Dell™ Remote Access Controller 5 Firmware Version 1.0 User’s Guide w w w. d e l l . c o m | s u p p o r t . d e l l .
Notes, Notices, and Cautions NOTE: A NOTE indicates important information that helps you make better use of your computer. NOTICE: A NOTICE indicates either potential damage to hardware or loss of data and tells you how to avoid the problem. CAUTION: A CAUTION indicates potential for property damage, personal injury, or death ____________________ Information in this document is subject to change without notice. © 2006 Dell Inc. All rights reserved.
Contents 1 DRAC 5 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . What’s New in DRAC 5 in this Release? . . . . . . . . . . . . . . . . . . . . . 17 . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 Hardware Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 Power Requirements Connectors . . . . . DRAC 5 Ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Installing the Software on the Management Station . . . . . . . . . . . . . . Configuring Your Red Hat Enterprise Linux (Version 4) Management Station . . . . . . . . . . . . . . . . . . . . . . . . . Installing and Removing RACADM on a Linux Management Station Installing RACADM . . . . . . . . . . . . . . . . . . . . . . . . . . Configuring a Supported Web Browser . . . . 30 30 30 . . . . . . . . . . . . . . . . . . . . 31 Configuring Your Web Browser to Connect to the Web-Based Interface . . . . .
3 Configuring and Using the DRAC 5 Command Line Console . . . . . . . . . . . . . . . . . . . . . . . . Command Line Console Features . . . . . . . . . 47 . . . . . . . . . . . . . . . . . . . . . . . . 47 Enabling and Configuring the Managed System to Use a Serial or Telnet Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48 . . . . . . . . . . 48 48 49 51 53 . . . . . 54 . . . . . . . . . . . . . . . . . . . . . . . . . .
Adding and Configuring DRAC 5 Users . . . . . . . . . . . . . . . . . . . . . Configuring and Managing Active Directory Certificates Configuring Active Directory . . . . . . . . . Uploading an Active Directory CA Certificate Downloading a DRAC Server Certificate . . . Viewing an Active Directory CA Certificate . . . . . . . . . . . . 75 . . . . . . . . . . . . . . . 75 76 77 77 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Troubleshooting Network Problems . Troubleshooting Alerting Problems 6 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Using the DRAC 5 With Microsoft Active Directory . Active Directory Schema Extensions 101 . . . . . . . . . . . . . . . . . . . . . 101 . . . . . . . . . . . . . . . . . . 102 . . . . . . . . . . . . . . . . . . . . . . 102 . . . . . . . . . . . . 106 . . . . . . . . . . . . . . . . . . . 106 . . . . . . . . . . . . . . . . . . . . .
7 Using GUI Console Redirection . Overview . . . . . . . . . . . . . . . . . . . 121 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121 Using Console Redirection . . . . . . . . . . . . . . . . . . . . . . . . . . Supported Screen Resolutions Refresh Rates on the Managed System . . . . . . . . . . . . . . . . . . . Configuring Your Management Station . . . . . . . . Configuring Console Redirection . . . . . . . . . . . Opening a Console Redirection Session . . . . . . .
Using the Virtual Media Command Line Interface Utility . . . . . . . . . . . 140 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141 141 142 142 144 . . . . . . . . . . . . . . . . . . . . . . . . . 145 Supported Operating Systems . . . . . Utility Installation . . . . . . . . . . . . Command Line Options . . . . . . . . . VM-CLI Parameters . . . . . . . . . . . VM-CLI Operating System Shell Options Frequently Asked Questions . 9 . . . . . . . . . . . . . . . . . . . . . . . .
Deploying Your Operating System Using VM-CLI . Before You Begin . . . . . . . 163 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163 . . . . . . . . . . . . . . . . . . . . . . 163 163 . . . . . . . . . . . . . . . . . . . . . . . . 164 Remote System Requirements Network Requirements . . . . Creating a Bootable Image File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164 164 . . . . . . . . . . . . . . . . . . . . . . . . . . .
getssninfo . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190 getsysinfo . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191 getractime . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
B DRAC 5 Property Database Group and Object Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217 Displayable Characters idRacInfo . . . . . . . . . . . . . . . . . . . . . 217 218 218 218 218 219 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219 idRacProductInfo (Read Only) . .
cfgUserAdminUserName (Read/Write) . cfgUserAdminPassword (Write Only) . cfgUserAdminEnable . . . . . . . . . . cfgUserAdminSolEnable . . . . . . . . cfgEmailAlert . . . . . . . . . . . . . . . . . . 229 230 230 230 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231 231 232 232 . . . . . . . . . . . . . . . . . . . . . . . . . . . 232 cfgEmailAlertIndex (Read Only) . . .
cfgRacTuning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ifcRacManagedNodeOs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248 Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
cfgActiveDirectory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . cfgIpmiSerial . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255 255 255 256 256 257 257 257 258 258 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
cfgIpmiPet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265 . . . . . . . . . . . . . . . . . . . . . . . 267 C Supported RACADM Interfaces D Browser Pre-installation Obtain Plugin Installation Package Contents . . . . . . . . . . . . . . . . 267 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269 . . . . . .
DRAC 5 Overview The Dell™ Remote Access Controller 5 (DRAC 5) is a systems management hardware and software solution designed to provide remote management capabilities, crashed system recovery, and power control functions for Dell PowerEdge™ systems. By communicating with the system’s baseboard management controller (BMC), the DRAC 5 (when installed) can be configured to send you email alerts for warnings or errors related to voltages, temperatures, intrusion, and fan speeds.
Figure 1-1. DRAC 5 Hardware Features 44-pin MII cable connector 50-pin management cable connector RJ-45 Connector Hardware Specifications Power Requirements Table 1-1 lists the power requirements for the DRAC 5. Table 1-1. DRAC 5 Power Requirements System Power 1.2 A on +3.3 V AUX (maximum) 550 mA on +3.
Using the management and MII cables, you can configure your DRAC in three separate modes, depending on your needs. See "DRAC Modes" in "Using the RACADM Command Line Interface" for more information. DRAC 5 Ports Table 1-2 identifies the ports used by the DRAC 5 that listen for a server connection. Table 1-3 identifies the ports that the DRAC 5 uses as a client. This information is required when opening firewalls for remote access to a DRAC 5. Table 1-2.
Supported Remote Access Connections Table 1-4 lists the connection features. Table 1-4.
• 2900 • 2950 See the Dell PowerEdge Compatibility Guide located on the Dell Support website at support.dell.com for the latest supported platforms. Supported Operating Systems Table 1-5 lists the operating systems that support the DRAC 5. See the Dell OpenManage™ Server Administrator Compatibility Guide located on the Dell Support website at support.dell.com for the latest information. Table 1-5.
Table 1-6. Supported Web Browsers Operating System Supported Web Browser Microsoft Windows Internet Explorer 6.0 (32-bit) with Service Pack 1 (SP1) or later. To view localized versions of the DRAC 5 Web-based interface: 1 Open the Windows Control Panel. 2 Double-click the Regional Options icon. 3 Select the desired locale from the Your locale (location) drop-down menu. NOTICE: If you are running the Virtual Media client, you must use Internet Explorer 6.0 with Service Pack 1 or later.
Features The DRAC 5 provides the following features: • Dynamic Domain Name System (DNS) registration • Remote system management and monitoring using a Web-based interface, serial connection, remote RACADM, or telnet connection. • Support for Active Directory authentication — Centralizes all DRAC 5 user ID and passwords in Active Directory using a Dell schema extension and snap-in tool. • Console Redirection — Provides remote system keyboard, video, and mouse functions.
• The Dell OpenManage Baseboard Management Controller Utilities User’s Guide provides information about configuring the Baseboard Management Controller (BMC), configuring your managed system using the BMC Management Utility, and additional BMC information. • The Dell Update Packages User's Guide provides information about obtaining and using Dell Update Packages as part of your system update strategy.
Installing and Setting Up the DRAC 5 This section provides information about how to install and setup your DRAC 5 hardware and software.
Configuring Your System to Use a DRAC 5 To configure your system to use a DRAC 5, use the Dell Remote Access Configuration Utility (formerly known as the BMC Setup Module). To run the Dell Remote Access Configuration Utility, perform the following steps: 1 Turn on or restart your system. 2 Press when prompted during POST. If your operating system begins to load before you press , allow the system to finish booting, and then restart your system and try again. 3 Configure the NIC.
5 Press . 6 Select Save Changes and Exit. The system automatically reboots. NOTE: When viewing the Web user interface on a Dell PowerEdge 1900 system that is configured with one NIC, the NIC Configuration page displays two NICs (NIC1 and NIC2). This behavior is normal. The PowerEdge 1900 system (and other PowerEdge systems that are configured with a single LAN On Motherboard) can be configured with NIC teaming. Shared and Teamed modes work independently on these systems.
6 Update the DRAC 5 Firmware. See "Updating the DRAC 5 Firmware." 7 Access the DRAC 5 through a network. See "Accessing the DRAC 5 Through a Network." Installing the Software on the Managed System Installing software on the managed system is optional. Without managed system software, you lose the ability to use the RACADM locally, and for the RAC to capture the last crash screen.
Disabling the Windows Automatic Reboot Option To ensure that the DRAC 5 Web-based interface last crash screen feature works properly, disable the Automatic Reboot option on managed systems running the Microsoft Windows Server 2003 and Windows 2000 Server operating systems. Disabling the Automatic Reboot Option in Windows Server 2003 1 Open the Windows Control Panel and double-click the System icon. 2 Click the Advanced tab. 3 Under Startup and Recovery, click Settings.
Configuring Your Red Hat Enterprise Linux (Version 4) Management Station The Dell Digital KVM Viewer requires additional configuration to run on a Red Hat Enterprise Linux (version 4) management station. When you install the Red Hat Enterprise Linux (version 4) operating system on your management station, perform the following procedures: • When prompted to add or remove packages, install the optional Legacy Software Development software.
Configuring a Supported Web Browser The following sections provide instructions for configuring the supported Web browsers. For a list of supported Web browsers, see "Supported Web Browsers." Configuring Your Web Browser to Connect to the Web-Based Interface If you are connecting to the DRAC 5 Web-based interface from a management station that connects to the Internet through a proxy server, you must configure the Web browser to access the Internet from this server.
• German • Spanish • Japanese • Simplified Chinese To view a localized version of the DRAC 5 Web-based interface in Internet Explorer, perform the following steps: 1 Click the Tools menu and select Internet Options. 2 In the Internet Options window, click Languages. 3 In the Language Preference window, click Add. 4 In the Add Language window, select a supported language. To select more than one language, press .
3 If the values include “zh_CN.UTF-8”, no changes are required. If the values do not include “zh_CN.UTF-8”, go to step 4. 4 Navigate to the /etc/sysconfig/i18n file. 5 In the file, apply the following changes: Current entry: LANG="zh_CN.GB18030" SUPPORTED="zh_CN.GB18030:zh_CH.GB2312:zh_CN:zh" Updated entry: LANG="zh_CN.UTF-8" SUPPORTED="zh_CN.UTF-8:zh_CN.GB18030:zh_CH.GB2312:zh_CN:zh" 6 Log out and then login to the operating system. 7 Relaunch the DRAC 5.
Updating the DRAC 5 Firmware Use one of the following methods to update your DRAC 5 firmware. • Web-based Interface — See "Updating the DRAC 5 Firmware Using the Web-Based Interface." • RACADM CLI — See "fwupdate.
3 In the Firmware Update page in the Firmware Image field, type the path to the firmware image that you downloaded from support.dell.com or click Browse to navigate to the image. NOTE: If you are running Firefox, the text cursor does not appear in the Firmware Image field. For example: C:\Updates\V1.0\. The default firmware image name is firmimg.d5. 4 Click Update. The update may take several minutes to complete. When completed, a dialog box appears.
Table 2-1. DRAC 5 Interfaces (continued) Interface Description RACADM Provides remote access to the DRAC 5 using a command line interface. RACADM uses the managed system’s IP address to execute RACADM commands (RACADM remote capability option [-r]).
