Users Guide
3 En la sección Filtro de visualización de rmware, seleccione Componentes.
4 En la lista Componentes, seleccione el componente requerido (BIOS, iDRAC, CPLD, USC, Diagnóstico, unidad de SO, dispositivos
RAID [hasta 2] y dispositivos NIC [hasta 6]) para los que desea ver la versión de rmware.
Aparecerán las versiones de rmware del componente seleccionado de todos los servidores en el chasis miembro seleccionado.
NOTA: Las versiones de rmware de USC, diagnóstico, unidad de SO, dispositivos RAID y dispositivos NIC de servidores
no estarán disponibles en los siguientes casos:
• El servidor pertenece a la 10a generación de servidores PowerEdge. Estos servidores no admiten Lifecycle Controller.
• El servidor pertenece a la 11ma generación de servidores PowerEdge, pero el rmware de iDRAC no admite Lifecycle
Controller.
• La versión de rmware de la CMC de un chasis miembro es anterior a la versión 4.45. En este caso, los componentes de
los servidores del chasis no aparecerán, aunque los servidores admitan Lifecycle Controller.
Obtaining Certicates
The following table lists the types of certicates based on the login type.
Table 17. : Types of Login and Certicate
Login Type Certicate Type How to Obtain
Single Sign-on using
Active Directory
Trusted CA certicate Generate a CSR and get it signed from a Certicate Authority.
Smart Card login as
Active Directory user
• User certicate
• Trusted CA certicate
• User Certicate — Export the smart card user certicate as Base64-
encoded le using the card management software provided by the smart
card vendor.
• Trusted CA certicate — This certicate is issued by a CA.
Active Directory user
login
Trusted CA certicate This certicate is issued by a CA.
Local User login SSL Certicate Generate a CSR and get it signed from a trusted CA.
NOTE: CMC ships with a default self-signed SSL server certicate.
The CMC Web server and Virtual Console use this certicate.
Related link
Secure Sockets Layer (SSL) Server Certicates
Secure Sockets Layer (SSL) Server Certicates
CMC includes a Web server that is congured to use the industry-standard SSL security protocol to transfer encrypted data over the
Internet. Built upon public-key and private-key encryption technology, SSL is a widely accepted technique for providing authenticated and
encrypted communication between clients and servers to prevent eavesdropping across a network.
SSL allows an SSL-enabled system to perform the following tasks:
• Authenticate itself to an SSL-enabled client.
• Allow the client to authenticate itself to the server.
• Allow both systems to establish an encrypted connection.
This encryption process provides a high level of data protection. CMC employs the 128-bit SSL encryption standard, the most secure form
of encryption generally available for Internet browsers in North America.
The CMC Web server includes a Dell self-signed SSL digital certicate (Server ID). To ensure high security over the Internet, replace the
Web server SSL certicate by submitting a request to CMC to generate a new Certicate Signing Request (CSR).
At boot time, a new self-signed certicate is generated if:
94
Conguración del CMC