Users Guide
NOTE: The LOM option can be selected only of the card supports OS to iDRAC pass-through capability. Else, this
option is grayed-out.
3 If you select LOM as the pass-through conguration, and if the server is connected using dedicated mode, enter the IPv4 address of
the operating system.
NOTE: If the server is connected in shared LOM mode, then the OS IP Address eld is disabled.
4
If you select USB NIC as the pass-through conguration, enter the IP address of the USB NIC.
The default value is 169.254.0.1. However, if this IP address conicts with an IP address of other interfaces of the host system or the
local network, you must change it. Do not enter 169.254.0.3 and 169.254.0.4 IPs. These IPs are reserved for the USB NIC port on the
front panel when a A/A cable is used
5 Click Back, click Finish, and then click Yes.
The details are saved.
Obtaining certicates
The following table lists the types of certicates based on the login type.
Table 14. Types of certicate based on login type
Login Type Certicate Type How to Obtain
Single Sign-on using Active Directory Trusted CA certicate Generate a CSR and get it signed from a
Certicate Authority
SHA-2 certicates are also supported.
Smart Card login as a local or Active
Directory user
• User certicate
• Trusted CA certicate
• User Certicate — Export the smart
card user certicate as Base64-encoded
le using the card management software
provided by the smart card vendor.
• Trusted CA certicate — This certicate
is issued by a CA.
SHA-2 certicates are also supported.
Active Directory user login Trusted CA certicate This certicate is issued by a CA.
SHA-2 certicates are also supported.
Local User login SSL Certicate Generate a CSR and get it signed from a
trusted CA
NOTE: iDRAC ships with a default
self-signed SSL server certicate.
The iDRAC Web server, Virtual
Media, and Virtual Console use this
certicate.
SHA-2 certicates are also supported.
Related link
SSL server certicates
Generating a new certicate signing request
Conguring
iDRAC 99