DRAC5 Users Guide PDF
DRAC5 Users Guide PDF
DRAC5 Users Guide PDF
Controller 5
Firmware Version 1.60
Users Guide
Contents
1
DRAC 5 Overview .
. . . . . . . . . . . . . . . . . .
25
. . . . . . . . . .
26
. . . . . . . . . . . . . . .
26
. . . . . . . . . . . .
29
. . . . . . . . . . . .
30
. . . . . .
33
. . . . . .
35
. . . . . . . . . . . . . . . . . . . .
35
. . . . . . . . . . . .
. . . . . . .
36
. . . . . . . .
37
. . . . . . . . . .
37
. . . . . . . . . . . . . .
38
35
. . . . . . . .
38
. . . . . . . . . . . . .
39
. . . . . .
Contents
39
. . . . . .
40
. . . . . . . . . . . . . . . . .
40
. . . . . . . . . . . . .
40
. . . . . . . . . . . . . . . . . .
41
. . . . . . . .
. . . . .
41
. . . . . . . . . .
42
. . . . . .
43
. . . . . . . . . . . .
43
. . . . . . . .
. . . . . . .
43
44
. . . . . . . . . .
44
. . . . . . . . . . . . .
47
. . . . . . . . . . . . . . . . . . . .
47
. . . . . . . . . . . . .
. . . . . . . . . . .
47
48
. . . . . . .
48
. . . . . . . .
50
44
. . . . . . . . .
Advanced Configuration
of the DRAC 5 . . . . . . . .
Before You Begin .
43
. . . . . . . . . . . . . .
41
. . . .
50
. . . . . . .
51
. . . .
51
. . . . . . .
52
. . . . .
54
. . . . . .
57
. . . . . . .
58
. . . . . . . . . . . .
60
. . . . . . . . . . . . .
60
. . . . . . . . . . . . . .
60
. . . . . . . .
61
. . . . . . . . .
61
. . . . . . . . . . . .
63
. . . . .
64
. . . . . .
65
. . . . . . . . .
65
. . . . . . .
66
. . . . . . .
67
. . . . . . . .
68
Contents
. . . . . . . .
69
. . . . . . . . . . . .
70
. . . . . . . . . . . . . .
71
. . . . . . .
72
. . . . . . .
73
. . . . . . . . . . . . . . .
75
. . . . . . . . . . .
75
. . . . . . . . . . . . . . . .
78
. . . . . . . . . . . . . . . . . . .
79
RACADM Options .
. . . . . . . . . . . . . . . . .
. . . . . . . . . .
80
. . . . . . . . . . . . .
81
. . . . . . . .
83
. . . . . . . . . .
83
. . . . . . .
85
. . . . . . . . . . . . . . . . . . . .
87
. . . . . . . . .
Contents
80
89
. . . . .
90
. . . . . . . . . . . . . .
92
. . . . . . . . . . . . .
95
. . . . . . . . . . . . . .
100
. . . . . . . . . . . . . . . . .
100
101
. . . . . . . . . . . . . . .
. . . . . . . . . . . . .
102
. . . . . . . . . . . . . . .
103
. . . .
103
. . . .
103
. . . .
105
. . . . . .
105
. . . . . .
106
. . . . .
106
. . . . . . .
108
. . . . . .
109
. . . . . .
111
. . . . .
112
. . . . . . .
112
. . . . .
113
. . . . . . . . .
113
Contents
. . . . . .
. . . . .
123
. . . . .
124
. . . . .
126
. . . . .
128
. . . . . . . . .
129
. . . . . . . . . .
131
. . . . . . . . . .
133
. . . . .
133
. . . . . . . . . .
137
. . . . . . . . . .
137
. . . . . . . . . . .
137
. . . . . . . .
138
. . . . . . . .
138
. . . . . . . . .
140
. . . . . . .
Contents
117
. . . .
117
. . . . . .
141
141
. . . . .
142
. . . . . . . .
143
. . . . . . . . . .
143
. . . . . . . . . .
143
. . . . . . . . . . . . . .
144
. . . .
147
. . . . . . . . .
147
. . . . . . . . . . . .
150
. . . . . . . . . . . .
151
. . . . . .
151
. . . . . .
151
. . . . . .
152
. . . . . . . . . . . .
153
. . . . . . . .
153
. . . . . . . . . .
154
. . . . . . .
Contents
154
. . . . . . . .
155
. . . . . . . . . . . . . . . .
155
. . . . . . . . . . . .
. . . . . . . .
158
. . . . . . . . . . .
158
. . . . . .
161
. . . . . . . . . . . . . . . . . . . . . . .
161
. . . . . . . . . . . . . .
. . . . .
162
. . . . .
162
. . . . . . . .
163
. . . . .
164
. . . . . . . .
167
. . . . . . . . . . . . . . . .
167
. . . . . . . .
168
. . . . . . . . . . .
171
Contents
161
10
157
. . . . . . .
172
. . . . . . . . . . . . .
173
. . . . . . . . . . . . .
173
. . . . . . . . . . . . .
183
. . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . .
. . . . . .
185
185
. . . . . . . . . . . . . . . . .
186
. . . . .
186
. . . . . . . . .
186
. . . . . . . . . . .
190
. . . . . . . . . . . .
192
. . . . . . . .
185
. . . . . . . .
183
193
. . . . . . .
193
. . . . . . . . . . . . . . . . . . .
194
. . . . . . . . . . . . . . .
194
. . . . . . . . . . . . . . .
194
. . . . . . . . .
. . . . . . .
195
. . . . . . . . . . .
196
. . . . . . . . . . . . . . . . .
197
195
. . . . . . . . . . . . . .
197
. . . . . . . . . . . . . . . .
198
. . . . .
201
. . . . . . . . . . .
202
Contents
11
. . . . . . . . . . . . . . . . . . .
Network Requirements .
202
. . . . . . . . . . . . .
202
. . . . . . . . . . . .
203
. . . . . . . . . . . .
203
. . . . . . . . . . . . . . .
203
. . . . . . . .
203
. . . . . . . . . . .
204
. . . . . . . . . . . . .
205
. . . . . . .
. . . .
212
. . . .
212
. . . . .
214
. . . . . .
215
. . . . . . . . . . .
215
. . . . . . . .
216
. . . . . . . . .
216
. . . . . . . . . .
218
. . . . . . . . . .
219
. . . . . . . . . . .
220
. . . . . . . . . . . . .
220
. . . . . . . . . . . . . . . . .
221
211
12
203
. . . .
202
. . . . . . . . . .
. . . .
225
. . . . . . . . . .
233
. . . . . . . . . . . . . . . .
233
. . . . . . . . . . . . . . . . . . . .
233
Using SM-CLP
. . . . . . . . . . . . . . . . . . .
230
. . . . . . . . .
234
. . . . . . . . .
235
. . . . . . . . . . . . . . . . . . . . . . .
235
. . . . . . . . . . . .
. . . . . .
248
. . . . . . .
248
. . . .
251
. . . . . .
252
. . . . . . . .
254
237
. . . . . . .
254
. . . . . . . . . . . .
255
. . . . . . .
Contents
256
13
. . . . . . . . . . . . . . .
. . . . . . .
257
. . . . . . . .
258
. . . . . . . . . . . . .
258
. . . . .
259
. . . . . . . . . . . . . . . . .
261
. . . . . . . . . . . .
263
. . . . . . . . . . . . . .
265
. . .
265
. . . . . . . . . . . . .
265
. . . . . .
267
. . . . . . . . . . . . . . . . . . .
267
. . . . . . . . . . .
267
. . . . . . . . . . .
270
. . . . . . . . .
274
. . . . . . . . . . . . .
275
. . . . .
14
Contents
257
277
. . . .
277
. . . . . . . .
277
. . . . . . . . .
278
. . . . . . . . . . . . . .
279
. . . . . . . . . . . . . . .
279
. . . . . . . . . . .
281
. . . . . . . . . . . .
282
283
. . . . . . . . .
283
. . . . . . . .
280
. . . . . . . . . . . . .
. . . . .
285
285
. . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . .
287
. . . . . . . . . . . . .
287
. . . . . . . . . . . . . . . . . . .
288
. . . . . . . . . . . . . . . . . . .
289
. . . . . . . . . . . . . . . . . . .
289
18 Sensors
. . . . . . . . . . . . . . . . . . . . . . . . .
Battery Probes .
Fan Probes .
291
. . . . . . . . . . . . . . . . . . . . .
291
. . . . . . . . . . . . . . . . . . . . . . .
291
. . . . . . . . . . . . . . . .
Contents
291
15
. . . . . . . . . . . . . . . .
. . . . . . . . . . . .
292
. . . . . . . . . . . . . . .
292
. . . . . . . . . . . . . . . .
293
. . . . . . . .
293
. . . . . . . . . . . . . . . . .
294
. . . . . . . . . . . . . . . . . .
294
. . . . . . . . . . . . . . . . . . . .
294
. . . . .
295
. . . . . . . . . . . . . . . . . . . . . . . . . .
295
. . . . . . . . . . . . . . . . . . . . . . . . . . .
296
help .
arp
clearasrscreen .
config .
. . . . . . . . . . . . . . . . . . . .
296
. . . . . . . . . . . . . . . . . . . . . . . . .
297
getconfig
. . . . . . . . . . . . . . . . . . . . . . . .
coredump .
. . . . . . . . . . . . . . . . . . . . . . .
fwupdate
Contents
299
302
. . . . . . . . . . . . . . . . . . . .
303
. . . . . . . . . . . . . . . . . . . . . . . .
303
coredumpdelete
16
292
getssninfo
. . . . . . . . . . . . . . . . . . . . . . .
306
getsysinfo .
. . . . . . . . . . . . . . . . . . . . . . .
308
getractime
. . . . . . . . . . . . . . . . . . . . . . .
311
ifconfig
. . . . . . . . . . . . . . . . . . . . . . . . .
312
netstat
. . . . . . . . . . . . . . . . . . . . . . . . .
312
ping .
. . . . . . . . . . . . . . . . . . . . . . . . . . .
313
setniccfg .
. . . . . . . . . . . . . . . . . . . . . . . .
314
getniccfg .
. . . . . . . . . . . . . . . . . . . . . . . .
315
getsvctag .
. . . . . . . . . . . . . . . . . . . . . . . .
316
racdump
. . . . . . . . . . . . . . . . . . . . . . . . .
317
racreset
. . . . . . . . . . . . . . . . . . . . . . . . .
318
racresetcfg .
. . . . . . . . . . . . . . . . . . . . . . .
319
serveraction
. . . . . . . . . . . . . . . . . . . . . . .
320
. . . . . . . . . . . . . . . . . . . . . . . .
321
. . . . . . . . . . . . . . . . . . . . . . . . .
323
getsel .
. . . . . . . . . . . . . . . . . . . . . . . . . .
323
clrsel .
. . . . . . . . . . . . . . . . . . . . . . . . . .
324
getraclog .
clrraclog
. . . . . . . . . . . . . . . . . . . . . . .
325
. . . . . . . . . . . . . . . . . . . . . . . .
326
gettracelog .
sslcsrgen .
sslcertupload
. . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . .
329
. . . . . . . . . . . . . . . . . . . . . . .
331
sslcertdownload .
sslcertview.
sslkeyupload .
sslresetcfg .
. . . . . . . . . . . . . . . . . . . . . .
333
. . . . . . . . . . . . . . . . . . . . . . .
334
. . . . . . . . . . . . . . . . . . . .
334
. . . . . . . . . . . . . . . . . . . . . . . .
336
krbkeytabupload .
testemail .
328
Contents
17
testtrap .
. . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . .
339
. . . . . . . . . . . . . . . . . . . . . . . . .
340
vmdisconnect
vmkey .
. . . . . . . . . . . . . . . . . . . .
340
. . . . . . . . . . . . . . . . . . . . .
342
usercertupload .
usercertview .
localConRedirDisable
. . . . . . . . . . . . . . . . .
idRacInfo .
345
. . . . . . . . . . . . . . . .
345
. . . . . . . . . . . . . . . . . . . . . . .
345
. . . . . . . . . .
. . . . . . . .
346
. . . . . . . . . .
346
. . . . . . . . . . .
346
347
. . . . . . . . . . . . . .
347
. . . . . . . . . . . . . . . . . .
347
345
. . . . . . . . . . . . .
cfgDNSDomainNameFromDHCP
(Read/Write) . . . . . . . . . . .
. . . . . . . .
cfgDNSDomainName (Read/Write) .
cfgDNSRacName (Read/Write) .
348
. . . . . . .
348
. . . . . . . . .
348
cfgDNSRegisterRac (Read/Write)
. . . . . . . .
cfgDNSServersFromDHCP (Read/Write) .
349
. . . .
349
cfgDNSServer1 (Read/Write) .
. . . . . . . . . .
350
cfgDNSServer2 (Read/Write) .
. . . . . . . . . .
350
. . . . . . . . . . .
350
cfgNicEnable (Read/Write) .
cfgNicIpAddress (Read/Write)
Contents
343
. . . . . . . . . .
Displayable Characters
18
337
. . . . . . . . . .
351
cfgNicNetmask (Read/Write) .
. . . . . . . . . . .
351
cfgNicGateway (Read/Write) .
. . . . . . . . . . .
352
cfgNicUseDhcp (Read/Write)
. . . . . . . . . . .
352
cfgNicSelection (Read/Write)
. . . . . . . . . . .
353
. . . . . . . . . .
353
cfgNicVLanEnable (Read/Write)
. . . . . . . . . .
354
. . . . . . . . . . . .
354
cfgNicVLanId (Read/Write) .
cfgNicVLanPriority (Read/Write) .
cfgRemoteHosts
. . . . . . . . .
354
. . . . . . . . . . . . . . . . . . . . .
355
cfgRhostsSmtpServerIpAddr (Read/Write)
. . . .
cfgRhostsFwUpdateTftpEnable (Read/Write)
. . .
355
. . . . .
356
. . . . . .
356
. . . . . . . . . . . . . . . . . . . . . .
357
cfgRhostsFwUpdateIpAddr (Read/Write)
cfgRhostsFwUpdatePath (Read/Write) .
cfgUserAdmin
. . .
357
. . . . . . . . .
357
cfgUserAdminIpmiLanPrivilege (Read/Write)
cfgUserAdminIpmiSerialPrivilege
(Read/Write) . . . . . . . . . . .
cfgUserAdminPrivilege (Read/Write)
. . . . . . .
cfgUserAdminUserName (Read/Write)
cfgUserAdminEnable .
358
. . . . . .
359
. . . . . . .
360
. . . . . . . . . . . . . . .
360
355
. . . . . . . . . . . . . .
360
. . . . . . . . . . . . . . . . . . . . . .
361
. . . . . . . . . .
cfgEmailAlertEnable (Read/Write)
. . . . . . . . .
. . . . . . . .
361
361
362
. . . . . .
362
. . . . . . . . . . . . . . . .
362
cfgSsnMgtConsRedirMaxSessions
(Read/Write) . . . . . . . . . . . .
. . . . . . . .
cfgSsnMgtRacadmTimeout (Read/Write)
. . . . .
Contents
362
363
19
cfgSsnMgtWebserverTimeout
(Read/Write) . . . . . . . . .
. . . . . . . . . .
. . . .
364
. . . . .
365
. . . . . . . . . . . . . . . . . . . . . . . .
365
cfgSsnMgtSshIdleTimeout (Read/Write) .
cfgSsnMgtTelnetTimeout (Read/Write) .
cfgSerial
cfgSerialBaudRate (Read/Write)
. . . . . . . . .
cfgSerialConsoleEnable (Read/Write)
. . . . . .
cfgSerialConsoleQuitKey (Read/Write) .
. . . . .
cfgSerialConsoleNoAuth (Read/Write) .
366
366
367
. . . . .
368
cfgSerialConsoleCommand (Read/Write)
. . . .
368
cfgSerialHistorySize (Read/Write)
. . . . . . . .
368
cfgSerialSshEnable (Read/Write).
. . . . . . . .
369
cfgSerialTelnetEnable (Read/Write)
. . . . . . .
cfgNetTuning .
369
. . . . . . . . . . . . . . . . . . . . .
370
. . . . .
370
. . . . . .
371
cfgNetTuningNicAutoneg (Read/Write)
cfgNetTuningNic100MB (Read/Write)
cfgNetTuningNicFullDuplex (Read/Write)
cfgNetTuningNicMtu (Read/Write) .
. . . .
371
. . . . . . .
371
cfgNetTuningTcpSrttDflt (Read/Write)
cfgOobSnmp
369
. . . .
cfgSerialCom2RedirEnable (Read/Write) .
. . . . . .
372
. . . . . . . . . . . . . . . . . . . . . .
372
cfgOobSnmpAgentCommunity
(Read/Write) . . . . . . . . .
. . . . . . . . . .
cfgOobSnmpAgentEnable (Read/Write)
cfgRacTuning .
372
. . . . .
373
. . . . . . . . . . . . . . . . . . . . .
373
cfgRacTunePluginType
. . . . . . . . . . . . . .
cfgRacTuneHttpPort (Read/Write)
. . . . . . . .
cfgRacTuneHttpsPort (Read/Write) .
cfgRacTuneIpRangeAddr .
373
374
. . . . . . .
374
. . . . . . . . . . .
374
. . . . . . . . . . . .
375
cfgRacTuneIpRangeEnable .
Contents
366
. . .
cfgSerialConsoleIdleTimeout (Read/Write).
20
363
cfgRacTuneIpRangeMask
cfgRacTuneIpBlkEnable
. . . . . . . . . . . . .
375
. . . . . . . . . . . . . .
375
cfgRacTuneIpBlkFailcount
. . . . . . . . . . . . .
376
cfgRacTuneIpBlkFailWindow .
. . . . . . . . . . .
376
cfgRacTuneIpBlkPenaltyTime
. . . . . . . . . . .
377
cfgRacTuneSshPort (Read/Write)
. . . . . . . . .
377
cfgRacTuneTelnetPort (Read/Write)
. . . . . . . .
377
cfgRacTuneRemoteRacadmEnable
(Read/Write) . . . . . . . . . . . .
. . . . . . . .
378
cfgRacTuneConRedirEncryptEnable
(Read/Write) . . . . . . . . . . . .
. . . . . . . .
378
. . . . . .
378
. . . . . . . . . .
379
cfgRacTuneConRedirPort (Read/Write)
cfgRacTuneConRedirVideoPort
(Read/Write) . . . . . . . . . .
cfgRacTuneAsrEnable (Read/Write)
. . . . . . . .
379
cfgRacTuneDaylightOffset (Read/Write) .
. . . . .
380
cfgRacTuneTimezoneOffset (Read/Write)
. . . . .
380
. . .
380
. . . . . . . . . . .
381
cfgRacTuneWebserverEnable (Read/Write) .
cfgRacTuneLocalServerVideo
(Read/Write) . . . . . . . . .
cfgRacTuneLocalConfigDisable
. . . . . . . . . .
381
cfgRacTuneCtrlEConfigDisable .
. . . . . . . . . .
382
cfgRacTuneVirtualConsoleAuthorizeMultipleSessions
(Read/Write) . . . . . . . . . . . . . . . . . . . . 382
ifcRacManagedNodeOs .
. . . . . . . . . . . . . . . .
. . . . . . .
383
. . . . . . . .
383
. . . . . . . . . . . . . . . . . . . . .
384
ifcRacMnOsHostname (Read/Write) .
ifcRacMnOsOsName (Read/Write) .
cfgRacSecurity.
383
. . . .
384
. . . . . . . . .
384
. . . . . . . . . .
385
cfgRacSecCsrCommonName (Read/Write)
cfgRacSecCsrOrganizationName
(Read/Write) . . . . . . . . . . .
cfgRacSecCsrOrganizationUnit
(Read/Write) . . . . . . . . . .
Contents
21
cfgRacSecCsrLocalityName (Read/Write)
cfgRacSecCsrStateName (Read/Write)
. . . .
385
. . . . .
385
. . . .
386
. . . . .
386
. . . . . . .
386
. . . . . . . . . . . . . . . . . . . . .
387
cfgRacSecCsrCountryCode (Read/Write)
cfgRacSecCsrEmailAddr (Read/Write) .
cfgRacSecCsrKeySize (Read/Write)
cfgRacVirtual .
. . . . . . .
387
. . . . . . . . .
387
cfgVirMediaAttached (Read/Write)
cfgVirAtapiSvrPort (Read/Write)
cfgVirAtapiSvrPortSsl (Read/Write)
. . . . . . .
. . . . . .
389
cfgVirMediaPluginTypr (Read/Write) .
. . . . . .
389
cfgVirtualBootOnce (Read/Write)
. . . . . . . .
389
cfgFloppyEmulation (Read/Write).
. . . . . . . .
390
. . . . . . . . . . . . . . . . . .
391
cfgActiveDirectory .
. . . . . . . . .
391
. . . . . . . . . .
391
. . . . . . . . . . . .
392
cfgADRacDomain (Read/Write).
cfgADRacName (Read/Write)
cfgADEnable (Read/Write)
. . . . . . . .
395
. . . . . . . . .
395
. . . . . . . . . . . . .
395
cfgADAuthTimeout (Read/Write) .
cfgADRootDomain (Read/Write)
cfgADType (Read/Write)
cfgADSSOEnable (Read/Write) .
cfgStandardSchema
. . . . . . . . .
396
. . . . . . . . . . . . . . . . . .
396
. . . . . .
cfgSSADRoleGroupName (Read/Write)
. . . . .
cfgSSADRoleGroupDomain (Read/Write)
. . . .
cfgSSADRoleGroupPrivilege (Read/Write) .
cfgIpmiSerial .
396
397
397
. . . . . . . . . . . . . . . . . . . . .
398
. . . . . . . . .
cfgIpmiSerialBaudRate (Read/Write) .
. . . . . .
cfgIpmiSerialChanPrivLimit (Read/Write)
Contents
396
. . .
cfgIpmiSerialConnectionMode
(Read/Write) . . . . . . . . . .
22
388
cfgVirMediaKeyEnable (Read/Write) .
. . . .
398
399
399
cfgIpmiSerialFlowControl (Read/Write)
cfgIpmiSerialHandshakeControl
(Read/Write) . . . . . . . . . .
. . . . . .
399
. . . . . . . . . .
400
cfgIpmiSerialLineEdit (Read/Write)
. . . . . . . .
cfgIpmiSerialEchoControl (Read/Write)
. . . . . .
401
. . . . . . . . .
401
cfgIpmiSerialInputNewLineSequence
(Read/Write) . . . . . . . . . . . . . .
cfgIpmiSol
. . . . . .
402
. . . . . . . . . . . . . . . . . . . . . . . .
402
cfgIpmiSolEnable (Read/Write).
. . . . . . . . . .
cfgIpmiSolBaudRate (Read/Write) .
. . . . . . . .
cfgIpmiSolMinPrivilege (Read/Write)
cfgIpmiSolAccumulateInterval
(Read/Write) . . . . . . . . . .
cfgIpmiLan .
402
403
. . . . . . .
403
. . . . . . . . . .
404
cfgIpmiSolSendThreshold (Read/Write)
. . . . . .
404
. . . . . . . . . . . . . . . . . . . . . . .
404
cfgIpmiLanEnable (Read/Write)
. . . . . . . . . .
cfgIpmiLanPrivLimit (Read/Write)
. . . . . . . . .
cfgIpmiLanAlertEnable (Read/Write) .
cfgIpmiEncryptionKey (Read/Write)
404
405
. . . . . . .
405
. . . . . . . .
406
cfgIpmiPetCommunityName (Read/Write) .
cfgIpmiPef
401
. . . . .
cfgIpmiSerialDeleteControl (Read/Write)
cfgIpmiSerialNewLineSequence
(Read/Write) . . . . . . . . . . .
400
. . . .
406
. . . . . . . . . . . . . . . . . . . . . . . .
406
. . . . . . . . . . .
407
. . . . . . . . . . .
