Dell Remote Access Controller 5 Firmware Version 1.20 User’s Guide w w w. d e l l . c o m | s u p p o r t . d e l l .
Notes and Notices NOTE: A NOTE indicates important information that helps you make better use of your computer. NOTICE: A NOTICE indicates either potential damage to hardware or loss of data and tells you how to avoid the problem. ____________________ Information in this document is subject to change without notice. © 2007 Dell Inc. All rights reserved. Reproduction in any manner whatsoever without the written permission of Dell Inc. is strictly forbidden.
Contents 1 DRAC 5 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . What’s New in DRAC 5 in this Release? . . . . . . . . . . . . . . . . . . . . . 17 . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 Hardware Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 Power Requirements Connectors . . . . . DRAC 5 Ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 18 19 DRAC 5 Hardware Features . . . . . . . . . . . . . . . . . . .
Configuring Your Red Hat Enterprise Linux (Version 4) Management Station 32 Installing and Removing RACADM on a Linux Management Station . . . 32 Installing RACADM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 Configuring a Supported Web Browser . . . . . . . . . . . . . . . . . . . . . Configuring Your Web Browser to Connect to the Web-Based Interface List of Trusted Domains . . . . . . . . . . . . . . . . . . . . . . . . . . 32-bit and 64-bit Web Browsers . . . . . . . . . . . . . . . . .
Enabling the DRAC 5 Serial/Telnet/SSH Console . . . . . . . . . . . . . . 55 Using the RACADM Command to Configure the Settings for the Serial and Telnet Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 Using the Secure Shell (SSH) . . . . . . . . . . . . . . . . . . . . . . . . . . Enabling Additional DRAC 5 Security Options . . . . . . . . . . . . . . . . .
Uploading a Server Certificate Viewing a Server Certificate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86 87 . . . . . . . . . . . . . . . . . . . . . . . . . . 88 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90 Configuring Serial and Terminal Modes. Configuring IPMI and RAC Serial .
Installing the Dell Extension to the Active Directory Users and Computers Snap-In . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Adding DRAC 5 Users and Privileges to Active Directory . . . . . . . . Configuring the DRAC 5 With Extended Schema Active Directory and Web-Based Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . Configuring the DRAC 5 With Extended Schema Active Directory and RACADM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using and Configuring Virtual Media . Overview . . . . . . . . . . . . . . . 143 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143 Installing the Virtual Media Plug-In . . . . . . . . . . . . . . . . . . . . . . Windows-Based Management Station . Linux-Based Management Station . . . Running Virtual Media . . . . . . . . . . . . . . . . . . 144 145 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145 . . . . . . . . . . . . . . . . .
Configuring Multiple DRAC 5 Cards . . . . . . . . . . . . . . . . . . . . . . Creating a DRAC 5 Configuration File . Parsing Rules . . . . . . . . . . . . . Modifying the DRAC 5 IP Address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168 . . . . . . . . . . . . . . . 168 169 169 169 170 170 170 . . . . . . . . . . . . . . . . . . . . . . . . . 172 Before You Begin . . . . . . . . . . . . . .
12 Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting the DRAC 5 . . . . . . . . . . . . . . . . . . . . . . . . . . A RACADM Subcommand Overview . 191 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192 clearasrscreen . config . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192 . . . . . . . . . . . . . . . . . . . . . . . . . .
getsel . clrsel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217 gettracelog . sslcsrgen . sslcertupload . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
cfgNicUseDhcp (Read/Write) . . . cfgNicSelection (Read/Write) . . cfgNicMacAddress (Read Only) . cfgNicVLanEnable (Read/Write) . cfgNicVLanId (Read/Write) . . . . cfgNicVLanPriority (Read/Write) . cfgRemoteHosts . . . . . . . . . . . . . . . . . . . . 233 233 234 234 235 235 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
cfgSerialHistorySize (Read/Write) . . . . cfgSerialSshEnable (Read/Write). . . . . cfgSerialTelnetEnable (Read/Write) . . . cfgSerialCom2RedirEnable (Read/Write) . cfgNetTuning . . . . . . . . . . . . . . . . . 247 247 247 248 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248 cfgNetTuningNicAutoneg (Read/Write) . cfgNetTuningNic100MB (Read/Write) . . cfgNetTuningNicFullDuplex (Read/Write) cfgNetTuningNicMtu (Read/Write) . . . . cfgNetTuningTcpSrttDflt (Read/Write) . . cfgOobSnmp .
cfgRacSecurity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . cfgSecCsrCommonName (Read/Write) . . cfgSecCsrOrganizationName (Read/Write) cfgSecCsrOrganizationUnit (Read/Write) . cfgSecCsrLocalityName (Read/Write) . . . cfgSecCsrStateName (Read/Write) . . . . cfgSecCsrCountryCode (Read/Write) . . . cfgSecCsrEmailAddr (Read/Write) . . . . . cfgSecCsrKeySize (Read/Write) . . . . . . cfgRacVirtual . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
cfgIpmiSerialInputNewLineSequence(Read/Write) cfgIpmiSol . . . . . . . . . . . 271 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271 cfgIpmiSolEnable (Read/Write) . . . . . . . . cfgIpmiSolBaudRate (Read/Write) . . . . . . cfgIpmiSolMinPrivilege (Read/Write) . . . . cfgIpmiSolAccumulateInterval (Read/Write) . cfgIpmiSolSendThreshold (Read/Write) . . . cfgIpmiLan . . . . . . . . . . . . . . 271 272 272 272 273 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Contents
1 DRAC 5 Overview The Dell™ Remote Access Controller 5 (DRAC 5) is a systems management hardware and software solution designed to provide remote management capabilities, crashed system recovery, and power control functions for Dell PowerEdge™ systems. By communicating with the system’s baseboard management controller (BMC), the DRAC 5 (when installed) can be configured to send you email alerts for warnings or errors related to voltages, temperatures, intrusion, and fan speeds.
DRAC 5 Hardware Features Figure 1-1 shows the DRAC 5 hardware. Figure 1-1. DRAC 5 Hardware Features 44-pin MII cable connector 50-pin management cable connector RJ-45 Connector Hardware Specifications Power Requirements Table 1-1 lists the power requirements for the DRAC 5. Table 1-1. DRAC 5 Power Requirements System Power 1.2 A on +3.3 V AUX (maximum) 550 mA on +3.
The 50-pin management cable is the main interface to the DRAC that provides connectivity to USB, serial, video, and an inter-integrated circuit (I2C) bus. The 44-pin MII cable connects the DRAC NIC to the system’s motherboard. The RJ-45 connector connects the DRAC NIC to an out-of-band connection when the DRAC 5 is configured in Dedicated NIC mode. Using the management and MII cables, you can configure your DRAC in three separate modes, depending on your needs.
Table 1-3. DRAC 5 Client Ports (continued) Port Number Function 636 LDAPS 3269 LDAPS for global catalog (GC) Supported Remote Access Connections Table 1-4 lists the connection features. Table 1-4.
Supported Platforms The DRAC 5 supports the following PowerEdge systems: • 1900 • 1950 • 2900 • 2950 • 2970 • 6950 See the Dell PowerEdge Compatibility Guide located on the Dell Support website at support.dell.com for the latest supported platforms. Supported Operating Systems Table 1-5 lists the operating systems that support the DRAC 5. See the Dell OpenManage™ Server Administrator Compatibility Guide located on the Dell Support website at support.dell.com for the latest information.
Table 1-5. Supported Operating Systems (continued) Operating System Family ® Red Hat Linux Operating System Enterprise Linux WS, ES, and AS (version 3) (x86 and x86_64). Enterprise Linux WS, ES, and AS (version 4) (ia32 and x86_64). Enterprise Linux WS, ES, and AS (version 4) (x86 and x86_64). Enterprise Linux 5 (x86 and x86-64).
Disabling the Whitelist Feature in Mozilla Firefox Firefox includes a "whitelist" feature that provides additional security. When the whitelist feature is enabled, the browser requires user permission to install plugins for each distinct site that hosts the plugin. This process requires you to install a plugin for each distinct RAC IP/DNSname, even though the plugin versions are identical.
• IPMI support. • Secure Sockets Layer (SSL) encryption — Provides secure remote system management through the Web-based interface. • Password-level security management — Prevents unauthorized access to a remote system. • Role-based authority — Provides assignable permissions for different systems management tasks.
• Updates are sometimes included with the system to describe changes to the system, software, and/or documentation. • Release notes or readme files may be included to provide last-minute updates to the system or documentation or advanced technical reference material intended for experienced users or technicians. NOTE: Always read the updates first because they often supersede information in other documents.
DRAC 5 Overview
2 Installing and Setting Up the DRAC 5 This section provides information about how to install and setup your DRAC 5 hardware and software.
Configuring Your System to Use a DRAC 5 To configure your system to use a DRAC 5, use the Dell™ Remote Access Configuration Utility (formerly known as the BMC Setup Module). To run the Dell Remote Access Configuration Utility, perform the following steps: 1 Turn on or restart your system. 2 Press when prompted during POST. If your operating system begins to load before you press , allow the system to finish booting, and then restart your system and try again. 3 Configure the NIC.
5 Press . 6 Select Save Changes and Exit. The system automatically reboots. NOTE: When viewing the Web user interface on a Dell PowerEdge 1900 system that is configured with one NIC, the NIC Configuration page displays two NICs (NIC1 and NIC2). This behavior is normal. The PowerEdge 1900 system (and other PowerEdge systems that are configured with a single LAN On Motherboard) can be configured with NIC teaming. Shared and Teamed modes work independently on these systems.
6 Update the DRAC 5 Firmware. See "Updating the DRAC 5 Firmware." 7 Access the DRAC 5 through a network. See "Accessing the DRAC 5 Through a Network." Installing the Software on the Managed System Installing software on the managed system is optional. Without managed system software, you lose the ability to use the RACADM locally, and for the RAC to capture the last crash screen.
Disabling the Windows Automatic Reboot Option To ensure that the DRAC 5 Web-based interface last crash screen feature works properly, disable the Automatic Reboot option on managed systems running the Microsoft Windows Server 2003 and Windows 2000 Server operating systems. Disabling the Automatic Reboot Option in Windows Server 2003 1 Open the Windows Control Panel and double-click the System icon. 2 Click the Advanced tab. 3 Under Startup and Recovery, click Settings.
Configuring Your Red Hat Enterprise Linux (Version 4) Management Station The Dell Digital KVM Viewer requires additional configuration to run on a Red Hat Enterprise Linux (version 4) management station. When you install the Red Hat Enterprise Linux (version 4) operating system on your management station, perform the following procedures: • When prompted to add or remove packages, install the optional Legacy Software Development software.
Configuring a Supported Web Browser The following sections provide instructions for configuring the supported Web browsers. For a list of supported Web browsers, see "Supported Web Browsers." Configuring Your Web Browser to Connect to the Web-Based Interface If you are connecting to the DRAC 5 Web-based interface from a management station that connects to the Internet through a proxy server, you must configure the Web browser to access the Internet from this server.
• German • Spanish • Japanese • Simplified Chinese To view a localized version of the DRAC 5 Web-based interface in Internet Explorer, perform the following steps: 1 Click the Tools menu and select Internet Options. 2 In the Internet Options window, click Languages. 3 In the Language Preference window, click Add. 4 In the Add Language window, select a supported language. To select more than one language, press .
3 If the values include “zh_CN.UTF-8”, no changes are required. If the values do not include “zh_CN.UTF-8”, go to step 4. 4 Navigate to the /etc/sysconfig/i18n file. 5 In the file, apply the following changes: Current entry: LANG="zh_CN.GB18030" SUPPORTED="zh_CN.GB18030:zh_CH.GB2312:zh_CN:zh" Updated entry: LANG="zh_CN.UTF-8" SUPPORTED="zh_CN.UTF-8:zh_CN.GB18030:zh_CH.GB2312:zh_CN:zh" 6 Log out and then login to the operating system. 7 Relaunch the DRAC 5.
Updating the DRAC 5 Firmware Use one of the following methods to update your DRAC 5 firmware. • Web-based Interface — See "Updating the DRAC 5 Firmware Using the Web-Based Interface." • RACADM CLI — See "fwupdate.
3 In the Firmware Update page in the Firmware Image field, type the path to the firmware image that you downloaded from support.dell.com or click Browse to navigate to the image. NOTE: If you are running Firefox, the text cursor does not appear in the Firmware Image field. For example: C:\Updates\V1.0\. The default firmware image name is firmimg.d5. 4 Click Update. The update may take several minutes to complete. When completed, a dialog box appears.
Table 2-1. DRAC 5 Interfaces (continued) Interface Description RACADM Provides remote access to the DRAC 5 using a command line interface. RACADM uses the managed system’s IP address to execute RACADM commands (racadm remote capability option [-r]). NOTE: The racadm remote capability is supported only on management stations. For more information, see "Supported Web Browsers.