Configuring IPMI This section provides information about configuring and using the DRAC 5 IPMI interface. The interface includes the following: • IPMI over LAN • IPMI over Serial • Serial over LAN The DRAC5 is fully IPMI 2.0 compliant. You can configure the DRAC IPMI using your browser; using an open source utility, such as ipmitool; using the Dell OpenManage IPMI shell, ipmish; or using RACADM.
d Update the IPMI SOL baud rate. NOTE: To redirect the serial console over LAN, ensure that the SOL baud rate is identical to your managed system’s baud rate. e Click the Baud Rate drop-down menu, select the appropriate baud rate, and click Apply Changes. f Update the Minimum Required Privilege. This property defines the minimum user privilege that is required to use the Serial Over LAN feature. Click the Channel Privilege Level Limit drop-down menu, select User, Operator, or Administrator.
• New line sequences • Input new line sequences For more information about these properties, see the IPMI 2.0 specification. Configuring IPMI Using the RACADM CLI 1 Login to the remote system using any of the RACADM interfaces. See "Using RACADM." 2 Configure IPMI over LAN. Open a command prompt, type the following command, and press : racadm config -g cfgIpmiLan -o cfgIpmiLanEnable 1 NOTE: This setting determines the IPMI commands that can be executed from the IPMI over LAN interface.
At the command prompt, type the following command and press : racadm config -g cfgIpmiSol -o cfgIpmiSolMinPrivilege where is one of the following: • 2 (User) • 3 (Operator) • 4 (Administrator) For example, to configure the IPMI privileges to 2 (User), type the following command: racadm config -g cfgIpmiSol -o cfgIpmiSolMinPrivilege 2 b Update the IPMI SOL baud rate.
For example: racadm config -g cfgIpmiSerial -o cfgIpmiSerialBaudRate 57600 c Enable the IPMI serial hardware flow control. At the command prompt, type the following command and press : racadm config -g cfgIpmiSerial -o cfgIpmiSerialFlowControl 1 d Set the IPMI serial channel minimum privilege level.
Configuring Platform Events Platform event configuration provides a mechanism for configuring the remote access device to perform selected actions on certain event messages. These actions include reboot, power cycle, power off, and triggering an alert (Platform Events Trap [PET] and/or e-mail).
Configuring PEF Using the Web User Interface 1 Login to the remote system using a supported Web browser. See "Accessing the Web-Based Interface." 2 Click the Alert Management tab and then click Platform Events. 3 Enable global alerts. a Click Alert Management and select Platform Events. b Select the Enable Platform Event Filter Alert checkbox. 4 Under Platform Events Filters Configuration, select the Enable Platform Event Filter alerts check box and then click Apply Changes.
Configuring PET Configuring PET Using the Web User Interface 1 Login to the remote system using a supported Web browser. See "Accessing the Web-Based Interface." 2 Ensure that you followed the procedures in "Configuring PEF Using the Web User Interface." 3 Configure your PET policy. a In the Alert Management tab, click Traps Settings. b Under Destination Configuration Settings, configure the Community String field with the appropriate information and then click Apply Changes.
3 Configure your PET policy. At the command prompt, type the following command and press : racadm config -g cfgIpmiPet -o cfgIpmiPetAlertDestIPAddr -i 1 where 1 is the PET destination index and is the destination IP address of the system that receives the platform event alerts. 4 Configure the Community Name string.
Configuring E-Mail Alerts Using RACADM CLI 1 Enable your global alerts. Open a command prompt, type the following command, and press : racadm config -g cfgIpmiLan -o cfgIpmiLanAlertEnable 1 2 Enable e-mail alerts. At the command prompt, type the following commands and press after each command: racadm config -g cfgEmailAlert -o cfgEmailAlertEnable -i 1 1 where 1 and 1 are the e-mail destination index and the enable/disable selection, respectively.
Configuring and Using the DRAC 5 Command Line Console This section provides information about the DRAC 5 command line console (or serial/telnet/ssh console) features, and explains how to set up your system so you can perform systems management actions through the console.
Using the connect com2 Serial Command When using the connect com2 serial command, the following must be configured properly: • The Serial Communication→ Serial Port setting in the BIOS Setup program. • The DRAC configuration settings. When a telnet session is established to the DRAC 5 and these settings are incorrect, connect com2 may display a blank screen.
To configure the IPMI mode using RACADM, perform the following steps: 1 Disable the RAC serial interface. At the command prompt, type: racadm config -g cfgSerial -o cfgSerialConsoleEnable 0 2 Enable the appropriate IPMI mode. For example, at the command prompt, type: racadm config -g cfgIpmiSerial -o cfgIpmiSerialConnectionMode <0 or 1> See "DRAC 5 Property Database Group and Object Definitions" for more information.
Edit the /etc/grub.conf file as follows: 1 Locate the general setting sections in the file and add the following two new lines: serial --unit=1 --speed=57600 terminal --timeout=10 serial 2 Append two options to the kernel line: kernel ............. console=ttyS1,57600 3 If the /etc/grub.conf contains a splashimage directive, comment it out. Table 3-2 provides a sample /etc/grub.conf file that show the changes described in this procedure. Table 3-2. Sample File: /etc/grub.conf # grub.
When you edit the /etc/grub.conf file, use the following guidelines: 1 Disable GRUB's graphical interface and use the text-based interface; otherwise, the GRUB screen will not be displayed in RAC console redirection. To disable the graphical interface, comment out the line starting with splashimage.
Table 3-3. Sample File: /etc/innitab (continued) l0:0:wait:/etc/rc.d/rc l1:1:wait:/etc/rc.d/rc l2:2:wait:/etc/rc.d/rc l3:3:wait:/etc/rc.d/rc l4:4:wait:/etc/rc.d/rc l5:5:wait:/etc/rc.d/rc l6:6:wait:/etc/rc.d/rc 0 1 2 3 4 5 6 # Things to run in every runlevel. ud::once:/sbin/update # Trap CTRL-ALT-DELETE ca::ctrlaltdel:/sbin/shutdown -t3 -r now # When our UPS tells us power has failed, assume we have a few # minutes of power left. Schedule a shutdown for 2 minutes from now.
Table 3-4 shows a sample file with the new line. Table 3-4. Sample File: /etc/securetty vc/1 vc/2 vc/3 vc/4 vc/5 vc/6 vc/7 vc/8 vc/9 vc/10 vc/11 tty1 tty2 tty3 tty4 tty5 tty6 tty7 tty8 tty9 tty10 tty11 ttyS1 Enabling the DRAC 5 Serial/Telnet/SSH Console The serial/telnet/ssh console can be enabled locally or remotely. Enabling the Serial/Telnet/SSH Console Locally NOTE: You (the current user) must have Configure DRAC 5 permission in order to perform the steps in this section.
Enabling the Serial/Telnet/SSH Console Remotely To enable the serial/telnet/ssh console remotely, type the following remote RACADM commands from a command prompt: racadm -u -p -r config -g cfgSerial cfgSerialConsoleEnable 1 racadm -u -p -r config -g cfgSerial cfgSerialTelnetEnable 1 racadm -u -p -r config -g cfgSerial cfgSerialSshEnable 1 Using the RACADM Command to Configure the S
To enable your web server using Secure Shell (SSH), telnet or local RACADM, type the following command from a command prompt on a management station: racadm config -g cfgRacTuning -o cfgRacTuneWebServerEnable 1 Displaying Configuration Settings Table 3-5 provides the actions and related commands to display your configuration settings. To run the commands, open a command prompt on the managed system, type the command, and press . Table 3-5.
Only four SSH sessions are supported at any given time. The session timeout is controlled by the cfgSsnMgtSshIdleTimeout property as described in the "DRAC 5 Property Database Group and Object Definitions.
These features are disabled in the DRAC 5 default configuration. Use the following subcommand or the Web-based interface to enable these features. racadm config -g cfgRacTuning -o Additionally, use these features in conjunction with the appropriate session idle time-out values and a defined security plan for your network. The following subsections provide additional information about these features.
Enabling IP Filtering Below is an example command for IP filtering setup. See "Using RACADM" for more information about RACADM and RACADM commands. NOTE: The following RACADM commands block all IP addresses except 192.168.0.57) To restrict the login to a single IP address (for example, 192.168.0.57), use the full mask, as shown below. racadm config -g cfgRacTuning -o cfgRacTuneIpRangeEnable 1 racadm config -g cfgRacTuning -o cfgRacTuneIpRangeAddr 192.168.0.
Table 3-8 lists the user-defined parameters. Table 3-8. Login Retry Restriction Properties Property Definition cfgRacTuneIpBlkEnable Enables the IP blocking feature. When consecutive failures (cfgRacTuneIpBlkFailCount) from a single IP address are encountered within a specific amount of time (cfgRacTuneIpBlkFailWindow), all further attempts to establish a session from that address are rejected for a certain timespan (cfgRacTuneIpBlkPenaltyTime).
The serial console is available on the DRAC 5 through the managed system external serial connector. Only one serial client system (management station) may be active at any given time. The telnet and SSH consoles are available on the DRAC 5 through the DRAC modes (see "DRAC Modes"). Up to four telnet client systems and four SSH clients may connect at any given time. The management station connection to the managed system serial or telnet console requires management station terminal emulation software.
Configuring the Management Station Terminal Emulation Software Your DRAC 5 supports a serial or telnet text console from a management station running one of the following types of terminal emulation software: • Linux Minicom in an Xterm • Hilgraeve’s HyperTerminal Private Edition (version 6.3) • Linux Telnet in an Xterm • Microsoft® Telnet Perform the steps in the following subsections to configure your type of terminal software. If you are using Microsoft Telnet, configuration is not required.
13 When all specified fields are clear, press to exit the Modem Dialing and Parameter Setup menu. 14 Select Save setup as config_name and press . 15 Select Exit From Minicom and press . 16 At the command shell prompt, type minicom . 17 To expand the Minicom window to 80 x 25, drag the corner of the window. 18 Press , , to exit Minicom.
5 Click OK. 6 Click File → Properties, and then click the Settings tab. 7 Set the Telnet terminal ID: to ANSI. 8 Click Terminal Setup and set Screen Rows to 26. 9 Set Columns to 80 and click OK. Table 3-11. Management Station COM Port Settings Setting Description Required Setting Bits per second 57600 Data bits 8 Parity None Stop bits 1 Flow control Hardware The HyperTerminal window displays a command prompt such as [DRAC 5\root]#.
Enabling Microsoft Telnet for Telnet Console Redirection NOTE: Some telnet clients on Microsoft operating systems may not display the BIOS setup screen correctly when BIOS console redirection is set for VT100 emulation. If this issue occurs, update the display by changing BIOS console redirection to ANSI mode. To perform this procedure in the BIOS setup menu, select Console Redirection → Remote Terminal Type → ANSI. 1 Enable Telnet in Windows Component Services.
Using a Serial or Telnet Console Serial and telnet commands, and RACADM CLI can be typed in a serial or telnet console and executed on the server locally or remotely. The local RACADM CLI is installed for use by a root user only. For more information about the serial/telnet/ssh commands and RACADM CLI, see "Using the RACADM Command Line Interface.
Configuring and Using the DRAC 5 Command LIne Console
Configuring the DRAC 5 Using the Web User Interface The DRAC 5 provides a Web-based interface and RACADM (a command-line interface) that enables you to configure the DRAC 5 properties and users, perform remote management tasks, and troubleshoot a remote (managed) system for problems. For everyday systems management, use the DRAC 5 Web-based interface.
To log in, perform the following steps: 1 In the User Name field, type one of the following: • Your DRAC 5 user name. For example, The DRAC 5 user name for local users is case sensitive • Your Active Directory user name. For example, \, /, or @. Examples of an Active Directory user name are: dell.com\john_doe or john_doe@dell.com. The Active Directory user name is not case sensitive.
