setting: 0). This is an optional field.
-t (Timetowait): time to wait for the host to shutdown (default setting: 300). This is an optional field.
-e (EndHostPowerState): either 0 for OFF or 1 for ON (default setting 1). This is an optional field.
The additional option flags are supported in iDRAC firmware 3.00.00.00 or later to enable the configuration of HTTP proxy
parameters and set the retry timeout for accessing the Profile file:
—pd (ProxyDefault): Use default proxy setting. This is an optional field.
—pt (ProxyType): The user can pass in http or socks (default setting http). This is an optional field.
—ph (ProxyHost): IP address of the proxy host. This is an optional field.
—pu (ProxyUserName): username that has access to the proxy server. This is required for proxy support.
—pp (ProxyPassword): user password that has access to the proxy server. This is required for proxy support.
—po (ProxyPort): port for the proxy server (default setting is 80). This is an optional field.
—to (Timeout): specifies the retry timeout in minutes for obtaining config file (default is 60 minutes).
For iDRAC firmware 3.00.00.00 or later, JSON format Profile files are supported. The following file names will be used if the
Filename parameter is not present:
● <service tag>-config.xml, Example: CDVH7R1-config.xml
● <model number>-config.xml, Example: R640-config.xml
● config.xml
● <service tag>-config.json, Example:CDVH7R1-config.json
● <model number>-config.json, Example: R630-config.json
● config.json
NOTE: More information about HTTP can be found in the 14G Support for HTTP and HTTPS across IDRAC9 with Lifecycle
Controller Interfaces white paper at https://www.dell.com/support.
NOTE:
● Auto Config can only be enabled when DHCPv4 and the Enable IPV4 options are enabled.
● Auto Config and Auto Discovery features are mutually exclusive. Disable Auto Discovery for Auto Config to work.
● The Auto Config is disabled after a server has carried out an Auto Config operation.
If all the Dell PowerEdge servers in the DHCP server pool are of the same model type and number, then a single SCP file
(config.xml) is required. The config.xml file name is used as the default SCP file name. In addition to .xml file, .json
files can also be used with 14G systems. The file can be config.json.
NOTE: If none of these files are on the network share, then the server configuration profile import job is marked as failed
for file not found.
DHCP options
DHCPv4 allows many globally defined parameters to be passed to the DHCP clients. Each parameter is known as a DHCP
option. Each option is identified with an option tag, which is a 1-byte value. Option tags 0 and 255 are reserved for padding and
end of options, respectively. All other values are available for defining options.
The DHCP Option 43 is used to send information from the DHCP server to the DHCP client. The option is defined as a text
string. This text string is set to contain the values of the SCP filename, share location and the credentials to access the location.
For example,
where, -i is the location of the Remote File Share and –f is the file name in the string along with the credentials to the Remote
File Share.
The DHCP Option 60 identifies and associates a DHCP client with a particular vendor. Any DHCP server configured to take
action based on a client’s vendor ID should have Option 60 and Option 43 configured. With Dell PowerEdge servers, the iDRAC
identifies itself with vendor ID: iDRAC. Therefore, you must add a new ‘Vendor Class’ and create a ‘scope option’ under it for
‘code 60,’ and then enable the new scope option for the DHCP server.
The following are the required and optional parameters that must be passed in the vendor class identifier string:
● Filename (–f) — Indicates the name of the exported Server Configuration Profile file.
NOTE: For more information on file naming rules, see Configuring servers and server components using Auto Config
on page 46.
● Sharename (-n) — Indicates the name of the network share.
● ShareType (-s) — Indicates the share type. 0 indicates NFS, 2 indicates CIFS, 5 indicates HTTP, and 6 indicates HTTPS.
NOTE: Example for Linux NFS, CIFS, HTTP, HTTPS share:
○ NFS: -f system_config.xml -i 192.168.0.130 -n /nfs -s 0 -d 0 -t 500
Ensure that you use NFS2 or NFS3 for NFS network share.
host my_host {
host my_host {
hardware ethernet b8:2a:72:fb:e6:56;
fixed-address 192.168.0.211;
option host-name "my_host";
option myname " -f r630_raid.xml -i 192.168.0.1 -n /nfs -s 0 -d 0 -t 300";
}
NOTE: After editing the dhcpd.conf file, make sure to restart the dhcpd service to apply the changes.
You can generate the hash password with and without Salt using SHA256.
You must have Server Control privileges to include and export hash passwords.
If access to all accounts is lost, use iDRAC Settings Utility or local RACADM and perform reset iDRAC to default task.
If the password of the iDRAC user account is set with the SHA256 password hash only and not the other hashes (SHA1v3Key or
MD5v3Key or IPMIKey), then authentication through SNMP v3 and IPMI is not available.
You must set the Salt attribute when the associated hash is set.
NOTE: The attributes are not applicable to the INI configuration file.
Generate Hex Representation of Salt -> echo -n ALITTLEBITOFSALT | xxd –p -> <HEX-
SALT>
3. Provide hash value and salt in the imported server configuration profile, the RACADM commands, Redfish, or WSMan.
NOTE: If you wish to clear a previously salted password, then ensure that the password-salt is explicitly set to an empty
string i.e.
set iDRAC.Users.4.SHA256Password
ca74e5fe75654735d3b8d04a7bdf5dcdd06f1c6c2a215171a24e5a9dcb28e7a2
set iDRAC.Users.4.SHA256PasswordSalt
4. After setting the password, the normal plain text password authentication works except that SNMP v3 and IPMI
authentication fails for the iDRAC user accounts that had passwords updated with hash.
This option allows the system fans speeds to change such that the exhaust temperature does not exceed the selected
exhaust temperature limit. This cannot always be guaranteed under all system operating conditions due to dependency on
system load and system cooling capability.
NOTE: 0% PWM does not indicate fan is off. It is the lowest fan speed that the fan can achieve.
The settings are persistent, which means that once they are set and applied, they do not automatically change to the default
setting during system reboot, power cycling, iDRAC, or BIOS updates. A few Dell servers may or may not support some or
all of these custom user cooling options. If the options are not supported, they are not displayed or you cannot provide a
custom value.
racadm set
system.thermalsetti
ngs.AirExhaustTemp
4
Object value
modified
successfully.
racadm set
system.thermalsetti
ngs.AirExhaustTemp
0
ERROR: RAC947:
Invalid object
value specified.
racadm set
system.thermalsetti
ngs.AirExhaustTemp
255
racadm set
system.thermalsetti
ngs FanSpeedOffset
1
racadm set
system.thermalsetti
ngs FanSpeedOffset
0
racadm set
system.thermalsetti
ngs FanSpeedOffset
3
racadm set
system.thermalsetti
ngs FanSpeedOffset
2
FanSpeedOffset ● Using this object with Values are: To view the existing setting:
get command displays the ● 0 — Low Fan Speed
existing Fan Speed Offset ● 1 — High Fan Speed racadm get
value. system.thermalsetti
● 2 — Medium Fan Speed
● Using this object with set ngs.FanSpeedOffset
● 3 — Max Fan Speed
command allows setting
● 255 — None To set the fan speed offset
the required fan speed
offset value. to High value (as defined in
● The index value decides FanSpeedHighOffsetVal)
the offset that is applied
and the racadm set
FanSpeedLowOffsetVa system.thermalsetti
ngs.FanSpeedOffset
l, 1
FanSpeedMaxOffsetVa
l,
FanSpeedHighOffsetV
al, and
FanSpeedMediumOffse
tVal objects (defined
earlier) are the values at
which the offsets are
applied.
MFSMaximumLimit Read Maximum limit for MFS Values from 1 — 100 To display the highest value
that can be set using
MinimumFanSpeed option:
racadm get
system.thermalsetti
ngs.MFSMaximumLimit
MFSMinimumLimit Read Minimum limit for MFS Values from 0 to To display the lowest value
MFSMaximumLimit that can be set using
MinimumFanSpeed option.
Default is 255 (means None)
racadm get
system.thermalsetti
ngs.MFSMinimumLimit
ThermalProfile ● Allows you to specify the Values: To view the existing thermal
Thermal Base Algorithm. ● 0 — Auto profile setting:
● Allows you to set the ● 1 — Maximum
system profile as required performance racadm get
for thermal behavior ● 2 — Minimum Power system.thermalsetti
associated to the profile. ngs.ThermalProfile
racadm set
system.thermalsetti
ngs.ThermalProfile
1
4. From the Dell Systems Management Tools and Documentation DVD, install Remote RACADM and VMCLI from the
SYSMGMT folder. Else, run Setup on the DVD to install Remote RACADM by default and other OpenManage software.
For more information about RACADM, see iDRAC RACADM Command Line Interface Reference Guide available at dell.com/
idracmanuals..
5. Install the following based on the requirement:
● Telnet
● SSH client
● TFTP
● Dell OpenManage Essentials
NOTE: You need Java 8 or later to use this feature and to launch iDRAC Virtual Console over an IPv6 network.
4. Import the root certificates on the managed system to avoid the pop-ups that prompt you to verify the certificates.
5. Install the compat-libstdc++-33-3.2.3-61 related package.
NOTE: On Windows, the compat-libstdc++-33-3.2.3-61 related package may be included in the .NET
framework package or the operating system package.
6. If you are using MAC operating system, select the Enable access for assistive devices option in the Universal Access
window.
For more information, see the MAC operating system documentation.
https://[fe80::d267:e5ff:fef4:2fe9]/ to https://fe80--d267-e5ff-fef4-2fe9.ipv6-
literal.net/
● Direct HTML5 virtual console in IE using an IPv6 address, modify the IPv6 address as follows:
https://[fe80::d267:e5ff:fef4:2fe9]/console to https://fe80--d267-e5ff-
fef4-2fe9.ipv6-literal.net/console
3. To display the Title Bar information in IE, go to Control Panel > Appearance and Personalization > Personalization >
Window Classic
NOTE: You can use ActiveX plug-in only with Internet Explorer.
NOTE: To use ActiveX plug-in on systems with Internet Explorer 9, before configuring Internet Explorer, ensure that you
disable the Enhanced Security Mode in Internet Explorer or in the server manager in Windows Server operating systems.
For ActiveX applications in Windows 7, Windows 2008, and Windows 10 configure the following Internet Explorer settings to use
the ActiveX plug-in:
1. Clear the browser’s cache.
2. Add iDRAC IP or host name to the Local Internet site list.
3. Reset the custom settings to Medium-low or change the settings to allow installation of signed ActiveX plug-ins.
4. Enable the browser to download encrypted content and to enable third-party browser extensions. To do this, go to Tools
> Internet Options > Advanced, clear the Do not save encrypted pages to disk option, and select the Enable third-
party browser extensions option.
NOTE: Restart Internet Explorer for the Enable third-party browser extension setting to take effect.
5. Go to Tools > Internet Options > Security and select the zone in which you want to run the application.
6. Click Custom level. In the Security Settings window, do the following:
● Select Enable for Automatic prompting for ActiveX controls.
NOTE:
● The varying versions of Internet Explorer share Internet Options. Therefore, after you add the server to the list of
trusted sites for one browser the other browser uses the same setting.
● Before installing the ActiveX control, Internet Explorer may display a security warning. To complete the ActiveX
control installation procedure, accept the ActiveX control when Internet Explorer prompts you with a security
warning.
● If you get the error Unknown Publisher while launching Virtual Console, it may be caused because of the change to
the code-signing certificate path. To resolve this error, you must download an addition key. Use a search engine to
search for Symantec SO16958 and, from the search results, follow the instructions on the Symantec website.
The following table provides information on whether a system restart is required when firmware is updated for a particular
component:
* Indicates that though a system restart is not required, iDRAC must be restarted to apply the updates. iDRAC communication
and monitoring may temporarily be interrupted.
When you check for updates, the version marked as Available does not always indicate that it is the latest version available.
Before you install the update, ensure that the version you choose to install is newer than the version currently installed. If you
want to control the version that iDRAC detects, create a custom repository using Dell Repository Manager (DRM) and configure
iDRAC to use that repository to check for updates.
6. To display the Job Queue page, click Job Queue. Use this page to view and manage the staged firmware updates or click
OK to refresh the current page and view the status of the firmware update.
NOTE: If you navigate away from the page without saving the updates, an error message is displayed and all the
uploaded content is lost.
● To perform all applicable updates from an update repository using myfile.xml as a catalog file and perform a graceful
reboot:
● To perform all applicable updates from an FTP update repository using Catalog.xml as a catalog file:
NOTE: IPv6 address is not supported for scheduling automatic firmware updates.
For example,
○ To automatically update firmware using a CIFS share:
path
the location on the TFTP server where firmimg.d9 is stored.
● Using update command:
FTP server:
● Using fwupdate command:
path
the location on the FTP server where firmimg.d9 is stored.
● Using update command:
For more information, see the iDRAC RACADM Command Line Interface Reference Guide available at dell.com/
idracmanuals.
NOTE: You cannot perform firmware rollback for Diagnostics, Driver Packs, and CPLD.
racadm swinventory
For more information, see iDRAC RACADM Command Line Interface Reference Guide available at dell.com/idracmanuals.
Recovering iDRAC
iDRAC supports two operating system images to make sure a bootable iDRAC. In the event of an unforeseen catastrophic error
and you lose both boot paths:
● iDRAC bootloader detects that there is no bootable image.
● System Health and Identify LED is flashed at ~1/2 second rate. (LED is located on the back of a rack and tower servers and
on the front of a blade server.)
● Bootloader is now polling the SD card slot.
● Format an SD card with FAT using a Windows operating system, or EXT3 using a Linux operating system.
● Copy firmimg.d9 to the SD card.
● Insert the SD card into the server.
● Bootloader detects the SD card, turns the flashing LED to solid amber, reads the firmimg.d9, reprograms iDRAC, and then
reboots iDRAC.
System Inventory with iDRAC may be stale,start CSIOR for updated inventory
3. Enter the backup File Name , Backup File Passphrase (optional), Confirm Passphrase details.
4. If Network is selected as the file location, enter the network settings accordingly.
NOTE: While specifying the network share settings, it is recommended to avoid special characters for user name and
password or percent encode the special characters.
For information about the fields, see the iDRAC Online Help.
NOTE: IPv6 address is not supported for scheduling automatic backup server profile.
racadm systemconfig backup –f <filename> <target> [-n <passphrase>] -time <hh:mm> -dom
<1-28,L,’*’> -dow<*,Sun-Sat> -wom <1-4, L,’*’> -rp <1-366>-mb <Max Backups>
For more information, see the iDRAC RACADM Command Line Interface Reference Guide available at dell.com/idracmanuals.
When the import is in-progress, if you initiate an import operation again, the following error message is displayed:
Easy Restore
After you replace the motherboard on your server, Easy Restore allows you to automatically restore the following data:
● System Service Tag
● Licenses data
● UEFI Diagnostics application
● System configuration settings—BIOS, iDRAC, and NIC
NOTE: You can browse to a specific location to import the server configuration files. You need to select the correct server
configuration file that you want to import. For example, import.xml.
NOTE: Depending on the exported file format (that you selected), the extension is added automatically. For example,
export_system_config.xml.
3. .crt
KEK X.509 Certificate (binary DER More than one
1. .cer
format only)
Public Key Store 2. .der
3. .crt
4. .pbk
4. .efi
The Secure Boot Settings feature can be accessed by clicking System Security under System BIOS Settings. To go to System
BIOS Settings, press F2 when the company logo is displayed during POST.
● By default, Secure Boot is in the Disabled mode and the Secure Boot policy is set to Standard. If the Secure Boot needs to
be activated, the Secure Boot must be configured as Enabled.
● When the Secure Boot mode is set to Standard, it indicates that the system has default certificates and image digests or
hash loaded from the factory. These caters to the security of standard firmware, drivers, option-roms, and boot loaders.
● In case a new driver or firmware has to be supported on the server then the respective certificate must be enrolled into the
DB of Secure Boot certificate store. Therefore, Secure Boot Policy must be configured to Custom.
When the Secure Boot Policy is configured as Custom, it inherits the standard certificates and image digests loaded in the
system by default, on which, you can make any modifications as necessary. Secure Boot Policy configured as Custom allows you
to perform operations such as View, Export, Import, Delete, Delete All, Reset, and Reset All, by using which, you can configure
the Secure Boot Policies according to your requirements.
Configuring the Secure Boot Policy to Custom enables the options to manage the certificate store by using various actions such
as Export, Import, Delete, Delete All, Reset, and Rest All on PK, KEK, DB, and DBX. You can select the policy (PK / KEK / DB /
DBX) on which you want to make the change and perform appropriate actions by clicking the respective link. Each section will
have links to perform the Import, Export, Delete, and Reset operations. Links are enabled based on what is applicable, which
depends on the configuration at the point of time. Delete All and Reset All are the operations that have impact on all the policies.
Delete All deletes all the certificates and image digests in the Custom policy, and Rest All restores all the certificates and image
digests from Standard or Default certificate store.
80 Configuring iDRAC
• Disabling access to modify iDRAC configuration settings on host system
Configuring iDRAC 81
Viewing iDRAC information using RACADM
To view iDRAC information using RACADM, see getsysinfo or get sub-command details provided in the iDRAC RACADM CLI
Guide available at https://www.dell.com/idracmanuals .
NOTE: Changing the network settings may terminate the current network connections to iDRAC.
To use DHCP to obtain an IP address, use the following command to write the object DHCPEnable and enable this feature.
The following example shows how the command may be used to configure the required LAN network properties:
NOTE: If iDRAC.Nic.Enable is set to 0, the iDRAC LAN is disabled even if DHCP is enabled.
82 Configuring iDRAC
Configuring IP filtering
In addition to user authentication, use the following options to provide additional security while accessing iDRAC:
● IP filtering limits the IP address range of the clients accessing iDRAC. It compares the IP address of an incoming login to
the specified range and allows iDRAC access only from a management station whose IP address is within the range. All other
login requests are denied.
● When repeated login failures occur from a particular IP address, it prevents the address from logging in to iDRAC for a
preselected time span. If you unsuccessfully log in up to two times, you are allowed to log in again only after 30 seconds. If
you unsuccessfully log in more than two times, you are allowed to log in again only after 60 seconds.
As login failures accumulate from a specific IP address, they are registered by an internal counter. When the user successfully
logs in, the failure history is cleared and the internal counter is reset.
NOTE: When login attempts are prevented from the client IP address, few SSH clients may display the message: ssh
exchange identification: Connection closed by remote host.
