Dell™ Remote Access Controller 5 Firmware Version 1.0 User’s Guide w w w. d e l l . c o m | s u p p o r t . d e l l .
Notes, Notices, and Cautions NOTE: A NOTE indicates important information that helps you make better use of your computer. NOTICE: A NOTICE indicates either potential damage to hardware or loss of data and tells you how to avoid the problem. CAUTION: A CAUTION indicates potential for property damage, personal injury, or death ____________________ Information in this document is subject to change without notice. © 2006 Dell Inc. All rights reserved.
Contents 1 DRAC 5 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . What’s New in DRAC 5 in this Release? . . . . . . . . . . . . . . . . . . . . . 17 . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 Hardware Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 Power Requirements Connectors . . . . . DRAC 5 Ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Installing the Software on the Management Station . . . . . . . . . . . . . . Configuring Your Red Hat Enterprise Linux (Version 4) Management Station . . . . . . . . . . . . . . . . . . . . . . . . . Installing and Removing RACADM on a Linux Management Station Installing RACADM . . . . . . . . . . . . . . . . . . . . . . . . . . Configuring a Supported Web Browser . . . . 29 30 30 . . . . . . . . . . . . . . . . . . . . 30 Configuring Your Web Browser to Connect to the Web-Based Interface . . . . .
Using the Remote Access Serial Interface . . . . . . . . . . . . Configuring Linux for Serial Console Redirection During Boot . . Enabling Login to the Console After Boot . . . . . . . . . . . . Enabling the DRAC 5 Serial/Telnet/SSH Console . . . . . . . . . Using the RACADM Command to Configure the Settings for the Serial and Telnet Console . . . . . . . . . . . . . . . . . . . . . Using the Secure Shell (SSH) . . . . . 46 47 49 51 . . . . . 52 . . . . . . . . . . . . . . . . . . . . . . . . . .
Securing DRAC 5 Communications Using SSL and Digital Certificates . . . . 76 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76 76 77 78 79 79 . . . . . . . . . . . . . . . . . . . . 80 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80 81 . . . . . . . . . . . . . . . . . . . . . . . . . . 82 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84 Secure Sockets Layer (SSL) . . . . . . . . . . Certificate Signing Request (CSR) . . . . . . .
6 Using the DRAC 5 With Microsoft Active Directory . Active Directory Schema Extensions . . . . . 99 . . . . . . . . . . . . . . . . . . . . . . 99 . . . . . . . . . . . . . . . . . . 100 . . . . . . . . . . . . . . . . . . . . . . 100 Overview of the RAC Schema Extensions . Active Directory Object Overview . . . . . . . . . . . . 104 . . . . . . . . . . . . . . . . . . . 104 . . . . . . . . . . . . . . . . . . . . .
Using the Video Viewer . . . . . . . . . . . . . . . . . . . . . . . . . . . . Frequently Asked Questions . 8 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Using and Configuring Virtual Media . Overview . . . . . . . . . . . . . . . 131 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using the RACADM Command Line Interface . . . . . . . . . 145 . . . . . . . . . . . . . . . . . . . . . . . 145 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145 145 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146 Using a Serial or Telnet Console Logging into the DRAC 5 Starting a Text Console . Using RACADM. . . . . . . . . 146 147 147 147 148 149 . . . . . . . . . . . . . . . . . . . . . 149 Using RACADM Remotely. .
Preparing for Deployment . . . . . . . . . . . . . . . . . . . . . . . . . . . Deploying the Operating System. 160 . . . . . . . . . . . . . . . . . . . . . . . 161 11 Using the DRAC 5 SM-CLP Command Line Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163 . . . . . . . . . . . . . . . . . . . . . . . . . . . 163 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163 DRAC 5 SM-CLP Support . SM-CLP Features .
ping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192 setniccfg . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192 getniccfg . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193 getsvctag . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194 racdump . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195 racreset. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
idRacBuildInfo (Read Only) . idRacName (Read Only) . . idRacType (Read Only) . . . cfgLanNetworking . . . . . . . . . . . . . . . . . . . . . . . . 214 214 215 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . cfgDNSDomainNameFromDHCP (Read/Write) . cfgDNSDomainName (Read/Write). . . . . . . cfgDNSRacName (Read/Write) . . . . . . . . . cfgDNSRegisterRac (Read/Write) . . . . . . .
cfgEmailAlertAddress (Read Only) . . cfgEmailAlertCustomMsg (Read Only) cfgSessionManagement . . . . . . . . . . . . . . . . . . . 228 228 . . . . . . . . . . . . . . . . . . . . . . . . . . . 228 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228 229 229 229 230 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230 cfgSsnMgtConsRedirMaxSessions (Read/Write) cfgSsnMgtRacadmTimeout (Read/Write) . . . . cfgSsnMgtWebserverTimeout (Read/Write) . . .
cfgRacTuneIpBlkPenaltyTime . . . . . . . . . . . cfgRacTuneSshPort (Read/Write) . . . . . . . . . cfgRacTuneTelnetPort (Read/Write) . . . . . . . . cfgRacTuneRemoteRacadmEnable (Read/Write) . cfgRacTuneConRedirEncryptEnable (Read/Write) . cfgRacTuneConRedirPort (Read/Write) . . . . . . cfgRacTuneConRedirVideoPort (Read/Write) . . . cfgRacTuneAsrEnable (Read/Write) . . . . . . . . cfgRacTuneDaylightOffset (Read/Write) . . . . . . cfgRacTuneTimezoneOffset (Read/Write) . . . . .
cfgIpmiSerial . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . cfgIpmiSol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 254 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
C Supported RACADM Interfaces . . . . . . . . . . . . . . . . . . 261 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269 Glossary Index .
DRAC 5 Overview The Dell™ Remote Access Controller 5 (DRAC 5) is a systems management hardware and software solution designed to provide remote management capabilities, crashed system recovery, and power control functions for Dell PowerEdge™ systems. By communicating with the system’s baseboard management controller (BMC), the DRAC 5 (when installed) can be configured to send you email alerts for warnings or errors related to voltages, temperatures, intrusion, and fan speeds.
Figure 1-1. DRAC 5 Hardware Features 44-pin MII cable connector 50-pin management cable connector RJ-45 Connector Hardware Specifications Power Requirements Table 1-1 lists the power requirements for the DRAC 5. Table 1-1. DRAC 5 Power Requirements System Power 1.2 A on +3.3 V AUX (maximum) 550 mA on +3.
Using the management and MII cables, you can configure your DRAC in three separate modes, depending on your needs. See "DRAC Modes" in "Using the RACADM Command Line Interface" for more information. DRAC 5 Ports Table 1-2 identifies the ports used by the DRAC 5 that listen for a server connection. Table 1-3 identifies the ports that the DRAC 5 uses as a client. This information is required when opening firewalls for remote access to a DRAC 5. Table 1-2.
Supported Remote Access Connections Table 1-4 lists the connection features. Table 1-4.
• 2900 • 2950 See the Dell PowerEdge Compatibility Guide located on the Dell Support website at support.dell.com for the latest supported platforms. Supported Operating Systems Table 1-5 lists the operating systems that support the DRAC 5. See the Dell OpenManage™ Server Administrator Compatibility Guide located on the Dell Support website at support.dell.com for the latest information. Table 1-5.
Table 1-6. Supported Web Browsers Operating System Supported Web Browser Microsoft Windows Internet Explorer 6.0 (32-bit) with Service Pack 1 (SP1) or later. To view localized versions of the DRAC 5 Web-based interface: 1 Open the Windows Control Panel. 2 Double-click the Regional Options icon. 3 Select the desired locale from the Your locale (location) drop-down menu. NOTICE: If you are running the Virtual Media client, you must use Internet Explorer 6.0 with Service Pack 1 or later. Linux Mozilla 1.
Features The DRAC 5 provides the following features: • Dynamic Domain Name System (DNS) registration • Remote system management and monitoring using a Web-based interface, serial connection, or telnet connection. • Support for Active Directory authentication — Centralizes all DRAC 5 user ID and passwords in Active Directory using an optional Dell snap-in schema. • Console Redirection — Provides remote system keyboard, video, and mouse functions.
• The Dell OpenManage Baseboard Management Controller Utilities User’s Guide provides information about configuring the Baseboard Management Controller (BMC), configuring your managed system using the BMC Management Utility, and additional BMC information. • The Dell Update Packages User's Guide provides information about obtaining and using Dell Update Packages as part of your system update strategy.
Installing and Setting Up the DRAC 5 This section provides information about how to install and setup your DRAC 5 hardware and software.
Configuring Your System to Use a DRAC 5 To configure your system to use a DRAC 5, use the Dell Remote Access Configuration Utility (formerly known as the BMC Setup Module). To run the Dell Remote Access Configuration Utility, perform the following steps: 1 Turn on or restart your system. 2 Press when prompted during POST. If your operating system begins to load before you press , allow the system to finish booting, and then restart your system and try again. 3 Configure the NIC.
6 Select Save Changes and Exit. The system automatically reboots. See the Dell OpenManage™ Baseboard Management Controller Utilities User’s Guide for more information about the Dell Remote Access Configuration Utility. Software Installation and Configuration Overview This section provides a high-level overview of the DRAC 5 software installation and configuration process. Configure your DRAC 5 using the Web-based interface, RACADM CLI, or Serial/Telnet/SSH console.
Installing the Software on the Managed System Installing software on the managed system is optional. Without managed system software, you lose the ability to use the RACADM locally, and for the RAC to capture the last crash screen. To install the managed system software, install the software on the managed system using the Dell PowerEdge Installation and Server Management CD. For instructions about how to install this software, see your Quick Installation Guide.
Disabling the Automatic Reboot Option in Windows Server 2003 1 Open the Windows Control Panel and double-click the System icon. 2 Click the Advanced tab. 3 Under Startup and Recovery, click Settings. 4 Deselect the Automatically Reboot check box. 5 Click OK twice. Disabling the Automatic Reboot Option in Windows 2000 Server 1 Open the Windows Control Panel and double-click the System icon. 2 Click the Advanced tab. 3 Click the Startup and Recovery... button. 4 Deselect the Automatically Reboot check box.
• To ensure that the Dell Digital KVM Viewer functions properly, open the following ports on your firewall: – Keyboard and mouse port (default is port 5900) – Video port (default is port 5901) Installing and Removing RACADM on a Linux Management Station To use the remote RACADM functions, install RACADM on a management station running Linux. NOTE: When you run Setup on the Systems Management Consoles CD, the RACADM utility for all supported operating systems are installed on your management station.
To configure your Internet Explorer Web browser to access a proxy server, perform the following steps: 1 Open a Web browser window. 2 Click Tools, and click Internet Options. 3 From the Internet Options window, click the Connections tab. 4 Under Local Area Network (LAN) settings, click LAN Settings. 5 If the Use a proxy server box is selected, select the Bypass proxy server for local addresses box. 6 Click OK twice.
Configuring the DRAC 5 Network Settings NOTICE: Changing your DRAC 5 Network settings may disconnect your current network connection. Configure the DRAC 5 network settings using one of the following tools: • Web-based Interface — See "Configuring the DRAC 5 NIC" • RACADM CLI — See "cfgLanNetworking" • Dell Remote Access Configuration Utility — See "Configuring Your System to Use a DRAC 5" NOTE: If you are deploying the DRAC 5 in a Linux environment, see "Installing RACADM.
The following software components are included with your DRAC 5 firmware package: • Compiled DRAC 5 firmware code and data • Expansion ROM image • Web-based interface, JPEG, and other user interface data files • Default configuration files Use the Firmware Update page to update the DRAC 5 firmware to the latest revision. When you run the firmware update, the update retains the current DRAC 5 settings.