NOTE: If your managed system DRAC is configured in Shared or Shared with Failover mode and the DRAC is connected to a switch with Spanning Tree Protocol (STP) enabled, network clients will experience a 20-30 second delay in connectivity when the management station’s LOM link state changes during the STP convergence. 1 In the System tree, click Remote Access. 2 Click the Configuration tab and then click Network. 3 In the Network Configuration page, configure the DRAC 5 NIC settings.
Table 4-1. Network Settings (continued) Setting Description Register DRAC on DNS Registers the DRAC 5 name on the DNS server. The default setting is Disabled. DNS DRAC Name Displays the DRAC 5 name only when Register DRAC 5 on DNS is selected. The default DRAC 5 name is RAC-service tag, where service tag is the service tag number of the Dell server (for example, RAC-EK00002). Use DHCP for DNS Domain Name Uses the default DNS domain name.
Table 4-3. Network Configuration Page Buttons Button Description Print Prints the Network Configuration page Refresh Reloads the Network Configuration page Advanced Settings Displays the Network Security page. Apply Changes Saves the changes made to the network configuration. NOTE: Changes to the NIC IP address settings will close all user sessions and require users to reconnect to the DRAC 5 Web-based interface using the updated IP address settings.
Table 4-4. Network Security Page Settings (continued) Settings Description IP Blocking Penalty Time The time span in seconds within which login attempts from an IP address with excessive failures are rejected. Table 4-5. Network Security Page Buttons Button Description Print Prints the Network Security page Refresh Reloads the Network Security page Apply Changes Saves the changes made to the Network Security page. Go Back to Network Configuration Page Returns to the Network Configuration page.
Table 4-6. General Properties Property Description User ID Specifies one of 16 preset User ID numbers. If you are editing information for user root, this field is static. You cannot edit the username for root. Enable User Enables the user to access the DRAC 5. When unchecked, the User Name cannot be changed. User Name Specifies a DRAC 5 user name with up to 16 characters. Each user must have a unique user name. NOTE: User names on the local DRAC 5 cannot include the / (forward slash) or .
Table 4-8. DRAC User Privileges (continued) Property Description Configure Users Enables the user to allow specific users to access the system. Clear Logs Enables the user to clear the DRAC logs. Execute Server Control Commands Enables the user to execute racadm commands. Access Console Redirection Enables the user to run Console Redirection. Access Virtual Media Enables the user to run and use Virtual Media. Test Alerts Enables the user to send test alerts (e-mail and PET) to a specific user.
Configuring and Managing Active Directory Certificates NOTE: You must have Configure DRAC 5 permission to configure Active Directory and upload, download, and view an Active Directory certificate. Use the Microsoft® Active Directory® service to configure your software to provide access to the DRAC 5. The service allows you to add and control the DRAC5 user privileges of your existing users. See "Using the DRAC 5 With Microsoft Active Directory" for more information.
Table 4-13. Active Directory Configuration Page Settings Setting Description Enable Active Directory Enables Active Directory. Checked=Enabled; Unchecked=Disabled. DRAC Name The name that uniquely identifies the DRAC 5 card in Active Directory. This value is NULL by default. The name must be a 1-256 character ASCII string, with no blank spaces between characters. ROOT Domain Name The Active Directory ROOT domain name. This value is NULL by default.
Table 4-15. Certificate Upload Page Buttons Button Description Print Print the Certificate Upload page. Go Back to Active Directory Main Menu Return to the Active Directory Main Menu page. Apply Apply the certificate to the DRAC 5 firmware. Downloading a DRAC Server Certificate 1 In the Active Directory Main Menu page, select Download DRAC Server Certificate and click Next. 2 In the File Download window, click Save and save the file to a directory on your system.
Securing DRAC 5 Communications Using SSL and Digital Certificates This subsection provides information about the following data security features that are incorporated in your DRAC 5: • Secure Sockets Layer (SSL) • Certificate Signing Request (CSR) • Accessing the SSL main menu • Generating a new CSR • Uploading a server certificate • Viewing a server certificate Secure Sockets Layer (SSL) The DRAC includes a Web server that is configured to use the industry-standard SSL security protocol to tra
A Certificate Authority is a business entity that is recognized in the IT industry for meeting high standards of reliable screening, identification, and other important security criteria. Examples of CAs include Thawte and VeriSign. After the CA receives your CSR, they review and verify the information the CSR contains. If the applicant meets the CA’s security standards, the CA issues a certificate to the applicant that uniquely identifies that applicant for transactions over networks and on the Internet.
Generating a New Certificate Signing Request NOTE: Each new CSR overwrites any previous CSR on the firmware. Before a certificate authority (CA) can accept your CSR, the CSR in the firmware must match the certificate returned from the CA. Otherwise, the DRAC 5 will not upload the certificate. 1 In the SSL Main Menu page, select Generate a New Certificate Signing Request (CSR) and click Next. 2 In the Generate Certificate Signing Request (CSR) page, type a value for each CSR attribute value.
Table 4-21. Generate Certificate Signing Request (CSR) Page Buttons Button Description Print Print the Generate Certificate Signing Request (CSR) page. Go Back to Security Main Menu Return to the SSL Main Menu page. Generate Generate a CSR. Uploading a Server Certificate 1 In the SSL Main Menu page, select Upload Server Certificate and click Next. The Certificate Upload page appears.
Table 4-23. Certificate Information (continued) Field Description Valid From Issue date of the certificate Valid To Expiration date of the certificate Table 4-24. View Server Certificate Page Buttons Button Description Print Print the View Server Certificate page. Go Back to SSL Main Menu Return to the SSL Main Menu page. Configuring Serial and Terminal Modes Configuring IPMI and RAC Serial 1 Expand the System tree and click Remote Access. 2 Click the Configuration tab and then click Serial.
Table 4-26. RAC Serial Settings Setting Description Enabled Enables or disables the RAC serial console. Checked=Enabled; Unchecked=Disabled Maximum Sessions The maximum number of simultaneous sessions allowed for this system. Timeout The maximum number of seconds of line idle time before the line is disconnected. The range is 60 to 1920 seconds. Default is 300 seconds. Use 0 seconds to disable the Timeout feature. Redirect Enabled Enables or disables Console Redirection.
Table 4-28. Terminal Mode Settings Setting Description Line Editing Enables or disables line editing. Delete Control Select one of the following: • BMC outputs a character when or is received — • BMC outputs a character when or is received — Echo Control Enables or disables echo. Handshaking Control Enables or disables handshaking. New Line Sequence Select None, , , , , or .
5 Configure the advanced settings, if required. Otherwise, click the appropriate Serial Over LAN Configuration page button to continue (see Table 4-31). To configure the advanced settings, perform the following steps: a Click Advanced Settings. b In the Serial Over LAN Configuration Advanced Settings page, configure the advanced settings as required. See Table 4-32. c Click Apply Changes. d Click the appropriate Serial Over LAN Configuration Advanced Settings page button to continue. See Table 4-33.
Table 4-33. Serial Over LAN Configuration Advanced Settings Page Buttons Button Description Print Prints the Serial Over LAN Configuration Advanced Settings page. Refresh Refreshes the Serial Over LAN Configuration Advanced Settings page. Go Back To Serial Over LAN Returns to the Serial Over LAN Configuration page. Configuration Page Apply Changes Applies the Serial Over LAN Configuration Advanced Settings page settings.
Table 4-34. Web Server Settings (continued) Setting Description Active Sessions The number of current sessions on the system, less than or equal to the Max Sessions. Timeout The time in seconds that a connection is allowed to remain idle. The session is cancelled when the timeout is reached. Changes to the timeout setting do not affect the current session. When you change the timeout setting, you must log out and log in again to make the new setting effective. Timeout range is 60 to 1920 seconds.
Table 4-37. Remote RACADM Settings Setting Description Enabled Enables or disables remote RACADM. Checked=Enabled; Unchecked= Disabled. Max Sessions The maximum number of simultaneous sessions allowed for this system. Up to four sessions are supported. Active Sessions The number of current sessions on the system, less than or equal to the Max Sessions. Table 4-38. SNMP Agent Settings Setting Description Enabled Enables or disables the SNMP agent. Checked=Enabled; Unchecked= Disabled.
Frequently Asked Questions Table 4-41 lists frequently asked questions and answers. Table 4-41. Managing and Recovering a Remote System: Frequently Asked Questions Question Answer When accessing the DRAC 5 Web-based interface, I get a security warning stating the hostname of the SSL certificate does not match the hostname of the DRAC 5. The DRAC 5 includes a default DRAC 5 server certificate to ensure network security for the Web-based interface and remote racadm features.
Table 4-41. Managing and Recovering a Remote System: Frequently Asked Questions (continued) Question Answer Why are the remote racadm and Web-based services unavailable after a property change? It may take a minute for the remote RACADM services and the Web-based interface to become available after the DRAC 5 Web server resets.
Table 4-41. Managing and Recovering a Remote System: Frequently Asked Questions (continued) Question Answer The following message is displayed for unknown reasons: As part of discovery, IT Assistant attempts to verify the device’s get and set community names. In IT Assistant, you have the get community name = public and the set community name = private. By default, the community name for the DRAC 5 agent is public.
Configuring the DRAC 5 Using the Web User Interface
Recovering and Troubleshooting the Managed System This section explains how to perform tasks related to recovering and troubleshooting a crashed remote system using the DRAC 5 Web-based interface. For information about troubleshooting your DRAC 5, see "Deploying Your Operating System Using VM-CLI.
To access the Power Management page from the System tree, click System and then click the Power Management tab. NOTE: You must have Execute Server Action Commands permission to perform power management actions. Selecting Power Control Actions 1 Select one of the following Power Control Actions. • Power On System— Turns on the system power (equivalent to pressing the power button when the system power is off).
Main System Chassis Table 5-2 and Table 5-3 describes the main system chassis properties. NOTE: To receive Host Name and OS Name information, you must have DRAC 5 services installed on the managed system. Table 5-2. System Information Fields Field Description Description System description. BIOS Version System BIOS version. Service Tag System Service Tag number. Host Name Host system’s name. OS Name Operating system running on the system. Table 5-3.
Baseboard Management Controller Table 5-5 describes the Baseboard Management Controller properties. Table 5-5. BMC Information Fields Field Description Name "Baseboard Management Controller". IPMI Version Intelligent Platform Management Interface (IPMI) version. Number of Possible Active Sessions Maximum number of session that can be active at the same time. Number of Current Active Sessions Total number of current active sessions. Firmware Version Version of the BMC firmware.
Table 5-7. SEL Page Buttons Button Action Print Prints the SEL in the sort order that it appears in the window. Clear Log Clears the SEL. NOTE: The Clear Log button appears only if you have Clear Logs permission. Save As Opens a pop-up window that enables you to save the SEL to a directory of your choice.
Using the RAC Log The RAC Log is a persistent log maintained in the DRAC 5 firmware. The log contains a list of user actions (such as log in, log out, and security policy changes) and alerts issued by the DRAC 5. The oldest entries are overwritten when the log becomes full. To access the RAC Log, perform the following steps: 1 In the System tree, click Remote Access. 2 Click the Logs tab and then click RAC Log. The RAC Log provides the information in Table 5-9. Table 5-9.
Using the Diagnostic Console The DRAC 5 provides a standard set of network diagnostic tools (see Table 5-11) that are similar to the tools included with Microsoft® Windows® or Linux-based systems. Using the DRAC 5 Web-based interface, you can access the network debugging tools. To access the Diagnostic Console page, perform the following steps: 1 In the System tree, click Remote Access. 2 Click the Diagnostics tab. Table 5-11 describes the options that are available on the Diagnostic Console page.
The trace log may also contain DRAC 5 firmware-specific error codes that are related to the internal DRAC 5 firmware, not the managed system’s operating system. NOTE: The DRAC 5 will not echo an ICMP (ping) with a packet size larger than 1500 bytes. Troubleshooting Alerting Problems Use logged SNMP trap information to troubleshoot a particular type of DRAC 5 alert. SNMP trap deliveries are logged in the Trace Log by default.
