Users Guide

Table Of Contents
Security configurations and compatibility
iDRAC Service Module (iSM) is deployed with the default security configuration to protect against certain incidents like DLL
hijacking, DLL tampering, information disclosure. This section briefs about the security configuration that iSM is installed with.
Topics:
Enhanced security between iSM and iDRAC communication using the TLS protocol
Authenticate DLLs and shared objects before loading
Enhanced security between iSM and iDRAC
communication using the TLS protocol
Data communication between iSM and iDRAC uses TLS protected USBNIC INET sockets. This ensures protection of all the data
that transports from iDRAC to iSM over USBNIC. iSM and iDRAC use self-signed certificates to control authentication. The
self-signed certificates are valid for 10 years. New self-signed certificates are generated at each new installation of new iSM
every time. Reinstall or upgrade the iSM when the certificates expire.
NOTE:
iSM reinstall (repair) does not work on Linux operating systems. You must uninstall and then install iSM on Linux
operating systems.
NOTE: When iSM's TLS-client certificate expires, communication between iSM and iDRAC fails and an operating system
audit log is generated. You are then required to reinstall iSM on the host operating system.
Both iDRAC and the host TLS versions must be 1.1 or later. Communication between iSM and iDRAC fails if the TLS
protocol version negotiation fails. If iSM with TLS capability is installed on an iDRAC firmware which does not support TLS
communication over USBNIC, it will work with the non-TLS channel as in the earlier versions of iSM.
If iSM is installed or upgraded to version 3.4.0 or later before iDRAC is upgraded to version 3.30.30.30 or later, then iSM must
be uninstalled and reinstalled to establish new TLS certificate. iSM with TLS capability is supported on iDRAC firmware versions
3.30.30.30 and later.
iSM without TLS capability does not function on a TLS-capable version of iDRAC firmware. For example, iSM 3.3 or earlier which
are not TLS-capable is not supported on iDRAC firmware 3.30.30.30 and later. If iSM 3.3.0 is installed on iDRAC 3.30.30.30
firmware, multiple events with ISM0050 are observed in Lifecycle Controller log file.
NOTE:
When Federal Information Processing Standards (FIPS) mode is enabled either on the host operating system or
iDRAC, the communication between iSM and iDRAC is not established.
Policy settings for OS-BMC Passthru on VMware ESXi
Following are the commands and the affected parameters of policy settings for OS-BMC Passthru interface on VMware ESXi:
esxcli network vswitch standard portgroup policy security set -u -p "iDRAC Network"
Allow Promiscuous: false
Allow MAC Address Change: false
Allow Forged Transmits: false
esxcli network vswitch standard policy security set -v vSwitchiDRACvusb -f false -m false
Override vSwitch Allow Promiscuous: false
Override vSwitch Allow MAC Address Change: false
Override vSwitch Allow Forged Transmits: false
5
Security configurations and compatibility 27