idrac9-lifecycle-controller-v31-series_users-guide4_en-us
idrac9-lifecycle-controller-v31-series_users-guide4_en-us
NOTE: A NOTE indicates important information that helps you make better use of your product.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the
problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
Copyright © 2017 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its
subsidiaries. Other trademarks may be trademarks of their respective owners.
2018 - 10
Rev. A01
Contents
1 Overview.................................................................................................................................... 15
Benefits of using iDRAC with Lifecycle Controller...........................................................................................................15
Key features..........................................................................................................................................................................16
New in this release............................................................................................................................................................... 18
How to use this guide.......................................................................................................................................................... 18
Supported web browsers....................................................................................................................................................18
Supported OS and Hypervisors.................................................................................................................................... 18
iDRAC licenses .....................................................................................................................................................................19
Types of licenses............................................................................................................................................................ 19
Methods for acquiring licenses.....................................................................................................................................19
License operations.........................................................................................................................................................20
Licensed features in iDRAC9............................................................................................................................................. 20
Interfaces and protocols to access iDRAC...................................................................................................................... 25
iDRAC port information.......................................................................................................................................................27
Other documents you may need....................................................................................................................................... 28
Contacting Dell.................................................................................................................................................................... 29
Accessing documents from Dell support site.................................................................................................................. 29
2 Logging in to iDRAC....................................................................................................................30
Logging in to iDRAC as local user, Active Directory user, or LDAP user..................................................................... 30
Logging in to iDRAC as a local user using a smart card.................................................................................................. 31
Logging in to iDRAC as an Active Directory user using a smart card..................................................................... 32
Logging in to iDRAC using Single Sign-On ......................................................................................................................32
Logging in to iDRAC SSO using iDRAC web interface............................................................................................. 32
Logging in to iDRAC SSO using CMC web interface................................................................................................32
Accessing iDRAC using remote RACADM....................................................................................................................... 33
Validating CA certificate to use remote RACADM on Linux.................................................................................... 33
Accessing iDRAC using local RACADM............................................................................................................................ 33
Accessing iDRAC using firmware RACADM.................................................................................................................... 33
Viewing system health........................................................................................................................................................ 33
Logging in to iDRAC using public key authentication......................................................................................................34
Multiple iDRAC sessions..................................................................................................................................................... 34
Accessing iDRAC using SMCLP........................................................................................................................................ 34
Secure default password....................................................................................................................................................35
Resetting default iDRAC password locally................................................................................................................. 35
Resetting default iDRAC password remotely.............................................................................................................36
Changing the default login password................................................................................................................................36
Changing the default login password using web interface...................................................................................... 36
Changing the default login password using RACADM..............................................................................................37
Changing the default login password using iDRAC settings utility..........................................................................37
Enabling or disabling default password warning message .............................................................................................37
IP Blocking............................................................................................................................................................................ 37
Enabling or disabling OS to iDRAC Pass-through using web interface........................................................................ 38
Enabling or disabling alerts using RACADM..................................................................................................................... 39
Contents 3
3 Setting up managed system........................................................................................................ 40
Setting up iDRAC IP address............................................................................................................................................. 40
Setting up iDRAC IP using iDRAC settings utility.......................................................................................................41
Setting up iDRAC IP using the CMC web interface..................................................................................................43
Enabling provisioning server.........................................................................................................................................43
Configuring servers and server components using Auto Config.............................................................................44
Using hash passwords for improved security............................................................................................................ 49
Modifying local administrator account settings...............................................................................................................50
Setting up managed system location................................................................................................................................50
Setting up managed system location using web interface....................................................................................... 51
Setting up managed system location using RACADM...............................................................................................51
Setting up managed system location using iDRAC settings utility...........................................................................51
Optimizing system performance and power consumption............................................................................................. 51
Modifying thermal settings using iDRAC web interface............................................................................................51
Modifying thermal settings using RACADM...............................................................................................................53
Modifying thermal settings using iDRAC settings utility...........................................................................................56
Setting up management station........................................................................................................................................ 56
Accessing iDRAC remotely........................................................................................................................................... 57
Configuring supported web browsers...............................................................................................................................57
Configuring Internet Explorer.......................................................................................................................................57
Configuring Mozilla Firefox...........................................................................................................................................58
Configuring web browsers to use virtual console..................................................................................................... 59
Viewing localized versions of web interface............................................................................................................... 61
Updating device firmware.................................................................................................................................................. 62
Updating firmware using iDRAC web interface......................................................................................................... 64
Scheduling automatic firmware updates.................................................................................................................... 64
Updating device firmware using RACADM................................................................................................................ 66
Updating firmware using CMC web interface........................................................................................................... 66
Updating firmware using DUP..................................................................................................................................... 66
Updating firmware using remote RACADM............................................................................................................... 66
Updating firmware using Lifecycle Controller Remote Services............................................................................. 67
Updating CMC firmware from iDRAC.........................................................................................................................67
Viewing and managing staged updates............................................................................................................................ 68
Viewing and managing staged updates using iDRAC web interface...................................................................... 68
Viewing and managing staged updates using RACADM.......................................................................................... 68
Rolling back device firmware............................................................................................................................................. 68
Rollback firmware using iDRAC web interface.......................................................................................................... 69
Rollback firmware using CMC web interface............................................................................................................ 69
Rollback firmware using RACADM..............................................................................................................................69
Rollback firmware using Lifecycle Controller............................................................................................................. 69
Rollback firmware using Lifecycle Controller-Remote Services..............................................................................69
Recovering iDRAC......................................................................................................................................................... 70
Backing up server profile.................................................................................................................................................... 70
Backing up server profile using iDRAC web interface.............................................................................................. 70
Backing up server profile using RACADM................................................................................................................... 71
Scheduling automatic backup server profile............................................................................................................... 71
Importing server profile.......................................................................................................................................................72
Importing server profile using iDRAC web interface................................................................................................. 72
Importing server profile using RACADM.....................................................................................................................73
4 Contents
Restore operation sequence.........................................................................................................................................73
Monitoring iDRAC using other Systems Management tools..........................................................................................73
Support Server Configuration Profile — Import and Export ........................................................................................ 73
Secure Boot Configuration from BIOS Settings or F2....................................................................................................74
BIOS recovery......................................................................................................................................................................75
4 Configuring iDRAC..................................................................................................................... 76
Viewing iDRAC information................................................................................................................................................ 77
Viewing iDRAC information using web interface....................................................................................................... 77
Viewing iDRAC information using RACADM.............................................................................................................. 78
Modifying network settings................................................................................................................................................78
Modifying network settings using web interface...................................................................................................... 78
Modifying network settings using local RACADM.....................................................................................................78
Configuring IP filtering...................................................................................................................................................78
FIPS mode............................................................................................................................................................................ 80
Enabling FIPS Mode...................................................................................................................................................... 80
Disabling FIPS mode......................................................................................................................................................80
Configuring services............................................................................................................................................................80
Configuring services using web interface................................................................................................................... 81
Configuring services using RACADM.......................................................................................................................... 81
Enabling or disabling HTTPS redirection..................................................................................................................... 81
Configuring TLS...................................................................................................................................................................82
Configuring TLS using web interface..........................................................................................................................82
Configuring TLS using RACADM.................................................................................................................................82
Using VNC client to manage remote server.................................................................................................................... 82
Configuring VNC server using iDRAC web interface................................................................................................83
Configuring VNC server using RACADM....................................................................................................................83
Setting up VNC viewer with SSL encryption.............................................................................................................83
Setting up VNC viewer without SSL encryption....................................................................................................... 83
Configuring front panel display.......................................................................................................................................... 83
Configuring LCD setting............................................................................................................................................... 84
Configuring system ID LED setting............................................................................................................................. 84
Configuring time zone and NTP........................................................................................................................................ 85
Configuring time zone and NTP using iDRAC web interface.................................................................................. 85
Configuring time zone and NTP using RACADM...................................................................................................... 85
Setting first boot device.....................................................................................................................................................85
Setting first boot device using web interface............................................................................................................86
Setting first boot device using RACADM...................................................................................................................86
Setting first boot device using virtual console...........................................................................................................86
Enabling last crash screen............................................................................................................................................ 86
Enabling or disabling OS to iDRAC Pass-through........................................................................................................... 87
Supported cards for OS to iDRAC Pass-through .....................................................................................................87
Supported operating systems for USB NIC............................................................................................................... 88
Enabling or disabling OS to iDRAC Pass-through using web interface.................................................................. 88
Enabling or disabling OS to iDRAC Pass-through using RACADM......................................................................... 89
Enabling or disabling OS to iDRAC Pass-through using iDRAC settings utility..................................................... 89
Obtaining certificates..........................................................................................................................................................90
SSL server certificates................................................................................................................................................. 90
Generating a new certificate signing request............................................................................................................. 91
Uploading server certificate.......................................................................................................................................... 91
Contents 5
Viewing server certificate.............................................................................................................................................92
Uploading custom signing certificate.......................................................................................................................... 92
Downloading custom SSL certificate signing certificate .........................................................................................93
Deleting custom SSL certificate signing certificate.................................................................................................. 93
Configuring multiple iDRACs using RACADM..................................................................................................................93
Disabling access to modify iDRAC configuration settings on host system..................................................................94
6 Contents
Supported SSH cryptography schemes.......................................................................................................................... 116
Using public key authentication for SSH................................................................................................................... 116
Contents 7
Setting event alerts using web interface.................................................................................................................. 147
Setting event alerts using RACADM..........................................................................................................................147
Setting alert recurrence event......................................................................................................................................... 147
Setting alert recurrence events using RACADM......................................................................................................147
Setting alert recurrence events using iDRAC web interface..................................................................................147
Setting event actions.........................................................................................................................................................147
Setting event actions using web interface................................................................................................................147
Setting event actions using RACADM...................................................................................................................... 148
Configuring email alert, SNMP trap, or IPMI trap settings...........................................................................................148
Configuring IP alert destinations................................................................................................................................ 148
Configuring email alert settings..................................................................................................................................150
Configuring WS Eventing.................................................................................................................................................. 151
Configuring Redfish Eventing........................................................................................................................................... 151
Monitoring chassis events................................................................................................................................................. 151
Monitoring chassis events using the iDRAC web interface....................................................................................152
Monitoring chassis events using RACADM.............................................................................................................. 152
Alerts message IDs.............................................................................................................................................................152
8 Contents
13 Monitoring and managing power............................................................................................... 166
Monitoring power...............................................................................................................................................................166
Monitoring performance index of CPU, memory, and input output modules using web interface................... 166
Monitoring performance index for of CPU, memory, and input output modules using RACADM.................... 167
Setting warning threshold for power consumption....................................................................................................... 167
Setting warning threshold for power consumption using web interface.............................................................. 167
Executing power control operations................................................................................................................................167
Executing power control operations using web interface.......................................................................................167
Executing power control operations using RACADM..............................................................................................168
Power capping....................................................................................................................................................................168
Power capping in Blade servers................................................................................................................................. 168
Viewing and configuring power cap policy................................................................................................................168
Configuring power supply options................................................................................................................................... 169
Configuring power supply options using web interface.......................................................................................... 169
Configuring power supply options using RACADM................................................................................................. 169
Configuring power supply options using iDRAC settings utility..............................................................................170
Enabling or disabling power button..................................................................................................................................170
Multi-Vector Cooling......................................................................................................................................................... 170
Contents 9
Monitoring backplane using iDRAC settings utility.................................................................................................. 194
Viewing storage device topology..................................................................................................................................... 195
Managing physical disks....................................................................................................................................................195
Assigning or unassigning physical disk as global hot spare..................................................................................... 195
Converting a physical disk to RAID or non-RAID mode.......................................................................................... 196
Erasing physical disks...................................................................................................................................................197
Erasing SED device data............................................................................................................................................. 197
Rebuild Physical Disk................................................................................................................................................... 198
Managing virtual disks....................................................................................................................................................... 199
Creating virtual disks................................................................................................................................................... 199
Editing virtual disk cache policies.............................................................................................................................. 200
Deleting virtual disks.................................................................................................................................................... 201
Checking virtual disk consistency.............................................................................................................................. 201
Initializing virtual disks.................................................................................................................................................202
Encrypting virtual disks...............................................................................................................................................202
Assigning or unassigning dedicated hot spares....................................................................................................... 202
Managing virtual disks using web interface............................................................................................................. 204
Managing virtual disks using RACADM.................................................................................................................... 205
Managing controllers........................................................................................................................................................ 206
Configuring controller properties.............................................................................................................................. 206
Importing or auto importing foreign configuration.................................................................................................. 208
Clearing foreign configuration................................................................................................................................... 209
Resetting controller configuration............................................................................................................................. 210
Switching the controller mode................................................................................................................................... 210
12 Gbps SAS HBA adapter operations.......................................................................................................................212
Monitoring predictive failure analysis on drives........................................................................................................212
Controller operations in non-RAID mode or HBA mode..........................................................................................212
Running RAID configuration jobs on multiple storage controllers.......................................................................... 213
Manage Preserved cache........................................................................................................................................... 213
Managing PCIe SSDs.........................................................................................................................................................213
Inventorying and monitoring PCIe SSDs................................................................................................................... 214
Preparing to remove PCIe SSD.................................................................................................................................. 214
Erasing PCIe SSD device data....................................................................................................................................215
Managing enclosures or backplanes................................................................................................................................ 217
Configuring backplane mode.......................................................................................................................................217
Viewing universal slots.................................................................................................................................................219
Setting SGPIO mode...................................................................................................................................................220
Set Enclosure Asset Tag............................................................................................................................................ 220
Set Enclosure Asset Name.........................................................................................................................................220
Choosing operation mode to apply settings................................................................................................................... 221
Choosing operation mode using web interface........................................................................................................ 221
Choosing operation mode using RACADM............................................................................................................... 221
Viewing and applying pending operations....................................................................................................................... 221
Viewing, applying, or deleting pending operations using web interface............................................................... 222
Viewing and applying pending operations using RACADM.................................................................................... 222
Storage devices — apply operation scenarios.............................................................................................................. 222
Blinking or unblinking component LEDs..........................................................................................................................223
Blinking or unblinking component LEDs using web interface................................................................................ 224
Blinking or unblinking component LEDs using RACADM........................................................................................224
10 Contents
16 BIOS Settings ........................................................................................................................ 225
Contents 11
Launching virtual media using virtual console..........................................................................................................253
Launching virtual media without using virtual console........................................................................................... 253
Adding virtual media images.......................................................................................................................................254
Viewing virtual device details..................................................................................................................................... 254
Resetting USB............................................................................................................................................................. 254
Mapping virtual drive.................................................................................................................................................. 254
Unmapping virtual drive..............................................................................................................................................255
Setting boot order through BIOS....................................................................................................................................256
Enabling boot once for virtual media.............................................................................................................................. 256
12 Contents
Deploying operating system using remote file share.................................................................................................... 275
Managing remote file share........................................................................................................................................275
Configuring remote file share using web interface................................................................................................. 276
Configuring remote file share using RACADM.........................................................................................................277
Deploying operating system using virtual media............................................................................................................277
Installing operating system from multiple disks........................................................................................................277
Deploying embedded operating system on SD card..................................................................................................... 278
Enabling SD module and redundancy in BIOS..........................................................................................................278
Contents 13
Active Directory................................................................................................................................................................. 291
Single Sign-On................................................................................................................................................................... 293
Smart card login................................................................................................................................................................ 293
Virtual console................................................................................................................................................................... 294
Virtual media...................................................................................................................................................................... 296
vFlash SD card...................................................................................................................................................................298
SNMP authentication....................................................................................................................................................... 298
Storage devices.................................................................................................................................................................298
iDRAC Service Module..................................................................................................................................................... 299
RACADM............................................................................................................................................................................300
Permanently setting the default password to calvin.....................................................................................................301
Miscellaneous..................................................................................................................................................................... 301
14 Contents
1
Overview
The Integrated Dell Remote Access Controller (iDRAC) is designed to make you more productive as a system administrator and improve
the overall availability of Dell EMC servers. iDRAC alerts you to system issues, helps you to perform remote management, and reduces the
need for physical access to the system.
iDRAC with Lifecycle Controller technology is part of a larger data center solution that increases availability of business critical applications
and workloads. The technology allows you to deploy, monitor, manage, configure, update, and troubleshoot Dell EMC systems from any
location without using any agents or an operating system.
Several products work with the iDRAC and Lifecycle Controller to simplify and streamline IT operations. Following are some of the tools:
• Dell management plug-in for VMware vCenter
• Dell Repository Manager
• Dell management packs for Microsoft System Center Operations Manager (SCOM) and Microsoft System Center Configuration
Manager (SCCM)
• BMC Bladelogic
• Dell OpenManage Essentials/OpenManage Enterprise
• Dell OpenManage Power Center
iDRAC is available in the following variants:
• iDRAC Basic — Available by default for 200-500 series servers
• iDRAC Express — Available by default on all 600 and higher series of rack or tower servers, and all blade servers
• iDRAC Enterprise — Available on all server models
Topics:
• Benefits of using iDRAC with Lifecycle Controller
• Key features
• New in this release
• How to use this guide
• Supported web browsers
• iDRAC licenses
• Licensed features in iDRAC9
• Interfaces and protocols to access iDRAC
• iDRAC port information
• Other documents you may need
• Contacting Dell
• Accessing documents from Dell support site
Overview 15
Key features
The key features of iDRAC include:
NOTE: Some of the features are available only with iDRAC Enterprise license. For information on the features available
for a license, see iDRAC licenses .
Inventory and Monitoring
• View managed server health.
• Inventory and monitor network adapters and storage subsystem (PERC and direct attached storage) without any operating system
agents.
• View and export system inventory.
• View sensor information such as temperature, voltage, and intrusion.
• Monitor CPU state, processor automatic throttling, and predictive failure.
• View memory information.
• Monitor and control power usage.
• Support for SNMPv3 gets and alerts.
• For blade servers: launch Management Module web interface, view OpenManage Enterprise (OME) Modular information, and
WWN/MAC addresses.
NOTE: CMC provides access to iDRAC through the M1000E Chassis LCD panel and local console connections. For
more information, see Chassis Management Controller User's Guide available at www.dell.com/cmcmanuals.
• View network interfaces available on host operating systems.
• iDRAC9 provides improved monitoring and management functionality with Quick Sync 2. You need OpenManage Mobile app
configured in your Android or iOS mobile device.
Deployment
• Manage vFlash SD card partitions.
• Configure front panel display settings.
• Manage iDRAC network settings.
• Configure and use virtual console and virtual media.
• Deploy operating systems using remote file share, virtual media, and VMCLI.
• Enable auto-discovery.
• Perform server configuration using the export or import XML or JSON profile feature through RACADM, WSMan and Redfish. For
more information, see Lifecycle Controller Remote Services Quick Start Guide available at www.dell.com/idracmanuals.
• Configure persistence policy for virtual addresses, initiator, and storage targets.
• Remotely configure storage devices attached to the system at run-time.
• Perform the following operations for storage devices:
• Physical disks: Assign or unassign physical disk as a global hot spare.
• Virtual disks:
• Create virtual disks.
• Edit virtual disks cache policies.
• Check virtual disk consistency.
• Initialize virtual disks.
• Encrypt virtual disks.
• Assign or unassign dedicated hot spare.
• Delete virtual disks.
• Controllers:
• Configure controller properties.
• Import or auto-import foreign configuration.
• Clear foreign configuration.
• Reset controller configuration.
• Create or change security keys.
• PCIe SSD devices:
• Inventory and remotely monitor the health of PCIe SSD devices in the server.
• Prepare the PCIe SSD to be removed.
• Securely erase the data.
16 Overview
• Set the backplane mode (unified or split mode).
• Blink or unblink component LEDs.
• Apply the device settings immediately, at next system reboot, at a scheduled time, or as a pending operation to be applied as a
batch as part of the single job.
Update
• Manage iDRAC licenses.
• Update BIOS and device firmware for devices supported by Lifecycle Controller.
• Update or rollback iDRAC firmware and Lifecycle Controller firmware using a single firmware image.
• Manage staged updates.
• Back up and restore server profile.
• Access iDRAC interface over direct USB connection.
• Configure iDRAC using Server Configuration Profiles on USB device.
Maintenance and Troubleshooting
• Perform power-related operations and monitor power consumption.
• Optimize system performance and power consumption by modifying the thermal settings.
• No dependency on OpenManage Server Administrator for generation of alerts.
• Log event data: Lifecycle and RAC logs.
• Set email alerts, IPMI alerts, remote system logs, WS Eventing logs, Redfish event, and SNMP traps (v1, v2c, and v3) for events and
improved email alert notification.
• Capture last system crash image.
• View boot and crash capture videos.
• Out-of-band monitor and alert the performance index of CPU, memory, and I/O modules.
• Configure warning threshold for inlet temperature and power consumption.
• Use iDRAC Service Module to:
• View operating system information.
• Replicate Lifecycle Controller logs to operating system logs.
• Automatic system recovery options.
• Enable or disable status of Full Power Cycle for all System components except the PSU.
• Remotely hard-reset iDRAC
• Enable in-band iDRAC SNMP alerts
• Access iDRAC using host OS (experimental feature)
• Populate Windows Management Instrumentation (WMI) information.
• Integrate with SupportAssist collection. This is applicable only if iDRAC Service Module Version 2.0 or later is installed.
• Prepare to remove NVMe PCIe SSD.
• Generate SupportAssist collection in the following ways:
• Automatic — Using iDRAC Service Module that automatically invokes the OS Collector tool.
Dell Best Practices regarding iDRAC
• iDRACs are intended to be on a separate management network; they are not designed nor intended to be placed on or connected to
the internet. Doing so could expose the connected system to security and other risks for which Dell is not responsible.
• Along with locating iDRACs on a separate management subnet, users should isolate the management subnet/vLAN with technologies
such as firewalls, and limit access to the subnet/vLAN to authorized server administrators.
Secure Connectivity
Securing access to critical network resources is a priority. iDRAC implements a range of security features that includes:
• Custom signing certificate for Secure Socket Layer (SSL) certificate.
• Signed firmware updates.
• User authentication through Microsoft Active Directory, generic Lightweight Directory Access Protocol (LDAP) Directory Service, or
locally administered user IDs and passwords.
• Two-factor authentication using the Smart–Card logon feature. The two-factor authentication is based on the physical smart card and
the smart card PIN.
• Single Sign-On and Public Key Authentication.
• Role-based authorization, to configure specific privileges for each user.
• SNMPv3 authentication for user accounts stored locally in the iDRAC. It is recommended to use this, but it is disabled by default.
• User ID and password configuration.
• Default login password modification.
Overview 17
• Set user passwords and BIOS passwords using one-way hash format for improved security.
• FIPS 140-2 Level 1 capability.
• Support for TLS 1.2, 1.1, and 1.0. To enhance security, default setting is TLS 1.1 and higher.
• SMCLP and web interfaces that support 128 bit and 40-bit encryption (for countries where 128 bit is not acceptable), using the TLS
1.2 standard.
NOTE: To ensure a secure connection, Dell recommends using TLS 1.1 and higher.
• Session time-out configuration (in seconds).
• Configurable IP ports (for HTTP, HTTPS, SSH, Telnet, Virtual Console, and Virtual Media).
NOTE: Telnet does not support SSL encryption and is disabled by default.
• Secure Shell (SSH) that uses an encrypted transport layer for higher security.
• Login failure limits per IP address, with login blocking from that IP address when the limit is exceeded.
• Limited IP address range for clients connecting to iDRAC.
• Dedicated Gigabit Ethernet adapter available on rack and tower servers (additional hardware may be required).
18 Overview
• Citrix XenServer
• RedHat Enterprise Linux
• SuSe Linux Enterprise Server
• Canonical Ubuntu
NOTE: For the list of supported versions, see the iDRAC Release Notes available at www.dell.com/idracmanuals.
iDRAC licenses
iDRAC features are available based on the type of the license. Depending on the system model, iDRAC Basic or iDRAC Express license is
installed by default. iDRAC Enterprise license is available as an upgrade and can be purchased anytime. Only licensed features are available
in the interfaces that enable you to configure or use iDRAC. For more information, see Licensed features in iDRAC9.
