Users Guide
-u:<admin-username> -p:<admin-passwd> -r:http://<remote-hostname OR IP>/wsman -
a:Basic -encoding:utf-8 -skipCACheck –skipCNCheck
• Linux operating system
On all iSM supported Linux operating system, iSM provides an executable command. You can run this command by logging into
the operating system by using SSH or equivalent.
Beginning with iSM 2.4.0, you can congure Agent-x as the default protocol for in-band iDRAC SNMP alerts using the following
command:
./Enable-iDRACSNMPTrap.sh 1/agentx –force
If –force is not specied, ensure that the net-SNMP is congured and restart the snmpd service.
– To enable this feature:
Enable-iDRACSNMPTrap.sh 1
Enable-iDRACSNMPTrap.sh enable
– To disable this feature:
Enable-iDRACSNMPTrap.sh 0
Enable-iDRACSNMPTrap.sh disable
NOTE: The --force option congures the Net-SNMP to forward the traps. However, you must congure the trap
destination.
• VMware ESXi operating system
On all iSM supported ESXi operating systems, the iSM v2.3 supports a Common Management Programming Interface (CMPI)
method provider to enable this feature remotely by using the WinRM remote commands.
winrm i EnableInBandSNMPTraps http://schemas.dell.com/wbem/wscim/1/cim-schema/2/root/
cimv2/dcim/DCIM_iSMService?
__cimnamespace=root/cimv2/dcim+InstanceID=iSMExportedFunctions -u:<user-name> -
p:<passwd> -r:https://<remote-host-name
ip-address>:443/wsman -a:basic -encoding:utf-8 -skipCNCheck -skipCACheck -
skipRevocationcheck @{state="[0/1]"}
NOTE: You must review and congure the VMware ESXi system-wide SNMP settings for traps.
NOTE: For more details, refer to the In-BandSNMPAlerts technical white paper available at http://
en.community.dell.com/techcenter/extras/m/white_papers.
iDRAC access via Host OS (Experimental Feature)
By using this feature, you can congure and monitor the hardware parameters through iDRAC Web interface, WS-MAN, and RedFish
interfaces using the host IP address without conguring the iDRAC IP address. You can use the default iDRAC credentials if the
iDRAC server is not congured or continue to use the same iDRAC credentials if the iDRAC server was congured earlier.
iDRAC access via Windows Operating Systems
You can perform this task by using the following methods:
• Install the iDRAC access feature by using the webpack.
• Congure using iSM PowerShell script
Installation by using MSI
You can install this feature by using the web-pack. This feature is disabled on a typical iSM installation. If enabled, the default
listening port number is 1266. You can modify this port number within the range 1024 through 65535. iSM redirects the connection
to the iDRAC. iSM then creates an inbound rewall rule, OS2iDRAC. The listening port number is added to the OS2iDRAC rewall
264