Users Guide

3 En la sección Filtro de visualización de rmware, seleccione Componentes.
4 En la lista Componentes, seleccione el componente requerido (BIOS, iDRAC, CPLD, USC, Diagnóstico, unidad de SO, dispositivos
RAID [hasta 2] y dispositivos NIC [hasta 6]) para los que desea ver la versión de rmware.
Aparecerán las versiones de rmware del componente seleccionado de todos los servidores en el chasis miembro seleccionado.
NOTA: Las versiones de rmware de USC, diagnóstico, unidad de SO, dispositivos RAID y dispositivos NIC de servidores
no estarán disponibles en los siguientes casos:
El servidor pertenece a la 10a generación de servidores PowerEdge. Estos servidores no admiten Lifecycle Controller.
El servidor pertenece a la 11ma generación de servidores PowerEdge, pero el rmware de iDRAC no admite Lifecycle
Controller.
La versión de rmware de la CMC de un chasis miembro es anterior a la versión 4.45. En este caso, los componentes de
los servidores del chasis no aparecerán, aunque los servidores admitan Lifecycle Controller.
Obtaining Certicates
The following table lists the types of certicates based on the login type.
Table 17. : Types of Login and Certicate
Login Type Certicate Type How to Obtain
Single Sign-on using
Active Directory
Trusted CA certicate Generate a CSR and get it signed from a Certicate Authority.
Smart Card login as
Active Directory user
User certicate
Trusted CA certicate
User Certicate — Export the smart card user certicate as Base64-
encoded le using the card management software provided by the smart
card vendor.
Trusted CA certicate — This certicate is issued by a CA.
Active Directory user
login
Trusted CA certicate This certicate is issued by a CA.
Local User login SSL Certicate Generate a CSR and get it signed from a trusted CA.
NOTE: CMC ships with a default self-signed SSL server certicate.
The CMC Web server and Virtual Console use this certicate.
Related link
Secure Sockets Layer (SSL) Server Certicates
Secure Sockets Layer (SSL) Server Certicates
CMC includes a Web server that is congured to use the industry-standard SSL security protocol to transfer encrypted data over the
Internet. Built upon public-key and private-key encryption technology, SSL is a widely accepted technique for providing authenticated and
encrypted communication between clients and servers to prevent eavesdropping across a network.
SSL allows an SSL-enabled system to perform the following tasks:
Authenticate itself to an SSL-enabled client.
Allow the client to authenticate itself to the server.
Allow both systems to establish an encrypted connection.
This encryption process provides a high level of data protection. CMC employs the 128-bit SSL encryption standard, the most secure form
of encryption generally available for Internet browsers in North America.
The CMC Web server includes a Dell self-signed SSL digital certicate (Server ID). To ensure high security over the Internet, replace the
Web server SSL certicate by submitting a request to CMC to generate a new Certicate Signing Request (CSR).
At boot time, a new self-signed certicate is generated if:
94
Conguración del CMC