Types of licenses
iDRAC Basic or iDRAC Express are the standard licenses available by default on your system. iDRAC Enterprise license includes all the
licensed features and can be purchased at any time. The types of Enterprise license offered are:
• 30-day evaluation—Evaluation licenses are duration-based and the timer runs when power is applied to the system. This license
cannot be extended.
• Perpetual—The license is bound to the Service Tag and is permanent.
Following table lists the default license available in the 14th generation servers:
NOTE: The default license available with PowerEdge C64XX systems is Basic Plus. The Basic Plus license was custom
made for C64XX systems.
NOTE: The default license available with PowerEdge M6XX systems is Express for Blades.
NOTE: To manage licenses or to purchase new licenses, go to the License Self-Service Portal
Overview 19
License operations
Before you perform the license management tasks, ensure that you acquire the licenses. For more information, see the Methods for
acquiring licenses.
NOTE: If you have purchased a system with all the licenses pre-installed, then license management is not required.
You can perform the following licensing operations using iDRAC, RACADM, WSMan, Redfish and Lifecycle Controller-Remote Services for
one-to-one license management, and Dell License Manager for one-to-many license management:
• View — View the current license information.
• Import — After acquiring the license, store the license in a local storage and import it into iDRAC using one of the supported
interfaces. The license is imported if it passes the validation checks.
NOTE: Although you can export the factory-installed license, you cannot import it. To import the license, download
the equivalent license from the Digital Locker or retrieve it from the email you received when you purchased the
license.
NOTE: After importing the license, you need to re-login to the iDRAC. This is applicable only for iDRAC web
interface.
• Export — Exports the installed license. For more information, see the iDRAC Online Help.
• Delete — Deletes the license. For more information, see the iDRAC Online Help.
• Learn More — Learn more about an installed license, or the licenses available for a component installed in the server.
NOTE: For the Learn More option to display the correct page, ensure that *.dell.com is added to the list of Trusted
Sites in the Security Settings. For more information, see the Internet Explorer help documentation.
For one-to-many license deployment, you can use Dell License Manager. For more information, see Dell License Manager User's Guide
available at www.dell.com/esmmanuals.
20 Overview
Table 3. Licensed features in iDRAC9
Overview 21
Feature iDRAC9 iDRAC9 iDRAC9 Express for iDRAC9 Enterprise
Basic Express Blades
FIPS 140-2 Yes Yes Yes Yes
Secure UEFI boot - certificate Yes Yes Yes Yes
management
Lock down mode No No No Yes
Customizable Security Policy Yes Yes Yes Yes
Banner - login page
iDRAC Quick Sync 2 - optional Yes Yes Yes Yes
auth for read operations
iDRAC Quick Sync 2 - add mobile Yes Yes Yes Yes
device number to LCL
Remote Presence
Power control Yes Yes Yes Yes
Boot control Yes Yes Yes Yes
Serial-over-LAN Yes Yes Yes Yes
Virtual Media No No Yes Yes
Virtual Folders No No No Yes
Remote File Share No No No Yes
HTML5 access to Virtual Console No No Yes Yes
Virtual Console No No Yes Yes
VNC connection to OS No No No Yes
Quality/bandwidth control No No No Yes
Virtual Console collaboration (up No No No Yes
to six simultaneous users)
Virtual Console chat No No No Yes 2,3
Virtual Flash partitions No No No Yes
Group Manager No No No Yes
HTTP / HTTPS support along Yes Yes Yes Yes
with NFS/CIFS
22 Overview
Feature iDRAC9 iDRAC9 iDRAC9 Express for iDRAC9 Enterprise
Basic Express Blades
Health Monitoring
Update
Auto-update No No No Yes
Overview 23
Feature iDRAC9 iDRAC9 iDRAC9 Express for iDRAC9 Enterprise
Basic Express Blades
NOTE: After performing part replacement on RAID hardware, once the process is complete for replacing firmware and
configuration, Lifecycle Logs reports double part replacement entries which is expected behavior.
24 Overview
Feature iDRAC9 iDRAC9 iDRAC9 Express for iDRAC9 Enterprise
Basic Express Blades
NOTE: Using more than one interface at the same time may generate unexpected results.
iDRAC Settings Utility Use the iDRAC Settings utility to perform pre-OS operations. It has a subset of the features that are
(F2) available in iDRAC web interface along with other features.
To access iDRAC Settings utility, press <F2> during boot and then click iDRAC Settings on the System
Setup Main Menu page.
Lifecycle Controller (F10) Use Lifecycle Controller to perform iDRAC configurations. To access Lifecycle Controller, press <F10> during
boot and go to System Setup > Advanced Hardware Configuration > iDRAC Settings. For more
information, see Lifecycle Controller User’s Guide available at dell.com/idracmanuals.
iDRAC Web Interface Use the iDRAC web interface to manage iDRAC and monitor the managed system. The browser connects to
the web server through the HTTPS port. Data streams are encrypted using 128-bit SSL to provide privacy
and integrity. Any connection to the HTTP port is redirected to HTTPS. Administrators can upload their own
SSL certificate through an SSL CSR generation process to secure the web server. The default HTTP and
HTTPS ports can be changed. The user access is based on user privileges.
CMC Web Interface In addition to monitoring and managing the chassis, use the CMC web interface to:
• View the status of a managed system
• Update iDRAC firmware
Overview 25
Interface or Protocol Description
Server LCD Panel/ Use the LCD on the server front panel to:
Chassis LCD Panel
• View alerts, iDRAC IP or MAC address, user programmable strings.
• Set DHCP
• Configure iDRAC static IP settings.
For blade servers, the LCD is on the chassis front panel and is shared between all the blades.
To reset iDRAC without rebooting the server, press and hold the System Identification button for 16
seconds.
NOTE: LCD panel is only available with rack or tower systems that support front bezel. For
blade servers, the LCD is on the chassis front panel and is shared between all the blades.
RACADM Use this command-line utility to perform iDRAC and server management. You can use RACADM locally and
remotely.
• Local RACADM command-line interface runs on the managed systems that have Server Administrator
installed. Local RACADM communicates with iDRAC through its in-band IPMI host interface. Since it is
installed on the local managed system, users are required to log in to the operating system to run this
utility. A user must have a full administrator privilege or be a root user to use this utility.
• Remote RACADM is a client utility that runs on a management station. It uses the out-of-band network
interface to run RACADM commands on the managed system and uses the HTTPs channel. The –r
option runs the RACADM command over a network.
• Firmware RACADM is accessible by logging in to iDRAC using SSH or telnet. You can run the firmware
RACADM commands without specifying the iDRAC IP, user name, or password.
• You do not have to specify the iDRAC IP, user name, or password to run the firmware RACADM
commands. After you enter the RACADM prompt, you can directly run the commands without the
racadm prefix.
iDRAC RESTful API and The Redfish Scalable Platforms Management API is a standard defined by the Distributed Management Task
Redfish Force (DMTF). Redfish is a next-generation systems management interface standard, which enables
scalable, secure, and open server management. It is a new interface that uses RESTful interface semantics
to access data that is defined in model format to perform out-of-band systems management. It is suitable for
a wide range of servers ranging from stand-alone servers to rack mount and bladed environments and for
large scale cloud environments.
Redfish provides the following benefits over existing server management methods:
• Increased simplicity and usability
• High data security
• Programmable interface that can be easily scripted
• Follows widely-used standards
For more information, see the iDRAC Redfish API Guide available at www.dell.com/idracmanuals.
WSMan The LC-Remote Service is based on the WSMan protocol to do one-to-many systems management tasks.
You must use WSMan client such as WinRM client (Windows) or the OpenWSMan client (Linux) to use the
LC-Remote Services functionality. You can also use Power Shell and Python to script to the WSMan
interface.
Web Services for Management (WSMan) are a Simple Object Access Protocol (SOAP)–based protocol used
for systems management. iDRAC uses WSMan to convey Distributed Management Task Force (DMTF)
Common Information Model (CIM)–based management information. The CIM information defines the
semantics and information types that can be modified in a managed system. The data available through
WSMan is provided by iDRAC instrumentation interface mapped to the DMTF profiles and extension profiles.
For more information, see the following:
26 Overview
Interface or Protocol Description
SSH Use SSH to run RACADM and SMCLP commands. It provides the same capabilities as the Telnet console
using an encrypted transport layer for higher security. The SSH service is enabled by default on iDRAC. The
SSH service can be disabled in iDRAC. iDRAC only supports SSH version 2 with the RSA host key algorithm.
A unique 1024-bit RSA host key is generated when you power-up iDRAC for the first time.
Telnet Use Telnet to access iDRAC where you can run RACADM and SMCLP commands. For details about
RACADM, see iDRAC RACADM CLI Guide available at www.dell.com/idracmanuals. For details about
SMCLP, see Using SMCLP.
NOTE: Telnet is not a secure protocol and is disabled by default. Telnet transmits all data,
including passwords in plain text. When transmitting sensitive information, use the SSH
interface.
VMCLI Use the Virtual Media Command Line Interface (VMCLI) to access a remote media through the management
station and deploy operating systems on multiple managed systems.
IPMITool Use the IPMITool to access the remote system’s basic management features through iDRAC. The interface
includes local IPMI, IPMI over LAN, IPMI over Serial, and Serial over LAN. For more information on IPMITool,
see the Dell OpenManage Baseboard Management Controller Utilities User’s Guide at dell.com/
idracmanuals.
NOTE: IPMI version 1.5 is not supported.
SMCLP Use Server Management Workgroup Server Management-Command Line Protocol (SMCLP) to perform
systems management tasks. This is available through SSH or Telnet. For more information about SMCLP,
see Using SMCLP.
NTLM iDRAC allows NTLM to provide authentication, integrity, and confidentiality to the users. NT LAN Manager
(NTLM) is a suite of Microsoft security protocols and it works in a Windows network.
SMB iDRAC9 supports the Server Message Block (SMB) Protocol. This is a network file sharing protocol and the
default minimum SMB version supported is 2.0, SMBv1 is no longer supported.
NFS iDRAC9 supports Network File System (NFS). This is a distributed filesystem protocol that enables users
to mount remote directories on the servers.
Overview 27
Port Configurable Maximum Encryption Level
Type Function
number port
The following table lists the ports that iDRAC uses as a client:
28 Overview
• The safety instructions that came with your system provide important safety and regulatory information. For additional regulatory
information, see the Regulatory Compliance home page at dell.com/regulatory_compliance. Warranty information may be included
within this document or as a separate document.
• The Rack Installation Instructions included with your rack solution describe how to install your system into a rack.
• The Getting Started Guide provides an overview of system features, setting up your system, and technical specifications.
• The Installation and Service Manual provides information about system features and describes how to troubleshoot the system and
install or replace system components.
Contacting Dell
NOTE: If you do not have an active Internet connection, you can find contact information on your purchase invoice,
packing slip, bill, or Dell product catalog.
Dell provides several online and telephone-based support and service options. Availability varies by country and product, and some services
may not be available in your area. To contact Dell for sales, technical support, or customer service issues, visit www.dell.com/contactdell.
Overview 29
2
Logging in to iDRAC
You can log in to iDRAC as an iDRAC user, a Microsoft Active Directory user, or a Lightweight Directory Access Protocol (LDAP) user.
You can also log in using Single Sign-On or Smart Card.
To improve security, each system is shipped with a unique password for iDRAC, which is available on the system information tag. This
unique password improves security of iDRAC and your server. The default user name is root.
While ordering the system, you can choose to retain the legacy password—calvin—as the default password. If you choose to retain the
legacy password, the password is not available on the system information tag.
In this version, DHCP is enabled by default and iDRAC IP address is assigned dynamically.
NOTE:
NOTE: For information about recommended characters for user names and passwords, see Recommended characters in
user names and passwords.
To change the default password, see Changing the default login password.
30 Logging in to iDRAC
NOTE: In addition to Active Directory, openLDAP, openDS, Novell eDir, and Fedora-based directory services are
supported.
NOTE: LDAP authentication with OpenDS is supported. The DH key must be larger than 768 bits.
Logging in to iDRAC 31
Logging in to iDRAC as an Active Directory user using a
smart card
Before you log in as an Active Directory user using smart card, ensure that you:
• Upload a Trusted Certificate Authority (CA) certificate (CA-signed Active Directory certificate) to iDRAC.
• Configure the DNS server.
• Enable Active Directory login.
• Enable smart card login.
To log in to iDRAC as an Active Directory user using smart card:
1. Log in to iDRAC using the link https://[IP address].
The iDRAC Login page is displayed prompting you to insert the smart card.
NOTE: If the default HTTPS port number (port 443) is changed, type: https://[IP address]:[port number]
where, [IP address] is the iDRAC IP address and [port number] is the HTTPS port number.
2. Insert the smart card and click Login.
A prompt is displayed for the smart card's PIN.
3. Enter the PIN and click Submit.
You are logged in to iDRAC with your Active Directory credentials.
NOTE:
If the smart card user is present in Active Directory, an Active Directory password is not required.
iDRAC logs you in with appropriate Microsoft Active Directory privileges, using your credentials that were cached in the operating
system when you logged in using a valid Active Directory account.
32 Logging in to iDRAC
Accessing iDRAC using remote RACADM
You can use remote RACADM to access iDRAC using RACADM utility.
For more information, see the iDRAC RACADM CLI Guide available at www.dell.com/idracmanuals.
If the management station has not stored the iDRAC’s SSL certificate in its default certificate storage, a warning message is displayed
when you run the RACADM command. However, the command is executed successfully.
NOTE: The iDRAC certificate is the certificate iDRAC sends to the RACADM client to establish the secure session. This
certificate is either issued by a CA or self-signed. In either case, if the management station does not recognize the CA
or signing authority, a warning is displayed.
2. Find the location of the default CA certificate bundle on the management station. For example, for RHEL5 64 bit, it is /etc/pki/tls/
cert.pem.
3. Append the PEM formatted CA certificate to the management station CA certificate.
For example, use the cat command: cat testcacert.pem >> cert.pem
4. Generate and upload the server certificate to iDRAC.
Logging in to iDRAC 33
Host System Lifecycle Controller (LC) Real Time Status Overall Status
ssh username@<domain>
or
ssh username@<IP_address>
Remote RACADM 4
34 Logging in to iDRAC
Secure default password
All supported systems are shipped with a unique default password for iDRAC, unless you choose to set calvin as the password while
ordering the system. The unique password helps improve the security of iDRAC and your server. To further enhance security, it is
recommended that you change the default password.
The unique password for your system is available on the system information tag. To locate the tag, see the documentation for your server
at www.dell.com/support.
NOTE: For PowerEdge C6420, M640, and FC640, the default password is calvin.
NOTE: Resetting iDRAC to the factory default settings reverts the default password to the one that the server was
shipped with.
If you have forgotten the password and do not have access to the system information tag, there are a few methods to reset the
password locally or remotely.
WARNING: Resetting iDRAC to default all, resets the iDRAC to the factory defaults.
Logging in to iDRAC 35
Using Server Configuration Profile file
Create a Server Configuration Profile (SCP) file with a new password for the default account, place it on a memory key, and use the
server management USB port on the server to upload the SCP file. For more information on creating the file, see Using USB port for
server management.
36 Logging in to iDRAC
NOTE: Continue is enabled only if the passwords entered in the New Password and Confirm Password fields match.
For information about the other fields, see the iDRAC Online Help.
where, <index> is a value from 1 to 16 (indicates the user account) and <password> is the new user defined password.
NOTE: The index for the default account is 2.
For more information, see the iDRAC RACADM CLI Guide available at www.dell.com/idracmanuals.
NOTE: For information on recommended characters for user names and passwords, see Recommended characters in
user names and passwords.
IP Blocking
You can use IP blocking to dynamically determine when excessive login failures occur from an IP address and block or prevent the IP
address from logging into the iDRAC9 for a preselected time span. IP blocking includes:
• The number of allowable login failures.
• The timeframe in seconds when these failures must occur.
• The amount of time, in seconds, when the IP address is prevented from establishing a session after the total allowable number of
failures is exceeded.
As consecutive login failures accumulate from a specific IP address, they are tracked by an internal counter. When the user logs in
successfully, the failure history is cleared and the internal counter is reset.
NOTE: When consecutive login attempts are refused from the client IP address, some SSH clients may display the
following message:
Logging in to iDRAC 37
Table 9. Login Retry Restriction Properties
Property Definition
Enables the IP blocking feature. When consecutive failures
iDRAC.IPBlocking.BlockEnable
iDRAC.IPBlocking.FailCount
iDRAC.IPBlocking.FailWindow
iDRAC.IPBlocking.PenaltyTime
Sets the number of login failures from an IP address before the login
iDRAC.IPBlocking.FailCount attempts are rejected.
The time, in seconds during which the failed attempts are counted.
iDRAC.IPBlocking.FailWindow When the failures occur beyond this time period, the counter gets
reset.
Defines the timespan in seconds when all login attempts from an IP
iDRAC.IPBlocking.PenaltyTime address with excessive failures are rejected.
NOTE: If the VLAN is enabled on the iDRAC, the LOM-Passthrough will only function in shared LOM mode with VLAN
tagging configured on the host.
5. If you select USB NIC as the pass-through configuration, enter the IP address of the USB NIC.
The default value is 169.254.1.1. It is recommended to use the default IP address. However, if this IP address conflicts with an IP
address of other interfaces of the host system or the local network, you must change it.
Do not enter 169.254.0.3 and 169.254.0.4 IPs. These IPs are reserved for the USB NIC port on the front panel when a A/A cable is
used.
6. Click Apply.
7. Click Test Network Configuration to check if the IP is accessible and the link is established between the iDRAC and the host
operating system.
38 Logging in to iDRAC
Enabling or disabling alerts using RACADM
Use the following command:
n=0 — Disabled
n=1 — Enabled
Logging in to iDRAC 39
3
Setting up managed system
If you need to run local RACADM or enable Last Crash Screen capture, install the following from the Dell Systems Management Tools and
Documentation DVD:
• Local RACADM
• Server Administrator
For more information about Server Administrator, see OpenManage Server Administrator User's Guide available at www.dell.com/
openmanagemanuals.
Topics:
• Setting up iDRAC IP address
• Modifying local administrator account settings
• Setting up managed system location
• Optimizing system performance and power consumption
• Setting up management station
• Configuring supported web browsers
• Updating device firmware
• Viewing and managing staged updates
• Rolling back device firmware
• Backing up server profile
• Importing server profile
• Monitoring iDRAC using other Systems Management tools
• Support Server Configuration Profile — Import and Export
• Secure Boot Configuration from BIOS Settings or F2
• BIOS recovery
NOTE: Shared LOM is not supported on the Intel 2P X520–k bNDC 10 G if they are used in a full-height server with
two NDCs because they do not support hardware arbitration.
3. From the Failover Network drop-down menu, select one of the remaining LOMs. If a network fails, the traffic is routed through the
failover network.
For example, to route the iDRAC network traffic through LOM2 when LOM1 is down, select LOM1 for NIC Selection and LOM2 for
Failover Network.
NOTE: If you have selected Dedicated in NIC Selection drop-down menu, the option is grayed-out.
4. Under Auto Negotiation, select On if iDRAC must automatically set the duplex mode and network speed.
This option is available only for dedicated mode. If enabled, iDRAC sets the network speed to 10, 100, or 1000 Mbps based on the
network speed.
5. Under Network Speed, select either 10 Mbps or 100 Mbps.
NOTE: If network teaming is configured for the host OS using the same network adapter as NIC Selection, then the
Failover Network should also be configured. NIC Selection and Failover Network should use the ports that are
configured as a part of the network team. If more than two ports are used as part of the network team, then the
Failover Network selection should be "All".
Common settings
If network infrastructure has DNS server, register iDRAC on the DNS. These are the initial settings requirements for advanced features
such as Directory services—Active Directory or LDAP, Single Sign On, and smart card.
To register iDRAC:
1. Enable Register DRAC on DNS.
2. Enter the DNS DRAC Name.
3. Select Auto Config Domain Name to automatically acquire domain name from DHCP. Else, provide the DNS Domain Name.
VLAN settings
You can configure iDRAC into the VLAN infrastructure. To configure VLAN settings, perform the following steps:
NOTE: On blade servers that are set as Chassis (Dedicated), the VLAN settings are read-only and can be changed only
using CMC. If the server is set in shared mode, you can configure VLAN settings in shared mode in iDRAC.
1. Under Enable VLAN ID, select Enabled.
2. In the VLAN ID box, enter a valid number from 1 to 4094.
3. In the Priority box, enter a number from 0 to 7 to set the priority of the VLAN ID.
NOTE: After enabling VLAN, the iDRAC IP is not accessible for some time.
NOTE: HTTPS certificates are not supported with Auto Config. Auto Config ignores certificate warnings.
Following list describes the required and optional parameters to pass in for the string value:
-f (Filename): name of exported Server Configuration Profile file. This is required for iDRAC firmware versions prior to 2.20.20.20.
-n (Sharename): name of network share. This is required for NFS or CIFS.
NOTE:
• Auto Config can only be enabled when DHCPv4 and the Enable IPV4 options are enabled.
• Auto Config and Auto Discovery features are mutually exclusive. Disable Auto Discovery for Auto Config to work.
• The Auto Config is disabled after a server has carried out an Auto Config operation.
If all the Dell PowerEdge servers in the DHCP server pool are of the same model type and number, then a single SCP file (config.xml)
is required. The config.xml file name is used as the default SCP file name. In addition to .xml file, .json files can also be used with
14G systems. The file can be config.json.
The user can configure individual servers requiring different configuration files mapped using individual server Service Tags or server
models. In an environment that has different servers with specific requirements, different SCP file names can be used to distinguish each
server or server type. For example, if there are two server models to configure — PowerEdge R740s and PowerEdge R540s, use two
SCP files, R740-config.xml and R540-config.xml.
NOTE: iDRAC server configuration agent automatically generates the configuration filename using the server Service
Tag, model number, or the default filename — config.xml.
NOTE: If none of these files are on the network share, then the server configuration profile import job is marked as
failed for file not found.
DHCP options
DHCPv4 allows many globally defined parameters to be passed to the DHCP clients. Each parameter is known as a DHCP option. Each
option is identified with an option tag, which is a 1-byte value. Option tags 0 and 255 are reserved for padding and end of options,
respectively. All other values are available for defining options.
The DHCP Option 43 is used to send information from the DHCP server to the DHCP client. The option is defined as a text string. This
text string is set to contain the values of the SCP filename, share location and the credentials to access the location. For example,
where, -i is the location of the Remote File Share and –f is the file name in the string along with the credentials to the Remote File Share.
The DHCP Option 60 identifies and associates a DHCP client with a particular vendor. Any DHCP server configured to take action based
on a client’s vendor ID should have Option 60 and Option 43 configured. With Dell PowerEdge servers, the iDRAC identifies itself with
vendor ID: iDRAC. Therefore, you must add a new ‘Vendor Class’ and create a ‘scope option’ under it for ‘code 60,’ and then enable the
new scope option for the DHCP server.
The following are the required and optional parameters that must be passed in the vendor class identifier string:
• Filename (–f) — Indicates the name of the exported Server Configuration Profile file.
NOTE: For more information on file naming rules, see Configuring servers and server components using Auto
Config.
• Sharename (-n) — Indicates the name of the network share.
• ShareType (-s) — Indicates the share type. 0 indicates NFS, 2 indicates CIFS, 5 indicates HTTP, and 6 indicates HTTPS.
NOTE: Example for Linux NFS, CIFS, HTTP, HTTPS share:
Ensure that you use NFS2 or NFS3 for NFS network share.
• CIFS: -f system_config.xml -i 192.168.0.130 -n sambashare/config_files -s 2 -u user -p
password -d 1 -t 400
• HTTP: -f system_config.xml -i 192.168.1.101 -s http -n http_share
• HTTPS: -f system_config.json -i 192.168.1.101 -s https
• IPAddress (-i) — Indicates the IP address of the file share.
NOTE: Sharename (-n), ShareType (-s), and IPAddress (-i) are required attributes that must be passed. -n is not
required for HTTP or HTTPS.
• Username (-u) — Indicates the user name required to access the network share. This information is required only for CIFS.
• Password (-p) — Indicates the password required to access the network share. This information is required only for CIFS.
• ShutdownType (-d) — Indicates the mode of shutdown. 0 indicates Graceful shutdown and 1 indicates Forced shutdown.
NOTE: The default setting is 0.