• SSH • IPMI Table 2-1 describes each DRAC 5 interface. Table 2-1. DRAC 5 Interfaces Interface Description Web-based interface Provides remote access to the DRAC 5 using a graphical user interface. The Web-based interface is built into the DRAC 5 firmware and is accessed through the NIC interface from a supported Web browser on the management station. For a list of supported Web browsers, see "Supported Web Browsers." RACADM Provides remote access to the DRAC 5 using a command line interface.
To access the DRAC 5 remote access interface using Server Administrator, launch Server Administrator. From the system tree on the left pane of the Server Administrator home page, click System→ Main System Chassis→ Remote Access Controller. For more information, see your Server Administrator User’s Guide. For information about accessing the DRAC 5 using RACADM, see "Using the RACADM Command Line Interface.
NOTE: The encryption key must consist of an even number of hexidecimal characters with a maximum of 40 characters. 3 Configure IPMI Serial over LAN (SOL). a In the System tree, click Remote Access. b In the Configuration tab, click Serial Over LAN. c In the Serial Over LAN Configuration page, select Enable Serial Over LAN. d Update the IPMI SOL baud rate. NOTE: To redirect the serial console over LAN, ensure that the SOL baud rate is identical to your managed system’s baud rate.
• Save and exit the BIOS Setup program. • Restart your system. If IPMI serial is in terminal mode, you can configure the following additional settings: • Delete control • Echo control • Line edit • New line sequences • Input new line sequences For more information about these properties, see the IPMI 2.0 specification. Configuring IPMI Using the RACADM CLI 1 Login to the remote system using any of the RACADM interfaces. See "Using RACADM." 2 Configure IPMI over LAN.
3 Configure IPMI Serial over LAN (SOL). At the command prompt, type the following command and press : racadm config -g cfgIpmiSol -o cfgIpmiSolEnable 1 a Update the IPMI SOL minimum privilege level. NOTICE: The IPMI SOL minimum privilege level determines the minimum privilege required to activate IPMI SOL. For more information, see the IPMI 2.0 specification.
b Set the IPMI Serial baud rate. Open a command prompt, type the following command, and press : racadm config -g cfgIpmiSerial -o cfgIpmiSerialBaudRate where is 9600, 19200, 57600, or 115200 bps. For example: racadm config -g cfgIpmiSerial -o cfgIpmiSerialBaudRate 57600 c Enable the IPMI serial hardware flow control.
If IPMI serial is in terminal mode, you can configure the following additional settings using racadm config cfgIpmiSerial commands: • Delete control • Echo control • Line edit • New line sequences • Input new line sequences For more information about these properties, see the IPMI 2.0 specification. Configuring Platform Events Platform event configuration provides a mechanism for configuring the remote access device to perform selected actions on certain event messages.
When a platform event occurs (for example, a fan probe failure), a system event is generated and recorded in the System Event Log (SEL). If this event matches a platform event filter (PEF) in the Platform Event Filters list in the Web-based interface and you have configured this filter to generate an alert (PET or e-mail), then a PET or e-mail alert is sent to a set of one or more configured destinations.
where the values bits are as follows: • value bit 0 – 1 = enable alert action, 0 = disable alert • value bit 1 – 1 = power off; 0 = no power off • value bit 2 – 1 = reboot; 0 = no reboot • value bit 3 – 1 = power cycle; 0 = no power cycle For example, to enable PEF to reboot the system, type the following command: racadm config -g cfgIpmiPef -o cfgIpmiPefAction -i 1 2 where 1 is the PEF index and 2 is the PEF action to reboot.
2 Enable PET. At the command prompt, type the following commands and press after each command: racadm config -g cfgIpmiPet -o cfgIpmiPetAlertEnable -i 1 1 where 1 and 1 are the PET destination index and the enable/disable selection, respectively. The PET destination index can be a value from 1 through 4. The enable/disable selection can be set to 1 (Enabled) or 0 (Disabled).
Click Send Test Email to test the configured e-mail alert (if desired). f NOTE: Your user account must have Test Alerts permission to perform this procedure. See Table 4-8. g Repeat step a through step e for any remaining e-mail alert settings. 5 Enable global alerts. a Click Alert Management and select Platform Events. b Select the Enable Platform Event Filter Alert checkbox. Configuring E-Mail Alerts Using RACADM CLI 1 Enable your global alerts.
Configuring and Using the DRAC 5 Command Line Console This section provides information about the DRAC 5 command line console (or serial/telnet/ssh console) features, and explains how to set up your system so you can perform systems management actions through the console.
Using the connect com2 Serial Command When using the connect com2 serial command, the following must be configured properly: • The Serial Communication→ Serial Port setting in the BIOS Setup program. • The DRAC configuration settings. When a telnet session is established to the DRAC 5 and these settings are incorrect, connect com2 may display a blank screen.
To configure the IPMI mode using RACADM, perform the following steps: 1 Disable the RAC serial interface. At the command prompt, type: racadm config -g cfgSerial -o cfgSerialConsoleEnable 0 2 Enable the appropriate IPMI mode. For example, at the command prompt, type: racadm config -g cfgIpmiSerial -o cfgIpmiSerialConnectionMode <0 or 1> See "DRAC 5 Property Database Group and Object Definitions" for more information.
Edit the /etc/grub.conf file as follows: 1 Locate the general setting sections in the file and add the following two new lines: serial --unit=1 --speed=57600 terminal --timeout=10 serial 2 Append two options to the kernel line: kernel ............. console=ttyS1,57600 3 If the /etc/grub.conf contains a splashimage directive, comment it out. Table 3-2 provides a sample /etc/grub.conf file that show the changes described in this procedure. Table 3-2. Sample File: /etc/grub.conf # grub.
When you edit the /etc/grub.conf file, use the following guidelines: 1 Disable GRUB's graphical interface and use the text-based interface; otherwise, the GRUB screen will not be displayed in RAC console redirection. To disable the graphical interface, comment out the line starting with splashimage.
Table 3-3. Sample File: /etc/innitab (continued) l0:0:wait:/etc/rc.d/rc l1:1:wait:/etc/rc.d/rc l2:2:wait:/etc/rc.d/rc l3:3:wait:/etc/rc.d/rc l4:4:wait:/etc/rc.d/rc l5:5:wait:/etc/rc.d/rc l6:6:wait:/etc/rc.d/rc 0 1 2 3 4 5 6 # Things to run in every runlevel. ud::once:/sbin/update # Trap CTRL-ALT-DELETE ca::ctrlaltdel:/sbin/shutdown -t3 -r now # When our UPS tells us power has failed, assume we have a few # minutes of power left. Schedule a shutdown for 2 minutes from now.
Table 3-4 shows a sample file with the new line. Table 3-4. Sample File: /etc/securetty vc/1 vc/2 vc/3 vc/4 vc/5 vc/6 vc/7 vc/8 vc/9 vc/10 vc/11 tty1 tty2 tty3 tty4 tty5 tty6 tty7 tty8 tty9 tty10 tty11 ttyS1 Enabling the DRAC 5 Serial/Telnet/SSH Console The serial/telnet/ssh console can be enabled locally or remotely. Enabling the Serial/Telnet/SSH Console Locally NOTE: You (the current user) must have Configure DRAC 5 permission in order to perform the steps in this section.
Enabling the Serial/Telnet/SSH Console Remotely To enable the serial/telnet/ssh console remotely, type the following remote RACADM commands from a command prompt: racadm -u -p -r config -g cfgSerial cfgSerialConsoleEnable 1 racadm -u -p -r config -g cfgSerial cfgSerialTelnetEnable 1 racadm -u -p -r config -g cfgSerial cfgSerialSshEnable 1 Using the RACADM Command to Configure the S
To enable your web server using Secure Shell (SSH), telnet or local RACADM, type the following command from a command prompt on a management station: racadm config -g cfgRacTuning -o cfgRacTuneWebServerEnable 1 Displaying Configuration Settings Table 3-5 provides the actions and related commands to display your configuration settings. To run the commands, open a command prompt on the managed system, type the command, and press . Table 3-5.
Only four SSH sessions are supported at any given time. The session timeout is controlled by the cfgSsnMgtSshIdleTimeout property as described in the "DRAC 5 Property Database Group and Object Definitions.
These features are disabled in the DRAC 5 default configuration. Use the following subcommand or the Web-based interface to enable these features. racadm config -g cfgRacTuning -o Additionally, use these features in conjunction with the appropriate session idle time-out values and a defined security plan for your network. The following subsections provide additional information about these features.
Enabling IP Filtering Below is an example command for IP filtering setup. See "Using RACADM" for more information about RACADM and RACADM commands. NOTE: The following RACADM commands block all IP addresses except 192.168.0.57) To restrict the login to a single IP address (for example, 192.168.0.57), use the full mask, as shown below. racadm config -g cfgRacTuning -o cfgRacTuneIpRangeEnable 1 racadm config -g cfgRacTuning -o cfgRacTuneIpRangeAddr 192.168.0.
Table 3-8 lists the user-defined parameters. Table 3-8. Login Retry Restriction Properties Property Definition cfgRacTuneIpBlkEnable Enables the IP blocking feature. When consecutive failures (cfgRacTuneIpBlkFailCount) from a single IP address are encountered within a specific amount of time (cfgRacTuneIpBlkFailWindow), all further attempts to establish a session from that address are rejected for a certain timespan (cfgRacTuneIpBlkPenaltyTime).
The serial console is available on the DRAC 5 through the managed system external serial connector. Only one serial client system (management station) may be active at any given time. The telnet and SSH consoles are available on the DRAC 5 through the DRAC modes (see "DRAC Modes"). Up to four telnet client systems and four SSH clients may connect at any given time. The management station connection to the managed system serial or telnet console requires management station terminal emulation software.
Configuring the Management Station Terminal Emulation Software Your DRAC 5 supports a serial or telnet text console from a management station running one of the following types of terminal emulation software: • Linux Minicom in an Xterm • Hilgraeve’s HyperTerminal Private Edition (version 6.3) • Linux Telnet in an Xterm • Microsoft® Telnet Perform the steps in the following subsections to configure your type of terminal software. If you are using Microsoft Telnet, configuration is not required.
13 When all specified fields are clear, press to exit the Modem Dialing and Parameter Setup menu. 14 Select Save setup as config_name and press . 15 Select Exit From Minicom and press . 16 At the command shell prompt, type minicom . 17 To expand the Minicom window to 80 x 25, drag the corner of the window. 18 Press , , to exit Minicom.
5 Click OK. 6 Click File → Properties, and then click the Settings tab. 7 Set the Telnet terminal ID: to ANSI. 8 Click Terminal Setup and set Screen Rows to 26. 9 Set Columns to 80 and click OK. Table 3-11. Management Station COM Port Settings Setting Description Required Setting Bits per second 57600 Data bits 8 Parity None Stop bits 1 Flow control Hardware The HyperTerminal window displays a command prompt such as [DRAC 5\root]#.
Enabling Microsoft Telnet for Telnet Console Redirection NOTE: Some telnet clients on Microsoft operating systems may not display the BIOS setup screen correctly when BIOS console redirection is set for VT100 emulation. If this issue occurs, update the display by changing BIOS console redirection to ANSI mode. To perform this procedure in the BIOS setup menu, select Console Redirection → Remote Terminal Type → ANSI. 1 Enable Telnet in Windows Component Services.
Using a Serial or Telnet Console Serial and telnet commands, and RACADM CLI can be typed in a serial or telnet console and executed on the server locally or remotely. The local RACADM CLI is installed for use by a root user only. For more information about the serial/telnet/ssh commands and RACADM CLI, see "Using the RACADM Command Line Interface.
Configuring and Using the DRAC 5 Command LIne Console
Configuring the DRAC 5 Using the Web User Interface The DRAC 5 provides a Web-based interface and RACADM (a command-line interface) that enables you to configure the DRAC 5 properties and users, perform remote management tasks, and troubleshoot a remote (managed) system for problems. For everyday systems management, use the DRAC 5 Web-based interface.