407
cfgIpmiPefAction (Read/Write) .
. . . . . . . . . .
407
cfgIpmiPefEnable (Read/Write)
. . . . . . . . . .
408
. . . . . . . . . . . . . . . . . . . . . . . .
408
cfgIpmiPet
cfgIpmiPetIndex (Read/Write)
. . . . . . . . . . .
cfgIpmiPetAlertDestIpAddr (Read/Write)
cfgIpmiPetAlertEnable (Read/Write) .
408
. . . . .
408
. . . . . . .
409
Contents
23
cfgLogging
409
. . . . . .
409
. . . . . .
411
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
413
Index
24
. . . . . . . . . . . . . . . . . . . . . . .
cfgLoggingSELOEMEventFilterEnable
(Read/Write) . . . . . . . . . . . . .
Contents
DRAC 5 Overview
DRAC 5 Overview
25
50-pin management
cable connector
RJ-45
Connector
PCIe Connector
DRAC 5 Specifications
Power Specifications
Connectors
NOTE: The DRAC 5 hardware installation instructions can be found in the Installing
a Remote Access Card document or the Installation and Troubleshooting Guide
included with your system.
26
DRAC 5 Overview
The DRAC 5 includes one onboard 10/100 Mbps RJ-45 NIC, a 50-pin
management cable, and a 44-pin MII cable. See Figure 1-1 for the DRAC 5
cable connectors.
The 50-pin management cable is the main interface to the DRAC that
provides connectivity to USB, serial, video, and an inter-integrated circuit
(I2C) bus. The 44-pin MII cable connects the DRAC NIC to the systems
motherboard. The RJ-45 connector connects the DRAC NIC to an out-of-band
connection when the DRAC 5 is configured in Dedicated NIC mode.
Depending on your requirements, you can use the management and MII
cables to configure your DRAC in three separate modes. See "DRAC Modes"
on page 91 for more information.
DRAC 5 Ports
Table 1-2 identifies the ports used by the DRAC 5 that listen for a server
connection. Table 1-3 identifies the ports that the DRAC 5 uses as a client.
This information is required when opening firewalls for remote access to
a DRAC 5.
Table 1-2. DRAC 5 Server Listening Ports
Port Number
Function
22*
23*
Telnet
80*
HTTP
161
SNMP Agent
443*
HTTPS
623
RMCP/RMCP+
3668*
3669*
5900*
5901*
* Configurable port
DRAC 5 Overview
27
Function
25
SMTP
53
DNS
68
DHCP-assigned IP address
69
TFTP
162
SNMP trap
636
LDAPS
3269
Features
DRAC 5 NIC
Serial port
28
DRAC 5 Overview
Access to system event logs Provides access to the system event log
(SEL), DRAC 5 log, and last crash screen of the crashed or unresponsive
system that is independent of the operating system state.
RAC alert Alerts you to potential managed node issues through e-mail
messages or an SNMP trap using the Dedicated, Shared with Failover, or
Shared NIC settings.
29
IPMI support.
Sensors for monitoring power consumption. The DRAC 5 uses this data to
depict system power consumption through charts and statistics.
30
The Dell Update Packages User's Guide provides information about obtaining
and using Dell Update Packages as part of your system update strategy.
DRAC 5 Overview
The Dell Systems Software Support Matrix provides information about the
various Dell systems, the operating systems supported by these systems,
and the Dell OpenManage components that can be installed on these
systems.
The safety instructions that came with your system provide important
safety and regulatory information. For additional regulatory information,
see the Regulatory Compliance home page at
www.dell.com/regulatory_compliance. Warranty information may be
included within this document or as a separate document.
DRAC 5 Overview
31
32
DRAC 5 Overview
You must install the DRAC 5 software on the management station as well
as the managed system. Without the managed system software, you
cannot use the RACADM locally, and the DRAC cannot capture the last
crash screen.
2 Configure the DRAC 5 properties, network settings, and users You can
configure the DRAC 5 by using either the Remote Access Configuration
Utility, the Web-based interface, or the RACADM.
3 Configure the Microsoft Active Directory to provide access to the
DRAC 5, allowing you to add and control DRAC 5 user privileges to
your existing users in your Active Directory software.
4 Configure Smart Card authentication Smart Card provides an added
level of security to your enterprise.
5 Configure remote access points, such as console redirection and
virtual media.
6 Configure the security settings.
33
34
This section provides information about how to install and set up your
DRAC 5 hardware and software.
35
36
Using the left-arrow and right-arrow keys, select one of the following
NIC selections:
Shared Select this option to share the network interface with the
host operating system. The remote access device network interface
is fully functional when the host operating system is configured for
NIC teaming. The remote access device receives data through NIC
1 and NIC 2, but transmits data only through NIC 1. If NIC 1 fails,
the remote access device will not be accessible.
Using the down-arrow key, select LAN Parameters, and press <Enter>.
Press <Esc>.
5 Press <Esc>.
6 Select Save Changes and Exit.
The system automatically reboots.
NOTE: When viewing the Web user interface on a Dell PowerEdge 1900 system
that is configured with one NIC, the NIC Configuration page displays two NICs
(NIC1 and NIC2). This behavior is normal. The PowerEdge 1900 system (and other
Dell systems that are configured with a single LAN On Motherboard) can be
configured with NIC teaming. Shared and Teamed modes work independently on
these systems.
See the Dell OpenManage Baseboard Management Controller Utilities Users
Guide for more information about the Dell Remote Access Configuration Utility.
37
Web-based interface
RACADM CLI
Serial/Telnet/SSH console
CAUTION: Using more than one DRAC 5 configuration tool at the same time may
generate unexpected results.
2 Configure the DRAC 5 network settings. See "Configuring DRAC 5
Properties" on page 47.
3 Add and configure DRAC 5 users. See "Adding and Configuring DRAC 5
Users" on page 95.
4 Configure the Web browser to access the Web-based interface.
See "Configuring a Supported Web Browser" on page 43.
5 Disable the Windows Automatic Reboot Option. See "Disabling the
Windows Automatic Reboot Option" on page 258.
6 Update the DRAC 5 Firmware. See "Connecting to the Managed System
Through the Local Serial Port or Telnet Management Station (Client
System)" on page 64.
7 Access the DRAC 5 through a network. See "Connecting to the Managed
System Through the Local Serial Port or Telnet Management Station
(Client System)" on page 64.
38
Managed system software installs your choices from the appropriate version
of Dell OpenManage Server Administrator on the managed system.
NOTE: Do not install the DRAC 5 management station software and the DRAC 5
managed system software on the same system.
CAUTION: The latest DRAC firmware supports only the latest RACADM version.
You may encounter errors if you use an older version of RACADM to query a DRAC
with the latest firmware. Install the RACADM version shipped with your latest
Dell OpenManage DVD media.
If Server Administrator is not installed on the managed system, you cannot
view the systems last crash screen or use the Auto Recovery feature.
For more information about the last crash screen, see "Viewing the Last
System Crash Screen" on page 283.
To ensure that the Dell Digital KVM Viewer functions properly, open the
following ports on your firewall:
39
Installing RACADM
1 Log on as root to the system where you want to install the management
station components.
2 If necessary, mount the Dell Systems Management Tools and
Documentation DVD using the following command or a similar command:
mount /media/cdrom
3 Navigate to the /linux/rac directory and execute the following command:
rpm -ivh *.rpm
For help with the RACADM command, type racadm help after issuing the
previous commands.
Uninstalling RACADM
To uninstall RACADM, open a command prompt and type:
rpm -e <racadm_package_name>
where <racadm_package_name> is the rpm package that was used to
install the RAC software.
For example, if the rpm package name is srvadmin-racadm5, then type:
rpm -e srvadmin-racadm5
40
Web-based Interface
RACADM CLI
Use the Firmware Update page to update the DRAC 5 firmware to the latest
revision. When you run the firmware update, the update retains the current
DRAC 5 settings.
41
3 In the Firmware Update page in the Firmware Image field, type the path
to the firmware image that you downloaded from support.dell.com or click
Browse to navigate to the image.
NOTE: If you are running Firefox, the text cursor does not appear in the
Firmware Image field.
For example:
C:\Updates\V1.0\<image_name>.
The default firmware image name is firmimg.d5.
4 Click Update.
The update may take several minutes to complete. When completed,
a dialog box appears.
5 Click OK to close the session and automatically log out.
6 After the DRAC 5 resets, click Log In to log in to the DRAC 5.
42
43
English
French
German
Spanish
Japanese
Simplified Chinese
45
46
47
48
Logging In
You can log in either as a DRAC 5 user or as a Microsoft Active Directory user.
The default user name and password are root and calvin, respectively.
Before you log in to the DRAC 5, verify that you have Log In to DRAC 5
permission. Speak to your organizations DRAC or network administrator to
confirm your access privileges.
To log in:
1 In the User Name field, type one of the following:
2 In the Password field, type your DRAC 5 user password or Active Directory
user password.
This field is case sensitive.
3 Click OK or press <Enter>.
49
Logging Out
When a telnet session is established to the DRAC 5 and these settings are
incorrect, connect com2 may display a blank screen.
50
IPMI serial interface. See "Using the IPMI Remote Access Serial Interface"
on page 274.
RAC also supports a serial console interface (or RAC Serial Console) that
provides a RAC CLI, which is not defined by IPMI. If your system includes
a RAC card with Serial Console enabled, the RAC card will override the
IPMI serial settings and display the RAC CLI serial interface.
51
Interface
Basic
Disabled
Basic Mode
Basic
Enabled
RAC CLI
Terminal
Disabled
Terminal
Enabled
RAC CLI
52
53
When you edit the /etc/grub.conf file, use the following guidelines:
1 Disable GRUB's graphical interface and use the text-based interface;
otherwise, the GRUB screen will not be displayed in RAC console
redirection. To disable the graphical interface, comment out the line
starting with splashimage.
2 To enable multiple GRUB options to start console sessions through the
RAC serial connection, add the following line to all options:
console=ttyS1,57600
Table 4-2 shows console=ttyS1,57600 added to only the first option.
54
#
# inittab This file describes how the INIT process
should set up
#
the system in a certain run-level.
#
# Author: Miquel van Smoorenburg
#
Modified for RHS Linux by Marc Ewing and
Donnie Barnes
#
# Default runlevel. The runlevels used by RHS are:
#
0 - halt (Do NOT set initdefault to this)
#
1 - Single user mode
#
2 - Multiuser, without NFS (The same as 3, if you
do not have
#
networking)
#
3 - Full multiuser mode
#
4 - unused
#
5 - X11
#
6 - reboot (Do NOT set initdefault to this)
#
id:3:initdefault:
# System initialization.
si::sysinit:/etc/rc.d/rc.sysinit
l0:0:wait:/etc/rc.d/rc
l1:1:wait:/etc/rc.d/rc
l2:2:wait:/etc/rc.d/rc
l3:3:wait:/etc/rc.d/rc
l4:4:wait:/etc/rc.d/rc
l5:5:wait:/etc/rc.d/rc
l6:6:wait:/etc/rc.d/rc
0
1
2
3
4
5
6
55
NOTE: You (the current user) must have Configure DRAC 5 permission in order to
perform the steps in this section.
To enable the serial/telnet/ssh console from the managed system, type the
following local RACADM commands from a command prompt:
racadm config -g cfgSerial -o cfgSerialConsoleEnable 1
racadm config -g cfgSerial -o cfgSerialTelnetEnable 1
racadm config -g cfgSerial -o cfgSerialSshEnable 1
Advanced Configuration of the DRAC 5
57
Using the RACADM Command to Configure the Settings for the Serial
and Telnet Console
This subsection provides steps to configure the default configuration settings
for serial/telnet/ssh console redirection.
To configure the settings, type the RACADM config command with the
appropriate group, property, and property value(s) for the setting that you
want to configure.
You can type RACADM commands locally or remotely. When using
RACADM commands remotely, you must include the user name, password,
and managed system DRAC 5 IP address.
Using RACADM Locally
58
Table 4-5 provides the actions and related commands to display your
configuration settings. To run the commands, open a command prompt on
the managed system, type the command, and press <Enter>.
Table 4-5. Displaying Configuration Settings
Action
Command
List the
racadm getconfig -h
available groups.
Display the
racadm getconfig -g <group>
current settings For example, to display a list of all cfgSerial group settings, type the
for a particular following command:
group.
racadm getconfig -g cfgSerial
Display the
current settings
for a particular
group remotely.
59
Type the following command to change the telnet port number on the DRAC 5.
racadm config -g cfgRacTuning -o cfgRacTuneTelnetPort
<new port number>
60
Description
Connection Mode
Setting
Baud Rate
Sets the data speed rate. Select 9600 bps, 19.2 kbps,
57.6 kbps, or 115.2 kbps.
61
Description
Flow Control
Channel Privilege
Level Limit
Administrator
Operator
User
Description
Enabled
Maximum Sessions
Timeout
Redirect Enabled
Baud Rate
The data speed on the external serial port. Values are 9600
bps, 28.8 kbps, 57.6 kbps, and 115.2 kbps. Default is
57.6 kbps.
Escape Key
The size of the serial history buffer, which holds the last
characters written to the console. The maximum and
default = 8192 characters.
Login Command
62
Description
Refresh
Apply Changes
Description
Line Editing
Delete Control
Echo Control
63
Description
Refresh
64
A managed system external serial port using terminal software and a DB-9
or a null modem cable
Signal Name
DB-9 Pin
(server pin)
DB-9 Pin
(workstation pin)
FG (Frame Ground)
TD (Transmit data)
RD (Receive Data)
SG (Signal Ground)
CD (Carrier Detect)
1 and 6
Microsoft Telnet
Perform the steps in the following subsections to configure your type of terminal
software. If you are using Microsoft Telnet, configuration is not required.
65
NOTE: To ensure that the text displays properly, Dell recommends that you use an
Xterm window to display the telnet console instead of the default console provided
by the Linux installation.
1 To start a new Xterm session, type xterm & at the command prompt.
2 In the Xterm window, move your mouse arrow to the lower right-hand
corner of the window and resize the window to 80 x 25.
3 If you do not have a Minicom configuration file, go to the next step.
If you have a Minicom configuration file, type minicom <Minicom
config file name> and skip to step 17.
4 At the Xterm command prompt, type minicom -s.
5 Select Serial Port Setup and press <Enter>.
6 Press <a> and select the appropriate serial device (for example,
/dev/ttyS0).
7 Press <e> and set the Bps/Par/Bits option to 57600 8N1.
8 Press <f> and set Hardware Flow Control to Yes and set Software Flow
Control to No.
9 To exit the Serial Port Setup menu, press <Enter>.
10 Select Modem and Dialing and press <Enter>.
11 In the Modem Dialing and Parameter Setup menu, press <Backspace>
to clear the init, reset, connect, and hangup settings so that they are blank.
12 Press <Enter> to save each blank value.
13 When all specified fields are clear, press <Enter> to exit the Modem
Dialing and Parameter Setup menu.
14 Select Save setup as config_name and press <Enter>.
15 Select Exit From Minicom and press <Enter>.
66
Setting Description
Required Setting
Bps/Par/Bits
57600 8N1
Yes
No
Terminal emulation
ANSI
Window size
67
3 Next to Connect using:, select the COM port on the management station
(for example, COM2) to which you have connected the DB-9 null modem
cable and click OK.
4 Configure the COM port settings as shown in Table 4-13.
5 Click OK.
6 Click File Properties, and then click the Settings tab.
7 Set the Telnet terminal ID: to ANSI.
8 Click Terminal Setup and set Screen Rows to 26.
9 Set Columns to 80 and click OK.
Table 4-13. Management Station COM Port Settings
Setting Description
Required Setting
57600
Data bits
Parity
None
Stop bits
Flow control
Hardware
68
When you are using the connect com2 command through a telnet console
to display the System Setup screens, set the terminal type to ANSI in
System Setup and for the telnet session.
To ensure that the text is properly displayed, Dell recommends that you
use an Xterm window to display the telnet console instead of the default
console provided by the Linux installation.
Depending on the telnet client, using the <Backspace> key may produce
unexpected results. For example, the session may echo ^h. However, most
Microsoft and Linux telnet clients can be configured to use the
<Backspace> key.
To configure Microsoft telnet clients to use the <Backspace> key:
1 Open a command prompt window (if required).
2 If you are not running a telnet session, type:
telnet
If you are running a telnet session, press <Ctrl><]>.
69
70
71
Scheme
Asymmetric Cryptography
Symmetric Cryptography
AES256-CBC
RIJNDAEL256-CBC
AES192-CBC
RIJNDAEL192-CBC
AES128-CBC
RIJNDAEL128-CBC
BLOWFISH-128-CBC
3DES-192-CBC
ARCFOUR-128
Message Integrity
HMAC-SHA1-160
HMAC-SHA1-96
HMAC-MD5-128
HMAC-MD5-96
Authentication
Password
72
Web-based interface
RACADM
Telnet Console
SSH
IPMI
DRAC 5 Interfaces
Interface
Description
Web-based
interface
RACADM
racadm sslcertupload -t 1 -f
c:\cert\cert.txt subcommands
73
Description
Telnet Console
Provides access through the DRAC 5 to the server RAC port and
hardware management interfaces through the DRAC 5 NIC and
provides support for serial and RACADM commands including
powerdown, powerup, powercycle, and hardreset commands.
IPMI Interface
NOTE: The DRAC 5 default user name is root and the default password is
calvin.
You can access the DRAC 5 Web-based interface through the DRAC 5 NIC
by using a supported Web browser, or through Server Administrator or IT
Assistant.
For a list of supported Web browsers, see the Dell Systems Software Support
Matrix on the Dell Support website at support.dell.com/manuals.
To access the DRAC 5 remote access interface using Server Administrator,
launch Server Administrator. From the system tree on the left pane of the
Server Administrator home page, click System Main System Chassis
Remote Access Controller. For more information, see your Server
Administrator Users Guide.
74
Network Settings
Setting
Description
NIC Selection
MAC Address
Enable NIC
75
Description
Use DHCP (For Enables Dell OpenManage Server Administrator to obtain the
NIC IP
DRAC 5 NIC IP address from the Dynamic Host Configuration
Address)
Protocol (DHCP) server. Selecting the check box deactivates the
Static IP Address, Static Gateway, and Static Subnet Mask
controls.
The default setting is Disabled.
Static IP
Address
Static Gateway
Static Subnet
Mask
Specifies or edits the static subnet mask for the DRAC 5 NIC. To
change this setting, deselect the Use DHCP (For NIC IP Address)
check box.
Use DHCP to Obtains the primary and secondary DNS server addresses from the
obtain DNS
DHCP server instead of the static settings.
server addresses The default setting is Disabled.
Static Preferred Uses the primary DNS server IP address only when Use DHCP to
DNS Server
obtain DNS server addresses is not selected.
Static Alternate Uses the secondary DNS server IP address when Use DHCP to
DNS Server
obtain DNS server addresses is not selected. You may enter an IP
address of 0.0.0.0 if you do not have an alternate DNS server.
Register DRAC Registers the DRAC 5 name on the DNS server.
on DNS
The default setting is Disabled.
DNS DRAC
Name
Uses the default DNS domain name. When the box is not selected
and the Register DRAC 5 on DNS option is selected, you can
modify the DNS domain name in the DNS Domain Name field.
The default setting is Disabled.
76
Table 4-16.
Setting
Description
DNS Domain
Name
Auto
Negotiation
Network Speed
Duplex Mode
Table 4-17.
Setting
Description
Encryption Key
Enable VLAN ID
VLAN ID
Priority
77
Description
Refresh
NOTE: Changes to the NIC IP address settings will close all user
sessions and require users to reconnect to the DRAC 5 Webbased interface using the updated IP address settings. All other
changes will require the NIC to be reset, which may cause a brief
loss in connectivity.
See "Configuring the Network Security Settings Using the DRAC 5 GUI" on
page 230 for more information.
capability. For more information about setting up your DRAC 5 and a list of related
documents, see "Basic Installation of the DRAC 5" on page 35.
RACADM provides a remote capability option (-r) that allows you to connect
to the managed system and execute racadm subcommands from a remote
console or management station. To use the remote capability, you need a
valid user name (-u option) and password (-p option), and the DRAC 5
IP address.
NOTE: If the system from where you are accessing the remote system does not
have a DRAC certificate in its default certificate store, a message is displayed when
you type a racadm command.
Security Alert: Certificate is invalid - Name on
Certificate is invalid or does not match site name
Continuing execution. Use -S option for racadm to
stop the execution on certificate-related errors.
78
NOTE: When using the racadm remote capability, you must have write permissions
on the folders where you are using the racadm subcommands involving file
operations, for example:
RACADM Synopsis
racadm -r <RAC IP Address> -u <username> -p <password>
<subcommand> <subcommand options>
racadm -i -r <RAC IP Address> <subcommand> <subcommand
options>
For example:
racadm -r 192.168.0.120 -u root -p calvin getsysinfo
racadm -i -r 192.168.0.120 getsysinfo
If the HTTPS port number of the RAC has been changed to a custom port
other than the default port (443), the following syntax must be used:
racadm -r <RAC IP Address>:<port> -u <username> -p
<password> <subcommand> <subcommand options>
racadm -i -r <RAC IP Address>:<port> <subcommand>
<subcommand options>
Advanced Configuration of the DRAC 5
79
RACADM Options
Table 4-19 lists the options for the racadm command.
Table 4-19. racadm Command Options
Option
Description
-r <racIpAddr>
-r <racIpAddr>:<port
number>
-i
-u <usrName>
-p <password>
-S
80
RACADM Subcommands
Table 4-20 provides a description of each racadm subcommand that you can
run in RACADM. For a detailed listing of racadm subcommands including
syntax and valid entries, see "RACADM Subcommand Overview" on
page 295.
When entering a RACADM subcommand, prefix the command with
racadm. For example:
racadm help
Table 4-20.
RACADM Subcommands
Command
Description
help
help
<subcommand>
arp
Displays the contents of the ARP table. ARP table entries may
not be added or deleted.
clearasrscreen
clrraclog
config
getconfig
coredump
coredumpdelete
fwupdate
getssninfo
getsysinfo
getractime
ifconfig
netstat
ping
setniccfg
getniccfg
81
Description
getsvctag
racdump
racreset
racresetcfg
serveraction
getraclog
clrsel
gettracelog
Displays the DRAC 5 trace log. If used with -i, the command
displays the number of entries in the DRAC 5 trace log.
sslcsrgen
sslcertupload
sslcertdownload
Downloads a CA certificate.
sslcertview
sslresetcfg
testemail
Forces the DRAC 5 to send a test e-mail over the DRAC 5 NIC
to check the e-mail configuration.
testtrap
Forces the DRAC 5 to send a test SNMP trap over the DRAC 5
NIC to check the trap configuration.
vmdisconnect
vmkey
Resets the virtual flash size to its default size (16 MB).
82
When I ping the DRAC IP address from my system and then switch my
DRAC 5 card between Dedicated and Shared modes during the ping
response, I do not receive a response.
Clear the ARP table on your system.
the static IP address) that must be modified before you export the file to other
DRAC 5 cards.
83
The config subcommand loads the information into other DRAC 5s. Use config
to synchronize the user and password database with Server Administrator
84
Created
The .cfg file is first parsed to verify that valid group and object names are
present and that some simple syntax rules are being followed. Errors are
flagged with the line number that detected the error, and a simple message
explains the problem. The entire file is parsed for correctness, and all errors
are displayed. Write commands are not transmitted to the DRAC 5 if an error
is found in the .cfg file. The user must correct all errors before any
configuration can take place. The -c option may be used in the config
subcommand, which verifies syntax only and does not perform a write
operation to the DRAC 5.
85
86
Parsing Rules
87
The line for an indexed group cannot be deleted from a .cfg file.
You must remove an indexed object manually using the following
command:
racadm config -g <groupName> -o <objectName> -i
<index 1-16> ""
NOTE: A NULL string (identified by two "" characters) directs the DRAC 5 to delete
the index for the specified group.