• Timetowait (-t) — Indicates the time the host system waits before shutting down. The default setting is 300.
• EndHostPowerState (-e) — Indicates the power state of the host. 0 indicates OFF and 1 indicates ON. The default setting is 1.
NOTE: ShutdownType (-d), Timetowait (-t), and EndHostPowerState (-e) are optional attributes.
host my_host {
host my_host {
hardware ethernet b8:2a:72:fb:e6:56;
fixed-address 192.168.0.211;
option host-name "my_host";
option myname " -f r630_raid.xml -i 192.168.0.1 -n /nfs -s 0 -d 0 -t 300";
}
NOTE: After editing the dhcpd.conf file, make sure to restart the dhcpd service to apply the changes.
racadm get -f <file name> -l <NFS / CIFS share> -u <username> -p <password> -t <filetype> --
includePH
NOTE: The attributes are not applicable to the INI configuration file.
Generate Hex Representation of Salt -> echo -n ALITTLEBITOFSALT | xxd –p -> <HEX-SALT>
3. Provide hash value and salt in the imported server configuration profile, the RACADM commands, Redfish, or WSMan.
NOTE: If you wish to clear a previously salted password, then ensure that the password-salt is explicitly set to an
empty string i.e.
set iDRAC.Users.4.SHA256Password
ca74e5fe75654735d3b8d04a7bdf5dcdd06f1c6c2a215171a24e5a9dcb28e7a2
set iDRAC.Users.4.SHA256PasswordSalt
4. After setting the password, the normal plain text password authentication works except that SNMP v3 and IPMI authentication fails
for the iDRAC user accounts that had passwords updated with hash.
NOTE: 0% PWM does not indicate fan is off. It is the lowest fan speed that the fan can achieve.
The settings are persistent, which means that once they are set and applied, they do not automatically change to the default setting
during system reboot, power cycling, iDRAC, or BIOS updates. The custom cooling options may not be supported on all servers. If the
options are not supported, they are not displayed or you cannot provide a custom value.
3. Click Apply to apply the settings.
The following message is displayed:
It is recommended to reboot the system when a thermal profile change has been made. This is
to ensure all power and thermal settings are activated.
Click Reboot Later or Reboot Now.
NOTE: You must reboot the system for the settings to take effect.
racadm set
system.thermalsettin
gs.AirExhaustTemp 4
Object value
modified
successfully.
racadm set
system.thermalsettin
gs.AirExhaustTemp 0
ERROR: RAC947:
Invalid object
value specified.
racadm set
system.thermalsettin
gs.AirExhaustTemp
255
racadm set
system.thermalsettin
gs FanSpeedOffset 1
racadm set
system.thermalsettin
gs FanSpeedOffset 0
racadm set
system.thermalsettin
gs FanSpeedOffset 3
racadm set
system.thermalsettin
gs FanSpeedOffset 2
FanSpeedOffset • Using this object with get Values are: To view the existing setting:
command displays the • 0 — Low Fan Speed
existing Fan Speed Offset racadm get
• 1 — High Fan Speed system.thermalsettin
value.
• 2 — Medium Fan Speed gs.FanSpeedOffset
• Using this object with set
• 3 — Max Fan Speed
command allows setting the
required fan speed offset • 255 — None To set the fan speed offset to
value. High value (as defined in
FanSpeedHighOffsetVal)
• The index value decides the
offset that is applied and the
racadm set
FanSpeedLowOffsetVal, system.thermalsettin
FanSpeedMaxOffsetVal, gs.FanSpeedOffset 1
FanSpeedHighOffsetVa
l, and
FanSpeedMediumOffset
Val objects (defined earlier)
are the values at which the
offsets are applied.
MFSMaximumLimit Read Maximum limit for MFS Values from 1 — 100 To display the highest value that
can be set using
MinimumFanSpeed option:
racadm get
system.thermalsettin
gs.MFSMaximumLimit
MFSMinimumLimit Read Minimum limit for MFS Values from 0 to To display the lowest value that
MFSMaximumLimit can be set using
MinimumFanSpeed option.
Default is 255 (means None)
racadm get
system.thermalsettin
gs.MFSMinimumLimit
MinimumFanSpeed • Allows configuring the Values from To make sure that the system
Minimum Fan speed that is MFSMinimumLimit to minimum speed does not
required for the system to MFSMaximumLimit decrease lower than 45% PWM
operate. (45 must be a value between
When get command reports
• It defines the baseline (floor) MFSMinimumLimit to
255, it means user configured
value for fan speed and MFSMaximumLimit):
offset is not applied.
system allows fans to go
lower than this defined fan racadm set
speed value. system.thermalsettin
gs.MinimumFanSpeed
• This value is %PWM value
45
for fan speed.
racadm set
system.thermalsettin
gs.ThermalProfile 1
ThirdPartyPCIFanRespons • Thermal overrides for third- Values: To disable any default fan speed
e party PCI cards. response set for a detected
• 1 — Enabled
• Allows you to disable or third-party PCI card:
• 0 — Disabled
enable the default system
fan response for detected NOTE: The default value racadm set
third-party PCI cards. is 1. system.thermalsettin
gs.ThirdPartyPCIFanR
• You can confirm the esponse 0
presence of third-party PCI
card by viewing the message
ID PCI3018 in the Lifecycle
Controller log.
NOTE: You need Java 8 or later to use this feature and to launch iDRAC Virtual Console over an IPv6 network.
4. Import the root certificates on the managed system to avoid the pop-ups that prompt you to verify the certificates.
5. Install the compat-libstdc++-33-3.2.3-61 related package.
NOTE: On Windows, the compat-libstdc++-33-3.2.3-61 related package may be included in the .NET
framework package or the operating system package.
6. If you are using MAC operating system, select the Enable access for assistive devices option in the Universal Access window.
For more information, see the MAC operating system documentation.
https://[fe80::d267:e5ff:fef4:2fe9]/ to https://fe80--d267-e5ff-fef4-2fe9.ipv6-
literal.net/
• Direct HTML5 virtual console in IE using an IPv6 address, modify the IPv6 address as follows:
https://[fe80::d267:e5ff:fef4:2fe9]/console to https://fe80--d267-e5ff-fef4-2fe9.ipv6-
literal.net/console
3. To display the Title Bar information in IE, go to Control Panel > Appearance and Personalization > Personalization > Window
Classic
NOTE: You can use ActiveX plug-in only with Internet Explorer.
NOTE: To use ActiveX plug-in on systems with Internet Explorer 9, before configuring Internet Explorer, ensure that
you disable the Enhanced Security Mode in Internet Explorer or in the server manager in Windows Server operating
systems.
For ActiveX applications in Windows 7, Windows 2008, and Windows 10 configure the following Internet Explorer settings to use the
ActiveX plug-in:
1. Clear the browser’s cache.
2. Add iDRAC IP or host name to the Local Internet site list.
3. Reset the custom settings to Medium-low or change the settings to allow installation of signed ActiveX plug-ins.
4. Enable the browser to download encrypted content and to enable third-party browser extensions. To do this, go to Tools > Internet
Options > Advanced, clear the Do not save encrypted pages to disk option, and select the Enable third-party browser
extensions option.
NOTE: Restart Internet Explorer for the Enable third-party browser extension setting to take effect.
5. Go to Tools > Internet Options > Security and select the zone in which you want to run the application.
6. Click Custom level. In the Security Settings window, do the following:
• Select Enable for Automatic prompting for ActiveX controls.
• Select Prompt for Download signed ActiveX controls.
• Select Enable or Prompt for Run ActiveX controls and plugins.
• Select Enable or Prompt for Script ActiveX controls marked safe for scripting.
7. Click OK to close the Security Settings window.
8. Click OK to close the Internet Options window.
NOTE: On systems with Internet Explorer 11, ensure that you add the iDRAC IP by clicking Tools > Compatibility View
settings.
NOTE:
• The varying versions of Internet Explorer share Internet Options. Therefore, after you add the server to the list of
trusted sites for one browser the other browser uses the same setting.
• Before installing the ActiveX control, Internet Explorer may display a security warning. To complete the ActiveX
control installation procedure, accept the ActiveX control when Internet Explorer prompts you with a security
warning.
• If you get the error Unknown Publisher while launching Virtual Console, it may be caused because of the change
to the code-signing certificate path. To resolve this error, you must download an addition key. Use a search
engine to search for Symantec SO16958 and, from the search results, follow the instructions on the Symantec
website.
The following table provides information on whether a system restart is required when firmware is updated for a particular component:
NOTE: When multiple firmware updates are applied through out-of-band methods, the updates are ordered in the most
efficient possible manner to reduce unnecessary system restart.
* Indicates that though a system restart is not required, iDRAC must be restarted to apply the updates. iDRAC communication and
monitoring may temporarily be interrupted.
When you check for updates, the version marked as Available does not always indicate that it is the latest version available. Before you
install the update, ensure that the version you choose to install is newer than the version currently installed. If you want to control the
version that iDRAC detects, create a custom repository using Dell Repository Manager (DRM) and configure iDRAC to use that repository
to check for updates.
NOTE: Ensure that the file name for the single component DUP does not have any blank space.
If the firmware image file is valid and was successfully uploaded, the Contents column displays a plus icon ( ) icon next to the
firmware image file name. Expand the name to view the Device Name, Current, and Available firmware version information.
5. Select the required firmware file and do one of the following:
• For firmware images that do not require a host system reboot, click Install. For example, iDRAC firmware file.
• For firmware images that require a host system reboot, click Install and Reboot or Install Next Reboot.
• To cancel the firmware update, click Cancel.
When you click Install, Install and Reboot, or Install Next Reboot, the message Updating Job Queue is displayed.
6. To display the Job Queue page, click Job Queue. Use this page to view and manage the staged firmware updates or click OK to
refresh the current page and view the status of the firmware update.
NOTE: If you navigate away from the page without saving the updates, an error message is displayed and all the
uploaded content is lost.
NOTE: IPv6 address is not supported for scheduling automatic firmware updates.
For example,
• To automatically update firmware using a CIFS share:
racadm AutoUpdateScheduler create -u admin -p pwd -l ftp.mytest.com -pu puser –pp puser –
po 8080 –pt http –f cat.xml -time 14:30 -wom 1 -dow sun -rp 5 -a 1
• To perform all applicable updates from an update repository using myfile.xml as a catalog file and perform a graceful reboot:
• To perform all applicable updates from an FTP update repository using Catalog.xml as a catalog file:
FTP server:
• Using fwupdate command:
For more information, see the iDRAC RACADM Command Line Interface Reference Guide available at dell.com/idracmanuals.
NOTE: You cannot perform firmware rollback for Diagnostics, Driver Packs, and CPLD.
• While in rollback mode, the rollback process continues in the background even if you navigate away from this
page.
An error message appears if:
• You do not have Server Control privilege to rollback any firmware other than the iDRAC or Configure privilege to rollback iDRAC
firmware.
• Firmware rollback is already in-progress in another session.
• Updates are staged to run or already in running state.
If Lifecycle Controller is disabled or in recovery state and you try to perform a firmware rollback for any device other than iDRAC, an
appropriate warning message is displayed along with steps to enable Lifecycle Controller.
racadm swinventory
For the device for which you want to rollback the firmware, the Rollback Version must be Available. Also, note the FQDD.
2. Rollback the device firmware using:
For more information, see iDRAC RACADM Command Line Interface Reference Guide available at dell.com/idracmanuals.
System Inventory with iDRAC may be stale,start CSIOR for updated inventory
NOTE: IPv6 address is not supported for scheduling automatic backup server profile.
racadm systemconfig backup –f <filename> <target> [-n <passphrase>] -time <hh:mm> -dom
<1-28,L,’*’> -dow<*,Sun-Sat> -wom <1-4, L,’*’> -rp <1-366>-mb <Max Backups>
For more information, see the iDRAC RACADM Command Line Interface Reference Guide available at dell.com/idracmanuals.
When the import is in-progress, if you initiate an import operation again, the following error message is displayed:
Easy Restore
After you replace the motherboard on your server, Easy Restore allows you to automatically restore the following data:
• System Service Tag
• Licenses data
• UEFI Diagnostics application
• System configuration settings—BIOS, iDRAC, and NIC
Easy Restore uses the Easy Restore flash memory to back up the data. When you replace the motherboard and power on the system, the
BIOS queries the iDRAC and prompts you to restore the backed-up data. The first BIOS screen prompts you to restore the Service Tag,
licenses, and UEFI diagnostic application. The second BIOS screen prompts you to restore system configuration settings. If you choose
not to restore data on the first BIOS screen and if you do not set the Service Tag by another method, the first BIOS screen is displayed
again. The second BIOS screen is displayed only once.
NOTE:
• System configurations settings are backed-up only when CSIOR is enabled. Ensure that Lifecycle Controller and
CSIOR are enabled.
• System Erase does not clear the data from the Easy Restore flash memory.
• Easy Restore does not back up other data such as firmware images, vFlash data, or add-in cards data.
NOTE: You can browse to a specific location to import the server configuration files. You need to select the correct
server configuration file that you want to import. For example, import.xml.
NOTE: Depending on the exported file format (that you selected), the extension is added automatically. For example,
export_system_config.xml.
Policy Component Acceptable File Formats Acceptable File Extensions Max records allowed
PK X.509 Certificate (binary DER One
format only) 1. .cer
2. .der
3. .crt
3. .crt
4. .pbk
The Secure Boot Settings feature can be accessed by clicking System Security under System BIOS Settings. To go to System BIOS
Settings, press F2 when the company logo is displayed during POST.
• By default, Secure Boot is Disabled and the Secure Boot policy is set to Standard. To configure the Secure Boot Policy, you must
enable Secure Boot.
• When the Secure Boot mode is set to Standard, it indicates that the system has default certificates and image digests or hash loaded
from the factory. This caters to the security of standard firmware, drivers, option-roms, and boot loaders.
• To support a new driver or firmware on a server, the respective certificate must be enrolled into the DB of Secure Boot certificate
store. Therefore, Secure Boot Policy must be configured to Custom.
When the Secure Boot Policy is configured as Custom, it inherits the standard certificates and image digests loaded in the system by
default, which you can modify. Secure Boot Policy configured as Custom allows you to perform operations such as View, Export, Import,
Delete, Delete All, Reset, and Reset All. Using these operations, you can configure the Secure Boot Policies.
Configuring the Secure Boot Policy to Custom enables the options to manage the certificate store by using various actions such as
Export, Import, Delete, Delete All, Reset, and Rest All on PK, KEK, DB, and DBX. You can select the policy (PK / KEK / DB / DBX) on
which you want to make the change and perform appropriate actions by clicking the respective link. Each section will have links to perform
the Import, Export, Delete, and Reset operations. Links are enabled based on what is applicable, which depends on the configuration at the
point of time. Delete All and Reset All are the operations that have impact on all the policies. Delete All deletes all the certificates and
image digests in the Custom policy, and Rest All restores all the certificates and image digests from Standard or Default certificate store.
BIOS recovery
The BIOS recovery feature allows you to manually recover the BIOS from a stored image. The BIOS is checked when the system is
powered-on and if a corrupt or compromised BIOS is detected, an error message is displayed. You can then initiate the process of BIOS
recovery using RACADM. To perform a manual BIOS recovery, see the iDRAC RACADM Command Line Interface Reference Guide
available at Dell.com/idracmanuals.
76 Configuring iDRAC
• Disabling access to modify iDRAC configuration settings on host system
Configuring iDRAC 77
Viewing iDRAC information using RACADM
To view iDRAC information using RACADM, see getsysinfo or get sub-command details provided in the iDRAC RACADM CLI Guide
available at www.dell.com/idracmanuals .
NOTE: Changing the network settings may terminate the current network connections to iDRAC.
To use DHCP to obtain an IP address, use the following command to write the object DHCPEnable and enable this feature.
The following example shows how the command may be used to configure the required LAN network properties:
NOTE: If iDRAC.Nic.Enable is set to 0, the iDRAC LAN is disabled even if DHCP is enabled.
Configuring IP filtering
In addition to user authentication, use the following options to provide additional security while accessing iDRAC:
78 Configuring iDRAC
• IP filtering limits the IP address range of the clients accessing iDRAC. It compares the IP address of an incoming login to the specified
range and allows iDRAC access only from a management station whose IP address is within the range. All other login requests are
denied.
• When repeated login failures occur from a particular IP address, it prevents the address from logging in to iDRAC for a preselected
time span. If you unsuccessfully log in up to two times, you are allowed to log in again only after 30 seconds. If you unsuccessfully log
in more than two times, you are allowed to log in again only after 60 seconds.
As login failures accumulate from a specific IP address, they are registered by an internal counter. When the user successfully logs in, the
failure history is cleared and the internal counter is reset.
NOTE: When login attempts are prevented from the client IP address, few SSH clients may display the message: ssh
exchange identification: Connection closed by remote host.
NOTE: If you are using Dell Deployment Toolkit (DTK), see the OpenManage Deployment Toolkit User's Guide available
at www.dell.com/openmanagemanuals for the privileges.
To restrict logins to a set of four adjacent IP addresses (for example, 192.168.0.212 through 192.168.0.215), select all but the lowest two
bits in the mask:
Configuring iDRAC 79
The last byte of the range mask is set to 252, the decimal equivalent of 11111100b.
For more information, see the iDRAC RACADM CLI Guide available at www.dell.com/idracmanuals.
FIPS mode
FIPS is a computer security standard that United States government agencies and contractors must use. Starting from version iDRAC
2.40.40.40, iDRAC supports enabling FIPS mode.
iDRAC will be officially certified to support FIPS mode in the future.
NOTE: If you reinstall or upgrade iDRAC firmware, FIPS mode gets disabled.
NOTE: Some iDRAC interfaces, such as the standards-compliant implementations of IPMI and SNMP, do not support
FIPS-compliance.
Configuring services
You can configure and enable the following services on iDRAC:
Local Disable access to iDRAC configuration (from the host system) using Local RACADM and iDRAC Settings utility.
Configuration
80 Configuring iDRAC
Web Server Enable access to iDRAC web interface. If you disable the web interface, remote RACADM also gets disabled. Use
local RACADM to re-enable the web server and remote RACADM.
SSH Access iDRAC through firmware RACADM.
Telnet Access iDRAC through firmware RACADM.
Remote RACADM Remotely access iDRAC.
Redfish Enables support for Redfish RESTful API.
SNMP Agent Enables support for SNMP queries (GET, GETNEXT, and GETBULK operations) in iDRAC.
Automated Enable Last System Crash Screen.
System Recovery
Agent
VNC Server Enable VNC server with or without SSL encryption.
Configuring iDRAC 81
To view the status of the HTTP to HTTPS redirection:
Configuring TLS
By default, iDRAC is configured to use TLS 1.1 and higher. You can configure iDRAC to use any of the following:
• TLS 1.0 and higher
• TLS 1.1 and higher
• TLS 1.2 only
NOTE: To ensure a secure connection, Dell recommends using TLS 1.1 and higher.
NOTE: VNC feature is licensed and is available in the iDRAC Enterprise license.
You can choose from many VNC applications or Desktop clients such as the ones from RealVNC or Dell Wyse PocketCloud.
2 VNC client sessions can be activated at the same time. Second one is in Read-Only mode.
If a VNC session is active, you can only launch the Virtual Media using Launch Virtual Console and not the Virtual Console Viewer.
If video encryption is disabled, the VNC client starts RFB handshake directly, and a SSL handshake is not required. During VNC client
handshake (RFB or SSL), if another VNC session is active or if a Virtual Console session is open, the new VNC client session is rejected.
After completion of the initial handshake, VNC server disables Virtual Console and allows only Virtual Media. After termination of the VNC
session, VNC server restores the original state of Virtual Console (enabled or disabled).
NOTE:
• When iDRAC NIC is in shared mode and the host system is power cycled, the network connection is lost for a few
seconds. During this time, if you perform any action in the active VNC client, the VNC session may close. You must
wait for timeout (value configured for the VNC Server settings in the Services page in iDRAC Web interface) and
then re-establish the VNC connection.
82 Configuring iDRAC
• If the VNC client window is minimized for more than 60 seconds, the client window closes. You must open a new
VNC session. If you maximize the VNC client window within 60 seconds, you can continue to use it.
Configuring iDRAC 83
Configuring LCD setting
You can set and display a default string such as iDRAC name, IP, and so on or a user-defined string on the LCD front panel of the
managed system.
84 Configuring iDRAC
1. In iDRAC Web interface, go to Configuration > System Settings > Hardware Settings > Front Panel configuration. The
System ID LED Settings page is displayed.
2. In System ID LED Settings section, select any of the following options to enable or disable LED blinking:
• Blink Off
• Blink On
• Blink On 1 Day Timeout
• Blink On 1 Week Timeout
• Blink On 1 Month Timeout
3. Click Apply.
The LED blinking on the front panel is configured.
Configuring iDRAC 85
• UEFI Device Path
• UEFI HTTP
NOTE:
• BIOS Setup (F2), Lifecycle Controller (F10), and BIOS Boot Manager (F11) cannot be set as permanent boot device.
• The first boot device setting in iDRAC Web Interface overrides the System BIOS boot settings.
86 Configuring iDRAC
Enabling or disabling OS to iDRAC Pass-through
In servers that have Network Daughter Card (NDC) or embedded LAN On Motherboard (LOM) devices, you can enable the OS to iDRAC
Pass-through feature. This feature provides a high-speed bi-directional in-band communication between iDRAC and the host operating
system through a shared LOM, a dedicated NIC, or through the USB NIC. This feature is available for iDRAC Enterprise license.
NOTE: iDRAC Service Module (iSM) provides more features for managing iDRAC through the operating system. For
more information, see the iDRAC Service Module User's Guide available at www.dell.com/esmmanuals.
When enabled through dedicated NIC, you can launch the browser in the host operating system and then access the iDRAC Web
interface. The dedicated NIC for the blade servers is through the Chassis Management Controller.
Switching between dedicated NIC or shared LOM does not require a reboot or reset of the host operating system or iDRAC.
You can enable this channel using:
• iDRAC web interface
• RACADM or WSMan (post operating system environment)
• iDRAC Settings utility (pre-operating system environment)
If the network configuration is changed through iDRAC Web interface, you must wait for at least 10 seconds before enabling OS to iDRAC
Pass-through.
If you are configuring the server using a Server Configuration Profile through RACADM, WSMan or Redfish and if the network settings are
changed in this file, then you must wait for 15 seconds to either enable OS to iDRAC Pass-through feature or set the OS Host IP address.
Before enabling OS to iDRAC Pass-through, make sure that:
• iDRAC is configured to use dedicated NIC or shared mode (that is, NIC selection is assigned to one of the LOMs).
• Host operating system and iDRAC are in the same subnet and same VLAN.
• Host operating system IP address is configured.
• A card that supports OS to iDRAC Pass-through capability is installed.
• You have the Configure privilege.
When you enable this feature:
• In shared mode, the host operating system's IP address is used.
• In dedicated mode, you must provide a valid IP address of the host operating system. If more than one LOM is active, enter the first
LOM’s IP address.
If the OS to iDRAC Pass-through feature does not work after it is enabled, ensure that you check the following:
• The iDRAC dedicated NIC cable is connected properly.
• At least one LOM is active.
NOTE: Use the default IP address. Ensure that the IP address of the USB NIC interface is not in the same network
subnet as the iDRAC or host OS IP addresses. If this IP address conflicts with an IP address of other interfaces of the
host system or the local network, you must change it.
NOTE: Do not use 169.254.0.3 and 169.254.0.4 IP addresses. These IP addresses are reserved for the USB NIC port on
the front panel when an A/A cable is used.
NOTE: iDRAC may not be accessible from the host server using LOM-Passthrough when NIC teaming is enabled. Then,
iDRAC can be accessed from the host server OS using the iDRAC USB NIC or through the external network, via the
iDRAC dedicated NIC.
Configuring iDRAC 87
In-built LOM cards also support the OS to iDRAC pass-through feature.
Message: The update completed successfully, but the system needs to be rebooted for the
changes to be effective.
Reboot Required: true
VIBs Installed: Dell_bootbank_iDRAC_USB_NIC_1.0.0-799733X03
VIBs Removed:
VIBs Skipped:
88 Configuring iDRAC
• LOM — The OS to iDRAC pass-through link between the iDRAC and the host operating system is established through the LOM
or NDC.