To log in, perform the following steps: 1 In the User Name field, type one of the following: • Your DRAC 5 user name. For example, The DRAC 5 user name for local users is case sensitive • Your Active Directory user name. For example, \, /, or @. Examples of an Active Directory user name are: dell.com\john_doe or john_doe@dell.com. The Active Directory user name is not case sensitive.
3 In the Network Configuration page, configure the DRAC 5 NIC settings. Table 4-1 and Table 4-2 describes the Network Settings and IPMI Settings on the Network Configuration page. 4 When completed, click Apply Changes. 5 Click the appropriate Network Configuration page button to continue. See Table 4-3. Table 4-1. Network Settings Setting Description NIC Selection Displays the selected NIC mode (Dedicated, Shared with Failover, or Shared). The default setting is Dedicated.
Table 4-1. Network Settings (continued) Setting Description Use DHCP for DNS Domain Name Uses the default DNS domain name. When the box is not selected and the Register DRAC 5 on DNS option is selected, you can modify the DNS domain name in the DNS Domain Name field. The default setting is Disabled. DNS Domain Name The default DNS domain name is MYDOMAIN. When the Use DHCP for DNS Domain Name check box is selected, this option is grayed out and you cannot modify this field.
Table 4-3. Network Configuration Page Buttons (continued) Button Description Apply Changes Saves the changes made to the network configuration. NOTE: Changes to the NIC IP address settings will close all user sessions and require users to reconnect to the DRAC 5 Web-based interface using the updated IP address settings. All other changes will require the NIC to be reset, which may cause a brief loss in connectivity.
Table 4-5. Network Security Page Buttons Button Description Print Prints the Network Security page Refresh Reloads the Network Security page Apply Changes Saves the changes made to the Network Security page. Go Back to Network Configuration Page Returns to the Network Configuration page. Adding and Configuring DRAC 5 Users To manage your system with the DRAC 5 and maintain system security, create unique users with specific administrative permissions (or role-based authority).
Table 4-6. General Properties Property Description User ID Specifies one of 16 preset User ID numbers. If you are editing information for user root, this field is static. You cannot edit the username for root. Enable User Enables the user to access the DRAC 5. When unchecked, the User Name cannot be changed. User Name Specifies a DRAC 5 user name with up to 16 characters. Each user must have a unique user name. NOTE: User names on the local DRAC 5 cannot include the / (forward slash) or .
Table 4-8. DRAC User Privileges (continued) Property Description Configure Users Enables the user to allow specific users to access the system. Clear Logs Enables the user to clear the DRAC logs. Execute Server Control Commands Enables the user to execute racadm commands. Access Console Redirection Enables the user to run Console Redirection. Access Virtual Media Enables the user to run and use Virtual Media. Test Alerts Enables the user to send test alerts (e-mail and PET) to a specific user.
Configuring and Managing Active Directory Certificates NOTE: You must have Configure DRAC 5 permission to configure Active Directory and upload, download, and view an Active Directory certificate. Use the Microsoft® Active Directory® service to configure your software to provide access to the DRAC 5. The service allows you to add and control the DRAC5 user privileges of your existing users. See "Using the DRAC 5 With Microsoft Active Directory" for more information.
Table 4-13. Active Directory Configuration Page Settings Setting Description Enable Active Directory Enables Active Directory. Checked=Enabled; Unchecked=Disabled. DRAC Name The name that uniquely identifies the DRAC 5 card in Active Directory. This value is NULL by default. The name must be a 1-256 character ASCII string, with no blank spaces between characters. ROOT Domain Name The Active Directory ROOT domain name. This value is NULL by default.
Table 4-15. Certificate Upload Page Buttons Button Description Print Print the Certificate Upload page. Go Back to Active Directory Main Menu Return to the Active Directory Main Menu page. Apply Apply the certificate to the DRAC 5 firmware. Downloading a DRAC Server Certificate 1 In the Active Directory Main Menu page, select Download DRAC Server Certificate and click Next. 2 In the File Download window, click Save and save the file to a directory on your system.
Securing DRAC 5 Communications Using SSL and Digital Certificates This subsection provides information about the following data security features that are incorporated in your DRAC 5: • Secure Sockets Layer (SSL) • Certificate Signing Request (CSR) • Accessing the SSL main menu • Generating a new CSR • Uploading a server certificate • Viewing a server certificate Secure Sockets Layer (SSL) The DRAC includes a Web server that is configured to use the industry-standard SSL security protocol to tra
A Certificate Authority is a business entity that is recognized in the IT industry for meeting high standards of reliable screening, identification, and other important security criteria. Examples of CAs include Thawte and VeriSign. After the CA receives your CSR, they review and verify the information the CSR contains. If the applicant meets the CA’s security standards, the CA issues a certificate to the applicant that uniquely identifies that applicant for transactions over networks and on the Internet.
Generating a New Certificate Signing Request NOTE: Each new CSR overwrites any previous CSR on the firmware. Before a certificate authority (CA) can accept your CSR, the CSR in the firmware must match the certificate returned from the CA. Otherwise, the DRAC 5 will not upload the certificate. 1 In the SSL Main Menu page, select Generate a New Certificate Signing Request (CSR) and click Next. 2 In the Generate Certificate Signing Request (CSR) page, type a value for each CSR attribute value.
Table 4-21. Generate Certificate Signing Request (CSR) Page Buttons Button Description Print Print the Generate Certificate Signing Request (CSR) page. Go Back to Security Main Menu Return to the SSL Main Menu page. Generate Generate a CSR. Uploading a Server Certificate 1 In the SSL Main Menu page, select Upload Server Certificate and click Next. The Certificate Upload page appears.
Table 4-23. Certificate Information (continued) Field Description Valid From Issue date of the certificate Valid To Expiration date of the certificate Table 4-24. View Server Certificate Page Buttons Button Description Print Print the View Server Certificate page. Go Back to SSL Main Menu Return to the SSL Main Menu page. Configuring Serial and Terminal Modes Configuring IPMI and RAC Serial 1 Expand the System tree and click Remote Access. 2 Click the Configuration tab and then click Serial.
Table 4-26. RAC Serial Settings Setting Description Enabled Enables or disables the RAC serial console. Checked=Enabled; Unchecked=Disabled Maximum Sessions The maximum number of simultaneous sessions allows for this system. Timeout The maximum number of seconds of line idle time before the line is disconnected. The range is 60 to 1920 seconds. Default is 300 seconds. Use 0 seconds to disable the Timeout feature. Redirect Enabled Enables or disables Console Redirection.
Table 4-28. Terminal Mode Settings Setting Description Line Editing Enables or disables line editing. Delete Control Select one of the following: • BMC outputs a character when or is received — • BMC outputs a character when or is received — Echo Control Enables or disables echo. Handshaking Control Enables or disables handshaking. New Line Sequence Select None, , , , , or .
5 Configure the advanced settings, if required. Otherwise, click the appropriate Serial Over LAN Configuration page button to continue (see Table 4-31). To configure the advanced settings, perform the following steps: a Click Advanced Settings. b In the Serial Over LAN Configuration Advanced Settings page, configure the advanced settings as required. See Table 4-32. c Click Apply Changes. d Click the appropriate Serial Over LAN Configuration Advanced Settings page button to continue. See Table 4-33.
Table 4-33. Serial Over LAN Configuration Advanced Settings Page Buttons Button Description Print Prints the Serial Over LAN Configuration Advanced Settings page. Refresh Refreshes the Serial Over LAN Configuration Advanced Settings page. Go Back To Serial Over LAN Returns to the Serial Over LAN Configuration page. Configuration Page Apply Changes Applies the Serial Over LAN Configuration Advanced Settings page settings.
Table 4-34. Web Server Settings (continued) Setting Description Active Sessions The number of current sessions on the system, less than or equal to the Max Sessions. Timeout The time in seconds that a connection is allowed to remain idle. The session is cancelled when the timeout is reached. Changes to the timeout setting do not affect the current session. When you change the timeout setting, you must log out and log in again to make the new setting effective. Timeout range is 60 to 1920 seconds.
Table 4-37. Remote RACADM Settings Setting Description Enabled Enables or disables remote RACADM. Checked=Enabled; Unchecked= Disabled. Max Sessions The maximum number of simultaneous sessions allowed for this system. Up to four sessions are supported. Active Sessions The number of current sessions on the system, less than or equal to the Max Sessions. Table 4-38. SNMP Agent Settings Setting Description Enabled Enables or disables the SNMP agent. Checked=Enabled; Unchecked= Disabled.
Frequently Asked Questions Table 4-41 lists frequently asked questions and answers. Table 4-41. Managing and Recovering a Remote System: Frequently Asked Questions Question Answer When accessing the DRAC 5 Web-based interface, I get a security warning stating the hostname of the SSL certificate does not match the hostname of the DRAC 5. The DRAC 5 includes a default DRAC 5 server certificate to ensure network security for the Web-based interface and remote racadm features.
Table 4-41. Managing and Recovering a Remote System: Frequently Asked Questions (continued) Question Answer Why are the remote racadm and Web-based services unavailable after a property change? It may take a minute for the remote RACADM services and the Web-based interface to become available after the DRAC 5 Web server resets.
Table 4-41. Managing and Recovering a Remote System: Frequently Asked Questions (continued) Question Answer The following message is displayed for unknown reasons: As part of discovery, IT Assistant attempts to verify the device’s get and set community names. In IT Assistant, you have the get community name = public and the set community name = private. By default, the community name for the DRAC 5 agent is public.
Configuring the DRAC 5 Using the Web User Interface
Recovering and Troubleshooting the Managed System This section explains how to perform tasks related to recovering and troubleshooting a crashed remote system using the DRAC 5 Web-based interface. For information about troubleshooting your DRAC 5, see "Deploying Your Operating System Using VM-CLI.
To access the Power Management page from the System tree, click System and then click the Power Management tab. NOTE: You must have Execute Server Action Commands permission to perform power management actions. Selecting Power Control Actions 1 Select one of the following Power Control Actions. • Power On System— Turns on the system power (equivalent to pressing the power button when the system power is off).
Table 5-2. System Information Fields Field Description Description System description. BIOS Version System BIOS version. Service Tag System Service Tag number. Host Name Host system’s name. OS Name Operating system running on the system. Table 5-3. Auto Recovery Fields Field Description Recovery Action When a "system hang" is detected, the DRAC can be configured to do one of the following actions: No Action, Hard Reset, Power Down, or Power Cycle.
Table 5-5. BMC Information Fields Field Description Name "Baseboard Management Controller". IPMI Version Intelligent Platform Management Interface (IPMI) version. Number of Possible Active Sessions Maximum number of session that can be active at the same time. Number of Current Active Sessions Total number of current active sessions. Firmware Version Version of the BMC firmware. LAN Enabled LAN Enabled or LAN Disabled.
Table 5-7. SEL Page Buttons Button Action Print Prints the SEL in the sort order that it appears in the window.. Clear Log Clears the SEL. NOTE: The Clear Log button appears only if you have Clear Logs permission. Save As Opens a pop-up window that enables you to save the SEL to a directory of your choice. Refresh Reloads the SEL page.
Using the RAC Log The RAC Log is a persistent log maintained in the DRAC 5 firmware. The log contains a list of user actions (such as log in, log out, and security policy changes) and alerts issued by the DRAC 5. The oldest entries are overwritten when the log becomes full. To access the RAC Log, perform the following steps: 1 In the System tree, click Remote Access. 2 Click the Logs tab and then click RAC Log. The RAC Log provides the information in Table 5-9. Table 5-9.
