Users Guide
Configuring iDRAC6 Enterprise 37
Configure IP Filtering and IP Blocking
In addition to user authentication, you can prevent unauthorized access by
rejecting connection attempts from IP addresses outside of a defined range
and by temporarily blocking connections from IP addresses where
authentication has failed multiple times within a configurable timespan.
• iDRAC6 Web interface — See "Configuring IP Filtering and IP Blocking"
on page 92.
• RACADM — See "Configuring IP Filtering (IP Range)" on page 290 and
"Configuring IP Blocking" on page 292.
Configure Platform Events
Platform events occur when iDRAC6 detects a warning or critical condition
from one of the managed server’s sensors.
Configure Platform Event Filters (PEF) to choose the actions you want to
execute, such as rebooting the system, when an event is detected.
• iDRAC6 Web interface — See "Configuring Platform Event Filters (PEF)"
on page 95.
• RACADM — See "Configuring PEF" on page 288.
Configure Platform Event Traps (PET) to send alert notifications to an
IP address, such as a management station with management software or to
send an e-mail to a specified e-mail address.
• iDRAC6 Web interface — See "Configuring Platform Event Traps (PET)"
on page 95.
• RACADM — See "Configuring PET" on page 288.
Enabling or Disabling Local Configuration Access
You can disable access to critical configuration parameters, such as network
configuration and user privileges. Once disabled, the setting remains
persistent across reboots. Configuration write access is blocked for both the
local RACADM program and iDRAC6 Configuration Utility (at boot). Web
access to configuration parameters is unimpeded and configuration data is
always available for viewing. For information about iDRAC6 Web interface,
see "Enabling or Disabling Local Configuration Access" on page 119.