• USB NIC — The OS to iDRAC pass-through link between the iDRAC and the host operating system is established through the
internal USB bus.
4. If you select LOM as the pass-through configuration, and if the server is connected using dedicated mode, enter the IPv4 address of
the operating system.
NOTE: If the server is connected in shared LOM mode, then the OS IP Address field is disabled.
NOTE: If the VLAN is enabled on the iDRAC, the LOM-Passthrough will only function in shared LOM mode with VLAN
tagging configured on the host.
5. If you select USB NIC as the pass-through configuration, enter the IP address of the USB NIC.
The default value is 169.254.1.1. It is recommended to use the default IP address. However, if this IP address conflicts with an IP
address of other interfaces of the host system or the local network, you must change it.
Do not enter 169.254.0.3 and 169.254.0.4 IPs. These IPs are reserved for the USB NIC port on the front panel when a A/A cable is
used.
6. Click Apply.
7. Click Test Network Configuration to check if the IP is accessible and the link is established between the iDRAC and the host
operating system.
Configuring iDRAC 89
Obtaining certificates
The following table lists the types of certificates based on the login type.
Single Sign-on using Active Directory Trusted CA certificate Generate a CSR and get it signed from a
Certificate Authority
SHA-2 certificates are also supported.
Smart Card login as a local or Active • User certificate • User Certificate — Export the smart
Directory user • Trusted CA certificate card user certificate as Base64-
encoded file using the card
management software provided by
the smart card vendor.
• Trusted CA certificate — This
certificate is issued by a CA.
SHA-2 certificates are also supported.
Active Directory user login Trusted CA certificate This certificate is issued by a CA.
SHA-2 certificates are also supported.
Local User login SSL Certificate Generate a CSR and get it signed from a
trusted CA
NOTE: iDRAC ships with a
default self-signed SSL server
certificate. The iDRAC Web
server, Virtual Media, and Virtual
Console use this certificate.
SHA-2 certificates are also supported.
90 Configuring iDRAC
You can also upload a custom signing certificate to sign the SSL certificate, rather than relying on the default signing certificate for this
function. By importing one custom signing certificate into all management stations, all the iDRACs using the custom signing certificate are
trusted. If a custom signing certificate is uploaded when a custom SSL certificate is already in-use, then the custom SSL certificate is
disabled and a one-time auto-generated SSL certificate, signed with the custom signing certificate, is used. You can download the custom
signing certificate (without the private key). You can also delete an existing custom signing certificate. After deleting the custom signing
certificate, iDRAC resets and auto-generates a new self-signed SSL certificate. If a self-signed certificate is regenerated, then the trust
must be re-established between that iDRAC and the management workstation. Auto-generated SSL certificates are self-signed and have
an expiration date of seven years and one day and a start date of one day in the past (for different time zone settings on management
stations and the iDRAC).
The iDRAC Web server SSL certificate supports the asterisk character (*) as part of the left-most component of the Common Name
when generating a Certificate Signing Request (CSR). For example, *.qa.com, or *.company.qa.com. This is called a wildcard certificate. If
a wildcard CSR is generated outside of iDRAC, you can have a signed single wildcard SSL certificate that you can upload for multiple
iDRACs and all the iDRACs are trusted by the supported browsers. While connecting to iDRAC Web interface using a supported browser
that supports a wildcard certificate, the iDRAC is trusted by the browser. While launching viewers, the iDRACs are trusted by the viewer
clients.
Configuring iDRAC 91
1. In the iDRAC Web interface, go to iDRAC Settings > Connectivity > SSL > SSL certificate, select Upload Server Certificate
and click Next.
The Certificate Upload page is displayed.
2. Under File Path, click Browse and select the certificate on the management station.
3. Click Apply.
The SSL server certificate is uploaded to iDRAC.
4. A pop-up message is displayed asking you to reset iDRAC immediately or at a later time. Click Reset iDRAC or Reset iDRAC Later as
required.
iDRAC resets and the new certificate is applied. The iDRAC is not available for a few minutes during the reset.
NOTE: You must reset iDRAC to apply the new certificate. Until iDRAC is reset, the existing certificate is active.
92 Configuring iDRAC
6. A pop-up message is displayed asking you to reset iDRAC immediately or at a later time. Click Reset iDRAC or Reset iDRAC Later as
required.
After iDRAC resets, the new certificate is applied. The iDRAC is not available for a few minutes during the reset.
NOTE: You must reset iDRAC to apply the new certificate. Until iDRAC is reset, the existing certificate is active.
Configuring iDRAC 93
NOTE:
• The configuration file contains information that is applicable for the particular server. The information is organized
under various object groups.
• Some configuration files contain unique iDRAC information, such as the static IP address, that you must modify
before you import the file into other iDRACs.
You can also use the System Configuration Profile (SCP) to configure multiple iDRACs using RACADM. SCP file contains the component
configuration information. You can use this file to apply the configuration for BIOS, iDRAC, RAID, and NIC by importing the file into a
target system. For more information, see XML Configuration Workflow white paper available at www.dell.com/manuals.
To configure multiple iDRACs using the configuration file:
1. Query the target iDRAC that contains the required configuration using the following command:.
The command requests the iDRAC configuration and generates the configuration file.
NOTE: Redirecting the iDRAC configuration to a file using get -f is only supported with the local and remote
RACADM interfaces.
NOTE: The generated configuration file does not contain user passwords.
The get command displays all configuration properties in a group (specified by group name and index) and all configuration properties
for a user.
2. Modify the configuration file using a text editor, if required.
NOTE: It is recommended that you edit this file with a simple text editor. The RACADM utility uses an ASCII text
parser. Any formatting confuses the parser, which may corrupt the RACADM database.
3. On the target iDRAC, use the following command to modify the settings:
This loads the information into the other iDRAC. You can use set command to synchronize the user and password database with
Server Administrator.
4. Reset the target iDRAC using the command: racadm racreset
94 Configuring iDRAC
5
Viewing iDRAC and managed system
information
You can view iDRAC and managed system’s health and properties, hardware and firmware inventory, sensor health, storage devices,
network devices, and view and terminate user sessions. For blade servers, you can also view the flex address information.
Topics:
• Viewing managed system health and properties
• Viewing system inventory
• Viewing sensor information
• Monitoring performance index of CPU, memory, and input output modules
• Checking the system for Fresh Air compliance
• Viewing historical temperature data
• Viewing network interfaces available on host OS
• Viewing network interfaces available on host OS using RACADM
• Viewing FlexAddress mezzanine card fabric connections
• Viewing or terminating iDRAC sessions
NOTE: On the Dell PowerEdge FX2/FX2s servers, the naming convention of the CMC version displayed in the iDRAC
GUI differs from the version displayed on the CMC GUI. However, the version remains the same.
When you replace any hardware component or update the firmware versions, make sure to enable and run the Collect System
Inventory on Reboot (CSIOR) option to collect the system inventory on reboot. After a few minutes, log in to iDRAC, and navigate to
the System Inventory page to view the details. It may take up to 5 minutes for the information to be available depending on the
hardware installed on the server.
NOTE: Configuration changes and firmware updates that are made within the operating system may not reflect properly
in the inventory until you perform a server restart.
Click Export to export the hardware inventory in an XML format and save it to a location of your choice.
NOTE: The Hardware Overview page displays data only for sensors present on your system.
The CPU and chipset have dedicated Resource monitoring Counters (RMC). The data from these RMCs is queried to obtain utilization
information of system resources. The data from RMCs is aggregated by the node manager to measure the cumulative utilization of each
of these system resources that is read from iDRAC using existing intercommunication mechanisms to provide data through out-of-band
management interfaces.
The Intel sensor representation of performance parameters and index values is for complete physical system. Therefore, the performance
data representation on the interfaces is for the complete physical system, even if the system is virtualized and has multiple virtual hosts.
NOTE: This feature is available with iDRAC Express and iDRAC Enterprise licenses.
<List-of-Uplinks-Configured-on-the-vSwitch>/<Port-Group>/<Interface-name>
IPMI Serial Over LAN Intelligent Platform Management IPMI IPMITool is installed and IPMI
Bus protocol Serial Over LAN is enabled
SSH
Telnet
IPMI over LAN Intelligent Platform Management IPMI IPMITool is installed and IPMI
Bus protocol Settings is enabled
SMCLP SSH SMCLP SSH or Telnet on iDRAC is
enabled
Telnet
Topics:
NOTE: This is applicable only for iDRAC on rack and tower servers.
NOTE: This is applicable only for iDRAC on rack and tower servers.
• IPMI basic mode — Supports a binary interface for program access, such as the IPMI shell (ipmish) that is included with the
Baseboard Management Utility (BMU). For example, to print the System Event Log using ipmish via IPMI Basic mode, run the
following command:
ipmish -com 1 -baud 57600 -flow cts -u <username> -p <password> sel get
NOTE: The default iDRAC user name and password are provided on the system badge.
• IPMI terminal mode — Supports ASCII commands that are sent from a serial terminal. This mode supports limited number of
commands (including power control) and raw IPMI commands that are typed as hexadecimal ASCII characters. It allows you to view
the operating system boot sequences up to BIOS, when you login to iDRAC through SSH or Telnet. You need to logout from the IPMI
terminal using [sys pwd -x], below are the example for IPMI Terminal mode commands.
• [sys tmode]
• [sys pwd -u root calvin]
• [sys health query -v]
• [18 00 01]
• [sys pwd -x]
4. Set the IPMI serial channel minimum privilege level using the command.
<level> = 3 Operator
<level> = 4 Administrator
5. Ensure that the serial MUX (external serial connector) is set correctly to the remote access device in the BIOS Setup program to
configure BIOS for serial connection.
For more information about these properties, see the IPMI 2.0 specification.
Configuring additional settings for IPMI serial terminal mode using web interface
To set the Terminal Mode settings:
1. In the iDRAC Web interface, go to iDRAC Settings > Connectivity > Serial.
The Serial page is displayed.
2. Enable IPMI serial.
3. Click Terminal Mode Settings.
The Terminal Mode Settings page is displayed.
4. Specify the following values:
• Line editing
• Delete control
• Echo Control
• Handshaking control
• New line sequence
• Input new line sequences
For information about the options, see the iDRAC Online Help.
5. Click Apply.
The terminal mode settings are configured.
6. Make sure that the serial MUX (external serial connector) is set correctly to the remote access device in the BIOS Setup program to
configure BIOS for serial connection.
Configuring additional settings for IPMI serial terminal mode using RACADM
To configure the Terminal Mode settings, use the set command with the objects in the idrac.ipmiserial group.
For more information, see the iDRAC RACADM CLI Guide available at www.dell.com/idracmanuals.
NOTE: If the boot loader or operating system provides serial redirection such as GRUB or Linux, then the BIOS
Redirection After Boot setting must be disabled. This is to avoid potential race condition of multiple components
accessing the serial port.
2. Update the IPMI SOL minimum privilege level using the command.
<level> = 3 Operator
<level> = 4 Administrator
NOTE: To activate IPMI SOL, you must have the minimum privilege defined in IMPI SOL. For more information, see
the IPMI 2.0 specification.
3. Update the IPMI SOL baud rate using the command.
NOTE: To redirect the serial console over LAN, make sure that the SOL baud rate is identical to the managed
system’s baud rate.
NOTE: To redirect the serial console over LAN, ensure that the SOL baud rate is identical to the baud rate of the
managed system.
• SSH
NOTE: If required, you can change the default SOL time-out at iDRAC Settings > Services.
1. Install IPMITool from the Dell Systems Management Tools and Documentation DVD.
For installation instructions, see the Software Quick Installation Guide.
2. At the command prompt (Windows or Linux), run the following command to start SOL from iDRAC:
This command connected the management station to the managed system's serial port.
3. To quit a SOL session from IPMItool, press ~ and then . (period).
NOTE: If a SOL session does not terminate, reset iDRAC and allow up to two minutes to complete booting.
NOTE: If a SOL session created using RACADM tool exists, starting another SOL session using IPMI tool will not show
any notification or error about the existing sessions.
NOTE: The port number is optional. It is required only when the port number is reassigned.
2. Run the command console com2 or connect to start SOL and boot the managed system.
A SOL session from the management station to the managed system using the SSH or Telnet protocol is opened. To access the
iDRAC command-line console, follow the ESC key sequence. Putty and SOL connection behavior:
• While accessing the managed system through putty during POST, if the Function keys and keypad option on putty is set to:
• VT100+ — F2 passes, but F12 cannot pass.
• ESC[n~ — F12 passes, but F2 cannot pass.
• In Windows, if the Emergency Management System (EMS) console is opened immediately after a host reboot, the Special Admin
Console (SAC) terminal may get corrupted. Quit the SOL session, close the terminal, open another terminal, and start the SOL
session using the same command.
1. Start a shell.
2. Connect to iDRAC using the following command:
NOTE: You can use console com1 or console com2 to start SOL. Reboot the server to establish the connection.
The console -h com2 command displays the contents of the serial history buffer before waiting for input from the keyboard or
new characters from the serial port.
The default (and maximum) size of the history buffer is 8192 characters. You can set this number to a smaller value using the
command:
Parameter Description
<IP address> IP address for the iDRAC
<port number> Telnet port number (if you are using a new port)
NOTE: IPMI also supports IPv6 address protocol for Linux-based operating systems.
NOTE: This setting determines the IPMI commands that are executed using IPMI over LAN interface. For more
information, see the IPMI 2.0 specifications at intel.com.
2. Update the IPMI channel privileges.
<level> = 3 Operator
<level> = 4 Administrator
3. Set the IPMI LAN channel encryption key ,if required.
NOTE: The iDRAC IPMI supports the RMCP+ protocol. For more information, see the IPMI 2.0 specifications at
intel.com.
NOTE: From iDRAC v2.30.30.30 or later, IPMI supports IPv6 address protocol for Linux-based operating systems.
3. Disable GRUB's graphical interface and use the text-based interface. Else, the GRUB screen is not displayed in RAC Virtual Console.
To disable the graphical interface, comment-out the line starting with splashimage.
The following example provides a sample /etc/grub.conf file that shows the changes described in this procedure.
4. To enable multiple GRUB options to start Virtual Console sessions through the RAC serial connection, add the following line to all
options:
console=ttyS1,115200n8r console=tty1
#inittab This file describes how the INIT process should set up
#the system in a certain run-level.
#Author:Miquel van Smoorenburg
#Modified for RHS Linux by Marc Ewing and Donnie Barnes
#Default runlevel. The runlevels used by RHS are:
#0 - halt (Do NOT set initdefault to this)
#1 - Single user mode
#2 - Multiuser, without NFS (The same as 3, if you do not have #networking)
#3 - Full multiuser mode
#4 - unused
#5 - X11
#6 - reboot (Do NOT set initdefault to this)
id:3:initdefault:
#System initialization.
In the file /etc/securetty add a new line with the name of the serial tty for COM2:
ttyS1
The following example shows a sample file with the new line.
NOTE: Use the Break Key Sequence (~B) to execute the Linux Magic SysRq key commands on serial console using IPMI
Tool.
vc/1
vc/2
vc/3
vc/4
vc/5
vc/6
vc/7
vc/8
vc/9
vc/10
vc/11
tty1
tty2
tty3
tty4
tty5
tty6
tty7
tty8
tty9
tty10
tty11
ttyS1
Asymmetric Cryptography
Public key ssh-rsa
ecdsa-sha2-nistp256
Symmetric Cryptography
Key Exchange [email protected]
ecdh-sha2-nistp256
ecdh-sha2-nistp384
ecdh-sha2-nistp521
diffie-hellman-group-exchange-sha256
diffie-hellman-group14-sha1
Encryption [email protected]
aes128-ctr
aes192-ctr
aes256-ctr
[email protected]
[email protected]
MAC hmac-sha1
hmac-ripemd160
[email protected]
Compression None
NOTE: If you enable OpenSSH 7.0 or later, DSA public key support is disabled. To ensure better security for iDRAC, Dell
recommends not enabling DSA public key support.
Follow the instructions. After the command executes, upload the public file.
CAUTION: Keys generated from the Linux management station using ssh-keygen are in non-4716 format. Convert the
keys into the 4716 format using ssh-keygen -e -f /root/.ssh/id_rsa.pub > std_rsa.pub. Do not change the
permissions of the key file. The conversion must be done using default permissions.
• For local RACADM: racadm sshpkauth -i <2 to 16> -k <1 to 4> -f <filename>
• From remote RACADM using Telnet or SSH: racadm sshpkauth -i <2 to 16> -k <1 to 4> -t <key-text>
For example, to upload a valid key to iDRAC User ID 2 in the first key space using a file, run the following command:
NOTE: The password must include one uppercase and one lower case letter, one number and a special character.
Use the following characters while creating user names and passwords:
0-9 1–16
A-Z
a-z
-!#$%&()*/;?@[\]^_`{|}~+<=>
0-9 1–20
A-Z
a-z
'-!"#$%&()*,./:;?@[\]^_`{|}~+<=>
NOTE: You may be able to create user names and passwords that include other characters. However, to ensure
compatibility with all interfaces, Dell recommends using only the characters listed here.
NOTE: The characters allowed in user names and passwords for network shares are determined by the network-share
type. iDRAC supports valid characters for network share credentials as defined by the share type, except <, >, and ,
(comma).
Several parameters and object IDs are displayed with their current values. The key field is iDRAC.Users.UserName=. If a user name is
displayed after =, that index number is taken.
NOTE: You can utilize
myfile.cfg
Parameter Description
<index> Unique index of the user
<user_name> User name
2. Set the password.
racadm set.idrac.users.<index>.enable 1
For more information, see the iDRAC RACADM CLI Guide available at www.dell.com/idracmanuals.
2. Type the following commands with the new user name and password.
NOTE: The default privilege value is 0, which indicates the user has no privileges enabled. For a list of valid bit-mask
values for specific user privileges, see the iDRAC RACADM CLI Guide available at www.dell.com/idracmanuals.
NOTE: If your system is running Windows 2000, the following steps may vary.
NOTE: If iDRAC firmware SSL certificate is CA-signed and the certificate of that CA is already in the domain controller's
Trusted Root Certificate Authority list, do not perform the steps in this section.
To import iDRAC firmware SSL certificate to all domain controller trusted certificate lists:
1. Download iDRAC SSL certificate using the following RACADM command:
racadm sslcertdownload -t 1 -f <RAC SSL certificate>
2. On the domain controller, open an MMC Console window and select Certificates > Trusted Root Certification Authorities.
3. Right-click Certificates, select All Tasks and click Import.
4. Click Next and browse to the SSL certificate file.
5. Install iDRAC SSL Certificate in each domain controller’s Trusted Root Certification Authority.
If you have installed your own certificate, make sure that the CA signing your certificate is in the Trusted Root Certification
Authority list. If the Authority is not in the list, you must install it on all your domain controllers.
6. Click Next and select whether you want Windows to automatically select the certificate store based on the type of certificate, or
browse to a store of your choice.
7. Click Finish and click OK. The iDRAC firmware SSL certificate is imported to all domain controller trusted certificate lists.
NOTE: The Bit Mask values are used only when setting Standard Schema with the RACADM.
1. In the iDRAC web interface, go to iDRAC Settings > Users > Directory Services.
• Enter the Fully Qualified Domain Name (FQDN) of the domain controller, not the FQDN of the domain. For example, enter
servername.dell.com instead of dell.com.
• For bit-mask values for specific Role Group permissions, see Default role group privileges.
• You must provide at least one of the three domain controller addresses. iDRAC attempts to connect to each of the configured
addresses one-by-one until it makes a successful connection. With Standard Schema, these are the addresses of the domain
controllers where the user accounts and the role groups are located.
• The Global Catalog server is only required for standard schema when the user accounts and role groups are in different domains. In
multiple domain case, only the Universal Group can be used.
• If certificate validation is enabled, the FQDN or IP address that you specify in this field must match the Subject or Subject
Alternative Name field of your domain controller certificate.
• To disable the certificate validation during SSL handshake, use the following command:
In this case, you must upload the CA certificate using the following command:
NOTE: If certificate validation is enabled, specify the Domain Controller Server addresses and the Global Catalog
FQDN. Ensure that DNS is configured correctly under Overview > iDRAC Settings > Network.
Using the following RACADM command may be optional.
2. If DHCP is enabled on iDRAC and you want to use the DNS provided by the DHCP server, enter the following command:
3. If DHCP is disabled on iDRAC or you want manually enter the DNS IP address, enter the following RACADM command:
4. If you want to configure a list of user domains so that you only need to enter the user name when logging in to the web interface, use
the following command:
You can configure up to 40 user domains with index numbers between 1 and 40.
You can create as many or as few association objects as required. However, you must create at least one Association Object, and you
must have one iDRAC Device Object for each iDRAC device on the network that you want to integrate with Active Directory for
Authentication and Authorization with iDRAC.
The Association Object allows for as many or as few users and/or groups as well as iDRAC Device Objects. However, the Association
Object only includes one Privilege Object per Association Object. The Association Object connects the Users who have Privileges on
iDRAC devices.
The Dell extension to the ADUC MMC Snap-in only allows associating the Privilege Object and iDRAC Objects from the same domain with
the Association Object. The Dell extension does not allow a group or an iDRAC object from other domains to be added as a product
member of the Association Object.
When adding Universal Groups from separate domains, create an Association Object with Universal Scope. The Default Association
objects created by the Dell Schema Extender Utility are Domain Local Groups and they do not work with Universal Groups from other
domains.
Users, user groups, or nested user groups from any domain can be added into the Association Object. Extended Schema solutions support
any user group type and any user group nesting across multiple domains allowed by Microsoft Active Directory.
The figure shows two Association Objects—A01 and A02. User1 is associated to iDRAC2 through both association objects.
Extended Schema Authentication accumulates privileges to allow the user the maximum set of privileges possible considering the assigned
privileges of the different privilege objects associated to the same user.
In this example, User1 has both Priv1 and Priv2 privileges on iDRAC2. User1 has Priv1 privileges on iDRAC1 only. User2 has Priv1 privileges
on both iDRAC1 and iDRAC2. In addition, this figure shows that User1 can be in a different domain and can be a member of a group.
NOTE: Extending the new schema has no impact on previous versions of the product.
You can extend your schema using one of the following methods:
• Dell Schema Extender utility
• LDIF script file
If you use the LDIF script file, the Dell organizational unit is not added to the schema.
The LDIF files and Dell Schema Extender are on your Dell Systems Management Tools and Documentation DVD in the following
respective directories:
• DVDdrive :\SYSMGMT\ManagementStation\support\OMActiveDirectory_Tools\Remote_Management_Advanced
\LDIF_Files
• <DVDdrive>: \SYSMGMT\ManagementStation\support\OMActiveDirectory_Tools
\Remote_Management_Advanced\Schema Extender
To use the LDIF files, see the instructions in the readme included in the LDIF_Files directory.
Table 23. Class definitions for classes added to the active directory schema
delliDRACDevice 1.2.840.113556.1.8000.1280.1.7.1.1
delliDRACAssociation 1.2.840.113556.1.8000.1280.1.7.1.2
dellRAC4Privileges 1.2.840.113556.1.8000.1280.1.1.1.3
dellPrivileges 1.2.840.113556.1.8000.1280.1.1.1.4
dellProduct 1.2.840.113556.1.8000.1280.1.1.1.5
OID 1.2.840.113556.1.8000.1280.1.7.1.1
SuperClasses dellProduct
Attributes dellSchemaVersion
dellRacType
OID 1.2.840.113556.1.8000.1280.1.7.1.2
SuperClasses Group
Attributes dellProductMembers
dellPrivilegeMember
OID 1.2.840.113556.1.8000.1280.1.1.1.3
SuperClasses None
Attributes dellIsLoginUser
dellIsCardConfigAdmin
dellIsUserConfigAdmin
dellIsLogClearAdmin
dellIsServerResetUser
dellIsConsoleRedirectUser
dellIsVirtualMediaUser
dellIsTestAlertUser
dellIsDebugCommandAdmin
OID 1.2.840.113556.1.8000.1280.1.1.1.4
SuperClasses User
Attributes dellRAC4Privileges
OID 1.2.840.113556.1.8000.1280.1.1.1.5
Description The main class from which all Dell products are derived.
