Users Guide
For example,
option myname code 43 = text;
subnet 192.168.0.0 netmask 255.255.0.0 {
#default gateway
option routers 192.168.0.1;
option subnet-mask 255.255.255.0;
option nis-domain "domain.org";
option domain-name "domain.org";
option domain-name-servers 192.168.1.1;
option time-offset -18000; # Eastern Standard Time
# option ntp-servers 192.168.1.1;
# option netbios-name-servers 192.168.1.1;
# --- Selects point-to-point node (default is hybrid). Don't change this unless
# -- you understand Netbios very well
# option netbios-node-type 2;
option vendor-class-identifier "iDRAC";
set vendor-string = option vendor-class-identifier;
option myname "2001::9174:9611:5c8d:e85//xmlfiles/dhcpProv.xml -u root -p calvin";
range dynamic-bootp 192.168.0.128 192.168.0.254;
default-lease-time 21600;
max-lease-time 43200;
# we want the nameserver to appear at a fixed address
host ns {
next-server marvin.redhat.com;
hardware ethernet 12:34:56:78:AB:CD;
fixed-address 207.175.42.254;
}
}
Enabling Auto Config Using iDRAC Web Interface
Make sure that DHCPv4 and the Enable IPv4 options are enabled and Auto-discovery is disabled.
To enable Auto Config:
1. In the iDRAC Web interface, go to Overview > iDRAC Settings > Network.
The Network page is displayed.
2. In the Auto Config section, select one of the following options to enable Auto Config:
• Enable Once — Configures the component only once using the XML file referenced by the DHCP server. After this, Auto Config
is disabled.
• Enable Once After Reset — After the iDRAC is reset, configures the components only once using the XML file referenced by
the DHCP server. After this, Auto Config is disabled.
To disable the Auto Config feature, select Disable.
3. Click Apply to apply the setting.
Enabling Auto Config Using RACADM
To enable Auto Config feature using RACADM, use the iDRAC.NIC.AutoConfig object. For more information, see the iDRAC8
RACADM Command Line Interface Reference Guide.
Using Hash Passwords for Improved Security
For iDRAC in 13
th
generation servers, you can set user passwords and BIOS passwords using a one way hash format. The user
authentication mechanism is not affected (except for SNMPv3 and IPMI) and you can provide the password in plain text format.
With the new password hash feature:
• You can generate your own SHA256 hashes to set iDRAC user passwords and BIOS passwords. This allows you to have the SHA256
values in the server configuration profile, RACADM, and WSMAN. When you provide the SHA256 password values, you cannot
authenticate through SNMPv3 and IPMI.
• You can set up a template server including all the iDRAC user accounts and BIOS passwords using the current plain text mechanism.
After the server is set up, you can export the server configuration profile with the password that has hash values. The export includes
the hash values required for SNMPv3 and IPMI authentication.
You can generate the hash password with and without Salt using SHA256.
42
Setting Up Managed System and Management Station