Configuring IPMI This section provides information about configuring and using the DRAC 5 IPMI interface. The interface includes the following: • IPMI over LAN • IPMI over Serial • Serial over LAN The DRAC5 is fully IPMI 2.0 compliant. You can configure the DRAC IPMI using your browser; using an open source utility, such as ipmitool; using the Dell OpenManage IPMI shell, ipmish; or using RACADM.
d Update the IPMI SOL baud rate. NOTE: To redirect the serial console over LAN, ensure that the SOL baud rate is identical to your managed system’s baud rate. e Click the Baud Rate drop-down menu, select the appropriate baud rate, and click Apply Changes. f Update the Minimum Required Privilege. This property defines the minimum user privilege that is required to use the Serial Over LAN feature. Click the Channel Privilege Level Limit drop-down menu, select User, Operator, or Administrator.
• New line sequences • Input new line sequences For more information about these properties, see the IPMI 2.0 specification. Configuring IPMI Using the RACADM CLI 1 Login to the remote system using any of the RACADM interfaces. See "Using RACADM." 2 Configure IPMI over LAN. Open a command prompt, type the following command, and press : racadm config -g cfgIpmiLan -o cfgIpmiLanEnable 1 NOTE: This setting determines the IPMI commands that can be executed from the IPMI over LAN interface.
At the command prompt, type the following command and press : racadm config -g cfgIpmiSol -o cfgIpmiSolMinPrivilege where is one of the following: • 2 (User) • 3 (Operator) • 4 (Administrator) For example, to configure the IPMI privileges to 2 (User), type the following command: racadm config -g cfgIpmiSol -o cfgIpmiSolMinPrivilege 2 b Update the IPMI SOL baud rate.
For example: racadm config -g cfgIpmiSerial -o cfgIpmiSerialBaudRate 57600 c Enable the IPMI serial hardware flow control. At the command prompt, type the following command and press : racadm config -g cfgIpmiSerial -o cfgIpmiSerialFlowControl 1 d Set the IPMI serial channel minimum privilege level.
Configuring Platform Events Platform event configuration provides a mechanism for configuring the remote access device to perform selected actions on certain event messages. These actions include reboot, power cycle, power off, and triggering an alert (Platform Events Trap [PET] and/or e-mail).
Configuring PEF Using the Web User Interface 1 Login to the remote system using a supported Web browser. See "Accessing the Web-Based Interface." 2 Click the Alert Management tab and then click Platform Events. 3 Enable global alerts. a Click Alert Management and select Platform Events. b Select the Enable Platform Event Filter Alert checkbox. 4 Under Platform Events Filters Configuration, select the Enable Platform Event Filter alerts check box and then click Apply Changes.
Configuring PET Configuring PET Using the Web User Interface 1 Login to the remote system using a supported Web browser. See "Accessing the Web-Based Interface." 2 Ensure that you followed the procedures in "Configuring PEF Using the Web User Interface." 3 Configure your PET policy. a In the Alert Management tab, click Traps Settings. b Under Destination Configuration Settings, configure the Community String field with the appropriate information and then click Apply Changes.
3 Configure your PET policy. At the command prompt, type the following command and press : racadm config -g cfgIpmiPet -o cfgIpmiPetAlertDestIPAddr -i 1 where 1 is the PET destination index and is the destination IP address of the system that receives the platform event alerts. 4 Configure the Community Name string.
Configuring E-Mail Alerts Using RACADM CLI 1 Enable your global alerts. Open a command prompt, type the following command, and press : racadm config -g cfgIpmiLan -o cfgIpmiLanAlertEnable 1 2 Enable e-mail alerts. At the command prompt, type the following commands and press after each command: racadm config -g cfgEmailAlert -o cfgEmailAlertEnable -i 1 1 where 1 and 1 are the e-mail destination index and the enable/disable selection, respectively.
3 Configuring and Using the DRAC 5 Command Line Console This section provides information about the DRAC 5 command line console (or serial/telnet/ssh console) features, and explains how to set up your system so you can perform systems management actions through the console.
Using the connect com2 Serial Command When using the connect com2 serial command, the following must be configured properly: • The Serial Communication→ Serial Port setting in the BIOS Setup program. • The DRAC configuration settings. When a telnet session is established to the DRAC 5 and these settings are incorrect, connect com2 may display a blank screen.
To configure the IPMI mode using RACADM, perform the following steps: 1 Disable the RAC serial interface. At the command prompt, type: racadm config -g cfgSerial -o cfgSerialConsoleEnable 0 2 Enable the appropriate IPMI mode. For example, at the command prompt, type: racadm config -g cfgIpmiSerial -o cfgIpmiSerialConnectionMode <0 or 1> See "DRAC 5 Property Database Group and Object Definitions" for more information.
Edit the /etc/grub.conf file as follows: 1 Locate the general setting sections in the file and add the following two new lines: serial --unit=1 --speed=57600 terminal --timeout=10 serial 2 Append two options to the kernel line: kernel ............. console=ttyS1,57600 3 If the /etc/grub.conf contains a splashimage directive, comment it out. Table 3-2 provides a sample /etc/grub.conf file that show the changes described in this procedure. Table 3-2. Sample File: /etc/grub.conf # grub.
When you edit the /etc/grub.conf file, use the following guidelines: 1 Disable GRUB's graphical interface and use the text-based interface; otherwise, the GRUB screen will not be displayed in RAC console redirection. To disable the graphical interface, comment out the line starting with splashimage.
Table 3-3. Sample File: /etc/innitab (continued) l0:0:wait:/etc/rc.d/rc l1:1:wait:/etc/rc.d/rc l2:2:wait:/etc/rc.d/rc l3:3:wait:/etc/rc.d/rc l4:4:wait:/etc/rc.d/rc l5:5:wait:/etc/rc.d/rc l6:6:wait:/etc/rc.d/rc 0 1 2 3 4 5 6 # Things to run in every runlevel. ud::once:/sbin/update # Trap CTRL-ALT-DELETE ca::ctrlaltdel:/sbin/shutdown -t3 -r now # When our UPS tells us power has failed, assume we have a few # minutes of power left. Schedule a shutdown for 2 minutes from now.
Table 3-4 shows a sample file with the new line. Table 3-4. Sample File: /etc/securetty vc/1 vc/2 vc/3 vc/4 vc/5 vc/6 vc/7 vc/8 vc/9 vc/10 vc/11 tty1 tty2 tty3 tty4 tty5 tty6 tty7 tty8 tty9 tty10 tty11 ttyS1 Enabling the DRAC 5 Serial/Telnet/SSH Console The serial/telnet/ssh console can be enabled locally or remotely. Enabling the Serial/Telnet/SSH Console Locally NOTE: You (the current user) must have Configure DRAC 5 permission in order to perform the steps in this section.
Enabling the Serial/Telnet/SSH Console Remotely To enable the serial/telnet/ssh console remotely, type the following remote RACADM commands from a command prompt: racadm -u -p -r config -g cfgSerial cfgSerialConsoleEnable 1 racadm -u -p -r config -g cfgSerial cfgSerialTelnetEnable 1 racadm -u -p -r config -g cfgSerial cfgSerialSshEnable 1 Using the RACADM Command to Configure the S
To enable your web server using Secure Shell (SSH), telnet or local RACADM, type the following command from a command prompt on a management station: racadm config -g cfgRacTuning -o cfgRacTuneWebServerEnable 1 Displaying Configuration Settings Table 3-5 provides the actions and related commands to display your configuration settings. To run the commands, open a command prompt on the managed system, type the command, and press . Table 3-5.
Only four SSH sessions are supported at any given time. The session timeout is controlled by the cfgSsnMgtSshIdleTimeout property as described in the "DRAC 5 Property Database Group and Object Definitions.
These features are disabled in the DRAC 5 default configuration. Use the following subcommand or the Web-based interface to enable these features. racadm config -g cfgRacTuning -o Additionally, use these features in conjunction with the appropriate session idle time-out values and a defined security plan for your network. The following subsections provide additional information about these features.
Enabling IP Filtering Below is an example command for IP filtering setup. See "Using RACADM" for more information about RACADM and RACADM commands. NOTE: The following RACADM commands block all IP addresses except 192.168.0.57) To restrict the login to a single IP address (for example, 192.168.0.57), use the full mask, as shown below. racadm config -g cfgRacTuning -o cfgRacTuneIpRangeEnable 1 racadm config -g cfgRacTuning -o cfgRacTuneIpRangeAddr 192.168.0.
Table 3-8 lists the user-defined parameters. Table 3-8. Login Retry Restriction Properties Property Definition cfgRacTuneIpBlkEnable Enables the IP blocking feature. When consecutive failures (cfgRacTuneIpBlkFailCount) from a single IP address are encountered within a specific amount of time (cfgRacTuneIpBlkFailWindow), all further attempts to establish a session from that address are rejected for a certain timespan (cfgRacTuneIpBlkPenaltyTime).
The serial console is available on the DRAC 5 through the managed system external serial connector. Only one serial client system (management station) may be active at any given time. The telnet and SSH consoles are available on the DRAC 5 through the DRAC modes (see "DRAC Modes"). Up to four telnet client systems and four SSH clients may connect at any given time. The management station connection to the managed system serial or telnet console requires management station terminal emulation software.
Configuring the Management Station Terminal Emulation Software Your DRAC 5 supports a serial or telnet text console from a management station running one of the following types of terminal emulation software: • Linux Minicom in an Xterm • Hilgraeve’s HyperTerminal Private Edition (version 6.3) • Linux Telnet in an Xterm • Microsoft® Telnet Perform the steps in the following subsections to configure your type of terminal software. If you are using Microsoft Telnet, configuration is not required.
13 When all specified fields are clear, press to exit the Modem Dialing and Parameter Setup menu. 14 Select Save setup as config_name and press . 15 Select Exit From Minicom and press . 16 At the command shell prompt, type minicom . 17 To expand the Minicom window to 80 x 25, drag the corner of the window. 18 Press , , to exit Minicom.
5 Click OK. 6 Click File → Properties, and then click the Settings tab. 7 Set the Telnet terminal ID: to ANSI. 8 Click Terminal Setup and set Screen Rows to 26. 9 Set Columns to 80 and click OK. Table 3-11. Management Station COM Port Settings Setting Description Required Setting Bits per second 57600 Data bits 8 Parity None Stop bits 1 Flow control Hardware The HyperTerminal window displays a command prompt such as [DRAC 5\root]#.
Enabling Microsoft Telnet for Telnet Console Redirection NOTE: Some telnet clients on Microsoft operating systems may not display the BIOS setup screen correctly when BIOS console redirection is set for VT100 emulation. If this issue occurs, update the display by changing BIOS console redirection to ANSI mode. To perform this procedure in the BIOS setup menu, select Console Redirection → Remote Terminal Type → ANSI. 1 Enable Telnet in Windows Component Services.
Using a Serial or Telnet Console Serial and telnet commands, and RACADM CLI can be typed in a serial or telnet console and executed on the server locally or remotely. The local RACADM CLI is installed for use by a root user only. For more information about the serial/telnet/ssh commands and RACADM CLI, see "Using the RACADM Command Line Interface.
Configuring and Using the DRAC 5 Command LIne Console
4 Configuring the DRAC 5 Using the Web User Interface The DRAC 5 provides a Web-based interface and RACADM (a command-line interface) that enables you to configure the DRAC 5 properties and users, perform remote management tasks, and troubleshoot a remote (managed) system for problems. For everyday systems management, use the DRAC 5 Web-based interface.
To log in, perform the following steps: 1 In the User Name field, type one of the following: • Your DRAC 5 user name. For example, The DRAC 5 user name for local users is case sensitive • Your Active Directory user name. For example, \, /, or @. Examples of an Active Directory user name are: dell.com\john_doe or john_doe@dell.com. The Active Directory user name is not case sensitive.
NOTE: If your managed system DRAC is configured in Shared or Shared with Failover mode and the DRAC is connected to a switch with Spanning Tree Protocol (STP) enabled, network clients will experience a 20-30 second delay in connectivity when the management station’s LOM link state changes during the STP convergence. 1 In the System tree, click Remote Access. 2 Click the Configuration tab and then click Network. 3 In the Network Configuration page, configure the DRAC 5 NIC settings.
Table 4-1. Network Settings (continued) Setting Description Register DRAC on DNS Registers the DRAC 5 name on the DNS server. The default setting is Disabled. DNS DRAC Name Displays the DRAC 5 name only when Register DRAC 5 on DNS is selected. The default DRAC 5 name is RAC-service tag, where service tag is the service tag number of the Dell server (for example, RAC-EK00002). Use DHCP for DNS Domain Name Uses the default DNS domain name.