Using the DRAC 5 With Microsoft Active Directory A directory service maintains a common database of all information needed for controlling users, computers, printers, etc. on a network. If your company uses the Microsoft® Active Directory® service software, you can configure the software to provide access to the DRAC 5, allowing you to add and control DRAC 5 user privileges to your existing users in your Active Directory software.
Overview of the RAC Schema Extensions To provide the greatest flexibility in the multitude of customer environments, Dell provides a group of properties that can be configured by the user depending on the desired results. Dell has extended the schema to include an Association, Device, and Privilege property. The Association property is used to link together the users or groups with a specific set of privileges to one or more RAC devices.
Figure 6-1. Typical Setup for Active Directory Objects Association Object User(s) Group(s) Privilege Object RAC Device Object(s) RAC Privilege Object NOTE: The RAC privilege object applies to both DRAC 4 and DRAC 5. You can create as many or as few association objects as required.
Figure 6-2. Setting Up Active Directory Objects in a Single Domain AO1 Group1 User1 User2 AO2 Priv1 User3 Priv2 RAC1 RAC2 To configure the objects for the single domain scenario, perform the following tasks: 1 Create two Association Objects. 2 Create two RAC Device Objects, RAC1 and RAC2, to represent the two DRAC 5 cards. 3 Create two Privilege Objects, Priv1 and Priv2, in which Priv1 has all privileges (administrator) and Priv2 has login privileges. 4 Group user1 and user2 into Group1.
Figure 6-3. Setting Up Active Directory Objects in Multiple Domains Domain1 Domain2 AO1 Group1 User1 User2 AO2 Priv1 User3 Priv2 RAC1 RAC2 To configure the objects for the multiple domain scenario, perform the following tasks: 1 Ensure that the domain forest function is in Native or Windows 2003 mode. 2 Create two Association Objects, AO1 (of Universal scope) and AO2, in any domain. Figure 6-3 shows the objects in Domain2.
Configuring Active Directory to Access Your DRAC 5 Before using Active Directory to access your DRAC 5, configure the Active Directory software and the DRAC 5 by performing the following steps in order: 1 Extend the Active Directory schema (see "Extending the Active Directory Schema"). 2 Extend the Active Directory Users and Computers Snap-in (see "Installing the Dell Extension to the Active Directory Users and Computers Snap-In").
3 Select Use Current Log In Credentials or enter a user name and password with schema administrator rights. 4 Click Next to run the Dell Schema Extender. 5 Click Finish. The schema is extended.
Table 6-3. dellAssociationObject Class (continued) OID 1.2.840.113556.1.8000.1280.1.1.1.2 Class Type Structural Class SuperClasses Group Attributes dellProductMembers dellPrivilegeMember Table 6-4. dellRAC4Privileges Class OID 1.2.840.113556.1.8000.1280.1.1.1.3 Description Used to define the privileges (Authorization Rights) for the DRAC 5 device.
Table 6-6. dellProduct Class OID 1.2.840.113556.1.8000.1280.1.1.1.5 Description The main class from which all Dell products are derived. Class Type Structural Class SuperClasses Computer Attributes dellAssociationMembers Table 6-7. List of Attributes Added to the Active Directory Schema Attribute Name/Description Assigned OID/Syntax Object Identifier Single Valued dellPrivilegeMember 1.2.840.113556.1.8000.1280.1.1.2.
Table 6-7. List of Attributes Added to the Active Directory Schema (continued) Attribute Name/Description Assigned OID/Syntax Object Identifier Single Valued dellIsConsoleRedirectUser 1.2.840.113556.1.8000.1280.1.1.2.8 TRUE TRUE if the user has Console Redirection rights on the device. Boolean (LDAPTYPE_BOOLEAN 1.3.6.1.4.1.1466.115.121.1.7) dellIsVirtualMediaUser 1.2.840.113556.1.8000.1280.1.1.2.9 TRUE if the user has Virtual Media rights on the device. Boolean (LDAPTYPE_BOOLEAN 1.3.6.1.4.1.
When you install your systems management software using the Dell Systems Management Consoles CD, you can extend the snap-in by selecting the Dell Extension to the Active Directory User’s and Computers Snap-In option during the installation procedure. See the Dell OpenManage Software Quick Installation Guide for additional instructions about installing systems management software. For more information about the Active Directory User’s and Computers snap-in, see your Microsoft documentation.
Creating a RAC Device Object 1 In the MMC Console Root window, right-click a container. 2 Select New→ Dell RAC Object. The New Object window appears. 3 Type a name for the new object. The name must be identical to the DRAC 5 Name that you will type in step 7 of "Configuring the DRAC 5." 4 Select RAC Device Object. 5 Click OK. Creating a Privilege Object NOTE: A Privilege Object must be created in the same domain as the related Association Object. 1 In the Console Root (MMC) window, right-click a container.
Adding Objects to an Association Object Using the Association Object Properties window, you can associate users or user groups, privilege objects, and RAC devices or RAC device groups. If your system is running Windows 2000 mode or higher, use Universal Groups to span domains with your user or RAC objects. You can add groups of Users and RAC devices. The procedure for creating Dell-related groups and nonDell-related groups is identical.
d Select Enterprise root CA as CA Type and click Next. e Enter Common name for this CA, click Next, and click Finish. 2 Enable SSL on each of your domain controllers by installing the SSL certificate for each controller. a Click Start→ Administrative Tools→ Domain Security Policy. b Expand the Public Key Policies folder, right-click Automatic Certificate Request Settings and click Automatic Certificate Request.
d Click the Configuration tab, and then click Security. e In the Security Certificate Main Menu page, select Upload Server Certificate and click Apply. f In the Certificate Upload screen, perform one of the following procedures: g • Click Browse and select the certificate • In the Value field, type the path to the certificate. Click Apply.
6 Select the Enable Active Directory check box. 7 Type the DRAC Name. This name must be the same as the common name of the RAC object you created in your Domain Controller (see step 3 of "Creating a RAC Device Object"). 8 Type the Root Domain Name. The Root Domain Name is the fully qualified root domain name for the forest. 9 Type the DRAC Domain Name (for example, drac5.com). Do not use the NetBIOS name.
Configuring the DRAC 5 Active Directory Settings Using RACADM Using the following commands to configure the DRAC 5 Active Directory Feature using the RACADM instead of the Web-based interface.
where username is an ASCII string of 1–256 bytes. White space and special characters (such as \, /, or @) cannot be used in the user name or the domain name. NOTE: You cannot specify NetBIOS domain names, such as Americas, as these names cannot be resolved. Frequently Asked Questions Table 6-8 lists frequently asked questions and answers. Table 6-8.
Table 6-8. Using the DRAC 5 With Active Directory: Frequently Asked Questions (continued) Question What can I do if I cannot log into the DRAC 5 using Active Directory authentication? How do I troubleshoot the issue? Answer 1 Ensure that you use the correct user domain name during a login and not the NetBIOS name. 2 If you have a local DRAC user account, log into the DRAC 5 using your local credentials.
Using the DRAC 5 With Microsoft Active Directory
Using GUI Console Redirection This section provides information about using the DRAC 5 console redirection feature. Overview The DRAC 5 console redirection feature enables you to access the local console remotely in either graphic or text mode. Using console redirection, you can control one or more DRAC 5-enabled systems from one location. Today with the power of networking and the Internet, you do not have to sit in front of each server to perform all the routine maintenance.
Table 7-1. Supported Screen Resolutions and Refresh Rates Screen Resolution Refresh Rate (Hz) 720x400 70 640x480 60, 72, 75, 85 800x600 60, 70, 72, 75, 85 1024x768 60, 70, 72, 75, 85 1280x1024 60 Configuring Your Management Station To use Console Redirection on your management station, perform the following procedures: 1 Install and configure a supported Web browser.
Table 7-2. Console Redirection Configuration Page Information (continued) Information Description Video Port Number Default = 5901 Video Encryption Enabled Checked = Enabled; Unchecked=Disabled The buttons in Table 7-3 are available on the Console Redirection Configuration page. Table 7-3.
The buttons in Table 7-5 are available on the Console Redirection page. Table 7-5. Console Redirection Page Buttons Button Definition Refresh Reloads the Console Redirection Configuration page Connect Opens a console redirection session on the targeted remote system. 4 If a console redirection session is available, click Connect. NOTE: Multiple message boxes may appear after you launch the application.
Also, the menu bar can be activated by pressing the default function key . To reassign this function key to a new function, perform the following steps: 1 Press or move your mouse cursor to the top of the Video Viewer. 2 Press the "push pin" to lock the viewer menu bar. 3 In the viewer menu bar, click Tools and select Session Options. 4 In the Session Options window, click the General tab.
Table 7-6. Viewer Menu Bar Selections (continued) Menu Item Item Description Tools Automatic Video Adjust Recalibrates the session viewer video output. Manual Video Adjust Provides individual controls to manually adjust the session viewer video output. NOTE: Adjusting the horizontal position off-center desynchronizes the mouse pointers. Session Options Provides additional session viewer control adjustments.
• Reducing the Pixel Noise Ratio setting to zero causes multiple video refresh commands that generates excessive network traffic and flickering video in the Video Viewer window. Dell recommends that you adjust the Pixel Noise Ratio setting at a level that provides optimal system performance and pixel enhancement while minimizing network traffic.
Table 7-7. Using Console Redirection: Frequently Asked Questions (continued) Question Answer I cannot see the bottom of the system screen from the Console Redirection window. Ensure that the management station’s monitor resolution is set to 1280x1024. During Console Redirection, the mouse became locked after coming back from hibernation on a Windows Server 2003 system.
Table 7-7. Using Console Redirection: Frequently Asked Questions (continued) Question Answer Why doesn’t the vKVM Configure Console Redirection for the operating system that is running on mouse sync when I use the the target system. Dell PowerEdge Installation 1 In the vKVM toolbar menu, click Tools and select Session Options. and Server Management CD 2 In the Session Options window, click the Mouse tab.
Table 7-7. Using Console Redirection: Frequently Asked Questions (continued) Question Answer Why can't I see the bottom Ensure that the server screen resolution is 1280 x 1024 pixels at 60 Hz with of the server screen from the 128 colors.
Table 7-7. Using Console Redirection: Frequently Asked Questions (continued) Question Answer What are the minimum The management station requires an Intel Pentium III 500 MHz processor system requirements for my with at least 256 MB of RAM. management station to run console redirection? What are the maximum The DRAC 5 supports up to two simultaneous console redirection sessions.
Using GUI Console Redirection
Using and Configuring Virtual Media Overview The Virtual Media feature provides the managed system with a virtual CD drive, which can use standard media from anywhere on the network. Figure 8-1 shows the overall architecture of virtual media. Figure 8-1.
The managed system is configured with a DRAC 5 card. The virtual CD and floppy drives are two electronic devices embedded in the DRAC 5 that are controlled by the DRAC 5 firmware. These two devices are present on the managed system’s operating system and BIOS at all times, whether virtual media is connected or disconnected. The management station provides the physical media or image file across the network.
Installing the Virtual Media Plug-In The virtual media browser plug-in must be installed on your management station to use the virtual media feature. After you open the DRAC 5 user interface and launch the Virtual Media page, the browser automatically downloads the plug-in, if required. If the plug-in is successfully installed, the Virtual Media page displays a list of floppy diskettes and optical disks that connect to the virtual drive.
Running Virtual Media Using the Web User Interface Connecting Virtual Media 1 Open a supported Web browser on your management station. See "Supported Web Browsers." NOTICE: Console Redirection and Virtual Media only supports 32-bit Web browsers. Using 64-bit Web browsers may generate unexpected results or failure of operations. 2 Connect and log into the DRAC 5. See "Accessing the Web-Based Interface" for more information. 3 Click the Media tab and then click Virtual Media.
NOTE: The assigned virtual drive letter (for Microsoft® Windows® systems) or device special file (for Linux systems) may not be identical to the drive letter on your management console. NOTE: Virtual Media may not function properly on Windows operating system clients that are configured with Internet Explorer Enhanced Security. To resolve this issue, see your Microsoft operating system documentation or contact your administrator.