NOTE: If you are using Dell Deployment Toolkit (DTK), see the OpenManage Deployment Toolkit User's Guide available at
https://www.dell.com/openmanagemanuals for the privileges.
&
Bitwise AND of the quantities
^
Bitwise exclusive-OR
Configuring iDRAC 83
Examples for IP Filtering
The following RACADM commands block all IP addresses except 192.168.0.57:
To restrict logins to a set of four adjacent IP addresses (for example, 192.168.0.212 through 192.168.0.215), select all but the
lowest two bits in the mask:
The last byte of the range mask is set to 252, the decimal equivalent of 11111100b.
For more information, see the iDRAC RACADM CLI Guide available at https://www.dell.com/idracmanuals.
FIPS mode
FIPS is a computer security standard that United States government agencies and contractors must use. Starting from version
iDRAC 2.40.40.40, iDRAC supports enabling FIPS mode.
iDRAC will be officially certified to support FIPS mode in the future.
NOTE: If you reinstall or upgrade iDRAC firmware, FIPS mode gets disabled.
NOTE: Some iDRAC interfaces, such as the standards-compliant implementations of IPMI and SNMP, do not support
FIPS-compliance.
84 Configuring iDRAC
Enabling FIPS mode using RACADM
Use RACADM CLI to execute the following command:
Configuring services
You can configure and enable the following services on iDRAC:
Local Disable access to iDRAC configuration (from the host system) using Local RACADM and iDRAC Settings
Configuration utility.
Web Server Enable access to iDRAC web interface. If you disable the web interface, remote RACADM also gets
disabled. Use local RACADM to re-enable the web server and remote RACADM.
SSH Access iDRAC through firmware RACADM.
Telnet Access iDRAC through firmware RACADM.
Remote RACADM Remotely access iDRAC.
Redfish Enables support for Redfish RESTful API.
SNMP Agent Enables support for SNMP queries (GET, GETNEXT, and GETBULK operations) in iDRAC.
Automated Enable Last System Crash Screen.
System Recovery
Agent
VNC Server Enable VNC server with or without SSL encryption.
Configuring iDRAC 85
Enabling or disabling HTTPS redirection
If you do not want automatic redirection from HTTP to HTTPs due to certificate warning issue with default iDRAC certificate or
as a temporary setting for debugging purpose, you can configure iDRAC such that redirection from http port (default is 80) to
https port (default is 443) is disabled. By default, it is enabled. You have to log out and log in to iDRAC for this setting to take
effect. When you disable this feature, a warning message is displayed.
You must have Configure iDRAC privilege to enable or disable HTTPS redirection.
An event is recorded in the Lifecycle Controller log file when this feature is enabled or disabled.
To disable the HTTP to HTTPS redirection:
Configuring TLS
By default, iDRAC is configured to use TLS 1.1 and higher. You can configure iDRAC to use any of the following:
● TLS 1.0 and higher
● TLS 1.1 and higher
● TLS 1.2 only
NOTE: To ensure a secure connection, Dell recommends using TLS 1.1 and higher.
<n>=0
TLS 1.0 and Higher
<n>=1
TLS 1.1 and Higher
<n>=2
TLS 1.2 Only
86 Configuring iDRAC
Using VNC client to manage remote server
You can use a standard open VNC client to manage the remote server using both desktop and mobile devices such as Dell Wyse
PocketCloud. When servers in data centers stop functioning, the iDRAC or the operating system sends an alert to the console
on the management station. The console sends an email or SMS to a mobile device with required information and launches
VNC viewer application on the management station. This VNC viewer can connect to OS/Hypervisor on the server and provide
access to keyboard, video and mouse of the host server to perform the necessary remediation. Before launching the VNC client,
you must enable the VNC server and configure the VNC server settings in iDRAC such as password, VNC port number, SSL
encryption, and the time out value. You can configure these settings using iDRAC Web interface or RACADM.
NOTE: VNC feature is licensed and is available in the iDRAC Enterprise license.
You can choose from many VNC applications or Desktop clients such as the ones from RealVNC or Dell Wyse PocketCloud.
2 VNC client sessions can be activated at the same time. Second one is in Read-Only mode.
If a VNC session is active, you can only launch the Virtual Media using Launch Virtual Console and not the Virtual Console
Viewer.
If video encryption is disabled, the VNC client starts RFB handshake directly, and a SSL handshake is not required. During VNC
client handshake (RFB or SSL), if another VNC session is active or if a Virtual Console session is open, the new VNC client
session is rejected. After completion of the initial handshake, VNC server disables Virtual Console and allows only Virtual Media.
After termination of the VNC session, VNC server restores the original state of Virtual Console (enabled or disabled).
NOTE:
● When iDRAC NIC is in shared mode and the host system is power cycled, the network connection is lost for a few
seconds. During this time, if you perform any action in the active VNC client, the VNC session may close. You must
wait for timeout (value configured for the VNC Server settings in the Services page in iDRAC Web interface) and then
re-establish the VNC connection.
● If the VNC client window is minimized for more than 60 seconds, the client window closes. You must open a new VNC
session. If you maximize the VNC client window within 60 seconds, you can continue to use it.
Configuring iDRAC 87
2. Configure SSL tunnel to connect to <iDRAC IP address>:<VNC server port Number>. For example,
192.168.0.120:5901.
3. Start the tunnel application.
To establish connection with the iDRAC VNC server over the SSL encrypted channel, connect the VNC viewer to the
localhost (link local IP address) and the local port number (127.0.0.1:<local port number>).
3. Enable Virtual Console indication (optional). If enabled, the Live Front Panel Feed section and the LCD panel on the server
displays the Virtual console session active message when there is an active Virtual Console session.
4. Click Apply.
The server LCD front panel displays the configured home message.
88 Configuring iDRAC
Configuring LCD setting using RACADM
To configure the server LCD front panel display, use the objects in the System.LCD group.
For more information, see the iDRAC RACADM CLI Guide available at https://www.dell.com/idracmanuals.
Configuring iDRAC 89
Configuring time zone and NTP using iDRAC web interface
To configure time zone and NTP using iDRAC web interface:
1. Go to iDRAC Settings > Settings > Time zone and NTP Settings.
The Time zone and NTP page is displayed.
2. To configure the time zone, from the Time Zone drop-down menu, select the required time zone, and then click Apply.
3. To configure NTP, enable NTP, enter the NTP server addresses, and then click Apply.
For information about the fields, see iDRAC Online Help.
90 Configuring iDRAC
Setting first boot device using RACADM
● To set the first boot device, use the iDRAC.ServerBoot.FirstBootDevice object.
● To enable boot once for a device, use the iDRAC.ServerBoot.BootOnce object.
For more information about these objects, see the iDRAC RACADM CLI Guide available at https://www.dell.com/idracmanuals.
Configuring iDRAC 91
If you are configuring the server using a Server Configuration Profile through RACADM, WSMan or Redfish and if the network
settings are changed in this file, then you must wait for 15 seconds to either enable OS to iDRAC Pass-through feature or set
the OS Host IP address.
Before enabling OS to iDRAC Pass-through, make sure that:
● iDRAC is configured to use dedicated NIC or shared mode (that is, NIC selection is assigned to one of the LOMs).
● Host operating system and iDRAC are in the same subnet and same VLAN.
● Host operating system IP address is configured.
● A card that supports OS to iDRAC Pass-through capability is installed.
● You have the Configure privilege.
When you enable this feature:
● In shared mode, the host operating system's IP address is used.
● In dedicated mode, you must provide a valid IP address of the host operating system. If more than one LOM is active, enter
the first LOM’s IP address.
If the OS to iDRAC Pass-through feature does not work after it is enabled, ensure that you check the following:
● The iDRAC dedicated NIC cable is connected properly.
● At least one LOM is active.
NOTE: Use the default IP address. Ensure that the IP address of the USB NIC interface is not in the same network subnet
as the iDRAC or host OS IP addresses. If this IP address conflicts with an IP address of other interfaces of the host system
or the local network, you must change it.
NOTE: Do not use 169.254.0.3 and 169.254.0.4 IP addresses. These IP addresses are reserved for the USB NIC port on the
front panel when an A/A cable is used.
NOTE: iDRAC may not be accessible from the host server using LOM-Passthrough when NIC teaming is enabled. Then,
iDRAC can be accessed from the host server OS using the iDRAC USB NIC or through the external network, via the iDRAC
dedicated NIC.
92 Configuring iDRAC
● XenServer 7.1
For Linux operating systems, configure the USB NIC as DHCP on the host operating system before enabling USB NIC.
For vSphere, you must install the VIB file before enabling USB NIC.
NOTE: To configure USB NIC as DHCP in Linux operating system or XenServer, refer to the operating system or hypervisor
documentation.
Message: The update completed successfully, but the system needs to be rebooted for
the changes to be effective.
Reboot Required: true
VIBs Installed: Dell_bootbank_iDRAC_USB_NIC_1.0.0-799733X03
VIBs Removed:
VIBs Skipped:
NOTE: If the VLAN is enabled on the iDRAC, the LOM-Passthrough will only function in shared LOM mode with VLAN
tagging configured on the host.
5. If you select USB NIC as the pass-through configuration, enter the IP address of the USB NIC.
The default value is 169.254.1.1. It is recommended to use the default IP address. However, if this IP address conflicts with
an IP address of other interfaces of the host system or the local network, you must change it.
Do not enter 169.254.0.3 and 169.254.0.4 IPs. These IPs are reserved for the USB NIC port on the front panel when a A/A
cable is used.
6. Click Apply.
Configuring iDRAC 93
7. Click Test Network Configuration to check if the IP is accessible and the link is established between the iDRAC and the
host operating system.
3. If you select LOM as the pass-through configuration, and if the server is connected using dedicated mode, enter the IPv4
address of the operating system.
NOTE: If the server is connected in shared LOM mode, then the OS IP Address field is disabled.
4. If you select USB NIC as the pass-through configuration, enter the IP address of the USB NIC.
The default value is 169.254.1.1. However, if this IP address conflicts with an IP address of other interfaces of the host
system or the local network, you must change it. Do not enter 169.254.0.3 and 169.254.0.4 IPs. These IPs are reserved for
the USB NIC port on the front panel when a A/A cable is used
5. Click Back, click Finish, and then click Yes.
The details are saved.
Obtaining certificates
The following table lists the types of certificates based on the login type.
Single Sign-on using Active Directory Trusted CA certificate Generate a CSR and get it signed
from a Certificate Authority
SHA-2 certificates are also
supported.
Smart Card login as a local or Active ● User certificate ● User Certificate — Export the
Directory user ● Trusted CA certificate smart card user certificate
as Base64-encoded file using
the card management software
provided by the smart card
vendor.
● Trusted CA certificate — This
certificate is issued by a CA.
94 Configuring iDRAC
Table 15. Types of certificate based on login type
Login Type Certificate Type How to Obtain
Active Directory user login Trusted CA certificate This certificate is issued by a CA.
SHA-2 certificates are also
supported.
Local User login SSL Certificate Generate a CSR and get it signed
from a trusted CA
NOTE: iDRAC ships with a
default self-signed SSL server
certificate. The iDRAC Web
server, Virtual Media, and Virtual
Console use this certificate.
SHA-2 certificates are also
supported.
Configuring iDRAC 95
interface using a supported browser that supports a wildcard certificate, the iDRAC is trusted by the browser. While launching
viewers, the iDRACs are trusted by the viewer clients.
96 Configuring iDRAC
Uploading server certificate using RACADM
To upload the SSL server certificate, use the sslcertupload command. For more information, see the iDRAC RACADM CLI
Guide available at https://www.dell.com/idracmanuals.
If the CSR is generated outside of iDRAC with a private key available, then to upload the certificate to iDRAC:
1. Send the CSR to a well-known root CA. CA signs the CSR and the CSR becomes a valid certificate.
2. Upload the private key using the remote racadm sslkeyupload command.
3. Upload the signed certificate to iDRAC using the remote racadm sslcertupload command.
The new certificate is uploaded iDRAC. A message is displayed asking you to reset iDRAC.
4. Run the racadm racreset command to reset iDRAC.
iDRAC resets and the new certificate is applied. The iDRAC is not available for a few minutes during the reset.
NOTE: You must reset iDRAC to apply the new certificate. Until iDRAC is reset, the existing certificate is active.
Configuring iDRAC 97
Uploading custom SSL certificate signing certificate using RACADM
To upload the custom SSL certificate signing certificate using RACADM, use the sslcertupload command, and then use the
racreset command to reset iDRAC.
For more information, see the iDRAC RACADM CLI Guide available at https://www.dell.com/idracmanuals.
98 Configuring iDRAC
● The configuration file contains information that is applicable for the particular server. The information is organized under
various object groups.
● Some configuration files contain unique iDRAC information, such as the static IP address, that you must modify before
you import the file into other iDRACs.
You can also use the System Configuration Profile (SCP) to configure multiple iDRACs using RACADM. SCP file contains
the component configuration information. You can use this file to apply the configuration for BIOS, iDRAC, RAID, and NIC
by importing the file into a target system. For more information, see XML Configuration Workflow white paper available at
https://www.dell.com/manuals.
To configure multiple iDRACs using the configuration file:
1. Query the target iDRAC that contains the required configuration using the following command:.
The command requests the iDRAC configuration and generates the configuration file.
NOTE: Redirecting the iDRAC configuration to a file using get -f is only supported with the local and remote
RACADM interfaces.
NOTE: The generated configuration file does not contain user passwords.
The get command displays all configuration properties in a group (specified by group name and index) and all configuration
properties for a user.
3. On the target iDRAC, use the following command to modify the settings:
This loads the information into the other iDRAC. You can use set command to synchronize the user and password database
with Server Administrator.
4. Reset the target iDRAC using the command: racadm racreset
Configuring iDRAC 99
5
Viewing iDRAC and managed system
information
You can view iDRAC and managed system’s health and properties, hardware and firmware inventory, sensor health, storage
devices, network devices, and view and terminate user sessions. For blade servers, you can also view the flex address
information.
Topics:
• Viewing managed system health and properties
• Viewing system inventory
• Viewing sensor information
• Monitoring performance index of CPU, memory, and input output modules
• Checking the system for Fresh Air compliance
• Viewing historical temperature data
• Viewing network interfaces available on host OS
• Viewing network interfaces available on host OS using RACADM
• Viewing FlexAddress mezzanine card fabric connections
• Viewing or terminating iDRAC sessions
NOTE: On the Dell PowerEdge FX2/FX2s servers, the naming convention of the CMC version displayed in the iDRAC GUI
differs from the version displayed on the CMC GUI. However, the version remains the same.
When you replace any hardware component or update the firmware versions, make sure to enable and run the Collect System
Inventory on Reboot (CSIOR) option to collect the system inventory on reboot. After a few minutes, log in to iDRAC, and
navigate to the System Inventory page to view the details. It may take up to 5 minutes for the information to be available
depending on the hardware installed on the server.
NOTE: Configuration changes and firmware updates that are made within the operating system may not reflect properly in
the inventory until you perform a server restart.
Click Export to export the hardware inventory in an XML format and save it to a location of your choice.
NOTE: The Hardware Overview page displays data only for sensors present on your system.
The CPU and chipset have dedicated Resource monitoring Counters (RMC). The data from these RMCs is queried to obtain
utilization information of system resources. The data from RMCs is aggregated by the node manager to measure the cumulative
utilization of each of these system resources that is read from iDRAC using existing intercommunication mechanisms to provide
data through out-of-band management interfaces.
The Intel sensor representation of performance parameters and index values is for complete physical system. Therefore, the
performance data representation on the interfaces is for the complete physical system, even if the system is virtualized and has
multiple virtual hosts.
To display the performance parameters, the supported sensors must be present in the server.
The four system utilization parameters are:
● CPU Utilization — Data from RMCs for each CPU core is aggregated to provide cumulative utilization of all the cores in
the system. This utilization is based on time spent in active and inactive states. A sample of RMC is taken every six seconds.
● Memory Utilization — RMCs measure memory traffic occurring at each memory channel or memory controller instance.
Data from these RMCs is aggregated to measure the cumulative memory traffic across all the memory channels on the
system. This is a measure of memory bandwidth consumption and not amount of memory utilization. iDRAC aggregates it for
one minute, so it may or may not match the memory utilization that other OS tools, such as top in Linux, show. Memory
bandwidth utilization that the iDRAC shows is an indication of whether workload is memory intensive or not.
● I/O Utilization — There is one RMC per root port in the PCI Express Root Complex to measure PCI Express traffic
emanating from or directed to that root port and the lower segment. Data from these RMCs is aggregated for measuring PCI
express traffic for all PCI Express segments emanating from the package. This is measure of I/O bandwidth utilization for
the system.
● System Level CUPS Index — The CUPS index is calculated by aggregating CPU, Memory, and I/O index considering a
predefined load factor of each system resource. The load factor depends on the nature of the workload on the system.
CUPS Index represents the measurement of the compute headroom available on the server. If the system has a large CUPS
Index, then there is limited headroom to place more workload on that system. As the resource consumption decreases, the
system’s CUPS index decreases. A low CUPS index indicates that there is a large compute headroom and the server can
receive new workloads and the server is in a lower power state to reduce power consumption. Workload monitoring can then
be applied throughout the data center to provide a high-level and holistic view of the data center’s workload, providing a
dynamic data center solution.
NOTE: The CPU, memory, and I/O utilization indexes are aggregated over one minute. Therefore, if there are any
instantaneous spikes in these indexes, they may be suppressed. They are indication of workload patterns not the amount of
resource utilization.
The IPMI, SEL, and SNMP traps are generated if the thresholds of the utilization indexes are reached and the sensor events are
enabled. The sensor event flags are disabled by default. It can be enabled using the standard IPMI interface.
The required privileges are:
● Login privilege is required to monitor performance data.
● Configure privilege is required for setting warning thresholds and reset historical peaks.
● Login privilege and Enterprise license are required to read historical statics data.
NOTE: After an iDRAC firmware update or iDRAC reset, some temperature data may not be displayed in the graph.
NOTE: This feature is available with iDRAC Express and iDRAC Enterprise licenses.