Table 4-3. Network Configuration Page Buttons Button Description Print Prints the Network Configuration page Refresh Reloads the Network Configuration page Advanced Settings Displays the Network Security page. Apply Changes Saves the changes made to the network configuration. NOTE: Changes to the NIC IP address settings will close all user sessions and require users to reconnect to the DRAC 5 Web-based interface using the updated IP address settings.
Table 4-4. Network Security Page Settings (continued) Settings Description IP Blocking Penalty Time The time span in seconds within which login attempts from an IP address with excessive failures are rejected. Table 4-5. Network Security Page Buttons Button Description Print Prints the Network Security page Refresh Reloads the Network Security page Apply Changes Saves the changes made to the Network Security page. Go Back to Network Configuration Page Returns to the Network Configuration page.
Table 4-6. General Properties Property Description User ID Specifies one of 16 preset User ID numbers. If you are editing information for user root, this field is static. You cannot edit the username for root. Enable User Enables the user to access the DRAC 5. When unchecked, the User Name cannot be changed. User Name Specifies a DRAC 5 user name with up to 16 characters. Each user must have a unique user name. NOTE: User names on the local DRAC 5 cannot include the / (forward slash) or .
Table 4-8. DRAC User Privileges (continued) Property Description Configure Users Enables the user to allow specific users to access the system. Clear Logs Enables the user to clear the DRAC logs. Execute Server Control Commands Enables the user to execute racadm commands. Access Console Redirection Enables the user to run Console Redirection. Access Virtual Media Enables the user to run and use Virtual Media. Test Alerts Enables the user to send test alerts (e-mail and PET) to a specific user.
Configuring and Managing Active Directory Certificates (Standard Schema and Extended Schema) NOTE: You must have Configure DRAC 5 permission to configure Active Directory and upload, download, and view an Active Directory certificate. NOTE: For more information about Active Directory configuration and how to configure Active Directory with Standard Schema or Extended Schema, see Using the DRAC 5 With Microsoft Active Directory.
Configuring Active Directory (Standard Schema and Extended Schema) 1 In the Active Directory Main Menu page, select Configure Active Directory and click Next. 2 In the Active Directory Configuration and Management page, enter the Active Directory settings. Table 4-13 describes the Active Directory Configuration and Management page settings. 3 Click Apply to save the settings. 4 Click the appropriate Active Directory Configuration page button to continue. See Table 4-14.
Table 4-13. Active Directory Configuration and Management Page Settings (continued) Setting Role Groups Description The list of role groups associated with the DRAC 5 card. To change the settings for a role group, click their role group number, in the role groups list. The Configure Role Group window displays. NOTE: If you click on the role group link prior to applying the settings for the Active Directory Configuration and Management page, you will lose these settings.
Table 4-15. Role Group Privileges (continued) Setting Description Test Alerts Enables the user to send test alerts (e-mail and PET) to a specific user. Execute Diagnostic Commands Enables the user to run diagnostic commands. Table 4-16.
Table 4-17. Certificate Upload Page Buttons Button Description Print Print the Certificate Upload page. Go Back to Active Directory Main Menu Return to the Active Directory Main Menu page. Apply Apply the certificate to the DRAC 5 firmware. Downloading a DRAC Server Certificate 1 In the Active Directory Main Menu page, select Download DRAC Server Certificate and click Next. 2 In the File Download window, click Save and save the file to a directory on your system.
Securing DRAC 5 Communications Using SSL and Digital Certificates This subsection provides information about the following data security features that are incorporated in your DRAC 5: • Secure Sockets Layer (SSL) • Certificate Signing Request (CSR) • Accessing the SSL main menu • Generating a new CSR • Uploading a server certificate • Viewing a server certificate Secure Sockets Layer (SSL) The DRAC includes a Web server that is configured to use the industry-standard SSL security protocol to tra
A Certificate Authority is a business entity that is recognized in the IT industry for meeting high standards of reliable screening, identification, and other important security criteria. Examples of CAs include Thawte and VeriSign. After the CA receives your CSR, they review and verify the information the CSR contains. If the applicant meets the CA’s security standards, the CA issues a certificate to the applicant that uniquely identifies that applicant for transactions over networks and on the Internet.
Generating a New Certificate Signing Request NOTE: Each new CSR overwrites any previous CSR on the firmware. Before a certificate authority (CA) can accept your CSR, the CSR in the firmware must match the certificate returned from the CA. Otherwise, the DRAC 5 will not upload the certificate. 1 In the SSL Main Menu page, select Generate a New Certificate Signing Request (CSR) and click Next. 2 In the Generate Certificate Signing Request (CSR) page, type a value for each CSR attribute value.
Table 4-23. Generate Certificate Signing Request (CSR) Page Buttons Button Description Print Print the Generate Certificate Signing Request (CSR) page. Go Back to Security Main Menu Return to the SSL Main Menu page. Generate Generate a CSR. Uploading a Server Certificate 1 In the SSL Main Menu page, select Upload Server Certificate and click Next. The Certificate Upload page appears.
Table 4-25. Certificate Information (continued) Field Description Valid From Issue date of the certificate Valid To Expiration date of the certificate Table 4-26. View Server Certificate Page Buttons Button Description Print Print the View Server Certificate page. Go Back to SSL Main Menu Return to the SSL Main Menu page. Configuring Serial and Terminal Modes Configuring IPMI and RAC Serial 1 Expand the System tree and click Remote Access. 2 Click the Configuration tab and then click Serial.
Table 4-28. RAC Serial Settings Setting Description Enabled Enables or disables the RAC serial console. Checked=Enabled; Unchecked=Disabled Maximum Sessions The maximum number of simultaneous sessions allowed for this system. Timeout The maximum number of seconds of line idle time before the line is disconnected. The range is 60 to 1920 seconds. Default is 300 seconds. Use 0 seconds to disable the Timeout feature. Redirect Enabled Enables or disables Console Redirection.
Table 4-30. Terminal Mode Settings Setting Description Line Editing Enables or disables line editing. Delete Control Select one of the following: • BMC outputs a character when or is received — • BMC outputs a character when or is received — Echo Control Enables or disables echo. Handshaking Control Enables or disables handshaking. New Line Sequence Select None, , , , , or .
5 Configure the advanced settings, if required. Otherwise, click the appropriate Serial Over LAN Configuration page button to continue (see Table 4-33). To configure the advanced settings, perform the following steps: a Click Advanced Settings. b In the Serial Over LAN Configuration Advanced Settings page, configure the advanced settings as required. See Table 4-34. c Click Apply Changes. d Click the appropriate Serial Over LAN Configuration Advanced Settings page button to continue. See Table 4-35.
Table 4-35. Serial Over LAN Configuration Advanced Settings Page Buttons Button Description Print Prints the Serial Over LAN Configuration Advanced Settings page. Refresh Refreshes the Serial Over LAN Configuration Advanced Settings page. Go Back To Serial Over LAN Returns to the Serial Over LAN Configuration page. Configuration Page Apply Changes Applies the Serial Over LAN Configuration Advanced Settings page settings.
Table 4-36. Web Server Settings (continued) Setting Description Active Sessions The number of current sessions on the system, less than or equal to the Max Sessions. Timeout The time in seconds that a connection is allowed to remain idle. The session is cancelled when the timeout is reached. Changes to the timeout setting do not affect the current session. When you change the timeout setting, you must log out and log in again to make the new setting effective. Timeout range is 60 to 1920 seconds.
Table 4-39. Remote RACADM Settings Setting Description Enabled Enables or disables remote RACADM. Checked=Enabled; Unchecked= Disabled. Max Sessions The maximum number of simultaneous sessions allowed for this system. Up to four sessions are supported. Active Sessions The number of current sessions on the system, less than or equal to the Max Sessions. Table 4-40. SNMP Agent Settings Setting Description Enabled Enables or disables the SNMP agent. Checked=Enabled; Unchecked= Disabled.
Frequently Asked Questions Table 4-43 lists frequently asked questions and answers. Table 4-43. Managing and Recovering a Remote System: Frequently Asked Questions Question Answer When accessing the DRAC 5 Web-based interface, I get a security warning stating the hostname of the SSL certificate does not match the hostname of the DRAC 5. The DRAC 5 includes a default DRAC 5 server certificate to ensure network security for the Web-based interface and remote racadm features.
Table 4-43. Managing and Recovering a Remote System: Frequently Asked Questions (continued) Question Answer Why are the remote racadm and Web-based services unavailable after a property change? It may take a minute for the remote RACADM services and the Web-based interface to become available after the DRAC 5 Web server resets.
Table 4-43. Managing and Recovering a Remote System: Frequently Asked Questions (continued) Question Answer The following message is displayed for unknown reasons: As part of discovery, IT Assistant attempts to verify the device’s get and set community names. In IT Assistant, you have the get community name = public and the set community name = private. By default, the community name for the DRAC 5 agent is public.
Configuring the DRAC 5 Using the Web User Interface
5 Recovering and Troubleshooting the Managed System This section explains how to perform tasks related to recovering and troubleshooting a crashed remote system using the DRAC 5 Web-based interface. For information about troubleshooting your DRAC 5, see "Deploying Your Operating System Using VM-CLI.
To access the Power Management page from the System tree, click System and then click the Power Management tab. NOTE: You must have Execute Server Action Commands permission to perform power management actions. Selecting Power Control Actions 1 Select one of the following Power Control Actions. • Power On System— Turns on the system power (equivalent to pressing the power button when the system power is off).
Main System Chassis Table 5-2 and Table 5-3 describes the main system chassis properties. NOTE: To receive Host Name and OS Name information, you must have DRAC 5 services installed on the managed system. Table 5-2. System Information Fields Field Description Description System description. BIOS Version System BIOS version. Service Tag System Service Tag number. Host Name Host system’s name. OS Name Operating system running on the system. Table 5-3.
Baseboard Management Controller Table 5-5 describes the Baseboard Management Controller properties. Table 5-5. BMC Information Fields Field Description Name "Baseboard Management Controller". IPMI Version Intelligent Platform Management Interface (IPMI) version. Number of Possible Active Sessions Maximum number of session that can be active at the same time. Number of Current Active Sessions Total number of current active sessions. Firmware Version Version of the BMC firmware.
Table 5-7. SEL Page Buttons Button Action Print Prints the SEL in the sort order that it appears in the window. Clear Log Clears the SEL. NOTE: The Clear Log button appears only if you have Clear Logs permission. Save As Opens a pop-up window that enables you to save the SEL to a directory of your choice.
NOTE: Due to fluctuations in the Auto Recovery timer, the Last Crash Screen may not be captured when the System Reset Timer is set to a value less than 30 seconds. Use Server Administrator or IT Assistant to set the System Reset Timer to at least 30 seconds and ensure that the Last Crash Screen functions properly. See "Configuring the Managed System to Capture the Last Crash Screen" for additional information. Using the RAC Log The RAC Log is a persistent log maintained in the DRAC 5 firmware.
Using the Diagnostic Console The DRAC 5 provides a standard set of network diagnostic tools (see Table 5-11) that are similar to the tools included with Microsoft® Windows® or Linux-based systems. Using the DRAC 5 Web-based interface, you can access the network debugging tools. To access the Diagnostic Console page, perform the following steps: 1 In the System tree, click Remote Access. 2 Click the Diagnostics tab. Table 5-11 describes the options that are available on the Diagnostic Console page.
The trace log may also contain DRAC 5 firmware-specific error codes that are related to the internal DRAC 5 firmware, not the managed system’s operating system. NOTE: The DRAC 5 will not echo an ICMP (ping) with a packet size larger than 1500 bytes. Troubleshooting Alerting Problems Use logged SNMP trap information to troubleshoot a particular type of DRAC 5 alert. SNMP trap deliveries are logged in the Trace Log by default.
6 Using the DRAC 5 With Microsoft Active Directory A directory service maintains a common database of all information needed for controlling users, computers, printers, etc. on a network. If your company uses the Microsoft® Active Directory® service software, you can configure the software to provide access to the DRAC 5, allowing you to add and control DRAC 5 user privileges to your existing users in your Active Directory software.
Active Directory Schema Extensions The Active Directory data is a distributed database of Attributes and Classes. The Active Directory schema includes the rules that determine the type of data that can be added or included in the database. The user class is one example of a Class that is stored in the database. Some example user class attributes can include the user’s first name, last name, phone number, and so on.
The RAC Device object is the link to the RAC firmware for querying Active Directory for authentication and authorization. When a RAC is added to the network, the Administrator must configure the RAC and its device object with its Active Directory name so users can perform authentication and authorization with Active Directory. Additionally, the Administrator must add the RAC to at least one Association Object in order for users to authenticate.
