Install Guide

VMware vSphere (ESXi)
Dependent RPMs For Remote Enablement
If you choose to install the Remote Enablement feature, you have to install certain dependent RPMs and configure these RPMs before
installing the feature. Install the following RPMs:
libcmpiCppImpl0
libwsman1 (RHEL)
openwsman-server
sblim-sfcb
sblim-sfcc
NOTE: Make sure that Pegasus RPMs are uninstalled.
Post Installation Configuration For Remote Enablement
This section details the steps to configure the dependent RPMs if you have installed the Remote Enablement feature.
The post installation configuration script is available at /opt/dell/srvadmin/etc/ on the server file system.
After installing all the dependent RPMs and the Remote Enablement feature, run the autoconf_cim_component.sh script.
Before running the autoconf_cim_component.sh script, ensure that Systems Management is installed.
Run the following command to configure sfcb and openwsman as per the default configurations: ./
autoconf_cim_component.sh
NOTE:
To configure openwsman on the managed node to run on a different port, use the -p <
port
> option with
autoconf_cim_component.sh. This is optional and by default the openwsman is configured to run on port 443.
NOTE: To successfully use openwsmand and sfcbd services on systems running the supported Linux server operating
system with SELinux enabled, use the following commands:
openwsmand
#grep openwsmand /var/log/audit/audit.log | audit2allow -M mypol
#semodule -i mypol.pp
sfcbd
#grep sfcbd /var/log/audit/audit.log | audit2allow -M mypol
#semodule -i mypol.pp
Related Links:
Installing Managed System Software on Supported Linux and VMware ESX
Creating Server Certificate For WSMan
You can either create a certificate for WSMan or reuse an existing certificate.
Creating A New Certificate
You can create a new server certificate for WSMan by running the owsmangencert.sh script that is /etc/openwsman. The
openwsman RPM provides the script. Follow the steps in the wizard to create the server certificate.
NOTE:
On RHEL8, comment RANDFILE and change bits to 2048 in ssleay.cnf before running owsmangencert.sh for
openwsman to run properly .
Reusing An Existing Certificate
If you have a self-signed or CA-signed certificate, you can use the same certificate for the openwsman server by updating the
ssl_cert_file and ssl_key_file values, which are grouped under [server] tag, in /etc/openwsman/openwsman.conf with
the existing certificate values.
Preinstallation Setup
11