<List-of-Uplinks-Configured-on-the-vSwitch>/<Port-Group>/<Interface-name>
IPMI Serial Over LAN Intelligent Platform IPMI IPMITool is installed and IPMI
Management Bus protocol Serial Over LAN is enabled
SSH
Telnet
IPMI over LAN Intelligent Platform IPMI IPMITool is installed and IPMI
Management Bus protocol Settings is enabled
SMCLP SSH SMCLP SSH or Telnet on iDRAC is
enabled
Telnet
3. Make sure that the management station’s terminal emulation software is configured for serial connection using any of the
following:
● Linux Minicom in an Xterm
● Hilgraeve’s HyperTerminal Private Edition (version 6.3)
Based on where the managed system is in its boot process, you can see either the POST screen or the operating system
screen. This is based on the configuration: SAC for Windows and Linux text mode screens for Linux.
NOTE: This is applicable only for iDRAC on rack and tower servers.
● IPMI basic mode — Supports a binary interface for program access, such as the IPMI shell (ipmish) that is included with the
Baseboard Management Utility (BMU). For example, to print the System Event Log using ipmish via IPMI Basic mode, run
the following command:
ipmish -com 1 -baud 57600 -flow cts -u <username> -p <password> sel get
NOTE: The default iDRAC user name and password are provided on the system badge.
● IPMI terminal mode — Supports ASCII commands that are sent from a serial terminal. This mode supports limited number
of commands (including power control) and raw IPMI commands that are typed as hexadecimal ASCII characters. It allows
you to view the operating system boot sequences up to BIOS, when you login to iDRAC through SSH or Telnet. You need to
logout from the IPMI terminal using [sys pwd -x], below are the example for IPMI Terminal mode commands.
○ [sys tmode]
○ [sys pwd -u root calvin]
○ [sys health query -v]
○ [18 00 01]
○ [sys pwd -x]
4. Set the IPMI serial channel minimum privilege level using the command.
<level> = 3 Operator
<level> = 4 Administrator
5. Ensure that the serial MUX (external serial connector) is set correctly to the remote access device in the BIOS Setup
program to configure BIOS for serial connection.
For more information about these properties, see the IPMI 2.0 specification.
Configuring additional settings for IPMI serial terminal mode using web interface
To set the Terminal Mode settings:
1. In the iDRAC Web interface, go to iDRAC Settings > Connectivity > Serial.
The Serial page is displayed.
2. Enable IPMI serial.
3. Click Terminal Mode Settings.
The Terminal Mode Settings page is displayed.
4. Specify the following values:
● Line editing
● Delete control
● Echo Control
● Handshaking control
● New line sequence
● Input new line sequences
For information about the options, see the iDRAC Online Help.
Configuring additional settings for IPMI serial terminal mode using RACADM
To configure the Terminal Mode settings, use the set command with the objects in the idrac.ipmiserial group.
For more information, see the iDRAC RACADM CLI Guide available at https://www.dell.com/idracmanuals.
NOTE: If the boot loader or operating system provides serial redirection such as GRUB or Linux, then the BIOS
Redirection After Boot setting must be disabled. This is to avoid potential race condition of multiple components
accessing the serial port.
2. Update the IPMI SOL minimum privilege level using the command.
<level> = 3 Operator
<level> = 4 Administrator
NOTE: To redirect the serial console over LAN, make sure that the SOL baud rate is identical to the managed system’s
baud rate.
Parameter Description
<id> Unique ID of the user
NOTE: To redirect the serial console over LAN, ensure that the SOL baud rate is identical to the baud rate of the managed
system.
● SSH
NOTE: If required, you can change the default SOL time-out at iDRAC Settings > Services.
1. Install IPMITool from the Dell Systems Management Tools and Documentation DVD.
For installation instructions, see the Software Quick Installation Guide.
2. At the command prompt (Windows or Linux), run the following command to start SOL from iDRAC:
This command connected the management station to the managed system's serial port.
3. To quit a SOL session from IPMItool, press ~ and then . (period).
NOTE: If a SOL session does not terminate, reset iDRAC and allow up to two minutes to complete booting.
NOTE: IPMI SOL session may terminate while copying large input text from a client running Windows OS to a host running
Linux OS. To avoid the session from getting terminated abruptly, convert any large text to a UNIX-based line ending.
NOTE: If a SOL session created using RACADM tool exists, starting another SOL session using IPMI tool will not show any
notification or error about the existing sessions.
NOTE: If required, you can change the default SSH or Telnet time-out at iDRAC Settings > Services.
NOTE: The port number is optional. It is required only when the port number is reassigned.
2. Run the command console com2 or connect to start SOL and boot the managed system.
A SOL session from the management station to the managed system using the SSH or Telnet protocol is opened. To access
the iDRAC command-line console, follow the ESC key sequence. Putty and SOL connection behavior:
● While accessing the managed system through putty during POST, if the Function keys and keypad option on putty is set
to:
○ VT100+ — F2 passes, but F12 cannot pass.
○ ESC[n~ — F12 passes, but F2 cannot pass.
● In Windows, if the Emergency Management System (EMS) console is opened immediately after a host reboot, the Special
Admin Console (SAC) terminal may get corrupted. Quit the SOL session, close the terminal, open another terminal, and
start the SOL session using the same command.
1. Start a shell.
2. Connect to iDRAC using the following command:
● For SSH: ssh <iDRAC-ip-address> -l <login name>
● For Telnet: telnet <iDRAC-ip-address>
NOTE: If you have changed the port number for the Telnet service from the default (port 23), add the port number to
the end of the Telnet command.
3. Enter one of the following commands at the command prompt to start SOL:
● connect
● console com2
This connects iDRAC to the managed system’s SOL port. Once a SOL session is established, iDRAC command line console
is not available. Follow the escape sequence correctly to open the iDRAC command line console. The escape sequence is
also printed on the screen as soon as a SOL session is connected. When the managed system is off, it takes sometime to
establish the SOL session.
NOTE: You can use console com1 or console com2 to start SOL. Reboot the server to establish the connection.
The console -h com2 command displays the contents of the serial history buffer before waiting for input from the
keyboard or new characters from the serial port.
The default (and maximum) size of the history buffer is 8192 characters. You can set this number to a smaller value using
the command:
Parameter Description
<IP address> IP address for the iDRAC
<port number> Telnet port number (if you are using a new port)
NOTE: IPMI also supports IPv6 address protocol for Linux-based operating systems.
NOTE: This setting determines the IPMI commands that are executed using IPMI over LAN interface. For more
information, see the IPMI 2.0 specifications at intel.com.
<level> = 3 Operator
<level> = 4 Administrator
3. Set the IPMI LAN channel encryption key ,if required.
Parameter Description
<key> 20-character encryption key in a valid hexadecimal format.
NOTE: The iDRAC IPMI supports the RMCP+ protocol. For more information, see the IPMI 2.0 specifications at intel.com.
NOTE: From iDRAC v2.30.30.30 or later, IPMI supports IPv6 address protocol for Linux-based operating systems.
4. To enable multiple GRUB options to start Virtual Console sessions through the RAC serial connection, add the following line
to all options:
console=ttyS1,115200n8r console=tty1
#inittab This file describes how the INIT process should set up
#the system in a certain run-level.
#Author:Miquel van Smoorenburg
#Modified for RHS Linux by Marc Ewing and Donnie Barnes
#Default runlevel. The runlevels used by RHS are:
#0 - halt (Do NOT set initdefault to this)
#1 - Single user mode
#2 - Multiuser, without NFS (The same as 3, if you do not have #networking)
#3 - Full multiuser mode
#4 - unused
#5 - X11
#6 - reboot (Do NOT set initdefault to this)
id:3:initdefault:
#System initialization.
si::sysinit:/etc/rc.d/rc.sysinit
l0:0:wait:/etc/rc.d/rc 0
l1:1:wait:/etc/rc.d/rc 1
l2:2:wait:/etc/rc.d/rc 2
l3:3:wait:/etc/rc.d/rc 3
l4:4:wait:/etc/rc.d/rc 4
In the file /etc/securetty add a new line with the name of the serial tty for COM2:
ttyS1
The following example shows a sample file with the new line.
NOTE: Use the Break Key Sequence (~B) to execute the Linux Magic SysRq key commands on serial console using IPMI
Tool.
vc/1
vc/2
vc/3
vc/4
vc/5
vc/6
vc/7
vc/8
vc/9
vc/10
vc/11
tty1
tty2
tty3
tty4
tty5
tty6
tty7
tty8
tty9
tty10
tty11
ttyS1
Asymmetric Cryptography
Public key ssh-rsa
ecdsa-sha2-nistp256
Symmetric Cryptography
Key Exchange curve25519-sha256@libssh.org
ecdh-sha2-nistp256
ecdh-sha2-nistp384
ecdh-sha2-nistp521
diffie-hellman-group-exchange-sha256
diffie-hellman-group14-sha1
Encryption chacha20-poly1305@openssh.com
aes128-ctr
aes192-ctr
aes256-ctr
aes128-gcm@openssh.com
aes256-gcm@openssh.com
MAC hmac-sha1
hmac-ripemd160
umac-64@openssh.com
Compression None
NOTE: If you enable OpenSSH 7.0 or later, DSA public key support is disabled. To ensure better security for iDRAC, Dell
recommends not enabling DSA public key support.
CAUTION: The capability to upload, view, and/ or delete SSH keys is based on the ’Configure Users’ user
privilege. This privilege allows user(s) to configure another user's SSH key. You should grant this privilege
carefully.
Follow the instructions. After the command executes, upload the public file.
CAUTION: Keys generated from the Linux management station using ssh-keygen are in non-4716 format.
Convert the keys into the 4716 format using ssh-keygen -e -f /root/.ssh/id_rsa.pub > std_rsa.pub.
Do not change the permissions of the key file. The conversion must be done using default permissions.
5. Click Apply.
● For local RACADM: racadm sshpkauth -i <2 to 16> -k <1 to 4> -f <filename>
● From remote RACADM using Telnet or SSH: racadm sshpkauth -i <2 to 16> -k <1 to 4> -t <key-text>
For example, to upload a valid key to iDRAC User ID 2 in the first key space using a file, run the following command:
NOTE: The password must include one uppercase and one lower case letter, one number and a special character.
Use the following characters while creating user names and passwords:
0-9 1–16
A-Z
a-z
-!#$%&()*/;?@[\]^_`{|}~+<=>
0-9 1–20
A-Z
a-z
'-!"#$%&()*,./:;?@[\]^_`{|}~+<=>
NOTE: You may be able to create user names and passwords that include other characters. However, to ensure
compatibility with all interfaces, Dell recommends using only the characters listed here.
NOTE: The characters allowed in user names and passwords for network shares are determined by the network-share type.
iDRAC supports valid characters for network share credentials as defined by the share type, except <, >, and , (comma).
NOTE: Users can be enabled and disabled over time. As a result, a user may have a different index number on each iDRAC.
To verify if a user exists, type the following command once for each index (1–16):
Several parameters and object IDs are displayed with their current values. The key field is iDRAC.Users.UserName=. If a
user name is displayed after =, that index number is taken.
NOTE: You can utilize
myfile.cfg
Parameter Description
<index> Unique index of the user
<user_name> User name
2. Set the password.
racadm set.idrac.users.<index>.enable 1
For more information, see the iDRAC RACADM CLI Guide available at https://www.dell.com/idracmanuals.
2. Type the following commands with the new user name and password.
NOTE: The default privilege value is 0, which indicates the user has no privileges enabled. For a list of valid bit-mask
values for specific user privileges, see the iDRAC RACADM CLI Guide available at https://www.dell.com/idracmanuals.
NOTE: If your system is running Windows 2000, the following steps may vary.
NOTE: If iDRAC firmware SSL certificate is CA-signed and the certificate of that CA is already in the domain controller's
Trusted Root Certificate Authority list, do not perform the steps in this section.
To import iDRAC firmware SSL certificate to all domain controller trusted certificate lists:
1. Download iDRAC SSL certificate using the following RACADM command:
racadm sslcertdownload -t 1 -f <RAC SSL certificate>
2. On the domain controller, open an MMC Console window and select Certificates > Trusted Root Certification
Authorities.
3. Right-click Certificates, select All Tasks and click Import.
4. Click Next and browse to the SSL certificate file.
5. Install iDRAC SSL Certificate in each domain controller’s Trusted Root Certification Authority.
If you have installed your own certificate, make sure that the CA signing your certificate is in the Trusted Root
Certification Authority list. If the Authority is not in the list, you must install it on all your domain controllers.
6. Click Next and select whether you want Windows to automatically select the certificate store based on the type of
certificate, or browse to a store of your choice.
7. Click Finish and click OK. The iDRAC firmware SSL certificate is imported to all domain controller trusted certificate lists.
In Active Directory, a standard group object is used as a role group. A user who has iDRAC access is a member of the role group.
To give this user access to a specific iDRAC, the role group name and its domain name need to be configured on the specific
iDRAC. The role and the privilege level are defined on each iDRAC and not in the Active Directory. You can configure up to five
role groups in each iDRAC. Table reference no shows the default role group privileges.
NOTE: The Bit Mask values are used only when setting Standard Schema with the RACADM.
1. In the iDRAC web interface, go to iDRAC Settings > Users > Directory Services.
The Directory Service page is displayed.
2. Select the Microsoft Active Directory option and then click Edit.
The Active Directory Configuration and Management page is displayed.
3. Click Configure Active Directory.
The Active Directory Configuration and Management Step 1 of 4 page is displayed.
4. Optionally, enable certificate validation and upload the CA-signed digital certificate used during initiation of SSL connections
when communicating with the Active Directory (AD) server. For this, the Domain Controllers and Global Catalog FQDN must
be specified. This is done in the next steps. And hence the DNS should be configured properly in the network settings.
5. Click Next.
The Active Directory Configuration and Management Step 2 of 4 page is displayed.
6. Enable Active Directory and specify the location information about Active Directory servers and user accounts. Also, specify
the time iDRAC must wait for responses from Active Directory during iDRAC login.
NOTE: If certificate validation is enabled, specify the Domain Controller Server addresses and the Global Catalog FQDN.
Make sure that DNS is configured correctly under iDRAC Settings > Network.
7. Click Next. The Active Directory Configuration and Management Step 3 of 4 page is displayed.
8. Select Standard Schema and click Next.
The Active Directory Configuration and Management Step 4a of 4 page is displayed.
9. Enter the location of Active Directory global catalog server(s) and specify privilege groups used to authorize users.
10. Click a Role Group to configure the control authorization policy for users under the standard schema mode.
The Active Directory Configuration and Management Step 4b of 4 page is displayed.
11. Specify the privileges and click Apply.
The settings are applied and the Active Directory Configuration and Management Step 4a of 4 page is displayed.
12. Click Finish. The Active Directory settings for standard schema are configured.
● Enter the Fully Qualified Domain Name (FQDN) of the domain controller, not the FQDN of the domain. For example, enter
servername.dell.com instead of dell.com.
● For bit-mask values for specific Role Group permissions, see Default role group privileges.
● You must provide at least one of the three domain controller addresses. iDRAC attempts to connect to each of the
configured addresses one-by-one until it makes a successful connection. With Standard Schema, these are the addresses
of the domain controllers where the user accounts and the role groups are located.
● The Global Catalog server is only required for standard schema when the user accounts and role groups are in different
domains. In multiple domain case, only the Universal Group can be used.
● If certificate validation is enabled, the FQDN or IP address that you specify in this field must match the Subject or
Subject Alternative Name field of your domain controller certificate.
● To disable the certificate validation during SSL handshake, use the following command:
In this case, you must upload the CA certificate using the following command:
NOTE: If certificate validation is enabled, specify the Domain Controller Server addresses and the Global Catalog
FQDN. Ensure that DNS is configured correctly under Overview > iDRAC Settings > Network.
Using the following RACADM command may be optional.
2. If DHCP is enabled on iDRAC and you want to use the DNS provided by the DHCP server, enter the following command:
3. If DHCP is disabled on iDRAC or you want manually enter the DNS IP address, enter the following RACADM command:
4. If you want to configure a list of user domains so that you only need to enter the user name when logging in to the web
interface, use the following command:
You can configure up to 40 user domains with index numbers between 1 and 40.
You can create as many or as few association objects as required. However, you must create at least one Association Object,
and you must have one iDRAC Device Object for each iDRAC device on the network that you want to integrate with Active
Directory for Authentication and Authorization with iDRAC.
The Association Object allows for as many or as few users and/or groups as well as iDRAC Device Objects. However, the
Association Object only includes one Privilege Object per Association Object. The Association Object connects the Users who
have Privileges on iDRAC devices.
The Dell extension to the ADUC MMC Snap-in only allows associating the Privilege Object and iDRAC Objects from the same
domain with the Association Object. The Dell extension does not allow a group or an iDRAC object from other domains to be
added as a product member of the Association Object.
When adding Universal Groups from separate domains, create an Association Object with Universal Scope. The Default
Association objects created by the Dell Schema Extender Utility are Domain Local Groups and they do not work with Universal
Groups from other domains.
Users, user groups, or nested user groups from any domain can be added into the Association Object. Extended Schema
solutions support any user group type and any user group nesting across multiple domains allowed by Microsoft Active
Directory.
NOTE: Extending the new schema has no impact on previous versions of the product.
You can extend your schema using one of the following methods:
● Dell Schema Extender utility
● LDIF script file
If you use the LDIF script file, the Dell organizational unit is not added to the schema.
The LDIF files and Dell Schema Extender are on your Dell Systems Management Tools and Documentation DVD in the following
respective directories:
● DVDdrive :\SYSMGMT\ManagementStation\support\OMActiveDirectory_Tools\Remote_Management_Adv
anced\LDIF_Files
● <DVDdrive>:
\SYSMGMT\ManagementStation\support\OMActiveDirectory_Tools\Remote_Management_Advanced\Sch
ema Extender
To use the LDIF files, see the instructions in the readme included in the LDIF_Files directory.
You can copy and run the Schema Extender or LDIF files from any location.
CAUTION: The Dell Schema Extender uses the SchemaExtenderOem.ini file. To make sure that the Dell Schema
Extender utility functions properly, do not modify the name of this file.
1. In the Welcome screen, click Next.
2. Read and understand the warning and click Next.
3. Select Use Current Log In Credentials or enter a user name and password with schema administrator rights.
4. Click Next to run the Dell Schema Extender.
5. Click Finish.
The schema is extended. To verify the schema extension, use the MMC and the Active Directory Schema Snap-in to verify
that the Classes and attributes on page 136 exist. See the Microsoft documentation for details about using the MMC and
the Active Directory Schema Snap-in.
