Users Guide

Table Of Contents
Configuring IP Filtering
In addition to user authentication, use the following options to provide additional security while accessing iDRAC:
IP filtering limits the IP address range of the clients accessing iDRAC. It compares the IP address of an incoming login to
the specified range and allows iDRAC access only from a management station whose IP address is within the range. All other
login requests are denied.
When repeated login failures occur from a particular IP address, it prevents the address from logging in to iDRAC for a
preselected time span. If you unsuccessfully log in up to two times, you are allowed to log in again only after 30 seconds. If
you unsuccessfully log in more than two times, you are allowed to log in again only after 60 seconds.
As login failures accumulate from a specific IP address, they are registered by an internal counter. When the user successfully
logs in, the failure history is cleared and the internal counter is reset.
NOTE: When login attempts are prevented from the client IP address, few SSH clients may display the message: ssh
exchange identification: Connection closed by remote host.
NOTE: If you are using Dell Deployment Toolkit (DTK), see the Dell Deployment Toolkit Users Guide for the privileges.
Configure IP Filtering Using iDRAC Web Interface
You must have Configure privilege to perform these steps.
To configure IP filtering:
1. In iDRAC Web interface, go to Overview > iDRAC Settings > Network > Network.
The Network page is displayed.
2. Click Advanced Settings.
The Network Security page is displayed.
3. Specify the IP filtering settings.
For more information about the options, see iDRAC Online Help.
4. Click Apply to save the settings.
Configuring IP Filtering Using RACADM
You must have Configure privilege to perform these steps.
To configure IP filtering, use the following RACADM objects:
With config command:
cfgRacTuneIpRangeEnable
cfgRacTuneIpRangeAddr
cfgRacTuneIpRangeMask
With set command, use the objects in the iDRAC.IPBlocking group:
RangeEnable
RangeAddr
RangeMask
The cfgRacTuneIpRangeMask or the RangeMask property is applied to both the incoming IP address and to the
cfgRacTuneIpRangeAddr or RangeAddr property. If the results are identical, the incoming login request is allowed to
access iDRAC. Logging in from IP addresses outside this range results in an error.
The login proceeds if the following expression equals zero:
Using legacy syntax: cfgRacTuneIpRangeMask & (<incoming-IP-address> ^ cfgRacTuneIpRangeAddr)
Using new syntax: RangeMask & (<incoming-IP-address> ^ RangeAddr)
where, & is the bitwise AND of the quantities and ^ is the bitwise exclusive-OR.
Examples for IP Filtering
The following RACADM commands block all IP addresses except 192.168.0.57:
Configuring iDRAC
71