Users Guide

NOTE: The --force option configures the Net-SNMP to forward the traps. However, you must configure the trap
destination.
VMware ESXi operating system
On all iSM supported ESXi operating systems, the iSM v2.3 supports a Common Management Programming Interface (CMPI)
method provider to enable this feature remotely by using the WinRM remote commands.
winrm i EnableInBandSNMPTraps http://schemas.dell.com/wbem/wscim/1/cim-schema/2/root/
cimv2/dcim/DCIM_iSMService?
__cimnamespace=root/cimv2/dcim+InstanceID=iSMExportedFunctions -u:<user-name> -
p:<passwd> -r:https://<remote-host-name
ip-address>:443/wsman -a:basic -encoding:utf-8 -skipCNCheck -skipCACheck -
skipRevocationcheck @{state="[0/1]"}
NOTE: You must review and configure the VMware ESXi system-wide SNMP settings for traps.
NOTE: For more details, refer to the In-BandSNMPAlerts technical white paper available at http://
en.community.dell.com/techcenter/extras/m/white_papers.
iDRAC access via Host OS (Experimental Feature)
By using this feature, you can configure and monitor the hardware parameters through iDRAC Web interface, WS-MAN, and
RedFish interfaces using the host IP address without configuring the iDRAC IP address. You can use the default iDRAC credentials if
the iDRAC server is not configured or continue to use the same iDRAC credentials if the iDRAC server was configured earlier.
iDRAC access via Windows Operating Systems
You can perform this task by using the following methods:
Install the iDRAC access feature by using the webpack.
Configure using iSM PowerShell script
Installation by using MSI
You can install this feature by using the web-pack. This feature is disabled on a typical iSM installation. If enabled, the default
listening port number is 1266. You can modify this port number within the range 1024 through 65535. iSM redirects the connection
to the iDRAC. iSM then creates an inbound firewall rule, OS2iDRAC. The listening port number is added to the OS2iDRAC firewall
rule in the host operating system, which allows incoming connections. The firewall rule is enabled automatically when this feature is
enabled.
Beginning with iSM 2.4.0, you can retrieve the current status and listening-port configuration by using the following Powershell
cmdlet:
Enable-iDRACAccessHostRoute –status get
The output of this command indicates whether this feature is enabled or disabled. If the feature is enabled, it displays the listening-
port number.
NOTE: Ensure that the Microsoft IP Helper Services is running on your system for this feature to function.
To access the iDRAC Web interface, use the format https://<host-name> or OS-IP>:443/login.html in the browser,
where:
<host-name> — Complete host name of the server on which iSM is installed and configured for iDRAC access via OS feature.
You can use the OS IP address if the host name is not present.
443 — Default iDRAC port number. This is called the Connect Port number to which all the incoming connections on listen port
number are redirected. You can modify the port number through iDRAC Web interface, WS-MAN, and RACADM interfaces.
Configuration by using iSM PowerShell cmdlet
If this feature is disabled while installing iSM, you can enable the feature by using the following Windows PowerShell command
provided by iSM:
Enable-iDRACAccessHostRoute
If the feature is already configured, you can disable or modify it by using the PowerShell command and the corresponding options.
The available options are as follows:
253