Users Guide
326 Configuring Security Features
Disabling iDRAC6 Remote Virtual KVM
Administrators can selectively disable the iDRAC6 remote KVM, providing a
flexible, secure mechanism for a local user to work on the system without
someone else viewing the user’s actions through console redirection.
Using this feature requires installing the iDRAC managed node software
on the server. Administrators can disable remote vKVM using the
following command:
racadm LocalConRedirDisable 1
The command LocalConRedirDisable disables existing remote vKVM session
windows when executed with the argument 1
To help prevent a remote user from overriding the local user's settings,
this command is available only to local RACADM. Administrators can use
this command in operating systems that support RACADM, including
Microsoft Windows Server 2003 and SUSE Linux Enterprise Server 10.
Because this command persists across system reboots, administrators must
specifically reverse it to re-enable remote vKVM. They can do so by using
the argument 0:
racadm LocalConRedirDisable 0
Several situations might call for disabling iDRAC6 remote vKVM. For
example, administrators may not want a remote iDRAC6 user to view the
BIOS settings that they configure on a system, in which case they can disable
remote vKVM during the system POST by using the
LocalConRedirDisable command. They may also want to increase
security by automatically disabling remote vKVM every time an administrator
logs in to the system, which they can do by executing the
LocalConRedirDisable command from the user logon scripts.
NOTE: See the white paper on Disabling Local Configuration and Remote Virtual
KVM in the DRAC on the Dell Support site at support.dell.com for more information.
For more information on logon scripts, see
technet2.microsoft.com/windowsserver/en/library/31340f46-b3e5-4371-
bbb9-6a73e4c63b621033.mspx.