Users Guide
• Set the backplane mode (unified or split mode).
• Blink or unblink component LEDs.
• Apply the device settings immediately, at next system reboot, at a scheduled time, or as a pending operation to be applied as a
batch as part of the single job.
Update
• Manage iDRAC licenses.
• Update BIOS and device firmware for devices supported by Lifecycle Controller.
• Update or rollback iDRAC firmware and lifecycle controller firmware using a single firmware image.
• Manage staged updates.
• Backup and restore server profile.
• Access iDRAC interface over direct USB connection.
• Configure iDRAC using Server Configuration Profiles on USB device.
Maintenance and Troubleshooting
• Perform power related operations and monitor power consumption.
• Optimize system performance and power consumption by modifying the thermal settings.
• No dependency on OpenManage Server Administrator for generation of alerts.
• Log event data: Lifecycle and RAC logs.
• Set email alerts, IPMI alerts, remote system logs, WS eventing logs, and SNMP traps (v1, v2c, and v3) for events and improved email
alert notification.
• Capture last system crash image.
• View boot and crash capture videos.
• Out-of-band monitor and alert the performance index of CPU, memory, and I/O modules.
• Configure warning threshold for inlet temperature and power consumption.
• Use iDRAC Service Module to:
• View Operating System (OS) information.
• Replicate Lifecycle Controller logs to operating system logs.
• Automatic system recovery options.
• Populate Windows Management Instrumentation (WMI) information.
• Integrate with Technical Support Report. This is applicable only if iDRAC Service Module Version 2.0 or later is installed. For more
information, see Generating Tech Support Report.
• Prepare to Remove NVMe PCIe SSD. For more information, see Preparing to Remove PCIe SSD.
• Generate technical support report in the following ways:
• Automatic — Using iDRAC Service Module that automatically invokes the OS Collector tool.
• Manual — Using OS Collector tool.
Secure Connectivity
Securing access to critical network resources is a priority. iDRAC implements a range of security features that includes:
• Custom signing certificate for Secure Socket Layer (SSL) certificate.
• Signed firmware updates.
• User authentication through Microsoft Active Directory, generic Lightweight Directory Access Protocol (LDAP) Directory Service, or
locally administered user IDs and passwords.
• Two-factor authentication using the Smart–Card logon feature. The two-factor authentication is based on the physical smart card and
the smart card PIN.
• Single Sign-on and Public Key Authentication.
• Role-based authorization, to configure specific privileges for each user.
• SNMPv3 authentication for user accounts stored locally in the iDRAC. It is recommended to use this, but it is disabled by default.
• User ID and password configuration.
• Default login password modification.
• Set user passwords and BIOS passwords using one way hash format for improved security.
• SMCLP and Web interfaces that support 128-bit and 40-bit encryption (for countries where 128 bit is not acceptable), using the SSL
3.0 standard.
• Session time-out configuration (in seconds).
• Configurable IP ports (for HTTP, HTTPS, SSH, Telnet, Virtual Console, and Virtual Media).
NOTE:
Telnet does not support SSL encryption and is disabled by default.
• Secure Shell (SSH) that uses an encrypted transport layer for higher security.
16
Overview