Table 22. Class definitions for classes added to the active directory schema
Class Name Assigned Object Identification Number (OID)
delliDRACDevice 1.2.840.113556.1.8000.1280.1.7.1.1
delliDRACAssociation 1.2.840.113556.1.8000.1280.1.7.1.2
dellRAC4Privileges 1.2.840.113556.1.8000.1280.1.1.1.3
dellPrivileges 1.2.840.113556.1.8000.1280.1.1.1.4
dellProduct 1.2.840.113556.1.8000.1280.1.1.1.5
SuperClasses dellProduct
Attributes dellSchemaVersion
dellRacType
SuperClasses Group
Attributes dellProductMembers
dellPrivilegeMember
SuperClasses None
Attributes dellIsLoginUser
dellIsCardConfigAdmin
dellIsUserConfigAdmin
dellIsLogClearAdmin
dellIsServerResetUser
dellIsConsoleRedirectUser
dellIsVirtualMediaUser
dellIsTestAlertUser
dellIsDebugCommandAdmin
SuperClasses User
Attributes dellRAC4Privileges
Description The main class from which all Dell products are derived.
SuperClasses Computer
Attributes dellAssociationMembers
Table 28. List of attributes added to the active directory schema (continued)
Attribute Name/Description Assigned OID/Syntax Object Identifier Single Valued
Adding privileges
To add privileges:
Click the Privilege Object tab to add the privilege object to the association that defines the user’s or user group’s privileges
when authenticating to an iDRAC device. Only one privilege object can be added to an Association Object.
1. Select the Privileges Object tab and click Add.
2. Enter the privilege object name and click OK.
3. Click the Privilege Object tab to add the privilege object to the association that defines the user’s or user group’s privileges
when authenticating to an iDRAC device. Only one privilege object can be added to an Association Object.
1. In the iDRAC Web interface, go to iDRAC Settings > Users > Directory Services > Microsoft Active Directory. Click
Edit
The Active Directory Configuration and Management Step 1 of 4 page is displayed.
2. Optionally, enable certificate validation and upload the CA-signed digital certificate used during initiation of SSL connections
when communicating with the Active Directory (AD) server.
5. Click Next. The Active Directory Configuration and Management Step 3 of 4 page is displayed.
6. Select Extended Schema and click Next.
The Active Directory Configuration and Management Step 4 of 4 page is displayed.
7. Enter the name and location of the iDRAC device object in Active Directory (AD) and click Finish.
The Active Directory settings for extended schema mode is configured.
● Enter the Fully Qualified Domain Name (FQDN) of the domain controller, not the FQDN of the domain. For example, enter
servername.dell.com instead of dell.com.
● You must provide at least one of the three addresses. iDRAC attempts to connect to each of the configured addresses
one-by-one until it makes a successful connection. With Extended Schema, these are the FQDN or IP addresses of the
domain controllers where this iDRAC device is located.
● To disable the certificate validation during SSL handshake, use the following command:
In this case, you must upload a CA certificate using the following command:
NOTE: If certificate validation is enabled, specify the Domain Controller Server addresses and the FQDN. Ensure
that DNS is configured correctly under iDRAC Settings > Network.
Using the following RACADM command may be optional:
2. If DHCP is enabled on iDRAC and you want to use the DNS provided by the DHCP server, enter the following command:
4. If you want to configure a list of user domains so that you only need to enter the user name during log in to iDRAC web
interface, use the following command:
You can configure up to 40 user domains with index numbers between 1 and 40.
1. In the iDRAC Web interface, go to iDRAC Settings > Users > Directory Services > Generic LDAP Directory Service,
click Edit.
The Generic LDAP Configuration and Management Step 1 of 3 page displays the current generic LDAP settings.
2. Optionally, enable certificate validation and upload the digital certificate used during initiation of SSL connections when
communicating with a generic LDAP server.
NOTE: In this release, non-SSL port based LDAP bind is not supported. Only LDAP over SSL is supported.
3. Click Next.
The Generic LDAP Configuration and Management Step 2 of 3 page is displayed.
4. Enable generic LDAP authentication and specify the location information about generic LDAP servers and user accounts.
NOTE: If certificate validation is enabled, specify the LDAP Server’s FQDN and make sure that DNS is configured
correctly under iDRAC Settings > Network.
NOTE: In this release, nested group is not supported. The firmware searches for the direct member of the group to
match the user DN. Also, only single domain is supported. Cross domain is not supported.
5. Click Next.
The Generic LDAP Configuration and Management Step 3a of 3 page is displayed.
6. Click Role Group.
The Generic LDAP Configuration and Management Step 3b of 3 page is displayed.
7. Specify the group distinguished name, the privileges associated with the group, and click Apply.
NOTE: If you are using Novell eDirectory and if you have used these characters—#(hash), "(double quotes), ;(semi
colon), > (greater than), , (comma), or <(lesser than)—for the Group DN name, they must be escaped.
The role group settings are saved. The Generic LDAP Configuration and Management Step 3a of 3 page displays the
role group settings.
8. If you want to configure additional role groups, repeat steps 7 and 8.
9. Click Finish. The generic LDAP directory service is configured.
NOTE: When generic LDAP is enabled, iDRAC first tries to login the user as a directory user. If it fails, local user lookup
is enabled.
The test results and the test log are displayed.
NOTE: To enable Lockdown mode, you must have iDRAC Enterprise license and System Control privileges.
Following are a few of the tasks that can be performed even if the system is in Lockdown mode:
● Power cap setting
● System power operations (power on/off, reset)
● Power priority
● Identify operations (Chassis or PERC)
● Part replacement
● Running diagnostics
● Modular operations (VLan configuration, FlexAddress)
● Group Manager passcode
The following table lists the functional and non-functional features, interfaces, and utilities that are affected by Lockdown mode:
NOTE: Changing the boot order using iDRAC is not supported when lockdown mode is enabled. However, boot-control
option is available in vConsole menu, which has no effect when iDRAC is in lock down mode.
NOTE: When lockdown mode is enabled, OpenID Connect login option is not displayed in iDRAC login page.
The encryption type is AES256-SHA1. The principal type is KRB5_NT_PRINCIPAL. The properties of the user account to
which the Service Principal Name is mapped to must have Use AES 256 encryption types for this account property
enabled.
NOTE: Use lowercase letters for the iDRACname and Service Principal Name. Use uppercase letters for the domain
name as shown in the example.
1. Verify whether the iDRAC DNS name matches the iDRAC Fully Qualified Domain Name. To do this, in iDRAC Web interface,
go to iDRAC Settings > Network > Common Settings and see the DNS iDRAC Name property.
2. While configuring Active Directory to setup a user account based on standard schema or extended schema, perform the
following two additional steps to configure SSO:
● Upload the keytab file on the Active Directory Configuration and Management Step 1 of 4 page.
● Select Enable Single Sign-On option on the Active Directory Configuration and Management Step 2 of 4 page.
2. Under Configure Smart Card Logon, select Enabled With Remote RACADM to enable the configuration..
3. Enable Enable CRL Check for Smart Card Logon.
4. Click Apply.
n=0 — Disabled
n=1 — Enabled
Filtering alerts
You can filter alerts based on category and severity.
1. In iDRAC Web interface, go to Configuration > System Settings > Alerts and Remote System Log Configuration.
2. Under Alerts and Remote System Log Configuration section, select Filter:
● System Health — System Health category represents all the alerts that are related to hardware within the system
chassis. Examples include temperature errors, voltage errors, device errors.
● Storage Health — Storage Health category represents alerts that are related to the storage subsystem. Examples
include, controller errors, physical disk errors, virtual disk errors.
● Configuration — Configuration category represents alerts that are related to hardware, firmware and software
configuration changes. Examples include, PCI-e card added/removed, RAID configuration changed, iDRAC license
changed.
● Audit — Audit category represents the audit log. Examples include, user login/logout information, Password
authentication failures, session info, power states.
● Updates — Update category represents alerts that are generated due to firmware/Driver upgrades/downgrades.
NOTE: This doesn’t represent firmware inventory.
● Work Notes
3. Select one or more of the following severity levels:
● Informational
● Warning
● Critical
4. Click Apply.
The Alert Results section displays the results based on the selected category and severity.
NOTE: You must have Configure iDRAC privilege to set the alert recurrence value.
5. To test whether the IP address is receiving the IPMI or SNMP traps, click Send under Test IPMI Trap and Test SNMP
Trap respectively.
6. Click Apply.
The alert destinations are configured.
7. In the SNMP Trap Format section, select the protocol version to be used to send the traps on the trap destination(s) —
SNMP v1, SNMP v2, or SNMP v3 and click Apply.
NOTE: The SNMP Trap Format option applies only for SNMP Traps and not for IPMI Traps. IPMI Traps are always
sent in SNMP v1 format and is not based on the configured SNMP Trap Format option.
Parameter Description
<index> Destination index. Allowed values are 1 through 8.
Parameter Description
<index> Destination index. Allowed values are 1 through 8.
<Address> A valid IPv4, IPv6, or FQDN address
3. Configure the SNMP community name string:
Parameter Description
<community_name> The SNMP Community Name.
4. To configure SNMP destination:
● Set the SNMP trap destination for SNMPv3:
For more information, see the iDRAC RACADM CLI Guide available at https://www.dell.com/idracmanuals.
NOTE: Email alerts support both IPv4 and IPv6 addresses. The iDRAC DNS Domain Name must be specified when using
IPv6.
NOTE: If you are using an external SMTP server, ensure that iDRAC can communicate with that server. If the server is
unreachable, the error RAC0225 is displayed while trying to send a test mail.
Parameter Description
index Email destination index. Allowed values are 1 through 4.
Parameter Description
index Email destination index. Allowed values are 1 through 4.
email-address Destination email address that receives the platform event alerts.
3. To configure a custom message:
Parameter Description
index Email destination index. Allowed values are 1 through 4.
custom-message Custom message
4. To test the configured email alert, if required:
Parameter Description
index Email destination index to be tested. Allowed values are 1 through 4.
For more information, see the iDRAC RACADM CLI Guide available at https://www.dell.com/idracmanuals.
Configuring SMTP email server address settings using iDRAC web interface
To configure the SMTP server address:
1. In iDRAC Web interface, go to Configuaration > System Settings > Alert Configuration > SNMP (E-mail
Configuration).
2. Enter the valid IP address or fully qualified domain name (FQDN) of the SMTP server to be used in the configuration.
3. Select the Enable Authentication option and then provide the user name and password (of a user who has access to
SMTP server).
4. Enter the SMTP port number.
For more information about the fields, see the iDRAC Online Help.
5. Click Apply.
The SMTP settings are configured.
AMP Amperage
BAR Backup/Restore
CBL Cable
CPU Processor
DH Cert Mgmt
DIS Auto-Discovery
FSD Debug
ITR Intrusion
LC Lifecycle Controller
LIC Licensing
MEM Memory
OSD OS Deployment
OSE OS Event
PR Part Exchange
RDU Redundancy
RED FW Download
RFM FlexAddress SD
STOR Storage
TMP Temperature
VF vFlash SD card
VLT Voltage
NOTE: For better user experience Group Manager supports up to 100 server nodes.
Topics:
• Group Manager
• Summary View
• Manage Logins
• Configure Alerts
• Export
• Discovered Servers View
• Jobs View
• Jobs Export
• Group Information Panel
• Group Settings
• Actions on a selected Server
Group Manager
To use Group Manager feature, you need to enable the Group Manager from iDRAC index page or on the Group Manager
Welcome screen. The group manager welcome screen provides options listed in the below table.
Create New Group Allows you to create a new group. The specific iDRAC
which has created the group would be the master (primary
controller) of the group.
Disable Group Manager for this System You can select this option in case you do not want to join
any group from a specific system. However, you can access
Group Manager at any point of time by selecting Open Group
Manager from the iDRAC index page. Once you disable the
group manager, user needs to wait for 60 seconds to perform
any further group manager operations.
Once the group manager feature is enabled, that iDRAC allows you the option to create or join an iDRAC local group. More
than one iDRAC group can be setup in the local network but an individual iDRAC can only be a member of one group at a
time. To change group (join a new group) the iDRAC must first leave its current group and then join the new group. The
Summary View
You need to have administrator privileges to access group manager pages. If a non-administrator user logs onto the iDRAC,
the group manager section does not appear with their credentials. The group manager home page (summary view) is broadly
categorized as three sections. The first section shows rollup summary with aggregated summary details.
● Total number of servers in the local group.
● Chart showing number of servers per server model.
● Doughnut chart showing the servers per their health status (clicking on a chart section filters the server list to show only the
servers with selected health).
● Warning box if there is a duplicate group detected in the local network. Duplicate group is typically the group with the same
name but with a different passcode. This warning box does not appear if there is no duplicate group.
● Displays the iDRACs, that are controlling the group (Primary and Secondary controller).
The second section provides buttons for actions that are taken on the group as whole and the third section displays the list of
all iDRACs in the group.
It shows all the systems in the group and their current health status and allows the user to take corrective action as needed.
Server attributes specific to a server is described in the below table.
The System Information panel provides further details on the server like iDRAC network connectivity status, server host
power state, express service code, operating system, asset tag, node ID, IDRAC DNS name, Server BIOS version, Server CPU
information, System memory and location information. You may double click on a row or click on the launch iDRAC button to
perform a single sign on redirect to the selected iDRAC index page. On the selected server, virtual console can be accessed or
server power actions can be performed from More Actions dropped down list.
Manage iDRAC user logins, Alert configuration and group inventory export are the group actions supported.
Manage Logins
Use this section to Add New User, Change User Password and Delete User from the Group.
Group jobs including Manage Logins are one time configurations of the servers. Group manager uses SCP and jobs to make any
changes. Every iDRAC in the group owns an individual job in its job queue for each Group Manager job. Group Manager does not
detect changes on member iDRACs or lock member configurations.
NOTE: Group jobs does not configure or override the lockdown mode for any specific iDRAC.
Leaving a group does not change local user or change settings on a member iDRAC.
NOTE: Any member iDRAC with system lockdown enabled, that is part of the same group returns an error that the user
password was not updated.
Delete User
Use this section to delete users from all the group servers. A group job would be created to delete users from all the group
servers. The status of group job can be found at GroupManager > Jobs page.
If user already exists on a member iDRAC then the user can be deleted. Any member iDRAC with system lockdown enabled that
is part of the group returns an error that the user is not deleted. If the user does not exist then it shows a successful deletion
for that iDRAC. The list of users shown in Group Manager GUI is based on the current user list on the iDRAC which is acting as
the primary controller. It does not show all users for all iDRACs.
Configure Alerts
Use this section to configure e-mail alerts. By default alerting is disabled. However, you can enable the alerting anytime. A
group job would be created to apply the e-mail alert configuration to all the group servers. The status of group job can be
monitored at GroupManager > Jobs page. Group manager email alert configures email alerts on all members. It sets the SMTP
server settings on all members in the same group. Each iDRAC is configured separately. Email configuration is not globally saved.
Current values are based on the iDRAC that is acting as a primary controller. Leaving a group does not reconfigure email alerts.
For more information on Configuring Alerts, see Configuring iDRAC to send alerts.
NOTE: Any member iDRAC with system lockdown enabled, that is part of the same group returns an error that the user
password was not updated.
Export
Use this section to export the Group Summary to the local system. The information can be exported to a csv file format. It
contains data related to each individual system in the group. Export includes the following information in csv format. Server
details:
● Health
● Host Name
● iDRAC IPV4 Address
● iDRAC IPV6 Address
● Asset Tag
● Model
● iDRAC Firmware Version
● Last Status Update
● Express Service Code
● iDRAC Connectivity
● Power State
● Operating System
● Service Tag
● Node ID
● iDRAC DNS Name
● BIOS Version
● CPU Details
● System Memory(MB)
● Location Details
NOTE: In case, you are using Internet Explorer, disable the Enhanced Security settings to successfully download the csv
file.
Ignore Allows you to ignore the systems from the discovered servers
list, in case you do not want to add them in any group.
Un-Ignore Allows you to select the systems that you would like to
reinstate in the discovered servers list.
Rescan Allows you to scan and generate the list of discovered servers
at any time.
Jobs View
Jobs view allows the user to track the progress of a group job, helps with simple recovery steps to correct connectivity induced
failures. It also shows the history of the last group actions that were performed as an audit log. The user can use the jobs view
to track the progress of the action across the group or to cancel an action that is schedule to occur in the future. The Jobs view
allows the user to view the status of the last 50 jobs that have been run and any success or failures that has occurred.
NOTE: For each job entry, the list of systems provide details up to 100 systems. Each system entry contains Hostname,
Service Tag, Member Job Status and Message if in case the job failed.
All Group actions that create jobs are performed on all the group members with immediate effect. You can perform the following
tasks:
● Add/Edit/Remove users
● Configure email alerts
● Change group passcode and name
NOTE: Group jobs complete quickly as long as all members are online and accessible. It may take 10 minutes from job start
to job complete. A job will wait and retry for up to 10 hours for the systems that are not accessible.
Jobs Export
You can export the log to the local system for further references. The jobs list can be exported to a csv file format. It contains
all the data related to each job.
NOTE: Exported CSV files are available only in English.
Group Settings
Group settings page provides a listing of selected group attributes.
Allows the user to perform actions listed on the table below on the group. A group configuration job would be created for these
actions (change group name, change group passcode, remove the members and delete the group). The status of group job can
be viewed or modified from GroupManager > Jobs page.
NOTE: Clear Log only appears if you have Clear Logs permission.
After the SEL is cleared, an entry is logged in the Lifecycle Controller log. The log entry includes the user name and the IP
address from where the SEL was cleared.
NOTE: Lifecycle logs for Personality Mode change is generated only during the warm boot of the host.
If you initiate configuration jobs using RACADM CLI or iDRAC web interface, the Lifecycle log contains information about the
user, interface used, and the IP address of the system from which you initiate the job.
3. Click Save.
The work note is added to the log. For more information, see the iDRAC Online Help.
Monitoring power
iDRAC monitors the power consumption in the system continuously and displays the following power values:
● Power consumption warning and critical thresholds.
● Cumulative power, peak power, and peak amperage values.
● Power consumption over the last hour, last day or last week.
● Average, minimum, and maximum power consumption.
● Historical peak values and peak timestamps.
● Peak headroom and instantaneous headroom values (for rack and tower servers).
NOTE: The histogram for the system power consumption trend (hourly, daily, weekly) is maintained only while iDRAC is
running. If iDRAC is restarted, the existing power consumption data is lost and the histogram is restarted.
NOTE: The Warning Threshold value is reset to the default value after performing a racreset or an iDRAC update.
Power capping
You can view the power threshold limits that covers the range of AC and DC power consumption that a system under heavy
workload presents to the datacenter. This is a licensed feature.