To access the Diagnostic Console page, perform the following steps: 1 In the System tree, click Remote Access. 2 Click the Diagnostics tab. Table 5-11 describes the options that are available on the Diagnostic Console page. Type a command and click Submit. The debugging results appear in the Diagnostic Console page. To refresh the Diagnostic Console page, click Refresh. To execute another command, click Go Back to Diagnostics Page. Table 5-11.
Troubleshooting Alerting Problems Use logged SNMP trap information to troubleshoot a particular type of DRAC 5 alert. SNMP trap deliveries are logged in the Trace Log by default. However, since SNMP does not confirm delivery of traps, use a network analyzer or a tool such as Microsoft’s snmputil to trace the packets on the managed system.
Using the DRAC 5 With Microsoft Active Directory A directory service maintains a common database of all information needed for controlling users, computers, printers, etc. on a network. If your company uses the Microsoft® Active Directory® service software, you can configure the software to provide access to the DRAC 5, allowing you to add and control DRAC 5 user privileges to your existing users in your Active Directory software.
Overview of the RAC Schema Extensions To provide the greatest flexibility in the multitude of customer environments, Dell provides a group of properties that can be configured by the user depending on the desired results. Dell has extended the schema to include an Association, Device, and Privilege property. The Association property is used to link together the users or groups with a specific set of privileges to one or more RAC devices.
Figure 6-1. Typical Setup for Active Directory Objects Association Object User(s) Group(s) Privilege Object RAC Device Object(s) RAC Privilege Object NOTE: The RAC privilege object applies to both DRAC 4 and DRAC 5. You can create as many or as few association objects as required.
Figure 6-2. Setting Up Active Directory Objects in a Single Domain AO1 Group1 User1 User2 AO2 Priv1 User3 Priv2 RAC1 RAC2 To configure the objects for the single domain scenario, perform the following tasks: 1 Create two Association Objects. 2 Create two RAC Device Objects, RAC1 and RAC2, to represent the two DRAC 5 cards. 3 Create two Privilege Objects, Priv1 and Priv2, in which Priv1 has all privileges (administrator) and Priv2 has login privileges. 4 Group user1 and user2 into Group1.
Figure 6-3. Setting Up Active Directory Objects in Multiple Domains Domain1 Domain2 AO1 Group1 User1 User2 AO2 Priv1 User3 Priv2 RAC1 RAC2 To configure the objects for the multiple domain scenario, perform the following tasks: 1 Ensure that the domain forest function is in Native or Windows 2003 mode. 2 Create two Association Objects, AO1 (of Universal scope) and AO2, in any domain. Figure 6-3 shows the objects in Domain2.
Configuring Active Directory to Access Your DRAC 5 Before using Active Directory to access your DRAC 5, configure the Active Directory software and the DRAC 5 by performing the following steps in order: 1 Extend the Active Directory schema (see "Extending the Active Directory Schema"). 2 Extend the Active Directory Users and Computers Snap-in (see "Installing the Dell Extension to the Active Directory Users and Computers Snap-In").
3 Select Use Current Log In Credentials or enter a user name and password with schema administrator rights. 4 Click Next to run the Dell Schema Extender. 5 Click Finish. The schema is extended.
Table 6-3. dellAssociationObject Class OID 1.2.840.113556.1.8000.1280.1.1.1.2 Class Type Structural Class SuperClasses Group Attributes dellProductMembers dellPrivilegeMember Table 6-4. dellRAC4Privileges Class OID 1.2.840.113556.1.8000.1280.1.1.1.3 Description Used to define the privileges (Authorization Rights) for the DRAC 5 device.
Table 6-6. dellProduct Class OID 1.2.840.113556.1.8000.1280.1.1.1.5 Description The main class from which all Dell products are derived. Class Type Structural Class SuperClasses Computer Attributes dellAssociationMembers Table 6-7. List of Attributes Added to the Active Directory Schema Attribute Name/Description Assigned OID/Syntax Object Identifier Single Valued dellPrivilegeMember 1.2.840.113556.1.8000.1280.1.1.2.
Table 6-7. List of Attributes Added to the Active Directory Schema (continued) Attribute Name/Description Assigned OID/Syntax Object Identifier Single Valued dellIsConsoleRedirectUser 1.2.840.113556.1.8000.1280.1.1.2.8 TRUE TRUE if the user has Console Redirection rights on the device. Boolean (LDAPTYPE_BOOLEAN 1.3.6.1.4.1.1466.115.121.1.7) dellIsVirtualMediaUser 1.2.840.113556.1.8000.1280.1.1.2.9 TRUE if the user has Virtual Media rights on the device. Boolean (LDAPTYPE_BOOLEAN 1.3.6.1.4.1.
When you install your systems management software using the Dell Systems Management Consoles CD, you can extend the snap-in by selecting the Dell Extension to the Active Directory User’s and Computers Snap-In option during the installation procedure. See the Dell OpenManage Software Quick Installation Guide for additional instructions about installing systems management software. For more information about the Active Directory User’s and Computers snap-in, see your Microsoft documentation.
Creating a RAC Device Object 1 In the MMC Console Root window, right-click a container. 2 Select New→ Dell RAC Object. The New Object window appears. 3 Type a name for the new object. The name must be identical to the DRAC 5 Name that you will type in step 7 of "Configuring the DRAC 5." 4 Select RAC Device Object. 5 Click OK. Creating a Privilege Object NOTE: A Privilege Object must be created in the same domain as the related Association Object. 1 In the Console Root (MMC) window, right-click a container.
Adding Objects to an Association Object Using the Association Object Properties window, you can associate users or user groups, privilege objects, and RAC devices or RAC device groups. If your system is running Windows 2000 mode or higher, use Universal Groups to span domains with your user or RAC objects. You can add groups of Users and RAC devices. The procedure for creating Dell-related groups and nonDell-related groups is identical.
d Select Enterprise root CA as CA Type and click Next. e Enter Common name for this CA, click Next, and click Finish. 2 Enable SSL on each of your domain controllers by installing the SSL certificate for each controller. a Click Start→ Administrative Tools→ Domain Security Policy. b Expand the Public Key Policies folder, right-click Automatic Certificate Request Settings and click Automatic Certificate Request.
d Click the Configuration tab, and then click Security. e In the Security Certificate Main Menu page, select Upload Server Certificate and click Apply. f In the Certificate Upload screen, perform one of the following procedures: g • Click Browse and select the certificate • In the Value field, type the path to the certificate. Click Apply.
6 Select the Enable Active Directory check box. 7 Type the DRAC Name. This name must be the same as the common name of the RAC object you created in your Domain Controller (see step 3 of "Creating a RAC Device Object"). 8 Type the Root Domain Name. The Root Domain Name is the fully qualified root domain name for the forest. 9 Type the DRAC Domain Name (for example, drac5.com). Do not use the NetBIOS name.
Configuring the DRAC 5 Active Directory Settings Using RACADM Using the following commands to configure the DRAC 5 Active Directory Feature using the RACADM instead of the Web-based interface.
where username is an ASCII string of 1–256 bytes. White space and special characters (such as \, /, or @) cannot be used in the user name or the domain name. NOTE: You cannot specify NetBIOS domain names, such as Americas, as these names cannot be resolved. Frequently Asked Questions Table 6-8 lists frequently asked questions and answers. Table 6-8.
Table 6-8. Using the DRAC 5 With Active Directory: Frequently Asked Questions (continued) Question What can I do if I cannot log into the DRAC 5 using Active Directory authentication? How do I troubleshoot the issue? Answer 1 Ensure that you use the correct user domain name during a login and not the NetBIOS name. 2 If you have a local DRAC user account, log into the DRAC 5 using your local credentials.
Using the DRAC 5 With Microsoft Active Directory
Using GUI Console Redirection This section provides information about using the DRAC 5 console redirection feature. Overview The DRAC 5 console redirection feature enables you to access the local console remotely in either graphic or text mode. Using console redirection, you can control one or more DRAC 5-enabled systems from one location. Today with the power of networking and the Internet, you do not have to sit in front of each server to perform all the routine maintenance.
Table 7-1. Supported Screen Resolutions and Refresh Rates Screen Resolution Refresh Rate (Hz) 720x400 70 640x480 60, 72, 75, 85 800x600 60, 70, 72, 75, 85 1024x768 60, 70, 72, 75, 85 1280x1024 60 Configuring Your Management Station To use Console Redirection on your management station, perform the following procedures: 1 Install and configure a supported Web browser.
The buttons in Table 7-3 are available on the Console Redirection Configuration page. Table 7-3. Console Redirection Configuration Page Buttons Property Description Print Prints the Console Redirection Configuration page Refresh Reloads the Console Redirection Configuration page Apply Changes Saves your configuration settings.
The buttons in Table 7-5 are available on the Console Redirection page. Table 7-5. Console Redirection Page Buttons Button Definition Refresh Reloads the Console Redirection Configuration page Connect Opens a console redirection session on the targeted remote system. 5 If a console redirection session is available, click Connect. NOTE: Multiple message boxes may appear after you launch the application.
The menu bar can also be activated by pressing the default function key . To reassign this function key to a new function, perform the following steps: 1 Press or move your mouse cursor to the top of the Video Viewer. 2 Press the "push pin" to lock the viewer menu bar. 3 In the viewer menu bar, click Tools and select Session Options. 4 In the Session Options window, click the General tab.
Table 7-6. Viewer Menu Bar Selections Menu Item Item Description Tools Automatic Video Adjust Recalibrates the session viewer video output. Manual Video Adjust Provides individual controls to manually adjust the session viewer video output. NOTE: Adjusting the horizontal position off-center desynchronizes the mouse pointers. Session Options Provides additional session viewer control adjustments.
• Reducing the Pixel Noise Ratio setting to zero causes multiple video refresh commands that generates excessive network traffic and flickering video in the Video Viewer window. Dell recommends that you adjust the Pixel Noise Ratio setting at a level that provides optimal system performance and pixel enhancement while minimizing network traffic.
Table 7-7. Using Console Redirection: Frequently Asked Questions (continued) Question Answer During Console Redirection, the mouse became locked after coming back from hibernation on a Windows Server 2003 system. Why did this happen? To resolve this issue, select a different operating system than Windows for mouse acceleration from the virtual KVM (vKVM) window pull-down menu, wait 5 to 10 seconds, and then select Windows again.
Table 7-7. Using Console Redirection: Frequently Asked Questions (continued) Question Answer Why doesn’t the vKVM Select a different operating system for mouse acceleration on the vKVM mouse sync after coming window pull-down menu. Next, return to the original operating system to back from hibernation on a initialize the USB mouse device. Windows system? 1 In the vKVM toolbar, click Tools and select Session Options. 2 In the Session Options window, click the Mouse tab.
Table 7-7. Using Console Redirection: Frequently Asked Questions (continued) Question Answer Why can't I use a keyboard or mouse while installing a Microsoft® operating system remotely by using DRAC5 Console Redirection? When you remotely install a supported Microsoft operating system on a system with Console Redirection enabled in the BIOS, you receive an EMS Connection Message that requires that you select OK before you can continue. You cannot use the mouse to select OK remotely.
Table 7-7. Question Using Console Redirection: Frequently Asked Questions (continued) Answer What are the minimum The management station requires an Intel Pentium III 500 MHz processor system requirements for my with at least 256 MB of RAM. management station to run console redirection? What are the maximum The DRAC 5 supports up to two simultaneous console redirection sessions.
Using GUI Console Redirection
Using and Configuring Virtual Media Overview The Virtual Media feature provides the managed system with a virtual CD drive, which can use standard media from anywhere on the network. Figure 8-1 shows the overall architecture of virtual media. Figure 8-1.
The managed system is configured with a DRAC 5 card. The virtual CD and floppy drives are two electronic devices embedded in the DRAC 5 that are controlled by the DRAC 5 firmware. These two devices are present on the managed system’s operating system and BIOS at all times, whether virtual media is connected or disconnected. The management station provides the physical media or image file across the network.
