Users Guide
Table Of Contents
- User’s Guide
- Contents
- Introduction
- What’s New for Version 5.1
- Setup and Administration
- Installing Server Administrator
- Using Server Administrator
- Instrumentation Service
- Remote Access Service
- Overview
- Hardware Prerequisites
- Software Prerequisites
- Adding and Configuring DRAC Users
- Configuring an Existing DRAC User
- Configuring the DRAC Network Properties
- Configuring the DRAC Alert Properties
- Configuring DRAC III Dial-in (PPP) Users and Modem Settings
- Configuring the DRAC Remote Features Properties
- Configuring DRAC Security
- Accessing and Using a Dell Remote Access Controller
- Working With the Baseboard Management Controller (BMC)
- Storage Management Service
- Server Administrator Logs
- Troubleshooting
- Glossary
- Index
Contents 3
Contents
1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Integrated Features
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Installation
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Server Administrator Home Page
. . . . . . . . . . . . . . . . . . . . . 10
Instrumentation Service
. . . . . . . . . . . . . . . . . . . . . . . . . . 10
Remote Access Service
. . . . . . . . . . . . . . . . . . . . . . . . . . 10
Storage Management Service
. . . . . . . . . . . . . . . . . . . . . . . 11
Diagnostic Service
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Logs
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Other Documents You Might Need
. . . . . . . . . . . . . . . . . . . . . . . 12
Obtaining Technical Assistance
. . . . . . . . . . . . . . . . . . . . . . . . . 14
2 What’s New for Version 5.1. . . . . . . . . . . . . . . . . . . . . . . 15
3 Setup and Administration
. . . . . . . . . . . . . . . . . . . . . . . . 17
Security Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Role-Based Access Control
. . . . . . . . . . . . . . . . . . . . . . . . 17
Authentication
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Encryption
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Assigning User Privileges
. . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Creating Server Administrator Users for Supported Windows
Operating Systems
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Creating Server Administrator Users for Supported
Red Hat Enterprise Linux and SUSE Linux Enterprise
Server Operating Systems
. . . . . . . . . . . . . . . . . . . . . . . . . 21
Disabling Guest and Anonymous Accounts in Supported
Windows Operating Systems
. . . . . . . . . . . . . . . . . . . . . . . . . . 22