Users Guide

-u:<admin-username> -p:<admin-passwd> -r:http://<remote-hostname OR IP>/wsman -
a:Basic -encoding:utf-8 -skipCACheck –skipCNCheck
Linux operating system
On all iSM supported Linux operating system, iSM provides an executable command. You can run this command by logging into
the operating system by using SSH or equivalent.
Beginning with iSM 2.4.0, you can congure Agent-x as the default protocol for in-band iDRAC SNMP alerts using the following
command:
./Enable-iDRACSNMPTrap.sh 1/agentx –force
If –force is not specied, ensure that the net-SNMP is congured and restart the snmpd service.
To enable this feature:
Enable-iDRACSNMPTrap.sh 1
Enable-iDRACSNMPTrap.sh enable
To disable this feature:
Enable-iDRACSNMPTrap.sh 0
Enable-iDRACSNMPTrap.sh disable
NOTE: The --force option congures the Net-SNMP to forward the traps. However, you must congure the trap
destination.
VMware ESXi operating system
On all iSM supported ESXi operating systems, the iSM v2.3 supports a Common Management Programming Interface (CMPI)
method provider to enable this feature remotely by using the WinRM remote commands.
winrm i EnableInBandSNMPTraps http://schemas.dell.com/wbem/wscim/1/cim-schema/2/root/
cimv2/dcim/DCIM_iSMService?
__cimnamespace=root/cimv2/dcim+InstanceID=iSMExportedFunctions -u:<user-name> -
p:<passwd> -r:https://<remote-host-name
ip-address>:443/wsman -a:basic -encoding:utf-8 -skipCNCheck -skipCACheck -
skipRevocationcheck @{state="[0/1]"}
NOTE: You must review and congure the VMware ESXi system-wide SNMP settings for traps.
NOTE: For more details, refer to the In-BandSNMPAlerts technical white paper available at http://
en.community.dell.com/techcenter/extras/m/white_papers.
iDRAC access via Host OS (Experimental Feature)
By using this feature, you can congure and monitor the hardware parameters through iDRAC Web interface, WS-MAN, and RedFish
interfaces using the host IP address without conguring the iDRAC IP address. You can use the default iDRAC credentials if the
iDRAC server is not congured or continue to use the same iDRAC credentials if the iDRAC server was congured earlier.
iDRAC access via Windows Operating Systems
You can perform this task by using the following methods:
Install the iDRAC access feature by using the webpack.
Congure using iSM PowerShell script
Installation by using MSI
You can install this feature by using the web-pack. This feature is disabled on a typical iSM installation. If enabled, the default
listening port number is 1266. You can modify this port number within the range 1024 through 65535. iSM redirects the connection
to the iDRAC. iSM then creates an inbound rewall rule, OS2iDRAC. The listening port number is added to the OS2iDRAC rewall
264