Installing the Virtual Media Plug-In The virtual media browser plug-in must be installed on your management station to use the virtual media feature. After you open the DRAC 5 user interface and launch the Virtual Media page, the browser automatically downloads the plug-in, if required. If the plug-in is successfully installed, the Virtual Media page displays a list of floppy diskettes and optical disks that connect to the virtual drive.
Running Virtual Media Using the Web User Interface Connecting Virtual Media 1 Open a supported Web browser on your management station. See "Supported Web Browsers." 2 Connect and log into the DRAC 5. See "Accessing the Web-Based Interface" for more information. 3 Click the Media tab and then click Virtual Media. The Virtual Media page appears with the client drives that can be virtualized.
Disconnecting Virtual Media Click Disconnect to disconnect all virtualized images and drives from the management station. All virtualized images or drives disconnect and are no longer available on the managed system. Attaching and Detaching the Virtual Media Feature The DRAC 5 Virtual Media feature is based on USB technology and can take advantage of the USB plug and play features. DRAC 5 adds the option to attach and detach the virtual devices from the USB bus.
5 Save the changes and exit. The managed system reboots. The managed system attempts to boot from a bootable device based on the boot order. If virtual device is connected and a bootable media is present, the system boots to the virtual device. Otherwise, the system overlooks the device—similar to a physical device without bootable media.
Unlike a CD or floppy drive that requires an external client connection or functional device in the host system, implementing Virtual Flash only requires the DRAC 5 persistent Virtual Flash feature. The 16 MB of flash memory appears as an unformatted, removable USB drive in the host environment.
4 Using the format command, format the drive with the /s switch to transfer the system files to the Virtual Flash. For example: format /s x where x is the drive letter assigned to Virtual Flash. 5 Shut down the system and remove the bootable floppy or CD from the appropriate drive. 6 Turn on the system and verify that the system boots from Virtual Flash to the C:\ or A:\ prompt.
Supported Operating Systems The VM-CLI utility supports the following operating systems: • Windows XP • Windows 2000 Server with Service Pack 4 • Windows Server 2003 • Windows Server 2003 R2 • Red Hat Enterprise Linux AS/ES (version 3) • Red Hat Enterprise Linux AS/ES (version 4) • SUSE Linux Enterprise Server Version 9 with Service Pack 2 for EM64T See the DRAC 5 Readme and the Dell OpenManage™ Server Administrator Compatibility Guide located on the Dell Support website at support.dell.
VM-CLI Parameters DRAC 5 IP Address -r [:] where is a valid, unique IP address or the DRAC 5 Dynamic Domain Naming System (DDNS) name (if supported). This parameter provides the DRAC 5 IP address and SSL port. The VM-CLI utility needs this information to establish a Virtual Media connection with the target DRAC 5. If you enter an invalid IP address or DDNS name, an error message appears and the command is terminated.
For example, a device is specified as: -f a:\ (Windows system) -f /dev/sdb4 # 4th partition on device /dev/sdb (Linux system) If the device provides a write-protection capability, use this capability to ensure that Virtual Media will not write to the media. Additionally, omit this parameter from the command line if you are not virtualizing floppy media. If an invalid value is detected, an error message displays and the command terminates.
When this parameter is included in the command line, VM-CLI will use an SSL-encrypted channel to transfer data between the management station and the DRAC 5 in the remote system. If this parameter is not included in the command line, the data transfer is not encrypted. VM-CLI Operating System Shell Options The following operating system features can be used in the VM-CLI command line: • stderr/stdout redirection — Redirects any printed utility output to a file.
Table 8-2. Using Virtual Media: Frequently Asked Questions (continued) Question Answer Why do I sometimes lose my client connection? You can sometimes lose your client connection if the network is slow or if you change the CD in the client system CD drive. For example, if you change the CD in the client system’s CD drive, the new CD might have an autostart feature.
Using and Configuring Virtual Media
Using the RACADM Command Line Interface The serial/telnet/ssh console provides a set of racadm commands. The racadm commands provide access to the text-based features supported by the DRAC 5 Web-based interface. RACADM enables you to locally or remotely configure and manage your DRAC 5. RACADM runs on the management station and the managed system. RACADM is included on the Dell Systems Management Consoles CD. You can use RACADM to write scripts to automatically configure multiple DRAC 5s.
From a serial session, you can connect to the managed system’s serial console by pressing , which connects the managed system’s serial port directly to the servers’ COM2 port and bypasses the DRAC 5. To reconnect the DRAC 5 to the serial port, press <9>. The managed node COM2 port and the DRAC 5 serial port baud rates must be identical.
RACADM Synopsis racadm -r -u -p racadm -i -r For example: racadm -r 192.168.0.120 -u root -p calvin getsysinfo racadm -i -r 192.168.0.
RACADM Subcommands Table 9-2 provides a description of each racadm subcommand that you can run in RACADM. For a detailed listing of racadm subcommands including syntax and valid entries, see "RACADM Subcommand Overview." When entering a RACADM subcommand, prefix the command with racadm. For example: racadm help Table 9-2. RACADM Subcommands 148 Command Description help Lists DRAC 5 subcommands. help Lists usage statement for the specified subcommand.
Table 9-2. RACADM Subcommands (continued) Command Description serveraction Performs power management operations on the managed system. getraclog Displays the RAC log. clrsel Clears the System Event Log entries. gettracelog Displays the DRAC 5 trace log. If used with -i, the command displays the number of entries in the DRAC 5 trace log. sslcsrgen Generates and downloads the SSL CSR. sslcertupload Uploads a CA certificate or server certificate to the DRAC 5.
3 Use the new configuration file to modify a target RAC. In the command prompt, type: racadm config -f myfile.cfg 4 Reset the target RAC that was configured. In the command prompt, type: racadm reset The getconfig -f racadm.cfg subcommand requests the DRAC 5 configuration and generates the racadm.cfg file. If required, you can configure the file with another name.
Use the following guidelines when you create a .cfg file: • If the parser encounters an indexed group, it is the value of the anchored object that differentiates the various indexes. The parser reads in all of the indexes from the DRAC 5 for that group. Any objects within that group are simple modifications when the DRAC 5 is configured. If a modified object represents a new index, the index is created on the DRAC 5 during configuration. • The user cannot specify a desired index in a .cfg file.
• All group entries must be surrounded by "[" and "]" characters. The starting "[" character denoting a group name must start in column one. This group name must be specified before any of the objects in that group. Objects that do not include an associated group name generate an error. The configuration data is organized into groups as defined in "DRAC 5 Property Database Group and Object Definitions." The following example displays a group name, object, and the object’s property value.
If you type racadm getconfig -f .cfg, the command builds a .cfg file for the current DRAC 5 configuration. This configuration file can be used as an example and as a starting point for your unique .cfg file. Modifying the DRAC 5 IP Address When you modify the DRAC 5 IP address in the configuration file, remove all unnecessary = value entries. Only the actual variable group’s label with "[" and "]" remains, including the two =value entries pertaining to the IP address change.
Using the RACADM Utility to Configure the DRAC 5 NOTE: You must be logged in as user root to execute RACADM commands on a remote Linux system. The DRAC 5 Web-based interface is the quickest way to configure a DRAC 5. If you prefer commandline or script configuration or need to configure multiple DRAC 5s, use RACADM, which is installed with the DRAC 5 agents on the managed system.
NOTE: When you manually enable or disable a user with the racadm config subcommand, you must specify the index with the -i option. Observe that the cfgUserAdminIndex object displayed in the previous example contains a '#' character. Also, if you use the racadm config -f racadm.cfg command to specify any number of groups/objects to write, the index cannot be specified. A new user is added to the first available index.
racadm testemail -i 2 NOTE: Ensure that the SMTP and Email Alert settings are configured before testing the email alerting feature. See "Configuring E-Mail Alerts" for more information. Testing the RAC SNMP Trap Alert Feature The RAC SNMP trap alerting feature allows SNMP trap listener configurations to receive traps for system events that occur on the managed system. The following example shows how a user can test the SNMP trap alert feature of the RAC.
racadm config -g cfgLanNetworking -o cfgNicGateway 192.168.0.120 racadm config -g cfgLanNetworking -o cfgNicUseDHCP 0 racadm config -g cfgLanNetworking -o cfgDNSServersFromDHCP 0 racadm config -g cfgLanNetworking -o cfgDNSServer1 192.168.0.5 racadm config -g cfgLanNetworking -o cfgDNSServer2 192.168.0.
Frequently Asked Questions Table 9-4 lists the frequently asked questions and answers. Table 9-4. Using the serial and racadm Commands: Frequently Asked Questions Question Answer After performing a DRAC 5 reset (using the racadm You must wait until the DRAC 5 completes the racreset command), I issue a command and the reset before issuing another command.
Deploying Your Operating System Using VM-CLI The Virtual Media Command Line Interface (VM-CLI) utility is a command-line interface that provides Virtual Media features from the management station to the DRAC 5 in the remote system. Using VM-CLI and scripted methods, you can deploy your operating system on multiple remote systems in your network. This section provides information on integrating the VM-CLI utility into your corporate network.
Creating a Bootable Image File Before you deploy your image file to the remote systems, ensure that a supported system can boot from the file. To test the image file, transfer the image file to a test system using the DRAC 5 Web user interface and then reboot the system. The following sections provide specific information for creating image files for Linux and Windows systems. Creating an Image File for Linux Systems Use the Data Duplicator utility to create a bootable image file for your Linux system.
4 Perform one of the following procedures: • Integrate RACADM and the Virtual Media command line interface (VM-CLI) into your existing operating system deployment application. Use the sample deployment script as a guide when integrating the DRAC 5 utilities into your existing operating system deployment application. • Use the existing vmdeploy script to deploy your operating system .
Deploying Your Operating System Using VM-CLI
Using the DRAC 5 SM-CLP Command Line Interface This section provides information about the Server Management Workgroup (SMWG) Server Management Command Line Protocol (SM-CLP) that is incorporated in the DRAC 5. NOTE: This section assumes that you are familiar with the Systems Management Architecture for Server Hardware (SMASH) Initiative and the SMWG SM-CLP specifications.For more information on these specifications, see the Distributed Management Task Force (DMTF) website at www.dmtf.org.
Table 11-1. Supported CLI Verbs (continued) Verb Definition show Displays the target properties, verbs, and subtargets. start Turns on a target. stop Shuts down a target. exit Exits from the SM-CLP shell session. version Displays the version attributes of a target. SM-CLP Management Operations and Targets The SM-CLP promotes the concept of verbs and targets to provide system management capabilities through the CLI.
Options Table 11-3 lists the supported SM-CLP options. Table 11-3. Supported SM-CLP Options SM-CLP Option Description -all Instructs the verb to perform all possible functions. -display Displays the user-defined data. -examine Instructs the command processor to validate the command syntax without executing the command. -help Displays command verb help. -version Displays the command verb version.
Table 11-4. Server Power Management Operations (continued) Operation Syntax Starting the SM-CLP management shell >smclp DRAC5 SM-CLP System Management Shell, version 1.0 Copyright (c) 2004-2006 Dell, Inc.
Table 11-5.
Table 11-5. SEL Management Operations (continued) Operation Syntax Viewing the SEL record ->show /system1/logs1/log1/record4 /system1/logs1/log1/record4: Properties: LogCreationClassName CreationClassName LogName RecordID MessageTimeStamp Description ElementName = = = = = = CIM_RecordLog CIM_LogRecord IPMI SEL 1 200506200100512.
Table 11-6. Map Target Navigation Operations (continued) Operation Syntax Move up one level ->cd .. Exiting the shell ->exit System Properties The Table 11-7 lists the system properties that are displayed when the user types the following: show /system1 These properties are derived from the Base System Profile that is provided by the standards body and is based on the CIM_ComputerSystem class as defined by the CIM schema. For additional information, see the DMTF CIM schema definitions. Table 11-7.
