Users Guide
Table Of Contents
- Dell Lifecycle Controller GUI v2.40.40.40 User's Guide
- Introduction
- Using Lifecycle Controller
- Operating system deployment
- Monitor
- Hardware inventory view and export
- About view and export current inventory
- About view and export factory-shipped inventory
- Viewing hardware inventory — current or factory shipped
- Exporting hardware inventory — current or factory shipped
- Viewing or exporting hardware inventory after part replacement
- Viewing or exporting current inventory after resetting Lifecycle Controller
- Lifecycle Controller log
- Firmware update
- Configure
- System control panel access options
- Configuring iDRAC
- Configuring system time and date
- Configuring vFlash SD card
- Configuring RAID
- Configuring RAID using software RAID
- Creating a secure virtual disk on a RAID controller
- Key encryption
- Local key encryption mode
- Breaking mirrored drives
- System setup — Advanced Hardware Configuration
- Collect system inventory on restart
- Configuring local FTP server
- Configuring a local USB drive
- Configuring NFS and CIFS servers
- Conditions while configuring HTTP server
- Maintain
- Platform restore
- Backup server profile
- Export server profile
- Import server profile
- Import server license
- Part replacement configuration
- Repurpose or retire system
- Hardware diagnostics
- SupportAssist Collection
- Easy-to-use system component names
- Using the system setup and boot manager
- Troubleshooting and frequently asked questions
NOTE: For recommended characters while accessing network shares, see Recommended characters while accessing
network shares on page 17.
Table 5. Recommended characters for user names
Characters Length
0-9
A-Z
a-z
- ! # $ % & ( ) * / ; ? @ [ \ ] ^ _ ` { | } ~ + < = >
1-16
Table 6. Recommended characters for passwords
Characters Length
0-9
A-Z
a-z
' - ! " # $ % & ( ) * , . / : ; ? @ [ \ ] ^ _ ` { | } ~ + < = >
1-20
NOTE: You may be able to create user names and passwords that include other characters. However, to ensure
compatibility with all interfaces, Dell recommends using only the characters listed here.
NOTE: To improve security, it is recommended to use complex passwords that have 8 or more characters and include
lower-case alphabets, upper-case alphabets, numbers, and special characters. It is also recommended to regularly change
the passwords, if possible.
Table 7. Recommended characters while accessing network shares
Characters Length
0-9
A-Z
a-z
- * / : ? @ \ _ |
User name: 1-16
Password: 1-20
Viewing summary of network settings
This page provides a summary of the Lifecycle Controller and iDRAC IP configurations. Verify the configurations and click Finish
to save the settings and exit from the Settings wizard.
Accessing help
Each Lifecycle Controller page has a help associated with it. Press <F1> or click Help (in the upper-right corner) to view the
help information about the features available on a page.
Viewing release notes
1. To view the release notes, click About on any page of Lifecycle Controller.
NOTE: The About option is not available from the help pages.
2. Click View Release Notes.
Using Lifecycle Controller
17