SuperClasses Computer
Attributes dellAssociationMembers
Adding privileges
To add privileges:
Click the Privilege Object tab to add the privilege object to the association that defines the user’s or user group’s privileges when
authenticating to an iDRAC device. Only one privilege object can be added to an Association Object.
1. Select the Privileges Object tab and click Add.
2. Enter the privilege object name and click OK.
3. Click the Privilege Object tab to add the privilege object to the association that defines the user’s or user group’s privileges when
authenticating to an iDRAC device. Only one privilege object can be added to an Association Object.
1. In the iDRAC Web interface, go to iDRAC Settings > Users > Directory Services > Microsoft Active Directory. Click Edit
The Active Directory Configuration and Management Step 1 of 4 page is displayed.
2. Optionally, enable certificate validation and upload the CA-signed digital certificate used during initiation of SSL connections when
communicating with the Active Directory (AD) server.
3. Click Next.
The Active Directory Configuration and Management Step 2 of 4 page is displayed.
• If certificate validation is enabled, specify the Domain Controller Server addresses and the FQDN. Make sure that
DNS is configured correctly under iDRAC Settings > Network
• If the user and iDRAC objects are in different domains, then do not select the User Domain from Login option.
Instead select Specify a Domain option and enter the domain name where the iDRAC object is available.
5. Click Next. The Active Directory Configuration and Management Step 3 of 4 page is displayed.
6. Select Extended Schema and click Next.
The Active Directory Configuration and Management Step 4 of 4 page is displayed.
7. Enter the name and location of the iDRAC device object in Active Directory (AD) and click Finish.
The Active Directory settings for extended schema mode is configured.
• Enter the Fully Qualified Domain Name (FQDN) of the domain controller, not the FQDN of the domain. For example, enter
servername.dell.com instead of dell.com.
• You must provide at least one of the three addresses. iDRAC attempts to connect to each of the configured addresses one-by-
one until it makes a successful connection. With Extended Schema, these are the FQDN or IP addresses of the domain controllers
where this iDRAC device is located.
• To disable the certificate validation during SSL handshake, use the following command:
In this case, you must upload a CA certificate using the following command:
NOTE: If certificate validation is enabled, specify the Domain Controller Server addresses and the FQDN. Ensure
that DNS is configured correctly under iDRAC Settings > Network.
Using the following RACADM command may be optional:
2. If DHCP is enabled on iDRAC and you want to use the DNS provided by the DHCP server, enter the following command:
4. If you want to configure a list of user domains so that you only need to enter the user name during log in to iDRAC web interface, use
the following command:
You can configure up to 40 user domains with index numbers between 1 and 40.
1. In the iDRAC Web interface, go to iDRAC Settings > Users > Directory Services > Generic LDAP Directory Service, click Edit.
NOTE: In this release, nested group is not supported. The firmware searches for the direct member of the group to
match the user DN. Also, only single domain is supported. Cross domain is not supported.
5. Click Next.
The Generic LDAP Configuration and Management Step 3a of 3 page is displayed.
6. Click Role Group.
The Generic LDAP Configuration and Management Step 3b of 3 page is displayed.
7. Specify the group distinguished name, the privileges associated with the group, and click Apply.
NOTE: If you are using Novell eDirectory and if you have used these characters—#(hash), "(double quotes), ;(semi
colon), > (greater than), , (comma), or <(lesser than)—for the Group DN name, they must be escaped.
The role group settings are saved. The Generic LDAP Configuration and Management Step 3a of 3 page displays the role group
settings.
8. If you want to configure additional role groups, repeat steps 7 and 8.
9. Click Finish. The generic LDAP directory service is configured.
NOTE: When generic LDAP is enabled, iDRAC first tries to login the user as a directory user. If it fails, local user
lookup is enabled.
The test results and the test log are displayed.
NOTE: To enable Lockdown mode, you must have iDRAC Enterprise license and System Control privileges.
Following are a few of the tasks that can be performed even if the system is in Lockdown mode:
• Power cap setting
• System power operations (power on/off, reset)
• Power priority
• Identify operations (Chassis or PERC)
• Part replacement
• Running diagnostics
• Modular operations (VLan configuration, FlexAddress)
• Group Manager passcode
The following table lists the functional and non-functional features, interfaces, and utilities that are affected by Lockdown mode:
NOTE: Changing the boot order using iDRAC is not supported when lockdown mode is enabled. However, boot-control
option is available in vConsole menu, which has no effect when iDRAC is in lock down mode.
• OMSA/OMSS • All Vendor tools that have direct access to the device
• IPMI • PERC
• DRAC/LC • PERC CLI
• DTK-Syscfg • DTK-RAIDCFG
• Redfish • F2/Ctrl+R
• OpenManage Essentials • NVMe
• BIOS (F2 settings become read-only)
• DTK-RAIDCFG
• F2/Ctrl+R
• BOSS-S1
• Marvell CLI
• F2/Ctrl+R
• Part replacement, Easy Restore, and system board replacement
• Power capping
• System power operations ( power on, off, reset)
• Identify devices (chassis and PERC)
NOTE: When lockdown mode is enabled, OpenID Connect login option is not displayed in iDRAC login page.
The encryption type is AES256-SHA1. The principal type is KRB5_NT_PRINCIPAL. The properties of the user account to which the
Service Principal Name is mapped to must have Use AES 256 encryption types for this account property enabled.
NOTE: Use lowercase letters for the iDRACname and Service Principal Name. Use uppercase letters for the domain
name as shown in the example.
3. Run the following command:
1. Verify whether the iDRAC DNS name matches the iDRAC Fully Qualified Domain Name. To do this, in iDRAC Web interface, go to
iDRAC Settings > Network > Common Settings and see the DNS iDRAC Name property.
2. While configuring Active Directory to setup a user account based on standard schema or extended schema, perform the following two
additional steps to configure SSO:
• Upload the keytab file on the Active Directory Configuration and Management Step 1 of 4 page.
• Select Enable Single Sign-On option on the Active Directory Configuration and Management Step 2 of 4 page.
Filtering alerts
You can filter alerts based on category and severity.
1. In iDRAC Web interface, go to Configuration > System Settings > Alerts and Remote System Log Configuration.
2. Under Alerts and Remote System Log Configuration section, select Filter:
• System Health — System Health category represents all the alerts that are related to hardware within the system chassis.
Examples include temperature errors, voltage errors, device errors.
• Storage Health — Storage Health category represents alerts that are related to the storage subsystem. Examples include,
controller errors, physical disk errors, virtual disk errors.
• Configuration — Configuration category represents alerts that are related to hardware, firmware and software configuration
changes. Examples include, PCI-e card added/removed, RAID configuration changed, iDRAC license changed.
• Audit — Audit category represents the audit log. Examples include, user login/logout information, Password authentication
failures, session info, power states.
• Updates — Update category represents alerts that are generated due to firmware/Driver upgrades/downgrades.
NOTE: This doesn’t represent firmware inventory.
• Work Notes
3. Select one or more of the following severity levels:
• Informational
• Warning
• Critical
4. Click Apply.
The Alert Results section displays the results based on the selected category and severity.
NOTE: You must have Configure iDRAC privilege to set the alert recurrence value.
Parameter Description
<index> Destination index. Allowed values are 1 through 8.
Parameter Description
<index> Destination index. Allowed values are 1 through 8.
<Address> A valid IPv4, IPv6, or FQDN address
3. Configure the SNMP community name string:
Parameter Description
<community_name> The SNMP Community Name.
4. To configure SNMP destination:
• Set the SNMP trap destination for SNMPv3:
For more information, see the iDRAC RACADM CLI Guide available at www.dell.com/idracmanuals.
NOTE: Email alerts support both IPv4 and IPv6 addresses. The iDRAC DNS Domain Name must be specified when using
IPv6.
NOTE: If you are using an external SMTP server, ensure that iDRAC can communicate with that server. If the server is
unreachable, the error RAC0225 is displayed while trying to send a test mail.
Parameter Description
index Email destination index. Allowed values are 1 through 4.
Parameter Description
index Email destination index. Allowed values are 1 through 4.
email-address Destination email address that receives the platform event alerts.
3. To configure a custom message:
Parameter Description
index Email destination index to be tested. Allowed values are 1 through 4.
For more information, see the iDRAC RACADM CLI Guide available at www.dell.com/idracmanuals.
Configuring SMTP email server address settings using iDRAC web interface
To configure the SMTP server address:
1. In iDRAC Web interface, go to Configuaration > System Settings > Alert Configuration > SNMP (E-mail Configuration).
2. Enter the valid IP address or fully qualified domain name (FQDN) of the SMTP server to be used in the configuration.
3. Select the Enable Authentication option and then provide the user name and password (of a user who has access to SMTP server).
4. Enter the SMTP port number.
For more information about the fields, see the iDRAC Online Help.
5. Click Apply.
The SMTP settings are configured.
Configuring WS Eventing
The WS Eventing protocol is used for a client service (subscriber) to register interest (subscription) with a server (event source) for
receiving messages containing the server events (notifications or event messages). Clients interested in receiving the WS Eventing
messages can subscribe with iDRAC and receive Lifecycle Controller job related events.
The steps required to configure WS Eventing feature to receive WS Eventing messages for changes related to Lifecycle Controller jobs
are described in the Web service Eventing Support for iDRAC 1.30.30 specification document. In addition to this specification, see the
DSP0226 (DMTF WS Management Specification), Section 10 Notifications (Eventing) document for the complete information on the WS
Eventing protocol. The Lifecycle Controller related jobs are described in the DCIM Job Control Profile document.
For more information, see the iDRAC RACADM CLI Guide available at www.dell.com/idracmanuals.
Message ID Description
AMP Amperage
BAR Backup/Restore
CBL Cable
CPU Processor
DH Cert Mgmt
DIS Auto-Discovery
FSD Debug
ITR Intrusion
LC Lifecycle Controller
LIC Licensing
MEM Memory
OSD OS Deployment
OSE OS Event
PR Part Exchange
RDU Redundancy
RED FW Download
RFM FlexAddress SD
STOR Storage
TMP Temperature
VF vFlash SD card
VLT Voltage
NOTE: For better user experience Group Manager supports up to 100 server nodes.
Topics:
• Group Manager
• Summary View
• Manage Logins
• Configure Alerts
• Export
• Discovered Servers View
• Jobs View
• Jobs Export
• Group Information Panel
• Group Settings
• Actions on a selected Server
Group Manager
To use Group Manager feature, you need to enable the Group Manager from iDRAC index page or on the Group Manager Welcome
screen. The group manager welcome screen provides options listed in the below table.
Create New Group Allows you to create a new group. The specific iDRAC which has
created the group would be the master (primary controller) of the
group.
Disable Group Manager for this System You can select this option in case you do not want to join any group
from a specific system. However, you can access Group Manager
at any point of time by selecting Open Group Manager from the
iDRAC index page. Once you disable the group manager, user
needs to wait for 60 seconds to perform any further group
manager operations.
Once the group manager feature is enabled, that iDRAC allows you the option to create or join an iDRAC local group. More than one
iDRAC group can be setup in the local network but an individual iDRAC can only be a member of one group at a time. To change group
(join a new group) the iDRAC must first leave its current group and then join the new group. The iDRAC from where the group was
created gets chosen as the primary controller of the group by default. The user does not define a dedicated group manager primary
controller to control that group. The primary controller hosts the group manager web interface and provides the GUI based work flows.
Summary View
You need to have administrator privileges to access group manager pages. If a non-administrator user logs onto the iDRAC, the group
manager section does not appear with their credentials. The group manager home page (summary view) is broadly categorized as three
sections. The first section shows rollup summary with aggregated summary details.
• Total number of servers in the local group.
• Chart showing number of servers per server model.
• Doughnut chart showing the servers per their health status (clicking on a chart section filters the server list to show only the servers
with selected health).
• Warning box if there is a duplicate group detected in the local network. Duplicate group is typically the group with the same name but
with a different passcode. This warning box does not appear if there is no duplicate group.
• Displays the iDRACs, that are controlling the group (Primary and Secondary controller).
The second section provides buttons for actions that are taken on the group as whole and the third section displays the list of all iDRACs
in the group.
It shows all the systems in the group and their current health status and allows the user to take corrective action as needed. Server
attributes specific to a server is described in the below table.
The System Information panel provides further details on the server like iDRAC network connectivity status, server host power state,
express service code, operating system, asset tag, node ID, IDRAC DNS name, Server BIOS version, Server CPU information, System
memory and location information. You may double click on a row or click on the launch iDRAC button to perform a single sign on redirect
to the selected iDRAC index page. On the selected server, virtual console can be accessed or server power actions can be performed
from More Actions dropped down list.
Manage iDRAC user logins, Alert configuration and group inventory export are the group actions supported.
Manage Logins
Use this section to Add New User, Change User Password and Delete User from the Group.
Group jobs including Manage Logins are one time configurations of the servers. Group manager uses SCP and jobs to make any changes.
Every iDRAC in the group owns an individual job in its job queue for each Group Manager job. Group Manager does not detect changes on
member iDRACs or lock member configurations.
NOTE: Group jobs does not configure or override the lockdown mode for any specific iDRAC.
Leaving a group does not change local user or change settings on a member iDRAC.
NOTE: Any member iDRAC with system lockdown enabled, that is part of the same group returns an error that the user
password was not updated.
Delete User
Use this section to delete users from all the group servers. A group job would be created to delete users from all the group servers. The
status of group job can be found at GroupManager > Jobs page.
If user already exists on a member iDRAC then the user can be deleted. Any member iDRAC with system lockdown enabled that is part of
the group returns an error that the user is not deleted. If the user does not exist then it shows a successful deletion for that iDRAC. The
list of users shown in Group Manager GUI is based on the current user list on the iDRAC which is acting as the primary controller. It does
not show all users for all iDRACs.
Configure Alerts
Use this section to configure e-mail alerts. By default alerting is disabled. However, you can enable the alerting anytime. A group job would
be created to apply the e-mail alert configuration to all the group servers. The status of group job can be monitored at GroupManager >
Jobs page. Group manager email alert configures email alerts on all members. It sets the SMTP server settings on all members in the same
group. Each iDRAC is configured separately. Email configuration is not globally saved. Current values are based on the iDRAC that is acting
as a primary controller. Leaving a group does not reconfigure email alerts.
For more information on Configuring Alerts, see Configuring iDRAC to send alerts.
Export
Use this section to export the Group Summary to the local system. The information can be exported to a csv file format. It contains data
related to each individual system in the group. Export includes the following information in csv format. Server details:
• Health
• Host Name
• iDRAC IPV4 Address
• iDRAC IPV6 Address
• Asset Tag
• Model
• iDRAC Firmware Version
• Last Status Update
• Express Service Code
• iDRAC Connectivity
• Power State
• Operating System
• Service Tag
• Node ID
• iDRAC DNS Name
• BIOS Version
• CPU Details
• System Memory(MB)
• Location Details
NOTE: In case, you are using Internet Explorer, disable the Enhanced Security settings to successfully download the csv
file.
Ignore Allows you to ignore the systems from the discovered servers list,
in case you do not want to add them in any group.
Un-Ignore Allows you to select the systems that you would like to reinstate in
the discovered servers list.
Jobs View
Jobs view allows the user to track the progress of a group job, helps with simple recovery steps to correct connectivity induced failures. It
also shows the history of the last group actions that were performed as an audit log. The user can use the jobs view to track the progress
of the action across the group or to cancel an action that is schedule to occur in the future. The Jobs view allows the user to view the
status of the last 50 jobs that have been run and any success or failures that has occurred.
Export You can export the group job information to the local system for
future references. The jobs list can be exported to csv file format.
It contains data related to individual job.
NOTE: For each job entry, the list of systems provide details up to 100 systems. Each system entry contains Hostname,
Service Tag, Member Job Status and Message if in case the job failed.
All Group actions that create jobs are performed on all the group members with immediate effect. You can perform the following tasks:
• Add/Edit/Remove users
• Configure email alerts
• Change group passcode and name
NOTE: Group jobs complete quickly as long as all members are online and accessible. It may take 10 minutes from job
start to job complete. A job will wait and retry for up to 10 hours for the systems that are not accessible.
NOTE: While an onboarding job is running no other Job can be scheduled. Jobs include:
Attempting to invoke another Job while an Onboarding task is active, consequences GMGR0039 error code. Once the
onboarding task has made its first attempt to onboard all the new systems, Jobs can be created at any point in time.
Group Settings
Group settings page provides a listing of selected group attributes.
Allows the user to perform actions listed on the table below on the group. A group configuration job would be created for these actions
(change group name, change group passcode, remove the members and delete the group). The status of group job can be viewed or
modified from GroupManager > Jobs page.
NOTE: Clear Log only appears if you have Clear Logs permission.
After the SEL is cleared, an entry is logged in the Lifecycle Controller log. The log entry includes the user name and the IP address from
where the SEL was cleared.
NOTE: Lifecycle logs for Personality Mode change is generated only during the warm boot of the host.
If you initiate configuration jobs using RACADM CLI or iDRAC web interface, the Lifecycle log contains information about the user,
interface used, and the IP address of the system from which you initiate the job.
Monitoring power
iDRAC monitors the power consumption in the system continuously and displays the following power values:
• Power consumption warning and critical thresholds.
• Cumulative power, peak power, and peak amperage values.
• Power consumption over the last hour, last day or last week.
• Average, minimum, and maximum power consumption.
• Historical peak values and peak timestamps.
• Peak headroom and instantaneous headroom values (for rack and tower servers).
NOTE: The histogram for the system power consumption trend (hourly, daily, weekly) is maintained only while iDRAC is
running. If iDRAC is restarted, the existing power consumption data is lost and the histogram is restarted.
NOTE: The Warning Threshold value is reset to the default value after performing a racreset or an iDRAC update.
Power capping
You can view the power threshold limits that covers the range of AC and DC power consumption that a system under heavy workload
presents to the datacenter. This is a licensed feature.
Multi-Vector Cooling
Multi-Vector Cooling implements multi-prong approach to Thermal Controls in Dell EMC Server Platforms. You can configure multi-vector
cooling options through iDRAC web interface by navigating to Configuration > System Settings > Hardware Settings > Fan
Configuration. It includes (but not limited to):
• Large set of sensors (thermal, power, inventory etc.) that allows accurate interpretation of real-time system thermal state at various
locations within the server. It displays only a small subset of sensors that are relevant to users need based on the configuration.
• Intelligent and adaptive closed loop control algorithm optimizes fan response to maintain component temperatures. It also conserves
fan power, airflow consumption, and acoustics.
• Using fan zone mapping, cooling can be initiated for the components when it requires. Thus, it results maximum performance without
compromising the efficiency of power utilization.
• Accurate representation of slot by slot PCIe airflow in terms of LFM metric (Linear Feet per Minute - an accepted industry standard
on how PCIe card airflow requirement is specified). Display of this metric in various iDRAC interfaces allows user to:
1. know the maximum LFM capability of each slot within the server.
2. know what approach is being taken for PCIe cooling for each slot (airflow controlled, temperature controlled).
3. know the minimum LFM being delivered to a slot, if the card is a 3rd Party Card (user defined custom card).
4. dial in custom minimum LFM value for the 3rd Party Card allowing more accurate definition of the card cooling needs for which the
user is better aware of through their custom card specification.
• Displays real-time system airflow metric (CFM, cubic feet per minute) in various iDRAC interfaces to the user to enable datacenter
airflow balancing based on aggregation of per server CFM consumption.
• Allows custom thermal settings like Thermal Profiles (Maximum Performance vs. Maximum Performance per Watt, Sound Cap),
custom fan speed options (minimum fan speed, fan speed offsets) and custom Exhaust Temperature settings.
1. Most of these settings allow additional cooling over the baseline cooling generated by thermal algorithms and do not allow fan
speeds to go below system cooling requirements.
NOTE: One exception to above statement is for fan speeds that are added for 3rd Party PCIe cards. The thermal
algorithm provision airflow for 3rd party cards may be more or less than the actual card cooling needs and
customer may fine tune the response for the card by entering the LFM corresponding to the 3rd Party Card.
2. Custom Exhaust Temperature option limits exhaust temperature to customer desired settings.
Connection View
Manually checking and troubleshooting the servers’ networking connections is unmanageable in a datacenter environment. iDRAC9
streamlines the job with iDRAC Connection View. This feature allows you to remotely check and troubleshoot network connections from
the same centralized GUI that you are using for deploying, updating, monitoring, and maintaining the servers. Connection View in iDRAC9
NOTE: Switch Connection ID and Switch Port Connection ID are available once the Connection View is enabled and the
Link is connected. The associated network card needs to be compatible with the Connection View. Only users with
iDRAC Configure privilege can modify the Connection View settings.
NOTE: Some cards with the virtual FIP, virtual WWN, and virtual WWPN MAC attributes, the virtual WWN and virtual
WWPN MAC attributes are automatically configured when you configure virtual FIP.
Using the IO Identity feature, you can:
• View and configure the virtual addresses for network and fibre channel devices (for example, NIC, CNA, FC HBA).
• Configure the initiator (for iSCSI and FCoE) and storage target settings (for iSCSI, FCoE, and FC).
• Specify persistence or clearance of the configured values over a system AC power loss, cold, and warm system resets.
The values configured for virtual addresses, initiator and storage targets may change based on the way the main power is handled during
system reset and whether the NIC, CNA, or FC HBA device has auxiliary power. The persistence of IO identity settings can be achieved
based on the policy setting made using iDRAC.
Only if the I/O identity feature is enabled, the persistence policies take effect. Each time the system resets or powers on, the values are
persisted or cleared based on the policy settings.
NOTE: After the values are cleared, you cannot re-apply the values before running the configuration job.
• X550 DP BT LP PCIe 2 x 10 Gb
After enabling this feature, you must restart the system for the settings to take effect.
To disable I/O Identity Optimization, use the command:
NOTE: When a persistent policy is disabled and when you perform the action to lose the virtual address, re-enabling the
persistent policy does not retrieve the virtual address. You must set the virtual address again after you enable the
persistent policy.
NOTE: If there is a persistence policy in effect and the virtual addresses, initiator, or storage targets are set on a CNA-
device partition, do not reset or clear the values configured for virtual addresses, initiator, and storage targets before
changing the VirtualizationMode or the personality of the partition. The action is performed automatically when you
disable the persistence policy. You can also use a configuration job to explicitly set the virtual address attributes to 0s
and the initiator and storage targets values as defined in iSCSI initiator and storage target default values.
iSCSI Initiator Default Values in IPv4 mode Default Values in IPv6 mode
IscsiInitiatorIpAddr 0.0.0.0 ::
IscsiInitiatorIpv6Addr :: ::
IscsiInitiatorSubnetPrefix 0 0
IscsiInitiatorGateway 0.0.0.0 ::
IscsiInitiatorIpv6Gateway :: ::
IscsiInitiatorPrimDns 0.0.0.0 ::
IscsiInitiatorIpv6PrimDns :: ::
IscsiInitiatorSecDns 0.0.0.0 ::
IscsiInitiatorIpv6SecDns :: ::
IPVer Ipv4
iSCSI Storage Target Attributes Default Values in IPv4 mode Default Values in IPv6 mode
FirstTgtIpAddress 0.0.0.0 ::
FirstTgtBootLun 0 0
FirstTgtIpVer Ipv4
SecondTgtIpAddress 0.0.0.0 ::
SecondTgtBootLun 0 0
SecondTgtIpVer Ipv4
iDRAC has expanded its agent-free management to include direct configuration of the PERC controllers. It enables you to remotely
configure the storage components attached to your system at run-time. These components include RAID and non-RAID controllers and
the channels, ports, enclosures, and disks attached to them. For the 14th generation of PowerEdge servers, PERC 9 and PERC 10
controllers are supported.
The complete storage subsystem discovery, topology, health monitoring, and configuration are accomplished in the Comprehensive
Embedded Management (CEM) framework by interfacing with the internal and external PERC controllers through the MCTP protocol
over I2C interface. For real-time configuration, CEM supports PERC9 controllers and above. The firmware version for PERC9 controllers
must be 9.1 or later.
NOTE: The S140 or Software RAID (SWRAID) is not supported by CEM and thus is not supported in the iDRAC GUI.
SWRAID can be managed using the WSMan API and RACADM.