Additionally, you can configure Active Directory objects in a single domain or in multiple domains. For example, you have two DRAC 5 cards (RAC1 and RAC2) and three existing Active Directory users (user1, user2, and user3). You want to give user1 and user2 an administrator privilege to both DRAC 5 cards and give user3 a login privilege to the RAC2 card. Figure 6-2 shows how you set up the Active Directory objects in this scenario.
See "Adding DRAC 5 Users and Privileges to Active Directory" for detailed instructions. Figure 6-3 provides an example of Active Directory objects in multiple domains. In this scenario, you have two DRAC 5 cards (RAC1 and RAC2) and three existing Active Directory users (user1, user2, and user3). User1 is in Domain1, and user2 and user 3 are in Domain2. In this scenario, configure user1 and user 2 with administrator privileges to both DRAC 5 cards and configure user3 with login privileges to the RAC2 card.
7 Add User3 as Members in Association Object 2 (AO2), Priv2 as Privilege Objects in AO2, and RAC2 as RAC Devices in AO2. Configuring Extended Schema Active Directory to Access Your DRAC 5 Before using Active Directory to access your DRAC 5, configure the Active Directory software and the DRAC 5 by performing the following steps in order: 1 Extend the Active Directory schema (see "Extending the Active Directory Schema").
Using the Dell Schema Extender NOTICE: The Dell Schema Extender uses the SchemaExtenderOem.ini file. To ensure that the Dell Schema Extender utility functions properly, do not modify the name of this file. 1 In the Welcome screen, click Next. 2 Read and understand the warning and click Next. 3 Select Use Current Log In Credentials or enter a user name and password with schema administrator rights. 4 Click Next to run the Dell Schema Extender. 5 Click Finish. The schema is extended.
Table 6-3. dellAssociationObject Class OID 1.2.840.113556.1.8000.1280.1.1.1.2 Description Represents the Dell Association Object. The Association Object provides the connection between the users and the devices. Class Type Structural Class SuperClasses Group Attributes dellProductMembers dellPrivilegeMember Table 6-4. dellRAC4Privileges Class OID 1.2.840.113556.1.8000.1280.1.1.1.3 Description Used to define the privileges (Authorization Rights) for the DRAC 5 device.
Table 6-6. dellProduct Class OID 1.2.840.113556.1.8000.1280.1.1.1.5 Description The main class from which all Dell products are derived. Class Type Structural Class SuperClasses Computer Attributes dellAssociationMembers Table 6-7. List of Attributes Added to the Active Directory Schema Attribute Name/Description Assigned OID/Syntax Object Identifier Single Valued dellPrivilegeMember 1.2.840.113556.1.8000.1280.1.1.2.
Table 6-7. List of Attributes Added to the Active Directory Schema (continued) Attribute Name/Description Assigned OID/Syntax Object Identifier Single Valued dellIsConsoleRedirectUser 1.2.840.113556.1.8000.1280.1.1.2.8 TRUE TRUE if the user has Console Redirection rights on the device. Boolean (LDAPTYPE_BOOLEAN 1.3.6.1.4.1.1466.115.121.1.7) dellIsVirtualMediaUser 1.2.840.113556.1.8000.1280.1.1.2.9 TRUE if the user has Virtual Media rights on the device. Boolean (LDAPTYPE_BOOLEAN 1.3.6.1.4.1.1466.
When you install your systems management software using the Dell Systems Management Consoles CD, you can extend the snap-in by selecting the Dell Extension to the Active Directory User’s and Computers Snap-In option during the installation procedure. See the Dell OpenManage Software Quick Installation Guide for additional instructions about installing systems management software. For more information about the Active Directory User’s and Computers snap-in, see your Microsoft documentation.
Creating a RAC Device Object 1 In the MMC Console Root window, right-click a container. 2 Select New→ Dell RAC Object. The New Object window appears. 3 Type a name for the new object. The name must be identical to the DRAC 5 Name that you will type in step a of "Configuring the DRAC 5 With Extended Schema Active Directory and Web-Based Interface." 4 Select RAC Device Object. 5 Click OK.
Adding Objects to an Association Object Using the Association Object Properties window, you can associate users or user groups, privilege objects, and RAC devices or RAC device groups. If your system is running Windows 2000 mode or higher, use Universal Groups to span domains with your user or RAC objects. You can add groups of Users and RAC devices. The procedure for creating Dell-related groups and nonDell-related groups is identical.
6 In the Common Settings section: a Select the Enable Active Directory check box. b Type the Root Domain Name. The Root Domain Name is the fully qualified root domain name for the forest. c Type the Timeout time in seconds. 7 Click Use Extended Schema in the Active Directory Schema Selection section. 8 In the Extended Schema Settings section: a Type the DRAC Name.
Configuring the DRAC 5 With Extended Schema Active Directory and RACADM Using the following commands to configure the DRAC 5 Active Directory Feature with Extended Schema using the RACADM CLI tool instead of the Web-based interface.
Figure 6-4. Configuration of DRAC 5 with Microsoft Active Directory and Standard Schema Configuration on DRAC 5 Side Configuration on Active Directory Side Role Group Role Group Name and Domain Name Role Definition User Table 6-8.
• With the RACADM CLI tool. See "Configuring the DRAC 5 With Standard Schema Active Directory and RACADM." Configuring Standard Schema Active Directory to Access Your DRAC 5 You need to perform the following steps to configure the Active Directory before an Active Directory user can access the DRAC 5: 1 On an Active Directory server (domain controller), open the Active Directory Users and Computers Snap-in. 2 Create a group or select an existing group.
12 In the Role Group Privileges page, set the group privileges. Table 4-15 describes the Role Group Privileges. Table 4-16 describes the Role Group Permissions. If you modify any of the permissions, the existing Role Group Privilege (Administrator, Power User, or Guest User) will change to either the Custom group or the appropriate Role Group Privilege based on the permissions modified. 13 Click Apply to save the Role Group settings. 14 Click Go Back To Active Directory Configuration and Management.
Configuring the DRAC 5 With Standard Schema Active Directory and RACADM Using the following commands to configure the DRAC 5 Active Directory Feature with Standard Schema using the RACADM CLI instead of the Web-based interface.
Enabling SSL on a Domain Controller If you are using Microsoft Enterprise Root CA to automatically assign all your domain controllers to an SSL certificate, perform the following steps to enable SSL on each domain controller. 1 Install a Microsoft Enterprise Root CA on a Domain Controller. a Select Start→ Control Panel→ Add or Remove Programs. b Select Add/Remove Windows Components. c In the Windows Components Wizard, select the Certificate Services check box.
15 Upload the certificate you saved in step 14 to the DRAC 5. To upload the certificate using RACADM, see "Configuring the DRAC 5 With Extended Schema Active Directory and Web-Based Interface" To upload the certificate using the Web-based interface, perform the following procedure: a Open a supported Web browser window. b Log in to the DRAC 5 Web-based interface. c Expand the System tree and click Remote Access. d Click the Configuration tab, and then click Security.
Using Active Directory to Log In To the DRAC 5 You can use Active Directory to log in to the DRAC 5 using one of the following methods: • Web-based interface • Remote RACADM • Serial or telnet console. The login syntax is consistent for all three methods: or \ or / where username is an ASCII string of 1–256 bytes. White space and special characters (such as \, /, or @) cannot be used in the user name or the domain name.
Table 6-9. Using DRAC 5 With Active Directory: Frequently Asked Questions (continued) Question Answer Are there any restrictions on Domain Controller SSL configuration? Yes. All Active Directory servers’ SSL certificates in the forest must be signed by the same root CA since DRAC 5 only allows uploading one trusted CA SSL certificate. I created and uploaded a new RAC certificate and If you use Microsoft Certificate Services to generate the RAC now the Web-based interface does not launch.
Using the DRAC 5 With Microsoft Active Directory
7 Using GUI Console Redirection This section provides information about using the DRAC 5 console redirection feature. Overview The DRAC 5 console redirection feature enables you to access the local console remotely in either graphic or text mode. Using console redirection, you can control one or more DRAC 5-enabled systems from one location. Today with the power of networking and the Internet, you do not have to sit in front of each server to perform all the routine maintenance.
Table 7-1. Supported Screen Resolutions and Refresh Rates Screen Resolution Refresh Rate (Hz) 720x400 70 640x480 60, 72, 75, 85 800x600 60, 70, 72, 75, 85 1024x768 60, 70, 72, 75, 85 1280x1024 60 Configuring Your Management Station To use Console Redirection on your management station, perform the following procedures: 1 Install and configure a supported Web browser.
Table 7-2. Console Redirection Configuration Page Information (continued) Information Description Video Port Number Default = 5901 Video Encryption Enabled Checked = Enabled; Unchecked=Disabled Local Server Video Enabled Checked = Enabled; Unchecked=Disabled The buttons in Table 7-3 are available on the Console Redirection Configuration page. Table 7-3.
Table 7-4. Console Redirection Page Information (continued) Property Description Max Sessions The maximum number of supported console redirection sessions Active Sessions The current number of active console redirection sessions The buttons in Table 7-5 are available on the Console Redirection page. Table 7-5. Console Redirection Page Buttons Button Definition Refresh Reloads the Console Redirection Configuration page Connect Opens a console redirection session on the targeted remote system.
NOTE: The local server video enabled feature is supported on all x9xx PowerEdge systems except PowerEdge SC1435 and 6950. NOTE: By disabling (turning OFF) the local video on the server, only the monitor connected to the local server will be disabled. Using the Video Viewer The Video Viewer provides a user interface between the management station and the remote system, allowing you to see the remote system's desktop and control its mouse and keyboard functions from your management station.
Table 7-6. Viewer Menu Bar Selections Menu Item Item Description File Capture to File Captures the current remote system screen to a .bmp (Windows) or .png (Linux) file on the local system. A dialog box is displayed that allows you to save the file to a specified location. Exit Exits the Console Redirection page. Refresh Updates the entire remote system-screen viewport. Full Screen Expands the session screen from a window to full screen.
Table 7-6. Viewer Menu Bar Selections (continued) Menu Item Item Description Tools Automatic Video Adjust Recalibrates the session viewer video output. Manual Video Adjust Provides individual controls to manually adjust the session viewer video output. NOTE: Adjusting the horizontal position off-center desynchronizes the mouse pointers. Session Options Provides additional session viewer control adjustments.
• Reducing the Pixel Noise Ratio setting to zero causes multiple video refresh commands that generates excessive network traffic and flickering video in the Video Viewer window. Dell recommends that you adjust the Pixel Noise Ratio setting at a level that provides optimal system performance and pixel enhancement while minimizing network traffic.
Table 7-7. Using Console Redirection: Frequently Asked Questions (continued) Question Answer Can the local user also turn Yes, a local user can use racadm CLI(local) to turn OFF the video. OFF the video? Can the local user also turn Yes, the user should have racadm CLI installed on the server and only if the ON the video? user is able to get to the server over an RDP connection, like terminal services, telnet, or SSH. The user can then log on to the server and can run racadm (local) to turn ON the video.
Table 7-7. Using Console Redirection: Frequently Asked Questions (continued) Question Answer I see video corruption on my In the Console Redirection window, click Refresh to refresh the screen. screen. How do I fix this NOTE: Clicking Refresh several times may be required to correct the video issue? corruption. During Console Redirection, the keyboard and mouse became locked after coming back from hibernation on a Windows 2000 system.
Table 7-7. Using Console Redirection: Frequently Asked Questions (continued) Question Answer Why do I get a blank screen The managed system does not have the correct ATI video driver. You must on the managed system update the video driver by using the Dell PowerEdge Installation and Server when loading the Management CD. Windows 2000 operating system? Why do I get a blank screen The managed system does not have the correct ATI video driver.
Table 7-7. Using Console Redirection: Frequently Asked Questions (continued) Question Answer I am still having issues with Ensure that the target system’s desktop is centered in the console mouse synchronization. redirection window. 1 In the vKVM toolbar, click Tools and select Manual Video Adjustment. 2 Adjust the horizontal and vertical controls as needed to align the desktop in the console redirection window. 3 Click Close.
Table 7-7. Using Console Redirection: Frequently Asked Questions (continued) Question Answer Why doesn’t the Num Lock indicator on my management station reflect the status of the Num Lock on the remote server? When accessed through the DRAC 5, the Num Lock indicator on the management station does not necessarily coincide with the state of the Num Lock on the remote server.
Using GUI Console Redirection
8 Using and Configuring Virtual Media Overview The Virtual Media feature provides the managed system with a virtual CD drive, which can use standard media from anywhere on the network. Figure 8-1 shows the overall architecture of virtual media. Figure 8-1.