For indexed groups the object anchor must be the first object after the "[ ]"
pair. The following are examples of the current indexed groups:
[cfgUserAdmin]
cfgUserAdminUserName=<USER_NAME>
88
#
[cfgLanNetworking]
cfgNicIpAddress=10.35.10.110
cfgNicGateway=10.35.10.1
This file will be updated as follows:
#
#
#
[cfgLanNetworking]
cfgNicIpAddress=10.35.9.143
# comment, the rest of this line is ignored
cfgNicGateway=10.35.9.1
The command racadm config -f myfile.cfg parses the file and identifies any
errors by line number. A correct file will update the proper entries.
Additionally, you can use the same getconfig command from the previous
example to confirm the update.
89
DRAC Modes
Dedicated
Shared
Mode
Description
Dedicated
The DRAC uses its own NIC (RJ-45 connector) and the BMC
MAC address for network traffic.
Shared
Shared with
failover
91
92
93
94
To manage your system with the DRAC 5 and maintain system security, create
unique users with specific administrative permissions (or role-based authority).
For additional security, you can also configure alerts that are e-mailed to
specific users when a specific system event occurs.
To add and configure DRAC 5 users:
NOTE: You must have Configure DRAC 5 permission to perform the following steps.
1 Expand the System tree and click Remote Access.
2 Click the Configuration tab and then click Users.
The Users page appears, which includes each users State, User Name, RAC
Privilege, IPMI LAN Privilege, IPMI Serial Privilege and Serial Over LAN.
3 In the User ID column, click a user ID number.
4 On the User Main Menu page, you can configure users, upload a user
certificate, view an existing user certificate, upload a trusted certification
authority (CA) certificate, or view a trusted CA certificate.
If you select Configure User and click Next, the User Configuration page
is displayed. See step 5 for more information.
See Table 5-1 if you select the options under the Smart Card
Configuration section.
5 In the User Configuration page, configure the users properties and privileges.
Table 5-2 describes the General settings for configuring a new or existing
DRAC user name and password.
Table 5-3 describes the IPMI User Privileges for configuring the users
LAN privileges.
95
Table 5-4 describes the User Group Permissions for the IPMI User
Privileges and the DRAC User Privileges settings.
Table 5-5 describes the DRAC Group permissions. If you add a DRAC
User Privilege to the Administrator, Power User, or Guest User, the DRAC
Group will change to the Custom group.
6 When completed, click Apply Changes.
7 Click the appropriate User Configuration page button to continue. See
Table 5-6.
Table 5-1. Options in the Smart Card Configuration section
Option
Description
Upload User Certificate Enables you to upload the user certificate to DRAC and
import it to the user profile.
View User Certificate
Upload Trusted CA
Certificate
View Trusted CA
Certificate
Description
User ID
Enable User
96
Description
User Name
not appear in the user interface until the next user login.
Change Password
New Password
Description
Enable Serial Over LAN Allows user to use IPMI Serial Over LAN. When
checked, this privilege is enabled.
97
Description
DRAC Group
Login to DRAC
Configure DRAC
Configure Users
Clear Logs
Access Console
Redirection
Test Alerts
Execute Diagnostic
Commands
Permissions Granted
Administrator
Power User
Guest User
Login to DRAC.
98
Permissions Granted
Custom
None
No assigned permissions.
Action
Refresh
Go Back To Users
Page
Apply Changes
99
Use the RACADM examples in this section as a guide to create a batch file
of racadm commands and then execute the batch file on each
managed system.
100
To verify if a user exists, type the following command at the command prompt:
racadm getconfig -u <username>
OR
type the following command once for each index of 116:
racadm getconfig -g cfgUserAdmin -i <index>
NOTE: You can also type racadm getconfig -f <myfile.cfg> and view
or edit the myfile.cfg file, which includes all DRAC 5 configuration parameters.
Several parameters and object IDs are displayed with their current values.
Two objects of interest are:
# cfgUserAdminIndex=XX
cfgUserAdminUserName=
If the cfgUserAdminUserName object has no value, that index number,
which is indicated by the cfgUserAdminIndex object, is available for use.
If a name appears after the "=", that index is taken by that user name.
NOTE: When you manually enable or disable a user with the racadm config
subcommand, you must specify the index with the -i option. Observe that the
cfgUserAdminIndex object displayed in the previous example contains a '#'
character. Also, if you use the racadm config -f racadm.cfg command to specify any
number of groups/objects to write, the index cannot be specified. A new user is
added to the first available index. This behavior allows more flexibility in configuring
multiple DRAC 5s with the same settings.
101
Example
The following example describes how to add a new user named "John" with a
"123456" password and LOGIN privileges to the RAC.
racadm config -g cfgUserAdmin -o cfgUserAdminUserName
-i 2 john
racadm config -g cfgUserAdmin -o cfgUserAdminPassword
-i 2 123456
racadm config -g cfgUserAdmin -i 2 -o cfgUserPrivilege
0x00000001
racadm config -g cfgUserAdmin -i 2 -o
cfgUserAdminEnable 1
To verify, use one of the following commands:
racadm getconfig -u john
racadm getconfig g cfgUserAdmin i 2
102
103
104
105
106
Configuration on Active
Directory Side
Role
Group Name
and Domain
Name
Role
Group
Role
Definition
User
Default
Permissions Granted
Privilege Level
Bit Mask
Role
Group 1
Administrator
0x000001ff
Role
Group 2
Power User
0x000000f9
107
Default
Permissions Granted
Privilege Level
Bit Mask
Role
Group 3
Guest User
Login to DRAC
0x00000001
Role
Group 4
None
No assigned permissions
0x00000000
Role
Group 5
None
No assigned permissions
0x00000000
NOTE: The Bit Mask values are used only when setting Standard Schema with the
RACADM.
There are two ways to enable Standard Schema Active Directory:
With the DRAC 5 web-based user interface. See "Configuring the DRAC
5 With Standard Schema Active Directory and Web-Based Interface" on
page 109.
With the RACADM CLI tool. See "Configuring the DRAC 5 With
Standard Schema Active Directory and RACADM" on page 111.
108
Type the Root Domain Name. The Root Domain Name is the fully
qualified root domain name for the forest.
109
In the Certificate Upload page, type the file path of the certificate or
browse to the certificate file.
NOTE: The File Path value displays the relative file path of the certificate you
are uploading. You must type the absolute file path, which includes the full
path and the complete file name and file extension.
Click Apply.
The DRAC 5 Web server automatically restarts after you click Apply.
17 Log out and then log in to the DRAC 5 to complete the DRAC 5 Active
Directory feature configuration.
18 In the System tree, click Remote Access.
19 Click the Configuration tab and then click Network.
The Network Configuration page appears.
20 If Use DHCP (for NIC IP Address) is selected under Network Settings,
select Use DHCP to obtain DNS server address.
To manually input a DNS server IP address, deselect Use DHCP to obtain
DNS server addresses and type your primary and alternate DNS server IP
addresses.
21 Click Apply Changes.
The DRAC 5 Standard Schema Active Directory feature configuration is
complete.
110
111
Instead of DRAC 5 searching for Active Directory servers, you can specify the
servers DRAC 5 needs to connect to, to authenticate the user. See "Specify
Server for Active Directory Configuration" on page 131 for information on
RACADM commands to specify servers.
With the DRAC 5 web-based user interface. See "Configuring the DRAC
5 With Extended Schema Active Directory and Web-Based Interface" on
page 126.
With the RACADM CLI tool. See "Configuring the DRAC 5 With
Extended Schema Active Directory and RACADM" on page 128.
112
113
Association
Object
User(s)
Group(s)
Privilege
Object
RAC Device
Object(s)
RAC4 Privilege
Object
NOTE: The RAC privilege object applies to both DRAC 4 and DRAC 5.
You can create as many or as few association objects as required. However,
you must create at least one Association Object, and you must have one RAC
Device Object for each RAC (DRAC 5) on the network that you want to
integrate with Active Directory for Authentication and Authorization with
the RAC (DRAC 5).
The Association Object allows for as many or as few users and/or groups as
well as RAC Device Objects. However, the Association Object only includes
one Privilege Object per Association Object. The Association Object
connects the "Users" who have "Privileges" on the RACs (DRAC 5s).
Additionally, you can configure Active Directory objects in a single domain or
in multiple domains. For example, you have two DRAC 5 cards (RAC1 and
RAC2) and three existing Active Directory users (user1, user2, and user3).
You want to give user1 and user2 an administrator privilege to both DRAC 5
cards and give user3 a login privilege to the RAC2 card. Figure 6-3 shows how
you set up the Active Directory objects in this scenario.
114
AO1
Group1
User1
User2
AO2
Priv1
User3
Priv2
RAC1
RAC2
To configure the objects for the single domain scenario, perform the
following tasks:
1 Create two Association Objects.
2 Create two RAC Device Objects, RAC1 and RAC2, to represent the two
DRAC 5 cards.
3 Create two Privilege Objects, Priv1 and Priv2, in which Priv1 has all
privileges (administrator) and Priv2 has login privileges.
4 Group user1 and user2 into Group1.
5 Add Group1 as Members in Association Object 1 (AO1), Priv1 as Privilege
Objects in AO1, and RAC1, RAC2 as RAC Devices in AO1.
6 Add User3 as Members in Association Object 2 (AO2), Priv2 as Privilege
Objects in AO2, and RAC2 as RAC Devices in AO2.
Using the DRAC 5 With Microsoft Active Directory
115
See "Adding DRAC 5 Users and Privileges to Active Directory" on page 124
for detailed instructions.
Figure 6-4 provides an example of Active Directory objects in multiple
domains. In this scenario, you have two DRAC 5 cards (RAC1 and RAC2)
and three existing Active Directory users (user1, user2, and user3). User1 is in
Domain1, and user2 and user 3 are in Domain2. In this scenario, configure
user1 and user 2 with administrator privileges to both DRAC 5 cards and
configure user3 with login privileges to the RAC2 card.
Figure 6-4. Setting Up Active Directory Objects in Multiple Domains
Domain1
Domain2
AO1
Group1
User1
User2
AO2
Priv1
User3
Priv2
RAC1
RAC2
To configure the objects for the multiple domain scenario, perform the
following tasks:
1 Ensure that the domain forest function is in Native or Windows 2003
mode.
2 Create two Association Objects, AO1 (of Universal scope) and AO2,
in any domain.
Figure 6-4 shows the objects in Domain2.
3 Create two RAC Device Objects, RAC1 and RAC2, to represent the two
DRAC 5 cards.
116
4 Create two Privilege Objects, Priv1 and Priv2, in which Priv1 has all
privileges (administrator) and Priv2 has login privileges.
5 Group user1 and user2 into Group1. The group scope of Group1 must
be Universal.
6 Add Group1 as Members in Association Object 1 (AO1), Priv1 as Privilege
Objects in AO1, and RAC1, RAC2 as RAC Devices in AO1.
7 Add User3 as Members in Association Object 2 (AO2), Priv2 as Privilege
Objects in AO2, and RAC2 as RAC Devices in AO2.
117
You can extend your schema using one of the following methods:
If you use the LDIF script file, the Dell organizational unit will not be added
to the schema.
The LDIF files and Dell Schema Extender are located on your Dell Systems
Management Tools and Documentation DVD in the following respective
directories:
To use the LDIF files, see the instructions in the readme included in the
LDIF_Files directory. To use the Dell Schema Extender to extend the Active
Directory Schema, see "Using the Dell Schema Extender" on page 118.
You can copy and run the Schema Extender or LDIF files from any location.
Using the Dell Schema Extender
Table 6-2. Class Definitions for Classes Added to the Active Directory Schema
Class Name
dellRacDevice
1.2.840.113556.1.8000.1280.1.1.1.1
dellAssociationObject
1.2.840.113556.1.8000.1280.1.1.1.2
dellRACPrivileges
1.2.840.113556.1.8000.1280.1.1.1.3
dellPrivileges
1.2.840.113556.1.8000.1280.1.1.1.4
dellProduct
1.2.840.113556.1.8000.1280.1.1.1.5
1.2.840.113556.1.8000.1280.1.1.1.1
Description
Class Type
Structural Class
SuperClasses
dellProduct
Attributes
dellSchemaVersion
dellRacType
1.2.840.113556.1.8000.1280.1.1.1.2
Description
Class Type
Structural Class
SuperClasses
Group
Attributes
dellProductMembers
dellPrivilegeMember
119
1.2.840.113556.1.8000.1280.1.1.1.3
Description
Class Type
Auxiliary Class
SuperClasses
None
Attributes
dellIsLoginUser
dellIsCardConfigAdmin
dellIsUserConfigAdmin
dellIsLogClearAdmin
dellIsServerResetUser
dellIsConsoleRedirectUser
dellIsVirtualMediaUser
dellIsTestAlertUser
dellIsDebugCommandAdmin
1.2.840.113556.1.8000.1280.1.1.1.4
Description
Class Type
Structural Class
SuperClasses
User
Attributes
dellRAC4Privileges
1.2.840.113556.1.8000.1280.1.1.1.5
Description
The main class from which all Dell products are derived.
Class Type
Structural Class
SuperClasses
Computer
Attributes
dellAssociationMembers
120
Single
Valued
dellPrivilegeMember
1.2.840.113556.1.8000.1280.1.1.2.1
FALSE
dellProductMembers
1.2.840.113556.1.8000.1280.1.1.2.2
FALSE
1.2.840.113556.1.8000.1280.1.1.2.3
Boolean (LDAPTYPE_BOOLEAN
1.3.6.1.4.1.1466.115.121.1.7)
dellIsCardConfigAdmin
1.2.840.113556.1.8000.1280.1.1.2.4
Boolean (LDAPTYPE_BOOLEAN
1.3.6.1.4.1.1466.115.121.1.7)
dellIsUserConfigAdmin
1.2.840.113556.1.8000.1280.1.1.2.5
Boolean (LDAPTYPE_BOOLEAN
1.3.6.1.4.1.1466.115.121.1.7)
delIsLogClearAdmin
1.2.840.113556.1.8000.1280.1.1.2.6
TRUE
TRUE
TRUE
TRUE
1.2.840.113556.1.8000.1280.1.1.2.7
Boolean (LDAPTYPE_BOOLEAN
1.3.6.1.4.1.1466.115.121.1.7)
dellIsConsoleRedirectUser
1.2.840.113556.1.8000.1280.1.1.2.8
TRUE
TRUE
121
Table 6-8. List of Attributes Added to the Active Directory Schema (continued)
Attribute Name/Description
Single
Valued
dellIsVirtualMediaUser
1.2.840.113556.1.8000.1280.1.1.2.9
TRUE
Boolean (LDAPTYPE_BOOLEAN
1.3.6.1.4.1.1466.115.121.1.7)
dellIsTestAlertUser
1.2.840.113556.1.8000.1280.1.1.2.10
Boolean (LDAPTYPE_BOOLEAN
1.3.6.1.4.1.1466.115.121.1.7)
dellIsDebugCommandAdmin 1.2.840.113556.1.8000.1280.1.1.2.11
TRUE if the user has Debug
Command Admin rights on
the device.
Boolean (LDAPTYPE_BOOLEAN
1.3.6.1.4.1.1466.115.121.1.7)
dellSchemaVersion
1.2.840.113556.1.8000.1280.1.1.2.12
TRUE
TRUE
TRUE
1.2.840.113556.1.8000.1280.1.1.2.13
TRUE
1.2.840.113556.1.8000.1280.1.1.2.14
List of
Distinguished Name (LDAPTYPE_DN
dellAssociationObjectMembe 1.3.6.1.4.1.1466.115.121.1.12)
rs that belong to this Product.
This attribute is the backward
link to the
dellProductMembers Linked
attribute.
Link ID: 12071
122
FALSE
You must install the Administrator Pack on each system that is managing the
Active Directory DRAC 5 Objects. If you do not install the Administrator
Pack, you cannot view the Dell RAC Object in the container.
See "Opening the Active Directory Users and Computers Snap-In" on
page 123 for more information.
Opening the Active Directory Users and Computers Snap-In
123
4 Select the Active Directory Users and Computers snap-in and click Add.
5 Click Close and click OK.
NOTE: A Privilege Object must be created in the same domain as the related
Association Object.
1 In the Console Root (MMC) window, right-click a container.
2 Select New Dell RAC Object.
The New Object window appears.
3 Type a name for the new object.
4 Select Privilege Object.
5 Click OK.
124
6 Right-click the privilege object that you created, and select Properties.
7 Click the RAC Privileges tab and select the privileges that you want the
user to have (for more information, see Table 5-4).
Creating an Association Object
The Association Object is derived from a Group and must contain a Group
Type. The Association Scope specifies the Security Group Type for the
Association Object. When you create an Association Object, choose the
Association Scope that applies to the type of objects you intend to add.
For example, if you select Universal, the association objects are only available
when the Active Directory Domain is functioning in Native Mode or above.
1 In the Console Root (MMC) window, right-click a container.
2 Select New Dell RAC Object.
This opens the New Object window.
3 Type a name for the new object.
4 Select Association Object.
5 Select the scope for the Association Object.
6 Click OK.
Adding Objects to an Association Object
Using the Association Object Properties window, you can associate users or
user groups, privilege objects, and RAC devices or RAC device groups. If your
system is running Windows 2000 mode or higher, use Universal Groups to
span domains with your user or RAC objects.
You can add groups of Users and RAC devices. The procedure for creating
Dell-related groups and non-Dell-related groups is identical.
Adding Users or User Groups
125
Click the Privilege Object tab to add the privilege object to the association
that defines the users or user groups privileges when authenticating to a
RAC device. Only one privilege object can be added to an Association Object.
Adding Privileges
Type the Root Domain Name. The Root Domain Name is the
fully qualified root domain name for the forest.
Type the DRAC Name. This name must be the same as the common
name of the new RAC object you created in your Domain Controller
(see step 3 of "Creating a RAC Device Object" on page 124).
In the Certificate Upload page, type the file path of the certificate or
browse to the certificate file.
NOTE: The File Path value displays the relative file path of the certificate you
are uploading. You must type the absolute file path, which includes the full
path and the complete file name and file extension.
Click Apply.
The DRAC 5 Web server automatically restarts after you click Apply.
12 Log out and then log in to the DRAC 5 to complete the DRAC 5 Active
Directory feature configuration.
13 In the System tree, click Remote Access.
14 Click the Configuration tab and then click Network.
The Network Configuration page appears.
127
128
129
A02
A01
Group1
User1
User2
Priv2
Priv1
User1
RAC1
RAC2
The figure shows two Association ObjectsA01 and A02. These Association
Objects may be part of the same or different domains. User1 is associated to
RAC1 and RAC2 through both association objects. Therefore, User1 has
accumulated privileges that results when combining the Privileges set for
objects Priv1 and Priv2.
For example, Priv1 had the privileges: Login, Virtual Media, and Clear Logs
and Privr2 had the privileges: Login, Configure DRAC, and Test Alerts.
User1 will now have the privilege set: Login, Virtual Media, Clear Logs,
Configure DRAC, and Test Alerts, which is the combined privilege set of
Priv1 and Priv2
Extended Schema Authentication, thus, accumulates privileges to allow the
user the maximum set of privileges possible considering the assigned
privileges of the different privilege objects associated to the same user.
130
131
To specify the Association Object, ensure that you also provide the IP or
FQDN of the Global Catalog.
NOTE: If you specify the IP address as 0.0.0.0, DRAC 5 will not search for any
server.
You can specify a list of LDAP, Global Catalog servers, or Association Objects
separated by commas. DRAC 5 allows you to specify up to four IP addresses
or hostnames.
If LDAPS is not correctly configured for all domains and applications,
enabling it may produce unexpected results during the functioning of the
existing applications/domains.
For Extended Schema, you can specify either Domain Controller or Global
Catalog with Association Object. Specifying only the Global Catalog or only
the Association Object is not applicable for Extended Schema. If you specify
only the Domain Controller, all objects including User, Group, RAC,
Privilege and Association should be on the same domain. If any of these
objects are on different domains, use the Global Catalog with the Association
Object option. You can specify up to four Domain Controllers and all these
entries should point to the same domain. You can specify up to four Global
Catalog servers. You can specify up to four Association Object servers. All
these entries should point to the same domain. In case you are using the
Association Object option, you should also configure the Global Catalog
option to be able to log in. Specify the Domain Controller name where you
created the user. Both IP or FQDN can be specified here.
For Standard Schema, specify only the Domain Controller and the Global
Catalog. Specify Association Object is not applicable with Standard Schema.
You can specify the Domain Controller where the user role groups are
created. Specify either the IP or the FQDN. You can specify up to four
Domain Controllers. All entries should point to the same domain. If you
specify only the Domain Controller, the User and Group should be on the
same domain. If the Role Groups are on different domains, you have to also
specify the Global Catalog server. You can specify up to four Global Catalog
servers. Both the IP or the FQDN can be specified here. You can also only
specify the Global Catalog servers.
132
Description
Configure Active
Directory
Upload Active
Directory CA
Certificate
Download DRAC
Server Certificate
View Active Directory Displays the Active Directory Certificate that has been
CA Certificate
uploaded to the DRAC.
133
Management page, you have to click Apply before proceeding to the Custom
Role Group page.
Description
Enable Active
Directory
ROOT Domain Name The Active Directory ROOT domain name. This value is
NULL by default.
The name must be a valid domain name consisting of x.y,
where x is a 1-254 character ASCII string with no blank
spaces between characters, and y is a valid domain type
such as com, edu, gov, int, mil, net, org.
Timeout
DRAC Domain Name The DNS name (string) of the domain, where the Active
Directory DRAC 5 object resides. This value is NULL by
default.
The name must be a valid domain name consisting of x.y,
where x is a 1-254 character ASCII string with no blank
spaces between characters, and y is a valid domain type
such as com, edu, gov, int, mil, net, org.
134
Table 6-10.
Setting
Description
Role Groups
NOTE: If you click on the role group link prior to applying the
settings for the Active Directory Configuration and
Management page, you will lose these settings.
Group Name
Group Domain
Group Privilege
Table 6-11.
Button
Description
Apply
Go Back to Active
Directory Main Menu
Table 6-12.
Setting
Description
Login to DRAC
Configure DRAC
135
Description
Configure Users
Clear Logs
Test Alerts
Description
Administrator
Power User
Guest User
Login to DRAC
Custom
None
No assigned permissions
136
3 Click Apply.
4 Click the appropriate Certificate Upload page button to continue. See
Table 6-11.
Field
Description
Serial Number
Subject Information
Issuer Information
137
Description
Valid From
Valid To
138
4 In the Console 1 (MMC) window, click File (or Console on Windows 2000
machines) and select Add/Remove Snap-in.
5 In the Add/Remove Snap-In window, click Add.
6 In the Standalone Snap-In window, select Certificates and click Add.
7 Select Computer account and click Next.
8 Select Local Computer and click Finish.
9 Click OK.
10 In the Console 1 window, expand the Certificates folder, expand the
Personal folder, and click the Certificates folder.
11 Locate and right-click the root CA certificate, select All Tasks,
and click Export... .
12 In the Certificate Export Wizard, click Next, and select No do not export
the private key.
13 Click Next and select Base-64 encoded X.509 (.cer) as the format.
14 Click Next and save the certificate to a directory on your system.
15 Upload the certificate you saved in step 14 to the DRAC 5.
To upload the certificate using RACADM, see "Configuring the DRAC 5
With Extended Schema Active Directory and Web-Based Interface" on
page 126.
To upload the certificate using the Web-based interface, perform the
following procedure:
a
139
Click Apply.
140
5 Click Next and select whether you would like Windows to automatically
select the certificate store based on the type of certificate, or browse to a
store of your choice.
6 Click Finish and click OK.
141
Web-based interface
Remote RACADM
142
143
144
Ensure that you have checked the Enable Active Directory box on the
DRAC 5 Active Directory configuration page.
Ensure that you have uploaded the Active Directory certificate from
your Active Directory root CA to the DRAC 5.