Multi-Vector Cooling
Multi-Vector Cooling implements multi-prong approach to Thermal Controls in Dell EMC Server Platforms. You can configure
multi-vector cooling options through iDRAC web interface by navigating to Configuration > System Settings > Hardware
Settings > Fan Configuration. It includes (but not limited to):
● Large set of sensors (thermal, power, inventory etc.) that allows accurate interpretation of real-time system thermal state
at various locations within the server. It displays only a small subset of sensors that are relevant to users need based on the
configuration.
● Intelligent and adaptive closed loop control algorithm optimizes fan response to maintain component temperatures. It also
conserves fan power, airflow consumption, and acoustics.
● Using fan zone mapping, cooling can be initiated for the components when it requires. Thus, it results maximum performance
without compromising the efficiency of power utilization.
● Accurate representation of slot by slot PCIe airflow in terms of LFM metric (Linear Feet per Minute - an accepted industry
standard on how PCIe card airflow requirement is specified). Display of this metric in various iDRAC interfaces allows user
to:
1. know the maximum LFM capability of each slot within the server.
2. know what approach is being taken for PCIe cooling for each slot (airflow controlled, temperature controlled).
3. know the minimum LFM being delivered to a slot, if the card is a 3rd Party Card (user defined custom card).
Field or Description
Option
Enabled Select Enabled, to enable Connection View. By default the Enabled option is selected.
State Displays Enabled, if you enable the connection view option from the Connection View from iDRAC
settings.
Switch Displays the LLDP chassis ID of the switch through which the device port is connected.
Connection ID
Switch Port Displays the LLDP port ID of the switch port to which the device port is connected.
Connection ID
NOTE: Switch Connection ID and Switch Port Connection ID are available once the Connection View is enabled and the
Link is connected. The associated network card needs to be compatible with the Connection View. Only users with iDRAC
Configure privilege can modify the Connection View settings.
Possible Description
Connection
View Data
Feature Disabled Connection view feature is disabled, to view the connection view data enable the feature.
No Link Indicates that the link associated with network controller port is down.
Not Available LLDP is not enabled on the switch. Check whether LLDP is enabled on the switch port.
Not Supported Network controller does not support Connection view feature.
Manufacturer Type
Broadcom ● 57414 rNDC 25GE
● 57416/5720 rNDC 10GbE
● 57412/5720 rNDC 10GbE
● 57414 PCIe FH/LP 25GE
● 57412 PCIe FH/LP 10GbE
● 57416 PCIe FH/LP 10GbE
Intel ● X710 bNDC 10Gb
● X710 DP PCIe 10Gb
● X710 QP PCIe 10Gb
● X710 + I350 rNDC 10Gb+1Gb
● X710 rNDC 10Gb
● X710 bNDC 10Gb
● XL710 PCIe 40Gb
● XL710 OCP Mezz 10Gb
● X710 PCIe 10Gb
Mellanox ● MT27710 rNDC 40Gb
● MT27710 PCIe 40Gb
● MT27700 PCIe 100Gb
QLogic ● QL41162 PCIe 10GE 2P
● QL41112 PCIe 10GE 2P
● QL41262 PCIe 25GE 2P
NOTE: Some cards with the virtual FIP, virtual WWN, and virtual WWPN MAC attributes, the virtual WWN and virtual
WWPN MAC attributes are automatically configured when you configure virtual FIP.
Using the IO Identity feature, you can:
● View and configure the virtual addresses for network and fibre channel devices (for example, NIC, CNA, FC HBA).
● Configure the initiator (for iSCSI and FCoE) and storage target settings (for iSCSI, FCoE, and FC).
● Specify persistence or clearance of the configured values over a system AC power loss, cold, and warm system resets.
The values configured for virtual addresses, initiator and storage targets may change based on the way the main power is
handled during system reset and whether the NIC, CNA, or FC HBA device has auxiliary power. The persistence of IO identity
settings can be achieved based on the policy setting made using iDRAC.
Only if the I/O identity feature is enabled, the persistence policies take effect. Each time the system resets or powers on, the
values are persisted or cleared based on the policy settings.
NOTE: After the values are cleared, you cannot re-apply the values before running the configuration job.
After enabling this feature, you must restart the system for the settings to take effect.
To disable I/O Identity Optimization, use the command:
NOTE: If there is a persistence policy in effect and the virtual addresses, initiator, or storage targets are set on a
CNA-device partition, do not reset or clear the values configured for virtual addresses, initiator, and storage targets before
changing the VirtualizationMode or the personality of the partition. The action is performed automatically when you disable
the persistence policy. You can also use a configuration job to explicitly set the virtual address attributes to 0s and the
initiator and storage targets values as defined in iSCSI initiator and storage target default values on page 188.
IscsiInitiatorIpAddr 0.0.0.0 ::
IscsiInitiatorIpv6Addr :: ::
IscsiInitiatorSubnetPrefix 0 0
IscsiInitiatorGateway 0.0.0.0 ::
IscsiInitiatorIpv6Gateway :: ::
IscsiInitiatorPrimDns 0.0.0.0 ::
IscsiInitiatorIpv6PrimDns :: ::
IscsiInitiatorSecDns 0.0.0.0 ::
IscsiInitiatorIpv6SecDns :: ::
IPVer Ipv4
FirstTgtIpAddress 0.0.0.0 ::
FirstTgtBootLun 0 0
FirstTgtIpVer Ipv4
SecondTgtIpAddress 0.0.0.0 ::
SecondTgtBootLun 0 0
SecondTgtIpVer Ipv4
Staged If all the set operations are staged, the Configuration is applied after reboot
configuration is staged and applied after
reboot or it is applied at real-time.
Topics:
• Understanding RAID concepts
• Supported controllers
• Supported enclosures
• Summary of supported features for storage devices
• Inventorying and monitoring storage devices
• Viewing storage device topology
• Managing physical disks
• Managing virtual disks
• Managing controllers
• Managing PCIe SSDs
• Managing enclosures or backplanes
• Choosing operation mode to apply settings
• Viewing and applying pending operations
• Storage devices — apply operation scenarios
• Blinking or unblinking component LEDs
What is RAID
RAID is a technology for managing the storage of data on the physical disks that reside or are attached to the system. A key
aspect of RAID is the ability to span physical disks so that the combined storage capacity of multiple physical disks can be
treated as a single, extended disk space. Another key aspect of RAID is the ability to maintain redundant data which can be
used to restore data in the event of a disk failure. RAID uses different techniques, such as striping, mirroring, and parity, to
store and reconstruct data. There are different RAID levels that use different methods for storing and reconstructing data. The
RAID levels have different characteristics in terms of read/write performance, data protection, and storage capacity. Not all
RAID levels maintain redundant data, which means for some RAID levels lost data cannot be restored. The RAID level you choose
depends on whether your priority is performance, protection, or storage capacity.
NOTE: The RAID Advisory Board (RAB) defines the specifications used to implement RAID. Although RAB defines the RAID
levels, commercial implementation of RAID levels by different vendors may vary from the actual RAID specifications. An
implementation of a particular vendor may affect the read and write performance and the degree of data redundancy.
RAID concepts
RAID uses particular techniques for writing data to disks. These techniques enable RAID to provide data redundancy or better
performance. These techniques include:
● Mirroring — Duplicating data from one physical disk to another physical disk. Mirroring provides data redundancy by
maintaining two copies of the same data on different physical disks. If one of the disks in the mirror fails, the system can
continue to operate using the unaffected disk. Both sides of the mirror contain the same data always. Either side of the
mirror can act as the operational side. A mirrored RAID disk group is comparable in performance to a RAID 5 disk group in
read operations but faster in write operations.
● Striping — Disk striping writes data across all physical disks in a virtual disk. Each stripe consists of consecutive virtual
disk data addresses that are mapped in fixed-size units to each physical disk in the virtual disk using a sequential pattern.
For example, if the virtual disk includes five physical disks, the stripe writes data to physical disks one through five without
repeating any of the physical disks. The amount of space consumed by a stripe is the same on each physical disk. The portion
of a stripe that resides on a physical disk is a stripe element. Striping by itself does not provide data redundancy. Striping in
combination with parity does provide data redundancy.
● Stripe size — The total disk space consumed by a stripe not including a parity disk. For example, consider a stripe that
contains 64KB of disk space and has 16KB of data residing on each disk in the stripe. In this case, the stripe size is 64KB and
the stripe element size is 16KB.
● Stripe element — A stripe element is the portion of a stripe that resides on a single physical disk.
● Stripe element size — The amount of disk space consumed by a stripe element. For example, consider a stripe that contains
64KB of disk space and has 16KB of data residing on each disk in the stripe. In this case, the stripe element size is 16KB and
the stripe size is 64KB.
● Parity — Parity refers to redundant data that is maintained using an algorithm in combination with striping. When one of the
striped disks fails, the data can be reconstructed from the parity information using the algorithm.
● Span — A span is a RAID technique used to combine storage space from groups of physical disks into a RAID 10, 50, or 60
virtual disk.
RAID levels
Each RAID level uses some combination of mirroring, striping, and parity to provide data redundancy or improved read and write
performance. For specific information on each RAID level, see Choosing raid levels.
NOTE: The H3xx PERC controllers do not support RAID levels 6 and 60.
The following topics provide specific information on how each RAID level store data as well as their performance and protection
characteristics:
● Raid level 0 (striping)
● Raid level 1 (mirroring)
● Raid level 5 (striping with distributed parity)
● Raid level 6 (striping with additional distributed parity)
● Raid level 50 (striping over raid 5 sets)
● Raid level 60 (striping over raid 6 sets)
● Raid level 10 (striping over mirror sets)
RAID 0 characteristics:
● Groups n disks as one large virtual disk with a capacity of (smallest disk size) *n disks.
● Data is stored to the disks alternately.
● No redundant data is stored. When a disk fails, the large virtual disk fails with no means of rebuilding the data.
● Better read and write performance.
RAID 1 characteristics:
● Groups n + n disks as one virtual disk with the capacity of n disks. The controllers currently supported by Storage
Management allow the selection of two disks when creating a RAID 1. Because these disks are mirrored, the total storage
capacity is equal to one disk.
● Data is replicated on both the disks.
● When a disk fails, the virtual disk still works. The data is read from the mirror of the failed disk.
● Better read performance, but slightly slower write performance.
● Redundancy for protection of data.
● RAID 1 is more expensive in terms of disk space since twice the number of disks are used than required to store the data
without redundancy.
RAID 6 characteristics:
● Groups n disks as one large virtual disk with a capacity of (n-2) disks.
RAID 50 characteristics:
● Groups n*s disks as one large virtual disk with a capacity of s*(n-1) disks, where s is the number of spans and n is the
number of disks within each span.
● Redundant information (parity) is alternately stored on all disks of each RAID 5 span.
● Better read performance, but slower write performance.
● Requires as much parity information as standard RAID 5.
● Data is striped across all spans. RAID 50 is more expensive in terms of disk space.
Supported controllers
Supported RAID controllers
The iDRAC interfaces support the following PERC10 controllers:
● PERC H740P Mini
● PERC H740P Adapter
● PERC H840 Adapter
The iDRAC interfaces support the following PERC9 controllers:
● PERC H330 Mini
● PERC H330 Adapter
● PERC H730P Mini
● PERC H730P Adapter
Supported enclosures
iDRAC supports MD1400, and MD1420 enclosures.
NOTE: Redundant Array of Inexpensive Disks (RBODS) that are connected to HBA controllers are not supported.
NOTE: For iDRAC version 3.00.00.00, daisy chain of enclosures is not supported for H840. Only one enclosure per port is
allowed.
NOTE: PERC 10 no longer supports convert drives to non-RAID, convert controller to HBA mode and RAID 10 uneven span
support.
NOTE: If you enumerate the enclosure view's WSMan command on a system while one PSU-cable is removed, the primary
status of the enclosure view is reported as Healthy instead of Warning.
NOTE: The storage health rollup follows the same convention of Dell EMC OpenManage product. For more information see
the OpenManage Server Administrator User's Guide available at https://www.dell.com/openmanagemanuals.
NOTE: Physical disks in system with multiple backplanes may be listed under a different backplane. Use the blink function
to identify the disks.
NOTE: The storage hardware list is not displayed in case the system does not have storage devices with CEM support.
NOTE: When NVMe SSDs are in RAID mode behind S140 controller, web interface does not display NVMe SSD’s slot
information in the Enclosure page. Refer Physical Disks page for the details.
NOTE: From iDRAC v2.30.30.30 or later, you can add global hot spares when virtual disks are not created.
You can change the hot spare assignment by unassigning a disk and choosing another disk as needed. You can also assign more
than one physical disk as a global hot spare.
NOTE: Hot plugged disks in H330 are always in non-RAID mode. In other RAID controllers, they are always in RAID mode.
NOTE: At this point, you can use the System Erase option to securely erase all ISE drives.
NOTE: PERC 10 count is less since it does not support daisy chain arrangements.
NOTE: Disk slicing or configuring partial VDs is not supported using RACADM on the drives managed by S140 controller.
Similarly, if the PERC has cache but not battery and the policy is set that requires accessing cache, then data loss may
occur if base of power off. So few PERCs may not allow that policy.
NOTE: Consistency check is not supported when the drives are set up in RAID0 mode.
NOTE: Do not initialize virtual disks when attempting to recreate an existing configuration.
You can perform a fast initialization, a full Initialization, or cancel the initialization operation.
NOTE: The cancel initialization is a real-time operation. You can cancel the initialization using only the iDRAC Web interface
and not RACADM.
Fast initialization
The fast initialize operation initializes all physical disks included in the virtual disk. It updates the metadata on the physical disks
so that all disk space is available for future write operations. The initialize task can be completed quickly because the existing
information on the physical disks is not erased, although future write operations overwrite any information that remains on the
physical disks.
Fast initialization only deletes the boot sector and stripe information. Perform a fast initialize only if you are constrained for time
or the hard drives are new or unused. Fast Initialization takes less time to complete (usually 30-60 seconds).
The fast initialize task does not write zeroes to the disk blocks on the physical disks. It is because the Fast Initialize task does
not perform a write operation, it causes less degradation to the disk.
A fast initialization on a virtual disk overwrites the first and last 8 MB of the virtual disk, clearing any boot records or partition
information. The operation takes only 2-3 seconds to complete and is recommended when you are recreating virtual disks.
A background initialization starts five minutes after the Fast Initialization is completed.
NOTE: Full initialize is supported only in real-time. Only few controllers support full initialization.
Rename VD
To change the name of a Virtual Disk, the user must have System Control privilege. The virtual disk name can contain
only alphanumeric characters, spaces, dashes and underscores. The maximum length of the name depends on the individual
controller. In most cases, the maximum length is 15 characters. The name cannot start with a space, end with a space, or be left
blank. Every time a virtual disk is renamed, an LC Log gets created.
Set Patrol Read Mode Unblink Assign Global Hot Spare Unblink
Cancel Initialization
This feature is the ability to cancel the background initialization on a virtual disk. On PERC controllers, the background
initialization of redundant virtual disk starts automatically after a virtual disk is created. The background initialization of
redundant virtual disk prepares the virtual disk for parity information and improves write performance. However, some
processes such as creating a virtual disk cannot be run while the background initialization is in progress. Cancel Initialization
provides the ability to cancel the background initialization manually. Once cancelled, the background initialization automatically
restarts within 0 to 5 minutes.
NOTE: Background initialization is not applicable for RAID 0 virtual disks.
racadm storage hotspare:<Physical Disk FQDD> -assign <option> -type dhs -vdkey: <FQDD
of VD>
<option>=yes
Assign hot spare
<Option>=no
Unassign hot spare
You must have Login and Server Control privilege to configure the controller properties.
NOTE: Patrol read mode operations such as Start and Stop are not supported if there are no virtual disks available in
the controller. Though you can invoke the operations successfully using the iDRAC interfaces, the operations fail when the
associated job is started.
Bgi rate
On PERC controllers, background initialization of a redundant virtual disk begins automatically within 0 to 5 minutes after the
virtual disk is created. The background initialization of a redundant virtual disk prepares the virtual disk to maintain redundant
data and improves write performance. For example, after the background initialization of a RAID 5 virtual disk completes, the
parity information has been initialized. After the background initialization of a RAID 1 virtual disk completes, the physical disks
are mirrored.
The background initialization process helps the controller identify and correct problems that may occur with the redundant data
later. In this regard, the background initialization process is similar to a check consistency. The background initialization should
be allowed to run to completion. If cancelled, the background initialization automatically restarts within 0 to 5 minutes. Some
processes such as read and write operations are possible while the background initialization is running. Other processes, such
as creating a virtual disk, cannot be run concurrently with a background initialization. These processes cause the background
initialization to cancel.
The background initialization rate, configurable between 0% and 100%, represents the percentage of the system resources
dedicated to running the background initialization task. At 0%, the background initialization has the lowest priority for the
controller, takes the most time to complete, and is the setting with the least impact to system performance. A background
initialization rate of 0% does not mean that the background initialization is stopped or paused. At 100%, the background
initialization is the highest priority for the controller. The background initialization time is minimized and is the setting with the
most impact to system performance.
Check consistency
The Check Consistency task verifies the accuracy of the redundant (parity) information. This task only applies to redundant
virtual disks. When necessary, the Check Consistency task rebuilds the redundant data. If the virtual disk is in a Failed
Redundancy state, running a check consistency may be able to return the virtual disk to a Ready state.
The check consistency rate, configurable between 0% and 100%, represents the percentage of the system resources dedicated
to running the check consistency task. At 0%, the check consistency has the lowest priority for the controller, takes the most
time to complete, and is the setting with the least impact to system performance. A check consistency rate of 0% does not
mean that the check consistency is stopped or paused. At 100%, the check consistency is the highest priority for the controller.
The check consistency time is minimized and is the setting with the most impact to system performance.
4. From the Apply Operation Mode, select when you want to apply the settings.
5. Click Apply.
Based on the selected operation mode, the settings are applied.
● If Patrol read mode is set to manual, use the following commands to start and stop Patrol read Mode:
NOTE: Patrol read mode operations such as Start and Stop are not supported if there are no virtual disks available in
the controller. Though you can invoke the operations successfully using the iDRAC interfaces, the operations will fail
when the associated job is started.
● To specify the Check Consistency Mode, use Storage.Controller.CheckConsistencyMode object.
● To enable or disable the Copyback Mode, use Storage.Controller.CopybackMode object.
