White Papers

Dell Management Plug-in for VMware vCenter: Discovery of Dell Bare-Metal Servers
iii
Contents
Executive summary ................................................................................................... 5
Introduction ........................................................................................................... 5
Prerequisites .......................................................................................................... 5
Manual discovery ..................................................................................................... 6
Auto-Discovery ........................................................................................................ 7
Process overview .................................................................................................... 7
Prerequisites ......................................................................................................... 8
Provisioning service location ...................................................................................... 8
Disabling administrative account access ......................................................................... 9
For Dell PowerEdge 11
th
Generation servers: ................................................................. 9
For Dell PowerEdge 12
th
Generation servers: ................................................................. 9
Disabling accounts with the administrator role ............................................................... 11
Enabling Auto-Discovery ........................................................................................... 12
Timeout limit ...................................................................................................... 12
Manually configuring a PowerEdge 11
th
Generation server for Auto-Discovery ......................... 12
Ordering Auto-Discovery enabled systems ...................................................................... 13
Undiscovering or deleting bare-metal servers .................................................................. 14
Troubleshooting ...................................................................................................... 15
The IDRAC trace log ................................................................................................ 15
Conclusion ............................................................................................................ 15
Appendix 1. - Configuring advanced security features ........................................................ 16
Adding service tags to the white list ............................................................................ 16
Certificates .......................................................................................................... 16
Handshake client certificate .................................................................................... 17
Private server certificate ........................................................................................ 17