Ensure that your DRAC Name, Root Domain Name, and DRAC
Domain Name match your Active Directory environment
configuration.
SSO login fails with Active Directory users on Windows 7 operating systems.
What should I do to resolve this?
You must enable the encryption types for Windows 7. To enable the
encryption types (for standard and extended schema):
1 Log in as administrator or as a user with adminstrative privilege.
2 Go to Start and run gpedit.msc.
The Local Group Policy Editor window is displayed.
3 Navigate to Local Computer SettingsWindows SettingsSecurity
SettingsLocal PoliciesSecurity Options.
4 Right-click Network Security: Configure encryption types allowed for
kerberos and select Properties.
5 Enable all the options and click OK.
You can now log in to iDRAC using SSO.
6 In the Local Group Policy Editor window, navigate to Local Computer
Settings Windows Settings Security Settings Local Policies
Security Options.
7 Right-click Network Security: Restrict NTLM: Outgoing NTLM traffic
to remote server and select Properties.
8 Select Allow all, click OK, and then close the Local Group Policy Editor
window.
9 Go to Start and run cmd.
The command prompt window is displayed.
10 Run the command gpupdate /force.
The group policies are updated.
11 Close the command prompt window.
Using the DRAC 5 With Microsoft Active Directory
145
146
Configure the DRAC 5 for Active Directory login. For more information,
see "Using Active Directory to Log Into the DRAC 5" on page 142.
For the Active Directory users for whom you want to provide Kerberos
authentication, set the following properties:
147
Synchronize the DRAC 5 time settings with that of the Active Directory
Domain Controller. Kerberos authentication on DRAC 5 fails if the
DRAC time differs from the Domain Controller time. A maximum offset
of 5 minutes is allowed. To enable successful authentication, synchronize
the server time with the Domain Controller time and then reset the
DRAC time.
You can also use the following RACADM time zone offset command to
synchronize the time:
racadm config -g cfgRacTuning -o
cfgRacTuneTimeZoneOffset offset-value
Offset value is the offset time in minutes.
148
Right-click the Users folder, select New, and then click User.
Type the name of the DRAC5 host for which you want to add
Kerberos support.
account is the user name, a valid user account that you created
in Active Directory in step b and step c. It should be provided in
the domain-name.com/user-name format.
This procedure will produce a keytab file that you should upload to the
DRAC 5.
NOTE: The keytab contains an encryption key and should be kept secure.
For more information on the ktpass utility, see the Microsoft website at:
http://technet2.microsoft.com/windowsserver/en/library/64042138-9a5a4981-84e9-d576a8db0d051033.mspx?mfr=true
149
150
Single Sign-On allows you to log into the DRAC without providing your
credentials, after you have logged into the operating system using a valid
Active Directory account. In this case, DRAC uses the credentials cached in
the operating system. DRAC uses Kerberos, a network authentication
protocol, for single sign-on.
Configure DRAC 5 for Active Directory login. For more information, see
"Using Active Directory to Log Into the DRAC 5" on page 142.
151
download and install the Single Sign-On ActiveX plug-in when using this
feature for the first time.
152
The Dell Remote Access Controller 5 (DRAC 5) version 1.30 and later
support the two-factor-authentication for logging into the DRAC 5 Web
interface. This support is provided by the Smart Card Logon feature on the
DRAC 5.
The traditional authentication schemes use user name and password to
authenticate users. This provides minimal security.
Two-factor-authentication, on the other hand, provides a higher-level of
security by requiring users to have a password or PIN and a private key for
a digital certificate.
The two-factor authentication requires users to verify their identities by
providing both factors.
Enable or Enable with Remote Racadm, you are prompted for a Smart
Card logon during any subsequent logon attempts using the GUI.
When you select Enable, all command line interface (CLI) out-of-band
interfaces, such as telnet, ssh, serial, remote racadm, and IPMI over LAN,
are disabled. This is because these services support only single-factor
authentication.
153
When you select Enable with Remote Racadm, all CLI out-of-band
interfaces, except remote racadm, are disabled.
NOTE: Dell recommends that the DRAC 5 administrator use the Enable with
Remote Racadm setting only to access the DRAC 5 user interface to run
scripts using the remote racadm commands. If the administrator does not
need to use the remote racadm, Dell recommends the Enabled setting for
Smart Card logon. Also, ensure that the DRAC 5 local user configuration
and/or Active Directory configuration is complete before enabling Smart
Card Logon.
Enable CRL check for Smart Card Logon, the user's DRAC certificate,
which is downloaded from the Certificate Revocation List (CRL)
distribution server is checked for revocation in the CRL.
NOTE: The CRL distribution servers are listed in the Smart Card certificates of
the users.
For example, in case the Smart Card certificate has been issued to the user,
"[email protected]," the username should be configured as
"sampleuser."
155
Description
Configure Smart Card Disabled Disables Smart Card logon. Subsequent logins
Logon
from the graphical user interface (GUI) display the regular
login page. All command line out-of-band interfaces
including secure shell (SSH), Telnet, Serial, and remote
RACADM are set to their default state.
Enabled Enables Smart Card logon. After applying the
changes, logout, insert your Smart Card, enter your Smart
Card PIN, and then click Login to log on to the DRAC.
Enabling Smart Card logon disables all CLI out-of-band
interfaces including SSH, Telnet, Serial, remote RACADM,
and IPMI over LAN.
Enabled with Remote Racadm Enables Smart Card logon
along with remote RACADM. All other CLI out-of-band
interfaces are disabled.
NOTE: The Smart Card logon requires you to configure the local
DRAC 5 users with the appropriate certificates. If the Smart
Card logon is used to log in a Microsoft Active Directory user,
then you must ensure that you configure the Active Directory
user certificate for that user. You can configure the user
certificate in the Users User Main Menu page.
Enable CRL check for This check is available only for Smart Card local users. Select
Smart Card Logon
this option if you want the DRAC to check the Certificate
Revocation List (CRL) for revocation of the user's Smart
Card certificate. For the CRL feature to work, the DRAC
must have a valid DNS IP address configured as part of its
network configuration. You can configure the DNS IP address
in DRAC under Remote Access Configuration Network.
The user will not be able to login if:
The user certificate is listed as revoked in the CRL file.
DRAC is not able to communicate with the CRL
distribution server.
DRAC is not able to download the CRL.
156
NOTE: If you are an Active Directory user for whom the Enable CRL check for
Smart Card Logon is selected, DRAC 5 attempts to download the CRL and checks
the CRL for the user's certificate. The login through Active Directory fails if the
certificate is listed as revoked in the CRL or if the CRL cannot be downloaded for
any reason. Smart Card logon is supported only in Microsoft Internet Explorer.
157
Check to see if the Smart Card has been locked out due to too many attempts
with an incorrect PIN. In such cases, the issuer of the Smart Card in the
organization will be able to help you get a new Smart Card.
158
If a local DRAC 5 user cannot log in, check if the username and the user
certificates uploaded to the DRAC 5 have expired. The DRAC 5 trace logs
may provide important log messages regarding the errors; although the error
messages are sometimes intentionally ambiguous due to security concerns.
Unable to Log into DRAC 5 as an Active Directory User
If you cannot log into the DRAC 5 as an Active Directory user, try to log into
the DRAC 5 without enabling the Smart Card logon. If you have enabled the
CRL check, try the Active Directory logon without enabling the CRL check.
The DRAC 5 trace log should provide important messages in case of CRL
failure.
You also have the option of disabling the Smart Card Logon through the local
racadm using the following command:
racadm config -g cfgActiveDirectory -o
cfgADSmartCardLogonEnable 0
159
160
10
Overview
The DRAC 5 console redirection feature enables you to access the local
console remotely in either graphic or text mode. Using console redirection,
you can control one or more DRAC 5-enabled systems from one location.
Today with the power of networking and the Internet, you do not have to sit
in front of each server to perform all the routine maintenance. You can
manage the servers from another city or even from the other side of the world
from your desktop or laptop computer. You can also share the information
with others remotely and instantly.
161
720x400
70
640x480
800x600
1024x768
1280x1024
60
162
Information
Description
Enabled
Max Sessions
Active Sessions
Default = 5901
Video Encryption
Enabled
Plug-in Type
163
Description
Description
Refresh
Apply Changes
NOTE: With DRAC 5 version 1.30 and later, you can disable console redirection for
a remote user. For more information, see "Disabling DRAC 5 Remote Virtual KVM" on
page 214.
164
Property
Description
Yes/No
Yes/No
Status
Connected or Disconnected
Max Sessions
Active Sessions
Plug-in Type
165
The buttons in Table 10-5 are available on the Console Redirection page.
Table 10-5. Console Redirection Page Buttons
Button
Definition
Refresh
Connect
If you are using a Firefox browser, it will prompt you to Open or Save a
JNLP file. You can open it with the Java Web Start Launcher. If you choose
to save the JNLP file, manually open it before you disconnect the session.
Once you disconnect the session, the JNLP file saved cannot be validated.
If you are using Internet Explorer, it caches the JNLP file in the Temporary
Internet Files folder and runs automatically using the Java Web Start
Launcher.
NOTE: If one or more Security Alert windows appear in the following steps,
read the information in the window and click Yes to continue.
When you have finished using the Console and have logged out (using the
remote system's logout procedure), click Disconnect on the Console
Redirection page or close the Viewer.
The management station connects to the DRAC 5 and the remote
systems desktop appears in the Dell Digital KVM Viewer Application.
5 If two mouse pointers appear on the remote system's desktop, synchronize
the mouse pointers on the management station and the remote system.
See "Synchronizing the Mouse Pointers" on page 172.
166
167
When you start a console redirection session and the Video Viewer appears,
you may be required to adjust the following controls in order to view and
control the remote system properly. These adjustments include:
Item
Description
File
Capture to File
Exit
168
Table 10-6.
Menu Item
Item
Description
View
Refresh
Full Screen
Various keyboard
shortcuts
Macros
169
Item
Description
Tools
Automatic Video
Adjust
NOTE: Adjusting the horizontal position offcenter desynchronizes the mouse pointers.
Session Options
Help
170
N/A
Reducing the Pixel Noise Ratio setting to zero causes multiple video
refresh commands that generates excessive network traffic and flickering
video in the Video Viewer window. Dell recommends that you adjust the
Pixel Noise Ratio setting at a level that provides optimal system
performance and pixel enhancement while minimizing network traffic.
171
172
Power cycle the system. Restart the system after powering it off.
173
174
175
If the problem is still not resolved, you must reset the DRAC 5 by running the
racadm racreset hard command.
Why arent the vKVM keyboard and mouse working?
You must set the USB controller to On with BIOS support in the BIOS
settings of the managed system. Restart the managed system and press <F2>
to enter setup. Select Integrated Devices, and then select USB Controller.
Save your changes and restart the system.
Why does the managed system console screen go blank when Windows has a
blue screen?
The managed system does not have the correct ATI video driver. You must
update the video driver with the Dell Systems Management Tools and
Documentation DVD.
Why do I get a blank screen on the remote console after completing a
Windows 2000 installation?
The managed system does not have the correct ATI video driver. The
DRAC 5 Console Redirection will not run correctly on the SVGA video driver
on the Windows 2000 distribution CD. You must install Windows 2000
using the Dell Systems Management Tools and Documentation DVD to ensure
that you have the latest, supported drivers for the managed system.
Why do I get a blank screen on the managed system when loading the
Windows 2000 operating system?
The managed system does not have the correct ATI video driver. You must
update the video driver by using the Dell Systems Management Tools and
Documentation DVD.
Why do I get a blank screen on the managed system in the Windows full
screen DOS window?
The managed system does not have the correct ATI video driver. You must
update the video driver by using the Dell Systems Management Tools and
Documentation DVD.
Why cant I enter BIOS setup by pressing the <F2> key?
This behavior is typical in a Windows environment. Use your mouse to click
on an area of the Console Redirection window to adjust the focus. To move
the focus to the bottom menu bar of Console Redirection window, use the
mouse and click one of the objects on the bottom menu bar.
176
Why doesnt the vKVM mouse sync when I use the Dell Systems
Management Tools and Documentation DVD to remotely install the
operating system?
Configure Console Redirection for the operating system that is running on
the target system.
1 In the vKVM toolbar menu, click Tools and select Session Options.
2 In the Session Options window, click the Mouse tab.
3 In the Mouse Acceleration box, select the operating system that is running
on the target system and click OK.
Why doesnt the vKVM mouse sync after coming back from hibernation on
a Windows system?
Select a different operating system for mouse acceleration on the vKVM
window pull-down menu. Next, return to the original operating system to
initialize the USB mouse device.
1 In the vKVM toolbar, click Tools and select Session Options.
2 In the Session Options window, click the Mouse tab.
3 In the Mouse Acceleration box, select another operating system and
click OK.
4 Initialize the USB mouse device.
Why doesnt the mouse sync in DOS when performing Console
Redirection?
The Dell BIOS is emulating the mouse driver as a PS/2 mouse. By design, the
PS/2 mouse uses relative position for the mouse pointer, which causes the
sync lag. DRAC 5 has a USB mouse driver, which allows absolute position and
closer tracking of the mouse pointer. Even if DRAC 5 passes the USB
absolute mouse position to the Dell BIOS, the BIOS emulation would
convert it back to relative position and retain the behavior.
Why doesnt the mouse sync under the Linux text console?
Virtual KVM requires the USB mouse driver, but the USB mouse driver is
available only under the X-Window operating system.
177
178
Why does console redirection fail to show the operating system boot menu
in the Chinese, Japanese, and Korean versions of Microsoft Windows 2000?
On systems running Windows 2000 that can boot to multiple operating
systems, change the default boot operating system by performing the
following steps:
1 Right-click the My Computer icon and select Properties.
2 Click the Advanced tab.
3 Click Startup and Recovery.
4 Select the new default operating system from the Startup list.
5 In the Show list for box, type the number of seconds that the list of choices
should be displayed before the default operating system automatically
boots.
Why doesnt the Num Lock indicator on my management station reflect the
status of the Num Lock on the remote server?
When accessed through the DRAC 5, the Num Lock indicator on the
management station does not necessarily coincide with the state of the Num
Lock on the remote server. The state of the Num Lock is dependent on the
setting on the remote server when the remote session is connected, regardless
of the state of the Num Lock on the management station.
Why do multiple Session Viewer windows appear when I establish a console
redirection session?
You are configuring a console redirection session to the local system.
Reconfigure the session to a remote system.
If I am running a console redirection session and a local user accesses the
remote system, do I receive a warning message?
No. If a local user accesses the system, he/she can override your actions
without sending a warning.
How much bandwidth do I need to run a console redirection session?
Dell recommends a 5 MB/sec connection for good performance. A 1 MB/sec
connection is required for minimal performance.
179
180
Use the DRAC 5 dedicated NIC for connection over the network.
181
182
11
Overview
The Virtual Media feature provides the managed system with a virtual
CD drive, which can use standard media from anywhere on the network.
Figure 11-1 shows the overall architecture of virtual media.
Figure 11-1. Overall Architecture of Virtual Media
Managed System
Management Station
Remote CD
DRAC 5
Virtual CD
Virtual Floppy
Network
Remote Floppy
183
The managed system is configured with a DRAC 5 card. The virtual CD and
floppy drives are two electronic devices embedded in the DRAC 5 that are
controlled by the DRAC 5 firmware. These two devices are present on the
managed systems operating system and BIOS at all times, whether virtual
media is connected or disconnected.
The management station provides the physical media or image file across the
network. When you launch the RAC browser for the first time and you access
the virtual media page, the virtual media plug-in is downloaded from the
DRAC 5 Web server and is automatically installed on the management
station. The virtual media plug-in must be installed on the management
station for the virtual media feature to function properly.
When virtual media is connected, all virtual CD/floppy drive access requests
from the managed system are directed to the management station across the
network. Connecting virtual media is identical to inserting media into virtual
devices. When virtual media is not connected, virtual devices on the
managed system appear as two drives without media installed in the drives.
NOTE: You can connect to a virtual media using browser plug-in or Java plug-in.
Table 11-1 lists the supported drive connections for virtual floppy and virtual
optical drives.
NOTE: Changing virtual media while connected could stop the system
boot sequence.
Table 11-1. Supported Drive Connections
Supported Virtual Floppy Drive
Connections
184
185
2 Connect and log into the DRAC 5. See "Accessing the Web-Based
Interface" on page 48 for more information.
3 Click the Media tab and then click Virtual Media.
186
The Virtual Media page appears with the client drives that can be
virtualized.
NOTE: The Floppy Image File under Floppy Drive (if applicable) may appear,
as this device can be virtualized as a virtual floppy. You can select one optical
drive and one floppy at the same time, or a single drive.
NOTE: The virtual device drive letters on the managed system do not coincide
with the physical drive letters on the management station.
In the Value column, ensure that the Attach Virtual Media check
box is selected.
NOTE: After the Virtual Media is attached, you can change the Boot Order
only through RACADM, the Configuration page does not allow you to change
any configuration of the Boot Order device.
Ensure that the Current Status value is Not connected. If the Value
field displays connected, you must disconnect from the image or drive
before reconnecting. This status denotes the current status of the
Virtual Media connection on the current Web-based interface only.
Ensure that the Active Session value is Available. If the Value field
display In Use, you must wait for the existing Virtual Media session to
be released or terminate it by going to the Session Management tab
under Remote Access and terminating the active Virtual Media
session.
187
Only one active Virtual Media session is allowed at one time. This
session could have been created by any Web-based interface or VMCLI utility.
d
6 If you are virtualizing a floppy image or ISO image, select Floppy Image
File or ISO Image File and enter or browse to the image file you want to
virtualize.
If you are virtualizing a floppy drive or an optical drive, select the button
next to the drives that you want to virtualize.
7 Click Connect.
If the connection is authenticated, the connection status becomes
Connected and a list of all connected drives is displayed. All available
diskette images and drives you selected become available on the managed
systems console as though they are real drives.
NOTE: The assigned virtual drive letter (for Microsoft Windows systems) or
device special file (for Linux systems) may not be identical to the drive letter
on your management console.
NOTE: Virtual Media may not function properly on Windows operating system
clients that are configured with Internet Explorer Enhanced Security. To
resolve this issue, see your Microsoft operating system documentation or
contact your administrator.
Click Disconnect to disconnect all virtualized images and drives from the
management station. All virtualized images or drives disconnect and are no
longer available on the managed system.
Connecting Virtual Media Using Java Plug-in
NOTE: Ensure that JRE 1.6 or later is installed in the management system.
b
Ensure that the Active Session value is 0. If the Value field displays 1,
wait for the existing Virtual Media session to be released or terminate
it by accessing the Session Management tab under Remote Access.
Only one active Virtual Media session is allowed at one time. This
session may have been created by any Web-based interface or VMCLI utility.
189
7 To virtualize a floppy image or ISO image, click Add Image and select an
image.
8 Click the Mapped check-box associated with the driver or image that you
want to connect.
The device in the managed system to which the driver or image attached is
displayed in the Details table.
Disconnecting Virtual Media
DRAC 5 firmware version 1.30 and later support the auto-attach virtual
media feature. When you enable this feature, DRAC 5 will automatically
attach a virtual device to the system only when a device is virtualized
(connected) on a supported client.
The DRAC 5 will detach the virtual media devices when the virtual media
session is disconnected.
190
Attaching, Auto-Attaching, and Detaching Virtual Media using the Web browser
You can set the status of a virtual media to Attach, Auto-Attach, or Detach.
Based on this status, the devices in the remote system are displayed in the
DRAC 5 GUI.
To Attach the virtual media feature, open a command prompt, type the
following command, and press <Enter>:
racadm config -g cfgRacVirtual -o cfgVirMediaAttached 1
To Detach the virtual media, open a command prompt, type the following
command, and press <Enter>:
racadm config -g cfgRacVirtual -o cfgVirMediaAttached 0
To Auto-Attach the virtual media, open a command prompt, type the
following command, and press <Enter>:
racadm config -g cfgRacVirtual -o cfgVirMediaAttached 2
Using and Configuring Virtual Media
191
192
2 Follow the steps for booting from the virtual media in the "Booting From
Virtual Media" on page 192 section to ensure that the BIOS is set to boot
from the CD drive that you are installing from.
3 Follow the on-screen instructions to complete the installation.
On Linux systems, the virtual media drives are not configured with a drive
letter. Depending on the software installed on your system, the virtual media
drives may not be automounted. If your drives are not automounted,
manually mount the drives.
193
When you enable or disable Virtual Flash, the Virtual Media CD/floppy
drive connection status does not change.
CAUTION: The Detach and Attach procedures disrupt active Virtual Media read
and write operations.
194
195
Removable media devices or image files that are consistent with the
Virtual Media plug-ins
Before you run the utility, ensure that you have Virtual Media user privilege
to the DRAC 5 in the remote system.
If your operating system supports administrator privileges or an operating
system-specific privilege or group membership, administrator privileges are
also required to run the VM-CLI command.
The client system's administrator controls user groups and privileges, thereby
controlling the users who can run the utility.
For Windows systems, you must have Power User privileges to run the
VM-CLI utility.
For Linux systems, you can access the VM-CLI utility without administrator
privileges by using the sudo command. This command provides a centralized
means of providing non-administrator access and logs all user commands. To
add or edit users in the VM-CLI group, the administrator uses the visudo
command. Users without administrator privileges can add the sudo command
as a prefix to the VM-CLI command line (or to the VM-CLI script) to obtain
access to the DRAC 5 in the remote system and run the utility.
196
Utility Installation
The VM-CLI utility is located on the Dell Systems Management Tools and
Documentation DVD, which is included with your Dell OpenManage System
Management Software Kit. To install the utility, insert the Dell Systems
Management Tools and Documentation DVD into your systems DVD drive
and follow the on-screen instructions.
The Dell Systems Management Tools and Documentation DVD contains the
latest systems management software products, including diagnostics, storage
management, remote access service, and the RACADM utility. This DVD
also contains readme files, which provide the latest systems management
software product information.
Additionally, the Dell Systems Management Tools and Documentation DVD
includes vmdeploya sample script that illustrates how to use the VM-CLI
and RACADM utilities to deploy software to multiple remote systems. For
more information, see "Deploying Your Operating System Using VM-CLI" on
page 202.
197
VM-CLI Parameters
DRAC 5 IP Address
-r <RAC-IP-address>[:<RAC-SSL-port>]
where <RAC-IP-address> is a valid, unique IP address or the DRAC 5
Dynamic Domain Naming System (DDNS) name (if supported).
This parameter provides the DRAC 5 IP address and SSL port. The VM-CLI
utility needs this information to establish a Virtual Media connection with
the target DRAC 5. If you enter an invalid IP address or DDNS name,
an error message appears and the command is terminated.
If <RAC-SSL-port> is omitted, port 443 (the default port) is used.
The optional SSL port is not required unless you change the DRAC 5 default
SSL port.
DRAC 5 User Name
-u <DRAC-user-name>
This parameter provides the DRAC 5 user name that will run Virtual Media.
The <DRAC-user-name> must have the following attributes:
-p <DRAC-user-password>
This parameter provides the password for the specified DRAC 5 user.
If DRAC 5 authentication fails, an error message displays and the command
terminates.
198
-f {<device-name> | <image-file>}
where <device-name> is a valid drive letter (for Windows systems) or a
valid device file name, including the mountable file system partition number,
if applicable (for Linux systems); and <image-file> is the filename and
path of a valid image file.
This parameter specifies the device or file to supply the virtual floppy/disk media.
For example, an image file is specified as:
-f c:\temp\myfloppy.img (Windows system)
-f /tmp/myfloppy.img (Linux system)
If the file is not write-protected, Virtual Media may write to the image file.
Configure the operating system to write-protect a floppy image file that
should not be overwritten.
For example, a device is specified as:
-f a:\ (Windows system)
-f /dev/sdb4 # 4th partition on device /dev/sdb
(Linux system)
If the device provides a write-protection capability, use this capability to
ensure that Virtual Media will not write to the media.