● To enable or disable the Load Balance Mode, use Storage.Controller.PossibleloadBalancedMode object.
● To specify the percentage of the system's resources dedicated to perform a check consistency on a redundant virtual disk,
use Storage.Controller.CheckConsistencyRate object.
● To specify the percentage of the controller's resources dedicated to rebuild a failed disk, use
Storage.Controller.RebuildRate object
● To specify the percentage of the controller's resources dedicated to perform the background initialization (BGI) of a virtual
disk after it is created, useStorage.Controller.BackgroundInitializationRate object
● To specify the percentage of the controller's resources dedicated to reconstruct a disk group after adding a physical disk or
changing the RAID level of a virtual disk residing on the disk group, use Storage.Controller.ReconstructRate object
● To enable or disable the enhanced auto import of foreign configuration for the controller, use
Storage.Controller.EnhancedAutoImportForeignConfig object
● To create, modify, or delete security key to encrypt virtual drives:
The following constraints apply to the physical disks that are considered for import:
● The drive state of a physical disk can change from the time the foreign configuration is scanned to when the actual import
occurs. The foreign import occurs only on drives that are in the Unconfigured Good state.
● Drives in the failed or offline state cannot be imported.
● The firmware does not allow you to import more than eight foreign configurations.
NOTE: If there is an incomplete foreign disk configuration in the system, then the state of one or more existing online
virtual disks is also displayed as foreign.
For more information, see the iDRAC RACADM Command Line Reference Guide available at dell.com/idracmanuals.
For more information, see the iDRAC RACADM Command Line Reference Guide available at dell.com/idracmanuals.
For more information, see the iDRAC RACADM Command Line Reference Guide available at dell.com/idracmanuals.
On PERC 9.1 controllers, you can change the personality of the controller by switching the mode from RAID to HBA. The
controller operates similar to a HBA controller where the drivers are passed through the operating system. The controller mode
change is a staged operation and does not occur in real time. Before you change the mode of the controller from RAID to HBA,
ensure that:
● The RAID controller supports the controller mode change. The option to change the controller mode is not available on
controllers where the RAID personality requires a license.
● All virtual disks must be deleted or removed.
● Hot spares must be deleted or removed.
● Foreign configurations must be deleted or cleared.
● All physical disks that are in a failed state, must be removed or the pinned cache needs to be cleared.
● Any local security key associated with SEDs must be deleted.
● The controller must not have preserved cache.
● You have server control privileges to switch the controller mode.
NOTE: Ensure that you back up the foreign configuration, security key, virtual disks, and hot spares before you switch the
mode as the data is deleted.
NOTE: Ensure that a CMC license is available for PERC FD33xS and FD33xD storage sleds before you change the
controller mode. For more information on CMC license for the storage sleds, see the Dell Chassis Management Controller
Version 1.2 for PowerEdge FX2/FX2s User's Guide available at https://www.dell.com/support.
RequestedControllerMode = NONE
For more information, see the iDRAC RACADM Command Line Interface Reference Guide available at dell.com/idracmanuals.
You cannot monitor the enclosure temperature probes, fans, and power supplies when the controller is in non-RAID mode.
NOTE: When NVMe devices are controlled behind S140, prepare to remove and cryptographic erase operations are not
supported, blink and unblink are supported.
NOTE: For all the mentioned commands, PERC devices are also displayed.
For more information, see the iDRAC RACADM Command Line Reference Guide available at dell.com/idracmanuals.
PCIe SSDs support orderly hot swap allowing you to add or remove a device without halting or rebooting the system in which
the devices are installed. To prevent data loss, you must use the Prepare to Remove operation before physically removing a
device.
Orderly hot swap is supported only when PCIe SSDs are installed in a supported system running a supported operating system.
To ensure that you have the correct configuration for your PCIe SSD, see the system-specific owner's manual.
The Prepare to Remove operation is not supported for PCIe SSDs on the VMware vSphere (ESXi) systems and HHHL PCIe SSD
devices.
NOTE: Prepare to Remove operation is supported on systems with ESXi 6.0 with iDRAC Service Module version 2.1 or
higher.
The Prepare to Remove operation can be performed in real-time using iDRAC Service Module.
The Prepare to Remove operation stops any background activity and any ongoing I/O activity so that device can be removed
safely. It causes the status LEDs on the device to blink. You can safely remove the device from the system under the following
conditions after you initiate the Prepare to Remove operation:
● The PCIe SSD is blinking the safe to remove LED pattern (blinks amber).
● The PCIe SSD is no longer accessible by the system.
Before preparing the PCIe SSD for removal, ensure that:
● iDRAC Service Module is installed.
● Lifecycle Controller is enabled.
● You have Server Control and Login privileges.
4. From the Apply Operation Mode drop-down menu, select Apply Now to apply the actions immediately.
If there are jobs to be completed, then this option is grayed-out.
NOTE: For PCIe SSD devices, only the Apply Now option is available. This operation is not supported in staged mode.
5. Click Apply.
If the job is not created, a message indicating that the job creation was not successful is displayed. Also, the message ID and
the recommended response action is displayed.
For more information, see the iDRAC RACADM CLI Guide available at https://www.dell.com/idracmanuals.
Cryptographic Erase permanently erases all data present on the disk. Performing a Cryptographic Erase on an PCIe SSD
overwrites all blocks and results in permanent loss of all data on the PCIe SSD. During Cryptographic Erase, the host is unable to
access the PCIe SSD. The changes are applied after system reboot.
If the system reboots or experiences a power loss during cryptographic erase, the operation is canceled. You must reboot the
system and restart the process.
Before erasing PCIe SSD device data, make sure that:
● Lifecycle Controller is enabled.
● You have Server Control and Login privileges.
NOTE:
● Erasing PCIe SSDs can only be performed as a staged operation.
● After the drive is erased, it displays in the operating system as online but it is not initialized. You must initialize and
format the drive before using it again.
● After you hot-plug a PCIe SSD, it may take several seconds to appear on the web interface.
● Cryptographic erase feature is supported for hot-plugged PCIe SSDs for 14th generation PowerEdge servers.
5. Click Apply.
If the job is not created, a message indicating that the job creation was not successful is displayed. Also, the message ID and
the recommended response action is displayed.
If the job is created successfully, a message indicating that the job ID is created for the selected controller is displayed. Click
Job Queue to view the progress of the job in the Job Queue page.
If pending operation is not created, an error message is displayed. If pending operation is successful and job creation is not
successful, then an error message is displayed.
For more information, see the iDRAC RACADM Command Line Reference Guide available at dell.com/idracmanuals.
For R740xd and R940, power cycle of the server is needed to apply the new backplane zone and for C6420, A/C cycle (of
the blade chassis) to apply the new backplane zone.
5. Click Add to Pending Operations.
A job ID is created.
6. Click Apply Now.
To configure the enclosure or backplane, use the set command with the objects in BackplaneMode.
For example, to set the BackplaneMode attribute to split mode:
1. Run the following command to view the current backplane mode:
BackplaneCurrentMode=UnifiedMode
BackplaneRequestedMode=None
3. Run the following command to set the requested backplane mode to split mode:
BackplaneRequestedMode=None (Pending=SplitMode)
5. Run storage get controllers command and note down the controller instance ID.
6. Run the following command to create a job:
A job ID is returned.
7. Run the following command to query the job status:
BackplaneRequestedMode=SplitMode
10. After the system completes POST and CSIOR, type the following command to verify the backplanerequestedmode:
BackplaneRequestedMode=None
11. Run the following to verify is the backplane mode is set to split mode:
BackplaneCurrentMode=SplitMode
12. Run the following command and verify that only 0–11 drives are displayed:
For more information about the RACADM commands, see the iDRAC RACADM Command Line Interface Reference Guide
available at dell.com/idracmanuals.
NOTE: You cannot set the SGPIO mode using iDRAC Web interface.
NOTE: Asset Tag has a character limit of 10 that includes the null character.
NOTE: Asset Name has a character limit of 32 that includes the null character.
3. Click Apply.
Based on the operation mode selected, the settings are applied.
5. If the commit job is not created, a message indicating that the job creation was not successful is displayed. Also, the
message ID and the recommended response action are displayed.
6. If the commit job is created successfully, a message indicating that the job ID is created for the selected controller is
displayed. Click Job Queue to view the progress of the job in the Job Queue page.
If the clear foreign configuration, import foreign configuration, security key operations, or encrypt virtual disk operations are
in pending state, and if these are the only operations pending, then you cannot create a job from the Pending Operations
page. You must perform any other storage configuration operation or use RACADM or WSMan to create the required
configuration job on the required controller.
You cannot view or clear pending operations for PCIe SSDs in the Pending Operations page. Use the racadm command to
clear the pending operations for PCIe SSDs.
For more information, see the iDRAC RACADM Command Line Reference Guide available at dell.com/idracmanuals.
Apply
Apply button remains greyed-out until any of the attributes are modified. Once you made changes to an attribute and click
Apply, it allows you to modify the attribute with required changes. In case, the request fails to set the BIOS attribute, it
throws an error with corresponding HTTP Response Status code mapped to SMIL API error or Job Creation error. A message is
generated and displayed at that point. For more information, see Event and Error Message Reference Guide for 14th Generation
Dell EMC PowerEdge Servers available at https://www.dell.com/idracmanuals.
Discard changes
The Discard Changes button is greyed-out until any of the attributes are modified . If you click Discard Changes button , all
the recent changes are discarded and restored with the previous or initial values.
Pending Value
Configuration of a BIOS attribute via iDRAC is not applied immediately to BIOS. It requires a server reboot for the changes to
take place. When you modify a BIOS attribute then Pending Value gets updated. If an attribute already has a pending value
(and that has been configured) it is displayed on the GUI.
NOTE: For information about configuring your browser to access the virtual console, see Configuring web browsers to use
virtual console on page 62.
Topics:
• Supported screen resolutions and refresh rates
• Configuring virtual console
• Previewing virtual console
• Launching virtual console
• Using virtual console viewer
720x400 70
1280x1024 60
1920x1200 60
It is recommended that you configure the monitor display resolution to 1920x1200 pixels.
NOTE: If you have an active Virtual Console session and a lower resolution monitor is connected to the Virtual Console, the
server console resolution may reset if the server is selected on the local console. If the system is running a Linux operating
system, an X11 console may not be viewable on the local monitor. Press <Ctrl><Alt><F1> at the iDRAC Virtual Console to
switch Linux to a text console.
NOTE: Do not launch a Virtual Console session from a Web browser on the managed system.
NOTE: If you do not have Access Virtual Console privilege but have Access Virtual Media privilege, then using this URL
launches the Virtual Media instead of the Virtual Console.
1. Initially, when you launch Virtual Console or Virtual Media using Java plug-in, the prompt to verify the publisher is displayed.
Click Yes.
A certificate warning message is displayed indicating that a trusted certificate is not found.
NOTE: If the certificate is found in the operating system’s certificate store or if it is found in a previously specified user
location, then this warning message is not displayed.
2. Click Continue.
The Virtual Console Viewer or Virtual Media Viewer is launched.
NOTE: If the remote server is powered off, the message ’No Signal’ is displayed.
The Virtual Console Viewer title bar displays the DNS name or the IP address of the iDRAC you are connected to from the
management station. If iDRAC does not have a DNS name, then the IP address is displayed. The format is:
● For rack and tower servers:
<DNS name / IPv6 address / IPv4 address>, <Model>, User: <username>, <fps>
Sometimes the Virtual Console Viewer may display low quality video. This is due to slow network connectivity that leads to
loss of one or two video frames when you start the Virtual Console session. To transmit all the video frames and improve the
subsequent video quality, do any of the following:
● In the System Summary page, under Virtual Console Preview section, click Refresh.
● In the Virtual Console Viewer, under Performance tab, set the slider to Maximum Video Quality.
NOTE: While using HTML5 to access virtual console, the language must be consistent across client and target keyboard
layout, OS, and browser. For example, all must be in English (US) or any of the supported languages.
To launch the HTML5 virtual console, you must enable the virtual console feature from the iDRAC Virtual Console page and set
the Virtual Console Type option to HTML5.
You can launch virtual console as a pop-up window by using one of the following methods:
● From iDRAC Home page, click the Launch link available in the Console Preview session
● From iDRAC Virtual Console page, click Launch Virtual Console.
● From iDRAC login page, type https//<iDRAC IP>/console. This method is called as Direct Launch.
In the HTML5 virtual console, the following menu options are available:
● Add Power Control
● Boot Order
● Chat
● Keyboard
● Screen Capture
● Refresh
● Full Screen
● Disconnect Viewer
● Console Control
NOTE: You cannot map physical media such USB-based drives, CD, or DVD by using the HTML5 based virtual console.
NOTE: For security reasons read/write access is disabled while accessing virtual console in HTML5. With Java or ActiveX
plug-ins, you can accept security messaging before the plug-in is given the read/write authority.
Supported Browsers
The HTML5 virtual console is supported on the following browsers:
● Internet Explorer 11
● Chrome 36
● Firefox 30
● Safari 7.0
NOTE: It is recommended to have Mac OS version 10.10.2 (or onward) installed in the system.
For more details on supported browsers and versions, see the iDRAC Release Notes available at https://www.dell.com/
idracmanuals.
Using SSH or Telnet or external serial connector directly connecting through serial cable
1. For telnet/SSH sessions, after logging in using the iDRAC username and password, at the /admin> prompt, run the
command console com2. The localhost.localdomain prompt appears.
2. For console redirection using external serial connector directly connected to the system through a serial cable, the
localhost.localdomain login prompt appears after the server boots to the operating system.
3. Log in using the operating system user name and password.
4. If SysRq is not enabled, enable using echo 1 >/proc/sys/kernel/sysrq.
5. Use the magic key to enable the SysRq function. For example, the following command reboots the server:
NOTE: You do not have to run break sequence before using the magic SysRq keys.
NOTE: You can use the iDRAC Service Module only if you have installed iDRAC Express or iDRAC Enterprise license.
Topics:
• Installing iDRAC Service Module
• Supported operating systems for iDRAC Service Module
• iDRAC Service Module monitoring features
• Using iDRAC Service Module from iDRAC web interface
• Using iDRAC Service Module from RACADM
• Using iDRAC Service Module on Windows Nano OS
5. Find the mounted volume labeled as "SMINST" on your device list and run the appropriate script:
● On Windows, open the command prompt and run the ISM-Win.bat batch file.
● On Linux, open the shell prompt and run the ISM-Lx.sh script file.
6. Follow the instructions on the screen to complete the installation.
On the iDRAC Service Module Setup page, the Install Service Module button is disabled after the installation is
complete and the Service Module status is displayed as Running.
namespace root/
cimv2/dcim
○ Using the Windows PowerShell script with force and without force:
Invoke-iDRACHardReset –force
Invoke-iDRACHardReset
NOTE: The following warning message appears in the Event Viewer under the Application Logs category. This
warning does not require any further action.
● Linux
iSM provides an executable command on all iSM supported Linux operating system. You can run this command by logging
into the operating system by using SSH or equivalent.
Invoke-iDRACHardReset
Invoke-iDRACHardReset –f
● ESXi
On all iSM supported ESXi operating systems, the iSM v2.3 supports a Common Management Programming Interface
(CMPI) method provider to perform the iDRAC reset remotely by using the WinRM remote commands.
NOTE: VMware ESXi operating system does not prompt for confirmation before resetting the iDRAC.
NOTE: Due to limitations on the VMware ESXi operating system, iDRAC connectivity is not restored completely after
the reset. Ensure that you manually reset iDRAC.
NOTE: This feature is active only if the Lifecycle Logs replication feature is enabled.
NOTE: On Linux operating systems, this feature requires a master or OS SNMP enabled with SNMP multiplexing (SMUX)
protocol.
By default, this feature is disabled. Though the In-band SNMP alerting mechanism can coexist along with iDRAC SNMP alerting
mechanism, the recorded logs may have redundant SNMP alerts from both the sources. It is recommended to either use the
in-band or out-of-band option, instead of using both.
Command usage
This section provides the command usages for Windows, Linux, and ESXi operating systems.
● Windows operating system
○ Using the local Windows Management Instrumentation (WMI):
winrm i EnableInBandSNMPTraps
wmi/root/cimv2/dcim/DCIM_iSMService?InstanceID="iSMExportedFunctions"
@{state="[0/1]"}
If –force is not specified, ensure that the net-SNMP is configured and restart the snmpd service.
○ To enable this feature:
Enable-iDRACSNMPTrap.sh 1
Enable-iDRACSNMPTrap.sh enable
Enable-iDRACSNMPTrap.sh 0
Enable-iDRACSNMPTrap.sh disable
NOTE: The --force option configures the Net-SNMP to forward the traps. However, you must configure the trap
destination.
● VMware ESXi operating system
On all iSM supported ESXi operating systems, the iSM v2.3 supports a Common Management Programming Interface
(CMPI) method provider to enable this feature remotely by using the WinRM remote commands.
NOTE: You must review and configure the VMware ESXi system-wide SNMP settings for traps.
NOTE: For more details, refer to the In-BandSNMPAlerts technical white paper available at https://www.dell.com/
support.
The output of this command indicates whether this feature is enabled or disabled. If the feature is enabled, it displays the
listening-port number.
NOTE: Ensure that the Microsoft IP Helper Services is running on your system for this feature to function.
To access the iDRAC Web interface, use the format https://<host-name> or OS-IP>:443/login.html in the browser,
where:
● <host-name> — Complete host name of the server on which iSM is installed and configured for iDRAC access via OS
feature. You can use the OS IP address if the host name is not present.
● 443 — Default iDRAC port number. This is called the Connect Port number to which all the incoming connections on
listen port number are redirected. You can modify the port number through iDRAC Web interface, WSMan, and RACADM
interfaces.
Enable-iDRACAccessHostRoute
If the feature is already configured, you can disable or modify it by using the PowerShell command and the corresponding
options. The available options are as follows:
● Status — This parameter is mandatory. The values are not case sensitive and the value can be true, false, or get.
● Port — This is the listening port number. If you do not provide a port number, the default port number (1266) is used. If the
Status parameter value is FALSE, then you can ignore rest of the parameters. You must enter a new port number that is
not already configured for this feature. The new port number settings overwrite the existing OS2iDRAC in-bound firewall rule
and you can use the new port number to connect to iDRAC. The value range is from 1024 to 65535.
