Users Guide
iDRAC access via Host OS (Experimental Feature)
By using this feature, you can congure and monitor the hardware parameters through iDRAC Web interface, WS-MAN, and Redsh
interfaces using the host IP address without conguring the iDRAC IP address. You can use the default iDRAC credentials if the iDRAC
server is not congured or continue to use the same iDRAC credentials if the iDRAC server was congured earlier.
iDRAC access via Windows Operating Systems
You can perform this task by using the following methods:
• Install the iDRAC access feature by using the webpack.
• Congure using iSM PowerShell script
Installation by using MSI
You can install this feature by using the web-pack. This feature is disabled on a typical iSM installation. If enabled, the default listening port
number is 1266. You can modify this port number within the range 1024 through 65535. iSM redirects the connection to the iDRAC. iSM
then creates an inbound rewall rule, OS2iDRAC. The listening port number is added to the OS2iDRAC rewall rule in the host operating
system, which allows incoming connections. The rewall rule is enabled automatically when this feature is enabled.
Beginning with iSM 2.4.0, you can retrieve the current status and listening-port conguration by using the following PowerShell cmdlet:
Enable-iDRACAccessHostRoute –status get
The output of this command indicates whether this feature is enabled or disabled. If the feature is enabled, it displays the listening-port
number.
NOTE
: Ensure that the Microsoft IP Helper Services is running on your system for this feature to function.
To access the iDRAC Web interface, use the format https://<host-name> or OS-IP>:443/login.html in the browser, where:
• <host-name> — Complete host name of the server on which iSM is installed and congured for iDRAC access via OS feature. You
can use the OS IP address if the host name is not present.
• 443 — Default iDRAC port number. This is called the Connect Port number to which all the incoming connections on listen port
number are redirected. You can modify the port number through iDRAC Web interface, WS-MAN, and RACADM interfaces.
Conguration by using iSM PowerShell cmdlet
If this feature is disabled while installing iSM, you can enable the feature by using the following Windows PowerShell command provided by
iSM:
Enable-iDRACAccessHostRoute
If the feature is already congured, you can disable or modify it by using the PowerShell command and the corresponding options. The
available options are as follows:
• Status — This parameter is mandatory. The values are not case sensitive and the value can be true, false, or get.
• Port — This is the listening port number. If you do not provide a port number, the default port number (1266) is used. If the Status
parameter value is FALSE, then you can ignore rest of the parameters. You must enter a new port number that is not already congured
for this feature. The new port number settings overwrite the existing OS2iDRAC in-bound rewall rule and you can use the new port
number to connect to iDRAC. The value range is from 1024 to 65535.
• IPRange — This parameter is optional and it provides a range of IP addresses that are allowed to connect to iDRAC through the host
operating system. The IP address range format is in Classless Inter-Domain Routing (CIDR) format, which is a combination of IP address
and subnet mask. For example, 10.94.111.21/24. Access to iDRAC is restricted for IP addresses that are not within the range.
NOTE
: This feature supports only IPv4 addresses.
iDRAC access via Linux Operating Systems
Using iDRAC Service Module
287