Users Guide

NOTE: The LOM option can be selected only of the card supports OS to iDRAC pass-through capability. Else, this
option is grayed-out.
3 If you select LOM as the pass-through conguration, and if the server is connected using dedicated mode, enter the IPv4 address of
the operating system.
NOTE: If the server is connected in shared LOM mode, then the OS IP Address eld is disabled.
4
If you select USB NIC as the pass-through conguration, enter the IP address of the USB NIC.
The default value is 169.254.0.1. However, if this IP address conicts with an IP address of other interfaces of the host system or the
local network, you must change it. Do not enter 169.254.0.3 and 169.254.0.4 IPs. These IPs are reserved for the USB NIC port on the
front panel when a A/A cable is used
5 Click Back, click Finish, and then click Yes.
The details are saved.
Obtaining certicates
The following table lists the types of certicates based on the login type.
Table 14. Types of certicate based on login type
Login Type Certicate Type How to Obtain
Single Sign-on using Active Directory Trusted CA certicate Generate a CSR and get it signed from a
Certicate Authority
SHA-2 certicates are also supported.
Smart Card login as a local or Active
Directory user
User certicate
Trusted CA certicate
User Certicate — Export the smart
card user certicate as Base64-encoded
le using the card management software
provided by the smart card vendor.
Trusted CA certicate — This certicate
is issued by a CA.
SHA-2 certicates are also supported.
Active Directory user login Trusted CA certicate This certicate is issued by a CA.
SHA-2 certicates are also supported.
Local User login SSL Certicate Generate a CSR and get it signed from a
trusted CA
NOTE: iDRAC ships with a default
self-signed SSL server certicate.
The iDRAC Web server, Virtual
Media, and Virtual Console use this
certicate.
SHA-2 certicates are also supported.
Related link
SSL server certicates
Generating a new certicate signing request
Conguring
iDRAC 99