Users Guide

Launch point for the Integrated Dell Remote Access Controller (iDRAC) Web interface.
Support for WS-Management.
FlexAddress feature — Replaces the factory-assigned World Wide Name/Media Access Control (WWN/
MAC) IDs with chassis-assigned WWN/MAC IDs for a particular slot, an optional upgrade.
iDRAC IO Identity feature support for enhanced WWN/MAC Address Inventory.
Graphical display of chassis component status and health.
Support for single and multi-slot servers.
LCD iDRAC configuration wizard support for iDRAC network configuration.
iDRAC single sign-on.
Network time protocol (NTP) support.
Enhanced server summary, power reporting, and power control pages.
Forced CMC failover and virtual reseat of servers.
iDRAC reset without rebooting the operating system.
Support for storage array configuration using RACADM — Allows you to configure IP, join or create
group, and select fabric for storage arrays using RACADM.
Multi-chassis management:
capability to view up to eight group member chassis from the lead chassis.
capability to select chassis configuration properties from lead chassis and push to Group
members.
capability for Group members to keep their chassis settings synchronized with the lead chassis.
Support to save server settings and configuration information to hard disk and restore to same or
different server.
Security Features
CMC provides the following security features:
Password-level security management — Prevents unauthorized access to a remote system.
Centralized user authentication through:
Active Directory using Standard Schema or an Extended Schema (optional.)
Hardware-stored user IDs and passwords.
Role-based authority — Enables an administrator to configure specific privileges for each user.
User ID and password configuration through the Web interface.
NOTE: Web interface supports 128-bit SSL 3.0 encryption and 40-bit SSL 3.0 encryption (for
countries where 128-bit is not acceptable).
NOTE: Telnet does not support SSL encryption.
Configurable IP ports (if applicable).
Login failure limits per IP address, with login blocking from the IP address when the limit is exceeded.
Configurable session auto time out, and more than one simultaneous sessions.
Limited IP address range for clients connecting to CMC.
Secure Shell (SSH), which uses an encrypted layer for higher security.
Single Sign-on, Two-Factor Authentication, and Public Key Authentication.
17