Additionally, omit this parameter from the command line if you are not
virtualizing floppy media. If an invalid value is detected, an error message
displays and the command terminates.
CD/DVD Device or Image File
-c {<device-name> | <image-file>}
where <device-name> is a valid CD/DVD drive letter (Windows systems)
or a valid CD/DVD device file name (Linux systems) and <image-file> is
the file name and path of a valid ISO-9660 image file.
This parameter specifies the device or file that will supply the virtual
CD/DVD-ROM media:
For example, an image file is specified as:
-c c:\temp\mydvd.img (Windows systems)
-c /tmp/mydvd.img (Linux systems)
Using and Configuring Virtual Media
199
-v
This parameter is used to display the VM-CLI utility version. If no other
non-switch options are provided, the command terminates without an error
message.
Help Display
-h
This parameter displays a summary of the VM-CLI utility parameters.
If no other non-switch options are provided, the command terminates
without error.
Encrypted Data
-e
When this parameter is included in the command line, the VM-CLI utility
will use an SSL-encrypted channel to transfer data between the management
station and the DRAC 5 in the remote system. If this parameter is not
included in the command line, the data transfer is not encrypted.
200
0 = No error
1 = Unable to connect
2 = VM-CLI command line error
3 = RAC firmware connection dropped
English-only text messages are also issued to standard error output whenever
errors are encountered.
201
The virtual device in each remote system is the first device in the BIOS
boot order.
When you order your Dell system using the Dell Custom Factory Integration
(CFI) options, Dell can preconfigure your system with a DRAC 5 card that
includes a DDNS name and a preconfigured system BIOS that is enabled for
Virtual Media. Using this configuration, your system is ready to boot from its
Virtual Media devices when installed into your corporate network.
For more information, see the Dell website at www.dell.com.
Network Requirements
You must have a network share containing:
Required drivers
202
203
Mark the deployment image as "read only" to ensure that each target
system boots and executes the same deployment procedure
204
You can sometimes lose your client connection if the network is slow or if
you change the CD in the client system CD drive. For example, if you
change the CD in the client systems CD drive, the new CD might have an
autostart feature. If this is the case, the firmware can time out and the
connection can be lost if the client system takes too long before it is ready
to read the CD. If a connection is lost, reconnect from the GUI and
continue the previous operation.
205
206
207
208
When I performed a firmware update remotely using the DRAC 5 Webbased interface, my virtual drives at the server were removed. Why?
Firmware updates cause the DRAC 5 to reset, drop the remote connection,
and unmount the virtual drives. The drives will reappear when the DRAC
reset is complete.
When enabling or disabling the Virtual Flash, I noticed that all my virtual
drives disappeared and then reappeared. Why?
Disabling or enabling the Virtual Flash causes a USB reset and causes all
virtual drives to detach from and then reattach to the USB bus.
How can I install a Web browser on my management station that has a readonly file system?
If you are running Linux and your management station has a read-only file
system, a browser can be installed on a client system without requiring a
connection to a DRAC 5. By using the native plug-in installation package, the
browser can be manually installed during the client setup phase.
CAUTION: In a read-only client environment, if the DRAC 5 firmware is updated to
a newer version of the plug-in, the installed virtual media plug-in becomes
inoperative. This is because earlier plug-in features are not allowed to function
when the firmware contains a newer plug-in version. In this case, you are
prompted for plug-in installation. Since the file system is read-only, the
installation fails and the plug-in features are not available.
To obtain the plug-in installation package:
1 Login to an existing DRAC 5.
2 Change the URL in the browser's address bar, from:
https://<RAC_IP>/cgi-bin/webcgi/main
to:
https://<RAC_IP>/plugins/ # Be sure to include the
trailing slash.
3 Locate the two subdirectories vm and vkvm. Navigate to the appropriate
subdirectory, right click the rac5XXX.xpi file, and select Save Link
Target As....
4 Choose a location to save the plug-in installation package file.
209
210
12
The Console Redirection disable option allows the local system user
to disable console redirection using the DRAC 5 Console
Redirection feature.
Secure Shell (SSH), which uses an encrypted transport layer for higher
security.
Login failure limits per IP address, with login blocking from the IP address
when the limit is exceeded.
211
This feature disables the ability of the managed systems user to configure the
DRAC 5 during system reboot.
racadm config -g cfgRacTune -o
cfgRacTuneCtrlEConfigDisable 1
NOTE: This option is supported only on the Remote Access Configuration Utility
version 1.13 and later. To upgrade to this version, upgrade your BIOS using the
BIOS update package from the Dell Server Updates DVD or the Dell Support
website at support.dell.com.
212
This feature disables the ability of the managed systems user to configure the
DRAC 5 using the local racadm or the Dell OpenManage Server
Administrator utilities.
racadm config -g cfgRacTune -o
cfgRacTuneLocalConfigDisable 1
CAUTION: These features severely limit the ability of the local user to configure
the DRAC 5 from the local system, including performing a reset to default of the
configuration. Dell recommends that you use these features with discretion and
should disable only one interface at a time to help avoid losing login privileges
altogether.
NOTE: See the white paper on Disabling Local Configuration and Remote Virtual
KVM in the DRAC on the Dell Support site at support.dell.com/manuals for more
information.
Although administrators can set the local configuration options using local
racadm commands, for security reasons they can reset them only from an
out-of-band DRAC 5 GUI or command-line interface. The
cfgRacTuneLocalConfigDisable option applies once the system
power-on self-test is complete and the system has booted into an operating
system environment. The operating system could be one such as Microsoft
Windows Server or Enterprise Linux operating systems that can run local
racadm commands, or a limited-use operating system such as Microsoft
Windows Preinstallation Environment or vmlinux used to run Dell
OpenManage Deployment Toolkit local racadm commands.
Several situations might call for administrators to disable local configuration.
For example, in a data center with multiple administrators for servers and
remote access devices, those responsible for maintaining server software
stacks may not require administrative access to remote access devices.
Similarly, technicians may have physical access to servers during routine
systems maintenanceduring which they can reboot the systems and access
password-protected BIOSbut should not be able to configure remote access
devices. In such situations, remote access device administrators may want to
disable local configuration.
Administrators should keep in mind that because disabling local
configuration severely limits local configuration privilegesincluding the
ability to reset the DRAC 5 to its default configurationthey should only use
these options when necessary, and typically should disable only one interface
Configuring Security Features
213
214
Several situations might call for disabling DRAC 5 remote vKVM. For
example, administrators may not want a remote DRAC 5 user to view the
BIOS settings that they configure on a system, in which case they can disable
remote vKVM during the system POST by using the
LocalConRedirDisable command. They may also want to increase
security by automatically disabling remote vKVM every time an administrator
logs in to the system, which they can do by executing the
LocalConRedirDisable command from the user logon scripts.
NOTE: See the white paper on Disabling Local Configuration and Remote Virtual
KVM in the DRAC on the Dell Support site at support.dell.com/manuals for more
information.
For more information on logon scripts, see
technet2.microsoft.com/windowsserver/en/library/31340f46-b3e5-4371bbb9-6a73e4c63b621033.mspx.
215
An SSL-enabled system:
This encryption process provides a high level of data protection. The DRAC
employs the 128-bit SSL encryption standard, the most secure form of
encryption generally available for Internet browsers in North America.
The DRAC Web server includes a Dell self-signed SSL digital certificate
(Server ID). To ensure high security over the Internet, replace the Web server
SSL certificate by submitting a request to the DRAC to generate a new
Certificate Signing Request (CSR).
216
Use the SSL Main Menu page options (see Table 12-1) to generate a CSR to
send to a CA. The CSR information is stored on the DRAC 5 firmware.
Table 12-2 describes the buttons available on the SSL Main Menu page.
Table 12-1.
Field
Description
Generate a New
Click Next to open the Certificate Signing Request
Certificate Signing Generation page that enables you to generate a CSR to send to
Request (CSR)
a CA to request a secure Web certificate.
Button
Description
Next
217
Description
Common Name
Organization Name The name associated with this organization (for example, XYZ
Corporation). Only alphanumeric characters, hyphens,
underscores, periods and spaces are valid.
Organization Unit
Locality
218
Table 12-3.
Field
Description
State Name
Country Code
The e-mail address associated with the CSR. You can type
your companys e-mail address, or any e-mail address you
desire to have associated with the CSR. This field is optional.
Table 12-4.
Button
Description
Go Back to Security
Main Menu
Generate
Generate a CSR.
219
Description
Serial Number
Subject Information
Issuer Information
Valid From
Valid To
220
Table 12-6.
Cryptography Schemes
Scheme Type
Scheme
Asymmetric Cryptography
Symmetric Cryptography
AES256-CBC
RIJNDAEL256-CBC
AES192-CBC
RIJNDAEL192-CBC
AES128-CBC
RIJNDAEL128-CBC
BLOWFISH-128-CBC
3DES-192-CBC
ARCFOUR-128
Message Integrity
HMAC-SHA1-160
HMAC-SHA1-96
HMAC-MD5-128
HMAC-MD5-96
Authentication
Password
Configuring Services
NOTE: To modify these settings, you must have Configure DRAC 5 permission.
Additionally, the remote RACADM command-line utility can only be enabled if the
user is logged in as root.
1 Expand the System tree and click Remote Access.
2 Click the Configuration tab and then click Services.
3 Configure the following services as required:
221
Use the Automated Systems Recovery Agent to enable the Last Crash
Screen functionality of the DRAC 5.
NOTE: Server Administrator must be installed with its Auto Recovery feature
activated by setting the Action to either: Reboot System, Power Off System,
or Power Cycle System, for the Last Crash Screen to function in the DRAC 5.
Description
Description
Enabled
Max Sessions
Active Sessions
222
Table 12-8.
Setting
Description
Timeout
Table 12-9.
SSH Settings
Setting
Description
Enabled
Max Sessions
Active Sessions
Timeout
Port Number
Description
Enabled
Max Sessions
223
Description
Active Sessions
Timeout
Port Number
Description
Enabled
Max Sessions
Active Sessions
Description
Enabled
Community Name
Description
Enabled
224
Description
Refresh
Apply Changes
These features are disabled in the DRAC 5 default configuration. Use the
following subcommand or the Web-based interface to enable these features:
racadm config -g cfgRacTuning -o <object_name> <value>
Additionally, use these features in conjunction with the appropriate session
idle time-out values and a defined security plan for your network.
The following subsections provide additional information about these features.
IP Filtering (IpRange)
IP address filtering (or IP Range Checking) allows DRAC 5 access only from
clients or management workstations whose IP addresses are within a userspecific range. All other logins are denied.
IP filtering compares the IP address of an incoming login to the IP address
range that is specified in the following cfgRacTuning properties:
cfgRacTuneIpRangeAddr
cfgRacTuneIpRangeMask
225
Description
cfgRacTuneIpRangeEnable
cfgRacTuneIpRangeAddr
cfgRacTuneIpRangeMask
Enabling IP Filtering
226
To restrict the login to a single IP address (for example, 192.168.0.57), use the
full mask, as shown below.
racadm config -g cfgRacTuning -o
cfgRacTuneIpRangeEnable 1
racadm config -g cfgRacTuning -o
cfgRacTuneIpRangeAddr 192.168.0.57
racadm config -g cfgRacTuning -o
cfgRacTuneIpRangeMask 255.255.255.255
To restrict logins to a small set of four adjacent IP addresses (for example,
192.168.0.212 through 192.168.0.215), select all but the lowest two bits in the
mask, as shown below:
racadm config -g cfgRacTuning -o
cfgRacTuneIpRangeEnable 1
racadm config -g cfgRacTuning -o
cfgRacTuneIpRangeAddr 192.168.0.212
racadm config -g cfgRacTuning -o
cfgRacTuneIpRangeMask 255.255.255.252
IP Filtering Guidelines
Use the range base address you prefer as the value for
cfgRacTuneIpRangeAddr. The 32-bit binary value of this address should
have zeros in all the low-order bits where there are zeros in the mask.
227
IP Blocking
Definition
cfgRacTuneIpBlkEnable
cfgRacTuneIpBlkFailCount
228
Definition
Enabling IP Blocking
229
Description
IP Range Enabled Enables the IP Range checking feature, which defines a specific
range of IP addresses that can access the DRAC 5.
IP Range Address
IP Range Subnet
Mask
IP Blocking
Enabled
IP Blocking Fail
Count
IP Blocking Fail
Window
IP Blocking
Penalty Time
230
Description
Refresh
Apply Changes
Go Back to
Network
Configuration
Page
231
232
13
SM-CLP Features
The SM-CLP promotes the concept of verbs and targets to provide system
management capabilities through the CLI. The verb indicates the
operation to perform, and the target determines the entity (or object)
that runs the operation.
Below is an example of the SM-CLP command line syntax.
<verb> [<options>] [<target>] [<properties>]
During a typical SM-CLP session, the user can perform operations using the
verbs listed in Table 13-1 and Table 13-2.
Table 13-1. Supported CLI Verbs for System
Verb
Definition
cd
delete
help
reset
show
start
Turns on a target.
stop
exit
version
Table 13-2. Supported CLI Verbs for Fans, Batteries, Intrusion, Hardware Performance,
Power supplies, Temperatures and Voltages
Verb
Definition
cd
help
show
exit
version
Using SM-CLP
1 SSH (or telnet) to the DRAC 5 with correct credentials.
2 At the command prompt, type smclp.
The SMCLP prompt (->) is displayed.
234
System Event Log (SEL) Management Display or clear the SEL records
Options
Table 13-3 lists the supported SM-CLP options.
Table 13-3.
SM-CLP
Option
Description
-all
-display
-examine
-help
-version
Targets
Table 13-4 provides a list of targets provided through the SM-CLP to support
these operations.
Table 13-4.
SM-CLP Targets
Target
Definition
/system1
/system1/logs1
/system1/logs1/log1
/system1/logs1/log1/
record1
/system1/pwrmgtsvc1
235
Definition
/system1/pwrmgtsvc1/
pwrmgtcap1
/system1/fan1
/system1/fan1/
tachsensor1
/system1/batteries1
/system1/batteries1/
sensor1
/system1/intrusion1
/system1/intrusion1/
sensor1
236
SEL management
Operation
Syntax
>ssh 192.168.0.120
>login: root
>password:
>smclp
DRAC5 SM-CLP System Management Shell,
version 1.0
Copyright (c) 2004-2008 Dell, Inc.
All Rights Reserved
->
->stop /system1
system1 has been stopped successfully
->reset /system1
system1 has been reset successfully
237
SEL Management
Syntax
Viewing the
SEL
->show /system1/logs1/log1
/system1/logs1/log1
Targets:
Record1
Record2
Record3
Record4
Record5
Properties:
InstanceID
MaxNumberOfRecords
CurrentNumberOfRecords
Name
EnabledState
OperationalState
HealthState
Caption
Description
ElementName
=
=
=
=
=
=
=
=
=
=
Commands:
cd
show
help
exit
version
238
Table 13-6.
Operation
Syntax
Viewing the
SEL record
->show /system1/logs1/log1/record4
/system1/logs1/log1/record4
Properties:
LogCreationClassName
CreationClassName
LogName
RecordID
MessageTimeStamp
000
Description
detected a failure
ElementName
=
=
=
=
=
CIM_RecordLog
CIM_LogRecord
IPMI SEL
1
20050620100512.000000-
Commands:
cd
show
help
exit
version
Clearing the
SEL
->delete /system1/logs1/log1/record*
All records deleted successfully
239
Batteries Management
Syntax
Viewing the
status of the
batteries
->show system1/batteries1/sensor1
/system1/batteries1/sensor1:
Properties:
SystemCreationClassName = CIM_ComputerSystem
SystemName
= F196P1S
CreationClassName
= CIM_Sensor
DeviceID
= BATTERY 1
SensorType
= 1
PossibleStates
CurrentState
= good
ElementName
Battery
OtherSensorTypeDescription
sensor.
EnabledState
= CMOS battery
= 1
Verbs:
cd
exit
help
show
version
240
Table 13-8 provides examples of using the cd verb to navigate the MAP. In all
examples, the initial default target is assumed to be /.
Table 13-8.
Operation
Syntax
Navigate to the
system target and
reboot
->cd system1
->reset
->cd .
->cd ..
->exit
System Properties
The Table 13-9 lists the system properties that are displayed when the user
types the following:
show /system1
These properties are derived from the Base System Profile that is provided by
the standards body and is based on the CIM_ComputerSystem class as
defined by the CIM schema.
For additional information, see the DMTF CIM schema definitions.
241
Property
CIM_ComputerSystem Name
Description
Unique identifier of a System
instance that exists in the
enterprise environment.
MaxLen = 256
ElementName
NameFormat
242
Table 13-9.
Object
Description
Dedicated
243
Property
Description
16=File Server
17=Mobile User Device,
18=Repeater
19=Bridge/Extender
20=Gateway
21=Storage Virtualizer
22=Media Library
23=Extender Node
24=NAS Head
25=Self-Contained NAS
26=UPS
27=IP Phone
28=Management Controller
29=Chassis Manager
ResetCapability
244
Table 13-9.
Object
Description
EnabledState
EnabledDefault
245
Property
Description
RequestedState
HealthState
246
Table 13-9.
Object
Description
247
Property
Description
CreationClassName
DeviceID
248
Property
Description
BaseUnits
CurrentReading
249
Property
Description
SupportedThreshold
SettableThreshold
SensorTypes
PossibleStates
250
Property
Description
CurrentState
ElementName
Property
Description
CreationClassName
DeviceID
251
Table 13-11. Supported Property Names for Power Supply Sensors (continued)
Object
Property
Description
TotalOutputPower
ElementName
OperationalStatus
HealthState
EnabledState
Property
Description
SensorType
252
1=Other
3=Voltage (for voltage sensor)
Table 13-12. Supported Property Names for Intrusion, Battery, Voltage, and Hardware
Performance Sensors (continued)
Object
Property
Description
ElementName
253
Property Names for Fan and Power Supply Redundancy Set Sensors
Table 13-13. Supported Property Names for Fan and Power Supply Redundancy
Set Sensors
Object
Property
Description
CIM_RedundancySet
InstanceID
Instance number
MinNumberNeeded
0=Unknown
ElementName
Property
Description
CIM_Chassis
CreationClassName
PackageType
Type of package
3=Chassis
ChassisPackageType
Manufacturer
Manufacturer
"Dell"
254
Model
ElementName
Element name
Property
Description
ElementName
powerstate
Using the set verb, you can set the power state of the system. for example, to
turn on the system if it is off:
set powerstate=2
255
Property
CIM_PowerManagement InstanceID
Capabilities
Description
Unique instance ID for the
power capabilities
PowerStatesSupp 2=Power On
orted
6=Power Off
5=Power Reset
9=Powercycle the system
256
14
257
1 Open the Windows Control Panel and double-click the System icon.
2 Click the Advanced tab.
3 Under Startup and Recovery, click Settings.
4 Deselect the Automatically Reboot check box.
5 Click OK twice.
Disabling the Automatic Reboot Option in Windows 2000 Server
1 Open the Windows Control Panel and double-click the System icon.
2 Click the Advanced tab.
3 Click the Startup and Recovery... button.
4 Deselect the Automatically Reboot check box.
258
Redundancy Degraded
Redundancy Lost
Processor Warning
Processor Failure
Processor Absent
PS/VRM/D2D Warning
PS/VRM/D2D Failure
When a platform event occurs (for example, a fan probe failure), a system
event is generated and recorded in the System Event Log (SEL). If this event
matches a platform event filter (PEF) in the Platform Event Filters list in the
Web-based interface and you have configured this filter to generate an alert
(PET or e-mail), then a PET or e-mail alert is sent to a set of one or more
configured destinations.
If the same platform event filter is also configured to perform an action (such
as rebooting the system), the action is performed.
259
1 Enable PEF.
Open a command prompt, type the following command, and press
<Enter>:
racadm config -g cfgIpmiPef -o cfgIpmiPefEnable -i
1 1
where 1 and 1 are the PEF index and the enable/disable selection,
respectively.
The PEF index can be a value from 1 through 17. The enable/disable
selection can be set to 1 (Enabled) or 0 (Disabled).
For example, to enable PEF with index 5, type the following command:
racadm config -g cfgIpmiPef -o cfgIpmiPefEnable -i
5 1
2 Configure your PEF actions.
At the command prompt, type the following command and press
<Enter>:
racadm config -g cfgIpmiPef -i <index> -o
cfgIpmiPefAction <action>
where the <action> values bits are as follows:
260
For example, to enable PEF to reboot the system, type the following
command:
racadm config -g cfgIpmiPef -o cfgIpmiPefAction -i
1 2
where 1 is the PEF index and 2 is the PEF action to reboot.
Configuring PET
Configuring PET Using the Web User Interface
Click Send Test Trap to test the configured alert (if desired).
NOTE: Your user account must have Test Alerts permission to perform this
procedure. See Table 5-4.
261
262
Click Send Test Email to test the configured e-mail alert (if desired).
NOTE: Your user account must have Test Alerts permission to perform this
procedure. See Table 5-4.
Repeat step a through step e for any remaining e-mail alert settings.
263
265
266
15
This section provides information about configuring and using the DRAC 5
IPMI interface. The interface includes the following:
The DRAC 5 is fully IPMI 2.0 compliant. You can configure the DRAC
IPMI using:
your browser
RACADM
For more information about using the IPMI Shell, ipmish, see the Dell
OpenManage BMC User's Guide located on the Dell Support website at
support.dell.com/manuals.
For more information about using RACADM, see "Using RACADM
Remotely" on page 78.
267
Under IPMI LAN Settings, click the Channel Privilege Level Limit
drop-down menu, select Administrator, Operator, or User and click
Apply Changes.
e
Click the Baud Rate drop-down menu, select the appropriate baud
rate, and click Apply Changes.
268
Ensure that the serial MUX is set correctly in the managed systems
BIOS Setup program.
Delete control
Echo control
Line edit
For more information about these properties, see the IPMI 2.0
specification.
Configuring Intelligent Platform Management Interface (IPMI)
269
2 (User)
3 (Operator)
4 (Administrator)
For example, to set the IPMI LAN channel privilege to 2 (User), type
the following command:
racadm config -g cfgIpmiLan -o
cfgIpmiLanPrivilegeLimit 2
b
CAUTION: The IPMI SOL minimum privilege level determines the minimum
privilege required to activate IPMI SOL. For more information, see the IPMI 2.0
specification.
At the command prompt, type the following command and press
<Enter>:
racadm config -g cfgIpmiSol -o
cfgIpmiSolMinPrivilege <level>
where <level> is one of the following:
2 (User)
3 (Operator)
4 (Administrator)
271
Enable SOL.
NOTE: SOL can be enabled or disabled for each individual user.
At the command prompt, type the following command and press
<Enter>:
racadm config -g cfgUserAdmin -o
cfgUserAdminSolEnable -i <id> 2
where <id> is the users unique ID.
272
2 (User)
3 (Operator)
4 (Administrator)
For example, to set the IPMI serial channel privileges to 2 (User), type
the following command:
racadm config -g cfgIpmiSerial -o
cfgIpmiSerialChanPrivLimit 2
e
Ensure that the serial MUX is set correctly in the BIOS Setup
program.
Delete control
Echo control
Line edit
273
For more information about these properties, see the IPMI 2.0
specification.
IPMI basic mode Supports a binary interface for program access, such
as the IPMI shell (IPMISH) that is included with the Baseboard
Management Utility (BMU).
274
Table 15-1.
Setting
Description
Baud Rate
The IPMI data speed. Select 9600 bps, 19.2 kbps, 57.6
kbps, or 115.2 kbps.
Channel Privilege
Level Limit
275
Description
Refresh
Advanced Settings
Apply Changes
Table 15-3. Serial Over LAN Configuration Advanced Settings Page Settings
Setting
Description
Character Accumulate The amount of time that the BMC will wait before
Interval
transmitting a partial SOL character data package.