To Detach the virtual media feature, open a command prompt, type the following command, and press : racadm config -g cfgRacVirtual -o cfgVirMediaAttached 0 Booting From the Virtual Media On supported systems, the system BIOS enables you to boot from virtual optical drives or virtual floppy drives. During POST, enter the BIOS setup window and verify that the virtual drives are enabled and listed in the correct order. To change the BIOS setting, perform the following steps: 1 Boot the managed system.
Using Virtual Media When the Server’s Operating System Is Running Windows-Based Systems On Windows systems, the virtual media drives are automounted and configured with a drive letter. Using the virtual drives from within Windows is similar to using your physical drives. When you connect to the media at a management station, the media is available at the system by clicking the drive and browsing its content.
Storing Images in a Virtual Flash The Virtual Flash can be formatted from the managed host. If you are running the Windows operating system, right-click the drive icon and select Format. If you are running Linux, system tools such as format and fdisk allow you to partition and format the USB. Before you upload an image from the RAC Web browser to the Virtual Flash, ensure that the image file is between 1.44 MB and 16 MB in size (inclusive) and Virtual Flash is disabled.
If your operating system supports administrator privileges or an operating system-specific privilege or group membership, administrator privileges are also required to run the VM-CLI command. The client system's administrator controls user groups and privileges, thereby controlling the users who can run the utility. For Windows systems, you must have Power User privileges to run the VM-CLI utility.
Command Line Options The VM-CLI interface is identical on both Windows and Linux systems. The utility uses options that are consistent with the RACADM utility options. For example, an option to specify the DRAC 5 IP address requires the same syntax for both RACADM and VM-CLI utilities. The VM-CLI command format is as follows: racvmcli [parameter] [operating_system_shell_options] All command-line syntax are case sensitive. See "VM-CLI Parameters" for more information.
If DRAC 5 authentication fails, an error message displays and the command terminates. Floppy/Disk Device or Image File -f { | } where is a valid drive letter (for Windows systems) or a valid device file name, including the mountable file system partition number, if applicable (for Linux systems); and is the filename and path of a valid image file. This parameter specifies the device or file to supply the virtual floppy/disk media.
Version Display -v This parameter is used to display the VM-CLI utility version. If no other non-switch options are provided, the command terminates without an error message. Help Display -h This parameter displays a summary of the VM-CLI utility parameters. If no other non-switch options are provided, the command terminates without error.
Frequently Asked Questions Table 8-2 lists frequently asked questions and answers. Table 8-2. Using Virtual Media: Frequently Asked Questions Question Answer Which operating systems support the DRAC 5? See "Supported Operating Systems" for a list of supported operating systems. Which Web browsers support the DRAC 5? See "Supported Web Browsers" for a list of supported Web browsers.
Table 8-2. Using Virtual Media: Frequently Asked Questions (continued) Question Answer Why does the Virtual Media connection drop when configured in the Shared-NIC mode? Installing network and chipset drivers on the server causes the Virtual Media connection to drop when configured in the Shared-NIC mode. Installing the network or chipset drivers causes the LOM to reset, which in turn causes network packets to timeout and the Virtual Media connection to timeout and drop.
Table 8-2. Using Virtual Media: Frequently Asked Questions (continued) Question Answer How can I make my USB key bootable? Only USB keys with Windows 98 DOS can boot from the Virtual Floppy. To configure your own bootable USB key, boot to a Windows 98 startup disk and copy system files from the startup disk to your USB key. For example, from the DOS prompt, type the following command: sys a: x: /s where "x:" is the USB key you want to make bootable.
Table 8-2. Using Virtual Media: Frequently Asked Questions (continued) Question Answer When I performed a firmware update remotely using the DRAC 5 Web-based interface, my virtual drives at the server were removed. Why? Firmware updates cause the DRAC 5 to reset, drop the remote connection, and unmount the virtual drives. The drives will reappear when the DRAC reset is complete.
Using the RACADM Command Line Interface The serial/telnet/ssh console provides a set of racadm commands. The racadm commands provide access to the text-based features supported by the DRAC 5 Web-based interface. RACADM enables you to locally or remotely configure and manage your DRAC 5. RACADM runs on the management station and the managed system. RACADM is included on the Dell Systems Management Consoles CD. You can use RACADM to write scripts to automatically configure multiple DRAC 5s.
From a serial session, you can connect to the managed system’s serial console by pressing , which connects the managed system’s serial port directly to the servers’ COM2 port and bypasses the DRAC 5. To reconnect the DRAC 5 to the serial port, press <9>. The managed node COM2 port and the DRAC 5 serial port baud rates must be identical.
RACADM Synopsis racadm -r -u -p racadm -i -r For example: racadm -r 192.168.0.120 -u root -p calvin getsysinfo racadm -i -r 192.168.0.
RACADM Subcommands Table 9-2 provides a description of each racadm subcommand that you can run in RACADM. For a detailed listing of racadm subcommands including syntax and valid entries, see "RACADM Subcommand Overview." When entering a RACADM subcommand, prefix the command with racadm. For example: racadm help Table 9-2. RACADM Subcommands 152 Command Description help Lists DRAC 5 subcommands. help Lists usage statement for the specified subcommand.
Table 9-2. RACADM Subcommands (continued) Command Description serveraction Performs power management operations on the managed system. getraclog Displays the RAC log. clrsel Clears the System Event Log entries. gettracelog Displays the DRAC 5 trace log. If used with -i, the command displays the number of entries in the DRAC 5 trace log. sslcsrgen Generates and downloads the SSL CSR. sslcertupload Uploads a CA certificate or server certificate to the DRAC 5.
3 Use the new configuration file to modify a target RAC. In the command prompt, type: racadm config -f myfile.cfg 4 Reset the target RAC that was configured. In the command prompt, type: racadm reset The getconfig -f racadm.cfg subcommand requests the DRAC 5 configuration and generates the racadm.cfg file. If required, you can configure the file with another name.
Use the following guidelines when you create a .cfg file: • If the parser encounters an indexed group, it is the value of the anchored object that differentiates the various indexes. The parser reads in all of the indexes from the DRAC 5 for that group. Any objects within that group are simple modifications when the DRAC 5 is configured. If a modified object represents a new index, the index is created on the DRAC 5 during configuration. • The user cannot specify a desired index in a .cfg file.
• All group entries must be surrounded by "[" and "]" characters. The starting "[" character denoting a group name must start in column one. This group name must be specified before any of the objects in that group. Objects that do not include an associated group name generate an error. The configuration data is organized into groups as defined in "DRAC 5 Property Database Group and Object Definitions." The following example displays a group name, object, and the object’s property value.
Modifying the DRAC 5 IP Address When you modify the DRAC 5 IP address in the configuration file, remove all unnecessary = value entries. Only the actual variable group’s label with "[" and "]" remains, including the two =value entries pertaining to the IP address change. For example: # # Object Group "cfgLanNetworking" # [cfgLanNetworking] cfgNicIpAddress=10.35.10.110 cfgNicGateway=10.35.10.
To configure multiple DRAC 5s with identical configuration settings, perform one of the following procedures: • Use the RACADM examples in this section as a guide to create a batch file of racadm commands and then execute the batch file on each managed system. • Create the DRAC 5 configuration file as described in "RACADM Subcommand Overview" and execute the racadm config subcommand on each managed system using the same configuration file.
Adding a DRAC 5 User To add a new user to the RAC configuration, a few basic commands can be used. In general, perform the following procedures: 1 Set the user name. 2 Set the password. 3 Set the user privileges. 4 Enable the user. Example The following example describes how to add a new user named "John" with a "123456" password and LOGIN privileges to the RAC.
Testing the RAC SNMP Trap Alert Feature The RAC SNMP trap alerting feature allows SNMP trap listener configurations to receive traps for system events that occur on the managed system. The following example shows how a user can test the SNMP trap alert feature of the RAC. racadm testtrap -i 2 Before you test the RAC SNMP trap alerting feature, ensure that the SNMP and trap settings are configured correctly. See the testtrap and testemail subcommand descriptions to configure these settings.
racadm config -g cfgLanNetworking -o cfgDNSServer1 192.168.0.5 racadm config -g cfgLanNetworking -o cfgDNSServer2 192.168.0.6 racadm config -g cfgLanNetworking -o cfgDNSRegisterRac 1 racadm config -g cfgLanNetworking -o cfgDNSRacName RAC-EK00002 racadm config -g cfgLanNetworking -o cfgDNSDomainNameFromDHCP 0 racadm config -g cfgLanNetworking -o cfgDNSDomainName MYDOMAIN NOTE: If cfgNicEnable is set to 0, the DRAC 5 LAN is disabled even if DHCP is enabled.
Table 9-4. Using the serial and racadm Commands: Frequently Asked Questions (continued) Question Answer When I use the racadm commands and You may encounter one or more of the following subcommands, I get errors that I don’t understand. errors when using the racadm commands and subcommands: • Local error messages — Problems such as syntax, typographical errors, and incorrect names. Example: ERROR: When I ping the DRAC IP address from my system Clear the ARP table on your system.
Deploying Your Operating System Using VM-CLI The Virtual Media Command Line Interface (VM-CLI) utility is a command-line interface that provides Virtual Media features from the management station to the DRAC 5 in the remote system. Using VM-CLI and scripted methods, you can deploy your operating system on multiple remote systems in your network. This section provides information on integrating the VM-CLI utility into your corporate network.
Creating a Bootable Image File Before you deploy your image file to the remote systems, ensure that a supported system can boot from the file. To test the image file, transfer the image file to a test system using the DRAC 5 Web user interface and then reboot the system. The following sections provide specific information for creating image files for Linux and Windows systems. Creating an Image File for Linux Systems Use the Data Duplicator utility to create a bootable image file for your Linux system.
4 Perform one of the following procedures: • Integrate RACADM and the Virtual Media command line interface (VM-CLI) into your existing operating system deployment application. Use the sample deployment script as a guide when integrating the DRAC 5 utilities into your existing operating system deployment application. • Use the existing vmdeploy script to deploy your operating system..
Deploying Your Operating System Using VM-CLI
Using the DRAC 5 SM-CLP Command Line Interface This section provides information about the Server Management Workgroup (SMWG) Server Management Command Line Protocol (SM-CLP) that is incorporated in the DRAC 5. NOTE: This section assumes that you are familiar with the Systems Management Architecture for Server Hardware (SMASH) Initiative and the SMWG SM-CLP specifications. For more information on these specifications, see the Distributed Management Task Force (DMTF) website at www.dmtf.org.
Table 11-1. Supported CLI Verbs (continued) Verb Definition show Displays the target properties, verbs, and subtargets. start Turns on a target. stop Shuts down a target. exit Exits from the SM-CLP shell session. version Displays the version attributes of a target. SM-CLP Management Operations and Targets The SM-CLP promotes the concept of verbs and targets to provide system management capabilities through the CLI.
Options Table 11-3 lists the supported SM-CLP options. Table 11-3. Supported SM-CLP Options SM-CLP Option Description -all Instructs the verb to perform all possible functions. -display Displays the user-defined data. -examine Instructs the command processor to validate the command syntax without executing the command. -help Displays command verb help. -version Displays the command verb version.
Table 11-4. Server Power Management Operations (continued) Operation Syntax Starting the SM-CLP management shell >smclp DRAC5 SM-CLP System Management Shell, version 1.0 Copyright (c) 2004-2006 Dell, Inc.
Table 11-5.
Table 11-5. SEL Management Operations (continued) Operation Syntax Viewing the SEL record ->show /system1/logs1/log1/record4 /system1/logs1/log1/record4 Properties: LogCreationClassName CreationClassName LogName RecordID MessageTimeStamp Description ElementName = = = = = = = CIM_RecordLog CIM_LogRecord IPMI SEL 1 20050620100512.
System Properties The Table 11-7 lists the system properties that are displayed when the user types the following: show /system1 These properties are derived from the Base System Profile that is provided by the standards body and is based on the CIM_ComputerSystem class as defined by the CIM schema. For additional information, see the DMTF CIM schema definitions. Table 11-7.
