Users Guide

Table Of Contents
Securely erase the data.
Set the backplane mode (unified or split mode).
Blink or unblink component LEDs.
Apply the device settings immediately, at next system reboot, at a scheduled time, or as a pending operation to be
applied as a batch as part of the single job.
Update
Manage iDRAC licenses.
Update BIOS and device firmware for devices supported by Lifecycle Controller.
Update or rollback iDRAC firmware and lifecycle controller firmware using a single firmware image.
Manage staged updates.
Backup and restore server profile.
Access iDRAC interface over direct USB connection.
Configure iDRAC using Server Configuration Profiles on USB device.
Maintenance and Troubleshooting
Perform power related operations and monitor power consumption.
Optimize system performance and power consumption by modifying the thermal settings.
No dependency on OpenManage Server Administrator for generation of alerts.
Log event data: Lifecycle and RAC logs.
Set email alerts, IPMI alerts, remote system logs, WS eventing logs, and SNMP traps (v1, v2c, and v3) for events and
improved email alert notification.
Capture last system crash image.
View boot and crash capture videos.
Out-of-band monitor and alert the performance index of CPU, memory, and I/O modules.
Configure warning threshold for inlet temperature and power consumption.
Use iDRAC Service Module to:
View Operating System (OS) information.
Replicate Lifecycle Controller logs to operating system logs.
Automatic system recovery options.
Populate Windows Management Instrumentation (WMI) information.
Integrate with Technical Support Report. This is applicable only if iDRAC Service Module Version 2.0 or later is installed.
For more information, see Generating Tech Support Report.
Prepare to Remove NVMe PCIe SSD. For more information, see Preparing to Remove PCIe SSD.
Generate technical support report in the following ways:
Automatic Using iDRAC Service Module that automatically invokes the OS Collector tool.
Manual Using OS Collector tool.
Secure Connectivity
Securing access to critical network resources is a priority. iDRAC implements a range of security features that includes:
Custom signing certificate for Secure Socket Layer (SSL) certificate.
Signed firmware updates.
User authentication through Microsoft Active Directory, generic Lightweight Directory Access Protocol (LDAP) Directory
Service, or locally administered user IDs and passwords.
Two-factor authentication using the SmartCard logon feature. The two-factor authentication is based on the physical
smart card and the smart card PIN.
Single Sign-on and Public Key Authentication.
Role-based authorization, to configure specific privileges for each user.
SNMPv3 authentication for user accounts stored locally in the iDRAC. It is recommended to use this, but it is disabled by
default.
User ID and password configuration.
Default login password modification.
Set user passwords and BIOS passwords using one way hash format for improved security.
SMCLP and Web interfaces that support 128-bit and 40-bit encryption (for countries where 128 bit is not acceptable), using
the SSL 3.0 standard.
Session time-out configuration (in seconds).
Configurable IP ports (for HTTP, HTTPS, SSH, Telnet, Virtual Console, and Virtual Media).
NOTE: Telnet does not support SSL encryption and is disabled by default.
Secure Shell (SSH) that uses an encrypted transport layer for higher security.
16
Overview