● IPRange — This parameter is optional and it provides a range of IP addresses that are allowed to connect to iDRAC through
the host operating system. The IP address range format is in Classless Inter-Domain Routing (CIDR) format, which is a
combination of IP address and subnet mask. For example, 10.94.111.21/24. Access to iDRAC is restricted for IP addresses
that are not within the range.
Enable-iDRACAccessHostRoute get-status
To install, enable, and configure this feature, use the following command:
<Enable-Flag>=0
Disable
<source-port> and <source-IP-range/source-ip-range-mask> are not required.
<Enable-Flag>=1
Enable
<source-port> is required and <source-ip-range-mask> is optional.
<source-IP-range>
IP range in <IP-Address/subnet-mask> format. Example: 10.95.146.98/24
You can view the replicated Lifecycle logs using the WMI or Windows PowerShell query:
By default, the logs are available at Event viewer > Applications and Services Logs > System.
NOTE: Use an OTG adapter to convert from Type-A to Micro-B USB. Connections from USB hubs are not supported.
● iDRAC Managed: USB SCP—Select from following options to configure the system by importing SCP stored on a USB
drive:
○ Disabled—Disables SCP imports
○ Enabled only when server has default credential settings— If this option is selected then the SCP can only be
imported when the default password is not changed for the following:
■ BIOS
■ iDRAC web interface
○ Enabled only for compressed configuration files—Select this option to allow SCP file import only if the files are in
compressed format.
NOTE: Selecting this option allows you to password protect the compressed file. You can enter a password to
secure the file by using Password for Zip file option.
○ Enabled—Select this option to allow importing SCP file without running a check during runtime.
Topics:
• Accessing iDRAC interface over direct USB connection
• Configuring iDRAC using server configuration profile on USB device
NOTE: If you are using Windows operating system, you may need to install an RNDIS driver to use this feature.
racadm hwinventory
racadm eventfilters
For more information, see the iDRAC RACADM CLI Guide available at https://www.dell.com/idracmanuals.
<InstructionTable>
<InstructionRow>
<InstructionType>Configuration XML import Host control Instruction
</InstructionType>
<Instruction>ShutdownType</Instruction>
<Value>NoReboot</Value>
<ValuePossibilities>Graceful,Forced,NoReboot</ValuePossibilities>
</InstructionRow>
<InstructionRow>
<InstructionType>Configuration XML import Host control Instruction
</InstructionType>
<Instruction>TimeToWait</Instruction>
<Value>300</Value>
<ValuePossibilities>Minimum value is 300 -Maximum value is
3600 seconds.</ValuePossibilities>
</InstructionRow>
<InstructionRow>
<InstructionType>Configuration XML import Host control Instruction
</InstructionType>
<Instruction>EndHostPowerState</Instruction>
<Value>On</Value>
<ValuePossibilities>On,Off</ValuePossibilities>
</InstructionRow>
</InstructionTable>
5. LCD panel and LED, if present, display the status that an import job has started.
6. If there is a configuration that needs to be staged and the Shut Down Type is specified as No Reboot is specified in the
control file, you must reboot the server for the settings to be configured. Else, server is rebooted and the configuration is
applied. Only when the server was already powered down, then the staged configuration is applied even if the No Reboot
option is specified.
7. After the import job is complete, the LCD/LED indicates that the job is complete. If a reboot is required, LCD displays the job
status as “Paused waiting on reboot”.
8. If the USB device is left inserted on the server, the result of the import operation is recorded in the results.xml file in
the USB device.
LCD messages
If the LCD panel is available, it displays the following messages in a sequence:
NOTE: On PowerEdge R840 and R940xa, if there is a LCD present, the USB LED does not blink when an import operation
is in progress using the USB port. Check the status of the operation using the LCD.
NOTE: This section is displayed only in those servers that has Quick Sync 2 module in left rack ear.
NOTE: This feature is currently supported on mobile devices with Android operating system and Apple iOS.
In the current release, this feature is available on all 14th generation of PowerEdge servers. It requires Quick Sync 2 Left Control
Panel (embedded in Left rack ear) and Bluetooth Low Energy (and optionally Wi-Fi) enabled mobile devices. Therefore, it is a
hardware up-sell and the feature capabilities are not dependent on iDRAC software licensing.
NOTE: To configure Quick Sync 2 in MX platform systems, see the OpenManage Enterprise Modular User's Guide and
OpenManage Mobile User’s Guide available at dell.com/support/manuals
The iDRAC Quick Sync 2 Configuration procedures:
● – iDRAC Quick Sync Access Configuration(via iDRAC GUI, iDRAC HII, racadm, WSMan)
1. ›Quick Sync Access — Configure to read-write, this is the default option.
2. ›Quick Sync Inactivity Timer — Configure to Enabled, this is the default option.
3. ›Quick Sync Inactivity Timeout — Indicates the time after which the Quick Sync 2 mode is disabled. By default,
seconds are selected. The default value is 120 seconds. The range is 120 to 3600 seconds.
4. ›Quick Sync Read Authentication — Configures to Enabled, this is the default option.
5. Quick Sync WiFi — Configures to Enabled, this is the default option.
Once configured activate the Quick Sync 2 button on the Left Control Panel. Make sure the Quick Sync 2 light turns on. Access
the Quick Sync 2 Information via a mobile device (Android 5.0+ or IOS 9.0+, OMM 2.0 or above).
Using OpenManage Mobile, you can:
● View inventory information
● View monitoring information
● Configure the basic iDRAC network settings
For more information about OpenManage Mobile, see the Dell EMC OpenManage Mobile User's Guide available at https://
www.dell.com/openmanagemanuals.
Topics:
• Configuring iDRAC Quick Sync 2
• Using mobile device to view iDRAC information
Topics:
• Supported drives and devices
• Configuring virtual media
• Accessing virtual media
• Setting boot order through BIOS
• Enabling boot once for virtual media
Virtual Optical Drives ● Legacy 1.44 floppy drive with a 1.44 floppy diskette
● CD-ROM
● DVD
● CD-RW
● Combination drive with CD-ROM media
Auto-attach Media is mapped when Client View is opened and unmapped when Client View is closed.
Virtual Console has been disabled. Do you want to continue using Virtual Media
redirection?
3. Click OK.
The Virtual Media window is displayed.
4. From the Virtual Media menu, click Map CD/DVD or Map Removable Disk.
For more information, see Mapping virtual drive.
NOTE: The virtual device drive letters on the managed system do not coincide with the physical drive letters on the
management station.
NOTE: The Virtual Media may not function correctly on Windows operating system clients that are configured with
Internet Explorer Enhanced Security. To resolve this issue, see the Microsoft operating system documentation or
contact the system administrator.
Resetting USB
To reset the USB device:
1. In the Virtual Console viewer, click Tools > Stats.
The Stats window is displayed.
2. Under Virtual Media, click USB Reset.
NOTE: You cannot map physical media such USB-based drives, CD, or DVD by using the HTML5 based virtual console.
NOTE: You cannot map USB keys as virtual media disks using Virtual Console/Virtual media over a RDP session.
3. In the Drive/Image File field, select the device from the drop-down list.
The list contains all the available (unmapped) devices that you can map (CD/DVD, Removable Disk, Floppy Drive) and image
file types that you can map (ISO or IMG). The image files are located in the default image file directory (typically the user’s
desktop). If the device is not available in the drop-down list, click Browse to specify the device.
The correct file type for CD/DVD is ISO and for removable disk and floppy disk it is IMG.
If the image is created in the default path (Desktop), when you select Map Removable Disk, the created image is available
for selection in the drop-down menu.
If image is created in a different location, when you select Map Removable Disk, the created image is not available for
selection in the drop-down menu. Click Browse to specify the image.
NOTE: To unmap a virtual DVD drive on Linux OS, unmount the drive and eject it.
Topics:
• Installing VMCLI
• Running VMCLI utility
• VMCLI syntax
Installing VMCLI
The VMCLI utility is included in the Dell Systems Management Tools and Documentation DVD.
To install the VMCLI utility:
1. Insert the Dell Systems Management Tools and Documentation DVD into the management station’s DVD drive.
2. Follow the on-screen instructions to install DRAC tools.
3. After successful install, check install\Dell\SysMgt\rac5 folder to make sure vmcli.exe exists. Similarly, check the
respective path for UNIX.
The VMCLI utility is installed on the system.
VMCLI syntax
The VMCLI interface is identical on both Windows and Linux systems. The VMCLI syntax is:
VMCLI [parameter] [operating_system_shell_options]
For example, vmcli -r iDRAC-IP-address:iDRAC-SSL-port
The parameter enables VMCLI to connect to the specified server, access iDRAC, and map to the specified virtual media.
Floppy drive
vmcli -r [RAC IP or hostname] -u [iDRAC
user
name] -p [iDRAC user password] -f [device
name]
If the file is not write-protected, Virtual Media may write to the image file. To make sure that Virtual Media does not write to the
media:
● Configure the operating system to write-protect a floppy image file that must not be overwritten.
● Use the write-protection feature of the device.
When virtualizing read-only image files, multiple sessions can use the same image media simultaneously.
When virtualizing physical drives, only one session can access a given physical drive at a time.
NOTE: The VMCLI utility does not read from standard input (stdin). Hence, stdin redirection is not required.
● Background execution — By default, the VMCLI utility runs in the foreground. Use the operating system's command shell
features for the utility to run in the background.
Topics:
• Configuring vFlash SD card
• Managing vFlash partitions
NOTE: You must have Access Virtual Media privilege to enable or disable vFlash functionality, and initialize the card.
3. Click Apply. The vFlash functionality is enabled or disabled based on the selection.
n=0
Disabled
n=1
Enabled
NOTE: The RACADM command functions only if a vFlash SD card is present. If a card is not present, the following message
is displayed: ERROR: SD Card not present.
NOTE: If iDRAC is reset, the status of the last partition operation is lost.
vFlash is capable of performing fast partition creation when there is no other on-going vFlash operation such as formatting,
attaching partitions, and so on. Therefore, it is recommended to first create all partitions before performing other individual
partition operations.
By default, the created partition is read-only. This command is case sensitive for the image file name extension. If the file
name extension is in upper case, for example FOO.ISO instead of FOO.iso, then the command returns a syntax error.
NOTE: This feature is not supported in local RACADM.
NOTE: Creating vFlash partition from an image file located on the CFS or NFS IPv6 enabled network share is not
supported.
Modifying a partition
You can change a read-only partition to read-write or vice-versa. Before modifying the partition, make sure that:
● The vFlash functionality is enabled.
NOTE: If the partition is of type CD, the state is read-only. You cannot change the state to read-write. If the partition is
attached, the check box is grayed-out.
● To detach a partition:
Booting to a partition
You can set an attached vFlash partition as the boot device for the next boot operation.
Before booting a partition, make sure that:
● The vFlash partition contains a bootable image (in the .img or .iso format) to boot from the device.
● The vFlash functionality is enabled.
● You have Access Virtual Media privileges.
admin domain
admin1
Hardware
admin1/hdwr1
Service Processor
admin1/system1/sp1
Authentication capabilities
admin1/system1/sp1/capabilities1/elecap1
Local role
admin1/system1/sp1/rolesvc1/Role1-16
IPMI role
admin1/system1/sp1/rolesvc2/Role1-3
CLP role
admin1/system1/sp1/rolesvc3/Role1-3
Usage examples
This section provides use case scenarios for SMCLP:
● Server power management on page 285
● SEL management on page 285
SEL management
The following examples show how to use the SMCLP to perform SEL-related operations on the managed system. Type the
following commands at the SMCLP command prompt:
● To view the SEL:
show/system1/logs1/log1
The following output is displayed:
/system1/logs1/log1
Targets:
Record1
Record2
Record3
Record4
Record5
Properties:
InstanceID = IPMI:BMC1 SEL Log
MaxNumberOfRecords = 512
CurrentNumberOfRecords = 5
Name = IPMI SEL
EnabledState = 2
OperationalState = 2
HealthState = 2
Caption = IPMI SEL
Description = IPMI SEL
ElementName = IPMI SEL
● To exit:
exit
The connection status for RFS is available in iDRAC log. Once connected, an RFS-mounted virtual drive does not disconnect
even if you log out from iDRAC. The RFS connection is closed if iDRAC is reset or the network connection is dropped. The Web
interface and command-line options are also available in CMC and iDRAC to close the RFS connection. The RFS connection
from CMC always overrides an existing RFS mount in iDRAC.
NOTE: Both '/' or '\' characters can be used for the file path.
CIFS supports both IPv4 and IPv6 addresses but NFS supports only IPv4 address.
If you are using NFS share, make sure that you provide the exact <file path> and <image name> as it is case-sensitive.
NOTE: For information on recommended characters for user names and passwords, see Recommended characters in
user names and passwords on page 125.
NOTE: The characters allowed in user names and passwords for network shares are determined by the network-share
type. iDRAC supports valid characters for network share credentials as defined by the share type, except <, >, and ,
(comma).
where, user_defined_mount_point is any directory you choose to use for the mount similar to any mount command.
For RHEL, the CD device (.iso virtual device) is /dev/scd0 and floppy device (.img virtual device) is /dev/sdc.
This displays the text that identifies the device (example, SCSI device sdc). This procedure also applies to Virtual Media
when you are using Linux distributions in runlevel init 3. By default, the virtual media is not auto-mounted in init 3.
NOTE: To avoid I/O errors when using CIFS shares hosted on Windows 7 systems, modify the following registry keys:
● Set HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management\LargeSystemCache to 1
● Set HKLM\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters\Size to 3
About IDSDM
Internal Dual SD Module (IDSDM) is available only on applicable platforms. IDSDM provides redundancy on the hypervisor SD
card by using another SD card that mirrors the first SD card’s content.
Either of the two SD cards can be the master. For example, if two new SD cards are installed in the IDSDM, SD1 is active
(master) card and SD2 is the standby card. The data is written on both the cards, but the data is read from SD1. At any time if
SD1 fails or is removed, SD2 automatically become the active (master) card.
You can view the status, health, and the availability of IDSDM using iDRAC Web Interface or RACADM. The SD card redundancy
status and failure events are logged to SEL, displayed on the front panel, and PET alerts are generated if alerts are enabled.
Topics:
• Using diagnostic console
• Viewing post codes
• Viewing boot and crash capture videos
• Viewing logs
• Viewing last system crash screen
• Viewing System status
• Hardware trouble indicators
• Viewing system health
• Checking server status screen for error messages
• Restarting iDRAC
• Erasing system and user data
• Resetting iDRAC to factory default settings
racadm diagnostics run -m <Mode> -r <reboot type> -s <Start Time> -e <Expiration Time>
● To export the last run remote diagnostics results, use the following command:
racadm diagnostics export -f <file name> -l <NFS / CIFS / HTTP / HTTPs share> -u
<username> -p <password>
For more information about the options, see the iDRAC RACADM CLI Guide available at https://www.dell.com/idracmanuals.
NOTE: DVC boot capture files are not videos. They are sequence of screens (at 1 particular resolution) taken during the
course of the server boot. The DVC player converts these screens together to create the boot video. When you export
the video from DVC (continuous snapshot and differences) to .mov (actual video) format, it is expected to use the same
resolution, or a similar resolution, that the video was initially encoded with. Videos need to be exported at a similar resolution
that they have been captured with.
NOTE: The reason for the delay in boot capture file availability is because the boot capture buffer is not full after the host
boot.
To view the Boot Capture screen, click Maintenance > Troubleshooting > Video Capture.
The Video Capture screen displays the video recordings. For more information, see the iDRAC Online Help.
Viewing logs
You can view System Event Logs (SELs) and Lifecycle logs. For more information, see Viewing System Event Log and Viewing
Lifecycle log.
NOTE: Once iDRAC is reset or an AC power cycle event occurs, then the crash capture data is cleared.
NOTE: You can hide or unhide the errors only for rack and tower servers.
Based on the selection, the text box displays the current value. If you select User Defined, enter the required message in the
text box. The character limit is 62. If you select None, home message is not displayed on the LCD.
To view LCD front panel status using RACADM, use the objects in the System.LCD group. For more information, see the
iDRAC RACADM CLI Guide available at https://www.dell.com/idracmanuals.
You can erase system component(s) and user data for the following components:
● Lifecycle Controller Data
● Embedded Diagnostics
● Embedded OS Driver Pack
● BIOS reset to default
● iDRAC reset to default
The Lifecycle Controller Data option erases any content such as the LC Log, configuration database, rollback firmware, factory
as-shipped logs, and the configuration information from the FP SPI (or management riser).
NOTE: The Lifecycle Controller log contains the information about the system erase request and any information generated
when the iDRAC restarts. All previous information is removed.
You can delete individual or multiple system components using the SystemErase command:
where,
● bios — BIOS reset to default
● diag — Embedded Diagnostics
● drvpack — Embedded OS Driver Pack
● lcdata — Clear the Lifecycle Controller Data
● idrac — iDRAC reset to default
● overwritepd — Overwrite hard drives that do not support Instant Secure Erase (ISE)
● percnvcache — Reset controller cache
● vflash — Reset vFLASH
● secureerasepd — Erase Hard Drives, SSDs, and NVMes that support ISE
● allapps — Clears all OS applications
NOTE: After you run System Erase, the VDs may still appear. Run CSIOR after System Erase is completed and iDRAC is
rebooted.
SupportAssist Registration
To take advantage of the automated, proactive, and predictive features of SupportAssist, you must register your system with
SupportAssist.
You can generate and save a collection locally or to a network, and also send to Dell EMC without registration.
NOTE: You can remove the secondary contact information at any point of time.
SupportAssist
Once SupportAssist is configured, you can check the SupportAssist dash board to view the Service Request Summary,
Warranty Status, SupportAssist Overview, Service Requests, and Collection log. Registration is not required to view or
send the Collection log.
Collection Log
Collection Log shows the details of Collection Date and Time, Collection Type (Manual, Scheduled, Event based), Data
Collected (Custom Selection, All Data), Collection Status (Complete with Errors, Complete), Job ID, Sent Status, and Sent
Date and Time. You can send the last persisted collection in iDRAC to Dell.
NOTE: Once generated, the Collection Log Details can be filtered to remove the Personally Identifiable Information (PII)
based on the user selection.
Collection Settings
You can save the collections to a preferred network location. Use Set Archive Directory to set the network location. You
can save the collections to a preferred network location. Use Set Archive Directory to set the network location. Enter the
type of Protocol (CIFS/NFS) that you want to opt for, corresponding IP Address, Share Name, Domain Name, User Name
and Password before you Test Network Connection. The Test Network Connection button will confirm a connection to the
destination share.