Using iDRAC, you can perform most of the functions that are available in OpenManage Storage Management including real-time (no
reboot) configuration commands (for example, create virtual disk). You can completely configure RAID before installing the operating
system.
You can configure and manage the controller functions without accessing the BIOS. These functions include configuring virtual disks and
applying RAID levels and hot spares for data protection. You can initiate many other controller functions such as rebuilds and
troubleshooting. You can protect your data by configuring data-redundancy or assigning hot spares.
The storage devices are:
• Controllers — Most operating systems do not read and write data directly from the disks, but instead send read and write instructions
to a controller. The controller is the hardware in your system that interacts directly with the disks to write and retrieve data. A
controller has connectors (channels or ports) which are attached to one or more physical disks or an enclosure containing physical
disks. RAID controllers can span the boundaries of the disks to create an extended amount of storage space— or a virtual disk —
using the capacity of more than one disk. Controllers also perform other tasks, such as initiating rebuilds, initializing disks, and more. To
complete their tasks, controllers require special software known as firmware and drivers. In order to function properly, the controller
must have the minimum required version of the firmware and the drivers installed. Different controllers have different characteristics
in the way they read and write data and execute tasks. It is helpful to understand these features to most efficiently manage the
storage.
• Physical disks or physical devices — Reside within an enclosure or are attached to the controller. On a RAID controller, physical disks
or devices are used to create virtual disks.
• Virtual disk — It is storage created by a RAID controller from one or more physical disks. Although a virtual disk may be created from
several physical disks, it is viewed by the operating system as a single disk. Depending on the RAID level used, the virtual disk may
retain redundant data if there is a disk failure or have particular performance attributes. Virtual disks can only be created on a RAID
controller.
• Enclosure — It is attached to the system externally while the backplane and its physical disks are internal.
• Backplane — It is similar to an enclosure. In a Backplane, the controller connector and physical disks are attached to the enclosure, but
it does not have the management features (temperature probes, alarms, and so on) associated with external enclosures. Physical disks
can be contained in an enclosure or attached to the backplane of a system.
In addition to managing the physical disks contained in the enclosure, you can monitor the status of the fans, power supply, and
temperature probes in an enclosure. You can hot-plug enclosures. Hot-plugging is defined as adding of a component to a system while the
operating system is still running.
The physical devices connected to the controller must have the latest firmware. For the latest supported firmware, contact your service
provider.
Storage events from PERC are mapped to SNMP traps and WSMan events as applicable. Any changes to the storage configurations are
logged in the Lifecycle Log.
Staged If all the set operations are staged, the Configuration is applied after reboot
configuration is staged and applied after
reboot or it is applied at real-time.
Topics:
• Understanding RAID concepts
• Supported controllers
• Supported enclosures
• Summary of supported features for storage devices
• Inventorying and monitoring storage devices
• Viewing storage device topology
• Managing physical disks
• Managing virtual disks
• Managing controllers
• Managing PCIe SSDs
• Managing enclosures or backplanes
• Choosing operation mode to apply settings
• Viewing and applying pending operations
• Storage devices — apply operation scenarios
• Blinking or unblinking component LEDs
What is RAID
RAID is a technology for managing the storage of data on the physical disks that reside or are attached to the system. A key aspect of
RAID is the ability to span physical disks so that the combined storage capacity of multiple physical disks can be treated as a single,
extended disk space. Another key aspect of RAID is the ability to maintain redundant data which can be used to restore data in the event
of a disk failure. RAID uses different techniques, such as striping, mirroring, and parity, to store and reconstruct data. There are different
RAID levels that use different methods for storing and reconstructing data. The RAID levels have different characteristics in terms of
read/write performance, data protection, and storage capacity. Not all RAID levels maintain redundant data, which means for some RAID
levels lost data cannot be restored. The RAID level you choose depends on whether your priority is performance, protection, or storage
capacity.
NOTE: The RAID Advisory Board (RAB) defines the specifications used to implement RAID. Although RAB defines the
RAID levels, commercial implementation of RAID levels by different vendors may vary from the actual RAID
RAID concepts
RAID uses particular techniques for writing data to disks. These techniques enable RAID to provide data redundancy or better
performance. These techniques include:
• Mirroring — Duplicating data from one physical disk to another physical disk. Mirroring provides data redundancy by maintaining two
copies of the same data on different physical disks. If one of the disks in the mirror fails, the system can continue to operate using the
unaffected disk. Both sides of the mirror contain the same data always. Either side of the mirror can act as the operational side. A
mirrored RAID disk group is comparable in performance to a RAID 5 disk group in read operations but faster in write operations.
• Striping — Disk striping writes data across all physical disks in a virtual disk. Each stripe consists of consecutive virtual disk data
addresses that are mapped in fixed-size units to each physical disk in the virtual disk using a sequential pattern. For example, if the
virtual disk includes five physical disks, the stripe writes data to physical disks one through five without repeating any of the physical
disks. The amount of space consumed by a stripe is the same on each physical disk. The portion of a stripe that resides on a physical
disk is a stripe element. Striping by itself does not provide data redundancy. Striping in combination with parity does provide data
redundancy.
• Stripe size — The total disk space consumed by a stripe not including a parity disk. For example, consider a stripe that contains 64KB
of disk space and has 16KB of data residing on each disk in the stripe. In this case, the stripe size is 64KB and the stripe element size is
16KB.
• Stripe element — A stripe element is the portion of a stripe that resides on a single physical disk.
• Stripe element size — The amount of disk space consumed by a stripe element. For example, consider a stripe that contains 64KB of
disk space and has 16KB of data residing on each disk in the stripe. In this case, the stripe element size is 16KB and the stripe size is
64KB.
• Parity — Parity refers to redundant data that is maintained using an algorithm in combination with striping. When one of the striped
disks fails, the data can be reconstructed from the parity information using the algorithm.
• Span — A span is a RAID technique used to combine storage space from groups of physical disks into a RAID 10, 50, or 60 virtual disk.
RAID levels
Each RAID level uses some combination of mirroring, striping, and parity to provide data redundancy or improved read and write
performance. For specific information on each RAID level, see Choosing raid levels.
NOTE: The H3xx PERC controllers do not support RAID levels 6 and 60.
The following topics provide specific information on how each RAID level store data as well as their performance and protection
characteristics:
• Raid level 0 (striping)
• Raid level 1 (mirroring)
• Raid level 5 (striping with distributed parity)
• Raid level 6 (striping with additional distributed parity)
• Raid level 50 (striping over raid 5 sets)
• Raid level 60 (striping over raid 6 sets)
• Raid level 10 (striping over mirror sets)
RAID 0 characteristics:
• Groups n disks as one large virtual disk with a capacity of (smallest disk size) *n disks.
• Data is stored to the disks alternately.
• No redundant data is stored. When a disk fails, the large virtual disk fails with no means of rebuilding the data.
• Better read and write performance.
RAID 5 characteristics:
• Groups n disks as one large virtual disk with a capacity of (n-1) disks.
• Redundant information (parity) is alternately stored on all disks.
• When a disk fails, the virtual disk still works, but it is operating in a degraded state. The data is reconstructed from the surviving disks.
RAID 6 characteristics:
• Groups n disks as one large virtual disk with a capacity of (n-2) disks.
• Redundant information (parity) is alternately stored on all disks.
• The virtual disk remains functional with up to two disk failures. The data is reconstructed from the surviving disks.
• Better read performance, but slower write performance.
• Increased redundancy for protection of data.
• Two disks per span are required for parity. RAID 6 is more expensive in terms of disk space.
RAID Level Data Availability Read Write Rebuild Minimum Disks Suggested
Performance Performance Performance Required Uses
RAID 0 None Very Good Very Good N/A N Noncritical data.
RAID 1 Excellent Very Good Good Good 2N (N = 1) Small databases,
database logs,
and critical
information.
RAID 5 Good Sequential reads: Fair, unless using Fair N + 1 (N = at least Databases and
good. writeback cache two disks) other read
Transactional intensive
reads: Very good transactional
uses.
RAID 10 Excellent Very Good Fair Good 2N x X Data intensive
environments
(large records).
RAID 50 Good Very Good Fair Fair N + 2 (N = at Medium sized
least 4) transactional or
Supported controllers
Supported RAID controllers
The iDRAC interfaces support the following BOSS controllers:
• BOSS-S1 Adapter
• BOSS-S1 Modular (for blade servers)
The iDRAC interfaces support the following PERC10 controllers:
• PERC H740P Mini
• PERC H740P Adapter
• PERC H840 Adapter
The iDRAC interfaces support the following PERC9 controllers:
• PERC H330 Mini
• PERC H330 Adapter
• PERC H730P Mini
• PERC H730P Adapter
Supported enclosures
iDRAC supports MD1400, and MD1420 enclosures.
NOTE: Redundant Array of Inexpensive Disks (RBODS) that are connected to HBA controllers are not supported.
NOTE: For iDRAC version 3.00.00.00, daisy chain of enclosures is not supported for H840. Only one enclosure per port
is allowed.
NOTE: PERC 10 no longer supports convert drives to non-RAID, convert controller to HBA mode and RAID 10 uneven
span support.
NOTE: If you enumerate the enclosure view's WSMan command on a system while one PSU-cable is removed, the
primary status of the enclosure view is reported as Healthy instead of Warning.
NOTE: The storage health rollup follows the same convention of Dell EMC OpenManage product. For more information
see the OpenManage Server Administrator User's Guide available at www.dell.com/openmanagemanuals.
NOTE: Physical disks in system with multiple backplanes may be listed under a different backplane. Use the blink
function to identify the disks.
NOTE: The storage hardware list is not displayed in case the system does not have storage devices with CEM support.
NOTE: When NVMe SSDs are in RAID mode behind S140 controller, web interface does not display NVMe SSD’s slot
information in the Enclosure page. Refer Physical Disks page for the details.
NOTE: If the NVMe SSDs in the backplane slots support NVMe-MI commands and the I2C connection to backplane slots
are fine, the iDRAC discovers these NVMe SSDs and reports them in the interfaces irrespective of the PCI connections
to the respective backplane slots.
For more information about the displayed properties and to use the filter options, see the iDRAC Online Help.
NOTE: From iDRAC v2.30.30.30 or later, you can add global hot spares when virtual disks are not created.
You can change the hot spare assignment by unassigning a disk and choosing another disk as needed. You can also assign more than one
physical disk as a global hot spare.
Global hot spares must be assigned and unassigned manually. They are not assigned to specific virtual disks. If you want to assign a hot
spare to a virtual disk (it replaces any physical disk that fails in the virtual disk), then see Assigning or unassigning dedicated hot spares.
When deleting virtual disks, all assigned global hot spares may be automatically unassigned when the last virtual disk associated with the
controller is deleted.
If you reset the configuration, the virtual disks are deleted and all the hot spares are unassigned.
You must be familiar with the size requirements and other considerations associated with hot spares.
Before assigning a physical disk as a global hot spare:
• Make sure that Lifecycle Controller is enabled.
• If there are no disk drives available in ready state, insert additional disk drives and make sure that the drives are in ready state.
• If physical disks are in non-RAID mode convert them to RAID mode using iDRAC interfaces such as iDRAC web interface, RACADM,
Redfish or WSMan, or <CTRL+R>.
NOTE: During POST, press F2 to enter System Setup or Device Setup. CTRL+R option is no longer supported for
PERC 10. CTRL+R only works with PERC 9 while boot mode is set to BIOS.
If you have assigned a physical disk as a global hot spare in Add to Pending Operation mode, the pending operation is created but a job is
not created. Then, if you try to unassign the same disk as global hot spare, the assign global hot spare pending operation is cleared.
If you have unassigned a physical disk as a global hot spare in Add to Pending Operation mode, the pending operation is created but a job
is not created. Then, if you try to assign the same disk as a global hot spare, the unassign global hot spare pending operation is cleared.
If the last VD is deleted, the global hot spares also returns to ready state.
NOTE: Hot plugged disks in H330 are always in non-RAID mode. In other RAID controllers, they are always in RAID
mode.
NOTE: RACADM SystemErase removes all the virtual disks from the physical disks that are erased by the above
commands.
NOTE: RACADM SystemErase causes the server to restart in order to perform the erase operations.
NOTE: Individual PCIe SSD or SED devices can be erased using the iDRAC GUI or RACADM. For more information, see
the Erasing PCIe SSD device data and the Erasing SED device data section.
For information on the System Erase function within the Lifecycle Controller GUI, see the Lifecycle Controller User's Guide available at
www.dell.com/idracmanuals.
To create the target staged job after executing the cryptographicerase command:
For more information, see the iDRAC RACADM CLI Guide available at www.dell.com/idracmanuals.
NOTE: PERC 10 count is less since it does not support daisy chain arrangements.
NOTE: Disk slicing or configuring partial VDs is not supported using RACADM on the drives managed by S140 controller.
• Controller non-volatile cache and battery backup of controller cache affects the read-policy or the write policy that a
controller can support. All PERCs do not have battery and cache.
• Read ahead and write back requires cache. Therefore, if the controller does not have cache, it does not allow you to
set the policy value.
Similarly, if the PERC has cache but not battery and the policy is set that requires accessing cache, then data loss
may occur if base of power off. So few PERCs may not allow that policy.
NOTE: Consistency check is not supported when the drives are set up in RAID0 mode.
NOTE: Do not initialize virtual disks when attempting to recreate an existing configuration.
You can perform a fast initialization, a full Initialization, or cancel the initialization operation.
NOTE: The cancel initialization is a real-time operation. You can cancel the initialization using only the iDRAC Web
interface and not RACADM.
Fast initialization
The fast initialize operation initializes all physical disks included in the virtual disk. It updates the metadata on the physical disks so that all
disk space is available for future write operations. The initialize task can be completed quickly because the existing information on the
physical disks is not erased, although future write operations overwrite any information that remains on the physical disks.
Fast initialization only deletes the boot sector and stripe information. Perform a fast initialize only if you are constrained for time or the
hard drives are new or unused. Fast Initialization takes less time to complete (usually 30-60 seconds).
The fast initialize task does not write zeroes to the disk blocks on the physical disks. It is because the Fast Initialize task does not perform
a write operation, it causes less degradation to the disk.
A fast initialization on a virtual disk overwrites the first and last 8 MB of the virtual disk, clearing any boot records or partition information.
The operation takes only 2-3 seconds to complete and is recommended when you are recreating virtual disks.
A background initialization starts five minutes after the Fast Initialization is completed.
NOTE: Full initialize is supported only in real-time. Only few controllers support full initialization.
Rename VD
To change the name of a Virtual Disk, the user must have System Control privilege. The virtual disk name can contain only alphanumeric
characters, spaces, dashes and underscores. The maximum length of the name depends on the individual controller. In most cases, the
maximum length is 15 characters. The name cannot start with a space, end with a space, or be left blank. Every time a virtual disk is
renamed, an LC Log gets created.
Source VD Layout Possible target VD Layout with Disk Possible target VD Layout Without disk
Add addition
R0 (single disk) R1 NA
R0 R5/R6 NA
R1 R0/R5/R6 R0
R5 R0/R6 R0
R6 R0/R5 R0/R5
From Controller End behind From VD End (which is going From any other Ready State From any other VD (which
which a VD is going through through OCE/RLM) Physical Disk on the same is not going through
OCE/RLM controller OCE/RLM) End on the
same controller
Set Patrol Read Mode Unblink Assign Global Hot Spare Unblink
Cancel Initialization
This feature is the ability to cancel the background initialization on a virtual disk. On PERC controllers, the background initialization of
redundant virtual disk starts automatically after a virtual disk is created. The background initialization of redundant virtual disk prepares the
virtual disk for parity information and improves write performance. However, some processes such as creating a virtual disk cannot be run
while the background initialization is in progress. Cancel Initialization provides the ability to cancel the background initialization manually.
Once cancelled, the background initialization automatically restarts within 0 to 5 minutes.
NOTE: Background initialization is not applicable for RAID 0 virtual disks.
racadm storage hotspare:<Physical Disk FQDD> -assign <option> -type dhs -vdkey: <FQDD of
VD>
Managing controllers
You can perform the following for controllers:
• Configure controller properties
• Import or auto import foreign configuration
• Clear foreign configuration
• Reset controller configuration
• Create, change, or delete security keys
• Discard preserved cache
NOTE: Patrol read mode operations such as Start and Stop are not supported if there are no virtual disks available in the
controller. Though you can invoke the operations successfully using the iDRAC interfaces, the operations fail when the
associated job is started.
Load balance
The Load Balance property provides the ability to automatically use both controller ports or connectors connected to the same enclosure
to route I/O requests. This property is available only on SAS controllers.
Bgi rate
On PERC controllers, background initialization of a redundant virtual disk begins automatically within 0 to 5 minutes after the virtual disk is
created. The background initialization of a redundant virtual disk prepares the virtual disk to maintain redundant data and improves write
performance. For example, after the background initialization of a RAID 5 virtual disk completes, the parity information has been initialized.
After the background initialization of a RAID 1 virtual disk completes, the physical disks are mirrored.
The background initialization process helps the controller identify and correct problems that may occur with the redundant data later. In
this regard, the background initialization process is similar to a check consistency. The background initialization should be allowed to run to
completion. If cancelled, the background initialization automatically restarts within 0 to 5 minutes. Some processes such as read and write
operations are possible while the background initialization is running. Other processes, such as creating a virtual disk, cannot be run
concurrently with a background initialization. These processes cause the background initialization to cancel.
The background initialization rate, configurable between 0% and 100%, represents the percentage of the system resources dedicated to
running the background initialization task. At 0%, the background initialization has the lowest priority for the controller, takes the most
time to complete, and is the setting with the least impact to system performance. A background initialization rate of 0% does not mean
that the background initialization is stopped or paused. At 100%, the background initialization is the highest priority for the controller. The
background initialization time is minimized and is the setting with the most impact to system performance.
Check consistency
The Check Consistency task verifies the accuracy of the redundant (parity) information. This task only applies to redundant virtual disks.
When necessary, the Check Consistency task rebuilds the redundant data. If the virtual disk is in a Failed Redundancy state, running a
check consistency may be able to return the virtual disk to a Ready state.
The check consistency rate, configurable between 0% and 100%, represents the percentage of the system resources dedicated to
running the check consistency task. At 0%, the check consistency has the lowest priority for the controller, takes the most time to
complete, and is the setting with the least impact to system performance. A check consistency rate of 0% does not mean that the check
consistency is stopped or paused. At 100%, the check consistency is the highest priority for the controller. The check consistency time is
minimized and is the setting with the most impact to system performance.
• If Patrol read mode is set to manual, use the following commands to start and stop Patrol read Mode:
NOTE: Patrol read mode operations such as Start and Stop are not supported if there are no virtual disks available in
the controller. Though you can invoke the operations successfully using the iDRAC interfaces, the operations will fail
when the associated job is started.
• To specify the Check Consistency Mode, use Storage.Controller.CheckConsistencyMode object.
• To enable or disable the Copyback Mode, use Storage.Controller.CopybackMode object.
• To enable or disable the Load Balance Mode, use Storage.Controller.PossibleloadBalancedMode object.
• To specify the percentage of the system's resources dedicated to perform a check consistency on a redundant virtual disk, use
Storage.Controller.CheckConsistencyRate object.
• To specify the percentage of the controller's resources dedicated to rebuild a failed disk, use Storage.Controller.RebuildRate
object
• To specify the percentage of the controller's resources dedicated to perform the background initialization (BGI) of a virtual disk after it
is created, useStorage.Controller.BackgroundInitializationRate object
• To specify the percentage of the controller's resources dedicated to reconstruct a disk group after adding a physical disk or changing
the RAID level of a virtual disk residing on the disk group, use Storage.Controller.ReconstructRate object
• To enable or disable the enhanced auto import of foreign configuration for the controller, use
Storage.Controller.EnhancedAutoImportForeignConfig object
• To create, modify, or delete security key to encrypt virtual drives:
For more information, see the iDRAC RACADM Command Line Reference Guide available at dell.com/idracmanuals.
For more information, see the iDRAC RACADM Command Line Reference Guide available at dell.com/idracmanuals.
For more information, see the iDRAC RACADM Command Line Reference Guide available at dell.com/idracmanuals.
NOTE: Ensure that a CMC license is available for PERC FD33xS and FD33xD storage sleds before you change the
controller mode. For more information on CMC license for the storage sleds, see the Dell Chassis Management
Controller Version 1.2 for PowerEdge FX2/FX2s User's Guide available at www.dell.com/support.
RequestedControllerMode = NONE
For more information, see the iDRAC RACADM Command Line Interface Reference Guide available at dell.com/idracmanuals.
• You must perform Collect System Inventory On Reboot (CSIOR) operation before inventorying or monitoring the
non-RAID controllers.
• Reboot the system after performing a firmware update.
• Real-time monitoring for SMART enabled drives and SES enclosure sensors is only done for the 12 Gbps SAS HBA
controllers and HBA330 internal controllers.
You cannot monitor the enclosure temperature probes, fans, and power supplies when the controller is in non-RAID mode.
NOTE: When NVMe devices are controlled behind S140, prepare to remove and cryptographic erase operations are not
supported, blink and unblink are supported.
NOTE: For all the mentioned commands, PERC devices are also displayed.
For more information, see the iDRAC RACADM Command Line Reference Guide available at dell.com/idracmanuals.
PCIe SSDs support orderly hot swap allowing you to add or remove a device without halting or rebooting the system in which the devices
are installed. To prevent data loss, you must use the Prepare to Remove operation before physically removing a device.
Orderly hot swap is supported only when PCIe SSDs are installed in a supported system running a supported operating system. To ensure
that you have the correct configuration for your PCIe SSD, see the system-specific owner's manual.
For more information, see the iDRAC RACADM CLI Guide available at www.dell.com/idracmanuals.
For more information, see the iDRAC RACADM Command Line Reference Guide available at dell.com/idracmanuals.
• Warning messages are displayed when the setting is being changed as there is a possibility of data loss.
• LC Wipe or iDRAC reset operations do not change the expander setting for this mode.
• This operation is supported only in real-time and not staged.
• You can change the backplane configuration multiple times.
• The backplane splitting operation can cause data loss or foreign configuration if the drive association changes from
one controller to another controller.
NOTE: For C6420, the available modes are: Split Mode and Split Mode-6:6:6:6.
For R740xd and R940, power cycle of the server is needed to apply the new backplane zone and for C6420, A/C cycle (of the blade
chassis) to apply the new backplane zone.
5. Click Add to Pending Operations.
A job ID is created.
6. Click Apply Now.
7. Go to the Job Queue page and verify that it displays the status as Completed for the job.
8. Power cycle the system for the setting to take effect.
BackplaneCurrentMode=UnifiedMode
BackplaneRequestedMode=None
3. Run the following command to set the requested backplane mode to split mode:
BackplaneRequestedMode=None (Pending=SplitMode)
5. Run storage get controllers command and note down the controller instance ID.
6. Run the following command to create a job:
A job ID is returned.
7. Run the following command to query the job status:
BackplaneRequestedMode=SplitMode
10. After the system completes POST and CSIOR, type the following command to verify the backplanerequestedmode:
BackplaneRequestedMode=None
11. Run the following to verify is the backplane mode is set to split mode:
BackplaneCurrentMode=SplitMode
12. Run the following command and verify that only 0–11 drives are displayed:
For more information about the RACADM commands, see the iDRAC RACADM Command Line Interface Reference Guide available at
dell.com/idracmanuals.
NOTE: You cannot set the SGPIO mode using iDRAC Web interface.
NOTE: Asset Tag has a character limit of 10 that includes the null character.
NOTE: Asset Name has a character limit of 32 that includes the null character.
• The Add to Pending Operations option in not applicable for the Pending Operations page and for PCIe SSDs in the
Physical Disks > Setup page.
• Only the Apply Now option is available on the Enclosure Setup page.
3. Click Apply.
Based on the operation mode selected, the settings are applied.
• Pending operations are created for import foreign configuration, clear foreign configuration, security key
operations, and encrypt virtual disks. But, they are not displayed in the Pending Operations page and in the
Pending Operations pop-up message.
• Jobs for PCIe SSD cannot be created from the Pending Operations page
3. To delete the pending operations for the selected controller, click Delete All Pending Operations.
4. From the drop-down menu, select one of the following and click Apply to commit the pending operations:
• Apply Now — Select this option to commit all the operations immediately. This option is available for PERC 9 controllers with the
latest firmware versions.
