Reference Guide
Table Of Contents
- Dell EMC iDRAC Service Module 3.6 Security Configuration Guide
- Contents
- Overview
- Security quick reference
- Product and subsystem security
- Miscellaneous configuration and management elements
- Internal security information
- Resources and support
- Contacting Dell EMC
Security quick reference
Deployment models
iSM software can be deployed on all the supported operating systems referred to in the corresponding iSM version user's guide.
The installer can be invoked only by a local or domain system administrator. There are two ways widely used to deploy iSM
software on the host operating system.
● Using the iSM installer, download the software from the Dell EMC support site and run the installer on the host as an
administrator.
● Using iDRAC, iSM software can be installed on the host operating system. For more information, see Initial installation of
iDRAC Service Module.
Initial installation of iDRAC Service Module
You can install iDRAC Service Module (iSM) from the iDRAC Enterprise or Datacenter, or from the iDRAC Express interface
on Microsoft Windows and Linux operating systems. The installation procedure is the same for all three installation options,
requiring a single click to initiate the iDRAC installer package on the host system. Using this method rather than downloading the
installer from the Dell EMC support site or the OpenManage DVD ensures that you install a version of iSM that is compatible
with your iDRAC firmware.
About this task
Both an operating system and iSM must be installed on the host operating system.
Steps
1. Start the virtual console.
2. Log in to the host operating system as an administrator.
3. From the device list, select the mounted volume labeled SMINST, and then click the corresponding script to start the
installation. To install iSM, run the appropriate command for your system:
For Windows: ISM_Win.bat
For Linux: sh ISM_Lx.sh or . ISM_Lx.sh
For Ubuntu: bash ism_Lx.sh
After the installation is completed, iDRAC indicates that iSM is installed and specifies the latest installation date.
NOTE:
The installer is accessible by the host operating system for 30 minutes, within which you must start the
installation operation. Otherwise, you must restart the iSM Installer.
Security profiles
iDRAC Service Module (iSM) communication with iDRAC is TLS-encrypted from iSM version 3.4.0 and later. When iSM 3.4.0
or later is installed along with iDRAC firmware older than 3.30.30.00, the communication is not encrypted. Before loading, the
libraries installed by iSM are verified for integrity, source, and path. Access to configuration tasks is restricted to administrator-
level accounts.
2
Security quick reference 7