Table 11-7. System Properties (continued) Object Property Description Dedicated Enumeration indicating whether the system is a special-purpose system or general-purpose system.
Table 11-7. System Properties (continued) Object Property Description ResetCapability Defines the reset methods availablle on the system Values: 1=Other 2=Unknown 3=Disabled 4=Enabled 5=Not Implemented CreationClassName The superclass from which this instance is derived. EnabledState Indicates the enabled/disabled states of the system.
Table 11-7. System Properties (continued) Object Property Description RequestedState Indicates the last requested or desired state for the system. Values: 2=Enabled 3=Disabled 4=Shut Down 5=No Change 6=Offline 7=Test 8=Deferred 9=Quiesce 10=Reboot 11=Reset 12=Not Applicable HealthState Indicates the current health of the system.
Table 11-7. System Properties (continued) Object Property Description OperationalStatus Indicates the current status of the system. Values: 0=Unknown 1=Other 2=OK 3=Degraded 4=Stressed 5=Predictive Failure 6=Error 7=Non-Recoverable Error 8=Starting 9=Stopping 10=Stopped 11=In Service 12=No Contact 13=Lost Communication 14=Aborted 15=Dormant 16=Supporting Entity in Error 17=Completed 18=Power Mode Description A text-based description of the system.
Using the DRAC 5 SM-CLP Command Line Interface
Troubleshooting Troubleshooting the DRAC 5 See the following tables for help with troubleshooting the DRAC 5 and the RACADM: Table 6-8, "Using the DRAC 5 With Active Directory: Frequently Asked Questions" Table 7-7, "Using Console Redirection: Frequently Asked Questions" Table 8-2, "Using Virtual Media: Frequently Asked Questions" Table 9-4, "Using the serial and racadm Commands: Frequently Asked Questions" Troubleshooting 175
Troubleshooting
RACADM Subcommand Overview This section provides descriptions of the subcommands that are available in the RACADM command line interface. help NOTE: To use this command, you must have Log In DRAC 5 permission. Table A-1 describes the help command. Table A-1. Help Command Command Definition help Lists all of the subcommands available to use with racadm and provides a short description for each.
arp NOTE: To use this command, you must have Execute Diagnostic Commands permission. Table A-2 describes the arp command. Table A-2. arp Command Command Definition arp Displays the contents of the ARP table. ARP table entries may not be added or deleted. Synopsis racadm arp Supported Interfaces • Remote RACADM • telnet/ssh/serial RACADM clearasrscreen NOTE: To use this command, you must have Clear Logs permission. Table A-3 describes the clearasrscreen subcommand. Table A-3.
config NOTE: To use the getconfig command, you must have Log In DRAC 5 permission. Table A-4 describes the config and getconfig subcommands. Table A-4. config/getconfig Subcommand Definition config Configures the DRAC 5. getconfig Gets the DRAC 5 configuration data.
Table A-5. config Subcommand Options and Descriptions (continued) Option Description -o The -o , or object option, must be used with the -g option. This option specifies the object name that is written with the string . -i The -i , or index option, is only valid for indexed groups and can be used to specify a unique group. The is a decimal integer from 1 through 16. The index is specified here by the index value, not a "named" value.
Input Table A-6 describes the getconfig subcommand options. NOTE: The -f option will output the contents of the file to the terminal screen rather than writing to a file since no file system is available. Table A-6. getconfig Subcommand Options Option Description -f The -f option directs getconfig to write the entire RAC configuration to a configuration file. This file can be used for batch configuration operations using the config subcommand.
• racadm getconfig -f myrac.cfg Saves all group configuration objects from the RAC to myrac.cfg. • racadm getconfig -h Displays a list of the available configuration groups on the DRAC 5. • racadm getconfig -u root Displays the configuration properties for the user named root. • racadm getconfig -g cfgUserAdmin -i 2 -v Displays the user group instance at index 2 with verbose information for the property values.
If available, the coredump information is persistent across RAC power cycles and will remain available until either of the following conditions occur: • The coredump information is cleared with the coredumpdelete subcommand. • Another critical condition occurs on the RAC. In this case, the coredump information will be relative to the last critical error that occurred. See the coredumpdelete subcommand for more information about clearing the coredump.
fwupdate NOTE: To use this command, you must have Configure DRAC 5 permission. NOTE: Before you begin your firmware update, see "Updating the DRAC 5 Firmware" for additional instructions. Table A-9 describes the fwupdate subcommand. Table A-9. fwupdate Subcommand Definition fwupdate Updates the firmware on the DRAC 5.
Table A-10. fwupdate Subcommand Options (continued) Option Description -s The status option returns the current status of where you are in the update process. This option is always used by itself. -g The get option instructs the firmware to get the firmware update file from the TFTP server. The user must also specify the -a and -d options.
getssninfo NOTE: To use this command, you must have Log In To DRAC 5 permission. Table A-11 describes the getssninfo subcommand. Table A-11. getssninfo Subcommand Subcommand Definition getssninfo Retrieves session information for one or more currently active or pending sessions from the Session Manager's session table. Synopsis racadm getssninfo [-A] [-u | *] Description The getssninfo command returns a list of users that are connected to the DRAC.
Examples • racadm getssninfo Table A-13 provides an example of output from the racadm getssninfo command. Table A-13. getssninfo Subcommand Output Example User IP Address Type Consoles root 192.168.0.10 Telnet Virtual KVM • racadm getssninfo -A "root" 143.166.174.19 "Telnet" "NONE" • racadm getssninfo -A -u * "root" "143.166.174.19" "Telnet" "NONE" "bob" "143.166.174.19" "GUI" "NONE" getsysinfo NOTE: To use this command, you must have Log In To DRAC 5 permission.
Input Table A-15 describes the getsysinfo subcommand options. Table A-15. getsysinfo Subcommand Options Option Description -d Displays DRAC 5 information. -s Displays system information -w Displays watchdog information -A Eliminates the printing of headers/labels. If the -w option is not specified, then the other options are used as defaults. Output The getsysinfo subcommand displays information related to the RAC, managed system, and watchdog configuration.
BMC Firmware Version Service Tag Host Name OS Name Power Status = = = = = 0.17 48192 racdev103 Microsoft Windows Server 2003 OFF Watchdog Information: Recovery Action Present countdown value Initial countdown value = None = 0 seconds = 0 seconds Examples • racadm getsysinfo -A -s "System Information:" "PowerEdge 2900" "A08" "1.0" "EF23VQ-0023" "Hostname" "Microsoft Windows 2000 version 5.
getractime NOTE: To use this command, you must have Log In DRAC 5 permission. Table A-16 describes the getractime subcommand. Table A-16. getractime Subcommand Definition getractime Displays the current time from the remote access controller. Synopsis racadm getractime [-d] Description The getractime subcommand displays the time in the following format: • d — The yyyymmddhhmmss.mmmmmms string with no option is displayed in the same format as the UNIX date command.
ifconfig NOTE: To use this command, you must have Execute Diagnostic Commands or Configure DRAC 5 permission. Table A-17 describes the ifconfig subcommand. Table A-17. ifconfig Subcommand Definition ifconfig Displays the contents of the network interface table. Synopsis racadm ifconfig netstat NOTE: To use this command, you must have Execute Diagnostic Commands permission. Table A-18 describes the netstat subcommand. Table A-18.
ping NOTE: To use this command, you must have Execute Diagnostic Commands or Configure DRAC 5 permission. Table A-19 describes the ping subcommand. Table A-19. ping Subcommand Definition ping Verifies that the destination IP address is reachable from the DRAC 5 with the current routing-table contents. A destination IP address is required. An ICMP echo packet is sent to the destination IP address based on the current routing-table contents.
Description The setniccfg subcommand sets the controller IP address. • The -d option enables DHCP for the Ethernet management port (default is DHCP enabled). • The -s option enables static IP settings. The IP address, netmask, and gateway can be specified. Otherwise, the existing static settings are used. , , and must be typed as dot-separated strings. racadm setniccfg -s 192.168.0.120 255.255.255.0 192.168.0.
Sample Output The getniccfg subcommand will display an appropriate error message if the operation is not successful. Otherwise, on success, the output displayed in the following format: NIC Enabled = 1 DHCP Enabled = 1 IP Address = 192.168.0.1 Subnet Mask = 255.255.255.0 Gateway = 192.168.0.1 Supported Interfaces • Local RACADM • Remote RACADM • telnet/ssh/serial RACADM getsvctag NOTE: To use this command, you must have Log In To DRAC 5 permission.
Supported Interfaces • Local RACADM • Remote RACADM • telnet/ssh/serial RACADM racdump NOTE: To use this command, you must have Debug permission. Table A-23 describes the racdump subcommand. Table A-23. racdump Subcommand Definition racdump Displays status and general DRAC 5 information. Synopsis racadm racdump Description The racdump subcommand provides a single command to get dump, status, and general DRAC 5 board information.
Table A-24. racreset Subcommand Definition racreset Resets the DRAC 5. NOTICE: When you issue a racreset subcommand, the DRAC may require up to one minute to return to a usable state. Synopsis racadm racreset [hard | soft] Description The racreset subcommand issues a reset to the DRAC 5. The reset event is written into the DRAC 5 log. A hard reset performs a deep reset operation on the RAC. A hard reset should only be performed as a lastcase resort to recover the RAC.
racresetcfg NOTE: To use this command, you must have Configure DRAC 5 permission. Table A-26 describes the racresetcfg subcommand. Table A-26. racresetcfg Subcommand Definition racresetcfg Resets the entire RAC configuration to factory default values. Synopsis racadm racresetcfg Supported Interfaces • Local RACADM • Remote RACADM • telnet/ssh/serial RACADM Description The racresetcfg command removes all database property entries that have been configured by the user.
Synopsis racadm serveraction Description The serveraction subcommand enables users to perform power management operations on the host system. Table A-28 describes the serveraction power control options. Table A-28. serveraction Subcommand Options String Definition Specifies the action. The options for the string are: • powerdown — Powers down the managed system. • powerup — Powers up the managed system. • powercycle — Issues a power-cycle operation on the managed system.
Synopsis racadm getraclog -i racadm getraclog [-A] [-o] [-c count] [-s start-record] [-m] Description NOTE: The command name and the racadm subcommand names may be different. This is normal. The getraclog -i command displays the number of entries in the DRAC 5 log. The following options allow the getraclog command to read entries: • -A — Displays the output with no headers or labels. • -c — Provides the maximum count of entries to be returned.
Synopsis racadm clrraclog Description The clrraclog subcommand removes all existing records from the RAC log. A new single record is created to record the date and time when the log was cleared. getsel NOTE: To use this command, you must have Log In To DRAC 5 permission. Table A-30 describes the getsel command. Table A-30. getsel Command Definition getsel -i Displays the number of entries in the System Event Log. getsel Displays SEL entries.
Output The default output display shows the record number, timestamp, severity, and description. For example: Record: 1 Date/Time: 11/16/2005 22:40:43 Severity: 2 Description: System Board SEL: event log sensor for System Board, log cleared was asserted Supported Interfaces • Local RACADM • Remote RACADM • telnet/ssh/serial RACADM clrsel NOTE: To use this command, you must have Clear Logs permission.
gettracelog NOTE: To use this command, you must have Log In To DRAC 5 permission. Table A-31 describes the gettracelog subcommand. Table A-31. gettracelog Command Definition gettracelog -i Displays the number of entries in the DRAC 5 trace log. gettracelog Displays the DRAC 5 trace log. Synopsis racadm gettracelog -i racadm gettracelog [-A] [-o] [-c count] [-s startrecord] [-m] Description The gettracelog (without the -i option) command reads entries.
