Users Guide

The following RACADM commands block all IP addresses except 192.168.0.57:
racadm set iDRAC.IPBlocking.RangeEnable 1
racadm set iDRAC.IPBlocking.RangeAddr 192.168.0.57
racadm set iDRAC.IPBlocking.RangeMask 255.255.255.255
To restrict logins to a set of four adjacent IP addresses (for example, 192.168.0.212 through 192.168.0.215), select all but the lowest two bits
in the mask:
racadm set iDRAC.IPBlocking.RangeEnable 1
racadm set iDRAC.IPBlocking.RangeAddr 192.168.0.212
racadm set iDRAC.IPBlocking.RangeMask 255.255.255.252
The last byte of the range mask is set to 252, the decimal equivalent of 11111100b.
For more information, see the iDRAC RACADM Command Line Reference Guide available at dell.com/idracmanuals.
FIPS mode
FIPS is a computer security standard that United States government agencies and contractors must use. Starting from version iDRAC
2.40.40.40, iDRAC supports enabling FIPS mode.
iDRAC will be ocially certied to support FIPS mode in the future.
Dierence between FIPS-mode supported and FIPS-validated
Software that has been validated by completing the Cryptographic Module Validation Program is referred to as FIPS-validated. Because of
the time it takes to complete FIPS-validation, not all versions of iDRAC are validated. For information about the latest status of FIPS-
validation for iDRAC, see the Cryptographic Module Validation Program page on the NIST website.
Enabling FIPS Mode
CAUTION
: Enabling FIPS mode resets iDRAC to factory-default settings. If you want to restore the settings, back up the server
conguration prole (SCP) before you enable FIPS mode, and restore the SCP after iDRAC restarts.
NOTE: If you reinstall or upgrade iDRAC rmware, FIPS mode gets
disabled.
Enabling FIPS mode using web interface
1 On the iDRAC web interface, navigate to Overview > iDRAC Settings > Network.
2 Click Advanced Settings next to Options.
3 In FIPS Mode, select Enabled and click Apply.
4 A message appears prompting you to conrm the change. Click OK.
iDRAC restarts in FIPS mode. Wait for at least 60 seconds before you reconnect to iDRAC.
5 Install a trusted certicate for iDRAC.
NOTE
: The default SSL certicate is not allowed in FIPS
mode.
NOTE: Some iDRAC interfaces, such as the standards-compliant implementations of IPMI and SNMP, do not support FIPS-
compliance.
86 Conguring iDRAC