Users Guide
• View operating system information.
• Replicate Lifecycle Controller logs to operating system logs.
• Automatic system recovery options.
• Remotely hard-reset iDRAC
• Enable in-band iDRAC SNMP alerts
• Access iDRAC using host OS (experimental feature)
• Populate Windows Management Instrumentation (WMI) information.
• Integrate with SupportAssist collection. This is applicable only if iDRAC Service Module Version 2.0 or later is installed. For more
information, see Generating SupportAssist Collection.
• Prepare to remove NVMe PCIe SSD. For more information, see Preparing to remove PCIe SSD.
• Generate SupportAssist collection in the following ways:
• Automatic — Using iDRAC Service Module that automatically invokes the OS Collector tool.
• Manual — Using OS Collector tool.
Dell Best Practices regarding iDRAC
• iDRACs are intended to be on a separate management network; they are not designed nor intended to be placed on or connected to
the internet. Doing so could expose the connected system to security and other risks for which Dell is not responsible.
• Along with locating iDRACs on a separate management subnet, users should isolate the management subnet/vLAN with technologies
such as rewalls, and limit access to the subnet/vLAN to authorized server administrators.
Secure Connectivity
Securing access to critical network resources is a priority. iDRAC implements a range of security features that includes:
• Custom signing certicate for Secure Socket Layer (SSL) certicate.
• Signed rmware updates.
• User authentication through Microsoft Active Directory, generic Lightweight Directory Access Protocol (LDAP) Directory Service, or
locally administered user IDs and passwords.
• Two-factor authentication using the Smart–Card logon feature. The two-factor authentication is based on the physical smart card and
the smart card PIN.
• Single Sign-On and Public Key Authentication.
• Role-based authorization, to congure specic privileges for each user.
• SNMPv3 authentication for user accounts stored locally in the iDRAC. It is recommended to use this, but it is disabled by default.
• User ID and password conguration.
• Default login password modication.
• Set user passwords and BIOS passwords using one-way hash format for improved security.
• FIPS 140-2 Level 1 capability.
• Support for TLS 1.2, 1.1, and 1.0. To enhance security, default setting is TLS 1.1 and higher.
• SMCLP and web interfaces that support 128 bit and 40-bit encryption (for countries where 128 bit is not acceptable), using the TLS 1.2
standard.
NOTE
: To ensure a secure connection, Dell recommends using TLS 1.1 and higher.
• Session time-out conguration (in seconds).
• Congurable IP ports (for HTTP, HTTPS, SSH, Telnet, Virtual Console, and Virtual Media).
NOTE
: Telnet does not support SSL encryption and is disabled by default.
• Secure Shell (SSH) that uses an encrypted transport layer for higher security.
• Login failure limits per IP address, with login blocking from that IP address when the limit is exceeded.
• Limited IP address range for clients connecting to iDRAC.
• Dedicated Gigabit Ethernet adapter available on rack and tower servers (additional hardware may be required).
18
Overview