1-based 5ms increments.
Character Send
Threshold
Table 15-4. Serial Over LAN Configuration Advanced Settings Page Buttons
Button
Description
Refresh
Go Back To Serial
Over LAN
Configuration Page
Apply Changes
276
16
277
To access the Power Management page from the System tree, click System
and then click the Power Management tab.
NOTE: You must have Execute Server Action Commands permission to perform
power management actions.
Power Cycle System Power off, then reboot (cold boot) the system.
2 Click Apply to perform the power management action (for example, cause
the system to power cycle).
3 Click the appropriate Power Management page button to continue
(see Table 16-1).
Table 16-1. Power Management Page Buttons (Top Right)
Button
Action
Refresh
278
To access the system information, expand the System tree and click
Properties.
Field
Description
Description
System description.
BIOS Version
Service Tag
Host Name
OS Name
279
Description
Recovery Action
Description
NIC1 Ethernet
NIC2 Ethernet
Description
Name
Short name.
Product
Information
Verbose Name.
Firmware Updated Date and time that the firmware was last updated.
RAC Time
280
Field
Description
Name
IPMI Version
Number of Possible
Active Sessions
Number of Current
Active Sessions
Firmware Version
LAN Enabled
Icon/Category Description
A green check mark indicates a healthy (normal) status condition.
A yellow triangle containing an exclamation point indicates a
warning (noncritical) status condition.
A red X indicates a critical (failure) status condition.
281
The date and time that the event occurred. If the date is blank, then
the event occurred at System Boot. The format is mm/dd/yyyy
hh:mm:ss, based on a 24-hour clock.
Description
Action
Prints the SEL in the sort order that it appears in the window.
Clear Log
NOTE: The Clear Log button appears only if you have Clear Logs
permission.
Save As
282
283
The Last Crash Screen page provides the following buttons (see Table 16-9)
in the top-right corner of the screen:
Table 16-9. Last Crash Screen Page Buttons
Button
Action
Save
Delete
Refresh
NOTE: Due to fluctuations in the Auto Recovery timer, the Last Crash Screen may
not be captured when the System Reset Timer is set to a value less than 30
seconds. Use Server Administrator or IT Assistant to set the System Reset Timer to
at least 30 seconds and ensure that the Last Crash Screen functions properly. See
"Configuring the Managed System to Capture the Last Crash Screen" on page 257
for additional information.
284
17
RAC Log
Diagnostic Console
Trace Log
racdump
coredump
285
Description
Date/ Time The date and time (for example, Dec 19 16:55:47).
When the DRAC 5 initially starts and is unable to communicate
with the managed system, the time will be displayed as System
Boot.
Source
Description A brief description of the event and the user name that logged into
the DRAC 5.
The RAC Log page provides the buttons listed in Table 17-2.
Table 17-2. RAC Log Buttons
Button
Action
Clear Log
NOTE: The Clear Log button only appears if you have Clear Logs
permission.
Save As
Opens a pop-up window that enables you to save the RAC Log
to a directory of your choice.
286
Diagnostic Commands
Command
Description
arp
ifconfig
287
Description
netstat
ping
<IP Address>
gettracelog
The trace log may also contain DRAC 5 firmware-specific error codes that are
related to the internal DRAC 5 firmware, not the managed systems operating
system.
NOTE: The DRAC 5 will not echo an ICMP (ping) with a packet size larger than
1500 bytes.
288
Another critical condition occurs on the RAC. In this case, the coredump
information will be relative to the last critical error that occurred.
289
290
Sensors
18
Hardware sensors or probes help you to monitor the systems on your network
in a more efficient way by enabling you to take appropriate actions to prevent
disasters, such as system instability or damage.
You can use the DRAC 5 to monitor hardware sensor for batteries, fan
probes, chassis intrusion, power supplies, power consumed, temperature,
and voltages.
Battery Probes
The Battery probes provide information about the system board CMOS and
storage RAM on motherboard (ROMB) batteries.
NOTE: The Storage ROMB battery settings are available only if the system has
a ROMB.
Fan Probes
The fan probe sensor provides information on:
fan redundancy the ability of the secondary fan to replace the primary
fan if the primary fan fails to dissipate heat at a pre-set speed.
fan probe list provides information on the fan speed for all fans in the
system.
Sensors
291
status of the power supplies, whether within the normal threshold value or
has crossed threshold value.
NOTE: You can set threshold values only from the Dell OpenManage Server
Administrator. See the Dell OpenManage Server Administrator Users Guide
for more information.
power supply redundancy, that is, the ability of the redundant power
supply to replace the primary power supply if the primary power supply
fails.
NOTE: If there is only one power supply in the system, the Power Supply
Redundancy section will not display.
292
Sensors
Graph Information
The Graph Information page displays the graphs for the system power level
in Watts and power supplies in Amperes over a time period. The page auto
refreshes every minute.
NOTE: The data is obtained by the DRAC 5 every five minutes and is lost after a
DRAC reset, AC power cycle, or a firmware update.
NOTE: The graphs may display gaps either when the system is powered down or
when the BMC resets. This is because the power sensors are unavailable during
this period.
Power Consumption in Watts displays the time period over which the data
for power is collected. You can set the X-axis range to 1 hour, 1 day, or 1 week
from the drop-down menu available on this page. The time period is from the
current time set on the DRAC. The Y-axis displays the power consumed by
the system in Watts.
Power Consumption in Amperes displays the time period over which the data
for current is collected. You can set the X-axis range to 1 hour, 1 day, or 1
week from the drop-down menu available on this page. The time period is
from the current DRAC time. The Y-axis displays the current consumed by
the power supplies in Amperes. If there are more than one power supply units
on the system and if the readings are the same, the current graphs may
overlap each other.
Sensors
293
Power Statistics
The Power Statistics page displays the average power consumption and the
maximum and the minimum power consumption statistics for the system in
Watts and BTU/Hr (British Thermal Unit per Hour) over the last 1 hour,
1 day, or 1 week from the current DRAC time. The data is obtained by the
DRAC 5 and is reset if the DRAC undergoes a reset for any reason.
Temperature Probes
The temperature sensor provides information about the system board
ambient temperature. The temperature probes indicate whether the status of
the probes is within the pre-set warning and critical threshold value.
Voltage Probes
The following are typical voltage probes. Your system may have these and/or
others present.
System Board 5V PG
The voltage probes indicate whether the status of the probes is within the
pre-set warning and critical threshold values.
294
Sensors
This section provides descriptions of the subcommands that are available in the
RACADM command line interface.
help
NOTE: To use this command, you must have Log In DRAC 5 permission.
Table A-1 describes the help command.
Table A-1. Help Command
Command
Definition
help
Synopsis
racadm help
racadm help <subcommand>
Description
The help subcommand lists all of the subcommands that are available when
using the racadm command along with a one-line description. You may also type
a subcommand after help to get the syntax for a specific subcommand.
Output
The racadm help command displays a complete list of subcommands.
The racadm help <subcommand> command displays information for the
specified subcommand only.
Supported Interfaces
Local RACADM
Remote RACADM
Telnet/SSH/Serial RACADM
RACADM Subcommand Overview
295
arp
NOTE: To use this command, you must have Execute Diagnostic Commands
permission.
Table A-2 describes the arp command.
Table A-2. arp Command
Command
Definition
arp
Synopsis
racadm arp
Supported Interfaces
Remote RACADM
Telnet/SSH/Serial RACADM
clearasrscreen
NOTE: To use this command, you must have Clear Logs permission.
Table A-3 describes the clearasrscreen subcommand.
Table A-3. clearasrscreen
Subcommand
Definition
clearasrscreen
Synopsis
racadm clearasrscreen
Supported Interfaces
296
Local RACADM
Remote RACADM
Telnet/SSH/Serial RACADM
RACADM Subcommand Overview
config
NOTE: To use the getconfig command, you must have Log In DRAC 5 permission.
Table A-4 describes the config and getconfig subcommands.
Table A-4. config/getconfig
Subcommand
Definition
config
getconfig
Synopsis
racadm config [-c|-p] -f <filename>
racadm config -g <groupName> -o <objectName> [-i
<index>] <Value>
Supported Interfaces
Local RACADM
Remote RACADM
Telnet/SSH/Serial RACADM
Description
The config subcommand allows the user to set DRAC 5 configuration
parameters individually or to batch them as part of a configuration file. If the
data is different, that DRAC 5 object is written with the new value.
Input
297
Description
-f
The -f <filename> option causes config to read the contents of the file
specified by <filename> and configure the DRAC 5. The file must
contain data in the format specified in "Parsing Rules" on page 87.
-p
The -p, or password option, directs config to delete the password entries
contained in the config file -f <filename> after the configuration is
complete.
-g
-o
-i
The -i <index>, or index option, is only valid for indexed groups and can
be used to specify a unique group. The <index> is a decimal integer
from 1 through 16. The index is specified here by the index value, not a
"named" value.
-c
The -c, or check option, is used with the config subcommand and allows
the user to parse the .cfg file to find syntax errors. If errors are found, the
line number and a short description of what is incorrect are displayed.
Writes do not occur to the DRAC 5. This option is a check only.
Output
Invalid syntax, group name, object name, index, or other invalid database
members
298
Examples
getconfig
getconfig Subcommand Description
The getconfig subcommand allows the user to retrieve DRAC 5 configuration
parameters on an individual basis, or all the RAC configuration groups may be
retrieved and saved into a file.
Input
299
Description
-f
-g
-h
-i
The -i <index>, or index option, is valid only for indexed groups and
can be used to specify a unique group. The <index> is a decimal integer
from 1 through 16. If -i <index> is not specified, a value of 1 is assumed
for groups, which are tables that have multiple entries. The index is
specified by the index value, not a "named" value.
-o
-u
-v
Output
300
Invalid syntax, group name, object name, index, or other invalid database
members
If errors are not encountered, this subcommand displays the contents of the
specified configuration.
Examples
racadm getconfig -h
Displays a list of the available configuration groups on the DRAC 5.
Synopsis
racadm getconfig -f <filename>
racadm getconfig -g <groupName> [-i <index>]
racadm getconfig -u <username>
racadm getconfig -h
Supported Interfaces
Local RACADM
Remote RACADM
Telnet/SSH/Serial RACADM
301
coredump
NOTE: To use this command, you must have Execute Debug Commands
permission.
Table A-7 describes the coredump subcommand.
Table A-7. coredump
Subcommand
Definition
coredump
Synopsis
racadm coredump
Description
The coredump subcommand displays detailed information related to any recent
critical issues that have occurred with the RAC. The coredump information can
be used to diagnose these critical issues.
If available, the coredump information is persistent across RAC power cycles
and will remain available until either of the following conditions occur:
Another critical condition occurs on the RAC. In this case, the coredump
information will be relative to the last critical error that occurred.
See the coredumpdelete subcommand for more information about clearing the
coredump.
Supported Interfaces
302
Remote RACADM
Telnet/SSH/Serial RACADM
coredumpdelete
NOTE: To use this command, you must have Clear Logs or Execute Debug
Commands permission.
Table A-8 describes the coredumpdelete subcommand.
Table A-8. coredumpdelete
Subcommand
Definition
coredumpdelete
Synopsis
racadm coredumpdelete
Description
The coredumpdelete subcommand can be used to clear any currently resident
coredump data stored in the RAC.
NOTE: If a coredumpdelete command is issued and a coredump is not currently
stored in the RAC, the command will display a success message. This behavior is
expected.
See the coredump subcommand for more information on viewing a coredump.
Supported Interfaces
Local RACADM
Remote RACADM
Telnet/SSH/Serial RACADM
fwupdate
NOTE: To use this command, you must have Configure DRAC 5 permission.
NOTE: Before you begin your firmware update, see "Connecting to the Managed
System Through the Local Serial Port or Telnet Management Station (Client System)"
on page 64 for additional instructions.
303
Definition
fwupdate
Synopsis
racadm fwupdate -s
racadm fwupdate -g -u -a <TFTP_Server_IP_Address> -d
<path>
racadm fwupdate -p -u -d <path>
Description
The fwupdate subcommand allows users to update the firmware on the DRAC
5. The user can:
Update the DRAC 5 firmware from the local file system using local
RACADM
Supported Interfaces
Local RACADM
Remote RACADM
Telnet/SSH/Serial RACADM
Input
Table A-10 describes the fwupdate subcommand options.
NOTE: The -p option is supported in local and remote RACADM and is not
supported with the serial/telnet/ssh console. The -p option is not supported on the
Linux platform.
304
The update option performs a checksum of the firmware update file and
starts the actual update process. This option may be used along with the -g
or -p options. At the end of the update, the DRAC 5 performs a soft reset.
-s
The status option returns the current status of where you are in the update
process. This option is always used by itself.
-g
The get option instructs the firmware to get the firmware update file from
the TFTP server. The user must also specify the -a and -d options. In the
absence of the -a option, the defaults are read from properties contained in
the group cfgRemoteHosts, using properties cfgRhostsFwUpdateIpAddr
and cfgRhostsFwUpdatePath.
-a
-d
The -d, or directory, option specifies the directory on the TFTP server or on
the DRAC 5s host server where the firmware update file resides.
-p
The -p, or put, option is used to update the firmware file from the managed
system to the DRAC 5. The -u option must be used with the -p option.
Output
Displays a message indicating which operation is being performed.
Examples
racadm fwupdate -s
This option reads the current status of the firmware update.
RACADM Subcommand Overview
305
getssninfo
NOTE: To use this command, you must have Log In To DRAC 5 permission.
Table A-11 describes the getssninfo subcommand.
Table A-11. getssninfo Subcommand
Subcommand
Definition
getssninfo
Synopsis
racadm getssninfo [-A] [-u <username> | *]
Description
The getssninfo command returns a list of users that are connected to the
DRAC. The summary information provides the following information:
306
Username
Supported Interfaces
Local RACADM
Remote RACADM
Telnet/SSH/Serial RACADM
Input
Table A-12 describes the getssninfo subcommand options.
Table A-12. getssninfo Subcommand Options
Option Description
-A
-u
The -u <username> user name option limits the printed output to only
the detail session records for the given user name. If an "*" symbol is given
as the user name, all users are listed. Summary information is not printed
when this option is specified.
Examples
racadm getssninfo
IP Address
Type
Consoles
root
192.168.0.10
Telnet
Virtual KVM
racadm getssninfo -A
"root" 143.166.174.19 "Telnet" "NONE"
racadm getssninfo -A -u *
"root" "143.166.174.19" "Telnet" "NONE"
"bob" "143.166.174.19" "GUI" "NONE"
307
getsysinfo
NOTE: To use this command, you must have Log In To DRAC 5 permission.
Table A-14 describes the racadm getsysinfo subcommand.
Table A-14. getsysinfo
Command
Definition
getsysinfo
Synopsis
racadm getsysinfo [-d] [-s] [-w] [-A]
Description
The getsysinfo subcommand displays information related to the RAC, managed
system, and watchdog configuration.
Supported Interfaces
Local RACADM
Remote RACADM
Telnet/SSH/Serial RACADM
Input
Table A-15 describes the getsysinfo subcommand options.
Table A-15. getsysinfo Subcommand Options
Option
Description
-d
-s
-w
-A
If the -w option is not specified, then the other options are used as defaults.
308
Output
The getsysinfo subcommand displays information related to the RAC, managed
system, and watchdog configuration.
Sample Output
RAC Information:
RAC Date/Time
Firmware Version
= 1.50
Firmware Build
= 09.10.21
Hardware Version
= A00
Current IP Address
= 192.168.1.21
Current IP Gateway
= 0.0.0.0
Current IP Netmask
= 255.255.255.0
DHCP Enabled
= 1
MAC Address
= 00:1c:23:d7:1a:d9
= 0.0.0.0
= 0.0.0.0
= 0
= 0
= rac-297GP1S
System Information:
System Model
= PowerEdge 2950
System Revision
= [N/A]
= 1.3.7
= 02.28
Service Tag
= 297GP1S
=
RACADM Subcommand Overview
309
OS Name
Power Status
= ON
Watchdog Information:
Recovery Action
= None
= 00:1A:A0:11:93:68
NIC2 Ethernet
= 00:1A:A0:11:93:6A
Examples
racadm getsysinfo -A -s
"System Information:" "PowerEdge 2900" "A08" "1.0"
"EF23VQ-0023" "Hostname"
"Microsoft Windows 2000 version 5.0, Build Number
2195, Service Pack 2" "ON"
racadm getsysinfo -w -s
System Information:
System Model
System BIOS Version
BMC Firmware Version
Service Tag
Express Service Tag
Host Name
OS Name
2003
Power Status
=
=
=
=
=
=
=
PowerEdge 2900
0.2.3
0.17
48192
4910296528
racdev103
Microsoft Windows Server
= OFF
Watchdog Information:
Recovery Action
= None
Present countdown value = 0 seconds
Initial countdown value = 0 seconds
310
Restrictions
The Hostname and OS Name fields in the getsysinfo output display accurate
information only if Dell OpenManage is installed on the managed system. If
OpenManage is not installed on the managed system, these fields may be blank
or inaccurate.
getractime
NOTE: To use this command, you must have Log In DRAC 5 permission.
Table A-16 describes the getractime subcommand.
Table A-16. getractime
Subcommand
Definition
getractime
Synopsis
racadm getractime [-d]
Description
With no options, the getractime subcommand displays the time in a common
readable format.
With the -d option, getractime displays the time in the format,
yyyymmddhhmmss.mmmmmms, which is the same format returned by the
UNIX date command.
Output
The getractime subcommand displays the output on one line.
Sample Output
racadm getractime
Thu Dec
8 20:15:26 2005
racadm getractime -d
20051208201542.000000
RACADM Subcommand Overview
311
Supported Interfaces
Local RACADM
Remote RACADM
Telnet/SSH/Serial RACADM
ifconfig
NOTE: To use this command, you must have Execute Diagnostic Commands or
Configure DRAC 5 permission.
Table A-17 describes the ifconfig subcommand.
Table A-17. ifconfig
Subcommand
Definition
ifconfig
Synopsis
racadm ifconfig
netstat
NOTE: To use this command, you must have Execute Diagnostic Commands
permission.
Table A-18 describes the netstat subcommand.
Table A-18. netstat
Subcommand
Definition
netstat
Synopsis
racadm netstat
312
Supported Interfaces
Remote RACADM
Telnet/SSH/Serial RACADM
ping
NOTE: To use this command, you must have Execute Diagnostic Commands or
Configure DRAC 5 permission.
Table A-19 describes the ping subcommand.
Table A-19. ping
Subcommand
Definition
ping
Synopsis
racadm ping <ipaddress>
Supported Interfaces
Remote RACADM
Telnet/SSH/Serial RACADM
313
setniccfg
NOTE: To use the setniccfg command, you must have Configure DRAC 5
permission.
Table A-20 describes the setniccfg subcommand.
Table A-20. setniccfg
Subcommand
Definition
setniccfg
NOTE: The terms NIC and Ethernet management port may be used
interchangeably.
Synopsis
racadm setniccfg -d
racadm setniccfg -s [<ipAddress> <netmask> <gateway>]
racadm setniccfg -o [<ipAddress> <netmask> <gateway>]
Description
The setniccfg subcommand sets the controller IP address.
The -d option enables DHCP for the Ethernet management port (default
is DHCP enabled).
314
Output
The setniccfg subcommand displays an appropriate error message if the
operation is not successful. If successful, a message is displayed.
Supported Interfaces
Local RACADM
Remote RACADM
Telnet/SSH/Serial RACADM
getniccfg
NOTE: To use the getniccfg command, you must have Log In To DRAC 5 permission.
Table A-21 describes the setniccfg and getniccfg subcommands.
Table A-21. setniccfg/getniccfg
Subcommand
Definition
getniccfg
Synopsis
racadm getniccfg
Description
The getniccfg subcommand displays the current Ethernet management port
settings.
Sample Output
The getniccfg subcommand will display an appropriate error message if the
operation is not successful. Otherwise, on success, the output displayed in the
following format:
NIC Enabled
= 1
DHCP Enabled
= 1
IP Address
= 192.168.0.1
Subnet Mask
= 255.255.255.0
RACADM Subcommand Overview
315
Gateway
= 192.168.0.1
Supported Interfaces
Local RACADM
Remote RACADM
Telnet/SSH/Serial RACADM
getsvctag
NOTE: To use this command, you must have Log In To DRAC 5 permission.
Table A-22 describes the getsvctag subcommand.
Table A-22. getsvctag
Subcommand
Definition
getsvctag
Synopsis
racadm getsvctag
Description
The getsvctag subcommand displays the service tag of the host system.
Example
Type getsvctag at the command prompt. The output is displayed as follows:
Y76TP0G
The command returns 0 on success and nonzero on errors.
Supported Interfaces
316
Local RACADM
Remote RACADM
Telnet/SSH/Serial RACADM
racdump
NOTE: To use this command, you must have Debug permission.
Table A-23 describes the racdump subcommand.
Table A-23. racdump
Subcommand
Definition
racdump
Synopsis
racadm racdump
Description
The racdump subcommand provides a single command to get dump, status,
and general DRAC 5 board information.
The following information is displayed when the racdump subcommand is
processed:
Coredump
Session information
Process information
Supported Interfaces
Remote RACADM
Telnet/SSH/Serial RACADM
317
racreset
NOTE: To use this command, you must have Configure DRAC 5 permission.
Table A-24 describes the racreset subcommand.
Table A-24. racreset
Subcommand
Definition
racreset
CAUTION: When you issue a racreset subcommand, the DRAC may require up to
one minute to return to a usable state.
Synopsis
racadm racreset [hard | soft]
Description
The racreset subcommand issues a reset to the DRAC 5. The reset event is
written into the DRAC 5 log.
A hard reset performs a deep reset operation on the RAC. A hard reset should
only be performed as a last-case resort to recover the RAC.
CAUTION: You must reboot your system after performing a hard reset of the
DRAC 5 as described in Table A-25.
Table A-25 describes the racreset subcommand options.
Table A-25. racreset Subcommand Options
Option
Description
hard
soft
318
Examples
racadm racreset
Start the DRAC 5 soft reset sequence.
Supported Interfaces
Local RACADM
Remote RACADM
Telnet/SSH/Serial RACADM
racresetcfg
NOTE: To use this command, you must have Configure DRAC 5 permission.
Table A-26 describes the racresetcfg subcommand.
Table A-26. racresetcfg
Subcommand
Definition
racresetcfg
Synopsis
racadm racresetcfg
Supported Interfaces
Local RACADM
Remote RACADM
Telnet/SSH/Serial RACADM
319
Description
The racresetcfg command removes all database property entries that have been
configured by the user. The database has default properties for all entries that
are used to restore the card back to its original default settings. After resetting
the database properties, the DRAC 5 resets automatically.
CAUTION: This command deletes your current RAC configuration and resets the
RAC and serial configuration to the original default settings. After reset, the
default name and password is root and calvin, respectively, and the IP address
is 192.168.0.120. If you issue racresetcfg from a network client (for example,
a supported Web browser, telnet/ssh, or remote RACADM), you must use the
default IP address.
NOTE: This subcommand will also reset the serial interface to its default baud rate
(57600) and COM port. The serial settings may need to be reconfigured through the
BIOS setup screen for the server in order to access the RAC through the serial port.
serveraction
NOTE: To use this command, you must have Execute Server Control Commands
permission.
Table A-27 describes the serveraction subcommand.
Table A-27. serveraction
Subcommand
Definition
serveraction
Synopsis
racadm serveraction <action>
Description
The serveraction subcommand enables users to perform power management
operations on the host system. Table A-28 describes the serveraction power
control options.
320
Definition
<action>
Specifies the action. The options for the <action> string are:
powerdown Powers down the managed system.
powerup Powers up the managed system.
powercycle Issues a power-cycle operation on the managed
system. This action is similar to pressing the power button on the
systems front panel to power down and then power up the system.
powerstatus Displays the current power status of the server
("ON", or "OFF")
hardreset Performs a reset (reboot) operation on the managed
system.
