Release Notes
Release 1.42
• Federal Information Processing Standards (FIPS) certied. Certication Number: #2861. For details, see www.csrc.nist.gov/
groups/STM/cmvp/documents/140-1/140val-all.htm#2861
Release 1.41
• Updated the OpenSSL open source package to version 1.0.2j.
Release 1.40
• Federal Information Processing Standards (FIPS) 140-2 cryptography capability.
• Disabling AC Power Recovery.
• Performing racresetcfg from CMC GUI.
• Updating the OpenSSL open source package to version 1.0.2f.
• Updating the OpenSSH open source package to version 7.1p1.
• Updating glibc to version 2.23 to address new security vulnerabilities.
• TLS 1.2 and TLS 1.1 by default.
• User conguration option to enable TLS 1.0 using RACADM.
• SNMPv3 conguration only in RACADM.
• Querying the health status of the chassis components using WSMan.
• Initiating Quick Deploy of blade through RACADM.
• Conguring CMC using WSMan for the following features:
– Host Name of Chassis
– IP Conguration
– DNS
– DNS Registration
– NTP
– Change Default Password
• Sending alerts when the power state of an IOM changes and when a power ON of IOM fails.
• Populating CMC Device name correctly in the inventory.
Release 1.32
• Quick link to the Dell Tech Center from CMC Web GUI.
Release 1.30
• Firmware and driver refresh of COMMs cards on Dell's 13th generation of PowerEdge servers.
• Capture and replicate chassis congurations through XML, based on the Chassis Conguration Prole.
• Support for blinking server identication LED from Quick Link on the Homepage.
• Backup or restore through XML, based on the Chassis Conguration Prole.
• Create and deploy a library of Boot Identity Proles (boot from iSCSI/SAN congurations) to enable quick restore of workload to a
spare server.
• Populate iDRAC DNS setting from the CMC Quick Deploy page.
• Display iDRAC DNS name as the slot name.
• Option to view iDRAC LCLog results directly in CMC after applying a Server Conguration Prole.
• Support for Secure IOM mode. Secure IOM provides additional CMC security to support IOMs running in UC-APL secured
environments.
10
What is New