Users Guide

Table Of Contents
Using the remote WMI interface:
winrm i EnableInBandSNMPTraps wmi/root/cimv2/dcim/DCIM_iSMService?
InstanceID="iSMExportedFunctions" @{state="[0/1]"} -u:<admin-username> -p:<admin-
passwd> -r:http://<remote-hostname OR IP>/WSMan -a:Basic -encoding:utf-8 -skipCACheck
skipCNCheck
Linux operating system
On all iSM supported Linux operating system, iSM provides an executable command. You can run this command by logging
into the operating system by using SSH or equivalent.
Beginning with iSM 2.4.0, you can configure Agent-x as the default protocol for in-band iDRAC SNMP alerts using the
following command:
./Enable-iDRACSNMPTrap.sh 1/agentx force
If force is not specified, ensure that the net-SNMP is configured and restart the snmpd service.
To enable this feature:
Enable-iDRACSNMPTrap.sh 1
Enable-iDRACSNMPTrap.sh enable
To disable this feature:
Enable-iDRACSNMPTrap.sh 0
Enable-iDRACSNMPTrap.sh disable
NOTE:
The --force option configures the Net-SNMP to forward the traps. However, you must configure the trap
destination.
VMware ESXi operating system
On all iSM supported ESXi operating systems, the iSM v2.3 supports a Common Management Programming Interface
(CMPI) method provider to enable this feature remotely by using the WinRM remote commands.
winrm i EnableInBandSNMPTraps http://schemas.dell.com/wbem/
wscim/1/cim-schema/2/root/cimv2/dcim/DCIM_iSMService? __cimnamespace=root/cimv2/
dcim+InstanceID=iSMExportedFunctions -u:<user-name> -p:<passwd> -r:https://<remote-host-
name
ip-address>:443/WSMan -a:basic -encoding:utf-8 -skipCNCheck -skipCACheck
-skipRevocationcheck @{state="[0/1]"}
NOTE: You must review and configure the VMware ESXi system-wide SNMP settings for traps.
NOTE: For more details, refer to the In-BandSNMPAlerts technical white paper available at https://www.dell.com/
support.
iDRAC access via Host OS
By using this feature, you can configure and monitor the hardware parameters through iDRAC Web interface, WSMan, and
RedFish interfaces using the host IP address without configuring the iDRAC IP address. You can use the default iDRAC
credentials if the iDRAC server is not configured or continue to use the same iDRAC credentials if the iDRAC server was
configured earlier.
iDRAC access via Windows Operating Systems
You can perform this task by using the following methods:
Install the iDRAC access feature by using the webpack.
Configure using iSM PowerShell script
Installation by using MSI
292
Using iDRAC Service Module