Output
The serveraction subcommand displays an error message if the requested
operation could not be performed, or a success message if the operation
completed successfully.
Supported Interfaces
Local RACADM
Remote RACADM
Telnet/SSH/Serial RACADM
getraclog
NOTE: To use this command, you must have Log In DRAC 5 permission.
Table A-29 describes the racadm getraclog command.
Table A-29. getraclog
Command
Definition
getraclog -i
getraclog
321
Synopsis
racadm getraclog -i
racadm getraclog [-A] [-o] [-c count] [-s start-record]
[-m]
Description
The getraclog -i command displays the number of entries in the DRAC 5 log.
The following options allow the getraclog command to read entries:
Output
The default output display shows the record number, time stamp, source, and
description. The timestamp begins at midnight, January 1 and increases until
the system boots. After the system boots, the systems timestamp is used.
Sample Output
Record:
Date/Time:
Source:
Description:
1
Dec 8 08:10:11
login[433]
root login from 143.166.157.103
Supported Interfaces
322
Local RACADM
Remote RACADM
Telnet/SSH/Serial RACADM
clrraclog
NOTE: To use this command, you must have Clear Logs permission.
Synopsis
racadm clrraclog
Description
The clrraclog subcommand removes all existing records from the RAC log.
A new single record is created to record the date and time when the log was
cleared.
getsel
NOTE: To use this command, you must have Log In To DRAC 5 permission.
Table A-30 describes the getsel command.
Table A-30. getsel
Command
Definition
getsel -i
getsel
Synopsis
racadm getsel -i
racadm getsel [-E] [-R] [-A] [-o] [-c count] [-s count]
[-m]
Description
The getsel -i command displays the number of entries in the SEL.
The following getsel options (without the -i option) are used to read entries.
-A Specifies output with no display headers or labels.
-c Provides the maximum count of entries to be returned.
-o Displays the output in a single line.
323
Output
The default output display shows the record number, timestamp, severity, and
description.
For example:
Record:
1
Date/Time:
11/16/2005 22:40:43
Severity:
Ok
Description: System Board SEL: event log sensor for
System Board, log cleared was asserted
Supported Interfaces
Local RACADM
Remote RACADM
Telnet/SSH/Serial RACADM
clrsel
NOTE: To use this command, you must have Clear Logs permission.
Synopsis
racadm clrsel
Description
The clrsel command removes all existing records from the system event log (SEL).
324
Supported Interfaces
Local RACADM
Remote RACADM
Telnet/SSH/Serial RACADM
gettracelog
NOTE: To use this command, you must have Log In To DRAC 5 permission.
Table A-31 describes the gettracelog subcommand.
Table A-31. gettracelog
Command
Definition
gettracelog -i
gettracelog
Synopsis
racadm gettracelog -i
racadm gettracelog [-A] [-o] [-c count] [-s
startrecord] [-m]
Description
The gettracelog (without the -i option) command reads entries. The following
gettracelog entries are used to read entries:
-i Displays the number of entries in the DRAC 5 trace log
-m Displays one screen at a time and prompts the user to continue (similar to
the UNIX more command).
-o Displays the output in a single line.
-c specifies the number of records to display
-s specifies the starting record to display
-A does not display headers or labels
325
Output
The default output display shows the record number, timestamp, source, and
description. The timestamp begins at midnight, January 1 and increases until
the system boots. After the system boots, the systems timestamp is used.
For example:
Record:
Date/Time:
Dec
Source:
ssnmgrd[175]
8 08:21:30
Supported Interfaces
Local RACADM
Remote RACADM
Telnet/SSH/Serial RACADM
sslcsrgen
NOTE: To use this command, you must have Configure DRAC 5 permission.
Table A-32 describes the sslcsrgen subcommand.
Table A-32. sslcsrgen
Subcommand
Description
sslcsrgen
Synopsis
racadm sslcsrgen [-g] [-f <filename>]
racadm sslcsrgen -s
326
Description
The sslcsrgen subcommand can be used to generate a CSR and download
the file to the clients local file system. The CSR can be used for creating
a custom SSL certificate that can be used for SSL transactions on the RAC.
Options
NOTE: The -f option is not supported for the serial/telnet/ssh console.
Table A-33 describes the sslcsrgen subcommand options.
Table A-33. sslcsrgen Subcommand Options
Option
Description
-g
-s
-f
Specifies the filename of the location, <filename>, where the CSR will
be downloaded.
NOTE: If the -f option is not specified, the filename defaults to sslcsr in your current
directory.
If no options are specified, a CSR is generated and downloaded to the local file
system as sslcsr by default. The -g option cannot be used with the -s option, and
the -f option can only be used with the -g option.
The sslcsrgen -s subcommand returns one of the following status codes:
Restrictions
The sslcsrgen subcommand can only be executed from a local or remote
RACADM client and cannot be used in the serial, telnet, or SSH interface.
NOTE: Before a CSR can be generated, the CSR fields must be configured in the
RACADM cfgRacSecurity group. For example: racadm config -g
cfgRacSecurity -o cfgRacSecCsrCommonName MyCompany
327
Examples
racadm sslcsrgen -s
or
racadm sslcsrgen -g -f c:\csr\csrtest.txt
Supported Interfaces
Local RACADM
Remote RACADM
Telnet/SSH/Serial RACADM
sslcertupload
NOTE: To use this command, you must have Configure DRAC 5 permission.
Table A-34 describes the sslcertupload subcommand.
Table A-34. sslcertupload
Subcommand
Description
sslcertupload
Synopsis
racadm sslcertupload -t <type> [-f <filename>]
Options
Table A-35 describes the sslcertupload subcommand options.
Table A-35. sslcertupload Subcommand Options
Option
Description
-t
-f
328
Restrictions
The sslcertupload subcommand can only be executed from a local or remote
RACADM client. The sslcsrgen subcommand cannot be used in the serial,
telnet, or SSH interface.
Example
racadm sslcertupload -t 1 -f c:\cert\cert.txt
Supported Interfaces
Local RACADM
Remote RACADM
sslcertdownload
NOTE: To use this command, you must have Configure DRAC 5 permission.
Table A-36 describes the sslcertdownload subcommand.
Table A-36. sslcertdownload
Subcommand
Description
sslcertdownload
Synopsis
racadm sslcertdownload -t <type> [-f <filename>]
329
Options
Table A-37 describes the sslcertdownload subcommand options.
Table A-37. sslcertdownload Subcommand Options
Option
Description
-t
-f
Example
racadm sslcertdownload -t 1 -f c:\cert\cert.txt
Supported Interfaces
330
Local RACADM
Remote RACADM
sslcertview
NOTE: To use this command, you must have Configure DRAC 5 permission.
Table A-38 describes the sslcertview subcommand.
Table A-38. sslcertview
Subcommand
Description
sslcertview
Synopsis
racadm sslcertview -t <type> [-A]
Options
Table A-39 describes the sslcertview subcommand options.
Table A-39. sslcertview Subcommand Options
Option
Description
-t
-A
Output Example
racadm sslcertview -t 1
Serial Number
: 00
Subject Information:
Country Code (CC)
State (S)
Locality (L)
Organization (O)
:
:
:
:
US
Texas
Round Rock
Dell Inc.
331
Issuer Information:
Country Code (CC)
State (S)
Locality (L)
Organization (O)
Organizational Unit (OU)
Common Name (CN)
:
:
:
:
:
:
Valid From
Valid To
: Jul
: Jul
racadm sslcertview -t 1 -A
00
US
Texas
Round Rock
Dell Inc.
Remote Access Group
DRAC5 default certificate
US
Texas
Round Rock
Dell Inc.
Remote Access Group
DRAC5 default certificate
Jul 8 16:21:56 2005 GMT
Jul 7 16:21:56 2010 GMT
Supported Interfaces
332
Local RACADM
Remote RACADM
Telnet/SSH/Serial RACADM
RACADM Subcommand Overview
US
Texas
Round Rock
Dell Inc.
Remote Access Group
DRAC5 default certificate
8 16:21:56 2005 GMT
7 16:21:56 2010 GMT
sslkeyupload
NOTE: To use this command, you must have Configure DRAC 5 permission.
Table A-40 describes the sslkeyupload subcommand.
Table A-40. sslkeyupload
Subcommand
Description
sslkeyupload
Synopsis
racadm sslkeyupload -t <type> [-f <filename>]
Options
Table A-41 describes the sslkeyupload subcommand options.
Table A-41. sslkeyupload Subcommand Options
Option
Description
-t
-f
Restrictions
The sslkeyupload subcommand can only be executed from a local or remote
RACADM client. The sslcsrgen subcommand cannot be used in the serial,
telnet, or SSH interface.
Example
racadm sslcertupload -t 1 -f c:\cert\cert.txt
333
Supported Interfaces
Local RACADM
Remote RACADM
sslresetcfg
NOTE: To use this command, you must have Configure DRAC 5 permission.
Table A-42 describes the sslresetcfg subcommand.
Table A-42. sslresetcfg
Subcommand
Description
sslresetcfg
Synopsis
racadm sslresetcfg
Example
$ racadm sslresetcfg
Certificate generated successfully and webserver restarted.
Supported Interfaces
Local RACADM
Remote RACADM
Telnet/SSH/Serial
krbkeytabupload
NOTE: To use this command, you must have Configure DRAC 5 permission.
Table A-43 describes the krbkeytabupload subcommand.
334
Description
krbkeytabupload
Synopsis
racadm krbkeytabupload [-f <filename>]
Options
Table A-44 describes the krbkeytabupload subcommand options.
Table A-44. krbkeytabupload Subcommand Options
Option
Description
-f
Specifies the file name of the keytab to be uploaded. If the file is not
specified, the keytab file in the current directory is selected.
Restrictions
The krbkeytabupload subcommand can only be executed from a local or remote
RACADM client.
Example
racadm krbkeytabupload -f c:\keytab\krbkeytab.tab
Supported Interfaces
Local RACADM
Remote RACADM
335
testemail
Table A-45 describes the testemail subcommand.
Table A-45. testemail configuration
Subcommand
Description
testemail
Synopsis
racadm testemail -i <index>
Description
Sends a test e-mail from the RAC to a specified destination.
Prior to executing the test e-mail command, ensure that the specified index in
the RACADM cfgEmailAlert group is enabled and configured properly.
Table A-46 provides a list and associated commands for the cfgEmailAlert
group.
Table A-46. testemail Configuration
Action
Command
336
Command
Options
Table A-47 describes the testemail subcommand options.
Table A-47. testemail Subcommands
Option
Description
-i
Output
None.
Supported Interfaces
Local RACADM
Remote RACADM
Telnet/SSH/Serial RACADM
testtrap
NOTE: To use this command, you must have Test Alerts permission.
Table A-48 describes the testtrap subcommand.
Table A-48. testtrap
Subcommand
Description
testtrap
Synopsis
racadm testtrap -i <index>
337
Description
The testtrap subcommand tests the RACs SNMP trap alerting feature by
sending a test trap from the RAC to a specified destination trap listener on the
network.
Before you execute the testtrap subcommand, ensure that the specified index in
the RACADM cfgIpmiPet group is configured properly.
Table A-49 provides a list and associated commands for the cfgIpmiPet group.
Table A-49. cfgEmailAlert Commands
Action
Command
Input
Description
-i
Specifies the index of the trap configuration to use for the test Valid
values are from 1 to 4.
Supported Interfaces
338
Local RACADM
Remote RACADM
Telnet/SSH/Serial RACADM
vmdisconnect
NOTE: To use this command, you must have Access Virtual Media permission.
Table A-51 describes the vmdisconnect subcommand.
Table A-51. vmdisconnect
Subcommand
Description
vmdisconnect
Synopsis
racadm vmdisconnect
Description
The vmdisconnect subcommand allows a user to disconnect another user's
virtual media session. Once disconnected, the web-based interface will reflect
the correct connection status. This is available only through the use of local or
remote racadm.
The vmdisconnect subcommand enables a RAC user to disconnect all active
virtual media sessions. The active virtual media sessions can be displayed in the
RAC web-based interface or by using the racadm getsysinfo subcommand.
Supported Interfaces
Local RACADM
Remote RACADM
Telnet/SSH/Serial RACADM
339
vmkey
NOTE: To use this command, you must have Access Virtual Media permission.
Table A-52 describes the vmkey subcommand.
Table A-52. vmkey
Subcommand
Description
vmkey
Synopsis
racadm vmkey <action>
If <action> is configured as reset, the virtual flash memory is reset to
the default size of 16 MB.
Description
When a custom virtual media key image is uploaded to the RAC, the key size
becomes the image size. The vmkey subcommand can be used to reset the key
back to its original default size, which is 16 MB on the DRAC 5.
Supported Interfaces
Local RACADM
Remote RACADM
Telnet/SSH/Serial RACADM
usercertupload
NOTE: To use this command, you must have Configure DRAC 5 permission.
Table A-53 describes the usercertupload subcommand.
Table A-53. usercertupload
Subcommand
Description
usercertupload
340
Synopsis
racadm usercertupload -t <type> [-f <filename>] -i
<index>
Options
Table A-54 describes the usercertupload subcommand options.
Table A-54. usercertupload Subcommand Options
Option
Description
-t
-f
-i
Restrictions
The usercertupload subcommand can only be executed from a local or a remote
RACADM client.
Example
racadm usercertupload -t 1 -f c:\cert\cert.txt -i 6
Supported Interfaces
Local RACADM
Remote RACADM
341
usercertview
NOTE: To use this command, you must have Configure DRAC 5 permission.
Table A-55 describes the usercertview subcommand.
Table A-55. usercertview
Subcommand
Description
usercertview
Synopsis
racadm sslcertview -t <type> [-A] -i <index>
Options
Table A-56 describes the sslcertview subcommand options.
Table A-56. sslcertview Subcommand Options
Option
Description
-t
-A
-i
Supported Interfaces
342
Local RACADM
Remote RACADM
Telnet/SSH/Serial RACADM
localConRedirDisable
NOTE: Only a local racadm user can execute this command.
Table A-57 describes the localConRedirDisable subcommand.
Table A-57. localConRedirDisable
Subcommand
Description
localConRedirDisable
Synopsis
racadm localConRedirDisable <option>
If <option> is set to 1, console redirection is disabled.
Supported Interfaces
Local RACADM
343
344
The DRAC 5 property database contains the configuration information for the
DRAC 5. Data is organized by associated object, and objects are organized by
object group. The IDs for the groups and objects that the property database
supports are listed in this section.
Use the group and object IDs with the racadm utility to configure the DRAC 5.
The following sections describe each object and indicate whether the object is
readable, writable, or both.
All string values are limited to displayable ASCII characters, except where
otherwise noted.
Displayable Characters
Displayable characters include the following set:
abcdefghijklmnopqrstuvwxwz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
0123456789~`!@#$%^&*()_+-={}[]|\:";'<>,.?/
idRacInfo
This group contains display parameters to provide information about the
specifics of the DRAC 5 being queried.
One instance of the group is allowed. The following subsections describe the
objects in this group.
Default
"1.0"
Description
346
Default
DRAC 5
Description
6
Description
cfgLanNetworking
This group contains parameters to configure the DRAC 5 NIC.
One instance of the group is allowed. All changes/updates to the objects in this
group will require the DRAC 5 NIC to be reset, which may cause a brief loss in
connectivity. Objects that change the DRAC 5 NIC IP address settings will close
all active user sessions and require users to reconnect using the updated IP
address settings.
347
cfgDNSDomainNameFromDHCP (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
1 (TRUE)
0 (FALSE)
Default
1
Description
Specifies that the RAC DNS Domain Name should be assigned from the
network DHCP server.
cfgDNSDomainName (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
""
Description
cfgDNSRacName (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
348
Legal Values
rac-service tag
Description
Displays the RAC name, which is rac-service tag (by default). This parameter is
only valid if cfgDNSRegisterRac is set to 1 (TRUE).
cfgDNSRegisterRac (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
1 (TRUE)
0 (FALSE)
Default
0
Description
cfgDNSServersFromDHCP (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
1 (TRUE)
0 (FALSE)
Default
349
Description
Specifies that the DNS server IP addresses should be assigned from the DHCP
server on the network.
cfgDNSServer1 (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
Specifies the IP address for DNS server 1. This property is only valid if
cfgDNSServersFromDHCP is set to 0 (FALSE).
NOTE: cfgDNSServer1 and cfgDNSServer2 may be set to identical values while
swapping addresses.
cfgDNSServer2 (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
0.0.0.0
Description
Retrieves the IP address for DNS server 2. This parameter is only valid if
cfgDNSServersFromDHCP is set to 0 (FALSE).
NOTE: cfgDNSServer1 and cfgDNSServer2 may be set to identical values while
swapping addresses.
cfgNicEnable (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
350
Legal Values
1 (TRUE)
0 (FALSE)
Default
0
Description
Enables or disables the RAC network interface controller. If the NIC is disabled,
the remote network interfaces to the RAC will no longer be accessible, and the
RAC will only be available through the serial or local RACADM interfaces.
cfgNicIpAddress (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission. This
parameter is only configurable if the cfgNicUseDhcp parameter is set to 0 (FALSE).
Legal Values
192.168.0.120
Description
Specifies the static IP address to assign to the RAC. This property is only valid if
cfgNicUseDhcp is set to 0 (FALSE).
cfgNicNetmask (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission. This
parameter is only configurable if the cfgNicUseDhcp parameter is set to 0 (FALSE).
Legal Values
255.255.255.0
DRAC 5 Property Database Group and Object Definitions
351
Description
The subnet mask used for static assignment of the RAC IP address. This
property is only valid if cfgNicUseDhcp is set to 0 (FALSE).
cfgNicGateway (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission. This
parameter is only configurable if the cfgNicUseDhcp parameter is set to 0 (FALSE).
Legal Values
192.168.0.1
Description
The gateway IP address used for static assignment of the RAC IP address. This
property is only valid if cfgNicUseDhcp is set to 0 (FALSE).
cfgNicUseDhcp (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
1 (TRUE)
0 (FALSE)
Default
0
Description
Specifies whether DHCP is used to assign the RAC IP address. If this property is
set to 1 (TRUE), then the RAC IP address, subnet mask, and gateway are
assigned from the DHCP server on the network. If this property is set to 0
(FALSE), the static IP address, subnet mask, and gateway is assigned from the
cfgNicIpAddress, cfgNicNetmask, and cfgNicGateway properties.
NOTE: If you are updating your system remotely, use the setniccfg command.
352
cfgNicSelection (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
0 (shared)
1 (shared with failover)
2 (dedicated)
Default
2
Description
Specifies the current mode of operation for the RAC network interface
controller (NIC). Table B-1 describes the supported modes.
Table B-1. cfgNicSelection Supported Modes
Mode
Description
Shared
Dedicated
The current MAC address of the RAC NIC. For example, "00:12:67:52:51:A3".
353
Description
cfgNicVLanEnable (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
1 (TRUE)
0 (FALSE)
Default
0
Description
cfgNicVLanId (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
0 4094
Default
0
Description
Specifies the VLAN ID for the network VLAN configuration. This property is
only valid if cfgNicVLanEnable is set to 1 (enabled).
cfgNicVLanPriority (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
07
354
Default
0
Description
Specifies the VLAN Priority for the network VLAN configuration. This property
is only valid if cfgNicVLanEnable is set to 1 (enabled).
cfgRemoteHosts
This group provides properties that allow configuration of various remote
components, which include the SMTP server for e-mail alerts and TFTP server
IP addresses for firmware updates.
cfgRhostsSmtpServerIpAddr (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
0.0.0.0
Description
The IP address of the network SMTP server. The SMTP server transmits e-mail
alerts from the RAC if the alerts are configured and enabled.
cfgRhostsFwUpdateTftpEnable (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
1 (TRUE)
0 (FALSE)
355
Default
1
Description
Enables or disables the RAC firmware update from a network TFTP server.
cfgRhostsFwUpdateIpAddr (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
0.0.0.0
Description
Specifies the network TFTP server IP address that is used for TFTP RAC
firmware update operations.
cfgRhostsFwUpdatePath (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
""
Description
Specifies TFTP path where the RAC firmware image file exists on the TFTP
server. The TFTP path is relative to the TFTP root path on the TFTP server.
NOTE: The server may still require you to specify the drive (for example, C).
356
cfgUserAdmin
This group provides configuration information about the users who are allowed
to access the RAC through the available remote interfaces.
Up to 16 instances of the user group are allowed. Each instance represents the
configuration for an individual user.
cfgUserAdminIpmiLanPrivilege (Read/Write)
NOTE: To modify this property, you must have Configure Users permission.
Legal Values
2 (User)
3 (Operator)
4 (Administrator)
15 (No access)
Default
4 (User 2)
15 (All others)
Description
cfgUserAdminIpmiSerialPrivilege (Read/Write)
NOTE: To modify this property, you must have Configure Users permission.
Legal Values
2 (User)
3 (Operator)
4 (Administrator)
15 (No access)
Default
4 (User 2)
DRAC 5 Property Database Group and Object Definitions
357
15 (All others)
Description
cfgUserAdminPrivilege (Read/Write)
NOTE: To modify this property, you must have Configure Users permission.
Legal Values
0x0000000
Description
This property specifies the allowed role-based authority privileges allowed for
the user. The value is represented as a bitmask that allows for any combination
of privilege values. Table B-2 describes the allowed user privileges bit masks.
Table B-2. Bit Masks for User Privileges
User Privilege
Log In To DRAC 5
0x0000001
Configure DRAC 5
0x0000002
Configure Users
0x0000004
Clear Logs
0x0000008
0x0000010
0x0000020
0x0000040
Test Alerts
0x0000080
0x0000100
358
Examples
Table B-3 provides sample privilege bit masks for users with one or more
privileges.
Table B-3. Sample Bit Masks for User Privileges
User Privilege(s)
cfgUserAdminUserName (Read/Write)
NOTE: To modify this property, you must have Configure Users permission.
Legal Values
""
Description
The name of the user for this index. The user index is created by writing a string
into this name field if the index is empty. Writing a string of double quotes ("")
deletes the user at that index. You cannot change the name. You must delete
and then recreate the name. The string must not contain "/" (forward slash, "\"
(backslash), "." (period), "@" ("at" symbol) or quotations marks.
NOTE: This property value MUST be unique from other user instances.
359
""
Description
The password for this user. The user passwords are encrypted and cannot be seen
or displayed after this property is written.
cfgUserAdminEnable
NOTE: To modify this property, you must have Config Users permission.
Legal Values
1 (TRUE)
0 (FALSE)
Default
0
Description
cfgUserAdminSolEnable
NOTE: To modify this property, you must have Config Users permission.
Legal Values
1 (TRUE)
0 (FALSE)
360
Default
0
Description
cfgEmailAlert
This group contains parameters to configure the RAC e-mail alerting
capabilities.
The following subsections describe the objects in this group. Up to four
instances of this group are allowed.
14
Default
cfgEmailAlertEnable (Read/Write)
Legal Values
1 (TRUE)
0 (FALSE)
Default
361
Description
Specifies the destination e-mail address for e-mail alerts. For example,
[email protected].
""
Description
""
Description
cfgSessionManagement
This group contains parameters to configure the number of sessions that can
connect to the DRAC 5.
One instance of the group is allowed. The following subsections describe the
objects in this group.
cfgSsnMgtConsRedirMaxSessions (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
362
Legal Values
12
Default
2
Description
cfgSsnMgtRacadmTimeout (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
10 1920
Default
30
Description
Defines the idle time-out in seconds for the Remote RACADM interface. If a
remote RACADM session remains inactive for more than the specified time, the
session will be closed.
cfgSsnMgtWebserverTimeout (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
60 1920
Default
300
363
Description
Defines the Web server time-out. This property sets the amount of time in
seconds that a connection is allowed to remain idle (there is no user input). The
session is cancelled if the time limit set by this property is reached. Changes to
this setting do not affect the current session (you must log out and log in again
to make the new settings effective).
