User's Manual
Configuring the iDRAC 31
Configure iDRAC Users
Set up the local iDRAC users and permissions. The iDRAC holds a table of
sixteen local users in firmware. You can set usernames, passwords, and roles
for these users.
• iDRAC configuration utility (configures administrative user only) — see
"LAN User Configuration" on page 202
• iDRAC Web interface — see "Adding and Configuring iDRAC Users" on
page 65
• RACADM — see "Adding an iDRAC User" on page 153
Configure Active Directory
In addition to the local iDRAC users, you can use Microsoft
®
Active
Directory
®
to authenticate iDRAC user logins.
• See "Using the iDRAC with Microsoft Active Directory" on page 89
Configure IP Filtering and IP Blocking
In addition to user authentication, you can prevent unauthorized access by
rejecting connection attempts from IP addresses outside of a defined range
and by temporarily blocking connections from IP addresses where
authentication has failed multiple times within a configurable timespan.
• iDRAC Web interface — see "Configuring IP Filtering and IP Blocking" on
page 60
• RACADM — see "Configuring IP Filtering (IpRange)" on page 161,
"Configuring IP Blocking" on page 163
Configure Platform Events
Platform events occur when the iDRAC detects a warning or critical
condition from one of the managed server’s sensors.
Configure Platform Event Filters (PEFs) to choose the events you want to
detect, such as rebooting the managed server, when an event is detected.
• iDRAC Web interface — see "Configuring Platform Event Filters (PEF)"
on page 62
• RACADM — see "Configuring PEF" on page 158