Users Guide

Table Of Contents
To disable this feature:
Enable-iDRACSNMPTrap.sh 0
Enable-iDRACSNMPTrap.sh disable
NOTE: The --force option configures the Net-SNMP to forward the traps. However, you must configure the trap
destination.
VMware ESXi operating system
On all iSM supported ESXi operating systems, the iSM v2.3 supports a Common Management Programming Interface
(CMPI) method provider to enable this feature remotely by using the WinRM remote commands.
winrm i EnableInBandSNMPTraps http://schemas.dell.com/wbem/wscim/1/cim-schema/2/root/
cimv2/dcim/DCIM_iSMService?
__cimnamespace=root/cimv2/dcim+InstanceID=iSMExportedFunctions -u:<user-name> -
p:<passwd> -r:https://<remote-host-name
ip-address>:443/WSMan -a:basic -encoding:utf-8 -skipCNCheck -skipCACheck -
skipRevocationcheck @{state="[0/1]"}
NOTE: You must review and configure the VMware ESXi system-wide SNMP settings for traps.
NOTE: For more details, refer to the In-BandSNMPAlerts technical white paper available at https://www.dell.com/
support.
iDRAC access via Host OS
By using this feature, you can configure and monitor the hardware parameters through iDRAC Web interface, WSMan, and
RedFish interfaces using the host IP address without configuring the iDRAC IP address. You can use the default iDRAC
credentials if the iDRAC server is not configured or continue to use the same iDRAC credentials if the iDRAC server was
configured earlier.
iDRAC access via Windows Operating Systems
You can perform this task by using the following methods:
Install the iDRAC access feature by using the webpack.
Configure using iSM PowerShell script
Installation by using MSI
You can install this feature by using the web-pack. This feature is disabled on a typical iSM installation. If enabled, the
default listening port number is 1266. You can modify this port number within the range 1024 through 65535. iSM redirects
the connection to the iDRAC. iSM then creates an inbound firewall rule, OS2iDRAC. The listening port number is added to
the OS2iDRAC firewall rule in the host operating system, which allows incoming connections. The firewall rule is enabled
automatically when this feature is enabled.
Beginning with iSM 2.4.0, you can retrieve the current status and listening-port configuration by using the following Powershell
cmdlet:
Enable-iDRACAccessHostRoute status get
The output of this command indicates whether this feature is enabled or disabled. If the feature is enabled, it displays the
listening-port number.
NOTE: Ensure that the Microsoft IP Helper Services is running on your system for this feature to function.
To access the iDRAC Web interface, use the format https://<host-name> or OS-IP>:443/login.html in the browser,
where:
<host-name> Complete host name of the server on which iSM is installed and configured for iDRAC access via OS
feature. You can use the OS IP address if the host name is not present.
443 Default iDRAC port number. This is called the Connect Port number to which all the incoming connections on
listen port number are redirected. You can modify the port number through iDRAC Web interface, WSMan, and RACADM
interfaces.
Using iDRAC Service Module
251