Reference Guide
Table Of Contents
- Dell EMC iDRAC Service Module Security Configuration Guide
- Contents
- Overview
- Security quick reference
- Product and subsystem security
- Miscellaneous configuration and management elements
- Internal security information
- Resources and support
- Contacting Dell EMC
Table 2. Network ports in-use by iSM (continued)
Port Number Protocol Direction Subsystem
161 UDP Inbound iDRAC
162 UDP Outbound Trap destination
1266 TCP Inbound Remote management station
5986 HTTPS Inbound WSMan
Communication security settings
Not applicable.
Firewall settings
Depending on the feature configuration the iSM service adds the necessary firewall rules for the following ports to establish a
successful communication with the peer entity.
Table 3. Permitted network ports
Port Number Protocol Direction Subsystem
5000 TCP Outbound iDRAC
443 HTTPS Outbound iDRAC, Dell EMC support server
161 UDP Inbound iDRAC
1266 (Default) TCP Inbound Remote management station
5986 HTTPS Inbound WSMan
Data security
iSM has few features that require data to be stored on the file system of the operating system. iSM stores iSM-specific
configuration files in a location that is accessible only to administrators or root users. iSM configuration includes feature states
and other intermediate files necessary for providing uninterrupted services.
Data storage security settings
iSM stores all the artifacts such as iSM binaries and configuration files on the operating system file system that is restricted to
administrator accounts only.
Data at rest encryption
iSM artifacts are stored unencrypted on the file system that is restricted to administrator access.
Data erasure
iSM uninstall erases all iSM-specific configuration data and intermediate files. Explicit SupportAssist collections saved in a
different path are not cleaned up. On Linux operating systems and Debian-based operating systems, uninstalling iSM retains
configuration files as per RedHat Package Manager (RPM) and Debian Package (dpkg) specifications respectively.
Product and subsystem security
15