An expired Web server session logs out the current session.
cfgSsnMgtSshIdleTimeout (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
0 (No time-out)
60 1920
Default
300
Description
Defines the Secure Shell idle time-out. This property sets the amount of time in
seconds that a connection is allowed to remain idle (there is no user input). The
session is cancelled if the time limit set by this property is reached. Changes to
this setting do not affect the current session (you must log out and log in again
to make the new settings effective).
364
An expired Secure Shell session displays the following error message only after
you press <Enter>:
Warning: Session no longer valid, may have timed out
After the message appears, the system returns you to the shell that generated
the Secure Shell session.
cfgSsnMgtTelnetTimeout (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
0 (No timeout)
60 1920
Default
0
Description
Defines the Telnet idle time-out. This property sets the amount of time in
seconds that a connection is allowed to remain idle (there is no user input). The
session is cancelled if the time limit set by this property is reached. Changes to
this setting do not affect the current session (you must log out and log in again
to make the new settings effective).
An expired Telnet session displays the following error message only after you
press <Enter>:
Warning: Session no longer valid, may have timed out
After the message appears, the system returns you to the shell that generated
the Telnet session.
cfgSerial
This group contains configuration parameters for the DRAC 5 serial port.
One instance of the group is allowed. The following subsections describe the
objects in this group.
365
cfgSerialBaudRate (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
57600
Description
cfgSerialConsoleEnable (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
1 (TRUE)
0 (FALSE)
Default
0
Description
cfgSerialConsoleQuitKey (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
STRING
MaxLen = 2
366
Default
^\ (<Ctrl><\>)
NOTE: The "^" is the <Ctrl> key.
Description
This key or key combination terminates text console redirection when using the
connect com2 command. The cfgSerialConsoleQuitKey value can be
represented by:
cfgSerialConsoleIdleTimeout (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
0 = No time-out
60 1920
Default
300
Description
367
cfgSerialConsoleNoAuth (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
0
Description
cfgSerialConsoleCommand (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Description
Specifies a serial command that is executed after a user logs into the serial
console interface.
Default
""
Example
"connect com2"
cfgSerialHistorySize (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
0 8192
Default
8192
368
Description
cfgSerialSshEnable (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
1 (TRUE)
0 (FALSE)
Default
1
Description
cfgSerialTelnetEnable (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
1 (TRUE)
0 (FALSE)
Default
0
Description
cfgSerialCom2RedirEnable (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Default
1
DRAC 5 Property Database Group and Object Definitions
369
Legal Values
1 (TRUE)
0 (FALSE)
Description
cfgNetTuning
This group enables users to configure the advanced network interface
parameters for the RAC NIC. When configured, the updated settings may take
up to a minute to become active.
CAUTION: Use extra precaution when modifying properties in this group.
Inappropriate modification of the properties in this group can result in your RAC
NIC become inoperable.
cfgNetTuningNicAutoneg (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
1 (Enabled)
0 (Disabled)
Default
1
Description
370
cfgNetTuningNic100MB (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
0 (10 MBit)
1 (100 MBit)
Default
1
Description
Specifies the speed to use for the RAC NIC. This property is not used if the
cfgNetTuningNicAutoNeg is set to 1 (enabled).
cfgNetTuningNicFullDuplex (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
0 (Half Duplex)
1 (Full Duplex)
Default
1
Description
Specifies the duplex setting for the RAC NIC. This property is not used if the
cfgNetTuningNicAutoNeg is set to 1 (enabled).
cfgNetTuningNicMtu (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
576 1500
371
Default
1500
Description
The size in bytes of the maximum transmission unit used by the DRAC 5 NIC.
cfgNetTuningTcpSrttDflt (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
6 384
Default
6
Description
The smoothed round trip time-out base default value for TCP retransmission
round trip time in second units. (Type hexadecimal values.)
cfgOobSnmp
The group contains parameters to configure the SNMP agent and trap
capabilities of the DRAC 5.
One instance of the group is allowed. The following subsections describe the
objects in this group.
cfgOobSnmpAgentCommunity (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
public
372
Description
cfgOobSnmpAgentEnable (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
1 (TRUE)
0 (FALSE)
Default
0
Description
cfgRacTuning
This group is used to configure various RAC configuration properties, such as
valid ports and security port restrictions.
cfgRacTunePluginType
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
0
Description
373
cfgRacTuneHttpPort (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
10 65535
Default
80
Description
Specifies the port number to use for HTTP network communication with the
RAC.
cfgRacTuneHttpsPort (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
10 65535
Default
443
Description
Specifies the port number to use for HTTPS network communication with the
RAC.
cfgRacTuneIpRangeEnable
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
1 (TRUE)
0 (FALSE)
374
Default
0
Description
cfgRacTuneIpRangeAddr
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
192.168.1.1
Description
cfgRacTuneIpRangeMask
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
255.255.255.0
Description
cfgRacTuneIpBlkEnable
NOTE: To modify this property, you must have Configure DRAC 5 permission.
375
Legal Values
1 (TRUE)
0 (FALSE)
Default
0
Description
cfgRacTuneIpBlkFailcount
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
2 16
Default
5
Description
The maximum number of login failure to occur within the window before the
login attempts from the IP address are rejected.
cfgRacTuneIpBlkFailWindow
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
2 65535
Default
60
Description
Defines the timespan in seconds that the failed attempts are counted. When
the failure attempts age to this limit, the failures are dropped from the count.
376
cfgRacTuneIpBlkPenaltyTime
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
2 65535
Default
300
Description
Defines the timespan in seconds that session requests from an IP address with
excessive failures are rejected.
cfgRacTuneSshPort (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
1 65535
Default
22
Description
Specifies the port number used for the RAC SSH interface.
cfgRacTuneTelnetPort (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
1 65535
Default
23
377
Description
Specifies the port number used for the RAC telnet interface.
cfgRacTuneRemoteRacadmEnable (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
1 (TRUE)
0 (FALSE)
Default
1
Description
cfgRacTuneConRedirEncryptEnable (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
1 (TRUE)
0 (FALSE)
Default
0
Description
cfgRacTuneConRedirPort (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
1 65535
378
Default
5901
Description
Specifies the port to be used for keyboard and mouse traffic during Console
Redirection activity with the RAC.
NOTE: This object requires a DRAC 5 reset before it becomes active.
cfgRacTuneConRedirVideoPort (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
1 65535
Default
5901
Description
Specifies the port to be used for video traffic during Console Redirection
activity with the RAC.
NOTE: This object requires a DRAC 5 reset before it becomes active.
cfgRacTuneAsrEnable (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
0 (FALSE)
1 (TRUE)
Default
1
Description
379
cfgRacTuneDaylightOffset (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
0 60
Default
0
Description
Specifies the daylight savings offset (in minutes) to use for the RAC Time.
cfgRacTuneTimezoneOffset (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
-720 780
Default
0
Description
Specifies the timezone offset (in minutes) from GMT/UTC to use for the RAC
Time. Some common timezone offsets for timezones in the United States are
shown below:
-480 (PST Pacific Standard Time)
-420 (MST Mountain Standard Time)
-360 (CST Central Standard Time)
-300 (EST Eastern Standard Time)
cfgRacTuneWebserverEnable (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
380
Legal Values
0 (FALSE)
1 (TRUE)
Default
1
Description
Enables and disables the RAC Web server. If this property is disabled, the RAC
will not be accessible using client Web browsers or remote RACADM. This
property has no effect on the telnet/ssh/serial or local RACADM interfaces.
cfgRacTuneLocalServerVideo (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
1 (Enables)
0 (Disables)
Default
1
Description
Enables (switches ON) or disables (switches OFF) the local server video.
cfgRacTuneLocalConfigDisable
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
1 (TRUE)
0 (FALSE)
Default
0
DRAC 5 Property Database Group and Object Definitions
381
Description
Enables or disables the ability of a local user to configure the DRAC 5 using
local racadm or the Dell OpenManage Server Administrator Utilities.
cfgRacTuneCtrlEConfigDisable
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
1 (TRUE)
0 (FALSE)
Default
0
Description
Enables or disables the ability to disable the ability of the local user to configure
the DRAC 5 from the BIOS POST option-ROM.
cfgRacTuneVirtualConsoleAuthorizeMultipleSessions (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission. This
object can be used only with remote or firmware (SSH or Telnet) RACADM and not
with local RACADM or with earlier DRAC products.
Legal Values
0 (If the user of the first session has not responded for session sharing request by
subsequent user, the next session user gets an access denied error after the
default timeout value of 30 seconds.)
1(If the user of the first session has not responded for session sharing request by
subsequent user, the next session user gets a read only access after the default
timeout value of 30 seconds.)
2 (If the user of the first session has not responded for session sharing request by
subsequent user, the next session user gets administrator access after default
timeout value of 30 seconds.)
382
Default
0
Description
If a first user is already using the Virtual Console, the value of this object effects
the privileges granted to the subsequent users shared request after the timeout
of 30 seconds.
ifcRacManagedNodeOs
This group contains properties that describe the Managed Server operating
system.
One instance of the group is allowed. The following subsections describe the
objects in this group.
ifcRacMnOsHostname (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
""
Description
ifcRacMnOsOsName (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
""
DRAC 5 Property Database Group and Object Definitions
383
Description
cfgRacSecurity
This group is used to configure settings related to the RAC SSL certificate
signing request (CSR) feature. The properties in this group MUST be
configured prior to generating a CSR from the RAC.
See the RACADM sslcsrgen subcommand details for more information on
generating certificate signing requests.
cfgRacSecCsrCommonName (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
""
Description
cfgRacSecCsrOrganizationName (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
""
Description
384
cfgRacSecCsrOrganizationUnit (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
""
Description
cfgRacSecCsrLocalityName (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
""
Description
cfgRacSecCsrStateName (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
""
Description
385
cfgRacSecCsrCountryCode (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
""
Description
cfgRacSecCsrEmailAddr (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
""
Description
cfgRacSecCsrKeySize (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
1024
2048
4096
Default
1024
386
Description
cfgRacVirtual
This group contains parameters to configure the DRAC 5 Virtual Media feature.
One instance of the group is allowed. The following subsections describe the
objects in this group.
cfgVirMediaAttached (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
1 (TRUE)
0 (FALSE)
Default
0
Description
This object is used to attach your virtual devices to the system via the USB bus.
When the devices are attached the server will recognize valid USB Mass Storage
devices attached to the system. This is equivalent to attaching a local USB
CDROM/Floppy drive to a USB port on the system. When the devices are
attached you then can connect to the virtual devices remotely using DRAC5
web-based interface or the CLI. Setting this object to 0 will cause the devices to
detach from the USB bus.
NOTE: You must restart your system to enable all changes.
cfgVirAtapiSvrPort (Read/Write)
NOTE: To modify this property, you must have Access Virtual Media permission.
Legal Values
1 65535
387
Default
3669
Description
Specifies the port number used for encrypted virtual media connections to the
RAC.
cfgVirAtapiSvrPortSsl (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
3669
Description
388
cfgVirMediaKeyEnable (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
1 (TRUE)
0 (FALSE)
Default
0
Description
cfgVirMediaPluginTypr (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
1 (Java Plug-in)
0 (Native Plug-in)
Default
0
Description
cfgVirtualBootOnce (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
389
0
Description
Sets the boot once device. If this property is set to a supported device and the
host system is rebooted, the system attempts to boot from the selected device
if the appropriate media is installed in the device.
NOTE: To enable the Boot Once feature for the Virtual Flash device, go to the BIOS
Setup and manually change the boot order during system reboot.
NOTE: Boot once devices other than Virtual Flash (1), PXE (4), and Disable (0) are
supported only on some systems with supported BIOS and Baseboard Management
Controller (BMC) firmware versions. See the Dell website at www.dell.com to check
if your system supports all the boot once devices.
NOTE: On systems not supporting Virtual Floppy and Virtual CD/DVD/ISO, use '1'
(Virtual Flash/Virtual Media) to perform the Boot Once either to Virtual Floppy, or
Virtual CD/DVD/ISO or Virtual Flash. In this case, set the required virtual device as
the first boot device in the BIOS Setup. DRAC 5 automatically disconnects this
device once the system reboots to the device, and another reboot is applied to the
system.
NOTE: On systems supporting Virtual Floppy and Virtual CD/DVD/ISO as separate
options, DRAC 5 does not automatically disconnect or detach the virtual media
connection after Boot Once.
cfgFloppyEmulation (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
390
Legal Values
1 (True)
0 (False)
Default
0
Description
cfgActiveDirectory
This group contains parameters to configure the DRAC 5 Active Directory
feature.
cfgADRacDomain (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
Any printable text string with no white space. Length is limited to 254
characters.
Default
""
Description
cfgADRacName (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
391
Legal Values
Any printable text string with no white space. Length is limited to 254
characters.
Default
""
Description
cfgADEnable (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
1 (TRUE)
0 (FALSE)
Default
0
Description
cfgADSpecifyServerEnable (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
1 or 0 (True or False)
Default
392
Description
cfgADDomainController (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
No default values
Description
DRAC 5 uses the value you specify, to search the LDAP server for user names.
cfgADGlobalCatalog (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
No default values
Description
DRAC 5 uses the value you specify, to search the Global Catalog server for user
names.
cfgAODomain (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
393
Format
<domain>:<IP or FQDN>
Default
No default values
Description
DRAC 5 uses the value you specify, to search the Association Object for user
names.
cfgADSmartCardLogonEnable (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
1 (TRUE)
0 (FALSE)
Default
0
Description
cfgADCRLEnable (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
1 (TRUE)
0 (FALSE)
Default
394
Description
Enables or disables the Certificate Revocation List (CRL) check for Active
Directory-based Smart Card users.
cfgADAuthTimeout (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
15 300
Default
120
Description
cfgADRootDomain (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
Any printable text string with no white space. Length is limited to 254
characters.
Default
""
Description
cfgADType (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
395
1 = Extended Schema
Description
cfgADSSOEnable (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
1 (TRUE)
0 (FALSE)
Default
0
Description
cfgStandardSchema
This group contains parameters to configure the Standard Schema settings.
Integer from 1 to 5.
Description
cfgSSADRoleGroupName (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
396
Legal Values
Any printable text string with no white space. Length is limited to 254
characters.
Default
(blank)
Description
cfgSSADRoleGroupDomain (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
(blank)
Description
cfgSSADRoleGroupPrivilege (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
0x00000000 to 0x000001ff
Default
(blank)
Description
Use the bit mask numbers in Table B-4 to set role-based authority privileges for
a Role Group.
397
Bit Mask
Log In To DRAC 5
0x00000001
Configure DRAC 5
0x00000002
Configure Users
0x00000004
Clear Logs
0x00000008
0x00000010
0x00000020
0x00000040
Test Alerts
0x00000080
0x00000100
cfgIpmiSerial
This group specifies properties used to configure the IPMI serial interface of the
BMC.
cfgIpmiSerialConnectionMode (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
0 (Terminal)
1 (Basic)
Default
1
Description
398
In Basic mode, the port uses binary data with the intent of communicating with
an application program on the serial client. In Terminal mode, the port assumes
that a dumb ASCII terminal is connected and allows very simple commands to
be entered.
cfgIpmiSerialBaudRate (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
57600
Description
cfgIpmiSerialChanPrivLimit (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
2 (User)
3 (Operator)
4 (Administrator)
Default
4
Description
Specifies the maximum privilege level allowed on the IPMI serial channel.
cfgIpmiSerialFlowControl (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
399
Legal Values
0 (None)
1 (CTS/RTS)
2 (XON/XOFF)
Default
1
Description
Specifies the flow control setting for the IPMI serial port.
cfgIpmiSerialHandshakeControl (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
0 (FALSE)
1 (TRUE)
Default
1
Description
cfgIpmiSerialLineEdit (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
0 (FALSE)
1 (TRUE)
Default
400
Description
cfgIpmiSerialEchoControl (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
0 (FALSE)
1 (TRUE)
Default
1
Description
cfgIpmiSerialDeleteControl (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
0 (FALSE)
1 (TRUE)
Default
0
Description
cfgIpmiSerialNewLineSequence (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
0 (None)
DRAC 5 Property Database Group and Object Definitions
401
1 (CR-LF)
2 (NULL)
3 (<CR>)
4 (<LF-CR>)
5 (<LF>)
Default
1
Description
Specifies the newline sequence specification for the IPMI serial interface.
cfgIpmiSerialInputNewLineSequence (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
0 (<ENTER>)
1 (NULL)
Default
1
Description
Specifies the input newline sequence specification for the IPMI serial interface.
cfgIpmiSol
This group is used to configure the Serial-Over-LAN capabilities of the system.
cfgIpmiSolEnable (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
0 (FALSE)
402
1 (TRUE)
Default
1
Description
cfgIpmiSolBaudRate (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
57600
Description
cfgIpmiSolMinPrivilege (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
2 (User)
3 (Operator)
4 (Administrator)
Default
4
Description
Specifies the minimum privilege level required for serial over LAN access.
403
cfgIpmiSolAccumulateInterval (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
1 255.
Default
10
Description
Specifies the typical amount of time that the BMC waits before transmitting a
partial SOL character data packet. This value is 1-based 5ms increments.
cfgIpmiSolSendThreshold (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
1 255
Default
255
Description
cfgIpmiLan
This group is used to configure the IPMI-Over-LAN capabilities of the system.
cfgIpmiLanEnable (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
0 (FALSE)
1 (TRUE)
404
Default
1
Description
cfgIpmiLanPrivLimit (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
2 (User)
3 (Operator)
4 (Administrator)
Default
0
Description
Specifies the maximum privilege level allowed for IPMI over LAN access.
cfgIpmiLanAlertEnable (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
0 (FALSE)
1 (TRUE)
Default
1
Description
Enables or disables global e-mail alerting. This property overrides all individual
e-mail alerting enable/disable properties.
405
cfgIpmiEncryptionKey (Read/Write)
NOTE: To view or modify this property, you must have Configure DRAC 5 permission
and administrator privileges.
Legal Values
"00000000000000000000"
Description
cfgIpmiPetCommunityName (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
A string up to 18 characters.
Default
"public"
Description
cfgIpmiPef
This group is used to configure the platform event filters available on the
managed server.
The event filters can be used to control policy related to actions that are
triggered when critical events occur on the managed system.
406
1 17
Default
cfgIpmiPefAction (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
0 (None)
1 (Power Down)
2 (Reset)
3 (Power Cycle)
Default
407
Description
Specifies the action that is performed on the managed system when the alert is
triggered.
cfgIpmiPefEnable (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
0 (FALSE)
1 (TRUE)
Default
1
Description
cfgIpmiPet
This group is used to configure platform event traps on the managed system.
cfgIpmiPetIndex (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
14
Default
cfgIpmiPetAlertDestIpAddr (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
408
Legal Values
0.0.0.0
Description
Specifies the destination IP address for the trap receiver on the network.
The trap receiver receives an SNMP trap when an event is triggered on the
managed system.
cfgIpmiPetAlertEnable (Read/Write)
NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values
0 (FALSE)
1 (TRUE)
Default
1
Description
cfgLogging
This group is used to enable or disable the OEM event log filtering.
cfgLoggingSELOEMEventFilterEnable (Read/Write)
Legal Values
409
Default
0
Description
410
Telnet/SSH/Serial
Local RACADM
Remote RACADM
arp
clearasrscreen
clrraclog
clrsel
coredump
coredumpdelete
fwupdate
getconfig
getniccfg
getraclog
getractime
getsel
getssninfo
getsvctag
getsysinfo
gettracelog
help
411
Telnet/SSH/Serial
ifconfig
netstat
ping
racdump
racreset
racresetcfg
serveraction
setniccfg
sslcertdownload
sslcertupload
sslcertview
sslcsrgen
sslkeyupload
sslresetcfg
testemail
testtrap
vmdisconnect
vmkey
usercertupload
usercertview
localConRedirDisable
= Supported;
412
=Not supported
Local RACADM
Remote RACADM
Index
A
Active Directory
adding DRAC 5 users, 124
configuring access to the DRAC
5, 117
extending schemas, 117
logging in to the DRAC 5, 142
objects, 113
schema extensions, 112
using with extended schema, 112
using with standard schema, 106
using with the DRAC 5, 105
B
BIOS setup
configuring on a managed
system, 51
C
Certificate Signing Request
(CSR)
about, 216
generating a new certificate, 218
certificates
D
DRAC 5
accessing through a network, 73
adding and configuring users, 95
configuring, 38, 109, 126
configuring network settings, 72
configuring properties, 47
configuring the NIC, 75
creating a configuration file, 85
downloading firmware, 41
enabling security options, 225
Index
413
enabling serial/telnet/ssh
console, 57
securing communications, 215
updating the firmware, 40
E
e-mail alerts
configuring, 263
configuring using RACADM
CLI, 264
configuring using the web user
interface, 263
enabling
single sign-on, 151
example
see sample
extended schema
using with Active Directory, 112
F
features
DRAC 5, 29
DRAC 5 hardware, 26
firmware
downloading, 41
updating, 40
frequently asked questions
managing and recovering a remote
system, 92
using console redirection, 173
414
Index
hardware
installing, 35
hardware specifications, 26
connectors, 26
DRAC 5 ports, 27
power requirements, 26
I
IP blocking
about, 228
enabling, 229
IPMI
configuring, 61, 267
configuring using the RACADM
CLI, 270
configuring using the Web-based
interface, 267
IpRange
about, 225
enabling, 226
K
kerberos authentication, 147
prerequisites, 147
network properties
configuring manually, 90
configuring using racadm, 90
Linux XTerm
configuring for telnet console
redirection, 68
logs
operating system boot, 283
POST, 283
M
managed system
accessing through the local serial
port, 64
capturing the last crash
screen, 257
configuring BIOS setup, 51
enabling serial or telnet
console, 50
installing software, 38
management station
configuring, 162
configuring a Red Hat Enterprise
Linux management
station, 39
configuring terminal
emulation, 65
installing and removing
RACADM, 40
installing the software, 39
mouse pointer
synchronizing, 172
P
parsing rules, 87
PEF
configuring, 259
configuring using RACACM
CLI, 260
configuring using the web user
interface, 259
PET
configuring, 261
configuring using RACADM
CLI, 262
configuring using the web user
interface, 261
platform events
configuring, 258
prerequisites
setting up kerberos
authentication, 147
Index
415
R
RAC serial
configuring, 61
RAC serial interface
about, 51
RACADM
attaching virtual media, 191
configuring serial and telnet, 58
installing and removing, 40
supported interfaces, 411
RACADM CLI
416
Index
testtrap, 337
usercertupload, 340
userertview, 342
vmdisconnect, 339
vmkey, 340
racadm utility
configuring network
properties, 90
parsing rules, 87
subcommands, 295
reboot option
disabling, 258
Red Hat Enterprise Linux
configuring for serial console
redirection, 52
serial mode
configuring, 61
Serial Over LAN (SOL)
configuring, 275
server certificate
uploading, 219
viewing, 220
Server Management Command
Line Protocol (SM-CLP)
about, 233
support, 233
services
configuring, 221
Single Sign-On, 143
single sign-on
configuring the DRAC 5, 151
logging into the DRAC 5, 152
prerequisites, 151
snap-in
installing the Dell extension, 123
software
configuring, 37
installing, 37
Specify Server, 131
sslcertdownload, 329
standard schema
using with Active Directory, 106
system
configuring to use a DRAC 5, 36
Index
417
T
telnet console
using, 70
terminal mode
configuring, 61, 63
usercertupload, 340
web browser
configuring, 43
V
video viewer
accessing the viewer menu
bar, 168
using, 167
virtual flash
configuring, 195
disabling, 194
enabling, 194
using, 194
virtual media
about, 183
attaching, 190
booting, 192
detaching, 190
installing the operating
system, 193
installing the plug-in, 185
running, 186
supported configurations, 186
VM-CLI
about, 196
418
Index