Supported Interfaces • Local RACADM • Remote RACADM • telnet/ssh/serial RACADM sslcsrgen NOTE: To use this command, you must have Configure DRAC 5 permission. Table A-32 describes the sslcsrgen subcommand. Table A-32. sslcsrgen Subcommand Description sslcsrgen Generates and downloads an SSL certificate signing request (CSR) from the RAC.
If no options are specified, a CSR is generated and downloaded to the local file system as sslcsr by default. The -g option cannot be used with the -s option, and the -f option can only be used with the -g option. The sslcsrgen -s subcommand returns one of the following status codes: • CSR was generated successfully. • CSR does not exist. • CSR generation in progress.
Options Table A-35 describes the sslcertupload subcommand options. Table A-35. sslcertupload Subcommand Options Option Description -t Specifies the type of certificate to upload, either the CA certificate or server certificate. 1 = server certificate 2 = CA certificate -f Specifies the file name of the certificate to be uploaded. If the file is not specified, the sslcert file in the current directory is selected.
Options Table A-37 describes the sslcertdownload subcommand options. Table A-37. sslcertdownload Subcommand Options Option Description -t Specifies the type of certificate to download, either the Microsoft® Active Directory® certificate or server certificate. 1 = server certificate 2 = Microsoft Active Directory certificate -f Specifies the file name of the certificate to be uploaded. If the -f option or the filename is not specified, the sslcert file in the current directory is selected.
Synopsis racadm sslcertview -t [-A] Options Table A-39 describes the sslcertview subcommand options. Table A-39. sslcertview Subcommand Options Option Description -t Specifies the type of certificate to view, either the Microsoft Active Directory certificate or server certificate. 1 = server certificate 2 = Microsoft Active Directory certificate -A Prevents printing headers/labels.
racadm sslcertview -t 1 00 US Texas Round Rock Dell Inc. Remote Access Group DRAC5 default certificate US Texas Round Rock Dell Inc. Remote Access Group DRAC5 default certificate Jul 8 16:21:56 2005 GMT Jul 7 16:21:56 2010 GMT Supported Interfaces • Local RACADM • Remote RACADM • telnet/ssh/serial RACADM testemail Table A-40 describes the testemail subcommand. Table A-40. testemail configuration Subcommand Description testemail Tests the RAC’s e-mail alerting feature.
Prior to executing the testemail command, ensure that the specified index in the RACADM cfgEmailAlert group is enabled and configured properly. Table Table A-41 provides a list and associated commands for the cfgEmailAlert group. Table A-41. testemail Configuration Action Command Enable the alert racadm config -g cfgEmailAlert -o cfgEmailAlertEnable -i 1 1 Set the destination e-mail address racadm config -g cfgEmailAlert -o cfgEmailAlertAddress -i 1 user1@mycompany.
testtrap NOTE: To use this command, you must have Test Alerts permission. Table A-43 describes the testtrap subcommand. Table A-43. testtrap Subcommand Description testtrap Tests the RAC’s SNMP trap alerting feature. Synopsis racadm testtrap -i Description The testtrap subcommand tests the RAC’s SNMP trap alerting feature by sending a test trap from the RAC to a specified destination trap listener on the network.
Supported Interfaces • Local RACADM • Remote RACADM • telnet/ssh/serial RACADM vmdisconnect NOTE: To use this command, you must have Access Virtual Media permission. Table A-46 describes the vmdisconnect subcommand. Table A-46. vmdisconnect Subcommand Description vmdisconnect Closes all open RAC virtual media connections from remote clients. Synopsis racadm vmdisconnect Description The vmdisconnect subcommand allows a user to disconnect another user's virtual media session.
vmkey NOTE: To use this command, you must have Access Virtual Media permission. Table A-47 describes the vmkey subcommand. Table A-47. vmkey Subcommand Description vmkey Performs virtual media key-related operations. Synopsis racadm vmkey If is configured as reset, the virtual flash memory is reset to the default size of 16 MB. Description When a custom virtual media key image is uploaded to the RAC, the key size becomes the image size.
DRAC 5 Property Database Group and Object Definitions The DRAC 5 property database contains the configuration information for the DRAC 5. Data is organized by associated object, and objects are organized by object group. The IDs for the groups and objects that the property database supports are listed in this section. Use the group and object IDs with the racadm utility to configure the DRAC 5. The following sections describe each object and indicate whether the object is readable, writable, or both.
idRacDescriptionInfo (Read Only) Legal Values String of up to 255 ASCII characters. Default "This system component provides a complete set of remote management functions for Dell PowerEdge servers." Description A text description of the RAC type. idRacVersionInfo (Read Only) Legal Values String of up to 63 ASCII characters. Default "1.0" Description A string containing the current product firmware version. idRacBuildInfo (Read Only) Legal Values String of up to 16 ASCII characters.
Default DRAC 5 Description A user assigned name to identify this controller. idRacType (Read Only) Default 6 Description Identifies the remote access controller type as the DRAC 5. cfgLanNetworking This group contains parameters to configure the DRAC 5 NIC. One instance of the group is allowed. All objects in this group will require the DRAC 5 NIC to be reset, which may cause a brief loss in connectivity.
Legal Values String of up to 254 ASCII characters. At least one of the characters must be alphabetic. Characters are restricted to alphanumeric, '-' and '.' NOTE: Microsoft® Active Directory® only supports Fully Qualified Domain Names (FQDN) of 64 bytes or fewer. Default "" Description The DNS domain name. This parameter is only valid if cfgDNSDomainNameFromDHCP is set to 0 (FALSE). cfgDNSRacName (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission.
cfgDNSServersFromDHCP (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 1 (TRUE) 0 (FALSE) Default 0 Description Specifies that the DNS server IP addresses should be assigned from the DHCP server on the network. cfgDNSServer1 (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values A string representing a valid IP address. For example: "192.168.0.20". Description Specifies the IP address for DNS server 1.
cfgNicEnable (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 1 (TRUE) 0 (FALSE) Default 0 Description Enables or disables the RAC network interface controller. If the NIC is disabled, the remote network interfaces to the RAC will no longer be accessible, and the RAC will only be available through the serial or local RACADM interfaces. cfgNicIpAddress (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission.
Description The subnet mask used for static assignment of the RAC IP address. This property is only valid if cfgNicUseDhcp is set to 0 (FALSE). cfgNicGateway (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. This parameter is only configurable if the cfgNicUseDhcp parameter is set to 0 (FALSE). Legal Values A string representing a valid gateway IP address. For example: "192.168.0.1". Default 192.168.0.
Legal Values 0 (shared) 1 (shared with failover) 2 (dedicated) Default 2 Description Specifies the current mode of operation for the RAC network interface controller (NIC). Table B-1 describes the supported modes. Table B-1. cfgNicSelection Supported Modes Mode Description Shared Used if the host server integrated NIC is shared with the RAC on the host server. This mode enables configurations to use the same IP address on the host server and the RAC for common accessibility on the network.
Legal Values 1 (TRUE) 0 (FALSE) Default 0 Description Enables or disables the VLAN capabilities of the RAC/BMC. cfgNicVLanId (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 0 – 4094 Default 0 Description Specifies the VLAN ID for the network VLAN configuration. This property is only valid if cfgNicVLanEnable is set to 1 (enabled). cfgNicVLanPriority (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission.
cfgRemoteHosts This group provides properties that allow configuration of various remote components, which include the SMTP server for email alerts and TFTP server IP addresses for firmware updates. cfgRhostsSmtpServerIpAddr (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values A string representing a valid SMTP server IP address. For example, 192.168.0.55. Default 0.0.0.0 Description The IP address of the network SMTP server.
Description Specifies the network TFTP server IP address that is used for TFTP RAC firmware update operations. cfgRhostsFwUpdatePath (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values String. Maximum length = 255. Default "" Description Specifies TFTP path where the RAC firmware image file exists on the TFTP server. The TFTP path is relative to the TFTP root path on the TFTP server.
Description The maximum privilege on the IPMI LAN channel. cfgUserAdminIpmiSerialPrivilege (Read/Write) NOTE: To modify this property, you must have Configure Users permission. Legal Values 2 (User) 3 (Operator) 4 (Administrator) 15 (No access) Default 4 (User 2) 15 (All others) Description The maximum privilege on the IPMI serial channel. cfgUserAdminPrivilege (Read/Write) NOTE: To modify this property, you must have Configure Users permission.
Table B-2. Bit Masks for User Privileges (continued) User Privilege Privilege Bit Mask Configure Users 0x0000004 Clear Logs 0x0000008 Execute Server Control Commands 0x0000010 Access Console Redirection 0x0000020 Access Virtual Media 0x0000040 Test Alerts 0x0000080 Execute Debug Commands 0x0000100 Examples Table B-3 provides sample privilege bit masks for users with one or more privileges. Table B-3.
Description The name of the user for this index. The user index is created by writing a string into this name field if the index is empty. Writing a string of double quotes ("") deletes the user at that index. You cannot change the name. You must delete and then recreate the name. The string must not contain "/" (forward slash, "\" (backslash), "." (period), "@" ("at" symbol) or quotations marks. NOTE: This property value MUST be unique from other user instances.
Legal Values 1 (TRUE) 0 (FALSE) Default 0 Description Enables or disables Serial Over LAN (SOL) user access. cfgEmailAlert This group contains parameters to configure the RAC e-mail alerting capabilities. The following subsections describe the objects in this group. Up to four instances of this group are allowed. cfgEmailAlertIndex (Read Only) Legal Values 1–4 Default This parameter is populated based on the existing instances. Description The unique index of an alert instance.
cfgEmailAlertAddress (Read Only) Legal Values E-mail address format, with a maximum length of 64 ASCII characters. Default "" Description The e-mail address of the alert source. cfgEmailAlertCustomMsg (Read Only) Legal Values String. Maximum Length = 32. Default "" Description Specifies a custom message that is sent with the alert. cfgSessionManagement This group contains parameters to configure the number of sessions that can connect to the DRAC 5. One instance of the group is allowed.
cfgSsnMgtRacadmTimeout (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 10 –1920 Default 30 Description Defines the idle timeout in seconds for the Remote RACADM interface. If a remote RACADM session remains inactive for more than the specified sessions, the session will be closed. cfgSsnMgtWebserverTimeout (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission.
Description Defines the Secure Shell idle time-out. This property sets the amount of time in seconds that a connection is allowed to remain idle (there is no user input). The session is cancelled if the time limit set by this property is reached. Changes to this setting do not affect the current session (you must log out and log in again to make the new settings effective).
Default 57600 Description Sets the baud rate on the DRAC 5 serial port. cfgSerialConsoleEnable (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 1 (TRUE) 0 (FALSE) Default 0 Description Enables or disables the RAC serial console interface. cfgSerialConsoleQuitKey (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values STRING MaxLen = 4 Default ^\ (<\>) NOTE: The "^" is the key.
cfgSerialConsoleIdleTimeout (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 0 = No time-out 60 – 1920 Default 300 Description The maximum number of seconds to wait before an idle serial session is disconnected. cfgSerialConsoleNoAuth (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission.
cfgSerialHistorySize (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 0 – 8192 Default 8192 Description Specifies the maximum size of the serial history buffer. cfgSerialSshEnable (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 1 (TRUE) 0 (FALSE) Default 1 Description Enables or disables the secure shell (SSH) interface on the DRAC 5.
cfgSerialCom2RedirEnable (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Default 1 Legal Values 1 (TRUE) 0 (FALSE) Description Enables or disables the console for COM 2 port redirection. cfgNetTuning This group enables users to configure the advanced network interface parameters for the RAC NIC. When configured, the updated settings may take up to a minute to become active. NOTICE: Use extra precaution when modifying properties in this group.
