Users Guide

Enabling or disabling OS to iDRAC Pass-through using RACADM
To enable or disable OS to iDRAC Pass-through using RACADM, use the objects in the iDRAC.OS-BMC group.
For more information, see the iDRAC RACADM Command Line Interface Reference Guide available at dell.com/idracmanuals.
Enabling or disabling OS to iDRAC Pass-through using iDRAC settings utility
To enable or disable OS to iDRAC Pass-through using iDRAC Settings Utility:
1. In the iDRAC Settings utility, go to Communications Permissions.
The iDRAC Settings.Communications Permissions page is displayed.
2. Select any of the following options to enable OS to iDRAC pass-through:
LOM — The OS to iDRAC pass-through link between the iDRAC and the host operating system is established through the
LOM or NDC.
USB NIC — The OS to iDRAC pass-through link between the iDRAC and the host operating system is established through
the internal USB bus.
To disable this feature, select Disabled.
NOTE: The LOM option can be selected only of the card supports OS to iDRAC pass-through capability. Else, this
option is grayed-out.
3. If you select LOM as the pass-through conguration, and if the server is connected using dedicated mode, enter the IPv4
address of the operating system.
NOTE: If the server is connected in shared LOM mode, then the OS IP Address eld is disabled.
4. If you select USB NIC as the pass-through conguration, enter the IP address of the USB NIC.
The default value is 169.254.0.1. However, if this IP address conicts with an IP address of other interfaces of the host system or
the local network, you must change it. Do not enter 169.254.0.3 and 169.254.0.4 IPs. These IPs are reserved for the USB NIC
port on the front panel when a A/A cable is used
5. Click Back, click Finish, and then click Yes.
The details are saved.
Obtaining certicates
The following table lists the types of certicates based on the login type.
Table 12. Types of
certicate based on login type
Login Type Certicate Type How to Obtain
Single Sign-on using Active Directory Trusted CA certicate Generate a CSR and get it signed from a
Certicate Authority
SHA-2 certicates are also supported.
Smart Card login as a local or Active
Directory user
User certicate
Trusted CA certicate
User Certicate — Export the smart
card user certicate as Base64-
encoded le using the card
management software provided by the
smart card vendor.
Trusted CA certicate — This
certicate is issued by a CA.
SHA-2 certicates are also supported.
Active Directory user login Trusted CA certicate This certicate is issued by a CA.
92