User guide

3
Table of Contents
Introduction ................................................................................................................................................................... 5
Physical connections to iDRAC ...................................................................................................................................... 5
Shared NIC Mode ...................................................................................................................................................... 7
User Authentication and Authorization ......................................................................................................................... 8
Local Accounts ........................................................................................................................................................... 8
Smart Card ................................................................................................................................................................. 9
Active Directory with Dell Schema Extension ......................................................................................................... 10
Active Directory Standard Schema .......................................................................................................................... 12
Single Sign On (SSO) ................................................................................................................................................ 13
Active Directory login troubleshooting ............................................................................................................... 15
Log in via Generic LDAP Directory services ............................................................................................................. 15
Public Key Authentication over SSH ........................................................................................................................ 15
Generating Public Keys ....................................................................................................................................... 15
Logging in Using Public Key Authentication ........................................................................................................ 16
Encryption .................................................................................................................................................................... 16
Secure Sockets Layer (SSL) ...................................................................................................................................... 16
IPMI RMCP+ Encryption .......................................................................................................................................... 16
SSL Certificate Management for Server iDRAC6 Authentication ................................................................................. 16
Types of iDRAC6 Sessions ............................................................................................................................................ 17
Web Browser ........................................................................................................................................................... 17
Remote CLI .............................................................................................................................................................. 17
Local CLI ................................................................................................................................................................... 17
SSH .......................................................................................................................................................................... 18
SNMP ....................................................................................................................................................................... 18
Virtual Media ........................................................................................................................................................... 18
Console Redirection ................................................................................................................................................ 19
KVM login ............................................................................................................................................................ 19
Authentication and Encryption ........................................................................................................................... 19
User Session Privacy ................................................................................................................................................ 19
IPMI Out-of-Band Access Security ........................................................................................................................... 20
Other Security Features ............................................................................................................................................... 21
VLAN ........................................................................................................................................................................ 21
Disabling Services and Changing the Service Port Number..................................................................................... 21