Users Guide

3. Select the components listed in Import Components option.
4. Select the Shutdown type.
5. Select the Maximum wait time to specify the wait time before the system shuts down after the import is complete.
6. Click Import.
Exporting server configuration profile using iDRAC web
interface
To export the server configuration profile:
1. Go to Configuration > Server Configuration Profile
The Server Configuration Profile page is displayed.
2. Click Export.
3. Select one of the following to specify the location type:
Local to save the configuration file on a local drive.
Network Share to save the configuration file on a CIFS or NFS share.
HTTP or HTTPS to save the configuration file to a local file using HTTP/HTTPS file transfer.
NOTE: Depending on the location type, you must enter the Network Settings or HTTP/HTTPS settings. If proxy is
configured for HTTP/HTTPS, proxy settings are also required.
4. Select the components that you need to back up the configuration for.
5. Select the Export type, following are the options:
Basic
Replacement Export
Clone Export
6. Select an Export file format.
7. Select Additional export items.
8. Click Export.
Secure Boot Configuration from BIOS Settings or
F2
UEFI Secure Boot is a technology that eliminates a major security void that may occur during a handoff between the UEFI firmware and
UEFI operating system (OS). In UEFI Secure Boot, each component in the chain is validated and authorized against a specific certificate
before it is allowed to load or run. Secure Boot removes the threat and provides software identity checking at every step of the boot—
Platform firmware, Option Cards, and OS BootLoader.
The Unified Extensible Firmware Interface (UEFI) Forum—an industry body that develops standards for pre-boot software—defines
Secure Boot in the UEFI specification. Computer system vendors, expansion card vendors, and operating system providers collaborate on
this specification to promote interoperability. As a portion of the UEFI specification, Secure Boot represents an industry-wide standard for
security in the pre-boot environment.
When enabled, UEFI Secure Boot prevents the unsigned UEFI device drivers from being loaded, displays an error message, and does not
allow the device to function. You must disable Secure Boot to load the unsigned device drivers.
On the Dell 14
th
generation and later versions of PowerEdge servers, you can enable or disable the Secure Boot feature by using different
interfaces (RACADM, WSMAN, REDFISH, and LC-UI).
Acceptable file formats
The Secure Boot policy contains only one key in PK, but multiple keys may reside in KEK. Ideally, either the platform manufacturer or
platform owner maintains the private key corresponding to the public PK. Third parties (such as OS providers and device providers)
maintain the private keys corresponding to the public keys in KEK. In this way, platform owners or third parties may add or remove entries
in the db or dbx of a specific system.
Setting up managed system
77