• At Next Reboot — Select this option to commit all the operations during the next system reboot.
• At Scheduled Time — Select this option to commit the operations at a scheduled day and time.
• Start Time and End Time — Click the calendar icons and select the days. From the drop-down menus, select the time. The
action is applied between the start time and end time.
• From the drop-down menu, select the type of reboot:
• No Reboot (Manually Reboot System)
• Graceful Shutdown
• Force Shutdown
• Power Cycle System (cold boot)
5. If the commit job is not created, a message indicating that the job creation was not successful is displayed. Also, the message ID and
the recommended response action are displayed.
6. If the commit job is created successfully, a message indicating that the job ID is created for the selected controller is displayed. Click
Job Queue to view the progress of the job in the Job Queue page.
If the clear foreign configuration, import foreign configuration, security key operations, or encrypt virtual disk operations are in pending
state, and if these are the only operations pending, then you cannot create a job from the Pending Operations page. You must
perform any other storage configuration operation or use RACADM or WSMan to create the required configuration job on the required
controller.
You cannot view or clear pending operations for PCIe SSDs in the Pending Operations page. Use the racadm command to clear the
pending operations for PCIe SSDs.
• At any time, if you do not see the option to create a job on the storage configuration pages, go to Storage Overview >
Pending Operations page to view the existing pending operations and to create the job on the required controller.
• Only cases 1 and 2 are applicable for PCIe SSD. You cannot view the pending operations for PCIe SSDs and hence
Add to Pending Operations option is not available. Use racadm command to clear the pending operations for PCIe
SSDs.
For more information, see the iDRAC RACADM Command Line Reference Guide available at dell.com/idracmanuals.
Apply
Apply button remains greyed-out until any of the attributes are modified. Once you made changes to an attribute and click Apply, it
allows you to modify the attribute with required changes. In case, the request fails to set the BIOS attribute, it throws an error with
corresponding HTTP Response Status code mapped to SMIL API error or Job Creation error. A message is generated and displayed at
that point. For more information, see Event and Error Message Reference Guide for 14th Generation Dell EMC PowerEdge Servers
available at www.dell.com/idracmanuals.
Discard changes
The Discard Changes button is greyed-out until any of the attributes are modified . If you click Discard Changes button , all the recent
changes are discarded and restored with the previous or initial values.
NOTE: For information about configuring your browser to access the virtual console, see Configuring web browsers to
use virtual console.
Topics:
• Supported screen resolutions and refresh rates
• Configuring virtual console
• Previewing virtual console
• Launching virtual console
• Using virtual console viewer
720x400 70
1280x1024 60
1920x1200 60
It is recommended that you configure the monitor display resolution to 1920x1200 pixels.
NOTE: Do not launch a Virtual Console session from a Web browser on the managed system.
NOTE: If you do not have Access Virtual Console privilege but have Access Virtual Media privilege, then using this
URL launches the Virtual Media instead of the Virtual Console.
1. Initially, when you launch Virtual Console or Virtual Media using Java plug-in, the prompt to verify the publisher is displayed. Click Yes.
A certificate warning message is displayed indicating that a trusted certificate is not found.
NOTE: If the certificate is found in the operating system’s certificate store or if it is found in a previously specified
user location, then this warning message is not displayed.
2. Click Continue.
The Virtual Console Viewer or Virtual Media Viewer is launched.
NOTE: The Virtual Media viewer is launched if Virtual Console is disabled.
3. From the Tools menu, click Session Options and then Certificate tab.
4. Click Browse Path, specify the location to store the user’s certificate, click Apply, click OK, and exit from the viewer.
5. Launch Virtual Console again.
6. In the certificate warning message, select the Always trust this certificate option, and then click Continue.
7. Exit from the viewer.
8. When you re-launch Virtual Console, the warning message is not displayed.
NOTE: If the remote server is powered off, the message ’No Signal’ is displayed.
The Virtual Console Viewer title bar displays the DNS name or the IP address of the iDRAC you are connected to from the management
station. If iDRAC does not have a DNS name, then the IP address is displayed. The format is:
• For rack and tower servers:
<DNS name / IPv6 address / IPv4 address>, <Model>, User: <username>, <fps>
• For blade servers:
<DNS name / IPv6 address / IPv4 address>, <Model>, <Slot number>, User: <username>, <fps>
Sometimes the Virtual Console Viewer may display low quality video. This is due to slow network connectivity that leads to loss of one or
two video frames when you start the Virtual Console session. To transmit all the video frames and improve the subsequent video quality,
do any of the following:
• In the System Summary page, under Virtual Console Preview section, click Refresh.
• In the Virtual Console Viewer, under Performance tab, set the slider to Maximum Video Quality.
NOTE: While using HTML5 to access virtual console, the language must be consistent across client and target keyboard
layout, OS, and browser. For example, all must be in English (US) or any of the supported languages.
To launch the HTML5 virtual console, you must enable the virtual console feature from the iDRAC Virtual Console page and set the
Virtual Console Type option to HTML5.
You can launch virtual console as a pop-up window by using one of the following methods:
• From iDRAC Home page, click the Launch link available in the Console Preview session
• From iDRAC Virtual Console page, click Launch Virtual Console.
• From iDRAC login page, type https//<iDRAC IP>/console. This method is called as Direct Launch.
In the HTML5 virtual console, the following menu options are available:
• Add Power Control
• Boot Order
• Chat
• Keyboard
• Screen Capture
• Refresh
• Full Screen
• Disconnect Viewer
• Console Control
• Virtual Media
The Pass all keystrokes to server option is not supported on HTML5 virtual console. Use keyboard and keyboard macros for all the
functional keys.
• Console control — This has the following configuration options:
• Keyboard
• Keyboard Macros
• Aspect Ratio
• Touch Mode
• Mouse Acceleration
NOTE: You cannot map physical media such USB-based drives, CD, or DVD by using the HTML5 based virtual console.
NOTE: For security reasons read/write access is disabled while accessing virtual console in HTML5. With Java or
ActiveX plug-ins, you can accept security messaging before the plug-in is given the read/write authority.
Supported Browsers
The HTML5 virtual console is supported on the following browsers:
• Internet Explorer 11
• Chrome 36
• Firefox 30
• Safari 7.0
NOTE: It is recommended to have Mac OS version 10.10.2 (or onward) installed in the system.
For more details on supported browsers and versions, see the iDRAC Release Notes available at www.dell.com/idracmanuals.
Using SSH or Telnet or external serial connector directly connecting through serial cable
1. For telnet/SSH sessions, after logging in using the iDRAC username and password, at the /admin> prompt, run the command
console com2. The localhost.localdomain prompt appears.
2. For console redirection using external serial connector directly connected to the system through a serial cable, the
localhost.localdomain login prompt appears after the server boots to the operating system.
3. Log in using the operating system user name and password.
4. If SysRq is not enabled, enable using echo 1 >/proc/sys/kernel/sysrq.
5. Use the magic key to enable the SysRq function. For example, the following command reboots the server:
NOTE: You do not have to run break sequence before using the magic SysRq keys.
NOTE: You can use the iDRAC Service Module only if you have installed iDRAC Express or iDRAC Enterprise license.
• When iDRAC Service Module runs for the first time, by default it enables the OS to iDRAC pass-through channel in
iDRAC. If you disable this feature after installing the iDRAC Service Module, then you must enable it manually in
iDRAC.
• If the OS to iDRAC pass-through channel is enabled through LOM in iDRAC, then you cannot use the iDRAC Service
Module.
Topics:
• Installing iDRAC Service Module
• Supported operating systems for iDRAC Service Module
• iDRAC Service Module monitoring features
• Using iDRAC Service Module from iDRAC web interface
• Using iDRAC Service Module from RACADM
• Using iDRAC Service Module on Windows Nano OS
SPComputerSystem
+SystemName=systemmc
Invoke-iDRACHardReset –force
Invoke-iDRACHardReset
• Linux
iSM provides an executable command on all iSM supported Linux operating system. You can run this command by logging into the
operating system by using SSH or equivalent.
Invoke-iDRACHardReset
Invoke-iDRACHardReset –f
• ESXi
On all iSM supported ESXi operating systems, the iSM v2.3 supports a Common Management Programming Interface (CMPI) method
provider to perform the iDRAC reset remotely by using the WinRM remote commands.
NOTE: VMware ESXi operating system does not prompt for confirmation before resetting the iDRAC.
NOTE: Due to limitations on the VMware ESXi operating system, iDRAC connectivity is not restored completely after
the reset. Ensure that you manually reset iDRAC.
NOTE: This feature is active only if the Lifecycle Logs replication feature is enabled.
winrm i EnableInBandSNMPTraps
wmi/root/cimv2/dcim/DCIM_iSMService?InstanceID="iSMExportedFunctions" @{state="[0/1]"}
If –force is not specified, ensure that the net-SNMP is configured and restart the snmpd service.
• To enable this feature:
Enable-iDRACSNMPTrap.sh 1
Enable-iDRACSNMPTrap.sh enable
Enable-iDRACSNMPTrap.sh 0
Enable-iDRACSNMPTrap.sh disable
NOTE: The --force option configures the Net-SNMP to forward the traps. However, you must configure the trap
destination.
• VMware ESXi operating system
On all iSM supported ESXi operating systems, the iSM v2.3 supports a Common Management Programming Interface (CMPI) method
provider to enable this feature remotely by using the WinRM remote commands.
NOTE: You must review and configure the VMware ESXi system-wide SNMP settings for traps.
NOTE: For more details, refer to the In-BandSNMPAlerts technical white paper available at www.dell.com/support.
The output of this command indicates whether this feature is enabled or disabled. If the feature is enabled, it displays the listening-port
number.
NOTE: Ensure that the Microsoft IP Helper Services is running on your system for this feature to function.
To access the iDRAC Web interface, use the format https://<host-name> or OS-IP>:443/login.html in the browser, where:
• <host-name> — Complete host name of the server on which iSM is installed and configured for iDRAC access via OS feature. You
can use the OS IP address if the host name is not present.
• 443 — Default iDRAC port number. This is called the Connect Port number to which all the incoming connections on listen port
number are redirected. You can modify the port number through iDRAC Web interface, WSMan, and RACADM interfaces.
Configuration by using iSM PowerShell cmdlet
If this feature is disabled while installing iSM, you can enable the feature by using the following Windows PowerShell command provided by
iSM:
Enable-iDRACAccessHostRoute
If the feature is already configured, you can disable or modify it by using the PowerShell command and the corresponding options. The
available options are as follows:
• Status — This parameter is mandatory. The values are not case sensitive and the value can be true, false, or get.
• Port — This is the listening port number. If you do not provide a port number, the default port number (1266) is used. If the Status
parameter value is FALSE, then you can ignore rest of the parameters. You must enter a new port number that is not already
configured for this feature. The new port number settings overwrite the existing OS2iDRAC in-bound firewall rule and you can use the
new port number to connect to iDRAC. The value range is from 1024 to 65535.
• IPRange — This parameter is optional and it provides a range of IP addresses that are allowed to connect to iDRAC through the host
operating system. The IP address range format is in Classless Inter-Domain Routing (CIDR) format, which is a combination of IP
address and subnet mask. For example, 10.94.111.21/24. Access to iDRAC is restricted for IP addresses that are not within the range.
Enable-iDRACAccessHostRoute get-status
To install, enable, and configure this feature, use the following command:
You can view the replicated Lifecycle logs using the WMI or Windows PowerShell query:
By default, the logs are available at Event viewer > Applications and Services Logs > System.
NOTE: Use an OTG adapter to convert from Type-A to Micro-B USB. Connections from USB hubs are not supported.
• iDRAC Managed: USB SCP—Select from following options to configure the system by importing SCP stored on a USB drive:
• Disabled—Disables SCP imports
• Enabled only when server has default credential settings— If this option is selected then the SCP can only be imported
when the default password is not changed for the following:
• BIOS
• iDRAC web interface
• Enabled only for compressed configuration files—Select this option to allow SCP file import only if the files are in
compressed format.
NOTE: Selecting this option allows you to password protect the compressed file. You can enter a password to
secure the file by using Password for Zip file option.
• Enabled—Select this option to allow importing SCP file without running a check during runtime.
Topics:
• Accessing iDRAC interface over direct USB connection
• Configuring iDRAC using server configuration profile on USB device
NOTE: If you are using Windows operating system, you may need to install an RNDIS driver to use this feature.
racadm hwinventory
racadm eventfilters
For more information, see the iDRAC RACADM CLI Guide available at www.dell.com/idracmanuals.
<InstructionTable>
<InstructionRow>
<InstructionType>Configuration XML import Host control Instruction
</InstructionType>
<Instruction>ShutdownType</Instruction>
<Value>NoReboot</Value>
<ValuePossibilities>Graceful,Forced,NoReboot</ValuePossibilities>
LCD messages
If the LCD panel is available, it displays the following messages in a sequence:
1. Importing – When the server configuration profile is being copied from the USB device.
2. Applying — When the job is in-progress.
3. Completed — When the job has completed successfully.
4. Completed with errors — When the job has completed with errors.
5. Failed — When the job has failed.
For more details, see the results file on the USB device.
NOTE: This section is displayed only in those servers that has Quick Sync 2 module in left rack ear.
NOTE: This feature is currently supported on mobile devices with Android operating system and Apple iOS.
In the current release, this feature is available on all 14th generation of PowerEdge servers. It requires Quick Sync 2 Left Control Panel
(embedded in Left rack ear) and Bluetooth Low Energy (and optionally Wi-Fi) enabled mobile devices. Therefore, it is a hardware up-sell
and the feature capabilities are not dependent on iDRAC software licensing.
NOTE: To configure Quick Sync 2 in MX platform systems, see the OpenManage Enterprise Modular User's Guide and
OpenManage Mobile User’s Guide available at dell.com/support/manuals
The iDRAC Quick Sync 2 Configuration procedures:
• – iDRAC Quick Sync Access Configuration(via iDRAC GUI, iDRAC HII, racadm, WSMan)
1. ›Quick Sync Access — Configure to read-write, this is the default option.
2. ›Quick Sync Inactivity Timer — Configure to Enabled, this is the default option.
3. ›Quick Sync Inactivity Timeout — Indicates the time after which the Quick Sync 2 mode is disabled. By default, seconds are
selected. The default value is 120 seconds. The range is 120 to 3600 seconds.
4. ›Quick Sync Read Authentication — Configures to Enabled, this is the default option.
5. Quick Sync WiFi — Configures to Enabled, this is the default option.
Once configured activate the Quick Sync 2 button on the Left Control Panel. Make sure the Quick Sync 2 light turns on. Access the Quick
Sync 2 Information via a mobile device (Android 5.0+ or IOS 9.0+, OMM 2.0 or above).
Using OpenManage Mobile, you can:
• View inventory information
• View monitoring information
• Configure the basic iDRAC network settings
For more information about OpenManage Mobile, see the Dell EMC OpenManage Mobile User's Guide available at www.dell.com/
openmanagemanuals.
Topics:
• Configuring iDRAC Quick Sync 2
• Using mobile device to view iDRAC information
Topics:
• Supported drives and devices
• Configuring virtual media
• Accessing virtual media
• Setting boot order through BIOS
• Enabling boot once for virtual media
Virtual Optical Drives • Legacy 1.44 floppy drive with a 1.44 floppy diskette
• CD-ROM
• DVD
• CD-RW
• Combination drive with CD-ROM media
Auto-attach Media is mapped when Client View is opened and unmapped when Client View is closed.
Virtual Console has been disabled. Do you want to continue using Virtual Media redirection?
3. Click OK.
The Virtual Media window is displayed.
4. From the Virtual Media menu, click Map CD/DVD or Map Removable Disk.
For more information, see Mapping virtual drive.
NOTE: The Virtual Media may not function correctly on Windows operating system clients that are configured with
Internet Explorer Enhanced Security. To resolve this issue, see the Microsoft operating system documentation or
contact the system administrator.
Resetting USB
To reset the USB device:
1. In the Virtual Console viewer, click Tools > Stats.
The Stats window is displayed.
2. Under Virtual Media, click USB Reset.
A message is displayed warning the user that resetting the USB connection can affect all the input to the target device including
Virtual Media, keyboard, and mouse.
3. Click Yes.
The USB is reset.
NOTE: iDRAC Virtual Media does not terminate even after you log out of iDRAC Web interface session.
NOTE: You cannot map USB keys as virtual media disks using Virtual Console/Virtual media over a RDP session.
2. Click the device type that you want to map.
NOTE: The active session displays if a Virtual Media session is currently active from the current Web interface
session, from another Web interface session, or from VMCLI.
3. In the Drive/Image File field, select the device from the drop-down list.
The list contains all the available (unmapped) devices that you can map (CD/DVD, Removable Disk, Floppy Drive) and image file types
that you can map (ISO or IMG). The image files are located in the default image file directory (typically the user’s desktop). If the
device is not available in the drop-down list, click Browse to specify the device.
The correct file type for CD/DVD is ISO and for removable disk and floppy disk it is IMG.
If the image is created in the default path (Desktop), when you select Map Removable Disk, the created image is available for
selection in the drop-down menu.
If image is created in a different location, when you select Map Removable Disk, the created image is not available for selection in
the drop-down menu. Click Browse to specify the image.
4. Select Read-only to map writable devices as read-only.
For CD/DVD devices, this option is enabled by default and you cannot disable it.
NOTE: The ISO and IMG files map as read-only files if you map these files by using the HTML5 virtual console.
5. Click Map Device to map the device to the host server.
After the device/file is mapped, the name of its Virtual Media menu item changes to indicate the device name. For example, if the
CD/DVD device is mapped to an image file named foo.iso, then the CD/DVD menu item on the Virtual Media menu is named
foo.iso mapped to CD/DVD. A check mark for that menu item indicates that it is mapped.
NOTE: To unmap a virtual DVD drive on Linux OS, unmount the drive and eject it.
Topics:
• Installing VMCLI
• Running VMCLI utility
• VMCLI syntax
Installing VMCLI
The VMCLI utility is included in the Dell Systems Management Tools and Documentation DVD.
To install the VMCLI utility:
1. Insert the Dell Systems Management Tools and Documentation DVD into the management station’s DVD drive.
2. Follow the on-screen instructions to install DRAC tools.
3. After successful install, check install\Dell\SysMgt\rac5 folder to make sure vmcli.exe exists. Similarly, check the respective path
for UNIX.
The VMCLI utility is installed on the system.
VMCLI syntax
The VMCLI interface is identical on both Windows and Linux systems. The VMCLI syntax is:
VMCLI [parameter] [operating_system_shell_options]
For example, vmcli -r iDRAC-IP-address:iDRAC-SSL-port
The parameter enables VMCLI to connect to the specified server, access iDRAC, and map to the specified virtual media.
Floppy drive
vmcli -r [RAC IP or hostname] -u [iDRAC user
name] -p [iDRAC user password] -f [device
name]
If the file is not write-protected, Virtual Media may write to the image file. To make sure that Virtual Media does not write to the media:
• Configure the operating system to write-protect a floppy image file that must not be overwritten.
• Use the write-protection feature of the device.
When virtualizing read-only image files, multiple sessions can use the same image media simultaneously.
When virtualizing physical drives, only one session can access a given physical drive at a time.
NOTE: The VMCLI utility does not read from standard input (stdin). Hence, stdin redirection is not required.
• Background execution — By default, the VMCLI utility runs in the foreground. Use the operating system's command shell features for
the utility to run in the background.
For example, under a Linux operating system, the ampersand character (&) following the command causes the program to be
spawned as a new background process. This technique is useful in script programs, as it allows the script to proceed after a new
process is started for the VMCLI command (otherwise, the script blocks until the VMCLI program is terminated).
When multiple VMCLI sessions are started, use the operating system-specific facilities for listing and terminating processes.
NOTE: If FIPS mode is enabled, you cannot perform any vFlash actions.
Topics:
• Configuring vFlash SD card
• Managing vFlash partitions
NOTE: You must have Access Virtual Media privilege to enable or disable vFlash functionality, and initialize the card.
NOTE: The RACADM command functions only if a vFlash SD card is present. If a card is not present, the following
message is displayed: ERROR: SD Card not present.
NOTE: If iDRAC is reset, the status of the last partition operation is lost.
vFlash is capable of performing fast partition creation when there is no other on-going vFlash operation such as formatting, attaching
partitions, and so on. Therefore, it is recommended to first create all partitions before performing other individual partition operations.
NOTE: The vFlash partition is an image file on a FAT32 file system. Thus, the image file has the 4 GB limitation.
By default, the created partition is read-only. This command is case sensitive for the image file name extension. If the file name
extension is in upper case, for example FOO.ISO instead of FOO.iso, then the command returns a syntax error.
NOTE: This feature is not supported in local RACADM.
NOTE: Creating vFlash partition from an image file located on the CFS or NFS IPv6 enabled network share is not
supported.
Formatting a partition
You can format an existing partition on the vFlash SD card based on the type of file system. The supported file system types are EXT2,
EXT3, FAT16, and FAT32. You can only format partitions of type Hard Disk or Floppy, and not CD. You cannot format read-only partitions.
Before creating a partition from an image file, ensure that:
• You have Access Virtual Media privilege.
• The card is initialized.
• The card is not write-protected.
• An initialize operation is not being performed on the card.
To format vFlash partition:
1. In iDRAC Web interface, go to Configuration > System Settings > Hardware Settings > vFlash > Format.
The Format Partition page is displayed.
2. Enter the required information and click Apply.
For information about the options, see the iDRAC Online Help.
A warning message indicating that all the data on the partition will be erased is displayed.
3. Click OK.
The selected partition is formatted to the specified file system type. An error message is displayed if:
• The card is write-protected.
• An initialize operation is already being performed on the card.
Modifying a partition
You can change a read-only partition to read-write or vice-versa. Before modifying the partition, make sure that:
• The vFlash functionality is enabled.
• You have Access Virtual Media privileges.
• To detach a partition:
Booting to a partition
You can set an attached vFlash partition as the boot device for the next boot operation.
Verb Definition
Target Definitions
admin domain
admin1
Hardware
admin1/hdwr1
Service Processor
admin1/system1/sp1
Authentication capabilities
admin1/system1/sp1/capabilities1/elecap1
Local role
admin1/system1/sp1/rolesvc1/Role1-16
IPMI role
admin1/system1/sp1/rolesvc2/Role1-3
CLP role
admin1/system1/sp1/rolesvc3/Role1-3
Usage examples
This section provides use case scenarios for SMCLP:
• Server power management
• SEL management
• Map target navigation
SEL management
The following examples show how to use the SMCLP to perform SEL-related operations on the managed system. Type the following
commands at the SMCLP command prompt:
• To view the SEL:
show/system1/logs1/log1
The following output is displayed:
/system1/logs1/log1
Targets:
Record1
Record2
Record3
Record4
Record5
Properties:
InstanceID = IPMI:BMC1 SEL Log
MaxNumberOfRecords = 512
CurrentNumberOfRecords = 5
Name = IPMI SEL
EnabledState = 2
OperationalState = 2
HealthState = 2
Caption = IPMI SEL
Description = IPMI SEL
ElementName = IPMI SEL
Commands:
cd
show
help
exit
version
• To view the SEL record:
show/system1/logs1/log1
The following output is displayed:
/system1/logs1/log1/record4
Properties:
LogCreationClassName= CIM_RecordLog
CreationClassName= CIM_LogRecord
NOTE:
• Linux: Ensure that the share permissions are set to at least Read for the Others account.
• Windows: Go to the Security tab of the share properties and add Everyone to Groups or user names field with
Read & execute privilege.
,
• If ESXi is running on the managed system and if you mount a floppy image (.img) using RFS, the connected floppy
image is not available to the ESXi operating system.
• iDRAC vFlash feature and RFS are not related.
NOTE: Both '/' or '\' characters can be used for the file path.
CIFS supports both IPv4 and IPv6 addresses but NFS supports only IPv4 address.
If you are using NFS share, make sure that you provide the exact <file path> and <image name> as it is case-sensitive.
NOTE: For information on recommended characters for user names and passwords, see Recommended characters in
user names and passwords.
NOTE: The characters allowed in user names and passwords for network shares are determined by the network-
share type. iDRAC supports valid characters for network share credentials as defined by the share type, except <, >,
and , (comma).