The managed system is configured with a DRAC 5 card. The virtual CD and floppy drives are two electronic devices embedded in the DRAC 5 that are controlled by the DRAC 5 firmware. These two devices are present on the managed system’s operating system and BIOS at all times, whether virtual media is connected or disconnected. The management station provides the physical media or image file across the network.
Additionally, you must have administrator rights to install and use the virtual media feature. Before installing the ActiveX control, Internet Explorer may display a security warning. To complete the ActiveX control installation procedure, accept the ActiveX control when Internet Explorer prompts you with a security warning. Linux-Based Management Station To run the virtual media feature on a management station running the Linux operating system, install a supported version of Mozilla or Firefox.
NOTE: The virtual device drive letters on the managed system do not coincide with the physical drive letters on the management station. 4 If prompted, follow the on-screen instructions to install the virtual media plug-in. 5 In the Attribute box, perform the following steps: a In the Value column, ensure that the Attach/Detach status value is Attached. If the value is Detached, perform the following steps: • In the Media tab, click Configuration.
Disconnecting Virtual Media Click Disconnect to disconnect all virtualized images and drives from the management station. All virtualized images or drives disconnect and are no longer available on the managed system. Attaching and Detaching the Virtual Media Feature The DRAC 5 Virtual Media feature is based on USB technology and can take advantage of the USB plug and play features. DRAC 5 adds the option to attach and detach the virtual devices from the USB bus.
Booting From Virtual Media On supported systems, the system BIOS enables you to boot from virtual optical drives or virtual floppy drives. During POST, enter the BIOS setup window and verify that the virtual drives are enabled and listed in the correct order. To change the BIOS setting, perform the following steps: 1 Boot the managed system. 2 Press to enter the BIOS setup window. 3 Scroll to the boot sequence and press .
Using the virtual drives from within Windows is similar to using your physical drives. When you connect to the media at a management station, the media is available at the system by clicking the drive and browsing its content. Linux-Based Systems On Linux systems, the virtual media drives are not configured with a drive letter. Depending on the software installed on your system, the virtual media drives may not be automounted. If your drives are not automounted, manually mount the drives.
Before you upload an image from the RAC Web browser to the Virtual Flash, ensure that the image file is between 1.44 MB and 16 MB in size (inclusive) and Virtual Flash is disabled. After you download the image and re-enable the Virtual Flash drive, the system and BIOS recognize the Virtual Flash. Configuring a Bootable Virtual Flash 1 Insert a bootable diskette into the diskette drive or insert a bootable CD into the optical drive. 2 Restart your system and boot to the selected media drive.
For Windows systems, you must have Power User privileges to run the VM-CLI utility. For Linux systems, you can access the VM-CLI utility without administrator privileges by using the sudo command. This command provides a centralized means of providing non-administrator access and logs all user commands. To add or edit users in the VM-CLI group, the administrator uses the visudo command.
This parameter provides the DRAC 5 IP address and SSL port. The VM-CLI utility needs this information to establish a Virtual Media connection with the target DRAC 5. If you enter an invalid IP address or DDNS name, an error message appears and the command is terminated. If is omitted, port 443 (the default port) is used. The optional SSL port is not required unless you change the DRAC 5 default SSL port.
Additionally, omit this parameter from the command line if you are not virtualizing floppy media. If an invalid value is detected, an error message displays and the command terminates. CD/DVD Device or Image File -c { | } where is a valid CD/DVD drive letter (Windows systems) or a valid CD/DVD device file name (Linux systems) and is the file name and path of a valid ISO-9660 image file.
VM-CLI Operating System Shell Options The following operating system features can be used in the VM-CLI command line: • stderr/stdout redirection — Redirects any printed utility output to a file. For example, using the greater-than character (>) followed by a filename overwrites the specified file with the printed output of the VM-CLI utility. NOTE: The VM-CLI utility does not read from standard input (stdin). As a result, stdin redirection is not required.
Table 8-2. Using Virtual Media: Frequently Asked Questions (continued) Question Answer Why do I sometimes lose my client connection? • You can sometimes lose your client connection if the network is slow or if you change the CD in the client system CD drive. For example, if you change the CD in the client system’s CD drive, the new CD might have an autostart feature.
Table 8-2. Using Virtual Media: Frequently Asked Questions (continued) Question Answer An installation of the Windows operating system If you are installing the Windows operating system using the seems to take too long. Why? Dell PowerEdge Installation and Server Management CD and a slow network connection, the installation procedure may require an extended amount of time to access the DRAC 5 Web-based interface due to network latency.
Table 8-2. Using Virtual Media: Frequently Asked Questions (continued) Question Answer Do I need Administrator privileges to install the ActiveX plug-in? You must have Administrator or Power User privileges on Windows systems to install the Virtual Media plug-in. What privileges do I need to install and use the Virtual Media plug-in on a Red Hat Linux Management station? You must have Write privileges on the browsers directory tree to successfully install the Virtual Media plug-in.
Using and Configuring Virtual Media
9 Using the RACADM Command Line Interface The serial/telnet/ssh console provides a set of racadm commands. The racadm commands provide access to the text-based features supported by the DRAC 5 Web-based interface. RACADM enables you to locally or remotely configure and manage your DRAC 5. RACADM runs on the management station and the managed system. RACADM is included on the Dell Systems Management Consoles CD. You can use RACADM to write scripts to automatically configure multiple DRAC 5s.
From a serial session, you can connect to the managed system’s serial console by pressing , which connects the managed system’s serial port directly to the servers’ COM2 port and bypasses the DRAC 5. To reconnect the DRAC 5 to the serial port, press <9>. The managed node COM2 port and the DRAC 5 serial port baud rates must be identical.
or racadm sslcertupload -t 1 -f c:\cert\cert.txt subcommands RACADM Synopsis racadm -r -u -p racadm -i -r For example: racadm -r 192.168.0.120 -u root -p calvin getsysinfo racadm -i -r 192.168.0.
To disable the remote capability, type: racadm config -g cfgRacTuning -o cfgRacTuneRemoteRacadmEnable 0 RACADM Subcommands Table 9-2 provides a description of each racadm subcommand that you can run in RACADM. For a detailed listing of racadm subcommands including syntax and valid entries, see "RACADM Subcommand Overview." When entering a RACADM subcommand, prefix the command with racadm. For example: racadm help Table 9-2. RACADM Subcommands 162 Command Description help Lists DRAC 5 subcommands.
Table 9-2. RACADM Subcommands (continued) Command Description racreset Resets the DRAC 5. racresetcfg Resets the DRAC 5 to the default configuration. serveraction Performs power management operations on the managed system. getraclog Displays the RAC log. clrsel Clears the System Event Log entries. gettracelog Displays the DRAC 5 trace log. If used with -i, the command displays the number of entries in the DRAC 5 trace log. sslcsrgen Generates and downloads the SSL CSR.
NOTE: Redirecting the RAC configuration to a file using getconfig -f is only supported with the local and remote RACADM interfaces. 2 Modify the configuration file using a simple text editor (optional). 3 Use the new configuration file to modify a target RAC. In the command prompt, type: racadm config -f myfile.cfg 4 Reset the target RAC that was configured. In the command prompt, type: racadm reset The getconfig -f racadm.cfg subcommand requests the DRAC 5 configuration and generates the racadm.cfg file.
The .cfg file is first parsed to verify that valid group and object names are present and that some simple syntax rules are being followed. Errors are flagged with the line number that detected the error, and a simple message explains the problem. The entire file is parsed for correctness, and all errors are displayed. Write commands are not transmitted to the DRAC 5 if an error is found in the .cfg file. The user must correct all errors before any configuration can take place.
[cfgUserAdmin] cfgUserAdminPageModemInitString= • All group entries must be surrounded by "[" and "]" characters. The starting "[" character denoting a group name must start in column one. This group name must be specified before any of the objects in that group. Objects that do not include an associated group name generate an error. The configuration data is organized into groups as defined in "DRAC 5 Property Database Group and Object Definitions.
If you type racadm getconfig -f .cfg, the command builds a .cfg file for the current DRAC 5 configuration. This configuration file can be used as an example and as a starting point for your unique .cfg file. Modifying the DRAC 5 IP Address When you modify the DRAC 5 IP address in the configuration file, remove all unnecessary = value entries. Only the actual variable group’s label with "[" and "]" remains, including the two =value entries pertaining to the IP address change.
Using the RACADM Utility to Configure the DRAC 5 NOTE: You must be logged in as user root to execute RACADM commands on a remote Linux system. The DRAC 5 Web-based interface is the quickest way to configure a DRAC 5. If you prefer commandline or script configuration or need to configure multiple DRAC 5s, use RACADM, which is installed with the DRAC 5 agents on the managed system.
NOTE: When you manually enable or disable a user with the racadm config subcommand, you must specify the index with the -i option. Observe that the cfgUserAdminIndex object displayed in the previous example contains a '#' character. Also, if you use the racadm config -f racadm.cfg command to specify any number of groups/objects to write, the index cannot be specified. A new user is added to the first available index.
racadm testemail -i 2 NOTE: Ensure that the SMTP and Email Alert settings are configured before testing the email alerting feature. See "Configuring E-Mail Alerts" for more information. Testing the RAC SNMP Trap Alert Feature The RAC SNMP trap alerting feature allows SNMP trap listener configurations to receive traps for system events that occur on the managed system. The following example shows how a user can test the SNMP trap alert feature of the RAC.
racadm config -g cfgLanNetworking -o cfgNicGateway 192.168.0.120 racadm config -g cfgLanNetworking -o cfgNicUseDHCP 0 racadm config -g cfgLanNetworking -o cfgDNSServersFromDHCP 0 racadm config -g cfgLanNetworking -o cfgDNSServer1 192.168.0.5 racadm config -g cfgLanNetworking -o cfgDNSServer2 192.168.0.
Frequently Asked Questions Table 9-4 lists the frequently asked questions and answers. Table 9-4. Using the serial and racadm Commands: Frequently Asked Questions Question Answer After performing a DRAC 5 reset (using the racadm You must wait until the DRAC 5 completes the racreset command), I issue a command and the reset before issuing another command.
10 Deploying Your Operating System Using VM-CLI The Virtual Media Command Line Interface (VM-CLI) utility is a command-line interface that provides Virtual Media features from the management station to the DRAC 5 in the remote system. Using VM-CLI and scripted methods, you can deploy your operating system on multiple remote systems in your network. This section provides information on integrating the VM-CLI utility into your corporate network.
Creating a Bootable Image File Before you deploy your image file to the remote systems, ensure that a supported system can boot from the file. To test the image file, transfer the image file to a test system using the DRAC 5 Web user interface and then reboot the system. The following sections provide specific information for creating image files for Linux and Windows systems. Creating an Image File for Linux Systems Use the Data Duplicator utility to create a bootable image file for your Linux system.
4 Perform one of the following procedures: • Integrate RACADM and the Virtual Media command line interface (VM-CLI) into your existing operating system deployment application. Use the sample deployment script as a guide when integrating the DRAC 5 utilities into your existing operating system deployment application. • Use the existing vmdeploy script to deploy your operating system..
Deploying Your Operating System Using VM-CLI
11 Using the DRAC 5 SM-CLP Command Line Interface This section provides information about the Server Management Workgroup (SMWG) Server Management-Command Line Protocol (SM-CLP) that is incorporated in the DRAC 5. NOTE: This section assumes that you are familiar with the Systems Management Architecture for Server Hardware (SMASH) Initiative and the SMWG SM-CLP specifications. For more information on these specifications, see the Distributed Management Task Force (DMTF) website at www.dmtf.org.
Table 11-1. Supported CLI Verbs (continued) Verb Definition show Displays the target properties, verbs, and subtargets. start Turns on a target. stop Shuts down a target. exit Exits from the SM-CLP shell session. version Displays the version attributes of a target. SM-CLP Management Operations and Targets The SM-CLP promotes the concept of verbs and targets to provide system management capabilities through the CLI.
Options Table 11-3 lists the supported SM-CLP options. Table 11-3. Supported SM-CLP Options SM-CLP Option Description -all Instructs the verb to perform all possible functions. -display Displays the user-defined data. -examine Instructs the command processor to validate the command syntax without executing the command. -help Displays command verb help. -version Displays the command verb version.
Table 11-4. Server Power Management Operations (continued) Operation Syntax Starting the SM-CLP management shell >smclp DRAC5 SM-CLP System Management Shell, version 1.0 Copyright (c) 2004-2006 Dell, Inc.
Table 11-5.
Table 11-5. SEL Management Operations (continued) Operation Syntax Viewing the SEL record ->show /system1/logs1/log1/record4 /system1/logs1/log1/record4 Properties: LogCreationClassName CreationClassName LogName RecordID MessageTimeStamp Description ElementName = = = = = = = CIM_RecordLog CIM_LogRecord IPMI SEL 1 20050620100512.
