Users Guide

Enabling or disabling OS to iDRAC Pass-through using iDRAC
settings utility
To enable or disable OS to iDRAC Pass-through using iDRAC Settings Utility:
1. In the iDRAC Settings utility, go to Communications Permissions.
The iDRAC Settings.Communications Permissions page is displayed.
2. Select any of the following options to enable OS to iDRAC pass-through:
LOM The OS to iDRAC pass-through link between the iDRAC and the host operating system is established through
the LOM or NDC.
USB NIC The OS to iDRAC pass-through link between the iDRAC and the host operating system is established
through the internal USB bus.
NOTE: If you set the pass-through mode to LOM, ensure that:
OS and iDRAC are on the same subnet
NIC selection in Network Settings is set to a LOM
To disable this feature, select Disabled.
NOTE: The LOM option can be selected only of the card supports OS to iDRAC pass-through capability. Else, this
option is grayed-out.
3. If you select LOM as the pass-through configuration, and if the server is connected using dedicated mode, enter the IPv4
address of the operating system.
NOTE: If the server is connected in shared LOM mode, then the OS IP Address field is disabled.
4. If you select USB NIC as the pass-through configuration, enter the IP address of the USB NIC.
The default value is 169.254.1.1. However, if this IP address conflicts with an IP address of other interfaces of the host
system or the local network, you must change it. Do not enter 169.254.0.3 and 169.254.0.4 IPs. These IPs are reserved for
the USB NIC port on the front panel when an A/A cable is used.
NOTE:
If IPv6 is preferred, the default address is fde1:53ba:e9a0:de11::1. If needed, this address can be modified in the
idrac.OS-BMC.UsbNicULA setting. If IPv6 is not wanted on the USB-NIC, it can be disabled by changing the address to
"::"
5. Click Back, click Finish, and then click Yes.
The details are saved.
Obtaining certificates
The following table lists the types of certificates based on the login type.
Table 16. Types of certificate based on login type
Login Type Certificate Type How to Obtain
Single Sign-on using Active Directory Trusted CA certificate Generate a CSR and get it signed
from a Certificate Authority
SHA-2 certificates are also
supported.
Smart Card login as a local or Active
Directory user
User certificate
Trusted CA certificate
User Certificate Export the
smart card user certificate as
Base64-encoded file using the
card management software
provided by the smart card
vendor.
Trusted CA certificate This
certificate is issued by a CA.
SHA-2 certificates are also
supported.
Configuring iDRAC 105