Table 11-7. System Properties (continued) Object Property Description Dedicated Enumeration indicating whether the system is a special-purpose system or general-purpose system.
Table 11-7. System Properties (continued) Object Property Description ResetCapability Defines the reset methods availablle on the system Values: 1=Other 2=Unknown 3=Disabled 4=Enabled 5=Not Implemented CreationClassName The superclass from which this instance is derived. EnabledState Indicates the enabled/disabled states of the system.
Table 11-7. System Properties (continued) Object Property Description RequestedState Indicates the last requested or desired state for the system. Values: 2=Enabled 3=Disabled 4=Shut Down 5=No Change 6=Offline 7=Test 8=Deferred 9=Quiesce 10=Reboot 11=Reset 12=Not Applicable HealthState Indicates the current health of the system.
Table 11-7. System Properties (continued) Object Property Description OperationalStatus Indicates the current status of the system. Values: 0=Unknown 1=Other 2=OK 3=Degraded 4=Stressed 5=Predictive Failure 6=Error 7=Non-Recoverable Error 8=Starting 9=Stopping 10=Stopped 11=In Service 12=No Contact 13=Lost Communication 14=Aborted 15=Dormant 16=Supporting Entity in Error 17=Completed 18=Power Mode Description A text-based description of the system.
Using the DRAC 5 SM-CLP Command Line Interface
Troubleshooting Troubleshooting the DRAC 5 See the following tables for help with troubleshooting the DRAC 5 and the RACADM: Table 6-8, "Using the DRAC 5 With Active Directory: Frequently Asked Questions" Table 7-7, "Using Console Redirection: Frequently Asked Questions" Table 8-2, "Using Virtual Media: Frequently Asked Questions" Table 9-4, "Using the serial and racadm Commands: Frequently Asked Questions" Troubleshooting 179
Troubleshooting
RACADM Subcommand Overview This section provides descriptions of the subcommands that are available in the RACADM command line interface. help NOTE: To use this command, you must have Log In DRAC 5 permission. Table A-1 describes the help command. Table A-1. Help Command Command Definition help Lists all of the subcommands available to use with racadm and provides a short description for each.
arp NOTE: To use this command, you must have Execute Diagnostic Commands permission. Table A-2 describes the arp command. Table A-2. arp Command Command Definition arp Displays the contents of the ARP table. ARP table entries may not be added or deleted. Synopsis racadm arp Supported Interfaces • Remote RACADM • telnet/ssh/serial RACADM clearasrscreen NOTE: To use this command, you must have Clear Logs permission. Table A-3 describes the clearasrscreen subcommand. Table A-3.
config NOTE: To use the getconfig command, you must have Log In DRAC 5 permission. Table A-4 describes the config and getconfig subcommands. Table A-4. config/getconfig Subcommand Definition config Configures the DRAC 5. getconfig Gets the DRAC 5 configuration data.
Table A-5. config Subcommand Options and Descriptions (continued) Option Description -o The -o , or object option, must be used with the -g option. This option specifies the object name that is written with the string . -i The -i , or index option, is only valid for indexed groups and can be used to specify a unique group. The is a decimal integer from 1 through 16. The index is specified here by the index value, not a "named" value.
Input Table A-6 describes the getconfig subcommand options. NOTE: The -f option without a file specification will output the contents of the file to the terminal screen. Table A-6. getconfig Subcommand Options Option Description -f The -f option directs getconfig to write the entire RAC configuration to a configuration file. This file can be used for batch configuration operations using the config subcommand.
• racadm getconfig -f myrac.cfg Saves all group configuration objects from the RAC to myrac.cfg. • racadm getconfig -h Displays a list of the available configuration groups on the DRAC 5. • racadm getconfig -u root Displays the configuration properties for the user named root. • racadm getconfig -g cfgUserAdmin -i 2 -v Displays the user group instance at index 2 with verbose information for the property values.
If available, the coredump information is persistent across RAC power cycles and will remain available until either of the following conditions occur: • The coredump information is cleared with the coredumpdelete subcommand. • Another critical condition occurs on the RAC. In this case, the coredump information will be relative to the last critical error that occurred. See the coredumpdelete subcommand for more information about clearing the coredump.
fwupdate NOTE: To use this command, you must have Configure DRAC 5 permission. NOTE: Before you begin your firmware update, see "Updating the DRAC 5 Firmware" for additional instructions. Table A-9 describes the fwupdate subcommand. Table A-9. fwupdate Subcommand Definition fwupdate Updates the firmware on the DRAC 5.
Table A-10. fwupdate Subcommand Options (continued) Option Description -s The status option returns the current status of where you are in the update process. This option is always used by itself. -g The get option instructs the firmware to get the firmware update file from the TFTP server. The user must also specify the -a and -d options.
getssninfo NOTE: To use this command, you must have Log In To DRAC 5 permission. Table A-11 describes the getssninfo subcommand. Table A-11. getssninfo Subcommand Subcommand Definition getssninfo Retrieves session information for one or more currently active or pending sessions from the Session Manager's session table. Synopsis racadm getssninfo [-A] [-u | *] Description The getssninfo command returns a list of users that are connected to the DRAC.
Examples • racadm getssninfo Table A-13 provides an example of output from the racadm getssninfo command. Table A-13. getssninfo Subcommand Output Example User IP Address Type Consoles root 192.168.0.10 Telnet Virtual KVM • racadm getssninfo -A "root" 143.166.174.19 "Telnet" "NONE" • racadm getssninfo -A -u * "root" "143.166.174.19" "Telnet" "NONE" "bob" "143.166.174.19" "GUI" "NONE" getsysinfo NOTE: To use this command, you must have Log In To DRAC 5 permission.
Input Table A-15 describes the getsysinfo subcommand options. Table A-15. getsysinfo Subcommand Options Option Description -d Displays DRAC 5 information. -s Displays system information -w Displays watchdog information -A Eliminates the printing of headers/labels. If the -w option is not specified, then the other options are used as defaults. Output The getsysinfo subcommand displays information related to the RAC, managed system, and watchdog configuration.
BMC Firmware Version Service Tag Host Name OS Name Power Status = = = = = 0.17 48192 racdev103 Microsoft Windows Server 2003 OFF Watchdog Information: Recovery Action Present countdown value Initial countdown value = None = 0 seconds = 0 seconds Examples • racadm getsysinfo -A -s "System Information:" "PowerEdge 2900" "A08" "1.0" "EF23VQ-0023" "Hostname" "Microsoft Windows 2000 version 5.
getractime NOTE: To use this command, you must have Log In DRAC 5 permission. Table A-16 describes the getractime subcommand. Table A-16. getractime Subcommand Definition getractime Displays the current time from the remote access controller. Synopsis racadm getractime [-d] Description With no options, the getractime subcommand displays the time in a common readable format. With the -d option, getractime displays the time in the format, yyyymmddhhmmss.
ifconfig NOTE: To use this command, you must have Execute Diagnostic Commands or Configure DRAC 5 permission. Table A-17 describes the ifconfig subcommand. Table A-17. ifconfig Subcommand Definition ifconfig Displays the contents of the network interface table. Synopsis racadm ifconfig netstat NOTE: To use this command, you must have Execute Diagnostic Commands permission. Table A-18 describes the netstat subcommand. Table A-18.
ping NOTE: To use this command, you must have Execute Diagnostic Commands or Configure DRAC 5 permission. Table A-19 describes the ping subcommand. Table A-19. ping Subcommand Definition ping Verifies that the destination IP address is reachable from the DRAC 5 with the current routing-table contents. A destination IP address is required. An ICMP echo packet is sent to the destination IP address based on the current routing-table contents.
Description The setniccfg subcommand sets the controller IP address. • The -d option enables DHCP for the Ethernet management port (default is DHCP enabled). • The -s option enables static IP settings. The IP address, netmask, and gateway can be specified. Otherwise, the existing static settings are used. , , and must be typed as dot-separated strings. racadm setniccfg -s 192.168.0.120 255.255.255.0 192.168.0.
Sample Output The getniccfg subcommand will display an appropriate error message if the operation is not successful. Otherwise, on success, the output displayed in the following format: NIC Enabled = 1 DHCP Enabled = 1 IP Address = 192.168.0.1 Subnet Mask = 255.255.255.0 Gateway = 192.168.0.1 Supported Interfaces • Local RACADM • Remote RACADM • telnet/ssh/serial RACADM getsvctag NOTE: To use this command, you must have Log In To DRAC 5 permission.
Supported Interfaces • Local RACADM • Remote RACADM • telnet/ssh/serial RACADM racdump NOTE: To use this command, you must have Debug permission. Table A-23 describes the racdump subcommand. Table A-23. racdump Subcommand Definition racdump Displays status and general DRAC 5 information. Synopsis racadm racdump Description The racdump subcommand provides a single command to get dump, status, and general DRAC 5 board information.
Table A-24. racreset Subcommand Definition racreset Resets the DRAC 5. NOTICE: When you issue a racreset subcommand, the DRAC may require up to one minute to return to a usable state. Synopsis racadm racreset [hard | soft] Description The racreset subcommand issues a reset to the DRAC 5. The reset event is written into the DRAC 5 log. A hard reset performs a deep reset operation on the RAC. A hard reset should only be performed as a lastcase resort to recover the RAC.
racresetcfg NOTE: To use this command, you must have Configure DRAC 5 permission. Table A-26 describes the racresetcfg subcommand. Table A-26. racresetcfg Subcommand Definition racresetcfg Resets the entire RAC configuration to factory default values. Synopsis racadm racresetcfg Supported Interfaces • Local RACADM • Remote RACADM • telnet/ssh/serial RACADM Description The racresetcfg command removes all database property entries that have been configured by the user.
Synopsis racadm serveraction Description The serveraction subcommand enables users to perform power management operations on the host system. Table A-28 describes the serveraction power control options. Table A-28. serveraction Subcommand Options String Definition Specifies the action. The options for the string are: • powerdown — Powers down the managed system. • powerup — Powers up the managed system. • powercycle — Issues a power-cycle operation on the managed system.
Synopsis racadm getraclog -i racadm getraclog [-A] [-o] [-c count] [-s start-record] [-m] Description The getraclog -i command displays the number of entries in the DRAC 5 log. The following options allow the getraclog command to read entries: • -A — Displays the output with no headers or labels. • -c — Provides the maximum count of entries to be returned. • -m — Displays one screen of information at a time and prompts the user to continue (similar to the UNIX more command).
Synopsis racadm clrraclog Description The clrraclog subcommand removes all existing records from the RAC log. A new single record is created to record the date and time when the log was cleared. getsel NOTE: To use this command, you must have Log In To DRAC 5 permission. Table A-30 describes the getsel command. Table A-30. getsel Command Definition getsel -i Displays the number of entries in the System Event Log. getsel Displays SEL entries.
Output The default output display shows the record number, timestamp, severity, and description. For example: Record: 1 Date/Time: 11/16/2005 22:40:43 Severity: 2 Description: System Board SEL: event log sensor for System Board, log cleared was asserted Supported Interfaces • Local RACADM • Remote RACADM • telnet/ssh/serial RACADM clrsel NOTE: To use this command, you must have Clear Logs permission.
gettracelog NOTE: To use this command, you must have Log In To DRAC 5 permission. Table A-31 describes the gettracelog subcommand. Table A-31. gettracelog Command Definition gettracelog -i Displays the number of entries in the DRAC 5 trace log. gettracelog Displays the DRAC 5 trace log. Synopsis racadm gettracelog -i racadm gettracelog [-A] [-o] [-c count] [-s startrecord] [-m] Description The gettracelog (without the -i option) command reads entries.
Supported Interfaces • Local RACADM • Remote RACADM • telnet/ssh/serial RACADM sslcsrgen NOTE: To use this command, you must have Configure DRAC 5 permission. Table A-32 describes the sslcsrgen subcommand. Table A-32. sslcsrgen Subcommand Description sslcsrgen Generates and downloads an SSL certificate signing request (CSR) from the RAC.