System Properties The Table 11-7 lists the system properties that are displayed when the user types the following: show /system1 These properties are derived from the Base System Profile that is provided by the standards body and is based on the CIM_ComputerSystem class as defined by the CIM schema. For additional information, see the DMTF CIM schema definitions. Table 11-7.
Table 11-7. System Properties (continued) Object Property Description Dedicated Enumeration indicating whether the system is a special-purpose system or general-purpose system.
Table 11-7. System Properties (continued) Object Property Description ResetCapability Defines the reset methods availablle on the system Values: 1=Other 2=Unknown 3=Disabled 4=Enabled 5=Not Implemented CreationClassName The superclass from which this instance is derived. EnabledState Indicates the enabled/disabled states of the system.
Table 11-7. System Properties (continued) Object Property Description RequestedState Indicates the last requested or desired state for the system. Values: 2=Enabled 3=Disabled 4=Shut Down 5=No Change 6=Offline 7=Test 8=Deferred 9=Quiesce 10=Reboot 11=Reset 12=Not Applicable HealthState Indicates the current health of the system.
Table 11-7. System Properties (continued) Object Property Description OperationalStatus Indicates the current status of the system. Values: 0=Unknown 1=Other 2=OK 3=Degraded 4=Stressed 5=Predictive Failure 6=Error 7=Non-Recoverable Error 8=Starting 9=Stopping 10=Stopped 11=In Service 12=No Contact 13=Lost Communication 14=Aborted 15=Dormant 16=Supporting Entity in Error 17=Completed 18=Power Mode Description A text-based description of the system.
Using the DRAC 5 SM-CLP Command Line Interface
12 Troubleshooting Troubleshooting the DRAC 5 See the following tables for help with troubleshooting the DRAC 5 and the RACADM: Table 6-9, "Using DRAC 5 With Active Directory: Frequently Asked Questions" Table 7-7, "Using Console Redirection: Frequently Asked Questions" Table 8-2, "Using Virtual Media: Frequently Asked Questions" Table 9-4, "Using the serial and racadm Commands: Frequently Asked Questions" Troubleshooting 189
Troubleshooting
13 RACADM Subcommand Overview This section provides descriptions of the subcommands that are available in the RACADM command line interface. help NOTE: To use this command, you must have Log In DRAC 5 permission. Table 13-1 describes the help command. Table 13-1. Help Command Command Definition help Lists all of the subcommands available to use with racadm and provides a short description for each.
arp NOTE: To use this command, you must have Execute Diagnostic Commands permission. Table 13-2 describes the arp command. Table 13-2. arp Command Command Definition arp Displays the contents of the ARP table. ARP table entries may not be added or deleted. Synopsis racadm arp Supported Interfaces • Remote RACADM • telnet/ssh/serial RACADM clearasrscreen NOTE: To use this command, you must have Clear Logs permission. Table 13-3 describes the clearasrscreen subcommand. Table 13-3.
config NOTE: To use the getconfig command, you must have Log In DRAC 5 permission. Table 13-4 describes the config and getconfig subcommands. Table 13-4. config/getconfig Subcommand Definition config Configures the DRAC 5. getconfig Gets the DRAC 5 configuration data.
Table 13-5. config Subcommand Options and Descriptions (continued) Option Description -o The -o , or object option, must be used with the -g option. This option specifies the object name that is written with the string . -i The -i , or index option, is only valid for indexed groups and can be used to specify a unique group. The is a decimal integer from 1 through 16. The index is specified here by the index value, not a "named" value.
Input Table 13-6 describes the getconfig subcommand options. NOTE: The -f option without a file specification will output the contents of the file to the terminal screen. Table 13-6. getconfig Subcommand Options Option Description -f The -f option directs getconfig to write the entire RAC configuration to a configuration file. This file can be used for batch configuration operations using the config subcommand.
• racadm getconfig -f myrac.cfg Saves all group configuration objects from the RAC to myrac.cfg. • racadm getconfig -h Displays a list of the available configuration groups on the DRAC 5. • racadm getconfig -u root Displays the configuration properties for the user named root. • racadm getconfig -g cfgUserAdmin -i 2 -v Displays the user group instance at index 2 with verbose information for the property values.
If available, the coredump information is persistent across RAC power cycles and will remain available until either of the following conditions occur: • The coredump information is cleared with the coredumpdelete subcommand. • Another critical condition occurs on the RAC. In this case, the coredump information will be relative to the last critical error that occurred. See the coredumpdelete subcommand for more information about clearing the coredump.
fwupdate NOTE: To use this command, you must have Configure DRAC 5 permission. NOTE: Before you begin your firmware update, see "Updating the DRAC 5 Firmware" for additional instructions. Table 13-9 describes the fwupdate subcommand. Table 13-9. fwupdate Subcommand Definition fwupdate Updates the firmware on the DRAC 5.
Table 13-10. fwupdate Subcommand Options (continued) Option Description -s The status option returns the current status of where you are in the update process. This option is always used by itself. -g The get option instructs the firmware to get the firmware update file from the TFTP server. The user must also specify the -a and -d options.
getssninfo NOTE: To use this command, you must have Log In To DRAC 5 permission. Table 13-11 describes the getssninfo subcommand. Table 13-11. getssninfo Subcommand Subcommand Definition getssninfo Retrieves session information for one or more currently active or pending sessions from the Session Manager's session table. Synopsis racadm getssninfo [-A] [-u | *] Description The getssninfo command returns a list of users that are connected to the DRAC.
Examples • racadm getssninfo Table 13-13 provides an example of output from the racadm getssninfo command. Table 13-13. getssninfo Subcommand Output Example User IP Address Type Consoles root 192.168.0.10 Telnet Virtual KVM • racadm getssninfo -A "root" 143.166.174.19 "Telnet" "NONE" • racadm getssninfo -A -u * "root" "143.166.174.19" "Telnet" "NONE" "bob" "143.166.174.19" "GUI" "NONE" getsysinfo NOTE: To use this command, you must have Log In To DRAC 5 permission.
Input Table 13-15 describes the getsysinfo subcommand options. Table 13-15. getsysinfo Subcommand Options Option Description -d Displays DRAC 5 information. -s Displays system information -w Displays watchdog information -A Eliminates the printing of headers/labels. If the -w option is not specified, then the other options are used as defaults. Output The getsysinfo subcommand displays information related to the RAC, managed system, and watchdog configuration.
BMC Firmware Version Service Tag Host Name OS Name Power Status = = = = = 0.17 48192 racdev103 Microsoft Windows Server 2003 OFF Watchdog Information: Recovery Action Present countdown value Initial countdown value = None = 0 seconds = 0 seconds Examples • racadm getsysinfo -A -s "System Information:" "PowerEdge 2900" "A08" "1.0" "EF23VQ-0023" "Hostname" "Microsoft Windows 2000 version 5.
getractime NOTE: To use this command, you must have Log In DRAC 5 permission. Table 13-16 describes the getractime subcommand. Table 13-16. getractime Subcommand Definition getractime Displays the current time from the remote access controller. Synopsis racadm getractime [-d] Description With no options, the getractime subcommand displays the time in a common readable format. With the -d option, getractime displays the time in the format, yyyymmddhhmmss.
ifconfig NOTE: To use this command, you must have Execute Diagnostic Commands or Configure DRAC 5 permission. Table 13-17 describes the ifconfig subcommand. Table 13-17. ifconfig Subcommand Definition ifconfig Displays the contents of the network interface table. Synopsis racadm ifconfig netstat NOTE: To use this command, you must have Execute Diagnostic Commands permission. Table 13-18 describes the netstat subcommand. Table 13-18.
ping NOTE: To use this command, you must have Execute Diagnostic Commands or Configure DRAC 5 permission. Table 13-19 describes the ping subcommand. Table 13-19. ping Subcommand Definition ping Verifies that the destination IP address is reachable from the DRAC 5 with the current routing-table contents. A destination IP address is required. An ICMP echo packet is sent to the destination IP address based on the current routing-table contents.
Description The setniccfg subcommand sets the controller IP address. • The -d option enables DHCP for the Ethernet management port (default is DHCP enabled). • The -s option enables static IP settings. The IP address, netmask, and gateway can be specified. Otherwise, the existing static settings are used. , , and must be typed as dot-separated strings. racadm setniccfg -s 192.168.0.120 255.255.255.0 192.168.0.
Sample Output The getniccfg subcommand will display an appropriate error message if the operation is not successful. Otherwise, on success, the output displayed in the following format: NIC Enabled = 1 DHCP Enabled = 1 IP Address = 192.168.0.1 Subnet Mask = 255.255.255.0 Gateway = 192.168.0.1 Supported Interfaces • Local RACADM • Remote RACADM • telnet/ssh/serial RACADM getsvctag NOTE: To use this command, you must have Log In To DRAC 5 permission.
Supported Interfaces • Local RACADM • Remote RACADM • telnet/ssh/serial RACADM racdump NOTE: To use this command, you must have Debug permission. Table 13-23 describes the racdump subcommand. Table 13-23. racdump Subcommand Definition racdump Displays status and general DRAC 5 information. Synopsis racadm racdump Description The racdump subcommand provides a single command to get dump, status, and general DRAC 5 board information.
Table 13-24. racreset Subcommand Definition racreset Resets the DRAC 5. NOTICE: When you issue a racreset subcommand, the DRAC may require up to one minute to return to a usable state. Synopsis racadm racreset [hard | soft] Description The racreset subcommand issues a reset to the DRAC 5. The reset event is written into the DRAC 5 log. A hard reset performs a deep reset operation on the RAC. A hard reset should only be performed as a lastcase resort to recover the RAC.
racresetcfg NOTE: To use this command, you must have Configure DRAC 5 permission. Table 13-26 describes the racresetcfg subcommand. Table 13-26. racresetcfg Subcommand Definition racresetcfg Resets the entire RAC configuration to factory default values. Synopsis racadm racresetcfg Supported Interfaces • Local RACADM • Remote RACADM • telnet/ssh/serial RACADM Description The racresetcfg command removes all database property entries that have been configured by the user.
Synopsis racadm serveraction Description The serveraction subcommand enables users to perform power management operations on the host system. Table 13-28 describes the serveraction power control options. Table 13-28. serveraction Subcommand Options String Definition Specifies the action. The options for the string are: • powerdown — Powers down the managed system. • powerup — Powers up the managed system. • powercycle — Issues a power-cycle operation on the managed system.
Synopsis racadm getraclog -i racadm getraclog [-A] [-o] [-c count] [-s start-record] [-m] Description The getraclog -i command displays the number of entries in the DRAC 5 log. The following options allow the getraclog command to read entries: • -A — Displays the output with no headers or labels. • -c — Provides the maximum count of entries to be returned. • -m — Displays one screen of information at a time and prompts the user to continue (similar to the UNIX more command).
Synopsis racadm clrraclog Description The clrraclog subcommand removes all existing records from the RAC log. A new single record is created to record the date and time when the log was cleared. getsel NOTE: To use this command, you must have Log In To DRAC 5 permission. Table 13-30 describes the getsel command. Table 13-30. getsel Command Definition getsel -i Displays the number of entries in the System Event Log. getsel Displays SEL entries.
Output The default output display shows the record number, timestamp, severity, and description. For example: Record: 1 Date/Time: 11/16/2005 22:40:43 Severity: Ok Description: System Board SEL: event log sensor for System Board, log cleared was asserted Supported Interfaces • Local RACADM • Remote RACADM • telnet/ssh/serial RACADM clrsel NOTE: To use this command, you must have Clear Logs permission.
gettracelog NOTE: To use this command, you must have Log In To DRAC 5 permission. Table 13-31 describes the gettracelog subcommand. Table 13-31. gettracelog Command Definition gettracelog -i Displays the number of entries in the DRAC 5 trace log. gettracelog Displays the DRAC 5 trace log. Synopsis racadm gettracelog -i racadm gettracelog [-A] [-o] [-c count] [-s startrecord] [-m] Description The gettracelog (without the -i option) command reads entries.
Supported Interfaces • Local RACADM • Remote RACADM • telnet/ssh/serial RACADM sslcsrgen NOTE: To use this command, you must have Configure DRAC 5 permission. Table 13-32 describes the sslcsrgen subcommand. Table 13-32. sslcsrgen Subcommand Description sslcsrgen Generates and downloads an SSL certificate signing request (CSR) from the RAC.
If no options are specified, a CSR is generated and downloaded to the local file system as sslcsr by default. The -g option cannot be used with the -s option, and the -f option can only be used with the -g option. The sslcsrgen -s subcommand returns one of the following status codes: • CSR was generated successfully. • CSR does not exist. • CSR generation in progress.
