Users Guide

Configuring the DRAC 5 Using the Web User Interface 73
Configuring the Network Security Settings
NOTE: You must have Configure DRAC 5 permission to perform the following steps.
1
In the
System
tree, click
Remote Access
.
2
Click the
Configuration
tab and then click
Network
.
3
In the
Network Configuration
page, click
Advanced Settings
.
4
In the
Network Security
page, configure the attribute values and then click
Apply Changes
.
Table 4-4 describes the
Network Security
page settings.
5
Click the appropriate
Network Security
page button to continue. See Table 4-5.
Table 4-3. Network Configuration Page Buttons
Button Description
Print Prints the Network Configuration page
Refresh Reloads the Network Configuration page
Advanced Settings Displays the Network Security page.
Apply Changes Saves the changes made to the network configuration.
NOTE: Changes to the NIC IP address settings will close all user sessions and
require users to reconnect to the DRAC 5 Web-based interface using the updated
IP address settings. All other changes will require the NIC to be reset, which may
cause a brief loss in connectivity.
Table 4-4. Network Security Page Settings
Settings Description
IP Range Enabled Enables the IP Range checking feature, which defines a specific range of IP
addresses that can access the DRAC 5.
IP Range Address Determines the acceptable IP subnet address.
IP Range Subnet Mask Defines the significant bit positions in the IP address. The subnet mask should
be in the form of a netmask, where the more significant bits are all 1's with a
single transition to all zeros in the lower-order bits.
For example: 255.255.255.0
IP Blocking Enabled Enables the IP address blocking feature, which limits the number of failed
login attempts from a specific IP address for a preselected time span.
IP Blocking Fail Count Sets the number of login failures attempted from an IP address before the login
attempts are rejected from that address.
IP Blocking Fail
Window
Determines the time span in seconds within which IP Block Fail Count failures
must occur to trigger the IP Block Penalty Time.