If no options are specified, a CSR is generated and downloaded to the local file system as sslcsr by default. The -g option cannot be used with the -s option, and the -f option can only be used with the -g option. The sslcsrgen -s subcommand returns one of the following status codes: • CSR was generated successfully. • CSR does not exist. • CSR generation in progress.
Options Table A-35 describes the sslcertupload subcommand options. Table A-35. sslcertupload Subcommand Options Option Description -t Specifies the type of certificate to upload, either the CA certificate or server certificate. 1 = server certificate 2 = CA certificate -f Specifies the file name of the certificate to be uploaded. If the file is not specified, the sslcert file in the current directory is selected.
Options Table A-37 describes the sslcertdownload subcommand options. Table A-37. sslcertdownload Subcommand Options Option Description -t Specifies the type of certificate to download, either the Microsoft® Active Directory® certificate or server certificate. 1 = server certificate 2 = Microsoft Active Directory certificate -f Specifies the file name of the certificate to be uploaded. If the -f option or the filename is not specified, the sslcert file in the current directory is selected.
Synopsis racadm sslcertview -t [-A] Options Table A-39 describes the sslcertview subcommand options. Table A-39. sslcertview Subcommand Options Option Description -t Specifies the type of certificate to view, either the Microsoft Active Directory certificate or server certificate. 1 = server certificate 2 = Microsoft Active Directory certificate -A Prevents printing headers/labels.
racadm sslcertview -t 1 -A 00 US Texas Round Rock Dell Inc. Remote Access Group DRAC5 default certificate US Texas Round Rock Dell Inc. Remote Access Group DRAC5 default certificate Jul 8 16:21:56 2005 GMT Jul 7 16:21:56 2010 GMT Supported Interfaces • Local RACADM • Remote RACADM • telnet/ssh/serial RACADM testemail Table A-40 describes the testemail subcommand. Table A-40. testemail configuration Subcommand Description testemail Tests the RAC’s e-mail alerting feature.
Prior to executing the testemail command, ensure that the specified index in the RACADM cfgEmailAlert group is enabled and configured properly. Table Table A-41 provides a list and associated commands for the cfgEmailAlert group. Table A-41. testemail Configuration Action Command Enable the alert racadm config -g cfgEmailAlert -o cfgEmailAlertEnable -i 1 1 Set the destination e-mail address racadm config -g cfgEmailAlert -o cfgEmailAlertAddress -i 1 user1@mycompany.
testtrap NOTE: To use this command, you must have Test Alerts permission. Table A-43 describes the testtrap subcommand. Table A-43. testtrap Subcommand Description testtrap Tests the RAC’s SNMP trap alerting feature. Synopsis racadm testtrap -i Description The testtrap subcommand tests the RAC’s SNMP trap alerting feature by sending a test trap from the RAC to a specified destination trap listener on the network.
Supported Interfaces • Local RACADM • Remote RACADM • telnet/ssh/serial RACADM vmdisconnect NOTE: To use this command, you must have Access Virtual Media permission. Table A-46 describes the vmdisconnect subcommand. Table A-46. vmdisconnect Subcommand Description vmdisconnect Closes all open RAC virtual media connections from remote clients. Synopsis racadm vmdisconnect Description The vmdisconnect subcommand allows a user to disconnect another user's virtual media session.
vmkey NOTE: To use this command, you must have Access Virtual Media permission. Table A-47 describes the vmkey subcommand. Table A-47. vmkey Subcommand Description vmkey Performs virtual media key-related operations. Synopsis racadm vmkey If is configured as reset, the virtual flash memory is reset to the default size of 16 MB. Description When a custom virtual media key image is uploaded to the RAC, the key size becomes the image size.
DRAC 5 Property Database Group and Object Definitions The DRAC 5 property database contains the configuration information for the DRAC 5. Data is organized by associated object, and objects are organized by object group. The IDs for the groups and objects that the property database supports are listed in this section. Use the group and object IDs with the racadm utility to configure the DRAC 5. The following sections describe each object and indicate whether the object is readable, writable, or both.
idRacDescriptionInfo (Read Only) Legal Values String of up to 255 ASCII characters. Default "This system component provides a complete set of remote management functions for Dell PowerEdge servers." Description A text description of the RAC type. idRacVersionInfo (Read Only) Legal Values String of up to 63 ASCII characters. Default "1.0" Description A string containing the current product firmware version. idRacBuildInfo (Read Only) Legal Values String of up to 16 ASCII characters.
Default DRAC 5 Description A user assigned name to identify this controller. idRacType (Read Only) Default 6 Description Identifies the remote access controller type as the DRAC 5. cfgLanNetworking This group contains parameters to configure the DRAC 5 NIC. One instance of the group is allowed. All objects in this group will require the DRAC 5 NIC to be reset, which may cause a brief loss in connectivity.
Legal Values String of up to 254 ASCII characters. At least one of the characters must be alphabetic. Characters are restricted to alphanumeric, '-' and '.' NOTE: Microsoft® Active Directory® only supports Fully Qualified Domain Names (FQDN) of 64 bytes or fewer. Default "" Description The DNS domain name. This parameter is only valid if cfgDNSDomainNameFromDHCP is set to 0 (FALSE). cfgDNSRacName (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission.
cfgDNSServersFromDHCP (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 1 (TRUE) 0 (FALSE) Default 0 Description Specifies that the DNS server IP addresses should be assigned from the DHCP server on the network. cfgDNSServer1 (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values A string representing a valid IP address. For example: "192.168.0.20". Description Specifies the IP address for DNS server 1.
cfgNicEnable (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 1 (TRUE) 0 (FALSE) Default 0 Description Enables or disables the RAC network interface controller. If the NIC is disabled, the remote network interfaces to the RAC will no longer be accessible, and the RAC will only be available through the serial or local RACADM interfaces. cfgNicIpAddress (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission.
Description The subnet mask used for static assignment of the RAC IP address. This property is only valid if cfgNicUseDhcp is set to 0 (FALSE). cfgNicGateway (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. This parameter is only configurable if the cfgNicUseDhcp parameter is set to 0 (FALSE). Legal Values A string representing a valid gateway IP address. For example: "192.168.0.1". Default 192.168.0.
Legal Values 0 (shared) 1 (shared with failover) 2 (dedicated) Default 2 Description Specifies the current mode of operation for the RAC network interface controller (NIC). Table B-1 describes the supported modes. Table B-1. cfgNicSelection Supported Modes Mode Description Shared Used if the host server integrated NIC is shared with the RAC on the host server. This mode enables configurations to use the same IP address on the host server and the RAC for common accessibility on the network.
Legal Values 1 (TRUE) 0 (FALSE) Default 0 Description Enables or disables the VLAN capabilities of the RAC/BMC. cfgNicVLanId (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 0 – 4094 Default 0 Description Specifies the VLAN ID for the network VLAN configuration. This property is only valid if cfgNicVLanEnable is set to 1 (enabled). cfgNicVLanPriority (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission.
cfgRemoteHosts This group provides properties that allow configuration of various remote components, which include the SMTP server for email alerts and TFTP server IP addresses for firmware updates. cfgRhostsSmtpServerIpAddr (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values A string representing a valid SMTP server IP address. For example, 192.168.0.55. Default 0.0.0.0 Description The IP address of the network SMTP server.
Description Specifies the network TFTP server IP address that is used for TFTP RAC firmware update operations. cfgRhostsFwUpdatePath (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values String. Maximum length = 255. Default "" Description Specifies TFTP path where the RAC firmware image file exists on the TFTP server. The TFTP path is relative to the TFTP root path on the TFTP server.
Description The maximum privilege on the IPMI LAN channel. cfgUserAdminIpmiSerialPrivilege (Read/Write) NOTE: To modify this property, you must have Configure Users permission. Legal Values 2 (User) 3 (Operator) 4 (Administrator) 15 (No access) Default 4 (User 2) 15 (All others) Description The maximum privilege on the IPMI serial channel. cfgUserAdminPrivilege (Read/Write) NOTE: To modify this property, you must have Configure Users permission.
Table B-2. Bit Masks for User Privileges (continued) User Privilege Privilege Bit Mask Configure Users 0x0000004 Clear Logs 0x0000008 Execute Server Control Commands 0x0000010 Access Console Redirection 0x0000020 Access Virtual Media 0x0000040 Test Alerts 0x0000080 Execute Debug Commands 0x0000100 Examples Table B-3 provides sample privilege bit masks for users with one or more privileges. Table B-3.
Description The name of the user for this index. The user index is created by writing a string into this name field if the index is empty. Writing a string of double quotes ("") deletes the user at that index. You cannot change the name. You must delete and then recreate the name. The string must not contain "/" (forward slash, "\" (backslash), "." (period), "@" ("at" symbol) or quotations marks. NOTE: This property value MUST be unique from other user instances.
Legal Values 1 (TRUE) 0 (FALSE) Default 0 Description Enables or disables Serial Over LAN (SOL) user access. cfgEmailAlert This group contains parameters to configure the RAC e-mail alerting capabilities. The following subsections describe the objects in this group. Up to four instances of this group are allowed. cfgEmailAlertIndex (Read Only) Legal Values 1–4 Default This parameter is populated based on the existing instances. Description The unique index of an alert instance.
cfgEmailAlertAddress (Read Only) Legal Values E-mail address format, with a maximum length of 64 ASCII characters. Default "" Description The e-mail address of the alert source. cfgEmailAlertCustomMsg (Read Only) Legal Values String. Maximum Length = 32. Default "" Description Specifies a custom message that is sent with the alert. cfgSessionManagement This group contains parameters to configure the number of sessions that can connect to the DRAC 5. One instance of the group is allowed.
cfgSsnMgtRacadmTimeout (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 10 –1920 Default 30 Description Defines the idle timeout in seconds for the Remote RACADM interface. If a remote RACADM session remains inactive for more than the specified sessions, the session will be closed. cfgSsnMgtWebserverTimeout (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission.
Description Defines the Secure Shell idle time-out. This property sets the amount of time in seconds that a connection is allowed to remain idle (there is no user input). The session is cancelled if the time limit set by this property is reached. Changes to this setting do not affect the current session (you must log out and log in again to make the new settings effective).
Default 57600 Description Sets the baud rate on the DRAC 5 serial port. cfgSerialConsoleEnable (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 1 (TRUE) 0 (FALSE) Default 0 Description Enables or disables the RAC serial console interface. cfgSerialConsoleQuitKey (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values STRING MaxLen = 4 Default ^\ (<\>) NOTE: The "^" is the key.
ASCII values may be represented using the following Escape Key codes: (a) ^ followed by any alphabetic (a-z, A-Z) (b) ^ followed by the listed special characters: [ ] \ ^ _ cfgSerialConsoleIdleTimeout (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 0 = No time-out 60 – 1920 Default 300 Description The maximum number of seconds to wait before an idle serial session is disconnected.
Example "connect com2" cfgSerialHistorySize (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 0 – 8192 Default 8192 Description Specifies the maximum size of the serial history buffer. cfgSerialSshEnable (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 1 (TRUE) 0 (FALSE) Default 1 Description Enables or disables the secure shell (SSH) interface on the DRAC 5.
Description Enables or disables the telnet console interface on the RAC. cfgSerialCom2RedirEnable (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Default 1 Legal Values 1 (TRUE) 0 (FALSE) Description Enables or disables the console for COM 2 port redirection. cfgNetTuning This group enables users to configure the advanced network interface parameters for the RAC NIC. When configured, the updated settings may take up to a minute to become active.
cfgNetTuningNic100MB (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 0 (10 MBit) 1 (100 MBit) Default 1 Description Specifies the speed to use for the RAC NIC. This property is not used if the cfgNetTuningNicAutoNeg is set to 1 (enabled). cfgNetTuningNicFullDuplex (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission.