If registered, you can opt to include Identification information while sending the data to Dell in the Collection Settings.
You can enable and schedule Automatic Collection options to avoid any manual intervention and keep a periodical check of the
system. By default, when an event is triggered and support case is opened, SupportAssist is configured to automatically collect
the system logs from the device that generated the alert and upload it to Dell. You can enable or disable Automatic Collection
based on events. You can schedule the Automatic collections based on your suitable requirements. The available options are,
weekly, monthly, quarterly or never. You can also configure the date and time for the scheduled periodic events. You have the
option to enable or disable ProSupport Plus Recommendation Report while configuring the Automatic Collections.
Contact Information
This page shows the contact information details that were added during the registration of SupportAssist, and allows you to
update them.
Active Directory
Active Directory login failed. How to resolve this?
To diagnose the problem, on the Active Directory Configuration and Management page, click Test Settings. Review the
test results and fix the problem. Change the configuration and run the test until the test user passes the authorization step.
In general, check the following:
● While logging in, make sure that you use the correct user domain name and not the NetBIOS name. If you have a local iDRAC
user account, log into iDRAC using the local credentials. After logging in, make sure that:
○ The Active Directory Enabled option is selected on the Active Directory Configuration and Management page.
○ The DNS setting is correct on the iDRAC Networking configuration page.
○ The correct Active Directory root CA certificate is uploaded to iDRAC if certificate validation was enabled.
○ The iDRAC name and iDRAC Domain name matches the Active Directory environment configuration if you are using
extended schema.
○ The Group Name and Group Domain Name matches the Active Directory configuration if you are using standard schema.
○ If the user and the iDRAC object is in different domain, then do not select the User Domain from Login option. Instead
select Specify a Domain option and enter the domain name where the iDRAC object resides.
● Check the domain controller SSL certificates to make sure that the iDRAC time is within the valid period of the certificate.
Active Directory login fails even if certificate validation is enabled. The test results display the following error
message. Why does this occur and how to resolve this?
If certificate validation is enabled, when iDRAC establishes the SSL connection with the directory server, iDRAC uses the
uploaded CA certificate to verify the directory server certificate. The most common reasons for failing certification validation
are:
● iDRAC date is not within the validity period of the server certificate or CA certificate. Check the iDRAC time and the validity
period of your certificate.
● The domain controller addresses configured in iDRAC does not match the Subject or Subject Alternative Name of the
directory server certificate. If you are using an IP address, read the next question. If you are using FQDN, make sure
you are using the FQDN of the domain controller and not the domain. For example, servername.example.com instead of
example.com.
Certificate validation fails even if IP address is used as the domain controller address. How to resolve this?
Check the Subject or Subject Alternative Name field of your domain controller certificate. Normally, Active Directory uses the
host name and not the IP address of the domain controller in the Subject or Subject Alternative Name field of the domain
controller certificate. To resolve this, do any of the following:
● Configure the host name (FQDN) of the domain controller as the domain controller address(es) on iDRAC to match the
Subject or Subject Alternative Name of the server certificate.
● Reissue the server certificate to use an IP address in the Subject or Subject Alternative Name field, so that it matches the IP
address configured in iDRAC.
● Disable certificate validation if you choose to trust this domain controller without certificate validation during the SSL
handshake.
How to configure the domain controller address(es) when using extended schema in a multiple domain
environment?
This must be the host name (FQDN) or the IP address of the domain controller(s) that serves the domain in which the iDRAC
object resides.
When to configure Global Catalog Address(es)?
If you are using standard schema and the users and role groups are from different domains, Global Catalog Address(es) are
required. In this case, you can use only Universal Group.
If you are using standard schema and all the users and role groups are in the same domain, Global Catalog Address(es) are not
required.
If you are using extended schema, the Global Catalog Address is not used.
How does standard schema query work?
iDRAC connects to the configured domain controller address(es) first. If the user and role groups are in that domain, the
privileges are saved.
If Global Controller Address(es) is configured, iDRAC continues to query the Global Catalog. If additional privileges are retrieved
from the Global Catalog, these privileges are accumulated.
Does iDRAC always use LDAP over SSL?
Yes. All the transportation is over secure port 636 and/or 3269. During test setting, iDRAC does a LDAP CONNECT only to
isolate the problem, but it does not do an LDAP BIND on an insecure connection.
Why does iDRAC enable certificate validation by default?
iDRAC enforces strong security to ensure the identity of the domain controller that iDRAC connects to. Without certificate
validation, a hacker can spoof a domain controller and hijack the SSL connection. If you choose to trust all the domain
controllers in your security boundary without certificate validation, you can disable it through the Web interface or RACADM.
Does iDRAC support the NetBIOS name?
Not in this release.
Why does it take up to four minutes to log in to iDRAC using Active Directory Single Sign–On or Smart Card Login?
The Active Directory Single Sign–On or Smart Card log in normally takes less than 10 seconds, but it may take up to four
minutes to log in if you have specified the preferred DNS server and the alternate DNS server, and the preferred DNS server
has failed. DNS time-outs are expected when a DNS server is down. iDRAC logs you in using the alternate DNS server.
The Active Directory is configured for a domain present in Windows Server 2008 Active Directory. A child or sub
domain is present for the domain, the user and group is present in the same child domain, and the user is a member
Single Sign-On
SSO login fails on Windows Server 2008 R2 x64. What are the settings required to resolve this?
1. Run the technet.microsoft.com/en-us/library/dd560670(WS.10).aspx for the domain controller and domain policy.
2. Configure the computers to use the DES-CBC-MD5 cipher suite.
These settings may affect compatibility with client computers or services and applications in your environment. The
Configure encryption types allowed for Kerberos policy setting is located at Computer Configuration > Security Settings
> Local Policies > Security Options.
3. Make sure that the domain clients have the updated GPO.
4. At the command line, type gpupdate /force and delete the old key tab with klist purge command.
5. After the GPO is updated, create the new keytab.
6. Upload the keytab to iDRAC.
You can now log in to iDRAC using SSO.
Why does SSO login fail with Active Directory users on Windows 7 and Windows Server 2008 R2?
You must enable the encryption types for Windows 7 and Windows Server 2008 R2. To enable the encryption types:
1. Log in as administrator or as a user with administrative privilege.
2. Go to Start and run gpedit.msc. The Local Group Policy Editor window is displayed.
3. Go to Local Computer Settings > Windows Settings > Security Settings > Local Policies > Security Options.
4. Right-click Network Security: Configure encryption types allowed for kerberos and select Properties.
5. Enable all the options.
6. Click OK. You can now log in to iDRAC using SSO.
Perform the following additional settings for Extended Schema:
1. In the Local Group Policy Editor window, navigate to Local Computer Settings > Windows Settings > Security
Settings > Local Policies > Security Options .
2. Right-click Network Security: Restrict NTLM: Outgoing NTLM traffic to remote server and select Properties.
3. Select Allow all, click OK, and close the Local Group Policy Editor window.
4. Go to Start and run cmd. The command prompt window is displayed.
5. Run the command gpupdate /force. The group policies are updated. Close the command prompt window.
6. Go to Start and run regedit. The Registry Editor window is displayed.
7. Navigate to HKEY_LOCAL_MACHINE > System > CurrentControlSet > Control > LSA .
8. In the right-pane, right-click and select New > DWORD (32-bit) Value.
9. Name the new key as SuppressExtendedProtection.
10. Right-click SuppressExtendedProtection and click Modify.
11. In the Value data field, type 1 and click OK.
12. Close the Registry Editor window. You can now log in to iDRAC using SSO.
If you have enabled SSO for iDRAC and you are using Internet Explorer to log in to iDRAC, SSO fails and you are
prompted to enter your user name and password. How to resolve this?
Make sure that the iDRAC IP address is listed in the Tools > Internet Options > Security > Trusted sites. If it is not listed,
SSO fails and you are prompted to enter your user name and password. Click Cancel and proceed.
Virtual console
What is the required Java version to launch Virtual Console?
You need Java 8 or later to use this feature and to launch iDRAC Virtual Console over an IPv6 network.
Virtual Console session is active even if you have logged out of iDRAC web interface. Is this the expected behavior?
Yes. Close the Virtual Console Viewer window to log out of the corresponding session.
Can a new remote console video session be started when the local video on the server is turned off?
Yes.
Why does it take 15 seconds to turn off the local video on the server after requesting to turn off the local video?
It gives a local user an opportunity to take any action before the video is switched off.
Is there a time delay when turning on the local video?
No, after a local video turn ON request is received by iDRAC, the video is turned on instantly.
Can the local user also turn off or turn on the video?
When the local console is disabled, the local user cannot turn off or turn on the video.
Does switching off the local video also switch off the local keyboard and mouse?
No.
Does turning off the local console turn off the video on the remote console session?
No, turning the local video on or off is independent of the remote console session.
What privileges are required for an iDRAC user to turn on or turn off the local server video?
Any user with iDRAC configuration privileges can turn on or turn off the local console.
How to get the current status of the local server video?
The status is displayed on the Virtual Console page.
To display the status of the object iDRAC.VirtualConsole.AttachState, use the following command:
Or, use the following command from a Telnet, SSH, or a remote session:
The status is also seen on the Virtual Console OSCAR display. When the local console is enabled, a green status is displayed next
to the server name. When disabled, a yellow dot indicates that iDRAC has locked the local console.
Why is the bottom of the system screen not seen from the Virtual Console window?
Make sure that the management station’s monitor resolution is set to 1280 x 1024.
Why is the Virtual Console Viewer window garbled on Linux operating system?
The console viewer on Linux requires a UTF-8 character set. Check your locale and reset the character set if required.
NOTE: The SysRq feature is currently not supported with Internet Explorer and Java.
Why is the "Link Interrupted" message displayed at the bottom of the Virtual Console?
When using the shared network port during a server reboot, iDRAC is disconnected while BIOS is resetting the network card.
This duration is longer on 10 Gb cards, and is also exceptionally long if the connected network switch has Spanning Tree
Protocol (STP) enabled. In this case, it is recommended to enable "portfast" for the switch port connected to the server. In
most cases, the Virtual Console restores itself.
Launching Virtual Console with HTML5 fails when browser is set to use only TLS 1.0.
Ensure that the browser is set to use TLS 1.1 or higher.
Launching Virtual Console with Java plug-in fails after the iDRAC firmware was updated.
Delete the Java cache and then launch the virtual console.
Virtual media
Why does the Virtual Media client connection sometimes drop?
When a network time-out occurs, iDRAC firmware drops the connection, disconnecting the link between the server and the
virtual drive.
If you change the CD in the client system, the new CD may have an autostart feature. In this case, the firmware can time out
and the connection is lost if the client system takes too long to read the CD. If a connection is lost, reconnect from the GUI and
continue the previous operation.
If the Virtual Media configuration settings are changed in the iDRAC web interface or through local RACADM commands, any
connected media is disconnected when the configuration change is applied.
To reconnect to the Virtual Drive, use the Virtual Media Client View window.
Why does a Windows operating system installation through Virtual Media take an extended amount of time?
sys a: x: /s
2. Locate the last entry to that message and note the time.
3. At the Linux prompt, run the following command:
where, hh:mm:ss is the time stamp of the message returned by grep in step 1.
4. In step 3, read the result of the grep command and locate the device name that is given to the Virtual Floppy.
5. Make sure that you are attached and connected to the virtual floppy drive.
6. At the Linux prompt, run the following command:
where, /dev/sdx is the device name found in step 4 and /mnt/floppy is the mount point.
To mount the virtual CD drive, locate the device node that Linux assigns to the virtual CD drive. To mount the virtual CD drive:
1. Open a Linux command prompt and run the following command:
2. Locate the last entry to that message and note the time.
3. At the Linux prompt, run the following command:
vFlash SD card
When is the vFlash SD card locked?
The vFlash SD card is locked when an operation is in-progress. For example, during an initialize operation.
SNMP authentication
Why is the message 'Remote Access: SNMP Authentication Failure' displayed?
As part of discovery, IT Assistant attempts to verify the get and set community names of the device. In IT Assistant, you have
the get community name = public and the set community name = private. By default, the SNMP agent community name for
iDRAC agent is public. When IT Assistant sends out a set request, the iDRAC agent generates the SNMP authentication error
because it accepts requests only from community = public.
Storage devices
Information for all the storage devices connected to the system are not displayed and OpenManage Storage
Management displays more storage devices that iDRAC. Why?
iDRAC displays information for only the Comprehensive Embedded Management (CEM) supported devices.
NOTE: To check if the iDRAC Service Module is installed on Red Hat Enterprise Linux 7, use the systemctl status
dcismeng.service command instead of the init.d command.
How to check the version number of the iDRAC Service Module installed in the system?
To check the version of the iDRAC Service Module in the system, do any of the following:
● Click Start > Control Panel > Programs and Features. The version of the installed iDRAC Service Module is listed in the
Version tab.
● Go to My Computer > Uninstall or change a program.
What is the minimum permission level required to install the iDRAC Service Module?
To install the iDRAC Service Module, you must have administrator level privileges.
On iDRAC Service Module version 2.0 and earlier, while installing the iDRAC Service Module, an error message
is displayed stating this is not a supported server. Consult the User Guide for additional information about the
supported servers. How to resolve this error?
Before installing the iDRAC Service Module, make sure that the server is a 12th generation PowerEdge server or later. Also,
make sure that you have a 64-bit system.
The following message is displayed in the OS log, even when the OS to iDRAC Pass-through over USBNIC is
configured properly. Why?
The iDRAC Service Module is unable to communicate with iDRAC using the OS to iDRAC Pass-through channel
iDRAC Service Module uses the OS to iDRAC pass-through over USB NIC feature to establish the communication with iDRAC.
Sometimes, the communication is not established though the USB NIC interface is configured with the correct IP endpoints.
This may happen when the host operating system routing table has multiple entries for the same destination mask and the USB
NIC destination is not listed as the first one in routing order.
In the example enp0s20u12u3 is the USB NIC interface. The link-local destination mask is repeated and the USB NIC is not
the first one in the order. This results in the connectivity issue between iDRAC Service Module and iDRAC over the OS to
iDRAC Pass-through. To troubleshoot the connectivity issue, make sure that the iDRAC USBNIC IPv4 address (by default it is
169.254.1.1) is reachable from the host operating system.
If not:
● Change the iDRAC USBNIC address on a unique destination mask.
● Delete the entries that are not required from the routing table to make sure that USB NIC is chosen by route when the host
wants to reach the iDRAC USB NIC IPv4 address.
On iDRAC Service Module version 2.0 and earlier, when uninstalling iDRAC Service Module from a VMware ESXi
server, the virtual switch is named as vSwitchiDRACvusb and port group as iDRAC Network on the vSphere client.
How to delete them?
While installing iDRAC Service Module VIB on a VMware ESXi server, iDRAC Service Module creates the vSwtich and Portgroup
to communicate with iDRAC over the OS to iDRAC Pass-through in USB NIC mode. After the uninstallation, the virtual switch
vSwitchiDRACvusb and the port group iDRAC Network are not deleted. To delete it manually, perform one of the following
steps:
● Go to vSphere Client Configuration wizard and delete the entries.
● Go to the Esxcli and type the following commands:
○ To remove port group: esxcfg-vmknic -d -p "iDRAC Network"
○ To remove vSwitch: esxcfg-vswitch -d vSwitchiDRACvusb
NOTE: You can reinstall iDRAC Service Module on the VMware ESXi server as this is not a functional issue for the
server.
Where is the Replicated Lifecycle log available on the operating system?
To view the replicated Lifecycle logs:
Red Hat Enterprise Linux, SUSE Linux, CentOS, and Citrix /var/log/messages
XenServer
VMware ESXi /var/log/syslog.log
What are the Linux-dependent packages or executables available for installation while completing the Linux
installation?
To see the list of Linux-dependent packages, see the Linux Dependencies section in the iDRAC Service Module User's Guide
available at https://www.dell.com/idracmanuals.
The message indicates that you must wait until the iDRAC completes the reset before issuing another command.
When using RACADM commands and subcommands, some errors are not clear.
You may see one or more of the following errors when using the RACADM commands:
● Local RACADM error messages — Problems such as syntax, typographical errors, and incorrect names.
● Remote RACADM error messages — Problems such as incorrect IP Address, incorrect user name, or incorrect password.
During a ping test to iDRAC, if the network mode is switched between Dedicated and Shared modes, there is no ping
response.
Clear the ARP table on your system.
Remote RACADM fails to connect to iDRAC from SUSE Linux Enterprise Server (SLES) 11 SP1.
Make sure that the official openssl and libopenssl versions are installed. Run the following command to install the RPM
packages:
Why are the remote RACADM and web-based services unavailable after a property change?
It may take a while for the remote RACADM services and the Web-based interface to become available after the iDRAC web
server resets.
The iDRAC Web server is reset when:
● The network configuration or network security properties are changed using the iDRAC web user interface.
● The iDRAC.Webserver.HttpsPort property is changed, including when a racadm set -f <config file> changes it.
● The racresetcfg command is used.
● iDRAC is reset.
● A new SSL server certificate is uploaded.
Why is an error message displayed if you try to delete a partition after creating it using local RACADM?
This occurs because the create partition operation is in-progress. However, the partition is deleted after sometime and a
message that the partition is deleted is displayed. If not, wait until the create partition operation is completed and then delete
the partition.
● Using LCD:
On the main menu, highlight the server, press the check button, select the required server, and press the check button.
For more information on CMC RACADM commands, see the Chassis Management Controller RACADM CLI Guide available at
https://www.dell.com/cmcmanuals.
For more information on iDRAC RACADM commands, see the iDRAC RACADM CLI Guide available at https://www.dell.com/
idracmanuals.
NOTE: Shared LOM IP of iDRAC is not accessible in pre-boot state when the switch is configured with LACP.
Inserted the blade server into the chassis and pressed the power switch,
but it did not power on.
● iDRAC requires up to two minutes to initialize before the server can power on.
● Check CMC power budget. The chassis power budget may have exceeded.
How to change the name of the slot for the system in a chassis?
1. Log in to CMC web interface and go to Chassis > Servers > Setup.
2. Enter the new name for the slot in the row for your server and click Apply.
2. Export the SEL or lifecycle log in the XML format to an external location (management station, USB, network share,
and so on). Alternatively, you can enable remote system logging, so that all the logs written to the lifecycle log are also
simultaneously written to the configured remote server(s).
3. If you are using the iDRAC Service Module, export the Lifecycle log to OS log.