4. Click Apply and then click Connect.
After the connection is established, the Connection Status displays Connected.
NOTE: Even if you have configured remote file sharing, the Web interface does not display user credential
information due to security reasons.
For Linux distributions, this feature may require a manual mount command when operating at runlevel init 3. The syntax for the
command is:
where, user_defined_mount_point is any directory you choose to use for the mount similar to any mount command.
For RHEL, the CD device (.iso virtual device) is /dev/scd0 and floppy device (.img virtual device) is /dev/sdc.
This displays the text that identifies the device (example, SCSI device sdc). This procedure also applies to Virtual Media when you are
using Linux distributions in runlevel init 3. By default, the virtual media is not auto-mounted in init 3.
NOTE: To avoid I/O errors when using CIFS shares hosted on Windows 7 systems, modify the following registry keys:
About IDSDM
Internal Dual SD Module (IDSDM) is available only on applicable platforms. IDSDM provides redundancy on the hypervisor SD card by using
another SD card that mirrors the first SD card’s content.
Either of the two SD cards can be the master. For example, if two new SD cards are installed in the IDSDM, SD1 is active (master) card
and SD2 is the standby card. The data is written on both the cards, but the data is read from SD1. At any time if SD1 fails or is removed,
SD2 automatically become the active (master) card.
You can view the status, health, and the availability of IDSDM using iDRAC Web Interface or RACADM. The SD card redundancy status
and failure events are logged to SEL, displayed on the front panel, and PET alerts are generated if alerts are enabled.
racadm diagnostics run -m <Mode> -r <reboot type> -s <Start Time> -e <Expiration Time>
• To export the last run remote diagnostics results, use the following command:
racadm diagnostics export -f <file name> -l <NFS / CIFS / HTTP / HTTPs share> -u
<username> -p <password>
For more information about the options, see the iDRAC RACADM CLI Guide available at www.dell.com/idracmanuals.
• You must have Access Virtual Console or administrator privileges to playback the Boot Capture and Crash Capture
videos.
• The video capture time displayed in the iDRAC GUI video player may differ from the video capture time displayed in
other video players. The iDRAC GUI video player displays the time in the iDRAC time zone while all other video
players display the time in the respective operating system time zones.
NOTE: DVC boot capture files are not videos. They are sequence of screens (at 1 particular resolution) taken during the
course of the server boot. The DVC player converts these screens together to create the boot video. When you export
the video from DVC (continuous snapshot and differences) to .mov (actual video) format, it is expected to use the same
resolution, or a similar resolution, that the video was initially encoded with. Videos need to be exported at a similar
resolution that they have been captured with.
NOTE: The reason for the delay in boot capture file availability is because the boot capture buffer is not full after the
host boot.
To view the Boot Capture screen, click Maintenance > Troubleshooting > Video Capture.
The Video Capture screen displays the video recordings. For more information, see the iDRAC Online Help.
Viewing logs
You can view System Event Logs (SELs) and Lifecycle logs. For more information, see Viewing System Event Log and Viewing Lifecycle
log.
NOTE: Once iDRAC is reset or an AC power cycle event occurs, then the crash capture data is cleared.
NOTE: You can hide or unhide the errors only for rack and tower servers.
Based on the selection, the text box displays the current value. If you select User Defined, enter the required message in the text box. The
character limit is 62. If you select None, home message is not displayed on the LCD.
To view LCD front panel status using RACADM, use the objects in the System.LCD group. For more information, see the iDRAC
RACADM Command Line Interface Reference Guide available at dell.com/idracmanuals.
Restarting iDRAC
You can perform a hard or soft iDRAC restart without turning off the server:
• Hard restart — On the server, press and hold the LED button for 15 seconds.
• Soft restart — Using iDRAC Web interface or RACADM.
You can erase system component(s) and user data for the following components:
• Lifecycle Controller Data
• Embedded Diagnostics
• Embedded OS Driver Pack
• BIOS reset to default
• iDRAC reset to default
Before performing system erase, ensure that:
• You have iDRAC Server Control privilege.
• Lifecycle Controller is enabled.
The Lifecycle Controller Data option erases any content such as the LC Log, configuration database, rollback firmware, factory as-shipped
logs, and the configuration information from the FP SPI (or management riser).
NOTE: The Lifecycle Controller log contains the information about the system erase request and any information
generated when the iDRAC restarts. All previous information is removed.
You can delete individual or multiple system components using the SystemErase command:
where,
• bios — BIOS reset to default
• diag — Embedded Diagnostics
• drvpack — Embedded OS Driver Pack
• lcdata — Clear the Lifecycle Controller Data
• idrac — iDRAC reset to default
• overwritepd — Overwrite hard drives that do not support Instant Secure Erase (ISE)
• percnvcache — Reset controller cache
• vflash — Reset vFLASH
• secureerasepd — Erase Hard Drives, SSDs, and NVMes that support ISE
• allapps — Clears all OS applications
For more information, see the iDRAC RACADM CLI Guide available at www.dell.com/idracmanuals.
NOTE: The Dell tech center link appears on the iDRAC GUI on Dell branded systems. If you erase system data by using
WSMan command and want the link to appear again, reboot the host manually and wait for CSIOR to run.
NOTE: After you run System Erase, the VDs may still appear. Run CSIOR after System Erase is completed and iDRAC is
rebooted.
SupportAssist Registration
To take advantage of the automated, proactive, and predictive features of SupportAssist, you must register your system with
SupportAssist.
You can generate and save a collection locally or to a network, and also send to Dell EMC without registration.
NOTE: You can remove the secondary contact information at any point of time.
SupportAssist
Once SupportAssist is configured, you can check the SupportAssist dash board to view the Service Request Summary, Warranty
Status, SupportAssist Overview, Service Requests, and Collection log. Registration is not required to view or send the Collection
log.
Collection Log
Collection Log shows the details of Collection Date and Time, Collection Type (Manual, Scheduled, Event based), Data Collected
(Custom Selection, All Data), Collection Status (Complete with Errors, Complete), Job ID, Sent Status, and Sent Date and Time.
You can send the last persisted collection in iDRAC to Dell.
NOTE: Once generated, the Collection Log Details can be filtered to remove the Personally Identifiable Information (PII)
based on the user selection.
Settings
This page allows you to configure the collection log settings, and if registered, you can update the contact details, enable or disable email
notifications, and change the language settings.
Contact Information
This page shows the contact information details that were added during the registration of SupportAssist, and allows you to update them.
Active Directory
Active Directory login failed. How to resolve this?
To diagnose the problem, on the Active Directory Configuration and Management page, click Test Settings. Review the test results
and fix the problem. Change the configuration and run the test until the test user passes the authorization step.
In general, check the following:
• While logging in, make sure that you use the correct user domain name and not the NetBIOS name. If you have a local iDRAC user
account, log into iDRAC using the local credentials. After logging in, make sure that:
• The Active Directory Enabled option is selected on the Active Directory Configuration and Management page.
• The DNS setting is correct on the iDRAC Networking configuration page.
• The correct Active Directory root CA certificate is uploaded to iDRAC if certificate validation was enabled.
• The iDRAC name and iDRAC Domain name matches the Active Directory environment configuration if you are using extended
schema.
• The Group Name and Group Domain Name matches the Active Directory configuration if you are using standard schema.
• If the user and the iDRAC object is in different domain, then do not select the User Domain from Login option. Instead select
Specify a Domain option and enter the domain name where the iDRAC object resides.
• Check the domain controller SSL certificates to make sure that the iDRAC time is within the valid period of the certificate.
If certificate validation is enabled, when iDRAC establishes the SSL connection with the directory server, iDRAC uses the uploaded CA
certificate to verify the directory server certificate. The most common reasons for failing certification validation are:
• iDRAC date is not within the validity period of the server certificate or CA certificate. Check the iDRAC time and the validity period of
your certificate.
• The domain controller addresses configured in iDRAC does not match the Subject or Subject Alternative Name of the directory server
certificate. If you are using an IP address, read the next question. If you are using FQDN, make sure you are using the FQDN of the
domain controller and not the domain. For example, servername.example.com instead of example.com.
Certificate validation fails even if IP address is used as the domain controller address. How to resolve this?
Check the Subject or Subject Alternative Name field of your domain controller certificate. Normally, Active Directory uses the host name
and not the IP address of the domain controller in the Subject or Subject Alternative Name field of the domain controller certificate. To
resolve this, do any of the following:
• Configure the host name (FQDN) of the domain controller as the domain controller address(es) on iDRAC to match the Subject or
Subject Alternative Name of the server certificate.
• Reissue the server certificate to use an IP address in the Subject or Subject Alternative Name field, so that it matches the IP address
configured in iDRAC.
• Disable certificate validation if you choose to trust this domain controller without certificate validation during the SSL handshake.
How to configure the domain controller address(es) when using extended schema in a multiple domain environment?
This must be the host name (FQDN) or the IP address of the domain controller(s) that serves the domain in which the iDRAC object
resides.
When to configure Global Catalog Address(es)?
If you are using standard schema and the users and role groups are from different domains, Global Catalog Address(es) are required. In
this case, you can use only Universal Group.
If you are using standard schema and all the users and role groups are in the same domain, Global Catalog Address(es) are not required.
If you are using extended schema, the Global Catalog Address is not used.
How does standard schema query work?
iDRAC connects to the configured domain controller address(es) first. If the user and role groups are in that domain, the privileges are
saved.
If Global Controller Address(es) is configured, iDRAC continues to query the Global Catalog. If additional privileges are retrieved from the
Global Catalog, these privileges are accumulated.
Does iDRAC always use LDAP over SSL?
Yes. All the transportation is over secure port 636 and/or 3269. During test setting, iDRAC does a LDAP CONNECT only to isolate the
problem, but it does not do an LDAP BIND on an insecure connection.
Why does iDRAC enable certificate validation by default?
iDRAC enforces strong security to ensure the identity of the domain controller that iDRAC connects to. Without certificate validation, a
hacker can spoof a domain controller and hijack the SSL connection. If you choose to trust all the domain controllers in your security
boundary without certificate validation, you can disable it through the Web interface or RACADM.
Does iDRAC support the NetBIOS name?
Not in this release.
Why does it take up to four minutes to log in to iDRAC using Active Directory Single Sign–On or Smart Card Login?
The Active Directory Single Sign–On or Smart Card log in normally takes less than 10 seconds, but it may take up to four minutes to log in
if you have specified the preferred DNS server and the alternate DNS server, and the preferred DNS server has failed. DNS time-outs are
expected when a DNS server is down. iDRAC logs you in using the alternate DNS server.
The Active Directory is configured for a domain present in Windows Server 2008 Active Directory. A child or sub domain is
present for the domain, the user and group is present in the same child domain, and the user is a member of that group.
When trying to log in to iDRAC using the user present in the child domain, Active Directory Single Sign-On login fails.
Single Sign-On
SSO login fails on Windows Server 2008 R2 x64. What are the settings required to resolve this?
1. Run the technet.microsoft.com/en-us/library/dd560670(WS.10).aspx for the domain controller and domain policy.
2. Configure the computers to use the DES-CBC-MD5 cipher suite.
These settings may affect compatibility with client computers or services and applications in your environment. The Configure
encryption types allowed for Kerberos policy setting is located at Computer Configuration > Security Settings > Local Policies >
Security Options.
3. Make sure that the domain clients have the updated GPO.
4. At the command line, type gpupdate /force and delete the old key tab with klist purge command.
5. After the GPO is updated, create the new keytab.
6. Upload the keytab to iDRAC.
You can now log in to iDRAC using SSO.
Why does SSO login fail with Active Directory users on Windows 7 and Windows Server 2008 R2?
You must enable the encryption types for Windows 7 and Windows Server 2008 R2. To enable the encryption types:
1. Log in as administrator or as a user with administrative privilege.
2. Go to Start and run gpedit.msc. The Local Group Policy Editor window is displayed.
3. Go to Local Computer Settings > Windows Settings > Security Settings > Local Policies > Security Options.
4. Right-click Network Security: Configure encryption types allowed for kerberos and select Properties.
5. Enable all the options.
6. Click OK. You can now log in to iDRAC using SSO.
Perform the following additional settings for Extended Schema:
1. In the Local Group Policy Editor window, navigate to Local Computer Settings > Windows Settings > Security Settings >
Local Policies > Security Options .
2. Right-click Network Security: Restrict NTLM: Outgoing NTLM traffic to remote server and select Properties.
3. Select Allow all, click OK, and close the Local Group Policy Editor window.
4. Go to Start and run cmd. The command prompt window is displayed.
5. Run the command gpupdate /force. The group policies are updated. Close the command prompt window.
6. Go to Start and run regedit. The Registry Editor window is displayed.
7. Navigate to HKEY_LOCAL_MACHINE > System > CurrentControlSet > Control > LSA .
8. In the right-pane, right-click and select New > DWORD (32-bit) Value.
9. Name the new key as SuppressExtendedProtection.
10. Right-click SuppressExtendedProtection and click Modify.
11. In the Value data field, type 1 and click OK.
12. Close the Registry Editor window. You can now log in to iDRAC using SSO.
If you have enabled SSO for iDRAC and you are using Internet Explorer to log in to iDRAC, SSO fails and you are prompted to
enter your user name and password. How to resolve this?
Make sure that the iDRAC IP address is listed in the Tools > Internet Options > Security > Trusted sites. If it is not listed, SSO fails
and you are prompted to enter your user name and password. Click Cancel and proceed.
Virtual console
What is the required Java version to launch Virtual Console?
You need Java 8 or later to use this feature and to launch iDRAC Virtual Console over an IPv6 network.
Virtual Console session is active even if you have logged out of iDRAC web interface. Is this the expected behavior?
Yes. Close the Virtual Console Viewer window to log out of the corresponding session.
Can a new remote console video session be started when the local video on the server is turned off?
Yes.
Why does it take 15 seconds to turn off the local video on the server after requesting to turn off the local video?
It gives a local user an opportunity to take any action before the video is switched off.
Is there a time delay when turning on the local video?
No, after a local video turn ON request is received by iDRAC, the video is turned on instantly.
Can the local user also turn off or turn on the video?
When the local console is disabled, the local user cannot turn off or turn on the video.
Does switching off the local video also switch off the local keyboard and mouse?
No.
Does turning off the local console turn off the video on the remote console session?
No, turning the local video on or off is independent of the remote console session.
What privileges are required for an iDRAC user to turn on or turn off the local server video?
Any user with iDRAC configuration privileges can turn on or turn off the local console.
How to get the current status of the local server video?
The status is displayed on the Virtual Console page.
To display the status of the object iDRAC.VirtualConsole.AttachState, use the following command:
Or, use the following command from a Telnet, SSH, or a remote session:
The status is also seen on the Virtual Console OSCAR display. When the local console is enabled, a green status is displayed next to the
server name. When disabled, a yellow dot indicates that iDRAC has locked the local console.
Why is the bottom of the system screen not seen from the Virtual Console window?
Make sure that the management station’s monitor resolution is set to 1280 x 1024.
Why is the Virtual Console Viewer window garbled on Linux operating system?
The console viewer on Linux requires a UTF-8 character set. Check your locale and reset the character set if required.
Why does the mouse not synchronize under the Linux text console in Lifecycle Controller?
Virtual Console requires the USB mouse driver, but the USB mouse driver is available only under the X-Window operating system. In the
Virtual Console viewer, do any of the following:
NOTE: The SysRq feature is currently not supported with Internet Explorer and Java.
Why is the "Link Interrupted" message displayed at the bottom of the Virtual Console?
When using the shared network port during a server reboot, iDRAC is disconnected while BIOS is resetting the network card. This
duration is longer on 10 Gb cards, and is also exceptionally long if the connected network switch has Spanning Tree Protocol (STP)
enabled. In this case, it is recommended to enable "portfast" for the switch port connected to the server. In most cases, the Virtual
Console restores itself.
Launching Virtual Console with HTML5 fails when browser is set to use only TLS 1.0.
Ensure that the browser is set to use TLS 1.1 or higher.
Launching Virtual Console with Java plug-in fails after the iDRAC firmware was updated.
Delete the Java cache and then launch the virtual console.
Virtual media
Why does the Virtual Media client connection sometimes drop?
When a network time-out occurs, iDRAC firmware drops the connection, disconnecting the link between the server and the virtual drive.
If you change the CD in the client system, the new CD may have an autostart feature. In this case, the firmware can time out and the
connection is lost if the client system takes too long to read the CD. If a connection is lost, reconnect from the GUI and continue the
previous operation.
If the Virtual Media configuration settings are changed in the iDRAC web interface or through local RACADM commands, any connected
media is disconnected when the configuration change is applied.
To reconnect to the Virtual Drive, use the Virtual Media Client View window.
Why does a Windows operating system installation through Virtual Media take an extended amount of time?
If you are installing the Windows operating system using the Dell Systems Management Tools and Documentation DVD and the network
connection is slow, the installation procedure may require an extended amount of time to access iDRAC web interface due to network
latency. The installation window does not indicate the installation progress.
How to configure the virtual device as a bootable device?
On the managed system, access BIOS Setup and go to the boot menu. Locate the virtual CD, virtual floppy, or vFlash and change the
device boot order as required. Also, press the "spacebar" key in the boot sequence in the CMOS setup to make the virtual device
bootable. For example, to boot from a CD drive, configure the CD drive as the first device in the boot order.
sys a: x: /s
2. Locate the last entry to that message and note the time.
3. At the Linux prompt, run the following command:
where, hh:mm:ss is the time stamp of the message returned by grep in step 1.
4. In step 3, read the result of the grep command and locate the device name that is given to the Virtual Floppy.
5. Make sure that you are attached and connected to the virtual floppy drive.
6. At the Linux prompt, run the following command:
where, /dev/sdx is the device name found in step 4 and /mnt/floppy is the mount point.
To mount the virtual CD drive, locate the device node that Linux assigns to the virtual CD drive. To mount the virtual CD drive:
1. Open a Linux command prompt and run the following command:
2. Locate the last entry to that message and note the time.
3. At the Linux prompt, run the following command:
where: /dev/sdx is the device name found in step 4 and /mnt/floppy is the mount point.
Why are the virtual drives attached to the server removed after performing a remote firmware update using the iDRAC web
interface?
Firmware updates cause the iDRAC to reset, drop the remote connection, and unmount the virtual drives. The drives reappear when
iDRAC reset is complete.
Why are all the USB devices detached after connecting a USB device?
vFlash SD card
When is the vFlash SD card locked?
The vFlash SD card is locked when an operation is in-progress. For example, during an initialize operation.
SNMP authentication
Why is the message 'Remote Access: SNMP Authentication Failure' displayed?
As part of discovery, IT Assistant attempts to verify the get and set community names of the device. In IT Assistant, you have the get
community name = public and the set community name = private. By default, the SNMP agent community name for iDRAC agent is public.
When IT Assistant sends out a set request, the iDRAC agent generates the SNMP authentication error because it accepts requests only
from community = public.
To prevent SNMP authentication errors from being generated, you must enter community names that are accepted by the agent. Since
the iDRAC only allows one community name, you must use the same get and set community name for IT Assistant discovery setup.
Storage devices
Information for all the storage devices connected to the system are not displayed and OpenManage Storage Management
displays more storage devices that iDRAC. Why?
iDRAC displays information for only the Comprehensive Embedded Management (CEM) supported devices.
How to check the version number of the iDRAC Service Module installed in the system?
To check the version of the iDRAC Service Module in the system, do any of the following:
• Click Start > Control Panel > Programs and Features. The version of the installed iDRAC Service Module is listed in the Version
tab.
• Go to My Computer > Uninstall or change a program.
What is the minimum permission level required to install the iDRAC Service Module?
To install the iDRAC Service Module, you must have administrator level privileges.
On iDRAC Service Module version 2.0 and earlier, while installing the iDRAC Service Module, an error message is displayed
stating this is not a supported server. Consult the User Guide for additional information about the supported servers. How
to resolve this error?
Before installing the iDRAC Service Module, make sure that the server is a 12th generation PowerEdge server or later. Also, make sure
that you have a 64-bit system.
The following message is displayed in the OS log, even when the OS to iDRAC Pass-through over USBNIC is configured
properly. Why?
The iDRAC Service Module is unable to communicate with iDRAC using the OS to iDRAC Pass-through channel
iDRAC Service Module uses the OS to iDRAC pass-through over USB NIC feature to establish the communication with iDRAC.
Sometimes, the communication is not established though the USB NIC interface is configured with the correct IP endpoints. This may
happen when the host operating system routing table has multiple entries for the same destination mask and the USB NIC destination is
not listed as the first one in routing order.
In the example enp0s20u12u3 is the USB NIC interface. The link-local destination mask is repeated and the USB NIC is not the first one
in the order. This results in the connectivity issue between iDRAC Service Module and iDRAC over the OS to iDRAC Pass-through. To
troubleshoot the connectivity issue, make sure that the iDRAC USBNIC IPv4 address (by default it is 169.254.1.1) is reachable from the
host operating system.
If not:
• Change the iDRAC USBNIC address on a unique destination mask.
• Delete the entries that are not required from the routing table to make sure that USB NIC is chosen by route when the host wants to
reach the iDRAC USB NIC IPv4 address.
Red Hat Enterprise Linux, SUSE Linux, CentOS, and Citrix /var/log/messages
XenServer
VMware ESXi /var/log/syslog.log
What are the Linux-dependent packages or executables available for installation while completing the Linux installation?
To see the list of Linux-dependent packages, see the Linux Dependencies section in the iDRAC Service Module User's Guide available at
www.dell.com/esmmanuals.
RACADM
After performing an iDRAC reset (using the racadm racreset command), if any command is issued, the following message is
displayed. What does this indicate?
The message indicates that you must wait until the iDRAC completes the reset before issuing another command.
When using RACADM commands and subcommands, some errors are not clear.
You may see one or more of the following errors when using the RACADM commands:
• Local RACADM error messages — Problems such as syntax, typographical errors, and incorrect names.
• Remote RACADM error messages — Problems such as incorrect IP Address, incorrect user name, or incorrect password.
During a ping test to iDRAC, if the network mode is switched between Dedicated and Shared modes, there is no ping
response.
Clear the ARP table on your system.
Remote RACADM fails to connect to iDRAC from SUSE Linux Enterprise Server (SLES) 11 SP1.
Why are the remote RACADM and web-based services unavailable after a property change?
It may take a while for the remote RACADM services and the Web-based interface to become available after the iDRAC web server
resets.
The iDRAC Web server is reset when:
• The network configuration or network security properties are changed using the iDRAC web user interface.
• The iDRAC.Webserver.HttpsPort property is changed, including when a racadm set -f <config file> changes it.
• The racresetcfg command is used.
• iDRAC is reset.
• A new SSL server certificate is uploaded.
Why is an error message displayed if you try to delete a partition after creating it using local RACADM?
This occurs because the create partition operation is in-progress. However, the partition is deleted after sometime and a message that the
partition is deleted is displayed. If not, wait until the create partition operation is completed and then delete the partition.
Miscellaneous
When an OS is installed, hostname may or may not appear/
change automatically.
There are two scenarios:
• Scenario 1: iDRAC is not showing the latest hostname once you install an OS. You need to install OMSA or iSM along with the iDRAC
to get the hostname reflected.
• Scenario 2: iDRAC had a hostname for a specific OS and another different OS has been installed and still the hostname is appearing as
the old hostname without overwriting the hostname. The reason behind, hostname is an information which is coming from the OS,
iDRAC only saves the information. If there is a new OS has been installed, iDRAC does not reset the value of the hostname. However,
newer versions of the OSs are capable to update the hostname in iDRAC during the 1st OS startup.
• Using LCD:
On the main menu, highlight the server, press the check button, select the required server, and press the check button.
For more information on CMC RACADM commands, see the Chassis Management Controller RACADM CLI Guide available at
www.dell.com/cmcmanuals.
For more information on iDRAC RACADM commands, see the iDRAC RACADM CLI Guide available at www.dell.com/idracmanuals.
NOTE: Shared LOM IP of iDRAC is not accessible in pre-boot state when the switch is configured with LACP.
Inserted the blade server into the chassis and pressed the
power switch, but it did not power on.
• iDRAC requires up to two minutes to initialize before the server can power on.
• Check CMC power budget. The chassis power budget may have exceeded.