Users Guide

Web GUI
RACADM
WSMan
SSH v2
SMTP
Kerberos
NTP Client
NFS
NOTE: SNMP is not FIPS-compliant. In FIPS mode, all SNMP features except Message Digest algorithm version 5
(MD5) authentication work.
Enabling FIPS Mode Using CMC Web Interface
To enable FIPS:
1. In the left pane, click Chassis Overview.
The Chassis Health page is displayed.
2. On the menu bar, click Network.
The Network Conguration page is displayed.
3. Under the Federal Information Processing Standards (FIPS) section, from the FIPS Mode drop-down menu, select Enabled.
A message is displayed that enabling FIPS resets CMC to the default settings.
4. Click OK to proceed.
Enabling FIPS Mode Using RACADM
To enable FIPS mode, run the following command:
racadm config –g cfgRacTuning –o cfgRacTuneFipsModeEnable 1
.
Disabling FIPS Mode
To disable FIPS mode, reset CMC to the default factory settings.
Conguring Services
You can congure and enable the following services on CMC:
CMC Serial console — Enable access to CMC using the serial console.
Web Server — Enable access to CMC Web interface. If you disable the option, use local RACADM to re-enable the Web Server,
since disabling the Web Server also disables remote RACADM.
SSH — Enable access to CMC through rmware RACADM.
Telnet — Enable access to CMC through rmware RACADM
RACADM — Enable access to CMC using RACADM.
SNMP — Enable CMC to send SNMP traps for events.
Remote Syslog — Enable CMC to log events to a remote server.
NOTE: When modifying CMC service port numbers for SSH, Telnet, HTTP, or HTTPS, avoid using ports commonly used
by OS services such as port 111. See Internet Assigned Numbers Authority (IANA) reserved ports at http://
www.iana.org/assignments/service-names-port-numbers/service-names-port-numbers.xhtml.
CMC includes a Web server that is congured to use the industry-standard SSL security protocol to accept and transfer encrypted
data from and to clients over the Internet. The Web server includes a Dell self-signed SSL digital certicate (Server ID) and is
responsible for accepting and responding to secure HTTP requests from clients. This service is required by the Web interface and
remote RACADM CLI tool for communicating with CMC.
75