Options Table 13-35 describes the sslcertupload subcommand options. Table 13-35. sslcertupload Subcommand Options Option Description -t Specifies the type of certificate to upload, either the CA certificate or server certificate. 1 = server certificate 2 = CA certificate -f Specifies the file name of the certificate to be uploaded. If the file is not specified, the sslcert file in the current directory is selected.
Options Table 13-37 describes the sslcertdownload subcommand options. Table 13-37. sslcertdownload Subcommand Options Option Description -t Specifies the type of certificate to download, either the Microsoft® Active Directory® certificate or server certificate. 1 = server certificate 2 = Microsoft Active Directory certificate -f Specifies the file name of the certificate to be uploaded. If the -f option or the filename is not specified, the sslcert file in the current directory is selected.
Synopsis racadm sslcertview -t [-A] Options Table 13-39 describes the sslcertview subcommand options. Table 13-39. sslcertview Subcommand Options Option Description -t Specifies the type of certificate to view, either the Microsoft Active Directory certificate or server certificate. 1 = server certificate 2 = Microsoft Active Directory certificate -A Prevents printing headers/labels.
racadm sslcertview -t 1 -A 00 US Texas Round Rock Dell Inc. Remote Access Group DRAC5 default certificate US Texas Round Rock Dell Inc. Remote Access Group DRAC5 default certificate Jul 8 16:21:56 2005 GMT Jul 7 16:21:56 2010 GMT Supported Interfaces • Local RACADM • Remote RACADM • telnet/ssh/serial RACADM testemail Table 13-40 describes the testemail subcommand. Table 13-40. testemail configuration Subcommand Description testemail Tests the RAC’s e-mail alerting feature.
Prior to executing the testemail command, ensure that the specified index in the RACADM cfgEmailAlert group is enabled and configured properly. Table Table 13-41 provides a list and associated commands for the cfgEmailAlert group. Table 13-41. testemail Configuration Action Command Enable the alert racadm config -g cfgEmailAlert -o cfgEmailAlertEnable -i 1 1 Set the destination e-mail address racadm config -g cfgEmailAlert -o cfgEmailAlertAddress -i 1 user1@mycompany.
testtrap NOTE: To use this command, you must have Test Alerts permission. Table 13-43 describes the testtrap subcommand. Table 13-43. testtrap Subcommand Description testtrap Tests the RAC’s SNMP trap alerting feature. Synopsis racadm testtrap -i Description The testtrap subcommand tests the RAC’s SNMP trap alerting feature by sending a test trap from the RAC to a specified destination trap listener on the network.
Supported Interfaces • Local RACADM • Remote RACADM • telnet/ssh/serial RACADM vmdisconnect NOTE: To use this command, you must have Access Virtual Media permission. Table 13-46 describes the vmdisconnect subcommand. Table 13-46. vmdisconnect Subcommand Description vmdisconnect Closes all open RAC virtual media connections from remote clients. Synopsis racadm vmdisconnect Description The vmdisconnect subcommand allows a user to disconnect another user's virtual media session.
vmkey NOTE: To use this command, you must have Access Virtual Media permission. Table 13-47 describes the vmkey subcommand. Table 13-47. vmkey Subcommand Description vmkey Performs virtual media key-related operations. Synopsis racadm vmkey If is configured as reset, the virtual flash memory is reset to the default size of 16 MB. Description When a custom virtual media key image is uploaded to the RAC, the key size becomes the image size.
14 DRAC 5 Property Database Group and Object Definitions The DRAC 5 property database contains the configuration information for the DRAC 5. Data is organized by associated object, and objects are organized by object group. The IDs for the groups and objects that the property database supports are listed in this section. Use the group and object IDs with the racadm utility to configure the DRAC 5. The following sections describe each object and indicate whether the object is readable, writable, or both.
idRacDescriptionInfo (Read Only) Legal Values String of up to 255 ASCII characters. Default "This system component provides a complete set of remote management functions for Dell PowerEdge servers." Description A text description of the RAC type. idRacVersionInfo (Read Only) Legal Values String of up to 63 ASCII characters. Default "1.0" Description A string containing the current product firmware version. idRacBuildInfo (Read Only) Legal Values String of up to 16 ASCII characters.
Default DRAC 5 Description A user assigned name to identify this controller. idRacType (Read Only) Default 6 Description Identifies the remote access controller type as the DRAC 5. cfgLanNetworking This group contains parameters to configure the DRAC 5 NIC. One instance of the group is allowed. All objects in this group will require the DRAC 5 NIC to be reset, which may cause a brief loss in connectivity.
Legal Values String of up to 254 ASCII characters. At least one of the characters must be alphabetic. Characters are restricted to alphanumeric, '-' and '.' NOTE: Microsoft® Active Directory® only supports Fully Qualified Domain Names (FQDN) of 64 bytes or fewer. Default "" Description The DNS domain name. This parameter is only valid if cfgDNSDomainNameFromDHCP is set to 0 (FALSE). cfgDNSRacName (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission.
cfgDNSServersFromDHCP (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 1 (TRUE) 0 (FALSE) Default 0 Description Specifies that the DNS server IP addresses should be assigned from the DHCP server on the network. cfgDNSServer1 (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values A string representing a valid IP address. For example: "192.168.0.20". Description Specifies the IP address for DNS server 1.
cfgNicEnable (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 1 (TRUE) 0 (FALSE) Default 0 Description Enables or disables the RAC network interface controller. If the NIC is disabled, the remote network interfaces to the RAC will no longer be accessible, and the RAC will only be available through the serial or local RACADM interfaces. cfgNicIpAddress (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission.
Description The subnet mask used for static assignment of the RAC IP address. This property is only valid if cfgNicUseDhcp is set to 0 (FALSE). cfgNicGateway (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. This parameter is only configurable if the cfgNicUseDhcp parameter is set to 0 (FALSE). Legal Values A string representing a valid gateway IP address. For example: "192.168.0.1". Default 192.168.0.
Legal Values 0 (shared) 1 (shared with failover) 2 (dedicated) Default 2 Description Specifies the current mode of operation for the RAC network interface controller (NIC). Table 14-1 describes the supported modes. Table 14-1. cfgNicSelection Supported Modes Mode Description Shared Used if the host server integrated NIC is shared with the RAC on the host server. This mode enables configurations to use the same IP address on the host server and the RAC for common accessibility on the network.
Legal Values 1 (TRUE) 0 (FALSE) Default 0 Description Enables or disables the VLAN capabilities of the RAC/BMC. cfgNicVLanId (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 0 – 4094 Default 0 Description Specifies the VLAN ID for the network VLAN configuration. This property is only valid if cfgNicVLanEnable is set to 1 (enabled). cfgNicVLanPriority (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission.
cfgRemoteHosts This group provides properties that allow configuration of various remote components, which include the SMTP server for email alerts and TFTP server IP addresses for firmware updates. cfgRhostsSmtpServerIpAddr (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values A string representing a valid SMTP server IP address. For example, 192.168.0.55. Default 0.0.0.0 Description The IP address of the network SMTP server.
Description Specifies the network TFTP server IP address that is used for TFTP RAC firmware update operations. cfgRhostsFwUpdatePath (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values String. Maximum length = 255. Default "" Description Specifies TFTP path where the RAC firmware image file exists on the TFTP server. The TFTP path is relative to the TFTP root path on the TFTP server.
Description The maximum privilege on the IPMI LAN channel. cfgUserAdminIpmiSerialPrivilege (Read/Write) NOTE: To modify this property, you must have Configure Users permission. Legal Values 2 (User) 3 (Operator) 4 (Administrator) 15 (No access) Default 4 (User 2) 15 (All others) Description The maximum privilege on the IPMI serial channel. cfgUserAdminPrivilege (Read/Write) NOTE: To modify this property, you must have Configure Users permission.
Table 14-2. Bit Masks for User Privileges (continued) User Privilege Privilege Bit Mask Configure Users 0x0000004 Clear Logs 0x0000008 Execute Server Control Commands 0x0000010 Access Console Redirection 0x0000020 Access Virtual Media 0x0000040 Test Alerts 0x0000080 Execute Debug Commands 0x0000100 Examples Table B-3 provides sample privilege bit masks for users with one or more privileges. Table 14-3.
Description The name of the user for this index. The user index is created by writing a string into this name field if the index is empty. Writing a string of double quotes ("") deletes the user at that index. You cannot change the name. You must delete and then recreate the name. The string must not contain "/" (forward slash, "\" (backslash), "." (period), "@" ("at" symbol) or quotations marks. NOTE: This property value MUST be unique from other user instances.
Legal Values 1 (TRUE) 0 (FALSE) Default 0 Description Enables or disables Serial Over LAN (SOL) user access. cfgEmailAlert This group contains parameters to configure the RAC e-mail alerting capabilities. The following subsections describe the objects in this group. Up to four instances of this group are allowed. cfgEmailAlertIndex (Read Only) Legal Values 1–4 Default This parameter is populated based on the existing instances. Description The unique index of an alert instance.
cfgEmailAlertAddress (Read Only) Legal Values E-mail address format, with a maximum length of 64 ASCII characters. Default "" Description The e-mail address of the alert source. cfgEmailAlertCustomMsg (Read Only) Legal Values String. Maximum Length = 32. Default "" Description Specifies a custom message that is sent with the alert. cfgSessionManagement This group contains parameters to configure the number of sessions that can connect to the DRAC 5. One instance of the group is allowed.
cfgSsnMgtRacadmTimeout (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 10 –1920 Default 30 Description Defines the idle timeout in seconds for the Remote RACADM interface. If a remote RACADM session remains inactive for more than the specified sessions, the session will be closed. cfgSsnMgtWebserverTimeout (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission.
Description Defines the Secure Shell idle time-out. This property sets the amount of time in seconds that a connection is allowed to remain idle (there is no user input). The session is cancelled if the time limit set by this property is reached. Changes to this setting do not affect the current session (you must log out and log in again to make the new settings effective).
Default 57600 Description Sets the baud rate on the DRAC 5 serial port. cfgSerialConsoleEnable (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 1 (TRUE) 0 (FALSE) Default 0 Description Enables or disables the RAC serial console interface. cfgSerialConsoleQuitKey (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values STRING MaxLen = 4 Default ^\ (<\>) NOTE: The "^" is the key.
ASCII values may be represented using the following Escape Key codes: (a) ^ followed by any alphabetic (a-z, A-Z) (b) ^ followed by the listed special characters: [ ] \ ^ _ cfgSerialConsoleIdleTimeout (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 0 = No time-out 60 – 1920 Default 300 Description The maximum number of seconds to wait before an idle serial session is disconnected.
Example "connect com2" cfgSerialHistorySize (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 0 – 8192 Default 8192 Description Specifies the maximum size of the serial history buffer. cfgSerialSshEnable (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 1 (TRUE) 0 (FALSE) Default 1 Description Enables or disables the secure shell (SSH) interface on the DRAC 5.
Description Enables or disables the telnet console interface on the RAC. cfgSerialCom2RedirEnable (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Default 1 Legal Values 1 (TRUE) 0 (FALSE) Description Enables or disables the console for COM 2 port redirection. cfgNetTuning This group enables users to configure the advanced network interface parameters for the RAC NIC. When configured, the updated settings may take up to a minute to become active.
cfgNetTuningNic100MB (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 0 (10 MBit) 1 (100 MBit) Default 1 Description Specifies the speed to use for the RAC NIC. This property is not used if the cfgNetTuningNicAutoNeg is set to 1 (enabled). cfgNetTuningNicFullDuplex (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission.
Description The size in bytes of the maximum transmission unit used by the DRAC 5 NIC. cfgNetTuningTcpSrttDflt (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 6 – 384 Default 6 Description The smoothed round trip time-out base default value for TCP retransmission round trip time in ½ second units. (Type hexadecimal values.) cfgOobSnmp The group contains parameters to configure the SNMP agent and trap capabilities of the DRAC 5.
Default 0 Description Enables or disables the SNMP agent in the RAC. cfgRacTuning This group is used to configure various RAC configuration properties, such as valid ports and security port restrictions. cfgRacTuneHttpPort (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 10 – 65535 Default 80 Description Specifies the port number to use for HTTP network communication with the RAC.
Legal Values 1 (TRUE) 0 (FALSE) Default 0 Description Enables or disables the IP Address Range validation feature of the RAC. cfgRacTuneIpRangeAddr NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values String, IP address formatted. For example, 192.168.0.44. Default 192.168.1.1 Description Specifies the acceptable IP address bit pattern in positions determined by the 1's in the range mask property (cfgRacTuneIpRangeMask).