Legal Values 0 (10 MBit) 1 (100 MBit) Default 1 Description Specifies the speed to use for the RAC NIC. This property is not used if the cfgNetTuningNicAutoNeg is set to 1 (enabled). cfgNetTuningNicFullDuplex (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 0 (Half Duplex) 1 (Full Duplex) Default 1 Description Specifies the duplex setting for the RAC NIC. This property is not used if the cfgNetTuningNicAutoNeg is set to 1 (enabled).
cfgNetTuningTcpSrttDflt (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 6 – 384 Default 6 Description The smoothed round trip time-out base default value for TCP retransmission round trip time in ½ second units. (Type hexadecimal values.) cfgOobSnmp The group contains parameters to configure the SNMP agent and trap capabilities of the DRAC 5. One instance of the group is allowed. The following subsections describe the objects in this group.
Description Enables or disables the SNMP agent in the RAC. cfgRacTuning This group is used to configure various RAC configuration properties, such as valid ports and security port restrictions. cfgRacTuneHttpPort (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 10 – 65535 Default 80 Description Specifies the port number to use for HTTP network communication with the RAC.
Default 0 Description Enables or disables the IP Address Range validation feature of the RAC. cfgRacTuneIpRangeAddr NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values String, IP address formatted. For example, 192.168.0.44. Default 192.168.1.1 Description Specifies the acceptable IP address bit patter in positions determined by the 1's in the range mask property (cfgRacTuneIpRangeMask).
Default 0 Description Enables or disables the IP address blocking feature of the RAC. cfgRacTuneIpBlkFailcount NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 2 – 16 Default 5 Description The maximum number of login failure to occur within the window before the login attempts from the IP address are rejected. cfgRacTuneIpBlkFailWindow NOTE: To modify this property, you must have Configure DRAC 5 permission.
Default 300 Description Defines the timespan in seconds that session requests from an IP address with excessive failures are rejected. cfgRacTuneSshPort (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 1 – 65535 Default 22 Description Specifies the port number used for the RAC SSH interface. cfgRacTuneTelnetPort (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission.
Default 1 Description Enables or disables the Remote RACADM interface in the RAC. cfgRacTuneConRedirEncryptEnable (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 1 (TRUE) 0 (FALSE) Default 0 Description Encrypts the video in a console redirection session. cfgRacTuneConRedirPort (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission.
Default 5901 Description Specifies the port to be used for video traffic during Console Redirection activity with the RAC. NOTE: This object requires a DRAC 5 reset before it becomes active. cfgRacTuneAsrEnable (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 1 – 65535 Default 5901 Description Enables or disables the crash screen capture feature of the RAC. NOTE: This object requires a DRAC 5 reset before it becomes active.
Default 0 Description Specifies the timezone offset (in minutes) from GMT/UTC to use for the RAC Time. Some common timezone offsets for timezones in the United States are shown below: -480 (PST — Pacific Standard Time) -420 (MST — Mountain Standard Time) -360 (CST — Central Standard Time) -300 (EST — Eastern Standard Time) cfgRacTuneWebserverEnable (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission.
Default "" Description The host name of the managed system. ifcRacMnOsOsName (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values String. Maximum Length = 255. Default "" Description The operating system name of the managed system. cfgRacSecurity This group is used to configure settings related to the RAC SSL certificate signing request (CSR) feature. The properties in this group MUST be configured prior to generating a CSR from the RAC.
Legal Values String. Maximum Length = 254. Default "" Description Specifies the CSR Organization Name (O). cfgSecCsrOrganizationUnit (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values String. Maximum Length = 254. Default "" Description Specifies the CSR Organization Unit (OU). cfgSecCsrLocalityName (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values String. Maximum Length = 254.
Default "" Description Specifies the CSR State Name (S). cfgSecCsrCountryCode (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values String. Maximum Length = 2. Default "" Description Specifies the CSR Country Code (CC) cfgSecCsrEmailAddr (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values String. Maximum Length = 254. Default "" Description Specifies the CSR Email Address.
Default 1024 Description Specifies the SSL asymmetric key size for the CSR. cfgRacVirtual This group contains parameters to configure the DRAC 5 Virtual Media feature. One instance of the group is allowed. The following subsections describe the objects in this group. cfgVirMediaAttached (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission.
Description Specifies the port number used for encrypted virtual media connections to the RAC. cfgVirAtapiSrvPortSsl (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values Any unused port number between 0 and 65535 decimal. Default 3669 Description Sets the port used for SSL Virtual Media connections. cfgVirMediaKeyEnable (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission.
Description Enables or disables the virtual media boot-once feature of the RAC. If this property is enabled when the host server is rebooted, this feature will attempt to boot from the virtual media devices—if the appropriate media is installed in the device. cfgActiveDirectory This group contains parameters to configure the DRAC 5 Active Directory feature. cfgADRacDomain (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission.
Default 0 Description Enables or disables Active Directory user authentication on the RAC. If this property is disabled, local RAC authentication is used for user logins instead. cfgADAuthTimeout (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 15 – 300 Default 120 Description Specifies the number of seconds to wait for Active Directory authentication requests to complete before timing out.
Legal Values 0 (Terminal) 1 (Basic) Default 1 Description When the DRAC 5 cfgSerialConsoleEnable property is set to 0 (disabled), the DRAC 5 serial port becomes the IPMI serial port. This property determines the IPMI defined mode of the serial port. In Basic mode, the port uses binary data with the intent of communicating with an application program on the serial client. In Terminal mode, the port assumes that a dumb ASCII terminal is connected and allows very simple commands to be entered.
Description Specifies the maximum privilege level allowed on the IPMI serial channel. cfgIpmiSerialFlowControl (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 0 (None) 1 (CTS/RTS) 2 (XON/XOFF) Default 1 Description Specifies the flow control setting for the IPMI serial port. cfgIpmiSerialHandshakeControl (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission.
Default 1 Description Enables or disables line editing on the IPMI serial interface. cfgIpmiSerialEchoControl (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 0 (FALSE) 1 (TRUE) Default 1 Description Enables or disables echo control on the IPMI serial interface. cfgIpmiSerialDeleteControl (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission.
2 (NULL) 3 () 4 () 5 () Default 1 Description Specifies the newline sequence specification for the IPMI serial interface. cfgIpmiSerialInputNewLineSequence(Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 0 () 1 (NULL) Default 1 Description Specifies the input newline sequence specification for the IPMI serial interface. cfgIpmiSol This group is used to configure the Serial-Over-LAN capabilities of the system.
Description Enables or disables Serial Over LAN (SOL). cfgIpmiSolBaudRate (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 9600, 19200, 57600, 115200 Default 57600 Description The baud rate for serial communication over LAN. cfgIpmiSolMinPrivilege (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission.
Description Specifies the typical amount of time that the BMC waits before transmitting a partial SOL character data packet. This value is 1-based 5ms increments. cfgIpmiSolSendThreshold (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 1 – 255 Default 255 Description The SOL threshold limit value. cfgIpmiLan This group is used to configure the IPMI-Over-LAN capabilities of the system.
Legal Values 2 (User) 3 (Operator) 4 (Administrator) Default 0 Description Specifies the maximum privilege level allowed for IPMI over LAN access. cfgIpmiLanAlertEnable (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 0 (FALSE) 1 (TRUE) Default 1 Description Enables or disables global email alerting. This property overrides all individual email alerting enable/disable properties.
cfgIpmiPetCommunityName (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values A string up to 18 characters. Default "public" Description The SNMP community name for traps. cfgIpmiPef This group is used to configure the platform event filters available on the managed server. The event filters can be used to control policy related to actions that are triggered when critical events occur on the managed system.
Description Specifies the index of a specific platform event filter. cfgIpmiPefAction (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 0 (None) 1 (Power Down) 2 (Reset) 3 (Power Cycle) Default 0 Description Specifies the action that is performed on the managed system when the alert is triggered. cfgIpmiPefEnable (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values 1–4 Default The appropriate index value. Description Unique identifier for the index corresponding to the trap. cfgIpmiPetAlertDestIpAddr (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values String representing a valid IP address. For example, 192.168.0.67. Default 0.0.0.0 Description Specifies the destination IP address for the trap receiver on the network.
Supported RACADM Interfaces The following table provides an overview of RACADM subcommands and their corresponding interface support. Table C-1.
Table C-1.
Glossary AGP Abbreviation for accelerated graphics port, which is a bus specification that allows graphics cards faster access to main system memory. your CSR, they review and verify the information the CSR contains. If the applicant meets the CA’s security standards, the CA issues a certificate to the applicant that uniquely identifies that applicant for transactions over networks and on the Internet.
dynamically allocate IP addresses to computers on a local area network. GRUB Acronym for GRand Unified Bootloader, a new and commonly-used Linux loader. DLL Abbreviation for Dynamic Link Library, which is a library of small programs, any of which can be called when needed by a larger program that is running in the system. The small program that lets the larger program communicate with a specific device such as a printer or scanner is often packaged as a DLL program (or file).
LAN NAS Abbreviation for local area network. Abbreviation for network attached storage. LDAP NIC Abbreviation for Lightweight Directory Access Protocol. Abbreviation for network interface card. An adapter circuit board installed in a computer to provide a physical connection to a network. LED Abbreviation for light-emitting diode. OID Abbreviation for Object Identifiers. LOM Abbreviation for Local area network On Motherboard.
ROM SNMP trap Acronym for read-only memory, which is memory from which data may be read, but to which data cannot be written. A notification (event) generated by the DRAC 5 or the BMC that contains information about state changes on the managed system or about potential hardware problems. RPM Abbreviation for Red Hat Package Manager, which is a package-management system for the Red Hat Enterprise Linux operating system that helps installation of software packages.
VNC Abbreviation for virtual network computing. VT-100 Abbreviation for Video Terminal 100, which is used by the most common terminal emulation programs. WAN Abbreviation for wide area network.
Glossary
Index A Active Directory adding DRAC 5 users, 109 configuring access to the DRAC 5, 104 configuring and managing certificates, 73 extending schemas, 104 logging in to the DRAC 5, 115 objects, 100 schema extensions, 99 using with the DRAC 5, 99 certificates Active Directory, 73 exporting the root CA certificate, 112 SSL and digital, 76 uploading a server certificate, 79 viewing a server certificate, 79 command line console features, 45 configuration file creating, 150 alerts troubleshooting, 98 connect co
Index frequently asked questions managing and recovering a remote system, 87 using console redirection, 125 using serial and RACADM commands, 158 using the DRAC 5 with Active Directory, 116 using Virtual Media, 142 N last crash screen capturing on the managed system, 28 network properties configuring manually, 156 configuring using racadm, 156 Linux XTerm configuring for telnet console redirection, 61 O M H hardware installing, 25 hardware specifications, 18 connectors, 18 DRAC 5 ports, 19 powe
property database groups (continued) cfgIpmiLan, 256 cfgIpmiPef, 258 cfgIpmiPet, 259 cfgIpmiSerial, 250 cfgIpmiSol, 254 cfgLanNetworking, 215 cfgNetTuning, 234 cfgOobSnmp, 236 cfgRacSecurity, 244 cfgRacTuning, 237 cfgRacVirtual, 247 cfgRemoteHosts, 222 cfgSerial, 230 cfgSessionManagement, 228 cfgUserAdmin, 223 idRacInfo, 213 R RAC serial configuring, 80 RAC serial interface about, 47 RACADM attaching virtual media, 135 configuring serial and telnet, 52 detaching virtual media, 135 installing and removing,
Index Server Management Command Line Protocol (SM-CLP) about, 163 support, 163 services configuring, 84 snap-in installing the Dell extension, 108 software configuring, 27 installing, 27 sslcertdownload, 205 system configuring to use a DRAC 5, 26 T telnet console using, 63 terminal mode configuring, 80-81 troubleshooting, 175 basic, 175 272 Index V W video viewer accessing the viewer menu bar, 122 using, 122 web browser configuring, 30 supported browsers, 21 virtual flash configuring, 137 disa