Description The size in bytes of the maximum transmission unit used by the DRAC 5 NIC. cfgNetTuningTcpSrttDflt (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 6 – 384 Default 6 Description The smoothed round trip time-out base default value for TCP retransmission round trip time in ½ second units. (Type hexadecimal values.) cfgOobSnmp The group contains parameters to configure the SNMP agent and trap capabilities of the DRAC 5.
Default 0 Description Enables or disables the SNMP agent in the RAC. cfgRacTuning This group is used to configure various RAC configuration properties, such as valid ports and security port restrictions. cfgRacTuneHttpPort (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 10 – 65535 Default 80 Description Specifies the port number to use for HTTP network communication with the RAC.
Legal Values 1 (TRUE) 0 (FALSE) Default 0 Description Enables or disables the IP Address Range validation feature of the RAC. cfgRacTuneIpRangeAddr NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values String, IP address formatted. For example, 192.168.0.44. Default 192.168.1.1 Description Specifies the acceptable IP address bit pattern in positions determined by the 1's in the range mask property (cfgRacTuneIpRangeMask).
Legal Values 1 (TRUE) 0 (FALSE) Default 0 Description Enables or disables the IP address blocking feature of the RAC. cfgRacTuneIpBlkFailcount NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 2 – 16 Default 5 Description The maximum number of login failure to occur within the window before the login attempts from the IP address are rejected. cfgRacTuneIpBlkFailWindow NOTE: To modify this property, you must have Configure DRAC 5 permission.
cfgRacTuneIpBlkPenaltyTime NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 2 – 65535 Default 300 Description Defines the timespan in seconds that session requests from an IP address with excessive failures are rejected. cfgRacTuneSshPort (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 1 – 65535 Default 22 Description Specifies the port number used for the RAC SSH interface.
cfgRacTuneRemoteRacadmEnable (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 1 (TRUE) 0 (FALSE) Default 1 Description Enables or disables the Remote RACADM interface in the RAC. cfgRacTuneConRedirEncryptEnable (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 1 (TRUE) 0 (FALSE) Default 0 Description Encrypts the video in a console redirection session.
NOTE: This object requires a DRAC 5 reset before it becomes active. cfgRacTuneConRedirVideoPort (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 1 – 65535 Default 5901 Description Specifies the port to be used for video traffic during Console Redirection activity with the RAC. NOTE: This object requires a DRAC 5 reset before it becomes active. cfgRacTuneAsrEnable (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission.
Description Specifies the daylight savings offset (in minutes) to use for the RAC Time. cfgRacTuneTimezoneOffset (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values -720 – 780 Default 0 Description Specifies the timezone offset (in minutes) from GMT/UTC to use for the RAC Time.
ifcRacManagedNodeOs This group contains properties that describe the Managed Server operating system. One instance of the group is allowed. The following subsections describe the objects in this group. ifcRacMnOsHostname (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values String. Maximum Length = 255. Default "" Description The host name of the managed system.
Legal Values String. Maximum Length = 254. Default "" Description Specifies the CSR Common Name (CN). cfgSecCsrOrganizationName (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values String. Maximum Length = 254. Default "" Description Specifies the CSR Organization Name (O). cfgSecCsrOrganizationUnit (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values String. Maximum Length = 254.
Default "" Description Specifies the CSR Locality (L). cfgSecCsrStateName (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values String. Maximum Length = 254. Default "" Description Specifies the CSR State Name (S). cfgSecCsrCountryCode (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values String. Maximum Length = 2.
Description Specifies the CSR Email Address. cfgSecCsrKeySize (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 512 1024 2048 Default 1024 Description Specifies the SSL asymmetric key size for the CSR. cfgRacVirtual This group contains parameters to configure the DRAC 5 Virtual Media feature. One instance of the group is allowed. The following subsections describe the objects in this group.
cfgVirAtapiSrvPort (Read/Write) NOTE: To modify this property, you must have Access Virtual Media permission. Legal Values 1 – 65535 Default 3669 Description Specifies the port number used for encrypted virtual media connections to the RAC. cfgVirAtapiSrvPortSsl (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values Any unused port number between 0 and 65535 decimal. Default 3669 Description Sets the port used for SSL Virtual Media connections.
cfgVirMediaBootOnce (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 1 (Enabled) 0 (Disabled) Default 0 Description Enables or disables the virtual media boot-once feature of the RAC. If this property is enabled when the host server is rebooted, this feature will attempt to boot from the virtual media devices—if the appropriate media is installed in the device.
Description Name of DRAC as recorded in the Active Directory forest. cfgADEnable (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 1 (TRUE) 0 (FALSE) Default 0 Description Enables or disables Active Directory user authentication on the RAC. If this property is disabled, local RAC authentication is used for user logins instead. cfgADAuthTimeout (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission.
Description Root domain of the Domain Forest. cfgIpmiSerial This group specifies properties used to configure the IPMI serial interface of the BMC. cfgIpmiSerialConnectionMode (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 0 (Terminal) 1 (Basic) Default 1 Description When the DRAC 5 cfgSerialConsoleEnable property is set to 0 (disabled), the DRAC 5 serial port becomes the IPMI serial port.
Legal Values 2 (User) 3 (Operator) 4 (Administrator) Default 4 Description Specifies the maximum privilege level allowed on the IPMI serial channel. cfgIpmiSerialFlowControl (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 0 (None) 1 (CTS/RTS) 2 (XON/XOFF) Default 1 Description Specifies the flow control setting for the IPMI serial port.
cfgIpmiSerialLineEdit (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 0 (FALSE) 1 (TRUE) Default 1 Description Enables or disables line editing on the IPMI serial interface. cfgIpmiSerialEchoControl (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 0 (FALSE) 1 (TRUE) Default 1 Description Enables or disables echo control on the IPMI serial interface.
cfgIpmiSerialNewLineSequence (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 0 (None) 1 (CR-LF) 2 (NULL) 3 () 4 () 5 () Default 1 Description Specifies the newline sequence specification for the IPMI serial interface. cfgIpmiSerialInputNewLineSequence(Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values 0 (FALSE) 1 (TRUE) Default 1 Description Enables or disables Serial Over LAN (SOL). cfgIpmiSolBaudRate (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 9600, 19200, 57600, 115200 Default 57600 Description The baud rate for serial communication over LAN. cfgIpmiSolMinPrivilege (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission.
Legal Values 1 – 255. Default 10 Description Specifies the typical amount of time that the BMC waits before transmitting a partial SOL character data packet. This value is 1-based 5ms increments. cfgIpmiSolSendThreshold (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 1 – 255 Default 255 Description The SOL threshold limit value. cfgIpmiLan This group is used to configure the IPMI-Over-LAN capabilities of the system.
cfgIpmiLanPrivLimit (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 2 (User) 3 (Operator) 4 (Administrator) Default 0 Description Specifies the maximum privilege level allowed for IPMI over LAN access. cfgIpmiLanAlertEnable (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 0 (FALSE) 1 (TRUE) Default 1 Description Enables or disables global email alerting.
Description The IPMI encryption key. cfgIpmiPetCommunityName (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values A string up to 18 characters. Default "public" Description The SNMP community name for traps. cfgIpmiPef This group is used to configure the platform event filters available on the managed server. The event filters can be used to control policy related to actions that are triggered when critical events occur on the managed system.
Default The index value of a platform event filter object. Description Specifies the index of a specific platform event filter. cfgIpmiPefAction (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 0 (None) 1 (Power Down) 2 (Reset) 3 (Power Cycle) Default 0 Description Specifies the action that is performed on the managed system when the alert is triggered.
cfgIpmiPetIndex (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 1–4 Default The appropriate index value. Description Unique identifier for the index corresponding to the trap. cfgIpmiPetAlertDestIpAddr (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values String representing a valid IP address. For example, 192.168.0.67. Default 0.0.0.
Supported RACADM Interfaces The following table provides an overview of RACADM subcommands and their corresponding interface support. Table C-1.
Table C-1.
Browser Pre-installation If you are running Linux and your Management Station has a read-only file system, a browser can be installed on a client system without requiring a connection to a DRAC 5. By using the native plugin installation package, the browser can be manually installed during the client setup phase. NOTICE: In a read-only client environment, if the DRAC 5 firmware is updated to a newer version of the plugin, then the installed VM plugin will become inoperative.
Browser Pre-installation
Glossary AGP Abbreviation for accelerated graphics port, which is a bus specification that allows graphics cards faster access to main system memory. your CSR, they review and verify the information the CSR contains. If the applicant meets the CA’s security standards, the CA issues a certificate to the applicant that uniquely identifies that applicant for transactions over networks and on the Internet.
dynamically allocate IP addresses to computers on a local area network. GRUB Acronym for GRand Unified Bootloader, a new and commonly-used Linux loader. DLL Abbreviation for Dynamic Link Library, which is a library of small programs, any of which can be called when needed by a larger program that is running in the system. The small program that lets the larger program communicate with a specific device such as a printer or scanner is often packaged as a DLL program (or file).
LAN NAS Abbreviation for local area network. Abbreviation for network attached storage. LDAP NIC Abbreviation for Lightweight Directory Access Protocol. Abbreviation for network interface card. An adapter circuit board installed in a computer to provide a physical connection to a network. LED Abbreviation for light-emitting diode. OID Abbreviation for Object Identifiers. LOM Abbreviation for Local area network On Motherboard.
ROM SNMP trap Acronym for read-only memory, which is memory from which data may be read, but to which data cannot be written. A notification (event) generated by the DRAC 5 or the BMC that contains information about state changes on the managed system or about potential hardware problems. RPM Abbreviation for Red Hat Package Manager, which is a package-management system for the Red Hat Enterprise Linux operating system that helps installation of software packages.
VNC Abbreviation for virtual network computing. VT-100 Abbreviation for Video Terminal 100, which is used by the most common terminal emulation programs. WAN Abbreviation for wide area network.
Glossary
Index A Active Directory adding DRAC 5 users, 111 configuring access to the DRAC 5, 106 configuring and managing certificates, 75 extending schemas, 106 logging in to the DRAC 5, 117 objects, 102 schema extensions, 101 using with the DRAC 5, 101 certificates Active Directory, 75 exporting the root CA certificate, 114 SSL and digital, 78 uploading a server certificate, 81 viewing a server certificate, 81 command line console features, 47 configuration file creating, 154 alerts troubleshooting, 100 connect
Index frequently asked questions (continued) using serial and RACADM commands, 161 using the DRAC 5 with Active Directory, 118 using Virtual Media, 145 H hardware installing, 25 hardware specifications, 18 connectors, 18 DRAC 5 ports, 19 power requirements, 18 I IP blocking about, 58 enabling, 59 IPMI configuring, 37, 82 configuring using the RACADM CLI, 39 configuring using the Webbased interface, 37 modes, 48 IpRange about, 57 enabling, 58 276 Index L last crash screen capturing on the managed
platform events configuring, 42 platforms supported, 20 property database groups cfcRacManagedNodesOs, 248 cfgActiveDirectory, 253 cfgEmailAlert, 231 cfgIpmiLan, 260 cfgIpmiPef, 262 cfgIpmiPet, 263 cfgIpmiSerial, 255 cfgIpmiSol, 258 cfgLanNetworking, 219 cfgNetTuning, 238 cfgOobSnmp, 240 cfgRacSecurity, 248 cfgRacTuning, 241 cfgRacVirtual, 251 cfgRemoteHosts, 226 cfgSerial, 234 cfgSessionManagement, 232 cfgUserAdmin, 227 idRacInfo, 217 R RAC serial configuring, 82 RAC serial interface about, 49 RACADM atta
Index server certificate uploading, 81 viewing, 81 Server Management Command Line Protocol (SM-CLP) about, 167 support, 167 services configuring, 86 snap-in installing the Dell extension, 110 software configuring, 27 installing, 27 sslcertdownload, 209 system configuring to use a DRAC 5, 26 T telnet console using, 65 terminal mode configuring, 82-83 troubleshooting, 179 basic, 179 278 Index V W video viewer accessing the viewer menu bar, 124 using, 124 web browser configuring, 31 supported brow