Legal Values 1 (TRUE) 0 (FALSE) Default 0 Description Enables or disables the IP address blocking feature of the RAC. cfgRacTuneIpBlkFailcount NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 2 – 16 Default 5 Description The maximum number of login failure to occur within the window before the login attempts from the IP address are rejected. cfgRacTuneIpBlkFailWindow NOTE: To modify this property, you must have Configure DRAC 5 permission.
cfgRacTuneIpBlkPenaltyTime NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 2 – 65535 Default 300 Description Defines the timespan in seconds that session requests from an IP address with excessive failures are rejected. cfgRacTuneSshPort (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 1 – 65535 Default 22 Description Specifies the port number used for the RAC SSH interface.
cfgRacTuneRemoteRacadmEnable (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 1 (TRUE) 0 (FALSE) Default 1 Description Enables or disables the Remote RACADM interface in the RAC. cfgRacTuneConRedirEncryptEnable (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 1 (TRUE) 0 (FALSE) Default 0 Description Encrypts the video in a console redirection session.
Description Specifies the port to be used for keyboard and mouse traffic during Console Redirection activity with the RAC. NOTE: This object requires a DRAC 5 reset before it becomes active. cfgRacTuneConRedirVideoPort (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 1 – 65535 Default 5901 Description Specifies the port to be used for video traffic during Console Redirection activity with the RAC.
Default 0 Description Specifies the daylight savings offset (in minutes) to use for the RAC Time. cfgRacTuneTimezoneOffset (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values -720 – 780 Default 0 Description Specifies the timezone offset (in minutes) from GMT/UTC to use for the RAC Time.
cfgRacTuneLocalServerVideo (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 1 (Enables) 0 (Disables) Default 1 Description Enables (switches ON) or disables (switches OFF) the local server video. ifcRacManagedNodeOs This group contains properties that describe the Managed Server operating system. One instance of the group is allowed. The following subsections describe the objects in this group.
Description The operating system name of the managed system. cfgRacSecurity This group is used to configure settings related to the RAC SSL certificate signing request (CSR) feature. The properties in this group MUST be configured prior to generating a CSR from the RAC. See the RACADM sslcsrgen subcommand details for more information on generating certificate signing requests. cfgSecCsrCommonName (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values String.
Default "" Description Specifies the CSR Organization Unit (OU). cfgSecCsrLocalityName (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values String. Maximum Length = 254. Default "" Description Specifies the CSR Locality (L). cfgSecCsrStateName (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values String. Maximum Length = 254. Default "" Description Specifies the CSR State Name (S).
Description Specifies the CSR Country Code (CC) cfgSecCsrEmailAddr (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values String. Maximum Length = 254. Default "" Description Specifies the CSR Email Address. cfgSecCsrKeySize (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 512 1024 2048 Default 1024 Description Specifies the SSL asymmetric key size for the CSR.
Legal Values 1 (TRUE) 0 (FALSE) Default 0 Description This object is used to attach your virtual devices to the system via the USB bus. When the devices are attached the server will recognize valid USB Mass Storage devices attached to the system. This is equivalent to attaching a local USB CDROM/Floppy drive to a USB port on the system. When the devices are attached you then can connect to the virtual devices remotely using DRAC5 web-based interface or the CLI.
cfgVirMediaKeyEnable (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 1 (TRUE) 0 (FALSE) Default 0 Description Enables or disables the virtual media key feature of the RAC. cfgVirMediaBootOnce (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 1 (Enabled) 0 (Disabled) Default 0 Description Enables or disables the virtual media boot-once feature of the RAC.
Description When set to 0, the Virtual Floppy drive is recognized as a removable disk by Windows operating systems. Windows operating systems will assign a drive letter that is C: or higher during enumeration. When set to 1, the Virtual Floppy drive will be seen as a floppy drive by Windows operating systems. Windows operating systems will assign a drive letter of A: or B:. cfgActiveDirectory This group contains parameters to configure the DRAC 5 Active Directory feature.
Legal Values 1 (TRUE) 0 (FALSE) Default 0 Description Enables or disables Active Directory user authentication on the RAC. If this property is disabled, local RAC authentication is used for user logins instead. cfgADAuthTimeout (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 15 – 300 Default 120 Description Specifies the number of seconds to wait for Active Directory authentication requests to complete before timing out.
Legal Values 1 = Enables Extended Schema with Active Directory. 2 = Enables Standard Schema with Active Directory. Default 1 = Extended Schema Description Determines the schema type to use with Active Directory. cfgStandardSchema This group contains parameters to configure the Standard Schema settings. cfgSSADRoleGroupIndex (Read Only) Legal Values Integer from 1 to 5. Description Index of the Role Group as recorded in the Active Directory.
Default (blank) Description Active Directory Domain in which the Role Group resides. cfgSSADRoleGroupPrivilege (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 0x00000000 to 0x000001ff Default (blank) Description Use the bit mask numbers in Table 14-4 to set role-based authority privileges for a Role Group. Table 14-4.
Legal Values 0 (Terminal) 1 (Basic) Default 1 Description When the DRAC 5 cfgSerialConsoleEnable property is set to 0 (disabled), the DRAC 5 serial port becomes the IPMI serial port. This property determines the IPMI defined mode of the serial port. In Basic mode, the port uses binary data with the intent of communicating with an application program on the serial client. In Terminal mode, the port assumes that a dumb ASCII terminal is connected and allows very simple commands to be entered.
Description Specifies the maximum privilege level allowed on the IPMI serial channel. cfgIpmiSerialFlowControl (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 0 (None) 1 (CTS/RTS) 2 (XON/XOFF) Default 1 Description Specifies the flow control setting for the IPMI serial port. cfgIpmiSerialHandshakeControl (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission.
Default 1 Description Enables or disables line editing on the IPMI serial interface. cfgIpmiSerialEchoControl (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 0 (FALSE) 1 (TRUE) Default 1 Description Enables or disables echo control on the IPMI serial interface. cfgIpmiSerialDeleteControl (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission.
2 (NULL) 3 () 4 () 5 () Default 1 Description Specifies the newline sequence specification for the IPMI serial interface. cfgIpmiSerialInputNewLineSequence(Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 0 () 1 (NULL) Default 1 Description Specifies the input newline sequence specification for the IPMI serial interface. cfgIpmiSol This group is used to configure the Serial-Over-LAN capabilities of the system.
Description Enables or disables Serial Over LAN (SOL). cfgIpmiSolBaudRate (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 9600, 19200, 57600, 115200 Default 57600 Description The baud rate for serial communication over LAN. cfgIpmiSolMinPrivilege (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission.
Description Specifies the typical amount of time that the BMC waits before transmitting a partial SOL character data packet. This value is 1-based 5ms increments. cfgIpmiSolSendThreshold (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 1 – 255 Default 255 Description The SOL threshold limit value. cfgIpmiLan This group is used to configure the IPMI-Over-LAN capabilities of the system.
Legal Values 2 (User) 3 (Operator) 4 (Administrator) Default 0 Description Specifies the maximum privilege level allowed for IPMI over LAN access. cfgIpmiLanAlertEnable (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 0 (FALSE) 1 (TRUE) Default 1 Description Enables or disables global email alerting. This property overrides all individual email alerting enable/disable properties.
cfgIpmiPetCommunityName (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values A string up to 18 characters. Default "public" Description The SNMP community name for traps. cfgIpmiPef This group is used to configure the platform event filters available on the managed server. The event filters can be used to control policy related to actions that are triggered when critical events occur on the managed system. cfgIpmiPefName (Read Only) Legal Values String.
cfgIpmiPefAction (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 0 (None) 1 (Power Down) 2 (Reset) 3 (Power Cycle) Default 0 Description Specifies the action that is performed on the managed system when the alert is triggered. cfgIpmiPefEnable (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values 0 (FALSE) 1 (TRUE) Default 1 Description Enables or disables a specific platform event filter.
Default The appropriate index value. Description Unique identifier for the index corresponding to the trap. cfgIpmiPetAlertDestIpAddr (Read/Write) NOTE: To modify this property, you must have Configure DRAC 5 permission. Legal Values String representing a valid IP address. For example, 192.168.0.67. Default 0.0.0.0 Description Specifies the destination IP address for the trap receiver on the network. The trap receiver receives an SNMP trap when an event is triggered on the managed system.
DRAC 5 Property Database Group and Object Definitions
15 Supported RACADM Interfaces The following table provides an overview of RACADM subcommands and their corresponding interface support. Table 15-1.
Table 15-1.
16 Browser Pre-installation If you are running Linux and your Management Station has a read-only file system, a browser can be installed on a client system without requiring a connection to a DRAC 5. By using the native plugin installation package, the browser can be manually installed during the client setup phase. NOTICE: In a read-only client environment, if the DRAC 5 firmware is updated to a newer version of the plugin, then the installed VM plugin will become inoperative.
Browser Pre-installation
Glossary Active Directory Active Directory is a centralized and standardized system that automates network management of user data, security, and distributed resources, and enables interoperation with other directories. Active Directory is designed especially for distributed networking environments. AGP Abbreviation for accelerated graphics port, which is a bus specification that allows graphics cards faster access to main system memory. ARP data they carry, such as data bus, address bus, or PCI bus.
management station’s system console to control the managed system. CSR Abbreviation for Certificate Signing Request. DHCP Abbreviation for Dynamic Host Configuration Protocol, which is a protocol that provides a means to dynamically allocate IP addresses to computers on a local area network. DLL Abbreviation for Dynamic Link Library, which is a library of small programs, any of which can be called when needed by a larger program that is running in the system.
IPMB Abbreviation for intelligent platform management bus, which is a bus used in systems management technology. IPMI Abbreviation for Intelligent Platform Management Interface, which is a part of systems management technology. Kbps Abbreviation for kilobits per second, which is a data transfer rate. LAN Abbreviation for local area network. LDAP MAP Abbreviation for Manageability Access Point. Mbps Abbreviation for megabits per second, which is a data transfer rate.
RAM Acronym for random-access memory. RAM is generalpurpose readable and writable memory on systems and the DRAC 5. RAM disk SMWG Abbreviation for Systems Management Working Group. SNMP A memory-resident program which emulates a hard drive. The DRAC 5 maintains a RAM disk in its memory. Abbreviation for Simple Network Management Protocol, which is a protocol designed to manage nodes on an IP network. DRAC 5s are SNMP-managed devices (nodes). RAC SNMP trap Abbreviation for remote access controller.
UPS Abbreviation for uninterruptible power supply. USB Abbreviation for Universal Serial Bus. UTC Abbreviation for Universal Coordinated Time. See GMT. VLAN Abbreviation for Virtual Local Area Network. VNC Abbreviation for virtual network computing. VT-100 Abbreviation for Video Terminal 100, which is used by the most common terminal emulation programs. WAN Abbreviation for wide area network.
Glossary
Index A Active Directory adding DRAC 5 users, 115 configuring access to the DRAC 5, 110 configuring and managing certificates, 77 extending schemas, 110 logging in to the DRAC 5, 126 objects, 106 schema extensions, 106 using with extended schema, 105 using with standard schema, 119 using with the DRAC 5, 105 alerts troubleshooting, 104 B BIOS setup configuring on a managed system, 50 bootable image file creating, 174 C Certificate Signing Request (CSR) about, 82 configuring the NIC, 70 creating a configu
Index managing and recovering a remote system, 93 using console redirection, 136 using serial and RACADM commands, 172 using the DRAC 5 with Active Directory, 126 using Virtual Media, 154 L N last crash screen capturing on the managed system, 30 network properties configuring manually, 170 configuring using racadm, 170 Linux XTerm configuring for telnet console redirection, 65 O H M hardware installing, 27 managed system accessing through the local serial port, 61 capturing the last crash sc
cfgIpmiPef, 275 cfgIpmiPet, 276 cfgIpmiSerial, 267 cfgIpmiSol, 271 cfgLanNetworking, 229 cfgNetTuning, 248 cfgOobSnmp, 250 cfgRacSecurity, 259 cfgRacTuning, 251 cfgRacVirtual, 261 cfgRemoteHosts, 236 cfgSerial, 244 cfgSessionManagement, 242 cfgUserAdmin, 237 idRacInfo, 227 R RAC serial configuring, 86 RAC serial interface about, 51 RACADM attaching virtual media, 147 configuring serial and telnet, 56 installing and removing, 32 supported interfaces, 279, 281 RACADM CLI configuring e-mail alerts, 48 configu
Index snap-in installing the Dell extension, 114 software configuring, 29 installing, 29 sslcertdownload, 219 standard schema using with Active Directory, 119 system configuring to use a DRAC 5, 28 T telnet console using, 67 terminal mode configuring, 86-87 troubleshooting, 189 basic, 189 V video viewer accessing the viewer menu bar, 133 using, 133 virtual flash configuring, 150 disabling, 149 enabling, 149 using, 149 virtual media 292 Index about, 143 attaching, 147 booting, 148 detaching, 147 i